You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add Modern cipher suites and deprecate legacy TLS (#1283)
Update the :strong and :compatible cipher suite upgrades to align with modern
security standards, prioritizing TLS 1.3 and 1.2. Remove support for the insecure
TLS 1.0 and 1.1 protocols in accordance with RFC 8996.
**The cipher suites were last updated on 2018-JUN-14.**
136
+
chosen and related configuration come from the [Transport Layer Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Security_Cheat_Sheet.html)
137
+
138
+
The **Strong** cipher suite supports TLSv1.3 as recommended by the Transport
139
+
Layer Security Cheat Sheet. General purpose web applications should default to
140
+
TLSv1.3 with ALL other protocols disabled.
141
+
142
+
The **Compatible** cipher suite supports TLSv1.2 and TLSv1.3. This
143
+
suite provides strong security while maintaining compatibility with a wide
144
+
range of modern clients.
145
+
146
+
Legacy protocols TLSv1.1 and TLSv1.0 are officially deprecated by
147
+
[RFC 8996](https://www.rfc-editor.org/rfc/rfc8996.html) and are
148
+
considered insecure.
149
+
150
+
[Test your ssl configuration](https://ssl-config.mozilla.org/)
151
+
152
+
**The cipher suites were last updated on 2025-AUG-28.**
0 commit comments