<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell in Cloud Security</title>
    <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5205316#M2018</link>
    <description>&lt;P&gt;This is funny, I just found that Cisco themselves need to fix their Umbrella test site &lt;A href="http://exampleadultsite.com/" target="_blank"&gt;http://exampleadultsite.com/&lt;/A&gt;&amp;nbsp;.&amp;nbsp; It isn't possible to test bypass of that site in Chrome since there is no TLS certificate setup for it specifically.&amp;nbsp; I guess that shows how wide spread this issue is.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Oct 2024 17:44:58 GMT</pubDate>
    <dc:creator>IT-LARL-2024</dc:creator>
    <dc:date>2024-10-08T17:44:58Z</dc:date>
    <item>
      <title>Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrella)</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143725#M1953</link>
      <description>&lt;P&gt;The certificate errors related to 516 Upstream Certificate CN Mismatch are becoming very problematic for our company. Marketing emails are particularly problematic, and this is disruptive to our staff when trying to sign up for webinars and other "normal" activities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't believe Cisco Umbrella is okay with such a disruptive and non-productive workflow. Users don't even get the normal block screen allowing them to request access to the blocked page.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any plans to give administrators the control to allow users to bypass these warnings or a more user-friendly way of dealing with this issue?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 17:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143725#M1953</guid>
      <dc:creator>kbull</dc:creator>
      <dc:date>2024-07-11T17:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143730#M1954</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1696688"&gt;@kbull&lt;/a&gt; it sounds like you using SSL decryption with Umbrella, in which case you must import the Umbrella root certificate to your computers, so they trust the Umbrella certificate.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.umbrella.com/deployment-umbrella/docs/enable-ssl-decryption" target="_blank"&gt;https://docs.umbrella.com/deployment-umbrella/docs/enable-ssl-decryption&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 17:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143730#M1954</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-11T17:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143734#M1955</link>
      <description>This is nor the problem he's having.&lt;BR /&gt;&lt;BR /&gt;What happens is that the URL is for company.com, but the server serving it is run by the bulk mailer, with their cert on it (e.g. sendgrid.com)  So there is a cert/url mismatch.&lt;BR /&gt;&lt;BR /&gt;Happens with a bunch of different services, like Sendgrid, Mailchimp, etc.&lt;BR /&gt;&lt;BR /&gt;The company sending via needs to fix it...  documented fixes exist.&lt;BR /&gt;&lt;BR /&gt;As a workaround you can look at not decrypting for companies you have this issue with.&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143734#M1955</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2024-07-11T18:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143742#M1956</link>
      <description>&lt;P&gt;thanks, good to know.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143742#M1956</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-11T18:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143745#M1957</link>
      <description>&lt;P&gt;Ken, you are correct that documented fixes exist, but getting companies to fix this is not easy or even feasible in many cases. For example, Home Depot's emails with order tracking links were breaking with this 516 Upstream error.&lt;BR /&gt;The other challenge is that there is no easy reporting for end users like a normal blocked page warning. Our staff aren't telling us about blocked pages until they get really frustrated or a block prevents them from doing their job, which is certainly not a good end-user experience. This will also start pushing staff to use personal devices over corporate devices, which, again, is not ideal.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143745#M1957</guid>
      <dc:creator>kbull</dc:creator>
      <dc:date>2024-07-11T18:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143746#M1958</link>
      <description>&lt;P&gt;We are using SSL decryption, and we have the Umbrella root certificate deployed otherwise, every site would break. The issue I am speaking of is documented here:&amp;nbsp;&lt;A href="https://support.umbrella.com/hc/en-us/requests/1805112" target="_blank"&gt;Error 516 Upstream Certificate CN Mismatch – Cisco Umbrella&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5143746#M1958</guid>
      <dc:creator>kbull</dc:creator>
      <dc:date>2024-07-11T18:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5205316#M2018</link>
      <description>&lt;P&gt;This is funny, I just found that Cisco themselves need to fix their Umbrella test site &lt;A href="http://exampleadultsite.com/" target="_blank"&gt;http://exampleadultsite.com/&lt;/A&gt;&amp;nbsp;.&amp;nbsp; It isn't possible to test bypass of that site in Chrome since there is no TLS certificate setup for it specifically.&amp;nbsp; I guess that shows how wide spread this issue is.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 17:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5205316#M2018</guid>
      <dc:creator>IT-LARL-2024</dc:creator>
      <dc:date>2024-10-08T17:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5205906#M2019</link>
      <description>&lt;P&gt;The test site you mentioned:&amp;nbsp;&lt;A href="http://www.exampleadultsite.com/" target="_blank" rel="noopener"&gt;http://www[.]exampleadultsite[.]com/&lt;/A&gt;&amp;nbsp;is http not https; I'm surprised you are seeing a certificate miss-match error being served from Umbrella.&amp;nbsp; Can you confirm the exact error you are seeing?&lt;/P&gt;
&lt;P&gt;I also note that this test location is for DNS testing only:&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;The following test pages apply to Umbrella DNS coverage and may not apply to users with active SIG coverage."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.umbrella.com/hc/en-us/articles/115000411528-What-are-the-Umbrella-Test-Destinations" target="_blank"&gt;https://support.umbrella.com/hc/en-us/articles/115000411528-What-are-the-Umbrella-Test-Destinations&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;However I do note that none of the common names in the certificate match the name that was used www[.]exampleadultsite[.]com, so proxying this test location over https will likely throw an error in some cases.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 16:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5205906#M2019</guid>
      <dc:creator>howe</dc:creator>
      <dc:date>2024-10-09T16:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206046#M2020</link>
      <description>&lt;P&gt;Hello, here is a step by step example of what I'm seeing... using incognito mode in chrome.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Using Umbrella dns based protection.&lt;/LI&gt;&lt;LI&gt;Visit &lt;A href="http://exampleadultsite.com" target="_blank"&gt;http://exampleadultsite.com&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;In incognito mode... I'm seeing a redirect to https at this point.&lt;/LI&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-10-09 13_30_34-Site Blocked.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230990i4478D1DE1640BEFC/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-10-09 13_30_34-Site Blocked.png" alt="2024-10-09 13_30_34-Site Blocked.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;Get Umbrella block page. (&lt;A href="https://bpb.opendns.com/b/https/exampleadultsite.com/" target="_blank"&gt;https://bpb.opendns.com/b/https/exampleadultsite.com/&lt;/A&gt;) (notice changed to https)&lt;/LI&gt;&lt;LI&gt;Bypass using account or code.&lt;/LI&gt;&lt;LI&gt;Get bypass confirmation page.&lt;/LI&gt;&lt;LI&gt;Click "Continue browsing at exampleadultsite.com, which is proxied to be able to bypass the block.&amp;nbsp; URL starts with&amp;nbsp;&lt;A href="https://exampleadultsite.com/_bpb/1/[lots" target="_blank"&gt;https://exampleadultsite.com/_bpb/1/[lots&lt;/A&gt;&amp;nbsp;of extra args]&lt;/LI&gt;&lt;LI&gt;Umbrella servers see the mismatch and return "516 Upstream Certificate CN Mismatch" error page&lt;/LI&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-10-09 13_17_16-Error 516.png" style="width: 810px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230979i557EED23087C57CD/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-10-09 13_17_16-Error 516.png" alt="2024-10-09 13_17_16-Error 516.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then tried it in a new chrome profile... and it worked fine.&amp;nbsp; No https redirect for some reason???&lt;/P&gt;&lt;P&gt;Maybe incognito mode is more enthusiastic about forcing to https?&amp;nbsp; Maybe http links are treated differently than manually typed in URLs?&amp;nbsp; Maybe I'm hitting chrome caching the redirects which I remember being a PITA in some situations.&lt;/P&gt;&lt;P&gt;In any case, it seems like Umbrella's test site should be setup to work in https mode.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 18:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206046#M2020</guid>
      <dc:creator>IT-LARL-2024</dc:creator>
      <dc:date>2024-10-09T18:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206052#M2021</link>
      <description>&lt;P&gt;Ah, found this note about google future plans for chrome HTTPS first settings from a year ago.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Currently, HTTPS-First mode is enabled for users who are logged into their accounts and have agreed to participate in the Google Advanced Protection program. In future Chrome releases, HTTPS-First will be enabled by default for pages opened in incognito mode. Experiments are also being conducted to automatically enable HTTPS-First for sites known to support HTTPS and for users who rarely use HTTP in their browser.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;My first test was from my main chrome account, and I am opted into Advanced protection....&lt;/P&gt;&lt;P&gt;Next test was incognito.&lt;/P&gt;&lt;P&gt;Last was a generic profile.&lt;/P&gt;&lt;P&gt;Needing to use http sites is going to be a pain to deal with.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 18:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206052#M2021</guid>
      <dc:creator>IT-LARL-2024</dc:creator>
      <dc:date>2024-10-09T18:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206056#M2022</link>
      <description>&lt;P&gt;One last note, I opened a ticket about this yesterday and just received this, so hopefully the next time the certs get issued they will have the test site SANs.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks for bringing this to our attention. After verifying the certificate errors, it turns out the engineering team is aware of this issue with test sites and they should update the certificates for them soon.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 19:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206056#M2022</guid>
      <dc:creator>IT-LARL-2024</dc:creator>
      <dc:date>2024-10-09T19:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Web Gateway - 516 Upstream Certificate CN Mismatch (Umbrell</title>
      <link>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206354#M2023</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;In any case, it seems like Umbrella's test site should be setup to work in https mode."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Oh yes, &lt;STRONG&gt;I do agree&lt;/STRONG&gt;- the cert is broken for this site, CN mismatch. Either the webserver shouldn't respond on https or the cert should be fixed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whats interesting here is the browser behaviour which appears to be enforcing https. Which is a good thing really, for most users, most of the time. Looks liek I need to do some research...:-)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 09:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/secure-web-gateway-516-upstream-certificate-cn-mismatch-umbrella/m-p/5206354#M2023</guid>
      <dc:creator>howe</dc:creator>
      <dc:date>2024-10-10T09:09:15Z</dc:date>
    </item>
  </channel>
</rss>

