maddy/internal/target/remote/connect.go
fox.cpp eb8a974b8f
target/remote: Attempt TLS without authentication instead of plaintext
TLS without authentication is still better than no TLS at all.

To save latency in transactions with a misconfigured recipient server
that cannot use TLS at all but still advertises STARTTLS support,
downgrade to non-authenticated TLS is attempted only on verification
errors (x509.UnknownAuthorityError or x509.HostnameError) and malformed
certificate errors (x509.ConstraintViolationError and
x509.CertificateInvalidError). In all other cases 'remote' module
fallbacks to plaintext directly.

While rearranging code to support this, some additional changes were
made to allow simplier implementation of security levels idea from #178.

See https://tools.ietf.org/html/rfc7435.
See #178.
2019-12-13 17:31:36 +03:00

345 lines
8.8 KiB
Go

package remote
import (
"context"
"crypto/tls"
"crypto/x509"
"errors"
"fmt"
"net"
"runtime/trace"
"sort"
"strings"
"github.com/foxcpp/maddy/internal/config"
"github.com/foxcpp/maddy/internal/dns"
"github.com/foxcpp/maddy/internal/exterrors"
"github.com/foxcpp/maddy/internal/future"
"github.com/foxcpp/maddy/internal/mtasts"
"github.com/foxcpp/maddy/internal/smtpconn"
"golang.org/x/net/publicsuffix"
)
type mxConn struct {
*smtpconn.C
// Domain this MX belongs to.
domain string
// Future value holding the MTA-STS fetch results for this domain.
// May be nil if MTA-STS is disabled.
stsFut *future.Future
// The MX record is DNSSEC-signed and was verified by the used resolver.
dnssecOk bool
}
func (rd *remoteDelivery) checkPolicies(ctx context.Context, mx string, didTLS, tlsPKIX bool, conn mxConn) error {
var (
authenticated bool
requireTLS bool
)
// Implicit MX is always authenticated (and explicit one with the same
// hostname too).
if dns.Equal(mx, conn.domain) {
authenticated = true
}
// Apply recipient MTA-STS policy.
if conn.stsFut != nil {
stsPolicy, err := conn.stsFut.GetContext(ctx)
if err == nil {
stsPolicy := stsPolicy.(*mtasts.Policy)
// Respect the policy: require TLS if it exists, skip non-matching MXs.
// Any policy (even None) is enough to mark MX as 'authenticated'.
requireTLS = stsPolicy.Mode == mtasts.ModeEnforce
if requireTLS {
rd.Log.DebugMsg("TLS required by MTA-STS", "mx", mx, "domain", conn.domain)
}
if stsPolicy.Match(mx) {
rd.Log.DebugMsg("authenticated MX using MTA-STS", "mx", mx)
authenticated = true
} else if stsPolicy.Mode == mtasts.ModeEnforce {
rd.Log.Msg("skipping MX not matching MTA-STS", "mx", mx, "domain", conn.domain)
return &exterrors.SMTPError{
Code: 550,
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
Message: "Failed to estabilish the MX record authenticity (MTA-STS)",
}
}
} else {
rd.Log.DebugMsg("Policy fetch error, ignoring", "mx", mx, "domain", conn.domain, "err", err)
}
}
// Mark MX as 'authenticated' if DNS zone is signed.
if _, do := rd.rt.mxAuth[AuthDNSSEC]; do && conn.dnssecOk {
rd.Log.DebugMsg("authenticated MX using DNSSEC", "mx", mx, "domain", conn.domain)
authenticated = true
}
// Mark MX as 'authenticated' if they have the same eTLD+1 domain part.
if _, do := rd.rt.mxAuth[AuthCommonDomain]; do && commonDomainCheck(conn.domain, mx) {
rd.Log.DebugMsg("authenticated MX using common domain rule", "mx", mx, "domain", conn.domain)
authenticated = true
}
// Apply local policy.
if rd.rt.requireTLS {
rd.Log.DebugMsg("TLS required by local policy", "mx", mx, "domain", conn.domain)
requireTLS = true
}
// Make decision based on the policy and connection state.
if rd.rt.requireMXAuth && !authenticated {
return &exterrors.SMTPError{
Code: 550,
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
Message: fmt.Sprintf("Failed to estabilish the MX record (%s) authenticity", mx),
}
}
if requireTLS && (!didTLS || !tlsPKIX) {
return &exterrors.SMTPError{
Code: 550,
EnhancedCode: exterrors.EnhancedCode{5, 7, 1},
Message: "TLS is required but unsupported or failed (enforced by MTA-STS)",
}
}
// All green.
return nil
}
func isVerifyError(err error) bool {
_, ok := err.(x509.UnknownAuthorityError)
if ok {
return true
}
_, ok = err.(x509.HostnameError)
if ok {
return true
}
_, ok = err.(x509.ConstraintViolationError)
if ok {
return true
}
_, ok = err.(x509.CertificateInvalidError)
return ok
}
func (rd *remoteDelivery) attemptMX(ctx context.Context, conn mxConn, record *net.MX) error {
var (
daneCtx context.Context
tlsaFut *future.Future
)
if rd.rt.dane {
var daneCancel func()
daneCtx, daneCancel = context.WithCancel(ctx)
defer daneCancel()
tlsaFut = future.New()
go func() {
tlsaFut.Set(rd.lookupTLSA(daneCtx, record.Host))
}()
}
var (
tlsCfg *tls.Config
tlsPKIX = true
)
if rd.rt.tlsConfig != nil {
tlsCfg = rd.rt.tlsConfig.Clone()
tlsCfg.ServerName = record.Host
}
rd.Log.DebugMsg("trying", "mx", record.Host, "domain", conn.domain)
retry:
// smtpconn.C default TLS behavior is not useful for us, we want to handle
// TLS errors separately hence starttls=false.
_, err := conn.Connect(ctx, config.Endpoint{
Host: record.Host,
Port: smtpPort,
}, false, nil)
if err != nil {
return err
}
starttlsOk, _ := conn.Client().Extension("STARTTLS")
if starttlsOk && tlsCfg != nil {
if err := conn.Client().StartTLS(tlsCfg); err != nil {
// Attempt TLS without authentication. It is still better than
// plaintext and we might be able to actually authenticate the
// server using DANE-EE/DANE-TA later.
//
// tlsPKIX is to avoid looping forever if the same verify error
// happens with InsecureSkipVerify too (e.g. certificate is *too*
// broken).
if isVerifyError(err) && tlsPKIX {
rd.Log.Error("TLS verify error, trying without authentication", err, "mx", record.Host, "domain", conn.domain)
tlsCfg.InsecureSkipVerify = true
tlsPKIX = false
conn.Close()
goto retry
}
rd.Log.Error("TLS error, trying plaintext", err, "mx", record.Host, "domain", conn.domain)
tlsCfg = nil
tlsPKIX = false
conn.Close()
goto retry
}
}
tlsState, didTLS := conn.Client().TLSConnectionState()
if err := rd.checkPolicies(ctx, record.Host, didTLS, tlsPKIX, conn); err != nil {
conn.Close()
return err
}
_, err = rd.verifyDANE(ctx, tlsaFut, tlsState)
if err != nil {
conn.Close()
return err
}
return nil
}
func (rd *remoteDelivery) connectionForDomain(ctx context.Context, domain string) (*smtpconn.C, error) {
domain = strings.ToLower(domain)
if c, ok := rd.connections[domain]; ok {
return c.C, nil
}
conn := mxConn{
C: smtpconn.New(),
domain: domain,
}
conn.Dialer = rd.rt.dialer
conn.Log = rd.Log
conn.Hostname = rd.rt.hostname
conn.AddrInSMTPMsg = true
if _, do := rd.rt.mxAuth[AuthMTASTS]; do {
conn.stsFut = future.New()
if rd.rt.mtastsGet != nil {
go func() {
conn.stsFut.Set(rd.rt.mtastsGet(ctx, domain))
}()
} else {
go func() {
conn.stsFut.Set(rd.rt.mtastsCache.Get(ctx, domain))
}()
}
}
region := trace.StartRegion(ctx, "remote/LookupMX")
dnssecOk, records, err := rd.lookupMX(ctx, domain)
region.End()
if err != nil {
return nil, err
}
conn.dnssecOk = dnssecOk
var lastErr error
region = trace.StartRegion(ctx, "remote/Connect+TLS")
for _, record := range records {
if record.Host == "." {
return nil, &exterrors.SMTPError{
Code: 556,
EnhancedCode: exterrors.EnhancedCode{5, 1, 10},
Message: "Domain does not accept email (null MX)",
}
}
if err := rd.attemptMX(ctx, conn, record); err != nil {
if len(records) != 0 {
rd.Log.Error("cannot use MX", err, "mx", record.Host, "domain", domain)
}
lastErr = err
continue
}
break
}
region.End()
// Stil not connected? Bail out.
if conn.Client() == nil {
return nil, &exterrors.SMTPError{
Code: exterrors.SMTPCode(err, 451, 550),
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 0}),
Message: "No usable MXs, last err: " + lastErr.Error(),
TargetName: "remote",
Err: lastErr,
Misc: map[string]interface{}{
"domain": domain,
},
}
}
if err := conn.Mail(ctx, rd.mailFrom, rd.msgMeta.SMTPOpts); err != nil {
conn.Close()
return nil, err
}
rd.connections[domain] = conn
return conn.C, nil
}
func commonDomainCheck(domain string, mx string) bool {
domainPart, err := publicsuffix.EffectiveTLDPlusOne(domain)
if err != nil {
return false
}
mxPart, err := publicsuffix.EffectiveTLDPlusOne(strings.TrimSuffix(mx, "."))
if err != nil {
return false
}
return domainPart == mxPart
}
func (rd *remoteDelivery) lookupMX(ctx context.Context, domain string) (dnssecOk bool, records []*net.MX, err error) {
if _, use := rd.rt.mxAuth[AuthDNSSEC]; use {
if rd.rt.extResolver == nil {
return false, nil, errors.New("remote: can't do DNSSEC verification without security-aware resolver")
}
dnssecOk, records, err = rd.rt.extResolver.AuthLookupMX(context.Background(), domain)
} else {
records, err = rd.rt.resolver.LookupMX(ctx, domain)
}
if err != nil {
reason, misc := exterrors.UnwrapDNSErr(err)
return false, nil, &exterrors.SMTPError{
Code: exterrors.SMTPCode(err, 451, 554),
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 4}),
Message: "MX lookup error",
TargetName: "remote",
Reason: reason,
Err: err,
Misc: misc,
}
}
sort.Slice(records, func(i, j int) bool {
return records[i].Pref < records[j].Pref
})
// Fallback to A/AAA RR when no MX records are present as
// required by RFC 5321 Section 5.1.
if len(records) == 0 {
records = append(records, &net.MX{
Host: domain,
Pref: 0,
})
}
return dnssecOk, records, err
}