NL Dutch
FR French
IT Italian
JP Japanese
DE German
US English (US)
ES Spanish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
NL Dutch
FR French
IT Italian
JP Japanese
DE German
US English (US)
ES Spanish
  • Home
  • CyberFOX DNS Filtering
  • Troubleshooting

Why Block Pages Do Not Appear on Some Websites (HTTPS / HSTS)

Why users may see certificate warnings instead of a block page and how modern browser security impacts DNS filtering behavior

Written by Owen Parry

Updated at May 15th, 2026

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Administrating Password Boss Legacy Password Boss
  • CyberFOX DNS Filtering
    Getting Started Filtering Policies Company and Location Setup Roaming Clients Reporting and Logging Troubleshooting
  • Marketing Toolkit
    MSP Marketing & Education Toolkit CyberFOX Brand Guidelines
  • Changelogs for Autoelevate and Password Boss
  • CyberFOX Product Roadmap
  • Current Status
+ More

Table of Contents

Overview Important What the Feature Is DNS Filtering Block Page Functionality How Block Pages Are Delivered HTTPS / HSTS Behavior Impact What is HTTPS and HSTS Why Block Pages Fail for HSTS Sites Technical Insight: Expected User Experience Platform-Specific Behavior DNS Filtering Architecture Browser Behavior (All Platforms) Important Platform Notes Advanced Use Cases Architecture Limitation Security-First Environments DNS Filtering Without SSL Inspection When Block Pages Fully Work Best Practices Set Clear Expectations Focus on Logging and Reporting Operational Readiness Troubleshooting Step 1: Identify the Protocol Step 2: Confirm Filtering Behavior Step 3: Analyze the Error Expected Behavior Check Step 4: Clear Cached Data Note on Browser Caching: Step 5: Validate Service Health Step 6: Test Across Conditions Security & Sync Behavior Security Model Why Browsers Block the Page Caching and Persistence Related Articles

Overview


DNS Filtering block pages provide a user-facing notification when access to a domain is restricted. However, modern web security standards—specifically HTTPS and HSTS (HTTP Strict Transport Security)—can prevent block pages from displaying as expected.

When this occurs, users may see browser security warnings instead of a block page. This behavior is not a failure of DNS Filtering, but an expected outcome of how browsers enforce secure connections. Understanding this interaction is critical for troubleshooting, user education, and setting accurate expectations.

Important

If a blocked site uses HTTPS with HSTS, a block page may not appear.

This does not mean DNS Filtering failed — the connection is still blocked, but the browser replaces the experience with a security warning.

 

 

What the Feature Is


DNS Filtering Block Page Functionality

DNS Filtering enforces policies by returning a controlled response for blocked domains. Instead of resolving to the intended destination, the request is redirected to a block page that:

  • Explains why access is blocked
  • Provides visibility into filtering decisions
  • Supports reporting and audit requirements

How Block Pages Are Delivered

The block page relies on a redirect-based approach:

  • DNS response points the domain to a block page service
  • The browser is redirected to a different endpoint
  • The block page server presents its own SSL certificate

This works reliably for HTTP traffic, but introduces limitations when HTTPS is enforced.

 

HTTPS / HSTS Behavior Impact


What is HTTPS and HSTS

The following video explains how HSTS works at the browser level and why security warnings cannot be bypassed.

  • HTTPS ensures encrypted communication between the browser and the destination
  • HSTS forces browsers to:
    • Only use HTTPS
    • Reject invalid certificates
    • Prevent users from bypassing security warnings

Once a domain is under HSTS enforcement, the browser requires a strict certificate match.

Why Block Pages Fail for HSTS Sites

Technical Insight:

Browsers validate that the certificate presented matches the exact domain being requested.
When DNS Filtering redirects to a block page, the certificate does not match the original site — triggering a security warning.

 

Block pages depend on redirecting users to a different domain. This creates a conflict:

  • The browser expects the original site's certificate
  • The block page presents a different certificate
  • HSTS blocks the connection due to mismatch

From the browser’s perspective, this resembles a man-in-the-middle scenario, which it is specifically designed to prevent.

Expected User Experience

When visiting blocked HTTPS or HSTS-enabled sites, users may see:

  • “Connection is not private”
  • Certificate validation errors
  • Security warnings with no bypass option

This is expected behavior and indicates that the block is working, even if the visual experience differs.

 

Platform-Specific Behavior


DNS Filtering Architecture

  • DNS resolver and block page services operate independently
  • DNS enforces the block
  • Block page attempts to provide user feedback

Browser Behavior (All Platforms)

All modern browsers enforce HTTPS and HSTS consistently:

  • Chrome, Edge, Firefox, Safari
  • Windows, macOS, iOS, Android

Key behaviors include:

  • Rejecting certificate mismatches
  • Preventing bypass of security warnings
  • Caching HSTS policies per domain

Important Platform Notes

  • Mobile devices often enforce stricter certificate handling
  • Cached HSTS policies persist across sessions
  • Private browsing may still honor HSTS rules

 

Advanced Use Cases


Architecture Limitation

DNS-based filtering operates without decrypting HTTPS traffic.
Because encrypted connections cannot be modified safely, block page redirects may not be deliverable for secure (HSTS) sites.

