New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 760810 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Aug 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug



Sign in to add a comment

chrome should set ReferrerUrl and HostUrl in MOTW ADS for downloads

Project Member Reported by wfh@chromium.org, Aug 31 2017

Issue description

When smartshield is enabled Chrome sets the Mark of the Web (MOTW) Alternate Data Stream (ADS) file for downloads "Zone.Identifier" to signal that it's from the Internet (zone 3).

e.g.

[ZoneTransfer]
ZoneId=3

If the additional fields "ReferrerUrl" and "HostUrl" are set and Smartshield is enabled then a smartshield ping is sent upon shell execution (i.e. double click in explorer, or click on the download in the Chrome download shelf).

This would mean that downloads would be scanned by both Chrome Safe Browsing and also SmartShield - currently they are only scanned by Chrome Safe Browsing.

To repro this follow these steps:

0. Verify Smartshield is enabled.
1. Visit https://demo.smartscreen.msft.net/
2. Download "Known Malware" at the bottom right of the page. This saves "knownmalicious.exe" to your downloads folder.
3. Verify that clicking on the download in the Chrome download shelf, or in explorer, presents no warning.

Now to test proposed behavior, do the following:

-1. Delete the knownmalicious.exe file from previous test.
0. Verify Smartshield is enabled.
1. Visit https://demo.smartscreen.msft.net/
2. Download "Known Malware" at the bottom right of the page. This saves "knownmalicious.exe" to your downloads folder.
3. Open the "Zone.Identifier" alternate data stream for "knownmalicious.exe" in notepad by running:
  notepad c:\mydownloads\knownmalicious.exe:Zone.Identifier
4. The file should say:

[ZoneTransfer]
ZoneId=3

Change this to:

[ZoneTransfer]
ZoneId=3
ReferrerUrl=https://demo.smartscreen.msft.net/
HostUrl=https://demo.smartscreen.msft.net/download/known/knownmalicious.exe

5. Verify that clicking on the download in the Chrome download shelf, or in explorer, presents a smartshield warning.

 

Comment 1 by wfh@chromium.org, Aug 31 2017

Status: WontFix (was: Untriaged)
Well, it turns out in later builds of Windows, this is already done by Chrome. I just tested on 15063 and the ADS is set with the referrerURL and HostUrl by Chrome. This causes a popup for knownmalicious.exe when downloaded by Chrome, so both services are being used to check for malicious binaries.

It just doesn't happen on 10586...

So I suppose this can be closed, as it's WAI on the latest versions of Windows.

Sign in to add a comment