Fri, 16 Jan 2015 18:13:44 +0100
Integrate suggestion from review to improve consistency with existing code.
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=2 et sw=2 tw=80: */
3 /* Any copyright is dedicated to the Public Domain.
4 * http://creativecommons.org/publicdomain/zero/1.0/ */
6 /**
7 * This file tests signature extraction using Windows Authenticode APIs of
8 * downloaded files.
9 */
11 ////////////////////////////////////////////////////////////////////////////////
12 //// Globals
14 Cu.import("resource://gre/modules/XPCOMUtils.jsm");
16 XPCOMUtils.defineLazyModuleGetter(this, "FileUtils",
17 "resource://gre/modules/FileUtils.jsm");
18 XPCOMUtils.defineLazyModuleGetter(this, "NetUtil",
19 "resource://gre/modules/NetUtil.jsm");
20 XPCOMUtils.defineLazyModuleGetter(this, "Promise",
21 "resource://gre/modules/Promise.jsm");
22 XPCOMUtils.defineLazyModuleGetter(this, "Task",
23 "resource://gre/modules/Task.jsm");
25 const BackgroundFileSaverOutputStream = Components.Constructor(
26 "@mozilla.org/network/background-file-saver;1?mode=outputstream",
27 "nsIBackgroundFileSaver");
29 const StringInputStream = Components.Constructor(
30 "@mozilla.org/io/string-input-stream;1",
31 "nsIStringInputStream",
32 "setData");
34 const TEST_FILE_NAME_1 = "test-backgroundfilesaver-1.txt";
36 const gAppRep = Cc["@mozilla.org/downloads/application-reputation-service;1"].
37 getService(Ci.nsIApplicationReputationService);
38 let gStillRunning = true;
39 let gTables = {};
40 let gHttpServer = null;
42 /**
43 * Returns a reference to a temporary file. If the file is then created, it
44 * will be removed when tests in this file finish.
45 */
46 function getTempFile(aLeafName) {
47 let file = FileUtils.getFile("TmpD", [aLeafName]);
48 do_register_cleanup(function GTF_cleanup() {
49 if (file.exists()) {
50 file.remove(false);
51 }
52 });
53 return file;
54 }
56 function readFileToString(aFilename) {
57 let f = do_get_file(aFilename);
58 let stream = Cc["@mozilla.org/network/file-input-stream;1"]
59 .createInstance(Ci.nsIFileInputStream);
60 stream.init(f, -1, 0, 0);
61 let buf = NetUtil.readInputStreamToString(stream, stream.available());
62 return buf;
63 }
65 /**
66 * Waits for the given saver object to complete.
67 *
68 * @param aSaver
69 * The saver, with the output stream or a stream listener implementation.
70 * @param aOnTargetChangeFn
71 * Optional callback invoked with the target file name when it changes.
72 *
73 * @return {Promise}
74 * @resolves When onSaveComplete is called with a success code.
75 * @rejects With an exception, if onSaveComplete is called with a failure code.
76 */
77 function promiseSaverComplete(aSaver, aOnTargetChangeFn) {
78 let deferred = Promise.defer();
79 aSaver.observer = {
80 onTargetChange: function BFSO_onSaveComplete(aSaver, aTarget)
81 {
82 if (aOnTargetChangeFn) {
83 aOnTargetChangeFn(aTarget);
84 }
85 },
86 onSaveComplete: function BFSO_onSaveComplete(aSaver, aStatus)
87 {
88 if (Components.isSuccessCode(aStatus)) {
89 deferred.resolve();
90 } else {
91 deferred.reject(new Components.Exception("Saver failed.", aStatus));
92 }
93 },
94 };
95 return deferred.promise;
96 }
98 /**
99 * Feeds a string to a BackgroundFileSaverOutputStream.
100 *
101 * @param aSourceString
102 * The source data to copy.
103 * @param aSaverOutputStream
104 * The BackgroundFileSaverOutputStream to feed.
105 * @param aCloseWhenDone
106 * If true, the output stream will be closed when the copy finishes.
107 *
108 * @return {Promise}
109 * @resolves When the copy completes with a success code.
110 * @rejects With an exception, if the copy fails.
111 */
112 function promiseCopyToSaver(aSourceString, aSaverOutputStream, aCloseWhenDone) {
113 let deferred = Promise.defer();
114 let inputStream = new StringInputStream(aSourceString, aSourceString.length);
115 let copier = Cc["@mozilla.org/network/async-stream-copier;1"]
116 .createInstance(Ci.nsIAsyncStreamCopier);
117 copier.init(inputStream, aSaverOutputStream, null, false, true, 0x8000, true,
118 aCloseWhenDone);
119 copier.asyncCopy({
120 onStartRequest: function () { },
121 onStopRequest: function (aRequest, aContext, aStatusCode)
122 {
123 if (Components.isSuccessCode(aStatusCode)) {
124 deferred.resolve();
125 } else {
126 deferred.reject(new Components.Exception(aResult));
127 }
128 },
129 }, null);
130 return deferred.promise;
131 }
133 // Registers a table for which to serve update chunks.
