Latest version of Firefox adopts HTTPS as the norm
General trend of migration to encrypted transport continues
General trend of migration to encrypted transport continues
When accessing a website, version 129 of the Firefox browser tries to use the HTTPS protocol before falling back on unencrypted transport. So, if you type www.example.nl into the navigation bar, Firefox begins by sending a request to 'https://www.example.nl/' (on server port 443). It'll try 'http://www.example.nl/' (on server port 80) only if the first request draws a blank. That's the reverse of the procedure followed until now.
The change means that TLS-encrypted transport is now the norm for Firefox users.
An HTTPS-Only Mode has been available in Firefox since 2020, but needed to be activated by the user. That mode is 'stricter' than the newly unveiled policy: when it's activated, all connections are encrypted, even if your link explicitly specifies the HTTP protocol. If the website in question can't be reached using HTTPS, the user gets a warning message. HTTP is then used only if the user actively opts for it by clicking a link in the warning.
Chrome has provided similar functionality since 2021, under the name HTTPS-First Mode. Google more recently enabled that mode by default for most users.
The change to Firefox is part of a general trend towards encrypted transport for the web. Historically, the A/AAAA record has merely stated the IP address at which a site's web server can be contacted. The choice of protocol is then either stated (in the form of 'http://' or 'https://') within any link to the site that's created, or established by first trying one corresponding port (80 or 443) and then, if necessary, the other.
However, HSTS (part of the HTTP protocol) and DANE for the web (part of DNS/DNSSEC) enable a website administrator to indicate whether their site can be accessed using HTTPS. In DANE, the TLS certificate or the CA chain is also specified. Unfortunately, however, the latter protocol isn't yet supported on the browser side.