Pak Jiddat

Read: In the name of thy Lord Who createth, Createth man from a clot. Read: And thy Lord is the Most Bounteous, Who teacheth by the pen, Teacheth man that which he knew not. Nay, but verily man is rebellious That he thinketh himself independent!. Lo! unto thy Lord is the return. (Sura Alalaq 96:8)

INADEQUATE_SECURITY - SSL Cipher problems with HTTP2

Created On: 19 Oct, 2018: 10:59:20 - Tags : network administration | online tools and services | security | web servers


HTTP2 requires encryption over SSL. The recommended SSL protocol for HTTP2 is TLS 1.2. Ciphers are encryption algorithms used by SSL protocols.

Certain devices specially old ones such as old Android mobile phones or old operating systems like Windows XP, support outdated SSL Ciphers that are not supported by HTTP2 protocol.

The TLS 1.2 Cipher Suite Black List shows the list of all SSL Ciphers that are not supported by the HTTP2 protocol. If a web browser running on an old operating system requests a SSL Cipher that is on the list of unsupported Ciphers, then the HTTP2 implementation of the browser should reject the connection to the server with INADEQUATE_SECURITY error message

To test if the connection between your device and a web server is over a reliable and secure HTTP2 connection, go to and enter the url of the website

Related Articles

  1. PrivateTmp systemd option prevents access to tmp folder
  2. Generating free SSL certificate from LetsEncrypt on localhost
  3. Preventing browsers from caching content
  4. Making HTTP POST requests from Google Chrome
  5. Increasing web server timeout
  6. Redirect http to https with Apache
  7. Creating and Installing Apache Self Signed Certificate
  8. Using flags with rewrite rule
  9. Redirecting without mod_rewrite using regular expressions in htaccess
  10. Generate Certificate Signing Request (CSR) for ssl certificates
  11. Disabling output buffering with mod_fcgid
  12. Configuring Apache mod status
  13. Allowing Cross Origin Requests using htaccess
  14. Redirect http to https with Nginx
  15. Blocking visitors by http method using LimitExcept Apache directive
  16. Access control directives for Apache
  17. Passing query parameters to proxy server in Nginx
  18. Use of Preflight request in HTTP Cross Origin Resourse Sharing (CORS)
  19. Using RewriteCond directives
  20. Preventing spam messages with Contact Form 7 WordPress plugin
  21. Whitelisting devices and files for RKhunter
  22. Making cross domain Ajax calls using JSONP
  23. Using Oauth2l
  24. Configuring SFTP/SSH access for LXC Containers
  25. Increasing number of concurrent connections for Proftp
  26. Fetching PTR DNS records using Reverse DNS
  27. List of http access fields
  28. Installing and configuring Vlans on Windows 8 VM
  29. Checking Email server for problems
  30. Migrating Trello issues to Redmine
  31. Using Google Cloud Endpoint
  32. Trello Sandbox