OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/safe_browsing/signature_evaluator_mac.h" | |
6 | |
7 #include <CoreFoundation/CoreFoundation.h> | |
8 #include <sys/xattr.h> | |
9 | |
10 #include <string> | |
11 #include <vector> | |
12 | |
13 #include "base/files/file_path.h" | |
14 #include "base/files/file_util.h" | |
15 #include "base/files/scoped_temp_dir.h" | |
16 #include "base/mac/mac_util.h" | |
17 #include "base/mac/scoped_cftyperef.h" | |
18 #include "base/path_service.h" | |
19 #include "base/test/scoped_path_override.h" | |
20 #include "chrome/browser/safe_browsing/incident_reporting/incident.h" | |
21 #include "chrome/browser/safe_browsing/incident_reporting/mock_incident_receiver .h" | |
22 #include "chrome/common/chrome_paths.h" | |
23 #include "chrome/common/safe_browsing/csd.pb.h" | |
24 #include "testing/gmock/include/gmock/gmock-matchers.h" | |
25 #include "testing/gmock/include/gmock/gmock.h" | |
26 #include "testing/gtest/include/gtest/gtest.h" | |
27 | |
28 using ::testing::_; | |
29 using ::testing::StrictMock; | |
30 | |
31 namespace safe_browsing { | |
32 | |
33 namespace { | |
34 | |
35 const char* const xattrs[] = { | |
36 "com.apple.cs.CodeDirectory", | |
37 "com.apple.cs.CodeSignature", | |
38 "com.apple.cs.CodeRequirements", | |
39 "com.apple.cs.CodeResources", | |
40 "com.apple.cs.CodeApplication", | |
41 "com.apple.cs.CodeEntitlements", | |
42 }; | |
43 | |
44 } // namespace | |
Robert Sesek
2015/10/08 19:20:06
nit: remove? there's a closing namespace online 32
Greg K
2015/10/09 17:12:01
The one at the bottom was incorrectly commented. I
| |
45 | |
46 class MacSignatureEvaluatorTest : public testing::Test { | |
47 protected: | |
48 void SetUp() override { | |
49 base::FilePath source_path; | |
50 ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &source_path)); | |
51 testdata_path_ = | |
52 source_path.AppendASCII("safe_browsing").AppendASCII("mach_o"); | |
53 | |
54 base::FilePath dir_exe; | |
55 ASSERT_TRUE(PathService::Get(base::DIR_EXE, &dir_exe)); | |
56 base::FilePath file_exe; | |
57 ASSERT_TRUE(PathService::Get(base::FILE_EXE, &file_exe)); | |
58 | |
59 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | |
60 } | |
61 | |
62 bool GetExecPath(const base::FilePath& bundle_url, base::FilePath* result) { | |
63 base::ScopedCFTypeRef<CFStringRef> path_str(CFStringCreateWithCString( | |
Robert Sesek
2015/10/08 19:20:06
SysUTF8ToCFStringRef
Greg K
2015/10/09 17:12:01
Done.
| |
64 kCFAllocatorDefault, bundle_url.value().c_str(), | |
65 kCFStringEncodingUTF8)); | |
66 if (!path_str.get()) | |
67 return false; | |
68 base::ScopedCFTypeRef<CFURLRef> path_url(CFURLCreateWithFileSystemPath( | |
69 kCFAllocatorDefault, path_str, kCFURLPOSIXPathStyle, false)); | |
70 if (!path_url.get()) | |
71 return false; | |
72 base::ScopedCFTypeRef<CFBundleRef> bundle( | |
73 CFBundleCreate(kCFAllocatorDefault, path_url)); | |
74 if (!bundle.get()) | |
75 return false; | |
76 | |
77 base::ScopedCFTypeRef<CFURLRef> exec_url(CFBundleCopyExecutableURL(bundle)); | |
78 UInt8 path_buf[PATH_MAX]; | |
79 if (!CFURLGetFileSystemRepresentation(exec_url, true, path_buf, | |
80 sizeof(path_buf))) | |
Robert Sesek
2015/10/08 19:20:06
nit: needs braces
Greg K
2015/10/09 17:12:01
Done.
| |
81 return false; | |
82 | |
83 *result = base::FilePath(reinterpret_cast<const char*>(path_buf)); | |
84 return true; | |
85 } | |
86 | |
87 bool SetupXattrs(const base::FilePath& path) { | |
88 char sentinel = 'A'; | |
89 for (const auto& xattr : xattrs) { | |
90 std::vector<uint8_t> buf(10); | |
91 memset(&buf[0], sentinel++, buf.size()); | |
92 if (setxattr(path.value().c_str(), xattr, &buf[0], buf.size(), 0, 0) != 0) | |
93 return false; | |
94 } | |
95 return true; | |
96 } | |
97 | |
98 base::FilePath testdata_path_; | |
99 base::ScopedTempDir temp_dir_; | |
100 }; | |
101 | |
102 TEST_F(MacSignatureEvaluatorTest, SimpleTest) { | |
103 // This is a simple test that checks the validity of a signed executable. | |
104 // There is no designated requirement: we only check the embedded signature. | |
105 base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat"); | |
106 safe_browsing::MacSignatureEvaluator evaluator(path); | |
107 ASSERT_TRUE(evaluator.Initialize()); | |
108 | |
109 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
110 results; | |
111 ASSERT_TRUE(evaluator.PerformEvaluation(results)); | |
Robert Sesek
2015/10/08 19:20:06
EXPECT (and throughout where possible)
Greg K
2015/10/09 17:12:01
Done.
| |
112 ASSERT_EQ(0u, results.size()); | |
113 } | |
114 | |
115 TEST_F(MacSignatureEvaluatorTest, SimpleTestWithDR) { | |
116 // This test checks the signer against a designated requirement description. | |
117 base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat"); | |
118 std::string requirement( | |
119 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
120 safe_browsing::MacSignatureEvaluator evaluator(path, requirement); | |
121 ASSERT_TRUE(evaluator.Initialize()); | |
122 | |
123 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
124 results; | |
125 ASSERT_TRUE(evaluator.PerformEvaluation(results)); | |
126 ASSERT_EQ(0u, results.size()); | |
127 } | |
128 | |
129 TEST_F(MacSignatureEvaluatorTest, SimpleTestWithBadDR) { | |
130 // Now test with a designated requirement that does not describe the signer. | |
131 base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat"); | |
132 safe_browsing::MacSignatureEvaluator evaluator(path, "anchor apple"); | |
133 ASSERT_TRUE(evaluator.Initialize()); | |
134 | |
135 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
136 results; | |
137 ASSERT_FALSE(evaluator.PerformEvaluation(results)); | |
138 ASSERT_EQ(1u, results.size()); | |
Robert Sesek
2015/10/08 19:20:06
This has to remain an ASSERT_ since you get result
Greg K
2015/10/09 17:12:01
Acknowledged.
| |
139 | |
140 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident& result = | |
141 results[0]; | |
142 ASSERT_EQ(-67050, result.sec_error()); | |
143 ASSERT_TRUE(result.has_file_basename()); | |
144 ASSERT_EQ("signedexecutablefat", result.file_basename()); | |
145 ASSERT_TRUE(result.has_signature()); | |
146 } | |
147 | |
148 TEST_F(MacSignatureEvaluatorTest, SimpleBundleTest) { | |
149 // Now test a simple, validly signed bundle. | |
150 base::FilePath path = testdata_path_.AppendASCII("test-bundle.app"); | |
151 base::FilePath exec_path; | |
152 ASSERT_TRUE(GetExecPath(path, &exec_path)); | |
153 | |
154 std::string requirement( | |
155 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
156 safe_browsing::MacSignatureEvaluator evaluator(exec_path, requirement); | |
157 ASSERT_TRUE(evaluator.Initialize()); | |
158 | |
159 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
160 results; | |
161 ASSERT_TRUE(evaluator.PerformEvaluation(results)); | |
162 ASSERT_EQ(0u, results.size()); | |
163 } | |
164 | |
165 TEST_F(MacSignatureEvaluatorTest, ModifiedMainExecTest32) { | |
166 // Now to a test modified, signed bundle. | |
167 base::FilePath path = testdata_path_.AppendASCII("modified-main-exec32.app"); | |
168 base::FilePath exec_path; | |
169 ASSERT_TRUE(GetExecPath(path, &exec_path)); | |
170 | |
171 std::string requirement( | |
172 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
173 safe_browsing::MacSignatureEvaluator evaluator(exec_path, requirement); | |
174 ASSERT_TRUE(evaluator.Initialize()); | |
175 | |
176 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
177 results; | |
178 ASSERT_FALSE(evaluator.PerformEvaluation(results)); | |
179 ASSERT_EQ(1u, results.size()); | |
180 | |
181 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident& incident = | |
182 results[0]; | |
183 ASSERT_EQ(-67061, incident.sec_error()); | |
184 ASSERT_EQ(exec_path.BaseName().value(), incident.file_basename()); | |
185 } | |
186 | |
187 TEST_F(MacSignatureEvaluatorTest, ModifiedMainExecTest64) { | |
188 // Snow Leopard does not know about the 64-bit slice so this test is | |
189 // irrelevant. | |
190 if (base::mac::IsOSLionOrLater()) { | |
Robert Sesek
2015/10/08 19:20:06
Generally prefer early returns for short-circuitin
Greg K
2015/10/09 17:12:01
Done.
| |
191 // Now to a test modified, signed bundle. | |
192 base::FilePath path = | |
193 testdata_path_.AppendASCII("modified-main-exec64.app"); | |
194 base::FilePath exec_path; | |
195 ASSERT_TRUE(GetExecPath(path, &exec_path)); | |
196 | |
197 std::string requirement( | |
198 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
199 safe_browsing::MacSignatureEvaluator evaluator(exec_path, requirement); | |
200 ASSERT_TRUE(evaluator.Initialize()); | |
201 | |
202 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
203 results; | |
204 ASSERT_FALSE(evaluator.PerformEvaluation(results)); | |
205 ASSERT_EQ(1u, results.size()); | |
206 | |
207 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident& incident = | |
208 results[0]; | |
209 ASSERT_EQ(-67061, incident.sec_error()); | |
210 ASSERT_EQ(exec_path.BaseName().value(), incident.file_basename()); | |
211 } | |
212 } | |
213 | |
214 TEST_F(MacSignatureEvaluatorTest, ModifiedBundleAndExecTest) { | |
215 // Now test a modified, signed bundle with resources added and the main | |
216 // executable modified. | |
217 base::FilePath path = | |
218 testdata_path_.AppendASCII("modified-bundle-and-exec.app"); | |
219 base::FilePath exec_path; | |
220 ASSERT_TRUE(GetExecPath(path, &exec_path)); | |
221 | |
222 std::string requirement( | |
223 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
224 safe_browsing::MacSignatureEvaluator evaluator(exec_path, requirement); | |
225 ASSERT_TRUE(evaluator.Initialize()); | |
226 | |
227 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
228 results; | |
229 ASSERT_FALSE(evaluator.PerformEvaluation(results)); | |
230 ASSERT_EQ(1u, results.size()); | |
231 | |
232 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident& incident1 = | |
233 results[0]; | |
234 ASSERT_TRUE(incident1.has_file_basename()); | |
235 ASSERT_EQ(exec_path.BaseName().value(), incident1.file_basename()); | |
236 ASSERT_EQ(-67061, incident1.sec_error()); | |
237 ASSERT_TRUE(incident1.has_signature()); | |
238 } | |
239 | |
240 TEST_F(MacSignatureEvaluatorTest, ModifiedBundleTest) { | |
241 // Now test a modified, signed bundle. This bundle has | |
242 // the following problems: | |
243 // 1) A file was added (This should not be reported) | |
244 // 2) libsigned64.dylib was modified | |
245 // 3) executable32 was modified | |
246 | |
247 base::FilePath orig_path = testdata_path_.AppendASCII("modified-bundle.app"); | |
248 base::FilePath copied_path = | |
249 temp_dir_.path().AppendASCII("modified-bundle.app"); | |
250 CHECK(base::CopyDirectory(orig_path, copied_path, true)); | |
251 | |
252 base::FilePath exec_path; | |
253 ASSERT_TRUE(GetExecPath(copied_path, &exec_path)); | |
254 | |
255 // Setup the extended attributes, which don't persist in the git repo. | |
256 ASSERT_TRUE(SetupXattrs( | |
257 copied_path.AppendASCII("Contents/Resources/Base.lproj/MainMenu.nib"))); | |
258 | |
259 std::string requirement( | |
260 "certificate leaf[subject.CN]=\"untrusted@goat.local\""); | |
261 safe_browsing::MacSignatureEvaluator evaluator(exec_path, requirement); | |
262 ASSERT_TRUE(evaluator.Initialize()); | |
263 | |
264 std::vector<ClientIncidentReport_IncidentData_BinaryIntegrityIncident> | |
265 results; | |
266 ASSERT_FALSE(evaluator.PerformEvaluation(results)); | |
267 ASSERT_EQ(4u, results.size()); | |
268 | |
269 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident* main_exec = | |
270 nullptr; | |
271 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident* libsigned64 = | |
272 nullptr; | |
273 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident* | |
274 executable32 = nullptr; | |
275 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident* mainmenunib = | |
276 nullptr; | |
277 const ClientIncidentReport_IncidentData_BinaryIntegrityIncident* | |
278 codesign_cfg = nullptr; | |
279 | |
280 for (const auto& incident : results) { | |
281 if (incident.file_basename() == exec_path.BaseName().value()) | |
282 main_exec = &incident; | |
283 else if (incident.file_basename() == "libsigned64.dylib") | |
284 libsigned64 = &incident; | |
285 else if (incident.file_basename() == "executable32") | |
286 executable32 = &incident; | |
287 else if (incident.file_basename() == "MainMenu.nib") | |
288 mainmenunib = &incident; | |
289 else if (incident.file_basename() == "codesign.cfg") | |
290 codesign_cfg = &incident; | |
291 } | |
292 ASSERT_NE(main_exec, nullptr); | |
Robert Sesek
2015/10/08 19:20:06
Similarly, these should be ASSERT_ since they're d
Greg K
2015/10/09 17:12:01
Done.
| |
293 ASSERT_NE(libsigned64, nullptr); | |
294 ASSERT_NE(executable32, nullptr); | |
295 // This is important. Do not collect information on extra files added. | |
296 ASSERT_EQ(codesign_cfg, nullptr); | |
297 | |
298 ASSERT_TRUE(main_exec->has_file_basename()); | |
299 ASSERT_EQ(exec_path.BaseName().value(), main_exec->file_basename()); | |
300 ASSERT_TRUE(main_exec->has_signature()); | |
301 ASSERT_EQ(-67054, main_exec->sec_error()); | |
302 | |
303 ASSERT_TRUE(libsigned64->has_file_basename()); | |
304 ASSERT_EQ("libsigned64.dylib", libsigned64->file_basename()); | |
305 ASSERT_TRUE(libsigned64->has_signature()); | |
306 | |
307 ASSERT_TRUE(executable32->has_file_basename()); | |
308 ASSERT_EQ("executable32", executable32->file_basename()); | |
309 ASSERT_TRUE(executable32->has_signature()); | |
310 | |
311 ASSERT_TRUE(mainmenunib->has_file_basename()); | |
312 ASSERT_EQ("MainMenu.nib", mainmenunib->file_basename()); | |
313 ASSERT_TRUE(mainmenunib->has_signature()); | |
314 ASSERT_EQ(6, mainmenunib->signature().xattr_size()); | |
315 // Manually convert the global xattrs array to a vector | |
316 std::vector<std::string> xattrs_known; | |
317 for (const auto& xattr : xattrs) | |
318 xattrs_known.push_back(xattr); | |
319 | |
320 std::vector<std::string> xattrs_seen; | |
321 for (const auto& xattr : mainmenunib->signature().xattr()) { | |
322 ASSERT_TRUE(xattr.has_key()); | |
323 ASSERT_TRUE(xattr.has_value()); | |
324 xattrs_seen.push_back(xattr.key()); | |
325 } | |
326 ASSERT_THAT(xattrs_known, ::testing::ContainerEq(xattrs_seen)); | |
327 } | |
328 | |
329 } // namespace | |
OLD | NEW |