https://disroot.org provides several decentralized federated services, as email and xmpp, besides other cloud services as well… But not sure if asking here is right or not, but don’t know anywhere to ask either…

Is it having a license issue, does anyone know about it? Any status updates?

Websites prove their identity via certificates. LibreWolf does not trust this site because it uses a certificate that is not valid for disroot.org. The certificate is only valid for p1lg502277.dc01.its.hpecorp.net.
 
Error code: SSL_ERROR_BAD_CERT_DOMAIN

But also:

disroot.org has a security policy called HTTP Strict Transport Security (HSTS), which means that LibreWolf can only connect to it securely. You can’t add an exception to visit this site.

The issue is most likely with the website, and there is nothing you can do to resolve it. You can notify the website’s administrator about the problem.

I also tested with ungoogled chromium and pretty similar thing…

Anyonea aware, and also about disroot saying on this?

Edit (sort of understood already, no issue with disroot at all): The issue only shows up under the office VPN. It seems like disroot is not recognizing the office’s cert…

Edit: Solved. Yes it’s the office replacing the original cert with its own, as someone suggested. Thanks to all.

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 months ago

      Their company is attempting to hijack TLS connections to eavesdrop on their browsing.

      It only works with websites that also offer a non-TLS version (which the hijacker uses to fetch content and then re-encrypts with their own certificate after they’ve snooped). But it doesn’t work if the website doesn’t have a non-TLS version and/or specifies it should only be used with TLS.

      Another way for it to work is for the company to get their own certificates on the machine, which is very easy if it’s a work-issued machine. But I’m guessing OP is not using a work machine.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    9 months ago

    Your work is essentially doing a man in the middle on your traffic which is something you agreed to in your employment contract.

    For security reasons companies will inspect user traffic for to make sure they are not accessing anything they shouldn’t be.

    This doesn’t mean someone is actually looking at what you are doing, it just means that if something is trying to sneak in via a TLS session it will be picked up

    • kixikOP
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      9 months ago

      Ohh, thanks for that… I noticed when under the office’s VPN, it doesn’t work, :( Which is really bad to me, since it then block any services from it, :(

      It seems like disroot doesn’t like the office’s cert when connected through VPN…

      Thaks for replying !

      • Johannes Jacobs@lemmy.jhjacobs.nl
        link
        fedilink
        arrow-up
        5
        ·
        9 months ago

        Your office is inspecting the network traffic, and replacing the original certificate with its own certificate.

        The problem is with your office firewall most likely :)

        • kixikOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          9 months ago

          understood, thanks !

        • kixikOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          9 months ago

          Yeap, thanks a lot !