mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-06 06:27:38 +03:00
As revealed by latency tracing using runtime/trace, MTA-STS cache miss essentially doubles the connection time for outbound delivery. This is mostly because MTA-STS lookup have to estabilish a TCP+TLS connection to obtain the policy text (shame on Google for pushing that terribly misdesigned protocol, but, well, it is better than nothing so we adopt it). Additionally, there is a number of additional DNS lookups needed (e.g. TLSA record for DANE). This commit rearranges connection code so it is possible to run all "additional" queries in parallel with the connection estabilishment. However, this changes the behavior of TLS requirement checks (including MTA-STS). The connection to the candidate MX is already estabilished and STARTTLS is always attempted if it is available. Only after that the policy check is done, using the result of TLS handshake attempt (if any). If for whatever reason, the candidate MX cannot be used, the connection is then closed. This might bring additional overhead in case of configuration errors on the recipient side, but it is believed to not be a major problem since this should not happen often.
276 lines
7.3 KiB
Go
276 lines
7.3 KiB
Go
package remote
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"runtime/trace"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/foxcpp/maddy/internal/config"
|
|
"github.com/foxcpp/maddy/internal/dns"
|
|
"github.com/foxcpp/maddy/internal/exterrors"
|
|
"github.com/foxcpp/maddy/internal/future"
|
|
"github.com/foxcpp/maddy/internal/mtasts"
|
|
"github.com/foxcpp/maddy/internal/smtpconn"
|
|
"golang.org/x/net/publicsuffix"
|
|
)
|
|
|
|
type mxConn struct {
|
|
*smtpconn.C
|
|
|
|
// Domain this MX belongs to.
|
|
domain string
|
|
|
|
// Future value holding the MTA-STS fetch results for this domain.
|
|
// May be nil if MTA-STS is disabled.
|
|
stsFut *future.Future
|
|
|
|
// The MX record is DNSSEC-signed and was verified by the used resolver.
|
|
dnssecOk bool
|
|
}
|
|
|
|
func (rd *remoteDelivery) checkPolicies(ctx context.Context, mx string, didTLS bool, conn mxConn) error {
|
|
var (
|
|
authenticated bool
|
|
requireTLS bool
|
|
)
|
|
|
|
// Implicit MX is always authenticated (and explicit one with the same
|
|
// hostname too).
|
|
if dns.Equal(mx, conn.domain) {
|
|
authenticated = true
|
|
}
|
|
|
|
// Apply recipient MTA-STS policy.
|
|
if conn.stsFut != nil {
|
|
stsPolicy, err := conn.stsFut.GetContext(ctx)
|
|
if err == nil {
|
|
stsPolicy := stsPolicy.(*mtasts.Policy)
|
|
|
|
// Respect the policy: require TLS if it exists, skip non-matching MXs.
|
|
// Any policy (even None) is enough to mark MX as 'authenticated'.
|
|
requireTLS = stsPolicy.Mode == mtasts.ModeEnforce
|
|
if requireTLS {
|
|
rd.Log.DebugMsg("TLS required by MTA-STS", "mx", mx, "domain", conn.domain)
|
|
}
|
|
if stsPolicy.Match(mx) {
|
|
rd.Log.DebugMsg("authenticated MX using MTA-STS", "mx", mx)
|
|
authenticated = true
|
|
} else if stsPolicy.Mode == mtasts.ModeEnforce {
|
|
rd.Log.Msg("skipping MX not matching MTA-STS", "mx", mx, "domain", conn.domain)
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
|
|
Message: "Failed to estabilish the MX record authenticity (MTA-STS)",
|
|
}
|
|
}
|
|
} else {
|
|
rd.Log.DebugMsg("Policy fetch error, ignoring", "mx", mx, "domain", conn.domain, "err", err)
|
|
}
|
|
}
|
|
|
|
// Mark MX as 'authenticated' if DNS zone is signed.
|
|
if _, do := rd.rt.mxAuth[AuthDNSSEC]; do && conn.dnssecOk {
|
|
rd.Log.DebugMsg("authenticated MX using DNSSEC", "mx", mx, "domain", conn.domain)
|
|
authenticated = true
|
|
}
|
|
|
|
// Mark MX as 'authenticated' if they have the same eTLD+1 domain part.
|
|
if _, do := rd.rt.mxAuth[AuthCommonDomain]; do && commonDomainCheck(conn.domain, mx) {
|
|
rd.Log.DebugMsg("authenticated MX using common domain rule", "mx", mx, "domain", conn.domain)
|
|
authenticated = true
|
|
}
|
|
|
|
// Apply local policy.
|
|
if rd.rt.requireTLS {
|
|
rd.Log.DebugMsg("TLS required by local policy", "mx", mx, "domain", conn.domain)
|
|
requireTLS = true
|
|
}
|
|
|
|
// Make decision based on the policy and connection state.
|
|
if rd.rt.requireMXAuth && !authenticated {
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
|
|
Message: fmt.Sprintf("Failed to estabilish the MX record (%s) authenticity", mx),
|
|
}
|
|
}
|
|
if requireTLS && !didTLS {
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 1},
|
|
Message: fmt.Sprintf("TLS is required but unsupported or failed (mx = %s)", mx),
|
|
}
|
|
}
|
|
|
|
// All green.
