Getting an CIPHER_MISMATCH error

Hi , we have a website trendycareer.ae , after migration , i tried to reactivate cloudflare but i am facing this error ERR_SSL_VERSION_OR_CIPHER_MISMATCH

my edge certificate is active. i tried all your method explained in other questions but failed to solve the issue. if i posed the website on cloudflare then only in that case website works perfectly.

my settings are set to Full in ssl , edge is active, more than 24 hour passed . tried all methods explained.

Kindly assist me

Are you using two-level deep subdomain e.g. foo.bar.example.com?

You currently have a security issue.

no its for main domain or maximum for mail.trendycareer.ae

I tried All levels , OFF , Flexible, Full , nothing works in my case , now i have paused it again

But, may I ask how about the origin SSL certificate?
Was the Website working over HTTPS before moving to Cloudflare?

Furthermore, may I ask have you checked if your SSL certificate is valid one and propperly installed at the origin host/server? If so, does it cover both naked domain, www and any other sub-domain like mail if so?

x-provided-by: StackCDN
---
Let's Encrypt
Common name: *.trendycareer.ae
SANs: *.trendycareer.ae, trendycareer.ae
Valid from September 2, 2021 to December 1, 2021

Using the curl -skvo /dev/null https://trendycareer.ae/ --connect-to ::YOURIP:

* Expire in 0 ms for 6 (transfer 0x5584ab3a9fb0)
* Connecting to hostname: YOURIP
*   Trying YOURIP...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0x5584ab3a9fb0)
* Connected to YOURIP (YOURIP) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [102 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [4042 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=*.trendycareer.ae
*  start date: Sep  2 11:50:55 2021 GMT
*  expire date: Dec  1 11:50:54 2021 GMT
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5584ab3a9fb0)
} [5 bytes data]
> GET / HTTP/2
> Host: trendycareer.ae
> User-Agent: curl/7.64.0
> Accept: */*
>
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
} [5 bytes data]
< HTTP/2 200
< date: Sat, 04 Sep 2021 01:02:13 GMT
< content-type: text/html; charset=UTF-8
< vary: Accept-Encoding
< server: Apache
< x-powered-by: PHP/7.3.29
< x-provided-by: StackCDN
< x-provided-by: StackCDN
< last-modified: Sat, 04 Sep 2021 00:11:32 GMT
< vary: Accept-Encoding
< x-origin-cache-status: MISS
< x-backend-server: web44.hosting.stackcp.net
< x-service-level: standard
< x-cdn-cache-status: MISS
< x-via: FRA1
<
{ [14742 bytes data]
* Connection #0 to host YOURIP left intact

what does this mean, i am non tech guy

This topic was automatically closed 15 days after the last reply. New replies are no longer allowed.