| Index: chrome/browser/ssl/ssl_error_classification.cc
|
| diff --git a/chrome/browser/ssl/ssl_error_classification.cc b/chrome/browser/ssl/ssl_error_classification.cc
|
| index ae9283c190f73594e2622102a2336d99b318f4c2..86a339521843ff3467614c83a7338d033177723b 100644
|
| --- a/chrome/browser/ssl/ssl_error_classification.cc
|
| +++ b/chrome/browser/ssl/ssl_error_classification.cc
|
| @@ -9,9 +9,18 @@
|
| #include "base/metrics/histogram.h"
|
| #include "base/time/time.h"
|
| #include "chrome/browser/browser_process.h"
|
| -#include "components/network_time/network_time_tracker.h"
|
| +#include "chrome/browser/chrome_notification_types.h"
|
| +#include "chrome/browser/profiles/profile.h"
|
| +#include "content/public/browser/notification_service.h"
|
| +#include "content/public/browser/web_contents.h"
|
| +#include "net/base/network_change_notifier.h"
|
| #include "net/cert/x509_certificate.h"
|
|
|
| +#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
| +#include "chrome/browser/captive_portal/captive_portal_service.h"
|
| +#include "chrome/browser/captive_portal/captive_portal_service_factory.h"
|
| +#endif
|
| +
|
| using base::Time;
|
| using base::TimeTicks;
|
| using base::TimeDelta;
|
| @@ -25,6 +34,19 @@ enum SSLInterstitialCause {
|
| UNUSED_INTERSTITIAL_CAUSE_ENTRY,
|
| };
|
|
|
| +// Events for UMA. Do not reorder or change!
|
| +enum SSLInterstitialCauseCaptivePortal {
|
| + CAPTIVE_PORTAL_DETECTION_ENABLED,
|
| + CAPTIVE_PORTAL_DETECTION_ENABLED_OVERRIDABLE,
|
| + CAPTIVE_PORTAL_PROBE_COMPLETED,
|
| + CAPTIVE_PORTAL_PROBE_COMPLETED_OVERRIDABLE,
|
| + CAPTIVE_PORTAL_NO_RESPONSE,
|
| + CAPTIVE_PORTAL_NO_RESPONSE_OVERRIDABLE,
|
| + CAPTIVE_PORTAL_DETECTED,
|
| + CAPTIVE_PORTAL_DETECTED_OVERRIDABLE,
|
| + UNUSED_CAPTIVE_PORTAL_EVENT,
|
| +};
|
| +
|
| void RecordSSLInterstitialCause(bool overridable, SSLInterstitialCause event) {
|
| if (overridable) {
|
| UMA_HISTOGRAM_ENUMERATION("interstitial.ssl.cause.overridable", event,
|
| @@ -35,19 +57,43 @@ void RecordSSLInterstitialCause(bool overridable, SSLInterstitialCause event) {
|
| }
|
| }
|
|
|
| +void RecordCaptivePortalEventStats(SSLInterstitialCauseCaptivePortal event) {
|
| + UMA_HISTOGRAM_ENUMERATION("interstitial.ssl.captive_portal",
|
| + event,
|
| + UNUSED_CAPTIVE_PORTAL_EVENT);
|
| +}
|
| +
|
| } // namespace
|
|
|
| SSLErrorClassification::SSLErrorClassification(
|
| + content::WebContents* web_contents,
|
| base::Time current_time,
|
| const net::X509Certificate& cert)
|
| - : current_time_(current_time),
|
| - cert_(cert) { }
|
| + : web_contents_(web_contents),
|
| + current_time_(current_time),
|
| + cert_(cert),
|
| + captive_portal_detection_enabled_(false),
|
| + captive_portal_probe_completed_(false),
|
| + captive_portal_no_response_(false),
|
| + captive_portal_detected_(false) {
|
| +#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
| + Profile* profile = Profile::FromBrowserContext(
|
| + web_contents_->GetBrowserContext());
|
| + CaptivePortalService* captive_portal_service =
|
| + CaptivePortalServiceFactory::GetForProfile(profile);
|
| + captive_portal_detection_enabled_ = captive_portal_service ->enabled();
|
| + captive_portal_service ->DetectCaptivePortal();
|
| + registrar_.Add(this,
|
| + chrome::NOTIFICATION_CAPTIVE_PORTAL_CHECK_RESULT,
|
| + content::Source<Profile>(profile));
|
| +#endif
|
| +}
|
|
|
| SSLErrorClassification::~SSLErrorClassification() { }
|
|
|
| float SSLErrorClassification::InvalidDateSeverityScore() const {
|
| - // Client-side characterisitics. Check whether the system's clock is wrong or
|
| - // not and whether the user has encountered this error before or not.
|
| + // Client-side characteristics. Check whether or not the system's clock is
|
| + // wrong and whether or not the user has encountered this error before.
|
| float severity_date_score = 0.0f;
|
|
|
| static const float kClientWeight = 0.5f;
|
| @@ -81,6 +127,40 @@ float SSLErrorClassification::InvalidDateSeverityScore() const {
|
| return severity_date_score;
|
| }
|
|
|
| +void SSLErrorClassification::RecordUMAStatistics(bool overridable) const {
|
| + if (IsUserClockInThePast(base::Time::NowFromSystemTime()))
|
| + RecordSSLInterstitialCause(overridable, CLOCK_PAST);
|
| + if (IsUserClockInTheFuture(base::Time::NowFromSystemTime()))
|
| + RecordSSLInterstitialCause(overridable, CLOCK_FUTURE);
|
| +}
|
| +
|
| +void SSLErrorClassification::RecordCaptivePortalUMAStatistics(
|
| + bool overridable) const {
|
| +#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
| + if (captive_portal_detection_enabled_)
|
| + RecordCaptivePortalEventStats(
|
| + overridable ?
|
| + CAPTIVE_PORTAL_DETECTION_ENABLED_OVERRIDABLE :
|
| + CAPTIVE_PORTAL_DETECTION_ENABLED);
|
| + if (captive_portal_probe_completed_)
|
| + RecordCaptivePortalEventStats(
|
| + overridable ?
|
| + CAPTIVE_PORTAL_PROBE_COMPLETED_OVERRIDABLE :
|
| + CAPTIVE_PORTAL_PROBE_COMPLETED);
|
| + // Log only one of portal detected and no response results.
|
| + if (captive_portal_detected_)
|
| + RecordCaptivePortalEventStats(
|
| + overridable ?
|
| + CAPTIVE_PORTAL_DETECTED_OVERRIDABLE :
|
| + CAPTIVE_PORTAL_DETECTED);
|
| + else if (captive_portal_no_response_)
|
| + RecordCaptivePortalEventStats(
|
| + overridable ?
|
| + CAPTIVE_PORTAL_NO_RESPONSE_OVERRIDABLE :
|
| + CAPTIVE_PORTAL_NO_RESPONSE);
|
| +#endif
|
| +}
|
| +
|
| base::TimeDelta SSLErrorClassification::TimePassedSinceExpiry() const {
|
| base::TimeDelta delta = current_time_ - cert_.valid_expiry();
|
| return delta;
|
| @@ -102,6 +182,32 @@ float SSLErrorClassification::CalculateScoreTimePassedSinceExpiry() const {
|
| return kLowThresholdWeight;
|
| }
|
|
|
| +float SSLErrorClassification::CalculateScoreEnvironments() const {
|
| + static const float kWifiWeight = 0.7f;
|
| + static const float kCellularWeight = 0.7f;
|
| + static const float kHotspotWeight = 0.2f;
|
| + static const float kEthernetWeight = 0.7f;
|
| + static const float kOtherWeight = 0.7f;
|
| + net::NetworkChangeNotifier::ConnectionType type =
|
| + net::NetworkChangeNotifier::GetConnectionType();
|
| + if (type == net::NetworkChangeNotifier::CONNECTION_WIFI)
|
| + return kWifiWeight;
|
| + if (type == net::NetworkChangeNotifier::CONNECTION_2G ||
|
| + type == net::NetworkChangeNotifier::CONNECTION_3G ||
|
| + type == net::NetworkChangeNotifier::CONNECTION_4G ) {
|
| + return kCellularWeight;
|
| + }
|
| + if (type == net::NetworkChangeNotifier::CONNECTION_ETHERNET)
|
| + return kEthernetWeight;
|
| +#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
| + // Assume if captive portals are detected then the user is connected using a
|
| + // hot spot.
|
| + if (captive_portal_detected_)
|
| + return kHotspotWeight;
|
| +#endif
|
| + return kOtherWeight;
|
| +}
|
| +
|
| bool SSLErrorClassification::IsUserClockInThePast(base::Time time_now) {
|
| base::Time build_time = base::GetBuildTime();
|
| if (time_now < build_time - base::TimeDelta::FromDays(2))
|
| @@ -116,9 +222,34 @@ bool SSLErrorClassification::IsUserClockInTheFuture(base::Time time_now) {
|
| return false;
|
| }
|
|
|
| -void SSLErrorClassification::RecordUMAStatistics(bool overridable) {
|
| - if (IsUserClockInThePast(base::Time::NowFromSystemTime()))
|
| - RecordSSLInterstitialCause(overridable, CLOCK_PAST);
|
| - if (IsUserClockInTheFuture(base::Time::NowFromSystemTime()))
|
| - RecordSSLInterstitialCause(overridable, CLOCK_FUTURE);
|
| +void SSLErrorClassification::Observe(
|
| + int type,
|
| + const content::NotificationSource& source,
|
| + const content::NotificationDetails& details) {
|
| +#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
| + // When detection is disabled, captive portal service always sends
|
| + // RESULT_INTERNET_CONNECTED. Ignore any probe results in that case.
|
| + if (!captive_portal_detection_enabled_)
|
| + return;
|
| + if (type == chrome::NOTIFICATION_CAPTIVE_PORTAL_CHECK_RESULT) {
|
| + captive_portal_probe_completed_ = true;
|
| + CaptivePortalService::Results* results =
|
| + content::Details<CaptivePortalService::Results>(
|
| + details).ptr();
|
| + // If a captive portal was detected at any point when the interstitial was
|
| + // displayed, assume that the interstitial was caused by a captive portal.
|
| + // Example scenario:
|
| + // 1- Interstitial displayed and captive portal detected, setting the flag.
|
| + // 2- Captive portal detection automatically opens portal login page.
|
| + // 3- User logs in on the portal login page.
|
| + // A notification will be received here for RESULT_INTERNET_CONNECTED. Make
|
| + // sure we don't clear the captive protal flag, since the interstitial was
|
| + // potentially caused by the captive portal.
|
| + captive_portal_detected_ = captive_portal_detected_ ||
|
| + (results->result == captive_portal::RESULT_BEHIND_CAPTIVE_PORTAL);
|
| + // Also keep track of non-HTTP portals and error cases.
|
| + captive_portal_no_response_ = captive_portal_no_response_ ||
|
| + (results->result == captive_portal::RESULT_NO_RESPONSE);
|
| + }
|
| +#endif
|
| }
|
|
|