docs/content/release-notes/flink-2.3.md
These release notes discuss important aspects, such as configuration, behavior or dependencies, that changed between Flink 2.2 and Flink 2.3. Please read these notes carefully if you are planning to upgrade your Flink version to 2.3.
A JDK update (affecting JDK 11.0.30+, 17.0.18+, 21.0.10+, and 24+) disabled TLS_RSA_* cipher suites.
This was done to support forward-secrecy (RFC 9325) and comply with the IETF Draft on Deprecating Obsolete Key Exchange Methods in TLS.
To support these and future JDK versions, the default value for the Flink configuration option security.ssl.algorithms has been changed to a modern, widely available cipher suite:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
This default provides strong security and wide compatibility. You can customize the cipher suites using the security.ssl.algorithms configuration option if your environment has different requirements.
If these cipher suites are not supported on your setup, you will see that Flink processes will not be able to connect to each other.