Closed Bug 1069317 Opened 10 years ago Closed 10 years ago

about:neterror does not display with e10s enabled for cert pin violations

Categories

(Firefox :: General, defect)

x86
Linux
defect
Not set
normal

Tracking

()

RESOLVED FIXED
Tracking Status
e10s m4+ ---

People

(Reporter: mgoodwin, Assigned: jimm)

References

(Blocks 1 open bug)

Details

Attachments

(1 file)

about:neterror fails to display with e10s.

str:
1) enable e10s
2) cause some condition that will result in about:neterror displaying (e.g. cause a pinning violation by visiting https://google.com/ via a tool like OWASP ZAP with the proxy's root installed)
3) Observe a blank page in place of the neterror page
Blocks: fxe10s
Assignee: nobody → jmathies
Attached image badaddress.png (deleted) —
Hmm, not able to reproduce using a simple bad address.
Maybe I'm not testing the right scenario here.. Mark, are you still able to reproduce, and are you sure what you're seeing isn't a result of your test config?
Flags: needinfo?(mgoodwin)
downed proxies look ok too.
(In reply to Jim Mathies [:jimm] from comment #3)
> downed proxies look ok too.

I was testing with certificate pin errors; I'll try to repro again in a bit
Flags: needinfo?(mgoodwin)
I tried an invalid cert as well here - different about page though.

https://onlinessl.netlock.hu/en/test-center/invalid-ssl-certificate.html
OK, I am still able to reproduce. Here are the steps:

1) Create some enviroment in which it's possible to get a pin violation from an otherwise OK chain: e.g.
a) Install a man in the middle proxy (e.g. OWASP ZAP)
b) Install a local CA root (e.g. by using the ZAP dynamic SSL feature)
c) Configure your browser to use the proxy

2) Visit an URL which causes a pin violation to occur (e.g. https://www.google.com)

3) Observe about:neterror failing to display

The same STR works fine with e10s disabled.
Summary: about:neterror does not display with e10s enabled → about:neterror does not display with e10s enabled for cert pin violations
You can always visit https://pinningtest.appspot.com instead of setting up your proxy.
See also the last few comments in bug 1053456.
(In reply to [:mmc] Monica Chew (please use needinfo) from comment #7)
> You can always visit https://pinningtest.appspot.com instead of setting up
> your proxy.

sweeeet! thanks!
Not much to go on except a little log output - 

[JavaScript Error: "NS_NOINTERFACE: Component returned failure code: 0x80004002 (NS_NOINTERFACE) [nsISupports.QueryInterface]"]
[JavaScript Error: "NS_NOINTERFACE: Component returned failure code: 0x80004002 (NS_NOINTERFACE) [nsISupports.QueryInterface]"]
..
We end up in nsDocShell::DisplayLoadError[1], where we attempt to get security info on the failed channel[2] which fails. We end up with en empty messageStr and bail. 

[1] http://mxr.mozilla.org/mozilla-central/source/docshell/base/nsDocShell.cpp#4815
[2] http://mxr.mozilla.org/mozilla-central/source/docshell/base/nsDocShell.cpp#4812
Depends on: 1083325
On the parent side in HttpChannelParent, we try to serialize security info via NS_SerializeToString, and for some reason this particular channel fails there. So we end up with an empty secInfoSerialization string.

http://mxr.mozilla.org/mozilla-central/source/netwerk/protocol/http/HttpChannelParent.cpp#669
fixed in 10-18 nightly.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: