Don't fail localhost pages with INSECURE
See original GitHub issueTesting a local site using a self-signed certificate seems pretty reasonable.
Wdyt about us allowing localhost
in our INSECURE checks?
Issue Analytics
- State:
- Created 5 years ago
- Reactions:5
- Comments:26 (8 by maintainers)
Top Results From Across the Web
How to Fix a “This Site Can't Provide a Secure Connection ...
In this article, learn how to fix the secure connection error in MAMP. ... (on localhost, this usually means you don't have one...
Read more >allow-insecure-localhost is not bypassing cert errors for ...
Currently I can't register Service Worker when pages are served on `https://localhost:3000` with self signed certificate. because of error below.
Read more >localhost blocked on Chrome with "Privacy Error"
Try this: In Chrome, put in chrome://flags/#allow-insecure-localhost in the address bar. Enable the option that says "Allow invalid ...
Read more >How can I disable security checks for localhost? - Super User
I don't care! I'm talking to my own machine. How can I tell Chrome to ignore certificate errors on localhost? enter image description...
Read more >Fix automatic re-routing of http:// to https:// on localhost in Web ...
Just Fix it · Delete domain security policies · Put in localhost (or whatever domain) · Press the Delete button.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I confirmed that with and without that flag, the same security states are seen from the protocol.
Seems
--ignore-certificate-errors
disables interstitials and removes feature gating for things like WebSockets, but does not modify how the protocol sees the security state.This approach would require a flag for the DevTools client too btw. Which would probably lead to checking it for the first time it’s needed, and then never ever unchecking it, which is scary.
I’m wondering if we don’t really need to concern ourselves about that? If a machine is compromised such that a malicious website is being served at localhost, it would seem that the entire machine is compromised anyways. (EDIT: Actually, I’m failing to realize the attack could also come from the network level, if the DNS had been spoofed or something? I have a sketchy understanding of security in regards to this.)
–
I’m leaning towards total disabling of the security check for localhost. A special audit just for
localhost
seems fine too, although at first glance I’m unsure how that audit would be made with our current setup (how do we move the current code to a gatherer, and still early exit for non-local sites?).There is another complication for any automated approach, which is that not all local sites use the hostname
localhost
. What if the local site uses any other hostname? Seem an opt in for “this is a local site” flag would be necessary to handle this completely.@MichaelJCole the version of Lighthouse in which this has been fixed has not yet been released.