<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Soap https broken in Active IQ Unified Manager Discussions</title>
    <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129771#M23413</link>
    <description>&lt;P&gt;I do my connection via TLS1_2&lt;/P&gt;&lt;P&gt;Broken https &amp;nbsp;is not relayed to SSLv3, but weak tls cipher, find &amp;nbsp;the supported ciphers &amp;nbsp;(all are obsolete)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;SCAN RESULTS FOR ITS-WFADEV.SWATCHGROUP.NET:443 - 10.140.16.45
 --------------------------------------------------------------

  * Deflate Compression:
                                         OK - Compression disabled

  * Certificate Basic Information:
      SHA1 Fingerprint:                  3aba9c83639b784b0fefa41bc7efed51d8e01f14
      Common Name:                       GDC01249.swatchgroup.net
      Issuer:                            GDC01249.swatchgroup.net
      Serial Number:                     6556000F
      Not Before:                        Apr 18 14:32:11 2016 GMT
      Not After:                         Apr 18 14:32:11 2019 GMT
      Signature Algorithm:               sha256WithRSAEncryption
      Public Key Algorithm:              rsaEncryption
      Key Size:                          2048
      Exponent:                          65537 (0x10001)

  * Certificate - Trust:
      Hostname Validation:               FAILED - Certificate does NOT match its-wfadev.swatchgroup.net
      Apple CA Store (OS X 10.11.6):     FAILED - Certificate is NOT Trusted: self signed certificate
      AOSP CA Store (7.0.0 r1):          FAILED - Certificate is NOT Trusted: self signed certificate
      Mozilla CA Store (09/2016):        FAILED - Certificate is NOT Trusted: self signed certificate
      Java 7 CA Store (Update 79):       FAILED - Certificate is NOT Trusted: self signed certificate
      Microsoft CA Store (09/2016):      FAILED - Certificate is NOT Trusted: self signed certificate
      Received Chain:                    GDC01249.swatchgroup.net
      Verified Chain:                    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Contains Anchor:    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Order:              OK - Order is valid
      Verified Chain contains SHA1:      ERROR - Could not build verified chain (certificate untrusted?)

  * Certificate - OCSP Stapling:
                                         NOT SUPPORTED - Server did not send back an OCSP response.

  * SSLV2 Cipher Suites:
      Server rejected all cipher suites.

  * Session Renegotiation:
      Client-initiated Renegotiation:    VULNERABLE - Server honors client-initiated renegotiations
      Secure Renegotiation:              OK - Supported

  * OpenSSL CCS Injection:
                                         OK - Not vulnerable to OpenSSL CCS injection

  * TLSV1_1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * Resumption Rate:
      With Session IDs:                  OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
      With TLS Tickets:                  NOT SUPPORTED - TLS ticket not assigned.

  * TLSV1_2 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * Downgrade Attacks:
      TLS_FALLBACK_SCSV:                 OK - Supported

  * TLSV1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * SSLV3 Cipher Suites:
      Server rejected all cipher suites.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Apr 2017 14:16:19 GMT</pubDate>
    <dc:creator>francoisbnc</dc:creator>
    <dc:date>2017-04-04T14:16:19Z</dc:date>
    <item>
      <title>Soap https broken</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129769#M23411</link>
      <description>&lt;P&gt;I experience an issue when I tried to call WFA&amp;nbsp;workflows through https soap call in python.&lt;/P&gt;&lt;P&gt;Basically I receive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;requests.exceptions.SSLError: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] sslv3 alert handshake failure in ssl python module&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; print (ssl.OPENSSL_VERSION)&lt;BR /&gt;OpenSSL 1.0.2k 26 Jan 2017&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think is related to wfa broken https communication, I can see with Chrome in&amp;nbsp;&lt;SPAN&gt;Security Overview when connected though https interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Obsolete Connection Settings
The connection to this site uses a strong protocol (TLS 1.2), an obsolete key exchange (RSA), and an obsolete cipher (3DES_EDE_CBC with HMAC-SHA1).&lt;/PRE&gt;&lt;P&gt;Is there a way to change the cipher and key exchange on WFA&amp;nbsp;server side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same issue with WFA 4.0 and WFA 4.1RC1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="security-explanation-title"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 04 Jun 2025 15:14:52 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129769#M23411</guid>
      <dc:creator>francoisbnc</dc:creator>
      <dc:date>2025-06-04T15:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129770#M23412</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SSLv3 is disabled in WFA server from 3.0GA onwards due to security reasons. Hence the connection failure.&amp;nbsp;&lt;SPAN&gt;TLSv1,TLSv1.1,TLSv1.2 are the supported protocols. Could you please try to connect with the supported protocols.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks and Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Anu&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 11:07:48 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129770#M23412</guid>
      <dc:creator>anuk</dc:creator>
      <dc:date>2017-04-04T11:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129771#M23413</link>
      <description>&lt;P&gt;I do my connection via TLS1_2&lt;/P&gt;&lt;P&gt;Broken https &amp;nbsp;is not relayed to SSLv3, but weak tls cipher, find &amp;nbsp;the supported ciphers &amp;nbsp;(all are obsolete)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;SCAN RESULTS FOR ITS-WFADEV.SWATCHGROUP.NET:443 - 10.140.16.45
 --------------------------------------------------------------

