When using Allow-Only Mode or restrictive Category Settings you often have to whitelist several domains to allow a site to load properly.
One specific problem is that Certificate Revocation Lists (CRLs) for HTTPS/SSL websites can be blocked, which in turn generates errors in some browsers. Sometimes blocking these CRLs also introduces latency whilst the browser tries to do its validation.
CRLs (Certificate Revocation Lists) and newer OCSP (Online Certificate Status Protocol) are used to ask a certificate authority whether an SSL certificate has been revoked for any reason. This typically happens transparently in the background when you are connecting to a HTTPS website.
The idea is that the browser will stop the user going to the website if the certificate has been revoked in the event that the certificate / CA is compromised. It's a good idea to allow access to CRLs.
In Allow-Only Mode most CRLs will be blocked unless you have specifically unblocked them. The impact of this depends on which web browser is being used...
- Internet Explorer 7 will show a pop-up warning with an error such as the one below.
Revocation information for the security certificate for this site is not available.
- Later versions of Internet Explorer do not present any error unless a specific registry key flag has been set.
- Google Chrome will show a warning next to the address bar. Clicking on the warning shows the following error:
Unable to check whether the certificate has been revoked
- Firefox does not present any error unless security.OCSP.require setting has been set in about:config
- Find the CRL for the certificate by viewing the certificate in your web browser (steps vary depending on browser).
- Use the 'Details' tab and look for the following information:
- CRL Distribution Points
- Authority Access Information
- Note down the URL information (example below) and whitelist these on your Umbrella dashboard: