LogoLogo
Contact Uscybus.io
Connectware 1.11.0
Connectware 1.11.0
  • Getting Started
    • Cybus Connectware Documentation
    • System Requirements
    • Admin UI
    • Basic Components of Connectware
    • Connecting your First Machine
      • Your First Service Commissioning File
  • Deployment & Configuration
    • Installation & Upgrades
      • Installing Connectware
        • Installing Connectware (Kubernetes)
        • Installing Connectware (Docker)
      • Upgrading Connectware
        • Upgrading Connectware (Kubernetes)
          • Version-Specific Upgrades (Kubernetes)
        • Upgrading Connectware (Docker)
          • Version-Specific Upgrades (Docker)
      • Uninstalling Connectware
        • Uninstalling Connectware (Kubernetes)
        • Uninstalling Connectware (Docker)
      • Licensing
      • Restarting Connectware
    • User Management
      • Users
        • Default Admin User
      • Roles
      • Permissions
      • MQTT User Authentication
      • Adding a MQTT Publish Prefix for Users
      • Multi-Factor Authentication
      • Single Sign-On (SS0)
        • Single Sign-On with Microsoft Entra ID
        • Single Sign-On with LDAP
      • Access Permissions for Admin-UI
        • UI Access
        • Minimum Access Role Pages
    • Services
      • Service Overview
      • Service Resources View
        • Service Links View
        • Servers View
        • Containers View
        • Volumes View
        • Connections View
        • Endpoints View
        • Mappings View
      • Service Details View
      • Service Commissioning Files
        • Version
        • Description
        • Metadata
        • Parameters
        • Definitions
        • Resources
          • Cybus::Connection
          • Cybus::Container
            • Docker Problem with Network Changes
          • Cybus::Endpoint
          • Cybus::File
          • Cybus::IngressRoute
          • Cybus::Link
          • Cybus::Mapping
          • Cybus::Node
          • Cybus::Role
          • Cybus::Server
          • Cybus::User
          • Cybus::Volume
      • Setting Up & Configuring Services
        • Installing Services
        • Enabling Services
        • Updating Services
        • Disabling Services
        • Deleting Services
      • FlowSync
        • Example 1 - Node with Transaction Mode (HTTP)
        • Example 2 - Node Responds (HTTP)
        • Example 3 - Node with Error (HTTP)
        • Example 4 - Node with Timeout Error Code & Error Message (HTTP)
        • Example 5 - Full Transactional Data Flow (HTTP)
        • Example 6 - Full Transactional Data Flow (OPC UA)
      • ServiceID
      • Inter-Service Referencing
      • Deviations
      • Service Logs
        • Logs of Individual Services
        • Logs of All Services
      • Rule Engine
        • Data Processing Rules
        • Rule Sandbox
      • Shared Subscriptions
        • Setting Up Shared Subscriptions
    • Agents
      • Agents View
      • Installing Agents
        • Installing Agents via Docker
        • Installing Agents via Docker Compose
        • Installing Agents via Kubernetes
        • Using Mutual TLS for Agents
      • Registering Agents in Connectware
      • Using Agents
      • Monitoring Agents
      • Agents in Kubernetes
        • Adding Agents Inside your Connectware Installation
        • Remote Agents with the connectware-agent Helm Chart
        • Kubernetes Cluster Requirements for the connectware-agent Helm Chart
        • Installing Connectware Agents using the connectware-agent Helm Chart
        • Installing Connectware Agents without a License Key Using the connectware-agent Helm Chart
        • Upgrading the connectware-agent Helm Chart
        • Uninstalling Connectware agents with the connectware-agent Helm chart
        • Configuration Principles for the connectware-agent Helm Chart
        • Configuring Agents with the connectware-agent Helm Chart
          • Configuring Target Connectware for the connectware-agent Helm Chart
          • Configuring Agent Persistence for the connectware-agent Helm Chart
          • Configuring Compute Resources for the connectware-agent Helm Chart
          • Using a Custom Image Registry for the connectware-agent Helm Chart
          • Configuring Image Pull Policy for the connectware-agent Helm Chart
          • Using Mutual Transport Layer Security (mTLS) for agents with the connectware-agent Helm chart
          • Configuring image name & version for the connectware-agent Helm chart
          • Configuring Environment Variables for the connectware-agent Helm Chart
          • Configuring Labels & Annotations for the connectware-agent Helm Chart
          • Configuring podAntiAffinity for the connectware-agent Helm Chart
          • Assigning Agents to Kubernetes Nodes for the connectware-agent Helm Chart
          • Configuring Security Context for the connectware-agent Helm Chart
          • Controlling the Name of Kubernetes Objects for the connectware-agent Helm Chart
      • Troubleshooting Agents
    • Client Registry
      • Client Registry for MQTT Clients
      • Client Registry via REST API
      • Troubleshooting Client Registry
    • Security
      • TLS Certificates
        • Certificate Requirements
          • Cipher Suites & TLS Versions
        • CA Certificates
          • Certificates View
        • Client Certificates
        • Server Certificates
      • Password Policy Configuration
      • JSON Web Tokens
    • Monitoring
      • Data Explorer
      • Live Data
    • Node-RED Workbench
    • System Status
      • System Container Status
      • Internet Connectivity Status
      • Metrics (Data Points and Messages)
      • Agents Status
      • License Information
      • System Information
    • Backup & Restore
      • Volumes
      • User Database
    • CybusMQ
      • Configuring CybusMQ
    • Connectware on Kubernetes
      • Connectware Helm Chart
      • Resizing Broker Volumes in Kubernetes
      • Configuring Core Services
      • LDAP Authentication
        • Configuring LDAP Authentication
        • Enabling TLS for LDAP Authentication
        • Manual Kubernetes Secret for LDAP Authentication Bind User
        • Customizing the Search Filter for LDAP Authentication
        • Customizing the User RDN for LDAP Authentication
      • Troubleshooting Connectware on Kubernetes
    • Environment Variables
    • Industry Protocol Details
      • ADS
        • ADS Connection Properties
        • ADS Endpoint Properties
      • BACnet
        • BACnet Connection Properties
        • BACnet Endpoint Properties
      • Custom Connectors
        • Developing Custom Connectors
        • Deploying Custom Connectors
        • Using Custom Connectors
      • EtherNet/IP
        • EtherNet/Ip Connection Properties
        • EtherNet/Ip Endpoint Properties
      • FOCAS
        • FOCAS Connection Properties
        • FOCAS Endpoint Properties
      • Hottinger Baldwin Messtechnik (HBM)
        • HBM Connection Properties
        • HBM Endpoint Properties
      • Heidenhain DNC
        • Heidenhain DNC Connection Properties
        • Heidenhain DNC Endpoint Properties
      • HTTP/REST
        • HTTP/REST Connection Properties
        • HTTP/REST Endpoint Properties
      • HTTP Server/Node
        • HTTP Server Properties
        • HTTP Node Properties
      • InfluxDB
        • InfluxDB Connection Properties
        • InfluxDB Endpoint Properties
      • Kafka
        • Kafka Connection Properties
        • Kafka Endpoint Properties
      • Modbus/TCP
        • Modbus/TCP Connection Properties
        • Modbus/TCP Endpoint Properties
      • MQTT
        • MQTT Connection Properties
        • MQTT Endpoint Properties
      • MSSQL
        • Mssql Connection Properties
        • Mssql Endpoint Properties
      • OPC DA
        • OPC DA Connection Properties
        • OPC DA Endpoint Properties
      • OPC UA
        • OPC UA Client
          • OPC UA Client Connection Properties
          • OPC UA Client Endpoint Properties
        • OPC UA Server
          • OPC UA Server Properties
          • OPC UA Node Properties
        • OPC UA Object Types
        • OPC UA Server References
          • OPC UA Reference Node
          • OPC UA Object Node
      • Siemens SIMATIC S7
        • Siemens S7 Connection Properties
        • Siemens S7 Endpoint Properties
      • Shdr
        • Shdr Connection Properties
        • Shdr Endpoint Properties
      • SINUMERIK
        • SINUMERIK Connection Properties
        • SINUMERIK Endpoint Properties
      • SOPAS
        • SOPAS Connection Properties
        • SOPAS Endpoint Properties
      • SQL
        • SQL Connection Properties
        • SQL Endpoint Properties
      • Werma WIN Ethernet
        • Werma WIN Ethernet Connection Properties
        • Werma WIN Ethernet Endpoint Properties
      • Systemstate
        • Systemstate Endpoint Properties
  • Reference
    • API Reference
      • User Management (API)
      • Client Registry (API)
      • Services (API)
      • Resources (API)
      • System Status (API)
      • Resource Status Tracking (HTTP API)
      • Industry Protocol Details (API)
    • Changelog
Powered by GitBook
LogoLogo

