New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 603609 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 598752
Owner:
Last visit 16 days ago
Closed: Apr 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 1
Type: Bug-Security



Sign in to add a comment

Security: kCanarySRTDownloadURL and kMainSRTDownloadURL are should be HTTPS

Reported by jackwill...@gmail.com, Apr 14 2016

Issue description

kCanarySRTDownloadURL and kMainSRTDownloadURL are should be HTTPS 

// The download links of the Software Removal Tool.
const char kMainSRTDownloadURL[] =
    "http://dl.google.com/dl"
    "/softwareremovaltool/win/chrome_cleanup_tool.exe?chrome-prompt=1";
const char kCanarySRTDownloadURL[] =
    "http://dl.google.com/dl"
    "/softwareremovaltool/win/c/chrome_cleanup_tool.exe?chrome-prompt=1";

from:
https://code.google.com/p/chromium/codesearch#chromium/src/chrome/browser/safe_browsing/srt_field_trial_win.cc
 

Comment 1 by tsepez@chromium.org, Apr 14 2016

Owner: palmer@chromium.org
Status: Assigned (was: Unconfirmed)
Depends if there is a subsequent signature check of a signature loaded over https.  Maybe chris knows?

Comment 2 by palmer@chromium.org, Apr 14 2016

Cc: wfh@chromium.org jsc...@chromium.org egm@chromium.org odean@chromium.org
Components: UI>Browser>Preferences>Protector
Labels: OS-Windows
Owner: ----
Status: Untriaged (was: Assigned)
This may be on purpose — it may be that the EXEs are signed with Authenticode, and that we most care about availability of the SRT moreso than confidentiality in downloading it. (Since authentication would be covered by the Authenticode signature, at least in principle.)

+ Protector folks and Windows folks

Comment 3 by tsepez@chromium.org, Apr 18 2016

Owner: odean@chromium.org
Status: Assigned (was: Untriaged)

Comment 4 by wfh@chromium.org, Apr 18 2016

Labels: Pri-1
Owner: mad@chromium.org
Windows doesn't by default do Authenticode checks on binaries, it will only do them if the file has the "mark of the web" and is launched from the shell, or enterprise group policy is enforcing authenticode.

I couldn't find any integrity checks in the SRT fetcher code. mad@ can you confirm behavior here?


Labels: Security_Severity-Medium Security_Impact-Stable
Setting severity and impact as though this is an unintended issue.
Labels: M-50
Can you please Cc Khalil Zhani "chromium.khalil@gmail.com" he is my partner in this bug.

Comment 8 by tsepez@chromium.org, Apr 19 2016

Cc: chromium...@gmail.com

Comment 9 by mad@chromium.org, Apr 20 2016

I was under the impression that dl.google.com would always fallback to https, but I could write a quick patch to use https directly and avoid the confusion.

mad@ - Unfortunately, that presumes that the client will ever actually be able to connect to dl.google.com. The problem here is that a MitM will prevent that from happening, and instead just return a malware binary without the user ever knowing the difference.

Comment 11 by mad@chromium.org, Apr 20 2016

Mergedinto: 598752
Status: Duplicate (was: Assigned)

Comment 12 by mad@chromium.org, Apr 21 2016

I thought the fact that dl.google.com is on the HSTS preload list would make this always be HTTPS from the start, no?
Labels: -Security_Severity-Medium Security_Severity-Low
Apparently it is, which is great (and justifies lowering the severity):
https://code.google.com/p/chromium/codesearch#chromium/src/net/http/transport_security_state_static.json&l=263

However, the MitM can still block the connection, in which case the user might try to download via another browser (where our hard-coded HSTS list is not present). And in that case, the initial connection would be over a vulnerable transport, which the MitM could exploit to serve a malware payload.

To the larger point, HSTS is intended as a safety net, and not as a substitute for using HTTPS URLs. So, best practice is to use HTTPS everywhere as the default.

Comment 14 by mad@chromium.org, Apr 21 2016

OK, good point. The fix has landed yesterday, so could be merged up tomorrow.

Comment 15 by mad@chromium.org, Apr 26 2016

So is this worth merging to stable branch? 
A merge has been done to beta branch yesterday...

Project Member

Comment 16 by sheriffbot@chromium.org, Jul 28 2016

Labels: -Restrict-View-SecurityTeam
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 17 by sheriffbot@chromium.org, Oct 1 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: allpublic

Sign in to add a comment