Open oct3net opened 9 years ago
It seems that an HSTS API has been requested but no progress has been made on it thus far. Implementing HTTPS support in KeePassHTTP is probably the only option here aside from manually removing localhost from the HSTS cache every time a user opens a page over HTTPS that's hosted on the local machine.
https will not be added to keepasshttp. The whole reason it does its own crypto is to avoid all the issues of PKI on localhost. This may spell the end of chromeipass. (not as if I have been actively maintaining it though)
Sent from my phone On Sep 19, 2015 2:31 AM, "Jake W." notifications@github.com wrote:
It seems that an HSTS API has been requested https://code.google.com/p/chromium/issues/detail?id=313965 but no progress has been made on it thus far. Implementing HTTPS support in KeePassHTTP is probably the only option here aside from manually removing localhost from the HSTS cache every time a user opens a page over HTTPS that's hosted on the local machine.
— Reply to this email directly or view it on GitHub https://github.com/pfn/passifox/issues/425#issuecomment-141640450.
Oh, at the same time, accessing https on localhost is extremely rare.
If it is absolutely required for an app or proxy, one could alias localhost or go to any 127.0.0.XXX address (can also be named)
Sent from my phone On Sep 19, 2015 7:54 AM, "Perry Nguyen" pfnguyen@hanhuy.com wrote:
https will not be added to keepasshttp. The whole reason it does its own crypto is to avoid all the issues of PKI on localhost. This may spell the end of chromeipass. (not as if I have been actively maintaining it though)
Sent from my phone On Sep 19, 2015 2:31 AM, "Jake W." notifications@github.com wrote:
It seems that an HSTS API has been requested https://code.google.com/p/chromium/issues/detail?id=313965 but no progress has been made on it thus far. Implementing HTTPS support in KeePassHTTP is probably the only option here aside from manually removing localhost from the HSTS cache every time a user opens a page over HTTPS that's hosted on the local machine.
— Reply to this email directly or view it on GitHub https://github.com/pfn/passifox/issues/425#issuecomment-141640450.
Another option would be to use Chrome's Native Messaging API but this would require a separate executable file, as the API communicates with a registered binary through STDIN/STDOUT.
Your idea about using a separate IP within the loopback range might work. I'll do some tests and see how well that works as an option.
It seems that the most recent versions of Google Chrome cause ChromeIPass to stop working due to HSTS implementations. In short, if I was to open a webpage over HTTPS at url
https://localhost/
then all subsequent requests tolocalhost
are redirected to HTTPS if they are not already doing so.I'm looking into some workarounds for this at the moment (aside from continuously purging localhost from chrome://net-internals/#hsts) but if anyone can beat me to a solution then all-the-better I say.
Alternatively, we could implement HTTPS functionality in KeePassHTTP but I'm not sure which will require less work let alone which is actually feasible.
ChromeIPass XMLHttpRquest with Google Chrome running under standard parameters:
ChromeIPass XMLHttpRquest with Google Chrome running with the
--disable-web-security
parameter: