mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-06 22:47:37 +03:00
Previous approach consisted of multiple independent options with unknown interaction between each other and not offering enough flexibility for local policy configuration. Additionally, it was not possible to implement downgrade protection mentioned in #178 because it was not clear what is "downgrade" since options were not related in any linear order, this commit makes it explicit via the "security levels" system: MX: DNSSEC > MTA-STS > Nothing TLS: Authenticated+Encrypted > Encrypted > Plaintext Note DNSSEC and MTA-STS being different levels, they provide different security guarantees. Keeping them together under "authenticated" level would not provide enough granularity for levels-based downgrade protection and local policies. 'common_domain' MX authentication option is removed. It was offering no real protection and therefore is was problematic to use together with planned downgrade protection. All security level errors are marked as temporary to force requeueing and allow local admin to troubleshoot them without losing messages. 'remote' tests are changed to use testTarget function to initialize tested module instance, since security levels mapping requires some pre-initialization. Support for IP literals in address domain-part is disabled because it is incompatible with the new verification logic and was broken anyway (#176).
365 lines
9.6 KiB
Go
365 lines
9.6 KiB
Go
package remote
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"net"
|
|
"runtime/trace"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/foxcpp/maddy/internal/config"
|
|
"github.com/foxcpp/maddy/internal/exterrors"
|
|
"github.com/foxcpp/maddy/internal/future"
|
|
"github.com/foxcpp/maddy/internal/mtasts"
|
|
"github.com/foxcpp/maddy/internal/smtpconn"
|
|
)
|
|
|
|
type mxConn struct {
|
|
*smtpconn.C
|
|
|
|
// Domain this MX belongs to.
|
|
domain string
|
|
|
|
// Future value holding the MTA-STS fetch results for this domain.
|
|
// May be nil if MTA-STS is disabled.
|
|
stsFut *future.Future
|
|
|
|
// The MX record is DNSSEC-signed and was verified by the used resolver.
|
|
dnssecOk bool
|
|
}
|
|
|
|
// checkMXAuth checks MTA-STS, DNSSEC status of MX record and also applies
|
|
// 'common domain' rule if configured.
|
|
//
|
|
// requirePKIXTLS - Whether the TLS should be used and PKIX/X.509 verification
|
|
// should pass.
|
|
func (rd *remoteDelivery) checkMXAuth(ctx context.Context, mx string, conn mxConn) (requirePKIXTLS bool, mxLevel MXLevel, err error) {
|
|
mxLevel = MXNone
|
|
|
|
// Apply recipient MTA-STS policy.
|
|
if conn.stsFut != nil {
|
|
stsPolicy, err := conn.stsFut.GetContext(ctx)
|
|
if err == nil {
|
|
stsPolicy := stsPolicy.(*mtasts.Policy)
|
|
|
|
// Respect the policy: require TLS if it exists, skip non-matching MXs.
|
|
// Any policy (even None) is enough to mark MX as 'authenticated'.
|
|
requirePKIXTLS = stsPolicy.Mode == mtasts.ModeEnforce
|
|
if requirePKIXTLS {
|
|
rd.Log.DebugMsg("TLS required by MTA-STS", "remote_server", mx, "domain", conn.domain)
|
|
}
|
|
if stsPolicy.Match(mx) {
|
|
rd.Log.DebugMsg("authenticated MX using MTA-STS", "remote_server", mx)
|
|
if mxLevel < MX_MTASTS {
|
|
mxLevel = MX_MTASTS
|
|
}
|
|
} else if stsPolicy.Mode == mtasts.ModeEnforce {
|
|
return false, MXNone, &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
|
|
Message: "Failed to estabilish the MX record authenticity (MTA-STS)",
|
|
}
|
|
}
|
|
} else {
|
|
rd.Log.DebugMsg("policy fetch error, ignoring", "remote_server", mx, "domain", conn.domain, "err", err)
|
|
}
|
|
}
|
|
|
|
// Mark MX as 'authenticated' if DNS zone is signed.
|
|
if conn.dnssecOk {
|
|
rd.Log.DebugMsg("authenticated MX using DNSSEC", "remote_server", mx, "domain", conn.domain)
|
|
if mxLevel < MX_DNSSEC {
|
|
mxLevel = MX_DNSSEC
|
|
}
|
|
}
|
|
|
|
// All green.
|
|
return requirePKIXTLS, mxLevel, nil
|
|
}
|
|
|
|
func isVerifyError(err error) bool {
|
|
_, ok := err.(x509.UnknownAuthorityError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.HostnameError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.ConstraintViolationError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.CertificateInvalidError)
|
|
return ok
|
|
}
|
|
|
|
// connect attempts to connect to the MX, first trying STARTTLS with X.509
|
|
// verification but falling back to unauthenticated TLS or plaintext as
|
|
// necesary.
|
|
//
|
|
// Return values:
|
|
// - tlsLevel TLS security level that was estabilished.
