Consider exempting special hostnames/domains from full certificate validation to aid development
Reported by
thomas.b...@tibidono.com,
Nov 5
|
||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/70.0.3538.67 Chrome/70.0.3538.67 Safari/537.36 Steps to reproduce the problem: 1. Create Website with self signed certificate. 2. Navigate to website. 3. See factually wrong information about the security of the certificate. What is the expected behavior? Tell the user that this site uses a self signed certificate which is as safe and secure as any certificate. Offer the ability to permanently trust the certificate. What went wrong? Chrome / Chromium gets in the way and scares users that self signed certificates are insecure or unsafe. That is factually wrong. The certificate was just not signed by some giant ominous and hardly accountable corporation that the user also does not know. Did this work before? N/A Chrome version: 70.0.3538.67 Channel: stable OS Version: Ubuntu 18.04 Flash Version: none Please please at least offer the ability to accept self signed certificates for the four well defined reserved tlds: * example * invalid * localhost * test
,
Nov 5
I generally agree with rsleevi@'s reasoning on Issue 717340 (c#9) that we should focus on supporting and guiding users/developers to a good path rather than supporting every possible development case, particularly here where we might open a complex set of bugs around "local" reserved hostnames (I'll note that I'm not very familiar with the details of these and the DNS resolution for them -- I share the concerns that palmer@ mentioned in c#1). If we were to go down this route, I think it might be better if instead of exempting these hostnames from certificate validation we instead special-cased them to a kind of "trust-on-first-use" interstitial (which might not even change the duration of the trust, but could have a different wording/expose the proceed button directly). For also handling the concerns in Issue 717340, we might need to treat these exempted page/certificates more leniently for feature access (e.g., being able to install/use service workers), instead of treating them as "dangerous". But this would add a fairly significant complication to our security state and interstitial logic.
,
Nov 5
,
Nov 5
This particular proposal is one that's been around for nearly two decades - it's one that cycles through every so often. As noted in Comment #1 and Comment #2, there's no reliable way for a browser to determine what constitutes locally resolved, and even in those situations, what constitutes the 'expected' certificate (even with a TOFU scenario). palmer@: It's unclear by leaving this open if you agree it's a useful feature? Or were you deferring to other folks to close? cthomp@: In the case of .example, .test, and .invalid, those should not resolve unless the user has modified their hosts. If they have power to modify their hosts, it seems like they have power to address the trust issues. With .localhost, it will run into the resolution issues mentioned (potentially going over DNS), and that also seems undesirable. I don't think we want to encourage or promote the use of these names.
,
Nov 5
#4: I defer to the experts on whether we should or should not do this feature.
,
Nov 6
,
Dec 21
I'm going to take this one since we're thinking of doing something to aid development (at least having a document with "best practices" for this types of cases), so this can serve as a tracking bug. |
||||
►
Sign in to add a comment |
||||
Comment 1 by palmer@chromium.org
, Nov 5Components: UI>Browser>Omnibox>SecurityIndicators Internals>Network>SSL
Labels: -Type-Bug-Security -Pri-2 -Restrict-View-SecurityTeam Team-Security-UX OS-Android OS-Chrome OS-Fuchsia OS-Mac OS-Windows Pri-3 Type-Feature
Status: Untriaged (was: Unconfirmed)
Summary: Consider exempting special hostnames/domains from full certificate validation to aid development (was: Self signed certificates incorrectly marked as insecure)
32.1 KB
32.1 KB View Download