A
A
Alexander Makarov2016-08-11 13:08:18
System administration
Alexander Makarov, 2016-08-11 13:08:18

Problem with SSL, firefox periodically issues SSL_ERROR_ILLEGAL_PARAMETER_ALERT. What to do?

Chrome does not throw such messages. Is there something wrong with SSL itself? Or something wrong in the server settings? The certificate was bought officially by RapidSSL. Advice like disabling the antivirus or disabling the ssl check in firefox does not work, because if I have this error, it can be reproduced by other users, and this no longer suits me.

Answer the question

In order to leave comments, you need to log in

1 answer(s)
L
landergate, 2016-08-11
@consme

You didn't provide a website address, and the error is pretty vague, so it's only a guess.
If you want to check it yourself:
ssllabs.com Shows
problems with your web server settings in the context of SSL and HTTPS.
The browser may experience problems loading the page due to incorrect/insecure ssl_ciphers settings.

server {
    listen 80 default_server;
    listen [::]:80 default_server;

    # Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
    return 301 https://$host$request_uri;
}

server {
    listen 443 ssl http2;
    listen [::]:443 ssl http2;

    # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
    ssl_certificate /path/to/signed_cert_plus_intermediates;
    ssl_certificate_key /path/to/private_key;
    ssl_session_timeout 1d;
    ssl_session_cache shared:SSL:50m;
    ssl_session_tickets off;

    # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
    ssl_dhparam /path/to/dhparam.pem;

    # intermediate configuration. tweak to your needs.
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
    ssl_prefer_server_ciphers on;

    # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
    add_header Strict-Transport-Security max-age=15768000;

    # OCSP Stapling ---
    # fetch OCSP records from URL in ssl_certificate and cache them
    ssl_stapling on;
    ssl_stapling_verify on;

    ## verify chain of trust of OCSP response using Root CA and Intermediate certs
    ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;

    resolver <IP DNS resolver>;

    ....
}

Generated by this tool from Mozilla's best practice for configuring SSL on nginx: https://mozilla.github.io/server-side-tls/ssl-conf...
https://wiki.mozilla.org/Security/Server_Side_TLS
( Intermediate is chosen, it differs from Modern in the set of supported browsers in case you need very far compatibility with old multi-year browsers)
Just change the path to ssl_dhparam /path/to/dhparam.pem;, after generating it like this:
Although, in fact, I could not reproduce the loading error in my FF pages.
But you still need to follow these practices .

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question