maddy/internal/dmarc/verifier_test.go
fox.cpp bf188e454f
Move most code from the repo root into subdirectories
The intention is to keep to repo root clean while the list of packages
is slowly growing.

Additionally, a bunch of small (~30 LoC) files in the repo root is
merged into a single maddy.go file, for the same reason.

Most of the internal code is moved into the internal/ directory. Go
toolchain will make it impossible to import these packages from external
applications.

Some packages are renamed and moved into the pkg/ directory in the root.
According to https://github.com/golang-standards/project-layout this is
the de-facto standard to place "library code that's ok to use by
external applications" in.

To clearly define the purpose of top-level directories, README.md files
are added to each.
2019-12-06 01:35:12 +03:00

200 lines
7.9 KiB
Go

package dmarc
import (
"bufio"
"errors"
"net"
"strings"
"testing"
"github.com/emersion/go-message/textproto"
"github.com/emersion/go-msgauth/authres"
"github.com/foxcpp/go-mockdns"
)
func TestDMARC(t *testing.T) {
test := func(zones map[string]mockdns.Zone, hdr string, authres []authres.Result, policyApplied Policy, dmarcRes authres.ResultValue) {
t.Helper()
v := NewVerifier(&mockdns.Resolver{Zones: zones})
defer v.Close()
hdrParsed, err := textproto.ReadHeader(bufio.NewReader(strings.NewReader(hdr)))
if err != nil {
panic(err)
}
v.FetchRecord(hdrParsed)
evalRes, policy := v.Apply(authres)
if policy != policyApplied {
t.Errorf("expected applied policy to be '%v', got '%v'", policyApplied, policy)
}
if evalRes.Authres.Value != dmarcRes {
t.Errorf("expected DMARC result to be '%v', got '%v'", dmarcRes, evalRes.Authres.Value)
}
}
// No policy => DMARC 'none'
test(map[string]mockdns.Zone{}, "From: hello@example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultNone)
// Policy present & identifiers align => DMARC 'pass'
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=none"},
},
}, "From: hello@example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPass)
// No SPF check run => DMARC 'none', no action taken
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=reject"},
},
}, "From: hello@example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
}, PolicyNone, authres.ResultNone)
// No DKIM check run => DMARC 'none', no action taken
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=reject"},
},
}, "From: hello@example.org\r\n\r\n", []authres.Result{
&authres.SPFResult{Value: authres.ResultPass, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultNone)
// Check org. domain and from domain, prefer from domain.
// https://tools.ietf.org/html/rfc7489#section-6.6.3
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=none"},
},
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPass)
test(map[string]mockdns.Zone{
"_dmarc.sub.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=none"},
},
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPass)
test(map[string]mockdns.Zone{
"_dmarc.sub.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=none"},
},
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=malformed"},
},
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPass)
// Non-DMARC records are ignored.
// https://tools.ietf.org/html/rfc7489#section-6.6.3
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"ignore", "v=DMARC1; p=none"},
},
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPass)
// Multiple policies => no policy.
// https://tools.ietf.org/html/rfc7489#section-6.6.3
test(map[string]mockdns.Zone{
"_dmarc.example.org.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=reject", "v=DMARC1; p=none"},
},
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultNone)
// Malformed policy => no policy
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
TXT: []string{"v=aaaa"},
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultNone)
// Policy fetch error => DMARC 'permerror' but the message
// is accepted.
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
Err: errors.New("the dns server is going insane"),
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultPermError)
// Policy fetch error => DMARC 'temperror' but the message
// is accepted ("fail closed")
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
Err: &net.DNSError{
Err: "the dns server is going insane, temporary",
IsTemporary: true,
},
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyReject, authres.ResultTempError)
// Misaligned From vs DKIM => DMARC 'fail'.
// Side note: More comprehensive tests for alignment evaluation
// can be found in check/dmarc/evaluate_test.go. This test merely checks
// that the correct action is taken based on the policy.
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=none"},
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultFail)
// Misaligned From vs DKIM => DMARC 'fail', policy says to reject
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=reject"},
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyReject, authres.ResultFail)
// Misaligned From vs DKIM => DMARC 'fail'
// Subdomain policy requests no action, main domain policy says to reject.
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
TXT: []string{"v=DMARC1; sp=none; p=reject"},
},
}, "From: hello@sub.example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyNone, authres.ResultFail)
// Misaligned From vs DKIM => DMARC 'fail', policy says to quarantine.
test(map[string]mockdns.Zone{
"_dmarc.example.com.": mockdns.Zone{
TXT: []string{"v=DMARC1; p=quarantine"},
},
}, "From: hello@example.com\r\n\r\n", []authres.Result{
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
}, PolicyQuarantine, authres.ResultFail)
}