Closed
Bug 668207
Opened 14 years ago
Closed 14 years ago
302 redirects without a domain, originating on an https site, are resulting in a fetch of the non-SSL URL
Categories
(Core :: Networking: HTTP, defect)
Tracking
()
RESOLVED
INCOMPLETE
People
(Reporter: m.blackman, Unassigned)
Details
(Keywords: regression, Whiteboard: [sg:moderate (sg:high worst case, but server is wrong too)])
Attachments
(1 file)
2.60 KB,
text/plain
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:2.0) Gecko/20100101 Firefox/4.0
Build ID: 20110318052756
Steps to reproduce:
I filled authentication credentials at https://www.fairfx.com/login
Actual results:
After successful authentication, I was redirected to http://www.fairfx.com/your_account. Note the non-SSL URL.
Under *Firefox 4*, the expected interpretation of the 302 Location: header
took place and the browser was redirected to an *https* URL.
I've attached the relevant extract from a Live Headers add-on capture.
Expected results:
I should have been redirected to https://www.fairfx.com/your_account.
Reporter | ||
Updated•14 years ago
|
Summary: 302 redirects without a domain, originating on an https site are resulting in a fetch of the non-SSL URL → 302 redirects without a domain, originating on an https site, are resulting in a fetch of the non-SSL URL
Reporter | ||
Comment 1•14 years ago
|
||
the "/your_account" references are mismrembered URL paths. It should have been "/youraccount"
Updated•14 years ago
|
Component: Security → Networking: HTTP
Product: Firefox → Core
QA Contact: firefox → networking.http
Comment 2•14 years ago
|
||
That is technically a malformed Location header: location headers MUST be an absolute path. However, I agree that if we did anything with relative paths, we should continue to redirect to the HTTPS site.
![]() |
||
Comment 3•14 years ago
|
||
That's... quite odd. Location headers are resolved with the URI the request was made to as the base URI, so this should have Just Worked.
Mark, is this reliably reproducible? If so, would you be willing to use http://harthur.github.com/mozregression/ to narrow down when this problem appeared?
Also, would you be willing to check whether it appears in Aurora builds?
Comment 4•14 years ago
|
||
Fwiw, bug #618835 invalidates targets of cached Location/Content-Location headers using the literal value of the headers - relative uris are not resolved I believe. Other redirect-related bugs also use literal headers, afaik.
Marc, if you have the time and energy, could you follow https://developer.mozilla.org/en/HTTP_Logging, add ",cache:5" at the end of "set NSPR_LOG_MODULES" (enable cache-logging) and post the log here...?
![]() |
||
Comment 5•14 years ago
|
||
> relative uris are not resolved I believe
You believe incorrectly. ;) The NewUri call there passes mURI as the base URI, so relative URIs are resolved relative to mURI.
Comment 6•14 years ago
|
||
I stand corrected. :)
Reporter | ||
Comment 7•14 years ago
|
||
Ok, reviewing the RFC, I can see that indeed "Location: " is expected to start with a scheme and host before a path. However, I'd say it's pretty well established behaviour to redirect a path-only to the "origin" scheme+host across all mainstream browsers.
This is perfectly reproducible, but we will be closing this and a related bug on the server side ASAP, so I may knock up a test web server with the same behaviour. I'm prepared to spend a little bit of time isolating the revision(s) where this behaviour came in.
![]() |
||
Comment 8•14 years ago
|
||
Mark, thanks!
If you can make a server showing the problem public, I could also do the narrowing down. I just don't have credentials to log in to fairfx.com. ;)
Updated•14 years ago
|
Keywords: regression,
regressionwindow-wanted
Comment 9•14 years ago
|
||
Mark: I think part of what comment 4 is saying is that our "Aurora" builds may have fixed this because we did fix another regression that was somewhat related. Could you please try Aurora? https://www.mozilla.com/firefox/channel/
Updated•14 years ago
|
Assignee: nobody → bjarne
Whiteboard: [sg:moderate (sg:high worst case, but server is wrong too)]
![]() |
||
Comment 10•14 years ago
|
||
Reporter | ||
Comment 11•14 years ago
|
||
I've updated our live environment code to issue absolute URL redirects for the cases that concerned us most. I'm unlikely to be in a position to offer a testing server until next week though. Now that I've updated our server, I'm content for this report to be public, but not obvious to me how to make it publically viewable.
I will try Aurora on a test server at some point next week.
![]() |
||
Comment 12•14 years ago
|
||
Let's keep this closed for the moment, until we figure out what's going on here...
Comment 13•14 years ago
|
||
(In reply to comment #11)
> I'm unlikely to be in a position to offer
> a testing server until next week though.
That would be very useful! I did a simple test trying to reproduce your issue, but it works fine afaics so I guess your site uses a more complex pattern of redirects than my test.
> I will try Aurora on a test server at some point next week.
... and that would also be useful info, yes. :)
Comment 14•14 years ago
|
||
Like stated in comment #11, their internal app has been updated to avoid this problem. Excerpt from private email:
----------
I finally came up with sample minimum web application to attempt to illustrate
the bug with FF5, but could not.
So there's something very specific about our application which is triggering
the bug in FF5.
I might get a chance to run up an older version of our app to see if I can
replicate and/or expose it to you.
----------
As this is proprietary code we will not receive a copy of the app in order to reproduce locally. Awaiting further action by reporter.
Comment 15•14 years ago
|
||
I don't think we should depend on the reporter to come back to this bug. What is the next step assuming the reporter doesn't come back with more info? Open up the bug to get more info, maybe also mark it resolved incomplete until we get more info?
Comment 16•14 years ago
|
||
Resolving as incomplete as discussed with team leader. Reassign to nobody, leaving to sec-team for how to proceed.
Assignee: bjarne → nobody
Status: UNCONFIRMED → RESOLVED
Closed: 14 years ago
Resolution: --- → INCOMPLETE
Comment 17•14 years ago
|
||
We decided to resolve as incomplete because it appears that Bjarne has no way to move forward here.
Can we open up this bug to the public? Maybe having more eyes on it will help us get to the bottom of the issue, if there is one.
Updated•14 years ago
|
Assignee: nobody → imelven
Status: RESOLVED → REOPENED
Ever confirmed: true
Resolution: INCOMPLETE → ---
Comment 18•14 years ago
|
||
reopening and assigning to me, with an aim to opening this up
Comment 19•14 years ago
|
||
Discussed with bsterne and dveditz, we are opening this up in the hopes that other people experiencing this problem (if they are) can provide further details. From the above comments, it sounds like this is currently WORKSFORME...
Assignee: imelven → administration
Group: core-security
Updated•14 years ago
|
Assignee: administration → nobody
Status: REOPENED → RESOLVED
Closed: 14 years ago → 14 years ago
Resolution: --- → INCOMPLETE
Updated•10 years ago
|
Keywords: regressionwindow-wanted
You need to log in
before you can comment on or make changes to this bug.
Description
•