* [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS
@ 2024-10-30 18:54 notramo
2024-11-04 19:19 ` jschanck
` (3 more replies)
0 siblings, 4 replies; 5+ messages in thread
From: notramo @ 2024-10-30 18:54 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 871 bytes --]
New issue by notramo on void-packages repository
https://github.com/void-linux/void-packages/issues/52852
Description:
### Is this a new report?
Yes
### System Info
Void 6.11.5_1 x86_64-musl GenuineIntel uptodate rrnFF
### Package(s) Affected
firefox-132.0_1
### Does a report exist for this bug with the project's home (upstream) and/or another distro?
No, it's probably a Void packaging bug (probably incorrect build options).
### Expected behaviour
Since version 132, Firefox supports post-quantum cryptography in TLS.
https://www.mozilla.org/en-US/firefox/132.0/releasenotes/
It's enabled in `about:config` value `security.tls.enable_kyber`.
The https://isitquantumsafe.info/ page should indicate that it's quantum safe.
### Actual behaviour
It's not quantum safe.
### Steps to reproduce
1. Install Firefox
2. Go to https://isitquantumsafe.info/
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Firefox 132 does not support post-quantum ML-KEM in TLS
2024-10-30 18:54 [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS notramo
@ 2024-11-04 19:19 ` jschanck
2024-11-05 20:20 ` [ISSUE] [CLOSED] " notramo
` (2 subsequent siblings)
3 siblings, 0 replies; 5+ messages in thread
From: jschanck @ 2024-11-04 19:19 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 341 bytes --]
New comment by jschanck on void-packages repository
https://github.com/void-linux/void-packages/issues/52852#issuecomment-2455513885
Comment:
Looks like a problem with https://isitquantumsafe.info/. Try https://crypto.cloudflare.com/cdn-cgi/trace, or browse to any Google or Cloudflare domain and check the request details using devtools.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [ISSUE] [CLOSED] Firefox 132 does not support post-quantum ML-KEM in TLS
2024-10-30 18:54 [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS notramo
2024-11-04 19:19 ` jschanck
@ 2024-11-05 20:20 ` notramo
2024-11-05 20:20 ` notramo
2025-02-10 12:33 ` notramo
3 siblings, 0 replies; 5+ messages in thread
From: notramo @ 2024-11-05 20:20 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 874 bytes --]
Closed issue by notramo on void-packages repository
https://github.com/void-linux/void-packages/issues/52852
Description:
### Is this a new report?
Yes
### System Info
Void 6.11.5_1 x86_64-musl GenuineIntel uptodate rrnFF
### Package(s) Affected
firefox-132.0_1
### Does a report exist for this bug with the project's home (upstream) and/or another distro?
No, it's probably a Void packaging bug (probably incorrect build options).
### Expected behaviour
Since version 132, Firefox supports post-quantum cryptography in TLS.
https://www.mozilla.org/en-US/firefox/132.0/releasenotes/
It's enabled in `about:config` value `security.tls.enable_kyber`.
The https://isitquantumsafe.info/ page should indicate that it's quantum safe.
### Actual behaviour
It's not quantum safe.
### Steps to reproduce
1. Install Firefox
2. Go to https://isitquantumsafe.info/
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Firefox 132 does not support post-quantum ML-KEM in TLS
2024-10-30 18:54 [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS notramo
2024-11-04 19:19 ` jschanck
2024-11-05 20:20 ` [ISSUE] [CLOSED] " notramo
@ 2024-11-05 20:20 ` notramo
2025-02-10 12:33 ` notramo
3 siblings, 0 replies; 5+ messages in thread
From: notramo @ 2024-11-05 20:20 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 254 bytes --]
New comment by notramo on void-packages repository
https://github.com/void-linux/void-packages/issues/52852#issuecomment-2458080749
Comment:
It's enabled indeed when connecting to Cloudflare or Google. Closing the issue as it's an issue with the page.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Firefox 132 does not support post-quantum ML-KEM in TLS
2024-10-30 18:54 [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS notramo
` (2 preceding siblings ...)
2024-11-05 20:20 ` notramo
@ 2025-02-10 12:33 ` notramo
3 siblings, 0 replies; 5+ messages in thread
From: notramo @ 2025-02-10 12:33 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 478 bytes --]
New comment by notramo on void-packages repository
https://github.com/void-linux/void-packages/issues/52852#issuecomment-2647857208
Comment:
Turns out it was not an issue with the page. Firefox 135 added support for ML-KEM in QUIC. Before that, it was only supported in non-QUIC connections. In Firefox 135, the above page shows that the connection is quantum-safe, even when connecting via QUIC.
But it was not a Void packaging issue either, so no changes required in Void.
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2025-02-10 12:33 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-10-30 18:54 [ISSUE] Firefox 132 does not support post-quantum ML-KEM in TLS notramo
2024-11-04 19:19 ` jschanck
2024-11-05 20:20 ` [ISSUE] [CLOSED] " notramo
2024-11-05 20:20 ` notramo
2025-02-10 12:33 ` notramo
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).