X
Tap here to go to the mobile version of the site.

Support Forum

"Add an Exception" for purporedly invalid/questionable SSL certifcates does not work in V 37.0.1. How do I get around thgis?

Posted

Accessing admin page of SAN that uses self-signed cert. (from Oracle Corp.), warning dialogue appears, which is OK, bu the "add exception" mechanism no longer works. (Used to in earlier versions of FireFox.)

Accessing admin page of SAN that uses self-signed cert. (from Oracle Corp.), warning dialogue appears, which is OK, bu the "add exception" mechanism no longer works. (Used to in earlier versions of FireFox.)

Additional System Details

Installed Plug-ins

  • ActiveTouch General Plugin Container Version 105
  • Adobe PDF Plug-In For Firefox and Netscape 11.0.10
  • Citrix Online App Detector Plugin
  • GEPlugin
  • Google Update
  • Logitech Harmony Remote Plugin
  • The plug-in allows you to open and edit files using Microsoft Office applications
  • Office Authorization plug-in for NPAPI browsers
  • Openscript NPAPI Plugin
  • NPAPI Extension for Firefox
  • The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
  • Shockwave Flash 17.0 r0
  • Shockwave Flash 11.7 r700
  • Adobe Shockwave for Director Netscape plug-in, version 12.0.9.149
  • 5.1.30214.0
  • VLC media player Web Plugin
  • VMware Remote Console Plug-in
  • VMware Remote Console and Client Integration Plug-in

Application

  • Firefox 37.0.1
  • User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
  • Support URL: https://support.mozilla.org/1/firefox/37.0.1/WINNT/en-US/

Extensions

  • Adblock Plus 2.6.9 ({d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d})
  • Add to Amazon Wish List Button 1.10 (amznUWL2@amazon.com)
  • Cookie Monster 1.2.0 ({45d8ff86-d909-11db-9705-005056c00008})
  • Firebug 2.0.9 (firebug@software.joehewitt.com)
  • Heartbleed-Ext 3.0 ({CB454AEB-2F60-4441-ADEB-2CB43BB33B20})
  • Rich Media Player extension 1.3.1 ({3DF4B26D-DB19-45DF-962A-6719D071245B})
  • OpenScript WebDOM 1.1 (webdom@openscript) (Inactive)

Javascript

  • incrementalGCEnabled: True

Graphics

  • adapterDescription: Intel(R) HD Graphics 4000
  • adapterDescription2:
  • adapterDeviceID: 0x0166
  • adapterDeviceID2:
  • adapterDrivers: igdumd64 igd10umd64 igd10umd64 igdumd32 igd10umd32 igd10umd32
  • adapterDrivers2:
  • adapterRAM: Unknown
  • adapterRAM2:
  • adapterSubsysID: 05341028
  • adapterSubsysID2:
  • adapterVendorID: 0x8086
  • adapterVendorID2:
  • direct2DEnabled: True
  • directWriteEnabled: True
  • directWriteVersion: 6.2.9200.16492
  • driverDate: 12-12-2012
  • driverDate2:
  • driverVersion: 9.17.10.2932
  • driverVersion2:
  • info: {u'AzureCanvasBackend': u'direct2d 1.1', u'AzureFallbackCanvasBackend': u'cairo', u'AzureContentBackend': u'direct2d 1.1', u'AzureSkiaAccelerated': 0}
  • isGPU2Active: False
  • numAcceleratedWindows: 3
  • numTotalWindows: 3
  • webglRenderer: Google Inc. -- ANGLE (Intel(R) HD Graphics 4000 Direct3D11 vs_5_0 ps_5_0)
  • windowLayerManagerRemote: True
  • windowLayerManagerType: Direct3D 11

Modified Preferences

Misc

  • User JS: No
  • Accessibility: No
guigs 1072 solutions 11697 answers

Helpful Reply

I do not know without investigating the cert, however there are some guides on how to verify self-signed certs:

Add on for work around:

More info:

I do not know without investigating the cert, however there are some guides on how to verify self-signed certs: *[https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/] *[["This Connection is Untrusted" error message appears - What to do]] Add on for work around: *[https://addons.mozilla.org/en-us/firefox/addon/skip-cert-error/] More info: *[https://wiki.mozilla.org/CA:Problematic_Practices]
cor-el
  • Top 10 Contributor
  • Moderator
17757 solutions 160593 answers

The website may try to fallback to TLS 1.0 in a way that is no longer allowed in current releases or may be using a deprecated cipher suite.

You can open the about:config page via the location/address bar and use its search bar to locate this pref:

  • security.tls.insecure_fallback_hosts

You can double-click the line to modify the pref and add the full domain to this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). You should only see domains separated by a comma in the value column.


The website may try to fallback to TLS 1.0 in a way that is no longer allowed in current releases or may be using a deprecated cipher suite. You can open the <b>about:config</b> page via the location/address bar and use its search bar to locate this pref: *security.tls.insecure_fallback_hosts You can double-click the line to modify the pref and add the full domain to this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). You should only see domains separated by a comma in the value column. ---- *https://developer.mozilla.org/en-US/Firefox/Releases/36/Site_Compatibility#Security *https://developer.mozilla.org/en-US/Firefox/Releases/37/Site_Compatibility#Security

Question owner

cor-el said

The website may try to fallback to TLS 1.0 in a way that is no longer allowed in current releases or may be using a deprecated cipher suite. You can open the about:config page via the location/address bar and use its search bar to locate this pref:
  • security.tls.insecure_fallback_hosts
You can double-click the line to modify the pref and add the full domain to this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). You should only see domains separated by a comma in the value column.

Maybe this works but it is such an awkward and messy "solution" that it doesn't really qualify.

The real issue here is that FireFox developers have become arrogant and ceased to take note of what users do and need as opposed to their latest fancy theories.

I mostly prefer to use FireFox but if developments continue as at present - lots of unnecessary eye-candy and visual changes but no improvements in the fundamentals such as proper support for multi-processing - then Chrome is what I will have to use.

''cor-el [[#answer-717665|said]]'' <blockquote> The website may try to fallback to TLS 1.0 in a way that is no longer allowed in current releases or may be using a deprecated cipher suite. You can open the <b>about:config</b> page via the location/address bar and use its search bar to locate this pref: *security.tls.insecure_fallback_hosts You can double-click the line to modify the pref and add the full domain to this pref. If there are already websites (domains) in this list then add a comma and the new domain (no spaces). You should only see domains separated by a comma in the value column. ---- *https://developer.mozilla.org/en-US/Firefox/Releases/36/Site_Compatibility#Security *https://developer.mozilla.org/en-US/Firefox/Releases/37/Site_Compatibility#Security </blockquote> Maybe this works but it is such an awkward and messy "solution" that it doesn't really qualify. The real issue here is that FireFox developers have become arrogant and ceased to take note of what users do and need as opposed to their latest fancy theories. I mostly prefer to use FireFox but if developments continue as at present - lots of unnecessary eye-candy and visual changes but no improvements in the fundamentals such as proper support for multi-processing - then Chrome is what I will have to use.

Question owner

guigs2 said

I do not know without investigating the cert, however there are some guides on how to verify self-signed certs: Add on for work around: More info:
''guigs2 [[#answer-717661|said]]'' <blockquote> I do not know without investigating the cert, however there are some guides on how to verify self-signed certs: *[https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/] *[["This Connection is Untrusted" error message appears - What to do]] Add on for work around: *[https://addons.mozilla.org/en-us/firefox/addon/skip-cert-error/] More info: *[https://wiki.mozilla.org/CA:Problematic_Practices] </blockquote>

Question owner

The add-on works as expected.

Thank you for your help.

The add-on works as expected. Thank you for your help.