Announcement

Collapse
No announcement yet.

SNI Inspection - Show blocking page

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • SNI Inspection - Show blocking page

    Hi all,

    I have configured the web filter on my Untangle to process SNI information from HTTPS websites.
    In the Arista help article (​https://wiki.edge.arista.com/index.php/HTTPS) it says that the blocking page cannot be displayed if the Untangle's Root CA is not installed on the client.

    I have the root CA installed on a client and still get a certificate warning when calling a blocked HTTPS page, which can't even be bypassed.

    There is talk about "[website] uses a security technology called "HTTP Strict Transport Security (HSTS)", which allows Firefox to connect to the website only through secured connections. Therefore, no exception can be added for the website".

    Is this a new security feature that allows that the blocking page can not be called despite the installed Untangle Root CA's ?

    Can I somehow make the blocking page reappear at least with the Root CA installed ?


    Many thanks for suggestions and tips.

    balombi


  • #2
    This should only impact you if your block page is not served via https.
    Five time Microsoft ASP.Net MVP managing a Lenovo RD330 / E5-2420 / 16GB with Untangle 16.5.2 to protect a 1Gbps fiber link for ~450 residential college students and associated staff and faculty

    Comment


    • #3
      Originally posted by balombi View Post
      Is this a new security feature that allows that the blocking page can not be called despite the installed Untangle Root CA's ?
      Nope. HSTS has been part of most browsers for years now. It's important to note that this is not being caused by your NG Firewall itself; it's the browser reacting to the injection of the block page. While it may seem irritating, it's actually desired behavior: you want your browser to tell you if your connection has been hijacked somehow.

      You should definitely install the root CA to any devices affected by this. This article covers the process for Windows machines and links to articles for other OSes. We can't guarantee this will stop HSTS from triggering, but it's the only thing you really can do from the NGFW's perspective.
      Græme Ravenscroft • Technical Marketing Engineer
      ('gram', like the unit of measurement)
      he/him
      Please don't reboot your NGFW.
      How can we make Arista ETM products better?

      Comment


      • #4
        Thank you jcoehoorn and gravenscroft, I've set the blocking page to https and no it works...

        Comment

        Working...
        X