Minimum TLS version to fallback to

Warning: The TLS 1.0 version fallback will be removed from Vivaldi after version 47 (around January 2016) and the "tls1" option will stop working then.

When a TLS handshake fails, Vivaldi will retry the connection with a lesser version of TLS in order to work around bugs in HTTPS servers. This setting configures the version at which this fallback process will stop. If a server performs version negotiation correctly (i.e. without breaking the connection) then this setting doesn't apply. Regardless, the resulting connection must still comply with SSLVersionMin.

If this policy is not configured then Vivaldi uses a default minimum version which is TLS 1.0 in Vivaldi 44 and TLS 1.1 in later versions. Note this does not disable support for TLS 1.0, only whether Vivaldi will work around buggy servers which cannot negotiate versions correctly.

Otherwise it may be set to one of the following values: "tls1", "tls1.1" or "tls1.2". If compatibility with a buggy server must be maintained, this may be set to "tls1". This is a stopgap measure and the server should be rapidly fixed.

A setting of "tls1.2" disables all fallback but this may have a significant compatibility impact.

Supported on: Microsoft Windows XP SP2 or later

Minimum TLS version to fallback to


  1. TLS 1.0
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Vivaldi
    Value NameSSLVersionFallbackMin
    Value TypeREG_SZ
    Valuetls1
  2. TLS 1.1
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Vivaldi
    Value NameSSLVersionFallbackMin
    Value TypeREG_SZ
    Valuetls1.1
  3. TLS 1.2
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Vivaldi
    Value NameSSLVersionFallbackMin
    Value TypeREG_SZ
    Valuetls1.2


vivaldi.admx

Administrative Templates (Computers)

Administrative Templates (Users)