New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 694345 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Feb 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Mac
Pri: 3
Type: Bug-Regression
Team-Security-UX



Sign in to add a comment

Can't permanently trust self-signed certificate with Chrome 56.0.2924.87 on macOS 10.12.3

Reported by grisch...@gmail.com, Feb 20 2017

Issue description

UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Example URL:
https://selfsigned.stereo.lu

Steps to reproduce the problem:
1. Open https://selfsigned.stereo.lu in Safari.
2. When prompted, accept the https certificate and change the settings to always trust this certificate - see screenshot. This adds the certificate in the OS keychain.
3. Open https://selfsigned.stereo.lu in Chrome.

What is the expected behavior?
Chrome displays test page, or at least lets me permanently store exception

What went wrong?
ERR_CERT_AUTHORITY_INVALID error.  I can choose 'proceed', but then I have to override this again manually every time I start Chrome, which gets tedious.

Did this work before? Yes 54 I think

Chrome version: 56.0.2924.87  Channel: stable
OS Version: OS X 10.12.3
Flash Version: Shockwave Flash 24.0 r0

Other browsers tested:
  Safari 10.0.3: OK, exception stored permanently
  Firefox 52.x: OK, exception can be stored permanently

My actual usage is an editor app running an API on localhost servers. Users can click 'edit' in their browser to load the object they're viewing in the editor. The browser opens https://127.0.0.1:8112/load and so on using XHR in the background. To do this from a https page, the API needs to be available over https.

If this can't be fixed, can you please explain how we should permanently trust certificates for https listeners running on localhost on many user computers?

 
Screen Shot 2017-02-20 at 23.42.26.png
245 KB View Download

Comment 1 by ajha@chromium.org, Feb 21 2017

Components: Internals>Network>Certificate
Labels: -Type-Bug Needs-Bisect Needs-Triage-M56 Type-Bug-Regression

Comment 2 by hdodda@chromium.org, Feb 21 2017

Cc: hdodda@chromium.org
Labels: Needs-Feedback
Tested on Mac OS 10.12.2 using chrome M56 #56.0.2924.87 and M54 #54.0.2820.0 and observed as attached in screenshot and screencast.

@grischard-- Could you please check the attached screencast and confirm us if this is the expected behavior ,please help us by providing the expected behavior of chrome and steps.

Thanks!
694345_stable behavior.png
202 KB View Download
694345.mp4
660 KB View Download

Comment 3 by grisch...@gmail.com, Feb 21 2017

Hello @hdodda,

Thanks for your reply. I can choose 'proceed' in 56 too, but have to do this again manually every time I start Chrome, which gets tedious.

So the way to reproduce is:

- Hit Proceed like you did in the screencast
- Quit and relaunch Chrome
- Reopen selfsigned.stereo.lu

Expected behaviour:

Chrome remembers that I want to proceed to selfsigned.stereo.lu

Actual behaviour:

Chrome asks me again
Cc: est...@chromium.org
Components: UI>Browser>Interstitials
cc'ing estark, who may own the "Cert Error Memory" stuff.

Comment 5 by est...@chromium.org, Feb 21 2017

OP: I can't proceed through the warning for https://selfsigned.stereo.lu in Chrome 56 because it is using HSTS, which disables cert error clickthroughs for the site.

Is that what you're seeing? It's not clear to me if the issue is that 1.) you can't click through the error in Chrome, 2.) there is still an error in Chrome after clicking through the error in Safari, or 3.) after clicking through the error in Chrome, you have to click through again after restarting Chrome.

I've verified on https://self-signed.badssl.com that clicking through the error is remembered across restarts as intended -- do you see that as well?

Comment 6 by grisch...@gmail.com, Feb 21 2017

Thank you @estark, I hadn't thought of HSTS. It's weird, I'm able to click through, and so was @hdodda in their screencast. But Indeed, Chrome remembers my choice on badssl.com.

However it doesn't in my actual use case, on https://127.0.0.1, where HSTS doesn't apply.

Comment 7 by est...@chromium.org, Feb 21 2017

This site is in the HSTS preload list. The video in comment 2 is from Chrome 54 -- perhaps that was before the site was included in the preload list?

I'm not sure why you would be able to click through the error in Chrome 56... could you please take a screenshot of the error page after clicking "Advanced"?

I'm not able to reproduce your issue on https://127.0.0.1. I'm running a server with a self-signed cert on https://127.0.0.1:4443, visiting that site in Chrome, clicking through the error, and restarting, and I don't see another error. Are you doing anything differently?

Comment 8 by grisch...@gmail.com, Feb 22 2017

How bizarre. I am indeed seeing the HSTS warning and can't click through. However, https://chromium.googlesource.com/chromium/src/+/0abc2f2f751e5e841f5eabaaabe104036571e6dc/net/http/transport_security_state_static.json#2648 shows that stereo.lu was included in the hsts preload list of Chrome 54.0.2820.0 which was used in the video.

In any case, yes, I am doing the same thing on 127.0.0.1! Maybe it's something with my particular certificate setup. This is a much narrower issue than I thought: I'll update the ticket with exact steps to reproduce tomorrow.

Comment 9 by est...@chromium.org, Feb 22 2017

Older builds (10 or 12 weeks, can't remember) stop consulting the preload list in order to not get stuck with stale data. So the tester is probably using an old M54 build that no longer uses preload data.
Well. I've installed Chrome and my software in a new VM and tried to reproduce it, but can't. Until I find out what's very particular in my current setup to reproduce this, I'm happy to have this closed as can't reproduce. Sorry, and thank you for your time.
Status: WontFix (was: Unconfirmed)
Ok, please do let us know if you see this again. Thanks!

Sign in to add a comment