зеркало из https://github.com/mozilla/gecko-dev.git
428 строки
15 KiB
JavaScript
428 строки
15 KiB
JavaScript
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
|
|
/* vim: set ts=2 et sw=2 tw=80: */
|
|
/* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
/**
|
|
* This file tests signature extraction using Windows Authenticode APIs of
|
|
* downloaded files.
|
|
*/
|
|
|
|
// Globals
|
|
|
|
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
|
|
XPCOMUtils.defineLazyModuleGetter(this, "FileUtils",
|
|
"resource://gre/modules/FileUtils.jsm");
|
|
XPCOMUtils.defineLazyModuleGetter(this, "NetUtil",
|
|
"resource://gre/modules/NetUtil.jsm");
|
|
XPCOMUtils.defineLazyModuleGetter(this, "Promise",
|
|
"resource://gre/modules/Promise.jsm");
|
|
|
|
const BackgroundFileSaverOutputStream = Components.Constructor(
|
|
"@mozilla.org/network/background-file-saver;1?mode=outputstream",
|
|
"nsIBackgroundFileSaver");
|
|
|
|
const StringInputStream = Components.Constructor(
|
|
"@mozilla.org/io/string-input-stream;1",
|
|
"nsIStringInputStream",
|
|
"setData");
|
|
|
|
const TEST_FILE_NAME_1 = "test-backgroundfilesaver-1.txt";
|
|
|
|
const gAppRep = Cc["@mozilla.org/downloads/application-reputation-service;1"].
|
|
getService(Ci.nsIApplicationReputationService);
|
|
var gStillRunning = true;
|
|
var gTables = {};
|
|
var gHttpServer = null;
|
|
|
|
const appRepURLPref = "browser.safebrowsing.downloads.remote.url";
|
|
const remoteEnabledPref = "browser.safebrowsing.downloads.remote.enabled";
|
|
|
|
/**
|
|
* Returns a reference to a temporary file. If the file is then created, it
|
|
* will be removed when tests in this file finish.
|
|
*/
|
|
function getTempFile(aLeafName) {
|
|
let file = FileUtils.getFile("TmpD", [aLeafName]);
|
|
do_register_cleanup(function GTF_cleanup() {
|
|
if (file.exists()) {
|
|
file.remove(false);
|
|
}
|
|
});
|
|
return file;
|
|
}
|
|
|
|
function readFileToString(aFilename) {
|
|
let f = do_get_file(aFilename);
|
|
let stream = Cc["@mozilla.org/network/file-input-stream;1"]
|
|
.createInstance(Ci.nsIFileInputStream);
|
|
stream.init(f, -1, 0, 0);
|
|
let buf = NetUtil.readInputStreamToString(stream, stream.available());
|
|
return buf;
|
|
}
|
|
|
|
/**
|
|
* Waits for the given saver object to complete.
|
|
*
|
|
* @param aSaver
|
|
* The saver, with the output stream or a stream listener implementation.
|
|
* @param aOnTargetChangeFn
|
|
* Optional callback invoked with the target file name when it changes.
|
|
*
|
|
* @return {Promise}
|
|
* @resolves When onSaveComplete is called with a success code.
|
|
* @rejects With an exception, if onSaveComplete is called with a failure code.
|
|
*/
|
|
function promiseSaverComplete(aSaver, aOnTargetChangeFn) {
|
|
let deferred = Promise.defer();
|
|
aSaver.observer = {
|
|
onTargetChange: function BFSO_onSaveComplete(unused, aTarget) {
|
|
if (aOnTargetChangeFn) {
|
|
aOnTargetChangeFn(aTarget);
|
|
}
|
|
},
|
|
onSaveComplete: function BFSO_onSaveComplete(unused, aStatus) {
|
|
if (Components.isSuccessCode(aStatus)) {
|
|
deferred.resolve();
|
|
} else {
|
|
deferred.reject(new Components.Exception("Saver failed.", aStatus));
|
|
}
|
|
},
|
|
};
|
|
return deferred.promise;
|
|
}
|
|
|
|
/**
|
|
* Feeds a string to a BackgroundFileSaverOutputStream.
|
|
*
|
|
* @param aSourceString
|
|
* The source data to copy.
|
|
* @param aSaverOutputStream
|
|
* The BackgroundFileSaverOutputStream to feed.
|
|
* @param aCloseWhenDone
|
|
* If true, the output stream will be closed when the copy finishes.
|
|
*
|
|
* @return {Promise}
|
|
* @resolves When the copy completes with a success code.
