Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2)

Side by Side Diff: net/base/transport_security_state.cc

Issue 6500010: HSTS: add net-internals UI. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: ... Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/base/transport_security_state.h" 5 #include "net/base/transport_security_state.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/json/json_reader.h" 8 #include "base/json/json_reader.h"
9 #include "base/json/json_writer.h" 9 #include "base/json/json_writer.h"
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 10 matching lines...) Expand all
21 namespace net { 21 namespace net {
22 22
23 const long int TransportSecurityState::kMaxHSTSAgeSecs = 86400 * 365; // 1 year 23 const long int TransportSecurityState::kMaxHSTSAgeSecs = 86400 * 365; // 1 year
24 24
25 TransportSecurityState::TransportSecurityState() 25 TransportSecurityState::TransportSecurityState()
26 : delegate_(NULL) { 26 : delegate_(NULL) {
27 } 27 }
28 28
29 void TransportSecurityState::EnableHost(const std::string& host, 29 void TransportSecurityState::EnableHost(const std::string& host,
30 const DomainState& state) { 30 const DomainState& state) {
31 const std::string canonicalised_host = CanonicaliseHost(host); 31 const std::string canonicalized_host = CanonicalizeHost(host);
32 if (canonicalised_host.empty()) 32 if (canonicalized_host.empty())
33 return; 33 return;
34 34
35 bool temp; 35 bool temp;
36 if (IsPreloadedSTS(canonicalised_host, &temp)) 36 if (IsPreloadedSTS(canonicalized_host, &temp))
37 return; 37 return;
38 38
39 char hashed[base::SHA256_LENGTH]; 39 char hashed[base::SHA256_LENGTH];
40 base::SHA256HashString(canonicalised_host, hashed, sizeof(hashed)); 40 base::SHA256HashString(canonicalized_host, hashed, sizeof(hashed));
41 41
42 // Use the original creation date if we already have this host. 42 // Use the original creation date if we already have this host.
43 DomainState state_copy(state); 43 DomainState state_copy(state);
44 DomainState existing_state; 44 DomainState existing_state;
45 if (IsEnabledForHost(&existing_state, host)) 45 if (IsEnabledForHost(&existing_state, host))
46 state_copy.created = existing_state.created; 46 state_copy.created = existing_state.created;
47 47
48 // We don't store these values.
49 state_copy.preloaded = false;
50 state_copy.domain.clear();
51
48 enabled_hosts_[std::string(hashed, sizeof(hashed))] = state_copy; 52 enabled_hosts_[std::string(hashed, sizeof(hashed))] = state_copy;
49 DirtyNotify(); 53 DirtyNotify();
50 } 54 }
51 55
56 bool TransportSecurityState::DeleteHost(const std::string& host) {
57 const std::string canonicalized_host = CanonicalizeHost(host);
58 if (canonicalized_host.empty())
59 return false;
60
61 char hashed[base::SHA256_LENGTH];
62 base::SHA256HashString(canonicalized_host, hashed, sizeof(hashed));
63
64 std::map<std::string, DomainState>::iterator i = enabled_hosts_.find(
65 std::string(hashed, sizeof(hashed)));
66 if (i != enabled_hosts_.end()) {
67 enabled_hosts_.erase(i);
68 DirtyNotify();
69 return true;
70 }
71 return false;
72 }
73
52 // IncludeNUL converts a char* to a std::string and includes the terminating 74 // IncludeNUL converts a char* to a std::string and includes the terminating
53 // NUL in the result. 75 // NUL in the result.
