This guide covers enabling TLSv1.3 with the intermediate configuration found on cPanel 86 and later. TLSv1.3 is only available on cPanel servers running cPanel v11.86.0.4+.
TLSv1.3 is not available on Exim, Dovecot, FTP, or cpsrvd on CentOS. In order to use TLS v1.3 on these services, the the server's OS will need to be upgraded by reaching out to our support to request an OS upgrade to AlmaLinux. TLS v1.3 is provided on all services on AlmaLinux.
Enable on Apache
- Log Into into Root WHM
- Navigateto Apache Configuration, located in the Service Configuration section
- Select Global Configuration
- Under SSL/TLS Protocols, add +TLSv1.3 to the protocol list
EXAMPLE: A full protocol list may look likeall -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 +TLSv1.3. - Click Save
- Click Rebuild Configuration and Restart Apache
Enable on NGINX
NOTE: At this time, TLSv1.3 is already enabled on all up-to-date IMH-NGINX installs.
- SSH into the server as root
- If
/opt/ngxconf/templates.localdoesn't exist, copy the current NGINX templates foldercp -Rvp /opt/ngxconf/templates{,.local} - Edit
/opt/ngxconf/config.yamland update the templates folder usedtemplate_basepath: "/opt/ngxconf/templates.local"
- Edit the default_server.j2 file in the templates.local folder
- Update any occurrences of
ssl_protocolsand add TLSv1.3
EXAMPLE: To enable TLSv1.2 and TLSv1.3, we would edit the ssl_protocols line to the following.
ssl_protocols TLSv1.2 TLSv1.3;NOTE: Typically,ssl_protocolswill occur twice in this file. Make sure to update both occurrences. - Rebuild NGINX by running the following
ngxconf -Rrd --force
Comments
0 comments
Article is closed for comments.