mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-05 14:07:38 +03:00
The intention is to keep to repo root clean while the list of packages is slowly growing. Additionally, a bunch of small (~30 LoC) files in the repo root is merged into a single maddy.go file, for the same reason. Most of the internal code is moved into the internal/ directory. Go toolchain will make it impossible to import these packages from external applications. Some packages are renamed and moved into the pkg/ directory in the root. According to https://github.com/golang-standards/project-layout this is the de-facto standard to place "library code that's ok to use by external applications" in. To clearly define the purpose of top-level directories, README.md files are added to each.
200 lines
7.9 KiB
Go
200 lines
7.9 KiB
Go
package dmarc
|
|
|
|
import (
|
|
"bufio"
|
|
"errors"
|
|
"net"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/emersion/go-message/textproto"
|
|
"github.com/emersion/go-msgauth/authres"
|
|
"github.com/foxcpp/go-mockdns"
|
|
)
|
|
|
|
func TestDMARC(t *testing.T) {
|
|
test := func(zones map[string]mockdns.Zone, hdr string, authres []authres.Result, policyApplied Policy, dmarcRes authres.ResultValue) {
|
|
t.Helper()
|
|
v := NewVerifier(&mockdns.Resolver{Zones: zones})
|
|
defer v.Close()
|
|
|
|
hdrParsed, err := textproto.ReadHeader(bufio.NewReader(strings.NewReader(hdr)))
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
v.FetchRecord(hdrParsed)
|
|
evalRes, policy := v.Apply(authres)
|
|
|
|
if policy != policyApplied {
|
|
t.Errorf("expected applied policy to be '%v', got '%v'", policyApplied, policy)
|
|
}
|
|
if evalRes.Authres.Value != dmarcRes {
|
|
t.Errorf("expected DMARC result to be '%v', got '%v'", dmarcRes, evalRes.Authres.Value)
|
|
}
|
|
}
|
|
|
|
// No policy => DMARC 'none'
|
|
test(map[string]mockdns.Zone{}, "From: hello@example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultNone)
|
|
|
|
// Policy present & identifiers align => DMARC 'pass'
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPass)
|
|
|
|
// No SPF check run => DMARC 'none', no action taken
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=reject"},
|
|
},
|
|
}, "From: hello@example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
}, PolicyNone, authres.ResultNone)
|
|
|
|
// No DKIM check run => DMARC 'none', no action taken
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=reject"},
|
|
},
|
|
}, "From: hello@example.org\r\n\r\n", []authres.Result{
|
|
&authres.SPFResult{Value: authres.ResultPass, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultNone)
|
|
|
|
// Check org. domain and from domain, prefer from domain.
|
|
// https://tools.ietf.org/html/rfc7489#section-6.6.3
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPass)
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.sub.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPass)
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.sub.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=none"},
|
|
},
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=malformed"},
|
|
},
|
|
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPass)
|
|
|
|
// Non-DMARC records are ignored.
|
|
// https://tools.ietf.org/html/rfc7489#section-6.6.3
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"ignore", "v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPass)
|
|
|
|
// Multiple policies => no policy.
|
|
// https://tools.ietf.org/html/rfc7489#section-6.6.3
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.org.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=reject", "v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@sub.example.org\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultNone)
|
|
|
|
// Malformed policy => no policy
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
TXT: []string{"v=aaaa"},
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultNone)
|
|
|
|
// Policy fetch error => DMARC 'permerror' but the message
|
|
// is accepted.
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
Err: errors.New("the dns server is going insane"),
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultPermError)
|
|
|
|
// Policy fetch error => DMARC 'temperror' but the message
|
|
// is accepted ("fail closed")
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
Err: &net.DNSError{
|
|
Err: "the dns server is going insane, temporary",
|
|
IsTemporary: true,
|
|
},
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyReject, authres.ResultTempError)
|
|
|
|
// Misaligned From vs DKIM => DMARC 'fail'.
|
|
// Side note: More comprehensive tests for alignment evaluation
|
|
// can be found in check/dmarc/evaluate_test.go. This test merely checks
|
|
// that the correct action is taken based on the policy.
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=none"},
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultFail)
|
|
|
|
// Misaligned From vs DKIM => DMARC 'fail', policy says to reject
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=reject"},
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyReject, authres.ResultFail)
|
|
|
|
// Misaligned From vs DKIM => DMARC 'fail'
|
|
// Subdomain policy requests no action, main domain policy says to reject.
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; sp=none; p=reject"},
|
|
},
|
|
}, "From: hello@sub.example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyNone, authres.ResultFail)
|
|
|
|
// Misaligned From vs DKIM => DMARC 'fail', policy says to quarantine.
|
|
test(map[string]mockdns.Zone{
|
|
"_dmarc.example.com.": mockdns.Zone{
|
|
TXT: []string{"v=DMARC1; p=quarantine"},
|
|
},
|
|
}, "From: hello@example.com\r\n\r\n", []authres.Result{
|
|
&authres.DKIMResult{Value: authres.ResultPass, Domain: "example.org"},
|
|
&authres.SPFResult{Value: authres.ResultNone, From: "example.org", Helo: "mx.example.org"},
|
|
}, PolicyQuarantine, authres.ResultFail)
|
|
}
|