Issue metadata
Sign in to add a comment
|
Revoked StartCom/WoSign certs should give clearer message
Reported by
spazef0...@gmail.com,
Sep 16 2017
|
||||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.79 Safari/537.36 Example URL: Steps to reproduce the problem: 1. Go to a site with StartCom/WoSign certificate (e.g. https://www.sevecek.com/) 2. "Attackers might be trying to steal your information from www.sevecek.com (for example, passwords, messages, or credit cards). Learn more NET::ERR_CERT_REVOKED" appears 3. Try to pinpoint which certificate was revoked. In this case it's the root cert, but the message is technically the same as with revoked leaf cert (e.g. https://revoked.badssl.com/) What is the expected behavior? The browser could give a clearer message of which certificate was revoked, whether the leaf or the root. Identifying the revoked cert is harder on Windows because Windows still trusts WoSign/StartCom and Chrome uses the Windows trust store and uses/links to the Windows trust store UI. So when you click "View certificate" in developer tools you'll see that everything is ok, see attached screenshot. It would be cool if the site owner could read the NET::ERR_CERT_REVOKED error message and figure out what needs to be done next. The link "Learn more" leads to this help page https://support.google.com/chrome/answer/6098869 and the "cert revoked" info is missing. What went wrong? Can't pinpoint the problematic revoke certificate, so it needs to be debugged using some other tools (or with rather deep-ish knowledge of the StartCom/WoSign issue) Did this work before? N/A Chrome version: 61.0.3163.79 Channel: n/a OS Version: 10.0 Flash Version:
,
Sep 18 2017
Redirecting out of the Certificate queue to decide on the UI side. For revoke certs, we do not presently have cross-platform guarantees to indicate what cert caused the error. For that reason, my technical recommendation is that we should WontFix/WAI, as that represents the only reliable signal and experience across browsers. The secondary question is about the CertificateViewer UI, which we currently use the platform viewer. Unless we want to develop our own viewer (UI leads have consistently declined to), this will simply be a Known Issue.
,
Sep 18 2017
Just thinking about whether an updated error message would make things more clear. Currently, the interstitial "Advanced" link shows "You cannot visit sevecek.com right now because its certificate has been revoked." Technically, in the WoSign/StartCom case it was not the leaf cert revoked, but the root CA cert. Also, the "Learn more" link, which now takes the user to https://support.google.com/chrome/answer/6098869, says nothing about revoked certs or specific CA cases. Given the no cross-platform guarantees mentioned in #2, and the platform cert viewer UI, it seems to me that improving the error message and the help page might also fix the problem of not knowing what to fix as a site owner by at least pointing them to the right direction. The help page already has at least one "If you own this website"-type advice.
,
Sep 18 2017
@rsleevi I'm sorry for my english For users are important 3 question: 1) which certificate in the certification path has been revoked 2) who revoked certificate (certificate owner or it's "only" browser developer decision?) 3) if certificated has been revoked by browser then why? (what is reason) I'm confused: - Chrome don't trust https://www.sevecek.com and says NET::ERR_CERT_REVOKED (but in developer tools I see that everything is ok) - Vivaldi don't trust https://www.sevecek.com and says NET::ERR_CERT_AUTHORITY_INVALID - Firefox, IE and Edge trusts https://www.sevecek.com Some examples of good error messages: - revoked root certificate SN XXXXX by Chrome, more information ...... - revoked intermediate certificate SN XXXXX by certificate authority (via CRL/OCSP) - revoked leaf certificate SN XXXXX by certificate authority or certificate owner (via CRL/OCSP) Especially if certificate isn't trusted only by browser developer (and in the Dev.Tools says everything is OK) then more information and reason explanation are very important.
,
Sep 19 2017
This is effectively a feature request. As noted in #2, we don't always clearly know what certificate is revoked, and in the majority of cases, the technical arcana behind which certificate was revoked isn't meaningful to the end user. I don't think we're likely to get to this in the foreseeable future.
,
Sep 19 2017
@elawrence I see, thanks. Do you think updating the "Learn more" Help Page https://support.google.com/chrome/answer/6098869 would make sense in this case, and if yes, should I file another report for that? The help page already has some tech lingo targeted more at the site owners, e.g. ERR_SSL_WEAK_EPHEMERAL_DH_KEY hint: > If you own this website, try updating your server to support ECDHE and turn off DHE. so the site owner might get an idea from the help page of what to check and where.
,
Sep 20 2017
@elawrence Thanks for your reply. As noted in #2 - I think that this information is important for users. I would like to clarify this. Revoke certificate by "Chrome" decision is much less important that revoke certificate by CA or his owner. For me isn't significant that Chrome make decision and revoke StartCom CA. I trust StartCom CA and web sites that using StartCom certificate. But I don't trust any web site if leaf certificate has been revoked by CA or certificate owner. |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by rdsmith@chromium.org
, Sep 16 2017