Hi,
I am seeing these errors in the log for some websites which tend to utilise tracking information, particularly those which utilise a CNAME record to point to another address.
For example, the website t.myrenews.com.au is a CNAME that resolves to spgo.io, which has a valid certificate for this address.
Testing this on the console of the XG using openssl seems to happily resolve the CNAME, and accept the certificate, indicating no issue with the CA roots etc:
subject=CN = spgo.io
issuer=C = US, O = Amazon, OU = Server CA 1B, CN = Amazon
---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 5515 bytes and written 445 bytes
Verification: OK
However, this is not the case when this website is loaded via another website - it appears that the sophos tries to perform the SSL/TLS validation on the CNAME itself, which fails, rather than the destination, which has the correct certificate:
Is this to be expected, and the only recourse is to exclude these addresses from SSL/TLS decryption as they arise? Should the Sophos appliance not be resolving the CNAME to the correct address before performing the TLS inspection, or is this happening on the browser side beyond our control?
Thanks
This thread was automatically locked due to age.