1 Weak TLS Versions and Cipher Suites
TLS security depends on both the protocol version and the cipher suites negotiated. Legacy configurations expose HTTPS traffic to practical attacks.
Deprecated protocol versions:
- SSL 2.0 / SSL 3.0: Broken, vulnerable to POODLE, BEAST. Must be disabled.
- TLS 1.0 / TLS 1.1: Deprecated by RFC 8996. Vulnerable to known attacks. Disable.
- TLS 1.2: Acceptable with strong cipher suites.
- TLS 1.3: Recommended. Removes weak cipher options entirely.
Weak cipher suites to disable:
- RC4 — broken stream cipher (NOMORE attack)
- DES / 3DES — short keys, SWEET32 attack
- NULL cipher — no encryption
- EXPORT ciphers — deliberately weakened
- Anonymous DH — no server authentication
Check your server with:
nmap --script ssl-enum-ciphers -p 443 example.com
openssl s_client -connect example.com:443 -tls1
# Or use Qualys SSL Labs online test