134 function registerTableUpdate(aTable, aFilename) {
135 // If we haven't been given an update for this table yet, add it to the map
136 if (!(aTable in gTables)) {
137 gTables[aTable] = [];
138 }
140 // The number of chunks associated with this table.
141 let numChunks = gTables[aTable].length + 1;
142 let redirectPath = "/" + aTable + "-" + numChunks;
143 let redirectUrl = "localhost:4444" + redirectPath;
145 // Store redirect url for that table so we can return it later when we
146 // process an update request.
147 gTables[aTable].push(redirectUrl);
149 gHttpServer.registerPathHandler(redirectPath, function(request, response) {
150 do_print("Mock safebrowsing server handling request for " + redirectPath);
151 let contents = readFileToString(aFilename);
152 do_print("Length of " + aFilename + ": " + contents.length);
153 response.setHeader("Content-Type",
154 "application/vnd.google.safebrowsing-update", false);
155 response.setStatusLine(request.httpVersion, 200, "OK");
156 response.bodyOutputStream.write(contents, contents.length);
157 });
158 }
160 ////////////////////////////////////////////////////////////////////////////////
161 //// Tests
163 function run_test()
164 {
165 run_next_test();
166 }
168 add_task(function test_setup()
169 {
170 // Wait 10 minutes, that is half of the external xpcshell timeout.
171 do_timeout(10 * 60 * 1000, function() {
172 if (gStillRunning) {
173 do_throw("Test timed out.");
174 }
175 });
176 // Set up a local HTTP server to return bad verdicts.
177 Services.prefs.setCharPref("browser.safebrowsing.appRepURL",
178 "http://localhost:4444/download");
179 // Ensure safebrowsing is enabled for this test, even if the app
180 // doesn't have it enabled.
181 Services.prefs.setBoolPref("browser.safebrowsing.malware.enabled", true);
182 do_register_cleanup(function() {
183 Services.prefs.clearUserPref("browser.safebrowsing.malware.enabled");
184 });
186 gHttpServer = new HttpServer();
187 gHttpServer.registerDirectory("/", do_get_cwd());
189 function createVerdict(aShouldBlock) {
190 // We can't programmatically create a protocol buffer here, so just
191 // hardcode some already serialized ones.
192 blob = String.fromCharCode(parseInt(0x08, 16));
193 if (aShouldBlock) {
194 // A safe_browsing::ClientDownloadRequest with a DANGEROUS verdict
195 blob += String.fromCharCode(parseInt(0x01, 16));
196 } else {
197 // A safe_browsing::ClientDownloadRequest with a SAFE verdict
198 blob += String.fromCharCode(parseInt(0x00, 16));
199 }
200 return blob;
201 }
203 gHttpServer.registerPathHandler("/throw", function(request, response) {
204 do_throw("We shouldn't be getting here");
205 });
207 gHttpServer.registerPathHandler("/download", function(request, response) {
208 do_print("Querying remote server for verdict");
209 response.setHeader("Content-Type", "application/octet-stream", false);
210 let buf = NetUtil.readInputStreamToString(
211 request.bodyInputStream,
212 request.bodyInputStream.available());
213 do_print("Request length: " + buf.length);
214 // A garbage response. By default this produces NS_CANNOT_CONVERT_DATA as
215 // the callback status.
216 let blob = "this is not a serialized protocol buffer";
217 // We can't actually parse the protocol buffer here, so just switch on the
218 // length instead of inspecting the contents.
219 if (buf.length == 45) {
220 // evil.com
221 blob = createVerdict(true);
222 } else if (buf.length == 48) {
223 // mozilla.com
224 blob = createVerdict(false);
225 }
226 response.bodyOutputStream.write(blob, blob.length);
227 });
229 gHttpServer.start(4444);
230 });
232 // Construct a response with redirect urls.
233 function processUpdateRequest() {
234 let response = "n:1000\n";
235 for (let table in gTables) {
236 response += "i:" + table + "\n";
237 for (let i = 0; i < gTables[table].length; ++i) {
238 response += "u:" + gTables[table][i] + "\n";
239 }
240 }
241 do_print("Returning update response: " + response);
242 return response;
243 }
245 // Set up the local whitelist.
246 function waitForUpdates() {
247 let deferred = Promise.defer();
248 gHttpServer.registerPathHandler("/downloads", function(request, response) {
249 let buf = NetUtil.readInputStreamToString(request.bodyInputStream,
250 request.bodyInputStream.available());
251 let blob = processUpdateRequest();
252 response.setHeader("Content-Type",
253 "application/vnd.google.safebrowsing-update", false);
254 response.setStatusLine(request.httpVersion, 200, "OK");
255 response.bodyOutputStream.write(blob, blob.length);
256 });
258 let streamUpdater = Cc["@mozilla.org/url-classifier/streamupdater;1"]
259 .getService(Ci.nsIUrlClassifierStreamUpdater);
260 streamUpdater.updateUrl = "http://localhost:4444/downloads";
262 // Load up some update chunks for the safebrowsing server to serve. This
263 // particular chunk contains the hash of whitelisted.com/ and
264 // sb-ssl.google.com/safebrowsing/csd/certificate/.
265 registerTableUpdate("goog-downloadwhite-digest256", "data/digest.chunk");
267 // Resolve the promise once processing the updates is complete.
268 function updateSuccess(aEvent) {
269 // Timeout of n:1000 is constructed in processUpdateRequest above and
270 // passed back in the callback in nsIUrlClassifierStreamUpdater on success.
271 do_check_eq("1000", aEvent);
272 do_print("All data processed");
273 deferred.resolve(true);
274 }
275 // Just throw if we ever get an update or download error.
276 function handleError(aEvent) {
277 do_throw("We didn't download or update correctly: " + aEvent);
278 deferred.reject();
279 }
280 streamUpdater.downloadUpdates(
281 "goog-downloadwhite-digest256",
282 "goog-downloadwhite-digest256;\n",
283 updateSuccess, handleError, handleError);
284 return deferred.promise;
285 }
287 function promiseQueryReputation(query, expectedShouldBlock) {
288 let deferred = Promise.defer();
289 function onComplete(aShouldBlock, aStatus) {
290 do_check_eq(Cr.NS_OK, aStatus);
291 do_check_eq(aShouldBlock, expectedShouldBlock);
292 deferred.resolve(true);
293 }
294 gAppRep.queryReputation(query, onComplete);
295 return deferred.promise;
296 }
298 add_task(function()
299 {
300 // Wait for Safebrowsing local list updates to complete.
301 yield waitForUpdates();
302 });
304 add_task(function test_signature_whitelists()
305 {
306 // We should never get to the remote server.
307 Services.prefs.setCharPref("browser.safebrowsing.appRepURL",
308 "http://localhost:4444/throw");
310 // Use BackgroundFileSaver to extract the signature on Windows.
311 let destFile = getTempFile(TEST_FILE_NAME_1);
313 let data = readFileToString("data/signed_win.exe");
314 let saver = new BackgroundFileSaverOutputStream();
315 let completionPromise = promiseSaverComplete(saver);
316 saver.enableSignatureInfo();
317 saver.setTarget(destFile, false);
318 yield promiseCopyToSaver(data, saver, true);
320 saver.finish(Cr.NS_OK);
321 yield completionPromise;
323 // Clean up.
324 destFile.remove(false);
326 // evil.com is not on the allowlist, but this binary is signed by an entity
327 // whose certificate information is on the allowlist.
328 yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
329 signatureInfo: saver.signatureInfo,
330 fileSize: 12}, false);
331 });
333 add_task(function test_blocked_binary()
334 {
335 // We should reach the remote server for a verdict.
336 Services.prefs.setCharPref("browser.safebrowsing.appRepURL",
337 "http://localhost:4444/download");
338 // evil.com should return a malware verdict from the remote server.
339 yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
340 suggestedFileName: "noop.bat",
341 fileSize: 12}, true);
342 });
344 add_task(function test_non_binary()
345 {
346 // We should not reach the remote server for a verdict for non-binary files.
347 Services.prefs.setCharPref("browser.safebrowsing.appRepURL",
348 "http://localhost:4444/throw");
349 yield promiseQueryReputation({sourceURI: createURI("http://evil.com"),
350 suggestedFileName: "noop.txt",
351 fileSize: 12}, false);
352 });
354 add_task(function test_good_binary()
355 {
356 // We should reach the remote server for a verdict.
357 Services.prefs.setCharPref("browser.safebrowsing.appRepURL",
358 "http://localhost:4444/download");
359 // mozilla.com should return a not-guilty verdict from the remote server.
360 yield promiseQueryReputation({sourceURI: createURI("http://mozilla.com"),
361 suggestedFileName: "noop.bat",
362 fileSize: 12}, false);
363 });
365 add_task(function test_teardown()
366 {
367 gStillRunning = false;
368 });