Better interstitial explanations for CA-distrust events
Reported by
6.02...@gmail.com,
Aug 1
|
||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3507.0 Safari/537.36 Steps to reproduce the problem: 1. Go to a site which uses Symantec certs, e.g., https://www.uboc.com/uboc/home/home.html. You'll see the "Your connection is not private" page. 2. Click the "ADVANCED" link. What is the expected behavior? Chrome tells me correct information about the issue. What went wrong? Chrome tells me incorrect and scary information about the issue: "www.unionbank.com normally uses encryption to protect your information." True. "When Google Chrome tried to connect to www.unionbank.com this time, the website sent back unusual and incorrect credentials." FALSE. Whether or not the credentials are correct is debatable--the bank would probably say they are--but they're certainly usual. "This may happen when an attacker is trying to pretend to be www.unionbank.com, or a Wi-Fi sign-in screen has interrupted the connection." TRUE, BUT IRRELEVANT AND MISLEADING. We know this isn't what's happening. "Your information is still secure because Google Chrome stopped the connection before any data was exchanged." True. "You cannot visit www.unionbank.com right now because the website uses HSTS. Network errors and attacks are usually temporary, so this page will probably work later." FALSE, and this advice is really bad, since it tells people to keep retrying even though we know this won't work. Did this work before? N/A Chrome version: 70.0.3507.0 Channel: canary OS Version: 10.0 Flash Version:
,
Aug 2
Thanks for your response. I think this is bad advice because "Network errors and attacks are usually temporary so this page will probably work later" suggests, first, that this is a network error or an attack, and second, that it may work again in say half an hour, whereas realistically it's only likely to work after several weeks. I agree that contacting the site owner is a good action to take, but it doesn't appear in the interstitial, it's in the "Learn more" link, https://support.google.com/chrome/answer/6098869#-215 Also contacting the site owner is problematic. First, it won't get the problem fixed in a useful timeframe and second, in this case at least, this page which users can't reach is Union Bank's only presence on the web, so people would have to think outside the box even to get their contact information. (The Google SRP works.) Really the best advice is to use the stable Chrome channel, but I can see why we aren't going to say that. There's no great solution but I still think that removing the "ADVANCED" link would be an improvement, since it will scare users and (IMO) doesn't provide actionable help. Removing it will make it more likely that users will click the "Learn more" link.
,
Aug 2
,
Aug 2
Adding some folks who may have more opinions on this. I'm not sure how likely we are to make a relatively temporary custom interstitial text for this though (since longer-term we want to treat it just like any other untrusted root).
,
Aug 2
,
Aug 10
A Gentle ping... As per comment #4, requesting asymmetric@,emilyschechter@ to look into this issue and help further. Thanks..
,
Aug 14
Clicking the "ADVANCED" button brings up a blurb containing this text: "... its security certificate is not trusted by your computer's operating system ...", which is a false statement, as the Windows OS is just fine with the certificate. This is witnessed by clicking "Proceed to ...", upon which the Omnibar shows the red "Not secure" warning. Clicking it and going through to the "Certification Path" tab of the certificate dialog, it tells me "This certificate is OK.".
,
Sep 3
Unable to reproduce the issue on win-10 using chrome reported version latest canary #70.0.3538.5. Attached a screen cast for reference. Following are the steps followed to reproduce the issue. ------------ 1. Navigated to a site which uses Symantec certs, e.g., https://www.uboc.com/uboc/home/home.html. You'll see the "Your connection is not private" page. 2. Clicked the "ADVANCED" link. 3. Observed that Chrome tells correct information about the issue and the certificate is OK. reporter@ - Could you please check the issue on latest canary #70.0.3538.5 by creating a new profile without any apps and extensions and please let us know if the issue still persist or not. Thanks...!!
,
Sep 3
I still see the behavior I described. I don't have the same Chrome version as you, though. Your screencast shows "70.0.3538.5 (Official Build) (64-bit) (cohort: Stable)". I see "71.0.3541.0 (Official Build) canary (64-bit) (cohort: Clang-64)".
,
Sep 3
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 2
Friendly ping to asymmetric and emilyschechter for thoughts on this one. I agree with cthomp that we probably want to treat Symantec cert errors like any other untrusted root, but would prefer to hear your thoughts before closing this one. Also, we now show a special error message after a user gets a few of this types of errors, but I don't think this addresses the reporter's concerns.
,
Oct 11
I think that there might be some rough edges around the phrasing of distrusted CA errors, but that overall, they are not overtly misleading. For the most part, I agree that we should handle Legacy Symantec PKI errors the same as any untrusted root. The customized Legacy Symantec PKI codes were added to aid in Chrome's gradual distrust of these TLS certificates over the past 13 months and to assist the large number of affected sites in migrating their certificates. The net error codes and console warnings provide technical information to site operators (either through direct Chrome testing or user error reporting) so that they can take action to fix their sites so that future visits by users will no longer show errors. We can examine whether altering language for CAs that were once trusted but are being distrusted is worthwhile (as compared to those that have never been trusted), but there are so many edge cases here that it might actually increase user confusion rather than decrease it.
,
Oct 12
,
Nov 2
A related change we did make was to make the support URL go directly to a section about Symantec (see bug 891465 ). That seems like a reasonable middle-ground, since we do know that the interstitial is being shown because it is a Symantec cert so we can customize the "learn more" behavior at least.
,
Nov 5
Re-triaging this as a feature request for how we handle interstitials for CA-distrust events in the future (per c#12).
,
Nov 5
[And additionally, marking all Blink platforms where we have full certificate validation control.]
,
Dec 7
,
Jan 15
|
||||||||||||
►
Sign in to add a comment |
||||||||||||
Comment 1 by cthomp@chromium.org
, Aug 1Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug