system: Linux mars.sprixweb.com 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
#!/usr/bin/perl -T
### profiling:
### #!/usr/bin/perl -d:NYTProf
### NYTPROF=start=no:addpid=1:forkdepth=1 amavisd -m 5 foreground
#------------------------------------------------------------------------------
# This is amavisd-new.
# It is an interface between a message transfer agent (MTA) and virus
# scanners and/or spam scanners, functioning as a mail content filter.
#
# It is a performance-enhanced and feature-enriched version of amavisd
# (which in turn is a daemonized version of AMaViS), initially based
# on amavisd-snapshot-20020300).
#
# All work since amavisd-snapshot-20020300:
# Copyright (C) 2002-2018 Mark Martinec,
# All Rights Reserved.
# with contributions from the amavis-user mailing list and individuals,
# as acknowledged in the release notes.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
# Author: Mark Martinec <Mark.Martinec@ijs.si>
# Patches and problem reports are welcome.
#
# The latest version of this program is available at:
# http://www.ijs.si/software/amavisd/
#------------------------------------------------------------------------------
# Here is a boilerplate from the amavisd(-snapshot) version, which is
# the version (from 2002-03) that served as a base code for the initial
# version of amavisd-new. License terms were the same:
#
# Author: Chris Mason <cmason@unixzone.com>
# Current maintainer: Lars Hecking <lhecking@users.sourceforge.net>
# Based on work by:
# Mogens Kjaer, Carlsberg Laboratory, <mk@crc.dk>
# Juergen Quade, Softing GmbH, <quade@softing.com>
# Christian Bricart <shiva@aachalon.de>
# Rainer Link <link@foo.fh-furtwangen.de>
# This script is part of the AMaViS package. For more information see:
# http://amavis.org/
# Copyright (C) 2000 - 2002 the people mentioned above
# This software is licensed under the GNU General Public License (GPL)
# See: http://www.gnu.org/copyleft/gpl.html
#------------------------------------------------------------------------------
#------------------------------------------------------------------------------
#Index of packages in this file
# Amavis::Boot
# Amavis::Conf
# Amavis::JSON
# Amavis::Log
# Amavis::DbgLog
# Amavis::Timing
# Amavis::Util
# Amavis::ProcControl
# Amavis::rfc2821_2822_Tools
# Amavis::Lookup::RE
# Amavis::Lookup::IP
# Amavis::Lookup::Opaque
# Amavis::Lookup::OpaqueRef
# Amavis::Lookup::Label
# Amavis::Lookup::SQLfield (just the new() method declared here)
# Amavis::Lookup::LDAPattr (just the new() method declared here)
# Amavis::Lookup
# Amavis::Expand
# Amavis::TempDir
# Amavis::IO::FileHandle
# Amavis::IO::Zlib
# Amavis::IO::RW
# Amavis::In::Connection
# Amavis::In::Message::PerRecip
# Amavis::In::Message
# Amavis::Out::EditHeader
# Amavis::Out
# Amavis::UnmangleSender
# Amavis::Unpackers::NewFilename
# Amavis::Unpackers::Part
# Amavis::Unpackers::OurFiler
# Amavis::Unpackers::Validity
# Amavis::Unpackers::MIME
# Amavis::Notify
# Amavis::Custom
# Amavis
#optionally compiled-in packages: ---------------------------------------------
# Amavis::ZMQ
# Amavis::DB::SNMP
# Amavis::DB
# Amavis::Lookup::SQLfield (the rest)
# Amavis::Lookup::SQL
# Amavis::LDAP::Connection
# Amavis::Lookup::LDAP
# Amavis::Lookup::LDAPattr (the rest)
# Amavis::In::AMPDP
# Amavis::In::SMTP
#( Amavis::In::Courier )
# Amavis::Out::SMTP::Protocol
# Amavis::Out::SMTP::Session
# Amavis::Out::SMTP
# Amavis::Out::Pipe
# Amavis::Out::BSMTP
# Amavis::Out::Local
# Amavis::OS_Fingerprint
# Amavis::Redis
# Amavis::Out::SQL::Connection
# Amavis::Out::SQL::Log
# Amavis::IO::SQL
# Amavis::Out::SQL::Quarantine
# Amavis::AV
# Amavis::SpamControl
# Amavis::SpamControl::ExtProg
# Amavis::SpamControl::RspamdClient
# Amavis::SpamControl::SpamdClient
# Mail::SpamAssassin::Logger::Amavislog
# Amavis::SpamControl::SpamAssassin
# Amavis::Unpackers
# Amavis::DKIM::CustomSigner
# Amavis::DKIM
# Amavis::Tools
#------------------------------------------------------------------------------
BEGIN { pop @INC if $INC[-1] eq '.' } # CVE-2016-1238 (perl)
use sigtrap qw(stack-trace BUS SEGV EMT FPE ILL SYS TRAP); # ABRT
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
#
package Amavis::Boot;
use strict;
use re 'taint';
use Errno qw(ENOENT EACCES);
# replacement for a 'require' with a more informative error handling
#sub my_require($) {
# my $filename = $_[0];
# my $result;
# if (exists $INC{$filename} && !$INC{$filename}) {
# die "Compilation failed in require\n";
# } elsif (exists $INC{$filename}) {
# $result = 1; # already loaded
# } else {
# my $found = 0;
# for my $prefix (@INC) {
# my $full_fname = "$prefix/$filename";
# my(@stat_list) = stat($full_fname); # symlinks-friendly
# my $errn = @stat_list ? 0 : 0+$!;
# if ($errn != ENOENT) {
# $found = 1;
# $INC{$filename} = $full_fname;
# my $owner_uid = $stat_list[4];
# my $msg;
# if ($errn) { $msg = "is inaccessible: $!" }
# elsif (-d _) { $msg = "is a directory" }
# elsif (!-f _) { $msg = "is not a regular file" }
# elsif ($> && -o _) { $msg = "should not be owned by EUID $>" }
# elsif ($> && -w _) { $msg = "is writable by EUID $>, EGID $)" }
# elsif ($owner_uid) { $msg = "should be owned by root (uid 0) "}
# !defined($msg) or die "Requiring $full_fname, file $msg,\n";
# $! = 0;
# $result = do $full_fname;
# if (!defined($result) && $@ ne '') {
# undef $INC{$filename}; chomp($@);
# die "Error in file $full_fname: $@\n";
# } elsif (!defined($result) && $! != 0) {
# undef $INC{$filename};
# die "Error reading file $full_fname: $!\n";
# } elsif (!$result) {
# undef $INC{$filename};
# die "Module $full_fname did not return a true value\n";
# }
# last;
# }
# }
# die sprintf("my_require: Can't locate %s in \@INC (\@INC contains: %s)\n",
# $filename, join(' ',@INC)) if !$found;
# }
# $result;
#}
# Fetch all required modules (or nicely report missing ones), and compile them
# once-and-for-all at the parent process, so that forked children can inherit
# and share already compiled code in memory. Children will still need to 'use'
# modules if they want to inherit from their name space.
#
sub fetch_modules($$@) {
my($reason, $required, @modules) = @_;
my(@missing);
for my $m (@modules) {
local $_ = $m;
$_ .= /^auto::/ ? '.al' : '.pm' if !m{^/} && !m{\.(?:pm|pl|al|ix)\z};
s{::}{/}g;
eval {
require $_;
# my_require $_; # more informative on err, but some problems reported
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
push(@missing,$m);
$eval_stat =~ s/^/ /gms; # indent
printf STDERR ("fetch_modules: error loading %s module %s:\n%s\n",
$required ? 'required' : 'optional', $_, $eval_stat)
if $eval_stat !~ /\bCan't locate \Q$_\E in \@INC\b/;
};
}
die "ERROR: MISSING $reason:\n" . join('', map(" $_\n", @missing))
if $required && @missing;
\@missing;
}
BEGIN {
if ($] <= 5.008) { # deal with a glob() taint bug (perl 5.6.1, 5.8.0)
fetch_modules('REQUIRED BASIC MODULES', 1, qw(File::Glob));
File::Glob->import(':globally'); # use the same module as Perl 5.8 uses
}
fetch_modules('REQUIRED BASIC MODULES', 1, qw(
Exporter POSIX Fcntl Socket Errno Carp Time::HiRes
IO::Handle IO::File IO::Socket IO::Socket::UNIX
IO::Stringy Digest::MD5 Unix::Syslog File::Basename
Compress::Zlib MIME::Base64 MIME::QuotedPrint MIME::Words
MIME::Head MIME::Body MIME::Entity MIME::Parser MIME::Decoder
MIME::Decoder::Base64 MIME::Decoder::Binary MIME::Decoder::QuotedPrint
MIME::Decoder::NBit MIME::Decoder::UU MIME::Decoder::Gzip64
Net::LibIDN Net::Server Net::Server::PreFork
));
# with earlier versions of Perl one may need to add additional modules
# to the list, such as: auto::POSIX::setgid auto::POSIX::setuid ...
fetch_modules('OPTIONAL BASIC MODULES', 0, qw(
PerlIO PerlIO::scalar Unix::Getrusage
Carp::Heavy auto::POSIX::setgid auto::POSIX::setuid
auto::POSIX::SigAction::new auto::POSIX::SigAction::safe
MIME::Decoder::BinHex
));
1;
}
1;
#
package Amavis::Conf;
use strict;
use re 'taint';
# constants; intentionally leave value -1 unassigned for compatibility
use constant D_TEMPFAIL => -4;
use constant D_REJECT => -3;
use constant D_BOUNCE => -2;
use constant D_DISCARD => 0;
use constant D_PASS => 1;
# major contents_category constants, in increasing order of importance
use constant CC_CATCHALL => 0;
use constant CC_CLEAN => 1; # tag_level = "CC_CLEAN,1"
use constant CC_MTA => 2; # trouble passing mail back to MTA
use constant CC_OVERSIZED => 3;
use constant CC_BADH => 4;
use constant CC_SPAMMY => 5; # tag2_level (and: tag3_level = CC_SPAMMY,1)
use constant CC_SPAM => 6; # kill_level
use constant CC_UNCHECKED => 7;
use constant CC_BANNED => 8;
use constant CC_VIRUS => 9;
#
# in other words: major_ccat minor_ccat %subject_tag_maps_by_ccat
## if score >= kill level => CC_SPAM 0
## elsif score >= tag3 level => CC_SPAMMY 1 @spam_subject_tag3_maps
## elsif score >= tag2 level => CC_SPAMMY 0 @spam_subject_tag2_maps
## elsif score >= tag level => CC_CLEAN 1 @spam_subject_tag_maps
## else => CC_CLEAN 0
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
%EXPORT_TAGS = (
'dynamic_confvars' => # per- policy bank settings
[qw(
$child_timeout $smtpd_timeout
$policy_bank_name $protocol $haproxy_target_enabled @inet_acl
$myhostname $myauthservid $snmp_contact $snmp_location
$myprogram_name $syslog_ident $syslog_facility
$log_level $log_templ $log_recip_templ $enable_log_capture_dump
$forward_method $notify_method $resend_method $report_format
$release_method $requeue_method $release_format
$attachment_password $attachment_email_name $attachment_outer_name
$mail_digest_algorithm $mail_part_digest_algorithm
$os_fingerprint_method $os_fingerprint_dst_ip_and_port
$originating @smtpd_discard_ehlo_keywords $soft_bounce
$propagate_dsn_if_possible $terminate_dsn_on_notify_success
$amavis_auth_user $amavis_auth_pass $auth_reauthenticate_forwarded
$auth_required_out $auth_required_inp $auth_required_release
@auth_mech_avail $tls_security_level_in $tls_security_level_out
$local_client_bind_address $smtpd_message_size_limit
$localhost_name $smtpd_greeting_banner $smtpd_quit_banner
$mailfrom_to_quarantine $warn_offsite $bypass_decode_parts @decoders
@av_scanners @av_scanners_backup @spam_scanners
$first_infected_stops_scan $virus_scanners_failure_is_fatal
$sa_spam_level_char $sa_mail_body_size_limit
$penpals_bonus_score $penpals_halflife $bounce_killer_score
$reputation_factor
$undecipherable_subject_tag $localpart_is_case_sensitive
$recipient_delimiter $replace_existing_extension
$hdr_encoding $bdy_encoding $hdr_encoding_qb
$allow_disclaimers $outbound_disclaimers_only
$prepend_header_fields_hdridx
$allow_fixing_improper_header
$allow_fixing_improper_header_folding $allow_fixing_long_header_lines
%allowed_added_header_fields %prefer_our_added_header_fields
%allowed_header_tests
$X_HEADER_TAG $X_HEADER_LINE
$remove_existing_x_scanned_headers $remove_existing_spam_headers
%sql_clause $partition_tag
%local_delivery_aliases $banned_namepath_re
$per_recip_whitelist_sender_lookup_tables
$per_recip_blacklist_sender_lookup_tables
@anomy_sanitizer_args @altermime_args_defang
@altermime_args_disclaimer @disclaimer_options_bysender_maps
%signed_header_fields @dkim_signature_options_bysender_maps
$enable_dkim_verification $enable_dkim_signing $dkim_signing_service
$dkim_minimum_key_bits $enable_ldap $enable_ip_repu $redis_logging_key
@local_domains_maps
@mynetworks_maps @client_ipaddr_policy @ip_repu_ignore_maps
@forward_method_maps @newvirus_admin_maps @banned_filename_maps
@spam_quarantine_bysender_to_maps
@spam_tag_level_maps @spam_tag2_level_maps @spam_tag3_level_maps
@spam_kill_level_maps
@spam_subject_tag_maps @spam_subject_tag2_maps @spam_subject_tag3_maps
@spam_dsn_cutoff_level_maps @spam_dsn_cutoff_level_bysender_maps
@spam_crediblefrom_dsn_cutoff_level_maps
@spam_crediblefrom_dsn_cutoff_level_bysender_maps
@spam_quarantine_cutoff_level_maps @spam_notifyadmin_cutoff_level_maps
@whitelist_sender_maps @blacklist_sender_maps @score_sender_maps
@author_to_policy_bank_maps @signer_reputation_maps
@message_size_limit_maps @debug_sender_maps @debug_recipient_maps
@bypass_virus_checks_maps @bypass_spam_checks_maps
@bypass_banned_checks_maps @bypass_header_checks_maps
@viruses_that_fake_sender_maps
@virus_name_to_spam_score_maps @virus_name_to_policy_bank_maps
@remove_existing_spam_headers_maps
@sa_userconf_maps @sa_username_maps
%final_destiny_maps_by_ccat %forward_method_maps_by_ccat
%lovers_maps_by_ccat %defang_maps_by_ccat %subject_tag_maps_by_ccat
%quarantine_method_by_ccat %quarantine_to_maps_by_ccat
%notify_admin_templ_by_ccat %notify_recips_templ_by_ccat
%notify_sender_templ_by_ccat %notify_autoresp_templ_by_ccat
%notify_release_templ_by_ccat %notify_report_templ_by_ccat
%warnsender_by_ccat
%hdrfrom_notify_admin_by_ccat %mailfrom_notify_admin_by_ccat
%hdrfrom_notify_recip_by_ccat %mailfrom_notify_recip_by_ccat
%hdrfrom_notify_sender_by_ccat
%hdrfrom_notify_release_by_ccat %hdrfrom_notify_report_by_ccat
%admin_maps_by_ccat %warnrecip_maps_by_ccat
%always_bcc_by_ccat %dsn_bcc_by_ccat
%addr_extension_maps_by_ccat %addr_rewrite_maps_by_ccat
%smtp_reason_by_ccat
)],
'confvars' => # global settings (not per-policy, not per-recipient)
[qw(
$myproduct_name $myversion_id $myversion_id_numeric $myversion_date
$myversion $instance_name @additional_perl_modules
$MYHOME $TEMPBASE $QUARANTINEDIR $quarantine_subdir_levels
$daemonize $courierfilter_shutdown $pid_file $lock_file $db_home
$enable_db $enable_zmq @zmq_sockets $mail_id_size_bits
$daemon_user $daemon_group $daemon_chroot_dir $path
$DEBUG %i_know_what_i_am_doing
$do_syslog $logfile $allow_preserving_evidence $enable_log_capture
$log_short_templ $log_verbose_templ $logline_maxlen
$nanny_details_level $max_servers $max_requests
$min_servers $min_spare_servers $max_spare_servers
%current_policy_bank %policy_bank %interface_policy
@listen_sockets $inet_socket_port $inet_socket_bind $listen_queue_size
$smtpd_recipient_limit $unix_socketname $unix_socket_mode
$smtp_connection_cache_on_demand $smtp_connection_cache_enable
%smtp_tls_client_options %smtpd_tls_server_options
$smtpd_tls_cert_file $smtpd_tls_key_file
$enforce_smtpd_message_size_limit_64kb_min
$MAXLEVELS $MAXFILES
$MIN_EXPANSION_QUOTA $MIN_EXPANSION_FACTOR
$MAX_EXPANSION_QUOTA $MAX_EXPANSION_FACTOR
$database_sessions_persistent $lookup_maps_imply_sql_and_ldap
@lookup_sql_dsn @storage_sql_dsn @storage_redis_dsn
$storage_redis_ttl $redis_logging_queue_size_limit
$sql_schema_version $timestamp_fmt_mysql
$sql_quarantine_chunksize_max $sql_allow_8bit_address
$sql_lookups_no_at_means_domain $ldap_lookups_no_at_means_domain
$sql_store_info_for_all_msgs $default_ldap
$trim_trailing_space_in_lookup_result_fields
@keep_decoded_original_maps @map_full_type_to_short_type_maps
%banned_rules $penpals_threshold_low $penpals_threshold_high
%dkim_signing_keys_by_domain
@dkim_signing_keys_list @dkim_signing_keys_storage
$file $altermime $enable_anomy_sanitizer
)],
'sa' => # global SpamAssassin settings
[qw(
$spamcontrol_obj $sa_num_instances
$helpers_home $sa_configpath $sa_siteconfigpath $sa_userprefs_file
$sa_local_tests_only $sa_timeout $sa_debug
$dspam $sa_spawned
)],
'platform' => [qw(
$profiling $can_truncate $my_pid
$AF_INET6 $have_inet4 $have_inet6 $io_socket_module_name
&D_TEMPFAIL &D_REJECT &D_BOUNCE &D_DISCARD &D_PASS
&CC_CATCHALL &CC_CLEAN &CC_MTA &CC_OVERSIZED &CC_BADH
&CC_SPAMMY &CC_SPAM &CC_UNCHECKED &CC_BANNED &CC_VIRUS
%ccat_display_names %ccat_display_names_major
)],
# other variables settable by user in amavisd.conf,
# but not directly accessible to the program
'hidden_confvars' => [qw(
$mydomain
)],
'legacy_dynamic_confvars' =>
# the rest of the program does not use these settings directly and they
# should not be visible in, or imported to other modules, but may be
# referenced indirectly through *_by_ccat variables for compatibility
[qw(
$final_virus_destiny $final_banned_destiny $final_unchecked_destiny
$final_spam_destiny $final_bad_header_destiny
@virus_lovers_maps @spam_lovers_maps @unchecked_lovers_maps
@banned_files_lovers_maps @bad_header_lovers_maps
$always_bcc $dsn_bcc
$mailfrom_notify_sender $mailfrom_notify_recip
$mailfrom_notify_admin $mailfrom_notify_spamadmin
$hdrfrom_notify_sender $hdrfrom_notify_recip
$hdrfrom_notify_admin $hdrfrom_notify_spamadmin
$hdrfrom_notify_release $hdrfrom_notify_report
$notify_virus_admin_templ $notify_spam_admin_templ
$notify_virus_recips_templ $notify_spam_recips_templ
$notify_virus_sender_templ $notify_spam_sender_templ
$notify_sender_templ $notify_release_templ
$notify_report_templ $notify_autoresp_templ
$warnbannedsender $warnbadhsender
$defang_virus $defang_banned $defang_spam
$defang_bad_header $defang_undecipherable $defang_all
$virus_quarantine_method $banned_files_quarantine_method
$unchecked_quarantine_method $spam_quarantine_method
$bad_header_quarantine_method $clean_quarantine_method
$archive_quarantine_method
@virus_quarantine_to_maps @banned_quarantine_to_maps
@unchecked_quarantine_to_maps @spam_quarantine_to_maps
@bad_header_quarantine_to_maps @clean_quarantine_to_maps
@archive_quarantine_to_maps
@virus_admin_maps @banned_admin_maps
@spam_admin_maps @bad_header_admin_maps @spam_modifies_subj_maps
@warnvirusrecip_maps @warnbannedrecip_maps @warnbadhrecip_maps
@addr_extension_virus_maps @addr_extension_spam_maps
@addr_extension_banned_maps @addr_extension_bad_header_maps
)],
'legacy_confvars' =>
# legacy variables, predeclared for compatibility of amavisd.conf
# The rest of the program does not use them directly and they should
# not be visible in other modules, but may be referenced through
# @*_maps variables for backward compatibility
[qw(
%local_domains @local_domains_acl $local_domains_re
@mynetworks @ip_repu_ignore_networks
%bypass_virus_checks @bypass_virus_checks_acl $bypass_virus_checks_re
%bypass_spam_checks @bypass_spam_checks_acl $bypass_spam_checks_re
%bypass_banned_checks @bypass_banned_checks_acl $bypass_banned_checks_re
%bypass_header_checks @bypass_header_checks_acl $bypass_header_checks_re
%virus_lovers @virus_lovers_acl $virus_lovers_re
%spam_lovers @spam_lovers_acl $spam_lovers_re
%banned_files_lovers @banned_files_lovers_acl $banned_files_lovers_re
%bad_header_lovers @bad_header_lovers_acl $bad_header_lovers_re
%virus_admin %spam_admin
$newvirus_admin $virus_admin $banned_admin $bad_header_admin $spam_admin
$warnvirusrecip $warnbannedrecip $warnbadhrecip
$virus_quarantine_to $banned_quarantine_to $unchecked_quarantine_to
$spam_quarantine_to $spam_quarantine_bysender_to
$bad_header_quarantine_to $clean_quarantine_to $archive_quarantine_to
$keep_decoded_original_re $map_full_type_to_short_type_re
$banned_filename_re $viruses_that_fake_sender_re
$sa_tag_level_deflt $sa_tag2_level_deflt $sa_tag3_level_deflt
$sa_kill_level_deflt
$sa_quarantine_cutoff_level @spam_notifyadmin_cutoff_level_maps
$sa_dsn_cutoff_level $sa_crediblefrom_dsn_cutoff_level
$sa_spam_modifies_subj $sa_spam_subject_tag1 $sa_spam_subject_tag
%whitelist_sender @whitelist_sender_acl $whitelist_sender_re
%blacklist_sender @blacklist_sender_acl $blacklist_sender_re
$addr_extension_virus $addr_extension_spam
$addr_extension_banned $addr_extension_bad_header
$sql_select_policy $sql_select_white_black_list
$gets_addr_in_quoted_form @debug_sender_acl
$arc $bzip2 $lzop $lha $unarj $gzip $uncompress $unfreeze
$unrar $zoo $pax $cpio $ar $rpm2cpio $cabextract $ripole $tnef
$gunzip $bunzip2 $unlzop $unstuff
$SYSLOG_LEVEL $syslog_priority $append_header_fields_to_bottom
$insert_received_line $notify_xmailer_header $relayhost_is_client
$sa_spam_report_header $sa_auto_whitelist
$warnvirussender $warnspamsender
$enable_global_cache
$virus_check_negative_ttl $virus_check_positive_ttl
$spam_check_negative_ttl $spam_check_positive_ttl
)],
);
Exporter::export_tags qw(dynamic_confvars confvars sa platform
hidden_confvars legacy_dynamic_confvars legacy_confvars);
1;
} # BEGIN
use POSIX ();
use Carp ();
use Errno qw(ENOENT EACCES EBADF);
use vars @EXPORT;
sub c($); sub cr($); sub ca($); sub dkim_key($$$;@); # prototypes
use subs qw(c cr ca dkim_key); # access subroutines to config vars and keys
BEGIN { push(@EXPORT,qw(c cr ca dkim_key)) }
# access to dynamic config variables, returns a scalar config variable value;
# one level of indirection is allowed
#
sub c($) {
my $var = $current_policy_bank{$_[0]};
if (!defined $var) {
my $name = $_[0];
if (!exists $current_policy_bank{$name}) {
Carp::croak(sprintf('No entry "%s" in policy bank "%s"',
$name, $current_policy_bank{'policy_bank_name'}));
}
}
my $r = ref $var;
!$r ? $var : $r eq 'SCALAR' || $r eq 'REF' ? $$var : $var;
}
# return a ref to a config variable value, or undef if var is undefined
#
sub cr($) {
my $var = $current_policy_bank{$_[0]};
if (!defined $var) {
my $name = $_[0];
if (!exists $current_policy_bank{$name}) {
Carp::croak(sprintf('No entry "%s" in policy bank "%s"',
$name, $current_policy_bank{'policy_bank_name'}));
}
}
ref $var ? $var : defined $var ? \$var : undef;
}
# return a ref to a config variable value (which is supposed to be an array),
# converting undef to an empty array, and a scalar to a one-element array
# if necessary
#
sub ca($) {
my $var = $current_policy_bank{$_[0]};
if (!defined $var) {
my $name = $_[0];
if (!exists $current_policy_bank{$name}) {
Carp::croak(sprintf('No entry "%s" in policy bank "%s"',
$name, $current_policy_bank{'policy_bank_name'}));
}
}
ref $var ? $var : defined $var ? [$var] : [];
}
sub deprecate_var($$$) {
my($data_type, $var_name, $init_value) = @_;
my $code = <<'EOD';
tie(%n, '%p', %v) or die 'Tieing a variable %n failed';
package %p;
use strict; use Carp ();
sub TIESCALAR { my($class,$val) = @_; bless \$val, $class }
sub FETCH { my $self = shift; $$self }
sub STORE { my($self,$newv) = @_; my $oldv = $$self;
if ((defined $oldv || defined $newv) && (%t)) {
Carp::carp('Variable %n was retired, changing its value has no effect.'
. " See release notes.\n");
}
$$self = $newv;
}
1;
EOD
if ($data_type eq 'bool') {
$code =~ s{%t}'($oldv ? 1 : 0) != ($newv ? 1 : 0)'g;
} elsif ($data_type eq 'num') {
$code =~ s{%t}'!defined $oldv || !defined $newv || $oldv != $newv'g;
} elsif ($data_type eq 'str') {
$code =~ s{%t}'!defined $oldv || !defined $newv || $oldv ne $newv'g;
} else {
die "Error deprecating a variable $var_name: bad type $data_type";
}
$code =~ s/%n/$var_name/g;
$code =~ s/%v/\$init_value/g;
my $barename = $var_name;
$barename =~ s/^[\$\@%&]//; $code =~ s/%p/Amavis::Deprecate::$barename/g;
eval $code
or do { chomp $@; die "Error deprecating a variable $var_name: $@" };
}
# Store a private DKIM signing key for a given domain and selector.
# The argument $key can be a Mail::DKIM::PrivateKey object or a file
# name containing a key in a PEM format (e.g. as generated by openssl).
# For compatibility with dkim_milter the signing domain can include a '*'
# as a wildcard - this is not recommended as this way amavisd could produce
# signatures which have no corresponding public key published in DNS.
# The proper way is to have one dkim_key entry for each published DNS RR.
# Optional arguments can provide additional information about the resource
# record (RR) of a public key, i.e. its options according to RFC 6376.
# The subroutine is typically called from a configuration file, once for
# each signing key available.
#
sub dkim_key($$$;@) {
my($domain,$selector,$key) = @_; shift; shift; shift;
@_%2 == 0 or die "dkim_key: a list of key/value pairs expected as options\n";
my(%key_options) = @_; # remaining args are options from a public key RR
defined $domain && $domain ne ''
or die "dkim_key: domain must not be empty: ($domain,$selector,$key)";
defined $selector && $selector ne ''
or die "dkim_key: selector must not be empty: ($domain,$selector,$key)";
my $key_storage_ind;
if (ref $key) { # key already preprocessed and provided as an object
push(@dkim_signing_keys_storage, [$key]);
$key_storage_ind = $#dkim_signing_keys_storage;
} else { # assume a name of a file containing a private key in PEM format
my $fname = $key;
my $pem_fh = IO::File->new; # open a file with a private key
$pem_fh->open($fname,'<') or die "Can't open PEM file $fname: $!";
my(@stat_list) = stat($pem_fh); # soft-link friendly
@stat_list or warn "Error accessing $fname: $!";
my($dev,$inode) = @stat_list;
# perl 5.28: On platforms where inode numbers are of a type larger than
# perl's native integer numerical types, stat will preserve the full
# content of large inode numbers by returning them in the form of strings
# of decimal digits. Use eq rather than == for exact comparison of inode.
if (defined $dev && defined $inode) {
for my $j (0..$#dkim_signing_keys_storage) { # same file reused?
my($k,$dv,$in,$fn) = @{$dkim_signing_keys_storage[$j]};
if ($dv == $dev && $in eq $inode) { $key_storage_ind = $j; last }
}
}
if (!defined($key_storage_ind)) {
# read file and store its contents as a new entry
$key = ''; Amavis::Util::read_file($pem_fh,\$key);
my $key_fit = $key; # shrink allocated storage size to actual size
undef $key; # release storage
push(@dkim_signing_keys_storage, [$key_fit, $dev, $inode, $fname]);
$key_storage_ind = $#dkim_signing_keys_storage;
}
$pem_fh->close or die "Error closing file $fname: $!";
$key_options{k} = 'rsa' if defined $key_options{k}; # force RSA
}
# possibly the $domain is a regexp
$domain = Amavis::Util::idn_to_ascii($domain) if !ref $domain;
$selector = Amavis::Util::idn_to_ascii($selector);
$key_options{domain} = $domain; $key_options{selector} = $selector;
$key_options{key_storage_ind} = $key_storage_ind;
if (@dkim_signing_keys_list > 100) {
# sorry, skip the test to avoid slow O(n^2) searches
} else {
!grep($_->{domain} eq $domain && $_->{selector} eq $selector,
@dkim_signing_keys_list)
or die "dkim_key: selector $selector for domain $domain already in use\n";
}
$key_options{key_ind} = $#dkim_signing_keys_list + 1;
push(@dkim_signing_keys_list, \%key_options); # using a list preserves order
}
# essential initializations, right at the program start time, may run as root!
#
use vars qw($read_config_files_depth @actual_config_files);
BEGIN { # init_primary: version, base policy bank
$myprogram_name = $0; # typically 'amavisd'
local $1; $myprogram_name =~ s{([^/]*)\z}{$1}s;
$myproduct_name = 'amavisd-new';
$myversion_id = '2.12.3'; $myversion_date = '20240304';
$myversion = "$myproduct_name-$myversion_id ($myversion_date)";
$myversion_id_numeric = # x.yyyzzz, allows numerical compare, like Perl $]
sprintf('%8.6f', $1 + ($2 + $3/1000)/1000)
if $myversion_id =~ /^(\d+)(?:\.(\d*)(?:\.(\d*))?)?(.*)$/s;
$sql_schema_version = $myversion_id_numeric;
$read_config_files_depth = 0;
# initialize policy bank hash to contain dynamic config settings
for my $tag (@EXPORT_TAGS{'dynamic_confvars', 'legacy_dynamic_confvars'}) {
for my $v (@$tag) {
local($1,$2);
if ($v !~ /^([%\$\@])(.*)\z/s) { die "Unsupported variable type: $v" }
else {
no strict 'refs'; my($type,$name) = ($1,$2);
$current_policy_bank{$name} = $type eq '$' ? \${"Amavis::Conf::$name"}
: $type eq '@' ? \@{"Amavis::Conf::$name"}
: $type eq '%' ? \%{"Amavis::Conf::$name"}
: undef;
}
}
}
$current_policy_bank{'policy_bank_name'} = ''; # builtin policy
$current_policy_bank{'policy_bank_path'} = '';
$policy_bank{''} = { %current_policy_bank }; # copy
1;
} # end BEGIN - init_primary
# boot-time initializations of simple global settings, may run as root!
#
BEGIN {
# serves only as a quick default for other configuration settings
$MYHOME = '/var/amavis';
$mydomain = '!change-mydomain-variable!.example.com';#intentionally bad deflt
# Create debugging output - true: log to stderr; false: log to syslog/file
$DEBUG = 0;
# Is Devel::NYTProf profiler loaded?
$profiling = 1 if DB->UNIVERSAL::can('enable_profile');
# In case of trouble, allow preserving temporary files for forensics
$allow_preserving_evidence = 1;
# Cause Net::Server parameters 'background' and 'setsid' to be set,
# resulting in the process to detach itself from the terminal
$daemonize = 1;
# Net::Server pre-forking settings - defaults, overruled by amavisd.conf
$max_servers = 2; # number of pre-forked children
$max_requests = 20; # retire a child after that many accepts, 0=unlimited
# timeout for our processing:
$child_timeout = 8*60; # abort child if it does not complete a task in n sec
# timeout for waiting on client input:
$smtpd_timeout = 8*60; # disconnect session if client is idle for too long;
# $smtpd_timeout should be higher than Postfix's max_idle (default 100s)
# Assume STDIN is a courierfilter pipe and shutdown when it becomes readable
$courierfilter_shutdown = 0;
# Can file be truncated?
# Set to 1 if 'truncate' works (it is XPG4-UNIX standard feature,
# not required by Posix).
# Things will go faster with SMTP-in, otherwise (e.g. with milter)
# it makes no difference as file truncation will not be used.
$can_truncate = 1;
# Customizable notification messages, logging
$syslog_ident = 'amavis';
$syslog_facility = 'mail';
$log_level = 0;
# should be less than (1023 - prefix), i.e. 980,
# to avoid syslog truncating lines; see sub write_log
$logline_maxlen = 980;
$nanny_details_level = 1; # register_proc verbosity: 0, 1, 2
# $inner_sock_specs in amavis-services should match one of the sockets
# in the @zmq_sockets list
# @zmq_sockets = ( "ipc://$MYHOME/amavisd-zmq.sock" ); # after-default
# $enable_zmq = undef; # load optional module Amavis::ZMQ
# # (interface to 0MQ or Crossroads I/O)
# $enable_db = undef; # load optional modules Amavis::DB & Amavis::DB::SNMP
# $enable_dkim_signing = undef;
# $enable_dkim_verification = undef;
$enable_ip_repu = 1; # ignored when @storage_redis_dsn is empty
# a key (string) for a redis list serving as a queue of json events
# for logstash / elasticsearch use; undef or empty or '0' disables
# logging of events to redis
$redis_logging_key = undef; # e.g. "amavis-log";
# a limit on the length of a redis list - new log events will be dropped
# while the queue size limit is exceeded; undef or 0 disables logging;
# reasonable value: 100000, takes about 250 MB of memory in a redis server
# when noone is pulling events from the list
$redis_logging_queue_size_limit = undef;
$reputation_factor = 0.2; # DKIM reputation: a value between 0 and 1,
# controlling the amount of 'bending' of a calculated spam score
# towards a fixed score assigned to a signing domain (its 'reputation')
# through @signer_reputation_maps; the formula is:
# adjusted_spam_score = f*reputation + (1-f)*spam_score
# which has the same semantics as auto_whitelist_factor in SpamAssassin AWL
# keep SQL, LDAP and Redis sessions open when idle
$database_sessions_persistent = 1;
$lookup_maps_imply_sql_and_ldap = 1; # set to 0 to disable
# Algorithm name for generating a mail header digest and a mail body digest:
# either 'MD5' (will use Digest::MD5, fastest and smallest digest), or
# anything else accepted by Digest::SHA->new(), e.g. 'SHA-1' or 'SHA-256'.
# The generated digest may end up as part of a quarantine file name
# or via macro %b in log or notification templates.
#
$mail_digest_algorithm = 'MD5'; # or 'SHA-1' or 'SHA-256', ...
# Algorithm name for generating digests of decoded MIME parts of a message.
# The value is an algorithm name as accepted by Digest::SHA->new(),
# e.g. 'SHA-1' or 'SHA-256' or 'sha256', or a string 'MD5' which implies
# the MD5 algorithm as implemented by a module Digest::MD5.
# For compatibility with SpamAssassin the chosen algorithm should be SHA1,
# otherwise bayes tokens won't match those generated by sa-learn.
# Undefined value disables generating digests of MIME parts.
#
$mail_part_digest_algorithm = 'SHA1';
# Where to find SQL server(s) and database to support SQL lookups?
# A list of triples: (dsn,user,passw). Specify more than one
# for multiple (backup) SQL servers.
#
#@storage_sql_dsn =
#@lookup_sql_dsn =
# ( ['DBI:mysql:mail:host1', 'some-username1', 'some-password1'],
# ['DBI:mysql:mail:host2', 'some-username2', 'some-password2'] );
# Does a database mail address field with no '@' character represent a
# local username or a domain name? By default it implies a username in
# SQL and LDAP lookups (but represents a domain in hash and acl lookups),
# so domain names in SQL and LDAP should be specified as '@domain'.
# Setting these to true will cause 'xxx' to be interpreted as a domain
# name, just like in hash or acl lookups.
#
$sql_lookups_no_at_means_domain = 0;
$ldap_lookups_no_at_means_domain = 0;
# Maximum size (in bytes) for data written to a field 'quarantine.mail_text'
# when quarantining to SQL. Must not exceed size allowed for a data type
# on a given SQL server. It also determines a buffer size in amavisd.
# Too large a value may exceed process virtual memory limits or just waste
# memory, too small a value splits large mail into too many chunks, which
# may be less efficient to process.
#
$sql_quarantine_chunksize_max = 16384;
$sql_allow_8bit_address = 0;
# the length of mail_id in bits, must be an integral multiple of 24
# (i.e. divisible by 6 and 8); the mail_id is represented externally
# as a base64url-encoded string of size $mail_id_size_bits / 6
#
$mail_id_size_bits = 72; # 24, 48, 72, 96
# redis data (penpals) expiration - time-to-live in seconds of stored items
$storage_redis_ttl = 16*24*60*60; # 16 days (only affects penpals data)
$sql_store_info_for_all_msgs = 1;
$penpals_bonus_score = undef; # maximal (positive) score value by which spam
# score is lowered when sender is known to have previously received mail
# from our local user from this mail system. Zero or undef disables
# pen pals lookups in Redis or in SQL tables msgs and msgrcpt, and
# is a default.
$penpals_halflife = 7*24*60*60; # exponential decay time constant in seconds;
# pen pal bonus is halved for each halflife period since the last mail
# sent by a local user to a current message's sender
$penpals_threshold_low = 1.0; # SA score below which pen pals lookups are
# not performed to save time; undef lets the threshold be ignored;
$penpals_threshold_high = undef;
# when (SA_score - $penpals_bonus_score > $penpals_threshold_high)
# pen pals lookup will not be performed to save time, as it could not
# influence blocking of spam even at maximal penpals bonus (age=0);
# usual choice for value would be a kill level or other reasonably high
# value; undef lets the threshold be ignored and is a default (useful
# for testing and statistics gathering);
$bounce_killer_score = 0;
#
# Receiving mail related
# $unix_socketname = '/var/amavis/amavisd.sock'; # e.g. milter or release
# $inet_socket_port = 10024; # accept SMTP on this TCP port
# $inet_socket_port = [10024,10026,10027]; # ...possibly on more than one
$AF_INET6 = eval { require Socket; Socket::AF_INET6() } ||
eval { require Socket6; Socket6::AF_INET6() };
# prefer using module IO::Socket::IP if available,
# otherwise fall back to IO::Socket::INET6 or to IO::Socket::INET
#
if (eval { require IO::Socket::IP }) {
$io_socket_module_name = 'IO::Socket::IP';
} elsif (eval { require IO::Socket::INET6 }) {
$io_socket_module_name = 'IO::Socket::INET6';
} elsif (eval { require IO::Socket::INET }) {
$io_socket_module_name = 'IO::Socket::INET';
}
$have_inet4 = # can we create a PF_INET socket?
defined $io_socket_module_name && eval {
my $sock =
$io_socket_module_name->new(LocalAddr => '0.0.0.0', Proto => 'tcp');
$sock->close or die "error closing socket: $!" if $sock;
$sock ? 1 : undef;
};
$have_inet6 = # can we create a PF_INET6 socket?
defined $io_socket_module_name &&
$io_socket_module_name ne 'IO::Socket::INET' &&
eval {
my $sock =
$io_socket_module_name->new(LocalAddr => '::', Proto => 'tcp');
$sock->close or die "error closing socket: $!" if $sock;
$sock ? 1 : undef;
};
# if (!$have_inet6 && $io_socket_module_name ne 'IO::Socket::INET') {
# # ok, let's stay on proven grounds, use the IO::Socket::INET anyway
# if (eval { require IO::Socket::INET }) {
# $io_socket_module_name = 'IO::Socket::INET';
# }
# }
# bind socket to a loopback interface
if (Net::Server->VERSION < 2) {
$inet_socket_bind = '127.0.0.1';
} else { # requires Net::Server 2 or a patched 0.99 with IPv6 support)
$inet_socket_bind = $have_inet4 && $have_inet6 ? ['127.0.0.1', '[::1]']
: $have_inet6 ? '[::1]' : '127.0.0.1';
}
@inet_acl = qw( 127.0.0.1 [::1] ); # allow SMTP access only from localhost
@mynetworks = qw( 127.0.0.0/8 [::1] 169.254.0.0/16 [fe80::]/10
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
[fc00::]/7 ); # consider also RFC 6598: 100.64.0.0/10
$originating = 0; # a boolean, initially reflects @mynetworks match,
# but may be modified later through a policy bank
$forward_method = $have_inet6 && !$have_inet4 ? 'smtp:[::1]:10025'
: 'smtp:[127.0.0.1]:10025';
$notify_method = $forward_method;
$resend_method = undef; # overrides $forward_method on defanging if nonempty
$release_method = undef; # overrides $notify_method on releasing
# from quarantine if nonempty
$requeue_method = # requeuing release from a quarantine
$have_inet6 && !$have_inet4 ? 'smtp:[::1]:25' : 'smtp:[127.0.0.1]:25';
$release_format = 'resend'; # (dsn), (arf), attach, plain, resend
$report_format = 'arf'; # (dsn), arf, attach, plain, resend
# when $release_format is 'attach', the following control the attachment:
$attachment_password = ''; # '': no pwd; undef: PIN; code ref; or static str
$attachment_email_name = 'msg-%m.eml';
$attachment_outer_name = 'msg-%m.zip';
$virus_quarantine_method = 'local:virus-%m';
$banned_files_quarantine_method = 'local:banned-%m';
$spam_quarantine_method = 'local:spam-%m.gz';
$bad_header_quarantine_method = 'local:badh-%m';
$unchecked_quarantine_method = undef; # 'local:unchecked-%m';
$clean_quarantine_method = undef; # 'local:clean-%m';
$archive_quarantine_method = undef; # 'local:archive-%m.gz';
$prepend_header_fields_hdridx = 0; # normally 0, use 1 for co-existence
# with signing DK and DKIM milters
$remove_existing_x_scanned_headers = 0;
$remove_existing_spam_headers = 1;
# fix improper header fields in passed or released mail - this setting
# is a pre-condition for $allow_fixing_improper_header_folding and similar
# (future) fixups; (desirable, but may break DKIM validation of messages
# with illegal header section)
$allow_fixing_improper_header = 1;
# fix improper folded header fields made up entirely of whitespace, by
# removing all-whitespace lines ($allow_fixing_improper_header must be true)
$allow_fixing_improper_header_folding = 1;
# truncate header section lines longer than 998 characters as limited
# by the RFC 5322 ($allow_fixing_improper_header must be true)
$allow_fixing_long_header_lines = 1;
# encoding (charset in MIME terminology)
# to be used in RFC 2047-encoded ...
$hdr_encoding = 'UTF-8'; # ... header field bodies
$bdy_encoding = 'UTF-8'; # ... notification body text
# encoding (encoding in MIME terminology)
$hdr_encoding_qb = 'Q'; # quoted-printable (default)
# $hdr_encoding_qb = 'B'; # base64
$smtpd_recipient_limit = 1100; # max recipients (RCPT TO) - sanity limit
# $myhostname is used by SMTP server module in the initial SMTP welcome line,
# in inserted Received: lines, Message-ID in notifications, log entries, ...
$myhostname = (POSIX::uname)[1]; # should be a FQDN !
$snmp_contact = ''; # a value of sysContact OID
$snmp_location = ''; # a value of sysLocation OID
$smtpd_greeting_banner = '${helo-name} ${protocol} ${product} service ready';
$smtpd_quit_banner = '${helo-name} ${product} closing transmission channel';
$enforce_smtpd_message_size_limit_64kb_min = 1;
# $localhost_name is the name of THIS host running amavisd
# (often just 'localhost'). It is used in HELO SMTP command
# when reinjecting mail back to MTA via SMTP for final delivery,
# and in inserted Received header field
$localhost_name = 'localhost';
$propagate_dsn_if_possible = 1; # pass on DSN if MTA announces this
# capability; useful to be turned off globally but enabled in
# MYNETS policy bank to hide internal mail routing from outsiders
$terminate_dsn_on_notify_success = 0; # when true=>handle DSN NOTIFY=SUCCESS
# locally, do not let NOTIFY=SUCCESS propagate to MTA (but allow
# other DSN options like NOTIFY=NEVER/FAILURE/DELAY, ORCPT, RET,
# and ENVID to propagate if possible)
#@auth_mech_avail = ('PLAIN','LOGIN'); # empty list disables incoming AUTH
#$auth_required_inp = 1; # incoming SMTP authentication required by amavisd?
#$auth_required_out = 1; # SMTP authentication required by MTA
$auth_required_release = 1; # secret_id is required for a quarantine release
$tls_security_level_in = undef; # undef, 'may', 'encrypt', ...
$tls_security_level_out = undef; # undef, 'may', 'encrypt', ...
# Server side certificate and key: $smtpd_tls_cert_file, $smtpd_tls_key_file.
# These two settings are now deprecated, set fields 'SSL_key_file'
# and 'SSL_cert_file' directly in %smtpd_tls_server_options instead.
# For compatibility with 2.10 the values of $smtpd_tls_cert_file
# and $smtpd_tls_key_file are fed into %smtpd_tls_server_options
# if fields 'SSL_key_file' and 'SSL_cert_file' are not provided.
#
# $smtpd_tls_cert_file = undef; # e.g. "$MYHOME/cert/amavisd-cert.pem"
# $smtpd_tls_key_file = undef; # e.g. "$MYHOME/cert/amavisd-key.pem"
# The following options are passed to IO::Socket::SSL::start_SSL() when
# setting up a server side of a TLS session (from MTA). The only options
# passed implicitly are SSL_server, SSL_hostname, and SSL_error_trap.
# See IO::Socket::SSL documentation.
#
%smtpd_tls_server_options = (
SSL_verifycn_scheme => 'smtp',
SSL_session_cache => 2,
# SSL_key_file => $smtpd_tls_key_file,
# SSL_cert_file => $smtpd_tls_cert_file,
# SSL_dh_file => ... ,
# SSL_ca_file => ... ,
# SSL_version => '!SSLv2,!SSLv3',
# SSL_cipher_list => 'HIGH:!MD5:!DSS:!aNULL',
# SSL_passwd_cb => sub { 'example' },
# ...
);
# The following options are passed to IO::Socket::SSL::start_SSL() when
# setting up a client side of a TLS session back to MTA. The only options
# passed implicitly are SSL_session_cache and SSL_error_trap.
# See IO::Socket::SSL documentation.
#
%smtp_tls_client_options = (
SSL_verifycn_scheme => 'smtp',
# SSL_version => '!SSLv2,!SSLv3',
# SSL_cipher_list => 'HIGH:!MD5:!DSS:!aNULL',
# SSL_client_ca_file => ... ,
);
$dkim_minimum_key_bits = 1024; # min acceptable DKIM key size (in bits)
# for whitelisting
# SMTP AUTH username and password for notification submissions
# (and reauthentication of forwarded mail if requested)
#$amavis_auth_user = undef; # perhaps: 'amavisd'
#$amavis_auth_pass = undef;
#$auth_reauthenticate_forwarded = undef; # supply our own credentials also
# for forwarded (passed) mail
$smtp_connection_cache_on_demand = 1;
$smtp_connection_cache_enable = 1;
# whom quarantined messages appear to be sent from (envelope sender)
# $mailfrom_to_quarantine = undef; # orig. sender if undef, or set explicitly
# where to send quarantined malware - specify undef to disable, or an
# e-mail address containing '@', or just a local part, which will be
# mapped by %local_delivery_aliases into local mailbox name or directory.
# The lookup key is a recipient address
$virus_quarantine_to = 'virus-quarantine';
$banned_quarantine_to = 'banned-quarantine';
$unchecked_quarantine_to = 'unchecked-quarantine';
$spam_quarantine_to = 'spam-quarantine';
$bad_header_quarantine_to = 'bad-header-quarantine';
$clean_quarantine_to = 'clean-quarantine';
$archive_quarantine_to = 'archive-quarantine';
# similar to $spam_quarantine_to, but the lookup key is the sender address:
$spam_quarantine_bysender_to = undef; # dflt: no by-sender spam quarantine
# quarantine directory or mailbox file or empty
# (only used if $*_quarantine_to specifies direct local delivery)
$QUARANTINEDIR = undef; # no quarantine unless overridden by config
$undecipherable_subject_tag = '***UNCHECKED*** ';
# NOTE: all entries can accept mail_body_size_limit and score_factor options
@spam_scanners = (
['SpamAssassin', 'Amavis::SpamControl::SpamAssassin' ],
# ['SpamdClient', 'Amavis::SpamControl::SpamdClient',
# mail_body_size_limit => 65000, score_factor => 1.0,
# ],
# ['DSPAM', 'Amavis::SpamControl::ExtProg', $dspam,
# [ qw(--stdout --classify --deliver=innocent,spam
# --mode=toe --feature noise
# --user), $daemon_user ],
# mail_body_size_limit => 65000, score_factor => 1.0,
# ],
# ['CRM114', 'Amavis::SpamControl::ExtProg', 'crm',
# [ qw(-u /var/amavis/home/.crm114 mailreaver.crm
# --dontstore --report_only --stats_only
# --good_threshold=10 --spam_threshold=-10) ],
# mail_body_size_limit => 65000, score_factor => -0.20,
# lock_file => '/var/amavis/crm114.lock',
# lock_type => 'shared', learner_lock_type => 'exclusive',
# ],
# ['Bogofilter', 'Amavis::SpamControl::ExtProg', 'bogofilter',
# [ qw(-e -v)], # -u
# mail_body_size_limit => 65000, score_factor => 1.0,
# ],
# ['Rspamd', 'Amavis::SpamControl::RspamdClient',
# score_factor => $sa_tag2_level_deflt / 15.0,
# mta_name => 'mail.example.com',
# ],
);
$sa_spawned = 0; # true: run SA in a subprocess; false: call SA directly
# string to prepend to Subject header field when message qualifies as spam
# $sa_spam_subject_tag1 = undef; # example: '***Possible Spam*** '
# $sa_spam_subject_tag = undef; # example: '***Spam*** '
$sa_spam_level_char = '*'; # character to be used in X-Spam-Level bar;
# empty or undef disables adding this header field
$sa_num_instances = 1; # number of SA instances,
# usually 1, memory-expensive, keep small
$sa_local_tests_only = 0;
$sa_debug = undef;
$sa_timeout = 30; # no longer used since 2.6.5
$file = 'file'; # path to the file(1) utility for classifying contents
$altermime = 'altermime'; # path to the altermime utility (optional)
@altermime_args_defang = qw(--verbose --removeall);
@altermime_args_disclaimer = qw(--disclaimer=/etc/altermime-disclaimer.txt);
# @altermime_args_disclaimer =
# qw(--disclaimer=/etc/_OPTION_.txt --disclaimer-html=/etc/_OPTION_.html);
# @disclaimer_options_bysender_maps = ( 'altermime-disclaimer' );
$MIN_EXPANSION_FACTOR = 5; # times original mail size
$MAX_EXPANSION_FACTOR = 500; # times original mail size
# $MIN_EXPANSION_QUOTA = ... # bytes, undef=not enforced
# $MAX_EXPANSION_QUOTA = ... # bytes, undef=not enforced
# See amavisd.conf and README.lookups for details.
# What to do with the message (this is independent of quarantining):
# Reject: tell MTA to generate a non-delivery notification, MTA gets 5xx
# Bounce: generate a non-delivery notification by ourselves, MTA gets 250
# Discard: drop the message and pretend it was delivered, MTA gets 250
# Pass: accept/forward a message, MTA gets 250
# TempFail: temporary failure, client should retry, MTA gets 4xx
#
# COMPATIBILITY NOTE: the separation of *_destiny values into
# D_BOUNCE, D_REJECT, D_DISCARD and D_PASS made settings $warn*sender only
# still useful with D_PASS. The combination of D_DISCARD + $warn*sender=1
# is mapped into D_BOUNCE for compatibility.
# The following symbolic constants can be used in *destiny settings:
#
# D_PASS mail will pass to recipients, regardless of contents;
#
# D_DISCARD mail will not be delivered to its recipients, sender will NOT be
# notified. Effectively we lose mail (but it will be quarantined
# unless disabled).
#
# D_BOUNCE mail will not be delivered to its recipients, a non-delivery
# notification (bounce) will be sent to the sender by amavisd-new
# (unless suppressed). Bounce (DSN) will not be sent if a virus
# name matches $viruses_that_fake_sender_maps, or to messages
# from mailing lists (Precedence: bulk|list|junk), or for spam
# exceeding spam_dsn_cutoff_level
#
# D_REJECT mail will not be delivered to its recipients, amavisd will
# return a 5xx status response. Depending on an MTA/amavisd setup
# this will result either in a reject status passed back to a
# connecting SMTP client (in a pre-queue setup: proxy or milter),
# or an MTA will generate a bounce in a post-queue setup.
# If not all recipients agree on rejecting a message (like when
# different recipients have different thresholds on bad mail
# contents and LMTP is not used) amavisd sends a bounce by itself
# (same as D_BOUNCE).
#
# D_TEMPFAIL indicates a temporary failure, mail will not be delivered to
# its recipients, sender should retry the operation later.
#
# Notes:
# D_REJECT and D_BOUNCE are similar,the difference is in who is responsible
# for informing the sender about non-delivery, and how informative
# the notification can be (amavisd-new knows more than MTA);
# With D_REJECT, MTA may reject original SMTP, or send DSN (delivery status
# notification, colloquially called 'bounce') - depending on MTA
# and its interface to a content checker; best suited for sendmail
# milter or other pre-queue filtering setups
# With D_BOUNCE, amavisd-new (not MTA) sends DSN (can better explain the
# reason for mail non-delivery but unable to reject the original
# SMTP session, and is in position to suppress DSN if considered
# unsuitable). Best suited for Postfix and other dual-MTA setups.
# Exceeded spam cutoff limit or faked virus sender implicitly
# turns D_BOUNCE into a D_DISCARD;
# D_REJECT, D_BOUNCE, D_DISCARD, D_PASS, D_TEMPFAIL
$final_virus_destiny = D_DISCARD;
$final_banned_destiny = D_DISCARD;
$final_unchecked_destiny = D_PASS;
$final_spam_destiny = D_PASS;
$final_bad_header_destiny = D_PASS;
# If decided to pass viruses (or spam) to certain recipients
# by %final_destiny_maps_by_ccat yielding a D_PASS, or %lovers_maps_by_ccat
# yielding a true, one may set the corresponding %addr_extension_maps_by_ccat
# to some string, and the recipient address will have this string appended
# as an address extension to a local-part (mailbox part) of the address.
# This extension can be used by a final local delivery agent for example
# to place such mail in different folder. Leaving this variable undefined
# or an empty string prevents appending address extension. Recipients
# which do not match @local_domains_maps are not affected (i.e. non-local
# recipients (=outbound mail) do not get address extension appended).
#
# LDAs usually default to stripping away address extension if no special
# handling for it is specified, so having this option enabled normally
# does no harm, provided the $recipients_delimiter character matches
# the setting at the final MTA's local delivery agent (LDA).
#
# $addr_extension_virus = 'virus'; # for example
# $addr_extension_spam = 'spam';
# $addr_extension_banned = 'banned';
# $addr_extension_bad_header = 'badh';
# Delimiter between local part of the recipient address and address extension
# (which can optionally be added, see variable %addr_extension_maps_by_ccat.
# E.g. recipient address <user@domain.example> gets
# changed to <user+virus@domain.example>.
#
# Delimiter should match an equivalent (final) MTA delimiter setting.
# (e.g. for Postfix add 'recipient_delimiter = +' to main.cf).
# Setting it to an empty string or to undef disables this feature
# regardless of %addr_extension_maps_by_ccat setting.
# $recipient_delimiter = '+';
$replace_existing_extension = 1; # true: replace ext; false: append ext
# Affects matching of localpart of e-mail addresses (left of '@')
# in lookups: true = case sensitive, false = case insensitive
$localpart_is_case_sensitive = 0;
# Trim trailing whitespace from SQL fields, LDAP attribute values
# and hash righthand-sides as read by read_hash(); disabled by default;
# turn it on for compatibility with pre-2.4.0 versions.
$trim_trailing_space_in_lookup_result_fields = 0;
# since 2.7.0: deprecated some old variables:
#
deprecate_var('bool', '$insert_received_line', 1);
deprecate_var('bool', '$relayhost_is_client', undef);
deprecate_var('bool', '$warnvirussender', undef);
deprecate_var('bool', '$warnspamsender', undef);
deprecate_var('bool', '$sa_spam_report_header', undef);
deprecate_var('bool', '$sa_spam_modifies_subj', 1);
deprecate_var('bool', '$sa_auto_whitelist', undef);
deprecate_var('num', '$sa_timeout', 30);
deprecate_var('str', '$syslog_priority', 'debug');
deprecate_var('str', '$SYSLOG_LEVEL', 'mail.debug');
deprecate_var('str', '$notify_xmailer_header', undef);
# deprecate_var('array','@spam_modifies_subj_maps');
1;
} # end BEGIN - init_secondary
# init structured variables like %sql_clause, $map_full_type_to_short_type_re,
# %ccat_display_names, @decoders, build default maps; may run as root!
#
BEGIN {
$allowed_added_header_fields{lc($_)} = 1 for qw(
Received DKIM-Signature Authentication-Results VBR-Info
X-Quarantine-ID X-Amavis-Alert X-Amavis-Hold X-Amavis-Modified
X-Amavis-PenPals X-Amavis-OS-Fingerprint X-Amavis-PolicyBank
X-Spam-Status X-Spam-Level X-Spam-Flag X-Spam-Score
X-Spam-Report X-Spam-Checker-Version X-Spam-Tests
X-CRM114-Status X-CRM114-CacheID X-CRM114-Notice X-CRM114-Action
X-DSPAM-Result X-DSPAM-Class X-DSPAM-Signature X-DSPAM-Processed
X-DSPAM-Confidence X-DSPAM-Probability X-DSPAM-User X-DSPAM-Factors
X-Bogosity
);
$allowed_added_header_fields{lc('X-Spam-Report')} = 0;
$allowed_added_header_fields{lc('X-Spam-Checker-Version')} = 0;
# $allowed_added_header_fields{lc(c(lc $X_HEADER_TAG))}=1; #later:read_config
# even though SpamAssassin does provide the following header fields, we
# prefer to provide our own version (per-recipient scores, version hiding);
# our own non-"X-Spam" header fields are always preferred and need not
# be listed here
$prefer_our_added_header_fields{lc($_)} = 1 for qw(
X-Spam-Status X-Spam-Level X-Spam-Flag X-Spam-Score X-Spam-Report
X-Spam-Checker-Version
X-CRM114-Status X-CRM114-CacheID X-DSPAM-Result X-DSPAM-Signature
);
# controls which header section tests are performed in check_header_validity,
# keys correspond to minor contents categories for CC_BADH
$allowed_header_tests{lc($_)} = 1 for qw(
other mime syntax empty long control 8bit utf8 missing multiple);
$allowed_header_tests{'utf8'} = 0; # turn this test off by default
# RFC 6376 standard set of header fields to be signed:
my(@sign_headers) = qw(From Sender Reply-To Subject Date Message-ID To Cc
In-Reply-To References MIME-Version Content-Type Content-Transfer-Encoding
Content-ID Content-Description Resent-Date Resent-From Resent-Sender
Resent-To Resent-Cc Resent-Message-ID List-Id List-Post List-Owner
List-Subscribe List-Unsubscribe List-Help List-Archive);
# additional header fields considered appropriate, see also RFC 4021
# and IANA registry "Permanent Message Header Field Names";
# see RFC 3834 for Auto-Submitted; RFC 5518 for VBR-Info (Vouch By Reference)
push(@sign_headers, qw(Received Precedence
Original-Message-ID Message-Context PICS-Label Sensitivity Solicitation
Content-Location Content-Features Content-Disposition Content-Language
Content-Alternative Content-Base Content-MD5 Content-Duration Content-Class
Accept-Language Auto-Submitted Archived-At VBR-Info));
# note that we are signing Received despite the advise in RFC 6376;
# some additional nonstandard header fields:
push(@sign_headers, qw(Organization Organisation User-Agent X-Mailer));
$signed_header_fields{lc($_)} = 1 for @sign_headers;
# Excluded:
# DKIM-Signature DomainKey-Signature Authentication-Results
# Keywords Comments Errors-To X-Virus-Scanned X-Archived-At X-No-Archive
# Some MTAs are dropping Disposition-Notification-To, exclude:
# Disposition-Notification-To Disposition-Notification-Options
# Some mail scanners are dropping Return-Receipt-To, exclude it.
# Signing a 'Sender' may not be a good idea because when such mail is sent
# through a mailing list, this header field is usually replaced by a new one,
# invalidating a signature. Long To and Cc address lists are often mangled,
# especially when containing non-encoded display names.
# Off: Sender - conflicts with mailing lists which must replace a Sender
# Off: To, Cc, Resent-To, Resent-Cc - too often get garbled by mailers
$signed_header_fields{lc($_)} = 0 for qw(Sender To Cc Resent-To Resent-Cc);
#
# a value greater than 1 causes signing of one additional null instance of
# a header field, thus prohibiting prepending additional occurrences of such
# header field without breaking a signature
$signed_header_fields{lc($_)} = 2 for qw(From Date Subject Content-Type);
# provide names for content categories - to be used only for logging,
# SNMP counter names, and display purposes
%ccat_display_names = (
CC_CATCHALL, 'CatchAll', # last resort, should not normally appear
CC_CLEAN, 'Clean',
CC_CLEAN.',1', 'CleanTag', # tag_level
CC_MTA, 'MtaFailed', # unable to forward (general)
CC_MTA.',1', 'MtaTempFailed', # MTA response was 4xx
CC_MTA.',2', 'MtaRejected', # MTA response was 5xx
CC_OVERSIZED, 'Oversized',
CC_BADH, 'BadHdr',
CC_BADH.',1', 'BadHdrMime',
CC_BADH.',2', 'BadHdr8bit',
CC_BADH.',3', 'BadHdrChar',
CC_BADH.',4', 'BadHdrSpace',
CC_BADH.',5', 'BadHdrLong',
CC_BADH.',6', 'BadHdrSyntax',
CC_BADH.',7', 'BadHdrMissing',
CC_BADH.',8', 'BadHdrDupl',
CC_SPAMMY, 'Spammy', # tag2_level
CC_SPAMMY.',1','Spammy3', # tag3_level
CC_SPAM, 'Spam', # kill_level
CC_UNCHECKED, 'Unchecked',
CC_UNCHECKED.',1', 'UncheckedEncrypted',
CC_UNCHECKED.',2', 'UncheckedOverLimits',
CC_UNCHECKED.',3', 'UncheckedAmbiguousContent',
CC_BANNED, 'Banned',
CC_VIRUS, 'Virus',
);
# provide names for content categories - to be used only for logging,
# SNMP counter names, and display purposes, similar to %ccat_display_names
# but only major contents category names are listed
%ccat_display_names_major = (
CC_CATCHALL, 'CatchAll', # last resort, should not normally appear
CC_CLEAN, 'Clean',
CC_MTA, 'MtaFailed', # unable to forward
CC_OVERSIZED, 'Oversized',
CC_BADH, 'BadHdr',
CC_SPAMMY, 'Spammy', # tag2_level
CC_SPAM, 'Spam', # kill_level
CC_UNCHECKED, 'Unchecked',
CC_BANNED, 'Banned',
CC_VIRUS, 'Virus',
);
# $partition_tag is a user-specified SQL field value in tables maddr, msgs,
# msgrcpt and quarantine, inserted into new records, but can be useful even
# without SQL, accessible through a macro %P and in quarantine templates.
# It is usually an integer, but depending on a schema may be of other data
# type e.g. a string. May be used to speed up purging of old records by using
# partitioned tables (MySQL 5.1+, PostgreSQL 8.1+). A possible usage can
# be a week-of-a-year, or some other slowly changing value, allowing to
# quickly drop old table partitions without wasting time on deleting
# individual records. Mail addresses in table maddr are self-contained
# within a partition tag, which means that the same mail address may
# appear in more than one maddr partition (using different 'id's), and
# that tables msgs and msgrcpt are guaranteed to reference a maddr.id
# within their own partition tag. The $partition_tag may be a scalar
# (an integer or a string), or a reference to a subroutine, which will be
# called with an object of type Amavis::In::Message as argument, and its
# result will be used as a partition tag value. Possible usage:
#
# $partition_tag =
# sub { my($msginfo)=@_; iso8601_week($msginfo->rx_time) };
#or:
# $partition_tag =
# sub { my($msginfo)=@_; iso8601_yearweek($msginfo->rx_time) };
#
#or based on a day of a week for short-term cycling (Mo=1, Tu=2,... Su=7):
# $partition_tag =
# sub { my($msginfo)=@_; iso8601_weekday($msginfo->rx_time) };
#
# $spam_quarantine_method = 'local:W%P/spam/%m.gz'; # quar dir by week num
# The SQL select clause to fetch per-recipient policy settings.
# The %k will be replaced by a comma-separated list of query addresses
# for a recipient (e.g. a full address, domain only, catchall), %a will be
# replaced by an exact recipient address (same as the first entry in %k,
# suitable for pattern matching), %l by a full unmodified localpart, %u by
# a lowercased username (a localpart without extension), %e by lowercased
# addr extension (which includes a delimiter), and %d for lowercased domain.
# Use ORDER if there is a chance that multiple records will match - the
# first match wins (i.e. the first returned record). If field names are
# not unique (e.g. 'id'), the later field overwrites the earlier in a hash
# returned by lookup, which is why we use 'users.*, policy.*, users.id',
# i.e. the id is repeated at the end.
# This is a legacy variable for upwards compatibility, now only referenced
# by the program through a %sql_clause entry 'sel_policy' - newer config
# files may assign directly to $sql_clause{'sel_policy'} if preferred.
#
$sql_select_policy =
'SELECT users.*, policy.*, users.id'.
' FROM users LEFT JOIN policy ON users.policy_id=policy.id'.
' WHERE users.email IN (%k) ORDER BY users.priority DESC';
# Btw, MySQL and PostgreSQL are happy with 'SELECT *, users.id',
# but Oracle wants 'SELECT users.*, policy.*, users.id', which is
# also acceptable to MySQL and PostgreSQL.
# The SQL select clause to check sender in per-recipient whitelist/blacklist.
# The first SELECT argument '?' will be users.id from recipient SQL lookup,
# the %k will be replaced by a comma-separated list of query addresses
# for a sender (e.g. a full address, domain only, catchall), %a will be
# replaced by an exact sender address (same as the first entry in %k,
# suitable for pattern matching), %l by a full unmodified localpart, %u by
# a lowercased username (a localpart without extension), %e by lowercased
# addr extension (which includes a delimiter), and %d for lowercased domain.
# Only the first occurrence of '?' will be replaced by users.id,
# subsequent occurrences of '?' will see empty string as an argument.
# There can be zero or more occurrences of each %k, %a, %l, %u, %e, %d,
# lookup keys will be replicated accordingly.
# This is a separate legacy variable for upwards compatibility, now only
# referenced by the program through %sql_clause entry 'sel_wblist' - newer
# config files may assign directly to $sql_clause{'sel_wblist'} if preferred.
#
$sql_select_white_black_list =
'SELECT wb FROM wblist JOIN mailaddr ON wblist.sid=mailaddr.id'.
' WHERE wblist.rid=? AND mailaddr.email IN (%k)'.
' ORDER BY mailaddr.priority DESC';
%sql_clause = (
'sel_policy' => \$sql_select_policy,
'sel_wblist' => \$sql_select_white_black_list,
'sel_adr' =>
'SELECT id FROM maddr WHERE partition_tag=? AND email=?',
'ins_adr' =>
'INSERT INTO maddr (partition_tag, email, domain) VALUES (?,?,?)',
'ins_msg' =>
'INSERT INTO msgs (partition_tag, mail_id, secret_id, am_id,'.
' time_num, time_iso, sid, policy, client_addr, size, host)'.
' VALUES (?,?,?,?,?,?,?,?,?,?,?)',
'upd_msg' =>
'UPDATE msgs SET content=?, quar_type=?, quar_loc=?, dsn_sent=?,'.
' spam_level=?, message_id=?, from_addr=?, subject=?, client_addr=?,'.
' originating=?'.
' WHERE partition_tag=? AND mail_id=?',
'ins_rcp' =>
'INSERT INTO msgrcpt (partition_tag, mail_id, rseqnum, rid, is_local,'.
' content, ds, rs, bl, wl, bspam_level, smtp_resp)'.
' VALUES (?,?,?,?,?,?,?,?,?,?,?,?)',
'ins_quar' =>
'INSERT INTO quarantine (partition_tag, mail_id, chunk_ind, mail_text)'.
' VALUES (?,?,?,?)',
'sel_msg' => # obtains partition_tag if missing in a release request
'SELECT partition_tag FROM msgs WHERE mail_id=?',
'sel_quar' =>
'SELECT mail_text FROM quarantine'.
' WHERE partition_tag=? AND mail_id=?'.
' ORDER BY chunk_ind',
'sel_penpals' => # no message-id references list
"SELECT msgs.time_num, msgs.mail_id, subject".
" FROM msgs JOIN msgrcpt USING (partition_tag,mail_id)".
" WHERE sid=? AND rid=? AND msgs.content!='V' AND ds='P'".
" ORDER BY msgs.time_num DESC", # LIMIT 1
'sel_penpals_msgid' => # with a nonempty list of message-id references
"SELECT msgs.time_num, msgs.mail_id, subject, message_id, rid".
" FROM msgs JOIN msgrcpt USING (partition_tag,mail_id)".
" WHERE sid=? AND msgs.content!='V' AND ds='P' AND message_id IN (%m)".
" AND rid!=sid".
" ORDER BY rid=? DESC, msgs.time_num DESC", # LIMIT 1
);
# NOTE on $sql_clause{'upd_msg'}: MySQL clobbers timestamp on update
# (unless DEFAULT 0 is used) setting it to a current local time and
# losing the cherishly preserved and prepared timestamp of mail reception.
# From the MySQL 4.1 documentation:
# * With neither DEFAULT nor ON UPDATE clauses, it is the same as
# DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP.
# * suppress the automatic initialization and update behaviors for the first
# TIMESTAMP column by explicitly assigning it a constant DEFAULT value
# (for example, DEFAULT 0)
# * The first TIMESTAMP column in table row automatically is updated to
# the current timestamp when the value of any other column in the row is
# changed, unless the TIMESTAMP column explicitly is assigned a value
# other than NULL.
# maps full string as returned by a file(1) utility into a short string;
# the first match wins, more specific entries should precede general ones!
# the result may be a string or a ref to a list of strings;
# see also sub decompose_part()
# prepare an arrayref, later to be converted to an Amavis::Lookup::RE object
$map_full_type_to_short_type_re = [
[qr/^empty\z/ => 'empty'],
[qr/^directory\z/ => 'dir'],
[qr/^can't (stat|read)\b/ => 'dat'], # file(1) diagnostics
[qr/^cannot open\b/ => 'dat'], # file(1) diagnostics
[qr/^ERROR:/ => 'dat'], # file(1) diagnostics
[qr/can't read magic file|couldn't find any magic files/ => 'dat'],
[qr/^data\z/ => 'dat'],
[qr/^ISO-8859.*\btext\b/ => 'txt'],
[qr/^Non-ISO.*ASCII\b.*\btext\b/ => 'txt'],
[qr/^Unicode\b.*\btext\b/i => 'txt'],
[qr/^UTF.* Unicode text\b/i => 'txt'],
[qr/^'diff' output text\b/ => 'txt'],
[qr/^GNU message catalog\b/ => 'mo'],
[qr/^PGP message [Ss]ignature\b/ => ['pgp','pgp.asc'] ],
[qr/^PGP message.*[Ee]ncrypted\b/ => ['pgp','pgp.enc'] ],
[qr/^PGP message\z/ => ['pgp','pgp.enc'] ],
[qr/^(?:PGP|GPG) encrypted data\b/ => ['pgp','pgp.enc'] ],
[qr/^PGP public key\b/ => ['pgp','pgp.asc'] ],
[qr/^PGP armored data( signed)? message\b/ => ['pgp','pgp.asc'] ],
[qr/^PGP armored\b/ => ['pgp','pgp.asc'] ],
[qr/^PGP\b/ => 'pgp' ],
### 'file' is a bit too trigger happy to claim something is 'mail text'
# [qr/^RFC 822 mail text\b/ => 'mail'],
[qr/^(ASCII|smtp|RFC 822) mail text\b/ => 'txt'],
[qr/^JPEG image data\b/ => ['image','jpg'] ],
[qr/^GIF image data\b/ => ['image','gif'] ],
[qr/^PNG image data\b/ => ['image','png'] ],
[qr/^TIFF image data\b/ => ['image','tif'] ],
[qr/^PCX\b.*\bimage data\b/ => ['image','pcx'] ],
[qr/^PC bitmap data\b/ => ['image','bmp'] ],
[qr/^SVG Scalable Vector Graphics image\b/ => ['image','svg'] ],
[qr/^MP2\b/ => ['audio','mpa','mp2'] ],
[qr/^MP3\b/ => ['audio','mpa','mp3'] ],
[qr/\bMPEG ADTS, layer III\b/ => ['audio','mpa','mp3'] ],
[qr/^ISO Media, MPEG v4 system, 3GPP\b/=> ['audio','mpa','3gpp'] ],
[qr/^ISO Media, MPEG v4 system\b/ => ['audio','mpa','m4a','m4b'] ],
[qr/^FLAC audio bitstream data\b/ => ['audio','flac'] ],
[qr/^Ogg data, FLAC audio\b/ => ['audio','oga'] ],
[qr/^Ogg data\b/ => ['audio','ogg'] ],
[qr/^MPEG video stream data\b/ => ['movie','mpv'] ],
[qr/^MPEG system stream data\b/ => ['movie','mpg'] ],
[qr/^MPEG\b/ => ['movie','mpg'] ],
[qr/^Matroska data\b/ => ['movie','mkv'] ],
[qr/^Microsoft ASF\b/ => ['movie','wmv'] ],
[qr/^RIFF\b.*\bAVI\b/ => ['movie','avi'] ],
[qr/^RIFF\b.*\banimated cursor\b/ => ['movie','ani'] ],
[qr/^RIFF\b.*\bWAVE audio\b/ => ['audio','wav'] ],
[qr/^Macromedia Flash data\b/ => 'swf'],
[qr/^HTML document text\b/ => 'html'],
[qr/^XML document text\b/ => 'xml'],
[qr/^exported SGML document text\b/ => 'sgml'],
[qr/^PostScript document text\b/ => 'ps'],
[qr/^PDF document\b/ => 'pdf'],
[qr/^Rich Text Format data\b/ => 'rtf'],
[qr/^Microsoft Office Document\b/i => 'doc'], # OLE2: doc, ppt, xls,...
[qr/^Microsoft Word\b/i => 'doc'],
[qr/^Microsoft Installer\b/i => 'doc'], # file(1) may misclassify
[qr/^ms-windows meta(file|font)\b/i => 'wmf'],
[qr/^LaTeX\b.*\bdocument text\b/ => 'lat'],
[qr/^TeX DVI file\b/ => 'dvi'],
[qr/\bdocument text\b/ => 'txt'],
[qr/^compiled Java class data\b/ => 'java'],
[qr/^MS Windows 95 Internet shortcut text\b/ => 'url'],
[qr/^Compressed Google KML Document\b/ => 'kmz'],
[qr/^frozen\b/ => 'F'],
[qr/^gzip compressed\b/ => 'gz'],
[qr/^bzip compressed\b/ => 'bz'],
[qr/^bzip2 compressed\b/ => 'bz2'],
[qr/^(?i:xz) compressed\b/ => 'xz'],
[qr/^lzma compressed\b/ => 'lzma'],
[qr/^lrz compressed\b/ => 'lrz'], #***(untested)
[qr/^lzop compressed\b/ => 'lzo'],
[qr/^LZ4 compressed\b/ => 'lz4'],
[qr/^compress'd/ => 'Z'],
[qr/^Zip archive\b/i => 'zip'],
[qr/^7-zip archive\b/i => '7z'],
[qr/^RAR archive\b/i => 'rar'],
[qr/^LHa.*\barchive\b/i => 'lha'], # (also known as .lzh)
[qr/^ARC archive\b/i => 'arc'],
[qr/^ARJ archive\b/i => 'arj'],
[qr/^Zoo archive\b/i => 'zoo'],
[qr/^(\S+\s+)?tar archive\b/i => 'tar'],
[qr/^(\S+\s+)?cpio archive\b/i => 'cpio'],
[qr/^StuffIt Archive\b/i => 'sit'],
[qr/^Debian binary package\b/i => 'deb'], # std. Unix archive (ar)
[qr/^current ar archive\b/i => 'a'], # std. Unix archive (ar)
[qr/^RPM\b/ => 'rpm'],
[qr/^(Transport Neutral Encapsulation Format|TNEF)\b/i => 'tnef'],
[qr/^Microsoft Cabinet (file|archive)\b/i => 'cab'],
[qr/^InstallShield Cabinet file\b/ => 'installshield'],
[qr/^ISO 9660 CD-ROM filesystem\b/i => 'iso'],
[qr/^(uuencoded|xxencoded)\b/i => 'uue'],
[qr/^binhex\b/i => 'hqx'],
[qr/^(ASCII|text)\b/i => 'asc'],
[qr/^Emacs.*byte-compiled Lisp data/i => 'asc'], # BinHex with empty line
[qr/\bscript\b.* text executable\b/ => 'txt'],
[qr/^MS Windows\b.*\bDLL\b/ => ['exe','dll'] ],
[qr/\bexecutable for MS Windows\b.*\bDLL\b/ => ['exe','dll'] ],
[qr/^MS-DOS executable \(built-in\)/ => 'asc'], # starts with LZ
[qr/^(MS-)?DOS executable\b.*\bDLL\b/ => ['exe','dll'] ],
[qr/^MS Windows\b.*\bexecutable\b/ => ['exe','exe-ms'] ],
[qr/\bexecutable\b.*\bfor MS Windows\b/ => ['exe','exe-ms'] ],
[qr/^COM executable for DOS\b/ => 'asc'], # misclassified?
[qr/^DOS executable \(COM\)/ => 'asc'], # misclassified?
[qr/^(MS-)?DOS executable\b(?!.*\(COM\))/ => ['exe','exe-ms'] ],
[qr/^PA-RISC.*\bexecutable\b/ => ['exe','exe-unix'] ],
[qr/^ELF .*\bexecutable\b/ => ['exe','exe-unix'] ],
[qr/^COFF format .*\bexecutable\b/ => ['exe','exe-unix'] ],
[qr/^executable \(RISC System\b/ => ['exe','exe-unix'] ],
[qr/^VMS\b.*\bexecutable\b/ => ['exe','exe-vms'] ],
[qr/\bexecutable\b/i => 'exe'],
[qr/\bshared object, /i => 'so'],
[qr/\brelocatable, /i => 'o'],
[qr/\btext\b/i => 'asc'],
[qr/^/ => 'dat'], # catchall
];
# MS Windows PE 32-bit Intel 80386 GUI executable not relocatable
# MS-DOS executable (EXE), OS/2 or MS Windows
# MS-DOS executable PE for MS Windows (DLL) (GUI) Intel 80386 32-bit
# MS-DOS executable PE for MS Windows (DLL) (GUI) Alpha 32-bit
# MS-DOS executable, NE for MS Windows 3.x (driver)
# MS-DOS executable (built-in) (any file starting with LZ!)
# PE executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
# PE executable for MS Windows (GUI) Intel 80386 32-bit
# NE executable for MS Windows 3.x
# PA-RISC1.1 executable dynamically linked
# PA-RISC1.1 shared executable dynamically linked
# ELF 64-bit LSB executable, Alpha (unofficial), version 1 (FreeBSD),
# for FreeBSD 5.0.1, dynamically linked (uses shared libs), stripped
# ELF 64-bit LSB executable, Alpha (unofficial), version 1 (SYSV),
# for GNU/Linux 2.2.5, dynamically linked (uses shared libs), stripped
# ELF 64-bit MSB executable, SPARC V9, version 1 (FreeBSD),
# for FreeBSD 5.0, dynamically linked (uses shared libs), stripped
# ELF 64-bit MSB shared object, SPARC V9, version 1 (FreeBSD), stripped
# ELF 32-bit LSB executable, Intel 80386, version 1, dynamically`
# ELF 32-bit MSB executable, SPARC, version 1, dynamically linke`
# COFF format alpha executable paged stripped - version 3.11-10
# COFF format alpha executable paged dynamically linked stripped`
# COFF format alpha demand paged executable or object module
# stripped - version 3.11-10
# COFF format alpha paged dynamically linked not stripped shared`
# executable (RISC System/6000 V3.1) or obj module
# VMS VAX executable
# A list of pairs or n-tuples: [short-type, code_ref, optional-args...].
# Maps short types to a decoding routine, the first match wins.
# Arguments beyond the first two can be a program path string (or a listref
# of paths to be searched) or a reference to a variable containing such
# path - which allows for lazy evaluation, making possible to assign values
# to legacy configuration variables even after the assignment to @decoders.
#
@decoders = (
['mail', \&Amavis::Unpackers::do_mime_decode],
# [[qw(asc uue hqx ync)], \&Amavis::Unpackers::do_ascii], # not safe
['F', \&Amavis::Unpackers::do_uncompress, \$unfreeze],
# ['unfreeze', 'freeze -d', 'melt', 'fcat'] ],
['Z', \&Amavis::Unpackers::do_uncompress, \$uncompress],
# ['uncompress', 'gzip -d', 'zcat'] ],
['gz', \&Amavis::Unpackers::do_uncompress, \$gunzip],
['gz', \&Amavis::Unpackers::do_gunzip],
['bz2', \&Amavis::Unpackers::do_uncompress, \$bunzip2],
['xz', \&Amavis::Unpackers::do_uncompress,
['xzdec', 'xz -dc', 'unxz -c', 'xzcat'] ],
['lzma', \&Amavis::Unpackers::do_uncompress,
['lzmadec', 'xz -dc --format=lzma',
'lzma -dc', 'unlzma -c', 'lzcat', 'lzmadec'] ],
['lrz', \&Amavis::Unpackers::do_uncompress,
['lrzip -q -k -d -o -', 'lrzcat -q -k'] ],
['lzo', \&Amavis::Unpackers::do_uncompress, \$unlzop],
['lz4', \&Amavis::Unpackers::do_uncompress, ['lz4c -d'] ],
['rpm', \&Amavis::Unpackers::do_uncompress, \$rpm2cpio],
# ['rpm2cpio.pl', 'rpm2cpio'] ],
[['cpio','tar'], \&Amavis::Unpackers::do_pax_cpio, \$pax],
# ['/usr/local/heirloom/usr/5bin/pax', 'pax', 'gcpio', 'cpio'] ],
# ['tar', \&Amavis::Unpackers::do_tar], # no longer supported
['deb', \&Amavis::Unpackers::do_ar, \$ar],
# ['a', \&Amavis::Unpackers::do_ar, \$ar], #unpacking .a seems an overkill
['rar', \&Amavis::Unpackers::do_unrar, \$unrar], # ['unrar', 'rar']
['arj', \&Amavis::Unpackers::do_unarj, \$unarj], # ['unarj', 'arj']
['arc', \&Amavis::Unpackers::do_arc, \$arc], # ['nomarch', 'arc']
['zoo', \&Amavis::Unpackers::do_zoo, \$zoo], # ['zoo', 'unzoo']
['doc', \&Amavis::Unpackers::do_ole, \$ripole],
['cab', \&Amavis::Unpackers::do_cabextract, \$cabextract],
['tnef', \&Amavis::Unpackers::do_tnef_ext, \$tnef],
['tnef', \&Amavis::Unpackers::do_tnef],
# ['lha', \&Amavis::Unpackers::do_lha, \$lha], # not safe, use 7z instead
# ['sit', \&Amavis::Unpackers::do_unstuff, \$unstuff], # not safe
[['zip','kmz'], \&Amavis::Unpackers::do_7zip, ['7za', '7z'] ],
[['zip','kmz'], \&Amavis::Unpackers::do_unzip],
['7z', \&Amavis::Unpackers::do_7zip, ['7zr', '7za', '7z'] ],
[[qw(gz bz2 Z tar)],
\&Amavis::Unpackers::do_7zip, ['7za', '7z'] ],
[[qw(xz lzma jar cpio arj rar swf lha iso cab deb rpm)],
\&Amavis::Unpackers::do_7zip, '7z' ],
['exe', \&Amavis::Unpackers::do_executable, \$unrar, \$lha, \$unarj],
);
# build_default_maps
@local_domains_maps = (
\%local_domains, \@local_domains_acl, \$local_domains_re);
@mynetworks_maps = (\@mynetworks);
@client_ipaddr_policy = map(($_,'MYNETS'), @mynetworks_maps);
@ip_repu_ignore_maps = (\@ip_repu_ignore_networks);
@bypass_virus_checks_maps = (
\%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re);
@bypass_spam_checks_maps = (
\%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re);
@bypass_banned_checks_maps = (
\%bypass_banned_checks, \@bypass_banned_checks_acl, \$bypass_banned_checks_re);
@bypass_header_checks_maps = (
\%bypass_header_checks, \@bypass_header_checks_acl, \$bypass_header_checks_re);
@virus_lovers_maps = (
\%virus_lovers, \@virus_lovers_acl, \$virus_lovers_re);
@spam_lovers_maps = (
\%spam_lovers, \@spam_lovers_acl, \$spam_lovers_re);
@banned_files_lovers_maps = (
\%banned_files_lovers, \@banned_files_lovers_acl, \$banned_files_lovers_re);
@bad_header_lovers_maps = (
\%bad_header_lovers, \@bad_header_lovers_acl, \$bad_header_lovers_re);
# @unchecked_lovers_maps = (); # empty, new setting, no need for backw compat.
@warnvirusrecip_maps = (\$warnvirusrecip);
@warnbannedrecip_maps = (\$warnbannedrecip);
@warnbadhrecip_maps = (\$warnbadhrecip);
@newvirus_admin_maps = (\$newvirus_admin);
@virus_admin_maps = (\%virus_admin, \$virus_admin);
@banned_admin_maps = (\$banned_admin, \%virus_admin, \$virus_admin);
@bad_header_admin_maps= (\$bad_header_admin);
@spam_admin_maps = (\%spam_admin, \$spam_admin);
@virus_quarantine_to_maps = (\$virus_quarantine_to);
@banned_quarantine_to_maps = (\$banned_quarantine_to);
@unchecked_quarantine_to_maps = (\$unchecked_quarantine_to);
@spam_quarantine_to_maps = (\$spam_quarantine_to);
@spam_quarantine_bysender_to_maps = (\$spam_quarantine_bysender_to);
@bad_header_quarantine_to_maps = (\$bad_header_quarantine_to);
@clean_quarantine_to_maps = (\$clean_quarantine_to);
@archive_quarantine_to_maps = (\$archive_quarantine_to);
@keep_decoded_original_maps = (\$keep_decoded_original_re);
@map_full_type_to_short_type_maps = (\$map_full_type_to_short_type_re);
# @banned_filename_maps = ( {'.' => [$banned_filename_re]} );
# @banned_filename_maps = ( {'.' => 'DEFAULT'} );#names mapped by %banned_rules
@banned_filename_maps = ( 'DEFAULT' ); # same as above, but shorter
@viruses_that_fake_sender_maps = (\$viruses_that_fake_sender_re, 1);
@spam_tag_level_maps = (\$sa_tag_level_deflt); # CC_CLEAN,1
@spam_tag2_level_maps = (\$sa_tag2_level_deflt); # CC_SPAMMY
@spam_tag3_level_maps = (\$sa_tag3_level_deflt); # CC_SPAMMY,1
@spam_kill_level_maps = (\$sa_kill_level_deflt); # CC_SPAM
@spam_dsn_cutoff_level_maps = (\$sa_dsn_cutoff_level);
@spam_dsn_cutoff_level_bysender_maps = (\$sa_dsn_cutoff_level);
@spam_crediblefrom_dsn_cutoff_level_maps =
(\$sa_crediblefrom_dsn_cutoff_level);
@spam_crediblefrom_dsn_cutoff_level_bysender_maps =
(\$sa_crediblefrom_dsn_cutoff_level);
@spam_quarantine_cutoff_level_maps = (\$sa_quarantine_cutoff_level);
@spam_subject_tag_maps = (\$sa_spam_subject_tag1); # note: inconsistent name
@spam_subject_tag2_maps = (\$sa_spam_subject_tag); # note: inconsistent name
# @spam_subject_tag3_maps = (); # new variable, no backward compatib. needed
@whitelist_sender_maps = (
\%whitelist_sender, \@whitelist_sender_acl, \$whitelist_sender_re);
@blacklist_sender_maps = (
\%blacklist_sender, \@blacklist_sender_acl, \$blacklist_sender_re);
@addr_extension_virus_maps = (\$addr_extension_virus);
@addr_extension_spam_maps = (\$addr_extension_spam);
@addr_extension_banned_maps = (\$addr_extension_banned);
@addr_extension_bad_header_maps = (\$addr_extension_bad_header);
@debug_sender_maps = (\@debug_sender_acl);
# @debug_recipient_maps = ();
@remove_existing_spam_headers_maps = (\$remove_existing_spam_headers);
# new variables, no backward compatibility needed, empty by default:
# @score_sender_maps, @author_to_policy_bank_maps, @signer_reputation_maps,
# @message_size_limit_maps
# build backward-compatible settings hashes
#
%final_destiny_maps_by_ccat = (
# value is normally a list of by-recipient lookup tables, but for compa-
# tibility with old %final_destiny_by_ccat a value may also be a scalar
CC_VIRUS, sub { c('final_virus_destiny') },
CC_BANNED, sub { c('final_banned_destiny') },
CC_UNCHECKED, sub { c('final_unchecked_destiny') },
CC_SPAM, sub { c('final_spam_destiny') },
CC_BADH, sub { c('final_bad_header_destiny') },
CC_MTA.',1', D_TEMPFAIL, # MTA response was 4xx
CC_MTA.',2', D_REJECT, # MTA response was 5xx
CC_MTA, D_TEMPFAIL,
CC_OVERSIZED, D_BOUNCE,
CC_CATCHALL, D_PASS,
);
%forward_method_maps_by_ccat = (
CC_CATCHALL, sub { ca('forward_method_maps') },
);
%smtp_reason_by_ccat = (
# currently only used for blocked messages only, status 5xx
# a multiline message will produce a valid multiline SMTP response
CC_VIRUS, 'id=%n - INFECTED: %V',
CC_BANNED, 'id=%n - BANNED: %F',
CC_UNCHECKED.',1', 'id=%n - UNCHECKED: encrypted',
CC_UNCHECKED.',2', 'id=%n - UNCHECKED: over limits',
CC_UNCHECKED.',3', 'id=%n - UNCHECKED: ambiguous content',
CC_UNCHECKED, 'id=%n - UNCHECKED',
CC_SPAM, 'id=%n - spam',
CC_SPAMMY.',1', 'id=%n - spammy (tag3)',
CC_SPAMMY, 'id=%n - spammy',
CC_BADH.',1', 'id=%n - BAD HEADER: MIME error',
CC_BADH.',2', 'id=%n - BAD HEADER: nonencoded 8-bit character',
CC_BADH.',3', 'id=%n - BAD HEADER: contains invalid control character',
CC_BADH.',4', 'id=%n - BAD HEADER: line made up entirely of whitespace',
CC_BADH.',5', 'id=%n - BAD HEADER: line longer than RFC 5322 limit',
CC_BADH.',6', 'id=%n - BAD HEADER: syntax error',
CC_BADH.',7', 'id=%n - BAD HEADER: missing required header field',
CC_BADH.',8', 'id=%n - BAD HEADER: duplicate header field',
CC_BADH, 'id=%n - BAD HEADER',
CC_OVERSIZED, 'id=%n - Message size exceeds recipient\'s size limit',
CC_MTA.',1', 'id=%n - Temporary MTA failure on relaying',
CC_MTA.',2', 'id=%n - Rejected by next-hop MTA on relaying',
CC_MTA, 'id=%n - Unable to relay message back to MTA',
CC_CLEAN, 'id=%n - CLEAN',
CC_CATCHALL, 'id=%n - OTHER', # should not happen
);
%lovers_maps_by_ccat = (
CC_VIRUS, sub { ca('virus_lovers_maps') },
CC_BANNED, sub { ca('banned_files_lovers_maps') },
CC_UNCHECKED, sub { ca('unchecked_lovers_maps') },
CC_SPAM, sub { ca('spam_lovers_maps') },
CC_SPAMMY, sub { ca('spam_lovers_maps') },
CC_BADH, sub { ca('bad_header_lovers_maps') },
);
%defang_maps_by_ccat = (
# compatible with legacy %defang_by_ccat: value may be a scalar
CC_VIRUS, sub { c('defang_virus') },
CC_BANNED, sub { c('defang_banned') },
CC_UNCHECKED, sub { c('defang_undecipherable') },
CC_SPAM, sub { c('defang_spam') },
CC_SPAMMY, sub { c('defang_spam') },
# CC_BADH.',3', 1, # NUL or CR character in header section
# CC_BADH.',5', 1, # header line longer than 998 characters
# CC_BADH.',6', 1, # header field syntax error
CC_BADH, sub { c('defang_bad_header') },
);
%subject_tag_maps_by_ccat = (
CC_VIRUS, [ '***INFECTED*** ' ],
CC_BANNED, undef,
CC_UNCHECKED, sub { [ c('undecipherable_subject_tag') ] }, # not by-recip
CC_SPAM, undef,
CC_SPAMMY.',1', sub { ca('spam_subject_tag3_maps') },
CC_SPAMMY, sub { ca('spam_subject_tag2_maps') },
CC_CLEAN.',1', sub { ca('spam_subject_tag_maps') },
);
%quarantine_method_by_ccat = (
CC_VIRUS, sub { c('virus_quarantine_method') },
CC_BANNED, sub { c('banned_files_quarantine_method') },
CC_UNCHECKED, sub { c('unchecked_quarantine_method') },
CC_SPAM, sub { c('spam_quarantine_method') },
CC_BADH, sub { c('bad_header_quarantine_method') },
CC_CLEAN, sub { c('clean_quarantine_method') },
);
%quarantine_to_maps_by_ccat = (
CC_VIRUS, sub { ca('virus_quarantine_to_maps') },
CC_BANNED, sub { ca('banned_quarantine_to_maps') },
CC_UNCHECKED, sub { ca('unchecked_quarantine_to_maps') },
CC_SPAM, sub { ca('spam_quarantine_to_maps') },
CC_BADH, sub { ca('bad_header_quarantine_to_maps') },
CC_CLEAN, sub { ca('clean_quarantine_to_maps') },
);
%admin_maps_by_ccat = (
CC_VIRUS, sub { ca('virus_admin_maps') },
CC_BANNED, sub { ca('banned_admin_maps') },
CC_UNCHECKED, sub { ca('virus_admin_maps') },
CC_SPAM, sub { ca('spam_admin_maps') },
CC_BADH, sub { ca('bad_header_admin_maps') },
);
%always_bcc_by_ccat = (
CC_CATCHALL, sub { c('always_bcc') },
);
%dsn_bcc_by_ccat = (
CC_CATCHALL, sub { c('dsn_bcc') },
);
%mailfrom_notify_admin_by_ccat = (
CC_SPAM, sub { c('mailfrom_notify_spamadmin') },
CC_CATCHALL, sub { c('mailfrom_notify_admin') },
);
%hdrfrom_notify_admin_by_ccat = (
CC_SPAM, sub { c('hdrfrom_notify_spamadmin') },
CC_CATCHALL, sub { c('hdrfrom_notify_admin') },
);
%mailfrom_notify_recip_by_ccat = (
CC_CATCHALL, sub { c('mailfrom_notify_recip') },
);
%hdrfrom_notify_recip_by_ccat = (
CC_CATCHALL, sub { c('hdrfrom_notify_recip') },
);
%hdrfrom_notify_sender_by_ccat = (
CC_CATCHALL, sub { c('hdrfrom_notify_sender') },
);
%hdrfrom_notify_release_by_ccat = (
CC_CATCHALL, sub { c('hdrfrom_notify_release') },
);
%hdrfrom_notify_report_by_ccat = (
CC_CATCHALL, sub { c('hdrfrom_notify_report') },
);
%notify_admin_templ_by_ccat = (
CC_SPAM, sub { cr('notify_spam_admin_templ') },
CC_CATCHALL, sub { cr('notify_virus_admin_templ') },
);
%notify_recips_templ_by_ccat = (
CC_SPAM, sub { cr('notify_spam_recips_templ') }, #usually empty
CC_CATCHALL, sub { cr('notify_virus_recips_templ') },
);
%notify_sender_templ_by_ccat = ( # bounce templates
CC_VIRUS, sub { cr('notify_virus_sender_templ') },
CC_BANNED, sub { cr('notify_virus_sender_templ') }, #historical reason
CC_SPAM, sub { cr('notify_spam_sender_templ') },
CC_CATCHALL, sub { cr('notify_sender_templ') },
);
%notify_release_templ_by_ccat = (
CC_CATCHALL, sub { cr('notify_release_templ') },
);
%notify_report_templ_by_ccat = (
CC_CATCHALL, sub { cr('notify_report_templ') },
);
%notify_autoresp_templ_by_ccat = (
CC_CATCHALL, sub { cr('notify_autoresp_templ') },
);
%warnsender_by_ccat = ( # deprecated use, except perhaps for CC_BADH
CC_VIRUS, undef,
CC_BANNED, sub { c('warnbannedsender') },
CC_SPAM, undef,
CC_BADH, sub { c('warnbadhsender') },
);
%warnrecip_maps_by_ccat = (
CC_VIRUS, sub { ca('warnvirusrecip_maps') },
CC_BANNED, sub { ca('warnbannedrecip_maps') },
CC_SPAM, undef,
CC_BADH, sub { ca('warnbadhrecip_maps') },
);
%addr_extension_maps_by_ccat = (
CC_VIRUS, sub { ca('addr_extension_virus_maps') },
CC_BANNED, sub { ca('addr_extension_banned_maps') },
CC_SPAM, sub { ca('addr_extension_spam_maps') },
CC_SPAMMY, sub { ca('addr_extension_spam_maps') },
CC_BADH, sub { ca('addr_extension_bad_header_maps') },
# CC_OVERSIZED, 'oversized';
);
%addr_rewrite_maps_by_ccat = ( );
1;
} # end BEGIN - init_tertiary
# prototypes
sub Amavis::Unpackers::do_mime_decode($$);
sub Amavis::Unpackers::do_ascii($$);
sub Amavis::Unpackers::do_uncompress($$$);
sub Amavis::Unpackers::do_gunzip($$);
sub Amavis::Unpackers::do_pax_cpio($$$);
#sub Amavis::Unpackers::do_tar($$); # no longer supported
sub Amavis::Unpackers::do_ar($$$);
sub Amavis::Unpackers::do_unzip($$;$$);
sub Amavis::Unpackers::do_7zip($$$;$);
sub Amavis::Unpackers::do_unrar($$$;$);
sub Amavis::Unpackers::do_unarj($$$;$);
sub Amavis::Unpackers::do_arc($$$);
sub Amavis::Unpackers::do_zoo($$$);
sub Amavis::Unpackers::do_lha($$$;$);
sub Amavis::Unpackers::do_ole($$$);
sub Amavis::Unpackers::do_cabextract($$$);
sub Amavis::Unpackers::do_tnef($$);
sub Amavis::Unpackers::do_tnef_ext($$$);
sub Amavis::Unpackers::do_unstuff($$$);
sub Amavis::Unpackers::do_executable($$@);
no warnings 'once';
# Define alias names or shortcuts in this module to make it simpler
# to call these routines from amavisd.conf
*read_l10n_templates = \&Amavis::Util::read_l10n_templates;
*read_text = \&Amavis::Util::read_text;
*read_hash = \&Amavis::Util::read_hash;
*read_array = \&Amavis::Util::read_array;
*read_cidr = \&Amavis::Util::read_cidr;
*idn_to_ascii = \&Amavis::Util::idn_to_ascii; # RFC 3490: ToASCII
*idn_to_utf8 = \&Amavis::Util::idn_to_utf8; # RFC 3490: ToUnicode
*mail_idn_to_ascii = \&Amavis::Util::mail_addr_idn_to_ascii;
*dump_hash = \&Amavis::Util::dump_hash;
*dump_array = \&Amavis::Util::dump_array;
*ask_daemon = \&Amavis::AV::ask_daemon;
*ask_clamav = \&Amavis::AV::ask_clamav; # deprecated, use ask_daemon
*do_mime_decode = \&Amavis::Unpackers::do_mime_decode;
*do_ascii = \&Amavis::Unpackers::do_ascii;
*do_uncompress = \&Amavis::Unpackers::do_uncompress;
*do_gunzip = \&Amavis::Unpackers::do_gunzip;
*do_pax_cpio = \&Amavis::Unpackers::do_pax_cpio;
*do_tar = \&Amavis::Unpackers::do_tar; # no longer supported
*do_ar = \&Amavis::Unpackers::do_ar;
*do_unzip = \&Amavis::Unpackers::do_unzip;
*do_unrar = \&Amavis::Unpackers::do_unrar;
*do_7zip = \&Amavis::Unpackers::do_7zip;
*do_unarj = \&Amavis::Unpackers::do_unarj;
*do_arc = \&Amavis::Unpackers::do_arc;
*do_zoo = \&Amavis::Unpackers::do_zoo;
*do_lha = \&Amavis::Unpackers::do_lha;
*do_ole = \&Amavis::Unpackers::do_ole;
*do_cabextract = \&Amavis::Unpackers::do_cabextract;
*do_tnef_ext = \&Amavis::Unpackers::do_tnef_ext;
*do_tnef = \&Amavis::Unpackers::do_tnef;
*do_unstuff = \&Amavis::Unpackers::do_unstuff;
*do_executable = \&Amavis::Unpackers::do_executable;
*iso8601_week = \&Amavis::rfc2821_2822_Tools::iso8601_week;
*iso8601_yearweek = \&Amavis::rfc2821_2822_Tools::iso8601_yearweek;
*iso8601_year_and_week = \&Amavis::rfc2821_2822_Tools::iso8601_year_and_week;
*iso8601_weekday = \&Amavis::rfc2821_2822_Tools::iso8601_weekday;
*iso8601_timestamp = \&Amavis::rfc2821_2822_Tools::iso8601_timestamp;
*iso8601_utc_timestamp = \&Amavis::rfc2821_2822_Tools::iso8601_utc_timestamp;
# a shorthand for creating a regexp-based lookup table
sub new_RE { Amavis::Lookup::RE->new(@_) }
# shorthand: construct a query object for a DNSxL query on an IP address
sub q_dns_a { Amavis::Lookup::DNSxL->new(@_) } # dns zone, expect, resolver
# shorthand: construct a query object for an SQL field
sub q_sql_s { Amavis::Lookup::SQLfield->new(undef, $_[0], 'S-') } # string
sub q_sql_n { Amavis::Lookup::SQLfield->new(undef, $_[0], 'N-') } # numeric
sub q_sql_b { Amavis::Lookup::SQLfield->new(undef, $_[0], 'B-') } # boolean
# shorthand: construct a query object for an LDAP attribute
sub q_ldap_s { Amavis::Lookup::LDAPattr->new(undef, $_[0], 'S-') } # string
sub q_ldap_n { Amavis::Lookup::LDAPattr->new(undef, $_[0], 'N-') } # numeric
sub q_ldap_b { Amavis::Lookup::LDAPattr->new(undef, $_[0], 'B-') } # boolean
sub Opaque { Amavis::Lookup::Opaque->new(@_) }
sub OpaqueRef { Amavis::Lookup::OpaqueRef->new(@_) }
#
# Opaque provides a wrapper to arbitrary data structures, allowing them to be
# treated as 'constant' pseudo-lookups, i.e. preventing arrays and hashes from
# being interpreted as lookup lists/tables. In case of $forward_method this
# allows for a listref of failover methods. Without the protection of Opaque
# the listref would be interpreted by a lookup() as an acl lookup type instead
# of a match-always data structure. The Opaque subroutine is not yet available
# during a BEGIN phase, so this assignment must come after compiling the rest
# of the code.
#
# This is the only case where both an array @*_maps as well as its default
# element are members of a policy bank. Use lazy evaluation through a sub
# to make this work as expected.
#
# @forward_method_maps = ( OpaqueRef(\$forward_method) );
@forward_method_maps = ( sub { Opaque(c('forward_method')) } );
# retain compatibility with old names
use vars qw(%final_destiny_by_ccat %defang_by_ccat
$sql_partition_tag $DO_SYSLOG $LOGFILE);
*final_destiny_by_ccat = \%final_destiny_maps_by_ccat;
*defang_by_ccat = \%defang_maps_by_ccat;
*sql_partition_tag = \$partition_tag;
*DO_SYSLOG = \$do_syslog;
*LOGFILE = \$logfile;
@virus_name_to_spam_score_maps =
(new_RE( # the order matters, first match wins
[ qr'^Structured\.(SSN|CreditCardNumber)\b' => 0.1 ],
[ qr'^(Heuristics\.)?Phishing\.' => 0.1 ],
[ qr'^(Email|HTML)\.Phishing\.(?!.*Sanesecurity)' => 0.1 ],
[ qr'^Sanesecurity\.(Malware|Rogue|Trojan)\.' => undef ],# keep as infected
[ qr'^Sanesecurity\.Foxhole\.Zip_exe' => 0.1 ], # F.P.
[ qr'^Sanesecurity\.Foxhole\.Zip_bat' => 0.1 ], # F.P.
[ qr'^Sanesecurity\.Foxhole\.Mail_gz' => 0.1 ], # F.P.
[ qr'^Sanesecurity\.Foxhole\.Mail_ace' => 0.1 ], # F.P.
[ qr'^Sanesecurity\.Foxhole\.' => undef ],# keep as infected
[ qr'^Sanesecurity\.' => 0.1 ],
[ qr'^Sanesecurity_PhishBar_' => 0 ],
[ qr'^Sanesecurity.TestSig_' => 0 ],
[ qr'^Email\.Spam\.Bounce(\.[^., ]*)*\.Sanesecurity\.' => 0 ],
[ qr'^Email\.Spammail\b' => 0.1 ],
[ qr'^MSRBL-(Images|SPAM)\b' => 0.1 ],
[ qr'^VX\.Honeypot-SecuriteInfo\.com\.Joke' => 0.1 ],
[ qr'^VX\.not-virus_(Hoax|Joke)\..*-SecuriteInfo\.com(\.|\z)' => 0.1 ],
[ qr'^Email\.Spam.*-SecuriteInfo\.com(\.|\z)' => 0.1 ],
[ qr'^Safebrowsing\.' => 0.1 ],
[ qr'^winnow\.(phish|spam)\.' => 0.1 ],
[ qr'^INetMsg\.SpamDomain' => 0.1 ],
[ qr'^Doppelstern\.(Spam|Scam|Phishing|Junk|Lott|Loan)'=> 0.1 ],
[ qr'^Bofhland\.Phishing' => 0.1 ],
[ qr'^ScamNailer\.' => 0.1 ],
[ qr'^HTML/Bankish' => 0.1 ], # F-Prot
[ qr'^PORCUPINE_JUNK' => 0.1 ],
[ qr'^PORCUPINE_PHISHING' => 0.1 ],
[ qr'^Porcupine\.Junk' => 0.1 ],
[ qr'^PhishTank\.Phishing\.' => 0.1 ],
[ qr'-SecuriteInfo\.com(\.|\z)' => undef ], # keep as infected
[ qr'^MBL_NA\.UNOFFICIAL' => 0.1 ], # false positives
[ qr'^MBL_' => undef ], # keep as infected
));
# Sanesecurity http://www.sanesecurity.co.uk/
# MSRBL- http://www.msrbl.com/site/contact
# MBL http://www.malware.com.br/index.shtml
# -SecuriteInfo.com http://clamav.securiteinfo.com/malwares.html
# prepend a lookup table label object for logging purposes
#
sub label_default_maps() {
for my $varname (qw(
@disclaimer_options_bysender_maps @dkim_signature_options_bysender_maps
@local_domains_maps @mynetworks_maps @ip_repu_ignore_maps
@forward_method_maps @newvirus_admin_maps @banned_filename_maps
@spam_quarantine_bysender_to_maps
@spam_tag_level_maps @spam_tag2_level_maps @spam_tag3_level_maps
@spam_kill_level_maps
@spam_subject_tag_maps @spam_subject_tag2_maps @spam_subject_tag3_maps
@spam_dsn_cutoff_level_maps @spam_dsn_cutoff_level_bysender_maps
@spam_crediblefrom_dsn_cutoff_level_maps
@spam_crediblefrom_dsn_cutoff_level_bysender_maps
@spam_quarantine_cutoff_level_maps @spam_notifyadmin_cutoff_level_maps
@whitelist_sender_maps @blacklist_sender_maps @score_sender_maps
@author_to_policy_bank_maps @signer_reputation_maps
@message_size_limit_maps @debug_sender_maps @debug_recipient_maps
@bypass_virus_checks_maps @bypass_spam_checks_maps
@bypass_banned_checks_maps @bypass_header_checks_maps
@viruses_that_fake_sender_maps
@virus_name_to_spam_score_maps @virus_name_to_policy_bank_maps
@remove_existing_spam_headers_maps
@sa_userconf_maps @sa_username_maps
@keep_decoded_original_maps @map_full_type_to_short_type_maps
@virus_lovers_maps @spam_lovers_maps @unchecked_lovers_maps
@banned_files_lovers_maps @bad_header_lovers_maps
@virus_quarantine_to_maps @banned_quarantine_to_maps
@unchecked_quarantine_to_maps @spam_quarantine_to_maps
@bad_header_quarantine_to_maps @clean_quarantine_to_maps
@archive_quarantine_to_maps
@virus_admin_maps @banned_admin_maps
@spam_admin_maps @bad_header_admin_maps @spam_modifies_subj_maps
@warnvirusrecip_maps @warnbannedrecip_maps @warnbadhrecip_maps
@addr_extension_virus_maps @addr_extension_spam_maps
@addr_extension_banned_maps @addr_extension_bad_header_maps
))
{
my $g = $varname; $g =~ s{\@}{Amavis::Conf::}; # qualified variable name
my $label = $varname; $label=~s/^\@//; $label=~s/_maps$//;
{ no strict 'refs';
unshift(@$g, # NOTE: a symbolic reference
Amavis::Lookup::Label->new($label)) if @$g; # no label if empty
}
}
}
# return a list of actually read&evaluated configuration files
sub get_config_files_read() { @actual_config_files }
# read and evaluate a configuration file, some sanity checking and housekeeping
#
sub read_config_file($$) {
my($config_file,$is_optional) = @_;
my(@stat_list) = stat($config_file); # symlinks-friendly
my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT && $is_optional) {
# don't complain if missing
} else {
my $owner_uid = $stat_list[4];
my $msg;
if ($errn == ENOENT) { $msg = "does not exist" }
elsif ($errn) { $msg = "is inaccessible: $!" }
elsif (-d _) { $msg = "is a directory" }
elsif (-S _ || -b _ || -c _) { $msg = "is not a regular file or pipe" }
elsif (!$i_know_what_i_am_doing{no_conf_file_writable_check}) {
if ($> && -o _) { $msg = "should not be owned by EUID $>"}
elsif ($> && -w _) { $msg = "is writable by EUID $>, EGID $)" }
elsif ($owner_uid) { $msg = "should be owned by root (uid 0)" }
}
if (defined $msg) { die "Config file \"$config_file\" $msg," }
$read_config_files_depth++; push(@actual_config_files, $config_file);
if ($read_config_files_depth >= 100) {
print STDERR "read_config_files: recursion depth limit exceeded\n";
exit 1; # avoid unwinding deep recursion, abort right away
}
# avoid magic of searching @INC in do() and reporting unrelated errors
$config_file = './'.$config_file if $config_file !~ m{^\.{0,2}/};
local($1,$2,$3,$4,$5,$6,$7,$8,$9);
local $/ = $/; # protect us from a potential change in a config file
$! = 0;
if (defined(do $config_file)) {}
elsif ($@ ne '') { die "Error in config file \"$config_file\": $@" }
elsif ($! != 0) { die "Error reading config file \"$config_file\": $!" }
$read_config_files_depth-- if $read_config_files_depth > 0;
}
1;
}
sub include_config_files(@) { read_config_file($_,0) for @_; 1 }
sub include_optional_config_files(@) { read_config_file($_,1) for @_; 1 }
# supply remaining defaults after config files have already been read/evaluated
#
sub supply_after_defaults() {
$daemon_chroot_dir = ''
if !defined $daemon_chroot_dir || $daemon_chroot_dir eq '/';
# provide some sensible defaults for essential settings (post-defaults)
$TEMPBASE = $MYHOME if !defined $TEMPBASE;
$helpers_home = $MYHOME if !defined $helpers_home;
$db_home = "$MYHOME/db" if !defined $db_home;
@zmq_sockets = ( "ipc://$MYHOME/amavisd-zmq.sock" ) if !@zmq_sockets;
$pid_file = "$MYHOME/amavisd.pid" if !defined $pid_file && $daemonize;
# just keep $lock_file undefined by default, a temp file (File::Temp::tmpnam)
# will be provided by Net::Server for 'flock' serialization on a socket accept()
# $lock_file = "$MYHOME/amavisd.lock" if !defined $lock_file;
local($1,$2);
$X_HEADER_LINE = $myproduct_name . ' at ' .
Amavis::Util::idn_to_ascii($mydomain) if !defined $X_HEADER_LINE;
$X_HEADER_TAG = 'X-Virus-Scanned' if !defined $X_HEADER_TAG;
if ($X_HEADER_TAG =~ /^[!-9;-\176]+\z/) {
# implicitly add to %allowed_added_header_fields for compatibility,
# unless the hash entry already exists
my $allowed_hdrs = cr('allowed_added_header_fields');
$allowed_hdrs->{lc($X_HEADER_TAG)} = 1
if $allowed_hdrs && !exists($allowed_hdrs->{lc($X_HEADER_TAG)});
}
$gunzip = "$gzip -d" if !defined $gunzip && $gzip ne '';
$bunzip2 = "$bzip2 -d" if !defined $bunzip2 && $bzip2 ne '';
$unlzop = "$lzop -d" if !defined $unlzop && $lzop ne '';
# substring "${myhostname}" will be expanded later, just before use
my $pname = '"Content-filter at ${myhostname_utf8}"';
$hdrfrom_notify_sender = $pname . ' <postmaster@${myhostname_ascii}>'
if !defined $hdrfrom_notify_sender;
$hdrfrom_notify_recip = $mailfrom_notify_recip eq ''
? $hdrfrom_notify_sender
: sprintf("%s <%s>", $pname,
Amavis::Util::mail_addr_idn_to_ascii($mailfrom_notify_recip))
if !defined $hdrfrom_notify_recip;
$hdrfrom_notify_admin = $mailfrom_notify_admin eq ''
? $hdrfrom_notify_sender
: sprintf("%s <%s>", $pname,
Amavis::Util::mail_addr_idn_to_ascii($mailfrom_notify_admin))
if !defined $hdrfrom_notify_admin;
$hdrfrom_notify_spamadmin = $mailfrom_notify_spamadmin eq ''
? $hdrfrom_notify_sender
: sprintf("%s <%s>", $pname,
Amavis::Util::mail_addr_idn_to_ascii($mailfrom_notify_spamadmin))
if !defined $hdrfrom_notify_spamadmin;
$hdrfrom_notify_release = $hdrfrom_notify_sender
if !defined $hdrfrom_notify_release;
$hdrfrom_notify_report = $hdrfrom_notify_sender
if !defined $hdrfrom_notify_report;
if ($final_banned_destiny == D_DISCARD && c('warnbannedsender') )
{ $final_banned_destiny = D_BOUNCE }
if ($final_bad_header_destiny == D_DISCARD && c('warnbadhsender') )
{ $final_bad_header_destiny = D_BOUNCE }
if (!%banned_rules) {
# an associative array mapping a rule name
# to a single 'banned names/types' lookup table
%banned_rules = ('DEFAULT'=>$banned_filename_re); # backward compatible
}
1;
}
1;
#
package Amavis::JSON;
use strict;
use re 'taint';
# serialize a data structure to JSON, RFC 7159
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&boolean &numeric);
}
use subs @EXPORT_OK;
our %jesc = ( # JSON escaping
"\x22" => '\\"', "\x5C" => '\\\\',
"\x08" => '\\b', "\x09" => '\\t',
"\x0A" => '\\n', "\x0C" => '\\f', "\x0D" => '\\r',
"\x{2028}" => '\\u2028', "\x{2029}" => '\\u2029' );
# escape also the Line Separator (U+2028) and Paragraph Separator (U+2029)
# http://timelessrepo.com/json-isnt-a-javascript-subset
our($FALSE, $TRUE) = ('false', 'true');
sub boolean { bless($_[0] ? \$TRUE : \$FALSE) }
sub numeric { my $value = $_[0]; bless(\$value) }
# serialize a data structure to JSON, RFC 7159
# expects logical characters in scalars, returns a string of logical chars
#
sub encode($); # prototype
sub encode($) {
my $val = $_[0];
my $ref = ref $val;
local $1;
if ($ref) {
if ($ref eq 'ARRAY') {
return '[' . join(',', map(encode($_), @$val)) . ']';
} elsif ($ref eq 'HASH') {
return '{' .
join(',',
map {
my $k = $_;
$k =~ s{ ([\x00-\x1F\x7F\x{2028}\x{2029}"\\]) }
{ $jesc{$1} || sprintf('\\u%04X',ord($1)) }xgse;
'"' . $k . '":' . encode($val->{$_});
} sort keys %$val
) . '}';
} elsif ($ref->isa('Amavis::JSON')) { # numeric or boolean type
return defined $$val ? $$val : 'null';
}
# fall through, encode other refs as strings, helps debugging
}
return 'null' if !defined $val;
{ # concession on a perl 5.20.0 bug [perl #122148] (fixed in 5.20.1)
# - just warn, do not abort
use warnings NONFATAL => qw(utf8);
$val =~ s{ ([\x00-\x1F\x7F\x{2028}\x{2029}"\\]) }
{ $jesc{$1} || sprintf('\\u%04X',ord($1)) }xgse;
};
'"' . $val . '"';
}
1;
#
package Amavis::Log;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&init &amavis_log_id &collect_log_stats
&log_to_stderr &log_fd &open_log &close_log &write_log);
import Amavis::Conf qw(:platform $DEBUG $TEMPBASE c cr ca
$myversion $logline_maxlen $daemon_user);
# import Amavis::Util qw(untaint idn_to_utf8);
}
use subs @EXPORT_OK;
use POSIX qw(locale_h strftime);
use Fcntl qw(:flock F_GETFL F_SETFL FD_CLOEXEC);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use Unix::Syslog qw(:macros :subs);
use Time::HiRes ();
# since IO::File 1.10 (comes with perl 5.8.1):
# If "IO::File::open" is given a mode that includes the ":" character,
# it passes all the three arguments to a three-argument "open" operator.
use vars qw($loghandle); # log file handle when logging to a file
use vars qw($log_to_stderr $log_to_syslog $logfile_name $within_write_log);
use vars qw($current_amavis_log_id); # tracks am_id() / $msginfo->log_id
use vars qw($current_actual_syslog_ident $current_actual_syslog_facility);
use vars qw($log_lines $log_retries %log_entries_by_level %log_status_counts);
use vars qw($log_prio_debug $log_prio_info $log_prio_notice
$log_prio_warning $log_prio_err $log_prio_crit);
BEGIN { # saves a few ms by avoiding a subroutine call later
$log_prio_debug = LOG_DEBUG;
$log_prio_info = LOG_INFO;
$log_prio_notice = LOG_NOTICE;
$log_prio_warning = LOG_WARNING;
$log_prio_err = LOG_ERR;
$log_prio_crit = LOG_CRIT;
$log_to_stderr = 1; # default until config files have been read
}
sub init($$) {
($log_to_syslog, $logfile_name) = @_;
$log_lines = 0; %log_entries_by_level = ();
$log_retries = 0; %log_status_counts = ();
$log_to_stderr =
$log_to_syslog || (defined $logfile_name && $logfile_name ne '') ? 0 : 1;
open_log();
}
sub collect_log_stats() {
my(@result) = ($log_lines, {%log_entries_by_level},
$log_retries, {%log_status_counts});
$log_lines = 0; %log_entries_by_level = ();
$log_retries = 0; %log_status_counts = ();
@result;
}
# task id as shown in the log, also known as am_id, tracks $msginfo->log_id
#
sub amavis_log_id(;$) {
$current_amavis_log_id = $_[0] if @_;
$current_amavis_log_id;
}
# turn debug logging to STDERR on or off
#
sub log_to_stderr(;$) {
$log_to_stderr = $_[0] if @_;
$log_to_stderr;
}
# try to obtain file descriptor used by write_log, undef if unknown
#
sub log_fd() {
$log_to_stderr ? fileno(STDERR)
: $log_to_syslog ? undef # no fd for syslog
: defined $loghandle ? $loghandle->fileno : fileno(STDERR);
}
sub open_log() {
if ($log_to_syslog && !$log_to_stderr) {
my $id = c('syslog_ident'); my $fac = c('syslog_facility');
$fac =~ /^[A-Za-z0-9_]+\z/
or die "Suspicious syslog facility name: $fac";
my $syslog_facility_num = eval("LOG_\U$fac");
$syslog_facility_num =~ /^\d+\z/
or die "Unknown syslog facility name: $fac";
# man syslog(3) on Linux: The argument 'ident' in the call of openlog()
# is probably stored as-is. Thus, if the string it points to is changed,
# syslog() may start prepending the changed string, and if the string
# it points to ceases to exist, the results are undefined. Most portable
# is to use a string constant. (we use a static variable here)
$current_actual_syslog_ident = $id; $current_actual_syslog_facility = $fac;
openlog($id, LOG_PID | LOG_NDELAY, $syslog_facility_num);
} elsif ($log_to_stderr || $logfile_name eq '') { # logging to STDERR
STDERR->autoflush(1); # just in case (should already be on by default)
STDERR->fcntl(F_SETFL, O_APPEND)
or warn "Error setting O_APPEND on STDERR: $!";
} elsif ($logfile_name ne '') {
$loghandle = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$loghandle->open($logfile_name,
Amavis::Util::untaint(O_CREAT|O_APPEND|O_WRONLY), 0640)
or die "Failed to open log file $logfile_name: $!";
binmode($loghandle,':bytes') or die "Can't cancel :utf8 mode: $!";
$loghandle->autoflush(1);
if (defined $daemon_user && $daemon_user ne '' && $> == 0) {
local($1);
my $uid = $daemon_user=~/^(\d+)$/ ? $1 : (getpwnam($daemon_user))[2];
if ($uid) {
chown($uid,-1,$logfile_name)
or die "Can't chown logfile $logfile_name to $uid: $!";
}
}
}
}
sub close_log() {
if ($log_to_syslog) {
closelog();
$current_actual_syslog_ident = $current_actual_syslog_facility = undef;
} elsif (defined($loghandle) && $logfile_name ne '') {
$loghandle->close or die "Error closing log file $logfile_name: $!";
undef $loghandle;
}
}
# Log either to syslog or to a file
#
sub write_log($$) {
my($level,$errmsg) = @_;
return if $within_write_log;
$within_write_log++;
my $am_id = !defined $current_amavis_log_id ? ''
: "($current_amavis_log_id) ";
# my $old_locale = POSIX::setlocale(LC_TIME,'C'); # English dates required!
my $alert_mark = $level >= 0 ? '' : $level >= -1 ? '(!)' : '(!!)';
# $alert_mark .= '*' if $> == 0;
$log_entries_by_level{"$level"}++;
my $prio = $level >= 3 ? $log_prio_debug # most frequent first
# : $level >= 2 ? $log_prio_info
: $level >= 1 ? $log_prio_info
: $level >= 0 ? $log_prio_notice
: $level >= -1 ? $log_prio_warning
: $level >= -2 ? $log_prio_err
: $log_prio_crit;
if ($log_to_syslog && !$log_to_stderr) {
if ($Amavis::Util::current_config_syslog_ident
ne $current_actual_syslog_ident ||
$Amavis::Util::current_config_syslog_facility
ne $current_actual_syslog_facility) {
close_log() if defined $current_actual_syslog_ident ||
defined $current_actual_syslog_facility;
open_log();
}
my $pre = $alert_mark;
# $logline_maxlen should be less than (1023 - prefix) for a typical syslog,
# 980 is a suitable length to avoid truncations by the syslogd daemon
my $logline_size = $logline_maxlen;
$logline_size = 50 if $logline_size < 50; # let at least something out
while (length($am_id)+length($pre)+length($errmsg) > $logline_size) {
my $avail = $logline_size - length($am_id . $pre . '...');
$log_lines++; $! = 0;
# syslog($prio, '%s', $am_id . $pre . substr($errmsg,0,$avail) . '...');
Unix::Syslog::_isyslog($prio,
$am_id . $pre . substr($errmsg,0,$avail) . '...');
if ($! != 0) { $log_retries++; $log_status_counts{"$!"}++ }
$pre = $alert_mark . '...'; $errmsg = substr($errmsg,$avail);
}
$log_lines++; $! = 0;
# syslog($prio, '%s', $am_id . $pre . $errmsg);
Unix::Syslog::_isyslog($prio, $am_id . $pre . $errmsg);
if ($! != 0) { $log_retries++; $log_status_counts{"$!"}++ }
} elsif ($log_to_stderr || !defined $loghandle) {
$log_lines++;
my $prefix;
if ($DEBUG) {
my $now = Time::HiRes::time; # timestamp with milliseconds
$prefix = sprintf('%s:%06.3f %s %s[%s]: ', # syslog-like prefix
strftime('%b %e %H:%M',localtime($now)), $now-int($now/60)*60,
Amavis::Util::idn_to_utf8(c('myhostname')), c('myprogram_name'), $$);
} else {
$prefix = "<$prio>"; # sd-daemon(3), SyslogLevelPrefix=true
}
# avoid multiple calls to write(2), join the string first!
my $s = $prefix . $am_id . $alert_mark . $errmsg . "\n";
#
# IEEE Std 1003.1, 2013: Write requests to a pipe or FIFO shall be handled
# in the same way as a regular file with the following exceptions: [...]
# - There is no file offset associated with a pipe, hence each write
# request shall append to the end of the pipe.
# - Write requests of {PIPE_BUF} bytes or less shall not be interleaved
# with data from other processes doing writes on the same pipe.
# Writes of greater than {PIPE_BUF} bytes may have data interleaved, on
# arbitrary boundaries, with writes by other processes, whether or not
# the O_NONBLOCK flag of the file status flags is set.
#
# PIPE_BUF is 512 on *BSD, 4096 on Linux.
print STDERR ($s) or die "Error writing to STDERR: $!";
} else {
$log_lines++;
my $now = Time::HiRes::time;
my $prefix = sprintf('%s %s %s[%s]: ', # prepare a syslog-like prefix
strftime('%b %e %H:%M:%S',localtime($now)),
Amavis::Util::idn_to_utf8(c('myhostname')), c('myprogram_name'), $$);
my $s = $prefix . $am_id . $alert_mark . $errmsg . "\n";
# NOTE: a lock is on a file, not on a file handle
flock($loghandle,LOCK_EX) or die "Can't lock a log file: $!";
# seek() seems redundant with O_APPEND:
# IEEE Std 1003.1, 2013: If the O_APPEND flag of the file status flags is
# set, the file offset shall be set to the end of the file prior to each
# write and no intervening file modification operation shall occur between
# changing the file offset and the write operation.
seek($loghandle,0,2) or die "Can't position log file to its tail: $!";
$loghandle->print($s) or die "Error writing to log file: $!";
# we have autoflush on, so unlocking here is safe
flock($loghandle,LOCK_UN) or die "Can't unlock a log file: $!";
}
# POSIX::setlocale(LC_TIME, $old_locale);
$within_write_log = 0;
}
1;
#
package Amavis::DbgLog;
use strict;
use re 'taint';
BEGIN {
use vars qw(@ISA $VERSION);
$VERSION = '2.412';
import Amavis::Conf qw(:platform $TEMPBASE);
import Amavis::Log qw(write_log);
}
use POSIX qw(locale_h strftime);
use IO::File ();
use Time::HiRes ();
# use File::Temp ();
sub new {
my $class = $_[0];
my($self,$fh);
# eval { # calls croak() if an error occurs
# $fh = File::Temp->new(DIR => $TEMPBASE, SUFFIX => '.log',
# TEMPLATE => sprintf('dbg-%05d-XXXXXXXX',$my_pid));
# $fh or warn "Can't create a temporary debug log file: $!";
# 1;
# } or do {
# my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
# warn "Can't create a temporary debug log file: $eval_stat";
# };
$fh = IO::File->new_tmpfile;
$fh or warn "Can't create a temporary debug log file: $!";
$self = bless { fh => $fh }, $class if $fh;
$self;
}
sub DESTROY {
my $self = $_[0];
undef $self->{fh};
};
sub flush {
my $self = $_[0];
my $fh = $self->{fh};
!$fh ? 1 : $fh->flush;
}
sub reposition_to_end {
my $self = $_[0];
my $fh = $self->{fh};
!$fh ? 1 : seek($fh,0,2);
}
# Log to a temporary file, to be retrieved later by dump_captured_log()
#
sub write_dbg_log {
my($self, $level,$errmsg) = @_;
my $fh = $self->{fh};
# ignoring failures
$fh->printf("%06.3f %d %s\n", Time::HiRes::time, $level, $errmsg) if $fh;
1;
}
sub dump_captured_log {
my($self, $dump_log_level,$enable_log_capture_dump) = @_;
my $fh = $self->{fh};
if ($fh) {
# copy the captured temporary log to a real log if requested
if ($enable_log_capture_dump) {
$fh->flush or die "Can't flush debug log file: $!";
$fh->seek(0,0) or die "Can't rewind debug log file: $!";
my($ln,$any_logged);
for ($! = 0; defined($ln=<$fh>); $! = 0) {
chomp($ln);
my($timestamp,$level,$errmsg) = split(/ /,$ln,3);
if (!$any_logged) {
write_log($dump_log_level, 'CAPTURED DEBUG LOG DUMP BEGINS');
$any_logged = 1;
}
write_log($dump_log_level,
sprintf('%s:%06.3f %s',
strftime('%H:%M', localtime($timestamp)),
$timestamp - int($timestamp/60)*60, $errmsg));
}
defined $ln || $! == 0 or die "Error reading from debug log file: $!";
write_log($dump_log_level, 'CAPTURED DEBUG LOG DUMP ENDS')
if $any_logged;
}
# clear the temporary file, prepare it for re-use
$fh->seek(0,0) or die "Can't rewind debug log file: $!";
$fh->truncate(0) or die "Can't truncate debug log file: $!";
}
1;
}
1;
#
package Amavis::Timing;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&init §ion_time &report &get_time_so_far
&get_rusage &rusage_report);
}
use subs @EXPORT_OK;
use vars qw(@timing $rusage_self_initial $rusage_children_initial);
use Time::HiRes ();
sub get_rusage() {
my($rusage_self, $rusage_children);
$rusage_self = Unix::Getrusage::getrusage()
if Unix::Getrusage->UNIVERSAL::can("getrusage");
$rusage_children = Unix::Getrusage::getrusage_children()
if $rusage_self && Unix::Getrusage->UNIVERSAL::can("getrusage_children");
# ru_minflt no. of page faults serviced without I/O activity
# ru_majflt no. of page faults that required I/O activity
# ru_nswap no. of times a process was swapped out
# ru_inblock no. of times a file system had to perform input
# ru_oublock no. of times a file system had to perform output
# ru_msgsnd no. of IPC messages sent
# ru_msgrcv no. of IPC messages received
# ru_nsignals no. of signals delivered
# ru_nvcsw no. of voluntary context switches
# ru_nivcsw no. of involuntary context switches
# ru_maxrss [kB] maximum resident set size utilized
# ru_ixrss [kBtics] integral of mem used by the shared text segment
# ru_idrss [kBtics] integral of unshared mem in the data segment
# ru_isrss [kBtics] integral of unshared mem in the stack segment
# ru_utime [s] time spent executing in user mode
# ru_stime [s] time spent in the system on behalf of the process
($rusage_self, $rusage_children);
}
# clear array @timing and enter start time
#
sub init() {
@timing = (); section_time('init');
($rusage_self_initial, $rusage_children_initial) = get_rusage();
}
# enter current time reading into array @timing
#
sub section_time($) {
push(@timing, $_[0], Time::HiRes::time);
}
# returns a string - a report of elapsed time by section
#
sub report() {
my($rusage_self, $rusage_children);
($rusage_self, $rusage_children) = get_rusage() if $rusage_self_initial;
section_time('rundown');
my($notneeded, $t0) = (shift(@timing), shift(@timing));
my $total = $t0 <= 0 ? 0 : $timing[-1] - $t0;
if ($total < 0.0000001) { $total = 0.0000001 }
my(@sections); my $t00 = $t0;
while (@timing) {
my($section, $t) = (shift(@timing), shift(@timing));
my $dt = $t <= $t0 ? 0 : $t-$t0; # handle possible clock jumps
my $dt_c = $t <= $t00 ? 0 : $t-$t00; # handle possible clock jumps
my $dtp = $dt >= $total ? 100 : $dt*100.0/$total; # this event
my $dtp_c = $dt_c >= $total ? 100 : $dt_c*100.0/$total; # cumulative
my $fmt = $dt >= 0.005 ? "%.0f" : "%.1f";
push(@sections, sprintf("%s: $fmt (%.0f%%)%.0f",
$section, $dt*1000, $dtp, $dtp_c));
$t0 = $t;
}
my $cpu_usage_sum;
if ($rusage_self && $rusage_children) {
$cpu_usage_sum =
($rusage_self->{ru_utime} - $rusage_self_initial->{ru_utime}) +
($rusage_self->{ru_stime} - $rusage_self_initial->{ru_stime}) +
($rusage_children->{ru_utime} - $rusage_children_initial->{ru_utime}) +
($rusage_children->{ru_stime} - $rusage_children_initial->{ru_stime});
}
!$cpu_usage_sum ?
sprintf('TIMING [total %.0f ms] - %s', $total*1000, join(', ',@sections))
: sprintf('TIMING [total %.0f ms, cpu %.0f ms] - %s',
$total*1000, $cpu_usage_sum*1000, join(', ',@sections));
}
# returns a string - getrusage(2) counters deltas and gauges
#
sub rusage_report() {
my($rusage_self, $rusage_children) = get_rusage();
my(@msg);
if ($rusage_self && $rusage_children) {
my(@fields) = qw(minflt majflt nswap inblock oublock
msgsnd msgrcv nsignals nvcsw nivcsw
maxrss ixrss idrss isrss utime stime);
for (@fields) {
my $cn = 'ru_' . $_;
my $f = '%d';
if ($_ eq 'maxrss') {
# this one is a gauge, not a counter
} else { # is a counter
$rusage_self->{$cn} -= $rusage_self_initial->{$cn};
$rusage_children->{$cn} -= $rusage_children_initial->{$cn};
$f = '%.3f' if /time\z/;
}
push(@msg, sprintf("%s=$f+$f", $_, $rusage_self->{$cn},
$rusage_children->{$cn}));
}
}
!@msg ? undef : join(', ',@msg);
}
# returns value in seconds of elapsed time for processing of this mail so far
#
sub get_time_so_far() {
my($notneeded, $t0) = @timing;
my $total = $t0 <= 0 ? 0 : Time::HiRes::time - $t0;
$total < 0 ? 0 : $total;
}
use vars qw($t_was_busy $t_busy_cum $t_idle_cum $t0);
sub idle_proc(@) {
my $t1 = Time::HiRes::time;
if (defined $t0) {
($t_was_busy ? $t_busy_cum : $t_idle_cum) += $t1 - $t0;
Amavis::Util::ll(5) && Amavis::Util::do_log(5,
'idle_proc, %s: was %s, %.1f ms, total idle %.3f s, busy %.3f s',
$_[0], $t_was_busy ? 'busy' : 'idle', 1000*($t1 - $t0),
$t_idle_cum, $t_busy_cum);
}
$t0 = $t1;
}
sub go_idle(@) {
if ($t_was_busy) { idle_proc(@_); $t_was_busy = 0 }
}
sub go_busy(@) {
if (!$t_was_busy) { idle_proc(@_); $t_was_busy = 1 }
}
sub report_load() {
$t_busy_cum + $t_idle_cum <= 0 ? undef
: sprintf('load: %.0f %%, total idle %.3f s, busy %.3f s',
100*$t_busy_cum / ($t_busy_cum + $t_idle_cum), $t_idle_cum, $t_busy_cum);
}
1;
#
package Amavis::Util;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&untaint &untaint_inplace &min &max &minmax
&unique_list &unique_ref &format_time_interval
&is_valid_utf_8 &truncate_utf_8
&safe_encode &safe_encode_utf8 &safe_encode_utf8_inplace
&safe_decode &safe_decode_utf8 &safe_decode_latin1
&safe_decode_mime &q_encode &orcpt_encode &orcpt_decode
&xtext_encode &xtext_decode &proto_encode &proto_decode
&idn_to_ascii &idn_to_utf8 &clear_idn_cache
&mail_addr_decode &mail_addr_idn_to_ascii
&ll &do_log &do_log_safe &snmp_count &snmp_count64
&snmp_counters_init &snmp_counters_get &snmp_initial_oids
&debug_oneshot &update_current_log_level
&flush_captured_log &reposition_captured_log_to_end
&dump_captured_log &log_capture_enabled
&am_id &new_am_id &stir_random
&add_entropy &fetch_entropy_bytes
&generate_mail_id &make_password
&crunching_start_time &prolong_timer &get_deadline
&waiting_for_client &switch_to_my_time &switch_to_client_time
&sanitize_str &fmt_struct &freeze &thaw
&ccat_split &ccat_maj &cmp_ccat &cmp_ccat_maj
&setting_by_given_contents_category_all
&setting_by_given_contents_category &rmdir_recursively
&read_file &read_text &read_l10n_templates
&read_hash &read_array &dump_hash &dump_array
&dynamic_destination &collect_equal_delivery_recips);
import Amavis::Conf qw(:platform $DEBUG c cr ca $mail_id_size_bits
$myversion $snmp_contact $snmp_location
$trim_trailing_space_in_lookup_result_fields);
import Amavis::Log qw(amavis_log_id write_log);
import Amavis::Timing qw(section_time);
}
use subs @EXPORT_OK;
use Errno qw(ENOENT EACCES EAGAIN ESRCH EBADF);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use Digest::MD5; # 2.22 provides 'clone' method, no longer needed since 2.7.0
use MIME::Base64;
use Encode (); # Perl 5.8 UTF-8 support
use Scalar::Util qw(tainted);
use Net::LibIDN ();
use vars qw($enc_ascii $enc_utf8 $enc_latin1 $enc_w1252 $enc_tainted
$enc_taintsafe $enc_is_utf8_buggy);
BEGIN {
$enc_ascii = Encode::find_encoding('ascii');
$enc_utf8 = Encode::find_encoding('UTF-8'); # same as utf-8-strict
$enc_latin1 = Encode::find_encoding('ISO-8859-1');
$enc_w1252 = Encode::find_encoding('Windows-1252');
$enc_ascii or die "Amavis::Util: unknown encoding 'ascii'";
$enc_utf8 or die "Amavis::Util: unknown encoding 'UTF-8'";
$enc_latin1 or die "Amavis::Util: unknown encoding 'ISO-8859-1'";
$enc_w1252 or warn "Amavis::Util: unknown encoding 'Windows-1252'";
$enc_tainted = substr($ENV{PATH}.$ENV{HOME}.$ENV{AMAVIS_TEST_CONFIG}, 0,0); # tainted empty string
$enc_taintsafe = 1; # guessing
if (!tainted($enc_tainted)) {
warn "Amavis::Util: can't obtain a tainted string";
} else {
# NOTE: [rt.cpan.org #85489] - Encode::encode turns on the UTF8 flag
# on a passed argument. Give it a copy to avoid turning $enc_tainted
# or $enc_ps into a UTF-8 string!
# Encode::is_utf8 is always false on tainted in Perl 5.8, Perl bug #32687
my $enc_ps = "\x{2029}"; # Paragraph Separator, utf8 flag on
if (!Encode::is_utf8("$enc_ps $enc_tainted")) {
$enc_is_utf8_buggy = 1;
warn "Amavis::Util, Encode::is_utf8() fails to detect utf8 on tainted";
}
# test for Encode taint laundering bug [rt.cpan.org #84879], fixed in 2.50
if (!tainted($enc_ascii->encode("$enc_ps $enc_tainted"))) {
$enc_taintsafe = 0;
warn "Amavis::Util, Encode::encode() taint laundering bug, ".
"fixed in Encode 2.50";
} elsif (!tainted($enc_ascii->decode("xx $enc_tainted"))) {
$enc_taintsafe = 0;
warn "Amavis::Util, Encode::decode() taint laundering bug, ".
"fixed in Encode 2.50";
}
utf8::is_utf8("$enc_ps $enc_tainted")
or die "Amavis::Util, utf8::is_utf8() fails to detect utf8 on tainted";
!utf8::is_utf8("\xA0 $enc_tainted")
or die "Amavis::Util, utf8::is_utf8() claims utf8 on tainted";
my $t = "$enc_ps $enc_tainted";
utf8::encode($t);
tainted($t)
or die "Amavis::Util, utf8::encode() taint laundering bug";
!utf8::is_utf8($t)
or die "Amavis::Util, utf8::encode() failed to clear utf8 flag";
}
1;
}
# Return untainted copy of a string (argument can be a string or a string ref)
#
sub untaint($) {
return undef if !defined $_[0]; # must return undef even in a list context!
no re 'taint';
local $1; # avoids Perl taint bug: tainted global $1 propagates taintedness
(ref($_[0]) ? ${$_[0]} : $_[0]) =~ /^(.*)\z/s;
$1;
}
sub untaint_inplace($) {
return undef if !defined $_[0]; # must return undef even in a list context!
no re 'taint';
local $1; # avoid Perl taint bug: tainted global $1 propagates taintedness
$_[0] =~ /^(.*)\z/s;
$_[0] = $1;
}
# Returns the smallest defined number from the list, or undef
#
sub min(@) {
my $r = @_ == 1 && ref($_[0]) ? $_[0] : \@_; # accept list, or a list ref
my $m; defined $_ && (!defined $m || $_ < $m) && ($m = $_) for @$r;
$m;
}
# Returns the largest defined number from the list, or undef
#
sub max(@) {
my $r = @_ == 1 && ref($_[0]) ? $_[0] : \@_; # accept list, or a list ref
my $m; defined $_ && (!defined $m || $_ > $m) && ($m = $_) for @$r;
$m;
}
# Returns a pair of the smallest and the largest defined number from the list
#
sub minmax(@) {
my $r = @_ == 1 && ref($_[0]) ? $_[0] : \@_; # accept list, or a list ref
my $min; my $max;
for (@$r) {
if (defined $_) {
$min = $_ if !defined $min || $_ < $min;
$max = $_ if !defined $max || $_ > $max;
}
}
($min,$max);
}
# Returns a sublist of the supplied list of elements in an unchanged order,
# where only the first occurrence of each defined element is retained
# and duplicates removed
#
sub unique_list(@) {
my $r = @_ == 1 && ref($_[0]) ? $_[0] : \@_; # accepts list, or a list ref
my %seen; my(@result) = grep(defined($_) && !$seen{$_}++, @$r);
@result;
}
# same as unique, except that it returns a ref to the resulting list
#
sub unique_ref(@) {
my $r = @_ == 1 && ref($_[0]) ? $_[0] : \@_; # accepts list, or a list ref
my %seen; my(@result) = grep(defined($_) && !$seen{$_}++, @$r);
\@result;
}
sub format_time_interval($) {
my $t = $_[0];
return 'undefined' if !defined $t;
my $sign = ''; if ($t < 0) { $sign = '-'; $t = - $t };
my $dd = int($t / (24*3600)); $t = $t - $dd*(24*3600);
my $hh = int($t / 3600); $t = $t - $hh*3600;
my $mm = int($t / 60); $t = $t - $mm*60;
sprintf("%s%d %d:%02d:%02d", $sign, $dd, $hh, $mm, int($t+0.5));
}
# returns true if the provided string of octets represents a syntactically
# valid UTF-8 string, otherwise a false is returned
#
sub is_valid_utf_8($) {
# my $octets = $_[0];
return undef if !defined $_[0];
#
# RFC 6532: UTF8-non-ascii = UTF8-2 / UTF8-3 / UTF8-4
# RFC 3629 section 4: Syntax of UTF-8 Byte Sequences
# UTF8-char = UTF8-1 / UTF8-2 / UTF8-3 / UTF8-4
# UTF8-1 = %x00-7F
# UTF8-2 = %xC2-DF UTF8-tail
# UTF8-3 = %xE0 %xA0-BF UTF8-tail /
# %xE1-EC 2( UTF8-tail ) /
# %xED %x80-9F UTF8-tail /
# # U+D800..U+DFFF are utf16 surrogates, not legal utf8
# %xEE-EF 2( UTF8-tail )
# UTF8-4 = %xF0 %x90-BF 2( UTF8-tail ) /
# %xF1-F3 3( UTF8-tail ) /
# %xF4 %x80-8F 2( UTF8-tail )
# UTF8-tail = %x80-BF
#
# loose variant:
# [\x00-\x7F] |
# [\xC0-\xDF][\x80-\xBF] |
# [\xE0-\xEF][\x80-\xBF]{2} |
# [\xF0-\xF4][\x80-\xBF]{3}
#
$_[0] =~ /^ (?: [\x00-\x7F] |
[\xC2-\xDF] [\x80-\xBF] |
\xE0 [\xA0-\xBF] [\x80-\xBF] |
[\xE1-\xEC] [\x80-\xBF]{2} |
\xED [\x80-\x9F] [\x80-\xBF] |
[\xEE-\xEF] [\x80-\xBF]{2} |
\xF0 [\x90-\xBF] [\x80-\xBF]{2} |
[\xF1-\xF3] [\x80-\xBF]{3} |
\xF4 [\x80-\x8F] [\x80-\xBF]{2} )* \z/xs ? 1 : 0;
}
# cleanly chop a UTF-8 byte sequence to $max_len or less, RFC 3629;
# if $max_len is undefined just chop off any partial last character
#
sub truncate_utf_8($;$) {
my($octets, $max_len) = @_;
return $octets if !defined $octets;
return '' if defined $max_len && $max_len <= 0;
substr($octets,$max_len) = ''
if defined $max_len && length($octets) > $max_len;
# missing one or more UTF8-tail octets? chop the entire last partial char
if ($octets =~ tr/\x00-\x7F//c) { # triage - is non-ASCII
$octets =~ s/[\xC0-\xDF]\z//s
or $octets =~ s/[\xE0-\xEF][\x80-\xBF]{0,1}\z//s
or $octets =~ s/[\xF0-\xF7][\x80-\xBF]{0,2}\z//s
or $octets =~ s/[\xF8-\xFB][\x80-\xBF]{0,3}\z//s # not strictly valid
or $octets =~ s/[\xFC-\xFD][\x80-\xBF]{0,4}\z//s # not strictly valid
or $octets =~ s/ \xFE [\x80-\xBF]{0,5}\z//sx; # not strictly valid
}
$octets;
}
# A wrapper for Encode::encode, avoiding a bug in Perl 5.8.0 which causes
# Encode::encode to loop and fill memory when given a tainted string.
# Also works around a CPAN bug #64642 in module Encode:
# Tainted values have the taint flag cleared when encoded or decoded.
# https://rt.cpan.org/Public/Bug/Display.html?id=64642
# Fixed in Encode 2.50 [rt.cpan.org #84879].
#
sub safe_encode($$;$) {
# my($encoding,$str,$check) = @_;
my $encoding = shift;
return undef if !defined $_[0]; # must return undef even in a list context!
my $enc = Encode::find_encoding($encoding);
$enc or die "safe_encode: unknown encoding '$encoding'";
# the resulting UTF8 flag is always off
return $enc->encode(@_) if $enc_taintsafe || !tainted($_[0]);
# Work around a taint laundering bug in Encode [rt.cpan.org #84879].
# Propagate taintedness across taint-related bugs in module Encode
# ( Encode::encode in Perl 5.8.0 fills up all available memory
# when given a tainted string with a non-encodeable character. )
$enc_tainted . $enc->encode(untaint($_[0]), $_[1]);
}
# Encodes logical characters to UTF-8 octets, or returns a string of octets
# (with utf8 flag off) unchanged. Ensures the result is always a string of
# octets (utf8 flag off). Unlike safe_encode(), a non-ASCII string with
# utf8 flag off will be returned unchanged, so the result may not be a
# valid UTF-8 string!
#
sub safe_encode_utf8($) {
my $str = $_[0];
return undef if !defined $str; # must return undef even in a list context!
utf8::encode($str) if utf8::is_utf8($str);
$str;
}
sub safe_encode_utf8_inplace($) {
return undef if !defined $_[0]; # must return undef even in a list context!
utf8::encode($_[0]) if utf8::is_utf8($_[0]);
}
sub safe_decode_latin1($) {
my $str = $_[0];
return undef if !defined $str; # must return undef even in a list context!
#
# -> http://en.wikipedia.org/wiki/Windows-1252
# Windows-1252 character encoding is a superset of ISO 8859-1, but differs
# from the IANA's ISO-8859-1 by using displayable characters rather than
# control characters in the 80 to 9F (hex) range. [...]
# It is very common to mislabel Windows-1252 text with the charset label
# ISO-8859-1. A common result was that all the quotes and apostrophes
# (produced by "smart quotes" in word-processing software) were replaced
# with question marks or boxes on non-Windows operating systems, making
# text difficult to read. Most modern web browsers and e-mail clients
# treat the MIME charset ISO-8859-1 as Windows-1252 to accommodate
# such mislabeling. This is now standard behavior in the draft HTML 5
# specification, which requires that documents advertised as ISO-8859-1
# actually be parsed with the Windows-1252 encoding.
#
if ($enc_taintsafe || !tainted($str)) {
return ($enc_w1252||$enc_latin1)->decode($str);
} else { # work around bugs in Encode
untaint_inplace($str);
return $enc_tainted . ($enc_w1252||$enc_latin1)->decode($str);
}
}
sub safe_decode_utf8($;$) {
my($str,$check) = @_;
return undef if !defined $str; # must return undef even in a list context!
if ($enc_taintsafe || !tainted($str)) {
return utf8::is_utf8($str) ? $str : $enc_utf8->decode($str, $check||0);
} else {
# Work around a taint laundering bug in Encode [rt.cpan.org #84879].
# Propagate taintedness across taint-related bugs in module Encode.
untaint_inplace($str);
return $enc_tainted .
(utf8::is_utf8($str) ? $str : $enc_utf8->decode($str, $check||0));
}
}
sub safe_decode($$;$) {
my($encoding,$str,$check) = @_;
return undef if !defined $str; # must return undef even in a list context!
my $enc = Encode::find_encoding($encoding);
return $str if !$enc;
# if the $check argument in a call to Encode::decode() is present it must be
# defined to avoid warning "Use of uninitialized value in subroutine entry"
return $enc->decode($str, $check||0) if $enc_taintsafe || !tainted($str);
# Work around a taint laundering bug in Encode [rt.cpan.org #84879].
# Propagate taintedness across taint-related bugs in module Encode.
untaint_inplace($str);
$enc_tainted . $enc->decode($str, $check||0);
}
# Handle Internationalized Domain Names according to IDNA: RFC 5890, RFC 5891.
# Similar to ToASCII (RFC 3490), but does not fail on garbage.
# Takes a domain name (possibly with utf8 flag on) consisting of U-labels
# or A-labels or NR-LDH labels, converting each label to A-label, lowercased.
# Non- IDNA-valid strings are only encoded to UTF-8 octets but are otherwise
# unchanged. Result is in octets regardless of input, taintedness of the
# argument is propagated to the result.
#
my %idn_encode_cache;
sub clear_idn_cache() { %idn_encode_cache = () }
sub idn_to_ascii($) {
# propagate taintedness of the argument, but not its utf8 flag
return tainted($_[0]) ? $idn_encode_cache{$_[0]} . $enc_tainted
: $idn_encode_cache{$_[0]}
if exists $idn_encode_cache{$_[0]};
my $s = $_[0];
my $t = tainted($s); # taintedness of the argument
return undef if !defined $s;
untaint_inplace($s) if $t;
# to octets if needed, not necessarily valid UTF-8
utf8::encode($s) if utf8::is_utf8($s);
if ($s !~ tr/\x00-\x7F//c) { # is all-ASCII (including IP address literal)
$s = lc $s;
} else {
# Net::LibIDN does not like a leading dot (or '@') in a valid domain name,
# but we need it (e.g. in lookups, meaning subdomains are included), so
# we have to carry a prefix across the call to Net::LibIDN::idn_to_ascii().
my $prefix; local($1);
$prefix = $1 if $s =~ s/^([.\@])//s; # strip a leading dot or '@'
# to ASCII-compatible encoding (ACE)
my $sa = Net::LibIDN::idn_to_ascii($s, 'UTF-8');
$s = lc $sa if defined $sa;
$s = $prefix.$s if $prefix;
}
$idn_encode_cache{$_[0]} = $s;
$t ? $s.$enc_tainted : $s; # propagate taintedness of the argument
}
# Handle Internationalized Domain Names according to IDNA: RFC 5890, RFC 5891.
# Implements ToUnicode (RFC 3490). ToUnicode always succeeds, because it just
# returns the original string if decoding fails. In particular, this means that
# ToUnicode has no effect on a label that does not begin with the ACE prefix.
# Takes a domain name (as a string of octets or logical characters)
# of "Internationalized labels" (A-labels, U-labels, or NR-LDH labels),
# converting each label to U-label. Result is a string of octets encoded
# as UTF-8 if input was valid.
#
sub idn_to_utf8($) {
my $s = $_[0];
return undef if !defined $s;
safe_encode_utf8_inplace($s); # to octets (if not already)
if ($s =~ /(?: ^ | \. ) xn-- [\x00-\x2D\x2F-\xFF]{0,58} [\x00-\x2C\x2F-\xFF]
(?: \z | \. )/xsi) { # contains XN-label
my $su = Net::LibIDN::idn_to_unicode(lc $s, 'UTF-8');
return $su if defined $su;
}
$s;
}
# decode octets found in a mail header field body to a logical chars string
#
sub safe_decode_mime($) {
my $str = $_[0]; # octets
return undef if !defined $str;
my $chars; # logical characters
if ($str !~ tr/\x00-\x7F//c) { # is all-ASCII
# test for any RFC 2047 encoded-words
# encoded-text: Any printable ASCII character other than "?" or SPACE
# permissive: SPACE and other characters can be observed in Q encoded-word
if ($str !~ m{ =\? [^?]* \? (?: [Bb] \? [A-Za-z0-9+/=]*? |
[Qq] \? .*? ) \?= }xs) {
return $str; # good, keep as-is, all-ASCII with no encoded-words
}
# normal, all-ASCII with some encoded-words, try to decode encoded-words
# using Encode::MIME::Header
eval { $chars = safe_decode('MIME-Header',$str); 1 } # RFC 2047
and return $chars;
# give up, is all-ASCII but not MIME, just return as-is
return $str;
}
# contains at least some non-ASCII
if ($str =~ m{ =\? [^?]* \? (?: [Bb] \? [A-Za-z0-9+/=]* |
[Qq] \? [\x20-\x3E\x40-\x7F]* ) \?= }xs) {
# strange/rare, non-ASCII, but also contains RFC 2047 encoded-words !?
# decode any RFC 2047 encoded-words, attempt to decode the rest
# as UTF-8 if valid, or as Windows-1252 (or ISO-8859-1) otherwise
local($1);
$str =~ s{ ( =\? [^?]* \? (?: [Bb] \? [A-Za-z0-9+/=]* |
[Qq] \? [\x20-\x3E\x40-\x7F]* ) \?= ) |
( [^=]* | . )
}{ my $s;
if (defined $1) {
$s = $1; # using Encode::MIME::Header
eval { $s = safe_decode('MIME-Header',$s) };
} else {
$s = $2;
eval { $s = safe_decode_utf8($s, 1|8); 1 }
or do { $s = safe_decode_latin1($s) };
}
$s;
}xgse;
return $str;
}
# contains at least some non-ASCII and no RFC 2047 encoded-words
# non-MIME-encoded KOI8 seems to be pretty common, attempt some guesswork
if (length($str) >= 4 &&
$str !~ tr/\x80-\xA2\xA5\xA8-\xAC\xAE-\xB2\xB5\xB8-\xBC\xBE-\xBF//) {
# does *not* contain UTF8-tail octets (sans KOI8-U letters in that range)
my $koi8_cyr_lett_cnt = # count cyrillic letters
$str =~ tr/\xA3\xA4\xA6\xA7\xAD\xB3\xB4\xB6\xB7\xBD\xC0-\xFF//;
if ($koi8_cyr_lett_cnt >= length($str)*2/3 && # mostly cyrillic letters
($str =~ tr/A-Za-z//) <= 5 && # not many ASCII letters
!is_valid_utf_8($str) ) {
# try decoding as KOI8-U (like KOI8-R but with 8 extra letters)
eval { $chars = safe_decode('KOI8-U',$str,1|8); 1; }
and return $chars; # hopefully the result makes sense
}
}
# contains at least some non-ASCII, no RFC 2047 encoded-words, not KOI8
if ($enc_taintsafe || !tainted($str)) {
# FB_CROAK | LEAVE_SRC
eval { $chars = $enc_utf8->decode($str,1|8); 1; } # try strict UTF-8
and return $chars;
# fallback, assume Windows-1252 or ISO-8859-1
# note that Windows-1252 is a proper superset of ISO-8859-1
return ($enc_w1252||$enc_latin1)->decode($str);
} else { # work around bugs in Encode
untaint_inplace($str);
eval { $chars = $enc_utf8->decode($str,1|8); 1; } # try strict UTF-8
and return $enc_tainted . $chars;
return $enc_tainted . ($enc_w1252||$enc_latin1)->decode($str);
}
}
# Do the Q-encoding manually, the MIME::Words::encode_mimeword does not
# encode spaces and does not limit to 75 ch, which violates the RFC 2047
#
sub q_encode($$$) {
my($octets,$encoding,$charset) = @_;
my $prefix = '=?' . $charset . '?' . $encoding . '?';
my $suffix = '?='; local($1,$2,$3);
# FWS | utext (= NO-WS-CTL|rest of US-ASCII)
$octets =~ /^ ( [\001-\011\013\014\016-\177]* [ \t] )? (.*?)
( [ \t] [\001-\011\013\014\016-\177]* )? \z/xs;
my($head,$rest,$tail) = ($1,$2,$3);
# Q-encode $rest according to RFC 2047 (not for use in comments or phrase)
$rest =~ s{([\000-\037\177\200-\377=?_])}{sprintf('=%02X',ord($1))}gse;
$rest =~ tr/ /_/; # turn spaces into _ (RFC 2047 allows it)
my $s = $head; my $len = 75 - (length($prefix)+length($suffix)) - 2;
while ($rest ne '') {
$s .= ' ' if $s !~ /[ \t]\z/; # encoded words must be separated by FWS
$rest =~ /^ ( .{0,$len} [^=] (?: [^=] | \z ) ) (.*) \z/xs;
$s .= $prefix.$1.$suffix; $rest = $2;
}
$s.$tail;
}
# encode "+", "=" and any character outside the range "!" (33) .. "~" (126)
#
sub xtext_encode($) { # RFC 3461
my $str = $_[0]; local($1);
safe_encode_utf8_inplace($str); # to octets (if not already)
$str =~ s/([^\041-\052\054-\074\076-\176])/sprintf('+%02X',ord($1))/gse;
$str;
}
# decode xtext-encoded string as per RFC 3461
#
sub xtext_decode($) {
my $str = $_[0]; local($1);
$str =~ s/\+([0-9a-fA-F]{2})/pack('C',hex($1))/gse;
$str;
}
sub proto_encode($@) {
my($attribute_name,@strings) = @_; local($1);
for ($attribute_name,@strings) {
# just in case, handle non-octet characters:
s/([^\000-\377])/sprintf('\\x{%04x}',ord($1))/gse and
do_log(-1,'proto_encode: non-octet character encountered: %s', $_);
}
$attribute_name =~ # encode all but alfanumerics, . _ + -
s/([^0-9a-zA-Z._+-])/sprintf('%%%02x',ord($1))/gse;
for (@strings) { # encode % and nonprintables
s/([^\041-\044\046-\176])/sprintf('%%%02x',ord($1))/gse;
}
$attribute_name . '=' . join(' ',@strings);
}
sub proto_decode($) {
my $str = $_[0]; local($1);
$str =~ s/%([0-9a-fA-F]{2})/pack('C',hex($1))/gse;
$str;
}
# Expects an e-mail address as a string of octets, where a local part
# may be encoded as UTF-8, and the domain part may be an international
# domain name (IDN) consisting either of U-labels or A-labels or NR-LDH
# labels. Decodes A-labels to U-labels in domain name. If $result_as_octets
# is false decodes the resulting UTF-8 octets from previous step and returns
# a string of characters. If $result_as_octets is true the subroutine skips
# decoding of UTF-8 octets, the result will be a string of octets, only valid
# as UTF-8 if the provided $addr was a valid UTF-8 (garbage-in/garbage-out).
#
sub mail_addr_decode($;$) {
my($addr, $result_as_octets) = @_;
return undef if !defined $addr;
safe_encode_utf8_inplace($addr); # to octets (if not already)
local($1); my $domain;
my $bracketed = $addr =~ s/^<(.*)>\z/$1/s;
if ($addr =~ s{ \@ ( [^\@]* ) \z}{}xs) {
$domain = $1;
$domain = idn_to_utf8($domain) if $domain =~ /(?:^|\.)xn--/si;
if ($domain !~ tr/\x00-\x7F//c) { # all-ASCII
$domain = lc $domain;
} elsif (!$result_as_octets) { # non-ASCII, attempt decoding UTF-8
# attempt decoding as strict UTF-8, otherwise fall back to Latin1
# Not lowercased.
eval { $domain = safe_decode_utf8($domain, 1|8); 1 }
or do { $domain = safe_decode_latin1($domain) };
}
}
# deal with localpart
if (!$result_as_octets && $addr =~ tr/\x00-\x7F//c) { # non-ASCII
# attempt decoding as strict UTF-8, otherwise fall back to Latin1
eval { $addr = safe_decode_utf8($addr, 1|8); 1 }
or do { $addr = safe_decode_latin1($addr) };
}
$addr .= '@'.$domain if defined $domain; # put back the domain part
$bracketed ? '<'.$addr.'>' : $addr;
}
# Expects an e-mail address as a string of octets or as logical characters
# (with utf8 flag on), where a local part may be encoded as UTF-8, and the
# domain part may be an international domain name (IDN) consisting either
# of U-labels or A-labels or NR-LDH. Leaves the localpart unchanged, encodes
# the domain name to ASCII-compatible encoding (ACE) if it is non-ASCII.
# The result is always in octets (UTF-8), domain part is lowercased.
#
sub mail_addr_idn_to_ascii($) {
my $addr = $_[0];
return undef if !defined $addr;
safe_encode_utf8_inplace($addr); # to octets (if not already)
local($1);
my $bracketed = $addr =~ s/^<(.*)>\z/$1/s;
$addr =~ s{ (\@ [^\@]*) \z }{ idn_to_ascii($1) }xse;
$bracketed ? '<'.$addr.'>' : $addr;
}
# RFC 6533: encode an ORCPT mail address (as obtained from orcpt_decode,
# logical characters (utf8 flag may be on)) into one of the forms:
# utf-8-address, utf-8-addr-unitext, utf-8-addr-xtext, or as a legacy
# xtext (RFC 3461), returning a string of octets
#
sub orcpt_encode($;$$) {
my($str, $smtputf8, $encode_for_smtp) = @_;
return (undef,undef) if !defined $str;
# "Original-Recipient" ":" address-type ";" generic-address
# address-type = atom
# atom = [CFWS] 1*atext [CFWS]
# RFC 3461: Due to limitations in the Delivery Status Notification format,
# the value of the original recipient address prior to encoding as "xtext"
# MUST consist entirely of printable (graphic and white space) characters
# from the US-ASCII [4] repertoire.
my $addr_type = ''; # expected 'rfc822' or 'utf-8', possibly empty
local($1); # get address-type (atom, up to a semicolon) and remove it
if ($str =~ s{^[ \t]*([0-9A-Za-z!\#\$%&'*/=?^_`{|}~+-]*)[ \t]*;[ \t]*}{}s) {
$addr_type = lc $1;
}
ll(5) && do_log(5, 'orcpt_encode %s, %s%s%s%s',
$addr_type, $str,
$smtputf8 ? ', smtputf8' : '',
$encode_for_smtp ? ', encode_for_smtp' : '',
utf8::is_utf8($str) ? ', is_utf8' : '');
$str = $1 if $str =~ /^<(.*)>\z/s;
if ($smtputf8 && utf8::is_utf8($str) &&
($addr_type eq 'utf-8' || $str =~ tr/\x00-\x7F//c)) {
# for use in SMTPUTF8 (RCPT TO) or in message/global-delivery-status
if ($encode_for_smtp && $str =~ tr{\x00-\x20+=\\}{}) {
# contains +,=,\,SP,ctrl -> encode as utf-8-addr-unitext
# HEXPOINT in EmbeddedUnicodeChar is 2 to 6 hexadecimal digits.
$str =~ s{ ( [^\x21-\x2A\x2C-\x3C\x3E-\x5B\x5D-\x7E\x80-\xF4] ) }
{ sprintf('\\x{%02X}', ord($1)) }xgse; # 2..6 uppercase hex!
} else {
# no restricted characters or not for SMTP -> keep as utf-8-address
#
# The utf-8-address form MAY be used in the ORCPT parameter when the
# SMTP server also advertises support for SMTPUTF8 and the address
# doesn't contain any ASCII characters not permitted in the ORCPT
# parameter. It SHOULD be used in a message/global-delivery-status
# "Original-Recipient:" or "Final-Recipient:" DSN field, or in an
# "Original-Recipient:" header field [RFC3798] if the message is a
# SMTPUTF8 message.
}
safe_encode_utf8_inplace($str); # to octets (if not already)
$addr_type = 'utf-8';
} else {
# RFC 6533: utf-8-addr-xtext MUST be used in the ORCPT parameter
# when the SMTP server doesn't advertise support for SMTPUTF8
if ($str =~ tr/\x00-\x7F//c && utf8::is_utf8($str)) {
# non-ASCII UTF-8, encode as utf-8-addr-xtext
# RFC 6533: QCHAR = %x21-2a / %x2c-3c / %x3e-5b / %x5d-7e
# HEXPOINT in EmbeddedUnicodeChar is 2 to 6 hexadecimal digits.
$str =~ s{ ( [^\x21-\x2A\x2C-\x3C\x3E-\x5B\x5D-\x7E] ) }
{ sprintf('\\x{%02X}', ord($1)) }xgse; # 2..6 uppercase hex!
safe_encode_utf8_inplace($str); # to octets (if not already)
$addr_type = 'utf-8';
} else { # encode as legacy RFC 3461 xtext
# encode +, =, \, SP, controls
safe_encode_utf8_inplace($str); # encode to octets first!
$str =~ s{ ( [^\x21-\x2A\x2C-\x3C\x3E-\x5B\x5D-\x7E] ) }
{ sprintf('+%02X', ord($1)) }xgse; # exactly two uppercase hex
$addr_type = 'rfc822';
}
}
($addr_type, $str);
}
# Decode an encoded ORCPT e-mail address (a string of octets, encoded as
# xtext, utf-8-addr-xtext, utf-8-addr-unitext, or utf-8-address) as per
# RFC 3461 and RFC 6533. Result is presumably an RFC 5322 -encoded mail
# address, possibly as utf8-flagged characters string (if valid UTF-8),
# no angle brackets.
#
sub orcpt_decode($;$) {
my($str, $smtputf8) = @_;
return (undef,undef) if !defined $str;
my $addr_type = ''; local($1);
# get address-type (atom, up to a semicolon) and remove it
if ($str =~ s{^[ \t]*([0-9A-Za-z!\#\$%&'*/=?^_`{|}~+-]*)[ \t]*;[ \t]*}{}s) {
$addr_type = lc $1;
}
if ($addr_type eq '') {
# assumed not encoded (e.g. internally generated)
if ($str =~ tr/\x00-\x7F//c && is_valid_utf_8($str) &&
eval { $str = safe_decode_utf8($str, 1|8); 1 }) {
$addr_type = 'utf-8';
} else {
$addr_type = 'rfc822';
}
} elsif ($addr_type ne 'utf-8') { # presumably 'rfc822'
# decode xtext-encoded string as per RFC 3461,
# hexchar = ASCII "+" immediately followed by two UPPER CASE hex digits
$str =~ s{ \+ ( [0-9A-F]{2} ) }{ pack('C',hex($1)) }xgse;
# now have a string of octets, possibly with (invalid) 8bit characters
# we may have a legacy encoding which should really be a utf-8 addr_type
if ($smtputf8 && lc $addr_type eq 'rfc822' &&
$str =~ tr/\x00-\x7F//c && is_valid_utf_8($str) &&
eval { $str = safe_decode_utf8($str, 1|8); 1 }) {
$addr_type = 'utf-8';
}
} elsif ($str !~ tr/\x00-\x7F//c) { # address-type is 'utf-8', is all-ASCII
# Looks like utf-8-addr-xtext or utf-8-addr-unitext.
# Permissive decoding of EmbeddedUnicodeChar, as well as a legacy xtext:
# RFC 6533: UTF-8 address type has 3 forms:
# utf-8-addr-xtext, utf-8-addr-unitext, and utf-8-address.
$str =~ s{ \\ x \{ ( [0-9A-Fa-f]{2,6} ) \} |
\+ ( [0-9A-F]{2} ) }
{ pack('U', hex(defined $1 ? $1 : $2)) }xgse;
# RFC 6533 prohibits <NUL> and surrogates in EmbeddedUnicodeChar,
# as well as encoded printable ASCII chars except xtext-specials +, =, \
} elsif (is_valid_utf_8($str) &&
eval { $str = safe_decode_utf8($str, 1|8); 1 }) {
# Looks like a utf-8-address. Successfully decoded UTF-8 octets to chars.
# permissive decoding of EmbeddedUnicodeChar, as well as a legacy xtext
$str =~ s{ \\ x \{ ( [0-9A-Fa-f]{2,6} ) \} |
\+ ( [0-9A-F]{2} ) }
{ pack('U', hex(defined $1 ? $1 : $2)) }xgse;
} else { # address-type is 'utf-8', non-ASCII, invalid UTF-8 string
# RFC 6533: if an address is labeled with the UTF-8 address type
# but does not conform to utf-8 syntax, then it MUST be copied into
# the message/global-delivery-status field without alteration.
# --> just leave $str unchanged as octets
}
# result in $str is presumably an RFC 5322 -encoded addr,
# possibly as utf8-flagged characters, no angle brackets
($addr_type, $str);
}
# Mostly for debugging and reporting purposes:
# Convert nonprintable characters in the argument
# to \[rnftbe], or hex code, ( and '\' to '\\' ???),
# and Unicode characters to UTF-8, returning a sanitized string.
#
use vars qw(%quote_controls_map);
BEGIN {
%quote_controls_map =
("\r" => '\\r', "\n" => '\\n', "\t" => '\\t', "\\" => '\\\\');
# leave out the <FF>, <BS> and <ESC>, these are too confusing in the log,
# better to just hand them over to hex quoting ( \xHH )
# ("\r" => '\\r', "\n" => '\\n', "\f" => '\\f', "\t" => '\\t',
# "\b" => '\\b', "\e" => '\\e', "\\" => '\\\\');
}
sub sanitize_str {
my($str, $keep_eol) = @_;
return '' if !defined $str;
safe_encode_utf8_inplace($str); # to octets (if not already)
# $str is now in octets, UTF8 flag is off
local($1);
if ($keep_eol) {
# controls except LF, DEL, backslash
$str =~ s/([\x00-\x09\x0B-\x1F\x7F\\])/
$quote_controls_map{$1} || sprintf('\\x%02X', ord($1))/gse;
} else {
# controls, DEL, backslash
$str =~ s/([\x00-\x1F\x7F\\])/
$quote_controls_map{$1} || sprintf('\\x%02X', ord($1))/gse;
}
$str;
}
# Set or get Amavis internal task id (also called: log id).
# This task id performs a similar function as queue-id in MTA responses.
# It may only be used in generating text part of SMTP responses,
# or in generating log entries. It is only unique within a limited timespan.
use vars qw($amavis_task_id); # internal task id
# (accessible via am_id() and later also as $msginfo->log_id)
sub am_id(;$) {
if (@_) { # set, if argument is present
$amavis_task_id = $_[0];
amavis_log_id($amavis_task_id);
$0 = c('myprogram_name') .
(!defined $amavis_task_id ? '' : " ($amavis_task_id)");
}
$amavis_task_id; # return current value
}
sub new_am_id($;$$) {
my($str, $cnt, $seq) = @_;
my $id = defined $str ? $str : sprintf('%05d', $$);
$id .= sprintf('-%02d', $cnt) if defined $cnt;
$id .= '-'.$seq if defined $seq && $seq > 1;
am_id($id);
}
use vars qw($entropy); # MD5 ctx (128 bits, 32 hex digits or 22 base64 chars)
sub add_entropy(@) { # arguments may be strings or array references
$entropy = Digest::MD5->new if !defined $entropy;
my $s = join(',', map((!defined $_ ? 'U' : ref eq 'ARRAY' ? @$_ : $_), @_));
utf8::encode($s) if utf8::is_utf8($s);
# do_log(5,'add_entropy: %s',$s);
$entropy->add($s);
}
sub fetch_entropy_bytes($) {
my $n = $_[0]; # number of bytes to collect
my $result = '';
for (; $n > 0; $n--) {
# collect as few bits per MD5 iteration as possible (RFC 4086 sect 6.2.1)
# let's settle for 8 bits for practical reasons; fewer would be better
my $digest = $entropy->digest; # 16 bytes; also destroys accumulator
$result .= substr($digest,0,1); # take 1 byte
$entropy->reset; $entropy->add($digest); # cycle it back
}
# ll(5) && do_log(5,'fetch_entropy_bytes %s',
# join(' ', map(sprintf('%02x',$_), unpack('C*',$result))));
$result;
}
# read number of bytes from a /dev/urandom device
#
sub read_random_bytes($$) {
# my($buff,$required_bytes) = @_;
$_[0] = '';
my $required_bytes = $_[1];
my $fname = '/dev/urandom'; # nonblocking device!
if ($required_bytes > 0) {
my $fh = IO::File->new;
$fh->open($fname,O_RDONLY) # does a sysopen()
or die "Can't open $fname: $!";
$fh->binmode or die "Can't set $fname to binmode: $!";
my $nbytes = $fh->sysread($_[0], $required_bytes);
defined $nbytes or die "Error reading from $fname: $!";
$nbytes >= $required_bytes or die "Less data read than requested: $!";
$fh->close or die "Error closing $fname: $!";
}
undef;
}
# stir/initialize perl's random generator and our entropy pool;
# to be called at startup of the main process and each child processes
#
sub stir_random() {
my $random_bytes;
eval {
read_random_bytes($random_bytes,16); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(0, 'read_random_bytes error: %s', $eval_stat);
undef $random_bytes;
};
srand(); # let perl give it a try first, then stir-in some additional bits
add_entropy($random_bytes, Time::HiRes::gettimeofday, $$, rand());
#
# must prevent all child processes working with the same inherited random
# seed, otherwise modules like File::Temp will step on each other's toes
my $r = unpack('L', fetch_entropy_bytes(4)) ^ int(rand(0xffffffff));
srand($r & 0x7fffffff);
}
# generate a reasonably unique (long-term) id based on collected entropy.
# The result is a pair of a (mostly public) mail_id, and a secret id,
# where mail_id == b64(md5(secret_bin)). The secret id could be used to
# authorize releasing quarantined mail. Both the mail_id and secret id are
# strings of characters [A-Za-z0-9-_], with an additional restriction
# for mail_id which must begin and end with an alphanumeric character.
# The number of bits in a mail_id is configurable through $mail_id_size_bits
# and defaults to 72, yielding a 12-character base64url-encoded string.
# The number of bits must be an integral multiple of 24, so that no base64
# trailing padding characters '=' are needed (RFC 4648).
# Note the difference in base64-like encodings:
# amavisd almost-base64: 62 +, 63 - (old, no longer used since 2.7.0)
# RFC 4648 base64: 62 +, 63 / (not used here)
# RFC 4648 base64url: 62 -, 63 _
# Generally, RFC 5322 controls, SP and specials must be avoided: ()<>[]:;@\,."
# With version 2.7.0 of amavisd we switched from almost-base64 to base64url
# to avoid having to quote a '+' in regular expressions and in URL.
#
sub generate_mail_id() {
my($id_b64, $secret_bin);
# 72 bits = 9 bytes = 12 b64 chars
# 96 bits = 12 bytes = 16 b64 chars
$mail_id_size_bits > 0 &&
$mail_id_size_bits == int $mail_id_size_bits &&
$mail_id_size_bits % 24 == 0
or die "\$mail_id_size_bits ($mail_id_size_bits) must be a multiple of 24";
for (my $j=0; $j<100; $j++) { # provide some sanity loop limit just in case
$secret_bin = fetch_entropy_bytes($mail_id_size_bits/8);
# mail_id is computed as md5(secret), rely on unidirectionality of md5
$id_b64 = Digest::MD5->new->add($secret_bin)->b64digest; # b64(md5(sec))
add_entropy($id_b64,$j); # fold it back into accumulator
substr($id_b64, $mail_id_size_bits/6) = ''; # b64, crop to size
# done if it starts and ends with an alfanumeric character
last if $id_b64 =~ /^[A-Za-z0-9].*[A-Za-z0-9]\z/s;
# retry on less than 7% of cases
do_log(5,'generate_mail_id retry: %s', $id_b64);
}
$id_b64 =~ tr{+/}{-_}; # base64 -> RFC 4648 base64url [A-Za-z0-9-_]
if (!wantarray) { # not interested in secret
$secret_bin = 'X' x length($secret_bin); # can't hurt to wipe out
return $id_b64;
}
my $secret_b64 = encode_base64($secret_bin,''); # $mail_id_size_bits/6 chars
$secret_bin = 'X' x length($secret_bin); # can't hurt to wipe out
$secret_b64 =~ tr{+/}{-_}; # base64 -> RFC 4648 base64url [A-Za-z0-9-_]
# do_log(5,'generate_mail_id: %s %s', $id_b64, $secret_b64);
($id_b64, $secret_b64);
}
# Returns a password that may be used for scrambling of a message being
# released from a quarantine or mangled, with intention of preventing an
# automatic or undesired implicit opening of a potentially dangerous message.
# The first argument may be: a plain string, which is simply passed on
# to the result, or: a code reference (to be evaluated in a scalar context),
# allowing for lazy evaluation of a supplied password generating code,
# or: undef, which causes a generation of a simple 4-digit PIN-like random
# password. The second argument is just passed on unchanged to the supplied
# subroutine and is expected to be a $msginfo object.
#
sub make_password($$) {
my($password,$msginfo) = @_;
if (ref $password eq 'CODE') {
eval {
$password = &$password($msginfo);
chomp $password; $password =~ s/^[ \t]+//; $password =~ s/[ \t]+\z//;
untaint_inplace($password) if $password =~ /^[A-Za-z0-9:._=+-]*\z/;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, 'password generating subroutine failed, '.
'supplying a default: %s', $@);
$password = undef;
};
}
if (!defined $password) { # create a 4-digit random string
my $r;
do {
$r = unpack('S',fetch_entropy_bytes(2)); # 0 .. 65535
# ditch useless samples beyond 60000
} until $r < 65536 - (65536 % 10000);
$password = sprintf('%04d', $r % 10000);
$r = 0; # clear the IV field of a scalar (the undef() doesn't do so)
}
$password;
}
use vars qw(@counter_names);
# elements may be counter names (increment is 1), or pairs: [name,increment],
# or triples: [name,value,type], where type can be: C32, C64, INT, TIM or OID
sub snmp_counters_init() { @counter_names = () }
sub snmp_count(@) { push(@counter_names, @_) }
sub snmp_count64(@) { push(@counter_names, map(ref $_ ?$_ :[$_,1,'C64'], @_)) }
sub snmp_counters_get() { \@counter_names }
sub snmp_initial_oids() {
return [
['sysDescr', 'STR', $myversion], # 0..255 octets
['sysObjectID', 'OID', '1.3.6.1.4.1.15312.2'],
# iso.org.dod.internet.private.enterprise.ijs.amavisd-new
['sysUpTime', 'INT', int(time)], # to be converted to TIM
# later it must be converted to timeticks (10ms units since start)
['sysContact', 'STR', safe_encode_utf8($snmp_contact)], # 0..255 octets
# Network Unicode format (Net-Unicode) RFC 5198, instead of NVT ASCII
['sysName', 'STR', idn_to_utf8(c('myhostname'))], # 0..255 octets
['sysLocation', 'STR', safe_encode_utf8($snmp_location)], # 0..255 octets
['sysServices', 'INT', 64], # application
];
}
use vars qw($debug_oneshot);
sub debug_oneshot(;$$) {
if (@_) {
my $new_debug_oneshot = shift;
if (($new_debug_oneshot ? 1 : 0) != ($debug_oneshot ? 1 : 0)) {
do_log(0, 'DEBUG_ONESHOT: TURNED '.($new_debug_oneshot ? 'ON' : 'OFF'));
do_log(0, shift) if @_; # caller-provided extra log entry, usually
# the one that caused debug_oneshot call
}
$debug_oneshot = $new_debug_oneshot;
}
$debug_oneshot;
}
use vars qw($dbg_log);
sub log_capture_enabled(;$) {
if (@_) {
my $new_state = $_[0];
if (!$dbg_log && $new_state) {
$dbg_log = Amavis::DbgLog->new;
} elsif ($dbg_log && !$new_state) {
undef $dbg_log; # calls its destructor
}
}
$dbg_log ? 1 : 0;
}
use vars qw($current_config_log_level
$current_config_syslog_ident
$current_config_syslog_facility);
# keeping current settings avoids the most frequent calls to c()
sub update_current_log_level() {
$current_config_log_level = c('log_level') || 0;
$current_config_syslog_ident = c('syslog_ident');
$current_config_syslog_facility = c('syslog_facility');
}
# is message log level below the current log level (i.e. eligible for logging)?
#
sub ll($) {
(($DEBUG || $debug_oneshot) && $_[0] > 0 ? 0 : $_[0])
<= $current_config_log_level
|| $dbg_log;
}
# write a log entry (optimized, called often)
#
sub do_log($$;@) {
# my($level,$errmsg,@args) = @_;
my $level = $_[0];
# if (ll($level)) { # inlined and reorderd the ll() call for speed
if ( $level <= $current_config_log_level ||
( ($DEBUG || $debug_oneshot) && $level > 0
&& 0 <= $current_config_log_level ) ||
$dbg_log ) {
my $errmsg; # the $_[1] is expected to be ASCII or UTF-8 octets (not char)
if (@_ <= 2) { # no arguments to sprintf
$errmsg = $_[1];
} elsif (@_ == 3) { # a single argument to sprintf, optimized common case
if (utf8::is_utf8($_[2])) {
my $arg1 = $_[2]; utf8::encode($arg1);
$errmsg = sprintf($_[1], $arg1);
} else {
$errmsg = sprintf($_[1], $_[2]);
}
} else {
# treat $errmsg as sprintf format string if additional args are provided;
# encode arguments individually to avoid mojibake when UTF8-flagged and
# non- UTF8-flagged strings are concatenated;
my @args = @_[2..$#_];
for (@args) { utf8::encode($_) if utf8::is_utf8($_) }
$errmsg = sprintf($_[1], @args);
}
local($1);
# protect controls, DEL, and backslash; make sure to leave UTF-8 untouched
$errmsg =~ s/([\x00-\x1F\x7F\\])/
$quote_controls_map{$1} || sprintf('\\x%02X', ord($1))/gse;
$dbg_log->write_dbg_log($level,$errmsg) if $dbg_log;
$level = 0 if ($DEBUG || $debug_oneshot) && $level > 0;
if ($level <= $current_config_log_level) {
write_log($level,$errmsg);
### $Amavis::zmq_obj->write_log($level,$errmsg) if $Amavis::zmq_obj;
}
}
1;
}
# equivalent to do_log, but protected by eval so that it can't bail out
#
sub do_log_safe($$;@) {
# ignore failures while keeping perlcritic happy
eval { do_log(shift,shift,@_) } or 1;
1;
}
sub flush_captured_log() {
$dbg_log->flush
or die "Can't flush debug log file: $!" if $dbg_log;
}
sub reposition_captured_log_to_end() {
$dbg_log->reposition_to_end
or die "Can't reposition debug log file to its end: $!" if $dbg_log;
}
sub dump_captured_log($$) {
my($dump_log_level, $enable_log_capture_dump) = @_;
$dbg_log->dump_captured_log($dump_log_level,
$enable_log_capture_dump && ll($dump_log_level)) if $dbg_log;
}
# $timestamp_of_last_reception: a Unix time stamp when an MTA client send the
# last command to us, the most important of which is the reception of a final
# dot in SMTP session, which is a time when a client started to wait for our
# response; this timestamp, along with a c('child_timeout'), make a deadline
# time for our processing
#
# $waiting_for_client: which timeout is running:
# false: processing is in our courtyard, true: waiting for a client
#
use vars qw($timestamp_of_last_reception $waiting_for_client);
sub waiting_for_client(;$) {
$waiting_for_client = $_[0] if @_;
$waiting_for_client;
}
sub get_deadline(@) {
my($which_section, $allowed_share, $reserve, $max_time) = @_;
# $allowed_share ... factor between 0 and 1 of the remaining time till a
# deadline, to be allocated to the task that follows
# $reserve ... try finishing up $reserve seconds before the deadline;
# $max_time ... upper limit in seconds for the timer interval
my($timer_interval, $timer_deadline, $time_to_deadline);
my $child_t_o = c('child_timeout');
if (!$child_t_o) {
do_log(2, 'get_deadline %s - ignored, child_timeout not set',
$which_section);
} elsif (!defined $timestamp_of_last_reception) {
do_log(2, 'get_deadline %s - ignored, master deadline not known',
$which_section);
} else {
my $now = Time::HiRes::time;
$time_to_deadline = $timestamp_of_last_reception + $child_t_o - $now;
$timer_interval = $time_to_deadline;
if (!defined $allowed_share) {
$allowed_share = 0.6;
$timer_interval *= $allowed_share;
} elsif ($allowed_share <= 0) {
$timer_interval = 0;
} elsif ($allowed_share >= 1) {
# leave it unchanged
} else {
$timer_interval *= $allowed_share;
}
$reserve = 4 if !defined $reserve;
if ($reserve > 0 && $timer_interval > $time_to_deadline - $reserve) {
$timer_interval = $time_to_deadline - $reserve;
}
if ($timer_interval < 8) { # be generous, allow at least 6 seconds
$timer_interval = max(6, min(8,$time_to_deadline));
}
my $j = int($timer_interval);
$timer_interval = $timer_interval > $j ? $j+1 : $j; # ceiling
if (defined $max_time && $max_time > 0 && $timer_interval > $max_time) {
$timer_interval = $max_time;
}
ll(5) && do_log(5,'get_deadline %s - deadline in %.1f s, set to %.3f s',
$which_section, $time_to_deadline, $timer_interval);
$timer_deadline = $now + $timer_interval;
}
!wantarray ? $timer_interval
: ($timer_interval, $timer_deadline, $time_to_deadline);
}
sub prolong_timer($;$$$) {
my($which_section, $allowed_share, $reserve, $max_time) = @_;
my($timer_interval, $timer_deadline, $time_to_deadline) = get_deadline(@_);
if (defined $timer_interval) {
my $prev_timer = alarm($timer_interval); # restart/prolong the timer
ll(5) && do_log(5,'prolong_timer %s: timer %d, was %d, deadline in %.1f s',
$which_section, $timer_interval, $prev_timer, $time_to_deadline);
}
!wantarray ? $timer_interval
: ($timer_interval, $timer_deadline, $time_to_deadline);
}
sub switch_to_my_time($) { # processing is in our courtyard
my $msg = $_[0];
$waiting_for_client = 0;
$timestamp_of_last_reception = Time::HiRes::time;
my $child_t_o = c('child_timeout');
if (!$child_t_o) {
alarm(0);
} else {
prolong_timer( 'switch_to_my_time(' . $msg . ')' );
}
}
sub switch_to_client_time($) { # processing is now in client's hands
my $msg = $_[0];
my $interval = c('smtpd_timeout');
$interval = 5 if $interval < 5;
ll(5) && do_log(5, 'switch_to_client_time %d s, %s', $interval,$msg);
undef $timestamp_of_last_reception;
alarm($interval); $waiting_for_client = 1;
}
# pretty-print a structure for logging purposes: returns a string
#
sub fmt_struct($); # prototype
sub fmt_struct($) {
my $arg = $_[0];
my $r = ref $arg;
!$r ?
(defined($arg) ? '"'.$arg.'"' : 'undef')
: $r eq 'ARRAY' ?
'[' . join(',', map(fmt_struct($_), @$arg)) . ']'
: $r eq 'HASH' ?
'{' . join(',', map($_.'=>'.fmt_struct($arg->{$_}), keys %$arg)) . '}'
: $arg;
};
# used by freeze: protect % and ~, as well as NUL and \200 for good measure
#
sub st_encode($) {
my $str = $_[0]; local($1);
{ # concession on a perl 5.20.0 bug [perl #122148] (fixed in 5.20.1)
# - just warn, do not abort
use warnings NONFATAL => qw(utf8);
$str =~ s/([%~\000\200])/sprintf('%%%02X',ord($1))/gse;
};
$str;
}
# simple Storable::freeze lookalike
#
sub freeze($); # prototype
sub freeze($) {
my $obj = $_[0]; my $ty = ref($obj);
if (!defined($obj)) { 'U' }
elsif (!$ty) { join('~', '', st_encode($obj)) } # string
elsif ($ty eq 'SCALAR') { join('~', 'S', st_encode(freeze($$obj))) }
elsif ($ty eq 'REF') { join('~', 'R', st_encode(freeze($$obj))) }
elsif ($ty eq 'ARRAY') { join('~', 'A', map(st_encode(freeze($_)),@$obj)) }
elsif ($ty eq 'HASH') {
join('~', 'H',
map {(st_encode($_),st_encode(freeze($obj->{$_})))} sort keys %$obj)
} else { die "Can't freeze object type $ty" }
}
# simple Storable::thaw lookalike
#
sub thaw($); # prototype
sub thaw($) {
my $str = $_[0];
return undef if !defined $str; # must return undef even in a list context!
my($ty,@val) = split(/~/,$str,-1);
s/%([0-9a-fA-F]{2})/pack('C',hex($1))/gse for @val;
if ($ty eq 'U') { undef }
elsif ($ty eq '') { $val[0] }
elsif ($ty eq 'S') { my $obj = thaw($val[0]); \$obj }
elsif ($ty eq 'R') { my $obj = thaw($val[0]); \$obj }
elsif ($ty eq 'A') { [map(thaw($_),@val)] }
elsif ($ty eq 'H') {
my $hr = {};
while (@val) { my $k = shift @val; $hr->{$k} = thaw(shift @val) }
$hr;
} else { die "Can't thaw object type $ty" }
}
# accepts either a single contents category (a string: "maj,min" or "maj"),
# or a list of contents categories, in which case only the first element
# is considered; returns a passed pair: (major_ccat, minor_ccat)
#
sub ccat_split($) {
my $ccat = $_[0]; my $major; my $minor;
$ccat = $ccat->[0] if ref $ccat; # pick the first element if given a list
($major,$minor) = split(/,/,$ccat,-1) if defined $ccat;
!wantarray ? $major : ($major,$minor);
}
# accepts either a single contents category (a string: "maj,min" or "maj"),
# or a list of contents categories, in which case only the first element
# is considered; returns major_ccat
#
sub ccat_maj($) {
my $ccat = $_[0]; my $major; my $minor;
$ccat = $ccat->[0] if ref $ccat; # pick the first element if given a list
($major,$minor) = split(/,/,$ccat,-1) if defined $ccat;
$major;
}
# compare numerically two strings of the form "maj,min" or just "maj", where
# maj and min are numbers, representing major and minor contents category
#
sub cmp_ccat($$) {
my($a_maj,$a_min) = split(/,/, $_[0], -1);
my($b_maj,$b_min) = split(/,/, $_[1], -1);
$a_maj == $b_maj ? $a_min <=> $b_min : $a_maj <=> $b_maj;
}
# similar to cmp_ccat, but consider only the major category of both arguments
#
sub cmp_ccat_maj($$) {
my($a_maj,$a_min) = split(/,/, $_[0], -1);
my($b_maj,$b_min) = split(/,/, $_[1], -1);
$a_maj <=> $b_maj;
}
# get a list of settings corresponding to all listed contents categories,
# ordered from the most important category to the least; @ccat is a list of
# relevant contents categories for which a query is made, it MUST already be
# sorted in descending order; this is a classical subroutine, not a method!
#
sub setting_by_given_contents_category_all($@) {
my($ccat,@settings_href_list) = @_; my(@r);
if (@settings_href_list) {
for my $e ((!defined $ccat ? () : ref $ccat ?@$ccat :$ccat), CC_CATCHALL) {
if (grep(defined($_) && exists($_->{$e}), @settings_href_list)) {
# supports lazy evaluation (a setting may be a subroutine)
my(@slist) = map { !defined($_) || !exists($_->{$e}) ? undef :
do { my $s = $_->{$e}; ref($s) eq 'CODE' ? &$s : $s}
} @settings_href_list;
push(@r, [$e,@slist]); # a tuple: [corresponding ccat, settings list]
}
}
}
@r; # a list of tuples
}
# similar to setting_by_given_contents_category_all(), but only the first
# (the most relevant) setting is returned, without a corresponding ccat
#
sub setting_by_given_contents_category($@) {
my($ccat,@settings_href_list) = @_; my(@slist);
if (@settings_href_list) {
for my $e ((!defined $ccat ? () : ref $ccat ?@$ccat :$ccat), CC_CATCHALL) {
if (grep(defined($_) && exists($_->{$e}), @settings_href_list)) {
# supports lazy evaluation (setting may be a subroutine)
@slist = map { !defined($_) || !exists($_->{$e}) ? undef :
do { my $s = $_->{$e}; ref($s) eq 'CODE' ? &$s : $s }
} @settings_href_list;
last;
}
}
}
!wantarray ? $slist[0] : @slist; # only the first entry
}
# Removes a directory, along with its contents
#
# The readdir() is entitled to fail if the directory changes underneath,
# so do the deletions by chunks: read a limited set of filenames into
# memory, close directory, delete these files, and repeat.
# The current working directory must not be within directories which are
# to be deleted, otherwise rmdir can fail with 'Invalid argument' (e.g.
# on Solaris 10).
#
sub rmdir_recursively($;$); # prototype
sub rmdir_recursively($;$) {
my($dir, $exclude_itself) = @_;
ll(4) && do_log(4, 'rmdir_recursively: %s, excl=%s', $dir,$exclude_itself);
my($f, @rmfiles, @rmdirs); my $more = 1; my $dir_chmoded = 0;
while ($more) {
local(*DIR); $more = 0;
my $errn = opendir(DIR,$dir) ? 0 : 0+$!;
if ($errn == EACCES && !$dir_chmoded) {
# relax protection on directory, then try again
do_log(3,'rmdir_recursively: enabling read access to directory %s',$dir);
chmod(0750,$dir)
or do_log(-1, "Can't change protection-1 on dir %s: %s", $dir, $!);
$dir_chmoded = 1;
$errn = opendir(DIR,$dir) ? 0 : 0+$!; # try again
}
if ($errn) { die "Can't open directory $dir: $!" }
my $cnt = 0;
# avoid slurping the whole directory contents into memory
while (defined($f = readdir(DIR))) {
next if $f eq '.' || $f eq '..';
my $fname = $dir . '/' . $f;
$errn = lstat($fname) ? 0 : 0+$!;
if ($errn == EACCES && !$dir_chmoded) {
# relax protection on the directory and retry
do_log(3,'rmdir_recursively: enabling access to files in dir %s',$dir);
chmod(0750,$dir)
or do_log(-1, "Can't change protection-2 on dir %s: %s", $dir, $!);
$dir_chmoded = 1;
$errn = lstat($fname) ? 0 : 0+$!; # try again
}
if ($errn) { do_log(-1, "Can't access file \"%s\": $!", $fname,$!) }
if (-d _) { push(@rmdirs,$f) } else { push(@rmfiles,$f) }
$cnt++;
if ($cnt >= 1000) {
do_log(3,'rmdir_recursively: doing %d files and %d dirs for now in %s',
scalar(@rmfiles), scalar(@rmdirs), $dir);
$more = 1;
last;
}
}
# fixed by perl5.20: readdir() now only sets $! on error. $! is no longer
# set to EBADF when then terminating undef is read from the directory
# unless the system call sets $!. [perl #118651]
closedir(DIR) or die "Error closing directory $dir: $!";
my $cntf = scalar(@rmfiles);
for my $f (@rmfiles) {
my $fname = $dir . '/' . untaint($f);
if (unlink($fname)) {
# ok
} elsif ($! == EACCES && !$dir_chmoded) {
# relax protection on the directory, then try again
do_log(3,'rmdir_recursively: enabling write access to dir %s',$dir);
my $what = -l _ ? 'symlink' :-d _ ? 'directory' :'non-regular file';
chmod(0750,$dir)
or do_log(-1, "Can't change protection-3 on dir %s: %s", $dir, $!);
$dir_chmoded = 1;
unlink($fname) or die "Can't remove $what $fname: $!";
}
}
undef @rmfiles;
section_time("unlink-$cntf-files") if $cntf > 0;
for my $d (@rmdirs) {
rmdir_recursively($dir . '/' . untaint($d));
}
undef @rmdirs;
}
if (!$exclude_itself) {
rmdir($dir) or die "rmdir_recursively: Can't remove directory $dir: $!";
section_time('rmdir');
}
1;
}
# efficiently read a file (in binmode) into a provided string;
# either an open file handle may be given, or a filename
#
sub read_file($$) {
my($fname,$strref) = @_;
my($fh, $file_size, $nbytes);
if (ref $fname) {
$fh = $fname; # assume a file handle was given
} else { # a filename
$fh = IO::File->new;
$fh->open($fname,O_RDONLY) # does a sysopen
or die "Can't open file $fname for reading: $!";
$fh->binmode or die "Can't set file $fname to binmode: $!";
}
my(@stat_list) = stat($fh);
@stat_list or die "Failed to access file: $!";
$file_size = -s _ if -f _;
if ($file_size) {
# preallocate exact storage size, avoids realloc/copying while growing
$$strref = ''; vec($$strref, $file_size + 32768, 8) = 0;
}
$$strref = '';
#*** handle EINTR
while ( $nbytes=sysread($fh, $$strref, 32768, length $$strref) ) { }
defined $nbytes or die "Error reading from $fname: $!";
if (!ref $fname) { $fh->close or die "Error closing $fname: $!" }
$strref;
}
# read a text file, returning its contents as a string - suitable for
# calling from amavisd.conf
#
sub read_text($;$) {
my($fname, $encoding) = @_;
my $fh = IO::File->new;
$fh->open($fname,'<') or die "Can't open file $fname for reading: $!";
if (defined($encoding) && $encoding ne '') {
binmode($fh, ":encoding($encoding)")
or die "Can't set :encoding($encoding) on file $fname: $!";
}
my $nbytes; my $str = '';
while (($nbytes = $fh->read($str, 16384, length($str))) > 0) { }
defined $nbytes or die "Error reading from $fname: $!";
$fh->close or die "Error closing $fname: $!";
my $result = $str; undef $str; # shrink allocated storage to actual size
$result;
}
# attempt to read all user-visible replies from a l10n dir
# This function auto-fills $notify_sender_templ, $notify_virus_sender_templ,
# $notify_virus_admin_templ, $notify_virus_recips_templ,
# $notify_spam_sender_templ and $notify_spam_admin_templ from files named
# template-dsn.txt, template-virus-sender.txt, template-virus-admin.txt,
# template-virus-recipient.txt, template-spam-sender.txt,
# template-spam-admin.txt. If this is available, it uses the charset
# file to do automatic charset conversion. Used by the Debian distribution.
#
sub read_l10n_templates($;$) {
my $dir = $_[0];
if (@_ > 1) # compatibility with Debian
{ my($l10nlang, $l10nbase) = @_; $dir = "$l10nbase/$l10nlang" }
my $file_chset = Amavis::Util::read_text("$dir/charset");
local($1,$2);
if ($file_chset =~ m{^(?:\#[^\n]*\n)*([^./\n\s]+)(\s*[\#\n].*)?$}s) {
$file_chset = untaint("$1");
} else {
die "Invalid charset $file_chset\n";
}
$Amavis::Conf::notify_sender_templ =
Amavis::Util::read_text("$dir/template-dsn.txt", $file_chset);
$Amavis::Conf::notify_virus_sender_templ =
Amavis::Util::read_text("$dir/template-virus-sender.txt", $file_chset);
$Amavis::Conf::notify_virus_admin_templ =
Amavis::Util::read_text("$dir/template-virus-admin.txt", $file_chset);
$Amavis::Conf::notify_virus_recips_templ =
Amavis::Util::read_text("$dir/template-virus-recipient.txt", $file_chset);
$Amavis::Conf::notify_spam_sender_templ =
Amavis::Util::read_text("$dir/template-spam-sender.txt", $file_chset);
$Amavis::Conf::notify_spam_admin_templ =
Amavis::Util::read_text("$dir/template-spam-admin.txt", $file_chset);
}
# # attempt to read a list of config files to use instead of the default one,
# # using an external helper script. Used by the Debian/Ubuntu distribution.
# sub find_config_files(@) {
# my(@dirs) = @_;
# local $ENV{PATH} = '/bin:/usr/bin';
# my(@config_files) = map { `run-parts --list "$_"` } @dirs;
# chomp(@config_files);
# # untaint - this data is secure as we check the files themselves later
# map { untaint($_) } @config_files;
# }
#use CDB_File;
#sub tie_hash($$) {
# my($hashref, $filename) = @_;
# CDB_File::create(%$hashref, $filename, "$filename.tmp$$")
# or die "Can't create cdb $filename: $!";
# my $cdb = tie(%$hashref,'CDB_File',$filename)
# or die "Tie to $filename failed: $!";
# $hashref;
#}
# read an associative array (=Perl hash) (as used in lookups) from a file;
# may be called from amavisd.conf
#
# Format: one key per line, anything from '#' to the end of line
# is considered a comment, but '#' within correctly quoted RFC 5321
# addresses is not treated as a comment introducer (e.g. a hash sign
# within "strange # \"foo\" address"@example.com is part of the string).
# Lines may contain a pair: key value, separated by whitespace,
# or key only, in which case a value 1 is implied. Trailing whitespace
# is discarded (iff $trim_trailing_space_in_lookup_result_fields),
# empty lines (containing only whitespace or comment) are ignored.
# Addresses (lefthand-side) are converted from RFC 5321 -quoted form
# into internal (raw) form and inserted as keys into a given hash.
# International domain names (IDN) in UTF-8 are encoded to ASCII.
# NOTE: the format is partly compatible with Postfix maps (not aliases):
# no continuation lines are honoured, Postfix maps do not allow
# RFC 5321 -quoted addresses containing whitespace, Postfix only allows
# comments starting at the beginning of a line.
#
# The $hashref argument is returned for convenience, so that one can do
# for example:
# $per_recip_whitelist_sender_lookup_tables = {
# '.my1.example.com' => read_hash({},'/var/amavis/my1-example-com.wl'),
# '.my2.example.com' => read_hash({},'/var/amavis/my2-example-com.wl') }
# or even simpler:
# $per_recip_whitelist_sender_lookup_tables = {
# '.my1.example.com' => read_hash('/var/amavis/my1-example-com.wl'),
# '.my2.example.com' => read_hash('/var/amavis/my2-example-com.wl') }
#
sub read_hash(@) {
unshift(@_,{}) if !ref $_[0]; # first argument is optional, defaults to {}
my($hashref, $filename, $keep_case) = @_;
my $lpcs = c('localpart_is_case_sensitive');
my $inp = IO::File->new;
$inp->open($filename,'<') or die "Can't open file $filename for reading: $!";
my $ln;
for ($! = 0; defined($ln=$inp->getline); $! = 0) {
chomp($ln);
# carefully handle comments, '#' within "" does not count as a comment
my $lhs = ''; my $rhs = ''; my $at_rhs = 0; my $trailing_comment = 0;
for my $t ( $ln =~ /\G ( " (?: \\. | [^"\\] )* " |
[^#" \t]+ | [ \t]+ | . )/xgs) {
if ($t eq '#') { $trailing_comment = 1; last }
if (!$at_rhs && $t =~ /^[ \t]+\z/) { $at_rhs = 1 }
else { ($at_rhs ? $rhs : $lhs) .= $t }
}
$rhs =~ s/[ \t]+\z// if $trailing_comment ||
$trim_trailing_space_in_lookup_result_fields;
next if $lhs eq '' && $rhs eq '';
my($source_route, $localpart, $domain) =
Amavis::rfc2821_2822_Tools::parse_quoted_rfc2821($lhs,1);
$localpart = lc($localpart) if !$lpcs;
my $addr = $localpart . idn_to_ascii($domain);
$hashref->{$addr} = $rhs eq '' ? 1 : $rhs;
# do_log(5, 'read_hash: address: <%s>: %s', $addr, $hashref->{$addr});
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,'Error reading from %s: %s', $filename,$!)
: die "Error reading from $filename: $!";
$inp->close or die "Error closing $filename: $!";
$hashref;
}
sub read_array(@) {
unshift(@_,[]) if !ref $_[0]; # first argument is optional, defaults to []
my($arrref, $filename, $keep_case) = @_;
my $inp = IO::File->new;
$inp->open($filename,'<') or die "Can't open file $filename for reading: $!";
my $ln;
for ($! = 0; defined($ln=$inp->getline); $! = 0) {
chomp($ln); my $lhs = '';
# carefully handle comments, '#' within "" does not count as a comment
for my $t ( $ln =~ /\G ( " (?: \\. | [^"\\] )* " |
[^#" \t]+ | [ \t]+ | . )/xgs) {
last if $t eq '#';
$lhs .= $t;
}
$lhs =~ s/[ \t]+\z//; # trim trailing whitespace
push(@$arrref, Amavis::rfc2821_2822_Tools::unquote_rfc2821_local($lhs))
if $lhs ne '';
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,'Error reading from %s: %s', $filename,$!)
: die "Error reading from $filename: $!";
$inp->close or die "Error closing $filename: $!";
$arrref;
}
# The read_cidr() reads a Postfix style CIDR file, (see cidr_table(5) man
# page), with postfix-style interpretation of comments and line continuations,
# returning a ref to an array or a ref to a hash (associative array ref).
#
# Empty or whitespace-only lines are ignored, as are lines whose first
# non-whitespace character is a '#'. A logical line starts with non-whitespace
# text. A line that starts with whitespace continues a logical line.
# The general form is: network_address/network_mask result
# where 'network_address' is an IPv4 address in a dot-quad form, or an IPv6
# address optionally enclosed in square brackets. The 'network_mask' along
# with a preceding slash is optional, as is the 'result' argument.
#
# If a network mask is omitted, a host address (not a network address)
# is assumed (i.e. a mask defaults to /32 for an IPv4 address, and
# to /128 for an IPv6 address).
#
# The read_cidr() returns a ref to an array or a ref to an hash (associative
# array) of network specifications, directly suitable for use as a lookup
# table in @client_ipaddr_policy and @mynetworks_maps, or for copying the
# array into @inet_acl or @mynetworks.
#
# When returned as an array the 'result' arguments are ignored, just the
# presence of a network specification matters. A '!' may precede the network
# specification, which will be interpreted as by lookup_ip_acl() as a negation,
# i.e. a match on such entry will return a false.
#
# When returned as a hash, the network specification is lowercased and used
# as a key, and the 'result' is stored as a value of a hash entry. A missing
# 'result' is replaced by 1.
#
# See also the lookup_ip_acl() for details on allowed IP address syntax
# and on the interpretation of array and hash type IP lookup tables.
#
sub read_cidr($;$) {
my($filename, $result) = @_;
# the $result arg may be a ref to an existing array or hash, in which case
# data will be added there - either as key/value pairs, or as array elements;
$result = [] if !defined $result; # missing $results arg yields an array
my $have_arry = ref $result eq 'ARRAY';
my $inp = IO::File->new;
$inp->open($filename,'<') or die "Can't open file $filename for reading: $!";
my($ln, $curr_line);
for ($! = 0; defined($ln=$inp->getline); $! = 0) {
next if $ln =~ /^ [ \t]* (?: \# | $ )/xs;
chomp($ln);
if ($ln =~ /^[ \t]/) { # a continuation line
$curr_line = '' if !defined $curr_line; # first line a continuation??
$curr_line .= $ln;
} else { # a new logical line starts
if (defined $curr_line) { # deal with the previous logical line
my($key,$val) = split(' ',$curr_line,2);
# $val is always defined, it is an empty string if missing
if ($have_arry) { push(@$result,$key) }
else { $result->{lc $key} = $val eq '' ? 1 : $val }
}
$curr_line = $ln;
}
}
if (defined $curr_line) { # deal with the last logical line
my($key,$val) = split(' ',$curr_line,2);
if ($have_arry) { push(@$result,$key) }
else { $result->{lc $key} = $val eq '' ? 1 : $val }
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,'Error reading from %s: %s', $filename,$!)
: die "Error reading from $filename: $!";
$inp->close or die "Error closing $filename: $!";
$result;
}
sub dump_hash($) {
my $hr = $_[0];
do_log(0, 'dump_hash: %s => %s', $_, $hr->{$_}) for (sort keys %$hr);
}
sub dump_array($) {
my $ar = $_[0];
do_log(0, 'dump_array: %s', $_) for @$ar;
}
# use Devel::Symdump;
# sub dump_subs() {
# my $obj = Devel::Symdump->rnew;
# # list of all subroutine names and their memory addresses
# my @a = map([$_, \&$_], $obj->functions, $obj->scalars,
# $obj->arrays, $obj->hashes);
# open(SUBLIST, ">/tmp/1.log") or die "Can't create a file: $!";
# for my $s (sort { $a->[1] <=> $b->[1] } @a) { # sorted by memory address
# printf SUBLIST ("%s %s\n", $s->[1], $s->[0]);
# }
# close(SUBLIST) or die "Can't close a file: $!";
# }
# (deprecated, only still used with Amavis::OS_Fingerprint)
sub dynamic_destination($$) {
my($method,$conn) = @_;
if ($method =~ /^(?:[a-z][a-z0-9.+-]*)?:/si) {
my(@list); $list[0] = ''; my $j = 0;
for ($method =~ /\G \[ (?: \\. | [^\]\\] )* \] | " (?: \\. | [^"\\] )* "
| : | [ \t]+ | [^:"\[ \t]+ | . /xgs) { # real parsing
if ($_ eq ':') { $list[++$j] = '' } else { $list[$j] .= $_ }
};
if ($list[1] =~ m{^/}) {
# presumably the second field is a Unix socket name, keep unchanged
} else {
my $new_method; my($proto,$relayhost,$relayport) = @list;
if ($relayhost eq '*') {
my $client_ip; $client_ip = $conn->client_ip if $conn;
$relayhost = "[$client_ip]" if defined $client_ip && $client_ip ne '';
}
if ($relayport eq '*') {
my $socket_port; $socket_port = $conn->socket_port if $conn;
$relayport = $socket_port + 1
if defined $socket_port && $socket_port ne '';
}
if ($relayhost eq '*' || $relayport eq '*') {
do_log(0,'dynamic destination expected, no client addr/port info: %s',
$method);
}
$list[1] = $relayhost; $list[2] = $relayport;
$new_method = join(':',@list);
if ($new_method ne $method) {
do_log(3, 'dynamic destination: %s -> %s', $method,$new_method);
$method = $new_method;
}
}
}
$method;
}
# collect unfinished recipients matching a $filter sub and a delivery
# method regexp; assumes all list elements of a delivery_method list
# use the same protocol name, hence only the first one is inspected
#
sub collect_equal_delivery_recips($$$) {
my($msginfo, $filter, $deliv_meth_regexp) = @_;
my(@per_recip_data_subset, $proto_sockname);
my(@per_recip_data) =
grep(!$_->recip_done && (!$filter || &$filter($_)) &&
grep(/$deliv_meth_regexp/,
(ref $_->delivery_method ? $_->delivery_method->[0]
: $_->delivery_method)),
@{$msginfo->per_recip_data});
if (@per_recip_data) {
# take the first remaining recipient as a model
$proto_sockname = $per_recip_data[0]->delivery_method;
defined $proto_sockname or die "undefined recipient's delivery_method";
my $proto_sockname_key = !ref $proto_sockname ? $proto_sockname
: join("\n", @$proto_sockname);
# collect recipients with the same delivery method as the first one
$per_recip_data_subset[0] = shift(@per_recip_data); # always equals self
push(@per_recip_data_subset,
grep((ref $_->delivery_method ? join("\n", @{$_->delivery_method})
: $_->delivery_method)
eq $proto_sockname_key, @per_recip_data) );
}
# return a ref to a filtered list of still-to-be-delivered recipient objects
# and a single string or a ref to a list of delivery methods common to
# these recipients
(\@per_recip_data_subset, $proto_sockname);
}
1;
#
package Amavis::ProcControl;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&exit_status_str &proc_status_ok &kill_proc &cloexec
&run_command &run_command_consumer &run_as_subprocess
&collect_results &collect_results_structured);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Util qw(ll do_log do_log_safe prolong_timer untaint
flush_captured_log reposition_captured_log_to_end);
import Amavis::Log qw(open_log close_log log_fd);
}
use subs @EXPORT_OK;
use POSIX qw(:sys_wait_h WIFEXITED WIFSIGNALED WIFSTOPPED WEXITSTATUS
WTERMSIG WSTOPSIG);
use Errno qw(ENOENT EACCES EAGAIN ESRCH);
use IO::File ();
use Time::HiRes ();
# use Fcntl qw(F_GETFD F_SETFD FD_CLOEXEC); # used in cloexec, if enabled
# map process termination status number to an informative string, and
# append optional message (dual-valued errno or a string or a number),
# returning the resulting string
#
sub exit_status_str($;$) {
my($stat,$errno) = @_; my $str;
if (!defined($stat)) {
$str = '(no status)';
} elsif (WIFEXITED($stat)) {
$str = sprintf('exit %d', WEXITSTATUS($stat));
} elsif (WIFSTOPPED($stat)) {
$str = sprintf('stopped, signal %d', WSTOPSIG($stat));
} else { # WIFSIGNALED($stat)
my $sig = WTERMSIG($stat);
$str = sprintf('%s, signal %d (%04x)',
$sig == 1 ? 'HANGUP' : $sig == 2 ? 'INTERRUPTED' :
$sig == 6 ? 'ABORTED' : $sig == 9 ? 'KILLED' :
$sig == 15 ? 'TERMINATED' : 'DIED',
$sig, $stat);
}
if (defined $errno) { # deal with dual-valued and plain variables
$str .= ', '.$errno if (0+$errno) != 0 || ($errno ne '' && $errno ne '0');
}
$str;
}
# check errno to be 0 and a process exit status to be in the list of success
# status codes, returning true if both are ok, and false otherwise
#
sub proc_status_ok($;$@) {
my($exit_status,$errno,@success) = @_;
my $ok = 0;
if ((!defined $errno || $errno == 0) && WIFEXITED($exit_status)) {
my $j = WEXITSTATUS($exit_status);
if (!@success) { $ok = $j==0 } # empty list implies only status 0 is good
elsif (grep($_==$j, @success)) { $ok = 1 }
}
$ok;
}
# kill a process, typically a spawned external decoder or checker
#
sub kill_proc($;$$$$) {
my($pid,$what,$timeout,$proc_fh,$reason) = @_;
$pid >= 0 or die "Shouldn't be killing process groups: [$pid]";
$pid != 1 or die "Shouldn't be killing process 'init': [$pid]";
$what = defined $what ? " running $what" : '';
$reason = defined $reason ? " (reason: $reason)" : '';
#
# the following order is a must: SIGTERM first, _then_ close a pipe;
# otherwise the following can happen: closing a pipe first (explicitly or
# implicitly by undefining $proc_fh) blocks us so we never send SIGTERM
# until the external process dies of natural death; on the other hand,
# not closing the pipe after SIGTERM does not necessarily let the process
# notice SIGTERM, so SIGKILL is always needed to stop it, which is not nice
#
my $n = kill(0,$pid); # does the process really exist?
if ($n == 0 && $! != ESRCH) {
die sprintf("Can't send SIG 0 to process [%s]%s: %s", $pid,$what,$!);
} elsif ($n == 0) {
do_log(2, 'no need to kill process [%s]%s, already gone', $pid,$what);
} else {
do_log(-1,'terminating process [%s]%s%s', $pid,$what,$reason);
kill('TERM',$pid) or $! == ESRCH # be gentle on the first attempt
or die sprintf("Can't send SIGTERM to process [%s]%s: %s",$pid,$what,$!);
}
# close the pipe if still open, ignoring status
$proc_fh->close if defined $proc_fh;
my $child_stat = defined $pid && waitpid($pid,WNOHANG) > 0 ? $? : undef;
$n = kill(0,$pid); # is the process still there?
if ($n > 0 && defined($timeout) && $timeout > 0) {
sleep($timeout); $n = kill(0,$pid); # wait a little and recheck
}
if ($n == 0 && $! != ESRCH) {
die sprintf("Can't send SIG 0 to process [%s]%s: %s", $pid,$what,$!);
} elsif ($n > 0) { # the process is still there, try a stronger signal
do_log(-1,'process [%s]%s is still alive, using a bigger hammer (SIGKILL)',
$pid,$what);
kill('KILL',$pid) or $! == ESRCH
or die sprintf("Can't send SIGKILL to process [%s]%s: %s",$pid,$what,$!);
}
}
sub cloexec($;$$) { undef }
# sub cloexec($;$$) { # supposedly not needed for Perl >= 5.6.0
# my($fh,$newsetting,$name) = @_; my $flags;
# $flags = fcntl($fh, F_GETFD, 0)
# or die "Can't get close-on-exec flag for file handle $fh $name: $!";
# $flags = 0 + $flags; # turn into numeric, avoid: "0 but true"
# if (defined $newsetting) { # change requested?
# my $newflags = $newsetting ? ($flags|FD_CLOEXEC) : ($flags&~FD_CLOEXEC);
# if ($flags != $newflags) {
# do_log(4,"cloexec: turning %s flag FD_CLOEXEC for file handle %s %s",
# $newsetting ? "ON" : "OFF", $fh, $name);
# fcntl($fh, F_SETFD, $newflags)
# or die "Can't set FD_CLOEXEC for file handle $fh $name: $!";
# }
# }
# ($flags & FD_CLOEXEC) ? 1 : 0; # returns old setting
# }
# POSIX::open a file or dup an existing fd (Perl open syntax), with a
# requirement that it gets opened on a prescribed file descriptor $fd_target.
# Returns a file descriptor number (not a Perl file handle, there is no
# associated file handle). Usually called from a forked process prior to exec.
#
sub open_on_specific_fd($$$$) {
my($fd_target,$fname,$flags,$mode) = @_;
my $fd_got; # fd directly given as argument, or obtained from POSIX::open
my $logging_safe = 0;
if (ll(5)) {
# crude attempt to prevent a forked process from writing log records
# to its parent process on STDOUT or STDERR
my $log_fd = log_fd();
$logging_safe = 1 if !defined($log_fd) || $log_fd > 2;
}
local($1);
if ($fname =~ /^&=?(\d+)\z/) { $fd_got = $1 } # fd directly specified
my $flags_displayed = $flags == &POSIX::O_RDONLY ? '<'
: $flags == &POSIX::O_WRONLY ? '>' : '('.$flags.')';
if (!defined($fd_got) || $fd_got != $fd_target) {
# close whatever is on a target descriptor but don't shoot self in the foot
# with Net::Server <= 0.90 fd0 was main::stdin, but no longer is in 0.91
do_log_safe(5, "open_on_specific_fd: target fd%s closing, to become %s %s",
$fd_target, $flags_displayed, $fname)
if $logging_safe && ll(5);
# it pays off to close explicitly, with some luck open will get a target fd
POSIX::close($fd_target); # ignore error; we may have just closed a log
}
if (!defined($fd_got)) { # a file name was given, not a descriptor
$fd_got = POSIX::open($fname,$flags,$mode);
defined $fd_got or die "Can't open $fname ($flags,$mode): $!";
$fd_got = 0 + $fd_got; # turn into numeric, avoid: "0 but true"
}
if ($fd_got != $fd_target) { # dup, ensuring we get a requested descriptor
# we may have been left without a log file descriptor, must not die
do_log_safe(5, "open_on_specific_fd: target fd%s dup2 from fd%s %s %s",
$fd_target, $fd_got, $flags_displayed, $fname)
if $logging_safe && ll(5);
# POSIX mandates we got the lowest fd available (but some kernels have
# bugs), let's be explicit that we require a specified file descriptor
defined POSIX::dup2($fd_got,$fd_target)
or die "Can't dup2 from $fd_got to $fd_target: $!";
if ($fd_got > 2) { # let's get rid of the original fd, unless 0,1,2
my $err; defined POSIX::close($fd_got) or $err = $!;
$err = defined $err ? ": $err" : '';
# we may have been left without a log file descriptor, don't die
do_log_safe(5, "open_on_specific_fd: source fd%s closed%s",
$fd_got,$err) if $logging_safe && ll(5);
}
}
$fd_got;
}
sub release_parent_resources() {
$Amavis::sql_dataset_conn_lookups->dbh_inactive(1)
if $Amavis::sql_dataset_conn_lookups;
$Amavis::sql_dataset_conn_storage->dbh_inactive(1)
if $Amavis::sql_dataset_conn_storage;
$Amavis::zmq_obj->inactivate
if $Amavis::zmq_obj;
# undef $Amavis::sql_dataset_conn_lookups;
# undef $Amavis::sql_dataset_conn_storage;
# undef $Amavis::snmp_db;
# undef $Amavis::db_env;
}
# Run specified command as a subprocess (like qx operator, but more careful
# with error reporting and cancels :utf8 mode). If $stderr_to is undef or
# an empty string it is converted to '&1', merging stderr to stdout on fd1.
# Return a file handle open for reading from the subprocess.
#
sub run_command($$@) {
my($stdin_from, $stderr_to, $cmd, @args) = @_;
my $cmd_text = join(' ', $cmd, @args);
$stdin_from = '/dev/null' if !defined $stdin_from || $stdin_from eq '';
$stderr_to = '&1' if !defined $stderr_to || $stderr_to eq ''; # to stdout
my $msg = join(' ', $cmd, @args, "<$stdin_from", "2>$stderr_to");
# $^F == 2 or do_log(-1,"run_command: SYSTEM_FD_MAX not 2: %d", $^F);
my $proc_fh = IO::File->new; # parent reading side of the pipe
my $child_out_fh = IO::File->new; # child writing side of the pipe
pipe($proc_fh,$child_out_fh)
or die "run_command: Can't create a pipe: $!";
flush_captured_log();
my $pid;
eval {
# Avoid using open('-|') which is just too damn smart: possibly waiting
# indefinitely when resources are tight, and not catching fork errors as
# expected but just bailing out of eval; make a pipe explicitly and fork.
# Note that fork(2) returns ENOMEM on lack of swap space, and EAGAIN when
# process limit is reached; we want it to fail in both cases and not obey
# the EAGAIN and keep retrying, as perl open() does.
$pid = fork(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die "run_command (forking): $eval_stat";
};
defined($pid) or die "run_command: can't fork: $!";
if (!$pid) { # child
alarm(0); my $interrupt = '';
my $h1 = sub { $interrupt = $_[0] };
my $h2 = sub { die "Received signal ".$_[0] };
@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)} = ($h1) x 7;
my $err;
eval { # die must be caught, otherwise we end up with two running daemons
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
# use Devel::Symdump ();
# my $dumpobj = Devel::Symdump->rnew;
# for my $k ($dumpobj->ios) {
# no strict 'refs'; my $fn = fileno($k);
# if (!defined($fn)) { do_log(2, "not open %s", $k) }
# elsif ($fn == 1 || $fn == 2) { do_log(2, "KEEP %s, fileno=%s",$k,$fn) }
# else { $! = 0;
# close(*{$k}{IO}) and do_log(2, "DID CLOSE %s (fileno=%s)", $k,$fn);
# }
# }
eval { release_parent_resources() };
$proc_fh->close or die "Child can't close parent side of a pipe: $!";
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
my $opt_rdonly = untaint(&POSIX::O_RDONLY);
my $opt_wronly = untaint(&POSIX::O_WRONLY | &POSIX::O_CREAT);
open_on_specific_fd(0, $stdin_from, $opt_rdonly, 0);
open_on_specific_fd(1, '&='.fileno($child_out_fh), $opt_wronly, 0);
open_on_specific_fd(2, $stderr_to, $opt_wronly, 0);
# eval { close_log() }; # may have been closed by open_on_specific_fd
# BEWARE of Perl older that 5.6.0: sockets and pipes were not FD_CLOEXEC
exec {$cmd} ($cmd,@args);
die "run_command: failed to exec $cmd_text: $!";
0; # paranoia
} or do {
$err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
};
eval {
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
open_log(); # oops, exec failed, we will need logging after all...
# we're in trouble if stderr was attached to a terminal, but no longer is
do_log_safe(-1,"run_command: child process [%s]: %s", $$,$err);
} or 1; # ignore failures, make perlcritic happy
{ # no warnings;
POSIX::_exit(3); # SIGQUIT, avoid END and destructor processing
# POSIX::_exit(6); # SIGABRT, avoid END and destructor processing
kill('KILL',$$); exit 1; # still kicking? die!
}
}
# parent
ll(5) && do_log(5,"run_command: [%s] %s", $pid,$msg);
$child_out_fh->close
or die "Parent failed to close child side of the pipe: $!";
binmode($proc_fh) or die "Can't set pipe to binmode: $!"; # dflt Perl 5.8.1
($proc_fh, $pid); # return pipe file handle to the subprocess and its PID
}
# Run a specified command as a subprocess. Return a file handle open for
# WRITING to the subprocess, utf8 mode canceled and autoflush turned OFF !
# If $stderr_to is undef or is an empty string it is converted to '&1',
# merging stderr to stdout on fd1.
#
sub run_command_consumer($$@) {
my($stdout_to, $stderr_to, $cmd, @args) = @_;
my $cmd_text = join(' ', $cmd, @args);
$stdout_to = '/dev/null' if !defined $stdout_to || $stdout_to eq '';
$stderr_to = '&1' if !defined $stderr_to || $stderr_to eq ''; # to stdout
my $msg = join(' ', $cmd, @args, ">$stdout_to", "2>$stderr_to");
# $^F == 2 or do_log(-1,"run_command_consumer: SYSTEM_FD_MAX not 2: %d", $^F);
my $proc_fh = IO::File->new; # parent writing side of the pipe
my $child_in_fh = IO::File->new; # child reading side of the pipe
pipe($child_in_fh,$proc_fh)
or die "run_command_consumer: Can't create a pipe: $!";
flush_captured_log();
my $pid;
eval {
# Avoid using open('|-') which is just too damn smart: possibly waiting
# indefinitely when resources are tight, and not catching fork errors as
# expected but just bailing out of eval; make a pipe explicitly and fork.
# Note that fork(2) returns ENOMEM on lack of swap space, and EAGAIN when
# process limit is reached; we want it to fail in both cases and not obey
# the EAGAIN and keep retrying, as perl open() does.
$pid = fork(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die "run_command_consumer (fork): $eval_stat";
};
defined($pid) or die "run_command_consumer: can't fork: $!";
if (!$pid) { # child
alarm(0); my $interrupt = '';
my $h1 = sub { $interrupt = $_[0] };
my $h2 = sub { die "Received signal ".$_[0] };
@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)} = ($h1) x 7;
my $err;
eval { # die must be caught, otherwise we end up with two running daemons
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
eval { release_parent_resources() };
$proc_fh->close or die "Child can't close parent side of a pipe: $!";
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
my $opt_rdonly = untaint(&POSIX::O_RDONLY);
my $opt_wronly = untaint(&POSIX::O_WRONLY | &POSIX::O_CREAT);
open_on_specific_fd(0, '&='.fileno($child_in_fh), $opt_rdonly, 0);
open_on_specific_fd(1, $stdout_to, $opt_wronly, 0);
open_on_specific_fd(2, $stderr_to, $opt_wronly, 0);
# eval { close_log() }; # may have been closed by open_on_specific_fd
# BEWARE of Perl older that 5.6.0: sockets and pipes were not FD_CLOEXEC
exec {$cmd} ($cmd,@args);
die "run_command_consumer: failed to exec $cmd_text: $!";
0; # paranoia
} or do {
$err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
};
eval {
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
open_log(); # oops, exec failed, we will need logging after all...
# we're in trouble if stderr was attached to a terminal, but no longer is
do_log_safe(-1,"run_command_consumer: child process [%s]: %s", $$,$err);
} or 1; # ignore failures, make perlcritic happy
{ # no warnings;
POSIX::_exit(3); # SIGQUIT, avoid END and destructor processing
# POSIX::_exit(6); # SIGABRT, avoid END and destructor processing
kill('KILL',$$); exit 1; # still kicking? die!
}
}
# parent
ll(5) && do_log(5,"run_command_consumer: [%s] %s", $pid,$msg);
$child_in_fh->close
or die "Parent failed to close child side of the pipe: $!";
binmode($proc_fh) or die "Can't set pipe to binmode: $!"; # dflt Perl 5.8.1
$proc_fh->autoflush(0); # turn it off here, must call ->flush when needed
($proc_fh, $pid); # return pipe file handle to the subprocess and its PID
}
# run a specified subroutine with given arguments as a (forked) subprocess,
# collecting results (if any) over a pipe from a subprocess and propagating
# them back to a caller; (useful to prevent a potential process crash from
# bringing down the main process, and allows cleaner timeout aborts)
#
sub run_as_subprocess($@) {
my($code,@args) = @_;
alarm(0); # stop the timer
my $proc_fh = IO::File->new; # parent reading side of the pipe
my $child_out_fh = IO::File->new; # child writing side of the pipe
pipe($proc_fh,$child_out_fh)
or die "run_as_subprocess: Can't create a pipe: $!";
flush_captured_log();
my $pid;
eval {
# Avoid using open('-|') which is just too damn smart: possibly waiting
# indefinitely when resources are tight, and not catching fork errors as
# expected but just bailing out of eval; make a pipe explicitly and fork.
# Note that fork(2) returns ENOMEM on lack of swap space, and EAGAIN when
# process limit is reached; we want it to fail in both cases and not obey
# the EAGAIN and keep retrying, as perl open() does.
$pid = fork(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die "run_as_subprocess (forking): $eval_stat";
};
defined($pid) or die "run_as_subprocess: can't fork: $!";
if (!$pid) { # child
# timeouts will be also be handled by a parent process
my $t0 = Time::HiRes::time; my(@result); my $interrupt = '';
my $h1 = sub { $interrupt = $_[0] };
my $h2 = sub { die "Received signal ".$_[0] };
@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)} = ($h1) x 7;
$SIG{PIPE} = 'IGNORE'; # don't signal on a write to a widowed pipe
my $myownpid = $$; # fetching $$ is a syscall
$0 = 'sub-' . c('myprogram_name'); # let it show in ps(1)
my $eval_stat;
eval { # die must be caught, otherwise we end up with two running daemons
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
eval { release_parent_resources() };
$proc_fh->close or die "Child can't close parent side of a pipe: $!";
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
prolong_timer("child[$myownpid]"); # restart the timer
binmode($child_out_fh) or die "Can't set pipe to binmode: $!";
# we don't really need STDOUT here, but just in case the supplied code
# happens to write there, let's make STDOUT a dup of a pipe
close STDOUT; # ignoring status
# prefer dup(2) here instead of fdopen, with some luck this gives us fd1
open(STDOUT, '>&'.fileno($child_out_fh))
or die "Child can't dup pipe to STDOUT: $!";
binmode(STDOUT) or die "Can't set STDOUT to binmode: $!";
#*** should re-establish ZMQ sockets here without clobbering parent
ll(5) && do_log(5,'[%s] run_as_subprocess: running as child, '.
'stdin=%s, stdout=%s, pipe=%s', $myownpid,
fileno(STDIN), fileno(STDOUT), fileno($child_out_fh));
@result = &$code(@args); # invoke a caller-specified subroutine
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
my $dt = Time::HiRes::time - $t0;
eval { # must not use die in forked process, or we end up with two daemons
local(@SIG{qw(INT HUP TERM TSTP QUIT USR1 USR2)}) = ($h2) x 7;
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
my $status; my $ll = 3;
if (defined $eval_stat) { # failure
chomp $eval_stat; $ll = -2;
$status = sprintf("STATUS: FAILURE %s", $eval_stat);
} else { # success
$status = sprintf("STATUS: SUCCESS, %d results", scalar(@result));
};
my $frozen = Amavis::Util::freeze([$status,@result]);
ll($ll) && do_log($ll, '[%s] run_as_subprocess: child done (%.1f ms), '.
'sending results: res_len=%d, %s',
$myownpid, $dt*1000, length($frozen), $status);
# write results back to a parent process over a pipe as a frozen struct.
# writing to broken pipe must return an error, not throw a signal
local $SIG{PIPE} = sub { die "Broken pipe\n" }; # locale-independent err
$child_out_fh->print($frozen) or die "Can't write result to pipe: $!";
$child_out_fh->close or die "Child can't close its side of a pipe: $!";
flush_captured_log();
close STDOUT or die "Child can't close its STDOUT: $!";
POSIX::_exit(0); # normal completion, avoid END and destructor processing
} or 1; # ignore failures, make perlcritic happy
my $eval2_stat = $@ ne '' ? $@ : "errno=$!";
eval {
chomp $eval2_stat;
if ($interrupt ne '') { my $i = $interrupt; $interrupt = ''; die $i }
# broken pipe is common when parent process is shutting down
my $ll = $eval2_stat =~ /^Broken pipe\b/ ? 1 : -1;
do_log_safe($ll, 'run_as_subprocess: child process [%s]: %s',
$myownpid, $eval2_stat);
} or 1; # ignore failures, make perlcritic happy
POSIX::_exit(3); # SIGQUIT, avoid END and destructor processing
# POSIX::_exit(6); # SIGABRT, avoid END and destructor processing
}
# parent
ll(5) && do_log(5,"run_as_subprocess: spawned a subprocess [%s]", $pid);
$child_out_fh->close
or die "Parent failed to close child side of the pipe: $!";
binmode($proc_fh) or die "Can't set pipe to binmode: $!"; # dflt Perl 5.8.1
prolong_timer('run_as_subprocess'); # restart the timer
($proc_fh, $pid); # return pipe file handle to the subprocess and its PID
}
# read results from a subprocess over a pipe, returns a ref to a results string
# and a subprocess exit status; close the pipe and dismiss the subprocess,
# by force if necessary; if $success_list_ref is defined, check also the
# subprocess exit status against the provided list and log results
#
sub collect_results($$;$$$) {
my($proc_fh,$pid, $what,$results_max_size,$success_list_ref) = @_;
# $results_max_size is interpreted as follows:
# undef .. no limit, read and return all data;
# 0 ... no limit, read and discard all data, returns ref to empty string
# >= 1 ... read all data, but truncate results string at limit
my $child_stat; my $close_err = 0; my $pid_orig = $pid;
my $result = ''; my $result_l = 0; my $skipping = 0; my $eval_stat;
eval { # read results; could be aborted by a read error or a timeout
my($nbytes,$buff);
while (($nbytes=$proc_fh->read($buff,16384)) > 0) {
if (!defined($results_max_size)) { $result .= $buff } # keep all data
elsif ($results_max_size == 0 || $skipping) {} # discard data
elsif ($result_l < $results_max_size) { $result .= $buff }
else {
$skipping = 1; # sanity limit exceeded
do_log(-1,'collect_results from [%s] (%s): results size limit '.
'(%d bytes) exceeded', $pid_orig,$what,$results_max_size);
}
$result_l += $nbytes;
}
defined $nbytes or die "Error reading from a subprocess [$pid_orig]: $!";
ll(5) && do_log(5,'collect_results from [%s] (%s), %d bytes, (limit %s)',
$pid_orig,$what,$result_l,$results_max_size);
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
if (defined($results_max_size) && $results_max_size > 0 &&
length($result) > $results_max_size) {
substr($result, $results_max_size) = '...';
}
if (defined $eval_stat) { # read error or timeout; abort the subprocess
chomp $eval_stat;
undef $_[0]; # release the caller's copy of $proc_fh
kill_proc($pid,$what,1,$proc_fh, "on reading: $eval_stat") if defined $pid;
undef $proc_fh; undef $pid;
die "collect_results - reading aborted: $eval_stat";
}
# normal subprocess exit, close pipe, collect exit status
$eval_stat = undef;
eval {
$proc_fh->close or $close_err = $!;
$child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
undef $_[0]; # release also the caller's copy of $proc_fh
1;
} or do { # just in case a close itself timed out
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
undef $_[0]; # release the caller's copy of $proc_fh
kill_proc($pid,$what,1,$proc_fh, "on closing: $eval_stat") if defined $pid;
undef $proc_fh; undef $pid;
die "collect_results - closing aborted: $eval_stat";
};
reposition_captured_log_to_end();
if (defined $success_list_ref) {
proc_status_ok($child_stat,$close_err, @$success_list_ref)
or do_log(-2, 'collect_results from [%s] (%s): %s %s', $pid_orig, $what,
exit_status_str($child_stat,$close_err), $result);
} elsif ($close_err != 0) {
die "Can't close pipe to subprocess [$pid_orig]: $close_err";
}
(\$result,$child_stat);
}
# read results from a subprocess over a pipe as a frozen data structure;
# close the pipe and dismiss the subprocess; returns results as a ref to a list
#
sub collect_results_structured($$;$$) {
my($proc_fh,$pid, $what,$results_max_size) = @_;
my($result_ref,$child_stat) =
collect_results($proc_fh,$pid, $what,$results_max_size,[0]);
my(@result);
$result_ref = Amavis::Util::thaw($$result_ref);
@result = @$result_ref if $result_ref;
@result
or die "collect_results_structured: no results from subprocess [$pid]";
my $status = shift(@result);
$status =~ /^STATUS: (?:SUCCESS|FAILURE)\b/
or die "collect_results_structured: subprocess [$pid] returned: $status";
(\@result,$child_stat);
}
1;
#
package Amavis::rfc2821_2822_Tools;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(
&rfc2822_timestamp &rfc2822_utc_timestamp
&iso8601_timestamp &iso8601_utc_timestamp
&iso8601_week &iso8601_yearweek &iso8601_year_and_week &iso8601_weekday
&make_received_header_field &parse_received
&fish_out_ip_from_received &parse_message_id
&split_address &split_localpart &replace_addr_fields
&clear_query_keys_cache &make_query_keys
"e_rfc2821_local &qquote_rfc2821_local
&parse_quoted_rfc2821 &unquote_rfc2821_local &parse_address_list
&wrap_string &wrap_smtp_resp &one_response_for_all
&EX_OK &EX_NOUSER &EX_UNAVAILABLE &EX_TEMPFAIL &EX_NOPERM);
import Amavis::Conf qw(:platform c cr ca $myproduct_name);
import Amavis::Util qw(ll do_log unique_ref unique_list
safe_encode_utf8_inplace
idn_to_ascii idn_to_utf8 mail_addr_idn_to_ascii);
}
use subs @EXPORT;
use POSIX qw(locale_h strftime);
BEGIN {
# try to use the installed version
eval { require 'sysexits.ph' } or 1; # ignore failure, make perlcritic happy
# define the most important constants if undefined
do { sub EX_OK() {0} } unless defined(&EX_OK);
do { sub EX_NOUSER() {67} } unless defined(&EX_NOUSER);
do { sub EX_UNAVAILABLE() {69} } unless defined(&EX_UNAVAILABLE);
do { sub EX_TEMPFAIL() {75} } unless defined(&EX_TEMPFAIL);
do { sub EX_NOPERM() {77} } unless defined(&EX_NOPERM);
}
# Given a Unix time, return the local time zone offset at that time
# as a string +HHMM or -HHMM, appropriate for the RFC 5322 date format.
# Works also for non-full-hour zone offsets, and on systems where strftime
# cannot return TZ offset as a number; (c) Mark Martinec, GPL
#
sub get_zone_offset($) {
my $t = int($_[0]);
my $d = 0; # local zone offset in seconds
for (1..3) { # match the date (with a safety loop limit just in case)
my $r = sprintf("%04d%02d%02d", (localtime($t))[5, 4, 3]) cmp
sprintf("%04d%02d%02d", (gmtime($t + $d))[5, 4, 3]);
if ($r == 0) { last } else { $d += $r * 24 * 3600 }
}
my($sl,$su) = (0,0);
for ((localtime($t))[2,1,0]) { $sl = $sl * 60 + $_ }
for ((gmtime($t + $d))[2,1,0]) { $su = $su * 60 + $_ }
$d += $sl - $su; # add HMS difference (in seconds)
my $sign = $d >= 0 ? '+' : '-';
$d = -$d if $d < 0;
$d = int(($d + 30) / 60.0); # give minutes, rounded
sprintf("%s%02d%02d", $sign, int($d / 60), $d % 60);
}
# Given a Unix time, provide date-time timestamp as specified in RFC 5322
# (local time), to be used in header fields such as 'Date:' and 'Received:'
# See also RFC 3339.
#
sub rfc2822_timestamp($) {
my $t = $_[0];
my(@lt) = localtime(int($t));
# can't use %z because some systems do not support it (is treated as %Z)
# my $old_locale = POSIX::setlocale(LC_TIME,'C'); # English dates required!
my $zone_name = strftime("%Z",@lt);
my $s = strftime("%a, %e %b %Y %H:%M:%S ", @lt);
$s .= get_zone_offset($t);
$s .= " (" . $zone_name . ")" if $zone_name !~ /^\s*\z/;
# POSIX::setlocale(LC_TIME, $old_locale); # restore the locale
$s;
}
# Given a Unix time, provide date-time timestamp as specified in RFC 5322
# in a UTC time zone. See also RFC 3339 and RFC 6692.
#
sub rfc2822_utc_timestamp($) {
my $t = $_[0];
strftime("%a, %e %b %Y %H:%M:%S +0000 (UTC)", gmtime(int($t)));
}
# Given a Unix numeric time (seconds since 1970-01-01T00:00Z),
# provide date-time timestamp (local time) as specified in ISO 8601 (EN 28601)
# RFC 3339 is a subset of ISO 8601 and requires field separators "-" and ":".
#
sub iso8601_timestamp($;$$$) {
my($t, $suppress_zone, $dtseparator, $with_field_separators) = @_;
# can't use %z because some systems do not support it (is treated as %Z)
my $fmt = $with_field_separators ? "%Y-%m-%dT%H:%M:%S" : "%Y%m%dT%H%M%S";
$fmt =~ s/T/$dtseparator/ if defined $dtseparator;
my $s = strftime($fmt,localtime(int($t)));
$s .= get_zone_offset($t) unless $suppress_zone;
$s;
}
# Given a Unix numeric time (seconds since 1970-01-01T00:00Z),
# provide date-time timestamp (UTC) as specified in ISO 8601 (EN 28601)
#
sub iso8601_utc_timestamp($;$$$$) {
my($t, $suppress_zone, $dtseparator,
$with_field_separators, $with_fraction) = @_;
my $fmt = $with_field_separators ? "%Y-%m-%dT%H:%M:%S" : "%Y%m%dT%H%M%S";
$fmt =~ s/T/$dtseparator/ if defined $dtseparator;
my $s = strftime($fmt, gmtime(int($t)));
$s .= sprintf(".%03d", int(1000*($t-int($t))+0.5)) if $with_fraction;
$s .= 'Z' unless $suppress_zone;
$s;
}
# Does the given year have 53 weeks? Using a formula by Simon Cassidy.
#
sub iso8601_year_is_long($) {
my $y = $_[0];
my $p = $y + int($y/4) - int($y/100) + int($y/400);
if (($p % 7) == 4) { return 1 }
$y--; $p = $y + int($y/4) - int($y/100) + int($y/400);
if (($p % 7) == 3) { return 1 } else { return 0 }
}
# Given a Unix numeric time (seconds since 1970-01-01T00:00Z),
# provide a week number 1..53 (local time) as specified in ISO 8601 (EN 28601)
# ( equivalent to PostgreSQL extract(week from ...), and MySQL week(date,3) )
#
sub iso8601_year_and_week($) {
my $unix_time = $_[0];
my($y,$dowm0,$doy0) = (localtime($unix_time))[5,6,7];
$y += 1900; $dowm0--; $dowm0=6 if $dowm0<0; # normalize, Monday==0
my $dow0101 = ($dowm0 - $doy0 + 53*7) % 7; # dow Jan 1
my $wn = int(($doy0 + $dow0101) / 7);
if ($dow0101 < 4) { $wn++ }
if ($wn == 0) { $y--; $wn = iso8601_year_is_long($y) ? 53 : 52 }
elsif ($wn == 53 && !iso8601_year_is_long($y)) { $y++; $wn = 1 }
($y,$wn);
}
sub iso8601_week($) { # 1..53
my($y,$wn) = iso8601_year_and_week($_[0]); $wn;
}
sub iso8601_yearweek($) {
my($y,$wn) = iso8601_year_and_week($_[0]); $y*100+$wn;
}
# Given a Unix numeric time (seconds since 1970-01-01T00:00Z), provide a
# weekday number (based on local time): a number from 1 through 7, beginning
# with Monday and ending with Sunday, as specified in ISO 8601 (EN 28601)
#
sub iso8601_weekday($) { # 1..7, Mo=1
my $unix_time = $_[0]; ((localtime($unix_time))[6] + 6) % 7 + 1;
}
sub make_received_header_field($$) {
my($msginfo, $folded) = @_;
my $conn = $msginfo->conn_obj;
my $id = $msginfo->mail_id;
my($smtp_proto, $recips) = ($conn->appl_proto, $msginfo->recips);
my($client_ip, $socket_ip) = ($conn->client_ip, $conn->socket_ip);
for ($client_ip, $socket_ip) {
$_ = '' if !defined($_);
# RFC 5321 (ex RFC 2821), section 4.1.3
$_ = 'IPv6:'.$_ if /:[0-9a-f]*:/i && !/^IPv6:/is;
}
my $myhost = c('myhostname'); # my FQDN (DNS) name, UTF-8 octets
my $myhelo = c('localhost_name'); # my EHLO/HELO/LHLO name, UTF-8 octets
$myhelo = 'localhost' if $myhelo eq '';
if ($msginfo->smtputf8) {
$myhost = idn_to_utf8($myhost); $myhelo = idn_to_utf8($myhelo);
} else {
$myhost = idn_to_ascii($myhost); $myhelo = idn_to_ascii($myhelo);
}
my $tls = $msginfo->tls_cipher;
my $s = sprintf("from %s%s%s\n by %s%s (%s, %s)",
$conn->smtp_helo eq '' ? 'unknown' : $conn->smtp_helo,
$client_ip eq '' ? '' : " ([$client_ip])",
!defined $tls ? '' : " (using TLS with cipher $tls)",
$myhelo,
$socket_ip eq '' ? '' : sprintf(" (%s [%s])", $myhost, $socket_ip),
$myproduct_name,
$conn->socket_port eq '' ? 'unix socket' : "port ".$conn->socket_port);
# RFC 3848, RFC 6531
# http://www.iana.org/assignments/mail-parameters/mail-parameters.xhtml
$s .= "\n with $smtp_proto"
if $smtp_proto =~ /^ (?: SMTP | (?: ES|L|UTF8S|UTF8L) MTP S? A? ) \z/xsi;
$s .= "\n id $id" if defined $id && $id ne '';
if (@$recips == 1) { # do not disclose recipients if more than one
my $recip = $recips->[0];
$recip = mail_addr_idn_to_ascii($recip) if !$msginfo->smtputf8;
$s .= "\n for " . qquote_rfc2821_local($recip);
}
$s .= ";\n " . rfc2822_timestamp($msginfo->rx_time);
$s =~ s/\n//g if !$folded;
$s;
}
# parse Received header field according to RFC 5321, somewhat loosened syntax
# Stamp = From-domain By-domain [Via] [With] [ID] [For] datetime
# From-domain = "FROM" FWS Extended-Domain CFWS
# By-domain = "BY" FWS Extended-Domain CFWS
# Via = "VIA" FWS ("TCP" / Atom) CFWS
# With = "WITH" FWS ("ESMTP" / "SMTP" / Atom) CFWS
# ID = "ID" FWS (Atom / DQUOTE *qcontent DQUOTE / msg-id) CFWS
# For = "FOR" FWS 1*( Path / Mailbox ) CFWS
# Path = "<" [ A-d-l ":" ] Mailbox ">"
# datetime = ";" FWS [ day-of-week "," ] date FWS time [CFWS]
# Extended-Domain =
# (Domain / Address-literal) [ FWS "(" [ Domain FWS ] Address-literal ")" ]
# Avoid regexps like ( \\. | [^"\\] )* which cause recursion trouble / crashes!
#
sub parse_received($) {
local($_) = $_[0]; my(%fld);
local($1); tr/\n//d; # unfold, chomp
my $comm_lvl = 0; my $in_option = '';
my $in_ext_dom = 0; my $in_tcp_info = 0;
my $in_qcontent = 0; my $in_literal = 0; my $in_angle = 0;
my $str_l = length($_); my $new_pos;
for (my $pos=-1; $new_pos=pos($_), $new_pos<$str_l; $pos=$new_pos) {
$new_pos > $pos or die "parse_received PANIC1 $new_pos"; # just in case
# comment (may be nested: RFC 5322 section 3.2.2)
if ($comm_lvl > 0 && /\G( \) )/gcsx) {
if ($comm_lvl > 1 || $in_tcp_info) { $fld{$in_option} .= $1 } # nested
if ($comm_lvl == 1 && !$in_tcp_info) { $in_option =~ s/-com\z// }
$comm_lvl--; next; # pop up one level of comments
}
if ($in_tcp_info && /\G( \) )/gcsx) # leaving TCP-info
{ $in_option =~ s/-tcp\z//; $in_tcp_info = 0; $in_ext_dom = 4; next }
if (!$in_qcontent && !$in_literal && !$comm_lvl &&
!$in_tcp_info && $in_ext_dom==1 && /\G( \( )/gcsx) {
# entering TCP-info part, only once after 'from' or 'by'
$in_option .= '-tcp'; $in_tcp_info = 1; $in_ext_dom = 2; next;
}
if (!$in_qcontent && !$in_literal && /\G( \( )/gcsx) {
$comm_lvl++; # push one level of comments
if ($comm_lvl > 1 || $in_tcp_info) { $fld{$in_option} .= $1 } # nested
if ($comm_lvl == 1 && !$in_tcp_info) { # comment starts here
$in_option .= '-com';
$fld{$in_option} .= ' ' if defined $fld{$in_option}; # looks better
}
next;
}
if ($comm_lvl > 0 && /\G( \\. )/gcsx) { $fld{$in_option} .= $1; next }
if ($comm_lvl > 0 && /\G( [^()\\]+ )/gcsx) { $fld{$in_option} .= $1; next }
# quoted content
if ($in_qcontent && /\G( " )/gcsx) # normal exit from qcontent
{ $in_qcontent = 0; $fld{$in_option} .= $1; next }
if ($in_qcontent && /\G( > )/gcsx) # bail out of qcontent
{ $in_qcontent = 0; $in_angle = 0; $fld{$in_option} .= $1; next }
if ($in_qcontent && /\G( \\. )/gcsx) { $fld{$in_option} .= $1; next }
if ($in_qcontent && /\G( [^"\\>]+ )/gcsx) { $fld{$in_option} .= $1; next }
# address literal
if ($in_literal && /\G( \] )/gcsx)
{ $in_literal = 0; $fld{$in_option} .= $1; next }
if ($in_literal && /\G( > )/gcsx) # bail out of address literal
{ $in_literal = 0; $in_angle = 0; $fld{$in_option} .= $1; next }
if (!$comm_lvl && !$in_qcontent && /\G( \[ )/gcsx)
{ $in_literal = 1; $fld{$in_option} .= $1; next }
if ($in_literal && /\G( \\. )/gcsx) { $fld{$in_option} .= $1; next }
if ($in_literal && /\G( [^\]\\>]+ )/gcsx) { $fld{$in_option} .= $1; next }
if (!$comm_lvl && !$in_qcontent && !$in_literal && !$in_tcp_info) { # top
if (!$in_angle && /\G( < )/gcsx)
{ $in_angle = 1; $fld{$in_option} .= $1; next }
if ( $in_angle && /\G( > )/gcsx)
{ $in_angle = 0; $fld{$in_option} .= $1; next }
if (!$in_angle && /\G (from|by) (?:[ \t]+|\z|(?=[\[\(",;<]))/gcsxi)
{ $in_option = lc($1); $in_ext_dom = 1; next }
if (!$in_angle && /\G(via|with|id|for)(?:[ \t]+|\z|(?=[\[\(",;<]))/gcsxi)
{ $in_option = lc($1); $in_ext_dom = 0; next }
if (!$in_angle && /\G( ; )/gcsxi)
{ $in_option = lc($1); $in_ext_dom = 0; next }
if (/\G( [ \t]+ )/gcsx) { $fld{$in_option} .= $1; next }
if (/\G( [^ \t,:;\@<>()"\[\]\\]+ )/gcsx) { $fld{$in_option} .= $1; next }
}
if (/\G( . )/gcsx) { $fld{$in_option} .= $1; next } # other junk
die "parse_received PANIC2 $new_pos"; # just in case
}
for my $f ('from-tcp','by-tcp') {
# a tricky part is handling the syntax:
# (Domain/Addr-literal) [ FWS "(" [ Domain FWS ] Addr-literal ")" ] CFWS
# where absence of Address-literal in TCP-info means that what looked
# like a domain in the optional TCP-info, is actually a comment in CFWS
local($_) = $fld{$f};
if (!defined($_)) {}
elsif (/\[ \d{1,3} (?: \. \d{1,3} ){3} \] /x) {}
elsif (/\[ .* : .* : /x && # triage, contains at least two colons
/\[ (?: IPv6: )? [0-9a-f]{0,4}
(?: : [0-9a-f]{0,4} | \. [0-9]{1,3} ){2,9}
(?: % [A-Z0-9_-]+ )?
\] /xi) {}
# elsif (/ (?: ^ | \D ) ( \d{1,3} (?: \. \d{1,3}){3}) (?! [0-9.] ) /x) {}
elsif (/^(?: localhost |
(?: [\x{80}-\x{F4}a-zA-Z0-9_\/+-]{1,63} \. )+
[\x{80}-\x{F4}a-zA-Z0-9-]{2,} ) \b/xs) {}
else {
my $fc = $f; $fc =~ s/-tcp\z/-com/;
$fld{$fc} = '' if !defined $fld{$fc};
$fld{$fc} = $_ . (/[ \t]\z/||$fld{$fc}=~/^[ \t]/?'':' ') . $fld{$fc};
delete $fld{$f};
}
}
for (values %fld) { s/[ \t]+\z//; s/^[ \t]+// }
delete $fld{""} if exists $fld{""} && $fld{""} eq "";
# for my $f (sort {$fld{$a} cmp $fld{$b}} keys %fld)
# { do_log(5, "RECVD: %-8s -> /%s/", $f,$fld{$f}) }
\%fld;
}
sub fish_out_ip_from_received($;$) {
my($received,$fields_ref) = @_;
$fields_ref = parse_received($received) if !defined $fields_ref;
my $ip; local($1);
for (@$fields_ref{qw(from-tcp from from-com)}) {
next if !defined($_);
if (/ \[ (\d{1,3} (?: \. \d{1,3}){3}) (?: \. \d{4,5} )? \] /xs) {
$ip = $1;
} elsif (/:.*:/) { # triage - IPv6 address contain at least two colons
if (tr/././ == 3) { # triage - alternative form contains three dots
$ip = $1 if / \[ ( (?: IPv6: )?
[0-9a-f]{0,4} (?: : [0-9a-f]{0,4} ){1,5}
: \d{1,3} (?: \. \d{1,3} ){3}
(?: % [A-Z0-9_-]+ )?
) \] /xsi;
} else {
$ip = $1 if / \[ ( (?: IPv6: )?
[0-9a-f]{0,4} (?: : [0-9a-f]{0,4} ){2,7}
(?: % [A-Z0-9_-]+ )?
) \] /xsi;
}
} elsif (/ (?: ^ | \D ) ( \d{1,3} (?: \. \d{1,3}){3}) (?! [0-9.] ) /xs) {
$ip = $1;
}
last if defined $ip;
}
if (!defined $ip) {
do_log(5, "ip_from_received: no IP address in: %s", $received);
# must return undef even in a list context!
} else {
do_log(5, "ip_from_received: %s", $ip);
$ip =~ s/^IPv6://i; # discard 'IPv6:' prefix if any
}
$ip;
}
# Splits unquoted fully qualified e-mail address, or an address
# with a missing domain part. Returns a pair: (localpart, domain).
# The domain part (if nonempty) includes the '@' as the first character.
# If the syntax is badly broken, everything ends up as a localpart.
# The domain part can be an address literal, as specified by RFC 5322.
# Does not handle explicit route paths, use parse_quoted_rfc2821 for that.
#
sub split_address($) {
my $mailbox = $_[0]; local($1,$2);
$mailbox =~ /^ (.*?) ( \@ (?: \[ (?: \\. | [^\]\\] ){0,999} (?: \] | \z)
| [^\[\@] )*
) \z/xs ? ($1, $2) : ($mailbox, '');
}
# split_localpart() splits localpart of an e-mail address at the first
# occurrence of the address extension delimiter character. (based on
# equivalent routine in Postfix)
#
# Reserved addresses are not split: postmaster, mailer-daemon,
# double-bounce. Addresses that begin with owner-, or addresses
# that end in -request are not split when the owner_request_special
# parameter is set.
#
sub split_localpart($$) {
my($localpart, $delimiter) = @_;
my $owner_request_special = 1; # configurable ???
my $extension; local($1,$2);
if ($localpart =~ /^(postmaster|mailer-daemon|double-bounce)\z/i) {
# do not split these, regardless of what the delimiter is
} elsif (index($delimiter,'-') >= 0 && $owner_request_special &&
$localpart =~ /^owner-.|.-request\z/si) {
# don't split owner-foo or foo-request
} elsif ($localpart =~ /^(.+?)([\Q$delimiter\E].*)\z/s) {
($localpart, $extension) = ($1, $2); # extension includes a delimiter
# do not split the address if the result would have a null localpart
}
($localpart, $extension);
}
# replace localpart/extension/domain fields of an original email address
# with nonempty fields of a replacement
#
sub replace_addr_fields($$;$) {
my($orig_addr, $repl_addr, $delim) = @_;
my($localpart_o, $domain_o, $ext_o, $localpart_r, $domain_r, $ext_r);
($localpart_o,$domain_o) = split_address($orig_addr);
($localpart_r,$domain_r) = split_address($repl_addr);
$localpart_r = $localpart_o if $localpart_r eq '';
$domain_r = $domain_o if $domain_r eq '';
if (defined $delim && $delim ne '') {
($localpart_o,$ext_o) = split_localpart($localpart_o,$delim);
($localpart_r,$ext_r) = split_localpart($localpart_r,$delim);
$ext_r = $ext_o if !defined $ext_r;
}
$localpart_r . (defined $ext_r ? $ext_r : '') . $domain_r;
}
# given a (potentially multiline) header field Message-ID, Resent-Message-ID.
# In-Reply-To, or References, parse the RFC 5322 (RFC 2822) syntax extracting
# all message IDs while ignoring comments, and return them as a list
# Note: currently does not handle nested comments.
# See also: RFC 2392 - Content-ID and Message-ID Uniform Resource Locators
#
sub parse_message_id($) {
my $str = $_[0];
$str =~ tr/\n//d; my(@message_id); my $garbage = 0;
$str =~ s/[ \t]+/ /g; # compress whitespace as a band aid for regexp trouble
for my $t ( $str =~ /\G ( [ \t]+ | \( (?: \\. | [^()\\] ){0,999} \) |
< (?: " (?: \\. | [^"\\>] ){0,999} " |
\[ (?: \\. | [^\]\\>]){0,999} \] |
[^"<>\[\]\\]+ )* > |
[^<( \t]+ | . )/xgs ) {
if ($t =~ /^<.*>\z/) { push(@message_id,$t) }
elsif ($t =~ /^[ \t]*\z/) {} # ignore FWS
elsif ($t =~ /^\(.*\)\z/) # ignore CFWS
{ do_log(2, "parse_message_id ignored comment: /%s/ in %s", $t,$str) }
else { $garbage = 1 }
}
if (@message_id > 1) {
@message_id = unique_list(\@message_id); # remove possible duplicates
} elsif ($garbage && !@message_id) {
local($_) = $str; s/^[ \t]+//; s/[ \t\n]+\z//; # trim and sanitize <...>
s/^<//; s/>\z//; s/>/_/g; $_ = '<'.$_.'>'; @message_id = ($_);
do_log(5, "parse_message_id sanitizing garbage: /%s/ to %s", $str,$_);
}
@message_id;
}
# For a given email address (e.g. for User+Foo@sub.exAMPLE.CoM)
# prepare and return a list of lookup keys in the following order:
# User+Foo@sub.exAMPLE.COM (as-is, no lowercasing, no ToASCII)
# user+foo@sub.example.com
# user@sub.example.com (only if $recipient_delimiter nonempty)
# user+foo(@) (only if $include_bare_user)
# user(@) (only if $include_bare_user and $recipient_delimiter nonempty)
# (@)sub.example.com
# (@).sub.example.com
# (@).example.com
# (@).com
# (@).
# Another example with EAI and international domain names (IDN):
# Pingüino@Pájaro.Niño.exAMPLE.COM (as-is, no lowercasing, no ToASCII)
# pingüino@xn--pjaro-xqa.xn--nio-8ma.example.com
# pingüino(@) (only if $include_bare_user)
# (@)xn--pjaro-xqa.xn--nio-8ma.example.com
# (@).xn--pjaro-xqa.xn--nio-8ma.example.com
# (@).xn--pjaro-xqa.example.com
# (@).example.com
# (@).com
# (@).
#
# Note about (@): if $at_with_user is true the user-only keys (without domain)
# get an '@' character appended (e.g. 'user+foo@'). Usual for lookup_hash.
# If $at_with_user is false the domain-only (without localpart) keys
# get a '@' prepended (e.g. '@.example.com'). Usual for SQL and LDAP lookups.
#
# The domain part is lowercased and IDN converted to ASCII in all but
# the first item in the resulting list; the localpart is lowercased
# iff $localpart_is_case_sensitive is true. The $addr may be a string
# of octets (assumed to be UTF-8 encoded), or a string of characters.
#
my %query_keys_cache;
sub clear_query_keys_cache() { %query_keys_cache = () }
sub make_query_keys($$$;$) {
my($addr, $at_with_user, $include_bare_user, $append_string) = @_;
safe_encode_utf8_inplace($addr); # to octets (if not already)
my $query_keys_slot = join("\x00",
$at_with_user?1:0, $include_bare_user?1:0,
$append_string, $addr);
if (exists $query_keys_cache{$query_keys_slot}) {
do_log(5,'query_keys: cached '.$addr); # concat, knowing it's in octets
return @{$query_keys_cache{$query_keys_slot}}; # ($keys_ref, $rhs)
}
my($localpart, $domain) = split_address($addr);
my $saved_full_localpart = $localpart;
$localpart = lc($localpart) if !c('localpart_is_case_sensitive');
# chop off leading @, and trailing dots
local($1);
$domain = $1 if $domain =~ /^\@?(.*?)\.*\z/s;
$domain = idn_to_ascii($domain) if $domain ne ''; # lowercase, ToASCII
my $extension; my $delim = c('recipient_delimiter');
if ($delim ne '') {
($localpart,$extension) = split_localpart($localpart,$delim);
# extension includes a delimiter since amavisd-new-2.5.0!
}
$extension = '' if !defined $extension; # mute warnings
my($append_to_user,$prepend_to_domain) = $at_with_user ? ('@','') : ('','@');
my(@keys); # a list of query keys
push(@keys, $addr); # as is
push(@keys, $localpart.$extension.'@'.$domain)
if $extension ne ''; # user+foo@example.com
push(@keys, $localpart.'@'.$domain); # user@example.com
if ($include_bare_user) { # typically enabled for local users only
push(@keys, $localpart.$extension.$append_to_user)
if $extension ne ''; # user+foo(@)
push(@keys, $localpart.$append_to_user); # user(@)
}
push(@keys, $prepend_to_domain.$domain); # (@)sub.example.com
if ($domain =~ /\[/) { # don't split address literals
push(@keys, $prepend_to_domain.'.'); # (@).
} else {
my(@dkeys); my $d = $domain;
for (;;) { # (@).sub.example.com (@).example.com (@).com (@).
push(@dkeys, $prepend_to_domain.'.'.$d);
last if $d eq '';
$d = ($d =~ /^([^.]*)\.(.*)\z/s) ? $2 : '';
}
@dkeys = @dkeys[$#dkeys-19 .. $#dkeys] if @dkeys > 20; # sanity limit
push(@keys, @dkeys);
}
if (defined $append_string && $append_string ne '') {
$_ .= $append_string for @keys;
}
my $keys_ref = unique_ref(\@keys); # remove duplicates
ll(5) && do_log(5,"query_keys: %s", join(', ',@$keys_ref));
# the rhs replacement strings are similar to what would be obtained
# by lookup_re() given the following regular expression:
# /^( ( ( [^\@]*? ) ( \Q$delim\E [^\@]* )? ) (?: \@ (.*) ) )$/xs
my $rhs = [ # a list of right-hand side replacement strings
$addr, # $1 = User+Foo@Sub.Example.COM
$saved_full_localpart, # $2 = User+Foo
$localpart, # $3 = user (lc if localpart_is_case_sensitive)
$extension, # $4 = +foo (lc if localpart_is_case_sensitive)
$domain, # $5 = sub.example.com (lowercase, ToASCII)
];
$query_keys_cache{$query_keys_slot} = [$keys_ref, $rhs];
($keys_ref, $rhs);
}
# quote_rfc2821_local() quotes the local part of a mailbox address
# (given in internal (unquoted) form), and returns external (quoted)
# mailbox address, as per RFC 5321 (ex RFC 2821).
#
# internal (unquoted) form is used internally by amavisd-new and other mail sw,
# external (quoted) form is used in SMTP commands and in message header section
#
# To re-insert message back via SMTP, the local-part of the address needs
# to be quoted again if it contains reserved characters or otherwise
# does not obey the dot-atom syntax, as specified in RFC 5321 and RFC 6531.
#
sub quote_rfc2821_local($) {
my $mailbox = $_[0];
# RFC 5321/RFC 5322: atext: any character except controls, SP, and specials
# RFC 6531 section 3.3: The definition of <atext> is extended to permit
# both the RFC 5321 definition and a UTF-8 string. That string MUST NOT
# contain any of the ASCII graphics or control characters.
# RFC 6531: atext =/ UTF8-non-ascii
# qtextSMTP =/ UTF8-non-ascii
# RFC 6532: UTF8-non-ascii = UTF8-2 / UTF8-3 / UTF8-4
# RFC 3629 section 4: Syntax of UTF-8 Byte Sequences
# non-atext: [\x00-\x20"(),.:;<>@\[\]\\\x7F]
my $atext = "a-zA-Z0-9!\#\$%&'*/=?^_`{|}~+-";
# my $specials = '()<>\[\]\\\\@:;,."';
# HTML5 - 4.10.5.1.5 E-mail state (type=email):
# email = 1*( atext / "." ) "@" label *( "." label )
# i.e. localpart is: [a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+
my($localpart,$domain) = split_address($mailbox);
if ($localpart =~ /^[$atext]+(?:\.[$atext]+)*\z/so) {
# plain RFC 5321 dot-atom, no need for quoting
} elsif ($localpart =~ /[\x80-\xBF\xC2-\xF4]/s && # triage, RFC 3629
$localpart =~ /^ ( [$atext] |
[\xC2-\xDF][\x80-\xBF]{1} |
[\xE0-\xEF][\x80-\xBF]{2} |
[\xF0-\xF4][\x80-\xBF]{3}
)+
( \. ( [$atext] |
[\xC2-\xDF][\x80-\xBF]{1} |
[\xE0-\xEF][\x80-\xBF]{2} |
[\xF0-\xF4][\x80-\xBF]{3}
)+
)* \z/xso) {
# Extended RFC 6531 UTF-8 atext / dot-atom, no need for quoting.
# The \xC0 and \xC1 could only be used for overlong encoding of basic
# ASCII characters. Tolerate other non-shortest UTF-8 encodings here.
# UTF-8 is restricted by RFC 3629 to end at U+10FFFF, this removed
# all 5- and 6-byte sequences, and about half of the 4-byte sequences.
# The RFC 5198 also prohibits "C1 Controls" (U+0080 through U+009F)
# (i.e. in UTF-8: C2 80 .. C2 9F) for Net-Unicode.
} else { # needs quoting or is invalid
local($1); # qcontent = qtext / quoted-pair
$localpart =~ s{ ( ["\\] ) }{\\$1}xgs;
$localpart = '"'.$localpart.'"'; # non-qtext, make it a qcontent
# Postfix hates ""@domain but is not so harsh on @domain
# Late breaking news: don't bother, both forms are rejected by Postfix
# when strict_rfc821_envelopes=yes, and both are accepted otherwise
}
# we used to strip off empty domain (just '@') unconditionally, but this
# leads Postfix to interpret an address with a '@' in the quoted local part
# e.g. <"h@example.net"@> as <hhh@example.net> (subject to Postfix setting
# 'resolve_dequoted_address'), which is not what the sender requested;
# we no longer do that if localpart contains an '@':
$domain = '' if $domain eq '@' && $localpart =~ /\@/;
$localpart . $domain;
}
# wraps the result of quote_rfc2821_local into angle brackets <...> ;
# If given a list, it returns a list (possibly converted to
# comma-separated scalar if invoked in scalar context), quoting each element;
#
sub qquote_rfc2821_local(@) {
my(@r) = map($_ eq '' ? '<>' : ('<'.quote_rfc2821_local($_).'>'), @_);
wantarray ? @r : join(', ', @r);
}
sub parse_quoted_rfc2821($$) {
my($addr,$unquote) = @_;
# the angle-bracket stripping is not really a duty of this subroutine,
# as it should have been already done elsewhere, but we allow it here anyway:
$addr =~ s/^\s*<//s; $addr =~ s/>\s*\z//s; # tolerate unmatched angle brkts
local($1,$2); my($source_route,$localpart,$domain) = ('','','');
# RFC 5321: so-called "source route" MUST BE accepted,
# SHOULD NOT be generated, and SHOULD be ignored.
# Path = "<" [ A-d-l ":" ] Mailbox ">"
# A-d-l = At-domain *( "," A-d-l )
# At-domain = "@" domain
if (index($addr,':') >= 0 && # triage before more testing for source route
$addr=~m{^( [ \t]* \@ (?: [\x{80}-\x{F4}A-Za-z0-9.!\#\$%&*/^{}=_+-]* |
\[ (?: \\. | [^\]\\] ){0,999} \] ) [ \t]*
(?: ,[ \t]* \@ (?: [\x{80}-\x{F4}A-Za-z0-9.!\#\$%&*/^{}=_+-]* |
\[ (?: \\. | [^\]\\] ){0,999} \] ) [ \t]*
)* : [ \t]* ) (.*) \z }xs)
{ # NOTE: we are quite liberal on allowing whitespace around , and : here,
# and liberal in allowed character set and syntax of domain names,
# we mainly avoid stop-characters in the domain names of source route
$source_route = $1; $addr = $2;
}
if ($addr =~ m{^ ( .*? )
( \@ (?: [^\@\[\]]+ | \[ (?: \\. | [^\]\\] ){0,999} \]
| [^\@] )* )
\z}xs) {
($localpart,$domain) = ($1,$2);
} else {
($localpart,$domain) = ($addr,'');
}
$localpart =~ s/ " | \\ (.) | \\ \z /$1/xgs if $unquote; # undo quoted-pairs
($source_route, $localpart, $domain);
}
# unquote_rfc2821_local() strips away the quoting from the local part
# of an external (quoted) mailbox address, and returns internal (unquoted)
# mailbox address, as per RFC 5321 (ex RFC 2821).
# Internal (unquoted) form is used internally by amavisd-new and other mail sw,
# external (quoted) form is used in SMTP commands and in message header section
#
sub unquote_rfc2821_local($) {
my $mailbox = $_[0];
my($source_route,$localpart,$domain) = parse_quoted_rfc2821($mailbox,1);
# make address with '@' in the localpart but no domain (like <"aa@bb.com"> )
# distinguishable from <aa@bb.com> by representing it as aa@bb.com@ in
# unquoted form; (it still obeys all regular rules, it is not a dirty trick)
$domain = '@' if $domain eq '' && $localpart ne '' && $localpart =~ /\@/;
$localpart . $domain;
}
# Parse an rfc2822.address-list, returning a list of RFC 5322 (quoted)
# addresses. Properly deals with group addresses, nested comments, address
# literals, qcontent, addresses with source route, discards display
# names and comments. The following header fields accept address-list:
# To, Cc, Bcc, Reply-To, (and since RFC 6854 also:) From and Sender.
#
# RFC 6854 relaxed the syntax on 'From' and 'Sender', where the group syntax
# is now allowed. Prior to RFC 6854 the 'From' accepted a 'mailbox-list'
# syntax (does not allow groups), and 'Sender' accepted a 'mailbox' syntax,
# i.e. only one address and not a group.
#
use vars qw($s $p @addresses);
sub flush_a() {
$s =~ s/^[ \t]+//s; $s =~ s/[ \t]\z//s; # trim
$p =~ s/^[ \t]+//s; $p =~ s/[ \t]\z//s;
if ($p ne '') { $p =~ s/^<//; $p =~ s/>\z//; push(@addresses,$p) }
elsif ($s ne '') { push(@addresses,$s) }
$p = ''; $s = '';
}
sub parse_address_list($) {
local($_) = $_[0];
local($1); s/\n(?=[ \t])//gs; s/\n+\z//s; # unfold, chomp
my $str_l = length($_); $p = ''; $s = ''; @addresses = ();
my($comm_lvl, $in_qcontent, $in_literal,
$in_group, $in_angle, $after_at) = (0) x 6;
my $new_pos;
for (my $pos=-1; $new_pos=pos($_), $new_pos<$str_l; $pos=$new_pos) {
$new_pos > $pos or die "parse_address_list PANIC1 $new_pos"; # just in case
# comment (may be nested: RFC 5322 section 3.2.2)
if ($comm_lvl > 0 && /\G( \) )/gcsx) { $comm_lvl--; next }
if (!$in_qcontent && !$in_literal && /\G( \( )/gcsx) { $comm_lvl++; next }
if ($comm_lvl > 0 && /\G( \\. )/gcsx) { next }
if ($comm_lvl > 0 && /\G( [^()\\]+ )/gcsx) { next }
# quoted content
if ($in_qcontent && /\G( " )/gcsx) # normal exit from qcontent
{ $in_qcontent = 0; ($in_angle?$p:$s) .= $1; next }
if ($in_qcontent && /\G( > )/gcsx) # bail out of qcontent
{ $in_qcontent = 0; $in_angle = 0; $after_at = 0;
($in_angle?$p:$s) .= $1; next }
if (!$comm_lvl && !$in_qcontent && !$in_literal && /\G( " )/gcsx)
{ $in_qcontent = 1; ($in_angle?$p:$s) .= $1; next }
if ($in_qcontent && /\G( \\. )/gcsx) { ($in_angle?$p:$s) .= $1; next }
if ($in_qcontent && /\G( [^"\\>]+ )/gcsx) { ($in_angle?$p:$s) .= $1; next }
# address literal
if ($in_literal && /\G( \] )/gcsx)
{ $in_literal = 0; ($in_angle?$p:$s) .= $1; next }
if ($in_literal && /\G( > )/gcsx) # bail out of address literal
{ $in_literal = 0; $in_angle = 0; $after_at = 0;
($in_angle?$p:$s) .= $1; next }
if (!$comm_lvl && !$in_qcontent && /\G( \[ )/gcsx)
{ $in_literal = 1 if $after_at; ($in_angle?$p:$s) .= $1; next }
if ($in_literal && /\G( \\. )/gcsx) { ($in_angle?$p:$s) .= $1; next }
if ($in_literal && /\G( [^\]\\>]+ )/gcsx) { ($in_angle?$p:$s) .= $1; next }
# normal content
if (!$comm_lvl && !$in_qcontent && !$in_literal) {
if (!$in_angle && /\G( < )/gcsx)
{ $in_angle = 1; $after_at = 0; flush_a() if $p ne ''; $p .= $1; next }
if ( $in_angle && /\G( > )/gcsx)
{ $in_angle = 0; $after_at = 0; $p .= $1; next }
if (/\G( , )/gcsx) # top-level addr separator or source route delimiter
{ !$in_angle ? flush_a() : ($p.=$1); $after_at = 0; next }
if (!$in_angle && !$in_group && /\G( : )/gcsx) # group name terminator
{ $in_group = 1; $s .= $1; $p=$s=''; next } # discard group name
if ($after_at && /\G( : )/gcsx) # source route terminator
{ $after_at = 0; ($in_angle?$p:$s) .= $1; next }
if ( $in_group && /\G( ; )/gcsx) # group terminator
{ $in_group = 0; $after_at = 0; next }
if (!$in_group && /\G( ; )/gcsx) # out of place special
{ ($in_angle?$p:$s) .= $1; $after_at = 0; next }
if (/\G( \@ )/gcsx) { $after_at = 1; ($in_angle?$p:$s) .= $1; next }
if (/\G( [ \t]+ )/gcsx) { ($in_angle?$p:$s) .= $1; next }
if (/\G( [^,:;\@<>()"\[\]\\]+ )/gcsx) { ($in_angle?$p:$s) .= $1; next }
}
if (/\G( . )/gcsx) { ($in_angle?$p:$s) .= $1; next } # other junk
die "parse_address_list PANIC2 $new_pos"; # just in case
}
flush_a(); @addresses;
}
# compute a total displayed line size if a string (possibly containing TAB
# characters) would be displayed at the given character position (0-based)
#
sub displayed_length($$) {
my($str,$ind) = @_;
for my $t ($str =~ /\G ( \t | [^\t]+ )/xgs)
{ $ind += $t ne "\t" ? length($t) : 8 - $ind % 8 }
$ind;
}
# Wrap a string into a multiline string, inserting \n as appropriate to keep
# each line length at $max_len or shorter (not counting \n). A string $prefix
# is prepended to each line. Continuation lines get their first space or TAB
# character replaced by a string $indent (unless $indent is undefined, which
# keeps the leading whitespace character unchanged). Both the $prefix and
# $indent are included in line size calculation, and for the purpose of line
# size calculations TABs are treated as an appropriate number of spaces.
# Parameter $structured indicates where line breaks are permitted: true
# indicates that line breaks may only occur where a \n character is already
# present in the source line, indicating possible (tentative) line breaks.
# If $structured is false, permitted line breaks are chosen within existing
# whitespace substrings so that all-whitespace lines are never generated
# (even at the expense of producing longer than allowed lines if necessary),
# and that each continuation line starts by at least one whitespace character.
# Whitespace is neither added nor removed, but simply spliced into trailing
# and leading whitespace of subsequent lines. Typically leading whitespace
# is a single character, but may include part of the trailing whitespace of
# the preceding line if it would otherwise be too long. This is appropriate
# and required for wrapping of mail header fields. An exception to preservation
# of whitespace is when $indent string is defined but is an empty string,
# causing leading and trailing whitespace to be trimmed, producing a classical
# plain text wrapping results. Intricate!
#
sub wrap_string($;$$$$) {
my($str,$max_len,$prefix,$indent,$structured) = @_;
$max_len = 78 if !defined $max_len;
$prefix = '' if !defined $prefix;
$structured = 0 if !defined $structured;
my(@chunks);
# split a string into chunks where each chunk starts with exactly one SP or
# TAB character (except possibly the first chunk), followed by an unbreakable
# string (consisting typically entirely of non-whitespace characters, at
# least one character must be non-whitespace), followed by an all-whitespace
# string consisting of only SP or TAB characters.
if ($structured) {
local($1);
# unfold all-whitespace chunks, just in case
1 while $str =~ s/^([ \t]*)\n/$1/; # prefixed?
$str =~ s/\n(?=[ \t]*(\n|\z))//g; # within and at end
$str =~ s/\n(?![ \t])/\n /g; # insert a space at line folds if missing
# unbreakable parts are substrings between newlines, determined by caller
@chunks = split(/\n/,$str,-1);
} else {
$str =~ s/\n(?![ \t])/\n /g; # insert a space at line folds if missing
$str =~ s/\n//g; # unfold (knowing a space at folds is not missing)
# unbreakable parts are non- all-whitespace substrings
@chunks = $str =~ /\G ( (?: ^ .*? | [ \t]) [^ \t]+ [ \t]* )
(?= \z | [ \t] [^ \t] )/xgs;
}
# do_log(5,"wrap_string chunk: <%s>", $_) for @chunks;
my $result = ''; # wrapped multiline string will accumulate here
my $s = ''; # collects partially assembled single line
my $s_displ_ind = # display size of string in $s, including $prefix
displayed_length($prefix,0);
my $contin_line = 0; # are we assembling a continuation line?
while (@chunks) { # walk through input substrings and join shorter sections
my $chunk = shift(@chunks);
# replace leading space char with $indent if starting a continuation line
$chunk =~ s/^[ \t]/$indent/ if defined $indent && $contin_line && $s eq '';
my $s_displ_l = displayed_length($chunk, $s_displ_ind);
if ($s_displ_l <= $max_len # collecting in $s while still fits
|| (@chunks==0 && $s =~ /^[ \t]*\z/)) { # or we are out of options
$s .= $chunk; $s_displ_ind = $s_displ_l; # absorb entire chunk
} else {
local($1,$2);
$chunk =~ /^ ( .* [^ \t] ) ( [ \t]* ) \z/xs # split to head and allwhite
or die "Assert 1 failed in wrap: /$result/, /$chunk/";
my($solid,$white_tail) = ($1,$2);
my $min_displayed_s_len = displayed_length($solid, $s_displ_ind);
if (@chunks > 0 # not being at the last chunk gives a chance to shove
# part of the trailing whitespace off to the next chunk
&& ($min_displayed_s_len <= $max_len # non-whitespace part fits
|| $s =~ /^[ \t]*\z/) ) { # or still allwhite even if too long
$s .= $solid; $s_displ_ind = $min_displayed_s_len; # take nonwhite
if (defined $indent && $indent eq '') {
# discard leading whitespace in continuation lines on a plain wrap
} else {
# preserve all original whitespace
while ($white_tail ne '') {
# stash-in as much trailing whitespace as it fits to the curr. line
my $c = substr($white_tail,0,1); # one whitespace char. at a time
my $dlen = displayed_length($c, $s_displ_ind);
if ($dlen > $max_len) { last }
else {
$s .= $c; $s_displ_ind = $dlen; # absorb next whitespace char.
$white_tail = substr($white_tail,1); # one down, more to go...
}
}
# push remaining trailing whitespace characters back to input
$chunks[0] = $white_tail . $chunks[0] if $white_tail ne '';
}
} elsif ($s =~ /^[ \t]*\z/) {
die "Assert 2 failed in wrap: /$result/, /$chunk/";
} else { # nothing more fits to $s, flush it to $result
if ($contin_line) { $result .= "\n" } else { $contin_line = 1 }
# trim trailing whitespace when wrapping as a plain text (not headers)
$s =~ s/[ \t]+\z// if defined $indent && $indent eq '';
$result .= $prefix.$s; $s = '';
$s_displ_ind = displayed_length($prefix,0);
unshift(@chunks,$chunk); # reprocess the chunk
}
}
}
if ($s !~ /^[ \t]*\z/) { # flush last chunk if nonempty
if ($contin_line) { $result .= "\n" } else { $contin_line = 1 }
$s =~ s/[ \t]+\z// if defined $indent && $indent eq ''; # trim plain text
$result .= $prefix.$s; $s = '';
}
$result;
}
# wrap an SMTP response at each \n char according to RFC 5321 (ex RFC 2821),
# returning resulting lines as a listref
#
sub wrap_smtp_resp($) {
my $resp = $_[0];
# RFC 5321 section 4.5.3.1.5: The maximum total length of a
# reply line including the reply code and the <CRLF> is 512 octets.
# More information may be conveyed through multiple-line replies.
my $max_len = 512-2; my(@result_list); local($1,$2,$3,$4);
if ($resp !~ /^ ([1-5]\d\d) (\ |-|\z)
([245] \. \d{1,3} \. \d{1,3} (?: \ |\z) )?
(.*) \z/xs)
{ die "wrap_smtp_resp: bad SMTP response code: '$resp'" }
my($resp_code,$more,$enhanced,$tail) = ($1,$2,$3,$4);
my $lead_len = length($resp_code) + 1 + length($enhanced);
while (length($tail) > $max_len-$lead_len || $tail =~ /\n/) {
# RFC 2034: When responses are continued across multiple lines
# the same status code must appear at the beginning of the text
# in each line of the response.
my $head = substr($tail, 0, $max_len-$lead_len);
if ($head =~ /^([^\n]*\n)/s) { $head = $1 }
$tail = substr($tail,length($head)); chomp($head);
push(@result_list, $resp_code.'-'.$enhanced.$head);
}
push(@result_list, $resp_code.' '.$enhanced.$tail);
\@result_list;
}
# Prepare a single SMTP response and an exit status as per sysexits.h
# from individual per-recipient response codes, taking into account
# sendmail milter specifics. Returns a triple: (smtp response, exit status,
# an indication whether a non delivery notification (NDN, a form of DSN)
# is needed).
#
sub one_response_for_all($$;$) {
my($msginfo, $dsn_per_recip_capable, $suppressed) = @_;
do_log(5, 'one_response_for_all, per_recip_capable: %s, suppressed: %s',
$dsn_per_recip_capable?'Y':'N', $suppressed?'Y':'N');
my($smtp_resp, $exit_code, $ndn_needed);
my $am_id = $msginfo->log_id;
my $sender = $msginfo->sender;
my $per_recip_data = $msginfo->per_recip_data;
my $any_not_done = scalar(grep(!$_->recip_done, @$per_recip_data));
if (!@$per_recip_data) { # no recipients, nothing to do
$smtp_resp = "250 2.5.0 Ok, id=$am_id"; $exit_code = EX_OK;
do_log(5, "one_response_for_all <%s>: no recipients, '%s'",
$sender, $smtp_resp);
}
if (!defined $smtp_resp) {
for my $r (@$per_recip_data) { # any 4xx code ?
if ($r->recip_smtp_response =~ /^4/) # pick the first 4xx code
{ $smtp_resp = $r->recip_smtp_response; last }
}
}
if (!defined $smtp_resp) {
for my $r (@$per_recip_data) {
my $fwd_m = $r->delivery_method;
if (!defined $fwd_m) {
die "one_response_for_all: delivery_method not defined";
} elsif ($fwd_m ne '' && $any_not_done) {
die "Explicit forwarding, but not all recips done";
}
}
for my $r (@$per_recip_data) { # any invalid code ?
if ($r->recip_done && $r->recip_smtp_response !~ /^[245]/) {
$smtp_resp = '451 4.5.0 Bad SMTP response code??? "'
. $r->recip_smtp_response . '"';
last; # pick the first
}
}
if (defined $smtp_resp) {
$exit_code = EX_TEMPFAIL;
do_log(5, "one_response_for_all <%s>: 4xx found, '%s'",
$sender,$smtp_resp);
}
}
# NOTE: a 2xx SMTP response code is set both by internal Discard
# and by a genuine successful delivery. To distinguish between the two
# we need to check $r->recip_destiny as well.
#
if (!defined $smtp_resp) {
# if destiny for _all_ recipients is D_DISCARD, give Discard
my $notall;
for my $r (@$per_recip_data) {
if ($r->recip_destiny == D_DISCARD) # pick the first DISCARD code
{ $smtp_resp = $r->recip_smtp_response if !defined $smtp_resp }
else { $notall=1; last } # one is not a discard, nogood
}
if ($notall) { $smtp_resp = undef }
if (defined $smtp_resp) {
$exit_code = 99; # helper program will interpret 99 as discard
do_log(5, "one_response_for_all <%s>: all DISCARD, '%s'",
$sender,$smtp_resp);
}
}
if (!defined $smtp_resp) {
# destiny for _all_ recipients is Discard or Reject, give 5xx
# (and there is at least one Reject)
my($notall, $done_level);
my $bounce_cnt = 0;
for my $r (@$per_recip_data) {
my($dest, $resp) = ($r->recip_destiny, $r->recip_smtp_response);
if ($dest == D_DISCARD) {
# ok, this one is a discard, let's see the rest
} elsif ($resp =~ /^5/ && $dest != D_BOUNCE) {
# prefer to report SMTP response code of genuine rejects
# from MTA, over internal rejects by content filters
if (!defined $smtp_resp || $r->recip_done > $done_level)
{ $smtp_resp = $resp; $done_level = $r->recip_done }
} else {
$notall=1; last; # one is a Pass or Bounce, nogood
}
}
if ($notall) { $smtp_resp = undef }
if (defined $smtp_resp) {
$exit_code = EX_UNAVAILABLE;
do_log(5, "one_response_for_all <%s>: REJECTs, '%s'",$sender,$smtp_resp);
}
}
if (!defined $smtp_resp) {
# mixed destiny => 2xx, but generate dsn for bounces and rejects
my($rej_cnt, $bounce_cnt, $drop_cnt) = (0,0,0);
for my $r (@$per_recip_data) {
my($dest, $resp) = ($r->recip_destiny, $r->recip_smtp_response);
if ($resp =~ /^2/ && $dest == D_PASS) # genuine successful delivery
{ $smtp_resp = $resp if !defined $smtp_resp }
$drop_cnt++ if $dest == D_DISCARD;
if ($resp =~ /^5/)
{ if ($dest == D_BOUNCE) { $bounce_cnt++ } else { $rej_cnt++ } }
}
$exit_code = EX_OK;
if (!defined $smtp_resp) { # no genuine Pass/2xx
# declare success, we'll handle bounce
$smtp_resp = "250 2.5.0 Ok, id=$am_id";
if ($any_not_done) { $smtp_resp .= ", continue delivery" }
else { $exit_code = 99 } # helper program DISCARD (e.g. milter)
}
if ($rej_cnt + $bounce_cnt + $drop_cnt > 0) {
$smtp_resp .= ", ";
$smtp_resp .= "but " if $rej_cnt+$bounce_cnt+$drop_cnt<@$per_recip_data;
$smtp_resp .= join ", and ",
map { my($cnt, $nm) = @$_;
!$cnt ? () : $cnt == @$per_recip_data ? $nm : "$cnt $nm"
} ([$rej_cnt, 'REJECT'],
[$bounce_cnt, $suppressed ? 'DISCARD(bounce.suppressed)' :'BOUNCE'],
[$drop_cnt, 'DISCARD']);
}
$ndn_needed =
($bounce_cnt > 0 || ($rej_cnt > 0 && !$dsn_per_recip_capable)) ? 1 : 0;
ll(5) && do_log(5,
"one_response_for_all <%s>: %s, r=%d,b=%d,d=%s, ndn_needed=%s, '%s'",
$sender,
$rej_cnt + $bounce_cnt + $drop_cnt > 0 ? 'mixed' : 'success',
$rej_cnt, $bounce_cnt, $drop_cnt, $ndn_needed, $smtp_resp);
}
($smtp_resp, $exit_code, $ndn_needed);
}
1;
#
package Amavis::Lookup::RE;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(ll do_log fmt_struct);
}
# Make an object out of the supplied lookup list
# to make it distinguishable from simple ACL array
sub new($$) { my $class = shift; bless [@_], $class }
# lookup_re() performs a lookup for an e-mail address or other key string
# against a list of regular expressions.
#
# A full unmodified e-mail address is always used, so splitting to localpart
# and domain or lowercasing is NOT performed. The regexp is powerful enough
# that this can be accomplished by its own mechanisms. The routine is useful
# for other RE tests besides the usual e-mail addresses, such as looking for
# banned file names.
#
# Each element of the list can be a ref to a pair, or directly a regexp
# ('Regexp' object created by a qr operator, or just a (less efficient)
# string containing a regular expression). If it is a pair, the first
# element is treated as a regexp, and the second provides a value in case
# the regexp matches. If not a pair, the implied result of a match is 1.
#
# The regular expression is taken as-is, no implicit anchoring or setting
# case insensitivity is done, so do use a qr'(?i)^user\@example\.com$',
# and not a sloppy qr'user@example.com', which can easily backfire.
# Also, if qr is used with a delimiter other than ' (apostrophe), make sure
# to quote the @ and $ when they are not introducing a variable name.
#
# The pattern allows for capturing of parenthesized substrings, which can
# then be referenced from the result string using the $1, $2, ... notation,
# as with a Perl m// operator. The number after a $ may be a multi-digit
# decimal number. To avoid possible ambiguity a ${n} or $(n) form may be used
# Substring numbering starts with 1. Nonexistent references evaluate to empty
# strings. If any substitution is done, the result inherits the taintedness
# of $addr. Keep in mind that $ and @ characters needs to be backslash-quoted
# in qq() strings. Example:
# $virus_quarantine_to = new_RE(
# [ qr'^(.*)\@example\.com$'i => 'virus-${1}@example.com' ],
# [ qr'^(.*)(\@[^\@]*)?$'i => 'virus-${1}${2}' ] );
#
# Example (equivalent to the example in lookup_acl):
# $acl_re = Amavis::Lookup::RE->new(
# qr'\@me\.ac\.uk$'i, [qr'[\@.]ac\.uk$'i=>0], qr'\.uk$'i );
# ($r,$k) = $acl_re->lookup_re('user@me.ac.uk');
# or $r = lookup(0, 'user@me.ac.uk', $acl_re);
#
# 'user@me.ac.uk' matches me.ac.uk, returns true and search stops
# 'user@you.ac.uk' matches .ac.uk, returns false (because of =>0)
# and search stops
# 'user@them.co.uk' matches .uk, returns true and search stops
# 'user@some.com' does not match anything, falls through and
# returns false (undef)
#
# As a special allowance, the $addr argument may be a ref to a list of search
# keys. At each step in traversing the supplied regexp list, all elements of
# @$addr are tried. If any of them matches, the search stops. This is currently
# used in banned names lookups, where all attributes of a part are given as a
# list @$addr, as a loop on attributes must be an inner loop.
#
sub lookup_re($$;$%) {
my($self, $addr,$get_all,%options) = @_;
local($1,$2,$3,$4); my(@matchingkey,@result);
$addr .= $options{AppendStr} if defined $options{AppendStr};
for my $e (@$self) { # try each regexp in the list
my($key,$r);
if (ref($e) eq 'ARRAY') { # a pair: (regexp,result)
($key,$r) = ($e->[0], @$e < 2 ? 1 : $e->[1]);
} else { # a single regexp (not a pair), implies result 1
($key,$r) = ($e, 1);
}
# braindamaged Perl: empty string implies the last successfully
# matched regular expression; we must avoid this:
$key = qr{(?:)} if !defined $key || $key eq '';
my(@rhs); # match, capturing parenthesized subpatterns into @rhs
if (!ref($addr)) { @rhs = $addr =~ /$key/ }
else { for (@$addr) { @rhs = /$key/; last if @rhs } } # inner loop
if (@rhs) { # regexp matches
# do the righthand side replacements if any $n, ${n} or $(n) is specified
if (defined($r) && !ref($r) && index($r,'$') >= 0) { # triage
my $any = $r =~ s{ \$ ( (\d+) | \{ (\d+) \} | \( (\d+) \) ) }
{ my $j=$2+$3+$4; $j<1 ? '' : $rhs[$j-1] }xgse;
# bring taintedness of input to the result
$r .= substr($addr,0,0) if $any;
}
push(@result,$r); push(@matchingkey,$key);
last if !$get_all;
}
}
if (!ll(5)) {
# don't bother preparing log report which will not be printed
} elsif (!@result) {
do_log(5, "lookup_re(%s), no matches", fmt_struct($addr));
} else { # pretty logging
if (!$get_all) { # first match wins
do_log(5, 'lookup_re(%s) matches key "%s", result=%s',
fmt_struct($addr), $matchingkey[0], fmt_struct($result[0]));
} else { # want all matches
do_log(5, "lookup_re(%s) matches keys: %s", fmt_struct($addr),
join(', ', map { sprintf('"%s"=>%s',
$matchingkey[$_], fmt_struct($result[$_]))
} (0..$#result)));
}
}
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
#
package Amavis::Lookup::IP;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION $have_patricia);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&lookup_ip_acl &ip_to_vec &normalize_ip_addr);
import Amavis::Util qw(ll do_log);
}
use subs @EXPORT_OK;
BEGIN {
eval {
require Net::Patricia;
Net::Patricia->VERSION(1.015); # need AF_INET6 support
import Net::Patricia;
$have_patricia = 1;
} or do {
undef $have_patricia;
};
}
# ip_to_vec() takes an IPv6 or IPv4 address with optional prefix length
# (or an IPv4 mask), parses and validates it, and returns it as a 128-bit
# vector string that can be used as operand to Perl bitwise string operators.
# Syntax and other errors in the argument throw exception (die).
# If the second argument $allow_mask is 0, the prefix length or mask
# specification is not allowed as part of the IP address.
#
# The IPv6 syntax parsing and validation adheres to RFC 4291 (ex RFC 3513).
# All the following IPv6 address forms are supported:
# x:x:x:x:x:x:x:x preferred form
# x:x:x:x:x:x:d.d.d.d alternative form
# ...::... zero-compressed form
# addr/prefix-length prefix length may be specified (defaults to 128)
# Optionally an "IPv6:" prefix may be prepended to an IPv6 address
# as specified by RFC 5321 (ex RFC 2821). Brackets enclosing the address
# are optional, e.g. [::1]/128 .
#
# The following IPv4 forms are allowed:
# d.d.d.d
# d.d.d.d/prefix-length CIDR mask length is allowed (defaults to 32)
# d.d.d.d/m.m.m.m network mask (gets converted to prefix-length)
# If prefix-length or a mask is specified with an IPv4 address, the address
# may be shortened to d.d.d/n or d.d/n or d/n. Such truncation is allowed
# for compatibility with earlier version, but is deprecated and is not
# allowed for IPv6 addresses.
#
# IPv4 addresses and masks are converted to IPv4-mapped IPv6 addresses
# of the form ::FFFF:d.d.d.d, The CIDR mask length (0..32) is converted
# to an IPv6 prefix-length (96..128). The returned vector strings resulting
# from IPv4 and IPv6 forms are indistinguishable.
#
# NOTE:
# d.d.d.d is equivalent to ::FFFF:d.d.d.d (IPv4-mapped IPv6 address)
# which is not the same as ::d.d.d.d (IPv4-compatible IPv6 address)
#
# A quadruple is returned:
# - an IP address represented as a 128-bit vector (a string)
# - network mask derived from prefix length, a 128-bit vector (string)
# - prefix length as an integer (0..128)
# - zone_id, e.g. an interface scope for link-local addresses,
# undef if not specified (implies a default zone_id 0, RFC 4007 sect. 11)
#
sub ip_to_vec($;$) {
my($ip,$allow_mask) = @_;
my($ip_len, @ip_fields, $scope);
local($1,$2,$3,$4,$5,$6);
$ip =~ s/^[ \t]+//; $ip =~ s/[ \t\r\n]+\z//s; # trim
my $ipa = $ip;
($ipa,$ip_len) = ($1,$2) if $allow_mask && $ip =~ m{^ ([^/]*) / (.*) \z}xs;
$ipa = $1 if $ipa =~ m{^ \[ (.*) \] \z}xs; # discard optional brackets
my $have_ipv6;
if ($ipa =~ s/^IPv6://i) { $have_ipv6 = 1 }
elsif ($ipa =~ /:[0-9a-f]*:/i) { $have_ipv6 = 1 }
# RFC 4007: IPv6 Scoped Address Architecture, sect 11: textual representation
# RFC 6874 A <zone_id> SHOULD contain only ASCII characters
# classified as "unreserved" for use in URIs [RFC 3986]
# RFC 3986: unreserved = ALPHA / DIGIT / "-" / "." / "_" / "~"
$scope = $1 if $ipa =~ s/ ( % [A-Z0-9._~-]* ) \z//xsi; # scoped address
if ($have_ipv6 &&
$ipa =~ m{^(.*:) (\d{1,3}) \. (\d{1,3}) \. (\d{1,3}) \. (\d{1,3})\z}xsi){
# IPv6 alternative form x:x:x:x:x:x:d.d.d.d
my(@d) = ($2,$3,$4,$5);
!grep($_ > 255, @d)
or die "Invalid decimal field value in IPv6 address: [$ip]\n";
$ipa = $1 . sprintf('%02x%02x:%02x%02x', @d);
} elsif (!$have_ipv6 &&
$ipa =~ m{^ \d{1,3} (?: \. \d{1,3}){0,3} \z}xs) { # IPv4
my(@d) = split(/\./,$ipa,-1);
!grep($_ > 255, @d)
or die "Invalid field value in IPv4 address: [$ip]\n";
defined($ip_len) || @d==4
or die "IPv4 address [$ip] contains fewer than 4 fields\n";
$ipa = '::ffff:' . sprintf('%02x%02x:%02x%02x', @d); # IPv4-mapped IPv6
if (!defined($ip_len)) { $ip_len = 32; # no length, defaults to /32
} elsif ($ip_len =~ /^\d{1,9}\z/) { # /n, IPv4 CIDR notation
} elsif ($ip_len =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})\z/) {
my(@d) = ($1,$2,$3,$4);
!grep($_ > 255, @d)
or die "Illegal field value in IPv4 mask: [$ip]\n";
my $mask1 = pack('C4', @d); # /m.m.m.m
my $len = unpack('%b*', $mask1); # count ones
my $mask2 = pack('B32', '1' x $len); # reconstruct mask from count
$mask1 eq $mask2
or die "IPv4 mask not representing a valid CIDR mask: [$ip]\n";
$ip_len = $len;
} else {
die "Invalid IPv4 network mask or CIDR prefix length: [$ip]\n";
}
$ip_len<=32 or die "IPv4 network prefix length greater than 32: [$ip]\n";
$ip_len += 128-32; # convert IPv4 net mask length to IPv6 prefix length
}
# now we presumably have an IPv6 compressed or preferred form x:x:x:x:x:x:x:x
if ($ipa !~ /^(.*?)::(.*)\z/s) { # zero-compressing form used?
@ip_fields = split(/:/,$ipa,-1); # no, have preferred form
} else { # expand zero-compressing form
my($before,$after) = ($1,$2);
my(@bfr) = split(/:/,$before,-1); my(@aft) = split(/:/,$after,-1);
my $missing_cnt = 8-(@bfr+@aft); $missing_cnt = 1 if $missing_cnt<1;
@ip_fields = (@bfr, ('0') x $missing_cnt, @aft);
}
@ip_fields >= 8 or die "IPv6 address [$ip] contains fewer than 8 fields\n";
@ip_fields <= 8 or die "IPv6 address [$ip] contains more than 8 fields\n";
!grep(!/^[0-9a-fA-F]{1,4}\z/, @ip_fields) # this is quite slow
or die "Invalid syntax of IPv6 address: [$ip]\n";
my $vec = pack('n8', map(hex($_),@ip_fields));
if (!defined($ip_len)) {
$ip_len = 128;
} elsif ($ip_len !~ /^\d{1,3}\z/) {
die "Invalid prefix length syntax in IP address: [$ip]\n";
} elsif ($ip_len > 128) {
die "IPv6 network prefix length greater than 128: [$ip]\n";
}
my $mask = pack('B128', '1' x $ip_len);
# do_log(5, "ip_to_vec: %s => %s/%d\n", # unpack('B*',$vec)
# $ip, join(':',unpack('(H4)*',$vec)), $ip_len);
($vec, $mask, $ip_len, $scope);
}
use vars qw($ip_mapd_vec $ip_mapd_mask $ip_xlat_vec $ip_xlat_mask
$ip_6to4_vec $ip_6to4_mask $ip_nat64_vec $ip_nat64_mask);
BEGIN {
# RFC 4291: IPv4-mapped
($ip_mapd_vec, $ip_mapd_mask) = ip_to_vec('::ffff:0:0/96',1); # IPv4-mapped
# RFC 2765 (SIIT): IPv4-translated
($ip_xlat_vec, $ip_xlat_mask) = ip_to_vec('::ffff:0:0:0/96',1); # IPv4-xlat
# RFC 3056 (6to4)
($ip_6to4_vec, $ip_6to4_mask) = ip_to_vec('2002::/16',1); # 6to4
# RFC 6052, RFC 6146 (NAT64)
($ip_nat64_vec, $ip_nat64_mask) = ip_to_vec('64:ff9b::/96',1); # NAT64
# check, just in case
$ip_mapd_vec = $ip_mapd_vec & $ip_mapd_mask;
$ip_xlat_vec = $ip_xlat_vec & $ip_xlat_mask;
$ip_6to4_vec = $ip_6to4_vec & $ip_6to4_mask;
$ip_nat64_vec = $ip_nat64_vec & $ip_nat64_mask;
}
# strip an optional 'IPv6:' prefix, lowercase hex digits,
# convert an IPv4-mapped IPv6 address into a plain IPv4 dot-quad form;
# leave unchanged if syntactically incorrect
#
sub normalize_ip_addr($) {
my $ip = $_[0];
my($have_ipv6, $scope);
if ($ip =~ s/^IPv6://i) { $have_ipv6 = 1 }
elsif ($ip =~ /:[0-9a-f]*:/i) { $have_ipv6 = 1 }
if ($have_ipv6) {
local($1);
$scope = $1 if $ip =~ s/ % ( [A-Z0-9._~-]* ) \z//xsi; # scoped address
if ($ip !~ /^[0:]+:ffff:/i) { # triage for IPv4-mapped
$ip = lc $ip; # lowercase: RFC 5952
} else { # looks like an IPv4-mapped address
my($ip_vec,$ip_mask);
if (!eval { ($ip_vec,$ip_mask) = ip_to_vec($ip,0); 1 }) {
do_log(3, "normalize_ip_addr: bad IP address: %s", $_[0]);
} elsif (($ip_vec & $ip_mapd_mask) ne $ip_mapd_vec) {
$ip = lc $ip; # lowercase: RFC 5952
# RFC 5952 - Recommendation for IPv6 Text Representation
# TODO: apply suppression of leading zeroes, zero compression
} else { # IPv4-mapped address
my $ip_dq = join('.', unpack('C4',substr($ip_vec,12,4))); # 32 bits
do_log(5, "IPv4-mapped: %s -> %s", $ip, $ip_dq);
$ip = $ip_dq;
}
}
}
$ip .= '%'.$scope if $scope; # defined, nonempty and nonzero
$ip;
}
# lookup_ip_acl() performs a lookup for an IPv4 or IPv6 address against a list
# of lookup tables, each may be a constant, or a ref to an access control
# list or a ref to an associative array (hash) of network or host addresses.
# Interface zone_id (e.g. scope for link-local addresses) is ignored.
#
# IP address is compared to each member of an access list in turn,
# the first match wins (terminates the search), and its value decides
# whether the result is true (yes, permit, pass) or false (no, deny, drop).
# Falling through without a match produces a false (undef).
#
# For lookup tables which are a ref to a an array (a traditional ACL),
# the presence of a character '!' prepended to a list member decides
# whether the result will be true (without a '!') or false (with a '!')
# in case this list member matches and terminates the search.
#
# Because search stops at the first match, it only makes sense
# to place more specific patterns before the more general ones.
#
# For IPv4 a network address can be specified in classless notation
# n.n.n.n/k, or using a mask n.n.n.n/m.m.m.m . Missing mask implies /32,
# i.e. a host address. For IPv6 addresses all RFC 4291 forms are allowed
# and the /k specifies a prefix length. See also comments at ip_to_vec().
#
# Although not a special case, it is good to remember that '::/0'
# always matches any IPv4 or IPv6 address (even syntactically invalid address).
#
# The '0/0' is equivalent to '::ffff:0:0/96' and matches any syntactically
# valid IPv4 address (including IPv4-mapped IPv6 addresses), but not other
# IPv6 addresses!
#
# Example
# given: @acl = qw( !192.168.1.12 172.16.3.3 !172.16.3.0/255.255.255.0
# 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
# !0.0.0.0/8 !:: 127.0.0.0/8 ::1 );
# matches RFC 1918 private address space except host 192.168.1.12
# and net 172.16.3/24 (but host 172.16.3.3 within 172.16.3/24 still matches).
# In addition, the 'unspecified' (null, i.e. all zeros) IPv4 and IPv6
# addresses return false, and IPv4 and IPv6 loopback addresses match
# and return true.
#
# If the supplied lookup table is a hash reference, match a canonical
# IP address: dot-quad IPv4, or a preferred IPv6 form, against hash keys.
# For IPv4 addresses a simple classful subnet specification is allowed in
# hash keys by truncating trailing bytes from the looked up IPv4 address.
# A syntactically invalid IP address cannot match any hash entry.
#
sub lookup_ip_acl($@) {
my($ip, @nets_ref) = @_;
my($ip_vec,$ip_mask); my $eval_stat;
eval { ($ip_vec,$ip_mask) = ip_to_vec($ip,0); 1 }
or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
my($label,$fullkey,$result,$lookup_type); my $found = 0;
for my $tb (@nets_ref) {
my $t = ref($tb) eq 'REF' ? $$tb : $tb; # allow one level of indirection
if (!ref($t) || ref($t) eq 'SCALAR') { # a scalar always matches
my $r = ref($t) ? $$t : $t; # allow direct or indirect reference
$result = $r; $fullkey = "(constant:$r)"; $lookup_type = 'const';
$found=1 if defined $result;
} elsif (ref($t) eq 'HASH') {
$lookup_type = 'hash';
if (!defined $ip_vec) { # syntactically invalid IP address
$fullkey = undef; $result = $t->{$fullkey}; # only matches undef key
$found=1 if defined $result;
} else { # valid IP address
# match a canonical IP address: dot-quad IPv4, or preferred IPv6 form
my $ip_c; # IP address in a canonical form: x:x:x:x:x:x:x:x
$ip_c = join(':', map(sprintf('%04x',$_), unpack('n8',$ip_vec)));
if (($ip_vec & $ip_mapd_mask) ne $ip_mapd_vec) {
do_log(5, 'lookup_ip_acl keys: "%s"', $ip_c);
} else { # is an IPv4-mapped addr
my $ip_dq; # IPv4 in dotted-quad form
$ip_dq = join('.', unpack('C4',substr($ip_vec,12,4))); # 32 bits
# try dot-quad, stripping off trailing bytes repeatedly
do_log(5, 'lookup_ip_acl keys: "%s", "%s"', $ip_dq, $ip_c);
for (my(@f)=split(/\./,$ip_dq); @f && !$found; $#f--) {
$fullkey = join('.',@f); $result = $t->{$fullkey};
$found=1 if defined $result;
}
}
# test for 6to4 too? not now
# if ($ip_vec & $ip_6to4_mask) eq $ip_6to4_vec) {
# # yields an IPv4 address of a client's 6to4 router
# $ip_dq = join('.', unpack('C4',substr($ip_vec,2,4)));
# }
if (!$found) { # try the 'preferred IPv6 form', lowercase hex letters
$fullkey = lc $ip_c; $result = $t->{$fullkey};
$found=1 if defined $result;
}
}
} elsif (ref($t) eq 'ARRAY') {
$lookup_type = 'array';
my($key,$acl_ip_vec,$acl_mask,$acl_mask_len); local($1,$2);
for my $net (@$t) {
$fullkey = $key = $net; $result = 1;
if ($key =~ /^(!+)(.*)\z/s) { # starts with exclamation mark(s)
$key = $2;
$result = 1 - $result if (length($1) & 1); # negate if odd
}
($acl_ip_vec, $acl_mask, $acl_mask_len) = ip_to_vec($key,1);
if ($acl_mask_len == 0) { $found=1 } #even an invalid addr matches ::/0
elsif (!defined($ip_vec)) {} # no other matches for invalid address
elsif (($ip_vec & $acl_mask) eq ($acl_ip_vec & $acl_mask)) { $found=1 }
last if $found;
}
} elsif ($t->isa('Net::Patricia::AF_INET6')) { # Patricia Trie
$lookup_type = 'patricia';
local($1,$2,$3,$4); local($_) = $ip;
$_ = $1 if /^ \[ ( [^\]]* ) \] \z/xs; # discard optional brackets
s/%[A-Z0-9:._-]+\z//si; # discard interface specification
if (m{^ (\d+) \. (\d+) \. (\d+) \. (\d+) \z}x) {
$_ = sprintf('::ffff:%d.%d.%d.%d', $1,$2,$3,$4);
} else {
s/^IPv6://i; # discard optional 'IPv6:' prefix
}
eval { $result = $t->match_string($_); 1 } or $result=undef;
if (defined $result) {
$fullkey = $result;
if ($fullkey =~ s/^!//) { $result = 0 }
else { $result = 1; $found = 1 }
}
} elsif ($t->isa('Amavis::Lookup::IP')) { # pre-parsed IP lookup array obj
$lookup_type = 'arr.obj';
my($acl_ip_vec, $acl_mask, $acl_mask_len);
for my $e (@$t) {
($fullkey, $acl_ip_vec, $acl_mask, $acl_mask_len, $result) = @$e;
if ($acl_mask_len == 0) { $found=1 } #even an invalid addr matches ::/0
elsif (!defined($ip_vec)) {} # no other matches for invalid address
elsif (($ip_vec & $acl_mask) eq ($acl_ip_vec & $acl_mask)) { $found=1 }
last if $found;
}
} elsif ($t->isa('Amavis::Lookup::DNSxL')) { # DNSxL lookup obj, RFC 5782
$lookup_type = 'dns';
($result, $fullkey) = $t->lookup_ip($ip);
$found = $result;
} elsif ($t->isa('Amavis::Lookup::Label')) { # logging label
# just a convenience for logging purposes, not a real lookup method
$label = $t->display; # grab the name, and proceed with the next table
} else {
die "TROUBLE: lookup table is an unknown object: " . ref($t);
}
last if $found;
}
$fullkey = $result = undef if !$found;
if ($label ne '') { $label = " ($label)" }
ll(4) && do_log(4, 'lookup_ip_acl%s %s: key="%s"%s',
$label, $lookup_type, $ip,
!$found ? ", no match"
: " matches \"$fullkey\", result=$result");
if (defined $eval_stat) {
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
$eval_stat = "lookup_ip_acl$label: $eval_stat";
do_log(2, "%s", $eval_stat);
}
!wantarray ? $result : ($result, $fullkey, $eval_stat);
}
# Create a pre-parsed object from a list of IP networks, which
# may be used as an argument to lookup_ip_acl to speed up its searches.
# Interface zone_id (e.g. scope for link-local addresses) is ignored.
#
sub new($@) {
my($class,@nets) = @_;
my $build_patricia_trie = $have_patricia && (@nets > 20);
if (!$build_patricia_trie) {
# build a traditional pre-parsed search list for a small number of entries
my(@list); local($1,$2);
for my $net (@nets) {
my $key = $net; my $result = 1;
if ($key =~ /^(!+)(.*)\z/s) { # starts with exclamation mark(s)
$key = $2;
$result = 1 - $result if (length($1) & 1); # negate if odd
}
my($ip_vec, $ip_mask, $ip_mask_len) = ip_to_vec($key,1);
push(@list, [$net, $ip_vec, $ip_mask, $ip_mask_len, $result]);
}
return bless(\@list, $class);
} else {
# build a patricia trie, it offers more efficient searching in large sets
my $pt = Net::Patricia->new(&AF_INET6);
do_log(5, "building a patricia trie out of %d nets", scalar(@nets));
for my $net (@nets) {
local $_ = $net;
local($1,$2,$3,$4); my $masklen;
if (s{ / ([0-9.]+) \z }{}x) {
$masklen = $1;
$masklen =~ /^\d{1,3}\z/
or die "Network mask not supported, use a CIDR syntax: $net";
}
s/^!//; # strip a negation from a key, it will be retained in data
$_ = $1 if /^ \[ ( [^\]]* ) \] \z/xs; # discard optional brackets
s/%[A-Z0-9:._-]+\z//si; # discard interface specification
if (/^ \d+ (?: \. | \z) /x) { # triage for an IPv4 network address
if (/^ (\d+) \. (\d+) \. (\d+) \. (\d+) \z/x) {
$_ = sprintf('::ffff:%d.%d.%d.%d', $1,$2,$3,$4);
$masklen = 32 if !defined $masklen;
} elsif (/^ (\d+) \. (\d+) \. (\d+) \.? \z/x) {
$_ = sprintf('::ffff:%d.%d.%d.0', $1,$2,$3);
$masklen = 24 if !defined $masklen;
} elsif (/^ (\d+) \. (\d+) \.? \z/x) {
$_ = sprintf('::ffff:%d.%d.0.0', $1,$2);
$masklen = 16 if !defined $masklen;
} elsif (/^ (\d+) \.? \z/x) {
$_ = sprintf('::ffff:%d.0.0.0', $1);
$masklen = 8 if !defined $masklen;
}
$masklen += 96 if defined $masklen;
} else { # looks like an IPv6 network
s/^IPv6://i; # discard optional 'IPv6:' prefix
}
$masklen = 128 if !defined $masklen;
$_ .= '/' . $masklen;
eval { $pt->add_string($_, $net); 1 }
or die "Adding a network $net to a patricia trie failed: $@";
}
# ll(5) && $pt->climb(sub { do_log(5,"patricia trie, node $_[0]") });
return $pt; # a Net::Patricia::AF_INET6 object
}
}
1;
#
package Amavis::Lookup::Opaque;
use strict;
use re 'taint';
# Make an object out of the supplied argument, pretocting it
# from being interpreted as an acl- or a hash- type lookup.
#
sub new($$) { my($class,$obj) = @_; bless \$obj, $class }
sub get($) { ${$_[0]} }
1;
#
package Amavis::Lookup::OpaqueRef;
use strict;
use re 'taint';
# Make an object out of the supplied argument, pretocting it
# from being interpreted as an acl- or a hash- type lookup.
# The argument to new() is expected to be a ref to a variable,
# which will be dereferenced by a method get().
#
sub new($$) { my($class,$obj) = @_; bless \$obj, $class }
sub get($) { ${${$_[0]}} }
1;
#
package Amavis::Lookup::Label;
use strict;
use re 'taint';
# Make an object out of the supplied string, to serve as label
# in log messages generated by sub lookup
#
sub new($$) { my($class,$str) = @_; bless \$str, $class }
sub display($) { ${$_[0]} }
1;
#
package Amavis::Lookup::SQLfield;
use strict;
use re 'taint';
sub new($$$;$$) {
my($class, $sql_query, $fieldname, $fieldtype, $implied_args) = @_;
my $self =
bless { fieldname => $fieldname, fieldtype => $fieldtype }, $class;
$self->{sql_query} = $sql_query if defined $sql_query;
$self->{args} = ref($implied_args) eq 'ARRAY' ? [@$implied_args] # copy
: [$implied_args] if defined $implied_args;
$self;
}
1;
#
package Amavis::Lookup::LDAPattr;
use strict;
use re 'taint';
sub new($$$;$) {
my($class, $ldap_query, $attrname, $attrtype) = @_;
my $self =
bless { attrname => $attrname, attrtype => $attrtype }, $class;
$self->{ldap_query} = $ldap_query if defined $ldap_query;
$self;
}
1;
#
package Amavis::Lookup::DNSxL;
use strict;
use re 'taint';
BEGIN {
import Amavis::Conf qw(:platform);
import Amavis::Util qw(ll do_log);
use vars qw($dns_resolver); # implicit persistent Net::DNS::Resolver object
}
sub new {
my($class, $zone, $expected, $resolver) = @_;
# $zone is either a DNSxL zone name, or a template where an %a is a
# place-holder for the IP address to be queried.
# The result of a type-A DNS query is matched against $expected, which is
# either a scalar string, or a ref to an array of strings, or a regexp obj.
require NetAddr::IP or die "Can't load module NetAddr::IP";
NetAddr::IP->VERSION(4.010); # need a method full6()
if ($resolver) {
# DNS resolver object provided by a caller, use that
} elsif ($dns_resolver) {
# reuse previously created internal resolver object
$resolver = $dns_resolver;
} else { # create a new internal resolver object with some sensible defaults
require Net::DNS or die "Can't load module Net::DNS";
$dns_resolver = Net::DNS::Resolver->new(
config_file => '/etc/resolv.conf', force_v4 => !$have_inet6,
defnames => 0, retry => 1, persistent_udp => 1,
tcp_timeout => 2, udp_timeout => 2, retrans => 1); # seconds
$dns_resolver or die "Failed to create a Net::DNS::Resolver object";
$dns_resolver->udppacketsize(1220);
$resolver = $dns_resolver;
}
defined $zone && $zone ne ''
or die "DNS zone name must not be empty, in Amavis::Lookup::DNSxL";
$expected = '127.0.0.2' if !defined $expected; # an RFC 5782 convention
my $self = {
zone => $zone, # DNSxL zone name (a base DNS domain name)
resolver => $resolver, # a Net::DNS::Resolver object or equivalent
expected => $expected, # a set of replies that qualify as a match
};
bless $self, $class;
}
# Query a DNSxL list given an IPv4 or IPv6 address, according to RFC 5782.
# Returns an IPv4 address in the 127.0.0.0/8 subnet as returned by a DNS
# type-A query when the result matches the provided expected value, or a
# zero when a query succeeded (NOERROR or NXDOMAIN) but there was no match.
# The argument $expected may be a string, a ref to array, or a regexp object.
# Returns undef on DNS failures (like a timeout, or no Net::DNS module).
#
sub lookup_ip {
my($self, $ipaddr) = @_;
my $result; # result of a DNS query, undef indicates a lookup failure
my $fullkey; # matching (expected) key
return ($result,$fullkey) if !$self->{resolver};
my $revip;
local($1,$2,$3,$4);
if ($ipaddr =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})\z/) {
$revip = "$4.$3.$2.$1";
} elsif ($ipaddr =~ /:[0-9a-f]*:/i) { # triage
# looks like an IPv6 address, let NetAddr::IP check the details
my $ip_obj = NetAddr::IP->new6($ipaddr);
if (defined $ip_obj) { # a valid IPv6 address, apply RFC 5782 section 2.4
$revip = lc $ip_obj->network->full6; # string in a canonical form
$revip =~ s/://gs; $revip = join('.', reverse split(//,$revip));
}
}
if (!defined $revip) {
do_log(4,'invalid IP address for a DNSxL query: %s', $ipaddr);
return ($result,$fullkey);
}
my $query = $self->{zone};
$query =~ s/%a/$revip/gs or ($query = $revip . '.' .$query);
my $pkt = $self->{resolver}->send($query, 'A');
my $ll5 = ll(5);
$result = 0; # defined but false
if (!$pkt || !$pkt->header) {
undef $result;
$ll5 && do_log(5,'DNSxL query %s, no result', $query);
} elsif ($pkt->header->rcode eq 'NXDOMAIN') {
$ll5 && do_log(5,'DNSxL query %s, domain does not exist', $query);
} elsif ($pkt->header->rcode ne 'NOERROR') {
$ll5 && do_log(5,'DNSxL query %s, rcode %s', $query, $pkt->header->rcode);
} elsif ($pkt->header->ancount) {
my $expected = $self->{expected};
$expected = [ $expected ] if !ref $expected;
for my $rr ($pkt->answer) {
next if $rr->type ne 'A';
my $returned_addr = $rr->address;
$ll5 && do_log(5,'DNSxL query %s, DNS answer: %s',$query,$returned_addr);
# RFC 5782 section 2.3: values SHOULD be in the 127.0.0.0/8 range
next if $returned_addr !~ /^127\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/s;
if (ref $expected eq 'ARRAY') {
# $expected is an array of strings: IPv4 addresses in dotted-quad
# form, with bytes possibly omitted from the left
for (@$expected) {
if ( ( /^\d+\z/ ? "127.0.0.$_"
: /^\d+\.\d+\z/ ? "127.0.$_"
: /^\d+\.\d+\.\d+\z/ ? "127.$_" : $_) eq $returned_addr) {
$fullkey = $_; $result = $returned_addr;
last;
}
}
last if defined $result;
} elsif (ref $expected eq 'Regexp') {
# $expected is a regular expresion
if ($returned_addr =~ /$expected/s) {
$fullkey = "$expected"; # stringified regexp object
$result = $returned_addr; last;
}
}
}
}
do_log(5,'DNSxL result: %s, matches %s',$result,$fullkey) if $ll5 && $result;
($result, $fullkey);
}
1;
#
package Amavis::Lookup;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&lookup &lookup2 &lookup_hash &lookup_acl);
import Amavis::Util qw(ll do_log fmt_struct unique_list idn_to_ascii
safe_encode_utf8_inplace);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools qw(split_address make_query_keys);
}
use subs @EXPORT_OK;
# lookup_hash() performs a lookup for an e-mail address against a hash map.
# If a match is found (a hash key exists in the Perl hash) the function returns
# whatever the map returns, otherwise undef is returned. First match wins,
# aborting further search sequence.
#
# The $addr may be a string of octets (assumed to be UTF-8 encoded)
# or a string of characters which gets first encoded to UTF-8 octets.
# International domain name (IDN) in $addr will be converted to ACE and
# lowercased. Keys of a hash table are expected to be in octets (utf8 flag
# off) and their international domain names encoded in ASCII-compatible
# encoding (ACE).
#
sub lookup_hash($$;$%) {
my($addr, $hash_ref,$get_all,%options) = @_;
ref($hash_ref) eq 'HASH'
or die "lookup_hash: arg2 must be a hash ref: $hash_ref";
local($1,$2,$3,$4); my(@matchingkey,@result); my $append_string;
$append_string = $options{AppendStr} if defined $options{AppendStr};
my($keys_ref,$rhs_ref) = make_query_keys($addr,1,1,$append_string);
for my $key (@$keys_ref) { # do the search
if (exists $$hash_ref{$key}) { # got it
push(@result,$$hash_ref{$key}); push(@matchingkey,$key);
last if !$get_all;
}
}
# do the right-hand side replacements if any $n, ${n} or $(n) is specified
for my $r (@result) { # $r is just an alias to array elements
if (defined($r) && !ref($r) && index($r,'$') >= 0) { # plain string with $
my $any = $r =~ s{ \$ ( (\d+) | \{ (\d+) \} | \( (\d+) \) ) }
{ my $j = $2+$3+$4; $j<1 ? '' : $rhs_ref->[$j-1] }xgse;
# bring taintedness of input to the result
$r .= substr($addr,0,0) if $any;
}
}
if (!ll(5)) {
# only bother with logging when needed
} elsif (!@result) {
do_log(5,"lookup_hash(%s), no matches", $addr);
} elsif (!$get_all) { # first match wins
do_log(5,'lookup_hash(%s) matches key "%s", result=%s',
$addr, $matchingkey[0], !defined($result[0])?'undef':$result[0]);
} else { # want all matches
do_log(5,"lookup_hash(%s) matches keys: %s", $addr,
join(', ', map {sprintf('"%s"=>%s',$matchingkey[$_],$result[$_])}
(0..$#result)) );
}
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
# lookup_acl() performs a lookup for an e-mail address against
# access control list.
#
# The $addr may be a string of octets (assumed to be UTF-8 encoded)
# or a string of characters which gets first encoded to UTF-8 octets.
# International domain name (IDN) in $addr will be converted to ACE
# and lowercased. Array elements are expected to be in octets (utf8
# flag off) and their international domain names encoded in
# ASCII-compatible encoding (ACE).
#
# The supplied e-mail address is compared with each member of the
# lookup list in turn, the first match wins (terminates the search),
# and its value decides whether the result is true (yes, permit, pass)
# or false (no, deny, drop). Falling through without a match produces
# false (undef). Search is always case-insensitive on domain part,
# local part matching depends on $localpart_is_case_sensitive setting.
#
# NOTE: lookup_acl is not aware of address extensions and they are
# not handled specially!
#
# If a list element contains a '@', the full e-mail address is compared,
# otherwise if a list element has a leading dot, the domain name part is
# matched only, and the domain as well as its subdomains can match. If there
# is no leading dot, the domain must match exactly (subdomains do not match).
#
# The presence of a character '!' prepended to a list element decides
# whether the result will be true (without a '!') or false (with '!')
# in case where this list element matches and terminates the search.
#
# Because search stops at the first match, it only makes sense
# to place more specific patterns before the more general ones.
#
# Although not a special case, it is good to remember that '.' always matches,
# so a '.' would stop the search and return true, whereas '!.' would stop the
# search and return false (0).
#
# Examples:
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk )
# 'me.ac.uk' matches me.ac.uk, returns true and search stops
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk )
# 'you.ac.uk' matches .ac.uk, returns false (because of '!') and search stops
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk )
# 'them.co.uk' matches .uk, returns true and search stops
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk )
# 'some.com' does not match anything, falls through and returns false (undef)
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk !. )
# 'some.com' similar to previous, except it returns 0 instead of undef,
# which would only make a difference if this ACL is not the last argument
# in a call to lookup(), because a defined result stops further lookups
#
# given: @acl = qw( me.ac.uk !.ac.uk .uk . )
# 'some.com' matches catchall ".", and returns true. The ".uk" is redundant
#
# more complex example: @acl = qw(
# !The.Boss@dept1.xxx.com .dept1.xxx.com
# .dept2.xxx.com .dept3.xxx.com lab.dept4.xxx.com
# sub.xxx.com !.sub.xxx.com
# me.d.aaa.com him.d.aaa.com !.d.aaa.com .aaa.com
# );
#
sub lookup_acl($$%) {
my($addr, $acl_ref,%options) = @_;
ref($acl_ref) eq 'ARRAY'
or die "lookup_acl: arg2 must be a list ref: $acl_ref";
return if !@$acl_ref; # empty list can't match anything
safe_encode_utf8_inplace($addr); # to octets (if not already)
my $lpcs = c('localpart_is_case_sensitive');
my($localpart,$domain) = split_address($addr);
$localpart = lc $localpart if !$lpcs;
local($1,$2);
# chop off leading '@' and trailing dots
$domain = $1 if $domain =~ /^\@?(.*?)\.*\z/s;
$domain = idn_to_ascii($domain) if $domain ne ''; # lowercase, ToASCII
$domain .= $options{AppendStr} if defined $options{AppendStr};
my($matchingkey, $result); my $found = 0;
for my $e (@$acl_ref) {
$result = 1; $matchingkey = $e; my $key = $e;
if ($key =~ /^(!+)(.*)\z/s) { # starts with an exclamation mark(s)
$key = $2;
$result = 1-$result if length($1) & 1; # negate if odd
}
if ($key =~ /^(.*?)\@([^\@]*)\z/s) { # contains '@', check full address
$found=1 if $localpart eq ($lpcs?$1:lc($1)) && $domain eq lc($2);
} elsif ($key =~ /^\.(.*)\z/s) { # leading dot: domain or subdomain
my $key_t = lc($1);
$found=1 if $domain eq $key_t || $domain =~ /(\.|\z)\Q$key_t\E\z/s;
} else { # match domain (but not its subdomains)
$found=1 if $domain eq lc($key);
}
last if $found;
}
$matchingkey = $result = undef if !$found;
ll(5) && do_log(5, 'lookup_acl(%s)%s', $addr,
(!$found ? ", no match"
: " matches key \"$matchingkey\", result=$result"));
!wantarray ? $result : ($result, $matchingkey);
}
# Perform a lookup for an e-mail address against any number of supplied maps:
# - SQL map,
# - LDAP map,
# - hash map (associative array),
# - (access control) list,
# - a list of regular expressions (an Amavis::Lookup::RE object),
# - a (defined) scalar always matches, and returns itself as the map value
# (useful as a catchall for a final 'pass' or 'fail');
# (see lookup_hash, lookup_acl, lookup_sql and lookup_ldap for details).
#
# when $get_all is 0 (the common usage):
# If a match is found (a defined value), returns whatever the map returns,
# otherwise returns undef. FIRST match aborts further search sequence.
# when $get_all is true:
# Collects a list of results from ALL matching tables, and within each
# table from ALL matching key. Returns a ref to a list of results
# (and a ref to a list of matching keys if returning a pair).
# The first element of both lists is supposed to be what lookup() would
# have returned if $get_all were 0. The order of returned elements
# corresponds to the order of the search.
#
# traditional API, deprecated
#
sub lookup($$@) {
my($get_all, $addr, @tables) = @_;
lookup2($get_all, $addr, \@tables);
}
# generalized API
#
sub lookup2($$$%) {
my($get_all, $addr, $tables_ref, %options) = @_;
(@_ - 3) % 2 == 0 or die "lookup2: options argument not in pairs (not hash)";
my($label, @result, @matchingkey);
for my $tb (!$tables_ref ? () : @$tables_ref) {
my $t = ref($tb) eq 'REF' ? $$tb : $tb; # allow one level of indirection
my $reft = ref($t);
if ($reft eq 'CODE') { # lazy evaluation
$t = &$t($addr,$get_all,%options);
$reft = ref($t);
}
if (!$reft || $reft eq 'SCALAR') { # a scalar always matches
my $r = $reft ? $$t : $t; # allow direct or indirect reference
if (defined $r) {
ll(5) && do_log(5, 'lookup: (scalar) matches, result="%s"', $r);
push(@result,$r); push(@matchingkey,"(constant:$r)");
}
} elsif ($reft eq 'HASH') {
my($r,$mk);
($r,$mk) = lookup_hash($addr,$t,$get_all,%options) if %$t;
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
} elsif ($reft eq 'ARRAY') {
my($r,$mk);
($r,$mk) = lookup_acl($addr,$t,%options) if @$t;
if (defined $r) { push(@result,$r); push(@matchingkey,$mk) }
} elsif ($t->isa('Amavis::Lookup::Label')) { # logging label
# just a convenience for logging purposes, not a real lookup method
$label = $t->display; # grab the name, and proceed with the next table
} elsif ($t->isa('Amavis::Lookup::Opaque') || # a structured constant
$t->isa('Amavis::Lookup::OpaqueRef')) { # ref to structured const
my $r = $t->get; # behaves like a constant pseudo-lookup
if (defined $r) {
ll(5) && do_log(5, 'lookup: (opaque) matches, result="%s"', $r);
push(@result,$r); push(@matchingkey,"(opaque:$r)");
}
} elsif ($t->isa('Amavis::Lookup::RE')) {
my($r,$mk);
($r,$mk) = $t->lookup_re($addr,$get_all,%options) if @$t;
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
} elsif ($t->isa('Amavis::Lookup::SQL')) {
my($r,$mk) = $t->lookup_sql($addr,$get_all,%options);
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
} elsif ($t->isa('Amavis::Lookup::SQLfield')) {
if ($Amavis::sql_lookups) { # triage
my($r,$mk) = $t->lookup_sql_field($addr,$get_all,%options);
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
}
} elsif ($t->isa('Amavis::Lookup::LDAP')) {
if ($Amavis::ldap_lookups && c('enable_ldap')) { # triage
my($r,$mk) = $t->lookup_ldap($addr,$get_all,%options);
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
}
} elsif ($t->isa('Amavis::Lookup::LDAPattr')) {
if ($Amavis::ldap_lookups && c('enable_ldap')) { # triage
my($r,$mk) = $t->lookup_ldap_attr($addr,$get_all,%options);
if (!defined $r) {}
elsif (!$get_all) { push(@result,$r); push(@matchingkey,$mk) }
elsif (@$r) { push(@result,@$r); push(@matchingkey,@$mk) }
}
} else {
die "TROUBLE: lookup table is an unknown object: " . $reft;
}
last if @result && !$get_all;
}
# pretty logging
if (ll(4)) { # only bother preparing log report which will be printed
my $opt_label = $options{Label};
my(@lbl) = grep(defined $_ && $_ ne '', ($opt_label,$label));
$label = ' [' . join(',',unique_list(\@lbl)) . ']' if @lbl;
if (!$tables_ref || !@$tables_ref) {
do_log(4, "lookup%s => undef, %s, no lookup tables",
$label, fmt_struct($addr));
} elsif (!@result) {
do_log(4, "lookup%s => undef, %s does not match",
$label, fmt_struct($addr));
} elsif (!$get_all) { # first match wins
do_log(4, 'lookup%s => %-6s %s matches, result=%s, matching_key="%s"',
$label, $result[0] ? 'true,' : 'false,',
fmt_struct($addr), fmt_struct($result[0]), $matchingkey[0]);
} else { # want all matches
do_log(4, 'lookup%s, %d matches for %s, results: %s',
$label, scalar(@result), fmt_struct($addr),
join(', ', map { sprintf('"%s"=>%s',
$matchingkey[$_], fmt_struct($result[$_]))
} (0 .. $#result) ));
}
}
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
#
package Amavis::Expand;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&expand &tokenize);
import Amavis::Util qw(ll do_log);
}
use subs @EXPORT_OK;
# Given a string reference and a hashref of predefined (builtin) macros,
# expand() performs a macro expansion and returns a ref to a resulting string.
#
# This is a simple, yet fully fledged macro processor with proper lexical
# analysis, call stack, quoting levels, user supplied and builtin macros,
# three builtin flow-control macros: selector, regexp selector and iterator,
# a macro-defining macro and a macro '#' that eats input to the next newline.
# Also recognized are the usual \c and \nnn forms for specifying special
# characters, where c can be any of: r, n, f, b, e, a, t.
# Details are described in file README.customize, practical examples of use
# are in the supplied notification messages;
# Author: Mark Martinec <Mark.Martinec@ijs.si>, 2002, 2006
use vars qw(%builtins_cached %lexmap %esc);
use vars qw($lx_lb $lx_lbS $lx_lbT $lx_lbA $lx_lbC $lx_lbE $lx_lbQQ
$lx_rbQQ $lx_rb $lx_sep $lx_h $lx_ph);
BEGIN {
no warnings 'qw'; # avoid "Possible attempt to put comments in qw()"
my(@lx_str) = qw( [ [? [~ [@ [: [= [" "] ] | # %#
%0 %1 %2 %3 %4 %5 %6 %7 %8 %9); # lexical elem.
# %lexmap maps string to reference in order to protect lexels
$lexmap{$_} = \$_ for @lx_str; # maps lexel strings to references
($lx_lb, $lx_lbS, $lx_lbT, $lx_lbA, $lx_lbC, $lx_lbE, $lx_lbQQ, $lx_rbQQ,
$lx_rb, $lx_sep, $lx_h, $lx_ph) = map($lexmap{$_}, @lx_str);
%esc = (n => \"\n", r => "\r", f => "\f", b => "\b",
e => "\e", a => "\a", t => "\t");
# NOTE that \n is specific, it is represented by a ref to a newline and not
# by a newline itself; this makes it possible for a macro '#' to skip input
# to a true newline from source, making it possible to comment-out entire
# lines even if they contain "\n" tokens
1;
}
# make an object out of the supplied list of tokens
sub newmacro { my $class = shift; bless [@_], $class }
# turn a ref to a list of tokens into a single plain string
sub tokens_list_to_str($) { join('', map(ref($_) ? $$_ : $_, @{$_[0]})) }
sub tokenize($;$) {
my($str_ref,$tokens_ref) = @_; local($1);
$tokens_ref = [] if !defined $tokens_ref;
# parse lexically, replacing lexical element strings with references,
# unquoting backslash-quoted characters and %%, and dropping \NL and \_
@$tokens_ref = map {
exists $lexmap{$_} ? $lexmap{$_} # replace with ref
: $_ eq "\\\n" || $_ eq "\\_" ? '' # drop \NEWLINE and \_
: $_ eq '%%' ? '%' # %% -> %
: /^(%\#?.)\z/s ? \"$1" # unknown builtins
: /^\\([0-7]{1,3})\z/ ? chr(oct($1)) # \nnn
: /^\\(.)\z/s ? (exists($esc{$1}) ? $esc{$1} : $1) # \r, \n, \f, ...
: /^(_ [A-Z]+ (?: \( [^)]* \) )? _)\z/xs ? \"$1" # SpamAssassin-compatible
: $_ }
$$str_ref =~ /\G \# | \[ [?~\@:="]? | "\] | \] | \| | % \#? . | \\ [^0-7] |
\\ [0-7]{1,3} | _ [A-Z]+ (?: \( [^)]* \) )? _ |
[^\[\]\\|%\n#"_]+ | [^\n]+? | \n /xgs;
$tokens_ref;
}
sub evalmacro($$;@) {
my($macro_type,$builtins_href,@args) = @_;
my @result; local($1,$2);
if ($macro_type == $lx_lbS) { # selector built-in macro
my $sel = tokens_list_to_str(shift(@args));
if ($sel eq '') { $sel = 0 } # quick
elsif ($sel =~ /^\s*\z/) { $sel = 0 }
elsif ($sel =~ /^\s*(\d+)\s*\z/) { $sel = 0+$1 } # decimal to numeric
else { $sel = 1 }
# provide an empty second alternative if we only have one specified
if (@args < 2) {} # keep $sel beyond $#args
elsif ($sel > $#args) { $sel = $#args } # use last alternative
@result = @{$args[$sel]} if $sel >= 0 && $sel <= $#args;
} elsif ($macro_type == $lx_lbT) { # regexp built-in macro
# args: string, regexp1, then1, regexp2, then2, ... regexpN, thenN[, else]
my $str = tokens_list_to_str(shift(@args)); # collect the first argument
my($match,@repl);
while (@args >= 2) { # at least a regexp and a 'then' argument still there
@repl = ();
my $regexp = tokens_list_to_str(shift(@args)); # collect a regexp arg
if ($regexp eq '') {
# braindamaged Perl: empty string implies the last successfully
# matched regular expression; we must avoid this
$match = 1;
} else {
eval { # guard against invalid regular expression
local($1,$2,$3,$4,$5,$6,$7,$8,$9);
$match = $str=~/$regexp/ ? 1 : 0;
@repl = ($1,$2,$3,$4,$5,$6,$7,$8,$9) if $match;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
do_log(2,"invalid macro regexp arg: %s", $eval_stat);
$match = 0; @repl = ();
};
}
if ($match) { last } else { shift(@args) } # skip 'then' arg if no match
}
if (@args > 0) {
unshift(@repl,$str); # prepend the whole string as a %0
# formal arg lexels %0, %1, ... %9 are replaced by captured substrings
@result = map(!ref || $$_!~/^%([0-9])\z/ ? $_ : $repl[$1], @{$args[0]});
}
} elsif ($macro_type == $lx_lb) { # iterator macro
my($cvar_r,$sep_r,$body_r); my $cvar; # give meaning to arguments
if (@args >= 3) { ($cvar_r,$body_r,$sep_r) = @args }
else { ($body_r,$sep_r) = @args; $cvar_r = $body_r }
# find the iterator name
for (@$cvar_r) { if (ref && $$_ =~ /^%(.)\z/s) { $cvar = $1; last } }
my $name = $cvar; # macro name is usually the same as the iterator name
if (@args >= 3 && !defined($name)) {
# instead of iterator like %x, the first arg may be a long macro name,
# in which case the iterator name becomes a hard-wired 'x'
$name = tokens_list_to_str($cvar_r);
$name =~ s/^[ \t\n]+//; $name =~ s/[ \t\n]+\z//; # trim whitespace
if ($name eq '') { $name = undef } else { $cvar = 'x' }
}
if (exists($builtins_href->{$name})) {
my $s = $builtins_href->{$name};
if (UNIVERSAL::isa($s,'Amavis::Expand')) { # dynamically defined macro
my(@margs) = ($name); # no arguments beyond %0
my(@res) = map(!ref || $$_ !~ /^%([0-9])\z/ ? $_
: ref($margs[$1]) ? @{$margs[$1]} : (), @$s);
$s = tokens_list_to_str(\@res);
} elsif (ref($s) eq 'CODE') {
if (exists($builtins_cached{$name})) {
$s = $builtins_cached{$name};
} else {
while (ref($s) eq 'CODE') { $s = &$s($name) }
$builtins_cached{$name} = $s;
}
}
my $ind = 0;
for my $val (ref($s) ? @$s : $s) { # do substitutions in the body
push(@result, @$sep_r) if ++$ind > 1 && ref($sep_r);
push(@result, map(ref && $$_ eq "%$cvar" ? $val : $_, @$body_r));
}
}
} elsif ($macro_type == $lx_lbE) { # define a new macro
my $name = tokens_list_to_str(shift(@args)); # first arg is a macro name
$name =~ s/^[ \t\n]+//; $name =~ s/[ \t\n]+\z//; # trim whitespace on name
delete $builtins_cached{$name};
$builtins_href->{$name} = Amavis::Expand->newmacro(@{$args[0]});
} elsif ($macro_type == $lx_lbA || $macro_type == $lx_lbC || # macro call
$$macro_type =~ /^%(\#)?(.)\z/s) {
my $name; my $cardinality_only = 0;
if ($macro_type == $lx_lbA || $macro_type == $lx_lbC) {
$name = tokens_list_to_str($args[0]); # arg %0 is a macro name
$name =~ s/^[ \t\n]+//; $name =~ s/[ \t\n]+\z//; # trim whitespace
} else { # simple macro call %x or %#x
$name = $2;
$cardinality_only = 1 if defined $1;
}
my $s = $builtins_href->{$name};
if (!ref($s)) { # macro expands to a plain string
if (!$cardinality_only) { @result = $s }
else { @result = $s !~ /^\s*\z/ ? 1 : 0 }; # %#x => nonwhite=1, other 0
} elsif (UNIVERSAL::isa($s,'Amavis::Expand')) { # dynamically defined macro
$args[0] = $name; # replace name with a stringified and trimmed form
# expanding a dynamically-defined macro produces a list of tokens;
# formal argument lexels %0, %1, ... %9 are replaced by actual arguments
@result = map(!ref || $$_ !~ /^%([0-9])\z/ ? $_
: ref($args[$1]) ? @{$args[$1]} : (), @$s);
if ($cardinality_only) { # macro call form %#x
@result = tokens_list_to_str(\@result) !~ /^\s*\z/ ? 1 : 0;
}
} else { # subroutine or array ref
if (ref($s) eq 'CODE') {
if (exists($builtins_cached{$name}) && @args <= 1) {
$s = $builtins_cached{$name};
} elsif (@args <= 1) {
while (ref($s) eq 'CODE') { $s = &$s($name) } # callback
$builtins_cached{$name} = $s;
} else {
shift(@args); # discard original form of a macro name
while (ref($s) eq 'CODE') # subroutine callback
{ $s = &$s($name, map(tokens_list_to_str($_), @args)) }
}
}
if ($cardinality_only) { # macro call form %#x
# for array: number of elements; for scalar: nonwhite=1, other 0
@result = ref($s) ? scalar(@$s) : $s !~ /^\s*\z/ ? 1 : 0;
} else { # macro call %x evaluates to the value of macro x
@result = ref($s) ? join(', ',@$s) : $s;
}
}
}
\@result;
}
sub expand($$) {
my($str_ref,$builtins_href) = @_;
# $str_ref ... a ref to a source string to be macro expanded;
# $builtins_href ... a hashref, mapping builtin macro names
# to macro values: strings or array refs
my(@tokens);
if (ref($str_ref) eq 'ARRAY') { @tokens = @$str_ref }
else { tokenize($str_ref,\@tokens) }
my $call_level = 0; my $quote_level = 0;
my(@arg); # stack of arguments lists to nested calls, [0] is top of stack
my(@macro_type); # call stack of macro types (leading lexels) of nested calls
my(@implied_q); # call stack: is implied quoting currently active?
# 0 (not active) or 1 (active); element [0] stack top
my(@open_quote); # quoting stack: opening quote lexel for each quoting level
%builtins_cached = (); my $whereto; local($1,$2);
# preallocate some storage
my $output_str = ''; vec($output_str,2048,8) = 0; $output_str = '';
while (@tokens) {
my $t = shift(@tokens);
# do_log(5, "TOKEN: %s", ref($t) ? "<$$t>" : "'$t'");
if (!ref($t)) { # a plain string, no need to check for quoting levels
if (defined $whereto) { push(@$whereto,$t) } else { $output_str .= $t }
} elsif ($quote_level > 0 && substr($$t,0,1) eq '[') {
# go even deeper into quoting
$quote_level += ($t == $lx_lbQQ) ? 2 : 1; unshift(@open_quote,$t);
if (defined $whereto) { push(@$whereto,$t) } else { $output_str .= $$t }
} elsif ($t == $lx_lbQQ) { # just entering a [" ... "] quoting context
$quote_level += 2; unshift(@open_quote,$t);
# drop a [" , thus stripping one level of quotes
} elsif (substr($$t,0,1) eq '[') {
# $lx_lb $lx_lbS lx_lbT $lx_lbA $lx_lbC $lx_lbE
$call_level++; # open a macro call, start collecting arguments
unshift(@arg, [[]]); unshift(@macro_type, $t); unshift(@implied_q, 0);
$whereto = $arg[0][0];
if ($t == $lx_lb) { # iterator macro implicitly quotes all arguments
$quote_level++; unshift(@open_quote,$t); $implied_q[0] = 1;
}
} elsif ($quote_level <= 1 && $call_level>0 && $t == $lx_sep) { # next arg
unshift(@{$arg[0]}, []); $whereto = $arg[0][0];
if ($macro_type[0]==$lx_lbS && @{$arg[0]} == 2) {
# selector macro implicitly quotes arguments beyond first argument
$quote_level++; unshift(@open_quote,$macro_type[0]); $implied_q[0] = 1;
}
} elsif ($quote_level > 1 && ($t == $lx_rb || $t == $lx_rbQQ)) {
$quote_level -= ($open_quote[0] == $lx_lbQQ) ? 2 : 1;
shift(@open_quote); # pop the quoting stack
if ($t == $lx_rb || $quote_level > 0) { # pass-on if still quoted
if (defined $whereto) { push(@$whereto,$t) } else { $output_str .= $$t}
}
} elsif ($call_level > 0 && ($t == $lx_rb || $t == $lx_rbQQ)) { # evaluate
$call_level--; my $m_type = $macro_type[0];
if ($t == $lx_rbQQ) { # fudge for compatibility: treat "] as two chars
if (defined $whereto) { push(@$whereto,'"') } else { $output_str.='"' }
}
if ($implied_q[0] && $quote_level > 0) {
$quote_level -= ($open_quote[0] == $lx_lbQQ) ? 2 : 1;
shift(@open_quote); # pop the quoting stack
}
my $result_ref = evalmacro($m_type, $builtins_href, reverse @{$arg[0]});
shift(@macro_type); shift(@arg); shift(@implied_q); # pop the call stack
$whereto = $call_level > 0 ? $arg[0][0] : undef;
if ($m_type == $lx_lbC) { # neutral macro call, result implicitly quoted
if (defined $whereto) { push(@$whereto, @$result_ref) }
else { $output_str .= tokens_list_to_str($result_ref) }
} else { # active macro call, push result back to input for reprocessing
unshift(@tokens, @$result_ref);
}
} elsif ($quote_level > 0 ) { # still protect %x and # macro calls
if (defined $whereto) { push(@$whereto,$t) } else { $output_str .= $$t }
} elsif ($t == $lx_h) { # discard tokens up to and including a newline
while (@tokens) { last if shift(@tokens) eq "\n" }
} elsif ($$t =~ /^%\#?.\z/s) { # neutral simple macro call %x or %#x
my $result_ref = evalmacro($t, $builtins_href);
if (defined $whereto) { push(@$whereto,@$result_ref) }
# else { $output_str .= tokens_list_to_str($result_ref) }
else { $output_str .= join('', map(ref($_) ? $$_ : $_, @$result_ref)) }
} elsif ($$t =~ /^_ ([A-Z]+) (?: \( ( [^)]* ) \) )? _\z/xs) {
# neutral simple SA-like macro call, $1 is name, $2 is a single! argument
my $result_ref = evalmacro($lx_lbC, $builtins_href, [$1],
!defined($2) ? () : [$2] );
if (defined $whereto) { push(@$whereto, @$result_ref) }
else { $output_str .= tokens_list_to_str($result_ref) }
} else { # misplaced top-level lexical element
if (defined $whereto) { push(@$whereto,$t) } else { $output_str .= $$t }
}
}
%builtins_cached = (); # clear memory
\$output_str;
}
1;
#
package Amavis::TempDir;
# Handles creation and cleanup of a persistent temporary directory,
# a file 'email.txt' therein, and a subdirectory 'parts'
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::Util qw(ll do_log do_log_safe add_entropy rmdir_recursively);
import Amavis::rfc2821_2822_Tools qw(iso8601_timestamp);
}
use Errno qw(ENOENT EACCES EEXIST);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use File::Temp ();
sub new {
my $class = $_[0];
my $self = bless {}, $class;
$self->{tempdir_path} = undef;
undef $self->{tempdir_dev}; undef $self->{tempdir_ino};
undef $self->{fh_pers}; undef $self->{fh_dev}; undef $self->{fh_ino};
$self->{empty} = 1; $self->{preserve} = 0;
$self;
}
sub path { # path to a temporary directory
@_<2 ? shift->{tempdir_path} : ($_[0]->{tempdir_path} = $_[1])
}
sub fh { # email.txt file handle
@_<2 ? shift->{fh_pers} : ($_[0]->{fh_pers} = $_[1]);
}
sub empty { # whether the directory is empty
@_<2 ? shift->{empty} : ($_[0]->{empty} = $_[1])
}
sub preserve { # whether to preserve directory when current task is done
@_<2 ? shift->{preserve} : ($_[0]->{preserve} = $_[1]);
}
# Clean up the tempdir on shutdown
#
sub DESTROY {
my $self = $_[0];
local($@,$!,$_); my $myactualpid = $$;
if (defined($my_pid) && $myactualpid != $my_pid) {
do_log_safe(5,"TempDir::DESTROY skip, clone [%s] (born as [%s])",
$myactualpid, $my_pid);
} else {
do_log_safe(5,"TempDir::DESTROY called");
eval {
# must step out of the directory which is about to be deleted,
# otherwise rmdir can fail (e.g. on Solaris)
chdir($TEMPBASE)
or do_log(-1,"TempDir::DESTROY can't chdir to %s: %s", $TEMPBASE, $!);
if ($self->{fh_pers}) {
$self->{fh_pers}->close
or do_log(-1,"Error closing temp file: %s", $!);
}
undef $self->{fh_pers};
my $dname = $self->{tempdir_path};
my $errn = !defined($dname) || $dname eq '' ? ENOENT
: lstat($dname) ? 0 : 0+$!;
if (defined($dname) && $errn != ENOENT) {
# this will not be included in the TIMING report,
# but it only occurs infrequently and doesn't take that long
if ($self->{preserve} && !$self->{empty}) {
do_log(-1,"TempDir removal: tempdir is to be PRESERVED: %s", $dname);
} else {
do_log(3, "TempDir removal: %s is being removed: %s%s",
$self->{empty} ? 'empty tempdir' : 'tempdir', $dname,
$self->{preserve} ? ', nothing to preserve' : '');
rmdir_recursively($dname);
}
};
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log_safe(1,"TempDir removal: %s",$eval_stat);
};
}
}
# Creates a temporary directory, or checks that inode did not change on reuse
#
sub prepare_dir {
my $self = $_[0];
my(@stat_list); my $errn; my $reuse = 0;
my $dname = $self->{tempdir_path};
if (defined $dname) { # hope to reuse existing directory
@stat_list = lstat($dname); $errn = @stat_list ? 0 : 0+$!;
if ($errn != ENOENT) {
$reuse = 1; # good, it exists, try reusing it
} else {
do_log(2,"TempDir::prepare_dir: directory %s no longer exists", $dname);
$self->{tempdir_path} = $dname = undef; $self->{empty} = 1;
}
}
if (!defined $dname) {
# invent a name of a temporary directory for this child
my $dirtemplate = sprintf("amavis-%s-%05d-XXXXXXXX",
iso8601_timestamp(time,1), $my_pid);
$dname = File::Temp::tempdir($dirtemplate, DIR => $TEMPBASE);
defined $dname && $dname ne ''
or die "Can't create a temporary directory $TEMPBASE/$dirtemplate: $!";
do_log(4,"TempDir::prepare_dir: created directory %s", $dname);
chmod(0750,$dname)
or die "Can't change protection on directory $dname: $!";
@stat_list = lstat($dname);
@stat_list or die "Failed to access directory $dname: $!";
$self->{tempdir_path} = $dname;
($self->{tempdir_dev}, $self->{tempdir_ino}) = @stat_list;
$self->{empty} = 1; add_entropy($dname, @stat_list);
section_time('mkdir tempdir');
}
$errn = @stat_list ? 0 : 0+$!;
if ($errn != 0) {
die "TempDir::prepare_dir: Can't access temporary directory $dname: $!";
} elsif (! -d _) { # exists, but is not a directory !?
die "TempDir::prepare_dir: $dname is not a directory!!!";
} elsif ($reuse) { # existing directory
my($dev,$ino,$mode,$nlink) = @stat_list;
# perl 5.28: On platforms where inode numbers are of a type larger than
# perl's native integer numerical types, stat will preserve the full
# content of large inode numbers by returning them in the form of strings
# of decimal digits. Use eq rather than == for exact comparison of inode.
if ($dev != $self->{tempdir_dev} || $ino ne $self->{tempdir_ino}) {
do_log(-1,"TempDir::prepare_dir: %s is no longer the same directory!",
$dname);
($self->{tempdir_dev}, $self->{tempdir_ino}) = ($dev, $ino);
}
if ($nlink > 3) {
# when a directory's link count is > 2, it has "n-2" sub-directories;
# this does not apply to file systems like AFS, FAT, ISO-9660,
# but it also seems it does not apply to Mac OS 10 (Leopard)
do_log(5, "TempDir::prepare_dir: directory %s has %d subdirectories",
$dname, $nlink-2);
}
}
}
# Prepares the email.txt temporary file for writing (and reading later)
#
sub prepare_file {
my $self = $_[0];
my $fname = $self->path . '/email.txt';
my(@stat_list) = lstat($fname); my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT) { # no file
do_log(0,"TempDir::prepare_file: %s no longer exists, can't re-use it",
$fname) if $self->{fh_pers};
undef $self->{fh_pers};
} elsif ($errn != 0) { # some other error
undef $self->{fh_pers};
die "TempDir::prepare_file: can't access temporary file $fname: $!";
} elsif (! -f _) { # not a regular file !?
undef $self->{fh_pers};
die "TempDir::prepare_file: $fname is not a regular file!!!";
} elsif ($self->{fh_pers}) {
my($dev,$ino) = @stat_list;
# perl 5.28: On platforms where inode numbers are of a type larger than
# perl's native integer numerical types, stat will preserve the full
# content of large inode numbers by returning them in the form of strings
# of decimal digits. Use eq rather than == for exact comparison of inode.
if ($dev != $self->{file_dev} || $ino ne $self->{file_ino}) {
# may happen if some user code has replaced the file, e.g. by altermime
undef $self->{fh_pers};
do_log(1,"TempDir::prepare_file: %s is no longer the same file, ".
"won't re-use it, deleting", $fname);
unlink($fname) or die "Can't remove file $fname: $!";
}
}
if ($self->{fh_pers} && !$can_truncate) { # just in case clean() retained it
undef $self->{fh_pers};
do_log(1,"TempDir::prepare_file: unable to truncate temporary file %s, ".
"deleting it", $fname);
unlink($fname) or die "Can't remove file $fname: $!";
}
if ($self->{fh_pers}) { # rewind and truncate existing file
$self->{fh_pers}->flush or die "Can't flush mail file: $!";
$self->{fh_pers}->seek(0,0) or die "Can't rewind mail file: $!";
$self->{fh_pers}->truncate(0) or die "Can't truncate mail file: $!";
} else {
do_log(4,"TempDir::prepare_file: creating file %s", $fname);
# $^F == 2
# or do_log(-1,"TempDir::prepare_file: SYSTEM_FD_MAX not 2: %d", $^F);
my $newfh = IO::File->new;
# this can fail if a previous task of this process just recently stumbled
# on some error and preserved its evidence, not deleting a file email.txt
$newfh->open($fname, O_CREAT|O_EXCL|O_RDWR, 0640)
or die "Can't create file $fname: $!";
binmode($newfh,':bytes') or die "Can't cancel :utf8 mode on $fname: $!";
if (ll(5) && $] >= 5.008001) { # get_layers was added with Perl 5.8.1
my(@layers) = PerlIO::get_layers($newfh);
do_log(5,"TempDir::prepare_file: layers: %s", join(',',@layers));
}
$self->{fh_pers} = $newfh;
@stat_list = lstat($fname);
@stat_list or die "Failed to access temporary file $fname: $!";
add_entropy(@stat_list);
($self->{file_dev}, $self->{file_ino}) = @stat_list;
section_time('create email.txt');
}
}
# Cleans the temporary directory for reuse, unless it is set to be preserved
#
sub clean {
my $self = $_[0];
if ($self->{preserve} && !$self->{empty}) {
# keep evidence in case of trouble
do_log(-1,"PRESERVING EVIDENCE in %s", $self->{tempdir_path});
if ($self->{fh_pers}) {
$self->{fh_pers}->close or die "Error closing mail file: $!"
}
undef $self->{fh_pers}; $self->{tempdir_path} = undef; $self->{empty} = 1;
}
# cleanup, but leave directory (and file handle if possible) for reuse
if ($self->{fh_pers} && !$can_truncate) {
# truncate is not standard across all Unix variants,
# it is not Posix, but is XPG4-UNIX.
# So if we can't truncate a file and leave it open,
# we have to create it anew later, at some cost.
#
$self->{fh_pers}->close or die "Error closing mail file: $!";
undef $self->{fh_pers};
unlink($self->{tempdir_path}.'/email.txt')
or die "Can't delete file ".$self->{tempdir_path}."/email.txt: $!";
section_time('delete email.txt');
}
if (defined $self->{tempdir_path}) { # prepare for the next one
$self->strip; $self->{empty} = 1;
}
$self->{preserve} = 0; # reset
}
# Remove files and subdirectories from the temporary directory, leaving only
# the directory itself, file email.txt, and empty subdirectory ./parts .
# Leaving directories for reuse can represent an important saving in time,
# as directory creation + deletion can be an expensive operation,
# requiring atomic file system operation, including flushing buffers
# to disk (depending on the file system in use).
#
sub strip {
my $self = $_[0];
my $dname = $self->{tempdir_path};
do_log(4, "TempDir::strip: %s", $dname);
# must step out of the directory which is about to be deleted,
# otherwise rmdir can fail (e.g. on Solaris)
chdir($TEMPBASE) or die "TempDir::strip: can't chdir to $TEMPBASE: $!";
my(@stat_list) = lstat($dname);
my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT) {
do_log(-1,"TempDir::strip: directory %s no longer exists", $dname);
$self->{tempdir_path} = $dname = undef; $self->{empty} = 1;
} elsif ($errn != 0) {
die "TempDir::strip: error accessing directory $dname: $!";
} else {
my($dev,$ino) = @stat_list;
# perl 5.28: On platforms where inode numbers are of a type larger than
# perl's native integer numerical types, stat will preserve the full
# content of large inode numbers by returning them in the form of strings
# of decimal digits. Use eq rather than == for exact comparison of inode.
if ($dev != $self->{tempdir_dev} || $ino ne $self->{tempdir_ino}) {
do_log(-1,"TempDir::strip: %s is no longer the same directory!",
$dname);
($self->{tempdir_dev}, $self->{tempdir_ino}) = ($dev, $ino);
}
# now deal with the 'parts' subdirectory
my $errn = lstat("$dname/parts") ? 0 : 0+$!;
if ($errn == ENOENT) {} # fine, no such directory
elsif ($errn!=0) { die "TempDir::strip: error accessing $dname/parts: $!" }
elsif ( -l _) { die "TempDir::strip: $dname/parts is a symbolic link" }
elsif (!-d _) { die "TempDir::strip: $dname/parts is not a directory" }
else { rmdir_recursively("$dname/parts", 1) }
$self->check; # check for any remains in the top directory just in case
}
1;
}
# Checks tempdir after being cleaned.
# It may only contain subdirectory 'parts' and file email.txt, nothing else.
#
sub check {
my $self = $_[0];
my $eval_stat; my $dname = $self->{tempdir_path};
local(*DIR); opendir(DIR,$dname) or die "Can't open directory $dname: $!";
eval {
# avoid slurping the whole directory contents into memory
$! = 0; my $f;
while (defined($f = readdir(DIR))) {
next if $f eq '.' || $f eq '..';
my $fname = $dname . '/' . $f;
my(@stat_list) = lstat($fname);
my $errn = @stat_list ? 0 : 0+$!;
if ($errn) {
die "Inaccessible $fname: $!";
} elsif (-f _) {
warn "Unexpected file $fname" if $f ne 'email.txt';
} elsif (-l _) {
die "Unexpected link $fname";
} elsif (-d _) {
my $nlink = $stat_list[3];
if ($f ne 'parts') {
die "Unexpected directory $fname";
} elsif ($nlink > 2) { # number of hard links
# when a directory's link count is > 2, it has "n-2" sub-directories;
# this does not apply to file systems like AFS, FAT, ISO-9660,
# but it also seems it does not apply to Mac OS 10 (Leopard)
do_log(5, "TempDir::check: directory %s has %d subdirectories",
$dname, $nlink-2);
}
} else {
die "Unexpected non-regular file $fname";
}
}
# checking status on directory read ops doesn't work as expected, Perl bug
# $! == 0 or die "Error reading directory $dname: $!";
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
closedir(DIR) or die "Error closing directory $dname: $!";
if (defined $eval_stat) {
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "TempDir::check: $eval_stat\n";
}
1;
}
1;
#
package Amavis::IO::FileHandle;
# Provides a virtual file (a filehandle tie - a TIEHANDLE) representing
# a view to a mail message (accessed on an open file handle) prefixed by
# a couple of synthesized mail header fields supplied as an array of lines.
use strict;
use re 'taint';
use Errno qw(EAGAIN);
sub new { shift->TIEHANDLE(@_) }
sub TIEHANDLE {
my $class = shift;
my $self = bless { 'fileno' => undef }, $class;
if (@_) { $self->OPEN(@_) or return }
$self;
}
sub UNTIE {
my($self,$count) = @_;
$self->CLOSE if !$count && defined $self->FILENO;
1;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
$self->CLOSE if defined $self->FILENO;
1;
}
sub BINMODE { 1 }
sub FILENO { my $self = $_[0]; $self->{'fileno'} }
sub CLOSE { my $self = $_[0]; undef $self->{'fileno'}; 1 }
sub EOF { my $self = $_[0]; defined $self->{'fileno'} ? $self->{'eof'} : 1 }
# creates a view on an already open file, prepended by some text
#
sub OPEN {
my($self, $filehandle,$prefix_lines_ref,$size_limit) = @_;
# $filehandle is a fh of an already open file;
# $prefix_lines_ref is a ref to an array of lines, to be prepended
# to a created view on an existing file; these lines must each
# be terminated by a \n, and must not include other \n characters
$self->CLOSE if defined $self->FILENO;
$self->{'fileno'} = 9999; $self->{'eof'} = 0;
$self->{'prefix'} = $prefix_lines_ref;
$self->{'prefix_n'} = 0; # number of lines of a prefix
$self->{'prefix_l'} = 0; # number of characters of a prefix
$self->{'pos'} = 0; $self->{'rec_ind'} = 0;
$self->{'size_limit'} = $size_limit; # pretend file ends at the byte limit
if (ref $prefix_lines_ref) {
my $len = 0;
$len += length($_) for @$prefix_lines_ref;
$self->{'prefix_l'} = $len;
$self->{'prefix_n'} = @$prefix_lines_ref;
}
$self->{'handle'} = $filehandle;
seek($filehandle, 0,0); # also provides a return value and errno
};
sub SEEK {
my($self,$offset,$whence) = @_;
$whence == 0 or die "Only absolute SEEK is supported on this file";
$offset == 0 or die "Only SEEK(0,0) is supported on this file";
$self->{'eof'} = 0; $self->{'pos'} = 0; $self->{'rec_ind'} = 0;
seek($self->{'handle'}, 0,0); # also provides a return value and errno
}
# sub TELL (not implemented)
# Returns the current position in bytes for FILEHANDLE, or -1 on error.
# mixing of READ and READLINE is not supported (without rewinding inbetween)
#
sub READLINE {
my $self = $_[0];
my $size_limit = $self->{'size_limit'};
my $pos = $self->{'pos'};
if ($self->{'eof'}) {
return;
} elsif (defined $size_limit && $pos >= $size_limit) {
$self->{'eof'} = 1;
return;
} elsif (wantarray) { # return entire file as an array
my $rec_ind = $self->{'rec_ind'}; $self->{'eof'} = 1;
my $fh = $self->{'handle'};
if (!defined $size_limit) {
$self->{'rec_ind'} = $self->{'prefix_n'}; # just an estimate
$self->{'pos'} = $self->{'prefix_l'}; # just an estimate
if ($rec_ind >= $self->{'prefix_n'}) {
return readline($fh);
} elsif ($rec_ind == 0) { # common case: get the whole thing
return ( @{$self->{'prefix'}}, readline($fh) );
} else {
return ( @{$self->{'prefix'}}[ $rec_ind .. $#{$self->{'prefix'}} ],
readline($fh) );
}
} else { # take size limit into account
my(@array);
if ($rec_ind == 0) {
@array = @{$self->{'prefix'}};
} elsif ($rec_ind < $self->{'prefix_n'}) {
@array = @{$self->{'prefix'}}[ $rec_ind .. $#{$self->{'prefix'}} ];
}
for my $j (0..$#array) {
$pos += length($array[$j]);
if ($pos >= $size_limit) { # truncate at NL past limit
$#array = $j; last;
}
}
my $nread = 0;
if ($pos < $size_limit) {
my($inbuf,$carry); my $beyond_limit = 0;
while ( $nread=read($fh,$inbuf,16384) ) { # faster than line-by-line
if ($pos+$nread >= $size_limit) {
my $k = index($inbuf, "\n", # find a clean break at next NL
$pos >= $size_limit ? 0 : $size_limit-$pos);
substr($inbuf, $k >= 0 ? $k+1 : $size_limit-$pos) = '';
$beyond_limit = 1;
}
$pos += $nread;
my $k = $#array + 1; # insertion point
push(@array, split(/^/m, $inbuf, -1));
if (defined $carry) { $array[$k] = $carry.$array[$k]; $carry=undef }
$carry = pop(@array) if substr($array[-1],-1,1) ne "\n";
last if $beyond_limit;
}
push(@array,$carry) if defined $carry;
}
$self->{'rec_ind'} = $rec_ind + @array;
$self->{'pos'} = $pos;
if (!defined $nread) {
undef @array;
# errno should still be in $!, caller should be checking it
# die "error reading: $!";
}
return @array;
}
} else { # read one line
if ($self->{'rec_ind'} < $self->{'prefix_n'}) {
my $line = $self->{'prefix'}->[$self->{'rec_ind'}];
$self->{'rec_ind'}++; $self->{'pos'} += length($line);
return $line;
} else {
my $line = scalar(readline($self->{'handle'}));
if (!defined($line)) { $self->{'eof'} = 1 } # errno in $!
else { $self->{'rec_ind'}++; $self->{'pos'} += length($line) }
return $line;
}
}
}
# mixing of READ and READLINE is not supported (without rewinding inbetween)
#
sub READ { # SCALAR,LENGTH,OFFSET
my $self = shift; my $len = $_[1]; my $offset = $_[2];
my $str = ''; my $nbytes = 0;
my $pos = $self->{'pos'};
my $beyond_limit = 0;
my $size_limit = $self->{'size_limit'};
if (defined $size_limit && $pos+$len > $size_limit) {
$len = $pos >= $size_limit ? 0 : $size_limit - $pos;
$beyond_limit = 1;
}
if ($len > 0 && $pos < $self->{'prefix_l'}) {
# not efficient, but typically only occurs once
$str = substr(join('',@{$self->{'prefix'}}), $pos, $len);
$nbytes += length($str); $len -= $nbytes;
}
my $msg; my $buff_directly_accessed = 0;
if ($len > 0) {
# avoid shuffling data through multiple buffers for a common case
$buff_directly_accessed = $nbytes == 0;
my $nb = $buff_directly_accessed
? read($self->{'handle'}, $_[0], $len, $offset)
: read($self->{'handle'}, $str, $len, $nbytes);
if (!defined $nb) {
$msg = "Error reading: $!";
} elsif ($nb < 1) { # read returns 0 at eof
$self->{'eof'} = 1;
} else {
$nbytes += $nb; $len -= $nb;
}
}
if (defined $msg) {
undef $nbytes; # $! already set by a failed sysread
} elsif ($beyond_limit && $nbytes == 0) {
$self->{'eof'} = 1;
} else {
if (!$buff_directly_accessed) {
($offset ? substr($_[0],$offset) : $_[0]) = $str;
}
$pos += $nbytes; $self->{'pos'} = $pos;
}
$nbytes; # eof: 0; error: undef
}
sub close { shift->CLOSE(@_) }
sub fileno { shift->FILENO(@_) }
sub binmode { shift->BINMODE(@_) }
sub seek { shift->SEEK(@_) }
#sub tell { shift->TELL(@_) }
sub read { shift->READ(@_) }
sub readline { shift->READLINE(@_) }
sub getlines { shift->READLINE(@_) }
sub getline { scalar(shift->READLINE(@_)) }
1;
#
package Amavis::IO::Zlib;
# A simple IO::File -compatible wrapper around Compress::Zlib,
# much like IO::Zlib but simpler: does only what we need and does it carefully
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
}
use Errno qw(EIO);
use Compress::Zlib;
sub new {
my $class = shift; my $self = bless {}, $class;
if (@_) { $self->open(@_) or return }
$self;
}
sub close {
my $self = $_[0];
my $status; my $eval_stat; local($1,$2);
eval { $status = $self->{fh}->gzclose; 1 }
or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
delete $self->{fh};
if (defined $eval_stat) {
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
# can't stash arbitrary text into $!
die "gzclose error: $eval_stat, $gzerrno";
$! = EIO; return; # not reached
} elsif ($status != Z_OK) {
die "gzclose error: $gzerrno"; # can't stash arbitrary text into $!
$! = EIO; return; # not reached
}
1;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
# ignore failure, make perlcritic happy
if ($self && $self->{fh}) { eval { $self->close } or 1 }
}
sub open {
my($self,$fname,$mode) = @_;
# ignore failure, make perlcritic happy
if (exists($self->{fh})) { eval { $self->close } or 1; delete $self->{fh} }
$self->{fname} = $fname; $self->{mode} = $mode; $self->{pos} = 0;
my $gz = gzopen($fname,$mode);
if ($gz) {
$self->{fh} = $gz;
} else {
die "gzopen error: $gzerrno"; # can't stash arbitrary text into $!
$! = EIO; undef $gz; # not reached
}
$gz;
}
sub seek {
my($self,$pos,$whence) = @_;
$whence == 0 or die "Only absolute seek is supported on gzipped file";
$pos >= 0 or die "Can't seek to a negative absolute position";
$self->{mode} eq 'rb'
or die "Seek to $whence,$pos on gzipped file only supported for 'rb' mode";
if ($pos < $self->{pos}) {
$self->close or die "seek: can't close gzipped file: $!";
$self->open($self->{fname},$self->{mode})
or die "seek: can't reopen gzipped file: $!";
}
my $skip = $pos - $self->{pos};
while ($skip > 0) {
my $s; my $nbytes = $self->read($s,$skip); # acceptable for small skips
defined $nbytes && $nbytes > 0
or die "seek: error skipping $skip bytes on gzipped file: $!";
$skip -= $nbytes;
}
1; # seek is supposed to return 1 upon success, 0 otherwise
}
sub read { # SCALAR,LENGTH,OFFSET
my $self = shift; my $len = $_[1]; my $offset = $_[2];
defined $len or die "Amavis::IO::Zlib::read: length argument undefined";
my $nbytes;
if (!defined($offset) || $offset == 0) {
$nbytes = $self->{fh}->gzread($_[0], $len);
} else {
my $buff;
$nbytes = $self->{fh}->gzread($buff, $len);
substr($_[0],$offset) = $buff;
}
if ($nbytes < 0) {
die "gzread error: $gzerrno"; # can't stash arbitrary text into $!
$! = EIO; undef $nbytes; # not reached
} else {
$self->{pos} += $nbytes;
}
$nbytes; # eof: 0; error: undef
}
sub getline {
my $self = $_[0]; my($nbytes,$line);
$nbytes = $self->{fh}->gzreadline($line);
if ($nbytes <= 0) { # eof (0) or error (-1)
$! = 0; $line = undef;
if ($nbytes < 0 && $gzerrno != Z_STREAM_END) {
die "gzreadline error: $gzerrno"; # can't stash arbitrary text into $!
$! = EIO; # not reached
}
} else {
$self->{pos} += $nbytes;
}
$line; # eof: undef, $! zero; error: undef, $! nonzero
}
sub print {
my $self = shift;
my $buff_ref = @_ == 1 ? \$_[0] : \join('',@_);
my $nbytes; my $len = length($$buff_ref);
if ($len <= 0) {
$nbytes = "0 but true";
} else {
$nbytes = $self->{fh}->gzwrite($$buff_ref); $self->{pos} += $len;
if ($nbytes <= 0) {
die "gzwrite error: $gzerrno"; # can't stash arbitrary text into $!
$! = EIO; undef $nbytes; # not reached
}
}
$nbytes;
}
sub printf { shift->print(sprintf(shift,@_)) }
1;
#
package Amavis::IO::RW;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform);
import Amavis::Util qw(ll do_log min max minmax idn_to_ascii);
}
use Errno qw(EIO EINTR EAGAIN EPIPE ENOTCONN ECONNRESET);
use Time::HiRes ();
use IO::Socket;
use IO::Socket::UNIX;
use IO::Socket::SSL;
# Connect to one of the specified sockets. The $socket_specs may be a
# simple string ([inet-host]:port, [inet6-host]:port, or a unix socket name),
# optionally prefixed by a protocol name (scheme) and a colon (the prefix is
# ignored here, just avoids a need for parsing by a caller); or it can be
# a ref to a list of such socket specifications, which are tried one after
# another until a connection is successful. In case of a listref, it leaves
# a good socket as the first entry in the list so that it will be tried first
# on a next call.
# The 'Timeout' argument controls both the connect timeout as well as the
# timeout of a select() call in rw_loop() - but may be changed through a
# timeout() method.
#
sub new {
my($class, $socket_specs, %arg) = @_;
my $self = bless {}, $class;
$self->timeout($arg{Timeout});
$self->{eol_str} = !defined $arg{Eol} ? "\n" : $arg{Eol};
$self->{inp_sane_size} = !$arg{InpSaneSize} ? 500000 : $arg{InpSaneSize};
$self->{last_event_time} = 0; $self->{last_event_tx_time} = 0;
$self->{inp} = ''; $self->{out} = '';
$self->{inpeof} = 0; $self->{ssl_active} = 0;
$socket_specs = [ $socket_specs ] if !ref $socket_specs;
my($protocol,$socketname,$sock,$eval_stat);
my $attempts = 0; my(@failures);
my $n_candidates = scalar @$socket_specs;
$n_candidates > 0 or die "Can't connect, no sockets specified!?"; # sanity
for (;;) {
if ($n_candidates > 1) { # pick one at random, put it to head of the list
my $j = int(rand($n_candidates));
ll(5) && do_log(5, "picking candidate #%d (of %d) in %s",
$j+1, $n_candidates, join(', ',@$socket_specs));
@$socket_specs[0,$j] = @$socket_specs[$j,0] if $j != 0;
}
$socketname = $socket_specs->[0]; # try the first on the list
local($1);
$socketname =~ s/^([a-z][a-z0-9.+-]*)?://si; # strip protocol name
$protocol = lc($1); # kept for the benefit of a caller
$self->{socketname} = undef;
$attempts++;
eval {
$sock = $self->connect_attempt($socketname, %arg);
$sock or die "Error connecting to socket $socketname\n";
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
undef $sock;
};
if ($sock) { # mission accomplished
if (!@failures) {
do_log(5, "connected to %s successfully", $self->{socketname});
} else {
do_log(1, "connected to %s successfully after %d failures on: %s",
$self->{socketname}, scalar(@failures), join(', ',@failures));
}
last;
} else { # failure, prepare for a retry with a next entry if any
$n_candidates--;
my $ll = $attempts > 1 || $n_candidates <= 0 ? -1 : 1;
ll($ll) && do_log($ll, "connect to %s failed, attempt #%d: %s%s",
$socketname, $attempts, $eval_stat,
$n_candidates <= 0 ? '' : ', trying next');
push(@failures, $socketname);
# circular shift left, move a bad candidate to the end of the list
push(@$socket_specs, shift @$socket_specs) if @$socket_specs > 1;
last if $n_candidates <= 0;
}
}
$sock or die("All attempts ($attempts) failed connecting to ".
join(', ',@$socket_specs) . "\n");
$self->{socket} = $sock;
$self->{protocol} = $protocol;
$self;
}
sub connect_attempt {
my($self, $socketname, %arg) = @_;
my $sock;
my($localaddr, $localport) = ($arg{LocalAddr}, $arg{LocalPort});
my $blocking = 1; # blocking mode defaults to on
$blocking = 0 if defined $arg{Blocking} && !$arg{Blocking};
my $timeout = $self->timeout;
my $timeout_displ = !defined $timeout ? 'undef'
: int($timeout) == $timeout ? "$timeout"
: sprintf("%.3f",$timeout);
my($peeraddress, $peerport, $is_inet); local($1,$2,$3);
if ($socketname =~ m{^/}) { # simpleminded: unix vs. inet
$is_inet = 0;
} elsif ($socketname =~ /^(?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*)/xs) {
# ignore possible further fields after the "proto:addr:port:..." last colon
$peeraddress = defined $1 ? $1 : $2; $peerport = $3; $is_inet = 1;
} elsif ($socketname =~ /^(?: \[ ([^\]]*) \] | ([0-9a-fA-F.:]+) ) \z/xs) {
$peeraddress = defined $1 ? $1 : $2; $is_inet = 1;
} else { # probably a syntax error, but let's assume it is a Unix socket
$is_inet = 0;
}
if ($is_inet) {
if (defined $peeraddress && $peeraddress eq '*') {
$peeraddress = $arg{WildcardImpliedHost};
defined $peeraddress
or die "Wildcarded host, but client's address not known: $socketname";
}
if (!defined $peeraddress || $peeraddress eq '') {
die "Empty/unknown host address in socket specification: $socketname";
}
$peerport = $arg{Port} if !defined $peerport || $peerport eq '';
if (defined $peerport && $peerport eq '*') {
$peerport = $arg{WildcardImpliedPort};
defined $peerport
or die "Wildcarded port, but client's port not known: $socketname";
}
if (!defined $peerport || $peerport eq '') {
die "Empty/unknown port number in socket specification: $socketname";
} elsif ($peerport !~ /^\d{1,5}\z/ || $peerport < 1 || $peerport > 65535) {
die "Invalid port number in socket specification: $socketname";
}
}
$self->{last_event_time} = $self->{last_event_tx_time} = Time::HiRes::time;
if (!$is_inet) {
# unix socket
ll(3) && do_log(3, "new socket by IO::Socket::UNIX to %s, ".
"timeout set to %s", $socketname, $timeout_displ);
$sock = IO::Socket::UNIX->new(
# Domain => AF_UNIX,
Type => SOCK_STREAM, Timeout => $timeout);
$sock or die "Can't create UNIX socket: $!\n";
$sock->connect( pack_sockaddr_un($socketname) )
or die "Can't connect to a UNIX socket $socketname: $!\n";
$self->{last_event} = 'new-unix';
} else { # inet or inet6
defined $io_socket_module_name
or die "No INET or INET6 socket module is available";
my $local_sock_displ = '';
$peeraddress = idn_to_ascii($peeraddress);
my(%args) = (Type => SOCK_STREAM, Proto => 'tcp', Blocking => $blocking,
PeerAddr => $peeraddress, PeerPort => $peerport);
# Timeout => $timeout, # produces: Invalid argument
if (defined $localaddr && $localaddr ne '') {
$args{LocalAddr} = $localaddr;
$local_sock_displ .= '[' . $localaddr . ']';
}
if (defined $localport && $localport ne '') {
$args{LocalPort} = $localport;
$local_sock_displ .= ':' . $localport;
}
ll(3) && do_log(3,"new socket using %s to [%s]:%s, timeout %s%s%s",
$io_socket_module_name, $peeraddress, $peerport,
$timeout_displ, $blocking ? '' : ', nonblocking',
$local_sock_displ eq '' ? ''
: ', local '.$local_sock_displ);
$sock = $io_socket_module_name->new(%args);
if (!$sock) {
# note: the IO::Socket::IP constructor provides an error message in $@
die sprintf("Can't connect to socket %s using module %s: %s\n",
$socketname, $io_socket_module_name,
$io_socket_module_name eq 'IO::Socket::IP' ? $@ : $!);
}
$self->{last_event} = 'new-' . $io_socket_module_name;
}
if ($sock) {
$self->{socketname} = $is_inet ? "[$peeraddress]:$peerport" : $socketname;
}
$sock;
}
sub internal_close {
my($self, $destroying) = @_;
my $sock = $self->{socket};
my $status = 1; # ok
if (!defined($sock)) {
# nothing to do
} elsif (!defined fileno($sock)) { # not really open
$sock->close; # ignoring errors
} else {
my $flush_status = 1; # ok
eval { # don't let errors during flush prevent us from closing a socket
$flush_status = $self->flush;
} or do {
undef $flush_status; # false, indicates a signalled failure
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log($destroying ? 5 : 1,
"closing: Error flushing socket in Amavis::IO::RW::%s: %s",
$destroying?'DESTROY':'close', $eval_stat);
};
$self->{last_event} = 'close';
$self->{last_event_time} = $self->{last_event_tx_time} = Time::HiRes::time;
$! = 0; $status = $sock->close;
$status or do_log($destroying ? 5 : 1,
"closing: Error closing socket in Amavis::IO::RW::%s: %s",
$destroying?'DESTROY':'close',
!$self->{ssl_active} ? $! : $sock->errstr.", $!" );
$status = $flush_status if $status && !$flush_status;
}
$status;
}
sub close {
my $self = $_[0];
$self->internal_close(0);
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
# ignore failure, make perlcritic happy
eval { $self->internal_close(1) } or 1;
}
sub rw_loop {
my($self,$needline,$flushoutput) = @_;
#
# RFC 2920: Client SMTP implementations MAY elect to operate in a nonblocking
# fashion, processing server responses immediately upon receipt, even if
# there is still data pending transmission from the client's previous TCP
# send operation. If nonblocking operation is not supported, however, client
# SMTP implementations MUST also check the TCP window size and make sure that
# each group of commands fits entirely within the window. The window size
# is usually, but not always, 4K octets. Failure to perform this check can
# lead to deadlock conditions.
#
# We choose to operate in a nonblocking mode. Responses are read as soon as
# they become available and stored for later, but not immediately processed
# as they come in. This requires some sanity limiting against rogue servers.
#
my $sock = $self->{socket};
my $fd_sock = fileno($sock);
my $timeout = $self->timeout;
my $timeout_displ = !defined $timeout ? 'undef'
: int($timeout) == $timeout ? "$timeout"
: sprintf("%.3f",$timeout);
my $eol_str = $self->{eol_str};
my $idle_cnt = 0; my $failed_write_attempts = 0;
local $SIG{PIPE} = 'IGNORE'; # don't signal on a write to a widowed pipe
for (;;) {
$idle_cnt++;
my($rout,$wout,$eout,$rin,$win,$ein); $rin=$win=$ein='';
my $want_to_write = $self->{out} ne '' && ($flushoutput || $needline);
ll(5) && do_log(5, 'rw_loop: needline=%d, flush=%s, wr=%d, timeout=%s',
$needline, $flushoutput, $want_to_write, $timeout_displ);
if (!defined($fd_sock)) {
do_log(3, 'rw_loop read: got a closed socket');
$self->{inpeof} = 1; last;
}
vec($rin,$fd_sock,1) = 1;
vec($win,$fd_sock,1) = $want_to_write ? 1 : 0;
$ein = $rin | $win;
$self->{last_event} = 'select';
$self->{last_event_time} = Time::HiRes::time;
my($nfound,$timeleft) =
select($rout=$rin, $wout=$win, $eout=$ein, $timeout);
defined $nfound && $nfound >= 0
or die "Select failed: ".
(!$self->{ssl_active} ? $! : $sock->errstr.", $!");
if (vec($rout,$fd_sock,1)) {
ll(5) && do_log(5, 'rw_loop: receiving');
my $inbuf = ''; $! = 0;
my $nread = sysread($sock,$inbuf,16384);
if ($nread) { # successful read
$self->{last_event} = 'read-ok';
$self->{inpeof} = 0;
ll(5) && do_log(5,'rw_loop read %d chars< %s', length($inbuf),$inbuf);
$self->{inp} .= $inbuf; $idle_cnt = 0;
length($self->{inp}) < $self->{inp_sane_size}
or die "rw_loop: Aborting on a runaway server, inp_len=" .
length($self->{inp});
} elsif (defined $nread) { # defined but zero, sysread returns 0 at eof
$self->{last_event} = 'read-eof';
$self->{inpeof} = 1; do_log(3, 'rw_loop read: got eof');
} elsif ($! == EAGAIN || $! == EINTR) {
$self->{last_event} = 'read-intr'.(0+$!);
$idle_cnt = 0;
do_log($SSL_ERROR == SSL_WANT_READ ? 4 : 2,
'rw_loop read interrupted: %s',
!$self->{ssl_active} ? $! : $sock->errstr.", $!");
Time::HiRes::sleep(0.1); # slow down, just in case
# retry
} else {
$self->{last_event} = 'read-fail';
$self->{inpeof} = 1;
die "Error reading from socket: ".
(!$self->{ssl_active} ? $! : $sock->errstr.", $!");
}
$self->{last_event_time} = Time::HiRes::time;
}
if (vec($wout,$fd_sock,1)) {
my $out_l = length($self->{out});
ll(5) && do_log(5,'rw_loop: sending %d chars', $out_l);
my $nwrite = syswrite($sock, $self->{out});
if (!defined($nwrite)) {
if ($! == EAGAIN || $! == EINTR) {
$self->{last_event} = 'write-intr'.(0+$!);
$idle_cnt = 0; $failed_write_attempts++;
do_log(2, 'rw_loop writing %d bytes interrupted: %s', $out_l,
!$self->{ssl_active} ? $! : $sock->errstr.", $!");
Time::HiRes::sleep(0.1); # slow down, just in case
} else {
$self->{last_event} = 'write-fail';
die sprintf('Error writing %d bytes to socket: %s', $out_l,
!$self->{ssl_active} ? $! : $sock->errstr.", $!");
}
} else { # successful write
$self->{last_event} = 'write-ok';
my $ll = $nwrite != $out_l ? 4 : 5;
if (ll($ll)) {
my $msg = $nwrite==$out_l ? sprintf("%d", $nwrite)
: sprintf("%d (of %d)", $nwrite,$out_l);
my $nlog = min(200,$nwrite);
do_log($ll, 'rw_loop sent %s> %s%s',
$msg, substr($self->{out},0,$nlog), $nlog<$nwrite?' [...]':'');
};
$idle_cnt = 0;
if ($nwrite <= 0) { $failed_write_attempts++ }
elsif ($nwrite < $out_l) { substr($self->{out},0,$nwrite) = '' }
else { $self->{out} = '' }
}
$self->{last_event_time} = $self->{last_event_tx_time} =
Time::HiRes::time;
}
if ( ( !$needline || !defined($eol_str) || $eol_str eq '' ||
index($self->{inp},$eol_str) >= 0 ) &&
( !$flushoutput || $self->{out} eq '' ) ) {
last;
}
if ($self->{inpeof}) {
if ($self->{out} ne '') {
do_log(2, 'rw_loop: EOF on input, output buffer not yet empty');
}
last;
}
if ($idle_cnt > 0) { # probably exceeded timeout in select
do_log(-1, 'rw_loop: leaving rw loop, no progress, '.
'last event (%s) %.3f s ago', $self->{last_event},
Time::HiRes::time - $self->{last_event_time});
last;
}
$failed_write_attempts < 100 or die "rw_loop: Aborting stalled sending";
}
}
sub socketname
{ @_<2 ? shift->{socketname} : ($_[0]->{socketname} = $_[1]) }
sub protocol
{ @_<2 ? shift->{protocol} : ($_[0]->{protocol} = $_[1]) }
sub timeout
{ @_<2 ? shift->{timeout} : ($_[0]->{timeout} = $_[1]) }
sub ssl_active
{ @_<2 ? shift->{ssl_active} : ($_[0]->{ssl_active} = $_[1]) }
sub eof
{ @_<2 ? shift->{client_ip} : ($_[0]->{client_ip} = $_[1]) }
sub last_io_event_timestamp
{ my($self,$keyword) = @_; $self->{last_event_time} }
sub last_io_event_tx_timestamp
{ my($self,$keyword) = @_; $self->{last_event_tx_time} }
sub flush
{ my $self = $_[0]; $self->rw_loop(0,1) if $self->{out} ne ''; 1 }
sub discard_pending_output
{ my $self = $_[0]; my $len = length $self->{out}; $self->{out} = ''; $len }
sub out_buff_large
{ my $self = $_[0]; length $self->{out} > 40000 }
sub print {
my $self = shift;
$self->{out} .= $_ for @_;
# $self->out_buff_large ? $self->flush : 1;
length $self->{out} > 40000 ? $self->flush : 1; # inlined out_buff_large()
}
sub at_line_boundary {
my $self = $_[0];
my $eol_str = $self->{eol_str};
my $eol_str_l = !defined($eol_str) ? 0 : length($eol_str);
!$eol_str_l ? 1
: substr($self->{out}, -$eol_str_l, $eol_str_l) eq $eol_str ? 1 : 0;
}
# returns true if there is any full line (or last incomplete line)
# in the buffer waiting to be read, 0 otherwise, undef on eof or error
#
sub response_line_available {
my $self = $_[0];
my $eol_str = $self->{eol_str};
if (!defined $eol_str || $eol_str eq '') {
return length($self->{inp});
} elsif (index($self->{inp},$eol_str) >= 0) {
return 1;
} elsif ($self->{inpeof} && $self->{inp} eq '') {
return; # undef on end-of-file
} elsif ($self->{inpeof}) { # partial last line
return length($self->{inp});
}
}
# get one full text line, or last partial line, or undef on eof/error/timeout
#
sub get_response_line {
my $self = $_[0];
my $ind; my $attempts = 0;
my $eol_str = $self->{eol_str};
my $eol_str_l = !defined($eol_str) ? 0 : length($eol_str);
for (;;) {
if (!$eol_str_l) {
my $str = $self->{inp}; $self->{inp} = ''; return $str;
} elsif (($ind=index($self->{inp},$eol_str)) >= 0) {
return substr($self->{inp},0,$ind+$eol_str_l,'');
} elsif ($self->{inpeof} && $self->{inp} eq '') {
$! = 0; return; # undef on end-of-file
} elsif ($self->{inpeof}) { # return partial last line
my $str = $self->{inp}; $self->{inp} = ''; return $str;
} elsif ($attempts > 0) {
$! = EIO; return; # timeout or error
}
# try reading some more input, one attempt only
$self->rw_loop(1,0); $attempts++;
}
}
# read whatever is available, up to LENGTH bytes
#
sub read { # SCALAR,LENGTH,OFFSET
my $self = shift; my $len = $_[1]; my $offset = $_[2];
defined $len or die "Amavis::IO::RW::read: length argument undefined";
$len >= 0 or die "Amavis::IO::RW::read: length argument negative";
$self->rw_loop(0,0);
my $nbytes = length($self->{inp});
$nbytes = $len if $len < $nbytes;
if (!defined($offset) || $offset == 0) {
$_[0] = substr($self->{inp}, 0, $len, '');
} else {
substr($_[0],$offset) = substr($self->{inp}, 0, $len, '');
}
$nbytes; # eof: 0; error: undef
}
use vars qw($ssl_cache);
sub ssl_upgrade {
my($self, %tls_options) = @_;
$self->flush;
IO::Socket::SSL->VERSION(1.05); # required minimal version
$ssl_cache = IO::Socket::SSL::Session_Cache->new(2) if !defined $ssl_cache;
my $sock = $self->{socket};
IO::Socket::SSL->start_SSL($sock,
SSL_session_cache => $ssl_cache,
SSL_error_trap => sub {
my($sock,$msg) = @_;
do_log(-2,"Upgrading socket to TLS failed (in ssl_upgrade): %s", $msg);
},
%tls_options,
) or die "Error upgrading output socket to TLS: ".IO::Socket::SSL::errstr();
$self->{last_event} = 'ssl-upgrade';
$self->{last_event_time} = $self->{last_event_tx_time} = Time::HiRes::time;
$self->{ssl_active} = 1;
# An IO::Socket::SSL socket can block a sysread
# even if selected for read. See issue 74 and
# perldoc IO::Socket::SSL `Using Non-Blocking Sockets`
if (defined $sock->blocking(0)) {
do_log(4, "Setting TLS socket to non-blocking");
} else {
die "Error setting TLS socket to non-blocking: $!";
}
ll(3) && do_log(3,"TLS cipher: %s", $sock->get_cipher);
ll(5) && do_log(5,"TLS certif: %s", $sock->dump_peer_certificate);
1;
}
1;
#
package Amavis::In::Connection;
# Keeps relevant information about how we received the message:
# client connection information, SMTP envelope and SMTP parameters
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
}
sub new
{ my $class = $_[0]; bless {}, $class }
sub client_ip # client IP address (immediate SMTP client, i.e. our MTA)
{ @_<2 ? shift->{client_ip} : ($_[0]->{client_ip} = $_[1]) }
sub client_port # TCP source port number (immediate SMTP client)
{ @_<2 ? shift->{client_port} : ($_[0]->{client_port} = $_[1]) }
sub socket_ip # IP address of our interface that received connection
{ @_<2 ? shift->{socket_ip} : ($_[0]->{socket_ip} = $_[1]) }
sub socket_port # TCP port of our interface that received connection
{ @_<2 ? shift->{socket_port} : ($_[0]->{socket_port} = $_[1]) }
sub socket_proto # TCP/UNIX
{ @_<2 ? shift->{socket_proto}: ($_[0]->{socket_proto} = $_[1])}
sub socket_path # socket path, UNIX sockets only
{ @_<2 ? shift->{socket_path} : ($_[0]->{socket_path} = $_[1])}
# RFC 3848
sub appl_proto # SMTP/ESMTP(A|S|SA)/LMTP(A|S|SA) / AM.PDP/AM.CL/QMQP/QMQPqq
{ @_<2 ? shift->{appl_proto} : ($_[0]->{appl_proto} = $_[1]) }
sub smtp_helo # (E)SMTP HELO/EHLO parameter
{ @_<2 ? shift->{smtp_helo} : ($_[0]->{smtp_helo} = $_[1]) }
1;
#
package Amavis::In::Message::PerRecip;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform);
import Amavis::Util qw(setting_by_given_contents_category_all
setting_by_given_contents_category cmp_ccat);
}
sub new # NOTE: this class is a list, not a hash
{ my $class = $_[0]; bless [(undef) x 42], $class }
# subs to set or access individual elements of a n-tuple by name
sub recip_addr # unquoted recipient envelope e-mail address
{ @_<2 ? shift->[0] : ($_[0]->[0] = $_[1]) }
sub recip_addr_smtp # SMTP-encoded recipient envelope e-mail address in <>
{ @_<2 ? shift->[1] : ($_[0]->[1] = $_[1]) }
sub recip_addr_modified # recip. addr. with possible addr. extension inserted
{ @_<2 ? shift->[2] : ($_[0]->[2] = $_[1]) }
sub recip_is_local # recip_addr matches @local_domains_maps
{ @_<2 ? shift->[3] : ($_[0]->[3] = $_[1]) }
sub recip_maddr_id # maddr.id field from SQL corresponding to recip_addr_smtp
{ @_<2 ? shift->[4] : ($_[0]->[4] = $_[1]) }
sub recip_maddr_id_orig # maddr.id field from SQL corresponding to dsn_orcpt
{ @_<2 ? shift->[5] : ($_[0]->[5] = $_[1]) }
sub recip_penpals_related # mail_id of a previous correspondence
{ @_<2 ? shift->[6] : ($_[0]->[6] = $_[1]) }
sub recip_penpals_age # penpals age in seconds if SQL or Redis is enabled
{ @_<2 ? shift->[7] : ($_[0]->[7] = $_[1]) }
sub recip_penpals_score # penpals score (info, also added to spam_level)
{ @_<2 ? shift->[8] : ($_[0]->[8] = $_[1]) }
sub dsn_notify # ESMTP RCPT command NOTIFY option (DSN-RFC 3461, listref)
{ @_<2 ? shift->[9] : ($_[0]->[9] = $_[1]) }
sub dsn_orcpt # ESMTP RCPT command ORCPT option (decoded: RFC 3461, RFC 6533)
{ @_<2 ? shift->[10] : ($_[0]->[10] = $_[1]) }
sub dsn_suppress_reason # if defined disable sending DSN and supply a reason
{ @_<2 ? shift->[11] : ($_[0]->[11] = $_[1]) }
sub recip_destiny # D_REJECT, D_BOUNCE, D_DISCARD, D_PASS
{ @_<2 ? shift->[12] : ($_[0]->[12] = $_[1]) }
sub recip_done # false: not done, true: done (1: faked, 2: truly sent)
{ @_<2 ? shift->[13] : ($_[0]->[13] = $_[1]) }
sub recip_smtp_response # RFC 5321 response (3-digit + enhanced resp + text)
{ @_<2 ? shift->[14] : ($_[0]->[14] = $_[1]) }
sub recip_remote_mta_smtp_response # smtp response as issued by remote MTA
{ @_<2 ? shift->[15] : ($_[0]->[15] = $_[1]) }
sub recip_remote_mta # remote MTA that issued the smtp response
{ @_<2 ? shift->[16] : ($_[0]->[16] = $_[1]) }
sub recip_tagged # message was tagged by address extension or Subject or X-Spam
{ @_<2 ? shift->[17] : ($_[0]->[17] = $_[1]) }
sub recip_mbxname # mailbox name or file when known (local:, bsmtp: or sql:)
{ @_<2 ? shift->[18] : ($_[0]->[18] = $_[1]) }
sub recip_whitelisted_sender # recip considers this sender whitelisted
{ @_<2 ? shift->[19] : ($_[0]->[19] = $_[1]) }
sub recip_blacklisted_sender # recip considers this sender blacklisted
{ @_<2 ? shift->[20] : ($_[0]->[20] = $_[1]) }
sub bypass_virus_checks # boolean: virus checks to be bypassed for this recip
{ @_<2 ? shift->[21] : ($_[0]->[21] = $_[1]) }
sub bypass_banned_checks # bool: ban checks are to be bypassed for this recip
{ @_<2 ? shift->[22] : ($_[0]->[22] = $_[1]) }
sub bypass_spam_checks # boolean: spam checks are to be bypassed for this recip
{ @_<2 ? shift->[23] : ($_[0]->[23] = $_[1]) }
sub banned_parts # banned part descriptions (ref to a list of banned parts)
{ @_<2 ? shift->[24] : ($_[0]->[24] = $_[1]) }
sub banned_parts_as_attr # banned part descriptions - newer syntax (listref)
{ @_<2 ? shift->[25] : ($_[0]->[25] = $_[1]) }
sub banning_rule_key # matching banned rules (lookup table keys) (ref to list)
{ @_<2 ? shift->[26] : ($_[0]->[26] = $_[1]) }
sub banning_rule_comment #comments (or whole expr) from banning_rule_key regexp
{ @_<2 ? shift->[27] : ($_[0]->[27] = $_[1]) }
sub banning_reason_short # just one banned part leaf name with a rule comment
{ @_<2 ? shift->[28] : ($_[0]->[28] = $_[1]) }
sub banning_rule_rhs # a right-hand side of matching rules (a ref to a list)
{ @_<2 ? shift->[29] : ($_[0]->[29] = $_[1]) }
sub mail_body_mangle # mail body is being modified (and how) (e.g. defanged)
{ @_<2 ? shift->[30] : ($_[0]->[30] = $_[1]) }
sub contents_category # sorted listref of "major,minor" strings(category types)
{ @_<2 ? shift->[31] : ($_[0]->[31] = $_[1]) }
sub blocking_ccat # category type most responsible for blocking msg, or undef
{ @_<2 ? shift->[32] : ($_[0]->[32] = $_[1]) }
sub user_id # listref of recipient IDs from a lookup, e.g. SQL field users.id
{ @_<2 ? shift->[33] : ($_[0]->[33] = $_[1]) }
sub user_policy_id # recipient's policy ID, e.g. SQL field users.policy_id
{ @_<2 ? shift->[34] : ($_[0]->[34] = $_[1]) }
sub courier_control_file # path to control file containing this recipient
{ @_<2 ? shift->[35] : ($_[0]->[35] = $_[1]) }
sub courier_recip_index # index of recipient within control file
{ @_<2 ? shift->[36] : ($_[0]->[36] = $_[1]) }
sub delivery_method # delivery method, or empty for implicit delivery (milter)
{ @_<2 ? shift->[37] : ($_[0]->[37] = $_[1]) }
sub spam_level # spam score as returned by spam scanners, ham near 0, spam 5
{ @_<2 ? shift->[38] : ($_[0]->[38] = $_[1]) }
sub spam_tests # a listref of r/o stringrefs, each: t1=score1,t2=score2,..
{ @_<2 ? shift->[39] : ($_[0]->[39] = $_[1]) }
# per-recipient spam info - when undefined consult a per-message counterpart
sub spam_report # SA terse report of tests hit (for header section reports)
{ @_<2 ? shift->[40] : ($_[0]->[40] = $_[1]) }
sub spam_summary # SA summary of tests hit for standard body reports
{ @_<2 ? shift->[41] : ($_[0]->[41] = $_[1]) }
sub recip_final_addr { # return recip_addr_modified if set, else recip_addr
my $self = shift;
my $newaddr = $self->recip_addr_modified;
defined $newaddr ? $newaddr : $self->recip_addr;
}
# The contents_category list is a sorted list of strings, each of the form
# "major" or "major,minor", where major and minor are numbers, representing
# major and minor category type. Sort order is descending by numeric values,
# major first, and subordered by a minor value. When an entry "major,minor"
# is added, an entry "major" is added automatically (minor implied to be 0).
# A string "major" means the same as "major,0". See CC_* constants for major
# category types. Minor category types semantics is specific to each major
# category, higher number represent more important finding than a lower number.
# add new findings to the contents_category list
#
sub add_contents_category {
my($self, $major,$minor) = @_;
my $aref = $self->contents_category || [];
# major category is always inserted, but "$major,$minor" only if minor>0
if (defined $minor && $minor > 0) { # straight insertion of "$major,$minor"
my $el = sprintf("%d,%d",$major,$minor); my $j=0;
for (@$aref) { if (cmp_ccat($_,$el) <= 0) { last } else { $j++ } };
if ($j > $#{$aref}) { push(@$aref,$el) } # append
elsif (cmp_ccat($aref->[$j],$el) != 0) { splice(@$aref,$j,0,$el) }
}
# straight insertion of "$major" into an ordered array (descending order)
my $el = sprintf("%d",$major); my $j=0;
for (@$aref) { if (cmp_ccat($_,$el) <= 0) { last } else { $j++ } };
if ($j > $#{$aref}) { push(@$aref,$el) } # append
elsif (cmp_ccat($aref->[$j],$el) != 0)
{ splice(@$aref,$j,0,$el) } # insert at index $j
$self->contents_category($aref);
}
# is the "$major,$minor" category in the list?
#
sub is_in_contents_category {
my($self, $major,$minor) = @_;
my $el = sprintf('%d,%d', $major,$minor);
my $aref = $self->contents_category;
!defined($aref) ? undef : scalar(grep(cmp_ccat($_,$el) == 0, @$aref));
}
# get a setting corresponding to the most important contents category;
# i.e. the highest entry from the category list for which a corresponding entry
# in the associative array of settings exists determines returned setting;
#
sub setting_by_main_contents_category {
my($self, @settings_href_list) = @_;
return undef if !@settings_href_list;
my $aref = $self->contents_category;
setting_by_given_contents_category($aref, @settings_href_list);
}
# get a list of settings corresponding to all relevant contents categories,
# sorted from the most important to the least important entry; entries which
# have no corresponding setting are not included in the list
#
sub setting_by_main_contents_category_all {
my($self, @settings_href_list) = @_;
return undef if !@settings_href_list;
my $aref = $self->contents_category;
setting_by_given_contents_category_all($aref, @settings_href_list);
}
sub setting_by_blocking_contents_category {
my($self, @settings_href_list) = @_;
my $blocking_ccat = $self->blocking_ccat;
!defined($blocking_ccat) ? undef
: setting_by_given_contents_category($blocking_ccat, @settings_href_list);
}
sub setting_by_contents_category {
my($self, @settings_href_list) = @_;
my $blocking_ccat = $self->blocking_ccat;
!defined($blocking_ccat)
? $self->setting_by_main_contents_category(@settings_href_list)
: setting_by_given_contents_category($blocking_ccat, @settings_href_list);
}
1;
#
package Amavis::In::Message;
# this class keeps information about the message being processed
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform);
import Amavis::rfc2821_2822_Tools qw(rfc2822_timestamp quote_rfc2821_local
qquote_rfc2821_local);
import Amavis::Util qw(ll do_log orcpt_decode);
import Amavis::In::Message::PerRecip;
}
sub new
{ my $class = $_[0];
my $self = bless({},$class); $self->skip_bytes(0); $self }
sub conn_obj # ref to a connection object Amavis::In::Connection
{ @_<2 ? shift->{conn} : ($_[0]->{conn} = $_[1]) }
sub rx_time # Unix time (s since epoch) of message reception by amavisd
{ @_<2 ? shift->{rx_time} : ($_[0]->{rx_time} = $_[1]) }
sub partition_tag # SQL partition tag (e.g. an ISO week number 1..53, or 0)
{ @_<2 ? shift->{partition} : ($_[0]->{partition} = $_[1]) }
sub client_proto # orig. client protocol, obtained from XFORWARD or milter
{ @_<2 ? shift->{cli_proto} : ($_[0]->{cli_proto} = $_[1]) }
sub client_addr # original client IP addr, obtained from XFORWARD or milter
{ @_<2 ? shift->{cli_ip} : ($_[0]->{cli_ip} = $_[1]) }
sub client_name # orig. client DNS name, obtained from XFORWARD or milter
{ @_<2 ? shift->{cli_name} : (shift->{cli_name} = $_[1]) }
sub client_port # orig client src port num, obtained from XFORWARD or milter
{ @_<2 ? shift->{cli_port} : ($_[0]->{cli_port} = $_[1]) }
sub client_source # LOCAL/REMOTE/undef, local_header_rewrite_clients/XFORWARD
{ @_<2 ? shift->{cli_source} : ($_[0]->{cli_source} = $_[1]) }
sub client_helo # orig. client EHLO name, obtained from XFORWARD or milter
{ @_<2 ? shift->{cli_helo} : ($_[0]->{cli_helo} = $_[1]) }
sub client_os_fingerprint # SMTP client's OS fingerprint, obtained from p0f
{ @_<2 ? shift->{cli_p0f} : ($_[0]->{cli_p0f} = $_[1]) }
sub originating # originating from our users, copied from c('originating')
{ @_<2 ? shift->{originating}: ($_[0]->{originating} = $_[1]) }
sub queue_id # MTA queue ID of message if known (Courier, milter/AM.PDP, XFORW)
{ @_<2 ? shift->{queue_id} : ($_[0]->{queue_id} = $_[1]) }
sub log_id # task id as shown in the log, also known as am_id
{ @_<2 ? shift->{log_id} : ($_[0]->{log_id} = $_[1]) }
sub mail_id # long-term unique id of the message on this system
{ @_<2 ? shift->{mail_id} : ($_[0]->{mail_id} = $_[1]) }
sub secret_id # secret string to grant access to a message with mail_id
{ @_<2 ? $_[0]->{secret_id} : ($_[0]->{secret_id} = $_[1]) }
sub parent_mail_id # original mail_id for msgs generated by amavis (DSN,notif)
{ @_<2 ? shift->{parent_mail_id} : ($_[0]->{parent_mail_id} = $_[1]) }
sub attachment_password # scrambles a potentially dangerous released mail
{ @_<2 ? shift->{release_pwd}: ($_[0]->{release_pwd} = $_[1]) }
sub msg_size # ESMTP SIZE value, later corrected to actual size,RFC 1870
{ @_<2 ? shift->{msg_size} : ($_[0]->{msg_size} = $_[1]) }
sub auth_user # ESMTP AUTH username
{ @_<2 ? shift->{auth_user} : ($_[0]->{auth_user} = $_[1]) }
sub auth_pass # ESMTP AUTH password
{ @_<2 ? shift->{auth_pass} : ($_[0]->{auth_pass} = $_[1]) }
sub auth_submitter # ESMTP MAIL command AUTH option value (addr-spec or "<>")
{ @_<2 ? shift->{auth_subm} : (shift->{auth_subm} = $_[1]) }
sub tls_cipher # defined if TLS was on, e.g. contains cipher alg.,RFC 3207
{ @_<2 ? shift->{auth_tlscif}: ($_[0]->{auth_tlscif} = $_[1]) }
sub dsn_ret # ESMTP MAIL command RET option (DSN-RFC 3461)
{ @_<2 ? shift->{dsn_ret} : ($_[0]->{dsn_ret} = $_[1]) }
sub dsn_envid # ESMTP MAIL command ENVID option (DSN-RFC 3461) xtext enc.
{ @_<2 ? shift->{dsn_envid} : ($_[0]->{dsn_envid} = $_[1]) }
sub dsn_passed_on # obligation to send notification on SUCCESS was relayed
{ @_<2 ? shift->{dsn_pass_on}: ($_[0]->{dsn_pass_on} = $_[1]) }
sub requested_by # Resent-From addr who requested release from a quarantine
{ @_<2 ? shift->{requested_by}:($_[0]->{requested_by} = $_[1])}
sub body_type # ESMTP BODY param (RFC 6152: 7BIT, 8BITMIME) or BINARYMIME
{ @_<2 ? shift->{body_type} : ($_[0]->{body_type} = $_[1]) }
sub smtputf8 # ESMTP SMTPUTF8 param, boolean (RFC 6531)
{ @_<2 ? shift->{smtputf8} : ($_[0]->{smtputf8} = $_[1]) }
sub header_8bit # true if header contains non-ASCII characters
{ @_<2 ? shift->{header_8bit}: ($_[0]->{header_8bit} = $_[1]) }
sub body_8bit # true if body contains non-ASCII characters
{ @_<2 ? shift->{body_8bit} : ($_[0]->{body_8bit} = $_[1]) }
sub sender # envelope sender, internal form, e.g.: j doe@example.com
{ @_<2 ? $_[0]->{sender} : ($_[0]->{sender} = $_[1]) }
sub sender_smtp # env sender, SMTP form in <>, e.g.: <"j doe"@example.com>
{ @_<2 ? shift->{sender_smtp}: ($_[0]->{sender_smtp} = $_[1]) }
sub sender_credible # envelope sender is believed to be valid
{ @_<2 ? shift->{sender_cred}: ($_[0]->{sender_cred} = $_[1]) }
sub sender_source # unmangled sender addr. or info from the trace (log/notif)
{ @_<2 ? shift->{sender_src} : ($_[0]->{sender_src} = $_[1]) }
sub sender_maddr_id # maddr.id field from SQL if logging to SQL is enabled
{ @_<2 ? shift->{maddr_id} : ($_[0]->{maddr_id} = $_[1]) }
sub mime_entity # MIME::Parser entity holding the parsed message
{ @_<2 ? shift->{mime_entity}: (shift->{mime_entity} = $_[1])}
sub parts_root # Amavis::Unpackers::Part root object
{ @_<2 ? shift->{parts_root} : ($_[0]->{parts_root} = $_[1])}
sub skip_bytes # file offset where mail starts, useful for quar. release
{ @_<2 ? shift->{file_ofs} : ($_[0]->{file_ofs} = $_[1]) }
sub mail_text # RFC 5322 msg: open file handle, or MIME::Entity object
{ @_<2 ? shift->{mail_text} : ($_[0]->{mail_text} = $_[1]) }
sub mail_text_str # RFC 5322 msg: small messages as a stringref, else undef
{ @_<2 ? shift->{mailtextstr}: ($_[0]->{mailtextstr} = $_[1]) }
sub mail_text_fn # orig. mail filename or undef, e.g. mail_tempdir/email.txt
{ @_<2 ? shift->{mailtextfn} : ($_[0]->{mailtextfn} = $_[1]) }
sub mail_tempdir # work directory, under $TEMPBASE or supplied by client
{ @_<2 ? shift->{mailtempdir}: ($_[0]->{mailtempdir} = $_[1])}
sub mail_tempdir_obj # Amavis::TempDir obj when non-persistent (quar.release)
{ @_<2 ? shift->{tempdirobj}: ($_[0]->{tempdirobj} = $_[1])}
sub header_edits # Amavis::Out::EditHeader object or undef
{ @_<2 ? shift->{hdr_edits} : ($_[0]->{hdr_edits} = $_[1]) }
sub rfc2822_from #author addresses list (rfc allows one or more), parsed 'From'
{ @_<2 ? $_[0]->{hdr_from} : ($_[0]->{hdr_from} = $_[1]) }
sub rfc2822_sender # sender address (rfc allows none or one), parsed 'Sender'
{ @_<2 ? shift->{hdr_sender} : ($_[0]->{hdr_sender} = $_[1]) }
sub rfc2822_resent_from # resending author addresses list, parsed 'Resent-From'
{ @_<2 ? shift->{hdr_rfrom} : ($_[0]->{hdr_rfrom} = $_[1]) }
sub rfc2822_resent_sender # resending sender addresses, parsed 'Resent-Sender'
{ @_<2 ? shift->{hdr_rsender}: ($_[0]->{hdr_rsender} = $_[1]) }
sub rfc2822_to # parsed 'To' header field: a list of recipients
{ @_<2 ? shift->{hdr_to} : ($_[0]->{hdr_to} = $_[1]) }
sub rfc2822_cc # parsed 'Cc' header field: a list of Cc recipients
{ @_<2 ? shift->{hdr_cc} : (shift->{hdr_cc} = $_[1]) }
sub orig_header_fields # header field indices by h.f. name, hashref of arrays
{ @_<2 ? shift->{orig_hdr_f} : ($_[0]->{orig_hdr_f} = $_[1]) }
sub orig_header # orig.h.sect, arrayref of h.fields, with folding & trailing LF
{ @_<2 ? shift->{orig_header}: ($_[0]->{orig_header} = $_[1]) }
sub orig_header_size # size of original header, incl. a separator line,RFC 1870
{ @_<2 ? shift->{orig_hdr_s} : ($_[0]->{orig_hdr_s} = $_[1]) }
sub references # References & In-Reply-To message IDs, array
{ @_<2 ? shift->{refs} : ($_[0]->{refs} = $_[1]) }
sub orig_body_size # size of original body (in bytes), RFC 1870
{ @_<2 ? shift->{orig_bdy_s} : ($_[0]->{orig_bdy_s} = $_[1]) }
sub body_start_pos # byte offset into a msg where mail body starts (if known)
{ @_<2 ? shift->{body_pos}: ($_[0]->{body_pos} = $_[1]) }
sub body_digest # digest of a message body (e.g. MD5, SHA1, SHA256), hex
{ @_<2 ? shift->{body_digest}: ($_[0]->{body_digest} = $_[1]) }
sub trace # info from Received header fields, top-down, array of hashrefs
{ @_<2 ? shift->{trace} : ($_[0]->{trace} = $_[1]) }
sub ip_addr_trace_public # public IP addresses in 'Received from' hdr flds
{ @_<2 ? shift->{iptracepub} : ($_[0]->{iptracepub} = $_[1]) }
sub is_mlist # mail is from a mailing list (boolean/string)
{ @_<2 ? shift->{is_mlist} : ($_[0]->{is_mlist} = $_[1]) }
sub is_auto # mail is an auto-response (boolean/string)
{ @_<2 ? shift->{is_auto} : ($_[0]->{is_auto} = $_[1]) }
sub is_bulk # mail from a m.list or bulk or auto-response (bool/string)
{ @_<2 ? $_[0]->{is_bulk} : ($_[0]->{is_bulk} = $_[1]) }
sub dkim_signatures_all # a ref to a list of DKIM signature objects, or undef
{ @_<2 ? shift->{dkim_sall} : ($_[0]->{dkim_sall} = $_[1]) }
sub dkim_signatures_valid # a ref to a list of valid DKIM signature objects
{ @_<2 ? shift->{dkim_sval} : ($_[0]->{dkim_sval} = $_[1]) }
sub dkim_author_sig # author domain signature present and valid (bool/domain)
{ @_<2 ? shift->{dkim_auth_s}: ($_[0]->{dkim_auth_s} = $_[1]) }
sub dkim_thirdparty_sig # third-party signature present and valid (bool/domain)
{ @_<2 ? shift->{dkim_3rdp_s}: ($_[0]->{dkim_3rdp_s} = $_[1]) }
sub dkim_sender_sig # a sender signature is present and is valid (bool/domain)
{ @_<2 ? shift->{dkim_sndr_s}: (shift->{dkim_sndr_s} = $_[1]) }
sub dkim_envsender_sig # boolean: envelope sender signature present and valid
{ @_<2 ? shift->{dkim_envs_s}: ($_[0]->{dkim_envs_s} = $_[1]) }
sub dkim_signatures_new # ref to a list of DKIM signature objects, our signing
{ @_<2 ? shift->{dkim_snew} : ($_[0]->{dkim_snew} = $_[1]) }
sub dkim_signwith_sd # ref to a pair [selector,domain] to force signing with
{ @_<2 ? shift->{dkim_signsd}: ($_[0]->{dkim_signsd} = $_[1]) }
sub quarantined_to # list of quar mailbox names or addresses if quarantined
{ @_<2 ? shift->{quarantine} : ($_[0]->{quarantine} = $_[1]) }
sub quar_type # list of quar types: F/Z/B/Q/M (file/zipfile/bsmtp/sql/mailbox)
{ @_<2 ? shift->{quar_type} : ($_[0]->{quar_type} = $_[1]) }
sub dsn_sent # delivery status notification was sent(1) or suppressed(2)
{ @_<2 ? shift->{dsn_sent} : ($_[0]->{dsn_sent} = $_[1]) }
sub client_delete # don't delete the tempdir, it is a client's responsibility
{ @_<2 ? shift->{client_del} :($_[0]->{client_del} = $_[1])}
sub contents_category # sorted arrayref CC_VIRUS/CC_BANNED/CC_SPAM../CC_CLEAN
{ @_<2 ? shift->{category} : ($_[0]->{category} = $_[1]) }
sub blocking_ccat # category type most responsible for blocking msg, or undef
{ @_<2 ? $_[0]->{bl_ccat} : ($_[0]->{bl_ccat} = $_[1]) }
sub checks_performed # a hashref of checks done on a msg (for statistics/log)
{ @_<2 ? shift->{checks_perf}: ($_[0]->{checks_perf} = $_[1]) }
sub actions_performed # listref, summarized actions & SMTP status, for logging
{ @_<2 ? shift->{act_perf} : ($_[0]->{act_perf} = $_[1]) }
sub virusnames # a ref to a list of virus names detected, or undef
{ @_<2 ? shift->{virusnames} : ($_[0]->{virusnames} = $_[1]) }
sub spam_report # SA terse report of tests hit (for header section reports)
{ @_<2 ? shift->{spam_report} : ($_[0]->{spam_report} = $_[1])}
sub spam_summary # SA summary of tests hit for standard body reports
{ @_<2 ? shift->{spam_summary} :($_[0]->{spam_summary} = $_[1])}
sub ip_repu_score # IP reputation score (info, also added to spam_level)
{ @_<2 ? shift->{ip_repu_score} :($_[0]->{ip_repu_score} = $_[1])}
sub time_elapsed # elapsed times by section - associative array ref
{ @_<2 ? shift->{elapsed} : ($_[0]->{elapsed} = $_[1])}
# new style of providing additional information from checkers
sub supplementary_info { # holds a hash of tag/value pairs, such as SA get_tag
my $self=shift; my $key=shift;
!@_ ? $self->{info_tag}{$key} : ($self->{info_tag}{$key}=shift);
}
{ no warnings 'once';
# the following methods apply on a per-message level as well, summarizing
# per-recipient information as far as possible
*add_contents_category =
\&Amavis::In::Message::PerRecip::add_contents_category;
*is_in_contents_category =
\&Amavis::In::Message::PerRecip::is_in_contents_category;
*setting_by_main_contents_category =
\&Amavis::In::Message::PerRecip::setting_by_main_contents_category;
*setting_by_main_contents_category_all =
\&Amavis::In::Message::PerRecip::setting_by_main_contents_category_all;
*setting_by_blocking_contents_category =
\&Amavis::In::Message::PerRecip::setting_by_blocking_contents_category;
*setting_by_contents_category =
\&Amavis::In::Message::PerRecip::setting_by_contents_category;
}
# The order of entries in a per-recipient list is the original order
# in which recipient addresses (e.g. obtained via 'MAIL TO:') were received.
# Only the entries that were accepted (via SMTP response code 2xx)
# are placed in the list. The ORDER MUST BE PRESERVED and no recipients
# may be added or removed from the list (without precaution)! This is vital
# to be able to produce correct per-recipient responses to an LMTP client!
#
sub per_recip_data { # get or set a listref of envelope recipient objects
my $self = shift;
# store a copy of the a given listref of recip objects
if (@_) { $self->{recips} = [@{$_[0]}] }
# caller may modify data if he knows what he is doing
$self->{recips}; # return a list of recipient objects
}
sub recips { # get or set a listref of envelope recipients
my $self = shift;
if (@_) { # store a copy of a given listref of recipient addresses
my($recips_list_ref, $set_dsn_orcpt_too) = @_;
$self->per_recip_data([ map {
my $per_recip_obj = Amavis::In::Message::PerRecip->new;
$per_recip_obj->recip_addr($_);
$per_recip_obj->recip_addr_smtp(qquote_rfc2821_local($_));
$per_recip_obj->dsn_orcpt(
join(';', orcpt_decode(';'.$per_recip_obj->recip_addr_smtp)))
if $set_dsn_orcpt_too;
$per_recip_obj->recip_destiny(D_PASS); # default is Pass
$per_recip_obj } @{$recips_list_ref} ]);
}
return if !defined wantarray; # don't bother
# return listref of recipient addresses
[ map($_->recip_addr, @{$self->per_recip_data}) ];
}
# for each header field maintain a list of signature indices which covered it;
# returns a list of signature indices for a given header field position
#
sub header_field_signed_by {
my($self,$header_field_index) = @_;
my $h = $self->{hdr_sig_ind}; my $hf;
if (@_ > 2) {
$self->{hdr_sig_ind} = $h = [] if !$h;
$hf = $h->[$header_field_index];
$h->[$header_field_index] = $hf = [] if !$hf;
# store signature index(es) at a given header position
shift; shift; push(@$hf, @_);
}
$hf = $h->[$header_field_index] if $h && !$hf;
$hf ? @{$hf} : ();
}
# return a j-th header field with a given field name, along with its index
# in the array of all header fields; if a field name is undef then all
# header fields are considered; search proceeds top-down if j >= 0,
# or bottom up for negative values (-1=last, -2=next-to-last, ...)
#
sub get_header_field2 {
my($self, $field_name, $j) = @_;
my $orig_hfields = $self->orig_header_fields;
return if !$orig_hfields;
my($field_ind, $field, $all_fields, $hfield_indices);
# arrayref of header field indices for a given h.field name
$hfield_indices = $orig_hfields->{lc $field_name} if defined $field_name;
$all_fields = $self->orig_header;
if (defined $field_name) {
if (!defined $hfield_indices) {
# no header field with such name
} elsif (ref $hfield_indices) {
# $hfield_indices is an arrayref
$j = 0 if !defined $j;
$field_ind = $hfield_indices->[$j];
} else {
# optimized: $hfield_indices is a scalar - the only element
$field_ind = $hfield_indices if !defined($j) || $j == 0 || $j == -1;
}
} elsif (!ref $all_fields) {
# no header section
} elsif ($j >= 0) { # top-down, 0,1,2,...
$field_ind = $j if $j <= $#$all_fields;
} else { # bottom-up, -1,-2,-3,...
$j += @$all_fields; # turn into an absolute index
$field_ind = $j if $j >= 0;
}
return $field_ind if !wantarray;
($field_ind, !defined $field_ind ? undef : $all_fields->[$field_ind]);
}
# compatibility wrapper for pre-2.8.0 custom code
#
sub get_header_field {
my($self, $field_name, $j) = @_;
my($field_ind, $field) = $self->get_header_field2($field_name,$j);
if (defined($field_ind) && wantarray) {
local $1;
$field_name = lc($1) if $field =~ /^([^:]*?)[ \t]*:/s;
}
!wantarray ? $field_ind : ($field_ind, $field_name, $field);
}
sub get_header_field_body {
my($self, $field_name, $j) = @_;
my $k; my($field_ind, $f) = $self->get_header_field2($field_name,$j);
defined $f && ($k=index($f,':')) >= 0 ? substr($f,$k+1) : $f;
}
1;
#
package Amavis::Out::EditHeader;
# Accumulates instructions on what header fields need to be added
# to a header section, which deleted, or how to change existing ones.
# A call to write_header() then performs these edits on the fly.
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&hdr);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools qw(wrap_string);
import Amavis::Util qw(ll do_log min max q_encode
safe_encode safe_encode_utf8_inplace);
}
use Errno qw(EBADF);
use Encode ();
use MIME::Words;
sub new {
my $class = $_[0];
bless { prepend=>[], append=>[], addrcvd=>[], edit=>{} }, $class;
}
sub prepend_header {
my $self = shift;
unshift(@{$self->{prepend}}, hdr(@_));
}
sub append_header {
my $self = shift;
push(@{$self->{append}}, hdr(@_));
}
sub append_header_above_received {
my $self = shift;
push(@{$self->{addrcvd}}, hdr(@_));
}
# now a synonym for append_header_above_received() (old semantics: prepend
# or append, depending on setting of $append_header_fields_to_bottom)
#
sub add_header {
my $self = shift;
push(@{$self->{addrcvd}}, hdr(@_));
}
# delete all header fields with a $field_name
#
sub delete_header {
my($self, $field_name) = @_;
$self->{edit}{lc $field_name} = [undef];
}
# all header fields with $field_name will be edited by a supplied subroutine
#
sub edit_header {
my($self, $field_name, $field_edit_sub) = @_;
# $field_edit_sub will be called with 2 args: a field name and a field body;
# It should return a pair consisting of a replacement field body (no field
# name and no colon, with or without a trailing NL), and a boolean 'verbatim'
# (false in its absence). An undefined replacement field body indicates a
# deletion of the entire header field. A value true in the second returned
# element indicates that a verbatim replacement is desired (i.e. no other
# changes are allowed on a replacement body such as folding or encoding).
!defined($field_edit_sub) || ref($field_edit_sub) eq 'CODE'
or die "edit_header: arg#3 must be undef or a subroutine ref";
$field_name = lc $field_name;
if (!exists($self->{edit}{$field_name})) {
$self->{edit}{$field_name} = [$field_edit_sub];
} else {
do_log(5, "INFO: multiple header edits: %s", $field_name);
push(@{$self->{edit}{$field_name}}, $field_edit_sub);
}
}
# copy all header edits from another header-edits object into this one
#
sub inherit_header_edits($$) {
my($self, $other_edits) = @_;
if (defined $other_edits) {
for (qw(prepend addrcvd append)) {
unshift(@{$self->{$_}}, @{$other_edits->{$_}}) if $other_edits->{$_};
}
my $o_edit = $other_edits->{edit};
if ($o_edit) {
for my $fn (keys %$o_edit) {
if (!exists($self->{edit}{$fn})) {
$self->{edit}{$fn} = [ @{$o_edit->{$fn}} ]; # copy list
} else {
unshift(@{$self->{edit}{$fn}}, @{$o_edit->{$fn}});
}
}
}
}
}
# Conditioning of a header field to be added.
# Insert space after colon if not present, RFC 2047 -encode if field body
# contains non-ASCII characters, fold long lines if needed, prepend space
# before each NL if missing, append NL if missing. Header lines with only
# spaces are not allowed. (RFC 5322: Each line of characters MUST be no more
# than 998 octets(!) (RFC 6532), and SHOULD be no more than 78 characters(!)
# (RFC 6532), excluding the CRLF). $structured==0 indicates an unstructured
# header field, folding may be inserted at any existing whitespace character
# position; $structured==1 indicates that folding is only allowed at positions
# indicated by \n in the provided header body, original \n will be removed.
# With $structured==2 folding is preserved, wrapping step is skipped.
#
sub hdr {
my($field_name, $field_body, $structured, $wrap_char, $smtputf8) = @_;
safe_encode_utf8_inplace($field_name); # to octets (if not already)
$field_name =~ tr/\x21-\x39\x3B-\x7E/?/c; # printable ASCII except ':'
my $field_body_is_utf8 = utf8::is_utf8($field_body);
local($1);
if ($field_body !~ tr/\x00-\x7F//c) { # is all-ASCII
# no encoding necessary, just clear the utf8 flag if set
if ($field_body_is_utf8) {
do_log(5,'header encoded (utf8:Y) (all-ASCII): %s: %s',
$field_name, $field_body);
safe_encode_utf8_inplace($field_body); # to octets (if not already)
} else {
do_log(5,'header encoded (all-ASCII): %s: %s', $field_name, $field_body);
}
} elsif ($smtputf8) { # UTF-8 in header field bodies is allowed
safe_encode_utf8_inplace($field_body) if $field_body_is_utf8;
ll(5) && do_log(5,'header encoded (utf8:%s) to UTF-8 (SMTPUTF8): %s: %s',
$field_body_is_utf8?'Y':'N', $field_name, $field_body);
} elsif ($field_name =~ /^(?: Subject | Comments |
(?:Resent-)? (?: From|Sender|To|Cc ) )\z/six &&
$field_body !~ /^[\t\n\x20-\x7F]*\z/ # but printable or HT or LF
# consider also: | X- (?! Envelope- (?:From|To)\z )
) { # encode according to RFC 2047
# actually RFC 2047 also allows encoded-words in rfc822 extension
# message header fields (now: optional header fields), within comments
# in structured header fields, or within 'phrase' (e.g. in From, To, Cc);
# we are being sloppy here!
$field_body =~ s/\n(?=[ \t])//gs; # unfold
chomp($field_body);
my $chset = c('hdr_encoding');
my $field_body_octets = safe_encode($chset, $field_body);
ll(5) && do_log(5,'header encoded (utf8:%s) to %s, %s: %s -> %s',
$field_body_is_utf8?'Y':'N', $chset,
$field_name, $field_body, $field_body_octets);
my $qb = c('hdr_encoding_qb');
my $encoder_func = uc $qb eq 'Q' ? \&q_encode
: \&MIME::Words::encode_mimeword;
$field_body = join("\n", map { /^[\001-\011\013\014\016-\177]*\z/ ? $_
: &$encoder_func($_,$qb,$chset) }
split(/\n/, $field_body_octets, -1));
} else { # should have been all-ASCII, or UTF-8 with SMTPUTF8 - but anyway:
safe_encode_utf8_inplace($field_body) if $field_body_is_utf8;
ll(5) && do_log(5,'header encoded (utf8:%s) to UTF-8: %s: %s',
$field_body_is_utf8?'Y':'N', $field_name, $field_body);
}
my $str = $field_name . ':';
$str .= ' ' if $field_body =~ /^[^ \t]/; # insert space, looks nicer
$str .= $field_body;
if ($structured == 2) { # already folded, keep it that way, sanitize
1 while $str =~ s/^([ \t]*)\n/$1/; # prefixed by whitespace lines?
$str =~ s/\n(?=[ \t]*(\n|\z))//g; # whitespace lines within or at end
$str =~ s/\n(?![ \t])/\n /g; # insert a space at line folds if missing
} else {
$str = wrap_string($str, 78, '', $wrap_char, $structured
) if $structured==1 || length($str) > 78;
}
if (length($str) > 998) {
my(@lines) = split(/\n/,$str); my $trunc = 0;
for (@lines) {
if (length($_) > 998) { substr($_,998-3) = '...'; $trunc = 1 }
}
if ($trunc) {
do_log(0, "INFO: truncating long header field (len=%d): %s[...]",
length($str), substr($str,0,100) );
$str = join("\n",@lines);
}
}
$str =~ s{\n*\z}{\n}s; # ensure a single final NL
ll(5) && do_log(5, 'header: %s', $str);
$str;
}
# Copy mail header section to the supplied method while adding, removing,
# or changing certain header fields as required, and append an empty line
# (header/body separator). Returns a number of original 'Received:'
# header fields to make a simple loop detection possible (as required
# by RFC 5321 (ex RFC 2821) section 6.3).
# Leaves input file positioned at the beginning of a body.
#
sub write_header($$$$) {
my($self, $msginfo, $out_fh, $noninitial_submission) = @_;
my $received_cnt = 0;
my($fix_whitespace_lines, $fix_long_header_lines, $fix_bare_cr) = (0,0,0);
if ($noninitial_submission && c('allow_fixing_improper_header')) {
$fix_bare_cr = 1;
$fix_long_header_lines = 1 if c('allow_fixing_long_header_lines');
$fix_whitespace_lines = 1 if c('allow_fixing_improper_header_folding');
}
my(@header); my $pos = 0; my $header_in_array = 0;
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if (!defined $msg) {
# empty mail
$header_in_array = 1;
} elsif (ref $msg eq 'SCALAR') {
$header_in_array = 1;
$pos = min($msginfo->skip_bytes, length($$msg));
if ($pos >= length($$msg)) { # empty message
$pos = length($$msg);
} elsif (substr($$msg,$pos,1) eq "\n") { # empty header section
$pos++;
} else {
my $ind = index($$msg, "\n\n", $pos); # find header/body separator
if ($ind < 0) { # no body
@header = split(/^/m, substr($$msg, $pos));
$pos = length($$msg);
} else { # normal, nonempty header section and nonempty body
@header = split(/^/m, substr($$msg, $pos, $ind+1-$pos));
$pos = $ind+2;
}
}
# $pos now points to the first byte of a body
} elsif ($msg->isa('MIME::Entity')) {
$header_in_array = 1;
$fix_whitespace_lines = 1; # fix MIME::Entity artifacts
@header = @{$msg->header};
} else { # a file handle assumed
$pos = $msginfo->skip_bytes;
$msg->seek($pos,0) or die "Can't rewind mail file: $!";
}
ll(5) && do_log(5, 'write_header: %s, %s', $header_in_array, $out_fh);
# preallocate some storage
my $str = ''; vec($str,8192,8) = 0; $str = '';
$str .= $_ for @{$self->{prepend}};
$str .= $_ for @{$self->{addrcvd}};
my($ill_white_cnt, $ill_long_cnt, $ill_bare_cr) = (0,0,0);
local($1,$2); my $curr_head; my $next_head; my $eof = 0;
for (;;) {
if ($eof) {
$next_head = "\n"; # fake a missing header/body separator line
} elsif ($header_in_array) {
for (;;) { # get next nonempty line or eof
if (!@header) { $eof = 1; $next_head = "\n"; last }
$next_head = shift @header;
# ensure NL at end, faster than m/\n\z/
$next_head .= "\n" if substr($next_head,-1,1) ne "\n";
last if !$fix_whitespace_lines || $next_head !~ /^[ \t]*\n\z/s;
$ill_white_cnt++;
}
} else {
$! = 0; $next_head = $msg->getline;
if (defined $next_head) {
$pos += length($next_head);
} else {
$eof = 1; $next_head = "\n";
$! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,"Error reading mail header section: $!")
: die "Error reading mail header section: $!";
}
}
if ($next_head =~ /^[ \t]/) {
$curr_head .= $next_head; # folded
} else { # new header field
if (!defined($curr_head)) {
# no previous complete header field (we are at the first hdr field)
} elsif ($curr_head !~ /^([!-9;-\176]+)[ \t]*:(.*)\z/s) { # parse
# invalid header field, but we'll write it anyway
} else { # count, edit, or delete
# obsolete RFC 822 syntax allowed whitespace before colon
my($field_name, $field_body) = ($1, $2);
my $field_name_lc = lc $field_name;
$received_cnt++ if $field_name_lc eq 'received';
if (exists($self->{edit}{$field_name_lc})) {
chomp($field_body);
### $field_body =~ s/\n(?=[ \t])//gs; # unfold
my $edit = $self->{edit}{$field_name_lc}; # listref of edits
for my $e (@$edit) { # possibly multiple (iterative) edits
my($new_fbody,$verbatim);
($new_fbody,$verbatim) =
&$e($field_name,$field_body) if defined $e;
if (!defined($new_fbody)) {
ll(5) && do_log(5, 'deleted: %s:%s', $field_name, $field_body);
$curr_head = undef; last;
}
$curr_head = $verbatim ? ($field_name . ':' . $new_fbody)
: hdr($field_name, $new_fbody, 0, undef,
$msginfo->smtputf8);
chomp($curr_head); $curr_head .= "\n";
$curr_head =~ /^([!-9;-\176]+)[ \t]*:(.*)\z/s;
$field_body = $2; chomp($field_body); # carry to next iteration
}
}
}
if (defined $curr_head) {
if ($fix_bare_cr) { # sanitize header sect. by removing CR characters
$curr_head =~ tr/\r//d and $ill_bare_cr++;
}
if ($fix_whitespace_lines) { # unfold illegal all-whitespace lines
$curr_head =~ s/\n(?=[ \t]*\n)//g and $ill_white_cnt++;
}
if ($fix_long_header_lines) { # truncate long header lines to 998 ch
$curr_head =~ s{^(.{995}).{4,}$}{$1...}gm and $ill_long_cnt++;
}
# use buffering to reduce number of calls to datasend()
if (length($str) > 16384) {
$out_fh->print($str) or die "sending mail header: $!";
$str = '';
}
$str .= $curr_head;
}
last if $next_head eq "\n"; # header/body separator
last if substr($next_head,0,2) eq '--'; # mime sep. (missing h/b sep.)
$curr_head = $next_head;
}
}
do_log(0, "INFO: unfolded %d illegal all-whitespace ".
"continuation lines", $ill_white_cnt) if $ill_white_cnt;
do_log(0, "INFO: truncated %d header line(s) longer than 998 characters",
$ill_long_cnt) if $ill_long_cnt;
do_log(0, "INFO: removed bare CR from %d header line(s)",
$ill_bare_cr) if $ill_bare_cr;
$str .= $_ for @{$self->{append}};
$str .= "\n"; # end of header section - a separator line
$out_fh->print($str) or die "sending mail header final: $!";
section_time('write-header');
($received_cnt, $pos);
}
1;
#
package Amavis::Out;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(&mail_dispatch);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Util qw(ll do_log);
}
sub mail_dispatch($$$;$) {
my($msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
my $tmp_hdr_edits;
my $saved_hdr_edits = $msginfo->header_edits;
if (!c('enable_dkim_signing')) {
# no signing
} elsif ($initial_submission && $initial_submission eq 'Quar') {
# do not attempt to sign messages on their way to a quarantine
} else {
# generate and add DKIM signatures
my(@signatures) = Amavis::DKIM::dkim_make_signatures($msginfo,0);
if (@signatures) {
$msginfo->dkim_signatures_new(\@signatures);
if (!defined($tmp_hdr_edits)) {
$tmp_hdr_edits = Amavis::Out::EditHeader->new;
$tmp_hdr_edits->inherit_header_edits($saved_hdr_edits);
}
for my $signature (@signatures) {
my $s = $signature->as_string;
local($1); $s =~ s{\015\012}{\n}gs; $s =~ s{\n+\z}{}gs;
$s =~ s/^((?:DKIM|DomainKey)-Signature)://si;
$tmp_hdr_edits->prepend_header($1, $s, 2);
}
if (c('enable_dkim_verification') &&
grep($_->recip_is_local, @{$msginfo->per_recip_data})) {
# it is too late to split a message now, add the A-R header field
# if at least one recipient is local
my $allowed_hdrs = cr('allowed_added_header_fields');
if ($allowed_hdrs && $allowed_hdrs->{lc('Authentication-Results')}) {
for my $h (Amavis::DKIM::generate_authentication_results(
$msginfo, 0, \@signatures)) {
$tmp_hdr_edits->prepend_header('Authentication-Results', $h, 1);
}
}
}
}
$msginfo->header_edits($tmp_hdr_edits) if defined $tmp_hdr_edits;
}
my $any_deliveries = 0;
my $per_recip_data = $msginfo->per_recip_data;
my $num_recips_notdone =
scalar(grep(!$_->recip_done && (!$filter || &$filter($_)),
@$per_recip_data));
while ($num_recips_notdone > 0) {
# a delivery method may be a scalar of a form protocol:socket_specs, or
# a listref of such elements; if a list is provided, it is expected that
# each entry will be using the same protocol name, otherwise behaviour
# is unspecified - so just obtain the protocol name from the first entry
#
my(%protocols, $any_tempfail);
for my $r (@$per_recip_data) {
if (!$dsn_per_recip_capable) {
my $recip_smtp_response = $r->recip_smtp_response; # any 4xx code ?
if (defined($recip_smtp_response) && $recip_smtp_response =~ /^4/) {
$any_tempfail = $recip_smtp_response . ' (' . $r->recip_addr . ')';
}
}
if (!$r->recip_done && (!$filter || &$filter($r))) {
my $proto_sockname = $r->delivery_method;
defined $proto_sockname
or die "mail_dispatch: undefined delivery_method";
!ref $proto_sockname || ref $proto_sockname eq 'ARRAY'
or die "mail_dispatch: not a scalar or array ref: $proto_sockname";
for (ref $proto_sockname ? @$proto_sockname : $proto_sockname) {
local($1);
if (/^([a-z][a-z0-9.+-]*):/si) { $protocols{lc($1)} = 1 }
else { die "mail_dispatch: no recognized protocol name: $_" }
}
}
}
my(@unknown) =
grep(!/^(?:smtp|lmtp|pipe|bsmtp|sql|local)\z/i, keys %protocols);
!@unknown or die "mail_dispatch: unknown protocol: ".join(', ',@unknown);
if (!$dsn_per_recip_capable && defined $any_tempfail) {
do_log(0, "temporary failures, giving up further deliveries: %s",
$any_tempfail);
my $smtp_resp =
"451 4.5.0 Giving up due to previous temporary failures, id=" .
$msginfo->log_id;
# flag the remaining undelivered recipients as temporary failures
for my $r (@$per_recip_data) {
next if $r->recip_done;
$r->recip_smtp_response($smtp_resp); $r->recip_done(1);
}
last;
}
# do one protocol per iteration only, so that we can bail out
# as soon as some 4xx temporary failure is detected, avoiding
# further deliveries which would lead to duplicate deliveries
#
if ($protocols{'smtp'} || $protocols{'lmtp'}) {
Amavis::Out::SMTP::mail_via_smtp(@_);
$any_deliveries = 1; # approximation, will do for the time being
} elsif ($protocols{'local'}) {
Amavis::Out::Local::mail_to_local_mailbox(@_);
$any_deliveries = 1; # approximation, will do for the time being
} elsif ($protocols{'pipe'}) {
Amavis::Out::Pipe::mail_via_pipe(@_);
$any_deliveries = 1; # approximation, will do for the time being
} elsif ($protocols{'bsmtp'}) {
Amavis::Out::BSMTP::mail_via_bsmtp(@_);
$any_deliveries = 1; # approximation, will do for the time being
} elsif ($protocols{'sql'}) {
$Amavis::extra_code_sql_quar && $Amavis::sql_storage
or die "SQL quarantine code not enabled (1)";
Amavis::Out::SQL::Quarantine::mail_via_sql(
$Amavis::sql_dataset_conn_storage, @_);
$any_deliveries = 1; # approximation, will do for the time being
}
# are we done yet?
my $num_recips_notdone_after =
scalar(grep(!$_->recip_done && (!$filter || &$filter($_)),
@$per_recip_data));
if ($num_recips_notdone_after >= $num_recips_notdone) {
do_log(-2, "TROUBLE: Number of recipients (%d) not reduced, ".
"abandoning effort, proto: %s",
$num_recips_notdone_after, join(', ', keys %protocols) );
last;
}
if ($num_recips_notdone_after > 0) {
do_log(3, "Sent to %s recipients, %s still to go",
$num_recips_notdone - $num_recips_notdone_after,
$num_recips_notdone_after);
}
$num_recips_notdone = $num_recips_notdone_after;
}
# restore header edits if modified
$msginfo->header_edits($saved_hdr_edits) if defined $tmp_hdr_edits;
$any_deliveries; # (estimate) were any successful deliveries actually done?
}
1;
#
package Amavis::UnmangleSender;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&first_received_from &oldest_public_ip_addr_from_received);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Util qw(ll do_log unique_list);
import Amavis::rfc2821_2822_Tools qw(
split_address parse_received fish_out_ip_from_received);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Lookup::IP qw(normalize_ip_addr);
}
use subs @EXPORT_OK;
# Obtain and parse the first entry (oldest) in the 'Received:' header field
# path trace - to be used as the value of a macro %t in customized messages
#
sub first_received_from($) {
my $msginfo = $_[0];
my $first_received;
my $fields_ref =
parse_received($msginfo->get_header_field_body('received')); # last
if (exists $fields_ref->{'from'}) {
$first_received = join(' ', unique_list(grep(defined($_),
@$fields_ref{qw(from from-tcp from-com)})));
do_log(5, "first_received_from: %s", $first_received);
}
$first_received;
}
# Try to extract sender's IP address from the Received trace.
# Search bottom-up, use the first public IP address from the trace.
#
sub oldest_public_ip_addr_from_received($) {
my($msginfo) = @_;
my $received_from_ip;
my $ip_trace_ref = $msginfo->ip_addr_trace_public; # top-down trace
$received_from_ip = $ip_trace_ref->[-1] if $ip_trace_ref; # last is oldest
do_log(5, "oldest_public_ip_addr_from_received: %s", $received_from_ip)
if defined $received_from_ip;
$received_from_ip;
}
1;
#
package Amavis::Unpackers::NewFilename;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&consumed_bytes);
import Amavis::Conf qw(c cr ca
$MIN_EXPANSION_QUOTA $MIN_EXPANSION_FACTOR
$MAX_EXPANSION_QUOTA $MAX_EXPANSION_FACTOR);
import Amavis::Util qw(ll do_log min max minmax);
}
use vars qw($avail_quota); # available bytes quota for unpacked mail
use vars qw($rem_quota); # remaining bytes quota for unpacked mail
sub new($;$$) { # create a file name generator object
my($class, $maxfiles,$mail_size) = @_;
# calculate and initialize quota
$avail_quota = $rem_quota = # quota in bytes
max($MIN_EXPANSION_QUOTA, $mail_size * $MIN_EXPANSION_FACTOR,
min($MAX_EXPANSION_QUOTA, $mail_size * $MAX_EXPANSION_FACTOR));
ll(4) && do_log(4,'Original mail size: %d; quota set to: %d bytes '.
'(fmin=%s, fmax=%s, qmin=%s, qmax=%s)',
$mail_size, $avail_quota,
map(defined $_ ? "$_" : 'UNDEF',
$MIN_EXPANSION_FACTOR, $MAX_EXPANSION_FACTOR,
$MIN_EXPANSION_QUOTA, $MAX_EXPANSION_QUOTA));
# create object
bless {
num_of_issued_names => 0, first_issued_ind => 1, last_issued_ind => 0,
maxfiles => $maxfiles, # undef disables limit
objlist => [],
}, $class;
}
sub parts_list_reset($) { # clear a list of recently issued names
my $self = $_[0];
$self->{num_of_issued_names} = 0;
$self->{first_issued_ind} = $self->{last_issued_ind} + 1;
$self->{objlist} = [];
}
sub parts_list($) { # returns a ref to a list of recently issued names
my $self = $_[0];
$self->{objlist};
}
sub parts_list_add($$) { # add a parts object to the list of parts
my($self, $part) = @_;
push(@{$self->{objlist}}, $part);
}
sub generate_new_num($$) { # make-up a new number for a file and return it
my($self, $ignore_limit) = @_;
if (!$ignore_limit && defined($self->{maxfiles}) &&
$self->{num_of_issued_names} >= $self->{maxfiles}) {
# do not change the text in die without adjusting decompose_part()
die "Maximum number of files ($self->{maxfiles}) exceeded";
}
$self->{num_of_issued_names}++; $self->{last_issued_ind}++;
$self->{last_issued_ind};
}
sub consumed_bytes($$;$$) {
my($bytes, $bywhom, $tentatively, $exquota) = @_;
if (ll(4)) {
my $perc = !$avail_quota ? '' : sprintf(", (%.0f%%)",
100 * ($avail_quota - ($rem_quota - $bytes)) / $avail_quota);
do_log(4,"Charging %d bytes to remaining quota %d (out of %d%s) - by %s",
$bytes, $rem_quota, $avail_quota, $perc, $bywhom);
}
if ($bytes > $rem_quota && $rem_quota >= 0) {
# Do not modify the following signal text, it gets matched elsewhere!
my $msg = "Exceeded storage quota $avail_quota bytes by $bywhom; ".
"last chunk $bytes bytes";
do_log(-1, "%s", $msg);
die "$msg\n" if !$exquota; # die, unless allowed to exceed quota
}
$rem_quota -= $bytes unless $tentatively;
$rem_quota; # return remaining quota
}
1;
#
package Amavis::Unpackers::Part;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(ll do_log);
}
use vars qw($file_generator_object);
sub init($) { $file_generator_object = $_[0] }
sub new($;$$$) { # create a part descriptor object
my($class, $dir_name,$parent,$ignore_limit) = @_;
my $self = bless {}, $class;
if (!defined($dir_name) && !defined($parent)) {
# just make an empty object, presumably used as a new root
} else {
$self->number($file_generator_object->generate_new_num($ignore_limit));
$self->dir_name($dir_name) if defined $dir_name;
if (defined $parent) {
$self->parent($parent);
my $ch_ref = $parent->children;
push(@$ch_ref,$self); $parent->children($ch_ref);
}
$file_generator_object->parts_list_add($self); # save it
ll(4) && do_log(4, "Issued a new %s: %s",
defined $dir_name ? "file name" : "pseudo part", $self->base_name);
}
$self;
}
sub number
{ @_<2 ? shift->{number} : ($_[0]->{number} = $_[1]) };
sub dir_name
{ @_<2 ? shift->{dir_name} : ($_[0]->{dir_name} = $_[1]) };
sub parent
{ @_<2 ? shift->{parent} : ($_[0]->{parent} = $_[1]) };
sub children
{ @_<2 ? shift->{children}||[] : ($_[0]->{children} = $_[1]) };
sub mime_placement # part location within a MIME tree, e.g. "1/1/3"
{ @_<2 ? shift->{place} : ($_[0]->{place} = $_[1]) };
sub type_short # string or a ref to a list of strings, case sensitive
{ @_<2 ? shift->{ty_short} : ($_[0]->{ty_short} = $_[1]) };
sub type_long
{ @_<2 ? shift->{ty_long} : ($_[0]->{ty_long} = $_[1]) };
sub type_declared
{ @_<2 ? shift->{ty_decl} : ($_[0]->{ty_decl} = $_[1]) };
sub name_declared # string or a ref to a list of strings
{ @_<2 ? shift->{nm_decl} : ($_[0]->{nm_decl} = $_[1]) };
sub report_type # a string, e.g. 'delivery-status', RFC 6522
{ @_<2 ? shift->{rep_typ} : ($_[0]->{rep_typ} = $_[1]) };
sub size # size in bytes
{ @_<2 ? shift->{size} : ($_[0]->{size} = $_[1]) };
sub digest # digest of a mime part contents (typically SHA1, hex)
{ @_<2 ? shift->{digest} : ($_[0]->{digest} = $_[1]) };
sub exists
{ @_<2 ? shift->{exists} : ($_[0]->{exists} = $_[1]) };
sub attributes # a string of characters representing attributes
{ @_<2 ? shift->{attr} : ($_[0]->{attr} = $_[1]) };
sub attributes_add { # U=undecodable, C=crypted, B=ambiguous-content,
# D=directory, S=special, L=link
my $self = shift; my $a = $self->{attr}; $a = '' if !defined $a;
for my $arg (@_) { $a .= $arg if $arg ne '' && index($a,$arg) < 0 }
$self->{attr} = $a;
};
sub base_name { my $self = $_[0]; sprintf("p%03d",$self->number) }
sub full_name {
my $self = $_[0]; my $d = $self->dir_name;
!defined($d) ? undef : $d.'/'.$self->base_name;
}
# returns a ref to a list of part ancestors, starting with the root object,
# and including the part object itself
#
sub path {
my $self = $_[0];
my(@path);
for (my $p=$self; defined($p); $p=$p->parent) { unshift(@path,$p) }
\@path;
};
1;
#
package Amavis::Unpackers::OurFiler;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter MIME::Parser::Filer); # subclass of MIME::Parser::Filer
}
# This package will be used by mime_decode().
#
# We don't want no heavy MIME::Parser machinery for file name extension
# guessing, decoding charsets in filenames (and listening to complaints
# about it), checking for evil filenames, checking for filename contention, ...
# (which cannot be turned off completely by ignore_filename(1) !!!)
# Just enforce our file name! And while at it, collect generated filenames.
#
sub new($$$) {
my($class, $dir, $parent_obj) = @_;
$dir =~ s{/+\z}{}; # chop off trailing slashes from directory name
bless {parent => $parent_obj, directory => $dir}, $class;
}
# provide a generated file name
#
sub output_path($@) {
my($self, $head) = @_;
my $newpart_obj =
Amavis::Unpackers::Part->new($self->{directory}, $self->{parent}, 1);
get_amavisd_part($head, $newpart_obj); # store object into head
$newpart_obj->full_name;
}
sub get_amavisd_part($;$) {
my $head = shift;
!@_ ? $head->{amavisd_parts_obj} : ($head->{amavisd_parts_obj} = shift);
}
1;
#
package Amavis::Unpackers::Validity;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&check_header_validity &check_for_banned_names);
import Amavis::Util qw(ll do_log min max minmax untaint untaint_inplace
is_valid_utf_8 truncate_utf_8);
import Amavis::Conf qw(:platform %banned_rules c cr ca);
import Amavis::Lookup qw(lookup lookup2);
}
use subs @EXPORT_OK;
sub check_header_validity($) {
my $msginfo = $_[0];
my(%field_head_counts, @bad);
my $minor_badh_category = 0;
my $allowed_tests = cr('allowed_header_tests');
my($t_syntax, $t_empty, $t_long, $t_control, $t_8bit, $t_utf8,
$t_missing, $t_multiple) =
!$allowed_tests ? () : @$allowed_tests{qw(syntax empty long control
8bit utf8 missing multiple)};
# minor category: 2: 8-bit char, 3: NUL/CR control, 4: empty line, 5: long,
# 6: syntax, 7: missing, 8: multiple
local($1,$2,$3);
for my $curr_head (@{$msginfo->orig_header}) {#array of hdr fields, not lines
my($field_name,$msg1,$msg2,$pre,$mid,$post);
# obsolete RFC 822 syntax allowed whitespace before colon
$field_name = $1 if $curr_head =~ /^([!-9;-\x7E\x80-\xFF]+)[ \t]*:/s;
$field_head_counts{lc($field_name)}++ if defined $field_name;
if (!defined($field_name) || substr($field_name,0,2) eq '--') {
if ($t_syntax) {
$msg1 = "Invalid header field syntax"; $msg2 = $curr_head;
$minor_badh_category = max(6, $minor_badh_category);
}
} elsif ($t_syntax && $field_name =~ /([^\x00-\x7F])/gs) {
$mid = $1; $msg1 = "Invalid header field name, contains non-ASCII char";
$minor_badh_category = max(6, $minor_badh_category);
} elsif ($t_empty && $curr_head =~ /^([ \t]+)(?=\n|\z)/gms) {
$mid = $1;
$msg1 ="Improper folded header field made up entirely of whitespace";
# note: using //g and pos to avoid deep recursion in regexp
$minor_badh_category = max(4, $minor_badh_category);
} elsif ($t_long && $curr_head =~ /^([^\n]{999,})(?=\n|\z)/gms) {
$msg1 = "Header line longer than 998 characters"; $msg2 = $1;
substr($msg2, 50) = '[...]' if length($msg2) > 55;
$minor_badh_category = max(5, $minor_badh_category);
} elsif ($t_control && $curr_head =~ /([\000\015])/gs) {
$mid = $1; $msg1 = "Improper use of control character";
$minor_badh_category = max(3, $minor_badh_category);
} elsif ($t_8bit && $curr_head =~ /([^\x00-\x7F])/gs) { # non-ASCII
$mid = $1;
if (!is_valid_utf_8($curr_head)) {
$msg1 = 'Non-encoded non-ASCII data (and not UTF-8)';
} elsif ($curr_head =~ /^([\x00-\x08\x0B-\x1F\x7F])/xgs) { # but TAB,NL
$mid = $1; $msg1 = 'UTF-8 string contains C0 Controls';
} elsif ($curr_head =~
/( (?: \xC2 | \xE0 \x82 | \xF0 \x80 \x82 ) [\x80-\x9F] )/xgs) {
# RFC 5198 prohibits "C1 Controls" (U+0080..U+009F) for Net-Unicode
$mid = $1; $msg1 = 'UTF-8 string contains C1 Controls';
} elsif ($msginfo->smtputf8) {
# UTF-8 header bodies (but not field names) are valid with SMTPUTF8
} elsif ($t_utf8) {
$msg1 = 'Non-encoded UTF-8 string in non-EAI mail';
if ($curr_head =~ /( [\xC0-\xDF][\x80-\xBF] |
[\xE0-\xEF][\x80-\xBF]{2} |
[\xF0-\xF4][\x80-\xBF]{3} )/xgs ) {
$mid = $1; # capture the entire first non-ASCII UTF-8 character
}
}
$minor_badh_category = max(2, $minor_badh_category) if defined $msg1;
}
if (defined $msg1) {
$mid = '' if !defined $mid;
if (!defined $msg2) {
$pre = substr($curr_head, 0, pos($curr_head)-length($mid))
if !defined $pre;
$post = substr($curr_head,pos($curr_head)) if !defined $post;
chomp($post);
$mid = truncate_utf_8($mid, 15).'[...]' if length($mid) > 20;
$post = truncate_utf_8($post,15).'[...]' if length($post) > 20;
if (length($pre)-length($field_name)-2 > 50-length($post)) {
$pre = $field_name . ': ...'
. substr($pre, length($pre) - (45-length($post)));
}
$msg2 = $pre . $mid . $post;
}
if ($mid ne '' && length($mid) <= 4) {
$msg1 .= " (char ";
$msg1 .= join(' ', map(sprintf('%02X',ord($_)), split(//,$mid)));
$msg1 .= " hex)";
}
push(@bad, "$msg1: $msg2");
last if @bad >= 100; # some sanity limit
}
}
# RFC 5322 (ex RFC 2822), RFC 2045, RFC 2183
for (qw(Date From Sender Reply-To To Cc Bcc Subject Message-ID References
In-Reply-To MIME-Version Content-Type Content-Transfer-Encoding
Content-ID Content-Description Content-Disposition Auto-Submitted)) {
my $n = $field_head_counts{lc($_)};
if (!$n && $t_missing && /^(?:Date|From)\z/i) {
push(@bad, "Missing required header field: \"$_\"");
$minor_badh_category = max(7, $minor_badh_category);
} elsif ($n > 1 && $t_multiple) {
if ($n == 2) {
push(@bad, "Duplicate header field: \"$_\"");
} else {
push(@bad, sprintf('Header field occurs more than once: "%s" '.
'occurs %d times', $_, $n));
}
$minor_badh_category = max(8, $minor_badh_category);
}
}
for (@bad) { # sanitize C0 controls and non-ASCII
s{ ( [^\x20-\x7E] | \\ (?= x \{ ) ) }
{ sprintf('\\x{%02X}', ord($1)) }xgse if tr/\x00-\x7F//c;
}
if (!@bad) {
do_log(5,"check_header: %d, OK", $minor_badh_category);
} elsif (ll(2)) {
do_log(2,"check_header: %d, %s", $minor_badh_category, $_) for @bad;
}
(\@bad, $minor_badh_category);
}
sub check_for_banned_names($) {
my $msginfo = $_[0];
do_log(3, "Checking for banned types and filenames");
my $bfnmr = ca('banned_filename_maps'); # two-level map: recip, partname
my(@recip_tables); # a list of records describing banned tables for recips
my $any_table_in_recip_tables = 0; my $any_not_bypassed = 0;
for my $r (@{$msginfo->per_recip_data}) {
my $recip = $r->recip_addr;
my(@tables,@tables_m); # list of banned lookup tables for this recipient
if (!$r->bypass_banned_checks) { # not bypassed
$any_not_bypassed = 1;
my($t_ref,$m_ref) = lookup2(1,$recip,$bfnmr);
if (defined $t_ref) {
for my $ti (0..$#$t_ref) { # collect all relevant tables for each recip
my $t = $t_ref->[$ti];
# an entry may be a ref to a list of lookup tables, or a comma- or
# whitespace-separated list of table names (suitable for SQL),
# which are mapped to actual lookup tables through %banned_rules
if (!defined($t)) {
# ignore
} elsif (ref($t) eq 'ARRAY') { # a list of actual lookup tables
push(@tables, @$t);
push(@tables_m, ($m_ref->[$ti]) x @$t);
} else { # a list of rules _names_, to be mapped via %banned_rules
my(@names);
my(@rawnames) = grep(!/^[, ]*\z/,
($t =~ /\G (?: " (?: \\. | [^"\\] ){0,999} "
| [^, ] )+ | [, ]+/xgs));
# in principle quoted strings could be used
# to construct lookup tables on-the-fly (not implemented)
for my $n (@rawnames) { # collect only valid names
if (!exists($banned_rules{$n})) {
do_log(2,"INFO: unknown banned table name %s, recip=%s",
$n,$recip);
} elsif (!defined($banned_rules{$n})) { # ignore undef
} else { push(@names,$n) }
}
ll(3) && do_log(3,"collect banned table[%d]: %s, tables: %s",
$ti,$recip, join(', ',map($_.'=>'.$banned_rules{$_}, @names)));
if (@names) { # any known and valid table names?
push(@tables, map($banned_rules{$_}, @names));
push(@tables_m, ($m_ref->[$ti]) x @names);
}
}
}
}
}
push(@recip_tables, { r => $r, recip => $recip,
tables => \@tables, tables_m => \@tables_m } );
$any_table_in_recip_tables=1 if @tables;
}
my $bnpre = cr('banned_namepath_re');
$bnpre = $$bnpre if ref($bnpre) eq 'REF'; # allow one level of indirection
if (!$any_not_bypassed) {
do_log(3,"skipping banned check: all recipients bypass banned checks");
} elsif (!$any_table_in_recip_tables && !ref($bnpre)) {
do_log(3,"skipping banned check: no applicable lookup tables");
} else {
do_log(4,"starting banned checks - traversing message structure tree");
my $parts_root = $msginfo->parts_root;
my $part;
for (my(@unvisited)=($parts_root);
@unvisited and $part=shift(@unvisited);
push(@unvisited,@{$part->children}))
{ # traverse decomposed parts tree breadth-first
my(@path) = @{$part->path};
next if @path <= 1;
shift(@path); # ignore place-holder root node
next if @{$part->children}; # ignore non-leaf nodes
my(@descr_trad); # a part path: list of predecessors of a message part
my(@descr); # same, but in form suitable for check on banned_namepath_re
for my $p (@path) {
my(@k,$n);
$n = $p->base_name;
if ($n ne '') { $n=~s/[\t\n]/ /g; push(@k,"P=$n") }
$n = $p->mime_placement;
if ($n ne '') { $n=~s/[\t\n]/ /g; push(@k,"L=$n") }
$n = $p->type_declared;
$n = [$n] if !ref($n);
for (@$n) {if ($_ ne ''){my $m=$_; $m=~s/[\t\n]/ /g; push(@k,"M=$m")}}
$n = $p->type_short;
$n = [$n] if !ref($n);
for (@$n) {if (defined($_) && $_ ne '')
{my $m=$_; $m=~s/[\t\n]/ /g; push(@k,"T=$m")} }
$n = $p->name_declared;
$n = [$n] if !ref($n);
for (@$n) {if (defined($_) && $_ ne '')
{my $m=$_; $m=~s/[\t\n]/ /g; push(@k,"N=$m")} }
$n = $p->attributes;
if (defined $n && $n ne '') { push(@k,"A=$_") for split(/ */,$n) }
push(@descr, join("\t",@k));
push(@descr_trad, [map { local($1,$2);
/^([a-zA-Z0-9])=(.*)\z/s; my($key_what,$key_val) = ($1,$2);
$key_what eq 'M' || $key_what eq 'N' ? $key_val
: $key_what eq 'T' ? ('.'.$key_val) # prepend a dot (compatibility)
: $key_what eq 'A' && $key_val eq 'U' ? 'UNDECIPHERABLE' : ()} @k]);
}
# we have obtained a description of a part as a list of its predecessors
# in a message structure including the part itself at the end of the list
my $key_val_str = join(' | ',@descr); $key_val_str =~ s/\t/,/g;
my $key_val_trad_str = join(' | ', map(join(',',@$_), @descr_trad));
# simplified result to be presented in an SMTP response and DSN
my $simple_part_name = join(',', @{$descr_trad[-1]}); # just leaf node
# evaluate current mail component path against each recipients' tables
ll(4) && do_log(4, "check_for_banned (%s) %s",
join(',', map($_->base_name, @path)), $key_val_trad_str);
for my $e (@recip_tables) {
@$e{qw(found result matchk part_descr_attr part_descr_trad part_name)}
= (0, undef, undef, undef, undef, undef);
}
my($result, $matchingkey, $t_ref_old);
for my $e (@recip_tables) { # for each recipient and his tables
my($found,$recip,$t_ref) = @$e{qw(found recip tables)};
if ($t_ref && @$t_ref) {
my $same_as_prev = $t_ref_old && @$t_ref_old==@$t_ref &&
!grep($t_ref_old->[$_] ne $t_ref->[$_], (0..$#$t_ref)) ? 1 : 0;
if ($same_as_prev) {
do_log(4,
"skip banned check for %s, same tables as previous, result => %s",
$recip,$result);
} else {
do_log(5,"doing banned check for %s on %s",
$recip,$key_val_trad_str);
($result,$matchingkey) =
lookup2(0, [map(@$_,@descr_trad)], # check all attribs in one go
[map(ref($_) eq 'ARRAY' ? @$_ : $_, @$t_ref)],
Label=>"check_bann:$recip");
$t_ref_old = $t_ref;
}
if (defined $result) {
@$e{qw(found result matchk
part_descr_attr part_descr_trad part_name)} =
(1, $result, $matchingkey,
$key_val_str, $key_val_trad_str, $simple_part_name);
}
}
}
if (ref $bnpre && grep(!$_->{result}, @recip_tables)) { # any non-true?
# try new style: banned_namepath_re; it is global, not per-recipient
my $descr_str = join("\n",@descr);
if ($] < 5.012003) {
# avoid a [perl #62048] bug in lookup_re():
# Unwarranted "Malformed UTF-8 character" on tainted variable
untaint_inplace($descr_str);
}
my($result,$matchingkey) = lookup2(0, $descr_str, [$bnpre],
Label=>'banned_namepath_re');
if (defined $result) {
for my $e (@recip_tables) {
if (!$e->{found}) {
@$e{qw(found result matchk
part_descr_attr part_descr_trad part_name)} =
(1, $result, $matchingkey,
$key_val_str, $key_val_trad_str, $simple_part_name);
}
}
}
}
my(%esc) = (r => "\r", n => "\n", f => "\f", b => "\b",
e => "\e", a => "\a", t => "\t"); # for pretty-printing
my $ll = grep($_->{result}, @recip_tables) ? 1 : 3; # log level
for my $e (@recip_tables) { # log and store results
my($r, $recip, $result, $matchingkey,
$part_descr_attr, $part_descr_trad, $part_name) =
@$e{qw(r recip result matchk
part_descr_attr part_descr_trad part_name)};
if (ll($ll)) { # only bother with logging when needed
local($1);
my $mk = defined $matchingkey ? $matchingkey : ''; # pretty-print
$mk =~ s{ \\(.) }{ exists($esc{$1}) ? $esc{$1} : '\\'.$1 }xgse;
do_log($result?1:3, 'p.path%s %s: "%s"%s',
!$result?'':" BANNED:$result", $recip, $key_val_str,
!defined $result ? '' : ", matching_key=\"$mk\"");
}
my $a;
if ($result) { # the part being tested is banned for this recipient
$a = $r->banned_parts || [];
push(@$a,$part_descr_trad); $r->banned_parts($a);
$a = $r->banned_parts_as_attr || [];
push(@$a,$part_descr_attr); $r->banned_parts_as_attr($a);
$a = $r->banning_rule_rhs || [];
push(@$a,$result); $r->banning_rule_rhs($a);
$a = $r->banning_rule_key || [];
$matchingkey = "$matchingkey"; # make a plain string out of a qr
push(@$a,$matchingkey); $r->banning_rule_key($a);
my(@comments) = $matchingkey =~ / \( \? \# \s* (.*?) \s* \) /xgs;
$a = $r->banning_rule_comment || [];
push(@$a, @comments ? join(' ',@comments) : $matchingkey);
$r->banning_rule_comment($a);
if (!defined($r->banning_reason_short)) { # just the first
my $s = $part_name;
$s =~ s/[ \t]{6,}/ ... /g; # compact whitespace
$s = join(' ',@comments) . ':' . $s if @comments;
$r->banning_reason_short($s);
}
}
}
# last if !grep(!$_->{result}, @recip_tables); # stop if all recips true
} # endfor: message tree traversal
} # endif: doing parts checking
}
1;
#
package Amavis::Unpackers::MIME;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&mime_decode);
import Amavis::Conf qw(:platform c cr ca $TEMPBASE $MAXFILES);
import Amavis::Timing qw(section_time);
import Amavis::Util qw(snmp_count untaint ll do_log
safe_decode safe_decode_latin1
safe_encode safe_encode_utf8_inplace);
import Amavis::Unpackers::NewFilename qw(consumed_bytes);
}
use subs @EXPORT_OK;
use Errno qw(ENOENT EACCES);
use IO::File qw(O_RDONLY O_WRONLY O_CREAT O_EXCL);
use MIME::Parser;
use MIME::Words;
use Digest::MD5;
use Digest::SHA;
# use Scalar::Util qw(tainted);
# save MIME preamble and epilogue (if nontrivial) as extra (pseudo)parts
#
sub mime_decode_pre_epi($$$$$) {
my($pe_name, $pe_lines, $tempdir, $parent_obj, $placement) = @_;
if (defined $pe_lines && @$pe_lines) {
do_log(5, "mime_decode_%s: %d lines", $pe_name, scalar(@$pe_lines));
if (@$pe_lines > 5 || "@$pe_lines" !~ m{^[A-Za-z0-9/\@:;,. \t\n_-]*\z}s) {
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts",$parent_obj,1);
$newpart_obj->mime_placement($placement);
$newpart_obj->name_declared($pe_name);
my $newpart = $newpart_obj->full_name;
my $outpart = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$outpart->open($newpart, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create $pe_name file $newpart: $!";
binmode($outpart,':bytes') or die "Can't cancel :utf8 mode: $!";
my $len;
for (@$pe_lines) {
$outpart->print($_) or die "Can't write $pe_name to $newpart: $!";
$len += length($_);
}
$outpart->close or die "Error closing $pe_name $newpart: $!";
$newpart_obj->size($len);
consumed_bytes($len, "mime_decode_$pe_name", 0, 1);
}
}
}
sub ambiguous_content {
my $entity = shift;
if ($entity->can('ambiguous_content')) {
return $entity->ambiguous_content;
} else {
return unless $entity->is_multipart;
my $content_type = $entity->head->get('Content-Type');
if ($content_type && $content_type =~ m{^multipart/\w+(.+)}x) {
my ($params, $num) = ($1, 0);
while ($params =~ m{\G ; \s+ (?<param>\w+) = (?: \w+ | "(?:\\.|[^"\\])*" )}gx) {
$num++ if lc($+{param}) eq 'boundary';
}
return $num > 1;
}
return;
}
}
# traverse MIME::Entity object depth-first,
# extracting preambles and epilogues as extra (pseudo)parts, and
# filling-in additional information into Amavis::Unpackers::Part objects
#
sub mime_traverse($$$$$); # prototype
sub mime_traverse($$$$$) {
my($entity, $tempdir, $parent_obj, $depth, $placement) = @_;
mime_decode_pre_epi('preamble', $entity->preamble,
$tempdir, $parent_obj, $placement);
my($mt, $et) = ($entity->mime_type, $entity->effective_type);
my $part; my $head = $entity->head; my $body = $entity->bodyhandle;
if (!defined($body)) { # a MIME container only contains parts, no bodypart
# create pseudo-part objects for MIME containers (e.g. multipart/* )
$part = Amavis::Unpackers::Part->new(undef,$parent_obj,1);
$part->attributes_add('B') if ambiguous_content($entity);
# $part->type_short('no-file');
do_log(2, "%s %s Content-Type: %s", $part->base_name, $placement, $mt);
} else { # does have a body part (i.e. not a MIME container)
# base64 encoding represents line-endings in a canonical CRLF form, so it
# must be converted to a local representation for text parts when decoding;
# RFC 2045 explicitly prohibits encoding CR and LF of a canonical CRLF pair
# in quoted-printable encoding of textual parts, but some mail generating
# software ignores this requirement, so we have to normalize line endings
# (turn CRLF to \n) for both the base64 and the quoted-printable encodings
my $encoding = $head->mime_encoding;
my $normalize_line_endings =
$mt =~ m{^(?:text|message)(?:/|\z)}i &&
($encoding eq 'base64' || $encoding eq 'quoted-printable');
my $digest_ctx; # body-part digester context object, or undef
# choose a message digest: MD5: 128 bits, SHA family: 160..512 bits
# Use SHA1 for SpamAssassin bayes compatibility!
my $digest_algorithm = c('mail_part_digest_algorithm');
if (defined $digest_algorithm) {
$digest_ctx = uc $digest_algorithm eq 'MD5' ? Digest::MD5->new
: Digest::SHA->new($digest_algorithm);
}
my $size;
my $fn = $body->path;
if (!defined $fn) {
# body part resides in memory only
if (!$digest_ctx) {
$size = length($body->as_string);
} else {
my $buff = $body->as_string;
$size = length $buff;
$buff =~ s{\015(?=\012|\z)}{}gs if $normalize_line_endings;
$digest_ctx->add($buff);
}
} else {
# body part resides on a file
my $msg; my $errn = lstat($fn) ? 0 : 0+$!;
if ($errn == ENOENT) { $msg = "does not exist" }
elsif ($errn) { $msg = "is inaccessible: $!" }
elsif (!-r _) { $msg = "is not readable" }
elsif (!-f _) { $msg = "is not a regular file" }
else {
$size = -s _;
if ($size == 0) {
do_log(4,"mime_traverse: file %s is empty", $fn);
} elsif ($digest_ctx) {
my $fh = IO::File->new;
$fh->open($fn,O_RDONLY) # does a sysopen
or die "Can't open file $fn for reading: $!";
$fh->binmode or die "Can't set file $fn to binmode: $!";
my($nbytes,$buff);
while ($nbytes=sysread($fh,$buff,32768)) {
$buff =~ s{\015(?=\012|\z)}{}gs if $normalize_line_endings;
$digest_ctx->add($buff);
}
defined $nbytes or die "Error reading file $fn: $!";
}
}
do_log(-1,"WARN: mime_traverse: file %s %s", $fn,$msg) if defined $msg;
}
consumed_bytes($size, 'mime_decode', 0, 1);
# retrieve Amavis::Unpackers::Part object (if any), stashed into head obj
$part = Amavis::Unpackers::OurFiler::get_amavisd_part($head);
if (defined $part) {
$part->size($size);
if (defined($size) && $size==0) {
$part->type_short('empty'); $part->type_long('empty');
}
my $digest;
if ($digest_ctx) {
$digest = $digest_ctx->hexdigest;
# store as a hex digest, followed by Content-Type
$part->digest($digest . ':' . lc($mt||''));
}
if (ll(2)) { # pretty logging
my $filename = $head->recommended_filename;
$encoding = 'QP' if $encoding eq 'quoted-printable';
do_log(2, "%s %s Content-Type: %s, %s, size: %d%s%s",
$part->base_name, $placement, $mt, $encoding, $size,
defined $digest ? ", $digest_algorithm digest: $digest" : '',
defined $filename ? ", name: $filename" : '');
}
my $old_parent_obj = $part->parent;
if ($parent_obj ne $old_parent_obj) { # reparent if necessary
ll(5) && do_log(5,"reparenting %s from %s to %s", $part->base_name,
$old_parent_obj->base_name, $parent_obj->base_name);
my $ch_ref = $old_parent_obj->children;
$old_parent_obj->children([grep($_ ne $part, @$ch_ref)]);
$ch_ref = $parent_obj->children;
push(@$ch_ref,$part); $parent_obj->children($ch_ref);
$part->parent($parent_obj);
}
}
}
if (defined $part) {
$part->mime_placement($placement);
$part->type_declared($mt eq $et ? $mt : [$mt, $et]);
$part->attributes_add('U','C') if $mt =~ m{/.*encrypted}si ||
$et =~ m{/.*encrypted}si;
my %rn_seen;
my @rn; # recommended file names, both raw and RFC 2047 / RFC 2231 decoded
for my $attr_name ('content-disposition.filename', 'content-type.name') {
my $val_raw = $head->mime_attr($attr_name);
next if !defined $val_raw || $val_raw eq '';
my $val_dec = ''; # decoded, represented as native Perl characters
eval {
my(@chunks) = MIME::Words::decode_mimewords($val_raw);
for my $pair (@chunks) {
my($data,$encoding) = @$pair;
if (!defined $encoding || $encoding eq '') {
$val_dec .= safe_decode_latin1($data); # assumes ISO-8859-1
} else {
$encoding =~ s/\*[^*]*\z//s; # strip RFC 2231 language suffix
$val_dec .= safe_decode($encoding,$data);
}
}
1;
} or do {
do_log(3, "mime_traverse: decoding MIME words failed: %s", $@);
};
if ($val_dec ne '' && !$rn_seen{$val_dec}) {
push(@rn,$val_dec); $rn_seen{$val_dec} = 1;
}
if (!$rn_seen{$val_raw}) {
push(@rn,$val_raw); $rn_seen{$val_raw} = 1;
}
}
$part->name_declared(@rn==1 ? $rn[0] : \@rn) if @rn;
my $val = $head->mime_attr('content-type.report-type');
safe_encode_utf8_inplace($val);
$part->report_type($val) if defined $val && $val ne '';
}
mime_decode_pre_epi('epilogue', $entity->epilogue,
$tempdir, $parent_obj, $placement);
my $item_num = 0;
for my $e ($entity->parts) { # recursive descent
$item_num++;
mime_traverse($e, $tempdir, $part, $depth+1, "$placement/$item_num");
}
}
# Break up mime parts, return a MIME::Entity object
#
sub mime_decode($$$) {
my($msg, $tempdir, $parent_obj) = @_;
# $msg may be an open file handle, or a file name, or a string ref
my $parser = MIME::Parser->new;
# File::Temp->new defaults to /tmp or a current directory, ignoring TMPDIR
$parser->tmp_dir($TEMPBASE) if $parser->UNIVERSAL::can('tmp_dir');
$parser->filer(
Amavis::Unpackers::OurFiler->new("$tempdir/parts", $parent_obj) );
$parser->ignore_errors(1); # also is the default
# if bounce killer is enabled, extract_nested_messages must be off,
# otherwise we lose headers of attached message/rfc822 or message/global
$parser->extract_nested_messages(0);
# $parser->extract_nested_messages("NEST"); # parse embedded message/rfc822
# "NEST" complains with "part did not end with expected boundary" when
# the outer message is message/partial and the inner message is chopped
$parser->extract_uuencode(1); # to enable or not to enable ???
$parser->max_parts($MAXFILES) if defined $MAXFILES && $MAXFILES > 0 &&
$parser->UNIVERSAL::can('max_parts');
snmp_count('OpsDecByMimeParser');
my $entity;
{ local($1,$2,$3,$4,$5,$6); # avoid Perl 5.8.* bug, $1 can get tainted !
if (!defined $msg) {
$entity = $parser->parse_data('');
} elsif (!ref $msg) { # assume $msg is a file name
do_log(4, "Extracting mime components from file %s", $msg);
$entity = $parser->parse_open("$tempdir/parts/$msg");
} elsif (ref $msg eq 'SCALAR') {
do_log(4, "Extracting mime components from a string");
# parse_data() should be avoided with IO::File 1.09 or older:
# it uses a mode '>:' to force a three-argument open(), but a mode
# with a colon is only recognized starting with IO::File 1.10,
# which comes with perl 5.8.1
IO::File->VERSION(1.10); # required minimal version
$entity = $parser->parse_data($msg); # takes a ref to a string
} elsif (ref $msg) { # assume an open file handle
do_log(4, "Extracting mime components from a file");
$msg->seek(0,0) or die "Can't rewind mail file: $!";
$entity = $parser->parse($msg);
}
}
my $mime_err;
my(@mime_errors) = $parser->results->errors; # a list!
if (@mime_errors) {
# $mime_err = $mime_errors[0]; # only show the first error
$mime_err = join('; ',@mime_errors); # show all errors
}
if (defined $mime_err) {
$mime_err=~s/\s+\z//; $mime_err=~s/[ \t\r]*\n+/; /g; $mime_err=~s/\s+/ /g;
substr($mime_err,250) = '[...]' if length($mime_err) > 250;
do_log(1, "WARN: MIME::Parser %s", $mime_err) if $mime_err ne '';
} elsif (!defined($entity)) {
$mime_err = "Unable to parse, perhaps message contains too many parts";
do_log(1, "WARN: MIME::Parser %s", $mime_err);
$entity = '';
}
mime_traverse($entity, $tempdir, $parent_obj, 0, '1') if $entity;
section_time('mime_decode');
($entity, $mime_err);
}
1;
#
package Amavis::MIME::Body::OnOpenFh;
# A body class that keeps data on an open file handle, read-only,
# while allowing to prepend a couple of lines when reading from it.
# $skip_bytes bytes at the beginning of a given open file are ignored.
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter MIME::Body); # subclass of MIME::Body
import Amavis::Util qw(ll do_log);
}
sub init {
my($self, $fh,$prefix_lines,$skip_bytes) = @_;
$self->{MB_Am_fh} = $fh;
$self->{MB_Am_prefix} = defined $prefix_lines ? join('',@$prefix_lines) : '';
$self->{MB_Am_prefix_l} = length($self->{MB_Am_prefix});
$self->{MB_Am_skip_bytes} = !defined $skip_bytes ? 0 : $skip_bytes;
$self->is_encoded(1);
$self;
}
sub open {
my($self,$mode) = @_;
$self->close; # ignoring status
$mode eq 'r' or die "Only offers read-only access, mode: $mode";
my $fh = $self->{MB_Am_fh}; my $skip = $self->{MB_Am_skip_bytes};
$fh->seek($skip,0) or die "Can't rewind mail file: $!";
$self->{MB_Am_pos} = 0;
bless { parent => $self }; #** One-argument "bless" warning
}
sub close { 1 }
sub read { # SCALAR,LENGTH,OFFSET
my $self = shift; my $len = $_[1]; my $offset = $_[2];
my $parent = $self->{parent}; my $pos = $parent->{MB_Am_pos};
my $str1 = ''; my $str2 = ''; my $nbytes = 0;
if ($len > 0 && $pos < $parent->{MB_Am_prefix_l}) {
$str1 = substr($parent->{MB_Am_prefix}, $pos, $len);
$nbytes += length($str1); $len -= $nbytes;
}
my $msg;
if ($len > 0) {
my $nb = $parent->{MB_Am_fh}->read($str2,$len);
if (!defined $nb) {
$msg = "Error reading: $!";
} elsif ($nb < 1) {
# read returns 0 at eof
} else {
$nbytes += $nb; $len -= $nb;
}
}
if (defined $msg) {
undef $nbytes; # $! already set by a failed read
} else {
($offset ? substr($_[0],$offset) : $_[0]) = $str1.$str2;
$pos += $nbytes; $parent->{MB_Am_pos} = $pos;
}
$nbytes; # eof: 0; error: undef
}
1;
#
package Amavis::Notify;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&delivery_status_notification &delivery_short_report
&build_mime_entity &defanged_mime_entity
&msg_from_quarantine &expand_variables);
import Amavis::Util qw(ll do_log sanitize_str min max minmax
untaint untaint_inplace
idn_to_ascii idn_to_utf8 mail_addr_idn_to_ascii
is_valid_utf_8 safe_decode_utf8
safe_encode safe_encode_utf8 safe_encode_utf8_inplace
orcpt_encode orcpt_decode xtext_decode safe_decode_mime
make_password ccat_split ccat_maj generate_mail_id);
import Amavis::Timing qw(section_time);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::ProcControl qw(exit_status_str proc_status_ok
run_command collect_results);
import Amavis::Out::EditHeader qw(hdr);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Expand qw(expand);
import Amavis::rfc2821_2822_Tools;
}
use subs @EXPORT_OK;
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use MIME::Entity;
use Time::HiRes ();
# replace substring ${myhostname} with a value of a corresponding variable
sub expand_variables($) {
my $str = $_[0]; local($1,$2);
my $myhost = idn_to_utf8(c('myhostname'));
$str =~ s{ \$ (?: \{ ([^\}]+) \} |
([a-zA-Z](?:[a-zA-Z0-9_-]*[a-zA-Z0-9])?\b) ) }
{ { 'myhostname' => $myhost,
'myhostname_utf8' => $myhost,
'myhostname_ascii' => idn_to_ascii($myhost),
}->{lc($1.$2)}
}xgse;
$str;
}
# wrap a mail message into a ZIP archive
#
sub wrap_message_into_archive($$) {
my($msginfo,$prefix_lines_ref) = @_;
# a file with a copy of a mail msg as retrieved from a quarantine:
my $attachment_email_name = c('attachment_email_name'); # 'msg-%m.eml'
# an archive file (will contain a retrieved message) to be attached:
my $attachment_outer_name = c('attachment_outer_name'); # 'msg-%m.zip'
my($email_fh, $arch_size);
my $mail_id = $msginfo->mail_id;
if (!defined $mail_id || $mail_id eq '') {
$mail_id = '';
} else {
$mail_id =~ /^[A-Za-z0-9_-]*\z/ or die "unsafe mail_id: $mail_id";
untaint_inplace($mail_id);
}
for ($attachment_email_name, $attachment_outer_name) {
local $1;
s{%(.)}{ $1 eq 'b' ? $msginfo->body_digest
: $1 eq 'P' ? $msginfo->partition_tag
: $1 eq 'm' ? $mail_id
: $1 eq 'n' ? $msginfo->log_id
: $1 eq 'i' ? iso8601_timestamp($msginfo->rx_time,1) #,'-')
: $1 eq '%' ? '%' : '%'.$1 }gse;
$_ = $msginfo->mail_tempdir . '/' . $_;
}
my $eval_stat;
eval {
# copy a retrieved message to a file
$email_fh = IO::File->new;
$email_fh->open($attachment_email_name, O_CREAT|O_EXCL|O_RDWR, 0640)
or die "Can't create file $attachment_email_name: $!";
binmode($email_fh,':bytes') or die "Can't cancel :utf8 mode: $!";
for (@$prefix_lines_ref) {
$email_fh->print($_)
or die "Error writing to $attachment_email_name: $!";
}
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
# copy quarantined mail starting at skip_bytes to $attachment_email_name
my $file_position = $msginfo->skip_bytes;
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
while ($file_position < length($$msg)) {
$email_fh->print(substr($$msg,$file_position,16384))
or die "Error writing to $attachment_email_name: $!";
$file_position += 16384; # may overshoot, no problem
}
} elsif ($msg->isa('MIME::Entity')) {
die "wrapping a MIME::Entity object is not implemented";
} else {
$msg->seek($file_position,0) or die "Can't rewind mail file: $!";
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,16384)) > 0) {
$email_fh->print($buff)
or die "Error writing to $attachment_email_name: $!";
}
defined $nbytes or die "Error reading mail file: $!";
undef $buff; # release storage
}
$email_fh->close or die "Can't close file $attachment_email_name: $!";
undef $email_fh;
# create a password-protected archive containing the just prepared file;
# no need to shell-protect arguments, as this does not invoke a shell
my $password = $msginfo->attachment_password;
my(@command) = ( qw(zip -q -j -l),
$password eq '' ? () : ('-P', $password),
$attachment_outer_name, $attachment_email_name );
# supplying a password on a command line is lame as it shows in ps(1),
# but an option -e would require a pseudo terminal, which is really
# an overweight cannon unnecessary here: the password is used as a
# scrambler only, protecting against accidental opening of a file,
# so there is no security issue here
$password = 'X' x length($password); # can't hurt to wipe out
my($proc_fh,$pid) = run_command(undef,undef,@command);
my($r,$status) = collect_results($proc_fh,$pid,'zip',16384,[0]);
undef $proc_fh; undef $pid;
do_log(2,'archiver said: %s',$$r) if ref $r && $$r ne '';
$status == 0 or die "Error creating an archive: $status, $$r";
my $errn = lstat($attachment_outer_name) ? 0 : 0+$!;
if ($errn) { die "Archive $attachment_outer_name is inaccessible: $!" }
else { $arch_size = 0 + (-s _) }
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
};
if ($eval_stat ne '' || !$arch_size) { # handle failure
my $msg = $eval_stat ne '' ? $eval_stat
: sprintf("archive size %d", $arch_size);
do_log(-1,'Preparing an archive from a quarantined message failed: %s',
$msg);
if (defined $email_fh && $email_fh->fileno) {
$email_fh->close
or do_log(-1,"Can't close %s: %s", $attachment_email_name, $!);
}
undef $email_fh;
if (-e $attachment_email_name) {
unlink($attachment_email_name)
or do_log(-1,"Can't remove %s: %s", $attachment_email_name, $!);
}
if (-e $attachment_outer_name) {
unlink($attachment_outer_name)
or do_log(-1,"Can't remove %s: %s", $attachment_outer_name, $!);
}
die "Preparing an archive from a quarantined message failed: $msg\n";
}
$attachment_outer_name;
}
# Create a MIME::Entity object. If $mail_as_string_ref points to a string
# (multiline mail header with a plain text body) it is added as the first
# MIME part. Optionally attach a message header section from original mail,
# or attach a complete original message.
#
sub build_mime_entity($$$$$$$) {
my($mail_as_string_ref, $msginfo, $mime_type, $msg_format, $flat,
$attach_orig_headers, $attach_orig_message) = @_;
$msg_format = '' if !defined $msg_format;
if (!defined $mime_type || $mime_type !~ m{^ multipart (?: / | \z)}xsi) {
my $multipart_cnt = 0;
$multipart_cnt++ if $mail_as_string_ref;
$multipart_cnt++ if defined $msginfo &&
($attach_orig_headers || $attach_orig_message);
$mime_type = 'multipart/mixed' if $multipart_cnt > 1;
}
my($entity,$m_hdr,$m_body);
if (!$mail_as_string_ref) {
# no plain text part
} elsif ($$mail_as_string_ref eq '') {
$m_hdr = $m_body = '';
} elsif (substr($$mail_as_string_ref, 0,1) eq "\n") { # empty header section?
$m_hdr = ''; $m_body = substr($$mail_as_string_ref,1);
} else {
# calling index and substr is much faster than an equiv. split into $1,$2
# by a regular expression: /^( (?!\n) .*? (?:\n|\z))? (?: \n (.*) )? \z/xs
my $ind = index($$mail_as_string_ref,"\n\n"); # find header/body separator
if ($ind < 0) { # no body
$m_hdr = $$mail_as_string_ref; $m_body = '';
} else { # normal mail, nonempty header section and nonempty body
$m_hdr = substr($$mail_as_string_ref, 0, $ind+1);
$m_body = substr($$mail_as_string_ref, $ind+2);
}
}
safe_encode_utf8_inplace($m_hdr);
$m_body = safe_encode(c('bdy_encoding'), $m_body) if defined $m_body;
# make sure _our_ source line number is reported in case of failure
my $multipart_cnt = 0;
$mime_type = 'multipart/mixed' if !defined $mime_type;
eval {
# RFC 6522: 7bit should always be adequate for multipart/report encoding
$entity = MIME::Entity->build(
Type => $mime_type, Encoding => '8bit',
'X-Mailer' => undef);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
if (defined $m_hdr) { # insert header fields into MIME::Head entity;
# Mail::Header::modify allows all-or-nothing control over automatic header
# fields folding by Mail::Header, which is too bad - we would prefer
# to have full control on folding of header fields that are explicitly
# inserted here, and let Mail::Header handle the rest. Sorry, can't be
# done, so let's just disable folding by Mail::Header (which does a poor
# job when presented with few break opportunities), and wrap our header
# fields ourselves, hoping the remaining automatically generated header
# fields won't be too long.
local($1,$2);
my $head = $entity->head; $head->modify(0);
$m_hdr =~ s/\r?\n(?=[ \t])//gs; # unfold header fields in a template
for my $hdr_line (split(/\r?\n/, $m_hdr)) {
if ($hdr_line =~ /^([^:]*?)[ \t]*:[ \t]*(.*)\z/s) {
my($fhead,$fbody) = ($1,$2);
$fbody = safe_decode_mime($fbody); # to logical characters
# encode, wrap, ...
my $str = hdr($fhead, $fbody, 0, ' ', $msginfo->smtputf8);
# re-split the result
($fhead,$fbody) = ($1,$2) if $str =~ /^([^:]*):[ \t]*(.*)\z/s;
chomp($fbody);
do_log(5, "build_mime_entity %s: %s", $fhead,$fbody);
eval { # make sure _our_ source line number is reported on failure
$head->replace($fhead,$fbody); 1;
} or do {
$@ = "errno=$!" if $@ eq ''; chomp $@;
die $@ if $@ =~ /^timed out\b/; # resignal timeout
die sprintf("%s header field '%s: %s'",
($@ eq '' ? "invalid" : "$@, "), $fhead,$fbody);
};
}
}
}
my(@prefix_lines);
if (defined $m_body) {
if ($flat && $attach_orig_message) {
my($pos,$j); # split $m_body into lines, retaining each \n
for ($pos=0; ($j=index($m_body,"\n",$pos)) >= 0; $pos = $j+1) {
push(@prefix_lines, substr($m_body,$pos,$j-$pos+1));
}
push(@prefix_lines, substr($m_body,$pos)) if $pos < length($m_body);
} else {
my $cnt_8bit = $m_body =~ tr/\x00-\x7F//c;
eval { # make sure _our_ source line number is reported on failure
$entity->attach(
Type => 'text/plain', Data => $m_body,
Charset => !$cnt_8bit ? 'us-ascii' : c('bdy_encoding'),
Encoding => !$cnt_8bit ? '7bit'
: $cnt_8bit < 0.2 * length($m_body) ? 'quoted-printable'
: 'base64',
);
$multipart_cnt++; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
}
}
# prepend a Return-Path to make available the envelope sender address
push(@prefix_lines, "\n") if @prefix_lines; # separates text from a message
push(@prefix_lines, sprintf("Return-Path: %s\n", $msginfo->sender_smtp));
if (defined $msginfo && $attach_orig_headers && !$attach_orig_message) {
# attach a header section only
my $hdr_8bit =
$msginfo->header_8bit || grep(tr/\x00-\x7F//c, @prefix_lines);
my $hdr_utf8 = 1;
if ($hdr_8bit) {
for (@prefix_lines, @{$msginfo->orig_header}) {
if (tr/\x00-\x7F//c && !is_valid_utf_8($_)) { $hdr_utf8 = 0; last }
}
}
# RFC 6522 Encoding considerations for text/rfc822-headers:
# 7-bit is sufficient for normal mail headers, however, if the
# headers are broken or extended and require encoding to make them
# legal 7-bit content, they MAY be encoded with quoted-printable
# as defined in [MIME].
# RFC 6532 section 3.5: allows newly defined MIME types to permit
# content-transfer-encoding, and it allows content-transfer-encoding
# for message/global.
# RFC 6533: Note that [RFC6532] relaxed a restriction from MIME [RFC2046]
# regarding the use of Content-Transfer-Encoding in new "message"
# subtypes. This specification (RFC 6533) explicitly allows the use
# of Content-Transfer-Encoding in message/global-headers and
# message/global-delivery-status.
my $headers_mime_type =
$flat ? 'text/plain' :
$hdr_8bit && $hdr_utf8 ? 'message/global-headers' # RFC 6533
: 'text/rfc822-headers'; # RFC 6522
# [rt.cpan.org #98737] MIME::Tools 5.505 prohibits quoted-printable
# for message/global-headers. Fixed by a later release.
# my $headers_mime_encoding =
# !$hdr_8bit ? '7bit' :
# $headers_mime_type =~ m{^text/}i || MIME::Entity->VERSION > 5.505
# ? 'quoted-printable' : '8bit';
my $headers_mime_encoding = $hdr_8bit ? '8bit' : '7bit';
ll(4) && do_log(4,"build_mime_entity: attaching original ".
"header section, MIME type: %s, encoding: %s",
$headers_mime_type, $headers_mime_encoding);
# RFC 6533 section 6.3. Interoperability considerations:
# It is important that message/global-headers media type is not
# converted to a charset other than UTF-8. As a result, implementations
# MUST NOT include a charset parameter with this media type.
eval { # make sure _our_ source line number is reported on failure
$entity->attach(
Data => [@prefix_lines, @{$msginfo->orig_header}],
Type => $headers_mime_type,
Encoding => $headers_mime_encoding,
Filename => $headers_mime_type eq 'message/global-headers' ?
'header.u8hdr' : 'header.hdr',
Disposition => 'inline',
Description => 'Message header section',
);
$multipart_cnt++; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
} elsif (defined $msginfo && $attach_orig_message) {
# attach a complete message
my $password;
if ($msg_format eq 'attach') { # not 'arf' and not 'dsn'
$password = $msginfo->attachment_password; # already have it?
if (!defined $password) { # make one, and store it for later
$password = make_password(c('attachment_password'), $msginfo);
$msginfo->attachment_password($password);
}
}
if ($msg_format eq 'attach' && # not 'arf' and not 'dsn'
defined $password && $password ne '') {
# attach as a ZIP archive
$password = 'X' x length($password); # can't hurt to wipe out
do_log(4, "build_mime_entity: attaching entire original message as zip");
my $archive_fn = wrap_message_into_archive($msginfo,\@prefix_lines);
local($1); $archive_fn =~ m{([^/]*)\z}; my $att_filename = $1;
eval { # make sure _our_ source line number is reported on failure
my $att = $entity->attach( # RFC 2046
Type => 'application/zip', Filename => $att_filename,
Path => $archive_fn, Encoding => 'base64',
Disposition => 'attachment', Description => 'Original message',
);
$multipart_cnt++; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
} else {
# attach as a normal message
do_log(4, "build_mime_entity: attaching entire original message, plain");
my $orig_mail_as_body;
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# will be handled by ->attach
} elsif ($msg->isa('MIME::Entity')) {
die "attaching a MIME::Entity object is not implemented";
} else {
$orig_mail_as_body =
Amavis::MIME::Body::OnOpenFh->new($msginfo->mail_text,
\@prefix_lines, $msginfo->skip_bytes);
$orig_mail_as_body or die "Can't create Amavis::MIME::Body object: $!";
}
# RFC 6532 section 3.7: Internationalized messages in message/global
# format MUST only be transmitted as authorized by [RFC6531]
# or within a non-SMTP environment that supports these messages.
my $message_mime_type =
$flat ? 'text/plain' :
$msginfo->smtputf8 && $msginfo->header_8bit
? 'message/global' # RFC 6532
: 'message/rfc822';
# [rt.cpan.org #98737] MIME::Tools 5.505 prohibits quoted-printable
# for message/global. Fixed by a later release.
my $message_mime_encoding =
!$msginfo->header_8bit && !$msginfo->body_8bit ? '7bit' :
$message_mime_type =~ m{^text/}i || MIME::Entity->VERSION > 5.505
? 'quoted-printable' : '8bit';
eval { # make sure _our_ source line number is reported on failure
my $att = $entity->attach( # RFC 2046, RFC 6532
Type => $message_mime_type,
Encoding => $message_mime_encoding,
Data => defined $orig_mail_as_body ? []
: !$msginfo->skip_bytes ? $msg
: substr($$msg, $msginfo->skip_bytes),
# Path => $msginfo->mail_text_fn,
$flat ? () : (Disposition => 'attachment', Filename => 'message',
Description => 'Original message'),
# RFC 6532: File extension ".u8msg" is suggested for message/global
);
# direct access to tempfile handle
$att->bodyhandle($orig_mail_as_body) if defined $orig_mail_as_body;
$multipart_cnt++; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
}
}
$entity->make_singlepart if $multipart_cnt < 2;
$entity; # return the constructed MIME::Entity
}
# If $msg_format is 'dsn' generate a delivery status notification according
# to RFC 6522 (ex RFC 3462, RFC 1892), RFC 3464 (ex RFC 1894) and RFC 3461
# (ex RFC 1891).
# If $msg_format is 'arf' generate an abuse report according to RFC 5965
# - "An Extensible Format for Email Feedback Reports". If $msg_format is
# 'attach', generate a report message and attach the original message.
# If $msg_format is 'plain', generate a simple (flat) mail with the only
# MIME part being the original message (abuse@yahoo.com can't currently
# handle attachments in reports). Returns a message object, or undef if
# DSN is requested but not needed.
# $request_type: dsn, release, requeue, report
# $msg_format: dsn, arf, attach, plain, resend
# $feedback_type: abuse, dkim, fraud, miscategorized, not-spam,
# opt-out, virus, other
#
sub delivery_status_notification($$$;$$$$) { # ..._or_report
my($msginfo,$dsn_per_recip_capable,$builtins_ref,
$notif_recips,$request_type,$feedback_type,$msg_format) = @_;
my $notification; my $suppressed = 0;
my $is_smtputf8 = $msginfo->smtputf8; # UTF-8 allowed
if (!defined($msg_format)) {
$msg_format = $request_type eq 'dsn' ? 'dsn'
: $request_type eq 'report' ? c('report_format')
: c('release_format');
}
my($is_arf,$is_dsn,$is_attach,$is_plain) = (0) x 4;
if ($msg_format eq 'dsn') { $is_dsn = 1 }
elsif ($msg_format eq 'arf') { $is_arf = 1 }
elsif ($msg_format eq 'attach') { $is_attach = 1 }
else { $is_plain = 1 } # 'plain'
my $dsn_time = $msginfo->rx_time; # time of dsn creation - same as message
# use a reception time for consistency and to be resilient to clock jumps
$dsn_time = Time::HiRes::time if !$dsn_time; # now, if missing
my $rfc2822_dsn_time = rfc2822_timestamp($dsn_time);
my $sender = $msginfo->sender;
my $dsn_passed_on = $msginfo->dsn_passed_on; # NOTIFY=SUCCESS passed to MTA
my $per_recip_data = $msginfo->per_recip_data;
my $all_rejected = 0;
if (@$per_recip_data) {
$all_rejected = 1;
for my $r (@$per_recip_data) {
if ($r->recip_destiny != D_REJECT || $r->recip_smtp_response !~ /^5/)
{ $all_rejected = 0; last }
}
}
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
$min_spam_level = 0 if !defined $min_spam_level;
$max_spam_level = 0 if !defined $max_spam_level;
my $is_credible = $msginfo->sender_credible || '';
my $os_fingerprint = $msginfo->client_os_fingerprint;
my($cutoff_byrecip_maps, $cutoff_bysender_maps);
my($dsn_cutoff_level_bysender, $dsn_cutoff_level);
if ($is_dsn && $sender ne '') {
# for null sender it doesn't matter, as DSN will not be sent regardless
if ($is_credible) {
do_log(3, "DSN: sender is credible (%s), SA: %.3f, <%s>",
$is_credible, $max_spam_level, $sender);
$cutoff_byrecip_maps = ca('spam_crediblefrom_dsn_cutoff_level_maps');
$cutoff_bysender_maps =
ca('spam_crediblefrom_dsn_cutoff_level_bysender_maps');
} else {
do_log(5, "DSN: sender NOT credible, SA: %.3f, <%s>",
$max_spam_level, $sender);
$cutoff_byrecip_maps = ca('spam_dsn_cutoff_level_maps');
$cutoff_bysender_maps = ca('spam_dsn_cutoff_level_bysender_maps');
}
$dsn_cutoff_level_bysender = lookup2(0,$sender,$cutoff_bysender_maps);
}
my $txt_recip = ''; # per-recipient part of dsn text according to RFC 3464
my($any_succ,$any_fail,$any_delayed) = (0,0,0); local($1);
for my $r (!$is_dsn ? () : @$per_recip_data) { # prepare per-recip fields
my $recip = $r->recip_addr;
my $smtp_resp = $r->recip_smtp_response;
my $recip_done = $r->recip_done; # 2=relayed to MTA, 1=faked deliv/quarant
my $ccat_name = $r->setting_by_contents_category(\%ccat_display_names);
$ccat_name = "NonBlocking:$ccat_name" if !defined($r->blocking_ccat);
my $spam_level = $r->spam_level;
if (!$recip_done) {
my $fwd_m = $r->delivery_method;
if (!defined $fwd_m) {
do_log(-2,"TROUBLE: recipient not done, undefined delivery_method: ".
"<%s> %s", $recip,$smtp_resp);
} elsif ($fwd_m eq '') { # e.g. milter
# as far as we are concerned all is ok, delivery will be performed
# by a helper program or MTA
$smtp_resp = "250 2.5.0 Ok, continue delivery";
} else {
do_log(-2,"TROUBLE: recipient not done: <%s> %s", $recip,$smtp_resp);
}
}
my $smtp_resp_class = $smtp_resp =~ /^(\d)/ ? $1 : '0';
my $smtp_resp_code = $smtp_resp =~ /^(\d+)/ ? $1 : '0';
my $dsn_notify = $r->dsn_notify;
my($notify_on_failure,$notify_on_success,$notify_on_delay,$notify_never) =
(0,0,0,0);
if (!defined($dsn_notify)) {
$notify_on_failure = $notify_on_delay = 1;
} else {
for (@$dsn_notify) { # validity of the list has already been checked
if ($_ eq 'FAILURE') { $notify_on_failure = 1 }
elsif ($_ eq 'SUCCESS') { $notify_on_success = 1 }
elsif ($_ eq 'DELAY') { $notify_on_delay = 1 }
elsif ($_ eq 'NEVER') { $notify_never = 1 }
}
}
if ($notify_never || $sender eq '') {
$notify_on_failure = $notify_on_success = $notify_on_delay = 0;
}
my $dest = $r->recip_destiny;
my $remote_or_local = $recip_done==2 ? 'from MTA' :
$recip_done==1 ? '.' : # this agent
'status-to-be-passed-back';
# warn_sender is an old relic and does not fit well into DSN concepts;
# we'll sneak it in, pretending to cause a DELAY notification
my $warn_sender =
$notify_on_delay && $smtp_resp_class eq '2' && $recip_done==2 &&
$r->setting_by_contents_category(cr('warnsender_by_ccat'));
ll(5) && do_log(5,
"dsn: %s %s %s <%s> -> <%s>: on_succ=%d, on_dly=%d, ".
"on_fail=%d, never=%d, warn_sender=%s, DSN_passed_on=%s, ".
"destiny=%s, mta_resp: \"%s\"",
$remote_or_local, $smtp_resp_code, $ccat_name, $sender, $recip,
$notify_on_success, $notify_on_delay, $notify_on_failure,
$notify_never, $warn_sender, $dsn_passed_on, $dest, $smtp_resp);
# clearly log common cases to facilitate troubleshooting;
# first look for some standard reasons for not sending a DSN
if ($smtp_resp_class eq '4') {
do_log(4, "DSN: TMPFAIL %s %s %s, not to be reported: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,$sender,$recip);
} elsif ($smtp_resp_class eq '5' && $dest==D_REJECT &&
($dsn_per_recip_capable || $all_rejected)) {
do_log(4, "DSN: FAIL %s %s %s, status propagated back: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,$sender,$recip);
} elsif ($smtp_resp_class eq '5' && !$notify_on_failure) {
$suppressed = 1;
do_log($recip_done==2 ? 0 : 4, # log level 0 for remotes, RFC 3461 5.2.2d
"DSN: FAIL %s %s %s, %s requested to be IGNORED: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,
$notify_never?'explicitly':'implicitly', $sender, $recip);
} elsif ($smtp_resp_class eq '2' && !$notify_on_success && !$warn_sender) {
my $fmt = $dest==D_DISCARD
? "SUCC (discarded) %s %s %s, destiny=DISCARD"
: "SUCC %s %s %s, no DSN requested";
do_log(5, "DSN: $fmt: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,$sender,$recip);
} elsif ($smtp_resp_class eq '2' && $notify_on_success && $dsn_passed_on &&
!$warn_sender) {
do_log(5, "DSN: SUCC %s %s %s, DSN parameters PASSED-ON: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,$sender,$recip);
} elsif ($notify_never || $sender eq '') { # test sender just in case
$suppressed = 1;
do_log(5, "DSN: NEVER %s %s, <%s> -> %s",
$smtp_resp_code,$ccat_name,$sender,$recip);
# next, look for some good _excuses_ for not sending a DSN
} elsif ($dest==D_DISCARD) { # requested by final_*_destiny
$suppressed = 1;
do_log(4, "DSN: FILTER %s %s %s, destiny=DISCARD: <%s> -> <%s>",
$remote_or_local,$smtp_resp_code,$ccat_name,$sender,$recip);
} elsif (defined $r->dsn_suppress_reason) {
$suppressed = 1;
do_log(3, "DSN: FILTER %s %s, suppress reason: %s, <%s> -> <%s>",
$smtp_resp_code, $ccat_name, $r->dsn_suppress_reason,
$sender,$recip);
} elsif (defined $dsn_cutoff_level_bysender &&
$spam_level >= $dsn_cutoff_level_bysender) {
$suppressed = 1;
do_log(3, "DSN: FILTER %s %s, spam level %.3f exceeds cutoff %s%s, ".
"<%s> -> <%s>", $smtp_resp_code, $ccat_name,
$spam_level, $dsn_cutoff_level_bysender,
!$is_credible ? '' : ", (credible: $is_credible)",
$sender, $recip);
} elsif (defined($cutoff_byrecip_maps) &&
( $dsn_cutoff_level=lookup2(0,$recip,$cutoff_byrecip_maps),
defined($dsn_cutoff_level) &&
( $spam_level >= $dsn_cutoff_level ||
( $r->recip_blacklisted_sender &&
!$r->recip_whitelisted_sender) )
) ) {
$suppressed = 1;
do_log(3, "DSN: FILTER %s %s, spam level %.3f exceeds ".
"by-recipient cutoff %s%s, <%s> -> <%s>",
$smtp_resp_code, $ccat_name,
$spam_level, $dsn_cutoff_level,
!$is_credible ? '' : ", (credible: $is_credible)",
$sender, $recip);
} elsif ($msginfo->is_bulk && ccat_maj($r->contents_category) > CC_CLEAN) {
$suppressed = 1;
do_log(3, "DSN: FILTER %s %s, suppressed, bulk mail (%s), <%s> -> <%s>",
$smtp_resp_code,$ccat_name,$msginfo->is_bulk,$sender,$recip);
} elsif ($os_fingerprint =~ /^Windows\b/ && # hard-coded limits!
!$msginfo->dkim_envsender_sig && # a hack
$spam_level >=
($os_fingerprint=~/^Windows XP(?![^(]*\b2000 SP)/ ? 5 : 8)) {
$os_fingerprint =~ /^(\S+\s+\S+)/;
do_log(3, "DSN: FILTER %s %s, suppressed for mail from %s ".
"at %s, score=%s, <%s> -> <%s>", $smtp_resp_code, $ccat_name,
$1, $msginfo->client_addr, $spam_level, $sender,$recip);
} else {
# RFC 3461, section 5.2.8: "A single DSN may describe attempts to deliver
# a message to multiple recipients of that message. If a DSN is issued
# for some recipients in an SMTP transaction and not for others according
# to the rules above, the DSN SHOULD NOT contain information for
# recipients for whom DSNs would not otherwise have been issued."
$txt_recip .= "\n"; # empty line between groups of per-recipient fields
my $dsn_orcpt = $r->dsn_orcpt;
if (defined $dsn_orcpt) {
# RFC 6533: systems generating a message/global-delivery-status
# body part SHOULD use the utf-8-address form of the UTF-8 address
# type for all addresses containing characters outside the ASCII
# repertoire. These systems SHOULD upconvert the utf-8-addr-xtext
# or the utf-8-addr-unitext form of a UTF-8 address type in the
# ORCPT parameter to the utf-8-address form of a UTF-8 address type
# in the "Original-Recipient:" field.
my($addr_type, $addr) = orcpt_encode($dsn_orcpt, $is_smtputf8);
$txt_recip .= "Original-Recipient: $addr_type;$addr\n"; # as octets
}
my $remote_mta = $r->recip_remote_mta;
my $final_recip_encoded;
{ # normalize recipient address (like UTF-8 decoding)
my($addr_type, $addr) = orcpt_decode(';'.quote_rfc2821_local($recip));
($addr_type, $addr) = orcpt_encode($addr_type.';'.$addr, $is_smtputf8);
$final_recip_encoded = $addr_type.';'.$addr;
}
if (defined $dsn_orcpt || $remote_mta eq '' ||
$r->recip_final_addr eq $recip) {
$txt_recip .= "Final-Recipient: $final_recip_encoded\n";
} else {
$txt_recip .= "X-NextToLast-Final-Recipient: $final_recip_encoded\n";
# normalize final recipient address (e.g. UTF-8 decoding)
my($addr_type, $addr) =
orcpt_decode(';'.quote_rfc2821_local($r->recip_final_addr));
($addr_type, $addr) = orcpt_encode($addr_type.';'.$addr, $is_smtputf8);
$txt_recip .= "Final-Recipient: $addr_type;$addr\n";
}
my($smtp_resp_code, $smtp_resp_enhcode, $smtp_resp_msg);
local($1,$2,$3);
if ($smtp_resp =~ /^ (\d{3}) [ \t-] [ \t]* ([245] \. \d{1,3} \. \d{1,3})?
\s* (.*) \z/xs) {
($smtp_resp_code, $smtp_resp_enhcode, $smtp_resp_msg) = ($1,$2,$3);
} else {
$smtp_resp_msg = $smtp_resp;
}
if ($smtp_resp_enhcode eq '' && $smtp_resp_class =~ /^([245])\z/) {
$smtp_resp_enhcode = "$1.0.0";
}
my $action; # failed / relayed / delivered / expanded
if ($recip_done == 2) { # truly forwarded to MTA
$action = $smtp_resp_class eq '5' ? 'failed' # remote reject
: $smtp_resp_class ne '2' ? undef # shouldn't happen
: !$dsn_passed_on ? 'relayed' # relayed to non-conforming MTA
: $warn_sender ? 'delayed' # disguised as a DELAY notification
: undef; # shouldn't happen
} elsif ($recip_done == 1) {
# a faked delivery to bit bucket or to a quarantine
$action = $smtp_resp_class eq '5' ? 'failed' # local reject
: $smtp_resp_class eq '2' ? 'delivered' # discard / bit bucket
: undef; # shouldn't happen
} elsif (!defined($recip_done) || $recip_done == 0) {
$action = $smtp_resp_class eq '2' ? 'relayed' #????
: undef; # shouldn't happen
}
defined $action or die "Assert failed: $smtp_resp, $smtp_resp_class, ".
"$recip_done, $dsn_passed_on";
if ($action eq 'failed') { $any_fail=1 }
elsif ($action eq 'delayed') { $any_delayed=1 } else { $any_succ=1 }
$txt_recip .= "Action: $action\n";
$txt_recip .= "Status: $smtp_resp_enhcode\n";
my $rem_smtp_resp = $r->recip_remote_mta_smtp_response;
if ($warn_sender && $action eq 'delayed') {
$smtp_resp = '250 2.6.0 Bad message, but will be delivered anyway';
} elsif ($remote_mta ne '' && $rem_smtp_resp ne '') {
$txt_recip .= "Remote-MTA: dns; $remote_mta\n";
$smtp_resp = $rem_smtp_resp;
} elsif ($smtp_resp !~ /\n/ && length($smtp_resp) > 78-23) { # wrap magic
# take liberty to wrap our own SMTP responses
$smtp_resp = wrap_string("x" x (23-11) . $smtp_resp, 78-11,'','',0);
# length(" 554 5.0.0 ") = 11; length("Diagnostic-Code: smtp; ") = 23
# insert and then remove prefix to maintain consistent wrapped size
$smtp_resp =~ s/^x{12}//;
# wrap response code according to RFC 3461 section 9.2
$smtp_resp = join("\n", @{wrap_smtp_resp($smtp_resp)});
}
$smtp_resp =~ s/\n(?![ \t])/\n /gs;
$txt_recip .= "Diagnostic-Code: smtp; $smtp_resp\n";
# RFC 6533 adds optional field Localized-Diagnostic
$txt_recip .= "Last-Attempt-Date: $rfc2822_dsn_time\n";
my $final_log_id = $msginfo->log_id;
$final_log_id .= '/' . $msginfo->mail_id if defined $msginfo->mail_id;
$txt_recip .= sprintf("Final-Log-ID: %s\n", $final_log_id);
do_log(2, "DSN: NOTIFICATION: Action:%s, %s %s %s, spam level %.3f, ".
"<%s> -> <%s>", $action,
$recip_done==2 && $action ne 'delayed' ? 'RELAYED' : 'LOCAL',
$smtp_resp_code, $ccat_name, $spam_level, $sender, $recip);
}
} # endfor per_recip_data
# prepare a per-message part of a report
my $txt_msg = '';
my $myhost = c('myhostname'); # my FQDN (DNS) name, UTF-8 octets
$myhost = $is_smtputf8 ? idn_to_utf8($myhost) : idn_to_ascii($myhost);
my $dsn_envid = $msginfo->dsn_envid; # ENVID is encoded as xtext: RFC 3461
if ($is_dsn) { # DSN - per-msg part of dsn text according to RFC 3464
my $conn = $msginfo->conn_obj;
my $from_mta = $conn->smtp_helo;
my $client_ip = $conn->client_ip;
$txt_msg .= "Reporting-MTA: dns; $myhost\n";
$txt_msg .= "Received-From-MTA: dns; $from_mta ([$client_ip])\n"
if $from_mta ne '';
$txt_msg .= "Arrival-Date: ". rfc2822_timestamp($msginfo->rx_time) ."\n";
my $dsn_envid = $msginfo->dsn_envid; # ENVID is encoded as xtext: RFC 3461
if (defined $dsn_envid) {
$dsn_envid = sanitize_str(xtext_decode($dsn_envid));
$txt_msg .= "Original-Envelope-Id: $dsn_envid\n";
}
} elsif ($is_arf) { # abuse report format - RFC 5965
# abuse, dkim, fraud, miscategorized, not-spam, opt-out, virus, other
$txt_msg .= "Version: 1\n"; # required
$txt_msg .= "Feedback-Type: $feedback_type\n"; # required
# User-Agent must comply with RFC 2616, section 14.43
my $ua_version = "$myproduct_name/$myversion_id ($myversion_date)";
$txt_msg .= "User-Agent: $ua_version\n"; # required
$txt_msg .= "Reporting-MTA: dns; $myhost\n";
# optional fields:
# RFC 6692: Report generators that include an Arrival-Date report field
# MAY choose to express the value of that date in Universal Coordinated
# Time (UTC) to enable simpler correlation with local records at sites
# that are following the provisions of RFC 6302.
$txt_msg .= 'Arrival-Date: ';
$txt_msg .= rfc2822_utc_timestamp($msginfo->rx_time) . "\n";
# $txt_msg .= rfc2822_timestamp($msginfo->rx_time) . "\n";
my $cl_ip_addr = $msginfo->client_addr;
if (defined $cl_ip_addr) {
$cl_ip_addr = 'IPv6:'.$cl_ip_addr if $cl_ip_addr =~ /:[0-9a-f]*:/i &&
$cl_ip_addr !~ /^IPv6:/i;
$txt_msg .= "Source-IP: $cl_ip_addr\n";
}
# RFC 6692 (was: draft-kucherawy-marf-source-ports):
my $cl_ip_port = $msginfo->client_port;
$txt_msg .= "Source-Port: $cl_ip_port\n" if defined $cl_ip_port;
my $dsn_envid = $msginfo->dsn_envid; # ENVID is encoded as xtext: RFC 3461
if (defined $dsn_envid) {
$dsn_envid = sanitize_str(xtext_decode($dsn_envid));
$txt_msg .= "Original-Envelope-Id: $dsn_envid\n";
}
$txt_msg .= "Original-Mail-From: " . $msginfo->sender_smtp . "\n";
for my $r (@$per_recip_data) {
$txt_msg .= "Original-Rcpt-To: " . $r->recip_addr_smtp . "\n";
}
my $sigs_ref = $msginfo->dkim_signatures_valid;
if ($sigs_ref) {
for my $sig (@$sigs_ref) {
my $type = $sig->isa('Mail::DKIM::DkSignature') ? 'DK' : 'DKIM';
$txt_msg .= sprintf("Reported-Domain: %s (valid %s signature by)\n",
$sig->domain, $type);
}
}
if (c('enable_dkim_verification')) {
for (Amavis::DKIM::generate_authentication_results($msginfo,0)) {
my $h = $_; $h =~ tr/\n//d; # remove potential folding points
$txt_msg .= "Authentication-Results: $h\n";
}
}
$txt_msg .= "Incidents: 1\n";
# Reported-URI
}
my($txt_8bit, $txt_utf8);
my($delivery_status_mime_type, $delivery_status_mime_subtype);
if ($is_dsn || $is_arf) {
$txt_8bit = ($txt_msg=~tr/\x00-\x7F//c) + ($txt_recip=~tr/\x00-\x7F//c);
$txt_utf8 = !$txt_8bit ||
(is_valid_utf_8($txt_msg) && is_valid_utf_8($txt_recip));
$delivery_status_mime_subtype =
$is_arf ? 'feedback-report'
: $txt_utf8 && ($is_smtputf8 || $txt_8bit) ? 'global-delivery-status'
: 'delivery-status';
$delivery_status_mime_type = 'message/' . $delivery_status_mime_subtype;
}
if ( $is_arf || $is_plain || $is_attach ||
($is_dsn && ($any_succ || $any_fail || $any_delayed)) ) {
my(@hdr_to) = $notif_recips ? qquote_rfc2821_local(@$notif_recips)
: map($_->recip_addr_smtp, @$per_recip_data);
$_ = mail_addr_idn_to_ascii($_) for @hdr_to;
my $hdr_from = $msginfo->setting_by_contents_category(
$is_dsn ? cr('hdrfrom_notify_sender_by_ccat') :
$request_type eq 'report' ? cr('hdrfrom_notify_report_by_ccat') :
cr('hdrfrom_notify_release_by_ccat') );
# make sure it's in octets
$hdr_from = expand_variables(safe_encode_utf8($hdr_from));
# use the provided template text
my(%mybuiltins) = %$builtins_ref; # make a local copy
# not really needed, these header fields are overridden later
$mybuiltins{'f'} = safe_decode_utf8($hdr_from);
$mybuiltins{'T'} = \@hdr_to;
$mybuiltins{'d'} = $rfc2822_dsn_time;
$mybuiltins{'report_format'} = $msg_format;
$mybuiltins{'feedback_type'} = $feedback_type;
# RFC 3461 section 6.2: "If a DSN contains no notifications of
# delivery failure, the MTA SHOULD return only the header section."
my $dsn_ret = $msginfo->dsn_ret;
my $attach_full_msg =
!$is_dsn ? 1 : (defined $dsn_ret && $dsn_ret eq 'FULL' && $any_fail);
if ($attach_full_msg && $is_dsn) {
# apologize in the log, we should have supplied the full message, yet
# RFC 3461 section 6.2 gives us an excuse: "However, if the length of the
# message is greater than some implementation-specified length, the MTA
# MAY return only the headers even if the RET parameter specified FULL."
do_log(1, "DSN RET=%s requested, but we'll only attach a header section",
$dsn_ret);
$attach_full_msg = 0; # override, just attach a header section
}
my $template_ref = $msginfo->setting_by_contents_category(
$is_dsn ? cr('notify_sender_templ_by_ccat') :
$request_type eq 'report' ? cr('notify_report_templ_by_ccat') :
cr('notify_release_templ_by_ccat') );
my $report_str_ref = expand($template_ref, \%mybuiltins);
# 'multipart/report' MIME type is defined in RFC 6522. The report-type
# parameter identifies the type of report. The parameter is the MIME
# subtype of the second body part of the multipart/report.
my $report_entity = build_mime_entity($report_str_ref, $msginfo,
!$is_dsn && !$is_arf ? 'multipart/mixed'
: "multipart/report; report-type=$delivery_status_mime_subtype",
$msg_format, $is_plain, 1, $attach_full_msg);
my $head = $report_entity->head;
# RFC 3464: The From field of the message header section of the DSN SHOULD
# contain the address of a human who is responsible for maintaining the
# mail system at the Reporting MTA site (e.g. Postmaster), so that a reply
# to the DSN will reach that person.
# Override header fields from the template:
eval { $head->replace('From', $hdr_from); 1 }
or do { chomp $@; die $@ };
eval { $head->replace('To', join(', ',@hdr_to)); 1 }
or do { chomp $@; die $@ };
eval { $head->replace('Date', $rfc2822_dsn_time); 1 }
or do { chomp $@; die $@ };
if ($is_dsn || $is_arf) { # attach a delivery-status or a feedback-report
ll(4) && do_log(4,"dsn: creating mime part %s, %s",
$delivery_status_mime_type,
!$txt_8bit ? 'us-ascii' : $txt_utf8 ? 'valid UTF-8'
: '8bit but *not* UTF-8');
eval { # make sure our source line number is reported in case of failure
# RFC 6533: Note that [RFC6532] relaxed a restriction from MIME
# [RFC2046] regarding the use of Content-Transfer-Encoding in new
# "message" subtypes. This specification explicitly allows the
# use of Content-Transfer-Encoding in message/global-headers and
# message/global-delivery-status.
# RFC 5965: Encoding considerations for message/feedback-report:
# "7bit" encoding is sufficient and MUST be used to maintain
# readability when viewed by non-MIME mail readers.
$report_entity->add_part(
MIME::Entity->build(
Top => 0,
Type => $delivery_status_mime_type,
Data => $txt_msg . $txt_recip,
$delivery_status_mime_subtype ne 'global-delivery-status' ? ()
: (Charset => 'UTF-8'),
Encoding => $txt_8bit ? '8bit' : '7bit',
Disposition => 'inline',
Filename => $is_arf ? 'arf_status'
: $delivery_status_mime_subtype eq
'global-delivery-status' ? 'dsn_status.u8dsn'
: 'dsn_status.dsn',
Description => $is_arf ? "\u$feedback_type report"
: $any_fail ? 'Delivery error report'
: $any_delayed ? 'Delivery delay report'
: 'Delivery report',
), 1); # insert as a second mime part (at offset 1)
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
}
my $mailfrom =
$is_dsn ? '' # DSN envelope sender must be empty
: mail_addr_idn_to_ascii(
unquote_rfc2821_local( (parse_address_list($hdr_from))[0] ));
$notification = Amavis::In::Message->new;
$notification->rx_time($dsn_time);
$notification->log_id($msginfo->log_id);
$notification->partition_tag($msginfo->partition_tag);
$notification->parent_mail_id($msginfo->mail_id);
$notification->mail_id(scalar generate_mail_id());
$notification->conn_obj($msginfo->conn_obj);
$notification->originating(
($request_type eq 'dsn' || $request_type eq 'report') ? 1 : 0);
$notification->mail_text($report_entity);
$notification->body_type($txt_8bit ? '8BITMIME' : '7BIT');
$notification->add_contents_category(CC_CLEAN,0);
my(@recips) = $notif_recips ? @$notif_recips
: map($_->recip_addr, @$per_recip_data);
if ($request_type eq 'dsn' || $request_type eq 'report') {
my $bcc = $msginfo->setting_by_contents_category(cr('dsn_bcc_by_ccat'));
push(@recips, $bcc) if defined $bcc && $bcc ne '';
}
if (grep( / [^\x00-\x7F] .*? \@ [^@]* \z/sx && is_valid_utf_8($_),
($mailfrom, @recips) )) {
# localpart is non-ASCII UTF-8, we must use SMTPUTF8
do_log(2, 'DSN notification requires SMTPUTF8');
$notification->smtputf8(1);
} else {
$_ = mail_addr_idn_to_ascii($_) for ($mailfrom, @recips);
}
$notification->sender($mailfrom);
$notification->sender_smtp(qquote_rfc2821_local($mailfrom));
$notification->auth_submitter('<>');
$notification->auth_user(c('amavis_auth_user'));
$notification->auth_pass(c('amavis_auth_pass'));
$notification->recips(\@recips, 1);
if (defined $hdr_from) {
my(@rfc2822_from) =
map(unquote_rfc2821_local($_), parse_address_list($hdr_from));
$notification->rfc2822_from($rfc2822_from[0]);
}
my $notif_m = c('notify_method');
$_->delivery_method($notif_m) for @{$notification->per_recip_data};
}
do_log(5, 'delivery_status_notification: notif %d bytes, suppressed: %s',
length($notification), $suppressed ? 'yes' : 'no');
# $suppressed is true if DNS would be needed, but either the sender requested
# that DSN is not to be sent, or it is believed the bounce would not reach
# the correct sender (faked sender with viruses or spam);
# $notification is undef if DSN is not needed
($notification, $suppressed);
}
# Return a triple of arrayrefs of quoted recipient addresses (the first lists
# recipients with successful delivery status, the second lists all the rest),
# plus a list of short per-recipient delivery reports for failed deliveries,
# that can be used in the first MIME part (the free text format) of delivery
# status notifications.
#
sub delivery_short_report($) {
my $msginfo = $_[0];
my(@succ_recips, @failed_recips, @failed_recips_full);
for my $r (@{$msginfo->per_recip_data}) {
my $remote_mta = $r->recip_remote_mta;
my $smtp_resp = $r->recip_smtp_response;
my $qrecip_addr = scalar(qquote_rfc2821_local($r->recip_addr));
if ($r->recip_destiny == D_PASS && ($smtp_resp=~/^2/ || !$r->recip_done)) {
push(@succ_recips, $qrecip_addr);
} else {
push(@failed_recips, $qrecip_addr);
push(@failed_recips_full, sprintf("%s:%s\n %s", $qrecip_addr,
(!defined($remote_mta)||$remote_mta eq '' ?'' :" [$remote_mta] said:"),
$smtp_resp));
}
}
(\@succ_recips, \@failed_recips, \@failed_recips_full);
}
# Build a new MIME::Entity object based on the original mail, but hopefully
# safer to mail readers: conventional mail header fields are retained,
# original mail becomes an attachment of type 'message/rfc822' or
# 'message/global'. Text in $first_part becomes the first MIME part
# of type 'text/plain', $first_part may be a scalar string or a ref
# to a list of lines
#
sub defanged_mime_entity($$) {
my($msginfo,$first_part) = @_;
my $new_entity;
$_ = safe_encode(c('bdy_encoding'), $_)
for (ref $first_part ? @$first_part : $first_part);
eval { # make sure _our_ source line number is reported in case of failure
$new_entity = MIME::Entity->build(
Type => 'multipart/mixed', 'X-Mailer' => undef);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
# reinserting some of the original header fields to a new header, sanitized
my $hdr_edits = $msginfo->header_edits;
if (!$hdr_edits) {
$hdr_edits = Amavis::Out::EditHeader->new;
$msginfo->header_edits($hdr_edits);
}
my(%desired_field);
for (qw(Received From Sender To Cc Reply-To Date Message-ID
Resent-From Resent-Sender Resent-To Resent-Cc
Resent-Date Resent-Message-ID In-Reply-To References Subject
Comments Keywords Organization Organisation User-Agent X-Mailer
DKIM-Signature DomainKey-Signature))
{ $desired_field{lc($_)} = 1 };
local($1,$2);
for my $curr_head (@{$msginfo->orig_header}) { # array of header fields
# obsolete RFC 822 syntax allowed whitespace before colon
my($field_name, $field_body) =
$curr_head =~ /^([!-9;-\176]+)[ \t]*:(.*)\z/s
? ($1, $2) : (undef, $curr_head);
if ($desired_field{lc($field_name)}) { # only desired header fields
# protect NUL, CR, and characters with codes above \377
$field_body =~ s{ ( [^\001-\014\016-\377] ) }
{ sprintf(ord($1)>255 ? '\\x{%04x}' : '\\x{%02x}',
ord($1)) }xgse;
# protect NL in illegal all-whitespace continuation lines
$field_body =~ s{\n([ \t]*)(?=\n)}{\\012$1}gs;
$field_body =~ s{^(.{995}).{4,}$}{$1...}gm; # truncate lines to 998
chomp($field_body); # note that field body is already folded
if (lc($field_name) eq 'subject') {
# needs to be inserted directly into new header section so that it
# can be subjected to header edits, like inserting ***UNCHECKED***
eval { $new_entity->head->add($field_name,$field_body); 1 }
or do {chomp $@; die $@};
} else {
$hdr_edits->append_header($field_name,$field_body,2);
}
}
}
eval {
my $cnt_8bit = $first_part =~ tr/\x00-\x7F//c;
$new_entity->attach(
Type => 'text/plain', Data => $first_part,
Charset => c('bdy_encoding'),
Encoding => !$cnt_8bit ? '7bit'
: $cnt_8bit > 0.2 * length($first_part) ? 'base64'
: 'quoted-printable',
);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
# prepend a Return-Path to make available the envelope sender address
my $rp = sprintf("Return-Path: %s\n", $msginfo->sender_smtp);
my $orig_mail_as_body;
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# will be handled by ->attach
} elsif ($msg->isa('MIME::Entity')) {
die "attaching a MIME::Entity object is not implemented";
} else {
$orig_mail_as_body =
Amavis::MIME::Body::OnOpenFh->new($msginfo->mail_text,
[$rp], $msginfo->skip_bytes);
$orig_mail_as_body or die "Can't create Amavis::MIME::Body object: $!";
}
eval {
my $att = $new_entity->attach( # RFC 2046
Type => ($msginfo->smtputf8 && $msginfo->header_8bit ? 'message/global'
: 'message/rfc822') . '; x-spam-type=original',
Encoding => $msginfo->header_8bit || $msginfo->body_8bit ? '8bit':'7bit',
Data => defined $orig_mail_as_body ? []
: !$msginfo->skip_bytes ? $msg
: substr($$msg, $msginfo->skip_bytes),
# Path => $msginfo->mail_text_fn,
Description => 'Original message',
Filename => 'message', Disposition => 'attachment',
);
# direct access to tempfile handle
$att->bodyhandle($orig_mail_as_body) if defined $orig_mail_as_body;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die $eval_stat;
};
$new_entity;
}
# Fill-in a message object with information based on a quarantined mail.
# Expects $msginfo->mail_text to be a file handle (not a Mime::Entity object),
# leaves it positioned at the beginning of a mail body (not to be relied upon).
# If given a BSMTP file, expects that it contains a single message only.
#
sub msg_from_quarantine($$$) {
my($msginfo,$request_type,$feedback_type) = @_;
my $fh = $msginfo->mail_text;
my $sender_override = $msginfo->sender;
my $recips_data_override = $msginfo->per_recip_data;
my $quarantine_id = $msginfo->parent_mail_id;
$quarantine_id = '' if !defined $quarantine_id;
my $reporting = $request_type eq 'report';
my $release_m;
if ($request_type eq 'requeue') {
$release_m = c('requeue_method');
$release_m ne '' or die "requeue_method is unspecified";
} else { # 'release' or 'report'
$release_m = c('release_method');
$release_m = c('notify_method') if !defined $release_m || $release_m eq '';
$release_m ne '' or die "release_method and notify_method are unspecified";
}
$msginfo->originating(1); # (also enables DKIM signing)
$msginfo->add_contents_category(CC_CLEAN,0);
$msginfo->auth_submitter('<>');
$msginfo->auth_user(c('amavis_auth_user'));
$msginfo->auth_pass(c('amavis_auth_pass'));
$fh->seek($msginfo->skip_bytes, 0) or die "Can't rewind mail file: $!";
my $bsmtp = 0; # message stored in an RFC 2442 format?
my($qid,$sender,@recips_all,@recips_blocked);
my $have_recips_blocked = 0; my $curr_head;
my $ln; my $eof = 0; my $position = 0;
my $offset_bytes = 0; # file position just past the prefixed header fields
# extract envelope information from the quarantine file
do_log(4, "msg_from_quarantine: releasing %s", $quarantine_id);
for (;;) {
if ($eof) { $ln = "\n" }
else {
$! = 0; $ln = $fh->getline;
if (!defined($ln)) {
$eof = 1; $ln = "\n"; # fake a missing header/body separator line
$! == 0 or die "Error reading file ".$msginfo->mail_text_fn.": $!";
}
}
if ($ln =~ /^[ \t]/) { $curr_head .= $ln }
else {
my $next_head = $ln; local($1,$2);
local($_) = $curr_head; chomp; s/\n(?=[ \t])//gs; # unfold
if (!defined($curr_head)) { # first time
} elsif (/^(?:EHLO|HELO)(?: |$)/i) { $bsmtp = 1;
} elsif (/^MAIL FROM:[ \t]*(<.*>)/i) {
$bsmtp = 1; $sender = $1; $sender = unquote_rfc2821_local($sender);
} elsif ( $bsmtp && /^RCPT TO:[ \t]*(<.*>)/i) {
push(@recips_all, unquote_rfc2821_local($1));
} elsif ( $bsmtp && /^(?:DATA|NOOP)$/i) {
} elsif ( $bsmtp && /^RSET$/i) {
$sender = undef; @recips_all = (); @recips_blocked = (); $qid = undef;
} elsif ( $bsmtp && /^QUIT$/i) { last;
} elsif (!$bsmtp && /^Delivered-To:/si) {
} elsif (!$bsmtp && /^(Return-Path|X-Envelope-From):[ \t]*(.*)$/si) {
if (!defined $sender) {
my(@addr_list) = parse_address_list($2);
@addr_list >= 1 or die "Address missing in $1";
@addr_list <= 1 or die "More than one address in $1";
$sender =
mail_addr_idn_to_ascii(unquote_rfc2821_local($addr_list[0]));
}
} elsif (!$bsmtp && /^X-Envelope-To:[ \t]*(.*)$/si) {
my(@addr_list) = parse_address_list($1);
push(@recips_all,
map(mail_addr_idn_to_ascii(unquote_rfc2821_local($_)),
@addr_list));
} elsif (!$bsmtp && /^X-Envelope-To-Blocked:[ \t]*(.*)$/si) {
my(@addr_list) = parse_address_list($1);
push(@recips_blocked,
map(mail_addr_idn_to_ascii(unquote_rfc2821_local($_)),
@addr_list));
$have_recips_blocked = 1;
} elsif (/^X-Quarantine-ID:[ \t]*(.*)$/si) {
$qid = $1; $qid = $1 if $qid =~ /^<(.*)>\z/s;
} elsif (!$reporting && /^X-Amavis-(?:Hold|Alert|Modified|PenPals|
PolicyBank|OS-Fingerprint):/xsi) {
# skip
} elsif (!$reporting && /^(?:X-Spam|X-CRM114)-.+:/si) {
# skip header fields inserted by us
} else {
last; # end of known header fields, to be marked as 'skip_bytes'
}
last if $next_head eq "\n"; # end-of-header-section reached
$offset_bytes = $position; # move past last processed header field
$curr_head = $next_head;
}
$position += length($ln);
}
@recips_blocked = @recips_all if !$have_recips_blocked; # pre-2.6.0 compatib
my(@except);
if (@recips_blocked < @recips_all) {
for my $rec (@recips_all)
{ push(@except,$rec) if !grep($rec eq $_, @recips_blocked) }
}
my $sender_smtp = qquote_rfc2821_local($sender);
do_log(0,"Quarantined message %s (%s): %s %s -> %s%s",
$request_type, $feedback_type, $quarantine_id, $sender_smtp,
join(',', qquote_rfc2821_local(@recips_blocked)),
!@except ? '' : (", (excluded: ".
join(',', qquote_rfc2821_local(@except)) . " )" ));
my(@m);
if (!defined($qid)) { push(@m, 'missing X-Quarantine-ID') }
elsif ($qid ne $quarantine_id) {
push(@m, sprintf("stored quar. ID '%s' does not match requested ID '%s'",
$qid,$quarantine_id));
}
push(@m, 'missing '.($bsmtp?'MAIL FROM':'X-Envelope-From or Return-Path'))
if !defined $sender;
push(@m, 'missing '.($bsmtp?'RCPT TO' :'X-Envelope-To')) if !@recips_all;
do_log(0, "Quarantine %s %s: %s",
$request_type, $quarantine_id, join("; ",@m)) if @m;
if ($qid ne $quarantine_id)
{ die "Stored quarantine ID '$qid' does not match ".
