Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(338)

Side by Side Diff: chrome/browser/ssl/ssl_blocking_page.cc

Issue 1223233002: Common Name Mismatch Handler For WWW Subdomain Mismatch case (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Browsertests using MockCertVerifier Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/ssl_blocking_page.h" 5 #include "chrome/browser/ssl/ssl_blocking_page.h"
6 6
7 #include "base/bind.h" 7 #include "base/bind.h"
8 #include "base/bind_helpers.h" 8 #include "base/bind_helpers.h"
9 #include "base/build_time.h" 9 #include "base/build_time.h"
10 #include "base/callback_helpers.h" 10 #include "base/callback_helpers.h"
(...skipping 14 matching lines...) Expand all
25 #include "chrome/browser/browser_process.h" 25 #include "chrome/browser/browser_process.h"
26 #include "chrome/browser/chrome_notification_types.h" 26 #include "chrome/browser/chrome_notification_types.h"
27 #include "chrome/browser/interstitials/chrome_metrics_helper.h" 27 #include "chrome/browser/interstitials/chrome_metrics_helper.h"
28 #include "chrome/browser/profiles/profile.h" 28 #include "chrome/browser/profiles/profile.h"
29 #include "chrome/browser/renderer_preferences_util.h" 29 #include "chrome/browser/renderer_preferences_util.h"
30 #include "chrome/browser/ssl/cert_report_helper.h" 30 #include "chrome/browser/ssl/cert_report_helper.h"
31 #include "chrome/browser/ssl/certificate_error_report.h" 31 #include "chrome/browser/ssl/certificate_error_report.h"
32 #include "chrome/browser/ssl/ssl_cert_reporter.h" 32 #include "chrome/browser/ssl/ssl_cert_reporter.h"
33 #include "chrome/browser/ssl/ssl_error_classification.h" 33 #include "chrome/browser/ssl/ssl_error_classification.h"
34 #include "chrome/browser/ssl/ssl_error_info.h" 34 #include "chrome/browser/ssl/ssl_error_info.h"
35 #include "chrome/browser/ui/browser_navigator.h"
35 #include "chrome/common/chrome_switches.h" 36 #include "chrome/common/chrome_switches.h"
36 #include "chrome/common/pref_names.h" 37 #include "chrome/common/pref_names.h"
37 #include "chrome/grit/chromium_strings.h" 38 #include "chrome/grit/chromium_strings.h"
38 #include "chrome/grit/generated_resources.h" 39 #include "chrome/grit/generated_resources.h"
39 #include "components/google/core/browser/google_util.h" 40 #include "components/google/core/browser/google_util.h"
40 #include "content/public/browser/browser_thread.h" 41 #include "content/public/browser/browser_thread.h"
41 #include "content/public/browser/cert_store.h" 42 #include "content/public/browser/cert_store.h"
42 #include "content/public/browser/interstitial_page.h" 43 #include "content/public/browser/interstitial_page.h"
43 #include "content/public/browser/interstitial_page_delegate.h" 44 #include "content/public/browser/interstitial_page_delegate.h"
44 #include "content/public/browser/navigation_controller.h" 45 #include "content/public/browser/navigation_controller.h"
(...skipping 185 matching lines...) Expand 10 before | Expand all | Expand 10 after
230 231
231 // Note that we always create a navigation entry with SSL errors. 232 // Note that we always create a navigation entry with SSL errors.
232 // No error happening loading a sub-resource triggers an interstitial so far. 233 // No error happening loading a sub-resource triggers an interstitial so far.
233 SSLBlockingPage::SSLBlockingPage(content::WebContents* web_contents, 234 SSLBlockingPage::SSLBlockingPage(content::WebContents* web_contents,
234 int cert_error, 235 int cert_error,
235 const net::SSLInfo& ssl_info, 236 const net::SSLInfo& ssl_info,
236 const GURL& request_url, 237 const GURL& request_url,
237 int options_mask, 238 int options_mask,
238 const base::Time& time_triggered, 239 const base::Time& time_triggered,
239 scoped_ptr<SSLCertReporter> ssl_cert_reporter, 240 scoped_ptr<SSLCertReporter> ssl_cert_reporter,
240 const base::Callback<void(bool)>& callback) 241 const base::Callback<void(bool)>& callback,
242 const GURL& suggested_url)
241 : SecurityInterstitialPage(web_contents, request_url), 243 : SecurityInterstitialPage(web_contents, request_url),
242 callback_(callback), 244 callback_(callback),
243 cert_error_(cert_error), 245 cert_error_(cert_error),
244 ssl_info_(ssl_info), 246 ssl_info_(ssl_info),
245 overridable_(IsOverridable( 247 overridable_(IsOverridable(
246 options_mask, 248 options_mask,
247 Profile::FromBrowserContext(web_contents->GetBrowserContext()))), 249 Profile::FromBrowserContext(web_contents->GetBrowserContext()))),
248 danger_overridable_(DoesPolicyAllowDangerOverride( 250 danger_overridable_(DoesPolicyAllowDangerOverride(
249 Profile::FromBrowserContext(web_contents->GetBrowserContext()))), 251 Profile::FromBrowserContext(web_contents->GetBrowserContext()))),
250 strict_enforcement_((options_mask & STRICT_ENFORCEMENT) != 0), 252 strict_enforcement_((options_mask & STRICT_ENFORCEMENT) != 0),
251 expired_but_previously_allowed_( 253 expired_but_previously_allowed_(
252 (options_mask & EXPIRED_BUT_PREVIOUSLY_ALLOWED) != 0), 254 (options_mask & EXPIRED_BUT_PREVIOUSLY_ALLOWED) != 0),
253 time_triggered_(time_triggered) { 255 time_triggered_(time_triggered),
256 suggested_url_(suggested_url) {
254 interstitial_reason_ = 257 interstitial_reason_ =
255 IsErrorDueToBadClock(time_triggered_, cert_error_) ? 258 IsErrorDueToBadClock(time_triggered_, cert_error_) ?
256 SSL_REASON_BAD_CLOCK : SSL_REASON_SSL; 259 SSL_REASON_BAD_CLOCK : SSL_REASON_SSL;
257 260
258 // We collapse the Rappor metric name to just "ssl" so we don't leak 261 // We collapse the Rappor metric name to just "ssl" so we don't leak
259 // the "overridable" bit. We skip Rappor altogether for bad clocks. 262 // the "overridable" bit. We skip Rappor altogether for bad clocks.
260 // This must be done after calculating |interstitial_reason_| above. 263 // This must be done after calculating |interstitial_reason_| above.
261 security_interstitials::MetricsHelper::ReportDetails reporting_info; 264 security_interstitials::MetricsHelper::ReportDetails reporting_info;
262 reporting_info.metric_prefix = GetUmaHistogramPrefix(); 265 reporting_info.metric_prefix = GetUmaHistogramPrefix();
263 reporting_info.rappor_prefix = kSSLRapporPrefix; 266 reporting_info.rappor_prefix = kSSLRapporPrefix;
(...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after
376 load_time_data->SetBoolean("bad_clock", false); 379 load_time_data->SetBoolean("bad_clock", false);
377 380
378 load_time_data->SetString( 381 load_time_data->SetString(
379 "tabTitle", l10n_util::GetStringUTF16(IDS_SSL_V2_TITLE)); 382 "tabTitle", l10n_util::GetStringUTF16(IDS_SSL_V2_TITLE));
380 load_time_data->SetString( 383 load_time_data->SetString(
381 "heading", l10n_util::GetStringUTF16(IDS_SSL_V2_HEADING)); 384 "heading", l10n_util::GetStringUTF16(IDS_SSL_V2_HEADING));
382 load_time_data->SetString( 385 load_time_data->SetString(
383 "primaryParagraph", 386 "primaryParagraph",
384 l10n_util::GetStringFUTF16(IDS_SSL_V2_PRIMARY_PARAGRAPH, url)); 387 l10n_util::GetStringFUTF16(IDS_SSL_V2_PRIMARY_PARAGRAPH, url));
385 388
389 load_time_data->SetBoolean("common_name_mismatch", false);
390 // If suggested URL is not empty, display a modified message
391 // with a link to suggested_url.
392 if (!suggested_url_.is_empty()) {
393 load_time_data->SetBoolean("common_name_mismatch", true);
394 load_time_data->SetString(
395 "primaryParagraph",
396 l10n_util::GetStringFUTF16(
397 IDS_SSL_COMMON_NAME_MISMATCH_PRIMARY_PARAGRAPH,
398 base::UTF8ToUTF16(request_url().host()),
399 base::UTF8ToUTF16(suggested_url_.host())));
400 }
401
386 if (overridable_) { 402 if (overridable_) {
387 load_time_data->SetBoolean("overridable", true); 403 load_time_data->SetBoolean("overridable", true);
388 404
389 SSLErrorInfo error_info = 405 SSLErrorInfo error_info =
390 SSLErrorInfo::CreateError( 406 SSLErrorInfo::CreateError(
391 SSLErrorInfo::NetErrorToErrorType(cert_error_), 407 SSLErrorInfo::NetErrorToErrorType(cert_error_),
392 ssl_info_.cert.get(), 408 ssl_info_.cert.get(),
393 request_url()); 409 request_url());
410
394 load_time_data->SetString("explanationParagraph", error_info.details()); 411 load_time_data->SetString("explanationParagraph", error_info.details());
395 load_time_data->SetString( 412 load_time_data->SetString(
396 "primaryButtonText", 413 "primaryButtonText",
397 l10n_util::GetStringUTF16(IDS_SSL_OVERRIDABLE_SAFETY_BUTTON)); 414 l10n_util::GetStringUTF16(IDS_SSL_OVERRIDABLE_SAFETY_BUTTON));
398 load_time_data->SetString( 415 load_time_data->SetString(
399 "finalParagraph", 416 "finalParagraph",
400 l10n_util::GetStringFUTF16(IDS_SSL_OVERRIDABLE_PROCEED_PARAGRAPH, 417 l10n_util::GetStringFUTF16(IDS_SSL_OVERRIDABLE_PROCEED_PARAGRAPH,
401 url)); 418 url));
402 } else { 419 } else {
403 load_time_data->SetBoolean("overridable", false); 420 load_time_data->SetBoolean("overridable", false);
(...skipping 129 matching lines...) Expand 10 before | Expand all | Expand 10 after
533 case CMD_OPEN_DATE_SETTINGS: { 550 case CMD_OPEN_DATE_SETTINGS: {
534 metrics_helper()->RecordUserInteraction( 551 metrics_helper()->RecordUserInteraction(
535 security_interstitials::MetricsHelper::OPEN_TIME_SETTINGS); 552 security_interstitials::MetricsHelper::OPEN_TIME_SETTINGS);
536 content::BrowserThread::PostTask(content::BrowserThread::FILE, FROM_HERE, 553 content::BrowserThread::PostTask(content::BrowserThread::FILE, FROM_HERE,
537 base::Bind(&LaunchDateAndTimeSettings)); 554 base::Bind(&LaunchDateAndTimeSettings));
538 break; 555 break;
539 } 556 }
540 case CMD_OPEN_REPORTING_PRIVACY: 557 case CMD_OPEN_REPORTING_PRIVACY:
541 OpenExtendedReportingPrivacyPolicy(); 558 OpenExtendedReportingPrivacyPolicy();
542 break; 559 break;
560 case CMD_NAVIGATE_SUGGESTED_URL:
561 OpenSuggestedURL();
562 break;
543 case CMD_OPEN_DIAGNOSTIC: 563 case CMD_OPEN_DIAGNOSTIC:
544 // Google doesn't currently have a transparency report for SSL. 564 // Google doesn't currently have a transparency report for SSL.
545 NOTREACHED() << "Unexpected command: " << command; 565 NOTREACHED() << "Unexpected command: " << command;
546 } 566 }
547 } 567 }
548 568
549 void SSLBlockingPage::OverrideRendererPrefs( 569 void SSLBlockingPage::OverrideRendererPrefs(
550 content::RendererPreferences* prefs) { 570 content::RendererPreferences* prefs) {
551 Profile* profile = Profile::FromBrowserContext( 571 Profile* profile = Profile::FromBrowserContext(
552 web_contents()->GetBrowserContext()); 572 web_contents()->GetBrowserContext());
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after
631 std::string SSLBlockingPage::GetSamplingEventName() const { 651 std::string SSLBlockingPage::GetSamplingEventName() const {
632 std::string event_name(kEventNameBase); 652 std::string event_name(kEventNameBase);
633 if (overridable_) 653 if (overridable_)
634 event_name.append(kEventOverridable); 654 event_name.append(kEventOverridable);
635 else 655 else
636 event_name.append(kEventNotOverridable); 656 event_name.append(kEventNotOverridable);
637 event_name.append(net::ErrorToString(cert_error_)); 657 event_name.append(net::ErrorToString(cert_error_));
638 return event_name; 658 return event_name;
639 } 659 }
640 660
661 void SSLBlockingPage::OpenSuggestedURL() const {
662 content::NavigationController::LoadURLParams load_params(suggested_url_);
663 load_params.transition_type = ui::PAGE_TRANSITION_LINK;
664 web_contents()->GetController().LoadURLWithParams(load_params);
665 }
666
641 // static 667 // static
642 bool SSLBlockingPage::IsOverridable(int options_mask, 668 bool SSLBlockingPage::IsOverridable(int options_mask,
643 const Profile* const profile) { 669 const Profile* const profile) {
644 const bool is_overridable = 670 const bool is_overridable =
645 (options_mask & SSLBlockingPage::OVERRIDABLE) && 671 (options_mask & SSLBlockingPage::OVERRIDABLE) &&
646 !(options_mask & SSLBlockingPage::STRICT_ENFORCEMENT) && 672 !(options_mask & SSLBlockingPage::STRICT_ENFORCEMENT) &&
647 profile->GetPrefs()->GetBoolean(prefs::kSSLErrorOverrideAllowed); 673 profile->GetPrefs()->GetBoolean(prefs::kSSLErrorOverrideAllowed);
648 return is_overridable; 674 return is_overridable;
649 } 675 }
650 676
651 // static 677 // static
652 bool SSLBlockingPage::DoesPolicyAllowDangerOverride( 678 bool SSLBlockingPage::DoesPolicyAllowDangerOverride(
653 const Profile* const profile) { 679 const Profile* const profile) {
654 return profile->GetPrefs()->GetBoolean(prefs::kSSLErrorOverrideAllowed); 680 return profile->GetPrefs()->GetBoolean(prefs::kSSLErrorOverrideAllowed);
655 } 681 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698