PJM retires obsolete TLS protocols
Today, Monday, December 13 from 6:00 – 8:00 p.m. EPT (1800-2000 hours) PJM is retiring obsolete TLS protocol configurations in PJM internet-facing website. As part of this effort, PJM aims to stop supporting TLS 1.0 or TLS 1.1 protocols and certain insecure ciphers, such as 3DES cipher and the TLS_RSA_* ciphers in TLS 1.2. TLS, the most widely deployed security protocol, encrypts data sent over the Internet to ensure private information between two endpoints is safe from hackers. Over time, new attacks against TLS and the encryption algorithms it uses have been discovered. As a result, network connections with obsolete protocols are at an elevated risk of exploitation. Today the following will be retired: messages.pjm.com secureshare.pjm.com/sftp.pjm.com The schedule for the remaining internet-facing applications will be announced at a later date. The Weak Encryption Remediation Guide may be accessed for information on how your organization’s technical contacts may update the non-compliant source device (browser or browser-less) deployments and the obsolete TLS protocol configurations can be updated expeditiously or disabled. Questions regarding weak encryption connections may be directed to Zeenath Fernandes or PJM Member Relations. For assistance or questions with market changes, Adapt2 Support may also be contacted.