Oh, I see that "bloomberg.com" was added to "net/http/transport_security_state_static.json" in m116... that probably explains it. I can try remove it from the local build. Thanks so much for your help!
On Mon, Jul 10, 2023 at 8:24 PM Shezan Baig <shezbaig...@gmail.com> wrote: > Ahh, I see. Do you know if there is a switch to disable HSTS? (seems to > be a new behavior in m116) > Thanks, > -shez- > > > On Mon, Jul 10, 2023 at 8:22 PM Chris Thompson <cth...@chromium.org> > wrote: > >> This indicates that the upgrades are due to HSTS, so this is unrelated to >> HTTPS-Upgrades (this new feature). bloomberg.com is currently on the >> HSTS preload list, which also applies to subdomains. >> >> On Mon, Jul 10, 2023 at 5:18 PM Shezan Baig <shezbaig...@gmail.com> >> wrote: >> >>> I see the following in the netlog: >>> >>> t= 97 [st= 0] TRANSPORT_SECURITY_STATE_SHOULD_UPGRADE_TO_SSL >>> >>> * --> get_sts_state_result = true <--- this is false >>> in the m115 build* --> host = " >>> dsbeta.prod.bloomberg.com" >>> --> host_found_in_hsts_bypass_list = false >>> --> should_upgrade_to_ssl = true >>> t= 97 [st= 0] +URL_REQUEST_START_JOB [dt=25] >>> --> initiator = "not an origin" >>> --> load_flags = 65792 (CAN_USE_RESTRICTED_PREFETCH | >>> MAIN_FRAME_DEPRECATED) >>> --> method = "GET" >>> --> network_isolation_key = "http://bloomberg.com >>> http://bloomberg.com" >>> --> request_type = "main frame" >>> --> site_for_cookies = "SiteForCookies: {site= >>> http://bloomberg.com; schemefully_same=true}" >>> --> url = " >>> http://dsbeta.prod.bloomberg.com/vrs2021/viewer/index.html" >>> t= 97 [st= 0] URL_REQUEST_REDIRECT_JOB >>> --> reason = "HSTS" >>> t= 97 [st= 0] URL_REQUEST_FAKE_RESPONSE_HEADERS_CREATED >>> --> HTTP/1.1 307 Internal Redirect >>> Location: >>> https://dsbeta.prod.bloomberg.com/vrs2021/viewer/index.html >>> Cross-Origin-Resource-Policy: Cross-Origin >>> Non-Authoritative-Reason: HSTS >>> >>> >>> >>> On Mon, Jul 10, 2023 at 8:12 PM Shezan Baig <shezbaig...@gmail.com> >>> wrote: >>> >>>> I am using a locally built chrome.exe (so not one of the >>>> Canary/Dev/Beta channels), and doing the following: >>>> >>>> 116.0.5845.14/chrome.exe --proxy-server=<internal-proxy> http:// >>>> <internal-url> >>>> >>>> This causes the <internal-proxy> to get a "CONNECT <internal-url>:443", >>>> which unfortunately the proxy is not currently configured to handle >>>> properly (it blocks and times out after a minute). I can fix the >>>> <internal-proxy> to handle it correctly, but rolling out that change may >>>> take a while. >>>> >>>> In the meantime, I'm trying to workaround the issue by doing: >>>> >>>> 116.0.5845.14/chrome.exe --disable-features=HttpsUpgrades >>>> --proxy-server=<internal-proxy> http://<internal-url> >>>> >>>> However, that doesn't seem to make any difference (proxy is still >>>> getting a "CONNECT <internal-url>:443"). >>>> >>>> Note that our previous build (115.0.5790.32) does not do these >>>> upgrades, so I don't need any disable-feature switch for the m115 build. >>>> However, the m116 build does these upgrades with or without the >>>> disable-feature switch. >>>> >>>> Also note that these are locally built chromium binaries (not "Google >>>> Chrome"), so it will not participate in the 50% experiments. >>>> >>>> Thanks for your quick response! >>>> -shez- >>>> >>>> >>>> >>>> >>>> On Mon, Jul 10, 2023 at 7:47 PM Chris Thompson <cth...@chromium.org> >>>> wrote: >>>> >>>>> Could you provide more information on what is occurring (or maybe >>>>> better: file a bug at crbug.com/new with details and link it here)? >>>>> That's the correct flag to force-disable the feature (you can also disable >>>>> it during the experimental period in chrome://flags/#https-upgrades). >>>>> >>>>> Note that Chrome has other existing features which upgrade certain >>>>> navigations to HTTPS (such as schemeless URLs entered into the Omnibox), >>>>> so >>>>> you may be seeing those instead. HTTPS-Upgrades is currently only enabled >>>>> at 50% in Chrome Canary/Dev/Beta. >>>>> >>>>> On Mon, Jul 10, 2023 at 4:43 PM Shezan Baig <shezbaig...@gmail.com> >>>>> wrote: >>>>> >>>>>> Hi, >>>>>> Is there a way to disable this feature? I tried running the browser >>>>>> with " --disable-features=HttpsUpgrades", but it still seems to be >>>>>> performing these upgrades. >>>>>> Thanks, >>>>>> -shez- >>>>>> >>>>>> >>>>>> On Wednesday, May 24, 2023 at 7:13:38 PM UTC-4 cth...