Your message dated Tue, 24 Jan 2006 09:19:38 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#349624: firefox cannot connect to https site
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Jan 2006 07:08:22 +0000
>From [EMAIL PROTECTED] Mon Jan 23 23:08:22 2006
Return-path: <[EMAIL PROTECTED]>
Received: from ihug-mail.icp-qv1-irony2.iinet.net.au ([203.59.1.196] 
helo=mail-ihug.icp-qv1-irony2.iinet.net.au)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1F1IHu-00048F-Hc
        for [EMAIL PROTECTED]; Mon, 23 Jan 2006 23:08:22 -0800
Received: from pug.anu.edu.au ([150.203.181.71])
  by mail-ihug.icp-qv1-irony2.iinet.net.au with ESMTP; 24 Jan 2006 15:07:48 
+0800
X-BrightmailFiltered: true
X-Brightmail-Tracker: AAAAAA==
Received: from drew by pug.anu.edu.au with local (Exim 4.60)
        (envelope-from <[EMAIL PROTECTED]>)
        id 1F1IHK-0007MX-Fr; Tue, 24 Jan 2006 18:07:46 +1100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Drew Parsons <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: firefox cannot connect to https site
Message-ID: <[EMAIL PROTECTED]>
X-Mailer: reportbug 3.18
Date: Tue, 24 Jan 2006 18:07:46 +1100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: firefox
Version: 1.5.dfsg-4
Severity: normal

I've filed this bug at bugzilla
https://bugzilla.mozilla.org/show_bug.cgi?id=324487 

When I try to connect to
https://paragon.acs.org/paragon/application?pageid=content&parentid=authorchecklist&mid=ag_ma.html&headername=Author%20Information%20-%20Macromolecules
(the "info for authors" links on
http://pubs.acs.org/journals/mamobx/index.html), firefox refuses to connect,
saying "Firefox and paragon.acs.org cannot communicate securely because they
have no common encryption algorithms".

It does work from mozilla 1.7.12 (which says the site has low-grade
encryption, RC4-40 40 bit).

Since a windows firefox 1.5 user seems to be able to access the page, I'm
referring the bug to you and Debian to prove it's not just me experiencing
the problem.

Thanks,

Drew


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.15
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages firefox depends on:
ii  debianutils               2.15.2         Miscellaneous utilities specific t
ii  fontconfig                2.3.2-1.1      generic font configuration library
ii  libatk1.0-0               1.10.3-1       The ATK accessibility toolkit
ii  libc6                     2.3.5-12       GNU C Library: Shared libraries an
ii  libcairo2                 1.0.2-3        The Cairo 2D vector graphics libra
ii  libfontconfig1            2.3.2-1.1      generic font configuration library
ii  libfreetype6              2.1.10-1       FreeType 2 font engine, shared lib
ii  libgcc1                   1:4.0.2-7      GCC support library
ii  libglib2.0-0              2.8.6-1        The GLib library of C routines
ii  libgtk2.0-0               2.8.10-1       The GTK+ graphical user interface 
ii  libidl0                   0.8.5-1        library for parsing CORBA IDL file
ii  libjpeg62                 6b-11          The Independent JPEG Group's JPEG 
ii  libpango1.0-0             1.10.2-1       Layout and rendering of internatio
ii  libpng12-0                1.2.8rel-5     PNG library - runtime
ii  libstdc++6                4.0.2-7        The GNU Standard C++ Library v3
ii  libx11-6                  6.9.0.dfsg.1-4 X Window System protocol client li
ii  libxcursor1               1.1.3-1        X cursor management library
ii  libxext6                  6.9.0.dfsg.1-4 X Window System miscellaneous exte
ii  libxft2                   2.1.7-1        FreeType-based font drawing librar
ii  libxi6                    6.9.0.dfsg.1-4 X Window System Input extension li
ii  libxinerama1              6.9.0.dfsg.1-4 X Window System multi-head display
ii  libxp6                    6.9.0.dfsg.1-4 X Window System printing extension
ii  libxrandr2                6.9.0.dfsg.1-4 X Window System Resize, Rotate and
ii  libxrender1               1:0.9.0.2-1    X Rendering Extension client libra
ii  libxt6                    6.9.0.dfsg.1-4 X Toolkit Intrinsics
ii  psmisc                    22.1-1         Utilities that use the proc filesy
ii  zlib1g                    1:1.2.3-9      compression library - runtime

firefox recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 349624-done) by bugs.debian.org; 24 Jan 2006 08:20:23 +0000
>From [EMAIL PROTECTED] Tue Jan 24 00:20:23 2006
Return-path: <[EMAIL PROTECTED]>
Received: from aputeaux-153-1-65-66.w82-124.abo.wanadoo.fr ([82.124.143.66] 
helo=namakemono.glandium.org)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1F1JPb-0005oi-Hy
        for [EMAIL PROTECTED]; Tue, 24 Jan 2006 00:20:23 -0800
Received: from mh by namakemono.glandium.org with local (Exim 4.60)
        (envelope-from <[EMAIL PROTECTED]>)
        id 1F1JOs-0000fU-Mo; Tue, 24 Jan 2006 09:19:38 +0100
Date: Tue, 24 Jan 2006 09:19:38 +0100
From: Mike Hommey <[EMAIL PROTECTED]>
To: Drew Parsons <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Bug#349624: firefox cannot connect to https site
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
X-GPG-Fingerprint: A479 A824 265C B2A5 FC54  8D1E DE4B DA2C 54FD 2A58
Organization: glandium.org
User-Agent: Mutt/1.5.11
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER,
        RCVD_IN_SORBS autolearn=no version=2.60-bugs.debian.org_2005_01_02

On Tue, Jan 24, 2006 at 06:07:46PM +1100, Drew Parsons <[EMAIL PROTECTED]> 
wrote:
> Package: firefox
> Version: 1.5.dfsg-4
> Severity: normal
> 
> I've filed this bug at bugzilla
> https://bugzilla.mozilla.org/show_bug.cgi?id=324487 
> 
> When I try to connect to
> https://paragon.acs.org/paragon/application?pageid=content&parentid=authorchecklist&mid=ag_ma.html&headername=Author%20Information%20-%20Macromolecules
> (the "info for authors" links on
> http://pubs.acs.org/journals/mamobx/index.html), firefox refuses to connect,
> saying "Firefox and paragon.acs.org cannot communicate securely because they
> have no common encryption algorithms".
> 
> It does work from mozilla 1.7.12 (which says the site has low-grade
> encryption, RC4-40 40 bit).
> 
> Since a windows firefox 1.5 user seems to be able to access the page, I'm
> referring the bug to you and Debian to prove it's not just me experiencing
> the problem.


Please read /usr/share/doc/firefox/NEWS.Debian.gz

mozilla-firefox (1.0.3-2) unstable; urgency=high

    SSLv2 and all 40-bit ciphers are disabled by default in this
    release. The insecurities of SSLv2 are outlined in
    http://www.eucybervote.org/Reports/MSI-WP2-D7V1-V1.0-02.htm. 40-bit
    ciphers do not provide a realistic amount of security in this day
    and age. SSLv2 can be reenabled from the Preferences dialog, and
    the 40-bit ciphers from about:config (look under the
    security.ssl.* keys).

I'll add that you can also enable the missing cipher by adding
pref("security.ssl3.rsa_rc4_40_md5", true);

either in /etc/firefox/pref/firefox.js or any .js file you may create in
/etc/firefox/pref.

Closing the bug.

Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to