blob: b0df303ce07fd6d75f906957081a7355f62e8d73 [file] [log] [blame]
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/certificate_transparency/chrome_require_ct_delegate.h"
#include <iterator>
#include "base/memory/ref_counted.h"
#include "base/run_loop.h"
#include "base/sequenced_task_runner.h"
#include "base/single_thread_task_runner.h"
#include "base/test/scoped_task_environment.h"
#include "base/test/test_message_loop.h"
#include "base/values.h"
#include "components/certificate_transparency/pref_names.h"
#include "components/prefs/pref_registry_simple.h"
#include "components/prefs/testing_pref_service.h"
#include "net/base/hash_value.h"
#include "net/cert/x509_certificate.h"
#include "net/cert/x509_util.h"
#include "net/test/cert_test_util.h"
#include "net/test/test_data_directory.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace certificate_transparency {
namespace {
class ChromeRequireCTDelegateTest : public ::testing::Test {
public:
void SetUp() override {
cert_ = net::CreateCertificateChainFromFile(
net::GetTestCertsDirectory(), "ok_cert.pem",
net::X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
ASSERT_TRUE(cert_);
hashes_.push_back(net::HashValue(
net::X509Certificate::CalculateFingerprint256(cert_->cert_buffer())));
}
protected:
base::test::ScopedTaskEnvironment task_environment_{
base::test::ScopedTaskEnvironment::MainThreadType::IO};
scoped_refptr<net::X509Certificate> cert_;
net::HashValueVector hashes_;
};
// Treat the preferences as a black box as far as naming, but ensure that
// preferences get registered.
TEST_F(ChromeRequireCTDelegateTest, RegistersPrefs) {
TestingPrefServiceSimple pref_service;
auto registered_prefs = std::distance(pref_service.registry()->begin(),
pref_service.registry()->end());
certificate_transparency::prefs::RegisterPrefs(pref_service.registry());
auto newly_registered_prefs = std::distance(pref_service.registry()->begin(),
pref_service.registry()->end());
EXPECT_NE(registered_prefs, newly_registered_prefs);
}
TEST_F(ChromeRequireCTDelegateTest, DelegateChecksRequired) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
// No required host set yet.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// Add a required host
delegate.UpdateCTPolicies({"google.com"}, {}, {}, {});
// The new setting should take effect.
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
}
TEST_F(ChromeRequireCTDelegateTest, DelegateChecksExcluded) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
// No setting should yield the default results.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// Add a excluded host
delegate.UpdateCTPolicies({}, {"google.com"}, {}, {});
// The new setting should take effect.
EXPECT_EQ(CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
}
TEST_F(ChromeRequireCTDelegateTest, IgnoresInvalidEntries) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
// No setting should yield the default results.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// Now setup invalid state (that is, that fail to be parsable as
// URLs).
delegate.UpdateCTPolicies(
{"file:///etc/fstab", "file://withahost/etc/fstab", "file:///c|/Windows",
"*", "https://*", "example.com", "https://example.test:invalid_port"},
{}, {}, {});
// Wildcards are ignored (both * and https://*).
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// File URL hosts are ignored.
// TODO(rsleevi): https://crbug.com/841407 - Ensure that file URLs have their
// hosts ignored for policy.
// EXPECT_EQ(CTRequirementLevel::DEFAULT,
// delegate.IsCTRequiredForHost("withahost", cert_.get(), hashes_));
// While the partially parsed hosts should take effect.
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("example.test", cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("example.com", cert_.get(), hashes_));
}
// Make sure the various 'undocumented' priorities apply:
// - non-wildcards beat wildcards
// - more specific hosts beat less specific hosts
// - requiring beats excluding
TEST_F(ChromeRequireCTDelegateTest, AppliesPriority) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
// No setting should yield the default results.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("example.com", cert_.get(), hashes_));
EXPECT_EQ(
CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("sub.example.com", cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("accounts.example.com", cert_.get(),
hashes_));
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("login.accounts.example.com",
cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("sub.accounts.example.com",
cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("login.sub.accounts.example.com",
cert_.get(), hashes_));
EXPECT_EQ(
CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("test.example.com", cert_.get(), hashes_));
// Set up policies that exclude it for a domain and all of its subdomains,
// but then require it for a specific host.
delegate.UpdateCTPolicies(
{"sub.example.com", "accounts.example.com", "test.example.com"},
{"example.com", ".sub.example.com", ".sub.accounts.example.com",
"test.example.com"},
{}, {});
EXPECT_EQ(CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("example.com", cert_.get(), hashes_));
// Non-wildcarding (.sub.example.com) beats wildcarding (sub.example.com).
EXPECT_EQ(
CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("sub.example.com", cert_.get(), hashes_));
// More specific hosts (accounts.example.com) beat less specific hosts
// (example.com + wildcard).
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("accounts.example.com", cert_.get(),
hashes_));
// More specific hosts (accounts.example.com) beat less specific hosts
// (example.com).
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("login.accounts.example.com",
cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("sub.accounts.example.com",
cert_.get(), hashes_));
EXPECT_EQ(CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("login.sub.accounts.example.com",
cert_.get(), hashes_));
// Requiring beats excluding.
EXPECT_EQ(
CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("test.example.com", cert_.get(), hashes_));
}
TEST_F(ChromeRequireCTDelegateTest, SupportsOrgRestrictions) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
base::FilePath test_directory = net::GetTestNetDataDirectory().Append(
FILE_PATH_LITERAL("ov_name_constraints"));
// As all the leaves and intermediates share SPKIs in their classes, load
// known-good answers for the remaining test config.
scoped_refptr<net::X509Certificate> tmp =
net::ImportCertFromFile(test_directory, "leaf-o1.pem");
ASSERT_TRUE(tmp);
net::HashValue leaf_spki;
ASSERT_TRUE(
net::x509_util::CalculateSha256SpkiHash(tmp->cert_buffer(), &leaf_spki));
tmp = net::ImportCertFromFile(test_directory, "int-o3.pem");
ASSERT_TRUE(tmp);
net::HashValue intermediate_spki;
ASSERT_TRUE(net::x509_util::CalculateSha256SpkiHash(tmp->cert_buffer(),
&intermediate_spki));
struct {
const char* const leaf_file;
const char* const intermediate_file;
const net::HashValue spki;
CTRequirementLevel expected;
} kTestCases[] = {
// Positive cases
//
// Exact match on the leaf SPKI (leaf has O)
{"leaf-o1.pem", nullptr, leaf_spki, CTRequirementLevel::NOT_REQUIRED},
// Exact match on the leaf SPKI (leaf does not have O)
{"leaf-no-o.pem", nullptr, leaf_spki, CTRequirementLevel::NOT_REQUIRED},
// Exact match on the leaf SPKI (leaf has O), even when the
// intermediate does not
{"leaf-o1.pem", "int-cn.pem", leaf_spki,
CTRequirementLevel::NOT_REQUIRED},
// Matches (multiple) organization values in two SEQUENCEs+SETs
{"leaf-o1-o2.pem", "int-o1-o2.pem", intermediate_spki,
CTRequirementLevel::NOT_REQUIRED},
// Matches (multiple) organization values in a single SEQUENCE+SET
{"leaf-o1-o2.pem", "int-o1-plus-o2.pem", intermediate_spki,
CTRequirementLevel::NOT_REQUIRED},
// Matches nameConstrained O
{"leaf-o1.pem", "nc-int-permit-o1.pem", intermediate_spki,
CTRequirementLevel::NOT_REQUIRED},
// Matches the second nameConstraint on the O, out of 3
{"leaf-o1.pem", "nc-int-permit-o2-o1-o3.pem", intermediate_spki,
CTRequirementLevel::NOT_REQUIRED},
// Leaf is in different string type than issuer (BMPString), but it is
// in the issuer O field, not the nameConstraint
// TODO(rsleevi): Make this fail, because it's not byte-for-byte
// identical
{"leaf-o1.pem", "int-bmp-o1.pem", intermediate_spki,
CTRequirementLevel::NOT_REQUIRED},
// Negative cases
// Leaf is missing O
{"leaf-no-o.pem", "int-o1-o2.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Leaf is missing O
{"leaf-no-o.pem", "int-cn.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Leaf doesn't match issuer O
{"leaf-o1.pem", "int-o3.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Multiple identical organization values, but in different orders.
{"leaf-o1-o2.pem", "int-o2-o1.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Intermediate is nameConstrained, with a dirName, but not an O
{"leaf-o1.pem", "nc-int-permit-cn.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Intermediate is nameConstrained, but with a dNSName
{"leaf-o1.pem", "nc-int-permit-dns.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Intermediate is nameConstrained, but with an excludedSubtrees that
// has a dirName that matches the O.
{"leaf-o1.pem", "nc-int-exclude-o1.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
// Intermediate is nameConstrained, but the encoding of the
// nameConstraint is different from the encoding of the leaf
{"leaf-o1.pem", "nc-int-permit-bmp-o1.pem", intermediate_spki,
CTRequirementLevel::DEFAULT},
};
for (const auto& test : kTestCases) {
SCOPED_TRACE(::testing::Message()
<< "leaf=" << test.leaf_file
<< ",intermediate=" << test.intermediate_file);
scoped_refptr<net::X509Certificate> leaf =
net::ImportCertFromFile(test_directory, test.leaf_file);
ASSERT_TRUE(leaf);
net::HashValueVector hashes;
net::HashValue leaf_hash;
ASSERT_TRUE(net::x509_util::CalculateSha256SpkiHash(leaf->cert_buffer(),
&leaf_hash));
hashes.push_back(std::move(leaf_hash));
// Append the intermediate to |leaf|, if any.
if (test.intermediate_file) {
scoped_refptr<net::X509Certificate> intermediate =
net::ImportCertFromFile(test_directory, test.intermediate_file);
ASSERT_TRUE(intermediate);
net::HashValue intermediate_hash;
ASSERT_TRUE(net::x509_util::CalculateSha256SpkiHash(
intermediate->cert_buffer(), &intermediate_hash));
hashes.push_back(std::move(intermediate_hash));
std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates;
intermediates.push_back(bssl::UpRef(intermediate->cert_buffer()));
leaf = net::X509Certificate::CreateFromBuffer(
bssl::UpRef(leaf->cert_buffer()), std::move(intermediates));
}
delegate.UpdateCTPolicies({}, {}, {}, {});
// There should be no existing settings.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", leaf.get(), hashes));
delegate.UpdateCTPolicies({}, {}, {test.spki.ToString()}, {});
// The new setting should take effect.
