/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
// Allowlist of hostnames that should be considered secure contexts even when // served over http:// or ws://
nsCString* nsMixedContentBlocker::sSecurecontextAllowlist = nullptr; bool nsMixedContentBlocker::sSecurecontextAllowlistCached = false;
// if the callee explicitly wants to use a special message for this // console report, then we allow to overrule the default with the // explicitly provided one here. if (!aOverruleMessageLookUpKeyWithThis.IsEmpty()) {
messageLookupKey = aOverruleMessageLookUpKeyWithThis;
}
/* nsIChannelEventSink implementation * This code is called when a request is redirected. * We check the channel associated with the new uri is allowed to load * in the current context
*/
NS_IMETHODIMP
nsMixedContentBlocker::AsyncOnChannelRedirect(
nsIChannel* aOldChannel, nsIChannel* aNewChannel, uint32_t aFlags,
nsIAsyncVerifyRedirectCallback* aCallback) {
mozilla::net::nsAsyncRedirectAutoCallback autoCallback(aCallback);
if (!aOldChannel) {
NS_ERROR("No channel when evaluating mixed content!"); return NS_ERROR_FAILURE;
}
// If we are in the parent process in e10s, we don't have access to the // document node, and hence ShouldLoad will fail when we try to get // the docShell. If that's the case, ignore mixed content checks // on redirects in the parent. Let the child check for mixed content.
nsCOMPtr<nsIParentChannel> is_ipc_channel;
NS_QueryNotificationCallbacks(aNewChannel, is_ipc_channel);
RefPtr<net::DocumentLoadListener> docListener =
do_QueryObject(is_ipc_channel); if (is_ipc_channel && !docListener) { return NS_OK;
}
// Don't do these checks if we're switching from DocumentChannel // to a real channel. In that case, we should already have done // the checks in the parent process. AsyncOnChannelRedirect // isn't called in the content process if we switch process, // so checking here would just hide bugs in the process switch // cases. if (RefPtr<net::DocumentChannel> docChannel = do_QueryObject(aOldChannel)) { return NS_OK;
}
// Get the loading Info from the old channel
nsCOMPtr<nsILoadInfo> loadInfo = aOldChannel->LoadInfo();
nsCOMPtr<nsIPrincipal> requestingPrincipal = loadInfo->GetLoadingPrincipal();
// Since we are calling shouldLoad() directly on redirects, we don't go // through the code in nsContentPolicyUtils::NS_CheckContentLoadPolicy(). // Hence, we have to duplicate parts of it here. if (requestingPrincipal) { // We check to see if the loadingPrincipal is systemPrincipal and return // early if it is if (requestingPrincipal->IsSystemPrincipal()) { return NS_OK;
}
}
// If the channel is about to load mixed content, abort the channel if (!NS_CP_ACCEPTED(decision)) {
autoCallback.DontCallback();
aOldChannel->Cancel(NS_ERROR_DOM_BAD_URI); return NS_BINDING_FAILED;
}
return NS_OK;
}
/* This version of ShouldLoad() is non-static and called by the Content Policy * API and AsyncOnChannelRedirect(). See nsIContentPolicy::ShouldLoad() * for detailed description of the parameters.
*/
NS_IMETHODIMP
nsMixedContentBlocker::ShouldLoad(nsIURI* aContentLocation,
nsILoadInfo* aLoadInfo, int16_t* aDecision) { // We pass in false as the first parameter to ShouldLoad(), because the // callers of this method don't know whether the load went through cached // image redirects. This is handled by direct callers of the static // ShouldLoad.
nsresult rv = ShouldLoad(false, // aHadInsecureImageRedirect
aContentLocation, aLoadInfo, true, aDecision);
if (*aDecision == nsIContentPolicy::REJECT_REQUEST) {
NS_SetRequestBlockingReason(aLoadInfo,
nsILoadInfo::BLOCKING_REASON_MIXED_BLOCKED);
}
usingnamespace mozilla::net;
NetAddr addr; if (NS_FAILED(addr.InitFromString(aAsciiHost))) { returnfalse;
}
// Step 4 of // https://w3c.github.io/webappsec-secure-contexts/#is-origin-trustworthy says // we should only consider [::1]/128 as a potentially trustworthy IPv6 // address, whereas for IPv4 127.0.0.1/8 are considered as potentially // trustworthy. return addr.IsLoopBackAddressWithoutIPv6Mapping();
}
/* Maybe we have a .onion URL. Treat it as trustworthy as well if * `dom.securecontext.allowlist_onions` is `true`.
*/ bool nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(nsIURI* aURL) { if (!StaticPrefs::dom_securecontext_allowlist_onions()) { returnfalse;
}
// Blobs are expected to inherit their principal so we don't expect to have // a content principal with scheme 'blob' here. We can't assert that though // since someone could mess with a non-blob URI to give it that scheme.
NS_WARNING_ASSERTION(!scheme.EqualsLiteral("blob"), "IsOriginPotentiallyTrustworthy ignoring blob scheme");
// According to the specification, the user agent may choose to extend the // trust to other, vendor-specific URL schemes. We use this for "resource:", // which is technically a substituting protocol handler that is not limited to // local resource mapping, but in practice is never mapped remotely as this // would violate assumptions a lot of code makes. // We use nsIProtocolHandler flags to determine which protocols we consider a // priori authenticated. bool aPrioriAuthenticated = false; if (NS_FAILED(NS_URIChainHasFlags(
aURI, nsIProtocolHandler::URI_IS_POTENTIALLY_TRUSTWORTHY,
&aPrioriAuthenticated))) { returnfalse;
}
if (aPrioriAuthenticated) { returntrue;
}
nsAutoCString host;
rv = aURI->GetHost(host); if (NS_FAILED(rv)) { returnfalse;
}
if (IsPotentiallyTrustworthyLoopbackURL(aURI)) { returntrue;
}
// If a host is not considered secure according to the default algorithm, then // check to see if it has been allowlisted by the user. We only apply this // allowlist for network resources, i.e., those with scheme "http" or "ws". // The pref should contain a comma-separated list of hostnames.
if (!scheme.EqualsLiteral("http") && !scheme.EqualsLiteral("ws")) { returnfalse;
}
nsAutoCString allowlist;
GetSecureContextAllowList(allowlist); for (const nsACString& allowedHost :
nsCCharSeparatedTokenizer(allowlist, ',').ToRange()) { if (host.Equals(allowedHost)) { returntrue;
}
}
// Maybe we have a .onion URL. Treat it as trustworthy as well if // `dom.securecontext.allowlist_onions` is `true`. if (nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(aURI)) { returntrue;
} returnfalse;
}
if (aConsiderPrefs &&
!StaticPrefs::security_mixed_content_upgrade_display_content()) { returnfalse;
}
switch (aType) { case nsIContentPolicy::TYPE_INTERNAL_IMAGE: case nsIContentPolicy::TYPE_INTERNAL_IMAGE_PRELOAD: case nsIContentPolicy::TYPE_INTERNAL_IMAGE_FAVICON: return !aConsiderPrefs ||
StaticPrefs::
security_mixed_content_upgrade_display_content_image(); case nsIContentPolicy::TYPE_INTERNAL_AUDIO: return !aConsiderPrefs ||
StaticPrefs::
security_mixed_content_upgrade_display_content_audio(); case nsIContentPolicy::TYPE_INTERNAL_VIDEO: return !aConsiderPrefs ||
StaticPrefs::
security_mixed_content_upgrade_display_content_video(); default: returnfalse;
}
}
/* * Return the URI of the precusor principal or the URI of aPrincipal if there is * no precursor URI.
*/ static already_AddRefed<nsIURI> GetPrincipalURIOrPrecursorPrincipalURI(
nsIPrincipal* aPrincipal) {
nsCOMPtr<nsIPrincipal> precursorPrincipal =
aPrincipal->GetPrecursorPrincipal();
#ifdef DEBUG if (precursorPrincipal) {
MOZ_ASSERT(aPrincipal->GetIsNullPrincipal(), "Only Null Principals should have a Precursor Principal");
} #endif
/* Static version of ShouldLoad() that contains all the Mixed Content Blocker * logic. Called from non-static ShouldLoad().
*/
nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
nsIURI* aContentLocation,
nsILoadInfo* aLoadInfo, bool aReportError,
int16_t* aDecision) { // Asserting that we are on the main thread here and hence do not have to lock // and unlock security.mixed_content.block_active_content and // security.mixed_content.block_display_content before reading/writing to // them.
MOZ_ASSERT(NS_IsMainThread());
// The content policy type that we receive may be an internal type for // scripts. Let's remember if we have seen a worker type, and reset it to the // external type in all cases right now. bool isWorkerType =
internalContentType == nsIContentPolicy::TYPE_INTERNAL_WORKER ||
internalContentType ==
nsIContentPolicy::TYPE_INTERNAL_WORKER_STATIC_MODULE ||
internalContentType == nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER ||
internalContentType == nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER;
ExtContentPolicyType contentType =
nsContentUtils::InternalContentPolicyTypeToExternal(internalContentType);
// Assume active (high risk) content and blocked by default
MixedContentTypes classification = eMixedScript; // Make decision to block/reject by default
*aDecision = REJECT_REQUEST;
// Notes on non-obvious decisions: // // TYPE_DTD: A DTD can contain entity definitions that expand to scripts. // // TYPE_FONT: The TrueType hinting mechanism is basically a scripting // language that gets interpreted by the operating system's font rasterizer. // Mixed content web fonts are relatively uncommon, and we can can fall back // to built-in fonts with minimal disruption in almost all cases. // // TYPE_OBJECT_SUBREQUEST could actually be either active content (e.g. a // script that a plugin will execute) or display content (e.g. Flash video // content). Until we have a way to determine active vs passive content // from plugin requests (bug 836352), we will treat this as passive content. // This is to prevent false positives from causing users to become // desensitized to the mixed content blocker. // // TYPE_CSP_REPORT: High-risk because they directly leak information about // the content of the page, and because blocking them does not have any // negative effect on the page loading. // // TYPE_PING: Ping requests are POSTS, not GETs like images and media. // Also, PING requests have no bearing on the rendering or operation of // the page when used as designed, so even though they are lower risk than // scripts, blocking them is basically risk-free as far as compatibility is // concerned. // // TYPE_STYLESHEET: XSLT stylesheets can insert scripts. CSS positioning // and other advanced CSS features can possibly be exploited to cause // spoofing attacks (e.g. make a "grant permission" button look like a // "refuse permission" button). // // TYPE_BEACON: Beacon requests are similar to TYPE_PING, and are blocked by // default. // // TYPE_WEBSOCKET: The Websockets API requires browsers to // reject mixed-content websockets: "If secure is false but the origin of // the entry script has a scheme component that is itself a secure protocol, // e.g. HTTPS, then throw a SecurityError exception." We already block mixed // content websockets within the websockets implementation, so we don't need // to do any blocking here, nor do we need to provide a way to undo or // override the blocking. Websockets without TLS are very flaky anyway in the // face of many HTTP-aware proxies. Compared to passive content, there is // additional risk that the script using WebSockets will disclose sensitive // information from the HTTPS page and/or eval (directly or indirectly) // received data. // // TYPE_XMLHTTPREQUEST: XHR requires either same origin or CORS, so most // mixed-content XHR will already be blocked by that check. This will also // block HTTPS-to-HTTP XHR with CORS. The same security concerns mentioned // above for WebSockets apply to XHR, and XHR should have the same security // properties as WebSockets w.r.t. mixed content. XHR's handling of redirects // amplifies these concerns. // // TYPE_PROXIED_WEBRTC_MEDIA: Ordinarily, webrtc uses low-level sockets for // peer-to-peer media, which bypasses this code entirely. However, when a // web proxy is being used, the TCP and TLS webrtc connections are routed // through the web proxy (using HTTP CONNECT), which causes these connections // to be checked. We just skip mixed content blocking in that case.
