X
Tap here to go to the mobile version of the site.

منتدى الدعم

The page you are trying to view cannot be shown because the authenticity of the received data could not be verified; how to override?

  • No replies
  • 2 have this problem
  • 13 views
Posted

I run a private website. I redirect any http://website.org/ --> https://website.org/ for all accesses. The webserver is FreeBSD 12-Release; Apache24 running a combination of pure html5, php, python-Flask etc. DNS is provided from two vendors for two different domain names. I also run an internal network which can directly access the server on non-routable addresses. (ie 10.0.1.50). The DNS servers are commercial, I do not run BIND.

I have several DNS names which are publicly accessable and several that are purely private. For arguments sake: www.privatesite.net --> IPV4 address xxx.yyy.zzz.32 (vendor provided ip) --> SUCCEEDS www.privatesite_2.net --> IPV4 address same. --> FAILS as above. ipv4.secondsite.org --> IPV4 address ( mapped from DNS using A record) --> FAILS as above. ipv6.secondsite.org --> IPV6 address XXXX::32 --> FAILS as above. internal.sitename (mapped via /etc/hosts --> FAILS as above.


Certs are either privately generated and signed by me or from LetsEncrypt. I do not need, nor do I care about keeping these certs current and do not need nor will I ever use for this site any public vendor. I simply want to use a private key to maintain a modicum of protection from casual traffic sniffers. I have not spend a lot of time configuring apache as I have serious product development work to do on this server and I do not need a commercial level web service on a machine that is running in the barn. Please note that standard unix OPENSSL accesses all work properly.

Recently Firefox has disallowed overrides of the above message. I run into this occasionally on commercial web sites as well where something is misconfigured. It is not repeat not my job to police the internet and it is my responsibility to decide to access a web site which may or may not be misconfigured.

Please tell me how to override this block and proceed on to my website. If this is permanent, and I have no desire to be a part of the internet www police force, I will finally move away from firefox for good. This is a very serious enough to cause me to switch web browsers to a commercial vendor.

I run a private website. I redirect any http://website.org/ --> https://website.org/ for all accesses. The webserver is FreeBSD 12-Release; Apache24 running a combination of pure html5, php, python-Flask etc. DNS is provided from two vendors for two different domain names. I also run an internal network which can directly access the server on non-routable addresses. (ie 10.0.1.50). The DNS servers are commercial, I do not run BIND. I have several DNS names which are publicly accessable and several that are purely private. For arguments sake: www.privatesite.net --> IPV4 address xxx.yyy.zzz.32 (vendor provided ip) --> SUCCEEDS www.privatesite_2.net --> IPV4 address same. --> FAILS as above. ipv4.secondsite.org --> IPV4 address ( mapped from DNS using A record) --> FAILS as above. ipv6.secondsite.org --> IPV6 address XXXX::32 --> FAILS as above. internal.sitename (mapped via /etc/hosts --> FAILS as above. Certs are either privately generated and signed by me or from LetsEncrypt. I do not need, nor do I care about keeping these certs current and do not need nor will I ever use for this site any public vendor. I simply want to use a private key to maintain a modicum of protection from casual traffic sniffers. I have not spend a lot of time configuring apache as I have serious product development work to do on this server and I do not need a commercial level web service on a machine that is running in the barn. Please note that standard unix OPENSSL accesses all work properly. Recently Firefox has disallowed overrides of the above message. I run into this occasionally on commercial web sites as well where something is misconfigured. It is not repeat not my job to police the internet and it is my responsibility to decide to access a web site which may or may not be misconfigured. Please tell me how to override this block and proceed on to my website. If this is permanent, and I have no desire to be a part of the internet www police force, I will finally move away from firefox for good. This is a very serious enough to cause me to switch web browsers to a commercial vendor.

Additional System Details

Installed Plug-ins

  • Plugin that detects installed Citrix Online products (visit www.citrixonline.com).
  • Simple plug-in that handles Citrix connection files
  • Displays Java applet content, or a placeholder if Java is not installed.
  • 5.1.50901.0
  • WebEx64 General Plugin Container Version 205
  • zoom.us launcher plugin version 1.0

Application

  • Firefox 52.9.0
  • User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Firefox/52.0
  • Support URL: https://support.mozilla.org/1/firefox/52.9.0/Darwin/en-US/

Extensions

  • Application Update Service Helper 2.0 (aushelper@mozilla.org)
  • CanvasBlocker 0.5.4 (CanvasBlocker@kkapsner.de)
  • Cisco Webex Extension 1.1.0 (ciscowebexstart1@cisco.com)
  • FireFTP 2.0.31 ({a7c6cf7f-112c-4500-a7ea-39801a327e5f})
  • FireSSH 0.94.11 (firessh@nightlight.ws)
  • FlashDisable 1.2.1 (jid0-bbA9VAawX3LMWDu668aUDrpQVXU@jetpack)
  • HTTPS Everywhere 2019.1.7 (https-everywhere-eff@eff.org)
  • Multi-process staged rollout 1.10 (e10srollout@mozilla.org)
  • Pocket 1.0.5 (firefox@getpocket.com)
  • Privacy Badger 2018.12.17 (jid1-MnnxcxisBPnSXQ-eff@jetpack)
  • RECAP 0.9.2.2.1-signed.1-signed (info@recapthelaw.org)
  • Self-Destructing Cookies 0.4.12 (jid0-9XfBwUWnvPx4wWsfBWMCm4Jj69E@jetpack)
  • Web Compat 1.0 (webcompat@mozilla.org)
  • toggle-mixed-active-content 2.0 (jid0-LfpuGtyvjqw5JxLBjdCjX5Fzorw@jetpack) (Inactive)
  • User Agent Switcher 0.7.3.1-signed.1-signed ({e968fc70-8f95-4ab9-9e79-304de2a71ee1}) (Inactive)

Javascript

  • incrementalGCEnabled: True

Graphics

  • adapterDescription:
  • adapterDeviceID: 0x0fe9
  • adapterDrivers:
  • adapterRAM:
  • adapterVendorID: 0x10de
  • crashGuards: []
  • currentAudioBackend: audiounit
  • driverDate:
  • driverVersion:
  • featureLog: {u'fallbacks': [], u'features': [{u'status': u'available', u'description': u'Compositing', u'log': [{u'status': u'available', u'type': u'default'}], u'name': u'HW_COMPOSITING'}, {u'status': u'available', u'description': u'OpenGL Compositing', u'log': [{u'status': u'available', u'type': u'default'}], u'name': u'OPENGL_COMPOSITING'}]}
  • info: {u'TileHeight': 1024, u'TileWidth': 1024, u'AzureFallbackCanvasBackend': u'none', u'AzureCanvasAccelerated': 1, u'AzureCanvasBackend': u'skia', u'AzureContentBackend': u'skia'}
  • numAcceleratedWindows: 3
  • numTotalWindows: 3
  • supportsHardwareH264: Yes
  • webgl2Renderer: NVIDIA Corporation -- NVIDIA GeForce GT 750M OpenGL Engine
  • webglRenderer: NVIDIA Corporation -- NVIDIA GeForce GT 750M OpenGL Engine
  • windowLayerManagerRemote: True
  • windowLayerManagerType: OpenGL

Modified Preferences

Misc

  • User JS: No
  • Accessibility: No