That’s a pretty nice set of steps, a genuine deprecation including even as good an attempt as is possible at notifying where it’s needed, rather than just a removal. It’s interesting to note that they don’t say when they’ll finally remove it.<p>(One of my pet peeves is people abusing the word “deprecate” when they mean “remove”. The word “deprecate” means just discouraging something without actually removing it, though it’s typically a precursor to subsequent removal.)
When Heroku removed support for TLS 1.0 and TLS 1.1 this year, I was surprised at how many of my customers were effected. I didn't give the deprecation much thought, assuming everyone was using a secure TLS version, but I guess enterprises like their legacy technology.
PyPI did this in 2018: <a href="https://github.com/pypa/warehouse/issues/3411" rel="nofollow">https://github.com/pypa/warehouse/issues/3411</a>
So I was curious and tried to figure out how to, client side, enforce TLS 1.2+ for npm. It is surprisingly not straightforward to me. I also had an annoying time due to 'npm' being the tool name and the repo name.<p>It seems you have to set an environment variable,<p><pre><code> NODE_OPTIONS=--tls-max-v1.2
</code></pre>
But that's for node in general and I'm not sure if it even works for npm. I was expecting this to be something I could do in a package.json<p>I've done this for Rust for a long time by just setting a flag in `project/.cargo/config.toml`<p><pre><code> [http]
ssl-version.min = "tlsv1.2"
</code></pre>
(side note - I've had 0 issues with tlsv1.3 in cargo with crates.io)<p>I also wasn't able to figure out how to do this for `pip`. I honestly expected this to be super straightforward, but I guess I was sort of spoiled by how easy it was with cargo.
I know it has been a huge pain in the ass for some applications that use older ODBC drivers when Azure made TLS 1.2 the default for Azure SQL databases.
A year or so back, Microsoft made an announcement of dropping TLS 1.0 and 1.1 support in Internet Explorer (and IE mode in Edge) but that seems to have gone quiet, and I now wonder whether they intend to keep support going until Internet Explorer (and IE mode in Edge) itself falls out of support.
Everything is deprecating those old TLS versions, meanwhile Cloudflare still requires you to pay for a Business account to be able to disable them. Even though they also planned to deprecated them way back in 2018.