Anyone else out there getting intermittent "HTTPS not available" errors on sites where HTTPS is definitely available, on sites where you're confident the team doesn't make that grade of mistake?
For future reference - after taking various respondents advice and disabling OCSP in my browser, this problem has not recurred in a week of regular use.
@mhoye eh, I think that's a bug. slow ocsp shouldn't cause the browser to think that https isn't available...
Dana: Would capturing the certs of the affected sites help any? We might see some pattern in which OCSP responders are affected or some feature of the certs themselves that triggers different handling
If you view the certificate in Firefox the "about:certificate" URL contains the cert chain and could be mailed to us. I doubt that's the problem; this would be more of a Hail Mary "might as well rule it out" thing
Is your DoH also slow?
Are you using "HTTPS-Only", and not explicitly specifying the scheme? An explicit https:// URL should eventually give you a generic "site not available" timeout, or a specific error code. But if we're trying to upgrade and don't get a response "soon enough" we might show that error asking if you want to try unencrypted when you're using HTTPS-Only.
Slightly more complicated: we wait a bit, then send an http: request to see if the site responds to that. If we find out the site is quick to reply to http and _still_ hasn't replied to https we assume it doesn't have https. A slow or flaky OCSP might occasionally bump initial https connections over the timeout while not affecting the http probe.
You could lengthen the timeout by changing dom.security.https_only_fire_http_request_background_timer_ms
You can turn off the http probe entirely with dom.security.https_only_mode_send_http_background_request
security.OCSP.timeoutMilliseconds.soft is shorter than the time we wait before sending the http probe, but maybe combined with a slow DoH responses for both the initial site and then the OCSP server it's going over.