Visa upgraded our security system that authenticates a project in all environments to prevent vulnerabilities.
Why should you care?
This means, in order for you to continue using your project in our environments, you will need to upgrade to our latest security version TLS 1.2. Older TLS versions are vulnerable to security breaches. Please upgrade your TLS version to 1.2.
Your application will stop working if you continue to use any version lower than TLS 1.2 beyond the dates mentioned below:
Sandbox: February 19, 2018
Production: February, 2018
What is TLS?
TLS stands for “Transport Layer Security.” It provides privacy and data integrity between two communicating applications. It is used to authenticate one or both applications, and protect the confidentiality and integrity of information that passes between them.
Overtime, different versions of TLS have been released; TLS 1.2 was released in August 2008, it addresses many vulnerabilities identified in the earlier versions.
What happens if I don’t upgrade?
PCI DSS standard version 3.1 was retired in October 2016 and makes all older TLS versions (e.g. SSL v3, TLS 1.0, TLS 1.1) non-compliant. The standard requires the new TLS requirement to be implemented.
Visa has decided to proactively implement PCI DSS guidelines to provide greater protection to our clients. If you don’t upgrade your TLS version beyond the cutoff date notified to you by developer communication, you will no longer be able to use your projects in any environment.
getProtocol() method in SSLSession will provide the details of TLS version you are using.
Please refer to the Java documentation for the details.
How to Upgrade:
If your application does not automatically pick up TLS 1.2 version you need to explicity provide that as an override.
For example, for SoapUI tool, set -Dsopui.https.protocols property to TLSv1.2 refer to appropriate documentation on how to set SSL version for your application .
Please refer to compatibility guidelines for the most popular Languages and Libraries:
Java 1.5 and below does not support TLS 1.2
In Java 1.6, TLS 1.2 is not supported in Oracle public updates. It is supported in the business edition starting Oracle java version 6u115 b32.
In Java 1.7, TLS1.2 is supported. But it needs to be explicitly enabled by selecting the enabled protocols while creating the SSLSocket & SSLEngine instances.
Enable TLS 1.2:
Add ( -Dhttps.protocols=”TLSv1.2″ -Djdk.tls.client.protocols=”TLSv1.2″) to Java command line arguments which is used to launch client application. This will allow turning off support for TLS 1.1 and below on the server side completely and will support TLSv1.2.
Java client with basic URL connection:
Java client using Apache Http Components client:
Exception in case of incorrect TLS version would be: