搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

Learn More

Windows PKI certificates not trusted due to disabled insecure algorithm.

  • 3 回覆
  • 1 有這個問題
  • 1094 次檢視
  • 最近回覆由 meshuggener

more options

Hi there,


I appear to have a similar issue to this user: https://support.mozilla.org/en-US/questions/1174634 Except that I am using a Server 2016 CA, my cryptography is ECC P-384 and SHA-384 which is acceptable according to section 5.1 of: https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#maintenance

All certificates issued to websites on my network get the "Your connection is not secure" and the reason as: "sec_error_cert_signature_algorithm_disabled"

IE has no issue with these certs and trusts them and the cert appears the same in both browsers.

Is this a Firefox setting? How can I find out what algorithm it has the problem with?

I have tested this in Firefox 44.0.2 and 60.2 which are the two versions we use, no difference in either.

EDIT: I can confirm that nothing is intercepting my traffic and that the cert presented is the cert I'm expecting, unlike others who've had the same error.

Any help is appreciated.


Regards,

Alex

Hi there, I appear to have a similar issue to this user: https://support.mozilla.org/en-US/questions/1174634 Except that I am using a Server 2016 CA, my cryptography is ECC P-384 and SHA-384 which is acceptable according to section 5.1 of: https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#maintenance All certificates issued to websites on my network get the "Your connection is not secure" and the reason as: "sec_error_cert_signature_algorithm_disabled" IE has no issue with these certs and trusts them and the cert appears the same in both browsers. Is this a Firefox setting? How can I find out what algorithm it has the problem with? I have tested this in Firefox 44.0.2 and 60.2 which are the two versions we use, no difference in either. EDIT: I can confirm that nothing is intercepting my traffic and that the cert presented is the cert I'm expecting, unlike others who've had the same error. Any help is appreciated. Regards, Alex

由 meshuggener 於 修改

被選擇的解決方法

I have managed to solve this issue with support from Mozilla.

The issue was when building my PKI root and sub CAs I enabled the 'AlternateSignatireAlgorithms = 1' in the CAPolicy.inf.

This changed the format of the certs I was issuing into a format that Firefox (and not much else) doesn't support. Namely above where IE sees the signature algorithm as "specifiedECDSA" when it should be "sha384ECDSA" and where in FF the "Algorithm Parameter" field wasn't empty like it's supposed to be according to RFC5758 3.2. "the encoding MUST omit the parameters field".

To resolve this I went through all my CAs and changed the flag to 0 in the CAPolicy.inf and modified the registry setting under: HKLM\SYSTEM\CurrentControlSet\Services\Certsvc\Configuration\CANAMEHERE\CSP And then renewed and resigned all certs.

I also posted on Technet to get some confirmation: https://social.technet.microsoft.com/Forums/en-US/eec01ac5-8524-42ac-b2d0-5d3722e077b8/alternatesignaturealgorithm-enabled-on-root-and-sub-cas-causing-issues?forum=winserversecurity

從原來的回覆中察看解決方案 👍 0

所有回覆 (3)

more options

Hi Alex, the only signature algorithm I know to be disabled in more recent versions of Firefox is SHA-1. If you inspect your certificate in another browser and check not only the website's cert but the signing cert(s) in the chain, do any of them use SHA-1?

more options

Hi there,


I can confirm that the rootCA, subCA and the end cert are all SHA-384.

In Firefox:

Certificate Signature Algorithm Algorithm Identifier Object Identifier (1 2 840 10045 4 3)


In IE11:

Signature Algorithm specifiedECDSA Signature Hash Algorithm sha384


The OID is this one: http://oid-info.com/get/1.2.840.10045.4.3

The only odd thing is the end cert is RSA whereas the root and sub CAs are ECC, I don't see how that could cause this however.


Regards,

Alex

more options

選擇的解決方法

I have managed to solve this issue with support from Mozilla.

The issue was when building my PKI root and sub CAs I enabled the 'AlternateSignatireAlgorithms = 1' in the CAPolicy.inf.

This changed the format of the certs I was issuing into a format that Firefox (and not much else) doesn't support. Namely above where IE sees the signature algorithm as "specifiedECDSA" when it should be "sha384ECDSA" and where in FF the "Algorithm Parameter" field wasn't empty like it's supposed to be according to RFC5758 3.2. "the encoding MUST omit the parameters field".

To resolve this I went through all my CAs and changed the flag to 0 in the CAPolicy.inf and modified the registry setting under: HKLM\SYSTEM\CurrentControlSet\Services\Certsvc\Configuration\CANAMEHERE\CSP And then renewed and resigned all certs.

I also posted on Technet to get some confirmation: https://social.technet.microsoft.com/Forums/en-US/eec01ac5-8524-42ac-b2d0-5d3722e077b8/alternatesignaturealgorithm-enabled-on-root-and-sub-cas-causing-issues?forum=winserversecurity