Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is:pharmapacmis.com
I ran this command:Chrome, Firefox, Edge
It produced this output:ERR_SSL_PROTOCOL_ERROR
My web server is (include version):IIS v10.0.17763.1
The operating system my web server runs on is (include version):Windows Server 2019 v1809
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know):Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):No
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):win-acme v2.1.17.1065 (release, trimmed, standalone, 64-bit)
Hi
I'm looking for some help please.
I have a php web app running on the above server which I can reach via HTTP but not HTTPS.
Edge gives `The connection for this site is not secure
pharmapacmis.com sent an invalid response.
- [Try running Windows Network Diagnostics](javascript:diagnoseErrors()).
ERR_SSL_PROTOCOL_ERROR`
Firefox gives SSL_ERROR_INTERNAL_ERROR_ALERT
I've spent the last day or so googling this issue but have struck out.
Running check-your-website.server-daten.de shows SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.
On the server TLS 1.2 is the only protocol enabled.
nmap cipher scan shows:
Starting Nmap 7.91 ( https://nmap.org ) at 2021-07-02 11:38 GMT Daylight Time
Nmap scan report for pharmapacmis.com (192.168.10.51)
Host is up (0.00s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/https
http-server-header:
Microsoft-HTTPAPI/2.0
_ Microsoft-IIS/10.0
ssl-enum-ciphers:
TLSv1.2:
ciphers:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 3072) - A
TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 3072) - A
TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 3072) - A
TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 3072) - A
TLS_RSA_WITH_AES_256_CBC_SHA (rsa 3072) - A
TLS_RSA_WITH_AES_128_CBC_SHA (rsa 3072) - A
TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 3072) - C
compressors:
NULL
cipher preference: server
warnings:
64-bit block cipher 3DES vulnerable to SWEET32 attack
Key exchange (dh 2048) of lower strength than certificate key
_ least strength: C
I'm stuck as what to check next.
Any help would be most appreciated.
Jake