Available article translations:

SSL accepted versions and cipher strength in Parallels Remote Application Server

  • Parallels Remote Application Server 16.2
  • Parallels Remote Application Server 15.5
  • Parallels Remote Application Server 15.0


Version 14 of Parallels Remote Application Server introduced the ability to enforce and use specific versions of SSL, as well as allowing custom configuration of cipher strength.

This article explains how to configure the cipher strength, when a Gateway SSL or Direct SSL connection from a Remote Application Server Client is established against a Secure Client Gateway.

The configuration is available in Secure Client Gateway Properties and may be found under the SSL/TLS tab:


In version 14, the following accepted SSL versions are available:

  • TLS v1.2 Only (Strong)
  • TLS v1.1 - TLS v1.2
  • TLS v1 - TLS v1.2
  • SSL v3 - TLS v1.2
  • SSL v2 - TLS v1.2 (Weak)

These options allow an administrator to choose the preferred version and protect against vulnerabilities discovered in older versions of SSL.

In addition, it is possible to configure cipher strength. All the available options are based on OpenSSL standards, documented here.

As mentioned in the OpenSSL documentation, the cipher strength options provided within the Remote Application Server are as follows:

  • Low: low encryption cipher suites, currently those that use 64 or 56-bit encryption algorithms but exclude export cipher suites.
  • Medium: medium encryption cipher suites, currently some of those that use 128-bit encryption.
  • High: high encryption cipher suites, currently those with key lengths larger than 128 bits, and some cipher suites with 128-bit keys.

An additional configurable part is inputting a custom cipher string. It is possible to check the current cipher strength in the Information pane > Site Information tab:


A cipher string can be constructed by linking different cipher parameters from the list available here.

For example, the following cipher: !SSLv2:ALL:!DH:!ADH:!EDH:!MD5:!EXPORT:@SPEED has the following parameters defined:

  • !SSLv2: Do not use SSL version 2
  • ALL: Use all SSL ciphers in the default SSL stack
  • !DH: Do not use DH ciphers
  • !ADH: Do not use ADH ciphers
  • !EDH: Do not use EDH ciphers
  • !MD5: Do not use MD5 ciphers
  • !EXPORT: Do not use EXPORT grade (weak) ciphers
  • @SPEED: Order the cipher preference by speed

Documentation on ciphers and their possible configurations is available here:

As of version 14.1, the pre-defined ciphers will also be visible in the Secure Client Gateway Properties.

Detailed information about Cipher Suites is available in this article.

1d70d1f9c41d01c5f7202a4290e434e1 17333b9b93206d7dd8962eace050749d e9df64665e7346a300c1e6d8fac71c28 8c1bd7ac0efc8c4ffbb530ad3ab16fae 4a54b6f3e325683094bb814b9bc24cd3

Was this article helpful?
Tell us how we may improve it.
Yes No