// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/safe_browsing/safe_browsing_service.h" #include "base/callback.h" #include "base/command_line.h" #include "base/lazy_instance.h" #include "base/path_service.h" #include "base/stl_util-inl.h" #include "base/string_util.h" #include "base/threading/thread_restrictions.h" #include "chrome/browser/browser_process.h" #include "chrome/browser/metrics/metrics_service.h" #include "chrome/browser/prefs/pref_service.h" #include "chrome/browser/profiles/profile_manager.h" #include "chrome/browser/safe_browsing/malware_details.h" #include "chrome/browser/safe_browsing/protocol_manager.h" #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" #include "chrome/browser/safe_browsing/safe_browsing_database.h" #include "chrome/browser/tab_contents/tab_util.h" #include "chrome/common/chrome_constants.h" #include "chrome/common/chrome_paths.h" #include "chrome/common/chrome_switches.h" #include "chrome/common/pref_names.h" #include "chrome/common/url_constants.h" #include "content/browser/browser_thread.h" #include "content/browser/tab_contents/tab_contents.h" #include "net/base/registry_controlled_domain.h" #include "net/url_request/url_request_context_getter.h" #if defined(OS_WIN) #include "chrome/installer/util/browser_distribution.h" #endif namespace { // The default URL prefix where browser fetches chunk updates, hashes, // and reports safe browsing hits. const char* const kSbDefaultInfoURLPrefix = "http://safebrowsing.clients.google.com/safebrowsing"; // The default URL prefix where browser fetches MAC client key and reports // malware details. const char* const kSbDefaultMacKeyURLPrefix = "https://sb-ssl.google.com/safebrowsing"; // When download url check takes this long, client's callback will be called // without waiting for the result. const int64 kDownloadUrlCheckTimeoutMs = 10000; // Similar to kDownloadUrlCheckTimeoutMs, but for download hash checks. const int64 kDownloadHashCheckTimeoutMs = 10000; // TODO(lzheng): Replace this with Profile* ProfileManager::GetDefaultProfile(). Profile* GetDefaultProfile() { FilePath user_data_dir; PathService::Get(chrome::DIR_USER_DATA, &user_data_dir); ProfileManager* profile_manager = g_browser_process->profile_manager(); return profile_manager->GetDefaultProfile(user_data_dir); } // Records disposition information about the check. |hit| should be // |true| if there were any prefix hits in |full_hashes|. void RecordGetHashCheckStatus( bool hit, bool is_download, const std::vector<SBFullHashResult>& full_hashes) { SafeBrowsingProtocolManager::ResultType result; if (full_hashes.empty()) { result = SafeBrowsingProtocolManager::GET_HASH_FULL_HASH_EMPTY; } else if (hit) { result = SafeBrowsingProtocolManager::GET_HASH_FULL_HASH_HIT; } else { result = SafeBrowsingProtocolManager::GET_HASH_FULL_HASH_MISS; } SafeBrowsingProtocolManager::RecordGetHashResult(is_download, result); } } // namespace // static SafeBrowsingServiceFactory* SafeBrowsingService::factory_ = NULL; // The default SafeBrowsingServiceFactory. Global, made a singleton so we // don't leak it. class SafeBrowsingServiceFactoryImpl : public SafeBrowsingServiceFactory { public: virtual SafeBrowsingService* CreateSafeBrowsingService() { return new SafeBrowsingService(); } private: friend struct base::DefaultLazyInstanceTraits<SafeBrowsingServiceFactoryImpl>; SafeBrowsingServiceFactoryImpl() { } DISALLOW_COPY_AND_ASSIGN(SafeBrowsingServiceFactoryImpl); }; static base::LazyInstance<SafeBrowsingServiceFactoryImpl> g_safe_browsing_service_factory_impl(base::LINKER_INITIALIZED); struct SafeBrowsingService::WhiteListedEntry { int render_process_host_id; int render_view_id; std::string domain; UrlCheckResult result; }; SafeBrowsingService::UnsafeResource::UnsafeResource() : resource_type(ResourceType::MAIN_FRAME), threat_type(SAFE), client(NULL), render_process_host_id(-1), render_view_id(-1) { } SafeBrowsingService::UnsafeResource::~UnsafeResource() {} SafeBrowsingService::SafeBrowsingCheck::SafeBrowsingCheck() : full_hash(NULL), client(NULL), need_get_hash(false), result(SAFE), is_download(false), timeout_task(NULL) { } SafeBrowsingService::SafeBrowsingCheck::~SafeBrowsingCheck() {} void SafeBrowsingService::Client::OnSafeBrowsingResult( const SafeBrowsingCheck& check) { if (!check.urls.empty()) { DCHECK(!check.full_hash.get()); if (!check.is_download) { DCHECK_EQ(1U, check.urls.size()); OnBrowseUrlCheckResult(check.urls[0], check.result); } else { OnDownloadUrlCheckResult(check.urls, check.result); } } else if (check.full_hash.get()) { OnDownloadHashCheckResult( safe_browsing_util::SBFullHashToString(*check.full_hash), check.result); } else { NOTREACHED(); } } /* static */ SafeBrowsingService* SafeBrowsingService::CreateSafeBrowsingService() { if (!factory_) factory_ = g_safe_browsing_service_factory_impl.Pointer(); return factory_->CreateSafeBrowsingService(); } SafeBrowsingService::SafeBrowsingService() : database_(NULL), protocol_manager_(NULL), enabled_(false), enable_download_protection_(false), enable_csd_whitelist_(false), update_in_progress_(false), database_update_in_progress_(false), closing_database_(false), download_urlcheck_timeout_ms_(kDownloadUrlCheckTimeoutMs), download_hashcheck_timeout_ms_(kDownloadHashCheckTimeoutMs) { } void SafeBrowsingService::Initialize() { // Get the profile's preference for SafeBrowsing. PrefService* pref_service = GetDefaultProfile()->GetPrefs(); if (pref_service->GetBoolean(prefs::kSafeBrowsingEnabled)) Start(); } void SafeBrowsingService::ShutDown() { BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnIOShutdown)); } bool SafeBrowsingService::CanCheckUrl(const GURL& url) const { return url.SchemeIs(chrome::kFtpScheme) || url.SchemeIs(chrome::kHttpScheme) || url.SchemeIs(chrome::kHttpsScheme); } // Only report SafeBrowsing related stats when UMA is enabled and // safe browsing is enabled. bool SafeBrowsingService::CanReportStats() const { const MetricsService* metrics = g_browser_process->metrics_service(); const PrefService* pref_service = GetDefaultProfile()->GetPrefs(); return metrics && metrics->reporting_active() && pref_service && pref_service->GetBoolean(prefs::kSafeBrowsingEnabled); } // Binhash verification is only enabled for UMA users for now. bool SafeBrowsingService::DownloadBinHashNeeded() const { return enable_download_protection_ && CanReportStats(); } bool SafeBrowsingService::CheckDownloadUrl(const std::vector<GURL>& url_chain, Client* client) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_ || !enable_download_protection_) return true; // We need to check the database for url prefix, and later may fetch the url // from the safebrowsing backends. These need to be asynchronous. SafeBrowsingCheck* check = new SafeBrowsingCheck(); check->urls = url_chain; StartDownloadCheck( check, client, NewRunnableMethod(this, &SafeBrowsingService::CheckDownloadUrlOnSBThread, check), download_urlcheck_timeout_ms_); return false; } bool SafeBrowsingService::CheckDownloadHash(const std::string& full_hash, Client* client) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(!full_hash.empty()); if (!enabled_ || !enable_download_protection_ || full_hash.empty()) return true; // We need to check the database for url prefix, and later may fetch the url // from the safebrowsing backends. These need to be asynchronous. SafeBrowsingCheck* check = new SafeBrowsingCheck(); check->full_hash.reset(new SBFullHash); safe_browsing_util::StringToSBFullHash(full_hash, check->full_hash.get()); StartDownloadCheck( check, client, NewRunnableMethod(this, &SafeBrowsingService::CheckDownloadHashOnSBThread, check), download_hashcheck_timeout_ms_); return false; } bool SafeBrowsingService::MatchCsdWhitelistUrl(const GURL& url) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_ || !enable_csd_whitelist_ || !MakeDatabaseAvailable()) { // There is something funky going on here -- for example, perhaps the user // has not restarted since enabling metrics reporting, so we haven't // enabled the csd whitelist yet. Just to be safe we return true in this // case. return true; } return database_->ContainsCsdWhitelistedUrl(url); } bool SafeBrowsingService::CheckBrowseUrl(const GURL& url, Client* client) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return true; if (!CanCheckUrl(url)) return true; const base::TimeTicks start = base::TimeTicks::Now(); if (!MakeDatabaseAvailable()) { QueuedCheck check; check.client = client; check.url = url; check.start = start; queued_checks_.push_back(check); return false; } std::string list; std::vector<SBPrefix> prefix_hits; std::vector<SBFullHashResult> full_hits; bool prefix_match = database_->ContainsBrowseUrl(url, &list, &prefix_hits, &full_hits, protocol_manager_->last_update()); UMA_HISTOGRAM_TIMES("SB2.FilterCheck", base::TimeTicks::Now() - start); if (!prefix_match) return true; // URL is okay. // Needs to be asynchronous, since we could be in the constructor of a // ResourceDispatcherHost event handler which can't pause there. SafeBrowsingCheck* check = new SafeBrowsingCheck(); check->urls.push_back(url); check->client = client; check->result = SAFE; check->is_download = false; check->need_get_hash = full_hits.empty(); check->prefix_hits.swap(prefix_hits); check->full_hits.swap(full_hits); checks_.insert(check); BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnCheckDone, check)); return false; } void SafeBrowsingService::CancelCheck(Client* client) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); for (CurrentChecks::iterator i = checks_.begin(); i != checks_.end(); ++i) { // We can't delete matching checks here because the db thread has a copy of // the pointer. Instead, we simply NULL out the client, and when the db // thread calls us back, we'll clean up the check. if ((*i)->client == client) (*i)->client = NULL; } // Scan the queued clients store. Clients may be here if they requested a URL // check before the database has finished loading. for (std::deque<QueuedCheck>::iterator it(queued_checks_.begin()); it != queued_checks_.end(); ) { // In this case it's safe to delete matches entirely since nothing has a // pointer to them. if (it->client == client) it = queued_checks_.erase(it); else ++it; } } void SafeBrowsingService::DisplayBlockingPage( const GURL& url, const GURL& original_url, const std::vector<GURL>& redirect_urls, ResourceType::Type resource_type, UrlCheckResult result, Client* client, int render_process_host_id, int render_view_id) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); // Check if the user has already ignored our warning for this render_view // and domain. for (size_t i = 0; i < white_listed_entries_.size(); ++i) { const WhiteListedEntry& entry = white_listed_entries_[i]; if (entry.render_process_host_id == render_process_host_id && entry.render_view_id == render_view_id && entry.result == result && entry.domain == net::RegistryControlledDomainService::GetDomainAndRegistry(url)) { MessageLoop::current()->PostTask(FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::NotifyClientBlockingComplete, client, true)); return; } } UnsafeResource resource; resource.url = url; resource.original_url = original_url; resource.redirect_urls = redirect_urls; resource.resource_type = resource_type; resource.threat_type= result; resource.client = client; resource.render_process_host_id = render_process_host_id; resource.render_view_id = render_view_id; // The blocking page must be created from the UI thread. BrowserThread::PostTask( BrowserThread::UI, FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::DoDisplayBlockingPage, resource)); } void SafeBrowsingService::HandleGetHashResults( SafeBrowsingCheck* check, const std::vector<SBFullHashResult>& full_hashes, bool can_cache) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return; // If the service has been shut down, |check| should have been deleted. DCHECK(checks_.find(check) != checks_.end()); // |start| is set before calling |GetFullHash()|, which should be // the only path which gets to here. DCHECK(!check->start.is_null()); UMA_HISTOGRAM_LONG_TIMES("SB2.Network", base::TimeTicks::Now() - check->start); std::vector<SBPrefix> prefixes = check->prefix_hits; OnHandleGetHashResults(check, full_hashes); // 'check' is deleted here. if (can_cache && MakeDatabaseAvailable()) { // Cache the GetHash results in memory: database_->CacheHashResults(prefixes, full_hashes); } } void SafeBrowsingService::HandleChunk(const std::string& list, SBChunkList* chunks) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::HandleChunkForDatabase, list, chunks)); } void SafeBrowsingService::HandleChunkDelete( std::vector<SBChunkDelete>* chunk_deletes) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::DeleteChunks, chunk_deletes)); } void SafeBrowsingService::UpdateStarted() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); DCHECK(!update_in_progress_); update_in_progress_ = true; safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::GetAllChunksFromDatabase)); } void SafeBrowsingService::UpdateFinished(bool update_succeeded) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); if (update_in_progress_) { update_in_progress_ = false; safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::DatabaseUpdateFinished, update_succeeded)); } } bool SafeBrowsingService::IsUpdateInProgress() const { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); return update_in_progress_; } void SafeBrowsingService::OnBlockingPageDone( const std::vector<UnsafeResource>& resources, bool proceed) { for (std::vector<UnsafeResource>::const_iterator iter = resources.begin(); iter != resources.end(); ++iter) { const UnsafeResource& resource = *iter; NotifyClientBlockingComplete(resource.client, proceed); if (proceed) { // Whitelist this domain and warning type for the given tab. WhiteListedEntry entry; entry.render_process_host_id = resource.render_process_host_id; entry.render_view_id = resource.render_view_id; entry.domain = net::RegistryControlledDomainService::GetDomainAndRegistry( resource.url); entry.result = resource.threat_type; white_listed_entries_.push_back(entry); } } } void SafeBrowsingService::OnNewMacKeys(const std::string& client_key, const std::string& wrapped_key) { PrefService* prefs = g_browser_process->local_state(); if (prefs) { prefs->SetString(prefs::kSafeBrowsingClientKey, client_key); prefs->SetString(prefs::kSafeBrowsingWrappedKey, wrapped_key); } } void SafeBrowsingService::OnEnable(bool enabled) { if (enabled) Start(); else ShutDown(); } // static void SafeBrowsingService::RegisterPrefs(PrefService* prefs) { prefs->RegisterStringPref(prefs::kSafeBrowsingClientKey, ""); prefs->RegisterStringPref(prefs::kSafeBrowsingWrappedKey, ""); } void SafeBrowsingService::CloseDatabase() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); // Cases to avoid: // * If |closing_database_| is true, continuing will queue up a second // request, |closing_database_| will be reset after handling the first // request, and if any functions on the db thread recreate the database, we // could start using it on the IO thread and then have the second request // handler delete it out from under us. // * If |database_| is NULL, then either no creation request is in flight, in // which case we don't need to do anything, or one is in flight, in which // case the database will be recreated before our deletion request is // handled, and could be used on the IO thread in that time period, leading // to the same problem as above. // * If |queued_checks_| is non-empty and |database_| is non-NULL, we're // about to be called back (in DatabaseLoadComplete()). This will call // CheckUrl(), which will want the database. Closing the database here // would lead to an infinite loop in DatabaseLoadComplete(), and even if it // didn't, it would be pointless since we'd just want to recreate. // // The first two cases above are handled by checking DatabaseAvailable(). if (!DatabaseAvailable() || !queued_checks_.empty()) return; closing_database_ = true; if (safe_browsing_thread_.get()) { safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnCloseDatabase)); } } void SafeBrowsingService::ResetDatabase() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::OnResetDatabase)); } void SafeBrowsingService::LogPauseDelay(base::TimeDelta time) { UMA_HISTOGRAM_LONG_TIMES("SB2.Delay", time); } SafeBrowsingService::~SafeBrowsingService() { // We should have already been shut down. If we're still enabled, then the // database isn't going to be closed properly, which could lead to corruption. DCHECK(!enabled_); } void SafeBrowsingService::OnIOInitialize( const std::string& client_key, const std::string& wrapped_key, net::URLRequestContextGetter* request_context_getter) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); enabled_ = true; MakeDatabaseAvailable(); // On Windows, get the safe browsing client name from the browser // distribution classes in installer util. These classes don't yet have // an analog on non-Windows builds so just keep the name specified here. #if defined(OS_WIN) BrowserDistribution* dist = BrowserDistribution::GetDistribution(); std::string client_name(dist->GetSafeBrowsingName()); #else #if defined(GOOGLE_CHROME_BUILD) std::string client_name("googlechrome"); #else std::string client_name("chromium"); #endif #endif CommandLine* cmdline = CommandLine::ForCurrentProcess(); bool disable_auto_update = cmdline->HasSwitch(switches::kSbDisableAutoUpdate) || cmdline->HasSwitch(switches::kDisableBackgroundNetworking); std::string info_url_prefix = cmdline->HasSwitch(switches::kSbInfoURLPrefix) ? cmdline->GetSwitchValueASCII(switches::kSbInfoURLPrefix) : kSbDefaultInfoURLPrefix; std::string mackey_url_prefix = cmdline->HasSwitch(switches::kSbMacKeyURLPrefix) ? cmdline->GetSwitchValueASCII(switches::kSbMacKeyURLPrefix) : kSbDefaultMacKeyURLPrefix; DCHECK(!protocol_manager_); protocol_manager_ = SafeBrowsingProtocolManager::Create(this, client_name, client_key, wrapped_key, request_context_getter, info_url_prefix, mackey_url_prefix, disable_auto_update); protocol_manager_->Initialize(); } void SafeBrowsingService::OnIOShutdown() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return; enabled_ = false; // This cancels all in-flight GetHash requests. delete