As of Firefox 52 I intend to turn TLS 1.3 on by default. TLS 1.3 has
been developed using the existing security.tls.version.max preference
to control maximum version.

TLS 1.3 is the next version of TLS, the protocol that secures the web.
TLS 1.3 removes old and unsafe cryptographic primitives, it is built
using modern analytic techniques to be safer, it is always forward
secure, it encrypts more data, and it is faster than TLS 1.2.  TLS 1.3
also provides a 0-RTT mode which removes the round-trip of handshake
latency.  (We will not however enable 0-RTT as part of this change).

We intend to ship draft 16 of TLS 1.3 and update to 17 as we are able.
Since this is a draft version of the spec going into an ESR release,
we intend to disable the feature for the ESR.

TLS 1.3 has a number of measures that will ensure that we remain
compatible with existing servers.  We have tested for incompatibility
and found no issues (though our tests are naturally limited).

We already have support for TLS 1.3 in developer tools and the UI.

We did not previously send an intent to implement.  I’ve included
relevant details in this mail.

Chrome Canary has TLS 1.3 support, but it is behind a flag.  Also,
Cloudflare support TLS 1.3 (by request only).

Bug to turn on by default: https://bugzilla.mozilla.org/show_bug.cgi?id=1310516

Link to spec: https://tools.ietf.org/html/draft-ietf-tls-tls13-16
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to