/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "nsCertOverrideService.h" #include "NSSCertDBTrustDomain.h" #include "ScopedNSSTypes.h" #include "SharedSSLState.h" #include "mozilla/Assertions.h" #include "mozilla/ScopeExit.h" #include "mozilla/TaskQueue.h" #include "mozilla/Telemetry.h" #include "mozilla/TextUtils.h" #include "mozilla/Tokenizer.h" #include "mozilla/Unused.h" #include "mozilla/dom/ToJSValue.h" #include "nsAppDirectoryServiceDefs.h" #include "nsCRT.h" #include "nsILineInputStream.h" #ifdef ENABLE_WEBDRIVER # include "nsIMarionette.h" #endif #include "nsIObserver.h" #include "nsIObserverService.h" #include "nsIOutputStream.h" #ifdef ENABLE_WEBDRIVER # include "nsIRemoteAgent.h" #endif #include "nsISafeOutputStream.h" #include "nsIX509Cert.h" #include "nsNSSCertificate.h" #include "nsNSSComponent.h" #include "nsNetUtil.h" #include "nsStreamUtils.h" #include "nsStringBuffer.h" #include "nsThreadUtils.h" using namespace mozilla; using namespace mozilla::psm; #define CERT_OVERRIDE_FILE_NAME "cert_override.txt" class WriterRunnable : public Runnable { public: WriterRunnable(nsCertOverrideService* aService, nsCString& aData, nsCOMPtr aFile) : Runnable("nsCertOverrideService::WriterRunnable"), mCertOverrideService(aService), mData(aData), mFile(std::move(aFile)) {} NS_IMETHOD Run() override { mCertOverrideService->AssertOnTaskQueue(); nsresult rv; auto removeShutdownBlockerOnExit = MakeScopeExit([certOverrideService = mCertOverrideService]() { NS_DispatchToMainThread(NS_NewRunnableFunction( "nsCertOverrideService::RemoveShutdownBlocker", [certOverrideService] { certOverrideService->RemoveShutdownBlocker(); })); }); nsCOMPtr outputStream; rv = NS_NewSafeLocalFileOutputStream( getter_AddRefs(outputStream), mFile, PR_CREATE_FILE | PR_TRUNCATE | PR_WRONLY); NS_ENSURE_SUCCESS(rv, rv); const char* ptr = mData.get(); uint32_t remaining = mData.Length(); uint32_t written = 0; while (remaining > 0) { rv = outputStream->Write(ptr, remaining, &written); NS_ENSURE_SUCCESS(rv, rv); remaining -= written; ptr += written; } nsCOMPtr safeStream = do_QueryInterface(outputStream); MOZ_ASSERT(safeStream); rv = safeStream->Finish(); NS_ENSURE_SUCCESS(rv, rv); return NS_OK; } private: const RefPtr mCertOverrideService; nsCString mData; const nsCOMPtr mFile; }; NS_IMPL_ISUPPORTS(nsCertOverride, nsICertOverride) NS_IMETHODIMP nsCertOverride::GetAsciiHost(/*out*/ nsACString& aAsciiHost) { aAsciiHost = mAsciiHost; return NS_OK; } NS_IMETHODIMP nsCertOverride::GetFingerprint(/*out*/ nsACString& aFingerprint) { aFingerprint = mFingerprint; return NS_OK; } NS_IMETHODIMP nsCertOverride::GetPort(/*out*/ int32_t* aPort) { *aPort = mPort; return NS_OK; } NS_IMETHODIMP nsCertOverride::GetHostPort(/*out*/ nsACString& aHostPort) { nsCertOverrideService::GetHostWithPort(mAsciiHost, mPort, aHostPort); return NS_OK; } NS_IMETHODIMP nsCertOverride::GetOriginAttributes( JSContext* aCtx, /*out*/ JS::MutableHandle aValue) { if (ToJSValue(aCtx, mOriginAttributes, aValue)) { return NS_OK; } return NS_ERROR_FAILURE; } NS_IMPL_ISUPPORTS(nsCertOverrideService, nsICertOverrideService, nsIObserver, nsISupportsWeakReference, nsIAsyncShutdownBlocker) nsCertOverrideService::nsCertOverrideService() : mMutex("nsCertOverrideService.mutex"), mDisableAllSecurityCheck(false), mPendingWriteCount(0) { nsCOMPtr target = do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID); MOZ_ASSERT(target); mWriterTaskQueue = TaskQueue::Create(target.forget(), "CertOverrideService"); } nsCertOverrideService::~nsCertOverrideService() = default; static nsCOMPtr GetShutdownBarrier() { MOZ_ASSERT(NS_IsMainThread()); nsCOMPtr svc = mozilla::services::GetAsyncShutdownService(); MOZ_RELEASE_ASSERT(svc); nsCOMPtr barrier; nsresult rv = svc->GetProfileBeforeChange(getter_AddRefs(barrier)); MOZ_RELEASE_ASSERT(NS_SUCCEEDED(rv)); MOZ_RELEASE_ASSERT(barrier); return barrier; } nsresult nsCertOverrideService::Init() { if (!NS_IsMainThread()) { MOZ_ASSERT_UNREACHABLE("nsCertOverrideService initialized off main thread"); return NS_ERROR_NOT_SAME_THREAD; } nsCOMPtr observerService = mozilla::services::GetObserverService(); // If we cannot add ourselves as a profile change observer, then we will not // attempt to read/write any settings file. Otherwise, we would end up // reading/writing the wrong settings file after a profile change. if (observerService) { observerService->AddObserver(this, "profile-do-change", true); // simulate a profile change so we read the current profile's settings file Observe(nullptr, "profile-do-change", nullptr); } SharedSSLState::NoteCertOverrideServiceInstantiated(); return NS_OK; } NS_IMETHODIMP nsCertOverrideService::Observe(nsISupports*, const char* aTopic, const char16_t* aData) { if (!nsCRT::strcmp(aTopic, "profile-do-change")) { // The profile has already changed. // Now read from the new profile location. // we also need to update the cached file location MutexAutoLock lock(mMutex); nsresult rv = NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR, getter_AddRefs(mSettingsFile)); if (NS_SUCCEEDED(rv)) { mSettingsFile->AppendNative(nsLiteralCString(CERT_OVERRIDE_FILE_NAME)); } else { mSettingsFile = nullptr; } Read(lock); CountPermanentOverrideTelemetry(lock); } return NS_OK; } void nsCertOverrideService::RemoveAllTemporaryOverrides() { MutexAutoLock lock(mMutex); bool removedAny = false; for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) { nsCertOverrideEntry* entry = iter.Get(); if (entry->mSettings->mIsTemporary) { iter.Remove(); removedAny = true; } } if (removedAny) { nsCOMPtr os = mozilla::services::GetObserverService(); if (os) { os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr); } } // no need to write, as temporaries are never written to disk } static const char sSHA256OIDString[] = "OID.2.16.840.1.101.3.4.2.1"; nsresult nsCertOverrideService::Read(const MutexAutoLock& aProofOfLock) { mMutex.AssertCurrentThreadOwns(); // If we don't have a profile, then we won't try to read any settings file. if (!mSettingsFile) return NS_OK; nsresult rv; nsCOMPtr fileInputStream; rv = NS_NewLocalFileInputStream(getter_AddRefs(fileInputStream), mSettingsFile); if (NS_FAILED(rv)) { return rv; } nsCOMPtr lineInputStream = do_QueryInterface(fileInputStream, &rv); if (NS_FAILED(rv)) { return rv; } nsAutoCString buffer; bool isMore = true; // Each line is of the form: // host:port:originAttributes \t sSHA256OIDString \t fingerprint \t // There may be some "bits" identifiers and "dbKey" after the `fingerprint` // field in 'fingerprint \t \t dbKey' format, but these are now ignored. // Lines that don't match this form are silently dropped. while (isMore && NS_SUCCEEDED(lineInputStream->ReadLine(buffer, &isMore))) { if (buffer.IsEmpty() || buffer.First() == '#') { continue; } Tokenizer parser(buffer); nsDependentCSubstring host; if (parser.CheckChar('[')) { // this is a IPv6 address if (!parser.ReadUntil(Tokenizer::Token::Char(']'), host) || host.Length() == 0 || !parser.CheckChar(':')) { continue; } } else if (!parser.ReadUntil(Tokenizer::Token::Char(':'), host) || host.Length() == 0) { continue; } int32_t port = -1; if (!parser.ReadInteger(&port)) { continue; } OriginAttributes attributes; if (parser.CheckChar(':')) { nsDependentCSubstring attributesString; if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), attributesString) || !attributes.PopulateFromSuffix(attributesString)) { continue; } } else if (!parser.CheckWhite()) { continue; } nsDependentCSubstring algorithm; if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), algorithm) || algorithm != sSHA256OIDString) { continue; } nsDependentCSubstring fingerprint; if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), fingerprint) || fingerprint.Length() == 0) { continue; } AddEntryToList(host, port, attributes, false, // not temporary fingerprint, aProofOfLock); } return NS_OK; } nsresult nsCertOverrideService::Write(const MutexAutoLock& aProofOfLock) { mMutex.AssertCurrentThreadOwns(); MOZ_ASSERT(NS_IsMainThread()); if (!NS_IsMainThread()) { return NS_ERROR_NOT_SAME_THREAD; } // If we don't have any profile, then we won't try to write any file if (!mSettingsFile) { return NS_OK; } nsCString output; static const char kHeader[] = "# PSM Certificate Override Settings file" NS_LINEBREAK "# This is a generated file! Do not edit." NS_LINEBREAK; /* see ::Read for file format */ output.Append(kHeader); static const char kTab[] = "\t"; for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) { nsCertOverrideEntry* entry = iter.Get(); RefPtr settings = entry->mSettings; if (settings->mIsTemporary) { continue; } output.Append(entry->mKeyString); output.Append(kTab); output.Append(sSHA256OIDString); output.Append(kTab); output.Append(settings->mFingerprint); output.Append(kTab); // the "bits" string used to go here, but it no longer exists // the "\t dbKey" string used to go here, but it no longer exists output.Append(NS_LINEBREAK); } // Make a clone of the file to pass to the WriterRunnable. nsCOMPtr file; nsresult rv; rv = mSettingsFile->Clone(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr runnable = new WriterRunnable(this, output, file); rv = mWriterTaskQueue->Dispatch(runnable.forget()); if (NS_FAILED(rv)) { return rv; } mPendingWriteCount++; if (mPendingWriteCount == 1) { rv = GetShutdownBarrier()->AddBlocker( this, NS_LITERAL_STRING_FROM_CSTRING(__FILE__), __LINE__, u"nsCertOverrideService writing data"_ns); NS_ENSURE_SUCCESS(rv, rv); } return NS_OK; } nsresult GetCertSha256Fingerprint(nsIX509Cert* aCert, nsCString& aResult) { nsAutoString fpStrUTF16; nsresult rv = aCert->GetSha256Fingerprint(fpStrUTF16); if (NS_FAILED(rv)) { return rv; } aResult.Assign(NS_ConvertUTF16toUTF8(fpStrUTF16)); return NS_OK; } NS_IMETHODIMP nsCertOverrideService::RememberValidityOverride( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes, nsIX509Cert* aCert, bool aTemporary) { if (aHostName.IsEmpty() || !IsAscii(aHostName) || !aCert) { return NS_ERROR_INVALID_ARG; } if (aPort < -1) { return NS_ERROR_INVALID_ARG; } if (!NS_IsMainThread()) { return NS_ERROR_NOT_SAME_THREAD; } UniqueCERTCertificate nsscert(aCert->GetCert()); if (!nsscert) { return NS_ERROR_FAILURE; } nsAutoCString fpStr; nsresult rv = GetCertSha256Fingerprint(aCert, fpStr); if (NS_FAILED(rv)) { return rv; } { MutexAutoLock lock(mMutex); AddEntryToList(aHostName, aPort, aOriginAttributes, aTemporary, fpStr, lock); if (!aTemporary) { Write(lock); } } return NS_OK; } NS_IMETHODIMP nsCertOverrideService::RememberValidityOverrideScriptable( const nsACString& aHostName, int32_t aPort, JS::Handle aOriginAttributes, nsIX509Cert* aCert, bool aTemporary, JSContext* aCx) { OriginAttributes attrs; if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) { return NS_ERROR_INVALID_ARG; } return RememberValidityOverride(aHostName, aPort, attrs, aCert, aTemporary); } NS_IMETHODIMP nsCertOverrideService::HasMatchingOverride( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes, nsIX509Cert* aCert, bool* aIsTemporary, bool* aRetval) { bool disableAllSecurityCheck = false; { MutexAutoLock lock(mMutex); disableAllSecurityCheck = mDisableAllSecurityCheck; } if (disableAllSecurityCheck) { *aIsTemporary = false; *aRetval = true; return NS_OK; } if (aHostName.IsEmpty() || !IsAscii(aHostName)) { return