為了改善您的使用體驗,本網站正在進行維護,部分功能暫時無法使用。若本站的文件無法解決您的問題,想要向社群發問的話,請到 Twitter 上的 @FirefoxSupport 或 Reddit 上的 /r/firefox 發問,我們的社群成員將很快會回覆您的疑問。

搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

了解更多

connecting to a server with a weak key.

  • 4 回覆
  • 5 有這個問題
  • 3 次檢視
  • 最近回覆由 balon

more options

I have an old https iternal server. in nightly I get the error The server certificate included a public key that was too weak. (Error code: ssl_error_weak_server_cert_key)

in the release version I get a message stating "This Connection is Untrusted" anf I can continue if I click "I understand the risks"

I understand the minimum requirements for secure connection have benn changed. how can i connect to the site anyway?

I have an old https iternal server. in nightly I get the error The server certificate included a public key that was too weak. (Error code: ssl_error_weak_server_cert_key) in the release version I get a message stating "This Connection is Untrusted" anf I can continue if I click "I understand the risks" I understand the minimum requirements for secure connection have benn changed. how can i connect to the site anyway?

所有回覆 (4)

more options

Any luck in adding the host to security.tls.insecure_fallback_hosts ?

You can open the about:config page via the location/address bar and use its search bar to locate this pref:

  • security.tls.insecure_fallback_hosts

You can double-click the line to modify the pref and add the full domain to the value of this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). There should only be domains separated by a comma in the Value column (example.com,www.example.com).


more options

hi, thanks for the reply.

still no luck. do I have to restart firefox before trying again? I am using the nightly channel ( x64) could it be that the algorithm in question have been removed from the build?

more options

You can check what cipher suite and TLS version is used in older Firefox versions and check if the used cipher suite prefs are still present in about:config. The list of available cipher suites gets shorter and shorter with each release as vulnerable suite are removed.

See also:

more options

form what I see with this addon the server in question have a certificate with signature MD5/RSA with key of 512 bits only. another server with SHA/RSA and 1024 bits key is OK. I could not find in about config a way to set the minimum key length or to enable MD5.