maddy/internal/target/remote/connect.go
fox.cpp 9f523c8c61
target/remote: Rework MX records authentication and TLS enforcement
Previous approach consisted of multiple independent options with unknown
interaction between each other and not offering enough flexibility for
local policy configuration.

Additionally, it was not possible to implement downgrade protection
mentioned in #178 because it was not clear what is "downgrade" since
options were not related in any linear order, this commit makes it
explicit via the "security levels" system:
MX: DNSSEC > MTA-STS > Nothing
TLS: Authenticated+Encrypted > Encrypted > Plaintext

Note DNSSEC and MTA-STS being different levels, they provide different
security guarantees. Keeping them together under "authenticated" level
would not provide enough granularity for levels-based downgrade
protection and local policies.

'common_domain' MX authentication option is removed. It was offering no
real protection and therefore is was problematic to use together with
planned downgrade protection.

All security level errors are marked as temporary to force requeueing
and allow local admin to troubleshoot them without losing messages.

'remote' tests are changed to use testTarget function to initialize
tested module instance, since security levels mapping requires some
pre-initialization.

Support for IP literals in address domain-part is disabled because it
is incompatible with the new verification logic and was broken anyway
(#176).
2019-12-13 21:11:03 +03:00

365 lines
9.6 KiB
Go

package remote
import (
"context"
"crypto/tls"
"crypto/x509"
"net"
"runtime/trace"
"sort"
"strings"
"github.com/foxcpp/maddy/internal/config"
"github.com/foxcpp/maddy/internal/exterrors"
"github.com/foxcpp/maddy/internal/future"
"github.com/foxcpp/maddy/internal/mtasts"
"github.com/foxcpp/maddy/internal/smtpconn"
)
type mxConn struct {
*smtpconn.C
// Domain this MX belongs to.
domain string
// Future value holding the MTA-STS fetch results for this domain.
// May be nil if MTA-STS is disabled.
stsFut *future.Future
// The MX record is DNSSEC-signed and was verified by the used resolver.
dnssecOk bool
}
// checkMXAuth checks MTA-STS, DNSSEC status of MX record and also applies
// 'common domain' rule if configured.
//
// requirePKIXTLS - Whether the TLS should be used and PKIX/X.509 verification
// should pass.
func (rd *remoteDelivery) checkMXAuth(ctx context.Context, mx string, conn mxConn) (requirePKIXTLS bool, mxLevel MXLevel, err error) {
mxLevel = MXNone
// Apply recipient MTA-STS policy.
if conn.stsFut != nil {
stsPolicy, err := conn.stsFut.GetContext(ctx)
if err == nil {
stsPolicy := stsPolicy.(*mtasts.Policy)
// Respect the policy: require TLS if it exists, skip non-matching MXs.
// Any policy (even None) is enough to mark MX as 'authenticated'.
requirePKIXTLS = stsPolicy.Mode == mtasts.ModeEnforce
if requirePKIXTLS {
rd.Log.DebugMsg("TLS required by MTA-STS", "remote_server", mx, "domain", conn.domain)
}
if stsPolicy.Match(mx) {
rd.Log.DebugMsg("authenticated MX using MTA-STS", "remote_server", mx)
if mxLevel < MX_MTASTS {
mxLevel = MX_MTASTS
}
} else if stsPolicy.Mode == mtasts.ModeEnforce {
return false, MXNone, &exterrors.SMTPError{
Code: 550,
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
Message: "Failed to estabilish the MX record authenticity (MTA-STS)",
}
}
} else {
rd.Log.DebugMsg("policy fetch error, ignoring", "remote_server", mx, "domain", conn.domain, "err", err)
}
}
// Mark MX as 'authenticated' if DNS zone is signed.
if conn.dnssecOk {
rd.Log.DebugMsg("authenticated MX using DNSSEC", "remote_server", mx, "domain", conn.domain)
if mxLevel < MX_DNSSEC {
mxLevel = MX_DNSSEC
}
}
// All green.
return requirePKIXTLS, mxLevel, nil
}
func isVerifyError(err error) bool {
_, ok := err.(x509.UnknownAuthorityError)
if ok {
return true
}
_, ok = err.(x509.HostnameError)
if ok {
return true
}
_, ok = err.(x509.ConstraintViolationError)
if ok {
return true
}
_, ok = err.(x509.CertificateInvalidError)
return ok
}
// connect attempts to connect to the MX, first trying STARTTLS with X.509
// verification but falling back to unauthenticated TLS or plaintext as
// necesary.
//
// Return values:
// - tlsLevel TLS security level that was estabilished.
// - tlsErr Error that prevented TLS from working if tlsLevel != TLSAuthenticated
func (rd *remoteDelivery) connect(ctx context.Context, conn mxConn, host string, tlsCfg *tls.Config) (tlsLevel TLSLevel, tlsErr error, err error) {
tlsLevel = TLSAuthenticated
if rd.rt.tlsConfig != nil {
tlsCfg = rd.rt.tlsConfig.Clone()
tlsCfg.ServerName = host
}
rd.Log.DebugMsg("trying", "remote_server", host, "domain", conn.domain)
retry:
// smtpconn.C default TLS behavior is not useful for us, we want to handle
// TLS errors separately hence starttls=false.
_, err = conn.Connect(ctx, config.Endpoint{
Host: host,
Port: smtpPort,
}, false, nil)
if err != nil {
return TLSNone, nil, err
}
starttlsOk, _ := conn.Client().Extension("STARTTLS")
if starttlsOk && tlsCfg != nil {
if err := conn.Client().StartTLS(tlsCfg); err != nil {
tlsErr = err
// Attempt TLS without authentication. It is still better than
// plaintext and we might be able to actually authenticate the
// server using DANE-EE/DANE-TA later.
//
// Check tlsLevel is to avoid looping forever if the same verify
// error happens with InsecureSkipVerify too (e.g. certificate is
// *too* broken).
if isVerifyError(err) && tlsLevel == TLSAuthenticated {
rd.Log.Error("TLS verify error, trying without authentication", err, "remote_server", host, "domain", conn.domain)
tlsCfg.InsecureSkipVerify = true
tlsLevel = TLSEncrypted
// TODO: Check go-smtp code to make TLS verification errors
// non-sticky so we can properly send QUIT in this case.
conn.DirectClose()
goto retry
}
rd.Log.Error("TLS error, trying plaintext", err, "remote_server", host, "domain", conn.domain)
tlsCfg = nil
tlsLevel = TLSNone
conn.DirectClose()
goto retry
}
} else {
tlsLevel = TLSNone
}
return tlsLevel, tlsErr, nil
}
func (rd *remoteDelivery) attemptMX(ctx context.Context, conn mxConn, record *net.MX) error {
var (
daneCtx context.Context
tlsaFut *future.Future
)
if rd.rt.extResolver != nil {
var daneCancel func()
daneCtx, daneCancel = context.WithCancel(ctx)
defer daneCancel()
tlsaFut = future.New()
go func() {
tlsaFut.Set(rd.lookupTLSA(daneCtx, record.Host))
}()
}
tlsLevel, tlsErr, err := rd.connect(ctx, conn, record.Host, rd.rt.tlsConfig)
if err != nil {
return err
}
requirePKIXTLS, mxLevel, err := rd.checkMXAuth(ctx, record.Host, conn)
if err != nil {
conn.Close()
return err
}
rd.Log.DebugMsg("levels", "mx", mxLevel, "tls", tlsLevel)
// Make decision based on the policy and connection state.
//
// Note: All policy errors are marked as temporary to give the local admin
// chance to troubleshoot them without losing messages.
// Note: tlsLevel is checked before it is modified by
if requirePKIXTLS && tlsLevel != TLSAuthenticated {
conn.Close()
return &exterrors.SMTPError{
Code: 451,
EnhancedCode: exterrors.EnhancedCode{4, 7, 1},
Message: "Recipient server TLS certificate is not trusted but " +
"authentication is required by MTA-STS",
Err: tlsErr,
Misc: map[string]interface{}{
"tls_level": tlsLevel,
},
}
}
if rd.rt.minMXLevel > mxLevel {
conn.Close()
return &exterrors.SMTPError{
Code: 451,
EnhancedCode: exterrors.EnhancedCode{4, 7, 0},
Message: "Failed to estabilish the MX record authenticity",
Err: tlsErr,
Misc: map[string]interface{}{
"mx_level": mxLevel,
},
}
}
overridePKIX, err := rd.verifyDANE(ctx, tlsaFut, conn)
if err != nil {
conn.Close()
return err
}
// TLS authenticated via DANE-EE or DANE-TA.
if overridePKIX {
tlsLevel = TLSAuthenticated
}
if rd.rt.minTLSLevel > tlsLevel {
conn.Close()
return &exterrors.SMTPError{
Code: 451,
EnhancedCode: exterrors.EnhancedCode{4, 7, 1},
Message: "TLS it not available or unauthenticated",
Err: tlsErr,
Misc: map[string]interface{}{
"tls_level": tlsLevel,
},
}
}
return nil
}
func (rd *remoteDelivery) connectionForDomain(ctx context.Context, domain string) (*smtpconn.C, error) {
domain = strings.ToLower(domain)
if c, ok := rd.connections[domain]; ok {
return c.C, nil
}
conn := mxConn{
C: smtpconn.New(),
domain: domain,
}
conn.Dialer = rd.rt.dialer
conn.Log = rd.Log
conn.Hostname = rd.rt.hostname
conn.AddrInSMTPMsg = true
conn.stsFut = future.New()
if rd.rt.mtastsGet != nil {
go func() {
conn.stsFut.Set(rd.rt.mtastsGet(ctx, domain))
}()
} else {
go func() {
conn.stsFut.Set(rd.rt.mtastsCache.Get(ctx, domain))
}()
}
region := trace.StartRegion(ctx, "remote/LookupMX")
dnssecOk, records, err := rd.lookupMX(ctx, domain)
region.End()
if err != nil {
return nil, err
}
conn.dnssecOk = dnssecOk
var lastErr error
region = trace.StartRegion(ctx, "remote/Connect+TLS")
for _, record := range records {
if record.Host == "." {
return nil, &exterrors.SMTPError{
Code: 556,
EnhancedCode: exterrors.EnhancedCode{5, 1, 10},
Message: "Domain does not accept email (null MX)",
}
}
if err := rd.attemptMX(ctx, conn, record); err != nil {
if len(records) != 0 {
rd.Log.Error("cannot use MX", err, "remote_server", record.Host, "domain", domain)
}
lastErr = err
continue
}
break
}
region.End()
// Stil not connected? Bail out.
if conn.Client() == nil {
return nil, &exterrors.SMTPError{
Code: exterrors.SMTPCode(lastErr, 451, 550),
EnhancedCode: exterrors.SMTPEnchCode(lastErr, exterrors.EnhancedCode{0, 4, 0}),
Message: "No usable MXs, last err: " + lastErr.Error(),
TargetName: "remote",
Err: lastErr,
Misc: map[string]interface{}{
"domain": domain,
},
}
}
if err := conn.Mail(ctx, rd.mailFrom, rd.msgMeta.SMTPOpts); err != nil {
conn.Close()
return nil, err
}
rd.connections[domain] = conn
return conn.C, nil
}
func (rd *remoteDelivery) lookupMX(ctx context.Context, domain string) (dnssecOk bool, records []*net.MX, err error) {
if rd.rt.extResolver != nil {
dnssecOk, records, err = rd.rt.extResolver.AuthLookupMX(context.Background(), domain)
} else {
records, err = rd.rt.resolver.LookupMX(ctx, domain)
}
if err != nil {
reason, misc := exterrors.UnwrapDNSErr(err)
return false, nil, &exterrors.SMTPError{
Code: exterrors.SMTPCode(err, 451, 554),
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 4}),
Message: "MX lookup error",
TargetName: "remote",
Reason: reason,
Err: err,
Misc: misc,
}
}
sort.Slice(records, func(i, j int) bool {
return records[i].Pref < records[j].Pref
})
// Fallback to A/AAA RR when no MX records are present as
// required by RFC 5321 Section 5.1.
if len(records) == 0 {
records = append(records, &net.MX{
Host: domain,
Pref: 0,
})
}
return dnssecOk, records, err
}