mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-05 14:07:38 +03:00
Implement support for DNSBL lookups
Currently lacks whitelisting support and return codes filtering. Both should be implemented in the future.
This commit is contained in:
parent
691f4ae429
commit
206a5d61db
8 changed files with 651 additions and 0 deletions
|
@ -26,6 +26,7 @@ changes happen from time to time**
|
||||||
- Single process model allows more efficient implementation
|
- Single process model allows more efficient implementation
|
||||||
* Useful
|
* Useful
|
||||||
- [Subaddressing][subaddr] support
|
- [Subaddressing][subaddr] support
|
||||||
|
- [DNSBL][dnsbl] checking support
|
||||||
- Messages compression (LZ4, Zstd)
|
- Messages compression (LZ4, Zstd)
|
||||||
|
|
||||||
Planned:
|
Planned:
|
||||||
|
@ -73,6 +74,7 @@ The code is under MIT license. See [LICENSE](LICENSE) for more information.
|
||||||
[dmarc]: https://blog.returnpath.com/how-to-explain-dmarc-in-plain-english/
|
[dmarc]: https://blog.returnpath.com/how-to-explain-dmarc-in-plain-english/
|
||||||
[mtasts]: https://www.hardenize.com/blog/mta-sts
|
[mtasts]: https://www.hardenize.com/blog/mta-sts
|
||||||
[subaddr]: https://en.wikipedia.org/wiki/Email_address#Sub-addressing
|
[subaddr]: https://en.wikipedia.org/wiki/Email_address#Sub-addressing
|
||||||
|
[dnsbl]: https://en.wikipedia.org/wiki/DNSBL
|
||||||
[backscatter]: https://en.wikipedia.org/wiki/Backscatter_(e-mail)
|
[backscatter]: https://en.wikipedia.org/wiki/Backscatter_(e-mail)
|
||||||
|
|
||||||
[setup-tutorial]: https://github.com/foxcpp/maddy/wiki/Tutorial:-Setting-up-a-mail-server-with-maddy
|
[setup-tutorial]: https://github.com/foxcpp/maddy/wiki/Tutorial:-Setting-up-a-mail-server-with-maddy
|
||||||
|
|
181
check/dnsbl/common.go
Normal file
181
check/dnsbl/common.go
Normal file
|
@ -0,0 +1,181 @@
|
||||||
|
package dnsbl
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/foxcpp/maddy/dns"
|
||||||
|
"github.com/foxcpp/maddy/exterrors"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ListedErr struct {
|
||||||
|
Identity string
|
||||||
|
DNSBL string
|
||||||
|
Reason string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (le ListedErr) Fields() map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"check": "dnsbl",
|
||||||
|
"dnsbl": le.DNSBL,
|
||||||
|
"identity": le.Identity,
|
||||||
|
"reason": le.Reason,
|
||||||
|
"smtp_code": 554,
|
||||||
|
"smtp_enchcode": exterrors.EnhancedCode{5, 7, 0},
|
||||||
|
"smtp_msg": le.Identity + " is listed in the used DNSBL",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (le ListedErr) Error() string {
|
||||||
|
return le.Identity + " is listed in the used DNSBL"
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkDomain(resolver dns.Resolver, cfg BL, domain string) error {
|
||||||
|
query := domain + "." + cfg.Zone
|
||||||
|
|
||||||
|
addrs, err := resolver.LookupHost(context.Background(), query)
|
||||||
|
if err != nil {
|
||||||
|
if dnsErr, ok := err.(*net.DNSError); ok && dnsErr.IsNotFound {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(addrs) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Attempt to extract explaination string.
|
||||||
|
txts, err := resolver.LookupTXT(context.Background(), query)
|
||||||
|
if err != nil || len(txts) == 0 {
|
||||||
|
// Not significant, include addresses as reason. Usually they are
|
||||||
|
// mapped to some predefined 'reasons' by BL.
|
||||||
|
return ListedErr{
|
||||||
|
Identity: domain,
|
||||||
|
DNSBL: cfg.Zone,
|
||||||
|
Reason: strings.Join(addrs, "; "),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Some BLs provide multiple reasons (meta-BLs such as Spamhaus Zen) so
|
||||||
|
// don't mangle them by joining with "", instead join with "; ".
|
||||||
|
|
||||||
|
return ListedErr{
|
||||||
|
Identity: domain,
|
||||||
|
DNSBL: cfg.Zone,
|
||||||
|
Reason: strings.Join(txts, "; "),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkIP(resolver dns.Resolver, cfg BL, ip net.IP) error {
|
||||||
|
ipv6 := true
|
||||||
|
if ipv4 := ip.To4(); ipv4 != nil {
|
||||||
|
ip = ipv4
|
||||||
|
ipv6 = false
|
||||||
|
}
|
||||||
|
|
||||||
|
if ipv6 && !cfg.ClientIPv6 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if !ipv6 && !cfg.ClientIPv4 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
query := queryString(ip) + "." + cfg.Zone
|
||||||
|
|
||||||
|
addrs, err := resolver.LookupHost(context.Background(), query)
|
||||||
|
if err != nil {
|
||||||
|
if dnsErr, ok := err.(*net.DNSError); ok && dnsErr.IsNotFound {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(addrs) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Attempt to extract explaination string.
|
||||||
|
txts, err := resolver.LookupTXT(context.Background(), query)
|
||||||
|
if err != nil || len(txts) == 0 {
|
||||||
|
// Not significant, include addresses as reason. Usually they are
|
||||||
|
// mapped to some predefined 'reasons' by BL.
|
||||||
|
return ListedErr{
|
||||||
|
Identity: ip.String(),
|
||||||
|
DNSBL: cfg.Zone,
|
||||||
|
Reason: strings.Join(addrs, "; "),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Some BLs provide multiple reasons (meta-BLs such as Spamhaus Zen) so
|
||||||
|
// don't mangle them by joining with "", instead join with "; ".
|
||||||
|
|
||||||
|
return ListedErr{
|
||||||
|
Identity: ip.String(),
|
||||||
|
DNSBL: cfg.Zone,
|
||||||
|
Reason: strings.Join(txts, "; "),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func queryString(ip net.IP) string {
|
||||||
|
ipv6 := true
|
||||||
|
if ipv4 := ip.To4(); ipv4 != nil {
|
||||||
|
ip = ipv4
|
||||||
|
ipv6 = false
|
||||||
|
}
|
||||||
|
|
||||||
|
res := strings.Builder{}
|
||||||
|
if ipv6 {
|
||||||
|
res.Grow(63) // 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0
|
||||||
|
} else {
|
||||||
|
res.Grow(15) // 000.000.000.000
|
||||||
|
}
|
||||||
|
|
||||||
|
for i := len(ip) - 1; i >= 0; i-- {
|
||||||
|
octet := ip[i]
|
||||||
|
|
||||||
|
if ipv6 {
|
||||||
|
// X.X
|
||||||
|
res.WriteString(strconv.FormatInt(int64(octet&0xf), 16))
|
||||||
|
res.WriteRune('.')
|
||||||
|
res.WriteString(strconv.FormatInt(int64((octet&0xf0)>>4), 16))
|
||||||
|
} else {
|
||||||
|
// X
|
||||||
|
res.WriteString(strconv.Itoa(int(octet)))
|
||||||
|
}
|
||||||
|
|
||||||
|
if i != 0 {
|
||||||
|
res.WriteRune('.')
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return res.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
// mangleErr adds smtp_* fields to DNSBL check error that mask
|
||||||
|
// details about used DNSBL.
|
||||||
|
func mangleErr(err error) error {
|
||||||
|
_, ok := err.(ListedErr)
|
||||||
|
if ok {
|
||||||
|
// ListenErr is already safe due to smtp_* fields.
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
smtpCode := 554
|
||||||
|
smtpEnchCode := exterrors.EnhancedCode{5, 7, 0}
|
||||||
|
if exterrors.IsTemporary(err) {
|
||||||
|
smtpCode = 451
|
||||||
|
smtpEnchCode = exterrors.EnhancedCode{4, 7, 0}
|
||||||
|
}
|
||||||
|
|
||||||
|
return exterrors.WithFields(err, map[string]interface{}{
|
||||||
|
"check": "dnsbl",
|
||||||
|
"reason": err.Error(),
|
||||||
|
"smtp_code": smtpCode,
|
||||||
|
"smtp_enchcode": smtpEnchCode,
|
||||||
|
"smtp_msg": "Internal error during policy check",
|
||||||
|
})
|
||||||
|
}
|
28
check/dnsbl/common_test.go
Normal file
28
check/dnsbl/common_test.go
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
package dnsbl
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TODO: Tests for checkIP and checkDomain once we have proper DNS mocking.
