Version history for TLS/SSL support in web browsers tracks the implementation of Transport Layer Security protocol versions in major web browsers.
Browser or OS API | Version | Platforms | SSL protocols | TLS protocols | Certificate support | Vulnerability [n 1] | Protocol selection by user [n 2] | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV [n 3] [1] | SHA-2 [2] | ECDSA [3] | BEAST [n 4] | CRIME [n 5] | POODLE (SSLv3) [n 6] | RC4 [n 7] | FREAK [4] [5] | Logjam | |||||
Google Chrome (Chrome for Android) [n 8] [n 9] | 1–9 | Windows (10+) macOS (11+) Linux Android (8.0+) iOS (14+) ChromeOS | Disabled by default | Yes | Yes | No | No | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected [10] | Vulnerable (HTTPS) | Vulnerable | Vulnerable | Vulnerable (except Windows) | Vulnerable | Yes [n 10] | |
10–20 | No [11] | Yes | Yes | No | No | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected | Vulnerable (HTTPS/SPDY) | Vulnerable | Vulnerable | Vulnerable (except Windows) | Vulnerable | Yes [n 10] | |||
21 | No | Yes | Yes | No | No | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected | Mitigated [12] | Vulnerable | Vulnerable | Vulnerable (except Windows) | Vulnerable | Yes [n 10] | |||
22–29 | No | Yes | Yes | Yes [13] | No [13] [14] [15] [16] | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected | Mitigated | Vulnerable | Vulnerable | Vulnerable (except Windows) | Vulnerable | Temporary [n 11] | |||
30–32 | No | Yes | Yes | Yes | Yes [14] [15] [16] | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected | Mitigated | Vulnerable | Vulnerable | Vulnerable (except Windows) | Vulnerable | Temporary [n 11] | |||
33–37 | No | Yes | Yes | Yes | Yes | No | Yes (only desktop) | Requires SHA-2 compatible OS [2] | Needs ECC compatible OS [3] | Not affected | Mitigated | Partly mitigated [n 12] | Lowest priority [19] [20] [21] | Vulnerable (except Windows) | Vulnerable | Temporary [n 11] | |||
38, 39 | No | Yes | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Partly mitigated | Lowest priority | Vulnerable (except Windows) | Vulnerable | Temporary [n 11] | |||
40 | No | Disabled by default [18] [22] | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Mitigated [n 13] | Lowest priority | Vulnerable (except Windows) | Vulnerable | Yes [n 14] | |||
41, 42 | No | Disabled by default | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Mitigated | Lowest priority | Mitigated | Vulnerable | Yes [n 14] | |||
43 | No | Disabled by default | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Mitigated | Only as fallback [n 15] [23] | Mitigated | Vulnerable | Yes [n 14] | |||
44–47 | No | No [24] | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Not affected | Only as fallback [n 15] | Mitigated | Mitigated [25] | Temporary [n 11] | |||
48, 49 | No | No | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Needs ECC compatible OS [3] | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
50–53 | No | No | Yes | Yes | Yes | No | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
54–66 | No | No | Yes | Yes | Yes | Disabled by default (draft version) | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
67–69 | No | No | Yes | Yes | Yes | Yes (draft version) | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
70–83 | No | No | Yes | Yes | Yes | Yes | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
84–90 | No | No | Warn by default | Warn by default | Yes | Yes | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
91–129 | No | No | No [28] | No [28] | Yes | Yes | Yes (only desktop) | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [26] [27] | Mitigated | Mitigated | Temporary [n 11] | |||
ESC 130 | 131 | ||||||||||||||||||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Microsoft Edge (Chromium-based) OS-independent | 79–83 | Windows (10+) macOS (11+) Linux Android (8.0+) iOS (14.0+) | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default | Mitigated | Mitigated | Yes [n 10] | |
84–90 | No | No | Warn by default | Warn by default | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default | Mitigated | Mitigated | Yes [n 10] | |||
91-129 | No | No | No [29] | No [29] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default | Mitigated | Mitigated | Yes [n 10] | |||
ESC 130 | 131 | ||||||||||||||||||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Mozilla Firefox (Firefox for mobile) [n 17] | 1.0, 1.5 | Windows (10+) macOS (10.15+) Linux Android (5.0+) iOS (15+) ESR 115 only for: Windows (7–8.1) macOS (10.12–10.14) ESR 128+ only for: Windows (10+) macOS (10.15+) Linux | Yes [30] | Yes [30] | Yes [30] | No | No | No | No | Yes [2] | No | Not affected [31] | Not affected | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |
2 | Disabled by default [30] [32] | Yes | Yes | No | No | No | No | Yes | Yes [3] | Not affected | Not affected | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |||
3–7 | Disabled by default | Yes | Yes | No | No | No | Yes | Yes | Yes | Not affected | Not affected | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |||
8–10 ESR 10 | No [32] | Yes | Yes | No | No | No | Yes | Yes | Yes | Not affected | Not affected | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |||
11–14 | No | Yes | Yes | No | No | No | Yes | Yes | Yes | Not affected | Vulnerable (SPDY) [12] | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |||
15–22 ESR 17.0–17.0.10 | No | Yes | Yes | No | No | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 10] | |||
ESR 17.0.11 | No | Yes | Yes | No | No | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Lowest priority [33] [34] | Not affected | Vulnerable | Yes [n 10] | |||
23 | No | Yes | Yes | Disabled by default [35] | No | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 18] | |||
24, 25.0.0 ESR 24.0–24.1.0 | No | Yes | Yes | Disabled by default | Disabled by default [36] | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Vulnerable | Not affected | Vulnerable | Yes [n 18] | |||
25.0.1, 26 ESR 24.1.1–24.8.1 | No | Yes | Yes | Disabled by default | Disabled by default | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Lowest priority [33] [34] | Not affected | Vulnerable | Yes [n 18] | |||
27–33 ESR 31.0–31.2.0 | No | Yes | Yes | Yes [37] [38] | Yes [39] [38] | No | Yes | Yes | Yes | Not affected | Mitigated | Vulnerable | Lowest priority | Not affected | Vulnerable | Yes [n 18] | |||
34, 35 ESR 31.3.0–31.7.0 | No | Disabled by default [40] [41] | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Mitigated [n 19] | Lowest priority | Not affected | Vulnerable | Yes [n 18] | |||
ESR 31.8.0 | No | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Mitigated | Lowest priority | Not affected | Mitigated [44] | Yes [n 18] | |||
36–38 ESR 38.0–38.0.1 | No | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Mitigated | Only as fallback [n 15] [45] | Not affected | Vulnerable | Yes [n 18] | |||
ESR 38.1.0–38.8.0 | No | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Mitigated | Only as fallback [n 15] | Not affected | Mitigated [44] | Yes [n 18] | |||
39–43 | No | No [46] | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Only as fallback [n 15] | Not affected | Mitigated [44] | Yes [n 18] | |||
44–48 ESR 45 | No | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] [47] [48] [49] [50] | Not affected | Mitigated | Yes [n 18] | |||
49–59 ESR 52 | No | No | Yes | Yes | Yes | Disabled by default (draft version) [51] | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] | Not affected | Mitigated | Yes [n 18] | |||
60–62 ESR 60 | No | No | Yes | Yes | Yes | Yes (draft version) | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] | Not affected | Mitigated | Yes [n 18] | |||
63–77 ESR 68 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] | Not affected | Mitigated | Yes [n 18] | |||
78–131 ESR 78–115.16 ESR 128.0–128.3 | No | No | Disabled by default [52] | Disabled by default [52] | Yes | Yes | Yes | Yes | Yes | Not affected | Mitigated | Not affected | Disabled by default [n 16] | Not affected | Mitigated | Yes [n 18] | |||
ESR 115.17 | |||||||||||||||||||
ESR 128.4 | |||||||||||||||||||
132 | |||||||||||||||||||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Microsoft Internet Explorer (1–10) [n 20] Windows Schannel | 1.x | Windows 3.1, 95, NT, [n 21] [n 22] Mac OS 7, 8 | No SSL/TLS support | ||||||||||||||||
2 | Yes | No | No | No | No | No | No | No | No | No SSL 3.0 or TLS support | Vulnerable | Vulnerable | Vulnerable | — | |||||
3 | Yes | Yes [55] | No | No | No | No | No | No | No | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | ? | |||
4, 5, 6 | Windows 3.1, 95, 98, NT, 2000 [n 21] [n 22] Mac OS 7.1, 8, X, Solaris, HP-UX | Yes | Yes | Disabled by default [55] | No | No | No | No | No | No | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Yes [n 10] | ||
