Bug report: Default TLS version needs to be greater then 1.1
As of the latest upgrade of Safari Apple now gives a warning dialog if a
site uses https with TLS 1.0 or 1.1 (as per the NSA directive to
discontinue all use of said versions).
Tomcat 9.0.35 (the latest available via ports on FreeBSD) defaults to TLS
1.1 when SSLProtocol="TLS". As per the above warning in Safari and the
reason for it shouldn't Tomcat default to 1.2+ (I fixed it by adding
sslEnabledProtocols="TLSv1.2" which as far I was able to determine is not
documented anywhere except for the following on StackOverflow:
Re: Bug report: Default TLS version needs to be greater then 1.1
On 1/12/21 14:00, Aryeh Friedman wrote:
> As of the latest upgrade of Safari Apple now gives a warning dialog if a
> site uses https with TLS 1.0 or 1.1 (as per the NSA directive to
> discontinue all use of said versions).
No directive from the US NSA. It's a recommendation. Apple and other
browser vendors apply their own policies for this kind of thing. As of
March 2020 (last year!), Firefox *disabled* TLSv1 and TLSv1.1 by
default, then backed-off because apparently COVID-19 interferes with
TLSv1.2 handshakes. Google deprecated those protocols a few months
earlier and now they are disabled.
> Tomcat 9.0.35 (the latest available via ports on FreeBSD) defaults to TLS
> 1.1 when SSLProtocol="TLS".
No, it doesn't. The default is to support TLSv1, TLSv1.1, TLSv1.2, and
The sslEnabledProtocols attribute on a <Connector> was replaced a long
time ago by the "protocols" attribute on an <SSLHostConfig>. It shoudl
continue to work, but you are encouraged to use the new-style
configuration as it's much more flexible and more obvious what's happening.
Note that the client is in full control of the client "hello" portion of
the TLS handshake where it advertises the protocol versions it wants to
use. If it doesn't advertise "TLSv1.2" then you probably won't get that
What you have done is disable versions below TLSv1.2, which is why
Safari doesn't complain. My guess is that Safari tries the lowest
protocol it understands first instead of trying to connect using the
latest version first, and you see this error.
To answer your question/statement about changing the default "protocols"
to be TLSv1.2 (and not include the other protocols) in Tomcat, this is a
choice for administrators to make. Changing the default may cause a lot
of damage downstream.
That said, we should probably change the default for Tomcat 10+ to be
"TLSv1.2". I'll raise that on the dev@ list.
To unsubscribe, e-mail: [hidden email] For additional commands, e-mail: [hidden email]