Cybus

  • Terms and Condition
  • Imprint
  • Data Privacy

© Copyright 2025, Cybus GmbH

On this page
  • Insecure Cipher Suites
  • Ingress (443/TCP) Cipher Suites
  • Supported TLS Versions
  • Supported TLS Ciphers
  • Broker (8883/TCP) Cipher Suites
  • Supported TLS Versions
  • Supported TLS Ciphers
  • Control Plane Cipher Suites
  • Supported TLS Versions
  • Supported TLS Ciphers

Was this helpful?

  1. Deployment & Configuration
  2. Security
  3. TLS Certificates
  4. Certificate Requirements

Cipher Suites & TLS Versions

Learn about the cipher suites and TLS versions supported by Cybus Connectware components to ensure secure communications.

Cybus Connectware secures communications through Transport Layer Security (TLS) and mutual TLS (mTLS) protocols across its key components: Ingress, Broker, and Control Plane.

This guide lists the supported cipher suites and TLS versions for each component, enabling you to implement secure communication channels in your industrial IoT deployments. A strong TLS configuration is critical for securing data transmissions, verifying endpoint identities, and meeting security compliance requirements.

Insecure Cipher Suites

When configuring TLS for Cybus Connectware components, it is critical to avoid insecure cipher suites. These may include ciphers with known vulnerabilities, outdated algorithms, or insufficient key lengths that could compromise your communication security.

For maximum protection, avoid using ciphers that lack Perfect Forward Secrecy, use deprecated encryption algorithms, employ vulnerable modes such as CBC, or implement weak hash functions. We strongly recommend using only the modern cipher suites documented in this guide for all Connectware components.

By default, Connectware does not allow the usage of insecure cipher suites. If you need to use insecure cipher suites, you must set the CYBUS_ALLOW_INSECURE_TLS_CIPHERS environment variables to true. For more information, see Environment Variables.

Ingress (443/TCP) Cipher Suites

Supported TLS Versions

  • TLS 1.2

  • TLS 1.3

Supported TLS Ciphers

Ingress in Cybus Connectware supports the following TLS versions and cipher suites.

All supported cipher suites provide 'A' grade security strength. Cipher preference is server-controlled for TLS 1.2 and client-controlled for TLS 1.3. Only null compression is supported, enhancing security by avoiding compression-related vulnerabilities.

TLS 1.2 Supported Cipher Suites

Cipher Suite
Key Length & Elliptic Curve Parameters

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA, X25519

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA, X25519

TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

256-bit ChaCha20, 256-bit Poly1305, X25519

TLS 1.3 Supported Cipher Suites

Cipher Suite
Key Length & Elliptic Curve Parameters

TLS_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA, X25519

TLS_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA, X25519

TLS_CHACHA20_POLY1305_SHA256

256-bit ChaCha20, 256-bit Poly1305, X25519

Broker (8883/TCP) Cipher Suites

Supported TLS Versions

  • TLS 1.2

Supported TLS Ciphers

The MQTT broker in Cybus Connectware supports the following TLS version and cipher suites:

TLS 1.2 Supported Cipher Suites

Cipher Suite
Key Length & Elliptic Curve Parameters

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

128-bit AES, 160-bit SHA1, SECP256R1 (NIST P-256)

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

128-bit AES, 256-bit SHA256, SECP256R1 (NIST P-256)

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA256, SECP256R1 (NIST P-256)

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

256-bit AES, 160-bit SHA1, SECP256R1 (NIST P-256)

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

256-bit AES, 384-bit SHA384, SECP256R1 (NIST P-256)

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA384, SECP256R1 (NIST P-256)

TLS_RSA_WITH_AES_128_CBC_SHA

128-bit AES, 160-bit SHA1, RSA 2048-bit

TLS_RSA_WITH_AES_128_CBC_SHA256

128-bit AES, 256-bit SHA256, RSA 2048-bit

TLS_RSA_WITH_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA256, RSA 2048-bit

TLS_RSA_WITH_AES_256_CBC_SHA

256-bit AES, 160-bit SHA1, RSA 2048-bit

TLS_RSA_WITH_AES_256_CBC_SHA256

256-bit AES, 256-bit SHA256, RSA 2048-bit

TLS_RSA_WITH_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA384, RSA 2048-bit

All supported cipher suites provide 'A' grade security strength. Cipher preference is client-controlled. Only null compression is supported, enhancing security by avoiding compression-related vulnerabilities.

Control Plane Cipher Suites

Supported TLS Versions

  • TLS 1.2

  • TLS 1.3

Supported TLS Ciphers

Control Plane in Cybus Connectware supports the following TLS versions and cipher suites:

TLS 1.2 Supported Cipher Suites

Cipher Suite
Key Length & Elliptic Curve Parameters

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA, usually secp256r1 (NIST P-256) for ECDSA

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA, usually secp256r1 (NIST P-256) for ECDHE

TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305

256-bit ChaCha20, 256-bit Poly1305, usually secp256r1 or x25519

TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305

256-bit ChaCha20, 256-bit Poly1305, usually secp256r1 or x25519

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA, usually secp384r1 (NIST P-384) for ECDSA

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA, usually secp384r1 (NIST P-384) for ECDHE

TLS 1.3 Supported Cipher Suites

Cipher Suite
Key Length & Elliptic Curve Parameters

TLS_AES_128_GCM_SHA256

128-bit AES, 256-bit SHA, typically x25519 or secp256r1

TLS_AES_256_GCM_SHA384

256-bit AES, 384-bit SHA, typically x25519, secp256r1, or secp384r1

TLS_CHACHA20_POLY1305_SHA256

256-bit ChaCha20, 256-bit Poly1305, typically x25519

PreviousCertificate RequirementsNextCA Certificates

Last updated 6 days ago

Was this helpful?