You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Update error-526.mdx
added this part:
If you are using self-signed SSL certificate at the origin server, use the following workaround to avoid an HTTP Error 526.
Add your self-signed SSL certificate to the Custom Origin Trust Store. This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid.
In your Worker's configuration, enable the cots_on_external_fetch compatibility flag. This flag enables the use of the Custom Origin Trust Store when making external (grey-clouded) subrequests from a Cloudflare Worker.
* Update error-526.mdx
* Update error-526.mdx
---------
Co-authored-by: Nic <[email protected]>
Copy file name to clipboardExpand all lines: src/content/docs/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526.mdx
+30-16Lines changed: 30 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,27 @@ This error occurs when these two conditions are true:
15
15
- Cloudflare cannot validate the SSL certificate at your origin web server.
16
16
-[_Full SSL (Strict)_](/ssl/origin-configuration/ssl-modes/full-strict/)**SSL** is set in the **Overview** tab of your Cloudflare **SSL/TLS** app.
17
17
18
-
#### Error 526 in the Zero Trust context
18
+
#### Resolution
19
+
20
+
Here are some options to fix or workaround this issue:
21
+
22
+
- For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
23
+
24
+
- Add your self-signed SSL certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/). This allows the Cloudflare edge to recognize your self-signed SSL certificate as valid.
25
+
26
+
- Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
27
+
- Certificate is not expired.
28
+
- Certificate is not revoked.
29
+
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
30
+
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
31
+
- Your origin web server accepts connections over port SSL port `443`.
32
+
-[Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
33
+
34
+

35
+
36
+
37
+
38
+
### Error 526 in the Zero Trust context
19
39
20
40
When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Error `526` might be returned in the [following cases](/cloudflare-one/faq/troubleshooting/#i-see-error-526-when-browsing-to-a-website):
21
41
@@ -33,27 +53,21 @@ When using [Cloudflare Gateway](/cloudflare-one/policies/gateway/), an HTTP Erro
33
53
- Do not support [FIPS-compliant ciphers](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#cipher-suites) (if you have enabled [FIPS compliance mode](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#fips-compliance)). In order to load the page, you can either disable FIPS mode or create a Do Not Inspect policy for this host (which has the effect of disabling FIPS compliance for this origin).
34
54
- Redirect all HTTPS requests to HTTP.
35
55
36
-
#### Error 526 in the Workers context
56
+
57
+
### Error 526 in the Workers context
37
58
38
59
Workers subrequests to any hostname outside your Cloudflare zone that is not proxied by Cloudflare are always made using the **[Full (strict)](/ssl/origin-configuration/ssl-modes/full-strict/)** SSL mode, regardless of the Workers zone configuration.
39
60
40
-
As a result, a valid SSL certificate is required at the origin server.
61
+
#### Resolution
62
+
63
+
- Make sure the SSL certificate configured at the origin is valid.
64
+
65
+
- Add your self-signed SSL certificate to the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) and enable the [`cots_on_external_fetch` compatibility flag](/workers/configuration/compatibility-flags/#do-not-use-the-custom-origin-trust-store-for-external-subrequests) in your Worker's configuration.
66
+
This flag enables the use of the [Custom Origin Trust Store](/ssl/origin-configuration/custom-origin-trust-store/) when making external (grey-clouded) subrequests from a Cloudflare Worker.
67
+
41
68
42
-
### Resolution
43
69
44
-
:::note
45
-
For a potential quick fix, set **SSL** to _Full_ instead of _Full (strict)_ in the **Overview** tab of your Cloudflare **SSL/TLS** app for the domain.
46
-
:::
47
70
48
-
Request your server administrator or hosting provider to review the origin web server's SSL certificates and verify that:
49
71
50
-
- Certificate is not expired.
51
-
- Certificate is not revoked.
52
-
- Certificate is signed by a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not self-signed).
53
-
- The requested or target domain name and hostname are in the certificate's **Common Name** or **Subject Alternative Name**.
54
-
- Your origin web server accepts connections over port SSL port `443`.
55
-
-[Temporarily pause Cloudflare](/fundamentals/manage-domains/pause-cloudflare/) and visit [https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com](https://www.sslshopper.com/ssl-checker.html#hostname=www.example.com) (replace `www.example.com` with your hostname and domain) to verify no issues exists with the origin SSL certificate:
56
72
57
-

58
73
59
-
If the origin server uses a self-signed certificate, configure the domain to use _Full__SSL_ instead of _Full SSL (Strict)_. Refer to [recommended SSL settings for your origin](/ssl/origin-configuration/ssl-modes).
0 commit comments