Skip to content

Commit 59727d9

Browse files
authored
Update error-526.mdx
1 parent 74cd3d5 commit 59727d9

File tree

1 file changed

+27
-19
lines changed
  • src/content/docs/support/troubleshooting/http-status-codes/cloudflare-5xx-errors

1 file changed

+27
-19
lines changed

src/content/docs/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526.mdx

Lines changed: 27 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,27 @@ This error occurs when these two conditions are true:
1515
- Cloudflare cannot validate the SSL certificate at your origin web server.
1616
- [_Full SSL (Strict)_](/ssl/origin-configuration/ssl-modes/full-strict/) **SSL** is set in the **Overview** tab of your Cloudflare **SSL/TLS** app.
1717

18-
#### Error 526 in the Zero Trust context
18+
#### Resolution
19+
20+
Here are some options to fix or workaround this issue:
21+
22+
- For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
23+
24+
- Add your self-signed SSL certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/). This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid.
25+
26+
- Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
27+
- Certificate is not expired.
28+
- Certificate is not revoked.
29+
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
30+
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
31+
- Your origin web server accepts connections over port SSL port `443`.
32+
- [Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
33+
34+
![Screen showing an SSL certificate with no errors.](~/assets/images/support/hc-import-troubleshooting_5xx_errors_sslshopper_output.png)
35+
36+
37+
38+
### Error 526 in the Zero Trust context
1939

2040
When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Error `526` might be returned in the [following cases](/cloudflare-one/faq/troubleshooting/#i-see-error-526-when-browsing-to-a-website):
2141

@@ -33,33 +53,21 @@ When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Erro
3353
- Do not support [FIPS-compliant ciphers](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#cipher-suites) (if you have enabled [FIPS compliance mode](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#fips-compliance)). In order to load the page, you can either disable FIPS mode or create a Do Not Inspect policy for this host (which has the effect of disabling FIPS compliance for this origin).
3454
- Redirect all HTTPS requests to HTTP.
3555

36-
#### Error 526 in the Workers context
56+
57+
### Error 526 in the Workers context
3758

3859
Workers subrequests to any hostname outside your Cloudflare zone that is not proxied by Cloudflare are always made using the **[Full (strict)](/ssl/origin-configuration/ssl-modes/full-strict/)** SSL mode, regardless of the Workers zone configuration.
3960

40-
As a result, a valid SSL certificate is required at the origin server.
61+
#### Resolution
4162

42-
If you are using self-signed SSL certificate at the origin server, use the following workaround to avoid an HTTP Error `526`.
63+
- Make sure the SSL certificate configured at the origin is valid.
4364

44-
1. Add your self-signed SSL certificate to the **[`Custom Origin Trust Store`](/ssl/origin-configuration/custom-origin-trust-store/)**. This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid.
45-
2. In your Worker's configuration, enable the **[`cots_on_external_fetch` compatibility flag](/workers/configuration/compatibility-flags/#do-not-use-the-custom-origin-trust-store-for-external-subrequests)**. This flag enables the use of the **[`Custom Origin Trust Store`](/ssl/origin-configuration/custom-origin-trust-store/)** when making external (grey-clouded) subrequests from a Cloudflare Worker.
65+
- Add you self-signed certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) and enable the [`cots_on_external_fetch` compatibility flag](/workers/configuration/compatibility-flags/#do-not-use-the-custom-origin-trust-store-for-external-subrequests) in your Worker's configuration.
66+
This flag enables the use of the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) when making external (grey-clouded) subrequests from a Cloudflare Worker.
4667

4768

48-
### Resolution
4969

50-
:::note
51-
For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
52-
:::
5370

54-
Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
5571

56-
- Certificate is not expired.
57-
- Certificate is not revoked.
58-
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
59-
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
60-
- Your origin web server accepts connections over port SSL port `443`.
61-
- [Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
6272

63-
![Screen showing an SSL certificate with no errors.](~/assets/images/support/hc-import-troubleshooting_5xx_errors_sslshopper_output.png)
6473

65-
If the origin server uses a self-signed certificate, configure the domain to use _Full_ _SSL_ instead of _Full SSL (Strict)_. Refer to [recommended SSL settings for your origin](/ssl/origin-configuration/ssl-modes).

0 commit comments

Comments
 (0)