EXPECT_EQ(test.expected,
delegate.IsCTRequiredForHost("google.com", leaf.get(), hashes));
}
}
TEST_F(ChromeRequireCTDelegateTest, SupportsLegacyCaRestrictions) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
// The hash of a known legacy CA. See
// //net/cert/root_cert_list_generated.h
net::SHA256HashValue legacy_spki = {{
0x00, 0x6C, 0xB2, 0x26, 0xA7, 0x72, 0xC7, 0x18, 0x2D, 0x77, 0x72,
0x38, 0x3E, 0x37, 0x3F, 0x0F, 0x22, 0x9E, 0x7D, 0xFE, 0x34, 0x44,
0x81, 0x0A, 0x8D, 0x6E, 0x50, 0x90, 0x5D, 0x20, 0xD6, 0x61,
}};
hashes_.push_back(net::HashValue(legacy_spki));
// No setting should yield the default results.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// Setting to a non-legacy CA should not work.
std::string leaf_hash_string = hashes_.front().ToString();
delegate.UpdateCTPolicies({}, {}, {}, {leaf_hash_string});
// This setting should have no effect, because the hash for |cert_|
// is not a legacy CA hash.
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
// Now set to a truly legacy CA, and create a chain that
// contains that legacy CA hash.
delegate.UpdateCTPolicies({}, {}, {}, {hashes_.back().ToString()});
EXPECT_EQ(CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("google.com", cert_.get(), hashes_));
}
TEST_F(ChromeRequireCTDelegateTest, RequiresCTAfterApril2018) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
EXPECT_EQ(CTRequirementLevel::DEFAULT,
delegate.IsCTRequiredForHost("example.com", cert_.get(), hashes_));
scoped_refptr<net::X509Certificate> may_2018 =
net::CreateCertificateChainFromFile(
net::GetTestCertsDirectory(), "may_2018.pem",
net::X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
ASSERT_TRUE(may_2018);
net::HashValueVector new_hashes;
new_hashes.push_back(net::HashValue(
net::X509Certificate::CalculateFingerprint256(may_2018->cert_buffer())));
EXPECT_EQ(
CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("example.com", may_2018.get(), new_hashes));
}
TEST_F(ChromeRequireCTDelegateTest,
PoliciesCheckedBeforeRequiringCTAfterApril2018) {
using CTRequirementLevel =
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel;
ChromeRequireCTDelegate delegate;
scoped_refptr<net::X509Certificate> may_2018 =
net::CreateCertificateChainFromFile(
net::GetTestCertsDirectory(), "may_2018.pem",
net::X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
ASSERT_TRUE(may_2018);
net::HashValueVector new_hashes;
net::HashValue leaf_hash;
ASSERT_TRUE(net::x509_util::CalculateSha256SpkiHash(may_2018->cert_buffer(),
&leaf_hash));
new_hashes.push_back(std::move(leaf_hash));
EXPECT_EQ(
CTRequirementLevel::REQUIRED,
delegate.IsCTRequiredForHost("example.com", may_2018.get(), new_hashes));
// Check excluding by hostname.
delegate.UpdateCTPolicies({}, {"example.com"}, {}, {});
EXPECT_EQ(
CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("example.com", may_2018.get(), new_hashes));
// Check excluding by leaf hash.
delegate.UpdateCTPolicies({}, {}, {new_hashes.front().ToString()}, {});
EXPECT_EQ(
CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("example.com", may_2018.get(), new_hashes));
// Check excluding by legacy CA hash.
// The hash of a known legacy CA. See
// //net/cert/root_cert_list_generated.h
net::SHA256HashValue legacy_spki = {{
0x00, 0x6C, 0xB2, 0x26, 0xA7, 0x72, 0xC7, 0x18, 0x2D, 0x77, 0x72,
0x38, 0x3E, 0x37, 0x3F, 0x0F, 0x22, 0x9E, 0x7D, 0xFE, 0x34, 0x44,
0x81, 0x0A, 0x8D, 0x6E, 0x50, 0x90, 0x5D, 0x20, 0xD6, 0x61,
}};
new_hashes.push_back(net::HashValue(legacy_spki));
delegate.UpdateCTPolicies({}, {}, {}, {new_hashes.back().ToString()});
EXPECT_EQ(
CTRequirementLevel::NOT_REQUIRED,
delegate.IsCTRequiredForHost("example.com", may_2018.get(), new_hashes));
}
} // namespace
} // namespace certificate_transparency