protocol_manager_; protocol_manager_ = NULL; // Delete queued checks, calling back any clients with 'SAFE'. // If we don't do this here we may fail to close the database below. while (!queued_checks_.empty()) { QueuedCheck queued = queued_checks_.front(); if (queued.client) { SafeBrowsingCheck sb_check; sb_check.urls.push_back(queued.url); sb_check.client = queued.client; sb_check.result = SAFE; queued.client->OnSafeBrowsingResult(sb_check); } queued_checks_.pop_front(); } // Close the database. We don't simply DeleteSoon() because if a close is // already pending, we'll double-free, and we don't set |database_| to NULL // because if there is still anything running on the db thread, it could // create a new database object (via GetDatabase()) that would then leak. CloseDatabase(); // Flush the database thread. Any in-progress database check results will be // ignored and cleaned up below. // // Note that to avoid leaking the database, we rely on the fact that no new // tasks will be added to the db thread between the call above and this one. // See comments on the declaration of |safe_browsing_thread_|. { // A ScopedAllowIO object is required to join the thread when calling Stop. // See http://crbug.com/72696. base::ThreadRestrictions::ScopedAllowIO allow_io_for_thread_join; safe_browsing_thread_.reset(); } // Delete pending checks, calling back any clients with 'SAFE'. We have // to do this after the db thread returns because methods on it can have // copies of these pointers, so deleting them might lead to accessing garbage. for (CurrentChecks::iterator it = checks_.begin(); it != checks_.end(); ++it) { SafeBrowsingCheck* check = *it; if (check->client) { check->result = SAFE; check->client->OnSafeBrowsingResult(*check); } if (check->timeout_task) check->timeout_task->Cancel(); } STLDeleteElements(&checks_); gethash_requests_.clear(); } bool SafeBrowsingService::DatabaseAvailable() const { base::AutoLock lock(database_lock_); return !closing_database_ && (database_ != NULL); } bool SafeBrowsingService::MakeDatabaseAvailable() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(enabled_); if (DatabaseAvailable()) return true; safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::GetDatabase)); return false; } SafeBrowsingDatabase* SafeBrowsingService::GetDatabase() { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); if (database_) return database_; FilePath path; bool result = PathService::Get(chrome::DIR_USER_DATA, &path); DCHECK(result); path = path.Append(chrome::kSafeBrowsingBaseFilename); const base::TimeTicks before = base::TimeTicks::Now(); SafeBrowsingDatabase* database = SafeBrowsingDatabase::Create(enable_download_protection_, enable_csd_whitelist_); database->Init(path); { // Acquiring the lock here guarantees correct ordering between the writes to // the new database object above, and the setting of |databse_| below. base::AutoLock lock(database_lock_); database_ = database; } BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::DatabaseLoadComplete)); UMA_HISTOGRAM_TIMES("SB2.DatabaseOpen", base::TimeTicks::Now() - before); return database_; } void SafeBrowsingService::OnCheckDone(SafeBrowsingCheck* check) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return; // If the service has been shut down, |check| should have been deleted. DCHECK(checks_.find(check) != checks_.end()); if (check->client && check->need_get_hash) { // We have a partial match so we need to query Google for the full hash. // Clean up will happen in HandleGetHashResults. // See if we have a GetHash request already in progress for this particular // prefix. If so, we just append ourselves to the list of interested parties // when the results arrive. We only do this for checks involving one prefix, // since that is the common case (multiple prefixes will issue the request // as normal). if (check->prefix_hits.size() == 1) { SBPrefix prefix = check->prefix_hits[0]; GetHashRequests::iterator it = gethash_requests_.find(prefix); if (it != gethash_requests_.end()) { // There's already a request in progress. it->second.push_back(check); return; } // No request in progress, so we're the first for this prefix. GetHashRequestors requestors; requestors.push_back(check); gethash_requests_[prefix] = requestors; } // Reset the start time so that we can measure the network time without the // database time. check->start = base::TimeTicks::Now(); protocol_manager_->GetFullHash(check, check->prefix_hits); } else { // We may have cached results for previous GetHash queries. Since // this data comes from cache, don't histogram hits. HandleOneCheck(check, check->full_hits); } } void SafeBrowsingService::GetAllChunksFromDatabase() { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); bool database_error = true; std::vector<SBListChunkRanges> lists; DCHECK(!database_update_in_progress_); database_update_in_progress_ = true; GetDatabase(); // This guarantees that |database_| is non-NULL. if (database_->UpdateStarted(&lists)) { database_error = false; } else { database_->UpdateFinished(false); } BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::OnGetAllChunksFromDatabase, lists, database_error)); } void SafeBrowsingService::OnGetAllChunksFromDatabase( const std::vector<SBListChunkRanges>& lists, bool database_error) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (enabled_) protocol_manager_->OnGetChunksComplete(lists, database_error); } void SafeBrowsingService::OnChunkInserted() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (enabled_) protocol_manager_->OnChunkInserted(); } void SafeBrowsingService::DatabaseLoadComplete() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return; HISTOGRAM_COUNTS("SB.QueueDepth", queued_checks_.size()); if (queued_checks_.empty()) return; // If the database isn't already available, calling CheckUrl() in the loop // below will add the check back to the queue, and we'll infinite-loop. DCHECK(DatabaseAvailable()); while (!queued_checks_.empty()) { QueuedCheck check = queued_checks_.front(); DCHECK(!check.start.is_null()); HISTOGRAM_TIMES("SB.QueueDelay", base::TimeTicks::Now() - check.start); // If CheckUrl() determines the URL is safe immediately, it doesn't call the // client's handler function (because normally it's being directly called by // the client). Since we're not the client, we have to convey this result. if (check.client && CheckBrowseUrl(check.url, check.client)) { SafeBrowsingCheck sb_check; sb_check.urls.push_back(check.url); sb_check.client = check.client; sb_check.result = SAFE; check.client->OnSafeBrowsingResult(sb_check); } queued_checks_.pop_front(); } } void SafeBrowsingService::HandleChunkForDatabase( const std::string& list_name, SBChunkList* chunks) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); if (chunks) { GetDatabase()->InsertChunks(list_name, *chunks); delete chunks; } BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnChunkInserted)); } void SafeBrowsingService::DeleteChunks( std::vector<SBChunkDelete>* chunk_deletes) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); if (chunk_deletes) { GetDatabase()->DeleteChunks(*chunk_deletes); delete chunk_deletes; } } SafeBrowsingService::UrlCheckResult SafeBrowsingService::GetResultFromListname( const std::string& list_name) { if (safe_browsing_util::IsPhishingList(list_name)) { return URL_PHISHING; } if (safe_browsing_util::IsMalwareList(list_name)) { return URL_MALWARE; } if (safe_browsing_util::IsBadbinurlList(list_name)) { return BINARY_MALWARE_URL; } if (safe_browsing_util::IsBadbinhashList(list_name)) { return BINARY_MALWARE_HASH; } DVLOG(1) << "Unknown safe browsing list " << list_name; return SAFE; } void SafeBrowsingService::NotifyClientBlockingComplete(Client* client, bool proceed) { client->OnBlockingPageComplete(proceed); } void SafeBrowsingService::DatabaseUpdateFinished(bool update_succeeded) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); GetDatabase()->UpdateFinished(update_succeeded); DCHECK(database_update_in_progress_); database_update_in_progress_ = false; } void SafeBrowsingService::Start() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); DCHECK(!safe_browsing_thread_.get()); safe_browsing_thread_.reset(new base::Thread("Chrome_SafeBrowsingThread")); if (!safe_browsing_thread_->Start()) return; // Retrieve client MAC keys. PrefService* local_state = g_browser_process->local_state(); DCHECK(local_state); std::string client_key, wrapped_key; if (local_state) { client_key = local_state->GetString(prefs::kSafeBrowsingClientKey); wrapped_key = local_state->GetString(prefs::kSafeBrowsingWrappedKey); } // We will issue network fetches using the default profile's request context. scoped_refptr<net::URLRequestContextGetter> request_context_getter( GetDefaultProfile()->GetRequestContext()); CommandLine* cmdline = CommandLine::ForCurrentProcess(); enable_download_protection_ = !cmdline->HasSwitch(switches::kSbDisableDownloadProtection); // We only download the csd-whitelist if client-side phishing detection is // enabled and if the user has opted in with stats collection. Note: we // cannot check whether the metrics_service() object is created because it // may be initialized after this method is called. #ifdef OS_CHROMEOS // Client-side detection is disabled on ChromeOS for now, so don't bother // downloading the whitelist. enable_csd_whitelist_ = false; #else enable_csd_whitelist_ = (!cmdline->HasSwitch(switches::kDisableClientSidePhishingDetection) && local_state && local_state->GetBoolean(prefs::kMetricsReportingEnabled)); #endif BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::OnIOInitialize, client_key, wrapped_key, request_context_getter)); } void SafeBrowsingService::OnCloseDatabase() { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); DCHECK(closing_database_); // Because |closing_database_| is true, nothing on the IO thread will be // accessing the database, so it's safe to delete and then NULL the pointer. delete database_; database_ = NULL; // Acquiring the lock here guarantees correct ordering between the resetting // of |database_| above and of |closing_database_| below, which ensures there // won't be a window during which the IO thread falsely believes the database // is available. base::AutoLock lock(database_lock_); closing_database_ = false; } void SafeBrowsingService::OnResetDatabase() { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); GetDatabase()->ResetDatabase(); } void SafeBrowsingService::CacheHashResults( const std::vector<SBPrefix>& prefixes, const std::vector<SBFullHashResult>& full_hashes) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); GetDatabase()->CacheHashResults(prefixes, full_hashes); } void SafeBrowsingService::OnHandleGetHashResults( SafeBrowsingCheck* check, const std::vector<SBFullHashResult>& full_hashes) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); bool is_download = check->is_download; SBPrefix prefix = check->prefix_hits[0]; GetHashRequests::iterator it = gethash_requests_.find(prefix); if (check->prefix_hits.size() > 1 || it == gethash_requests_.end()) { const bool hit = HandleOneCheck(check, full_hashes); RecordGetHashCheckStatus(hit, is_download, full_hashes); return; } // Call back all interested parties, noting if any has a hit. GetHashRequestors& requestors = it->second; bool hit = false; for (GetHashRequestors::iterator r = requestors.begin(); r != requestors.end(); ++r) { if (HandleOneCheck(*r, full_hashes)) hit = true; } RecordGetHashCheckStatus(hit, is_download, full_hashes); gethash_requests_.erase(it); } bool SafeBrowsingService::HandleOneCheck( SafeBrowsingCheck* check, const std::vector<SBFullHashResult>& full_hashes) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(check); // Always calculate the index, for recording hits. int index = -1; if (!check->urls.empty()) { for (size_t i = 0; i < check->urls.size(); ++i) { index = safe_browsing_util::GetUrlHashIndex(check->urls[i], full_hashes); if (index != -1) break; } } else { index = safe_browsing_util::GetHashIndex(*(check->full_hash), full_hashes); } // |client| is NULL if the request was cancelled. if (check->client) { check->result = SAFE; if (index != -1) check->result = GetResultFromListname(full_hashes[index].list_name); } SafeBrowsingCheckDone(check); return (index != -1); } void SafeBrowsingService::DoDisplayBlockingPage( const UnsafeResource& resource) { // The tab might have been closed. TabContents* wc = tab_util::GetTabContentsByID(resource.render_process_host_id, resource.render_view_id); if (!wc) { // The tab is gone and we did not have a chance at showing the interstitial. // Just act as "Don't Proceed" was chosen. std::vector<UnsafeResource> resources; resources.push_back(resource); BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::OnBlockingPageDone, resources, false)); return; } if (resource.threat_type != SafeBrowsingService::SAFE && CanReportStats()) { GURL page_url = wc->GetURL(); GURL referrer_url; NavigationEntry* entry = wc->controller().GetActiveEntry(); if (entry) referrer_url = entry->referrer(); bool is_subresource = resource.resource_type != ResourceType::MAIN_FRAME; // When the malicious url is on the main frame, and resource.original_url // is not the same as the resource.url, that means we have a redirect from // resource.original_url to resource.url. // Also, at this point, page_url points to the _previous_ page that we // were on. We replace page_url with resource.original_url and referrer // with page_url. if (!is_subresource && !resource.original_url.is_empty() && resource.original_url != resource.url) { referrer_url = page_url; page_url = resource.original_url; } ReportSafeBrowsingHit(resource.url, page_url, referrer_url, is_subresource, resource.threat_type, std::string() /* post_data */); } SafeBrowsingBlockingPage::ShowBlockingPage(this, resource); } // A safebrowsing hit is sent after a blocking page for malware/phishing // or after the warning dialog for download urls, only for UMA users. void SafeBrowsingService::ReportSafeBrowsingHit( const GURL& malicious_url, const GURL& page_url, const GURL& referrer_url, bool is_subresource, SafeBrowsingService::UrlCheckResult threat_type, const std::string& post_data) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); if (!CanReportStats()) return; BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod( this, &SafeBrowsingService::ReportSafeBrowsingHitOnIOThread, malicious_url, page_url, referrer_url, is_subresource, threat_type, post_data)); } void SafeBrowsingService::ReportSafeBrowsingHitOnIOThread( const GURL& malicious_url, const GURL& page_url, const GURL& referrer_url, bool is_subresource, SafeBrowsingService::UrlCheckResult threat_type, const std::string& post_data) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!enabled_) return; DVLOG(1) << "ReportSafeBrowsingHit: " << malicious_url << " " << page_url << " " << referrer_url << " " << is_subresource << " " << threat_type; protocol_manager_->ReportSafeBrowsingHit(malicious_url, page_url, referrer_url, is_subresource, threat_type, post_data); } // If the user had opted-in to send MalwareDetails, this gets called // when the report is ready. void SafeBrowsingService::SendSerializedMalwareDetails( const std::string& serialized) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); if (!serialized.empty()) { DVLOG(1) << "Sending serialized malware details."; protocol_manager_->ReportMalwareDetails(serialized); } } void SafeBrowsingService::CheckDownloadHashOnSBThread( SafeBrowsingCheck* check) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); DCHECK(enable_download_protection_); if (!database_->ContainsDownloadHashPrefix(check->full_hash->prefix)) { // Good, we don't have hash for this url prefix. check->result = SAFE; BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::CheckDownloadHashDone, check)); return; } check->need_get_hash = true; check->prefix_hits.push_back(check->full_hash->prefix); BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnCheckDone, check)); } void SafeBrowsingService::CheckDownloadUrlOnSBThread(SafeBrowsingCheck* check) { DCHECK_EQ(MessageLoop::current(), safe_browsing_thread_->message_loop()); DCHECK(enable_download_protection_); std::vector<SBPrefix> prefix_hits; if (!database_->ContainsDownloadUrl(check->urls, &prefix_hits)) { // Good, we don't have hash for this url prefix. check->result = SAFE; BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::CheckDownloadUrlDone, check)); return; } check->need_get_hash = true; check->prefix_hits.clear(); check->prefix_hits = prefix_hits; BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &SafeBrowsingService::OnCheckDone, check)); } void SafeBrowsingService::TimeoutCallback(SafeBrowsingCheck* check) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(check); if (!enabled_) return; DCHECK(checks_.find(check) != checks_.end()); DCHECK_EQ(check->result, SAFE); if (check->client) { check->client->OnSafeBrowsingResult(*check); check->client = NULL; } check->timeout_task = NULL; } void SafeBrowsingService::CheckDownloadUrlDone(SafeBrowsingCheck* check) { DCHECK(enable_download_protection_); SafeBrowsingCheckDone(check); } void SafeBrowsingService::CheckDownloadHashDone(SafeBrowsingCheck* check) { DCHECK(enable_download_protection_); SafeBrowsingCheckDone(check); } void SafeBrowsingService::SafeBrowsingCheckDone(SafeBrowsingCheck* check) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(check); if (!enabled_) return; VLOG(1) << "SafeBrowsingCheckDone: " << check->result; DCHECK(checks_.find(check) != checks_.end()); if (check->client) check->client->OnSafeBrowsingResult(*check); if (check->timeout_task) check->timeout_task->Cancel(); checks_.erase(check); delete check; } void SafeBrowsingService::StartDownloadCheck(SafeBrowsingCheck* check, Client* client, CancelableTask* task, int64 timeout_ms) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); check->client = client; check->result = SAFE; check->is_download = true; check->timeout_task = NewRunnableMethod(this, &SafeBrowsingService::TimeoutCallback, check); checks_.insert(check); safe_browsing_thread_->message_loop()->PostTask(FROM_HERE, task); MessageLoop::current()->PostDelayedTask( FROM_HERE, check->timeout_task, timeout_ms); }