Commit graph

49 commits

Author SHA1 Message Date
fox.cpp
c3ebbb05a0
Generalize message flow restrictions
Set of flow restrictions is represented as a "limits" module instance
that can be either created inline via "limits" directive in some modules
(including "remote" target and "smtp" endpoint) or defined globally and
referenced in configuration of modules mentioned above.

This permits a variety of use cases, including shared and separate
counters for various endpoints and also "modules group" style sharing
described in #195.
2020-02-15 17:02:48 +03:00
fox.cpp
100ed13784
limiters: Generalize RateSet and rename to BucketSet
Makes it reusable with other limiters e.g. concurrency limiter.
2020-02-15 17:02:47 +03:00
fox.cpp
23a3097591
msgpipeline: Register pipeline as a delivery target module
Allows pipeline routing to be used in places where a regular target is
required. Also allows to share parts of pipeline configurations on the
semantical level (instead of lexical level as it goes with config
snippets), see #195.
2020-02-15 17:02:47 +03:00
fox.cpp
3b888fba61
msgpipeline: Refactor modify{} blocks to work as a "module group" 2020-02-15 00:18:23 +03:00
fox.cpp
708bbd1d20
msgpipeline: Implement same cfg block reuse as mx_auth 2020-02-14 23:32:29 +03:00
fox.cpp
5fa11e8597
target/remote: Allow to share outbound SMTP policies via top-level config blocks
See #195.
2020-02-14 22:33:28 +03:00
fox.cpp
9396e12e89
config/module: Add GroupFromNode utility for use in module groups 2020-02-14 21:59:50 +03:00
fox.cpp
8bdf039d80
Fix linter warnings
cmd/maddyctl: Silence errcheck warning for TcSetAttr.
check/command: Log Process.Interrupt errors.
check/dnsbl: Remove unused listedAction field.
config/lexer: Fix typo in comment.
2020-02-08 03:32:28 +03:00
fox.cpp
e5e2fa1b92
config/lexer: Fix missing 'return nil, err' line 2020-02-08 03:24:39 +03:00
fox.cpp
56ffdff07f
storage/sql: Enable I18NLEVEL=1 IMAP extension
go-imap-sql is already Unicode-aware so no other changes are needed.
I18NLEVEL=2 is not generally worth the effort so it is ignored.
2020-02-08 03:23:00 +03:00
fox.cpp
4f12ec4c99
target/remote: Fix race condition in MTASTS test
https://builds.sr.ht/~emersion/job/147975
2020-02-07 23:00:28 +03:00
fox.cpp
102770d443
config/lexer: Do not panic on I/O errors 2020-02-04 20:00:20 +03:00
fox.cpp
93cd9525f4
Unbreak PAM/shadow authentication support
Implement minimal version of removed auth_perdomain directive
specifically for these modules.

Closes #172.
2020-02-04 19:03:24 +03:00
fox.cpp
14505f4de1
config: Reload TLS server certificates once in a minute
Use of inotify and possibly other mechanisms poses portability risks.
Notably, "cross-platform" abstractions such as fsnotify library remove
access to certain features that are important to use it correctly in
some cases e.g. it is preferable to listen only for IN_CLOSE_WRITE on
Linux instead of IN_MODIFY to prevent races and unexpected failures.

Pooling approach avoids such problems by either running reload code at a
different time than actual renewal or retrying later if parse fails.
With certificates being renewed before expiry (e.g. 1 week before) delay
is not a signficiant problem.

Closes #160.
2020-01-02 19:12:10 +03:00
fox.cpp
e2cfa47a86
config: Reload TLS certificates on SIGUSR2 2020-01-02 19:12:10 +03:00
fox.cpp
1d06f8ae79
modify/alias_file: Reload aliases on SIGUSR2 2020-01-02 13:22:28 +03:00
fox.cpp
ea40a8fbc5
Implement global callbacks for "shutdown" and "reload"
This allows modules (and any other code) to implement arbitrary actions
on server shutdown and "reload". Later will be used to address issues
like #160. There are no plans to implement complete configuration
reloading, however, since it adds a lot of problems to the modules
framework and it is believed to be "not worth it" at the moment.

