mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
Feature Request - Minimum TLS version check (e.g. enforce a minimum of TLS 1.2) #4013
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#4013
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ndbroadbent on GitHub (Mar 3, 2025).
📑 I have found these related issues/pull requests
Couldn't find any related issues
🏷️ Feature Request Type
New monitor
🔖 Feature description
It would be great if we could set up an SSL check that verifies certificates and also configures a minimum TLS version, e.g. 1.0, 1.1, 1.2, or 1.3.
1.0 and 1.1 are legacy TLS versions, so I'd like to set up checks for all of my domains and make sure I don't accidentally support them. Thanks!
✔️ Solution
New SSL monitor for minimum TLS version
❓ Alternatives
Couldn't find any, maybe a bash script as a cron job
📝 Additional Context
No response
@Ghost93 commented on GitHub (Mar 26, 2025):
interested 👍
@CommanderStorm commented on GitHub (Apr 17, 2025):
Maybe relevant for some: that we currently support the tls versions that node supports by default.
@jnovack commented on GitHub (May 3, 2025):
Forgive me, why is checking for TLS 1.1 the responsibility of the uptime checker checking every X minutes?
Ignoring that security scans are the responsibility of the network security tool (which this is not), how often is someone accidentally enabling TLS 1.1 that you need to have it checked EVERY time you check to see if the host is up?
I feel this is scope creep at it's worst.
@Loughty commented on GitHub (Aug 6, 2025):
Hi @CommanderStorm, there's a way of lowering the min TLS version supported? (has u can do, for example, in Firefox). After an update, my Uptime Kuma now show one host has down, and the "ignoring TLS/SSL errors" option isn't working this time. I think it's because the min TLS version supported has ben raised (I update Uptime Kuma from 1.19 to 1.23).
@CommanderStorm commented on GitHub (Aug 6, 2025):
Yes, just pass the relevant node environment variables.
Please fix your services instead of bodging like this though.