/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */ /* vim: set ts=2 et sw=2 tw=80: */ /* Any copyright is dedicated to the Public Domain. * http://creativecommons.org/publicdomain/zero/1.0/ */ /** * This file tests signature extraction using Windows Authenticode APIs of * downloaded files. */ // Globals ChromeUtils.defineESModuleGetters(this, { FileTestUtils: "resource://testing-common/FileTestUtils.sys.mjs", NetUtil: "resource://gre/modules/NetUtil.sys.mjs", }); const BackgroundFileSaverOutputStream = Components.Constructor( "@mozilla.org/network/background-file-saver;1?mode=outputstream", "nsIBackgroundFileSaver" ); const StringInputStream = Components.Constructor( "@mozilla.org/io/string-input-stream;1", "nsIStringInputStream", "setData" ); const TEST_FILE_NAME_1 = "test-backgroundfilesaver-1.txt"; const gAppRep = Cc[ "@mozilla.org/reputationservice/application-reputation-service;1" ].getService(Ci.nsIApplicationReputationService); var gStillRunning = true; var gTables = {}; var gHttpServer = null; const appRepURLPref = "browser.safebrowsing.downloads.remote.url"; const remoteEnabledPref = "browser.safebrowsing.downloads.remote.enabled"; function readFileToString(aFilename) { let f = do_get_file(aFilename); let stream = Cc["@mozilla.org/network/file-input-stream;1"].createInstance( Ci.nsIFileInputStream ); stream.init(f, -1, 0, 0); let buf = NetUtil.readInputStreamToString(stream, stream.available()); return buf; } /** * Waits for the given saver object to complete. * * @param aSaver * The saver, with the output stream or a stream listener implementation. * @param aOnTargetChangeFn * Optional callback invoked with the target file name when it changes. * * @return {Promise} * @resolves When onSaveComplete is called with a success code. * @rejects With an exception, if onSaveComplete is called with a failure code. */ function promiseSaverComplete(aSaver, aOnTargetChangeFn) { return new Promise((resolve, reject) => { aSaver.observer = { onTargetChange: function BFSO_onSaveComplete(unused, aTarget) { if (aOnTargetChangeFn) { aOnTargetChangeFn(aTarget); } }, onSaveComplete: function BFSO_onSaveComplete(unused, aStatus) { if (Components.isSuccessCode(aStatus)) { resolve(); } else { reject(new Components.Exception("Saver failed.", aStatus)); } }, }; }); } /** * Feeds a string to a BackgroundFileSaverOutputStream. * * @param aSourceString * The source data to copy. * @param aSaverOutputStream * The BackgroundFileSaverOutputStream to feed. * @param aCloseWhenDone * If true, the output stream will be closed when the copy finishes. * * @return {Promise} * @resolves When the copy completes with a success code. * @rejects With an exception, if the copy fails. */ function promiseCopyToSaver(aSourceString, aSaverOutputStream, aCloseWhenDone) { return new Promise((resolve, reject) => { let inputStream = new StringInputStream( aSourceString, aSourceString.length ); let copier = Cc[ "@mozilla.org/network/async-stream-copier;1" ].createInstance(Ci.nsIAsyncStreamCopier); copier.init( inputStream, aSaverOutputStream, null, false, true, 0x8000, true, aCloseWhenDone ); copier.asyncCopy( { onStartRequest() {}, onStopRequest(aRequest, aContext, aStatusCode) { if (Components.isSuccessCode(aStatusCode)) { resolve(); } else { reject(new Components.Exception(aStatusCode)); } }, }, null ); }); } // Registers a table for which to serve update chunks. function registerTableUpdate(aTable, aFilename) { // If we haven't been given an update for this table yet, add it to the map if (!(aTable in gTables)) { gTables[aTable] = []; } // The number of chunks associated with this table. let numChunks = gTables[aTable].length + 1; let redirectPath = "/" + aTable + "-" + numChunks; let redirectUrl = "localhost:4444" + redirectPath; // Store redirect url for that table so we can return it later when we // process an update request. gTables[aTable].push(redirectUrl); gHttpServer.registerPathHandler(redirectPath, function (request, response) { info("Mock safebrowsing server handling request for " + redirectPath); let contents = readFileToString(aFilename); info("Length of " + aFilename + ": " + contents.length); response.setHeader( "Content-Type", "application/vnd.google.safebrowsing-update", false ); response.setStatusLine(request.httpVersion, 200, "OK"); response.bodyOutputStream.write(contents, contents.length); }); } // Tests add_task(async function test_setup() { // Wait 10 minutes, that is half of the external xpcshell timeout. do_timeout(10 * 60 * 1000, function () { if (gStillRunning) { do_throw("Test timed out."); } }); // Set up a local HTTP server to return bad verdicts. Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/download"); // Ensure safebrowsing is enabled for this test, even if the app // doesn't have it enabled. Services.prefs.setBoolPref("browser.safebrowsing.malware.enabled", true); Services.prefs.setBoolPref("browser.safebrowsing.downloads.enabled", true); // Set block and allow tables explicitly, since the allowlist is normally // disabled on comm-central. Services.prefs.setCharPref( "urlclassifier.downloadBlockTable", "goog-badbinurl-shavar" ); Services.prefs.setCharPref( "urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256" ); // SendRemoteQueryInternal needs locale preference. let originalReqLocales = Services.locale.requestedLocales; Services.locale.requestedLocales = ["en-US"]; registerCleanupFunction(function () { Services.prefs.clearUserPref("browser.safebrowsing.malware.enabled"); Services.prefs.clearUserPref("browser.safebrowsing.downloads.enabled"); Services.prefs.clearUserPref("urlclassifier.downloadBlockTable"); Services.prefs.clearUserPref("urlclassifier.downloadAllowTable"); Services.locale.requestedLocales = originalReqLocales; }); gHttpServer = new HttpServer(); gHttpServer.registerDirectory("/", do_get_cwd()); function createVerdict(aShouldBlock) { // We can't programmatically create a protocol buffer here, so just // hardcode some already serialized ones. let blob = String.fromCharCode(parseInt(0x08, 16)); if (aShouldBlock) { // A safe_browsing::ClientDownloadRequest with a DANGEROUS verdict blob += String.fromCharCode(parseInt(0x01, 16)); } else { // A safe_browsing::ClientDownloadRequest with a SAFE verdict blob += String.fromCharCode(parseInt(0x00, 16)); } return blob; } gHttpServer.registerPathHandler("/throw", function (request, response) { do_throw("We shouldn't be getting here"); }); gHttpServer.registerPathHandler("/download", function (request, response) { info("Querying remote server for verdict"); response.setHeader("Content-Type", "application/octet-stream", false); let buf = NetUtil.readInputStreamToString( request.bodyInputStream, request.bodyInputStream.available() ); info("Request length: " + buf.length); // A garbage response. By default this produces NS_CANNOT_CONVERT_DATA as // the callback status. let blob = "this is not a serialized protocol buffer (the length doesn't match our hard-coded values)"; // We can't actually parse the protocol buffer here, so just switch on the // length instead of inspecting the contents. if (buf.length == 67) { // evil.com blob = createVerdict(true); } else if (buf.length == 73) { // mozilla.com blob = createVerdict(false); } response.bodyOutputStream.write(blob, blob.length); }); gHttpServer.start(4444); registerCleanupFunction(function () { return (async function () { await new Promise(resolve => { gHttpServer.stop(resolve); }); })(); }); }); // Construct a response with redirect urls. function processUpdateRequest() { let response = "n:1000\n"; for (let table in gTables) { response += "i:" + table + "\n"; for (let i = 0; i < gTables[table].length; ++i) { response += "u:" + gTables[table][i] + "\n"; } } info("Returning update response: " + response); return response; } // Set up the local whitelist. function waitForUpdates() { return new Promise((resolve, reject) => { gHttpServer.registerPathHandler("/downloads", function (request, response) { let blob = processUpdateRequest(); response.setHeader( "Content-Type", "application/vnd.google.safebrowsing-update", false ); response.setStatusLine(request.httpVersion, 200, "OK"); response.bodyOutputStream.write(blob, blob.length); }); let streamUpdater = Cc[ "@mozilla.org/url-classifier/streamupdater;1" ].getService(Ci.nsIUrlClassifierStreamUpdater); // Load up some update chunks for the safebrowsing server to serve. This // particular chunk contains the hash of whitelisted.com/ and // sb-ssl.google.com/safebrowsing/csd/certificate/. registerTableUpdate("goog-downloadwhite-digest256", "data/digest.chunk"); // Resolve the promise once processing the updates is complete. function updateSuccess(aEvent) { // Timeout of n:1000 is constructed in processUpdateRequest above and // passed back in the callback in nsIUrlClassifierStreamUpdater on success. Assert.equal("1000", aEvent); info("All data processed"); resolve(true); } // Just throw if we ever get an update or download error. function handleError(aEvent) { do_throw("We didn't download or update correctly: " + aEvent); reject(); } streamUpdater.downloadUpdates( "goog-downloadwhite-digest256", "goog-downloadwhite-digest256;\n", true, "http://localhost:4444/downloads", updateSuccess, handleError, handleError ); }); } function promiseQueryReputation(query, expected) { return new Promise(resolve => { function