Skip to content
This repository was archived by the owner on Apr 22, 2023. It is now read-only.
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions doc/api/tls.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,10 @@ automatically set as a listener for the [secureConnection][] event. The
linked against OpenSSL 1.0.1 or newer and the client speaks TLS 1.2, RC4 is
used as a secure fallback.

**NOTE**: Cipher suites using ECDHE, including the default
highest-preference suite `ECDHE-RSA-AES128-SHA256`, are not currently
available.

**NOTE**: Previous revisions of this section suggested `AES256-SHA` as an
acceptable cipher. Unfortunately, `AES256-SHA` is a CBC cipher and therefore
susceptible to BEAST attacks. Do *not* use it.
Expand Down