Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

Cannot connect to an https website, but works with Firefox 3.6 and other browsers

more options

I cannot connect to this website from newer version of Firefox than 3.6. Tried on Linux, OS X and Windows operating systems and other browsers. IE and Safari works fine:

I tried on the latest (nightly) Firefox mobile as well without any success.

I cannot connect to this website from newer version of Firefox than 3.6. Tried on Linux, OS X and Windows operating systems and other browsers. IE and Safari works fine: I tried on the latest (nightly) Firefox mobile as well without any success.

All Replies (6)

more options

First I get the "This Connection is Untrusted" page.

After adding an exception, I get "The connection was reset" and reloading just returns the same message.

Is that what you get?

I get similar results in IE8, both on Windows 7.

more options

Yes. This is exactly what I got. Safari and Firefox 3.6 deliver the site.

more options

Not for me. Firefox 3.6.x gives the same error.

The certificate is not trusted because it is self-signed.
The certificate is only valid for FGT80C3910606976

You must have created an exception in Firefox 3.6.x if it works there.

Don't you see the link to Add an exception at the bottom of the SSL error page?

more options

of course, i added. As i mentoned above the real error is "The connection was reset". why is it ok on Safari?

more options

The "The connection was reset" error message can be caused by a bug fix for the BEAST (Browser Exploit Against SSL/TLS) attack that the server doesn't handle.

See comment 60 in this bug report for workaround, but be aware that this makes you vulnerable to that BEAST attack.

  • bug 702111 - Servers intolerant to 1/n-1 record splitting. "The connection was reset"
export NSS_SSL_CBC_RANDOM_IV=0

Be sure to remove that environment variable after testing to prevent you from being vulnerable to that exploit.

Modified by cor-el

more options

thanks i will check this and come back to you with the result