blob: 6c8b6325572eac1f4724dafe81ad33437a24e0b9 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_win.h"
#include <stddef.h>
#include <memory>
#include <utility>
#include "base/files/file_path.h"
#include "base/files/file_util.h"
#include "base/logging.h"
#include "base/path_service.h"
#include "base/stl_util.h"
#include "chrome/browser/safe_browsing/incident_reporting/binary_integrity_incident.h"
#include "chrome/browser/safe_browsing/incident_reporting/incident_receiver.h"
#include "chrome/common/chrome_version.h"
#include "chrome/common/safe_browsing/binary_feature_extractor.h"
#include "components/safe_browsing/proto/csd.pb.h"
namespace safe_browsing {
std::vector<base::FilePath> GetCriticalBinariesPath() {
static const base::FilePath::CharType* const kUnversionedFiles[] = {
FILE_PATH_LITERAL("chrome.exe"),
};
static const base::FilePath::CharType* const kVersionedFiles[] = {
FILE_PATH_LITERAL("chrome.dll"),
FILE_PATH_LITERAL("chrome_child.dll"),
FILE_PATH_LITERAL("chrome_elf.dll"),
};
// Find where chrome.exe is installed.
base::FilePath chrome_exe_dir;
if (!base::PathService::Get(base::DIR_EXE, &chrome_exe_dir))
NOTREACHED();
std::vector<base::FilePath> critical_binaries;
critical_binaries.reserve(base::size(kUnversionedFiles) +
base::size(kVersionedFiles));
for (size_t i = 0; i < base::size(kUnversionedFiles); ++i) {
critical_binaries.push_back(chrome_exe_dir.Append(kUnversionedFiles[i]));
}
base::FilePath version_dir(
chrome_exe_dir.AppendASCII(CHROME_VERSION_STRING));
for (size_t i = 0; i < base::size(kVersionedFiles); ++i) {
critical_binaries.push_back(version_dir.Append(kVersionedFiles[i]));
}
return critical_binaries;
}
void VerifyBinaryIntegrity(
std::unique_ptr<IncidentReceiver> incident_receiver) {
scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor(
new BinaryFeatureExtractor());
std::vector<base::FilePath> critical_binaries = GetCriticalBinariesPath();
for (size_t i = 0; i < critical_binaries.size(); ++i) {
base::FilePath binary_path(critical_binaries[i]);
if (!base::PathExists(binary_path))
continue;
std::unique_ptr<ClientDownloadRequest_SignatureInfo> signature_info(
new ClientDownloadRequest_SignatureInfo());
base::TimeTicks time_before = base::TimeTicks::Now();
binary_feature_extractor->CheckSignature(binary_path, signature_info.get());
RecordSignatureVerificationTime(i, base::TimeTicks::Now() - time_before);
// Only create a report if the signature is untrusted.
if (!signature_info->trusted()) {
std::unique_ptr<ClientIncidentReport_IncidentData_BinaryIntegrityIncident>
incident(
new ClientIncidentReport_IncidentData_BinaryIntegrityIncident());
incident->set_file_basename(binary_path.BaseName().AsUTF8Unsafe());
incident->set_allocated_signature(signature_info.release());
// Send the report.
incident_receiver->AddIncidentForProcess(
std::make_unique<BinaryIntegrityIncident>(std::move(incident)));
} else {
// The binary is integral, remove previous report so that next incidents
// for the binary will be reported.
ClearBinaryIntegrityForFile(incident_receiver.get(),
binary_path.BaseName().AsUTF8Unsafe());
}
}
}
} // namespace safe_browsing