Commit graph

20 commits

Author SHA1 Message Date
fox.cpp
bf188e454f
Move most code from the repo root into subdirectories
The intention is to keep to repo root clean while the list of packages
is slowly growing.

Additionally, a bunch of small (~30 LoC) files in the repo root is
merged into a single maddy.go file, for the same reason.

Most of the internal code is moved into the internal/ directory. Go
toolchain will make it impossible to import these packages from external
applications.

Some packages are renamed and moved into the pkg/ directory in the root.
According to https://github.com/golang-standards/project-layout this is
the de-facto standard to place "library code that's ok to use by
external applications" in.

To clearly define the purpose of top-level directories, README.md files
are added to each.
2019-12-06 01:35:12 +03:00
fox.cpp
e6b1e0c5c7
msgpipeline: Log check failures if both Quarantine and Reject are false
As noted in maddy-filters(5), action 'ignore' is useful for testing of
new checks without actually enforcing them. Though, it is essentially
useless without the ability to see check results.
2019-11-29 00:59:51 +03:00
fox.cpp
896fed7e86
Move most of the DMARC code to check/dmarc
Some parts were implemented in msgpipeline package poorly hooked to some
bits in check/dmarc. Now it is fully in check/dmarc and pipeline code
simply calls two functions.

Also I took that chance to add proper documentation to check/dmarc with
the intention to contribute some parts to the go-msgauth library later.
2019-11-25 21:09:12 +03:00
fox.cpp
5826439ba4
check/dmarc: Correctly implement relaxed alignment check
Relaxed alignment is defined by RFC 7489 as equality of eTLD+1 of
checked identifier and eTLD+1 or the RFC5322.From domain. For example,
sub1.example.org and sub2.example.org are in alignment. Strict alignment
requires the exact equality of identifiers. In both cases, the use of eTLD+1
instead of the domain itself can lead to false failures.

Hence, EvaluateAlignment function now accepts RFC5322.From domain instead of
Organizational Domain (eTLD+1).
2019-11-24 17:36:01 +03:00
fox.cpp
f7e5a6e974
check/dmarc: Provide more context information in case of rejection
For quarantined messsages, the Authentication-Results header provides
all information necessary for troubleshooting. When the message is
rejected altogether, there is no information other than opaque 'DMARC
check failed'. With this commit, log message will contain information
about DKIM and SPF checks status and corresponding identifiers.
2019-11-24 14:32:04 +03:00
fox.cpp
e55cd03baf
Unwrap DNS errors into annotated exterrors objects
This excludes useless details from logs, such as used DNS server.
2019-11-19 00:22:22 +03:00
fox.cpp
080ba76f61
check/dmarc: Return 'none' if required checks are not executed
Better to bail out in a interoperability-friendly way than to produce a
false positives.
2019-11-18 19:28:38 +03:00
fox.cpp
a208a8af21
msgpieline: Fix data race in FetchRecord and applyResults
applyResults modifies the header while FetchRecord (running in parallel
calls extractDomains that reads it.

Additionally, another race condition was caused by go-mockdns not
copying the slice before returning, that was addressed upstream:
* ed42e5b Copy slice before returning it from Lookup*
2019-11-16 23:10:50 +03:00
fox.cpp
76754f0fa1
Improve error handling in DMARC code
Notably, properly fallback to _dmarc.orgdomain if _dmarc.fromdomain
provides no policy records.

Also, add hooks for tests.
2019-11-15 01:08:19 +03:00
fox.cpp
2d64bf17f9
msgpipeline: Don't call CheckSender/CheckRcpt multiple times for one check
Closes #161.
2019-11-14 04:56:21 +03:00
fox.cpp
0624bac9c5
msgpipeline: Fix scopelint warning in check runner
This is the actual problem and can cause check to see the wrong
recipients in some (very rare) circumstances.
2019-11-09 21:12:55 +03:00
fox.cpp
af4f180503
msgpipeline: Allow to chain pipelines
This allows for some complex but useful configurations, such as making
decision on delivery target based on the result of per-destination
address rewriting. One example where that can be useful is aliasing
local address to a remote address in a way that can't make the server
an open relay.
2019-11-07 22:39:04 +03:00
fox.cpp
6f6064313e
Add panic handlers to goroutine creators
This includes: queue dispatch, check runner and some checks (only SPF
atm) doing various stuff in parallel to the main delivery flow.

Queue panic handler drops the message that caused the panic from queue
to avoid further errors. It is assumed that most panics are caused due
to corruption of per-message state, so it is possible to reasonably
recover from it by stopping attempts to handle the problematic message.

NDN is not generated in this case, since it could cause interaction with
the state of a possibly corrupted message. This could change in the
future, as per RFC 5321 the server "MUST NOT lose the message for frivolous
reasons".

Additionally, when panic causes SMTP-time rejection, the server returns
a 4xx code, essentially deferring the message instead of dropping it.
That's the safety net for cases where panic is caused by a transient
problem (e.g. a race condition).
2019-11-06 18:58:16 +03:00
fox.cpp
cf9e81d8a1
Rework how error inspection and logging is done
Previous error reporting code was inconsistent in terms of what is
logged, when and by whom. This caused several problems such as: logs
missing important error context, duplicated error messages, too verbose
messages, etc.

Instead of logging all generated errors, module should log
only errors it 'handles' somehow and does not simply pass it to the
caller. This removes duplication, however, also it removes context
information. To fix this, exterrors package was extended to provide
utilities for error wrapping. These utilities provide ability to
'attach' arbitrary key-value ('fields') pairs to any error object while
preserving the original value (using to Go 1.13 error handling
primitives).

In additional to solving problems described above this commit makes logs
machine-readable, creating the possibility for automated analysis.
Three new functions were added to the Logger object, providing
loosely-typed structured logging. However, they do not completely
replace plain logging and are used only where they are useful (to allow
automated analysis of message processing logs).

So, basically, instead of being logged god knows where and when,
all context information is attached to the error object and then it is
passed up until it is handled somewhere, at this point it is logged
together with all context information and then discarded.
2019-11-02 05:30:48 +03:00
fox.cpp
dd9f4da684
check/dmarc: Use SPFResult for SPF alignment check
Old code was marking alignment check as 'passing' without actual
authentication of the used identifier since we don't implement SPF (see
 #91 for related discussion).

This commit effectively disables SPF alignment completely. Relevant code
is still here, though, if we will change decision on SPF support in the
future.

DMARC (RFC 7489) does not require support of both authentication
mechanisms.
2019-10-26 22:36:12 +03:00
fox.cpp
d663418eb9
msgpipeline: Handle lookup failures in applyDMARC 2019-10-25 00:24:49 +03:00
fox.cpp
5a9ecabcab
msgpipeline: Fix go vet warning 2019-10-22 03:20:29 +03:00
fox.cpp
ad4c04452a
Minimal DMARC checking implementation 2019-10-21 20:01:21 +03:00
fox.cpp
ab1fdac45d
Remove check scoring system
It fits poorly with limited amount of checks that are (and will be)
implemented in maddy.

Advanced filtering that requires "spam score" logic should be performed
by external software such as rspamd. At this point duplicating that
logic in maddy makes no sense, since it is highly problematic to
integrate it with external software.
2019-10-19 19:12:44 +03:00
fox.cpp
028d8b914c
Rename dispatcher to "msgpipeline"
New name more precisely describes what it is doing now. It was initally
meant to be more generic and usable for other purposes, but I don't
think we will need that flexibility.
2019-10-13 18:42:51 +03:00
Renamed from dispatcher/check_runner.go (Browse further)