New issue
Advanced search Search tips

Issue 613855 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 612035
Owner: ----
Closed: May 2016
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 2
Type: Bug



Sign in to add a comment

List of Ciphers not visible to the user

Reported by ikrabbe....@gmail.com, May 22 2016

Issue description

UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.37 Safari/537.36

Example URL:
https://coop.ikrabbe-ask.de/

Steps to reproduce the problem:
1. Browse to a URL that supports only a limited set of ciphers (for example AES256-SHA256).
2. see ERR_CONNECTION_RESET
3. miss any information

What is the expected behavior?
it is ok for a client application to support only a limited subset of ciphers, but in the chaos of cipher names and possible key exchange, algorithm and hash combinations the user of the client software should be able to

1. See what exactly went wrong: The ERR_CONNECTION_RESET is just a common fallback for the "any error". Why the connection was reset? - Answer: The supported client side cipher list did not match with the list of ciphers the service porvides.

2. There should be an obvious way to get a list of supported cipher names. It should be quite simple to post this list on chrome://version AND `google-chrome --version`.

What went wrong?
The design of the client fails to report essential parameters how the client was built. Main builtin features are not visible to the user or at least the path to get this information is not obvious enough.

Did this work before? N/A 

Chrome version: 50.0.2661.37  Channel: n/a
OS Version: 
Flash Version: Shockwave Flash 21.0 r0
 
https://bugs.chromium.org/p/chromium/issues/detail?id=612035

Sorry I found this bug report just after reporting my own issue. The topic is essentially the same.

Not being able to see the list of supported cipher suites is NOT ACCEPTABLE these days!

BTW.: I will fix my coop.ikrabbe-ask.de site now, to support something that works with my chrome version (by trial and error, because I don't have any other information). There are not many things I hate more than trial-and-error administration!

Seems my chrome version does not support AES256. Using AES128 helps.

Mergedinto: 612035
Status: Duplicate (was: Unconfirmed)
Also maybe not what you want, but you could always use Wireshark to see cipher suites in the CHLO of the TLS handshake.

Sign in to add a comment