Closes #130.
2020-01-02 12:26:32 +03:00
fox.cpp
1b661f6eab
target/remote: Fix race conditions in tests initialization 2019-12-29 19:27:56 +03:00
fox.cpp
bafedd5792
modify/dkim: Do not refold the signature field
Closes #187.
2019-12-29 19:06:07 +03:00
fox.cpp
3593a0b7ae
modify/dkim: Fix the wrong RSA key format being used for .dns file
The DNS record uses X.509 subjectPublicKeyInfo, not bare RFC 8017
RSAPublicKey.
2019-12-28 18:41:55 +03:00
fox.cpp
4ca9cc2d59
storage/sql: Fix the race between Close and EnableUpdatePipe goroutine 2019-12-28 18:41:55 +03:00
fox.cpp
c0a73bc3d0
target/remote: Implement STARTTLS Everywhere list support 2019-12-28 18:41:55 +03:00
fox.cpp
3cc284ba54
target/remote: Clean up security policies checking
Decouple it from connection estabilishment logic to allow further
extensions without turning it into bloody incomprehensible mess.
2019-12-28 18:41:55 +03:00
fox.cpp
ef61216b4e
target/remote: Use foxcpp/go-mtasts
It has a number of design changes to make it more generic and also misc
improvements. The big deal here is the EFF preload list support.
2019-12-28 18:41:55 +03:00
letto4135
bca4b7030e config: Changed yes/no to accept different true/false type values (#183).
Added different values to the acceptable yes/no per issue #181. Also handled the case of the input by changing to lowercase.

Closes #181.
2019-12-20 15:00:45 +00:00
fox.cpp
282d8e75a8
testutils: Mark DoTestDelivery as a test helper 2019-12-13 21:37:53 +03:00
fox.cpp
47d4a214d3
log: Ignore Logger.Error calls with nil error
Added as a safeguard since to avoid panic because further code assumes
non-nil argument.
2019-12-13 21:34:31 +03:00
fox.cpp
391133130f
dns: Ignore AD flag from non-local resolvers
Closes #175.
2019-12-13 21:11:03 +03:00
fox.cpp
0e9754206b
check/dnsbl: Implement a simple scoring system
Similar to global scoring system that was removed before, but works only
for DNSBL. It is simplier and only actually useful for BLs, since
rejecting/quarantining messages based on a single listing is usually bad
idea and leads to a high false positives rate.
2019-12-13 21:11:03 +03:00
fox.cpp
9f523c8c61
target/remote: Rework MX records authentication and TLS enforcement
Previous approach consisted of multiple independent options with unknown
interaction between each other and not offering enough flexibility for
local policy configuration.

Additionally, it was not possible to implement downgrade protection
mentioned in #178 because it was not clear what is "downgrade" since
options were not related in any linear order, this commit makes it
explicit via the "security levels" system:
MX: DNSSEC > MTA-STS > Nothing
TLS: Authenticated+Encrypted > Encrypted > Plaintext

Note DNSSEC and MTA-STS being different levels, they provide different
security guarantees. Keeping them together under "authenticated" level
would not provide enough granularity for levels-based downgrade
protection and local policies.

'common_domain' MX authentication option is removed. It was offering no
real protection and therefore is was problematic to use together with
planned downgrade protection.

All security level errors are marked as temporary to force requeueing
and allow local admin to troubleshoot them without losing messages.

'remote' tests are changed to use testTarget function to initialize
tested module instance, since security levels mapping requires some
pre-initialization.

Support for IP literals in address domain-part is disabled because it
is incompatible with the new verification logic and was broken anyway
(#176).
2019-12-13 21:11:03 +03:00
fox.cpp
b76ecfd19b
target/remote: Permit PKIX override for DANE-TA
overridePKIX value is not used anywhere now, but will be in the
implementation of "security levels".
2019-12-13 17:31:36 +03:00
fox.cpp
eb8a974b8f
target/remote: Attempt TLS without authentication instead of plaintext
TLS without authentication is still better than no TLS at all.

To save latency in transactions with a misconfigured recipient server
that cannot use TLS at all but still advertises STARTTLS support,
downgrade to non-authenticated TLS is attempted only on verification
errors (x509.UnknownAuthorityError or x509.HostnameError) and malformed
certificate errors (x509.ConstraintViolationError and
x509.CertificateInvalidError). In all other cases 'remote' module
fallbacks to plaintext directly.

While rearranging code to support this, some additional changes were
made to allow simplier implementation of security levels idea from #178.

See https://tools.ietf.org/html/rfc7435.
See #178.
2019-12-13 17:31:36 +03:00
fox.cpp
c7f3e0caaa
target/remote: Implement basic DANE support
Enforce TLS if there is a "secure" TLSA record for the recipient MX.

Closes #50.
2019-12-13 17:31:36 +03:00
fox.cpp
26452dd8dd
target/remote: Rewrite connection part to allow more concurrency
As revealed by latency tracing using runtime/trace, MTA-STS cache miss
essentially doubles the connection time for outbound delivery. This is
mostly because MTA-STS lookup have to estabilish a TCP+TLS connection to
obtain the policy text (shame on Google for pushing that terribly
misdesigned protocol, but, well, it is better than nothing so we adopt
it).

Additionally, there is a number of additional DNS lookups needed (e.g.
TLSA record for DANE).  This commit rearranges connection code so it is
possible to run all "additional" queries in parallel with the connection
estabilishment. However, this changes the behavior of TLS requirement
checks (including MTA-STS). The connection to the candidate MX is
already estabilished and STARTTLS is always attempted if it is
available. Only after that the policy check is done, using the result of
TLS handshake attempt (if any). If for whatever reason, the candidate MX
cannot be used, the connection is then closed. This might bring
additional overhead in case of configuration errors on the recipient
side, but it is believed to not be a major problem since this should not
happen often.
2019-12-13 17:31:35 +03:00
fox.cpp
122168bef1
future: Allow to pass an error value alongside result 2019-12-13 17:31:35 +03:00
fox.cpp
7be7556b69
storage/sql: Make the update pipe socket path shorter
On *nix systems, the length of Unix socket path is limited to 104-108
characters.
2019-12-13 17:31:35 +03:00
fox.cpp
c4ea9a730f
Instrument the SMTP code using runtime/trace
runtime/trace together with 'go tool trace' provides extremely powerful
tooling for performance (latency) analysis. Since maddy prides itself on
being "optimized for concurrency", it is a good idea to actually live up
to this promise.

Closes #144. No need to reinvent the wheel. The original issue
proposed a solution to use in production to detect "performance
anomalies", it is possible to use runtime/trace in production too, but
the corresponding flag to enable profiler endpoint is hidden behind the
'debugflags' build tag at the moment.

For SMTP code, the basic latency information can be obtained from
regular logs since they include timestamps with millisecond granularity.
After the issue is apparent, it is possible to deploy the server
executable compiled with tracing support and obtain more information

... Also add missing context.Context arguments to smtpconn.C.
2019-12-13 17:31:35 +03:00
fox.cpp
305fdddf24
Use context.Context all over the place
It is useful to define background tasks lifetimes more precisely,
especially involving timeouts and other cancellation methods.

On top of that, several tracing facilities are context-based (e.g.
runtime/trace), so it is possible to use them now.
2019-12-13 17:31:35 +03:00
fox.cpp
48e21f566e
Extend .debug.* flags and hide them by default
Allow to override DNS resolver address via the -debug.dnsoverride flag
and SMTP port via -debug.smtpport.

All flags are not available unless maddy is built using the 'debugflags'
tag.
2019-12-13 17:31:35 +03:00
fox.cpp
a574b9fbb2
Use Unix socket to pass IMAP updates from maddyctl to daemon
There is abstraction 'updates pipe' defined for future use with
configuration involving IMAP data replication (e.g. multiple nodes with
maddy instances + PostgreSQL replicas + S3 bucket for messages).

However, for the case of local SQLite3 DB, limited UDS-based
implementation is provided. It solves the problem of maddyctl not being
able to tell the server about modifications it makes. Alternative to
this approach would be to have server actually perform operations and
maddyctl being a dumb API client, but this requires a lot more complex
IPC interface and will not work when the server is down.
2019-12-13 17:31:35 +03:00
fox.cpp
9e5bb288b3
Fix a bunch of grammar errors in messages around the code base 2019-12-13 17:31:35 +03:00
Nick Thomas
c5c8470845 Add a requiretls check for incoming SMTP 2019-12-08 09:58:01 +00:00
fox.cpp
dae3d5bd09
endpoint/smtp: Finalize the LMTP support
Closes #137.
2019-12-07 05:42:11 +03:00
fox.cpp
a6dde6345d
msgpipeline: Fix hang on DMARC fetch error 2019-12-07 05:37:26 +03:00
fox.cpp
66dbb2dada
address: Add tests for normalization and RFC 6531 functions 2019-12-07 02:24:50 +03:00
fox.cpp
64bb305099
address: Fix handling of <postmaster> special address 2019-12-07 01:47:48 +03:00
fox.cpp
0f7ebf57f0
msgpipeline: Report the effective recipient in errors 2019-12-07 01:37:49 +03:00
fox.cpp
db98f9dc9d
modify: Make replace_{sender,rcpt} Unicode-aware
While at it, also add Unicode-related tests for alias_file.
2019-12-06 20:09:13 +03:00
fox.cpp
bf188e454f
Move most code from the repo root into subdirectories
The intention is to keep to repo root clean while the list of packages
is slowly growing.

Additionally, a bunch of small (~30 LoC) files in the repo root is
merged into a single maddy.go file, for the same reason.

Most of the internal code is moved into the internal/ directory. Go
toolchain will make it impossible to import these packages from external
applications.

Some packages are renamed and moved into the pkg/ directory in the root.
According to https://github.com/golang-standards/project-layout this is
the de-facto standard to place "library code that's ok to use by
external applications" in.

To clearly define the purpose of top-level directories, README.md files
are added to each.
2019-12-06 01:35:12 +03:00