Skip to main content
All CollectionsTechnical Tidbits
Cloudflare Ciphers on TLS 1.3
Cloudflare Ciphers on TLS 1.3

Compliance for .bank domains

Alex Lemaire avatar
Written by Alex Lemaire
Updated over a week ago

When configuring Cloudflare to use TLS 1.3 as the minimum protocol for .bank domains, the following ciphers are automatically enabled, as they are the only ciphers supported under TLS 1.3:

TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A

TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A

TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A

These ciphers comply with the .bank fTLD security requirements, ensuring the highest standards for encryption and performance. Since this Cloudflare TLS setting eliminates the need for custom cipher configuration by design, there is no need to manually modify or customize cipher settings. Cloudflare handles the selection and prioritization of these ciphers automatically, aligning with industry standards and .bank compliance requirements.

By leveraging this setup, your .bank domain remains secure and in full compliance with the fTLD's strict guidelines, without the need for additional configuration adjustments.

You can verify the ciphers that are enabled on any domain using nmap:

nmap -Pn --script ssl-enum-ciphers yourdomain.bank -p 443
Did this answer your question?