<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: After configuring OpenDNS, cannot access https sites in OpenDNS</title>
    <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174584#M1296</link>
    <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;For those curious, after some research, here is why Cisco's Root CA is not trusted by operating systems... This article explains it well:&amp;nbsp;&lt;A href="https://vinoshipper.freshdesk.com/support/solutions/articles/9000179931-your-connection-is-not-private" rel="nofollow noreferrer"&gt;https://vinoshipper.freshdesk.com/support/solutions/articles/9000179931-your-connection-is-not-private&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Basically, Cisco’s Root Umbrella CA cannot be trusted because 1) it does not adhere to strict guidelines of when a Root CA can be trusted publicly, and 2) a Root CA cannot be trusted whose chain’s sole purpose is to spoof other domains like a Man-in-the-middle attack (as explained in the above URL).&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 18 Feb 2020 22:46:33 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2020-02-18T22:46:33Z</dc:date>
    <item>
      <title>After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174562#M1274</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Greetings.&lt;/P&gt;
&lt;P&gt;Yesterday I&amp;nbsp;configured OpenDNS and finally got it working when I turned off SecureDNS in Avast! pro. Now, though, when I try to access some sites with https such as &lt;A href="https://news.google.com" rel="nofollow noreferrer"&gt;https://news.google.com&lt;/A&gt; and&amp;nbsp;&lt;A href="https://www.facebook.com" rel="nofollow noreferrer"&gt;https://www.facebook.com&lt;/A&gt; with Google Chrome, Internet Explorer 11 or Microsoft Edge, I get the message&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Chrome:&lt;/P&gt;
&lt;H1&gt;Your connection is not private&lt;/H1&gt;
&lt;P&gt;Attackers might be trying to steal your information from &lt;STRONG&gt;&lt;A href="http://www.facebook.com" rel="nofollow noreferrer"&gt;www.facebook.com&lt;/A&gt;&lt;/STRONG&gt; (for example, passwords, messages, or credit cards).&lt;/P&gt;
&lt;DIV id="debugging"&gt;
&lt;DIV id="error-code" class="error-code"&gt;NET::ERR_CERT_AUTHORITY_INVALID&lt;/DIV&gt;
&lt;DIV class="error-code"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="error-code"&gt;IE&lt;/DIV&gt;
&lt;DIV class="error-code"&gt; Certificate Error: Navigation Blocked
&lt;P&gt;There is a problem connecting securely to this website.&lt;/P&gt;
&lt;P&gt;The security certificate presented by this website was not issued by a trusted certificate authority.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &lt;BR /&gt;You should close this webpage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &lt;BR /&gt;Click here to close this webpage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &lt;BR /&gt; More information&lt;BR /&gt;If you arrived at this page by clicking a link, check the website address in the address bar to be sure that it is the address you were expecting.&lt;BR /&gt;When going to a website with an address such as &lt;A href="https://example.com" rel="nofollow noreferrer"&gt;https://example.com&lt;/A&gt;, try adding the 'www' to the address, &lt;A href="https://www.example.com" rel="nofollow noreferrer"&gt;https://www.example.com&lt;/A&gt;.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information, see "Certificate Errors" in Internet Explorer Help.&lt;/P&gt;
&lt;P&gt;I have run the OpenDNS diagnostic tool, but the results don't mean much to me.&lt;/P&gt;
&lt;P&gt;Is this a common problem? How shall I proceed to&amp;nbsp;be able to access unblocked sites?&lt;/P&gt;
&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD id="mainTitleAlign"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="moreInformationAlign"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 20 Jan 2017 14:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174562#M1274</guid>
      <dc:creator>ggidd</dc:creator>
      <dc:date>2017-01-20T14:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174563#M1275</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;I resolved this by installing the Cisco_Umbrella_Root_CA certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 20 Jan 2017 17:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174563#M1275</guid>
      <dc:creator>ggidd</dc:creator>
      <dc:date>2017-01-20T17:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174564#M1276</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Well done!&amp;nbsp; Here is the &lt;A href="https://community.cisco.com/hc/en-us/articles/227987007" target="_blank" rel="nofollow noreferrer"&gt;related KB article&lt;/A&gt;.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 20 Jan 2017 18:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174564#M1276</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-01-20T18:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174565#M1277</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Yes, where exactly is the SHA 256 Fingerprint for the Cisco Umbrella Root CA?. This certificate shows as, "Not Verified" on my iOS device.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.apple.com/en-ca/HT208125" target="_blank" rel="nofollow noreferrer"&gt;Apple's website&lt;/A&gt; has a different fingerprint and serial number than the one shown in the&amp;nbsp;"Cisco Umbrella Root CA" certificate.&lt;/P&gt;
