X
Tippen Sie hierhin, um die Version dieser Website für Mobilgeräte aufzurufen.

Hilfeforum

"Secure Connection Failed" Error on one particular website

Veröffentlicht

When I try to access the https site for MyMU (it is a student services website for my Alma Mater, Marshall University) at https://mymu.marshall.edu/group/mycampus/home, I receive a "Secure Connection Failed" error with the following message: "An error occurred during a connection to mymu.marshall.edu. SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. (Error code: ssl_error_weak_server_ephemeral_dh_key)." I am asking about this here because I already tried every possible solution given at https://support.mozilla.org/en-US/kb/secure-connection-failed-error-message, as well as several other solutions in the Mozilla forums and such, to no avail. What the heck is going on, and how can I fix it?

I can still access the https://mymu domain in Chrome, by the way. And this problem only seems to be happening after I updated to VERSION TWO OF THE FIREFOX 39.0 BETA (I should mention, I use the beta release because I want my browser to be 64-bit).

When I try to access the https site for MyMU (it is a student services website for my Alma Mater, Marshall University) at https://mymu.marshall.edu/group/mycampus/home, I receive a "Secure Connection Failed" error with the following message: "An error occurred during a connection to mymu.marshall.edu. SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. (Error code: ssl_error_weak_server_ephemeral_dh_key)." I am asking about this here because I already tried every possible solution given at https://support.mozilla.org/en-US/kb/secure-connection-failed-error-message, as well as several other solutions in the Mozilla forums and such, to no avail. What the heck is going on, and how can I fix it? I can still access the https://mymu domain in Chrome, by the way. And this problem only seems to be happening after I updated to VERSION TWO OF THE FIREFOX 39.0 BETA (I should mention, I use the beta release because I want my browser to be 64-bit).

Mehr Details zum System

Installierte Plugins

  • NPRuntime Script Plug-in Library for Java(TM) Deploy
  • Next Generation Java Plug-in 11.45.2 for Mozilla browsers
  • The plugin allows you to have a better experience with Microsoft SharePoint
  • Shockwave Flash 17.0 r0
  • 5.1.40416.0

Anwendung

  • Firefox 39.0
  • User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:39.0) Gecko/20100101 Firefox/39.0
  • Hilfe-URL: https://support.mozilla.org/1/firefox/39.0/WINNT/en-US/

Erweiterungen

  • Custom Tab Width 1.0.1.1-signed (tab-width@design-noir.de)
  • DownThemAll! 2.0.18.1-signed ({DDC359D1-844A-42a7-9AA1-88A850A938A8})
  • Flash Control 1.3.2.1-signed (jid1-sNL73VCI4UB0Fw@jetpack)
  • Magic Actions for YouTube™ 6.8.8.2 (jid0-UVAeBCfd34Kk5usS8A1CBiobvM8@jetpack)
  • RightToClick 2.9.5.1-signed ({cd617375-6743-4ee8-bac4-fbf10f35729e})
  • uBlock Origin 0.9.8.2 (uBlock0@raymondhill.net)
  • about:addons-memory 10.1-signed (about-addons-memory@tn123.org) (inaktiv)
  • Video DownloadHelper 5.3.1.1-signed ({b9db16a4-6edc-47ec-a1f4-b86292ed211d}) (inaktiv)
  • YouTube Enhancer Plus 3.3.6.1-signed (firefoxaddon@youtubeenhancer.com) (inaktiv)
  • ZenMate Security & Privacy VPN 4.1.7.1-signed (firefox@zenmate.com) (inaktiv)

JavaScript

  • incrementalGCEnabled: True

Grafiken

  • adapterDescription: Intel(R) HD Graphics 4600
  • adapterDescription2:
  • adapterDeviceID: 0x0416
  • adapterDeviceID2:
  • adapterDrivers: igdumdim64 igd10iumd64 igd10iumd64 igdumdim32 igd10iumd32 igd10iumd32
  • adapterDrivers2:
  • adapterRAM: Unknown
  • adapterRAM2:
  • adapterSubsysID: 2290103c
  • adapterSubsysID2:
  • adapterVendorID: 0x8086
  • adapterVendorID2:
  • direct2DEnabled: True
  • directWriteEnabled: True
  • directWriteVersion: 6.3.9600.17795
  • driverDate: 9-29-2014
  • driverDate2:
  • driverVersion: 10.18.10.3960
  • driverVersion2:
  • info: {u'AzureCanvasBackend': u'direct2d 1.1', u'AzureFallbackCanvasBackend': u'cairo', u'AzureContentBackend': u'direct2d 1.1', u'AzureSkiaAccelerated': 0}
  • isGPU2Active: False
  • numAcceleratedWindows: 1
  • numTotalWindows: 1
  • webglRenderer: Google Inc. -- ANGLE (Intel(R) HD Graphics 4600 Direct3D11 vs_5_0 ps_5_0)
  • windowLayerManagerRemote: True
  • windowLayerManagerType: Direct3D 11

Veränderte Einstellungen

Verschiedenes

  • User JS: Nein
  • Barrierefreiheit: Nein
philipp
  • Top 25 Contributor
  • Moderator
5306 Lösungen 23424 Antworten
Veröffentlicht

hi, this means that the webserver is vulnerable to the recently published logjam vulnerability: http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/ please report that to the IT department of your university to fix...

hi, this means that the webserver is vulnerable to the recently published logjam vulnerability: http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/ please report that to the IT department of your university to fix...

Fragesteller

Thank you! I sent them an email about the issue.

For NOW, is there some way I can possibly BYPASS the issue to get into my email here in Firefox? Fact is, I don't have anything especially sensitive in my email that anyone could use to steal my identity, or anything like that, so this isn't such a big concern to me (i.e. a possible security leak or whatever couldn't really give a hacker anything useful on me through my email).

Thank you! I sent them an email about the issue. For NOW, is there some way I can possibly BYPASS the issue to get into my email here in Firefox? Fact is, I don't have anything especially sensitive in my email that anyone could use to steal my identity, or anything like that, so this isn't such a big concern to me (i.e. a possible security leak or whatever couldn't really give a hacker anything useful on me through my email).
cor-el
  • Top 10 Contributor
  • Moderator
17479 Lösungen 157963 Antworten
Veröffentlicht

Hilfreiche Antwort

You can toggle involved DHE ciphers on the about:config page with double-click to false.

  • security.ssl3.dhe_rsa_aes_128_sha
  • security.ssl3.dhe_rsa_aes_256_sha

You can open the about:config page via the location/address bar. You can accept the warning and click "I'll be careful" to continue.

You can toggle involved DHE ciphers on the <b>about:config</b> page with double-click to false. *security.ssl3.dhe_rsa_aes_128_sha *security.ssl3.dhe_rsa_aes_256_sha You can open the <b>about:config</b> page via the location/address bar. You can accept the warning and click "I'll be careful" to continue. *http://kb.mozillazine.org/about:config

Geändert am von cor-el

Fragesteller

Thank you very much! I am aware of the about:config preferences, have already done a bunch of tweaks in there before. Knowing which preferences to tweak to get this issue resolved was all I really needed ;)

Thank you very much! I am aware of the about:config preferences, have already done a bunch of tweaks in there before. Knowing which preferences to tweak to get this issue resolved was all I really needed ;)
cor-el
  • Top 10 Contributor
  • Moderator
17479 Lösungen 157963 Antworten
Veröffentlicht

You're welcome.

You're welcome.