* [gentoo-user] Is this a bug in firefox-36.0?
@ 2015-03-17 23:49 walt
2015-03-18 0:47 ` Daniel Frey
` (4 more replies)
0 siblings, 5 replies; 20+ messages in thread
From: walt @ 2015-03-17 23:49 UTC (permalink / raw
To: gentoo-user
I get a certificate verification error when visiting https://www.att.com
using firefox-36.0, but not when using chrome-41.0.2272.76.
Anyone else see the same with firefox-36?
BTW, I tried the latest firefox in a Win7 virtual machine and I was
shocked to see that firefox was updating itself when I was logged in
as an unprivileged user (i.e. *not* an Administrator). Are the idiots
at M$ *really* that stupid? They've learned nothing, apparently, since
Win 95 :(
BTW, the Win7 firefox also flagged an error when visiting the web site
I mentioned above, but the error was displayed so subtly that I would
have missed it if I hadn't been looking for it specifically. Very bad
behavior.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Is this a bug in firefox-36.0?
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
@ 2015-03-18 0:47 ` Daniel Frey
2015-03-18 1:15 ` [gentoo-user] " walt
2015-03-18 19:42 ` »Q«
2015-03-18 1:07 ` [gentoo-user] " Zhu Sha Zang
` (3 subsequent siblings)
4 siblings, 2 replies; 20+ messages in thread
From: Daniel Frey @ 2015-03-18 0:47 UTC (permalink / raw
To: gentoo-user
On 03/17/2015 04:49 PM, walt wrote:
> I get a certificate verification error when visiting https://www.att.com
> using firefox-36.0, but not when using chrome-41.0.2272.76.
>
> Anyone else see the same with firefox-36?
I haven't tried, honestly. But I have had problems with Firefox not
including some intermediary certificates before. That breaks the whole
chain of trust.
> BTW, I tried the latest firefox in a Win7 virtual machine and I was
> shocked to see that firefox was updating itself when I was logged in
> as an unprivileged user (i.e. *not* an Administrator). Are the idiots
> at M$ *really* that stupid? They've learned nothing, apparently, since
> Win 95 :(
Remove the 'Mozilla Maintenance Service' from Programs & Features (or
whatever it's called) and it won't auto update. Mozilla installs a
privileged service that auto updates its software.
Dan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Is this a bug in firefox-36.0?
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
2015-03-18 0:47 ` Daniel Frey
@ 2015-03-18 1:07 ` Zhu Sha Zang
2015-03-18 3:53 ` Fernando Rodriguez
` (2 subsequent siblings)
4 siblings, 0 replies; 20+ messages in thread
From: Zhu Sha Zang @ 2015-03-18 1:07 UTC (permalink / raw
To: gentoo-user
On 03/17/2015 07:49 PM, walt wrote:
> I get a certificate verification error when visiting https://www.att.com
> using firefox-36.0, but not when using chrome-41.0.2272.76.
>
> Anyone else see the same with firefox-36?
>
> BTW, I tried the latest firefox in a Win7 virtual machine and I was
> shocked to see that firefox was updating itself when I was logged in
> as an unprivileged user (i.e. *not* an Administrator). Are the idiots
> at M$ *really* that stupid? They've learned nothing, apparently, since
> Win 95 :(
>
> BTW, the Win7 firefox also flagged an error when visiting the web site
> I mentioned above, but the error was displayed so subtly that I would
> have missed it if I hadn't been looking for it specifically. Very bad
> behavior.
>
>
I don't know if the test include log in the page. As I don't have a
login information I was able only to access the site:
Everything normal here.
Best Regards
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 0:47 ` Daniel Frey
@ 2015-03-18 1:15 ` walt
2015-03-18 2:34 ` Daniel Frey
2015-03-18 19:42 ` »Q«
1 sibling, 1 reply; 20+ messages in thread
From: walt @ 2015-03-18 1:15 UTC (permalink / raw
To: gentoo-user
On 03/17/2015 05:47 PM, Daniel Frey wrote:
> Mozilla installs a
> privileged service that auto updates its software.
Interesting. I didn't know about 'privileged services' in Windows.
I hope M$ grants these 'privileges' carefully.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 1:15 ` [gentoo-user] " walt
@ 2015-03-18 2:34 ` Daniel Frey
0 siblings, 0 replies; 20+ messages in thread
From: Daniel Frey @ 2015-03-18 2:34 UTC (permalink / raw
To: gentoo-user
On 03/17/2015 06:15 PM, walt wrote:
> On 03/17/2015 05:47 PM, Daniel Frey wrote:
>> Mozilla installs a
>> privileged service that auto updates its software.
>
> Interesting. I didn't know about 'privileged services' in Windows.
> I hope M$ grants these 'privileges' carefully.
You mean the user. Any app can install a service like that if the user
lets them. I'm assuming Mozilla's service runs as a SYSTEM user so it
can modify things, but I've never cared enough to look. I always remove
the Mozilla Maintenance Service and update manually.
Dan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Is this a bug in firefox-36.0?
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
2015-03-18 0:47 ` Daniel Frey
2015-03-18 1:07 ` [gentoo-user] " Zhu Sha Zang
@ 2015-03-18 3:53 ` Fernando Rodriguez
2015-03-18 6:56 ` Mick
2015-03-18 4:48 ` Fernando Rodriguez
2015-03-18 23:41 ` [gentoo-user] " walt
4 siblings, 1 reply; 20+ messages in thread
From: Fernando Rodriguez @ 2015-03-18 3:53 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1431 bytes --]
On Tuesday, March 17, 2015 4:49:54 PM walt wrote:
> I get a certificate verification error when visiting https://www.att.com
> using firefox-36.0, but not when using chrome-41.0.2272.76.
>
> Anyone else see the same with firefox-36?
>
> BTW, I tried the latest firefox in a Win7 virtual machine and I was
> shocked to see that firefox was updating itself when I was logged in
> as an unprivileged user (i.e. *not* an Administrator). Are the idiots
> at M$ *really* that stupid? They've learned nothing, apparently, since
> Win 95 :(
>
> BTW, the Win7 firefox also flagged an error when visiting the web site
> I mentioned above, but the error was displayed so subtly that I would
> have missed it if I hadn't been looking for it specifically. Very bad
> behavior.
>
Technically the issue is with att's SSL certificate. It may be that they got a
cheap certificate (meaning it's provides encryption but the CA did not verificy
that ATT is a legit company) or it may be an issue with the certificate.
It doesn't give any warning for me, it just shows an exclamation next to the
address and the latest chromium does the same (it shows a triangle) and it
gives you more info: "The identity of this website has been verified by Verizon
Akamai SureSever CA G14-SHA1 but does not have public audit records."
If you're concerned about it contact AT&T and let them know.
--
Fernando Rodriguez
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Is this a bug in firefox-36.0?
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
` (2 preceding siblings ...)
2015-03-18 3:53 ` Fernando Rodriguez
@ 2015-03-18 4:48 ` Fernando Rodriguez
2015-03-18 23:41 ` [gentoo-user] " walt
4 siblings, 0 replies; 20+ messages in thread
From: Fernando Rodriguez @ 2015-03-18 4:48 UTC (permalink / raw
To: gentoo-user
On Tuesday, March 17, 2015 4:49:54 PM walt wrote:
> BTW, I tried the latest firefox in a Win7 virtual machine and I was
> shocked to see that firefox was updating itself when I was logged in
> as an unprivileged user (i.e. *not* an Administrator). Are the idiots
> at M$ *really* that stupid? They've learned nothing, apparently, since
> Win 95 :(
At the risk of being flamed, the security model of NT operating systems is
actually far superior to that of Linux with all the disaster kits. The problem
is that Windows users don't want to be bothered with security settings. When
the set the default to ask for password on vista they where flooded with
negative feedback. MS being a commercial company would indeed be stupid not to
give them what they want.
As a user you could use an unprivileged account and use runas just like sudo
on Linux but that's too much for Windows users so they took it a step further,
even if you got admin rights it will ask for permission (optionally password)
before doing anything privileged, still users blindly click OK on those
dialogs (like you did with firefox).
If firefox follows MS guidelines it won't let an unpriviliged user (unless an
user with admin rights explicitly sets an option allowing it, probably during
install) update it even technically it can cause you allowed it to install.
--
Fernando Rodriguez
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Is this a bug in firefox-36.0?
2015-03-18 3:53 ` Fernando Rodriguez
@ 2015-03-18 6:56 ` Mick
0 siblings, 0 replies; 20+ messages in thread
From: Mick @ 2015-03-18 6:56 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: Text/Plain, Size: 2261 bytes --]
On Wednesday 18 Mar 2015 03:53:57 Fernando Rodriguez wrote:
> On Tuesday, March 17, 2015 4:49:54 PM walt wrote:
> > I get a certificate verification error when visiting https://www.att.com
> > using firefox-36.0, but not when using chrome-41.0.2272.76.
> >
> > Anyone else see the same with firefox-36?
> >
> > BTW, I tried the latest firefox in a Win7 virtual machine and I was
> > shocked to see that firefox was updating itself when I was logged in
> > as an unprivileged user (i.e. *not* an Administrator). Are the idiots
> > at M$ *really* that stupid? They've learned nothing, apparently, since
> > Win 95 :(
> >
> > BTW, the Win7 firefox also flagged an error when visiting the web site
> > I mentioned above, but the error was displayed so subtly that I would
> > have missed it if I hadn't been looking for it specifically. Very bad
> > behavior.
>
> Technically the issue is with att's SSL certificate. It may be that they
> got a cheap certificate (meaning it's provides encryption but the CA did
> not verificy that ATT is a legit company) or it may be an issue with the
> certificate.
>
> It doesn't give any warning for me, it just shows an exclamation next to
> the address and the latest chromium does the same (it shows a triangle)
> and it gives you more info: "The identity of this website has been
> verified by Verizon Akamai SureSever CA G14-SHA1 but does not have public
> audit records."
>
> If you're concerned about it contact AT&T and let them know.
I also don't see a (pop-up) warning on Firefox 31.5.0 and Chromium
41.0.2272.76, but both browsers complain for two things by means of
exclamation marks in their address bar:
1. Some components on the page (pictures) are not secure. It is common
practice to load pictures from a picture library on a different server to
where the main web page content is served, but they should secure all content
with the same keys to avoid confusion.
2. The lack of Audit records for the wildcard certificate the site is using.
This is a new security check and relates to certificate transparency, which
aims to protect us from rogue or compromised CAs:
http://www.certificate-transparency.org/what-is-ct
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 473 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 0:47 ` Daniel Frey
2015-03-18 1:15 ` [gentoo-user] " walt
@ 2015-03-18 19:42 ` »Q«
1 sibling, 0 replies; 20+ messages in thread
From: »Q« @ 2015-03-18 19:42 UTC (permalink / raw
To: gentoo-user
On Tue, 17 Mar 2015 17:47:04 -0700
Daniel Frey <djqfrey@gmail.com> wrote:
> On 03/17/2015 04:49 PM, walt wrote:
> > I get a certificate verification error when visiting
> > https://www.att.com using firefox-36.0, but not when using
> > chrome-41.0.2272.76.
> >
> > Anyone else see the same with firefox-36?
FWIW, I don't see an error with firefox-36.0.1 and nss-3.17.4
> > BTW, I tried the latest firefox in a Win7 virtual machine and I was
> > shocked to see that firefox was updating itself when I was logged in
> > as an unprivileged user (i.e. *not* an Administrator). Are the
> > idiots at M$ *really* that stupid? They've learned nothing,
> > apparently, since Win 95 :(
>
> Remove the 'Mozilla Maintenance Service' from Programs & Features (or
> whatever it's called) and it won't auto update. Mozilla installs a
> privileged service that auto updates its software.
It will still auto-update, but it won't do so silently -- without the
service, automagic updates will trigger Windows' warning prompt. To
just turn off autoupdate, there's a checkbox in the Firefox GUI.
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
` (3 preceding siblings ...)
2015-03-18 4:48 ` Fernando Rodriguez
@ 2015-03-18 23:41 ` walt
2015-03-18 23:46 ` Daniel Frey
` (3 more replies)
4 siblings, 4 replies; 20+ messages in thread
From: walt @ 2015-03-18 23:41 UTC (permalink / raw
To: gentoo-user
On 03/17/2015 04:49 PM, walt wrote:
> I get a certificate verification error when visiting https://www.att.com
> using firefox-36.0, but not when using chrome-41.0.2272.76.
Thanks to all who replied. I'm surprised by the variety of different results
you reported.
(BTW, I'm running firefox-bin-36.0, so the behavior may be a bit different from
the gentoo build.)
FF will not even show me the secure att.com webpage. I get an entire html page
with this (very big) error message:
Secure Connection Failed
An error occurred during a connection to www.att.com. The OCSP server experienced
an internal error. (Error code: sec_error_ocsp_server_error)
The page you are trying to view cannot be shown because the authenticity of the
received data could not be verified.
Please contact the website owners to inform them of this problem.
Am I the only one seeing this error message on firefox? I'll try compiling the
gentoo version to see if the behavior is different.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 23:41 ` [gentoo-user] " walt
@ 2015-03-18 23:46 ` Daniel Frey
2015-03-19 1:06 ` Fernando Rodriguez
` (2 subsequent siblings)
3 siblings, 0 replies; 20+ messages in thread
From: Daniel Frey @ 2015-03-18 23:46 UTC (permalink / raw
To: gentoo-user
On 03/18/2015 04:41 PM, walt wrote:
> On 03/17/2015 04:49 PM, walt wrote:
>> I get a certificate verification error when visiting https://www.att.com
>> using firefox-36.0, but not when using chrome-41.0.2272.76.
>
> Thanks to all who replied. I'm surprised by the variety of different results
> you reported.
>
> (BTW, I'm running firefox-bin-36.0, so the behavior may be a bit different from
> the gentoo build.)
>
> FF will not even show me the secure att.com webpage. I get an entire html page
> with this (very big) error message:
>
> Secure Connection Failed
>
> An error occurred during a connection to www.att.com. The OCSP server experienced
> an internal error. (Error code: sec_error_ocsp_server_error)
>
> The page you are trying to view cannot be shown because the authenticity of the
> received data could not be verified.
>
> Please contact the website owners to inform them of this problem.
>
>
> Am I the only one seeing this error message on firefox? I'll try compiling the
> gentoo version to see if the behavior is different.
>
>
>
I'm using:
# equery list firefox
* Searching for firefox ...
[IP-] [ ] www-client/firefox-36.0.1:0
(not the -bin)
and I also get the triangle in the URL stating the website doesn't
supply identify information. It does load for me, though.
Dan
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 23:41 ` [gentoo-user] " walt
2015-03-18 23:46 ` Daniel Frey
@ 2015-03-19 1:06 ` Fernando Rodriguez
2015-03-19 10:57 ` walt
2015-03-19 7:26 ` Marc Joliet
2015-03-20 0:15 ` »Q«
3 siblings, 1 reply; 20+ messages in thread
From: Fernando Rodriguez @ 2015-03-19 1:06 UTC (permalink / raw
To: gentoo-user
On Wednesday, March 18, 2015 4:41:25 PM walt wrote:
> On 03/17/2015 04:49 PM, walt wrote:
> > I get a certificate verification error when visiting https://www.att.com
> > using firefox-36.0, but not when using chrome-41.0.2272.76.
>
> Thanks to all who replied. I'm surprised by the variety of different results
> you reported.
>
> (BTW, I'm running firefox-bin-36.0, so the behavior may be a bit different
from
> the gentoo build.)
>
> FF will not even show me the secure att.com webpage. I get an entire html
page
> with this (very big) error message:
>
> Secure Connection Failed
>
> An error occurred during a connection to www.att.com. The OCSP server
experienced
> an internal error. (Error code: sec_error_ocsp_server_error)
>
> The page you are trying to view cannot be shown because the authenticity of
the
> received data could not be verified.
>
> Please contact the website owners to inform them of this problem.
>
>
That sounds more like a networking issue. Are you behind a firewall? Is it
possible that you somehow blocked their OCSP server? Can you bypass the
firewall for testing?
It also looks like firefox caches the error:
http://superuser.com/questions/755755/sec-error-ocsp-server-error-when-trying-to-open-a-https-page but you're having this issue for a while and more than
one device now so it's not likely that it was a temporary problem.
--
Fernando Rodriguez
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 23:41 ` [gentoo-user] " walt
2015-03-18 23:46 ` Daniel Frey
2015-03-19 1:06 ` Fernando Rodriguez
@ 2015-03-19 7:26 ` Marc Joliet
2015-03-20 0:15 ` »Q«
3 siblings, 0 replies; 20+ messages in thread
From: Marc Joliet @ 2015-03-19 7:26 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1481 bytes --]
Am Wed, 18 Mar 2015 16:41:25 -0700
schrieb walt <w41ter@gmail.com>:
[...]
> FF will not even show me the secure att.com webpage. I get an entire html page
> with this (very big) error message:
>
> Secure Connection Failed
>
> An error occurred during a connection to www.att.com. The OCSP server experienced
> an internal error. (Error code: sec_error_ocsp_server_error)
>
> The page you are trying to view cannot be shown because the authenticity of the
> received data could not be verified.
>
> Please contact the website owners to inform them of this problem.
>
>
> Am I the only one seeing this error message on firefox? I'll try compiling the
> gentoo version to see if the behavior is different.
OCSP has nothing to do with AT&T, it is a security feature that is supposed to
help verify the authenticity of certificates. From what I've read on tech
news sites, it has fallen out of favor precisely due to issues like this
(Chrome has deactivated it, for example). See
https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol; also see
https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning for one (the?)
replacement.
(Note that I am speaking as a user, so feel free to clarify if I'm not being
100% correct.)
As to how to work around it, perhaps it makes sense to turn the feature off?
HTH
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-19 1:06 ` Fernando Rodriguez
@ 2015-03-19 10:57 ` walt
2015-03-19 15:29 ` Fernando Rodriguez
0 siblings, 1 reply; 20+ messages in thread
From: walt @ 2015-03-19 10:57 UTC (permalink / raw
To: gentoo-user
On 03/18/2015 06:06 PM, Fernando Rodriguez wrote:
> On Wednesday, March 18, 2015 4:41:25 PM walt wrote:
>> On 03/17/2015 04:49 PM, walt wrote:
>>> I get a certificate verification error when visiting https://www.att.com
>>> using firefox-36.0, but not when using chrome-41.0.2272.76.
>>
>> Thanks to all who replied. I'm surprised by the variety of different results
>> you reported.
>>
>> (BTW, I'm running firefox-bin-36.0, so the behavior may be a bit different
> from
>> the gentoo build.)
>>
>> FF will not even show me the secure att.com webpage. I get an entire html
> page
>> with this (very big) error message:
>>
>> Secure Connection Failed
>>
>> An error occurred during a connection to www.att.com. The OCSP server
> experienced
>> an internal error. (Error code: sec_error_ocsp_server_error)
>>
>> The page you are trying to view cannot be shown because the authenticity of
> the
>> received data could not be verified.
>>
>> Please contact the website owners to inform them of this problem.
>>
>>
>
> That sounds more like a networking issue. Are you behind a firewall? Is it
> possible that you somehow blocked their OCSP server? Can you bypass the
> firewall for testing?
Wow, creepy. I forced a warm reboot of my home wireless router and the problem
went away. I now see the gray triangle with the ! and I have no idea how long
ago that started. I probably just didn't notice it until this router screw-up
happened. And I don't even want to think about why my home router suddenly
changed behavior :(
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-19 10:57 ` walt
@ 2015-03-19 15:29 ` Fernando Rodriguez
0 siblings, 0 replies; 20+ messages in thread
From: Fernando Rodriguez @ 2015-03-19 15:29 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1946 bytes --]
On Thursday, March 19, 2015 3:57:05 AM walt wrote:
> On 03/18/2015 06:06 PM, Fernando Rodriguez wrote:
> > On Wednesday, March 18, 2015 4:41:25 PM walt wrote:
> >> On 03/17/2015 04:49 PM, walt wrote:
> >>> I get a certificate verification error when visiting https://www.att.com
> >>> using firefox-36.0, but not when using chrome-41.0.2272.76.
> >>
> >> Thanks to all who replied. I'm surprised by the variety of different
results
> >> you reported.
> >>
> >> (BTW, I'm running firefox-bin-36.0, so the behavior may be a bit different
> > from
> >> the gentoo build.)
> >>
> >> FF will not even show me the secure att.com webpage. I get an entire
html
> > page
> >> with this (very big) error message:
> >>
> >> Secure Connection Failed
> >>
> >> An error occurred during a connection to www.att.com. The OCSP server
> > experienced
> >> an internal error. (Error code: sec_error_ocsp_server_error)
> >>
> >> The page you are trying to view cannot be shown because the authenticity
of
> > the
> >> received data could not be verified.
> >>
> >> Please contact the website owners to inform them of this problem.