&lt;P&gt;Without a published Fingerprint hard to trust.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 Oct 2017 15:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174565#M1277</guid>
      <dc:creator>jprokos</dc:creator>
      <dc:date>2017-10-27T15:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174566#M1278</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Here's the SHA1 fingerprint:&lt;/P&gt;
&lt;PRE&gt;c5 09 11 32 e9 ad f8 ad 3e 33 93 2a e6 0a 5c 8f a9 39 e8 24&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 Oct 2017 16:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174566#M1278</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-10-27T16:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174567#M1279</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Thank you. Is this posted on the site somewhere or is it from your copy of the CA?&lt;/P&gt;
&lt;P&gt;Can you explain what all of these warning messages mean? Am I giving Cisco access to all the data I send while browsing?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="support.opendns.com_hc_user_images_ycu7RNEJNECAfSCa4BG9Wg.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228319i20C0407984674B15/image-size/large?v=v2&amp;amp;px=999" role="button" title="support.opendns.com_hc_user_images_ycu7RNEJNECAfSCa4BG9Wg.jpeg" alt="support.opendns.com_hc_user_images_ycu7RNEJNECAfSCa4BG9Wg.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;There is another setting in iOS under Settings&amp;gt;General&amp;gt;Certificate Trust Settings:&amp;nbsp;Enable Full Trust For Root Certificates&lt;/P&gt;
&lt;P&gt;The Cisco Umbrella Root CA is listed here with a slider to enable or not. Should we enable?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="support.opendns.com_hc_user_images_BS5SwjKCk-OeBcqdaYe0Og.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228258i3FEB1F4ECD67238E/image-size/large?v=v2&amp;amp;px=999" role="button" title="support.opendns.com_hc_user_images_BS5SwjKCk-OeBcqdaYe0Og.jpeg" alt="support.opendns.com_hc_user_images_BS5SwjKCk-OeBcqdaYe0Og.jpeg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="support.opendns.com_hc_user_images_HJenXq9LCHg2R1LBsuGhVw.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228135i2324EC114C5439D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="support.opendns.com_hc_user_images_HJenXq9LCHg2R1LBsuGhVw.jpeg" alt="support.opendns.com_hc_user_images_HJenXq9LCHg2R1LBsuGhVw.jpeg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 Oct 2017 16:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174567#M1279</guid>
      <dc:creator>jprokos</dc:creator>
      <dc:date>2017-10-27T16:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174568#M1280</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;"&lt;EM&gt;Is this posted on the site somewhere or is it from your copy of the CA?&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;This is from the certificate itself.&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;Can you explain what all of these warning messages mean?&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;You may want to raise a support ticket with OpenDNS if you are concerned.&amp;nbsp; We other users can hardly help you further.&amp;nbsp; We are generally in the same situation like you as user.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Nov 2017 20:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174568#M1280</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-06T20:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174569#M1281</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;So wait, let me get this straight, to access https sites, I'm going to have to install this cert on any system that uses my network?&amp;nbsp; So when a guest comes to my house I have to hit them at the door with: Dude, you have to do this to use my WiFi?&amp;nbsp; Come on, how's that even remotely logical???&amp;nbsp; I cannot imagine why anyone would even consider using this service if you have to do that.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 17 Nov 2017 22:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174569#M1281</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-17T22:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174570#M1282</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;"&lt;EM&gt;to access https sites, I'm going to have to install this cert on any system that uses my network?&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;No, in no way!&amp;nbsp; This browser certificate warning only appears if you attempt to visit a HTTPS site &lt;STRONG&gt;where you have the domain blocked&lt;/STRONG&gt; with your OpenDNS dashboard settings anyway.&amp;nbsp; You simply can also accept or ignore this browser warning instead of installing the CA cert.&amp;nbsp; It's up to you.&amp;nbsp; The warning does never come up if you visit a HTTPS site normally where you did not block related domains.&lt;/P&gt;
&lt;P&gt;It seems you didn't read the KB article&amp;nbsp;&lt;A href="https://support.opendns.com/hc/en-us/articles/227987007" rel="nofollow noreferrer"&gt;https://support.opendns.com/hc/en-us/articles/227987007&lt;/A&gt; at all.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 14:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174570#M1282</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-18T14:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174571#M1283</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;So you're telling us that Cisco cannot afford to buy a real cert to do this?&amp;nbsp; For businesses using this how does that not cause TONS of confusion on networks such as guest access WiFi?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 14:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174571#M1283</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-18T14:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174572#M1284</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;I see, you still did not read that KB article, else you would have seen that you can download the real cert bought by Cisco from there.&amp;nbsp; Also, why are you concerned?&amp;nbsp; These domains which you access with HTTPS are blocked anyway by your settings, independent of if you get an OpenDNS block page or a browser warning.&amp;nbsp; You have achieved what you are looking for, that the domain is being blocked and you cannot access it.&amp;nbsp; That was the goal and purpose.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 16:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174572#M1284</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-18T16:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174573#M1285</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Actually Rotblitz, I did.&amp;nbsp; This is NOT a real cert.&amp;nbsp; A real cert would be issued by a root cert provider such that users don't have to install them manually. Imagine having to download a cert for every HTTPS site, say your bank, Amazon, Google, etc..???&amp;nbsp; Users would NEVER do that.&amp;nbsp; There's a reason why legit sites use real certs that don't require manual interaction.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you don't get is users get confused, frustrated, and contact who's ever in charge of the network about errors like this.&amp;nbsp; In a large business where certs can be deployed to users by group policy that's simple, but for a small business with a guest WiFi network, those guests are going to get errors and are going to pester the employees about the issues.&amp;nbsp;&amp;nbsp;Why can't they buy a legit cert from a legit provider like Verisign or if they're too cheap, just get one from one of the super inexpensive SSL providers like RapidSSL or GoDaddy?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 16:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174573#M1285</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-18T16:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174574#M1286</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Ok, you might have read it, but you clearly didn't understand it.&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;This is NOT a real cert.&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;The cert&amp;nbsp;&lt;STRONG&gt;is&lt;/STRONG&gt; issued by a CA root cert provider.&amp;nbsp; Cisco is such a certified provider, since ions.&amp;nbsp; Didn't know?&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;Imagine having to download a cert for every HTTPS site&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;Agreed, a nightmare!&amp;nbsp; Good that this is not needed at all.&amp;nbsp; Why do you think you have to download certs for every HTTPS site?&amp;nbsp; Not at all!&amp;nbsp; Why would you download a cert for a HTTPS site you don't want to have visited and therefore have its domain blocked at the dashboard?&amp;nbsp; No need!&amp;nbsp; It would be nonsense to do so.&amp;nbsp; The domain is being blocked anyway.&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;guests are going to get errors and are going to pester the employees about the&lt;/EM&gt; &lt;EM&gt;issues.&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;LOL, very unlikely.&amp;nbsp; If you were a guest and attempted to visit youporn.com, would you complain with your host or the employees that you couldn't access youporn.com, because you got a browser warning "Your connection is not private"?&amp;nbsp; Hardly!&amp;nbsp; Else you are extremely courageous.&amp;nbsp; (Well, after what you said, I could really imagine that you did it this way, not being aware of the reputation loss.)&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;Why can't they buy a legit cert from a legit provider like Verisign&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;I see, you didn't get that this cert is legit, and they are a provider like Verisign, and that this symptom would be for any certificate, no matter which one, also from Verisign.&amp;nbsp; I give up.&amp;nbsp; You don't want to understand.&amp;nbsp; It is your right in a free world to not understand.&amp;nbsp; Be it!&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 17:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174574#M1286</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-18T17:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174575#M1287</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;If it were a real root cert there would be NO need to download and install it.&amp;nbsp; That's how root certs work.&amp;nbsp; When you want to have a conversation about SSL certs, chaining, and non-root certs let me know, I'll be happy to explain them.&amp;nbsp; Until then, this is a jury rigged solution.&amp;nbsp; Also, when you spend 16 hours a day providing IT support let me know and we'll talk about what errors users bring to the powers-that-be.&amp;nbsp; Until then, have a nice day.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 17:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174575#M1287</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-18T17:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174576#M1288</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;No, I only spend 8 hours per day with ICT, since 35 years.&amp;nbsp; Probably not enough...&lt;/P&gt;
