Issue metadata
Sign in to add a comment
|
importing self-signed cert imports as CA cert, should import as server cert
Reported by
mi...@mikelward.com,
Jul 15 2016
|
||||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; CrOS x86_64 8350.55.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.75 Safari/537.36 Platform: 8350.55.0 (Official Build) beta-channel tricky Steps to reproduce the problem: 1. Go to an ASUS router's web interface that uses a self-signed certificate (e.g. https://192.168.1.1:443) 2. Click on the broken padlock icon in the address bar 3. Click "Details" next to "Your connection to this site is not private" 4. View Certificate 5. Details tab 6. Export... 7. Save it 8. chrome://settings 9. Manage certificates 10. Servers tab 11. Import... 12. Choose the cert exported in step 7 What is the expected behavior? The certificate appears in the Servers tab, and can only be used to validate the identity of 192.168.1.1. What went wrong? The certificate appears in the Authorities tab, suggesting it could be used to sign other certificates. Did this work before? N/A Chrome version: 52.0.2743.75 Channel: beta OS Version: 8350.55.0 Flash Version: Shockwave Flash 22.0 r0
,
Jul 19 2016
emilyschechter@, do you happen to know who owns CrOS-specific settings? if not, I can go digging. thanks!
,
Jul 19 2016
The fact it's even in "Certificate Authorities" hints it could be used to sign other certificates. I want it to be very clear that it's only intended to verify the intended server/subject.
,
Jul 19 2016
Thank you for providing more feedback. Adding requester "tanin@google.com" for another review and adding "Needs-Review" label for tracking. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jul 19 2016
re: #2, Yes +tbuckley owns CrOS settings.
,
Jul 19 2016
This is a duplicate of a very old bug; IIRC it's an underlying problem in NSS? +rsleevi who will know.
,
Jul 19 2016
If it is a duplicate, I'm having trouble finding it, but it's certainly a known issue. We (for values of both Chrome and NSS) don't support trusting a CA certificate for a single host. If you import a CA certificate into NSS, it's treated as a CA certificate. So this is WontFix/WAI.
,
Jul 19 2016
rsleevi, what is the "Servers" tab for? is that for putting client certs?
,
Jul 19 2016
Certificates without CA=true - that is, certificates that are not CA certificates. The reason for the UI is that the UI leads repeatedly expressed a desire that, if we offer any UI at all (and we didn't for a number of releases), that it matches Firefox's PSM UI (the closest NSS has to UI). Officially, NSS is only managed via the command-line, but we needed something for CrOS. PSM's docs are at http://www-archive.mozilla.org/projects/security/pki/psm/ , but in terms of what NSS supports, the better(ish?) documentation is for certutil, NSS's "official" way of managing the DB. That's https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/tools/NSS_Tools_certutil The "servers" tab corresponds to the "P" option (trusted peer), while the "Authorities" tab corresponds to either the c or C flag (it's more complicated by the fact that the value of 'p' changed between NSS releases). If you view the details on the certificate, you can see we expose the other trust flags (email & object signing), even though they have no relevance on ChromeOS, because we wrote this UI for the Linux port, and for Linux, where the NSS DB is shared, those UI settings make sense for the library, even though they don't make sense for Chrome.
,
Jul 20 2016
,
Sep 8 2016
,
Nov 22 2016
,
Nov 10 2017
,
Jan 30 2018
rsleevi@, do you still support WintFix/WAI on this bug? Nothing has happened since 2016, I favor being realistic if this isn't going to be fixed.
,
Jan 30 2018
I do support WontFix'ing - although I would love lots of UI love and partnership on how we manage certificates, I also know no one from UI has wanted to touch it since 2011 :)
,
May 9 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ta...@google.com
, Jul 18 2016Components: Security>UX Internals>Network>SSL
Labels: Security_Impact-Stable Security_Severity-Low Needs-Feedback