为提升您的使用体验,本站正在维护,部分功能暂时无法使用。如果本站文章无法解决您的问题,您想要向社区提问的话,请到 Twitter 上的 @FirefoxSupport 或 Reddit 上的 /r/firefox 提问,我们的支持社区将会很快回复您的疑问。

搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

Cannot connect to an https website, but works with Firefox 3.6 and other browsers

more options

I cannot connect to this website from newer version of Firefox than 3.6. Tried on Linux, OS X and Windows operating systems and other browsers. IE and Safari works fine:

I tried on the latest (nightly) Firefox mobile as well without any success.

I cannot connect to this website from newer version of Firefox than 3.6. Tried on Linux, OS X and Windows operating systems and other browsers. IE and Safari works fine: I tried on the latest (nightly) Firefox mobile as well without any success.

所有回复 (6)

more options

First I get the "This Connection is Untrusted" page.

After adding an exception, I get "The connection was reset" and reloading just returns the same message.

Is that what you get?

I get similar results in IE8, both on Windows 7.

more options

Yes. This is exactly what I got. Safari and Firefox 3.6 deliver the site.

more options

Not for me. Firefox 3.6.x gives the same error.

The certificate is not trusted because it is self-signed.
The certificate is only valid for FGT80C3910606976

You must have created an exception in Firefox 3.6.x if it works there.

Don't you see the link to Add an exception at the bottom of the SSL error page?

more options

of course, i added. As i mentoned above the real error is "The connection was reset". why is it ok on Safari?

more options

The "The connection was reset" error message can be caused by a bug fix for the BEAST (Browser Exploit Against SSL/TLS) attack that the server doesn't handle.

See comment 60 in this bug report for workaround, but be aware that this makes you vulnerable to that BEAST attack.

  • bug 702111 - Servers intolerant to 1/n-1 record splitting. "The connection was reset"
export NSS_SSL_CBC_RANDOM_IV=0

Be sure to remove that environment variable after testing to prevent you from being vulnerable to that exploit.

由cor-el于修改

more options

thanks i will check this and come back to you with the result