Allows https for ie6 on win2k

i know these old ciphers are insecure, but id rather have https using tls 1.0 on my site than http only for these old browsers
i host a forum and chatroom for old browsers, and want https to work, but the browsers i allow [ie6 and above mainly] only support tls 1.0
i tried cloudflare and setting minimum tls version to 1.0, but that didnt work, so i tried a seperate domain to bypass cloudflare and directly access the site, but even when enabling tls 1.0 and 1.1 in nginx ssl config it still doesnt work, i read something about windows 2000 allowing just 1 cert per ip, and only being able to handle sha1, and not sha2 which letsencrypt uses

how can i get a sha1 cert so these browsers can still benefit from a little security when visiting my site, even if its not much?

My domain is: redtro.net
I ran this command: the setup and stuff to get the needed certs
It produced this output: worked for moden browsers
My web server is (include version): debian 12, hosted at contabo
I can login to a root shell on my machine (yes or no, or I don't know): yes, always worked, why wouldnt it now
I'm using a control panel to manage my site: no, just plain ftp and a nginx config
The version of my certbot is 2.1.0

The issue with 1 cert per IP etc is just on the server side, client side doesn't care about your IP. [Good point about SNI @MikeMcQ!]

Client side, you will have a a set of TLS protocol levels that a client can speak, and within those a set of TLS cipher suites that they are prepared to negotiate with the service.

So your server needs to support both the TLS protocol level that a client will use, and at least one common cipher suite (dictated in part by your certificate key type, RSA being the only real choice for older browsers).

This might be useful: IE Supported Cipher Suites · client9/sslassert Wiki · GitHub

3 Likes

You can't. CAs have not been allowed to issue certificates that use SHA-1 since 2016.

5 Likes

A few extra bits ...

Your domain proxied at Cloudflare requires SNI. If the browser client does not support it that won't work.

If the client does not support SNI, it can connect directly to your nginx server. But, be sure the default server block has your website configuration. Without SNI the default server block is the only one that client can talk to using HTTPS.

I only see ECDSA certs and ciphers for your main domain. Try using RSA cert and setting up matching ciphers. In Certbot I think you just use --key-type rsa and optionally keysize. Note that the EFF has dropped support for Windows more than 1.5 years ago but you should still be able to get a rsa cert with those options.

SSL Labs is often helpful to see info on compatibility. See: SSL Server Test: redtro.net (Powered by Qualys SSL Labs)

You might consider a unique domain name just for HTTP for these older clients. You can then monitor access log for that domain name to know when it is no longer needed.

4 Likes

my idea was using secure.forum.redtro.net unproxied to bypass cloudflare
what do you mean by the second part, eff dropped support for windows and stuff, and a rsa cert with a keysize. i did read that win2k supports only a limited keysize or something
im really new to this
thanks for the help regardless tho! :smiley:

Oh, the EFF is responsible for Certbot and they no longer support it running on Windows.

See: Certbot Discontinuing Windows Beta Support in 2024

Various alternatives are described there. The most popular are:

  • Certify the Web (gui)
  • Posh-ACME (powershell)
  • simple-acme (cli) (as replacement for win-acme)

Yeah, pretty sure you need to be using an RSA cert. I think that version of Certbot defaults to ECDSA. So, you need to specify --key-type rsa. I am not sure what key-size is appropriate for those older systems. See the Certbot docs for defaults.

3 Likes

oh nonono, i gotta learn to give more info when i make a new post lol. my vps is running on debian 12
i just want to use https on ie6. i heard of self signed certs but those need to be added everytime on every device. makes me confused why they do allow http [no encryption] but dont allow sha1 signing [weakish encryption]. even the microsoft update catalog uses sha1 in their popup window

ill look up what rsa certs are. but can the system even read them if theyre sha2? i honestly have no idea. i diagnose myself with stupid ;w;

sorry, my fault. You did say that. So, nevermind about the EFF and Windows then :slight_smile:

@webprofusion is the author of Certify the Web and knows way more about Windows than I do. He said RSA cert was required for those older browsers.

I looked at your cert history and only see ECDSA certs. You should get an RSA cert on your nginx. And setup suitable ciphers there too. The SSL Labs report showed only ECDSA compatible ciphers which is why I mention that.

Don't overthink the SHA thing since you can't do anything about it anyway. Sort out the RSA stuff which is a known issue. I just checked Certbot docs and rsa key size default is 2048 so that's probably fine.

3 Likes

Anyone running IE6 should have switched long ago.
To something like FireFox.

3 Likes

Should a Win2k device even be connected to the internet?!?

1 Like

Yes, because we can.

It doesn't mean it's a good idea, tho.