  * Deflate Compression:
                                         OK - Compression disabled

  * Certificate Basic Information:
      SHA1 Fingerprint:                  3aba9c83639b784b0fefa41bc7efed51d8e01f14
      Common Name:                       GDC01249.swatchgroup.net
      Issuer:                            GDC01249.swatchgroup.net
      Serial Number:                     6556000F
      Not Before:                        Apr 18 14:32:11 2016 GMT
      Not After:                         Apr 18 14:32:11 2019 GMT
      Signature Algorithm:               sha256WithRSAEncryption
      Public Key Algorithm:              rsaEncryption
      Key Size:                          2048
      Exponent:                          65537 (0x10001)

  * Certificate - Trust:
      Hostname Validation:               FAILED - Certificate does NOT match its-wfadev.swatchgroup.net
      Apple CA Store (OS X 10.11.6):     FAILED - Certificate is NOT Trusted: self signed certificate
      AOSP CA Store (7.0.0 r1):          FAILED - Certificate is NOT Trusted: self signed certificate
      Mozilla CA Store (09/2016):        FAILED - Certificate is NOT Trusted: self signed certificate
      Java 7 CA Store (Update 79):       FAILED - Certificate is NOT Trusted: self signed certificate
      Microsoft CA Store (09/2016):      FAILED - Certificate is NOT Trusted: self signed certificate
      Received Chain:                    GDC01249.swatchgroup.net
      Verified Chain:                    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Contains Anchor:    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Order:              OK - Order is valid
      Verified Chain contains SHA1:      ERROR - Could not build verified chain (certificate untrusted?)

  * Certificate - OCSP Stapling:
                                         NOT SUPPORTED - Server did not send back an OCSP response.

  * SSLV2 Cipher Suites:
      Server rejected all cipher suites.

  * Session Renegotiation:
      Client-initiated Renegotiation:    VULNERABLE - Server honors client-initiated renegotiations
      Secure Renegotiation:              OK - Supported

  * OpenSSL CCS Injection:
                                         OK - Not vulnerable to OpenSSL CCS injection

  * TLSV1_1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * Resumption Rate:
      With Session IDs:                  OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
      With TLS Tickets:                  NOT SUPPORTED - TLS ticket not assigned.

  * TLSV1_2 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * Downgrade Attacks:
      TLS_FALLBACK_SCSV:                 OK - Supported

  * TLSV1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * SSLV3 Cipher Suites:
      Server rejected all cipher suites.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:16:19 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129771#M23413</guid>
      <dc:creator>francoisbnc</dc:creator>
      <dc:date>2017-04-04T14:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129775#M23414</link>
      <description>&lt;P&gt;I do soap call via TLS so problem is not relayed to SSLv3, but weak cipher used in wfa server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;SCAN RESULTS FOR ITS-WFADEV.SWATCHGROUP.NET:443 - 10.140.16.45
 --------------------------------------------------------------

  * Deflate Compression:
                                         OK - Compression disabled

  * TLSV1_2 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * SSLV2 Cipher Suites:
      Server rejected all cipher suites.

  * Session Renegotiation:
      Client-initiated Renegotiation:    VULNERABLE - Server honors client-initiated renegotiations
      Secure Renegotiation:              OK - Supported

  * OpenSSL CCS Injection:
                                         OK - Not vulnerable to OpenSSL CCS injection

  * Certificate Basic Information:
      SHA1 Fingerprint:                  3aba9c83639b784b0fefa41bc7efed51d8e01f14
      Common Name:                       GDC01249.swatchgroup.net
      Issuer:                            GDC01249.swatchgroup.net
      Serial Number:                     6556000F
      Not Before:                        Apr 18 14:32:11 2016 GMT
      Not After:                         Apr 18 14:32:11 2019 GMT
      Signature Algorithm:               sha256WithRSAEncryption
      Public Key Algorithm:              rsaEncryption
      Key Size:                          2048
      Exponent:                          65537 (0x10001)

  * Certificate - Trust:
      Hostname Validation:               FAILED - Certificate does NOT match its-wfadev.swatchgroup.net
      Microsoft CA Store (09/2016):      FAILED - Certificate is NOT Trusted: self signed certificate
      Apple CA Store (OS X 10.11.6):     FAILED - Certificate is NOT Trusted: self signed certificate
      AOSP CA Store (7.0.0 r1):          FAILED - Certificate is NOT Trusted: self signed certificate
      Java 7 CA Store (Update 79):       FAILED - Certificate is NOT Trusted: self signed certificate
      Mozilla CA Store (09/2016):        FAILED - Certificate is NOT Trusted: self signed certificate
      Received Chain:                    GDC01249.swatchgroup.net
      Verified Chain:                    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Contains Anchor:    ERROR - Could not build verified chain (certificate untrusted?)
      Received Chain Order:              OK - Order is valid
      Verified Chain contains SHA1:      ERROR - Could not build verified chain (certificate untrusted?)

  * Certificate - OCSP Stapling:
                                         NOT SUPPORTED - Server did not send back an OCSP response.

  * TLSV1_1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * TLSV1 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 

  * Resumption Rate:
      With Session IDs:                  OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
      With TLS Tickets:                  NOT SUPPORTED - TLS ticket not assigned.

  * Downgrade Attacks:
      TLS_FALLBACK_SCSV:                 OK - Supported

  * SSLV3 Cipher Suites:
      Server rejected all cipher suites.&lt;/PRE&gt;&lt;P&gt;Server only accept&lt;/P&gt;&lt;P&gt;TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_3DES_EDE_CBC_SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there are actually obsolete regarding Chrome security tab&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.netapp.com/t5/image/serverpage/image-id/7039iCD0ACBDE2C1ACBDF/image-size/original?v=1.0&amp;amp;px=-1" border="0" alt="2017-04-04_134353.png" title="2017-04-04_134353.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:16:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129775#M23414</guid>
      <dc:creator>francoisbnc</dc:creator>
      <dc:date>2017-04-04T14:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129780#M23415</link>
      <description>&lt;P&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/8030"&gt;@francoisbnc&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very interesting. Now we need to look at it and update you, its not a regular issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its is possible to give the code snip of your python code which you have been trying and the error is thrown.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sinhaa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 12:45:05 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129780#M23415</guid>
      <dc:creator>sinhaa</dc:creator>
      <dc:date>2017-04-04T12:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129781#M23416</link>
      <description>&lt;P&gt;i use zeep python module to handle SOAP requests, unfortunatly I can't run this with python3 in https, because of&amp;nbsp;&amp;nbsp;handshake failure at Client() init class.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is a part of the code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;from requests import Session
from requests.auth import HTTPBasicAuth
from zeep import Client
from zeep.transports import Transport
import base64

WORKFLOW = 'ITS - SAP Refresh Test'

uname = 'user'
password = 'pass'

urlwsdl = 'https://its-wfadev.swatchgroup.net/wfa-ws/WorkflowService_rpc?wsdl'

session = Session()
session.auth = HTTPBasicAuth(uname, password)

&lt;STRONG&gt;client = Client(wsdl=urlwsdl, transport=Transport(session=session))&lt;/STRONG&gt;
workflows = client.service.getAllWorkflows()&lt;/PRE&gt;</description>
      <pubDate>Tue, 04 Apr 2017 12:59:38 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129781#M23416</guid>
      <dc:creator>francoisbnc</dc:creator>
      <dc:date>2017-04-04T12:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129785#M23418</link>
      <description>&lt;P&gt;Can you try adding 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256' to &lt;STRONG&gt;enabled-cipher-suites&lt;/STRONG&gt; attribute of the &lt;STRONG&gt;https-listeners&lt;/STRONG&gt; property in&amp;nbsp;&lt;STRONG&gt;urn:jboss:domain:undertow:1.2&amp;nbsp;&lt;/STRONG&gt;subsystem configuration in the&amp;nbsp;&amp;lt;WFA_install_location&amp;gt;\WFA\jboss\standalone\configuration\standalone-full.xml.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:00:23 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129785#M23418</guid>
      <dc:creator>ag</dc:creator>
      <dc:date>2017-04-04T14:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129787#M23419</link>
      <description>&lt;P&gt;Don't forget to restart WFA service after making the changes&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:03:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129787#M23419</guid>
      <dc:creator>ag</dc:creator>
      <dc:date>2017-04-04T14:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: Soap https broken https</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129789#M23420</link>
      <description>&lt;P&gt;You rock, new &amp;nbsp;cipher is now available.&lt;/P&gt;&lt;PRE&gt;  * TLSV1_2 Cipher Suites:
      Preferred:                       
        None - Server followed client cipher suite preference.                                                            
      Accepted:                        
        TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256             ECDH-570 bits  128 bits      HTTP 200 OK                                                 
        TLS_RSA_WITH_3DES_EDE_CBC_SHA                     -              112 bits      HTTP 200 OK                                                 
        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA                 DH-2048 bits   112 bits      HTTP 200 OK                                                 &lt;/PRE&gt;&lt;P&gt;code is working well now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:29:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Soap-https-broken/m-p/129789#M23420</guid>
      <dc:creator>francoisbnc</dc:creator>
      <dc:date>2017-04-04T14:29:27Z</dc:date>
    </item>
  </channel>
</rss>

