為了改善您的使用體驗,本網站正在進行維護,部分功能暫時無法使用。若本站的文件無法解決您的問題,想要向社群發問的話,請到 Twitter 上的 @FirefoxSupport 或 Reddit 上的 /r/firefox 發問,我們的社群成員將很快會回覆您的疑問。

搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

了解更多

How do I remove this d3ijcis4e2ziok.cloudfront.net

more options

When going to my e-mail I get this message. An error occurred during a connection to mail.live.com. Invalid OCSP signing certificate in OCSP response. Error code: SEC_ERROR_OCSP_INVALID_SIGNING_CERT And the above cookie is being planted. What I understand is that this is addware. So how can I remove this out of Firefox? Other browser do not have this problem at the moment.

When going to my e-mail I get this message. An error occurred during a connection to mail.live.com. Invalid OCSP signing certificate in OCSP response. Error code: SEC_ERROR_OCSP_INVALID_SIGNING_CERT And the above cookie is being planted. What I understand is that this is addware. So how can I remove this out of Firefox? Other browser do not have this problem at the moment.

所有回覆 (8)

more options

hi hanselnewackers, microsoft is currently having some issues with their server configuration - please try to reload the page a couple of times (by pressing F5) and see if it is loading then.

you could also temporarily disable the OCSP security mechanism in firefox until MS has fixed their stuff by going into the firefox options > advanced > certificates pnael & and see if that works...

more options

OK disabling the OCSP security Mechanism worked nothing else however disabling the Online Certificate Status Protocol (OCSP)it does not seem to me as a proper solution. Especially when I do not have this problem with CHROME, Edge and Safari on the same device. This seems to be only related to Firefox, Outlook.com on all devices I tested it. Am I the only one with this problem?

more options

you're not the only one with this issue - https://twitter.com/vcsjones other browser don't support OCSP stapling which seems at the core of this issue...

more options

Thank you for your response, I did check the twitter feed, (good feed) Thanks but what I understand from Wiki is that " On the browser side, OCSP stapling was implemented in Firefox 26, in Internet Explorer since Windows Vista, and Google Chrome in Linux, Chrome OS, and Windows since Vista" are you telling me this is incorrect?

more options

i think chrome and other browsers don't check if a certificate is revoked on sites with a domain validated cert - those are the ones which is just displaying a green padlock... they only do it for EV certificates like here on mozilla.org, which is then displaying the organisation's name next to the url.

firefox is checking for the revokation status of a cert on each secure site it's loading

more options

Great Thanks, But I wonder the certs are not expired for Outlook.

and what about that cookie that is being placed? d3ijcis4e2ziok.cloudfront.net

more options

i cannot reproduce the part with the cookie unfortunately - since cloudfront is a popular service used by many major organisations (including mozilla) as a content delivery network it will be difficult to figure out where that came from exactly

more options

I am sorry I can not either reproduce this every time. While this morning I could.