Commit graph

29 commits

Author SHA1 Message Date
fox.cpp
be0ec6b7cf
target/smtp: Check-in accidentally reverted attempt_starttls changes 2025-01-25 14:51:35 +03:00
fox.cpp
d7dd6ef845
Fix more linter warnings 2025-01-24 23:44:50 +03:00
fox.cpp
dbc030c267
Clean-up lint warnings 2025-01-24 23:34:09 +03:00
fox.cpp
78e4600a17
Upgrade all dependencies
1. go-smtp is replaced by a fork that reverts StartTLS removal.
2. SASL LOGIN is no longer supported by upstream go-sasl, readded disabled by default.
3. Updated endpoint code to match new go-smtp authentication interfaces.
4. certmagic repo had some renames
5. Minimum Go version increased to 1.23 to match dependencies.
2025-01-24 21:29:48 +03:00
fox.cpp
4a69c9e944
Fix-up 7bdc981eac 2024-01-30 01:24:44 +03:00
fox.cpp
7bdc981eac
target/remote: Improve handling of stale connections in pool
1. Apply conn_max_idle_time to each connection individually,
not pool bucket.

2. Include local_addr in some log messages to help identify
individual connections in the pool.

3. Run conn.Close outside of keysLock and asynchronously. Ensures
slow server or dead connection won't cause pool operations to hang.

4. Set 5 second timeout for QUIT call in conn.Close.
To detect dead connections faster, there is no reason for any
server to take more than 5 seconds to respond to QUIT.

See #675.
2024-01-29 23:52:05 +03:00
fox.cpp
db0874c2be
Migrate to latest go-smtp version
Fixes #661 among other minor things.
2024-01-21 14:41:57 +03:00
fox.cpp
b8ff1168a0
smtpconn/pool: Fix idle connections (almost) never cleaned up
See #596.
2023-08-23 16:20:50 +03:00
fox.cpp
b77766438d
Correctly fix #453 2022-02-16 20:19:47 +03:00
fox.cpp
90559bedb1
Fix errors from LMTP downstream not being correctly converted into SMTP error
Closes #453.
2022-02-16 20:00:00 +03:00
Gusted
32b75262ad refactor(ifelse): shorten logic where possible 2021-08-10 19:33:54 +03:00
fox.cpp
d0487d7a6d
Implement client timeouts for target.remote and target.smtp
Closes #239.
2021-07-09 22:48:57 +03:00
fox.cpp
2d18ff5a30
MIT => GPLv3; Add license/copyright notices everywhere 2020-07-22 16:12:26 +03:00
fox.cpp
1ee501ba99
Fix two typos 2020-07-15 01:31:06 +03:00
fox.cpp
bcceec4fe4
Extract several packages to form a public API 2020-07-15 01:31:06 +03:00
fox.cpp
03d9e52627
Rename modules and introduce namespace-aware module name lookups
See #248.
2020-07-15 01:31:05 +03:00
fox.cpp
7f7393e480
targets/remote: Implement experimental connection caching
Closes #235.
2020-06-13 21:18:20 +03:00
fox.cpp
c132a849f1
Update dependencies, switch to upstream for go-milter and go-smtp 2020-05-23 02:56:55 +03:00
fox.cpp
980da86939
target/smtp_downstream: Implement lmtp_downstream module
Closes #205.
2020-05-09 01:00:41 +03:00
fox.cpp
9b279735e8
Address several TODO comments
Several comments were removed since they are not worth the trouble.
A few minor issues were addressed.
Most of remaining comments got corresponding GitHub issues assigned.
2020-03-05 02:26:30 +03:00
fox.cpp
e3a438a3c7
Rewrite smtpconn SMTPUTF8 tests, fix code duplication in some other tests
Also drop 'dupl' from golangci.yml. It is not very useful for constant
use.
2020-03-01 02:36:54 +03:00
fox.cpp
c8768da05c
Clean unnecessry whitespace 2020-03-01 02:36:54 +03:00
fox.cpp
ff81f74b5b
smtpconn: Rewrite 552 code into 452
Closes #149.
2020-02-16 20:03:56 +03:00
fox.cpp
9f523c8c61
target/remote: Rework MX records authentication and TLS enforcement
Previous approach consisted of multiple independent options with unknown
interaction between each other and not offering enough flexibility for
local policy configuration.

