Anṣuf ar SeaMonkey n izegrar.
Rnu timahilin neɣ iɣunab nniḍen akken ad terreḍ SeaMonkey d ayla-k.
MdelAcegger n CipherFox sɣuṛ Bret Schmerker
Yettwasezmel 4 ɣef 5 n yetran
This Extension provides comprehensive information on the host Server cipher and certificates for any Web page through TLS 1.2; I haven't seen a miss to date as of January 2017. However, the Internet Engineering Task Force is altering the protocol for TLS 1.3b15 in such a way that the "Insecure Connection" alarm this Extension sounds false positives for TLS 1.3 only; e.g., a TLS_ECDHE_ECC_WITH_AES_128_GCM_SHA256 ciphersuite reports as TLS_AES_128_GCM_SHA256 with the key exchange and certificate algorithms not reporting. (TLS 1.3 Elliptic Curve Certificates show correctly, as ECC_256_SHA256, ECC_256_SHA384, and/or ECC_384_SHA384.)
This review is for a previous version of the add-on (4.1.1).Can you provide a domain that exhibits this issue? If possible, create an issue on GitHub:
https://github.com/gavinhungry/cipherfox/issues
Ma ulac aɣilif ini-d acuɣeṛ:
Akken ad ternuḍ tigrummiwin inek, yessefk ad yili ɣur-k umiḍan n izegrar Mozilla.