MOZILLA_PKIX_ERROR_MITM_DETECTED — Firefox saw a suspicious certificate on a domain with pinned keys (google.com, facebook.com, etc). Not a baseline SSL warning — Firefox thinks you're being MITMed. Causes: corporate proxy (Zscaler, Kaspersky AV), legit parental controls, real attack (rare). DO NOT ignore without cause.
This error blocks HTTPS access. Below: causes, fixes, working config, FAQ.
SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeMozilla pins certain root CAs and detects chain tampering. MITM on google.com is a real phishing vector.
Chrome shows ERR_CERT_SYMANTEC_LEGACY or NET::ERR_CERT_AUTHORITY_INVALID marked "Pinning". Softer message.
Depends. IT decrypts your traffic. You must trust your company's security policies and local law.
<a href="/en/ssl">Enterno SSL checker</a> from a clean network (not your office) — shows real CA.