Closed Bug 1771972 Opened 3 years ago Closed 3 years ago

With TLS 1.3 disabled in the config settings, Firefox still connects to websites with TLS 1.3

Categories

(Core :: Networking, defect, P2)

Desktop
All
defect

Tracking

()

RESOLVED FIXED
106 Branch
Tracking Status
firefox-esr91 --- wontfix
firefox-esr102 --- wontfix
firefox101 --- wontfix
firefox102 --- wontfix
firefox103 --- wontfix
firefox104 --- wontfix
firefox105 --- wontfix
firefox106 --- fixed

People

(Reporter: only1ryan, Assigned: dragana)

Details

(Keywords: reporter-external, Whiteboard: [necko-priority-queue][necko-triaged])

Attachments

(1 file)

User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0

Steps to reproduce:

In Firefox I went to about:config and set

security.tls.version.max = 3

which disabled TLS 1.3 and left TLS 1.2 as the highest security setting. I checked the browser at ssllabs.com, which confirmed TLS 1.2 was the highest available protocol and listed the appropriate cipher suites.

Actual results:

A number of websites (e.g. Google, Facebook, Youtube) connected with TLS 1.3 and a new cipher suite. That is what I learned when I clicked on the lockbox in the address bar.

Expected results:

Why did Firefox not respect the new setting? I have toggled

security.tls.version.fallback-limit

between 3 and 4, but it does not seem to make any difference. Also, how does a person choose the cipher suites for TLS 1.3? They do not seem to be listed under

security.ssl3

in the about:config settings. Thanks.

I managed to reproduce this only on youtube.com from the examples provided above on Firefox 100.0.2, Firefox 102.0b2 and on Firefox 103.0a1, and it was connected with TLS 1.3 instead of TLS 1.2.
On Firefox 91.10.0esr I managed to reproduce the issue also on google.com.
I'm not sure is "Security" component is the right one, please feel free to change it if you think otherwise.

Severity: -- → S3
Status: UNCONFIRMED → NEW
Component: Untriaged → Security
Ever confirmed: true
OS: Unspecified → All
Hardware: Unspecified → Desktop

Did you clear the cache before connecting to those sites?

Flags: needinfo?(only1ryan)

Each time I start Firefox I make it a point to go to the Privacy and Security settings and clear the Cookies and Site Data.

Flags: needinfo?(only1ryan)

What about the network cache, though? (it's called "Cache" in that UI)

Flags: needinfo?(only1ryan)

Sorry about that. I also clear the one called "Cached Web Content."

Flags: needinfo?(only1ryan)

I think what's going on is we're getting an h3 alt-svc header and necko is using that when it probably shouldn't, if TLS 1.3 is disabled.

Severity: S3 → --
Component: Security → Networking
Product: Firefox → Core
Version: Firefox 91 → unspecified

I think it should not be too difficult to add a check in necko to see if TLS 1.3 is enabled.
Put this to our priority queue candidate and wait for review.

Whiteboard: [necko-priority-review]

The reporter asked through security@mozilla.org to nominate this for the bug bounty program. We will make our decision only after the bug has been fixed. However, given the information that is currently present and given that this is not considered a security bug as per https://wiki.mozilla.org/Security_Severity_Ratings/Client, it is likely that this will not be rewarded a bounty. (Final decision at the discretion of the bug bounty committee.)

Flags: sec-bounty?

Dragana can you please review and see if this is for Necko.

Flags: needinfo?(dd.mozilla)

The prefs are handled by PSM. Moving to the right component.

Component: Networking → Security: PSM
Flags: needinfo?(dd.mozilla)

PSM handles the prefs, but Necko needs to do the appropriate thing based on the values of the perfs (namely, disregard h3 alt-svc headers if TLS 1.3 isn't enabled).

Component: Security: PSM → Networking
Severity: -- → S3
Priority: -- → P2
Whiteboard: [necko-priority-review] → [necko-priority-queue]
Assignee: nobody → dd.mozilla
Status: NEW → ASSIGNED
Whiteboard: [necko-priority-queue] → [necko-priority-queue][necko-triaged]
Pushed by ddamjanovic@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/d4ebe7f7af0f Disable HTTP/3 if TLS 1.3 is disabled r=necko-reviewers,valentin
Status: ASSIGNED → RESOLVED
Closed: 3 years ago
Resolution: --- → FIXED
Target Milestone: --- → 106 Branch
Flags: sec-bounty? → sec-bounty-
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: