Skip to content

Commit 6571f09

Browse files
Kiki-Y123ngayerie
andauthored
Update error-526.mdx (#23024)
* Update error-526.mdx added this part: If you are using self-signed SSL certificate at the origin server, use the following workaround to avoid an HTTP Error 526. Add your self-signed SSL certificate to the Custom Origin Trust Store. This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid. In your Worker's configuration, enable the cots_on_external_fetch compatibility flag. This flag enables the use of the Custom Origin Trust Store when making external (grey-clouded) subrequests from a Cloudflare Worker. * Update error-526.mdx * Update error-526.mdx --------- Co-authored-by: Nic <[email protected]>
1 parent 37fcd73 commit 6571f09

File tree

1 file changed

+30
-16
lines changed
  • src/content/docs/support/troubleshooting/http-status-codes/cloudflare-5xx-errors

1 file changed

+30
-16
lines changed

src/content/docs/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526.mdx

Lines changed: 30 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,27 @@ This error occurs when these two conditions are true:
1515
- Cloudflare cannot validate the SSL certificate at your origin web server.
1616
- [_Full SSL (Strict)_](/ssl/origin-configuration/ssl-modes/full-strict/) **SSL** is set in the **Overview** tab of your Cloudflare **SSL/TLS** app.
1717

18-
#### Error 526 in the Zero Trust context
18+
#### Resolution
19+
20+
Here are some options to fix or workaround this issue:
21+
22+
- For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
23+
24+
- Add your self-signed SSL certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/). This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid.
25+
26+
- Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
27+
- Certificate is not expired.
28+
- Certificate is not revoked.
29+
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
30+
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
31+
- Your origin web server accepts connections over port SSL port `443`.
32+
- [Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
33+
34+
![Screen showing an SSL certificate with no errors.](~/assets/images/support/hc-import-troubleshooting_5xx_errors_sslshopper_output.png)
35+
36+
37+
38+
### Error 526 in the Zero Trust context
1939

2040
When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Error `526` might be returned in the [following cases](/cloudflare-one/faq/troubleshooting/#i-see-error-526-when-browsing-to-a-website):
2141

@@ -33,27 +53,21 @@ When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Erro
3353
- Do not support [FIPS-compliant ciphers](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#cipher-suites) (if you have enabled [FIPS compliance mode](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#fips-compliance)). In order to load the page, you can either disable FIPS mode or create a Do Not Inspect policy for this host (which has the effect of disabling FIPS compliance for this origin).
3454
- Redirect all HTTPS requests to HTTP.
3555

36-
#### Error 526 in the Workers context
56+
57+
### Error 526 in the Workers context
3758

3859
Workers subrequests to any hostname outside your Cloudflare zone that is not proxied by Cloudflare are always made using the **[Full (strict)](/ssl/origin-configuration/ssl-modes/full-strict/)** SSL mode, regardless of the Workers zone configuration.
3960

40-
As a result, a valid SSL certificate is required at the origin server.
61+
#### Resolution
62+
63+
- Make sure the SSL certificate configured at the origin is valid.
64+
65+
- Add your self-signed SSL certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) and enable the [`cots_on_external_fetch` compatibility flag](/workers/configuration/compatibility-flags/#do-not-use-the-custom-origin-trust-store-for-external-subrequests) in your Worker's configuration.
66+
This flag enables the use of the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) when making external (grey-clouded) subrequests from a Cloudflare Worker.
67+
4168

42-
### Resolution
4369

44-
:::note
45-
For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
46-
:::
4770

48-
Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
4971

50-
- Certificate is not expired.
51-
- Certificate is not revoked.
52-
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
53-
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
54-
- Your origin web server accepts connections over port SSL port `443`.
55-
- [Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
5672

57-
![Screen showing an SSL certificate with no errors.](~/assets/images/support/hc-import-troubleshooting_5xx_errors_sslshopper_output.png)
5873

59-
If the origin server uses a self-signed certificate, configure the domain to use _Full_ _SSL_ instead of _Full SSL (Strict)_. Refer to [recommended SSL settings for your origin](/ssl/origin-configuration/ssl-modes).

0 commit comments

Comments
 (0)