Is TLS 1.3 required today? What are the best practices?
Daniel Nashed – 15 February 2026 11:39:25
TLS 1.3 Support for the Domino INET Stack?
The AHA idea for TLS 1.3 support is from 2008 and has currently 289 votes.
https://domino-ideas.hcltechsw.com/ideas/DOMINO-I-124
I agree that TLS 1.3 is important to have supported in 2026! But it is not yet mandatory from security point of view yet.
Here is how I would see it in 2026. We can have a separate blog post of which parts of Domino already supports TLS 1.3.
This blog post is mainly about the internet stack -- which means the Internet tasks which share one network stack where TLS 1.2 with RSA and ECDSA keys is the current standard.
I know there are some very specific requirements in some industries where servers are configured TLS 1.3 only.
This would for example break Notes web services which use the INET stack as well.
The TLS 1.3 topic comes up every couple of weeks and this post is about how I would see it today for Domino Ineternet protocols on server side.
What are required standards by BSI and NIST?
- Both German BSI and US NIST recommend using TLS 1.3. But also still allow TLS 1.2 with the right ciphers.
- NIST requires systems to support TLS 1.3. But does not mandate to only support TLS 1.3.
The background is likely that they want to move everyone to TLS 1.3 and that would only work when everyone supports it.
General rules for standards -- not just security
- Be as standard compliant as you can on your side
- Tolerate as much not RFC / best practices compliance as it is allowed for others connecting to you
This would mean in the context of TLS
- Support TLS 1.3 for everyone who already supports it
- But also support TLS 1.2 with the right ciphers and curves
But today I would not see that servers should deny TLS 1.2.
There are some important advantages in TLS 1.3. For example Forward Secrecy is enforced by design. But those advantages don't mean that TLS 1.2 should not be used at all.
TLS 1.2 with modern ciphers are still a good and secure standard
When using ECDSA keys a Domino server automatically picks two good ciphers:
C02C, TLSv1.2, ECDHE-ECDSA-AES256-GCM-SHA384 , TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
C02B, TLSv1.2, ECDHE-ECDSA-AES128-GCM-SHA256 , TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
For RSA keys the recommended out of the box configuration is.
The RSA ciphers are configured in server document (the two ECDSA ciphers are controlled by notes.ini parameters -- and usually do not need to be changed).
C030, TLSv1.2, ECDHE-RSA-AES256-GCM-SHA384 , TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
009F, TLSv1.2, DHE-RSA-AES256-GCM-SHA384 , TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
C02F, TLSv1.2, ECDHE-RSA-AES128-GCM-SHA256 , TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
009E, TLSv1.2, DHE-RSA-AES128-GCM-SHA256 , TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
Distinction by protocol
HTTPS
HTTP has the strongest requirement but also the best support for TLS 1.3 in browsers, libs like LibCurl used in many applications.
Browsers support TLS 1.3 and also ECDSA keys for a long time.
SMTP with STARTTLS
When looking into SMTP connections not everyone uses TLS today.
But I think it is time to block anyone who isn't using opportunistic TLS today.
Do you want to block mail coming into your system from a badly configured server?
You could require to only send mail over TLS. But blocking incoming messages is a different story IMHO.
But because of GDPR we probably have to enforce TLS for every incoming and outgoing SMTP connection.
Blocking incoming messages is a bigger topic from SPAM and content security point of view.
Most providers require TLS + DKIM and check SPF records. But that's a separate story.
SMTP with STARTTLS is often a different story than HTTPS. The stack usually does not even support ECDSA and staying with TLS 1.2 and RSA with a good selected cipher list is a best practice.
But that does not mean you should not start offering TLS 1.3 today.
Loadbalancers & Offloading TLS
The big difference between the two protocols is that off-loading HTTPS to a reverse proxy or load balancer is much easier than to off-load SMTP TLS.
For SMTP the only real chance (unless you have an enterprise grade load-balancer with SMTP support) you would need a Relay host in between.
In larger companies SMTP is secured by specially hardened SMTP appliances for anti-spam, anti-virus and policy enforcement.
Talking to those appliances using TLS 1.2 should be perfectly fine today.
So for outgoing and incoming SMTP traffic the SMTP appliance or specially hardened SMTP server in a DMZ is your first line of defense.
Not the internal mail server which speaks SMTP with STARTTLS or TLS to a relay host.
Revising HTTPS
Usually HTTP servers are behind a reverse proxy or load balancer to implement high availability.
In this context TLS can be off-loaded to the reverse proxy / load balancer.
In a secured infrastructure the TLS traffic is terminated on DMZ level on specially hardened appliances and forwarded only to explicitly allowed targets.
A simple load balancer would be for example NGINX which fully supports TLS 1.3 with a dual stack for RSA and ECDSA.
So that your back-end server can still use TLS 1.2 with ECDSA and one of the two mentioned ciphers at the beginning of this post.
But not only external facing HTTPS servers are behind load-balancers and reverse proxies. The same type of configuration also makes sense for internal servers.
Note about end to end TLS
In most scenarios the traffic should be end to end encrypted.
But that does not mean you need the same strong requirement for TLS between those systems.
You can use private CA ECDSA certificates and use the most efficient ciphers internally between you Domino servers and the load-balancer.
Domino CertMgr can manage MicroCA certificates with automatic renewal including distributing them to your servers.
The public trusted certificate would be on the load balancer -- which would trust your Domino MicroCA for back-end certificate validation.
My personal conclusion an summary
For larger environments no "application" server -- like Domino with this is true for all other server types -- is directly internet facing.
Everyone with higher security standards uses hardened appliances in front of their servers.
Domino servers come with good TLS 1.2 cipher support for RSA and ECDSA today.
TLS 1.3 is still an important requirement and is a must have for the next Notes/Domino release after version 14.5.1 ships in March.
- Comments [0]