&lt;P&gt;As I said, it is your right to not understand.&amp;nbsp; I accept and tolerate this.&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;If it were a real root cert there would be NO need to download and install it.&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;Fully correct, you say it.&amp;nbsp; There is no need to download and install it.&amp;nbsp; And it is a real root cert, but not published in the bundle of root certs by Microsoft, Apple, Google, etc.&amp;nbsp; It wouldn't make sense to publish it this way, with "only" 2% of the internet users using Cisco/OpenDNS services.&amp;nbsp; This "small" amount wouldn't justify to propagate it to every device in the world.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 17:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174576#M1288</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-18T17:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174577#M1289</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Then with what you're saying I can create a root cert and just let everyone have access to my certificate authority server and call it a root certificate.&amp;nbsp; That's beyond illogical.&amp;nbsp; If Cisco can't get their root cert distributed by at least one of the major OS vendors then it's not a real root cert, it's an internal cert being distributed to anyone who wants it.&amp;nbsp; There's a very real difference.&amp;nbsp; In point of fact, since there's no way to verify the legitimacy of the cert since it's not coming from a trusted root authority that's a potential security risk.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 18 Nov 2017 22:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174577#M1289</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-18T22:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174578#M1290</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;What about raising your concerns with Cisco/OpenDNS instead of discussing it to death with other users like me?&amp;nbsp; This is fruitless.&amp;nbsp; Nobody here can speak for Cisco/OpenDNS.&lt;/P&gt;
&lt;P&gt;Your initial question was: "&lt;EM&gt;to access https sites, I'm going to have to install this cert on any system that uses my network?&lt;/EM&gt;".&amp;nbsp; This has been answered.&amp;nbsp; Again, the summary of the answers is: &lt;STRONG&gt;No, you don't have to install this cert, especially not to access HTTPS sites.&amp;nbsp; You cannot access these HTTPS sites anyway, because you have them blocked via your dashboard settings, so that they cannot be accessed, exactly as you intended.&amp;nbsp; You have achieved what you wanted.&amp;nbsp; Non-blocked HTTPS sites can always be accessed as usual, without ever using this cert.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Your other later concerns are pretty out of scope and unrelated to the topic, to my opinion.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Nov 2017 11:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174578#M1290</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2017-11-20T11:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174579#M1291</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;I simply replied to your assertions.&amp;nbsp; If you don't want a reply, don't post one.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Nov 2017 15:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174579#M1291</guid>
      <dc:creator>Terabyte</dc:creator>
      <dc:date>2017-11-20T15:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174580#M1292</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;I am @&lt;A href="https://community.cisco.com/hc/en-us/profiles/7249524226-tubaornottuba" rel="nofollow noreferrer"&gt;tubaornottuba&lt;/A&gt;&amp;nbsp;on this one -- The Cisco Umbrella Root CA is not trusted by Windows. Per the referenced OpenDNS KB, yes, we could publish the Root CA via GPO to all Windows machines, but that would not resolve the issue with Macs, Linux/Unix, and non-employee machines, such as guests/vendors.&lt;/P&gt;
&lt;P&gt;Cisco should work with the OS vendors to ensure that their Root CA gets automatically trusted. With that said, I have not yet looked into why they haven't done that since this thread (late 2017).&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Feb 2020 20:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174580#M1292</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2020-02-18T20:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: After configuring OpenDNS, cannot access https sites</title>
      <link>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174581#M1293</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;If you implemented the cert on a Mac or Linux machine, it will help too, not on Windows machines alone.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Feb 2020 20:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/after-configuring-opendns-cannot-access-https-sites/m-p/5174581#M1293</guid>
      <dc:creator>rotblitz</dc:creator>
      <dc:date>2020-02-18T20:35:06Z</dc:date>
    </item>
  </channel>
</rss>

