docs/security/tls_configuration_history.md
OkHttp tracks the dynamic TLS ecosystem to balance connectivity and security. This page is a log of changes we've made over time to OkHttp's default TLS options.
2019-03-14
Remove 2 TLSv1.3 cipher suites that are neither available on OkHttp’s host platforms nor enabled in releases of Chrome and Firefox.
2019-02-04
Remove TLSv1.1 and TLSv1 from MODERN_TLS. Change COMPATIBLE_TLS to support all TLS versions.
2018-11-16
Added support for TLSv1.3.
2018-07-12
Added a new extra strict RESTRICTED_TLS configuration inspired by Google Cloud’s similar policy. It is appropriate when both the host platform (JVM/Conscrypt/Android) and target webserver are current.
2018-02-24
Remove two rarely-used cipher suites from the default set. This tracks a Chromium change to remove these cipher suites because they are fragile and rarely-used.
2016-11-30
Remove three old cipher suites and add five new ones. This tracks changes in what's available on Android and Java, and also what cipher suites recent releases of Chrome and Firefox support by default.
2016-01-13
<a name="tlsv13_only"></a>
Cipher suites that are only available with TLSv1.3.
<a name="http2_naughty"></a>
Cipher suites that are discouraged for use with HTTP/2. OkHttp includes them because better suites are not commonly available. For example, none of the better cipher suites listed above shipped with Android 4.4 or Java 7.