|
|
* @rejects With an exception, if the copy fails.
|
|
*/
|
|
function promiseCopyToSaver(aSourceString, aSaverOutputStream, aCloseWhenDone) {
|
|
let deferred = Promise.defer();
|
|
let inputStream = new StringInputStream(aSourceString, aSourceString.length);
|
|
let copier = Cc["@mozilla.org/network/async-stream-copier;1"]
|
|
.createInstance(Ci.nsIAsyncStreamCopier);
|
|
copier.init(inputStream, aSaverOutputStream, null, false, true, 0x8000, true,
|
|
aCloseWhenDone);
|
|
copier.asyncCopy({
|
|
onStartRequest() { },
|
|
onStopRequest(aRequest, aContext, aStatusCode) {
|
|
if (Components.isSuccessCode(aStatusCode)) {
|
|
deferred.resolve();
|
|
} else {
|
|
deferred.reject(new Components.Exception(aStatusCode));
|
|
}
|
|
},
|
|
}, null);
|
|
return deferred.promise;
|
|
}
|
|
|
|
// Registers a table for which to serve update chunks.
|
|
function registerTableUpdate(aTable, aFilename) {
|
|
// If we haven't been given an update for this table yet, add it to the map
|
|
if (!(aTable in gTables)) {
|
|
gTables[aTable] = [];
|
|
}
|
|
|
|
// The number of chunks associated with this table.
|
|
let numChunks = gTables[aTable].length + 1;
|
|
let redirectPath = "/" + aTable + "-" + numChunks;
|
|
let redirectUrl = "localhost:4444" + redirectPath;
|
|
|
|
// Store redirect url for that table so we can return it later when we
|
|
// process an update request.
|
|
gTables[aTable].push(redirectUrl);
|
|
|
|
gHttpServer.registerPathHandler(redirectPath, function(request, response) {
|
|
do_print("Mock safebrowsing server handling request for " + redirectPath);
|
|
let contents = readFileToString(aFilename);
|
|
do_print("Length of " + aFilename + ": " + contents.length);
|
|
response.setHeader("Content-Type",
|
|
"application/vnd.google.safebrowsing-update", false);
|
|
response.setStatusLine(request.httpVersion, 200, "OK");
|
|
response.bodyOutputStream.write(contents, contents.length);
|
|
});
|
|
}
|
|
|
|
// Tests
|
|
|
|
function run_test() {
|
|
run_next_test();
|
|
}
|
|
|
|
add_task(function* test_setup() {
|
|
// Wait 10 minutes, that is half of the external xpcshell timeout.
|
|
do_timeout(10 * 60 * 1000, function() {
|
|
if (gStillRunning) {
|
|
do_throw("Test timed out.");
|
|
}
|
|
});
|
|
// Set up a local HTTP server to return bad verdicts.
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/download");
|
|
// Ensure safebrowsing is enabled for this test, even if the app
|
|
// doesn't have it enabled.
|
|
Services.prefs.setBoolPref("browser.safebrowsing.malware.enabled", true);
|
|
Services.prefs.setBoolPref("browser.safebrowsing.downloads.enabled", true);
|
|
// Set block and allow tables explicitly, since the allowlist is normally
|
|
// disabled on comm-central.
|
|
Services.prefs.setCharPref("urlclassifier.downloadBlockTable",
|
|
"goog-badbinurl-shavar");
|
|
Services.prefs.setCharPref("urlclassifier.downloadAllowTable",
|
|
"goog-downloadwhite-digest256");
|
|
// SendRemoteQueryInternal needs locale preference.
|
|
let locale = Services.prefs.getCharPref("general.useragent.locale");
|
|
Services.prefs.setCharPref("general.useragent.locale", "en-US");
|
|
|
|
do_register_cleanup(function() {
|
|
Services.prefs.clearUserPref("browser.safebrowsing.malware.enabled");
|
|
Services.prefs.clearUserPref("browser.safebrowsing.downloads.enabled");
|
|
Services.prefs.clearUserPref("urlclassifier.downloadBlockTable");
|
|
Services.prefs.clearUserPref("urlclassifier.downloadAllowTable");
|
|
Services.prefs.setCharPref("general.useragent.locale", locale);
|
|
});
|
|
|
|
gHttpServer = new HttpServer();
|
|
gHttpServer.registerDirectory("/", do_get_cwd());
|
|
|
|
function createVerdict(aShouldBlock) {
|
|
// We can't programmatically create a protocol buffer here, so just
|
|
// hardcode some already serialized ones.
|
|
let blob = String.fromCharCode(parseInt(0x08, 16));
|
|
if (aShouldBlock) {
|
|
// A safe_browsing::ClientDownloadRequest with a DANGEROUS verdict
|
|
blob += String.fromCharCode(parseInt(0x01, 16));
|
|
} else {
|
|
// A safe_browsing::ClientDownloadRequest with a SAFE verdict
|
|
blob += String.fromCharCode(parseInt(0x00, 16));
|
|
}
|
|
return blob;
|
|
}
|
|
|
|
gHttpServer.registerPathHandler("/throw", function(request, response) {
|
|
do_throw("We shouldn't be getting here");
|
|
});
|
|
|
|
gHttpServer.registerPathHandler("/download", function(request, response) {
|
|
do_print("Querying remote server for verdict");
|
|
response.setHeader("Content-Type", "application/octet-stream", false);
|
|
let buf = NetUtil.readInputStreamToString(
|
|
request.bodyInputStream,
|
|
request.bodyInputStream.available());
|
|
do_print("Request length: " + buf.length);
|
|
// A garbage response. By default this produces NS_CANNOT_CONVERT_DATA as
|
|
// the callback status.
|
|
let blob = "this is not a serialized protocol buffer (the length doesn't match our hard-coded values)";
|
|
// We can't actually parse the protocol buffer here, so just switch on the
|
|
// length instead of inspecting the contents.
|
|
if (buf.length == 67) {
|
|
// evil.com
|
|
blob = createVerdict(true);
|
|
} else if (buf.length == 73) {
|
|
// mozilla.com
|
|
blob = createVerdict(false);
|
|
}
|
|
response.bodyOutputStream.write(blob, blob.length);
|
|
});
|
|
|
|
gHttpServer.start(4444);
|
|
|
|
do_register_cleanup(function() {
|
|
return Task.spawn(function* () {
|
|
yield new Promise(resolve => {
|
|
gHttpServer.stop(resolve);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
// Construct a response with redirect urls.
|
|
function processUpdateRequest() {
|
|
let response = "n:1000\n";
|
|
for (let table in gTables) {
|
|
response += "i:" + table + "\n";
|
|
for (let i = 0; i < gTables[table].length; ++i) {
|
|
response += "u:" + gTables[table][i] + "\n";
|
|
}
|
|
}
|
|
do_print("Returning update response: " + response);
|
|
return response;
|
|
}
|
|
|
|
// Set up the local whitelist.
|
|
function waitForUpdates() {
|
|
let deferred = Promise.defer();
|
|
gHttpServer.registerPathHandler("/downloads", function(request, response) {
|
|
let blob = processUpdateRequest();
|
|
response.setHeader("Content-Type",
|
|
"application/vnd.google.safebrowsing-update", false);
|
|
response.setStatusLine(request.httpVersion, 200, "OK");
|
|
response.bodyOutputStream.write(blob, blob.length);
|
|
});
|
|
|
|
let streamUpdater = Cc["@mozilla.org/url-classifier/streamupdater;1"]
|
|
.getService(Ci.nsIUrlClassifierStreamUpdater);
|
|
|
|
// Load up some update chunks for the safebrowsing server to serve. This
|
|
// particular chunk contains the hash of whitelisted.com/ and
|
|
// sb-ssl.google.com/safebrowsing/csd/certificate/.
|
|
registerTableUpdate("goog-downloadwhite-digest256", "data/digest.chunk");
|
|
|
|
// Resolve the promise once processing the updates is complete.
|
|
function updateSuccess(aEvent) {
|
|
// Timeout of n:1000 is constructed in processUpdateRequest above and
|
|
// passed back in the callback in nsIUrlClassifierStreamUpdater on success.
|
|
do_check_eq("1000", aEvent);
|
|
do_print("All data processed");
|
|
deferred.resolve(true);
|
|
}
|
|
// Just throw if we ever get an update or download error.
|
|
function handleError(aEvent) {
|
|
do_throw("We didn't download or update correctly: " + aEvent);
|
|
deferred.reject();
|
|
}
|
|
streamUpdater.downloadUpdates(
|
|
"goog-downloadwhite-digest256",
|
|
"goog-downloadwhite-digest256;\n",
|
|
true,
|
|
"http://localhost:4444/downloads",
|
|
updateSuccess, handleError, handleError);
|
|
return deferred.promise;
|
|
}
|
|
|
|
function promiseQueryReputation(query, expectedShouldBlock) {
|
|
let deferred = Promise.defer();
|
|
function onComplete(aShouldBlock, aStatus) {
|
|
do_check_eq(Cr.NS_OK, aStatus);
|
|
do_check_eq(aShouldBlock, expectedShouldBlock);
|
|
deferred.resolve(true);
|
|
}
|
|
gAppRep.queryReputation(query, onComplete);
|
|
return deferred.promise;
|
|
}
|
|
|
|
add_task(function* () {
|
|
// Wait for Safebrowsing local list updates to complete.
|
|
yield waitForUpdates();
|
|
});
|
|
|
|
add_task(function* test_signature_whitelists() {
|
|
// We should never get to the remote server.
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
true);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/throw");
|
|
|
|
// Use BackgroundFileSaver to extract the signature on Windows.
|
|
let destFile = getTempFile(TEST_FILE_NAME_1);
|
|
|
|
let data = readFileToString("data/signed_win.exe");
|
|
let saver = new BackgroundFileSaverOutputStream();
|
|
let completionPromise = promiseSaverComplete(saver);
|
|
saver.enableSignatureInfo();
|
|
saver.setTarget(destFile, false);
|
|
yield promiseCopyToSaver(data, saver, true);
|
|
|
|
saver.finish(Cr.NS_OK);
|
|
yield completionPromise;
|
|
|
|
// Clean up.
|
|
destFile.remove(false);
|
|
|
|
// evil.com is not on the allowlist, but this binary is signed by an entity
|
|
// whose certificate information is on the allowlist.
|
|
yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
|
|
signatureInfo: saver.signatureInfo,
|
|
fileSize: 12}, false);
|
|
});
|
|
|
|
add_task(function* test_blocked_binary() {
|
|
// We should reach the remote server for a verdict.
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
true);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/download");
|
|
// evil.com should return a malware verdict from the remote server.
|
|
yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
|
|
suggestedFileName: "noop.bat",
|
|
fileSize: 12}, true);
|
|
});
|
|
|
|
add_task(function* test_non_binary() {
|
|
// We should not reach the remote server for a verdict for non-binary files.
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
true);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/throw");
|
|
yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
|
|
suggestedFileName: "noop.txt",
|
|
fileSize: 12}, false);
|
|
});
|
|
|
|
add_task(function* test_good_binary() {
|
|
// We should reach the remote server for a verdict.
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
true);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/download");
|
|
// mozilla.com should return a not-guilty verdict from the remote server.
|
|
yield promiseQueryReputation({sourceURI: createURI("http://mozilla.com"),
|
|
suggestedFileName: "noop.bat",
|
|
fileSize: 12}, false);
|
|
});
|
|
|
|
add_task(function* test_disabled() {
|
|
// Explicitly disable remote checks
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
false);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/throw");
|
|
let query = {sourceURI: createURI("http://example.com"),
|
|
suggestedFileName: "noop.bat",
|
|
fileSize: 12};
|
|
let deferred = Promise.defer();
|
|
gAppRep.queryReputation(query,
|
|
function onComplete(aShouldBlock, aStatus) {
|
|
// We should be getting NS_ERROR_NOT_AVAILABLE if the service is disabled
|
|
do_check_eq(Cr.NS_ERROR_NOT_AVAILABLE, aStatus);
|
|
do_check_false(aShouldBlock);
|
|
deferred.resolve(true);
|
|
}
|
|
);
|
|
yield deferred.promise;
|
|
});
|
|
|
|
add_task(function* test_disabled_through_lists() {
|
|
Services.prefs.setBoolPref(remoteEnabledPref,
|
|
false);
|
|
Services.prefs.setCharPref(appRepURLPref,
|
|
"http://localhost:4444/download");
|
|
Services.prefs.setCharPref("urlclassifier.downloadBlockTable", "");
|
|
let query = {sourceURI: createURI("http://example.com"),
|
|
suggestedFileName: "noop.bat",
|
|
fileSize: 12};
|
|
let deferred = Promise.defer();
|
|
gAppRep.queryReputation(query,
|
|
function onComplete(aShouldBlock, aStatus) {
|
|
// We should be getting NS_ERROR_NOT_AVAILABLE if the service is disabled
|
|
do_check_eq(Cr.NS_ERROR_NOT_AVAILABLE, aStatus);
|
|
do_check_false(aShouldBlock);
|
|
deferred.resolve(true);
|
|
}
|
|
);
|
|
yield deferred.promise;
|
|
});
|
|
add_task(function* test_teardown() {
|
|
gStillRunning = false;
|
|
});
|