"requested ID '$quarantine_id'" }
if ($bsmtp)
{ die "Releasing messages in BSMTP format not yet supported ".
"(dot de-stuffing not implemented)" }
$msginfo->sender($sender); $msginfo->sender_smtp($sender_smtp);
$msginfo->recips(\@recips_all);
$_->delivery_method($release_m) for @{$msginfo->per_recip_data};
# mark a file location past prefixed header fields where orig message starts
$msginfo->skip_bytes($offset_bytes);
my $msg_format = $request_type eq 'dsn' ? 'dsn'
: $request_type eq 'report' ? c('report_format')
: c('release_format');
my $hdr_edits = Amavis::Out::EditHeader->new;
$msginfo->header_edits($hdr_edits);
if ($msg_format eq 'resend') {
if (!defined($recips_data_override)) {
$msginfo->recips(\@recips_blocked); # override 'all' by 'blocked' recips
} else { # recipients specified in the request override stored info
ll(5) && do_log(5, 'overriding recips %s by %s',
join(',', qquote_rfc2821_local(@recips_blocked)),
join(',', map($_->recip_addr_smtp, @$recips_data_override)));
$msginfo->per_recip_data($recips_data_override);
}
$_->delivery_method($release_m) for @{$msginfo->per_recip_data};
} else {
# collect more information from a quarantined message, making it available
# to a report generator and to macros during template expansion
Amavis::get_body_digest($msginfo, c('mail_digest_algorithm'));
Amavis::collect_some_info($msginfo);
if (defined($recips_data_override) && ll(5)) {
do_log(5, 'overriding recips %s by %s',
join(',', qquote_rfc2821_local(@recips_blocked)),
join(',', map($_->recip_addr_smtp, @$recips_data_override)));
}
my($notification,$suppressed) = delivery_status_notification(
$msginfo, 0, \%Amavis::builtins,
!defined($recips_data_override) ? \@recips_blocked
: [ map($_->recip_addr, @$recips_data_override) ],
$request_type, $feedback_type, undef);
# pushes original quarantined message into an attachment of a notification
$msginfo = $notification;
}
if (defined $sender_override) {
# sender specified in the request, overrides stored info
do_log(5, "overriding sender %s by %s", $sender, $sender_override);
$msginfo->sender($sender_override);
$msginfo->sender_smtp(qquote_rfc2821_local($sender_override));
}
if ($msg_format eq 'resend') { # keep quarantined message at a top MIME level
# Resent-* header fields must precede corresponding Received header field
# "Resent-From:" and "Resent-Date:" are required fields!
my $hdrfrom_recip = $msginfo->setting_by_contents_category(
cr('hdrfrom_notify_recip_by_ccat'));
# make sure it's in octets
$hdrfrom_recip = expand_variables(safe_encode_utf8($hdrfrom_recip));
if ($msginfo->requested_by eq '') {
$hdr_edits->add_header('Resent-From', $hdrfrom_recip);
} else {
$hdr_edits->add_header('Resent-From',
qquote_rfc2821_local($msginfo->requested_by));
$hdr_edits->add_header('Resent-Sender',
$hdrfrom_recip) if $hdrfrom_recip ne '';
}
my $prd = $msginfo->per_recip_data;
$hdr_edits->add_header('Resent-To',
$prd && @$prd==1 ? $prd->[0]->recip_addr_smtp
: 'undisclosed-recipients:;');
$hdr_edits->add_header('Resent-Date', # time of the release
rfc2822_timestamp($msginfo->rx_time));
my $myhost = c('myhostname'); # my FQDN (DNS) name, UTF-8 octets
$myhost = $msginfo->smtputf8 ? idn_to_utf8($myhost) :idn_to_ascii($myhost);
$hdr_edits->add_header('Resent-Message-ID',
sprintf('<%s-%s@%s>',
$msginfo->parent_mail_id||'', $msginfo->mail_id||'',
$myhost) );
}
$hdr_edits->add_header('Received', make_received_header_field($msginfo,1),1);
my $bcc = $msginfo->setting_by_contents_category(cr('always_bcc_by_ccat'));
if (defined $bcc && $bcc ne '' && $request_type ne 'report') {
my $recip_obj = Amavis::In::Message::PerRecip->new;
$recip_obj->recip_addr_modified($bcc);
# leave recip_addr and recip_addr_smtp undefined to hide it from the log?
$recip_obj->recip_addr($bcc);
$recip_obj->recip_addr_smtp(qquote_rfc2821_local($bcc)); #****
$recip_obj->recip_is_local(
lookup2(0, $bcc, ca('local_domains_maps')) ? 1 : 0);
$recip_obj->recip_destiny(D_PASS);
$recip_obj->dsn_notify(['NEVER']);
$recip_obj->delivery_method(c('notify_method'));
$recip_obj->add_contents_category(CC_CLEAN,0);
$msginfo->per_recip_data([@{$msginfo->per_recip_data}, $recip_obj]);
do_log(2,"adding recipient - always_bcc: %s, delivery method %s",
$bcc, $recip_obj->delivery_method);
}
$msginfo;
}
1;
#
package Amavis::Custom;
# MAIL PROCESSING SEQUENCE:
# child process initialization
# loop for each mail:
# - receive mail, parse and make available some basic information
# * custom hook: new() - may inspect info, may load policy banks
# - mail checking and collecting results
# * custom hook: checks() - may inspect or modify checking results
# - deciding mail fate (lookup on *_lovers, thresholds, ...)
# - quarantining
# - sending notifications (to admin and recips)
# * custom hook: before_send() - may send other notif, quarantine, modify mail
# - forwarding (unless blocked)
# * custom hook: after_send() - may suppress DSN, may send reports, quarantine
# - sending delivery status notification (if needed)
# - issue main log entry, manage statistics (timing, counters, nanny)
# * custom hook: mail_done() - may inspect results
# endloop after $max_requests or earlier
use strict;
use re 'taint';
sub new { my($class,$conn,$msginfo) = @_; undef }
sub checks { my($self,$conn,$msginfo) = @_; undef }
sub before_send { my($self,$conn,$msginfo) = @_; undef }
sub after_send { my($self,$conn,$msginfo) = @_; undef }
sub mail_done { my($self,$conn,$msginfo) = @_; undef }
1;
#
package Amavis;
require 5.005; # need qr operator and \z in regexp
require 5.008; # need basic Unicode support
require 5.008001; # need utf8::is_utf8()
use strict;
use re 'taint';
BEGIN {
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
import Amavis::Conf qw(:platform :sa :confvars c cr ca);
import Amavis::Util qw(untaint untaint_inplace
min max minmax unique_list unique_ref
ll do_log do_log_safe update_current_log_level
dump_captured_log log_capture_enabled am_id
sanitize_str debug_oneshot proto_decode
truncate_utf_8 is_valid_utf_8 safe_decode_mime
safe_encode safe_encode_utf8 safe_encode_utf8_inplace
safe_decode safe_decode_utf8 safe_decode_latin1
clear_idn_cache idn_to_utf8 idn_to_ascii
mail_addr_idn_to_ascii mail_addr_decode
orcpt_encode orcpt_decode
format_time_interval add_entropy stir_random
generate_mail_id make_password
prolong_timer get_deadline waiting_for_client
switch_to_my_time switch_to_client_time
snmp_counters_init snmp_count dynamic_destination
ccat_split ccat_maj cmp_ccat cmp_ccat_maj
setting_by_given_contents_category_all
setting_by_given_contents_category);
import Amavis::ProcControl qw(exit_status_str proc_status_ok
cloexec run_command collect_results);
import Amavis::Log qw(open_log close_log collect_log_stats);
import Amavis::Timing qw(section_time get_time_so_far
get_rusage rusage_report);
import Amavis::rfc2821_2822_Tools;
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Lookup::IP qw(lookup_ip_acl normalize_ip_addr);
import Amavis::Out;
import Amavis::Out::EditHeader;
import Amavis::UnmangleSender qw(oldest_public_ip_addr_from_received
first_received_from);
import Amavis::Unpackers::Validity qw(
check_header_validity check_for_banned_names);
import Amavis::Unpackers::MIME qw(mime_decode);
import Amavis::Expand qw(expand tokenize);
import Amavis::Notify qw(delivery_status_notification delivery_short_report
build_mime_entity defanged_mime_entity expand_variables);
import Amavis::In::Connection;
import Amavis::In::Message;
}
use Errno qw(ENOENT EACCES EAGAIN ESRCH EBADF EINVAL);
use POSIX qw(locale_h);
use Fcntl qw(:flock F_GETFL F_SETFL FD_CLOEXEC);
use IO::Handle;
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use IO::Socket::UNIX;
use Time::HiRes ();
# body digest, either MD5 or SHA-1 (or perhaps SHA-256)
use Digest::MD5;
use Digest::SHA;
use Net::Server 0.87; # need Net::Server::PreForkSimple::done
use MIME::Base64;
use vars qw(
$extra_code_zmq $extra_code_db $extra_code_redis
$extra_code_sql_base $extra_code_sql_log $extra_code_sql_quar
$extra_code_sql_lookup $extra_code_ldap
$extra_code_in_ampdp $extra_code_in_smtp $extra_code_in_courier
$extra_code_out_smtp $extra_code_out_pipe
$extra_code_out_bsmtp $extra_code_out_local $extra_code_p0f
$extra_code_antivirus $extra_code_antispam
$extra_code_antispam_extprog $extra_code_antispam_rspamc
$extra_code_antispam_spamc $extra_code_antispam_sa
$extra_code_unpackers $extra_code_dkim $extra_code_tools);
use vars qw(%modules_basic %got_signals);
use vars qw($user_id_sql $user_policy_id_sql $wb_listed_sql);
use vars qw($implicit_maps_inserted $maps_have_been_labeled);
use vars qw($db_env $snmp_db $zmq_obj @zmq_sockets);
use vars qw(%builtins); # macros in customizable notification messages
use vars qw($last_task_completed_at);
use vars qw($child_invocation_count $child_task_count);
use vars qw($child_init_hook_was_called);
# $child_invocation_count # counts child re-use from 1 to max_requests
# $child_task_count # counts check_mail_begin_task (and check_mail) calls;
# this often runs in sync with $child_invocation_count,
# but with SMTP or LMTP input there may be more than one
# message passed during a single SMTP session
use vars qw(@config_files); # configuration files provided by -c or defaulted
use vars qw($MSGINFO $report_ref);
use vars qw($av_output @virusname @detecting_scanners @av_scanners_results
$banned_filename_any $banned_filename_all @bad_headers);
# Amavis::In::AMPDP, Amavis::In::SMTP and In::Courier objects
use vars qw($ampdp_in_obj $smtp_in_obj $courier_in_obj);
use vars qw($sql_dataset_conn_lookups); # Amavis::Out::SQL::Connection object
use vars qw($sql_dataset_conn_storage); # Amavis::Out::SQL::Connection object
use vars qw($sql_storage); # Amavis::Out::SQL::Log object
use vars qw($sql_lookups $sql_wblist); # Amavis::Lookup::SQL objects
use vars qw($ldap_connection); # Amavis::LDAP::Connection object
use vars qw($ldap_lookups); # Amavis::Lookup::LDAP object
use vars qw($redis_storage); # Amavis::Redis object: penpals & repu
use vars qw($dns_resolver); # a reusable Net::DNS::Resolver object
use vars qw($warm_restart); # 1: warm (reload), 0: cold start (restart)
use vars qw(@public_networks_maps);
sub new {
my $class = shift;
# make Amavis a subclass of Net::Server::whatever
@ISA = !$daemonize && $max_servers==1 ? 'Net::Server' # facilitates debugging
: defined $min_servers ? 'Net::Server::PreFork'
: 'Net::Server::PreForkSimple';
# $class->SUPER::new(@_); # available since Net::Server 0.91
bless { server => $_[0] }, $class; # works with all versions
}
sub macro_rusage {
my($msginfo,$recip_index,$name,$arg) = @_;
my($rusage_self, $rusage_children) = get_rusage();
!$rusage_self || !$rusage_children || !defined($rusage_self->{$arg}) ? ''
: $rusage_self->{$arg} + $rusage_children->{$arg};
}
# implements macros: T, and SA lookalikes: TESTS, TESTSSCORES
#
sub macro_tests {
my($msginfo,$recip_index,$name,$sep) = @_;
my(@s); my $per_recip_data = $msginfo->per_recip_data;
if (defined $recip_index) { # return info on one particular recipient
my $r;
$r = $per_recip_data->[$recip_index] if $recip_index >= 0;
if (defined $r) {
my $spam_tests = $r->spam_tests;
@s = split(/,/, join(',',map($$_,@$spam_tests))) if $spam_tests;
}
} else {
my(%all_spam_tests);
for my $r (@$per_recip_data) {
my $spam_tests = $r->spam_tests;
if ($spam_tests) {
$all_spam_tests{$_} = 1 for split(/,/,join(',',map($$_,@$spam_tests)));
}
}
@s = sort keys %all_spam_tests;
}
if (@s > 50) { $#s = 50-1; push(@s,"...") } # sanity limit
@s = map { my($tn,$ts) = split(/=/,$_,2); $tn } @s if $name eq 'TESTS';
if ($name eq 'T' || !defined($sep)) { \@s } else { join($sep,@s) }
};
# implements macros: c, and SA lookalikes: SCORE(pad), STARS(*)
#
sub macro_score {
my($msginfo,$recip_index,$name,$arg) = @_;
my $per_recip_data = $msginfo->per_recip_data;
my($result, $sl_min, $sl_max, $w); $w = '';
if ($name eq 'SCORE' && defined($arg) && $arg=~/^(0+| +)\z/) {
$w = length($arg)+4; $w = $arg=~/^0/ ? "0$w" : "$w"; # SA style padding
}
my $fmt = "%$w.3f"; my $fmts = "%+$w.3f"; # padding, sign
if (defined $recip_index) { # return info on one particular recipient
my $r;
$r = $per_recip_data->[$recip_index] if $recip_index >= 0;
$sl_min = $sl_max = $r->spam_level if defined $r;
} else {
($sl_min,$sl_max) = minmax(map($_->spam_level, @$per_recip_data));
}
if ($name eq 'STARS') {
my $slc = $arg ne '' ? $arg : c('sa_spam_level_char');
$result = !defined $slc || $slc eq '' || !defined $sl_min || $sl_min<1 ? ''
: $slc x min(50, int $sl_min);
} elsif (!defined $sl_min) {
$result = '-';
# } elsif ($name eq 'SCORE' || abs($sl_min-$sl_max) < 0.1) {
} elsif (abs($sl_min-$sl_max) < 0.1) {
# users expect a single value, or not worth reporting a small difference
$result = sprintf($fmt,$sl_min); $result =~ s/\.?0*\z//; # trim fraction
} else { # format SA score as min..max
$sl_min = sprintf($fmt,$sl_min); $sl_min =~ s/\.?0*\z//;
$sl_max = sprintf($fmt,$sl_max); $sl_max =~ s/\.?0*\z//;
$result = $sl_min . '..' . $sl_max;
}
$result;
};
# implements macro 'header_field', providing a requested header field
# from a message; attempts decoding UTF-8 to logical characters
# unless a macro name is 'header_field_octets'; non-decodable UTF-8
# is left unchanged as octets
#
sub macro_header_field {
my($msginfo,$name,$header_field_name,$limit,$hf_index) = @_;
undef $hf_index if $hf_index !~ /^[+-]?\d+\z/; # defaults to last
my $s = $msginfo->get_header_field_body($header_field_name, $hf_index);
return undef if !defined($s);
# unfold, trim, protect any leftover CR and LF
chomp($s); $s=~s/\n(?=[ \t])//gs; $s=~s/^[ \t]+//; $s=~s/[ \t\n]+\z//;
if ($header_field_name =~
/^(?:Message-ID|Resent-Message-ID|In-Reply-To|References)\z/i) {
$s = join(' ',parse_message_id($s)) if $s ne ''; # strip CFWS
}
if ($name ne 'header_field_octets' &&
$s =~ tr/\x00-\x7F//c && is_valid_utf_8($s)) {
eval { $s = safe_decode_utf8($s, 1|8); 1 }
}
if (defined($limit) && $limit !~ /^\s+\z/ &&
$limit > 5 && length($s) > $limit) {
substr($s,$limit-5) = ''; $s .= '[...]';
}
$s =~ s{ ( [\r\n] ) }{ sprintf('\\x{%02X}',ord($1)) }xgse;
$s;
};
sub dkim_test {
my($name,$which) = @_;
my $w = lc $which;
my $sigs_ref = $MSGINFO->dkim_signatures_valid;
$sigs_ref = [] if !$sigs_ref;
$w eq 'any' || $w eq '' ? (!@$sigs_ref ? undef : scalar(@$sigs_ref))
: $w eq 'author' ? $MSGINFO->dkim_author_sig
: $w eq 'sender' ? $MSGINFO->dkim_sender_sig
: $w eq 'thirdparty'? $MSGINFO->dkim_thirdparty_sig
: $w eq 'envsender' ? $MSGINFO->dkim_envsender_sig
: $w eq 'identity' ? join(',', map($_->identity, @$sigs_ref))
: $w eq 'selector' ? join(',', map($_->selector, @$sigs_ref))
: $w eq 'domain' ? join(',', map($_->domain, @$sigs_ref))
: $w eq 'sig_sd' ? join(',', unique_list(map($_->selector.':'.$_->domain,
@$sigs_ref)))
: $w eq 'newsig_sd' ? join(',', unique_list(map($_->selector.':'.$_->domain,
@{$MSGINFO->dkim_signatures_new||[]})))
: dkim_acceptable_signing_domain($MSGINFO,$which);
}
sub dkim_acceptable_signing_domain($@) {
my($msginfo,@acceptable_sdid) = @_;
my $matches = 0;
my $sigs_ref = $msginfo->dkim_signatures_valid;
if ($sigs_ref && @$sigs_ref) {
for my $sig (@$sigs_ref) {
my $sdid_ace = idn_to_ascii($sig->domain);
for (@acceptable_sdid) {
my $ad = !defined $_ ? '' : $_;
local($1);
$ad = $1 if $ad =~ /\@([^\@]*)\z/; # compatibility with pre-2.6.5
if ($ad eq '') { # checking for author domain signature
$matches = 1 if $msginfo->dkim_author_sig;
} elsif ($ad =~ /^\.(.*)\z/s) { # domain itself or its subdomain
my $d = idn_to_ascii($1);
if ($sdid_ace eq $d || $sdid_ace =~ /\.\Q$d\E\z/s) {
$matches = 1; last;
}
} else {
if ($sdid_ace eq idn_to_ascii($ad)) { $matches = 1; last }
}
}
last if $matches;
}
}
$matches;
};
# initialize the %builtins, which is an associative array of built-in macros
# to be used in notification message expansion and log templates
#
sub init_builtin_macros() {
# A key (macro name) used to be a single character, but can now be a longer
# string, typically a name containing letters, numbers and '_' or '-'.
# Upper case letters may (as a mnemonic) suggest the value is an array,
# lower case may suggest the value is a scalar string - but this is only
# a convention and not enforced. All-uppercase multicharacter names are
# intended as SpamAssassin-lookalike macros, although there is nothing
# special about them and can be called like other macros.
#
# A value may be a reference to a subroutine which will be called later at
# a time of macro expansion. This way we can provide a method for obtaining
# information which is not yet available at the time of initialization, such
# as AV scanner results, or provide a lazy evaluation for more expensive
# calculations. Subroutine will be called in scalar context, its first
# argument is a macro name (a string), remaining arguments (strings, if any)
# are arguments of a macro call as specified in the call. The subroutine may
# return a scalar string (or undef), or an array reference.
#
# for SpamAssassin-lookalike macros semantics see Mail::SpamAssassin::Conf
%builtins = (
'.' => undef,
p => sub {c('policy_bank_path')},
# mail reception timestamp (e.g. start of an SMTP transaction):
DATE => sub {rfc2822_timestamp($MSGINFO->rx_time)},
d => sub {rfc2822_timestamp($MSGINFO->rx_time)}, # RFC 5322 local time
U => sub {iso8601_utc_timestamp($MSGINFO->rx_time)}, # iso8601 UTC
u => sub {sprintf("%010d",int($MSGINFO->rx_time))},# s since Unix epoch,UTC
# equivalent, but with more descriptive macro names:
date_unix_utc => sub {sprintf("%010d",int($MSGINFO->rx_time))},
date_iso8601_utc => sub {iso8601_utc_timestamp($MSGINFO->rx_time)},
date_iso8601_local => sub {iso8601_timestamp($MSGINFO->rx_time)},
date_rfc2822_local => sub {rfc2822_timestamp($MSGINFO->rx_time)},
week_iso8601 => sub {iso8601_week($MSGINFO->rx_time)},
weekday => sub {iso8601_weekday($MSGINFO->rx_time)},
y => sub {sprintf("%.0f", 1000*get_time_so_far())}, # elapsed time in ms
h => sub { $MSGINFO->smtputf8
? safe_decode_utf8(idn_to_utf8(c('myhostname')))
: idn_to_ascii(c('myhostname')) },
HOSTNAME => sub {safe_decode_utf8(idn_to_utf8(c('myhostname')))},
l => sub {$MSGINFO->originating ? 1 : undef}, # our client (mynets/roaming)
s => sub {$MSGINFO->sender_smtp}, # orig. unmodified env. sender addr in <>
S => sub {$MSGINFO->sender_smtp}, # kept for compatibility, avoid!
o => sub { # best attempt at determining true sender (origin) of the virus,
sanitize_str($MSGINFO->sender_source) }, # normally same as %s
R => sub {$MSGINFO->recips}, # original message recipients list
D => sub {my($y,$n,$f)=delivery_short_report($MSGINFO); $y}, #succ. delivrd
O => sub {my($y,$n,$f)=delivery_short_report($MSGINFO); $n}, #failed recips
N => sub {my($y,$n,$f)=delivery_short_report($MSGINFO); $f}, #short dsn
actions_performed => sub {join(',',@{$MSGINFO->actions_performed||[]})},
Q => sub {$MSGINFO->queue_id}, # MTA queue ID of the message if known
m => sub {my $m_id = $MSGINFO->get_header_field_body('message-id');
defined $m_id ? (parse_message_id($m_id))[0] : undef },
r => sub {my $m_id = $MSGINFO->get_header_field_body('resent-message-id');
defined $m_id ? (parse_message_id($m_id))[0] : undef },
j => sub {macro_header_field($MSGINFO,'header','Subject')},
log_domains => sub {
my %domains;
# $domains{'ORIG'} = 1 if $MSGINFO->originating;
for my $r (@{$MSGINFO->per_recip_data}) {
if (!$r->recip_is_local) {
$domains{'EXT'} = 1;
} else {
my($localpart,$domain) = split_address($r->recip_addr);
$domain =~ s/^\@//; $domains{lc($domain)} = 1;
}
}
join(',', sort {$a cmp $b} keys %domains);
},
rfc2822_sender => sub {my $s = $MSGINFO->rfc2822_sender;
!defined($s) ? undef : qquote_rfc2821_local($s) },
rfc2822_from => sub {my $f = $MSGINFO->rfc2822_from;
!defined($f) ? undef :
qquote_rfc2821_local(ref $f ? @$f : $f)},
rfc2822_resent_sender => sub {my $rs = $MSGINFO->rfc2822_resent_sender;
!defined($rs) ? undef :
qquote_rfc2821_local(grep(defined $_, @$rs))},
rfc2822_resent_from => sub {my $rf = $MSGINFO->rfc2822_resent_from;
!defined($rf) ? undef :
qquote_rfc2821_local(grep(defined $_, @$rf))},
header_field_octets => sub {macro_header_field($MSGINFO,@_)}, # as octets
header_field => sub {macro_header_field($MSGINFO,@_)}, # as characters
HEADER => sub {macro_header_field($MSGINFO,@_)},
useragent => # argument: 'name' or 'body', or empty to return entire field
sub { my($macro_name,$which_part) = @_; my($head,$body);
$body = macro_header_field($MSGINFO,'header', $head='User-Agent');
$body = macro_header_field($MSGINFO,'header', $head='X-Mailer')
if !defined $body;
!defined($body) ? undef
: lc($which_part) eq 'name' ? $head
: lc($which_part) eq 'body' ? $body : "$head: $body";
},
ccat =>
sub { # somewhat expensive! #**
my($name,$attr,$which) = @_;
$attr = lc $attr; # name | major | minor | <empty>
# | is_blocking | is_nonblocking
# | is_blocked_by_nonmain
$which = lc $which; # main | blocking | auto
my $result = ''; my $blocking_ccat = $MSGINFO->blocking_ccat;
if ($attr eq 'is_blocking') {
$result = defined($blocking_ccat) ? 1 : '';
} elsif ($attr eq 'is_nonblocking') {
$result = !defined($blocking_ccat) ? 1 : '';
} elsif ($attr eq 'is_blocked_by_nonmain') {
if (defined($blocking_ccat)) {
my $aref = $MSGINFO->contents_category;
$result = 1 if ref($aref) && @$aref > 0
&& $blocking_ccat ne $aref->[0];
}
} elsif ($attr eq 'name') {
$result =
$which eq 'main' ?
$MSGINFO->setting_by_main_contents_category(\%ccat_display_names)
: $which eq 'blocking' ?
$MSGINFO->setting_by_blocking_contents_category(
\%ccat_display_names)
: $MSGINFO->setting_by_contents_category( \%ccat_display_names);
} else { # attr = major, minor, or anything else returns a pair
my($maj,$min) = ccat_split(
($which eq 'blocking' ||
$which ne 'main' && defined $blocking_ccat)
? $blocking_ccat : $MSGINFO->contents_category);
$result = $attr eq 'major' ? $maj
: $attr eq 'minor' ? sprintf('%d',$min)
: sprintf('(%d,%d)',$maj,$min);
}
$result;
},
ccat_maj => # deprecated, use [:ccat|major]
sub { my $blocking_ccat = $MSGINFO->blocking_ccat;
(ccat_split(defined $blocking_ccat ? $blocking_ccat
: $MSGINFO->contents_category))[0];
},
ccat_min => # deprecated, use [:ccat|minor]
sub { my $blocking_ccat = $MSGINFO->blocking_ccat;
(ccat_split(defined $blocking_ccat ? $blocking_ccat
: $MSGINFO->contents_category))[1];
},
ccat_name => # deprecated, use [:ccat|name]
sub { $MSGINFO->setting_by_contents_category(\%ccat_display_names) },
dsn_notify => sub {
return 'NEVER' if $MSGINFO->sender eq '';
my(%merged);
for my $r (@{$MSGINFO->per_recip_data}) {
my $dn = $r->dsn_notify;
for ($dn ? @$dn : ('FAILURE')) { $merged{uc($_)} = 1 }
}
uc(join(',', sort keys %merged));
},
attachment_password => sub {
my $password = $MSGINFO->attachment_password; # already have it?
if (!defined $password) { # make one, and store it for later
$password = make_password(c('attachment_password'), $MSGINFO);
$MSGINFO->attachment_password($password);
}
$password;
},
b => sub {$MSGINFO->body_digest}, # original message body digest, hex enc
body_digest => sub { # original message body digest, raw bytes (binary!)
my $bd = $MSGINFO->body_digest; # hex digits, high nybble first
!defined $bd ? '' : pack('H*',$bd);
},
n => sub {$MSGINFO->log_id}, # amavis internal task id (in log and nanny)
i => sub {$MSGINFO->mail_id}, # long-term unique mail id on this system
secret_id => sub {$MSGINFO->secret_id}, # mail_id's counterpart, base64url
mail_id => sub {$MSGINFO->mail_id}, # synonym for %i, base64url (RFC 4648)
parent_mail_id => sub {$MSGINFO->parent_mail_id},
log_id => sub {$MSGINFO->log_id}, # synonym for %n
MAILID => sub {$MSGINFO->mail_id}, # synonym for %i (no equivalent in SA)
LOGID => sub {$MSGINFO->log_id}, # synonym for %n (no equivalent in SA)
P => sub {$MSGINFO->partition_tag}, # SQL partition tag
partition_tag => sub {$MSGINFO->partition_tag}, # synonym for %P
q => sub { my $q = $MSGINFO->quarantined_to;
$q && [map { my $m=$_; $m=~s{^\Q$QUARANTINEDIR\E/}{}; $m } @$q];
}, # list of quarantine mailboxes
v => sub { !defined $av_output ? undef # anti-virus scanner output
: [split(/[ \t]*\r?\n/, $av_output)]},
V => sub { my $vn = $MSGINFO->virusnames; # unique virus names
$vn && unique_ref($vn) },
W => sub { my($name,@args) = @_; # detecting scanners & their virus names
# with no args: return a list of av scanners detecting a virus
return \@detecting_scanners if !@args;
# otherwise provide a per-scanner report of virus names found
join('; ', map { my($av, $status, @virus_names) = @$_;
my $scanner_name = $av && $av->[0];
for ($scanner_name) { # aliasing to $_
if (!/^[^:" \t]+\z/)
{ tr/"/'/; $_ = '"'.$_.'"' }
}
$scanner_name . ':' .
(!$status ? '-'
: '['.join(',',@virus_names).']');
} @av_scanners_results);
},
F => sub { my $b;
# first banned part name with a comment from a rule regexp
for my $r (@{$MSGINFO->per_recip_data}) {
$b = $r->banning_reason_short;
last if defined $b;
}
$b },
banning_rule_key => sub {
# regexp of a matching banning rules yielding a true rhs result
unique_ref(map { my $v = $_->banning_rule_key;
!defined($v) ? () : @$v }
@{$MSGINFO->per_recip_data});
},
banning_rule_comment => sub {
# just a comment (or a whole regexp if it contains no comments)
# from matching banning regexp rules yielding a true rhs result
unique_ref(map { my $v = $_->banning_rule_comment;
!defined($v) ? () : @$v }
@{$MSGINFO->per_recip_data});
},
banning_rule_rhs => sub {
# right-hand-side of those matching banning rules yielding true
# (a r.h.s. of a rule can be a string, is treated as a boolean,
# but often it is just an implicit 0 or 1)
unique_ref(map { my $v = $_->banning_rule_rhs;
!defined($v) ? () : @$v }
@{$MSGINFO->per_recip_data});
},
banned_parts => sub { # list of banned parts with their full paths
my $b = unique_ref(map(@{$_->banned_parts},
grep(defined($_->banned_parts),@{$MSGINFO->per_recip_data})));
my $b_chopped = @$b > 2; @$b = (@$b[0,1],'...') if $b_chopped;
s/[ \t]{6,}/ ... /g for @$b;
$b },
banned_parts_as_attr => sub { # list of banned parts with their full paths
my $b = unique_ref(map(@{$_->banned_parts_as_attr},
grep(defined($_->banned_parts_as_attr),
@{$MSGINFO->per_recip_data})));
my $b_chopped = @$b > 2; @$b = (@$b[0,1],'...') if $b_chopped;
s/[ \t]{6,}/ ... /g for @$b;
$b },
X => sub {\@bad_headers},
H => sub {[map(split(/\n/,$_), @{$MSGINFO->orig_header})]}, # arry of lines
A => sub {[split(/\r?\n/, $MSGINFO->spam_summary)]}, # SA report text
SUMMARY => sub {$MSGINFO->spam_summary},
REPORT => sub {sanitize_str($MSGINFO->spam_report,1)}, #contains any octet
TESTSSCORES => sub {macro_tests($MSGINFO,undef,@_)}, # tests with scores
TESTS => sub {macro_tests($MSGINFO,undef,@_)}, # tests without scores
z => sub {$MSGINFO->msg_size}, #mail size as defined by RFC 1870, or approx
ip_trace_all => sub { # all IP addresses in the Received trace, top-down
my $trace = $MSGINFO->trace; return if !$trace;
[ map(defined $_ ? sanitize_str($_) : 'x',
map($_->{ip}, @$trace)) ];
},
ip_trace_public => sub { # all public IP addresses in the Received trace
my $ip_trace = $MSGINFO->ip_addr_trace_public;
return if !$ip_trace;
[ map(defined $_ ? sanitize_str($_) : 'x', @$ip_trace) ];
},
ip_proto_trace_all => sub { # from a Received trace
# protocol type from the WITH clause and an IP address
my $trace_ref = $MSGINFO->trace; return if !$trace_ref;
my(@trace) = @$trace_ref;
shift(@trace); # chop off the last hop (MTA -> amavisd)
[ map(sanitize_str( (!$_->{with} ? '' : $_->{with}.'://') .
(!$_->{ip} ? 'x' : !$_->{port} ? $_->{ip}
: '['.$_->{ip}.']:'.$_->{port})),@trace)];
},
ip_proto_trace_public => sub { # from a Received trace
# protocol type from the WITH clause and an IP address
my $trace_ref = $MSGINFO->trace; return if !$trace_ref;
my(@trace) = @$trace_ref;
shift(@trace); # chop off the last hop (MTA -> amavisd)
[ map(sanitize_str( (!$_->{with} ? '' : $_->{with}.'://') .
(!$_->{ip} ? 'x' : !$_->{port} ? $_->{ip}
: '['.$_->{ip}.']:'.$_->{port}) ),
grep($_->{public}, @trace)) ];
},
protocol => # "WITH protocol type" as seen by amavisd (the last hop)
sub { my $c = $MSGINFO->conn_obj; !$c ? '' : $c->appl_proto },
t => sub { # first (oldest) entry in the Received trace
sanitize_str(first_received_from($MSGINFO)) },
e => sub { # first (oldest) valid public IP in the Received trace,
# same as the last entry in ip_trace_public
sanitize_str(oldest_public_ip_addr_from_received($MSGINFO)) },
a => sub { $MSGINFO->client_addr }, # original SMTP session client IP addr
client_addr => sub { $MSGINFO->client_addr }, # synonym with 'a'
client_port => sub { $MSGINFO->client_port },
client_addr_port => sub { # original SMTP session client IP addr & port no.
my($a,$p) = ($MSGINFO->client_addr, $MSGINFO->client_port);
!defined $a || $a eq '' ? undef : ('[' . $a . ']' . ($p ? ":$p" : ''));
},
g => sub { # original SMTP session client DNS name
sanitize_str($MSGINFO->client_name) },
client_helo => sub { # original SMTP session EHLO/HELO name
sanitize_str($MSGINFO->client_helo) },
client_protocol => sub { $MSGINFO->client_proto }, # XFORWARD PROTO, AM.PDP
remote_mta => sub { unique_ref(map($_->recip_remote_mta,
@{$MSGINFO->per_recip_data})) },
smtp_response => sub { unique_ref(map($_->recip_smtp_response,
@{$MSGINFO->per_recip_data})) },
remote_mta_smtp_response =>
sub { unique_ref(map($_->recip_remote_mta_smtp_response,
@{$MSGINFO->per_recip_data})) },
REMOTEHOSTADDR => # where the request came from
sub { my $c = $MSGINFO->conn_obj; !$c ? '' : $c->client_ip },
REMOTEHOSTNAME =>
sub { my $c = $MSGINFO->conn_obj;
my $ip = !$c ? '' : $c->client_ip;
$ip ne '' ? "[$ip]" : 'localhost' },
AUTOLEARN => sub {$MSGINFO->supplementary_info('AUTOLEARN')},
ADDEDHEADERHAM => sub {$MSGINFO->supplementary_info('ADDEDHEADERHAM')},
ADDEDHEADERSPAM => sub {$MSGINFO->supplementary_info('ADDEDHEADERSPAM')},
supplementary_info => # additional information from SA and other scanners
sub { my($name,$key,$fmt)=@_;
my $info = $MSGINFO->supplementary_info($key);
$info eq '' ? '' : $fmt eq '' ? $info : sprintf($fmt,$info);
},
rusage => sub { macro_rusage($MSGINFO,undef,@_) }, # resource usage
REQD => sub { my $tag2_level;
for (@{$MSGINFO->per_recip_data}) { # get minimal tag2_level
my $tag2_l = lookup2(0, $_->recip_addr,
ca('spam_tag2_level_maps'));
$tag2_level = $tag2_l if defined($tag2_l) &&
(!defined($tag2_level) || $tag2_l < $tag2_level);
}
!defined($tag2_level) ? '-' : 0+sprintf("%.3f",$tag2_level);
},
'1'=> sub { # above tag level and not bypassed for any recipient?
grep($_->is_in_contents_category(CC_CLEAN,1),
@{$MSGINFO->per_recip_data}) ? 'Y' : '0' },
'2'=> sub { # above tag2 level and not bypassed for any recipient?
grep($_->is_in_contents_category(CC_SPAMMY),
@{$MSGINFO->per_recip_data}) ? 'Y' : '0' },
YESNO => sub { my($arg_spam, $arg_ham) = @_; # like %2, but gives: Yes/No
grep($_->is_in_contents_category(CC_SPAMMY),
@{$MSGINFO->per_recip_data})
? (defined $arg_spam ? $arg_spam : 'Yes')
: (defined $arg_ham ? $arg_ham : 'No') },
YESNOCAPS =>
sub { my($arg_spam, $arg_ham) = @_; # like %2, but gives: YES/NO
grep($_->is_in_contents_category(CC_SPAMMY),
@{$MSGINFO->per_recip_data})
? (defined $arg_spam ? $arg_spam : 'YES')
: (defined $arg_ham ? $arg_ham : 'NO') },
'k'=> sub { # above kill level and not bypassed for any recipient?
grep($_->is_in_contents_category(CC_SPAM),
@{$MSGINFO->per_recip_data}) ? 'Y' : '0' },
score_boost => 0, # legacy
c => sub {macro_score($MSGINFO,undef,@_)}, # info on all recipients
SCORE => sub {macro_score($MSGINFO,undef,@_)}, # info on all recipients
STARS => sub {macro_score($MSGINFO,undef,@_)}, # info on all recipients
dkim => \&dkim_test,
tls_in => sub {$MSGINFO->tls_cipher}, # currently only shows ciphers in use
report_format => undef, # notification message format, supplied elsewhere
feedback_type => undef, # (ARF) feedback type or empty, supplied elsewhere
wrap => sub {my($name,$width,$prefix,$indent,$str) = @_;
wrap_string($str,$width,$prefix,$indent)},
lc => sub {my $name=shift; lc(join('',@_))}, # to lowercase
uc => sub {my $name=shift; uc(join('',@_))}, # to uppercase
substr => sub {my($name,$s,$ofs,$len) = @_;
defined $len ? substr($s,$ofs,$len) : substr($s,$ofs)},
index => sub {my($name,$s,$substr,$pos) = @_;
index($s, $substr, defined $pos ? $pos : 0)},
len => sub {my($name,$s) = @_; length($s)},
incr => sub {my($name,$v,@rest) = @_;
if (!@rest) { $v++ } else { $v += $_ for @rest }; "$v"},
decr => sub {my($name,$v,@rest) = @_;
if (!@rest) { $v-- } else { $v -= $_ for @rest }; "$v"},
min => sub {my($name,@args) = @_; min(map(/^\s*\z/?undef:$_, @args))},
max => sub {my($name,@args) = @_; max(map(/^\s*\z/?undef:$_, @args))},
sprintf=> sub {my($name,$fmt,@args) = @_; sprintf($fmt,@args)},
join => sub {my($name,$sep,@args) = @_; join($sep,@args)},
limit => sub {my($name,$lim,$s) = @_; $lim < 6 || length($s) <= $lim ? $s
: substr($s,0,$lim-5).'[...]' },
dquote => sub {my $nm=shift;
join('', map { my $s=$_; $s=~s{"}{""}g; '"'.$s.'"' } @_)},
uquote => sub {my $nm=shift;
join('', map { my $s=$_; $s=~s{[ \t]+}{_}g; $s } @_)},
rot13 => sub {my($name,$s) = @_; # obfuscation (Caesar cipher)
$s=~tr/a-zA-Z/n-za-mN-ZA-M/; $s },
hexenc => sub {my $nm=shift; join('', map(unpack('H*',$_), @_))},
b64encode => sub {my $nm=shift; join(' ', map(encode_base64($_,''),@_))},
b64enc => sub {my $nm=shift; # preferred over b64encode
join('', map { my $s=encode_base64($_,'');
$s=~s/=+\z//; $s } @_)},
b64urlenc => sub {my $nm=shift;
join('', map { my $s=encode_base64($_,'');
$s=~s/=+\z//; $s=~tr{+/}{-_}; $s } @_)},
mail_addr_decode => sub {my($nm,$addr) = @_; mail_addr_decode($addr,0)},
mail_addr_decode_octets =>
sub {my($nm,$addr) = @_; mail_addr_decode($addr,1)},
mime_decode => sub {
# convert RFC 2047 encoded-words or UTF-8 octets to logical characters,
# truncate to $max_len characters if limit is provded
my($nm,$str,$max_len,$both_if_diff) = @_;
return '' if !defined $str || $str eq '';
my $chars = safe_decode_mime($str); # octets to logical characters
if (!defined $max_len || $max_len <= 0) { # no size limit
return $chars if !$both_if_diff;
$chars .= ' (raw: ' . $str . ')' if $chars ne $str;
} else { # truncate characters string at $max_len
substr($chars,$max_len) = '' if length($chars) > $max_len;
return $chars if !$both_if_diff;
# only compare the visible part
my $octets = safe_encode_utf8($chars);
substr($str,length($octets)) = '' if length($str) > length($octets);
$chars .= ' (raw: ' . $str . ')' if $str ne $chars;
}
$chars;
},
mime2utf8 => sub {
# convert RFC 2047 encoded-words or UTF-8 to UTF-8 octets,
# truncate to $max_len characters if limit is provded
my($nm,$str,$max_len,$both_if_diff) = @_;
return '' if !defined $str || $str eq '';
my $chars = safe_decode_mime($str); # to logical characters
my $octets = safe_encode_utf8($chars); # to bytes, UTF-8 encoded
$octets = truncate_utf_8($octets,$max_len);
return $octets if !$both_if_diff;
# only compare the visible part
if (defined $max_len && $max_len > 0 && length($str) > $max_len) {
substr($str,$max_len) = '';
}
$str = $octets . ' (raw: ' . $str . ')' if $octets ne $str;
$str;
},
report_json => sub {
return if !$report_ref; # ugly globals
structured_report_update_time($report_ref);
return Amavis::JSON::encode($report_ref); # as a string of characters
},
report_json => sub {
return if !$report_ref; # ugly globals
structured_report_update_time($report_ref);
my $macro_name = shift;
if (!@_) { # all fields, no filtering
return Amavis::JSON::encode($report_ref); # as a string of characters
} else { # filtering by field names
my @keys = @_ == 1 ? split(' ',$_[0]) : @_; # whitespace-separated?
my(@negated_keys) = map(/^!(.*)\z/s ? $1 : (), @keys);
my %filtered;
if (@negated_keys) { # take all but negated fields
%filtered = %$report_ref;
delete @filtered{@negated_keys};
} else { # take only listed fields
%filtered =
map(exists $report_ref->{$_} ? ($_,$report_ref->{$_}) : (), @keys);
}
return Amavis::JSON::encode(\%filtered); # as a string of characters
}
},
# macros f, T, C, B will be defined for each notification as appropriate
# (representing From:, To:, Cc:, and Bcc: respectively)
# remaining free letters: wxEGIJKLMYZ
);
}
# initialize %local_delivery_aliases
#
sub init_local_delivery_aliases() {
# The %local_delivery_aliases maps local virtual 'localpart' to a mailbox
# (e.g. to a quarantine filename or a directory). Used by method 'local:',
# i.e. in mail_to_local_mailbox(), for direct local quarantining.
# The hash value may be a ref to a pair of fixed strings, or a subroutine ref
# (which must return a pair of strings (a list, not a list ref)) which makes
# possible lazy evaluation when some part of the pair is not known before
# the final delivery time. The first string in a pair must be either:
# - empty or undef, which will disable saving the message,
# - a filename, indicating a Unix-style mailbox,
# - a directory name, indicating a maildir-style mailbox,
# in which case the second string may provide a suggested file name.
#
%Amavis::Conf::local_delivery_aliases = (
'virus-quarantine' => sub { ($QUARANTINEDIR, undef) },
'banned-quarantine' => sub { ($QUARANTINEDIR, undef) },
'unchecked-quarantine' => sub { ($QUARANTINEDIR, undef) },
'spam-quarantine' => sub { ($QUARANTINEDIR, undef) },
'bad-header-quarantine' => sub { ($QUARANTINEDIR, undef) },
'clean-quarantine' => sub { ($QUARANTINEDIR, undef) },
'other-quarantine' => sub { ($QUARANTINEDIR, undef) },
'archive-quarantine' => sub { ($QUARANTINEDIR, undef) },
# some more examples:
'archive-files' => sub { ("$QUARANTINEDIR", undef) },
'archive-mbox' => sub { ("$QUARANTINEDIR/archive.mbox", undef) },
'recip-quarantine' => sub { ("$QUARANTINEDIR/recip-archive.mbox",undef) },
'sender-quarantine' =>
sub { my $s = $MSGINFO->sender;
substr($s,100) = '...' if length($s) > 100+3;
$s =~ tr/a-zA-Z0-9@._+-/=/c; $s =~ s/\@/_at_/g;
untaint_inplace($s) if $s =~ /^(?:[a-zA-Z0-9%=._+-]+)\z/; # untaint
($QUARANTINEDIR, "sender-$s-%m.gz"); # suggested file name
},
# 'recip-quarantine2' => sub {
# my(@fnames);
# my $myfield =
# Amavis::Lookup::SQLfield->new($sql_lookups,'some_field_name','S');
# for my $r (@{$MSGINFO->recips}) {
# my $field_value = lookup(0,$r,$myfield);
# my $fname = $field_value; # or perhaps: my $fname = $r;
# local($1); $fname =~ s/[^a-zA-Z0-9._\@]/=/g; $fname =~ s/\@/%/g;
# untaint_inplace($fname) if $fname =~ /^([a-zA-Z0-9._=%]+)\z/;
# $fname =~ s/%/%%/g; # protect %
# do_log(3, "Recipient: %s, field: %s, fname: %s",
# $r, $field_value, $fname);
# push(@fnames, $fname);
# }
# # ???what file name to choose if there is more than one recipient???
# ( $QUARANTINEDIR, "sender-$fnames[0]-%i-%n.gz" ); # suggested file name
# },
);
}
# tokenize templates (input to macro expansion), after dropping privileges
#
sub init_tokenize_templates() {
my(@templ_names) = qw(log_templ log_recip_templ
notify_sender_templ notify_virus_recips_templ
notify_virus_sender_templ notify_virus_admin_templ
notify_spam_sender_templ notify_spam_admin_templ
notify_release_templ notify_report_templ notify_autoresp_templ);
for my $bank_name (keys %policy_bank) {
for my $n (@templ_names) { # tokenize templates to speed up macro expansion
my $s = $policy_bank{$bank_name}{$n};
$s = $$s if ref($s) eq 'SCALAR';
if (defined $s) {
# encode log templates to UTF-8, leave the rest as character strings
safe_encode_utf8_inplace($s) if $n eq 'log_templ' || $n eq 'log_recip_templ';
$policy_bank{$bank_name}{$n} = tokenize(\$s);
}
}
}
}
# pre-parse IP lookup tables to speed up lookups, after dropping privileges
#
sub init_preparse_ip_lookups() {
for my $bank_name (keys %policy_bank) {
my $r = $policy_bank{$bank_name}{'inet_acl'};
if (ref($r) eq 'ARRAY') { # should be a ref to an IP lookup table
$policy_bank{$bank_name}{'inet_acl'} = Amavis::Lookup::IP->new(@$r);
}
$r = $policy_bank{$bank_name}{'ip_repu_ignore_maps'}; # listref of tables
if (ref($r) eq 'ARRAY') { # should be an array, test just to make sure
for my $table (@$r) { # replace plain lists with pre-parsed objects
$table = Amavis::Lookup::IP->new(@$table) if ref($table) eq 'ARRAY';
}
}
$r = $policy_bank{$bank_name}{'client_ipaddr_policy'}; # listref of pairs
if (ref($r) eq 'ARRAY') { # should be an array, test just to make sure
my $odd = 1;
for my $table (@$r) { # replace plain lists with pre-parsed objects
$table = Amavis::Lookup::IP->new(@$table)
if $odd && ref($table) eq 'ARRAY';
$odd = !$odd;
}
}
}
}
# initialize some remaining global variables in a master process;
# invoked after chroot and after privileges have been dropped, before forking
#
sub after_chroot_init() {
$child_invocation_count = $child_task_count = 0;
%modules_basic = %INC; # helps to track missing modules in chroot
do_log(5,"after_chroot_init: EUID: %s (%s); EGID: %s (%s)", $>,$<, $),$( );
my(@msg);
my $euid = $>; # effective UID
$> = 0; # try to become root
POSIX::setuid(0) if $> != 0; # and try some more
if ($euid == 0) {
@msg = ('Running as EUID 0 (root), ABORTING!',
'Please start as non-root, e.g. by su(1) or using option -u user,',
'or configure the $daemon_user setting.');
} elsif ($> == 0) { # succeeded? panic!
@msg = ("It is possible to change EUID from $euid to root, ABORTING!",
'Please start as non-root, e.g. by su(1) or using option -u user,',
'or configure the $daemon_user setting.');
} elsif ($daemon_chroot_dir eq '') {
# A quick check on vulnerability/protection of a config file
# (non-exhaustive: doesn't test for symlink tricks and higher directories).
# The config file has already been executed by now, so it may be
# too late to feel sorry now, but better late then never.
my(@actual_c_f) = Amavis::Conf::get_config_files_read();
do_log(2,"config files read: %s", join(", ",@actual_c_f));
for my $config_file (@actual_c_f) {
local($1); # IO::Handle::_open_mode_string can taint $1 if mode is '+<'
my $fh = IO::File->new;
my $errn = stat($config_file) ? 0 : 0+$!;
if ($errn) {
# not accessible, don't bother to test further
} elsif ($i_know_what_i_am_doing{no_conf_file_writable_check}) {
# skip checking
} elsif ($fh->open($config_file,O_RDWR)) {
push(@msg, "Config file \"$config_file\" is writable, ".
"UID $<, EUID $>, EGID $)" );
$fh->close; # close, ignoring status
} elsif (rename($config_file, $config_file.'.moved')) {
my $m = 'appears writable (unconfirmed)';
my $errn_cf_orig = stat($config_file) ? 0 : 0+$!;
my $errn_cf_movd = stat($config_file.'.moved') ? 0 : 0+$!;
if ($errn_cf_orig==ENOENT && $errn_cf_movd!=ENOENT) {
# try to rename back, ignoring status
rename($config_file.'.moved', $config_file);
$m = 'is writable (confirmed)';
}
push(@msg, "Directory of a config file \"$config_file\" $m, ".
"UID $<, EUID $>, EGID $)" );
}
last if @msg;
}
}
if (@msg) {
do_log(-3,"FATAL: %s",$_) for @msg;
print STDERR (map("$_\n", @msg));
die "SECURITY PROBLEM, ABORTING";
exit 1; # just in case
}
init_tokenize_templates();
init_preparse_ip_lookups();
# report versions of some (more interesting) modules
for my $m ('Amavis::Conf',
sort map { my $s = $_; $s =~ s/\.pm\z//; $s =~ s{/}{::}g; $s }
grep(/\.pm\z/, keys %INC)) {
next if !grep($_ eq $m, qw(Amavis::Conf
Archive::Tar Archive::Zip Compress::Zlib Compress::Raw::Zlib
Convert::TNEF Convert::UUlib File::LibMagic
MIME::Entity MIME::Parser MIME::Tools Mail::Header Mail::Internet
Digest::MD5 Digest::SHA Digest::SHA1 Crypt::OpenSSL::RSA
Authen::SASL Authen::SASL::XS Authen::SASL::Cyrus Authen::SASL::Perl
Encode Scalar::Util Time::HiRes File::Temp Unix::Syslog Unix::Getrusage
Socket Socket6 IO::Socket::INET6 IO::Socket::IP IO::Socket::SSL
Net::Server NetAddr::IP Net::DNS Net::LibIDN Net::SSLeay Net::Patricia
Net::LDAP Mail::SpamAssassin Mail::DKIM::Verifier Mail::DKIM::Signer
Mail::ClamAV Mail::SPF Mail::SPF::Query URI Razor2::Client::Version
DBI DBD::mysql DBD::Pg DBD::SQLite BerkeleyDB DB_File
ZMQ ZMQ::LibZMQ2 ZMQ::LibZMQ3 ZeroMQ SAVI Anomy::Sanitizer));
do_log(1, "Module %-19s %s", $m, eval{$m->VERSION} || '?');
}
do_log(1,"Amavis::ZMQ code %s loaded", $extra_code_zmq ?'':" NOT");
do_log(1,"Amavis::DB code %s loaded", $extra_code_db ?'':" NOT");
do_log(1,"SQL base code %s loaded", $extra_code_sql_base ?'':" NOT");
do_log(1,"SQL::Log code %s loaded", $extra_code_sql_log ?'':" NOT");
do_log(1,"SQL::Quarantine %s loaded", $extra_code_sql_quar ?'':" NOT");
do_log(1,"Lookup::SQL code %s loaded", $extra_code_sql_lookup ?'':" NOT");
do_log(1,"Lookup::LDAP code %s loaded", $extra_code_ldap ?'':" NOT");
do_log(1,"AM.PDP-in proto code%s loaded", $extra_code_in_ampdp ?'':" NOT");
do_log(1,"SMTP-in proto code %s loaded", $extra_code_in_smtp ?'':" NOT");
do_log(1,"Courier proto code %s loaded", $extra_code_in_courier ?'':" NOT");
do_log(1,"SMTP-out proto code %s loaded", $extra_code_out_smtp ?'':" NOT");
do_log(1,"Pipe-out proto code %s loaded", $extra_code_out_pipe ?'':" NOT");
do_log(1,"BSMTP-out proto code%s loaded", $extra_code_out_bsmtp ?'':" NOT");
do_log(1,"Local-out proto code%s loaded", $extra_code_out_local ?'':" NOT");
do_log(1,"OS_Fingerprint code %s loaded", $extra_code_p0f ?'':" NOT");
do_log(1,"ANTI-VIRUS code %s loaded", $extra_code_antivirus ?'':" NOT");
do_log(1,"ANTI-SPAM code %s loaded", $extra_code_antispam ?'':" NOT");
do_log(1,"ANTI-SPAM-EXT code %s loaded",
$extra_code_antispam_extprog ?'':" NOT");
do_log(1,"ANTI-SPAM-C code %s loaded",
$extra_code_antispam_spamc ?'':" NOT");
do_log(1,"ANTI-SPAM-Rspamd code%s loaded",
$extra_code_antispam_rspamc ?'':" NOT");
do_log(1,"ANTI-SPAM-SA code %s loaded", $extra_code_antispam_sa?'':" NOT");
do_log(1,"Unpackers code %s loaded", $extra_code_unpackers ?'':" NOT");
do_log(1,"DKIM code %s loaded", $extra_code_dkim ?'':" NOT");
do_log(1,"Tools code %s loaded", $extra_code_tools ?'':" NOT");
# store policy names into 'policy_bank_name' fields, if not explicitly set
for my $name (keys %policy_bank) {
if (ref($policy_bank{$name}) eq 'HASH' &&
!exists($policy_bank{$name}{'policy_bank_name'})) {
$policy_bank{$name}{'policy_bank_name'} = $name;
$policy_bank{$name}{'policy_bank_path'} = $name;
}
}
};
# overlay the current policy bank by settings from the
# $policy_bank{$policy_bank_name}, or load the default policy bank (empty name)
#
sub load_policy_bank($;$) {
my($policy_bank_name, $msginfo) = @_;
if (!defined $policy_bank_name) {
# silently ignore
} elsif (!exists $policy_bank{$policy_bank_name}) {
do_log(5,'policy bank "%s" does not exist, ignored', $policy_bank_name);
} elsif ($policy_bank_name eq '') { # special case
%current_policy_bank = %{$policy_bank{$policy_bank_name}}; # copy base
update_current_log_level();
do_log(4,'loaded base policy bank');
} elsif ($policy_bank_name eq c('policy_bank_name')) {
do_log(5,'policy bank "%s" just loaded, ignored', $policy_bank_name);
} else {
# compatibility: policy bank MYNETS implicitly pre-sets 'originating' flag
$current_policy_bank{'originating'} = 1 if $policy_bank_name eq 'MYNETS';
my $cpbp = c('policy_bank_path'); # currently loaded bank
my $new_bank_ref = $policy_bank{$policy_bank_name};
my $do_log5 = ll(5);
for my $k (keys %$new_bank_ref) {
if ($k eq 'ACTION') {
if (ref $new_bank_ref->{$k} eq 'CODE') {
do_log(5,'invoking user ACTION on loading a policy bank %s',
$policy_bank_name);
eval {
# $msginfo may be undef when a policy bank load takes place early
&{$new_bank_ref->{$k}}($msginfo,$policy_bank_name); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,'failed ACTION on loading a policy bank %s: %s',
$policy_bank_name, $eval_stat);
};
}
} elsif (!exists $current_policy_bank{$k}) {
do_log(-1,'loading policy bank "%s": unknown field "%s"',
$policy_bank_name,$k);
} elsif (ref($new_bank_ref->{$k}) ne 'HASH' ||
ref($current_policy_bank{$k}) ne 'HASH') {
$current_policy_bank{$k} = $new_bank_ref->{$k};
# do_log(5,'loading policy bank %s, curr{%s} replaced by %s',
# $policy_bank_name, $k, $current_policy_bank{$k}) if $do_log5;
} else { # new hash to be merged into or replacing an existing hash
if ($new_bank_ref->{$k}{REPLACE}) { # replace the entire hash
$current_policy_bank{$k} = { %{$new_bank_ref->{$k}} }; # copy of new
do_log(5,'loading policy bank %s, curr{%s} hash replaced',
$policy_bank_name, $k) if $do_log5;
} else { # merge field-by-field, old fields missing in new are retained
$current_policy_bank{$k} = { %{$current_policy_bank{$k}} }; # copy
while (my($key,$val) = each %{$new_bank_ref->{$k}}) {
do_log(5,'loading policy bank %s, curr{%s}{%s} = %s, %s',
$policy_bank_name, $k, $key, $val,
!exists($current_policy_bank{$k}{$key}) ? 'new'
: 'replaces '.$current_policy_bank{$k}{$key}
) if $do_log5;
$current_policy_bank{$k}{$key} = $val;
}
}
delete $current_policy_bank{$k}{REPLACE};
}
}
$current_policy_bank{'policy_bank_path'} =
($cpbp eq '' ? '' : $cpbp.'/') . $policy_bank_name;
ll(3) && do_log(3,'loaded policy bank "%s"%s', $policy_bank_name,
$cpbp eq '' ? '' : " over \"$cpbp\"");
# update global settings which may have changed
update_current_log_level();
$msginfo->originating(c('originating')) if $msginfo;
}
}
# systemd notifier
#
sub sd_notify($@) {
# my($unset_environment, @messages) = @_;
my $unset_environment = shift;
my $result; # undef=failure, 0=nothing to do, 1=success
my $socket_name = $ENV{NOTIFY_SOCKET};
if (!@_) { # no messages
$result = 0;
} elsif (!defined $socket_name || $socket_name eq '') {
$result = 0;
ll(2) && do_log(2, "sd_notify (no socket): %s", join("\n",@_));
} elsif ($socket_name !~ m{^[/@].}s) {
# must be an absolute path or an abstract socket
do_log(0, "sd_notify: NOTIFY_SOCKET env.var '%s' must be ".
"an absolute path or an abstract socket", $socket_name);
$! = EINVAL;
} else {
ll(1) && do_log(1, "sd_notify (%s): %s", $socket_name, join("\n",@_));
$socket_name =~ s{^\@}{\x{00}}s; # abstract socket (Linux specific)
eval {
my $sock = IO::Socket::UNIX->new(Type => SOCK_DGRAM);
$sock or die "Can't create a socket object of type AF_LOCAL: $!";
# should also send credentials, e.g. using IO::Handle::Record module
# FreeBSD: struct cmsgcred; send a SCM_CREDS message
# OpenBSD: struct sockpeercred; SO_PASSCRED
# Linux: struct ucred; send a SCM_CREDENTIALS msg; SO_PEERCRED; unix(7)
$sock->connect( pack_sockaddr_un(untaint($socket_name)) )
or die "Can't connect to NOTIFY_SOCKET $socket_name: $!";
defined $sock->send(join("\n",@_), MSG_NOSIGNAL)
or die "Error sending to NOTIFY_SOCKET $socket_name: $!";
$sock->close or die "Error closing NOTIFY_SOCKET: $!";
$result = 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "sd_notify: %s", $eval_stat);
};
}
undef $ENV{NOTIFY_SOCKET} if $unset_environment;
$result;
}
sub sd_notifyf($$;@) {
my($unset_environment, $message, @args) = @_;
sd_notify($unset_environment, @args ? sprintf($message,@args) : $message);
}
### Net::Server hook
### Occurs in the parent (master) process after (possibly) opening a log file,
### creating pid file, reopening STDIN/STDOUT to /dev/null and daemonizing;
### but before binding to sockets
#
sub post_configure_hook {
if ($warm_restart) {
sd_notify(0, "STATUS=Preparing to re-bind sockets.");
} elsif (!$daemonize) {
sd_notify(0, "STATUS=Preparing to bind sockets.");
} else {
sd_notify(0, "MAINPID=$$","STATUS=Daemonized, preparing to bind sockets.");
}
# umask(0007); # affects protection of Unix sockets created by Net::Server
}
sub set_sockets_access() {
if (defined $unix_socket_mode && $unix_socket_mode ne '') {
for my $s (@listen_sockets) {
local($1);
if ($s =~ m{^(/.+)\|unix\z}si) {
my $path = $1;
chmod($unix_socket_mode,$path)
or do_log(-1, "Error setting mode 0%03o on a socket %s: %s",
$unix_socket_mode, $path, $!);
}
}
}
}
### Net::Server hook
### Occurs in the parent (master) process after binding to sockets,
### but before chrooting and dropping privileges
#
sub post_bind_hook {
umask(0027); # restore our preferred umask
set_sockets_access() if defined $warm_restart && !$warm_restart;
sd_notify(0, "STATUS=Sockets bound, checking user and group.");
}
### Net::Server hook
### This hook occurs in the parent (master) process after chroot,
### after change of user, and change of group has occurred.
### It allows for preparation before forking and looping begins.
#
sub pre_loop_hook {
my $self = $_[0];
local $SIG{CHLD} = 'DEFAULT';
# do_log(5, "entered pre_loop_hook");
eval {
sd_notify(0, "STATUS=The rest of pre-fork init, finding helper programs.");
after_chroot_init(); # the rest of the top-level initialization
# this needs to be done after chroot, otherwise paths will be wrong
find_external_programs([split(/:/,$path,-1)]); # path, decoders, scanners
# do some sanity checking
my $name = $TEMPBASE;
$name = "$daemon_chroot_dir $name" if $daemon_chroot_dir ne '';
my $errn = stat($TEMPBASE) ? 0 : 0+$!;
if ($errn==ENOENT) { die "No TEMPBASE directory: $name" }
elsif ($errn) { die "TEMPBASE directory inaccessible, $!: $name" }
elsif (!-d _) { die "TEMPBASE is not a directory: $name" }
elsif (!-w _) { die "TEMPBASE directory is not writable: $name" }
if ($enable_db && $extra_code_db) {
my $name = $db_home;
$name = "$daemon_chroot_dir $name" if $daemon_chroot_dir ne '';
$errn = stat($db_home) ? 0 : 0+$!;
if ($errn == ENOENT) {
die "Please create an empty directory $name to hold a database".
" (config variable \$db_home)\n" }
elsif ($errn) { die "db_home $name inaccessible: $!" }
elsif (!-d _) { die "db_home $name is not a directory" }
elsif (!-w _) { die "db_home $name directory is not writable" }
Amavis::DB::init(1, !$warm_restart);
}
if (!defined($sql_quarantine_chunksize_max)) {
die "Variable \$sql_quarantine_chunksize_max is undefined\n";
} elsif ($sql_quarantine_chunksize_max < 1024) {
die "Setting of \$sql_quarantine_chunksize_max is too small: ".
"$sql_quarantine_chunksize_max bytes, it would be inefficient\n";
} elsif ($sql_quarantine_chunksize_max > 1024*1024) {
do_log(-1, "Setting of %s is quite large: %d KiB, it unnecessarily ".
"wastes memory", '$sql_quarantine_chunksize_max',
$sql_quarantine_chunksize_max/1024);
}
if ($QUARANTINEDIR ne '') {
my $name = $QUARANTINEDIR;
$name = "$daemon_chroot_dir $name" if $daemon_chroot_dir ne '';
$errn = stat($QUARANTINEDIR) ? 0 : 0+$!;
if ($errn == ENOENT) { } # ok
elsif ($errn) { die "QUARANTINEDIR $name inaccessible: $!" }
# elsif (-d _ && !-w _){ die "QUARANTINEDIR directory $name not writable"}
}
$spamcontrol_obj->init_pre_fork if $spamcontrol_obj;
my(@modules_extra) = grep(!exists $modules_basic{$_}, keys %INC);
if (@modules_extra) {
do_log(1, "extra modules loaded after daemonizing/chrooting: %s",
join(", ", sort @modules_extra));
%modules_basic = %INC;
}
if (!grep { my $v = $policy_bank{$_}{'enable_dkim_verification'};
defined(!ref $v ? $v : $$v) } keys %policy_bank)
{ do_log(0,'DKIM signature verification disabled, corresponding features '.
'not available. If not intentional, consider enabling it by setting: '.
'$enable_dkim_verification to 1, or explicitly disable it by setting '.
'it to 0 to mute this warning.');
}
# systemd, Type=notify
sd_notify(0, "READY=1", "STATUS=Initialization done.");
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
my $msg = "TROUBLE in pre_loop_hook: $eval_stat";
do_log(-2,"%s",$msg);
sd_notify(0, "STOPPING=1", "STATUS=$msg");
die("Suicide (" . am_id() . ") " . $msg . "\n");
};
1;
}
# (!)_DIE: Unable to create sub named "" at /usr/local/sbin/amavisd line 9947.
# The line 9947 was in sub write_to_log_hook: local $SIG{CHLD} = 'DEFAULT';
# perl #60360: local $SIG{FOO} = sub {...}; sets signal handler to SIG_DFL
# # http://www.perlmonks.org/?node_id=721692
# # non-atomic, clears to SIG_DFL, then sets: local $SIG{ALRM} = sub {...};
# use Sub::ScopeFinalizer qw( scope_finalizer );
# my $sentry = local_sassign $SIG{ALRM}, \&alarm_handler;
# sub local_sassign {
# my $r = \($_[0]);
# my $sentry = scope_finalizer { $$r = $_[0] } { args => [ $$r ] };
# $$r = $_[1]; return $sentry;
# }
# or use:
# use POSIX qw(:signal_h) ;
# my $sigset = POSIX::SigSet->new ;
# my $blockset = POSIX::SigSet->new( SIGALRM ) ;
# sigprocmask(SIG_BLOCK, $blockset, $sigset );
# local $SIG{ALRM} = sub .... ;
# sigprocmask(SIG_SETMASK, $sigset );
### log routine Net::Server hook
### (Sys::Syslog MUST NOT be specified as a value of 'log_file'!)
#
# Redirect Net::Server logging to use Amavis' do_log().
# The main reason is that Net::Server uses Sys::Syslog
# (and has two bugs in doing it, at least the Net-Server-0.82),
# and Amavis users are accustomed to Unix::Syslog.
#
sub write_to_log_hook {
my($self,$level,$msg) = @_;
my $prop = $self->{server};
local $SIG{CHLD} = 'DEFAULT';
$level = 0 if $level < 0; $level = 4 if $level > 4;
# my $ll = (-2,-1,0,1,3)[$level]; # 0=err, 1=warn, 2=notice, 3=info, 4=debug
my $ll = (-1, 0,1,3,4)[$level]; # 0=err, 1=warn, 2=notice, 3=info, 4=debug
chomp($msg); # just call Amavis' traditional logging
ll($ll) && do_log($ll, "Net::Server: %s", $msg);
1;
}
### user customizable Net::Server hook (Net::Server 0.88 or later),
### This hook occurs in the master process at the top of run_n_children
### which is called each time the server goes to start more child processes.
#
sub run_n_children_hook {
# do_log(5, "entered run_n_children_hook");
sd_notify(0, "STATUS=Starting child process(es), ready for work.");
Amavis::AV::sophos_savi_reload()
if $extra_code_antivirus && Amavis::AV::sophos_savi_stale();
add_entropy(Time::HiRes::gettimeofday);
}
### compatibility with patched Net::Server by SAVI patch (Net::Server <= 0.87)
#
sub parent_fork_hook { my $self = $_[0]; $self->run_n_children_hook }
### user customizable Net::Server hook,
### run by every child process during its startup
#
sub child_init_hook {
my $self = $_[0];
local $SIG{CHLD} = 'DEFAULT';
$child_init_hook_was_called = 1;
do_log(5, "entered child_init_hook");
$my_pid = $$; $0 = c('myprogram_name') . ' (virgin child)';
# DB::enable_profile(sprintf("/tmp/nytprof-amavis-%s-%d.out",
# $my_pid, int rand 1000000)) if $profiling;
stir_random();
log_capture_enabled(1) if $enable_log_capture;
# reset log counters inherited from a master process
collect_log_stats();
# my(@signames) = qw(HUP INT QUIT ILL TRAP ABRT EMT FPE KILL BUS SEGV
# SYS PIPE ALRM TERM URG TSTP CONT TTIN TTOU IO
# XCPU XFSZ VTALRM PROF WINCH INFO USR1 USR2);
# my $h = sub { my $s = $_[0]; $got_signals{$s}++;
# local($SIG{$s})='IGNORE'; kill($my_pid,$s) };
# @SIG{@signames} = ($h) x @signames;
my $inherited_entropy;
eval {
# if (defined $daemon_user && $daemon_user ne '' && ($> == 0 || $< == 0)) {
# # last resort, in case Net::Server didn't do it
# do_log(2, "child_init_hook: dropping privileges, user=%s, group=%s",
# $daemon_user,$daemon_group);
# drop_priv($daemon_user,$daemon_group);
# }
undef $db_env; undef $snmp_db; # just in case
Amavis::Timing::init(); snmp_counters_init();
close_log(); open_log(); # reopen syslog or log file to get per-process fd
if ($enable_zmq && $extra_code_zmq && @zmq_sockets) {
do_log(5, "child_init_hook: zmq socket: %s", join(', ',@zmq_sockets));
$zmq_obj = Amavis::ZMQ->new(@zmq_sockets);
if ($zmq_obj) {
sleep 1; # a crude way to avoid a "slow joiner" syndrome #***
$zmq_obj->register_proc(0,1,'');
}
}
if ($extra_code_db) {
# Berkeley DB handles should not be shared across process forks,
# each forked child should acquire its own Berkeley DB handles
$db_env = Amavis::DB->new; # get access to a bdb environment
$snmp_db = Amavis::DB::SNMP->new($db_env);
$snmp_db->register_proc(0,1,'') if $snmp_db; # alive and idle
my $var_ref = $snmp_db->read_snmp_variables('entropy');
$inherited_entropy = $var_ref->[0] if $var_ref && @$var_ref;
}
# if ($extra_code_db) { # is it worth reporting the timing? (probably not)
# section_time('bdb-open');
# do_log(2, "%s", Amavis::Timing::report()); # report elapsed times
# }
# Prepare permanent SQL dataset connection objects, does not connect yet!
# $sql_dataset_conn_lookups and $sql_dataset_conn_storage may be the
# same dataset (one connection used), or they may be separate objects,
# which will make separate connections to (same or distinct) datasets,
# possibly using different SQL engine types or servers
if ($extra_code_sql_lookup && @lookup_sql_dsn) {
$sql_dataset_conn_lookups =
Amavis::Out::SQL::Connection->new(@lookup_sql_dsn);
}
if ($extra_code_sql_log && @storage_sql_dsn) {
if (!$sql_dataset_conn_lookups || @storage_sql_dsn != @lookup_sql_dsn
|| grep($storage_sql_dsn[$_] ne $lookup_sql_dsn[$_],
(0..$#storage_sql_dsn)) )
{ # DSN differs or no SQL lookups, storage needs its own connection
$sql_dataset_conn_storage =
Amavis::Out::SQL::Connection->new(@storage_sql_dsn);
if ($sql_dataset_conn_lookups) {
do_log(2,"storage and lookups will use separate connections to SQL");
} else {
do_log(5,"only storage connections to SQL, no lookups");
}
} else { # same dataset, use the same database connection object
$sql_dataset_conn_storage = $sql_dataset_conn_lookups;
do_log(2,"storage and lookups will use the same connection to SQL");
}
}
# create storage/lookup objs to hold DBI handles and 'prepared' statements
$sql_storage = Amavis::Out::SQL::Log->new($sql_dataset_conn_storage)
if $sql_dataset_conn_storage;
$sql_lookups = Amavis::Lookup::SQL->new($sql_dataset_conn_lookups,
'sel_policy') if $sql_dataset_conn_lookups;
$sql_wblist = Amavis::Lookup::SQL->new($sql_dataset_conn_lookups,
'sel_wblist') if $sql_dataset_conn_lookups;
if ($extra_code_redis && @storage_redis_dsn) {
$redis_storage = Amavis::Redis->new(@storage_redis_dsn);
}
$spamcontrol_obj->init_child if $spamcontrol_obj;
# Amavis::Util::dump_subs();
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-2, "TROUBLE in child_init_hook: %s", $eval_stat);
die "Suicide in child_init_hook: $eval_stat\n";
};
add_entropy($inherited_entropy, Time::HiRes::gettimeofday, rand());
Amavis::Timing::go_idle('vir');
# DB::disable_profile() if $profiling;
}
### user customizable Net::Server hook
#
sub post_accept_hook {
my $self = $_[0];
local $SIG{CHLD} = 'DEFAULT';
# do_log(5, "entered post_accept_hook");
DB::enable_profile(sprintf("/tmp/nytprof-amavis-%s-%d.out",
$my_pid, int rand 1000000)) if $profiling;
if (!$child_init_hook_was_called) {
# this can happen with base Net::Server (not PreFork nor PreForkSiple)
do_log(5, "post_accept_hook: invoking child_init_hook which was skipped");
$self->child_init_hook;
}
$child_invocation_count++;
$0 = sprintf("%s (ch%d-accept)",
c('myprogram_name'), $child_invocation_count);
Amavis::Util::am_id(undef);
Amavis::Timing::go_busy('hi ');
# establish initial time right after 'accept'
Amavis::Timing::init(); snmp_counters_init();
$zmq_obj->register_proc(1,1,'A') if $zmq_obj; # enter 'accept' state
$snmp_db->register_proc(1,1,'A') if $snmp_db;
if ($child_invocation_count % 13 == 0) # every now and then
{ clear_idn_cache(); clear_query_keys_cache() }
load_policy_bank(''); # start with a builtin baseline policy bank
}
# load policy banks according to my socket (destination),
# then check for allowed access from the peer (client/source)
#
sub access_is_allowed($;$$$$) {
my($unix_socket_path, $src_addr, $src_port, $dst_addr, $dst_port) = @_;
my(@bank_names);
if (defined $unix_socket_path) {
push(@bank_names, $interface_policy{"SOCK"});
push(@bank_names, $interface_policy{$unix_socket_path});
} elsif (defined $dst_addr && defined $dst_port) {
$dst_addr = '['.lc($dst_addr).']' if $dst_addr =~ /:[0-9a-f]*:/i; # IPv6?
push(@bank_names, $interface_policy{$dst_port});
push(@bank_names, $interface_policy{"$dst_addr:$dst_port"});
}
load_policy_bank($_) for @bank_names;
# note that the new policy bank may have replaced the inet_acl access table
if (defined $unix_socket_path) {
# always permit access - unix sockets are immune to this check
} elsif (defined $src_addr) {
my($permit,$fullkey,$err) = lookup_ip_acl($src_addr,
Amavis::Lookup::Label->new('inet_acl'), ca('inet_acl'));
if ($err) {
do_log(-1, "DENIED ACCESS due to INVALID PEER IP ADDRESS %s: %s",
$src_addr, $err);
return 0;
} elsif (!$permit) {
do_log(-1, "DENIED ACCESS from IP %s, policy bank '%s'%s",
$src_addr, c('policy_bank_path'),
!defined $fullkey ? '' : ", blocked by rule $fullkey");
return 0;
}
}
1;
}
### user customizable Net::Server hook, load a by-interface policy bank;
### if this hook returns 1 the request is processed
### if this hook returns 0 the request is denied
#
sub allow_deny_hook {
my $self = $_[0];
local($1,$2,$3,$4); # Perl bug: $1 and $2 come tainted from Net::Server !
local $SIG{CHLD} = 'DEFAULT';
# do_log(5, "entered allow_deny_hook");
my $prop = $self->{server};
my $sock = $prop->{client};
my $is_ux = $sock && $sock->UNIVERSAL::can('NS_proto') &&
$sock->NS_proto eq 'UNIX';
if ($is_ux) {
my $unix_socket_path = $sock->hostpath;
$unix_socket_path = 'UNKNOWN' if !defined $unix_socket_path;
return access_is_allowed($unix_socket_path);
} else {
return access_is_allowed(undef,
$prop->{peeraddr}, $prop->{peerport},
$prop->{sockaddr}, $prop->{sockport});
}
}
### The heart of the program
### user customizable Net::Server hook
#
sub process_request {
my $self = $_[0];
local $SIG{CHLD} = 'DEFAULT';
# do_log(5, "entered process_request");
local($1,$2,$3,$4); # Perl bug: $1 and $2 come tainted from Net::Server !
my $prop = $self->{server}; my $sock = $prop->{client};
ll(3) && do_log(3, "process_request: fileno sock=%s, STDIN=%s, STDOUT=%s",
fileno($sock), fileno(STDIN), fileno(STDOUT));
# Net::Server 0.91 dups a socket to STDIN and STDOUT, which we do not want;
# it also forgets to close STDIN & STDOUT afterwards, so session remains
# open (smtp QUIT does not work), fixed in 0.92;
# Net::Server 0.92 introduced option no_client_stdout, but it
# breaks Net::Server::get_client_info by setting it, so we can't use it;
# On NetBSD closing fh STDIN (on fd0) somehow leaves fd0 still assigned to
# a socket (Net::Server 0.91) and cannot be closed even by a POSIX::close
# Let's just leave STDIN and STDOUT as they are, which works for versions
# of Net::Server 0.90 and older, is wasteful with 0.91 and 0.92, and is
# fine with 0.93.
if (ref($sock) !~ /^(?:IO::Socket::SSL|Net::Server::Proto::SSL)\z/) {
# binmode not implemented in IO::Socket::SSL and returns false
binmode($sock) or die "Can't set socket $sock to binmode: $!";
}
local $SIG{ALRM} = sub { die "timed out\n" }; # do not modify the sig text!
my $eval_stat;
eval {
# if ($] < 5.006) # Perl older than 5.6.0 did not set FD_CLOEXEC on sockets
# { cloexec($_,1,$_) for @{$prop->{sock}} }
switch_to_my_time('new request'); # timer init
if ($extra_code_ldap && !$ldap_lookups) {
# make LDAP lookup object
$ldap_connection = Amavis::LDAP::Connection->new($default_ldap);
$ldap_lookups = Amavis::Lookup::LDAP->new($default_ldap,$ldap_connection)
if $ldap_connection;
}
if ($ldap_lookups &&
$lookup_maps_imply_sql_and_ldap && !$implicit_maps_inserted) {
# make LDAP field lookup objects with incorporated field names
# fieldtype: B=boolean, N=numeric, S=string, L=list
# B-, N-, S-, L- returns undef if field does not exist
# B0: boolean, nonexistent field treated as false,
# B1: boolean, nonexistent field treated as true
my $lf = sub{Amavis::Lookup::LDAPattr->new($ldap_lookups,@_)};
unshift(@Amavis::Conf::local_domains_maps, $lf->('amavisLocal', 'B1'));
unshift(@Amavis::Conf::virus_lovers_maps, $lf->('amavisVirusLover', 'B-'));
unshift(@Amavis::Conf::spam_lovers_maps, $lf->('amavisSpamLover', 'B-'));
unshift(@Amavis::Conf::unchecked_lovers_maps, $lf->('amavisUncheckedLover', 'B-'));
unshift(@Amavis::Conf::banned_files_lovers_maps, $lf->('amavisBannedFilesLover', 'B-'));
unshift(@Amavis::Conf::bad_header_lovers_maps, $lf->('amavisBadHeaderLover', 'B-'));
unshift(@Amavis::Conf::bypass_virus_checks_maps, $lf->('amavisBypassVirusChecks', 'B-'));
unshift(@Amavis::Conf::bypass_spam_checks_maps, $lf->('amavisBypassSpamChecks', 'B-'));
unshift(@Amavis::Conf::bypass_banned_checks_maps,$lf->('amavisBypassBannedChecks', 'B-'));
unshift(@Amavis::Conf::bypass_header_checks_maps,$lf->('amavisBypassHeaderChecks', 'B-'));
unshift(@Amavis::Conf::spam_tag_level_maps, $lf->('amavisSpamTagLevel', 'N-'));
unshift(@Amavis::Conf::spam_tag2_level_maps, $lf->('amavisSpamTag2Level', 'N-'));
unshift(@Amavis::Conf::spam_tag3_level_maps, $lf->('amavisSpamTag3Level', 'N-'));
unshift(@Amavis::Conf::spam_kill_level_maps, $lf->('amavisSpamKillLevel', 'N-'));
unshift(@Amavis::Conf::spam_dsn_cutoff_level_maps,$lf->('amavisSpamDsnCutoffLevel','N-'));
unshift(@Amavis::Conf::spam_quarantine_cutoff_level_maps,$lf->('amavisSpamQuarantineCutoffLevel','N-'));
unshift(@Amavis::Conf::spam_subject_tag_maps, $lf->('amavisSpamSubjectTag', 'S-'));
unshift(@Amavis::Conf::spam_subject_tag2_maps, $lf->('amavisSpamSubjectTag2', 'S-'));
unshift(@Amavis::Conf::spam_subject_tag3_maps, $lf->('amavisSpamSubjectTag3', 'S-'));
unshift(@Amavis::Conf::virus_quarantine_to_maps, $lf->('amavisVirusQuarantineTo', 'S-'));
unshift(@Amavis::Conf::spam_quarantine_to_maps, $lf->('amavisSpamQuarantineTo', 'S-'));
unshift(@Amavis::Conf::banned_quarantine_to_maps, $lf->('amavisBannedQuarantineTo','S-'));
unshift(@Amavis::Conf::unchecked_quarantine_to_maps, $lf->('amavisUncheckedQuarantineTo','S-'));
unshift(@Amavis::Conf::bad_header_quarantine_to_maps, $lf->('amavisBadHeaderQuarantineTo', 'S-'));
unshift(@Amavis::Conf::clean_quarantine_to_maps, $lf->('amavisCleanQuarantineTo', 'S-'));
unshift(@Amavis::Conf::archive_quarantine_to_maps, $lf->('amavisArchiveQuarantineTo', 'S-'));
unshift(@Amavis::Conf::message_size_limit_maps, $lf->('amavisMessageSizeLimit', 'N-'));
unshift(@Amavis::Conf::addr_extension_virus_maps, $lf->('amavisAddrExtensionVirus', 'S-'));
unshift(@Amavis::Conf::addr_extension_spam_maps, $lf->('amavisAddrExtensionSpam', 'S-'));
unshift(@Amavis::Conf::addr_extension_banned_maps, $lf->('amavisAddrExtensionBanned','S-'));
unshift(@Amavis::Conf::addr_extension_bad_header_maps, $lf->('amavisAddrExtensionBadHeader','S-'));
unshift(@Amavis::Conf::warnvirusrecip_maps, $lf->('amavisWarnVirusRecip', 'B-'));
unshift(@Amavis::Conf::warnbannedrecip_maps, $lf->('amavisWarnBannedRecip', 'B-'));
unshift(@Amavis::Conf::warnbadhrecip_maps, $lf->('amavisWarnBadHeaderRecip', 'B-'));
unshift(@Amavis::Conf::newvirus_admin_maps, $lf->('amavisNewVirusAdmin', 'S-'));
unshift(@Amavis::Conf::virus_admin_maps, $lf->('amavisVirusAdmin', 'S-'));
unshift(@Amavis::Conf::spam_admin_maps, $lf->('amavisSpamAdmin', 'S-'));
unshift(@Amavis::Conf::banned_admin_maps, $lf->('amavisBannedAdmin', 'S-'));
unshift(@Amavis::Conf::bad_header_admin_maps, $lf->('amavisBadHeaderAdmin', 'S-'));
unshift(@Amavis::Conf::banned_filename_maps, $lf->('amavisBannedRuleNames', 'S-'));
unshift(@Amavis::Conf::disclaimer_options_bysender_maps,
$lf->('amavisDisclaimerOptions', 'S-'));
unshift(@Amavis::Conf::forward_method_maps, $lf->('amavisForwardMethod', 'S-'));
unshift(@Amavis::Conf::sa_userconf_maps, $lf->('amavisSaUserConf', 'S-'));
unshift(@Amavis::Conf::sa_username_maps, $lf->('amavisSaUserName', 'S-'));
section_time('ldap-prepare');
}
if ($sql_lookups &&
$lookup_maps_imply_sql_and_ldap && !$implicit_maps_inserted) {
# make SQL field lookup objects with incorporated field names
# fieldtype: B=boolean, N=numeric, S=string,
# B-, N-, S- returns undef if field does not exist
# B0: boolean, nonexistent field treated as false,
# B1: boolean, nonexistent field treated as true
my $nf = sub{Amavis::Lookup::SQLfield->new($sql_lookups,@_)}; # shorthand
$user_id_sql = $nf->('id', 'S-');
$user_policy_id_sql = $nf->('policy_id', 'S-');
unshift(@Amavis::Conf::local_domains_maps, $nf->('local', 'B1'));
unshift(@Amavis::Conf::virus_lovers_maps, $nf->('virus_lover', 'B-'));
unshift(@Amavis::Conf::spam_lovers_maps, $nf->('spam_lover', 'B-'));
unshift(@Amavis::Conf::unchecked_lovers_maps, $nf->('unchecked_lover', 'B-'));
unshift(@Amavis::Conf::banned_files_lovers_maps, $nf->('banned_files_lover', 'B-'));
unshift(@Amavis::Conf::bad_header_lovers_maps, $nf->('bad_header_lover', 'B-'));
unshift(@Amavis::Conf::bypass_virus_checks_maps, $nf->('bypass_virus_checks', 'B-'));
unshift(@Amavis::Conf::bypass_spam_checks_maps, $nf->('bypass_spam_checks', 'B-'));
unshift(@Amavis::Conf::bypass_banned_checks_maps, $nf->('bypass_banned_checks', 'B-'));
unshift(@Amavis::Conf::bypass_header_checks_maps, $nf->('bypass_header_checks', 'B-'));
unshift(@Amavis::Conf::spam_tag_level_maps, $nf->('spam_tag_level', 'N-'));
unshift(@Amavis::Conf::spam_tag2_level_maps, $nf->('spam_tag2_level', 'N-'));
unshift(@Amavis::Conf::spam_tag3_level_maps, $nf->('spam_tag3_level', 'N-'));
unshift(@Amavis::Conf::spam_kill_level_maps, $nf->('spam_kill_level', 'N-'));
unshift(@Amavis::Conf::spam_dsn_cutoff_level_maps,$nf->('spam_dsn_cutoff_level','N-'));
unshift(@Amavis::Conf::spam_quarantine_cutoff_level_maps,$nf->('spam_quarantine_cutoff_level','N-'));
unshift(@Amavis::Conf::spam_subject_tag_maps, $nf->('spam_subject_tag', 'S-'));
unshift(@Amavis::Conf::spam_subject_tag2_maps, $nf->('spam_subject_tag2', 'S-'));
unshift(@Amavis::Conf::spam_subject_tag3_maps, $nf->('spam_subject_tag3', 'S-'));
unshift(@Amavis::Conf::virus_quarantine_to_maps, $nf->('virus_quarantine_to', 'S-'));
unshift(@Amavis::Conf::spam_quarantine_to_maps, $nf->('spam_quarantine_to', 'S-'));
unshift(@Amavis::Conf::banned_quarantine_to_maps, $nf->('banned_quarantine_to', 'S-'));
unshift(@Amavis::Conf::unchecked_quarantine_to_maps, $nf->('unchecked_quarantine_to', 'S-'));
unshift(@Amavis::Conf::bad_header_quarantine_to_maps, $nf->('bad_header_quarantine_to','S-'));
unshift(@Amavis::Conf::clean_quarantine_to_maps, $nf->('clean_quarantine_to', 'S-'));
unshift(@Amavis::Conf::archive_quarantine_to_maps,$nf->('archive_quarantine_to','S-'));
unshift(@Amavis::Conf::message_size_limit_maps, $nf->('message_size_limit', 'N-'));
unshift(@Amavis::Conf::addr_extension_virus_maps, $nf->('addr_extension_virus', 'S-'));
unshift(@Amavis::Conf::addr_extension_spam_maps, $nf->('addr_extension_spam', 'S-'));
unshift(@Amavis::Conf::addr_extension_banned_maps,$nf->('addr_extension_banned','S-'));
unshift(@Amavis::Conf::addr_extension_bad_header_maps,$nf->('addr_extension_bad_header','S-'));
unshift(@Amavis::Conf::warnvirusrecip_maps, $nf->('warnvirusrecip', 'B-'));
unshift(@Amavis::Conf::warnbannedrecip_maps, $nf->('warnbannedrecip', 'B-'));
unshift(@Amavis::Conf::warnbadhrecip_maps, $nf->('warnbadhrecip', 'B-'));
unshift(@Amavis::Conf::newvirus_admin_maps, $nf->('newvirus_admin', 'S-'));
unshift(@Amavis::Conf::virus_admin_maps, $nf->('virus_admin', 'S-'));
unshift(@Amavis::Conf::spam_admin_maps, $nf->('spam_admin', 'S-'));
unshift(@Amavis::Conf::banned_admin_maps, $nf->('banned_admin', 'S-'));
unshift(@Amavis::Conf::bad_header_admin_maps, $nf->('bad_header_admin', 'S-'));
unshift(@Amavis::Conf::banned_filename_maps, $nf->('banned_rulenames', 'S-'));
unshift(@Amavis::Conf::disclaimer_options_bysender_maps,
$nf->('disclaimer_options', 'S-'));
unshift(@Amavis::Conf::forward_method_maps, $nf->('forward_method', 'S-'));
unshift(@Amavis::Conf::sa_userconf_maps, $nf->('sa_userconf', 'S-'));
unshift(@Amavis::Conf::sa_username_maps, $nf->('sa_username', 'S-'));
section_time('sql-prepare');
}
$implicit_maps_inserted = 1;
if (!$maps_have_been_labeled)
{ Amavis::Conf::label_default_maps(); $maps_have_been_labeled = 1 }
my $ns_proto = $sock->NS_proto; # Net::Server::Proto submodules
my $conn = Amavis::In::Connection->new; # keeps info about connection
$conn->socket_proto($ns_proto);
my $suggested_protocol = c('protocol'); # suggested by the policy bank
$suggested_protocol = '' if !defined $suggested_protocol;
do_log(5,"process_request: suggested_protocol=\"%s\" on a %s socket",
$suggested_protocol, $ns_proto);
$zmq_obj->register_proc(2,0,'b') if $zmq_obj; # begin protocol
# $snmp_db->register_proc(2,0,'b') if $snmp_db;
if ($ns_proto eq 'UNIX') {
my $path = $sock->hostpath;
$conn->socket_path($path);
# how to test: $ socat stdio unix-connect:/var/amavis/amavisd.sock,crnl
} else { # TCP, UDP, UNIXDGRAM, SSLEAY, SSL (Net::Server::Proto modules)
my $sock_addr = $prop->{sockaddr};
my $peer_addr = $prop->{peeraddr};
if ($sock_addr eq $peer_addr) { # common, small optimization
$peer_addr = $sock_addr = normalize_ip_addr($sock_addr);
} else {
$sock_addr = normalize_ip_addr($sock_addr);
$peer_addr = normalize_ip_addr($peer_addr);
}
# untaint IP addresses and port numbers, just in case
$conn->socket_port(untaint($prop->{sockport}));
$conn->client_port(untaint($prop->{peerport}));
$conn->socket_ip(untaint($sock_addr));
$conn->client_ip(untaint($peer_addr));
}
if ($suggested_protocol eq 'SMTP' || $suggested_protocol eq 'LMTP' ||
($suggested_protocol eq '' && $ns_proto =~ /^(?:TCP|SSLEAY|SSL)\z/)) {
if (!$extra_code_in_smtp) {
die "incoming TCP connection, but dynamic SMTP/LMTP code not loaded";
}
$smtp_in_obj = Amavis::In::SMTP->new if !$smtp_in_obj;
$smtp_in_obj->process_smtp_request(
$sock, ($suggested_protocol eq 'LMTP'?1:0), $conn, \&check_mail);
} elsif ($suggested_protocol eq 'AM.PDP') {
# amavis policy delegation protocol (e.g. new milter or amavisd-release)
$ampdp_in_obj = Amavis::In::AMPDP->new if !$ampdp_in_obj;
$ampdp_in_obj->process_policy_request($sock, $conn, \&check_mail, 0);
} elsif ($suggested_protocol eq 'COURIER') {
die "unavailable support for protocol: $suggested_protocol";
} elsif ($suggested_protocol eq 'QMQPqq') {
die "unavailable support for protocol: $suggested_protocol";
} elsif ($suggested_protocol eq 'TCP-LOOKUP') { #postfix maps, experimental
process_tcp_lookup_request($sock, $conn);
do_log(2, "%s", Amavis::Timing::report()); # report elapsed times
# } elsif ($suggested_protocol eq 'AM.CL') {
# # defaults to old amavis helper program protocol
# $ampdp_in_obj = Amavis::In::AMPDP->new if !$ampdp_in_obj;
# $ampdp_in_obj->process_policy_request($sock, $conn, \&check_mail, 1);
} elsif ($suggested_protocol eq '') {
die "protocol not specified, $ns_proto";
} else {
die "unsupported protocol: $suggested_protocol, $ns_proto";
}
Amavis::Out::SMTP::Session::rundown_stale_sessions(0)
if $extra_code_out_smtp;
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
alarm(0); # stop the timer
if (defined $eval_stat) {
chomp $eval_stat; my $timed_out = $eval_stat =~ /^timed out\b/;
if ($timed_out) {
my $msg = "Requesting process rundown, task exceeded allowed time";
$msg .= " during waiting for input from client" if waiting_for_client();
do_log(-1, $msg);
} else {
do_log(-2, "TROUBLE in process_request: %s", $eval_stat);
$smtp_in_obj->preserve_evidence(1) if $smtp_in_obj;
do_log(-1, "Requesting process rundown after fatal error");
}
undef $smtp_in_obj; undef $ampdp_in_obj; undef $courier_in_obj;
$self->done(1);
} elsif (defined $max_requests && $max_requests > 0 &&
$child_task_count >= $max_requests) {
# in case of multiple-transaction protocols (e.g. SMTP, LMTP)
# we do not like to keep running indefinitely at the mercy of MTA
do_log(2, "Requesting process rundown after %d tasks (and %s sessions)",
$child_task_count, $child_invocation_count);
undef $smtp_in_obj; undef $ampdp_in_obj; undef $courier_in_obj;
$self->done(1);
} elsif ($extra_code_antivirus && Amavis::AV::sophos_savi_stale() ) {
do_log(0, "Requesting process rundown due to stale Sophos virus data");
undef $smtp_in_obj; undef $ampdp_in_obj; undef $courier_in_obj;
$self->done(1);
}
my(@modules_extra) = grep(!exists $modules_basic{$_}, keys %INC);
# do_log(2, "modules loaded: %s", join(", ", sort keys %modules_basic));
if (@modules_extra) {
do_log(1, "extra modules loaded: %s", join(", ", sort @modules_extra));
%modules_basic = %INC;
}
ll(5) && do_log(5, 'exiting process_request');
}
sub child_goes_idle($) {
my $where = $_[0];
do_log(5, 'child_goes_idle (%s)', $where);
my(@disconnected_what);
# $extra_code_out_smtp && eval {
# Amavis::Out::SMTP::Session::rundown_stale_sessions(1) &&
# push(@disconnected_what,'SMTP');
# };
$sql_dataset_conn_storage && eval {
$sql_dataset_conn_storage->disconnect_from_sql &&
push(@disconnected_what,'SQL-storage');
};
$sql_dataset_conn_lookups && eval {
# $sql_dataset_conn_lookups possibly the same as $sql_dataset_conn_storage,
# attempting to disconnect twice does no harm
$sql_dataset_conn_lookups->disconnect_from_sql &&
push(@disconnected_what,'SQL-lookup');
};
$ldap_connection && eval {
$ldap_connection->disconnect_from_ldap &&
push(@disconnected_what,'LDAP');
};
do_log(5, 'child_goes_idle: disconnected %s (%s)',
!@disconnected_what ? 'none' : join(', ',@disconnected_what),
$where);
}
### After processing of a request, but before client connection has been closed
### user customizable Net::Server hook
#
sub post_process_request_hook {
my $self = $_[0];
my $prop = $self->{server}; my $sock = $prop->{client};
local $SIG{CHLD} = 'DEFAULT';
# do_log(5, "entered post_process_request_hook");
alarm(0); # stop the timer
child_goes_idle('post_process_request') if !$database_sessions_persistent;
debug_oneshot(0);
$0 = sprintf("%s (ch%d-avail)",
c('myprogram_name'), $child_invocation_count);
$zmq_obj->register_proc(1,0,'') if $zmq_obj; # alive and idle again
$snmp_db->register_proc(1,0,'') if $snmp_db;
Amavis::Timing::go_idle('bye');
if (ll(3)) {
my $load_report = Amavis::Timing::report_load();
do_log(3,$load_report) if defined $load_report;
}
dump_captured_log(1, c('enable_log_capture_dump'));
# workaround: Net::Server 0.91 forgets to disconnect session
if (Net::Server->VERSION == 0.91) { close STDIN; close STDOUT }
# DB::disable_profile() if $profiling;
DB::finish_profile() if $profiling;
}
### Child is about to be terminated
### user customizable Net::Server hook
#
sub child_finish_hook {
my $self = $_[0];
local $SIG{CHLD} = 'DEFAULT';
# do_log_safe(5, "entered child_finish_hook");
# for my $m (sort map { s/\.pm\z//; s[/][::]g; $_ } grep(/\.pm\z/, keys %INC)){
# do_log(0, "Module %-19s %s", $m, $m->VERSION || '?')
# if grep($m=~/^$_/, qw(Mail::ClamAV Mail::SpamAssassin Razor2 Net::DNS));
# }
child_goes_idle('child finishing');
$spamcontrol_obj->rundown_child if $spamcontrol_obj;
$0 = sprintf("%s (ch%d-finish)",
c('myprogram_name'), $child_invocation_count);
do_log_safe(5,"child_finish_hook: invoking DESTROY methods");
undef $smtp_in_obj; undef $ampdp_in_obj; undef $courier_in_obj;
undef $sql_storage; undef $sql_wblist; undef $sql_lookups;
undef $sql_dataset_conn_lookups; undef $sql_dataset_conn_storage;
undef $ldap_lookups; undef $ldap_connection; undef $redis_storage;
# unregister our process
if ($zmq_obj) {
eval { $zmq_obj->register_proc(0,0,undef); 1; }
or do_log_safe(-1, "child_finish_hook: ZMQ unregistering failed: %s",$@);
}
if ($snmp_db) {
eval { $snmp_db->register_proc(0,0,undef); 1; }
or do_log_safe(-1, "child_finish_hook: DB unregistering failed: %s",$@);
}
undef $snmp_db; undef $db_env; undef $zmq_obj;
log_capture_enabled(0);
}
### user customizable Net::Server hook,
### hook occurs in the main process before the server begins shutting down
#
sub pre_server_close_hook {
sd_notify(0, "STOPPING=1",
"STATUS=Server rundown, notifying child processes.");
}
### user customizable Net::Server hook,
### hook occurs in the main process after child proceses have been shut down
#
sub post_child_cleanup_hook {
sd_notify(0, "STATUS=Child processes have been stopped.");
}
### user customizable Net::Server hook,
### hook occurs in the main process if a server has received a HUP signal.
### It occurs just before restarting the server via exec.
#
sub restart_close_hook {
sd_notify(0, "RELOADING=1",
"STATUS=Reloading server, about to re-exec the program.");
}
### user customizable Net::Server hook,
### hook occurs in the main process if a server has been restarted via the HUP
### signal and re-exec'd. It occurs just before reopening to the filenos of
### the sockets that were already opened.
#
sub restart_open_hook {
sd_notify(0, "STATUS=Warm restart, re-binding sockets.");
}
sub END { # runs before exiting the module
local($@,$!);
# do_log_safe(5,"at the END handler: invoking DESTROY methods");
undef $smtp_in_obj; undef $ampdp_in_obj; undef $courier_in_obj;
undef $sql_storage; undef $sql_wblist; undef $sql_lookups;
undef $sql_dataset_conn_lookups; undef $sql_dataset_conn_storage;
undef $ldap_lookups; undef $ldap_connection; undef $redis_storage;
# unregister our process
if ($zmq_obj) {
eval { $zmq_obj->register_proc(0,0,undef); 1; }
or do_log_safe(-1, "Amavis::END: ZMQ unregistering failed: %s", $@);
}
if ($snmp_db) {
eval { $snmp_db->register_proc(0,0,undef); 1; }
or do_log_safe(-1, "Amavis::END: DB unregistering failed: %s", $@);
}
undef $snmp_db; undef $db_env; undef $zmq_obj;
log_capture_enabled(0);
}
# implements Postfix TCP lookup server, see tcp_table(5) man page; experimental
#
sub process_tcp_lookup_request($$) {
my($sock, $conn) = @_;
local($/) = "\012"; # set line terminator to LF (regardless of platform)
my $req_cnt; my $ln;
for ($! = 0; defined($ln=$sock->getline); $! = 0) {
$req_cnt++; my $level = 0; local($1);
my($resp_code, $resp_msg) = (400, 'INTERNAL ERROR');
if ($ln =~ /^get (.*?)\015?\012\z/si) {
my $key = proto_decode($1);
my $sl = lookup2(0,$key, ca('spam_lovers_maps'));
$resp_code = 200; $level = 2;
$resp_msg = $sl ? "OK Recipient <$key> IS spam lover"
: "DUNNO Recipient <$key> is NOT spam lover";
} elsif ($ln =~ /^put ([^ ]*) (.*?)\015?\012\z/si) {
$resp_code = 500; $resp_msg = 'request not implemented: ' . $ln;
} else {
$resp_code = 500; $resp_msg = 'illegal request: ' . $ln;
}
do_log($level, "tcp_lookup(%s): %s %s", $req_cnt,$resp_code,$resp_msg);
$sock->printf("%03d %s\012", $resp_code, tcp_lookup_encode($resp_msg))
or die "Can't write to tcp_lookup socket: $!";
}
defined $ln || $! == 0 or die "Error reading from socket: $!";
do_log(0, "tcp_lookup: RUNDOWN after %d requests", $req_cnt);
}
sub tcp_lookup_encode($) {
my $str = $_[0]; local($1);
$str =~ s/([^\041-\044\046-\176])/sprintf("%%%02x",ord($1))/gse;
$str;
}
sub check_mail_begin_task() {
# The check_mail_begin_task (and check_mail) may be called several times
# per child lifetime and/or per-SMTP session. The variable $child_task_count
# is mainly used by AV-scanner interfaces, e.g. to initialize when invoked
# for the first time during child process lifetime
$child_task_count++;
do_log(4, "check_mail_begin_task: task_count=%d", $child_task_count);
# comment out to retain SQL/LDAP cache entries for the whole child lifetime:
$sql_wblist->clear_cache if $sql_wblist;
$sql_lookups->clear_cache if $sql_lookups;
$ldap_lookups->clear_cache if $ldap_lookups;
# reset certain global variables for each task
undef $av_output; @detecting_scanners = (); @av_scanners_results = ();
@virusname = (); @bad_headers = ();
$banned_filename_any = $banned_filename_all = 0;
undef $MSGINFO; undef $report_ref;
}
# create a mail_id unique to a database and save preliminary info to SQL;
# if SQL is not enabled, just call a plain generate_mail_id() once
#
sub generate_unique_mail_id($) {
my $msginfo = $_[0];
my($mail_id,$secret_id);
for (my $attempt = 5; ;) { # sanity limit on retries
($mail_id,$secret_id) = generate_mail_id();
$msginfo->secret_id($secret_id);
$secret_id = 'X' x length($secret_id); # can't hurt to wipe out
$msginfo->mail_id($mail_id); # assign a long-term unique id to the msg
my $is_unique = 1;
# don't bother to save info on incoming messages - saves Redis storage
# while still offering necessary data for a penpals function
if ($redis_storage && $msginfo->originating) {
# attempt to save a message placeholder to Redis, ensuring it is unique
eval {
$redis_storage->save_info_preliminary($msginfo) or ($is_unique=0);
1;
} or do {
chomp $@;
do_log(-1, 'storing preliminary info to redis failed: %s', $@);
};
}
if ($is_unique && $sql_storage) {
# attempt to save a message placeholder to SQL, ensuring it is unique
$sql_storage->save_info_preliminary($msginfo) or ($is_unique=0);
}
last if $is_unique;
if (--$attempt <= 0) {
do_log(-2,'too many retries on storing preliminary, info not saved');
last;
} else {
snmp_count('GenMailIdRetries');
do_log(2,'retrying storing preliminary, %d attempts remain', $attempt);
sleep(int(1+rand(3)));
add_entropy(Time::HiRes::gettimeofday, $attempt);
}
}
$mail_id;
}
sub extract_info_from_received_trace($) {
my($msginfo) = @_;
my(@trace);
for (my $j=0; ; $j++) { # walk through Received header fields, top-down
my $r = $msginfo->get_header_field_body('received',$j);
last if !defined $r;
my $fields_ref = parse_received($r);
my $ip = fish_out_ip_from_received($r,$fields_ref); # possibly undef
$ip = normalize_ip_addr($ip) if defined $ip;
push(@trace, { ip => $ip, %$fields_ref });
}
\@trace;
}
# Collects some information derived from the envelope and the message,
# do some common lookups, storing the information into a $msginfo object
# to make commonly used information quickly and readily available to the
# rest of the program, e.g. avoiding a need for repeated lookups or parsing
# of the same attribute
#
sub collect_some_info($) {
my $msginfo = $_[0];
my $partition_tag = c('partition_tag');
$partition_tag = &$partition_tag($msginfo) if ref $partition_tag eq 'CODE';
$partition_tag = 0 if !defined $partition_tag;
$msginfo->partition_tag($partition_tag);
my $sender = $msginfo->sender;
$msginfo->sender_source($sender);
# obtain RFC 5322 From and Sender from the mail header section, parsed/clean
my $rfc2822_sender = $msginfo->get_header_field_body('sender');
my $rfc2822_from_field = $msginfo->get_header_field_body('from');
my(@rfc2822_from); # RFC 5322 (ex RFC 2822) allows multiple author's addr
local($1);
if (defined $rfc2822_sender) {
my(@sender_parsed) = map(unquote_rfc2821_local($_),
parse_address_list($rfc2822_sender));
$rfc2822_sender = !@sender_parsed ? '' : $sender_parsed[0]; # none or one
$msginfo->rfc2822_sender($rfc2822_sender);
}
if (defined $rfc2822_from_field) {
@rfc2822_from = map(unquote_rfc2821_local($_),
parse_address_list($rfc2822_from_field));
# rfc2822_from is a ref to a list when there are multiple author addresses!
$msginfo->rfc2822_from(!@rfc2822_from ? undef :
@rfc2822_from < 2 ? $rfc2822_from[0]
: \@rfc2822_from);
}
my $rfc2822_to = $msginfo->get_header_field_body('to');
if (defined $rfc2822_to) {
my(@to_parsed) = map(unquote_rfc2821_local($_),
parse_address_list($rfc2822_to));
$msginfo->rfc2822_to(@to_parsed<2 ? $to_parsed[0] : \@to_parsed);
}
my $rfc2822_cc = $msginfo->get_header_field_body('cc');
if (defined $rfc2822_cc) {
my(@cc_parsed) = map(unquote_rfc2821_local($_),
parse_address_list($rfc2822_cc));
$msginfo->rfc2822_cc(@cc_parsed<2 ? $cc_parsed[0] : \@cc_parsed);
}
my(@rfc2822_resent_from, @rfc2822_resent_sender);
if (defined $msginfo->get_header_field2('resent-from') ||
defined $msginfo->get_header_field2('resent-sender')) { # triage
# Each Resent block should have exactly one Resent-From, and none or one
# Resent-Sender address. A HACK: undef in each list is used to separate
# addresses obtained from different resent blocks, for the benefit of
# those interested in traversing them block by block (e.g. when choosing
# a DKIM signing key). The RFC 5322 section 3.6.6 says: All of the resent
# fields corresponding to a particular resending of the message SHOULD be
# grouped together.
my(@r_from, @r_sender); local($1);
for (my $j = 0; ; $j++) { # traverse header section by fields, top-down
my($f_i,$f) = $msginfo->get_header_field2(undef,$j);
if ( @r_from && (
!defined($f) || # end of a header section
$f !~ /^Resent-/si || # presumably end of a resent block
$f =~ /^Resent-From\s*:/si || # another Resent-From encountered
$f =~ /^Resent-Sender\s*:/si && @r_sender # another Resent-Sender
) ) { # end of a current resent block
# a hack: undef in a list is used to separate addresses
# from different resent blocks
push(@rfc2822_resent_from, undef, @r_from); @r_from = ();
push(@rfc2822_resent_sender, undef, @r_sender); @r_sender = ();
}
last if !defined $f;
if ($f =~ /^Resent-From\s*:(.*)\z/si) {
push(@r_from, map(unquote_rfc2821_local($_), parse_address_list($1)));
} elsif ($f =~ /^Resent-Sender\s*:(.*)\z/si) {
# multiple Resent-Sender in a block are illegal, store them all anyway
push(@r_sender,map(unquote_rfc2821_local($_), parse_address_list($1)));
}
}
if (@r_from || @r_sender) { # any leftovers not forming a resent block?
push(@rfc2822_resent_from, undef, @r_from);
push(@rfc2822_resent_sender, undef, @r_sender);
}
shift(@rfc2822_resent_from) if @rfc2822_resent_from; # remove undef
shift(@rfc2822_resent_sender) if @rfc2822_resent_sender; # remove undef
# rfc2822_resent_from and rfc2822_resent_sender are listrefs (or undef)
$msginfo->rfc2822_resent_from(\@rfc2822_resent_from)
if @rfc2822_resent_from;
$msginfo->rfc2822_resent_sender(\@rfc2822_resent_sender)
if @rfc2822_resent_sender;
}
my $refs_in_reply_to = $msginfo->get_header_field_body('in-reply-to');
my $refs_references = $msginfo->get_header_field_body('references');
my(@refs) = grep(defined $_, $refs_in_reply_to, $refs_references);
@refs = parse_message_id(join(' ',@refs)) if @refs;
do_log(4, 'references: %s', join(', ',@refs)) if @refs;
$msginfo->references(\@refs);
my $mail_size = $msginfo->msg_size; # use corrected ESMTP size if avail.
if (!defined($mail_size) || $mail_size <= 0) { # not yet known?
$mail_size = $msginfo->orig_header_size + $msginfo->orig_body_size;
$msginfo->msg_size($mail_size); # store back
do_log(4,"message size unknown, size set to %d", $mail_size);
}
my $trace_ref = extract_info_from_received_trace($msginfo);
my $cl_ip = $msginfo->client_addr;
if (defined $cl_ip) {
my $last_hop = $trace_ref->[0];
my $last_hop_ip = $last_hop && $last_hop->{ip};
if (!defined $last_hop_ip || lc($cl_ip) ne lc($last_hop_ip)) { # milter?
do_log(5,"prepending client's IP address to trace: %s", $cl_ip);
unshift(@$trace_ref, {
ip => $msginfo->client_addr,
port => $msginfo->client_port,
with => $msginfo->client_proto,
});
} elsif ($last_hop->{ip} && !$last_hop->{port}) {
# add a missing information, not available in a Received trace
$last_hop->{port} = $msginfo->client_port;
}
}
{ # add the last hop (ours, currently underway) to the trace
my $conn = $msginfo->conn_obj; # the connection between MTA and amavisd
my $recips = $msginfo->recips;
my $myhelo = c('localhost_name'); # my EHLO/HELO/LHLO name, UTF-8 octets
$myhelo = 'localhost' if $myhelo eq '';
$myhelo = $msginfo->smtputf8 ? idn_to_utf8($myhelo) : idn_to_ascii($myhelo);
unshift(@$trace_ref, {
ip => $conn->client_ip,
port => $conn->client_port,
from => $conn->smtp_helo,
by => $myhelo,
with => $conn->appl_proto,
# id => $msginfo->mail_id, # not yet known
$recips && @$recips==1 ? (for => qquote_rfc2821_local(@$recips)) : (),
# ";" => rfc2822_timestamp($msginfo->rx_time), # not needed
});
}
my(@ip_trace_public);
for my $hop (@$trace_ref) {
next if !$hop;
my $ip = $hop->{ip};
if ($ip) {
my($public,$key,$err) = lookup_ip_acl($ip, @public_networks_maps);
if ($public && !$err) { $hop->{public} = 1; push(@ip_trace_public,$ip) }
}
my $with = $hop->{with};
$hop->{with} = $with if defined $with && $with =~ tr/A-Za-z0-9.+-/_/c;
}
$msginfo->trace($trace_ref);
$msginfo->ip_addr_trace_public(\@ip_trace_public);
# ll(5) && do_log(5, "trace: %s", Amavis::JSON::encode($trace_ref));
ll(3) && do_log(3, "trace: %s",
join(' < ', map( (!$_->{with} ? '' : $_->{with}.'://') .
(!$_->{ip} ? 'x' : !$_->{port} ? $_->{ip}
: '['.$_->{ip}.']:'.$_->{port}), @$trace_ref ) ));
# check for mailing lists, bulk mail and auto-responses
my $is_mlist; # mail from a mailing list
my $is_auto; # bounce, auto-response, challenge-response, ...
my $is_bulk; # bulk mail or $is_mlist or $is_auto
if (defined $msginfo->get_header_field2('list-id')) { # RFC 2919
$is_mlist = $msginfo->get_header_field_body('list-id');
} elsif (defined $msginfo->get_header_field2('list-post')) {
$is_mlist = $msginfo->get_header_field_body('list-post');
} elsif (defined $msginfo->get_header_field2('list-unsubscribe')) {
$is_mlist = $msginfo->get_header_field_body('list-unsubscribe');
} elsif (defined $msginfo->get_header_field2('mailing-list')) {
$is_mlist = $msginfo->get_header_field_body('mailing-list'); # non-std.
} elsif ($sender =~ /^ (?: [^\@]+ -(?:request|bounces|owner|admin) |
owner- [^\@]+ ) (?: \@ | \z )/xsi) {
$is_mlist = 'sender=' . $sender;
} elsif ($rfc2822_from[0] =~ /^ (?: [^\@]+ -(?:request|bounces|owner) |
owner- [^\@]+ ) (?: \@ | \z )/xsi) {
$is_mlist = 'From:' . $rfc2822_from[0];
}
if (defined $is_mlist) { # sanitize a bit
local($1); $is_mlist = $1 if $is_mlist =~ / < (.*) > [^>]* \z/xs;
$is_mlist =~ s/\s+/ /g; $is_mlist =~ s/^ //; $is_mlist =~ s/ \z//;
$is_mlist =~ s/^mailto://i;
$is_mlist = 'ml:' . $is_mlist;
}
if (defined $msginfo->get_header_field2('precedence')) {
my $prec = $msginfo->get_header_field_body('precedence');
$prec =~ s/^[ \t]+//; local($1);
$is_mlist = $1 if !defined($is_mlist) && $prec =~ /^(list)/si;
$is_auto = $1 if $prec =~ /^(auto.?reply)\b/si;
$is_bulk = $1 if $prec =~ /^(bulk|junk)\b/si;
}
if (defined $is_auto) {
# already set
} elsif (defined $msginfo->get_header_field2('auto-submitted')) {
my $auto = $msginfo->get_header_field_body('auto-submitted');
$auto =~ s/ \( [^)]* \) //gx; $auto =~ s/^[ \t]+//; $auto =~ s/[ \t]+\z//;
$is_auto = 'Auto-Submitted:' . $auto if lc($auto) ne 'no';
} elsif ($sender eq '') {
$is_auto = 'sender=<>';
} elsif ($sender =~
/^ (?: mailer-daemon|double-bounce|mailer|autoreply )
(?: \@ | \z )/xsi) {
# 'postmaster' is also common, but a bit risky
$is_auto = 'sender=' . $sender;
} elsif ($rfc2822_from[0] =~ # just checks the first author, good enough
/^ (?: mailer-daemon|double-bounce|mailer|autoreply )
(?: \@ | \z )/xsi) {
$is_auto = 'From:' . $rfc2822_from[0];
}
if (defined $is_mlist) {
$is_bulk = $is_mlist;
} elsif (defined $is_auto) {
$is_bulk = $is_auto;
} elsif (defined $is_bulk) {
# already set
} elsif ($rfc2822_from[0] =~ # just checks the first author, good enough
/^ (?: [^\@]+ -relay | postmaster | uucp ) (?: \@ | \z )/xsi) {
$is_bulk = 'From:' . $rfc2822_from[0];
}
$is_mlist = 1 if defined $is_mlist && !$is_mlist; # make sure it is true
$is_auto = 1 if defined $is_auto && !$is_auto; # make sure it is true
$is_bulk = 1 if defined $is_bulk && !$is_bulk; # make sure it is true
$msginfo->is_mlist($is_mlist) if $is_mlist;
$msginfo->is_auto($is_auto) if $is_auto;
$msginfo->is_bulk($is_bulk) if $is_bulk;
# now that we have a parsed From, check if we have a valid
# author domain signature and do other DKIM pre-processing
if (c('enable_dkim_verification')) {
Amavis::DKIM::collect_some_dkim_info($msginfo);
}
if ($sender ne '') { # provide some initial default for sender_credible
my(@cred) = ( $msginfo->originating ? 'orig' : (),
$msginfo->dkim_envsender_sig ? 'dkim' : () );
$msginfo->sender_credible(join(',',@cred)) if @cred;
}
}
# Checks the message stored on a file. File must already
# be open on file handle $msginfo->mail_text; it need not be positioned
# properly, check_mail must not close the file handle.
# Alternatively, the $msginfo->mail_text can be a ref to a string
# containing an entire message - suitable for short messages.
#
sub check_mail($$) {
my($msginfo, $dsn_per_recip_capable) = @_;
my $which_section = 'check_init';
my $t0_sect;
my $elapsed = {}; $msginfo->time_elapsed($elapsed);
$elapsed->{'TimeElapsedReceiving'} = Time::HiRes::time - $msginfo->rx_time;
my $point_of_no_return = 0; # past the point where mail or DSN was sent
my $mail_id = $msginfo->mail_id; # typically undef at this stage
my $am_id = $msginfo->log_id;
my $conn = $msginfo->conn_obj;
if (!defined($am_id)) { $am_id = am_id(); $msginfo->log_id($am_id) }
$zmq_obj->register_proc(1,0,'=',$am_id) if $zmq_obj; # check begins
$snmp_db->register_proc(1,0,'=',$am_id) if $snmp_db;
my($smtp_resp, $exit_code, $preserve_evidence);
my $custom_object;
my $hold; # set to some string causes the message to be placed on hold
# (frozen) by MTA (if configured to understand the inserted
# header field). This can be used in cases when we stumble
# across some permanent problem making us unable to decide
# if the message is to be really delivered.
# is any mail component password protected or otherwise non-decodable?
my $any_undecipherable = 0;
my $mime_err; # undef, or MIME parsing error string as given by MIME::Parser
if (defined $last_task_completed_at) {
my $dt = $msginfo->rx_time - $last_task_completed_at;
do_log(3,"smtp connection cache, dt: %.1f, state: %d",
$dt, $smtp_connection_cache_enable);
if (!$smtp_connection_cache_on_demand) {}
elsif (!$smtp_connection_cache_enable && $dt < 5) {
do_log(3,"smtp connection cache, dt: %.1f -> enabling", $dt);
$smtp_connection_cache_enable = 1;
} elsif ($smtp_connection_cache_enable && $dt >= 15) {
do_log(3,"smtp connection cache, dt: %.1f -> disabling", $dt);
$smtp_connection_cache_enable = 0;
}
}
# ugly - save in a global to make it accessible to %builtins
$MSGINFO = $msginfo;
eval {
$msginfo->checks_performed({}) if !$msginfo->checks_performed;
$msginfo->add_contents_category(CC_CLEAN,0); # CC_CLEAN is always present
$_->add_contents_category(CC_CLEAN,0) for @{$msginfo->per_recip_data};
$msginfo->header_edits(Amavis::Out::EditHeader->new);
add_entropy(Time::HiRes::gettimeofday, $child_task_count, $am_id,
$msginfo->queue_id, $msginfo->mail_text_fn, $msginfo->sender);
section_time($which_section);
$which_section = 'check_init2';
{ my $cwd = $msginfo->mail_tempdir;
if (!defined $cwd || $cwd eq '') { $cwd = $TEMPBASE }
chdir($cwd) or die "Can't chdir to $cwd: $!";
}
# compute body digest, measure mail size, check for 8-bit data, get entropy
get_body_digest($msginfo, c('mail_digest_algorithm'));
$which_section = 'collect_info';
collect_some_info($msginfo);
if (!defined($msginfo->client_addr)) { # fetch missing IP addr from header
my $trace_ref = $msginfo->trace; # 'Received' trace info, top-down
for my $hop ($trace_ref ? @$trace_ref : ()) {
my $ip = $hop && $hop->{ip};
if (defined $ip && $ip ne '') {
do_log(3,"client IP address unknown, fetched from Received: %s",$ip);
$msginfo->client_addr($ip); last;
}
}
}
section_time($which_section);
$which_section = 'check_init4';
my $mail_size = $msginfo->msg_size; # use corrected ESMTP size
my $file_generator_object = # maxfiles 0 disables the $MAXFILES limit
Amavis::Unpackers::NewFilename->new($MAXFILES?$MAXFILES:undef,$mail_size);
Amavis::Unpackers::Part::init($file_generator_object); # fudge: keep in var
my $parts_root = Amavis::Unpackers::Part->new;
$msginfo->parts_root($parts_root);
# section_time($which_section);
if (!defined $mail_id && ($sql_store_info_for_all_msgs || !$sql_storage)) {
$which_section = 'reg_proc';
$zmq_obj->register_proc(2,0,'G',$am_id) if $zmq_obj;
$snmp_db->register_proc(2,0,'G',$am_id) if $snmp_db;
# section_time($which_section);
$which_section = 'gen_mail_id';
# create a mail_id unique to a database and save preliminary info to SQL
generate_unique_mail_id($msginfo);
$mail_id = $msginfo->mail_id;
section_time($which_section) if $sql_storage; # || $redis_storage
}
$which_section = "custom-new";
eval {
my $old_orig = c('originating');
# may load policy banks
$custom_object = Amavis::Custom->new($conn,$msginfo);
my $new_orig = c('originating'); # may have changed by a pol. bank load
$msginfo->originating($new_orig) if ($old_orig?1:0) != ($new_orig?1:0);
update_current_log_level(); 1;
} or do {
undef $custom_object;
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"custom new err: %s", $eval_stat);
};
if (ref $custom_object) {
do_log(5,"Custom hooks enabled"); section_time($which_section);
}
if ($redis_storage && c('enable_ip_repu')) {
$which_section = 'redis_ip_repu';
my($score, $worst_ip) =
$redis_storage->query_and_update_ip_reputation($msginfo);
if ($score && $score >= 0.5) {
$msginfo->ip_repu_score($score);
my $spam_test = sprintf('AM.IP_BAD_%s=%.1f', $worst_ip, $score);
for my $r (@{$msginfo->per_recip_data}) {
$r->spam_level( ($r->spam_level || 0) + $score);
$r->spam_tests([]) if !$r->spam_tests;
unshift(@{$r->spam_tests}, \$spam_test);
}
}
section_time($which_section);
}
my $cl_ip = $msginfo->client_addr;
my($os_fingerprint_obj,$os_fingerprint);
my $os_fingerprint_method = c('os_fingerprint_method');
if (!defined($os_fingerprint_method) || $os_fingerprint_method eq '') {
# no fingerprinting service configured
} elsif ($cl_ip eq '' || $cl_ip eq '0.0.0.0' || $cl_ip eq '::') {
# original client IP address not available, can't query p0f
} else { # launch a query
$which_section = "os_fingerprint";
my $dst = c('os_fingerprint_dst_ip_and_port');
my($dst_ip,$dst_port); local($1,$2,$3);
($dst_ip,$dst_port) = ($1.$2, $3) if defined($dst) &&
$dst =~ m{^(?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) }six;
$os_fingerprint_obj = Amavis::OS_Fingerprint->new(
untaint(dynamic_destination($os_fingerprint_method,$conn)),
0.050, $cl_ip, $msginfo->client_port, $dst_ip, $dst_port,
defined $mail_id ? $mail_id : sprintf("%08x",rand(0x7fffffff)) );
}
my $sender = $msginfo->sender;
my(@recips) = map($_->recip_addr, @{$msginfo->per_recip_data});
my $rfc2822_sender = $msginfo->rfc2822_sender;
my $fm = $msginfo->rfc2822_from;
my(@rfc2822_from) = !defined($fm) ? () : ref $fm ? @$fm : $fm;
$mail_size = $msginfo->msg_size; # refresh after custom hook, just in case
add_entropy("$cl_ip $mail_size $sender", \@recips);
if (ll(1)) {
my $pbn = c('policy_bank_path');
ll(1) && do_log(1,"Checking: %s %s%s%s -> %s", $mail_id||'',
$pbn eq '' ? '' : "$pbn ", $cl_ip eq '' ? '' : "[$cl_ip] ",
qquote_rfc2821_local($sender),
join(',', qquote_rfc2821_local(@recips)) );
}
if (ll(3)) {
my $envsender = qquote_rfc2821_local($sender);
my $hdrsender = qquote_rfc2821_local($rfc2822_sender),
my $hdrfrom = qquote_rfc2821_local(@rfc2822_from);
do_log(3,"2822.From: %s%s%s",
@rfc2822_from==1 ? $hdrfrom
: sprintf("%d:[%s]", scalar @rfc2822_from, $hdrfrom),
!defined($rfc2822_sender) ? '' : ", 2822.Sender: $hdrsender",
defined $rfc2822_sender && $envsender eq $hdrsender ? ''
: $envsender eq $hdrfrom ? '' : ", 2821.Mail_From: $envsender");
}
my $cnt_local = 0; my $cnt_remote = 0;
for my $r (@{$msginfo->per_recip_data}) {
my $recip = $r->recip_addr;
my $is_local = lookup2(0,$recip, ca('local_domains_maps'));
$is_local ? $cnt_local++ : $cnt_remote++;
$r->recip_is_local($is_local ? 1 : 0); # canonical boolean, untainted
if (!defined($r->bypass_virus_checks)) {
my $bypassed_v = lookup2(0,$recip, ca('bypass_virus_checks_maps'));
$r->bypass_virus_checks($bypassed_v);
}
if (!defined($r->bypass_banned_checks)) {
my $bypassed_b = lookup2(0,$recip, ca('bypass_banned_checks_maps'));
$r->bypass_banned_checks($bypassed_b);
}
if (!defined($r->bypass_spam_checks)) {
my $bypassed_s = lookup2(0,$recip, ca('bypass_spam_checks_maps'));
$r->bypass_spam_checks($bypassed_s);
}
if (defined $user_id_sql) {
my($user_id_ref,$mk_ref) = # list of all id's that match
lookup2(1, $recip, [$user_id_sql], Label=>"users.id");
$r->user_id($user_id_ref) if ref $user_id_ref; # listref or undef
}
if (defined $user_policy_id_sql) {
my $user_policy_id = lookup2(0, $recip, [$user_policy_id_sql],
Label=>"users.policy_id");
$r->user_policy_id($user_policy_id); # just the first match
}
}
# update message count and message size snmp counters
# orig local
# 0 0 InMsgsOpenRelay
# 0 1 InMsgsInbound
# 0 x (non-originating: inbound or open relay)
# 1 0 InMsgsOutbound
# 1 1 InMsgsInternal
# 1 x InMsgsOriginating (outbound or internal)
# x 0 (departing: outbound or open relay)
# x 1 (local: inbound or internal)
# x x InMsgs
snmp_count('InMsgs');
snmp_count('InMsgsBounceNullRPath') if $sender eq '';
snmp_count( ['InMsgsRecips', $cnt_local+$cnt_remote]); # recipients count
snmp_count( ['InMsgsSize', $mail_size, 'C64'] );
if ($msginfo->originating) {
snmp_count('InMsgsOriginating');
snmp_count( ['InMsgsRecipsOriginating', $cnt_local+$cnt_remote]);
snmp_count( ['InMsgsSizeOriginating', $mail_size, 'C64'] );
}
if ($cnt_local > 0) {
my $d = $msginfo->originating ? 'Internal' : 'Inbound';
snmp_count('InMsgs'.$d);
snmp_count( ['InMsgsRecips'.$d, $cnt_local]);
snmp_count( ['InMsgsRecipsLocal', $cnt_local]);
snmp_count( ['InMsgsSize'.$d, $mail_size, 'C64'] );
}
if ($cnt_remote > 0) {
my $d = $msginfo->originating ? 'Outbound' : 'OpenRelay';
snmp_count('InMsgs'.$d);
snmp_count( ['InMsgsRecips'.$d, $cnt_remote]);
snmp_count( ['InMsgsSize'.$d, $mail_size, 'C64'] );
if (!$msginfo->originating) {
do_log(1,'Open relay? Nonlocal recips but not originating: %s',
join(', ', map($_->recip_addr,
grep(!$_->recip_is_local, @{$msginfo->per_recip_data}))));
}
}
# mkdir can be a costly operation (must be atomic, flushes buffers).
# If we can re-use directory 'parts' from the previous invocation it saves
# us precious time. Together with matching rmdir this can amount to 10-15 %
# of total elapsed time on some traditional file systems (no spam checking)
$which_section = "creating_partsdir";
{ my $tempdir = $msginfo->mail_tempdir;
my $errn = lstat("$tempdir/parts") ? 0 : 0+$!;
if ($errn == ENOENT) { # needs to be created
mkdir("$tempdir/parts", 0750)
or die "Can't create directory $tempdir/parts: $!";
section_time('mkdir parts'); }
elsif ($errn != 0) { die "$tempdir/parts is not accessible: $!" }
elsif (!-d _) { die "$tempdir/parts is not a directory" }
else {} # fine, directory already exists and is accessible
}
# FIRST: what kind of e-mail did we get? call content scanners
my($virus_presence_checked,$spam_presence_checked);
my $virus_dejavu = 0;
my($will_do_virus_scanning, $all_bypass_virus_checks);
if ($extra_code_antivirus) {
$all_bypass_virus_checks =
!grep(!$_->bypass_virus_checks, @{$msginfo->per_recip_data});
$will_do_virus_scanning =
!$virus_presence_checked && !$all_bypass_virus_checks;
}
my $will_do_banned_checking = # banned name checking will be needed?
@{ca('banned_filename_maps')} || cr('banned_namepath_re');
my($bounce_header_fields_ref,$bounce_msgid,$bounce_type);
if (c('bypass_decode_parts')) {
do_log(5, 'decoding bypassed');
} elsif (!$will_do_virus_scanning && !$will_do_banned_checking &&
c('bounce_killer_score') <= 0) {
do_log(5, 'decoding not needed');
} else {
# decoding parts can take a lot of time
$which_section = "mime_decode-1";
$zmq_obj->register_proc(2,0,'D',$am_id) if $zmq_obj; # decoding
$snmp_db->register_proc(2,0,'D',$am_id) if $snmp_db;
$t0_sect = Time::HiRes::time;
$mime_err = ensure_mime_entity($msginfo)
if !defined($msginfo->mime_entity);
prolong_timer($which_section);
if (c('bounce_killer_score') > 0) {
$which_section = "dsn_parse";
# analyze a bounce after MIME decoding but before further archive
# decoding (which often replaces original MIME parts by decoded files)
eval { # just in case
($bounce_header_fields_ref,$bounce_type) =
inspect_a_bounce_message($msginfo);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "inspect_a_bounce_message failed: %s", $eval_stat);
};
if ($bounce_header_fields_ref &&
exists $bounce_header_fields_ref->{'message-id'}) {
$bounce_msgid = $bounce_header_fields_ref->{'message-id'};
if (defined $bounce_msgid && $bounce_msgid ne '') {
my $refs = $msginfo->references;
if (!$refs) { $refs = []; $msginfo->references($refs) }
push(@$refs, $bounce_msgid);
}
}
prolong_timer($which_section);
}
$which_section = "parts_decode_ext";
snmp_count('OpsDec');
my($any_encrypted,$over_levels,$ambiguous);
($hold, $any_undecipherable, $any_encrypted, $over_levels, $ambiguous) =
Amavis::Unpackers::decompose_mail($msginfo->mail_tempdir,
$file_generator_object);
$any_undecipherable ||= ($any_encrypted || $over_levels || $ambiguous);
if ($any_undecipherable) {
$msginfo->add_contents_category(CC_UNCHECKED,0);
$msginfo->add_contents_category(CC_UNCHECKED,1) if $any_encrypted;
$msginfo->add_contents_category(CC_UNCHECKED,2) if $over_levels;
$msginfo->add_contents_category(CC_UNCHECKED,3) if $ambiguous;
for my $r (@{$msginfo->per_recip_data}) {
$r->add_contents_category(CC_UNCHECKED,3) if $ambiguous;
next if $r->bypass_virus_checks;
$r->add_contents_category(CC_UNCHECKED,0);
$r->add_contents_category(CC_UNCHECKED,1) if $any_encrypted;
$r->add_contents_category(CC_UNCHECKED,2) if $over_levels;
}
}
$elapsed->{'TimeElapsedDecoding'} = Time::HiRes::time - $t0_sect;
}
my $bphcm = ca('bypass_header_checks_maps');
if (grep(!lookup2(0,$_->recip_addr,$bphcm), @{$msginfo->per_recip_data})) {
$which_section = "check_header";
my $allowed_tests = cr('allowed_header_tests');
my($badh_ref,$minor_badh_cc);
if ($allowed_tests && %$allowed_tests) { # any test enabled?
($badh_ref,$minor_badh_cc) = check_header_validity($msginfo);
$msginfo->checks_performed->{H} = 1;
if (@$badh_ref) {
push(@bad_headers, @$badh_ref);
$msginfo->add_contents_category(CC_BADH,$minor_badh_cc);
}
}
my $allowed_mime_test = $allowed_tests && $allowed_tests->{'mime'};
# check for bad headers and for bad MIME subheaders / bad MIME structure
if ($allowed_mime_test && defined $mime_err && $mime_err ne '') {
push(@bad_headers, "MIME error: ".$mime_err);
$msginfo->add_contents_category(CC_BADH,1);
}
for my $r (@{$msginfo->per_recip_data}) {
my $bypassed = lookup2(0,$r->recip_addr,$bphcm);
if (!$bypassed && @$badh_ref) {
$r->add_contents_category(CC_BADH,$minor_badh_cc);
}
if (!$bypassed && $allowed_mime_test &&
defined $mime_err && $mime_err ne '') {
$r->add_contents_category(CC_BADH,1); # CC_BADH min: 1=broken mime
}
}
section_time($which_section);
}
if ($will_do_banned_checking) { # check for banned file contents
$which_section = "check-banned";
check_for_banned_names($msginfo); # saves results in $msginfo
$msginfo->checks_performed->{B} = 1;
$banned_filename_any = 0; $banned_filename_all = 1;
for my $r (@{$msginfo->per_recip_data}) {
next if $r->bypass_banned_checks;
my $a = $r->banned_parts;
if (!defined $a || !@$a) {
$banned_filename_all = 0;
} else {
my $rhs = $r->banning_rule_rhs;
if (defined $rhs) {
for my $j (0..$#{$a}) {
$r->dsn_suppress_reason(sprintf("BANNED:%s suggested by rule",
$rhs->[$j])) if $rhs->[$j] =~ /^DISCARD/;
}
}
$banned_filename_any = 1;
$r->add_contents_category(CC_BANNED,0);
}
}
$msginfo->add_contents_category(CC_BANNED,0) if $banned_filename_any;
ll(4) && do_log(4,"banned check: any=%d, all=%s (%d)",
$banned_filename_any, $banned_filename_all?'Y':'N',
scalar(@{$msginfo->per_recip_data}));
}
my $virus_checking_failed = 0;
if (!$extra_code_antivirus) {
do_log(5, "no anti-virus code loaded, skipping virus_scan");
} elsif ($all_bypass_virus_checks) {
do_log(5, "bypassing of virus checks requested");
} elsif (defined $hold && $hold ne '') { # protect virus scanner from bombs
do_log(0, "NOTICE: Virus scanning skipped: %s", $hold);
$will_do_virus_scanning = 0;
} else {
if (!$will_do_virus_scanning)
{ do_log(-1, "NOTICE: will_do_virus_scanning is false???") }
$mime_err = ensure_mime_entity($msginfo)
if !defined($msginfo->mime_entity) && !c('bypass_decode_parts');
# special case to make available a complete mail file for inspection
if ((defined $mime_err && $mime_err ne '') ||
!defined($msginfo->mime_entity) ||
lookup2(0, 'MAIL', \@keep_decoded_original_maps) ||
$any_undecipherable && lookup2(0,'MAIL-UNDECIPHERABLE',
\@keep_decoded_original_maps)) {
if (!defined($msginfo->mail_text_fn)) {
do_log(5,"can't present full original message to scanners, no file");
} else {
# keep the email.txt by making a hard link to it in ./parts/
$which_section = "linking-to-MAIL";
my $tempdir = $msginfo->mail_tempdir;
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts", $parts_root, 1);
my $newpart = $newpart_obj->full_name;
ll(3) && do_log(3,'presenting full original message to scanners '.
'as %s%s%s%s',
$newpart,
!$any_undecipherable ? '' : ", $any_undecipherable undecipherable",
defined $msginfo->mime_entity ? '' : ', MIME not decoded',
!defined $mime_err || $mime_err eq '' ? ''
: ", MIME error: $mime_err");
link($msginfo->mail_text_fn, $newpart)
or die sprintf("Can't create hard link %s to %s: %s",
$newpart, $msginfo->mail_text_fn, $!);
$newpart_obj->type_short('MAIL'); # case sensitive
if ($msginfo->smtputf8 && $msginfo->header_8bit) {
# RFC 6532 section 3.7
$newpart_obj->type_declared('message/global');
$newpart_obj->name_declared('message.u8msg');
} else {
$newpart_obj->type_declared('message/rfc822');
$newpart_obj->name_declared('message.msg');
}
}
}
$which_section = "virus_scan";
$zmq_obj->register_proc(2,0,'V',$am_id) if $zmq_obj; # virus scan
$snmp_db->register_proc(2,0,'V',$am_id) if $snmp_db;
my $av_ret; $t0_sect = Time::HiRes::time;
$virus_checking_failed = 1;
eval {
my($vn, $ds, $avsr);
($av_ret, $av_output, $vn, $ds, $avsr) =
Amavis::AV::virus_scan($msginfo, $child_task_count==1);
@virusname = @$vn; @detecting_scanners = @$ds; # copy
@av_scanners_results = @$avsr;
if (defined $av_ret) {
$virus_presence_checked = 1; $virus_checking_failed = 0;
$msginfo->checks_performed->{V} = 1;
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-2, "AV: %s", $eval_stat);
$virus_checking_failed = $eval_stat;
$virus_checking_failed = 1 if !$virus_checking_failed;
};
$elapsed->{'TimeElapsedVirusCheck'} = Time::HiRes::time - $t0_sect;
snmp_count('OpsVirusCheck');
if ($virus_presence_checked && @virusname && $snmp_db) {
$which_section = "read_snmp_variables";
# true if none found with a counter value of zero or undef
$virus_dejavu = 1 if !grep(!defined($_) || $_ == 0,
@{$snmp_db->read_snmp_variables(
map("virus.byname.$_", @virusname))});
section_time($which_section);
}
}
if ($virus_checking_failed) {
$msginfo->add_contents_category(CC_UNCHECKED,0);
for my $r (@{$msginfo->per_recip_data}) {
$r->add_contents_category(CC_UNCHECKED,0) if !$r->bypass_virus_checks;
}
if (c('virus_scanners_failure_is_fatal')) {
$hold = 'AV: ' . $virus_checking_failed;
die "$hold\n"; # TEMPFAIL
}
}
$which_section = "post_virus_scan";
if (@virusname) {
my $virus_suppress_reason;
my($ccat_maj,$ccat_min) = (CC_VIRUS,0);
my $vtfsm = ca('viruses_that_fake_sender_maps');
if (@$vtfsm) {
for my $vn (@virusname) {
my($result,$matchingkey) = lookup2(0,$vn,$vtfsm);
if ($result) { # is a virus known to fake a sender address
do_log(3,"Virus %s matches %s, sender addr ignored",
$vn,$matchingkey);
# try to get some info on sender source from his IP address
my $first_rcvd_from_ip =
oldest_public_ip_addr_from_received($msginfo);
if (defined $first_rcvd_from_ip && $first_rcvd_from_ip ne '') {
$msginfo->sender_source(sprintf('?@[%s]', $first_rcvd_from_ip));
} else {
$msginfo->sender_source(undef);
}
$virus_suppress_reason = 'INFECTED';
# $ccat_min = 1;
last;
}
}
}
$msginfo->add_contents_category($ccat_maj,$ccat_min);
for my $r (@{$msginfo->per_recip_data}) {
$r->add_contents_category(
$ccat_maj,$ccat_min) if !$r->bypass_virus_checks;
if (defined $virus_suppress_reason) {
$r->dsn_suppress_reason($virus_suppress_reason .
(!defined $_ ? '' : ", $_")) for $r->dsn_suppress_reason;
}
}
$msginfo->virusnames([@virusname]); # save a copy of virus names
my $vntpbm = ca('virus_name_to_policy_bank_maps');
if (@$vntpbm) {
my(@bank_names);
for my $vn (@virusname) {
my($result,$matchingkey) = lookup2(0,$vn,$vntpbm);
next if !$result;
if ($result eq '1') {
# a handy usability trick to supply a hardwired policy bank
# name when acl-style lookup table is used, which can only
# return a boolean (undef, 0, or 1)
$result = 'VIRUS';
}
# $result is a list of policy bank names as a comma-separated string
local $1;
my(@pbn) = map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $result));
if (@pbn) {
push(@bank_names, @pbn);
ll(2) && do_log(2, "virus %s loads policy bank(s) %s, match: %s",
$vn, join(',',@pbn), $matchingkey);
}
}
load_policy_bank($_) for @bank_names;
}
}
if (defined($os_fingerprint_obj)) {
$which_section = "fingerprint_collect";
$os_fingerprint = $os_fingerprint_obj->collect_response;
if (defined $os_fingerprint && $os_fingerprint ne '') {
$msginfo->checks_performed->{F} = 1;
if ($msginfo->originating)
{ $os_fingerprint = 'MYNETWORKS' } # blank-out our smtp clients info
$msginfo->client_os_fingerprint($os_fingerprint); # store info
}
}
my($bypass_spam_checks_by_bounce_killer);
if (!$bounce_header_fields_ref) {
# not a bounce
} elsif ($msginfo->originating) {
# will be rescued from bounce killing by the originating flag
} elsif (defined($bounce_msgid) &&
$bounce_msgid =~ /(\@[^\@>() \t][^\@>]*?)[ \t]*>?\z/ &&
lookup2(0,$1, ca('local_domains_maps'))) {
# will be rescued from bounce killing by a local domain
# in referenced Message-ID
} elsif (!defined($sql_storage) || !$sql_store_info_for_all_msgs ||
c('penpals_bonus_score') <= 0 || c('penpals_halflife') <= 0) {
# will be rescued from bounce killing by pen pals disabled
} elsif (c('bounce_killer_score') > 20) {
# is a bounce and is eligible to bounce killing, no need for spam scan
$bypass_spam_checks_by_bounce_killer = 1;
}
# consider doing spam scanning
if (!$extra_code_antispam) {
do_log(5, "no anti-spam code loaded, skipping spam_scan");
} elsif ($bypass_spam_checks_by_bounce_killer) {
do_log(5, "bypassing of spam checks by a bounce killer");
} elsif (!grep(!$_->bypass_spam_checks, @{$msginfo->per_recip_data})) {
do_log(5, "bypassing of spam checks requested for all recips");
} else {
# preliminary test - would a message be allowed to pass for any recipient
# based on evidence collected so far (virus, banned)
my $any_pass = 0; my $prelim_blocking_ccat;
for my $r (@{$msginfo->per_recip_data}) {
my $final_destiny = D_PASS;
my $recip = $r->recip_addr;
my(@fd_tuples) = $r->setting_by_main_contents_category_all(
cr('final_destiny_maps_by_ccat'),
cr('lovers_maps_by_ccat'));
for my $tuple (@fd_tuples) {
my($cc, $fd_map_ref, $lovers_map_ref) = @$tuple;
my $fd = !ref $fd_map_ref ? $fd_map_ref # compatibility
: lookup2(0, $recip, $fd_map_ref,
Label => 'Destiny1');
if (!defined $fd || $fd == D_PASS) {
$fd = D_PASS; # keep D_PASS
} elsif (defined($lovers_map_ref) &&
lookup2(0, $recip, $lovers_map_ref, Label => 'Lovers1')) {
$fd = D_PASS; # D_PASS for content lovers
} elsif ($fd == D_BOUNCE && ($sender eq '' || $msginfo->is_bulk) &&
ccat_maj($cc) == CC_BADH) {
# have mercy on bad header section from mailing lists and in DSN
$fd = D_PASS; # change D_BOUNCE to D_PASS for CC_BADH
} else { # $fd != D_PASS, blocked
$prelim_blocking_ccat = $cc; $final_destiny = $fd;
last;
}
}
$any_pass = 1 if $final_destiny == D_PASS;
}
if (!$any_pass) {
do_log(5, "bypassing of spam checks, message will be blocked anyway ".
"due to %s", $prelim_blocking_ccat);
} else {
$which_section = "spam-wb-list";
my($any_wbl, $all_wbl) = Amavis::SpamControl::white_black_list(
$msginfo, $sql_wblist, $user_id_sql, $ldap_lookups);
section_time($which_section);
if ($all_wbl) {
do_log(5, "sender white/blacklisted, skipping spam_scan");
} elsif (!$spamcontrol_obj) {
do_log(5, "spam scanning disabled, no spamcontrol_obj");
} else {
$which_section = "spam_scan";
$zmq_obj->register_proc(2,0,'S',$am_id) if $zmq_obj;
$snmp_db->register_proc(2,0,'S',$am_id) if $snmp_db;
$t0_sect = Time::HiRes::time;
# sets $msginfo->spam_level, spam_status,
# spam_report, spam_summary, supplementary_info
$spamcontrol_obj->spam_scan($msginfo);
eval { # treat any failures there as non-fatal, just in case
$spamcontrol_obj->auto_learn($msginfo); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "Auto-learn failed: %s", $eval_stat);
};
$msginfo->checks_performed->{S} = 1;
prolong_timer($which_section);
$elapsed->{'TimeElapsedSpamCheck'} = Time::HiRes::time - $t0_sect;
snmp_count('OpsSpamCheck');
$spam_presence_checked = 1;
}
}
}
if (ref $custom_object) {
$which_section = "custom-checks";
eval {
$custom_object->checks($conn,$msginfo);
update_current_log_level(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"custom checks error: %s", $eval_stat);
};
section_time($which_section);
}
snmp_count("virus.byname.$_") for @virusname;
my(@sa_tests,%sa_tests);
{ my $tests = $msginfo->supplementary_info('TESTS');
if (defined($tests) && $tests ne 'none') {
@sa_tests = $tests =~ /([^=,;]+)(?==)/g;
%sa_tests = map(($_,1), @sa_tests);
}
}
# SECOND: now that we know what we got, decide what to do with it
$which_section = 'after_scanning';
Amavis::DKIM::adjust_score_by_signer_reputation($msginfo)
if $msginfo->dkim_signatures_valid;
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
$min_spam_level = 0 if !defined $min_spam_level;
$max_spam_level = 0 if !defined $max_spam_level;
$which_section = "penpals_check";
my $pp_age;
if (!$redis_storage &&
!(defined $sql_storage && $sql_store_info_for_all_msgs)) {
# pen pals disabled - data on past mail transactions unavailable
} elsif ($msginfo->is_in_contents_category(CC_VIRUS)) {
# pen pals disabled, not needed for infected messages
} else {
my $pp_bonus = c('penpals_bonus_score'); # score points
my $pp_halflife = c('penpals_halflife'); # seconds
if ($pp_bonus <= 0 || $pp_halflife <= 0) {
# penpals disabled
} elsif (defined($penpals_threshold_low) && !defined($bounce_msgid) &&
$max_spam_level < $penpals_threshold_low) {
# low score for all recipients, no need for aid
do_log(5,"penpals: low score, no need for penpals aid");
} elsif (defined($penpals_threshold_high) && !defined($bounce_msgid) &&
$min_spam_level - $pp_bonus > $penpals_threshold_high) {
# spam, can't get below threshold_high even under best circumstances
do_log(5,"penpals: high score, penpals won't help");
} elsif ($sender ne '' && !$msginfo->originating &&
lookup2(0, $sender, ca('local_domains_maps'))) {
# no bonus to unauthent. senders from outside claiming a local domain
do_log(5,"penpals: local sender from outside, ignored: %s", $sender);
} else {
$t0_sect = Time::HiRes::time;
$zmq_obj->register_proc(2,0,'P',$am_id) if $zmq_obj; # penpals
$snmp_db->register_proc(2,0,'P',$am_id) if $snmp_db;
my $refs = $msginfo->references;
my $sid = $msginfo->sender_maddr_id;
section_time("pre-penpals");
if ($redis_storage) {
# does all recipient queries in one go
my $ok = eval { $redis_storage->penpals_find($msginfo, $refs) };
section_time("penpals-redis") if $ok;
}
for my $r (@{$msginfo->per_recip_data}) {
next if $r->recip_done; # already dealt with
my $recip = $r->recip_addr;
if ($r->recip_is_local && lc($sender) ne lc($recip)) {
# inbound or internal_to_internal, except self_to_self
my $pp_mail_id = $r->recip_penpals_related;
my $pp_age = $r->recip_penpals_age;
my $pp_subj;
my $rid = $r->recip_maddr_id;
if ($sql_storage && defined $sid && defined $rid) {
# NOTE: swap $rid and $sid as args in a query here, as we are
# now checking for a potential reply mail - whether the current
# recipient has recently sent any mail to the sender of the
# current mail:
my($pp_age_sql, $pp_mail_id_sql, $pp_subj_sql) =
$sql_storage->penpals_find($rid, $sid, $refs, $msginfo);
if (defined $pp_age_sql) {
if (!defined $pp_age || $pp_age_sql < $pp_age) {
$pp_age = $pp_age_sql; $pp_mail_id = $pp_mail_id_sql;
$r->recip_penpals_age($pp_age);
$r->recip_penpals_related($pp_mail_id);
}
$pp_subj = $pp_subj_sql;
}
section_time("penpals-sql");
}
$msginfo->checks_performed->{P} = 1;
if (defined $pp_age) { # found info about previous correspondence
my $weight = exp(-($pp_age/$pp_halflife) * log(2));
# weight is a factor between 1 and 0, representing
# exponential decay: weight(t) = 1 / 2^(t/halflife)
# i.e. factors 1, 1/2, 1/4, 1/8... at age 0, hl, 2*hl, 3*hl...
my $adj = - $weight * $pp_bonus;
$r->recip_penpals_score($adj);
$r->spam_level( ($r->spam_level || 0) + $adj);
{ my $spam_tests = 'AM.PENPAL=' . (0+sprintf("%.3f",$adj));
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
unshift(@{$r->spam_tests}, \$spam_tests);
}
}
if (ll(2)) {
do_log(2,"penpals: adj.bonus %.3f, age %s (%d), ".
"SA score %.3f, <%s> replying to <%s>, ref mail_id: %s",
-$adj, format_time_interval($pp_age), $pp_age,
$r->spam_level, $sender, $recip, $pp_mail_id);
if (defined $pp_subj) {
my $this_subj = $msginfo->get_header_field_body('subject');
$this_subj = $1 if $this_subj =~ /^\s*(.*?)\s*$/;
do_log(2,"penpals: prev Subject: %s", $pp_subj);
do_log(2,"penpals: this Subject: %s", $this_subj);
}
}
}
}
}
# section_time($which_section);
$elapsed->{'TimeElapsedPenPals'} = Time::HiRes::time - $t0_sect;
}
}
$which_section = "bounce_killer";
if ($bounce_header_fields_ref) { # message looks like a DSN (= bounce)
snmp_count('InMsgsBounce');
my $bounce_rescued;
if (defined $pp_age && $pp_age < 8*24*3600) { # less than 8 days ago
# found by pen pals by a Message-ID in attachment and recip. address;
# is a bounce, refers to our previous outgoing message, treat it kindly
snmp_count('InMsgsBounceRescuedByPenPals');
$bounce_rescued = 'by penpals';
} elsif ($msginfo->originating) {
snmp_count('InMsgsBounceRescuedByOriginating');
$bounce_rescued = 'by originating';
} elsif (defined($bounce_msgid) &&
$bounce_msgid =~ /(\@[^\@>() \t][^\@>]*?)[ \t]*>?\z/ &&
lookup2(0,$1, ca('local_domains_maps'))) {
# not in pen pals, but domain in Message-ID is a local domain;
# it is only useful until spammers figure out the trick,
# then it should be disabled
snmp_count('InMsgsBounceRescuedByDomain');
$bounce_rescued = 'by domain';
} elsif (!defined($sql_storage) ||
c('penpals_bonus_score') <= 0 || c('penpals_halflife') <= 0) {
$bounce_rescued = 'by: pen pals disabled';
}
ll(2) && do_log(2, "bounce %s (%s), %s -> %s, %s",
defined $bounce_rescued ?'rescued '.$bounce_rescued :'killed',
$bounce_type, qquote_rfc2821_local($sender),
join(',', qquote_rfc2821_local(@recips)),
join(', ', map { $_ . ': ' . $bounce_header_fields_ref->{$_} }
sort( grep(/^(?:From|Return-Path|Message-ID|Date)\z/i,
keys %$bounce_header_fields_ref) )) );
if (!$bounce_rescued) {
snmp_count('InMsgsBounceKilled');
my $bounce_killer_score = c('bounce_killer_score');
for my $r (@{$msginfo->per_recip_data}) {
$r->spam_level( ($r->spam_level || 0) + $bounce_killer_score);
my $spam_tests = 'AM.BOUNCE=' . $bounce_killer_score;
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
unshift(@{$r->spam_tests}, \$spam_tests);
}
}
}
# else: not a recognizable bounce
} elsif ($msginfo->is_auto ||
$sender =~ /^postmaster(?:\@|\z)/si ||
$rfc2822_from[0] =~ /^postmaster(?:\@|\z)/si ||
$sa_tests{'ANY_BOUNCE_MESSAGE'} ) {
# message could be some kind of a non-standard bounce or autoresponse,
# but lacks recognizable structure and a header section from orig. mail
ll(2) && do_log(2, "bounce unverifiable%s, %s -> %s",
!$msginfo->originating ? '' : ', originating',
qquote_rfc2821_local($sender),
join(',', qquote_rfc2821_local(@recips)));
snmp_count('InMsgsBounce'); snmp_count('InMsgsBounceUnverifiable');
}
$which_section = "decide_mail_destiny";
$zmq_obj->register_proc(2,0,'r',$am_id) if $zmq_obj; # results...
$snmp_db->register_proc(2,0,'r',$am_id) if $snmp_db;
my $considered_oversize_by_some_recips;
my $mslm = ca('message_size_limit_maps');
for my $r (@{$msginfo->per_recip_data}) {
next if $r->recip_done; # already dealt with
my $recip = $r->recip_addr;
my $spam_level = $r->spam_level;
# consider adding CC_SPAM or CC_SPAMMY to the contents_category list;
# spaminess is an individual matter, we must compare spam level
# with each recipient setting, there is no single global criterion
my($tag_level,$tag2_level,$tag3_level,$kill_level);
my $bypassed = $r->bypass_spam_checks;
if (!$bypassed) {
$tag_level = lookup2(0,$recip, ca('spam_tag_level_maps'));
$tag2_level = lookup2(0,$recip, ca('spam_tag2_level_maps'));
$tag3_level = lookup2(0,$recip, ca('spam_tag3_level_maps'));
$kill_level = lookup2(0,$recip, ca('spam_kill_level_maps'));
}
my $blacklisted = $r->recip_blacklisted_sender;
my $whitelisted = $r->recip_whitelisted_sender;
my $do_tag = !$bypassed && (
$blacklisted || !defined $tag_level || $tag_level eq '' ||
($spam_level + ($whitelisted?-10:0) >= $tag_level));
my($do_tag2,$do_tag3,$do_kill) =
map { !$bypassed && !$whitelisted &&
($blacklisted || (defined($_) && $spam_level >= $_) ) }
($tag2_level,$tag3_level,$kill_level);
$do_tag2 = $do_tag2 || $do_tag3; # tag3 implies tag2, just in case
if ($do_tag) { # spaminess is at or above tag level
$msginfo->add_contents_category(CC_CLEAN,1);
$r->add_contents_category(CC_CLEAN,1) if !$bypassed;
}
if ($do_tag2) { # spaminess is at or above tag2 level
$msginfo->add_contents_category(CC_SPAMMY);
$r->add_contents_category(CC_SPAMMY) if !$bypassed;
}
if ($do_tag3) { # spaminess is at or above tag3 level
$msginfo->add_contents_category(CC_SPAMMY,1);
$r->add_contents_category(CC_SPAMMY,1) if !$bypassed;
}
if ($do_kill) { # spaminess is at or above kill level
$msginfo->add_contents_category(CC_SPAM,0);
$r->add_contents_category(CC_SPAM,0) if !$bypassed;
}
# consider adding CC_OVERSIZED to the contents_category list;
if (@$mslm) { # checking of mail size is needed?
my $size_limit = lookup2(0,$r->recip_addr,$mslm);
if ($enforce_smtpd_message_size_limit_64kb_min &&
$size_limit && $size_limit < 65536)
{ $size_limit = 65536 } # RFC 5321 requires at least 64k
if ($size_limit && $mail_size > $size_limit) {
do_log(1,"OVERSIZED from %s to %s: size %s B, limit %s B",
$msginfo->sender_smtp, $r->recip_addr_smtp,
$mail_size, $size_limit)
if !$considered_oversize_by_some_recips;
$considered_oversize_by_some_recips = 1;
$r->add_contents_category(CC_OVERSIZED,0);
$msginfo->add_contents_category(CC_OVERSIZED,0);
}
}
# determine true reason for blocking,considering lovers and final_destiny
my $blocking_ccat; my $final_destiny = D_PASS; my $to_be_mangled;
my(@fd_tuples) = $r->setting_by_main_contents_category_all(
cr('final_destiny_maps_by_ccat'),
cr('lovers_maps_by_ccat'),
cr('defang_maps_by_ccat') );
for my $tuple (@fd_tuples) {
my($cc, $fd_map_ref, $lovers_map_ref, $mangle_map_ref) = @$tuple;
my $fd = !ref $fd_map_ref ? $fd_map_ref # compatibility
: lookup2(0, $recip, $fd_map_ref,
Label => 'Destiny2');
if (!defined $fd || $fd == D_PASS) {
ll(5) && do_log(5, 'final_destiny (ccat=%s) is PASS, recip %s',
$cc, $recip);
$fd = D_PASS; # keep D_PASS
} elsif (defined($lovers_map_ref) &&
lookup2(0, $recip, $lovers_map_ref, Label => 'Lovers2')) {
ll(5) && do_log(5, 'contents lover (ccat=%s), '.
'changing final_destiny %d to PASS, recip %s',
$cc, $fd, $recip);
$fd = D_PASS; # change to D_PASS for content lovers
} elsif ($fd == D_BOUNCE && ($sender eq '' || $msginfo->is_bulk) &&
ccat_maj($cc) == CC_BADH) {
# have mercy on bad header section in mail from mailing lists and
# in DSN: since a bounce for such mail will be suppressed, it is
# probably better to just let a mail with a bad header section pass,
# it is rather innocent
my $is_bulk = $msginfo->is_bulk;
do_log(1, 'allow bad header section from %s<%s> -> <%s>: %s, '.
'changing final_destiny %d to PASS',
!$is_bulk ? '' : "($is_bulk) ",
$sender, $recip, $bad_headers[0], $fd);
$fd = D_PASS; # change D_BOUNCE to D_PASS for CC_BADH
} else { # $fd != D_PASS, blocked
$blocking_ccat = $cc; $final_destiny = $fd;
my $cc_main = $r->contents_category;
$cc_main = $cc_main->[0] if $cc_main;
if ($blocking_ccat eq $cc_main) {
do_log(3, 'blocking contents category is (%s) for %s, '.
'final_destiny %d',
$blocking_ccat, $recip, $fd);
} else {
do_log(3, 'blocking ccat (%s) differs from ccat_maj=%s, %s, '.
'final_destiny %d',
$blocking_ccat, $cc_main, $recip, $fd);
}
last; # first blocking wins, also skips turning on mangling
}
# topmost mangling reason wins
if (!defined($to_be_mangled) && defined($mangle_map_ref)) {
my $mangle_type =
!ref($mangle_map_ref) ? $mangle_map_ref # compatibility
: lookup2(0,$recip,$mangle_map_ref, Label=>'Mangling1');
$to_be_mangled = $mangle_type if $mangle_type ne '';
}
}
$r->recip_destiny($final_destiny);
if (defined $blocking_ccat) { # save a blocking contents category
$r->blocking_ccat($blocking_ccat);
# summarize per-recipient blocking_ccat to a message level
my $msg_bl_ccat = $msginfo->blocking_ccat;
if (!defined($msg_bl_ccat) || cmp_ccat($blocking_ccat,$msg_bl_ccat)>0)
{ $msginfo->blocking_ccat($blocking_ccat) }
} else { # defanging/mangling only has effect on passed mail
# defang_all serves mostly for testing purposes and compatibility
$to_be_mangled = 1 if !$to_be_mangled && c('defang_all');
if ($to_be_mangled) {
my $orig_to_be_mangled = $to_be_mangled;
if ($to_be_mangled =~ /^(?:disclaimer|nulldisclaimer)\z/i) {
# disclaimers can only go to mail originating from internal
# networks - the 'allow_disclaimers' should (only) be enabled
# by an appropriate policy bank, e.g. MYNETS and/or ORIGINATING
if (!c('allow_disclaimers')) {
$to_be_mangled = 0; # not for remote or unauthorized clients
do_log(5,"will not add disclaimer, allow_disclaimers is false");
} else {
my $rf = $msginfo->rfc2822_resent_from;
my $rs = $msginfo->rfc2822_resent_sender;
# disclaimers should only go to mail with 2822.From or
# 2822.Sender or 2822.Resent-From or 2822.Resent-Sender
# or 2821.mail_from address matching local domains
if (!grep(defined($_) && $_ ne '' &&
lookup2(0,$_, ca('local_domains_maps')),
unique_list( (!$rf ? () : @$rf), (!$rs ? () : @$rs),
@rfc2822_from, $rfc2822_sender, $sender))) {
$to_be_mangled = 0; # not for foreign 'Sender:' or 'From:'
do_log(5,"will not add disclaimer, sender not local");
} elsif (c('outbound_disclaimers_only') && $r->recip_is_local) {
$to_be_mangled = 0;
do_log(5, "will not add disclaimer, recipient is local");
}
}
} else { # defanging (not disclaiming)
# defanging and other mail mangling/munging only applies to
# incoming mail, i.e. for recipients matching local_domains_maps
$to_be_mangled = 0 if !$r->recip_is_local;
}
# store a boolean or a mangling name (defang, disclaimer, ...)
$r->mail_body_mangle($to_be_mangled) if $to_be_mangled;
ll(2) && do_log(2, "mangling %s: %s (was: %s), ".
"discl_allowed=%d, <%s> -> <%s>", $to_be_mangled ? 'YES' : 'NO',
$to_be_mangled, $orig_to_be_mangled, c('allow_disclaimers'),
$sender, $recip);
}
}
# penpals_score is already accounted for in spam_level
my $penpals_score = $r->recip_penpals_score; # is zero or negative!
if ($penpals_score && $penpals_score < 0) {
# only for logging and statistics purposes
my($do_tag2_nopp, $do_tag3_nopp, $do_kill_nopp) =
map { !$whitelisted &&
($blacklisted ||
(defined($_) && $spam_level-$penpals_score >= $_) ) }
($tag2_level, $tag3_level, $kill_level);
$do_tag2_nopp ||= $do_tag3_nopp;
my $which = $do_kill_nopp && !$do_kill ? 'kill'
: $do_tag3_nopp && !$do_tag3 ? 'tag3'
: $do_tag2_nopp && !$do_tag2 ? 'tag2' : undef;
if (defined $which) {
snmp_count("PenPalsSavedFrom\u$which") if $final_destiny==D_PASS;
do_log(2, "penpals: PenPalsSavedFrom%s %.3f%.3f%s, <%s> -> <%s>",
"\u$which", $spam_level-$penpals_score, $penpals_score,
($final_destiny==D_PASS ? '' : ', but mail still blocked'),
$sender, $recip);
}
}
if ($final_destiny == D_PASS) {
# recipient wants this message, malicious or not
do_log(5, "final_destiny PASS, recip %s", $recip);
} else { # recipient does not want this content
do_log(5, "final_destiny %s, recip %s", $final_destiny, $recip);
# supply RFC 3463 enhanced status codes, see also RFC 5248
my $status = setting_by_given_contents_category(
$blocking_ccat,
{ CC_VIRUS, "554 5.7.0",
CC_BANNED, "554 5.7.0",
CC_UNCHECKED, "554 5.7.0",
CC_SPAM, "554 5.7.0",
CC_SPAMMY, "554 5.7.0",
CC_BADH.",2", "554 5.6.3", # nonencoded 8-bit character
CC_BADH, "554 5.6.0",
CC_OVERSIZED, "552 5.3.4",
CC_MTA, "550 5.3.5",
CC_CATCHALL, "554 5.7.0",
});
my($statoverride,$softfailed); $softfailed = '';
if ($status =~ /^[24]/) { # just in case
# keep unchanged
} elsif ($final_destiny == D_TEMPFAIL) {
$statoverride = '450'; # 5xx -> 450
} elsif (c('soft_bounce')) {
$statoverride = '450'; # 5xx -> 450
$softfailed = ' (soft_bounce)';
ll(5) && do_log(5, "soft_bounce: %s %s -> %s",
$final_destiny == D_DISCARD ? 'discard' : 'bounce',
$status, $statoverride);
} elsif ($final_destiny == D_DISCARD) {
$statoverride = '250'; # 5xx -> 250
}
if (defined $statoverride) {
my $code = substr($statoverride,0,1); local($1,$2);
$status =~ s{^\d(\d\d) \d(\.\d\.\d)}{$statoverride $code$2};
}
# get the custom smtp response reason text
my $smtp_reason = setting_by_given_contents_category(
$blocking_ccat, cr('smtp_reason_by_ccat'));
$smtp_reason = '' if !defined $smtp_reason;
if ($smtp_reason ne '') {
my(%mybuiltins) = %builtins; # make a local copy
$smtp_reason = expand(\$smtp_reason, \%mybuiltins);
$smtp_reason = !ref($smtp_reason) ? '' : $$smtp_reason;
chomp($smtp_reason); $smtp_reason = sanitize_str($smtp_reason,1);
# coarsely chop to a sane size, wrap_smtp_resp() will finely adjust
substr($smtp_reason,450) = '...' if length($smtp_reason) > 450+3;
}
my $response = sprintf("%s %s%s%s", $status,
($final_destiny == D_PASS ? "Ok" :
$final_destiny == D_DISCARD ? "Ok, discarded" :
$final_destiny == D_REJECT ? "Reject" :
$final_destiny == D_BOUNCE ? "Bounce" :
$final_destiny == D_TEMPFAIL ? "Temporary failure" :
"Not ok ($final_destiny)" ),
$softfailed,
$smtp_reason eq '' ? '' : ', '.$smtp_reason);
# the wrap_smtp_resp() will enforce the requirement in
# RFC 5321 section 4.5.3.1.5 on a length of a reply line
ll(4) && do_log(4, "blocking ccat=%s, SMTP response: %s",
$blocking_ccat,$response);
$r->recip_smtp_response($response);
$r->recip_done(1); # fake a delivery (confirm delivery to a bit bucket)
# note that 5xx status rejects may later be converted to bounces
}
}
section_time($which_section);
$which_section = "quar+notif"; $t0_sect = Time::HiRes::time;
$zmq_obj->register_proc(2,0,'Q',$am_id) if $zmq_obj; # notify, quar
$snmp_db->register_proc(2,0,'Q',$am_id) if $snmp_db;
do_notify_and_quarantine($msginfo, $virus_dejavu);
# $which_section = "aux_quarantine";
# do_quarantine($msginfo, undef, ['archive-files'], 'local:archive/%m');
# do_quarantine($msginfo, undef, ['archive@localhost'], 'local:all-%m');
# do_quarantine($msginfo, undef, ['sender-quarantine'], 'local:user-%m'
# ) if lookup(0,$sender, ['user1@domain','user2@domain']);
# section_time($which_section);
$elapsed->{'TimeElapsedQuarantineAndNotify'} = Time::HiRes::time - $t0_sect;
if (defined $hold && $hold ne '')
{ do_log(-1, "NOTICE: HOLD reason: %s", $hold) }
# THIRD: now that we know what to do with it, do it! (deliver or bounce)
{ # update Content*Msgs* counters
my $ccat_name =
$msginfo->setting_by_contents_category(\%ccat_display_names_major);
my $counter_name = 'Content'.$ccat_name.'Msgs';
snmp_count($counter_name);
if ($msginfo->originating) {
snmp_count($counter_name.'Originating');
}
if ($cnt_local > 0) {
my $d = $msginfo->originating ? 'Internal' : 'Inbound';
snmp_count($counter_name.$d);
}
if ($cnt_remote > 0) {
my $d = $msginfo->originating ? 'Outbound' : 'OpenRelay';
snmp_count($counter_name.$d);
}
}
# set $r->delivery_method according to forward_method_maps_by_ccat lookup
# or defaults
for my $r (@{$msginfo->per_recip_data}) {
next if defined($r->delivery_method);
my $fwd_map = $r->setting_by_contents_category(
cr('forward_method_maps_by_ccat'));
my $fwd_m;
$fwd_m = lookup2(0, $r->recip_addr, $fwd_map,
Label=>"forward_method") if ref $fwd_map;
$fwd_m = '' if !defined $fwd_m;
$r->delivery_method($fwd_m);
}
# a custom hook may change $r->delivery_method
if (ref $custom_object) {
$which_section = "custom-before_send";
eval {
$custom_object->before_send($conn,$msginfo);
update_current_log_level(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"custom before_send error: %s", $eval_stat);
};
section_time($which_section);
}
if (ll(3)) { # log delivery method by recipients
my(%fwd_m_displ_log);
for my $r (@{$msginfo->per_recip_data}) {
my $fwd_m = $r->delivery_method;
my $fwd_m_displ =
!defined $fwd_m ? "undefined, mail will not be forwarded"
: map(ref eq 'ARRAY' ? '('.join(', ',@$_).')' : $_, $fwd_m);
if (!$fwd_m_displ_log{$fwd_m_displ}) {
$fwd_m_displ_log{$fwd_m_displ} = [ $r ];
} else {
push(@{$fwd_m_displ_log{$fwd_m_displ}}, $r);
}
}
for my $log_msg (sort keys %fwd_m_displ_log) {
do_log(3, "delivery method is %s, recips: %s", $log_msg,
join(', ', map($_->recip_addr, @{$fwd_m_displ_log{$log_msg}})));
}
}
my $bcc = $msginfo->setting_by_contents_category(cr('always_bcc_by_ccat'));
if (defined $bcc && $bcc ne '') {
my $recip_obj = Amavis::In::Message::PerRecip->new;
$recip_obj->recip_addr_modified($bcc);
# leave recip_addr and recip_addr_smtp undefined to hide it from the log?
$recip_obj->recip_addr($bcc);
$recip_obj->recip_addr_smtp(qquote_rfc2821_local($bcc)); #****
$recip_obj->recip_is_local(
lookup2(0, $bcc, ca('local_domains_maps')) ? 1 : 0);
$recip_obj->recip_destiny(D_PASS);
$recip_obj->dsn_notify(['NEVER']);
$recip_obj->delivery_method(c('notify_method'));
$recip_obj->contents_category($msginfo->contents_category);
# $recip_obj->add_contents_category(CC_CLEAN,0);
$msginfo->per_recip_data([@{$msginfo->per_recip_data}, $recip_obj]);
do_log(2,"adding recipient - always_bcc: %s, delivery method %s",
$bcc, $recip_obj->delivery_method);
}
my $hdr_edits = $msginfo->header_edits;
# to be delivered explicitly (not by an AM.PDP client)
if (grep(!$_->recip_done && $_->delivery_method ne '',
@{$msginfo->per_recip_data})) { # forwarding is needed
$which_section = "forwarding"; $t0_sect = Time::HiRes::time;
$zmq_obj->register_proc(2,0,'F',$am_id) if $zmq_obj; # forwarding
$snmp_db->register_proc(2,0,'F',$am_id) if $snmp_db;
$hdr_edits = add_forwarding_header_edits_common(
$msginfo, $hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked);
for (;;) { # do the delivery, in batches if necessary
my $r_hdr_edits = Amavis::Out::EditHeader->new; # per-recip edits set
$r_hdr_edits->inherit_header_edits($hdr_edits);
my $done_all;
my $recip_cl; # ref to a list of recip objects needing same mail edits
# prepare header section edits, clusterize
($r_hdr_edits, $recip_cl, $done_all) =
add_forwarding_header_edits_per_recip(
$msginfo, $r_hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked, undef);
last if !@$recip_cl;
$msginfo->header_edits($r_hdr_edits); # store edits for this batch
# preserve information that may be changed by prepare_modified_mail()
my($m_t,$m_tfn,$m_ofs) =
($msginfo->mail_text, $msginfo->mail_text_fn, $msginfo->skip_bytes);
my(@m_dm) = map($_->delivery_method, @{$msginfo->per_recip_data});
# mail body mangling/defanging/sanitizing
my $body_modified =
prepare_modified_mail($msginfo,$hold,$any_undecipherable,$recip_cl);
# defanged_mime_entity have modified header edits, refetch just in case
$r_hdr_edits = $msginfo->header_edits;
if ($body_modified) {
my $resend_m = c('resend_method');
if (defined $resend_m && $resend_m ne '') {
$_->delivery_method($resend_m) for @{$msginfo->per_recip_data};
do_log(3,"mail body mangling in effect, resend_m: %s", $resend_m);
} else {
do_log(3,"mail body mangling in effect");
}
}
if (mail_dispatch($msginfo, 0, $dsn_per_recip_capable,
sub { my $r = $_[0]; grep($_ eq $r, @$recip_cl) })) {
$point_of_no_return = 1; # now past the point where mail was sent
}
# close and delete replacement file, if any
my $tmp_fh = $msginfo->mail_text; # replacement file, to be removed
if ($tmp_fh && !$tmp_fh->isa('MIME::Entity') && $tmp_fh ne $m_t) {
$tmp_fh->close or do_log(-1,"Can't close replacement: %s", $!);
if (debug_oneshot()) {
do_log(5, "defanging+debug, preserving %s",$msginfo->mail_text_fn);
} else {
unlink($msginfo->mail_text_fn)
or do_log(-1,"Can't remove %s: %s", $msginfo->mail_text_fn, $!);
}
}
# restore temporarily modified settings
$msginfo->mail_text($m_t); $msginfo->mail_text_fn($m_tfn);
$msginfo->skip_bytes($m_ofs);
$msginfo->mail_text_str(undef); $msginfo->body_start_pos(undef);
$_->delivery_method(shift @m_dm) for @{$msginfo->per_recip_data};
last if $done_all;
}
# turn on CC_MTA in case of MTA trouble (e.g, rejected by MTA on fwding)
for my $r (@{$msginfo->per_recip_data}) {
my $smtp_resp = $r->recip_smtp_response;
# skip successful deliveries and non- MTA-generated status codes
next if $smtp_resp =~ /^2/ || $r->recip_done != 2;
my $min_ccat = $smtp_resp =~ /^5/ ? 2 : $smtp_resp =~ /^4/ ? 1 : 0;
$r->add_contents_category(CC_MTA,$min_ccat);
$msginfo->add_contents_category(CC_MTA,$min_ccat);
my $blocking_ccat = sprintf("%d,%d", CC_MTA,$min_ccat);
$r->blocking_ccat($blocking_ccat);
$msginfo->blocking_ccat($blocking_ccat)
if !defined($msginfo->blocking_ccat);
my $fd_map_ref =
$r->setting_by_contents_category(cr('final_destiny_maps_by_ccat'));
my $final_destiny =
!ref $fd_map_ref ? $fd_map_ref # compatibility
: lookup2(0, $r->recip_addr, $fd_map_ref, Label => 'Destiny3');
$final_destiny = D_PASS if !defined $final_destiny;
if ($final_destiny == D_PASS) {
# impossible to pass, change to tempfail or reject
$final_destiny = $smtp_resp =~ /^5/ ? D_REJECT : D_TEMPFAIL;
}
$r->recip_destiny($final_destiny);
local($1,$2);
if ($smtp_resp !~ /^5/) {
# keep unchanged
} elsif ($final_destiny == D_DISCARD) {
$smtp_resp =~ s{^\d(\d\d) \d(\.\d\.\d)}{250 2$2}; # 5xx -> 250
} elsif (c('soft_bounce')) {
do_log(5, "soft_bounce: (mta) %s -> 450", $smtp_resp);
$smtp_resp =~ s{^\d(\d\d) \d(\.\d\.\d)}{450 4$2}; # 5xx -> 450
}
my $smtp_reason = # get the custom smtp response reason text
$r->setting_by_contents_category(cr('smtp_reason_by_ccat'));
$smtp_reason = '' if !defined $smtp_reason;
if ($smtp_reason ne '') {
my(%mybuiltins) = %builtins; # make a local copy
$smtp_reason = expand(\$smtp_reason, \%mybuiltins);
$smtp_reason = !ref($smtp_reason) ? '' : $$smtp_reason;
chomp($smtp_reason); $smtp_reason = sanitize_str($smtp_reason,1);
# coarsely chop to a sane size, wrap_smtp_resp() will finely adjust
substr($smtp_reason,450) = '...' if length($smtp_reason) > 450+3;
}
$smtp_resp =~ /^(\d\d\d(?: \d\.\d\.\d)?)\s*(.*)\z/s;
my $dis = $final_destiny == D_DISCARD ? ' Discarded' : '';
# the wrap_smtp_resp() will enforce the requirement in
# RFC 5321 section 4.5.3.1.5 on a length of a reply line
$r->recip_smtp_response("$1$dis $smtp_reason, $2");
$r->recip_done(1); # fake a delivery (confirm delivery to a bit bucket)
# note that 5xx status rejects may later be converted to bounces
}
$msginfo->header_edits($hdr_edits); # restore original edits just in case
$elapsed->{'TimeElapsedForwarding'} = Time::HiRes::time - $t0_sect;
}
# AM.PDP or AM.CL (milter)
if (grep(!$_->recip_done && $_->delivery_method eq '',
@{$msginfo->per_recip_data})) {
$which_section = "AM.PDP headers";
$hdr_edits = add_forwarding_header_edits_common(
$msginfo, $hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked);
my $done_all;
my $recip_cl; # ref to a list of similar recip objects
($hdr_edits, $recip_cl, $done_all) =
add_forwarding_header_edits_per_recip(
$msginfo, $hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked, undef);
if (c('enable_dkim_signing')) { # add DKIM signatures
my(@signatures) = Amavis::DKIM::dkim_make_signatures($msginfo,0);
$msginfo->dkim_signatures_new(\@signatures) if @signatures;
for my $signature (@signatures) {
my $s = $signature->as_string;
local($1); $s =~ s{\015\012}{\n}gs; $s =~ s{\n+\z}{}gs;
$s =~ s/^((?:DKIM|DomainKey)-Signature):[ \t]*//si;
$hdr_edits->prepend_header($1, $s, 2);
}
}
$msginfo->header_edits($hdr_edits); # store edits (redundant)
if (@$recip_cl && !$done_all) {
do_log(-1, "AM.PDP: RECIPIENTS REQUIRE DIFFERENT HEADERS");
};
}
prolong_timer($which_section);
if (ref $custom_object) {
$which_section = "custom-after_send";
eval {
$custom_object->after_send($conn,$msginfo);
update_current_log_level(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"custom after_send error: %s", $eval_stat);
};
section_time($which_section);
}
$which_section = "delivery-notification"; $t0_sect = Time::HiRes::time;
# generate a delivery status notification according to RFC 6522 & RFC 3464
my($notification,$suppressed) = delivery_status_notification(
$msginfo, $dsn_per_recip_capable, \%builtins,
[$sender], 'dsn', undef, undef);
my $ndn_needed;
($smtp_resp, $exit_code, $ndn_needed) =
one_response_for_all($msginfo, $dsn_per_recip_capable,
$suppressed && !defined($notification) );
do_log(4, "notif=%s, suppressed=%d, ndn_needed=%s, exit=%s, %s",
defined $notification ? 'Y' : 'N', $suppressed,
$ndn_needed, $exit_code, $smtp_resp);
section_time('prepare-dsn');
if ($suppressed && !defined($notification)) {
$msginfo->dsn_sent(2); # would-be-bounced, but bounce was suppressed
} elsif (defined $notification) { # dsn needed, send delivery notification
mail_dispatch($notification, 'Dsn', 0);
my($n_smtp_resp, $n_exit_code, $n_dsn_needed) =
one_response_for_all($notification, 0); # check status
if ($n_smtp_resp =~ /^2/ && !$n_dsn_needed) { # dsn successful?