|
||||||
|
|
||||||
|
func TestQueryString(t *testing.T) {
|
||||||
|
test := func(ip, queryStr string) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
parsed := net.ParseIP(ip)
|
||||||
|
if parsed == nil {
|
||||||
|
panic("Malformed IP in test")
|
||||||
|
}
|
||||||
|
|
||||||
|
actual := queryString(parsed)
|
||||||
|
if actual != queryStr {
|
||||||
|
t.Errorf("want queryString(%s) to be %s, got %s", ip, queryStr, actual)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
test("2001:db8:1:2:3:4:567:89ab", "b.a.9.8.7.6.5.0.4.0.0.0.3.0.0.0.2.0.0.0.1.0.0.0.8.b.d.0.1.0.0.2")
|
||||||
|
test("2001::1:2:3:4:567:89ab", "b.a.9.8.7.6.5.0.4.0.0.0.3.0.0.0.2.0.0.0.1.0.0.0.0.0.0.0.1.0.0.2")
|
||||||
|
test("192.0.2.99", "99.2.0.192")
|
||||||
|
}
|
316
check/dnsbl/dnsbl.go
Normal file
316
check/dnsbl/dnsbl.go
Normal file
|
@ -0,0 +1,316 @@
|
||||||
|
package dnsbl
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/emersion/go-message/textproto"
|
||||||
|
"github.com/emersion/go-smtp"
|
||||||
|
"github.com/foxcpp/maddy/address"
|
||||||
|
"github.com/foxcpp/maddy/buffer"
|
||||||
|
"github.com/foxcpp/maddy/check"
|
||||||
|
"github.com/foxcpp/maddy/config"
|
||||||
|
"github.com/foxcpp/maddy/dns"
|
||||||
|
"github.com/foxcpp/maddy/log"
|
||||||
|
"github.com/foxcpp/maddy/module"
|
||||||
|
"github.com/foxcpp/maddy/target"
|
||||||
|
"golang.org/x/sync/errgroup"
|
||||||
|
)
|
||||||
|
|
||||||
|
type BL struct {
|
||||||
|
Zone string
|
||||||
|
|
||||||
|
ClientIPv4 bool
|
||||||
|
ClientIPv6 bool
|
||||||
|
|
||||||
|
EHLO bool
|
||||||
|
MAILFROM bool
|
||||||
|
}
|
||||||
|
|
||||||
|
var defaultBL = BL{
|
||||||
|
ClientIPv4: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
type DNSBL struct {
|
||||||
|
instName string
|
||||||
|
checkEarly bool
|
||||||
|
listedAction check.FailAction
|
||||||
|
inlineBls []string
|
||||||
|
bls []BL
|
||||||
|
|
||||||
|
resolver dns.Resolver
|
||||||
|
log log.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDNSBL(_, instName string, _, inlineArgs []string) (module.Module, error) {
|
||||||
|
return &DNSBL{
|
||||||
|
instName: instName,
|
||||||
|
inlineBls: inlineArgs,
|
||||||
|
|
||||||
|
resolver: net.DefaultResolver,
|
||||||
|
log: log.Logger{Name: "dnsbl"},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) Name() string {
|
||||||
|
return "dnsbl"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) InstanceName() string {
|
||||||
|
return bl.instName
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) Init(cfg *config.Map) error {
|
||||||
|
cfg.Bool("debug", false, false, &bl.log.Debug)
|
||||||
|
cfg.Bool("check_early", false, false, &bl.checkEarly)
|
||||||
|
cfg.Custom("listed_action", false, false,
|
||||||
|
func() (interface{}, error) {
|
||||||
|
return check.FailAction{Reject: true}, nil
|
||||||
|
}, check.FailActionDirective, &bl.listedAction)
|
||||||
|
cfg.AllowUnknown()
|
||||||
|
unmatched, err := cfg.Process()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, inlineBl := range bl.inlineBls {
|
||||||
|
cfg := defaultBL
|
||||||
|
cfg.Zone = inlineBl
|
||||||
|
go bl.testBL(cfg)
|
||||||
|
bl.bls = append(bl.bls, cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, node := range unmatched {
|
||||||
|
if err := bl.readBLCfg(node); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) readBLCfg(node config.Node) error {
