Anton Shepelev wrote:
> My Firefox ESR 52.7.3 has started recently to refuse to load
> some pages on the grounds that "The page you are trying to
> view cannot be shown because the authenticity of the
> received data could not be verified." What is especially
> distressing is that there is no option to ignore this
> problem and to proceed to the page, as if the browser considers
> itself cleverer than the user. Is there a way to turn this
> error into a warning or disable it altogether?
The web-based forum thread referred to by Andy is over 3 years old.
Apparently the site has replaced their site certification with one
supporting a later encryption scheme, so I cannot get the interferring
popup/page that you mentioned, plus I am on Firefox 63.0.3 (and Chrome
71.0.3578).
Rather than have respondents make guesses on an unidentified web site
where the problem happens, give a URL to the site where you see the
interferring prompt.
If the problem occurs at every HTTPS site you visit then the problem
could be with your anti-virus software. To interrogate encrypted
traffic (HTTPS), AVs must perform a man-in-the-middle (MITM) attack.
They install their own certificate used with their transparent proxy.
Your client (web browser) connects to the proxy and sees its cert, and
the proxy connects to the site to see their cert. If the AV did not
properly install its cert then the client will fail with cert errors.
Most web browsers use the global certificate store managed by the
operating system. In Windows, you run certmgr.msc. You never mentioned
under which OS you are running Firefox which is cross-platform. Mozilla
decided to use a private cert store in Firefox, so AVs must also install
their cert in Firefox's private cert store for their HTTPS proxying to
work with Firefox. You may find an option in the AV to reinstall their
cert into the global cert store in the OS and the private cert store in
Firefox. If not, you have to uninstall and reinstall the AV.
You could disable HTTPS scanning in the AV software which then doesn't
need the MITM cert scheme; however, that means it can only interrogate
HTTP traffic. The AV won't be able to determine if an HTTPS site
delivers malicious content. Sites have been migrating to HTTPS.