Is there a way to make Firefox ignore invalid ssl-certificates?

I am maintaining a few web applications. The development and qa environments use invalid/outdated ssl-certificates. Although it is generally a good thing, that Firefox makes me click like a dozen times to accept the certificate, this is pretty annoying. Is there a configuration-parameter to make Firefox (and possibly IE too) accept any ssl-certificate? EDIT: I have accepted the solution, that worked. But thanks to all the people that have advised to use self-signed certificates. I am totally aware, that the accepted solution leaves me with a gaping security hole. Nonetheless I am to lazy to change the certificate for all the applications and all the environments. But I also advice anybody strongly to leave validation enabled!

21.1k 73 73 gold badges 78 78 silver badges 105 105 bronze badges asked Aug 21, 2008 at 14:31 15.3k 14 14 gold badges 48 48 silver badges 57 57 bronze badges

I will point out that this question applies to web servers that have valid certificates for their domains, but can only (at some given time) be reached via IP address. Being able to visit https ://123.45.67.89/ without clicking 4 extra times is a great blessing to me.

Commented Sep 27, 2010 at 23:05

I use firefox and couldn't find a solution but as of 07.07.2023 chrome.exe --ignore-certificate-errors works as a workaround for expired certs (I know that is not firefox)

Commented Jul 7, 2023 at 5:47

10 Answers 10

Try Add Exception: FireFox -> Tools -> Advanced -> View Certificates -> Servers -> Add Exception.

answered Jan 11, 2010 at 16:53 henryc2323 henryc2323 915 1 1 gold badge 6 6 silver badges 2 2 bronze badges

Can't add exception when "HTTP Strict Transport Security (HSTS)" is specified, so answer won't always work.

Commented Mar 22, 2016 at 14:57

I'm getting "This site provides a valid, verified identification. There is no need for an exception" for the SAME site that gives me this error: "SSL Certificate Hostname Mismatch ssl_domain_invalid"

Commented Aug 10, 2016 at 22:06

+1 for much better answer, accepted answer is incredibly insecure. I encounter this often using self-signed certificates for local development and it's much better to add exceptions on a case-by-case basis. Related Q/A on mozilla's support forum: support.mozilla.org/en-US/questions/1055526

Commented Jan 5, 2017 at 13:58

Just for fun, here is a little shortcut to get to the same screen that @henryc2323 points you to: "chrome://pippki/content/exceptionDialog.xul" Just paste that into Firefox's address field. For reference, I found that here: support.mozilla.org/en-US/questions/1094104

Commented May 25, 2017 at 21:05 There is no such option Advanced at Tools Commented Dec 24, 2022 at 10:49

I ran into this issue when trying to get to one of my companies intranet sites. Here is the solution I used:

  1. enter about:config into the firefox address bar and agree to continue.
  2. search for the preference named security.ssl.enable_ocsp_stapling .
  3. double-click this item to change its value to false.

This will lower your security as you will be able to view sites with invalid certs. Firefox will still prompt you that the cert is invalid and you have the choice to proceed forward, so it was worth the risk for me.

answered Aug 24, 2015 at 17:56 Bryan Focht Bryan Focht 1,074 1 1 gold badge 11 11 silver badges 10 10 bronze badges

THIS is the real correct answer. When you are on a public WLAN which redirects to a registration page and all you have is Firefox, then you KNOW the page is not google.com/ncr and want to be given the possibility to accept temporarily the ISP wrong certificate. without configuring a permanent exception in the certificates configuration. Then you uncheck the "Permanently store this exception" checkbox and off you go.

Commented Oct 5, 2015 at 13:41

Not working for me in Firefox 53.0 for Mac. Probably because they change entirely how this browser works every few weeks.

Commented May 8, 2017 at 17:55

I am trying to use https on localhost for development. I tried this but it didnt work. Screenshot - i.imgur.com/1LVqLQw.png

Commented Sep 15, 2018 at 17:01

@AlainPannetier I am not a computer security expert but I don’t find this a valid use case to accept an invalid certificate. If you are redirected to the original URL after passing the WLAN welcome page, you could still be using the invalid certificate and therefore unarmed for a MITM attack. A much better solution is to open a webpage that does not require a certificate, e.g. neverssl.com.

