// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "content/browser/ssl/ssl_policy.h" #include "base/base_switches.h" #include "base/bind.h" #include "base/command_line.h" #include "base/memory/singleton.h" #include "base/metrics/histogram_macros.h" #include "base/strings/string_piece.h" #include "base/strings/string_util.h" #include "content/browser/frame_host/navigation_entry_impl.h" #include "content/browser/renderer_host/render_process_host_impl.h" #include "content/browser/renderer_host/render_view_host_impl.h" #include "content/browser/site_instance_impl.h" #include "content/browser/ssl/ssl_cert_error_handler.h" #include "content/browser/ssl/ssl_request_info.h" #include "content/browser/web_contents/web_contents_impl.h" #include "content/public/browser/content_browser_client.h" #include "content/public/browser/web_contents.h" #include "content/public/common/resource_type.h" #include "content/public/common/ssl_status.h" #include "content/public/common/url_constants.h" #include "net/ssl/ssl_info.h" #include "url/gurl.h" namespace content { namespace { // Events for UMA. Do not reorder or change! enum SSLGoodCertSeenEvent { NO_PREVIOUS_EXCEPTION = 0, HAD_PREVIOUS_EXCEPTION = 1, SSL_GOOD_CERT_SEEN_EVENT_MAX = 2 }; } SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) : backend_(backend) { DCHECK(backend_); } void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { bool expired_previous_decision; // First we check if we know the policy for this error. DCHECK(handler->ssl_info().is_valid()); SSLHostStateDelegate::CertJudgment judgment = backend_->QueryPolicy(*handler->ssl_info().cert.get(), handler->request_url().host(), handler->cert_error(), &expired_previous_decision); if (judgment == SSLHostStateDelegate::ALLOWED) { handler->ContinueRequest(); return; } // For all other hosts, which must be DENIED, a blocking page is shown to the // user every time they come back to the page. int options_mask = 0; switch (handler->cert_error()) { case net::ERR_CERT_COMMON_NAME_INVALID: case net::ERR_CERT_DATE_INVALID: case net::ERR_CERT_AUTHORITY_INVALID: case net::ERR_CERT_WEAK_SIGNATURE_ALGORITHM: case net::ERR_CERT_WEAK_KEY: case net::ERR_CERT_NAME_CONSTRAINT_VIOLATION: case net::ERR_CERT_VALIDITY_TOO_LONG: if (!handler->fatal()) options_mask |= OVERRIDABLE; else options_mask |= STRICT_ENFORCEMENT; if (expired_previous_decision) options_mask |= EXPIRED_PREVIOUS_DECISION; OnCertErrorInternal(handler, options_mask); break; case net::ERR_CERT_NO_REVOCATION_MECHANISM: // Ignore this error. handler->ContinueRequest(); break; case net::ERR_CERT_UNABLE_TO_CHECK_REVOCATION: // We ignore this error but will show a warning status in the location // bar. handler->ContinueRequest(); break; case net::ERR_CERT_CONTAINS_ERRORS: case net::ERR_CERT_REVOKED: case net::ERR_CERT_INVALID: case net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY: case net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN: if (handler->fatal()) options_mask |= STRICT_ENFORCEMENT; if (expired_previous_decision) options_mask |= EXPIRED_PREVIOUS_DECISION; OnCertErrorInternal(handler, options_mask); break; default: NOTREACHED(); handler->CancelRequest(); break; } } void SSLPolicy::DidRunInsecureContent(NavigationEntryImpl* entry, const GURL& security_origin) { if (!entry) return; SiteInstance* site_instance = entry->site_instance(); if (!site_instance) return; backend_->HostRanInsecureContent(security_origin.host(), site_instance->GetProcess()->GetID()); } void SSLPolicy::OnRequestStarted(SSLRequestInfo* info) { if (info->ssl_cert_id() && info->url().SchemeIsCryptographic() && !net::IsCertStatusError(info->ssl_cert_status())) { // If the scheme is https: or wss: *and* the security info for the // cert has been set (i.e. the cert id is not 0) and the cert did // not have any errors, revoke any previous decisions that // have occurred. If the cert info has not been set, do nothing since it // isn't known if the connection was actually a valid connection or if it // had a cert error. SSLGoodCertSeenEvent event = NO_PREVIOUS_EXCEPTION; if (backend_->HasAllowException(info->url().host())) { // If there's no certificate error, a good certificate has been seen, so // clear out any exceptions that were made by the user for bad // certificates. backend_->RevokeUserAllowExceptions(info->url().host()); event = HAD_PREVIOUS_EXCEPTION; } UMA_HISTOGRAM_ENUMERATION("interstitial.ssl.good_cert_seen", event, SSL_GOOD_CERT_SEEN_EVENT_MAX); } } void SSLPolicy::UpdateEntry(NavigationEntryImpl* entry, WebContents* web_contents) { DCHECK(entry); InitializeEntryIfNeeded(entry); if (entry->GetSSL().security_style == SECURITY_STYLE_UNAUTHENTICATED) return; if (!web_contents->DisplayedInsecureContent()) entry->GetSSL().content_status &= ~SSLStatus::DISPLAYED_INSECURE_CONTENT; if (web_contents->DisplayedInsecureContent()) entry->GetSSL().content_status |= SSLStatus::DISPLAYED_INSECURE_CONTENT; if (entry->GetSSL().security_style == SECURITY_STYLE_AUTHENTICATION_BROKEN) return; SiteInstance* site_instance = entry->site_instance(); // Note that |site_instance| can be NULL here because NavigationEntries don't // necessarily have site instances. Without a process, the entry can't // possibly have insecure content. See bug http://crbug.com/12423. if (site_instance && backend_->DidHostRunInsecureContent( entry->GetURL().host(), site_instance->GetProcess()->GetID())) { entry->GetSSL().security_style = SECURITY_STYLE_AUTHENTICATION_BROKEN; entry->GetSSL().content_status |= SSLStatus::RAN_INSECURE_CONTENT; return; } } // Static SecurityStyle SSLPolicy::GetSecurityStyleForResource( const GURL& url, int cert_id, net::CertStatus cert_status) { // An HTTPS response may not have a certificate for some reason. When that // happens, use the unauthenticated (HTTP) rather than the authentication // broken security style so that we can detect this error condition. if (!url.SchemeIsCryptographic() || !cert_id) return SECURITY_STYLE_UNAUTHENTICATED; // Minor errors don't lower the security style to // SECURITY_STYLE_AUTHENTICATION_BROKEN. if (net::IsCertStatusError(cert_status) && !net::IsCertStatusMinorError(cert_status)) { return SECURITY_STYLE_AUTHENTICATION_BROKEN; } return SECURITY_STYLE_AUTHENTICATED; } void SSLPolicy::OnAllowCertificate(scoped_refptr handler, bool allow) { DCHECK(handler->ssl_info().is_valid()); if (allow) { // Default behavior for accepting a certificate. // Note that we should not call SetMaxSecurityStyle here, because the active // NavigationEntry has just been deleted (in HideInterstitialPage) and the // new NavigationEntry will not be set until DidNavigate. This is ok, // because the new NavigationEntry will have its max security style set // within DidNavigate. // // While AllowCertForHost() executes synchronously on this thread, // ContinueRequest() gets posted to a different thread. Calling // AllowCertForHost() first ensures deterministic ordering. backend_->AllowCertForHost(*handler->ssl_info().cert.get(), handler->request_url().host(), handler->cert_error()); handler->ContinueRequest(); } else { // Default behavior for rejecting a certificate. handler->CancelRequest(); } } //////////////////////////////////////////////////////////////////////////////// // Certificate Error Routines void SSLPolicy::OnCertErrorInternal(SSLCertErrorHandler* handler, int options_mask) { bool overridable = (options_mask & OVERRIDABLE) != 0; bool strict_enforcement = (options_mask & STRICT_ENFORCEMENT) != 0; bool expired_previous_decision = (options_mask & EXPIRED_PREVIOUS_DECISION) != 0; CertificateRequestResultType result = CERTIFICATE_REQUEST_RESULT_TYPE_CONTINUE; GetContentClient()->browser()->AllowCertificateError( handler->GetManager()->controller()->GetWebContents(), handler->cert_error(), handler->ssl_info(), handler->request_url(), handler->resource_type(), overridable, strict_enforcement, expired_previous_decision, base::Bind(&SSLPolicy::OnAllowCertificate, base::Unretained(this), make_scoped_refptr(handler)), &result); switch (result) { case CERTIFICATE_REQUEST_RESULT_TYPE_CONTINUE: break; case CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL: handler->CancelRequest(); break; case CERTIFICATE_REQUEST_RESULT_TYPE_DENY: handler->DenyRequest(); break; default: NOTREACHED(); } } void SSLPolicy::InitializeEntryIfNeeded(NavigationEntryImpl* entry) { if (entry->GetSSL().security_style != SECURITY_STYLE_UNKNOWN) return; entry->GetSSL().security_style = GetSecurityStyleForResource( entry->GetURL(), entry->GetSSL().cert_id, entry->GetSSL().cert_status); } void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) { GURL parsed_origin(origin); if (parsed_origin.SchemeIsCryptographic()) backend_->HostRanInsecureContent(parsed_origin.host(), pid); } } // namespace content