> >>
> >>
> >
> > That sounds more like a networking issue. Are you behind a firewall? Is it
> > possible that you somehow blocked their OCSP server? Can you bypass the
> > firewall for testing?
>
> Wow, creepy. I forced a warm reboot of my home wireless router and the
problem
> went away. I now see the gray triangle with the ! and I have no idea how
long
> ago that started. I probably just didn't notice it until this router screw-
up
> happened. And I don't even want to think about why my home router suddenly
> changed behavior :(
It probably started Jan 20 when they renewed the certificate. See
http://www.certificate-transparency.org/ev-ct-plan (from Mick's link). It
refers to chrome but probably applies to firefox as well.
--
Fernando Rodriguez
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-18 23:41 ` [gentoo-user] " walt
` (2 preceding siblings ...)
2015-03-19 7:26 ` Marc Joliet
@ 2015-03-20 0:15 ` »Q«
2015-03-21 0:18 ` walt
3 siblings, 1 reply; 20+ messages in thread
From: »Q« @ 2015-03-20 0:15 UTC (permalink / raw
To: gentoo-user
On Wed, 18 Mar 2015 16:41:25 -0700
walt <w41ter@gmail.com> wrote:
> (BTW, I'm running firefox-bin-36.0, so the behavior may be a bit
> different from the gentoo build.)
>
> FF will not even show me the secure att.com webpage. I get an entire
> html page with this (very big) error message:
>
> Secure Connection Failed
>
> An error occurred during a connection to www.att.com. The OCSP server
> experienced an internal error. (Error code:
> sec_error_ocsp_server_error)
>
> The page you are trying to view cannot be shown because the
> authenticity of the received data could not be verified.
Why didn't you say so? ;)
Enter "about:config" in the address bar, search for
"security.OCSP.require" and toggle it to false, which is the default
(Mozilla's shipped default, at least). OCSP will still be checked when
possible, but you shouldn't be locked out any more when it's not
possible.
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-20 0:15 ` »Q«
@ 2015-03-21 0:18 ` walt
2015-03-21 3:37 ` »Q«
0 siblings, 1 reply; 20+ messages in thread
From: walt @ 2015-03-21 0:18 UTC (permalink / raw
To: gentoo-user
On 03/19/2015 05:15 PM, »Q« wrote:
>> The OCSP server
>> > experienced an internal error. (Error code:
>> > sec_error_ocsp_server_error)
>> >
>> > The page you are trying to view cannot be shown because the
>> > authenticity of the received data could not be verified.
> Why didn't you say so? ;)
>
> Enter "about:config" in the address bar, search for
> "security.OCSP.require" and toggle it to false, which is the default
> (Mozilla's shipped default, at least).
Very interesting, thanks.
Now that I have an expert's brain to pick :) maybe you can answer two
more questions for me:
I know I didn't change that flag myself, but something did. Do you
know if firefox extensions/addons can change the items in about:config?
Second, I "fixed" the problem once by rebooting my wireless router, but
got the same error again early this morning -- which I "fixed" once again
by rebooting my wireless router. This makes me worry that somebody out
there in the evil internet might be changing the security settings of my
router (which is owned by my ISP and has remotely updateable firmware).
Thanks again.
^ permalink raw reply [flat|nested] 20+ messages in thread
* [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-21 0:18 ` walt
@ 2015-03-21 3:37 ` »Q«
2015-03-24 6:52 ` Mick
0 siblings, 1 reply; 20+ messages in thread
From: »Q« @ 2015-03-21 3:37 UTC (permalink / raw
To: gentoo-user
On Fri, 20 Mar 2015 17:18:23 -0700
walt <w41ter@gmail.com> wrote:
> On 03/19/2015 05:15 PM, »Q« wrote:
> >> The OCSP server
> >> > experienced an internal error. (Error code:
> >> > sec_error_ocsp_server_error)
> >> >
> >> > The page you are trying to view cannot be shown because the
> >> > authenticity of the received data could not be verified.
>
> > Why didn't you say so? ;)
> >
> > Enter "about:config" in the address bar, search for
> > "security.OCSP.require" and toggle it to false, which is the default
> > (Mozilla's shipped default, at least).
>
> Very interesting, thanks.
