blob: d4d417bfd47bf9198397ccaf68ef5093888a29e6 [file] [log] [blame]
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/host/mojo_caller_security_checker.h"
#include <array>
#include <memory>
#include "base/containers/fixed_flat_set.h"
#include "base/files/file_path.h"
#include "base/logging.h"
#include "base/no_destructor.h"
#include "base/process/process_handle.h"
#include "base/strings/string_util.h"
#include "build/build_config.h"
#include "components/named_mojo_ipc_server/connection_info.h"
#include "remoting/host/base/process_util.h"
#if BUILDFLAG(IS_WIN)
#include "remoting/host/win/trust_util.h"
#endif
namespace remoting {
namespace {
constexpr auto kAllowedCallerProgramNames =
base::MakeFixedFlatSet<base::FilePath::StringPieceType>({
#if BUILDFLAG(IS_LINUX)
"remote-open-url", "remote-webauthn",
#elif BUILDFLAG(IS_WIN)
L"remote_open_url.exe", L"remote_webauthn.exe",
L"remote_security_key.exe",
#else
// MakeFixedFlatSet() requires at least one element.
"unsupported",
#endif
});
} // namespace
bool IsTrustedMojoEndpoint(
std::unique_ptr<named_mojo_ipc_server::ConnectionInfo> caller) {
static base::NoDestructor<base::FilePath> current_process_image_path(
GetProcessImagePath(base::GetCurrentProcId()));
base::FilePath caller_process_image_path = GetProcessImagePath(caller->pid);
if (caller_process_image_path.empty()) {
LOG(ERROR) << "Cannot resolve process image path for PID " << caller->pid;
return false;
}
if (caller_process_image_path == *current_process_image_path) {
// IPCs initiated from the same binary should be allowed.
return true;
}
if (caller_process_image_path.DirName() !=
current_process_image_path->DirName()) {
LOG(ERROR) << "Process image " << caller_process_image_path
<< " is not under " << current_process_image_path->DirName();
return false;
}
base::FilePath::StringType program_name =
caller_process_image_path.BaseName().value();
if (!kAllowedCallerProgramNames.contains(program_name)) {
#if BUILDFLAG(IS_LINUX) && !defined(NDEBUG)
// Linux binaries generated in out/Debug are underscore-separated. To make
// debugging easier, we just check the name again with underscores replaced
// with hyphens.
std::string program_name_hyphenated;
base::ReplaceChars(program_name, "_", "-", &program_name_hyphenated);
if (kAllowedCallerProgramNames.contains(program_name_hyphenated)) {
return true;
}
#endif // BUILDFLAG(IS_LINUX) && !defined(NDEBUG)
LOG(ERROR) << caller_process_image_path.BaseName()
<< " is not in the list of allowed caller programs.";
return false;
}
#if BUILDFLAG(IS_WIN)
return IsBinaryTrusted(caller_process_image_path);
#else
// Linux binaries are not code-signed, so we just return true.
return true;
#endif
}
} // namespace remoting