You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add Modern cipher suites and deprecate legacy TLS. Update the :strong and
:compatible cipher suite upgrades to align with modern security standards,
prioritizing TLS 1.3 and 1.2.
Remove support for the insecure TLS 1.0 and 1.1 protocols in accordance with
RFC 8996.
New tests verify the correct application of these updated configurations.
**The cipher suites were last updated on 2018-JUN-14.**
136
+
chosen and related configuration come from the [Transport Layer Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Security_Cheat_Sheet.html)
137
+
138
+
[OWASP Cipher String Cheat
139
+
Sheet is DEPRECATED](https://www.owasp.org/index.php/TLS_Cipher_String_Cheat_Sheet)
140
+
141
+
The **Strong** cipher suite supports TLSv1.3 as recommended by the Transport
142
+
Layer Security Cheat Sheet. General purpose web applications should default to
143
+
TLSv1.3 with ALL other protocols disabled.
144
+
145
+
The **Compatible** cipher suite supports TLSv1.2 and TLSv1.3. This
146
+
suite provides strong security while maintaining compatibility with a wide
147
+
range of modern clients.
148
+
149
+
Legacy protocols TLSv1.1 and TLSv1.0 are officially deprecated by
150
+
[RFC 8996](https://www.rfc-editor.org/rfc/rfc8996.html) and are
151
+
considered insecure.
152
+
153
+
[Test your ssl configuration](https://ssl-config.mozilla.org/)
154
+
155
+
**The cipher suites were last updated on 2025-AUG-28.**
0 commit comments