 

Security-First Environments

In compliance-driven environments (CMMC, SOC2, etc.):

  • HSTS enforcement is intentional and desirable
  • Browser blocking is a sign of correct security posture
  • The absence of a block page does not indicate failure

DNS Filtering Without SSL Inspection

DNS Filtering operates without decrypting HTTPS traffic:

  • Does not intercept or inspect encrypted content
  • Does not replace certificates
  • Relies on DNS-layer enforcement only

This avoids:

  • Privacy concerns
  • Certificate deployment complexity
  • Performance overhead

When Block Pages Fully Work

Block pages display reliably when:

  • The site uses HTTP
  • HTTPS is used but not strictly enforced
  • The browser allows certificate substitution (non-HSTS)

 

Best Practices


Set Clear Expectations

  • Inform users that block pages may not appear for all websites
  • Document this behavior in onboarding and training materials
  • Provide examples of expected browser warnings

Focus on Logging and Reporting

  • Use DNS Filtering logs to confirm enforcement
  • Do not rely solely on visual confirmation
  • Train support teams to validate blocks via reporting tools

Operational Readiness

  • Prepare support teams to recognize HSTS-related behavior
  • Include KB references in onboarding and welcome emails
  • Avoid unnecessary escalation for expected browser warnings

 

Troubleshooting


Step 1: Identify the Protocol

  • Determine if the domain uses HTTP or HTTPS
  • Check if HSTS is enforced (developer tools or headers)

Step 2: Confirm Filtering Behavior

  • Verify the domain is categorized and blocked
  • Check DNS logs for enforcement confirmation

Step 3: Analyze the Error

  • Certificate warning → Expected HSTS behavior
  • 502 error → Resolver-related issue
  • 504 error → Block page service issue

Expected Behavior Check

If you see a certificate warning on a blocked HTTPS site:

  • The domain is still blocked
  • DNS Filtering is working as intended
  • The browser is enforcing security protections
 

Step 4: Clear Cached Data

  • Clear browser cache
  • Clear HSTS cache (browser-specific steps)

Note on Browser Caching:

HSTS policies are stored locally by the browser. Even after changing DNS or policies, behavior may persist until the cache is cleared.

 

Step 5: Validate Service Health

  • Confirm resolver is operational
  • Confirm block page service is reachable

Step 6: Test Across Conditions

  • Different browser
  • Different device
  • HTTP vs HTTPS version of the site

 

Security & Sync Behavior


Security Model

DNS Filtering operates as a non-intercepting security control:

  • Does not decrypt HTTPS traffic
  • Does not impersonate destination certificates
  • Does not introduce MITM behavior

This aligns with modern security principles and avoids weakening encryption protections.

Why Browsers Block the Page

Browsers enforce strict rules to:

  • Prevent interception of encrypted traffic
  • Block invalid or mismatched certificates
  • Protect users from credential theft and spoofing

Because block pages rely on redirection, they can conflict with these protections.

Caching and Persistence

  • HSTS policies are cached per domain
  • Changes to filtering may not reflect immediately
  • Cache clearing may be required during testing

 

Related Articles


  • DNS Filtering Overview: https://support.cyberfox.com/en_US/dns
  • DNS Filtering Policy Configuration: https://support.cyberfox.com/en_US/dns-policy
  • DNS Filtering Troubleshooting: https://support.cyberfox.com/en_US/dns-troubleshooting
  • DNS Filtering Block Page Customization: https://support.cyberfox.com/en_US/dns-blockpage
blockade security dns filtering block page hsts https enforcement certificate warning connection not private dns security web filtering browser security ssl certificate mismatch dns resolver block page redirect cybersecurity filtering dns policies secure browsing endpoint filtering dns logs network security content filtering gateway timeout 502 error 504 error browser cache hsts cache ssl validation

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Understanding DNS over HTTPS (DoH)
  • Firewall Whitelisting (PasswordBoss)
  • Disabling Password Boss on Websites
Request a Demo
  • Get Pricing
  • Start Trial
  • Contact
  • Support Center
  • Login
Solutions
AutoElevate
  • AutoElevate Overview
  • Remove Admin Privilege
  • Just-in-Time Admin
  • Blocker
Password Manager
  • Password Manager Overview
  • Features
DNS Filtering
  • DNS Filtering Overview
MSPs
IT Departments
  • Overview
  • State and Local Government
  • K-12 Education
  • Manufacturing
  • Higher Education
Resources
  • Resource Center
  • Group Demos
  • Events
  • The Simple 7™
Company
  • About
  • Leadership
  • Culture & Values
  • News & Press
  • Awards
  • Partnerships
  • Referral Program
  • Trust Center
CyberFox Logo

CALL US (813) 578-8200

© 2025 CYBERFOX LLC ALL RIGHTS RESERVED | Privacy Policy | Terms of Service | Sitemap


Knowledge Base Software powered by Helpjuice

Expand