{"id":293,"date":"2010-01-06T09:47:39","date_gmt":"2010-01-06T16:47:39","guid":{"rendered":"http:\/\/wp.natsci.colostate.edu\/bioit\/?p=293"},"modified":"2020-12-07T12:35:18","modified_gmt":"2020-12-07T19:35:18","slug":"ipsca-ssl-certificate-errors-in-firefox-and-safari","status":"publish","type":"post","link":"https:\/\/cnsit.colostate.edu\/kb\/ipsca-ssl-certificate-errors-in-firefox-and-safari\/","title":{"rendered":"ipsCA SSL certificate errors in Firefox and Safari"},"content":{"rendered":"<p>SSL certificates are the little files installed on a web server that allow a computer to establish secure (SSL) connections for transmitting sensitive data over the Internet.\u00a0 Web sites that use &#8216;https&#8217; must use these SSL certificates to create these secure connections from client to server.\u00a0 In late (very late) 2009 the SSL certificate provider ipsCA (http:\/\/certs.ipsca.org) announced that everyone using their certificates must reinstall new versions of these certificate files on their servers for all of their secure sites.\u00a0 ipsCA specifically is important to Educational institutions as they offer FREE certificates to .edu web sites (typical SSL certificates cost more than $100 each).\u00a0 The problem with their hasty decision to reinstall all of their certificates is that certain web browsers haven&#8217;t had time to react and are falsely displaying errors about bad SSL certificates.\u00a0 Firefox and Safari are the two big ones that are displaying errors.\u00a0 These browsers will eventually fix these issues, but have not announced any specific time line.\u00a0 So in the meantime we will have to live with these errors.\u00a0 Here is a link to the bug tracker for this issue in Firefox &#8211; <a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=529286\">https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=529286<\/a><\/p>\n<p><!--more--><\/p>\n<p>The Department of Biology uses these ipsCA SSL certificates on 4 of our web sites.\u00a0 Basically any site that uses an https in front of its web address.\u00a0 Below are examples of the errors you can expect to see when using Firefox and Safari when viewing secure Biology web sites.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/firefox_ipsca_error.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-297\" title=\"firefox_ipsca_error\" src=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/firefox_ipsca_error.jpg\" alt=\"firefox_ipsca_error\" width=\"387\" height=\"223\" srcset=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/firefox_ipsca_error.jpg 387w, https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/firefox_ipsca_error-300x173.jpg 300w\" sizes=\"auto, (max-width: 387px) 100vw, 387px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Firefox (Click &#8216;I Understand the Risks&#8217; to continue on)<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/safari_ipsca_error.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"194\" class=\"aligncenter  wp-image-298\" title=\"safari_ipsca_error\" src=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/safari_ipsca_error.jpg\" alt=\"safari_ipsca_error\" srcset=\"https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/safari_ipsca_error.jpg 566w, https:\/\/cnsit.colostate.edu\/kb\/wp-content\/uploads\/2010\/01\/safari_ipsca_error-300x103.jpg 300w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Safari (Click &#8216;Continue&#8217; to proceed)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSL certificates are the little files installed on a web server that allow a computer to establish secure (SSL) connections for transmitting sensitive data over the Internet.\u00a0 Web sites that use &#8216;https&#8217; must use these SSL certificates to create these secure connections from client to server.\u00a0 In late (very late) 2009 the SSL certificate provider [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":297,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,11],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-cnsit","category-security-news"],"_links":{"self":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":3709,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/posts\/293\/revisions\/3709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/media\/297"}],"wp:attachment":[{"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cnsit.colostate.edu\/kb\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}