onComplete(aShouldBlock, aStatus) { Assert.equal(Cr.NS_OK, aStatus); check_telemetry(expected); resolve(true); } gAppRep.queryReputation(query, onComplete); }); } add_task(async function () { // Wait for Safebrowsing local list updates to complete. await waitForUpdates(); }); add_task(async function test_signature_whitelists() { // We should never get to the remote server. Services.prefs.setBoolPref(remoteEnabledPref, true); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/throw"); let expected = get_telemetry_snapshot(); add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, NonBinaryFile, 1); // Use BackgroundFileSaver to extract the signature on Windows. let destFile = FileTestUtils.getTempFile(TEST_FILE_NAME_1); let data = readFileToString("data/signed_win.exe"); let saver = new BackgroundFileSaverOutputStream(); let completionPromise = promiseSaverComplete(saver); saver.enableSignatureInfo(); saver.setTarget(destFile, false); await promiseCopyToSaver(data, saver, true); saver.finish(Cr.NS_OK); await completionPromise; // Clean up. destFile.remove(false); // evil.com is not on the allowlist, but this binary is signed by an entity // whose certificate information is on the allowlist. await promiseQueryReputation( { sourceURI: createURI("http://evil.com"), signatureInfo: saver.signatureInfo, fileSize: 12, }, expected ); }); add_task(async function test_blocked_binary() { // We should reach the remote server for a verdict. Services.prefs.setBoolPref(remoteEnabledPref, true); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/download"); let expected = get_telemetry_snapshot(); expected.shouldBlock++; add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, VerdictDangerous, 1); // evil.com should return a malware verdict from the remote server. await promiseQueryReputation( { sourceURI: createURI("http://evil.com"), suggestedFileName: "noop.bat", fileSize: 12, signatureInfo: [], }, expected ); }); add_task(async function test_non_binary() { // We should not reach the remote server for a verdict for non-binary files. Services.prefs.setBoolPref(remoteEnabledPref, true); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/throw"); let expected = get_telemetry_snapshot(); add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, NonBinaryFile, 1); await promiseQueryReputation( { sourceURI: createURI("http://evil.com"), suggestedFileName: "noop.txt", fileSize: 12, signatureInfo: [], }, expected ); }); add_task(async function test_good_binary() { // We should reach the remote server for a verdict. Services.prefs.setBoolPref(remoteEnabledPref, true); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/download"); let expected = get_telemetry_snapshot(); add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, VerdictSafe, 1); // mozilla.com should return a not-guilty verdict from the remote server. await promiseQueryReputation( { sourceURI: createURI("http://mozilla.com"), suggestedFileName: "noop.bat", fileSize: 12, signatureInfo: [], }, expected ); }); add_task(async function test_disabled() { // Explicitly disable remote checks Services.prefs.setBoolPref(remoteEnabledPref, false); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/throw"); let expected = get_telemetry_snapshot(); add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, RemoteLookupDisabled, 1); let query = { sourceURI: createURI("http://example.com"), suggestedFileName: "noop.bat", signatureInfo: [], fileSize: 12, }; await new Promise(resolve => { gAppRep.queryReputation(query, function onComplete(aShouldBlock, aStatus) { // We should be getting NS_ERROR_NOT_AVAILABLE if the service is disabled Assert.equal(Cr.NS_ERROR_NOT_AVAILABLE, aStatus); Assert.ok(!aShouldBlock); check_telemetry(expected); resolve(true); }); }); }); add_task(async function test_disabled_through_lists() { Services.prefs.setBoolPref(remoteEnabledPref, false); Services.prefs.setCharPref(appRepURLPref, "http://localhost:4444/download"); Services.prefs.setCharPref("urlclassifier.downloadBlockTable", ""); let expected = get_telemetry_snapshot(); add_telemetry_count(expected.local, NO_LIST, 1); add_telemetry_count(expected.reason, RemoteLookupDisabled, 1); let query = { sourceURI: createURI("http://example.com"), suggestedFileName: "noop.bat", fileSize: 12, signatureInfo: [], }; await new Promise(resolve => { gAppRep.queryReputation(query, function onComplete(aShouldBlock, aStatus) { // We should be getting NS_ERROR_NOT_AVAILABLE if the service is disabled Assert.equal(Cr.NS_ERROR_NOT_AVAILABLE, aStatus); Assert.ok(!aShouldBlock); check_telemetry(expected); resolve(true); }); }); }); add_task(async function test_teardown() { gStillRunning = false; });