The Evolution of Web Security: Unpacking TLS 1.2 and TLS 1.3


Numbers often paint a clearer picture than words. In September 2023, out of 135,583 sites surveyed, an intriguing 64.8% supported TLS v1.3, marking a 0.6% increase from just a month prior. On the other hand, a staggering 99.9% still supported TLS v1.2. These statistics caught my eye and prompted me to explore the underlying differences between TLS 1.2 and TLS 1.3. 

Furthermore, in the same survey a staggering 37.5% of the most popular websites in the world have inadequate security which could be susceptible to Insecure Renegotiation and the BEAST attack.

The near-universal adoption of TLS v1.2 reflects its long-standing influence in our digital world. Yet, the incremental yet steady growth in TLS v1.3 adoption is a strong indicator of where we’re headed. The modest 0.6% increase month-over-month may not seem groundbreaking, but it represents a significant number of sites opting for a more secure and efficient protocol. These trends validate what I’ve been noticing—an ongoing transition towards enhanced security and performance. 

So, what is TLS and Why is It Important?

Before diving into the differences between the two versions, let’s discuss what TLS actually is and why it’s so crucial in today’s digital age. TLS, or Transport Layer Security, is a cryptographic protocol designed to provide secure communications over a computer network. In simpler terms, it’s the technology that encrypts the data sent between your web browser and a server, ensuring that sensitive information such as login credentials, financial data, or personal details remain private and protected.

The importance of TLS cannot be overstated. In a world where cyber-attacks are increasingly sophisticated and common, the role of secure communication channels is vital. Without TLS, any data transmitted over the internet would be easily accessible to cybercriminals, putting both individuals and organisations at risk.

A Glimpse at TLS 1.2

Launched in 2008, TLS 1.2 emerged as a significant improvement over its forerunners. It expanded the variety of cipher suites and introduced features like authenticated encryption, strengthening its security capabilities.

An Introduction to TLS 1.3

Fast forward to 2018, and TLS 1.3 bursts onto the scene. Aiming for a minimalist approach, TLS 1.3 focuses on enhancing speed and security, effectively cutting off the unnecessary frills and insecure features.

Summary of the differences

Delving into the Key Differences

Handshake Process

In TLS 1.2, the handshake process involves two primary phases—first is the “ClientHello” message followed by a “ServerHello” message, and then the client and server exchange several more messages to establish encryption settings and authentication. Each phase requires a round-trip, adding latency to the entire process.

In contrast, TLS 1.3 has streamlined this operation down to just a single round-trip. The server configuration is either remembered by the client or presented in an encrypted extension, meaning the process moves directly from “ClientHello” to sharing encrypted data. This efficiency reduces connection times and is especially beneficial in mobile environments where latency is a frequent concern.

Cipher Suites

TLS 1.2 supports a wide variety of cipher suites, including many that are no longer considered secure, like RC4. This opens up potential vulnerabilities and necessitates careful server configuration to avoid weak ciphers.

TLS 1.3, however, reduces this risk by supporting a more constrained list of cipher suites, all of which offer robust security. For instance, the only bulk encryption algorithms supported are AES-GCM, AES-CCM, and ChaCha20-Poly1305, all of which are highly secure and efficient.

Session Resumption

In TLS 1.2, session resumption is facilitated through Session IDs or Session Tickets. Although these methods are secure, they often involve storing state information on the server or the client, impacting scalability and requiring more computational resources.

TLS 1.3 adopts a more efficient approach using Pre-shared Keys (PSK) for session resumption, eliminating the need for storing state information and enabling quicker and more secure resumption of previous sessions.

Legacy Algorithms

TLS 1.2 is more lenient in supporting legacy algorithms, some of which are insecure or less efficient, such as SHA-1 for hashing. This backward compatibility can sometimes be a drawback, as it exposes the network to vulnerabilities inherent in older algorithms.

In contrast, TLS 1.3 eliminates this issue by deprecating all legacy algorithms deemed insecure, focusing solely on strong and efficient cryptographic primitives.

Forward Secrecy

In TLS 1.2, Forward Secrecy is optional and relies on the server configuration to be enabled, which means that previous encrypted sessions may be compromised if the server’s private key is exposed.

In TLS 1.3, Forward Secrecy is not an optional feature but a mandatory one. This ensures that even if a server’s long-term secret key is compromised, past sessions remain secure.

Zero Round-Trip Time (0-RTT)

Zero Round-Trip Time (0-RTT) is a new feature exclusive to TLS 1.3. This feature enables clients to send data to the server in the very first round-trip, without waiting for the server’s acknowledgment. This reduces latency significantly but does come with some potential replay attack risks, which is why it is often best suited for idempotent operations.

Implications for Certificate Inspection and Man-in-the-Middle on Firewalls

The Traditional Role of MITM in Firewalls

Man-in-the-Middle (MITM) techniques have historically been a significant component of firewall setups for enterprises. By intercepting and decrypting SSL/TLS traffic, the firewall could inspect the data for malicious content before re-encrypting and sending it to its intended destination. This has long been considered a necessary trade-off to balance security and visibility within an organisation’s network.

Challenges Posed by TLS 1.3

TLS 1.3 introduces several changes that render traditional MITM techniques less effective, or at least more challenging to implement:

  1. Removal of Certain Cipher Suites – TLS 1.3’s trimmed-down list of cipher suites means that older, insecure, but more easily inspectable cipher suites are no longer an option. Firewalls that depended on these for easier decryption will have to adapt.
  2. Mandatory Forward Secrecy – Forward Secrecy ensures that even if a server’s private key is compromised, historical encrypted traffic cannot be decrypted. While this is excellent for privacy and security, it poses a challenge for firewalls that rely on static keys for decryption.
  3. Encrypted Server Parameters – In TLS 1.3, much of the handshake metadata itself is encrypted, making it harder for a MITM device to determine the specifics of the encrypted session. Previously, some firewalls relied on this metadata for decision-making in security policies.
  4. 0-RTT and Session Resumption – Features like Zero Round-Trip Time (0-RTT) for faster session resumption also complicate MITM strategies. Since the client can send encrypted data immediately, firewalls have a smaller window for inspection.

Adaptation Strategies for Firewalls

Given these changes, firewall vendors and security professionals are adapting their MITM approaches. Some of the strategies include:

  • Updating Cipher Suite Support – Firewalls must support the modern cipher suites that TLS 1.3 uses.
  • Dynamic Key Exchange – To accommodate forward secrecy, firewalls are moving toward techniques that allow for dynamic key exchanges between the firewall and the internal servers, effectively “participating” in the handshake rather than merely intercepting it.
  • Protocol Fingerprinting – As a workaround for the loss of visible metadata, some advanced firewalls are developing ways to fingerprint encrypted traffic based on other observable characteristics.
  • Selective Inspection – Given the challenges in decrypting TLS 1.3 traffic, some organisations are opting for a selective approach, focusing on inspecting only the traffic that matches certain risk profiles.

By understanding the technical implications of TLS 1.3 on traditional MITM strategies, organisations can better prepare their firewalls and security postures for the modern web landscape. It’s a shift that calls for proactive adaptation rather than reactive troubleshooting.

Final Thoughts

The progression from TLS 1.2 to TLS 1.3 isn’t just a technical upgrade; it’s a comprehensive overhaul that significantly enhances both security and efficiency. With cyber threats becoming increasingly sophisticated, the shift to TLS 1.3 is not just timely but also crucial for safeguarding data exchanges. For enterprises and security experts, understanding these changes is vital for adapting security strategies and ensuring that firewall setups are aligned with contemporary security standards.


Should you require access to any of these systems please log a ticket with or

Broadband Portal Login