diff --git a/src/content/docs/cloudflare-one/connections/connect-networks/configure-tunnels/cipher-suites.mdx b/src/content/docs/cloudflare-one/connections/connect-networks/configure-tunnels/cipher-suites.mdx new file mode 100644 index 00000000000000..e796eca2e8a778 --- /dev/null +++ b/src/content/docs/cloudflare-one/connections/connect-networks/configure-tunnels/cipher-suites.mdx @@ -0,0 +1,16 @@ +--- +pcx_content_type: reference +title: Cipher suites +--- + +Cloudflare Tunnel connections use the cipher suites supported by `cloudflared`, which relies on the Go TLS library for its TLS implementation. When establishing a TLS connection to your origin, `cloudflared` will negotiate the most secure cipher suite supported by both sides. + +The following table lists the cipher suites supported by cloudflared: + +| Protocol support | Cipher suites | +|------------------|----------------| +| TLS 1.3 only | `TLS_AES_128_GCM_SHA256`
`TLS_AES_256_GCM_SHA384`
`TLS_CHACHA20_POLY1305_SHA256` | +| TLS 1.2 only | `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`
`TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`
`TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`
`TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`
`TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256`
`TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256` | +| Up to and including TLS 1.2 | `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`
`TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
`TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`
`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA` | + +