On or after July 29, 2024, DeepL will deprecate support for insecure cipher suites. Affected customers will need to upgrade their TLS library so that it doesn’t use a cipher suite that we’ll be deprecating.
If you are using an insecure cipher suite and do not make this update, you’ll no longer be able to use the DeepL API from the deprecation date onward.
Update on August 8, 2024: The deadline for this cipher deprecation has been extended to Monday, September 2, 2024.
Please be sure to update your applications before September 2. We will not be able to extend the deadline any further.
On or after July 29, 2024, we will be deprecating the following three cipher suites:
This means that any application with a TLS library:
…will no longer be able to connect to the DeepL API.
The cipher suites that we’re deprecating have a historical track record of security weaknesses. They’re still vulnerable to attacks that may enable a bad actor to decrypt data. We consider this to be an unacceptable security risk, especially given our commitment to keeping our customers’ data secure.
After deprecating the ciphers listed above, the DeepL API will accept the same set of cipher suites supported by our web translator (deepl.com) today.
If you continue to use one of the cipher suites we’re deprecating, you won’t be able to access the DeepL API. This means that, for example, CAT tool plugins would no longer work properly.
We will continue to support the following cipher suites after deprecation:
If you’re a developer of your own application with the DeepL API:
If you’re using a third-party plugin that is powered by the DeepL API:
September 2024 update: because the cipher deprecation has been carried out according to schedule, the endpoint below is obsolete and is no longer available for use.
We created a test endpoint at api-test-tls.deepl.com
that only supports the cipher suites that will still be available after the deprecation of insecure suites.
You can send a test request to this endpoint to be sure that you’re using a supported cipher suite. If you receive a translation response back from the DeepL API, then you should not be affected by the deprecation.
Below is an example cURL request using the test endpoint that Pro API users can use. Please remember to replace the [yourAuthKey]
placeholder with your API key.
On or after July 29, 2024, DeepL will deprecate support for insecure cipher suites. Affected customers will need to upgrade their TLS library so that it doesn’t use a cipher suite that we’ll be deprecating.
If you are using an insecure cipher suite and do not make this update, you’ll no longer be able to use the DeepL API from the deprecation date onward.
Update on August 8, 2024: The deadline for this cipher deprecation has been extended to Monday, September 2, 2024.
Please be sure to update your applications before September 2. We will not be able to extend the deadline any further.
On or after July 29, 2024, we will be deprecating the following three cipher suites:
This means that any application with a TLS library:
…will no longer be able to connect to the DeepL API.
The cipher suites that we’re deprecating have a historical track record of security weaknesses. They’re still vulnerable to attacks that may enable a bad actor to decrypt data. We consider this to be an unacceptable security risk, especially given our commitment to keeping our customers’ data secure.
After deprecating the ciphers listed above, the DeepL API will accept the same set of cipher suites supported by our web translator (deepl.com) today.
If you continue to use one of the cipher suites we’re deprecating, you won’t be able to access the DeepL API. This means that, for example, CAT tool plugins would no longer work properly.
We will continue to support the following cipher suites after deprecation:
If you’re a developer of your own application with the DeepL API:
If you’re using a third-party plugin that is powered by the DeepL API:
September 2024 update: because the cipher deprecation has been carried out according to schedule, the endpoint below is obsolete and is no longer available for use.
We created a test endpoint at api-test-tls.deepl.com
that only supports the cipher suites that will still be available after the deprecation of insecure suites.
You can send a test request to this endpoint to be sure that you’re using a supported cipher suite. If you receive a translation response back from the DeepL API, then you should not be affected by the deprecation.
Below is an example cURL request using the test endpoint that Pro API users can use. Please remember to replace the [yourAuthKey]
placeholder with your API key.