I see the following in the netlog:

t= 97 [st= 0]      TRANSPORT_SECURITY_STATE_SHOULD_UPGRADE_TO_SSL

*                   --> get_sts_state_result = true  <--- this is false in
the m115 build*                   --> host = "dsbeta.prod.bloomberg.com"
                   --> host_found_in_hsts_bypass_list = false
                   --> should_upgrade_to_ssl = true
t= 97 [st= 0]     +URL_REQUEST_START_JOB  [dt=25]
                   --> initiator = "not an origin"
                   --> load_flags = 65792 (CAN_USE_RESTRICTED_PREFETCH |
MAIN_FRAME_DEPRECATED)
                   --> method = "GET"
                   --> network_isolation_key = "http://bloomberg.com
http://bloomberg.com";
                   --> request_type = "main frame"
                   --> site_for_cookies = "SiteForCookies: {site=
http://bloomberg.com; schemefully_same=true}"
                   --> url = "
http://dsbeta.prod.bloomberg.com/vrs2021/viewer/index.html";
t= 97 [st= 0]        URL_REQUEST_REDIRECT_JOB
                     --> reason = "HSTS"
t= 97 [st= 0]        URL_REQUEST_FAKE_RESPONSE_HEADERS_CREATED
                     --> HTTP/1.1 307 Internal Redirect
                         Location:
https://dsbeta.prod.bloomberg.com/vrs2021/viewer/index.html
                         Cross-Origin-Resource-Policy: Cross-Origin
                         Non-Authoritative-Reason: HSTS



On Mon, Jul 10, 2023 at 8:12 PM Shezan Baig <shezbaig...@gmail.com> wrote:

