SSL_ERROR_NO_CYPHER_OVERLAP — Firefox (same as ERR_SSL_VERSION_OR_CIPHER_MISMATCH in Chrome) could not agree on a TLS cipher suite with the server. Both sides have allowed-cipher lists but they don't intersect. Causes: server on legacy ciphers (RC4, 3DES), Firefox dropped weak ones. Fix: enable AES-GCM + ChaCha20-Poly1305 on the server.
This error blocks HTTPS access. Below: causes, fixes, working config, FAQ.
ssl_ciphers TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;SSLCipherSuite HIGH:!aNULL:!MD5:!3DES:!RC4ssl_protocols TLSv1.2 TLSv1.3)ssl-config.mozilla.orgSSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeMozilla's NSS takes a more conservative stance. AES-CBC without SHA-256 — Firefox rejects since 2022, Chrome still accepts.
Windows XP + Firefox — no, SHA-1 signatures blocked. Windows 7 + Firefox 78+ — OK for AES-GCM.
<code>openssl s_client -connect example.com:443 -cipher ECDHE-RSA-AES128-GCM-SHA256</code>. Error = not supported.
Only IE 6/7 on XP. In 2026 statistically zero.