$msginfo->dsn_sent(1); # mark the message as bounced
$point_of_no_return = 2; # now past the point where DSN was sent
build_and_save_structured_report($notification,'DSN');
} elsif ($n_smtp_resp =~ /^4/) {
die sprintf("temporarily unable to send DSN to <%s>: %s",
$msginfo->sender, $n_smtp_resp);
} else {
do_log(-1,"NOTICE: UNABLE TO SEND DSN to <%s>: %s",
$sender, $n_smtp_resp);
# # if dsn cannot be sent, try to send it to postmaster
# $notification->recips(['postmaster']);
# # attempt double bounce
# mail_dispatch($notification, 'Notif', 0);
}
# $notification->purge;
}
prolong_timer($which_section);
$elapsed->{'TimeElapsedDSN'} = Time::HiRes::time - $t0_sect;
$which_section = "snmp-counters"; $t0_sect = Time::HiRes::time;
{ # increment appropriate InMsgsStatus* SNMP counters and do some sanity
# checking along the way; also sets $msginfo->actions_performed
#
my($err, %which_counts);
my $orig = $msginfo->originating;
my $dsn_sent = $msginfo->dsn_sent; # 1=bounced, 2=suppressed
for my $r (@{$msginfo->per_recip_data}) {
my $which;
my $done = $r->recip_done; # 2=relayed to MTA, 1=faked deliv/quarant
my $dest = $r->recip_destiny;
my $resp_code = $smtp_resp; # per-msg status (one_response_for_all)
$resp_code = $r->recip_smtp_response if $dsn_per_recip_capable;
my $resp_class = substr($resp_code||'0', 0, 1);
if (!$done) {
$which = 'Accepted';
my $fwd_m = $r->delivery_method; # double-checking our sanity
if (defined $fwd_m && $fwd_m ne '') {
$err = "Recip not done, nonempty delivery method: $fwd_m";
}
} elsif ($resp_class !~ /^[245]\z/) {
$err = "Bad response code: $resp_code";
} elsif ($resp_class eq '4') {
$which = 'TempFailed';
} elsif ($resp_class eq '5' && $dest == D_REJECT) {
$which = 'Rejected';
} else { # $resp_class eq '2' || $resp_class eq '5' && $dest!=D_REJECT
# a 2xx SMTP response code is set both by internal Discard and
# by a genuine successful delivery. To distinguish between the two
# we need to check $r->recip_destiny
if ($done == 2) { # successful genuine forwarding
$which = $r->recip_tagged ? 'RelayedTagged' : 'RelayedUntagged';
$err = "Forwarded, but destiny not D_PASS? ($dest)"
if $dest != D_PASS;
$err = "Forwarded, but status not 2xx? ($resp_code)"
if $resp_class ne '2';
} elsif ($dest == D_DISCARD) { # forwarded to a bit bucket
$which = 'Discarded';
} elsif ( $dest == D_BOUNCE ||
($dest == D_REJECT && $resp_class eq '2') ) {
if ($dsn_sent && $dsn_sent == 1) {
$which = 'Bounced'; # genuine bounce (DSN) sent
} elsif ($dsn_sent) {
$which = 'NoBounce'; # bounce suppressed
} else { # sanity check
$err = "To be bounced, but DSN was neither sent nor suppressed?";
}
} elsif ($dest == D_REJECT) {
$which = 'Rejected';
$err = "Rejected, but status not 5xx? ($resp_code)"
if $resp_class ne '5';
} else { # sanity check
$err = "Recip forwarding suppressed but not DISCARD?";
}
}
$which = 'Unknown' if !defined $which;
$which_counts{$which}++; # counts status without a direction
$which_counts{'Relayed'}++ if $which eq 'RelayedTagged' ||
$which eq 'RelayedUntagged';
my $islocal = $r->recip_is_local;
if ($orig) {
if ($islocal) { $which_counts{$which.'Internal'}++ }
else { $which_counts{$which.'Outbound'}++ }
$which_counts{$which.'Originating'}++;
} else {
if ($islocal) { $which_counts{$which.'Inbound'}++ }
else { $which_counts{$which.'OpenRelay'}++ }
}
do_log(0, "unexpected status/result, please verify: %s, %s",
$err, $r->recip_addr_smtp) if defined $err;
}
my @which_list = sort keys %which_counts;
# prefer this status in the list first, before a 'Quarantined' entry;
# ignore a plain status name without mail direction to reduce clutter;
# ignore Originating, as it is always paired with Internal or Outbound
$msginfo->actions_performed([]) if !$msginfo->actions_performed;
unshift(@{$msginfo->actions_performed},
map(/^RelayedUntagged(.*)/ ? "Relayed$1" : $_, # short log name
grep(/(?:Inbound|Internal|Outbound|OpenRelay)\z/, @which_list)));
snmp_count('InMsgsStatus'.$_) for @which_list;
ll(3) && do_log(3, 'status counters: InMsgsStatus{%s}',
join(',', @which_list));
}
prolong_timer($which_section);
# merge similar timing entries
$elapsed->{'TimeElapsedSending'} = 0;
$elapsed->{'TimeElapsedSending'} +=
delete $elapsed->{$_} for ('TimeElapsedQuarantineAndNotify',
'TimeElapsedForwarding', 'TimeElapsedDSN');
$which_section = 'report';
eval { # protect the new code just in case
# structured_report returns a string as perl characters (not octets)
$report_ref = structured_report($msginfo); 1;
} or do {
chomp $@; do_log(-1,"structured_report failed: %s", $@);
};
section_time($which_section);
# generate customized log report at log level 0 - this is usually the
# only log entry interesting to administrators during normal operation
$which_section = 'main_log_entry';
my(%mybuiltins) = %builtins; # make a local copy
{ # do a per-message log entry
# macro %T has overloaded semantics, ugly
$mybuiltins{'T'} = $mybuiltins{'TESTSSCORES'};
my($y,$n,$f) = delivery_short_report($msginfo);
@mybuiltins{'D','O','N'} = ($y,$n,$f);
if (ll(0)) {
my $strr = expand(cr('log_templ'), \%mybuiltins);
for my $logline (split(/[ \t]*\n/, $$strr)) {
do_log(0, '%s', $logline) if $logline ne '';
}
}
}
if (c('log_recip_templ') ne '') { # do per-recipient log entries
# redefine some macros with a by-recipient semantics
my $j = 0;
for my $r (@{$msginfo->per_recip_data}) {
# recipient counter in macro %. may indicate to the template
# that a per-recipient expansion semantics is expected
$j++; $mybuiltins{'.'} = sprintf("%d",$j);
my $recip = $r->recip_addr;
my $qrecip_addr = scalar(qquote_rfc2821_local($recip));
my $remote_mta = $r->recip_remote_mta;
my $smtp_resp = $r->recip_smtp_response;
$mybuiltins{'remote_mta'} = $remote_mta;
$mybuiltins{'smtp_response'} = $smtp_resp;
$mybuiltins{'remote_mta_smtp_response'} =
$r->recip_remote_mta_smtp_response;
$mybuiltins{'D'} = $mybuiltins{'O'} = $mybuiltins{'N'} = undef;
if ($r->recip_destiny==D_PASS &&($smtp_resp=~/^2/ || !$r->recip_done)){
$mybuiltins{'D'} = $qrecip_addr;
} else {
$mybuiltins{'O'} = $qrecip_addr;
$mybuiltins{'N'} = sprintf("%s:%s\n %s", $qrecip_addr,
($remote_mta eq '' ?'' :" [$remote_mta] said:"), $smtp_resp);
}
my(@b); @b = @{$r->banned_parts} if defined $r->banned_parts;
my $b_chopped = @b > 2; @b = (@b[0,1],'...') if $b_chopped;
s/[ \t]{6,}/ ... /g for @b;
$mybuiltins{'banned_parts'} = \@b; # list of banned parts
$mybuiltins{'F'} = $r->banning_reason_short; # just one name & comment
$mybuiltins{'banning_rule_comment'} =
!defined($r->banning_rule_comment) ? undef
: unique_ref($r->banning_rule_comment);
$mybuiltins{'banning_rule_rhs'} =
!defined($r->banning_rule_rhs) ? undef
: unique_ref($r->banning_rule_rhs);
my $dn = $r->dsn_notify;
$mybuiltins{'dsn_notify'} =
uc(join(',', $sender eq '' ? 'NEVER' : !$dn ? 'FAILURE' : @$dn));
my($tag_level,$tag2_level,$kill_level);
if (!$r->bypass_spam_checks) {
$tag_level = lookup2(0,$recip, ca('spam_tag_level_maps'));
$tag2_level = lookup2(0,$recip, ca('spam_tag2_level_maps'));
$kill_level = lookup2(0,$recip, ca('spam_kill_level_maps'));
}
my $is_local = $r->recip_is_local;
my $do_tag = $r->is_in_contents_category(CC_CLEAN,1);
my $do_tag2 = $r->is_in_contents_category(CC_SPAMMY);
my $do_kill = $r->is_in_contents_category(CC_SPAM);
for ($do_tag,$do_tag2,$do_kill) { $_ = $_ ? 'Y' : '0' } # normalize
for ($is_local) { $_ = $_ ? 'L' : '0' } # normalize
for ($tag_level,$tag2_level,$kill_level) { $_ = 'x' if !defined($_) }
$mybuiltins{'R'} = $recip;
$mybuiltins{'c'} = $mybuiltins{'SCORE'} = $mybuiltins{'STARS'} =
sub { macro_score($msginfo, $j-1, @_) }; # info on one recipient
$mybuiltins{'T'} = $mybuiltins{'TESTSSCORES'} = $mybuiltins{'TESTS'} =
sub { macro_tests($msginfo, $j-1, @_)}; # info on one recipient
$mybuiltins{'tag_level'} = # replacement for deprecated %3
!defined($tag_level) ? '-' : 0+sprintf("%.3f",$tag_level);
$mybuiltins{'tag2_level'} = $mybuiltins{'REQD'} = # replacement for %4
!defined($tag2_level) ? '-' : 0+sprintf("%.3f",$tag2_level);
$mybuiltins{'kill_level'} = # replacement for deprecated %5
!defined($kill_level) ? '-' : 0+sprintf("%.3f",$kill_level);
@mybuiltins{('0','1','2','k')} = ($is_local,$do_tag,$do_tag2,$do_kill);
# macros %3, %4, %5 are deprecated, replaced by tag/tag2/kill_level
@mybuiltins{('3','4','5')} = ($tag_level,$tag2_level,$kill_level);
$mybuiltins{'ccat'} =
sub {
my($name,$attr,$which) = @_;
$attr = lc $attr; # name | major | minor | <empty>
# | is_blocking | is_nonblocking
# | is_blocked_by_nonmain
$which = lc $which; # main | blocking | auto
my $result = ''; my $blocking_ccat = $r->blocking_ccat;
if ($attr eq 'is_blocking') {
$result = defined($blocking_ccat) ? 1 : '';
} elsif ($attr eq 'is_nonblocking') {
$result = !defined($blocking_ccat) ? 1 : '';
} elsif ($attr eq 'is_blocked_by_nonmain') {
if (defined($blocking_ccat)) {
my $aref = $r->contents_category;
$result = 1 if ref($aref) && @$aref > 0
&& $blocking_ccat ne $aref->[0];
}
} elsif ($attr eq 'name') {
$result =
$which eq 'main' ?
$r->setting_by_main_contents_category(\%ccat_display_names)
: $which eq 'blocking' ?
$r->setting_by_blocking_contents_category(
\%ccat_display_names)
: $r->setting_by_contents_category( \%ccat_display_names);
} else { # attr = major, minor, or anything else returns a pair
my($maj,$min) = ccat_split(
($which eq 'blocking' ||
$which ne 'main' && defined $blocking_ccat)
? $blocking_ccat : $r->contents_category);
$result = $attr eq 'major' ? $maj
: $attr eq 'minor' ? sprintf("%d",$min)
: sprintf("(%d,%d)",$maj,$min);
}
$result;
};
my $strr = expand(cr('log_recip_templ'), \%mybuiltins);
for my $logline (split(/[ \t]*\n/, $$strr)) {
do_log(0, "%s", $logline) if $logline ne '';
}
}
}
section_time($which_section);
prolong_timer($which_section);
if (defined $os_fingerprint && $os_fingerprint ne '') {
$which_section = 'log_p0f';
# log and collect statistics on contents type vs. OS
my $spam_ham_thd = 2.0; # reasonable threshold guesstimate
local($1); my $os_short; # extract operating system name when avail.
$os_short = $1 if $os_fingerprint =~ /^([^,([]*)/;
$os_short = $1 if $os_short =~ /^[ \t,-]*(.*?)[ \t,-]*\z/;
my $snmp_counter_name;
if ($os_short ne '') {
$os_short = $1 if $os_short =~ /^(Windows [^ ]+|[^ ]+)/; # drop vers.
$os_short =~ s{[^0-9A-Za-z:./_+-]}{-}g; $os_short =~ s{\.}{,}g;
$snmp_counter_name = $msginfo->setting_by_contents_category(
{ CC_VIRUS,'virus', CC_BANNED,'banned',
CC_SPAM,'spam', CC_SPAMMY,'spammy', CC_CATCHALL,'clean' });
if ($snmp_counter_name eq 'clean') {
$snmp_counter_name = $max_spam_level <= $spam_ham_thd ?'ham' : undef;
}
if (defined $snmp_counter_name) {
snmp_count("$snmp_counter_name.byOS.$os_short");
if ($snmp_counter_name eq 'ham' &&
$os_fingerprint =~ /^Windows XP(?![^(]*\b2000 SP)/) {
do_log(3, 'Ham from Windows XP? Most weird! %s [%s] score=%.3f',
$mail_id||'', $cl_ip, $max_spam_level);
}
}
}
do_log(2, "OS_fingerprint: %s %s %s.%s - %s",
$msginfo->client_addr, $max_spam_level,
defined $snmp_counter_name ? $snmp_counter_name : 'x',
$os_short, $os_fingerprint);
}
if ($redis_storage && defined $msginfo->mail_id) {
$which_section = 'redis-update';
# save final information to Redis
eval {
$redis_storage->save_info_final($msginfo,$report_ref); 1;
} or do {
chomp $@; do_log(-1, 'save_info_final failed, Redis error: %s', $@);
};
section_time($which_section);
}
if ($sql_storage && defined $msginfo->mail_id) {
# save final information to SQL (if enabled)
$which_section = 'sql-update';
for (my $attempt=5; $attempt>0; ) { # sanity limit on retries
if ($sql_storage->save_info_final($msginfo,$report_ref)) {
last;
} elsif (--$attempt <= 0) {
do_log(-2,"ERROR sql_storage: too many retries ".
"on storing final, info not saved");
} else {
do_log(2,"sql_storage: retrying on final, %d attempts remain",
$attempt);
sleep(int(1+rand(3))); # can't mix Time::HiRes::sleep with alarm
}
};
section_time($which_section);
}
if (ll(2)) { # log SpamAssassin timing report if available
my $sa_tim = $msginfo->supplementary_info('TIMING');
if (defined $sa_tim && $sa_tim ne '') {
my $sa_rusage = $msginfo->supplementary_info('RUSAGE-SA');
if ($sa_rusage && @$sa_rusage) {
local $1; my $sa_cpu_sum = 0; $sa_cpu_sum += $_ for @$sa_rusage;
$sa_tim =~ s{^(total [0-9.]+ ms)}
{sprintf("[%s, cpu %.0f ms]", $1, $sa_cpu_sum*1000)}se;
}
do_log(2, "TIMING-SA %s", $sa_tim);
}
}
if ($snmp_db || $zmq_obj) {
$which_section = 'update_snmp';
my($log_lines, $log_entries_by_level_ref,
$log_retries, $log_status_counts_ref) = collect_log_stats();
snmp_count( ['LogLines', $log_lines, 'C64'] );
my $log_entries_all_cnt = 0;
for my $level_str (keys %$log_entries_by_level_ref) {
my $level = 0+$level_str;
my $cnt = $log_entries_by_level_ref->{$level_str};
$log_entries_all_cnt += $cnt;
# snmp_count( ['LogEntriesEmerg', $cnt, 'C64'] ); # not in use
# snmp_count( ['LogEntriesAlert', $cnt, 'C64'] ); # not in use
snmp_count( ['LogEntriesCrit', $cnt, 'C64'] ) if $level <= -3;
snmp_count( ['LogEntriesErr', $cnt, 'C64'] ) if $level <= -2;
snmp_count( ['LogEntriesWarning', $cnt, 'C64'] ) if $level <= -1;
snmp_count( ['LogEntriesNotice', $cnt, 'C64'] ) if $level <= 0;
snmp_count( ['LogEntriesInfo', $cnt, 'C64'] ) if $level <= 1;
snmp_count( ['LogEntriesDebug', $cnt, 'C64'] );
if ($level < 0) { $level_str = "0" }
elsif ($level > 5) { $level_str = "5" }
snmp_count( ['LogEntriesLevel'.$level_str, $cnt, 'C64'] );
}
snmp_count( ['LogEntries', $log_entries_all_cnt, 'C64'] );
if ($log_retries > 0) {
snmp_count( ['LogRetries', $log_retries, 'C64'] );
do_log(3,"Syslog retries: %d x %s", $log_status_counts_ref->{$_}, $_)
for (keys %$log_status_counts_ref);
}
snmp_count( ['entropy',0,'STR'] );
$elapsed->{'TimeElapsedTotal'} = Time::HiRes::time - $msginfo->rx_time;
# Will end up as SNMPv2-TC TimeInterval (INTEGER), units of 0.01 seconds,
# but we keep it in milliseconds in the bdb database!
# Note also the use of C32 instead of INT, we want cumulative time.
snmp_count([$_, int(1000*$elapsed->{$_}+0.5), 'C32']) for keys %$elapsed;
$snmp_db->update_snmp_variables if $snmp_db;
$zmq_obj->update_snmp_variables if $zmq_obj;
section_time($which_section);
}
if (ref $custom_object) {
$which_section = "custom-mail_done";
eval {
$custom_object->mail_done($conn,$msginfo);
update_current_log_level(); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"custom mail_done error: %s", $eval_stat);
};
section_time($which_section);
}
$which_section = 'finishing';
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$preserve_evidence = 1 if $allow_preserving_evidence;
my $msg = "$which_section FAILED: $eval_stat";
if ($point_of_no_return) {
do_log(-2, "TROUBLE in check_mail, but must continue (%s): %s",
$point_of_no_return, $msg);
} else {
do_log(-2, "TROUBLE in check_mail: %s", $msg);
undef $smtp_resp; # to be provided below
}
if (!defined($smtp_resp)) {
$smtp_resp = "451 4.5.0 Error in processing, id=$am_id, $msg";
$exit_code = EX_TEMPFAIL;
for my $r (@{$msginfo->per_recip_data}) {
next if $r->recip_done;
$r->recip_smtp_response($smtp_resp); $r->recip_done(1);
}
}
};
# if (defined $hold && $hold ne '') {
# do_log(-1, "NOTICE: Evidence is to be preserved: %s", $hold);
# $preserve_evidence = 1 if $allow_preserving_evidence;
# }
if (!$preserve_evidence && debug_oneshot()) {
do_log(0, "DEBUG_ONESHOT CAUSES EVIDENCE TO BE PRESERVED");
$preserve_evidence = 1; # regardless of $allow_preserving_evidence
}
if ($redis_storage &&
$redis_logging_queue_size_limit && c('redis_logging_key') ) {
if ($report_ref) { # already have it
# last-minute update of the "elapsed" field
structured_report_update_time($report_ref);
} else { # prepare the log report
eval { # protect the new code just in case
# structured_report returns a string as perl characters (not octets)
$report_ref = structured_report($msginfo); 1;
} or do {
chomp $@; do_log(-1, 'structured_report failed: %s', $@);
};
}
eval {
$redis_storage->save_structured_report($report_ref,
c('redis_logging_key'), $redis_logging_queue_size_limit); 1;
} or do {
chomp $@; do_log(-1, 'save_structured_report failed: %s', $@);
};
}
$zmq_obj->register_proc(1,0,'.') if $zmq_obj; # content checking done
$snmp_db->register_proc(1,0,'.') if $snmp_db;
do_log(-1, "signal: %s", join(', ',keys %got_signals)) if %got_signals;
undef $MSGINFO; # release global reference
($smtp_resp, $exit_code, $preserve_evidence);
} # end check_mail
# ROT13 obfuscation (Caesar cipher)
# (possibly useful as a weak privacy measure when analyzing logs)
#
sub rot13 {
my $str = $_[0];
$str =~ tr/a-zA-Z/n-za-mN-ZA-M/;
$str;
}
# Assemble a structured report, suitable for JSON serialization, useful
# in save_info_final(). Resulting string is in Perl logical characters
# (not necessarily with UTF8 flag set if all-ASCII).
#
sub structured_report($;$) {
my($msginfo, $notification_type) = @_;
my(@recipients); # per-recipient records
my(@queued_as_list); # list of unique MTA queue IDs of forwarded mail
my(@smtp_status_code_list); # list of unique SMTP responses
my(@destiny_list); # list of destiny names
my(@mail_id_related); # list of related mail_id's according to penpals
my(%spam_test_names);
my $true = Amavis::JSON::boolean(1);
local($1,$2);
my $sender_smtp = $msginfo->sender_smtp;
$sender_smtp =~ s/^<(.*)>\z/$1/s;
my(@rcpt_smtp) = map($_->recip_addr_smtp, @{$msginfo->per_recip_data});
s/^<(.*)>\z/$1/s for @rcpt_smtp;
my $h_sender = $msginfo->rfc2822_sender; # undef or scalar
my $h_from = $msginfo->rfc2822_from; # undef, scalar or listref
my $h_to = $msginfo->rfc2822_to; # undef, scalar or listref
my $h_cc = $msginfo->rfc2822_cc; # undef, scalar or listref
my(@arr_h_from, @arr_h_to, @arr_h_cc);
@arr_h_from = ref $h_from ? @$h_from : $h_from if defined $h_from;
@arr_h_to = ref $h_to ? @$h_to : $h_to if defined $h_to;
@arr_h_cc = ref $h_cc ? @$h_cc : $h_cc if defined $h_cc;
# Message-ID can contain an international domain name with A-labels
my(@arr_m_id, @arr_refs);
my $m_id = $msginfo->get_header_field_body('message-id');
@arr_m_id = parse_message_id($m_id) if defined $m_id && $m_id ne '';
my $h_refs = $msginfo->references;
@arr_refs = @$h_refs if $h_refs;
$_ = mail_addr_decode($_) for (@arr_m_id, @arr_refs,
$sender_smtp, @rcpt_smtp, $h_sender,
@arr_h_from, @arr_h_to, @arr_h_cc);
my $j = 0;
for my $r (@{$msginfo->per_recip_data}) {
my $recip_smtp = $rcpt_smtp[$j++]; # already processed for UTF-8
my $orig_rcpt = $r->dsn_orcpt; # RCPT command ORCPT option, RFC 3461
if (defined $orig_rcpt) {
my($addr_type, $addr) = orcpt_encode($orig_rcpt,1); # to octets
# is orcpt redundant?
$orig_rcpt = defined $recip_smtp && $addr eq $recip_smtp ? undef
: safe_decode_utf8($addr); # to characters
}
my $dest = $r->recip_destiny;
my $resp = $r->recip_smtp_response;
my $rem_smtp_resp = $r->recip_remote_mta_smtp_response;
my($queued_as, $resp_code, $resp_code_enh);
$queued_as = $1 if defined $rem_smtp_resp &&
$rem_smtp_resp =~ /\bqueued as ([0-9A-Za-z]+)$/;
($resp_code, $resp_code_enh) = ($1,$2)
if $resp =~ /^(\d{3}) (?: [ \t]+ ([245] \. \d{1,3} \. \d{1,3}) \b)? /xs;
my $d = $resp=~/^4/ ? 'TEMPFAIL'
: ($dest==D_BOUNCE && $resp=~/^5/) ? 'BOUNCE'
: ($dest!=D_BOUNCE && $resp=~/^5/) ? 'REJECT'
: ($dest==D_DISCARD) ? 'DISCARD'
: ($dest==D_PASS && ($resp=~/^2/ || !$r->recip_done))
? ($notification_type ? $notification_type : 'PASS') : '?';
push(@destiny_list, $d);
push(@smtp_status_code_list, $resp_code);
push(@queued_as_list, $queued_as) if defined $queued_as;
my $rid = $r->recip_maddr_id; # may be undefined
my $o_rid = $r->recip_maddr_id_orig; # may be undefined
my $banning_reason_short = $r->banning_reason_short;
my $spam_level = $r->spam_level;
my $user_policy_id = $r->user_policy_id;
my $ccat_blk_name =
$r->setting_by_blocking_contents_category(\%ccat_display_names);
my $ccat_main_name =
$r->setting_by_main_contents_category(\%ccat_display_names);
if (!defined $ccat_main_name ||
# ($ccat_main_name =~ /^(?:Clean|CatchAll)\z/s) ||
(defined $ccat_blk_name && $ccat_main_name eq $ccat_blk_name)) {
# not worth reporting main ccat if the same as blocking ccat (or clean?)
undef $ccat_main_name;
}
my $spam_tests = $r->spam_tests; # arrayref of scalar refs
if ($spam_tests) {
for my $test_name_val (split(/,/,join(',',map($$_,@$spam_tests)))) {
my($tname, $tscore) = split(/=/, $test_name_val, 2);
$spam_test_names{$tname} = max($tscore, $spam_test_names{$tname});
}
}
my $penpals_age = $r->recip_penpals_age; # penpals age in seconds, or undef
my $penpals_related = $r->recip_penpals_related;
push(@mail_id_related, $penpals_related) if defined $penpals_related;
my(%recip) = (
rcpt_to => $recip_smtp,
defined $orig_rcpt ? (rcpt_to_orig => $orig_rcpt) : (),
defined $rid ? (rid => $rid) : (),
defined $o_rid ? (rid_orig => Amavis::JSON::numeric($o_rid)) : (),
rcpt_is_local => Amavis::JSON::boolean($r->recip_is_local),
defined $user_policy_id ? (sql_user_policy_id => $user_policy_id) : (),
action => $d, # i.e. destiny
defined $resp ? (smtp_response => $resp) : (),
defined $resp_code ? (smtp_code => $resp_code) : (),
# defined $resp_code_enh ? (smtp_code_enh => $resp_code_enh) : (),
defined $queued_as ? (queued_as => $queued_as) : (),
!defined $spam_level ? ()
: (spam_score => Amavis::JSON::numeric(sprintf("%.3f",$spam_level))),
$r->recip_blacklisted_sender ? (blacklisted => $true) : (),
$r->recip_whitelisted_sender ? (whitelisted => $true) : (),
$r->bypass_virus_checks ? (bypass_virus_checks => $true) : (),
$r->bypass_banned_checks ? (bypass_banned_checks => $true) : (),
$r->bypass_spam_checks ? (bypass_spam_checks => $true) : (),
defined $ccat_blk_name ? (ccat_blocking => $ccat_blk_name) : (),
defined $ccat_main_name ? (ccat_main => $ccat_main_name) : (),
$banning_reason_short ? (banning_reason => $banning_reason_short) : (),
defined $penpals_related ? (mail_id_related => $penpals_related) : (),
!defined $penpals_age ? ()
: (penpals_age => Amavis::JSON::numeric(int($penpals_age))),
# recip_tagged # was tagged by address extension or Subject or X-Spam
);
push(@recipients, \%recip);
}
my $q_type = $msginfo->quar_type;
# only keep the first quarantine type used (e.g. ignore archival quar.)
$q_type = $q_type->[0] if ref $q_type;
my $q_to = $msginfo->quarantined_to; # ref to a list of quar. locations
if (!$q_to || !@$q_to) { undef $q_to }
else {
$q_to = $q_to->[0]; # keep only the first quarantine location
$q_to =~ s{^\Q$QUARANTINEDIR\E/}{}; # strip directory name
}
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
my(@test_names_spam_topdown) =
sort { $spam_test_names{$b} <=> $spam_test_names{$a} }
grep($spam_test_names{$_} > 0, keys %spam_test_names);
my(@test_names_ham_bottomup) =
sort { $spam_test_names{$a} <=> $spam_test_names{$b} }
grep($spam_test_names{$_} < 0, keys %spam_test_names);
my $useragent = $msginfo->get_header_field_body('user-agent');
$useragent = $msginfo->get_header_field_body('x-mailer') if !$useragent;
$useragent =~ s/^\s*(.*?)\s*\z/$1/s if $useragent;
my $subj = $msginfo->get_header_field_body('subject');
my $from = $msginfo->get_header_field_body('from'); # raw full field
for ($subj,$from) { # character set decoding, unfolding
chomp; s/\n(?=[ \t])//gs; s/^[ \t]+//s; s/[ \t]+\z//s; # unfold, trim
$_ = safe_decode_mime($_); # to logical characters
}
my($conn, $src_ip, $dst_ip, $dst_port, $appl_proto);
$conn = $msginfo->conn_obj;
if ($conn) { # MTA -> amavisd
$src_ip = $conn->client_ip; # immediate client IP addr, i.e. our MTA
$dst_ip = $conn->socket_ip; # IP address of our receiving socket
$dst_port = $conn->socket_port; # port number of our receiving socket
$appl_proto = $conn->appl_proto; # protocol - the 'WITH' field
}
my $client_addr = $msginfo->client_addr; # SMTP client -> MTA
my $client_port = $msginfo->client_port; # SMTP client -> MTA
my $trace_ref = $msginfo->trace; # "Received" trace entries (hashrefs)
my $ip_trace_public = $msginfo->ip_addr_trace_public; # "Received" IP trace
my $checks_performed = $msginfo->checks_performed;
$checks_performed = join(' ', grep($checks_performed->{$_},
qw(V S H B F P D))) if $checks_performed;
my $actions_performed = $msginfo->actions_performed;
$actions_performed = join(' ', @$actions_performed) if $actions_performed;
@destiny_list = unique_list(\@destiny_list);
my $partition_tag = $msginfo->partition_tag;
my $sid = $msginfo->sender_maddr_id;
my $policy_bank_path = c('policy_bank_path');
my $is_mlist = $msginfo->is_mlist;
$is_mlist =~ s/^ml:(?=.)//s if $is_mlist; # strip ml: prefix
my $os_fp = $msginfo->client_os_fingerprint;
my $dsn_sent = $msginfo->dsn_sent;
my $queue_id = $msginfo->queue_id;
@queued_as_list = unique_list(\@queued_as_list);
@smtp_status_code_list = unique_list(\@smtp_status_code_list);
my $dkim_author_sig = $msginfo->dkim_author_sig;
my $dkim_sigs_new_ref = $msginfo->dkim_signatures_new;
my $dkim_sigs_ref = $msginfo->dkim_signatures_valid;
my(@dkim_sigs_valid, @dkim_sigs_new); # domain names, IDN-decoded
@dkim_sigs_valid = unique_list(map(idn_to_utf8($_->domain),
@$dkim_sigs_ref)) if $dkim_sigs_ref;
@dkim_sigs_new = unique_list(map(idn_to_utf8($_->domain),
@$dkim_sigs_new_ref)) if $dkim_sigs_new_ref;
my $vn = $msginfo->virusnames;
undef $vn if $vn && !@$vn;
my(%scanners_report); # per-scanner report of virus names found
if ($vn) {
for (@av_scanners_results) {
my($av, $status, @virus_names) = @$_;
my $scanner = $av && $av->[0];
if ($status && defined $scanner) {
$scanner =~ tr/"/'/; # sanitize scanner name for json
$scanner =~ tr/\x00-\x1F\x7F\x80-\x9F\\/ /;
$scanners_report{$scanner} = \@virus_names;
}
}
}
my $rx_time = $msginfo->rx_time;
my $mjd = $rx_time/86400 + 40587; # Modified Julian Day, float
my($iso8601_year, $iso8601_wn) = iso8601_year_and_week($rx_time);
my(%elapsed);
if (!$notification_type) {
my $elapsed_ref = $msginfo->time_elapsed;
if ($elapsed_ref) {
while (my($k,$v) = each(%$elapsed_ref)) {
next if $k eq 'TimeElapsedPenPals'; # quick, don't bother
$k =~ s/^TimeElapsed//;
$elapsed{$k} = $v; # cast to numeric later down
}
}
}
my(%result) = (
type => 'amavis',
host => safe_decode_utf8(idn_to_utf8(c('myhostname'))),
log_id => $msginfo->log_id,
# secret_id => $msginfo->secret_id,
mail_id => $msginfo->mail_id,
!defined $msginfo->parent_mail_id ? () :
(mail_id_parent => $msginfo->parent_mail_id),
@mail_id_related ? (mail_id_related => \@mail_id_related) : (),
defined $src_ip ? (src_ip => $src_ip) : (),
defined $dst_ip ? (dst_ip => $dst_ip) : (),
$dst_port ? (dst_port => Amavis::JSON::numeric($dst_port)) : (),
defined $client_addr ? (client_ip => $client_addr) : (),
$client_port ? (client_port => Amavis::JSON::numeric($client_port)) : (),
defined $partition_tag ? (partition => $partition_tag) : (),
defined $queue_id && $queue_id ne '' ? (queue_id => $queue_id) : (),
defined $sid ? (sid => $sid) : (),
defined $appl_proto ? (protocol => $appl_proto) : (),
# addresses from SMTP envelope:
mail_from => $sender_smtp,
rcpt_to => \@rcpt_smtp, # list of recipient addresses
rcpt_num => Amavis::JSON::numeric(scalar @rcpt_smtp), # num. of recips
recipients => \@recipients, # list of hashes
# addresses from mail header:
!defined $h_sender ? () : (sender => $h_sender),
$h_from ? (author => \@arr_h_from) : (),
$h_to ? (to_addr => \@arr_h_to) : (),
$h_cc ? (cc_addr => \@arr_h_cc) : (),
# defined $from ? (from_raw => $from) : (),
defined $subj ? (subject => $subj) : (),
defined $subj ? (subject_rot13 => rot13($subj)) : (),
defined $m_id ? (message_id => join(' ',@arr_m_id)) : (),
@arr_refs ? (references => \@arr_refs) : (),
defined $useragent ? (user_agent => $useragent) : (),
!defined $policy_bank_path ? ()
: (policy_banks => [ split(m{/}, $policy_bank_path) ]),
$ip_trace_public ? (ip_trace => [ @$ip_trace_public ]) : (),
!$trace_ref || !@$trace_ref ? ()
: (ip_proto_trace => [ map( (!$_->{with} ? '' : $_->{with}.'://') .
(!$_->{ip} ? 'x' : !$_->{port} ? $_->{ip}
: '['.$_->{ip}.']:'.$_->{port}),
@$trace_ref) ]),
!$msginfo->msg_size ? ()
: (size => Amavis::JSON::numeric(0+$msginfo->msg_size)),
!$msginfo->body_digest ? ()
: (digest_body => $msginfo->body_digest),
content_type => # blocking ccat if blocked, main ccat otherwise
$msginfo->setting_by_contents_category(\%ccat_display_names),
defined $q_to ? (quarantine => $q_to) : (),
defined $q_type ? (quar_type => $q_type) : (),
!defined $max_spam_level ? ()
: (spam_score => Amavis::JSON::numeric(sprintf("%.3f",$max_spam_level))),
$notification_type ? () : (dsn_sent => Amavis::JSON::boolean($dsn_sent==1)),
originating => Amavis::JSON::boolean($msginfo->originating),
defined $os_fp && $os_fp ne '' ? (os_fp => $os_fp) : (),
defined $actions_performed ? (actions_performed => $actions_performed): (),
defined $checks_performed ? (checks_performed => $checks_performed) : (),
$vn ? (virusnames => unique_ref($vn)) : (),
$vn ? (av_scan => \%scanners_report) : (),
# %spam_test_names ? (tests => { %spam_test_names }) : (),
!%spam_test_names ? () : (
tests => [ sort keys %spam_test_names ], # alphabetically
tests_spam => \@test_names_spam_topdown, # > 0, largest first
tests_ham => \@test_names_ham_bottomup, # < 0, smallest first
),
$msginfo->is_auto ? (is_auto_resp => $true) : (), # is an auto-response
$msginfo->is_mlist? (is_mlist => $true) : (), # is a mailing list
$msginfo->is_bulk ? (is_bulk => $true) : (), # bulk or m.list or auto-resp
@dkim_sigs_valid ? (dkim_valid_sig => \@dkim_sigs_valid) : (),
@dkim_sigs_new ? (dkim_new_sig => \@dkim_sigs_new) : (),
defined $dkim_author_sig ? (dkim_author_sig => $dkim_author_sig) : (),
!@smtp_status_code_list ? () : (smtp_code => \@smtp_status_code_list),
!@queued_as_list ? () : (queued_as => \@queued_as_list),
action => \@destiny_list,
message => # a brief report
sprintf("%s %s %s %s -> %s",
$msginfo->log_id, join(',', @destiny_list),
$msginfo->setting_by_contents_category(\%ccat_display_names),
$sender_smtp, join(',', @rcpt_smtp)),
time_unix => # UNIX time to millisecond precision
Amavis::JSON::numeric(sprintf("%.3f", $rx_time)),
# time_mjd => # Modified Julian Day to millisecond precision
# Amavis::JSON::numeric(sprintf("%14.8f", $mjd)),
'@timestamp' => iso8601_utc_timestamp($rx_time,undef,undef,1,1),
time_iso_week_date => sprintf("%04d-W%02d-%d",
$iso8601_year, # ISO week-numbering year
$iso8601_wn, # ISO week number 1..53
iso8601_weekday($rx_time)), # 1..7, Mo=1, localtime
!%elapsed ? () : (elapsed => \%elapsed),
);
if (%elapsed) {
# last-minute update of total elapsed time, cast to numeric
my $el = $result{elapsed};
$el->{Total} = get_time_so_far();
$el->{Amavis} = $el->{Total}-($el->{SpamCheck}||0)-($el->{VirusCheck}||0);
$el->{$_} = Amavis::JSON::numeric(sprintf("%.3f",$el->{$_})) for keys %$el;
}
\%result;
}
# Last-minute update of total elapsed time
#
sub structured_report_update_time($) {
my $report_ref = $_[0];
if ($report_ref->{elapsed}) {
# just Total, does not adjust $report_ref->{elapsed}{Amavis}
$report_ref->{elapsed}{Total} =
Amavis::JSON::numeric(sprintf("%.3f", get_time_so_far()));
}
$report_ref;
}
sub build_and_save_structured_report($$) {
my($msginfo, $notification_type) = @_;
if ($redis_storage &&
$redis_logging_queue_size_limit && c('redis_logging_key') ) {
do_log(5,'build_and_save_structured_report on %s', $notification_type);
eval { # protect the new code just in case
$redis_storage->save_structured_report(
structured_report($msginfo, $notification_type),
c('redis_logging_key'), $redis_logging_queue_size_limit);
1;
} or do {
chomp $@; do_log(-1, 'save_structured_report failed: %s', $@);
};
}
}
# Ensure we have $msginfo->$entity defined when we expect we'll need it,
#
sub ensure_mime_entity($) {
my $msginfo = $_[0];
my($ent,$mime_err);
if (!defined($msginfo->mime_entity)) {
my $msg = $msginfo->mail_text;
if (IO::File->VERSION >= 1.10) { # see mime_decode() for explanation
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
}
($ent,$mime_err) = mime_decode($msg, $msginfo->mail_tempdir,
$msginfo->parts_root);
$msginfo->mime_entity($ent);
prolong_timer('mime_decode');
}
$mime_err;
}
# Check if a message is a bounce, and if it is, try to obtain essential
# information from a header section of an attached original message,
# primarily the Message-ID.
#
sub inspect_a_bounce_message($) {
my $msginfo = $_[0];
my(%header_field,$bounce_type); my $is_true_bounce = 0;
my $parts_root = $msginfo->parts_root;
if (!defined($parts_root)) {
do_log(5, 'inspect_dsn: no parts root');
} else {
my $sender = $msginfo->sender;
my $structure_type = '?';
my $top_main; my $top = $parts_root->children;
for my $e (!$top ? () : @$top) {
# take a main message component, ignoring preamble/epilogue MIME parts
# and pseudo components such as a fabricated 'MAIL' (i.e. a copy of
# entire message for the benefit of some virus scanners)
my($name, $type) = ($e->name_declared, $e->type_declared);
next if !defined $type && defined $name &&
($name eq 'preamble' || $name eq 'epilogue');
next if $e->type_short eq 'MAIL' && defined $type &&
$type =~ m{^message/(?:rfc822|global)\z}si;
$top_main = $e; last;
}
my(@parts); my $fname_ind; my $plaintext = 0;
if (defined $top_main) { # one level only
my $ch = $top_main->children;
@parts = ($top_main, !$ch ? () : @$ch);
}
my(@t) =
map { my $t = $_->type_declared; lc(ref $t ? $t->[0] : $t) } @parts;
ll(5) && do_log(5, "inspect_dsn: parts: %s", join(", ",@t));
my $fm = $msginfo->rfc2822_from;
my(@rfc2822_from) = !defined $fm ? () : ref $fm ? @$fm : $fm;
my $p0_report_type;
$p0_report_type = $parts[0]->report_type if @parts;
$p0_report_type = lc $p0_report_type if defined $p0_report_type;
if ( @parts >= 2 && @parts <= 4 &&
$t[0] eq 'multipart/report' && # RFC 6522
( $t[2] eq 'message/delivery-status' || # RFC 3464
$t[2] eq 'message/global-delivery-status' || # RFC 6533
$t[2] eq 'message/disposition-notification' || # RFC 3798
$t[2] eq 'message/global-disposition-notification' || # RFC 6533
$t[2] eq 'message/feedback-report' # RFC 5965
) &&
defined $p0_report_type && $t[2] eq 'message/'.$p0_report_type &&
$t[3] =~ m{^ (?: text/rfc822-headers | # RFC 6522
message/(?: rfc822-headers | global-headers |
rfc822 | global | partial )) \z}xs
# message/rfc822-headers and message/partial are nonstandard
)
{ # standard DSN or MDN or feedback-report
$bounce_type = $t[2] eq 'message/disposition-notification' ? 'MDN'
: $t[2] eq 'message/global-disposition-notification' ? 'MDN'
: $t[2] eq 'message/feedback-report' ? 'ARF' : 'DSN';
$structure_type = 'standard ' . $bounce_type;
$fname_ind = $#parts; $is_true_bounce = 1;
} elsif ( @parts == 5 &&
$t[0] eq 'multipart/report' &&
$t[-2] eq 'message/delivery-status' &&
defined $p0_report_type && $t[-2] eq 'message/'.$p0_report_type &&
$t[-1] =~ m{^ (?: text/rfc822-headers |
message/(?: global-headers|rfc822|global )) \z}xs
) { # almost standard DSN, has two leading plain text parts
$bounce_type = 'DSN'; # BorderWare Security Platform
$structure_type = 'standard ' . $bounce_type;
$fname_ind = $#parts; $is_true_bounce = 1;
} elsif ( @parts >= 2 && @parts <= 4 &&
$t[0] eq 'multipart/report' &&
$t[2] eq 'message/delivery-status' &&
defined $p0_report_type && $t[2] eq 'message/'.$p0_report_type &&
$t[3] eq 'text/plain' ) {
# nonstandard DSN, missing header, unless it is stashed in text/plain
$fname_ind = 3; $structure_type = 'nostandard DSN-plain';
$plaintext = 1; $bounce_type = 'DSN';
} elsif (@parts >= 3 && @parts <= 4 && # a root with 2 or 3 leaves
$t[0] eq 'multipart/report' &&
defined $p0_report_type && $p0_report_type eq 'delivery-status' &&
$t[-1] =~ m{^ (?: text/rfc822-headers |
message/(?: global-headers|rfc822|global )) \z}xs)
{ # not quite std. DSN (missing message/delivery-status), but recognizable
$fname_ind = -1; $is_true_bounce = 1; $bounce_type = 'DSN';
$structure_type = 'DSN, missing delivery-status part';
} elsif (@parts >= 3 && @parts <= 5 &&
$t[0] eq 'multipart/mixed' &&
$t[-1] =~ m{^ (?: text/rfc822-headers |
message/(?: global-headers|rfc822|global|
rfc822-headers )) \z}xs &&
( $rfc2822_from[0] =~ /^MAILER-DAEMON(?:\@|\z)/si ||
$msginfo->get_header_field_body('subject') =~
/\b(?:Delivery Failure Notification|failure notice)\b/
) ) {
# qmail, msn?, mailman, C/R
$fname_ind = -1;
$structure_type = 'multipart/mixed(' . $msginfo->is_bulk . ')';
} elsif ( $msginfo->is_auto && $sender eq '' &&
# notify@yahoogroups.com notify@yahoogroupes.fr
$rfc2822_from[0] =~ /^notify\@yahoo/si &&
@parts >= 3 && @parts <= 5 &&
$t[0] eq 'multipart/mixed' &&
$t[-1] =~ m{^ (?: text/rfc822-headers |
message/(?: global-headers|rfc822|global ))
\z}xs ) {
$fname_ind = -1;
$structure_type = 'multipart/mixed(yahoogroups)';
} elsif ( $msginfo->is_auto && $sender eq '' &&
@parts == 1 && $t[0] ne 'multipart/report' &&
$rfc2822_from[0] =~ /^(?:MAILER-DAEMON|postmaster)(?:\@|\z)/si
) {
# nonstructured, possibly a non-standard bounce (qmail, gmail.com, ...)
$fname_ind = 0; $plaintext = 1;
$structure_type = 'nonstructured(' . $msginfo->is_auto . ')';
# } elsif ( $msginfo->is_auto && $sender eq '' &&
# ( grep($_->recip_addr eq 'xxx@example.com', # victim
# @{$msginfo->per_recip_data}) ) ) {
# # nonstructured, possibly a non-standard bounce
# $fname_ind = 0; $plaintext = 1; $is_true_bounce = 1;
# $structure_type = 'nonstructured, unknown';
# $bounce_type = 'INFO';
# } elsif (@parts == 3 &&
# $t[0] eq 'multipart/mixed' &&
# $t[-1] eq 'application/octet-stream' &&
# $parts[-1]->name_declared =~ /\.eml\z/) {
# # MDaemon; too permissive! test for postmaster or mailer-daemon ?
# $fname_ind = -1;
# $structure_type = 'multipart/mixed with binary .eml';
# } elsif ( $msginfo->is_auto && @parts == 2 &&
# $t[0] eq 'multipart/mixed' && $t[1] eq 'text/plain' ) {
# # nonstructured, possibly a broken bounce
# $fname_ind = 1; $plaintext = 1;
# $structure_type = $t[0] .' with '. $t[1] .'(' . $msginfo->is_auto .')';
# } elsif ( $msginfo->is_auto && @parts == 3 &&
# $t[0] eq 'multipart/alternative' &&
# $t[1] eq 'text/plain' && $t[2] eq 'text/html' ) {
# # text/plain+text/html, possibly a challenge CR message
# $fname_ind = 1; $plaintext = 1;
# $structure_type = $t[0] .' with '. $t[1] .'(' . $msginfo->is_auto .')';
}
if (defined $fname_ind && defined $parts[$fname_ind]) {
# we probably have a header section from original mail, scan it
$fname_ind = $#parts if $fname_ind == -1;
my $fname = $parts[$fname_ind]->full_name;
ll(5) && do_log(5,'inspect_dsn: struct: "%s", basenm(%s): %s, fname: %s',
$structure_type, $fname_ind, $parts[$fname_ind]->base_name, $fname);
if (defined $fname) {
my(%collectable_header_fields);
$collectable_header_fields{lc($_)} = 1
for qw(From To Return-Path Message-ID Date Received Subject
MIME-Version Content-Type);
my $fh = IO::File->new;
$fh->open($fname,'<') or die "Can't open file $fname: $!";
binmode($fh,':bytes') or die "Can't cancel :utf8 mode: $!";
my $have_header_fields_cnt = 0; my $nonheader_cnt = 0;
my($curr_head,$ln); my $nr = 0; my $eof = 0; local($1,$2);
my $line_limit = $plaintext ? 200 : 1000;
for (;;) {
if ($eof) {
$ln = "\n"; # fake a missing header/body separator line
} else {
$! = 0; $ln = $fh->getline;
if (!defined($ln)) {
$eof = 1; $ln = "\n";
$! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(1,"Error reading mail header section: $!")
: die "Error reading mail header section: $!";
}
}
last if ++$nr > $line_limit; # safety measure
if ($ln =~ /^[ \t]/) { # folded
$curr_head .= $ln if length($curr_head) < 2000; # safety measure
} else { # a new header field, process previous if any
if (defined $curr_head) {
$curr_head =~ s/^[> ]+// if $plaintext;
# be more conservative on accepted h.f.name than RFC 5322 allows
# the '_' and '.' are quite rare, digits even rarer;
# the longest non-X h.f.name is content-transfer-encoding (25)
# the longest h.f.names in the wild are 59 chars, largest ever 77
if ($curr_head !~ /^([a-zA-Z0-9._-]{1,60})[ \t]*:(.*)\z/s) {
$nonheader_cnt++;
} else {
my $hfname = lc($1);
if ($collectable_header_fields{$hfname}) {
$have_header_fields_cnt++ if !exists $header_field{$hfname};
$header_field{$hfname} = $2;
}
}
}
$curr_head = $ln;
if (!$plaintext) {
last if $ln eq "\n" || substr($ln,0,2) eq '--';
} elsif ($ln =~ /^\s*$/ || substr($ln,0,2) eq '--') {
if (exists $header_field{'from'} &&
$have_header_fields_cnt >= 4 && $nonheader_cnt <= 1) {
last;
} else { # reset, hope for the next paragraph to be a header
$have_header_fields_cnt = 0; $nonheader_cnt = 0;
%header_field = (); $curr_head = undef;
}
}
}
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(1,"Error reading from %s: %s", $fname,$!)
: die "Error reading from $fname: $!";
$fh->close or die "Error closing $fname: $!";
my $thd = exists $header_field{'message-id'} ? 3 : 5;
$is_true_bounce = 1 if exists $header_field{'from'} &&
$have_header_fields_cnt >= $thd;
if ($is_true_bounce) {
ll(5) && do_log(5, "inspect_dsn: plain=%s, got %d: %s",
$plaintext?"Y":"N", scalar(keys %header_field),
join(", ", sort keys %header_field));
for (@header_field{keys %header_field})
{ s/\n(?=[ \t])//gs; s/^[ \t]+//; s/[ \t\n]+\z// }
if (!defined($header_field{'message-id'}) &&
$have_header_fields_cnt >= 5 && $nonheader_cnt <= 1) {
$header_field{'message-id'} = ''; # fake: defined but empty
do_log(5, "inspect_dsn: a header section with no Message-ID");
} elsif (defined($header_field{'message-id'})) {
$header_field{'message-id'} =
(parse_message_id($header_field{'message-id'}))[0]
if defined $header_field{'message-id'};
}
}
section_time("inspect_dsn");
}
}
$bounce_type = 'bounce' if !defined $bounce_type;
if ($is_true_bounce) {
do_log(3, 'inspect_dsn: is a %s, struct: "%s", part(%s/%d), <%s>',
$bounce_type, $structure_type,
!defined($fname_ind) ? '-' : $fname_ind, scalar(@parts),
$sender) if ll(3);
} elsif ($msginfo->is_auto) { # bounce likely, but contents unrecognizable
do_log(3, 'inspect_dsn: possibly a %s, unrecognizable, '.
'struct: "%s", parts(%s/%d): %s',
$bounce_type, $structure_type,
!defined($fname_ind) ? '-' : $fname_ind, scalar(@parts),
join(", ",@t)) if ll(3);
} else { # not a bounce
do_log(3, 'inspect_dsn: not a bounce');
}
}
$bounce_type = undef if !$is_true_bounce;
!$is_true_bounce ? () : (\%header_field,$bounce_type);
}
# obtain authserv-id from an Authentication-Results header field
#
sub parse_authentication_results($) {
local($_) = $_[0];
tr/\n//d; local($1); my $comm_lvl = 0; my $authservid;
while (!/\G \z/gcsx) {
if ( /\G \( /gcsx) { $comm_lvl++ }
elsif ($comm_lvl > 0 && /\G \) /gcsx) { $comm_lvl-- }
elsif ($comm_lvl > 0 && /\G(?: \\ . | [^()\\]+ )/gcsx) {}
elsif (!$comm_lvl && /\G [ \t]+ /gcsx) {}
elsif (!$comm_lvl && m{\G ( [^\x00-\x20\x7F()<>,;:"/?=\[\]\@\\]+ ) }gcsx)
{ $authservid = $1; last } # token
elsif (!$comm_lvl && m{\G " ( (?: \\ [\t\x20-\x7E] |
[\t\x20\x21\x23-\x5B\x5D-\x7E] |
[\xC0-\xF4][\x80-\xBF]{1,3}
)* ) " }gcsx) # qcontent (relaxed for UTF-8)
{ $authservid = $1; $authservid =~ s{\\(.)}{$1}gsx; last }
else { last }; # syntax error
}
$authservid;
}
sub add_forwarding_header_edits_common($$$$$$) {
my($msginfo, $hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked) = @_;
my $use_our_hdrs = cr('prefer_our_added_header_fields');
my $allowed_hdrs = cr('allowed_added_header_fields');
if ($allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-Hold')}) {
# discard existing X-Amavis-Hold header field, only allow our own
$hdr_edits->delete_header('X-Amavis-Hold');
if (defined $hold && $hold ne '') {
$hdr_edits->add_header('X-Amavis-Hold', $hold);
do_log(0, "Inserting header field: X-Amavis-Hold: %s", $hold);
}
}
if (c('enable_dkim_verification') &&
$allowed_hdrs && $allowed_hdrs->{lc('Authentication-Results')}) {
# RFC 7601: For security reasons, any MTA conforming to this specification
# MUST delete any discovered instance of this header field that claims,
# by virtue of its authentication service identifier, to have been added
# within its trust boundary but that did not come directly from another
# trusted MTA. [...] For simplicity and maximum security, a border MTA
# could remove all instances of this header field on mail crossing into
# its trust boundary. [...] (Hmmm...!?) However, an MTA MUST remove such
# a header field if the [SMTP] connection relaying the message is not from
# a trusted internal MTA.
my $authservid = c('myauthservid');
$authservid = c('myhostname') if !defined $authservid || $authservid eq '';
$authservid = idn_to_ascii($authservid);
# delete header field if its authserv-id matches ours or is unparseable
$hdr_edits->edit_header('Authentication-Results',
sub { my($h,$b) = @_;
my $aid = parse_authentication_results($b);
if (defined $aid) { $aid =~ s{/.*}{}s; $authservid =~ s{/.*}{}s };
!defined $aid || lc($aid) eq lc($authservid) ? (undef,0) : ($b,1);
} );
# [...] For simplicity and maximum security, a border MTA could remove all
# instances of this header field on mail crossing into its trust boundary.
# $hdr_edits->delete_header('Authentication-Results');
}
# example on how to remove subject tag inserted by some other MTA:
# $hdr_edits->edit_header('Subject',
# sub { my($h,$s)=@_; $s=~s/^\s*\*\*\* Spam \*\*\*(.*)/$1/si; $s });
if ($extra_code_antivirus) {
# $hdr_edits->delete_header('X-Amavis-Alert'); # it does not hurt to keep it
my $am_hdr_fld_head = c('X_HEADER_TAG');
my $am_hdr_fld_body = c('X_HEADER_LINE');
$hdr_edits->delete_header($am_hdr_fld_head)
if c('remove_existing_x_scanned_headers') &&
defined $am_hdr_fld_body && $am_hdr_fld_body ne '' &&
defined $am_hdr_fld_head && $am_hdr_fld_head =~ /^[!-9;-\176]+\z/;
}
my $myhost = c('myhostname');
$myhost = $msginfo->smtputf8 ? idn_to_utf8($myhost) : idn_to_ascii($myhost);
for ('X-Spam-Checker-Version') {
if ($extra_code_antispam_sa &&
$allowed_hdrs && $allowed_hdrs->{lc $_} &&
$use_our_hdrs && $use_our_hdrs->{lc $_}) {
no warnings 'once';
$hdr_edits->add_header($_,
sprintf("SpamAssassin %s (%s) on %s",
Mail::SpamAssassin::Version(),
$Mail::SpamAssassin::SUB_VERSION, $myhost));
}
}
$hdr_edits;
}
# Prepare header edits for the first not-yet-done recipient.
# Inspect remaining recipients, returning the list of recipient objects
# that are receiving the same set of header edits (so the message may be
# delivered to them in one SMTP transaction).
#
sub add_forwarding_header_edits_per_recip($$$$$$$) {
my($msginfo, $hdr_edits, $hold, $any_undecipherable,
$virus_presence_checked, $spam_presence_checked, $filter) = @_;
my(@recip_cluster);
my(@per_recip_data) = grep(!$_->recip_done && (!$filter || &$filter($_)),
@{$msginfo->per_recip_data});
my $per_recip_data_len = scalar(@per_recip_data);
my $first = 1; my $cluster_key; my $cluster_full_spam_status;
my $use_our_hdrs = cr('prefer_our_added_header_fields');
my $allowed_hdrs = cr('allowed_added_header_fields');
my $x_header_tag = c('X_HEADER_TAG');
my $adding_x_header_tag =
$x_header_tag =~ /^[!-9;-\176]+\z/ && c('X_HEADER_LINE') ne '' &&
$allowed_hdrs && $allowed_hdrs->{lc($x_header_tag)};
my $mail_id = $msginfo->mail_id;
my $os_fp = $msginfo->client_os_fingerprint;
if (defined($os_fp) && $os_fp ne '' && $msginfo->client_addr ne '')
{ $os_fp .= ', ['. $msginfo->client_addr . ']:' . $msginfo->client_port }
my(@headers_to_be_removed); # header fields that may need to be removed
if ($extra_code_antispam) {
@headers_to_be_removed = qw(
X-Spam-Status X-Spam-Level X-Spam-Flag X-Spam-Score
X-Spam-Report X-Spam-Checker-Version X-Spam-Tests);
@headers_to_be_removed =
grep(defined $msginfo->get_header_field2($_), @headers_to_be_removed);
}
my $header_tagged = 0;
for my $r (@per_recip_data) {
my $spam_level = $r->spam_level;
my $recip = $r->recip_addr;
my $is_local = $r->recip_is_local;
my $blacklisted = $r->recip_blacklisted_sender;
my $whitelisted = $r->recip_whitelisted_sender;
my $bypassed = $r->bypass_spam_checks;
my $do_tag = $r->is_in_contents_category(CC_CLEAN,1);
my $do_tag2 = $r->is_in_contents_category(CC_SPAMMY);
my $do_kill = $r->is_in_contents_category(CC_SPAM);
my $do_tag_badh = $r->is_in_contents_category(CC_BADH);
my $do_tag_banned = $r->is_in_contents_category(CC_BANNED);
my $do_tag_virus = $r->is_in_contents_category(CC_VIRUS);
my $mail_mangle = $r->mail_body_mangle;
my $do_tag_virus_checked =
$adding_x_header_tag && !$r->bypass_virus_checks;
my $do_rem_hdr = @headers_to_be_removed &&
lookup2(0,$recip,ca('remove_existing_spam_headers_maps'));
my $do_p0f = $is_local && defined($os_fp) && $os_fp ne '' &&
$allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-OS-Fingerprint')};
my $pp_age;
if ($allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-PenPals')}) {
$pp_age = $r->recip_penpals_age;
$pp_age = format_time_interval($pp_age) if defined $pp_age;
}
my($tag_level,$tag2_level,$subject_tag);
if ($extra_code_antispam && !$bypassed) {
$tag_level = lookup2(0,$recip, ca('spam_tag_level_maps'));
$tag2_level = lookup2(0,$recip, ca('spam_tag2_level_maps'));
}
if ($is_local) { # || c('warn_offsite')
my(@subj_maps_pairs) = $r->setting_by_main_contents_category_all(
cr('subject_tag_maps_by_ccat'));
for my $pair (@subj_maps_pairs) {
my($cc,$map_ref) = @$pair;
next if !ref($map_ref);
$subject_tag = lookup2(0,$recip,$map_ref);
# take the first nonempty string
last if defined $subject_tag && $subject_tag ne '';
}
}
my $myhost = c('myhostname');
$myhost = $msginfo->smtputf8 ? idn_to_utf8($myhost) :idn_to_ascii($myhost);
$subject_tag = '' if !defined $subject_tag;
if ($subject_tag ne '') { # expand subject template
# just implement a small subset of macro-lookalikes, not true macro calls
# btw, the '0+' is there to trim trailing zeroes
$subject_tag =~
s{_(SCORE|REQD|YESNO|YESNOCAPS|HOSTNAME|DATE|U|LOGID|MAILID)_}
{ $1 eq 'SCORE' ? (0+sprintf("%.3f",$spam_level))
: $1 eq 'REQD' ? (!defined($tag2_level) ? '-' :
0+sprintf("%.3f",$tag2_level))
: $1 eq 'YESNO' ? ($do_tag2 ? 'Yes' : 'No')
: $1 eq 'YESNOCAPS' ? ($do_tag2 ? 'YES' : 'NO')
: $1 eq 'HOSTNAME' ? $myhost #** characters or octets?
: $1 eq 'DATE' ? rfc2822_timestamp($msginfo->rx_time)
: $1 eq 'U' ? iso8601_utc_timestamp($msginfo->rx_time)
: $1 eq 'LOGID' ? $msginfo->log_id
: $1 eq 'MAILID' ? $mail_id||''
: '_'.$1.'_' }xgse;
}
# normalize
$_ = $_?1:0 for ($do_tag_virus_checked, $do_tag_virus, $do_tag_banned,
$do_tag_badh, $do_tag, $do_tag2, $do_p0f, $do_rem_hdr,
$is_local);
my($spam_level_bar, $full_spam_status);
if ($is_local && ($do_tag || $do_tag2)) { # prepare status and level bar
# spam-related header fields should _not_ be inserted for:
# - nonlocal recipients (outgoing mail), as a matter of courtesy
# to our users;
# - recipients matching bypass_spam_checks: even though spam checking
# may have been done for other reasons, these recipients do not expect
# such header fields, so let's pretend the check has not been done
# and not insert spam-related header fields for them;
# - everyone when the spam level is below the tag level
# or the sender was whitelisted and tag level is below -10
# (undefined tag level is treated as lower than any spam score).
my $autolearn_status = $msginfo->supplementary_info('AUTOLEARN');
my $slc = c('sa_spam_level_char');
if (defined $slc && $slc ne '') {
my $bar_len = $whitelisted || $bypassed ? 0 : $blacklisted ? 64
: !defined $spam_level ? 0
: $spam_level > 64 ? 64 : $spam_level;
$spam_level_bar = $bar_len < 1 ? '' : $slc x int $bar_len;
}
my $spam_tests = $r->spam_tests;
$spam_tests = !$spam_tests ? '' : join(',',map($$_,@$spam_tests));
# allow header field wrapping at any comma
my $s = $spam_tests; $s =~ s/,/,\n /g;
$full_spam_status = sprintf(
"%s,\n score=%s\n %s%s%stests=[%s]\n autolearn=%s",
$do_tag2 ? 'Yes' : 'No',
!defined $spam_level ? 'x' : 0+sprintf("%.3f",$spam_level),
!defined $tag_level || $tag_level eq '' ? ''
: sprintf("tagged_above=%s\n ",$tag_level),
!defined $tag2_level ? '' : sprintf("required=%s\n ", $tag2_level),
join('', $blacklisted ? "BLACKLISTED\n " : (),
$whitelisted ? "WHITELISTED\n " : ()),
$s, $autolearn_status||'unavailable');
}
my $key = join("\000", map {defined $_ ? $_ : ''} (
$do_tag_virus_checked, $do_tag_virus, $do_tag_banned, $do_tag_badh,
$do_tag && $is_local, $do_tag2 && $is_local, $subject_tag, $do_rem_hdr,
$spam_level_bar, $full_spam_status, $mail_mangle, $do_p0f, $pp_age) );
if ($first) {
if (ll(4)) {
my $sl = !defined($spam_level) ? 'x'
: 0+sprintf("%.3f",$spam_level); # trim fraction
do_log(4, "headers CLUSTERING: NEW CLUSTER <%s>: score=%s, ".
"tag=%s, tag2=%s, local=%s, bl=%s, s=%s, mangle=%s", $recip,
$sl, $do_tag, $do_tag2, $is_local, $blacklisted, $subject_tag,
$mail_mangle);
}
$cluster_key = $key; $cluster_full_spam_status = $full_spam_status;
} elsif ($key eq $cluster_key) {
do_log(5,"headers CLUSTERING: <%s> joining cluster", $recip);
} else {
do_log(5,"headers CLUSTERING: skipping <%s> (t=%s, t2=%s, r=%s, l=%s)",
$recip,$do_tag,$do_tag2,$do_rem_hdr,$is_local);
next; # this recipient will be handled in some later pass
}
if ($first) { # insert header fields required for the new cluster
my(%header_field_provided); # mainly applies to spam header fields
if ($do_rem_hdr) {
$hdr_edits->delete_header($_) for @headers_to_be_removed;
}
if ($is_local && defined $msginfo->quarantined_to && defined $mail_id) {
$hdr_edits->add_header('X-Quarantine-ID', '<'.$mail_id.'>')
if $allowed_hdrs && $allowed_hdrs->{lc('X-Quarantine-ID')};
}
if ($mail_mangle) { # mail body modified, invalidates DKIM signatures
if ($allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-Modified')}) {
$hdr_edits->add_header('X-Amavis-Modified',
sprintf("Mail body modified (%s) - %s",
length($mail_mangle) > 1 ? "using $mail_mangle" : "defanged",
$myhost ));
}
}
if ($do_tag_virus_checked) {
$hdr_edits->add_header(c('X_HEADER_TAG'), c('X_HEADER_LINE'));
}
if ($allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-Alert')}) {
if ($do_tag_virus) {
my $virusname_list = $msginfo->virusnames;
$hdr_edits->add_header('X-Amavis-Alert',
"INFECTED, message contains virus: " .
(!$virusname_list ? '' : join(", ",@$virusname_list)) );
$header_tagged = 1;
}
if ($do_tag_banned) {
$hdr_edits->add_header('X-Amavis-Alert',
'BANNED, message contains ' . $r->banning_reason_short);
$header_tagged = 1;
}
if ($do_tag_badh) {
$hdr_edits->add_header('X-Amavis-Alert',
'BAD HEADER SECTION, ' . $bad_headers[0]);
# $header_tagged = 1; # not this one, it is mostly harmless
}
}
if ($is_local && $allowed_hdrs && $use_our_hdrs) {
for ('X-Spam-Checker-Version') {
if ($extra_code_antispam_sa &&
$allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
# a hack instead of making %header_field_provided global:
# just mark it as already provided, this header field was
# already inserted by add_forwarding_header_edits_common()
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Flag') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
$hdr_edits->add_header($_, $do_tag2 ? 'YES' : 'NO') if $do_tag;
$header_field_provided{lc $_} = 1;
$header_tagged = 1 if $do_tag2; # SPAMMY
}
}
for ('X-Spam-Score') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
if ($do_tag) {
my $score = 0+$spam_level;
$score = max(64,$score) if $blacklisted; # not below 64 if bl
$score = min( 0,$score) if $whitelisted; # not above 0 if wl
$hdr_edits->add_header($_, 0+sprintf("%.3f",$score));
}
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Level') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
if ($do_tag && defined $spam_level_bar) {
$hdr_edits->add_header($_, $spam_level_bar);
}
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Status') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
$hdr_edits->add_header($_, $full_spam_status, 1) if $do_tag;
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Report') {
# SA reports may contain any octet, i.e. 8-bit data from a mail
# that is reported by a matching rule; no charset is associated, so
# it doesn't make sense to RFC 2047 -encode it, so just sanitize it
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
if ($do_tag2) {
my $report = $r->spam_report;
$report = $msginfo->spam_report if !defined $report;
if (defined $report && $report ne '') {
$hdr_edits->add_header($_, "\n".sanitize_str($report,1), 2);
}
}
$header_field_provided{lc $_} = 1;
}
}
}
if ($is_local && $allowed_hdrs) {
# add remaining header fields as provided by spam scanners
my $sa_header = $msginfo->supplementary_info(
$do_tag2 ? 'ADDEDHEADERSPAM' : 'ADDEDHEADERHAM');
if (defined $sa_header && $sa_header ne '') {
for my $hf (split(/^(?![ \t])/m, $sa_header, -1)) {
local($1,$2);
if ($hf =~ /^([!-9;-\176]+)[ \t]*:(.*)\z/s) {
my($hf_name,$hf_body) = ($1,$2);
my $hf_name_lc = lc $hf_name; chomp($hf_body);
if ($header_field_provided{$hf_name_lc}) {
do_log(5,'fwd: scanner provided a header field %s, but we '.
'preferred our own', $hf_name);
} elsif (!$allowed_hdrs->{$hf_name_lc}) {
do_log(5,'fwd: scanner provided a header field %s, inhibited '.
'by %%allowed_added_header_fields', $hf_name);
} else {
do_log(5,'fwd: scanner provided a header field %s, inserting',
$hf_name);
$hdr_edits->add_header($hf_name, $hf_body, 2);
}
}
}
}
for my $pair ( ['DSPAMRESULT', 'X-DSPAM-Result'],
['DSPAMSIGNATURE', 'X-DSPAM-Signature'],
['CRM114STATUS', 'X-CRM114-Status'],
['CRM114CACHEID', 'X-CRM114-CacheID'] ) {
my($suppl_attr_name, $hf_name) = @$pair;
my $suppl_attr_val = $msginfo->supplementary_info($suppl_attr_name);
if (defined $suppl_attr_val && $suppl_attr_val ne '') {
if (!$allowed_hdrs->{lc $hf_name}) {
do_log(5,'fwd: scanner provided a tag/field %s, '.
'inhibited by %%allowed_added_header_fields', $hf_name);
} else {
do_log(5,'fwd: scanner provided a tag/field %s, '.
'inserting', $hf_name);
$hdr_edits->add_header($hf_name,
sanitize_str($suppl_attr_val), 2);
}
}
}
}
$hdr_edits->add_header('X-Amavis-OS-Fingerprint',
sanitize_str($os_fp)) if $do_p0f;
$hdr_edits->add_header('X-Amavis-PenPals',
'age '.$pp_age) if defined $pp_age;
if ($is_local && c('enable_dkim_verification') &&
$allowed_hdrs && $allowed_hdrs->{lc('Authentication-Results')}) {
for my $h (Amavis::DKIM::generate_authentication_results($msginfo,0)) {
$hdr_edits->add_header('Authentication-Results', $h, 1);
}
}
if ($subject_tag ne '') {
if (defined $msginfo->get_header_field2('subject')) {
$hdr_edits->edit_header('Subject',
sub { local($1,$2);
$_[1] =~ /^([ \t]?)(.*)\z/s; my $subj = $2;
$subj = safe_decode_mime($subj); # to characters
$subj =~ s/\Q$subject_tag\E//sg
if length($subject_tag) >= 3; # precaution
safe_decode_utf8(
' ' . safe_encode_utf8($subject_tag) .
safe_encode_utf8($subj));
} );
} else { # no Subject header field present, insert one
$subject_tag =~ s/[ \t]+\z//; # trim
$hdr_edits->add_header('Subject', $subject_tag);
do_log(0,"INFO: no existing header field 'Subject', inserting it");
}
$header_tagged = 1;
}
if ($allowed_hdrs && $allowed_hdrs->{lc('Received')} &&
grep($_->delivery_method ne '', @{$msginfo->per_recip_data})) {
$hdr_edits->add_header('Received',
make_received_header_field($msginfo,1), 1);
}
} # if $first
push(@recip_cluster,$r); $first = 0;
$r->recip_tagged(1) if $header_tagged;
my $delim = c('recipient_delimiter');
if ($is_local) {
# rewrite/replace recipient addresses, possibly with multiple recipients
my $rewrite_map = $r->setting_by_contents_category(
cr('addr_rewrite_maps_by_ccat'));
my $rewrite = !ref $rewrite_map ? undef : lookup2(0,$recip,$rewrite_map);
if ($rewrite ne '') {
my(@replacements) =
map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $rewrite));
if (@replacements) {
my $repl_addr = shift @replacements;
my $modif_addr = replace_addr_fields($recip,$repl_addr,$delim);
ll(5) && do_log(5,"addr_rewrite_maps: replacing <%s> by <%s>",
$recip,$modif_addr);
$r->recip_addr_modified($modif_addr);
for my $bcc (@replacements) { # remaining addresses are extra Bcc
my $new_addr = replace_addr_fields($recip,$bcc,$delim);
ll(5) && do_log(5,"addr_rewrite_maps: recip <%s>, adding <%s>",
$recip,$new_addr);
# my $clone = $r->clone;
# $clone->recip_addr_modified($new_addr);
}
}
$r->dsn_orcpt(join(';', orcpt_decode(';'.$r->recip_addr_smtp)))
if !defined $r->dsn_orcpt;
}
}
if ($is_local && defined $delim && $delim ne '') {
# append address extensions to mailbox names if desired
my $ext_map = $r->setting_by_contents_category(
cr('addr_extension_maps_by_ccat'));
my $ext = !ref($ext_map) ? undef : lookup2(0,$recip,$ext_map);
if ($ext ne '') {
$ext = substr($delim,0,1) . $ext;
my $orig_extension; my($localpart,$domain) = split_address($recip);
($localpart,$orig_extension) = split_localpart($localpart,$delim)
if c('replace_existing_extension'); # strip existing extension
my $new_addr = $localpart.$ext.$domain;
if (ll(5)) {
if (!defined($orig_extension)) {
do_log(5, "appending addr ext '%s', giving '%s'", $ext,$new_addr);
} else {
do_log(5, "replacing addr ext '%s' by '%s', giving '%s'",
$orig_extension,$ext,$new_addr);
}
}
# RFC 3461: If no ORCPT parameter was present in the RCPT command when
# the message was received, an ORCPT parameter MAY be added to the
# RCPT command when the message is relayed. If an ORCPT parameter is
# added by the relaying MTA, it MUST contain the recipient address
# from the RCPT command used when the message was received by that MTA.
$r->dsn_orcpt(join(';', orcpt_decode(';'.$r->recip_addr_smtp)))
if !defined $r->dsn_orcpt;
$r->recip_addr_modified($new_addr);
$r->recip_tagged(1);
}
}
}
my $done_all;
if (@recip_cluster == $per_recip_data_len) {
do_log(5,"headers CLUSTERING: done all %d recips in one go",
$per_recip_data_len);
$done_all = 1;
} else {
ll(4) && do_log(4, "headers CLUSTERING: got %d recips out of %d: %s",
scalar(@recip_cluster), $per_recip_data_len,
join(', ', map($_->recip_addr_smtp, @recip_cluster)));
}
if (ll(2) && defined($cluster_full_spam_status) && @recip_cluster) {
my $s = $cluster_full_spam_status; $s =~ s/\n[ \t]/ /g;
do_log(2, "spam-tag, %s -> %s, %s", $msginfo->sender_smtp,
join(',', map($_->recip_addr_smtp, @recip_cluster)), $s);
}
($hdr_edits, \@recip_cluster, $done_all);
}
# Mail body mangling (defanging, sanitizing or adding disclaimers);
# Prepare mail body replacement for the first recipient
# in the @$per_recip_data list (which contains a subset of recipients
# with the same mail edits, to be dispatched next as one message)
#
sub prepare_modified_mail($$$$) {
my($msginfo, $hold, $any_undecipherable, $per_recip_data) = @_;
my $body_modified = 0;
for my $r (@$per_recip_data) { # a subset of recipients!
my $recip = $r->recip_addr;
my $mail_mangle = $r->mail_body_mangle;
my $actual_mail_mangle;
if (!$mail_mangle) {
# skip
} elsif ($mail_mangle =~ /^(?:null|nulldisclaimer)\z/i) { # for testing
$body_modified = 1; # pretend mail was modified while actually it was not
$msginfo->mail_text_str(undef);
section_time('mangle-'.$mail_mangle);
} elsif (( lc $mail_mangle ne 'attach' &&
($enable_anomy_sanitizer || $altermime ne '') )
|| $mail_mangle =~ /^(?:anomy|altermime|disclaimer)\z/i) {
do_log(2,"mangling by: %s, <%s>", $mail_mangle,$recip);
my $orig_fn = $msginfo->mail_text_fn;
my $repl_fn = $msginfo->mail_tempdir . '/email-repl.txt';
my $file_position = $msginfo->skip_bytes;
my $out_fh; my $repl_size; my $eval_stat;
eval {
$out_fh = IO::File->new;
$out_fh->open($repl_fn, O_CREAT|O_EXCL|O_WRONLY, 0640)
or die "Can't create file $repl_fn: $!";
binmode($out_fh,':bytes') or die "Can't cancel :utf8 mode: $!";
if (lc $mail_mangle eq 'anomy' && !$enable_anomy_sanitizer) {
die 'Anomy requested, but $enable_anomy_sanitizer is false';
} elsif ($enable_anomy_sanitizer &&
$mail_mangle !~ /^(?:altermime|disclaimer)\z/i) {
$actual_mail_mangle = 'anomy';
my $inp_fh = $msginfo->mail_text;
$inp_fh->seek($file_position, 0) or die "Can't rewind mail file: $!";
$enable_anomy_sanitizer or die "Anomy disabled: $mail_mangle";
my(@scanner_conf); my $e; my $engine = Anomy::Sanitizer->new;
if ($e = $engine->error) { die $e }
$engine->configure(@scanner_conf, @{ca('anomy_sanitizer_args')});
if ($e = $engine->error) { die $e }
my $ret = $engine->sanitize($inp_fh, $out_fh);
if ($e = $engine->error) { die $e }
# close flushes buffers, makes it possible to check file size below
$out_fh->close or die "Can't close file $repl_fn: $!";
# re-open as read-only
$out_fh = IO::File->new;
$out_fh->open($repl_fn,'<') or die "Can't open file $repl_fn: $!";
binmode($out_fh,':bytes') or die "Can't cancel :utf8 mode: $!";
} else { # use altermime for adding disclaimers or defanging
$actual_mail_mangle = 'altermime';
$altermime ne '' or die "altermime not available: $mail_mangle";
# prepare arguments to altermime
my(@altermime_args); my $disclaimer_options;
if (lc($mail_mangle) ne 'disclaimer') { # defang: no by-sender opts.
@altermime_args = @{ca('altermime_args_defang')};
} else { # disclaimer
@altermime_args = @{ca('altermime_args_disclaimer')};
my $opt_maps = ca('disclaimer_options_bysender_maps');
if ($opt_maps && @$opt_maps && # by sender options?
grep(/_OPTION_/,@altermime_args))
{ # determine whose by-sender options to use
my $fm = $msginfo->rfc2822_from;
my $rf = $msginfo->rfc2822_resent_from;
my $rs = $msginfo->rfc2822_resent_sender;
my(@rfc2822_from) = !defined($fm) ? () : ref $fm ? @$fm : $fm;
my(@rfc2822_resent_from, @rfc2822_resent_sender);
@rfc2822_resent_from = @$rf if defined $rf;
@rfc2822_resent_sender = @$rs if defined $rs;
# see comments in dkim_make_signatures
my(@search_list); # collects candidate originator addresses
# author addresses go first
push(@search_list, map([$_,'2822.From'], @rfc2822_from));
# merge Resent-From and Resent-Sender addresses by resent blocks
while (@rfc2822_resent_from || @rfc2822_resent_sender) {
while (@rfc2822_resent_from) {
my $addr = shift(@rfc2822_resent_from);
last if !defined $addr; # undef delimits resent blocks
push(@search_list, [$addr, '2822.Resent-From']);
}
while (@rfc2822_resent_sender) {
my $addr = shift(@rfc2822_resent_sender);
last if !defined $addr; # undef delimits resent blocks
push(@search_list, [$addr, '2822.Resent-Sender']);
}
}
push(@search_list, [$msginfo->rfc2822_sender, '2822.Sender']);
push(@search_list, [$msginfo->sender, '2821.mail_from']);
#
# find disclaimer options pertaining to the
# most appropriate originator address
my(%addr_seen);
for my $pair (@search_list) {
my($addr,$addr_src) = @$pair;
next if !defined($addr) || $addr eq '';
next if $addr_seen{$addr}++;
do_log(5,"disclaimer options lookup (%s) %s", $addr_src,$addr);
next if !lookup2(0,$addr, ca('local_domains_maps'));
my($opt,$matchingkey) = lookup2(0,$addr,$opt_maps);
if (defined $opt) {
$disclaimer_options = $opt;
do_log(3,"disclaimer options pertaining to (%s) %s: %s",
$addr_src, $addr, $disclaimer_options);
last;
}
}
$disclaimer_options = '' if !defined $disclaimer_options;
s/_OPTION_/$disclaimer_options/gs for @altermime_args;
}
}
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
# copy original mail to $repl_fn, altermime can't handle stdin well
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
while ($file_position < length($$msg)) {
$out_fh->print(substr($$msg,$file_position,16384))
or die "Error writing to $repl_fn: $!";
$file_position += 16384; # may overshoot, no problem
}
} elsif ($msg->isa('MIME::Entity')) {
die "sanitizing a MIME::Entity object is not implemented";
} else {
$msg->seek($file_position,0) or die "Can't rewind mail file: $!";
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,16384)) > 0) {
$out_fh->print($buff) or die "Error writing to $repl_fn: $!";
}
defined $nbytes or die "Error reading mail file: $!";
undef $buff; # release storage
}
$out_fh->close or die "Can't close file $repl_fn: $!";
undef $out_fh;
my($proc_fh,$pid) = run_command(undef, '&1', $altermime,
"--input=$repl_fn", @altermime_args);
my($r,$status) = collect_results($proc_fh,$pid,$altermime,16384,[0]);
undef $proc_fh; undef $pid;
do_log(2,"program %s said: %s",
$altermime, $$r) if ref $r && $$r ne '';
$status == 0 or die "Program $altermime failed: $status, $$r";
$out_fh = IO::File->new;
$out_fh->open($repl_fn,'<') or die "Can't open file $repl_fn: $!";
binmode($out_fh,':bytes') or die "Can't cancel :utf8 mode: $!";
}
my $errn = lstat($repl_fn) ? 0 : 0+$!;
if ($errn) { die "Replacement $repl_fn inaccessible: $!" }
else { $repl_size = 0 + (-s _) }
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat };
if (defined $eval_stat || !defined $repl_size || $repl_size <= 0) {
# handle failure
my $msg = defined $eval_stat ? $eval_stat
: sprintf("replacement size %d", $repl_size);
do_log(-1,"mangling by %s failed: %s, mail will pass unmodified",
$actual_mail_mangle, $msg);
if (defined $out_fh) {
$out_fh->close or do_log(-1,"Can't close %s: %s", $repl_fn,$!);
undef $out_fh;
}
unlink($repl_fn) or do_log(-1,"Can't remove %s: %s", $repl_fn,$!);
if ($actual_mail_mangle eq 'altermime') { # check for leftover files
my $repl_tmp_fn = $repl_fn . '.tmp'; # altermime's temporary file
my $errn = lstat($repl_tmp_fn) ? 0 : 0+$!;
if ($errn == ENOENT) {} # fine, does not exist
elsif ($errn) {
do_log(-1,"Temporary file %s is inaccessible: %s",$repl_tmp_fn,$!);
} else { # cleanup after failing altermime
unlink($repl_tmp_fn)
or do_log(-1,"Can't remove %s: %s",$repl_tmp_fn,$!);
}
}
} else {
do_log(1,"mangling by %s (%s) done, new size: %d, orig %d bytes",
$actual_mail_mangle, $mail_mangle,
$repl_size, $msginfo->msg_size);
# don't close or delete the original file, we'll still need it
$msginfo->mail_text($out_fh); $msginfo->mail_text_fn($repl_fn);
$msginfo->mail_text_str(undef); $msginfo->body_start_pos(undef);
$msginfo->skip_bytes(0);
$body_modified = 1;
}
section_time('mangle-'.$actual_mail_mangle);
} else { # 'attach' (default) - poor-man's defanging of dangerous contents
do_log(2,"mangling by built-in defanger: %s, <%s>", $mail_mangle,$recip);
$actual_mail_mangle = 'attach';
my(@explanation); my $spam_summary_inserted = 0;
my(@df_pairs) =
$r->setting_by_main_contents_category_all(cr('defang_maps_by_ccat'));
for my $pair (@df_pairs) { # collect all defanging reasons that apply
my($cc,$mangle_map_ref) = @$pair;
my $df = !defined($mangle_map_ref) ? undef
: !ref($mangle_map_ref) ? $mangle_map_ref # compatibility
: lookup2(0,$recip,$mangle_map_ref, Label=>'Mangling2');
# the $r->mail_body_mangle happens to be the first noteworthy $df
do_log(4,'defang? ccat "%s": %s', $cc,$df);
next if !$df;
my $ccm = ccat_maj($cc);
if ($ccm==CC_VIRUS) {
my $virusname_list = $msginfo->virusnames;
push(@explanation, 'WARNING: contains virus ' .
(!$virusname_list ? '' : join(", ",@$virusname_list)));
}
if ($ccm==CC_BANNED) {
push(@explanation,
"WARNING: banning rules detected suspect part(s),\n".
"do not open unless you know what you are doing");
}
if ($ccm==CC_UNCHECKED) {
if (defined $hold && $hold ne '') {
push(@explanation,
"WARNING: NOT CHECKED FOR VIRUSES (mail bomb?):\n $hold");
} elsif ($any_undecipherable) {
push(@explanation, "WARNING: contains undecipherable part");
}
}
if ($ccm==CC_BADH) {
my $bad = join(' ',@bad_headers);
substr($bad,1000) = '...' if length($bad) > 1000;
push(@explanation, split(/\n/,
wrap_string('WARNING: bad headers - '.$bad, 78,'',' ') ));
}
push(@explanation, 'WARNING: oversized') if $ccm==CC_OVERSIZED;
if (!$spam_summary_inserted && # can be both CC_SPAMMY and CC_SPAM
($ccm==CC_SPAM || $ccm==CC_SPAMMY)) {
push(@explanation, split(/\n/, $msginfo->spam_summary));
$spam_summary_inserted = 1;
}
}
my $s = join(' ',@explanation);
do_log(1, "DEFANGING MAIL: %s",
length($s) <= 150 ? $s : substr($s,0,150-3).'[...]');
for (@explanation) { substr($_,100-3) = '...' if length($_) > 100 }
$_ .= "\n" for (@explanation); # append newlines
my $d = defanged_mime_entity($msginfo,\@explanation);
$msginfo->mail_text($d); # substitute mail with a rewritten version
$msginfo->mail_text_fn(undef); # remove filename information
$msginfo->mail_text_str(undef); $msginfo->body_start_pos(undef);
$msginfo->skip_bytes(0);
$body_modified = 1; section_time('defang');
}
# actually the 'for' loop is bogus and runs only once, all recipients
# listed in the argument are known to be using the same setting for
# $r->mail_body_mangle, ensured by add_forwarding_header_edits_per_recip;
# just exit the loop
last;
}
$body_modified;
}
sub do_quarantine($$$$;@) {
shift(@_) if $_[0]->isa('Amavis::In::Connection'); # for compatibility
my($msginfo, $hdr_edits_inherited, $recips_ref,
$quarantine_method, @snmp_id) = @_;
if ($quarantine_method eq '') {
do_log(5, 'quarantine disabled');
} else {
local($1);
my $quar_m_protocol = !ref $quarantine_method ? $quarantine_method
: $quarantine_method->[0];
$quar_m_protocol = lc $1 if $quar_m_protocol =~ /^([a-z][a-z0-9.+-]*):/si;
my $quar_msg = Amavis::In::Message->new;
$quar_msg->rx_time($msginfo->rx_time); # copy the reception time
$quar_msg->log_id($msginfo->log_id); # use the same log_id
$quar_msg->partition_tag($msginfo->partition_tag); # same partition_tag
$quar_msg->parent_mail_id($msginfo->mail_id);
$quar_msg->mail_id(scalar generate_mail_id());
$quar_msg->conn_obj($msginfo->conn_obj);
$quar_msg->mail_id($msginfo->mail_id); # use the same mail_id
$quar_msg->body_type($msginfo->body_type); # use the same BODY= type
$quar_msg->header_8bit($msginfo->header_8bit);
$quar_msg->body_8bit($msginfo->body_8bit);
$quar_msg->msg_size($msginfo->msg_size);
$quar_msg->body_digest($msginfo->body_digest); # copy original digest
$quar_msg->dsn_ret($msginfo->dsn_ret);
$quar_msg->dsn_envid($msginfo->dsn_envid);
$quar_msg->smtputf8($msginfo->smtputf8);
$quar_msg->auth_submitter($msginfo->sender_smtp);
$quar_msg->auth_user(c('amavis_auth_user'));
$quar_msg->auth_pass(c('amavis_auth_pass'));
$quar_msg->originating(0); # disables DKIM signing
my($orig_env_sender_retained, $orig_env_recips_retained);
my $mftq = c('mailfrom_to_quarantine');
if (!defined $mftq || $quar_m_protocol =~ /^(?:bsmtp|sql)\z/) {
# we keep the original envelope sender address if replacement sender
# is not provided, or with quarantine methods which store to fixed
# locations which do not depend on envelope
$quar_msg->sender($msginfo->sender); # original sender
$quar_msg->sender_smtp($msginfo->sender_smtp);
$orig_env_sender_retained = 1;
} elsif (defined $mftq) {
# have a replacement, and protocol is smtp, lmtp, pipe, local
$quar_msg->sender($mftq);
$mftq = qquote_rfc2821_local($mftq);
$quar_msg->sender_smtp($mftq);
$quar_msg->auth_submitter($mftq);
}
my(@recips);
if (!$recips_ref || $quar_m_protocol =~ /^(?:bsmtp|sql)\z/) {
# we keep the original envelope recipients if replacement recipients
# are not provided, or with quarantine methods which store to fixed
# locations which do not depend on envelope information
for my $r (@{$msginfo->per_recip_data}) {
my $recip_obj = Amavis::In::Message::PerRecip->new;
# copy original recipient addresses and DSN info
$recip_obj->recip_addr($r->recip_addr);
$recip_obj->recip_addr_smtp($r->recip_addr_smtp);
$recip_obj->dsn_orcpt($r->dsn_orcpt);
$recip_obj->recip_destiny(D_PASS);
$recip_obj->dsn_notify(['NEVER']) if $orig_env_sender_retained;
$recip_obj->delivery_method($quarantine_method);
push(@recips,$recip_obj);
}
$orig_env_recips_retained = 1;
} else { # have a replacement, and protocol is smtp, lmtp, pipe, local
# with these quarantine methods the envelope information is used to
# determine where and how to store a quarantined message, and may not
# reflect original envelope sender and recipients addresses
for my $rec (@$recips_ref) { # use recipients provided by a caller
my $recip_obj = Amavis::In::Message::PerRecip->new;
$recip_obj->recip_addr($rec);
$recip_obj->recip_addr_smtp(qquote_rfc2821_local($rec));
$recip_obj->recip_destiny(D_PASS);
$recip_obj->dsn_notify(['NEVER']) if $orig_env_sender_retained;
$recip_obj->delivery_method($quarantine_method);
push(@recips,$recip_obj);
}
}
$quar_msg->per_recip_data(\@recips);
my $hdr_edits = Amavis::Out::EditHeader->new;
$hdr_edits->inherit_header_edits($hdr_edits_inherited);
if (defined $msginfo->mail_id) {
$hdr_edits->prepend_header('X-Quarantine-ID', '<'.$msginfo->mail_id.'>');
}
if ($quar_m_protocol ne 'bsmtp') {
# NOTE: RFC 2821 mentions possible header flds X-SMTP-MAIL & X-SMTP-RCPT
# Exim uses: Envelope-To, Sendmail uses X-Envelope-To;
# No need with bsmtp, which preserves the envelope.
my(@blocked_recips) = map($_->recip_addr_smtp,
grep($_->recip_done, @{$msginfo->per_recip_data}));
$hdr_edits->prepend_header('X-Envelope-To-Blocked',
join(",\n ", @blocked_recips), 1);
$hdr_edits->prepend_header('X-Envelope-To',
join(",\n ", map($_->recip_addr_smtp, @{$msginfo->per_recip_data})),1);
}
# X-Envelope-* could be redundant with $orig_env_sender_retained, but
# let's provide this information unconditionally (for the benefit of SQL)
$hdr_edits->prepend_header('X-Envelope-From', $msginfo->sender_smtp);
$hdr_edits->add_header('Received',
make_received_header_field($msginfo,1), 1);
$quar_msg->header_edits($hdr_edits);
$quar_msg->mail_text($msginfo->mail_text); # use the same mail contents
$quar_msg->mail_text_str($msginfo->mail_text_str);
$quar_msg->body_start_pos($msginfo->body_start_pos);
$quar_msg->skip_bytes($msginfo->skip_bytes);
if (ll(5)) {
my $quar_m_displ = !ref $quarantine_method ? $quarantine_method
: '(' . join(', ',@$quarantine_method) . ')';
do_log(5,"DO_QUARANTINE, %s, %s -> %s",
$quar_m_displ, $quar_msg->sender_smtp,
join(', ', map($_->recip_addr_smtp,
@{$quar_msg->per_recip_data})) );
}
snmp_count('QuarMsgs');
snmp_count( ['QuarMsgsSize', $quar_msg->msg_size, 'C64'] );
mail_dispatch($quar_msg, 'Quar', 0);
my($n_smtp_resp, $n_exit_code, $n_dsn_needed) =
one_response_for_all($quar_msg, 0); # check status
if ($n_smtp_resp =~ /^2/ && !$n_dsn_needed) { # ok
@snmp_id = ('Other') if !@snmp_id;
for (unique_list(\@snmp_id)) {
snmp_count('QuarMsgs'.$_);
snmp_count( ['QuarMsgsSize'.$_, $quar_msg->msg_size, 'C64'] );
}
my $any_arch = grep($_ eq 'Arch', @snmp_id);
my $any_nonarch = grep($_ ne 'Arch', @snmp_id);
my $act_perf = $msginfo->actions_performed;
$msginfo->actions_performed($act_perf=[]) if !$act_perf;
if ($any_nonarch && !grep($_ eq 'Quarantined', @$act_perf)) {
push(@$act_perf, 'Quarantined');
}
if ($any_arch && !grep($_ eq 'Archived', @$act_perf)) {
push(@$act_perf, 'Archived');
}
} elsif ($n_smtp_resp =~ /^4/) {
snmp_count('QuarAttemptTempFails');
die "temporarily unable to quarantine: $n_smtp_resp";
} else { # abort if quarantining not successful
snmp_count('QuarAttemptFails');
die "Can't quarantine: $n_smtp_resp";
}
my($q_ty, $q_to, @quar_type, @quar_to);
$q_ty = $msginfo->quar_type;
$q_to = $msginfo->quarantined_to;
@quar_type = ref $q_ty ? @$q_ty : ( $q_ty ) if defined $q_ty;
@quar_to = ref $q_to ? @$q_to : ( $q_to ) if defined $q_to;
my(%seen_q_ty); $seen_q_ty{$_}=1 for @quar_type;
my(%seen_q_to); $seen_q_to{$_}=1 for @quar_to;
for my $r (@{$quar_msg->per_recip_data}) {
my $mbxname = $r->recip_mbxname;
next if !defined $mbxname || $mbxname eq '';
my $p = $quar_m_protocol;
$p = $p eq 'smtp' ? 'M' : $p eq 'lmtp' ? 'L' :
$p eq 'bsmtp' ? 'B' : $p eq 'sql' ? 'Q' :
$p eq 'local' ? ($mbxname =~ /\@/ ? 'M' :
$mbxname =~ /\.gz\z/ ? 'Z' : 'F')
: '?';
push(@quar_type,$p) if !$seen_q_ty{$p}++;
push(@quar_to,$mbxname) if !$seen_q_to{$mbxname}++;
}
# remember quarantine methods/protocols and locations (quarantined_to)
$msginfo->quar_type(\@quar_type) if @quar_type;
$msginfo->quarantined_to(\@quar_to) if @quar_to;
ll(5) && do_log(5, 'quar_types: %s, quar_to: %s',
join(',', @quar_type), join(', ', @quar_to));
do_log(4, 'DO_QUARANTINE done');
}
}
# prepare header edits for the quarantined message
#
sub prepare_header_edits_for_quarantine($) {
my $msginfo = $_[0];
my($blacklisted_any,$whitelisted_any) = (0,0);
my($do_tag_any,$do_tag2_any,$do_kill_any) = (0,0,0);
my($tag_level_min,$tag2_level_min,$kill_level_min);
my(%all_spam_tests);
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
for my $r (@{$msginfo->per_recip_data}) {
my $rec = $r->recip_addr;
my $spam_level = $r->spam_level;
if (ll(2)) {
my $blocking_ccat = $r->blocking_ccat;
my($rec_ccat_maj,$rec_ccat_min) = ccat_split(
defined $blocking_ccat ? $blocking_ccat : $r->contents_category);
my($ccat,$ccat_min) = ccat_split($msginfo->contents_category);
do_log(2,"header_edits_for_quar: rec_bl_ccat=(%d,%d), ccat=(%d,%d) %s",
$rec_ccat_maj, $rec_ccat_min, $ccat, $ccat_min, $rec)
if $rec_ccat_maj != $ccat || $rec_ccat_min != $ccat_min;
}
my($tag_level,$tag2_level,$kill_level,$do_tag,$do_tag2,$do_kill);
$do_tag = $r->is_in_contents_category(CC_CLEAN,1);
$do_tag2 = $r->is_in_contents_category(CC_SPAMMY);
$do_kill = $r->is_in_contents_category(CC_SPAM);
if (!$r->bypass_spam_checks && ($do_tag || $do_tag2 || $do_kill)) {
# do the more expensive lookups only when needed
$tag_level = lookup2(0,$rec, ca('spam_tag_level_maps'));
$tag2_level = lookup2(0,$rec, ca('spam_tag2_level_maps'));
$kill_level = lookup2(0,$rec, ca('spam_kill_level_maps'));
}
# summarize
$blacklisted_any = 1 if $r->recip_blacklisted_sender;
$whitelisted_any = 1 if $r->recip_whitelisted_sender;
$tag_level_min = $tag_level if defined($tag_level) && $tag_level ne '' &&
(!defined($tag_level_min) || $tag_level < $tag_level_min);
$tag2_level_min = $tag2_level if defined($tag2_level) &&
(!defined($tag2_level_min) || $tag2_level < $tag2_level_min);
$kill_level_min = $kill_level if defined($kill_level) &&
(!defined($kill_level_min) || $kill_level < $kill_level_min);
$do_tag_any = 1 if $do_tag;
$do_tag2_any = 1 if $do_tag2;
$do_kill_any = 1 if $do_kill;
my $spam_tests = $r->spam_tests;
if ($spam_tests) {
$all_spam_tests{$_} = 1 for split(/,/, join(',',map($$_,@$spam_tests)));
}
}
my(%header_field_provided); # mainly applies to spam header fields
my $use_our_hdrs = cr('prefer_our_added_header_fields');
my $allowed_hdrs = cr('allowed_added_header_fields');
my $hdr_edits = Amavis::Out::EditHeader->new;
if ($allowed_hdrs && $allowed_hdrs->{lc('X-Amavis-Alert')}) {
if ($msginfo->is_in_contents_category(CC_VIRUS)) {
my $virusname_list = $msginfo->virusnames;
$hdr_edits->add_header('X-Amavis-Alert',
"INFECTED, message contains virus: " .
(!$virusname_list ? '' : join(", ",@$virusname_list)) );
}
if ($msginfo->is_in_contents_category(CC_BANNED)) {
for my $r (@{$msginfo->per_recip_data}) {
if (defined($r->banning_reason_short)) {
$hdr_edits->add_header('X-Amavis-Alert',
'BANNED, message contains ' . $r->banning_reason_short);
last; # fudge: only the first recipient's banned hit will be shown
}
}
}
if ($msginfo->is_in_contents_category(CC_BADH)) {
$hdr_edits->add_header('X-Amavis-Alert',
'BAD HEADER SECTION, '.$bad_headers[0]);
}
}
if ($allowed_hdrs) {
for ('X-Amavis-OS-Fingerprint') {
my $p0f = $msginfo->client_os_fingerprint;
if (defined($p0f) && $p0f ne '' && $allowed_hdrs->{lc $_}) {
$hdr_edits->add_header($_, sanitize_str($p0f));
}
}
}
if ($allowed_hdrs && $use_our_hdrs) {
my $spam_level_bar; my $slc = c('sa_spam_level_char');
if (defined $slc && $slc ne '') {
my $bar_len = $whitelisted_any ? 0 : $blacklisted_any ? 64
: !defined $max_spam_level ? 0
: $max_spam_level > 64 ? 64 : $max_spam_level;
$spam_level_bar = $bar_len < 1 ? '' : $slc x int $bar_len;
}
# allow header field wrapping at any comma
my $s = join(",\n ", sort keys %all_spam_tests);
my $sl = 'x';
if (defined $min_spam_level) {
my $minsl = 0+sprintf("%.3f",$min_spam_level);
my $maxsl = 0+sprintf("%.3f",$max_spam_level);
$sl = $minsl eq $maxsl ? $minsl : "$minsl..$maxsl";
}
my $autolearn_status = $msginfo->supplementary_info('AUTOLEARN');
my $full_spam_status = sprintf(
"%s,\n score=%s\n tag=%s\n tag2=%s\n kill=%s\n ".
"%stests=[%s]\n autolearn=%s",
$do_tag2_any||$do_kill_any ? 'Yes' : 'No', $sl,
(map { !defined $_ ? 'x' : 0+sprintf("%.3f",$_) }
($tag_level_min, $tag2_level_min, $kill_level_min)),
join('', $blacklisted_any ? "BLACKLISTED\n " : (),
$whitelisted_any ? "WHITELISTED\n " : ()),
$s, $autolearn_status||'unavailable');
if (ll(2)) {
# log entry semi-compatible with older log parsers
my $s = $full_spam_status; $s =~ s/\n[ \t]/ /g;
do_log(2,"header_edits_for_quar: %s -> %s, %s", $msginfo->sender_smtp,
join(',', qquote_rfc2821_local(@{$msginfo->recips})), $s);
}
for ('X-Spam-Flag') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
$hdr_edits->add_header($_, $do_tag2_any ? 'YES' : 'NO');
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Score') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
my $score = 0+$max_spam_level;
$score = max(64,$score) if $blacklisted_any; # not below 64 if bl
$score = min( 0,$score) if $whitelisted_any; # not above 0 if wl
$hdr_edits->add_header($_, 0+sprintf("%.3f",$score));
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Level') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
$hdr_edits->add_header($_, $spam_level_bar) if defined $spam_level_bar;
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Status') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
$hdr_edits->add_header($_, $full_spam_status, 1);
$header_field_provided{lc $_} = 1;
}
}
for ('X-Spam-Report') {
if ($allowed_hdrs->{lc $_} && $use_our_hdrs->{lc $_}) {
my $report = $msginfo->spam_report;
if (defined $report && $report ne '') {
$hdr_edits->add_header($_, "\n".sanitize_str($report,1), 2);
}
$header_field_provided{lc $_} = 1;
}
}
}
if ($allowed_hdrs) {
# add remaining header fields as provided by spam scanners
my $sa_header = $msginfo->supplementary_info(
$do_tag2_any ? 'ADDEDHEADERSPAM' : 'ADDEDHEADERHAM');
if (defined $sa_header && $sa_header ne '') {
for my $hf (split(/^(?![ \t])/m, $sa_header, -1)) {
local($1,$2);
if ($hf =~ /^([!-9;-\176]+)[ \t]*:(.*)\z/s) {
my($hf_name,$hf_body) = ($1,$2);
my $hf_name_lc = lc $hf_name; chomp($hf_body);
if ($header_field_provided{$hf_name_lc}) {
do_log(5,'quar: scanner provided a header field %s, but we '.
'preferred our own', $hf_name);
} elsif (!$allowed_hdrs->{$hf_name_lc}) {
do_log(5,'quar: scanner provided a header field %s, '.
'inhibited by %%allowed_added_header_fields', $hf_name);
} else {
do_log(5,'quar: scanner provided a header field %s, inserting',
$hf_name);
$hdr_edits->add_header($hf_name, $hf_body, 2);
}
}
}
}
for my $pair ( ['DSPAMRESULT', 'X-DSPAM-Result'],
['DSPAMSIGNATURE', 'X-DSPAM-Signature'],
['CRM114STATUS', 'X-CRM114-Status'],
['CRM114CACHEID', 'X-CRM114-CacheID'] ) {
my($suppl_attr_name, $hf_name) = @$pair;
my $suppl_attr_val = $msginfo->supplementary_info($suppl_attr_name);
if (defined $suppl_attr_val && $suppl_attr_val ne '') {
if (!$allowed_hdrs->{lc $hf_name}) {
do_log(5,'quar: scanner provided a tag/field %s, '.
'inhibited by %%allowed_added_header_fields', $hf_name);
} else {
do_log(5,'quar: scanner provided a tag/field %s, inserting',
$hf_name);
$hdr_edits->add_header($hf_name,
sanitize_str($suppl_attr_val), 2);
}
}
}
}
if (c('enable_dkim_verification') &&
$allowed_hdrs && $allowed_hdrs->{lc('Authentication-Results')}) {
for my $h (Amavis::DKIM::generate_authentication_results($msginfo,0)) {
$hdr_edits->add_header('Authentication-Results', $h, 1);
}
}
section_time('quar-hdrs');
$hdr_edits;
}
# Quarantine according to contents and send admin & recip notif. as needed
# (this subroutine replaces the former subroutines do_virus and do_spam)
#
sub do_notify_and_quarantine($$) {
my($msginfo, $virus_dejavu) = @_;
my($mailfrom_admin, $hdrfrom_admin, $notify_admin_templ_ref) =
map(scalar $msginfo->setting_by_contents_category(cr($_)),
qw(mailfrom_notify_admin_by_ccat hdrfrom_notify_admin_by_ccat
notify_admin_templ_by_ccat));
safe_encode_utf8_inplace($mailfrom_admin); # to octets (if not already)
safe_encode_utf8_inplace($hdrfrom_admin); # to octets (if not already)
my $qar_method = c('archive_quarantine_method');
my(@ccat_names_pairs) =
$msginfo->setting_by_main_contents_category_all(\%ccat_display_names);
my($ccat,$ccat_min) = ccat_split($msginfo->contents_category);
if (ll(3)) {
my $ccat_name = ref $ccat_names_pairs[0] ? $ccat_names_pairs[0][1] :undef;
do_log(3,"do_notify_and_quar: ccat=%s (%d,%d) (%s) ccat_block=(%s)".
", qar_mth=%s", $ccat_name, $ccat, $ccat_min,
join(', ', map(sprintf('"%s":%s', $_->[0], $_->[1]),
@ccat_names_pairs)),
$msginfo->blocking_ccat, $qar_method);
}
my $virusname_list = $msginfo->virusnames;
my $newvirus_admin_maps_ref =
$virusname_list && @$virusname_list && !$virus_dejavu ?
ca('newvirus_admin_maps') : undef;
my $archive_any = 0; my $archive_transparent = 1;
if (defined $qar_method && $qar_method ne '') { # archiving quarantine
# test if @archive_quarantine_to_maps for all recipients yields
# a magic placeholder '%a', indicating we want transparent archiving
# which retains unmodified envelope recipient addresses
my $aqtm = ca('archive_quarantine_to_maps');
for my $r (@{$msginfo->per_recip_data}) {
my $q = lookup2(0, $r->recip_addr, $aqtm);
$archive_any = 1 if defined $q && $q ne '';
$archive_transparent = 0 if !defined $q || $q ne '%a';
last if $archive_any && !$archive_transparent;
}
}
my(@q_tuples, @a_addr); # per-recip quarantine address(es) and admins
for my $r (@{$msginfo->per_recip_data}) {
my $rec = $r->recip_addr;
my $blacklisted = $r->recip_blacklisted_sender;
my $whitelisted = $r->recip_whitelisted_sender;
my $spam_level = $r->spam_level;
# an alternative approach to determining which quarantine and notif. to take
# my(@qmqta_tuples) = $r->setting_by_main_contents_category_all(
# cr('quarantine_method_by_ccat'), cr('quarantine_to_maps_by_ccat'),
# cr('admin_maps_by_ccat') );
# my $qq; # quarantine (pseudo) address associated with the recipient
# my $quarantining_reason_ccat;
# for my $tuple (@qmqta_tuples) {
# my($cc, $q_method, $quarantine_to_maps_ref, $admin_maps_ref) = @$tuple;
# if (defined($q_method) && $q_method ne '' && $quarantine_to_maps_ref) {
# my $q = lookup2(0,$rec,$quarantine_to_maps_ref);
# if (defined $q && $q ne '')
# { $qq = $q; $quarantining_reason_ccat = $cc; last }
# }
# }
# my $aa; # administrator's e-mail address
# my $admin_notif_reason_ccat;
# for my $tuple (@qmqta_tuples) {
# my($cc, $q_method, $quarantine_to_maps_ref, $admin_maps_ref) = @$tuple;
# if ($admin_maps_ref) {
# my $a = lookup2(0,$rec,$admin_maps_ref);
# if (defined $a && $a ne '')
# { $aa = $a; $admin_notif_reason_ccat = $cc; last }
# }
# }
# ($rec_ccat_maj,$rec_ccat_min) = ccat_split($quarantining_reason_ccat);
my $blocking_ccat = $r->blocking_ccat;
my($rec_ccat_maj,$rec_ccat_min) = ccat_split(
defined $blocking_ccat ? $blocking_ccat : $r->contents_category);
my $q_method =
$r->setting_by_contents_category(cr('quarantine_method_by_ccat'));
my $quarantine_to_maps_ref =
$r->setting_by_contents_category(cr('quarantine_to_maps_by_ccat'));
# get per-recipient quarantine address(es) and admins
if (!defined($q_method) || $q_method eq '') {
do_log(5,"do_notify_and_quarantine: not quarantining, q_method off");
} elsif (!$quarantine_to_maps_ref) {
do_log(5,"do_notify_and_quarantine: not quarantining, null q_to maps");
} else {
my $q; # quarantine (pseudo) address associated with the recipient
$q = lookup2(0,$rec,$quarantine_to_maps_ref);
if (defined $q && $q ne '' &&
($rec_ccat_maj==CC_SPAM || $rec_ccat_maj==CC_SPAMMY)) {
# consider suppressing spam quarantine
my $cutoff = lookup2(0,$rec, ca('spam_quarantine_cutoff_level_maps'));
if (!defined $cutoff || $cutoff eq '') {
# no cutoff, quarantining all
} elsif ($blacklisted && !$whitelisted) {
do_log(2,"do_notify_and_quarantine: cutoff, blacklisted");
$q = ''; # disable quarantine on behalf of this recipient
} elsif (($spam_level||0) >= $cutoff) {
do_log(2,"do_notify_and_quarantine: spam level exceeds ".
"quarantine cutoff level %s", $cutoff);
$q = ''; # disable quarantine on behalf of this recipient
}
}
# keep original recipient when q_to is '%a' or with BSMTP; some day
# we may end up doing %k, %a, %l, %u, %e, %d placeholder replacements
$q = $rec if defined $q && $q ne '' &&
($q eq '%a' || $q_method =~ /^bsmtp:/i);
if (!defined($q) || $q eq '') {
do_log(5,"do_notify_and_quarantine: not quarantining, q_to off");
} else {
my $ccat_name_major =
$r->setting_by_contents_category(\%ccat_display_names_major);
push(@q_tuples, [$q_method, $q, $ccat_name_major]);
}
}
my $admin_maps_ref =
$r->setting_by_contents_category(cr('admin_maps_by_ccat'));
my $a; # administrator's e-mail address
$a = lookup2(0,$rec,$admin_maps_ref) if $admin_maps_ref;
if (defined $a && $a ne '' &&
($rec_ccat_maj==CC_SPAM || $rec_ccat_maj==CC_SPAMMY)) {
# consider suppressing spam admin notifications
my $cutoff = lookup2(0,$rec, ca('spam_notifyadmin_cutoff_level_maps'));
if (!defined $cutoff || $cutoff eq '') {
# no cutoff, sending administrator notifications
} elsif ($blacklisted && !$whitelisted) {
do_log(2,"do_notify_and_quarantine: spam admin cutoff, blacklisted");
$a = ''; # disable admin notification on behalf of this recipient
} elsif (($spam_level||0) >= $cutoff) {
do_log(2,"do_notify_and_quarantine: spam level exceeds ".
"spam admin cutoff level %s", $cutoff);
$a = ''; # disable admin notification on behalf of this recipient
}
}
push(@a_addr, $a) if defined $a && $a ne '' && !grep($_ eq $a, @a_addr);
if (ccat_maj($r->contents_category)==CC_VIRUS && $newvirus_admin_maps_ref){
$a = lookup2(0,$rec,$newvirus_admin_maps_ref);
push(@a_addr, $a) if defined $a && $a ne '' && !grep($_ eq $a, @a_addr);
}
if ($archive_any && !$archive_transparent) { # archiving quarantine
my $q = lookup2(0,$rec, ca('archive_quarantine_to_maps'));
# keep original recipient when q_to is '%a' or with BSMTP
$q = $rec if defined $q && $q ne '' &&
($q eq '%a' || $qar_method =~ /^bsmtp:/i);
push(@q_tuples, [$qar_method, $q, 'Arch']) if defined $q && $q ne '';
}
} # endfor per_recip_data
if ($ccat == CC_SPAM) {
my $sqbsm = ca('spam_quarantine_bysender_to_maps');
if (@$sqbsm) { # by-sender spam quarantine (hardly useful, rarely used)
my $q = lookup2(0,$msginfo->sender, $sqbsm);
if (defined $q && $q ne '') {
my $msg_q_method = $msginfo->setting_by_contents_category(
cr('quarantine_method_by_ccat'));
push(@q_tuples, [$msg_q_method, $q, 'Spam'])
if defined $msg_q_method && $msg_q_method ne '';
}
}
}
section_time('notif-quar');
if (@q_tuples || $archive_any) {
if (!defined($msginfo->mail_id) && grep($_->[2] ne 'Arch', @q_tuples)) {
# delayed mail_id generation - now we really need it
$zmq_obj->register_proc(2,0,'G',$msginfo->log_id) if $zmq_obj; # generate
$snmp_db->register_proc(2,0,'G',$msginfo->log_id) if $snmp_db;
# create a mail_id unique to a database and save preliminary info to SQL
generate_unique_mail_id($msginfo);
section_time('gen_mail_id') if $sql_storage;
}
# compatibility: replace quarantine method 'local:xxx'
# with $notify_method when quarantine_to looks like an e-mail address
my $notif_m = c('notify_method');
for my $tuple (@q_tuples) {
my($q_method,$q_to,$ccat_name) = @$tuple;
$tuple->[0] = $notif_m if $q_method =~ /^local:/i && $q_to =~ /\@/;
}
my $hdr_edits = prepare_header_edits_for_quarantine($msginfo);
if (@q_tuples) {
do_log(4,"do_notify_and_quarantine: quarantine %s",
join(',', map($_->[1], @q_tuples)));
my(@q_tuples_tmp) = @q_tuples;
while (@q_tuples_tmp) {
my($q_method,$q_to,$ccat_name) = @{$q_tuples_tmp[0]};
my(@same_method_tuples) = grep($_->[0] eq $q_method, @q_tuples_tmp);
@q_tuples_tmp = grep($_->[0] ne $q_method, @q_tuples_tmp);
my(@q_to) = unique_list(map($_->[1], @same_method_tuples));
# per-recipient blocking ccat names select snmp counter names
my(@snmp_id) = unique_list(map($_->[2], @same_method_tuples));
do_quarantine($msginfo, $hdr_edits, \@q_to, $q_method, @snmp_id);
}
}
if ($archive_any && $archive_transparent) {
# transparent archiving retains envelope recipient addresses
do_log(4,"do_notify_and_quarantine: transparent archiving");
do_quarantine($msginfo, $hdr_edits, undef, $qar_method, 'Arch');
}
}
if (!@a_addr) {
do_log(4,"skip admin notification, no administrators");
} elsif (!ref($notify_admin_templ_ref) ||
(ref($notify_admin_templ_ref) eq 'ARRAY' ?
!@$notify_admin_templ_ref : $$notify_admin_templ_ref eq '')) {
do_log(5,"skip admin notifications - empty template");
} else { # notify per-recipient administrators
ll(5) && do_log(5, "Admin notifications to %s; sender: %s",
join(',',qquote_rfc2821_local(@a_addr)),
$msginfo->sender_smtp);
$hdrfrom_admin = expand_variables($hdrfrom_admin);
if (!defined $mailfrom_admin) {
# defaults to email address in hdrfrom_notify_admin
$mailfrom_admin =
unquote_rfc2821_local( (parse_address_list($hdrfrom_admin))[0] );
}
my $notification = Amavis::In::Message->new;
$notification->rx_time($msginfo->rx_time); # copy the reception time
$notification->log_id($msginfo->log_id); # copy log id
$notification->partition_tag($msginfo->partition_tag); # same partition_tag
$notification->parent_mail_id($msginfo->mail_id);
$notification->mail_id(scalar generate_mail_id());
$notification->conn_obj($msginfo->conn_obj);
$notification->originating(1);
$notification->add_contents_category(CC_CLEAN,0);
safe_encode_utf8_inplace($_) for @a_addr; # make sure addrs are in octets
if (grep( / [^\x00-\x7F] .*? \@ [^@]* \z/sx && is_valid_utf_8($_),
($mailfrom_admin, @a_addr) )) {
# localpart is non-ASCII UTF-8, we must use SMTPUTF8
$notification->smtputf8(1);
do_log(2, 'admin notification requires SMTPUTF8');
} else {
$_ = mail_addr_idn_to_ascii($_) for ($mailfrom_admin, @a_addr);
}
$notification->sender($mailfrom_admin);
$notification->sender_smtp(qquote_rfc2821_local($mailfrom_admin));
$notification->auth_submitter($notification->sender_smtp);
$notification->auth_user(c('amavis_auth_user'));
$notification->auth_pass(c('amavis_auth_pass'));
$notification->recips([@a_addr]);
my $notif_m = c('notify_method');
$_->delivery_method($notif_m) for @{$notification->per_recip_data};
my(@rfc2822_from_admin) =
map(unquote_rfc2821_local($_), parse_address_list($hdrfrom_admin));
$notification->rfc2822_from($rfc2822_from_admin[0]);
# if ($mailfrom_admin ne '')
# { $_->dsn_notify(['NEVER']) for @{$notification->per_recip_data} }
my(%mybuiltins) = %builtins; # make a local copy
$mybuiltins{'f'} = safe_decode_utf8($hdrfrom_admin); # From:
$mybuiltins{'T'} = # To:
[ map(mail_addr_idn_to_ascii(qquote_rfc2821_local($_)), @a_addr) ];
$notification->mail_text(
build_mime_entity(expand($notify_admin_templ_ref,\%mybuiltins),
$msginfo, undef,undef,0, 1,0) );
# $notification->body_type('7BIT'); # '8BITMIME'
my $hdr_edits = Amavis::Out::EditHeader->new;
$notification->header_edits($hdr_edits);
mail_dispatch($notification, 'Notif', 0);
my($n_smtp_resp, $n_exit_code, $n_dsn_needed) =
one_response_for_all($notification, 0); # check status
if ($n_smtp_resp =~ /^2/ && !$n_dsn_needed) { # ok
build_and_save_structured_report($notification,'NOTIF');
} elsif ($n_smtp_resp =~ /^4/) {
die "temporarily unable to notify admin: $n_smtp_resp";
} else {
do_log(-1, "FAILED to notify admin: %s", $n_smtp_resp);
}
# $notification->purge;
}
# recipient notifications
my $wrmbc = cr('warnrecip_maps_by_ccat');
for my $r (@{$msginfo->per_recip_data}) {
my $rec = $r->recip_addr;
# if ($r->is_in_contents_category(CC_SPAM)) {
# if ($wrmbc->{&CC_VIRUS}) {
# $wrmbc = { %$wrmbc }; # copy
# delete $wrmbc->{&CC_VIRUS};
# do_log(5,"disabling virus recipient notifications for infected spam");
# }
# }
my $warnrecip_maps_ref = $r->setting_by_contents_category($wrmbc);
my $wr; my $notify_recips_templ_ref;
$wr = lookup2(0,$rec,$warnrecip_maps_ref) if $warnrecip_maps_ref;
if ($wr) {
$notify_recips_templ_ref =
$r->setting_by_contents_category(cr('notify_recips_templ_by_ccat'));
if (!ref($notify_recips_templ_ref) ||
(ref($notify_recips_templ_ref) eq 'ARRAY' ?
!@$notify_recips_templ_ref : $$notify_recips_templ_ref eq '')){
do_log(5,"skip recipient notifications - empty template");
$wr = 0; # do not send empty notifications
} elsif (!c('warn_offsite') && !$r->recip_is_local) {
do_log(5,"skip recipient notifications - nonlocal recipient");
$wr = 0; # do not notify foreign recipients
# } elsif ($r->recip_destiny == D_PASS) {
# do_log(5,"skip recipient notifications - mail will be delivered");
# $wr = 0; # do not notify recips which will be getting a message anyway
# } elsif ($msginfo->sender eq '') { # (not general enough)
# do_log(5,"skip recipient notifications for null sender");
# $wr = 0;
}
}
if ($wr) { # warn recipient
my $mailfrom_recip =
$r->setting_by_contents_category(cr('mailfrom_notify_recip_by_ccat'));
my $hdrfrom_recip =
$r->setting_by_contents_category(cr('hdrfrom_notify_recip_by_ccat'));
# make sure it's in octets
safe_encode_utf8_inplace($mailfrom_recip); # to octets (if not already)
safe_encode_utf8_inplace($hdrfrom_recip); # to octets (if not already)
$hdrfrom_recip = expand_variables($hdrfrom_recip);
if (!defined $mailfrom_recip) {
# defaults to email address in hdrfrom_notify_recip
$mailfrom_recip =
unquote_rfc2821_local( (parse_address_list($hdrfrom_recip))[0] );
}
my $notification = Amavis::In::Message->new;
$notification->rx_time($msginfo->rx_time); # copy the reception time
$notification->log_id($msginfo->log_id); # copy log id
$notification->partition_tag($msginfo->partition_tag); # same partition
$notification->parent_mail_id($msginfo->mail_id);
$notification->mail_id(scalar generate_mail_id());
$notification->conn_obj($msginfo->conn_obj);
$notification->originating(1);
$notification->add_contents_category(CC_CLEAN,0);
if (grep( / [^\x00-\x7F] .*? \@ [^@]* \z/sx && is_valid_utf_8($_),
($mailfrom_recip, $rec) )) {
# localpart is non-ASCII UTF-8, we must use SMTPUTF8
do_log(2, 'recipient notification requires SMTPUTF8');
$notification->smtputf8(1);
} else {
$_ = mail_addr_idn_to_ascii($_) for ($mailfrom_recip, $rec);
}
$notification->sender($mailfrom_recip);
$notification->sender_smtp(qquote_rfc2821_local($mailfrom_recip));
$notification->auth_submitter($notification->sender_smtp);
$notification->auth_user(c('amavis_auth_user'));
$notification->auth_pass(c('amavis_auth_pass'));
$notification->recips([$rec]);
my $notif_m = c('notify_method');
$_->delivery_method($notif_m) for @{$notification->per_recip_data};
my(@rfc2822_from_recip) =
map(unquote_rfc2821_local($_), parse_address_list($hdrfrom_recip));
$notification->rfc2822_from($rfc2822_from_recip[0]);
# if ($mailfrom_recip ne '')
# { $_->dsn_notify(['NEVER']) for @{$notification->per_recip_data} }
my(@b); @b = @{$r->banned_parts} if defined $r->banned_parts;
my $b_chopped = @b > 2; @b = (@b[0,1],'...') if $b_chopped;
s/[ \t]{6,}/ ... /g for @b;
my(%mybuiltins) = %builtins; # make a local copy
$mybuiltins{'banned_parts'} = \@b; # list of banned parts
$mybuiltins{'F'} = $r->banning_reason_short; # just one name & comment
$mybuiltins{'banning_rule_comment'} =
!defined($r->banning_rule_comment) ? undef
: unique_ref($r->banning_rule_comment);
$mybuiltins{'banning_rule_rhs'} =
!defined($r->banning_rule_rhs) ? undef
: unique_ref($r->banning_rule_rhs);
$mybuiltins{'f'} = safe_decode_utf8($hdrfrom_recip); # From:
$mybuiltins{'T'} = mail_addr_idn_to_ascii(qquote_rfc2821_local($rec));
$notification->mail_text(
build_mime_entity(expand($notify_recips_templ_ref,\%mybuiltins),
$msginfo, undef,undef,0, 0,0) );
# $notification->body_type('7BIT'); # '8BITMIME'
my $hdr_edits = Amavis::Out::EditHeader->new;
$notification->header_edits($hdr_edits);
mail_dispatch($notification, 'Notif', 0);
my($n_smtp_resp, $n_exit_code, $n_dsn_needed) =
one_response_for_all($notification, 0); # check status
if ($n_smtp_resp =~ /^2/ && !$n_dsn_needed) { # ok
build_and_save_structured_report($notification,'NOTIF');
} elsif ($n_smtp_resp =~ /^4/) {
die "temporarily unable to notify recipient rec: $n_smtp_resp";
} else {
do_log(-1, "FAILED to notify recipient %s: %s", $rec,$n_smtp_resp);
}
# $notification->purge;
}
}
do_log(5, "do_notify_and_quarantine - done");
}
# Calculate a message body digest;
# While at it, also get message size, verify DKIM signatures, check for 8-bit
# data, collect entropy, and store original header section since we need it
# for the %H macro, and MIME::Tools may modify its copy.
#
sub get_body_digest($$) {
my($msginfo, $alg) = @_;
my($remaining_time, $dkim_deadline) = # sanity limit for DKIM verification
get_deadline('get_body_digest', 0.5, 8, 30);
prolong_timer('digest_pre'); # restart the timer
my($hctx,$bctx);
# choose a message digest: MD5: 128 bits (32 hex), SHA family: 160..512 bits
if (uc $alg eq 'MD5') { $hctx = Digest::MD5->new; $bctx = Digest::MD5->new }
else { $hctx = Digest::SHA->new($alg); $bctx = Digest::SHA->new($alg) }
my $dkim_verifier;
if (c('enable_dkim_verification')) {
if (!defined $dns_resolver && Mail::DKIM::Verifier->VERSION >= 0.40) {
# Create a persistent DNS resolver object for the benefit
# of Mail::DKIM::Verifier; this avoids repeating initializations
# with each request, and allows us to turn on EDNS.
# The controversial need for 'config_file' option was debated in
# [rt.cpan.org #96608] https://rt.cpan.org/Ticket/Display.html?id=96608
# With Net::DNS 1.03 the semantics of a "retry" option has changed:
# [rt.cpan.org #109183] https://rt.cpan.org/Ticket/Display.html?id=109183
$dns_resolver = Net::DNS::Resolver->new(
config_file => '/etc/resolv.conf',
defnames => 0, force_v4 => !$have_inet6,
retry => 2, # number of times to try the query (not REtries)
persistent_udp => 1,
tcp_timeout => 3, udp_timeout => 3, retrans => 2, # seconds
);
if (!$dns_resolver) {
do_log(-1, "Failed to create a Net::DNS::Resolver object");
$dns_resolver = 0; # defined but false
} else {
# RFC 2460 (for IPv6) requires that a minimal MTU is 1280 bytes,
# taking away 40 bytes for a basic IP header gives 1240;
# RFC 3226: minimum of 1220 for RFC 2535 compliant servers
# RFC 6891: choosing between 1280 and 1410 bytes for IP (v4 or v6)
# over Ethernet would be reasonable.
my $payload_size = 1220; # a conservative default
# RFC 6891 (ex RFC 2671) - EDNS0, set requestor's UDP payload size
$dns_resolver->udppacketsize($payload_size) if $payload_size > 512;
ll(5) && do_log(5, "DNS resolver created, UDP payload size %s, NS: %s",
$dns_resolver->udppacketsize,
join(', ',$dns_resolver->nameservers) );
Mail::DKIM::DNS::resolver($dns_resolver);
}
}
$dkim_verifier = Mail::DKIM::Verifier->new;
}
# section_time('digest_init');
my($header_size, $body_size, $h_8bit, $b_8bit) = (0) x 4;
my $orig_header = []; # array of header fields, with folding and trailing NL
my $orig_header_fields = {};
my $sanity_limit = 4*1024*1024; # 4 MiB header size sanity limit
my $dkim_sanity_limit = 256*1024; # 256 KiB header size sanity limit
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
my $pos = 0;
if (!defined $msg) {
# empty mail
$msginfo->body_start_pos(0);
} elsif (ref $msg eq 'SCALAR') {
do_log(5, "get_body_digest: reading header section from memory");
my $header;
$pos = min($msginfo->skip_bytes, length($$msg));
if ($pos >= length($$msg)) { # empty message
$header = ''; $pos = length($$msg);
} elsif (substr($$msg,$pos,1) eq "\n") { # empty header section
$header = ''; $pos++;
} else {
my $ind = index($$msg, "\n\n", $pos); # find header/body separator
$header = $ind < 0 ? substr($$msg, $pos)
: substr($$msg, $pos, $ind+1-$pos);
$h_8bit = 1 if $header =~ tr/\x00-\x7F//c;
$hctx->add($header);
$pos = $ind < 0 ? length($$msg) : $ind+2;
}
# $pos now points to the first byte of a body
$msginfo->body_start_pos($pos);
local($1); my($j,$k,$ln);
for ($j = 0; $j < length($header); $j = $k+1) {
$k = index($header, "\n", $j);
$ln = $k < 0 ? substr($header, $j) : substr($header, $j, $k-$j+1);
if ($ln =~ /^[ \t]/) { # header field continuation
$$orig_header[-1] .= $ln; # includes NL
} else { # starts a new header field
push(@$orig_header, $ln); # includes NL
if ($ln =~ /^([^: \t]+)[ \t]*:/) {
# remember array index of each occurrence of a header field, top down
my $curr_entry = $orig_header_fields->{lc($1)};
if (!defined $curr_entry) {
# optimized: if there is only one element, it is stored as itself
$orig_header_fields->{lc($1)} = $#$orig_header;
} elsif (ref $curr_entry) { # already an arrayref, append
push(@{$orig_header_fields->{lc($1)}}, $#$orig_header);
} else { # was a single element as a scalar, now there are two
$orig_header_fields->{lc($1)} = [ $curr_entry, $#$orig_header ];
}
}
}
last if $k < 0;
}
$header =~ s{\n}{\015\012}gs; # needed for DKIM and for size
$header_size = length($header); # size includes CRLF (RFC 1870)
if (defined $dkim_verifier) {
do_log(5, "get_body_digest: feeding header section to DKIM verifier");
eval {
$dkim_verifier->PRINT($header)
or die "Error writing mail header to DKIM: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error feeding header to DKIM verifier: %s",$eval_stat);
undef $dkim_verifier;
};
}
} elsif ($msg->isa('MIME::Entity')) {
die "get_body_digest: reading from a MIME::Entity object not implemented";
} else { # a file handle assumed
do_log(5, "get_body_digest: reading header section from a file");
$pos = $msginfo->skip_bytes; # should be 0, but anyway...
$msg->seek($pos,0) or die "Can't rewind mail file: $!";
# read mail header section
local($1); my $ln;
for ($! = 0; defined($ln=$msg->getline); $! = 0) {
$pos += length($ln);
last if $ln eq "\n";
$hctx->add($ln);
$h_8bit = 1 if !$h_8bit && ($ln =~ tr/\x00-\x7F//c);
if ($ln =~ /^[ \t]/) { # header field continuation
$$orig_header[-1] .= $ln; # including NL
} else { # starts a new header field
push(@$orig_header,$ln); # including NL
if ($ln =~ /^([^: \t]+)[ \t]*:/) {
# remember array index of each occurrence of a header field, top down
my $curr_entry = $orig_header_fields->{lc($1)};
if (!defined $curr_entry) {
# optimized: if there is only one element, it is stored as itself
$orig_header_fields->{lc($1)} = $#$orig_header;
} elsif (ref $curr_entry) { # already an arrayref, append
push(@{$orig_header_fields->{lc($1)}}, $#$orig_header);
} else { # was a single element as a scalar, now there are two
$orig_header_fields->{lc($1)} = [ $curr_entry, $#$orig_header ];
}
}
}
chomp($ln);
if (!defined $dkim_verifier) {
# don't bother
} elsif ($header_size > $dkim_sanity_limit) {
do_log(-1,"Stopped feeding header to DKIM verifier: ".
"%.0f KiB sanity limit exceeded", $dkim_sanity_limit/1024);
undef $dkim_verifier;
} elsif (Time::HiRes::time > $dkim_deadline) {
do_log(-1,"Stopped feeding header to DKIM verifier: deadline exceeded");
undef $dkim_verifier;
} else {
eval {
$dkim_verifier->PRINT($ln."\015\012")
or die "Error writing mail header to DKIM: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error feeding header line to DKIM verifier: %s",
$eval_stat);
undef $dkim_verifier;
};
}
$header_size += length($ln)+2; # size includes CRLF (RFC 1870)
# exceeded $sanity_limit will break DKIM signatures, too bad...
last if $header_size > $sanity_limit;
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,"Error reading mail header section: $!")
: die "Error reading mail header section: $!";
$msginfo->body_start_pos($pos);
}
add_entropy($hctx->digest);
if (defined $dkim_verifier) {
do_log(5, "get_body_digest: sending h/b separator to DKIM");
eval {
# h/b separator will trigger signature pre-processing in DKIM module
$dkim_verifier->PRINT("\015\012")
or die "Error writing h/b separator to DKIM: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error feeding h/b separ to DKIM verifier: %s", $eval_stat);
undef $dkim_verifier;
};
}
$header_size += 2; # include a separator CRLF line in a header section size
untaint_inplace($header_size); # length(tainted) stays tainted too
section_time('digest_hdr');
# a DNS lookup in Mail::DKIM older than 0.30 stops the timer!
# The lookup is performed at a header/body separator line or at CLOSE, at
# which point signatures become available through the $dkim_verifier object.
prolong_timer('digest_hdr'); # restart timer if stopped
my(@dkim_signatures);
@dkim_signatures = $dkim_verifier->signatures if defined $dkim_verifier;
# don't bother feeding body to DKIM if there are no signature header fields
my $feed_dkim = @dkim_signatures > 0;
if ($feed_dkim) {
$msginfo->checks_performed({}) if !$msginfo->checks_performed;
$msginfo->checks_performed->{D} = 1;
}
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
ll(5) && do_log(5, "get_body_digest: reading mail body from memory, ".
"%d DKIM signatures", scalar @dkim_signatures);
my($buff, $buff_l);
while ($pos < length($$msg)) {
# do it in chunks to avoid unnecessarily large memory use
# for temporary variables
$buff = substr($$msg,$pos,32768); $buff_l = length($buff);
$pos += $buff_l;
$bctx->add($buff);
$b_8bit = 1 if !$b_8bit && ($buff =~ tr/\x00-\x7F//c);
if (!$feed_dkim) {
# count \n, compensating for CRLF (RFC 1870)
$body_size += $buff_l + ($buff =~ tr/\n//);
} else {
$buff =~ s{\n}{\015\012}gs;
$body_size += length($buff);
eval {
$dkim_verifier->PRINT($buff)
or die "Error writing mail body to DKIM: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error feeding body to DKIM verifier: %s",$eval_stat);
undef $dkim_verifier;
};
}
}
} elsif ($msg->isa('MIME::Entity')) {
die "get_body_digest: reading from MIME::Entity is not implemented";
} else {
#*** # only read further if not already at end-of-file
ll(5) && do_log(5, "get_body_digest: reading mail body from a file, ".
"%d DKIM signatures", scalar @dkim_signatures);
my($buff, $buff_l);
while (($buff_l = $msg->read($buff,65536)) > 0) {
$bctx->add($buff);
$b_8bit = 1 if !$b_8bit && ($buff =~ tr/\x00-\x7F//c);
if (!$feed_dkim) {
# count \n, compensating for CRLF (RFC 1870)
$body_size += $buff_l + ($buff =~ tr/\n//);
} else {
$buff =~ s{\n}{\015\012}gs;
$body_size += length($buff);
eval {
$dkim_verifier->PRINT($buff)
or die "Error writing mail body to DKIM: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error feeding body to DKIM verifier: %s",$eval_stat);
undef $dkim_verifier;
};
}
}
defined $buff_l or die "Error reading mail body: $!";
}
if (defined $dkim_verifier) {
eval {
# this will trigger signature verification in the DKIM module
$dkim_verifier->CLOSE or die "Can't close dkim_verifier: $!";
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"Error closing DKIM verifier: %s",$eval_stat);
undef $dkim_verifier;
};
@dkim_signatures = $dkim_verifier->signatures if defined $dkim_verifier;
}
prolong_timer('digest_body'); # restart timer if stopped
my $body_digest = untaint($bctx->digest);
add_entropy($body_digest);
# store information obtained
if (@dkim_signatures) {
if (@dkim_signatures > 50) { # sanity
do_log(-1, "Too many DKIM or DK signatures (%d), truncating to 50",
scalar(@dkim_signatures));
$#dkim_signatures = 49;
}
$msginfo->dkim_signatures_all(\@dkim_signatures);
}
if (ll(5)) {
my $mail_size_old = $msginfo->msg_size;
my $mail_size_new = $header_size + $body_size;
if (defined($mail_size_old) && $mail_size_new != $mail_size_old) {
# copy_smtp_data() provides a message size which is not adjusted for
# dot-destuffing - for speed. We finely adjust the message size here,
# now that we have the necessary information available.
do_log(5, "get_body_digest: message size adjusted %d -> %d, ".
"header+sep %d, body %d",
$mail_size_old, $mail_size_new, $header_size, $body_size);
} else {
do_log(5, "get_body_digest: message size %d, header+sep %d, body %d",
$mail_size_new, $header_size, $body_size);
}
}
$msginfo->msg_size($header_size + $body_size);
$msginfo->orig_header_fields($orig_header_fields); # stores just indices
$msginfo->orig_header($orig_header); # header section, without separator line
$msginfo->orig_header_size($header_size); # size includes a separator line!
$msginfo->orig_body_size($body_size);
my $body_digest_hex = unpack('H*', $body_digest); # high nybble first
# store hex-encoded to retain backward compatibility with pre-2.8.0
$msginfo->body_digest($body_digest_hex);
$msginfo->header_8bit($h_8bit ? 1 : 0);
$msginfo->body_8bit($b_8bit ? 1 : 0);
# check for 8-bit characters and adjust body type if necessary (RFC 6152)
my $bt_orig = $msginfo->body_type;
$bt_orig = defined $bt_orig ? uc $bt_orig : '';
if ($h_8bit || $b_8bit) {
# just keep original label whatever it is (garbage-in - garbage-out);
# keeping 8-bit mail unlabeled might avoid breaking DKIM in transport
# (labeling as 8-bit may invoke 8>7 downgrades in MTA, breaking signatures)
} elsif ($bt_orig eq '') { # unlabeled on reception
$msginfo->body_type('7BIT'); # safe to label as all-ASCII
} elsif ($bt_orig eq '8BITMIME') { # redundant (quite common)
$msginfo->body_type('7BIT'); # turn a redundant 8BITMIME into 7BIT
}
if (ll(4)) {
my $remark =
($bt_orig eq '' && $b_8bit) ? ", but 8-bit body"
: ($bt_orig eq '' && $h_8bit) ? ", but 8-bit header"
: ($bt_orig eq '7BIT' && ($h_8bit || $b_8bit)) ? " inappropriately"
: ($bt_orig eq '8BITMIME' && !($h_8bit || $b_8bit)) ? " unnecessarily"
: ", good";
do_log(4, "body type (8bit-MIMEtransport): %s%s (h=%s, b=%s)",
$bt_orig eq '' ? 'unlabeled' : "labeled $bt_orig",
$remark, $h_8bit, $b_8bit);
}
do_log(3, "body hash: %s", $body_digest_hex);
section_time(defined $dkim_verifier ? 'digest_body_dkim' : 'digest_body');
$body_digest_hex;
}
sub find_program_path($$) {
my($fv_list, $path_list_ref) = @_;
$fv_list = [$fv_list] if !ref $fv_list;
my $found;
for my $fv (@$fv_list) { # search through alternatives
my(@fv_cmd) = split(' ',$fv);
my $cmd = $fv_cmd[0];
if (!@fv_cmd) {
# empty, not available
} elsif ($cmd =~ m{^/}s) { # absolute path
my $errn = stat($cmd) ? 0 : 0+$!;
if ($errn == ENOENT) {
# file does not exist
} elsif ($errn) {
do_log(-1, "find_program_path: %s inaccessible: %s", $cmd,$!);
} elsif (-d _) {
do_log(0, "find_program_path: %s is a directory", $cmd);
} elsif (!-x _) {
do_log(0, "find_program_path: %s is not executable", $cmd);
} else {
$found = join(' ', @fv_cmd);
}
} elsif ($cmd =~ m{/}s) { # relative path
die "find_program_path: relative paths not implemented: @fv_cmd\n";
} else { # walk through the specified PATH
for my $p (@$path_list_ref) {
my $errn = stat("$p/$cmd") ? 0 : 0+$!;
if ($errn == ENOENT) {
# file does not exist
} elsif ($errn) {
do_log(-1, "find_program_path: %s/%s inaccessible: %s", $p,$cmd,$!);
} elsif (-d _) {
do_log(0, "find_program_path: %s/%s is a directory", $p,$cmd);
} elsif (!-x _) {
do_log(0, "find_program_path: %s/%s is not executable", $p,$cmd);
} else {
$found = $p . '/' . join(' ', @fv_cmd);
last;
}
}
}
last if defined $found;
}
$found;
}
sub find_external_programs($) {
my $path_list_ref = $_[0];
for my $f (qw($file $altermime)) {
my $g = $f; $g =~ s/\$/Amavis::Conf::/; my $fv_list = eval('$' . $g);
my $found = find_program_path($fv_list, $path_list_ref);
{ no strict 'refs'; $$g = $found } # NOTE: a symbolic reference
if (!defined $found) { do_log(0,"No %-19s not using it", "$f,") }
else {
do_log(1, "Found %-16s at %s%s", $f,
$daemon_chroot_dir ne '' ? "(chroot: $daemon_chroot_dir/) " : '',
$found);
}
}
# map program name path hints to full paths for decoders
my(%any_st);
for my $f (@{ca('decoders')}) {
next if !defined $f || !ref $f; # empty, skip
my $short_types = $f->[0];
if (!defined $short_types || (ref $short_types && !@$short_types)) {
undef $f; next;
}
my(@tried,@found); my $any = 0;
for my $d (@$f[2..$#$f]) { # all but the first two elements are programs
# find the program, allow one level of indirection
my $dd = (ref $d eq 'SCALAR' || ref $d eq 'REF') ? $$d : $d;
my $found = find_program_path($dd, $path_list_ref);
if (defined $found) {
$any = 1; $d = $dd = $found; push(@found,$dd);
} else {
push(@tried, !ref($dd) ? $dd : join(", ",@$dd)) if $dd ne '';
undef $d;
}
}
my $any_in_use;
for my $short_type (ref $short_types ? @$short_types : $short_types) {
my $is_a_backup = $any_st{$short_type};
my($ll,$tier) = !$is_a_backup ? (1,'') : (2,' (backup, not used)');
if (@$f <= 2) { # no external programs specified
if (!$is_a_backup) { $any_in_use = 1; $any_st{$short_type} = 1 }
do_log($ll, "Internal decoder for .%-4s%s", $short_type,$tier);
} elsif (!$any) { # external programs specified but none found
do_log(0, "No ext program for .%s, tried: %s",
$short_type, join('; ',@tried)) if @tried && !$is_a_backup;
} else {
if (!$is_a_backup) { $any_in_use = 1; $any_st{$short_type} = 1 }
do_log($ll, "Found decoder for .%-4s at %s%s%s", $short_type,
$daemon_chroot_dir ne '' ? "(chroot: $daemon_chroot_dir/) " : '',
join('; ',@found), $tier);
}
# defined but false, collect a list of tried short types as hash keys
$any_st{$short_type} = 0 if !defined $any_st{$short_type};
}
if (!$any_in_use) {
undef $f; # discard a backup entry
} else {
# turn array (in the first element) into a hash
$f->[0] = { map(($_,1), @$short_types) } if ref $short_types;
}
}
for my $short_type (sort grep(!$any_st{$_}, keys %any_st)) {
do_log(0, "No decoder for .%-4s", $short_type);
}
# map program name hints to full paths - av scanners
my $tier = 'primary'; # primary, secondary, ... av scanners
for my $f (@{ca('av_scanners')}, "\000", @{ca('av_scanners_backup')}) {
if ($f eq "\000") { # next tier
$tier = 'secondary';
} elsif (!defined $f || !ref $f) {
# empty, skip
} elsif (ref($f->[1]) eq 'CODE') {
do_log(0, "Using %s internal av scanner code for %s", $tier,$f->[0]);
} else {
my $found = $f->[1] = find_program_path($f->[1], $path_list_ref);
if (!defined $found) {
do_log(3, "No %s av scanner: %s", $tier, $f->[0]);
undef $f; # release its storage
} else {
do_log(0, "Found %s av scanner %-11s at %s%s", $tier, $f->[0],
$daemon_chroot_dir ne '' ? "(chroot: $daemon_chroot_dir/) " : '',
$found);
}
}
}
for my $f (@{ca('spam_scanners')}) {
if (!defined $f || !ref $f) {
# empty, skip
} elsif ($f->[1] ne 'Amavis::SpamControl::ExtProg') {
do_log(5, "Using internal spam scanner code for %s", $f->[0]);
} else { # using the Amavis::SpamControl::ExtProg interface module
my $found = $f->[2] = find_program_path($f->[2], $path_list_ref);
if (!defined $found) {
do_log(3, "No spam scanner: %s", $f->[0]);
undef $f; # release its storage
} else {
do_log(0, "Found spam scanner %-11s at %s%s", $f->[0],
$daemon_chroot_dir ne '' ? "(chroot: $daemon_chroot_dir/) " : '',
$found);
}
}
}
}
# Fetch remaining modules, all must be loaded before chroot and fork occurs
#
sub fetch_modules_extra() {
my(@modules,@optmodules);
if ($extra_code_sql_base) {
push(@modules, 'DBI');
push(@optmodules, 'DBI::Const::GetInfoType', 'DBI::Const::GetInfo::ANSI');
for (@lookup_sql_dsn, @storage_sql_dsn) {
my(@dsn) = split(/:/, $_->[0], -1);
push(@modules, 'DBD::'.$dsn[1]) if uc($dsn[0]) eq 'DBI';
}
}
push(@modules, qw(Net::LDAP Net::LDAP::Util Net::LDAP::Search
Net::LDAP::Bind Net::LDAP::Extension)) if $extra_code_ldap;
if ($extra_code_dkim ||
c('tls_security_level_in') || c('tls_security_level_out')) {
push(@modules, qw(Crypt::OpenSSL::RSA));
}
if (c('tls_security_level_in') || c('tls_security_level_out')) {
push(@modules, qw(IO::Socket::SSL
Net::SSLeay auto::Net::SSLeay::ssl_write_all
auto::Net::SSLeay::ssl_read_until
auto::Net::SSLeay::dump_peer_certificate));
}
push(@modules, qw(Net::DNS::RR::TXT Text::ParseWords
auto::Crypt::OpenSSL::RSA::new_public_key)) if $extra_code_dkim;
push(@modules, 'Anomy::Sanitizer') if $enable_anomy_sanitizer;
Amavis::Boot::fetch_modules('REQUIRED ADDITIONAL MODULES', 1, @modules);
push(@optmodules, qw(
bytes bytes_heavy.pl utf8 utf8_heavy.pl
Encode Encode::Byte Encode::MIME::Header Encode::Unicode::UTF7
Encode::CN Encode::TW Encode::KR Encode::JP
unicore::To::Lower.pl unicore::To::Upper.pl
unicore::To::Fold.pl unicore::To::Title.pl unicore::To::Digit.pl
unicore::lib::Perl::Alnum.pl unicore::lib::Perl::SpacePer.pl
unicore::lib::Perl::Word.pl
unicore::lib::Alpha::Y.pl unicore::lib::Nt::De.pl
));
if (@Amavis::Conf::decoders &&
grep { exists $policy_bank{$_}{'bypass_decode_parts'} &&
!do { my $v = $policy_bank{$_}{'bypass_decode_parts'};
!ref $v ? $v : $$v } } keys %policy_bank)
{ # at least one bypass_decode_parts is explicitly false
push(@modules, qw(Archive::Zip));
# push(@modules, qw(Convert::TNEF Convert::UUlib Archive::Tar));
}
push(@optmodules, $] >= 5.012000 ? qw(unicore::Heavy.pl)
: qw(unicore::Canonical.pl unicore::Exact.pl unicore::PVA.pl));
# unicore::lib::Perl::Word.pl unicore::lib::Perl::SpacePer.pl
# unicore::lib::Perl::Alnum.pl unicore::lib::Alpha::Y.pl
# unicore::lib::Nt::De.pl unicore::lib::Hex::Y.pl
push(@optmodules, qw(Unix::Getrusage));
push(@optmodules, 'Authen::SASL') if $extra_code_ldap &&
!grep($_ eq 'Authen::SASL', @modules);
push(@optmodules, defined($min_servers) ? 'Net::Server::PreFork'
: 'Net::Server::PreForkSimple');
push(@optmodules, @additional_perl_modules);
my $missing;
$missing = Amavis::Boot::fetch_modules('PRE-COMPILE OPTIONAL MODULES', 0,
@optmodules) if @optmodules;
do_log(2, 'INFO: no optional modules: %s', join(' ',@$missing))
if ref $missing && @$missing;
# require minimal version 0.32, Net::LDAP::Util::escape_filter_value() needed
Net::LDAP->VERSION(0.32) if $extra_code_ldap;
# needed a working last_insert_id in the past, no longer so but nevertheless:
DBI->VERSION(1.43) if $extra_code_sql_base;
MIME::Entity->VERSION != 5.419
or die "MIME::Entity 5.419 breaks quoted-printable encoding, ".
"please upgrade to 5.420 or later (or use 5.418)";
# load optional modules SAVI and Mail::ClamAV if available and requested
if ($extra_code_antivirus) {
my $clamav_module_ok;
for my $entry (@{ca('av_scanners')}, @{ca('av_scanners_backup')}) {
if (ref($entry) ne 'ARRAY') {
# none
} elsif ($entry->[0] eq 'Sophos SAVI') {
if (defined(eval { require SAVI }) && SAVI->VERSION(0.30) &&
Amavis::AV::sophos_savi_init(@$entry)) {} # ok, loaded
else { undef $entry->[1] } # disable entry
} elsif ($entry->[0] =~ /^Mail::ClamAV/) {
if (!defined($clamav_module_ok)) {
$clamav_module_ok = eval { require Mail::ClamAV };
$clamav_module_ok = 0 if !defined $clamav_module_ok;
}
undef $entry->[1] if !$clamav_module_ok; # disable entry
}
}
}
}
sub usage() {
my $myprogram_name = c('myprogram_name');
return <<"EOD";
Usage:
$myprogram_name
[-u user] [-g group]
[-i instance_name] {-c config_file}
[-d log_level,area,...] [-X magic1,magic2,...]
[-m max_servers] {-p listen_port_or_socket}
[-L lock_file] [-P pid_file] [-H home_dir]
[-D db_home_dir | -D ''] [-Q quarantine_dir | -Q '']
[-R chroot_dir | -R ''] [-S helpers_home_dir] [-T tempbase_dir]
( [start] | stop | reload | restart | debug | debug-sa | foreground |
showkeys {domains} | testkeys {domains} | genrsa file_name [nbits]
convert_keysfile file_name | test-config )
where area is a SpamAssassin debug area, e.g. all,util,rules,plugin,dkim,dcc
or:
$myprogram_name (-h | -V) ... show help or version, then exit
EOD
}
# drop privileges
#
sub drop_priv($$) {
my($desired_user,$desired_group) = @_;
local($1);
my($username,$passwd,$uid,$gid) =
$desired_user=~/^(\d+)$/ ? (undef,undef,$1,undef) :getpwnam($desired_user);
defined $uid or die "drop_priv: No such username: $desired_user\n";
if (!defined($desired_group) || $desired_group eq '') {
$desired_group = $gid; # for logging purposes
} else {
$gid = $desired_group=~/^(\d+)$/ ? $1 : getgrnam($desired_group);
}
defined $gid or die "drop_priv: No such group: $desired_group\n";
$( = $gid; $) = "$gid $gid"; # real and effective GID
POSIX::setgid($gid) or die "drop_priv: Can't setgid to $gid: $!";
POSIX::setuid($uid) or die "drop_priv: Can't setuid to $uid: $!";
$> = $uid; $< = $uid; # just in case
# print STDERR "desired user=$desired_user ($uid), current: EUID: $> ($<)\n";
# print STDERR "desired group=$desired_group ($gid), current: EGID: $) ($()\n";
$> != 0 or die "drop_priv: Still running as root, aborting\n";
$< != 0 or die "Effective UID changed, but Real UID is 0, aborting\n";
}
sub read_configs_and_exit {
my $user = $ENV{AMAVIS_TEST_CONFIG_USER};
my $group = $ENV{AMAVIS_TEST_CONFIG_GROUP};
if ($user && $user ne '') {
drop_priv($user, $group);
}
Amavis::Conf::include_config_files(@config_files);
exit 0;
}
sub configs_readable($) {
my $amavisd = shift;
local $ENV{AMAVIS_TEST_CONFIG} = 1;
local $ENV{AMAVIS_TEST_CONFIG_USER} = $daemon_user;
local $ENV{AMAVIS_TEST_CONFIG_GROUP} = $daemon_group;
return 0 == system map untaint($_), $amavisd, @ARGV;
}
sub sig_hup {
my $self = $_[0];
if (configs_readable($self->commandline->[0])) {
$self->SUPER::sig_hup(@_);
} else {
do_log(-1, 'Rejecting reload, some config files unreadable or erroneous');
}
}
#
# Main program starts here
#
stir_random();
add_entropy($], @INC, %ENV);
delete @ENV{'PATH', 'IFS', 'CDPATH', 'ENV', 'BASH_ENV'};
STDERR->autoflush(1);
STDERR->fcntl(F_SETFL, O_APPEND)
or warn "Error setting O_APPEND on STDERR: $!";
umask(0027); # set our preferred umask
POSIX::setlocale(LC_TIME,'C'); # English dates required in syslog and RFC 5322
# using Net::Server internal mechanism for a restart on HUP
$warm_restart = defined $ENV{BOUND_SOCKETS} && $ENV{BOUND_SOCKETS} ne '' ?1:0;
update_current_log_level();
# Read dynamic source code, and logging and notification message templates
# from the end of this file (pseudo file handle DATA)
#
$Amavis::Conf::notify_spam_admin_templ = ''; # not used
$Amavis::Conf::notify_spam_recips_templ = ''; # not used
do {
local($/) = "__DATA__\n"; # set line terminator to this string
for (
$extra_code_zmq, $extra_code_db,
$extra_code_sql_lookup, $extra_code_ldap,
$extra_code_in_ampdp, $extra_code_in_smtp, $extra_code_in_courier,
$extra_code_out_smtp, $extra_code_out_pipe,
$extra_code_out_bsmtp, $extra_code_out_local,
$extra_code_p0f, $extra_code_redis,
$extra_code_sql_base, $extra_code_sql_log, $extra_code_sql_quar,
$extra_code_antivirus, $extra_code_antispam,
$extra_code_antispam_extprog, $extra_code_antispam_rspamc,
$extra_code_antispam_spamc, $extra_code_antispam_sa,
$extra_code_unpackers, $extra_code_dkim, $extra_code_tools)
{ $_ = <Amavis::DATA>;
defined($_) or die "Error reading optional code from the source file: $!";
chomp($_);
}
binmode(\*Amavis::DATA, ':encoding(UTF-8)')
or die "Can't set \*DATA encoding to UTF-8: $!";
for (
$Amavis::Conf::log_short_templ,
$Amavis::Conf::log_verbose_templ,
$Amavis::Conf::log_recip_templ,
$Amavis::Conf::notify_sender_templ,
$Amavis::Conf::notify_virus_sender_templ,
$Amavis::Conf::notify_virus_admin_templ,
$Amavis::Conf::notify_virus_recips_templ,
$Amavis::Conf::notify_spam_sender_templ,
$Amavis::Conf::notify_spam_admin_templ,
$Amavis::Conf::notify_release_templ,
$Amavis::Conf::notify_report_templ,
$Amavis::Conf::notify_autoresp_templ)
{ $_ = <Amavis::DATA>;
defined($_) or die "Error reading templates from the source file: $!";
chomp($_);
}
}; # restore line terminator
close(\*Amavis::DATA) or die "Error closing *Amavis::DATA: $!";
# close(STDIN) or die "Error closing STDIN: $!";
# note: don't close STDIN just yet to prevent some other file taking up fd 0
{ local($1);
s/^(.*?)[\r\n]+\z/$1/s # discard trailing NL
for ($Amavis::Conf::log_short_templ,
$Amavis::Conf::log_verbose_templ,
$Amavis::Conf::log_recip_templ);
};
$Amavis::Conf::log_templ = $Amavis::Conf::log_short_templ;
# Consider dropping privileges early, before reading a config file.
# This is only possible if running under chroot will not be needed.
#
my $desired_group; # defaults to $desired_user's group
my $desired_user; # username or UID
if ($> != 0) { $desired_user = $> } # use effective UID if not root
# collect and parse command line options
my($log_level_override, $max_servers_override);
my($myhome_override, $tempbase_override, $helpers_home_override);
my($quarantinedir_override, $db_home_override, $daemon_chroot_dir_override);
my($lock_file_override, $pid_file_override);
my(@listen_sockets_override, $listen_sockets_overridden);
my(@argv) = @ARGV; # preserve @ARGV, may modify @argv
while (@argv >= 2 && $argv[0] =~ /^-[ugdimcpDHLPQRSTX]\z/ ||
@argv >= 1 && $argv[0] =~ /^-/) {
my($opt,$val);
$opt = shift @argv;
$val = shift @argv if $opt !~ /^-[hV-]\z/; # these take no arguments
if ($opt eq '--') {
last;
} elsif ($opt eq '-h') { # -h (help)
die "$myversion\n\n" . usage();
} elsif ($opt eq '-V') { # -V (version)
die "$myversion\n";
} elsif ($opt eq '-X') { # -X (magic options: debugging, testing, ...)
$i_know_what_i_am_doing{$_} = 1 for split(/\s*,\s*/, $val);
} elsif ($opt eq '-u') { # -u username
if ($> == 0) { $desired_user = $val }
else { print STDERR "Ignoring option -u when not running as root\n" }
} elsif ($opt eq '-g') { # -g group
print STDERR "NOTICE: Option -g may not achieve desired result when ".
"running as non-root\n" if $> != 0 && $val ne $desired_group;
$desired_group = $val;
} elsif ($opt eq '-i') { # -i instance_name, may be of use to a .conf file
$val =~ /^[a-z0-9._+-]*\z/i or die "Special chars in option -i $val\n";
$instance_name = untaint($val); # not used by amavisd directly
} elsif ($opt eq '-d') { # -d log_level or -d SAdbg1,SAdbg2,..,SAdbg3
$log_level_override = untaint($val);
} elsif ($opt eq '-m') { # -m max_servers
$val =~ /^\+?\d+\z/ or die "Option -m requires a numeric argument\n";
$max_servers_override = untaint($val);
} elsif ($opt eq '-c') { # -c config_file
push(@config_files, untaint($val)) if $val ne '';
} elsif ($opt eq '-p') { # -p port_or_socket
$listen_sockets_overridden = 1; # may disable all sockets by -p ''
push(@listen_sockets_override, untaint($val)) if $val ne '';
} elsif ($opt eq '-D') { # -D db_home_dir, empty string turns off db use
$db_home_override = untaint($val);
} elsif ($opt eq '-H') { # -H home_dir
$myhome_override = untaint($val) if $val ne '';
} elsif ($opt eq '-L') { # -L lock_file
$lock_file_override = untaint($val) if $val ne '';
} elsif ($opt eq '-P') { # -P pid_file
$pid_file_override = untaint($val); # empty disables pid_file
} elsif ($opt eq '-Q') { # -Q quarantine_dir, empty string disables quarant.
$quarantinedir_override = untaint($val);
} elsif ($opt eq '-R') { # -R chroot_dir, empty string or '/' avoids chroot
$daemon_chroot_dir_override = $val eq '/' ? '' : untaint($val);
} elsif ($opt eq '-S') { # -S helpers_home_dir for SA
$helpers_home_override = untaint($val) if $val ne '';
} elsif ($opt eq '-T') { # -T tempbase_dir
$tempbase_override = untaint($val) if $val ne '';
} else {
die "Error in parsing command line options: $opt\n\n" . usage();
}
}
my $cmd = lc(shift @argv);
if ($cmd !~ /^(?:start|debug|debug-sa|foreground|reload|restart|stop|
showkeys?|testkeys?|genrsa|convert_keysfile|test-config)?\z/xs) {
die "$myversion:\n Unknown command line parameter: $cmd\n\n" . usage();
} elsif (@argv > 0 &&
$cmd !~ /^(:?showkeys?|testkeys?|genrsa|convert_keysfile)/xs) {
die sprintf("%s:\n Only one command line parameter allowed: %s\n\n%s\n",
$myversion, join(' ',@argv), usage());
}
if (grep($_, values %i_know_what_i_am_doing)) {
my(@known, @unknown);
push(@{/^no_conf_file_writable_check\z/ ? \@known : \@unknown}, $_)
for grep($i_know_what_i_am_doing{$_}, keys %i_know_what_i_am_doing);
$unknown[0] = 'unknown: ' . $unknown[0] if @unknown;
warn sprintf("I know what I'm doing: %s\n", join(', ',@known,@unknown));
}
# deal with debugging early, based on a command line arg
if ($cmd =~ /^(?:start|debug|debug-sa|foreground)?\z/) {
$daemonize=0 if $cmd eq 'foreground';
$daemonize=0, $DEBUG=1 if $cmd eq 'debug';
$daemonize=0, $sa_debug='all' if $cmd eq 'debug-sa';
}
if (!defined($desired_user)) {
# early dropping of privileges not requested
} elsif ($> != 0 && $< != 0) {
# early dropping of privileges not needed
} elsif (defined $daemon_chroot_dir_override &&
$daemon_chroot_dir_override ne '') {
# early dropping of privs would prevent later chroot and is to be skipped
} else {
# drop privileges early if a uid was specified on a command line, option -u
drop_priv($desired_user,$desired_group);
}
if ($cmd eq 'genrsa') {
eval $extra_code_tools or die "Problem in Amavis::Tools code: $@";
$extra_code_tools = 1; Amavis::Tools::generate_dkim_private_key(@argv);
exit(0);
}
if ($cmd eq 'convert_keysfile') {
eval $extra_code_tools or die "Problem in Amavis::Tools code: $@";
$extra_code_tools = 1; Amavis::Tools::convert_dkim_keys_file(@argv);
exit(0);
}
# these settings must be overridden before and after read_config
# because some other settings in a config file may be derived from them
$Amavis::Conf::MYHOME = $myhome_override if defined $myhome_override;
$Amavis::Conf::TEMPBASE = $tempbase_override if defined $tempbase_override;
$Amavis::Conf::QUARANTINEDIR = $quarantinedir_override
if defined $quarantinedir_override;
$Amavis::Conf::helpers_home = $helpers_home if defined $helpers_home;
$Amavis::Conf::daemon_chroot_dir = $daemon_chroot_dir_override
if defined $daemon_chroot_dir_override;
# some remaining initialization, possibly after dropping privileges by -u,
# but before reading configuration file
init_local_delivery_aliases();
init_builtin_macros();
$instance_name = '' if !defined $instance_name;
# convert arrayref to Amavis::Lookup::RE object, the Amavis::Lookup::RE module
# was not yet available during BEGIN phase
$Amavis::Conf::map_full_type_to_short_type_re =
Amavis::Lookup::RE->new(@$Amavis::Conf::map_full_type_to_short_type_re);
# default location of the config file if none specified
if (!@config_files) {
@config_files = ( '/etc/amavisd.conf' );
# # Debian/Ubuntu specific:
# @config_files = Amavis::Util::find_config_files('/usr/share/amavis/conf.d',
# '/etc/amavis/conf.d');
}
# Read and evaluate config files, which may override default settings
read_configs_and_exit if $ENV{AMAVIS_TEST_CONFIG};
Amavis::Conf::include_config_files(@config_files);
Amavis::Conf::supply_after_defaults();
exit 1 unless $warm_restart || $cmd eq 'stop' || configs_readable($0);
exit 0 if $cmd eq 'test-config';
update_current_log_level();
add_entropy($Amavis::Conf::myhostname, $Amavis::Conf::myversion_date);
# not needed any longer, reclaim storage
undef $Amavis::Conf::log_short_templ;
undef $Amavis::Conf::log_verbose_templ;
if (defined $desired_user && defined $daemon_user && $daemon_user ne '') {
local($1);
# compare the config file settings to current UID
my($username,$passwd,$uid,$gid) =
$daemon_user=~/^(\d+)$/ ? (undef,undef,$1,undef) : getpwnam($daemon_user);
($desired_user eq $daemon_user || $desired_user eq $uid)
or warn sprintf("WARN: running under user '%s' (UID=%s), ".
"the config file specifies \$daemon_user='%s' (UID=%s)\n",
$desired_user, $>, $daemon_user, defined $uid ? $uid : '?');
}
if ($> != 0 && $< != 0) {
# dropping of privs is not needed
} elsif (defined $daemon_chroot_dir && $daemon_chroot_dir ne '') {
# dropping of privs now would prevent later chroot and is to be skipped
} elsif (defined $daemon_user && $daemon_user ne '') {
# drop privileges, unless needed for chrooting
drop_priv($daemon_user,$daemon_group);
}
# override certain config file options by command line arguments
$sa_debug='all' if $cmd eq 'debug-sa';
my(@sa_debug_fac); # list of SA debug facilities
if (defined $log_level_override) {
for my $item (split(/[ \t]*,[ \t]*/, $log_level_override, -1)) {
if ($item =~ /^[+-]?\d+\z/) { $Amavis::Conf::log_level = $item }
elsif ($item =~ /^[A-Za-z0-9_-]+\z/) { push(@sa_debug_fac,$item) }
}
update_current_log_level();
}
$Amavis::Conf::MYHOME = $myhome_override if defined $myhome_override;
$Amavis::Conf::TEMPBASE = $tempbase_override if defined $tempbase_override;
$Amavis::Conf::QUARANTINEDIR = $quarantinedir_override
if defined $quarantinedir_override;
$Amavis::Conf::helpers_home = $helpers_home if defined $helpers_home;
$Amavis::Conf::daemon_chroot_dir = $daemon_chroot_dir_override
if defined $daemon_chroot_dir_override;
if (defined $db_home_override) {
if ($db_home_override =~ /^\s*\z/) { $enable_db = 0 }
else { $Amavis::Conf::db_home = $db_home_override }
}
if (defined $max_servers_override && $max_servers_override ne '') {
$Amavis::Conf::max_servers = $max_servers_override;
}
if ($cmd =~ /^(?:showkeys?|testkeys?)\z/) {
# useful for preparing DNS zone files and testing public keys in DNS
eval $extra_code_dkim or die "Problem in Amavis::DKIM code: $@";
$extra_code_dkim = 1; Amavis::DKIM::dkim_key_postprocess();
eval $extra_code_tools or die "Problem in Amavis::Tools code: $@";
$extra_code_tools = 1; # release memory occupied by the source code
Amavis::Tools::show_or_test_dkim_public_keys($cmd,\@argv);
exit(0);
}
undef $extra_code_tools; # no longer needed
for ($unix_socketname, $inet_socket_port) {
push(@listen_sockets, ref $_ ? @$_ : $_) if defined $_ && $_ ne '';
}
@listen_sockets = @listen_sockets_override if $listen_sockets_overridden;
for my $s (@listen_sockets) {
# convert to a Net::Server::Proto syntax
local($1);
if ($s =~ m{^unix:(/\S+)\z}s) { $s = "$1|unix" }
elsif ($s =~ m{^inet:(.*)\z}s) { $s = "$1/tcp" }
elsif ($s =~ m{^inet6:(.*)\z}s) { $s = "$1/tcp" }
elsif ($s =~ m{^/\S+}s) { $s = "$s|unix" }
elsif ($s =~ m{^\d+\z}s) { $s = "$s/tcp" } # port number
elsif ($s =~ m{^[^/|]+\z}s) { $s = "$s/tcp" } # almost anything goes
elsif ($s =~ m{^.+\z}s) { $s = "$s" } # anything goes
else { die "Socket specification syntax error: $s\n" }
}
@listen_sockets > 0 or die "No listen sockets or ports specified\n";
# %modules_basic = %INC; # helps to track missing modules in chroot
# compile optional modules if needed
# NOTE: when releasing memory occupied by the source code, keep in mind:
# use undef(), see: http://www.perlmonks.org/?node_id=803515
if (!$enable_zmq) {
undef $extra_code_zmq;
} else {
eval $extra_code_zmq
or die "Problem in Amavis::ZMQ code: $@";
# release memory occupied by the source code
undef $extra_code_zmq; $extra_code_zmq = 1;
}
if (!$enable_db) {
undef $extra_code_db;
} else {
eval $extra_code_db
or die "Problem in Amavis::DB or Amavis::DB::SNMP code: $@";
# release memory occupied by the source code
undef $extra_code_db; $extra_code_db = 1;
}
{ my $any_dkim_verification =
scalar(grep { my $v = $policy_bank{$_}{'enable_dkim_verification'};
!ref $v ? $v : $$v } keys %policy_bank);
my $any_dkim_signing =
scalar(grep { my $v = $policy_bank{$_}{'enable_dkim_signing'};
!ref $v ? $v : $$v } keys %policy_bank);
if (!$any_dkim_verification && !$any_dkim_signing) {
undef $extra_code_dkim;
} else {
eval $extra_code_dkim or die "Problem in Amavis::DKIM code: $@";
# release memory occupied by the source code
undef $extra_code_dkim; $extra_code_dkim = 1;
}
if ($any_dkim_signing) {
Amavis::DKIM::dkim_key_postprocess();
} else { # release storage
undef %dkim_signing_keys_by_domain;
undef @dkim_signing_keys_list; undef @dkim_signing_keys_storage;
}
}
{ my(%needed_protocols_in);
for my $bank_name (keys %policy_bank) {
my $var = $policy_bank{$bank_name}{'protocol'};
$var = $$var if ref($var) eq 'SCALAR'; # allow one level of indirection
$needed_protocols_in{$var} = 1 if defined $var;
}
# compatibility with older config files unaware of $protocol config variable
# $needed_protocols_in{'AM.CL'} = 1 # AM.CL is no longer supported
# if grep(m{\|unix\z}i, @listen_sockets) &&
# !grep($needed_protocols_in{$_}, qw(AM.PDP COURIER));
$needed_protocols_in{'SMTP'} = 1
if grep(m{/(?:tcp|ssleay|ssl)\z}i, @listen_sockets) &&
!grep($needed_protocols_in{$_}, qw(SMTP LMTP QMQPqq));
if ($needed_protocols_in{'AM.PDP'} || $needed_protocols_in{'AM.CL'}) {
eval $extra_code_in_ampdp or die "Problem in the In::AMPDP code: $@";
# release memory occupied by the source code
undef $extra_code_in_ampdp; $extra_code_in_ampdp = 1;
} else {
undef $extra_code_in_ampdp;
}
if ($needed_protocols_in{'SMTP'} || $needed_protocols_in{'LMTP'}) {
eval $extra_code_in_smtp or die "Problem in the In::SMTP code: $@";
# release memory occupied by the source code
undef $extra_code_in_smtp; $extra_code_in_smtp = 1;
} else {
undef $extra_code_in_smtp;
}
if ($needed_protocols_in{'COURIER'}) {
eval $extra_code_in_courier or die "Problem in the In::Courier code: $@";
# release memory occupied by the source code
undef $extra_code_in_courier; $extra_code_in_courier = 1;
} else {
undef $extra_code_in_courier;
}
if ($needed_protocols_in{'QMQPqq'}) { die "In::QMQPqq code not available" }
}
if (!@lookup_sql_dsn) { undef $extra_code_sql_lookup }
if (!@storage_sql_dsn) { undef $extra_code_sql_log }
if (!@storage_redis_dsn) { undef $extra_code_redis }
# sql quarantine depends on sql log
undef $extra_code_sql_quar if !defined $extra_code_sql_log;
{ my(%needed_protocols_out); local($1);
for my $bank_name (keys %policy_bank) {
for my $method_name (qw(
forward_method notify_method resend_method
release_method requeue_method
os_fingerprint_method virus_quarantine_method
banned_files_quarantine_method unchecked_quarantine_method
spam_quarantine_method bad_header_quarantine_method
clean_quarantine_method archive_quarantine_method )) {
local($1); my $var = $policy_bank{$bank_name}{$method_name};
$var = $$var if ref($var) eq 'SCALAR'; # allow one level of indirection
$needed_protocols_out{uc($1)} = 1 if $var =~ /^([a-z][a-z0-9.+-]*):/si;
}
}
if (!$needed_protocols_out{'SMTP'} &&
!$needed_protocols_out{'LMTP'}) { undef $extra_code_out_smtp }
else {
eval $extra_code_out_smtp or die "Problem in Amavis::Out::SMTP code: $@";
# release memory occupied by the source code
undef $extra_code_out_smtp; $extra_code_out_smtp = 1;
}
if (!$needed_protocols_out{'PIPE'}) { undef $extra_code_out_pipe }
else {
eval $extra_code_out_pipe or die "Problem in Amavis::Out::Pipe code: $@";
# release memory occupied by the source code
undef $extra_code_out_pipe; $extra_code_out_pipe = 1;
}
if (!$needed_protocols_out{'BSMTP'}) { undef $extra_code_out_bsmtp }
else {
eval $extra_code_out_bsmtp or die "Problem in Amavis::Out::BSMTP code: $@";
# release memory occupied by the source code
undef $extra_code_out_bsmtp; $extra_code_out_bsmtp = 1;
}
if (!$needed_protocols_out{'LOCAL'}) { undef $extra_code_out_local }
else {
eval $extra_code_out_local or die "Problem in Amavis::Out::Local code: $@";
# release memory occupied by the source code
undef $extra_code_out_local; $extra_code_out_local = 1;
}
if (!$needed_protocols_out{'SQL'}) { undef $extra_code_sql_quar }
else {
# deal with it in the next section
}
if (!$needed_protocols_out{'P0F'}) { undef $extra_code_p0f }
else {
eval $extra_code_p0f or die "Problem in OS_Fingerprint code: $@";
# release memory occupied by the source code
undef $extra_code_p0f; $extra_code_p0f = 1;
}
}
if (defined $extra_code_redis) {
eval $extra_code_redis or die "Problem in Amavis Redis code: $@";
# release memory occupied by the source code
undef $extra_code_redis; $extra_code_redis = 1;
}
if (!defined($extra_code_sql_log) && !defined($extra_code_sql_quar) &&
!defined($extra_code_sql_lookup)) {
undef $extra_code_sql_base;
} else {
eval $extra_code_sql_base or die "Problem in Amavis SQL base code: $@";
# release memory occupied by the source code
undef $extra_code_sql_base; $extra_code_sql_base = 1;
}
if (defined $extra_code_sql_log) {
eval $extra_code_sql_log or die "Problem in Amavis::SQL::Log code: $@";
# release memory occupied by the source code
undef $extra_code_sql_log; $extra_code_sql_log = 1;
}
if (defined $extra_code_sql_quar) {
eval $extra_code_sql_quar
or die "Problem in Amavis::SQL::Quarantine code: $@";
# release memory occupied by the source code
undef $extra_code_sql_quar; $extra_code_sql_quar = 1;
}
if (defined $extra_code_sql_lookup) {
eval $extra_code_sql_lookup or die "Problem in Amavis SQL lookup code: $@";
# release memory occupied by the source code
undef $extra_code_sql_lookup; $extra_code_sql_lookup = 1;
}
if (!grep { my $v = $policy_bank{$_}{'enable_ldap'};
!ref $v ? $v : $$v } keys %policy_bank) {
undef $extra_code_ldap;
} else { # at least one enable_ldap is true
eval $extra_code_ldap or die "Problem in Lookup::LDAP code: $@";
# release memory occupied by the source code
undef $extra_code_ldap; $extra_code_ldap = 1;
}
my $bpvcm = ca('bypass_virus_checks_maps');
if (!@{ca('av_scanners')} && !@{ca('av_scanners_backup')}) {
undef $extra_code_antivirus;
} elsif (@$bpvcm && !ref($bpvcm->[0]) && $bpvcm->[0]) {
# do a simple-minded test to make it easy to turn off virus checks
undef $extra_code_antivirus;
} else {
eval $extra_code_antivirus or die "Problem in antivirus code: $@";
# release memory occupied by the source code
undef $extra_code_antivirus; $extra_code_antivirus = 1;
}
if (!$extra_code_antivirus) { # release storage
undef @Amavis::Conf::av_scanners; undef @Amavis::Conf::av_scanners_backup;
}
my(%spam_scanners_used);
my $bpscm = ca('bypass_spam_checks_maps');
if (!@{ca('spam_scanners')}) {
undef $extra_code_antispam;
} elsif (@$bpscm && !ref($bpscm->[0]) && $bpscm->[0]) { # simple-minded
undef $extra_code_antispam;
} else {
eval $extra_code_antispam or die "Problem in antispam code: $@";
# release memory occupied by the source code
undef $extra_code_antispam; $extra_code_antispam = 1;
for my $as (@{ca('spam_scanners')}) {
next if !ref $as || !defined $as->[1];
my($scanner_name,$module) = @$as; $spam_scanners_used{$module} = 1;
}
}
if (!$extra_code_antispam) { undef @Amavis::Conf::spam_scanners }
# load required built-in spam scanning modules
if ($spam_scanners_used{'Amavis::SpamControl::ExtProg'}) {
eval $extra_code_antispam_extprog or die "Problem in ExtProg code: $@";
# release memory occupied by source code
undef $extra_code_antispam_extprog; $extra_code_antispam_extprog = 1;
} else {
undef $extra_code_antispam_extprog;
}
if ($spam_scanners_used{'Amavis::SpamControl::RspamdClient'}) {
eval $extra_code_antispam_rspamc or die "Problem in rspamd client code: $@";
# release memory occupied by source code
undef $extra_code_antispam_rspamc; $extra_code_antispam_rspamc = 1;
} else {
undef $extra_code_antispam_rspamc;
}
if ($spam_scanners_used{'Amavis::SpamControl::SpamdClient'}) {
eval $extra_code_antispam_spamc or die "Problem in spamd client code: $@";
# release memory occupied by source code
undef $extra_code_antispam_spamc; $extra_code_antispam_spamc = 1;
} else {
undef $extra_code_antispam_spamc;
}
if ($spam_scanners_used{'Amavis::SpamControl::SpamAssassin'}) {
eval $extra_code_antispam_sa or die "Problem in antispam SA code: $@";
# release memory occupied by the source code
undef $extra_code_antispam_sa; $extra_code_antispam_sa = 1;
} else {
undef $extra_code_antispam_sa;
}
if (!grep { exists $policy_bank{$_}{'bypass_decode_parts'} &&
!do { my $v = $policy_bank{$_}{'bypass_decode_parts'};
!ref $v ? $v : $$v } } keys %policy_bank) {
undef $extra_code_unpackers;
} else { # at least one bypass_decode_parts is explicitly false
eval $extra_code_unpackers or die "Problem in Amavis::Unpackers code: $@";
# release memory occupied by the source code
undef $extra_code_unpackers; $extra_code_unpackers = 1;
}
if ($enable_zmq && $extra_code_zmq && @zmq_sockets) {
# better to catch and report potential ZMQ problems early before forking
$zmq_obj = Amavis::ZMQ->new(@zmq_sockets);
if ($zmq_obj && !$warm_restart && $cmd !~ /^(?:reload|stop)\z/) {
sleep 1; # a crude way to avoid a "slow joiner" syndrome #***
$zmq_obj->put_initial_snmp_data('FLUSH');
$zmq_obj->register_proc(1,1,'FLUSH');
}
}
Amavis::Log::init($do_syslog, $logfile); # initialize logging
Amavis::Log::log_to_stderr($cmd eq 'debug' || $cmd eq 'debug-sa' ? 1 : 0);
do_log(1, 'logging initialized, log level %s, %s%s', c('log_level'),
$do_syslog ? sprintf("syslog: %s.%s",c('syslog_ident'),c('syslog_facility')):
$logfile ne '' ? "logfile: $logfile" : "STDERR",
!$enable_log_capture ? '' : ', log capture enabled');
do_log(2, 'ZMQ enabled: %s', Amavis::ZMQ::zmq_version()) if $zmq_obj;
sd_notify(0, "STATUS=Config files have been read, modules loaded.");
# insist on a FQDN in $myhostname
my $myhn = idn_to_utf8(c('myhostname'));
$myhn =~ /[^.]\.[^.]+\.?\z/s || lc($myhn) eq 'localhost'
or die <<"EOD";
The value of variable \$myhostname is \"$myhn\", but should have been
a fully qualified domain name; perhaps uname(3) did not provide such.
You must explicitly assign a FQDN of this host to variable \$myhostname
in amavisd.conf, or fix what uname(3) provides as a host's network name!
EOD
$mail_id_size_bits > 0 &&
$mail_id_size_bits == int $mail_id_size_bits &&
$mail_id_size_bits % 24 == 0
or die "\$mail_id_size_bits ($mail_id_size_bits) must be a multiple of 24\n";
my $amavisd_pid; # PID of the currently running amavisd daemon (not our pid)
my $amavisd_pid_by_mainpid; # is $amavisd_pid provided by $ENV{MAINPID} ?
eval { # is amavisd daemon already running?
if (defined $ENV{MAINPID}) { # provided by systemd.exec(5) ?
local($1);
if ($ENV{MAINPID} =~ /^\s* ( [0-9]{1,10} ) \s*\z/xs && $1 > 0) {
$amavisd_pid = untaint($1);
$amavisd_pid_by_mainpid = 1;
}
}
my $pidf = defined $pid_file_override ? $pid_file_override : $pid_file;
if (defined $amavisd_pid) {
if (defined $pidf && $pidf ne '') {
do_log(2, 'Master PID [%s] provided by the MAINPID env.var, '.
'not checking $pid_file', $amavisd_pid);
} else {
do_log(2, 'Master PID [%s] provided by the MAINPID env.var, '.
'no $pid_file', $amavisd_pid);
}
} elsif (!defined $pidf || $pidf eq '') {
do_log(2, 'no $pid_file configured, not checking it');
} elsif ($warm_restart) {
# skip pid file checking, let Net::Server handle it
} else {
my(@stat_list) = lstat($pidf);
my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT) {
die "The amavisd daemon is apparently not running, no PID file $pidf\n"
if $cmd =~ /^(?:reload|restart|stop)\z/;
} elsif ($errn != 0) {
die "PID file $pidf is inaccessible: $!\n";
} elsif (!-f _) {
die "PID file $pidf is not a regular file\n";
} else { # find and validate PID of the currently running amavisd daemon
my $ln; my $lcnt = 0; my $pidf_h = IO::File->new;
$pidf_h->open($pidf,'<') or die "Can't open PID file $pidf: $!";
for ($! = 0; defined($ln=$pidf_h->getline); $! = 0) {
chomp($ln); $lcnt++; last if $lcnt > 100;
$amavisd_pid = $ln if $lcnt == 1 && $ln =~ /^\d{1,10}\z/;
}
defined $ln || $! == 0 or die "Error reading from file $pidf: $!";
$pidf_h->close or die "Error closing file $pidf: $!";
if ($lcnt <= 1 && !defined $amavisd_pid) {
# empty or junk one-line pid file treated the same as nonexisting file
die "The amavisd daemon is apparently not running, ".
"empty PID file $pidf\n" if $cmd =~ /^(?:reload|restart|stop)\z/;
# prevent Net::Server from seeing this crippled file
do_log(-1, "removing empty or crippled PID file %s", $pidf);
unlink($pidf) or die "Can't remove PID file $pidf: $!";
undef $amavisd_pid;
} else {
$lcnt <= 1 or die "More than one line in file $pidf";
defined $amavisd_pid or die "Missing process ID in file $pidf";
$amavisd_pid >= 1 or die "Invalid PID in file $pidf: [$amavisd_pid]";
# note that amavisd under Docker may run as PID #1
}
my $mtime = $stat_list[9];
if (defined $amavisd_pid && defined $mtime) { # got a PID from a file
# Is pid file older than system uptime? If so, it should be disregarded,
# it must not prevent starting up amavisd after unclean shutdown.
my $now = int(time); my($uptime,$uptime_fmt); # sys uptime in seconds
my(@prog_args); my(@progs) = ('/usr/bin/uptime','uptime');
if (lc($^O) eq 'freebsd')
{ @progs = ('/sbin/sysctl','sysctl'); @prog_args = 'kern.boottime' }
my $prog = find_program_path(\@progs, [split(/:/,$path,-1)] );
if (!defined($prog)) {
do_log(1,'No programs: %s',join(", ",@progs));
} else { # obtain system uptime
my($proc_fh,$uppid);
eval {
($proc_fh,$uppid) = run_command(undef,'/dev/null',$prog,@prog_args);
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
local($1,$2,$3,$4); chomp($ln);
if (defined $uptime) {}
elsif ($ln =~ /{[^}]*\bsec\s*=\s*(\d+)[^}]*}/) {
$uptime = $now - $1;
# amazingly broken reports from uptime(1) soon after boot!
} elsif ($ln =~ /\b up \s+ (?: (\d{1,4}) \s* day(?:s|\(s\))? )? [,\s]*
(\d{1,2}) : (\d{1,2}) (?: : (\d{1,2}))? (?! \d ) /ix
|| $ln =~ /\b up (?: \s* \b (\d{1,4}) \s* day(?:s|\(s\))? )?
(?: [,\s]* \b (\d{1,2}) \s* hr(?:s|\(s\))? )?
(?: [,\s]* \b (\d{1,2}) \s* min(?:s|\(s\))? )?
(?: [,\s]* \b (\d{1,2}) \s* sec(?:s|\(s\))? )? /ix ) {
$uptime = (($1*24 + $2)*60 + $3)*60 + $4;
} elsif ($ln =~ /\b (\d{1,2}) \s* secs?/ix) {
$uptime = $1; # OpenBSD
}
$uptime_fmt = format_time_interval($uptime);
do_log(5,"system uptime %s: %s", $uptime_fmt,$ln);
}
defined $ln || $! == 0 or die "Reading uptime: $!";
my $err=0; $proc_fh->close or $err = $!;
my $child_stat = defined $uppid && waitpid($uppid,0)>0 ? $? : undef;
undef $proc_fh; undef $uppid;
proc_status_ok($child_stat,$err)
or die "Error running $prog: " .
exit_status_str($child_stat,$err) . "\n";
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(1,"uptime: %s", $eval_stat);
};
if (defined $proc_fh) { $proc_fh->close } # ignoring status
if (defined $uppid) { waitpid($uppid,0) } # ignoring status
}
if (!defined $uptime) {
do_log(1,'Unable to determine system uptime, will trust PID file %s',
$pidf);
} elsif ($now-$mtime <= $uptime+70) {
do_log(1,'Valid PID file %s (younger than sys uptime %s)',
$pidf, $uptime_fmt);
} else { # must not kill an unrelated process which happens to have the
# same pid as amavisd had before a system shutdown or crash
undef $amavisd_pid;
do_log(1,'Ignoring stale PID file %s, older than system uptime %s',
$pidf, $uptime_fmt);
}
}
}
}
if (defined $amavisd_pid) {
untaint_inplace($amavisd_pid);
if (!kill(0,$amavisd_pid)) { # does a process exist?
$! == ESRCH or die "Can't send SIG 0 to process [$amavisd_pid]: $!";
do_log(2, 'No such process [%s], supposedly the current amavisd '.
'master process', $amavisd_pid);
undef $amavisd_pid; # process does not exist
};
}
if ($warm_restart) {
# a semi-documented Net::Server mechanism for a restart on HUP;
# assume we have just been reincarnated by exec as a result of a HUP,
# so just ignore the command parameter and let Net::Server do the rest
} elsif ($cmd =~ /^(?:start|debug|debug-sa|foreground)?\z/) {
!defined($amavisd_pid)
or die "The amavisd daemon is already running, PID: [$amavisd_pid]\n";
} elsif ($cmd eq 'reload') { # reload: send a HUP signal to a running daemon
my $pidf = defined $pid_file_override ? $pid_file_override : $pid_file;
if (!defined $amavisd_pid && (!defined $pidf || $pidf eq '')) {
die "No PID file, cannot determine a process ID of a running daemon.\n" .
"To reload an existing amavisd daemon send it a SIGHUP signal.\n";
} elsif (!defined $amavisd_pid) {
die "The amavisd daemon is apparently not running, cannot reload it.\n";
} else {
kill('HUP',$amavisd_pid) or $! == ESRCH
or die "Can't SIGHUP amavisd[$amavisd_pid]: $!";
my $msg = "Signalling a SIGHUP to a running daemon [$amavisd_pid]";
do_log(2,"%s",$msg);
# print STDOUT "$msg\n";
exit(0);
}
} elsif ($cmd =~ /^(?:restart|stop)\z/) { # stop or restart
my $pidf = defined $pid_file_override ? $pid_file_override : $pid_file;
if (!defined $amavisd_pid && (!defined $pidf || $pidf eq '')) {
die "No PID file, cannot determine a process ID of a running daemon.\n" .
"To stop an existing amavisd daemon send it a SIGTERM signal.\n";
} elsif (!defined $amavisd_pid) {
die "The amavisd daemon is apparently not running, cannot stop it.\n";
} else {
my($kill_sig_used, $killed_amavisd_pid);
eval { # first stop a running daemon
$kill_sig_used = 'TERM';
kill($kill_sig_used,$amavisd_pid) or $! == ESRCH
or die "Can't SIG$kill_sig_used amavisd[$amavisd_pid]: $!";
my $waited = 0; my $sigkill_sent = 0; my $delay = 1; # seconds
for (;;) { # wait for the old running daemon to go away
sleep($delay); $waited += $delay; $delay = 5;
if (!kill(0,$amavisd_pid)) { # is the old daemon still there?
$! == ESRCH or die "Can't send SIG 0 to amavisd[$amavisd_pid]: $!";
$killed_amavisd_pid = $amavisd_pid; # old process is gone, done
last;
}
if ($waited < 60 || $sigkill_sent) {
do_log(2,"Waiting for the process [%s] to terminate",$amavisd_pid);
print STDOUT
"Waiting for the process [$amavisd_pid] to terminate\n";
} else { # use stronger hammer
do_log(2,"Sending SIGKILL to amavisd[%s]",$amavisd_pid);
print STDERR "Sending SIGKILL to amavisd[$amavisd_pid]\n";
$kill_sig_used = 'KILL';
kill($kill_sig_used,$amavisd_pid) or $! == ESRCH
or warn "Can't SIGKILL amavisd[$amavisd_pid]: $!";
$sigkill_sent = 1;
}
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
die "$eval_stat, can't $cmd the process\n";
};
my $msg = !defined($killed_amavisd_pid) ? undef :
"Daemon [$killed_amavisd_pid] terminated by SIG$kill_sig_used";
if ($cmd eq 'stop') {
if (defined $msg) { do_log(2,"%s",$msg); print STDOUT "$msg\n" }
exit(0);
}
if (defined $killed_amavisd_pid) {
print STDOUT "$msg, waiting for dust to settle...\n";
sleep 5; # wait for TCP sockets to be released
}
print STDOUT "becoming a new daemon...\n";
}
} else {
die "$myversion: Unknown command line parameter: $cmd\n\n" . usage();
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(2,"%s", $eval_stat);
die "$eval_stat\n";
};
$daemonize = 0 if $DEBUG; # in case $DEBUG came from a config file
# Set path, home and term explicitly. Don't trust environment
$ENV{PATH} = $path if defined $path && $path ne '';
$ENV{HOME} = $helpers_home if defined $helpers_home && $helpers_home ne '';
$ENV{TERM} = 'dumb'; $ENV{COLUMNS} = '80'; $ENV{LINES} = '100';
{ my $msg = '';
$msg .= ", instance=$instance_name" if $instance_name ne '';
$msg .= ", nl=".sprintf('\\x%02X',ord("\n")) if "\n" ne "\012";
$msg .= ", Unicode aware"; # ensured by 'require 5.008'
for (qw(PERLIO LC_ALL LANG LC_CTYPE LC_TIME LC_MESSAGES)) {
$msg .= sprintf(', %s="%s"',
$_, $ENV{$_}) if defined $ENV{$_} && $ENV{$_} ne '';
}
do_log(0,"starting.%s %s at %s %s%s",
!$warm_restart?'':' (warm)', $0,
idn_to_utf8(c('myhostname')), $myversion, $msg);
}
# report version of Perl and process UID/GID
do_log(0, "perl=%s, user=%s, EUID: %s (%s); group=%s, EGID: %s (%s)",
$], $desired_user, $>, $<, $desired_group, $), $();
if ($warm_restart) {
# a semi-documented Net::Server mechanism to let a restarted process
# re-acquire sockets from its predecessor on a HUP
my $str = $ENV{BOUND_SOCKETS}; $str =~ s/\n/, /gs;
do_log(1,"warm restart on HUP [%s]: '%s', sockets: %s",
$$, join(' ',$0,@ARGV), $str);
}
# $SIG{USR2} = sub {
# my $msg = Carp::longmess("SIG$_[0] received, backtrace:");
# print STDERR "\n",$msg,"\n"; do_log(-1,"%s",$msg);
# };
fetch_modules_extra(); # bring additional modules into memory and compile them
$spamcontrol_obj = Amavis::SpamControl->new if $extra_code_antispam;
$spamcontrol_obj->init_pre_chroot if $spamcontrol_obj;
# log warnings and uncaught errors
$SIG{'__DIE__' } =
sub { return if $^S || !defined $^S;
my $m = $_[0]; chomp($m); do_log(-1,"_DIE: %s", $m);
};
$SIG{'__WARN__'} =
sub { my $m = $_[0]; chomp($m); do_log(2,"_WARN: %s", $m) };
# use Data::Dumper;
# my $m2 = Carp::longmess(); do_log(2,"%s",Dumper($m2));
if (!defined $io_socket_module_name) {
do_log(-1,"no INET or INET6 socket modules available");
} else {
do_log(2,"socket module %s, protocol families available: %s",
$io_socket_module_name,
join(', ', !$have_inet4 ? () :'INET', !$have_inet6 ? () :'INET6'));
}
# matches global unicast addresses
# (i.e. valid addresses except: local, private or multicast addresses)
# RFC 6890 (ex RFC 5735/3330), RFC 3513 (IPv6), RFC 4193 (ULA), RFC 6598 (CGN)
@public_networks_maps = (
Amavis::Lookup::Label->new('public_nets'),
Amavis::Lookup::IP->new(qw(
!127.0.0.0/8 !::1 !0.0.0.0/8 !:: !169.254.0.0/16 !fe80::/10
!10.0.0.0/8 !172.16.0.0/12 !192.168.0.0/16 !fc00::/7 !100.64.0.0/10
!240.0.0.0/4 !224.0.0.0/4 !ff00::/8
::ffff:0:0/96 ::/0 )) );
# set up Net::Server configuration
my(@bind_to);
{ # merge port numbers, unix sockets and default binding host address into
# a unified list @listen_sockets, which will be passed on to Net::Server
#
local($1);
@bind_to = ref $inet_socket_bind ? @$inet_socket_bind : $inet_socket_bind;
$_ = !defined $_ || $_ eq '' ? '*' : /^\[(.*)\]\z/s ? $1 : $_ for @bind_to;
@bind_to = ( '*' ) if !@bind_to;
my(@merged_listen_sockets, @ignored);
for (@listen_sockets) {
# roughly mimic the Net::Server::Proto and Net::Server::Proto::TCP parsing
if (m{^/} || m{[/|]unix\z}si) {
push(@merged_listen_sockets, $_); # looks like a Unix socket
} elsif (m{^ \[ [^\]]* \] : }xs || m{^ [^/|:]* : }xs) {
push(@merged_listen_sockets, $_); # explicit host & port specified
} else { # assume port (or service) specification only, supply bind addr
for my $bind_addr (@bind_to) { # Cartesian product: bind_addr x port
# need brackets around an IPv6 address (as per RFC 5952, RFC 3986)
push(@merged_listen_sockets,
$bind_addr =~ /:[0-9a-f]*:/i ? "[$bind_addr]:$_"
: "$bind_addr:$_" );
}
}
}
# filter listen sockets according to protocol families available
@listen_sockets = ();
for (@merged_listen_sockets) {
if (m{^/} || m{[/|]unix\z}si) {
push(@listen_sockets, $_); # looks like a Unix socket
} elsif (m{^ \[ ( [^\]]* ) \] : }xs || m{^ ([^/|:]*) : }xs) {
my $addr = $1;
if ($addr =~ /:[0-9a-f]*:/i) { # looks like an IPv6 address
push(@{$have_inet6 ? \@listen_sockets : \@ignored}, $_);
} elsif ($addr =~ /^\d+\.\d+\.\d+\.\d+\z/s) { # an IPv4 address
push(@{$have_inet4 ? \@listen_sockets : \@ignored}, $_);
} else { # can't tell without resolving, take it without checking
push(@listen_sockets, $_);
}
}
}
do_log(2,"ignored due to unsupported protocol family: %s",
join(', ',@ignored)) if @ignored;
@listen_sockets or die "No listen sockets specified, aborting\n";
do_log(2,"will bind to %s", join(', ',@listen_sockets));
}
# better catch and report potential Redis problems early before forking
if ($extra_code_redis && @storage_redis_dsn) {
eval {
my $redis_storage_tmp = Amavis::Redis->new(@storage_redis_dsn);
$redis_storage_tmp->connect; undef $redis_storage_tmp; 1;
} or do {
warn "Redis error, starting anyway: $@";
};
}
# DESTROY a ZMQ context (if any) of the main process,
# it would not survive across daemonization / forking,
# each child process needs to make its own context and sockets
undef $zmq_obj;
my $server = Amavis->new({
# command args to be used after HUP must be untainted, deflt: [$0,@ARGV]
# commandline => ['/usr/local/sbin/amavisd','-c',$config_file[0] ],
# commandline => [], # disable
commandline => [ map(untaint($_), ($0,@ARGV)) ],
port => \@listen_sockets, # listen on these sockets (Unix, inet, inet6)
host => $bind_to[0], # default bind, redundant, merged to @listen_sockets
listen => $listen_queue_size, # undef for a default
max_servers => $max_servers, # number of pre-forked children
!defined($min_servers) ? ()
: ( min_servers => $min_servers,
min_spare_servers => $min_spare_servers,
max_spare_servers => $max_spare_servers),
max_requests => defined $max_requests && $max_requests > 0 ? $max_requests
: 2E9, # avoid default of 1000
user => ($> == 0 || $< == 0) ? $daemon_user : undef,
group => ($> == 0 || $< == 0) ? $daemon_group : undef,
pid_file => $amavisd_pid_by_mainpid ? undef
: defined $pid_file_override ? $pid_file_override : $pid_file,
# socket serialization lockfile
lock_file => defined $lock_file_override? $lock_file_override: $lock_file,
# serialize => 'flock', # flock, semaphore, pipe
background => $daemonize ? 1 : undef,
setsid => $daemonize ? 1 : undef,
chroot => $daemon_chroot_dir ne '' ? $daemon_chroot_dir : undef,
no_close_by_child => 1,
leave_children_open_on_hup => 1,
# no_client_stdout introduced with Net::Server 0.92, but is broken in 0.92
no_client_stdout => (Net::Server->VERSION >= 0.93 ? 1 : 0),
# controls log level for Net::Server internal log messages:
# 0=err, 1=warning, 2=notice, 3=info, 4=debug
log_level => ($DEBUG || c('log_level') >= 5) ? 4 : 2,
log_file => undef, # method will be overridden by a call to do_log()
# SSL_cert_file => "$MYHOME/cert/mail-cert.pem",
# SSL_key_file => "$MYHOME/cert/mail-key.pem",
});
$0 = c('myprogram_name') . ' (master)';
sd_notify(0, "STATUS=Transferring control to Net::Server.");
$server->run; # transferring control to Net::Server
# shouldn't get here
exit 1;
1; # make perlcritic happy
# we read text (such as notification templates) from DATA sections
# to avoid any interpretations of special characters (e.g. \ or ') by Perl
#
__DATA__
#
package Amavis::ZMQ;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform $myversion $nanny_details_level);
import Amavis::Util qw(ll do_log do_log_safe
snmp_initial_oids snmp_counters_get);
}
use vars qw($zmq_mod_name $zmq_mod_version $zmq_lib_version);
BEGIN {
my($zmq_major, $zmq_minor, $zmq_patch);
if (eval { require ZMQ::LibZMQ3 && require ZMQ::Constants }) {
$zmq_mod_name = 'ZMQ::LibZMQ3'; # new interface module to zmq v3 or libxs
import ZMQ::LibZMQ3; import ZMQ::Constants qw(:all);
($zmq_major, $zmq_minor, $zmq_patch) = ZMQ::LibZMQ3::zmq_version();
# *zmq_sendmsg [native] # (socket,msgobj,flags)
# *zmq_recvmsg [native] # (socket,flags) -> msgobj
*zmq_sendstr = sub { # (socket,string,flags)
my $rv = zmq_send($_[0], $_[1], length $_[1], $_[2]||0);
$rv == -1 ? undef : $rv;
};
} elsif (eval { require ZMQ::LibZMQ2 && require ZMQ::Constants }) {
$zmq_mod_name = 'ZMQ::LibZMQ2'; # new interface module to zmq v2
import ZMQ::LibZMQ2; import ZMQ::Constants qw(:all);
($zmq_major, $zmq_minor, $zmq_patch) = ZMQ::LibZMQ2::zmq_version();
# zmq v2/v3 incompatibile renaming
*zmq_sendmsg = \&ZMQ::LibZMQ2::zmq_send; # (socket,msgobj,flags)
*zmq_recvmsg = \&ZMQ::LibZMQ2::zmq_recv; # (socket,flags) -> msgobj
*zmq_sendstr = sub { # (socket,string,flags)
my $rv = zmq_send(@_); $rv == -1 ? undef : $rv;
};
} elsif (eval { require ZeroMQ::Constants && require ZeroMQ::Raw }) {
$zmq_mod_name = 'ZeroMQ'; # old interface module to zmq v2
import ZeroMQ::Raw; import ZeroMQ::Constants qw(:all);
($zmq_major, $zmq_minor, $zmq_patch) = ZeroMQ::version();
# zmq v2/v3 incompatibile renaming
*zmq_sendmsg = \&ZeroMQ::Raw::zmq_send; # (socket,msgobj,flags)
*zmq_recvmsg = \&ZeroMQ::Raw::zmq_recv; # (socket,flags) -> msgobj
*zmq_sendstr = sub { # (socket,string,flags)
my $rv = zmq_send(@_); $rv == -1 ? undef : $rv;
};
} else {
die "Perl modules ZMQ::LibZMQ3 or ZMQ::LibZMQ2 or ZeroMQ not available\n";
}
$zmq_mod_version = $zmq_mod_name->VERSION;
$zmq_lib_version = join('.', $zmq_major, $zmq_minor, $zmq_patch);
1;
} # BEGIN
sub zmq_version {
sprintf("%s %s, lib %s",
$zmq_mod_name, $zmq_mod_version, $zmq_lib_version);
};
sub new {
my($class,@socknames) = @_;
my $self = { ctx => undef, sock => undef,
inactivated => 0, socknames => [ @socknames ],
base_timestamp => undef };
bless $self, $class;
$self->establish;
$self;
}
sub inactivate {
my $self = $_[0];
$self->{inactivated} = 1;
}
use vars qw($zmq_in_establish); # prevents loop if logging to zmq
sub establish {
my $self = $_[0];
return if $self->{inactivated} || $zmq_in_establish;
my($ctx,$sock);
eval {
$zmq_in_establish = 1;
$ctx = $self->{ctx};
if (!$ctx) {
$self->{sock} = undef; # just in case
# do_log(5,'zmq: zmq_init');
$self->{ctx} = $ctx = zmq_init(1);
$ctx or die "Error creating ZMQ context: $!";
}
$sock = $self->{sock};
if (!$sock && $ctx) { # connect to a socket
# do_log(5,'zmq: zmq_socket');
$self->{sock} = $sock = zmq_socket($ctx, ZMQ_PUB);
if (!$sock) {
die "Error creating ZMQ socket: $!";
} else {
# do_log(5,'zmq: zmq_setsockopt');
zmq_setsockopt($sock, ZMQ_LINGER, 2000) != -1 # milliseconds
or die "Error setting ZMQ_LINGER on a ZMQ socket: $!";
my $hwm = defined &ZMQ_SNDHWM ? ZMQ_SNDHWM()
: defined &ZMQ_HWM ? ZMQ_HWM() : undef;
if (defined $hwm) {
zmq_setsockopt($sock, $hwm, 1000) != -1
or die "Error setting highwater mark on a ZMQ socket: $!";
}
for my $sockspec (@{$self->{socknames}}) {
my $sock_ipv4only = 1; # a ZMQ default
if (defined &ZMQ_IPV4ONLY && $sockspec =~ /:[0-9a-f]*:/i) {
zmq_setsockopt($sock, ZMQ_IPV4ONLY(), 0) != -1
or die "Error turning off ZMQ_IPV4ONLY on a ZMQ socket: $!";
$sock_ipv4only = 0;
}
# do_log(5,'zmq: zmq_connect %s%s', $sockspec,
# $sock_ipv4only ? '' : ', IPv6 enabled');
zmq_connect($sock, $sockspec) == 0
or die "Error connecting ZMQ socket to $sockspec: $!";
}
}
}
1;
} or do { # clean up, disable, and resignal a failure
zmq_close($sock) if $sock; # ignoring status
zmq_term($ctx) if $ctx; # ignoring status
undef $self->{sock}; undef $self->{ctx};
$self->{inactivated} = 1; $zmq_in_establish = 0;
chomp $@; die "zmq establish failed: $@\n"; # propagate the exception
};
$zmq_in_establish = 0;
$sock;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
# can occur soon after fork, must not use context (like calling a logger)
if (!$self->{inactivated}) {
my $sock = $self->{sock};
if ($sock) {
zmq_setsockopt($sock, ZMQ_LINGER, 0); # ignoring status
zmq_close($sock); # ignoring status
}
my $ctx = $self->{ctx};
zmq_term($ctx) if $ctx; # ignoring status
}
undef $self->{sock}; undef $self->{ctx};
%{$self} = (); # then ditch the rest
}
sub register_proc {
my($self, $details_level, $reset_timestamp, $state, $task_id) = @_;
my $sock = $self->{sock}; # = $self->establish;
return if !$sock;
# if (!defined $state || $details_level <= $nanny_details_level) {
if (1) {
my $pid = $$;
my $msg;
my $now = Time::HiRes::time;
if ($reset_timestamp || !$self->{base_timestamp}) {
$self->{base_timestamp} = $now;
$msg = sprintf('am.st %d %014.3f ', $pid, $now);
} else {
my $dt = $now - $self->{base_timestamp};
$msg = sprintf('am.st %d %d ', $pid, $dt <= 0 ? 0 : int($dt*1000 + 0.5));
}
if (!defined $state) {
$msg .= 'exiting';
} else {
$state = '-' if $state eq ' ' || $state eq ''; # simplifies parsing
$msg .= $state;
$msg .= ' ' . $task_id if defined $task_id;
}
# do_log(5,'zmq: register_proc: %s', $msg);
defined zmq_sendstr($sock, $msg)
or die "Error sending a ZMQ message: $!";
}
}
sub write_log {
# my($self, $level, $errmsg) = @_;
my $self = $_[0];
my $sock = $self->{sock}; # = $self->establish;
return if !$sock;
my $level = $_[1];
my $nstars = 6 - $level;
$nstars = 7 if $nstars > 7;
$nstars = 1 if $nstars < 1;
# ignoring status to prevent a logging loop
zmq_sendstr($sock, sprintf('am.log.%s %s %014.3f %s', '*' x $nstars, $$,
Time::HiRes::time, $_[2]));
}
# insert startup time SNMP entry, called from the master process at startup
#
sub put_initial_snmp_data {
my($self,$flush) = @_;
my $sock = $self->{sock}; # = $self->establish;
return if !$sock;
# do_log(5,'zmq: publishing initial snmp data');
if ($flush) {
# do_log(5,'zmq: sending am.snmp FLUSH');
defined zmq_sendstr($sock, 'am.snmp FLUSH')
or die "Error sending a ZMQ flush message: $!";
}
my $list_ref = snmp_initial_oids();
my $list_ind_last = $#{$list_ref};
for my $obj_ind (0 .. $list_ind_last) {
my($key,$type,$val) = @{$list_ref->[$obj_ind]};
my $more = $obj_ind < $list_ind_last;
my $msg = sprintf('am.snmp %s %s %s', $key, $type, $val);
# do_log(5,'zmq: sending %s %s', $more?'M':' ', $msg);
defined zmq_sendstr($sock, $msg, $more ? ZMQ_SNDMORE : 0)
or die "Error sending a ZMQ message: $!";
};
}
sub update_snmp_variables {
my $self = $_[0];
my $sock = $self->{sock}; # = $self->establish;
return if !$sock;
my $msg;
my $snmp_var_names_ref = snmp_counters_get();
if (defined $snmp_var_names_ref && @$snmp_var_names_ref) {
do_log(4,'zmq: updating snmp variables');
for my $key (@$snmp_var_names_ref) {
my($snmp_var_name, $val, $type) = ref $key ? @$key : ($key);
if ($snmp_var_name eq 'entropy') {
next; # don't broadcast entropy
} elsif (!defined $type || $type eq '') { # a counter, same as C32
$type = 'C32';
$val = 1 if !defined $val; # by default a counter increments by 1
next if $val < 0; # a counter is supposed to be unsigned
} elsif ($type eq 'C32' || $type eq 'C64') { # a counter
$val = 1 if !defined $val; # by default a counter increments by 1
next if $val < 0; # a counter is supposed to be unsigned
} elsif ($type eq 'INT') { # an integer
# no limitations here, sprintf will convert it to a string
} elsif ($type eq 'TIM') { # TimeTicks
next if $val < 0; # non-decrementing
}
if (defined $msg) { # send assembled message from previous iteration
# do_log(5,'zmq: sending M %s', $msg);
defined zmq_sendstr($sock, $msg, ZMQ_SNDMORE)
or die "Error sending a ZMQ message: $!";
}
$msg = sprintf('am.snmp %s %s %s', $snmp_var_name, $type, $val);
}
if (defined $msg) { # last chunk of a multi-part message
# do_log(5,'zmq: sending %s', $msg);
defined zmq_sendstr($sock, $msg, 0)
or die "Error sending a ZMQ message: $!";
}
}
}
1;
__DATA__
#
package Amavis::DB::SNMP;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform $myversion $nanny_details_level);
import Amavis::Util qw(ll do_log do_log_safe
snmp_initial_oids snmp_counters_get
add_entropy fetch_entropy_bytes);
}
use BerkeleyDB;
use MIME::Base64;
use Time::HiRes ();
# open existing databases (called by each child process)
#
sub new {
my($class,$db_env) = @_; $! = 0; my $env = $db_env->get_db_env;
defined $env or die "BDB get_db_env (dbS/dbN): $BerkeleyDB::Error, $!.";
$! = 0; my $dbs = BerkeleyDB::Hash->new(-Filename=>'snmp.db', -Env=>$env);
defined $dbs or die "BDB no dbS: $BerkeleyDB::Error, $!.";
$! = 0; my $dbn = BerkeleyDB::Hash->new(-Filename=>'nanny.db',-Env=>$env);
defined $dbn or die "BDB no dbN: $BerkeleyDB::Error, $!.";
bless { 'db_snmp'=>$dbs, 'db_nanny'=>$dbn }, $class;
}
sub DESTROY {
my $self = $_[0];
local($@,$!,$_); my $myactualpid = $$;
if (defined($my_pid) && $myactualpid != $my_pid) {
do_log_safe(5,"Amavis::DB::SNMP DESTROY skip, clone [%s] (born as [%s])",
$myactualpid, $my_pid);
} else {
do_log_safe(5,"Amavis::DB::SNMP DESTROY called");
for my $db_name ('db_snmp', 'db_nanny') {
my $db = $self->{$db_name};
if (defined $db) {
eval {
$db->db_close==0 or die "db_close: $BerkeleyDB::Error, $!."; 1;
} or do { $@ = "errno=$!" if $@ eq '' };
if ($@ ne '' && $@ !~ /\bDatabase is already closed\b/)
{ warn "[$myactualpid] BDB S+N DESTROY INFO ($db_name): $@" }
undef $db;
}
}
}
}
#sub lock_stat($) {
# my $label = $_[0];
# my $s = qx'/usr/local/bin/db_stat-4.2 -c -h /var/amavis/db | /usr/local/bin/perl -ne \'$a{$2}=$1 if /^(\d+)\s+Total number of locks (requested|released)/; END {printf("%d, %d\n",$a{requested}, $a{requested}-$a{released})}\'';
# do_log(0, "lock_stat %s: %s", $label,$s);
#}
# insert startup time SNMP entry, called from the master process at startup
# (a classical subroutine, not a method)
#
sub put_initial_snmp_data($) {
my $db = $_[0];
my($eval_stat,$interrupt); $interrupt = '';
{ my $cursor;
my $h1 = sub { $interrupt = $_[0] };
local(@SIG{qw(INT HUP TERM TSTP QUIT ALRM USR1 USR2)}) = ($h1) x 8;
eval { # ensure cursor will be unlocked even in case of errors or signals
$cursor = $db->db_cursor(DB_WRITECURSOR); # obtain write lock
defined $cursor or die "BDB S db_cursor: $BerkeleyDB::Error, $!.";
my $list_ref = snmp_initial_oids();
for my $obj (@$list_ref) {
my($key,$type,$val) = @$obj;
$cursor->c_put($key, sprintf("%s %s",$type,$val), DB_KEYLAST) == 0
or die "BDB S c_put: $BerkeleyDB::Error, $!.";
};
$cursor->c_close==0 or die "BDB S c_close: $BerkeleyDB::Error, $!.";
undef $cursor; 1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
$cursor->c_close if defined $cursor; # unlock, ignoring status
undef $cursor;
}; # restore signal handlers
if ($interrupt ne '') { kill($interrupt,$$) } # resignal, ignoring status
elsif (defined $eval_stat) {
chomp $eval_stat;
die "put_initial_snmp_data: BDB S $eval_stat\n";
}
}
sub update_snmp_variables {
my $self = $_[0];
do_log(5,"updating snmp variables in BDB");
my $snmp_var_names_ref = snmp_counters_get();
my($eval_stat,$interrupt); $interrupt = '';
if (defined $snmp_var_names_ref && @$snmp_var_names_ref) {
my $db = $self->{'db_snmp'}; my $cursor;
my $h1 = sub { $interrupt = $_[0] };
local(@SIG{qw(INT HUP TERM TSTP QUIT ALRM USR1 USR2)}) = ($h1) x 8;
eval { # ensure cursor will be unlocked even in case of errors or signals
$cursor = $db->db_cursor(DB_WRITECURSOR); # obtain write lock
defined $cursor or die "db_cursor: $BerkeleyDB::Error, $!.";
for my $key (@$snmp_var_names_ref) {
my($snmp_var_name,$arg,$type) = ref $key ? @$key : ($key);
$type = 'C32' if !defined($type) || $type eq '';
if ($type eq 'C32' || $type eq 'C64') { # a counter
if (!defined($arg)) { $arg = 1 } # by default counter increments by 1
elsif ($arg < 0) { $arg = 0 } # counter is supposed to be unsigned
} elsif ($type eq 'TIM') { # TimeTicks
if ($arg < 0) { $arg = 0 } # non-decrementing
}
my($val,$flags); local($1);
my $stat = $cursor->c_get($snmp_var_name,$val,DB_SET);
if ($stat==0) { # exists, update it (or replace it)
if ($type eq 'C32' && $val=~/^C32 (\d+)\z/) { $val = $1+$arg }
elsif ($type eq 'C64' && $val=~/^C64 (\d+)\z/) { $val = $1+$arg }
elsif ($type eq 'TIM' && $val=~/^TIM (\d+)\z/) { $val = $1+$arg }
elsif ($type eq 'INT' && $val=~/^INT ([+-]?\d+)\z/) { $val = $arg }
elsif ($type=~/^(STR|OID)\z/ && $val=~/^\Q$type\E (.*)\z/) {
if ($snmp_var_name ne 'entropy') { $val = $arg }
else { # blend-in entropy
$val = $1; add_entropy($val, Time::HiRes::gettimeofday);
$val = fetch_entropy_bytes(18); # 18 bytes
$val = encode_base64($val,''); # 18*8/6 = 24 chars
$val =~ tr{+/}{-_}; # base64 -> RFC 4648 base64url [A-Za-z0-9-_]
}
}
else {
do_log(-2,"WARN: variable syntax? %s: %s, clearing",
$snmp_var_name,$val);
$val = 0;
}
$flags = DB_CURRENT;
} else { # create new entry
$stat==DB_NOTFOUND or die "c_get: $BerkeleyDB::Error, $!.";
$flags = DB_KEYLAST; $val = $arg;
}
my $fmt = $type eq 'C32' ? "%010d" : $type eq 'C64' ? "%020.0f"
: $type eq 'INT' ? "%010d" : undef;
# format for INT should really be %011d, but keep compatibility for now
my $str = defined($fmt) ? sprintf($fmt,$val) : $val;
$cursor->c_put($snmp_var_name, $type.' '.$str, $flags) == 0
or die "c_put: $BerkeleyDB::Error, $!.";
}
$cursor->c_close==0 or die "c_close: $BerkeleyDB::Error, $!.";
undef $cursor; 1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
if (defined $db) {
$cursor->c_close if defined $cursor; # unlock, ignoring status
undef $cursor;
# if (!defined($eval_stat)) {
# my $stat; $db->db_sync(); # not really needed
# $stat==0 or warn "BDB S db_sync,status $stat: $BerkeleyDB::Error, $!.";
# }
}
}; # restore signal handlers
delete $self->{'cnt'};
if ($interrupt ne '') { kill($interrupt,$$) } # resignal, ignoring status
elsif (defined $eval_stat) {
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "update_snmp_variables: BDB S $eval_stat\n";
}
}
sub read_snmp_variables {
my($self,@snmp_var_names) = @_;
my($eval_stat,$interrupt); $interrupt = '';
my $db = $self->{'db_snmp'}; my $cursor; my(@values);
{ my $h1 = sub { $interrupt = $_[0] };
local(@SIG{qw(INT HUP TERM TSTP QUIT ALRM USR1 USR2)}) = ($h1) x 8;
eval { # ensure cursor will be unlocked even in case of errors or signals
$cursor = $db->db_cursor; # obtain read lock
defined $cursor or die "db_cursor: $BerkeleyDB::Error, $!.";
for my $cname (@snmp_var_names) {
my $val; my $stat = $cursor->c_get($cname,$val,DB_SET);
push(@values, $stat==0 ? $val : undef);
$stat==0 || $stat==DB_NOTFOUND or die "c_get: $BerkeleyDB::Error, $!.";
}
$cursor->c_close==0 or die "c_close: $BerkeleyDB::Error, $!.";
undef $cursor; 1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
if (defined $db) {
$cursor->c_close if defined $cursor; # unlock, ignoring status
undef $cursor;
}
}; # restore signal handlers
if ($interrupt ne '') { kill($interrupt,$$) } # resignal, ignoring status
elsif (defined $eval_stat) {
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "read_snmp_variables: BDB S $eval_stat\n";
}
for my $val (@values) {
if (!defined($val)) {} # keep undefined
elsif ($val =~ /^(?:C32|C64) (\d+)\z/) { $val = 0+$1 }
elsif ($val =~ /^(?:INT) ([+-]?\d+)\z/) { $val = 0+$1 }
elsif ($val =~ /^(?:STR|OID) (.*)\z/) { $val = $1 }
else { do_log(-2,"WARN: counter syntax? %s", $val); undef $val }
}
\@values;
}
sub register_proc {
my($self, $details_level, $reset_timestamp, $state, $task_id) = @_;
my $eval_stat; my $interrupt = '';
if (!defined($state) || $details_level <= $nanny_details_level) {
$task_id = '' if !defined $task_id;
my $db = $self->{'db_nanny'}; my $key = sprintf("%05d",$$);
my $cursor; my $val;
my $h1 = sub { $interrupt = $_[0] };
local(@SIG{qw(INT HUP TERM TSTP QUIT ALRM USR1 USR2)}) = ($h1) x 8;
eval { # ensure cursor will be unlocked even in case of errors or signals
$cursor = $db->db_cursor(DB_WRITECURSOR); # obtain write lock
defined $cursor or die "db_cursor: $BerkeleyDB::Error, $!.";
my $stat = $cursor->c_get($key,$val,DB_SET);
$stat==0 || $stat==DB_NOTFOUND or die "c_get: $BerkeleyDB::Error, $!.";
if ($stat==0 && !defined $state) { # remove existing entry
$cursor->c_del==0 or die "c_del: $BerkeleyDB::Error, $!.";
} elsif (defined $state) { # add new, or update existing entry
my $timestamp; local($1);
# keep its timestamp when updating existing record
$timestamp = $1 if $stat==0 && $val=~/^(\d+(?:\.\d*)?) /s;
$timestamp = sprintf("%014.3f", Time::HiRes::time)
if !defined($timestamp) || $reset_timestamp;
my $new_val = sprintf("%s %-14s", $timestamp, $state.$task_id);
$cursor->c_put($key, $new_val,
$stat==0 ? DB_CURRENT : DB_KEYLAST ) == 0
or die "c_put: $BerkeleyDB::Error, $!.";
}
$cursor->c_close==0 or die "c_close: $BerkeleyDB::Error, $!.";
undef $cursor; 1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
if (defined $db) {
$cursor->c_close if defined $cursor; # unlock, ignoring status
undef $cursor;
# if (!defined($eval_stat)) {
# my $stat = $db->db_sync(); # not really needed
# $stat==0 or warn "BDB N db_sync,status $stat: $BerkeleyDB::Error, $!.";
# }
}
}; # restore signal handlers
if ($interrupt ne '') {
kill($interrupt,$$); # resignal, ignoring status
} elsif (defined $eval_stat) {
chomp $eval_stat;
do_log_safe(5, "register_proc: BDB N %s", $eval_stat);
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "register_proc: BDB N $eval_stat\n";
}
}
1;
#
package Amavis::DB;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw($db_home $daemon_chroot_dir);
import Amavis::Util qw(untaint ll do_log);
}
use BerkeleyDB;
# create new databases, then close them (called by the parent process)
# (called only if $db_home is nonempty)
#
sub init($$) {
my($predelete_nanny, $predelete_snmp) = @_;
my $name = $db_home;
$name = "$daemon_chroot_dir $name" if $daemon_chroot_dir ne '';
if ($predelete_nanny || $predelete_snmp) { # delete existing db files first?
local(*DIR);
opendir(DIR,$db_home) or die "db_init: Can't open directory $name: $!";
# modifying a directory while traversing it can cause surprises, avoid;
# avoid slurping the whole directory contents into memory
my($f, @rmfiles);
while (defined($f = readdir(DIR))) {
next if $f eq '.' || $f eq '..';
if ($f =~ /^(__db\.)?nanny\.db\z/) {
push(@rmfiles, $f) if $predelete_nanny;
} elsif ($f =~ /^(__db\.)?snmp\.db\z/) {
push(@rmfiles, $f) if $predelete_snmp;
} elsif ($f =~ /^__db\.\d+\z/s) {
push(@rmfiles, $f) if $predelete_nanny && $predelete_snmp;
} elsif ($f =~ /^(?:cache-expiry|cache)\.db\z/s) {
push(@rmfiles, $f); # old databases, no longer used since 2.7.0-pre9
}
}
closedir(DIR) or die "db_init: Error closing directory $name: $!";
do_log(1, 'Deleting db files %s in %s', join(',',@rmfiles), $name);
for my $f (@rmfiles) {
my $fname = $db_home . '/' . untaint($f);
unlink($fname) or die "db_init: Can't delete file $fname: $!";
}
undef @rmfiles; # release storage
}
$! = 0; my $env = BerkeleyDB::Env->new(-Home=>$db_home, -Mode=>0640,
-Flags=> DB_CREATE | DB_INIT_CDB | DB_INIT_MPOOL);
defined $env
or die "BDB can't create db env. at $db_home: $BerkeleyDB::Error, $!.";
do_log(1, 'Creating db in %s/; BerkeleyDB %s, libdb %s',
$name, BerkeleyDB->VERSION, $BerkeleyDB::db_version);
$! = 0; my $dbs = BerkeleyDB::Hash->new(
-Filename=>'snmp.db', -Flags=>DB_CREATE, -Env=>$env );
defined $dbs or die "db_init: BDB no dbS: $BerkeleyDB::Error, $!.";
$! = 0; my $dbn = BerkeleyDB::Hash->new(
-Filename=>'nanny.db', -Flags=>DB_CREATE, -Env=>$env );
defined $dbn or die "db_init: BDB no dbN: $BerkeleyDB::Error, $!.";
Amavis::DB::SNMP::put_initial_snmp_data($dbs) if $predelete_snmp;
for my $db ($dbs, $dbn) {
$db->db_close==0 or die "db_init: BDB db_close: $BerkeleyDB::Error, $!.";
}
}
# open an existing databases environment (called by each child process)
#
sub new {
my $class = $_[0]; my $env;
if (defined $db_home) {
$! = 0; $env = BerkeleyDB::Env->new(
-Home=>$db_home, -Mode=>0640, -Flags=> DB_INIT_CDB | DB_INIT_MPOOL);
defined $env
or die "BDB can't connect db env. at $db_home: $BerkeleyDB::Error, $!.";
}
bless \$env, $class;
}
sub get_db_env { my $self = $_[0]; $$self }
1;
__DATA__
#
package Amavis::Lookup::SQLfield;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(ll do_log);
import Amavis::Conf qw($trim_trailing_space_in_lookup_result_fields);
}
# the sub new() is already declared in the always-loaded code section
# fieldtype: B=boolean, N=numeric, S=string,
# N-: numeric, nonexistent field returns undef without complaint
# S-: string, nonexistent field returns undef without complaint
# B-: boolean, nonexistent field returns undef without complaint
# B0: boolean, nonexistent field treated as false
# B1: boolean, nonexistent field treated as true
sub lookup_sql_field($$$%) {
my($self, $addr, $get_all, %options) = @_;
my(@result, @matchingkey, $sql_query, $field);
if ($self) { $sql_query = $self->{sql_query}; $field = $self->{fieldname} }
$sql_query = $Amavis::sql_lookups if !defined $sql_query; # global default
if (!defined $self) {
do_log(5, 'lookup_sql_field - no field query object, "%s" no match',$addr);
} elsif (!defined $field || $field eq '') {
do_log(5, 'lookup_sql_field() - no field name, "%s" no match', $addr);
} elsif (!defined $sql_query) {
do_log(5, 'lookup_sql_field(%s) - no sql_lookups object, "%s" no match',
$field, $addr);
} else {
my(@result_attr_names) = !ref $field ? ( $field )
: ref $field eq 'ARRAY' ? @$field
: ref $field eq 'HASH' ? keys %$field : ();
my(%attr_name_to_sqlfield_name) =
ref $field eq 'HASH' ? %$field
: map( ($_,$_), @result_attr_names);
my $fieldtype = $self->{fieldtype};
$fieldtype = 'S-' if !defined $fieldtype;
my($res_ref,$mk_ref) = $sql_query->lookup_sql($addr,1, %options,
!exists($self->{args}) ? () : (ExtraArguments => $self->{args}));
if (!defined $res_ref || !@$res_ref) {
ll(5) && do_log(5, 'lookup_sql_field(%s), "%s" no matching records',
join(',', map(lc($_) eq lc($attr_name_to_sqlfield_name{$_}) ? $_
: $_ . '/' . $attr_name_to_sqlfield_name{$_},
@result_attr_names)), $addr);
} else {
my %nosuchfield;
for my $ind (0 .. $#$res_ref) {
my($any_field_matches, @match_values_by_ind);
my $h_ref = $res_ref->[$ind]; my $mk = $mk_ref->[$ind];
for my $result_attr_ind (0 .. $#result_attr_names) {
my $result_attr_name = $result_attr_names[$result_attr_ind];
next if !defined $result_attr_name;
my $fieldname = $attr_name_to_sqlfield_name{$result_attr_name};
next if !defined $fieldname || $fieldname eq '';
my $match;
if (!exists($h_ref->{$fieldname})) {
$nosuchfield{$fieldname} = 1;
# record found, but no field with that name in the table
# fieldtype: B0: boolean, nonexistent field treated as false,
# B1: boolean, nonexistent field treated as true
if ($fieldtype =~ /^.-/s) { # allowed to not exist
# this type is almost universally in use now, continue searching
} elsif ($fieldtype =~ /^B1/) { # defaults to true
# only used for the 'local' field
$match = 1; # nonexistent field treated as 1
} elsif ($fieldtype =~ /^B0/) { # boolean, defaults to false
# no longer in use
$match = 0; # nonexistent field treated as 0
} else {
# treated as 'no match', returns undef
}
} else { # field exists
# fieldtype: B=boolean, N=numeric, S=string
$match = $h_ref->{$fieldname};
if (!defined $match) {
# NULL field values represented as undef
} elsif ($fieldtype =~ /^B/) { # boolean
# convert values 'N', 'F', '0', ' ' and "\000" to 0
# to allow value to be used directly as a Perl boolean
$match = 0 if $match =~ /^([NnFf ]|0+|\000+)\ *\z/;
} elsif ($fieldtype =~ /^N/) { # numeric
$match = $match + 0; # convert string into a number
} elsif ($fieldtype =~ /^S/) { # string
$match =~ s/ +\z// # trim trailing spaces
if $trim_trailing_space_in_lookup_result_fields;
}
}
$match_values_by_ind[$result_attr_ind] = $match;
$any_field_matches = 1 if defined $match;
}
ll(5) && do_log(5, 'lookup_sql_field(%s) rec=%d, "%s" result: %s',
join(',', map(lc($_) eq lc($attr_name_to_sqlfield_name{$_}) ? $_
: $_ . '/' . $attr_name_to_sqlfield_name{$_},
@result_attr_names)),
$ind, $addr,
join(', ', map(defined $_ ? '"'.$_.'"' : 'undef',
@match_values_by_ind)) );
if ($any_field_matches) {
push(@matchingkey, $mk);
push(@result, !ref $field ? $match_values_by_ind[0] :
{ map( ($result_attr_names[$_], $match_values_by_ind[$_]),
grep(defined $match_values_by_ind[$_],
(0 .. $#result_attr_names) )) } );
last if !$get_all;
}
}
do_log(5, 'lookup_sql_field, no such fields: %s',
join(', ', keys %nosuchfield)) if ll(5) && %nosuchfield;
}
}
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
#
package Amavis::Lookup::SQL;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::Util qw(untaint untaint_inplace snmp_count
ll do_log do_log_safe);
import Amavis::rfc2821_2822_Tools qw(make_query_keys);
import Amavis::Out::SQL::Connection ();
}
use DBI qw(:sql_types);
# return a new Lookup::SQL object to contain DBI handle and prepared selects
#
sub new {
my($class, $conn_h, $clause_name) = @_;
if ($clause_name eq '') { undef }
else {
# $clause_name is a key into %sql_clause of the currently selected
# policy bank; one level of indirection is allowed in %sql_clause result,
# the resulting SQL clause may include %k, %a, %l, %u, %e, %d placeholders,
# to be expanded
bless { conn_h => $conn_h, incarnation => 0, clause_name => $clause_name },
$class;
}
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::Lookup::SQL DESTROY called");
}
sub init {
my $self = $_[0];
if ($self->{incarnation} != $self->{conn_h}->incarnation) { # invalidated?
$self->{incarnation} = $self->{conn_h}->incarnation;
$self->clear_cache; # db handle has changed, invalidate cache
}
$self;
}
sub clear_cache {
my $self = $_[0];
delete $self->{cache};
}
# lookup_sql() performs a lookup for an e-mail address against a SQL map.
# If a match is found it returns whatever the query returns (a reference
# to a hash containing values of requested fields), otherwise returns undef.
# A match aborts further fetching sequence, unless $get_all is true.
#
# The $addr may be a string of octets (assumed to be UTF-8 encoded)
# or a string of characters which gets first encoded to UTF-8 octets.
# International domain name (IDN) in $addr will be converted to ACE
# and lowercased. International domain names in SQL are expected to be
# encoded in ASCII-compatible encoding (ACE).
#
# SQL lookups (e.g. for user+foo@example.com) are performed in order
# which can be requested by 'ORDER BY' in the SELECT statement, otherwise
# the order is unspecified, which is only useful if only specific entries
# exist in a database (e.g. only full addresses, not domains).
#
# The following order is recommended, going from specific to more general:
# - lookup for user+foo@example.com
# - lookup for user@example.com (only if $recipient_delimiter nonempty)
# - lookup for user+foo ('naked lookup' (i.e. no '@'): only if local)
# - lookup for user ('naked lookup': local and $recipient_delimiter nonempty)
# - lookup for @sub.example.com
# - lookup for @.sub.example.com
# - lookup for @.example.com
# - lookup for @.com
# - lookup for @. (catchall)
# NOTE:
# this is different from hash and ACL lookups in two important aspects:
# - a key without '@' implies a mailbox (=user) name, not domain name;
# - a naked mailbox name (i.e. no '@' in the query) lookups are only
# performed when the e-mail address (usually its domain part) matches
# static local_domains* lookups.
#
# Domain part is always lowercased when constructing a key,
# localpart is lowercased unless $localpart_is_case_sensitive is true.
#
sub lookup_sql($$$%) {
my($self, $addr,$get_all,%options) = @_;
my(@matchingkey,@result);
my $extra_args = $options{ExtraArguments};
my $sel; my $sql_cl_r = cr('sql_clause');
my $clause_name = $self->{clause_name};
$sel = $sql_cl_r->{$clause_name} if defined $sql_cl_r;
$sel = $$sel if ref $sel eq 'SCALAR'; # allow one level of indirection
if (!defined($sel) || $sel eq '') {
ll(4) && do_log(4,"lookup_sql disabled for clause: %s", $clause_name);
return(!wantarray ? undef : (undef,undef));
} elsif (!defined $extra_args &&
exists $self->{cache} && exists $self->{cache}->{$addr})
{ # cached ?
my $c = $self->{cache}->{$addr}; @result = @$c if ref $c;
@matchingkey = map('/cached/',@result); # will do for now, improve some day
# if (!ll(5)) {}# don't bother preparing log report which will not be printed
# elsif (!@result) { do_log(5,'lookup_sql (cached): "%s" no match', $addr) }
# else {
# for my $m (@result) {
# do_log(5, "lookup_sql (cached): \"%s\" matches, result=(%s)",
# $addr, join(", ", map { sprintf("%s=>%s", $_,
# !defined($m->{$_})?'-':'"'.$m->{$_}.'"'
# ) } sort keys(%$m) ) );
# }
# }
if (!$get_all) {
return(!wantarray ? $result[0] : ($result[0], $matchingkey[0]));
} else {
return(!wantarray ? \@result : (\@result, \@matchingkey));
}
}
my $is_local; # not looked up in SQL and LDAP to avoid recursion!
$is_local = Amavis::Lookup::lookup(0,$addr,
grep(ref ne 'Amavis::Lookup::SQL' &&
ref ne 'Amavis::Lookup::SQLfield' &&
ref ne 'Amavis::Lookup::LDAP' &&
ref ne 'Amavis::Lookup::LDAPattr',
@{ca('local_domains_maps')}));
my($keys_ref,$rhs_ref) = make_query_keys($addr,
$sql_lookups_no_at_means_domain,$is_local);
if (!$sql_allow_8bit_address) { s/[^\040-\176]/?/gs for @$keys_ref }
my $n = scalar(@$keys_ref); # number of keys
my(@extras_tmp,@pos_args); local($1);
@extras_tmp = @$extra_args if $extra_args;
my $sel_taint = substr($sel,0,0); # taintedness
my $datatype = $sql_allow_8bit_address ? SQL_VARBINARY : SQL_VARCHAR;
# substitute %k for a list of keys, %a for unmodified full mail address,
# %l for full unmodified localpart, %u for lowercased username (a localpart
# without extension), %e for lowercased extension, %d for lowercased domain,
# and ? for each extra argument
$sel =~ s{ ( %[kaluedL] | \? ) }
{ push(@pos_args,
$1 eq '%k' ? map([$_,$datatype], @$keys_ref)
: $1 eq '%a' ? [$rhs_ref->[0], $datatype] #full addr
: $1 eq '%l' ? [$rhs_ref->[1], $datatype] #localpart
: $1 eq '%u' ? [$rhs_ref->[2], $datatype] #username
: $1 eq '%e' ? [$rhs_ref->[3], $datatype] #extension
: $1 eq '%d' ? [$rhs_ref->[4], $datatype] #domain
#*** (%L is experimental, incomplete)
: $1 eq '%L' ? [($is_local?'1':'0'), SQL_BOOLEAN] #is local
: shift @extras_tmp),
$1 eq '%k' ? join(',', ('?') x $n) : '?' }xgse;
$sel = untaint($sel) . $sel_taint; # keep original clause taintedness
ll(4) && do_log(4,"lookup_sql %s \"%s\", query args: %s",
$clause_name, $addr,
join(', ', map(!ref $_ ? '"'.$_.'"' : '['.join(',',@$_).']',
@pos_args)) );
ll(4) && do_log(4,"lookup_sql select: %s", $sel);
my $a_ref; my $match = {}; my $conn_h = $self->{conn_h};
$conn_h->begin_work_nontransaction; # (re)connect if not connected
my $driver = $conn_h->driver_name; # only available when connected
if ($driver eq 'Pg') {
$datatype = { pg_type => DBD::Pg::PG_BYTEA() };
for (@pos_args)
{ $_->[1] = $datatype if ref($_) && $_->[1]==SQL_VARBINARY }
}
for (@pos_args) {
if (ref $_) { untaint_inplace($_->[0]) } else { untaint_inplace($_) }
}
eval {
snmp_count('OpsSqlSelect');
$conn_h->execute($sel,@pos_args); # do the query
# fetch query results
while ( defined($a_ref=$conn_h->fetchrow_arrayref($sel)) ) {
my(@names) = @{$conn_h->sth($sel)->{NAME_lc}};
$match = {}; @$match{@names} = @$a_ref;
if ($clause_name eq 'sel_policy' && !exists $match->{'local'} &&
defined $match->{'email'} && $match->{'email'} eq '@.') {
# UGLY HACK to let a catchall (@.) imply that field 'local' has
# a value undef (NULL) when that field is not present in the
# database. This overrides B1 fieldtype default by an explicit
# undef for '@.', causing a fallback to static lookup tables.
# The purpose is to provide a useful default for local_domains
# lookup if the field 'local' is not present in the SQL table.
# NOTE: field names 'local' and 'email' are hardwired here!!!
push(@names,'local'); $match->{'local'} = undef;
do_log(5, 'lookup_sql: "%s" matches catchall, local=>undef', $addr);
}
push(@result, {%$match}); # copy hash
push(@matchingkey, join(", ", map { sprintf("%s=>%s", $_,
!defined($match->{$_})?'-':'"'.$match->{$_}.'"'
) } @names));
last if !$get_all;
}
$conn_h->finish($sel) if defined $a_ref; # only if not all read
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
do_log(-1, "lookup_sql: %s, %s, %s", $err, $DBI::err, $DBI::errstr);
die $err if $err =~ /^timed out\b/; # resignal timeout
die $err;
};
if (!ll(4)) {
# don't bother preparing log report which will not be printed
} elsif (!@result) {
do_log(4,'lookup_sql, "%s" no match', $addr);
} else {
do_log(4,'lookup_sql(%s) matches, result=(%s)', $addr,$_) for @matchingkey;
}
# save for future use, but only within processing of this message
$self->{cache}->{$addr} = \@result;
section_time('lookup_sql');
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
__DATA__
#^L
package Amavis::LDAP::Connection;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
use Net::LDAP;
use Net::LDAP::Util;
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION
$have_sasl $ldap_sys_default);
$VERSION = '2.412';
@ISA = qw(Exporter);
$have_sasl = eval { require Authen::SASL };
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Util qw(ll do_log do_log_safe);
import Amavis::Timing qw(section_time);
}
BEGIN {
# must be in a separate BEGIN block to be able to see imported symbols
$ldap_sys_default = {
hostname => 'localhost',
localaddr => undef,
port => undef, # 389 or 636, default provided by Net::LDAP
scheme => undef, # 'ldaps' or 'ldap', depending on hostname
version => 3,
timeout => 120,
deref => 'find',
bind_dn => undef,
bind_password => undef,
tls => 0,
verify => 'none',
sslversion => 'tlsv1',
clientcert => undef,
clientkey => undef,
cafile => undef,
capath => undef,
sasl => 0,
sasl_mech => undef, # space-separated list of mech names
sasl_auth_id => undef,
};
1;
}
sub new {
my($class,$default) = @_;
my $self = bless { ldap => undef }, $class;
$self->{incarnation} = 1;
for (qw(hostname localaddr port scheme inet6 version timeout
base scope deref bind_dn bind_password
tls verify sslversion clientcert clientkey cafile capath
sasl sasl_mech sasl_auth_id)) {
# replace undefined attributes with user values or defaults
$self->{$_} = $default->{$_} if !defined($self->{$_});
$self->{$_} = $ldap_sys_default->{$_} if !defined($self->{$_});
}
if (!defined $self->{scheme}) {
$self->{scheme} = $self->{hostname} =~ /^ldaps/i ? 'ldaps' : 'ldap';
}
$self;
}
sub ldap { # get/set ldap handle
my $self = shift;
!@_ ? $self->{ldap} : ($self->{ldap}=shift);
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::LDAP::Connection DESTROY called");
# ignore failure, make perlcritic happy
eval { $self->disconnect_from_ldap } or 1;
}
sub incarnation { my $self = $_[0]; $self->{incarnation} }
sub in_transaction { 0 }
sub begin_work {
my $self = $_[0];
do_log(5,"ldap begin_work");
$self->ldap or $self->connect_to_ldap;
}
sub connect_to_ldap {
my $self = $_[0];
my($bind_err,$start_tls_err);
do_log(3,"Connecting to LDAP server");
my $hostlist = ref $self->{hostname} eq 'ARRAY' ?
join(", ",@{$self->{hostname}}) : $self->{hostname};
do_log(4,"connect_to_ldap: trying %s", $hostlist);
my $ldap = Net::LDAP->new($self->{hostname},
localaddr => $self->{localaddr},
port => $self->{port},
scheme => $self->{scheme},
version => $self->{version},
timeout => $self->{timeout},
keepalive => 1, # since Net::LDAP 0.53
# remaining keepalive* options need Socket::Linux and a
# patch at [rt.cpan.org #83039], otherwise are ignored
keepalive_idle => 240,
keepalive_interval => 30,
keepalive_probe => 10,
);
if (!$ldap) { # connect failed
do_log(-1,"connect_to_ldap: unable to connect to host %s", $hostlist);
} else {
do_log(3,"connect_to_ldap: connected to %s", $hostlist);
# $ldap->debug(12); # debug output goes to STDERR
if ($self->{tls}) { # TLS required
my $mesg = $ldap->start_tls(verify => $self->{verify},
sslversion => $self->{sslversion},
clientcert => $self->{clientcert},
clientkey => $self->{clientkey},
cafile => $self->{cafile},
capath => $self->{capath});
if ($mesg->code) { # start TLS failed
my $err = $mesg->error_name;
do_log(-1,"connect_to_ldap: start TLS failed: %s", $err);
$self->ldap(undef);
$start_tls_err = 1;
} else { # started TLS
do_log(3,"connect_to_ldap: TLS version %s enabled", $mesg);
}
}
if ($self->{bind_dn} || $self->{sasl}) { # bind required
my $sasl;
my $passw = $self->{bind_password};
if ($self->{sasl}) { # using SASL to authenticate?
$have_sasl or die "connect_to_ldap: SASL requested but no Authen::SASL";
$sasl = Authen::SASL->new(mechanism => $self->{sasl_mech},
callback => { user => $self->{sasl_auth_id},
pass => $passw } );
}
my $mesg = $ldap->bind($self->{bind_dn},
$sasl ? (sasl => $sasl)
: defined $passw ? (password => $passw) : ());
$passw = 'X' x length($passw) if defined $passw; # can't hurt
if ($mesg->code) { # bind failed
my $err = $mesg->error_name;
do_log(-1,"connect_to_ldap: bind failed: %s", $err);
$self->ldap(undef);
$bind_err = 1;
} else { # bind succeeded
do_log(3,"connect_to_ldap: bind %s succeeded", $self->{bind_dn});
}
}
}
$self->ldap($ldap); $self->{incarnation}++;
$ldap or die "connect_to_ldap: unable to connect";
if ($start_tls_err) { die "connect_to_ldap: start TLS failed" }
if ($bind_err) { die "connect_to_ldap: bind failed" }
section_time('ldap-connect');
$self;
}
sub disconnect_from_ldap {
my $self = $_[0];
return if !$self->ldap;
do_log(4,"disconnecting from LDAP");
$self->ldap->disconnect;
$self->ldap(undef);
1;
}
sub do_search {
my($self,$base,$scope,$filter) = @_;
my($result,$error_name);
$self->ldap or die "do_search: ldap not available";
do_log(5,'lookup_ldap: searching base="%s", scope="%s", filter="%s"',
$base, $scope, $filter);
eval {
$result = $self->{ldap}->search(base => $base,
scope => $scope,
filter => $filter,
deref => $self->{deref},
);
if ($result->code) {
$error_name = $result->error_name;
if ($error_name eq 'LDAP_NO_SUCH_OBJECT') {
# probably alright, e.g. a foreign %d
do_log(4, 'do_search failed in "%s": %s', $base, $error_name);
} else {
die $error_name."\n";
}
}
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
die $err if $err =~ /^timed out\b/; # resignal timeout
if ($err !~ /^LDAP_/) {
die "do_search: $err";
} elsif ($error_name !~ /^LDAP_(?:BUSY|UNAVAILABLE|UNWILLING_TO_PERFORM|
TIMEOUT|SERVER_DOWN|CONNECT_ERROR|OTHER|
LOCAL_ERROR|OPERATIONS_ERROR)\z/x) {
die "do_search: failed: $error_name\n";
} else { # LDAP related error, worth retrying
do_log(0, "NOTICE: do_search: trying again: %s", $error_name);
$self->disconnect_from_ldap;
$self->connect_to_ldap;
$self->ldap or die "do_search: reconnect failed";
do_log(5,
'lookup_ldap: searching (again) base="%s", scope="%s", filter="%s"',
$base, $scope, $filter);
eval {
$result = $self->{ldap}->search(base => $base,
scope => $scope,
filter => $filter,
deref => $self->{deref},
);
if ($result->code) { die $result->error_name, "\n"; }
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
$self->disconnect_from_ldap;
die $err if $err =~ /^timed out\b/; # resignal timeout
die "do_search: failed again, $err";
};
};
};
$result;
}
1;
#
package Amavis::Lookup::LDAPattr;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(ll do_log);
import Amavis::Conf qw($trim_trailing_space_in_lookup_result_fields);
}
# the sub new() is already declared in the always-loaded code section
# attrtype: B=boolean, N=numeric, S=string, L=list
# N-: numeric, nonexistent field returns undef without complaint
# S-: string, nonexistent field returns undef without complaint
# L-: list, nonexistent field returns undef without complaint
# B-: boolean, nonexistent field returns undef without complaint
# B0: boolean, nonexistent field treated as false
# B1: boolean, nonexistent field treated as true
sub lookup_ldap_attr($$$%) {
my($self, $addr, $get_all, %options) = @_;
my(@result, @matchingkey, $ldap_query, $attr);
if ($self) { $ldap_query = $self->{ldap_query}; $attr = $self->{attrname} }
$ldap_query = $Amavis::ldap_lookups if !defined $ldap_query; # global dflt
if (!defined $self) {
do_log(5, 'lookup_ldap_attr - no attr query object, "%s" no match',$addr);
} elsif (!defined $attr || $attr eq '') {
do_log(5, 'lookup_ldap_attr() - no attribute name, "%s" no match', $addr);
} elsif (!defined $ldap_query) {
do_log(5, 'lookup_ldap_attr(%s) - no ldap_lookups object, "%s" no match',
$attr, $addr);
} else {
# result attribute names are case-sensitive
# LDAP attribute names are case-INsensitive
my(@result_attr_names) = !ref $attr ? ( $attr )
: ref $attr eq 'ARRAY' ? @$attr
: ref $attr eq 'HASH' ? keys %$attr : ();
my(%attr_name_to_ldapattr_name) =
ref $attr eq 'HASH' ? %$attr
: map( ($_,$_), @result_attr_names);
my $attrtype = $self->{attrtype};
$attrtype = 'S-' if !defined $attrtype;
my($res_ref,$mk_ref) = $ldap_query->lookup_ldap($addr,1, %options,
!exists($self->{args}) ? () : (ExtraArguments => $self->{args}));
if (!defined $res_ref || !@$res_ref) {
ll(5) && do_log(5, 'lookup_ldap_attr(%s), "%s" no matching entries',
join(',', map(lc($_) eq lc($attr_name_to_ldapattr_name{$_}) ? $_
: $_ . '/' . lc($attr_name_to_ldapattr_name{$_}),
@result_attr_names)), $addr);
} else {
my %nosuchattr;
for my $ind (0 .. $#$res_ref) {
my($any_attr_matches, @match_values_by_ind);
my $h_ref = $res_ref->[$ind]; my $mk = $mk_ref->[$ind];
for my $result_attr_ind (0 .. $#result_attr_names) {
my $result_attr_name = $result_attr_names[$result_attr_ind];
next if !defined $result_attr_name;
my $attrname = $attr_name_to_ldapattr_name{$result_attr_name};
next if !defined $attrname || $attrname eq '';
my $match;
if (!exists($h_ref->{lc $attrname})) {
$nosuchattr{$attrname} = 1;
# LDAP entry found, but no attribute with that name in it
if ($attrtype =~ /^.-/s) { # allowed to not exist
# this type is almost universally in use now, continue searching
} elsif ($attrtype =~ /^B1/) { # defaults to true
# only used for the 'local' attr
$match = 1; # nonexistent attribute treated as 1
} elsif ($attrtype =~ /^B0/) { # boolean, defaults to false
# no longer in use
$match = 0; # nonexistent attribute treated as 0
} else {
# treated as 'no match', returns undef
}
} else { # attribute exists
# attrtype: B=boolean, N=numeric, S=string
$match = $h_ref->{lc $attrname};
if (!defined $match) {
# NULL attribute values represented as undef
} elsif ($attrtype =~ /^B/) { # boolean
$match = $match eq 'TRUE' ? 1 : 0; # convert TRUE|FALSE to 1|0
} elsif ($attrtype =~ /^N/) { # numeric
$match = $match + 0; # unify different numeric forms
} elsif ($attrtype =~ /^S/) { # string
$match =~ s/ +\z// # trim trailing spaces
if $trim_trailing_space_in_lookup_result_fields;
} elsif ($self->{attrtype} =~ /^L/) { # list
#$match = join(', ',@$match);
}
}
$match_values_by_ind[$result_attr_ind] = $match;
$any_attr_matches = 1 if defined $match;
}
ll(5) && do_log(5, 'lookup_ldap_attr(%s) rec=%d, "%s" result: %s',
join(',', map(lc($_) eq lc($attr_name_to_ldapattr_name{$_}) ? $_
: $_ . '/' . lc($attr_name_to_ldapattr_name{$_}),
@result_attr_names)),
$ind, $addr,
join(', ', map(defined $_ ? '"'.$_.'"' : 'undef',
@match_values_by_ind)) );
if ($any_attr_matches) {
push(@matchingkey, $mk);
push(@result, !ref $attr ? $match_values_by_ind[0] :
{ map( ($result_attr_names[$_], $match_values_by_ind[$_]),
grep(defined $match_values_by_ind[$_],
(0 .. $#result_attr_names) )) } );
last if !$get_all;
}
}
do_log(5, 'lookup_ldap_attr, no such attrs: %s',
join(', ', keys %nosuchattr)) if ll(5) && %nosuchattr;
}
}
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
#
package Amavis::Lookup::LDAP;
use strict;
use re 'taint';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION
$ldap_sys_default @ldap_attrs @mv_ldap_attrs);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::Util qw(untaint untaint_inplace snmp_count
ll do_log do_log_safe idn_to_ascii);
import Amavis::rfc2821_2822_Tools qw(make_query_keys split_address);
import Amavis::LDAP::Connection ();
$ldap_sys_default = {
base => undef,
scope => 'sub',
query_filter => '(&(objectClass=amavisAccount)(mail=%m))',
};
@ldap_attrs = qw(amavisLocal amavisMessageSizeLimit
amavisVirusLover amavisSpamLover amavisUncheckedLover
amavisBannedFilesLover amavisBadHeaderLover
amavisBypassVirusChecks amavisBypassSpamChecks
amavisBypassBannedChecks amavisBypassHeaderChecks
amavisSpamTagLevel amavisSpamTag2Level amavisSpamKillLevel
amavisSpamDsnCutoffLevel amavisSpamQuarantineCutoffLevel
amavisSpamSubjectTag amavisSpamSubjectTag2 amavisSpamModifiesSubj
amavisVirusQuarantineTo amavisSpamQuarantineTo amavisBannedQuarantineTo
amavisUncheckedQuarantineTo amavisBadHeaderQuarantineTo
amavisCleanQuarantineTo amavisArchiveQuarantineTo
amavisAddrExtensionVirus amavisAddrExtensionSpam
amavisAddrExtensionBanned amavisAddrExtensionBadHeader
amavisWarnVirusRecip amavisWarnBannedRecip amavisWarnBadHeaderRecip
amavisVirusAdmin amavisNewVirusAdmin amavisSpamAdmin
amavisBannedAdmin amavisBadHeaderAdmin
amavisBannedRuleNames amavisDisclaimerOptions
amavisForwardMethod amavisSaUserConf amavisSaUserName
amavisBlacklistSender amavisWhitelistSender
);
@mv_ldap_attrs = qw(amavisBlacklistSender amavisWhitelistSender);
1;
}
sub new {
my($class,$default,$conn_h) = @_;
my $self = bless {}, $class;
$self->{conn_h} = $conn_h; $self->{incarnation} = 0;
for (qw(base scope query_filter)) {
# replace undefined attributes with config values or defaults
$self->{$_} = $default->{$_} unless defined($self->{$_});
$self->{$_} = $ldap_sys_default->{$_} unless defined($self->{$_});
}
$self;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::Lookup::LDAP DESTROY called");
}
sub init {
my $self = $_[0];
if ($self->{incarnation} != $self->{conn_h}->incarnation) { # invalidated?
$self->{incarnation} = $self->{conn_h}->incarnation;
$self->clear_cache; # db handle has changed, invalidate cache
}
$self;
}
sub clear_cache {
my $self = $_[0];
delete $self->{cache};
}
# The $addr may be a string of octets (assumed to be UTF-8 encoded)
# or a string of characters which gets first encoded to UTF-8 octets.
# International domain name (IDN) in $addr will be converted to ACE
# and lowercased. International domain names in LDAP are expected to be
# encoded in ASCII-compatible encoding (ACE).
#
sub lookup_ldap($$$%) {
my($self,$addr,$get_all,%options) = @_;
my(@result,@matchingkey,@tmp_result,@tmp_matchingkey);
if (exists $self->{cache} && exists $self->{cache}->{$addr}) { # cached?
my $c = $self->{cache}->{$addr}; @result = @$c if ref $c;
@matchingkey = map('/cached/',@result); # will do for now, improve some day
# if (!ll(5)) {
# # don't bother preparing log report which will not be printed
# } elsif (!@result) {
# do_log(5,'lookup_ldap (cached): "%s" no match', $addr);
# } else {
# for my $m (@result) {
# do_log(5, 'lookup_ldap (cached): "%s" matches, result=(%s)',
# $addr, join(", ", map { sprintf("%s=>%s", $_,
# !defined($m->{$_})?'-':'"'.$m->{$_}.'"'
# ) } sort keys(%$m) ) );
# }
# }
if (!$get_all) {
return(!wantarray ? $result[0] : ($result[0], $matchingkey[0]));
} else {
return(!wantarray ? \@result : (\@result, \@matchingkey));
}
}
my $is_local; # not looked up in SQL and LDAP to avoid recursion!
$is_local = Amavis::Lookup::lookup(0,$addr,
grep(ref ne 'Amavis::Lookup::SQL' &&
ref ne 'Amavis::Lookup::SQLfield' &&
ref ne 'Amavis::Lookup::LDAP' &&
ref ne 'Amavis::Lookup::LDAPattr',
@{ca('local_domains_maps')}));
my($keys_ref,$rhs_ref,@keys);
($keys_ref,$rhs_ref) = make_query_keys($addr,
$ldap_lookups_no_at_means_domain,$is_local);
@keys = @$keys_ref;
unshift(@keys, '<>') if $addr eq ''; # a hack for a null return path
untaint_inplace($_) for @keys; # untaint keys
$_ = Net::LDAP::Util::escape_filter_value($_) for @keys;
# process %m
my $filter = $self->{query_filter};
my @filter_attr; my $expanded_filter = '';
for my $t ($filter =~ /\G( \( [^(=]+ = %m \) | [ \t0-9A-Za-z]+ | . )/xgs) {
if ($t !~ m{ \( ([^(=]+) = %m \) }xs) { $expanded_filter .= $t }
else {
push(@filter_attr, $1);
$expanded_filter .= '(|' . join('', map("($1=$_)", @keys)) . ')';
}
}
$filter = $expanded_filter;
# process %d
my $base = $self->{base};
if ($base =~ /%d/) {
my($localpart,$domain) = split_address($addr);
if ($domain) {
untaint_inplace($domain); local($1);
$domain =~ s/^\@?(.*?)\.*\z/$1/s;
$domain = idn_to_ascii($domain);
$base =~ s/%d/&Net::LDAP::Util::escape_dn_value($domain)/gse;
}
}
# build hash of keys and array position
my(%xref); my $key_num = 0;
$xref{$_} = $key_num++ for @keys;
#
do_log(4,'lookup_ldap "%s", query keys: %s, base: %s, filter: %s',
$addr,join(', ',map("\"$_\"",@keys)),$self->{base},$self->{query_filter});
my $conn_h = $self->{conn_h};
$conn_h->begin_work; # (re)connect if not connected
eval {
snmp_count('OpsLDAPSearch');
my(@entry);
my $search_obj = $conn_h->do_search($base, $self->{scope}, $filter);
@entry = $search_obj->entries if $search_obj && !$search_obj->code;
my(%mv_ldap_attrs) = map((lc($_), 1), @mv_ldap_attrs);
for my $entry (@entry) {
my $match = {};
$match->{dn} = $entry->dn;
for my $attr (@ldap_attrs) {
my $value;
do_log(9,'lookup_ldap: reading attribute "%s" from object', $attr);
$attr = lc $attr;
if ($mv_ldap_attrs{$attr}) { # multivalued
$value = $entry->get_value($attr, asref => 1);
} else {
$value = $entry->get_value($attr);
}
$match->{$attr} = $value if defined $value;
}
my $pos;
for my $attr (@filter_attr) {
my $value = scalar($entry->get_value($attr));
if (defined $value) {
if (!exists $match->{'amavislocal'} && $value eq '@.') {
# NOTE: see lookup_sql
$match->{'amavislocal'} = undef;
do_log(5, 'lookup_ldap: "%s" matches catchall, amavislocal=>undef',
$addr);
}
$pos = $xref{$value};
last;
}
}
my $key_str = join(", ",map {sprintf("%s=>%s",$_,!defined($match->{$_})?
'-':'"'.$match->{$_}.'"')} keys(%$match));
push(@tmp_result, [$pos,{%$match}]); # copy hash
push(@tmp_matchingkey, [$pos,$key_str]);
last if !$get_all;
}
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
do_log(-1,"lookup_ldap: %s", $err);
die $err;
};
@result = map($_->[1], sort {$a->[0] <=> $b->[0]} @tmp_result);
@matchingkey = map($_->[1], sort {$a->[0] <=> $b->[0]} @tmp_matchingkey);
if (!ll(4)) {
# don't bother preparing log report which will not be printed
} elsif (!@result) {
do_log(4,'lookup_ldap, "%s" no match', $addr);
} else {
do_log(4,'lookup_ldap(%s) matches, result=(%s)',$addr,$_) for @matchingkey;
}
# save for future use, but only within processing of this message
$self->{cache}->{$addr} = \@result;
section_time('lookup_ldap');
if (!$get_all) { !wantarray ? $result[0] : ($result[0], $matchingkey[0]) }
else { !wantarray ? \@result : (\@result, \@matchingkey) }
}
1;
__DATA__
#
package Amavis::In::AMPDP;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Util qw(ll do_log debug_oneshot dump_captured_log
untaint snmp_counters_init read_file
snmp_count proto_encode proto_decode
switch_to_my_time switch_to_client_time
am_id new_am_id add_entropy rmdir_recursively
generate_mail_id);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Lookup::IP qw(lookup_ip_acl normalize_ip_addr);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::In::Message;
import Amavis::In::Connection;
import Amavis::IO::Zlib;
import Amavis::Out::EditHeader qw(hdr);
import Amavis::Out qw(mail_dispatch);
import Amavis::Notify qw(msg_from_quarantine);
}
use subs @EXPORT;
use Errno qw(ENOENT EACCES);
use IO::File ();
use Time::HiRes ();
use Digest::MD5;
use MIME::Base64;
sub new($) { my $class = $_[0]; bless {}, $class }
# used with sendmail milter and traditional (non-SMTP) MTA interface,
# but also to request a message release from a quarantine
#
sub process_policy_request($$$$) {
my($self, $sock, $conn, $check_mail, $old_amcl) = @_;
# $sock: connected socket from Net::Server
# $conn: information about client connection
# $check_mail: subroutine ref to be called with file handle
my(%attr);
$0 = sprintf("%s (ch%d-P-idle)",
c('myprogram_name'), $Amavis::child_invocation_count);
ll(5) && do_log(5, "process_policy_request: %s, %s, fileno=%s",
$old_amcl, c('myprogram_name'), fileno($sock));
if ($old_amcl) {
# Accept a single request from traditional amavis helper program.
# Receive TEMPDIR/SENDER/RCPTS/LDA/LDAARGS from client
# Simple protocol: \2 means LDA follows; \3 means EOT (end of transmission)
die "process_policy_request: old AM.CL protocol is no longer supported\n";
} else { # new amavis helper protocol AM.PDP or a Postfix policy server
# for Postfix policy server see Postfix docs SMTPD_POLICY_README
my(@response); local($1,$2,$3);
local($/) = "\012"; # set line terminator to LF (Postfix idiosyncrasy)
my $ln; # can accept multiple tasks
switch_to_client_time("start receiving AM.PDP data");
$conn->appl_proto('AM.PDP');
for ($! = 0; defined($ln=$sock->getline); $! = 0) {
my $end_of_request = $ln =~ /^\015?\012\z/ ? 1 : 0; # end of request?
switch_to_my_time($end_of_request ? 'rx entire AM.PDP request'
: 'rx AM.PDP line');
$0 = sprintf("%s (ch%d-P)",
c('myprogram_name'), $Amavis::child_invocation_count);
Amavis::Timing::init(); snmp_counters_init();
# must not use \r and \n, not the same as \015 and \012 on some platforms
if ($end_of_request) { # end of request
section_time('got data');
my $msg_size;
eval {
my($msginfo,$bank_names_ref) = preprocess_policy_query(\%attr,$conn);
$Amavis::MSGINFO = $msginfo; # ugly
my $req = lc($attr{'request'});
@response = $req eq 'smtpd_access_policy'
? postfix_policy($msginfo,\%attr)
: $req =~ /^(?:release|requeue|report)\z/
? dispatch_from_quarantine($msginfo, $req,
$req eq 'report' ? 'abuse' : 'miscategorized')
: check_ampdp_policy($msginfo,$check_mail,0,$bank_names_ref);
$msg_size = $msginfo->msg_size;
undef $Amavis::MSGINFO; # release global reference
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
do_log(-2, "policy_server FAILED: %s", $err);
@response = (proto_encode('setreply','450','4.5.0',"Failure: $err"),
proto_encode('return_value','tempfail'),
proto_encode('exit_code',sprintf("%d",EX_TEMPFAIL)));
die $err if $err =~ /^timed out\b/; # resignal timeout
# last;
};
$sock->print( join('', map($_."\015\012", (@response,'')) ))
or die "Can't write response to socket: $!, fileno=".fileno($sock);
%attr = (); @response = ();
if (ll(2)) {
my $rusage_report = Amavis::Timing::rusage_report();
do_log(2,"size: %d, %s", $msg_size, Amavis::Timing::report());
do_log(2,"size: %d, RUSAGE %s", $msg_size, $rusage_report)
if defined $rusage_report;
}
} elsif ($ln =~ /^ ([^=\000\012]*?) (=|:[ \t]*)
([^\012]*?) \015?\012 \z/xsi) {
my $attr_name = proto_decode($1);
my $attr_val = proto_decode($3);
if (!exists $attr{$attr_name}) {
$attr{$attr_name} = $attr_val;
} else {
$attr{$attr_name} = [ $attr{$attr_name} ] if !ref $attr{$attr_name};
push(@{$attr{$attr_name}}, $attr_val);
}
my $known_attr = scalar(grep($_ eq $attr_name, qw(
request protocol_state version_client protocol_name helo_name
client_name client_address client_port client_source sender recipient
delivery_care_of queue_id partition_tag mail_id secret_id quar_type
mail_file tempdir tempdir_removed_by policy_bank requested_by) ));
do_log(!$known_attr?1:3,
"policy protocol: %s=%s", $attr_name,$attr_val);
} else {
do_log(-1, "policy protocol: INVALID AM.PDP ATTRIBUTE LINE: %s", $ln);
}
$0 = sprintf("%s (ch%d-P-idle)",
c('myprogram_name'), $Amavis::child_invocation_count);
switch_to_client_time("receiving AM.PDP data");
}
defined $ln || $! == 0 or die "Read from client socket FAILED: $!";
switch_to_my_time('end of AM.PDP session');
};
$0 = sprintf("%s (ch%d-P)",
c('myprogram_name'), $Amavis::child_invocation_count);
}
# Based on given query attributes describing a message to be checked or
# released, return a new Amavis::In::Message object with filled-in information
#
sub preprocess_policy_query($$) {
my($attr_ref,$conn) = @_;
my $now = Time::HiRes::time;
my $msginfo = Amavis::In::Message->new;
$msginfo->rx_time($now);
$msginfo->log_id(am_id());
$msginfo->conn_obj($conn);
$msginfo->originating(1);
$msginfo->add_contents_category(CC_CLEAN,0);
add_entropy(%$attr_ref);
# amavisd -> amavis-helper protocol query consists of any number of
# the following lines, the response is terminated by an empty line.
# The 'request=AM.PDP' is a required first field, the order of
# remaining fields is arbitrary, but multivalued attributes such as
# 'recipient' must retain their relative order.
# Required AM.PDP fields are: request, tempdir, sender, recipient(s)
# request=AM.PDP
# version_client=n (currently ignored)
# tempdir=/var/amavis/amavis-milter-MWZmu9Di
# tempdir_removed_by=client (tempdir_removed_by=server is a default)
# mail_file=/var/amavis/am.../email.txt (defaults to tempdir/email.txt)
# sender=<foo@example.com>
# recipient=<bar1@example.net>
# recipient=<bar2@example.net>
# recipient=<bar3@example.net>
# delivery_care_of=server (client or server, client is a default)
# queue_id=qid
# protocol_name=ESMTP
# helo_name=host.example.com
# client_address=10.2.3.4
# client_port=45678
# client_name=host.example.net
# client_source=LOCAL/REMOTE/[UNAVAILABLE]
# (matches local_header_rewrite_clients, see Postfix XFORWARD_README)
# policy_bank=SMTP_AUTH,TLS,ORIGINATING,MYNETS,...
# Required 'release' or 'requeue' or 'report' fields are: request, mail_id
# request=release (or request=requeue, or request=report)
# mail_id=xxxxxxxxxxxx
# secret_id=xxxxxxxxxxxx (authorizes a release/report)
# partition_tag=xx (required if mail_id is not unique)
# quar_type=x F/Z/B/Q/M (defaults to Q or F)
# file/zipfile/bsmtp/sql/mailbox
# mail_file=... (optional: overrides automatics; $QUARANTINEDIR prepended)
# requested_by=<releaser@example.com> (optional: lands in Resent-From:)
# sender=<foo@example.com> (optional: replaces envelope sender)
# recipient=<bar1@example.net> (optional: replaces envelope recips)
# recipient=<bar2@example.net>
# recipient=<bar3@example.net>
my(@recips); my(@bank_names);
exists $attr_ref->{'request'} or die "Missing 'request' field";
my $ampdp = $attr_ref->{'request'} =~
/^(?:AM\.CL|AM\.PDP|release|requeue|report)\z/i;
local $1;
@bank_names =
map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $attr_ref->{'policy_bank'}))
if defined $attr_ref->{'policy_bank'};
my $d_co = $attr_ref->{'delivery_care_of'};
my $td_rm = $attr_ref->{'tempdir_removed_by'};
$msginfo->client_delete(defined($td_rm) && lc($td_rm) eq 'client' ? 1 : 0);
$msginfo->queue_id($attr_ref->{'queue_id'})
if exists $attr_ref->{'queue_id'};
$msginfo->client_proto($attr_ref->{'protocol_name'})
if exists $attr_ref->{'protocol_name'};
if (exists $attr_ref->{'client_address'}) {
$msginfo->client_addr(normalize_ip_addr($attr_ref->{'client_address'}));
}
$msginfo->client_port($attr_ref->{'client_port'})
if exists $attr_ref->{'client_port'};
$msginfo->client_name($attr_ref->{'client_name'})
if exists $attr_ref->{'client_name'};
$msginfo->client_source($attr_ref->{'client_source'})
if exists $attr_ref->{'client_source'}
&& uc($attr_ref->{'client_source'}) ne '[UNAVAILABLE]';
$msginfo->client_helo($attr_ref->{'helo_name'})
if exists $attr_ref->{'helo_name'};
# $msginfo->body_type('8BITMIME');
$msginfo->requested_by(unquote_rfc2821_local($attr_ref->{'requested_by'}))
if exists $attr_ref->{'requested_by'};
if (exists $attr_ref->{'sender'}) {
my $sender = $attr_ref->{'sender'};
$sender = '<'.$sender.'>' if $sender !~ /^<.*>\z/;
$msginfo->sender_smtp($sender);
$sender = unquote_rfc2821_local($sender);
$msginfo->sender($sender);
}
if (exists $attr_ref->{'recipient'}) {
my $r = $attr_ref->{'recipient'}; @recips = ();
for my $addr (!ref($r) ? $r : @$r) {
my $addr_quo = $addr;
my $addr_unq = unquote_rfc2821_local($addr);
$addr_quo = '<'.$addr_quo.'>' if $addr_quo !~ /^<.*>\z/;
my $recip_obj = Amavis::In::Message::PerRecip->new;
$recip_obj->recip_addr($addr_unq);
$recip_obj->recip_addr_smtp($addr_quo);
$recip_obj->dsn_orcpt($addr_quo);
$recip_obj->recip_destiny(D_PASS); # default is Pass
$recip_obj->delivery_method('') if !defined($d_co) ||
lc($d_co) eq 'client';
push(@recips,$recip_obj);
}
$msginfo->per_recip_data(\@recips);
}
if (!exists $attr_ref->{'tempdir'}) {
my $tempdir = Amavis::TempDir->new;
$tempdir->prepare_dir;
$msginfo->mail_tempdir($tempdir->path);
# Save the Amavis::TempDir object from destruction by keeping a ref to it
# in $msginfo. When $msginfo is destroyed, the temporary directory will be
# automatically destroyed too. This is specific to AM.PDP requests without
# a working directory provided by a caller, and different from usual
# SMTP sessions which keep a per-process permanent reference to an
# Amavis::TempDir object, which makes keeping it in mail_tempdir_obj
# not necessary.
$msginfo->mail_tempdir_obj($tempdir);
} else {
local($1,$2); my $tempdir = $attr_ref->{tempdir};
$tempdir =~ m{^ (?: \Q$TEMPBASE\E | \Q$MYHOME\E )
(?: / (?! \.\. (?:\z|/)) [A-Za-z0-9_.-]+ )*
/ [A-Za-z0-9_.-]+ \z}xso
or die "Suspicious temporary directory name '$tempdir'";
$msginfo->mail_tempdir(untaint($tempdir));
}
my $quar_type;
my $p_mail_id;
if (!$ampdp) {
# don't bother with filenames
} elsif ($attr_ref->{'request'} =~ /^(?:release|requeue|report)\z/i) {
exists $attr_ref->{'mail_id'} or die "Missing 'mail_id' field";
$msginfo->partition_tag($attr_ref->{'partition_tag'}); # may be undef
$p_mail_id = $attr_ref->{'mail_id'};
# amavisd almost-base64: 62 +, 63 - (in use up to 2.6.4, dropped in 2.7.0)
# RFC 4648 base64: 62 +, 63 / (not used here)
# RFC 4648 base64url: 62 -, 63 _
$p_mail_id =~ m{^ [A-Za-z0-9] [A-Za-z0-9_+-]* ={0,2} \z}xs
or die "Invalid mail_id '$p_mail_id'";
$p_mail_id = untaint($p_mail_id);
$msginfo->parent_mail_id($p_mail_id);
$msginfo->mail_id(scalar generate_mail_id());
if (!exists($attr_ref->{'secret_id'}) || $attr_ref->{'secret_id'} eq '') {
die "Secret_id is required, but missing" if c('auth_required_release');
} else {
# version 2.7.0 and later uses RFC 4648 base64url and id=b64(md5(sec)),
# versions before 2.7.0 used almost-base64 and id=b64(md5(b64(sec)))
{ # begin block, 'last' exits it
my $secret_b64 = $attr_ref->{'secret_id'};
$secret_b64 = '' if !defined $secret_b64;
if (index($secret_b64,'+') < 0) { # new or undetermined format
local($_) = $secret_b64; tr{-_}{+/}; # revert base64url to base64
my $secret_bin = decode_base64($_);
my $id_new_b64 = Digest::MD5->new->add($secret_bin)->b64digest;
substr($id_new_b64, 12) = '';
$id_new_b64 =~ tr{+/}{-_}; # base64 -> RFC 4648 base64url
last if $id_new_b64 eq $p_mail_id; # exit enclosing block
}
if (index($secret_b64,'_') < 0) { # old or undetermined format
my $id_old_b64 = Digest::MD5->new->add($secret_b64)->b64digest;
substr($id_old_b64, 12) = '';
$id_old_b64 =~ tr{/}{-}; # base64 -> almost-base64
last if $id_old_b64 eq $p_mail_id; # exit enclosing block
}
die "Secret_id $secret_b64 does not match mail_id $p_mail_id";
}; # end block, 'last' arrives here
}
$quar_type = $attr_ref->{'quar_type'};
if (!defined($quar_type) || $quar_type eq '') {
# choose some reasonable default (simpleminded)
$quar_type = c('spam_quarantine_method') =~ /^sql:/i ? 'Q' : 'F';
}
my $fn = $p_mail_id;
if ($quar_type eq 'F' || $quar_type eq 'Z') {
$QUARANTINEDIR ne '' or die "Config variable \$QUARANTINEDIR is empty";
if ($attr_ref->{'mail_file'} ne '') {
$fn = $attr_ref->{'mail_file'};
$fn =~ m{^[A-Za-z0-9][A-Za-z0-9/_.+-]*\z}s && $fn !~ m{\.\.(?:/|\z)}
or die "Unsafe filename '$fn'";
$fn = $QUARANTINEDIR.'/'.untaint($fn);
} else { # automatically guess a filename - simpleminded
if ($quarantine_subdir_levels < 1) { $fn = "$QUARANTINEDIR/$fn" }
else { my $subd = substr($fn,0,1); $fn = "$QUARANTINEDIR/$subd/$fn" }
$fn .= '.gz' if $quar_type eq 'Z';
}
}
$msginfo->mail_text_fn($fn);
} elsif (!exists $attr_ref->{'mail_file'}) {
$msginfo->mail_text_fn($msginfo->mail_tempdir . '/email.txt');
} else {
# SECURITY: just believe the supplied file name, blindly untainting it
$msginfo->mail_text_fn(untaint($attr_ref->{'mail_file'}));
}
my $fname = $msginfo->mail_text_fn;
if ($ampdp && defined($fname) && $fname ne '') {
my $fh;
my $releasing = $attr_ref->{'request'}=~ /^(?:release|requeue|report)\z/i;
new_am_id('rel-'.$msginfo->mail_id) if $releasing;
if ($releasing && $quar_type eq 'Q') { # releasing from SQL
do_log(5, "preprocess_policy_query: opening in sql: %s", $p_mail_id);
my $obj = $Amavis::sql_storage;
$Amavis::extra_code_sql_quar && $obj
or die "SQL quarantine code not enabled (3)";
my $conn_h = $obj->{conn_h}; my $sql_cl_r = cr('sql_clause');
my $sel_msg = $sql_cl_r->{'sel_msg'};
my $sel_quar = $sql_cl_r->{'sel_quar'};
if (!defined($msginfo->partition_tag) &&
defined($sel_msg) && $sel_msg ne '') {
do_log(5, "preprocess_policy_query: missing partition_tag in request,".
" fetching msgs record for mail_id=%s", $p_mail_id);
# find a corresponding partition_tag if missing from a release request
$conn_h->begin_work_nontransaction; #(re)connect if necessary
$conn_h->execute($sel_msg, $p_mail_id);
my $a_ref; my $cnt = 0; my $partition_tag;
while ( defined($a_ref=$conn_h->fetchrow_arrayref($sel_msg)) ) {
$cnt++;
$partition_tag = $a_ref->[0] if !defined $partition_tag;
ll(5) && do_log(5, "release: got msgs record for mail_id=%s: %s",
$p_mail_id, join(', ',@$a_ref));
}
$conn_h->finish($sel_msg) if defined $a_ref; # only if not all read
$cnt <= 1 or die "Multiple ($cnt) records with same mail_id exist, ".
"specify a partition_tag in the AM.PDP request";
if ($cnt < 1) {
do_log(0, "release: no records with msgs.mail_id=%s in a database, ".
"trying to read from a quar. anyway", $p_mail_id);
}
$msginfo->partition_tag($partition_tag); # could still be undef/NULL !
}
ll(5) && do_log(5, "release: opening mail_id=%s, partition_tag=%s",
$p_mail_id, $msginfo->partition_tag);
$conn_h->begin_work_nontransaction; # (re)connect if not connected
$fh = Amavis::IO::SQL->new;
$fh->open($conn_h, $sel_quar, $p_mail_id,
'r', untaint($msginfo->partition_tag))
or die "Can't open sql obj for reading: $!"; 1;
} else { # mail checking or releasing from a file
do_log(5, "preprocess_policy_query: opening mail '%s'", $fname);
# set new amavis message id
new_am_id( ($fname =~ m{amavis-(milter-)?([^/ \t]+)}s ? $2 : undef),
$Amavis::child_invocation_count ) if !$releasing;
# file created by amavis helper program or other client, just open it
my(@stat_list) = lstat($fname); my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT) { die "File $fname does not exist" }
elsif ($errn) { die "File $fname inaccessible: $!" }
elsif (!-f _) { die "File $fname is not a plain file" }
add_entropy(@stat_list);
if ($fname =~ /\.gz\z/) {
$fh = Amavis::IO::Zlib->new;
$fh->open($fname,'rb') or die "Can't open gzipped file $fname: $!";
} else {
# $msginfo->msg_size(0 + (-s _)); # underestimates the RFC 1870 size
$fh = IO::File->new;
$fh->open($fname,'<') or die "Can't open file $fname: $!";
binmode($fh,':bytes') or die "Can't cancel :utf8 mode: $!";
my $file_size = $stat_list[7];
if ($file_size < 100*1024) { # 100 KiB 'small mail', read into memory
do_log(5, 'preprocess_policy_query: reading from %s to memory, '.
'file size %d bytes', $fname, $file_size);
my $str = ''; read_file($fh,\$str);
$fh->seek(0,0) or die "Can't rewind file $fname: $!";
$msginfo->mail_text_str(\$str); # save mail as a string
}
}
}
$msginfo->mail_text($fh); # save file handle to object
$msginfo->log_id(am_id());
}
if ($ampdp && ll(3)) {
do_log(3, "Request: %s %s %s: %s -> %s", $attr_ref->{'request'},
$attr_ref->{'mail_id'}, $msginfo->mail_tempdir,
$msginfo->sender_smtp,
join(',', map($_->recip_addr_smtp, @recips)) );
} else {
do_log(3, "Request: %s(%s): %s %s %s: %s[%s] <%s> -> <%s>",
@$attr_ref{qw(request protocol_state mail_id protocol_name
queue_id client_name client_address sender recipient)});
}
($msginfo, \@bank_names);
}
sub check_ampdp_policy($$$$) {
my($msginfo,$check_mail,$old_amcl,$bank_names_ref) = @_;
my($smtp_resp, $exit_code, $preserve_evidence);
my(%baseline_policy_bank) = %current_policy_bank;
# do some sanity checks before deciding to call check_mail()
if (!ref($msginfo->per_recip_data) || !defined($msginfo->mail_text)) {
$smtp_resp = '450 4.5.0 Incomplete request'; $exit_code = EX_TEMPFAIL;
} else {
# loading a policy bank can affect subsequent c(), cr() and ca() results,
# so it is necessary to load each policy bank in the right order and soon
# after information becomes available; general principle is that policy
# banks are loaded in order in which information becomes available:
# interface/socket, client IP, SMTP session info, sender, ...
my $cl_ip = $msginfo->client_addr;
my $cl_src = $msginfo->client_source;
my(@bank_names_cl);
{ my $cl_ip_tmp = $cl_ip;
# treat unknown client IP addr as 0.0.0.0, from "This" Network, RFC 1700
$cl_ip_tmp = '0.0.0.0' if !defined($cl_ip) || $cl_ip eq '';
my(@cp) = @{ca('client_ipaddr_policy')};
do_log(-1,'@client_ipaddr_policy must contain pairs, '.
'number of elements is not even') if @cp % 2 != 0;
my $labeler = Amavis::Lookup::Label->new('client_ipaddr_policy');
while (@cp > 1) {
my $lookup_table = shift(@cp);
my $policy_names = shift(@cp); # comma-separated string of names
next if !defined $policy_names;
if (lookup_ip_acl($cl_ip_tmp, $labeler, $lookup_table)) {
local $1;
push(@bank_names_cl,
map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $policy_names)));
last; # should we stop here or not?
}
}
}
# load policy banks from the 'client_ipaddr_policy' lookup
Amavis::load_policy_bank($_,$msginfo) for @bank_names_cl;
# additional banks from the request
Amavis::load_policy_bank(untaint($_),$msginfo) for @$bank_names_ref;
$msginfo->originating(c('originating'));
my $sender = $msginfo->sender;
if (defined $policy_bank{'MYUSERS'} &&
$sender ne '' && $msginfo->originating &&
lookup2(0,$sender, ca('local_domains_maps'))) {
Amavis::load_policy_bank('MYUSERS',$msginfo);
}
my $debrecipm = ca('debug_recipient_maps');
if (lookup2(0, $sender, ca('debug_sender_maps')) ||
@$debrecipm && grep(lookup2(0, $_->recip_addr, $debrecipm),
@{$msginfo->per_recip_data})) {
debug_oneshot(1);
}
# check_mail() expects open file on $fh, need not be rewound
Amavis::check_mail_begin_task();
($smtp_resp, $exit_code, $preserve_evidence) = &$check_mail($msginfo,0);
my $fh = $msginfo->mail_text; my $tempdir = $msginfo->mail_tempdir;
$fh->close or die "Error closing temp file: $!" if $fh;
undef $fh; $msginfo->mail_text(undef);
$msginfo->mail_text_str(undef); $msginfo->body_start_pos(undef);
my $errn = $tempdir eq '' ? ENOENT : (stat($tempdir) ? 0 : 0+$!);
if ($tempdir eq '' || $errn == ENOENT) {
# do nothing
} elsif ($msginfo->client_delete) {
do_log(4, "AM.PDP: deletion of %s is client's responsibility", $tempdir);
} elsif ($preserve_evidence) {
do_log(-1,'AM.PDP: tempdir is to be PRESERVED: %s', $tempdir);
} else {
my $fname = $msginfo->mail_text_fn;
do_log(4, 'AM.PDP: tempdir and file being removed: %s, %s',
$tempdir,$fname);
unlink($fname) or die "Can't remove file $fname: $!" if $fname ne '';
# must step out of the directory which is about to be deleted,
# otherwise rmdir can fail (e.g. on Solaris)
chdir($TEMPBASE) or die "Can't chdir to $TEMPBASE: $!";
rmdir_recursively($tempdir);
}
}
# amavisd -> amavis-helper protocol response consists of any number of
# the following lines, the response is terminated by an empty line:
# version_server=2
# log_id=xxx
# delrcpt=<recipient>
# addrcpt=<recipient>
# delheader=hdridx hdr_head
# chgheader=hdridx hdr_head hdr_body
# insheader=hdridx hdr_head hdr_body
# addheader=hdr_head hdr_body
# replacebody=new_body (not implemented)
# quarantine=reason (currently never used, supposed to call
# smfi_quarantine, placing message on hold)
# return_value=continue|reject|discard|accept|tempfail
# setreply=rcode xcode message
# exit_code=n
my(@response); my($rcpt_deletes,$rcpt_count)=(0,0);
push(@response, proto_encode('version_server', '2'));
push(@response, proto_encode('log_id', $msginfo->log_id));
for my $r (@{$msginfo->per_recip_data}) {
$rcpt_count++;
$rcpt_deletes++ if $r->recip_done;
}
local($1,$2,$3);
if ($smtp_resp=~/^([1-5]\d\d) ([245]\.\d{1,3}\.\d{1,3})(?: |\z)(.*)\z/s)
{ push(@response, proto_encode('setreply', $1,$2,$3)) }
if ( $exit_code == EX_TEMPFAIL) {
push(@response, proto_encode('return_value','tempfail'));
} elsif ($exit_code == EX_NOUSER) { # reject the whole message
push(@response, proto_encode('return_value','reject'));
} elsif ($exit_code == EX_UNAVAILABLE) { # reject the whole message
push(@response, proto_encode('return_value','reject'));
} elsif ($exit_code == 99 || $rcpt_deletes >= $rcpt_count) {
$exit_code = 99; # let MTA discard the message, it was already handled here
push(@response, proto_encode('return_value','discard'));
} elsif (grep($_->delivery_method ne '', @{$msginfo->per_recip_data})) {
# explicit forwarding by us
die "Not all recips done, but explicit forwarding"; # just in case
} else { # EX_OK
for my $r (@{$msginfo->per_recip_data}) { # modified recipient addresses?
my $newaddr = $r->recip_final_addr;
if ($r->recip_done) { # delete
push(@response, proto_encode('delrcpt', $r->recip_addr_smtp))
if defined $r->recip_addr; # if in the original list, not always_bcc
} elsif ($newaddr ne $r->recip_addr) { # modify, e.g. adding extension
push(@response, proto_encode('delrcpt', $r->recip_addr_smtp))
if defined $r->recip_addr; # if in the original list, not always_bcc
push(@response, proto_encode('addrcpt',
qquote_rfc2821_local($newaddr)));
}
}
my $hdr_edits = $msginfo->header_edits;
if ($hdr_edits) { # any added or modified header fields?
local($1,$2); my($field_name,$edit,$field_body);
while ( ($field_name,$edit) = each %{$hdr_edits->{edit}} ) {
$field_body = $msginfo->get_header_field_body($field_name,0); # first
if (!defined($field_body)) {
# such header field does not exist or is not available, do nothing
} else { # edit the first occurrence
chomp($field_body);
my $orig_field_body = $field_body;
for my $e (@$edit) { # possibly multiple (iterative) edits
if (!defined($e)) { $field_body = undef; last } # delete existing
my($new_fbody,$verbatim) = &$e($field_name,$field_body);
if (!defined($new_fbody)) { $field_body = undef; last } # delete
my $curr_head = $verbatim ? ($field_name . ':' . $new_fbody)
: hdr($field_name, $new_fbody, 0,
$msginfo->smtputf8);
chomp($curr_head); $curr_head .= "\n";
$curr_head =~ /^([^:]*?)[ \t]*:(.*)\z/s;
$field_body = $2; chomp($field_body); # carry to next iteration
}
if (!defined($field_body)) {
push(@response, proto_encode('delheader','1',$field_name));
} elsif ($field_body ne $orig_field_body) {
# sendmail inserts a space after a colon, remove ours
$field_body =~ s/^[ \t]//;
push(@response, proto_encode('chgheader','1',
$field_name,$field_body));
}
}
}
my $hdridx = c('prepend_header_fields_hdridx'); # milter insertion index
$hdridx = 0 if !defined($hdridx) || $hdridx < 0;
$hdridx = sprintf("%d",$hdridx); # convert to string
# prepend header fields one at a time, topmost field last
for my $hf (map(ref $hdr_edits->{$_} ? reverse @{$hdr_edits->{$_}} : (),
qw(addrcvd prepend)) ) {
if ($hf =~ /^([^:]*?)[ \t]*:[ \t]*(.*?)$/s)
{ push(@response, proto_encode('insheader',$hdridx,$1,$2)) }
}
# append header fields
for my $hf (map(ref $hdr_edits->{$_} ? @{$hdr_edits->{$_}} : (),
qw(append)) ) {
if ($hf =~ /^([^:]*?)[ \t]*:[ \t]*(.*?)$/s)
{ push(@response, proto_encode('addheader',$1,$2)) }
}
}
if ($old_amcl) { # milter via old amavis helper program
# warn if there is anything that should be done but MTA is not capable of
# (or a helper program cannot pass the request)
for (grep(/^(delrcpt|addrcpt)=/, @response))
{ do_log(-1, "WARN: MTA can't do: %s", $_) }
if ($rcpt_deletes && $rcpt_count-$rcpt_deletes > 0) {
do_log(-1, "WARN: ACCEPT THE WHOLE MESSAGE, ".
"MTA-in can't do selective recips deletion");
}
}
push(@response, proto_encode('return_value','continue'));
}
push(@response, proto_encode('exit_code',sprintf("%d",$exit_code)));
ll(3) && do_log(3, 'mail checking ended: %s', join("\n",@response));
dump_captured_log(1, c('enable_log_capture_dump'));
%current_policy_bank = %baseline_policy_bank; # restore bank settings
@response;
}
# just a proof-of-concept, experimental
#
sub postfix_policy($$) {
my($msginfo,$attr_ref) = @_;
my(@response);
if ($attr_ref->{'request'} ne 'smtpd_access_policy') {
die("unknown 'request' value: " . $attr_ref->{'request'});
} else {
@response = 'action=DUNNO';
}
@response;
}
sub dispatch_from_quarantine($$$) {
my($msginfo,$request_type,$feedback_type) = @_;
my $err;
eval {
# feed information to a msginfo object, possibly replacing it
$msginfo = msg_from_quarantine($msginfo,$request_type,$feedback_type);
mail_dispatch($msginfo,0,1); # re-send the original mail or report
1;
} or do {
$err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
do_log(0, "WARN: dispatch_from_quarantine failed: %s",$err);
die $err if $err =~ /^timed out\b/; # resignal timeout
};
my(@response);
my $per_recip_data = $msginfo->per_recip_data;
if (!defined($per_recip_data) || !@$per_recip_data) {
push(@response, proto_encode('setreply','250','2.5.0',
"No recipients, nothing to do"));
} else {
Amavis::build_and_save_structured_report($msginfo,'SEND');
for my $r (@$per_recip_data) {
local($1,$2,$3); my($smtp_s,$smtp_es,$msg);
my $resp = $r->recip_smtp_response;
if ($err ne '')
{ ($smtp_s,$smtp_es,$msg) = ('450', '4.5.0', "ERROR: $err") }
elsif ($resp =~ /^([1-5]\d\d) ([245]\.\d{1,3}\.\d{1,3})(?: |\z)(.*)\z/s)
{ ($smtp_s,$smtp_es,$msg) = ($1,$2,$3) }
elsif ($resp =~ /^(([1-5])\d\d)(?: |\z)(.*)\z/s)
{ ($smtp_s,$smtp_es,$msg) = ($1, "$2.0.0" ,$3) }
else
{ ($smtp_s,$smtp_es,$msg) = ('450', '4.5.0', "Unexpected: $resp") }
push(@response, proto_encode('setreply',$smtp_s,$smtp_es,$msg));
}
}
@response;
}
1;
__DATA__
#
package Amavis::In::SMTP;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Util qw(ll do_log do_log_safe untaint
dump_captured_log log_capture_enabled
am_id new_am_id snmp_counters_init
orcpt_decode xtext_decode safe_encode_utf8_inplace
idn_to_ascii sanitize_str add_entropy
debug_oneshot waiting_for_client prolong_timer
switch_to_my_time switch_to_client_time
setting_by_given_contents_category);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Lookup::IP qw(lookup_ip_acl normalize_ip_addr);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::TempDir;
import Amavis::In::Message;
import Amavis::In::Connection;
}
use Errno qw(ENOENT EACCES EINTR EAGAIN);
use MIME::Base64;
use Time::HiRes ();
#use IO::Socket::SSL;
BEGIN { # due to dynamic loading runs only after config files have been read
# for compatibility with 2.10 or earlier:
$smtpd_tls_server_options{SSL_key_file} = $smtpd_tls_key_file
if !exists $smtpd_tls_server_options{SSL_key_file} &&
defined $smtpd_tls_key_file;
$smtpd_tls_server_options{SSL_cert_file} = $smtpd_tls_cert_file
if !exists $smtpd_tls_server_options{SSL_cert_file} &&
defined $smtpd_tls_cert_file;
my $tls_security_level = c('tls_security_level_in');
$tls_security_level = 0 if !defined($tls_security_level) ||
lc($tls_security_level) eq 'none';
if ($tls_security_level) {
( defined $smtpd_tls_server_options{SSL_cert_file} &&
$smtpd_tls_server_options{SSL_cert_file} ne ''
) or die '$tls_security_level is enabled '.
'but $smtpd_tls_server_options{SSL_cert_file} is not provided'."\n";
( defined $smtpd_tls_server_options{SSL_key_file} &&
$smtpd_tls_server_options{SSL_key_file} ne ''
) or die '$tls_security_level is enabled '.
'but $smtpd_tls_server_options{SSL_key_file} is not provided'."\n";
}
1;
}
sub new($) {
my $class = $_[0];
my $self = bless {}, $class;
undef $self->{sock}; # SMTP socket
$self->{proto} = undef; # SMTP / ((ESMTP / LMTP) (A | S | SA)? )
$self->{smtp_outbuf} = undef; # SMTP responses buffer for PIPELINING
undef $self->{pipelining}; # may we buffer responses?
undef $self->{session_closed_normally}; # closed properly with QUIT
$self->{within_data_transfer} = 0;
$self->{smtp_inpbuf} = ''; # SMTP input buffer
$self->{tempdir} = Amavis::TempDir->new; # TempDir object
$self;
}
sub DESTROY {
my $self = $_[0];
local($@,$!,$_); my $myactualpid = $$;
eval {
if (defined($my_pid) && $myactualpid != $my_pid) {
do_log(5,"Skip closing SMTP session in a clone [%s] (born as [%s])",
$myactualpid, $my_pid);
} elsif (ref($self->{sock}) && ! $self->{session_closed_normally}) {
my $msg = "421 4.3.2 Service shutting down, closing channel";
$msg .= ", during waiting for input from client" if waiting_for_client();
$msg .= ", sig: " .
join(',', keys %Amavisd::got_signals) if %Amavisd::got_signals;
$self->smtp_resp(1,$msg);
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!";
do_log_safe(1,"SMTP shutdown: %s", $eval_stat);
};
}
sub readline {
my($self, $timeout) = @_;
my($rout,$eout,$rin,$ein);
my $ifh = $self->{sock};
for (;;) {
local($1);
return $1 if $self->{smtp_inpbuf} =~ s/^(.*?\015\012)//s;
# if (defined $timeout) {
# if (!defined $rin) {
# $rin = $ein = ''; vec($rin, fileno $self->{sock}, 1) = 1; $ein = $rin;
# }
# my($nfound,$timeleft) =
# select($rout=$rin, undef, $eout=$ein, $timeout);
# defined $nfound && $nfound >= 0
# or die "Select failed: ".
# (!$self->{ssl_active} ? $! : $ifh->errstr.", $!");
# if (!$nfound) {
# do_log(2, 'smtp readline: timed out, %s s', $timeout);
# $timeout = undef; next; # carry on as usual
# }
# }
my $nbytes = $ifh->sysread($self->{smtp_inpbuf}, 16384,
length($self->{smtp_inpbuf}));
if ($nbytes) {
ll(5) && do_log(5, 'smtp readline: read %d bytes, new size: %d',
$nbytes, length($self->{smtp_inpbuf}));
} elsif (defined $nbytes) { # defined but zero
do_log(5, 'smtp readline: EOF');
$! = 0; # eof, no error
last;
} elsif ($! == EAGAIN || $! == EINTR) {
do_log(5, 'smtp readline: interrupted: %s',
!$self->{ssl_active} ? $! : $ifh->errstr.", $!");
# retry
} else {
do_log(5, 'smtp readline: error: %s',
!$self->{ssl_active} ? $! : $ifh->errstr.", $!");
last;
}
}
undef;
}
# Efficiently copy mail text from an SMTP socket to a file, converting
# CRLF to a local filesystem newlines \n, and handling dot-destuffing.
# Should be called just after the DATA command has been responded to,
# stops reading at a CRLF DOT CRLF or eof. Does not report stuffing errors.
#
# Our current statistics (Q4 2011) shows that 80 % of messages are below
# 30.000 bytes, and 90 % of messages are below 100.000 bytes in size.
#
sub copy_smtp_data {
my($self, $ofh, $out_str_ref, $size_limit) = @_;
my $ifh = $self->{sock};
my $buff = $self->{smtp_inpbuf}; # work with a local copy
$$out_str_ref = '' if ref $out_str_ref;
# assumes to be called right after a DATA<CR><LF>
my $eof = 0; my $at_the_beginning = 1;
my $size = 0; my $oversized = 0;
my($errno,$nreads,$j);
my $smtpd_t_o = c('smtpd_timeout');
while (!$eof) {
# alarm should apply per-line, but we are dealing with whole chunks here
alarm($smtpd_t_o);
$nreads = $ifh->sysread($buff, 65536, length $buff);
if ($nreads) {
ll(5) && do_log(5, "smtp copy: read %d bytes into buffer, new size: %d",
$nreads, length($buff));
} elsif (defined $nreads) {
$eof = 1;
do_log(5, "smtp copy: EOF");
} else {
$eof = 1;
$errno = !$self->{ssl_active} ? $! : $ifh->errstr.", $!";
do_log(5, "smtp copy: error: %s", $errno);
}
if ($at_the_beginning && substr($buff,0,3) eq ".\015\012") {
# a preceding \015\012 is implied, although no longer in the buffer
substr($buff,0,3) = '';
$self->{within_data_transfer} = 0;
last;
} elsif ( ($j=index($buff,"\015\012.\015\012")) >= 0 ) { # last chunk
my $carry = substr($buff,$j+5); # often empty
substr($buff,$j+2) = ''; # ditch the dot and the rest
$size += length($buff);
if (!$oversized) {
$buff =~ s/\015\012\.?/\n/gs;
# the last chunk is allowed to overshoot the 'small mail' limit
$$out_str_ref .= $buff if $out_str_ref;
if ($ofh) {
my $nwrites;
for (my $ofs = 0; $ofs < length($buff); $ofs += $nwrites) {
$nwrites = syswrite($ofh, $buff, length($buff)-$ofs, $ofs);
defined $nwrites or die "Error writing to mail file: $!";
}
}
if ($size_limit && $size > $size_limit) {
do_log(1,"Message size exceeded %d B", $size_limit);
$oversized = 1;
}
}
$buff = $carry;
$self->{within_data_transfer} = 0;
last;
}
my $carry = '';
if ($eof) {
# flush whatever is in the buffer, no more data coming
} elsif ($at_the_beginning &&
($buff eq ".\015" || $buff eq '.' || $buff eq '')) {
$carry = $buff; $buff = '';
} elsif (substr($buff,-4,4) eq "\015\012.\015") {
substr($buff,-4,4) = ''; $carry = "\015\012.\015";
} elsif (substr($buff,-3,3) eq "\015\012.") {
substr($buff,-3,3) = ''; $carry = "\015\012.";
} elsif (substr($buff,-2,2) eq "\015\012") {
substr($buff,-2,2) = ''; $carry = "\015\012";
} elsif (substr($buff,-1,1) eq "\015") {
substr($buff,-1,1) = ''; $carry = "\015";
}
if ($buff ne '') {
$at_the_beginning = 0;
# message size is defined in RFC 1870, includes CRLF but no stuffed dots
# NOTE: we overshoot here by the number of stuffed dots, for performance;
# the message size will be finely adjusted in get_body_digest()
$size += length($buff);
if (!$oversized) {
# The RFC 5321 is quite clear, leading "." characters in
# SMTP are stripped regardless of the following character.
# Some MTAs only trim "." when the next character is also
# a ".", but this violates the RFC.
$buff =~ s/\015\012\.?/\n/gs; # quite fast, but still a bottleneck
if (!$out_str_ref) {
# not writing to memory
} elsif (length($$out_str_ref) < 100*1024) { # 100 KiB 'small mail'
$$out_str_ref .= $buff;
} else { # large mail, hand over writing to a file
# my $nwrites;
# for (my $ofs = 0; $ofs < length($$out_str_ref); $ofs += $nwrites) {
# $nwrites = syswrite($ofh, $$out_str_ref,
# length($$out_str_ref)-$ofs, $ofs);
# defined $nwrites or die "Error writing to mail file: $!";
# }
$$out_str_ref = '';
$out_str_ref = undef;
}
if ($ofh) {
my $nwrites;
for (my $ofs = 0; $ofs < length($buff); $ofs += $nwrites) {
$nwrites = syswrite($ofh, $buff, length($buff)-$ofs, $ofs);
defined $nwrites or die "Error writing to mail file: $!";
}
}
if ($size_limit && $size > $size_limit) {
do_log(1,"Message size exceeded %d B, ".
"skipping further input", $size_limit);
my $trunc_str = "\n***TRUNCATED***\n";
$$out_str_ref .= $trunc_str if $out_str_ref;
if ($ofh) {
my $nwrites = syswrite($ofh, $trunc_str);
defined $nwrites or die "Error writing to mail file: $!";
}
$oversized = 1;
}
}
}
$buff = $carry;
}
do_log(5, "smtp copy: %d bytes still buffered at end", length($buff));
$self->{smtp_inpbuf} = $buff; # put a local copy back into object
!$self->{within_data_transfer} or die "Connection broken during DATA: ".
(!$self->{ssl_active} ? $! : $ifh->errstr.", $!");
# return a message size and an indication of exceeded size limit
($size,$oversized);
}
sub preserve_evidence { # preserve temporary files etc in case of trouble
my $self = shift;
!$self->{tempdir} ? undef : $self->{tempdir}->preserve(@_);
}
sub authenticate($$$) {
my($state,$auth_mech,$auth_resp) = @_;
my($result,$newchallenge);
if ($auth_mech eq 'ANONYMOUS') { # RFC 2245
$result = [$auth_resp,undef];
} elsif ($auth_mech eq 'PLAIN') { # RFC 2595, "user\0authname\0pass"
if (!defined($auth_resp)) { $newchallenge = '' }
else { $result = [ (split(/\000/,$auth_resp,-1))[0,2] ] }
} elsif ($auth_mech eq 'LOGIN' && !defined $state) {
$newchallenge = 'Username:'; $state = [];
} elsif ($auth_mech eq 'LOGIN' && @$state==0) {
push(@$state, $auth_resp); $newchallenge = 'Password:';
} elsif ($auth_mech eq 'LOGIN' && @$state==1) {
push(@$state, $auth_resp); $result = $state;
} # CRAM-MD5:RFC 2195, DIGEST-MD5:RFC 2831
($state,$result,$newchallenge);
}
# Parse the "PROXY protocol header", which is a block of connection info
# the connection initiator prepends at the beginning of a connection.
# Recognizes the PROXY protocol Version 1 (V 2 is not supported here).
# http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt
#
sub haproxy_protocol_parse($) {
local($_) = $_[0]; # a "PROXY protocol header"
my($proto, $src_addr, $dst_addr, $src_port, $dst_port);
local($1,$2,$3,$4,$5);
if (/^PROXY\ (UNKNOWN)/) {
$proto = $1; # receiver must ignore anything presented before the CRLF
} elsif (/^PROXY\ ((?-i)TCP4)\ ((?:\d{1,3}\.){3}\d{1,3})
\ ((?:\d{1,3}\.){3}\d{1,3})
\ (\d{1,5})\ (\d{1,5})\x0D\x0A\z/xs) {
($proto, $src_addr, $dst_addr, $src_port, $dst_port) = ($1,$2,$3,$4,$5);
} elsif (/^PROXY\ ((?-i)TCP6)\ ([0-9a-f]{0,4} (?: : [0-9a-f]{0,4}){2,7})
\ ([0-9a-f]{0,4} (?: : [0-9a-f]{0,4}){2,7})
\ (\d{1,5})\ (\d{1,5})\x0D\x0A\z/xsi) {
($proto, $src_addr, $dst_addr, $src_port, $dst_port) = ($1,$2,$3,$4,$5);
}
return ($proto) if $proto !~ /^TCP[46]\z/;
return if $src_port && $src_port =~ /^0/; # leading zeroes not allowed
return if $dst_port && $dst_port =~ /^0/;
$src_port = 0+$src_port; $dst_port = 0+$dst_port; # turn to numeric
return if $src_port > 65535 || $dst_port > 65535;
($proto, $src_addr, $dst_addr, $src_port, $dst_port);
}
# process the "PROXY protocol header" and pretend the claimed connection
#
sub haproxy_apply($$) {
my($conn, $line) = @_;
if (defined $line) {
ll(4) && do_log(4, 'HAProxy: < %s', $line);
my($proto, $src_addr, $dst_addr, $src_port, $dst_port) =
haproxy_protocol_parse($line);
if (!defined $src_addr || !defined $dst_addr ||
!$src_port || !$dst_port) {
do_log(0, "HAProxy: PROXY protocol header expected, got: %s", $line);
die "HAProxy: a PROXY protocol header expected";
} elsif (!Amavis::access_is_allowed(undef, $src_addr, $src_port,
$dst_addr, $dst_port)) {
do_log(0, "HAProxy, access denied: %s [%s]:%d -> [%s]:%d",
$proto, $src_addr, $src_port, $dst_addr, $dst_port);
die "HAProxy: access from client $src_addr denied\n";
} else {
if (ll(3)) {
do_log(3,
"HAProxy: accepted: (client) [%s]:%d -> [%s]:%d (HA Proxy/server)",
$src_addr, $src_port, $dst_addr, $dst_port);
do_log(3,
"HAProxy: (HA Proxy/initiator) [%s]:%d -> [%s]:%d (me/target)",
$conn->client_ip||'x', $conn->client_port||0,
$conn->socket_ip||'x', $conn->socket_port||0);
};
$conn->client_ip(untaint(normalize_ip_addr($src_addr)));
$conn->socket_ip(untaint(normalize_ip_addr($dst_addr)));
$conn->client_port(untaint($src_port));
$conn->socket_port(untaint($dst_port));
}
}
}
# Accept an SMTP or LMTP connect (which can do any number of transactions)
# and call content checking for each message received
#
sub process_smtp_request($$$$) {
my($self, $sock, $lmtp, $conn, $check_mail) = @_;
# $sock: connected socket from Net::Server
# $lmtp: greet as an LMTP server instead of (E)SMTP
# $conn: information about client connection
# $check_mail: subroutine ref to be called with file handle
my($msginfo, $authenticated, $auth_user, $auth_pass);
my(%announced_ehlo_keywords);
$self->{sock} = $sock;
$self->{pipelining} = 0; # may we buffer responses?
$self->{smtp_outbuf} = []; # SMTP responses buffer for PIPELINING
$self->{session_closed_normally} = 0; # closed properly with QUIT?
$self->{ssl_active} = 0; # session upgraded to SSL
my $tls_security_level = c('tls_security_level_in');
$tls_security_level = 0 if !defined($tls_security_level) ||
lc($tls_security_level) eq 'none';
my $myheloname;
# $myheloname = idn_to_ascii(c('myhostname'));
# $myheloname = 'localhost';
# $myheloname = '[127.0.0.1]';
my $sock_ip = $conn->socket_ip;
$myheloname = defined $sock_ip && $sock_ip ne '' ? "[$sock_ip]"
: '[localhost]';
new_am_id(undef, $Amavis::child_invocation_count, undef);
my $initial_am_id = 1;
my($sender_unq, $sender_quo, @recips, $got_rcpt);
my $max_recip_size_limit; # maximum of per-recipient message size limits
my($terminating,$aborting,$eof,$voluntary_exit); my(%xforward_args);
my $seq = 0;
my(%baseline_policy_bank) = %current_policy_bank;
$conn->appl_proto($self->{proto} = $lmtp ? 'LMTP' : 'SMTP');
my $final_oversized_destiny_all_pass = 1;
my $oversized_fd_map_ref =
setting_by_given_contents_category(CC_OVERSIZED,
cr('final_destiny_maps_by_ccat'));
my $oversized_lovers_map_ref =
setting_by_given_contents_category(CC_OVERSIZED,
cr('lovers_maps_by_ccat'));
# system-wide message size limit, if any
my $message_size_limit = c('smtpd_message_size_limit');
if ($enforce_smtpd_message_size_limit_64kb_min &&
$message_size_limit && $message_size_limit < 65536) {
$message_size_limit = 65536; # RFC 5321 requires at least 64k
}
if (c('haproxy_target_enabled')) {
Amavis::Timing::go_idle(4);
my $line; { local($/) = "\012"; $line = $self->readline }
Amavis::Timing::go_busy(5);
defined $line or die "Error reading, expected a PROXY header: $!";
haproxy_apply($conn, $line);
}
my $smtpd_greeting_banner_tmp = c('smtpd_greeting_banner');
$smtpd_greeting_banner_tmp =~
s{ \$ (?: \{ ([^\}]+) \} |
([a-zA-Z](?:[a-zA-Z0-9_-]*[a-zA-Z0-9])?\b) ) }
{ { 'helo-name' => $myheloname,
'myhostname' => idn_to_ascii(c('myhostname')),
'version' => $myversion,
'version-id' => $myversion_id,
'version-date' => $myversion_date,
'product' => $myproduct_name,
'protocol' => $lmtp?'LMTP':'ESMTP' }->{lc($1.$2)}
}xgse;
$self->smtp_resp(1,"220 $smtpd_greeting_banner_tmp");
section_time('SMTP greeting');
# each call to smtp_resp starts a $smtpd_timeout timeout to tame slow clients
$0 = sprintf("%s (ch%d-idle)",
c('myprogram_name'), $Amavis::child_invocation_count);
Amavis::Timing::go_idle(4);
local($_); local($/) = "\012"; # input line terminator set to LF
for ($! = 0; defined($_ = $self->readline); $! = 0) {
$0 = sprintf("%s (ch%d-%s)",
c('myprogram_name'), $Amavis::child_invocation_count, am_id());
Amavis::Timing::go_busy(5);
# the ball is now in our courtyard, (re)start our timer;
# each of our smtp responses will switch back to a $smtpd_timeout timer
{ # a block is used as a 'switch' statement - 'last' will exit from it
my $cmd = $_;
ll(4) && do_log(4, '%s< %s', $self->{proto},$cmd);
if (!/^ [ \t]* ( [A-Za-z] [A-Za-z0-9]* ) (?: [ \t]+ (.*?) )? [ \t]*
\015 \012 \z /xs) {
$self->smtp_resp(1,"500 5.5.2 Error: bad syntax", 1, $cmd); last;
};
$_ = uc($1); my $args = $2;
switch_to_my_time("rx SMTP $_");
# (causes holdups in Postfix, it doesn't retry immediately; better set max_use)
# $Amavis::child_task_count >= $max_requests # exceeded max_requests
# && /^(?:HELO|EHLO|LHLO|DATA|NOOP|QUIT|VRFY|EXPN|TURN)\z/ && do {
# # pipelining checkpoints;
# # in case of multiple-transaction protocols (e.g. SMTP, LMTP)
# # we do not like to keep running indefinitely at the MTA's mercy
# my $msg = "Closing transmission channel ".
# "after $Amavis::child_task_count transactions, $_";
# do_log(2,"%s",$msg); $self->smtp_resp(1,"421 4.3.0 ".$msg); #flush!
# $terminating=1; last;
# };
$tls_security_level && lc($tls_security_level) ne 'may' &&
!$self->{ssl_active} && !/^(?:NOOP|EHLO|STARTTLS|QUIT)\z/ && do {
$self->smtp_resp(1,"530 5.7.0 Must issue a STARTTLS command first",
1,$cmd);
last;
};
# lc($tls_security_level) eq 'verify' && !/^QUIT\z/ && do {
# $self->smtp_resp(1,"554 5.7.0 Command refused due to lack of security",
# 1,$cmd);
# last;
# };
/^NOOP\z/ && do { $self->smtp_resp(1,"250 2.0.0 Ok $_"); last }; #flush!
/^QUIT\z/ && do {
if ($args ne '') {
$self->smtp_resp(1,"501 5.5.4 Error: QUIT does not accept arguments",
1,$cmd); #flush
} else {
my $smtpd_quit_banner_tmp = c('smtpd_quit_banner');
$smtpd_quit_banner_tmp =~
s{ \$ (?: \{ ([^\}]+) \} |
([a-zA-Z](?:[a-zA-Z0-9_-]*[a-zA-Z0-9])?\b) ) }
{ { 'helo-name' => $myheloname,
'myhostname' => idn_to_ascii(c('myhostname')),
'version' => $myversion,
'version-id' => $myversion_id,
'version-date' => $myversion_date,
'product' => $myproduct_name,
'protocol' => $lmtp?'LMTP':'ESMTP' }->{lc($1.$2)}
}xgse;
$self->smtp_resp(1,"221 2.0.0 $smtpd_quit_banner_tmp"); #flush!
$terminating = 1;
}
last;
};
/^(?:RSET|HELO|EHLO|LHLO|STARTTLS)\z/ && do {
# explicit or implicit session reset
$sender_unq = $sender_quo = undef; @recips = (); $got_rcpt = 0;
undef $max_recip_size_limit; undef $msginfo; # forget previous
$final_oversized_destiny_all_pass = 1;
%current_policy_bank = %baseline_policy_bank; # restore bank settings
%xforward_args = ();
if (/^(?:RSET|STARTTLS)\z/ && $args ne '') {
$self->smtp_resp(1,"501 5.5.4 Error: $_ does not accept arguments",
1,$cmd);
} elsif (/^RSET\z/) {
$self->smtp_resp(0,"250 2.0.0 Ok $_");
} elsif (/^STARTTLS\z/) { # RFC 3207 (ex RFC 2487)
if ($self->{ssl_active}) {
$self->smtp_resp(1,"554 5.5.1 Error: TLS already active");
} elsif (!$tls_security_level) {
$self->smtp_resp(1,"502 5.5.1 Error: command not available");
# } elsif (!$announced_ehlo_keywords{'STARTTLS'}) {
# $self->smtp_resp(1,"502 5.5.1 Error: ".
# "service extension STARTTLS was not announced");
} else {
$self->smtp_resp(1,"220 2.0.0 Ready to start TLS"); #flush!
%announced_ehlo_keywords = ();
IO::Socket::SSL->start_SSL($sock,
SSL_server => 1,
SSL_hostname => idn_to_ascii(c('myhostname')),
SSL_error_trap => sub {
my($sock,$msg) = @_;
do_log(-2,"STARTTLS, upgrading socket to TLS failed: %s",$msg);
},
%smtpd_tls_server_options,
) or die "Error upgrading input socket to TLS: ".
IO::Socket::SSL::errstr();
if ($self->{smtp_inpbuf} ne '') {
do_log(-1, "STARTTLS pipelining violation attempt, sanitized");
$self->{smtp_inpbuf} = ''; # ditch any buffered data
}
$self->{ssl_active} = 1;
ll(3) && do_log(3,"smtpd TLS cipher: %s", $sock->get_cipher);
section_time('SMTP starttls');
}
} elsif (/^HELO\z/) {
$self->{pipelining} = 0; $lmtp = 0;
$conn->appl_proto($self->{proto} = 'SMTP');
$self->smtp_resp(0,"250 $myheloname");
$conn->smtp_helo($args); section_time('SMTP HELO');
} elsif (/^(?:EHLO|LHLO)\z/) {
$self->{pipelining} = 1; $lmtp = $_ eq 'LHLO' ? 1 : 0;
$conn->appl_proto($self->{proto} = $lmtp ? 'LMTP' : 'ESMTP');
my(@ehlo_keywords) = (
'VRFY',
'PIPELINING', # RFC 2920
!defined($message_size_limit) ? 'SIZE' # RFC 1870
: sprintf('SIZE %d',$message_size_limit),
'ENHANCEDSTATUSCODES', # RFC 2034, RFC 3463, RFC 5248
'8BITMIME', # RFC 6152
'SMTPUTF8', # RFC 6531
'DSN', # RFC 3461
!$tls_security_level || $self->{ssl_active} ? ()
: 'STARTTLS', # RFC 3207 (ex RFC 2487)
!@{ca('auth_mech_avail')} ? () # RFC 4954 (ex RFC 2554)
: join(' ','AUTH',@{ca('auth_mech_avail')}),
'XFORWARD NAME ADDR PORT PROTO HELO IDENT SOURCE',
# 'XCLIENT NAME ADDR PORT PROTO HELO LOGIN',
);
my(%smtpd_discard_ehlo_keywords) =
map((uc($_),1), @{ca('smtpd_discard_ehlo_keywords')});
# RFC 6531: Servers offering this extension MUST provide
# support for, and announce, the 8BITMIME extension
$smtpd_discard_ehlo_keywords{'SMTPUTF8'} = 1
if $smtpd_discard_ehlo_keywords{'8BITMIME'};
@ehlo_keywords =
grep(/^([A-Za-z0-9]+)/ &&
!$smtpd_discard_ehlo_keywords{uc $1}, @ehlo_keywords);
$self->smtp_resp(1,"250 $myheloname\n" .
join("\n",@ehlo_keywords)); #flush!
%announced_ehlo_keywords =
map( (/^([A-Za-z0-9]+)/ && uc $1, 1), @ehlo_keywords);
$conn->smtp_helo($args); section_time("SMTP $_");
};
last;
};
/^XFORWARD\z/ && do { # Postfix extension
my $xcmd = $_;
if (defined $sender_unq) {
$self->smtp_resp(1,"503 5.5.1 Error: $xcmd not allowed ".
"within transaction",1,$cmd);
last;
}
my $bad;
for (split(' ',$args)) {
if (!/^ ( [A-Za-z0-9] [A-Za-z0-9-]* ) =
( [\x21-\x7E\x80-\xFF]{0,255} )\z/xs) {
$self->smtp_resp(1,"501 5.5.4 Syntax error in $xcmd parameters",
1, $cmd);
$bad = 1; last;
} else {
my($name,$val) = (uc($1), $2);
if ($name=~/^(?:NAME|ADDR|PORT|PROTO|HELO|IDENT|SOURCE|LOGIN)\z/) {
$val = undef if uc($val) eq '[UNAVAILABLE]';
# Postfix since vers 2.3 (20060610) uses xtext-encoded (RFC 3461)
# strings in XCLIENT and XFORWARD attribute values, previous
# versions sent plain text with neutered special characters.
# The IDENT option is available since postfix 2.8.0 .
$val = xtext_decode($val) if defined $val &&
$val =~ /\+([0-9a-fA-F]{2})/;
$xforward_args{$name} = $val;
} else {
$self->smtp_resp(1,"501 5.5.4 $xcmd command parameter ".
"error: $name=$val",1,$cmd);
$bad = 1; last;
}
}
}
$self->smtp_resp(1,"250 2.5.0 Ok $_") if !$bad;
last;
};
/^HELP\z/ && do {
$self->smtp_resp(0,"214 2.0.0 See $myproduct_name home page at:\n".
"http://www.ijs.si/software/amavisd/");
last;
};
/^AUTH\z/ && @{ca('auth_mech_avail')} && do { # RFC 4954 (ex RFC 2554)
# if (!$announced_ehlo_keywords{'AUTH'}) {
# $self->smtp_resp(1,"502 5.5.1 Error: ".
# "service extension AUTH was not announced");
# last;
# } elsif
if ($args !~ /^([^ ]+)(?: ([^ ]*))?\z/is) {
$self->smtp_resp(1,"501 5.5.2 Syntax: AUTH mech [initresp]",1,$cmd);
last;
}
# enhanced status codes: RFC 4954, RFC 5248
my($auth_mech,$auth_resp) = (uc($1), $2);
if ($authenticated) {
$self->smtp_resp(1,"503 5.5.1 Error: session already authenticated",
1,$cmd);
} elsif (defined $sender_unq) {
$self->smtp_resp(1,"503 5.5.1 Error: AUTH not allowed within ".
"transaction",1,$cmd);
} elsif (!grep(uc($_) eq $auth_mech, @{ca('auth_mech_avail')})) {
$self->smtp_resp(1,"504 5.5.4 Error: requested authentication ".
"mechanism not supported",1,$cmd);
} else {
my($state,$result,$challenge);
if ($auth_resp eq '=') { $auth_resp = '' } # zero length
elsif ($auth_resp eq '') { $auth_resp = undef }
for (;;) {
if ($auth_resp !~ m{^[A-Za-z0-9+/]*=*\z}) {
$self->smtp_resp(1,"501 5.5.2 Authentication failed: ".
"malformed authentication response",1,$cmd);
last;
} else {
$auth_resp = decode_base64($auth_resp) if $auth_resp ne '';
($state,$result,$challenge) =
authenticate($state, $auth_mech, $auth_resp);
if (ref($result) eq 'ARRAY') {
$self->smtp_resp(0,"235 2.7.0 Authentication succeeded");
$authenticated = 1; ($auth_user,$auth_pass) = @$result;
do_log(2,"AUTH %s, user=%s", $auth_mech,$auth_user); #auth_resp
last;
} elsif (defined $result && !$result) {
$self->smtp_resp(0,"535 5.7.8 Authentication credentials ".
"invalid", 1, $cmd);
last;
}
}
# server challenge or ready prompt
$self->smtp_resp(1,"334 ".encode_base64($challenge,''));
$! = 0; $auth_resp = $self->readline;
defined $auth_resp or die "Error reading auth resp: ".
(!$self->{ssl_active} ? $! : $sock->errstr.", $!");
switch_to_my_time('rx AUTH challenge reply');
do_log(5, "%s< %s", $self->{proto},$auth_resp);
$auth_resp =~ s/\015?\012\z//;
if (length($auth_resp) > 12288) { # RFC 4954
$self->smtp_resp(1,"500 5.5.6 Authentication exchange ".
"line is too long");
last;
} elsif ($auth_resp eq '*') {
$self->smtp_resp(1,"501 5.7.1 Authentication aborted");
last;
}
}
}
last;
};
/^VRFY\z/ && do {
if ($args eq '') {
$self->smtp_resp(1,"501 5.5.2 Syntax: VRFY address", 1,$cmd); #flush!
} else { # RFC 2505
$self->smtp_resp(1,"252 2.0.0 Argument not checked", 0,$cmd); #flush!
}
last;
};
/^MAIL\z/ && do { # begin new SMTP transaction
if (defined $sender_unq) {
$self->smtp_resp(1,"503 5.5.1 Error: nested MAIL command", 1, $cmd);
last;
}
if (!$authenticated &&
c('auth_required_inp') && @{ca('auth_mech_avail')} ) {
$self->smtp_resp(1,"530 5.7.0 Authentication required", 1, $cmd);
last;
}
# begin SMTP transaction
my $now = Time::HiRes::time;
if (!$seq) { # the first connect
section_time('SMTP pre-MAIL');
} else { # establish a new time reference for each transaction
Amavis::Timing::init(); snmp_counters_init();
}
$seq++;
new_am_id(undef, $Amavis::child_invocation_count, $seq)
if !$initial_am_id;
$initial_am_id = 0;
# enter 'in transaction' state
$Amavis::zmq_obj->register_proc(1,1,'m',am_id()) if $Amavis::zmq_obj;
$Amavis::snmp_db->register_proc(1,1,'m',am_id()) if $Amavis::snmp_db;
Amavis::check_mail_begin_task();
$self->{tempdir}->prepare_dir;
$self->{tempdir}->prepare_file;
$msginfo = Amavis::In::Message->new;
$msginfo->rx_time($now);
$msginfo->log_id(am_id());
$msginfo->conn_obj($conn);
my $cl_ip = normalize_ip_addr($xforward_args{'ADDR'});
my $cl_port = $xforward_args{'PORT'};
my $cl_src = $xforward_args{'SOURCE'}; # local_header_rewrite_clients
my $cl_login= $xforward_args{'LOGIN'}; # XCLIENT
$cl_port = undef if $cl_port !~ /^\d{1,9}\z/ || $cl_port > 65535;
my(@bank_names_cl);
{ my $cl_ip_tmp = $cl_ip;
# treat unknown client IP address as 0.0.0.0,
# from "This" Network, RFC 1700
$cl_ip_tmp = '0.0.0.0' if !defined($cl_ip) || $cl_ip eq '';
my(@cp) = @{ca('client_ipaddr_policy')};
do_log(-1,'@client_ipaddr_policy must contain pairs, '.
'number of elements is not even') if @cp % 2 != 0;
my $labeler = Amavis::Lookup::Label->new('client_ipaddr_policy');
while (@cp > 1) {
my $lookup_table = shift(@cp);
my $policy_names = shift(@cp); # comma-separated string of names
next if !defined $policy_names;
if (lookup_ip_acl($cl_ip_tmp, $labeler, $lookup_table)) {
local $1;
push(@bank_names_cl,
map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $policy_names)));
last; # should we stop here or not?
}
}
}
# load policy banks from the 'client_ipaddr_policy' lookup
Amavis::load_policy_bank($_,$msginfo) for @bank_names_cl;
$msginfo->originating(c('originating'));
$msginfo->client_addr($cl_ip); # ADDR
$msginfo->client_port($cl_port); # PORT
$msginfo->client_source($cl_src); # SOURCE
$msginfo->client_name($xforward_args{'NAME'});
$msginfo->client_helo($xforward_args{'HELO'});
$msginfo->client_proto($xforward_args{'PROTO'});
$msginfo->queue_id($xforward_args{'IDENT'});
# $msginfo->body_type('7BIT'); # presumed, unless explicitly declared
%xforward_args = (); # reset values for the next transaction
if ($self->{ssl_active}) {
$msginfo->tls_cipher($sock->get_cipher);
if ($self->{proto} =~ /^(LMTP|ESMTP)\z/i) {
$self->{proto} .= 'S'; # RFC 3848
$conn->appl_proto($self->{proto});
}
}
my $submitter;
if ($authenticated) {
$msginfo->auth_user($auth_user); $msginfo->auth_pass($auth_pass);
if ($self->{proto} =~ /^(LMTP|ESMTP)S?\z/i) {
$self->{proto} .= 'A'; # RFC 3848
$conn->appl_proto($self->{proto});
}
} elsif (c('auth_reauthenticate_forwarded') &&
c('amavis_auth_user') ne '') {
$msginfo->auth_user(c('amavis_auth_user'));
$msginfo->auth_pass(c('amavis_auth_pass'));
# $submitter = quote_rfc2821_local(c('mailfrom_notify_recip'));
# safe_encode_utf8_inplace($submitter) # to octets (if not already)
# $submitter = expand_variables($submitter) if defined $submitter;
}
local($1,$2);
if ($args !~ /^FROM: [ \t]*
( < (?: " (?: \\. | [^\\"] ){0,999} " | [^"\@ \t] )*
(?: \@ (?: \[ (?: \\. | [^\]\\] ){0,999} \] |
[^\[\]\\> \t] )* )? > )
(?: [ \t]+ (.+) )? \z/isx ) {
$self->smtp_resp(0,"501 5.5.2 Syntax: MAIL FROM:<address>",1,$cmd);
last;
}
my($addr,$opt) = ($1,$2);
my($size,$dsn_ret,$dsn_envid,$smtputf8);
my $msg; my $msg_nopenalize = 0;
for (split(' ',$opt)) {
if (!/^ ( [A-Za-z0-9] [A-Za-z0-9-]* )
(?: = ( [^=\000-\040\177]+ ) )? \z/xs) {
# any CHAR excluding "=", SP, and control characters
$msg = "501 5.5.4 Syntax error in MAIL FROM parameters";
} else {
my($name,$val) = (uc($1),$2);
if (!defined($val) && $name =~ /^(?:BODY|RET|ENVID|AUTH)\z/) {
$msg = "501 5.5.4 Syntax error in MAIL parameter, ".
"value is required: $name";
} elsif ($name eq 'SIZE') { # RFC 1870
if (!$announced_ehlo_keywords{'SIZE'}) {
do_log(5,'service extension SIZE was not announced');
# "555 5.5.4 Service extension SIZE was not announced: $name"
}
if (!defined $val) {
# value not provided, ignore
} elsif ($val !~ /^\d{1,20}\z/) {
$msg = "501 5.5.4 Syntax error in MAIL parameter: $name";
} else {
$size = untaint($val) if !defined $size;
}
} elsif ($name eq 'SMTPUTF8') { # RFC 6531
if (!$announced_ehlo_keywords{'SMTPUTF8'}) {
do_log(5,'service extension SMTPUTF8 was not announced');
# "555 5.5.4 Service extension SMTPUTF8 not announced: $name"
}
if (defined $val) {
# RFC 6531: The parameter does not accept a value.
$msg = "501 5.5.4 Syntax error in MAIL parameter: $name";
} else {
$msginfo->smtputf8(1);
if ($self->{proto} =~ /^(LMTP|ESMTP)S?A?\z/si) {
$self->{proto} = 'UTF8' . $self->{proto}; # RFC 6531
$self->{proto} =~ s/^UTF8ESMTP/UTF8SMTP/s;
$conn->appl_proto($self->{proto});
}
}
} elsif ($name eq 'BODY') { # RFC 6152: 8bit-MIMEtransport
if (!$announced_ehlo_keywords{'8BITMIME'}) {
do_log(5,'service extension 8BITMIME was not announced: BODY');
# "555 5.5.4 Service extension 8BITMIME not announced: $name"
}
if (defined $val && $val =~ /^(?:7BIT|8BITMIME)\z/i) {
$msginfo->body_type(uc $val);
} else {
$msg = "501 5.5.4 Syntax error in MAIL parameter: $name";
}
} elsif ($name eq 'RET') { # RFC 3461
if (!$announced_ehlo_keywords{'DSN'}) {
do_log(5,'service extension DSN was not announced: RET');
# "555 5.5.4 Service extension DSN not announced: $name"
}
if (!defined($dsn_ret)) {
$dsn_ret = uc $val;
} else {
$msg = "501 5.5.4 Syntax error in MAIL parameter: $name";
}
} elsif ($name eq 'ENVID') { # RFC 3461, value encoded as xtext
if (!$announced_ehlo_keywords{'DSN'}) {
do_log(5,'service extension DSN was not announced: ENVID');
# "555 5.5.4 Service extension DSN not announced: $name"
}
if (!defined($dsn_envid)) {
$dsn_envid = $val;
} else {
$msg = "501 5.5.4 Syntax error in MAIL parameter: $name";
}
} elsif ($name eq 'AUTH') { # RFC 4954 (ex RFC 2554)
if (!$announced_ehlo_keywords{'AUTH'}) {
do_log(5,'service extension AUTH was not announced');
# "555 5.5.4 Service extension AUTH not announced: $name"
}
my $s = xtext_decode($val); # encoded as xtext: RFC 3461
do_log(5,"MAIL command, %s, submitter: %s", $authenticated,$s);
if (defined $submitter) { # authorized identity
$msg = "504 5.5.4 MAIL command duplicate param.: $name=$val";
} elsif (!@{ca('auth_mech_avail')}) {
do_log(3,"MAIL command parameter AUTH supplied, but ".
"authentication capability not announced, ignored");
$submitter = '<>';
# mercifully ignore invalid parameter for the benefit of
# running amavisd as a Postfix pre-queue smtp proxy filter
# $msg = "503 5.7.4 Error: authentication disabled";
} else {
$submitter = $s;
}
} else {
$msg = "504 5.5.4 MAIL command parameter error: $name=$val";
}
}
last if defined $msg;
}
if (!defined($msg) && defined $dsn_ret && $dsn_ret!~/^(FULL|HDRS)\z/) {
$msg = "501 5.5.4 Syntax error in MAIL parameter RET: $dsn_ret";
}
if (!defined $msg) {
$sender_quo = $addr; $sender_unq = unquote_rfc2821_local($addr);
$addr = $1 if $addr =~ /^<(.*)>\z/s;
my $requoted = qquote_rfc2821_local($sender_unq);
do_log(2, "address modified (sender): %s -> %s",
$sender_quo, $requoted) if $requoted ne $sender_quo;
if (defined $policy_bank{'MYUSERS'} &&
$sender_unq ne '' && $msginfo->originating &&
lookup2(0,$sender_unq, ca('local_domains_maps'))) {
Amavis::load_policy_bank('MYUSERS',$msginfo);
}
debug_oneshot(
lookup2(0,$sender_unq, ca('debug_sender_maps')) ? 1 : 0,
$self->{proto} . "< $cmd");
# $submitter = $addr if !defined($submitter); # RFC 4954: MAY
$submitter = '<>' if !defined($msginfo->auth_user);
$msginfo->auth_submitter($submitter);
if (defined $size) {
do_log(5, "mesage size set to a declared size %s", $size);
$msginfo->msg_size(0+$size);
}
if (defined $dsn_ret || defined $dsn_envid) {
# keep ENVID in xtext-encoded form
$msginfo->dsn_ret($dsn_ret) if defined $dsn_ret;
$msginfo->dsn_envid($dsn_envid) if defined $dsn_envid;
}
$msg = "250 2.1.0 Sender $sender_quo OK";
};
$self->smtp_resp(0,$msg, !$msg_nopenalize && $msg=~/^5/ ? 1 : 0, $cmd);
section_time('SMTP MAIL');
last;
};
/^RCPT\z/ && do {
if (!defined($sender_unq)) {
$self->smtp_resp(1,"503 5.5.1 Need MAIL command before RCPT",1,$cmd);
@recips = (); $got_rcpt = 0;
last;
}
$got_rcpt++;
local($1,$2);
if ($args !~ /^TO: [ \t]*
( < (?: " (?: \\. | [^\\"] ){0,999} " | [^"\@ \t] )*
(?: \@ (?: \[ (?: \\. | [^\]\\] ){0,999} \] |
[^\[\]\\> \t] )* )? > )
(?: [ \t]+ (.+) )? \z/isx ) {
$self->smtp_resp(0,"501 5.5.2 Syntax: RCPT TO:<address>",1,$cmd);
last;
}
my($addr_smtp,$opt) = ($1,$2);
my($notify,$orcpt);
my $msg; my $msg_nopenalize = 0;
for (split(' ',$opt)) {
if (!/^ ( [A-Za-z0-9] [A-Za-z0-9-]* )
(?: = ( [^=\000-\040\177]+ ) )? \z/xs) {
# any CHAR excluding "=", SP, and control characters
$msg = "501 5.5.4 Syntax error in RCPT parameters";
} else {
my($name,$val) = (uc($1),$2);
if (!defined($val) && $name =~ /^(?:NOTIFY|ORCPT)\z/) {
$msg = "501 5.5.4 Syntax error in RCPT parameter, ".
"value is required: $name";
} elsif ($name eq 'NOTIFY') { # RFC 3461
if (!$announced_ehlo_keywords{'DSN'}) {
do_log(5,'service extension DSN was not announced: NOTIFY');
# "555 5.5.4 Service extension DSN not announced: $name"
}
if (!defined($notify)) {
$notify = $val;
} else {
$msg = "501 5.5.4 Syntax error in RCPT parameter $name";
}
} elsif ($name eq 'ORCPT') {
# RFC 3461: value encoded as xtext
# RFC 6533: utf-8-addr-xtext, utf-8-addr-unitext, utf-8-address
if (!$announced_ehlo_keywords{'DSN'}) {
do_log(5,'service extension DSN was not announced: ORCPT');
# "555 5.5.4 Service extension DSN not announced: $name"
}
if (defined $orcpt) { # duplicate
$msg = "501 5.5.4 Syntax error in RCPT parameter $name";
} else {
my($addr_type, $orcpt_dec) =
orcpt_decode($val, $msginfo->smtputf8);
$orcpt = $addr_type . ';' . $orcpt_dec;
}
} else {
$msg = "555 5.5.4 RCPT command parameter unrecognized: $name";
# 504 5.5.4 RCPT command parameter not implemented:
# 504 5.5.4 RCPT command parameter error:
# 555 5.5.4 RCPT command parameter unrecognized:
}
}
last if defined $msg;
}
my $addr = unquote_rfc2821_local($addr_smtp);
my $requoted = qquote_rfc2821_local($addr);
if ($requoted ne $addr_smtp) { # check for valid canonical quoting
# RFC 3461: If no ORCPT parameter was present in the RCPT command
# when the message was received, an ORCPT parameter MAY be added
# to the RCPT command when the message is relayed. If an ORCPT
# parameter is added by the relaying MTA, it MUST contain the
# recipient address from the RCPT command used when the message
# was received by that MTA
if (defined $orcpt) {
do_log(2, "address modified (recip): %s -> %s, orcpt retained: %s",
$addr_smtp, $requoted, $orcpt);
} else {
do_log(2, "address modified (recip): %s -> %s, setting orcpt",
$addr_smtp, $requoted);
$orcpt = ';' . $addr_smtp;
}
}
if (lookup2(0,$addr, ca('debug_recipient_maps'))) {
debug_oneshot(1, $self->{proto} . "< $cmd");
}
my $mslm = ca('message_size_limit_maps');
my $recip_size_limit;
$recip_size_limit = lookup2(0,$addr,$mslm) if @$mslm;
if ($recip_size_limit) {
# RFC 5321 requires at least 64k
$recip_size_limit = 65536
if $recip_size_limit < 65536 &&
$enforce_smtpd_message_size_limit_64kb_min;
$max_recip_size_limit = $recip_size_limit
if $recip_size_limit > $max_recip_size_limit;
}
my $mail_size = $msginfo->msg_size;
if (!defined($msg) && defined($notify)) {
my(@v) = split(/,/,uc($notify),-1);
if (grep(!/^(?:NEVER|SUCCESS|FAILURE|DELAY)\z/, @v)) {
$msg = "501 5.5.4 Error in RCPT parameter NOTIFY, ".
"illegal value: $notify";
} elsif (grep($_ eq 'NEVER', @v) && grep($_ ne 'NEVER', @v)) {
$msg = "501 5.5.4 Error in RCPT parameter NOTIFY, ".
"illegal combination of values: $notify";
} elsif (!@v) {
$msg = "501 5.5.4 Error in RCPT parameter NOTIFY, ".
"missing value: $notify";
}
$notify = \@v; # replace a string with a listref of items
}
if (!defined($msg) && $recip_size_limit) {
# check mail size if known, update $final_oversized_destiny_all_pass
my $fd = !ref $oversized_fd_map_ref ? $oversized_fd_map_ref # compat
: lookup2(0, $addr, $oversized_fd_map_ref, Label => 'Destiny4');
if (!defined $fd || $fd == D_PASS) {
$fd = D_PASS; # keep D_PASS
} elsif (defined($oversized_lovers_map_ref) &&
lookup2(0, $addr, $oversized_lovers_map_ref,
Label => 'Lovers4')) {
$fd = D_PASS; # D_PASS for oversized lovers
} else { # $fd != D_PASS, blocked if oversized
if ($final_oversized_destiny_all_pass) {
$final_oversized_destiny_all_pass = 0; # not PASS for all recips
do_log(5, 'Not a D_PASS on oversized for all recips: %s', $addr);
}
}
# check declared mail size here if known, otherwise we'll check
# the actual mail size after the message is received
if (defined $mail_size && $mail_size > $recip_size_limit) {
$msg = $fd == D_TEMPFAIL ? '452 4.3.4' :
$fd == D_PASS ? '250 2.3.4' : '552 5.3.4';
$msg .= " Declared message size ($mail_size B) ".
"exceeds size limit for recipient $addr_smtp";
$msg_nopenalize = 1;
do_log(0, "%s %s 'RCPT TO': %s", $self->{proto},
$fd == D_TEMPFAIL ? 'TEMPFAIL' :
$fd == D_PASS ? 'PASS' : 'REJECT',
$msg);
}
}
if (!defined($msg) && $got_rcpt > $smtpd_recipient_limit) {
$msg = "452 4.5.3 Too many recipients";
}
if (!defined $msg) {
$msg = "250 2.1.5 Recipient $addr_smtp OK";
}
if ($msg =~ /^2/) {
my $recip_obj = Amavis::In::Message::PerRecip->new;
$recip_obj->recip_addr($addr);
$recip_obj->recip_addr_smtp($addr_smtp);
$recip_obj->recip_destiny(D_PASS); # default is Pass
$recip_obj->dsn_notify($notify) if defined $notify;
$recip_obj->dsn_orcpt($orcpt) if defined $orcpt;
push(@recips,$recip_obj);
}
$self->smtp_resp(0,$msg, !$msg_nopenalize && $msg=~/^5/ ? 1 : 0, $cmd);
last;
};
/^DATA\z/ && $args ne '' && do {
$self->smtp_resp(1,"501 5.5.4 Error: DATA does not accept arguments",
1,$cmd); #flush
last;
};
/^DATA\z/ && !@recips && do {
if (!defined($sender_unq)) {
$self->smtp_resp(1,"503 5.5.1 Need MAIL command before DATA",1,$cmd);
} elsif (!$got_rcpt) {
$self->smtp_resp(1,"503 5.5.1 Need RCPT command before DATA",1,$cmd);
} elsif ($lmtp) { # RFC 2033 requires 503 code!
$self->smtp_resp(1,"503 5.1.1 Error (DATA): no valid recipients",
0,$cmd); #flush!
} else {
$self->smtp_resp(1,"554 5.1.1 Error (DATA): no valid recipients",
0,$cmd); #flush!
}
last;
};
# /^DATA\z/ && uc($msginfo->body_type) eq "BINARYMIME" && do { # RFC 3030
# $self->smtp_resp(1,"503 5.5.1 DATA is incompatible with BINARYMIME",
# 0,$cmd); #flush!
# last;
# };
/^DATA\z/ && do {
# set timer to the initial value, MTA timer starts here
if ($message_size_limit) { # enforce system-wide size limit
if (!$max_recip_size_limit ||
$max_recip_size_limit > $message_size_limit) {
$max_recip_size_limit = $message_size_limit;
}
}
my $size = 0; my $oversized = 0; my $eval_stat; my $complete;
# preallocate some storage
my $out_str = ''; vec($out_str,65536,8) = 0; $out_str = '';
eval {
$msginfo->sender($sender_unq); $msginfo->sender_smtp($sender_quo);
$msginfo->per_recip_data(\@recips);
ll(1) && do_log(1, "%s %s:%s %s: %s -> %s%s Received: %s",
$conn->appl_proto,
!ref $inet_socket_bind && $conn->socket_ip eq $inet_socket_bind
? '' : '['.$conn->socket_ip.']',
$conn->socket_port, $self->{tempdir}->path,
$sender_quo,
join(',', map($_->recip_addr_smtp, @{$msginfo->per_recip_data})),
join('',
!defined $msginfo->msg_size ? () : # RFC 1870
' SIZE='.$msginfo->msg_size,
!defined $msginfo->body_type ? () : ' BODY='.$msginfo->body_type,
!$msginfo->smtputf8 ? () : ' SMTPUTF8',
!defined $msginfo->dsn_ret ? () : ' RET='.$msginfo->dsn_ret,
!defined $msginfo->dsn_envid ? () :
' ENVID='.xtext_decode($msginfo->dsn_envid),
!defined $msginfo->auth_submitter ||
$msginfo->auth_submitter eq '<>' ? () :
' AUTH='.$msginfo->auth_submitter,
),
make_received_header_field($msginfo,0) );
# pipelining checkpoint
$self->smtp_resp(1,"354 End data with <CR><LF>.<CR><LF>"); #flush!
$self->{within_data_transfer} = 1;
# data transferring state
$Amavis::zmq_obj->register_proc(2,0,'d',am_id()) if $Amavis::zmq_obj;
$Amavis::snmp_db->register_proc(2,0,'d',am_id()) if $Amavis::snmp_db;
section_time('SMTP pre-DATA-flush') if $self->{pipelining};
$self->{tempdir}->empty(0); # mark the mail file as non-empty
switch_to_client_time('receiving data');
my $fh = $self->{tempdir}->fh;
# the copy_smtp_data() will use syswrite, flush buffer just in case
if ($fh) { $fh->flush or die "Can't flush mail file: $!" }
if (!$max_recip_size_limit || $final_oversized_destiny_all_pass) {
# no message size limit enforced, faster
($size,$oversized) = $self->copy_smtp_data($fh, \$out_str, undef);
} else { # enforce size limit
do_log(5,"enforcing size limit %s during DATA",
$max_recip_size_limit);
($size,$oversized) = $self->copy_smtp_data($fh, \$out_str,
$max_recip_size_limit);
};
switch_to_my_time('rx data-end');
$complete = !$self->{within_data_transfer};
$eof = 1 if !$complete;
# normal data termination, eof on socket, timeout, fatal error
do_log(4, "%s< .<CR><LF>", $self->{proto}) if $complete;
if ($fh) {
$fh->flush or die "Can't flush mail file: $!";
# On some systems you have to do a seek whenever you
# switch between reading and writing. Among other things,
# this may have the effect of calling stdio's clearerr(3).
$fh->seek(0,1) or die "Can't seek on file: $!";
}
section_time('SMTP DATA');
1;
} or do { # end eval
$eval_stat = $@ ne '' ? $@ : "errno=$!";
};
if ( defined $eval_stat || !$complete || # err or connection broken
($oversized && !$final_oversized_destiny_all_pass) ) {
chomp $eval_stat if defined $eval_stat;
# on error, either send: '421 Shutting down',
# or: '451 Aborted, error in processing' and NOT shut down!
if ($oversized && !defined $eval_stat &&
!$self->{within_data_transfer}) {
my $msg = "552 5.3.4 Message size ($size B) exceeds size limit";
do_log(0, "%s REJECT: %s", $self->{proto},$msg);
$self->smtp_resp(1,$msg, 0,$cmd);
} elsif (!$self->{within_data_transfer}) {
my $msg = 'Error in processing: ' .
(defined $eval_stat ? $eval_stat
: !$complete ? 'incomplete' : '(no error?)');
do_log(-2, "%s TROUBLE: 451 4.5.0 %s", $self->{proto},$msg);
$self->smtp_resp(1,"451 4.5.0 $msg");
### $aborting = $msg;
} else {
$aborting = "Connection broken during data transfer" if $eof;
$aborting .= ', ' if $aborting ne '' && defined $eval_stat;
$aborting .= $eval_stat if defined $eval_stat;
$aborting .= " during waiting for input from client"
if defined $eval_stat && $eval_stat =~ /^timed out\b/
&& waiting_for_client();
$aborting = '???' if $aborting eq '';
do_log(defined $eval_stat ? -1 : 3,
"%s ABORTING: %s", $self->{proto}, $aborting);
}
} else { # all OK
# According to RFC 1047 it is not a good idea to do lengthy
# processing here, but we do not have much choice, amavis has no
# queuing mechanism and cannot accept responsibility for delivery.
#
# check contents before responding
# check_mail() expects an open file handle in $msginfo->mail_text,
# need not be rewound
$msginfo->mail_tempdir($self->{tempdir}->path);
$msginfo->mail_text_fn($self->{tempdir}->path . '/email.txt');
$msginfo->mail_text($self->{tempdir}->fh);
$msginfo->mail_text_str(\$out_str) if defined $out_str &&
$out_str ne '';
#
# RFC 1870: The message size is defined as the number of octets,
# including CR-LF pairs, but not counting the SMTP DATA command's
# terminating dot or doubled (stuffing) dots
my $declared_size = $msginfo->msg_size; # RFC 1870
if (!defined($declared_size)) {
do_log(5, "message size set to %s", $size);
} elsif ($size > $declared_size) { # shouldn't happen with decent MTA
do_log(4,"Actual message size %s B greater than the ".
"declared %s B", $size,$declared_size);
} elsif ($size < $declared_size) { # not unusual, but permitted
do_log(4,"Actual message size %d B less than the declared %d B",
$size,$declared_size);
}
$msginfo->msg_size(untaint($size)); # store actual RFC 1870 mail size
# some fatal errors are not catchable by eval (like exceeding virtual
# memory), but may still allow processing to continue in a DESTROY or
# END method; turn on trouble flag here to allow DESTROY to deal with
# such a case correctly, then clear the flag after content checking
# if everything turned out well
$self->{tempdir}->preserve(1);
my($smtp_resp, $exit_code, $preserve_evidence) =
&$check_mail($msginfo,$lmtp); # do all the contents checking
$self->{tempdir}->preserve(0) if !$preserve_evidence; # clear if ok
prolong_timer('check done');
if ($smtp_resp =~ /^4/) {
# ok, not-done recipients are to be expected, do not check
} elsif (grep(!$_->recip_done && $_->delivery_method ne '',
@{$msginfo->per_recip_data})) {
die "TROUBLE: (MISCONFIG?) not all recipients done";
} elsif (grep(!$_->recip_done && $_->delivery_method eq '',
@{$msginfo->per_recip_data})) {
die "NOT ALL RECIPIENTS DONE, EMPTY DELIVERY_METHOD!";
# do_log(0, "NOT ALL RECIPIENTS DONE, EMPTY DELIVERY_METHOD!");
}
section_time('SMTP pre-response');
if (!$lmtp) { # smtp
do_log(3, 'sending SMTP response: "%s"', $smtp_resp);
$self->smtp_resp(0, $smtp_resp);
} else { # lmtp
my $bounced = $msginfo->dsn_sent; # 1=bounced, 2=suppressed
for my $r (@{$msginfo->per_recip_data}) {
my $resp = $r->recip_smtp_response;
my $recip_quoted = $r->recip_addr_smtp;
if ($resp=~/^[24]/) {
# success or tempfail, no need to change status
} elsif ($bounced && $bounced == 1) { # genuine bounce
# a non-delivery notifications was already sent by us, so
# MTA must not bounce it again; turn status into a success
$resp = sprintf("250 2.5.0 Ok %s, DSN was sent (%s)",
$recip_quoted, $resp);
} elsif ($bounced) { # fake bounce - bounce was suppressed
$resp = sprintf("250 2.5.0 Ok %s, DSN suppressed (%s)",
$recip_quoted, $resp);
} elsif ($resp=~/^5/ && $r->recip_destiny != D_REJECT) {
# just in case, if the bounce suppression scheme did not work
$resp = sprintf("250 2.5.0 Ok %s, DSN suppressed_2 (%s)",
$recip_quoted, $resp);
}
do_log(3, 'LMTP response for %s: "%s"', $recip_quoted, $resp);
$self->smtp_resp(0, $resp);
}
}
$self->smtp_resp_flush; # optional, but nice to report timing right
section_time('SMTP response');
}; # end all OK
$self->{tempdir}->clean;
my $msg_size = $msginfo->msg_size;
my $sa_rusage = $msginfo->supplementary_info('RUSAGE-SA');
$sender_unq = $sender_quo = undef; @recips = (); $got_rcpt = 0;
undef $max_recip_size_limit; undef $msginfo; # forget previous
$final_oversized_destiny_all_pass = 1;
%xforward_args = ();
section_time('dump_captured_log') if log_capture_enabled();
dump_captured_log(1, c('enable_log_capture_dump'));
%current_policy_bank = %baseline_policy_bank; # restore bank settings
# report elapsed times by section for each transaction
# (the time for a QUIT remains unaccounted for)
if (ll(2)) {
my $am_rusage_report = Amavis::Timing::rusage_report();
my $am_timing_report = Amavis::Timing::report();
if ($sa_rusage && @$sa_rusage) {
local $1; my $sa_cpu_sum = 0; $sa_cpu_sum += $_ for @$sa_rusage;
$am_timing_report =~ # ugly hack
s{\bcpu ([0-9.]+) ms\]}
{sprintf("cpu %s ms, AM-cpu %.0f ms, SA-cpu %.0f ms]",
$1, $1 - $sa_cpu_sum*1000, $sa_cpu_sum*1000) }se;
}
do_log(2,"size: %d, %s", $msg_size, $am_timing_report);
do_log(2,"size: %d, RUSAGE %s", $msg_size, $am_rusage_report)
if defined $am_rusage_report;
}
Amavis::Timing::init(); snmp_counters_init();
$Amavis::last_task_completed_at = Time::HiRes::time;
last;
}; # DATA
/^(?:EXPN|TURN|ETRN|SEND|SOML|SAML)\z/ && do {
$self->smtp_resp(1,"502 5.5.1 Error: command $_ not implemented",
0,$cmd);
last;
};
# catchall (unknown commands): #flush!
$self->smtp_resp(1,"500 5.5.2 Error: command $_ not recognized", 1,$cmd);
}; # end of 'switch' block
if ($terminating || defined $aborting) { # exit SMTP-session loop
$voluntary_exit = 1; last;
}
# don't bother, just flush any responses regardless of pending input;
# this also keeps us on the safe side when a Postfix pre-queue setup
# turns HELO into EHLO sessions and smtpd_proxy_options=speed_adjust
# is not in use
$self->smtp_resp_flush;
#
# if ($self->{smtp_outbuf} && @{$self->{smtp_outbuf}} &&
# $self->{pipelining}) {
# # RFC 2920 requires a flush whenever a local TCP input buffer is emptied
# my $fd_sock = fileno($sock);
# my $rout; my $rin = ''; vec($rin,$fd_sock,1) = 1;
# my($nfound, $timeleft) = select($rout=$rin, undef, undef, 0);
# if (defined $nfound && $nfound > 0 && vec($rout, $fd_sock, 1)) {
# # input is available, do not bother flushing output yet
# do_log(2,"pipelining in effect, input available, flush delayed");
# } else {
# $self->smtp_resp_flush;
# }
# }
$0 = sprintf("%s (ch%d-%s-idle)",
c('myprogram_name'), $Amavis::child_invocation_count, am_id());
Amavis::Timing::go_idle(6);
} # end of loop
my($errn,$errs);
if (!$voluntary_exit) {
$eof = 1;
if (!defined($_)) {
$errn = 0+$!;
$errs = !$self->{ssl_active} ? "$!" : $sock->errstr.", $!";
}
}
# come here when: QUIT is received, eof or err on socket, or we need to abort
$0 = sprintf("%s (ch%d)",
c('myprogram_name'), $Amavis::child_invocation_count);
alarm(0); do_log(4,"SMTP session over, timer stopped");
Amavis::Timing::go_busy(7);
# flush just in case, session might have been disconnected
eval {
$self->smtp_resp_flush; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(1, "flush failed: %s", $eval_stat);
};
my $msg =
defined $aborting && !$eof ? "ABORTING the session: $aborting" :
defined $aborting ? $aborting :
!$terminating ? "client broke the connection without a QUIT ($errs)" : '';
if ($msg eq '') {
# ok
} elsif ($aborting) {
do_log(-1, "%s: NOTICE: %s", $self->{proto},$msg);
} else {
do_log( 3, "%s: notice: %s", $self->{proto},$msg);
}
if (defined $aborting && !$eof)
{ $self->smtp_resp(1,"421 4.3.2 Service shutting down, ".$aborting) }
$self->{session_closed_normally} = 1;
# Net::Server closes connection after child_finish_hook
}
# sends an SMTP response consisting of a 3-digit code and an optional message;
# slow down evil clients by delaying response on permanent errors
#
sub smtp_resp($$$;$$) {
my($self, $flush,$resp, $penalize,$line) = @_;
if ($penalize) { # PENALIZE syntax errors?
do_log(0, "%s: %s; smtp_resp: %s", $self->{proto},$resp,$line);
# sleep 1;
# section_time('SMTP penalty wait');
}
push(@{$self->{smtp_outbuf}}, @{wrap_smtp_resp(sanitize_str($resp,1))});
$self->smtp_resp_flush if $flush || !$self->{pipelining} ||
@{$self->{smtp_outbuf}} > 200;
}
sub smtp_resp_flush($) {
my $self = $_[0];
my $outbuf_ref = $self->{smtp_outbuf};
if ($outbuf_ref && @$outbuf_ref) {
if (ll(4)) { do_log(4, "%s> %s", $self->{proto}, $_) for @$outbuf_ref }
my $sock = $self->{sock};
my $stat = $sock->print(join('', map($_."\015\012", @$outbuf_ref)));
@$outbuf_ref = (); # prevent printing again even if error
$stat or die "Error writing an SMTP response to the socket: ".
