Make sure ssl and tls protocols are enabled. TSL Protocol Issues - Cannot connect securely to this page This page is using invalid tls parameters

System SSL/TLS has a multi-protocol support infrastructure.

System SSL/TLS supports the following protocols:

  • Transport Layer Security version 1.2 (TLSv1.2)
  • Transport Layer Security version 1.1 (TLSv1.1)
  • Transport Layer Security version 1.0 (TLSv1.0)
    • SSLv2 cannot be used if TLSv1.2 is enabled on the system in the QSSLPCL system value.

CAREFULLY:

IBM strongly recommends that you run the IBM server only with the following network protocols disabled. By using the IBM configuration options to enable weak protocol results, you can enable the IBM i server to use weak protocols. This setting could potentially break network protection and put the IBM i server at risk. IBM IS NOT RESPONSIBLE FOR ANY DAMAGE OR LOSS, INCLUDING LOSS OF DATA, THAT MAY ARISE FROM THE USE OF SUCH NETWORK PROTOCOLS.

Weak protocols (as of April 2016):

  • Secure Sockets Layer version 3.0 (SSLv3)
  • Secure Sockets Layer version 2.0 (SSLv2)

Included protocols

The system value parameter QSSLPCL specifies the specific protocols enabled on the system. Applications negotiate secure sessions only with those protocols listed in QSSLPCL. For example, to restrict the System SSL/TLS implementation to use only TLSv1.2 and not allow older protocol versions to be used, you must set the QSSLPCL command to contain only *TLSV1.2 .

The special value QSSLPCL *OPSYS allows the operating system to change the protocols enabled on the system at a release boundary. The QSSLPCL value remains the same after the system is upgraded to a new release operating system. If the value of QSSLPCL is not *OPSYS, then after the system migrates to a new release, the administrator must manually add newer protocol versions to QSSLPCL.

IBM i release definition QSSLPCL *OPSYS
i 6.1 *TLSV1, *SSLV3
i 7.1 *TLSV1, *SSLV3
i 7.2
i 7.3 *TLSV1.2 , *TLSV1.1 , *TLSV1

Default protocols

If the application does not specify which protocols to enable, System SSL/TLS uses the default protocols. This approach is used to ensure that support for new TLS does not require changes to the application code. For applications that explicitly specify the protocols to be enabled, setting default protocols does not make sense.

The default protocols on the system overlap with the enabled protocols from QSSLPCL and the valid default protocols. The default list of allowed protocols is configured using the System Toolbox (SST) advanced analysis command SSLCONFIG.

To determine the current value of the default allowed protocol list and default protocol list on the system, use the SSLCONFIG command with the –display option.

An administrator can change the default protocol settings only if no other settings allow the application to successfully communicate with peers. It is preferable to enable the older protocol only for those applications that require it. If there is an "application definition", enablement occurs through Digital Certificate Manager (DCM).

Warning: Adding more old version protocol to the default list will cause all applications that use the default list to compromise the security system. Loading a group security PTF may result in the protocol being removed from the default protocol list. Subscribe to the Security Bulletin to be notified when security mitigation actions include this type of change. If the administrator returns a valid protocol that was deleted by a security PTF, the system will remember the change and will not delete that protocol again after the next security PTF is applied.

To change the default protocols on the system, use the eligibleDefaultProtocols option of the SSLCONFIG command to change the value. SSLCONFIG with the -h option will show a help panel that describes how to specify the protocol list. Only protocol versions given in the help text can be added to the list.

This error code usually appears on the screen when you go to a service or government website. A striking example is the official EIS portal. It is possible that the failure was caused by outdated or insecure TSL protocol parameters. This is a very common problem. Users encounter it over a long period of time. Now let’s figure out what exactly caused this error and how to fix it.

The security of the connection to the website is ensured by using special encryption protocols – SSL and TSL. They provide security for the transmission of information. The protocols are built on the use of symmetric and asymmetric encryption tools. Message authentication codes and other options are also used. Taken together, these measures make it possible to maintain the anonymity of the connection, so third parties are deprived of the opportunity to decrypt the session.

When an error appears in the browser indicating problems with the TSL protocol, this means that the website is using incorrect parameters. Therefore, the connection is truly not secure. Access to the portal is automatically blocked.

