Transport Analysis 14 min read

TLS Deep Analysis Guide

Use this guide to understand what the TLS Deep Analysis tool is validating, how to interpret protocol and cipher findings, and how to harden transport posture without breaking the client base you still need to support.

Overview

Strong TLS posture depends on more than simply having a certificate. The analysis is trying to surface outdated protocol support, weak ciphers, chain problems, and configuration choices that reduce trust or compatibility in ways that matter to real clients.

TLS findings to prioritize first

  • Old protocol support: TLS 1.0 and 1.1 should usually be retired unless a real business dependency still exists.
  • Weak or legacy ciphers: Cipher posture should reflect a current modern baseline, not the oldest stack the server once supported.
  • Chain and certificate issues: A strong protocol configuration still fails if trust, chain completeness, or renewal hygiene are weak.

Transport Signals and What They Mean

SignalHealthy targetCommon weakness
Protocol supportTLS 1.2 and 1.3 where practicalOlder protocol versions left enabled for forgotten client populations.
Cipher selectionModern forward-secret suitesLegacy ciphers retained long after the compatibility need disappeared.
Certificate chainComplete, trusted chain to the public edgeMissing intermediate certificates or inconsistent chain presentation.
Renewal and rotationPredictable automated renewalManual renewals that create surprise outages or trust gaps.

Practical TLS Configuration Examples

Nginx modern TLS baseline
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers off;
ssl_ciphers 'TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256';
Apache TLS baseline
SSLProtocol             all -SSLv3 -TLSv1 -TLSv1.1
SSLCipherSuite          TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256:ECDHE-RSA-AES128-GCM-SHA256
SSLHonorCipherOrder     off

Recommended Remediation Flow

  1. Review client compatibility before removing legacy support Confirm whether any real customer or business workflow still depends on older TLS behavior.
  2. Tighten protocol and cipher posture deliberately Retire outdated protocols and simplify cipher support toward a modern baseline.
  3. Validate certificate chain presentation Check intermediates, SAN coverage, and renewal automation on the exact public hostname.
  4. Retest from the public edge Verify the final transport posture on the same host and port users and crawlers actually reach.

Troubleshooting Common Issues

Older clients fail after TLS tightening

That may be acceptable or it may signal an unstated compatibility requirement that needs a deliberate business decision.

  • Review actual client traffic before restoring a weaker baseline.
  • Document which customer or integration populations still depend on the removed support.
  • Avoid reintroducing broad legacy support without a clear owner and timeline.
The certificate is valid but the analysis still reports issues

Chain completeness, hostname coverage, or edge-specific certificate behavior often explains this gap.

  • Inspect the final chain presented by the public endpoint.
  • Confirm every hostname in scope is covered by the certificate.
  • Check whether a CDN or proxy is serving a different certificate path than the origin.

Validation Checklist

Post-fix validation

  • Confirm the public endpoint now serves the intended protocol and cipher posture.
  • Verify certificate trust, SAN coverage, and chain completeness.
  • Retest representative clients or integrations if compatibility mattered during the change.
  • Run TLS Deep Analysis again and compare the result against the intended transport baseline.

FAQ

Should every site disable TLS 1.0 and 1.1 immediately?

Usually yes for modern public applications, but confirm whether a real compatibility dependency still exists first.

  • Base the decision on actual client need, not fear of hypothetical breakage.
  • Use telemetry if available before changing the baseline.
  • Document any temporary exception and a path to remove it.
Is TLS 1.3 enough by itself?

No. Certificate chain quality, hostname coverage, redirects, and HSTS still matter.

  • Review the whole transport experience, not only the protocol label.
  • Keep certificate operations and renewals predictable.
  • Validate the final public edge after each change.