• Solved

CA Signed Certificate shows as "not valid"

There is a certificate for an internal website that FireFox is saying is not valid/secure and it makes you add an exception. However, if you use IE, Edge or Chrome it loa… (read more)

There is a certificate for an internal website that FireFox is saying is not valid/secure and it makes you add an exception. However, if you use IE, Edge or Chrome it loads fine with the valid CA Certificate. I've cleared all data (cache/etc...) and it hasn't fixed it. Hopefully someone has a fix for this?

Getting "SEC_ERROR_UNKNOWN_ISSUER" for the certificate and its saying:

   Peer’s Certificate issuer is not recognized.
   HTTP Strict Transport Security: false
   HTTP Public Key Pinning: false


FireFox Version: 91.8.0esr (64-bit) Operating System: Windows 10 (64-bit)

Asked by jCubed 4 weeks ago

Answered by Mike Kaply 4 weeks ago

  • Solved

Home Page XML

Hello, I am trying to customize the Firefox Homepage XML file and need some assistance as to what fields need to modified with the url to set the default homepage. Please… (read more)

Hello, I am trying to customize the Firefox Homepage XML file and need some assistance as to what fields need to modified with the url to set the default homepage. Please let me know if you have any questions. Thanks

<plist version="1.0"> <dict> <key>EnterprisePoliciesEnabled</key> <true/> <key>AllowedDomainsForApps</key> <string>managedfirefox.com,example.com</string> <key>AppAutoUpdate</key> <true/> <key>AppUpdateURL</key> <string>https://www.example.com/update.xml</string> <key>Authentication</key> <dict> <key>SPNEGO</key> <array> <string>mydomain.com</string> <string>https://myotherdomain.com</string> </array> <key>Delegated</key> <array> <string>mydomain.com</string> <string>https://myotherdomain.com</string> </array> <key>NTLM</key> <array> <string>mydomain.com</string> <string>https://myotherdomain.com</string> </array> <key>AllowNonFQDN</key> <dict> <key>SPNEGO</key> <true/> <key>NTLM</key> <true/> </dict> <key>AllowProxies</key> <dict> <key>SPNEGO</key> <true/> <key>NTLM</key> <true/> </dict> <key>PrivateBrowsing</key> <true/> <key>Locked</key> <true/> </dict> <key>AutoLaunchProtocolsFromOrigins</key> <array> <dict> <key>protocol</key> <string>zoommtg</string> <key>allowed_origins</key> <array> <string>https://somesite.zoom.us</string> </array> </dict> </array> <key>BlockAboutAddons</key> <true/> <key>BlockAboutConfig</key> <true/> <key>BlockAboutProfiles</key> <true/> <key>BlockAboutSupport</key> <true/> <key>Bookmarks</key> <array> <dict> <key>Title</key> <string>Example1</string> <key>URL</key> <string>https://www.example.org</string> <key>Favicon</key> <string>https://www.example.org/favicon.ico</string> <key>Placement</key> <string>toolbar</string> <key>Folder</key> <string>Example1Folder</string> </dict> <dict> <key>Title</key> <string>Example2</string> <key>URL</key> <string>https://www.example.com</string> <key>Favicon</key> <string>https://www.example.com/favicon.ico</string> <key>Placement</key> <string>menu</string> <key>Folder</key> <string>Example2Folder</string> </dict> </array> <key>CaptivePortal</key> <false/> <key>Certificates</key> <dict> <key>ImportEnterpriseRoots</key> <true/> <key>Install</key> <array> <string>cert1.der</string> <string>cert2.pem</string> </array> </dict> <key>Cookies</key> <dict> <key>Allow</key> <array> <string>https://www.example.org/</string> </array> <key>Allowsession</key> <array> <string>https://www.example.edu/</string> </array> <key>Block</key> <array> <string>https://www.example.edu/</string> </array> <key>Behavior</key> <string>limit-foreign</string> <key>Locked</key> <true/> </dict> <key>DefaultDownloadDirectory</key> <string>${home}/Downloads</string> <key>DownloadDirectory</key> <string>${home}/Downloads</string> <key>DNSOverHTTPS</key> <dict> <key>Enabled</key> <false/> <key>ProviderURL</key> <string>URL_TO_ALTERNATE_PROVIDER</string> <key>Locked</key> <true/> <key>ExcludedDomains</key> <array> <string>example.com</string> </array> </dict> <key>DisableAppUpdate</key> <true/> <key>DisableBuiltinPDFViewer</key> <true/> <key>DisabledCiphers</key> <dict> <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key> <true/> <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key> <true/> <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key> <true/> <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key> <true/> <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key> <true/> <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key> <true/> <key>TLS_RSA_WITH_AES_128_CBC_SHA</key> <true/> <key>TLS_RSA_WITH_AES_256_CBC_SHA</key> <true/> <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key> <true/> <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key> <false/> <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key> <false/> </dict> <key>DisableDeveloperTools</key> <true/> <key>DisableFeedbackCommands</key> <true/> <key>DisableFirefoxAccounts</key> <true/> <key>DisableFirefoxScreenshots</key> <true/> <key>DisableFirefoxStudies</key> <true/> <key>DisableForgetButton</key> <true/> <key>DisableFormHistory</key> <true/> <key>DisableMasterPasswordCreation</key> <true/> <key>DisablePasswordReveal</key> <true/> <key>DisablePocket</key> <true/> <key>DisablePrivateBrowsing</key> <true/> <key>DisableProfileImport</key> <true/> <key>DisableProfileRefresh</key> <true/> <key>DisableSafeMode</key> <true/> <key>DisableSecurityBypass</key> <dict> <key>InvalidCertificate</key> <true/> <key>SafeBrowsing</key> <true/> </dict> <key>DisableSetDesktopBackground</key> <true/> <key>DisableSystemAddonUpdate</key> <true/> <key>DisableTelemetry</key> <true/> <key>DisplayBookmarksToolbar</key> <true/> <key>DontCheckDefaultBrowser</key> <true/> <key>EnableTrackingProtection</key> <dict> <key>Value</key> <true/> <key>Locked</key> <true/> <key>Cryptomining</key> <true/> <key>Fingerprinting</key> <true/> <key>Exceptions</key> <array> <string>https://example.com</string> </array> </dict> <key>EncryptedMediaExtensions</key> <dict> <key>Enabled</key> <false/> <key>Locked</key> <false/> </dict> <key>Extensions</key> <dict> <key>Install</key> <array> <string>https://addons.mozilla.org/firefox/downloads/file/1053714/ghostery_privacy_ad_blocker-8.2.4-an+fx.xpi</string> </array> <key>Uninstall</key> <array/> <key>Locked</key> <array> <string>firefox@ghostery.com</string> </array> </dict> <key>ExtensionSettings</key> <dict> <key>*</key> <dict> <key>blocked_install_message</key> <string>Custom error message.</string> <key>install_sources</key> <array> <string>https://addons.mozilla.org/</string> </array> <key>installation_mode</key> <string>blocked</string> </dict> <key>uBlock0@raymondhill.net</key> <dict> <key>installation_mode</key> <string>force_installed</string> <key>install_url</key> <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string> </dict> </dict> <key>ExtensionUpdate</key> <false/> <key>FirefoxHome</key> <dict> <key>Search</key> <true/> <key>TopSites</key> <true/> <key>SponsoredTopSites</key> <false/> <key>Highlights</key> <true/> <key>Pocket</key> <false/> <key>SponsoredPocket</key> <false/> <key>Snippets</key> <false/> <key>Locked</key> <true/> </dict> <key>FlashPlugin</key> <dict> <key>Allow</key> <array> <string>https://www.example.com</string> </array> <key>Block</key> <array> <string>https://www.example.org</string> </array> <key>Default</key> <true/> <key>Locked</key> <true/> </dict> <key>Handlers</key> <dict> <key>mimeTypes</key> <dict> <key>application/msword</key> <dict> <key>action</key> <string>useSystemDefault</string> <key>ask</key> <false/> </dict> </dict> <key>schemes</key> <dict> <key>mailto</key> <dict> <key>action</key> <string>useHelperApp</string> <key>ask</key> <false/> <key>handlers</key> <array> <dict> <key>name</key> <string>Gmail</string> <key>uriTemplate</key> <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string> </dict> </array> </dict> </dict> <key>extensions</key> <dict> <key>pdf</key> <dict> <key>action</key> <string>useHelperApp</string> <key>ask</key> <false/> <key>handlers</key> <array> <dict> <key>name</key> <string>Adobe