Closed Bug 1612587 Opened 1 year ago Closed 1 year ago

Firefox doesn't pick the certificate in OS certificate store even with security.enterprise_roots.enabled set to True

Categories

(Core :: Security: PSM, defect, P1)

68 Branch
defect

Tracking

()

RESOLVED FIXED
mozilla77
Tracking Status
firefox-esr68 --- wontfix
firefox75 --- wontfix
firefox76 --- wontfix
firefox77 --- fixed

People

(Reporter: marius.tarlo, Assigned: keeler)

References

Details

(Keywords: regression, Whiteboard: [psm-assigned][psm-smartcard])

Attachments

(13 files, 1 obsolete file)

Attached file mozregression-log.txt

User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.130 Safari/537.36

Steps to reproduce:

We have an internal site where we can login using a PKCS11 token
We have security.enterprise_roots.enabled set to True in our autoconfig file

Actual results:

With Firefox ESR 68.x.x (or any Nightly build greater or equal than 67.0a1 20190202094451), when I click on the login button of our internal site, after having entered the PIN code of my PKI token, it adds "?redirect=/bad_ssl_client_certificate/" at the end of the URL in the address bar

If I import the certificate manually in Firefox, no issue: it logs on correctly (but I shouldn't have to do that if security.enterprise_roots.enabled is set to True, this option is meant to make Firefox able to search for it in the Windows cert store)

Expected results:

With Firefox ESR 60.x.x (or any Nightly build lower or equal than 67.0a1 20190201221223), it logs on correctly (after having entered the PIN code of my PKI token)

Attached image firefoxcertKO.png
Attached image firefoxcertOK.png
Attached image firefoxcertPKI.png

Additional note: It seems that this bug occurs since this one was resolved: https://bugzilla.mozilla.org/show_bug.cgi?id=1514118

Component: Untriaged → Security: PSM
Product: Firefox → Core

security.enterprise_roots.enabled doesn't import client certificates, so this sounds like the expected behavior. Incidentally, if you use a recent nightly (https://www.mozilla.org/en-US/firefox/channel/desktop/) and set security.osclientcerts.autoload to true, does it work?

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #5)

security.enterprise_roots.enabled doesn't import client certificates, so this sounds like the expected behavior. Incidentally, if you use a recent nightly (https://www.mozilla.org/en-US/firefox/channel/desktop/) and set security.osclientcerts.autoload to true, does it work?

Yes it doesn't import it, but it should use it to authenticate
If I use a recent nightly and set security.osclientcerts.autoload to true, it still does not work

Flags: needinfo?(marius.tarlo)

When you visit the site, does Firefox ask you to select a client certificate? (what is the value of security.default_personal_cert in about:config?)

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #7)

When you visit the site, does Firefox ask you to select a client certificate? (what is the value of security.default_personal_cert in about:config?)

If I'm on a build which have the bug, it doesn't ask whether it's on "Ask every time" or "Select Automatically"
If I'm on a good build, it asks when it's on "Ask every time" and doesn't ask if it's on "Select Automatically"

Flags: needinfo?(marius.tarlo)

Can you run Firefox (both a working version and a not working version) with the environment variable MOZ_LOG set to pipnss:4, try to connect to the server, and attach the output here?

Flags: needinfo?(marius.tarlo)
Flags: needinfo?(marius.tarlo)
Attached file pipnss_log_working.txt

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #9)

Can you run Firefox (both a working version and a not working version) with the environment variable MOZ_LOG set to pipnss:4, try to connect to the server, and attach the output here?

Hello,

That's done

The file pipnss_log_working.txt has been generated using Nightly 67.0a1 build 20190201221223
The file pipnss_log_notworking.txt has been generated using Firefox 68.4.2esr

Can you re-do the not-working one with a recent Nightly, please. Thanks.

Flags: needinfo?(marius.tarlo)
Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #13)

Can you re-do the not-working one with a recent Nightly, please. Thanks.

Hello,
Done using Nightly 74.0a1 20200205215017

Is the certificate with CN=Tarlo Marius the one you're expecting Firefox to send to the server?

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #16)

Is the certificate with CN=Tarlo Marius the one you're expecting Firefox to send to the server?

I don't think
FYI, if I import the following one manually into a version where security.enterprise_roots.enabled doesn't work anymore, it make it work again:
'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR'

Flags: needinfo?(marius.tarlo)

(In reply to Marius Tarlo from comment #17)

FYI, if I import the following one manually into a version where security.enterprise_roots.enabled doesn't work anymore, it make it work again:
'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR'

Is that certificate stored on an external token or in the Windows Certificate Store?

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #18)

(In reply to Marius Tarlo from comment #17)

FYI, if I import the following one manually into a version where security.enterprise_roots.enabled doesn't work anymore, it make it work again:
'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR'

Is that certificate stored on an external token or in the Windows Certificate Store?

It's stored in the Windows Certificate Store

Flags: needinfo?(marius.tarlo)

Using a recent version of Nightly, if you unload your third-party PKCS#11 modules and set security.osclientcerts.autoload to true, what do the logs say? Also, do you know specifically where in the Windows Certificate Store your client certificate is? (e.g. "Local Computer", "Current User", etc.)

Flags: needinfo?(marius.tarlo)
Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #20)

Using a recent version of Nightly, if you unload your third-party PKCS#11 modules and set security.osclientcerts.autoload to true, what do the logs say? Also, do you know specifically where in the Windows Certificate Store your client certificate is? (e.g. "Local Computer", "Current User", etc.)

Hello,

I've just attached a new log file with what you've asked

And the 'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR' is in Trusted Root Certification Authorities --> Certificates, I can find it in both "Current User" and "Local Computer"

The priority flag is not set for this bug.
:keeler, could you have a look please?

