Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h" | 5 #include "chrome/browser/net/certificate_error_reporter.h" |
| 6 | 6 |
| 7 #include <set> | 7 #include <set> |
| 8 | 8 |
| 9 #include "base/base64.h" | |
| 10 #include "base/logging.h" | 9 #include "base/logging.h" |
| 11 #include "base/profiler/scoped_tracker.h" | |
| 12 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
| 13 #include "base/time/time.h" | 11 #include "base/time/time.h" |
| 14 #include "chrome/browser/net/cert_logger.pb.h" | 12 #include "chrome/browser/net/cert_logger.pb.h" |
| 15 #include "net/base/elements_upload_data_stream.h" | 13 #include "net/base/elements_upload_data_stream.h" |
| 16 #include "net/base/load_flags.h" | 14 #include "net/base/load_flags.h" |
| 17 #include "net/base/request_priority.h" | 15 #include "net/base/request_priority.h" |
| 18 #include "net/base/upload_bytes_element_reader.h" | 16 #include "net/base/upload_bytes_element_reader.h" |
| 19 #include "net/cert/x509_certificate.h" | 17 #include "net/cert/x509_certificate.h" |
| 20 #include "net/ssl/ssl_info.h" | 18 #include "net/ssl/ssl_info.h" |
| 21 #include "net/url_request/url_request_context.h" | 19 #include "net/url_request/url_request_context.h" |
| 22 | 20 |
| 23 namespace chrome_browser_net { | 21 namespace chrome_browser_net { |
| 24 | 22 |
| 25 // TODO(palmer): Switch to HTTPS when the error handling delegate is more | 23 CertificateErrorReporter::CertificateErrorReporter( |
| 26 // sophisticated. Ultimately we plan to attempt the report on many transports. | 24 net::URLRequestContext* request_context, |
| 27 static const char kFraudulentCertificateUploadEndpoint[] = | 25 const GURL& upload_url) |
| 28 "http://clients3.google.com/log_cert_error"; | 26 : request_context_(request_context), upload_url_(upload_url) { |
| 29 | 27 DCHECK(!upload_url.is_empty()); |
| 30 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( | |
| 31 net::URLRequestContext* request_context) | |
| 32 : request_context_(request_context), | |
| 33 upload_url_(kFraudulentCertificateUploadEndpoint) { | |
| 34 } | 28 } |
| 35 | 29 |
| 36 ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() { | 30 CertificateErrorReporter::~CertificateErrorReporter() { |
| 37 STLDeleteElements(&inflight_requests_); | 31 STLDeleteElements(&inflight_requests_); |
| 38 } | 32 } |
| 39 | 33 |
| 40 static std::string BuildReport(const std::string& hostname, | 34 void CertificateErrorReporter::SendReport(ReportType type, |
| 41 const net::SSLInfo& ssl_info) { | 35 const std::string& hostname, |
| 36 const net::SSLInfo& ssl_info) { | |
| 42 CertLoggerRequest request; | 37 CertLoggerRequest request; |
| 43 base::Time now = base::Time::Now(); | 38 std::string out; |
| 44 request.set_time_usec(now.ToInternalValue()); | |
| 45 request.set_hostname(hostname); | |
| 46 | 39 |
| 47 std::vector<std::string> pem_encoded_chain; | 40 BuildReport(hostname, ssl_info, request); |
| 48 if (!ssl_info.cert->GetPEMEncodedChain(&pem_encoded_chain)) { | 41 |
| 49 LOG(ERROR) << "Could not get PEM encoded chain."; | 42 switch (type) { |
| 43 case REPORT_TYPE_PINNING_VIOLATION: | |
| 44 SendCertLoggerRequest(request); | |
| 45 break; | |
| 46 case REPORT_TYPE_EXTENDED_REPORTING: | |
| 47 // TODO(estark): Double-check that the user is opted in. | |
| 48 // TODO(estark): Temporarily, since this is no upload endpoint, just | |
| 49 // log the information. | |
| 50 request.SerializeToString(&out); | |
| 51 DVLOG(3) << "SSL report for " << hostname << ":\n" << out << "\n\n"; | |
| 52 break; | |
| 53 default: | |
| 54 NOTREACHED(); | |
| 50 } | 55 } |
| 51 std::string* cert_chain = request.mutable_cert_chain(); | |
| 52 for (size_t i = 0; i < pem_encoded_chain.size(); ++i) | |
| 53 *cert_chain += pem_encoded_chain[i]; | |
| 54 | |
| 55 request.add_pin(ssl_info.pinning_failure_log); | |
| 56 | |
| 57 std::string out; | |
| 58 request.SerializeToString(&out); | |
| 59 return out; | |
| 60 } | 56 } |
| 61 | 57 |
| 62 scoped_ptr<net::URLRequest> | 58 void CertificateErrorReporter::OnResponseStarted(net::URLRequest* request) { |
| 63 ChromeFraudulentCertificateReporter::CreateURLRequest( | 59 const net::URLRequestStatus& status(request->status()); |
| 60 if (!status.is_success()) { | |
| 61 LOG(WARNING) << "Certificate upload failed" | |
| 62 << " status:" << status.status() | |
| 63 << " error:" << status.error(); | |
| 64 } else if (request->GetResponseCode() != 200) { | |
| 65 LOG(WARNING) << "Certificate upload HTTP status: " | |
| 66 << request->GetResponseCode(); | |
| 67 } | |
| 68 RequestComplete(request); | |
| 69 } | |
| 70 | |
| 71 void CertificateErrorReporter::OnReadCompleted(net::URLRequest* request, | |
| 72 int bytes_read) { | |
| 73 } | |
| 74 | |
| 75 scoped_ptr<net::URLRequest> CertificateErrorReporter::CreateURLRequest( | |
| 64 net::URLRequestContext* context) { | 76 net::URLRequestContext* context) { |
| 65 scoped_ptr<net::URLRequest> request = | 77 scoped_ptr<net::URLRequest> request = |
| 66 context->CreateRequest(upload_url_, net::DEFAULT_PRIORITY, this, NULL); | 78 context->CreateRequest(upload_url_, net::DEFAULT_PRIORITY, this, NULL); |
| 67 request->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | | 79 request->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | |
| 68 net::LOAD_DO_NOT_SAVE_COOKIES); | 80 net::LOAD_DO_NOT_SAVE_COOKIES); |
| 69 return request.Pass(); | 81 return request.Pass(); |
| 70 } | 82 } |
| 71 | 83 |
| 72 void ChromeFraudulentCertificateReporter::SendReport( | 84 void CertificateErrorReporter::SendCertLoggerRequest( |
| 73 const std::string& hostname, | 85 CertLoggerRequest& request) { |
| 74 const net::SSLInfo& ssl_info) { | 86 std::string serialized_request; |
| 75 // We do silent/automatic reporting ONLY for Google properties. For other | 87 request.SerializeToString(&serialized_request); |
| 76 // domains (when we start supporting that), we will ask for user permission. | |
| 77 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) { | |
| 78 return; | |
| 79 } | |
| 80 | |
| 81 std::string report = BuildReport(hostname, ssl_info); | |
| 82 | 88 |
| 83 scoped_ptr<net::URLRequest> url_request = CreateURLRequest(request_context_); | 89 scoped_ptr<net::URLRequest> url_request = CreateURLRequest(request_context_); |
| 84 url_request->set_method("POST"); | 90 url_request->set_method("POST"); |
| 85 | 91 |
| 86 scoped_ptr<net::UploadElementReader> reader( | 92 scoped_ptr<net::UploadElementReader> reader( |
| 87 net::UploadOwnedBytesElementReader::CreateWithString(report)); | 93 net::UploadOwnedBytesElementReader::CreateWithString(serialized_request)); |
| 88 url_request->set_upload( | 94 url_request->set_upload( |
| 89 net::ElementsUploadDataStream::CreateWithReader(reader.Pass(), 0)); | 95 net::ElementsUploadDataStream::CreateWithReader(reader.Pass(), 0)); |
| 90 | 96 |
| 91 net::HttpRequestHeaders headers; | 97 net::HttpRequestHeaders headers; |
| 92 headers.SetHeader(net::HttpRequestHeaders::kContentType, | 98 headers.SetHeader(net::HttpRequestHeaders::kContentType, |
