07-11-2024 10:40 AM
The certificate errors related to 516 Upstream Certificate CN Mismatch are becoming very problematic for our company. Marketing emails are particularly problematic, and this is disruptive to our staff when trying to sign up for webinars and other "normal" activities.
I can't believe Cisco Umbrella is okay with such a disruptive and non-productive workflow. Users don't even get the normal block screen allowing them to request access to the blocked page.
Are there any plans to give administrators the control to allow users to bypass these warnings or a more user-friendly way of dealing with this issue?
07-11-2024 10:52 AM
@kbull it sounds like you using SSL decryption with Umbrella, in which case you must import the Umbrella root certificate to your computers, so they trust the Umbrella certificate.
https://docs.umbrella.com/deployment-umbrella/docs/enable-ssl-decryption
07-11-2024 11:01 AM
07-11-2024 11:11 AM
thanks, good to know.
07-11-2024 11:16 AM
Ken, you are correct that documented fixes exist, but getting companies to fix this is not easy or even feasible in many cases. For example, Home Depot's emails with order tracking links were breaking with this 516 Upstream error.
The other challenge is that there is no easy reporting for end users like a normal blocked page warning. Our staff aren't telling us about blocked pages until they get really frustrated or a block prevents them from doing their job, which is certainly not a good end-user experience. This will also start pushing staff to use personal devices over corporate devices, which, again, is not ideal.
10-08-2024 10:44 AM
This is funny, I just found that Cisco themselves need to fix their Umbrella test site http://exampleadultsite.com/ . It isn't possible to test bypass of that site in Chrome since there is no TLS certificate setup for it specifically. I guess that shows how wide spread this issue is.
10-09-2024 09:34 AM - edited 10-09-2024 09:41 AM
The test site you mentioned: http://www[.]exampleadultsite[.]com/ is http not https; I'm surprised you are seeing a certificate miss-match error being served from Umbrella. Can you confirm the exact error you are seeing?
I also note that this test location is for DNS testing only:
"The following test pages apply to Umbrella DNS coverage and may not apply to users with active SIG coverage."
https://support.umbrella.com/hc/en-us/articles/115000411528-What-are-the-Umbrella-Test-Destinations
However I do note that none of the common names in the certificate match the name that was used www[.]exampleadultsite[.]com, so proxying this test location over https will likely throw an error in some cases.
10-09-2024 11:48 AM
Hello, here is a step by step example of what I'm seeing... using incognito mode in chrome.
I then tried it in a new chrome profile... and it worked fine. No https redirect for some reason???
Maybe incognito mode is more enthusiastic about forcing to https? Maybe http links are treated differently than manually typed in URLs? Maybe I'm hitting chrome caching the redirects which I remember being a PITA in some situations.
In any case, it seems like Umbrella's test site should be setup to work in https mode.
10-09-2024 11:58 AM
Ah, found this note about google future plans for chrome HTTPS first settings from a year ago.
Currently, HTTPS-First mode is enabled for users who are logged into their accounts and have agreed to participate in the Google Advanced Protection program. In future Chrome releases, HTTPS-First will be enabled by default for pages opened in incognito mode. Experiments are also being conducted to automatically enable HTTPS-First for sites known to support HTTPS and for users who rarely use HTTP in their browser.
My first test was from my main chrome account, and I am opted into Advanced protection....
Next test was incognito.
Last was a generic profile.
Needing to use http sites is going to be a pain to deal with.
10-09-2024 12:01 PM
One last note, I opened a ticket about this yesterday and just received this, so hopefully the next time the certs get issued they will have the test site SANs.
Thanks for bringing this to our attention. After verifying the certificate errors, it turns out the engineering team is aware of this issue with test sites and they should update the certificates for them soon.
10-10-2024 02:09 AM
"In any case, it seems like Umbrella's test site should be setup to work in https mode."
Oh yes, I do agree- the cert is broken for this site, CN mismatch. Either the webserver shouldn't respond on https or the cert should be fixed.
Whats interesting here is the browser behaviour which appears to be enforcing https. Which is a good thing really, for most users, most of the time. Looks liek I need to do some research...:-)
07-11-2024 11:18 AM
We are using SSL decryption, and we have the Umbrella root certificate deployed otherwise, every site would break. The issue I am speaking of is documented here: Error 516 Upstream Certificate CN Mismatch – Cisco Umbrella
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide