Hi folks,

Here are the results of our experiment with Firefox Nightly (draft-22)
against Facebook.

EXPERIMENTAL DESIGN
This is a forced experiment in which each client tries all the
variants. The experiment is deployed via a system add-on (a remotely
deployable, centrally managed piece of JavaScript code), and then
takes measurements by trying to do an XHR to a given URL
(https://www.tls13.facebook.com/) with a specific set of flags. We
do the following three measurements:

- TLS 1.2
- TLS 1.3 draft-22
- TLS 1.3 draft-22 in compat mode.

We take five trials for each measurement, randomly shuffling the
measurement order and then repeating the shuffled pattern five
times. Each trial is done with a different connection and we declare
"success" when any of the five trials succeeds.


RESULTS
This experiment was run on a 40% sample of the Firefox Nightly population
who have locale set to en-US. The data below is taken from the period
20171216 to 20171222. There's a bit of contamination in the targeting
because we temporarily failed to filter on "en-US", but that should
mostly only affect the first day.

37716 clients started the experiment and 37430 completed it (99.2%).

The results are:

                                    Success         Fail         Rate
                      fb-tls12        35615         1815     0.048491
             fb-tls13-draft-22        35552         1878     0.050174
       fb-tls13-draft22-compat        35630         1800     0.048090

The overall failure numbers here are a lot higher than with our Beta
experiment, which may be a result of different targeting on Nightly
versus Beta. In particular, I'm still seeing a lot of data from China
and Vietnam, which seem to have high blocking rates in general (i.e.,
not just for TLS 1.3). If I restrict to non China and non-Vietnam, we
get:

                                    Success         Fail         Rate
                      fb-tls12        35034         1176     0.032477
             fb-tls13-draft-22        34960         1250     0.034521
       fb-tls13-draft22-compat        35037         1173     0.032394

None of these differences are statistically significant (in the second
data set, the p value for 1.2 versus -22 is .13), but this all seems
consistent with saying that that -22 compat mode isn't significantly
worse than TLS 1.2 and that normal -22 may be somewhat worse
(unfortunately, we don't have -18 in this experiment).

Taken together with the results David has reported and our previously
reported Beta results, this seems fairly encouraging. We'll probably
let the Nightly experiment run a little longer to see if we hit
significance,
but after that will start looking at a rollout of -22 to Release.

-Ekr


ADDITIONAL DETAILS
Experimental code:
https://github.com/mozilla/one-off-system-add-ons/tree/master/addons/tls13-middlebox-draft22
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to