mirror of
https://github.com/floccusaddon/floccus.git
synced 2026-04-25 22:26:06 +03:00
[GH-ISSUE #208] Option to accept Self Signed Certificates #201
Labels
No labels
browser-specific
bug
correctness issues
enhancement
feature: Google Drive
feature: Linkwarden
feature: git
feature: nextcloud-bookmarks
feature: tabs
feature: webdav
help wanted
native-app
priority: high
priority: low
priority: medium
pull-request
question
question
stale
upstream
waiting for more information
wontfix
🙁 Not following issue template
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/floccus#201
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @giomf on GitHub (Dec 4, 2018).
Original GitHub issue: https://github.com/floccusaddon/floccus/issues/208
Software versions
Steps to reproduce
Expected outcome
Because Im in Private Mode, the self signed Certificates never gets saved.
A Dialog, that Im trying to connect to an "unsafe" webpage with an option to accept (Like Firefox normally does)
Actual outcome
"Network Error: Check your Connection or your account details"
Workaround
So as workaround I have to connect to my Server first, accept the untrusted Certificate and after that I can Sync via floccus
@marcelklehr commented on GitHub (Dec 9, 2018):
Hey,
It should be possible to store a permanent exception for your self-signed certificate. This way you don't have to manually accept it every time. Let me know if that works.
@giomf commented on GitHub (Dec 9, 2018):
Hi,
as I mentioned, its not possible because I'm using Firefox in Private-mode. so no History neither Certificates are stored permanently. After every restart I have to accept it again.
@marcelklehr commented on GitHub (Dec 9, 2018):
I see. Is it possible to disable private mode temporarily and then add the exception permanently?
@giomf commented on GitHub (Dec 9, 2018):
Yes that's possible.
But I would appreciate to have this feature.
@marcelklehr commented on GitHub (Dec 9, 2018):
Unfortunately, I don't think it's possible to reach that deeply into the security architecture with an extension. It's also kind of out of scope for floccus to handle this. In a time of let's encyrpt availability, I would simply suggest to use them as a CA and avoid self-signed certificates, if possible.
@giomf commented on GitHub (Dec 9, 2018):
Ok I see,
Unfortunately, Im dealing with some kind of dyndns. so no Let's Encrypt for me...
Thank you anyway
@mnalis commented on GitHub (Dec 17, 2018):
Just to note that Let's Encrypt works just fine with dynamic IPs (like in dyndns) for me.
All it requires is that your hostname resolves to correct IP at the moment of renewal, so LE servers can connect to your LE script. So, if your machine HTTPS can be directly reached on the Internet (without using VPNs or similar hacks), you can use Let's Encrpyt to provide its certificates.
Hopefully it helps the OP.
@bernd-wechner commented on GitHub (Dec 17, 2018):
I can second mnalis, and state that I use letsencrypt to maintain certs for at least two servers behind a single router (gateway) that has a dynamic names (ddns). Yes, plural. Multiple domain names pointing to one dynamic IP address at which my gateway farms incoming traffic out to a machine on my LAN based on the domain name used. And the names are managed just fine with letsencrypt.
@giomf commented on GitHub (Dec 30, 2018):
Thanks,
I will give it a try
@marcelklehr commented on GitHub (Apr 12, 2022):
Adding android user level certs does not seem to work for everyone.
@marcelklehr commented on GitHub (Apr 12, 2022):
Oops, wrong issue. Sorry.
@github-actions[bot] commented on GitHub (Apr 13, 2023):
This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.