New issue
Advanced search Search tips

Issue 700140 link

Starred by 3 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Mar 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug-Security



Sign in to add a comment

Cert error inconsistent between Windows and OS X

Reported by dcili...@gmail.com, Mar 9 2017

Issue description

UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.98 Safari/537.36

Steps to reproduce the problem:
1. Use the attached cert/key pair with a HTTPS server. (tested against openssl s_server and an embedded TLS stack) This is a self-signed pair.
2. Attempt to connect to server.
3. Observe the reported error in the advanced expansion or in net-internals.

What is the expected behavior?
1. Connecting from Chrome 57.0.2987.98 on Windows 7, SSL_CONNECT reports '--> net_error = -207 (ERR_CERT_INVALID)'.
2. Connecting from Crome 57.0.2987.98 (64-bit) on OS X 10.10.5, SSL_CONNECT reports '--> net_error = -202 (ERR_CERT_AUTHORITY_INVALID)'

What went wrong?
Windows version of chrome reports a hard certificate error. OS X reports a bypassable error. I have no idea *why* this is the case. It's entirely possible that the issue is in the cert itself, but there is no clear indication what's going wrong.

Did this work before? Yes ???

Chrome version: 57.0.2987.98  Channel: stable
OS Version: OS X 10.10.5
Flash Version: 

Welcome to the embedded development...

 
device.key
887 bytes Download
device.crt
960 bytes Download
OS_X_success.pcapng
29.7 KB Download
Windows_failure.pcapng
6.0 KB Download
Cc: rsleevi@chromium.org davidben@chromium.org
Components: Internals>Network>Certificate
Cc: -davidben@chromium.org eroman@chromium.org mattm@chromium.org

Comment 3 by dcili...@gmail.com, Mar 9 2017

Further information:

We've identified that this issue is *only* occurring with a Common Name of '10.1.1.161' and an email of 'sales@netburner.com'. 

Comment 4 by dcili...@gmail.com, Mar 9 2017

This is a partial list of working and failing keys from our tests.
certs_and_keys.tar.gz
7.5 KB Download

Comment 5 by dcili...@gmail.com, Mar 9 2017

Further Details: issue appears to be affecting IE 11.0.9600.18499. It appears to not affect FF 47.0.2 or 52.0
Not sure I understand your expectation. This is a self-signed certificate (doesn't chain to a trust anchor), so the certificate verification should be failing one way or another.

The certificates in question are all v1, and lack subjectAltName and extendedKeyUsages.

According to https://bugs.chromium.org/p/chromium/issues/detail?id=308330 such certificates (lacking SAN) are going to fail in Chrome 58 anyway, so you will want to start generating v3 certs regardless.
Status: WontFix (was: Unconfirmed)
ERR_CERT_INVALID vs ERR_CERT_AUTHORITY_INVALID is just a distinction about whether or not the underlying cryptographic library outright rejecting the certificate - as it may be doing for v1 certificates on Windows.

I'm going to go as close as WontFix/WAI - as Eric mentioned, these certs are outside the realm of what's reasonable to expect to support.

I left the view restrictions on because there's a private key there, and want to confirm with the reporter that it's OK to share before opening it up.

Comment 8 by dcili...@gmail.com, Mar 10 2017

The issue with v1 certs is noted.

Keys involved in this test were generated for the test.
Labels: -Restrict-View-SecurityTeam

Comment 10 by mattm@chromium.org, May 10 2017

 Issue 720070  has been merged into this issue.

Comment 11 Deleted

Sign in to add a comment