TLS handshake fails on CORS preflight requests because no certificate is sent [per spec]
Categories
(Core :: Networking, defect, P3)
Tracking
()
People
(Reporter: psotres, Unassigned)
References
Details
(Whiteboard: [necko-backlog])
Comment 2•11 years ago
|
||
Comment 3•10 years ago
|
||
Comment 4•10 years ago
|
||
Comment 5•10 years ago
|
||
Comment 6•9 years ago
|
||
Comment 7•9 years ago
|
||
Comment 8•9 years ago
|
||
Comment 9•9 years ago
|
||
Comment 10•9 years ago
|
||
Comment 11•8 years ago
|
||
Comment 12•8 years ago
|
||
Comment 13•8 years ago
|
||
Comment 14•8 years ago
|
||
Comment 15•8 years ago
|
||
Comment 16•7 years ago
|
||
Comment 17•7 years ago
|
||
Comment 18•7 years ago
|
||
Comment 19•7 years ago
|
||
Comment 20•7 years ago
|
||
Updated•6 years ago
|
Updated•6 years ago
|
Comment 22•6 years ago
|
||
Chrome seems to have put this in the permanent backlog and it continues to cause problems for users of Firefox, it might be time for another look.
Updated•6 years ago
|
Comment 23•6 years ago
|
||
(In reply to Anne (:annevk) from comment #22)
Chrome seems to have put this in the permanent backlog and it continues to cause problems for users of Firefox, it might be time for another look.
That’s not correct. We just finished a major Chrome wide refactor to try and fix this, but had priorities shifted for the engineer leading this at the last moment. As the comment on the bug said, we’re incredibly close to fixing this, after changing how nearly every internal request was made.
Comment 24•5 years ago
|
||
(In reply to Ryan Sleevi from comment #23)
(In reply to Anne (:annevk) from comment #22)
Chrome seems to have put this in the permanent backlog and it continues to cause problems for users of Firefox, it might be time for another look.
That’s not correct. We just finished a major Chrome wide refactor to try and fix this, but had priorities shifted for the engineer leading this at the last moment. As the comment on the bug said, we’re incredibly close to fixing this, after changing how nearly every internal request was made.
Any updates on the timeline for fixing this?
Comment 25•5 years ago
|
||
I can't give a timeline for fixing this. The best way to engage is via https://bugs.chromium.org/p/chromium/issues/detail?id=775438
Comment 26•5 years ago
|
||
Dana, we will need to make a temporary change here until this is fixed in Chrome. There is a patch in bug 1511151. Can you find someone to finish it?
![]() |
||
Comment 27•5 years ago
|
||
Is there a reason this is particularly urgent now? If Chrome is fixing it, it seems like we should just wait and let them fix it.
Comment 28•5 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #27)
Is there a reason this is particularly urgent now? If Chrome is fixing it, it seems like we should just wait and let them fix it.
I am not sure when they are going to fix it. We can wait a bit, but I do not know how long. I will ask Anne to comment on this.
Comment 29•5 years ago
•
|
||
I agree that if Chrome ships a fix within a reasonable amount of time (say in a release build before August) we should probably hold the line, but there's enough indication at this point that this is making it hard to adopt Firefox in certain environments and as far as I'm aware it would not be a major change (even if it arguably is for the worse). (Unfortunately not all reported as bug reports.)
Edit: commented on the Chrome issue.
Comment 30•5 years ago
|
||
Dana, how would you feel about adding the preference proposed in bug 1511151 for enterprise users affected by this? At least until Chrome removes support (I left another comment in the Chrome bug, but it's also been quite a while already).
![]() |
||
Comment 31•5 years ago
|
||
I suppose it wouldn't be worse than the preference we already have that automatically sends a client certificate to anyone who asks with a normal request.
Comment 32•5 years ago
|
||
Thanks Dana, bug 1511151 comment 12 has a new patch, would you be able to review that and get it landed?
Comment 34•5 years ago
|
||
Hi, there are some review comments from Dana in #1511151 that are outside my experience with the Firefox codebase. I suspect it should be trivial for someone that knows their way around the CORS code. Would there by chance be anybody following this bug that would be able to take over that patch? I'm happy to build + test whatever is developed. Thank you!
![]() |
||
Updated•4 years ago
|
Comment 36•4 years ago
|
||
I would prefer to keep this open since the network.cors_preflight.allow_client_cert
preference is false and with Chrome not prioritizing fixing this we might have to consider flipping the preference. Hope that's okay.
Updated•4 years ago
|
Updated•3 years ago
|
Comment 37•3 years ago
|
||
So the status here seems to be that we have a pref to enable the nonstandard behaviour, and chrome has a flag to enable the standard behaviour?
Given that we don't have public site breakge associated with this, and it's possible for enterprise users to work around the issue by setting a pref, I'm unsetting the webcompat-priority flag, but if we find out about specific sites that break when the pref is unset, please re-flag for triage.
Updated•3 years ago
|
Comment 38•2 years ago
|
||
It sounds like there's progress happening again at Google, though slowly.
Description
•