As industry security standards such as TLS and its associated ciphers evolve, Atlassian will deprecate support for older, less secure protocols and ciphers as part of our quest to better secure Atlassian cloud products.
On Feb 15, 2021, we will be dropping support for some legacy cryptographic ciphersuites that are used for encrypting data in-transit between our customers and our cloud products.
These changes will:
Drop support for ciphersuites utilizing the Cipher-Block-Chaining (CBC) mode of operation
Drop support for ciphersuites utilizing the SHA1 hash algorithm
Drop support for ciphersuites that do not provide perfect forward secrecy (PFS)
The updated TLS configuration is designed to ensure that data in-transit between customers and Atlassian’s cloud products continue to remain safe and secure well into the future while also maintaining compatibility with a broad range of clients.
The following table lists the ciphers that will be supported by Atlassian products after this change.
Cipher Suite & Protocol |
atlassian.com, Atlassian Marketplace, Trello, Halp |
Bitbucket Cloud, Confluence Cloud, Jira Cloud, Jira Service Desk |
Statuspage |
TLS_AES_128_GCM_SHA256 TLS 1.3 |
|
|
|
TLS_AES_256_GCM_SHA384 TLS 1.3 |
|
|
|
TLS_CHACHA20_POLY1305_SHA256 TLS 1.3 |
|
|
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS 1.2 |
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS 1.2 |
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS 1.2 |
|
|
|
Corey Johnston
8 comments