mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-06 06:27:38 +03:00
TLS without authentication is still better than no TLS at all. To save latency in transactions with a misconfigured recipient server that cannot use TLS at all but still advertises STARTTLS support, downgrade to non-authenticated TLS is attempted only on verification errors (x509.UnknownAuthorityError or x509.HostnameError) and malformed certificate errors (x509.ConstraintViolationError and x509.CertificateInvalidError). In all other cases 'remote' module fallbacks to plaintext directly. While rearranging code to support this, some additional changes were made to allow simplier implementation of security levels idea from #178. See https://tools.ietf.org/html/rfc7435. See #178.
345 lines
8.8 KiB
Go
345 lines
8.8 KiB
Go
package remote
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"runtime/trace"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/foxcpp/maddy/internal/config"
|
|
"github.com/foxcpp/maddy/internal/dns"
|
|
"github.com/foxcpp/maddy/internal/exterrors"
|
|
"github.com/foxcpp/maddy/internal/future"
|
|
"github.com/foxcpp/maddy/internal/mtasts"
|
|
"github.com/foxcpp/maddy/internal/smtpconn"
|
|
"golang.org/x/net/publicsuffix"
|
|
)
|
|
|
|
type mxConn struct {
|
|
*smtpconn.C
|
|
|
|
// Domain this MX belongs to.
|
|
domain string
|
|
|
|
// Future value holding the MTA-STS fetch results for this domain.
|
|
// May be nil if MTA-STS is disabled.
|
|
stsFut *future.Future
|
|
|
|
// The MX record is DNSSEC-signed and was verified by the used resolver.
|
|
dnssecOk bool
|
|
}
|
|
|
|
func (rd *remoteDelivery) checkPolicies(ctx context.Context, mx string, didTLS, tlsPKIX bool, conn mxConn) error {
|
|
var (
|
|
authenticated bool
|
|
requireTLS bool
|
|
)
|
|
|
|
// Implicit MX is always authenticated (and explicit one with the same
|
|
// hostname too).
|
|
if dns.Equal(mx, conn.domain) {
|
|
authenticated = true
|
|
}
|
|
|
|
// Apply recipient MTA-STS policy.
|
|
if conn.stsFut != nil {
|
|
stsPolicy, err := conn.stsFut.GetContext(ctx)
|
|
if err == nil {
|
|
stsPolicy := stsPolicy.(*mtasts.Policy)
|
|
|
|
// Respect the policy: require TLS if it exists, skip non-matching MXs.
|
|
// Any policy (even None) is enough to mark MX as 'authenticated'.
|
|
requireTLS = stsPolicy.Mode == mtasts.ModeEnforce
|
|
if requireTLS {
|
|
rd.Log.DebugMsg("TLS required by MTA-STS", "mx", mx, "domain", conn.domain)
|
|
}
|
|
if stsPolicy.Match(mx) {
|
|
rd.Log.DebugMsg("authenticated MX using MTA-STS", "mx", mx)
|
|
authenticated = true
|
|
} else if stsPolicy.Mode == mtasts.ModeEnforce {
|
|
rd.Log.Msg("skipping MX not matching MTA-STS", "mx", mx, "domain", conn.domain)
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
|
|
Message: "Failed to estabilish the MX record authenticity (MTA-STS)",
|
|
}
|
|
}
|
|
} else {
|
|
rd.Log.DebugMsg("Policy fetch error, ignoring", "mx", mx, "domain", conn.domain, "err", err)
|
|
}
|
|
}
|
|
|
|
// Mark MX as 'authenticated' if DNS zone is signed.
|
|
if _, do := rd.rt.mxAuth[AuthDNSSEC]; do && conn.dnssecOk {
|
|
rd.Log.DebugMsg("authenticated MX using DNSSEC", "mx", mx, "domain", conn.domain)
|
|
authenticated = true
|
|
}
|
|
|
|
// Mark MX as 'authenticated' if they have the same eTLD+1 domain part.
|
|
if _, do := rd.rt.mxAuth[AuthCommonDomain]; do && commonDomainCheck(conn.domain, mx) {
|
|
rd.Log.DebugMsg("authenticated MX using common domain rule", "mx", mx, "domain", conn.domain)
|
|
authenticated = true
|
|
}
|
|
|
|
// Apply local policy.
|
|
if rd.rt.requireTLS {
|
|
rd.Log.DebugMsg("TLS required by local policy", "mx", mx, "domain", conn.domain)
|
|
requireTLS = true
|
|
}
|
|
|
|
// Make decision based on the policy and connection state.
|
|
if rd.rt.requireMXAuth && !authenticated {
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 0},
|
|
Message: fmt.Sprintf("Failed to estabilish the MX record (%s) authenticity", mx),
|
|
}
|
|
}
|
|
if requireTLS && (!didTLS || !tlsPKIX) {
|
|
return &exterrors.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 7, 1},
|
|
Message: "TLS is required but unsupported or failed (enforced by MTA-STS)",
|
|
}
|
|
}
|
|
|
|
// All green.
|
|
return nil
|
|
}
|
|
|
|
func isVerifyError(err error) bool {
|
|
_, ok := err.(x509.UnknownAuthorityError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.HostnameError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.ConstraintViolationError)
|
|
if ok {
|
|
return true
|
|
}
|
|
_, ok = err.(x509.CertificateInvalidError)
|
|
return ok
|
|
}
|
|
|
|
func (rd *remoteDelivery) attemptMX(ctx context.Context, conn mxConn, record *net.MX) error {
|
|
var (
|
|
daneCtx context.Context
|
|
tlsaFut *future.Future
|
|
)
|
|
if rd.rt.dane {
|
|
var daneCancel func()
|
|
daneCtx, daneCancel = context.WithCancel(ctx)
|
|
defer daneCancel()
|
|
tlsaFut = future.New()
|
|
go func() {
|
|
tlsaFut.Set(rd.lookupTLSA(daneCtx, record.Host))
|
|
}()
|
|
}
|
|
|
|
var (
|
|
tlsCfg *tls.Config
|
|
tlsPKIX = true
|
|
)
|
|
if rd.rt.tlsConfig != nil {
|
|
tlsCfg = rd.rt.tlsConfig.Clone()
|
|
tlsCfg.ServerName = record.Host
|
|
}
|
|
|
|
rd.Log.DebugMsg("trying", "mx", record.Host, "domain", conn.domain)
|
|
|
|
retry:
|
|
// smtpconn.C default TLS behavior is not useful for us, we want to handle
|
|
// TLS errors separately hence starttls=false.
|
|
_, err := conn.Connect(ctx, config.Endpoint{
|
|
Host: record.Host,
|
|
Port: smtpPort,
|
|
}, false, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
starttlsOk, _ := conn.Client().Extension("STARTTLS")
|
|
if starttlsOk && tlsCfg != nil {
|
|
if err := conn.Client().StartTLS(tlsCfg); err != nil {
|
|
// Attempt TLS without authentication. It is still better than
|
|
// plaintext and we might be able to actually authenticate the
|
|
// server using DANE-EE/DANE-TA later.
|
|
//
|
|
// tlsPKIX is to avoid looping forever if the same verify error
|
|
// happens with InsecureSkipVerify too (e.g. certificate is *too*
|
|
// broken).
|
|
if isVerifyError(err) && tlsPKIX {
|
|
rd.Log.Error("TLS verify error, trying without authentication", err, "mx", record.Host, "domain", conn.domain)
|
|
tlsCfg.InsecureSkipVerify = true
|
|
tlsPKIX = false
|
|
conn.Close()
|
|
|
|
goto retry
|
|
}
|
|
|
|
rd.Log.Error("TLS error, trying plaintext", err, "mx", record.Host, "domain", conn.domain)
|
|
tlsCfg = nil
|
|
tlsPKIX = false
|
|
conn.Close()
|
|
|
|
goto retry
|
|
}
|
|
}
|
|
|
|
tlsState, didTLS := conn.Client().TLSConnectionState()
|
|
|
|
if err := rd.checkPolicies(ctx, record.Host, didTLS, tlsPKIX, conn); err != nil {
|
|
conn.Close()
|
|
return err
|
|
}
|
|
|
|
_, err = rd.verifyDANE(ctx, tlsaFut, tlsState)
|
|
if err != nil {
|
|
conn.Close()
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (rd *remoteDelivery) connectionForDomain(ctx context.Context, domain string) (*smtpconn.C, error) {
|
|
domain = strings.ToLower(domain)
|
|
|
|
if c, ok := rd.connections[domain]; ok {
|
|
return c.C, nil
