Slow TLS Handshakes since 07 September 2022

Hi all,

Our monitoring tool is reporting much slower TLS handshakes since 07 Sept. 2022, with an average of 65ms vs 45ms before. I'm seeing the same results for multiple domains with Let's Encrypt certificates.

I am also seeing an increase for another domain I have with a Sectigo SSL, albeit not as marked as with Let's Encrypt.

This first domain is with Let's Encrypt:

This other domain with Sectigo:

Both domains are on different servers (both Ubuntu, Debian 9 "Stretch")

Is this necessarily related to the Certificate or can it be related to something else?
For both servers the TCP connection time and DNS lookup time remain stable over time.

Thank you

1 Like

Welcome back @effisk

It can be related to a wide variety of things. I will leave it to better experts than me to comment.

But, is there something wrong with your servers? Because I can't connect to either of those domains with HTTPS. Neither can SSLLabs

EDIT: I just saw that the www subdomain of this and can be reached with HTTPS but this points to server misconfiguration at least for this issue.


Thanks for pointing that out, although it's not related to my issue I'll have certificates issued for the non-www domains too.

1 Like

Your most recent cert for www.bestof was issued on Nov4 at 15:27:43 UTC. Why do you suspect it is involved with drop in performance starting Nov7?

I'll also note that server performance issues normally aren't dealt with on this forum. Still, you might find some volunteers willing to comment.


The only thing I can think of which might be related to Let's Encrypt is a reduced performance in OCSP response, but I'm thinking that's not included in the TLS handshake statistics.

Another thing might be a change in cipher suits on the remote server, which is not related to Let's Encrypt.


The tool you are using to TLS Handshake times, is it possible that for some reason it has changed from IPv4 to IPv6 or vice versa? Dropped from TLSv1.3 to TLSv1.2 (or worse)? Any updates preformed? Any hardware changes?
Any change in the fullchain Long (default) and Short (alternate) Certificate Chains Explained?


My money is on ISP routing changes.


This is slightly confusing, as Debian is not the same as Ubuntu (though related), so I'm taking there are both Ubuntu and Debian servers?

While this community is likely not able to pinpoint the exact cause of your symptoms with the data supplied, we can make some suggestions about what could be done to improve the situation. Some suggestions were already made. I would additionally suggest the following:

Assuming this is one of the machines in question: SSL Server Test: (Powered by Qualys SSL Labs)

  • The server does not support TLSv1.3. TLSv1.3 is the latest protocol version and uses less round trips than its predecessor. Supporting TLS 1.3 is likely going to result in speedups. The missing support for TLS 1.3 is easily explained by the usage of Debian 9 "Stretch". Debian Stretch is fairly old, and among other things, does not support modern TLS protocol versions.
  • The server has a poor cipher suite configuration (no preference & default cipher list) which may result in a suboptimal choice of security parameters. This can degrade both security and speed. Mozilla maintains a guide (also links to a configuration generator) that may be helpful.
  • The server does not support OCSP stapling. Enabling support for OCSP stapling can significantly reduce latency for clients that wait for externally fetched OCSP responses. It also improves privacy and security for users.
  • You may want to revise your SSL/TLS session cache to more aggressively perform session resumption, which also helps in reducing handshake latency with various clients.

Thank you all for your replies. Many possibilities to be explored, it is very helpful.
Hopefully I'll get back to you before topic closure with the outcome.


This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.