Original Message:
Sent: 09-12-2025 09:21
From: William Sparapani
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
I'm hoping for a little clarity as we ran into the same situation in our org - we have BYOC Cloud and found that we also had TLS Ciphers being listed in the custom configuration on our trunks. I opened a Genesys Support case to get more information about the configuration, and they advised this:
"Question: Would removing the "custom" field cause TLS to fail?
Answer:
Removing the custom field would likely cause TLS to fail
The custom field is essential for proper TLS configuration
It's recommended to maintain the custom field with proper cipher configurations"
Was Genesys Support wrong in this case and we should remove the custom configuration listing TLS Ciphers (as it's not actually doing anything)?
Additionally, the announcement for this now lists a deprecation date of 11/17 (https://help.mypurecloud.com/announcements/deprecation-byoc-cloud-sip-tls-ciphers/). Are you able to provide the list of regions where this may not be accurate if only some are being postponed?
------------------------------
William Sparapani
NA
Original Message:
Sent: 09-11-2025 10:37
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
@LAURA MARIA LAFUENTE VALLE all of our trunk configuration has the same schema, some properties are used for all trunks, some is just used for premise trunks, and others are just used for cloud trunks. In almost all cases, the items that are expected to be configured for a particular trunk show up as UI elements to configure; custom properties are not where setting are exposed. In the case of the trunk cipher list, a selectable list appears on premise trunks because that configuration is available in that model; but that is not the case for cloud trunks so that configuration is not exposed in the UI. If a property gets updated that is not exposed in the UI, it will show up in the custom properties area; however, that does not imply it is doing anything. In this case you set a property that is used for premise trunks on a cloud trunk and; although it is part of the schema, that property is ignored for cloud trunks.
We are not postponing the deprecation date completely as we will begin to disable ciphers in regions where we have not seen any usage on that published date. But yes, we will not remove the required cipher in regions where we see usage and will likely publish an additional date after we have a path forward for the Ribbon trunks.
------------------------------
Phil Whitener
Genesys - Employees
Original Message:
Sent: 09-11-2025 06:22
From: LAURA MARIA LAFUENTE VALLE
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Hi @Phil Whitener, thank you so much for your reply and help,
however there´s something I still don´t understand,
You said: Please note that BYOC Cloud trunks do not have any TLS cipher configuration and why the original post states: "Nothing needs to be changed in your Genesys Cloud configuration - the use of these ciphers is determined by your remote SIP endpoint; most likely a Session Border Controller (SBC), SIP Trunk, or carrier configuration, or carrier device.
The thing is that on those same trunks I´m trying to update the config with ECDHE suite, there´s already a custom config set up with the following trunk_transport_tls_ciphers as list: "TLS_RSA_WITH_AES_256_GCM_SHA384","TLS_RSA_WITH_AES_256_CBC_SHA256","TLS_RSA_WITH_AES_256_CBC_SHA"
This is quite confusing, bc you say that BYOC trunks do not have any TLS cipher configuration, but in my production setup I see that they actually have.
Regarding this: " We will not eliminate the ciphers that are in use prior to a solution that allows for a transition for these trunks."
Great, so an you confirm the announced deprecation date (22 Sept) will be posponed at least for Genesys-RIBBON SBC interop trunks??
Again thank you,
------------------------------
LAURA MARIA LAFUENTE VALLE
Spain
Original Message:
Sent: 09-09-2025 10:42
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
@LAURA MARIA LAFUENTE VALLE we are monitoring the cipher usage and are aware of the Ribbon compatibility issues. We will not eliminate the ciphers that are in use prior to a solution that allows for a transition for these trunks. Although Genesys and Ribbon have a common TLS cipher, currently Genesys only supports the elliptical curve you mentioned, secp384r1, while Ribbon only supports the elliptical curve secp256r1. This creates an incompatibility with that cipher, and is why we see those trunks using one of the ciphers we plan to deprecate. Please note that BYOC Cloud trunks do not have any TLS cipher configuration and why the original post states: "Nothing needs to be changed in your Genesys Cloud configuration - the use of these ciphers is determined by your remote SIP endpoint; most likely a Session Border Controller (SBC), SIP Trunk, or carrier configuration, or carrier device." That is likely why you are seeing a validation error. We will retain these ciphers in regions where we know they are being used to ensure these trunks continue to work until we can find a solution that allows for the deprecation.
------------------------------
Phil Whitener
Genesys - Employees
Original Message:
Sent: 09-09-2025 07:28
From: LAURA MARIA LAFUENTE VALLE
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Hi Phil
I have a similar situation with a particular ORG in Genesys Cloud for one of my customers.
We got two Generic BYOC PBX trunks between Ribbon SBCs and Genesys Cloud platform and very worried about the impact on customers daily activities this deprecation will have.
According Ribbon, they recommend using ECDHE ciphers with compatible Key Share between Genesys and SBCs (secp384r1 if I understood correctly). Based on this, I found that the only compatible cipher suite between SBCs and Genesys meeting this requirement will be TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
When I try to set this cipher suite in the Genesys trunk config screen, I get a "Validation error" and cannot save the config. Same situation as @Pablo Barnech explained earlier in this topic. So can you please help clarify how we can set up this suite then??
------------------------------
LAURA MARIA LAFUENTE VALLE
NA
Original Message:
Sent: 09-02-2025 23:03
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
I assume that is a BYOC Premise property and we hide the UI configuration because it is not valid for BYOC Cloud but we don't prohibit setting the value based on the trunk type. But it is not valid for BYOC Cloud and presumably ignored. If it is rejecting that value it might not be an available cipher for BYOC Premise. I will review with the team responsible and confirm.
------------------------------
Phil Whitener
Genesys - Employees
Original Message:
Sent: 09-02-2025 22:57
From: Pablo Barnech
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
yes, it's BYOC Cloud.
Ok, thanks for your explanation but, so, what is the purpouse of that custom property? I don't understand, if there is no option to choose the ciphers offered by Genesys, why we can configure that custom property? and why the platform checks the value? because as I said before if I put, for example "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" I can save the configuration without any problem, but if I put "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" I receive an error.
But, don't worry and thanks for your answer and explanation.
Regards
Pablo
------------------------------
Pablo Barnech
Original Message:
Sent: 09-02-2025 22:34
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Is this for BYOC Cloud or BYOC Premise? For BYOC Cloud there is no option to choose the ciphers that are offered by tge GenesysCloud endpoint. This page details what is offered https://help.mypurecloud.com/articles/tls-trunk-transport-protocol-specification/ Each connection can be controlled by the remote endpoint. Configuring your available ciphers and preference on the remote endpoint (customer device) will control which cipher is selected during the TLS handshake.
------------------------------
Phil Whitener
Genesys - Employees
Original Message:
Sent: 09-02-2025 22:25
From: Pablo Barnech
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Hi Phil,
thanks for your answer. You are totally right, it's a custom trunk property because the customer wants to configure only the ciphers supported by the Cisco CUBE (they don't want to let Genesys to send all its supported ciphers) which is connected to Genesys Cloud and we could configure the other ciphers without any problem, but this in particular ("TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256") gave us an error. So maybe you know if there is any problem with the ciphers itself or maybe there is something wrong with the custom property implementation.
I hope I have been more clear
Again, thanks in advance
Regards
Pablo
------------------------------
Pablo Barnech
Original Message:
Sent: 09-02-2025 22:14
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Hello @Pablo Barnech
What is "trunk_transport_tls_ciphers"? That looks like a Custom trunk property name for configuring Genesys Cloud external trunks; however, tgere is no Genesys Cloud configuration needed for this deprecation. Can you help me understand what you are trying to configure? The change to select particular ciphers should only be needed on your voice device (SBC, PBX, managed trunk, etc)
------------------------------
Phil Whitener
Genesys - Employees
Original Message:
Sent: 09-02-2025 21:30
From: Pablo Barnech
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Hi Phill,
Thanks for the excellent explanation.
I have a question, We are trying to configure a trunk_transport_tls_ciphers but when we put "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", we receive the following error: "Validation error on field 'trunk_transport_tls_ciphers'" and as I understood this is one of the supported ciphers. any idea?
Thanks in advance
Pablo
------------------------------
Pablo Barnech
Original Message:
Sent: 03-25-2025 10:33
From: Phil Whitener
Subject: BYOC Cloud TLS Cipher Deprecation - 2025
Genesys recently announced an upcoming deprecation for BYOC Cloud SIP TLS ciphers. This discussion will be for sharing more information and allowing users to ask questions regarding this deprecation. Deprecation: BYOC Cloud SIP TLS ciphers
In summary, Genesys is planning on removing two existing TLS ciphers from use for BYOC Cloud SIP trunks:
- TLS_RSA_WITH_AES_256_CBC_SHA256, also referred to as AES256-SHA256
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, also referred to as ECDHE-RSA-AES256-SHA384
These ciphers will be removed on a future date. Genesys can track the usage of these ciphers and will communicate with customers using these ciphers to minimize impact.
More details about BYO Cloud TLS capabilities are listed on this page: TLS trunk transport protocol specification
Remote SIP Endpoints
In this discussion a "remote SIP endpoint" represents a device external from the Genesys platform that communicates with Genesys Cloud using BYOC Cloud with the SIP protocol. This device is usually controlled and managed by telephony or network administrators or one of their partners, such as a carrier or service provider. These devices are not controlled or managed within Genesys Cloud. These devices determine the TLS ciphers and priority used for inbound calls into Genesys Cloud.
BYOC Cloud SIP Endpoints
In this discussion, a "BYOC Cloud SIP Endpoint" represents the public SIP endpoints for Genesys Cloud listed on this page: BYOC Cloud Public SIP IP Addresses. These devices are controlled and managed by Genesys and there is no Genesys Cloud configuration required for this deprecation. These devices determine the TLS cipher priority used for outbound calls from Genesys Cloud. Genesys has already lowered the priority of the ciphers that will be deprecated, so they will only be selected if they are the only available ciphers.
GC External Trunk
In this discussion the "GC External Trunk" represents the Genesys Cloud SIP trunk configuration for the BYOC Cloud trunk. This is the Genesys Cloud configuration where the details for the communication between the BYOC Cloud SIP Endpoints and the remote SIP endpoints is defined.
Nothing needs to be changed in your Genesys Cloud configuration - the use of these ciphers is determined by your remote SIP endpoint; most likely a Session Border Controller (SBC), SIP Trunk, or carrier configuration, or carrier device.
It is beneficial for all BYOC Cloud customers to remove these ciphers from their own remote configuration in advance to help the reporting and tracking of the usage of these ciphers.
Inbound Calls (Carrier or SBC to Genesys Cloud)
When secure external inbound calls are dialed and sent to Genesys Cloud using BYOC Cloud the "remote SIP endpoint" starts a TLS negotiation with the Genesys Cloud BYOC Cloud SIP endpoints. During this negotiation, the remote SIP endpoint provides a prioritized list of supported ciphers. The Genesys Cloud BYOC Cloud SIP endpoints will choose the highest prioritized cipher that the remote SIP endpoint offers that Genesys Cloud also supports. If one of the ciphers to be deprecated has the highest priority it will be selected and used. Genesys cannot deprioritize those ciphers, that must be managed by the remote SIP endpoint.
Outbound Calls (Genesys Cloud to Carrier or SBC)
When secure external outbound calls are dialed from Genesys Cloud and sent to your carrier or telephony platform using BYOC Cloud the "BYOC Cloud SIP endpoints" start a TLS negotiation with the remote SIP endpoint. During this negotiation, the BYOC Cloud SIP endpoints provides a prioritized list of supported ciphers; the ciphers that are being deprecated are included, but they have the lowest priority. The remote SIP endpoint will choose the highest prioritized cipher that the BYOC Cloud SIP endpoints offers that the remote SIP endpoint also supports. If the remote SIP endpoint only supports the ciphers to be deprecated then one will be used.
When Genesys reports on cipher usage, any inbound call that is using a cipher to be deprecated indicates that the remote SIP endpoint is prioritizing one of those ciphers. Any outbound calls that is using a cipher to be deprecated indicates that the remote SIP endpoint only supports one of those ciphers.
How to determine the TLS cipher being used
The best way to review the cipher selection is to review a packet capture of the SIP communication. Although with TLS trunks the SIP communication will be encrypted and not visible in the capture, the TLS handshake process provides details that can be derived from the capture. It is important to look at both inbound and outbound calls separately, as negotiating different ciphers for each call direction is common.
Locate the TLS Handshake Client Hello request message, expand the Client Hello and the nested Cipher Suites list. This is the prioritized list the client sends to the server list all of the client's supported ciphers and the order it prefers for them to be selected (higher in list is higher priority). The below list is the prioritized list that the Genesys Cloud BYOC SIP endpoints send on outbound calls. Note that the two ciphers being deprecated (0x003d) and (0xc028) receive the lowest priority; they will only be chosen if the server does not support any of the other ciphers.
#Telephony
------------------------------
Phil Whitener
Genesys Employee
------------------------------