> I am using a locally built chrome.exe (so not one of the Canary/Dev/Beta
> channels), and doing the following:
>
> 116.0.5845.14/chrome.exe --proxy-server=<internal-proxy> http://
> <internal-url>
>
> This causes the <internal-proxy> to get a "CONNECT <internal-url>:443",
> which unfortunately the proxy is not currently configured to handle
> properly (it blocks and times out after a minute).  I can fix the
> <internal-proxy> to handle it correctly, but rolling out that change may
> take a while.
>
> In the meantime, I'm trying to workaround the issue by doing:
>
> 116.0.5845.14/chrome.exe --disable-features=HttpsUpgrades
> --proxy-server=<internal-proxy> http://<internal-url>
>
> However, that doesn't seem to make any difference (proxy is still getting
> a "CONNECT <internal-url>:443").
>
> Note that our previous build (115.0.5790.32) does not do these upgrades,
> so I don't need any disable-feature switch for the m115 build.  However,
> the m116 build does these upgrades with or without the disable-feature
> switch.
>
> Also note that these are locally built chromium binaries (not "Google
> Chrome"), so it will not participate in the 50% experiments.
>
> Thanks for your quick response!
> -shez-
>
>
>
>
> On Mon, Jul 10, 2023 at 7:47 PM Chris Thompson <cth...@chromium.org>
> wrote:
>
>> Could you provide more information on what is occurring (or maybe better:
>> file a bug at crbug.com/new with details and link it here)? That's the
>> correct flag to force-disable the feature (you can also disable it during
>> the experimental period in chrome://flags/#https-upgrades).
>>
>> Note that Chrome has other existing features which upgrade certain
>> navigations to HTTPS (such as schemeless URLs entered into the Omnibox), so
>> you may be seeing those instead. HTTPS-Upgrades is currently only enabled
>> at 50% in Chrome Canary/Dev/Beta.
>>
>> On Mon, Jul 10, 2023 at 4:43 PM Shezan Baig <shezbaig...@gmail.com>
>> wrote:
>>
>>>  Hi,
>>> Is there a way to disable this feature?  I tried running the browser
>>> with " --disable-features=HttpsUpgrades", but it still seems to be
>>> performing these upgrades.
>>> Thanks,
>>> -shez-
>>>
>>>
>>> On Wednesday, May 24, 2023 at 7:13:38 PM UTC-4 cth...@chromium.org
>>> wrote:
>>>
>>>> Contact emailscth...@chromium.org, dad...@google.com
>>>>
>>>> Explainer
>>>> https://github.com/dadrian/https-upgrade/blob/main/explainer.md
>>>>
>>>> Specificationhttps://github.com/whatwg/fetch/pull/1655
>>>>
>>>> Summary
>>>>
>>>> Automatically and optimistically upgrade all main-frame navigations to
>>>> HTTPS, with fast fallback to HTTP.
>>>>
>>>>
>>>> Blink componentInternals>Network>SSL
>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>
>>>>
>>>> TAG reviewFetch change process does not mention a TAG review,
>>>> therefore this is N/A (https://github.com/whatwg/fetch#pull-requests)
>>>>
>>>> TAG review statusNot applicable
>>>>
>>>> Risks
>>>>
>>>>
>>>> Interoperability and Compatibility
>>>>
>>>>
>>>>
>>>> *Gecko*: Positive (
>>>> https://github.com/mozilla/standards-positions/issues/800) Firefox is
>>>> offering a similar feature already in their private browsing mode by 
>>>> default
>>>>
>>>> *WebKit*: No signal (
>>>> https://github.com/WebKit/standards-positions/issues/185)
>>>>
>>>> *Web developers*: No signals. This feature is not exposed directly to
>>>> web developers or users. However, HTTPS adoption is now standard practice
>>>> (>90% of page loads in Chrome use HTTPS), and automatically upgrading
>>>> navigations to HTTPS would avoid unnecessary redirects from HTTP to HTTPS
>>>> for site owners. The `upgrade-insecure-requests` header has some similar
>>>> functionality, and according to HTTP-Archive is found on ~6% of all
>>>> requests.
>>>>
>>>> *Other signals*:
>>>>
>>>> WebView application risks
>>>>
>>>> Does this intent deprecate or change behavior of existing APIs, such
>>>> that it has potentially high risk for Android WebView-based applications?
>>>>
>>>>
>>>>
>>>> Debuggability
>>>>
>>>> Chrome will upgrade these navigations to HTTPS using a 307 internal
>>>> redirect, which will be visible in the Network panel of Developer Tools.
>>>>
>>>>
>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?No
>>>>
>>>> Currently not available on Android WebView. We are implementing this
>>>> first for Chrome and will consider bringing this to WebView (likely as an
>>>> embedder opt-in) as follow up work.
>>>>
>>>>
>>>> Is this feature fully tested by web-platform-tests
>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>> ?No
>>>>
>>>> Flag namehttps-upgrades
>>>>
>>>> Requires code in //chrome?True
>>>>
>>>> Tracking bug
>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1394910
>>>>
>>>> Launch bughttps://launch.corp.google.com/launch/4235192
>>>>
>>>> Sample links
>>>> http://example.com will upgrade to https://example.com.
>>>> http://www.alwayshttp.com will upgrade to https://www.alwayshttp.com but
>>>> fall back to http://www.alwayshttp.com because the site doesn't
>>>> support HTTPS.
>>>>
>>>> Estimated milestones
>>>> Shipping on desktop 115
>>>> Shipping on Android 115
>>>>
>>>> We are planning to do a field trial to gradually roll out this feature
>>>> to Chrome clients in Chrome 115.
>>>>
>>>> Anticipated spec changes
>>>>
>>>> Open questions about a feature may be a source of future web compat or
>>>> interop issues. Please list open issues (e.g. links to known github issues
>>>> in the project for the feature specification) whose resolution may
>>>> introduce web compat/interop risk (e.g., changing to naming or structure of
>>>> the API in a non-backward-compatible way).
>>>> https://github.com/whatwg/fetch/pull/1655
>>>>
>>>> Link to entry on the Chrome Platform Status
>>>> https://chromestatus.com/feature/6056181032812544
>>>>
>>>> Links to previous Intent discussionsIntent to prototype:
>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/mgJqym5-Xek/m/0EAN6v7CCQAJ
>>>>
>>>> This intent message was generated by Chrome Platform Status
>>>> <https://chromestatus.com/>.
>>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANMpiOQKR0JbboR%3DS4ZnLj75QfHVvth9f_oXAk5Fdyu1eXpMbA%40mail.gmail.com.

Reply via email to