Current time: 02-27-2021, 11:31 PM Hello There, Guest! (LoginRegister)

Post Reply 
 
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Additional request in Firefox
12-29-2015, 10:18 PM (This post was last modified: 12-29-2015 10:34 PM by akshayranganath.)
Post: #2
RE: Additional request in Firefox
Firefox (and all browsers) implement what's called as OCSP stampling. This article explains the behavior: https://blog.mozilla.org/security/2013/0...-firefox/. It looks like the Firefox has been hardened to verify the TLS cert validity.

tl;dr; - The income tax site is not sending the certificate validity information and FF is defaulting to the OCSP check. This can be disabled through the browser's "about:config" setting. This will not be possible on WPT public instance.

For your use case, you could just block the domain and re-test. However, I'd suggest you to not do this. My suggestion would be to run 2 tests with the OCSP domains blocked and not blocked. You should consider both the response since some browsers (esp those behind corporate proxies) would be hardened to check for OCSP signatures.

Follow me on twitter: @rakshay
Visit this user's website Find all posts by this user
Quote this message in a reply
Post Reply 


Messages In This Thread
RE: Additional request in Firefox - akshayranganath - 12-29-2015 10:18 PM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)