Enabling HTTPS RR on release
Categories
(Core :: Networking, task, P2)
Tracking
()
People
(Reporter: kershaw, Assigned: kershaw)
References
(Blocks 1 open bug)
Details
(Keywords: dev-doc-complete, Whiteboard: [necko-triaged])
Attachments
(1 file)
48 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-beta+
|
Details | Review |
We are about to roll out this feature.
Comment 1•2 years ago
|
||
Is this something we should add to the Fx92 relnotes? If so, can you please nominate?
Assignee | ||
Comment 2•2 years ago
|
||
Assignee | ||
Comment 3•2 years ago
|
||
(In reply to Ryan VanderMeulen [:RyanVM] from comment #1)
Is this something we should add to the Fx92 relnotes? If so, can you please nominate?
Will do. Thanks.
Assignee | ||
Comment 4•2 years ago
|
||
Release Note Request (optional, but appreciated)
[Why is this notable]: Enabling HTTPS RR allows Firefox to optimize the process of establishing a HTTPS connection.
[Affects Firefox for Android]: Fenix
[Suggested wording]: Enable the two features of HTTPS RR: The first is performing HTTPS upgrade when HTTPS RR is available and the second one is using HTTPS RR as Alt-Svc headers.
[Links (documentation, blog post, etc)]: https://docs.google.com/document/d/1vbxOPjE_jERr0cRNHWiwOLvHyc8UMcDq4_6yZYXNYig/edit?usp=sharing
Assignee | ||
Updated•2 years ago
|
Pushed by kjang@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/34c9c9b0de17 Enable HTTPS RR by default, r=necko-reviewers,valentin
Comment 6•2 years ago
|
||
bugherder |
Assignee | ||
Comment 7•2 years ago
|
||
Comment on attachment 9236051 [details]
Bug 1721132 - Enable HTTPS RR by default, r=#necko
Beta/Release Uplift Approval Request
- User impact if declined: No impact. This uplift is because that we are targeting to enable HTTPS RR on Firefox release 92.
- Is this code covered by automated tests?: Yes
- Has the fix been verified in Nightly?: Yes
- Needs manual test from QE?: No
- If yes, steps to reproduce:
- List of other uplifts needed: None
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): This patch only contains a pref change.
- String changes made/needed: N/A
Comment 8•2 years ago
|
||
Comment on attachment 9236051 [details]
Bug 1721132 - Enable HTTPS RR by default, r=#necko
Approved for 92.0b6.
Comment 9•2 years ago
|
||
bugherder uplift |
Comment 10•2 years ago
|
||
Added to the Fx92 beta relnotes:
Firefox now supports automatically performing HTTPS upgrades when HTTPS RR is available and using HTTPS RR as Alt-Svc headers.
Updated•2 years ago
|
Comment 11•2 years ago
|
||
This bug has thedev-doc-needed
flag against it which has triggered an action for MDN docs: https://github.com/mdn/content/issues/8683
-
The proposed release note was:
Firefox now supports automatically performing HTTPS upgrades when HTTPS RR is available and using HTTPS RR as Alt-Svc headers.
, while the published release note is
Firefox can now automatically upgrade to HTTPS using HTTPS RR as Alt-Svc headers.
Those two versions sound slightly different. My interpretation would be that the published version is true - i.e. if the browser is able to get an HTTPS RR record it treats this like an Alt-Svc
header that had been populated with the equivalent information.
Is that close? If not, what is the distiction between "HTTPS upgrades when HTTPS RR is available" and "and using HTTPS RR as Alt-Svc headers."?
2. What docs were you imagining are needed on MDN?
- We have just this document on
Alt-Svc
- We don't document HTTPS RR. I'm not sure how/where we would. We could however do a glossary entry and provide links to the spec and https://emilymstark.com/2020/10/24/strict-transport-security-vs-https-resource-records-the-showdown.html as a starting point?
Assignee | ||
Comment 12•2 years ago
|
||
(In reply to Hamish Willee from comment #11)
This bug has the
dev-doc-needed
flag against it which has triggered an action for MDN docs: https://github.com/mdn/content/issues/8683
The proposed release note was:
Firefox now supports automatically performing HTTPS upgrades when HTTPS RR is available and using HTTPS RR as Alt-Svc headers.
, while the published release note is
Firefox can now automatically upgrade to HTTPS using HTTPS RR as Alt-Svc headers.
Those two versions sound slightly different. My interpretation would be that the published version is true - i.e. if the browser is able to get an HTTPS RR record it treats this like an
Alt-Svc
header that had been populated with the equivalent information.
Is that close? If not, what is the distiction between "HTTPS upgrades when HTTPS RR is available" and "and using HTTPS RR as Alt-Svc headers."?
No, the proposed release note is more accurate than the published one.
There are actually two features of supporting HTTPS RR:
HTTPS upgrades when HTTPS RR is available
. Here is what the spec says:
By publishing a usable HTTPS RR, the server operator indicates that
all useful HTTP resources on that origin are reachable over HTTPS,
similar to HTTP Strict Transport Security [HSTS].
So, when Firefox discovers the HTTPS RR is existed for the origin and we are using HTTP
to connect to the server, we'll upgrade the connection to HTTPS
.
Using HTTPS RR as Alt-Svc
. This is about using the information provided in HTTPS RR to optimize the process of establishing HTTPS connection. The concept of this is similar to Alt-Svc header.
- What docs were you imagining are needed on MDN?
- We have just this document on
Alt-Svc
- We don't document HTTPS RR. I'm not sure how/where we would. We could however do a glossary entry and provide links to the spec and https://emilymstark.com/2020/10/24/strict-transport-security-vs-https-resource-records-the-showdown.html as a starting point?
I am working on a document (more like a blog post) to explain more details and I'll let you know when it is finished.
Comment 13•2 years ago
|
||
@kershaw - thanks, that's great - I've done the necessary docs work in https://github.com/mdn/content/pull/8897. I'm not sure how the concept of this is similar to Alt-Svc
header but that doesn't really matter. The point is that the HTTPS RR is useful for two things:
- optimising setup of (new) HTTPS connections
- knowing you can safely upgrade from HTTP to HTTPS (merely by its presence).
We'll link from your blog when you create it, but I think this is good enough for now.
Updated•2 years ago
|
Description
•