1 Answers1

-1

The big disadvantage to users in this case would be that they could no longer access sites which don't support TLSv1.2. Data on those sites is fairly hard to find (I found a survey from 2014, which found about 1/3 sites supported TLSv1.2, but that's ancient in web terms), so this might be a huge problem, or might be a non-issue, depending on what your staff need to access.

Some of the known issues with earlier TLS versions are actually implementation issues with servers which support them. For those, there isn't any direct client benefit to disabling the protocols.

In terms of avoiding the use of 3DES and other weak ciphers, that's a separate issue - you can use 3DES with TLSv1.2, although there is usually very little call to do so, since a system with support for TLSv1.2 will support stronger ciphers. I'm not aware of a reliable method to reject the use of specific ciphers from the client side.

Matthew
  • 27,233
  • 7
  • 87
  • 101