54 static std::string IncludeNUL(const char* in) { 76 static std::string IncludeNUL(const char* in) {
55 return std::string(in, strlen(in) + 1); 77 return std::string(in, strlen(in) + 1);
56 } 78 }
57 79
58 bool TransportSecurityState::IsEnabledForHost(DomainState* result, 80 bool TransportSecurityState::IsEnabledForHost(DomainState* result,
59 const std::string& host) { 81 const std::string& host) {
60 const std::string canonicalised_host = CanonicaliseHost(host); 82 *result = DomainState();
61 if (canonicalised_host.empty()) 83
84 const std::string canonicalized_host = CanonicalizeHost(host);
85 if (canonicalized_host.empty())
62 return false; 86 return false;
63 87
64 bool include_subdomains; 88 bool include_subdomains;
65 if (IsPreloadedSTS(canonicalised_host, &include_subdomains)) { 89 if (IsPreloadedSTS(canonicalized_host, &include_subdomains)) {
66 result->created = result->expiry = base::Time::FromTimeT(0); 90 result->created = result->expiry = base::Time::FromTimeT(0);
67 result->mode = DomainState::MODE_STRICT; 91 result->mode = DomainState::MODE_STRICT;
68 result->include_subdomains = include_subdomains; 92 result->include_subdomains = include_subdomains;
93 result->preloaded = true;
69 return true; 94 return true;
70 } 95 }
71 96
97 result->preloaded = false;
72 base::Time current_time(base::Time::Now()); 98 base::Time current_time(base::Time::Now());
73 99
74 for (size_t i = 0; canonicalised_host[i]; i += canonicalised_host[i] + 1) { 100 for (size_t i = 0; canonicalized_host[i]; i += canonicalized_host[i] + 1) {
75 char hashed_domain[base::SHA256_LENGTH]; 101 char hashed_domain[base::SHA256_LENGTH];
76 102
77 base::SHA256HashString(IncludeNUL(&canonicalised_host[i]), &hashed_domain, 103 base::SHA256HashString(IncludeNUL(&canonicalized_host[i]), &hashed_domain,
78 sizeof(hashed_domain)); 104 sizeof(hashed_domain));
79 std::map<std::string, DomainState>::iterator j = 105 std::map<std::string, DomainState>::iterator j =
80 enabled_hosts_.find(std::string(hashed_domain, sizeof(hashed_domain))); 106 enabled_hosts_.find(std::string(hashed_domain, sizeof(hashed_domain)));
81 if (j == enabled_hosts_.end()) 107 if (j == enabled_hosts_.end())
82 continue; 108 continue;
83 109
84 if (current_time > j->second.expiry) { 110 if (current_time > j->second.expiry) {
85 enabled_hosts_.erase(j); 111 enabled_hosts_.erase(j);
86 DirtyNotify(); 112 DirtyNotify();
87 continue; 113 continue;
88 } 114 }
89 115
90 *result = j->second; 116 *result = j->second;
117 result->domain = DNSDomainToString(
118 canonicalized_host.substr(i, canonicalized_host.size() - i));
91 119
92 // If we matched the domain exactly, it doesn't matter what the value of 120 // If we matched the domain exactly, it doesn't matter what the value of
93 // include_subdomains is. 121 // include_subdomains is.
94 if (i == 0) 122 if (i == 0)
95 return true; 123 return true;
96 124
97 return j->second.include_subdomains; 125 return j->second.include_subdomains;
98 } 126 }
99 127
100 return false; 128 return false;
(...skipping 268 matching lines...) Expand 10 before | Expand all | Expand 10 after
369 397
370 TransportSecurityState::~TransportSecurityState() { 398 TransportSecurityState::~TransportSecurityState() {
371 } 399 }
372 400
373 void TransportSecurityState::DirtyNotify() { 401 void TransportSecurityState::DirtyNotify() {
374 if (delegate_) 402 if (delegate_)
375 delegate_->StateIsDirty(this); 403 delegate_->StateIsDirty(this);
376 } 404 }
377 405
378 // static 406 // static
379 std::string TransportSecurityState::CanonicaliseHost(const std::string& host) { 407 std::string TransportSecurityState::CanonicalizeHost(const std::string& host) {
380 // We cannot perform the operations as detailed in the spec here as |host| 408 // We cannot perform the operations as detailed in the spec here as |host|
381 // has already undergone IDN processing before it reached us. Thus, we check 409 // has already undergone IDN processing before it reached us. Thus, we check
382 // that there are no invalid characters in the host and lowercase the result. 410 // that there are no invalid characters in the host and lowercase the result.
383 411
384 std::string new_host; 412 std::string new_host;
385 if (!DNSDomainFromDot(host, &new_host)) { 413 if (!DNSDomainFromDot(host, &new_host)) {
386 // DNSDomainFromDot can fail if any label is > 63 bytes or if the whole 414 // DNSDomainFromDot can fail if any label is > 63 bytes or if the whole
387 // name is >255 bytes. However, search terms can have those properties. 415 // name is >255 bytes. However, search terms can have those properties.
388 return std::string(); 416 return std::string();
389 } 417 }
(...skipping 14 matching lines...) Expand all
404 // step 3(b) 432 // step 3(b)
405 if (new_host[i + 1] == '-' || 433 if (new_host[i + 1] == '-' ||
406 new_host[i + label_length] == '-') { 434 new_host[i + label_length] == '-') {
407 return std::string(); 435 return std::string();
408 } 436 }
409 } 437 }
410 438
411 return new_host; 439 return new_host;
412 } 440 }
413 441
414 // IsPreloadedSTS returns true if the canonicalised hostname should always be 442 // IsPreloadedSTS returns true if the canonicalized hostname should always be
415 // considered to have STS enabled. 443 // considered to have STS enabled.