switch (contentType) { // The top-level document cannot be mixed content by definition case ExtContentPolicy::TYPE_DOCUMENT:
*aDecision = ACCEPT; return NS_OK; // Creating insecure websocket connections in a secure page is blocked // already in the websocket constructor. We don't need to check the blocking // here and we don't want to un-block case ExtContentPolicy::TYPE_WEBSOCKET:
*aDecision = ACCEPT; return NS_OK;
// TYPE_SAVEAS_DOWNLOAD: Save-link-as feature is used to download a // resource // without involving a docShell. This kind of loading must be // allowed, if not disabled in the preferences. // Creating insecure connections for a save-as link download is // acceptable. This download is completely disconnected from the docShell, // but still using the same loading principal.
case ExtContentPolicy::TYPE_SAVEAS_DOWNLOAD:
*aDecision = ACCEPT; return NS_OK; break;
// It does not make sense to subject webrtc media connections to mixed // content blocking, since those connections are peer-to-peer and will // therefore almost never match the origin. case ExtContentPolicy::TYPE_PROXIED_WEBRTC_MEDIA:
*aDecision = ACCEPT; return NS_OK;
// Static display content is considered moderate risk for mixed content so // these will be blocked according to the mixed display preference case ExtContentPolicy::TYPE_IMAGE: case ExtContentPolicy::TYPE_MEDIA:
classification = eMixedDisplay; break; case ExtContentPolicy::TYPE_OBJECT_SUBREQUEST: if (StaticPrefs::security_mixed_content_block_object_subrequest()) {
classification = eMixedScript;
} else {
classification = eMixedDisplay;
} break;
// Active content (or content with a low value/risk-of-blocking ratio) // that has been explicitly evaluated; listed here for documentation // purposes and to avoid the assertion and warning for the default case. case ExtContentPolicy::TYPE_BEACON: case ExtContentPolicy::TYPE_CSP_REPORT: case ExtContentPolicy::TYPE_DTD: case ExtContentPolicy::TYPE_FETCH: case ExtContentPolicy::TYPE_FONT: case ExtContentPolicy::TYPE_UA_FONT: case ExtContentPolicy::TYPE_IMAGESET: case ExtContentPolicy::TYPE_OBJECT: case ExtContentPolicy::TYPE_SCRIPT: case ExtContentPolicy::TYPE_STYLESHEET: case ExtContentPolicy::TYPE_SUBDOCUMENT: case ExtContentPolicy::TYPE_PING: case ExtContentPolicy::TYPE_WEB_MANIFEST: case ExtContentPolicy::TYPE_XMLHTTPREQUEST: case ExtContentPolicy::TYPE_XSLT: case ExtContentPolicy::TYPE_OTHER: case ExtContentPolicy::TYPE_SPECULATIVE: case ExtContentPolicy::TYPE_WEB_TRANSPORT: case ExtContentPolicy::TYPE_WEB_IDENTITY: case ExtContentPolicy::TYPE_JSON: break;
case ExtContentPolicy::TYPE_INVALID:
MOZ_ASSERT(false, "Mixed content of unknown type"); // Do not add default: so that compilers can catch the missing case.
}
// Make sure to get the URI the load started with. No need to check // outer schemes because all the wrapping pseudo protocols inherit the // security properties of the actual network request represented // by the innerMost URL.
nsCOMPtr<nsIURI> innerContentLocation = NS_GetInnermostURI(aContentLocation); if (!innerContentLocation) {
NS_ERROR("Can't get innerURI from aContentLocation");
*aDecision = REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because the innermost " "URI could not be " "retrieved")); return NS_OK;
}
// TYPE_IMAGE redirects are cached based on the original URI, not the final // destination and hence cache hits for images may not have the correct // innerContentLocation. Check if the cached hit went through an http // redirect, and if it did, we can't treat this as a secure subresource. if (!aHadInsecureImageRedirect &&
URISafeToBeLoadedInSecureContext(innerContentLocation)) {
*aDecision = ACCEPT; return NS_OK;
}
/* * Most likely aLoadingPrincipal reflects the security context of the owning * document for this mixed content check. There are cases where that is not * true, hence we have to we process requests in the following order: * 1) If the load is triggered by the SystemPrincipal, we allow the load. * Content scripts from addon code do provide aTriggeringPrincipal, which * is an ExpandedPrincipal. If encountered, we allow the load. * 2) If aLoadingPrincipal does not yield to a requestingLocation, then we * fall back to querying the requestingLocation from aTriggeringPrincipal. * 3) If we still end up not having a requestingLocation, we reject the load.
*/
// 1) Check if the load was triggered by the system (SystemPrincipal) or // a content script from addons code (ExpandedPrincipal) in which case the // load is not subject to mixed content blocking. if (triggeringPrincipal) { if (triggeringPrincipal->IsSystemPrincipal()) {
*aDecision = ACCEPT; return NS_OK;
}
nsCOMPtr<nsIExpandedPrincipal> expanded =
do_QueryInterface(triggeringPrincipal); if (expanded) {
*aDecision = ACCEPT; return NS_OK;
}
}
// 2) If aLoadingPrincipal does not provide a requestingLocation, then // we fall back to to querying the requestingLocation from // aTriggeringPrincipal.
nsCOMPtr<nsIURI> requestingLocation =
GetPrincipalURIOrPrecursorPrincipalURI(loadingPrincipal); if (!requestingLocation) {
requestingLocation =
GetPrincipalURIOrPrecursorPrincipalURI(triggeringPrincipal);
}
// 3) Giving up. We still don't have a requesting location, therefore we can't // tell if this is a mixed content load. Deny to be safe. if (!requestingLocation) {
*aDecision = REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because no requesting " "location could be " "gathered.")); return NS_OK;
}
// Check the parent scheme. If it is not an HTTPS page then mixed content // restrictions do not apply.
nsCOMPtr<nsIURI> innerRequestingLocation =
NS_GetInnermostURI(requestingLocation); if (!innerRequestingLocation) {
NS_ERROR("Can't get innerURI from requestingLocation");
*aDecision = REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because the innermost " "URI of the " "requesting location could be gathered.")); return NS_OK;
}
bool parentIsHttps = innerRequestingLocation->SchemeIs("https"); if (!parentIsHttps) {
*aDecision = ACCEPT;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be allowed because the requesting " "location is not using " "HTTPS.")); return NS_OK;
}
// Disallow mixed content loads for workers, shared workers and service // workers. if (isWorkerType) { // For workers, we can assume that we're mixed content at this point, since // the parent is https, and the protocol associated with // innerContentLocation doesn't map to the secure URI flags checked above. // Assert this for sanity's sake #ifdef DEBUG bool isHttpsScheme = innerContentLocation->SchemeIs("https");
MOZ_ASSERT(!isHttpsScheme); #endif
*aDecision = REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected, trying to load a worker " "from an insecure origin.")); return NS_OK;
}
// Check if https-only mode upgrades this later anyway if (nsHTTPSOnlyUtils::IsSafeToAcceptCORSOrMixedContent(aLoadInfo)) {
*aDecision = ACCEPT; return NS_OK;
}
// The page might have set the CSP directive 'upgrade-insecure-requests'. In // such a case allow the http: load to succeed with the promise that the // channel will get upgraded to https before fetching any data from the // netwerk. Please see: nsHttpChannel::Connect() // // Please note that the CSP directive 'upgrade-insecure-requests' only applies // to http: and ws: (for websockets). Websockets are not subject to mixed // content blocking since insecure websockets are not allowed within secure // pages. Hence, we only have to check against http: here. Skip mixed content // blocking if the subresource load uses http: and the CSP directive // 'upgrade-insecure-requests' is present on the page.
// Carve-out: if we're in the parent and we're loading media, e.g. through // webbrowserpersist, don't reject it if we can't find a docshell. if (XRE_IsParentProcess() && !requestingWindow &&
(contentType == ExtContentPolicy::TYPE_IMAGE ||
contentType == ExtContentPolicy::TYPE_MEDIA)) {
*aDecision = ACCEPT; return NS_OK;
} // Otherwise, we must have a window
NS_ENSURE_TRUE(requestingWindow, NS_OK);
// Allow http: mixed content if we are choosing to upgrade them when the // pref "security.mixed_content.upgrade_display_content" is true. // This behaves like GetUpgradeInsecureRequests above in that the channel will // be upgraded to https before fetching any data from the netwerk. if (isHttpScheme) { bool isUpgradableContentType =
IsUpgradableContentType(internalContentType, /* aConsiderPrefs */ true); if (isUpgradableContentType) {
*aDecision = ACCEPT; return NS_OK;
}
}
// The page might have set the CSP directive 'block-all-mixed-content' which // should block not only active mixed content loads but in fact all mixed // content loads, see https://www.w3.org/TR/mixed-content/#strict-checking // Block all non secure loads in case the CSP directive is present. Please // note that at this point we already know, based on |schemeSecure| that the // load is not secure, so we can bail out early at this point. if (aLoadInfo->GetBlockAllMixedContent()) { // log a message to the console before returning.
nsAutoCString spec;
nsresult rv = aContentLocation->GetSpec(spec);
NS_ENSURE_SUCCESS(rv, rv);
CSP_LogLocalizedStr("blockAllMixedContent", params, ""_ns, // aSourceFile
u""_ns, // aScriptSample
0, // aLineNumber
1, // aColumnNumber
nsIScriptError::errorFlag, "blockAllMixedContent"_ns,
requestingWindow->Id(),
aLoadInfo->GetOriginAttributes().IsPrivateBrowsing());
*aDecision = REJECT_REQUEST;
MOZ_LOG(
sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because the CSP directive " "'block-all-mixed-content' was set while trying to load data from " "a non-secure origin.")); return NS_OK;
}
// Determine if the rootDoc is https and if the user decided to allow Mixed // Content
WindowContext* topWC = requestingWindow->TopWindowContext(); bool rootHasSecureConnection = topWC->GetIsSecure(); bool allowMixedContent = topWC->GetAllowMixedContent();
// When navigating an iframe, the iframe may be https but its parents may not // be. Check the parents to see if any of them are https. If none of the // parents are https, allow the load. if (contentType == ExtContentPolicyType::TYPE_SUBDOCUMENT &&
!rootHasSecureConnection && !parentIsHttps) { bool httpsParentExists = false;
// At this point we know that the request is mixed content, and the only // question is whether we block it. Record telemetry at this point as to // whether HSTS would have fixed things by making the content location // into an HTTPS URL. // // Note that we count this for redirects as well as primary requests. This // will cause some degree of double-counting, especially when mixed content // is not blocked (e.g., for images). For more detail, see: // https://bugzilla.mozilla.org/show_bug.cgi?id=1198572#c19 // // We do not count requests aHadInsecureImageRedirect=true, since these are // just an artifact of the image caching system. bool active = (classification == eMixedScript); if (!aHadInsecureImageRedirect) { if (XRE_IsParentProcess()) {
AccumulateMixedContentHSTS(innerContentLocation, active,
originAttributes);
} else { // Ask the parent process to do the same call
mozilla::dom::ContentChild* cc =
mozilla::dom::ContentChild::GetSingleton(); if (cc) {
cc->SendAccumulateMixedContentHSTS(innerContentLocation, active,
originAttributes);
}
}
}
// set hasMixedContentObjectSubrequest on this object if necessary if (contentType == ExtContentPolicyType::TYPE_OBJECT_SUBREQUEST &&
aReportError) { if (!StaticPrefs::security_mixed_content_block_object_subrequest()) {
nsAutoCString messageLookUpKey( "LoadingMixedDisplayObjectSubrequestDeprecation");
uint32_t newState = 0; // If the content is display content, and the pref says display content should // be blocked, block it. if (classification == eMixedDisplay) { if (!StaticPrefs::security_mixed_content_block_display_content() ||
allowMixedContent) {
*aDecision = nsIContentPolicy::ACCEPT; // User has overriden the pref and the root is not https; // mixed display content was allowed on an https subframe.
newState |= nsIWebProgressListener::STATE_LOADED_MIXED_DISPLAY_CONTENT;
} else {
*aDecision = nsIContentPolicy::REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because the content is " "display " "content (blocked by pref " "security.mixed_content.block_display_content)."));
newState |= nsIWebProgressListener::STATE_BLOCKED_MIXED_DISPLAY_CONTENT;
}
} else {
MOZ_ASSERT(classification == eMixedScript); // If the content is active content, and the pref says active content should // be blocked, block it unless the user has choosen to override the pref if (!StaticPrefs::security_mixed_content_block_active_content() ||
allowMixedContent) {
*aDecision = nsIContentPolicy::ACCEPT; // User has already overriden the pref and the root is not https; // mixed active content was allowed on an https subframe.
newState |= nsIWebProgressListener::STATE_LOADED_MIXED_ACTIVE_CONTENT;
} else { // User has not overriden the pref by Disabling protection. Reject the // request and update the security state.
*aDecision = nsIContentPolicy::REJECT_REQUEST;
MOZ_LOG(sMCBLog, LogLevel::Verbose,
(" -> decision: Request will be rejected because the content is " "active " "content (blocked by pref " "security.mixed_content.block_active_content).")); // The user has not overriden the pref, so make sure they still have an // option by calling nativeDocShell which will invoke the doorhanger
newState |= nsIWebProgressListener::STATE_BLOCKED_MIXED_ACTIVE_CONTENT;
}
}
// To avoid duplicate errors on the console, we do not report blocked // preloads to the console. if (!isPreload && aReportError) {
LogMixedContentMessage(classification, aContentLocation, topWC->Id(),
(*aDecision == nsIContentPolicy::REJECT_REQUEST)
? eBlocked
: eUserOverride,
requestingLocation);
}
// Notify the top WindowContext of the flags we've computed, and it // will handle updating any relevant security UI.
topWC->AddSecurityState(newState); return NS_OK;
}
bool nsMixedContentBlocker::URISafeToBeLoadedInSecureContext(nsIURI* aURI) { /* Returns a bool if the URI can be loaded as a sub resource safely. * * Check Protocol Flags to determine if scheme is safe to load: * URI_DOES_NOT_RETURN_DATA - e.g. * "mailto" * URI_IS_LOCAL_RESOURCE - e.g. * "data", * "resource", * "moz-icon" * URI_INHERITS_SECURITY_CONTEXT - e.g. * "javascript" * URI_IS_POTENTIALLY_TRUSTWORTHY - e.g. * "https", * "moz-safe-about" *
*/ bool schemeLocal = false; bool schemeNoReturnData = false; bool schemeInherits = false; bool schemeSecure = false; if (NS_FAILED(NS_URIChainHasFlags(
aURI, nsIProtocolHandler::URI_IS_LOCAL_RESOURCE, &schemeLocal)) ||
NS_FAILED(NS_URIChainHasFlags(
aURI, nsIProtocolHandler::URI_DOES_NOT_RETURN_DATA,
&schemeNoReturnData)) ||
NS_FAILED(NS_URIChainHasFlags(
aURI, nsIProtocolHandler::URI_INHERITS_SECURITY_CONTEXT,
&schemeInherits)) ||
NS_FAILED(NS_URIChainHasFlags(
aURI, nsIProtocolHandler::URI_IS_POTENTIALLY_TRUSTWORTHY,
&schemeSecure))) { returnfalse;
}
NS_IMETHODIMP
nsMixedContentBlocker::ShouldProcess(nsIURI* aContentLocation,
nsILoadInfo* aLoadInfo,
int16_t* aDecision) { if (!aContentLocation) { // aContentLocation may be null when a plugin is loading without an // associated URI resource if (aLoadInfo->GetExternalContentPolicyType() ==
ExtContentPolicyType::TYPE_OBJECT) {
*aDecision = ACCEPT; return NS_OK;
}
// Record information on when HSTS would have made mixed content not mixed // content (regardless of whether it was actually blocked) void nsMixedContentBlocker::AccumulateMixedContentHSTS(
nsIURI* aURI, bool aActive, const OriginAttributes& aOriginAttributes) { // This method must only be called in the parent, because // nsSiteSecurityService is only available in the parent if (!XRE_IsParentProcess()) {
MOZ_ASSERT(false); return;
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.