Most often, users who work through a browser encounter this error. Internet Explorer. There are several reasons for this failure, namely:

  • the antivirus blocks the connection to the website;
  • the version of the CryptoPro utility is outdated;
  • connection to the portal is carried out via VPN;
  • incorrect settings Internet browser Explorer;
  • the “SecureBoot” function is activated in the BIOS;
  • There are infected files and viruses on the computer.

We figured out the reasons for the error. It's time to analyze possible ways solving the problem.

Instructions for troubleshooting

If the error has not disappeared, then it’s time to try alternative methods:

Practice shows that each of the listed tips can eliminate the problem. So just follow the instructions.

Conclusion

Experts claim that the subject in question software glitch appears due to the antivirus installed on the user’s computer. For some reason the program is blocking access to the website. Therefore, first just disable the antivirus and change the certificate verification settings. It is likely that this will solve the problem. If the error persists, then try each of the tips suggested above. As a result, the security problem of the TSL protocol will be absolutely solved.

Based on industry guidelines for security and data integrity, Salesforce requires that the current encryption protocol be updated to TLS 1.2 by September 2019. Around this time, the TLS 1.1 encryption protocol will begin to turn off. To avoid instability of the production environment instance, the recommended actions should be completed before this date. This article contains all the available information about disabling the TLS 1.1 encryption protocol. This article will be updated as new information becomes available.

Disabling TLS 1.1 for other Salesforce services (e.g. Marketing Cloud, Heroku, Pardot, SalesforceIQ, etc.) is currently being evaluated. Additional information will be available once plans and deadlines are confirmed.

?

TLS stands for Transport Layer Security. It is a protocol that ensures confidentiality and data integrity between two communicating applications. Today, this security protocol is the most common, and is therefore used for web browsers and other applications that require secure data exchange over the network. TLS ensures that the connection to the remote endpoint is correct through encryption and endpoint authentication. The currently available versions are TLS 1.0, TLS 1.1, TLS 1.2, and TLS 1.3.

Salesforce web and API connections and email delivery. mail, use TLS as a primary security component. HTTPS (web) and STARTTLS SMTP (email) protocols use TLS as a primary security component.

Windows Vista, XP, or earlier operating systems are not compatible and cannot be configured to support TLS 1.1 or TLS 1.2.

Internet Explorer 7 or earlier (desktop) version

Internet Explorer 10 or earlier (mobile) version

Microsoft Edge

Mozilla Firefox

Firefox 27 or later

Compatible when using TLS 1.2 by default.

Compatible, but not default.
To use about:config to enable TLS 1.1 or TLS 1.2, update the security.tls.version.max configuration value to "2" for TLS 1.1 or "3" for TLS 1.2.

Firefox 23 or earlier

Not compatible when using TLS 1.2.

Google Chrome

Compatible with latest version(regardless of operating system).

Google Chrome 38 or later

Compatible when using TLS 1.2.

Google Chrome 30-37

Compatible with operating room Windows systems XP SP3, Vista or later (desktop), OS X 10.6 (Snow Leopard) or later (desktop), Android 2.3 (Gingerbread) or later (mobile).

Google Chrome 29 or earlier

Not compatible when using TLS 1.2.

Operating System Browser Google Android

Android 5.0 (Lollipop) or later

Compatible when using TLS 1.2.

Android 4.4 (KitKat)-4.4.4

May be compatible when using TLS 1.2 or later. Some devices running Android 4.4.x may not support TLS 1.2.

Android 4.3 (Jelly Bean) or earlier

Not compatible when using TLS 1.2.

Apple Safari

Safari 7 or later (desktop) for OS X 10.9 (Mavericks) or later

Compatible when using TLS 1.2 by default.

Safari 6 or earlier (desktop) for OS X 10.8 (Mountain Lion) or earlier

Not compatible when using TLS 1.1 or later encryption.

Safari 5 or later (mobile) for iOS 5 or later

Compatible when using TLS 1.2 by default.

Safari ( mobile version) for iOS 4 or earlier operating system

Not compatible when using TLS 1.2.

Using a Web Browser

Depending on the access point, a user who tries to access an organization through a web browser that uses TLS 1.1 after the Require TLS 1.2 or later for HTTPS connections setting is enabled receives an error message that advises them on what next steps to take to resolve it. this incompatibility.

See summary table below.

Access point User error message Message language

login.salesforce.com

The error message is only displayed after the user has logged in through this page.

Displayed in the user's Salesforce language.

Login page for My Domain feature

Displayed in the organization's standard language.

Site or community

An error message is displayed when you visit this page.

Displayed in the Salesforce language of the site guest user.

Web-to-Lead or Web-to-Case

An error message appears when sending data from an external page to Salesforce. Submitted data is archived without creating a lead or referral. To repeat these archived submissions, contact Salesforce Support and log a case.

Login or password recovery page of the client or partner portal (not through the site)

An error message is displayed when you visit this page.

Displayed in the standard portal language.

See below for more information (depending on your browser and operating system).

Compatible with the latest version (regardless of operating system).

Java 8 (1.8) or later

Compatible when using TLS 1.2 by default.

Enable TLS 1.2 via the Java system property (https.protocols) for HttpsURLConnection. To enable TLS 1.2 for connections other than HttpsURLConnection, configure the enabled protocols in the created SSLSocket and SSLEngine instances internally source code applications. If you cannot implement a newer version of Oracle Java, we recommend using IBM Java temporarily.

Java 6 (1.6) or earlier

Not compatible when using TLS 1.2. If you cannot implement a newer version of Oracle Java, we recommend using IBM Java temporarily.

Java (IBM)

Compatible when using TLS 1.2 or later by default. Optionally set if the application or library being called uses SSLContext.getinstance("TLS").

Java 7 or later, Java 6.0.1 Service Refresh 1 (J9 VM2.6) or later, Java 6 Service Refresh 10 or later

Enable TLS 1.2 through the Java system property (https.protocols) for HttpsURLConnection and the Java system property (com.ibm.jsse2.overrideDefaultProtocol) for SSLSocket and SSLEngine connections (as recommended in IBM documentation). If necessary, set com.ibm.jsse2.overrideDefaultTLS=true .

NET 4.6 or later

Compatible when using TLS 1.2 by default.

NET 4.5, 4.5.1, and 4.5.2 do not support TLS 1.2 by default. Enabling can be done in two ways described below.

Method 1.
.NET applications can enable TLS 1.2 directly in code software by configuring System.Net.ServicePointManager.SecurityProtocol to include SecurityProtocolType.Tls12 and SecurityProtocolType.Tls11. Below is a sample C# code.

System.Net.ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls12 | SecurityProtocolType.Tls11 | SecurityProtocolType.Tls;

Method 2.
To enable TLS 1.2 by default without changing the source code, set the DWORD (SchUseStrongCrypto) value in the following two registry keys (if not present, user created): "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319" and " HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319". Although version 4.0.30319 is present in these registry keys, .NET 4.5, 4.5.1, and 4.5.2 also use these values. However, these registry keys will enable TLS 1.2 by default on all installed .NET 4.0, 4.5, 4.5.1, and 4.5.2 applications on the system you are using. That's why we recommend testing this change before deploying it to production servers. Additionally, this change is available as a registry import file. However, these registry values ​​will not affect .NET applications that set the System.Net.ServicePointManager.SecurityProtocol value.

NET 4.0 does not support TLS 1.2 by default. To enable TLS 1.2 by default, install the .NET Framework 4.5 or later and set the DWORD (SchUseStrongCrypto) value to 1 in the following two registry keys (user-created if not present): "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\ v4.0.30319" and "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319". However, these registry keys may enable TLS 1.2 by default in all installed .NET 4.0, 4.5, 4.5.1, and 4.5.2 applications on the system you are using. We recommend that you test this change before deploying it to production servers. Additionally, this change is available as a registry import file.

However, these registry values ​​will not affect .NET applications that set the System.Net.ServicePointManager.SecurityProtocol value.

NET 3.5 or earlier

Not compatible when using TLS 1.2.

Compatible with the latest version (if you have an operating system that supports TLS 1.2).

Python 2.7.9 or later

Compatible when using TLS 1.2 or later by default.

Python 2.7.8 or earlier

Not compatible when using TLS 1.2 or later encryption.

Compatible with the latest version (when linked with OpenSSL 1.0.1 or later).

TLS 1.2 is enabled by default if you have OpenSSL 1.0.1 or later. Using the symbol:TLSv1_2 (preferred) or:TLSv1_1 with the ssl_version parameter of the SSLContext object ensures that TLS 1.1 or earlier is disabled.

Ruby 1.9.3 or earlier

Although the :TLSv1_2 symbol is not present in Ruby 1.9.3 or earlier, Ruby supports its addition and compilation with OpenSSL 1.0.1 or later.

Microsoft WinInet

Compatible when using TLS 1.2 by default.

Windows Server 2008 R2-2012

Compatible by default (if you have Internet Explorer 11). If you have Internet Explorer 8, 9, or 10, TLS 1.2 is enabled by the user or administrator.

Not compatible when using TLS 1.2.

Microsoft Secure Channel

Compatible with the latest version.

Windows Server 2012 R2 or later

Windows 8.1 or later

Compatible when using TLS 1.2 by default.

Windows Server 2012

TLS 1.2 is disabled by default, but is available if the application supports it. The TLS 1.1 and TLS 1.2 protocols can be enabled by default within the registry registry import file.

Windows Server 2008 R2

Compatible by default in client mode (if Internet Explorer 11 is installed). If you don't have Internet Explorer 11, or if you want to connect your Salesforce system to a service running on that type of system, TLS 1.2 may be enabled by default within the registry. Additionally, these registry settings are available as a registry import file.

Windows Server 2008 or earlier

Windows Vista or earlier

Not compatible when using TLS 1.2.

Microsoft WinHTTP and Webio

Windows Server 2012 R2 or later

Windows 8.1 or later

Compatible when using TLS 1.2 by default.

Windows Server 2008 R2 SP1 and 2012

How can we help end users manage this change?

When accessing Salesforce using TLS 1.1, users (including internal and external community members) may be notified to update their web browser or browser settings.

To do this, use the methods below.

AppExchange package.

The TLS 1.1 Compatibility User Message package will be available on the AppExchange shortly. This package is designed to deliver in-program notifications to TLS 1.1 users containing detailed instructions to ensure compatibility with TLS 1.2.

Visualforce page controller.

If you have experience with Visualforce and Apex development, check the value of ApexPages.currentPage().getHeaders().get("CipherSuite"), if not null, for the substring "TLSv1" (including leading and trailing spaces). When enabled, TLS 1.1 is used and the Visualforce page may display a notification to update your web browser or browser settings.

How can I identify users in my organization making TLS 1.1 connections?

This Knowledge article describes three ways to identify users affected by this change (including login history, reports, and Workbench):

NOTE.The login history report for all users in the organization can only be viewed and executed by users with the permission"User management" . If you do not have the Manage Users privilege, contact an administrator who has the necessary privileges to run the Login History report for all users.

How to test before disabling TLS 1.1?

A new Critical Updates Console option, "Require TLS 1.2 for HTTPS connections," will be available in the coming weeks.

What to do when using an intercepting HTTPS proxy server on the network?

Some networks intercept outgoing HTTPS traffic by using a proxy that generates its own certificates, so communications with Salesforce and other endpoints that are not encrypted can be closely monitored. These proxies create their own TLS connections to Salesforce. Networks using this type proxy servers must ensure they support TLS 1.2 and must select TLS 1.2 when connecting to Salesforce. Deviations from standard behavior may occur if the proxy server does not support TLS 1.2 or chooses TLS 1.1 instead of TLS 1.2 when connecting to remote endpoints.

  • Prevent the HTTPS intercepting proxy from intercepting HTTPS connections to the *.salesforce.com and *.force.com subdomains of Salesforce. This algorithm is preferred because it provides end-to-end privacy between end users' web browsers and Salesforce.
  • If HTTPS interception is required by company policy or cannot be removed or otherwise excluded, use new version a proxy server that supports TLS 1.2 or at least TLS 1.1.
  • If the HTTPS intercepting proxy does not support TLS 1.2 but selects TLS 1.1 by using it in the original ClientHello messages, allow the proxy configuration to select TLS 1.2 instead of TLS 1.1 when connecting to the *.salesforce.com and *.force.com subdomains of the system Salesforce.

A new Critical Updates Console option, Require TLS 1.2 for HTTPS connections in communities and Salesforce sites, will be available in the coming weeks.

Before testing this update in a production organization, customers are encouraged to test it in a secure environment to confirm end-to-end compatibility.

To prepare for enabling TLS 1.2, we recommend that you proactively review the impact of disabling TLS 1.1 on your organization's users by using the new Critical Updates Console setting: Require TLS 1.2 or later for HTTPS connections.

Email-to-Case agent client support for TLS 1.2 and newer versions is only possible with a Java update.
Please update your Java environment to version 8 as indicated in the table below to ensure Email-to-Case functionality.

IMPLICATIONS FOR APPEXCHANGE APPLICATIONS

Determine compatibility of AppExchange applications with Salesforce's TLS 1.1 shutdown process by contacting the vendor and/or partner directly.

All our arguments are based on the fact that the operating system is Windows XP or later (Vista, 7 or 8), on which all the appropriate updates and patches are installed. Now there is one more condition: we are talking about the latest versions of browsers, and not “spherical Ognelis in a vacuum.”

So, let's configure browsers to use current versions TLS protocol and not using its outdated versions and SSL at all. At least, as far as possible in theory.

And the theory tells us that although Internet Explorer supports TLS 1.1 and 1.2 already from version 8, under Windows XP and Vista we will not force it to do so. Click: Tools/Internet Options/Advanced and in the “Security” section we find: SSL 2.0, SSL 3.0, TLS 1.0... did you find anything else? Congratulations, you will have TLS 1.1/1.2! If they didn’t find it, you have Windows XP or Vista, and in Redmond they consider you retarded.

So, uncheck all SSL boxes, check all available TLS boxes. If only TLS 1.0 is available, then so be it; if more current versions are available, it is better to select only them, and uncheck TLS 1.0 (and not be surprised later that some sites do not open over HTTPS). Then click the “Apply” and “OK” buttons.

It’s easier with Opera - it arranges for us a real banquet of different versions protocols: Tools/General Settings/Advanced/Security/Protocol Security. What do we see? The whole set, from which we leave the checkboxes only for TLS 1.1 and TLS 1.2, after which we click the “Details” button and there we uncheck all the lines except those that start with “256 bit AES” - they are at the very end. At the beginning of the list there is a line “256 bit AES ( Anonymous DH/SHA-256), uncheck it too. Click “OK” and rejoice in security.

However, Opera has one strange property: if TLS 1.0 is enabled, then if it is necessary to establish a secure connection, it immediately uses this version of the protocol, regardless of the site’s support for more current ones. Like, why bother – everything is fine, everything is protected. When only TLS 1.1 and 1.2 are enabled, the more advanced version will be attempted first, and only if it is not supported by the site will the browser switch to version 1.1.

But the spherical Ognelis Firefox will not please us at all: Tools/Settings/Advanced/Encryption: all we can do is disable SSL, TLS is available only in version 1.0, there is nothing to do - we leave it with a checkmark.

However, the worst is learned by comparison: Chrome and Safari do not contain settings at all on which encryption protocol to use. As far as we know, Safari does not support TLS versions more current than 1.0 in versions for Windows OS, and since the release of new versions for this OS has been discontinued, it will not be.

Chrome, as far as we know, supports TLS 1.1, but, as in the case of Safari, we cannot refuse the use of SSL. There is no way to disable TLS 1.0 in Chrome. But with the actual use of TLS 1.1 there is a big question: it was first turned on, then turned off due to operational problems and, as far as one can judge, has not yet been turned back on. That is, there seems to be support, but it seems to be turned off, and there is no way for the user to turn it back on. The same story is with Firefox - it actually has support for TLS 1.1, but it is not yet available to the user.

Summary from the above multiletter. What are the general dangers of using outdated versions of encryption protocols? The fact that someone else will get into your secure connection to the site and gain access to all the information “there” and “there”. In practical terms, he will have full access to the mailbox. Email, account in the client-bank system, etc.

It is unlikely that you will accidentally break into someone else's secure connection; we are only talking about malicious actions. If the likelihood of such actions is low, or the information transmitted over a secure connection is not particularly valuable, then you don’t have to bother and use browsers that only support TLS 1.0.

Otherwise, there is no choice: only Opera and only TLS 1.2 (TLS 1.1 is just an improvement on TLS 1.0, partially inheriting its security problems). However, our favorite sites may not support TLS 1.2 :(