New Chrome policy OverrideSecurityRestrictionsOnInsecureOrigin does not work with wildcards |
||||||
Issue descriptionChrome version:69.0.3497.92 OS version: Windows 10 Case#:16478553 Description: New Chrome browser policy OverrideSecurityRestrictionsOnInsecureOrigin - https://www.chromium.org/administrators/policy-list-3#OverrideSecurityRestrictionsOnInsecureOrigin does not seem to work with wildcard. As per policy description hostname patterns such as "*.example.com" should work with this policy but it does not. Adding "*.example.com" to a list of origins/hosts names does not remove "Not secure" in the URL field https://drive.google.com/open?id=1TSTvYb_cPxtZ5o5RsJhCnx7HH3X2NZPA Current Behavior / Reproduction: 1. Add "*.example.com" to a list of origins/hosts and apply 2. Verify "*.example.org" is present in the chrome://policy 3. Try opening example.org 4. Observe "Not secure" before the page url link to reproduction video: https://drive.google.com/file/d/1uHx7JfiSITGgzMod1d6ReIVgYVX39Ul_ Tested and works with the following config: http://example.org http://example.com http://example.org:80 Does not works with the following: http://*.example.org *.example.com http://example.org:* *.example.com/* *.example.com* example.com Expected Behavior: Both "http://example.org" and "*.example.org" host names/origin works
,
Sep 12
I suspect the policy may be looking for regex syntax. Can you try: .*\.example\.com$
,
Sep 12
jayhlee@ - I have tried with with .*\.example\.com$, but unfoirtunately does not work either
,
Sep 19
,
Sep 20
Hi everyone - I am the owner of this case. Thank you for taking a look at this issue. Any suggestions on next steps?
,
Sep 21
*.example.org will only match subdomains of example.org -- so it will remove the Not Secure UI on http://test.example.org, but not http://example.org. You would need to include both *.example.org and http://example.org in the policy to remove the Not Secure UI on both subdomains of example.org and example.org itself. So, I think the behavior is WAI, but I'll leave this bug open in case the documentation should be made more clear.
,
Sep 21
Thank you. The policy failed: - http://example:5080 But the policy passed -http://example.org:80 Is this because port 80 is the default http port? Is it expected behavior not to work for any other port numbers, or by using http://test.example:*? My client would like to apply this policy with specific ports, and/or, wildcards for ports in the domain name: e.g.: http://example.com:5080 e.g.: http://example.com:* Is this possible? Is there any other documentation covering my clients requests? Again - thank you to the community for your time, and effort with this.
,
Sep 25
estark@, thank you for details! I have just checked with two different subdomains: 1. http://testing-ground.scraping.pro 2. http://railsapps.github.io Policy does work in first case (*.scraping.pro): https://drive.google.com/open?id=1rdY36Mqyw7V7Y7hcZGArtkCKbHx5fmhN but does not work in second case (with *.github.io) https://drive.google.com/open?id=11RNAzUkNb-4K1Ex7r-RdbLIMPIS_D4Am Could you please advise why there is a difference in behaviour? Policy: { "chromePolicies": { "OverrideSecurityRestrictionsOnInsecureOrigin": { "level": "mandatory", "scope": "machine", "source": "sourcePlatform", "value": [ "*.scraping.pro", "*.github.io" ] } },
,
Sep 25
I believe the underlying host wildcard logic may be preventing wildcards on entire TLDs (which if it is including private registries, which github.io is, would explain this behavior). I'll double check and update this bug.
,
Sep 25
cthomp@, thank you! Could you pelase aslo help with question in #7? Is it possible to add only specific port(s) to the list?
,
Sep 25
1) Confirming that the valid wildcard check restricts setting it for registrable labels in the domain and includes private registries [1], i.e., because github.io is an eTLD, you can't set *.github.io. But you could set "http://railsapps.github.io" and "*.railsapps.github.io". This is to prevent people from whitelisting across security principals on the web. For example, *.corp.example.org is all controlled by the same entity, while x.github.io and y.github.io are controlled by different entities. This is an extension of the same logic preventing setting "*.com" as a wildcard pattern. [1] https://cs.chromium.org/chromium/src/chrome/common/secure_origin_whitelist.cc?gsn=IsValidWildcardPattern&l=42 2) Specifying ports in a wildcard pattern is considered invalid by |IsValidWildcardPattern()| [2]. Specifying specific ports in a non-wildcard origin should work (I tested setting "http://portquiz.net:8080" and it worked on Linux). [2] https://cs.chromium.org/chromium/src/chrome/common/secure_origin_whitelist.cc?gsn=IsValidWildcardPattern&l=29 If it is prohibitive to individually specify cases with non-standard ports, then we could look into scoping and prioritizing adding support for ports in the wildcard cases (specifying ports with wildcard host labels and/or specifying wildcard ports).
,
Sep 27
,
Sep 28
cthomp@, thank you! I will inform the client of the information you provided. Thank you again to all contributors. Greatly appreciated.
,
Nov 2
Marking this as WontFix since it appears the issue is resolved as-is. Please re-open if there are remaining issues with wildcards in the policy. |
||||||
►
Sign in to add a comment |
||||||
Comment 1 Deleted