Réponses récentes à error ssl_error_weak_server_ephemeral_dh_key I can't log into my ISP please help.https://support.mozilla.org/fr/questions/10679952015-06-19T09:41:12-07:00well after toggling both to false, I still get the error on the secure page I am accessing. I have2015-06-19T09:41:12-07:00jjpjjpjjphttps://support.mozilla.org/fr/questions/1067995#answer-743517<p>well after toggling both to false, I still get the error on the secure page I am accessing. I have, however, found a solution, for now, my Google Chrome has not been affected by this weak dh error and I can use it to access that specific page and probably any other page with such an error.
</p><p>Edit: hold on. I had picked the wrong ones. I did what you said and that solved it perfectly. Thank you for your solution! I can now access the secure page using my mozilla browser.
</p>Thanks for the update, I'm going to go ahead and access that now and see if that changes anything ab2015-06-19T09:38:44-07:00jjpjjpjjphttps://support.mozilla.org/fr/questions/1067995#answer-743514<p>Thanks for the update, I'm going to go ahead and access that now and see if that changes anything about the certificate.
</p>Note that users with the current and older Firefox releases can toggle these prefs to false on the a2015-06-19T08:31:09-07:00cor-elhttps://support.mozilla.org/fr/questions/1067995#answer-743477<p>Note that users with the current and older Firefox releases can toggle these prefs to false on the <b>about:config</b> page to disable the cipher suites that are involved with the Logjam vulnerability.
</p>
<ul><li>security.ssl3.dhe_rsa_aes_128_sha
</li><li>security.ssl3.dhe_rsa_aes_256_sha
</li></ul>
<hr>
<ul><li>Bug 1138554 - NSS accepts export-length DHE keys with regular DHE cipher suites
</li></ul>
<p>Logjam: How Diffie-Hellman Fails in Practice:
</p>
<ul><li><a href="https://weakdh.org/" rel="nofollow">https://weakdh.org/</a>
</li></ul>Well thank you very much for sharing this knowledge with me, I will do what I can to correct it, and2015-06-19T03:58:59-07:00jjpjjpjjphttps://support.mozilla.org/fr/questions/1067995#answer-743325<p>Well thank you very much for sharing this knowledge with me, I will do what I can to correct it, and I will contact the webmasters a.s.a.p.
</p>this is a vulnerability in the configuration of web-servers, that allows downgrading the encryption 2015-06-19T03:51:54-07:00philipphttps://support.mozilla.org/fr/questions/1067995#answer-743321<p>this is a vulnerability in the configuration of web-servers, that allows downgrading the encryption levels of connections so that third parties can listen in (so it will need to be fixed by the administrators of each affected webservers).
new browser versions should show you a warning message like the one you have referenced and block any connections to affected servers.
</p>This seems to directly refer to my problem, just to make sure, I am running 64 bit windows 8.1 and a2015-06-19T03:46:47-07:00jjpjjpjjphttps://support.mozilla.org/fr/questions/1067995#answer-743316<p>This seems to directly refer to my problem, just to make sure, I am running 64 bit windows 8.1 and a newer browser, it would still affect me?
</p>hi jjpjjpjjp, this means that the webserver you're trying to reach is vulnerable to the recently pub2015-06-19T03:34:50-07:00philipphttps://support.mozilla.org/fr/questions/1067995#answer-743305<p>hi jjpjjpjjp, this means that the webserver you're trying to reach is vulnerable to the recently published logjam vulnerability: <a href="http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/" rel="nofollow">http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/</a>
please report that to webmaster of the site in question to fix that issue...
</p><p><a href="https://weakdh.org/" rel="nofollow">https://weakdh.org/</a>
</p>