Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(443)

Issue 6793026: Initial support for HSTS certificate locking. This isn't a finished work, but (Closed)

Created:
9 years, 8 months ago by Chris Evans
Modified:
9 years, 6 months ago
CC:
chromium-reviews, cbentzel+watch_chromium.org, arv (Not doing code reviews), darin-cc_chromium.org, Paweł Hajdan Jr.
Visibility:
Public.

Description

Initial support for HSTS certificate locking. This isn't a finished work, but should serve as a nice base to iterate on top of. In particular, this is only exposed via the chrome://net-internals/#hsts UI and _not_ via the HTTP header. Aside from the core tweaks, there's also: - Enhance GTK dialog so that fingerprints for the root and intermediaries can easily be seen (the Windows system dialog is already OK here). - Moved some code for chain navigation into net/base to avoid breaching layerz. BUG=78369 TEST=TransportSecurityStateTest.CertLocks

Patch Set 1 #

Patch Set 2 : '' #

Patch Set 3 : '' #

Total comments: 6

Patch Set 4 : '' #

Total comments: 3
Unified diffs Side-by-side diffs Delta from patch set Stats (+271 lines, -59 lines) Patch
M chrome/browser/resources/net_internals/hstsview.js View 1 2 3 3 chunks +11 lines, -2 lines 0 comments Download
M chrome/browser/resources/net_internals/index.html View 1 2 3 1 chunk +2 lines, -1 line 0 comments Download
M chrome/browser/resources/net_internals/main.js View 1 2 3 2 chunks +5 lines, -2 lines 0 comments Download
M chrome/browser/ui/gtk/certificate_dialogs.cc View 1 2 3 2 chunks +2 lines, -2 lines 0 comments Download
M chrome/browser/ui/gtk/certificate_viewer.cc View 1 2 3 4 chunks +31 lines, -3 lines 0 comments Download
M chrome/browser/ui/webui/net_internals_ui.cc View 1 2 3 5 chunks +18 lines, -1 line 0 comments Download
M chrome/common/net/x509_certificate_model.h View 1 2 3 2 chunks +1 line, -5 lines 0 comments Download
M chrome/common/net/x509_certificate_model_nss.cc View 1 2 3 2 chunks +1 line, -21 lines 0 comments Download
M chrome/common/net/x509_certificate_model_openssl.cc View 1 2 3 2 chunks +1 line, -14 lines 0 comments Download
M net/base/transport_security_state.h View 1 2 3 4 chunks +8 lines, -0 lines 0 comments Download
M net/base/transport_security_state.cc View 1 2 3 7 chunks +65 lines, -1 line 0 comments Download
M net/base/transport_security_state_unittest.cc View 1 2 3 2 chunks +49 lines, -1 line 0 comments Download
M net/base/x509_cert_types.h View 1 2 3 2 chunks +4 lines, -1 line 0 comments Download
M net/base/x509_cert_types.cc View 1 2 3 3 chunks +9 lines, -1 line 0 comments Download
M net/base/x509_certificate.h View 1 2 3 2 chunks +12 lines, -4 lines 1 comment Download
M net/base/x509_certificate_nss.cc View 1 2 3 1 chunk +22 lines, -0 lines 1 comment Download
M net/base/x509_certificate_openssl.cc View 1 2 3 1 chunk +15 lines, -0 lines 1 comment Download
M net/url_request/url_request_http_job.cc View 1 2 3 2 chunks +15 lines, -0 lines 0 comments Download

Messages

Total messages: 15 (0 generated)
Chris Evans
Seems like a reasonably-sized chunk to start with :)
9 years, 8 months ago (2011-04-04 22:35:32 UTC) #1
abarth-chromium
Here are some random comments. The parts of the code that I know look reasonable, ...
9 years, 8 months ago (2011-04-04 22:49:36 UTC) #2
agl
1) you're hashing only the leaf certificate, which is probably not what sites want to ...
9 years, 8 months ago (2011-04-04 23:46:42 UTC) #3
agl
On Tue, Apr 5, 2011 at 9:07 PM, Chris Evans <cevans@google.com> wrote: > Can we ...
9 years, 8 months ago (2011-04-06 01:29:08 UTC) #4
cevans
On Mon, Apr 4, 2011 at 3:49 PM, <abarth@chromium.org> wrote: > Here are some random ...
9 years, 8 months ago (2011-04-06 01:36:35 UTC) #5
cevans
On Mon, Apr 4, 2011 at 4:46 PM, <agl@chromium.org> wrote: > 1) you're hashing only ...
9 years, 8 months ago (2011-04-06 03:48:29 UTC) #6
cevans
On Tue, Apr 5, 2011 at 6:13 PM, Adam Langley <agl@chromium.org> wrote: > On Tue, ...
9 years, 8 months ago (2011-04-06 03:51:06 UTC) #7
wtc
I reviewed the files in 'net'. http://codereview.chromium.org/6793026/diff/9002/net/base/x509_certificate.h File net/base/x509_certificate.h (right): http://codereview.chromium.org/6793026/diff/9002/net/base/x509_certificate.h#newcode329 net/base/x509_certificate.h:329: OSCertHandles* cert_handles); Please ...
9 years, 8 months ago (2011-04-07 01:00:29 UTC) #8
cevans
Thanks for the review. All of these changes seem to relate to the move of ...
9 years, 8 months ago (2011-04-07 01:05:44 UTC) #9
wtc
On 2011/04/07 01:05:44, cevans wrote: > > I'm not sure what you mean by "It ...
9 years, 8 months ago (2011-04-08 03:39:59 UTC) #10
wtc
One more thing: SSL servers are supposed to send us their certificate chains in the ...
9 years, 8 months ago (2011-04-08 03:43:33 UTC) #11
Ryan Sleevi
On 2011/04/08 03:43:33, wtc wrote: > One more thing: > > SSL servers are supposed ...
9 years, 8 months ago (2011-04-09 03:41:52 UTC) #12
cevans
On Tue, Apr 5, 2011 at 8:48 PM, Chris Evans <cevans@google.com> wrote: > On Mon, ...
9 years, 8 months ago (2011-04-11 21:57:16 UTC) #13
agl
On Mon, Apr 11, 2011 at 5:57 PM, Chris Evans <cevans@google.com> wrote: > One final ...
9 years, 8 months ago (2011-04-12 15:34:15 UTC) #14
wtc
9 years, 8 months ago (2011-04-20 17:24:25 UTC) #15
On 2011/04/09 03:41:52, Ryan Sleevi wrote:
> 
> wtc: Have you seen servers that send additional certificates beyond the chain?

One example is the VeriSign EV cert chain EE->A->EV (where 'EV'
is a cert of the new EV root cross-signed by the old root) that
you mentioned.

Another example is described in
http://code.google.com/p/chromium/issues/detail?id=43538#c3

The reason servers can get away with these cert chains is that
most certificate libraries throw the certs provided in the server's
Certificate message into their pool of certs and rebuild the cert
chain.

Powered by Google App Engine
This is Rietveld 408576698