TLS Version

What is TLS?

TLS is short for Transport Layer Security. It is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. You can read more information about TLS on the Transport Layer Security Wikipedia page.

Are we using TLS in our Cloud Container servers and what versions of TLS do Cloud Container servers support?

TLS is built-in to our Cloud Container platform. If a container is SSL enabled HTTPS connections will automatically use TLS v1.1, v1.2 or v1.3. You can decide which version of TLS your Cloud Container server uses via the Settings screen and it will apply to all containers on the server:

  1. When logged in to the SiteHost Control Panel, click the Servers module from the menu on the left.
  2. Click on the Cloud Container server that you would like to adjust TLS for.
  3. Now click on the Settings tab and you will see the TLS option, select your preferred option and then Save Changes.
  4. Your change will be applied in a few seconds and the selected version of TLS will be used.

Why should you use TLS v1.2 and above?

Many improvements have been made since the release of these versions and upgrading to the current standard (TLS 1.2 and TLS 1.3) is now considered the safest and most reliable method of delivering encrypted content over the Internet.

What are the pros and cons of using TLS v1.2 and above?

Browsers support TLS v1.2 (via

Where are SSLv3 and TLS v1.0?

SSL is the predecessor of TLS. As with any software development or protocols, it becomes less secure and phased out as technology advanced. TLS v1.0 was based heavily on SSL and designed to solve compatibility issues therefore, it suffers the same vulnerbilities as SSL. As such, back on June 30, 2018, websites will need to stop supporting TLS 1.0, SSLv3 and ealier to remain PCI compliant.

How about TLS v1.1?

TLS v1.1 is fairly dated versions of the TLS protocol. It was published in 2006 as RFC 4346. Although improvements have been made in TLS v1.1, researchers found that it is still vulnerable to similar attacks as TLS v1.0.