|
|
return nil
|
|
}
|
|
|
|
func (rd *remoteDelivery) connectionForDomain(ctx context.Context, domain string) (*smtpconn.C, error) {
|
|
domain = strings.ToLower(domain)
|
|
|
|
if c, ok := rd.connections[domain]; ok {
|
|
return c.C, nil
|
|
}
|
|
|
|
conn := mxConn{
|
|
C: smtpconn.New(),
|
|
domain: domain,
|
|
}
|
|
|
|
conn.Dialer = rd.rt.dialer
|
|
conn.TLSConfig = rd.rt.tlsConfig
|
|
conn.Log = rd.Log
|
|
conn.Hostname = rd.rt.hostname
|
|
conn.AddrInSMTPMsg = true
|
|
|
|
if _, do := rd.rt.mxAuth[AuthMTASTS]; do {
|
|
conn.stsFut = future.New()
|
|
if rd.rt.mtastsGet != nil {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsGet(ctx, domain))
|
|
}()
|
|
} else {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsCache.Get(ctx, domain))
|
|
}()
|
|
}
|
|
}
|
|
|
|
region := trace.StartRegion(ctx, "remote/LookupMX")
|
|
dnssecOk, records, err := rd.lookupMX(ctx, domain)
|
|
region.End()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn.dnssecOk = dnssecOk
|
|
|
|
var lastErr error
|
|
region = trace.StartRegion(ctx, "remote/Connect+TLS")
|
|
for _, record := range records {
|
|
if record.Host == "." {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: 556,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 1, 10},
|
|
Message: "Domain does not accept email (null MX)",
|
|
}
|
|
}
|
|
|
|
rd.Log.DebugMsg("trying", "mx", record.Host, "domain", domain)
|
|
didTLS, err := conn.Connect(ctx, config.Endpoint{
|
|
Host: record.Host,
|
|
Port: smtpPort,
|
|
}, true)
|
|
authErr := rd.checkPolicies(ctx, record.Host, didTLS, conn)
|
|
|
|
if err != nil {
|
|
lastErr = err
|
|
|
|
// If there was a TLS error and MX auth does not seem to complain
|
|
// about plaintext - reconnect without TLS.
|
|
if _, ok := err.(smtpconn.TLSError); ok && authErr == nil {
|
|
rd.Log.Error("TLS error, falling back to plaintext", err,
|
|
"mx", record.Host, "domain", domain)
|
|
|
|
_, err := conn.Connect(ctx, config.Endpoint{
|
|
Host: record.Host,
|
|
Port: smtpPort,
|
|
}, false)
|
|
if err != nil {
|
|
// That's odd, but whatever.
|
|
continue
|
|
}
|
|
} else {
|
|
continue
|
|
}
|
|
}
|
|
|
|
if authErr != nil {
|
|
conn.Close()
|
|
lastErr = authErr
|
|
continue
|
|
}
|
|
|
|
break
|
|
}
|
|
region.End()
|
|
|
|
// Stil not connected? Bail out.
|
|
if conn.Client() == nil {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(err, 451, 550),
|
|
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 0}),
|
|
Message: "No usable MXs, last err: " + lastErr.Error(),
|
|
TargetName: "remote",
|
|
Err: lastErr,
|
|
Misc: map[string]interface{}{
|
|
"domain": domain,
|
|
},
|
|
}
|
|
}
|
|
|
|
rd.Log.DebugMsg("connected", "mx", conn.ServerName(), "domain", domain)
|
|
|
|
if err := conn.Mail(ctx, rd.mailFrom, rd.msgMeta.SMTPOpts); err != nil {
|
|
conn.Close()
|
|
return nil, err
|
|
}
|
|
|
|
rd.connections[domain] = conn
|
|
return conn.C, nil
|
|
}
|
|
|
|
func commonDomainCheck(domain string, mx string) bool {
|
|
domainPart, err := publicsuffix.EffectiveTLDPlusOne(domain)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
mxPart, err := publicsuffix.EffectiveTLDPlusOne(strings.TrimSuffix(mx, "."))
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
return domainPart == mxPart
|
|
}
|
|
|
|
func (rd *remoteDelivery) lookupMX(ctx context.Context, domain string) (dnssecOk bool, records []*net.MX, err error) {
|
|
if _, use := rd.rt.mxAuth[AuthDNSSEC]; use {
|
|
if rd.rt.extResolver == nil {
|
|
return false, nil, errors.New("remote: can't do DNSSEC verification without security-aware resolver")
|
|
}
|
|
dnssecOk, records, err = rd.rt.extResolver.AuthLookupMX(context.Background(), domain)
|
|
} else {
|
|
records, err = rd.rt.resolver.LookupMX(ctx, domain)
|
|
}
|
|
if err != nil {
|
|
reason, misc := exterrors.UnwrapDNSErr(err)
|
|
return false, nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(err, 451, 554),
|
|
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 4}),
|
|
Message: "MX lookup error",
|
|
TargetName: "remote",
|
|
Reason: reason,
|
|
Err: err,
|
|
Misc: misc,
|
|
}
|
|
}
|
|
|
|
sort.Slice(records, func(i, j int) bool {
|
|
return records[i].Pref < records[j].Pref
|
|
})
|
|
|
|
// Fallback to A/AAA RR when no MX records are present as
|
|
// required by RFC 5321 Section 5.1.
|
|
if len(records) == 0 {
|
|
records = append(records, &net.MX{
|
|
Host: domain,
|
|
Pref: 0,
|
|
})
|
|
}
|
|
|
|
return dnssecOk, records, err
|
|
}
|