ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY — Chrome detected the server using a Diffie-Hellman ephemeral key below 1024 bits (Logjam attack, 2015). Precomputation lets an attacker decrypt traffic. Fix: raise DH group to 2048 bits, or move to ECDHE (elliptic curve). nginx: ssl_dhparam with a freshly generated 2048-bit file + cipher list without DHE.
Below: causes, fixes, FAQ.
openssl dhparam -out dhparam.pem 2048 (5-10 minutes)ssl_dhparam /etc/ssl/dhparam.pem;ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up free2015 attack: precomputed 1024-bit DH group enables MITM at ~$100k (state actor). All major browsers reject < 1024 bit.
More CPU cost for marginal gain (NIST SP 800-131A: 2048 secure through 2030+). 2048 is the recommended baseline.
Yes, ECDHE P-256 is faster + secure. Modern TLS configs use ECDHE only and drop DHE entirely.
No, Logjam fix is server TLS config, the cert itself is unchanged.