Minimum Encryption Strength.
You should set the minimim encryption strength that your server accepts to at least 128-bit, or preferably higher.
For example on a venerable old Tomcat 4 server you can edit the following ciphers entry in the server.xml file:
<!-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --> <Connector acceptCount="100" className="org.apache.coyote.tomcat4.CoyoteConnector" debug="0" disableUploadTimeout="true" enableLookups="false" maxProcessors="150" minProcessors="5" port="8443" scheme="https" secure="true" useURIValidationHack="false" ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA"> <Factory className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory" clientAuth="false" keystoreFile="E:/dexterra/ConcertServer/platform-dist/server/conf/security/jdex.jks" keystorePass="password" protocol="TLS"/> </Connector>