Closed Bug 399019 Opened 17 years ago Closed 11 years ago

biglumber.com - fails to load due to incomplete certificate chain

Categories

(Tech Evangelism Graveyard :: Other, defect)

defect
Not set
major

Tracking

(Not tracked)

RESOLVED INVALID

People

(Reporter: jmjjeffery, Unassigned)

References

()

Details

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9a9pre) Gecko/2007100804 Minefield/3.0a9pre Firefox/3.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9a9pre) Gecko/2007100804 Minefield/3.0a9pre Firefox/3.0 Try to go to URL, and you get a warning page: Secure Connection Failed An error occurred during a connection to www.biglumber.com:443 because it uses an invalid security certificate. The certificate is not trusted or its issuer certificate is invalid. (sec_error_unknown_issuer) * The page you are trying to view can not be shown because the authenticity of the received data could not be verified. * Please contact the web site owners to inform them of this problem. Alternatively, use the command found in the help menu to report this broken site. Reproducible: Always Steps to Reproduce: 1. Go to URL 2. Receive error page. 3. Actual Results: Blocked Expected Results: Page should load. Snip from convo on IRC with bz bz_sleep> maybe we don't have "Go Daddy" in our CA database? <bz_sleep> and IE does? <bz_sleep> ah <ssieb_roam> and what about all the self-signed certs? <bz_sleep> I see <bz_sleep> ssieb_roam: the claim (true, fwiw) is that they are equivalent to no cert at all <bz_sleep> ssieb_roam: from a security perspective <ssieb_roam> other than the connection is encrypted <bz_sleep> true <ssieb_roam> which is generally the whole point <bz_sleep> people seem to not care or something * bz_sleep sort of gave up on trying to talk sense into the ssl cartel <bz> in any case, last I checeked IE7 dropped those too <bz> Littlemutt_afk: actually, hold <Littlemutt_afk> ok =-= YOU are now known as Littlemutt [INFO] You are no longer marked as away. <bz> Littlemutt_afk: it looks like that CA has been added to NSS... <bz> er.. <bz> except that was in 2005 <ssieb_roam> wow, that is going to cause a lot of trouble... <bz> so yeah <bz> file, please <bz> that should be working <bz> but isn't <bz> and it's not in my CA store <bz> and should be <Littlemutt> ok <bz> ssieb_roam: yes, yes it will <bz> wait <bz> so.... <bz> we do have Go Daddy in our stuff <bz> one sec... <bz> uh <bz> this cert on biglumber.com doesn't seem to have a trust chain? * bz double-checks <bz> yeah <bz> no trust chain <bz> so we don't accept it <bz> Littlemutt: still file the bug <Littlemutt> k <bz> Littlemutt: I'm not sure why it works in IE, but I seem to recall something like this <bz> Littlemutt: either we need to have better compat, or do evang, or something < Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9a9pre) Gecko/2007100804 Minefield/3.0a9pre Firefox/3.0 ID:2007100804
Severity: normal → blocker
Version: unspecified → Trunk
Flags: blocking-firefox3?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.7) Gecko/20070914 Confirming. Interestingly this is no issue when visiting https://www.godaddy.com/ first - before there's no trust chain, afterwards there is.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Component: Security → Security: PSM
Flags: blocking-firefox3?
Product: Firefox → Core
Over to the right place. Oh, and it would be nice if the error message here were useful or something. I have a hard time believing NSS doesn't report the exact failure cause.
Assignee: nobody → kengert
Severity: blocker → major
Keywords: regression
OS: Windows Vista → All
QA Contact: firefox → psm
Hardware: PC → All
Summary: Receive warning about bad-cert → Unable to load site that IE can load
This is a misconfigured server, not compliant with the relevant internet standards. This server is sending out an incomplete certificate chain. This is not a regression. Mozilla products have always required a complete cert chain, leading up to (not necessarily including) a trusted root CA cert.
Status: NEW → RESOLVED
Closed: 17 years ago
Keywords: regression
Resolution: --- → INVALID
It's strange that it works if you've visited https://www.godaddy.com/ first. I bet that behavior confuses web developers and makes them think their site works when it really doesn't. Should we make it fail in that case too?
Summary: Unable to load site that IE can load → Unable to load site that IE can load (incomplete certificate chain)
(In reply to comment #4) > It's strange that it works if you've visited https://www.godaddy.com/ first. I > bet that behavior confuses web developers and makes them think their site works > when it really doesn't. Should we make it fail in that case too? Your proposal seems reasonable. I think it works, because we are caching the intermediate certificate somewhere. But I wonder, WHERE are we caching it? Does NSS keep an in-memory-only cache of intermediate certs it sees? Or is it more likely the cert is referenced by PSM and therefore still available in the in-memory-only db (temp db)?
The fact that PSM sometimes remembers CA certs for the lifetime of a FireFox process is the subject of Bug 298467. Perhaps that bug should be reopened. Note that, AFAIK, this no longer occurs in SeaMonkey. That makes me suspect a leak that is actually not in PSM, but in the application code somewhere.
Actually, bug 298467 is about leaked Server certs, not leaked CA certs. I made that same mistake before (see bug 298467 comment 3). Sorry. So, let's file a NEW bug about the fact that PSM seems to remember CA certs for the process lifetime (which may be a reference leak) in FireFox. One way this can happen (apparently leaked references to in-memory certs) is explained in bug 298467 comment 2.
I filed Bug 399045 about the apparent cert reference leak that causes intermediate CA certs to be remembered for the lifetime of a FireFox process.
The fact of the matter is, IE can load this site. We can't. We used to give a dialog but then allow the user to proceed, but now the user is just screwed. If you think the only possible solution here is to fix the server, then this bug needs to be moved to evangelism, and someone responsible for this change who can explain the problem clearly to the site needs to contact them. Just marking the bug invalid is NOT the way to go here.
Status: RESOLVED → REOPENED
Flags: blocking1.9?
Resolution: INVALID → ---
Boris, we've been invalidating bugs for misconfigured servers for years. It's really the job of their CA to educate its paying customers on how to properly install their certs. After all, that's part of the service for which they're paying their CAs. Do you really want Mozilla to take over customer support for those CAs for free?
Assignee: kengert → other
Status: REOPENED → NEW
Component: Security: PSM → Other
Flags: blocking1.9?
Product: Core → Tech Evangelism
QA Contact: psm → other
Version: Trunk → unspecified
Summary: Unable to load site that IE can load (incomplete certificate chain) → biglumber.com - fails to load due to incomplete certificate chain
I guess I care more about not breaking things for our users than I do about assigning blame...
Depends on: 399045
The visitor does not care about an invalid server configuration. He wants to see the content of the page. In Firefox 2 I get a warning and can choose to visit the page anyway or not. but with Firefox 3 I have no chance at all to get to that page - this is not acceptable.
Current implementation of nsNSSBadCertHandler does not allow to ignore certificate errors and see page anyway... http://mxr.mozilla.org/seamonkey/source/security/manager/ssl/src/nsNSSIOLayer.cpp#2463-2500 Just allow to see problems in alert or in error page, but does not allow Ignore it... I guess it should be possible to setup full ignoring of certificate problem in NotifyCertProblem - interface and return SECSuccess if NotifyCertProblem handler wants to do it.
Depends on: 402417
Site no longer exists. Closing as INVALID.
Status: NEW → RESOLVED
Closed: 17 years ago11 years ago
Resolution: --- → INVALID
Product: Tech Evangelism → Tech Evangelism Graveyard
You need to log in before you can comment on or make changes to this bug.