{"id":7342,"date":"2019-08-05T23:15:54","date_gmt":"2019-08-06T06:15:54","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=7342"},"modified":"2025-06-13T19:26:47","modified_gmt":"2025-06-14T02:26:47","slug":"cipher-suites-in-couchbase-6-5","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/cipher-suites-in-couchbase-6-5\/","title":{"rendered":"Suites de cifrado en Couchbase Server 6.5"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Para muchos, \"Criptograf\u00eda\" es el peque\u00f1o icono del candado verde junto a la direcci\u00f3n web de sus sitios favoritos, y para otros, puede que recuerden las vulnerabilidades TLS que han golpeado en los \u00faltimos a\u00f1os. <\/span><span style=\"font-weight: 400;\">Los datos son el oro digital de hoy en d\u00eda, y en su af\u00e1n por robar datos cr\u00edticos, los piratas inform\u00e1ticos est\u00e1n ideando formas ingeniosas de robar informaci\u00f3n. <\/span><span style=\"font-weight: 400;\">Teniendo en cuenta el siempre cambiante panorama de ataques, Couchbase Server 6.5 a\u00f1ade una nueva forma de configurar f\u00e1cilmente las suites de cifrado del servidor. En este blog, repasaremos los conceptos b\u00e1sicos de los cifradores y explicaremos c\u00f3mo puedes configurar Couchbase para utilizar los \u00faltimos y mejores cifradores.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<h4><span style=\"font-weight: 400;\"><br \/>\n<\/span><strong>Conceptos b\u00e1sicos de las suites de cifrado TLS<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Un conjunto de cifrado es b\u00e1sicamente un conjunto completo de m\u00e9todos (tambi\u00e9n conocidos como algoritmos) necesarios para proteger una conexi\u00f3n de red mediante TLS (Transport Layer Security). Cada conjunto de cifrado tiene su propia notaci\u00f3n distinta, como se muestra a continuaci\u00f3n -<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384<\/b><b><br \/>\n<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Ahora, vamos a desglosar eso...<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>TLS<\/b><span style=\"font-weight: 400;\"> indica que se utilizar\u00e1 el protocolo TLS para establecer una comunicaci\u00f3n segura. Recuerde que un protocolo simplemente define c\u00f3mo deben utilizarse los algoritmos.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>ECDHE<\/b><span style=\"font-weight: 400;\"> indica que se utilizar\u00e1 la curva el\u00edptica Diffie-Hellman para el intercambio de claves. As\u00ed es como se intercambiar\u00e1n las claves entre el cliente y el servidor para cifrar y descifrar los datos.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>ECDSA<\/b><span style=\"font-weight: 400;\"> es el algoritmo, en este caso el Algoritmo de Firma Digital de Curva El\u00edptica, que se utiliza para crear una firma digital para la autenticaci\u00f3n.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>AES_256_CBC<\/b><span style=\"font-weight: 400;\"> indica que se utilizar\u00e1 el cifrado AES con una clave de 256 bits para cifrar el mensaje, y <\/span><b>CBC <\/b><span style=\"font-weight: 400;\">indica que el modo ser\u00e1 encadenamiento de bloques cifrados.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>SHA384<\/b><span style=\"font-weight: 400;\"> indica que el algoritmo hash utilizado para la verificaci\u00f3n del mensaje (MAC) y en este ejemplo es SHA2 con una clave de 384 bits.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">El protocolo TLS Handshake es responsable de la negociaci\u00f3n del conjunto de cifrado entre el cliente y el servidor (v\u00e9ase \"Server Hello\"), la autenticaci\u00f3n del servidor y, opcionalmente, del cliente, y el intercambio de claves secretas (v\u00e9anse las flechas verdes a continuaci\u00f3n).<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7443\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2019\/08\/cipher-suites-300x235.png\" alt=\"\" width=\"453\" height=\"355\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/cipher-suites-300x235.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/cipher-suites-1024x802.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/cipher-suites-768x602.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/cipher-suites-20x16.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/cipher-suites.png 1126w\" sizes=\"auto, (max-width: 453px) 100vw, 453px\" \/><\/p>\n<p><strong>Figura : Interacci\u00f3n Cliente-Servidor durante el Handshake TLS<\/strong><\/p>\n<h4><span style=\"font-weight: 400;\"><br \/>\n<\/span><strong>Configuraci\u00f3n de suites de cifrado en Couchbase 6.5<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Por defecto (es decir, sin especificar expl\u00edcitamente los suites de cifrado), Couchbase Server elige el cifrado com\u00fan m\u00e1s fuerte entre el cliente y el servidor. Con Couchbase Server 6.5, puedes decirle a Couchbase qu\u00e9 suites de cifrado usar. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Como se muestra en el siguiente ejemplo, configuramos los conjuntos de cifrado en Couchbase para utilizar TLS_RSA_WITH_AES_128_CBC_SHA. Este conjunto de cifrado se utiliza en todos los servicios de Couchbase Server, incluyendo datos, consultas, \u00edndices, texto completo y an\u00e1lisis.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\"># .\/couchbase-cli setting-security -cipher-suites TLS_RSA_WITH_AES_128_CBC_SHA -c localhost:8091 -u Administrator -p password -set<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u00c9XITO: Configuraci\u00f3n de seguridad actualizada<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\"># .\/couchbase-cli setting-security -c localhost:8091 -u Administrador -p contrase\u00f1a -get<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><i><span style=\"font-weight: 400;\">{\"disableUIOverHttp\": false, \"disableUIOverHttps\": false, \"cipherSuites\": [\"TLS_RSA_WITH_AES_128_CBC_SHA\"], \"tlsMinVersion\": \"tlsv1.2\", \"honorCipherOrder\": true}<\/span><\/i><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><strong>Verificaci\u00f3n del uso del cifrado<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Para verificar que se utiliza el cifrado, podemos conectarnos a cualquiera de los <\/span><a href=\"https:\/\/docs.couchbase.com\/server\/current\/install\/install-ports.html\"><span style=\"font-weight: 400;\">Puertos SSL<\/span><\/a><span style=\"font-weight: 400;\"> en Couchbase. En el ejemplo siguiente, estamos conectados al puerto 11207 (el puerto de datos por el que los clientes de Couchbase se conectan al servidor).<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>openssl s_client -conectar localhost:11207<\/b><\/p>\n<p><span style=\"font-weight: 400;\">CONECTADO(00000003)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8212;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cadena de certificados<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a00 s:\/CN=127.0.0.1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0i:\/CN=Servidor Couchbase de182d2a<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a01 s:\/CN=Couchbase Server de182d2a<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0i:\/CN=Servidor Couchbase de182d2a<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8212;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certificado del servidor<\/span><\/p>\n<p><span style=\"font-weight: 400;\">--COMENZAR CERTIFICADO--<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MIIDADCCAeigAwIBAgIIFbB+nPd+hWIwDQYJKoZIhvcNAQELBQAwJDEiMCAGA1UE<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AxMZQ291Y2hiYXNlIFNlcnZlciBkZTE4MmQyYTAeFw0xMzAxMDEwMDAwMDBaFw00<\/span><\/p>\n<p><span style=\"font-weight: 400;\">OTEyMzEyMzU5NTlaMBQxEjAQBgNVBAMTCTEyNy4wLjAuMTCCASIwDQYJKoZIhvcN<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AQEBBQADggEPADCCAQoCggEBAL7PaNB0n1vxDsg6Z4ydBk7HjlEjzItIGVp6svgF<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2A1XW98bIl34D6ZsWHsyj+i9+Xb3saY8HTD8f83QtUkGpve0AQGCHxFE1Dx0Eb2t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">hMGwSWiL4DAiufa42UGmgJ008D70hpdQS1\/ow5wZ1kNmqmHdjzG2wGrdJEGFhwzS<\/span><\/p>\n<p><span style=\"font-weight: 400;\">lka+HdrDCaQIT6jvtnT3udO0R6yRFxjveEQ5lFX\/P4tZeyIWglTT0muRxcxI\/7Ln<\/span><\/p>\n<p><span style=\"font-weight: 400;\">nvUQgoLRta59hxiK1PXQczjP1KPls8OdWnap4HNIbi3WOim9hk\/Vn4R6BSvU1N9W<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Md4WkXw6WgzcPz1khdQTsZzDZbQNV0fI9fcM8nGoh6A1R7sCAwEAAaNGMEQwDgYD<\/span><\/p>\n<p><span style=\"font-weight: 400;\">VR0PAQH\/BAQDAgWgMBMGA1UdJQMMAoGCCsGAQUFBwMBMAwGA1UdEwEB\/wQCMAAw<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DwYDVR0RBAgwBocEfwAAATANBgkqhkiG9w0BAQsFAAOCAQEACiMJY3512tT+rEFJ<\/span><\/p>\n<p><span style=\"font-weight: 400;\">4xe0zGIoJi7ebXz1O8w8a2NBKjwWeZ2oCco0CxILfDn1EPH9NBZsiQS7w9OGz7VO<\/span><\/p>\n<p><span style=\"font-weight: 400;\">pwSVrt6\/jRIAAqnFxSUZpKiZ\/avNK5kpfufebxaA4ZQzrW4\/lePsBRcRl3ENWJup<\/span><\/p>\n<p><span style=\"font-weight: 400;\">OsE8hD4Xv\/LQHnZxZlbq8gQv8ZiJqsi8bRoEML4A4DgTmgvTYgT0XIp9V65H9zZ\/<\/span><\/p>\n<p><span style=\"font-weight: 400;\">jJEymoUx9eidAdfVo+l8PlE7YgRsrP9f7y5tDARAAmmAmL2mgUmzxqe49Hp8MPDl<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ocTLZm1ryT+g1xvL\/EuuLOACUecInBnWSmzJep7Vw0jzqR92YWht6rM3NGfwNyzT<\/span><\/p>\n<p><span style=\"font-weight: 400;\">3hz7ZA==<\/span><\/p>\n<p><span style=\"font-weight: 400;\">--FIN DEL CERTIFICADO--<\/span><\/p>\n<p><span style=\"font-weight: 400;\">subject=\/CN=127.0.0.1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">emisor=\/CN=Couchbase Server de182d2a<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8212;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No se env\u00edan nombres de CA de certificados de cliente<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8212;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSL handshake ha le\u00eddo 1881 bytes y escrito 631 bytes<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8212;<\/span><\/p>\n<p><b>Nuevo, TLSv1\/SSLv3, Cifrado es <\/b><b>AES128-SHA<\/b><\/p>\n<p><span style=\"font-weight: 400;\">La clave p\u00fablica del servidor es de 2048 bits<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Se admite la renegociaci\u00f3n segura<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compresi\u00f3n: NINGUNA<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Expansi\u00f3n: NINGUNA<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><strong>Conclusi\u00f3n<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Con las suites de cifrado disponibles en Couchbase Server 6.5, puedes actualizar continuamente tu instancia de Couchbase para utilizar los \u00faltimos y mejores cifrados para mantenerte seguro. Esperamos que hayas disfrutado de este blog, y como siempre, esperamos tus comentarios.  Prueba Couchbase Server y comprueba todas las nuevas caracter\u00edsticas, puedes descargar Couchbase 6.5.<\/span><\/p>\n<h4 class=\"p1\"><b>Recursos<\/b><\/h4>\n<p class=\"p1\"><i>Descargar<\/i><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/www.couchbase.com\/blog\/es\/downloads\/?family=server&amp;product=couchbase-server-developer\">Descargar Couchbase Server 6.5<\/a><\/span><\/p>\n<p class=\"p1\"><i>\u00a0<\/i><i>Documentaci\u00f3n<\/i><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/docs.couchbase.com\/server\/6.5\/release-notes\/relnotes.html\">Notas de la versi\u00f3n de Couchbase Server 6.5<\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/docs.couchbase.com\/server\/6.5\/introduction\/whats-new.html\">Novedades de Couchbase Server 6.5<\/a><\/span><\/p>\n<p class=\"p1\"><i>Blogs<\/i><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/www.couchbase.com\/blog\/es\/announcing-couchbase-server-6-5-0-beta-whats-new-and-improved\/\">Blog: Anuncio de Couchbase Server 6.5 - Novedades y mejoras<\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/www.couchbase.com\/blog\/es\/couchbase-brings-distributed-multi-document-acid-transactions-to-nosql\/\">Blog: Couchbase lleva las Transacciones Distribuidas Multidocumento ACID a NoSQL<\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/www.couchbase.com\/blog\/es\/tag\/6-5\/\"><b>Todos los blogs de 6.5<\/b><\/a><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>For many, \u201cCryptography\u201d is the little green lock icon next to the web address of their favorite websites, and for others, they might recall the TLS vulnerabilities that have hit in recent years. Data is today\u2019s digital gold, and in [&hellip;]<\/p>","protected":false},"author":6588,"featured_media":7450,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1814,1815,1821,1816,1813],"tags":[2378,1666],"ppma_author":[9064],"class_list":["post-7342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-design","category-best-practices-and-tutorials","category-couchbase-architecture","category-couchbase-server","category-security","tag-6-5","tag-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cipher Suites in Couchbase Server 6.5 - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/cipher-suites-in-couchbase-6-5\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cipher Suites in Couchbase Server 6.5\" \/>\n<meta property=\"og:description\" content=\"For many, \u201cCryptography\u201d is the little green lock icon next to the web address of their favorite websites, and for others, they might recall the TLS vulnerabilities that have hit in recent years. Data is today\u2019s digital gold, and in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/cipher-suites-in-couchbase-6-5\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-06T06:15:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T02:26:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"553\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/\"},\"author\":{\"name\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6\"},\"headline\":\"Cipher Suites in Couchbase Server 6.5\",\"datePublished\":\"2019-08-06T06:15:54+00:00\",\"dateModified\":\"2025-06-14T02:26:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/\"},\"wordCount\":819,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg\",\"keywords\":[\"6.5\",\"Encryption\"],\"articleSection\":[\"Application Design\",\"Best Practices and Tutorials\",\"Couchbase Architecture\",\"Couchbase Server\",\"Security\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/\",\"name\":\"Cipher Suites in Couchbase Server 6.5 - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg\",\"datePublished\":\"2019-08-06T06:15:54+00:00\",\"dateModified\":\"2025-06-14T02:26:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg\",\"width\":1400,\"height\":553,\"caption\":\"Jespsen Code Image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cipher Suites in Couchbase Server 6.5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6\",\"name\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/459272ec41e39279e1f7784a97a6b106\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g\",\"caption\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\"},\"description\":\"Chaitra Ramarao is a Senior Product Manager at Couchbase, NoSQL database company, leading databases tooling, cross datacenter replication and partner integrations. Her prior gigs include data analytics product management for Kaiser Permanente and software development for Hewlett Packard. She has a Bachelors degree in ECE and a Masters from Carnegie Mellon in Engineering &amp; Technology Innovation Management.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/chaitra\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cipher Suites in Couchbase Server 6.5 - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/cipher-suites-in-couchbase-6-5\/","og_locale":"es_MX","og_type":"article","og_title":"Cipher Suites in Couchbase Server 6.5","og_description":"For many, \u201cCryptography\u201d is the little green lock icon next to the web address of their favorite websites, and for others, they might recall the TLS vulnerabilities that have hit in recent years. Data is today\u2019s digital gold, and in [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/es\/cipher-suites-in-couchbase-6-5\/","og_site_name":"The Couchbase Blog","article_published_time":"2019-08-06T06:15:54+00:00","article_modified_time":"2025-06-14T02:26:47+00:00","og_image":[{"width":1400,"height":553,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg","type":"image\/jpeg"}],"author":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/"},"author":{"name":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6"},"headline":"Cipher Suites in Couchbase Server 6.5","datePublished":"2019-08-06T06:15:54+00:00","dateModified":"2025-06-14T02:26:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/"},"wordCount":819,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg","keywords":["6.5","Encryption"],"articleSection":["Application Design","Best Practices and Tutorials","Couchbase Architecture","Couchbase Server","Security"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/","url":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/","name":"Cipher Suites in Couchbase Server 6.5 - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg","datePublished":"2019-08-06T06:15:54+00:00","dateModified":"2025-06-14T02:26:47+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-alternative-2.jpg","width":1400,"height":553,"caption":"Jespsen Code Image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/cipher-suites-in-couchbase-6-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cipher Suites in Couchbase Server 6.5"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6","name":"Chaitra Ramarao, Sr. Director de producto, Couchbase Inc.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/459272ec41e39279e1f7784a97a6b106","url":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","caption":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc."},"description":"Chaitra Ramarao es gestora s\u00e9nior de productos en Couchbase, una empresa de bases de datos NoSQL que lidera las herramientas de bases de datos, la replicaci\u00f3n entre centros de datos y las integraciones de socios. Anteriormente trabaj\u00f3 en la gesti\u00f3n de productos de an\u00e1lisis de datos para Kaiser Permanente y en el desarrollo de software para Hewlett Packard. Es licenciada en ECE y tiene un m\u00e1ster de Carnegie Mellon en Ingenier\u00eda y Gesti\u00f3n de la Innovaci\u00f3n Tecnol\u00f3gica.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/chaitra\/"}]}},"authors":[{"term_id":9064,"user_id":6588,"is_guest":0,"slug":"chaitra","display_name":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","author_category":"","last_name":"Ramarao, Sr. Product Manager, Couchbase Inc.","first_name":"Chaitra","job_title":"","user_url":"","description":"Chaitra Ramarao es gestora s\u00e9nior de productos en Couchbase, una empresa de bases de datos NoSQL que lidera las herramientas de bases de datos, la replicaci\u00f3n entre centros de datos y las integraciones de socios. Anteriormente trabaj\u00f3 en la gesti\u00f3n de productos de an\u00e1lisis de datos para Kaiser Permanente y en el desarrollo de software para Hewlett Packard. Es licenciada en ECE y tiene un m\u00e1ster de Carnegie Mellon en Ingenier\u00eda y Gesti\u00f3n de la Innovaci\u00f3n Tecnol\u00f3gica."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/7342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/6588"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=7342"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/7342\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/7450"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=7342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=7342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=7342"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=7342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}