-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chrome://crashes not working under Win 7 #1188
Comments
I believe that crash reporting is disabled by default; you need to enable it in chrome://settings/. I think that's why chrome://crashes is saying "Crash reporting is disabled". |
@emerick the main issue here is that manually or automatically sending reports on Win 7 doesn't work. Examples with STR: Manually sending reports: - Fails under Win 7
Automatically sending reports - Fails under Win 7
Both of these cases are working on macOS, Win 10 & Win 8.1. |
The issue here appears to be the inability of crashpad to establish a secure connection with our crash reporting service. The crash reporting service is configured to only accept TLS 1.2: $ nmap -Pn -p 443 --script=ssl-enum-ciphers laptop-updates.brave.com Starting Nmap 7.60 ( https://nmap.org ) at 2019-01-08 20:53 EST Nmap scan report for laptop-updates.brave.com (151.101.117.7) Host is up (0.026s latency). PORT STATE SERVICE 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 2.03 seconds Windows 7 and 8.0, however, by default use TLS 1.0 (and SSL 3.0). To use TLS 1.1 or 1.2 an additional option needs to be set in WinHttp (WINHTTP_OPTION_SECURE_PROTOCOLS with WINHTTP_FLAG_SECURE_PROTOCOL_TLS1 | WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 | WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2) in the code. For comparison, Google's crash reporting endpoint accepts TLS 1.0, 1.1, and 1.2 which is why there is no problem reporting Chrome's crashes. |
in addition to TLS 1.0 used by WinHttp by default. Fixes brave/brave-browser#1188
in addition to TLS 1.0 used by WinHttp by default. Fixes brave/brave-browser#1188
in addition to TLS 1.0 used by WinHttp by default. Fixes brave/brave-browser#1188
Verification passed on
Also verified by @LaurenWags and @kjozwiak on their Win 7 VMs. |
Test plan
See brave/brave-core#1292
Description
Copying from brave/browser-laptop#12910 as this is still an issue with
brave-core
. If we want crash reports for our Win 7 user base before we release 1.0 so we can see how stable the product is before the major release, we'll need to fix this. We usually get a good percentage of companies from users via the community that are running Win 7. If we decide to not support Win 7, we can close this off.Example of
chrome://crashes
not working under Win 7:STR are exactly the same as mentioned below.
The text was updated successfully, but these errors were encountered: