Opera 12.17 no longer works with https for me
-
anotheralex last edited by
Have you tried to enable(disable) OCSPValidateCertificates for certain web-sites via override.ini ?
I did and it works! Some site stopped working for me last week, throwing an error
'Secure connection: critical error (1066)'
and after adding the following line to a dedicated section in override.ini - I can access that site over https again:
SecurityPrefs|OCSP Validate Certificates=0
-
A Former User last edited by
and after adding the following line to a dedicated section in override.ini - I can access that site over https again:
SecurityPrefs|OCSP Validate Certificates=0could you hint me: where's the "decicated section"? does it exist in every override.ini??
-
rseiler last edited by
There's no UI to add that. You have to edit the file yourself and append it to the section that exists for the given site (a section for a given site is automatically created when you make any changes at all to site preferences in the UI.
See my post back on May 27th though for the global setting in opera:config. That's all I use.
-
A Former User last edited by
There's no UI to add that.
i know
append it to the section that exists for the given site
for the given site... But I want to have this section for ALL sites.
See my post back on May 27th though for the global setting in opera:config. That's all I use.
OCSP Validate Certificates: it looks like here, for years -> http://i.imgur.com/SLtUAZB.png
-
rseiler last edited by
The setting for ALL sites is the one that I mentioned in opera:config. It's unchecked per your screenshot, so you're done. The override.ini is only for individual sites.
Just keep in mind what I mentioned on May 27th. The need to disable OCSP was only a temporary thing early on in this thread. Leaving it disabled creates debilitating performance issues on some sites.
-
Deleted User last edited by
I wonder what happened with the REAL Opera (before 12.17) developers community...
Are they all dead?
Are they all gagged by no disclosure agreements after they signed with evil G00gle?
Will their family be killed if they patch security holes and release Opera 12.18?
I mean... come on... nobody abandoned a very much loved project especially when a corporation stole open source projects just to kill the competition. It's obvious what G00gle did was a takeover because their $hitty Chrome is a joke.I didn't expect such betrayal from former Opera 12 programmers...
-
4oh4 last edited by
Signed with Google? AFAIK Opera just decided to stop developing their own HTML/layout engine and instead switch to one developed by multiple parties. For some reason they also decided to build an entirely new browser around that.
I guess the Opera spirit lives on in Vivaldi:
http://vivaldi.com/ -
rseiler last edited by
Since this thread was bumped anyway, all of the above problems were solved with 12.18.
-
4oh4 last edited by
Thanks. How did you find out about it? I'd never think to search for it.
You can get it here:
http://www.opera.com/download/guide/?os=windows&ver=12.18&local=y
http://www.opera.com/download/guide/?os=windows&list=all(Silly that there's no obvious way to get there using the site navigation. Luckily a search engine finds it.)
No changelog:
http://www.opera.com/docs/changelogs/windows/ -
4oh4 last edited by
Is there any reason to leave TLS 1.1 and 1.2 in their default, disabled, state? What about SSL3?
(No way to edit posts?)
-
4oh4 last edited by
Some details on the v12.18 update here:
http://www.opera.com/blogs/security/2016/02/opera-12-and-opera-mail-security-update/ -
bluejeans last edited by
Great news! Thanks, folks! There's still a little life left in The Real (Presto-based) Opera!
Now that I've updated to 12.18, what do you suggest I should do with the security settings?
TLS 1.1, TLS 1.2 - disable/enable? OCSP Validate Certificates?
-
blackbird71 last edited by admin
I'd suggest disabling the OCSP validation, at least if it causes excessive CPU usage. See my May 2015 post above for some OCSP details: https://forums.opera.com/post/76110
Only if Opera's CRL lookup process is failing for some reaon or goes unsupported by Opera would one necessarily need to use the alternative OCSP option. Both CRL and OCSP are look-up processes to check if a security certificate on the system or browser has been revoked for some reason (cert hacking or counterfeiting being two such reasons).
-
bluejeans last edited by
So I've enabled TLS 1.1 and 1.2. Additionally, I've turned on SSL3 too (it was off). I've left OCSP validation off. Thanks for the helpful and quick replies!