|
||||||
|
var blCfg BL
|
||||||
|
|
||||||
|
cfg := config.NewMap(nil, &node)
|
||||||
|
cfg.Bool("client_ipv4", false, defaultBL.ClientIPv4, &blCfg.ClientIPv4)
|
||||||
|
cfg.Bool("client_ipv6", false, defaultBL.ClientIPv4, &blCfg.ClientIPv6)
|
||||||
|
cfg.Bool("ehlo", false, defaultBL.EHLO, &blCfg.EHLO)
|
||||||
|
cfg.Bool("mailfrom", false, defaultBL.EHLO, &blCfg.MAILFROM)
|
||||||
|
if _, err := cfg.Process(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, zone := range append([]string{node.Name}, node.Args...) {
|
||||||
|
// From RFC 5782 Section 7:
|
||||||
|
// >To avoid this situation, systems that use
|
||||||
|
// >DNSxLs SHOULD check for the test entries described in Section 5 to
|
||||||
|
// >ensure that a domain actually has the structure of a DNSxL, and
|
||||||
|
// >SHOULD NOT use any DNSxL domain that does not have correct test
|
||||||
|
// >entries.
|
||||||
|
// Sadly, however, many DNSBLs lack test records so at most we can
|
||||||
|
// log a warning. Also, DNS is kinda slow so we do checks
|
||||||
|
// asynchronously to prevent slowing down server start-up.
|
||||||
|
|
||||||
|
zoneCfg := blCfg
|
||||||
|
zoneCfg.Zone = zone
|
||||||
|
go bl.testBL(zoneCfg)
|
||||||
|
bl.bls = append(bl.bls, zoneCfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) testBL(listCfg BL) {
|
||||||
|
// Check RFC 5782 Section 5 requirements.
|
||||||
|
|
||||||
|
bl.log.DebugMsg("testing BL for RFC 5782 requirements...", "dnsbl", listCfg.Zone)
|
||||||
|
|
||||||
|
// 1. IPv4-based DNSxLs MUST contain an entry for 127.0.0.2 for testing purposes.
|
||||||
|
if listCfg.ClientIPv4 {
|
||||||
|
err := checkIP(bl.resolver, listCfg, net.IPv4(127, 0, 0, 2))
|
||||||
|
if err == nil {
|
||||||
|
bl.log.Msg("BL does not contain a test record for 127.0.0.2", "dnsbl", listCfg.Zone)
|
||||||
|
} else if _, ok := err.(ListedErr); !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2. IPv4-based DNSxLs MUST NOT contain an entry for 127.0.0.1.
|
||||||
|
err = checkIP(bl.resolver, listCfg, net.IPv4(127, 0, 0, 1))
|
||||||
|
if err != nil {
|
||||||
|
_, ok := err.(ListedErr)
|
||||||
|
if !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
bl.log.Msg("BL contains a record for 127.0.0.1", "dnsbl", listCfg.Zone)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if listCfg.ClientIPv6 {
|
||||||
|
// 1. IPv6-based DNSxLs MUST contain an entry for ::FFFF:7F00:2
|
||||||
|
mustIP := net.ParseIP("::FFFF:7F00:2")
|
||||||
|
|
||||||
|
err := checkIP(bl.resolver, listCfg, mustIP)
|
||||||
|
if err == nil {
|
||||||
|
bl.log.Msg("BL does not contain a test record for ::FFFF:7F00:2", "dnsbl", listCfg.Zone)
|
||||||
|
} else if _, ok := err.(ListedErr); !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2. IPv4-based DNSxLs MUST NOT contain an entry for 127.0.0.1.
|
||||||
|
mustNotIP := net.ParseIP("::FFFF:7F00:1")
|
||||||
|
err = checkIP(bl.resolver, listCfg, mustNotIP)
|
||||||
|
if err != nil {
|
||||||
|
_, ok := err.(ListedErr)
|
||||||
|
if !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
bl.log.Msg("BL contains a record for ::FFFF:7F00:1", "dnsbl", listCfg.Zone)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if listCfg.EHLO || listCfg.MAILFROM {
|
||||||
|
// Domain-name-based DNSxLs MUST contain an entry for the reserved
|
||||||
|
// domain name "TEST".
|
||||||
|
err := checkDomain(bl.resolver, listCfg, "test")
|
||||||
|
if err == nil {
|
||||||
|
bl.log.Msg("BL does not contain a test record for 'test' TLD", "dnsbl", listCfg.Zone)
|
||||||
|
} else if _, ok := err.(ListedErr); !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// ... and MUST NOT contain an entry for the reserved domain name
|
||||||
|
// "INVALID".
|
||||||
|
err = checkDomain(bl.resolver, listCfg, "invalid")
|
||||||
|
if err != nil {
|
||||||
|
_, ok := err.(ListedErr)
|
||||||
|
if !ok {
|
||||||
|
bl.log.Error("lookup error, bailing out", err, "dnsbl", listCfg.Zone)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
bl.log.Msg("BL contains a record for 'invalid' TLD", "dnsbl", listCfg.Zone)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) checkPreBody(ip net.IP, ehlo, mailFrom string) error {
|
||||||
|
eg := errgroup.Group{}
|
||||||
|
|
||||||
|
for _, list := range bl.bls {
|
||||||
|
list := list
|
||||||
|
eg.Go(func() error {
|
||||||
|
if list.ClientIPv4 || list.ClientIPv6 {
|
||||||
|
if err := checkIP(bl.resolver, list, ip); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if list.EHLO && ehlo != "" {
|
||||||
|
// Skip IPs in EHLO.
|
||||||
|
if strings.HasPrefix(ehlo, "[") && strings.HasSuffix(ehlo, "]") {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := checkDomain(bl.resolver, list, ehlo); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if list.MAILFROM && mailFrom != "" {
|
||||||
|
_, domain, err := address.Split(mailFrom)
|
||||||
|
if err != nil || domain == "" {
|
||||||
|
// Probably <postmaster> or <>, not much we can check.
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := checkDomain(bl.resolver, list, domain); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO: Whitelists support.
|
||||||
|
// ... if there is error and it is a ListenErr, then check whitelists
|
||||||
|
// for whether it is whitelisted.
|
||||||
|
|
||||||
|
return eg.Wait()
|
||||||
|
}
|
||||||
|
|
||||||
|
// CheckConnection implements module.EarlyCheck.
|
||||||
|
func (bl *DNSBL) CheckConnection(state *smtp.ConnectionState) error {
|
||||||
|
ip, ok := state.RemoteAddr.(*net.TCPAddr)
|
||||||
|
if !ok {
|
||||||
|
bl.log.Msg("non-TCP/IP source",
|
||||||
|
"src_addr", state.RemoteAddr,
|
||||||
|
"src_host", state.Hostname)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := bl.checkPreBody(ip.IP, state.Hostname, ""); err != nil {
|
||||||
|
return mangleErr(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type state struct {
|
||||||
|
bl *DNSBL
|
||||||
|
msgMeta *module.MsgMetadata
|
||||||
|
log log.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func (bl *DNSBL) CheckStateForMsg(msgMeta *module.MsgMetadata) (module.CheckState, error) {
|
||||||
|
return state{
|
||||||
|
bl: bl,
|
||||||
|
msgMeta: msgMeta,
|
||||||
|
log: target.DeliveryLogger(bl.log, msgMeta),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s state) CheckConnection() module.CheckResult {
|
||||||
|
ip, ok := s.msgMeta.SrcAddr.(*net.TCPAddr)
|
||||||
|
if !ok {
|
||||||
|
s.log.Msg("non-TCP/IP source")
|
||||||
|
return module.CheckResult{}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := s.bl.checkPreBody(ip.IP, s.msgMeta.SrcHostname, s.msgMeta.OriginalFrom); err != nil {
|
||||||
|
// TODO: Support per-list actions?
|
||||||
|
return s.bl.listedAction.Apply(module.CheckResult{
|
||||||
|
Reason: mangleErr(err),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.DebugMsg("ok")
|
||||||
|
|
||||||
|
return module.CheckResult{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (state) CheckSender(string) module.CheckResult {
|
||||||
|
return module.CheckResult{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (state) CheckRcpt(string) module.CheckResult {
|
||||||
|
return module.CheckResult{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (state) CheckBody(textproto.Header, buffer.Buffer) module.CheckResult {
|
||||||
|
return module.CheckResult{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (state) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
module.Register("dnsbl", NewDNSBL)
|
||||||
|
}
|
1
go.mod
1
go.mod
|
@ -26,6 +26,7 @@ require (
|
||||||
github.com/urfave/cli v1.20.0
|
github.com/urfave/cli v1.20.0
|
||||||
golang.org/x/crypto v0.0.0-20190923035154-9ee001bba392
|
golang.org/x/crypto v0.0.0-20190923035154-9ee001bba392
|
||||||
golang.org/x/net v0.0.0-20190923162816-aa69164e4478
|
golang.org/x/net v0.0.0-20190923162816-aa69164e4478
|
||||||
|
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e
|
||||||
google.golang.org/appengine v1.6.2 // indirect
|
google.golang.org/appengine v1.6.2 // indirect
|
||||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect
|
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect
|
||||||
)
|
)
|
||||||
|
|
2
go.sum
2
go.sum
|
@ -137,6 +137,8 @@ golang.org/x/net v0.0.0-20190923162816-aa69164e4478 h1:l5EDrHhldLYb3ZRHDUhXF7Om7
|
||||||
golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58 h1:8gQV6CLnAEikrhgkHFbMAEhagSSnXWGV915qUMm9mrU=
|
golang.org/x/sync v0.0.0-20190423024810-112230192c58 h1:8gQV6CLnAEikrhgkHFbMAEhagSSnXWGV915qUMm9mrU=
|
||||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e h1:vcxGaoTs7kV8m5Np9uUNQin4BrLOthgV7252N8V+FwY=
|
||||||
|
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
golang.org/x/sys v0.0.0-20190403152447-81d4e9dc473e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190403152447-81d4e9dc473e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20190412213103-97732733099d h1:+R4KGOnez64A81RvjARKc4UT5/tI9ujCIVX+P5KiHuI=
|
golang.org/x/sys v0.0.0-20190412213103-97732733099d h1:+R4KGOnez64A81RvjARKc4UT5/tI9ujCIVX+P5KiHuI=
|
||||||
|
|
1
maddy.go
1
maddy.go
|
@ -12,6 +12,7 @@ import (
|
||||||
_ "github.com/foxcpp/maddy/auth/shadow"
|
_ "github.com/foxcpp/maddy/auth/shadow"
|
||||||
_ "github.com/foxcpp/maddy/check/dkim"
|
_ "github.com/foxcpp/maddy/check/dkim"
|
||||||
_ "github.com/foxcpp/maddy/check/dns"
|
_ "github.com/foxcpp/maddy/check/dns"
|
||||||
|
_ "github.com/foxcpp/maddy/check/dnsbl"
|
||||||
_ "github.com/foxcpp/maddy/check/spf"
|
_ "github.com/foxcpp/maddy/check/spf"
|
||||||
_ "github.com/foxcpp/maddy/endpoint/imap"
|
_ "github.com/foxcpp/maddy/endpoint/imap"
|
||||||
_ "github.com/foxcpp/maddy/endpoint/smtp"
|
_ "github.com/foxcpp/maddy/endpoint/smtp"
|
||||||
|
|
|
@ -230,6 +230,126 @@ Action to take when SPF policy evaluates to a 'permerror' result.
|
||||||
|
|
||||||
Action to take when SPF policy evaluates to a 'temperror' result.
|
Action to take when SPF policy evaluates to a 'temperror' result.
|
||||||
|
|
||||||
|
# DNSBL lookup module (dnsbl)
|
||||||
|
|
||||||
|
The dnsbl module implements checking of source IP and hostnames against a set
|
||||||
|
of DNS-based Blackhole lists (DNSBLs).
|
||||||
|
|
||||||
|
Its configuration consists of module configuration directives and a set
|
||||||
|
of blocks specifing lists to use and kind of lookups to perform on them.
