Mozilla VPN is currently experiencing an outage. Our team is actively working to resolve the issue. Please check the status page for real-time updates. Thank you for your patience.

Vyhľadajte odpoveď

Vyhnite sa podvodom s podporou. Nikdy vás nebudeme žiadať, aby ste zavolali alebo poslali SMS na telefónne číslo alebo zdieľali osobné informácie. Nahláste prosím podozrivú aktivitu použitím voľby “Nahlásiť zneužitie”.

Ďalšie informácie

Client Hello is TLS 1.0 in handshake on HTTPS site

more options

In handshake SSL, Firefox send a Client Hello packet. It's is TLS 1.0. Server send RST packet. I try force using TLS 1.2 with parameter security.tls.version.min=3, It is identical

In handshake SSL, Firefox send a Client Hello packet. It's is TLS 1.0. Server send RST packet. I try force using TLS 1.2 with parameter security.tls.version.min=3, It is identical

Všetky odpovede (5)

more options

I add picture of client hello packet and RST packet

more options

This is not the best forum to solve this problem, I don't think.

Here's a similar thread on StackExchange:

https://security.stackexchange.com/questions/96804/server-sends-rst-after-receiving-client-hello-when-binding-certain-certificate

more options

jscher2000 said

This is not the best forum to solve this problem, I don't think. Here's a similar thread on StackExchange: https://security.stackexchange.com/questions/96804/server-sends-rst-after-receiving-client-hello-when-binding-certain-certificate

Thanks for link.

I posted in this forum because this problem is only with firefox. I add picture of ssllabs.com on website.

TLS 1.2 is only activate on this server.

more options

I added picture with protocols are enabled on website (result of ssllabs.com)

more options

Do you want to file a bug suggesting that Firefox should be doing something different:

https://bugzilla.mozilla.org/enter_bug.cgi