Where did you install Firefox from? Help Mozilla uncover 3rd party websites that offer problematic Firefox installation by taking part in our campaign. There will be swag, and you'll be featured in our blog if you manage to report at least 10 valid reports!

搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

Learn More

Client Hello is TLS 1.0 in handshake on HTTPS site

more options

In handshake SSL, Firefox send a Client Hello packet. It's is TLS 1.0. Server send RST packet. I try force using TLS 1.2 with parameter security.tls.version.min=3, It is identical

In handshake SSL, Firefox send a Client Hello packet. It's is TLS 1.0. Server send RST packet. I try force using TLS 1.2 with parameter security.tls.version.min=3, It is identical

所有回复 (5)

more options

I add picture of client hello packet and RST packet

more options

This is not the best forum to solve this problem, I don't think.

Here's a similar thread on StackExchange:

https://security.stackexchange.com/questions/96804/server-sends-rst-after-receiving-client-hello-when-binding-certain-certificate

more options

jscher2000 said

This is not the best forum to solve this problem, I don't think. Here's a similar thread on StackExchange: https://security.stackexchange.com/questions/96804/server-sends-rst-after-receiving-client-hello-when-binding-certain-certificate

Thanks for link.

I posted in this forum because this problem is only with firefox. I add picture of ssllabs.com on website.

TLS 1.2 is only activate on this server.

more options

I added picture with protocols are enabled on website (result of ssllabs.com)

more options

Do you want to file a bug suggesting that Firefox should be doing something different:

https://bugzilla.mozilla.org/enter_bug.cgi