Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(688)

Side by Side Diff: components/security_state/core/security_state.h

Issue 2448943002: Refactor SecurityStateModel/Clients for simplicity and reusability. (Closed)
Patch Set: sync. Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_H_
6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_H_
7
8 #include <stdint.h>
9 #include <memory>
10
11 #include "base/callback.h"
12 #include "base/macros.h"
13 #include "net/cert/cert_status_flags.h"
14 #include "net/cert/sct_status_flags.h"
15 #include "net/cert/x509_certificate.h"
16 #include "url/gurl.h"
17
18 // Provides helper methods and data types that are used to determine the
19 // high-level security information about a page or request.
20 //
21 // SecurityInfo is the main data structure, describing a page's or request's
22 // security state. It is computed by the platform-independent GetSecurityInfo()
23 // helper method, which receives platform-specific inputs from its callers in
24 // the form of a VisibleSecurityState struct.
25 namespace security_state {
26
27 // Describes the overall security state of the page.
28 //
29 // If you reorder, add, or delete values from this enum, you must also
30 // update the UI icons in ToolbarModelImpl::GetIconForSecurityLevel.
31 //
32 // A Java counterpart will be generated for this enum.
33 // GENERATED_JAVA_ENUM_PACKAGE: org.chromium.components.security_state
34 // GENERATED_JAVA_CLASS_NAME_OVERRIDE: ConnectionSecurityLevel
35 enum SecurityLevel {
36 // HTTP/no URL/HTTPS but with insecure passive content on the page.
37 NONE,
38
39 // HTTP, in a case where we want to show a visible warning about the page's
40 // lack of security.
41 //
42 // The criteria used to classify pages as NONE vs. HTTP_SHOW_WARNING will
43 // change over time. Eventually, NONE will be eliminated.
44 // See https://crbug.com/647754.
45 HTTP_SHOW_WARNING,
46
47 // HTTPS with valid EV cert.
48 EV_SECURE,
49
50 // HTTPS (non-EV) with valid cert.
51 SECURE,
52
53 // HTTPS, but with an outdated protocol version.
54 SECURITY_WARNING,
55
56 // HTTPS, but the certificate verification chain is anchored on a
57 // certificate that was installed by the system administrator.
58 SECURE_WITH_POLICY_INSTALLED_CERT,
59
60 // Attempted HTTPS and failed, page not authenticated, HTTPS with
61 // insecure active content on the page, malware, phishing, or any other
62 // serious security issue that could be dangerous.
63 DANGEROUS,
64 };
65
66 // Describes how the SHA1 deprecation policy applies to an HTTPS
67 // connection.
68 enum SHA1DeprecationStatus {
69 UNKNOWN_SHA1,
70 // No SHA1 deprecation policy applies.
71 NO_DEPRECATED_SHA1,
72 // The connection used a certificate with a SHA1 signature in the
73 // chain, and policy says that the connection should be treated with a
74 // warning.
75 DEPRECATED_SHA1_MINOR,
76 // The connection used a certificate with a SHA1 signature in the
77 // chain, and policy says that the connection should be treated as
78 // broken HTTPS.
79 DEPRECATED_SHA1_MAJOR,
80 };
81
82 // The ContentStatus enum is used to describe content on the page that
83 // has significantly different security properties than the main page
84 // load. Content can be passive content that is displayed (such as
85 // images) or active content that is run (such as scripts or iframes).
86 enum ContentStatus {
87 CONTENT_STATUS_UNKNOWN,
88 CONTENT_STATUS_NONE,
89 CONTENT_STATUS_DISPLAYED,
90 CONTENT_STATUS_RAN,
91 CONTENT_STATUS_DISPLAYED_AND_RAN,
92 };
93
94 // Describes whether the page contains malicious resources such as
95 // malware or phishing attacks.
96 enum MaliciousContentStatus {
97 MALICIOUS_CONTENT_STATUS_NONE,
98 MALICIOUS_CONTENT_STATUS_MALWARE,
99 MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE,
100 MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING,
101 };
102
103 // Describes the security status of a page or request. This is the
104 // main data structure provided by this class. SecurityInfo contains a
105 // SecurityLevel (which
106 // is a single value describing the overall security state) along with
107 // information that a consumer might want to display in UI to explain or
108 // elaborate on the SecurityLevel.
109 struct SecurityInfo {
110 SecurityInfo();
111 ~SecurityInfo();
112 SecurityLevel security_level;
113 // Describes the nature of the page's malicious content, if any.
114 MaliciousContentStatus malicious_content_status;
115 SHA1DeprecationStatus sha1_deprecation_status;
116 // |mixed_content_status| describes the presence of content that was
117 // loaded over a nonsecure (HTTP) connection.
118 ContentStatus mixed_content_status;
119 // |content_with_cert_errors_status| describes the presence of
120 // content that was loaded over an HTTPS connection with
121 // certificate errors.
122 ContentStatus content_with_cert_errors_status;
123 // The verification statuses of the signed certificate timestamps
124 // for the connection.
125 std::vector<net::ct::SCTVerifyStatus> sct_verify_statuses;
126 bool scheme_is_cryptographic;
127 net::CertStatus cert_status;
128 scoped_refptr<net::X509Certificate> certificate;
129 // The security strength, in bits, of the SSL cipher suite. In late
130 // 2015, 128 is considered the minimum.
131 //
132 // 0 means the connection uses HTTPS but is not encrypted. -1 means
133 // the security strength is unknown or the connection does not use
134 // HTTPS.
135 int security_bits;
136 // Information about the SSL connection, such as protocol and
137 // ciphersuite. See ssl_connection_flags.h in net.
138 int connection_status;
139 // The ID of the (EC)DH group used by the key exchange. The value is zero if
140 // unknown (older cache entries may not store the value) or not applicable.
141 uint16_t key_exchange_group;
142 // A mask that indicates which of the protocol version,
143 // key exchange, or cipher for the connection is considered
144 // obsolete. See net::ObsoleteSSLMask for specific mask values.
145 int obsolete_ssl_status;
146
147 // True if pinning was bypassed due to a local trust anchor.
148 bool pkp_bypassed;
149
150 // True if the page displayed password field on an HTTP page.
151 bool displayed_password_field_on_http;
152
153 // True if the page displayed credit card field on an HTTP page.
154 bool displayed_credit_card_field_on_http;
155 };
156
157 // Contains the security state relevant to computing the SecurityInfo
158 // for a page. This is the input to GetSecurityInfo().
159 struct VisibleSecurityState {
160 VisibleSecurityState();
161 ~VisibleSecurityState();
162 bool operator==(const VisibleSecurityState& other) const;
163 GURL url;
164
165 MaliciousContentStatus malicious_content_status;
166
167 // CONNECTION SECURITY FIELDS
168 // Whether the connection security fields are initialized.
169 bool connection_info_initialized;
170 // The following fields contain information about the connection
171 // used to load the page or request.
172 scoped_refptr<net::X509Certificate> certificate;
173 net::CertStatus cert_status;
174 int connection_status;
175 // The ID of the (EC)DH group used by the key exchange. The value is zero if
176 // unknown (older cache entries may not store the value) or not applicable.
177 uint16_t key_exchange_group;
178 int security_bits;
179 // The verification statuses of the Signed Certificate
180 // Timestamps (if any) that the server provided.
181 std::vector<net::ct::SCTVerifyStatus> sct_verify_statuses;
182 // True if the page displayed passive mixed content.
183 bool displayed_mixed_content;
184 // True if the page ran active mixed content.
185 bool ran_mixed_content;
186 // True if the page displayed passive subresources with certificate errors.
187 bool displayed_content_with_cert_errors;
188 // True if the page ran active subresources with certificate errors.
189 bool ran_content_with_cert_errors;
190 // True if PKP was bypassed due to a local trust anchor.
191 bool pkp_bypassed;
192 // True if the page was an HTTP page that displayed a password field.
193 bool displayed_password_field_on_http;
194 // True if the page was an HTTP page that displayed a credit card field.
195 bool displayed_credit_card_field_on_http;
196 };
197
198 // These security levels describe the treatment given to pages that
199 // display and run mixed content. They are used to coordinate the
200 // treatment of mixed content with other security UI elements.
201 constexpr SecurityLevel kDisplayedInsecureContentLevel = NONE;
202 constexpr SecurityLevel kRanInsecureContentLevel = DANGEROUS;
203
204 // Returns true if the given |url|'s origin should be considered secure.
205 using IsOriginSecureCallback = base::Callback<bool(const GURL& url)>;
206
207 // Populates |result| to describe the current page.
208 // |visible_security_state| contains the relevant security state.
209 // |used_policy_installed_certificate| indicates whether the page or request
210 // is known to be loaded with a certificate installed by the system admin.
211 // |is_origin_secure_callback| determines whether a URL's origin should be
212 // considered secure.
213 void GetSecurityInfo(
214 std::unique_ptr<VisibleSecurityState> visible_security_state,
215 bool used_policy_installed_certificate,
216 IsOriginSecureCallback is_origin_secure_callback,
217 SecurityInfo* result);
218
219 } // namespace security_state
220
221 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_H_
OLDNEW
« no previous file with comments | « components/security_state/core/BUILD.gn ('k') | components/security_state/core/security_state.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698