Join the AMA (Ask Me Anything) with the Firefox leadership team to celebrate Firefox 20th anniversary and discuss Firefox’s future on Mozilla Connect. Mark your calendar on Thursday, November 14, 18:00 - 20:00 UTC!

搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

How to stop Firefox from sending TLS 1.0 even after disabled in settings.

  • 4 个回答
  • 1 人有此问题
  • 1 次查看
  • 最后回复者为 Mike Leimer

more options

Currently running Firefox 73.0.1.

Connections to my server from Firefox all fail with 'connection_reset' from the server.

Wireshark capture shows that Firefox is attempting a 'Client Hello' using TLS 1.0.

Servers are configured with TLS 1.0 removed/disabled.

All the Firefox advanced settings in about:config are set with TLS 1.2 as the minimum, yet Firefox insists on sending TLS 1.0 'client hello'.

Not an expert, but it kind of looks like Firefox is sending a TLS 1.2 'Client Hello' encapsulated inside a TLS 1.0 'Client Hello'? Is this even possible?

Chrome, IE, and Edge behave appropriately and send 'Client Hello' as TLS 1.2.

How do we get Firefox to send the appropriate 'Client Hello'?

This affects multiple versions of Firefox, even the beta builds that I tested over the weekend and occurs on any machine tested so far. Windows 10, various flavors of Linux, etc.

See screenshots below for configuration settings and wireshark capture.

Thanks for the help!

Currently running Firefox 73.0.1. Connections to my server from Firefox all fail with 'connection_reset' from the server. Wireshark capture shows that Firefox is attempting a 'Client Hello' using TLS 1.0. Servers are configured with TLS 1.0 removed/disabled. All the Firefox advanced settings in about:config are set with TLS 1.2 as the minimum, yet Firefox insists on sending TLS 1.0 'client hello'. Not an expert, but it kind of looks like Firefox is sending a TLS 1.2 'Client Hello' encapsulated inside a TLS 1.0 'Client Hello'? Is this even possible? Chrome, IE, and Edge behave appropriately and send 'Client Hello' as TLS 1.2. How do we get Firefox to send the appropriate 'Client Hello'? This affects multiple versions of Firefox, even the beta builds that I tested over the weekend and occurs on any machine tested so far. Windows 10, various flavors of Linux, etc. See screenshots below for configuration settings and wireshark capture. Thanks for the help!
已附加屏幕截图

所有回复 (4)

more options

What about security.tls.hello_downgrade_check?

more options

Thank you for the help!

When I attempted the connection earlier, security.tls.hello_downgrade_check was set to the default of 'true'.

I changed security.tls.hello_downgrade_check to be 'false', went to 'Preferences | Privacy & Security | Cookies and Site Data' and cleared all data. Then I closed the browser and rebooted the VM.

Still I get a TLS1.0 'Client Hello' just as before.

more options

Mike Leimer said

Then I closed the browser and rebooted the VM.

Is there anything in the VM that might be proxying the connection from Firefox?

more options

Sorry for the added confusion there, nothing is set up to proxy the VM, networking is set up to NAT my workstation network connection.

Additionally, I see the same behavior on any of the physical machines that I have tested on as well.

I have just been using a VM on my workstation for convenience and to grab the screenshots for this post, but the behavior is identical to physical PC's in this context.

  • As an interesting note, during this troubleshooting I did install Fiddler on one of the physical workstations.

Using Fiddler as a proxy, the Wireshark capture *does* show a TLS1.2 'Client Hello' and the connections to my website *does* complete successfully, so it appears that Fiddler is sending the appropriate TLS1.2 request on behalf of Firefox. I'm not sure if this means anything, or nothing but I thought I'd share it as a data point.