416 // static 444 // static
417 bool TransportSecurityState::IsPreloadedSTS( 445 bool TransportSecurityState::IsPreloadedSTS(
418 const std::string& canonicalised_host, bool *include_subdomains) { 446 const std::string& canonicalized_host, bool *include_subdomains) {
419 // In the medium term this list is likely to just be hardcoded here. This, 447 // In the medium term this list is likely to just be hardcoded here. This,
420 // slightly odd, form removes the need for additional relocations records. 448 // slightly odd, form removes the need for additional relocations records.
421 static const struct { 449 static const struct {
422 uint8 length; 450 uint8 length;
423 bool include_subdomains; 451 bool include_subdomains;
424 char dns_name[30]; 452 char dns_name[30];
425 } kPreloadedSTS[] = { 453 } kPreloadedSTS[] = {
426 {16, false, "\003www\006paypal\003com"}, 454 {16, false, "\003www\006paypal\003com"},
427 {16, false, "\003www\006elanex\003biz"}, 455 {16, false, "\003www\006elanex\003biz"},
428 {12, true, "\006jottit\003com"}, 456 {12, true, "\006jottit\003com"},
429 {19, true, "\015sunshinepress\003org"}, 457 {19, true, "\015sunshinepress\003org"},
430 {21, false, "\003www\013noisebridge\003net"}, 458 {21, false, "\003www\013noisebridge\003net"},
431 {10, false, "\004neg9\003org"}, 459 {10, false, "\004neg9\003org"},
432 {12, true, "\006riseup\003net"}, 460 {12, true, "\006riseup\003net"},
433 {11, false, "\006factor\002cc"}, 461 {11, false, "\006factor\002cc"},
434 {22, false, "\007members\010mayfirst\003org"}, 462 {22, false, "\007members\010mayfirst\003org"},
435 {22, false, "\007support\010mayfirst\003org"}, 463 {22, false, "\007support\010mayfirst\003org"},
436 {17, false, "\002id\010mayfirst\003org"}, 464 {17, false, "\002id\010mayfirst\003org"},
437 {20, false, "\005lists\010mayfirst\003org"}, 465 {20, false, "\005lists\010mayfirst\003org"},
438 {19, true, "\015splendidbacon\003com"}, 466 {19, true, "\015splendidbacon\003com"},
439 {19, false, "\006health\006google\003com"}, 467 {19, false, "\006health\006google\003com"},
440 {21, false, "\010checkout\006google\003com"}, 468 {21, false, "\010checkout\006google\003com"},
441 {19, false, "\006chrome\006google\003com"}, 469 {19, false, "\006chrome\006google\003com"},
442 }; 470 };
443 static const size_t kNumPreloadedSTS = ARRAYSIZE_UNSAFE(kPreloadedSTS); 471 static const size_t kNumPreloadedSTS = ARRAYSIZE_UNSAFE(kPreloadedSTS);
444 472
445 for (size_t i = 0; canonicalised_host[i]; i += canonicalised_host[i] + 1) { 473 for (size_t i = 0; canonicalized_host[i]; i += canonicalized_host[i] + 1) {
446 for (size_t j = 0; j < kNumPreloadedSTS; j++) { 474 for (size_t j = 0; j < kNumPreloadedSTS; j++) {
447 if (kPreloadedSTS[j].length == canonicalised_host.size() - i && 475 if (kPreloadedSTS[j].length == canonicalized_host.size() - i &&
448 (kPreloadedSTS[j].include_subdomains || i == 0) && 476 (kPreloadedSTS[j].include_subdomains || i == 0) &&
449 memcmp(kPreloadedSTS[j].dns_name, &canonicalised_host[i], 477 memcmp(kPreloadedSTS[j].dns_name, &canonicalized_host[i],
450 kPreloadedSTS[j].length) == 0) { 478 kPreloadedSTS[j].length) == 0) {
451 *include_subdomains = kPreloadedSTS[j].include_subdomains; 479 *include_subdomains = kPreloadedSTS[j].include_subdomains;
452 return true; 480 return true;
453 } 481 }
454 } 482 }
455 } 483 }
456 484
457 return false; 485 return false;
458 } 486 }
459 487
460 } // namespace 488 } // namespace
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698