Test whether the world is ready for security.ssl.require_safe_negotiation -> true
Seems like one of the many implementations that web admins tend to ignore: https://forum.palemoon.org/viewtopic.php?t=14549#p104106
It's not a matter of configuration, but upgrading the underlying TLS library to a version that supports RFC5746.
At least www.vmware.com is not ready :frowning_face:
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
World doesn't seem ready yet, as RFC is actually supported by OpenSSL and others, but it's rarely implemented on the mail and webservers?
On Thunderbird: security.ssl.warn_missing_rfc5746;1
I know this is ancient but just adding that this broke Hulu login (auth.hulu.com) for me. 😞
Blame Hulu admins.
@Atavic oh yes, to be clear I'm definitely not blaming you guys! I'm just sad that some of the biggest websites are still way behind on implementing this almost two years later.
tools.cisco.com not ready.
caterpillar.com
15.4.2024: Works
Needs to be toggled when logging into https://www.verizon.com/, for https://ssoauth.verizon.com.
Needs to be toggled when logging into https://www.verizon.com/, for https://ssoauth.verizon.com.
These seem to work now.
