New issue
Advanced search Search tips

Issue 765935 link

Starred by 3 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Sep 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Feature
Team-Security-UX



Sign in to add a comment

Revoked StartCom/WoSign certs should give clearer message

Reported by spazef0...@gmail.com, Sep 16 2017

Issue description

UserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.79 Safari/537.36

Example URL:

Steps to reproduce the problem:
1. Go to a site with StartCom/WoSign certificate (e.g. https://www.sevecek.com/)
2. "Attackers might be trying to steal your information from www.sevecek.com (for example, passwords, messages, or credit cards). Learn more
NET::ERR_CERT_REVOKED" appears
3. Try to pinpoint which certificate was revoked. In this case it's the root cert, but the message is technically the same as with revoked leaf cert (e.g. https://revoked.badssl.com/)

What is the expected behavior?
The browser could give a clearer message of which certificate was revoked, whether the leaf or the root. Identifying the revoked cert is harder on Windows because Windows still trusts WoSign/StartCom and Chrome uses the Windows trust store and uses/links to the Windows trust store UI. So when you click "View certificate" in developer tools you'll see that everything is ok, see attached screenshot.

It would be cool if the site owner could read the NET::ERR_CERT_REVOKED error message and figure out what needs to be done next. The link "Learn more" leads to this help page https://support.google.com/chrome/answer/6098869 and the "cert revoked" info is missing.

What went wrong?
Can't pinpoint the problematic revoke certificate, so it needs to be debugged using some other tools (or with rather deep-ish knowledge of the StartCom/WoSign issue)

Did this work before? N/A 

Chrome version: 61.0.3163.79  Channel: n/a
OS Version: 10.0
Flash Version:
 
chrome_2017-09-16_20-43-41.png
39.6 KB View Download
Components: -Internals>Network Internals>Network>Certificate
Components: -Internals>Network>Certificate UI>Browser>Interstitials UI>Browser>CertificateViewer
Redirecting out of the Certificate queue to decide on the UI side.

For revoke certs, we do not presently have cross-platform guarantees to indicate what cert caused the error. For that reason, my technical recommendation is that we should WontFix/WAI, as that represents the only reliable signal and experience across browsers.

The secondary question is about the CertificateViewer UI, which we currently use the platform viewer. Unless we want to develop our own viewer (UI leads have consistently declined to), this will simply be a Known Issue.
Just thinking about whether an updated error message would make things more clear. Currently, the interstitial "Advanced" link shows "You cannot visit sevecek.com right now because its certificate has been revoked." Technically, in the WoSign/StartCom case it was not the leaf cert revoked, but the root CA cert.

Also, the "Learn more" link, which now takes the user to https://support.google.com/chrome/answer/6098869, says nothing about revoked certs or specific CA cases.

Given the no cross-platform guarantees mentioned in #2, and the platform cert viewer UI, it seems to me that improving the error message and the help page might also fix the problem of not knowing what to fix as a site owner by at least pointing them to the right direction. The help page already has at least one "If you own this website"-type advice.
@rsleevi I'm sorry for my english

For users are important 3 question:
1) which certificate in the certification path has been revoked
2) who revoked certificate (certificate owner or it's "only" browser developer decision?)
3) if certificated has been revoked by browser then why? (what is reason)

I'm confused:
- Chrome don't trust https://www.sevecek.com  and says NET::ERR_CERT_REVOKED (but in developer tools I see that everything is ok)
- Vivaldi don't trust https://www.sevecek.com  and says NET::ERR_CERT_AUTHORITY_INVALID
- Firefox, IE and Edge trusts https://www.sevecek.com 

Some examples of good error messages:
- revoked root certificate SN XXXXX by Chrome, more information ...... 
- revoked intermediate certificate SN XXXXX by certificate authority (via CRL/OCSP)
- revoked leaf certificate SN XXXXX by certificate authority or certificate owner (via CRL/OCSP)

Especially if certificate isn't trusted only by browser developer (and in the Dev.Tools says everything is OK) then more information and reason explanation are very important.
Labels: -Type-Bug Type-Feature
Status: WontFix (was: Unconfirmed)
This is effectively a feature request. As noted in #2, we don't always clearly know what certificate is revoked, and in the majority of cases, the technical arcana behind which certificate was revoked isn't meaningful to the end user.

I don't think we're likely to get to this in the foreseeable future.
@elawrence I see, thanks. Do you think updating the "Learn more" Help Page https://support.google.com/chrome/answer/6098869 would make sense in this case, and if yes, should I file another report for that?

The help page already has some tech lingo targeted more at the site owners, e.g. ERR_SSL_WEAK_EPHEMERAL_DH_KEY hint:

> If you own this website, try updating your server to support ECDHE and turn off DHE.

so the site owner might get an idea from the help page of what to check and where.
@elawrence Thanks for your reply. 

As noted in #2 - I think that this information is important for users.  I would like to clarify this. 
Revoke certificate by "Chrome" decision is much less important that revoke certificate by CA or his owner. For me isn't significant that Chrome make decision and revoke StartCom CA. I trust StartCom CA and web sites that using StartCom certificate. But I don't trust any web site if leaf certificate has been revoked by CA or certificate owner. 

Sign in to add a comment