For more information, please visit auto_nag documentation.

Flags: needinfo?(dkeeler)

What client certificate are you expecting Firefox to send to the server?

Flags: needinfo?(dkeeler) → needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #24)

What client certificate are you expecting Firefox to send to the server?

I don't know
I think it's the one I've mentioned above (Groupe France telecom Internal CA 1)

Flags: needinfo?(marius.tarlo)

The priority flag is not set for this bug.
:keeler, could you have a look please?

For more information, please visit auto_nag documentation.

Flags: needinfo?(dkeeler)
Flags: needinfo?(dkeeler)
Priority: -- → P3
Whiteboard: [psm-backlog][psm-smartcard]

(In reply to Marius Tarlo from comment #25)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #24)

What client certificate are you expecting Firefox to send to the server?

I don't know
I think it's the one I've mentioned above (Groupe France telecom Internal CA 1)

If I understand you correctly, what you're telling me is that the client certificate you're sending to a website to authenticate to it is a CA certificate (unless you're identifying that certificate by its issuer distinguished name? can you confirm that you're talking about its subject distinguished name?)

(In reply to Marius Tarlo from comment #22)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #20)

Also, do you know specifically where in the Windows Certificate Store your client certificate is? (e.g. "Local Computer", "Current User", etc.)

...

And the 'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR' is in Trusted Root Certification Authorities --> Certificates, I can find it in both "Current User" and "Local Computer"

Is the client certificate you're intending to use listed in Current User -> Personal -> Certificates? (or any other Personal -> Certificates section?)

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #27)

(In reply to Marius Tarlo from comment #25)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #24)

What client certificate are you expecting Firefox to send to the server?

I don't know
I think it's the one I've mentioned above (Groupe France telecom Internal CA 1)

If I understand you correctly, what you're telling me is that the client certificate you're sending to a website to authenticate to it is a CA certificate (unless you're identifying that certificate by its issuer distinguished name? can you confirm that you're talking about its subject distinguished name?)

(In reply to Marius Tarlo from comment #22)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #20)

Also, do you know specifically where in the Windows Certificate Store your client certificate is? (e.g. "Local Computer", "Current User", etc.)

...

And the 'CN=Groupe France Telecom Internal CA 1,OU=0002 380129866,OU=WesternEU MiddleEast Africa,O=France Telecom SA,C=FR' is in Trusted Root Certification Authorities --> Certificates, I can find it in both "Current User" and "Local Computer"

Is the client certificate you're intending to use listed in Current User -> Personal -> Certificates? (or any other Personal -> Certificates section?)

I'm sorry for the wrong previous comment
When I've my PKI token plugged, I actually have 4 certificates in my Current User -> Personal -> Certificates and they are issued by the one I've mentioned previously, three of them are for the secured mails and I think that the following one, which is for authentication and login using PKI token, is the one which is sent to the server :
subject: 0.9.2342.19200300.100.1.1 = XSRB2490 / CN = Tarlo Marius / O = France Telecom SA / C = FR
valid until 3rd of September 2022
hash algorithm: sha1

Flags: needinfo?(marius.tarlo)

subject: 0.9.2342.19200300.100.1.1 = XSRB2490 / CN = Tarlo Marius / O = France Telecom SA / C = FR

Looking at attachment 9127030 [details], Nightly is finding that certificate. Is it not using that in the handshake? (you can see what Firefox is sending in the handshake by looking at the packets with Wireshark)

Flags: needinfo?(marius.tarlo)

Hello,

How should I configure Wireshark to see that ?

Thank you very much

Flags: needinfo?(marius.tarlo)

Here's the documentation for Wireshark: https://www.wireshark.org/docs/wsug_html/
Basically, you'll want to capture on the interface you're communicating to the server with. You can limit the capture to only that host if you include the filter host <hostname> && port 443 (assuming you connect on port 443, the normal one for https). When you've started the capture and visited the host, you can use a display filter of tls.handshake to look for TLS handshake packets. If you look at a handshake, you should be able to determine if Firefox is sending a client certificate when the server requests one.

Flags: needinfo?(marius.tarlo)
Attached file Wireshark capture (obsolete) —
Flags: needinfo?(marius.tarlo)

Hello,

I've attached a capture.pcapng file

With both Firefox ESR 68.6.0 and Nightly 66.0a1 (2019-01-01) open, I first have tested on Firefox which has the bug, and then I have done the same on this old Nightly build where it works, both on the same Wireshark capture

I hope you'll find what you're searching for !

There's basically no way for me to differentiate which packets came from what version of Firefox. Can you please attach one packet trace at a time (one for each version). Also, before connecting to the site, use "History" -> "Clear Recent History" to clear the TLS cache (using "last hour" should work). Finally, it looks like the server may be requesting the client certificate after negotiating the handshake, which means that we can't actually see what's going on. If you run a debug version of Firefox, you can set the environment variable SSLKEYLOGFILE to a file path where Firefox will log all of the pre-master secrets for TLS connections. If you send me that file (you probably don't want to post it publicly here), it may give me a better idea of what's going on.

Flags: needinfo?(marius.tarlo)
Attached file firefox.pcapng
Flags: needinfo?(marius.tarlo)
Attached file nightly.pcapng
Attachment #9133122 - Attachment is obsolete: true

Hello,

I've attached 2 different captures in this bug and sent you the SSL Keylog file by e-mail

Best regards

I don't have anything from you in my email - where did you send it?

