With #11253 (closed), Tor Browser's Firefox config has TLSv1.1 and TLSv1.2 turned on. If meek-http-helper (browser TLS camouflage) sends Firefox 24 ciphersuites but uses TLSv1.1 or TLSv1.2, then it will look weird, because as I understand it, mainline Firefox 24 has TLSv1.1 and TLSv1.2 disabled. ([[doc/meek#Sampleclienthellos]] corroborates that ordinary Firefox 24 uses TLSv1.0 when connecting to Google.)
We also need to remember to turn TLSv1.1 and TLSv1.2 back on when they get enabled in the next ESR...
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items
0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items
0
Link issues together to show that they're related.
Learn more.
Before the patch (i.e., the status quo with 4.0-alpha-1), the TLS fingerprint stands out from ordinary Firefox 24 in the TLS version and in an extra extension:
Hrmm. I think you probably want to blend in with Firefox 31 regardless. It is more common than FF24ESR. Though, I'm not sure if security.tls.version.max=3 looked like Firefox 31 if it was done from a Firefox 24 build. It may not.
Hrmm. I think you probably want to blend in with Firefox 31 regardless. It is more common than FF24ESR. Though, I'm not sure if security.tls.version.max=3 looked like Firefox 31 if it was done from a Firefox 24 build. It may not.
It's a nice idea, but the ciphersuites, at least, offered by Firefox 31 are different than those offered by 24:
https://bugzilla.mozilla.org/show_bug.cgi?id=946147#c1 amusing followup about broken servers ignoring the MSB of the ciphersuite ID
See https://www.ssllabs.com/ssltest/viewMyClient.html for an online test. I don't think we'll win in the long run making Firefox try to look like anything other than its true version; there are too many dead-parrot issues. Firefox 24 is less common than Firefox 31, but Firefox 24 ciphersuites with TLSv1.2 is likely to be less common than both.