Windows Firefox Kerberos authentication broken with Extended protection set to allow on ADFS server with a SHA384 SSL certificate
Categories
(Core :: Networking, defect, P2)
Tracking
()
People
(Reporter: msmorris, Assigned: valentin)
References
(Blocks 1 open bug)
Details
(Whiteboard: [necko-triaged][necko-priority-queue])
Attachments
(2 files)
|
48 bytes,
text/x-phabricator-request
|
Details | Review | |
|
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-esr140+
|
Details | Review |
Steps to reproduce:
- Upgrade ADFS Communication and SSL certificate to SHA384
- Verify that ExtendedProtectionCheck is set to Allow on the ADFS service. Get-AdfsProperties| select ExtendedProtectionTokenCheck
- From a Domain Joined Windows client attempt to access a SAML configured website using Windows Firefox from internal network.
Actual results:
User is greeted with a prompt for username and password.
Manually entering the username and password fails and leads to the same prompt from the ADFS server.
Similar to https://bugzilla.mozilla.org/show_bug.cgi?id=1179722 but specific only when using SHA384 certificate.
Expected results:
The user should have been directed to the ADFS server and complete the authentication using Windows Integrated Authentication.
User should have then been redirected to the website with the appropriate authentication and access
| Reporter | ||
Comment 1•1 year ago
|
||
Comment 2•1 year ago
|
||
The Bugbug bot thinks this bug should belong to the 'Core::Security: PSM' component, and is moving the bug to that component. Please correct in case you think the bot is wrong.
Comment 3•1 year ago
|
||
The severity field is not set for this bug.
:keeler, could you have a look please?
For more information, please visit BugBot documentation.
Updated•1 year ago
|
Updated•1 year ago
|
Comment 4•7 months ago
|
||
Mike - how important would this be to enterprises?
Comment 5•7 months ago
|
||
I think it will be more of an issue as more folks roll out Extended Protection, so it definitely is important for enterprise.
It looks like bug 1179722 was the same issue, but they ended up reverting back to 256 temporarily.
Comment 6•7 months ago
|
||
This feels quite important. I’ll give this bug a higher priority and hope to see it resolved soon.
| Reporter | ||
Comment 8•7 months ago
|
||
Just for reference because of other issues we were finally forced to upgrade to a SHA384 certificate for our adfs/ identity server. This has effectively broken functionality on Firefox now.
Comment 9•6 months ago
|
||
My organization is also forced to temporarily downgrade to SHA256 for our ADFS server. After 1-1-2026 we are forced to use SHA384, so please resolve this as soon as possible.
Updated•6 months ago
|
| Assignee | ||
Comment 10•5 months ago
|
||
I think this comment may point to the culprit:
https://searchfox.org/mozilla-central/rev/270c20e4b063d80ce71f029b4adc4ba03a12edc0/extensions/auth/nsAuthSSPI.cpp#366-383
// Start hashing. We are always doing SHA256, but depending
// on the certificate, a different alogirthm might be needed.
nsAutoCString hashString;
nsresult rv;
nsCOMPtr<nsICryptoHash> crypto;
crypto = do_CreateInstance(NS_CRYPTO_HASH_CONTRACTID, &rv);
if (NS_SUCCEEDED(rv)) rv = crypto->Init(nsICryptoHash::SHA256);
if (NS_SUCCEEDED(rv))
rv = crypto->Update((unsigned char*)mCertDERData, mCertDERLength);
if (NS_SUCCEEDED(rv)) rv = crypto->Finish(false, hashString);
if (NS_FAILED(rv)) {
free(mCertDERData);
mCertDERData = nullptr;
mCertDERLength = 0;
free(sspi_cbt);
return rv;
}
| Assignee | ||
Comment 11•4 months ago
|
||
Updated•4 months ago
|
| Assignee | ||
Comment 12•4 months ago
|
||
Hi Mervyn,
Could you check with this build and let me know if it fixes your issue when ExtendedProtection is on and off?
https://treeherder.mozilla.org/jobs?repo=try&revision=f5df60eedb97ab95c9cdf53a96a6f36510a0f589&selectedTaskRun=dZpd6YjXTQWpIm4Lw8o4Mg.0
Click on Artifacts and Debugging Tools and download either the installer setup.exe or the portable archive target.zip
Thanks!
Comment 13•4 months ago
|
||
Comment 14•4 months ago
|
||
| bugherder | ||
Comment 15•4 months ago
|
||
Is this able to be backported to the ESR?
Updated•4 months ago
|
| Assignee | ||
Comment 16•4 months ago
|
||
(In reply to Mike Kaply [:mkaply] from comment #15)
Is this able to be backported to the ESR?
Yes, it grafts cleanly to esr140.
I'd prefer to wait for confirmation the fix works before uplifting.
| Assignee | ||
Comment 17•4 months ago
•
|
||
Confirmed working by Steve Rast via email. Will request uplift to ESR.
I am also affected. I tested now with 144.0b2 and can confirm that the login to ADFS with the new SHA384 certificate is working.
Comment 18•4 months ago
|
||
firefox-esr140 Uplift Approval Request
- User impact if declined: Failure to log into Active Directory Federation Services when the SSL certificate uses SHA384
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: Ideally QE would be necessary, but I'm not sure if anyone in QA has access to an active directory setup
- Risk associated with taking this patch: low
- Explanation of risk level: Aready confirmed working by reporters.
- String changes made/needed: None
- Is Android affected?: no
| Assignee | ||
Comment 19•4 months ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D262779
| Reporter | ||
Comment 20•4 months ago
|
||
Good day.
Sorry it took so long to respond.
I have successfully tested Nightly 143.0a1 (2025-09-03) (64-bit) and verified that the issue is resolved when accessing a website using ADFS with a SHA384 ADFS certificate.
| Assignee | ||
Comment 21•4 months ago
|
||
(In reply to Mervyn Morris from comment #20)
I have successfully tested Nightly 143.0a1 (2025-09-03) (64-bit) and verified that the issue is resolved when accessing a website using ADFS with a SHA384 ADFS certificate.
Thank you! 🙏 We really appreciate your help with this one!
| Assignee | ||
Updated•4 months ago
|
Updated•4 months ago
|
Updated•4 months ago
|
Comment 22•4 months ago
|
||
| uplift | ||
Description
•