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #38)

I don't have anything from you in my email - where did you send it?

to dkeeler@mozilla.com, from marius.tarlo@orange.com

Flags: needinfo?(marius.tarlo)

Can you also get a packet trace with a recent version of Nightly? (ideally 76)

Flags: needinfo?(marius.tarlo)
Attached file recentnightly.pcapng
Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #40)

Can you also get a packet trace with a recent version of Nightly? (ideally 76)

Done!
With version 76.0a1 build 20200318213346

When the server in question requests a client certificate, it specifies a set of distinguished names of CAs that it presumably considers valid issuers for client certificates. The problem with this feature is that if the client isn't aware of the right CAs, it can discard client certificates that would otherwise be considered valid by the server. I'm fairly sure that this is what's going on in this case, particularly since bug 1514118 essentially hid some certificates from NSS, which is what's going the filtering (more specifically, the problem appears to be that NSS doesn't know about these certificates, and even if it did, it wouldn't consider them as trusted issuers unless they're marked as such, which they aren't). I have the beginnings of an idea for how to solve this in a way that doesn't involve too much work and doesn't compromise too much on the goals of bug 1514118, but I need more time to develop it.

Assignee: nobody → dkeeler
Priority: P3 → P1
Whiteboard: [psm-backlog][psm-smartcard] → [psm-assigned][psm-smartcard]

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #43)

When the server in question requests a client certificate, it specifies a set of distinguished names of CAs that it presumably considers valid issuers for client certificates. The problem with this feature is that if the client isn't aware of the right CAs, it can discard client certificates that would otherwise be considered valid by the server. I'm fairly sure that this is what's going on in this case, particularly since bug 1514118 essentially hid some certificates from NSS, which is what's going the filtering (more specifically, the problem appears to be that NSS doesn't know about these certificates, and even if it did, it wouldn't consider them as trusted issuers unless they're marked as such, which they aren't). I have the beginnings of an idea for how to solve this in a way that doesn't involve too much work and doesn't compromise too much on the goals of bug 1514118, but I need more time to develop it.

OK thank you very much, I hope you now have everything you need to start to work on that !

When a server requests a client certificate, it can include a list of
distinguished names that it considers valid issuers for client certificates
(either as direct issuers or as transitive issuers). Before this patch, the
platform would call CERT_FilterCertListByCANames to filter potential client
certificates by this list of names. This function uses the "classic" NSS
certificate path-building algorithm and thus can't make use of other
certificates that gecko may know about, such as third-party intermediates and
preloaded intermediates.

This patch implements client certificate filtering by re-using the path building
implementation provided by mozilla::pkix to determine if each certificate has an
issuer with a name included in the acceptable list. These issuers include
third-party intermediates, preloaded intermediates, and all certificates known
to NSS. Note that this implementation does not actually verify the client
certificates - no signatures are checked and no particular key usages are
enforced. However, some properties are enforced, such as validity periods.

Depends on D68100

Pushed by dkeeler@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/a11a2f9e10c6
(1/2) simplify flow of client auth certificate selection to enable future improvements r=kjacobs
https://hg.mozilla.org/integration/autoland/rev/90b7c55d811d
(2/2) incorporate all known potential issuing certificates when filtering client certificates r=kjacobs,jcj
Backout by btara@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/32bd6417e7ee
Backed out 2 changesets for bustages complaining about Logging.h CLOSED TREE

Backed out 2 changesets (bug 1612587) for bustages complaining about Logging.h

Push with failures: https://treeherder.mozilla.org/#/jobs?repo=autoland&searchStr=build&tochange=32bd6417e7ee31df9f3fa406b918bad96c946d9e&fromchange=d87c15bc2a08000dc928db241cf767cb5f037d8c&selectedJob=295138408

Backout link: https://hg.mozilla.org/integration/autoland/rev/32bd6417e7ee31df9f3fa406b918bad96c946d9e

Failure log: https://treeherder.mozilla.org/logviewer.html#/jobs?job_id=295138408&repo=autoland&lineNumber=32301

[task 2020-03-27T23:11:28.342Z] 23:11:28     INFO -  make[4]: Entering directory '/builds/worker/workspace/obj-build/security/manager/ssl'
[task 2020-03-27T23:11:28.343Z] 23:11:28     INFO -  /builds/worker/fetches/sccache/sccache /builds/worker/fetches/gcc/bin/g++ -std=gnu++17 -o Unified_cpp_security_manager_ssl2.o -c  -I/builds/worker/workspace/obj-build/dist/stl_wrappers -I/builds/worker/workspace/obj-build/dist/system_wrappers -include /builds/worker/checkouts/gecko/config/gcc_hidden.h -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -fstack-protector-strong -DNDEBUG=1 -DTRIMMED=1 -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES=True -DNSS_ENABLE_ECC=True -DOS_POSIX=1 -DOS_LINUX=1 -DMOZ_HAS_MOZGLUE -DMOZILLA_INTERNAL_API -DIMPL_LIBXUL -DSTATIC_EXPORTABLE_JS_API -I/builds/worker/checkouts/gecko/security/manager/ssl -I/builds/worker/workspace/obj-build/security/manager/ssl -I/builds/worker/checkouts/gecko/dom/base -I/builds/worker/checkouts/gecko/dom/crypto -I/builds/worker/checkouts/gecko/netwerk/base -I/builds/worker/checkouts/gecko/security/certverifier -I/builds/worker/workspace/obj-build/dist/public/nss -I/builds/worker/workspace/obj-build/ipc/ipdl/_ipdlheaders -I/builds/worker/checkouts/gecko/ipc/chromium/src -I/builds/worker/checkouts/gecko/ipc/glue -I/builds/worker/workspace/obj-build/dist/include -I/builds/worker/workspace/obj-build/dist/include/nspr -I/builds/worker/workspace/obj-build/dist/include/nss -fPIC -DMOZILLA_CLIENT -include /builds/worker/workspace/obj-build/mozilla-config.h -Wall -Wempty-body -Wignored-qualifiers -Woverloaded-virtual -Wpointer-arith -Wsign-compare -Wtype-limits -Wunreachable-code -Wwrite-strings -Wno-invalid-offsetof -Wduplicated-cond -Wimplicit-fallthrough -Wunused-function -Wunused-variable -Wno-error=maybe-uninitialized -Wno-error=deprecated-declarations -Wno-error=array-bounds -Wno-error=coverage-mismatch -Wno-error=free-nonheap-object -Wformat -Wformat-overflow=2 -D_GLIBCXX_USE_CXX11_ABI=0 -fno-sized-deallocation -fno-aligned-new -fno-exceptions -fno-strict-aliasing -fno-rtti -ffunction-sections -fdata-sections -fno-exceptions -fno-math-errno -pthread -pipe -g -freorder-blocks -O2 -fno-omit-frame-pointer -funwind-tables -Werror -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -Wextra -Wno-missing-field-initializers -Wno-unused-parameter  -MD -MP -MF .deps/Unified_cpp_security_manager_ssl2.o.pp   Unified_cpp_security_manager_ssl2.cpp
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -  In file included from /builds/worker/workspace/obj-build/dist/include/mozilla/BlockingResourceBase.h:10:0,
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -                   from /builds/worker/workspace/obj-build/dist/include/mozilla/Mutex.h:10,
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -                   from /builds/worker/checkouts/gecko/security/certverifier/OCSPCache.h:29,
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -                   from /builds/worker/checkouts/gecko/security/certverifier/CertVerifier.h:14,
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -                   from /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSCertificate.cpp:8,
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -                   from Unified_cpp_security_manager_ssl2.cpp:11:
[task 2020-03-27T23:11:28.344Z] 23:11:28     INFO -  /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp: In member function 'virtual void ClientAuthDataRunnable::RunOnTargetThread()':
[task 2020-03-27T23:11:28.350Z] 23:11:28    ERROR -  /builds/worker/workspace/obj-build/dist/include/mozilla/Logging.h:281:61: error: format '%u' expects argument of type 'unsigned int', but argument 4 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:11:28.351Z] 23:11:28     INFO -                                      MOZ_LOG_EXPAND_ARGS _args); \
[task 2020-03-27T23:11:28.351Z] 23:11:28     INFO -                                                               ^
[task 2020-03-27T23:11:28.351Z] 23:11:28     INFO -  /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -         MOZ_LOG(
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -         ^
[task 2020-03-27T23:11:28.352Z] 23:11:28    ERROR -  /builds/worker/workspace/obj-build/dist/include/mozilla/Logging.h:281:61: error: format '%u' expects argument of type 'unsigned int', but argument 5 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -                                      MOZ_LOG_EXPAND_ARGS _args); \
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -                                                               ^
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -  /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:11:28.352Z] 23:11:28     INFO -         MOZ_LOG(
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -         ^
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -  cc1plus: all warnings being treated as errors
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -  /builds/worker/checkouts/gecko/config/rules.mk:750: recipe for target 'Unified_cpp_security_manager_ssl2.o' failed
[task 2020-03-27T23:11:28.353Z] 23:11:28    ERROR -  make[4]: *** [Unified_cpp_security_manager_ssl2.o] Error 1
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -  make[4]: Leaving directory '/builds/worker/workspace/obj-build/security/manager/ssl'
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -  make[4]: *** Waiting for unfinished jobs....
[task 2020-03-27T23:11:28.353Z] 23:11:28     INFO -  make[4]: Entering directory '/builds/worker/workspace/obj-build/toolkit/components/browser'
Flags: needinfo?(dkeeler)

Also seeing hazard failures starting with the backed out changesets.

https://treeherder.mozilla.org/logviewer.html#/jobs?job_id=295138402&repo=autoland&lineNumber=51294

[task 2020-03-27T23:44:40.203Z] 46:25.49 toolkit/components/downloads/DownloadPlatform.o
[task 2020-03-27T23:44:40.203Z] 46:25.49 make[4]: Leaving directory '/builds/worker/checkouts/gecko/obj-analyzed/toolkit/components/downloads'
[task 2020-03-27T23:44:40.228Z] Received connection.
[task 2020-03-27T23:44:47.077Z] 46:32.37 make[4]: Entering directory '/builds/worker/checkouts/gecko/obj-analyzed/security/manager/ssl'
[task 2020-03-27T23:44:47.077Z] 46:32.37 /builds/worker/fetches/sixgill/usr/libexec/sixgill/scripts/wrap_gcc/basecc /builds/worker/fetches/sixgill/usr/libexec/sixgill/scripts/wrap_gcc/g++ -std=gnu++17 -o Unified_cpp_security_manager_ssl2.o -c  -I/builds/worker/checkouts/gecko/obj-analyzed/dist/stl_wrappers -I/builds/worker/checkouts/gecko/obj-analyzed/dist/system_wrappers -include /builds/worker/checkouts/gecko/config/gcc_hidden.h -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -fstack-protector-strong -DDEBUG=1 -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES=True -DNSS_ENABLE_ECC=True -DOS_POSIX=1 -DOS_LINUX=1 -DMOZ_HAS_MOZGLUE -DMOZILLA_INTERNAL_API -DIMPL_LIBXUL -DSTATIC_EXPORTABLE_JS_API -I/builds/worker/checkouts/gecko/security/manager/ssl -I/builds/worker/checkouts/gecko/obj-analyzed/security/manager/ssl -I/builds/worker/checkouts/gecko/dom/base -I/builds/worker/checkouts/gecko/dom/crypto -I/builds/worker/checkouts/gecko/netwerk/base -I/builds/worker/checkouts/gecko/security/certverifier -I/builds/worker/checkouts/gecko/obj-analyzed/dist/public/nss -I/builds/worker/checkouts/gecko/obj-analyzed/ipc/ipdl/_ipdlheaders -I/builds/worker/checkouts/gecko/ipc/chromium/src -I/builds/worker/checkouts/gecko/ipc/glue -I/builds/worker/checkouts/gecko/obj-analyzed/dist/include -I/builds/worker/checkouts/gecko/obj-analyzed/dist/include/nspr -I/builds/worker/checkouts/gecko/obj-analyzed/dist/include/nss -fPIC -DMOZILLA_CLIENT -include /builds/worker/checkouts/gecko/obj-analyzed/mozilla-config.h -Wno-attributes -Wno-ignored-attributes -Wno-attributes -Wno-ignored-attributes -Wall -Wempty-body -Wignored-qualifiers -Woverloaded-virtual -Wpointer-arith -Wsign-compare -Wtype-limits -Wunreachable-code -Wwrite-strings -Wno-invalid-offsetof -Wduplicated-cond -Wimplicit-fallthrough -Wunused-function -Wunused-variable -Wno-error=maybe-uninitialized -Wno-error=deprecated-declarations -Wno-error=array-bounds -Wno-error=coverage-mismatch -Wno-error=free-nonheap-object -Wno-multistatement-macros -Wno-error=class-memaccess -Wformat -Wformat-overflow=2 -fno-sized-deallocation -fno-aligned-new -Wno-attributes -Wno-ignored-attributes -Wno-attributes -Wno-ignored-attributes -fno-exceptions -fno-strict-aliasing -fno-rtti -ffunction-sections -fdata-sections -fno-exceptions -fno-math-errno -pthread -pipe -g -freorder-blocks -Os -fno-omit-frame-pointer -funwind-tables -Werror -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -Wextra -Wno-missing-field-initializers -Wno-unused-parameter  -MD -MP -MF .deps/Unified_cpp_security_manager_ssl2.o.pp   Unified_cpp_security_manager_ssl2.cpp
[task 2020-03-27T23:44:47.077Z] 46:32.37 In file included from /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/BlockingResourceBase.h:10,
[task 2020-03-27T23:44:47.077Z] 46:32.37                  from /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Mutex.h:10,
[task 2020-03-27T23:44:47.077Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/certverifier/OCSPCache.h:29,
[task 2020-03-27T23:44:47.077Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/certverifier/CertVerifier.h:14,
[task 2020-03-27T23:44:47.077Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSCertificate.cpp:8,
[task 2020-03-27T23:44:47.077Z] 46:32.37                  from Unified_cpp_security_manager_ssl2.cpp:11:
[task 2020-03-27T23:44:47.077Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp: In member function 'virtual void ClientAuthDataRunnable::RunOnTargetThread()':
[task 2020-03-27T23:44:47.079Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2118:12: error: format '%u' expects argument of type 'unsigned int', but argument 4 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:44:47.079Z] 46:32.37            ("client cert non-validation returned %u %u\n", eeResult, caResult));
[task 2020-03-27T23:44:47.079Z] 46:32.37             ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  ~~~~~~~~
[task 2020-03-27T23:44:47.079Z] 46:32.37 /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Logging.h:218:34: note: in definition of macro 'MOZ_LOG_EXPAND_ARGS'
[task 2020-03-27T23:44:47.079Z] 46:32.37  #define MOZ_LOG_EXPAND_ARGS(...) __VA_ARGS__
[task 2020-03-27T23:44:47.079Z] 46:32.37                                   ^~~~~~~~~~~
[task 2020-03-27T23:44:47.079Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:44:47.079Z] 46:32.37        MOZ_LOG(
[task 2020-03-27T23:44:47.080Z] 46:32.37        ^~~~~~~
[task 2020-03-27T23:44:47.080Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2118:12: error: format '%u' expects argument of type 'unsigned int', but argument 5 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:44:47.080Z] 46:32.37            ("client cert non-validation returned %u %u\n", eeResult, caResult));
[task 2020-03-27T23:44:47.080Z] 46:32.37             ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~            ~~~~~~~~
[task 2020-03-27T23:44:47.080Z] 46:32.37 /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Logging.h:218:34: note: in definition of macro 'MOZ_LOG_EXPAND_ARGS'
[task 2020-03-27T23:44:47.080Z] 46:32.37  #define MOZ_LOG_EXPAND_ARGS(...) __VA_ARGS__
[task 2020-03-27T23:44:47.080Z] 46:32.37                                   ^~~~~~~~~~~
[task 2020-03-27T23:44:47.080Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:44:47.081Z] 46:32.37        MOZ_LOG(
[task 2020-03-27T23:44:47.081Z] 46:32.37        ^~~~~~~
[task 2020-03-27T23:44:47.081Z] 46:32.37 cc1plus: all warnings being treated as errors
[task 2020-03-27T23:44:47.081Z] 46:32.37 In file included from /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/BlockingResourceBase.h:10,
[task 2020-03-27T23:44:47.081Z] 46:32.37                  from /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Mutex.h:10,
[task 2020-03-27T23:44:47.081Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/certverifier/OCSPCache.h:29,
[task 2020-03-27T23:44:47.081Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/certverifier/CertVerifier.h:14,
[task 2020-03-27T23:44:47.081Z] 46:32.37                  from /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSCertificate.cpp:8,
[task 2020-03-27T23:44:47.081Z] 46:32.37                  from Unified_cpp_security_manager_ssl2.cpp:11:
[task 2020-03-27T23:44:47.082Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp: In member function 'virtual void ClientAuthDataRunnable::RunOnTargetThread()':
[task 2020-03-27T23:44:47.082Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2118:12: error: format '%u' expects argument of type 'unsigned int', but argument 4 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:44:47.082Z] 46:32.37            ("client cert non-validation returned %u %u\n", eeResult, caResult));
[task 2020-03-27T23:44:47.082Z] 46:32.37             ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  ~~~~~~~~
[task 2020-03-27T23:44:47.082Z] 46:32.37 /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Logging.h:218:34: note: in definition of macro 'MOZ_LOG_EXPAND_ARGS'
[task 2020-03-27T23:44:47.082Z] 46:32.37  #define MOZ_LOG_EXPAND_ARGS(...) __VA_ARGS__
[task 2020-03-27T23:44:47.082Z] 46:32.37                                   ^~~~~~~~~~~
[task 2020-03-27T23:44:47.082Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:44:47.082Z] 46:32.37        MOZ_LOG(
[task 2020-03-27T23:44:47.082Z] 46:32.37        ^~~~~~~
[task 2020-03-27T23:44:47.082Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2118:12: error: format '%u' expects argument of type 'unsigned int', but argument 5 has type 'mozilla::pkix::Result' [-Werror=format=]
[task 2020-03-27T23:44:47.082Z] 46:32.37            ("client cert non-validation returned %u %u\n", eeResult, caResult));
[task 2020-03-27T23:44:47.083Z] 46:32.37             ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~            ~~~~~~~~
[task 2020-03-27T23:44:47.084Z] 46:32.37 /builds/worker/checkouts/gecko/obj-analyzed/dist/include/mozilla/Logging.h:218:34: note: in definition of macro 'MOZ_LOG_EXPAND_ARGS'
[task 2020-03-27T23:44:47.084Z] 46:32.37  #define MOZ_LOG_EXPAND_ARGS(...) __VA_ARGS__
[task 2020-03-27T23:44:47.085Z] 46:32.37                                   ^~~~~~~~~~~
[task 2020-03-27T23:44:47.085Z] 46:32.37 /builds/worker/checkouts/gecko/security/manager/ssl/nsNSSIOLayer.cpp:2116:7: note: in expansion of macro 'MOZ_LOG'
[task 2020-03-27T23:44:47.085Z] 46:32.37        MOZ_LOG(
[task 2020-03-27T23:44:47.085Z] 46:32.37        ^~~~~~~
[task 2020-03-27T23:44:47.085Z] 46:32.37 cc1plus: all warnings being treated as errors
[task 2020-03-27T23:44:47.085Z] 46:32.37 /builds/worker/checkouts/gecko/config/rules.mk:750: recipe for target 'Unified_cpp_security_manager_ssl2.o' failed
[task 2020-03-27T23:44:47.085Z] 46:32.37 make[4]: *** [Unified_cpp_security_manager_ssl2.o] Error 1
[task 2020-03-27T23:44:47.085Z] 46:32.37 make[4]: Leaving directory '/builds/worker/checkouts/gecko/obj-analyzed/security/manager/ssl'
[task 2020-03-27T23:44:47.085Z] 46:32.37 make[4]: *** Waiting for unfinished jobs....
[task 2020-03-27T23:44:47.085Z] 46:32.37 make[4]: Entering directory '/builds/worker/checkouts/gecko/obj-analyzed/toolkit/components/extensions'
[task 2020-03-27T23:44:47.085Z] 46:32.37 mkdir -p '.deps/'
[task 2020-03-27T23:44:47.085Z] 46:32.37 make[4]: Leaving directory '/builds/worker/checkouts/gecko/obj-analyzed/toolkit/components/extensions'
[task 2020-03-27T23:44:47.087Z] 46:32.38 make[4]: Entering directory '/builds/worker/checkouts/gecko/obj-analyzed/toolkit/components/extensions'
[task 2020-03-27T23:44:47.087Z] 46:32.38 toolkit/components/extensions/Unified_cpp_extensions0.o
[task 2020-03-27T23:44:47.087Z] 46:32.38 make[4]: Leaving directory '/builds/worker/checkouts/gecko/obj-analyzed/toolkit/components/extensions'

Also seeing a Test Verify failure starting with the backed out changes:
https://treeherder.mozilla.org/logviewer.html#/jobs?job_id=295141339&repo=autoland&lineNumber=1982

[task 2020-03-27T23:22:17.438Z] 23:22:17     INFO - Entering test bound testCertChosenAutomatically
[task 2020-03-27T23:22:17.438Z] 23:22:17     INFO - old state: ASSERT_NOT_CALLED
[task 2020-03-27T23:22:17.441Z] 23:22:17     INFO - new state: ASSERT_NOT_CALLED
[task 2020-03-27T23:22:17.442Z] 23:22:17     INFO - Buffered messages logged at 23:22:15
[task 2020-03-27T23:22:17.442Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Expected and actual URLs should match (got 'https://requireclientcert.example.com/', expected 'https://requireclientcert.example.com/') - true == true - 
[task 2020-03-27T23:22:17.442Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | chooseCertificate should have been called if we were expecting it to be called - false == false - 
[task 2020-03-27T23:22:17.442Z] 23:22:17     INFO - Leaving test bound testCertChosenAutomatically
[task 2020-03-27T23:22:17.443Z] 23:22:17     INFO - Entering test bound testCertNotChosenByUser
[task 2020-03-27T23:22:17.443Z] 23:22:17     INFO - old state: ASSERT_NOT_CALLED
[task 2020-03-27T23:22:17.443Z] 23:22:17     INFO - new state: RETURN_CERT_NOT_SELECTED
[task 2020-03-27T23:22:17.443Z] 23:22:17     INFO - Buffered messages logged at 23:22:16
[task 2020-03-27T23:22:17.445Z] 23:22:17     INFO - Console message: [JavaScript Error: "TypeError: can't access property "messageManager", this.docShell is null" {file: "resource:///actors/LightweightThemeChild.jsm" line: 28}]
[task 2020-03-27T23:22:17.445Z] 23:22:17     INFO - Buffered messages logged at 23:22:17
[task 2020-03-27T23:22:17.446Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | chooseCertificate() should be called only when expected - "RETURN_CERT_NOT_SELECTED" != "ASSERT_NOT_CALLED" - 
[task 2020-03-27T23:22:17.446Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Hostname should be 'requireclientcert.example.com' - "requireclientcert.example.com" == "requireclientcert.example.com" - 
[task 2020-03-27T23:22:17.447Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Port should be 443 - 443 == 443 - 
[task 2020-03-27T23:22:17.447Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Server cert Organization should be empty/not present - "" == "" - 
[task 2020-03-27T23:22:17.447Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Server cert issuer Organization should be 'Mozilla Testing' - "Mozilla Testing" == "Mozilla Testing" - 
[task 2020-03-27T23:22:17.451Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Cert list should not be null - {"QueryInterface":"function QueryInterface() {\n    [native code]\n}","length":3,"queryElementAt":"function queryElementAt() {\n    [native code]\n}","indexOf":"function indexOf() {\n    [native code]\n}","enumerate":"function enumerate() {\n    [native code]\n}"} != null - 
[task 2020-03-27T23:22:17.452Z] 23:22:17     INFO - Buffered messages finished
[task 2020-03-27T23:22:17.452Z] 23:22:17     INFO - TEST-UNEXPECTED-FAIL | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | 2 certificates should be available - 3 == 2 - JS frame :: chrome://mochitests/content/browser/security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js :: chooseCertificate :: line 98
[task 2020-03-27T23:22:17.452Z] 23:22:17     INFO - Stack trace:
[task 2020-03-27T23:22:17.452Z] 23:22:17     INFO - chrome://mochitests/content/browser/security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js:chooseCertificate:98
[task 2020-03-27T23:22:17.456Z] 23:22:17     INFO - TEST-PASS | security/manager/ssl/tests/mochitest/browser/browser_clientAuth_connection.js | Cert list should contain nsIX509Certs - {"emailAddress":"(no email address)","isBuiltInRoot":false,"getEmailAddresses":"function getEmailAddresses() {\n    [native code]\n}","containsEmailAddress":"function containsEmailAddress() {\n    [native code]\n}","subjectName":"CN=Mochitest client","subjectAltNames":"","commonName":"Mochitest client","organization":"","organizationalUnit":"","sha256Fingerprint":"D6:DD:7A:73:77:CB:0F:E3:E2:50:F9:1B:2B:BF:D6:45:61:62:2B:18:38:B1:9B:A5:BF:ED:67:C6:7C:FF:8D:C8","sha1Fingerprint":"E5:FF:C7:C2:0F:54:37:4B:EC:D6:E8:5D:2A:44:FC:18:5F:B4:81:15","tokenName":"Software Security Device","issuerName":"OU=Profile Guided Optimization,O=Mozilla Testing,CN=Temporary Certificate Authority","serialNumber":"03","issuerCommonName":"Temporary Certificate Authority","issuerOrganization":"Mozilla Testing","issuerOrganizationUnit":"Profile Guided Optimization","validity":{"QueryInterface":"function QueryInterface() {\n    [native code]\n}","notBefore":1543276800000000,"notBeforeLocalTime":"November 27, 2018, 12:00:00 AM GMT","notBeforeLocalDay":"November 27, 2018","notBeforeGMT":"November 27, 2018, 12:00:00 AM GMT","notAfter":1612396800000000,"notAfterLocalTime":"February 4, 2021, 12:00:00 AM GMT","notAfterLocalDay":"February 4, 2021","notAfterGMT":"February 4, 2021, 12:00:00 AM GMT"},"dbKey":"AAAAAAAAAAAAAAABAAAAbAMwajEoMCYGA1UEAxMfVGVtcG9yYXJ5IENlcnRpZmljYXRlIEF1dGhvcml0eTEYMBYGA1UEChMPTW96aWxsYSBUZXN0aW5nMSQwIgYDVQQLExtQcm9maWxlIEd1aWRlZCBPcHRpbWl6YXRpb24=","displayName":"Mochitest client","certType":2,"isSelfSigned":false,"keyUsages":"","ASN1Structure":{"QueryInterface":"function QueryInterface() {\n    [native code]\n}","type":0,"tag":0,"displayName":"Mochitest client","displayValue":"","ASN1_END_CONTENTS":0,"ASN1_BOOLEAN":1,"ASN1_INTEGER":2,"ASN1_BIT_STRING":3,"ASN1_OCTET_STRING":4,"ASN1_NULL":5,"ASN1_OBJECT_ID":6,"ASN1_ENUMERATED":10,"ASN1_UTF8_STRING":12,"ASN1_SEQUENCE":16,"ASN1_SET":17,"ASN1_PRINTABLE_STRING":19,"ASN1_T61_STRING":20,"ASN1_IA5_STRING":22,"ASN1_UTC_TIME":23,"ASN1_GEN_TIME":24,"ASN1_VISIBLE_STRING":26,"ASN1_UNIVERSAL_STRING":28,"ASN1_BMP_STRING":30,"ASN1_HIGH_TAG_NUMBER":31,"ASN1_CONTEXT_SPECIFIC":32,"ASN1_APPLICATION":33,"ASN1_PRIVATE":34},"getRawDER":"function getRawDER() {\n    [native code]\n}","getBase64DERString":"function getBase64DERString() {\n    [native code]\n}","equals":"function equals() {\n    [native code]\n}","sha256SubjectPublicKeyInfoDigest":"VCIlmPM9NkgFQtrs4Oa5TeFcDu6MWRTKSNdePEhOgD8=","markForPermDeletion":"function markForPermDeletion() {\n    [native code]\n}","UNKNOWN_CERT":0,"CA_CERT":1,"USER_CERT":2,"EMAIL_CERT":4,"SERVER_CERT":8,"ANY_CERT":65535} != null - 

I'll re-land this next week after the merge.

Flags: needinfo?(dkeeler)
Pushed by dkeeler@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/71db6e900a94
(1/2) simplify flow of client auth certificate selection to enable future improvements r=kjacobs
https://hg.mozilla.org/integration/autoland/rev/0df99ee3b674
(2/2) incorporate all known potential issuing certificates when filtering client certificates r=kjacobs,jcj

Backed out for causing mochitest failures on test_bug466080.html.

Push with failures: https://treeherder.mozilla.org/#/jobs?repo=autoland&group_state=expanded&selectedJob=296513324&resultStatus=testfailed%2Cbusted%2Cexception&searchStr=android%2C7.0%2Cx86-64%2Copt%2Cmochitests%2Ctest-android-em-7.0-x86_64%2Fopt-geckoview-mochitest-plain-e10s-1%2Cm%281%29&revision=0df99ee3b6745604dfb0ad5dbe8998447a7b36b4

Failure log: https://treeherder.mozilla.org/logviewer.html#?job_id=296513324&repo=autoland

Backout link: https://hg.mozilla.org/integration/autoland/rev/b49a548d507c01610f8d4c2c902b911273e77b5f

[task 2020-04-06T22:34:31.973Z] 22:34:31     INFO -  386 INFO TEST-OK | dom/base/test/test_bug465767.html | took 68ms
[task 2020-04-06T22:34:31.973Z] 22:34:31     INFO -  387 INFO TEST-START | dom/base/test/test_bug466080.html
[task 2020-04-06T22:40:01.792Z] 22:40:01     INFO -  processing:blockOn=A&body=runFirst();
[task 2020-04-06T22:40:01.792Z] 22:40:01     INFO -  processing:blockOn=B&body=runSecond();
[task 2020-04-06T22:40:01.792Z] 22:40:01     INFO -  processing:blockOn=C&body=runThird();
[task 2020-04-06T22:40:01.815Z] 22:40:01     INFO -  processing:unblock=A
[task 2020-04-06T22:40:01.830Z] 22:40:01     INFO -  processing:unblock=C
[task 2020-04-06T22:40:01.860Z] 22:40:01     INFO -  processing:unblock=B
[task 2020-04-06T22:40:02.085Z] 22:40:02     INFO -  processing:blockOn=R&body=runFirst();
[task 2020-04-06T22:40:02.086Z] 22:40:02     INFO -  processing:blockOn=S&body=runThird();
[task 2020-04-06T22:40:02.087Z] 22:40:02     INFO -  processing:blockOn=T&body=runForth();
[task 2020-04-06T22:40:02.090Z] 22:40:02     INFO -  processing:unblock=R
[task 2020-04-06T22:40:02.092Z] 22:40:02     INFO -  processing:unblock=S
[task 2020-04-06T22:40:02.135Z] 22:40:02     INFO -  processing:unblock=T
[task 2020-04-06T22:40:07.220Z] 22:40:07  WARNING -  388 INFO TEST-UNEXPECTED-FAIL | dom/base/test/test_bug466080.html | Test timed out.
[task 2020-04-06T22:40:07.221Z] 22:40:07     INFO -      SimpleTest.ok@SimpleTest/SimpleTest.js:299:16
[task 2020-04-06T22:40:07.221Z] 22:40:07     INFO -      reportError@SimpleTest/TestRunner.js:128:22
[task 2020-04-06T22:40:07.221Z] 22:40:07     INFO -      TestRunner._checkForHangs@SimpleTest/TestRunner.js:150:18
[task 2020-04-06T22:40:07.221Z] 22:40:07     INFO -  389 INFO TEST-OK | dom/base/test/test_bug466080.html | took 330000ms
Flags: needinfo?(dkeeler)

Bugbug thinks this bug is a regression, but please revert this change in case of error.

Keywords: regression
Flags: needinfo?(dkeeler)
Pushed by dkeeler@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/7da361784a24
(1/2) simplify flow of client auth certificate selection to enable future improvements r=kjacobs
https://hg.mozilla.org/integration/autoland/rev/5b42186a46c8
(2/2) incorporate all known potential issuing certificates when filtering client certificates r=kjacobs,jcj
Status: UNCONFIRMED → RESOLVED
Closed: 1 year ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla77

Marius, does the latest version of Nightly work for you?

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #58)

Marius, does the latest version of Nightly work for you?

Hello Dana,

I've still got an issue with the latest Nightly but it's not the same behavior than with the previous:
"An error occurred during a connection to bastion1.rd.francetelecom.fr. Peer does not recognize and trust the CA that issued your certificate.

Error code: SSL_ERROR_UNKNOWN_CA_ALERT"

Flags: needinfo?(marius.tarlo)

(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #60)

Thanks! Can you try this build out? https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/Udtk7ebMRn2_tYmx2IL9JA/runs/0/artifacts/public/build/install/sea/target.installer.exe

Yes, it works perfectly fine now, thank you very much!

Flags: needinfo?(marius.tarlo)

Great! I'll get that landed in bug 1630473 since that seems to be the same issue.

Regressions: 1631404
Duplicate of this bug: 1613415
Depends on: 1634065
You need to log in before you can comment on or make changes to this bug.