I have just checked again my traefik.yaml and restarted the docker container. Still, it's serving TLS 1.0 and TLS 1.1.
The host is e.g. mail.xgm.de, if you want to run a check yourself.
Are you using Traefik 2?
I also tried sslyze, see below.
Any more ideas?
Thanks!
% sslyze --tlsv1 --tlsv1_1 mail.xgm.de
CHECKING HOST(S) AVAILABILITY
-----------------------------
mail.xgm.de:443 => 45.83.105.139
SCAN RESULTS FOR MAIL.XGM.DE:443 - 45.83.105.139
------------------------------------------------
* TLS 1.0 Cipher suites:
Attempted to connect using 80 cipher suites.
The server accepted the following 6 cipher suites:
TLS_RSA_WITH_AES_256_CBC_SHA 256
TLS_RSA_WITH_AES_128_CBC_SHA 128
TLS_RSA_WITH_3DES_EDE_CBC_SHA 168
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 168 ECDH: prime256v1 (256 bits)
The group of cipher suites supported by the server has the following properties:
Forward Secrecy OK - Supported
Legacy RC4 Algorithm OK - Not Supported
The server has no preferred cipher suite.
* TLS 1.1 Cipher suites:
Attempted to connect using 80 cipher suites.
The server accepted the following 6 cipher suites:
TLS_RSA_WITH_AES_256_CBC_SHA 256
TLS_RSA_WITH_AES_128_CBC_SHA 128
TLS_RSA_WITH_3DES_EDE_CBC_SHA 168
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 168 ECDH: prime256v1 (256 bits)
The group of cipher suites supported by the server has the following properties:
Forward Secrecy OK - Supported
Legacy RC4 Algorithm OK - Not Supported
The server has no preferred cipher suite.
SCAN COMPLETED IN 6.09 S
------------------------
It is a named set of options instead of default. You can use it in a router rule: - "traefik.http.routers.supasecure.tls.options=mintls13"
That it is called mintls13 is arbitrary it is just a naming key.