After Google has updated Chrome, we now have problems accessing websites with SSL.
HTTPS Scanning is enabled on the Sophos UTM and the problem seems to be that Chrome no longer accepts an empty DNS name in the SSL certificate presented in the browser.
Does anyone have a solution to this?
I guess that the best solution would be for Sophos to change the way they generate the "Man in the middle" certificate so that the website URL is listed in the DNS (or SAN) in the certificate.
The new version of Chrome V58 will no longer accept certificates that do not have a subject alternate name. Chrome is following RFC 2818 for this change. Chrome V58 has now gone GA .
This could affect the Sophos Web appliance and Sophos UTM, which both use https scanning. The site generated certificate that we give back in these cases does not have a subject alternate name, meaning Chrome will reject the certificate and block the site
There are 3 options you may opt for.
Option 1: Disable HTTPS scanning untill the issue is fixed.
Option 2: Use another Web Browser .
Option 3 *preferred: setting this GPO to ENABLED https://www.chromium.org/administrators/policy-list-3#EnableCommonNameFallbackForLocalAnchors
Our Dev team are working on this issue should be resolved soon .
Aditya PatelGlobal Escalation Support Engineer | Sophos Technical SupportKnowledge Base | @SophosSupport | Sign up for SMS AlertsIf a post solves your question use the 'This helped me' link.
Thanks Aditya for your post. Just to confirm that according to https://textslashplain.com/2017/03/10/chrome-deprecates-subject-cn-matching/ the EnableCommonNameFallbackForLocalAnchors setting will stop working in a later version of Chrome (quite a few months away, but still).
Hoping for a quick resolution for this from Sophos so that this isn't necessary any more.