New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 744691 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Jul 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Mac
Pri: 2
Type: Bug-Regression



Sign in to add a comment

ERR_CONNECTION_REFUSED where it loads in every other browser

Reported by alexan...@opendns.com, Jul 17 2017

Issue description

UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.66 Safari/537.36

Example URL:
Internal VPN sites a subset only at this time

Steps to reproduce the problem:
1. Open chrome beta build 60.0.3112.66 
2. Go to the https internal site
3. get ERR_CONNECTION_REFUSED

works in Canary. Works in firefox. Works in stable. 

What is the expected behavior?
Load HTTPS page normally

What went wrong?
ERR_CONNECTION_REFUSED every single time. Reproduces in incognito as well. 

Did this work before? Yes Current stable 59.0.3071.115

Chrome version: 60.0.3112.66  Channel: beta
OS Version: OS X 10.12.5
Flash Version: N/A
 
Note, two of us on the corporate VPN see this same issue - but only with the Beta build. 
chrome://net-internals/#dns reports the correct IP. 

It is able to visit to the IP directly. 

Difference: IP visit directly does NOT redirect to HTTPS...

Try http:// - redirects to https:// automatically...fails b/c there is no HTTPS. This is an internal opendns.com subdomain and does NOT have an HTTPS version. 

Canary/Stable, no redirect to HTTPS happens. Works just fine. 

Issue: Do not redirect all to HTTPS if not requested. 
Note, this may also be a fault of HSTS for opendns.com given:

Strict-Transport-Security: max-age=31536000; includeSubDomains


But prior builds were not impacted negatively by this being set. 
Repro update: Should be able to repro for an http-only website subdomain which advertises HSTS includeSubDomains when it in reality has no HTTPS support for all subdomains. 

Comment 5 by mmenke@chromium.org, Jul 17 2017

Components: -Internals>Network Internals>Network>DomainSecurityPolicy
I defer to the HSTS folds, but I believe it's expected that advertising HSTS when not actually supporting HTTPS will break you.
Labels: Needs-Feedback
> I defer to the HSTS folds, but I believe it's expected that advertising HSTS when not actually supporting HTTPS will break you.

Indeed, that's one of the main security features of HSTS.

alexander@, could you confirm that deleting `opendns.com` (and any intermediate domains, if they exist and serve an HSTS header that the client might have observed)) at chrome://net-internals/#hsts allows accessing the subdomain until you visit https://opendns.com again?

Comment 7 by mmenke@chromium.org, Jul 17 2017

Oops, that should be "HSTS owners" (Don't ask me where "folds" came from)
Can confirm, deleting the HSTS entry manually from chrome://net-internals/#hsts *does* work to clear the issue entirely. Visiting the opendns.com homepage once more re-loads HSTS and poof, the issue is back. 

It's definitely a delta in behavior between versions (canary continues to work just fine as does stable) - although I don't necessarily disagree that it is not "as expected" but does place a lot of burden on the end user. 

In the event Chrome is being expected to behave this way to enforce the stated HSTS (i.e. begin enforcing) - I would need to consult the HSTS declaration to adjust subdomains accordingly to avoid torpedoing our internal sites. 
Project Member

Comment 9 by sheriffbot@chromium.org, Jul 17 2017

Cc: lgar...@chromium.org
Labels: -Needs-Feedback
Thank you for providing more feedback. Adding requester "lgarron@chromium.org" to the cc list and removing "Needs-Feedback" label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Status: WontFix (was: Unconfirmed)
> It's definitely a delta in behavior between versions (canary continues to work just fine as does stable)

That sounds very unlikely – the implementation of HSTS hasn't substantially changed in years.
I suspect that visiting https://opendns.com in Canary/Stable will cause the relevant subdomains to fail to load in those profiles, too. Let me know if that's not the case, and we can reopen the bug.

> In the event Chrome is being expected to behave this way to enforce the stated HSTS (i.e. begin enforcing) - I would need to consult the HSTS declaration to adjust subdomains accordingly to avoid torpedoing our internal sites.

Yes, it sounds like `includeSubDomains` is not right for your case. You can remove the directive and get people to visit https://opendns.com in order to clear the old setting.
Can confirm that stable/canary behavior does differ and I am not able to reproduce the issue in either. However, the suspected cause - as you're saying - was not correct. The HSTS is behaving as it should there with the all subdomains selected. 

The delta appears to be that I can't get canary/stable to load that HSTS no matter how many times I visit opendns.com. HSTS doesn't appear. Beta - it appears, but not every time. 

Every time opendns.com appears in the HSTS chrome://net-internals/#hsts section, the subdomains fail. That part, not a bug, working as intended. 

Chrome seems to be inconsistent in actually adding the HSTS data to the browser, and it didn't actually get around to doing it at all until the current beta release. Never once saw it. No matter how many times I visit opendns.com in canary, for example, can't get the HSTS to appear. Beta - it appears sometimes. This part is reproducible by visiting opendns.com after clearing the HSTS storage. Sometimes it comes back, sometimes not. I can't get it to appear in stable or canary. 

In summary, while yes, it is correct that we should adjust opendns.com's HSTS declaration to avoid affecting other subdomains not in HTTPS -  Chrome's behavior has changed to actually load that HSTS to enforce. Reproducible by checking HSTS storage for stable vs beta vs canary after visiting opendns.com. 
Edit: Please close, you folks are correct - this is not a Chrome issue. I'm not sure what's triggering this to change now - I will verify with the website team as we may have also changed HSTS behavior about the time the new beta got released. 

Canary/stable didn't reproduce since visiting opendns.com was long done - so Canary/Stable couldn't reproduce without more exacting steps - visiting a new location like opendns.com/random produced the HSTS entry + reproduced in every build of chrome. 

Sign in to add a comment