Summary
Acunetix 360 detected that a deprecated, insecure transportation security protocol (TLS 1.1) is supported by your web server.
TLS 1.1 will be considered as deprecated by major web browsers (i.e. Chrome, Firefox, Safari, Edge, Internet Explorer) starting in 2020.
Impact
Your website will be inaccessible due to web browser deprecation.
Actions To Take
We recommended to disable TLS 1.1 and replace it with TLS 1.2 or higher. See Remedy section for more details.
Remediation
Configure your web server to disallow using weak ciphers. You need to restart the web server to enable changes.
- For Apache, adjust the SSLProtocol directive provided by the mod_ssl module. This directive can be set either at the server level or in a virtual host configuration.
SSLProtocol +TLSv1.2
- For Nginx, locate any use of the directive ssl_protocols in the
nginx.conf
file and removeTLSv1.1
.ssl_protocols TLSv1.2;
- For Microsoft IIS, you should make some changes on the system registry. Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on your computer.
- Click on Start and then Run, type
regedt32
orregedit
, and then click OK. - In Registry Editor, locate the following registry key or create if it does not exist:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocolsTLS 1.1
- Locate a key named
Server
or create if it doesn't exist. - Under the
Server
key, locate a DWORD value namedEnabled
or create if it doesn't exist and set its value to "0". - For lighttpd, put the following lines in your configuration file:
ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable" ssl.openssl.ssl-conf-cmd = ("Protocol" => "-TLSv1.1, -TLSv1, -SSLv3") # v1.4.48 or up ssl.ec-curve = "secp384r1"