ERR_SSL_VERSION_OR_CIPHER_MISMATCH means the browser could not negotiate a TLS version or cipher with the server. Causes: server on outdated TLS 1.0/1.1 (Chrome 84+ disabled them), weak ciphers (RC4, 3DES), or SHA-1-signed certificate. Fix: enable TLS 1.2/1.3 and modern ciphers (ECDHE-ECDSA-AES128-GCM-SHA256).
This error blocks HTTPS access. Below: causes, fixes, working config, FAQ.
ssl_protocols TLSv1.2 TLSv1.3;ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;nginx -t && systemctl reload nginxserver {
listen 443 ssl http2;
server_name example.com;
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;
ssl_prefer_server_ciphers off;
ssl_stapling on;
ssl_stapling_verify on;
}SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeUse <a href="/en/ssl">Enterno.io SSL Checker</a> or on the shell: <code>openssl s_client -connect example.com:443 -tls1_2</code>. If it errors — TLS 1.2 is not supported.
No safe way. Enabling TLS 1.0/1.1 in Chrome is not supported since 2020. Fix the server.
Contact hosting support — ask them to enable TLS 1.2+1.3 and disable SSLv3/TLS 1.0/1.1. Serious hosts do it in 1–2 hours.
SNI (Server Name Indication) tells the server which domain was requested so it returns the right certificate. Without SNI the server sends the default cert, often with the wrong name → mismatch.