6 | Windows XP [n 22] | Yes | Yes | Disabled by default | No | No | No | No | Yes (Since SP3) [n 23] [56] | No | Mitigated | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Yes [n 10] | ||
7, 8 | Disabled by default [57] | Yes | Yes [57] | No | No | No | Yes | Yes (Since SP3) [n 23] [56] | No | Mitigated | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Yes [n 10] | |||
6 | Server 2003 [n 22] | Yes | Yes | Disabled by default | No | No | No | No | Yes (KB938397+KB968730) [n 23] [56] | No | Mitigated | Not affected | Vulnerable | Vulnerable | Mitigated [60] | Mitigated [61] | Yes [n 10] | ||
7, 8 | Disabled by default [57] | Yes | Yes [57] | No | No | No | Yes | Yes (KB938397+KB968730) [n 23] [56] | No | Mitigated | Not affected | Vulnerable | Vulnerable | Mitigated [60] | Mitigated [61] | Yes [n 10] | |||
7, 8, 9 | Windows Vista | Disabled by default | Yes | Yes | No | No | No | Yes | Yes | Yes [3] | Mitigated | Not affected | Vulnerable | Vulnerable | Mitigated [60] | Mitigated [61] | Yes [n 10] | ||
7, 8, 9 | Server 2008 | Disabled by default | Yes | Yes | Disabled by default [62] (KB4019276) [n 24] | Disabled by default [62] (KB4019276) [n 24] | No | Yes | Yes | Yes [3] | Mitigated | Not affected | Vulnerable | Vulnerable | Mitigated [60] | Mitigated [61] | Yes [n 10] | ||
8, 9, 10 | 7, 8 Server 2008 R2 Server 2012 | Disabled by default | Yes | Yes | Disabled by default [n 24] [64] | Disabled by default [n 24] [64] | No | Yes | Yes | Yes | Mitigated | Not affected | Vulnerable | Lowest priority [65] [n 25] | Mitigated [60] | Mitigated [61] | Yes [n 10] | ||
Internet Explorer 11 [n 20] Windows Schannel | 11 [n 26] [67] | 7, 8.1 Server 2008 R2 Server 2012 [67] Server 2012 R2 | Disabled by default | Disabled by default [n 27] | Disabled by default [n 28] | Disabled by default [n 24] [n 28] | Yes [n 24] [73] | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated [n 27] | Disabled by default [n 16] | Mitigated [60] | Mitigated [61] | Yes [n 10] | |
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Microsoft Edge (12–18) (EdgeHTML-based) Client only Internet Explorer 11 [n 20] Windows Schannel | 11 | 12–13 | Windows 10 1507–1511 | Disabled by default | Yes [63] | Yes | Yes | Yes [n 24] | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] |
11 | 14–18 (client only) | Windows 10 1607–2004 Windows Server (SAC) 1709–2004 | No [74] | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |
Internet Explorer 11 [n 20] Windows Schannel | 11 [n 29] | Windows 10 20H2–21H2 Windows Server (SAC) 20H2 | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |
Windows 10 22H2 | |||||||||||||||||||
Windows Schannel | Windows 11 21H2 | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes [63] | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | ||
Windows 11 22H2 (Home/Pro) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows 11 22H2 (Ent/Edu) | |||||||||||||||||||
Windows 11 23H2 (Home/Pro) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows 11 23H2 (Ent/Edu) | |||||||||||||||||||
Windows 11 24H2 | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Internet Explorer 11 [n 20] LTSB/LTSC Windows Schannel LTSB/LTSC | 11 | Windows 10 LTSB 2015 (1507) | Disabled by default | Yes [63] | Disabled by default [n 28] | Disabled by default [n 28] | Yes [n 24] | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |
Windows 10 LTSB 2016 (1607) | No [74] | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows Server 2016 (LTSB/1607) | No [74] | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows 10 LTSC 2019 (1809) Windows Server 2019 (LTSC/1809) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows 10 LTSC 2021 (21H2) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | No [63] | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows Server 2022 (LTSC/21H2) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Windows Schannel LTSC | Windows 11 LTSC 2024 (24H2) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | ||
Windows Server 2025 (LTSC/24H2) | No | Disabled by default | Disabled by default [n 28] | Disabled by default [n 28] | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | Yes [n 10] | |||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Microsoft Internet Explorer Mobile [n 20] | 7–9 | Windows Phone 7, 7.5, 7.8 | Disabled by default [57] | Yes | Yes | No[ citation needed ] | No[ citation needed ] | No | No[ citation needed ] | Yes | Yes [77] | ? | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Only with 3rd party tools [n 30] | |
10 | Windows Phone 8 | Disabled by default | Yes | Yes | Disabled by default [79] | Disabled by default [79] | No | No[ citation needed ] | Yes | Yes [80] | Mitigated | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Only with 3rd party tools [n 30] | ||
11 | Windows Phone 8.1 | Disabled by default | Yes | Yes | Yes [81] | Yes [81] | No | No[ citation needed ] | Yes | Yes | Mitigated | Not affected | Vulnerable | Only as fallback [n 15] [82] [83] | Vulnerable | Vulnerable | Only with 3rd party tools [n 30] | ||
Microsoft Edge (13–15) (EdgeHTML-based) [n 31] | 13 | Windows 10 Mobile 1511 | Disabled by default | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | No | |
14, 15 | Windows 10 Mobile 1607–1709 | No [74] | Disabled by default | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Apple Safari [n 32] | 1 | Mac OS X 10.2, 10.3 | No [88] | Yes | Yes | No | No | No | No | No | No | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | |
2–5 | Mac OS X 10.4, 10.5, Win XP | No | Yes | Yes | No | No | No | Yes (Since v3.2) | No | No | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
3–5 | Vista, Win 7 | No | Yes | Yes | No | No | No | Yes (Since v3.2) | No | Yes [77] | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
4–6 | Mac OS X 10.6, 10.7 | No | Yes | Yes | No | No | No | Yes | Yes [2] | Yes [3] | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
6 | OS X 10.8 | No | Yes | Yes | No | No | No | Yes | Yes | Yes [3] | Mitigated [n 33] | Not affected | Mitigated [n 34] | Vulnerable [n 34] | Mitigated [94] | Vulnerable | No | ||
7, 9 | OS X 10.9 | No | Yes | Yes | Yes [95] | Yes [95] | No | Yes | Yes | Yes | Mitigated [90] | Not affected | Mitigated [n 34] | Vulnerable [n 34] | Mitigated [94] | Vulnerable | No | ||
8–10 | OS X 10.10 | No | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated [n 34] | Lowest priority [96] [n 34] | Mitigated [94] | Mitigated [97] | No | ||
9–11 | OS X 10.11 | No | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Lowest priority | Mitigated | Mitigated | No | ||
10–15 | macOS 10.12, 10.13, 10.14, 10.15 | No | No | Yes | Yes | Yes | Yes (Since macOS 10.14.4) [98] | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
14–16 | macOS 11 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
15–17 | macOS 12 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
16, 17 | 18 | macOS 13 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | |
17 | 18 | macOS 14 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | |
18 | macOS 15 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user | |
Apple Safari (mobile) [n 35] | 3 | iPhone OS 1, 2 | No [102] | Yes | Yes | No | No | No | No | No | No | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | |
4, 5 | iPhone OS 3, iOS 4 | No | Yes | Yes | No | No | No | Yes [103] | Yes | Yes (Since iOS 4) [77] | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
5, 6 | iOS 5, 6 | No | Yes | Yes | Yes [99] | Yes [99] | No | Yes | Yes | Yes | Vulnerable | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
7 | iOS 7 | No | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes [104] | Mitigated [105] | Not affected | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
8 | iOS 8 | No | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Mitigated [n 34] | Lowest priority [106] [n 34] | Mitigated [107] | Mitigated [108] | No | ||
9 | iOS 9 | No | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Lowest priority | Mitigated | Mitigated | No | ||
10, 11 | iOS 10, 11 | No | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
12–14 | iOS 12, 13, 14 | No | No | Yes | Yes | Yes | Yes (Since iOS 12.2) [98] | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
iPadOS 13, 14 | |||||||||||||||||||
15 | iOS 15 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
iPadOS 15 | |||||||||||||||||||
16 | iOS 16 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
iPadOS 16 | |||||||||||||||||||
17 | iOS 17 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
iPadOS 17 | |||||||||||||||||||
18 | iOS 18 | No | No | ? | ? | Yes | Yes | Yes | Yes | Yes | Mitigated | Not affected | Not affected | Disabled by default [n 16] | Mitigated | Mitigated | No | ||
iPadOS 18 | |||||||||||||||||||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV [n 3] | SHA-2 | ECDSA | BEAST [n 4] | CRIME [n 5] | POODLE (SSLv3) [n 6] | RC4 [n 7] | FREAK [4] [5] | Logjam | Protocol selection by user | |
Google Android OS [109] | Android 1.0–4.0.4 | No | Yes | Yes | No | No | No | ? | Yes [2] | Yes (Since 3.0) [77] [3] | ? | ? | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | ||
Android 4.1–4.4.4 | No | Yes | Yes | Disabled by default [110] | Disabled by default [110] | No | ? | Yes | Yes | ? | ? | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | |||
Android 5.0–5.0.2 | No | Yes | Yes | Yes [110] [111] | Yes [110] [111] | No | ? | Yes | Yes | ? | ? | Vulnerable | Vulnerable | Vulnerable | Vulnerable | No | |||
Android 5.1–5.1.1 | No | Disabled by default[ citation needed ] | Yes | Yes | Yes | No | ? | Yes | Yes | ? | ? | Not affected | Only as fallback [n 15] | Mitigated | Mitigated | No | |||
Android 6.0–7.1.2 | No | Disabled by default[ citation needed ] | Yes | Yes | Yes | No | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 8.0–9 | No | No [112] | Yes | Yes | Yes | No | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 10–11 | No | No | Yes | Yes | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 12 | No | No | Yes | Yes | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 12L | No | No | Yes | Yes | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 13 | No | No | Yes | Yes | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 14 | No | No | Yes | Yes | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 15 | No | No | ? | ? | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Android 16 | No | No | ? | ? | Yes | Yes | ? | Yes | Yes | ? | ? | Not affected | Disabled by default | Mitigated | Mitigated | No | |||
Browser or OS API | Version | Platforms | SSL 2.0 (insecure) | SSL 3.0 (insecure) | TLS 1.0 (deprecated) | TLS 1.1 (deprecated) | TLS 1.2 | TLS 1.3 | EV certificate | SHA-2 certificate | ECDSA certificate | BEAST | CRIME | POODLE (SSLv3) | RC4 | FREAK | Logjam | Protocol selection by user |
Color or Note | Significance | |
---|---|---|
Browser version | Platform | |
Browser version | Operating system | Future release; under development |
Browser version | Operating system | Current latest release |
Browser version | Operating system | Former release; still supported |
Browser version | Operating system | Former release; long-term support still active, but will end in less than 12 months |
Browser version | Operating system | Former release; no longer supported |
— | Operating system | Mixed/Unspecified |
Operating system (Version+) | Minimum required operating system version (for supported versions of the browser) | |
No longer supported for this operating system |
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.
In cryptography, RC4 is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.
In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed by Mitsubishi Electric and NTT of Japan. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. The cipher has security levels and processing abilities comparable to the Advanced Encryption Standard.
The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is described in RFC 6960 and is on the Internet standards track. It was created as an alternative to certificate revocation lists (CRL), specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and are usually communicated over HTTP. The "request/response" nature of these messages leads to OCSP servers being termed OCSP responders.
This is a comparison of both historical and current web browsers based on developer, engine, platform(s), releases, license, and cost.
SEED is a block cipher developed by the Korea Information Security Agency (KISA). It is used broadly throughout South Korean industry, but seldom found elsewhere. It gained popularity in Korea because 40-bit encryption was not considered strong enough, so the Korea Information Security Agency developed its own standard. However, this decision has historically limited the competition of web browsers in Korea, as no major SSL libraries or web browsers supported the SEED algorithm, requiring users to use an ActiveX control in Internet Explorer for secure web sites.
Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees. The DTLS protocol datagram preserves the semantics of the underlying transport—the application does not suffer from the delays associated with stream protocols, but because it uses User Datagram Protocol (UDP) or Stream Control Transmission Protocol (SCTP), the application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP rather than TCP it avoids the TCP meltdown problem when being used to create a VPN tunnel.
The Online Certificate Status Protocol (OCSP) stapling, formally known as the TLS Certificate Status Request extension, is a standard for checking the revocation status of X.509 digital certificates. It allows the presenter of a certificate to bear the resource cost involved in providing Online Certificate Status Protocol (OCSP) responses by appending ("stapling") a time-stamped OCSP response signed by the CA to the initial TLS handshake, eliminating the need for clients to contact the CA, with the aim of improving both security and performance.
WebGL is a JavaScript API for rendering interactive 2D and 3D graphics within any compatible web browser without the use of plug-ins. WebGL is fully integrated with other web standards, allowing GPU-accelerated usage of physics, image processing, and effects in the HTML canvas. WebGL elements can be mixed with other HTML elements and composited with other parts of the page or page background.
SPDY is an obsolete open-specification communication protocol developed for transporting web content. SPDY became the basis for HTTP/2 specification. However, HTTP/2 diverged from SPDY and eventually HTTP/2 subsumed all usecases of SPDY. After HTTP/2 was ratified as a standard, major implementers, including Google, Mozilla, and Apple, deprecated SPDY in favor of HTTP/2. Since 2021, no modern browser supports SPDY.
HTTP Strict Transport Security (HSTS) is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. It allows web servers to declare that web browsers should automatically interact with it using only HTTPS connections, which provide Transport Layer Security (TLS/SSL), unlike the insecure HTTP used alone. HSTS is an IETF standards track protocol and is specified in RFC 6797.
A cipher suite is a set of algorithms that help secure a network connection. Suites typically use Transport Layer Security (TLS) or its deprecated predecessor Secure Socket Layer (SSL). The set of algorithms that cipher suites usually contain include: a key exchange algorithm, a bulk encryption algorithm, and a message authentication code (MAC) algorithm.
StartCom was a certificate authority founded in Eilat, Israel, and later based in Beijing, China, that had three main activities: StartCom Enterprise Linux, StartSSL and MediaHost. StartCom set up branch offices in China, Hong Kong, the United Kingdom and Spain. Due to multiple faults on the company's end, all StartCom certificates were removed from Mozilla Firefox in October 2016 and Google Chrome in March 2017, including certificates previously issued, with similar removals from other browsers expected to follow.
The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most notable libraries. There are several TLS implementations which are free software and open source.
Firefox was created by Dave Hyatt and Blake Ross as an experimental branch of the Mozilla browser, first released as Firefox 1.0 on November 9, 2004. Starting with version 5.0, a rapid release cycle was put into effect, resulting in a new major version release every six weeks. This was gradually accelerated further in late 2019, so that new major releases occur on four-week cycles starting in 2020.
Application-Layer Protocol Negotiation (ALPN) is a Transport Layer Security (TLS) extension that allows the application layer to negotiate which protocol should be performed over a secure connection in a manner that avoids additional round trips and which is independent of the application-layer protocols. It is used to establish HTTP/2 connections without additional round trips.
POODLE is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo Möller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014. On December 8, 2014, a variation of the POODLE vulnerability that affected TLS was announced.
FREAK is a security exploit of a cryptographic weakness in the SSL/TLS protocols introduced decades earlier for compliance with U.S. cryptography export regulations. These involved limiting exportable software to use only public key pairs with RSA moduli of 512 bits or fewer, with the intention of allowing them to be broken easily by the National Security Agency (NSA), but not by other organizations with lesser computing resources. However, by the early 2010s, increases in computing power meant that they could be broken by anyone with access to relatively modest computing resources using the well-known Number Field Sieve algorithm, using as little as $100 of cloud computing services. Combined with the ability of a man-in-the-middle attack to manipulate the initial cipher suite negotiation between the endpoints in the connection and the fact that the finished hash only depended on the master secret, this meant that a man-in-the-middle attack with only a modest amount of computation could break the security of any website that allowed the use of 512-bit export-grade keys. While the exploit was only discovered in 2015, its underlying vulnerabilities had been present for many years, dating back to the 1990s.
DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. By March 2018, Google and the Mozilla Foundation had started testing versions of DNS over HTTPS. In February 2020, Firefox switched to DNS over HTTPS by default for users in the United States. In May 2020, Chrome switched to DNS over HTTPS by default.
kSSLProtocol2
is deprecated in iOS