Commented Apr 5, 2023 at 9:15

Go to Tools > Options > Advanced "Tab"(?) > Encryption Tab

Click the "Validation" button, and uncheck the checkbox for checking validity

Be advised though that this is pretty unsecure as it leaves you wide open to accept any invalid certificate. I'd only do this if using the browser on an Intranet where the validity of the cert isn't a concern to you, or you aren't concerned in general.

answered Aug 21, 2008 at 14:37 Dan Herbert Dan Herbert 103k 50 50 gold badges 192 192 silver badges 220 220 bronze badges

I'm confused: I can't find that option on FF2 or FF3. There is only an option to switch the use of OCSP. In what version of FF did see what you describe?

Commented May 15, 2009 at 22:54 This seems like a Very Bad Idea. Commented Nov 6, 2009 at 15:49 OCSP is how certificate revocation is checked, not how certificates are checked. Commented Sep 11, 2012 at 19:39

Well I really hope they can. I need to program the browser to do automated scraping. Security by obscurity is not security anyway.

Commented Apr 1, 2014 at 12:04

@Drazick The option is now a checkbox under Preferences -> Advanced -> Certificates , it's labeled "Query OCSP responder servers to confirm the current validity of certificates"

Commented Apr 19, 2016 at 3:13

In the current Firefox browser (v. 99.0.1) I was getting this error when looking at Web Developer Tools \ Network tab:

MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT 

enter image description here

I was trying to debug an Angular app which is served at https://localhost:4200 . however the real port it's pointing to and being debugged from in Visual Studio 2022 is 44322 .

I had to follow these steps to fix the issue:

  1. Open Firefox Settings;
  2. Look for Privacy & Security tab on the left;
  3. Scroll down to the bottom and look for Certificates;
  4. View Certificates;
  5. In this window you must click Add Exception and enter the location. In my case it was: https://localhost:44322
  6. Click Get Certificate button;
  7. Click Confirm Security Exception button.

After that, try reloading your page.

enter image description here

answered Apr 16, 2022 at 1:22 Leniel Maccaferri Leniel Maccaferri 102k 46 46 gold badges 375 375 silver badges 493 493 bronze badges

This answer gets my vote. However, there may be times when the certificate cannot be imported using Settings, and a policies.json may need to be created: stackoverflow.com/a/74802552/2657515

Commented Dec 14, 2022 at 20:13

Does not (always) work. everspin.com, www.everspin.com, currently has a revoked link in it's chain, and FF does not offer any option to proceed anyway. Trying to follow this recipe, FF says "This site provides valid, verified identification. There is no need to add an exception." and the confirm button is unclickable. Yeah ok, so now what? I'm just trying to download a datasheet for a chip. I will risk some government feeding me a modified data sheet with the wrong pinout. FFS FF!

Commented Jan 21, 2023 at 17:51

Using a free certificate is a better idea if your developers use Firefox 3. Firefox 3 complains loudly about self-signed certificates, and it is a major annoyance.

answered Aug 21, 2008 at 14:37 109 1 1 silver badge 5 5 bronze badges

Create some nice new 10 year certificates and install them. The procedure is fairly easy.

Start at (1B) Generate your own CA (Certificate Authority) on this web page: Creating Certificate Authorities and self-signed SSL certificates and generate your CA Certificate and Key. Once you have these, generate your Server Certificate and Key. Create a Certificate Signing Request (CSR) and then sign the Server Key with the CA Certificate. Now install your Server Certificate and Key on the web server as usual, and import the CA Certificate into Internet Explorer's Trusted Root Certification Authority Store (used by the Flex uploader and Chrome as well) and into Firefox's Certificate Manager Authorities Store on each workstation that needs to access the server using the self-signed, CA-signed server key/certificate pair.

You now should not see any warning about using self-signed Certificates as the browsers will find the CA certificate in the Trust Store and verify the server key has been signed by this trusted certificate. Also in e-commerce applications like Magento, the Flex image uploader will now function in Firefox without the dreaded "Self-signed certificate" error message.