Have you already changed the pref browser.xul.error_pages.expert_bad_cert to 
true?

Marc

From: Enterprise [mailto:[email protected]] On Behalf Of Java Sys
Sent: Friday, May 11, 2018 7:06 AM
To: [email protected]
Subject: [Mozilla Enterprise] Firefox 60 esr - unable to access (internal) 
routers using self-signed SSL certificates - help!

Hello,

Just trying out the Firefox v60 ESR and immediately hit problems when 
attempting to access our (internal) router management interfaces which use 
self-signed SSL certificates for HTTPS access.
The error when connecting is
Your connection is not secure

The owner of 192.168.192.168 has configured their web site improperly. To 
protect your information from being stolen, Firefox has not connected to this 
web site.

"Peer's Certificate issuer is not recognised."

 which is true, but could be over-ridden by adding a temporary or permanent 
security exception in pre-Quantum Firefox versions.
For example, using FF v52.* ESR we'd just use the   Advanced > Add Exception 
option very quick, easy, convenient and 'just works'.

However FF v60 ESR when clicking the "Add Exception"  button - does nothing.
So access is denied - without this we are unable to control our internal CISCO 
routers (which are deliberately made impossible to access from external 
networks, which is why we don't add permanent credentials to Firefox).

Is there a special incantation needed to add the security exception to allow 
access web servers offered by our routers (for management purposes only) with 
self-signed (HTTPS) SSL certificates?
The routers are all on the 10.*.*.*  and 192.168.*.*private networks, if that 
helps?


Kind regards, JS.


p.s.
The exact version of firefox we are running on our Mac computers is this one 
(shasum -a 512 and filename):
b383043d3bc69a5d76b39ba195c634252a0  Firefox 60.0esr.dmg

 Alternatively a URL to a suitable (but accurate or specific for CISCO routers) 
configuration setup tutorial would be fine too; we find the CISCO web-site 
information a maze of twisty passages all very similar.
 Hence impossible to navigate and find (useful) information as by the time they 
have documented their options there will already be new firmware updates making 
the information non-working in our experience. This is not to knock CISCO we 
just cannot afford the support contract costs nor find the information on the 
public web sites they point you to.


_______________________________________________
Enterprise mailing list
[email protected]
https://mail.mozilla.org/listinfo/enterprise

To unsubscribe from this list, please visit 
https://mail.mozilla.org/listinfo/enterprise or send an email to 
[email protected] with a subject of "unsubscribe"

Reply via email to