Additionally, it was not possible to implement downgrade protection
mentioned in #178 because it was not clear what is "downgrade" since
options were not related in any linear order, this commit makes it
explicit via the "security levels" system:
MX: DNSSEC > MTA-STS > Nothing
TLS: Authenticated+Encrypted > Encrypted > Plaintext

Note DNSSEC and MTA-STS being different levels, they provide different
security guarantees. Keeping them together under "authenticated" level
would not provide enough granularity for levels-based downgrade
protection and local policies.

'common_domain' MX authentication option is removed. It was offering no
real protection and therefore is was problematic to use together with
planned downgrade protection.

All security level errors are marked as temporary to force requeueing
and allow local admin to troubleshoot them without losing messages.

'remote' tests are changed to use testTarget function to initialize
tested module instance, since security levels mapping requires some
pre-initialization.

Support for IP literals in address domain-part is disabled because it
is incompatible with the new verification logic and was broken anyway
(#176).
2019-12-13 21:11:03 +03:00
fox.cpp
eb8a974b8f
target/remote: Attempt TLS without authentication instead of plaintext
TLS without authentication is still better than no TLS at all.

To save latency in transactions with a misconfigured recipient server
that cannot use TLS at all but still advertises STARTTLS support,
downgrade to non-authenticated TLS is attempted only on verification
errors (x509.UnknownAuthorityError or x509.HostnameError) and malformed
certificate errors (x509.ConstraintViolationError and
x509.CertificateInvalidError). In all other cases 'remote' module
fallbacks to plaintext directly.

While rearranging code to support this, some additional changes were
made to allow simplier implementation of security levels idea from #178.

See https://tools.ietf.org/html/rfc7435.
See #178.
2019-12-13 17:31:36 +03:00
fox.cpp
26452dd8dd
target/remote: Rewrite connection part to allow more concurrency
As revealed by latency tracing using runtime/trace, MTA-STS cache miss
essentially doubles the connection time for outbound delivery. This is
mostly because MTA-STS lookup have to estabilish a TCP+TLS connection to
obtain the policy text (shame on Google for pushing that terribly
misdesigned protocol, but, well, it is better than nothing so we adopt
it).

Additionally, there is a number of additional DNS lookups needed (e.g.
TLSA record for DANE).  This commit rearranges connection code so it is
possible to run all "additional" queries in parallel with the connection
estabilishment. However, this changes the behavior of TLS requirement
checks (including MTA-STS). The connection to the candidate MX is
already estabilished and STARTTLS is always attempted if it is
available. Only after that the policy check is done, using the result of
TLS handshake attempt (if any). If for whatever reason, the candidate MX
cannot be used, the connection is then closed. This might bring
additional overhead in case of configuration errors on the recipient
side, but it is believed to not be a major problem since this should not
happen often.
2019-12-13 17:31:35 +03:00
fox.cpp
c4ea9a730f
Instrument the SMTP code using runtime/trace
runtime/trace together with 'go tool trace' provides extremely powerful
tooling for performance (latency) analysis. Since maddy prides itself on
being "optimized for concurrency", it is a good idea to actually live up
to this promise.

Closes #144. No need to reinvent the wheel. The original issue
proposed a solution to use in production to detect "performance
anomalies", it is possible to use runtime/trace in production too, but
the corresponding flag to enable profiler endpoint is hidden behind the
'debugflags' build tag at the moment.

For SMTP code, the basic latency information can be obtained from
regular logs since they include timestamps with millisecond granularity.
After the issue is apparent, it is possible to deploy the server
executable compiled with tracing support and obtain more information

... Also add missing context.Context arguments to smtpconn.C.
2019-12-13 17:31:35 +03:00
fox.cpp
9e5bb288b3
Fix a bunch of grammar errors in messages around the code base 2019-12-13 17:31:35 +03:00
fox.cpp
bf188e454f
Move most code from the repo root into subdirectories
The intention is to keep to repo root clean while the list of packages
is slowly growing.

Additionally, a bunch of small (~30 LoC) files in the repo root is
merged into a single maddy.go file, for the same reason.

Most of the internal code is moved into the internal/ directory. Go
toolchain will make it impossible to import these packages from external
applications.

Some packages are renamed and moved into the pkg/ directory in the root.
According to https://github.com/golang-standards/project-layout this is
the de-facto standard to place "library code that's ok to use by
external applications" in.

To clearly define the purpose of top-level directories, README.md files
are added to each.
2019-12-06 01:35:12 +03:00