Acrobat</string> <key>path</key> <string>/System/Applications/Preview.app</string> </dict> </array> </dict> </dict> </dict> <key>HardwareAcceleration</key> <false/> <key>Homepage</key> <dict> <key>URL</key> <string>http://example.com</string> <key>Locked</key> <true/> <key>Additional</key> <array> <string>https://www.example.com/extra-home1.htm</string> <string>https://www.example.com/extra-home2.htm</string> <string>https://www.example.com/extra-home3.htm</string> </array> <key>StartPage</key> <string>homepage</string> </dict> <key>InstallAddonsPermission</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> <string>https://example.edu</string> </array> <key>Default</key> <false/> </dict> <key>LocalFileLinks</key> <array> <string>http://example.org</string> <string>http://example.edu</string> </array> <key>PrimaryPassword</key> <true/> <key>NetworkPrediction</key> <false/> <key>NewTabPage</key> <false/> <key>NoDefaultBookmarks</key> <true/> <key>OfferToSaveLogins</key> <false/> <key>OfferToSaveLoginsDefault</key> <true/> <key>OverrideFirstRunPage</key> <string>https://www.example.com</string> <key>OverridePostUpdatePage</key> <string></string> <key>PasswordManagerEnabled</key> <false/> <key>PDFjs</key> <dict> <key>Enabled</key> <false/> <key>EnablePermissions</key> <false/> </dict> <key>Permissions</key> <dict> <key>Camera</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>BlockNewRequests</key> <true/> <key>Locked</key> <true/> </dict> <key>Microphone</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>BlockNewRequests</key> <true/> <key>Locked</key> <true/> </dict> <key>Location</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>BlockNewRequests</key> <true/> <key>Locked</key> <true/> </dict> <key>Notifications</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>BlockNewRequests</key> <true/> <key>Locked</key> <true/> </dict> <key>Autoplay</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>Default</key> <string>block-audio</string> <key>Locked</key> <true/> </dict> <key>VirtualReality</key> <dict> <key>Allow</key> <array> <string>https://example.org</string> </array> <key>Block</key> <array> <string>https://example.edu</string> </array> <key>BlockNewRequests</key> <true/> <key>Locked</key> <true/> </dict> </dict> <key>PictureInPicture</key> <dict> <key>Enabled</key> <false/> <key>Locked</key> <true/> </dict> <key>PopupBlocking</key> <dict> <key>Allow</key> <array> <string>https://www.example.org</string> <string>https://www.example.edu</string> </array> <key>Default</key> <true/> <key>Locked</key> <true/> </dict> <key>Preferences</key> <dict> <key>accessibility.force_disabled</key> <dict> <key>Value</key> <integer>1</integer> <key>Status</key> <string>default</string> </dict> <key>browser.cache.disk.parent_directory</key> <dict> <key>Value</key> <string>SOME_NATIVE_PATH</string> <key>Status</key> <string>user</string> </dict> <key>browser.tabs.warnOnClose</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> <key>Proxy</key> <dict> <key>SocksVersion</key> <string>4</string> <key>Mode</key> <string>manual</string> <key>HTTPProxy</key> <string>proxy.example.com:80</string> <key>Locked</key> <true/> </dict> <key>RequestedLocales</key> <array> <string>de</string> <string>en-US</string> </array> <key>SanitizeOnShutdown</key> <true/> <key>SearchBar</key> <string>separate</string> <key>UserMessaging</key> <dict> <key>WhatsNew</key> <false/> <key>ExtensionRecommendations</key> <false/> <key>FeatureRecommendations</key> <false/> <key>UrlbarInterventions</key> <false/> <key>SkipOnboarding</key> <true/> </dict> <key>WebsiteFilter</key> <dict> <key>Block</key> <array> <string><all_urls></string> </array> <key>Exceptions</key> <array> <string>https://www.google.com/*</string> <string>https://www.yahoo.com/*</string> </array> </dict> <key>SecurityDevices</key> <dict> <key>NAME_OF_DEVICE</key> <string>PATH_TO_LIBRARY_FOR_DEVICE</string> </dict> <key>ShowHomeButton</key> <true/> <key>SSLVersionMin</key> <string>tls1.2</string> <key>SSLVersionMax</key> <string>tls1.3</string> <key>SupportMenu</key> <dict> <key>Title</key> <string>Click here for help</string> <key>URL</key> <string>http://example.edu/</string> <key>AccessKey</key> <string>C</string> </dict> </dict> </plist>

Asked by hcoleman4771 1 month ago

Answered by hcoleman4771 1 month ago

  • Locked

Can I set up "Firefox" on Microsoft Edge? I need it for my Job. Dawna

duplicate of /questions/1371802 thread as it has replies. I need to have "Firefox" For my Remote Job. My system is Microsoft Edge. Is it compatable with Microsoft Edge.DA… (read more)

duplicate of /questions/1371802 thread as it has replies.

I need to have "Firefox" For my Remote Job. My system is Microsoft Edge. Is it compatable with Microsoft Edge.DAWNA

Asked by phillipsdawna91 1 month ago

Last reply by Mike Kaply 1 month ago

  • Solved

Priority resolution of defects in Firefox

Hi, Is there any possibility to provide funding to prioritize the resolution of certain defects in Firefox? We do not have the in-house knowledge to contribute the fixes … (read more)

Hi,

Is there any possibility to provide funding to prioritize the resolution of certain defects in Firefox? We do not have the in-house knowledge to contribute the fixes ourselves but would be interested in providing funding to have them resolved faster. Is there any way to achieve that through Mozilla foundation or could please recommend some other solution?

Best regards Josef

Asked by josef.bicik 3 months ago

Answered by josef.bicik 2 months ago

  • Solved

TLS 1.0/1.1 support roadmap

As Chromium has been announcing, version 98 removed support for TLS 1.0/1.1. I know Mozilla has extended support for TLS 1.0/1.1 due to the Covid-19 pandemic. Other brows… (read more)

As Chromium has been announcing, version 98 removed support for TLS 1.0/1.1. I know Mozilla has extended support for TLS 1.0/1.1 due to the Covid-19 pandemic. Other browsers did the same.

I’m curious if there is an official statement on a target end date for TLS 1.0/1.1 in Firefox Extended Support release. While the warnings show up, “Connection not secure. This page uses weak encryption”, can we expect Firefox ESR to stop this displaying websites using TLS 1.0/1.1?

What I’m hoping to avoid is a surprise. Thank you for your time, and I really do appreciate this community!

Asked by CDzilla 2 months ago

Answered by Mike Kaply 2 months ago

  • Solved

Can I disable browser using http3 protocol externally ?

I know users are allow to disable http3 through "about:config", and it works. However, I have to apply to multiple devices by script and the risk page might be a challeng… (read more)

I know users are allow to disable http3 through "about:config", and it works.

However, I have to apply to multiple devices by script and the risk page might be a challenge for me.

I tried to edit prefs.js, but it will still be overwrite even I restart my device. (Re-install is not allowed)

Is there any alternative way to disable http3, such as regedit key?

Or is there method to keep pref.js unchangeable?

Asked by Dali 3 months ago

Answered by Amelia 3 months ago

  • Solved

Firefox tries to connect to high risk IP

We realized that our Firefox ESR 91.4.1 (installed on couple of hundreds of PCs) tries to connect to the IP 34.107.221.82 which is marked as high risk. How is it possibl… (read more)

We realized that our Firefox ESR 91.4.1 (installed on couple of hundreds of PCs) tries to connect to the IP 34.107.221.82 which is marked as high risk. How is it possible? What exactly wants Firefox to do with this IP.

It is strange that connection to this IP goes directly and be blocked on our corporate firewall. Why does it go directly even if proxy is enabled and works. ?

Kind regards Vladimir

Asked by dovlaze 4 months ago

Answered by Amelia 4 months ago

  • Solved

Does using policies.json turn of the effects of all about:config changes done before?

I just created a policies.json file in the appropriate distribution folder with ONE policiy, then restarted the browser, and now the browser shows: The browser is managed… (read more)

I just created a policies.json file in the appropriate distribution folder with ONE policiy, then restarted the browser, and now the browser shows: The browser is managed by your organisation. ("Der Browser wird durch Ihre Organisation verwaltet." in German.)

Now the question occured to me: Has this any effect on the changes I made before manually in the about:config section, or in the settings UI, other than the one change by the one policy I put in the policies.json?

Firefox 91.3.0esr (64-Bit)

Asked by Bill Smith 4 months ago

Answered by Mike Kaply 4 months ago

  • Solved

Is there any way to set firefox config by active directory group policy?

Hello I'm Bae, and i'm sorry for my poor English. I want to make my users be able to use seamless single sign on to Microsoft Azure by setting Firefox config with Active … (read more)

Hello

I'm Bae, and i'm sorry for my poor English.

I want to make my users be able to use seamless single sign on to Microsoft Azure by setting Firefox config with Active Directory group policy.

First, I created the 'user.js' file and wrote 'user_pref("network.negotiate-auth.trusted-uris","https://autologon.microsoftazuread-sso.com");' and 'user_pref("network.negotiate-auth.delegation-uris","https://autologon.microsoftazuread-sso.com");' in it.

Second, I put this user.js file in the Firefox¥Profiles folder (such as xxx.default-release).

Third, I checked that the setting was changed on about:config.

Last, I also checked that I could use seamless single sign on to "www.office.com".

What I want to do is to distribute this user.js file to my domain users (exactly, to users' firefox profiles folder) by group policy. Please tell me how to do.

Or, if there is any way to set 'network.negotiate-auth.trusted-uris' and 'network.negotiate-auth.delegation-uris' without user.js file, such as Firefox group policy template, please tell me which one I should modify.

Thanks.

Asked by sherlocksh 5 months ago

Answered by Mike Kaply 5 months ago

  • Solved

Block websites and exceptions to blocked websites not working

Hello, I have a series of laptops that I need to block access to all URLs and only allow access to one. These laptops are not joined to an AD domain so I downloaded the … (read more)

Hello, I have a series of laptops that I need to block access to all URLs and only allow access to one. These laptops are not joined to an AD domain so I downloaded the ADMX templates and copied them to c:\windows\policydefinitions. I ran gpedit.msc and added <all_urls> to the Blocked Websites policy and then added the specific URL to the Exceptions to Blocked Websites policy. However I am unable to access the allowed URL as Firefox is blocking it, despite having the URL defined in the exceptions policy.

I have added various other URLs to the exceptions policy like https://www.msn.com, https://www.yahoo.com, and https://www.mozilla.org, and all are blocked. I have tried different match patterns in the blocked policy and none blocked any URL, which I didn't expect them to anyway. I tried these patterns:

*://*.*.*
https://*.*.*
http://*.*.*
*

Also in my testing I added https://www.yahoo.com to the block policy, did not enable the exceptions policy and found Firefox did not block that site, which makes zero sense. Am I missing something? I was able to do something similar to this in Chrome with its ADMX templates copied locally to a non-domain joined PC, and it worked flawlessly.

Asked by mgorski10 5 months ago

Answered by mgorski10 5 months ago

  • Solved
  • Archived

block file:///c:/ in Firefox Quantum release 60.4.0esr(32-bit)

Hello, I ve tried to block file:///c:/ in Firefox Quantum release 60.4.0esr(32-bit) by the above .json with no results. I ve also tried to block it in a newer release and… (read more)

Hello, I ve tried to block file:///c:/ in Firefox Quantum release 60.4.0esr(32-bit) by the above .json with no results. I ve also tried to block it in a newer release and it was fine (78.15.0esr (32-bit)). Is anything i can do to block it in this particular version i m using(60.4.0esr(32-bit))?

Thank you

{ "policies": { "WebsiteFilter": { "Block": ["file:///C:/*"] } } }

Asked by ThanosTh 7 months ago

Answered by Mike Kaply 6 months ago

  • Solved
  • Archived

GPO (Group Policy) Change security.tls.enable_0rtt_data

Hello, we have some trouble in our Enterprise Environment with tls 1.3 and 0rtt data. The integrated google search and other websites doesnt work as they should (Pages do… (read more)

Hello,

we have some trouble in our Enterprise Environment with tls 1.3 and 0rtt data. The integrated google search and other websites doesnt work as they should (Pages doesnt load and stay white).

So we want to turn of "security.tls.enable_0rtt_data" with Group Policy. But i cannot find a switch for this setting.

When i try to set security.tls.enable_0rtt_data with Preferences in GPO it doesnt work (old Preferences is empty) { "security.tls.enable_0rtt_data": { "Value": false, "Status": "locked" } }

With Preferences i am able to configure security.tls.hello_downgrade_check, but not security.tls.enable_0rtt_data

The only workaround would be to disable tls 1.3 completely and use tls 1.2. (security.tls.version.max = 3) Is there a solution for this?

Regards, Michael

Asked by michael.reiter 8 months ago

Answered by Mike Kaply 7 months ago

  • Solved
  • Archived

Migrating normal Firefox profiles to Firefox ESR ones

We have around 1000 Firefox installations on our government organization, all installed via the Firefox MSI installer. Unfortunately, we came late to realize that the Fir… (read more)

We have around 1000 Firefox installations on our government organization, all installed via the Firefox MSI installer. Unfortunately, we came late to realize that the Firefox ESR would be a much more suitable product, compared to the normal Firefox branch.

Now, some years ago we would simply mass uninstall the normal Firefox and mass install the (latest) ESR version and all would be well. Problem is that we have to keep existing profiles (including passwords/bookmarks etc), something that is not supported in the latest Firefox builds.

Can anyone offer some advice/"hacks" to accomplish this? Note that whatever we'll do, we'll have to do it automatically, we lack the man-power to do this manually on a system by system basis...

Thanks in advance for any information provided.

Asked by Michail Pappas 7 months ago

Answered by Mike Kaply 6 months ago

  • Solved
  • Archived

Firefox resetting profiles after each launch. Keeps creating new install even if same version launched

Hello world, This problem is sticking for a year now. We even switched to ESR thinking it will fixed the problem but to no avail. After a bunch of test, I've finally deci… (read more)

Hello world,

This problem is sticking for a year now. We even switched to ESR thinking it will fixed the problem but to no avail. After a bunch of test, I've finally decided to post and ask for help. Tests have been done on macos 11.6 fresh vanilla install, no encryption (no filevault, I hate it), and Firefox 91.1.0esr (64 bits), but problem is the same since version 75 + (no problem seen on windows or linux) If I don't use Profiles Manager, at each launch of Firefox a new profile is created with no import from former profiles. If I do use Profiles Manager, I can keep on choosing my default profile, and no new ones are created, BUT new install is added to install.ini and profiles.ini. All tests have been done with the exact same firefox (i mean, application is the same and correctly installed in the /Applications of macos).

Here is the profiles.ini

[Install5A291CFD23D97DBF] Default=Profiles/ucaeqkrb.default-esr Locked=1

[Profile0] Name=default-esr IsRelative=1 Path=Profiles/ucaeqkrb.default-esr Default=1

[General] StartWithLastProfile=0 Version=1

[InstallF5B6C4E8673B7987] Default=Profiles/ucaeqkrb.default-esr Locked=1

[Install7F9608401B386673] Default=Profiles/ucaeqkrb.default-esr Locked=1

And the installs.ini

[5A291CFD23D97DBF] Default=Profiles/ucaeqkrb.default-esr Locked=1

[F5B6C4E8673B7987] Default=Profiles/ucaeqkrb.default-esr Locked=1

[7F9608401B386673] Default=Profiles/ucaeqkrb.default-esr Locked=1

As you can see each launch of Firefox created a new hash of installation (even if same it's always the same firefox version). As long as I choose my default profile in profiles manager, I can keep it. If I switch to default comportment, I will get a new profile at each launch (as it see en new install hash) and it will not import former profiles (even if it's from the same or an older version).

So I'm wandering, why Firefox keeps on adding a news install hash on each launch, and/or how can I prevent it from doing it.

Asked by firefox1540 8 months ago

Answered by Mike Kaply 7 months ago