ERR_HTTP2_INADEQUATE_TRANSPORT_SECURITY — Chrome refused an HTTP/2 connection because the TLS setup does not meet RFC 7540 requirements: TLS 1.2 minimum, AEAD cipher (GCM, CCM, ChaCha20-Poly1305), ECDHE key exchange. Legacy ciphers (RC4, AES-CBC, 3DES) are forbidden in HTTP/2. Fix: nginx modern ssl_ciphers.
Below: causes, fixes, FAQ.
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305;ssl_prefer_server_ciphers on; + modern configlisten 443 ssl; without http2SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeRFC 7540 prohibits vulnerable ciphers at the protocol level. Even if TLS accepted the cipher, HTTP/2 rejects it for defence-in-depth.
Similar, through QUIC. TLS 1.3 only for QUIC.
HTTP/1.1 fallback works for old clients. But HTTP/2 — strict cipher requirements.
Use for correct config: ssl-config.mozilla.org. Pick Modern or Intermediate.