blob: 2b387b13e5e5f4bbca9e4ac79c5a8133bb81d2eb [file] [log] [blame]
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_SAFE_BROWSING_CONTENT_BROWSER_CLIENT_SIDE_DETECTION_HOST_H_
#define COMPONENTS_SAFE_BROWSING_CONTENT_BROWSER_CLIENT_SIDE_DETECTION_HOST_H_
#include <stddef.h>
#include <cstdint>
#include <map>
#include <memory>
#include <optional>
#include <string>
#include "base/containers/flat_map.h"
#include "base/gtest_prod_util.h"
#include "base/memory/raw_ptr.h"
#include "base/memory/ref_counted.h"
#include "base/time/time.h"
#include "components/keyed_service/core/keyed_service.h"
#include "components/permissions/permission_request_manager.h"
#include "components/safe_browsing/content/browser/async_check_tracker.h"
#include "components/safe_browsing/content/browser/base_ui_manager.h"
#include "components/safe_browsing/content/common/safe_browsing.mojom-shared.h"
#include "components/safe_browsing/content/common/safe_browsing.mojom.h"
#include "components/safe_browsing/core/browser/db/database_manager.h"
#include "components/safe_browsing/core/browser/safe_browsing_token_fetcher.h"
#include "components/safe_browsing/core/browser/verdict_cache_manager.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
#include "content/public/browser/global_routing_id.h"
#include "content/public/browser/navigation_entry.h"
#include "content/public/browser/web_contents_observer.h"
#include "mojo/public/cpp/base/proto_wrapper.h"
#include "mojo/public/cpp/bindings/associated_remote.h"
#include "mojo/public/cpp/bindings/remote.h"
#include "net/http/http_status_code.h"
#include "services/service_manager/public/cpp/binder_registry.h"
#include "url/gurl.h"
namespace base {
class TickClock;
}
namespace safe_browsing {
class ClientPhishingRequest;
class ClientSideDetectionService;
using HostInnerTextCallback = base::OnceCallback<void(std::string)>;
// This class is used to receive the IPC from the renderer which
// notifies the browser that a URL was classified as phishing. This
// class relays this information to the client-side detection service
// class which sends a ping to a server to validate the verdict.
class ClientSideDetectionHost
: public content::WebContentsObserver,
public permissions::PermissionRequestManager::Observer,
public AsyncCheckTracker::Observer {
public:
// These values are persisted to logs. Entries should not be renumbered and
// numeric values should never be reused.
enum class AsyncCheckTriggerForceRequestResult {
kTriggered = 0,
kSkippedTriggerModelsPingNotSkipped = 1, // DEPRECATED
kSkippedNotForced = 2,
kSkippedTriggerModelsPingSentAsForceRequest = 3,
kMaxValue = kSkippedTriggerModelsPingSentAsForceRequest,
};
// A callback via which the client of this component indicates whether the
// primary account is signed in.
using PrimaryAccountSignedIn = base::RepeatingCallback<bool()>;
// Delegate which allows to provide embedder specific implementations.
class Delegate {
public:
virtual ~Delegate() = default;
// Returns whether there is a SafeBrowsingUserInteractionObserver available.
virtual bool HasSafeBrowsingUserInteractionObserver() = 0;
// Returns the prefs service associated with the current embedders profile.
virtual PrefService* GetPrefs() = 0;
virtual scoped_refptr<SafeBrowsingDatabaseManager>
GetSafeBrowsingDBManager() = 0;
virtual scoped_refptr<BaseUIManager> GetSafeBrowsingUIManager() = 0;
virtual base::WeakPtr<ClientSideDetectionService>
GetClientSideDetectionService() = 0;
virtual void AddReferrerChain(ClientPhishingRequest* verdict,
GURL current_url,
const content::GlobalRenderFrameHostId&
current_outermost_main_frame_id) = 0;
virtual VerdictCacheManager* GetCacheManager() = 0;
// Returns the management status for current profile.
virtual ChromeUserPopulation GetUserPopulation() = 0;
// Returns the inner text from the tab, which is combined inner-text of all
// suitable iframes . The callback is used to retrieve a string back from
// the delegate when the inner text function is completed. This string is
// then used to provide the on-device model the information about the page.
virtual void GetInnerText(HostInnerTextCallback callback) = 0;
};
// Delegate for handling intelligent scanning using on-device models. This
// object is responsible for all interactions with the on-device model.
class IntelligentScanDelegate : public KeyedService {
public:
// Represents the result of an intelligent scan.
struct IntelligentScanResult {
std::string brand;
std::string intent;
int model_version;
bool execution_success;
};
using InquireOnDeviceModelDoneCallback =
base::OnceCallback<void(IntelligentScanResult)>;
~IntelligentScanDelegate() override = default;
// Determines if an intelligent scan should be requested based on the
// verdict.
virtual bool ShouldRequestIntelligentScan(
ClientPhishingRequest* verdict) = 0;
// Returns |on_device_model_available_| which indicates the availability of
// on-device model session creation. Also logs failed eligibility reason
// histograms if |log_failed_eligibility_reason| is true.
virtual bool IsOnDeviceModelAvailable(
bool log_failed_eligibility_reason) = 0;
// Gets the intelligent scan result from the on-device model. The callback
// will return an empty optional if the on-device model is not available.
// Note: The caller is responsible for calling ResetOnDeviceSession before
// calling this function again.
virtual void InquireOnDeviceModel(
std::string rendered_texts,
InquireOnDeviceModelDoneCallback callback) = 0;
// Resets the session that's created by the on-device model. Returns true if
// the session was reset. Does nothing and returns false if there is no
// session.
virtual bool ResetOnDeviceSession() = 0;
};
// The caller keeps ownership of the tab object and is responsible for
// ensuring that it stays valid until WebContentsDestroyed is called.
// The caller also keeps ownership of pref_service. The
// ClientSideDetectionHost takes ownership of token_fetcher. is_off_the_record
// indicates if the profile is incognito, and account_signed_in_callback is
// checked to find out if primary account is signed in.
static std::unique_ptr<ClientSideDetectionHost> Create(
content::WebContents* tab,
std::unique_ptr<Delegate> delegate,
IntelligentScanDelegate* intelligent_scan_delegate,
PrefService* pref_service,
std::unique_ptr<SafeBrowsingTokenFetcher> token_fetcher,
bool is_off_the_record,
const PrimaryAccountSignedIn& account_signed_in_callback);
ClientSideDetectionHost(const ClientSideDetectionHost&) = delete;
ClientSideDetectionHost& operator=(const ClientSideDetectionHost&) = delete;
~ClientSideDetectionHost() override;
// From content::WebContentsObserver. If we navigate away we cancel all
// pending callbacks that could show an interstitial, and check to see whether
// we should classify the new URL. If a request to lock the keyboard or
// pointer or vibrate the page has arrived, we will re-trigger classification.
// If a request to fullscreen the tab happens, check in preclassification
// check for allowlist matches for metric collection.
void DidFinishNavigation(
content::NavigationHandle* navigation_handle) override;
void PrimaryPageChanged(content::Page& page) override;
void KeyboardLockRequested() override;
void PointerLockRequested() override;
void VibrationRequested() override;
void DidToggleFullscreenModeForTab(bool entered_fullscreen,
bool will_cause_resize) override;
void OnTextCopiedToClipboard(content::RenderFrameHost* render_frame_host,
const std::u16string& copied_text) override;
// permissions::PermissionRequestManager::Observer methods:
void OnPromptAdded() override;
void OnPermissionRequestManagerDestructed() override;
void RegisterPermissionRequestManager();
// AsyncCheckTracker::Observer methods:
void OnAsyncSafeBrowsingCheckCompleted() override;
void OnAsyncSafeBrowsingCheckTrackerDestructed() override;
void RegisterAsyncCheckTracker();
protected:
explicit ClientSideDetectionHost(
content::WebContents* tab,
std::unique_ptr<Delegate> delegate,
IntelligentScanDelegate* intelligent_scan_delegate,
PrefService* pref_service,
std::unique_ptr<SafeBrowsingTokenFetcher> token_fetcher,
bool is_off_the_record,
const PrimaryAccountSignedIn& account_signed_in_callback);
// Used for testing.
void set_ui_manager(BaseUIManager* ui_manager);
void set_database_manager(SafeBrowsingDatabaseManager* database_manager);
private:
friend class ClientSideDetectionHostTestBase;
friend class ClientSideDetectionHostNotificationTest;
friend class ClientSideDetectionHostScamDetectionTest;
class ShouldClassifyUrlRequest;
friend class ShouldClassifyUrlRequest;
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostPrerenderBrowserTest,
PrerenderShouldNotAffectClientSideDetection);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostPrerenderBrowserTest,
ClassifyPrerenderedPageAfterActivation);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderBrowserTest,
ClassifyPrerenderedPageAfterActivationAndCheckDebuggingMetadataCache);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderBrowserTest,
CheckDebuggingMetadataCacheAfterClearingCacheAfterNavigation);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderExclusiveAccessBrowserTest,
KeyboardLockTriggersPreclassificationCheck);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderExclusiveAccessBrowserTest,
PointerLockTriggersPreClassificationCheck);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderExclusiveAccessBrowserTest,
PointerLockClassificationTriggersCSPPPing);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostPrerenderExclusiveAccessBrowserTest,
KeyboardLockClassificationTriggersCSPPPing);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
FullscreenApiCallChecksAllowlistInPreClassificationAndDoesNotProceedWithClassification);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
TwoFullscreenApiTriggersOnSamePageOnlyLogsOnePreclassificationCheck);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
TwoKeyboardLockRequestsOnSamePageOnlyLogsOnePreclassificationCheck);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostVibrateTest,
VibrationApiTriggersPreclassificationCheck);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostVibrateTest,
VibrationApiClassificationTriggersCSPPPing);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
TestPreClassificationCheckMatchHighConfidenceAllowlist);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
TestPreClassificationCheckDoesNotMatchHighConfidenceAllowlist);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionHostTest,
TestPreClassificationCheckDoesNotMatchHighConfidenceAllowlistDueToDisabledFeature);
FRIEND_TEST_ALL_PREFIXES(
ClientSideDetectionRTLookupResponseForceRequestTest,
AsyncCheckTrackerTriggersClassificationRequestOnAllowlistMatch);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostScamDetectionTest,
KeyboardLockRequestTriggersOnDeviceLLM);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostClipboardTest,
ClipboardApiTriggersPreclassificationCheck);
FRIEND_TEST_ALL_PREFIXES(ClientSideDetectionHostClipboardTest,
ClipboardApiClassificationTriggersCSPPPing);
// Helper function to create preclassification check once requirements are
// met.
void MaybeStartPreClassification(ClientSideDetectionType request_type);
// Called when pre-classification checks are done for the phishing
// classifiers. |request_type| is passed in to specify the process that
// requests the classification.
void OnPhishingPreClassificationDone(
ClientSideDetectionType request_type,
bool should_classify,
bool is_sample_ping,
std::optional<bool> did_match_high_confidence_allowlist);
// `verdict` is a wrapped ClientPhishingRequest protocol message, `result`
// is the outcome of the renderer classification. `request_type` is passed in
// to specify the process that requests the classification, which is passed
// along from OnPhishingPreClassificationDone().
void PhishingDetectionDone(
ClientSideDetectionType request_type,
bool is_sample_ping,
std::optional<bool> did_match_high_confidence_allowlist,
mojom::PhishingDetectorResult result,
std::optional<mojo_base::ProtoWrapper> verdict);
// `verdict` is the ClientPhishingRequest passed into PhishingDetectionDone().
void MaybeSendClientPhishingRequest(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist);
// |verdict| is an encoded ClientPhishingRequest protocol message, |result| is
// the outcome of the renderer image embedding. The verdict is passed into
// this function after the renderer classification is finished.
void PhishingImageEmbeddingDone(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist,
mojom::PhishingImageEmbeddingResult result,
std::optional<mojo_base::ProtoWrapper> image_feature_embedding);
// |verdict| is an encoded ClientPhishingRequest protocol message, which will
// contain on device model output if the execution is successful.
void MaybeInquireOnDeviceForScamDetection(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist);
// |verdict| is an encoded ClientPhishingRequest protocol message. This is the
// last step before sending the ping to the server.
void MaybeGetAccessToken(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist);
// Callback that is called when the server ping back is
// done. Display an interstitial if |is_phishing| is true.
// Otherwise, we do nothing. Called in UI thread. |is_from_cache| indicates
// whether the warning is being shown due to a cached verdict or from an
// actual server ping. |response_code| is cached so it can be included as
// debugging metadata in PhishGuard pings.
void MaybeShowPhishingWarning(
bool is_from_cache,
ClientSideDetectionType request_type,
std::optional<bool> did_match_high_confidence_allowlist,
GURL phishing_url,
bool is_phishing,
std::optional<net::HttpStatusCode> response_code,
std::optional<IntelligentScanVerdict> intelligent_scan_verdict);
// Whether request is forced for |current_url_|. This function also checks
// whether enhanced protection is enabled.
bool HasForceRequestFromRtUrlLookup();
// Used for testing. This function does not take ownership of the service
// class.
void set_client_side_detection_service(
base::WeakPtr<ClientSideDetectionService> service);
// Sets a test tick clock only for testing.
void set_tick_clock_for_testing(const base::TickClock* tick_clock) {
tick_clock_ = tick_clock;
}
// Sets the token fetcher only for testing.
void set_token_fetcher_for_testing(
std::unique_ptr<SafeBrowsingTokenFetcher> token_fetcher) {
token_fetcher_ = std::move(token_fetcher);
}
// Sets the incognito bit only for testing.
void set_is_off_the_record_for_testing(bool is_off_the_record) {
is_off_the_record_ = is_off_the_record;
}
// Sets the primary account signed in callback for testing.
void set_account_signed_in_for_testing(
const PrimaryAccountSignedIn& account_signed_in_callback) {
account_signed_in_callback_ = account_signed_in_callback;
}
void set_high_confidence_allowlist_acceptance_rate_for_testing(
float acceptance_rate);
void set_delegate_for_testing(std::unique_ptr<Delegate> delegate) {
delegate_ = std::move(delegate);
}
void set_intelligent_scan_delegate_for_testing(
IntelligentScanDelegate* intelligent_scan_delegate) {
intelligent_scan_delegate_ = intelligent_scan_delegate;
}
// Check if CSD can get an access Token. Should be enabled only for ESB
// users, who are signed in and not in incognito mode.
bool CanGetAccessToken();
// Send the client report to CSD server.
void SendRequest(std::unique_ptr<ClientPhishingRequest> verdict,
const std::string& access_token,
std::optional<bool> did_match_high_confidence_allowlist);
// Called when token_fetcher_ has fetched the token.
void OnGotAccessToken(std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist,
const std::string& access_token);
// Check if sample ping can be sent to Safe Browsing.
bool CanSendSamplePing();
// Callback function when GetInnerText is completed in the delegate. This
// inner text is fetched as part of querying the on-device model through the
// CSD service class.
void OnInnerTextComplete(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist,
std::string inner_text);
// Callback function when InquireOnDeviceModel from the intelligent scan
// delegate is completed.
void OnInquireOnDeviceModelDone(
std::unique_ptr<ClientPhishingRequest> verdict,
std::optional<bool> did_match_high_confidence_allowlist,
IntelligentScanDelegate::IntelligentScanResult response);
// Returns bool if for a |client_side_detection_Type|, the last URL is the
// same as the last committed URL on the RenderFrameHost.
bool HasDonePreclassificationCheckOnSameURL(
ClientSideDetectionType client_side_detection_type);
// This pointer may be nullptr if client-side phishing detection is
// disabled.
base::WeakPtr<ClientSideDetectionService> csd_service_;
// The WebContents that the class is observing.
raw_ptr<content::WebContents> tab_;
// These pointers may be nullptr if SafeBrowsing is disabled.
scoped_refptr<SafeBrowsingDatabaseManager> database_manager_;
scoped_refptr<BaseUIManager> ui_manager_;
// Keep a handle to the latest classification request so that we can cancel
// it if necessary.
std::unique_ptr<ShouldClassifyUrlRequest> classification_request_;
// The current URL
GURL current_url_;
// The current outermost main frame's id.
content::GlobalRenderFrameHostId current_outermost_main_frame_id_;
// The navigation ID that commits the current URL. Used to set UnsafeResource.
int64_t current_navigation_id_;
// The last URL that the fullscreen API was called. This is used because the
// DidToggleFullscreenModeForTab can be called for both entering and exiting
// fullscreen.
GURL last_fullscreen_url_;
// Records the start time of when phishing detection started.
base::TimeTicks phishing_detection_start_time_;
// Records the start time of when image embedding started.
base::TimeTicks image_embedding_start_time_;
raw_ptr<const base::TickClock> tick_clock_;
std::unique_ptr<Delegate> delegate_;
// A keyed service with profile lifetime.
raw_ptr<IntelligentScanDelegate> intelligent_scan_delegate_;
// Unowned object used for getting preference settings.
raw_ptr<PrefService> pref_service_;
// The token fetcher used for getting access token.
std::unique_ptr<SafeBrowsingTokenFetcher> token_fetcher_;
// A boolean indicates whether the associated profile associated is an
// incognito profile.
bool is_off_the_record_;
// Callback for checking if the user is signed in, before fetching
// acces_token.
PrimaryAccountSignedIn account_signed_in_callback_;
// The remote for the currently active phishing classification.
mojo::AssociatedRemote<mojom::PhishingDetector> phishing_detector_;
// The remote for the currently active phishing image embedder.
mojo::AssociatedRemote<mojom::PhishingImageEmbedderDetector>
phishing_image_embedder_;
base::ScopedObservation<permissions::PermissionRequestManager,
permissions::PermissionRequestManager::Observer>
permission_request_observation_{this};
// A boolean indicates whether TRIGGER_MODELS request is sent via
// FORCE_REQUEST. This is used to decide whether async check is allowed to
// trigger FORCE_REQUEST.
bool trigger_model_request_sent_as_force_request_ = false;
// Modified through tests only. Initial value is set to the const
// kProbabilityForAcceptingHCAllowlistTrigger.
float probability_for_accepting_hc_allowlist_trigger_;
// This map is used to track the last committed URL per
// ClientSideDetectionType. This is because for some ClientSideDetectionType,
// it can be triggered at a frequent basis per same URL.
base::flat_map<ClientSideDetectionType, GURL> last_committed_url_map_;
base::ScopedObservation<AsyncCheckTracker, AsyncCheckTracker::Observer>
async_check_observation_{this};
base::WeakPtrFactory<ClientSideDetectionHost> weak_factory_{this};
};
} // namespace safe_browsing
#endif // COMPONENTS_SAFE_BROWSING_CONTENT_BROWSER_CLIENT_SIDE_DETECTION_HOST_H_