Closed
Bug 457100
Opened 17 years ago
Closed 17 years ago
hg https does not work
Categories
(mozilla.org Graveyard :: Server Operations, task)
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: BenB, Unassigned)
References
()
Details
(Keywords: regression)
pulling from https://hg.mozilla.org/comm-central/
abort: error: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
This used to work 2-3 weeks ago. https is critical for security to fetch the correct source, see bug 450645.
In fact, I can't tell the difference whether this is an attack or just a bad server. An attacker would do exactly this. I don't know whether I can compile the source.
Comment 1•17 years ago
|
||
Wouldn't an attack give a cert-mismatch error? Agree that this is v. bad, though.
IT: is there nagios coverage of the https service?
Comment 2•17 years ago
|
||
Seems to work for me...
~/work/code $hg clone https://hg.mozilla.org/ast
destination directory: ast
requesting all changes
adding changesets
adding manifests
adding file changes
added 273 changesets with 692 changes to 56 files
updating working directory
44 files updated, 0 files merged, 0 files removed, 0 files unresolved
~/work/code $
| Reporter | ||
Comment 3•17 years ago
|
||
shaver, yes, a stupid attack would. A smart attack would prevent me from using SSL and make me go back to unsecured (http), and do a MITM on that.
Comment 4•17 years ago
|
||
(In reply to comment #1)
> IT: is there nagios coverage of the https service?
Yes, but it was only monitoring one of the two servers that power hg.mozilla.org. I updated the checks appropriately.
Comment 5•17 years ago
|
||
(In reply to comment #3)
> shaver, yes, a stupid attack would. A smart attack would prevent me from using
> SSL and make me go back to unsecured (http), and do a MITM on that.
How would any smart attack give you back content without a cert error? That's the part I don't understand, and I'd like to.
| Reporter | ||
Comment 6•17 years ago
|
||
I retract and claim the opposite!
I was using a system-wide proxy setting without realizing it. Removing it makes it work again.
Sorry for the false alarm!
INVALID
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → INVALID
| Reporter | ||
Comment 7•17 years ago
|
||
In case you're still interested:
> How would any smart attack give you back content without a cert error? That's
> the part I don't understand, and I'd like to.
Assuming the attacker can provoke the error I got, I would not get a cert error, but an entirely failure of the SSL connection, as shown in initial description. I would think that the server is broken, or just not care, and manually fall back to http, to get my work done, like I did now. (Either way, an average user would not be suspicious of an attack.) Now I am on an insecure connection, and you can attack that like any other insecure connection.
Comment 8•17 years ago
|
||
The error you got is from hg getting back HTML and trying to read it as hg command stream. You didn't get a failure of the SSL connection; that would look like
abort: error: Connection refused
or some SSL error, right?
| Reporter | ||
Comment 9•17 years ago
|
||
Sure. But if the HTML page came from the proxy, and the attacker can get between me and the proxy? He should be able to fake this error.
Also, "a connection refused" would do the same trick. I'd probably go back to http, as would most people, and most would not even be suspicious. (One more reason not to even offer http.)
Anyways, not important anymore.
Updated•10 years ago
|
Product: mozilla.org → mozilla.org Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•