|
|
// - tlsErr Error that prevented TLS from working if tlsLevel != TLSAuthenticated
|
|
func (rd *remoteDelivery) connect(ctx context.Context, conn mxConn, host string, tlsCfg *tls.Config) (tlsLevel TLSLevel, tlsErr error, err error) {
|
|
tlsLevel = TLSAuthenticated
|
|
if rd.rt.tlsConfig != nil {
|
|
tlsCfg = rd.rt.tlsConfig.Clone()
|
|
tlsCfg.ServerName = host
|
|
}
|
|
|
|
rd.Log.DebugMsg("trying", "remote_server", host, "domain", conn.domain)
|
|
|
|
retry:
|
|
// smtpconn.C default TLS behavior is not useful for us, we want to handle
|
|
// TLS errors separately hence starttls=false.
|
|
_, err = conn.Connect(ctx, config.Endpoint{
|
|
Host: host,
|
|
Port: smtpPort,
|
|
}, false, nil)
|
|
if err != nil {
|
|
return TLSNone, nil, err
|
|
}
|
|
|
|
starttlsOk, _ := conn.Client().Extension("STARTTLS")
|
|
if starttlsOk && tlsCfg != nil {
|
|
if err := conn.Client().StartTLS(tlsCfg); err != nil {
|
|
tlsErr = err
|
|
|
|
// Attempt TLS without authentication. It is still better than
|
|
// plaintext and we might be able to actually authenticate the
|
|
// server using DANE-EE/DANE-TA later.
|
|
//
|
|
// Check tlsLevel is to avoid looping forever if the same verify
|
|
// error happens with InsecureSkipVerify too (e.g. certificate is
|
|
// *too* broken).
|
|
if isVerifyError(err) && tlsLevel == TLSAuthenticated {
|
|
rd.Log.Error("TLS verify error, trying without authentication", err, "remote_server", host, "domain", conn.domain)
|
|
tlsCfg.InsecureSkipVerify = true
|
|
tlsLevel = TLSEncrypted
|
|
|
|
// TODO: Check go-smtp code to make TLS verification errors
|
|
// non-sticky so we can properly send QUIT in this case.
|
|
conn.DirectClose()
|
|
|
|
goto retry
|
|
}
|
|
|
|
rd.Log.Error("TLS error, trying plaintext", err, "remote_server", host, "domain", conn.domain)
|
|
tlsCfg = nil
|
|
tlsLevel = TLSNone
|
|
conn.DirectClose()
|
|
|
|
goto retry
|
|
}
|
|
} else {
|
|
tlsLevel = TLSNone
|
|
}
|
|
|
|
return tlsLevel, tlsErr, nil
|
|
}
|
|
|
|
func (rd *remoteDelivery) attemptMX(ctx context.Context, conn mxConn, record *net.MX) error {
|
|
var (
|
|
daneCtx context.Context
|
|
tlsaFut *future.Future
|
|
)
|
|
if rd.rt.extResolver != nil {
|
|
var daneCancel func()
|
|
daneCtx, daneCancel = context.WithCancel(ctx)
|
|
defer daneCancel()
|
|
tlsaFut = future.New()
|
|
go func() {
|
|
tlsaFut.Set(rd.lookupTLSA(daneCtx, record.Host))
|
|
}()
|
|
}
|
|
|
|
tlsLevel, tlsErr, err := rd.connect(ctx, conn, record.Host, rd.rt.tlsConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
requirePKIXTLS, mxLevel, err := rd.checkMXAuth(ctx, record.Host, conn)
|
|
if err != nil {
|
|
conn.Close()
|
|
return err
|
|
}
|
|
|
|
rd.Log.DebugMsg("levels", "mx", mxLevel, "tls", tlsLevel)
|
|
|
|
// Make decision based on the policy and connection state.
|
|
//
|
|
// Note: All policy errors are marked as temporary to give the local admin
|
|
// chance to troubleshoot them without losing messages.
|
|
|
|
// Note: tlsLevel is checked before it is modified by
|
|
if requirePKIXTLS && tlsLevel != TLSAuthenticated {
|
|
conn.Close()
|
|
return &exterrors.SMTPError{
|
|
Code: 451,
|
|
EnhancedCode: exterrors.EnhancedCode{4, 7, 1},
|
|
Message: "Recipient server TLS certificate is not trusted but " +
|
|
"authentication is required by MTA-STS",
|
|
Err: tlsErr,
|
|
Misc: map[string]interface{}{
|
|
"tls_level": tlsLevel,
|
|
},
|
|
}
|
|
}
|
|
if rd.rt.minMXLevel > mxLevel {
|
|
conn.Close()
|
|
return &exterrors.SMTPError{
|
|
Code: 451,
|
|
EnhancedCode: exterrors.EnhancedCode{4, 7, 0},
|
|
Message: "Failed to estabilish the MX record authenticity",
|
|
Err: tlsErr,
|
|
Misc: map[string]interface{}{
|
|
"mx_level": mxLevel,
|
|
},
|
|
}
|
|
}
|
|
|
|
overridePKIX, err := rd.verifyDANE(ctx, tlsaFut, conn)
|
|
if err != nil {
|
|
conn.Close()
|
|
return err
|
|
}
|
|
|
|
// TLS authenticated via DANE-EE or DANE-TA.
|
|
if overridePKIX {
|
|
tlsLevel = TLSAuthenticated
|
|
}
|
|
|
|
if rd.rt.minTLSLevel > tlsLevel {
|
|
conn.Close()
|
|
return &exterrors.SMTPError{
|
|
Code: 451,
|
|
EnhancedCode: exterrors.EnhancedCode{4, 7, 1},
|
|
Message: "TLS it not available or unauthenticated",
|
|
Err: tlsErr,
|
|
Misc: map[string]interface{}{
|
|
"tls_level": tlsLevel,
|
|
},
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (rd *remoteDelivery) connectionForDomain(ctx context.Context, domain string) (*smtpconn.C, error) {
|
|
domain = strings.ToLower(domain)
|
|
|
|
if c, ok := rd.connections[domain]; ok {
|
|
return c.C, nil
|
|
}
|
|
|
|
conn := mxConn{
|
|
C: smtpconn.New(),
|
|
domain: domain,
|
|
}
|
|
|
|
conn.Dialer = rd.rt.dialer
|
|
conn.Log = rd.Log
|
|
conn.Hostname = rd.rt.hostname
|
|
conn.AddrInSMTPMsg = true
|
|
|
|
conn.stsFut = future.New()
|
|
if rd.rt.mtastsGet != nil {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsGet(ctx, domain))
|
|
}()
|
|
} else {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsCache.Get(ctx, domain))
|
|
}()
|
|
}
|
|
|
|
region := trace.StartRegion(ctx, "remote/LookupMX")
|
|
dnssecOk, records, err := rd.lookupMX(ctx, domain)
|
|
region.End()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn.dnssecOk = dnssecOk
|
|
|
|
var lastErr error
|
|
region = trace.StartRegion(ctx, "remote/Connect+TLS")
|
|
for _, record := range records {
|
|
if record.Host == "." {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: 556,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 1, 10},
|
|
Message: "Domain does not accept email (null MX)",
|
|
}
|
|
}
|
|
|
|
if err := rd.attemptMX(ctx, conn, record); err != nil {
|
|
if len(records) != 0 {
|
|
rd.Log.Error("cannot use MX", err, "remote_server", record.Host, "domain", domain)
|
|
}
|
|
lastErr = err
|
|
continue
|
|
}
|
|
break
|
|
}
|
|
region.End()
|
|
|
|
// Stil not connected? Bail out.
|
|
if conn.Client() == nil {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(lastErr, 451, 550),
|
|
EnhancedCode: exterrors.SMTPEnchCode(lastErr, exterrors.EnhancedCode{0, 4, 0}),
|
|
Message: "No usable MXs, last err: " + lastErr.Error(),
|
|
TargetName: "remote",
|
|
Err: lastErr,
|
|
Misc: map[string]interface{}{
|
|
"domain": domain,
|
|
},
|
|
}
|
|
}
|
|
|
|
if err := conn.Mail(ctx, rd.mailFrom, rd.msgMeta.SMTPOpts); err != nil {
|
|
conn.Close()
|
|
return nil, err
|
|
}
|
|
|
|
rd.connections[domain] = conn
|
|
return conn.C, nil
|
|
}
|
|
|
|
func (rd *remoteDelivery) lookupMX(ctx context.Context, domain string) (dnssecOk bool, records []*net.MX, err error) {
|
|
if rd.rt.extResolver != nil {
|
|
dnssecOk, records, err = rd.rt.extResolver.AuthLookupMX(context.Background(), domain)
|
|
} else {
|
|
records, err = rd.rt.resolver.LookupMX(ctx, domain)
|
|
}
|
|
if err != nil {
|
|
reason, misc := exterrors.UnwrapDNSErr(err)
|
|
return false, nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(err, 451, 554),
|
|
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 4}),
|
|
Message: "MX lookup error",
|
|
TargetName: "remote",
|
|
Reason: reason,
|
|
Err: err,
|
|
Misc: misc,
|
|
}
|
|
}
|
|
|
|
sort.Slice(records, func(i, j int) bool {
|
|
return records[i].Pref < records[j].Pref
|
|
})
|
|
|
|
// Fallback to A/AAA RR when no MX records are present as
|
|
// required by RFC 5321 Section 5.1.
|
|
if len(records) == 0 {
|
|
records = append(records, &net.MX{
|
|
Host: domain,
|
|
Pref: 0,
|
|
})
|
|
}
|
|
|
|
return dnssecOk, records, err
|
|
}
|