阅读:2881回复:5
无法更新,提示连接不安全
帮助--关于,可以检查到有更新,但是更新失败,直接从官网下载安装包,提示连接不安全,如图。
以前一直正常的。最近两个版本就这样了,系统和网络设置从没变更过。 图片:捕获1.PNG ![]() 图片:捕获.PNG ![]() |
|
1楼#
发布于:2018-09-24 20:26
这个证书错误一般和浏览器本身无关
要么是你被 MITM 中间人攻击了 要么是你那里的 DNS 解析出了错 查了下 segment.io 是解析到 aws 云的 download.mozilla.org 也是部署在 aws 云 瞎猜一下 你之前有没有手动设置过 download.mozilla.org 的 HOSTS? nslookup download.mozilla.org 和 ping download.mozilla.org 的结果分别是什么 |
|
|
2楼#
发布于:2018-09-25 00:59
从未手动设置过 download.mozilla.org 的 HOSTS
一直用的是谷歌DNS,刚才改成其他,可以更新了,https://www.mozilla.org/zh-CN/firefox/all/ 官网也可以直接下载,但奇怪的是,download.mozilla.org 仍然是 ping 不通的: # nslookup download.mozilla.org DNS request timed out. timeout was 2 seconds. 服务器: UnKnown Address: fe80::1 非权威应答: 名称: bouncer-bouncer-elb.prod.mozaws.net Addresses: 34.212.44.210 54.187.93.250 52.35.227.82 Aliases: download.mozilla.org # ping download.mozilla.org 正在 Ping bouncer-bouncer-elb.prod.mozaws.net [18.214.197.113] 具有 32 字节的数据: 请求超时。 请求超时。 请求超时。 请求超时。 18.214.197.113 的 Ping 统计信息: 数据包: 已发送 = 4,已接收 = 0,丢失 = 4 (100% 丢失) |
|
3楼#
发布于:2018-09-25 02:02
fire/fox:从未手动设置过 download.mozilla.org 的 HOSTS我这里一样,服务器禁PING。访问 https://18.214.197.113/ 看到正确的证书(域名相符),没有问题。 |
|
4楼#
发布于:2018-09-25 16:28
我这里直接打开 https://18.214.197.113/ 也是提示连接不安全,无法打开。
但是直接打开 https://download.mozilla.org/?product=firefox-latest-ssl&os=win64&lang=zh-CN 可以下载安装包。 问题只解决了一半,更换 DNS 可以下载和更新,但仍是不安全连接, |
|
5楼#
发布于:2018-09-25 21:20
能不能 ping 通不是关键
用 ping 命令主要是看看实际连接的 ip 是什么,是不是和 nslookup 返回的一样 从你的返回结果来看 windows 的 dns 服务器设置的是 fe80::1 所以这是网关的 ipv6 地址? nslookup 返回结果没什么问题 download.mozilla.org CNAME 指向 bouncer-bouncer-elb.prod.mozaws.net,然后 bouncer-bouncer-elb.prod.mozaws.net 解析到 3 个 ip ping 连接的是 18.214.197.113 这个 ip,虽然不在 nslookup 返回的 3 个 ip 中,但也不算意外 用 openssl 或者 curl 可以验证这个 ip 上的证书确实是签给 download.mozilla.org 的 $ echo | openssl s_client -connect 18.214.197.113:443 -servername download.mozilla.org 2>/dev/null | openssl x509 -text Certificate: Data: Version: 3 (0x2) Serial Number: 05:c1:d2:a4:f7:32:0f:02:b2:a2:91:49:6e:ea:f5:fb Signature Algorithm: sha256WithRSAEncryption Issuer: C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA Validity Not Before: Nov 30 00:00:00 2016 GMT Not After : Feb 3 12:00:00 2020 GMT Subject: C = US, ST = California, L = Mountain View, O = Mozilla Corporation, OU = Cloud Services, CN = download.mozilla.org Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b9:9f:41:ab:33:f2:35:15:70:fe:3c:1e:cb:f4: d4:00:18:20:bc:e0:ce:3f:d7:94:76:58:8a:1d:5e: 59:e4:0d:29:d9:1b:6e:76:bd:12:37:6a:72:5d:d1: 8c:25:ee:5b:74:60:24:25:48:b7:e4:79:72:7e:ab: 4f:3a:9c:5d:1f:83:70:9d:36:e1:26:1a:f3:16:ba: a1:7a:14:c8:1d:fd:eb:2e:fb:e4:4a:c9:17:f5:83: 67:ee:11:73:ef:6d:db:d2:44:6d:1c:da:4d:8a:8a: 3f:55:db:ce:ec:ac:08:92:84:29:79:5b:38:0d:9a: 8d:2c:6c:eb:09:9a:db:fc:e3:04:8c:5a:74:8c:a8: 5e:9b:32:32:cd:e1:61:3e:9f:d9:5b:88:a3:29:dd: f9:b9:b7:74:df:fa:12:99:7d:d0:76:da:53:b3:d4: 70:a0:4d:9d:dc:00:bf:74:05:29:12:3d:08:5b:55: 95:23:fd:6a:cb:34:22:d8:0b:b0:0f:19:1d:07:ec: 28:4b:1a:ab:f7:4e:36:93:d6:4d:84:6f:4b:0e:e3: bc:53:48:5f:e4:7c:81:42:ea:32:70:2a:d6:34:a8: bf:7e:93:c4:59:d9:37:12:35:36:e6:64:cd:b2:f6: bc:a7:41:5d:8d:df:5b:69:a7:d3:6a:57:16:71:ba: 49:75 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: keyid:0F:80:61:1C:82:31:61:D5:2F:28:E7:8D:46:38:B4:2C:E1:C6:D9:E2 X509v3 Subject Key Identifier: FC:0B:AC:80:6B:24:ED:3F:DC:C6:15:25:7C:FA:AF:E3:9E:66:1E:64 X509v3 Subject Alternative Name: DNS:download.mozilla.org, DNS:bouncer-bouncer.prod.mozaws.net, DNS:bouncer-bouncer-elb.prod.mozaws.net X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 CRL Distribution Points: Full Name: URI:http://crl3.digicert.com/ssca-sha2-g5.crl Full Name: URI:http://crl4.digicert.com/ssca-sha2-g5.crl X509v3 Certificate Policies: Policy: 2.16.840.1.114412.1.1 CPS: https://www.digicert.com/CPS Policy: 2.23.140.1.2.2 Authority Information Access: OCSP - URI:http://ocsp.digicert.com CA Issuers - URI:http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt X509v3 Basic Constraints: critical CA:FALSE Signature Algorithm: sha256WithRSAEncryption d7:b1:88:dc:dd:cb:ad:25:8e:6c:10:5d:92:b8:d8:7e:e4:af: 16:51:d0:83:0b:3f:d8:5d:1b:1c:4f:37:63:2f:a4:a3:b0:6e: fd:2f:84:f5:f3:e6:47:0d:1b:29:f1:f8:cb:d2:2d:e5:48:c3: d9:19:1b:d5:39:9f:ff:3a:64:5a:30:7f:ec:51:ad:a5:c2:e5: f7:21:13:bf:ee:c2:5b:cf:94:a2:92:3f:a9:a6:00:bd:79:06: 70:9c:e8:bf:4d:91:0b:cb:64:66:df:37:d8:f7:81:a1:ef:40: 6e:ed:b6:f8:30:b5:9d:d2:55:4d:e3:6a:01:7a:55:39:92:ef: 37:a8:ea:70:2c:c7:b9:00:65:e5:e3:ce:11:a5:68:76:d7:68: 9e:fe:8b:77:b2:4a:11:ff:8b:a2:b9:d6:11:d9:86:6c:14:4d: 80:ac:94:55:a8:55:4e:5f:62:cb:7b:30:7e:c0:d7:ef:fc:54: 7f:88:27:6e:9b:c2:03:b9:5a:21:cb:3b:b8:1c:e0:38:eb:10: da:35:ee:6e:9a:41:aa:fa:25:f8:8c:5a:97:5a:ae:2c:d7:6d: e8:b6:58:e7:bf:85:a4:7d:46:27:5d:77:78:d9:6b:50:07:41: 7f:2d:2f:b4:8e:a6:75:fc:43:a6:65:d8:10:46:51:c2:26:b8: 8e:75:a4:df -----BEGIN CERTIFICATE----- MIIFizCCBHOgAwIBAgIQBcHSpPcyDwKyopFJbur1+zANBgkqhkiG9w0BAQsFADBN MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E aWdpQ2VydCBTSEEyIFNlY3VyZSBTZXJ2ZXIgQ0EwHhcNMTYxMTMwMDAwMDAwWhcN MjAwMjAzMTIwMDAwWjCBkDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3Ju aWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxHDAaBgNVBAoTE01vemlsbGEgQ29y cG9yYXRpb24xFzAVBgNVBAsTDkNsb3VkIFNlcnZpY2VzMR0wGwYDVQQDExRkb3du bG9hZC5tb3ppbGxhLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALmfQasz8jUVcP48Hsv01AAYILzgzj/XlHZYih1eWeQNKdkbbna9Ejdqcl3RjCXu W3RgJCVIt+R5cn6rTzqcXR+DcJ024SYa8xa6oXoUyB396y775ErJF/WDZ+4Rc+9t 29JEbRzaTYqKP1XbzuysCJKEKXlbOA2ajSxs6wma2/zjBIxadIyoXpsyMs3hYT6f 2VuIoynd+bm3dN/6Epl90HbaU7PUcKBNndwAv3QFKRI9CFtVlSP9ass0ItgLsA8Z HQfsKEsaq/dONpPWTYRvSw7jvFNIX+R8gULqMnAq1jSov36TxFnZNxI1NuZkzbL2 vKdBXY3fW2mn02pXFnG6SXUCAwEAAaOCAiEwggIdMB8GA1UdIwQYMBaAFA+AYRyC MWHVLyjnjUY4tCzhxtniMB0GA1UdDgQWBBT8C6yAayTtP9zGFSV8+q/jnmYeZDBl BgNVHREEXjBcghRkb3dubG9hZC5tb3ppbGxhLm9yZ4IfYm91bmNlci1ib3VuY2Vy LnByb2QubW96YXdzLm5ldIIjYm91bmNlci1ib3VuY2VyLWVsYi5wcm9kLm1vemF3 cy5uZXQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF BQcDAjBrBgNVHR8EZDBiMC+gLaArhilodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v c3NjYS1zaGEyLWc1LmNybDAvoC2gK4YpaHR0cDovL2NybDQuZGlnaWNlcnQuY29t L3NzY2Etc2hhMi1nNS5jcmwwTAYDVR0gBEUwQzA3BglghkgBhv1sAQEwKjAoBggr BgEFBQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAIBgZngQwBAgIw fAYIKwYBBQUHAQEEcDBuMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2Vy dC5jb20wRgYIKwYBBQUHMAKGOmh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9E aWdpQ2VydFNIQTJTZWN1cmVTZXJ2ZXJDQS5jcnQwDAYDVR0TAQH/BAIwADANBgkq hkiG9w0BAQsFAAOCAQEA17GI3N3LrSWObBBdkrjYfuSvFlHQgws/2F0bHE83Yy+k o7Bu/S+E9fPmRw0bKfH4y9It5UjD2Rkb1Tmf/zpkWjB/7FGtpcLl9yETv+7CW8+U opI/qaYAvXkGcJzov02RC8tkZt832PeBoe9Abu22+DC1ndJVTeNqAXpVOZLvN6jq cCzHuQBl5ePOEaVodtdonv6Ld7JKEf+LornWEdmGbBRNgKyUVahVTl9iy3swfsDX 7/xUf4gnbpvCA7laIcs7uBzgOOsQ2jXubppBqvol+Ixal1quLNdt6LZY57+FpH1G J113eNlrUAdBfy0vtI6mdfxDpmXYEEZRwia4jnWk3w== -----END CERTIFICATE----- $ curl https://download.mozilla.org/ --resolve download.mozilla.org:443:18.214.197.113 -v * Added download.mozilla.org:443:18.214.197.113 to DNS cache * Hostname download.mozilla.org was found in DNS cache * Trying 18.214.197.113... * TCP_NODELAY set * Connected to download.mozilla.org (18.214.197.113) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs * TLSv1.2 (OUT), TLS header, Certificate Status (22): * TLSv1.2 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS handshake, Server key exchange (12): * TLSv1.2 (IN), TLS handshake, Server finished (14): * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): * TLSv1.2 (OUT), TLS change cipher, Client hello (1): * TLSv1.2 (OUT), TLS handshake, Finished (20): * TLSv1.2 (IN), TLS change cipher, Client hello (1): * TLSv1.2 (IN), TLS handshake, Finished (20): * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server did not agree to a protocol * Server certificate: * subject: C=US; ST=California; L=Mountain View; O=Mozilla Corporation; OU=Cloud Services; CN=download.mozilla.org * start date: Nov 30 00:00:00 2016 GMT * expire date: Feb 3 12:00:00 2020 GMT * subjectAltName: host "download.mozilla.org" matched cert's "download.mozilla.org" * issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA * SSL certificate verify ok. > GET / HTTP/1.1 > Host: download.mozilla.org > User-Agent: curl/7.52.1 > Accept: */* > < HTTP/1.1 302 Found < Content-Type: text/html; charset=utf-8 < Date: Tue, 25 Sep 2018 12:54:53 GMT < Location: http://www.mozilla.org/ < Content-Length: 46 < Connection: keep-alive < <a href="http://www.mozilla.org/">Found</a>. * Curl_http_done: called premature == 0 * Connection #0 to host download.mozilla.org left intact 注意证书的 CN(Common Name)字串 至于直接访问 https://18.214.197.113/ 提示证书错误 这是因为证书只签给了 download.mozilla.org、bouncer-bouncer.prod.mozaws.net、bouncer-bouncer-elb.prod.mozaws.net 这仨域名 和访问用的 ip 18.214.197.113 不一样 所以错误 Error code: SSL_ERROR_BAD_CERT_DOMAIN 一般证书也不会直接签给 ip 那么你现在网关上设置了哪个上游 DNS? 改回 Google DNS 看看解析到了哪个 ip 导致变成 segment.io 的证书? |
|
|