diff --git a/README.md b/README.md index c0a1ccb6..b22df745 100644 --- a/README.md +++ b/README.md @@ -388,6 +388,7 @@ This section tweaks the cipher suites used by Firefox. The idea is to support on * Enable ChaCha20 and Poly1305 (Firefox >= 47) [ [1](https://www.mozilla.org/en-US/firefox/47.0/releasenotes/) [2](https://tools.ietf.org/html/rfc7905) [3](https://bugzilla.mozilla.org/show_bug.cgi?id=917571) [4](https://bugzilla.mozilla.org/show_bug.cgi?id=1247860) [5](https://cr.yp.to/chacha.html) ] * Disable ciphers susceptible to the logjam attack [ [1](https://weakdh.org/) ] * Disable ciphers with DSA (max 1024 bits) +* Enable X25519Kyber768Draft00 (post-quantum key exchange) [FF Nightly 2024-01-18+] [ [1](https://datatracker.ietf.org/doc/draft-tls-westerbaan-xyber768d00/) [2](https://twitter.com/bwesterb/status/1748017372764475519) [3](https://pq.cloudflareresearch.com/) ] ------------------------------------------------------------------------- diff --git a/user.js b/user.js index 268daea7..497927cf 100644 --- a/user.js +++ b/user.js @@ -1240,3 +1240,9 @@ user_pref("security.ssl3.dhe_dss_camellia_256_sha", false); //user_pref("security.ssl3.rsa_aes_128_sha", false); // 0x2f //user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // 0xc014 //user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // 0xc00a + +// PREF: Enable X25519Kyber768Draft00 (post-quantum key exchange) [FF Nightly 2024-01-18+] +// https://datatracker.ietf.org/doc/draft-tls-westerbaan-xyber768d00/ +// https://twitter.com/bwesterb/status/1748017372764475519 +// https://pq.cloudflareresearch.com/ +user_pref("security.tls.enable_kyber", true);