How to Fix Server Has a Weak Ephemeral Diffie-Hellman Public Key Warning Message?

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Weak Ephemeral Diffie-Hellman Public Key Error

Have you ever clicked on a website and been greeted by an ERR_SSL_WEAK_EPHEMERAL_DH_KEY security error instead of the page? It’s a common security warning that indicates that the security of the site that you are attempting to access isn’t – strong enough. Modern browsers, like – Google Chrome, don’t let you connect to such websites to protect your privacy.

Comprehending the ERR_SSL_WEAK_EPHEMERAL_DH_KEY error can affect your browsing experience, and is hard to resolve. Therefore, in this article, we will understand what exactly the – “ERR_SSL_WEAK_EPHEMERAL_DH_KEY” error is, what are the reasons why this error pops up, and most importantly part – “how to get it fixed.”


ERR_SSL_WEAK_EPHEMERAL_DH_KEY is an error that pops up when you try to connect to a website that is using an – “outdated SSL security code.”

When you use updated browsers like Mozilla Firefox, they won’t let you access websites if the security code is outdated. They will pop the ERR_SSL_WEAK_EPHEMERAL_DH_KEY error or Server Has a Weak Ephemeral Diffie-Hellman Public Key warning message.

Note: If you are not the webmaster (the person who owns or manages the website), you won’t be able to fix this issue.

What are the Reasons that Give Rise to the ERR_SSL_WEAK_EPHEMERAL_DH_KEY Error?

There is only a single reason behind this error can happen, and it’s the use of an – “outdated SSL security code“.

How to Resolve the ERR_SSL_WEAK_EPHEMERAL_DH_KEY Error?

To fix the issue, try two methods:

  1. Update your server for Elliptic Curve Diffie-Hellman support.
  2. Turn off Ephemeral Diffie-Hellman (DHE).

Let’s explore each method in depth.

Method 1: Update your Server for Elliptic Curve Diffie-Hellman (ECDHE) Support

Follow the steps mentioned below to update your server for Elliptic Curve Diffie-Hellman support:

  • Click Search, placed on the taskbar.
  • Type Run and press Enter.
  • The Run dialog box will appear.
  • In the Open text box, type regedit and press Enter.
  • The Registry Editor window will appear.
  • Navigate to HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Control > SecurityProviders > SCHANNEL > KeyExchangeAlgorithms.
  • Right-click on KeyExchangeAlgorithms.
  • From the list, select New.
  • Click Key.
  • Name the new key PKCS.
  • Right-click on the PKCS key.
  • From the list, select New.
  • Click DWORD (32-bit) Value.
  • Name this new DWORD as ClientMinKeyBitLength.
  • Double-click on ClientMinKeyBitLength.
  • In the Value data box, enter the desired minimum key length (1024 is recommended).
  • Click OK.
  • Close the Registry Editor window.
  • Restart the server.
  • Try re-accessing the site.

Method 2: Turn off Ephemeral Diffie-Hellman (DHE)


If you are using IIS as your web server, follow the steps mentioned below to disable Ephemeral Diffie-Hellman (DHE):

  • Navigate to HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Control > SecurityProviders > SCHANNEL > KeyExchangeAlgorithms > Diffie-Hellman.
  • Modify the key Enabled with a DWORD value of 0.


If you are using an Apache web server, follow the steps mentioned below to disable DHE:

  • Find any of these files in the Apache conf directory – ssl.conf or httpd.conf.
  • Search for the SSLCipherSuite keyword string value.
  • Add “! EDH: ! DHE: ! DH: ! ECDH,” after ALL: in the cipher spec to disable Diffie-Hellman.
  • Make this change in every SSL configuration if you are not using one global configuration.
  • Restart the web server.


To wrap up, fixing the – “ERR_SSL_WEAK_EPHEMERAL_DH_KEY error” is paramount for website security and user trust. This error, indicating outdated SSL security code, can be resolved by – “updating your server for Elliptic Curve Diffie-Hellman support” or “disabling Ephemeral Diffie-Hellman.”

Buy SSL Certificates
<?xml version="1.0" encoding="UTF-8"?><svg id="Layer_1" xmlns="" viewBox="0 0 109.7 29.02"><defs><style>.cls-1{fill:#fff;}</style></defs><path class="cls-1" d="m5.38,22.85c-3.1-.26-5.3-1.92-5.38-4.8h3.6c.1,1.1.67,1.85,1.78,2.09v-4.58c-2.47-.62-5.38-1.32-5.38-4.87,0-2.83,2.26-4.68,5.38-4.92v-1.94h1.54v1.94c3,.24,5.02,1.85,5.23,4.7h-3.62c-.1-.94-.67-1.66-1.61-1.94v4.54c2.5.65,5.42,1.3,5.42,4.85,0,2.45-1.92,4.73-5.42,4.97v1.94h-1.54v-1.97Zm0-10.25v-4.15c-1.1.17-1.87.84-1.87,2.06,0,1.13.77,1.7,1.87,2.09Zm1.54,3.38v4.2c1.22-.22,1.94-1.06,1.94-2.14s-.82-1.68-1.94-2.06Z"/><path class="cls-1" d="m17.62,8.33h-2.33v-3.1h5.78v17.5h-3.46v-14.4Z"/><path class="cls-1" d="m28.27,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.91-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m41.28,22.9c-1.22,0-2.09-.86-2.09-1.97s.86-1.97,2.09-1.97,2.04.86,2.04,1.97-.86,1.97-2.04,1.97Z"/><path class="cls-1" d="m49.54,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.91-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m64.56,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.9-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m81.79,0h3.29l-6.48,27.07h-3.29L81.79,0Z"/><path class="cls-1" d="m96.89,9.43h3.58l-8.23,19.59h-3.58l2.88-6.62-5.33-12.96h3.77l3.43,9.29,3.48-9.29Z"/><path class="cls-1" d="m105.62,22.73h-3.36v-13.3h3.36v2.06c.84-1.37,2.23-2.26,4.08-2.26v3.53h-.89c-1.99,0-3.19.77-3.19,3.34v6.62Z"/></svg>