>
> Now that I have an expert's brain to pick :) maybe you can answer two
> more questions for me:
>
> I know I didn't change that flag myself, but something did. Do you
> know if firefox extensions/addons can change the items in
> about:config?
I won't cop to being an expert! But yes, extensions can change
settings, and AFAIK if/when that happens there is no way to tell what
extension has done what to them. If an extension changed that
particular setting, I'd guess it would be an extension meant to tighten
security.
> Second, I "fixed" the problem once by rebooting my wireless router,
> but got the same error again early this morning -- which I "fixed"
> once again by rebooting my wireless router. This makes me worry that
> somebody out there in the evil internet might be changing the
> security settings of my router (which is owned by my ISP and has
> remotely updateable firmware).
Sorry, I have no idea how to investigate that.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-21 3:37 ` »Q«
@ 2015-03-24 6:52 ` Mick
2015-03-24 9:36 ` Peter Humphrey
0 siblings, 1 reply; 20+ messages in thread
From: Mick @ 2015-03-24 6:52 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: Text/Plain, Size: 1037 bytes --]
On Saturday 21 Mar 2015 03:37:59 »Q« wrote:
> > Second, I "fixed" the problem once by rebooting my wireless router,
> > but got the same error again early this morning -- which I "fixed"
> > once again by rebooting my wireless router. This makes me worry that
> > somebody out there in the evil internet might be changing the
> > security settings of my router (which is owned by my ISP and has
> > remotely updateable firmware).
>
> Sorry, I have no idea how to investigate that.
Next time your router starts playing up, use nslookup and perhaps dig to query
your router's DNS repeater, your ISPs resolvers and any other 3rd party DNS
servers; e.g. openDNS, Google, or a DNS server from here:
http://www.circleid.com/posts/20110407_top_public_dns_resolvers_compared/
so that you can draw comparisons to help you determine where the problem lies.
If it is your router, you can ask your ISP to replace it.
If the ISP is not cooperating could perhaps run your own local DNS resolver?
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 473 bytes --]
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [gentoo-user] Re: Is this a bug in firefox-36.0?
2015-03-24 6:52 ` Mick
@ 2015-03-24 9:36 ` Peter Humphrey
0 siblings, 0 replies; 20+ messages in thread
From: Peter Humphrey @ 2015-03-24 9:36 UTC (permalink / raw
To: gentoo-user
On Tuesday 24 March 2015 06:52:58 Mick wrote:
> Next time your router starts playing up, use nslookup and perhaps dig to
> query your router's DNS repeater, your ISPs resolvers and any other 3rd
> party DNS servers; e.g. openDNS, Google, or a DNS server from here:
>
> http://www.circleid.com/posts/20110407_top_public_dns_resolvers_compared/
>
> so that you can draw comparisons to help you determine where the problem
> lies. If it is your router, you can ask your ISP to replace it.
>
> If the ISP is not cooperating could perhaps run your own local DNS
> resolver?
I do that here. Dnsmasq runs on a little box on the LAN and speeds up the
whole Internet experience. It didn't help though when my router started
misbehaving, as it still had to forward some queries and the router sat on
those.
It was simple enough to reboot the router, once I'd found that was needed.
--
Rgds
Peter.
^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2015-03-24 9:36 UTC | newest]
Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-17 23:49 [gentoo-user] Is this a bug in firefox-36.0? walt
2015-03-18 0:47 ` Daniel Frey
2015-03-18 1:15 ` [gentoo-user] " walt
2015-03-18 2:34 ` Daniel Frey
2015-03-18 19:42 ` »Q«
2015-03-18 1:07 ` [gentoo-user] " Zhu Sha Zang
2015-03-18 3:53 ` Fernando Rodriguez
2015-03-18 6:56 ` Mick
2015-03-18 4:48 ` Fernando Rodriguez
2015-03-18 23:41 ` [gentoo-user] " walt
2015-03-18 23:46 ` Daniel Frey
2015-03-19 1:06 ` Fernando Rodriguez
2015-03-19 10:57 ` walt
2015-03-19 15:29 ` Fernando Rodriguez
2015-03-19 7:26 ` Marc Joliet
2015-03-20 0:15 ` »Q«
2015-03-21 0:18 ` walt
2015-03-21 3:37 ` »Q«
2015-03-24 6:52 ` Mick
2015-03-24 9:36 ` Peter Humphrey
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox