Issue metadata
Sign in to add a comment
|
Incorrectly getting "This network may require you to visit its login page"
Reported by
austinty...@gmail.com,
Aug 1
|
||||||||||||||||||||||||
Issue description
Chrome Version : 67.0.3396.99
OS Version: 10.0
URLs (if applicable) : https://134.114.138.115:8443
Other browsers tested: FireFox/Edge
Add OK or FAIL after other browsers where you have tested this issue:
Safari: Not Tested
Firefox: OK
IE/Edge: OK
What steps will reproduce the problem?
1. Navigate to a public IP address on SSL port with a certificate hostname mismatch error
2. Get "This network may require you to visit its login page" as shown in attachment
3. Cannot circumvent or get around this false positive
What is the expected result?
Be shown an SSL mismatch error, but allowed to proceed when clicking "Advanced"
What happens instead of that?
Shown a captive portal detection page incorrectly that does not let me to workaround it
Please provide any additional information below. Attach a screenshot if
possible.
Screenshot attached
UserAgentString: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36
,
Aug 2
,
Aug 2
Thanks for filing the issue... @Reporter : It would be really helpful if a sample URL/Test file is provided, so that we can investigate the issue further. Thanks.!
,
Aug 2
A test URL was provided (https://134.114.138.115:8443); I am unsure how I would be able to proivde a test file however.
,
Aug 2
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Aug 2
I was able to repro with the test URL. Certificate verification fails with ERR_CERT_COMMON_NAME_INVALID. Don't know why the captive portal interstitial is triggered, I'm not familiar with that code.
,
Aug 7
We are experimenting this intermitently with Chrome Version 68.0.3440.84 (Official Build) (64-bit). We have a local intranet asp.net mvc IIS site with self-signed certificate using Windows Authentication. We can not provide a test site since this is a secured env.
,
Aug 8
The discussion of the false positive portal interstitial began here 5/30 https://productforums.google.com/forum/#!topic/chrome/F5kD0jrjqtg There's additional background there and Austin mentions other false portal detection failure cases, as does Jay. There are some (2012) CrOS portal detection docs mentioned https://docs.google.com/document/d/1k-gP2sswzYNvryu9NcgN7q5XrsMlUdlUdoW9WRaEmfM https://sites.google.com/a/chromium.org/dev/chromium-os/chromiumos-design-docs/network-portal-detection owned by Matt Menke (mmenke@chromium.org (==? mattm@chromium.org,see #6) ). If mmenke is not mattm, he may be able to point you a Windows resource person. Why is there no chrome://network-errors/ link that displays captive portal interstitial? Check with
,
Aug 15
Assigning to meacer for further diagnosis from the captive portal detection side, I was able to reproduce on stable at the stated URL. Re #8: The link you are looking for is at chrome://interstitials
,
Aug 15
This is probably caused by the known captive portal list. Investigating.
,
Aug 15
This is caused by this entry: https://cs.chromium.org/chromium/src/chrome/browser/resources/ssl/ssl_error_assistant/ssl_error_assistant.asciipb?rcl=a15479c5e22a80dd50fe90d4e596f20c4e9c2d40&l=33 We were assuming all certificates with this subject public key were captive portals, which apparently is not the case. Apologies for all the inconvenience this caused. I'm going to push an update to remove this entry from the list. In the meanwhile, you can use the following command line flag as a workaround to disable this feature: --disable-features=CaptivePortalCertificateList
,
Aug 16
Please do not remove that certificate entry. Auth.impulse.com is a certificate used for captive portals and is also used to administer said captive portal. Portal.myweblogon.com is also in the same certificate as a SAN DNS name but not listed there; is that covered under the same aspect given it’s the same certificate? Just to clarify, I’ll work to get the administration pages’ certificate updated to no longer use that same certificate as the portal to prevent administrators and network engineers from encountering this error.
,
Aug 16
The interstitial is triggered based on the fingerprint of the public key of the certificate. The DNS name is not considered -- it's only used as a comment in that file. So just serving that certificate will trigger a captive portal warning, regardless of the domain name it's served from.
,
Aug 16
Side question; how would that certificate get updated to the renewed certificate upon previous certificate expiration? Or given the hash, it may not even matter?
,
Aug 16
Yes, if the new certificate has the same SPKI, it would still match. There are indeed multiple certificates for auth.impulse.com with the same SPKI information: https://crt.sh/?q=d92d97e4d17ce28a7c844f58b0d1cda44e604b959cff998435e01777777ce715 (expired) https://crt.sh/?q=269b0459bd0bc11b1cc6ccb76a983929ecf4f3b7b20e401b179ca344a600dca2 (current)
,
Aug 16
Okay that makes sense. So for clarification, the only time that page should occur is: Upon an ssl error, chrome will check if the SSL mismatch is one of the provided certificates (e.g. auth.impulse.com). If so, it will display a captive portal page. Are there any other major use cases or edge condition that would result in this page being shown so I have a better understanding of this workflow? For example, does the port matter in showing the page or does the URL being localhost, a private IP, public IP, etc matter? Thanks for your prompt responses and assistance in this.
