November/December 2018 issue of acmqueue The November/December issue of acmqueue is out now

Subscribers and ACM Professional members login here

Web Security

  Download PDF version of this article PDF

Error 526 Ray ID: 4ab5396b1bbc214a • 2019-02-19 02:15:11 UTC

Invalid SSL certificate








What happened?

The origin web server does not have a valid SSL certificate.

What can I do?

If you're a visitor of this website:

Please try again in a few minutes.

If you're the owner of this website:

The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here.


Originally published in Queue vol. 12, no. 8
see this item in the ACM Digital Library



Paul Vixie - Go Static or Go Home
In the end, dynamic systems are simply less secure.

Sharon Goldberg - Why Is It Taking So Long to Secure Internet Routing?
Routing security incidents can still slip past deployed security defenses.

Ben Laurie - Certificate Transparency
Public, verifiable, append-only logs

Christoph Kern - Securing the Tangled Web
Preventing script injection vulnerabilities through software design


(newest first)

Someone-inGermany | Thu, 20 Nov 2014 17:36:47 UTC

HTTPS is a barrier for normal Internet-Surfer! The Web should be free of not nesssesary barries at all. So my humble German opinon. More and more Websites use HTTPSSSS, and for my at home, I can read them anamore. This is not a "Feature", it´s a bug! The Internet should be free to read for everybody. Thank for reading.

Greg Slepak | Sat, 27 Sep 2014 02:59:52 UTC

I am surprised there is no mention of Namecoin [1], DNSChain [2], and blockchains in general.

[1] [2]

Jonathan Rickman | Wed, 24 Sep 2014 23:06:27 UTC

I have always been fascinated by the fact that most commonly used vulnerability scanners identify the presence of self signed certificates as a security risk, when in reality, this is probably a very good practice where possible.

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.