Silhouette of a woman wearing headphones with a mic in an Octopus branded tee holding a tablet.

Deprecating support for TLS 1.0 and 1.1

Rhys Parry
Rhys Parry

Transport Layer Security (TLS) 1.0 and 1.1 are legacy cryptographic protocols that first appeared in 1999 and 2006, respectively. These protocols contain known security vulnerabilities, and more secure versions have superseded them, particularly TLS 1.2 (2008) and TLS 1.3 (2018).

Microsoft has progressively phased out support for TLS 1.0 and 1.1 across Windows Server operating systems:

  • Windows Server 2019 and later: Disables TLS 1.0 and 1.1 by default
  • Windows Server 2016: Allows you to disable TLS 1.0 and 1.1 via registry settings
  • Windows Server 2012 R2: Requires updates to support TLS 1.2 as the default protocol
  • Windows Server 2012: Requires specific updates to support TLS 1.2

We’re following Microsoft’s recommendation by deferring TLS version selection to the Operating System. This approach prevents systems that don’t enable legacy protocols by default from using them.

Impact on Octopus Cloud customers

We’re removing support for these legacy protocols on Octopus Cloud to enhance security. This change will affect Tentacles on older operating systems that don’t support TLS 1.2+.

Tentacles affected by this change include those running on:

These Tentacles will need TLS 1.2+ support to maintain secure connections and continue deployments.

This will also affect newer Operating Systems if you have explicitly disabled TLS 1.2 or 1.3. If affected, you’ll need to re-enable TLS 1.2 or 1.3.

Impact on self-hosted customers using Linux Docker

Our upgrade to Debian 12 in January 2026 will also affect customers using our official Linux Docker image. Like Octopus Cloud, your Tentacles will need TLS 1.2+ support to connect to your Octopus Server.

Impact on self-hosted customers using Windows

Self-hosted customers running Octopus Server on Windows won’t see direct changes to their server. However, your Operating System configuration determines your TLS version availability, so you may already use TLS 1.2+ only.

Most Windows Server 2016+ installations already use TLS 1.2+ by default, so you’re likely already prepared.

Customer support and monitoring

For Octopus Cloud customers: We’re monitoring Octopus Cloud for usages of TLS 1.0 and 1.1, and will reach out to affected customers.

For self-hosted customers: To ensure you’re prepared, please review your environment for TLS 1.0/1.1 dependencies before the January 2026 timeline. This step will help you identify and address any compatibility requirements early.

If you believe your organization may be affected, or if you have questions about TLS protocol support, please don’t hesitate to contact our support team for assistance.

What you can do

To keep your systems connected, you have several options:

Recommended approach for all customers:

  • Upgrade your operating system to a supported version (Windows Server 2016 or later, recent Linux distributions)
  • Update your Tentacle to the latest version, which includes enhanced TLS support
  • Review external integrations to ensure they support TLS 1.2 or higher

Alternative options for specific systems:

How to check your current setup:

  • External service support: Most modern services already support TLS 1.2+, but you can test connections or contact service providers to confirm
  • Operating System TLS: Windows Server 2016+ and modern Linux distributions enable TLS 1.2+ by default. Older operating systems, such as Windows Server 2012/2012 R2, may require security updates to enable TLS 1.2. Since Tentacle uses your OS’s TLS capabilities, ensuring your OS supports TLS 1.2+ is the key step for compatibility

Deprecation timeline

PeriodOctopus CloudSelf-Hosted Docker
October - November 2025We’ll monitor for usages of TLS 1.0/1.1Customers should assess their environments
Mid-November 2025We’ll disable TLS 1.0/1.1 on Octopus Cloud (with accommodations for affected customers)No immediate change
December 2025We’ll continue to track and help affected customersCustomers should continue preparation
January 2026Octopus Cloud will use TLS 1.2+ onlyWe’ll upgrade the official Docker image to Debian 12, supporting TLS 1.2+ only

Note: We may adjust this timeline based on customer impact analysis and feedback. We’re committed to providing adequate notice and support throughout the transition process.

Summary

Removing support for these outdated protocols brings us in line with modern security standards. Most customers won’t be affected, but if you’re running older systems, now’s the time to plan your upgrade.

Key takeaways:

  • Octopus Cloud customers will see us disable TLS 1.0/1.1 from mid-November 2025, with complete removal by January 2026
  • Self-hosted Docker customers will experience changes when we upgrade the official image to Debian 12 in January 2026
  • Self-hosted Windows customers will continue to work as before

The best fix is upgrading to modern operating systems with built-in TLS 1.2+ support. If you need more time, apply security patches and enable TLS 1.2 as a temporary measure.

Our support team is here to help throughout this transition. If you have concerns about your environment or need help with remediation, please reach out early so we can work together to ensure a smooth migration.

Happy deployments!

Rhys Parry

Related posts