NS_ERROR_INVALID_ARG; } if (aPort < -1) return NS_ERROR_INVALID_ARG; NS_ENSURE_ARG_POINTER(aCert); NS_ENSURE_ARG_POINTER(aIsTemporary); NS_ENSURE_ARG_POINTER(aRetval); *aRetval = false; RefPtr settings( GetOverrideFor(aHostName, aPort, aOriginAttributes)); // If there is no corresponding override and the given OriginAttributes isn't // the default, try to look up an override using the default OriginAttributes. if (!settings && aOriginAttributes != OriginAttributes()) { settings = GetOverrideFor(aHostName, aPort, OriginAttributes()); } if (!settings) { return NS_OK; } *aIsTemporary = settings->mIsTemporary; nsAutoCString fpStr; nsresult rv = GetCertSha256Fingerprint(aCert, fpStr); if (NS_FAILED(rv)) { return rv; } *aRetval = settings->mFingerprint.Equals(fpStr); return NS_OK; } already_AddRefed nsCertOverrideService::GetOverrideFor( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes) { nsAutoCString keyString; GetKeyString(aHostName, aPort, aOriginAttributes, keyString); MutexAutoLock lock(mMutex); nsCertOverrideEntry* entry = mSettingsTable.GetEntry(keyString.get()); if (!entry) { return nullptr; } return do_AddRef(entry->mSettings); } NS_IMETHODIMP nsCertOverrideService::HasMatchingOverrideScriptable( const nsACString& aHostName, int32_t aPort, JS::Handle aOriginAttributes, nsIX509Cert* aCert, bool* aIsTemporary, JSContext* aCx, bool* aRetval) { OriginAttributes attrs; if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) { return NS_ERROR_INVALID_ARG; } return HasMatchingOverride(aHostName, aPort, attrs, aCert, aIsTemporary, aRetval); } nsresult nsCertOverrideService::AddEntryToList( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes, const bool aIsTemporary, const nsACString& fingerprint, const MutexAutoLock& aProofOfLock) { mMutex.AssertCurrentThreadOwns(); nsAutoCString keyString; GetKeyString(aHostName, aPort, aOriginAttributes, keyString); nsCertOverrideEntry* entry = mSettingsTable.PutEntry(keyString.get()); if (!entry) { NS_ERROR("can't insert a null entry!"); return NS_ERROR_OUT_OF_MEMORY; } entry->mKeyString = keyString; RefPtr settings(new nsCertOverride()); settings->mAsciiHost = aHostName; settings->mPort = aPort; settings->mOriginAttributes = aOriginAttributes; settings->mIsTemporary = aIsTemporary; settings->mFingerprint = fingerprint; entry->mSettings = settings; return NS_OK; } NS_IMETHODIMP nsCertOverrideService::ClearValidityOverride( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes) { if (aHostName.IsEmpty() || !IsAscii(aHostName)) { return NS_ERROR_INVALID_ARG; } if (!NS_IsMainThread()) { return NS_ERROR_NOT_SAME_THREAD; } if (aPort == 0 && aHostName.EqualsLiteral("all:temporary-certificates")) { RemoveAllTemporaryOverrides(); return NS_OK; } nsAutoCString keyString; GetKeyString(aHostName, aPort, aOriginAttributes, keyString); { MutexAutoLock lock(mMutex); mSettingsTable.RemoveEntry(keyString.get()); Write(lock); } nsCOMPtr nss(do_GetService(PSM_COMPONENT_CONTRACTID)); if (nss) { nss->ClearSSLExternalAndInternalSessionCache(); } else { return NS_ERROR_NOT_AVAILABLE; } nsCOMPtr os = mozilla::services::GetObserverService(); if (os) { os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr); } return NS_OK; } NS_IMETHODIMP nsCertOverrideService::ClearValidityOverrideScriptable( const nsACString& aHostName, int32_t aPort, JS::Handle aOriginAttributes, JSContext* aCx) { OriginAttributes attrs; if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) { return NS_ERROR_INVALID_ARG; } return ClearValidityOverride(aHostName, aPort, attrs); } NS_IMETHODIMP nsCertOverrideService::ClearAllOverrides() { if (!NS_IsMainThread()) { return NS_ERROR_NOT_SAME_THREAD; } { MutexAutoLock lock(mMutex); mSettingsTable.Clear(); Write(lock); } nsCOMPtr nss(do_GetService(PSM_COMPONENT_CONTRACTID)); if (nss) { nss->ClearSSLExternalAndInternalSessionCache(); } else { return NS_ERROR_NOT_AVAILABLE; } nsCOMPtr os = mozilla::services::GetObserverService(); if (os) { os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr); } return NS_OK; } void nsCertOverrideService::CountPermanentOverrideTelemetry( const MutexAutoLock& aProofOfLock) { mMutex.AssertCurrentThreadOwns(); uint32_t overrideCount = 0; for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) { if (!iter.Get()->mSettings->mIsTemporary) { overrideCount++; } } Telemetry::Accumulate(Telemetry::SSL_PERMANENT_CERT_ERROR_OVERRIDES, overrideCount); } static bool IsDebugger() { #ifdef ENABLE_WEBDRIVER nsCOMPtr marionette = do_GetService(NS_MARIONETTE_CONTRACTID); if (marionette) { bool marionetteRunning = false; marionette->GetRunning(&marionetteRunning); if (marionetteRunning) { return true; } } nsCOMPtr agent = do_GetService(NS_REMOTEAGENT_CONTRACTID); if (agent) { bool remoteAgentRunning = false; agent->GetRunning(&remoteAgentRunning); if (remoteAgentRunning) { return true; } } #endif return false; } NS_IMETHODIMP nsCertOverrideService:: SetDisableAllSecurityChecksAndLetAttackersInterceptMyData(bool aDisable) { if (!(PR_GetEnv("XPCSHELL_TEST_PROFILE_DIR") || IsDebugger())) { return NS_ERROR_NOT_AVAILABLE; } { MutexAutoLock lock(mMutex); mDisableAllSecurityCheck = aDisable; } nsCOMPtr nss(do_GetService(PSM_COMPONENT_CONTRACTID)); if (nss) { nss->ClearSSLExternalAndInternalSessionCache(); } else { return NS_ERROR_NOT_AVAILABLE; } return NS_OK; } NS_IMETHODIMP nsCertOverrideService::GetSecurityCheckDisabled(bool* aDisabled) { MutexAutoLock lock(mMutex); *aDisabled = mDisableAllSecurityCheck; return NS_OK; } NS_IMETHODIMP nsCertOverrideService::GetOverrides( /*out*/ nsTArray>& retval) { MutexAutoLock lock(mMutex); for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) { const RefPtr settings = iter.Get()->mSettings; retval.AppendElement(settings); } return NS_OK; } void nsCertOverrideService::GetHostWithPort(const nsACString& aHostName, int32_t aPort, nsACString& aRetval) { nsAutoCString hostPort; if (aHostName.Contains(':')) { // if aHostName is an IPv6 address, add brackets to match the internal // representation, which always stores IPv6 addresses with brackets hostPort.Append('['); hostPort.Append(aHostName); hostPort.Append(']'); } else { hostPort.Append(aHostName); } if (aPort == -1) { aPort = 443; } if (!hostPort.IsEmpty()) { hostPort.Append(':'); hostPort.AppendInt(aPort); } aRetval.Assign(hostPort); } void nsCertOverrideService::GetKeyString( const nsACString& aHostName, int32_t aPort, const OriginAttributes& aOriginAttributes, nsACString& aRetval) { nsAutoCString keyString; GetHostWithPort(aHostName, aPort, keyString); keyString.Append(':'); OriginAttributes strippedAttributes(aOriginAttributes); strippedAttributes.StripAttributes( ~OriginAttributes::STRIP_PRIVATE_BROWSING_ID); nsAutoCString attributeSuffix; strippedAttributes.CreateSuffix(attributeSuffix); keyString.Append(attributeSuffix); aRetval.Assign(keyString); } // nsIAsyncShutdownBlocker implementation NS_IMETHODIMP nsCertOverrideService::GetName(nsAString& aName) { aName = u"nsCertOverrideService: shutdown"_ns; return NS_OK; } NS_IMETHODIMP nsCertOverrideService::GetState(nsIPropertyBag** aState) { if (!aState) { return NS_ERROR_INVALID_ARG; } *aState = nullptr; return NS_OK; } NS_IMETHODIMP nsCertOverrideService::BlockShutdown(nsIAsyncShutdownClient*) { return NS_OK; } void nsCertOverrideService::RemoveShutdownBlocker() { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(mPendingWriteCount > 0); mPendingWriteCount--; if (mPendingWriteCount == 0) { nsresult rv = GetShutdownBarrier()->RemoveBlocker(this); MOZ_RELEASE_ASSERT(NS_SUCCEEDED(rv)); } }