You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis
14
14
15
-
There's an industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses. They also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
15
+
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in October, 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
16
16
17
-
As a part of this effort, we'll be making the following changes to Azure Cache for Redis:
17
+
TLS versions 1.0 and 1.1 also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
18
18
19
-
***Phase 1:** We'll configure the default minimum TLS version to be 1.2 for newly created cache instances (previously, it was TLS 1.0). Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
20
-
***Phase 2:** We'll stop supporting TLS 1.1 and TLS 1.0. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service is expected to be available while we migrate it to support only TLS 1.2 or later.
19
+
> [!IMPORTANT]
20
+
> On October 1, 2024, the TLS 1.2 requirement will be enforced.
21
+
>
22
+
>
23
+
24
+
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
25
+
26
+
-_Phase 1_: Azure Cache for Redis changes the default minimum TLS version to TLS 1.2 for newly created cache instances. Previously, it was TLS 1.0. Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
27
+
-_Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting August 1,2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service is expected to be available while it is migrated to support only TLS 1.2 or later. Read further sections to know how to determine if your applications are affected.
21
28
22
-
> [!WARNING]
23
-
> Phase 2 is postponed because of COVID-19. We strongly recommend that you begin planning for this change now and proactively update clients to support TLS 1.2 or later.
24
-
>
29
+
| Date | Description |
30
+
|-------- |-------------|
31
+
| September 2023 | TLS 1.0/1.1 retirement announcement |
32
+
| March 1, 2024 | Beginning March 1, 2024, you will not be able to set the Minimum TLS version for any cache to 1.0 or 1.1.
33
+
| September 30, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2
34
+
| October 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances will reject connections using TLS 1.0 or 1.1.
25
35
26
36
> [!IMPORTANT]
27
-
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash as the Enterprise tiers support TLS 1.2 only.
37
+
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
28
38
>
29
39
30
-
As part of this change, we'll also remove support for older cypher suites that aren't secure. Our supported cypher suites are restricted to the following suites when the cache is configured with a minimum of TLS 1.2:
40
+
As part of this change, Azure Cache for Redis removes support for older cipher suites that aren't secure. Supported cipher suites are restricted to the following suites when the cache is configured with a minimum of TLS 1.2:
31
41
32
-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
33
-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
42
+
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
43
+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
34
44
35
-
This article provides general guidance about how to detect dependencies on these earlier TLS versions and remove them from your application.
36
-
37
-
The dates when these changes take effect are:
38
-
39
-
| Cloud | Phase 1 Start Date | Phase 2 Start Date |
| Azure (global) | January 13, 2020 | Postponed because of COVID-19 |
42
-
| Azure Government | March 13, 2020 | Postponed because of COVID-19 |
43
-
| Azure Germany | March 13, 2020 | Postponed because of COVID-19 |
44
-
| Microsoft Azure operated by 21Vianet | March 13, 2020 | Postponed because of COVID-19 |
45
-
46
-
> [!NOTE]
47
-
> Phase 2 is postponed because of COVID-19. This article will be updated when specific dates are set.
48
-
>
45
+
The following sections provide guidance about how to detect dependencies on these earlier TLS versions and remove them from your application.
49
46
50
47
## Check whether your application is already compliant
51
48
52
-
You can find out whether your application works with TLS 1.2 by setting the **Minimum TLS version** value to TLS 1.2 on a test or staging cache, then running tests. The **Minimum TLS version** setting is in the [Advanced settings](cache-configure.md#advanced-settings) of your cache instance in the Azure portal. If the application continues to function as expected after this change, it's probably compliant. You might need to configure the Redis client library used by your application to enable TLS 1.2 to connect to Azure Cache for Redis.
49
+
You can find out whether your application works with TLS 1.2 by setting the **Minimum TLS version** value to TLS 1.2 on a test or staging cache, then running tests. The **Minimum TLS version** setting is in the [Advanced settings](cache-configure.md#advanced-settings) of your cache instance in the Azure portal. If the application continues to function as expected after this change, it's probably compliant. You also need to configure the Redis client library used by your application to enable TLS 1.2 to connect to Azure Cache for Redis.
53
50
54
51
## Configure your application to use TLS 1.2
55
52
@@ -59,25 +56,24 @@ Most applications use Redis client libraries to handle communication with their
59
56
60
57
Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5.2 or earlier, and use the latest TLS version on .NET Framework 4.6 or later. If you're using an older version of .NET Framework, enable TLS 1.2 manually:
61
58
62
-
***StackExchange.Redis:** Set `ssl=true` and `sslProtocols=tls12` in the connection string.
63
-
***ServiceStack.Redis:** Follow the [ServiceStack.Redis](https://github.com/ServiceStack/ServiceStack.Redis#servicestackredis-ssl-support) instructions and requires ServiceStack.Redis v5.6 at a minimum.
59
+
-_StackExchange.Redis_: Set `ssl=true` and `sslProtocols=tls12` in the connection string.
60
+
-_ServiceStack.Redis_: Follow the [ServiceStack.Redis](https://github.com/ServiceStack/ServiceStack.Redis#servicestackredis-ssl-support) instructions and requires ServiceStack.Redis v5.6 at a minimum.
64
61
65
62
### .NET Core
66
63
67
-
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
64
+
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
68
65
69
66
Depending on the OS version and any patches that have been applied, the effective default TLS version can vary. For more information, see [here](/dotnet/framework/network-programming/#support-for-tls-12).
70
67
71
68
However, if you're using an old OS or just want to be sure, we recommend configuring the preferred TLS version manually through the client.
72
69
73
-
74
70
### Java
75
71
76
72
Redis Java clients use TLS 1.0 on Java version 6 or earlier. Jedis, Lettuce, and Redisson can't connect to Azure Cache for Redis if TLS 1.0 is disabled on the cache. Upgrade your Java framework to use new TLS versions.
77
73
78
74
For Java 7, Redis clients don't use TLS 1.2 by default but can be configured for it. Jedis allows you to specify the underlying TLS settings with the following code snippet:
The Lettuce and Redisson clients don't yet support specifying the TLS version. They'll break if the cache accepts only TLS 1.2 connections. Fixes for these clients are being reviewed, so check with those packages for an updated version with this support.
90
+
The Lettuce and Redisson clients don't yet support specifying the TLS version. They break if the cache accepts only TLS 1.2 connections. Fixes for these clients are being reviewed, so check with those packages for an updated version with this support.
95
91
96
92
In Java 8, TLS 1.2 is used by default and shouldn't require updates to your client configuration in most cases. To be safe, test your application.
97
93
@@ -102,10 +98,10 @@ Node Redis and IORedis use TLS 1.2 by default.
102
98
### PHP
103
99
104
100
#### Predis
105
-
106
-
* Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
107
-
108
-
* PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
101
+
102
+
- Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
103
+
104
+
- PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
109
105
110
106
```PHP
111
107
$redis=newPredis\Client([
@@ -119,7 +115,7 @@ Node Redis and IORedis use TLS 1.2 by default.
119
115
]);
120
116
```
121
117
122
-
* PHP 7.3 and later versions: Predis uses the latest TLS version.
118
+
- PHP 7.3 and later versions: Predis uses the latest TLS version.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-whats-new.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,16 +7,28 @@ ms.custom: references_regions
7
7
ms.author: franlanglois
8
8
ms.service: cache
9
9
ms.topic: conceptual
10
-
ms.date: 05/31/2023
11
-
10
+
ms.date: 09/12/2023
12
11
13
12
---
14
13
15
14
# What's New in Azure Cache for Redis
16
15
16
+
## September 2023
17
+
18
+
### Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis
19
+
20
+
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in October, 2024.
21
+
22
+
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
23
+
24
+
-_Phase 1_: Azure Cache for Redis changes the default minimum TLS version to be 1.2 for newly created cache instances. Previously, it was TLS 1.0. Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
25
+
-_Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting October 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service is expected to be available while we migrate it to support only TLS 1.2 or later.
26
+
27
+
For more information, see [Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis](cache-remove-tls-10-11.md).
28
+
17
29
## June 2023
18
30
19
-
Azure Active Directory for authentication and role-based access control are available across regions that support Azure Cache for Redis.
31
+
Azure Active Directory for authentication and role-based access control is available across regions that support Azure Cache for Redis.
20
32
21
33
## May 2023
22
34
@@ -36,7 +48,7 @@ For more information, see [Configure clustering for Azure Cache for Redis instan
36
48
37
49
### 99th percentile latency metric (preview)
38
50
39
-
A new metric is available to track the worst-case latency of server-side commands in Azure Cache for Redis instances. Latency is measured by using `PING` commands and tracking response times. This metric can be used to track the health of your cache instance and to see if long-running commands are compromising latency performance.
51
+
A new metric is available to track the worst-case latency of server-side commands in Azure Cache for Redis instances. Latency is measured by using `PING` commands and tracking response times. This metric can be used to track the health of your cache instance and to see if long-running commands are compromising latency performance.
40
52
41
53
For more information, see [Monitor Azure Cache for Redis](cache-how-to-monitor.md#list-of-metrics).
0 commit comments