Commit graph

20 commits

Author SHA1 Message Date
Gusted
b8d8ca6301 refactor(gofumpt): run gofumpt over the code 2021-08-10 19:33:54 +03:00
fox.cpp
5c143530ff
Merge branch 'master' into dev
# Conflicts:
#	framework/address/norm.go
#	go.mod
#	go.sum
#	internal/target/remote/security.go
2021-07-10 00:23:28 +03:00
fox.cpp
d0487d7a6d
Implement client timeouts for target.remote and target.smtp
Closes #239.
2021-07-09 22:48:57 +03:00
fox.cpp
d6a0324ae0
Force domains to be interpreted as FQDN where this is required by standards
This includes email addresses and EHLO in SMTP.

See #311 for details.
2020-12-12 01:31:41 +03:00
fox.cpp
2d18ff5a30
MIT => GPLv3; Add license/copyright notices everywhere 2020-07-22 16:12:26 +03:00
fox.cpp
6c0b947464
target/remote: Use modules system for MX authentication policies
Allow extensibility via external plugins
2020-07-15 01:31:06 +03:00
fox.cpp
1ee501ba99
Fix two typos 2020-07-15 01:31:06 +03:00
fox.cpp
bcceec4fe4
Extract several packages to form a public API 2020-07-15 01:31:06 +03:00
fox.cpp
7f7393e480
targets/remote: Implement experimental connection caching
Closes #235.
2020-06-13 21:18:20 +03:00
fox.cpp
30c50b6a91
Implement SMTP REQUIRETLS support
Closes #123.
2020-06-10 19:51:08 +03:00
fox.cpp
e258555592
Implement Prometheus metrics for SMTP pipeline
Closes #236.
2020-06-10 00:23:12 +03:00
fox.cpp
c3ebbb05a0
Generalize message flow restrictions
Set of flow restrictions is represented as a "limits" module instance
that can be either created inline via "limits" directive in some modules
(including "remote" target and "smtp" endpoint) or defined globally and
referenced in configuration of modules mentioned above.

This permits a variety of use cases, including shared and separate
counters for various endpoints and also "modules group" style sharing
described in #195.
2020-02-15 17:02:48 +03:00
fox.cpp
c0a73bc3d0
target/remote: Implement STARTTLS Everywhere list support 2019-12-28 18:41:55 +03:00
fox.cpp
3cc284ba54
target/remote: Clean up security policies checking
Decouple it from connection estabilishment logic to allow further
extensions without turning it into bloody incomprehensible mess.
2019-12-28 18:41:55 +03:00
fox.cpp
ef61216b4e
target/remote: Use foxcpp/go-mtasts
It has a number of design changes to make it more generic and also misc
improvements. The big deal here is the EFF preload list support.
2019-12-28 18:41:55 +03:00
fox.cpp
9f523c8c61
target/remote: Rework MX records authentication and TLS enforcement
Previous approach consisted of multiple independent options with unknown
interaction between each other and not offering enough flexibility for
local policy configuration.

Additionally, it was not possible to implement downgrade protection
mentioned in #178 because it was not clear what is "downgrade" since
options were not related in any linear order, this commit makes it
explicit via the "security levels" system:
MX: DNSSEC > MTA-STS > Nothing
TLS: Authenticated+Encrypted > Encrypted > Plaintext

Note DNSSEC and MTA-STS being different levels, they provide different
security guarantees. Keeping them together under "authenticated" level
would not provide enough granularity for levels-based downgrade
protection and local policies.

'common_domain' MX authentication option is removed. It was offering no
real protection and therefore is was problematic to use together with
planned downgrade protection.

All security level errors are marked as temporary to force requeueing
and allow local admin to troubleshoot them without losing messages.

'remote' tests are changed to use testTarget function to initialize
tested module instance, since security levels mapping requires some
pre-initialization.

Support for IP literals in address domain-part is disabled because it
is incompatible with the new verification logic and was broken anyway
(#176).
2019-12-13 21:11:03 +03:00
fox.cpp
b76ecfd19b
target/remote: Permit PKIX override for DANE-TA
overridePKIX value is not used anywhere now, but will be in the
implementation of "security levels".
2019-12-13 17:31:36 +03:00
fox.cpp
eb8a974b8f
target/remote: Attempt TLS without authentication instead of plaintext
TLS without authentication is still better than no TLS at all.

To save latency in transactions with a misconfigured recipient server
that cannot use TLS at all but still advertises STARTTLS support,
downgrade to non-authenticated TLS is attempted only on verification
errors (x509.UnknownAuthorityError or x509.HostnameError) and malformed
certificate errors (x509.ConstraintViolationError and
x509.CertificateInvalidError). In all other cases 'remote' module
fallbacks to plaintext directly.

While rearranging code to support this, some additional changes were
made to allow simplier implementation of security levels idea from #178.

See https://tools.ietf.org/html/rfc7435.
See #178.
2019-12-13 17:31:36 +03:00
fox.cpp
c7f3e0caaa
target/remote: Implement basic DANE support
Enforce TLS if there is a "secure" TLSA record for the recipient MX.

Closes #50.
2019-12-13 17:31:36 +03:00
fox.cpp
26452dd8dd
target/remote: Rewrite connection part to allow more concurrency
As revealed by latency tracing using runtime/trace, MTA-STS cache miss
essentially doubles the connection time for outbound delivery. This is
mostly because MTA-STS lookup have to estabilish a TCP+TLS connection to
obtain the policy text (shame on Google for pushing that terribly
misdesigned protocol, but, well, it is better than nothing so we adopt
it).

Additionally, there is a number of additional DNS lookups needed (e.g.
TLSA record for DANE).  This commit rearranges connection code so it is
possible to run all "additional" queries in parallel with the connection
estabilishment. However, this changes the behavior of TLS requirement
checks (including MTA-STS). The connection to the candidate MX is
already estabilished and STARTTLS is always attempted if it is
available. Only after that the policy check is done, using the result of
TLS handshake attempt (if any). If for whatever reason, the candidate MX
cannot be used, the connection is then closed. This might bring
additional overhead in case of configuration errors on the recipient
side, but it is believed to not be a major problem since this should not
happen often.
2019-12-13 17:31:35 +03:00