Database Gateway is scheduled for an upgrade on August 10, 2025. After the upgrade, gateways in US (Virginia) and US (Silicon Valley) regions will no longer support the insecure encryption algorithm (TLS_RSA_WITH_3DES_EDE_CBC_SHA) that is compatible with the Transport Layer Security (TLS) 1.2 protocol.
Upgrade time
August 10, 2025
Affected regions
US (Virginia) and US (Silicon Valley).
The regions mentioned in this topic indicate the regions where the database gateways are accessed, which are specified when you start the database gateway agent.
Impacts and solution
Impacts
After the upgrade, database gateways that are in the US (Virginia) and US (Silicon Valley) regions and use the TLS_RSA_WITH_3DES_EDE_CBC_SHA encryption algorithm compatible with TLS 1.2 will be no longer available for use.
Solution
Make sure that the TLS protocol and encryption algorithm remain available on each of your server on which the database gateway agent is deployed after the upgrade. The following steps provide an example on how to check the availability of the protocol and algorithm and how to upgrade the TLS version on a server running Red Hat Linux:
Log on to the server on which the database gateway agent is deployed.
Run one of the following commands based on the region where the database gateway is accessed:
US (Virginia):
openssl s_client -connect pub-us-east-1.dg.aliyuncs.com:443 -tls1_2|grep CipherUS (Silicon Valley):
openssl s_client -connect pub-us-west-1.dg.aliyuncs.com:443 -tls1_2|grep Cipher
Check the returned result.
If the result indicates that the TLS version is 1.2 and the TLS_RSA_WITH_3DES_EDE_CBC_SHA algorithm is not used, you do not need to perform any operations after the upgrade. Otherwise, go to the next step.
Sample result:
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Cipher : ECDHE-RSA-AES128-GCM-SHA256(Optional) Upgrade the TLS version.
NoteIf the TLS_RSA_WITH_3DES_EDE_CBC_SHA algorithm is used on your server, make sure that the OpenSSL version is 1.1.1 or later, and the TLS version is 1.3 or later.
Run the
sudo yum update openssl -ycommand to upgrade the OpenSSL version.Run the
openssl versioncommand to check the OpenSSL version after the upgrade.If the version is 1.1.1 or later, you can proceed to the next step.
Sample result:
OpenSSL 1.1.1k FIPS 25 Mar 2021Run one of the following commands based on the region where the database gateway is accessed:
US (Virginia):
openssl s_client -connect pub-us-east-1.dg.aliyuncs.com:443 -tls1_3|grep CipherUS (Silicon Valley):
openssl s_client -connect pub-us-west-1.dg.aliyuncs.com:443 -tls1_3|grep Cipher
Check the returned result.
If the result indicates that the TLS version is 1.3, the upgrade is successful.
Sample result:
New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Cipher : TLS_AES_128_GCM_SHA256