Home » Wiki » How Firefox Bypass HSTS: A Step-by-Step Guide

How Firefox Bypass HSTS: A Step-by-Step Guide

by | SSL Certificate

How Firefox Bypass HSTS

How to Ignore HSTS on Firefox?

To ignore HSTS (HTTP Strict Transport Security) in Firefox, you can bypass it through Firefox’s advanced settings. Open Firefox and type ‘about:config’ in the address bar. Click “Accept the Risk” when prompted. Search for ‘security.ssl.enable_ocsp_stapling’ and set it to false. Next, search for ‘security.cert_pinning.enforcement_level’ and change the value to ‘0’. This disables HSTS checks. Note that disabling HSTS reduces security and should only be done for testing purposes. After testing, restore these settings to their default values to maintain browser security.

How to Bypass HSTS in Firefox

Firefox provides a handy toggle in advanced settings to disable HSTS and allow unsafe HTTP access to HSTS sites when necessary:

  • Enter about:config in the Address Bar
  • Search for security.cert_pinning.enforcement_level
  • Set the Value to off
  • Restart the Browser
  • Revert Setting When Done

Step 1: Enter about:config in the Address Bar

The about:config page shows Firefox’s list of customizable advanced settings.

Firefox About:Config

Step 2: Search for security.cert_pinning.enforcement_level

This preference controls Firefox’s HSTS behavior. The default value is strict, which enforces pinned HTTPS connections.

Firefox security.cert_pinning.enforcement_level

Step 3: Set the Value to 0

Double-click the preference and set the value to 0. This completely disables HSTS and allows HTTP access to HSTS-enabled sites.

Firefox Set the Value 0

Step 4: Restart the Browser

For the change to take full effect, you need to restart Firefox.

Step 5: Revert Setting When Done

When you are finished with testing, revert the security.cert_pinning.enforcement_level setting back to strict with value 1 (default) and restart Firefox again to re-enable HSTS protections.

Firefox Set the Value 1

When You Might Need to Bypass HSTS

There are some legitimate reasons why you may want to access a site over HTTP, even if it has HSTS enabled:

  • Checking for mixed content errors before migrating a site to HTTPS-only.
  • Using development/testing tools that don’t support HTTPS connections.
  • Temporarily roll back HTTPS to debug connection issues.

Of course, you should only temporarily bypass HSTS for testing purposes. For better security, normal browsing should always be done with HSTS enabled.

Other Ways to Temporarily Bypass HSTS

Some other options for bypassing HSTS in Firefox include:

  • Using the security.cert_pinning.process_headers_from setting to disable HSTS for specific sites.
  • Firefox is starting in Safe Mode, which launches with HSTS disabled by default.
  • Using the Firefox DevTools to disable HSTS on a particular domain.
  • Installing a plugin like Disable HTTP Strict Transport Security (HSTS)

However, simply toggling the global enforcement level is usually the easiest way to disable HSTS when needed for temporary testing.

Final Thoughts

While HSTS improves security, bypassing it in Firefox provides flexibility in certain development or debugging situations. Just make sure to re-enable it after testing for maximum security when browsing production sites.

Priya Mervana

Priya Mervana

Verified Badge Verified Web Security Experts

Priya Mervana is working at SSLInsights.com as a web security expert with over 10 years of experience writing about encryption, SSL certificates, and online privacy. She aims to make complex security topics easily understandable for everyday internet users.

Stay Secure with SSLInsights!

Subscribe to get the latest insights on SSL security, website protection tips, and exclusive updates.

✅ Expert SSL guides
✅ Security alerts & updates
✅ Exclusive offers