Disable TLS 1.0 and 1.1 in Firefox Now!
Mozilla had planned to disable the insecure versions 1.0 and 1.1 of the TLS protocol in Firefox 74. Unfortunately, they reverted that planned change. This post explains how to disable insecure TLS versions yourself.
How to Disable TLS 1.0 and 1.1
The tl;dr version of this article:
- Open a new tab and navigate to
about:config
- In the search box type
security.tls.version.min
- Set the value to
3
and click the save icon
Why Did Mozilla Revert the Change?
The release notes for Firefox 74.0 state the following:
We reverted the change for an undetermined amount of time to better enable access to critical government sites sharing COVID19 information.
Government websites from the digital stone age. Yuck!
Explanation of the security.tls.version.min Setting
The only documentation of the security.tls.version.min
setting seems to be on mozillaZine, apparently a non-HTTPS site:
- 0
- The minimum required SSL/TLS version is SSL 3.0
- 1
- The minimum required SSL/TLS version is TLS 1.0
- 2
- The minimum required SSL/TLS version is TLS 1.1
- 3
- The minimum required SSL/TLS version is TLS 1.2
- 4
- The minimum required SSL/TLS version is TLS 1.3
How to Check Your Browser’s TLS Configuration
Head over to Qualys Labs. The topmost box of the report should look like this:
4 Comments
If you enable the TLS 1.0/1.1 and want to turn it off again, change the about:config setting `security.tls.version.enable-deprecated` from true(older TLS is allowed) to false. This can be verified with the Qualys Labs link where you will see “Yes” next to the older versions when enabled and “No” when disabled(assumed to be “default” or as-installed). Not sure how exactly this setting and “min”above reconcile differences.
Qualys Labs link was very helpful. Sharing wealth of knowledge.
It is good for Firefox to allow the user to modify the browser settings that will enable older security formats. There are still many reasons to have these older security formats accessible and essentially usable in the most modern of browsers.
It should be the client’s choice to determine what level of security is enough for any website they wish to surf.
Authoritarianism is a terrible way to do things.
Shame on you Chrome web browser! A warning page can be acceptable (as long as it can be disabled as well), but users should be able to surf the websites they wish to surf.
No
And it’s especially troublesome if the older TLS is from an admin console for a server that hasn’t had a firmware update since 2011. So what would be this blogger’s solution, throw out perfectly servicable hardware?