New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 628695 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Jan 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug-Security


Show other hotlists

Hotlists containing this issue:
EnamelAndFriendsFixIt


Sign in to add a comment

importing self-signed cert imports as CA cert, should import as server cert

Reported by mi...@mikelward.com, Jul 15 2016

Issue description

UserAgent: Mozilla/5.0 (X11; CrOS x86_64 8350.55.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.75 Safari/537.36
Platform: 8350.55.0 (Official Build) beta-channel tricky

Steps to reproduce the problem:
1. Go to an ASUS router's web interface that uses a self-signed certificate (e.g. https://192.168.1.1:443)
2. Click on the broken padlock icon in the address bar
3. Click "Details" next to "Your connection to this site is not private"
4. View Certificate
5. Details tab
6. Export...
7. Save it
8. chrome://settings
9. Manage certificates
10. Servers tab
11. Import...
12. Choose the cert exported in step 7

What is the expected behavior?
The certificate appears in the Servers tab, and can only be used to validate the identity of 192.168.1.1.

What went wrong?
The certificate appears in the Authorities tab, suggesting it could be used to sign other certificates.

Did this work before? N/A 

Chrome version: 52.0.2743.75  Channel: beta
OS Version: 8350.55.0
Flash Version: Shockwave Flash 22.0 r0
 

Comment 1 by ta...@google.com, Jul 18 2016

Cc: palmer@chromium.org f...@chromium.org
Components: Security>UX Internals>Network>SSL
Labels: Security_Impact-Stable Security_Severity-Low Needs-Feedback
Could you provide a screenshot on how it suggests that the certificate could be used to sign other certificates?

palmer@ or felt@, could you take a look? Thanks

Comment 2 by f...@chromium.org, Jul 19 2016

Cc: emilyschechter@chromium.org
emilyschechter@, do you happen to know who owns CrOS-specific settings? if not, I can go digging. thanks!

Comment 3 by mi...@mikelward.com, Jul 19 2016

The fact it's even in "Certificate Authorities" hints it could be used to sign other certificates.  I want it to be very clear that it's only intended to verify the intended server/subject.
Screenshot 2016-07-18 at 18.56.24.png
73.8 KB View Download
Project Member

Comment 4 by sheriffbot@chromium.org, Jul 19 2016

Labels: -Needs-Feedback Needs-Review
Owner: ta...@google.com
Thank you for providing more feedback. Adding requester "tanin@google.com" for another review and adding "Needs-Review" label for tracking.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Cc: tbuck...@chromium.org
re: #2, Yes +tbuckley owns CrOS settings.

Comment 6 by palmer@chromium.org, Jul 19 2016

Cc: -palmer@chromium.org rsleevi@chromium.org
This is a duplicate of a very old bug; IIRC it's an underlying problem in NSS? +rsleevi who will know.
If it is a duplicate, I'm having trouble finding it, but it's certainly a known issue.

We (for values of both Chrome and NSS) don't support trusting a CA certificate for a single host. If you import a CA certificate into NSS, it's treated as a CA certificate.

So this is WontFix/WAI.

Comment 8 by f...@chromium.org, Jul 19 2016

rsleevi, what is the "Servers" tab for? is that for putting client certs?
Certificates without CA=true - that is, certificates that are not CA certificates.

The reason for the UI is that the UI leads repeatedly expressed a desire that, if we offer any UI at all (and we didn't for a number of releases), that it matches Firefox's PSM UI (the closest NSS has to UI). Officially, NSS is only managed via the command-line, but we needed something for CrOS.

PSM's docs are at http://www-archive.mozilla.org/projects/security/pki/psm/ , but in terms of what NSS supports, the better(ish?) documentation is for certutil, NSS's "official" way of managing the DB. That's https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/tools/NSS_Tools_certutil

The "servers" tab corresponds to the "P" option (trusted peer), while the "Authorities" tab corresponds to either the c or C flag (it's more complicated by the fact that the value of 'p' changed between NSS releases).

If you view the details on the certificate, you can see we expose the other trust flags (email & object signing), even though they have no relevance on ChromeOS, because we wrote this UI for the Linux port, and for Linux, where the NSS DB is shared, those UI settings make sense for the library, even though they don't make sense for Chrome.
Project Member

Comment 10 by sheriffbot@chromium.org, Jul 20 2016

Status: Assigned (was: Unconfirmed)

Comment 11 by ta...@google.com, Sep 8 2016

Owner: ----
Components: -Security>UX Internals>Network>Certificate
Labels: Team-Security-UX
Labels: Hotlist-EnamelAndFriendsFixIt
rsleevi@, do you still support WintFix/WAI on this bug? Nothing has happened since 2016, I favor being realistic if this isn't going to be fixed.
Status: WontFix (was: Assigned)
I do support WontFix'ing - although I would love lots of UI love and partnership on how we manage certificates, I also know no one from UI has wanted to touch it since 2011 :)
Project Member

Comment 16 by sheriffbot@chromium.org, May 9 2018

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment