New issue
Advanced search Search tips

Issue 862912 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Aug 23
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug



Sign in to add a comment

SSL doesnt work on chrome but it works on all browsers

Reported by hmyou...@gmail.com, Jul 12

Issue description

UserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36

Steps to reproduce the problem:
1. SSL doesnt work on chrome but it works on all browsers
2. https://www.palmap.org
3. https://services.palmap.org

What is the expected behavior?
to be able to open by server site on chrome anywhere

What went wrong?
SSL doesnt work on chrome but it works on all browsers

Did this work before? No 

Chrome version: 67.0.3396.99  Channel: stable
OS Version: 10.0
Flash Version: 

i want my ssl site to work with chrome
 
chrome-net-export-log.json
1.8 MB View Download
Components: Internals>Network>SSL
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug
It looks like the server is closing connection for some reason, but I can't tell why from https://www.ssllabs.com/ssltest/analyze.html?d=www.palmap.org. Removing security labels and moving over to networking queue.
Poking around with the BoringSSL command-line tool, they seem to be intolerant to our status_request (OCSP stapling) extension for some reason. That's odd since Firefox also sends it. Poking further...
Labels: Needs-Feedback
There appears to be some cipher-specific bug with this server. The server supports the following ciphers, with a server-enforced preference order:

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA

Of these the earliest cipher Firefox supports is TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, so the server selects that. If it selects that, the server handles OCSP stapling just fine.

However, Chrome additionally supports TLS_RSA_WITH_AES_256_GCM_SHA384, which the server is configured to prefer. If it selects TLS_RSA_WITH_AES_256_GCM_SHA384, the server breaks on OCSP stapling. Toying around, the other static RSA (TLS_RSA_WITH_*) ciphers have the same failure mode.

This is a bug in the server software. (Incidentally, neither of the two ciphers is ideal. It should be using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 or TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.) The server claims to be Microsoft-IIS/8.5, though whether there is something else fronting TLS, I'm not sure. The preference order does look like other IIS servers I've seen, but if IIS were broadly incompatible with Chrome, I imagine someone would have noticed it and fixed it by now.

Are you the maintainer of this site? If so, what is this server running? Assuming this is IIS, could you please check that you are up-to-date on Windows updates?
Labels: Needs-Triage-M67
[hmyounan]:  Could you please response to comment #3?
Reporter, could you please respond to the question at the end of comment #3?
(The server's cipher preferences seem to have changed and I can't reproduce the issue anymore, so I suspect the site may have taken the advice in comment #3.)
Status: WontFix (was: Unconfirmed)

Sign in to add a comment