While testing some new misp-modules, such as the OpenAPI interface, I discovered a strange behavior in Firefox when trying to reach TCP port 6666, which is the default port used by misp-modules.
It seems Firefox blocks access to a predefined list of TCP ports, and this has been in place for quite some time, as you can see in the commit log.
If you want to override the blocked port list, there is an obscure setting called network.security.ports.banned.override.
Still wondering about the threat model and the reason behind this restriction.
🔗 The origin of the bad port list https://fetch.spec.whatwg.org/#port-blocking
🔗 Firefox source code with the bad port list https://github.com/mozilla-firefox/firefox/blob/0d35bd1655f9868b796df7835c990efd9d2909a2/netwerk/base/nsIOService.cpp#L121
🔗 Someone else having the issue https://patrickwu.space/2025/05/13/this-address-is-restricted/