|
||||||
|
|
||||||
|
```
|
||||||
|
dnsbl {
|
||||||
|
debug no
|
||||||
|
check_early no
|
||||||
|
listed_action reject
|
||||||
|
|
||||||
|
# Lists configuration example.
|
||||||
|
dnsbl.example.org {
|
||||||
|
client_ipv4 yes
|
||||||
|
client_ipv6 no
|
||||||
|
ehlo no
|
||||||
|
mailfrom no
|
||||||
|
}
|
||||||
|
hsrbl.example.org {
|
||||||
|
client_ipv4 no
|
||||||
|
client_ipv6 no
|
||||||
|
ehlo yes
|
||||||
|
mailfrom yes
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Inline arguments
|
||||||
|
|
||||||
|
When used inline, arguments specify the list of IP-based BLs to use.
|
||||||
|
|
||||||
|
The following configurations are equivalent.
|
||||||
|
|
||||||
|
```
|
||||||
|
check {
|
||||||
|
dnsbl dnsbl.example.org dnsbl2.example.org
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
check {
|
||||||
|
dnsbl {
|
||||||
|
dnsbl.example.org dnsbl2.example.org {
|
||||||
|
client_ipv4 yes
|
||||||
|
client_ipv6 no
|
||||||
|
ehlo no
|
||||||
|
mailfrom no
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Configuration directives
|
||||||
|
|
||||||
|
*Syntax*: debug _boolean_ ++
|
||||||
|
*Default*: global directive value
|
||||||
|
|
||||||
|
Enable verbose logging.
|
||||||
|
|
||||||
|
*Syntax*: check_early _boolean_ ++
|
||||||
|
*Default*: no
|
||||||
|
|
||||||
|
Check BLs before mail delivery starts and silently reject blacklisted clients.
|
||||||
|
|
||||||
|
In particular, this means:
|
||||||
|
- No logging is done for rejected messages.
|
||||||
|
- listed_action takes no effect. It is always reject.
|
||||||
|
- defer_sender_reject from SMTP configuration takes no effect.
|
||||||
|
|
||||||
|
If you often get hit by spam attacks, this is recommended to enable this
|
||||||
|
setting to save server resources.
|
||||||
|
|
||||||
|
*Syntax*: listed_action reject|quarantine|ignore ++
|
||||||
|
*Default*: reject
|
||||||
|
|
||||||
|
Action to take when one of the client identifiers is listed on the DNSBL.
|
||||||
|
|
||||||
|
## List configuration
|
||||||
|
|
||||||
|
```
|
||||||
|
dnsbl.example.org dnsbl.example.com {
|
||||||
|
client_ipv4 yes
|
||||||
|
client_ipv6 no
|
||||||
|
ehlo no
|
||||||
|
mailfrom no
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Directive name and arguments specify the actual DNS zone to query when checking
|
||||||
|
the list. Using multiple arguments is equivalent to specifying the same
|
||||||
|
configuration separately for each list.
|
||||||
|
|
||||||
|
*Syntax*: client_ipv4 _boolean_ ++
|
||||||
|
*Default*: yes
|
||||||
|
|
||||||
|
Whether to check address of the IPv4 clients against the list.
|
||||||
|
|
||||||
|
*Syntax*: client_ipv6 _boolean_ ++
|
||||||
|
*Default*: yes
|
||||||
|
|
||||||
|
Whether to check address of the IPv6 clients against the list.
|
||||||
|
|
||||||
|
*Syntax*: ehlo _boolean_ ++
|
||||||
|
*Default*: no
|
||||||
|
|
||||||
|
Whether to check hostname specified n the HELO/EHLO command
|
||||||
|
against the list.
|
||||||
|
|
||||||
|
This works correctly only with domain-based DNSBLs.
|
||||||
|
|
||||||
|
*Syntax*: mailfrom _boolean_ ++
|
||||||
|
*Default*: no
|
||||||
|
|
||||||
|
Whether to check domain part of the MAIL FROM address against the list.
|
||||||
|
|
||||||
|
This works correctly only with domain-based DNSBLs.
|
||||||
|
|
||||||
# DKIM signing module (sign_dkim)
|
# DKIM signing module (sign_dkim)
|
||||||
|
|
||||||
sign_dkim module is a modifier that signs messages using DKIM
|
sign_dkim module is a modifier that signs messages using DKIM
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue