2012-07-27 23:25:11 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
var EXPORTED_SYMBOLS = ["SafeBrowsing"];
|
|
|
|
|
|
|
|
const Cc = Components.classes;
|
|
|
|
const Ci = Components.interfaces;
|
|
|
|
const Cu = Components.utils;
|
|
|
|
|
|
|
|
Cu.import("resource://gre/modules/Services.jsm");
|
|
|
|
|
|
|
|
const phishingList = "goog-phish-shavar";
|
|
|
|
const malwareList = "goog-malware-shavar";
|
|
|
|
|
2012-07-30 16:02:05 -07:00
|
|
|
var urlList = {
|
|
|
|
updateURL: "http://safebrowsing.clients.google.com/safebrowsing/downloads?client=%SAFEBROWSING_ID%&appver=%VERSION%&pver=2.2",
|
|
|
|
keyURL: "https://sb-ssl.google.com/safebrowsing/newkey?client=%SAFEBROWSING_ID%&appver=%VERSION%&pver=2.2",
|
|
|
|
reportURL: "http://safebrowsing.clients.google.com/safebrowsing/report?",
|
|
|
|
gethashURL: "http://safebrowsing.clients.google.com/safebrowsing/gethash?client=%SAFEBROWSING_ID%&appver=%VERSION%&pver=2.2",
|
|
|
|
reportGenericURL: "http://%LOCALE%.phish-generic.mozilla.com/?hl=%LOCALE%",
|
|
|
|
reportErrorURL: "http://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%",
|
|
|
|
reportPhishURL: "http://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%",
|
|
|
|
reportMalwareURL: "http://%LOCALE%.malware-report.mozilla.com/?hl=%LOCALE%",
|
|
|
|
reportMalwareErrorURL: "http://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%",
|
|
|
|
};
|
|
|
|
|
2012-07-27 23:25:11 -07:00
|
|
|
var debug = false;
|
|
|
|
function log(...stuff) {
|
|
|
|
if (!debug)
|
|
|
|
return;
|
|
|
|
|
|
|
|
let msg = "SafeBrowsing: " + stuff.join(" ");
|
|
|
|
Services.console.logStringMessage(msg);
|
|
|
|
dump(msg + "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
var SafeBrowsing = {
|
|
|
|
|
2012-07-30 16:02:05 -07:00
|
|
|
init: function(customURLs) {
|
2012-07-27 23:25:11 -07:00
|
|
|
if (this.initialized) {
|
|
|
|
log("Already initialized");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-07-30 16:02:05 -07:00
|
|
|
// Allow tests to specify local urls for testing against a local server.
|
|
|
|
if (customURLs)
|
|
|
|
urlList = customURLs;
|
|
|
|
|
2012-07-27 23:25:11 -07:00
|
|
|
Services.prefs.addObserver("browser.safebrowsing", this.readPrefs, false);
|
|
|
|
this.readPrefs();
|
|
|
|
|
|
|
|
this.initProviderURLs();
|
|
|
|
|
|
|
|
// Initialize the list manager
|
|
|
|
let listManager = Cc["@mozilla.org/url-classifier/listmanager;1"].
|
|
|
|
getService(Ci.nsIUrlListManager);
|
|
|
|
|
|
|
|
listManager.setUpdateUrl(this.updateURL);
|
|
|
|
// setKeyUrl has the side effect of fetching a key from the server.
|
|
|
|
// This shouldn't happen if anti-phishing/anti-malware is disabled.
|
|
|
|
if (this.phishingEnabled || this.malwareEnabled)
|
|
|
|
listManager.setKeyUrl(this.keyURL);
|
|
|
|
listManager.setGethashUrl(this.gethashURL);
|
|
|
|
|
|
|
|
// Register our two types of tables
|
|
|
|
listManager.registerTable(phishingList, false);
|
|
|
|
listManager.registerTable(malwareList, false);
|
|
|
|
this.addMozEntries();
|
|
|
|
|
|
|
|
this.controlUpdateChecking();
|
|
|
|
this.initialized = true;
|
|
|
|
|
|
|
|
log("init() finished");
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
|
initialized: false,
|
|
|
|
phishingEnabled: false,
|
|
|
|
malwareEnabled: false,
|
|
|
|
|
|
|
|
updateURL: null,
|
|
|
|
keyURL: null,
|
|
|
|
reportURL: null,
|
|
|
|
gethashURL: null,
|
|
|
|
reportGenericURL: null,
|
|
|
|
reportErrorURL: null,
|
|
|
|
reportPhishURL: null,
|
|
|
|
reportMalwareURL: null,
|
|
|
|
reportMalwareErrorURL: null,
|
|
|
|
|
|
|
|
|
|
|
|
getReportURL: function(kind) {
|
|
|
|
return this["report" + kind + "URL"];
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
|
readPrefs: function() {
|
|
|
|
log("reading prefs");
|
|
|
|
|
|
|
|
debug = Services.prefs.getBoolPref("browser.safebrowsing.debug");
|
|
|
|
this.phishingEnabled = Services.prefs.getBoolPref("browser.safebrowsing.enabled");
|
|
|
|
this.malwareEnabled = Services.prefs.getBoolPref("browser.safebrowsing.malware.enabled");
|
|
|
|
|
|
|
|
// XXX The listManager backend gets confused if this is called before the
|
|
|
|
// lists are registered. So only call it here when a pref changes, and not
|
|
|
|
// when doing initialization. I expect to refactor this later, so pardon the hack.
|
|
|
|
if (this.initialized)
|
|
|
|
this.controlUpdateChecking();
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
|
initProviderURLs: function() {
|
|
|
|
log("initializing provider URLs");
|
|
|
|
|
|
|
|
// XXX remove this as obsolete?
|
|
|
|
let provID = Services.prefs.getIntPref("browser.safebrowsing.dataProvider");
|
|
|
|
if (provID != 0) {
|
|
|
|
Cu.reportError("unknown safebrowsing provider ID " + provID);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-07-30 16:02:05 -07:00
|
|
|
// The following URLs were once prefs, "browser.safebrowsing.provider.0.*"
|
2012-07-27 23:25:11 -07:00
|
|
|
|
|
|
|
// Urls used to get data from a provider
|
2012-07-30 16:02:05 -07:00
|
|
|
this.updateURL = Services.urlFormatter.formatURL(urlList["updateURL"]);
|
|
|
|
this.keyURL = Services.urlFormatter.formatURL(urlList["keyURL"]);
|
|
|
|
this.reportURL = Services.urlFormatter.formatURL(urlList["reportURL"]);
|
|
|
|
this.gethashURL = Services.urlFormatter.formatURL(urlList["gethashURL"]);
|
2012-07-27 23:25:11 -07:00
|
|
|
|
|
|
|
// Urls to HTML report pages
|
2012-07-30 16:02:05 -07:00
|
|
|
this.reportGenericURL = Services.urlFormatter.formatURL(urlList["reportGenericURL"]);
|
|
|
|
this.reportErrorURL = Services.urlFormatter.formatURL(urlList["reportErrorURL"]);
|
|
|
|
this.reportPhishURL = Services.urlFormatter.formatURL(urlList["reportPhishURL"]);
|
|
|
|
this.reportMalwareURL = Services.urlFormatter.formatURL(urlList["reportMalwareURL"]);
|
|
|
|
this.reportMalwareErrorURL = Services.urlFormatter.formatURL(urlList["reportMalwareErrorURL"]);
|
2012-07-27 23:25:11 -07:00
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
|
controlUpdateChecking: function() {
|
|
|
|
log("phishingEnabled:", this.phishingEnabled, "malwareEnabled:", this.malwareEnabled);
|
|
|
|
|
|
|
|
let listManager = Cc["@mozilla.org/url-classifier/listmanager;1"].
|
|
|
|
getService(Ci.nsIUrlListManager);
|
|
|
|
|
|
|
|
if (this.phishingEnabled)
|
|
|
|
listManager.enableUpdate(phishingList);
|
|
|
|
else
|
|
|
|
listManager.disableUpdate(phishingList);
|
|
|
|
|
|
|
|
if (this.malwareEnabled)
|
|
|
|
listManager.enableUpdate(malwareList);
|
|
|
|
else
|
|
|
|
listManager.disableUpdate(malwareList);
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
|
addMozEntries: function() {
|
|
|
|
// Add test entries to the DB.
|
|
|
|
// XXX this should really just be done by DB itself for all moz apps.
|
|
|
|
const phishURL = "mozilla.org/firefox/its-a-trap.html";
|
|
|
|
const malwareURL = "mozilla.org/firefox/its-an-attack.html";
|
|
|
|
|
|
|
|
let update = "n:1000\ni:test-malware-simple\nad:1\n" +
|
|
|
|
"a:1:32:" + malwareURL.length + "\n" +
|
|
|
|
malwareURL;
|
|
|
|
update += "n:1000\ni:test-phish-simple\nad:1\n" +
|
|
|
|
"a:1:32:" + phishURL.length + "\n" +
|
|
|
|
phishURL;
|
|
|
|
log("addMozEntries:", update);
|
|
|
|
|
|
|
|
let db = Cc["@mozilla.org/url-classifier/dbservice;1"].
|
|
|
|
getService(Ci.nsIUrlClassifierDBService);
|
|
|
|
|
|
|
|
// nsIUrlClassifierUpdateObserver
|
|
|
|
let dummyListener = {
|
|
|
|
updateUrlRequested: function() { },
|
|
|
|
streamFinished: function() { },
|
|
|
|
updateError: function() { },
|
|
|
|
updateSuccess: function() { }
|
|
|
|
};
|
|
|
|
|
|
|
|
try {
|
|
|
|
db.beginUpdate(dummyListener, "test-malware-simple,test-phish-simple", "");
|
|
|
|
db.beginStream("", "");
|
|
|
|
db.updateStream(update);
|
|
|
|
db.finishStream();
|
|
|
|
db.finishUpdate();
|
|
|
|
} catch(ex) {
|
|
|
|
// beginUpdate will throw harmlessly if there's an existing update in progress, ignore failures.
|
|
|
|
log("addMozEntries failed!", ex);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
};
|