How Do I Upgrade TLS?
Symptom
CodeArts Repo aims to provide secure, reliable, stable, and fast code hosting services, and always puts the code security first.
In 2018, CodeArts Repo announced the drop of TLSv1.0. Since January 11, 2019, TLsv1.0 is no longer supported in the following aspects:
- TLSv1: All HTTPS web, API, and Git connections to CodeArts Repo.
Analysis
- Many clients can automatically switch to use new algorithms.
- The few clients affected are legacy systems that are no longer maintained and continue to connect to Git or CodeArts Repo APIs using TLSv1.0.
Solution
- If the Git Bash installed on your computer is earlier than 2.6.0, upgrade it to the latest version. The latest Git supports TLSv1.2 by default.
- You can run the following command to check the TLS version of the local Git Bash:
git config http.sslVersion
If the version is TLSv1.0, run the following command to upgrade it to TLSv1.2:
git config --global http.sslVersion tlsv1.2
Client |
Description |
---|---|
Git Credential Manager for Windows< v1.14.0 |
TLSv1.2 is not supported. Upgrade the Git client to the latest version. Select to install the Git Credential Manager during the upgrade. |
Git on Red Hat 5 |
|
Git on Red Hat 6 |
Upgrade to 6.8 or a later version. |
Git on Red Hat 7 |
Upgrade to 7.2 or a later version. |
JDK 7 |
TLSv1.0 is used in JDK 7 by default. Any client, such as Eclipse JGit, running on an earlier version of JDK is affected. This can be resolved by enabling TLSv1.2 in JDK 7. |
JDK 6 and earlier versions |
|
Visual Studio |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot