搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

connecting to a server with a weak key.

  • 4 个回答
  • 5 人有此问题
  • 3 次查看
  • 最后回复者为 balon

more options

I have an old https iternal server. in nightly I get the error The server certificate included a public key that was too weak. (Error code: ssl_error_weak_server_cert_key)

in the release version I get a message stating "This Connection is Untrusted" anf I can continue if I click "I understand the risks"

I understand the minimum requirements for secure connection have benn changed. how can i connect to the site anyway?

I have an old https iternal server. in nightly I get the error The server certificate included a public key that was too weak. (Error code: ssl_error_weak_server_cert_key) in the release version I get a message stating "This Connection is Untrusted" anf I can continue if I click "I understand the risks" I understand the minimum requirements for secure connection have benn changed. how can i connect to the site anyway?

所有回复 (4)

more options

Any luck in adding the host to security.tls.insecure_fallback_hosts ?

You can open the about:config page via the location/address bar and use its search bar to locate this pref:

  • security.tls.insecure_fallback_hosts

You can double-click the line to modify the pref and add the full domain to the value of this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). There should only be domains separated by a comma in the Value column (example.com,www.example.com).


more options

hi, thanks for the reply.

still no luck. do I have to restart firefox before trying again? I am using the nightly channel ( x64) could it be that the algorithm in question have been removed from the build?

more options

You can check what cipher suite and TLS version is used in older Firefox versions and check if the used cipher suite prefs are still present in about:config. The list of available cipher suites gets shorter and shorter with each release as vulnerable suite are removed.

See also:

more options

form what I see with this addon the server in question have a certificate with signature MD5/RSA with key of 512 bits only. another server with SHA/RSA and 1024 bits key is OK. I could not find in about config a way to set the minimum key length or to enable MD5.