

Next, we highly recommend updating all of your applications to use the. If you’re running Server 2008 or 2012, TLS 1.2 support was not available by default, so you’ll want to make sure you have the relevant updates installed in order to support TLS 1.2. If you’re running Server 2012 R2 or 2016, TLS 1.2 should already be installed and default. NET users, first off, you’ll want to ensure your server supports TLS 1.2. If you don't see the above output, then you’ll want to start by updating Apache/Nginx and OpenSSL and/or updating your nf or Apache configuration files to enable TLSv1.2. As long as you get a similar output showing TLSv1.2, then so are you! It’s a simple process, but we’ve gone ahead and listed how you can check your TLS version with Mailgun below.Īs you can see in the output above, supports TLSv1.2, so I’m good to go. If you aren’t sure if your environment supports TLS 1.2, now is an excellent time to double-check. If you’re already utilizing TLS 1.2 – great! Doing these sorts of maintenance updates is imperative, so getting ahead saves you some time in the future. While Mailgun isn’t the first or the last company to announce their TLS 1.0 and 1.1 support deprecation, now is the perfect time to check and make sure your environment supports 1.2 so you don’t experience any downtime. In March 2020, all four major internet browser providers ended their support of TLS 1.0 and 1.1 – which was a major push in the right direction for better security. When it comes to TLS deprecation, many other tech companies have chosen to sunset these old protocols as well. That said, it’s been a long time coming for companies to drop their support of 1.0 and 1.1. TLS 1.0 came out in 1999 and has had many issues with heartbleed, POODLE, CRIME, etc. As such, these protocols are updated over time to patch out these vulnerabilities and keep users safe. The older TLS versions are riddled with security vulnerabilities.
