-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add crlset exceptions to network audit script #2271
Comments
ETA on fix? Will have to revert the relevant PRs if no fix soon. |
waiting on issue 447 in brave/devops, hopefully done tomorrow. fyi the
relevant PR is in 0.58 and above
…On Wed, Nov 28, 2018 at 16:41 Brian R. Bondy ***@***.***> wrote:
ETA on fix? Will have to revert the relevant PRs if no fix soon.
—
You are receiving this because you were assigned.
Reply to this email directly, view it on GitHub
<#2271 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAhjFpKiGgHCUmDAlgI7I60oApRF5se3ks5uzy0egaJpZM4Y4Vof>
.
|
Hi there. I've been working on this. Here is my understanding and what seems to be the problem and what the current status is. The tl;dr is that I am unsure if it is possible to implement request #447 as requested with fastly, and I'm talking to their support to see if it is possible somehow, or to add support. crlsets2.brave.com is a proxy service ran in fastly that routes all requests to redirector.gvt1.com. This is used to attempt to audit all outbound network connections during build. Unlike crlsets1/3, this one contained HTTP 301 and 302 messages. According to https://github.com/brave/devops/issues/447 we need to absorb and hide all HTTP redirects on the proxy itself and only serve HTTP 200s or errors. https://github.com/brave/devops/pull/449 was proposed as a solution for it. I spent about 4 hours the subsequent evening and 4 more hours the day after attempting to find out that provided PR was not working. The result was The request itself goes as follows: which gets redirected to: Attempting to find out the actual result of the HTTP 500 led me to set up a remote logging to a S3 bucket in our AWS sandbox account with a new restricted username and access key, since Fastly only supports remote logging. This ultimately didn't end up revealing anything new. Only standard HTTP entries but no tracebacks or error messages. That led me with the only option being to examine the VCL for problems. Sleuthing on the internet for a few hours around this problem showed that many organizations used code similar to pull devops/449 to achieve similar goals with Varnish. This made me wonder why it was not working. Fastly is a thinly veiled service around a caching proxy called Varnish. Varnish uses a configuration language that compiles down to C in VCL. There are a few built-in functions that Varnish uses to route traffic and make decisions. Fastly's boilerplate: https://docs.fastly.com/vcl/custom-vcl/creating-custom-vcl/
At this point I was pretty frustrated and went to talk to Fastly staff on IRC. They confirmed they understood the issue, and that I'd need to email support@fastly.com to ask if this is even possible. So current status is that I've reached out to Fastly support to attempt to resolve the matter. I've provided our goal and my reduced test case, and will update this issue when I hear back. In the mean time I'm attempting to use a local copy of their Varnish build to reproduce locally, where I will have much better debugging tools to use. |
follow-up to #2160 - the proxied requests should be whitelisted for 0.58.x; otherwise the build will continue to fail
npm run test-security
The text was updated successfully, but these errors were encountered: