| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // The Safe Browsing service is responsible for downloading anti-phishing and | 5 // Safe Browsing Database Manager implementation that manages a local |
| 6 // anti-malware tables and checking urls against them. | 6 // database. This is used by Desktop Chromium. |
| 7 | 7 |
| 8 #ifndef CHROME_BROWSER_SAFE_BROWSING_DATABASE_MANAGER_H_ | 8 #ifndef CHROME_BROWSER_SAFE_BROWSING_LOCAL_DATABASE_MANAGER_H_ |
| 9 #define CHROME_BROWSER_SAFE_BROWSING_DATABASE_MANAGER_H_ | 9 #define CHROME_BROWSER_SAFE_BROWSING_LOCAL_DATABASE_MANAGER_H_ |
| 10 | 10 |
| 11 #include <deque> | 11 #include <deque> |
| 12 #include <map> | 12 #include <map> |
| 13 #include <set> | 13 #include <set> |
| 14 #include <string> | 14 #include <string> |
| 15 #include <vector> | 15 #include <vector> |
| 16 | 16 |
| 17 #include "base/callback.h" | 17 #include "base/callback.h" |
| 18 #include "base/containers/hash_tables.h" | 18 #include "base/containers/hash_tables.h" |
| 19 #include "base/memory/ref_counted.h" | 19 #include "base/memory/ref_counted.h" |
| 20 #include "base/memory/scoped_ptr.h" | 20 #include "base/memory/scoped_ptr.h" |
| 21 #include "base/memory/weak_ptr.h" |
| 21 #include "base/synchronization/lock.h" | 22 #include "base/synchronization/lock.h" |
| 22 #include "base/time/time.h" | 23 #include "base/time/time.h" |
| 24 #include "chrome/browser/safe_browsing/database_manager.h" |
| 23 #include "chrome/browser/safe_browsing/protocol_manager.h" | 25 #include "chrome/browser/safe_browsing/protocol_manager.h" |
| 24 #include "chrome/browser/safe_browsing/safe_browsing_util.h" | 26 #include "chrome/browser/safe_browsing/safe_browsing_util.h" |
| 25 #include "url/gurl.h" | 27 #include "url/gurl.h" |
| 26 | 28 |
| 27 class SafeBrowsingService; | 29 class SafeBrowsingService; |
| 28 class SafeBrowsingDatabase; | 30 class SafeBrowsingDatabase; |
| 29 | 31 |
| 30 namespace net { | 32 namespace net { |
| 31 class URLRequestContext; | 33 class URLRequestContext; |
| 32 class URLRequestContextGetter; | 34 class URLRequestContextGetter; |
| 33 } | 35 } |
| 34 | 36 |
| 35 namespace safe_browsing { | 37 namespace safe_browsing { |
| 36 class ClientSideDetectionService; | 38 class ClientSideDetectionService; |
| 37 class DownloadProtectionService; | 39 class DownloadProtectionService; |
| 38 } | 40 } |
| 39 | 41 |
| 42 // Implemetation that manages a local database on disk. |
| 43 // |
| 40 // Construction needs to happen on the main thread. | 44 // Construction needs to happen on the main thread. |
| 41 class SafeBrowsingDatabaseManager | 45 class LocalSafeBrowsingDatabaseManager |
| 42 : public base::RefCountedThreadSafe<SafeBrowsingDatabaseManager>, | 46 : public SafeBrowsingDatabaseManager, |
| 43 public SafeBrowsingProtocolManagerDelegate { | 47 public SafeBrowsingProtocolManagerDelegate { |
| 44 public: | 48 public: |
| 45 class Client; | |
| 46 | |
| 47 // Bundle of SafeBrowsing state while performing a URL or hash prefix check. | 49 // Bundle of SafeBrowsing state while performing a URL or hash prefix check. |
| 48 struct SafeBrowsingCheck { | 50 struct SafeBrowsingCheck { |
| 49 // |check_type| should correspond to the type of item that is being | 51 // |check_type| should correspond to the type of item that is being |
| 50 // checked, either a URL or a binary hash/URL. We store this for two | 52 // checked, either a URL or a binary hash/URL. We store this for two |
| 51 // purposes: to know which of Client's methods to call when a result is | 53 // purposes: to know which of Client's methods to call when a result is |
| 52 // known, and for logging purposes. It *isn't* used to predict the response | 54 // known, and for logging purposes. It *isn't* used to predict the response |
| 53 // list type, that is information that the server gives us. | 55 // list type, that is information that the server gives us. |
| 54 SafeBrowsingCheck(const std::vector<GURL>& urls, | 56 SafeBrowsingCheck(const std::vector<GURL>& urls, |
| 55 const std::vector<SBFullHash>& full_hashes, | 57 const std::vector<SBFullHash>& full_hashes, |
| 56 Client* client, | 58 Client* client, |
| 57 safe_browsing_util::ListType check_type, | 59 safe_browsing_util::ListType check_type, |
| 58 const std::vector<SBThreatType>& expected_threats); | 60 const std::vector<SBThreatType>& expected_threats); |
| 59 ~SafeBrowsingCheck(); | 61 ~SafeBrowsingCheck(); |
| 60 | 62 |
| 61 // Either |urls| or |full_hashes| is used to lookup database. |*_results| | 63 // Either |urls| or |full_hashes| is used to lookup database. |*_results| |
| 62 // are parallel vectors containing the results. They are initialized to | 64 // are parallel vectors containing the results. They are initialized to |
| 63 // contain SB_THREAT_TYPE_SAFE. | 65 // contain SB_THREAT_TYPE_SAFE. |
| 64 std::vector<GURL> urls; | 66 std::vector<GURL> urls; |
| 65 std::vector<SBThreatType> url_results; | 67 std::vector<SBThreatType> url_results; |
| 66 std::vector<std::string> url_metadata; | 68 std::vector<std::string> url_metadata; |
| 67 std::vector<SBFullHash> full_hashes; | 69 std::vector<SBFullHash> full_hashes; |
| 68 std::vector<SBThreatType> full_hash_results; | 70 std::vector<SBThreatType> full_hash_results; |
| 69 | 71 |
| 70 Client* client; | 72 SafeBrowsingDatabaseManager::Client* client; |
| 71 bool need_get_hash; | 73 bool need_get_hash; |
| 72 base::TimeTicks start; // When check was sent to SB service. | 74 base::TimeTicks start; // When check was sent to SB service. |
| 73 safe_browsing_util::ListType check_type; // See comment in constructor. | 75 safe_browsing_util::ListType check_type; // See comment in constructor. |
| 74 std::vector<SBThreatType> expected_threats; | 76 std::vector<SBThreatType> expected_threats; |
| 75 std::vector<SBPrefix> prefix_hits; | 77 std::vector<SBPrefix> prefix_hits; |
| 76 std::vector<SBFullHashResult> cache_hits; | 78 std::vector<SBFullHashResult> cache_hits; |
| 77 | 79 |
| 80 // Invoke one of client's callbacks with these results. |
| 81 void OnSafeBrowsingResult(); |
| 82 |
| 78 // Vends weak pointers for async callbacks on the IO thread, such as | 83 // Vends weak pointers for async callbacks on the IO thread, such as |
| 79 // timeout checks and replies from checks performed on the SB task runner. | 84 // timeout checks and replies from checks performed on the SB task runner. |
| 80 // TODO(lzheng): We should consider to use this time out check | 85 // TODO(lzheng): We should consider to use this time out check |
| 81 // for browsing too (instead of implementing in | 86 // for browsing too (instead of implementing in |
| 82 // safe_browsing_resource_handler.cc). | 87 // safe_browsing_resource_handler.cc). |
| 83 scoped_ptr<base::WeakPtrFactory< | 88 scoped_ptr<base::WeakPtrFactory<LocalSafeBrowsingDatabaseManager>> |
| 84 SafeBrowsingDatabaseManager> > weak_ptr_factory_; | 89 weak_ptr_factory_; |
| 85 | 90 |
| 86 private: | 91 private: |
| 87 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingCheck); | 92 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingCheck); |
| 88 }; | 93 }; |
| 89 | 94 |
| 90 class Client { | |
| 91 public: | |
| 92 void OnSafeBrowsingResult(const SafeBrowsingCheck& check); | |
| 93 | |
| 94 protected: | |
| 95 virtual ~Client() {} | |
| 96 | |
| 97 // Called when the result of checking a browse URL is known. | |
| 98 virtual void OnCheckBrowseUrlResult(const GURL& url, | |
| 99 SBThreatType threat_type, | |
| 100 const std::string& metadata) {} | |
| 101 | |
| 102 // Called when the result of checking a download URL is known. | |
| 103 virtual void OnCheckDownloadUrlResult(const std::vector<GURL>& url_chain, | |
| 104 SBThreatType threat_type) {} | |
| 105 | |
| 106 // Called when the result of checking a set of extensions is known. | |
| 107 virtual void OnCheckExtensionsResult( | |
| 108 const std::set<std::string>& threats) {} | |
| 109 }; | |
| 110 | |
| 111 // Creates the safe browsing service. Need to initialize before using. | 95 // Creates the safe browsing service. Need to initialize before using. |
| 112 explicit SafeBrowsingDatabaseManager( | 96 explicit LocalSafeBrowsingDatabaseManager( |
| 113 const scoped_refptr<SafeBrowsingService>& service); | 97 const scoped_refptr<SafeBrowsingService>& service); |
| 114 | 98 |
| 115 // Returns true if the url's scheme can be checked. | 99 // |
| 116 bool CanCheckUrl(const GURL& url) const; | 100 // SafeBrowsingDatabaseManager overrides |
| 101 // |
| 117 | 102 |
| 118 // Returns whether download protection is enabled. | 103 bool CanCheckUrl(const GURL& url) const override; |
| 119 bool download_protection_enabled() const { | |
| 120 return enable_download_protection_; | |
| 121 } | |
| 122 | 104 |
| 123 // Called on the IO thread to check if the given url is safe or not. If we | 105 bool CheckBrowseUrl(const GURL& url, Client* client) override; |
| 124 // can synchronously determine that the url is safe, CheckUrl returns true. | 106 bool CheckDownloadUrl(const std::vector<GURL>& url_chain, |
| 125 // Otherwise it returns false, and "client" is called asynchronously with the | 107 Client* client) override; |
| 126 // result when it is ready. | 108 bool CheckExtensionIDs(const std::set<std::string>& extension_ids, |
| 127 virtual bool CheckBrowseUrl(const GURL& url, Client* client); | 109 Client* client) override; |
| 110 bool MatchCsdWhitelistUrl(const GURL& url) override; |
| 111 bool MatchMalwareIP(const std::string& ip_address) override; |
| 112 bool MatchDownloadWhitelistUrl(const GURL& url) override; |
| 113 bool MatchDownloadWhitelistString(const std::string& str) override; |
| 114 bool MatchInclusionWhitelistUrl(const GURL& url) override; |
| 115 bool IsMalwareKillSwitchOn() override; |
| 116 bool IsCsdWhitelistKillSwitchOn() override; |
| 117 void CancelCheck(Client* client) override; |
| 118 void StartOnIOThread() override; |
| 119 void StopOnIOThread(bool shutdown) override; |
| 120 bool download_protection_enabled() const override; |
| 128 | 121 |
| 129 // Check if the prefix for |url| is in safebrowsing download add lists. | 122 protected: |
| 130 // Result will be passed to callback in |client|. | 123 ~LocalSafeBrowsingDatabaseManager() override; |
| 131 virtual bool CheckDownloadUrl(const std::vector<GURL>& url_chain, | |
| 132 Client* client); | |
| 133 | 124 |
| 134 // Check which prefixes in |extension_ids| are in the safebrowsing blacklist. | 125 // protected for tests. |
| 135 // Returns true if not, false if further checks need to be made in which case | 126 void NotifyDatabaseUpdateFinished(bool update_succeeded); |
| 136 // the result will be passed to |client|. | |
| 137 virtual bool CheckExtensionIDs(const std::set<std::string>& extension_ids, | |
| 138 Client* client); | |
| 139 | 127 |
| 140 // Check if the |url| matches any of the full-length hashes from the client- | 128 private: |
| 141 // side phishing detection whitelist. Returns true if there was a match and | |
| 142 // false otherwise. To make sure we are conservative we will return true if | |
| 143 // an error occurs. This method must be called on the IO thread. | |
| 144 virtual bool MatchCsdWhitelistUrl(const GURL& url); | |
| 145 | |
| 146 // Check if the given IP address (either IPv4 or IPv6) matches the malware | |
| 147 // IP blacklist. | |
| 148 virtual bool MatchMalwareIP(const std::string& ip_address); | |
| 149 | |
| 150 // Check if the |url| matches any of the full-length hashes from the download | |
| 151 // whitelist. Returns true if there was a match and false otherwise. To make | |
| 152 // sure we are conservative we will return true if an error occurs. This | |
| 153 // method must be called on the IO thread. | |
| 154 virtual bool MatchDownloadWhitelistUrl(const GURL& url); | |
| 155 | |
| 156 // Check if |str| matches any of the full-length hashes from the download | |
| 157 // whitelist. Returns true if there was a match and false otherwise. To make | |
| 158 // sure we are conservative we will return true if an error occurs. This | |
| 159 // method must be called on the IO thread. | |
| 160 virtual bool MatchDownloadWhitelistString(const std::string& str); | |
| 161 | |
| 162 // Check if the |url| matches any of the full-length hashes from the off- | |
| 163 // domain inclusion whitelist. Returns true if there was a match and false | |
| 164 // otherwise. To make sure we are conservative, we will return true if an | |
| 165 // error occurs. This method must be called on the IO thread. | |
| 166 virtual bool MatchInclusionWhitelistUrl(const GURL& url); | |
| 167 | |
| 168 // Check if the CSD malware IP matching kill switch is turned on. | |
| 169 virtual bool IsMalwareKillSwitchOn(); | |
| 170 | |
| 171 // Check if the CSD whitelist kill switch is turned on. | |
| 172 virtual bool IsCsdWhitelistKillSwitchOn(); | |
| 173 | |
| 174 // Called on the IO thread to cancel a pending check if the result is no | |
| 175 // longer needed. | |
| 176 void CancelCheck(Client* client); | |
| 177 | |
| 178 // Called on the IO thread when the SafeBrowsingProtocolManager has received | 129 // Called on the IO thread when the SafeBrowsingProtocolManager has received |
| 179 // the full hash results for prefix hits detected in the database. | 130 // the full hash results for prefix hits detected in the database. |
| 180 void HandleGetHashResults(SafeBrowsingCheck* check, | 131 void HandleGetHashResults(SafeBrowsingCheck* check, |
| 181 const std::vector<SBFullHashResult>& full_hashes, | 132 const std::vector<SBFullHashResult>& full_hashes, |
| 182 const base::TimeDelta& cache_lifetime); | 133 const base::TimeDelta& cache_lifetime); |
| 183 | 134 |
| 184 // Called to initialize objects that are used on the io_thread. This may be | 135 friend class base::RefCountedThreadSafe<LocalSafeBrowsingDatabaseManager>; |
| 185 // called multiple times during the life of the DatabaseManager. Must be | |
| 186 // called on IO thread. | |
| 187 void StartOnIOThread(); | |
| 188 | |
| 189 // Called to stop or shutdown operations on the io_thread. This may be called | |
| 190 // multiple times during the life of the DatabaseManager. Must be called | |
| 191 // on IO thread. If shutdown is true, the manager is disabled permanently. | |
| 192 void StopOnIOThread(bool shutdown); | |
| 193 | |
| 194 protected: | |
| 195 ~SafeBrowsingDatabaseManager() override; | |
| 196 | |
| 197 // protected for tests. | |
| 198 void NotifyDatabaseUpdateFinished(bool update_succeeded); | |
| 199 | |
| 200 private: | |
| 201 friend class base::RefCountedThreadSafe<SafeBrowsingDatabaseManager>; | |
| 202 friend class SafeBrowsingServerTest; | 136 friend class SafeBrowsingServerTest; |
| 203 friend class SafeBrowsingServiceTest; | 137 friend class SafeBrowsingServiceTest; |
| 204 friend class SafeBrowsingServiceTestHelper; | 138 friend class SafeBrowsingServiceTestHelper; |
| 139 // TODO(nparker): Rename this test to LocalSafeBrowsingDatabaseManagerTest |
| 205 friend class SafeBrowsingDatabaseManagerTest; | 140 friend class SafeBrowsingDatabaseManagerTest; |
| 206 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingDatabaseManagerTest, | 141 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingDatabaseManagerTest, |
| 207 GetUrlSeverestThreatType); | 142 GetUrlSeverestThreatType); |
| 208 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingDatabaseManagerTest, | 143 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingDatabaseManagerTest, |
| 209 ServiceStopWithPendingChecks); | 144 ServiceStopWithPendingChecks); |
| 210 | 145 |
| 211 typedef std::set<SafeBrowsingCheck*> CurrentChecks; | 146 typedef std::set<SafeBrowsingCheck*> CurrentChecks; |
| 212 typedef std::vector<SafeBrowsingCheck*> GetHashRequestors; | 147 typedef std::vector<SafeBrowsingCheck*> GetHashRequestors; |
| 213 typedef base::hash_map<SBPrefix, GetHashRequestors> GetHashRequests; | 148 typedef base::hash_map<SBPrefix, GetHashRequestors> GetHashRequests; |
| 214 | 149 |
| (...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 395 | 330 |
| 396 // Indicates if we're in the midst of trying to close the database. If this | 331 // Indicates if we're in the midst of trying to close the database. If this |
| 397 // is true, nothing on the IO thread should access the database. | 332 // is true, nothing on the IO thread should access the database. |
| 398 bool closing_database_; | 333 bool closing_database_; |
| 399 | 334 |
| 400 std::deque<QueuedCheck> queued_checks_; | 335 std::deque<QueuedCheck> queued_checks_; |
| 401 | 336 |
| 402 // Timeout to use for safe browsing checks. | 337 // Timeout to use for safe browsing checks. |
| 403 base::TimeDelta check_timeout_; | 338 base::TimeDelta check_timeout_; |
| 404 | 339 |
| 405 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingDatabaseManager); | 340 DISALLOW_COPY_AND_ASSIGN(LocalSafeBrowsingDatabaseManager); |
| 406 }; | 341 }; // class LocalSafeBrowsingDatabaseManager |
| 407 | 342 |
| 408 #endif // CHROME_BROWSER_SAFE_BROWSING_DATABASE_MANAGER_H_ | 343 #endif // CHROME_BROWSER_SAFE_BROWSING_LOCAL_DATABASE_MANAGER_H_ |
| OLD | NEW |