| 93 "x-application/chrome-fraudulent-cert-report"); | 99 "x-application/chrome-fraudulent-cert-report"); |
| 94 url_request->SetExtraRequestHeaders(headers); | 100 url_request->SetExtraRequestHeaders(headers); |
| 95 | 101 |
| 96 net::URLRequest* raw_url_request = url_request.get(); | 102 net::URLRequest* raw_url_request = url_request.get(); |
| 97 inflight_requests_.insert(url_request.release()); | 103 inflight_requests_.insert(url_request.release()); |
| 98 raw_url_request->Start(); | 104 raw_url_request->Start(); |
| 99 } | 105 } |
| 100 | 106 |
| 101 void ChromeFraudulentCertificateReporter::RequestComplete( | 107 void CertificateErrorReporter::BuildReport(const std::string& hostname, |
| 102 net::URLRequest* request) { | 108 const net::SSLInfo& ssl_info, |
| 109 CertLoggerRequest& out_request) { | |
| 110 base::Time now = base::Time::Now(); | |
| 111 out_request.set_time_usec(now.ToInternalValue()); | |
| 112 out_request.set_hostname(hostname); | |
| 113 | |
| 114 std::vector<std::string> pem_encoded_chain; | |
| 115 if (!ssl_info.cert->GetPEMEncodedChain(&pem_encoded_chain)) { | |
| 116 LOG(ERROR) << "Could not get PEM encoded chain."; | |
| 117 } | |
|
Ryan Sleevi
2015/03/06 21:32:47
You've got inconsistent bracing here and the rest
estark
2015/03/07 00:38:50
grumble grumble I didn't write it but fiiiiine :P
| |
| 118 std::string* cert_chain = out_request.mutable_cert_chain(); | |
| 119 for (size_t i = 0; i < pem_encoded_chain.size(); ++i) | |
| 120 *cert_chain += pem_encoded_chain[i]; | |
| 121 | |
| 122 out_request.add_pin(ssl_info.pinning_failure_log); | |
| 123 } | |
| 124 | |
| 125 void CertificateErrorReporter::RequestComplete(net::URLRequest* request) { | |
| 103 std::set<net::URLRequest*>::iterator i = inflight_requests_.find(request); | 126 std::set<net::URLRequest*>::iterator i = inflight_requests_.find(request); |
| 104 DCHECK(i != inflight_requests_.end()); | 127 DCHECK(i != inflight_requests_.end()); |
| 105 scoped_ptr<net::URLRequest> url_request(*i); | 128 scoped_ptr<net::URLRequest> url_request(*i); |
| 106 inflight_requests_.erase(i); | 129 inflight_requests_.erase(i); |
| 107 } | 130 } |
| 108 | 131 |
| 109 // TODO(palmer): Currently, the upload is fire-and-forget but soon we will | |
| 110 // try to recover by retrying, and trying different endpoints, and | |
| 111 // appealing to the user. | |
| 112 void ChromeFraudulentCertificateReporter::OnResponseStarted( | |
| 113 net::URLRequest* request) { | |
| 114 // TODO(vadimt): Remove ScopedTracker below once crbug.com/422516 is fixed. | |
| 115 tracked_objects::ScopedTracker tracking_profile( | |
| 116 FROM_HERE_WITH_EXPLICIT_FUNCTION( | |
| 117 "422516 ChromeFraudulentCertificateReporter::OnResponseStarted")); | |
| 118 | |
| 119 const net::URLRequestStatus& status(request->status()); | |
| 120 if (!status.is_success()) { | |
| 121 LOG(WARNING) << "Certificate upload failed" | |
| 122 << " status:" << status.status() | |
| 123 << " error:" << status.error(); | |
| 124 } else if (request->GetResponseCode() != 200) { | |
| 125 LOG(WARNING) << "Certificate upload HTTP status: " | |
| 126 << request->GetResponseCode(); | |
| 127 } | |
| 128 RequestComplete(request); | |
| 129 } | |
| 130 | |
| 131 void ChromeFraudulentCertificateReporter::OnReadCompleted( | |
| 132 net::URLRequest* request, int bytes_read) {} | |
| 133 | |
| 134 } // namespace chrome_browser_net | 132 } // namespace chrome_browser_net |
| OLD | NEW |