Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1449)

Side by Side Diff: chrome/browser/safe_browsing/client_side_detection_service.cc

Issue 7635010: Add support for client-side phishing detection for non-UMA users. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Merge Created 9 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/safe_browsing/client_side_detection_service.h" 5 #include "chrome/browser/safe_browsing/client_side_detection_service.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/logging.h" 8 #include "base/logging.h"
9 #include "base/time.h" 9 #include "base/time.h"
10 #include "base/memory/scoped_ptr.h" 10 #include "base/memory/scoped_ptr.h"
11 #include "base/message_loop.h" 11 #include "base/message_loop.h"
12 #include "base/metrics/histogram.h" 12 #include "base/metrics/histogram.h"
13 #include "base/string_util.h"
13 #include "base/stl_util.h" 14 #include "base/stl_util.h"
14 #include "base/task.h" 15 #include "base/task.h"
15 #include "base/time.h" 16 #include "base/time.h"
17 #include "chrome/browser/browser_process.h"
18 #include "chrome/browser/safe_browsing/browser_features.h"
19 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
16 #include "chrome/common/net/http_return.h" 20 #include "chrome/common/net/http_return.h"
17 #include "chrome/common/safe_browsing/client_model.pb.h" 21 #include "chrome/common/safe_browsing/client_model.pb.h"
18 #include "chrome/common/safe_browsing/csd.pb.h" 22 #include "chrome/common/safe_browsing/csd.pb.h"
19 #include "chrome/common/safe_browsing/safebrowsing_messages.h" 23 #include "chrome/common/safe_browsing/safebrowsing_messages.h"
24 #include "chrome/renderer/safe_browsing/features.h"
20 #include "content/browser/browser_thread.h" 25 #include "content/browser/browser_thread.h"
21 #include "content/browser/renderer_host/render_process_host.h" 26 #include "content/browser/renderer_host/render_process_host.h"
22 #include "content/common/notification_service.h" 27 #include "content/common/notification_service.h"
23 #include "content/common/url_fetcher.h" 28 #include "content/common/url_fetcher.h"
24 #include "crypto/sha2.h" 29 #include "crypto/sha2.h"
25 #include "googleurl/src/gurl.h" 30 #include "googleurl/src/gurl.h"
26 #include "net/base/load_flags.h" 31 #include "net/base/load_flags.h"
27 #include "net/http/http_response_headers.h" 32 #include "net/http/http_response_headers.h"
28 #include "net/url_request/url_request_context_getter.h" 33 #include "net/url_request/url_request_context_getter.h"
29 #include "net/url_request/url_request_status.h" 34 #include "net/url_request/url_request_status.h"
(...skipping 26 matching lines...) Expand all
56 scoped_ptr<ClientReportPhishingRequestCallback> callback; 61 scoped_ptr<ClientReportPhishingRequestCallback> callback;
57 GURL phishing_url; 62 GURL phishing_url;
58 }; 63 };
59 64
60 ClientSideDetectionService::CacheState::CacheState(bool phish, base::Time time) 65 ClientSideDetectionService::CacheState::CacheState(bool phish, base::Time time)
61 : is_phishing(phish), 66 : is_phishing(phish),
62 timestamp(time) {} 67 timestamp(time) {}
63 68
64 ClientSideDetectionService::ClientSideDetectionService( 69 ClientSideDetectionService::ClientSideDetectionService(
65 net::URLRequestContextGetter* request_context_getter) 70 net::URLRequestContextGetter* request_context_getter)
66 : ALLOW_THIS_IN_INITIALIZER_LIST(method_factory_(this)), 71 : sb_service_(g_browser_process->safe_browsing_service()),
72 ALLOW_THIS_IN_INITIALIZER_LIST(method_factory_(this)),
67 request_context_getter_(request_context_getter) { 73 request_context_getter_(request_context_getter) {
68 registrar_.Add(this, content::NOTIFICATION_RENDERER_PROCESS_CREATED, 74 registrar_.Add(this, content::NOTIFICATION_RENDERER_PROCESS_CREATED,
69 NotificationService::AllSources()); 75 NotificationService::AllSources());
70 } 76 }
71 77
72 ClientSideDetectionService::~ClientSideDetectionService() { 78 ClientSideDetectionService::~ClientSideDetectionService() {
73 method_factory_.RevokeAll(); 79 method_factory_.RevokeAll();
74 STLDeleteContainerPairPointers(client_phishing_reports_.begin(), 80 STLDeleteContainerPairPointers(client_phishing_reports_.begin(),
75 client_phishing_reports_.end()); 81 client_phishing_reports_.end());
76 client_phishing_reports_.clear(); 82 client_phishing_reports_.clear();
(...skipping 153 matching lines...) Expand 10 before | Expand all | Expand 10 after
230 model_max_age_.reset(); 236 model_max_age_.reset();
231 237
232 // Schedule the next model reload. 238 // Schedule the next model reload.
233 MessageLoop::current()->PostDelayedTask( 239 MessageLoop::current()->PostDelayedTask(
234 FROM_HERE, 240 FROM_HERE,
235 method_factory_.NewRunnableMethod( 241 method_factory_.NewRunnableMethod(
236 &ClientSideDetectionService::StartFetchModel), 242 &ClientSideDetectionService::StartFetchModel),
237 delay_ms); 243 delay_ms);
238 } 244 }
239 245
246 // static
247 void ClientSideDetectionService::SanitizeRequestForPingback(
248 const ClientPhishingRequest& full_request,
249 ClientPhishingRequest* sanitized_request) {
250 DCHECK(full_request.IsInitialized());
251 sanitized_request->Clear();
252 if (full_request.has_suffix_prefix_hash()) {
253 sanitized_request->set_suffix_prefix_hash(
254 full_request.suffix_prefix_hash());
255 }
256 sanitized_request->set_client_score(full_request.client_score());
257 if (full_request.has_is_phishing()) {
258 sanitized_request->set_is_phishing(full_request.is_phishing());
259 }
260
261 // Token and term features are not included in the pingback.
mattm 2011/08/12 03:00:28 Did you consider a white-listing approach to sanit
Brian Ryner 2011/08/12 04:52:24 That's a good point; I think whitelisting is proba
262 static const char* const kFilteredModelFeatures[] = {
263 features::kUrlTldToken,
264 features::kUrlDomainToken,
265 features::kUrlOtherHostToken,
266 features::kUrlPathToken,
267 features::kPageLinkDomain,
268 features::kPageTerm,
269 };
270
271 for (int i = 0; i < full_request.feature_map_size(); ++i) {
272 const ClientPhishingRequest_Feature& feature = full_request.feature_map(i);
273 bool filtered = false;
274 for (size_t j = 0; j < arraysize(kFilteredModelFeatures); ++j) {
275 if (StartsWithASCII(feature.name(), kFilteredModelFeatures[j],
276 true /* case sensitive */)) {
277 filtered = true;
278 break;
279 }
280 }
281 if (!filtered) {
282 sanitized_request->add_feature_map()->CopyFrom(feature);
283 }
284 }
285
286 if (full_request.has_model_version()) {
287 sanitized_request->set_model_version(full_request.model_version());
288 }
289
290 static const char* const kFilteredNonModelFeatures[] = {
291 features::kBadIpFetch,
292 features::kSafeBrowsingMaliciousUrl,
293 features::kSafeBrowsingOriginalUrl,
294 };
295
296 for (int i = 0; i < full_request.non_model_feature_map_size(); ++i) {
297 const ClientPhishingRequest_Feature& feature =
298 full_request.non_model_feature_map(i);
299 bool filtered = false;
300 for (size_t j = 0; j < arraysize(kFilteredNonModelFeatures); ++j) {
301 if (StartsWithASCII(feature.name(), kFilteredNonModelFeatures[j],
302 true /* case sensitive */)) {
303 filtered = true;
304 break;
305 }
306 }
307 // We look for referrer as a substring, since there are a few different
308 // permutations of the feature.
309 if (!filtered &&
310 feature.name().find(std::string(features::kReferrer) + "=") ==
311 std::string::npos) {
312 sanitized_request->add_non_model_feature_map()->CopyFrom(feature);
313 }
314 }
315 }
316
240 void ClientSideDetectionService::StartClientReportPhishingRequest( 317 void ClientSideDetectionService::StartClientReportPhishingRequest(
241 ClientPhishingRequest* verdict, 318 ClientPhishingRequest* verdict,
242 ClientReportPhishingRequestCallback* callback) { 319 ClientReportPhishingRequestCallback* callback) {
243 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 320 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
244 scoped_ptr<ClientPhishingRequest> request(verdict); 321 scoped_ptr<ClientPhishingRequest> request(verdict);
245 scoped_ptr<ClientReportPhishingRequestCallback> cb(callback); 322 scoped_ptr<ClientReportPhishingRequestCallback> cb(callback);
246 323
324 // Create the version of the request proto that we'll send over the network.
325 ClientPhishingRequest request_to_send;
326 if (sb_service_ && sb_service_->CanReportStats()) {
327 request_to_send.CopyFrom(*request);
328 } else {
329 SanitizeRequestForPingback(*request, &request_to_send);
330 }
331
247 std::string request_data; 332 std::string request_data;
248 if (!request->SerializeToString(&request_data)) { 333 if (!request_to_send.SerializeToString(&request_data)) {
249 UMA_HISTOGRAM_COUNTS("SBClientPhishing.RequestNotSerialized", 1); 334 UMA_HISTOGRAM_COUNTS("SBClientPhishing.RequestNotSerialized", 1);
250 VLOG(1) << "Unable to serialize the CSD request. Proto file changed?"; 335 VLOG(1) << "Unable to serialize the CSD request. Proto file changed?";
251 if (cb.get()) { 336 if (cb.get()) {
252 cb->Run(GURL(request->url()), false); 337 cb->Run(GURL(request->url()), false);
253 } 338 }
254 return; 339 return;
255 } 340 }
256 341
257 URLFetcher* fetcher = URLFetcher::Create(0 /* ID is not used */, 342 URLFetcher* fetcher = URLFetcher::Create(0 /* ID is not used */,
258 GURL(kClientReportPhishingUrl), 343 GURL(kClientReportPhishingUrl),
(...skipping 221 matching lines...) Expand 10 before | Expand all | Expand 10 after
480 } 565 }
481 } 566 }
482 for (int i = 0; i < model.page_word_size(); ++i) { 567 for (int i = 0; i < model.page_word_size(); ++i) {
483 if (model.page_word(i) < 0 || model.page_word(i) > max_index) { 568 if (model.page_word(i) < 0 || model.page_word(i) > max_index) {
484 return false; 569 return false;
485 } 570 }
486 } 571 }
487 return true; 572 return true;
488 } 573 }
489 } // namespace safe_browsing 574 } // namespace safe_browsing
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698