,
Aug 16
The URL is not taken into account, so localhost, private/public IP doesn't matter. However, the only SSL error must be a name mismatch for this feature to trigger. For reference, this is the code that checks the list: https://cs.chromium.org/chromium/src/chrome/browser/ssl/ssl_error_assistant.cc?rcl=b85f3ffc2ddbd70a838418fa202d2e1b33420221&l=203 There are two other cases where we display this interstitial: - The OS reports that it's detected a captive portal - Chrome itself found that it's detected a captive portal Here is a brief write up explaining these features: https://docs.google.com/document/d/1FIl2hrnkuV7dZ-xrpa4M-HMFa5FimI9aKKkLi_bLJaI/edit?usp=sharing
,
Aug 16
Thank you again for the additional explanation. One last thing I still do not fully understand yet is when I navigate to testserver (testserver > 10.102.10.70 in /etc/hosts is a test server operating with the auth.impulse.com certificate on port 8443) I get the captive portal prompt page correctly. But when I navigate directly to the IP on the same server on the same port, I get a different response, as shown below: https://i.gyazo.com/23adeb1b9b60325bde697593ac48802e.png https://i.gyazo.com/ac170decbbc528f9d570aeb8c9ef4d3a.png With the understanding I have based off the URL not being taken into account, why does navigating via IP change this behavior?
,
Aug 16
Can you please attach net logs for the IP and non-IP cases? Instructions are here: https://www.chromium.org/for-testers/providing-network-details (You might want to try this in a clean profile to prevent any private data getting logged)
,
Aug 19
meacer@ Thanks for the chrome://interstitials ref. I posted bug 875623 to have it added to the chrome://chrome-urls list.
,
Aug 21
Apologies for the delay, I have attached the net log for the IP and localhost version that both produce an auth impulse certificate:
,
Sep 14
Any movement on this issue? I'm facing similar issue around connecting to a self signed site with its IP address, and getting redirected to the 'connect to network' page, with an option to 'Connect' which takes me to http://www.gstatic.com/generate_204 Happy to help out if I can add any context here.
,
Sep 21
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/2b3cf454c1d96333719df413d73a50e651c99fec commit 2b3cf454c1d96333719df413d73a50e651c99fec Author: Mustafa Emre Acer <meacer@chromium.org> Date: Fri Sep 21 05:33:13 2018 Remove the SPKI fingerprint for auth.impulse.com from captive portals list Bug: 870038 Change-Id: I856efd083382cb27f01ea37abbfcbb04941ec0c4 Reviewed-on: https://chromium-review.googlesource.com/1176582 Commit-Queue: Adrienne Porter Felt <felt@chromium.org> Reviewed-by: Adrienne Porter Felt <felt@chromium.org> Cr-Commit-Position: refs/heads/master@{#593084} [modify] https://crrev.com/2b3cf454c1d96333719df413d73a50e651c99fec/chrome/browser/resources/ssl/ssl_error_assistant/ssl_error_assistant.asciipb
,
Sep 21
@Meacer auth.impulse.com is a captive portal certificate and should not be removed from that list as I mentioned above. This bug is not a bug, just a lot of confusion.
,
Sep 21
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/f29466ff54b071c76911c980f6b9204eff8f0e89 commit f29466ff54b071c76911c980f6b9204eff8f0e89 Author: Adrienne Porter Felt <felt@chromium.org> Date: Fri Sep 21 13:46:41 2018 Revert "Remove the SPKI fingerprint for auth.impulse.com from captive portals list" This reverts commit 2b3cf454c1d96333719df413d73a50e651c99fec. Reason for revert: <INSERT REASONING HERE> Original change's description: > Remove the SPKI fingerprint for auth.impulse.com from captive portals list > > Bug: 870038 > Change-Id: I856efd083382cb27f01ea37abbfcbb04941ec0c4 > Reviewed-on: https://chromium-review.googlesource.com/1176582 > Commit-Queue: Adrienne Porter Felt <felt@chromium.org> > Reviewed-by: Adrienne Porter Felt <felt@chromium.org> > Cr-Commit-Position: refs/heads/master@{#593084} TBR=felt@chromium.org,meacer@chromium.org Change-Id: I0c158c192ebd88c3cd586da3fca7cd6963f594f4 No-Presubmit: true No-Tree-Checks: true No-Try: true Bug: 870038 Reviewed-on: https://chromium-review.googlesource.com/1238375 Reviewed-by: Adrienne Porter Felt <felt@chromium.org> Commit-Queue: Adrienne Porter Felt <felt@chromium.org> Cr-Commit-Position: refs/heads/master@{#593167} [modify] https://crrev.com/f29466ff54b071c76911c980f6b9204eff8f0e89/chrome/browser/resources/ssl/ssl_error_assistant/ssl_error_assistant.asciipb
,
Sep 21
,
Sep 21
Thank you for reverting the aforementioned commit. Should I create a separate issue for the experience of comment 19 through comment 22 since the core of this issue was not a bug, but just a misconception? |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by mattm@chromium.org
, Aug 1