Index: net/http/http_network_transaction.cc |
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc |
index 151776832719702e212e131589036d2cc5316323..4af4cd649b70b22161fceaf83a7f6ba6993b2e51 100644 |
--- a/net/http/http_network_transaction.cc |
+++ b/net/http/http_network_transaction.cc |
@@ -106,6 +106,15 @@ base::Value* NetLogSSLVersionFallbackCallback( |
return dict; |
} |
+base::Value* NetLogSSLCipherFallbackCallback(const GURL* url, |
+ int net_error, |
+ NetLog::LogLevel /* log_level */) { |
+ base::DictionaryValue* dict = new base::DictionaryValue(); |
+ dict->SetString("host_and_port", GetHostAndPort(*url)); |
+ dict->SetInteger("net_error", net_error); |
+ return dict; |
+} |
+ |
} // namespace |
//----------------------------------------------------------------------------- |
@@ -1240,6 +1249,21 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) { |
DCHECK(request_); |
HandleClientAuthError(error); |
+ // Accept deprecated cipher suites, but only on a fallback. This makes UMA |
+ // reflect servers require a deprecated cipher rather than merely prefer |
+ // it. This, however, has no security benefit until the ciphers are actually |
+ // removed. |
+ if (!server_ssl_config_.enable_deprecated_cipher_suites && |
+ (error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH || |
+ error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) { |
+ net_log_.AddEvent( |
+ NetLog::TYPE_SSL_CIPHER_FALLBACK, |
+ base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error)); |
+ server_ssl_config_.enable_deprecated_cipher_suites = true; |
+ ResetConnectionAndRequestForResend(); |
+ return OK; |
+ } |
+ |
bool should_fallback = false; |
uint16 version_max = server_ssl_config_.version_max; |