Home | History | Annotate | Download | only in cert
      1 // Copyright 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "net/cert/multi_log_ct_verifier.h"
      6 
      7 #include <string>
      8 
      9 #include "base/files/file_path.h"
     10 #include "base/files/file_util.h"
     11 #include "base/metrics/histogram.h"
     12 #include "base/metrics/histogram_samples.h"
     13 #include "base/metrics/statistics_recorder.h"
     14 #include "base/values.h"
     15 #include "net/base/capturing_net_log.h"
     16 #include "net/base/net_errors.h"
     17 #include "net/base/net_log.h"
     18 #include "net/base/test_data_directory.h"
     19 #include "net/cert/ct_log_verifier.h"
     20 #include "net/cert/ct_serialization.h"
     21 #include "net/cert/ct_verify_result.h"
     22 #include "net/cert/pem_tokenizer.h"
     23 #include "net/cert/sct_status_flags.h"
     24 #include "net/cert/signed_certificate_timestamp.h"
     25 #include "net/cert/x509_certificate.h"
     26 #include "net/test/cert_test_util.h"
     27 #include "net/test/ct_test_util.h"
     28 #include "testing/gtest/include/gtest/gtest.h"
     29 
     30 namespace net {
     31 
     32 namespace {
     33 
     34 const char kLogDescription[] = "somelog";
     35 const char kSCTCountHistogram[] =
     36     "Net.CertificateTransparency.SCTsPerConnection";
     37 
     38 class MultiLogCTVerifierTest : public ::testing::Test {
     39  public:
     40   virtual void SetUp() OVERRIDE {
     41     scoped_ptr<CTLogVerifier> log(
     42         CTLogVerifier::Create(ct::GetTestPublicKey(), kLogDescription));
     43     ASSERT_TRUE(log);
     44 
     45     verifier_.reset(new MultiLogCTVerifier());
     46     verifier_->AddLog(log.Pass());
     47     std::string der_test_cert(ct::GetDerEncodedX509Cert());
     48     chain_ = X509Certificate::CreateFromBytes(
     49         der_test_cert.data(),
     50         der_test_cert.length());
     51     ASSERT_TRUE(chain_.get());
     52 
     53     embedded_sct_chain_ =
     54         CreateCertificateChainFromFile(GetTestCertsDirectory(),
     55                                        "ct-test-embedded-cert.pem",
     56                                        X509Certificate::FORMAT_AUTO);
     57     ASSERT_TRUE(embedded_sct_chain_.get());
     58   }
     59 
     60   bool CheckForSingleVerifiedSCTInResult(const ct::CTVerifyResult& result) {
     61     return (result.verified_scts.size() == 1U) &&
     62         result.invalid_scts.empty() &&
     63         result.unknown_logs_scts.empty() &&
     64         result.verified_scts[0]->log_description == kLogDescription;
     65   }
     66 
     67   bool CheckForSCTOrigin(
     68       const ct::CTVerifyResult& result,
     69       ct::SignedCertificateTimestamp::Origin origin) {
     70     return (result.verified_scts.size() > 0) &&
     71         (result.verified_scts[0]->origin == origin);
     72   }
     73 
     74   bool CheckForEmbeddedSCTInNetLog(CapturingNetLog& net_log) {
     75     CapturingNetLog::CapturedEntryList entries;
     76     net_log.GetEntries(&entries);
     77     if (entries.size() != 2)
     78       return false;
     79 
     80     const CapturingNetLog::CapturedEntry& received = entries[0];
     81     std::string embedded_scts;
     82     if (!received.GetStringValue("embedded_scts", &embedded_scts))
     83       return false;
     84     if (embedded_scts.empty())
     85       return false;
     86 
     87     const CapturingNetLog::CapturedEntry& parsed = entries[1];
     88     base::ListValue* verified_scts;
     89     if (!parsed.GetListValue("verified_scts", &verified_scts) ||
     90         verified_scts->GetSize() != 1) {
     91       return false;
     92     }
     93 
     94     base::DictionaryValue* the_sct;
     95     if (!verified_scts->GetDictionary(0, &the_sct))
     96       return false;
     97 
     98     std::string origin;
     99     if (!the_sct->GetString("origin", &origin))
    100       return false;
    101     if (origin != "embedded_in_certificate")
    102       return false;
    103 
    104     base::ListValue* other_scts;
    105     if (!parsed.GetListValue("invalid_scts", &other_scts) ||
    106         !other_scts->empty()) {
    107       return false;
    108     }
    109 
    110     if (!parsed.GetListValue("unknown_logs_scts", &other_scts) ||
    111         !other_scts->empty()) {
    112       return false;
    113     }
    114 
    115     return true;
    116   }
    117 
    118   std::string GetSCTListWithInvalidSCT() {
    119     std::string sct(ct::GetTestSignedCertificateTimestamp());
    120 
    121     // Change a byte inside the Log ID part of the SCT so it does
    122     // not match the log used in the tests
    123     sct[15] = 't';
    124 
    125     std::string sct_list;
    126     ct::EncodeSCTListForTesting(sct, &sct_list);
    127     return sct_list;
    128   }
    129 
    130   bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain,
    131                                        const BoundNetLog& bound_net_log,
    132                                        ct::CTVerifyResult* result) {
    133     return verifier_->Verify(chain.get(),
    134                              std::string(),
    135                              std::string(),
    136                              result,
    137                              bound_net_log) == OK;
    138   }
    139 
    140   bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain) {
    141     ct::CTVerifyResult result;
    142     CapturingNetLog net_log;
    143     BoundNetLog bound_net_log =
    144         BoundNetLog::Make(&net_log, NetLog::SOURCE_CONNECT_JOB);
    145 
    146     return verifier_->Verify(chain.get(),
    147                              std::string(),
    148                              std::string(),
    149                              &result,
    150                              bound_net_log) == OK;
    151   }
    152 
    153   bool CheckPrecertificateVerification(scoped_refptr<X509Certificate> chain) {
    154     ct::CTVerifyResult result;
    155     CapturingNetLog net_log;
    156     BoundNetLog bound_net_log =
    157       BoundNetLog::Make(&net_log, NetLog::SOURCE_CONNECT_JOB);
    158     return (VerifySinglePrecertificateChain(chain, bound_net_log, &result) &&
    159             CheckForSingleVerifiedSCTInResult(result) &&
    160             CheckForSCTOrigin(result,
    161                               ct::SignedCertificateTimestamp::SCT_EMBEDDED) &&
    162             CheckForEmbeddedSCTInNetLog(net_log));
    163   }
    164 
    165   // Histogram-related helper methods
    166   int GetValueFromHistogram(std::string histogram_name, int sample_index) {
    167     base::Histogram* histogram = static_cast<base::Histogram*>(
    168         base::StatisticsRecorder::FindHistogram(histogram_name));
    169 
    170     if (histogram == NULL)
    171       return 0;
    172 
    173     scoped_ptr<base::HistogramSamples> samples = histogram->SnapshotSamples();
    174     return samples->GetCount(sample_index);
    175   }
    176 
    177   int NumConnectionsWithSingleSCT() {
    178     return GetValueFromHistogram(kSCTCountHistogram, 1);
    179   }
    180 
    181   int NumEmbeddedSCTsInHistogram() {
    182     return GetValueFromHistogram("Net.CertificateTransparency.SCTOrigin",
    183                                  ct::SignedCertificateTimestamp::SCT_EMBEDDED);
    184   }
    185 
    186   int NumValidSCTsInStatusHistogram() {
    187     return GetValueFromHistogram("Net.CertificateTransparency.SCTStatus",
    188                                  ct::SCT_STATUS_OK);
    189   }
    190 
    191  protected:
    192   scoped_ptr<MultiLogCTVerifier> verifier_;
    193   scoped_refptr<X509Certificate> chain_;
    194   scoped_refptr<X509Certificate> embedded_sct_chain_;
    195 };
    196 
    197 TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCT) {
    198   ASSERT_TRUE(CheckPrecertificateVerification(embedded_sct_chain_));
    199 }
    200 
    201 TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCTWithPreCA) {
    202   scoped_refptr<X509Certificate> chain(
    203       CreateCertificateChainFromFile(GetTestCertsDirectory(),
    204                                      "ct-test-embedded-with-preca-chain.pem",
    205                                      X509Certificate::FORMAT_AUTO));
    206   ASSERT_TRUE(chain.get());
    207   ASSERT_TRUE(CheckPrecertificateVerification(chain));
    208 }
    209 
    210 TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCTWithIntermediate) {
    211   scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile(
    212       GetTestCertsDirectory(),
    213       "ct-test-embedded-with-intermediate-chain.pem",
    214       X509Certificate::FORMAT_AUTO));
    215   ASSERT_TRUE(chain.get());
    216   ASSERT_TRUE(CheckPrecertificateVerification(chain));
    217 }
    218 
    219 TEST_F(MultiLogCTVerifierTest,
    220        VerifiesEmbeddedSCTWithIntermediateAndPreCA) {
    221   scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile(
    222       GetTestCertsDirectory(),
    223       "ct-test-embedded-with-intermediate-preca-chain.pem",
    224       X509Certificate::FORMAT_AUTO));
    225   ASSERT_TRUE(chain.get());
    226   ASSERT_TRUE(CheckPrecertificateVerification(chain));
    227 }
    228 
    229 TEST_F(MultiLogCTVerifierTest,
    230        VerifiesSCTOverX509Cert) {
    231   std::string sct(ct::GetTestSignedCertificateTimestamp());
    232 
    233   std::string sct_list;
    234   ASSERT_TRUE(ct::EncodeSCTListForTesting(sct, &sct_list));
    235 
    236   ct::CTVerifyResult result;
    237   EXPECT_EQ(OK,
    238             verifier_->Verify(
    239                 chain_.get(), std::string(), sct_list, &result, BoundNetLog()));
    240   ASSERT_TRUE(CheckForSingleVerifiedSCTInResult(result));
    241   ASSERT_TRUE(CheckForSCTOrigin(
    242       result, ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION));
    243 }
    244 
    245 TEST_F(MultiLogCTVerifierTest,
    246        IdentifiesSCTFromUnknownLog) {
    247   std::string sct_list = GetSCTListWithInvalidSCT();
    248   ct::CTVerifyResult result;
    249 
    250   EXPECT_NE(OK,
    251             verifier_->Verify(
    252                 chain_.get(), std::string(), sct_list, &result, BoundNetLog()));
    253   EXPECT_EQ(1U, result.unknown_logs_scts.size());
    254   EXPECT_EQ("", result.unknown_logs_scts[0]->log_description);
    255 }
    256 
    257 TEST_F(MultiLogCTVerifierTest, CountsValidSCTsInStatusHistogram) {
    258   int num_valid_scts = NumValidSCTsInStatusHistogram();
    259 
    260   ASSERT_TRUE(VerifySinglePrecertificateChain(embedded_sct_chain_));
    261 
    262   EXPECT_EQ(num_valid_scts + 1, NumValidSCTsInStatusHistogram());
    263 }
    264 
    265 TEST_F(MultiLogCTVerifierTest, CountsInvalidSCTsInStatusHistogram) {
    266   std::string sct_list = GetSCTListWithInvalidSCT();
    267   ct::CTVerifyResult result;
    268   int num_valid_scts = NumValidSCTsInStatusHistogram();
    269   int num_invalid_scts = GetValueFromHistogram(
    270       "Net.CertificateTransparency.SCTStatus", ct::SCT_STATUS_LOG_UNKNOWN);
    271 
    272   EXPECT_NE(OK,
    273             verifier_->Verify(
    274                 chain_.get(), std::string(), sct_list, &result, BoundNetLog()));
    275 
    276   ASSERT_EQ(num_valid_scts, NumValidSCTsInStatusHistogram());
    277   ASSERT_EQ(num_invalid_scts + 1,
    278             GetValueFromHistogram("Net.CertificateTransparency.SCTStatus",
    279                                   ct::SCT_STATUS_LOG_UNKNOWN));
    280 }
    281 
    282 TEST_F(MultiLogCTVerifierTest, CountsSingleEmbeddedSCTInConnectionsHistogram) {
    283   int old_sct_count = NumConnectionsWithSingleSCT();
    284   ASSERT_TRUE(CheckPrecertificateVerification(embedded_sct_chain_));
    285   EXPECT_EQ(old_sct_count + 1, NumConnectionsWithSingleSCT());
    286 }
    287 
    288 TEST_F(MultiLogCTVerifierTest, CountsSingleEmbeddedSCTInOriginsHistogram) {
    289   int old_embedded_count = NumEmbeddedSCTsInHistogram();
    290   ASSERT_TRUE(CheckPrecertificateVerification(embedded_sct_chain_));
    291   EXPECT_EQ(old_embedded_count + 1, NumEmbeddedSCTsInHistogram());
    292 }
    293 
    294 TEST_F(MultiLogCTVerifierTest, CountsZeroSCTsCorrectly) {
    295   int connections_without_scts = GetValueFromHistogram(kSCTCountHistogram, 0);
    296   EXPECT_FALSE(VerifySinglePrecertificateChain(chain_));
    297   ASSERT_EQ(connections_without_scts + 1,
    298             GetValueFromHistogram(kSCTCountHistogram, 0));
    299 }
    300 
    301 }  // namespace
    302 
    303 }  // namespace net
    304