How to modify the SSL/TLS version Jira uses for outbound connections

Still need help?

The Atlassian Community is here for you.

Ask the community


Platform notice: Server and Data Center only. This article only applies to Atlassian products on the Server and Data Center platforms.

Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.

*Except Fisheye and Crucible

The current article applies when Jira performs secure connections to other services through SSL/TLS (e.g. LDAPS). To configure SSL/TLS on your Jira instance please refer to Running Jira applications over SSL or HTTPS.

Summary

When connecting as a client Jira will start the SSL handshake based off the current Java it's using, Java 8 enables TLSv1.1 and TLSv1.2 in client mode and uses TLSv1.2 by default. The initial request from the client (Jira) will go as TLSv1.2 and since TLSv1.2 is backward compatible, if destination responds on TLSv1.1, then they both agree on TLSV1.1 going forward.

Java 11 enables TLSv1.3 and TLSv1.2 in client mode. OpenJDK lower than 11.0.11 also allowed TLSv1.1, which is now disabled by default.

Logging

You can verify the SSL handshake in Jira logs, on Logging and Profiling please add the package org.apache.http set to DEBUG. You may also enable this through the following startup parameters:

-Djavax.net.debug=ssl:handshake:verbose 

The information will be written into JIRA Home Directory/log/atlassian-jira.log when a secure connection is stablished.

Configuration

If you wish to restrict TLS versions used by Jira when connecting as a client, you can set the value of the jdk.tls.disabledAlgorithms parameter in <JAVA_HOME>/lib/security/java.security.

The current <JAVA_HOME> is available at Administration > System > System Support > System Info > java.home. More Info: https://www.java.com/en/configure_crypto.html

Alternatively, you may add the following startup properties to achieve these settings:

-Djdk.tls.client.protocols=TLSv1.1,TLSv1.2





Last modified on Jan 20, 2023

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.