ERR_SSL_OBSOLETE_VERSION — Chrome 84+ (July 2020) blocks HTTPS connections to servers supporting only TLS 1.0 or 1.1. Causes: old nginx/Apache, legacy IIS 7, embedded devices. Fix: enable TLS 1.2+1.3, disable 1.0 and 1.1. 10 minutes of work on a modern server.
This error blocks HTTPS access. Below: causes, fixes, working config, FAQ.
ssl_protocols TLSv1.2 TLSv1.3; (do not include TLSv1 and TLSv1.1)SSLProtocol -all +TLSv1.2 +TLSv1.3apt update && apt upgrade openssl libssl-devnginx -V 2>&1 | grep -i sslnginx -t && systemctl reload nginxSSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeChrome 84 (July 2020), Firefox 78 (July 2020), Edge 84, Safari 14 (September 2020). By 2026 all modern browsers.
Android < 5.0 cannot do TLS 1.2. Two options: keep a parallel subdomain with TLS 1.0 (DANGEROUS) or drop those clients. In 2026 it's <0.5% of traffic.
No. Put the device on a separate VLAN without internet and talk to it via TLS 1.0 internally, but your public site — TLS 1.2+1.3 only.
<a href="/en/ssl">Enterno SSL</a> or in shell: <code>openssl s_client -connect example.com:443 -tls1_2</code>.