Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(157)

Side by Side Diff: net/quic/crypto/proof_verifier_chromium.cc

Issue 2076363002: Introduce the ability to require CT for specific hosts (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@require_ct_enforcer
Patch Set: Rebased Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/crypto/proof_verifier_chromium.h" 5 #include "net/quic/crypto/proof_verifier_chromium.h"
6 6
7 #include <utility> 7 #include <utility>
8 8
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/bind_helpers.h" 10 #include "base/bind_helpers.h"
(...skipping 285 matching lines...) Expand 10 before | Expand all | Expand 10 after
296 296
297 return verifier_->Verify( 297 return verifier_->Verify(
298 CertVerifier::RequestParams(cert_, hostname_, cert_verify_flags_, 298 CertVerifier::RequestParams(cert_, hostname_, cert_verify_flags_,
299 std::string(), CertificateList()), 299 std::string(), CertificateList()),
300 SSLConfigService::GetCRLSet().get(), &verify_details_->cert_verify_result, 300 SSLConfigService::GetCRLSet().get(), &verify_details_->cert_verify_result,
301 base::Bind(&ProofVerifierChromium::Job::OnIOComplete, 301 base::Bind(&ProofVerifierChromium::Job::OnIOComplete,
302 base::Unretained(this)), 302 base::Unretained(this)),
303 &cert_verifier_request_, net_log_); 303 &cert_verifier_request_, net_log_);
304 } 304 }
305 305
306 int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) { 306 int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) {
davidben 2016/06/22 21:44:59 [Wow, I hadn't realized there was this much duplic
Ryan Sleevi 2016/06/22 22:07:39 Yup. I agree :)
307 cert_verifier_request_.reset(); 307 cert_verifier_request_.reset();
308 308
309 const CertVerifyResult& cert_verify_result = 309 const CertVerifyResult& cert_verify_result =
310 verify_details_->cert_verify_result; 310 verify_details_->cert_verify_result;
311 const CertStatus cert_status = cert_verify_result.cert_status; 311 const CertStatus cert_status = cert_verify_result.cert_status;
312 verify_details_->ct_verify_result.ct_policies_applied = result == OK; 312 verify_details_->ct_verify_result.ct_policies_applied = result == OK;
313 verify_details_->ct_verify_result.ev_policy_compliance = 313 verify_details_->ct_verify_result.ev_policy_compliance =
314 ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; 314 ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
315 if (result == OK) { 315
316 // If the connection was good, check HPKP and CT status simultaneously,
317 // but prefer to treat the HPKP error as more serious, if there was one.
318 if ((result == OK ||
319 (IsCertificateError(result) && IsCertStatusMinorError(cert_status)))) {
316 if ((cert_verify_result.cert_status & CERT_STATUS_IS_EV)) { 320 if ((cert_verify_result.cert_status & CERT_STATUS_IS_EV)) {
317 ct::EVPolicyCompliance ev_policy_compliance = 321 ct::EVPolicyCompliance ev_policy_compliance =
318 policy_enforcer_->DoesConformToCTEVPolicy( 322 policy_enforcer_->DoesConformToCTEVPolicy(
319 cert_verify_result.verified_cert.get(), 323 cert_verify_result.verified_cert.get(),
320 SSLConfigService::GetEVCertsWhitelist().get(), 324 SSLConfigService::GetEVCertsWhitelist().get(),
321 verify_details_->ct_verify_result.verified_scts, net_log_); 325 verify_details_->ct_verify_result.verified_scts, net_log_);
322 verify_details_->ct_verify_result.ev_policy_compliance = 326 verify_details_->ct_verify_result.ev_policy_compliance =
323 ev_policy_compliance; 327 ev_policy_compliance;
324 if (ev_policy_compliance != 328 if (ev_policy_compliance !=
325 ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY && 329 ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY &&
326 ev_policy_compliance != 330 ev_policy_compliance !=
327 ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_WHITELIST && 331 ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_WHITELIST &&
328 ev_policy_compliance != 332 ev_policy_compliance !=
329 ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS) { 333 ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS) {
330 verify_details_->cert_verify_result.cert_status |= 334 verify_details_->cert_verify_result.cert_status |=
331 CERT_STATUS_CT_COMPLIANCE_FAILED; 335 CERT_STATUS_CT_COMPLIANCE_FAILED;
332 verify_details_->cert_verify_result.cert_status &= ~CERT_STATUS_IS_EV; 336 verify_details_->cert_verify_result.cert_status &= ~CERT_STATUS_IS_EV;
333 } 337 }
334 } 338 }
335 339
336 verify_details_->ct_verify_result.cert_policy_compliance = 340 verify_details_->ct_verify_result.cert_policy_compliance =
337 policy_enforcer_->DoesConformToCertPolicy( 341 policy_enforcer_->DoesConformToCertPolicy(
338 cert_verify_result.verified_cert.get(), 342 cert_verify_result.verified_cert.get(),
339 verify_details_->ct_verify_result.verified_scts, net_log_); 343 verify_details_->ct_verify_result.verified_scts, net_log_);
340 }
341 344
342 if ((result == OK || 345 int ct_result = OK;
343 (IsCertificateError(result) && IsCertStatusMinorError(cert_status))) && 346 if (verify_details_->ct_verify_result.cert_policy_compliance !=
344 !transport_security_state_->CheckPublicKeyPins( 347 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS &&
345 HostPortPair(hostname_, port_), 348 transport_security_state_->ShouldRequireCT(
346 cert_verify_result.is_issued_by_known_root, 349 hostname_, cert_verify_result.verified_cert.get(),
347 cert_verify_result.public_key_hashes, cert_.get(), 350 cert_verify_result.public_key_hashes)) {
348 cert_verify_result.verified_cert.get(),
349 TransportSecurityState::ENABLE_PIN_REPORTS,
350 &verify_details_->pinning_failure_log)) {
351 if (cert_verify_result.is_issued_by_known_root) {
352 verify_details_->cert_verify_result.cert_status |= 351 verify_details_->cert_verify_result.cert_status |=
353 CERT_STATUS_PINNED_KEY_MISSING; 352 CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED;
354 result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; 353 ct_result = ERR_CERTIFICATE_TRANSPARENCY_REQUIRED;
355 } else {
356 verify_details_->pkp_bypassed = true;
357 } 354 }
355
356 if (!transport_security_state_->CheckPublicKeyPins(
357 HostPortPair(hostname_, port_),
358 cert_verify_result.is_issued_by_known_root,
359 cert_verify_result.public_key_hashes, cert_.get(),
360 cert_verify_result.verified_cert.get(),
361 TransportSecurityState::ENABLE_PIN_REPORTS,
362 &verify_details_->pinning_failure_log)) {
363 if (cert_verify_result.is_issued_by_known_root) {
364 verify_details_->cert_verify_result.cert_status |=
365 CERT_STATUS_PINNED_KEY_MISSING;
366 result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
367 } else {
368 verify_details_->pkp_bypassed = true;
369 }
370 }
371 if (result != ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN && ct_result != OK)
372 result = ct_result;
358 } 373 }
359 374
360 if (result != OK) { 375 if (result != OK) {
361 std::string error_string = ErrorToString(result); 376 std::string error_string = ErrorToString(result);
362 error_details_ = StringPrintf("Failed to verify certificate chain: %s", 377 error_details_ = StringPrintf("Failed to verify certificate chain: %s",
363 error_string.c_str()); 378 error_string.c_str());
364 DLOG(WARNING) << error_details_; 379 DLOG(WARNING) << error_details_;
365 } 380 }
366 381
367 // Exit DoLoop and return the result to the caller to VerifyProof. 382 // Exit DoLoop and return the result to the caller to VerifyProof.
(...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after
489 } 504 }
490 return status; 505 return status;
491 } 506 }
492 507
493 void ProofVerifierChromium::OnJobComplete(Job* job) { 508 void ProofVerifierChromium::OnJobComplete(Job* job) {
494 active_jobs_.erase(job); 509 active_jobs_.erase(job);
495 delete job; 510 delete job;
496 } 511 }
497 512
498 } // namespace net 513 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698