|
|
}
|
|
|
|
conn := mxConn{
|
|
C: smtpconn.New(),
|
|
domain: domain,
|
|
}
|
|
|
|
conn.Dialer = rd.rt.dialer
|
|
conn.Log = rd.Log
|
|
conn.Hostname = rd.rt.hostname
|
|
conn.AddrInSMTPMsg = true
|
|
|
|
if _, do := rd.rt.mxAuth[AuthMTASTS]; do {
|
|
conn.stsFut = future.New()
|
|
if rd.rt.mtastsGet != nil {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsGet(ctx, domain))
|
|
}()
|
|
} else {
|
|
go func() {
|
|
conn.stsFut.Set(rd.rt.mtastsCache.Get(ctx, domain))
|
|
}()
|
|
}
|
|
}
|
|
|
|
region := trace.StartRegion(ctx, "remote/LookupMX")
|
|
dnssecOk, records, err := rd.lookupMX(ctx, domain)
|
|
region.End()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn.dnssecOk = dnssecOk
|
|
|
|
var lastErr error
|
|
region = trace.StartRegion(ctx, "remote/Connect+TLS")
|
|
for _, record := range records {
|
|
if record.Host == "." {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: 556,
|
|
EnhancedCode: exterrors.EnhancedCode{5, 1, 10},
|
|
Message: "Domain does not accept email (null MX)",
|
|
}
|
|
}
|
|
|
|
if err := rd.attemptMX(ctx, conn, record); err != nil {
|
|
if len(records) != 0 {
|
|
rd.Log.Error("cannot use MX", err, "mx", record.Host, "domain", domain)
|
|
}
|
|
lastErr = err
|
|
continue
|
|
}
|
|
break
|
|
}
|
|
region.End()
|
|
|
|
// Stil not connected? Bail out.
|
|
if conn.Client() == nil {
|
|
return nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(err, 451, 550),
|
|
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 0}),
|
|
Message: "No usable MXs, last err: " + lastErr.Error(),
|
|
TargetName: "remote",
|
|
Err: lastErr,
|
|
Misc: map[string]interface{}{
|
|
"domain": domain,
|
|
},
|
|
}
|
|
}
|
|
|
|
if err := conn.Mail(ctx, rd.mailFrom, rd.msgMeta.SMTPOpts); err != nil {
|
|
conn.Close()
|
|
return nil, err
|
|
}
|
|
|
|
rd.connections[domain] = conn
|
|
return conn.C, nil
|
|
}
|
|
|
|
func commonDomainCheck(domain string, mx string) bool {
|
|
domainPart, err := publicsuffix.EffectiveTLDPlusOne(domain)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
mxPart, err := publicsuffix.EffectiveTLDPlusOne(strings.TrimSuffix(mx, "."))
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
return domainPart == mxPart
|
|
}
|
|
|
|
func (rd *remoteDelivery) lookupMX(ctx context.Context, domain string) (dnssecOk bool, records []*net.MX, err error) {
|
|
if _, use := rd.rt.mxAuth[AuthDNSSEC]; use {
|
|
if rd.rt.extResolver == nil {
|
|
return false, nil, errors.New("remote: can't do DNSSEC verification without security-aware resolver")
|
|
}
|
|
dnssecOk, records, err = rd.rt.extResolver.AuthLookupMX(context.Background(), domain)
|
|
} else {
|
|
records, err = rd.rt.resolver.LookupMX(ctx, domain)
|
|
}
|
|
if err != nil {
|
|
reason, misc := exterrors.UnwrapDNSErr(err)
|
|
return false, nil, &exterrors.SMTPError{
|
|
Code: exterrors.SMTPCode(err, 451, 554),
|
|
EnhancedCode: exterrors.SMTPEnchCode(err, exterrors.EnhancedCode{0, 4, 4}),
|
|
Message: "MX lookup error",
|
|
TargetName: "remote",
|
|
Reason: reason,
|
|
Err: err,
|
|
Misc: misc,
|
|
}
|
|
}
|
|
|
|
sort.Slice(records, func(i, j int) bool {
|
|
return records[i].Pref < records[j].Pref
|
|
})
|
|
|
|
// Fallback to A/AAA RR when no MX records are present as
|
|
// required by RFC 5321 Section 5.1.
|
|
if len(records) == 0 {
|
|
records = append(records, &net.MX{
|
|
Host: domain,
|
|
Pref: 0,
|
|
})
|
|
}
|
|
|
|
return dnssecOk, records, err
|
|
}
|