@chromium.org >>>>>> wrote: >>>>>> >>>>>>> Contact emailscth...@chromium.org, dad...@google.com >>>>>>> >>>>>>> Explainer >>>>>>> https://github.com/dadrian/https-upgrade/blob/main/explainer.md >>>>>>> >>>>>>> Specificationhttps://github.com/whatwg/fetch/pull/1655 >>>>>>> >>>>>>> Summary >>>>>>> >>>>>>> Automatically and optimistically upgrade all main-frame navigations >>>>>>> to HTTPS, with fast fallback to HTTP. >>>>>>> >>>>>>> >>>>>>> Blink componentInternals>Network>SSL >>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL> >>>>>>> >>>>>>> TAG reviewFetch change process does not mention a TAG review, >>>>>>> therefore this is N/A (https://github.com/whatwg/fetch#pull-requests >>>>>>> ) >>>>>>> >>>>>>> TAG review statusNot applicable >>>>>>> >>>>>>> Risks >>>>>>> >>>>>>> >>>>>>> Interoperability and Compatibility >>>>>>> >>>>>>> >>>>>>> >>>>>>> *Gecko*: Positive ( >>>>>>> https://github.com/mozilla/standards-positions/issues/800) Firefox >>>>>>> is offering a similar feature already in their private browsing mode by >>>>>>> default >>>>>>> >>>>>>> *WebKit*: No signal ( >>>>>>> https://github.com/WebKit/standards-positions/issues/185) >>>>>>> >>>>>>> *Web developers*: No signals. This feature is not exposed directly >>>>>>> to web developers or users. However, HTTPS adoption is now standard >>>>>>> practice (>90% of page loads in Chrome use HTTPS), and automatically >>>>>>> upgrading navigations to HTTPS would avoid unnecessary redirects from >>>>>>> HTTP >>>>>>> to HTTPS for site owners. The `upgrade-insecure-requests` header has >>>>>>> some >>>>>>> similar functionality, and according to HTTP-Archive is found on ~6% of >>>>>>> all >>>>>>> requests. >>>>>>> >>>>>>> *Other signals*: >>>>>>> >>>>>>> WebView application risks >>>>>>> >>>>>>> Does this intent deprecate or change behavior of existing APIs, such >>>>>>> that it has potentially high risk for Android WebView-based >>>>>>> applications? >>>>>>> >>>>>>> >>>>>>> >>>>>>> Debuggability >>>>>>> >>>>>>> Chrome will upgrade these navigations to HTTPS using a 307 internal >>>>>>> redirect, which will be visible in the Network panel of Developer Tools. >>>>>>> >>>>>>> >>>>>>> Will this feature be supported on all six Blink platforms (Windows, >>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?No >>>>>>> >>>>>>> Currently not available on Android WebView. We are implementing this >>>>>>> first for Chrome and will consider bringing this to WebView (likely as >>>>>>> an >>>>>>> embedder opt-in) as follow up work. >>>>>>> >>>>>>> >>>>>>> Is this feature fully tested by web-platform-tests >>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>> ?No >>>>>>> >>>>>>> Flag namehttps-upgrades >>>>>>> >>>>>>> Requires code in //chrome?True >>>>>>> >>>>>>> Tracking bug >>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1394910 >>>>>>> >>>>>>> Launch bughttps://launch.corp.google.com/launch/4235192 >>>>>>> >>>>>>> Sample links >>>>>>> http://example.com will upgrade to https://example.com. >>>>>>> http://www.alwayshttp.com will upgrade to https://www.alwayshttp.com but >>>>>>> fall back to http://www.alwayshttp.com because the site doesn't >>>>>>> support HTTPS. >>>>>>> >>>>>>> Estimated milestones >>>>>>> Shipping on desktop 115 >>>>>>> Shipping on Android 115 >>>>>>> >>>>>>> We are planning to do a field trial to gradually roll out this >>>>>>> feature to Chrome clients in Chrome 115. >>>>>>> >>>>>>> Anticipated spec changes >>>>>>> >>>>>>> Open questions about a feature may be a source of future web compat >>>>>>> or interop issues. Please list open issues (e.g. links to known github >>>>>>> issues in the project for the feature specification) whose resolution >>>>>>> may >>>>>>> introduce web compat/interop risk (e.g., changing to naming or >>>>>>> structure of >>>>>>> the API in a non-backward-compatible way). >>>>>>> https://github.com/whatwg/fetch/pull/1655 >>>>>>> >>>>>>> Link to entry on the Chrome Platform Status >>>>>>> https://chromestatus.com/feature/6056181032812544 >>>>>>> >>>>>>> Links to previous Intent discussionsIntent to prototype: >>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/mgJqym5-Xek/m/0EAN6v7CCQAJ >>>>>>> >>>>>>> This intent message was generated by Chrome Platform Status >>>>>>> <https://chromestatus.com/>. >>>>>>> >>>>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANMpiORmPZU7R1Q_ffyiOut%2BcbKH19Be5kDOqUjww9xGRLHDYg%40mail.gmail.com.