Skip to content

Commit b179b98

Browse files
[SSL] Add TLS version curl test to troubleshooting.mdx (#25681)
* [SSL] Update troubleshooting.mdx SPM-2958 * Group together entries related to MinTLS version * Link to main concept page from troubleshooting * Create and apply test-tls-version partial * Add note on VPN and use partial in troubleshooting.mdx --------- Co-authored-by: Rebecca Tamachiro <[email protected]>
1 parent fcf9128 commit b179b98

File tree

3 files changed

+28
-14
lines changed

3 files changed

+28
-14
lines changed

src/content/docs/ssl/edge-certificates/additional-options/cipher-suites/troubleshooting.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,13 @@ If you encounter issues with edge certificate cipher suites, refer to the follow
1414

1515
## Compatibility with Minimum TLS Version
1616

17-
When you adjust the setting used for your domain's [Minimum TLS Version](/ssl/edge-certificates/additional-options/minimum-tls/), your domain only allows HTTPS connections using that TLS protocol version.
17+
When you adjust the setting used for your domain's [Minimum TLS Version](/ssl/edge-certificates/additional-options/minimum-tls/), your domain only allows HTTPS connections using that TLS protocol version. As explained in [About cipher suites](/ssl/edge-certificates/additional-options/cipher-suites/#related-ssltls-settings), although configured independently, cipher suites and TLS versions are closely related.
1818

19-
This setting can cause issues if you are not supporting TLS 1.2 ciphers on your domain. If you experience issues, review your domain's [Minimum TLS Version](/ssl/edge-certificates/additional-options/minimum-tls/) setting and Cloudflare's [supported ciphers list](/ssl/edge-certificates/additional-options/cipher-suites/supported-cipher-suites/).
19+
Minimum TLS Version can cause issues if you are not supporting TLS 1.2 ciphers on your domain. If you experience issues, review your domain's [Minimum TLS Version](/ssl/edge-certificates/additional-options/minimum-tls/) setting and Cloudflare's [supported ciphers list](/ssl/edge-certificates/additional-options/cipher-suites/supported-cipher-suites/).
20+
21+
### Testing Minimum TLS version with curl
22+
23+
<Render file="test-tls-version" product="ssl" />
2024

2125
## Compatibility with certificate encryption
2226

src/content/docs/ssl/edge-certificates/additional-options/minimum-tls.mdx

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 13
66
---
77

8-
import { FeatureTable, TabItem, Tabs, APIRequest } from "~/components";
8+
import { FeatureTable, TabItem, Tabs, APIRequest, Render } from "~/components";
99

1010
Minimum TLS Version only allows HTTPS connections from visitors that support the selected TLS protocol version or newer.
1111

@@ -99,14 +99,4 @@ If you are a SaaS provider looking to configure minimum TLS version for your cus
9999

100100
## Test supported TLS versions
101101

102-
To test supported TLS versions, attempt a request to your website or application while specifying a TLS version.
103-
104-
For example, use a `curl` command to test TLS 1.1 (replace `www.example.com` with your Cloudflare domain and hostname):
105-
106-
```sh
107-
curl https://www.example.com -svo /dev/null --tls-max 1.1
108-
```
109-
110-
If the TLS version you are testing is blocked by Cloudflare, the TLS handshake is not completed and returns an error:
111-
112-
`* error:1400442E:SSL routines:CONNECT_CR_SRVR_HELLO:tlsv1 alert`
102+
<Render file="test-tls-version" product="ssl" />
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
{}
3+
4+
---
5+
6+
To test supported TLS versions, attempt a request to your website or application while specifying a TLS version.
7+
8+
For example, to test TLS 1.1, use the `curl` command below. Replace `www.example.com` with your Cloudflare domain and hostname.
9+
10+
```sh
11+
curl https://www.example.com -svo /dev/null --tls-max 1.1
12+
```
13+
14+
If the TLS version you are testing is blocked by Cloudflare, the TLS handshake is not completed and returns an error:
15+
16+
`* error:1400442E:SSL routines:CONNECT_CR_SRVR_HELLO:tlsv1 alert`
17+
18+
:::note
19+
Local VPN or a device security client may prevent insecure connections using legacy protocols like TLS 1.0. Make sure to disable such network or security client before running the test on your device.
20+
:::

0 commit comments

Comments
 (0)