You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
Next: Root
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
As industry security standards such as TLS and its associated ciphers evolve, Atlassian will deprecate support for older, less secure protocols and ciphers as part of our quest to better secure Atlassian cloud products.
On Feb 15, 2021, we will be dropping support for some legacy cryptographic ciphersuites that are used for encrypting data in-transit between our customers and our cloud products.
These changes will:
Drop support for ciphersuites utilizing the Cipher-Block-Chaining (CBC) mode of operation
Drop support for ciphersuites utilizing the SHA1 hash algorithm
Drop support for ciphersuites that do not provide perfect forward secrecy (PFS)
The updated TLS configuration is designed to ensure that data in-transit between customers and Atlassian’s cloud products continue to remain safe and secure well into the future while also maintaining compatibility with a broad range of clients.
The following table lists the ciphers that will be supported by Atlassian products after this change.
Cipher Suite & Protocol |
atlassian.com, Atlassian Marketplace, Trello, Halp |
Bitbucket Cloud, Confluence Cloud, Jira Cloud, Jira Service Desk |
Statuspage |
TLS_AES_128_GCM_SHA256 TLS 1.3 |
|
|
|
TLS_AES_256_GCM_SHA384 TLS 1.3 |
|
|
|
TLS_CHACHA20_POLY1305_SHA256 TLS 1.3 |
|
|
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS 1.2 |
|
|
|
Corey Johnston
8 comments