Security isn’t static. As the digital world evolves, so do the threats that target it.
That’s why we’re making an important change: On September 2, 2025, the Progress Chef solution is officially retiring support for Transport Layer Security (TLS) 1.0 and 1.1 on:
This means that any system still using these older security protocols will no longer be able to establish a connection to our infrastructure. If you rely on any of these services, this update affects you.
TLS is the protocol that secures communications across the web. However, versions 1.0 and 1.1 are outdated, vulnerable and no longer considered secure by modern standards. Industry leaders, including the Internet Engineering Task Force (IETF) and major web browsers, have deprecated these versions in favor of TLS 1.2 and 1.3, which offer better encryption, stronger authentication and improved overall security.
Continuing to use outdated TLS versions poses several risks:
By confirming that only modern TLS versions are supported, we’re actively strengthening the security posture of your infrastructure and maintaining compliance with industry standards.
If your infrastructure is still using TLS 1.0 or 1.1, you will not be able to connect to the services listed above after September 2, 2025. To avoid service disruptions, you’ll need to verify that your systems are configured to use TLS 1.2 or 1.3.
We strongly encourage updating your systems before the cutoff date to help prevent any interruptions in your workflows. The good news? Updating your TLS version is a simple but crucial step that will enhance the security and efficiency of your communications.
Legacy TLS versions pose multiple security risks, including:
By transitioning to TLS 1.2 and 1.3, you move towards more compliant, secure and reliable connections across all your systems.
Upgrading to TLS 1.2 or 1.3 is straightforward. Here’s what you need to do:
We know changes like this can feel like a hassle, and you’ve got questions—or might have questions. So, we’ve compiled a few common ones to make things easier:
ssl.handshake.version==0x0301
ssl.handshake.version==0x0302
ssl.handshake.version==0x0303
ssl.handshake.version==0x0304
openssl s_client args
and look for -tls*
flagsopenssl s_client -connect <domain>:443 -tls1
openssl s_client -connect <domain>:443 -tls1_1
openssl s_client -connect <domain>:443 -tls1_2
openssl s_client -connect <domain>:443 -tls1_3
If using OpenSSL, upgrade to at least version 1.0.1 (TLS 1.2 support)
If your app handles handshakes manually, upgrade to the latest version supported by your OS and verify with logs or Wireshark
If curl
fits your automation needs, verify if its version 7.19 or newer. Example test commands:
o TLS 1.0: curl -v --tls-max 1.0 --url "https://<url>"
o TLS 1.1: curl -v --tls-max 1.1 --url "https://<url>"
o TLS 1.2: curl -v --tls-max 1.2 --url "https://<url>"
o TLS 1.3: curl -v --tls-max 1.3 --url "https://<url>"
Alternatively, download packages on a modern machine and share with older systems via file share or internal repository
If you have additional questions, your Customer Success Manager is available to help, or you can submit a support ticket through our portal. We strongly encourage testing your systems in advance to avoid last-minute issues.
If you take no action before September 2, 2025, any request from your systems using TLS 1.0 or 1.1 will fail. This means you won’t be able to connect to the services listed above, potentially impacting your workflows, automated processes and security compliance. We highly recommend making this upgrade a priority.
Security is a continuous journey, and staying up to date with best practices is essential to protecting your data. Make sure you’re ready before September 2, 2025, to avoid disruptions. Thank you for working with us to maintain a secure and reliable ecosystem.
If you have any concerns or need further guidance, reach out now—don’t wait until the last moment.
Let’s keep things secure together.