The US National Security Agency (NSA) issued a security statement [PDF] this month urging system administrators in federal services and furthermore to stop using old and outdated TLS protocols.
"The NSA recommends using only TLS 1.2 or TLS 1.3 and not using SSL 2.0, SSL 3.0, TLS 1.0 and TLS 1.1," the agency said.
“Using outdated encryption provides a false sense of security because it appears to be sensitively protected data, even though it's not really like that."
Even though the service recommends TLS 1.2 and TLS 1.3, the NSA warns you not to configure these two protocols with weak cryptographic parameters.
“The particularly weak encryption algorithms in TLS 1.2 are defined as NULL, RC2, RC4, DES, IDEA, and TDES/3DES. The cryptographic suites that use these algorithms they should not be used", the service continues.
"TLS 1.3 removes these encryption suites, but implementations that support both TLS 1.3 and TLS 1.2 should be checked for obsolete encryption suites."
The U.S. Department of Homeland Security has released a list of tools on her GitHub profile to help system administrators detect systems on their internal networks that still use outdated TLS protocols
The NSA statement, released on January 5, was repeated yesterday by its counterpart in the Netherlands, the National Cyber Security Center in the Netherlands.
In a similar alert [PDF], the Dutch NCSC also recommends to all Dutch government agencies and private companies to move to TLS 1.3.
In the middle of 2020, the major browsers stopped supporting TLS 1.0 and TLS 1.1, citing security reasons. In March 2020, security company Netcraft reported that some 850.000 websites were still using TLS 1.0 and TLS 1.1 to encrypt traffic with HTTPS, a number that has since declined slowly.