(!$self->{ssl_active} ? $! : $sock->errstr.", $!");
$sock->flush or die "Error flushing an SMTP response to the socket: ".
(!$self->{ssl_active} ? $! : $sock->errstr.", $!");
# put a ball in client's courtyard, start his timer
switch_to_client_time('smtp response sent');
}
}
1;
__DATA__
#
package Amavis::In::Courier;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN { die "Code not available for module Amavis::In::Courier" }
1;
__DATA__
#
package Amavis::Out::SMTP::Protocol;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform);
import Amavis::Util qw(ll do_log min max minmax);
}
use Errno qw(EIO EINTR EAGAIN ECONNRESET);
use Encode ();
use Time::HiRes ();
sub init {
my $self = $_[0];
delete $self->{domain}; delete $self->{supports};
$self->{pipelining} = 0;
}
sub new {
my($class,$socket_specs,%arg) = @_;
my $self = bless {}, $class;
$self->{at_line_boundary} = 1;
$self->{dotstuffing} = 1; # defaults to on
$self->{dotstuffing} = 0 if defined $arg{DotStuffing} && !$arg{DotStuffing};
$self->{strip_cr} = 1; # sanitizing bare CR enabled by default
$self->{strip_cr} = 0 if defined $arg{StripCR} && !$arg{StripCR};
$self->{sanitize_nul} = 1; # sanitizing NUL bytes enabled by default
$self->{sanitize_nul} = 0 if defined $arg{SanitizeNUL} && !$arg{SanitizeNUL};
$self->{null_cnt} = 0;
$self->{io} = Amavis::IO::RW->new($socket_specs, Eol => "\015\012", %arg);
$self->init;
$self;
}
sub close {
my $self = $_[0];
$self->{io}->close;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
eval { $self->close } or 1; # ignore failure, make perlcritic happy
}
sub ehlo_response_parse {
my($self,$smtp_resp) = @_;
delete $self->{domain}; delete $self->{supports};
my(@ehlo_lines) = split(/\n/,$smtp_resp,-1);
my $bad; my $first = 1; local($1,$2);
for my $el (@ehlo_lines) {
if ($first) {
if ($el =~ /^(\d{3})(?:[ \t]+(.*))?\z/s) { $self->{domain} = $2 }
elsif (!defined($bad)) { $bad = $el }
$first = 0;
} elsif ($el =~ /^([A-Z0-9][A-Z0-9-]*)(?:[ =](.*))?\z/si) {
$self->{supports}{uc($1)} = defined $2 ? $2 : '';
} elsif ($el =~ /^[ \t]*\z/s) {
# don't bother (e.g. smtp-sink)
} elsif (!defined($bad)) {
$bad = $el;
}
}
$self->{pipelining} = defined $self->{supports}{'PIPELINING'} ? 1 : 0;
do_log(0, "Bad EHLO kw %s ignored in %s, socket %s",
$bad, $smtp_resp, $self->socketname) if defined $bad;
1;
}
sub domain
{ my $self = $_[0]; $self->{domain} }
sub supports
{ my($self,$keyword) = @_; $self->{supports}{uc($keyword)} }
*print = \&datasend; # alias name for datasend
sub datasend {
my $self = shift;
my $buff = @_ == 1 ? $_[0] : join('',@_);
do_log(-1,"WARN: Unicode string passed to datasend: %s", $buff)
if utf8::is_utf8($buff); # always false on tainted, Perl 5.8 bug #32687
# ll(5) && do_log(5, 'smtp print %d bytes>', length($buff));
$buff =~ tr/\015//d if $self->{strip_cr}; # sanitize bare CR if necessary
if ($self->{sanitize_nul}) {
my $cnt = $buff =~ tr/\x00//; # quick triage
if ($cnt) {
# this will break DKIM signatures, but IMAP (cyrus) hates NULs in mail
$self->{null_cnt} += $cnt;
$buff =~ s{\x00}{\xC0\x80}gs; # turn to "Modified UTF-8" encoding of NUL
}
}
# CR/LF are never split across a buffer boundary
$buff =~ s{\n}{\015\012}gs; # quite fast, but still a bottleneck
if ($self->{dotstuffing}) {
$buff =~ s{\015\012\.}{\015\012..}gs; # dot stuffing
$self->{io}->print('.') if substr($buff,0,1) eq '.' &&
$self->{at_line_boundary};
}
$self->{io}->print($buff);
$self->{at_line_boundary} = $self->{io}->at_line_boundary;
$self->{io}->out_buff_large ? $self->flush : 1;
}
sub socketname
{ my $self = shift; $self->{io}->socketname(@_) }
sub protocol
{ my $self = shift; $self->{io}->protocol(@_) }
sub timeout
{ my $self = shift; $self->{io}->timeout(@_) }
sub ssl_active
{ my $self = shift; $self->{io}->ssl_active(@_) }
sub ssl_upgrade
{ my $self = shift; $self->{io}->ssl_upgrade(@_) }
sub last_io_event_timestamp
{ my $self = shift; $self->{io}->last_io_event_timestamp(@_) }
sub last_io_event_tx_timestamp
{ my $self = shift; $self->{io}->last_io_event_tx_timestamp(@_) }
sub eof
{ my $self = shift; $self->{io}->eof(@_) }
sub flush
{ my $self = shift; $self->{io}->flush(@_) }
sub dataend {
my $self = $_[0];
if (!$self->{at_line_boundary}) {
$self->datasend("\n");
}
if ($self->{dotstuffing}) {
$self->{dotstuffing} = 0;
$self->datasend(".\n");
$self->{dotstuffing} = 1;
}
if ($self->{null_cnt}) {
do_log(0, 'smtp forwarding: SANITIZED %d NULL byte(s)', $self->{null_cnt});
$self->{null_cnt} = 0;
}
$self->{io}->out_buff_large ? $self->flush : 1;
}
sub command {
my($self,$command,@args) = @_;
my $line = $command =~ /:\z/ ? $command.join(' ',@args)
: join(' ',$command,@args);
ll(3) && do_log(3, 'smtp cmd> %s', $line);
$self->datasend($line."\n"); $self->{at_line_boundary} = 1;
# RFC 2920: commands that can appear anywhere in a pipelined command group
# RSET, MAIL FROM, SEND FROM, SOML FROM, SAML FROM, RCPT TO, (data)
if (!$self->{pipelining} || $self->{io}->out_buff_large ||
$command !~ /^(?:RSET|MAIL|SEND|SOML|SAML|RCPT)\b/is) {
return $self->flush;
}
1;
}
sub smtp_response {
my $self = $_[0];
my $resp = ''; my($line,$code,$enh); my $first = 1;
for (;;) {
$line = $self->{io}->get_response_line;
last if !defined $line; # eof, error, timeout
my $line_complete = $line =~ s/\015\012\z//s;
$line .= ' INCOMPLETE' if !$line_complete;
my $more; local($1,$2,$3);
$line =~ s/^(\d{3}) (-|\ |\z)
(?: ([245] \. \d{1,3} \. \d{1,3}) (\ |\z) )?//xs;
if ($first) { $code = $1; $enh = $3; $first = 0 } else { $resp .= "\n" }
$resp .= $line; $more = $2 eq '-';
last if !$more || !$line_complete;
}
!defined $code ? undef : $code . (defined $enh ? " $enh" : '') . ' '. $resp;
}
sub helo { my $self = shift; $self->init; $self->command("HELO",@_) }
sub ehlo { my $self = shift; $self->init; $self->command("EHLO",@_) }
sub lhlo { my $self = shift; $self->init; $self->command("LHLO",@_) }
sub noop { my $self = shift; $self->command("NOOP",@_) }
sub rset { my $self = shift; $self->command("RSET",@_) }
sub auth { my $self = shift; $self->command("AUTH",@_) }
sub data { my $self = shift; $self->command("DATA",@_) }
sub quit { my $self = shift; $self->command("QUIT",@_) }
sub mail {
my($self,$reverse_path,%params) = @_;
my(@mail_parameters) =
map { my $v = $params{$_}; defined($v) ? "$_=$v" : "$_" } (keys %params);
$self->command("MAIL FROM:", $reverse_path, @mail_parameters);
}
sub recipient {
my($self,$forward_path,%params) = @_;
my(@rcpt_parameters) =
map { my $v = $params{$_}; defined($v) ? "$_=$v" : "$_" } (keys %params);
$self->command("RCPT TO:", $forward_path, @rcpt_parameters);
}
1;
package Amavis::Out::SMTP::Session;
# provides a mechanism for SMTP session caching
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&rundown_stale_sessions);
import Amavis::Conf qw(:platform c cr ca $smtp_connection_cache_enable
%smtp_tls_client_options);
import Amavis::Util qw(min max minmax ll do_log snmp_count idn_to_ascii);
}
use subs @EXPORT_OK;
use vars qw(%sessions_cache);
use Time::HiRes qw(time);
sub new {
my($class, $socket_specs, $deadline,
$wildcard_implied_host, $wildcard_implied_port) = @_;
my $self; my $cache_key; my $found_cached = 0;
for my $proto_sockname (ref $socket_specs ? @$socket_specs : $socket_specs) {
$cache_key = $proto_sockname;
local($1,$2,$3,$4);
if ($proto_sockname =~ # deal with dynamic destinations (wildcards)
/^([a-z][a-z0-9.+-]*) : (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*)/xsi) {
my $peeraddress = defined $2 ? $2 : $3; my $peerport = $4;
$peeraddress = $wildcard_implied_host if $peeraddress eq '*';
$peerport = $wildcard_implied_port if $peerport eq '*';
$cache_key = sprintf("%s:[%s]:%s", $1, $peeraddress, $peerport);
}
if (exists $sessions_cache{$cache_key}) { $found_cached = 1; last }
}
if ($found_cached) {
$self = $sessions_cache{$cache_key};
$self->{deadline} = $deadline;
do_log(3, "smtp session reuse (%s), %d transactions so far",
$cache_key, $self->{transaction_count});
} else {
do_log(3, "smtp session: setting up a new session");
$cache_key = undef;
$self = bless {
socket_specs => $socket_specs,
socketname => undef, protocol => undef, smtp_handle => undef,
deadline => $deadline, timeout => undef, in_xactn => 0,
transaction_count => 0, state => 'down', established_at_time => undef,
wildcard_implied_host => $wildcard_implied_host,
wildcard_implied_port => $wildcard_implied_port,
}, $class;
}
$self->establish_or_refresh;
if (!defined $cache_key) { # newly established session
$cache_key = sprintf("%s:%s", $self->protocol, $self->socketname);
$sessions_cache{$cache_key} = $self;
}
$self;
}
sub smtp_handle
{ @_<2 ? $_[0]->{handle} : ($_[0]->{handle} = $_[1]) }
sub socketname
{ @_<2 ? shift->{socketname} : ($_[0]->{socketname} = $_[1]) }
sub protocol
{ @_<2 ? shift->{protocol} : ($_[0]->{protocol} = $_[1]) }
sub session_state
{ @_<2 ? shift->{state} : ($_[0]->{state} = $_[1]) }
sub in_smtp_transaction
{ @_<2 ? shift->{in_xactn} : ($_[0]->{in_xactn} = $_[1]) }
sub established_at_time
{ @_<2 ? shift->{established_at_time} : ($_[0]->{established_at_time}=$_[1])}
sub transaction_begins {
my $self = $_[0];
!$self->in_smtp_transaction
or die "smtp session: transaction_begins, but already active";
$self->in_smtp_transaction(1);
}
sub transaction_begins_unconfirmed {
my $self = $_[0];
snmp_count('OutConnTransact'); $self->{transaction_count}++;
!$self->in_smtp_transaction
or die "smtp session: transaction_begins_unconfirmed, but already active";
$self->in_smtp_transaction(undef);
}
sub transaction_ends {
my $self = $_[0];
$self->in_smtp_transaction(0);
}
sub transaction_ends_unconfirmed {
my $self = $_[0];
# if already 0 then keep it, otherwise undefine
$self->in_smtp_transaction(undef) if $self->in_smtp_transaction;
}
sub timeout {
my $self = shift;
if (@_) {
my $timeout = shift;
$self->{timeout} = $timeout;
$self->{handle}->timeout($timeout) if defined $self->{handle};
# do_log(5, "smtp session, timeout set to %s", $timeout);
}
$self->{timeout};
}
sub supports {
my($self,$keyword) = @_;
$self->{handle} ? $self->{handle}->supports($keyword) : undef;
}
sub smtp_response {
my $self = $_[0];
$self->{handle} ? $self->{handle}->smtp_response : undef;
}
sub quit {
my $self = $_[0];
my $smtp_handle = $self->smtp_handle;
if (defined $smtp_handle) {
$self->session_state('quitsent');
snmp_count('OutConnQuit');
$smtp_handle->quit; #flush! QUIT
}
}
sub close {
my($self,$keep_connected) = @_;
my $msg; my $smtp_handle = $self->smtp_handle;
if (defined($smtp_handle) && $smtp_handle->eof) {
$msg = 'already disconnected'; $keep_connected = 0;
} else {
$msg = $keep_connected ? 'keeping connection' : 'disconnecting';
}
do_log(3, "Amavis::Out::SMTP::Session close, %s", $msg);
if (!$keep_connected) {
if (defined $smtp_handle) {
$smtp_handle->close
or do_log(1, "Error closing Amavis::Out::SMTP::Protocol obj");
$self->in_smtp_transaction(0); $self->established_at_time(undef);
$self->smtp_handle(undef); $self->session_state('down');
}
if (defined $self->socketname) {
my $cache_key = sprintf("%s:%s", $self->protocol, $self->socketname);
delete $sessions_cache{$cache_key} if exists $sessions_cache{$cache_key};
}
}
1;
}
sub rundown_stale_sessions($) {
my $close_all = $_[0];
my $num_sessions_closed = 0;
for my $cache_key (keys %sessions_cache) {
my $smtp_session = $sessions_cache{$cache_key};
my $smtp_handle = $smtp_session->smtp_handle;
my $established_at_time = $smtp_session->established_at_time;
my $last_event_time;
$last_event_time = $smtp_handle->last_io_event_timestamp if $smtp_handle;
my $now = Time::HiRes::time;
if ($close_all || !$smtp_connection_cache_enable ||
!defined($last_event_time) || $now - $last_event_time >= 30 ||
!defined($established_at_time) || $now - $established_at_time >= 60) {
ll(3) && do_log(3,"smtp session rundown%s%s%s, %s, state %s",
$close_all ? ' all sessions'
: $smtp_connection_cache_enable ? ' stale sessions'
: ', cache off',
!defined($last_event_time) ? ''
: sprintf(", idle %.1f s", $now - $last_event_time),
!defined($established_at_time) ? ''
: sprintf(", since %.1f s ago",
$now - $established_at_time),
$cache_key, $smtp_session->session_state);
if ($smtp_session->session_state ne 'down' &&
$smtp_session->session_state ne 'quitsent' &&
(!defined($last_event_time) || $now - $last_event_time <= 55)) {
do_log(3,"smtp session rundown, sending QUIT");
eval { $smtp_session->quit } or 1; #flush! QUIT (ignoring failures)
}
if ($smtp_session->session_state eq 'quitsent') { # collect response
$smtp_session->timeout(5);
my $smtp_resp = eval { $smtp_session->smtp_response };
if (!defined $smtp_resp) {
do_log(3,"No SMTP resp. to QUIT");
} elsif ($smtp_resp eq '') {
do_log(3,"Empty SMTP resp. to QUIT");
} elsif ($smtp_resp !~ /^2/) {
do_log(3,"Negative SMTP resp. to QUIT: %s", $smtp_resp);
} else { # success, $smtp_resp =~ /^2/
do_log(3,"smtp resp to QUIT: %s", $smtp_resp);
}
}
if ($smtp_session->session_state ne 'down') {
do_log(3,"smtp session rundown, closing session %s", $cache_key);
$smtp_session->close(0)
or do_log(-2, "Error closing smtp session %s", $cache_key);
$num_sessions_closed++;
}
}
}
$num_sessions_closed;
}
sub establish_or_refresh {
my $self = $_[0];
# Timeout should be more than MTA normally takes to check DNS and RBL,
# which may take a minute or more in case of unreachable DNS server.
# Specifying shorter timeout will cause alarm to terminate the wait
# for SMTP status line prematurely, resulting in status code 000.
# RFC 5321 (ex RFC 2821) section 4.5.3.2 requires timeout to be
# at least 5 minutes
my $smtp_connect_timeout = 35; # seconds
my $smtp_helo_timeout = 300;
my $smtp_starttls_timeout = 300;
my $smtp_handle = $self->smtp_handle;
my $smtp_resp; my $last_event_time;
$last_event_time = $smtp_handle->last_io_event_timestamp if $smtp_handle;
my $now = Time::HiRes::time;
do_log(5,"establish_or_refresh, state: %s", $self->session_state);
die "panic, still in SMTP transaction" if $self->in_smtp_transaction;
if (defined($smtp_handle) &&
$self->session_state ne 'down' && $self->session_state ne 'quitsent') {
# if session has been idling for some time, check with a low-cost NOOP
# whether the session is still alive - reconnecting at this time is cheap;
# note that NOOP is non-pipelinable, MTA must respond immediately
if (defined($last_event_time) && $now - $last_event_time <= 18) {
snmp_count('OutConnReuseRecent');
do_log(3,"smtp session most likely still valid (short idle %.1f s)",
$now - $last_event_time);
} else { # Postfix default smtpd idle timeout is 60 s
eval {
$self->timeout(15);
$smtp_handle->noop; #flush!
$smtp_resp = $self->smtp_response; # fetch response to NOOP
do_log(3,"smtp resp to NOOP (idle %.1f s): %s",
$now - $last_event_time, $smtp_resp);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(3,"smtp NOOP failed (idle %.1f s): %s",
$now - $last_event_time, $eval_stat);
$smtp_resp = '';
};
if ($smtp_resp =~ /^2/) {
snmp_count('OutConnReuseRefreshed');
} else {
snmp_count('OutConnReuseFail');
$self->close(0) or do_log(-1, "Error closing smtp session");
}
}
}
if ($self->session_state eq 'down' || $self->session_state eq 'quitsent') {
if (defined $smtp_handle) {
$smtp_handle->close
or do_log(-2, "Error closing Amavis::Out::SMTP::Protocol obj");
undef $smtp_handle;
}
my $localaddr = c('local_client_bind_address'); # IP assigned to socket
snmp_count('OutConnNew');
$smtp_handle = Amavis::Out::SMTP::Protocol->new(
$self->{socket_specs}, LocalAddr => $localaddr, Timeout => 35,
WildcardImpliedHost => $self->{wildcard_implied_host},
WildcardImpliedPort => $self->{wildcard_implied_port});
$self->smtp_handle($smtp_handle);
defined $smtp_handle # don't change die text, it is referred to elsewhere
or die sprintf("Can't connect to %s",
!ref $self->{socket_specs} ? $self->{socket_specs}
: join(", ",@$self->{socket_specs}) );
$self->socketname($smtp_handle->socketname);
$self->protocol($smtp_handle->protocol);
$self->session_state('connected');
$self->established_at_time(time);
$self->timeout($smtp_connect_timeout);
$smtp_resp = $self->smtp_response; # fetch greeting
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s greeting, dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp !~ /^2/) {
die "Negative greeting: $smtp_resp\n";
} else { # success, $smtp_resp =~ /^2/
do_log(3,"smtp greeting: %s, dt: %.1f ms", $smtp_resp,
1000*(time-$smtp_handle->last_io_event_tx_timestamp));
}
}
if ($self->session_state eq 'connected') {
my $lmtp = lc($self->protocol) eq 'lmtp' ? 1 : 0; # RFC 2033
my $deadline = $self->{deadline};
my $tls_security_level = c('tls_security_level_out');
$tls_security_level = 0 if !defined($tls_security_level) ||
lc($tls_security_level) eq 'none';
my $myheloname = c('localhost_name'); # host name used in EHLO/HELO/LHLO
$myheloname = 'localhost' if $myheloname eq '';
$myheloname = idn_to_ascii($myheloname);
for (1..2) {
# send EHLO/LHLO/HELO
$self->timeout(max(60,min($smtp_helo_timeout,
$deadline - time)));
if ($lmtp) { $smtp_handle->lhlo($myheloname) } #flush!
else { $smtp_handle->ehlo($myheloname) } #flush!
$smtp_resp = $self->smtp_response; # fetch response to EHLO/LHLO
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to %s, dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty',
$lmtp ? 'LHLO' : 'EHLO',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp =~ /^2/) { # success
do_log(3,"smtp resp to %s: %s", $lmtp?'LHLO':'EHLO', $smtp_resp);
} elsif ($lmtp) { # failure, no fallback possible
die "Negative SMTP resp. to LHLO: $smtp_resp\n";
} else { # failure, SMTP fallback to HELO
do_log(3,"Negative SMTP resp. to EHLO, will try HELO: %s", $smtp_resp);
$smtp_handle->helo($myheloname); #flush!
$smtp_resp = $self->smtp_response; # fetch response to HELO
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to HELO, dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp !~ /^2/) {
die "Negative response to HELO: $smtp_resp\n";
} else { # success, $smtp_resp =~ /^2/
do_log(3,"smtp resp to HELO: %s", $smtp_resp);
}
}
$self->session_state('ehlo');
$smtp_handle->ehlo_response_parse($smtp_resp);
my $tls_capable = defined $self->supports('STARTTLS'); # RFC 3207
ll(5) && do_log(5, "tls active=%d, capable=%s, sec_level=%s",
$smtp_handle->ssl_active, $tls_capable, $tls_security_level);
if ($smtp_handle->ssl_active) {
last; # done
} elsif (!$tls_capable &&
$tls_security_level && lc($tls_security_level) ne 'may') {
die "MTA does not offer STARTTLS, ".
"but TLS is required: \"$tls_security_level\"";
} elsif (!$tls_capable || !$tls_security_level) {
last; # not offered and not mandated
} else {
$self->timeout(max(60,min($smtp_starttls_timeout,
$deadline - time)));
$smtp_handle->command('STARTTLS'); #flush!
$smtp_resp = $self->smtp_response; # fetch response to STARTTLS
$smtp_resp = '' if !defined $smtp_resp;
do_log(3,"smtp resp to STARTTLS: %s", $smtp_resp);
if ($smtp_resp !~ /^2/) {
(!$tls_security_level || lc($tls_security_level) eq 'may')
or die "Negative SMTP resp. to STARTTLS: $smtp_resp\n";
} else {
$smtp_handle->ssl_upgrade(%smtp_tls_client_options)
or die "Error upgrading socket to SSL";
$self->session_state('connected');
}
}
}
}
$self;
}
1;
package Amavis::Out::SMTP;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(&mail_via_smtp);
import Amavis::Conf qw(:platform c cr ca $smtp_connection_cache_enable);
import Amavis::Util qw(untaint min max minmax ll do_log snmp_count
xtext_encode xtext_decode orcpt_encode orcpt_decode
idn_to_ascii mail_addr_idn_to_ascii
prolong_timer get_deadline
collect_equal_delivery_recips);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Out::EditHeader;
}
use Time::HiRes qw(time);
use Encode ();
# use Authen::SASL;
# simple OO wrapper around Mail::DKIM::Signer to provide a method 'print'
# and to convert \n to CRLF
#
sub new_dkim_wrapper {
my($class, $handle,$strip_cr) = @_;
bless { handle => $handle, strip_cr => $strip_cr }, $class;
}
sub close { 1 }
sub print {
my $self = shift;
my $buff = @_ == 1 ? $_[0] : join('',@_);
do_log(-1,"WARN: Unicode string passed to Amavis::Out::SMTP::print : %s",
$buff) if utf8::is_utf8($buff); # false on tainted, Perl 5.8 bug #32687
$buff =~ tr/\015//d if $self->{strip_cr}; # sanitize bare CR
$buff =~ s{\n}{\015\012}gs;
$self->{handle}->PRINT($buff);
}
# Add a log_id to the SMTP status text, insert a fabricated RFC 3463 enhanced
# status code if missing in an MTA response, see also RFC 5248
#
sub enhance_smtp_response($$$$$) {
my($smtp_resp,$am_id,$mta_id,$dflt_enhcode,$cmd_name) = @_;
local($1,$2,$3,$4); my $resp_msg;
my($resp_code,$resp_more,$resp_enhcode) = ('451', ' ', '4.5.0');
if (!defined($smtp_resp) || $smtp_resp eq '') {
$smtp_resp = sprintf('No resp. to %s', $cmd_name);
} elsif ($smtp_resp !~ /^[245]\d{2}/) {
$smtp_resp = sprintf('Bad resp. to %s: %s', $cmd_name,$smtp_resp);
} elsif ($smtp_resp =~ /^ (\d{3}) (\ |-|\z) [ \t]*
([245] \. \d{1,3} \. \d{1,3})?
\s* (.*) \z/xs) {
($resp_code, $resp_more, $resp_enhcode, $resp_msg) = ($1, $2, $3, $4);
if (!defined $resp_enhcode && $resp_code =~ /^[245]/) {
my $c = substr($resp_code,0,1);
$resp_enhcode = $dflt_enhcode; $resp_enhcode =~ s/^\d*/$c/;
}
}
sprintf("%s%s%s from MTA(%s): %s",
$resp_code, $resp_more, $resp_enhcode, $mta_id, $smtp_resp);
}
# Send mail using SMTP - single transaction
# (e.g. forwarding original mail or sending notification)
# May throw exception (die) if temporary failure (4xx) or other problem
#
# Multiple transactions may be necessary, either due to different delivery
# methods (IP address, port, SMTP vs. LMTP) or due to '452 Too many recipients'
#
sub mail_via_smtp(@) {
my($msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
#
# RFC 2033: LMTP protocol MUST NOT be used on the TCP port 25
#
# $initial_submission can be treated as a boolean, but for more detailed
# needs it can be any of: false: 0
# or true: 'Quar', 'Dsn', 'Notif', 'AV', 'Arf'
my $which_section = 'fwd_init';
my $id = $msginfo->parent_mail_id;
$id = $msginfo->mail_id . (defined $id ? "($id)" : "");
my $sender_smtp = $msginfo->sender_smtp;
my $logmsg = sprintf("%s %s", $id, $initial_submission?'SEND':'FWD');
my($per_recip_data_ref, $proto_sockname) =
collect_equal_delivery_recips($msginfo, $filter, qr/^(?:smtp|lmtp):/i);
if (!$per_recip_data_ref || !@$per_recip_data_ref) {
do_log(5, "%s from %s, nothing to do", $logmsg, $sender_smtp);
return 1;
}
my $proto_sockname_displ = !ref $proto_sockname ? $proto_sockname
: '(' . join(', ',@$proto_sockname) . ')';
my(@per_recip_data) = @$per_recip_data_ref; undef $per_recip_data_ref;
ll(4) && do_log(4, "about to connect to %s, %s from %s -> %s",
$proto_sockname_displ, $logmsg, $sender_smtp,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @per_recip_data)) ));
my $am_id = $msginfo->log_id;
my $dsn_envid = $msginfo->dsn_envid;
my $dsn_ret = $msginfo->dsn_ret;
my $smtputf8 = $msginfo->smtputf8; # SMTPUTF8 requested
my $smtputf8_capable; # SMTPUTF8 offered by MTA, RFC 6531
my($relayhost, $protocol, $lmtp, $mta_id, @snmp_vars);
my($smtp_session, $smtp_handle, $smtp_resp, $smtp_response);
my($any_valid_recips, $any_tempfail_recips, $pipelining,
$any_valid_recips_and_data_sent, $recips_done_by_early_fail,
$in_datasend_mode, $dsn_capable, $auth_capable) = (0) x 8;
my $mimetransport8bit_capable = 0; # RFC 6152
my(%from_options);
# RFC 5321 (ex RFC 2821), section 4.5.3.2. Timeouts
my $smtp_connect_timeout = 35;
my $smtp_helo_timeout = 300;
my $smtp_starttls_timeout = 300;
my $smtp_xforward_timeout = 300;
my $smtp_mail_timeout = 300;
my $smtp_rcpt_timeout = 300;
my $smtp_data_init_timeout = 120;
my $smtp_data_xfer_timeout = 180;
my $smtp_data_done_timeout = 600;
my $smtp_quit_timeout = 10; # 300
my $smtp_rset_timeout = 20;
# can appear anywhere in a pipelined command group:
# RSET, MAIL FROM, SEND FROM, SOML FROM, SAML FROM, RCPT TO, data
# can only appear as the last command in a pipelined group: --> flush
# EHLO, DATA, VRFY, EXPN, TURN, QUIT, NOOP,
# AUTH(RFC 4954), STARTTLS(RFC 3207), and all unknown commands
# needed to implement dynamic_destination: a '*' in place of a host or port
my($wildcard_implied_host, $wildcard_implied_port);
my $conn = $msginfo->conn_obj;
if ($conn) {
my $host = $conn->client_ip;
$wildcard_implied_host = $host if defined($host) && $host ne '';
my $port = $conn->socket_port;
$wildcard_implied_port = $port+1 if defined($port) && $port =~ /^\d+\z/;
}
my($remaining_time, $deadline) = get_deadline($which_section, 1, 0);
alarm(0); # stop the timer
my $err;
eval {
$which_section = 'fwd-connect';
$smtp_session = Amavis::Out::SMTP::Session->new($proto_sockname, $deadline,
$wildcard_implied_host, $wildcard_implied_port)
or die "Can't establish an SMTP/LMTP session with $proto_sockname_displ";
$smtp_handle = $smtp_session->smtp_handle;
if ($smtp_handle) {
$relayhost = $smtp_handle->socketname;
$protocol = $smtp_handle->protocol;
$lmtp = lc($protocol) eq 'lmtp' ? 1 : 0; # RFC 2033
$mta_id = sprintf("%s:%s", $protocol, $relayhost);
@snmp_vars = !$initial_submission ?
('', 'Relay', 'Proto'.uc($protocol), 'Proto'.uc($protocol).'Relay')
: ('', 'Submit', 'Proto'.uc($protocol), 'Proto'.uc($protocol).'Submit',
'Submit'.$initial_submission);
snmp_count('OutMsgs'.$_) for @snmp_vars;
}
$dsn_capable = c('propagate_dsn_if_possible') &&
defined($smtp_session->supports('DSN')); # RFC 3461
$mimetransport8bit_capable = # 8bit-MIMEtransport service extension
defined($smtp_session->supports('8BITMIME')); # RFC 6152
$smtputf8_capable = # "Internationalized Email" service extension
$mimetransport8bit_capable &&
defined($smtp_session->supports('SMTPUTF8')); # RFC 6531
$pipelining = defined($smtp_session->supports('PIPELINING')); # RFC 2920
do_log(3,"No announced PIPELINING support by MTA?") if !$pipelining;
ll(5) && do_log(5,"Remote host presents itself as: %s, handles %s",
$smtp_handle->domain,
join(', ', $dsn_capable ? 'DSN' : (),
$pipelining ? 'PIPELINING' : (),
$mimetransport8bit_capable ? '8BITMIME' : (),
$smtputf8_capable ? 'SMTPUTF8' : () ) );
if ($lmtp && !$pipelining) { # RFC 2033 requirements
die "An LMTP server implementation MUST implement PIPELINING";
}
if ($lmtp && !defined($smtp_session->supports('ENHANCEDSTATUSCODES'))) {
die "An LMTP server implementation MUST implement ENHANCEDSTATUSCODES";
}
if (!$smtputf8_capable || !$smtputf8) {
# if SMTPUTF8 is not requested or if MTA is unable to handle
# IDN with U-labels, and local part is all-ASCII, then we may
# still get this delivered by converting a domain name
# to ASCII-compatible encoding (ACE)
if ($sender_smtp =~ /^ [\x00-\x7F]* \@ [^\@]* [^\x00-\x7F] [^\@]*\z/xs) {
# localpart all-ASCII, domain is non-ASCII
my $idn_ascii = mail_addr_idn_to_ascii($sender_smtp);
do_log(2,'sender IDN encoded to ACE: %s -> %s',
$sender_smtp, $idn_ascii);
$sender_smtp = $idn_ascii;
}
for my $r (@per_recip_data) {
next if $r->recip_done;
my $rcpt_addr = $r->recip_final_addr;
if ($rcpt_addr =~ /^ [\x00-\x7F]* \@ [^\@]* [^\x00-\x7F] [^\@]*\z/xs) {
my $idn_ascii = mail_addr_idn_to_ascii($rcpt_addr);
do_log(2,'recipient IDN encoded to ACE: %s -> %s',
$rcpt_addr, $idn_ascii);
$rcpt_addr = $idn_ascii;
$r->dsn_orcpt(join(';', orcpt_decode(';'.$r->recip_addr_smtp)))
if !defined $r->dsn_orcpt;
# N.B.: change recip_addr_modified(), not recip_final_addr() !
$r->recip_addr_modified($rcpt_addr);
}
}
}
if ($smtputf8) { # SMTPUTF8 handling was requested, RFC 6531
#
# RFC 6531 section 3.4: If the SMTPUTF8-aware SMTP client is aware
# that neither the envelope nor the message being sent requires any
# of the SMTPUTF8 extension capabilities, it SHOULD NOT supply the
# SMTPUTF8 parameter with the MAIL command.
#
my($sender_8bit, $recips_8bit);
$sender_8bit = 1 if $msginfo->sender_smtp =~ tr/\x00-\x7F//c;
for my $r (@per_recip_data) {
next if $r->recip_done;
$recips_8bit = 1 if $r->recip_final_addr =~ tr/\x00-\x7F//c;
}
if (!ll(5)) {
# don't bother, just logging
} elsif ($sender_8bit || $recips_8bit || $msginfo->header_8bit) {
do_log(5,'SMTPUTF8 option requested and is needed, %s is non-ASCII',
join(' & ', $sender_8bit ? 'sender' : (),
$recips_8bit ? 'recip' : (),
$msginfo->header_8bit ? 'header' : () ));
} else {
do_log(5,'SMTPUTF8 option requested but not needed');
}
if (!$smtputf8_capable) {
# RFC 6531 sect 3.5: An SMTPUTF8-aware SMTP client MUST NOT send
# an internationalized message to an SMTP server that does not
# support SMTPUTF8.
# 550 5.6.7 Non-ASCII addresses not permitted for that sender
# 553 5.6.7 Non-ASCII addresses not permitted for that recipient
# after DATA-dot:
# 554 5.6.9 UTF-8 header message cannot be transmitted to one or more
# recipients, so the message must be rejected
#
if (!$sender_8bit && !$recips_8bit) {
# mail addresses are all-ASCII, don't care for an 8bit header
do_log(3,'SMTPUTF8 option requested but not offered, turning it off');
$smtputf8 = 0; # turn off if not needed
}
}
}
section_time($which_section);
$which_section = 'fwd-xforward';
my $cl_ip = $msginfo->client_addr;
if (defined $cl_ip && $cl_ip ne '' &&
defined($smtp_session->supports('XFORWARD'))) {
$cl_ip = 'IPv6:'.$cl_ip if $cl_ip =~ /:[0-9a-f]*:/i &&
$cl_ip !~ /^IPv6:/i;
my(%xfwd_supp_opt) = map((uc($_),1),
split(' ',$smtp_session->supports('XFORWARD')));
my(@params) = map
{ my($n,$v) = @$_;
# Postfix since version 20060610 uses xtext-encoded (RFC 3461)
# strings in XCLIENT and XFORWARD attribute values, previous
# versions expected plain text with neutered special characters;
# see README_FILES/XFORWARD_README
if (defined $v && $v ne '') {
$v =~ s/[^\041-\176]/?/gs; # isprint
$v =~ s/[<>()\\";\@]/?/gs; # other chars that are special in hdrs
# postfix/src/smtpd/smtpd.c NEUTER_CHARACTERS
$v = xtext_encode($v);
substr($v,255) = '' if length($v) > 255; # chop xtext, not nice
}
!defined $v || $v eq '' || !$xfwd_supp_opt{$n} ? () : ("$n=$v") }
( ['ADDR',$cl_ip], ['NAME',$msginfo->client_name],
['PORT',$msginfo->client_port], ['PROTO',$msginfo->client_proto],
['HELO',$msginfo->client_helo], ['SOURCE',$msginfo->client_source],
['IDENT',$msginfo->queue_id] );
$smtp_session->timeout(
max(60,min($smtp_xforward_timeout,$deadline-time())));
$smtp_handle->command('XFORWARD',@params); #flush!
$smtp_resp = $smtp_session->smtp_response; # fetch response to XFORWARD
if (!defined $smtp_resp || $smtp_resp eq '') {
do_log(-1,"%s SMTP resp. to XFORWARD, dt: %.3f s",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp !~ /^2/) {
do_log(0,"Negative SMTP resp. to XFORWARD: %s", $smtp_resp);
} else { # success, $smtp_resp =~ /^2/
do_log(3,"smtp resp to XFORWARD: %s", $smtp_resp);
}
section_time($which_section);
}
$which_section = 'fwd-auth';
my $auth_user = $msginfo->auth_user;
my $mechanisms = $smtp_session->supports('AUTH');
if (!c('auth_required_out')) {
do_log(3,"AUTH not needed, user='%s', MTA offers '%s'",
$auth_user,$mechanisms);
} elsif ($mechanisms eq '') {
do_log(3,"INFO: MTA does not offer AUTH capability, user='%s'",
$auth_user);
} elsif (!defined $auth_user) {
do_log(0,"INFO: AUTH needed for submission but AUTH data not available");
} else {
do_log(3,"INFO: authenticating %s, server supports AUTH %s",
$auth_user,$mechanisms);
$auth_capable = 1;
# my $sasl = Authen::SASL->new(
# 'callback' => { 'user' => $auth_user, 'authname' => $auth_user,
# 'pass' => $msginfo->auth_pass });
# $smtp_handle->auth($sasl) or die "sending AUTH, user=$auth_user\n";#flush
do_log(0,"Sorry, AUTH not supported in this version of amavisd!");
section_time($which_section);
}
$which_section = 'fwd-pre-mail-from';
$smtp_session->timeout(max(60,min($smtp_mail_timeout,$deadline-time())));
my $fetched_mail_resp = 0; my $fetched_rcpt_resp = 0;
my $data_command_accepted = 0;
if ($initial_submission && $dsn_capable && !defined($dsn_envid)) {
# ENVID identifies transaction, not a message
$dsn_envid = xtext_encode(sprintf("AM.%s.%s\@%s",
$msginfo->mail_id || $msginfo->log_id,
iso8601_utc_timestamp(time),
idn_to_ascii(c('myhostname')) ));
}
$from_options{'RET'} = $dsn_ret if $dsn_capable && defined $dsn_ret;
if ($dsn_capable && defined $dsn_envid) {
# check for proper encoding (RFC 3461), just in case
if ($dsn_envid =~ tr/ =\x00-\x1F//) {
do_log(-1, "Prohibited character in ENVID: %s", $dsn_envid);
} else {
$from_options{'ENVID'} = $dsn_envid;
}
}
my $submitter = $msginfo->auth_submitter;
$from_options{'AUTH'} = xtext_encode($submitter) # RFC 4954 (ex RFC 2554)
if $auth_capable &&
defined($submitter) && $submitter ne '' && $submitter ne '<>';
if ($smtputf8 && $smtputf8_capable) {
$from_options{'SMTPUTF8'} = undef; # turn option *on*, no value
}
my $btype = $msginfo->body_type;
if (defined $btype && $btype ne '') {
$btype = uc $btype;
if ($btype ne '7BIT' && $btype ne '8BITMIME') {
do_log(-1,'requested BODY type %s is unknown/unsupported', $btype);
} elsif ($mimetransport8bit_capable) {
$from_options{'BODY'} = $btype;
}
}
if (!$mimetransport8bit_capable &&
defined $btype && $btype ne '' && uc $btype ne '7BIT') {
do_log(-1,'requested BODY type is %s, but MTA does not announce '.
'8bit-MIMEtransport capability', $btype); # RFC 6152
for my $r (@per_recip_data) {
next if $r->recip_done;
$r->recip_smtp_response('550 5.6.3 Conversion to 7BIT required '.
'but not supported');
$r->recip_remote_mta($relayhost); $r->recip_done(2);
}
$recips_done_by_early_fail = 1;
} elsif ($smtputf8 &&
!$smtputf8_capable && $sender_smtp =~ tr/\x00-\x7F//c) {
do_log(1,'SMTPUTF8 option requested, not offered by MTA, '.
'sender is non-ASCII: %s', $sender_smtp);
for my $r (@per_recip_data) {
next if $r->recip_done;
$r->recip_smtp_response('550 5.6.7 Non-ASCII addresses not permitted '.
'for sender');
$r->recip_remote_mta($relayhost); $r->recip_done(2);
}
$recips_done_by_early_fail = 1;
} else {
$which_section = 'fwd-mail-from';
$smtp_handle->mail($sender_smtp, %from_options); # MAIL FROM
# consider the transaction state unknown until we see a response
$smtp_session->transaction_begins_unconfirmed; # also counts transactions
if (!$pipelining) {
$smtp_resp = $smtp_session->smtp_response; $fetched_mail_resp = 1;
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to MAIL, dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp =~ /^2/) {
do_log(3, "smtp resp to MAIL: %s", $smtp_resp);
$smtp_session->transaction_begins; # transaction is active
} else { # failure
do_log(1, "smtp resp to MAIL: %s", $smtp_resp);
# transaction state unchanged, consider it unknown
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,$am_id,$mta_id,
'.1.0','MAIL FROM');
for my $r (@per_recip_data) {
next if $r->recip_done;
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
$r->recip_smtp_response($smtp_resp_ext); $r->recip_done(2);
}
$recips_done_by_early_fail = 1;
}
section_time($which_section);
}
}
$which_section = 'fwd-rcpt-to';
$smtp_session->timeout(max(60,min($smtp_rcpt_timeout,$deadline-time())));
my($skipping_resp, @per_recip_data_rcpt_sent);
for my $r (@per_recip_data) { # send recipient addresses
next if $r->recip_done;
if (defined $skipping_resp) {
$r->recip_smtp_response($skipping_resp); $r->recip_done(2);
next;
}
# prepare to send a RCPT TO command
my $raddr = qquote_rfc2821_local($r->recip_final_addr);
if ($smtputf8 && !$smtputf8_capable && $raddr =~ tr/\x00-\x7F//c) {
do_log(1,'SMTPUTF8 option requested, not offered by MTA, '.
'recipient is non-ASCII: %s', $raddr);
$r->recip_smtp_response('553 5.6.7 Non-ASCII addresses '.
'not permitted for recipient');
$r->recip_remote_mta($relayhost); $r->recip_done(2);
} elsif (!$dsn_capable) {
$smtp_handle->recipient($raddr); # a barebones RCPT TO command
push(@per_recip_data_rcpt_sent, $r); # remember which recips were sent
} else { # include dsn options with a RCPT TO command
my(@dsn_notify); # implies a default when the list is empty
my $dn = $r->dsn_notify;
@dsn_notify = @$dn if $dn && $msginfo->sender ne ''; # if nondefault
if (c('terminate_dsn_on_notify_success')) {
# we want to handle option SUCCESS locally
if (grep($_ eq 'SUCCESS', @dsn_notify)) { # strip out SUCCESS
@dsn_notify = grep($_ ne 'SUCCESS', @dsn_notify);
@dsn_notify = ('NEVER') if !@dsn_notify;
do_log(3,"stripped out SUCCESS, result: NOTIFY=%s",
join(',',@dsn_notify));
}
}
my(%rcpt_options);
$rcpt_options{'NOTIFY'} =
join(',', map(uc($_),@dsn_notify)) if @dsn_notify;
my($addr_type, $addr) =
orcpt_encode($r->dsn_orcpt, $smtputf8 && $smtputf8_capable, 1);
$rcpt_options{'ORCPT'} = $addr_type.';'.$addr if defined $addr;
$smtp_handle->recipient($raddr, %rcpt_options); # RCPT TO
push(@per_recip_data_rcpt_sent, $r); # remember which recips were sent
}
if (!$pipelining) { # must fetch responses to RCPT TO right away
$smtp_resp = $smtp_session->smtp_response; $fetched_rcpt_resp = 1;
if (defined $smtp_resp && $smtp_resp ne '') {
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,$am_id,$mta_id,
'.1.0','RCPT TO');
$r->recip_smtp_response($smtp_resp_ext); # preliminary response
}
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to RCPT (%s), dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty', $raddr,
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp =~ /^2/) {
do_log(3, "smtp resp to RCPT (%s): %s", $raddr,$smtp_resp);
$any_valid_recips++;
} else { # failure
do_log(1, "smtp resp to RCPT (%s): %s", $raddr,$smtp_resp);
if ($smtp_resp =~ /^452/) { # too many recipients - see RFC 5321
do_log(-1, 'Only %d recips sent in one go: "%s"',
$any_valid_recips, $smtp_resp)
if !defined $skipping_resp;
$skipping_resp = enhance_smtp_response($smtp_resp,$am_id,$mta_id,
'.5.3','RCPT TO');
} elsif ($smtp_resp =~ /^4/) {
$any_tempfail_recips++;
}
$r->recip_done(2); # got a negative response to RCPT TO
}
}
}
section_time($which_section) if !$pipelining; # otherwise it just shows 0
my $what_cmd;
if (!@per_recip_data_rcpt_sent || # no recipients were sent
$fetched_rcpt_resp && !$any_valid_recips) { # no recipients accepted
# it is known there are no valid recipients, don't go into DATA section
do_log(0,"no valid recipients, skip data transfer");
$smtp_session->timeout($smtp_rset_timeout);
$what_cmd = 'RSET'; $smtp_handle->rset; # send a RSET
$smtp_session->transaction_ends_unconfirmed;
} elsif ($fetched_rcpt_resp && # no pipelining
$any_tempfail_recips && !$dsn_per_recip_capable) {
# we must not proceed if mail did not came in as LMTP,
# or we would generate mail duplicates on each delivery attempt
do_log(-1,"mail_via_smtp: DATA skipped, tempfailed recips: %s",
$any_tempfail_recips);
$smtp_session->timeout($smtp_rset_timeout);
$what_cmd = 'RSET'; $smtp_handle->rset; # send a RSET
$smtp_session->transaction_ends_unconfirmed;
} else { # pipelining, or we know we got a clearance to proceed
$which_section = 'fwd-data-cmd';
# pipelining in effect, or we have at least one valid recipient, go DATA
$smtp_session->timeout(
max(60,min($smtp_data_init_timeout,$deadline-time())));
$smtp_handle->data; #flush! DATA
$in_datasend_mode = 1; # DATA command was sent (but not yet confirmed)
if (!$fetched_mail_resp) { # pipelining in effect, late response to MAIL
$which_section = 'fwd-mail-pip';
$smtp_session->timeout(
max(60,min($smtp_mail_timeout,$deadline-time())));
$smtp_resp = $smtp_session->smtp_response; $fetched_mail_resp = 1;
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to MAIL (pip), dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp =~ /^2/) {
do_log(3, "smtp resp to MAIL (pip): %s", $smtp_resp);
$smtp_session->transaction_begins; # transaction is active
} else { # failure
do_log(1, "smtp resp to MAIL (pip): %s", $smtp_resp);
# transaction state unchanged, consider it unknown
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,
$am_id, $mta_id, '.1.0', 'MAIL FROM');
for my $r (@per_recip_data) {
next if $r->recip_done;
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
$r->recip_smtp_response($smtp_resp_ext); $r->recip_done(2);
}
$recips_done_by_early_fail = 1;
}
section_time($which_section);
}
if (!$fetched_rcpt_resp) { # pipelining in effect, late response to RCPT
$which_section = 'fwd-rcpt-pip';
$smtp_session->timeout(
max(60,min($smtp_rcpt_timeout,$deadline-time())));
for my $r (@per_recip_data_rcpt_sent) { # only for those actually sent
my $raddr = qquote_rfc2821_local($r->recip_final_addr);
$smtp_resp = $smtp_session->smtp_response; $fetched_rcpt_resp = 1;
if (defined $smtp_resp && $smtp_resp ne '') {
if ($r->recip_done) { # shouldn't happen, unless MAIL FROM failed
do_log(-1,"panic: recipient done, but got an ".
"smtp resp to RCPT (pip) (%s): %s",
$raddr,$smtp_resp) if !$recips_done_by_early_fail;
next; # do not overwrite previous diagnostics
}
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,
$am_id, $mta_id, '.1.0', 'RCPT TO');
$r->recip_smtp_response($smtp_resp_ext); # preliminary response
}
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s response to RCPT (pip) (%s), dt: %.3f s\n",
!defined $smtp_resp ? 'No' : 'Empty', $raddr,
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp =~ /^2/) {
do_log(3, "smtp resp to RCPT (pip) (%s): %s", $raddr,$smtp_resp);
$any_valid_recips++;
} else { # failure
do_log(1, "smtp resp to RCPT (pip) (%s): %s", $raddr,$smtp_resp);
if ($smtp_resp =~ /^452/) { # too many recipients - see RFC 5321
do_log(-1, 'Only %d recips sent in one go: "%s"',
$any_valid_recips, $smtp_resp)
if !defined $skipping_resp;
$skipping_resp = enhance_smtp_response($smtp_resp,$am_id,$mta_id,
'.5.3','RCPT TO');
} elsif ($smtp_resp =~ /^4/) {
$any_tempfail_recips++;
}
$r->recip_done(2); # got a negative response to RCPT TO
}
}
section_time($which_section);
}
$which_section = 'fwd-data-chkpnt' if $pipelining;
$smtp_session->timeout(
max(60,min($smtp_data_init_timeout,$deadline-time())));
$smtp_resp = $smtp_session->smtp_response; # fetch response to DATA
section_time($which_section);
$data_command_accepted = 0;
if (!defined $smtp_resp || $smtp_resp eq '') {
do_log(-1,"%s SMTP resp. to DATA, dt: %.3f s",
!defined $smtp_resp ? 'No' : 'Empty',
time - $smtp_handle->last_io_event_tx_timestamp);
$smtp_resp = sprintf("450 4.5.0 %s response to DATA",
!defined $smtp_resp ? 'No' : 'Empty');
} elsif ($smtp_resp !~ /^3/) {
do_log(0,"Negative SMTP resp. to DATA: %s", $smtp_resp);
} else { # success, $smtp_resp =~ /^3/
$data_command_accepted = 1;
do_log(3,"smtp resp to DATA: %s", $smtp_resp);
}
if (!$data_command_accepted) {
$in_datasend_mode = 0;
$smtp_session->timeout($smtp_rset_timeout);
$what_cmd = 'RSET'; $smtp_handle->rset; # send a RSET
$smtp_session->transaction_ends_unconfirmed;
# replace success responses to RCPT TO commands with a response to DATA
for my $r (@per_recip_data_rcpt_sent) { # only for those actually sent
next if $r->recip_done; # skip those that failed at earlier stages
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,
$am_id, $mta_id, '.5.0', 'DATA');
$smtp_response = $smtp_resp_ext if !defined $smtp_response;
$r->recip_smtp_response($smtp_resp_ext); $r->recip_done(2);
}
} elsif (!$any_valid_recips) { # pipelining and no recipients, in DATA
do_log(2,"Too late, DATA accepted but no valid recips, send dummy");
$which_section = 'fwd-dummydata-end';
$smtp_session->timeout(
max(60,min($smtp_data_done_timeout,$deadline-time())));
$what_cmd = 'data-dot';
$smtp_handle->dataend; # .<CR><LF> as required by RFC 2920: if a DATA
# command was accepted the SMTP client should send a single dot
$in_datasend_mode = 0; $smtp_session->transaction_ends_unconfirmed;
} elsif ($any_tempfail_recips && !$dsn_per_recip_capable) { # pipelining
# we must not proceed if mail did not came in as LMTP,
# or we would generate mail duplicates on each delivery attempt
do_log(2,"Too late, DATA accepted but tempfailed recips, bail out");
die "Bail out, DATA accepted but tempfailed recips, not an LMTP input";
} else { # all ok so far, we are in a DATA state and must send contents
$which_section = 'fwd-data-hdr';
my $hdr_edits = $msginfo->header_edits;
$hdr_edits = Amavis::Out::EditHeader->new if !$hdr_edits;
$smtp_session->timeout(
max(60,min($smtp_data_xfer_timeout,$deadline-time())));
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$smtp_handle,!$initial_submission);
if ($received_cnt > 100) {
# loop detection required by RFC 5321 (ex RFC 2821) section 6.3
# Do not modify the signal text, it gets matched elsewhere!
die "Too many hops: $received_cnt 'Received:' header fields\n";
}
$which_section = 'fwd-data-contents';
# a file handle or a string ref or MIME::Entity object
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
while ($file_position < length($$msg)) {
$smtp_handle->datasend(substr($$msg,$file_position,16384));
$file_position += 16384; # may overshoot, no problem
}
} elsif ($msg->isa('MIME::Entity')) {
$msg->print_body($smtp_handle);
} else {
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,3*16384)) > 0) {
$smtp_handle->datasend($buff);
}
defined $nbytes or die "Error reading: $!";
}
section_time($which_section);
$which_section = 'fwd-data-end';
$smtp_session->timeout(
max(60,min($smtp_data_done_timeout,$deadline-time())));
$what_cmd = 'data-dot';
$smtp_handle->dataend; # .<CR><LF>
$in_datasend_mode = 0; $smtp_session->transaction_ends_unconfirmed;
$any_valid_recips_and_data_sent = 1;
section_time($which_section) if !$pipelining; # otherwise it shows 0
}
}
if ($pipelining && !$smtp_connection_cache_enable) {
do_log(5,"smtp connection_cache disabled, sending QUIT");
$smtp_session->quit; #flush! QUIT
# can't be sure until we see a response, consider uncertain just in case
$smtp_session->transaction_ends_unconfirmed;
}
$which_section = 'fwd-rundown-1';
$smtp_resp = undef;
if (!defined $what_cmd) {
# not expecting a response?
} elsif ($what_cmd ne 'data-dot') { # must be a response to a RSET
$smtp_resp = $smtp_session->smtp_response; # fetch a response
if (!defined $smtp_resp || $smtp_resp eq '') {
die sprintf("%s SMTP response to %s, dt: %.3f s",
!defined $smtp_resp ? 'No' : 'Empty', $what_cmd,
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp !~ /^2/) {
die "Negative SMTP response to $what_cmd: $smtp_resp";
} else { # success, $smtp_resp =~ /^2/
do_log(3,"smtp resp to %s: %s", $what_cmd,$smtp_resp);
$smtp_session->transaction_ends if $what_cmd eq 'RSET';
}
} else { # get response(s) to data-dot
# replace success responses to RCPT TO commands with a final response
my $first = 1; my $anyfail = 0; my $anysucc = 0;
for my $r (@per_recip_data_rcpt_sent) { # only for those actually sent
if ($lmtp || $first) {
$first = 0; my $raddr = qquote_rfc2821_local($r->recip_final_addr);
$raddr .= ', etc.' if !$lmtp && @per_recip_data > 1;
$smtp_resp = $smtp_session->smtp_response; # resp to data-dot
if (!defined $smtp_resp || $smtp_resp eq '') {
$anyfail = 1;
do_log(0,"%s SMTP response to %s (%s), dt: %.3f s",
!defined $smtp_resp ? 'No' : 'Empty', $what_cmd, $raddr,
time - $smtp_handle->last_io_event_tx_timestamp);
} elsif ($smtp_resp !~ /^2/) {
$anyfail = 1;
do_log(0,"Negative SMTP response to %s (%s): %s, dt: %.1f ms",
$what_cmd, $raddr, $smtp_resp,
1000*(time-$smtp_handle->last_io_event_tx_timestamp));
} else { # success, $smtp_resp =~ /^2/
$anysucc = 1;
ll(3) && do_log(3,"smtp resp to %s (%s): %s, dt: %.1f ms",
$what_cmd, $raddr, $smtp_resp,
1000*(time-$smtp_handle->last_io_event_tx_timestamp));
}
}
next if $r->recip_done; # skip those that failed at earlier stages
$r->recip_remote_mta($relayhost);
$r->recip_remote_mta_smtp_response($smtp_resp);
my $smtp_resp_ext = enhance_smtp_response($smtp_resp,$am_id,$mta_id,
'.6.0','data-dot');
$smtp_response = $smtp_resp_ext if !defined $smtp_response;
$r->recip_smtp_response($smtp_resp_ext); $r->recip_done(2);
$r->recip_mbxname($r->recip_final_addr) if $smtp_resp =~ /^2/;
}
if ($first) { # fetch an uncollected response
# fetch unprocessed response if all recipients were rejected
# but we nevertheless somehow entered a data transfer mode
# (i.e. if an SMTP server failed to reject a DATA command).
# RFC 2033: when there have been no successful RCPT commands in the
# mail transaction, the DATA command MUST fail with a 503 reply code
$smtp_resp = $smtp_session->smtp_response; # resp to data-dot
$smtp_resp = '' if !defined $smtp_resp;
if ($smtp_resp =~ /^2/) { $anysucc = 1 } else { $anyfail = 1 }
do_log(3,"smtp resp to _dummy_ data %s: %s", $what_cmd,$smtp_resp);
}
if ($anysucc && !$anyfail) {
# we are certain all went fine and a transaction is definitely over
$smtp_session->transaction_ends;
}
}
# if ($pipelining) {} # QUIT was already sent
# elsif (!$smtp_connection_cache_enable) {
# $smtp_session->quit; #flush! QUIT
# # can't be sure until we see a response, consider uncertain just in case
# $smtp_session->transaction_ends_unconfirmed;
# }
# if ($smtp_session->session_state eq 'quitsent') {
# $smtp_session->timeout($smtp_quit_timeout);
# $smtp_resp = $smtp_session->smtp_response;
# $smtp_resp = '' if !defined $smtp_resp;
# do_log(3,"smtp resp to QUIT: %s", $smtp_resp);
# if ($smtp_resp =~ /^2/) {
# $smtp_session->transaction_ends;
# } else {
# $smtp_session->transaction_ends_unconfirmed;
# do_log(0,"Negative SMTP resp. to QUIT: %s", $smtp_resp);
# }
# }
my $keep_session = $smtp_session->session_state ne 'quitsent';
if ($keep_session && !defined($smtp_session->in_smtp_transaction)) {
do_log(2,"SMTP transaction state uncertain, closing just in case");
$keep_session = 0;
}
$smtp_session->close($keep_session)
or die "Error closing Amavis::Out::SMTP::Session";
undef $smtp_handle; undef $smtp_session;
1;
# some unusual error conditions _are_ captured by eval, but fail to set $@
} or do { $err = $@ ne '' ? $@ : "errno=$!"; chomp $err };
my $saved_section_name = $which_section;
$which_section = 'fwd-end-chkpnt';
do_log(2,"mail_via_smtp: session failed: %s", $err) if defined $err;
prolong_timer($which_section); # restart timer
# terminate the SMTP session if still alive
if (!defined($smtp_session)) {
# already closed normally
} elsif ($in_datasend_mode) {
# We are aborting SMTP session. Data transfer mode must NOT be terminated
# with a dataend (dot), otherwise recipient will receive a chopped-off mail
# (and possibly be receiving it over and over again during each MTA retry.
do_log(-1, "mail_via_smtp: NOTICE: aborting SMTP session, %s", $err);
$smtp_session->close(0); # abruptly terminate SMTP session, ignore status
} else {
do_log(5,"smtp session done, sending QUIT");
eval {
$smtp_session->timeout(1); # don't wait for too long
$smtp_session->quit; #flush! # send a QUIT regardless of success so far
$smtp_session->transaction_ends_unconfirmed;
for (my $cnt=0; ; $cnt++) { # curious if there are any pending responses
my $smtp_resp = $smtp_session->smtp_response;
last if !defined $smtp_resp;
do_log(0,"discarding unprocessed reply: %s", $smtp_resp);
if ($cnt > 20) { do_log(-1,"aborting, discarding many replies"); last }
}
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "mail_via_smtp: error during QUIT: %s", $eval_stat);
};
$smtp_session->close(0); # terminate SMTP session, ignore status
}
undef $smtp_handle; undef $smtp_session;
# prepare final smtp response and log abnormal events
for my $r (@per_recip_data) {
my $resp = $r->recip_smtp_response;
$smtp_response = $resp if !defined($smtp_response) ||
$resp =~ /^4/ && $smtp_response !~ /^4/ ||
$resp !~ /^2/ && $smtp_response !~ /^[45]/;
}
if (!defined $err) {
# no errors
} elsif ($err =~ /^timed out\b/ || $err =~ /: Timeout\z/) {
$smtp_response = sprintf("450 4.4.2 Timed out during %s, MTA(%s), id=%s",
$saved_section_name, $mta_id, $am_id);
} elsif ($err =~ /^Can't connect\b/) {
$smtp_response = sprintf("450 4.4.1 %s, MTA(%s), id=%s",
$err, $mta_id, $am_id);
} elsif ($err =~ /^Too many hops\b/) {
$smtp_response = sprintf("554 5.4.6 Reject: %s, id=%s", $err, $am_id);
} else {
$smtp_response = sprintf("451 4.5.0 From MTA(%s) during %s (%s): id=%s",
$mta_id, $saved_section_name, $err, $am_id);
}
# NOTE: $initial_submission argument is typically treated as a boolean
# but a value of 'AV' is supplied by av_smtp_client to allow a forwarding
# method to distinguish it from ordinary submissions
my $ll = ($smtp_response =~ /^2/ || $initial_submission eq 'AV') ? 1 : -1;
ll($ll) && do_log($ll, "%s from %s -> %s, %s %s",
$logmsg, $sender_smtp,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @per_recip_data))),
join(' ', map { my $v=$from_options{$_}; defined($v)?"$_=$v":"$_" }
(keys %from_options)),
$smtp_response);
if (defined $smtp_response) {
$msginfo->dsn_passed_on($dsn_capable && $smtp_response=~/^2/ &&
!c('terminate_dsn_on_notify_success') ? 1 : 0);
for my $r (@per_recip_data) {
# attach an SMTP response to each recip that was not already processed
if (!$r->recip_done) { # mark it as done
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
$r->recip_mbxname($r->recip_final_addr) if $smtp_response =~ /^2/;
} elsif ($any_valid_recips_and_data_sent &&
$r->recip_smtp_response =~ /^452/) {
# 'undo' the RCPT TO '452 Too many recipients' situation,
# mail needs to be transferred in more than one transaction
$r->recip_smtp_response(undef); $r->recip_done(undef);
}
}
if ($smtp_response =~ /^2/) {
snmp_count('OutMsgsDelivers');
my $size = $msginfo->msg_size;
snmp_count( ['OutMsgsSize'.$_, $size, 'C64'] ) for @snmp_vars;
} elsif ($smtp_response =~ /^4/) {
snmp_count('OutMsgsAttemptFails');
} elsif ($smtp_response =~ /^5/) {
snmp_count('OutMsgsRejects');
}
}
section_time($which_section);
die $err if defined($err) && $err =~ /^timed out\b/; # resignal timeout
1;
}
1;
__DATA__
#
package Amavis::Out::Pipe;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(&mail_via_pipe);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Util qw(untaint min max minmax ll do_log snmp_count
collect_equal_delivery_recips);
import Amavis::ProcControl qw(exit_status_str proc_status_ok kill_proc
run_command_consumer);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::Out::EditHeader;
}
use Errno qw(ENOENT EACCES ESRCH);
use POSIX qw(WIFEXITED WIFSIGNALED WIFSTOPPED
WEXITSTATUS WTERMSIG WSTOPSIG);
# Send mail using external mail submission program 'sendmail' or its lookalike
# (also available with Postfix and Exim) - used for forwarding original mail
# or sending notifications or quarantining. May throw exception (die) on
# temporary failure (4xx) or other problem.
#
sub mail_via_pipe(@) {
my($msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
my(@snmp_vars) = !$initial_submission ?
('', 'Relay', 'ProtoPipe', 'ProtoPipeRelay')
: ('', 'Submit', 'ProtoPipe', 'ProtoPipeSubmit',
'Submit'.$initial_submission);
snmp_count('OutMsgs'.$_) for @snmp_vars;
my $id = $msginfo->parent_mail_id;
$id = $msginfo->mail_id . (defined $id ? "($id)" : "");
my $logmsg = sprintf("%s %s via PIPE from %s", $id,
($initial_submission ? 'SEND' : 'FWD'),
$msginfo->sender_smtp);
my($per_recip_data_ref, $proto_sockname) =
collect_equal_delivery_recips($msginfo, $filter, qr/^pipe:/i);
if (!$per_recip_data_ref || !@$per_recip_data_ref) {
do_log(5, "%s, nothing to do", $logmsg); return 1;
}
$proto_sockname = $proto_sockname->[0] if ref $proto_sockname;
ll(1) && do_log(1, "delivering to %s, %s -> %s",
$proto_sockname, $logmsg,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @$per_recip_data_ref)) ));
# just use the first one, ignoring failover alternatives
local($1);
$proto_sockname =~ /^pipe:(.*)\z/si
or die "Bad fwd method syntax: ".$proto_sockname;
my $pipe_args = $1;
$pipe_args =~ s/^flags=\S*\s*//i; # flags are currently ignored, q implied
$pipe_args =~ s/^argv=//i;
my(@pipe_args) = split(' ',$pipe_args); my(@command) = shift(@pipe_args);
my $dsn_capable = c('propagate_dsn_if_possible'); # assume, unless disabled
$dsn_capable = 0 if $command[0] !~ /sendmail/; # a hack, don't use -N or -V
if ($dsn_capable) { # DSN is supported since Postfix 2.3
# notify options are per-recipient, yet a command option -N applies to all
my $common_list; my $not_all_the_same = 0;
for my $r (@{$msginfo->per_recip_data}) {
my $dsn_notify = $r->dsn_notify;
my $d;
if ($msginfo->sender eq '') {
$d = 'NEVER';
} elsif (!$dsn_notify) {
$d = 'DELAY,FAILURE'; # sorted
} else {
$d = uc(join(',', sort @$dsn_notify)); # normalize order
}
if (!defined($common_list)) { $common_list = $d }
elsif ($d ne $common_list) { $not_all_the_same = 1 }
}
if ($common_list=~/\bSUCCESS\b/ && c('terminate_dsn_on_notify_success')) {
# strip out option SUCCESS, we want to handle it locally
my(@dsn_notify) = grep($_ ne 'SUCCESS', split(/,/,$common_list));
@dsn_notify = ('NEVER') if !@dsn_notify;
$common_list = join(',',@dsn_notify);
do_log(3,"stripped out SUCCESS, result: NOTIFY=%s", $common_list);
}
if ($not_all_the_same || $msginfo->sender eq '') {} # leave at default
elsif ($common_list eq 'DELAY,FAILURE') {} # leave at default
else { unshift(@pipe_args, '-N', $common_list) }
unshift(@pipe_args,
'-V', $msginfo->dsn_envid) if defined $msginfo->dsn_envid;
# but there is no mechanism to specify ORCPT or RET
}
for (@pipe_args) {
# The sendmail command line expects addresses quoted as per RFC 822.
# "funny user"@some.domain
# For compatibility with Sendmail, the Postfix sendmail command line also
# accepts address formats that are legal in RFC 822 mail header section:
# Funny Dude <"funny user"@some.domain>
# Although addresses passed as args to sendmail submission program
# should not be <...> bracketed, for some reason original sendmail
# issues a warning on null reverse-path, but gladly accepts <>.
# As this is not strictly wrong, we comply to make it happy.
# NOTE: the -fsender is not allowed, -f and sender must be separate args!
my $null_ret_path = '<>'; # some sendmail lookalikes want '<>', others ''
# Courier sendmail accepts '' but not '<>' for null reverse path
$null_ret_path = '' if $Amavis::extra_code_in_courier;
if (/^\$\{sender\}\z/i) {
push(@command, $msginfo->sender eq '' ? $null_ret_path
: do { my $s = $msginfo->sender_smtp;
$s =~ s/^<//; $s =~ s/>\z//; untaint($s) });
} elsif (/^\$\{recipient\}\z/i) {
push(@command,
map { $_ eq '' ? $null_ret_path : untaint(quote_rfc2821_local($_)) }
map($_->recip_final_addr, @$per_recip_data_ref));
} else {
push(@command, $_);
}
}
ll(5) && do_log(5, "mail_via_pipe running command: %s", join(' ',@command));
local $SIG{CHLD} = 'DEFAULT';
local $SIG{PIPE} = 'IGNORE'; # don't signal on a write to a widowed pipe
my($proc_fh,$pid) = run_command_consumer(undef,undef,@command);
my $hdr_edits = $msginfo->header_edits;
$hdr_edits = Amavis::Out::EditHeader->new if !$hdr_edits;
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$proc_fh,!$initial_submission);
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if ($received_cnt > 100) { # loop detection required by RFC 5321 section 6.3
# deal with it later, for now just skip the body
} elsif (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
while ($file_position < length($$msg)) {
$proc_fh->print(substr($$msg,$file_position,16384))
or die "writing mail text to a pipe failed: $!";
$file_position += 16384; # may overshoot, no problem
}
} elsif ($msg->isa('MIME::Entity')) {
$msg->print_body($proc_fh);
} else {
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,32768)) > 0) {
$proc_fh->print($buff)
or die "writing mail text to a pipe failed: $!";
}
defined $nbytes or die "Error reading: $!";
}
$proc_fh->flush or die "Can't flush pipe to a mail submission program: $!";
my $smtp_response;
if ($received_cnt > 100) { # loop detection required by RFC 5321 section 6.3
do_log(-2, "Too many hops: %d 'Received:' header fields", $received_cnt);
kill_proc($pid,$command[0],10,$proc_fh,'too many hops') if defined $pid;
$proc_fh->close; undef $proc_fh; undef $pid; # and ignore status
$smtp_response = "554 5.4.6 Reject: " .
"Too many hops: $received_cnt 'Received:' header fields";
} else {
my $err = 0; $proc_fh->close or $err=$!;
my $child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
# sendmail program (Postfix variant) can return the following exit codes:
# EX_OK(0), EX_DATAERR, EX_SOFTWARE, EX_TEMPFAIL, EX_NOUSER, EX_UNAVAILABLE
if (proc_status_ok($child_stat,$err, EX_OK)) {
$smtp_response = "250 2.6.0 Ok"; # submitted to MTA
snmp_count('OutMsgsDelivers');
my $size = $msginfo->msg_size;
snmp_count( ['OutMsgsSize'.$_, $size, 'C64'] ) for @snmp_vars;
} elsif (proc_status_ok($child_stat,$err, EX_TEMPFAIL)) {
$smtp_response = "450 4.5.0 Temporary failure submitting message";
snmp_count('OutMsgsAttemptFails');
} elsif (proc_status_ok($child_stat,$err, EX_NOUSER)) {
$smtp_response = "554 5.1.1 Recipient unknown";
snmp_count('OutMsgsRejects');
} elsif (proc_status_ok($child_stat,$err, EX_UNAVAILABLE)) {
$smtp_response = "554 5.5.0 Mail submission service unavailable";
snmp_count('OutMsgsRejects');
} else {
$smtp_response = "451 4.5.0 Failed to submit a message: ".
exit_status_str($child_stat,$err);
snmp_count('OutMsgsAttemptFails');
}
ll(3) && do_log(3,"mail_via_pipe %s, %s, %s", $command[0],
exit_status_str($child_stat,$err), $smtp_response);
}
$smtp_response .= ", id=" . $msginfo->log_id;
for my $r (@$per_recip_data_ref) {
next if $r->recip_done;
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
$r->recip_mbxname($r->recip_final_addr) if $smtp_response =~ /^2/;
}
$msginfo->dsn_passed_on($dsn_capable && $smtp_response=~/^2/ &&
!c('terminate_dsn_on_notify_success') ? 1 : 0);
section_time('fwd-pipe');
1;
}
1;
__DATA__
#
package Amavis::Out::BSMTP;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(&mail_via_bsmtp);
import Amavis::Conf qw(:platform $QUARANTINEDIR c cr ca);
import Amavis::Util qw(untaint min max minmax ll do_log snmp_count
idn_to_ascii collect_equal_delivery_recips);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::Out::EditHeader;
}
use Errno qw(ENOENT EACCES);
use IO::File qw(O_CREAT O_EXCL O_WRONLY);
# store message in a BSMTP format
#
# RFC 2442: Application/batch-SMTP material is generated by a specially
# modified SMTP client operating without a corresponding SMTP server.
# The client simply assumes a successful response to all commands it issues.
# The resulting content then consists of the collected output from the SMTP
# client.
#
sub mail_via_bsmtp(@) {
my($msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
my(@snmp_vars) = !$initial_submission ?
('', 'Relay', 'ProtoBSMTP', 'ProtoBSMTPRelay')
: ('', 'Submit', 'ProtoBSMTP', 'ProtoBSMTPSubmit',
'Submit'.$initial_submission);
snmp_count('OutMsgs'.$_) for @snmp_vars;
my $logmsg = sprintf("%s via BSMTP: %s", ($initial_submission?'SEND':'FWD'),
$msginfo->sender_smtp);
my($per_recip_data_ref, $proto_sockname) =
collect_equal_delivery_recips($msginfo, $filter, qr/^bsmtp:/i);
if (!$per_recip_data_ref || !@$per_recip_data_ref) {
do_log(5, "%s, nothing to do", $logmsg); return 1;
}
$proto_sockname = $proto_sockname->[0] if ref $proto_sockname;
ll(1) && do_log(1, "delivering to %s, %s -> %s",
$proto_sockname, $logmsg,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @$per_recip_data_ref)) ));
# just use the first one, ignoring failover alternatives
local($1);
$proto_sockname =~ /^bsmtp:(.*)\z/si
or die "Bad fwd method syntax: ".$proto_sockname;
my $bsmtp_file_final = $1; my $mbxname;
my $s = $msginfo->sender; # sanitized sender name for use in a filename
$s =~ tr/a-zA-Z0-9@._+-/=/c;
substr($s,100) = '...' if length($s) > 100+3;
$s =~ s/\@/_at_/g; $s =~ s/^(\.{0,2})\z/_$1/;
$bsmtp_file_final =~ s{%(.)}
{ $1 eq 'b' ? $msginfo->body_digest
: $1 eq 'P' ? $msginfo->partition_tag
: $1 eq 'm' ? $msginfo->mail_id||''
: $1 eq 'n' ? $msginfo->log_id
: $1 eq 's' ? untaint($s) # a hack, avoid using %s
: $1 eq 'i' ? iso8601_timestamp($msginfo->rx_time,1) #,'-')
: $1 eq '%' ? '%' : '%'.$1 }gse;
# prepend directory if not specified
my $bsmtp_file_final_to_show = $bsmtp_file_final;
$bsmtp_file_final = $QUARANTINEDIR."/".$bsmtp_file_final
if $QUARANTINEDIR ne '' && $bsmtp_file_final !~ m{^/};
my $bsmtp_file_tmp = $bsmtp_file_final . ".tmp";
my $mp; my $err;
eval {
my $errn = lstat($bsmtp_file_tmp) ? 0 : 0+$!;
if ($errn == ENOENT) {} # good, no file, as expected
elsif ($errn==0 && (-f _ || -l _))
{ die "File $bsmtp_file_tmp already exists, refuse to overwrite" }
else
{ die "File $bsmtp_file_tmp exists??? Refuse to overwrite it, $!" }
$mp = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$mp->open($bsmtp_file_tmp, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create BSMTP file $bsmtp_file_tmp: $!";
binmode($mp,':bytes') or die "Can't set :bytes, $!";
# RFC 2442: Since no SMTP server is present the client must be prepared
# to make certain assumptions about which SMTP extensions can be used.
# The generator MAY assume that ESMTP [RFC 1869 (obsoleted by RFC 5321)]
# facilities are available, that is, it is acceptable to use the EHLO
# command and additional parameters on MAIL FROM and RCPT TO. If EHLO
# is used MAY assume that the 8bitMIME [RFC 6152], SIZE [RFC 1870], and
# NOTARY [RFC 1891] extensions are available. In particular, NOTARY
# SHOULD be used. (nowadays called DSN)
my $myheloname = c('localhost_name'); # host name used in EHLO/HELO/LHLO
$myheloname = 'localhost' if $myheloname eq '';
$myheloname = idn_to_ascii($myheloname);
$mp->printf("EHLO %s\n", $myheloname) or die "print failed (EHLO): $!";
my $btype = $msginfo->body_type; # RFC 6152: need "8bit Data"? (RFC 2045)
$btype = '' if !defined $btype;
my $dsn_envid = $msginfo->dsn_envid; my $dsn_ret = $msginfo->dsn_ret;
$mp->printf("MAIL FROM:%s\n", join(' ',
$msginfo->sender_smtp,
$btype ne '' ? ('BODY='.uc($btype)) : (),
defined $dsn_ret ? ('RET='.$dsn_ret) : (),
defined $dsn_envid ? ('ENVID='.$dsn_envid) : () ),
) or die "print failed (MAIL FROM): $!";
for my $r (@$per_recip_data_ref) {
my(@dsn_notify); # implies a default when the list is empty
my $dn = $r->dsn_notify;
@dsn_notify = @$dn if $dn && $msginfo->sender ne ''; # if nondefault
if (@dsn_notify && c('terminate_dsn_on_notify_success')) {
# we want to handle option SUCCESS locally
if (grep($_ eq 'SUCCESS', @dsn_notify)) { # strip out SUCCESS
@dsn_notify = grep($_ ne 'SUCCESS', @dsn_notify);
@dsn_notify = ('NEVER') if !@dsn_notify;
do_log(3,"stripped out SUCCESS, result: NOTIFY=%s",
join(',',@dsn_notify));
}
}
$mp->printf("RCPT TO:%s\n", join(' ',
qquote_rfc2821_local($r->recip_final_addr),
@dsn_notify ? ('NOTIFY='.join(',',@dsn_notify)) : (),
defined $r->dsn_orcpt ? ('ORCPT='.$r->dsn_orcpt) : () ),
) or die "print failed (RCPT TO): $!";
}
$mp->print("DATA\n") or die "print failed (DATA): $!";
my $hdr_edits = $msginfo->header_edits;
$hdr_edits = Amavis::Out::EditHeader->new if !$hdr_edits;
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$mp,!$initial_submission);
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if ($received_cnt > 100) { # loop detection required by RFC 5321 sect. 6.3
die "Too many hops: $received_cnt 'Received:' header fields";
} elsif (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
my $buff = substr($$msg,$file_position);
$buff =~ s/^\./../gm;
$mp->print($buff) or die "print failed - data: $!";
} elsif ($msg->isa('MIME::Entity')) {
$msg->print_body($mp);
} else {
my $ln;
for ($! = 0; defined($ln=$msg->getline); $! = 0) {
$mp->print($ln=~/^\./ ? (".",$ln) : $ln)
or die "print failed - data: $!";
}
defined $ln || $! == 0 or die "Error reading: $!";
}
$mp->print(".\n") or die "print failed (final dot): $!";
# $mp->print("QUIT\n") or die "print failed (QUIT): $!";
$mp->close or die "Error closing BSMTP file $bsmtp_file_tmp: $!";
undef $mp;
rename($bsmtp_file_tmp, $bsmtp_file_final)
or die "Can't rename BSMTP file to $bsmtp_file_final: $!";
$mbxname = $bsmtp_file_final;
1;
} or do { $err = $@ ne '' ? $@ : "errno=$!" };
my $smtp_response;
if ($err eq '') {
$smtp_response = "250 2.6.0 Ok, queued as BSMTP $bsmtp_file_final_to_show";
snmp_count('OutMsgsDelivers');
my $size = $msginfo->msg_size;
snmp_count( ['OutMsgsSize'.$_, $size, 'C64'] ) for @snmp_vars;
} else {
chomp $err;
unlink($bsmtp_file_tmp)
or do_log(-2,"Can't delete half-finished BSMTP file %s: %s",
$bsmtp_file_tmp, $!);
$mp->close if defined $mp; # ignore status
if ($err =~ /too many hops\b/i) {
$smtp_response = "554 5.4.6 Reject: $err";
snmp_count('OutMsgsRejects');
} else {
$smtp_response = "451 4.5.0 Writing $bsmtp_file_tmp failed: $err";
snmp_count('OutMsgsAttemptFails');
}
die $err if $err =~ /^timed out\b/; # resignal timeout
}
$smtp_response .= ", id=" . $msginfo->log_id;
$msginfo->dsn_passed_on($smtp_response=~/^2/ &&
!c('terminate_dsn_on_notify_success') ? 1 : 0);
for my $r (@$per_recip_data_ref) {
next if $r->recip_done;
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
$r->recip_mbxname($mbxname) if $mbxname ne '' && $smtp_response =~ /^2/;
}
section_time('fwd-bsmtp');
1;
}
1;
__DATA__
#
package Amavis::Out::Local;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&mail_to_local_mailbox);
import Amavis::Conf qw(:platform c cr ca
$QUARANTINEDIR $quarantine_subdir_levels);
import Amavis::Util qw(snmp_count ll do_log untaint unique_list
collect_equal_delivery_recips);
import Amavis::Timing qw(section_time);
import Amavis::rfc2821_2822_Tools;
import Amavis::Out::EditHeader;
}
use Errno qw(ENOENT EACCES);
use Fcntl qw(:flock);
#use File::Spec;
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use subs @EXPORT_OK;
# Deliver to local mailboxes only, ignore the rest: either to directory
# (maildir style), or file (Unix mbox). (normally used as a quarantine method)
#
sub mail_to_local_mailbox(@) {
my($msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
# note that recipients of a message being delivered to a quarantine
# are typically not the original envelope recipients, but are pseudo
# address provided to do_quarantine() based on @quarantine_to_maps;
# nevertheless, we do the usual collect_equal_delivery_recips() ritual
# here too for consistency
#
my $logmsg = sprintf("%s via LOCAL: %s", ($initial_submission?'SEND':'FWD'),
$msginfo->sender_smtp);
my($per_recip_data_ref, $proto_sockname) =
collect_equal_delivery_recips($msginfo, $filter, qr/^local:/i);
if (!$per_recip_data_ref || !@$per_recip_data_ref) {
do_log(5, "%s, nothing to do", $logmsg); return 1;
}
my(@per_recip_data) = @$per_recip_data_ref; undef $per_recip_data_ref;
$proto_sockname = $proto_sockname->[0] if ref $proto_sockname;
ll(4) && do_log(4, "delivering to %s, %s -> %s",
$proto_sockname, $logmsg,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @per_recip_data)) ));
# just use the first one, ignoring failover alternatives
local($1);
$proto_sockname =~ /^local:(.*)\z/si
or die "Bad local method syntax: ".$proto_sockname;
my $via_arg = $1;
my(@snmp_vars) = !$initial_submission ?
('', 'Relay', 'ProtoLocal', 'ProtoLocalRelay')
: ('', 'Submit','ProtoLocal', 'ProtoLocalSubmit',
'Submit'.$initial_submission);
snmp_count('OutMsgs'.$_) for @snmp_vars;
my $sender = $msginfo->sender;
for my $r (@per_recip_data) { # determine a mailbox file for each recipient
# each recipient gets his own copy; these are not the original message's
# recipients but are mailbox addresses, typically telling where a message
# to be quarantined is to be stored
my $recip = $r->recip_final_addr;
# %local_delivery_aliases emulates aliases map - this would otherwise
# be done by MTA's local delivery agent if we gave the message to MTA.
# This way we keep interface compatible with other mail delivery
# methods. The hash value may be a ref to a pair of fixed strings,
# or a subroutine ref (which must return such pair) to allow delayed
# (lazy) evaluation when some part of the pair is not yet known
# at initialization time.
# If no matching entry is found quarantining is skipped.
my($mbxname, $suggested_filename);
my($localpart,$domain) = split_address($recip);
my $ldar = cr('local_delivery_aliases'); # a ref to a hash
my $alias = $ldar->{$localpart};
if (ref($alias) eq 'ARRAY') {
($mbxname, $suggested_filename) = @$alias;
} elsif (ref($alias) eq 'CODE') { # lazy (delayed) evaluation
($mbxname, $suggested_filename) = &$alias;
} elsif ($alias ne '') {
($mbxname, $suggested_filename) = ($alias, undef);
} elsif (!exists $ldar->{$localpart}) {
do_log(3, "no key '%s' in %s, using a default",
$localpart, '%local_delivery_aliases');
($mbxname, $suggested_filename) = ($QUARANTINEDIR, undef);
}
if (!defined($mbxname) || $mbxname eq '' || $recip eq '') {
my $why = !exists $ldar->{$localpart} ? 1 : $alias eq '' ? 2 : 3;
do_log(2, "skip local delivery(%s): <%s> -> <%s>", $why,$sender,$recip);
my $smtp_response = "250 2.6.0 Ok, skip local delivery($why)";
$smtp_response .= ", id=" . $msginfo->log_id;
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
next;
}
my $ux; # is it a UNIX-style mailbox?
my $errn = stat($mbxname) ? 0 : 0+$!;
if ($errn == ENOENT) {
$ux = 1; # $mbxname is a UNIX-style mailbox (new file)
} elsif ($errn != 0) {
die "Can't access a mailbox file or directory $mbxname: $!";
} elsif (-f _) {
$ux = 1; # $mbxname is a UNIX-style mailbox (existing file)
} elsif (!-d _) {
die "Mailbox is neither a file nor a directory: $mbxname";
} else { # a directory
$ux = 0; # $mbxname is a directory (amavis/maildir style mailbox)
my $explicitly_suggested_filename = $suggested_filename ne '';
if ($suggested_filename eq '')
{ $suggested_filename = $via_arg ne '' ? $via_arg : '%m' }
my $mail_id = $msginfo->mail_id;
if (!defined($mail_id)) {
do_log(-1, "mail_to_local_mailbox: mail_id still undefined!?");
$mail_id = '';
}
$suggested_filename =~ s{%(.)}
{ $1 eq 'b' ? $msginfo->body_digest
: $1 eq 'P' ? $msginfo->partition_tag
: $1 eq 'm' ? $mail_id
: $1 eq 'n' ? $msginfo->log_id
: $1 eq 'i' ? iso8601_timestamp($msginfo->rx_time,1) #,'-')
: $1 eq '%' ? '%' : '%'.$1 }gse;
# $mbxname = File::Spec->catfile($mbxname, $suggested_filename);
$mbxname = "$mbxname/$suggested_filename";
if ($quarantine_subdir_levels>=1 && !$explicitly_suggested_filename) {
# using a subdirectory structure to disperse quarantine files
local($1,$2); my $subdir = substr($mail_id, 0, 1);
$subdir=~/^[A-Z0-9]\z/i or die "Unexpected first char: $subdir";
$mbxname =~ m{^ (.*/)? ([^/]+) \z}xs; my($path,$fname) = ($1,$2);
# $mbxname = File::Spec->catfile($path, $subdir, $fname);
$mbxname = "$path$subdir/$fname"; # resulting full filename
my $errn = stat("$path$subdir") ? 0 : 0+$!;
# only test for ENOENT, other errors will be detected later on access
if ($errn == ENOENT) { # check/prepare a set of subdirectories
do_log(2, "checking/creating quarantine subdirs under %s", $path);
for my $d ('A'..'Z','a'..'z','0'..'9') {
$errn = stat("$path$d") ? 0 : 0+$!;
if ($errn == ENOENT) {
mkdir("$path$d", 0750) or die "Can't create dir $path$d: $!";
}
}
}
}
}
# save location where mail should be stored, prepend a mailbox style
$r->recip_mbxname(($ux ? 'mbox' : 'maildir') . ':' . $mbxname);
}
#
# now go ahead and store a message to predetermined files in recip_mbxname;
# iterate by groups of recipients with the same mailbox name
#
@per_recip_data = grep(!$_->recip_done, @per_recip_data);
while (@per_recip_data) {
my $mbxname = $per_recip_data[0]->recip_mbxname; # first mailbox name
# collect all recipient which have the same mailbox file as the first one
my(@recips_with_same_mbx) =
grep($_->recip_mbxname eq $mbxname, @per_recip_data);
@per_recip_data = grep($_->recip_mbxname ne $mbxname, @per_recip_data);
# retrieve mailbox style and a filename
local($1,$2); $mbxname =~ /^([^:]*):(.*)\z/;
my $ux = $1 eq 'mbox' ? 1 : 0; $mbxname = $2;
my(@recips) = map($_->recip_final_addr, @recips_with_same_mbx);
@recips = unique_list(\@recips);
my $smtp_response;
{ # a block is used as a 'switch' statement - 'last' will exit from it
do_log(1,"local delivery: %s -> %s, mbx=%s",
$msginfo->sender_smtp, join(", ",@recips), $mbxname);
my $eval_stat; my($mp,$pos);
my $errn = stat($mbxname) ? 0 : 0+$!;
section_time('stat-mbx');
local $SIG{CHLD} = 'DEFAULT';
local $SIG{PIPE} = 'IGNORE'; # don't signal on a write to a widowed pipe
eval { # try to open the mailbox file for writing
if (!$ux) { # one mail per file, will create specified file
if ($errn == ENOENT) {
# good, no file, as expected
} elsif ($errn != 0) {
die "File $mbxname not accessible, refuse to write: $!";
} elsif (!-f _) {
die "File $mbxname is not a regular file, refuse to write";
} else {
die "File $mbxname already exists, refuse to overwrite";
}
if ($mbxname =~ /\.gz\z/) {
$mp = Amavis::IO::Zlib->new; # ?how to request an exclusive access?
$mp->open($mbxname,'wb')
or die "Can't create gzip file $mbxname: $!";
} else {
$mp = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$mp->open($mbxname, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create file $mbxname: $!";
binmode($mp,':bytes') or die "Can't cancel :utf8 mode: $!";
}
} else { # append to a UNIX-style mailbox
# deliver only to non-executable regular files
if ($errn == ENOENT) {
# if two processes try creating the same new UNIX-style mailbox
# file at the same time, one will tempfail at this point, with
# its mail delivery to be retried later by MTA
$mp = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$mp->open($mbxname, untaint(O_CREAT|O_EXCL|O_APPEND|O_WRONLY),0640)
or die "Can't create file $mbxname: $!";
} elsif ($errn==0 && !-f _) {
die "Mailbox $mbxname is not a regular file, refuse to deliver";
} elsif (-x _ || -X _) {
die "Mailbox file $mbxname is executable, refuse to deliver";
} else {
$mp = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$mp->open($mbxname, untaint(O_APPEND|O_WRONLY), 0640)
or die "Can't append to $mbxname: $!";
}
binmode($mp,':bytes') or die "Can't cancel :utf8 mode: $!";
flock($mp,LOCK_EX) or die "Can't lock mailbox file $mbxname: $!";
$mp->seek(0,2) or die "Can't position mailbox file to its tail: $!";
$pos = $mp->tell; # remember where we started
}
section_time('open-mbx');
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$smtp_response =
$eval_stat =~ /^timed out\b/ ? "450 4.4.2" : "451 4.5.0";
$smtp_response .= " Local delivery(1) to $mbxname failed: $eval_stat";
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
};
last if defined $eval_stat; # exit block, not the loop
my $failed = 0; $eval_stat = undef;
eval { # if things fail from here on, try to restore mailbox state
if ($ux) {
# a null return path may not appear in the 'From ' delimiter line
my $snd = $sender eq '' ? 'MAILER-DAEMON' # as in sendmail & Postfix
: $msginfo->sender_smtp;
# if the envelope sender contains spaces, tabs, or newlines,
# the program (like qmail-local) replaces them with hyphens
$snd =~ s/[ \t\n]/-/sg;
# date/time in asctime (ctime) format, English month names!
# RFC 4155 and qmail-local require UTC time, no timezone name
$mp->printf("From %s %s\n", $snd, scalar gmtime($msginfo->rx_time) )
or die "Can't write mbox separator line to $mbxname: $!";
}
my $hdr_edits = $msginfo->header_edits;
if (!$hdr_edits) {
$hdr_edits = Amavis::Out::EditHeader->new;
$msginfo->header_edits($hdr_edits);
}
$hdr_edits->delete_header('Return-Path');
$hdr_edits->prepend_header('Delivered-To', join(', ',@recips));
$hdr_edits->prepend_header('Return-Path', $msginfo->sender_smtp);
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$mp,!$initial_submission);
if ($received_cnt > 110) {
# loop detection required by RFC 5321 (ex RFC 2821) section 6.3
# Do not modify the signal text, it gets matched elsewhere!
die "Too many hops: $received_cnt 'Received:' header fields\n";
}
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
if (!$ux) { # do it in blocks for speed if we can
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
$mp->print(substr($$msg,$file_position))
or die "Can't write to $mbxname: $!";
} elsif ($msg->isa('MIME::Entity')) {
die "quarantining a MIME::Entity object is not implemented";
} else {
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,32768)) > 0) {
$mp->print($buff) or die "Can't write to $mbxname: $!";
}
defined $nbytes or die "Error reading: $!";
}
} else { # for UNIX-style mailbox file delivery: escape 'From '
# mail(1) and elm(1) recognize /^From / as a message delimiter
# only after a blank line, which is correct. Other MUAs like mutt,
# thunderbird, kmail and pine need all /^From / lines escaped.
# See also http://en.wikipedia.org/wiki/Mbox and RFC 4155.
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
my $buff = substr($$msg,$file_position);
# $buff =~ s/^From />From /gm; # mboxo format
$buff =~ s/^(?=\>*From )/>/gm; # mboxrd format
$mp->print($buff) or die "Can't write to $mbxname: $!";
} elsif ($msg->isa('MIME::Entity')) {
die "quarantining a MIME::Entity object is not implemented";
} else {
my $ln; my $blank_line = 1;
# need to copy line-by-line, slow
for ($! = 0; defined($ln=$msg->getline); $! = 0) {
# see wikipedia and RFC 4155 for "From " escaping conventions
$mp->print('>') or die "Can't write to $mbxname: $!"
if $ln =~ /^(?:>*)From /; # escape all "From " lines
# if $blank_line && $ln =~ /^(?:>*)From /; # only after blankline
$mp->print($ln) or die "Can't write to $mbxname: $!";
$blank_line = $ln eq "\n";
}
defined $ln || $! == 0 or die "Error reading: $!";
}
}
# must append an empty line for a Unix mailbox format
$mp->print("\n") or die "Can't write to $mbxname: $!" if $ux;
1;
} or do { # trouble
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
if ($ux && defined($pos)) {
$mp->flush or die "Can't flush file $mbxname: $!";
$can_truncate or
do_log(-1, "Truncating a mailbox file will most likely fail");
# try to restore UNIX-style mailbox to previous size;
# Produces a fatal error if truncate isn't implemented on the system
$mp->truncate($pos) or die "Can't truncate file $mbxname: $!";
}
$failed = 1;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
};
# if ($ux) {
# # explicit unlocking is unnecessary, close will do a flush & unlock
# $mp->flush or die "Can't flush mailbox file $mbxname: $!";
# flock($mp,LOCK_UN) or die "Can't unlock mailbox $mbxname: $!";
# }
$mp->close or die "Error closing $mbxname: $!";
undef $mp;
if (!$failed) {
$smtp_response = "250 2.6.0 Ok, delivered to $mbxname";
snmp_count('OutMsgsDelivers');
my $size = $msginfo->msg_size;
snmp_count( ['OutMsgsSize'.$_, $size, 'C64'] ) for @snmp_vars;
} elsif ($@ =~ /^timed out\b/) {
$smtp_response = "450 4.4.2 Local delivery to $mbxname timed out";
snmp_count('OutMsgsAttemptFails');
} elsif ($@ =~ /too many hops\b/i) {
$smtp_response = "554 5.4.6 Rejected delivery to mailbox $mbxname: $@";
snmp_count('OutMsgsRejects');
} else {
$smtp_response = "451 4.5.0 Local delivery to mailbox $mbxname ".
"failed: $@";
snmp_count('OutMsgsAttemptFails');
}
} # end of block, 'last' within the block brings us here
do_log(-1, "%s", $smtp_response) if $smtp_response !~ /^2/;
$smtp_response .= ", id=" . $msginfo->log_id;
for my $r (@recips_with_same_mbx) {
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
$r->recip_mbxname($smtp_response =~ /^2/ ? $mbxname : undef);
}
}
section_time('save-to-local-mailbox');
}
1;
__DATA__
#
package Amavis::OS_Fingerprint;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform);
import Amavis::Util qw(ll do_log idn_to_ascii);
}
use Errno qw(EINTR EAGAIN);
use Socket;
use IO::Socket::UNIX;
#use IO::Socket::INET;
use Time::HiRes ();
sub new {
my($class, $service_method,$timeout,
$src_ip,$src_port, $dst_ip,$dst_port, $nonce) = @_;
local($1,$2,$3); my($service_host, $service_port, $service_path);
if ($service_method =~
m{^p0f: (?: \[ ([^\]]*) \] | ([^:]*) ) : ([^:]*) }six) {
($service_host, $service_port) = ($1.$2, $3);
} elsif ($service_method =~
m{^p0f: ( / [^ ]+ ) \z}six) { # looks like a unix socket
$service_path = $1;
} else {
die "Bad p0f method syntax: $service_method";
}
$dst_ip = '0.0.0.0' if !defined $dst_ip; # our MTA's IP address
$dst_port = defined $dst_port ? 0+$dst_port : 0; # our MTA port, usually 25
$src_port = defined $src_port ? 0+$src_port : 0; # remote client's port no.
do_log(4,"Fingerprint query: [%s]:%s %s %s",
$src_ip, $src_port, $nonce, $service_method);
my $sock; my $query; my $query_sent = 0;
# send a UDP query to p0f-analyzer
$query = '['.$src_ip.']' . ($src_port==0 ? '' : ':'.$src_port);
if (defined $service_path) {
$sock = IO::Socket::UNIX->new(Type => SOCK_DGRAM, Peer => $service_path);
$sock or do_log(0,"Can't connect to a Unix socket %s: %s",
$service_path, $!);
} else { # assume an INET or INET6 protocol family
$service_host = idn_to_ascii($service_host);
$sock = $io_socket_module_name->new(
Type => SOCK_DGRAM, Proto => 'udp',
PeerAddr => $service_host, PeerPort => $service_port);
$sock or do_log(0,"Can't create a socket [%s]:%s: %s",
$service_host, $service_port, $!);
}
if ($sock) {
defined $sock->syswrite("$query $nonce")
or do_log(0, "Fingerprint - error sending a query: %s", $!);
$query_sent = 1;
}
return if !$query_sent;
bless { sock => $sock, wait_until => (Time::HiRes::time + $timeout),
query => $query, nonce => $nonce }, $class;
}
sub collect_response {
my $self = $_[0];
my $timeout = $self->{wait_until} - Time::HiRes::time;
if ($timeout < 0) { $timeout = 0 };
my $sock = $self->{sock};
my($resp,$nfound,$inbuf);
my($rin,$rout); $rin = ''; vec($rin,fileno($sock),1) = 1;
for (;;) {
$nfound = select($rout=$rin, undef, undef, $timeout);
last if !$nfound || $nfound < 0;
my $rv = $sock->sysread($inbuf,1024);
if (!defined $rv) {
if ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # slow down, just in case
} else {
do_log(2, "Fingerprint - error reading from socket: %s", $!);
}
} elsif (!$rv) { # sysread returns 0 at eof
last;
} else {
local($1,$2,$3);
if ($inbuf =~ /^([^ ]*) ([^ ]*) (.*)\015\012\z/) {
my($r_query,$r_nonce,$r_resp) = ($1,$2,$3);
if ($r_query eq $self->{query} && $r_nonce eq $self->{nonce})
{ $resp = $r_resp };
}
do_log(4,"Fingerprint collect: max_wait=%.3f, %.35s... => %s",
$timeout,$inbuf,$resp);
$timeout = 0;
}
}
defined $nfound && $nfound >= 0
or die "Fingerprint - select on socket failed: $!";
$sock->close or die "Error closing socket: $!";
$resp;
}
1;
__DATA__
#^L
package Amavis::TinyRedis;
use strict;
use re 'taint';
use warnings;
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
use Errno qw(EINTR EAGAIN EPIPE ENOTCONN ECONNRESET ECONNABORTED);
use IO::Socket::UNIX;
use Time::HiRes ();
use vars qw($VERSION);
BEGIN {
$VERSION = '1.000';
import Amavis::Conf qw(:platform); # $io_socket_module_name
}
sub new {
my($class, %args) = @_;
my $self = bless { args => {%args} }, $class;
my $outbuf = ''; $self->{outbuf} = \$outbuf;
$self->{batch_size} = 0;
$self->{server} = $args{server} || $args{sock} || '127.0.0.1:6379';
$self->{on_connect} = $args{on_connect};
return if !$self->connect;
$self;
}
sub DESTROY {
my $self = $_[0];
local($@, $!, $_);
undef $self->{sock};
}
sub disconnect {
my $self = $_[0];
local($@, $!);
undef $self->{sock};
}
sub connect {
my $self = $_[0];
$self->disconnect;
my $sock;
my $server = $self->{server};
if ($server =~ m{^/}) {
$sock = IO::Socket::UNIX->new(
Peer => $server, Type => SOCK_STREAM);
} elsif ($server =~ /^(?: \[ ([^\]]+) \] | ([^:]+) ) : ([^:]+) \z/xs) {
$server = defined $1 ? $1 : $2; my $port = $3;
$sock = $io_socket_module_name->new(
PeerAddr => $server, PeerPort => $port, Proto => 'tcp');
} else {
die "Invalid 'server:port' specification: $server";
}
if ($sock) {
$self->{sock} = $sock;
$self->{sock_fd} = $sock->fileno; $self->{fd_mask} = '';
vec($self->{fd_mask}, $self->{sock_fd}, 1) = 1;
# an on_connect() callback must not use batched calls!
$self->{on_connect}->($self) if $self->{on_connect};
}
$sock;
}
# Receive, parse and return $cnt consecutive redis replies as a list.
#
sub _response {
my($self, $cnt) = @_;
my $sock = $self->{sock};
if (!$sock) {
$self->connect or die "Connect failed: $!";
$sock = $self->{sock};
};
my @list;
for (1 .. $cnt) {
my $result = <$sock>;
if (!defined $result) {
$self->disconnect;
die "Error reading from Redis server: $!";
}
chomp $result;
my $resp_type = substr($result, 0, 1, '');
if ($resp_type eq '$') { # bulk reply
if ($result < 0) {
push(@list, undef); # null bulk reply
} else {
my $data = ''; my $ofs = 0; my $len = $result + 2;
while ($len > 0) {
my $nbytes = read($sock, $data, $len, $ofs);
if (!$nbytes) {
$self->disconnect;
defined $nbytes or die "Error reading from Redis server: $!";
die "Redis server closed connection";
}
$ofs += $nbytes; $len -= $nbytes;
}
chomp $data;
push(@list, $data);
}
} elsif ($resp_type eq ':') { # integer reply
push(@list, 0+$result);
} elsif ($resp_type eq '+') { # status reply
push(@list, $result);
} elsif ($resp_type eq '*') { # multi-bulk reply
push(@list, $result < 0 ? undef : $self->_response(0+$result) );
} elsif ($resp_type eq '-') { # error reply
die "$result\n";
} else {
die "Unknown Redis reply: $resp_type ($result)";
}
}
\@list;
}
sub _write_buff {
my($self, $bufref) = @_;
if (!$self->{sock}) { $self->connect or die "Connect failed: $!" };
my $nwrite;
for (my $ofs = 0; $ofs < length($$bufref); $ofs += $nwrite) {
# to reliably detect a disconnect we need to check for an input event
# using a select; checking status of syswrite is not sufficient
my($rout, $wout, $inbuff); my $fd_mask = $self->{fd_mask};
my $nfound = select($rout=$fd_mask, $wout=$fd_mask, undef, undef);
defined $nfound && $nfound >= 0 or die "Select failed: $!";
if (vec($rout, $self->{sock_fd}, 1) &&
!sysread($self->{sock}, $inbuff, 1024)) {
# eof, try reconnecting
$self->connect or die "Connect failed: $!";
}
local $SIG{PIPE} = 'IGNORE'; # don't signal on a write to a widowed pipe
$nwrite = syswrite($self->{sock}, $$bufref, length($$bufref)-$ofs, $ofs);
next if defined $nwrite;
$nwrite = 0;
if ($! == EINTR || $! == EAGAIN) { # no big deal, try again
Time::HiRes::sleep(0.1); # slow down, just in case
} else {
$self->disconnect;
if ($! == ENOTCONN || $! == EPIPE ||
$! == ECONNRESET || $! == ECONNABORTED) {
$self->connect or die "Connect failed: $!";
} else {
die "Error writing to redis socket: $!";
}
}
}
1;
}
# Send a redis command with arguments, returning a redis reply.
#
sub call {
my $self = shift;
my $buff = '*' . scalar(@_) . "\015\012";
$buff .= '$' . length($_) . "\015\012" . $_ . "\015\012" for @_;
$self->_write_buff(\$buff);
local($/) = "\015\012";
my $arr_ref = $self->_response(1);
$arr_ref && $arr_ref->[0];
}
# Append a redis command with arguments to a batch.
#
sub b_call {
my $self = shift;
my $bufref = $self->{outbuf};
$$bufref .= '*' . scalar(@_) . "\015\012";
$$bufref .= '$' . length($_) . "\015\012" . $_ . "\015\012" for @_;
++ $self->{batch_size};
}
# Send a batch of commands, returning an arrayref of redis replies,
# each array element corresponding to one command in a batch.
#
sub b_results {
my $self = $_[0];
my $batch_size = $self->{batch_size};
return if !$batch_size;
my $bufref = $self->{outbuf};
$self->_write_buff($bufref);
$$bufref = ''; $self->{batch_size} = 0;
local($/) = "\015\012";
$self->_response($batch_size);
}
1;
package Amavis::Redis;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::rfc2821_2822_Tools;
import Amavis::Util qw(ll do_log do_log_safe min max minmax untaint
safe_encode safe_encode_utf8 idn_to_ascii
format_time_interval unique_list snmp_count);
import Amavis::Lookup::IP qw(lookup_ip_acl normalize_ip_addr);
import Amavis::Timing qw(section_time);
}
sub new {
my($class, @redis_dsn) = @_;
bless { redis_dsn => \@redis_dsn }, $class;
}
sub disconnect {
my $self = $_[0];
# do_log(5, "redis: disconnect");
$self->{connected} = 0; undef $self->{redis};
}
sub on_connect {
my($self, $r) = @_;
my $db_id = $self->{db_id} || 0;
do_log(5, "redis: on_connect, db_id %d", $db_id);
eval {
$r->call('SELECT', $db_id) eq 'OK' ? 1 : 0;
} or do {
if ($@ =~ /^NOAUTH\b/ || $@ =~ /^ERR operation not permitted/) {
defined $self->{password}
or die "Redis server requires authentication, no password provided";
$r->call('AUTH', $self->{password});
$r->call('SELECT', $db_id);
} else {
chomp $@; die "Command 'SELECT $db_id' failed: $@";
}
};
eval {
$r->call('CLIENT', 'SETNAME', 'amavis['.$$.']') eq 'OK' ? 1 : 0;
} or do { # no big deal, just log
do_log(5, "redis: command 'CLIENT SETNAME' failed: %s", $@);
};
1;
}
sub connect {
my $self = $_[0];
# do_log(5, "redis: connect");
$self->disconnect if $self->{connected};
$self->{redis} = $self->{db_id} = $self->{ttl} = undef;
my($r, $err, $dsn, %options);
my $dsn_list_ref = $self->{redis_dsn};
for my $j (1 .. @$dsn_list_ref) {
$dsn = $dsn_list_ref->[0];
%options = ref $dsn eq 'HASH' ? %$dsn : ();
# expiration time (time-to-live) is 16 days by default
$self->{ttl} = exists $options{ttl} ? $options{ttl} : $storage_redis_ttl;
$self->{db_id} = $options{db_id};
if (defined $options{password}) {
$self->{password} = $options{password};
$options{password} = '(hidden)'; # for logging purposes
}
undef $err;
eval {
my %opt = %options; delete @opt{qw(ttl db_id password)};
$opt{server} = idn_to_ascii($opt{server}) if defined $opt{server};
$r = Amavis::TinyRedis->new(on_connect => sub { $self->on_connect(@_) },
%opt);
$r or die "Error: $!";
} or do {
undef $r; $err = $@; chomp $err;
};
$self->{redis} = $r;
last if $r; # success, done
if ($j < @$dsn_list_ref) { # not all tried yet
do_log(0, "Can't connect to a redis server, %s: %s; trying next",
join(' ',%options), $err);
push(@$dsn_list_ref, shift @$dsn_list_ref); # rotate left
}
}
if (!$r) {
$self->{redis} = $self->{db_id} = $self->{ttl} = undef;
die sprintf("Can't connect to a redis server %s: %s\n",
join(' ',%options), $err);
}
$self->{connected} = 1;
ll(5) && do_log(5, "redis: connected to: %s, ttl %s s",
!defined $options{server} ? 'default server'
: join(' ',%options),
$self->{ttl}||'x');
section_time("redis-connect");
$self->load_lua_programs;
$r;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::Redis DESTROY called");
# ignore potential errors during DESTROY of a Redis object
eval { $self->{connected} = 0; undef $self->{redis} };
}
# find a penpals record which proves that a local user (sender) really sent a
# mail to a given recipient some time ago. Returns an interval time in seconds
# since the last such mail was sent by our local user to a specified recipient
# (or undef if information is not available). If @$message_id_list is a
# nonempty list of Message-IDs as found in References header field, the query
# also finds previous outgoing messages with a matching Message-ID but
# possibly to recipients different from what the mail was originally sent to.
#
sub penpals_find {
my($self, $msginfo, $message_id_list) = @_;
my $sender = $msginfo->sender;
$message_id_list = [] if !$message_id_list;
return if !@$message_id_list && $sender eq '';
# inbound or internal_to_internal, except self_to_self
my(@per_recip_data) = grep(!$_->recip_done && $_->recip_is_local &&
lc($sender) ne lc($_->recip_addr),
@{$msginfo->per_recip_data});
return if !@per_recip_data;
# do_log(5, "redis: penpals_find");
snmp_count('PenPalsAttempts');
my $sender_smtp = $msginfo->sender_smtp;
local($1); $sender_smtp =~ s/^<(.*)>\z/$1/s;
my(@recip_addresses) =
map { my $a = $_->recip_addr_smtp; $a =~ s/^<(.*)>\z/$1/s; lc $a }
@per_recip_data;
# NOTE: swap recipient and sender in a query here, as we are
# now checking for a potential reply mail - whether the current
# recipient has recently sent any mail to the sender of the
# current mail:
# no need for cryptographical strength, just checking for protocol errors
my $nonce = $msginfo->mail_id;
my $result;
my @args = (
0, sprintf("%.0f",$msginfo->rx_time), $nonce, lc $sender_smtp,
scalar @recip_addresses, @recip_addresses,
scalar @$message_id_list, @$message_id_list,
);
eval {
$self->connect if !$self->{connected};
$result =
$self->{redis}->call('EVALSHA', $self->{lua_query_penpals}, @args);
1;
} or do { # Lua function probably not cached, define again and re-try
if ($@ !~ /^NOSCRIPT/) {
$self->disconnect; undef $result; chomp $@;
do_log(-1, 'penpals_find, Redis Lua error: %s', $@);
} else {
$self->load_lua_programs;
$result =
$self->{redis}->call('EVALSHA', $self->{lua_query_penpals}, @args);
}
};
my $ok = 1;
if (!$result || !@$result) {
$ok = 0; $self->disconnect;
do_log(0, "redis: penpals_find - no results");
} else {
my $r_nonce = pop(@$result);
if (!defined($r_nonce) || $r_nonce ne $nonce) {
# redis protocol falling out of step?
$ok = 0; $self->disconnect;
do_log(-1,"redis: penpals_find - nonce mismatch, expected %s, got %s",
$nonce, defined $r_nonce ? $r_nonce : 'UNDEF');
}
}
if ($ok && (@$result != @per_recip_data)) {
$ok = 0; $self->disconnect;
do_log(-1,"redis: penpals_find - number of results expected %d, got %d",
scalar @per_recip_data, scalar @$result);
}
if ($ok) {
for my $r (@per_recip_data) {
my $result_entry = shift @$result;
next if !$result_entry;
my($sid, $rid, $send_time, $best_ref_mail_id, $report) = @$result_entry;
if (!$send_time) { # undef or empty (or zero)
snmp_count('PenPalsMisses');
ll(4) && do_log(4, "penpals: (redis) not found (%s,%s)%s%s",
$sid ? $sid : $r->recip_addr_smtp,
$rid ? $rid : $msginfo->sender_smtp,
!$report ? '' : ', refs: '.$report,
!@$message_id_list ? '' :
'; '.join(', ',@$message_id_list) );
} else { # found a previous related correspondence
snmp_count('PenPalsHits');
my $age = max(0, $msginfo->rx_time - $send_time);
$r->recip_penpals_age($age);
$r->recip_penpals_related($best_ref_mail_id);
ll(3) && do_log(3, "penpals: (redis) found (%s,%s) age %s%s",
$sid ? $sid : $r->recip_addr_smtp,
$rid ? $rid : $msginfo->sender_smtp,
format_time_interval($age),
!$report ? '' : ', refs: '.$report );
# $age and $best_ref_mail_id are not logged explicitly,
# as they can be seen in the first entry of a lua query report
# (i.e. the last string)
}
}
}
$ok;
}
sub save_info_preliminary {
my($self, $msginfo) = @_;
my $mail_id = $msginfo->mail_id;
defined $mail_id or die "save_info_preliminary: mail_id still undefined";
$self->connect if !$self->{connected};
ll(5) && do_log(5, 'redis: save_info_preliminary: %s, %s, ttl %s s',
$mail_id, int $msginfo->rx_time, $self->{ttl}||'x');
# use Lua to do HSETNX *and* EXPIRE atomically, otherwise we risk inserting
# a key with no expiration time if redis server goes down inbetween
my $added;
my $r = $self->{redis};
my(@args) = (1, $mail_id, int $msginfo->rx_time,
$self->{ttl} ? int $self->{ttl} : 0);
eval {
$added = $r->call('EVALSHA', $self->{lua_save_info_preliminary}, @args);
1;
} or do { # Lua function probably not cached, define again and re-try
if ($@ !~ /^NOSCRIPT/) {
$self->disconnect; chomp $@;
do_log(-1, 'save_info_preliminary, Redis Lua error: %s', $@);
} else {
$self->load_lua_programs;
$added = $r->call('EVALSHA', $self->{lua_save_info_preliminary}, @args);
}
};
$self->disconnect if !$database_sessions_persistent;
$added; # 1 if added successfully, false otherwise
}
sub query_and_update_ip_reputation {
my($self, $msginfo) = @_;
my $ip_trace_ref = $msginfo->ip_addr_trace_public;
return if !$ip_trace_ref;
my @ip_trace = unique_list($ip_trace_ref);
return if !@ip_trace;
# Irwin-Hall distribution - approximates normal distribution
# n = 4, mean = n/2, variance = n/12, sigma = sqrt(n/12) =~ 0.577
my $normal_random = (rand() + rand() + rand() + rand() - 2) / 0.577;
my(@args) = (scalar @ip_trace, map("ip:$_",@ip_trace),
sprintf("%.3f", $msginfo->rx_time),
sprintf("%.6f", $normal_random) );
my($r, $ip_stats);
eval {
$self->connect if !$self->{connected};
$r = $self->{redis};
$ip_stats = $r->call('EVALSHA', $self->{lua_query_and_update_ip}, @args);
1;
} or do { # Lua function probably not cached, define again and re-try
if ($@ !~ /^NOSCRIPT/) {
$self->disconnect; chomp $@;
do_log(-1, "query_and_update_ip_reputation, Redis Lua error: %s", $@);
} else {
$self->load_lua_programs;
$ip_stats = $r->call('EVALSHA', $self->{lua_query_and_update_ip}, @args);
}
};
my($highest_score, $worst_ip);
for my $entry (!$ip_stats ? () : @$ip_stats) {
my($ip, $n_all, $s, $h, $b, $tfirst, $tlast, $ttl) = @$entry;
$ip =~ s/^ip://s; # strip key prefix
# the current event is not yet counted nor classified
if ($n_all <= 0) {
do_log(5, "redis: IP %s ttl: %.1f h", $ip, $ttl/3600);
} else {
my $n_other = $n_all - ($s + $h + $b);
if ($n_other < 0) { $n_all = $s + $h + $b; $n_other = 0 } # just in case
my $bad_content_ratio = ($s+$b) / $n_all;
# gains strength by the number of samples, watered down by share of ham
my $score = !($s+$b) ? 0 : 0.9 * ($n_all**0.36) * exp(-6 * $h/$n_all);
my $ip_ignore;
if ($score >= 0.05) {
# it is cheaper to do a redis/lookup unconditionally,
# then ditch an ignored IP address later if necessary
my($key, $err);
($ip_ignore, $key, $err) =
lookup_ip_acl($ip, @{ca('ip_repu_ignore_maps')});
undef $ip_ignore if $err;
}
my $ll = ($score <= 0 || $ip_ignore) ? 3 : 2; # log level
if (ll($ll)) {
my $rxtime = $msginfo->rx_time;
do_log($ll, "redis: IP %s age: %s%s, ttl: %.1f h, %s, %s%s",
$ip, format_time_interval($rxtime-$tfirst),
defined $tlast ? ', last: '.format_time_interval($rxtime-$tlast) :'',
$ttl/3600,
$n_other ?
($b ? "s/h/bv/?: $s/$h/$b/$n_other" : "s/h/?: $s/$h/$n_other")
: ($b ? "s/h/bv: $s/$h/$b" : "s/h: $s/$h"),
$score <= 0 ? 'clean' : sprintf("%.0f%%, score: %.1f",
100*$bad_content_ratio, $score),
$ip_ignore ? ' =>0 ip_repu_ignore' : '');
}
$score = 0 if $ip_ignore || $score < 0.05;
if (!defined $highest_score || $score > $highest_score) {
$highest_score = $score; $worst_ip = $ip;
}
}
}
$self->disconnect if !$database_sessions_persistent;
($highest_score, $worst_ip);
}
sub save_structured_report {
my($self, $report_ref, $log_key, $queue_size_limit) = @_;
return if !$report_ref;
$self->connect if !$self->{connected};
my $r = $self->{redis};
my $report_json = Amavis::JSON::encode($report_ref); # as string of chars
# use safe_encode() instead of safe_encode_utf8() here, this way we ensure
# the resulting string of octets is always a valid UTF-8, even in case
# of a non-ASCII input string with utf8 flag off
$report_json = safe_encode('UTF-8', $report_json); # convert to octets
do_log(5, "redis: structured_report: %s %s", $log_key, $report_json);
$r->b_call("RPUSH", $log_key, $report_json);
# keep most recent - queue size limit in case noone is pulling events
$r->b_call("LTRIM", $log_key, -$queue_size_limit, -1) if $queue_size_limit;
my $res = $r->b_results; # errors will be signalled
do_log(5, "redis: save_structured_report, %d bytes, q_lim=%s, q_size=%s",
length $report_json, $queue_size_limit || 0,
$res ? join(', ',@$res) : '?') if ll(5);
1;
}
sub save_info_final {
my($self, $msginfo, $report_ref) = @_;
$self->connect if !$self->{connected};
my $r = $self->{redis};
if (c('enable_ip_repu')) {
my $rigm = ca('ip_repu_ignore_maps');
my $ip_trace_ref = $msginfo->ip_addr_trace_public;
my @ip_trace;
@ip_trace = grep { my($ignore, $key, $err) = lookup_ip_acl($_, @$rigm);
!$ignore || $err;
} unique_list($ip_trace_ref) if $ip_trace_ref;
if (@ip_trace) {
my $content =
$msginfo->is_in_contents_category(CC_VIRUS) ? 'b' :
$msginfo->is_in_contents_category(CC_BANNED) ? 'b' : undef;
if (!defined $content) { # test for ham or spam
my($min, $max);
for my $r (@{$msginfo->per_recip_data}) {
my $spam_level = $r->spam_level;
next if !defined $spam_level;
$max = $spam_level if !defined $max || $spam_level > $max;
$min = $spam_level if !defined $min || $spam_level < $min;
}
if (defined $min) {
my $ip_repu_score = $msginfo->ip_repu_score || 0; # positive or 0
# avoid self-reinforcing feedback in the IP reputation auto-learning,
# use the score without the past IP reputation contribution
if ($max - $ip_repu_score < 0.5) { $content = 'h' }
elsif ($min - $ip_repu_score >= 5) { $content = 's' }
}
}
if (!defined $content) {
# just increment the total counter
$r->b_call("HINCRBY", "ip:$_", 'n', 1) for @ip_trace;
$r->b_results;
if (ll(5)) { do_log(5,"redis: IP INCR %s", $_) for @ip_trace }
} else {
# content type is known
for (@ip_trace) {
$r->b_call("HINCRBY", "ip:$_", 'n', 1);
$r->b_call("HINCRBY", "ip:$_", $content, 1);
}
my $counts = $r->b_results;
if (ll(5) && $counts) {
do_log(5,"redis: IP INCR %s n=%d, %s=%d",
$_, shift @$counts, $content, shift @$counts) for @ip_trace;
}
}
}
}
if (!$msginfo->originating) {
# don't bother saving info on incoming messages, saves Redis storage
# while still offering necessary data for a pen pals function
$self->disconnect if !$database_sessions_persistent;
return;
}
my $mail_id = $msginfo->mail_id;
defined $mail_id or die "save_info_preliminary: mail_id still undefined";
my $sender_smtp = $msginfo->sender_smtp;
local($1); $sender_smtp =~ s/^<(.*)>\z/$1/s;
my(@recips); # only recipients which did receive a message
for my $r (@{$msginfo->per_recip_data}) {
my($dest, $resp) = ($r->recip_destiny, $r->recip_smtp_response);
next if $dest != D_PASS || ($r->recip_done && $resp !~ /^2/);
my $addr_smtp = $r->recip_addr_smtp;
next if !defined $addr_smtp;
local($1); $addr_smtp =~ s/^<(.*)>\z/$1/s;
# don't remember messages sent to self
next if lc($sender_smtp) eq lc($addr_smtp);
# don't remember problematic outgoing messages, even if delivered
next if $r->is_in_contents_category(CC_VIRUS) ||
$r->is_in_contents_category(CC_BANNED) ||
$r->is_in_contents_category(CC_SPAM) || # kill_level
$r->is_in_contents_category(CC_SPAMMY); # tag2_level
push(@recips, lc $addr_smtp);
}
my $m_id = $msginfo->get_header_field_body('message-id');
$m_id = join(' ',parse_message_id($m_id))
if defined $m_id && $m_id ne ''; # strip CFWS
my(@args) = map(defined $_ ? $_ : '', # avoid nil in a Lua table
($self->{ttl}, $msginfo->log_id,
$m_id, $msginfo->client_addr, lc $sender_smtp, @recips) );
if (!@recips) {
do_log(5,"redis: save_info_final: %s deleted", $mail_id);
} elsif (ll(5)) {
do_log(5,"redis: save_info_final: %s, passed %d of %d recips, %s",
$mail_id, scalar @recips, scalar @{$msginfo->per_recip_data},
join(', ',@args));
}
my $result;
eval {
$result = $r->call('EVALSHA', $self->{lua_save_final},
1, $mail_id, @args);
1;
} or do { # Lua function probably not cached, define again and re-try
if ($@ !~ /^NOSCRIPT/) {
$self->disconnect; undef $result; chomp $@;
do_log(-1, "save_info_final, Redis Lua error: %s", $@);
} else {
$self->load_lua_programs;
$result = $r->call('EVALSHA', $self->{lua_save_final},
1, $mail_id, @args);
}
};
my $ok = 1;
my $r_nonce = $result;
if (!defined($r_nonce) || $r_nonce ne $mail_id) {
# redis protocol falling out of step?
$ok = 0; $self->disconnect;
do_log(-1,"redis: save_info_final - nonce mismatch, expected %s, got %s",
$mail_id, defined $r_nonce ? $r_nonce : 'UNDEF');
}
# $r->call("EVAL", 'collectgarbage()', 0);
$self->disconnect if !$database_sessions_persistent;
$ok;
}
sub load_lua_programs($) {
my $self = $_[0];
do_log(5, "redis: load_lua_programs");
my $r = $self->{redis};
eval {
$self->{lua_save_info_preliminary} = $r->call('SCRIPT', 'LOAD', <<'END');
--LUA_SAVE_INFO_PRELIMINARY
local rcall, tonumber = redis.call, tonumber
local mail_id, rx_time, ttl = KEYS[1], ARGV[1], ARGV[2]
-- ensure the mail_id is unique, report false otherwise
local added = rcall("HSETNX", mail_id, "time", rx_time)
if added == 1 and ttl and tonumber(ttl) > 0 then
if rcall("EXPIRE", mail_id, ttl) ~= 1 then
return { err = "Failed to set EXPIRE on key " .. mail_id }
end
end
return added -- 1:yes, 0:no,failed
END
} or do {
$self->disconnect; die "Redis LUA error - lua_save_info_preliminary: $@\n"
};
eval {
$self->{lua_save_final} = $r->call('SCRIPT', 'LOAD', <<'END');
--LUA_SAVE_FINAL
local mail_id = KEYS[1]
local rcall = redis.call
local ARGV = ARGV
-- not delivered to any recipient, just delete the useless record
if #ARGV < 6 then
rcall("DEL", mail_id)
else
local ttl, log_id, msgid, client_addr, sender = unpack(ARGV,1,5)
local tonumber, unpack = tonumber, unpack
if not tonumber(ttl) or tonumber(ttl) <= 0 then ttl = nil end
local addresses = { [sender] = true }
-- remaining arguments 6 to #ARGV are recipient addresses
for r = 6, #ARGV do addresses[ARGV[r]] = true end
-- create mail address -> id mapping
for addr in pairs(addresses) do
local addr_key = "a:" .. addr
local addr_id
if not ttl then
addr_id = rcall("GET", addr_key)
else
-- to avoid potential race between GET and EXPIRE, set EXPIRE first
local refreshed = rcall("EXPIRE", addr_key, ttl)
if refreshed == 1 then addr_id = rcall("GET", addr_key) end
end
if not addr_id then
-- not found, assign a new id and store the email address
addr_id = rcall("INCR", "last.id.addr") -- get next id, starts at 1
addr_id = tostring(addr_id)
local ok
if ttl then
ok = rcall("SET", addr_key, addr_id, "EX", ttl, "NX")
else
ok = rcall("SET", addr_key, addr_id, "NX")
end
if not ok then
-- shouldn't happen, Lua program runs atomically, but anyway...
addr_id = rcall("GET", addr_key) -- collision, retry
end
end
addresses[addr] = addr_id
end
-- create a Message-ID -> id mapping
local msgid_key = "m:" .. msgid
local msgid_id = rcall("GET", msgid_key)
if msgid_id then -- unlikely duplicate Message-ID, but anyway...
if ttl then rcall("EXPIRE", msgid_key, ttl) end -- extend its lifetime
else
msgid_id = rcall("INCR", "last.id.msgid") -- get next id, starts at 1
msgid_id = tostring(msgid_id)
local ok
if ttl then
ok = rcall("SET", msgid_key, msgid_id, "EX", ttl, "NX")
else
ok = rcall("SET", msgid_key, msgid_id, "NX")
end
if not ok then
-- shouldn't happen, Lua program runs atomically, but anyway...
msgid_id = rcall("GET", msgid_key) -- collision, retry
end
end
-- store additional information to an existing mail_id record
local sender_id = addresses[sender]
rcall("HSET", mail_id, "log", log_id)
-- rcall("HMSET", mail_id, "log", log_id,
-- "msgid", msgid_id, "ip", client_addr, "sender", sender_id)
-- store relations: sender/msgid and sender/recipient pairs
local mapkeys = { "sm:" .. sender_id .. "::" .. msgid_id }
for r = 6, #ARGV do
local recip_id = addresses[ARGV[r]]
-- only the most recent sr:* record is kept, older are overwritten
mapkeys[#mapkeys+1] = "sr:" .. sender_id .. ":" .. recip_id
-- mapkeys[#mapkeys+1] = "srm:" .. sender_id .. ":" .. recip_id ..
-- ":" .. msgid_id
end
if not ttl then
for _,k in ipairs(mapkeys) do rcall("SET", k, mail_id) end
else
for _,k in ipairs(mapkeys) do rcall("SET", k, mail_id, "EX", ttl) end
end
end
return mail_id
END
} or do {
$self->disconnect; die "Redis LUA error - lua_save_final: $@\n"
};
eval {
$self->{lua_query_and_update_ip} = $r->call('SCRIPT', 'LOAD', <<'END');
--LUA_QUERY_AND_UPDATE_IP
local rcall, tonumber, unpack, floor, sprintf =
redis.call, tonumber, unpack, math.floor, string.format
local KEYS, ARGV = KEYS, ARGV
local rx_time, normal_random = ARGV[1], tonumber(ARGV[2])
local results = {}
for j = 1, #KEYS do
local ipkey = KEYS[j] -- an IP address, prefixed by "ip:"
local tfirst, tlast -- Unix times of creation and last access
local n, s, h, b -- counts: all, spam, ham, banned+virus
local age, ttl -- time since creation, time to live in seconds
local ip_addr_data =
rcall("HMGET", ipkey, 'tl', 'tf', 'n', 's', 'h', 'b')
if ip_addr_data then
tlast, tfirst, n, s, h, b = unpack(ip_addr_data,1,6)
end
if not tlast then -- does not exist, a new entry is needed
n = 0; tfirst = rx_time; ttl = 3*3600 -- 3 hours for new entries
rcall("HMSET", ipkey, 'tf', rx_time, 'tl', rx_time, 'n', '0')
else -- a record for this IP address exists, collect its counts and age
n = tonumber(n) or 0
local rx_time_n, tfirst_n, tlast_n =
tonumber(rx_time), tonumber(tfirst), tonumber(tlast)
if rx_time_n and tfirst_n and tlast_n then -- valid numbers
age = rx_time_n - tfirst_n -- time since entry creation
local dt = rx_time_n - tlast_n -- time since last occurrence
ttl = 3600 * (n >= 8 and 80 or (3 + n^2.2)) -- 4 to 80 hours
if ttl < 1.5 * dt then ttl = 1.5 * dt end
else -- just in case - ditch a record with invalid fields
n = 0; tfirst = rx_time; ttl = 3*3600
rcall("DEL", ipkey);
rcall("HMSET", ipkey, 'tf', rx_time, 'n', '0')
end
rcall("HMSET", ipkey, 'tl', rx_time) -- update its last-seen time
end
-- the 's', 'h', 'b' and 'n' counts will be updated later
if normal_random then
-- introduce some randomness, don't let spammers depend on a fixed ttl
ttl = ttl * (1 + normal_random * 0.2)
if ttl < 4000 then ttl = 4000 end -- no less than 1h 7min
end
-- set time-to-live in seconds, capped at 3 days, integer
if age and (age + ttl > 3*24*3600) then ttl = 3*24*3600 - age end
if ttl < 1 then
rcall("DEL", ipkey); ttl = 0
else
rcall("EXPIRE", ipkey, floor(ttl))
end
results[#results+1] = { ipkey, n or 0, s or 0, h or 0, b or 0,
tfirst or "", tlast or "", ttl }
end
return results
END
} or do {
$self->disconnect; die "Redis LUA error - lua_query_and_update_ip: $@\n"
};
eval {
$self->{lua_query_penpals} = $r->call('SCRIPT', 'LOAD', <<'END');
--LUA_QUERY_PENPALS
local tonumber, unpack, sprintf = tonumber, unpack, string.format
local rcall = redis.call
local ARGV = ARGV
local now, nonce, recipient = ARGV[1], ARGV[2], ARGV[3]
local senders_count = tonumber(ARGV[4])
local senders_argv_ofs = 5
local messageid_argv_ofs = senders_argv_ofs + senders_count + 1
local messageid_count = tonumber(ARGV[messageid_argv_ofs - 1])
local q_keys1 = {}
-- current sender as a potential previous recipient
if recipient == '' then recipient = nil end -- nothing ever sent to "<>"
if recipient then
q_keys1[#q_keys1+1] = "a:" .. recipient
end
for j = 1, senders_count do
q_keys1[#q_keys1+1] = "a:" .. ARGV[senders_argv_ofs + j - 1]
end
for j = 1, messageid_count do
q_keys1[#q_keys1+1] = "m:" .. ARGV[messageid_argv_ofs + j - 1]
end
-- map e-mail addresses and referenced Message-IDs to internal id numbers
local q_result = rcall("MGET", unpack(q_keys1))
q_keys1 = nil
local rid -- internal id of a recipient's e-mail addresses
local mids = {} -- internal ids corresponding to referenced "Message-ID"s
local senders = {}
if q_result then
local k = 0;
if recipient then -- nonempty e-mail address, i.e. not "<>"
k = k+1; rid = q_result[k]
end
for j = 1, senders_count do
k = k+1;
if not q_result[k] then senders[j] = false -- non-nil
else senders[j] = { sid = q_result[k] } end
end
for j = 1, messageid_count do
k = k+1; if q_result[k] then mids[q_result[k]] = true end
end
end
q_result = nil
-- prepare query keys to find a closest-matching previous e-mail message
-- for each sender
local q_keys2, belongs_to_sender, on_hit_txt = {}, {}, {}
for _, s in ipairs(senders) do
if s then
-- try sender/Message-ID pairs without a recipient
for m in pairs(mids) do
local nxt = #q_keys2 + 1
q_keys2[nxt] = "sm:" .. s.sid .. "::" .. m
on_hit_txt[nxt] = "mid=" .. m
belongs_to_sender[nxt] = s
end
-- try a sender/recipient pair without a Message-ID ref
if rid then
local nxt = #q_keys2 + 1
q_keys2[nxt] = "sr:" .. s.sid .. ":" .. rid
on_hit_txt[nxt] = "rid=" .. rid
belongs_to_sender[nxt] = s
end
end
end
-- get an internal id (or nil) of a matching mail_id for each query key
local q_result2
if #q_keys2 >= 1 then q_result2 = rcall("MGET", unpack(q_keys2)) end
local msginfo = {} -- data about a message mail_id (e.g. its rx_time)
if q_result2 then
for j = 1, #q_keys2 do
local rx_time_n
local mail_id = q_result2[j]
if not mail_id then
-- no matching mail_id
elseif msginfo[mail_id] then -- already looked-up
rx_time_n = msginfo[mail_id].rx_time_n
else -- not yet looked-up
msginfo[mail_id] = {}
-- see if a record for this mail_id exists, find its timestamp
rx_time_n = tonumber(rcall("HGET", mail_id, "time"))
msginfo[mail_id].rx_time_n = rx_time_n
end
if rx_time_n then -- exists and is a valid number
local s = belongs_to_sender[j]
if not s.hits then s.hits = {} end
if not s.hits[mail_id] then
s.hits[mail_id] = on_hit_txt[j]
else
s.hits[mail_id] = s.hits[mail_id] .. " " .. on_hit_txt[j]
end
-- for each sender manage a sorted list of mail_ids found
if not s.mail_id_list then
s.mail_id_list = { mail_id }
else
-- keep sender's mail_id_list sorted by rx_time, highest first
local mail_id_list = s.mail_id_list
local first_smaller_ind
for j = 1, #mail_id_list do
if msginfo[mail_id_list[j]].rx_time_n <= rx_time_n then
first_smaller_ind = j; break
end
end
table.insert(mail_id_list,
first_smaller_ind or #mail_id_list+1, mail_id)
end
end
end
end
local results = {} -- one entry for each sender, followed by a nonce
for _, s in ipairs(senders) do
if not s or not s.mail_id_list then -- no matching mail_id
results[#results+1] = { s and s.sid or "", rid }
else -- some matches for this sender, compile a report
local report = {}; local mail_id_list = s.mail_id_list
for _, mail_id in ipairs(mail_id_list) do -- first is best
report[#report+1] = sprintf("%s (%.0f s) %s", mail_id,
tonumber(now) - msginfo[mail_id].rx_time_n,
s.hits and s.hits[mail_id] or "")
end
results[#results+1] =
{ s.sid or "", rid or "", msginfo[mail_id_list[1]].rx_time_n,
mail_id_list[1], table.concat(report,", ") }
end
end
results[#results+1] = nonce
return results
END
1;
} or do {
$self->disconnect; die "Redis LUA error - lua_query_penpals: $@\n"
};
ll(5) && do_log(5, "redis: SHA fingerprints: final %s, query %s",
map(substr($_,0,10), @$self{qw(lua_save_final lua_query)}));
section_time("redis-load");
1;
}
1;
__DATA__
#^L
package Amavis::Out::SQL::Connection;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Util qw(ll do_log do_log_safe);
import Amavis::Timing qw(section_time);
}
use DBI qw(:sql_types);
# one object per connection (normally exactly one) to a database server;
# connection need not exist at all times, stores info on how to connect;
# when connected it holds a database handle
#
sub new {
my($class, @dsns) = @_; # a list of DSNs to try connecting to sequentially
bless { dbh=>undef, sth=>undef, incarnation=>1, in_transaction=>0,
dsn_list=>\@dsns, dsn_current=>undef }, $class;
}
sub dsn_current { # get/set information on currently connected data set name
my $self = shift; !@_ ? $self->{dsn_current} : ($self->{dsn_current}=shift);
}
sub dbh { # get/set database handle
my $self = shift; !@_ ? $self->{dbh} : ($self->{dbh}=shift);
}
sub sth { # get/set statement handle
my $self = shift; my $clause = shift;
!@_ ? $self->{sth}{$clause} : ($self->{sth}{$clause}=shift);
}
sub dbh_inactive { # get/set dbh "InactiveDestroy" attribute
my $self = shift;
my $dbh = $self->dbh;
return if !$dbh;
!@_ ? $dbh->{'InactiveDestroy'} : ($dbh->{'InactiveDestroy'}=shift);
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::Out::SQL::Connection DESTROY called");
# ignore failures, make perlcritic happy
eval { $self->disconnect_from_sql } or 1;
}
# returns current connection version; works like cache versioning/invalidation:
# SQL statement handles need to be rebuilt and caches cleared when SQL
# connection is re-established and a new database handle provided
#
sub incarnation { my $self = $_[0]; $self->{incarnation} }
sub in_transaction {
my $self = shift;
!@_ ? $self->{in_transaction} : ($self->{in_transaction}=shift)
}
# returns DBD driver name such as 'Pg', 'mysql'; or undef if unknown
#
sub driver_name {
my $self = $_[0]; my $dbh = $self->dbh;
$dbh or die "sql driver_name: dbh not available";
!$dbh->{Driver} ? undef : $dbh->{Driver}->{Name};
}
# DBI method wrappers:
#
sub begin_work {
my $self = shift; do_log(5,"sql begin transaction");
# DBD::mysql man page: if you detect an error while changing
# the AutoCommit mode, you should no longer use the database handle.
# In other words, you should disconnect and reconnect again
$self->dbh or $self->connect_to_sql;
my $stat; my $eval_stat;
eval {
$stat = $self->dbh->begin_work(@_); 1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
};
if (defined $eval_stat || !$stat) {
do_log(-1,"sql begin transaction failed, ".
"probably disconnected by server, reconnecting (%s)", $eval_stat);
$self->disconnect_from_sql;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
$self->connect_to_sql;
$stat = $self->dbh->begin_work(@_);
}
$self->in_transaction(1);
$stat;
};
sub begin_work_nontransaction {
my $self = $_[0]; do_log(5,"sql begin, nontransaction");
$self->dbh or $self->connect_to_sql;
};
sub commit {
my $self = shift; do_log(5,"sql commit");
$self->in_transaction(0);
my $dbh = $self->dbh;
$dbh or die "commit: dbh not available";
$dbh->commit(@_); my($rv_err,$rv_str) = ($dbh->err, $dbh->errstr);
do_log(2,"sql commit status: err=%s, errstr=%s",
$rv_err,$rv_str) if defined $rv_err;
($rv_err,$rv_str); # potentially useful to see non-fatal errors
};
sub rollback {
my $self = shift; do_log(5,"sql rollback");
$self->in_transaction(0);
$self->dbh or die "rollback: dbh not available";
eval {
$self->dbh->rollback(@_); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"sql rollback error, reconnecting (%s)", $eval_stat);
$self->disconnect_from_sql;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
$self->connect_to_sql;
# $self->dbh->rollback(@_); # too late now, hopefully implied in disconnect
};
};
sub fetchrow_arrayref {
my($self,$clause,@args) = @_;
$self->dbh or die "fetchrow_arrayref: dbh not available";
my $sth = $self->sth($clause);
$sth or die "fetchrow_arrayref: statement handle not available";
$sth->fetchrow_arrayref(@args);
};
sub finish {
my($self,$clause,@args) = @_;
$self->dbh or die "finish: dbh not available";
my $sth = $self->sth($clause);
$sth or die "finish: statement handle not available";
$sth->finish(@args);
};
sub execute {
my($self,$clause,@args) = @_;
$self->dbh or die "sql execute: dbh not available";
my $sth = $self->sth($clause); # fetch cached st. handle or prepare new
if ($sth) {
ll(5) && do_log(5, "sql: executing clause (%d args): %s",
scalar(@args), $clause);
} else {
ll(4) && do_log(4,"sql: preparing and executing (%d args): %s",
scalar(@args), $clause);
$sth = $self->dbh->prepare($clause); $self->sth($clause,$sth);
$sth or die "sql: prepare failed: ".$DBI::errstr;
}
my($rv_err,$rv_str);
eval {
for my $j (0..$#args) { # arg can be a scalar or [val,type] or [val,\%attr]
my $arg = $args[$j];
$sth->bind_param($j+1, !ref($arg) ? $arg : @$arg);
# ll(5) && do_log(5, "sql: bind %d: %s",
# $j+1, !ref($arg) ? $arg : '['.join(',',@$arg).']' );
}
$sth->execute; $rv_err = $sth->err; $rv_str = $sth->errstr; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
# man DBI: ->err code is typically an integer but you should not assume so
# $DBI::errstr is normally already contained in $eval_stat
my $sqlerr = $sth ? $sth->err : $DBI::err;
my $sqlstate = $sth ? $sth->state : $DBI::state;
my $msg = sprintf("err=%s, %s, %s", $sqlerr, $sqlstate, $eval_stat);
if (!$sth) {
die "sql execute (no handle): ".$msg;
} elsif (! ($sqlerr eq '2006' || $sqlerr eq '2013' || # MySQL
($sqlerr == -1 && $sqlstate eq 'S1000') || # PostgreSQL 7
($sqlerr == 7 && $sqlstate =~ /^(S8|08|57)...\z/i) )) { #PgSQL
# libpq-fe.h: ExecStatusType PGRES_FATAL_ERROR=7
# ignore failures, make perlcritic happy
eval { $self->disconnect_from_sql } or 1; # better safe than sorry
die "sql exec: $msg\n";
} else { # Server has gone away; Lost connection to...
# MySQL: 2006, 2013; PostgreSQL: 7
if ($self->in_transaction) {
# ignore failures, make perlcritic happy
eval { $self->disconnect_from_sql } or 1;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "sql execute failed within transaction, $msg";
} else { # try one more time
do_log(0,"NOTICE: reconnecting in response to: %s", $msg);
# ignore failures, make perlcritic happy
eval { $self->disconnect_from_sql } or 1;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
$self->connect_to_sql;
$self->dbh or die "sql execute: reconnect failed";
do_log(4,"sql: preparing and executing (again): %s", $clause);
$sth = $self->dbh->prepare($clause); $self->sth($clause,$sth);
$sth or die "sql: prepare (reconnected) failed: ".$DBI::errstr;
$rv_err = $rv_str = undef;
eval {
for my $j (0..$#args) { # a scalar or [val,type] or [val,\%attr]
$sth->bind_param($j+1, !ref($args[$j]) ? $args[$j] : @{$args[$j]});
}
$sth->execute; $rv_err = $sth->err; $rv_str = $sth->errstr; 1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$msg = sprintf("err=%s, %s, %s", $DBI::err,$DBI::state,$eval_stat);
$self->disconnect_from_sql;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
die "sql execute failed again, $msg";
};
}
}
};
# $rv_err: undef indicates success, "" indicates an 'information',
# "0" indicates a 'warning', true indicates an error
do_log(2,"sql execute status: err=%s, errstr=%s",
$rv_err,$rv_str) if defined $rv_err;
($rv_err,$rv_str); # potentially useful to see non-fatal errors
}
# Connect to a database. Take a list of database connection
# parameters and try each until one succeeds.
# -- based on code from Ben Ransford <amavis@uce.ransford.org> 2002-09-22
#
sub connect_to_sql {
my $self = shift; # a list of DSNs to try connecting to sequentially
my $dbh; my(@dsns) = @{$self->{dsn_list}};
do_log(3,"Connecting to SQL database server");
for my $tmpdsn (@dsns) {
my($dsn, $username, $password) = @$tmpdsn;
do_log(4,"connect_to_sql: trying '%s'", $dsn);
$dbh = DBI->connect($dsn, $username, $password,
{PrintError => 0, RaiseError => 0, Taint => 1, AutoCommit => 1} );
if ($dbh) {
$self->dsn_current($dsn);
do_log(3,"connect_to_sql: '%s' succeeded", $dsn);
last;
}
do_log(-1,"connect_to_sql: unable to connect to DSN '%s': %s",
$dsn, $DBI::errstr);
}
$self->dbh($dbh); delete($self->{sth});
$self->in_transaction(0); $self->{incarnation}++;
$dbh or die "connect_to_sql: unable to connect to any dataset";
$dbh->{'RaiseError'} = 1;
# $dbh->{mysql_auto_reconnect} = 1; # questionable benefit
# $dbh->func(30000,'busy_timeout'); # milliseconds (SQLite)
# https://mathiasbynens.be/notes/mysql-utf8mb4
# Never use utf8 in MySQL — always use utf8mb4 instead.
# SET NAMES utf8mb4 COLLATE utf8mb4_unicode_ci
my $cmd = $self->driver_name eq 'mysql' ? "SET NAMES 'utf8mb4'"
: "SET NAMES 'utf8'";
eval {
$dbh->do($cmd); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(2,"connect_to_sql: %s failed: %s", $cmd, $eval_stat);
};
section_time('sql-connect');
$self;
}
sub disconnect_from_sql($) {
my $self = $_[0];
my $did_disconnect;
$self->in_transaction(0);
if ($self->dbh) {
do_log(4,"disconnecting from SQL");
$self->dbh->disconnect; $self->dbh(undef);
$did_disconnect = 1;
}
delete $self->{sth}; $self->dsn_current(undef);
$did_disconnect;
}
1;
__DATA__
#^L
package Amavis::Out::SQL::Log;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::rfc2821_2822_Tools;
import Amavis::Util qw(ll do_log do_log_safe min max minmax add_entropy
untaint untaint_inplace format_time_interval
truncate_utf_8 orcpt_encode
idn_to_utf8 idn_to_ascii mail_addr_idn_to_ascii
safe_encode safe_encode_utf8 safe_decode_mime
snmp_count ccat_split ccat_maj);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Out::SQL::Connection ();
}
use DBI qw(:sql_types);
sub new {
my($class,$conn_h) = @_; bless { conn_h=>$conn_h, incarnation=>0 }, $class;
}
sub DESTROY {
my $self = $_[0]; local($@,$!,$_);
do_log_safe(5,"Amavis::Out::SQL::Log DESTROY called");
}
# find an existing e-mail address record or insert one, returning its id;
# may return undef if 'sel_adr' or 'ins_adr' SQL clauses are not defined;
#
sub find_or_save_addr {
my($self,$addr,$partition_tag,$keep_localpart_case) = @_;
my $id; my $existed = 0; my($localpart,$domain);
my $naddr = untaint($addr);
if ($naddr ne '') { # normalize address (lowercase, 7-bit, max 255 ch...)
($localpart,$domain) = split_address($naddr);
$domain = idn_to_ascii($domain);
if (!$keep_localpart_case && !c('localpart_is_case_sensitive')) {
$localpart = lc $localpart;
}
local($1);
$domain = $1 if $domain=~/^\@?(.*?)\.*\z/s; # chop leading @ and tr. dots
$naddr = $localpart.'@'.$domain;
substr($naddr,255) = '' if length($naddr) > 255;
# avoid UTF-8 SQL trouble, legitimate RFC 5321 addresses only need 7 bits
$naddr =~ s/[^\040-\176]/?/gs if !$sql_allow_8bit_address;
# SQL character strings disallow zero octets, and also disallow any other
# octet values and sequences of octet values that are invalid according to
# the database's selected character set encoding
}
my $conn_h = $self->{conn_h}; my $sql_cl_r = cr('sql_clause');
my $sel_adr = $sql_cl_r->{'sel_adr'};
my $ins_adr = $sql_cl_r->{'ins_adr'};
if (!defined($sel_adr) || $sel_adr eq '') {
# no way to query a database, behave as if no record was found
do_log(5,"find_or_save_addr: sel_adr query disabled, %s", $naddr);
} else {
$conn_h->begin_work_nontransaction; #(re)connect if necessary, autocommit
my $datatype = SQL_VARCHAR;
if ($sql_allow_8bit_address) {
my $driver = $conn_h->driver_name; # only available when connected
$datatype = $driver eq 'Pg' ? { pg_type => DBD::Pg::PG_BYTEA() }
: SQL_VARBINARY;
}
$conn_h->execute($sel_adr, $partition_tag, [$naddr,$datatype]);
my($a_ref,$a2_ref);
if (defined($a_ref=$conn_h->fetchrow_arrayref($sel_adr))) { # exists?
$id = $a_ref->[0]; $conn_h->finish($sel_adr);
$existed = 1;
} elsif (!defined($ins_adr) || $ins_adr eq '') {
# record does not exist, insertion is not allowed
do_log(5,"find_or_save_addr: ins_adr insertion disabled, %s", $naddr);
} else { # does not exist, attempt to insert a new e-mail address record
my $invdomain; # domain with reversed fields, chopped to 255 characters
$invdomain = join('.', reverse split(/\./,$domain,-1));
substr($invdomain,255) = '' if length($invdomain) > 255;
$conn_h->begin_work_nontransaction; # (re)connect if not connected
my $eval_stat;
eval { $conn_h->execute($ins_adr, $partition_tag,
[$naddr,$datatype], $invdomain); 1 }
or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
# INSERT may have failed because of race condition with other processes;
# try the SELECT again, it will most likely succeed this time;
# SELECT after INSERT also avoids the need for a working last_insert_id()
$conn_h->begin_work_nontransaction; # (re)connect if not connected
# try select again, regardless of the success of INSERT
$conn_h->execute($sel_adr, $partition_tag, [$naddr,$datatype]);
if ( defined($a2_ref=$conn_h->fetchrow_arrayref($sel_adr)) ) {
$id = $a2_ref->[0]; $conn_h->finish($sel_adr);
add_entropy($id);
if (!defined($eval_stat)) { # status of the INSERT
do_log(5,"find_or_save_addr: record inserted, id=%s, %s",
$id,$naddr);
} else {
$existed = 1; chomp $eval_stat;
do_log(5,"find_or_save_addr: found on a second attempt, ".
"id=%s, %s, (first attempt: %s)", $id,$naddr,$eval_stat);
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
}
} else { # still does not exist
$id = $existed = undef;
if (defined $eval_stat) { # status of the INSERT
chomp $eval_stat;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
};
die "find_or_save_addr: failed to insert addr $naddr: $eval_stat";
}
}
}
($id, $existed);
}
# find a penpals record which proves that a local user (sid) really sent a
# mail to a recipient (rid) some time ago. Returns an interval time in seconds
# since the last such mail was sent by our local user to a specified recipient
# (or undef if information is not available). If @$message_id_list is a
# nonempty list of Message-IDs as found in References header field, the query
# also finds previous outgoing messages with a matching Message-ID but
# possibly to recipients different from what the mail was originally sent to.
#
sub penpals_find {
my($self, $sid,$rid,$message_id_list, $msginfo) = @_;
my($a_ref,$found,$age,$send_time,$ref_mail_id,$ref_subj,$ref_mid,$ref_rid);
my $conn_h = $self->{conn_h}; my $sql_cl_r = cr('sql_clause');
my $sel_penpals = $sql_cl_r->{'sel_penpals'};
my $sel_penpals_msgid = $sql_cl_r->{'sel_penpals_msgid'};
$message_id_list = [] if !$message_id_list;
if (defined($sel_penpals_msgid) && @$message_id_list && defined($sid)) {
# list of refs to Message-ID is nonempty, try reference or recipient match
my $n = scalar(@$message_id_list); # number of keys
my(@args) = ($sid,$rid); my(@pos_args); local($1);
my $sel_taint = substr($sel_penpals_msgid,0,0); # taintedness
$sel_penpals_msgid =~
s{ ( %m | \? ) } # substitute %m for keys and ? for next arg
{ push(@pos_args,
$1 eq '%m' ? (map { my $s=$_; $s=~s/[^\040-\176]/?/gs; $s }
@$message_id_list)
: shift @args),
$1 eq '%m' ? join(',', ('?') x $n) : '?' }xgse;
# keep original clause taintedness
$sel_penpals_msgid = untaint($sel_penpals_msgid) . $sel_taint;
untaint_inplace($_) for @pos_args; # untaint arguments
do_log(4, "penpals: query args: %s", join(', ',@pos_args));
do_log(4, "penpals: %s", $sel_penpals_msgid);
$conn_h->begin_work_nontransaction; # (re)connect if not connected
$conn_h->execute($sel_penpals_msgid,@pos_args);
snmp_count('PenPalsAttempts'); snmp_count('PenPalsAttemptsMid');
if (!defined($a_ref=$conn_h->fetchrow_arrayref($sel_penpals_msgid))) {
snmp_count('PenPalsMisses');
} else {
($send_time, $ref_mail_id, $ref_subj, $ref_mid, $ref_rid) = @$a_ref;
$found = 1; $conn_h->finish($sel_penpals_msgid);
my $rid_match = defined $ref_rid && defined $rid && $rid eq $ref_rid;
my $mid_match = grep($ref_mid eq $_, @$message_id_list);
my $t = $mid_match && $rid_match ? 'MidRid' :
# $mid_match && !defined($rid) ? 'MidNullRPath' :
$mid_match ? 'Mid' : $rid_match ? 'Rid' : 'none';
snmp_count('PenPalsHits'.$t); snmp_count('PenPalsHits');
ll(4) && do_log(4, "penpals: MATCH ON %s: %s",
$t, join(", ",@$a_ref));
}
}
if (!$found && defined($sel_penpals) && defined($rid) && defined($sid)) {
# list of Message-ID references not given, try matching on recipient only
$conn_h->begin_work_nontransaction; # (re)connect if not connected
$conn_h->execute($sel_penpals, untaint($sid), untaint($rid));
snmp_count('PenPalsAttempts'); snmp_count('PenPalsAttemptsRid');
if (!defined($a_ref=$conn_h->fetchrow_arrayref($sel_penpals))) { # exists?
snmp_count('PenPalsMisses');
} else {
($send_time, $ref_mail_id, $ref_subj) = @$a_ref;
$found = 1; $conn_h->finish($sel_penpals);
snmp_count('PenPalsHitsRid'); snmp_count('PenPalsHits');
ll(4) && do_log(4, "penpals: MATCH ON RID(%s): %s",
$rid, join(", ",@$a_ref));
}
}
if (!$found) {
ll(4) && do_log(4, "penpals: (sql) not found (%s,%s)%s", $sid,$rid,
!@$message_id_list ? '' : ' refs: '.join(", ",@$message_id_list));
} else {
$age = max(0, $msginfo->rx_time - $send_time);
ll(3) && do_log(3, "penpals: (sql) found (%s,%s) %s age %s (%.0f s)",
$sid, $rid, $ref_mail_id,
format_time_interval($age), $age);
}
($age, $ref_mail_id, $ref_subj);
}
sub save_info_preliminary {
my($self, $msginfo) = @_;
my $mail_id = $msginfo->mail_id;
defined $mail_id or die "save_info_preliminary: mail_id still undefined";
my $partition_tag = $msginfo->partition_tag;
my($sid,$existed,$sender_smtp); local($1);
$sender_smtp = $msginfo->sender_smtp; $sender_smtp =~ s/^<(.*)>\z/$1/s;
# find an existing e-mail address record for sender, or insert a new one
($sid,$existed) = $self->find_or_save_addr($sender_smtp,$partition_tag);
if (defined $sid) {
$msginfo->sender_maddr_id($sid);
# there is perhaps 30-50% chance the sender address is already in the db
snmp_count('SqlAddrSenderAttempts');
snmp_count($existed ? 'SqlAddrSenderHits' : 'SqlAddrSenderMisses');
do_log(4,"save_info_preliminary %s, sender id: %s, %s, %s",
$mail_id, $sid, $sender_smtp, $existed ? 'exists' : 'new' );
}
# find existing address records for recipients, or insert them
for my $r (@{$msginfo->per_recip_data}) {
my $addr_smtp = $r->recip_addr_smtp;
if (defined $addr_smtp) {
$addr_smtp =~ s/^<(.*)>\z/$1/s;
$addr_smtp = mail_addr_idn_to_ascii($addr_smtp);
}
my($rid, $o_rid, $existed);
if ($addr_smtp ne '') {
($rid,$existed) = $self->find_or_save_addr($addr_smtp,$partition_tag);
# there is perhaps 90-100% chance the recipient addr is already in the db
if (defined $rid) {
$r->recip_maddr_id($rid);
snmp_count('SqlAddrRecipAttempts');
snmp_count($existed ? 'SqlAddrRecipHits' : 'SqlAddrRecipMisses');
my($addr_type, $addr) = orcpt_encode($r->dsn_orcpt, 1);
ll(4) && do_log(4,"save_info_preliminary %s, recip id: %s, %s%s, %s",
$mail_id, $rid, $addr_smtp,
defined $addr ? " (ORCPT $addr_type;$addr)" : '',
$existed ? 'exists' : 'new');
}
}
}
my $conn_h = $self->{conn_h}; my $sql_cl_r = cr('sql_clause');
my $ins_msg = $sql_cl_r->{'ins_msg'};
if (!defined($ins_msg) || $ins_msg eq '') {
do_log(4,"save_info_preliminary: ins_msg undef, not saving");
} elsif (!defined($sid)) {
do_log(4,"save_info_preliminary: sid undef, not saving");
} else {
$conn_h->begin_work; # SQL transaction starts
eval {
# MySQL does not like a standard iso8601 delimiter 'T' or a timezone
# when data type of msgs.time_iso is TIMESTAMP (instead of a string)
my $time_iso = $timestamp_fmt_mysql && ($conn_h->driver_name eq 'mysql' || $conn_h->driver_name eq 'MariaDB')
? iso8601_utc_timestamp($msginfo->rx_time,1,'')
: iso8601_utc_timestamp($msginfo->rx_time);
# insert a placeholder msgs record with sender information
$conn_h->execute($ins_msg,
$partition_tag, $msginfo->mail_id, $msginfo->secret_id,
$msginfo->log_id, int($msginfo->rx_time), $time_iso,
untaint($sid), c('policy_bank_path'), untaint($msginfo->client_addr),
0+untaint($msginfo->msg_size),
untaint(substr(idn_to_utf8(c('myhostname')),0,255)));
$conn_h->commit; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
if ($conn_h->in_transaction) {
eval {
$conn_h->rollback;
do_log(1,"save_info_preliminary: rollback done"); 1;
} or do {
$@ = "errno=$!" if $@ eq ''; chomp $@;
do_log(1,"save_info_preliminary: rollback %s", $@);
die $@ if $@ =~ /^timed out\b/; # resignal timeout
};
}
do_log(-1, "WARN save_info_preliminary: %s", $eval_stat);
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
return 0;
};
}
1;
}
sub save_info_final {
my($self, $msginfo, $report_ref) = @_;
my $mail_id = $msginfo->mail_id;
defined $mail_id or die "save_info_final: mail_id still undefined";
my $dsn_sent = $msginfo->dsn_sent;
$dsn_sent = !$dsn_sent ? 'N' : $dsn_sent==1 ? 'Y' : $dsn_sent==2 ? 'q' : '?';
my $sid = $msginfo->sender_maddr_id;
my $conn_h = $self->{conn_h}; my($sql_cl_r) = cr('sql_clause');
my $ins_msg = $sql_cl_r->{'ins_msg'};
my $upd_msg = $sql_cl_r->{'upd_msg'};
my $ins_rcp = $sql_cl_r->{'ins_rcp'};
if ($ins_msg eq '' || $upd_msg eq '' || $ins_rcp eq '') {
# updates disabled
} elsif (!defined($sid)) {
# sender not in table maddr, msgs record was not inserted by preliminary
} else {
$conn_h->begin_work; # SQL transaction starts
eval {
my(%ccat_short_name) = ( # as written to a SQL record
CC_VIRUS,'V', CC_BANNED,'B', CC_UNCHECKED,'U',
CC_SPAM,'S', CC_SPAMMY,'Y', CC_BADH.",2",'M', CC_BADH,'H',
CC_OVERSIZED,'O', CC_MTA,'T', CC_CLEAN,'C', CC_CATCHALL,'?');
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
# insert per-recipient records into table msgrcpt
my $r_seq_num = 0; # can serve as a component of a primary key
for my $r (@{$msginfo->per_recip_data}) {
$r_seq_num++;
my $rid = $r->recip_maddr_id;
next if !defined $rid; # e.g. always_bcc, or table 'maddr' is disabled
my $o_rid = $r->recip_maddr_id_orig; # may be undef
my $spam_level = $r->spam_level;
my($dest,$resp) = ($r->recip_destiny, $r->recip_smtp_response);
my $d = $resp=~/^4/ ? 'TEMPFAIL'
: ($dest==D_BOUNCE && $resp=~/^5/) ? 'BOUNCE'
: ($dest!=D_BOUNCE && $resp=~/^5/) ? 'REJECT'
: ($dest==D_PASS && ($resp=~/^2/ || !$r->recip_done)) ? 'PASS'
: ($dest==D_DISCARD) ? 'DISCARD' : '?';
my $r_content_type =
$r->setting_by_contents_category(\%ccat_short_name);
for ($r_content_type) { $_ = ' ' if !defined $_ || /^ *\z/ }
substr($resp,255) = '' if length($resp) > 255;
$resp =~ s/[^\040-\176]/?/gs; # just in case, only need 7 bit printbl
# avoid op '?:' on tainted operand in args list, see PR [perl #81028]
my $recip_local_yn = $r->recip_is_local ? 'Y' : 'N';
my $blacklisted_yn = $r->recip_blacklisted_sender ? 'Y' : 'N';
my $whitelisted_yn = $r->recip_whitelisted_sender ? 'Y' : 'N';
$conn_h->execute($ins_rcp,
$msginfo->partition_tag, $mail_id,
$sql_schema_version < 2.007000 ? untaint($rid)
: ($r_seq_num, untaint($rid), $recip_local_yn, $r_content_type),
substr($d,0,1), ' ',
$blacklisted_yn, $whitelisted_yn, 0+untaint($spam_level),
untaint($resp),
);
# untaint(defined $o_rid ? $o_rid : $rid),
# int($msginfo->rx_time),
# untaint($r->user_policy_id),
}
my $q_to = $msginfo->quarantined_to; # ref to a list of quar. locations
if (!defined($q_to) || !@$q_to) { $q_to = undef }
else {
$q_to = $q_to->[0]; # keep only the first quarantine location
$q_to =~ s{^\Q$QUARANTINEDIR\E/}{}; # strip directory name
}
my $m_id = $msginfo->get_header_field_body('message-id');
$m_id = join(' ',parse_message_id($m_id)) if $m_id ne ''; # strip CFWS
my $subj = $msginfo->get_header_field_body('subject');
my $from = $msginfo->get_header_field_body('from'); # raw full field
my $rfc2822_from = $msginfo->rfc2822_from; # undef, scalar or listref
my $rfc2822_sender = $msginfo->rfc2822_sender; # undef or scalar
$rfc2822_from = join(', ',@$rfc2822_from) if ref $rfc2822_from;
my $os_fp = $msginfo->client_os_fingerprint;
$_ = !defined($_) ? '' :untaint($_) for ($subj,$from,$m_id,$q_to,$os_fp);
for ($subj,$from) { # character set decoding, sanitation
chomp; s/\n(?=[ \t])//gs; s/^[ \t]+//s; s/[ \t]+\z//s; # unfold, trim
eval { # decode mime and truncate to 255 bytes
my $chars = safe_decode_mime($_); # to logical characters
substr($chars, 255) = '' if length($chars) > 255;
# DBD::mysql will throw an error with native encoding, while
# DBD::MariaDB and DBD::Pg can cope with native as well as utf8.
# Upgrade to be on the safe side. Suggestion via issue#67.
utf8::upgrade($chars);
$_ = $chars; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(1,"save_info_final INFO: header field ".
"not decodable, keeping raw bytes: %s", $eval_stat);
substr($_,255) = '' if length($_) > 255;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
};
}
for ($m_id,$q_to,$os_fp) { # truncate to 255 ch, ensure 7-bit characters
substr($_,255) = '' if length($_) > 255;
s/[^\040-\176]/?/gs; # only use 7 bit printable, compatible with UTF-8
}
my $content_type =
$msginfo->setting_by_contents_category(\%ccat_short_name);
my $checks_performed = $msginfo->checks_performed;
$checks_performed = !ref $checks_performed ? ''
: join('', grep($checks_performed->{$_}, qw(V S H B F P D)));
my $q_type = $msginfo->quar_type;
# only keep the first quarantine type used (e.g. ignore archival quar.)
$q_type = $q_type->[0] if ref $q_type;
for ($q_type,$content_type) { $_ = ' ' if !defined $_ || /^ *\z/ }
$min_spam_level = 0 if !defined $min_spam_level;
$max_spam_level = 0 if !defined $max_spam_level;
my $orig = $msginfo->originating ? 'Y' : 'N';
ll(4) && do_log(4,"save_info_final %s, orig=%s, chks=%s, cont.ty=%s, ".
"q.type=%s, q.to=%s, dsn=%s, score=%s, ".
"Message-ID: %s, From: '%s', Subject: '%s'",
$mail_id, $orig, $checks_performed, $content_type,
$q_type, $q_to, $dsn_sent, $min_spam_level,
$m_id, $from, $subj);
# update message record with additional information
$conn_h->execute($upd_msg,
$content_type, $q_type, $q_to, $dsn_sent,
0+untaint($min_spam_level), $m_id, $from, $subj,
untaint($msginfo->client_addr), # we may have a better info now
$sql_schema_version < 2.007000 ? () : $orig,
$msginfo->partition_tag, $mail_id);
# $os_fp, $rfc2822_sender, $rfc2822_from, $checks_performed, ...
# SQL_CHAR, SQL_VARCHAR, SQL_VARBINARY, SQL_BLOB, SQL_INTEGER, SQL_FLOAT,
# SQL_TIMESTAMP, SQL_TYPE_TIMESTAMP_WITH_TIMEZONE, ...
$conn_h->commit; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
if ($conn_h->in_transaction) {
eval {
$conn_h->rollback;
do_log(1,"save_info_final: rollback done"); 1;
} or do {
$@ = "errno=$!" if $@ eq ''; chomp $@;
do_log(1,"save_info_final: rollback %s", $@);
die $@ if $@ =~ /^timed out\b/; # resignal timeout
};
}
do_log(-1, "WARN save_info_final: %s", $eval_stat);
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
return 0;
};
}
1;
}
1;
__DATA__
#
package Amavis::IO::SQL;
# an IO wrapper around SQL for inserting/retrieving mail text
# to/from a database
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(ll do_log untaint min max minmax);
}
use Errno qw(ENOENT EACCES EIO);
use DBI qw(:sql_types);
# use DBD::Pg;
sub new {
my $class = shift;
my $self = bless {}, $class;
if (@_) { $self->open(@_) or return }
$self;
}
sub open {
my $self = shift;
if (exists $self->{conn_h}) {
eval { $self->close } or 1; # ignore failure, make perlcritic happy
}
@$self{qw(conn_h clause dbkey mode partition_tag maxbuf rx_time)} = @_;
my $conn_h = $self->{conn_h}; $self->{buf} = '';
$self->{chunk_ind} = $self->{pos} = $self->{bufpos} = $self->{eof} = 0;
my $driver; my $eval_stat;
eval { $driver = $conn_h->driver_name; 1 }
or do { $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat };
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
if ($self->{mode} eq 'w') { # open for write access
ll(4) && do_log(4,"Amavis::IO::SQL::open %s drv=%s (%s); key=%s, p_tag=%s",
$self->{mode}, $driver, $self->{clause},
$self->{dbkey}, $self->{partition_tag});
} else { # open for read access
$eval_stat = undef;
eval {
$conn_h->execute($self->{clause}, $self->{partition_tag},$self->{dbkey});
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat };
my $ll = $eval_stat ne '' ? -1 : 4;
do_log($ll,"Amavis::IO::SQL::open %s drv=%s (%s); key=%s, p_tag=%s, s: %s",
$self->{mode}, $driver, $self->{clause},
$self->{dbkey}, $self->{partition_tag}, $eval_stat) if ll($ll);
if ($eval_stat ne '') {
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "Amavis::IO::SQL::open $driver SELECT error: $eval_stat" }
$! = EIO; return; # not reached
}
$eval_stat = undef;
eval { # fetch the first chunk; if missing treat it as a file-not-found
my $a_ref = $conn_h->fetchrow_arrayref($self->{clause});
if (!defined($a_ref)) { $self->{eof} = 1 }
else { $self->{buf} = $a_ref->[0]; $self->{chunk_ind}++ }
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "Amavis::IO::SQL::open $driver read error: $eval_stat" }
$! = EIO; return; # not reached
};
if ($self->{eof}) { # no records, make it look like a missing file
do_log(0,"Amavis::IO::SQL::open key=%s, p_tag=%s: no such record",
$self->{dbkey}, $self->{partition_tag});
$! = ENOENT; # No such file or directory
return;
}
}
$self;
}
sub DESTROY {
my $self = $_[0];
local($@,$!,$_); my $myactualpid = $$;
if ($self && $self->{conn_h}) {
eval {
$self->close or die "Error closing: $!"; 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
warn "[$myactualpid] Amavis::IO::SQL::close error: $eval_stat";
};
delete $self->{conn_h};
}
}
sub close {
my $self = $_[0];
my $eval_stat;
eval {
if ($self->{mode} eq 'w') {
$self->flush or die "Can't flush: $!";
} elsif ($self->{conn_h} && $self->{clause} && !$self->{eof}) {
# reading, closing before eof was reached
$self->{conn_h}->finish($self->{clause}) or die "Can't finish: $!";
};
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!";
};
delete @$self{
qw(conn_h clause dbkey mode maxbuf rx_time buf chunk_ind pos bufpos eof) };
if (defined $eval_stat) {
chomp $eval_stat;
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "Error closing, $eval_stat" }
$! = EIO; return; # not reached
}
1;
}
sub seek {
my($self,$pos,$whence) = @_;
$whence == 0 or die "Only absolute seek is supported on sql i/o";
$pos >= 0 or die "Can't seek to a negative absolute position on sql i/o";
ll(5) && do_log(5, "Amavis::IO::SQL::seek mode=%s, pos=%s",
$self->{mode}, $pos);
$self->{mode} ne 'w'
or die "Seek to $whence,$pos on sql i/o only supported for read mode";
if ($pos < $self->{pos}) {
if (!$self->{eof} && $self->{chunk_ind} <= 1) {
# still in the first chunk, just reset pos
$self->{pos} = $self->{bufpos} = 0; # reset
} else { # beyond the first chunk, restart the query from the beginning
my($con,$clause,$key,$mode,$partition_tag,$maxb,$rx_time) =
@$self{qw(conn_h clause dbkey mode partition_tag maxbuf rx_time)};
$self->close or die "seek: error closing, $!";
$self->open($con,$clause,$key,$mode,$partition_tag,$maxb,$rx_time)
or die "seek: reopen failed: $!";
}
}
my $skip = $pos - $self->{pos};
if ($skip > 0) {
my $s; my $nbytes = $self->read($s,$skip); # acceptable for small skips
defined $nbytes or die "seek: error skipping $skip bytes on sql i/o: $!";
}
1; # seek is supposed to return 1 upon success, 0 otherwise
}
sub read { # SCALAR,LENGTH,OFFSET
my $self = shift; my $req_len = $_[1]; my $offset = $_[2];
my $conn_h = $self->{conn_h}; my $a_ref;
ll(5) && do_log(5, "Amavis::IO::SQL::read, %d, %d",
$self->{chunk_ind}, $self->{bufpos});
eval {
while (!$self->{eof} && length($self->{buf})-$self->{bufpos} < $req_len) {
$a_ref = $conn_h->fetchrow_arrayref($self->{clause});
if (!defined($a_ref)) { $self->{eof} = 1 }
else { $self->{buf} .= $a_ref->[0]; $self->{chunk_ind}++ }
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
# we can't stash an arbitrary error message string into $!,
# which forces us to use 'die' to properly report an error
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "read: sql select failed, $eval_stat" }
$! = EIO; return; # not reached
};
my $nbytes;
if (!defined($offset) || $offset == 0) {
$_[0] = substr($self->{buf}, $self->{bufpos}, $req_len);
$nbytes = length($_[0]);
} else {
my $buff = substr($self->{buf}, $self->{bufpos}, $req_len);
substr($_[0],$offset) = $buff; $nbytes = length($buff);
}
$self->{bufpos} += $nbytes; $self->{pos} += $nbytes;
if ($self->{bufpos} > 0 && $self->{chunk_ind} > 1) {
# discard used-up part of the buf unless at ch.1, which may still be useful
ll(5) && do_log(5,"read: moving on by %d chars", $self->{bufpos});
$self->{buf} = substr($self->{buf},$self->{bufpos}); $self->{bufpos} = 0;
}
$nbytes; # eof: 0, error: undef
}
sub getline {
my $self = $_[0]; my $conn_h = $self->{conn_h};
ll(5) && do_log(5, "Amavis::IO::SQL::getline, chunk %d, pos %d",
$self->{chunk_ind}, $self->{bufpos});
my($a_ref,$line); my $ind = -1;
eval {
while (!$self->{eof} &&
($ind=index($self->{buf},"\n",$self->{bufpos})) < 0) {
$a_ref = $conn_h->fetchrow_arrayref($self->{clause});
if (!defined($a_ref)) { $self->{eof} = 1 }
else { $self->{buf} .= $a_ref->[0]; $self->{chunk_ind}++ }
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "getline: reading sql select results failed, $eval_stat" }
$! = EIO; return; # not reached
};
if ($ind < 0 && $self->{eof}) # imply a NL before eof if missing
{ $self->{buf} .= "\n"; $ind = index($self->{buf}, "\n", $self->{bufpos}) }
$ind >= 0 or die "Programming error, NL not found";
if (length($self->{buf}) > $self->{bufpos}) { # nonempty buffer?
$line = substr($self->{buf}, $self->{bufpos}, $ind+1-$self->{bufpos});
my $nbytes = length($line);
$self->{bufpos} += $nbytes; $self->{pos} += $nbytes;
if ($self->{bufpos} > 0 && $self->{chunk_ind} > 1) {
# discard used part of the buf unless at ch.1, which may still be useful
ll(5) && do_log(5,"getline: moving on by %d chars", $self->{bufpos});
$self->{buf} = substr($self->{buf},$self->{bufpos}); $self->{bufpos} = 0;
}
}
# eof: undef, $! zero; error: undef, $! nonzero
$! = 0; $line eq '' ? undef : $line;
}
sub flush {
my $self = $_[0];
return if $self->{mode} ne 'w';
my $msg; my $conn_h = $self->{conn_h};
while ($self->{buf} ne '') {
my $ind = $self->{chunk_ind} + 1;
ll(4) && do_log(4, "sql flush: key: (%s, %d), p_tag=%s, rx_t=%d, size=%d",
$self->{dbkey}, $ind, $self->{partition_tag}, $self->{rx_time},
min(length($self->{buf}),$self->{maxbuf}));
eval {
my $driver = $conn_h->driver_name;
$conn_h->execute($self->{clause},
$self->{partition_tag}, $self->{dbkey}, $ind,
# int($self->{rx_time}),
[ untaint(substr($self->{buf},0,$self->{maxbuf})),
$driver eq 'Pg' ? { pg_type => DBD::Pg::PG_BYTEA() }
: SQL_BLOB ] );
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$msg = $eval_stat;
};
last if defined $msg;
substr($self->{buf},0,$self->{maxbuf}) = ''; $self->{chunk_ind} = $ind;
}
if (defined $msg) {
chomp $msg;
if ($msg =~ /^timed out\b/) { die $msg } # resignal timeout
else {
$msg = "flush: sql inserting text failed, $msg";
die $msg; # we can't stash an arbitrary error message string into $!,
# which forces us to use 'die' to properly report an error
}
$! = EIO; return; # not reached
}
1;
}
sub print {
my $self = shift;
$self->{mode} eq 'w' or die "Can't print, not opened for writing";
my $buff_ref = @_ == 1 ? \$_[0] : \join('',@_);
my $len = length($$buff_ref);
my $nbytes; my $conn_h = $self->{conn_h};
if ($len <= 0) { $nbytes = "0 but true" }
else {
$self->{buf} .= $$buff_ref; $self->{pos} += $len; $nbytes = $len;
while (length($self->{buf}) >= $self->{maxbuf}) {
my $ind = $self->{chunk_ind} + 1;
ll(4) && do_log(4, "sql print: key: (%s, %d), p_tag=%s, size=%d",
$self->{dbkey}, $ind,
$self->{partition_tag}, $self->{maxbuf});
eval {
my $driver = $conn_h->driver_name;
$conn_h->execute($self->{clause},
$self->{partition_tag}, $self->{dbkey}, $ind,
# int($self->{rx_time}),
[ untaint(substr($self->{buf},0,$self->{maxbuf})),
$driver eq 'Pg' ? { pg_type => DBD::Pg::PG_BYTEA() }
: SQL_BLOB ] );
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
# we can't stash an arbitrary error message string into $!,
# which forces us to use 'die' to properly report an error
if ($eval_stat =~ /^timed out\b/) { die $eval_stat } # resignal timeout
else { die "print: sql inserting mail text failed, $eval_stat" }
$! = EIO; return; # not reached
};
substr($self->{buf},0,$self->{maxbuf}) = ''; $self->{chunk_ind} = $ind;
}
}
$nbytes;
}
sub printf { shift->print(sprintf(shift,@_)) }
1;
#^L
package Amavis::Out::SQL::Quarantine;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT = qw(&mail_via_sql);
import Amavis::Conf qw(:platform c cr ca $sql_quarantine_chunksize_max);
import Amavis::rfc2821_2822_Tools qw(qquote_rfc2821_local);
import Amavis::Util qw(ll do_log snmp_count collect_equal_delivery_recips);
import Amavis::Timing qw(section_time);
import Amavis::Out::SQL::Connection ();
}
use subs @EXPORT;
use DBI qw(:sql_types);
sub mail_via_sql {
my($conn_h,
$msginfo, $initial_submission, $dsn_per_recip_capable, $filter) = @_;
my(@snmp_vars) = !$initial_submission ?
('', 'Relay', 'ProtoSQL', 'ProtoSQLRelay')
: ('', 'Submit', 'ProtoSQL', 'ProtoSQLSubmit',
'Submit'.$initial_submission);
snmp_count('OutMsgs'.$_) for @snmp_vars;
my $logmsg =
sprintf("%s via SQL (%s): %s", ($initial_submission?'SEND':'FWD'),
$conn_h->dsn_current, $msginfo->sender_smtp);
my($per_recip_data_ref, $proto_sockname) =
collect_equal_delivery_recips($msginfo, $filter, qr/^sql:/i);
if (!$per_recip_data_ref || !@$per_recip_data_ref) {
do_log(5, "%s, nothing to do", $logmsg); return 1;
}
my $mail_id = $msginfo->mail_id;
defined $mail_id or die "mail_via_sql: mail_id still undefined";
$proto_sockname = $proto_sockname->[0] if ref $proto_sockname;
ll(1) && do_log(1, "delivering to %s, %s -> %s, mail_id %s",
$proto_sockname, $logmsg,
join(',', qquote_rfc2821_local(
map($_->recip_final_addr, @$per_recip_data_ref)) ),
$mail_id);
my $msg = $msginfo->mail_text; # a scalar reference, or a file handle
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
my($err,$smtp_response);
eval {
my $sql_cl_r = cr('sql_clause');
$conn_h->begin_work; # SQL transaction starts
eval {
my $mp = Amavis::IO::SQL->new;
$mp->open($conn_h, $sql_cl_r->{'ins_quar'}, $msginfo->mail_id, 'w',
$msginfo->partition_tag, $sql_quarantine_chunksize_max,
$msginfo->rx_time)
or die "Can't open Amavis::IO::SQL object: $!";
my $hdr_edits = $msginfo->header_edits;
$hdr_edits = Amavis::Out::EditHeader->new if !$hdr_edits;
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$mp,!$initial_submission);
if ($received_cnt > 100) { # loop detection required by RFC 5321 sect 6.2
die "Too many hops: $received_cnt 'Received:' header fields";
} elsif (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
$mp->print(substr($$msg,$file_position))
or die "Can't write to SQL storage: $!";
} elsif ($msg->isa('MIME::Entity')) {
$msg->print_body($mp);
} else {
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,32768)) > 0) {
$mp->print($buff) or die "Can't write to SQL storage: $!";
}
defined $nbytes or die "Error reading: $!";
}
$mp->close or die "Error closing Amavis::IO::SQL object: $!";
$conn_h->commit; 1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err; my $msg = $err;
$msg = "writing mail text to SQL failed: $msg"; do_log(0,"%s",$msg);
if ($conn_h->in_transaction) {
eval {
$conn_h->rollback;
do_log(1,"mail_via_sql: rollback done"); 1;
} or do {
$@ = "errno=$!" if $@ eq ''; chomp $@;
do_log(1,"mail_via_sql: rollback %s", $@);
die $@ if $@ =~ /^timed out\b/; # resignal timeout
};
}
die $err if $err =~ /^timed out\b/; # resignal timeout
die $msg;
};
1;
} or do { $err = $@ ne '' ? $@ : "errno=$!" };
if ($err eq '') {
$smtp_response = "250 2.6.0 Ok, Stored to sql db as mail_id $mail_id";
snmp_count('OutMsgsDelivers');
my $size = $msginfo->msg_size;
snmp_count( ['OutMsgsSize'.$_, $size, 'C64'] ) for @snmp_vars;
} else {
chomp $err;
if ($err =~ /too many hops\b/i) {
$smtp_response = "554 5.4.6 Reject: $err";
snmp_count('OutMsgsRejects');
} else {
$smtp_response =
"451 4.5.0 Storing to sql db as mail_id $mail_id failed: $err";
snmp_count('OutMsgsAttemptFails');
}
die $err if $err =~ /^timed out\b/; # resignal timeout
}
$smtp_response .= ", id=" . $msginfo->log_id;
for my $r (@$per_recip_data_ref) {
next if $r->recip_done;
$r->recip_smtp_response($smtp_response); $r->recip_done(2);
if ($smtp_response =~ /^2/) {
my $mbxname = $mail_id;
my $p_tag = $msginfo->partition_tag;
$mbxname .= '[' . $p_tag . ']'
if defined($p_tag) && $p_tag ne '' && $p_tag ne '0';
$r->recip_mbxname($mbxname);
}
}
section_time('fwd-sql');
1;
}
1;
__DATA__
#
package Amavis::AV;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars c cr ca);
import Amavis::Util qw(ll untaint min max minmax unique_list do_log
add_entropy proto_decode rmdir_recursively
prolong_timer get_deadline generate_mail_id);
import Amavis::ProcControl qw(exit_status_str proc_status_ok
run_command run_as_subprocess
collect_results collect_results_structured);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Timing qw(section_time);
import Amavis::Out qw(mail_dispatch);
import Amavis::rfc2821_2822_Tools qw(one_response_for_all);
}
use subs @EXPORT_OK;
use vars @EXPORT;
use POSIX qw(WIFEXITED WIFSIGNALED WIFSTOPPED
WEXITSTATUS WTERMSIG WSTOPSIG);
use Errno qw(EPIPE ENOTCONN ENOENT EACCES EINTR EAGAIN ECONNRESET);
use Time::HiRes ();
use vars qw(%st_socket_created %st_sock); # keep persistent state (per-socket)
sub clamav_module_init($) {
my $av_name = $_[0];
# each child should reinitialize clamav module to reload databases
my $clamav_version = Mail::ClamAV->VERSION;
my $dbdir = Mail::ClamAV::retdbdir();
my $clamav_obj = Mail::ClamAV->new($dbdir);
ref $clamav_obj
or die "$av_name: Can't load db from $dbdir: $Mail::ClamAV::Error";
$clamav_obj->buildtrie;
$clamav_obj->maxreclevel($MAXLEVELS) if $MAXLEVELS > 0;
$clamav_obj->maxfiles($MAXFILES) if $MAXFILES > 0;
$clamav_obj->maxfilesize($MAX_EXPANSION_QUOTA || 50*1024*1024);
if ($clamav_version >= 0.12) {
$clamav_obj->maxratio($MAX_EXPANSION_FACTOR);
# $clamav_obj->archivememlim(0); # limit memory usage for bzip2 (0/1)
}
do_log(3,"clamav_module_init: %s init", $av_name);
section_time('clamav_module_init');
($clamav_obj,$clamav_version);
}
# called from sub ask_clamav or ask_daemon, should not run as a subprocess
#
use vars qw($clamav_obj $clamav_version);
sub clamav_module_internal_pre($) {
my $av_name = $_[0];
if (!defined $clamav_obj) {
($clamav_obj,$clamav_version) = clamav_module_init($av_name); # first time
} elsif ($clamav_obj->statchkdir) { # db reload needed?
do_log(2, "%s: reloading virus database", $av_name);
($clamav_obj,$clamav_version) = clamav_module_init($av_name);
}
}
# called from sub ask_clamav or ask_daemon, may be called directly
# or in a subprocess
#
sub clamav_module_internal($@) {
my($query, $bare_fnames,$names_to_parts,$tempdir, $av_name) = @_;
$query = join(' ',@$query) if ref $query;
my $fname = "$tempdir/parts/$query"; # file to be checked
my $part = $names_to_parts->{$query}; # get corresponding parts object
my $options = 0; # bitfield of options to Mail::ClamAV::scan
my($opt_archive,$opt_mail);
if ($clamav_version < 0.12) {
$opt_archive = &Mail::ClamAV::CL_ARCHIVE;
$opt_mail = &Mail::ClamAV::CL_MAIL;
} else { # >= 0.12, reflects renamed flags in libclamav 0.80
$opt_archive = &Mail::ClamAV::CL_SCAN_ARCHIVE;
$opt_mail = &Mail::ClamAV::CL_SCAN_MAIL;
}
# see clamav.h for standard options enabled by CL_SCAN_STDOPT
$options |= &Mail::ClamAV::CL_SCAN_STDOPT if $clamav_version >= 0.13;
$options |= $opt_archive; # turn on ARCHIVE
$options &= ~$opt_mail; # turn off MAIL
my $type_decl = $part->type_declared;
if (ref $part &&
($part->type_short eq 'MAIL' ||
defined $type_decl && $type_decl=~m{^message/(?:rfc822|global)\z}si)) {
do_log(2, "%s: $query - enabling option CL_MAIL", $av_name);
$options |= $opt_mail; # turn on MAIL
}
my $ret = $clamav_obj->scan(untaint($fname), $options);
my($output,$status);
if ($ret->virus) { $status = 1; $output = "INFECTED: $ret" }
elsif ($ret->clean) { $status = 0; $output = "CLEAN" }
else { $status = 2; $output = $ret->error.", errno=".$ret->errno }
($status,$output); # return synthesised status and a result string
}
# subroutine available for calling from @av_scanners list entries;
# it has the same args and returns as run_av() below
#
sub ask_clamav {
my($bare_fnames,$names_to_parts,$tempdir, $av_name) = @_;
clamav_module_internal_pre($av_name); # must not run as a subprocess
# my(@results) = ask_av(\&clamav_module_internal, @_); # invoke directly
my($proc_fh,$pid) = run_as_subprocess(\&ask_av, \&clamav_module_internal,@_);
my($results_ref,$child_stat) =
collect_results_structured($proc_fh,$pid,$av_name,200*1024);
!$results_ref ? () : @$results_ref;
}
my $savi_obj;
sub sophos_savi_init {
my($av_name, $command) = @_;
my(@savi_bool_options) = qw(
GrpArchiveUnpack GrpSelfExtract GrpExecutable GrpInternet GrpMSOffice
GrpMisc !GrpDisinfect !GrpClean EnableAutoStop FullSweep FullPdf Xml
);
$savi_obj = SAVI->new;
ref $savi_obj or die "$av_name: Can't create SAVI object, err=$savi_obj";
my $status = $savi_obj->load_data;
!defined($status) or die "$av_name: Failed to load SAVI virus data " .
$savi_obj->error_string($status) . " ($status)";
my $version = $savi_obj->version;
ref $version or die "$av_name: Can't get SAVI version, err=$version";
do_log(2,"%s init: Version %s (engine %d.%d) recognizing %d viruses",
$av_name, $version->string, $version->major, $version->minor,
$version->count);
my $error;
if ($MAXLEVELS > 0) {
$error = $savi_obj->set('MaxRecursionDepth', $MAXLEVELS);
!defined $error
or die "$av_name: error setting MaxRecursionDepth: err=$error";
}
$error = $savi_obj->set('NamespaceSupport', 3); # new with Sophos 3.67
!defined $error
or do_log(-1,"%s: error setting NamespaceSupport: err=%s",$av_name,$error);
for (@savi_bool_options) {
my $value = /^!/ ? 0 : 1; s/^!+//;
$error = $savi_obj->set($_, $value);
!defined $error or die "$av_name: Error setting $_: err=$error";
}
section_time('sophos_savi_init');
1;
}
sub sophos_savi_stale {
defined $savi_obj && $savi_obj->stale;
}
# run by a master(!) process, invoked from a hook run_n_children_hook
#
sub sophos_savi_reload {
if (defined $savi_obj) {
do_log(3,"sophos_savi_reload: about to reload SAVI data");
eval {
my $status = $savi_obj->load_data;
do_log(-1,"sophos_savi_reload: failed to load SAVI virus data %s (%s)",
$savi_obj->error_string($status), $status) if defined $status;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"sophos_savi_reload failed: %s", $eval_stat);
};
my $version = $savi_obj->version;
if (!ref($version)) {
do_log(-1,"sophos_savi_reload: Can't get SAVI version: %s", $version);
} else {
do_log(2,"Updated SAVI data: Version %s (engine %d.%d) ".
"recognizing %d viruses", $version->string,
$version->major, $version->minor, $version->count);
}
}
}
# to be called from sub sophos_savi
#
sub sophos_savi_internal {
my($query,
$bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args) = @_;
$query = join(' ',@$query) if ref $query;
my $fname = "$tempdir/parts/$query"; # file to be checked
if (!c('bypass_decode_parts')) {
my $part = $names_to_parts->{$query}; # get corresponding parts object
my $mime_option_value = 0;
my $type_decl = $part->type_declared;
if (ref $part &&
($part->type_short eq 'MAIL' ||
defined $type_decl && $type_decl=~m{^message/(?:rfc822|global)\z}si)){
do_log(2, "%s: %s - enabling option Mime", $av_name, $query);
$mime_option_value = 1;
}
my $error = $savi_obj->set('Mime', $mime_option_value);
!defined $error or die sprintf("%s: Error %s option Mime: err=%s",
$av_name, $mime_option_value ? 'setting' : 'clearing', $error);
}
my($output,$status); $!=0; my $result = $savi_obj->scan($fname);
if (!ref($result)) { # error
my $msg = "error scanning file $fname, " .
$savi_obj->error_string($result) . " ($result)"; # ignore $! ?
if ( !grep($result == $_, (514,527,530,538,549)) ) {
$status = 2; $output = "ERROR $query: $msg";
} else { # don't panic on non-fatal (encrypted, corrupted, partial)
$status = 0; $output = "CLEAN $query: $msg";
}
do_log(5,"%s: %s", $av_name,$output);
} elsif ($result->infected) {
$status = 1; $output = join(", ", $result->viruses) . " FOUND";
} else {
$status = 0; $output = "CLEAN $query";
}
($status,$output); # return synthesised status and a result string
}
# implements client side of the Sophos SSSP protocol
#
sub sophos_sssp_internal {
my($query,
$bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args) = @_;
my($query_template, $socket_specs) = !$args ? () : @$args;
# short timeout for connect and sending a request
prolong_timer('sophos_sssp_connect', undef, undef, 10);
my($remaining_time, $deadline) = get_deadline('sophos_sssp_internal');
# section_time('sssp-pre');
my $sssp_handle =
Amavis::IO::RW->new($socket_specs, Eol => "\015\012", Timeout => 10);
defined $sssp_handle or die "Can't connect to savdid";
# section_time('sssp-conn');
my $ln; local($1);
$ln = $sssp_handle->get_response_line; # greeting
defined $ln && $ln ne '' or die "sssp no greeting";
do_log(5,"sssp greeting %s", $ln);
$ln =~ m{^OK\s+SSSP/(\d+.*)\015\012\z}s or die "sssp bad greeting '$ln'";
# section_time('sssp-greet');
# # Use the SSSP OPTIONS request only if necessary, it is cheaper to have the
# # options set in the configuration file. If a client has needs different
# # from other clients, create another channel tailored for that client.
# #
# $sssp_handle->print("SSSP/1.0 OPTIONS\015\012".
# "savists:zipdecompression 1\015\012".
# "output: brief\015\012\015\012")
# or die "Error writing to sssp socket";
# $sssp_handle->flush or die "Error flushing sssp socket";
# $ln = $sssp_handle->get_response_line;
# defined $ln && $ln ne '' or die "sssp no response to OPTIONS";
# do_log(5,"sssp response to OPTIONS: %s", $ln);
# $ln =~ /^ACC\s+(\S*)/ or die "sssp OPTIONS request not accepted";
# while (defined($ln = $sssp_handle->get_response_line)) {
# last if $ln eq "\015\012";
# do_log(5,"sssp result of OPTIONS: %s", $ln);
# }
# # section_time('sssp-opts');
my $output = '';
# normal timeout for reading a response
prolong_timer('sophos_sssp_scan');
$sssp_handle->timeout(max(3, $deadline - Time::HiRes::time));
for my $fname (!ref($query) ? $query : @$query) {
my $fname_enc = $fname;
$fname_enc =~ s/([%\000-\040\177\377])/sprintf("%%%02X",ord($1))/gse;
$sssp_handle->print("SSSP/1.0 SCANDIRR $fname_enc\015\012")
or die "Error writing to sssp socket";
$sssp_handle->flush or die "Error flushing sssp socket";
$ln = $sssp_handle->get_response_line;
defined $ln && $ln ne '' or die "sssp no response to SCANDIRR";
do_log(5,"sssp response to SCANDIRR: %s", $ln);
# section_time('sssp-scan-ack');
$ln =~ /^ACC\s+(\S*)/ or die "sssp SCANDIRR request not accepted";
while (defined($ln = $sssp_handle->get_response_line)) {
last if $ln eq "\015\012";
do_log(3,"sssp result: %s", $ln);
$output .= $ln if length($output) < 10000;
}
}
$output = proto_decode($output);
# section_time('sssp-scan-result');
$sssp_handle->print("BYE\015\012") or die "Error writing to sssp socket";
$sssp_handle->flush or die "Error flushing sssp socket";
$sssp_handle->timeout(max(3, $deadline - Time::HiRes::time));
while (defined($ln = $sssp_handle->get_response_line)) {
do_log(5,"sssp response to BYE: %s", $ln);
last if $ln eq "\015\012" || $ln =~ /^BYE/;
}
# section_time('sssp-bye');
$sssp_handle->close or do_log(-1, "sssp - error closing session: $!");
# section_time('sssp-close');
(0,$output); # return synthesised status and a result string
}
# implements client side of the AVIRA SAVAPI3 protocol
#
sub avira_savapi_internal {
my($query,
$bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args) = @_;
my($query_template, $socket_specs, $product_id) = !$args ? () : @$args;
# short timeout for connect and sending a request
prolong_timer('avira_savapi_connect', undef, undef, 10);
my($remaining_time, $deadline) = get_deadline('avira_savapi_internal');
# section_time('savapi-pre');
my $savapi_handle =
Amavis::IO::RW->new($socket_specs, Eol => "\012", Timeout => 10);
defined $savapi_handle or die "Can't connect to savapi daemon";
# section_time('savapi-conn');
my $ln; local($1);
$ln = $savapi_handle->get_response_line; # greeting
defined $ln && $ln ne '' or die "savapi no greeting";
do_log(5,"savapi greeting %s", $ln);
$ln =~ m{^100 SAVAPI:(\d+.*)\012\z}s or die "savapi bad greeting '$ln'";
# section_time('savapi-greet');
$remaining_time = int(max(3, $deadline - Time::HiRes::time + 0.5));
for my $cmd ("SET PRODUCT $product_id",
"SET SCAN_TIMEOUT $remaining_time",
"SET CWD $tempdir/parts",
) {
# consider: "SET MAILBOX_SCAN 1", "SET ARCHIVE_SCAN 1", "SET HEUR_LEVEL 2"
$savapi_handle->print($cmd."\012") or die "Error writing '$cmd' to socket";
$savapi_handle->flush or die "Error flushing socket";
$ln = $savapi_handle->get_response_line;
defined $ln && $ln ne '' or die "savapi: no response to $cmd";
do_log(5,"savapi response to '%s': %s", $cmd,$ln);
$ln =~ /^100/ or die "savapi: $cmd request not accepted: $ln";
}
# section_time('savapi-settings');
# set a normal timeout for reading a response
prolong_timer('avira_savapi_scan');
$savapi_handle->timeout(max(3, $deadline - Time::HiRes::time));
my $keep_one_success; my $output = '';
for my $fname (!ref($query) ? $query : @$query) {
my $cmd = "SCAN $fname"; # files only, no directories
$savapi_handle->print($cmd."\012") or die "Error writing '$cmd' to socket";
$savapi_handle->flush or die "Error flushing socket";
while (defined($ln = $savapi_handle->get_response_line)) {
do_log(5,"savapi response to '%s': %s", $cmd,$ln);
if ($ln =~ /^200/) { # clean
$keep_one_success = $ln if !defined $keep_one_success;
} else {
$output .= $ln if length($output) < 10000; # sanity limit
}
last if $ln =~ /^([0125-9]\d\d|300|319).*\012/; # terminal status
# last if $ln =~ !/^(310|420|421|422|430).*\012/; # nonterminal status
}
}
$output = $keep_one_success if $output eq '' && defined $keep_one_success;
do_log(5,"savapi result: %s", $output);
# section_time('savapi-scan-result');
$savapi_handle->print("QUIT\012")
or do_log(-1, "savapi - error writing QUIT to socket");
$savapi_handle->flush
or do_log(-1, "savapi - error flushing socket after QUIT");
$savapi_handle->close
or do_log(-1, "savapi - error closing session: $!");
# section_time('savapi-close');
(0,$output); # return synthesised status and a result string
}
# implements client side of the ClamAV clamd protocol
#
sub clamav_clamd_internal {
my($query,
$bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args) = @_;
my($query_template, $socket_specs, $product_id) = !$args ? () : @$args;
# short timeout for connect
prolong_timer('clamav_connect', undef, undef, 10);
my($remaining_time, $deadline) = get_deadline('clamav_internal');
my $clamav_handle =
Amavis::IO::RW->new($socket_specs, Eol => "\000", Timeout => 10);
$clamav_handle or die "Can't connect to a clamd daemon";
# set a normal timeout
prolong_timer('clamav_scan');
$clamav_handle->timeout(max(3, $deadline - Time::HiRes::time));
$clamav_handle->print("zIDSESSION\0")
or die "Error writing 'zIDSESSION' to a clamd socket: $!";
my(@requests, @requests_filename, @requests_timestamp, $end_sent);
my($req_id, $requests_pending) = (0,0);
my $requests_remaining = !ref $query ? 1 : scalar @$query;
my($keep_one_success, $aborted_id, $found_infected);
my $output = '';
while ($requests_remaining > 0 || $requests_pending > 0) {
my $throttling = $requests_pending >= 8;
if ($throttling) {
# wait first for some of the pending results before sending new requests
$clamav_handle->flush or die "Error flushing socket: $!";
do_log(5,'clamav: throttling: %d pending, %d remaining',
$requests_pending, $requests_remaining);
} elsif ($requests_remaining > 0) {
my $fname = !ref $query ? $query : $query->[$req_id];
$req_id++;
$requests[$req_id] = 'INITIATING';
$requests_filename[$req_id] = $fname;
ll(5) && do_log(5,'clamav: sending contents of %s, req_id %d',
$fname, $req_id);
$clamav_handle->print("zINSTREAM\0")
or die "Error writing 'zINSTREAM' to a clamd socket: $!";
$requests[$req_id] = 'OPEN';
my $fh = IO::File->new;
$fh->open($fname,'<') or die "Can't open file $fname: $!";
binmode($fh,':bytes') or die "Can't cancel :utf8 mode: $!";
eval {
my($nbytes,$buff); $buff = pack('N',0);
while (($nbytes=$fh->read($buff, 32768-4, 4)) > 0) {
$requests[$req_id] = 'SENDING';
substr($buff,0,4) = pack('N',$nbytes); # 32 bits len -> 4 bytes
$clamav_handle->print($buff)
or die "Error writing $nbytes bytes to a clamd socket: $!";
}
defined $nbytes or die "Error reading from $fname: $!";
my $eod = pack('N',0); # length zero indicates end of data
if ($requests_remaining <= 0) { $eod .= "zEND\0"; $end_sent = 1 }
$clamav_handle->print($eod)
or die "Error writing end-of-data to a clamd socket: $!";
$clamav_handle->flush or die "Error flushing clamd socket: $!";
$requests[$req_id] = 'SENT';
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$requests[$req_id] = 'ABORTED: '.$eval_stat;
$aborted_id = $req_id; # also boolean true, request IDs start with 1
do_log(-1,'clamav: while feeding req_id %d: %s', $req_id, $eval_stat);
my $disc_len = $clamav_handle->discard_pending_output;
do_log(2,'clamav: discarding %d bytes', $disc_len) if $disc_len;
};
$requests_timestamp[$req_id] = Time::HiRes::time;
$requests_remaining--; $requests_pending++;
$fh->close or die "Error closing file $fname: $!";
do_log(5,'clamav: finished sending %s, req_id %d', $fname, $req_id);
}
while ( ($requests_pending > 0 && !$aborted_id) ||
$clamav_handle->response_line_available ) {
my $ln = $clamav_handle->get_response_line;
last if !defined $ln;
my $rx_time = Time::HiRes::time;
do_log(5,'clamav: got response %s', $ln);
my($id, $id_n, $resp); local($1,$2);
if ($ln =~ /^(\d+):\s*(.*?)\000\z/s) {
($id,$resp) = ($1,$2); $id_n = 0+$id;
} elsif ($ln =~ / ERROR\000\z/) {
if ($aborted_id) {
$id = $aborted_id; $id_n = 0+$id;
do_log(-1,'clamav: (possibly id=%d) error response: %s', $id,$ln);
} else {
do_log(-1,'clamav: error response: %s', $ln);
}
} else {
do_log(-1,'clamav: unparseable response %s', $ln);
next;
}
if (!defined $id) {
# failure already reported
} elsif (!defined $requests[$id_n]) {
do_log(-1,'clamav: bogus id %s in response ignored: %s', $id,$ln);
} elsif ($requests[$id_n] eq 'DONE') {
do_log(-1,'clamav: duplicate result for id %s: %s', $id,$ln);
} else {
ll(5) && do_log(5,'clamav: request id %s on %s took %.1f ms',
$id, $requests_filename[$id_n],
1000 * ($rx_time - $requests_timestamp[$id_n]));
if ($requests[$id_n] ne 'SENT') {
do_log(2,'clamav: result based on incomplete data, state %s: %s',
$requests[$id_n], $ln);
}
$ln =~ s/\000\z/\n/s;
$ln =~ s/^\Q$id\E:\s*stream:\s*/$requests_filename[$id_n]: /s;
if (defined $resp && $resp =~ /\bOK\z/) { # clean
$keep_one_success = $ln if !defined $keep_one_success;
} else {
$output .= $ln if length($output) < 10000; # sanity limit
}
$requests[$id_n] = 'DONE';
$requests_pending-- if $requests_pending > 0;
undef $requests_filename[$id_n];
undef $requests_timestamp[$id_n];
if ($resp =~ /\bFOUND\z/) {
$found_infected = 1;
if ($requests_remaining > 0 && c('first_infected_stops_scan')) {
do_log(2,'clamav: first infected stops scan');
$requests_remaining = 0;
}
}
}
}
if ($aborted_id) {
do_log(-1,'clamav: aborting: %d pending, %d remaining',
$requests_pending, $requests_remaining);
$clamav_handle->close
or do_log(5,'clamav: error closing session: %s', $!);
undef $clamav_handle;
if ($found_infected) {
# just normally return an infection report,
# even though not all content has been scanned
do_log(5,'clamav: result: %s', $output);
return (0,$output); # return synthesised status and a result string
} else {
die 'clamav: '.$requests[$aborted_id];
}
}
}
$output = $keep_one_success if $output eq '' && defined $keep_one_success;
do_log(5,'clamav: result: %s', $output);
if ($clamav_handle) {
if (!$end_sent) {
$clamav_handle->print("zEND\0")
or do_log(-1,"clamav: error writing 'zEND' to a clamd socket: %s", $!);
}
$clamav_handle->close
or do_log(-1,'clamav: error closing session: %s', $!);
}
(0,$output); # return synthesised status and a result string
}
sub av_smtp_client($$$$) {
my($msginfo,$av_name,$av_test_method,$av_test_recip) = @_;
$av_test_recip = 'dummy@localhost' if !defined $av_test_recip;
my $test_msg = Amavis::In::Message->new;
$test_msg->rx_time($msginfo->rx_time); # copy the reception time
$test_msg->log_id($msginfo->log_id); # use the same log_id
$test_msg->partition_tag($msginfo->partition_tag); # same partition_tag
$test_msg->parent_mail_id($msginfo->mail_id);
$test_msg->mail_id(scalar generate_mail_id());
$test_msg->conn_obj($msginfo->conn_obj);
$test_msg->mail_id($msginfo->mail_id); # use the same mail_id
$test_msg->body_type($msginfo->body_type); # use the same BODY= type
$test_msg->header_8bit($msginfo->header_8bit);
$test_msg->body_8bit($msginfo->body_8bit);
$test_msg->body_digest($msginfo->body_digest); # copy original digest
$test_msg->dsn_ret($msginfo->dsn_ret);
$test_msg->dsn_envid($msginfo->dsn_envid);
$test_msg->smtputf8($msginfo->smtputf8);
$test_msg->sender($msginfo->sender); # original sender
$test_msg->sender_smtp($msginfo->sender_smtp);
$test_msg->auth_submitter($msginfo->sender_smtp);
$test_msg->auth_user(c('amavis_auth_user'));
$test_msg->auth_pass(c('amavis_auth_pass'));
$test_msg->recips([$av_test_recip]); # made-up recipient
$_->delivery_method($av_test_method) for @{$test_msg->per_recip_data};
$test_msg->originating(0); # disables DKIM signing
$test_msg->mail_text($msginfo->mail_text); # the original mail contents
$test_msg->mail_text_str($msginfo->mail_text_str);
$test_msg->body_start_pos($msginfo->body_start_pos);
$test_msg->skip_bytes($msginfo->skip_bytes);
# NOTE: $initial_submission argument is typically treated as a boolean
# but here a value of 2 is supplied to allow a forwarding method to
# distinguish it from ordinary submissions
mail_dispatch($test_msg, 'AV', 0);
my($smtp_resp, $exit_code, $dsn_needed) =
one_response_for_all($test_msg, 0); # check status
do_log(2, "av_smtp_client %s: %s, %s", $av_name,$av_test_method,$smtp_resp);
(0, $smtp_resp);
}
# same args and returns as run_av() below,
# but prepended by a $query, which is a string to be sent to the daemon.
# Handles UNIX, INET and INET6 domain sockets.
# More than one socket may be specified for redundancy, they will be tried
# one after the other until one succeeds.
#
sub ask_daemon_internal {
my($query, # expanded query template, often a command and a file or dir name
$bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args,
$sts_clean,$sts_infected,$how_to_get_names, # regexps
) = @_;
my($query_template_orig,$socket_specs) = @$args;
my $output = '';
$socket_specs = [ $socket_specs ] if !ref($socket_specs);
my($remaining_time, $deadline) =
get_deadline('ask_daemon_internal_connect_pre');
my $max_retries = 2 * @$socket_specs; my $retries = 0;
# Sophie, Trophie and fpscand can accept multiple requests per session
# and return a single line response each time
my $multisession = $av_name =~ /\b(Sophie|Trophie|fpscand)\b/i ? 1 : 0;
for (;;) { # gracefully handle cases when av process times out or restarts
# short timeout for connect and sending a request
prolong_timer('ask_daemon_internal_connect', undef, undef, 10);
@$socket_specs or die "panic, no sockets specified!?"; # sanity
# try the first one in the current list
my $socketname = $socket_specs->[0];
my $sock = $st_sock{$socketname};
my $eval_stat;
eval {
if (!$st_socket_created{$socketname}) {
ll(3) && do_log(3, "%s: Connecting to socket %s %s%s",
$av_name, $daemon_chroot_dir, $socketname,
!$retries ? '' : ", retry #$retries" );
$sock = Amavis::IO::RW->new($socketname, Timeout => 10);
$st_sock{$socketname} = $sock;
defined $sock or die "Can't connect to socket $socketname\n";
$st_socket_created{$socketname} = 1;
}
$query = join(' ',@$query) if ref $query;
ll(3) && do_log(3,"%s: Sending %s to socket %s",
$av_name, $query, $socketname);
$sock->print($query) or die "Error writing to socket $socketname\n";
$sock->flush or die "Error flushing socket $socketname\n";
# normal timeout for reading a response
prolong_timer('ask_daemon_internal_scan');
$sock->timeout(max(3, $deadline - Time::HiRes::time));
if ($multisession) {
# depends on TCP segment boundaries, unreliable
my $nread = $sock->read($output,16384);
defined $nread or die "Error reading from $socketname: $!\n";
# and keep the socket open
} else { # single request/response per connection
my $buff = '';
for (;;) {
my $nread = $sock->read($buff,16384);
if (!defined($nread)) {
die "Error reading from $socketname: $!\n";
} elsif ($nread < 1) {
last; # sysread returns 0 at eof
} else { # successful read
$output .= $buff if length($output) < 100000; # sanity
}
}
$sock->close or die "Error closing socket $socketname\n";
$st_sock{$socketname} = $sock = undef;
$st_socket_created{$socketname} = 0;
}
$output ne '' or die "Empty result from $socketname\n";
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!";
};
prolong_timer('ask_daemon_internal');
last if !defined $eval_stat; # mission accomplished
# error handling (the most interesting error codes are EPIPE and ENOTCONN)
chomp $eval_stat; my $err = "$!"; my $errn = 0+$!;
# close socket through its DESTROY method, ignoring status
$st_sock{$socketname} = $sock = undef;
$st_socket_created{$socketname} = 0;
if (Time::HiRes::time >= $deadline) {
die "ask_daemon_internal: Exceeded allowed time";
}
++$retries <= $max_retries
or die "Too many retries to talk to $socketname ($eval_stat)";
if ($retries <= 1 && $errn == EPIPE) { # common, don't cause concern
do_log(2,"%s broken pipe (don't worry), retrying (%d)",
$av_name,$retries);
} else {
do_log( ($retries > 1 ? -1 : 1),
"%s: %s, retrying (%d)", $av_name,$eval_stat,$retries);
if ($retries % @$socket_specs == 0) { # every time the list is exhausted
my $dly = min(20, 1 + 5 * ($retries/@$socket_specs - 1));
do_log(3,"%s: sleeping for %s s", $av_name,$dly);
sleep($dly); # slow down a possible runaway
}
}
# leave good socket as the first entry in the list
# so that it will be tried first when needed again
if (@$socket_specs > 1) {
push(@$socket_specs, shift @$socket_specs); # circular shift left
}
}
(0,$output); # return synthesised status and a result string
}
# subroutine is available for calling from @av_scanners list entries;
# it has the same args and returns as run_av() below.
# Based on an implied protocol, or on an explicitly specified protocol name
# in the second element of array @$args, it determines a subroutine needed
# to implement the required protocol (defaulting to &ask_daemon_internal)
# and replaces $command in the argument list by this subroutine reference,
# then calls run_av with adjusted arguments. So, its main purpose is to map
# a protocol name (a string) into an internal code reference.
#
sub ask_daemon {
my($bare_fnames,$names_to_parts,$tempdir, $av_name,$command,$args,
$sts_clean,$sts_infected,$how_to_get_names) = @_;
my($av_method,$av_protocol); local($1);
# determine a protocol name from the second element of array @$args
$av_method = $args->[1] if $args && @$args >= 2;
$av_method = $av_method->[0] if ref $av_method;
$av_protocol = lc($1) if defined $av_method &&
$av_method =~ /^([a-z][a-z0-9.+-]*):/si;
my $code; my $run_spawned = 0;
if (!defined $av_protocol) {
# for compatibility with old style socket specification with
# no protocol (scheme) field, equivalent to a former call to ask_av()
# Sophie, Trophie, ClamAV-clamd, OpenAntiVirus, AVG,
# F-Prot fpscand, F-Prot f-protd, DrWebD, avast, ESET NOD32SS
$code = \&ask_daemon_internal;
} elsif ($av_protocol =~ /^(simple|sophie|trophie)\z/) {
# same as default, but with an explicit protocol prefix
$code = \&ask_daemon_internal;
} elsif ($av_protocol eq 'sssp') { # Sophos SSSP
$code = \&sophos_sssp_internal;
} elsif ($av_protocol eq 'savapi') { # Avira SAVAPI3
$code = \&avira_savapi_internal;
} elsif ($av_protocol eq 'clamd') { # ClamAV clamd protocol
$code = \&clamav_clamd_internal;
} elsif ($av_protocol eq 'smtp' || $av_protocol eq 'lmtp') {
$code = sub { av_smtp_client($Amavis::MSGINFO, $av_name,
$av_method, $args->[2]) };
} elsif ($av_protocol eq 'savi-perl') { # using SAVI-Perl perl module
if (@_ < 3+6) { # supply default arguments for backward compatibility
$args = ['*']; $sts_clean = [0]; $sts_infected = [1];
$how_to_get_names = qr/^(.*) FOUND$/m;
}
$code = \&sophos_savi_internal;
} elsif ($av_protocol eq 'clamav-perl') { # using Mail::ClamAV perl module
clamav_module_internal_pre($av_name); # must not run as a subprocess
$code = \&clamav_module_internal; $run_spawned = 1;
}
ll(5) && do_log(5, "ask_daemon: proto=%s, spawn=%s, (%s) %s",
!defined $av_protocol ? 'DFLT' : $av_protocol,
$run_spawned, $av_name, $av_method);
ref $code or die "Unsupported AV protocol name: $av_method";
$command = $code;
# reassemble arguments, after possibly being modified
my(@run_av_args) = ($bare_fnames,$names_to_parts,$tempdir,
$av_name,$command,$args, $sts_clean,$sts_infected,$how_to_get_names);
my(@results);
if (!$run_spawned) {
@results = run_av(@run_av_args); # invoke directly
} else {
my($proc_fh,$pid) = run_as_subprocess(\&ask_av, @run_av_args);
my($results_ref,$child_stat) =
collect_results_structured($proc_fh,$pid,$av_name,200*1024);
@results = @$results_ref if $results_ref;
}
@results; # ($scan_status,$output,$virusnames)
}
# for compatibility with pre-2.6.0 versions of amavisd-new and
# old @av_scanners entries; use ask_daemon and/or run_av instead
sub ask_av(@) {
my($code, @run_av_args) = @_;
$run_av_args[4] = $code; # replaces $command with a supplied $code
run_av(@run_av_args);
}
# Call a virus scanner and parse its output.
# Returns a triplet, or dies in case of failure.
# The first element of the triplet has the following semantics:
# - true if virus found,
# - 0 if no viruses found,
# - undef if it did not complete its job;
# the second element is a string, the text as provided by the virus scanner;
# the third element is ref to a list of virus names found (if any).
# (it is guaranteed the list will be nonempty if virus was found)
#
# If there is at least one glob character '*' present in a query template, the
# subroutine will traverse supplied files (@$bare_fnames) and call a supplied
# subroutine or program for each file to be scanned, summarizing the final
# av scan result. If there are no glob characters in a template, the result
# is a single call to a supplied subroutine or program, which will presumably
# traverse a directory by itself.
#
sub run_av(@) {
my($bare_fnames, # a ref to a list of filenames to scan (basenames)
$names_to_parts, # ref to a hash that maps base file names to parts object
$tempdir, # temporary directory
# n-tuple from an @av_scanners list entry starts here
$av_name, $command, $args,
$sts_clean, # a ref to a list of status values, or a regexp
$sts_infected, # a ref to a list of status values, or a regexp
$how_to_get_names, # ref to sub, or a regexp to get list of virus names
$pre_code, $post_code, # routines to be invoked before and after av
) = @_;
my($scan_status,@virusnames,$error_str); my $output = '';
return (0,$output,\@virusnames) if !defined($bare_fnames) || !@$bare_fnames;
my($query_template, $socket_specs); my $av_protocol = '';
if (!ref $args) {
$query_template = $args;
} else {
($query_template, $socket_specs) = @$args;
$socket_specs = $socket_specs->[0] if ref $socket_specs;
if (defined $socket_specs) {
local($1);
$av_protocol = lc($1) if $socket_specs =~ /^([a-z][a-z0-9.+-]*):/si;
}
}
my $one_at_a_time = 0;
$one_at_a_time = 1 if ref $command &&
$av_protocol !~ /^(?:sssp|savapi|clamd)\z/;
my(@query_template) = $one_at_a_time ? $query_template # treat it as one arg
: split(' ',$query_template); # shell-like
my $bare_fnames_last = $#{$bare_fnames};
do_log(5,"run_av (%s): query template(%s,%d): %s",
$av_name,$one_at_a_time,$bare_fnames_last,$query_template);
my($remaining_time, $deadline) = prolong_timer('run_av_pre');
my $cwd = "$tempdir/parts";
chdir($cwd) or die "Can't chdir to $cwd: $!";
&$pre_code(@_) if defined $pre_code;
# a '{}' will be replaced by a directory name, '{}/*' and '*' by file names
local($1);
my(@query_expanded) = map($_ eq '*' || $_ eq '{}/*' ? []
: m{^ \{ \} ( / .* )? \z}xs ? "$tempdir/parts$1"
: $_, @query_template);
my $eval_stat;
eval {
for (my $k = 0; $k <= $bare_fnames_last; ) { # traverse fnames in chunks
my(@processed_filenames);
my $arglist_size = 0; # size of a command with its arguments so far
for ($command,@query_expanded) { $arglist_size+=length($_)+1 if !ref $_ }
for (@query_expanded) { @$_ = () if ref $_ } # reset placeholder lists
while ($k <= $bare_fnames_last) { # traverse fnames individually
my $f = $bare_fnames->[$k]; my $multi = 0;
if ($one_at_a_time) { # glob templates may be substrings anywhere
local($1); @query_expanded = @query_template; # start afresh
s{ ( \{\} (?: / \* )? | \* ) }
{ $1 eq '{}' ? "$tempdir/parts"
: $1 eq '{}/*' ? ($multi=1,"$tempdir/parts/$f")
: $1 eq '*' ? ($multi=1,$f) : $1
}xgse for @query_expanded;
} else {
# collect as many filename arguments as suitable, but at least one
my $arg_size = 0;
for (@query_template) {
if ($_ eq '{}/*') { $arg_size += length("$tempdir/parts/$f") + 1 }
elsif ($_ eq '*') { $arg_size += length($f) + 1 }
}
# do_log(5,"run_av arglist size: %d + %d", $arglist_size,$arg_size);
if (@processed_filenames && $arglist_size + $arg_size > 4000) {
# POSIX requires 4 kB as a minimum buffer size for program args
last; # enough collected for now, the rest on the next iteration
}
# exact matching on command arguments, no substring matches
for my $j (0..$#query_template) {
if (ref $query_expanded[$j]) { # placeholders collecting fnames
my $arg = $query_template[$j];
my $repl = $arg eq '{}/*' ? "$tempdir/parts/$f"
: $arg eq '*' ? $f : undef;
$multi = 1;
push(@{$query_expanded[$j]}, untaint($repl));
$arglist_size += length($repl) + 1;
}
}
}
$k = $multi ? $k+1 : $bare_fnames_last+1;
push(@processed_filenames, $multi ? $f : "$tempdir/parts");
last if $one_at_a_time;
}
# now that arguments have been expanded, invoke the scanner
my($child_stat,$t_status,$t_output);
prolong_timer('run_av_scan'); # restart timer
if (ref $command) {
my(@q) = map(ref $_ ? @$_ : $_, @query_expanded);
ll(3) && do_log(3, "run_av Using (%s): (code) %s",
$av_name, join(' ',@q));
# call subroutine directly, passing all our arguments to it
($t_status,$t_output) = &$command(!@q ? '' : @q==1 ? $q[0] : \@q, @_);
prolong_timer('run_av_3'); # restart timer
$child_stat = 0; # no spawned process, just declare success
do_log(4,"run_av (%s) result: %s", $av_name,$t_output);
} else {
my($proc_fh,$pid); my $results_ref;
my $eval_stat2;
eval {
my(@q) = map(ref $_ ? @$_ : $_, @query_expanded);
ll(3) && do_log(3,"run_av Using (%s): %s %s",
$av_name,$command,join(' ',@q));
($proc_fh,$pid) = run_command(undef, '&1', $command, @q);
($results_ref,$child_stat) =
collect_results($proc_fh,$pid, $av_name,200*1024);
1;
} or do { $eval_stat2 = $@ ne '' ? $@ : "errno=$!" };
undef $proc_fh; undef $pid;
$error_str = exit_status_str($child_stat,0);
$t_status = WEXITSTATUS($child_stat) if defined $child_stat;
prolong_timer('run_av_4'); # restart timer
if (defined $eval_stat2) {
chomp $eval_stat2; $error_str = $eval_stat2;
do_log(-1, "run_av (%s): %s", $av_name,$eval_stat2);
}
if (defined $results_ref)
{ $t_output = $$results_ref; undef $results_ref }
chomp($t_output); my $t_output_trimmed = $t_output;
$t_output_trimmed =~ s/\r\n/\n/gs; local($1);
$t_output_trimmed =~ s/([ \t\n\r])[ \t\n\r]{4,}/$1.../gs;
$t_output_trimmed = "..." . substr($t_output_trimmed,-800)
if length($t_output_trimmed) > 800;
do_log(3, "run_av: %s %s, %s", $command,$error_str,$t_output_trimmed);
}
if (!defined($child_stat) || !WIFEXITED($child_stat)) {
# leave $scan_status undefined, indicating an error
# braindamaged Perl: empty string implies the last successfully
# matched regular expression; we must avoid this
} elsif (defined $sts_infected && (
ref($sts_infected) eq 'ARRAY' ? (grep($_==$t_status, @$sts_infected))
: $sts_infected eq '' ? 1 # avoid m// stupidity
: $t_output=~/$sts_infected/m)) { # is infected
# test for infected first, in case both expressions match
$scan_status = 1; # 'true' indicates virus found
my(@t_virusnames) = ref($how_to_get_names) eq 'CODE'
? &$how_to_get_names($t_output)
: $how_to_get_names eq '' ? ()
: $t_output=~/$how_to_get_names/gm;
@t_virusnames = grep(defined $_, @t_virusnames);
push(@virusnames, @t_virusnames);
$output .= $t_output . "\n";
do_log(2,"run_av (%s): %s INFECTED: %s", $av_name,
join(' ',@processed_filenames), join(', ',@t_virusnames) );
} elsif (!defined($sts_clean)) { # clean, but inconclusive
# by convention: undef $sts_clean means result is inconclusive,
# file appears clean, but continue scanning with other av scanners,
# the current scanner does not want to vouch for it; useful for a
# scanner like jpeg checker which tests for one vulnerability only
do_log(3,"run_av (%s): CLEAN, but inconclusive", $av_name);
} elsif (ref($sts_clean) eq 'ARRAY'
? (grep($_==$t_status, @$sts_clean))
: ""=~/x{0}/ && $t_output=~/$sts_clean/m) { # is clean
# 'false' (but defined) indicates no viruses
$scan_status = 0 if !$scan_status; # no viruses, no errors
do_log(3,"run_av (%s): CLEAN", $av_name);
} else {
# $error_str = "unexpected $error_str, output=\"$t_output_trimmed\"";
$error_str = "unexpected $error_str, output=\"$t_output\"";
do_log(-1,"run_av (%s) FAILED - %s", $av_name,$error_str);
last; # error, bail out
}
die "Exceeded allowed time\n" if time >= $deadline;
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
&$post_code(@_) if defined $post_code;
@virusnames = ('') if $scan_status && !@virusnames; # ensure nonempty list
do_log(3,"run_av (%s) result: clean", $av_name)
if defined($scan_status) && !$scan_status;
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
if (defined $eval_stat) {
prolong_timer('run_av_5'); # restart timer
die "run_av error: $eval_stat\n";
}
if (!defined($scan_status) && defined($error_str)) {
die "$command $error_str"; # die is more informative than a return value
}
($scan_status, $output, \@virusnames);
}
# @av_scanners is a list of n-tuples, where fields semantics is:
# 1. name: an AV scanner plain name, to be used in log and reports;
# 2a. program: a scanner program name; this string will be submitted to
# subroutine find_external_programs(), which will try to find the full
# program path name during startup according to a search path in variable
# $path; if program is not found, this scanner is disabled. Besides a
# simple string (a full program path name or just the basename to be
# looked for in PATH), this may be an array ref of alternative program
# names or full paths - the first match in the list will be used;
# 2b. subroutine: alternatively, this second field may be a subroutine
# reference, and the whole n-tuple entry is passed to it as args;
# it should return a triple: ($scan_status,$output,$virusnames_ref),
# where:
# - $scan_status is: true if a virus was found, 0 if no viruses,
# undef if scanner was unable to complete its job (failed);
# - $output is an optional result string to appear in logging and macro %v;
# - $virusnames_ref is a ref to a list of detected virus names (may be
# undef or a ref to an empty list);
# 3. args: command arguments to be given to the scanner program;
# a substring {} will be replaced by the directory name to be scanned, i.e.
# "$tempdir/parts", a "*" will be replaced by base file names of parts;
# 4. clean: an array ref of av scanner exit status values, or a regexp
# (to be matched against scanner output), indicating NO VIRUSES found;
# a special case is a value undef, which does not claim file to be clean
# (i.e. it never matches, similar to []), but suppresses a failure warning;
# to be used when the result is inconclusive (useful for specialized and
# quick partial scanners such as jpeg checker);
# 5. infected: an array ref of av scanner exit status values, or a regexp
# (to be matched against scanner output), indicating VIRUSES WERE FOUND;
# a value undef may be used and it never matches (for consistency with 4.);
# Note: the virus match prevails over a 'not found' match, so it is safe
# even if the no. 4. matches for viruses too;
# 6. virus name: a regexp (to be matched against scanner output), returning
# a list of virus names found, or a sub ref, returning such a list when
# given scanner output as argument;
# 7. and 8.: (optional) subroutines to be executed before and after scanner
# (e.g. to set environment or current directory);
# see examples for these at KasperskyLab AVP and NAI uvscan.
sub virus_scan($$) {
my($msginfo,$firsttime) = @_;
my $tempdir = $msginfo->mail_tempdir;
my($scan_status,$output,@virusname);
my(@detecting_scanners,@av_scanners_results);
my $anyone_done = 0; my $anyone_tried = 0;
my($bare_fnames_ref,$names_to_parts);
my $j; my $tier = 'primary';
for my $av (@{ca('av_scanners')}, "\000", @{ca('av_scanners_backup')}) {
next if !defined $av;
if ($av eq "\000") { # 'magic' separator between lists
last if $anyone_done;
do_log(-1,"WARN: all %s virus scanners failed, considering backups",
$tier);
$tier = 'secondary'; next;
}
next if !ref $av || !defined $av->[1];
if (!defined $bare_fnames_ref) { # first time: collect file names to scan
my $parts_root = $msginfo->parts_root;
($bare_fnames_ref,$names_to_parts) =
files_to_scan("$tempdir/parts", $parts_root);
if (!@$bare_fnames_ref) {
do_log(2, "Not calling virus scanners, no files to scan in %s/parts",
$tempdir);
} else {
do_log(5, "Calling virus scanners, %d files to scan in %s/parts",
scalar(@$bare_fnames_ref), $tempdir);
}
}
my($scanner_name,$command) = @$av;
$anyone_tried = 1; my($this_status,$this_output,$this_vn);
if (!@$bare_fnames_ref) { # no files to scan?
($this_status,$this_output,$this_vn) = (0, '', undef); # declare clean
} else { # call virus scanner
do_log(5, "invoking av-scanner %s", $scanner_name);
eval {
($this_status,$this_output,$this_vn) = ref $command eq 'CODE'
? &$command($bare_fnames_ref,$names_to_parts,$tempdir, @$av)
: run_av($bare_fnames_ref,$names_to_parts,$tempdir, @$av);
1;
} or do {
my $err = $@ ne '' ? $@ : "errno=$!"; chomp $err;
$err = sprintf("%s av-scanner FAILED: %s", $scanner_name, $err);
do_log(-1, "%s", $err);
$this_status = undef;
};
}
$anyone_done = 1 if defined $this_status;
$j++; section_time("AV-scan-$j");
if ($this_status && $this_vn && @$this_vn) {
@$this_vn = unique_list($this_vn);
# virus is reported by this scanner; is it for real, or is it just spam?
my(@spam_hits); my $vnts = ca('virus_name_to_spam_score_maps');
@spam_hits = # map each reported virus name to spam score or to undef
map(scalar(lookup2(0,$_,$vnts)), @$this_vn) if ref $vnts;
if (@spam_hits && !grep(!defined($_), @spam_hits)) { # all defined
# AV scanner did trigger, but all provided names are actually spam!
my(%seen);
for my $r (@{$msginfo->per_recip_data}) {
my $spam_tests = $r->spam_tests;
if ($spam_tests) {
local($1,$2);
for (split(/,/, join(',',map($$_,@$spam_tests)))) {
$seen{$1} = $2 if /^AV\.([^=]*)=([0-9.+-]+)\z/;
}
}
}
my(@vnms,@hits);
# remove already detected virus names and duplicates from the list
for my $j (0..$#$this_vn) {
my $vname = $this_vn->[$j];
if (!exists($seen{$vname})) {
push(@vnms,$vname); push(@hits,$spam_hits[$j]);
$seen{$vname} = $spam_hits[$j]; # keep only one copy
}
}
@$this_vn = @vnms; @spam_hits = @hits;
if (!@spam_hits) {
do_log(2,"Turning AV infection into a spam report, ".
"name already accounted for");
} else {
my $spam_level = max(@spam_hits);
my $spam_tests = join(',',
map(sprintf("AV:%s=%s", $this_vn->[$_], $spam_hits[$_]),
(0..$#$this_vn) ));
for my $r (@{$msginfo->per_recip_data}) {
$r->spam_level( ($r->spam_level || 0) + $spam_level );
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
push(@{$r->spam_tests}, \$spam_tests);
}
}
my $spam_report = $spam_tests;
my $spam_summary =
sprintf("AV scanner %s reported spam (not infection):\n%s\n",
$scanner_name, join(',',@$this_vn));
do_log(2,"Turning AV infection into a spam report: score=%s, %s",
$spam_level, $spam_tests);
if (defined($msginfo->spam_report)||defined($msginfo->spam_summary)){
$spam_report = $msginfo->spam_report . ', ' . $spam_report
if $msginfo->spam_report ne '';
$spam_summary = $msginfo->spam_summary . "\n\n" . $spam_summary
if $msginfo->spam_summary ne '';
}
$msginfo->spam_report($spam_report);
$msginfo->spam_summary($spam_summary);
}
$this_status = 0; @$this_vn = (); # TURN OFF ALERT for this AV scanner!
}
}
push(@av_scanners_results,
[$av, $this_status, !$this_vn ? () : @$this_vn]);
if ($this_status) { # a virus detected by this scanner, really! (not spam)
push(@detecting_scanners, $scanner_name);
if (!@virusname) { # store results of the first scanner detecting
@virusname = @$this_vn if $this_vn;
$scan_status = $this_status; $output = $this_output;
}
last if c('first_infected_stops_scan'); # stop now if we found a virus?
} elsif (!defined($scan_status)) { # tentatively keep regardless of status
$scan_status = $this_status; $output = $this_output;
}
}
if (ll(2) && @virusname && @detecting_scanners) {
my(@ds) = @detecting_scanners; s/,/;/ for @ds; # facilitates parsing
do_log(2, "virus_scan: (%s), detected by %d scanners: %s",
join(', ',@virusname), scalar(@ds), join(', ',@ds));
}
$output =~ s{\Q$tempdir\E/parts/?}{}gs if defined $output; # hide path info
if (!$anyone_tried) { die "NO VIRUS SCANNERS AVAILABLE\n" }
elsif (!$anyone_done) { die "ALL VIRUS SCANNERS FAILED\n" }
($scan_status, $output, \@virusname,
\@detecting_scanners, \@av_scanners_results); # return a 5-tuple
}
# return a ref to a list of files to be scanned in a given directory
#
sub files_to_scan($$) {
my($dir,$parts_root) = @_;
my $names_to_parts = {}; # a hash that maps base file names
# to Amavis::Unpackers::Part object
# traverse decomposed parts tree breadth-first, match it to actual files
for (my $part, my(@unvisited)=($parts_root);
@unvisited and $part=shift(@unvisited);
push(@unvisited,@{$part->children}))
{ $names_to_parts->{$part->base_name} = $part if $part ne $parts_root }
my $bare_fnames_ref = []; my(%bare_fnames);
# traverse parts directory and check for actual files
local(*DIR); opendir(DIR,$dir) or die "Can't open directory $dir: $!";
# modifying a directory while traversing it can cause surprises, avoid;
# avoid slurping the whole directory contents into memory
my($f, @rmfiles, @rmdirs);
while (defined($f = readdir(DIR))) {
next if $f eq '.' || $f eq '..';
my $fname = $dir . '/' . $f;
my(@stat_list) = lstat($fname); my $errn = @stat_list ? 0 : 0+$!;
next if $errn == ENOENT;
if ($errn) { die "files_to_scan: file $fname inaccessible: $!" }
add_entropy(@stat_list);
if (!-r _) { # attempting to gain read access to the file
do_log(3,"files_to_scan: attempting to gain read access to %s", $fname);
chmod(0750, untaint($fname))
or die "files_to_scan: Can't change protection on $fname: $!";
$errn = lstat($fname) ? 0 : 0+$!;
if ($errn) { die "files_to_scan: file $fname inaccessible: $!" }
if (!-r _) { die "files_to_scan: file $fname not readable" }
}
if (!-f _ || !exists $names_to_parts->{$f}) {
# not a regular file or unexpected
my $what = -l _ ? 'symlink' : -d _ ? 'directory' : -f _ ? 'file'
: 'non-regular file';
my $msg = "removing unexpected $what $fname";
$msg .= ", it has no corresponding parts object"
if !exists $names_to_parts->{$f};
do_log(-1, "WARN: files_to_scan: %s", $msg);
if (-d _) { push(@rmdirs, $f) } else { push(@rmfiles, $f) }
} elsif (-z _) {
# empty file
} else {
if ($f !~ /^[A-Za-z0-9_.-]+\z/s) {
do_log(-1,"WARN: files_to_scan: unexpected/suspicious file name: %s",
$f);
}
push(@$bare_fnames_ref,$f); $bare_fnames{$f} = 1;
}
}
closedir(DIR) or die "Error closing directory $dir: $!";
for my $f (@rmfiles) {
my $fname = $dir . '/' . untaint($f);
do_log(5,"files_to_scan: deleting file %s", $fname);
unlink($fname) or die "Can't delete $fname: $!";
}
undef @rmfiles;
for my $d (@rmdirs) {
my $dname = $dir . '/' . untaint($d);
do_log(5,"files_to_scan: deleting directory %s", $dname);
rmdir_recursively($dname);
}
undef @rmdirs;
# remove entries from %$names_to_parts that have no corresponding files
my($fname,$part);
while ( ($fname,$part) = each %$names_to_parts ) {
next if exists $bare_fnames{$fname};
if (ll(4) && $part->exists) {
my $type_short = $part->type_short;
do_log(4,"files_to_scan: info: part %s (%s) no longer present",
$fname, (!ref $type_short ? $type_short : join(', ',@$type_short)) );
}
delete $names_to_parts->{$fname}; # delete is allowed for the current elem.
}
($bare_fnames_ref, $names_to_parts);
}
1;
__DATA__
#
package Amavis::SpamControl;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
use Fcntl qw(:flock);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform c cr ca);
import Amavis::Util qw(ll do_log min max minmax untaint untaint_inplace
unique_list);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::rfc2821_2822_Tools qw(make_query_keys qquote_rfc2821_local);
}
sub new {
my $class = $_[0];
my $self = bless { scanners_list => [] }, $class;
for my $as (@{ca('spam_scanners')}) {
if (ref $as && defined $as->[1] && $as->[1] ne '') {
my($scanner_name,$module,@args) = @$as; my $scanner_obj;
do_log(5, "SpamControl: attempting to load scanner %s, module %s",
$scanner_name,$module);
{ no strict 'subs';
$scanner_obj = $module->new($scanner_name,$module,@args);
}
if ($scanner_obj) {
push(@{$self->{scanners_list}}, [$scanner_obj, @$as]);
do_log(2, "SpamControl: scanner %s, module %s",
$scanner_name,$module);
} else {
do_log(5, "SpamControl: no scanner %s, module %s",
$scanner_name,$module);
}
}
}
$self;
}
# called at startup, before chroot and before main fork
#
sub init_pre_chroot {
my $self = $_[0];
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
if ($scanner_obj && $scanner_obj->UNIVERSAL::can('init_pre_chroot')) {
$scanner_obj->init_pre_chroot;
do_log(1, "SpamControl: init_pre_chroot on %s done", $scanner_name);
}
}
}
# called at startup, after chroot and changing UID, but before main fork
#
sub init_pre_fork {
my $self = $_[0];
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
if ($scanner_obj && $scanner_obj->UNIVERSAL::can('init_pre_fork')) {
$scanner_obj->init_pre_fork;
do_log(1, "SpamControl: init_pre_fork on %s done", $scanner_name);
}
}
}
# called during child process initialization
#
sub init_child {
my $self = $_[0];
my $failure_msg;
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
if ($scanner_obj && $scanner_obj->UNIVERSAL::can('init_child')) {
eval {
$scanner_obj->init_child;
do_log(5, "SpamControl: init_child on %s done", $scanner_name);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "init_child on spam scanner %s failed: %s",
$scanner_name, $eval_stat);
$failure_msg = "init_child $scanner_name failed: $eval_stat"
if !defined $failure_msg;
};
}
}
if (defined $failure_msg) { die $failure_msg }
}
sub lock {
my($self,$scanner_obj,$lock_type_name) = @_;
my $lock_file = $scanner_obj->{options}->{'lock_file'};
if (defined $lock_file && $lock_file ne '') {
my $lock_type = $scanner_obj->{options}->{$lock_type_name};
$lock_type = $scanner_obj->{options}->{'lock_type'} if !defined $lock_type;
$lock_type = 'exclusive' if !defined $lock_type;
if ($lock_type ne '' && lc($lock_type) ne 'none') {
my $lock_fh = IO::File->new;
$lock_fh->open($lock_file, O_CREAT|O_RDWR, 0640)
or die "Can't open a lock file $lock_file: $!";
$scanner_obj->{lock_fh} = $lock_fh;
my $lock_type_displ;
if (defined $lock_type && lc($lock_type) eq 'shared') {
$lock_type = LOCK_SH; $lock_type_displ = 'a shared';
} else {
$lock_type = LOCK_EX; $lock_type_displ = 'an exclusive';
}
do_log(5,"acquring %s lock on %s for %s",
$lock_type_displ, $lock_file, $scanner_obj->{scanner_name});
flock($lock_fh, $lock_type)
or die "Can't acquire $lock_type_displ lock on $lock_file: $!";
}
}
}
sub unlock {
my($self,$scanner_obj) = @_;
my $lock_fh = $scanner_obj->{lock_fh};
if ($lock_fh) {
my $scanner_name = $scanner_obj->{scanner_name};
do_log(5, "releasing a lock for %s", $scanner_name);
# close would unlock automatically, but let's check for locking mistakes
flock($lock_fh, LOCK_UN)
or die "Can't release a lock for $scanner_name: $!";
$lock_fh->close or die "Can't close a lock file for $scanner_name: $!";
undef $scanner_obj->{lock_fh};
}
}
# actual spam checking for every message
#
sub spam_scan {
my($self,$msginfo) = @_;
my $failure_msg;
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
next if !$scanner_obj && !$scanner_obj->UNIVERSAL::can('check');
do_log(5, "SpamControl: calling spam scanner %s", $scanner_name);
$self->lock($scanner_obj, 'classifier_lock_type');
eval {
$scanner_obj->check($msginfo); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "checking with spam scanner %s failed: %s",
$scanner_name, $eval_stat);
$failure_msg =
"$scanner_name failed: $eval_stat" if !defined $failure_msg;
};
$self->unlock($scanner_obj);
}
if (defined $failure_msg) { die $failure_msg }
1;
}
sub auto_learn {
my($self,$msginfo) = @_;
my $failure_msg;
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
next if !$scanner_obj || !$scanner_obj->UNIVERSAL::can('auto_learn');
next if !$scanner_obj->UNIVERSAL::can('can_auto_learn') ||
!$scanner_obj->can_auto_learn;
# learn-on-error logic: what was the final outcome
my($min_spam_level, $max_spam_level) =
minmax(map($_->spam_level, @{$msginfo->per_recip_data}));
next if !defined $min_spam_level || !defined $max_spam_level;
# learn-on-error logic: what this scanner thinks
my $my_verdict = $msginfo->supplementary_info('VERDICT-'.$scanner_name);
$my_verdict = !defined $my_verdict ? '' : lc $my_verdict;
my $my_score = $msginfo->supplementary_info('SCORE-'.$scanner_name);
$my_score = 0 if !defined $my_score;
# learn-on-error logic: opinions differ?
my $learn_as; # leaving out a contribution by this spam scanner
if ($my_verdict ne 'ham' && $max_spam_level-$my_score < 0.5) {
$learn_as = 'ham';
} elsif ($my_verdict ne 'spam' && $min_spam_level-$my_score >= 5) {
$learn_as = 'spam';
}
next if !defined $learn_as;
ll(2) && do_log(2,
"SpamControl: scanner %s, auto-learn as %s / %.3f (was: %s / %s)",
$scanner_name, $learn_as,
$my_verdict ne 'ham' ? $max_spam_level : $min_spam_level,
$my_verdict, !$my_score ? '0' : sprintf("%.3f",$my_score));
$self->lock($scanner_obj, 'learner_lock_type');
eval {
$scanner_obj->auto_learn($msginfo,$learn_as); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "auto-learning with spam scanner %s failed: %s",
$scanner_name, $eval_stat);
$failure_msg =
"$scanner_name failed: $eval_stat" if !defined $failure_msg;
};
$self->unlock($scanner_obj);
}
if (defined $failure_msg) { die $failure_msg }
1;
}
# called during child process shutdown
#
sub rundown_child() {
my $self = $_[0];
for my $as (@{$self->{scanners_list}}) {
my($scanner_obj,$scanner_name) = @$as;
if ($scanner_obj && $scanner_obj->UNIVERSAL::can('rundown_child')) {
eval {
$scanner_obj->rundown_child;
do_log(5, "SpamControl: rundown_child on %s done", $scanner_name);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1, "rundown_child on spam scanner %s failed: %s",
$scanner_name, $eval_stat);
};
}
}
}
# check envelope sender and author for white or blacklisting by each recipient;
# Saves the result in recip_blacklisted_sender and recip_whitelisted_sender
# properties of each recipient object, and updates spam score for each
# recipient according to soft-w/b-listing.
#
sub white_black_list($$$$) {
my($msginfo,$sql_wblist,$user_id_sql,$ldap_lookups) = @_;
my $fm = $msginfo->rfc2822_from;
my(@rfc2822_from) = !defined($fm) ? () : ref $fm ? @$fm : $fm;
my(@senders) = ($msginfo->sender, @rfc2822_from);
@senders = unique_list(\@senders); # remove possible duplicates
ll(4) && do_log(4,"wbl: checking sender %s",
scalar(qquote_rfc2821_local(@senders)));
my($any_w,$any_b,$all,$wr,$br);
$any_w = 0; $any_b = 0; $all = 1;
for my $r (@{$msginfo->per_recip_data}) { # for each recipient
next if $r->recip_done; # already dealt with
my($wb,$boost); my $found = 0; my $recip = $r->recip_addr;
my($user_id_ref,$mk_ref);
$user_id_ref = $r->user_id;
$user_id_ref = [] if !defined $user_id_ref;
do_log(5,"wbl: (SQL) recip <%s>, %s matches",
$recip, scalar(@$user_id_ref)) if $sql_wblist && ll(5);
for my $sender (@senders) {
for my $ind (0..$#{$user_id_ref}) { # for ALL SQL sets matching the recip
my $user_id = $user_id_ref->[$ind]; my $mkey;
($wb,$mkey) = lookup(0,$sender,
Amavis::Lookup::SQLfield->new($sql_wblist,'wb','S',$user_id) );
do_log(4,'wbl: (SQL) recip <%s>, rid=%s, got: "%s"',
$recip,$user_id,$wb);
if (!defined($wb)) {
# NULL field or no match: remains undefined
} elsif ($wb =~ /^ *([+-]?\d+(?:\.\d*)?) *\z/) { # numeric
my $val = 0+$1; # penalty points to be added to the score
$boost += $val;
ll(2) && do_log(2,
'wbl: (SQL) soft-%slisted (%s) sender <%s> => <%s> (rid=%s)',
($val<0?'white':'black'), $val, $sender, $recip, $user_id);
$wb = undef; # not hard- white or blacklisting, does not exit loop
} elsif ($wb =~ /^[ \000]*\z/) { # neutral, stops the search
$found=1; $wb = 0;
do_log(5, 'wbl: (SQL) recip <%s> is neutral to sender <%s>',
$recip,$sender);
} elsif ($wb =~ /^([BbNnFf])[ ]*\z/) { # blacklisted (B,N(o), F(alse))
$found=1; $wb = -1; $any_b++; $br = $recip;
$r->recip_blacklisted_sender(1);
do_log(5, 'wbl: (SQL) recip <%s> blacklisted sender <%s>',
$recip,$sender);
} else { # whitelisted (W, Y(es), T(true), or anything else)
if ($wb =~ /^([WwYyTt])[ ]*\z/) {
do_log(5, 'wbl: (SQL) recip <%s> whitelisted sender <%s>',
$recip,$sender);
} else {
do_log(-1,'wbl: (SQL) recip <%s> whitelisted sender <%s>, '.
'unexpected wb field value: "%s"', $recip,$sender,$wb);
}
$found=1; $wb = +1; $any_w++; $wr = $recip;
$r->recip_whitelisted_sender(1);
}
last if $found;
}
if (!$found && $ldap_lookups && c('enable_ldap')) { # LDAP queries
my $wblist;
my($keys_ref,$rhs_ref) = make_query_keys($sender,0,0);
my(@keys) = @$keys_ref;
unshift(@keys, '<>') if $sender eq ''; # a hack for a null return path
untaint_inplace($_) for @keys; # untaint keys
$_ = Net::LDAP::Util::escape_filter_value($_) for @keys;
do_log(5,'wbl: (LDAP) query keys: %s', join(', ',map("\"$_\"",@keys)));
$wblist = lookup(0,$recip,Amavis::Lookup::LDAPattr->new(
$ldap_lookups, 'amavisBlacklistSender', 'L-'));
for my $key (@keys) {
if (grep(lc($_) eq lc($key), @$wblist)) {
$found=1; $wb = -1; $br = $recip; $any_b++;
$r->recip_blacklisted_sender(1);
do_log(5,'wbl: (LDAP) recip <%s> blacklisted sender <%s>',
$recip,$sender);
}
}
$wblist = lookup(0,$recip,Amavis::Lookup::LDAPattr->new(
$ldap_lookups, 'amavisWhitelistSender', 'L-'));
for my $key (@keys) {
if (grep(lc($_) eq lc($key), @$wblist)) {
$found=1; $wb = +1; $wr = $recip; $any_w++;
$r->recip_whitelisted_sender(1);
do_log(5,'wbl: (LDAP) recip <%s> whitelisted sender <%s>',
$recip,$sender);
}
}
}
if (!$found) { # fall back to static lookups if no match
# sender can be both white- and blacklisted at the same time
my($val, $r_ref, $mk_ref, @t);
# NOTE on the specifics of $per_recip_blacklist_sender_lookup_tables :
# the $r_ref below is supposed to be a ref to a single lookup table
# for compatibility with pre-2.0 versions of amavisd-new;
# Note that this is different from @score_sender_maps, which is
# supposed to contain a ref to a _list_ of lookup tables as a result
# of the first-level lookup (on the recipient address as a key).
#
($r_ref,$mk_ref) = lookup(0,$recip,
Amavis::Lookup::Label->new("blacklist_recip<$recip>"),
cr('per_recip_blacklist_sender_lookup_tables'));
@t = ((defined $r_ref ? $r_ref : ()), @{ca('blacklist_sender_maps')});
$val = lookup2(0,$sender,\@t,Label=>"blacklist_sender<$sender>") if @t;
if ($val) {
$found=1; $wb = -1; $br = $recip; $any_b++;
$r->recip_blacklisted_sender(1);
do_log(5,'wbl: recip <%s> blacklisted sender <%s>', $recip,$sender);
}
# similar for whitelists:
($r_ref,$mk_ref) = lookup(0,$recip,
Amavis::Lookup::Label->new("whitelist_recip<$recip>"),
cr('per_recip_whitelist_sender_lookup_tables'));
@t = ((defined $r_ref ? $r_ref : ()), @{ca('whitelist_sender_maps')});
$val = lookup2(0,$sender,\@t,Label=>"whitelist_sender<$sender>") if @t;
if ($val) {
$found=1; $wb = +1; $wr = $recip; $any_w++;
$r->recip_whitelisted_sender(1);
do_log(5,'wbl: recip <%s> whitelisted sender <%s>', $recip,$sender);
}
}
if (!defined($boost)) { # lookup @score_sender_maps if no match with SQL
# note the first argument of lookup() is true, requesting ALL matches
my($r_ref,$mk_ref) = lookup2(1,$recip, ca('score_sender_maps'),
Label=>"score_recip<$recip>");
for my $j (0..$#{$r_ref}) { # for ALL tables matching the recipient
my($val,$key) = lookup2(0,$sender,$r_ref->[$j],
Label=>"score_sender<$sender>");
if (defined $val && $val != 0) {
$boost += $val;
ll(2) && do_log(2,'wbl: soft-%slisted (%s) sender <%s> => <%s>, '.
'recip_key="%s"', ($val<0?'white':'black'),
$val, $sender, $recip, $mk_ref->[$j]);
}
}
}
} # endfor on @senders
if ($boost) { # defined and nonzero
$r->spam_level( ($r->spam_level || 0) + $boost);
my $spam_tests = 'AM.WBL=' . (0+sprintf("%.3f",$boost));
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
unshift(@{$r->spam_tests}, \$spam_tests);
}
}
$all = 0 if !$wb;
} # endfor on recips
if (!ll(2)) {
# don't bother preparing a log report which will not be printed
} else {
my $msg = '';
if ($all && $any_w && !$any_b) { $msg = "whitelisted" }
elsif ($all && $any_b && !$any_w) { $msg = "blacklisted" }
elsif ($all) { $msg = "black or whitelisted by all recips" }
elsif ($any_b || $any_w) {
$msg .= "whitelisted by ".($any_w>1?"$any_w recips, ":"$wr, ") if $any_w;
$msg .= "blacklisted by ".($any_b>1?"$any_b recips, ":"$br, ") if $any_b;
$msg .= "but not by all,";
}
do_log(2,"wbl: %s sender %s",
$msg, scalar(qquote_rfc2821_local(@senders))) if $msg ne '';
}
($any_w+$any_b, $all);
}
1;
__DATA__
#
package Amavis::SpamControl::ExtProg;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars :sa c cr ca);
import Amavis::Util qw(ll do_log sanitize_str min max minmax
prolong_timer get_deadline);
import Amavis::ProcControl qw(exit_status_str proc_status_ok
kill_proc run_command run_command_consumer);
import Amavis::rfc2821_2822_Tools qw(qquote_rfc2821_local);
import Amavis::Timing qw(section_time);
}
use subs @EXPORT_OK;
use Errno qw(EIO EINTR EAGAIN ECONNRESET EBADF);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use Time::HiRes ();
sub new {
my($class, $scanner_name,$module,@args) = @_;
my($cmd,$cmdargs,%options) = @args;
return if !defined $cmd || $cmd eq '';
bless {
scanner_name => $scanner_name, command => $cmd, args => $cmdargs,
options => \%options,
}, $class;
}
sub check {
my($self,$msginfo) = @_;
$self->check_or_learn($msginfo,undef);
};
sub auto_learn {
my($self,$msginfo,$learn_as) = @_;
$self->check_or_learn($msginfo,$learn_as);
}
sub can_auto_learn {
my $self = $_[0];
my $opt = $self->{options};
$opt && defined $opt->{'learn_ham'} && defined $opt->{'learn_spam'};
}
# pass a mail message to an external (spam checking) program,
# extract interesting header fields from the result
#
sub check_or_learn {
my($self,$msginfo,$learn_as) = @_;
my $scanner_name = $self->{scanner_name};
my $cmd = $self->{command};
my $cmdargs; my $auto_learning;
if (!defined $learn_as) {
$cmdargs = $self->{args};
} elsif ($learn_as eq 'ham') {
$cmdargs = $self->{options}->{'learn_ham'}; $auto_learning = 1;
} elsif ($learn_as eq 'spam') {
$cmdargs = $self->{options}->{'learn_spam'}; $auto_learning = 1;
}
my $size_limit;
my $mbsl = $self->{options}->{'mail_body_size_limit'};
$mbsl = c('sa_mail_body_size_limit') if !defined $mbsl;
if (defined $mbsl) {
$size_limit = min(64*1024, $msginfo->orig_header_size) + 1 +
min($mbsl, $msginfo->orig_body_size);
# don't bother if slightly oversized, it's faster without size checks
undef $size_limit if $msginfo->msg_size < $size_limit + 5*1024;
}
my $prefix = '';
# fake a local delivery agent by inserting a Return-Path
$prefix .= sprintf("Return-Path: %s\n", $msginfo->sender_smtp);
$prefix .= sprintf("X-Envelope-To: %s\n",
join(",\n ",qquote_rfc2821_local(@{$msginfo->recips})));
my $os_fp = $msginfo->client_os_fingerprint;
$prefix .= sprintf("X-Amavis-OS-Fingerprint: %s\n",
sanitize_str($os_fp)) if defined($os_fp) && $os_fp ne '';
my(@av_tests);
my $per_recip_data = $msginfo->per_recip_data;
$per_recip_data = [] if !$per_recip_data;
for my $r (@$per_recip_data) {
my $spam_tests = $r->spam_tests;
push(@av_tests, grep(/^AV\..+=/,
split(/,/, join(',',map($$_,@$spam_tests))))) if $spam_tests;
}
$prefix .= sprintf("X-Amavis-AV-Status: %s\n",
sanitize_str(join(',',@av_tests))) if @av_tests;
$prefix .= sprintf("X-Amavis-PolicyBank: %s\n", c('policy_bank_path'));
$prefix .= sprintf("X-Amavis-MessageSize: %d%s\n", $msginfo->msg_size,
!defined $size_limit ? '' : ", TRUNCATED to $size_limit");
my $resp_stdout_fh = IO::File->new; # parent reading side of the pipe
my $child_stdout_fh = IO::File->new; # child stdout writing side of a pipe
my $resp_stderr_fh = IO::File->new; # parent reading side of the pipe
my $child_stderr_fh = IO::File->new; # child stderr writing side of a pipe
pipe($resp_stdout_fh, $child_stdout_fh)
or die "$scanner_name: Can't create pipe1: $!";
pipe($resp_stderr_fh, $child_stderr_fh)
or die "$scanner_name: Can't create pipe2: $!";
binmode($resp_stdout_fh) or die "Can't set pipe1 to binmode: $!";
binmode($resp_stderr_fh) or die "Can't set pipe2 to binmode: $!";
my($proc_fh,$pid) = run_command_consumer('&='.fileno($child_stdout_fh),
'&='.fileno($child_stderr_fh),
$cmd, @$cmdargs);
$child_stdout_fh->close
or die "Parent failed to close child side of the pipe1: $!";
$child_stderr_fh->close
or die "Parent failed to close child side of the pipe2: $!";
undef $child_stdout_fh; undef $child_stderr_fh;
my($remaining_time, $deadline) = get_deadline($scanner_name.'_scan', 0.8, 5);
alarm(0); # stop the timer
my $proc_fd = fileno($proc_fh);
my $resp_stdout_fd = fileno($resp_stdout_fh);
my $resp_stderr_fd = fileno($resp_stderr_fh);
my $response = ''; my $response_stderr = ''; my $response_chopped = 0;
my $child_stat; my $bytes_sent = 0; my $err_on_child = 0;
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
eval {
if (!defined $msg) {
# empty mail
} elsif (ref $msg ne 'SCALAR' && $msg->isa('MIME::Entity')) {
# $msg->print_body($proc_fh); # flushing the pipe?
die "$scanner_name: reading from MIME::Entity is not implemented";
} else { # handles a message in-memory or on a file
my $file_position = $msginfo->skip_bytes;
if (ref $msg ne 'SCALAR') {
$msg->seek($file_position, 0) or die "Can't rewind mail file: $!";
}
my $data_source = $prefix;
my $eof_on_response = 0;
my $eof_on_msg = 0; my $force_eof_on_msg = 0;
my($rout,$wout,$eout,$rin,$win,$ein); $rin=$win=$ein='';
vec($rin,$resp_stdout_fd,1) = 1;
vec($rin,$resp_stderr_fd,1) = 1;
for (;;) {
vec($win,$proc_fd,1) = 0;
vec($win,$proc_fd,1) = 1 if defined $proc_fh &&
(!$eof_on_msg || $data_source ne '');
$ein = $rin | $win;
my $timeout = max(3, $deadline - Time::HiRes::time);
my($nfound,$timeleft) =
select($rout=$rin, $wout=$win, $eout=$ein, $timeout);
defined $nfound && $nfound >= 0
or die "$scanner_name: select failed: $!";
if (vec($rout,$resp_stderr_fd,1)) {
my $inbuf = ''; $! = 0;
my $nread = sysread($resp_stderr_fh, $inbuf, 16384);
if ($nread) { # successful read
ll(5) && do_log(5, 'rx stderr: %d %s [...]',
$nread, substr($inbuf,0,1000));
$response_stderr .= $inbuf if length($response_stderr) < 10000;
} elsif (defined $nread) { # defined but zero: EOF
# sysread returns 0 at eof
} elsif ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # slow down, just in case
} else { # read error
do_log(0,"%s: error reading from pipe2: %s", $scanner_name,$!);
}
}
if (vec($rout,$resp_stdout_fd,1)) {
my $inbuf = ''; $! = 0;
my $nread = sysread($resp_stdout_fh, $inbuf, 16384);
if ($nread) { # successful read
ll(5) && do_log(5, 'rx: %d %s [...]',
$nread, substr($inbuf,0,30));
my $response_l = length($response);
if ($response_chopped || $response_l >= 65536) {
# ignore the rest of input
} else {
$response .= $inbuf;
my $j = $response_l <= 1 ? 0 : $response_l - 1;
# we only need a mail header from the returned text
$response_chopped = 1 if index($response,"\n\n",$j) >= 0;
}
} elsif (defined $nread) { # defined but zero: EOF
$eof_on_response = 1; # sysread returns 0 at eof
} elsif ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # slow down, just in case
} else { # read error
$eof_on_response = 1;
die "$scanner_name: error reading from pipe1: $!";
}
}
if (vec($wout,$proc_fd,1)) { # subprocess is ready to receive more
if ($data_source eq '' && !$eof_on_msg) { # get more data
my $nread = 0;
if ($force_eof_on_msg) {
# pretend to already be at eof
} elsif (ref $msg ne 'SCALAR') { # message is on a file
$nread = $msg->read($data_source,32768);
} elsif ($file_position < length($$msg)) { # message in memory
# do it in chunks, saves memory, cache friendly
$data_source = substr($$msg,$file_position,32768);
$nread = length($data_source);
}
if (!$nread) {
$eof_on_msg = 1;
defined $nread or die "$scanner_name: error reading message: $!";
if (defined $proc_fh) { $proc_fh->close or $err_on_child=$! };
undef $proc_fh;
do_log(5,"tx: eof");
}
$file_position += $nread;
if (defined $size_limit) {
my $remaining_room = $size_limit - $bytes_sent;
$remaining_room = 0 if $remaining_room < 0;
if ($nread > $remaining_room) {
substr($data_source, $remaining_room) = '';
do_log(5,"tx: (size limit) %d -> %d", $nread,$remaining_room);
$force_eof_on_msg = 1;
}
}
}
if ($data_source ne '' && defined $proc_fh) {
ll(5) && do_log(5, "tx: %d %s [...]",
length($data_source), substr($data_source,0,30));
# syswrite does a write(2), no need to call $proc_fh->flush
my $nwrite = syswrite($proc_fh, $data_source);
if (!defined($nwrite)) {
if ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # slow down, just in case
} else {
$data_source = ''; $eof_on_msg = 1; # simulate an eof
do_log(-1,"%s: error writing to pipe: %s", $scanner_name,$!);
$proc_fh->close or $err_on_child=$!; undef $proc_fh;
do_log(5,"tx: eof (wr err)");
}
} elsif ($nwrite > 0) { # successful write
$bytes_sent += $nwrite;
if ($nwrite < length($data_source)) {
substr($data_source,0,$nwrite) = '';
} else {
$data_source = '';
}
}
}
}
last if $eof_on_response;
if (Time::HiRes::time >= $deadline) {
die "$scanner_name: exceeded allowed time\n";
}
}
}
if (defined $proc_fh) { $proc_fh->close or $err_on_child=$! }
$child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"%s failed: %s", $scanner_name,$eval_stat);
kill_proc($pid,$scanner_name,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
};
prolong_timer($scanner_name); # restart timer
substr($response_stderr,2000) = '[...]' if length($response_stderr) > 2000;
if (proc_status_ok($child_stat,$err_on_child)) {
do_log(2, "%s stderr: %s",
$scanner_name,$response_stderr) if $response_stderr ne '';
} else {
do_log(-1,"%s stderr: %s",
$scanner_name,$response_stderr) if $response_stderr ne '';
die "$scanner_name: error running program $cmd: " .
exit_status_str($child_stat,$err_on_child) . "\n";
}
# keep just a header section in $response
if ($response eq '') {
# empty mail
} elsif (substr($response, 0,1) eq "\n") {
$response = ''; # empty header section
} else {
my $ind = index($response,"\n\n"); # find header/body separator
substr($response, $ind+1) = '' if $ind >= 0;
}
my $crm114_score;
if ($cmd =~ /\bcrm/ && $response =~ /^\s*([+-]?\d*(?:\.\d*)?)\s*$/) {
$crm114_score = $1;
$response = ''; # skip the header parsing loop below
}
my(@response_lines) = split(/^/m, $response, -1);
push(@response_lines, "\n", "\n"); # insure a trailing NL and a separator
undef $response;
my(%header_field, @header_field_name, $curr_head);
# scan mail header section retrieved from an external program on its stdout
for my $ln (@response_lines) { # guaranteed to contain header/body separator
if ($ln =~ /^[ \t]/) { # folded
$curr_head .= $ln;
} else { # a new header field, process previous if any
if (defined $curr_head) {
local($1,$2);
if ($curr_head =~ /^ ( (?: X-DSPAM | X-CRM114 | X-Bogosity) [^:]*? )
[ \t]* : [ \t]* (.*) $/xs) {
my($hn,$hb) = ($1,$2); my $hnlc = lc $hn;
push(@header_field_name, $hn) if !exists($header_field{$hnlc});
$header_field{$hnlc} = $hb; # keep last
}
}
$curr_head = $ln;
last if $ln eq "\n";
}
}
my($spam_score, $spam_tests);
my $score_factor = $self->{options}->{'score_factor'};
my $dspam_result = $header_field{lc('X-DSPAM-Result')};
if (defined $dspam_result) {
if ($dspam_result =~ /\b(signature|result|probability|confidence)=.*;/) {
# combined result, split
my(%attribute);
for my $attr (split(/;\s*/, $dspam_result)) {
local($1,$2);
my($n,$v) = ($attr =~ /^([^=]*)=(.*)\z/s) ? ($1,$2) : ('user',$attr);
$v =~ s/^"//; $v =~ s/"\z//; $attribute{$n} = $v;
}
# simulate separate header fields
@header_field_name = qw(X-DSPAM-Result X-DSPAM-Class X-DSPAM-Confidence
X-DSPAM-Probability X-DSPAM-Signature);
for my $hn (@header_field_name) {
my $hnlc = lc $hn; my $name = $hnlc; $name =~ s/^X-DSPAM-//i;
$header_field{$hnlc} = $attribute{$name};
}
}
$dspam_result = $header_field{lc('X-DSPAM-Result')};
my $dspam_signature = $header_field{lc('X-DSPAM-Signature')};
$dspam_result = '' if !defined $dspam_result;
$dspam_signature = '' if !defined $dspam_signature;
chomp($dspam_result); chomp($dspam_signature);
$dspam_signature = '' if $dspam_signature eq 'N/A';
if (!$auto_learning) {
$msginfo->supplementary_info('DSPAMRESULT', $dspam_result);
$msginfo->supplementary_info('DSPAMSIGNATURE', $dspam_signature);
$msginfo->supplementary_info('VERDICT-'.$scanner_name, $dspam_result);
$spam_score = $dspam_result eq 'Spam' ? 10 : -1; # fabricated
$score_factor = 1 if !defined $score_factor;
$spam_score *= $score_factor;
$spam_tests = sprintf("%s.%s=%.3f",
$scanner_name, $dspam_result, $spam_score);
do_log(2,"%s result: %s, score=%.3f, sig=%s",
$scanner_name, $dspam_result, $spam_score, $dspam_signature);
}
}
my $crm114_status = $header_field{lc('X-CRM114-Status')};
if (defined $crm114_score || defined $crm114_status) {
local($1,$2);
if (!defined $crm114_status) { # presumably using --stats_only
# fabricate a Status from score
$crm114_status = !defined $crm114_score ? 'unknown'
: $crm114_score <= -10 ? uc('spam')
: $crm114_score >= +10 ? 'GOOD' : 'UNSURE';
$header_field{lc('X-CRM114-Status')} =
sprintf("%s ( %s )", $crm114_status, $crm114_score);
@header_field_name = qw(X-CRM114-Status);
} elsif ($crm114_status =~ /^([A-Z]+)\s+\(\s+([-\d\.]+)\s+\)/) {
$crm114_status = $1; $crm114_score = $2;
}
my $crm114_cacheid = $header_field{lc('X-CRM114-CacheID')};
if (defined $crm114_cacheid && $crm114_cacheid =~ /^sfid-\s*$/i) {
delete $header_field{lc('X-CRM114-CacheID')}; $crm114_cacheid = undef;
}
s/[ \t\r\n]+\z// for ($crm114_status, $crm114_score, $crm114_cacheid);
$score_factor = -0.10 if !defined $score_factor;
$spam_score = $score_factor * $crm114_score;
$spam_tests = sprintf("%s.%s(%s)=%.3f",
$scanner_name, $crm114_status, $crm114_score, $spam_score);
if (!$auto_learning) {
$msginfo->supplementary_info('VERDICT-'.$scanner_name,
uc $crm114_status eq 'GOOD' ? 'Ham' : $crm114_status);
$msginfo->supplementary_info('CRM114STATUS',
sprintf("%s ( %s )", $crm114_status,$crm114_score));
$msginfo->supplementary_info('CRM114SCORE', $crm114_score);
$msginfo->supplementary_info('CRM114CACHEID', $crm114_cacheid);
do_log(2,"%s result: score=%s (%s), status=%s, cacheid=%s",
$scanner_name, $spam_score,
$crm114_score, $crm114_status, $crm114_cacheid);
}
}
my $bogo_line = $header_field{lc('X-Bogosity')};
my($bogo_status, $bogo_score, $bogo_tests);
if (defined $bogo_line) {
($bogo_status, $bogo_tests, $bogo_score) = split(/,\s*/,$bogo_line);
local($1);
$bogo_score =~ s/^spamicity=([0-9.+-]*).*\z/$1/s;
$spam_score = $bogo_status eq 'Spam' ? 5 : $bogo_status eq 'Ham' ? -5 : 0;
$score_factor = 1 if !defined $score_factor;
$spam_score = $score_factor * $spam_score;
# trim trailing fraction zeroes
$spam_score = 0 + sprintf("%.3f",$spam_score);
$spam_tests = sprintf("%s=%s", $scanner_name, $spam_score);
# $spam_tests = sprintf("%s(%s/%s)=%s",
# $scanner_name, $bogo_status, $bogo_score, $spam_score);
if (!$auto_learning) {
$msginfo->supplementary_info('VERDICT-'.$scanner_name, $bogo_status);
$msginfo->supplementary_info('BOGOSTATUS', sprintf("%s ( %s )",
$bogo_status, $bogo_score));
$msginfo->supplementary_info('BOGOSCORE', $bogo_score);
do_log(2,"%s result: score=%s (%s), status=%s",
$scanner_name, $spam_score, $bogo_score, $bogo_status);
}
}
if (!$auto_learning) {
my $hdr_edits = $msginfo->header_edits;
my $use_our_hdrs = cr('prefer_our_added_header_fields');
my $allowed_hdrs = cr('allowed_added_header_fields');
my $all_local = !grep(!$_->recip_is_local, @$per_recip_data);
for my $hn (@header_field_name) {
my $hnlc = lc $hn; my $hb = $header_field{$hnlc};
if (defined $hb) {
$hb =~ s/[ \t\r\n]+\z//; # trim trailing whitespace and eol
do_log(5,"%s: suppl attr: %s = '%s'", $scanner_name,$hn,$hb);
$msginfo->supplementary_info($hn,$hb);
# add header fields to passed mail for all recipients
if ($all_local && $allowed_hdrs && $allowed_hdrs->{$hnlc} &&
!($use_our_hdrs && $use_our_hdrs->{$hnlc})) {
$hdr_edits->add_header($hn,$hb,2);
}
}
}
if (defined $spam_score) {
$msginfo->supplementary_info('SCORE-'.$scanner_name, $spam_score);
for my $r (@$per_recip_data) {
$r->spam_level( ($r->spam_level || 0) + $spam_score );
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
push(@{$r->spam_tests}, \$spam_tests);
}
}
}
}
section_time($scanner_name);
}
1;
__DATA__
#
package Amavis::SpamControl::RspamdClient;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
=pod
=head1 Amavis extension module to use Rspamd as a spam checker
Copyright (c) 2019 Ralph Seichter, partially based on the
SpamdClient extension. Released under GNU General Public
License; see Amavis LICENSE file for details.
=head2 Example configuration #1 (local Rspamd)
# Rspamd running on the same machine as Amavis. Default URL
# is http://127.0.0.1:11333/checkv2 , matching Rspamd's
# "normal" worker defaults.
@spam_scanners = ( [
'Local Rspamd', 'Amavis::SpamControl::RspamdClient',
# Adjust scores according to Rspamd's "required score"
# setting (defaults to 15). Scores reported by Rspamd
# will be multiplied with this factor. The following
# adjusts Rspamd scores to SpamAssassin scores. While
# this setting is technically optional, not adjusting
# scores is prone to cause headaches.
score_factor => $sa_tag2_level_deflt / 15.0,
# MTA name is used to assess validity of existing
# Authentication-Results headers, e.g. if DKIM/DMARC
# validation has already happened.
mta_name => 'mail.example.com',
] );
=head2 Example configuration #2 (remote Rspamd)
# Rspamd running behind HTTPS-capable proxy using basic
# authentication to control access.
@spam_scanners = ( [
'Remote Rspamd', 'Amavis::SpamControl::RspamdClient',
url => 'https://rspamd-proxy.example.com/checkv2',
# Response timeout in seconds. Default is 60, matching
# Rspamd's standard config for the "normal" worker.
timeout => 42,
# SSL-options and -credentials passed to LWP::UserAgent,
# see https://metacpan.org/pod/LWP::UserAgent . Default:
# ssl_opts => { verify_hostname => 1 },
credentials => {
# The following <host>:<port> must match the 'url'
# defined above or credentials won't be transmitted.
netloc => 'rspamd-proxy.example.com:443',
# Remote authentication realm
realm => 'Rspamd restricted access',
username => 'Marco',
password => 'Polo',
},
# Don't scan messages remotely if the body size extends
# the following limit (optional setting).
mail_body_size_limit => 32 * 1024,
score_factor => $sa_tag2_level_deflt / 15.0,
mta_name => 'mail.example.com',
] );
=head2 Requirements
In addition to Amavis' core requirements, this extension needs
the following additional Perl modules:
JSON
HTTP::Message
LWP::UserAgent
LWP::Protocol::https
Net::SSLeay
Should your host OS not provide the necessary packages, these
modules can be obtained via https://www.cpan.org .
=cut
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Util qw(do_log min prolong_timer);
import Amavis::rfc2821_2822_Tools qw(qquote_rfc2821_local);
import Amavis::Timing qw(section_time);
}
use JSON qw(decode_json);
use LWP::UserAgent;
sub new {
my ($class, $scanner_name, $module, @args) = @_;
my (%options) = @args;
bless { scanner_name => $scanner_name, options => \%options }, $class;
}
# Pass meta information using Rspamd's non-standard HTTP headers.
sub pass_meta {
my ($request, $name, $value) = @_;
if (defined $value && $value ne '') {
$request->header($name => $value);
}
}
# Invoked by Amavis to spam-check one message.
sub check {
my ($self, $msginfo) = @_;
my ($which_section, $spam_level, $rspamd_action, $rspamd_rscore,
$rspamd_skipped, $rspamd_tests, $rspamd_verdict, $size_limit);
my $scanner_name = $self->{scanner_name};
my $mbsl = $self->{options}->{'mail_body_size_limit'};
if (defined $mbsl) {
$size_limit = min(32 * 1024, $msginfo->orig_header_size) +
min($mbsl, $msginfo->orig_body_size);
# Allow slightly oversized messages to pass in full.
undef $size_limit if $msginfo->msg_size < $size_limit + 5 * 1024;
}
my $per_recip_data = $msginfo->per_recip_data;
$per_recip_data = [] if !$per_recip_data;
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # In-memory copy available?
$msg = $msg_str_ref if ref $msg_str_ref;
eval {
if (!defined $msg) {
do_log(3, "Empty message");
}
elsif (ref $msg eq 'SCALAR') {
$which_section = 'rspamd_connect';
my $timeout = $self->{options}->{'timeout'};
$timeout = 60 unless defined $timeout;
my $url = $self->{options}->{'url'};
$url = 'http://127.0.0.1:11333/checkv2' unless defined $url;
do_log(3, "connecting to rspamd %s (timeout %s)", $url, $timeout);
my $request = HTTP::Request->new(POST => $url);
$request->content_type('application/octet-stream');
$request->content(defined $size_limit ? substr($$msg, 0, $size_limit) : $$msg);
pass_meta($request, 'Helo', $msginfo->client_helo);
pass_meta($request, 'Hostname', $msginfo->client_name);
pass_meta($request, 'IP', $msginfo->client_addr);
pass_meta($request, 'MTA-Name', $self->{options}->{'mta_name'});
pass_meta($request, 'From', $msginfo->sender_smtp);
pass_meta($request, 'Queue-Id', $msginfo->queue_id);
for my $rcpt (qquote_rfc2821_local(@{$msginfo->recips})) {
pass_meta($request, 'Rcpt', $rcpt);
}
$which_section = 'rspamd_tx';
my $ssl_opts = $self->{options}->{'ssl_opts'};
$ssl_opts = { verify_hostname => 1 } unless defined $ssl_opts;
my $user_agent = LWP::UserAgent->new(
protocols_allowed => [ 'http', 'https' ],
ssl_opts => $ssl_opts
);
my $credentials = $self->{options}->{'credentials'};
if (defined $credentials) {
$user_agent->credentials(
$credentials->{'netloc'},
$credentials->{'realm'},
$credentials->{'username'},
$credentials->{'password'},
)
}
$user_agent->agent('amavis/' . $VERSION);
$user_agent->timeout($timeout);
prolong_timer($which_section, undef, undef, $timeout);
my $response = $user_agent->request($request);
$response->is_success or die "Error calling rspamd: " . $response->status_line . ", stopped";
my $content = $response->content;
defined $content or die "Missing rspamd response, stopped";
do_log(5, "Rspamd response: " . $content);
my $rspamd = decode_json $content;
$rspamd_skipped = $rspamd->{is_skipped};
$spam_level = $rspamd->{score};
$rspamd_rscore = $rspamd->{required_score};
$rspamd_action = $rspamd->{action};
my $rspamd_symbols = $rspamd->{symbols};
if (defined $rspamd_symbols) {
my @tests;
while (my ($ignored, $symbol) = each %$rspamd_symbols) {
my $symbol_name = $symbol->{name};
$symbol_name =~ tr/=,/__/;
my $t = sprintf("%s=%s", $symbol_name, $symbol->{score});
push(@tests, $t);
}
$rspamd_tests = join(',', @tests);
}
# Map Rspamd action to Amavis verdict
my %action2verdict = (
'add header' => 'Spam',
'no action' => 'Ham',
'reject' => 'Spam',
'rewrite subject' => 'Spam',
# Rspamd 1.9 and later
'discard' => 'Spam',
'quarantine' => 'Spam',
);
$rspamd_verdict = exists $action2verdict{$rspamd_action} ?
$action2verdict{$rspamd_action} : 'Unknown';
}
else {
do_log(2, "%s skipping message type %s", $scanner_name, ref $msg);
$rspamd_action = 'N/A';
$rspamd_verdict = 'Unknown';
$rspamd_skipped = 1;
$rspamd_rscore = 0;
$spam_level = 0;
}
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!";
chomp $eval_stat;
do_log(-1, "%s client failed: %s", $scanner_name, $eval_stat);
};
section_time($which_section);
my $score_factor = $self->{options}->{'score_factor'};
if (defined $spam_level && defined $score_factor) {
$spam_level *= $score_factor;
$rspamd_rscore *= $score_factor;
}
do_log(2, "%s rspamd %sscore %.2f/%.2f (%s) %s", $scanner_name,
$rspamd_skipped ? 'skipped/' : '',
$spam_level, $rspamd_rscore, $rspamd_action, $rspamd_tests);
$msginfo->supplementary_info('SCORE-' . $scanner_name, $spam_level);
$msginfo->supplementary_info('VERDICT-' . $scanner_name, $rspamd_verdict);
for my $r (@$per_recip_data) {
$r->spam_level(($r->spam_level || 0) + $spam_level);
if (!$r->spam_tests) {
$r->spam_tests([ \$rspamd_tests ]);
}
else {
push(@{$r->spam_tests}, \$rspamd_tests);
}
}
}
1;
__DATA__
#
package Amavis::SpamControl::SpamdClient;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars :sa c cr ca);
import Amavis::Util qw(ll do_log sanitize_str min max minmax get_deadline);
import Amavis::rfc2821_2822_Tools qw(qquote_rfc2821_local);
import Amavis::Timing qw(section_time);
}
use Errno qw(ENOENT EACCES);
sub new {
my($class, $scanner_name,$module,@args) = @_;
my(%options) = @args;
bless { scanner_name => $scanner_name, options => \%options }, $class;
}
# needs spamd running, could be started like this:
# spamd -H /var/amavis/home -r /var/amavis/home/spamd.pid -s stderr \
# -u vscan -g vscan -x -P --allow-tell --min-children=2 --max-children=2
sub check {
my($self,$msginfo) = @_;
my($which_section, $spam_level, $sa_tests, $size_limit, %attr);
my $scanner_name = $self->{scanner_name};
my $mbsl = $self->{options}->{'mail_body_size_limit'};
$mbsl = c('sa_mail_body_size_limit') if !defined $mbsl;
if (defined $mbsl) {
$size_limit = min(64*1024, $msginfo->orig_header_size) + 1 +
min($mbsl, $msginfo->orig_body_size);
# don't bother if slightly oversized, it's faster without size checks
undef $size_limit if $msginfo->msg_size < $size_limit + 5*1024;
}
my $hdr_edits = $msginfo->header_edits;
# fake a local delivery agent by inserting Return-Path
$which_section = 'prepare pseudo header section';
my $hdr_prefix = '';
$hdr_prefix .= sprintf("Return-Path: %s\n", $msginfo->sender_smtp);
$hdr_prefix .= sprintf("X-Envelope-To: %s\n",
join(",\n ",qquote_rfc2821_local(@{$msginfo->recips})));
my $os_fp = $msginfo->client_os_fingerprint;
$hdr_prefix .= sprintf("X-Amavis-OS-Fingerprint: %s\n",
sanitize_str($os_fp)) if defined($os_fp) && $os_fp ne '';
my(@av_tests);
my $per_recip_data = $msginfo->per_recip_data;
$per_recip_data = [] if !$per_recip_data;
for my $r (@$per_recip_data) {
my $spam_tests = $r->spam_tests;
push(@av_tests, grep(/^AV\..+=/,
split(/,/, join(',',map($$_,@$spam_tests))))) if $spam_tests;
}
$hdr_prefix .= sprintf("X-Amavis-AV-Status: %s\n",
sanitize_str(join(',',@av_tests))) if @av_tests;
$hdr_prefix .= sprintf("X-Amavis-PolicyBank: %s\n", c('policy_bank_path'));
$hdr_prefix .= sprintf("X-Amavis-MessageSize: %d%s\n", $msginfo->msg_size,
!defined $size_limit ? '' : ", TRUNCATED to $size_limit");
my($remaining_time, $deadline) = get_deadline('spamd check', 1, 5);
my $msg = $msginfo->mail_text;
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
eval {
$which_section = 'spamd_connect'; do_log(3,"connecting to spamd");
my $spamd_handle = Amavis::IO::RW->new(
[ '127.0.0.1:783', '[::1]:783' ], Eol => "\015\012", Timeout => 10);
defined $spamd_handle or die "Can't connect to spamd, $@ ($!)";
$spamd_handle->timeout(max(3, $deadline - Time::HiRes::time));
section_time($which_section);
$which_section = 'spamd_tx'; do_log(4,"sending to spamd");
$hdr_prefix =~ s{\n}{\015\012}gs;
my $file_position = $msginfo->skip_bytes;
my $msgsize = length($hdr_prefix); # prepended lines...
$msgsize += $msginfo->msg_size; # size as defined by RFC 1870
$msgsize -= $file_position; # TODO: adjust for CRLF (alright for 0)
ll(5) && do_log(5, "spamc: message size: %d + %d - %d = %s",
length($hdr_prefix), $msginfo->msg_size, $file_position,
defined $size_limit && $msgsize > $size_limit
? "LIM:$size_limit" : $msgsize);
if (defined $size_limit && $msgsize > $size_limit) {
# consider $size_limit in the RFC 1870 sense for simplicity
$msgsize = $size_limit;
}
$spamd_handle->print("SYMBOLS SPAMC/1.3\015\012"); # HEADERS
$spamd_handle->print("Content-length: " . $msgsize . "\015\012");
$spamd_handle->print("\015\012");
$spamd_handle->print($hdr_prefix);
my $bytes_written = length($hdr_prefix);
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
my $done;
while ($file_position < length($$msg)) {
my $buff = substr($$msg,$file_position,16384);
$file_position += length($buff);
$buff =~ s{\n}{\015\012}gs;
if (defined $size_limit &&
$bytes_written + length($buff) >= $size_limit) {
substr($buff, $size_limit - $bytes_written) = ''; # truncate
# spamd reads line-by-line and hangs if not terminated by a NL
substr($buff,-1,1) = "\012";
do_log(5,"spamc: reached size limit %d bytes, ".
"%d = %d (sent) + %d (still to go)",
$size_limit, $bytes_written+length($buff),
$bytes_written, length($buff));
$done = 1;
}
$spamd_handle->print($buff);
$bytes_written += length($buff);
last if $done;
}
} elsif ($msg->isa('MIME::Entity')) { # TODO - content length won't match!
do_log(3,"spamc: message is MIME::Entity, size won't match");
$msg->print_body($spamd_handle);
} else {
$msg->seek($file_position,0) or die "Can't rewind mail file: $!";
my($nbytes,$buff,$done);
while ( $nbytes=$msg->sysread($buff,16384) ) {
$file_position += $nbytes;
$buff =~ s{\n}{\015\012}gs;
if (defined $size_limit &&
$bytes_written + length($buff) >= $size_limit) {
substr($buff, $size_limit - $bytes_written) = ''; # truncate
# spamd reads line-by-line and hangs if not terminated by a NL
substr($buff,-1,1) = "\012";
do_log(5,"spamc: reached size limit %d bytes, ".
"%d = %d (sent) + %d (still to go)",
$size_limit, $bytes_written+length($buff),
$bytes_written, length($buff));
$done = 1;
}
$spamd_handle->print($buff);
$bytes_written += length($buff);
last if $done;
}
defined $nbytes or die "Error reading: $!";
}
$spamd_handle->flush;
$hdr_prefix = undef;
section_time($which_section);
$which_section = 'spamd_rx'; do_log(4,"receiving from spamd");
my($version, $resp_code, $resp_msg);
local($1,$2,$3); my($ln,$error,$first); $first = 1;
while (defined($ln = $spamd_handle->get_response_line)) {
do_log(4,"from spamd - resp.hdr: %s", $ln);
if ($ln eq "\015\012") {
last;
} elsif ($first) {
$first = 0; $ln =~ s/\015\012\z//;
($version,$resp_code,$resp_msg) = split(/[ \t]+/,$ln,3);
} elsif ($ln =~ /^([^:]*?)[ \t]*:[ \t]*(.*)\015\012\z/i) {
$attr{lc($1)} = $2;
} else { $error = $ln }
}
if ($first) { do_log(-1,"Empty spamd response") }
elsif (defined $error) { do_log(-1,"Error in spamd resp: %s",$error) }
elsif ($resp_code !~ /^\d+\z/ || $resp_code != 0) {
do_log(-1,"Failure reported by spamd: %s %s %s",
$version,$resp_code,$resp_msg);
} else {
my $reply_len = 0;
while (defined($ln = $spamd_handle->get_response_line)) {
do_log(5,"from spamd: %s", $ln);
$reply_len += length($ln); $ln =~ s/\015\012\z//; $sa_tests = $ln;
}
do_log(-1,"Reply from spamd size mismatch: %d %s",
$reply_len, $attr{'content-length'}
) if $reply_len != $attr{'content-length'};
}
$spamd_handle->close; # terminate the session, ignoring status
undef $spamd_handle;
$spam_level = $2 if $attr{'spam'} =~ m{(\S+) ; (\S+) / (\S+)};
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(-1,"%s client failed: %s", $scanner_name, $eval_stat);
};
section_time($which_section);
my $score_factor = $self->{options}->{'score_factor'};
if (defined $spam_level && defined $score_factor) {
$spam_level *= $score_factor;
}
do_log(2,"%s spamd score=%s, tests=%s",
$scanner_name, $spam_level, $sa_tests);
$msginfo->supplementary_info('SCORE-'.$scanner_name, $spam_level);
$msginfo->supplementary_info('VERDICT-'.$scanner_name,
$attr{'spam'} =~ /^True/ ? 'Spam'
: $attr{'spam'} =~ /^False/ ? 'Ham' : 'Unknown');
for my $r (@$per_recip_data) {
$r->spam_level( ($r->spam_level || 0) + $spam_level );
if (!$r->spam_tests) {
$r->spam_tests([ \$sa_tests ]);
} else {
push(@{$r->spam_tests}, \$sa_tests);
}
}
}
1;
__DATA__
#
package Mail::SpamAssassin::Logger::Amavislog;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
# let a 'require' understand that this module is already loaded:
$INC{'Mail/SpamAssassin/Logger/Amavislog.pm'} = 'amavisd';
import Amavis::Util qw(ll do_log);
}
sub new {
my($class,%args) = @_;
my(%llmap) = (error => -1, warn => 0, info => 1, dbg => 3);
# $args{debug} is a simple boolean, sets the log level floor to 1 when true
if ($args{debug}) { for (keys %llmap) { $llmap{$_} = 1 if $llmap{$_} > 1 } }
bless { llmap => \%llmap }, $class;
}
sub close_log { 1 }
sub log_message {
my($self, $level,$msg) = @_;
my $ll = $self->{llmap}->{$level};
$ll = 1 if !defined $ll;
ll($ll) && do_log($ll, "SA %s: %s", $level,$msg);
1;
}
1;
package Amavis::SpamControl::SpamAssassin;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
import Amavis::Conf qw(:platform :confvars :sa $daemon_user c cr ca);
import Amavis::Util qw(ll do_log do_log_safe sanitize_str prolong_timer
add_entropy min max minmax get_deadline
safe_encode_utf8_inplace);
import Amavis::ProcControl qw(exit_status_str proc_status_ok
kill_proc run_command run_as_subprocess
collect_results collect_results_structured);
import Amavis::rfc2821_2822_Tools;
import Amavis::Timing qw(section_time get_rusage);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::IO::FileHandle;
}
use subs @EXPORT_OK;
use Errno qw(ENOENT EACCES EAGAIN EBADF);
use FileHandle;
use Mail::SpamAssassin;
sub getCommonSAModules {
my $self = $_[0];
my(@modules) = qw(
Mail::SpamAssassin::Locker
Mail::SpamAssassin::Locker::Flock
Mail::SpamAssassin::Locker::UnixNFSSafe
Mail::SpamAssassin::PersistentAddrList
Mail::SpamAssassin::DBBasedAddrList
Mail::SpamAssassin::AutoWhitelist
Mail::SpamAssassin::BayesStore
Mail::SpamAssassin::BayesStore::DBM
Mail::SpamAssassin::PerMsgLearner
Net::DNS::RR::SOA Net::DNS::RR::NS Net::DNS::RR::MX
Net::DNS::RR::A Net::DNS::RR::AAAA Net::DNS::RR::PTR
Net::DNS::RR::CNAME Net::DNS::RR::DNAME Net::DNS::RR::OPT
Net::DNS::RR::TXT Net::DNS::RR::SPF Net::DNS::RR::NAPTR
Net::DNS::RR::RP Net::DNS::RR::HINFO Net::DNS::RR::AFSDB
Net::CIDR::Lite
URI URI::Escape URI::Heuristic URI::QueryParam URI::Split URI::URL
URI::WithBase URI::_foreign URI::_generic URI::_ldap URI::_login
URI::_query URI::_segment URI::_server URI::_userpass
URI::_idna URI::_punycode URI::data URI::ftp
URI::gopher URI::http URI::https URI::ldap URI::ldapi URI::ldaps
URI::mailto URI::mms URI::news URI::nntp URI::pop URI::rlogin URI::rsync
URI::rtsp URI::rtspu URI::sip URI::sips URI::snews URI::ssh URI::telnet
URI::tn3270 URI::urn URI::urn::oid
URI::file URI::file::Base URI::file::Unix URI::file::Win32
);
# DBD::mysql
# DBI::Const::GetInfo::ANSI DBI::Const::GetInfo::ODBC DBI::Const::GetInfoType
# Mail::SpamAssassin::BayesStore::SQL
# Mail::SpamAssassin::SQLBasedAddrList
# ??? ArchiveIterator Reporter Getopt::Long Sys::Syslog lib
@modules;
}
sub getSA2Modules {
qw(Mail::SpamAssassin::UnixLocker Mail::SpamAssassin::BayesStoreDBM
);
# Mail::SpamAssassin::SpamCopURI
}
sub getSA31Modules {
qw( );
# Mail::SpamAssassin::BayesStore::MySQL
# Mail::SpamAssassin::BayesStore::PgSQL
}
sub getSA32Modules {
qw(Mail::SpamAssassin::Bayes Mail::SpamAssassin::Bayes::CombineChi
Mail::SpamAssassin::Locales Encode::Detect
);
# Mail::SpamAssassin::BayesStore::MySQL
# Mail::SpamAssassin::BayesStore::PgSQL
# /var/db/spamassassin/compiled/.../Mail/SpamAssassin/CompiledRegexps/body_0.pm
}
sub getSAPlugins {
my $self = $_[0];
my(@modules);
my $sa_version_num = $self->{version_num};
push(@modules, qw(Hashcash RelayCountry SPF URIDNSBL)) if $sa_version_num>=3;
push(@modules, qw(DKIM)) if $sa_version_num >= 3.001002;
if ($sa_version_num >= 3.001000) {
push(@modules, qw(
AWL AccessDB AntiVirus AutoLearnThreshold DCC MIMEHeader Pyzor Razor2
ReplaceTags TextCat URIDetail WhiteListSubject));
# 'DomainKeys' plugin fell out of fashion with SA 3.2.0, don't load it
# 'SpamCop' loads Net::SMTP and Net::Cmd, not needed otherwise
}
if ($sa_version_num >= 3.002000) {
push(@modules, qw(
BodyEval DNSEval HTMLEval HeaderEval MIMEEval RelayEval URIEval WLBLEval
ASN Bayes BodyRuleBaseExtractor Check HTTPSMismatch OneLineBodyRuleType
ImageInfo Rule2XSBody Shortcircuit VBounce));
}
if ($sa_version_num >= 3.004000) {
push(@modules, qw(AskDNS));
}
$_ = 'Mail::SpamAssassin::Plugin::'.$_ for @modules;
my(%mod_names) = map(($_,1), @modules);
# add supporting modules
push(@modules, qw(Razor2::Client::Agent))
if $mod_names{'Mail::SpamAssassin::Plugin::Razor2'};
# push(@modules, qw(IP::Country::Fast))
# if $mod_names{'Mail::SpamAssassin::Plugin::RelayCountry'};
push(@modules, qw(Mail::DKIM Mail::DKIM::Verifier Net::DNS::Resolver))
if $mod_names{'Mail::SpamAssassin::Plugin::DKIM'};
push(@modules, qw(Image::Info Image::Info::GIF Image::Info::JPEG
Image::Info::PNG Image::Info::BMP Image::Info::TIFF))
if $mod_names{'Mail::SpamAssassin::Plugin::ImageInfo'};
if ($mod_names{'Mail::SpamAssassin::Plugin::SPF'}) {
if ($sa_version_num < 3.002000) {
# only the old Mail::SPF::Query was supported
push(@modules, qw(Mail::SPF::Query));
} else {
# SA 3.2.0 supports both the newer Mail::SPF and the old Mail::SPF::Query
# but we won't be loading the Mail::SPF::Query
push(@modules, qw(
Mail::SPF Mail::SPF::Server Mail::SPF::Request
Mail::SPF::Mech Mail::SPF::Mech::A Mail::SPF::Mech::PTR
Mail::SPF::Mech::All Mail::SPF::Mech::Exists Mail::SPF::Mech::IP4
Mail::SPF::Mech::IP6 Mail::SPF::Mech::Include Mail::SPF::Mech::MX
Mail::SPF::Mod Mail::SPF::Mod::Exp Mail::SPF::Mod::Redirect
Mail::SPF::SenderIPAddrMech
Mail::SPF::v1::Record Mail::SPF::v2::Record
NetAddr::IP NetAddr::IP::Util
auto::NetAddr::IP::_compV6 auto::NetAddr::IP::short
auto::NetAddr::IP::InetBase::inet_any2n
auto::NetAddr::IP::InetBase::inet_n2ad
auto::NetAddr::IP::InetBase::inet_n2dx
auto::NetAddr::IP::InetBase::inet_ntoa
auto::NetAddr::IP::InetBase::ipv6_aton
auto::NetAddr::IP::InetBase::ipv6_ntoa
));
}
}
if ($mod_names{'Mail::SpamAssassin::Plugin::DomainKeys'} ||
$mod_names{'Mail::SpamAssassin::Plugin::DKIM'}) {
push(@modules, qw(
Crypt::OpenSSL::RSA
auto::Crypt::OpenSSL::RSA::new_public_key
auto::Crypt::OpenSSL::RSA::new_key_from_parameters
auto::Crypt::OpenSSL::RSA::get_key_parameters
auto::Crypt::OpenSSL::RSA::import_random_seed
Digest::SHA Error));
}
# HTML/HeadParser.pm
# do_log(5, "getSAPlugins %s: %s", $sa_version_num, join(', ',@modules));
@modules;
}
# invoked by a parent process before forking and chrooting
#
sub loadSpamAssassinModules {
my $self = $_[0];
my $sa_version_num = $self->{version_num};
my @modules; # modules to be loaded before chroot takes place
push(@modules, $self->getCommonSAModules);
if (!defined($sa_version_num)) {
die "loadSpamAssassinModules: unknown version of Mail::SpamAssassin";
} elsif ($sa_version_num < 3) {
push(@modules, $self->getSA2Modules);
} elsif ($sa_version_num >= 3.001 && $sa_version_num < 3.002) {
push(@modules, $self->getSA31Modules);
} elsif ($sa_version_num >= 3.002) {
push(@modules, $self->getSA32Modules);
}
push(@modules, $self->getSAPlugins);
my $missing;
$missing = Amavis::Boot::fetch_modules('PRE-COMPILE OPTIONAL MODULES', 0,
@modules) if @modules;
do_log(2, 'INFO: SA version: %s, %.6f, no optional modules: %s',
$self->{version}, $sa_version_num, join(' ',@$missing))
if ref $missing && @$missing;
}
# invoked by a parent process before forking but after chrooting
#
sub initializeSpamAssassinLogger {
my $self = $_[0];
local($1,$2,$3,$4,$5,$6); # just in case
if (!Mail::SpamAssassin::Logger->UNIVERSAL::can('add')) {
# old SA?
} elsif (!Mail::SpamAssassin::Logger::add(method => 'Amavislog',
debug => $sa_debug )) {
do_log(-1,"Mail::SpamAssassin::Logger::add failed");
} else { # successfully rigged SpamAssassin with our logger
Mail::SpamAssassin::Logger::remove('stderr'); # remove a default SA logger
if (defined $sa_debug && $sa_debug =~ /[A-Za-z_,-]/) {
# looks like a list of SA debug facilities
push(@sa_debug_fac, split(/[ \t]*,[ \t]*/, $sa_debug));
} else {
unshift(@sa_debug_fac, 'info', $sa_debug ? 'all' : () );
}
}
}
# invoked by a parent process before forking but after chrooting
#
sub new_SpamAssassin_instance {
my($self,$running_as_parent) = @_;
# pick next available number as an instance name
my $sa_instance_name = sprintf('%s', scalar @{$self->{instances}});
do_log(1, "initializing Mail::SpamAssassin (%s)", $sa_instance_name);
my $sa_version_num = $self->{version_num};
my(@new_sa_debug_fac);
for my $fac (@sa_debug_fac) { # handle duplicates and negation: foo,nofoo,x,x
my $bfac = $fac; $bfac =~ s/^none\z/noall/i; $bfac =~ s/^no(?=.)//si;
@new_sa_debug_fac = grep(!/^(no)?\Q$bfac\E\z/si, @new_sa_debug_fac);
push(@new_sa_debug_fac, $fac);
}
do_log(2,"SpamAssassin debug facilities: %s", join(',',@sa_debug_fac));
my $sa_args = {
debug => !@sa_debug_fac ? undef : \@sa_debug_fac,
save_pattern_hits => grep(lc($_) eq 'all', @sa_debug_fac) ? 1 : 0,
dont_copy_prefs => 1,
require_rules => 1,
stop_at_threshold => 0,
need_tags => 'TIMING,LANGUAGES,RELAYCOUNTRY,ASN,ASNCIDR',
local_tests_only => $sa_local_tests_only,
home_dir_for_helpers => $helpers_home,
rules_filename => $sa_configpath,
site_rules_filename => $sa_siteconfigpath,
userprefs_filename => $sa_userprefs_file,
skip_prng_reseeding => 1, # we'll do it ourselves (SA 3.4.0)
# PREFIX => '/usr/local',
# DEF_RULES_DIR => '/usr/local/share/spamassassin',
# LOCAL_RULES_DIR => '/etc/mail/spamassassin',
# LOCAL_STATE_DIR => '/var/lib/spamassassin',
#see Mail::SpamAssassin man page for other options
};
if ($sa_version_num < 3.001005 && !defined $sa_args->{LOCAL_STATE_DIR})
{ $sa_args->{LOCAL_STATE_DIR} = '/var/lib' } # don't ignore sa-update rules
local($1,$2,$3,$4,$5,$6); # avoid Perl bug, $1 gets tainted in compile_now
my $spamassassin_obj = Mail::SpamAssassin->new($sa_args);
# $Mail::SpamAssassin::DEBUG->{rbl}=-3;
# $Mail::SpamAssassin::DEBUG->{rulesrun}=4+64;
if ($running_as_parent) {
# load SA config files and rules, try to preload most modules
$spamassassin_obj->compile_now;
$spamassassin_obj->call_plugins("prefork_init"); # since SA 3.4.0
}
if (ll(2) && !@{$self->{instances}}) {
# created the first/main/only SA instance
if ($spamassassin_obj->UNIVERSAL::can('get_loaded_plugins_list')) {
my(@plugins) = $spamassassin_obj->get_loaded_plugins_list;
do_log(2, "SpamAssassin loaded plugins: %s", join(', ', sort
map { my $n = ref $_; $n =~ s/^Mail::SpamAssassin::Plugin:://; $n }
@plugins));
# printf STDOUT ("%s\n", join(", ",@plugins));
# not in use: AccessDB AntiVirus TextCat; ASN BodyRuleBaseExtractor
# OneLineBodyRuleType Rule2XSBody Shortcircuit
}
}
# provide a default username
my $sa_uname = $spamassassin_obj->{username};
if (!defined $sa_uname || $sa_uname eq '')
{ $spamassassin_obj->{username} = $sa_uname = $daemon_user }
$self->{default_username} = $sa_uname if !defined $self->{default_username};
my $sa_instance = {
instance_name => $sa_instance_name,
spamassassin_obj => $spamassassin_obj,
loaded_user_name => $sa_uname, loaded_user_config => '',
conf_backup => undef, conf_backup_additional => {},
};
# remember some initial settings, like %msa_backup in spamd
for (qw(username user_dir userstate_dir learn_to_journal)) {
if (exists $spamassassin_obj->{$_}) {
$sa_instance->{conf_backup_additional}{$_} = $spamassassin_obj->{$_};
}
}
push(@{$self->{instances}}, $sa_instance);
alarm(0); # seems like SA forgets to clear alarm in some cases
umask($self->{saved_umask}); # restore our umask, SA clobbered it
section_time('SA new');
$sa_instance;
}
sub new {
my($class, $scanner_name,$module,@args) = @_;
my(%options) = @args;
my $self =
bless { scanner_name => $scanner_name, options => \%options }, $class;
$self->{initialized_stage} = 1;
$self->{saved_umask} = umask;
my $sa_version = Mail::SpamAssassin->Version;
local($1,$2,$3);
my $sa_version_num; # turn '3.1.8-pre1' into 3.001008
$sa_version_num = sprintf("%d.%03d%03d", $1,$2,$3)
if $sa_version =~ /^(\d+)\.(\d+)(?:\.(\d+))/; # ignore trailing non-digits
$self->{version} = $sa_version;
$self->{version_num} = $sa_version_num;
$self->{default_username} = undef;
$self->{instances} = [];
$self;
}
sub init_pre_chroot {
my $self = $_[0];
$self->{initialized_stage} == 1
or die "Wrong initialization sequence: " . $self->{initialized_stage};
$self->loadSpamAssassinModules;
$self->{initialized_stage} = 2;
}
sub init_pre_fork {
my $self = $_[0];
$self->{initialized_stage} == 2
or die "Wrong initialization sequence: " . $self->{initialized_stage};
$self->initializeSpamAssassinLogger;
$self->new_SpamAssassin_instance(1) for (1 .. max(1,$sa_num_instances));
$self->{initialized_stage} = 3;
}
sub init_child {
my $self = $_[0];
$self->{initialized_stage} == 3
or die "Wrong initialization sequence: " . $self->{initialized_stage};
for my $sa_instance (@{$self->{instances}}) {
my $spamassassin_obj = $sa_instance->{spamassassin_obj};
next if !$spamassassin_obj;
$spamassassin_obj->call_plugins("spamd_child_init");
umask($self->{saved_umask}); # restore our umask, SA may have clobbered it
}
$self->{initialized_stage} = 4;
}
sub rundown_child {
my $self = $_[0];
for my $sa_instance (@{$self->{instances}}) {
my $spamassassin_obj = $sa_instance->{spamassassin_obj};
next if !$spamassassin_obj;
do_log(3,'SA rundown_child (%s)', $sa_instance->{instance_name});
$spamassassin_obj->call_plugins("spamd_child_post_connection_close");
umask($self->{saved_umask}); # restore our umask, SA may have clobbered it
}
$self->{initialized_stage} = 5;
}
sub call_spamassassin($$$$) {
my($self,$msginfo,$lines,$size_limit) = @_;
my(@result); my($mail_obj,$per_msg_status);
my $which_section = 'SA prepare';
my $saved_pid = $$; my $sa_version_num = $self->{version_num};
my $msg = $msginfo->mail_text; # a file handle or a string ref
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
# pass data to SpamAssassin as ARRAY or GLOB or STRING or STRING_REF
my $data_representation = ref($msg) eq 'SCALAR' ? 'STRING' : 'GLOB';
$data_representation = 'STRING_REF'
if $data_representation eq 'STRING' && $sa_version_num >= 3.004000;
my $data; # this will be passed to SpamAssassin's parser
local(*F);
if ($data_representation eq 'STRING' ||
$data_representation eq 'STRING_REF') {
$which_section = 'SA msg read';
$data = join('', @$lines); # a string to be passed to SpamAssassin
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
$data .= $$msg;
} elsif ($msg->isa('MIME::Entity')) {
die "passing a MIME::Entity object to SpamAssassin is not implemented";
} else { # read message into memory, yuck
my $file_position = $msginfo->skip_bytes;
$msg->seek($file_position, 0) or die "Can't rewind mail file: $!";
my $nbytes;
while ( $nbytes=$msg->sysread($data, 32768, length $data) ) {
$file_position += $nbytes;
last if defined $size_limit && length($data) > $size_limit;
}
defined $nbytes or die "Error reading: $!";
}
if (defined $size_limit && length($data) > $size_limit) {
substr($data,$size_limit) = "[...]\n";
}
section_time($which_section);
} elsif ($data_representation eq 'ARRAY') {
# read message into memory, yuck - even worse: line-by-line
$which_section = 'SA msg read'; my $ln; my $len = 0;
if (defined $size_limit) { $len += length($_) for @$lines }
$msg->seek($msginfo->skip_bytes, 0) or die "Can't rewind mail file: $!";
for ($! = 0; defined($ln=<$msg>); $! = 0) { # header section
push(@$lines,$ln);
if (defined $size_limit)
{ $len += length($ln); last if $len > $size_limit }
last if $ln eq "\n";
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(0,"Error reading mail header section: %s", $!)
: die "Error reading mail header section: $!";
if (!defined $size_limit) {
for ($! = 0; defined($ln=<$msg>); $! = 0) { push(@$lines,$ln) } # body
} else {
for ($! = 0; defined($ln=<$msg>); $! = 0) { # body
push(@$lines,$ln);
$len += length($ln); last if $len > $size_limit;
}
}
defined $ln || $! == 0 or # returning EBADF at EOF is a perl bug
$! == EBADF ? do_log(1,"Error reading mail body: %s", $!)
: die "Error reading mail body: $!";
$data = $lines; # array of lines to be passed to SpamAssassin
section_time($which_section);
}
my($rusage_self_before, $rusage_children_before, @sa_cpu_usage);
my $eval_stat;
$which_section = 'SA prelim';
eval {
if ($data_representation eq 'GLOB') { # pass mail as a GLOB to SpamAssassin
ref($msg) ne 'SCALAR' # expects $msg to be a file handle
or die "panic: data_representation is GLOB, but message is in memory";
do_log(2,"truncating a message passed to SA at %d bytes, orig %d",
$size_limit, $msginfo->msg_size) if defined $size_limit;
# present a virtual file to SA, an original mail file prefixed by @$lines
tie(*F,'Amavis::IO::FileHandle');
open(F, $msg,$lines,$size_limit) or die "Can't open SA virtual file: $!";
binmode(F) or die "Can't set binmode on a SA virtual file: $!";
$data = \*F; # a GLOB to be passed to SpamAssassin
}
$which_section = 'SA userconf';
my $sa_default_username = $self->{default_username};
my $per_recip_data = $msginfo->per_recip_data;
$per_recip_data = [] if !$per_recip_data;
my $uconf_maps_ref = ca('sa_userconf_maps');
my $uname_maps_ref = ca('sa_username_maps');
$uconf_maps_ref = [] if !$uconf_maps_ref;
$uname_maps_ref = [] if !$uname_maps_ref;
my(%uconf_filename_available);
my(%sa_configs_hash); # collects distinct config names and usernames
my $uconf_unsupported = 0;
my $r_ind = 0;
for my $r (@$per_recip_data) {
my($uconf,$uname);
my $recip_addr = $r->recip_addr;
$uconf = lookup2(0, $recip_addr, $uconf_maps_ref) if @$uconf_maps_ref;
$uname = lookup2(0, $recip_addr, $uname_maps_ref) if @$uname_maps_ref;
$uconf = '' if !defined $uconf;
$uname = $sa_default_username if !defined $uname || $uname eq '';
if ($uconf =~ /^sql:/i) {
$uconf = $uname eq $sa_default_username ? '' : 'sql:'.$uname;
}
if ($uconf =~ /^ldap:/i) {
$uconf = $uname eq $sa_default_username ? '' : 'ldap:'.$uname;
}
if ($sa_version_num < 3.003000 && $uconf ne '') {
$uconf = ''; $uconf_unsupported = 1;
}
if ($uconf eq '') {
# ok, no special config required, just using a default
} elsif ($uconf =~ /^sql:/i) {
# assume data is in SQL, possibly an empty set
} elsif ($uconf =~ /^ldap:/i) {
# assume data is in LDAP, possibly an empty set
} else {
$uconf = "$MYHOME/$uconf" if $uconf !~ m{^/};
if ($uconf_filename_available{$uconf}) {
# good, already checked and is available, keep it
} elsif (defined $uconf_filename_available{$uconf}) {
# defined but false, already checked and failed, use a default config
$uconf = '';
} else {
# check for existence of a SA user configuration/preferences file
my(@stat_list) = stat($uconf); # symlinks-friendly
my $errn = @stat_list ? 0 : 0+$!;
my $msg = $errn == ENOENT ? "does not exist"
: $errn ? "is inaccessible: $!"
: -d _ ? "is a directory"
: !-f _ ? "is not a regular file"
: !-r _ ? "is not readable" : undef;
if (defined $msg) {
do_log(1,'SA user config file "%s" %s, ignoring it', $uconf,$msg);
$uconf_filename_available{$uconf} = 0; # defined but false
$uconf = ''; # ignoring it, use a default config
} else {
$uconf_filename_available{$uconf} = 1;
}
}
}
# collect lists of recipient indices for each unique config/user pair
# the %sa_configs_hash is a two-level hash: on $uconf and $uname
my $p = $sa_configs_hash{$uconf};
if (!$p) { $sa_configs_hash{$uconf} = $p = {} }
if (!exists $p->{$uname}) { $p->{$uname} = $r_ind }
else { $p->{$uname} .= ',' . $r_ind }
$r_ind++;
}
if ($uconf_unsupported) {
do_log(5,'SA user config loading unsupported for SA older than 3.3.0');
}
# refresh $sa_instance->{loaded_user_name}, just in case
for my $sa_instance (@{$self->{instances}}) {
my $spamassassin_obj = $sa_instance->{spamassassin_obj};
next if !$spamassassin_obj;
my $sa_uname = $spamassassin_obj->{username};
$sa_instance->{loaded_user_name} = defined $sa_uname ? $sa_uname : '';
}
my $sa_instance = $self->{instances}[0];
my $curr_conf = $sa_instance->{loaded_user_config};
my $curr_user = $sa_instance->{loaded_user_name};
# switching config files is the most expensive, sort to minimize switching
my(@conf_names); # a list of config names for which SA needs to be called;
# sorted: current first, baseline second, then the rest
push(@conf_names, $curr_conf) if exists $sa_configs_hash{$curr_conf};
push(@conf_names, '') if $curr_conf ne '' && exists $sa_configs_hash{''};
push(@conf_names,
grep($_ ne '' && $_ ne $curr_conf, keys %sa_configs_hash));
# call SA checking for each distinct SA userprefs config filename and user
for my $conf_user_pair (map { my $c = $_;
map([$c,$_], keys %{$sa_configs_hash{$c}})
} @conf_names) {
my($uconf,$uname) = @$conf_user_pair;
# comma-separated list of recip indices which use this SA config
my $rind_list = $sa_configs_hash{$uconf}{$uname};
if (ll(5)) {
do_log(5, "SA user config: \"%s\", username: \"%s\", %s, %s",
$uconf, $uname, $rind_list,
join(', ', map("($_)" . $per_recip_data->[$_]->recip_addr,
split(/,/,$rind_list))));
}
my $sa_instance;
if (@{$self->{instances}} <= 1) {
# pick the only choice
$sa_instance = $self->{instances}[0];
} else {
# choosing a suitably-matching SpamAssassin instance
my(@sa_instances_matching_uconf, @sa_instances_matching_both,
@sa_instances_available);
for my $sa_instance (@{$self->{instances}}) {
next if !$sa_instance->{spamassassin_obj};
push(@sa_instances_available, $sa_instance);
if ($sa_instance->{loaded_user_config} eq $uconf) {
push(@sa_instances_matching_uconf, $sa_instance);
if ($sa_instance->{loaded_user_name} eq $uname) {
push(@sa_instances_matching_both, $sa_instance);
}
}
}
my $fit_descr;
if (@sa_instances_matching_both) {
# just pick the first
$sa_instance = $sa_instances_matching_both[0];
$fit_descr = sprintf('exact fit, %d choices',
scalar @sa_instances_matching_both);
} elsif (@sa_instances_matching_uconf) {
# picking one at random
my $j = @sa_instances_matching_uconf <= 1 ? 0
: int(rand(scalar(@sa_instances_matching_uconf)));
$sa_instance = $sa_instances_available[$j];
$fit_descr = sprintf('good fit: same config, other user, %d choices',
scalar @sa_instances_matching_uconf);
} elsif ($uconf eq '') {
# the first instance is a good choice for switching to a dflt config
$sa_instance = $self->{instances}[0];
$fit_descr = 'need a default config, picking first';
} elsif (@sa_instances_available <= 1) {
$sa_instance = $sa_instances_available[0];
$fit_descr = 'different config, picking the only one available';
} elsif (@sa_instances_available == 2) {
$sa_instance = $sa_instances_available[1];
$fit_descr = 'different config, picking the second one';
} else {
# picking one at random, preferably not the first
my $j = 1+int(rand(scalar(@sa_instances_available)-1));
$sa_instance = $sa_instances_available[$j];
$fit_descr = 'different config, picking one at random';
}
do_log(2,'SA user config: instance chosen (%s), %s',
$sa_instance->{instance_name}, $fit_descr);
}
my $curr_conf = $sa_instance->{loaded_user_config};
my $curr_user = $sa_instance->{loaded_user_name};
my $spamassassin_obj = $sa_instance->{spamassassin_obj};
if ($curr_conf ne '' && $curr_conf ne $uconf) {
# revert SA configuration to its initial state
$which_section = 'revert_config';
ref $sa_instance->{conf_backup}
or die "panic, no conf_backup available";
for (qw(username user_dir userstate_dir learn_to_journal)) {
if (exists $sa_instance->{conf_backup_additional}{$_}) {
$spamassassin_obj->{$_} =
$sa_instance->{conf_backup_additional}{$_};
} else {
delete $spamassassin_obj->{$_};
}
}
# config leaks fixed in SpamAssassin 3.3.0, SA bug 6205, 6003, 4179
$spamassassin_obj->copy_config($sa_instance->{conf_backup}, undef)
or die "copy_config: failed to restore";
$sa_instance->{loaded_user_config} = $curr_conf = '';
do_log(5,"SA user config reverted to a saved copy");
section_time($which_section);
}
if ($uconf ne '' && $uconf ne $curr_conf) {
# load SA user configuration/preferences
if (!defined $sa_instance->{conf_backup}) {
$which_section = 'save_config';
do_log(5,"SA user config: saving SA user config");
$sa_instance->{conf_backup} = {};
$spamassassin_obj->copy_config(undef, $sa_instance->{conf_backup})
or die "copy_config: failed to save configuration";
section_time($which_section);
}
$which_section = 'load_config';
# User preferences include scoring options, scores, whitelists
# and blacklists, etc, but do not include rule definitions,
# privileged settings, etc. unless allow_user_rules is enabled;
# and they never include administrator settings
if ($uconf =~ /^sql:/) {
$uconf eq 'sql:'.$uname
or die "panic: loading SA config mismatch: $uname <-> $uconf";
do_log(5,"loading SA user config from SQL %s", $uname);
$spamassassin_obj->load_scoreonly_sql($uname);
} elsif ($uconf =~ /^ldap:/) {
$uconf eq 'ldap:'.$uname
or die "panic: loading SA config mismatch: $uname <-> $uconf";
do_log(5,"loading SA user config from LDAP %s", $uname);
$spamassassin_obj->load_scoreonly_ldap($uname);
} else {
do_log(5,"loading SA user config file %s", $uconf);
$spamassassin_obj->read_scoreonly_config($uconf);
}
$sa_instance->{loaded_user_config} = $curr_conf = $uconf;
section_time($which_section);
}
if ($uname ne $curr_user) {
$which_section = 'SA switch_user';
do_log(5,'SA user config: switching SA (%s) username "%s" -> "%s"',
$sa_instance->{instance_name}, $curr_user, $uname);
$spamassassin_obj->signal_user_changed({ username => $uname });
$sa_instance->{loaded_user_name} = $curr_user = $uname;
section_time($which_section);
}
ll(3) && do_log(3, "calling SA parse (%s), SA vers %s, %.6f, ".
"data as %s, recips_ind [%s]%s%s",
$sa_instance->{instance_name},
$self->{version}, $sa_version_num,
$data_representation, $rind_list,
($uconf eq '' ? '' : ", conf: \"$uconf\""),
($uname eq '' ? '' : ", user: \"$uname\"") );
if ($data_representation eq 'GLOB') {
seek(F,0,0) or die "Can't rewind a SA virtual file: $!";
}
$spamassassin_obj->timer_reset
if $spamassassin_obj->UNIVERSAL::can('timer_reset');
$which_section = 'SA parse';
my($remaining_time, $deadline) = get_deadline('SA check', 1, 5);
my(@mimepart_digests);
for (my(@traversal_stack) = $msginfo->parts_root;
my $part = pop @traversal_stack; ) { # pre-order tree traversal
my $digest = $part->digest;
push(@mimepart_digests, $digest) if defined $digest;
push(@traversal_stack, reverse @{$part->children}) if $part->children;
}
do_log(5,'mimepart digest: %s', $_) for @mimepart_digests;
my(%suppl_attrib) = (
'skip_prng_reseed' => 1, # do not call srand(), we already did it
'return_path' => $msginfo->sender_smtp,
'recipients' => [ map(qquote_rfc2821_local($_->recip_addr),
@$per_recip_data[split(/,/, $rind_list)]) ],
'originating' => $msginfo->originating ? 1 : 0,
'message_size' => $msginfo->msg_size,
'body_size' => $msginfo->orig_body_size,
!@mimepart_digests ? ()
: ('mimepart_digests' => \@mimepart_digests),
!c('enable_dkim_verification') ? ()
: ('dkim_signatures' => $msginfo->dkim_signatures_all),
!defined $deadline ? ()
: ('master_deadline' => $deadline),
'rule_hits' => [
# known attributes: rule, area, score, value, ruletype, tflags, descr
# { rule=>'AM:TEST1', score=>0.11 },
# { rule=>'TESTTEST', defscore=>0.22, descr=>'my test' },
!defined $size_limit ? () :
{ rule=>'__TRUNCATED', score=>-0.1, area=>'RAW: ', tflags=>'nice',
descr=>"Message size truncated to $size_limit B" },
],
'amavis_policy_bank_path' => c('policy_bank_path'),
);
($rusage_self_before, $rusage_children_before) = get_rusage();
$mail_obj = $sa_version_num < 3
? Mail::SpamAssassin::NoMailAudit->new(data=>$data, add_From_line=>0)
: $spamassassin_obj->parse(
$data_representation eq 'STRING_REF' ? \$data : $data,
0, \%suppl_attrib);
section_time($which_section);
$which_section = 'SA check';
if (@conf_names <= 1) {
do_log(4,"CALLING SA check (%s)", $sa_instance->{instance_name});
} else {
do_log(4,"CALLING SA check (%s) for recips: %s",
$sa_instance->{instance_name},
join(", ", @{$suppl_attrib{'recipients'}}));
}
{ local($1,$2,$3,$4,$5,$6); # avoid Perl 5.8.x bug, $1 gets tainted
$per_msg_status = $spamassassin_obj->check($mail_obj);
}
do_log(4,"DONE SA check (%s)", $sa_instance->{instance_name});
section_time($which_section);
$which_section = 'SA collect';
my($spam_level,$spam_report,$spam_summary,%supplementary_info);
{ local($1,$2,$3,$4,$5,$6); # avoid Perl 5.8.x taint bug
if ($sa_version_num < 3) {
$spam_level = $per_msg_status->get_hits;
$supplementary_info{'TESTSSCORES'} = $supplementary_info{'TESTS'} =
$per_msg_status->get_names_of_tests_hit;
} else {
$spam_level = $per_msg_status->get_score;
for my $t (qw(VERSION SUBVERSION RULESVERSION
TESTS TESTSSCORES ADDEDHEADERHAM ADDEDHEADERSPAM
AUTOLEARN AUTOLEARNSCORE SC SCRULE SCTYPE
LANGUAGES RELAYCOUNTRY ASN ASNCIDR DCCB DCCR DCCREP
DKIMDOMAIN DKIMIDENTITY AWLSIGNERMEAN
HAMMYTOKENS SPAMMYTOKENS
CRM114STATUS CRM114SCORE CRM114CACHEID)) {
my $tag_value = $per_msg_status->get_tag($t);
if (defined $tag_value) {
# for some reason tags ASN and ASNCIDR have UTF8 flag on;
# encode any character strings to UTF-8 octets for consistency
safe_encode_utf8_inplace($tag_value); # to octets if not already
$supplementary_info{$t} = $tag_value;
}
}
}
{ # fudge
my $crm114_status = $supplementary_info{'CRM114STATUS'};
my $crm114_score = $supplementary_info{'CRM114SCORE'};
if (defined $crm114_status && defined $crm114_score) {
$supplementary_info{'CRM114STATUS'} =
sprintf("%s ( %s )", $crm114_status,$crm114_score);
}
}
# get_report() taints $1 and $2 !
$spam_summary = $per_msg_status->get_report;
# $spam_summary = $per_msg_status->get_tag('SUMMARY');
$spam_report = $per_msg_status->get_tag('REPORT');
safe_encode_utf8_inplace($spam_summary); # to octets (if not already)
safe_encode_utf8_inplace($spam_report); # to octets (if not already)
# fetch the TIMING tag last:
$supplementary_info{'TIMING'} = $per_msg_status->get_tag('TIMING');
$supplementary_info{'RUSAGE-SA'} = \@sa_cpu_usage; # filled-in later
}
# section_time($which_section); # don't bother reporting separately, short
$which_section = 'SA check finish';
if (defined $per_msg_status)
{ $per_msg_status->finish; undef $per_msg_status }
if (defined $mail_obj)
{ $mail_obj->finish if $sa_version_num >= 3; undef $mail_obj }
# section_time($which_section); # don't bother reporting separately, short
# returning the result as a data structure instead of modifying
# the $msginfo objects directly is used to make it possible to run
# this subroutine as a subprocess; modifications to $msginfo objects
# would be lost if done in a context of a spawned process
push(@result, {
recip_ind_list => $rind_list, user_config => $uconf,
spam_level => $spam_level,
spam_report => $spam_report, spam_summary => $spam_summary,
supplementary_info => \%supplementary_info,
});
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
$which_section = 'SA finish';
if (defined $per_msg_status) # just in case
{ $per_msg_status->finish; undef $per_msg_status }
if (defined $mail_obj) # just in case
{ $mail_obj->finish if $sa_version_num >= 3; undef $mail_obj }
if ($data_representation eq 'GLOB') {
close(F) or die "Can't close SA virtual file: $!";
untie(*F);
}
umask($self->{saved_umask}); # restore our umask, SA may have clobbered it
if ($$ != $saved_pid) {
do_log_safe(-2,"PANIC, SA checking produced a clone process ".
"of [%s], CLONE [%s] SELF-TERMINATING", $saved_pid,$$);
POSIX::_exit(3); # SIGQUIT, avoid END and destructor processing
# POSIX::_exit(6); # SIGABRT, avoid END and destructor processing
}
if ($rusage_self_before && $rusage_children_before) {
my($rusage_self_after, $rusage_children_after) = get_rusage();
@sa_cpu_usage = (
$rusage_self_after->{ru_utime} - $rusage_self_before->{ru_utime},
$rusage_self_after->{ru_stime} - $rusage_self_before->{ru_stime},
$rusage_children_after->{ru_utime} -
$rusage_children_before->{ru_utime},
$rusage_children_after->{ru_stime} -
$rusage_children_before->{ru_stime} );
}
# section_time($which_section);
if (defined $eval_stat) { chomp $eval_stat; die $eval_stat } # resignal
\@result;
}
sub check {
my($self,$msginfo) = @_;
$self->{initialized_stage} == 4
or die "Wrong initialization sequence: " . $self->{initialized_stage};
my $scanner_name = $self->{scanner_name};
my $which_section; my $prefix = '';
my($spam_level,$sa_tests,$spam_report,$spam_summary,$supplementary_info_ref);
my $hdr_edits = $msginfo->header_edits;
my $size_limit;
my $mbsl = $self->{options}->{'mail_body_size_limit'};
$mbsl = c('sa_mail_body_size_limit') if !defined $mbsl;
if (defined $mbsl) {
$size_limit = min(64*1024, $msginfo->orig_header_size) + 1 +
min($mbsl, $msginfo->orig_body_size);
# don't bother if slightly oversized, it's faster without size checks
undef $size_limit if $msginfo->msg_size < $size_limit + 5*1024;
}
# fake a local delivery agent by inserting a Return-Path
$prefix .= sprintf("Return-Path: %s\n", $msginfo->sender_smtp);
$prefix .= sprintf("X-Envelope-To: %s\n",
join(",\n ",qquote_rfc2821_local(@{$msginfo->recips})));
my $os_fp = $msginfo->client_os_fingerprint;
$prefix .= sprintf("X-Amavis-OS-Fingerprint: %s\n",
sanitize_str($os_fp)) if defined($os_fp) && $os_fp ne '';
my(@av_tests);
for my $r (@{$msginfo->per_recip_data}) {
my $spam_tests = $r->spam_tests;
push(@av_tests, grep(/^AV[.:].+=/,
split(/,/, join(',',map($$_,@$spam_tests))))) if $spam_tests;
}
$prefix .= sprintf("X-Amavis-AV-Status: %s\n",
sanitize_str(join(',',@av_tests))) if @av_tests;
$prefix .= sprintf("X-Amavis-PolicyBank: %s\n", c('policy_bank_path'));
$prefix .= sprintf("X-Amavis-MessageSize: %d%s\n", $msginfo->msg_size,
!defined $size_limit ? '' : ", TRUNCATED to $size_limit");
for my $hf_name (qw(
X-CRM114-Status X-CRM114-CacheID X-CRM114-Notice X-CRM114-Action
X-DSPAM-Result X-DSPAM-Class X-DSPAM-Signature X-DSPAM-Processed
X-DSPAM-Confidence X-DSPAM-Probability X-DSPAM-User X-DSPAM-Factors)) {
my $suppl_attr_val = $msginfo->supplementary_info($hf_name);
if (defined $suppl_attr_val && $suppl_attr_val ne '') {
chomp $suppl_attr_val;
$prefix .= sprintf("%s: %s\n", $hf_name, sanitize_str($suppl_attr_val));
}
}
$which_section = 'SA call';
my($proc_fh,$pid); my $eval_stat; my $results_aref;
eval {
# NOTE ON TIMEOUTS: SpamAssassin may use timer for its own purpose,
# disabling it before returning. It seems it only uses timer when
# external tests are enabled.
local $SIG{ALRM} = sub {
my $s = Carp::longmess("SA TIMED OUT, backtrace:");
# crop at some rather arbitrary limit
substr($s,900-3) = '[...]' if length($s) > 900;
do_log(-1,"%s",$s);
};
prolong_timer('spam_scan_sa_pre', 1, 4); # restart the timer
#
# note: array @lines at this point contains only prepended synthesized
# header fields, but may be extended in sub call_spamassassin() by
# reading-in the rest of the message; this may or may not happen in
# a separate process (called through run_as_subprocess or directly);
# each line must be terminated by a \n character, which must be the
# only \n in a line;
#
my(@lines) = split(/^/m, $prefix, -1); $prefix = undef;
if (!$sa_spawned) {
$results_aref = call_spamassassin($self,$msginfo,\@lines,$size_limit);
} else {
($proc_fh,$pid) = run_as_subprocess(\&call_spamassassin,
$self,$msginfo,\@lines,$size_limit);
my($results,$child_stat) =
collect_results_structured($proc_fh,$pid,'spawned SA',200*1024);
$results_aref = $results->[0] if defined $results;
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
section_time($which_section) if $sa_spawned;
$which_section = 'SA done';
prolong_timer('spam_scan_sa'); # restart the timer
if ($results_aref) {
# for each group of recipients using the same SA userconf file
for my $h (@$results_aref) {
my $rind_list = $h->{recip_ind_list};
my(@r_list) = @{$msginfo->per_recip_data}[split(/,/,$rind_list)];
my $uconf = $h->{user_config};
$spam_level = $h->{spam_level};
$spam_report = $h->{spam_report}; $spam_summary = $h->{spam_summary};
$supplementary_info_ref = $h->{supplementary_info};
$supplementary_info_ref = {} if !$supplementary_info_ref;
$sa_tests = $supplementary_info_ref->{'TESTSSCORES'};
add_entropy($spam_level,$sa_tests);
my $score_factor = $self->{options}->{'score_factor'};
if (defined $spam_level && defined $score_factor) {
$spam_level *= $score_factor;
}
do_log(3,"spam_scan: score=%s autolearn=%s tests=[%s] recips=%s",
$spam_level, $supplementary_info_ref->{'AUTOLEARN'},
$sa_tests, $rind_list);
my(%sa_tests_h);
if (defined $sa_tests && $sa_tests ne 'none') {
for my $t (split(/,[ \t]*/, $sa_tests)) {
my($test_name,$score) = split(/=/, $t, 2);
$sa_tests_h{$test_name} = $score;
}
}
my $dkim_adsp_suppress;
if (exists $sa_tests_h{'DKIM_ADSP_DISCARD'}) {
# must honour ADSP 'discardable', suppress a bounce
do_log(2,"spam_scan: dsn_suppress_reason DKIM_ADSP_DISCARD");
$dkim_adsp_suppress = 1;
}
$msginfo->supplementary_info('SCORE-'.$scanner_name, $spam_level);
$msginfo->supplementary_info('VERDICT-'.$scanner_name,
$spam_level >= 5 ? 'Spam' : $spam_level < 1 ? 'Ham' : 'Unknown');
for my $r (@r_list) {
$r->spam_level( ($r->spam_level || 0) + $spam_level );
$r->spam_report($spam_report); $r->spam_summary($spam_summary);
if (!$r->spam_tests) {
$r->spam_tests([ \$sa_tests ]);
} else {
# comes last: here we use push, unlike elsewhere where may do unshift
push(@{$r->spam_tests}, \$sa_tests);
}
if ($dkim_adsp_suppress) {
$r->dsn_suppress_reason('DKIM_ADSP_DISCARD' .
!defined $_ ? '' : ", $_") for $r->dsn_suppress_reason;
}
}
}
}
if (defined($msginfo->spam_report) || defined($msginfo->spam_summary)) {
$spam_report = $msginfo->spam_report . ', ' . $spam_report
if $msginfo->spam_report ne '';
$spam_summary = $msginfo->spam_summary . "\n\n" . $spam_summary
if $msginfo->spam_summary ne '';
}
$msginfo->spam_report($spam_report); $msginfo->spam_summary($spam_summary);
for (keys %$supplementary_info_ref) {
$msginfo->supplementary_info($_, $supplementary_info_ref->{$_});
}
if (defined $eval_stat) { # SA timed out?
kill_proc($pid,'a spawned SA',1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid; chomp $eval_stat;
do_log(-2, "SA failed: %s", $eval_stat);
# die "$eval_stat\n" if $eval_stat !~ /timed out\b/;
}
1;
}
1;
__DATA__
#
package Amavis::Unpackers;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&init &decompose_part &determine_file_types);
import Amavis::Util qw(untaint min max minmax ll do_log snmp_count
prolong_timer rmdir_recursively add_entropy);
import Amavis::ProcControl qw(exit_status_str proc_status_ok run_command
kill_proc collect_results collect_results_structured);
import Amavis::Conf qw(:platform :confvars $file c cr ca);
import Amavis::Timing qw(section_time);
import Amavis::Lookup qw(lookup lookup2);
import Amavis::Unpackers::MIME qw(mime_decode);
import Amavis::Unpackers::NewFilename qw(consumed_bytes);
}
BEGIN {
use vars qw($filemagic);
eval {
require File::LibMagic;
File::LibMagic->VERSION(1.00);
import File::LibMagic;
$filemagic = File::LibMagic->new;
} or do {
undef $filemagic;
};
}
use subs @EXPORT_OK;
use Errno qw(ENOENT EACCES EINTR EAGAIN);
use POSIX qw(SIGALRM);
use IO::File qw(O_CREAT O_EXCL O_WRONLY);
use Time::HiRes ();
use File::Basename qw(basename);
use Compress::Zlib 1.35; # avoid security vulnerability in <= 1.34
use Archive::Zip 1.14 qw(:CONSTANTS :ERROR_CODES);
# recursively descend into a directory $dir containing potentially unsafe
# files with unpredictable names, soft links, etc., rename each regular
# nonempty file to a directory $outdir giving it a generated name,
# and discard all the rest, including the directory $dir.
# Return a pair: number of bytes that 'sanitized' files now occupy,
# and a number of parts-objects created.
#
sub flatten_and_tidy_dir($$$;$$); # prototype
sub flatten_and_tidy_dir($$$;$$) {
my($dir, $outdir, $parent_obj, $item_num_offset, $orig_names) = @_;
do_log(4, 'flatten_and_tidy_dir: processing directory "%s"', $dir);
my $consumed_bytes = 0;
my $item_num = 0; my $parent_placement = $parent_obj->mime_placement;
chmod(0750, $dir) or die "Can't change protection of \"$dir\": $!";
local(*DIR); opendir(DIR,$dir) or die "Can't open directory \"$dir\": $!";
# modifying a directory while traversing it can cause surprises, avoid;
# avoid slurping the whole directory contents into memory
my($f, @rmfiles, @renames, @recurse);
while (defined($f = readdir(DIR))) {
next if $f eq '.' || $f eq '..';
my $msg; my $fname = $dir . '/' . $f;
my(@stat_list) = lstat($fname); my $errn = @stat_list ? 0 : 0+$!;
if ($errn == ENOENT) { $msg = "does not exist" }
elsif ($errn) { $msg = "inaccessible: $!" }
if (defined $msg) { die "flatten_and_tidy_dir: \"$fname\" $msg," }
add_entropy(@stat_list);
my $newpart_obj = Amavis::Unpackers::Part->new($outdir,$parent_obj);
$item_num++;
$newpart_obj->mime_placement(sprintf("%s/%d", $parent_placement,
$item_num+$item_num_offset) );
# save tainted original member name if available, or a tainted file name
my $original_name = !ref($orig_names) ? undef : $orig_names->{$f};
$newpart_obj->name_declared(defined $original_name ? $original_name : $f);
# untaint, but if $dir happens to still be tainted, we want to know and die
$fname = $dir . '/' . untaint($f);
if (-d _) {
$newpart_obj->attributes_add('D');
push(@recurse, $fname);
} elsif (-l _) {
$newpart_obj->attributes_add('L');
push(@rmfiles, [$fname, 'soft link']);
} elsif (!-f _) {
$newpart_obj->attributes_add('S');
push(@rmfiles, [$fname, 'nonregular file']);
} elsif (-z _) {
push(@rmfiles, [$fname, 'empty file']);
} else {
chmod(0750, $fname)
or die "Can't change protection of file \"$fname\": $!";
my $size = 0 + (-s _);
$newpart_obj->size($size);
$consumed_bytes += $size;
my $newpart = $newpart_obj->full_name;
push(@renames, [$fname, $newpart, $original_name]);
}
}
closedir(DIR) or die "Error closing directory \"$dir\": $!";
my $cnt_u = scalar(@rmfiles);
for my $pair (@rmfiles) {
my($fname,$what) = @$pair;
do_log(5,'flatten_and_tidy_dir: deleting %s "%s"', $what,$fname);
unlink($fname) or die "Can't remove $what \"$fname\": $!";
}
undef @rmfiles;
my $cnt_r = scalar(@renames);
for my $tuple (@renames) {
my($fname,$newpart,$original_name) = @$tuple;
ll(5) && do_log(5,'flatten_and_tidy_dir: renaming "%s"%s to %s', $fname,
!defined $original_name ? '' : " ($original_name)", $newpart);
rename($fname,$newpart) or die "Can't rename \"$fname\" to $newpart: $!";
}
undef @renames;
for my $fname (@recurse) {
do_log(5,'flatten_and_tidy_dir: descending into subdir "%s"', $fname);
my($bytes,$cnt) = flatten_and_tidy_dir($fname, $outdir, $parent_obj,
$item_num+$item_num_offset, $orig_names);
$consumed_bytes += $bytes; $item_num += $cnt;
}
rmdir($dir) or die "Can't remove directory \"$dir\": $!";
section_time("ren$cnt_r-unl$cnt_u-files$item_num");
($consumed_bytes, $item_num);
}
sub determine_file_types($$) {
my($tempdir, $partslist_ref) = @_;
if ($filemagic) {
determine_file_types_libmagic($tempdir, $partslist_ref);
} elsif (defined $file && $file ne '') {
determine_file_types_fileutility($tempdir, $partslist_ref);
} else {
die "Neither File::LibMagic nor Unix utility file(1) are available";
}
}
# associate full and short file content types with each part
# based on libmagic (uses File::LibMagic module)
#
sub determine_file_types_libmagic($$) {
my($tempdir, $partslist_ref) = @_;
my(@all_part_list) = grep($_->exists, @$partslist_ref);
my $initial_num_parts = scalar(@all_part_list);
do_log(5, 'using File::LibMagic on %d files', $initial_num_parts);
for my $part (@all_part_list) {
my($type_long, $type_short);
eval {
$type_long = $filemagic->describe_filename($part->full_name);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(0, 'File::LibMagic::describe_filename failed on %s: %s',
$part->base_name, $eval_stat);
};
if (defined $type_long) {
$type_short = lookup2(0,$type_long,\@map_full_type_to_short_type_maps);
ll(4) && do_log(4, "File-type of %s: %s%s",
$part->base_name, $type_long,
(!defined $type_short ? ''
: !ref $type_short ? "; ($type_short)"
: '; (' . join(', ',@$type_short) . ')'
) );
$part->type_long($type_long); $part->type_short($type_short);
$part->attributes_add('C')
if !ref($type_short) ? $type_short eq 'pgp.enc' # encrypted?
: grep($_ eq 'pgp.enc', @$type_short);
}
}
section_time(sprintf('get-file-type%d', $initial_num_parts));
1;
}
# call 'file(1)' utility for each part,
# and associate full and short file content types with each part
#
sub determine_file_types_fileutility($$) {
my($tempdir, $partslist_ref) = @_;
defined $file && $file ne ''
or die "Unix utility file(1) not available, but is needed";
my(@all_part_list) = grep($_->exists, @$partslist_ref);
my $initial_num_parts = scalar(@all_part_list);
my $cwd = "$tempdir/parts";
if (@all_part_list) { chdir($cwd) or die "Can't chdir to $cwd: $!" }
my($proc_fh,$pid); my $eval_stat;
eval {
while (@all_part_list) {
my(@part_list,@file_list); # collect reasonably small subset of filenames
my $arglist_size = length($file); # size of a command name itself
while (@all_part_list) { # collect as many args as safe, at least one
my $nm = $all_part_list[0]->full_name;
local($1); $nm =~ s{^\Q$cwd\E/(.*)\z}{$1}s; # remove cwd from filename
# POSIX requires 4 kB as a minimum buffer size for program arguments
last if @file_list && $arglist_size + length($nm) + 1 > 4000;
push(@part_list, shift(@all_part_list)); # swallow the next one
push(@file_list, $nm); $arglist_size += length($nm) + 1;
}
if (scalar(@file_list) < $initial_num_parts) {
do_log(2, "running file(1) on %d (out of %d) files, arglist size %d",
scalar(@file_list), $initial_num_parts, $arglist_size);
} else {
do_log(5, "running file(1) on %d files, arglist size %d",
scalar(@file_list), $arglist_size);
}
($proc_fh,$pid) = run_command(undef, '&1', $file, @file_list);
my $index = 0; my $ln;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
do_log(5, "result line from file(1): %s", $ln);
chomp($ln); local($1,$2);
if ($index > $#file_list) {
do_log(-1,"NOTICE: Skipping unexpected output from file(1): %s",$ln);
} else {
my $part = $part_list[$index]; # walk through @part_list in sync
my $expect = $file_list[$index]; # walk through @file_list in sync
if ($ln !~ /^(\Q$expect\E):[ \t]*(.*)\z/s) {
# split file name from type
do_log(-1,"NOTICE: Skipping bad output from file(1) ".
"at [%d, %s], got: %s", $index,$expect,$ln);
} else {
my $type_short; my $actual_name = $1; my $type_long = $2;
$type_short =
lookup2(0,$type_long,\@map_full_type_to_short_type_maps);
ll(4) && do_log(4, "File-type of %s: %s%s",
$part->base_name, $type_long,
(!defined $type_short ? ''
: !ref $type_short ? "; ($type_short)"
: '; (' . join(', ',@$type_short) . ')'
) );
$part->type_long($type_long); $part->type_short($type_short);
$part->attributes_add('C')
if !ref($type_short) ? $type_short eq 'pgp.enc' # encrypted?
: grep($_ eq 'pgp.enc', @$type_short);
$index++;
}
}
}
defined $ln || $! == 0 || $! == EAGAIN
or die "Error reading from file(1) utility: $!";
do_log(-1,"unexpected(file): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid; my(@errmsg);
# exit status is 1 when result is 'ERROR: ...', accept it mercifully
proc_status_ok($child_stat,$err, 0,1)
or push(@errmsg, "failed, ".exit_status_str($child_stat,$err));
if ($index < @part_list) {
push(@errmsg, sprintf("parsing failure - missing last %d results",
@part_list - $index));
}
!@errmsg or die join(", ",@errmsg);
# even though exit status 1 is accepted, log a warning nevertheless
proc_status_ok($child_stat,$err)
or do_log(-1, "file utility failed: %s",
exit_status_str($child_stat,$err));
}
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
kill_proc($pid,$file,1,$proc_fh,$eval_stat) if defined $pid;
};
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
section_time(sprintf('get-file-type%d', $initial_num_parts));
if (defined $eval_stat) {
do_log(-2, "file(1) utility (%s) FAILED: %s", $file,$eval_stat);
# die "file(1) utility ($file) error: $eval_stat";
}
1;
}
sub decompose_mail($$) {
my($tempdir,$file_generator_object) = @_;
my $hold; my(@parts); my $depth = 1;
my($any_undecipherable, $any_encrypted, $over_levels, $ambiguous) = (0,0,0,0);
my $which_section = "parts_decode";
# fetch all not-yet-visited part names, and start a new cycle
TIER:
while (@parts = @{$file_generator_object->parts_list}) {
if ($MAXLEVELS > 0 && $depth > $MAXLEVELS) {
$over_levels = 1;
$hold = "Maximum decoding depth ($MAXLEVELS) exceeded";
last;
}
$file_generator_object->parts_list_reset; # new cycle of names
# clip to avoid very long log entries
my(@chopped_parts) = @parts > 5 ? @parts[0..4] : @parts;
ll(4) && do_log(4,"decode_parts: level=%d, #parts=%d : %s",
$depth, scalar(@parts),
join(', ', (map($_->base_name, @chopped_parts)),
(@chopped_parts >= @parts ? () : "...")) );
for my $part (@parts) { # test for existence of all expected files
my $fname = $part->full_name; my $errn = 0;
if ($fname eq '') { $errn = ENOENT }
else {
my(@stat_list) = lstat($fname);
if (@stat_list) { add_entropy(@stat_list) } else { $errn = 0+$! }
}
if ($errn == ENOENT) {
$part->exists(0);
# $part->type_short('no-file') if !defined $part->type_short;
} elsif ($errn) {
die "decompose_mail: inaccessible file $fname: $!";
} elsif (!-f _) { # not a regular file
my $what = -l _ ? 'symlink' : -d _ ? 'directory' : 'non-regular file';
do_log(-1, "WARN: decompose_mail: removing unexpected %s %s",
$what,$fname);
if (-d _) { rmdir_recursively($fname) }
else { unlink($fname) or die "Can't delete $what $fname: $!" }
$part->exists(0);
$part->type_short(-l _ ? 'symlink' : -d _ ? 'dir' : 'special')
if !defined $part->type_short;
} elsif (-z _) { # empty file
unlink($fname) or die "Can't remove \"$fname\": $!";
$part->exists(0);
$part->type_short('empty') if !defined $part->type_short;
$part->type_long('empty') if !defined $part->type_long;
} else {
$part->exists(1);
}
}
if (!defined $file || $file eq '') {
do_log(5,'utility file(1) not available, skipping determine_file_types');
} else {
determine_file_types($tempdir, \@parts);
}
for my $part (@parts) {
if ($part->exists && !defined($hold)) {
my($hold_tmp, $over_levels_tmp) = decompose_part($part, $tempdir);
$hold = $hold_tmp if $hold_tmp;
$over_levels ||= $over_levels_tmp;
}
my $attr = $part->attributes;
if (defined $attr) {
$any_undecipherable++ if index($attr, 'U') >= 0;
$any_encrypted++ if index($attr, 'C') >= 0;
$ambiguous++ if index($attr, 'B') >= 0;
}
}
last TIER if defined $hold;
$depth++;
}
section_time($which_section); prolong_timer($which_section);
($hold, $any_undecipherable, $any_encrypted, $over_levels, $ambiguous);
}
# Decompose one part
#
sub decompose_part($$) {
my($part, $tempdir) = @_;
# possible return values from eval:
# 0 - truly atomic or unknown or archiver failure; consider atomic
# 1 - some archive, successfully unpacked, result replaces original
# 2 - probably unpacked, but keep the original (eg self-extracting archive)
my $hold; my $eval_stat; my($sts, $any_called, $over_levels) = (0,0,0);
eval {
my $type_short = $part->type_short;
my(@ts) = !defined $type_short ? ()
: !ref $type_short ? ($type_short) : @$type_short;
if (@ts) { # when one or more short types are known
snmp_count("OpsDecType-".join('.',@ts));
for my $dec_tuple (@{ca('decoders')}) { # first matching decoder wins
next if !defined $dec_tuple;
my($short_types, $code, @args) = @$dec_tuple;
if ($code && grep(ref $short_types ? $short_types->{$_}
: $_ eq $short_types, @ts)) {
$any_called = 1; $sts = &$code($part,$tempdir,@args);
last;
}
}
}
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
my $ll = -1;
if ($eval_stat =~ /\bExceeded storage quota\b.*\bbytes by/ ||
$eval_stat =~ /\bMaximum number of files\b.*\bexceeded/) {
$hold = $eval_stat; $ll = 1; $over_levels = 1;
}
do_log($ll,"Decoding of %s (%s) failed, leaving it unpacked: %s",
$part->base_name, $part->type_long, $eval_stat);
$sts = 2; # keep the original, along with possible decoded files
};
if ($any_called) {
chdir($tempdir) or die "Can't chdir to $tempdir: $!"; # just in case
}
if ($sts == 1 && lookup2(0,$part->type_long,\@keep_decoded_original_maps)) {
# don't trust this file type or unpacker,
# keep both the original and the unpacked file
ll(4) && do_log(4,"file type is %s, retain original %s",
$part->type_long, $part->base_name);
$sts = 2; # keep the original, along with possible decoded files
}
if ($sts == 1) {
ll(5) && do_log(5,"decompose_part: deleting %s", $part->full_name);
unlink($part->full_name)
or die sprintf("Can't unlink %s: %s", $part->full_name, $!);
}
ll(4) && do_log(4,"decompose_part: %s - %s", $part->base_name,
['atomic','archive, unpacked','source retained']->[$sts]);
section_time('decompose_part') if $any_called;
die $eval_stat if $eval_stat =~ /^timed out\b/; # resignal timeout
($hold, $over_levels);
}
# a trivial wrapper around mime_decode() to adjust arguments and result
#
sub do_mime_decode($$) {
my($part, $tempdir) = @_;
mime_decode($part,$tempdir,$part);
2; # probably unpacked, but keep the original mail
};
#
# Uncompression/unarchiving routines
# Possible return codes:
# 0 - truly atomic or unknown or archiver failure; consider atomic
# 1 - some archiver format, successfully unpacked, result replaces original
# 2 - probably unpacked, but keep the original (eg self-extracting archive)
# if ASCII text, try multiple decoding methods as provided by UUlib
# (uuencoded, xxencoded, BinHex, yEnc, Base64, Quoted-Printable)
#
use vars qw($have_uulib_module);
sub do_ascii($$) {
my($part, $tempdir) = @_;
ll(4) && do_log(4,"do_ascii: Decoding part %s", $part->base_name);
if (!defined $have_uulib_module) {
eval {
require Convert::UUlib && ($have_uulib_module = 1);
# avoid an exploitable security hole in Convert::UUlib 1.04 and older
Convert::UUlib->VERSION(1.05); # 1.08 or newer is preferred!
$have_uulib_module;
} or do {
$have_uulib_module = 0;
chomp $@; $@ =~ s/ \(you may need to install the .*\z//i;
do_log(5,"do_ascii: module Convert::UULIB unavailable: %s", $@);
};
}
return 0 if !$have_uulib_module;
snmp_count('OpsDecByUUlibAttempt');
# prevent uunconc.c/UUDecode() from trying to create a temp file in '/'
my $old_env_tmpdir = $ENV{TMPDIR}; $ENV{TMPDIR} = "$tempdir/parts";
my $any_errors = 0; my $any_decoded = 0;
alarm(0); # stop the timer
local($SIG{ALRM}); my($sigset,$action,$oldaction);
if ($] < 5.008) { # in old Perl signals could be delivered at any time
$SIG{ALRM} = sub { die "timed out\n" };
} elsif ($] < 5.008001) { # Perl 5.8.0
# 5.8.0 does not have POSIX::SigAction::safe but uses safe signals, which
# means a runaway uulib can't be aborted; tough luck, upgrade your Perl!
$SIG{ALRM} = sub { die "timed out\n" }; # old way, but won't abort
} else { # Perl >= 5.8.0 has 'safe signals', and SigAction::safe available
# POSIX::sigaction can bypass safe Perl signals on request;
# alternatively, use Perl module Sys::SigAction
$sigset = POSIX::SigSet->new(SIGALRM); $oldaction = POSIX::SigAction->new;
$action = POSIX::SigAction->new(sub { die "timed out\n" },
$sigset, &POSIX::SA_RESETHAND);
$action->safe(1);
POSIX::sigaction(SIGALRM,$action,$oldaction)
or die "Can't set ALRM handler: $!";
do_log(4,"do_ascii: Setting sigaction handler, was %d", $oldaction->safe);
}
my $eval_stat;
eval { # must not go away without calling Convert::UUlib::CleanUp !
my($sts,$count);
prolong_timer('do_ascii_pre'); # restart timer
$sts = Convert::UUlib::Initialize();
$sts = 0 if !defined $sts; # avoid Use of uninit. value in numeric eq (==)
$sts == Convert::UUlib::RET_OK()
or die "Convert::UUlib::Initialize failed: ".
Convert::UUlib::strerror($sts);
my $uulib_version =
Convert::UUlib::GetOption(Convert::UUlib::OPT_VERSION());
!Convert::UUlib::SetOption(Convert::UUlib::OPT_IGNMODE(), 1)
or die "bad uulib OPT_IGNMODE";
# !Convert::UUlib::SetOption(Convert::UUlib::OPT_DESPERATE(), 1)
# or die "bad uulib OPT_DESPERATE";
if (defined $action) {
$action->safe(0); # bypass safe Perl signals
POSIX::sigaction(SIGALRM,$action) or die "Can't set ALRM handler: $!";
}
# may take looong time on malformed messages, allow it to be interrupted
($sts, $count) = Convert::UUlib::LoadFile($part->full_name);
if (defined $action) {
$action->safe(1); # re-establish safe signal handling
POSIX::sigaction(SIGALRM,$action) or die "Can't set ALRM handler: $!";
}
if ($sts != Convert::UUlib::RET_OK()) {
my $errmsg = Convert::UUlib::strerror($sts) . ": $!";
$errmsg .= ", (???"
. Convert::UUlib::strerror(
Convert::UUlib::GetOption(Convert::UUlib::OPT_ERRNO()))."???)"
if $sts == Convert::UUlib::RET_IOERR();
die "Convert::UUlib::LoadFile (uulib V$uulib_version) failed: $errmsg";
}
ll(4) && do_log(4,"do_ascii: Decoding part %s (%d items), uulib V%s",
$part->base_name, $count, $uulib_version);
my $uu;
my $item_num = 0; my $parent_placement = $part->mime_placement;
for (my $j = 0; $uu = Convert::UUlib::GetFileListItem($j); $j++) {
$item_num++;
ll(4) && do_log(4,
"do_ascii(%d): state=0x%02x, enc=%s%s, est.size=%s, name=%s",
$j, $uu->state, Convert::UUlib::strencoding($uu->uudet),
($uu->mimetype ne '' ? ", mimetype=" . $uu->mimetype : ''),
$uu->size, $uu->filename);
if (!($uu->state & Convert::UUlib::FILE_OK())) {
$any_errors = 1;
do_log(1,"do_ascii: Convert::UUlib info: %s not decodable, %s",
$j,$uu->state);
} else {
my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared($uu->filename);
my $newpart = $newpart_obj->full_name;
if (defined $action) {
$action->safe(0); # bypass safe Perl signals
POSIX::sigaction(SIGALRM,$action) or die "Can't set ALRM handlr: $!";
}
$! = 0;
$sts = $uu->decode($newpart); # decode to file $newpart
my $err_decode = "$!";
if (defined $action) {
$action->safe(1); # re-establish safe signal handling
POSIX::sigaction(SIGALRM,$action) or die "Can't set ALRM handlr: $!";
}
chmod(0750, $newpart) or $! == ENOENT # chmod, don't panic if no file
or die "Can't change protection of \"$newpart\": $!";
my $statmsg;
my $errn = lstat($newpart) ? 0 : 0+$!;
if ($errn == ENOENT) { $statmsg = "does not exist" }
elsif ($errn) { $statmsg = "inaccessible: $!" }
elsif ( -l _) { $statmsg = "is a symlink" }
elsif ( -d _) { $statmsg = "is a directory" }
elsif (!-f _) { $statmsg = "not a regular file" }
if (defined $statmsg) { $statmsg = "; file status: $newpart $statmsg" }
my $size = 0 + (-s _);
$newpart_obj->size($size);
consumed_bytes($size, 'do_ascii');
if ($sts == Convert::UUlib::RET_OK() && $errn==0) {
$any_decoded = 1;
do_log(4,"do_ascii: RET_OK%s", $statmsg) if defined $statmsg;
} elsif ($sts == Convert::UUlib::RET_NODATA() ||
$sts == Convert::UUlib::RET_NOEND()) {
$any_errors = 1;
do_log(-1,"do_ascii: Convert::UUlib error: %s%s",
Convert::UUlib::strerror($sts), $statmsg);
} else {
$any_errors = 1;
my $errmsg = Convert::UUlib::strerror($sts) . ":: $err_decode";
$errmsg .= ", " . Convert::UUlib::strerror(
Convert::UUlib::GetOption(Convert::UUlib::OPT_ERRNO()) )
if $sts == Convert::UUlib::RET_IOERR();
die("Convert::UUlib failed: " . $errmsg . $statmsg);
}
}
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_ascii'); # restart timer
if (defined $oldaction) {
POSIX::sigaction(SIGALRM,$oldaction)
or die "Can't restore ALRM handler: $!";
}
Convert::UUlib::CleanUp();
snmp_count('OpsDecByUUlib') if $any_decoded;
if (defined $old_env_tmpdir) { $ENV{TMPDIR} = $old_env_tmpdir }
else { delete $ENV{TMPDIR} }
if (defined $eval_stat) { chomp $eval_stat; die "do_ascii: $eval_stat\n" }
$any_errors ? 2 : $any_decoded ? 1 : 0;
}
# use Archive-Zip
#
sub do_unzip($$;$$) {
my($part, $tempdir, $archiver_dummy, $testing_for_sfx) = @_;
ll(4) && do_log(4, "Unzipping %s", $part->base_name);
# avoid DoS vulnerability in < 2.017, CVE-2009-1391
# Compress::Raw::Zlib->VERSION(2.017); # module not loaded
snmp_count('OpsDecByArZipAttempt');
my $zip = Archive::Zip->new;
my(@err_nm) = qw(AZ_OK AZ_STREAM_END AZ_ERROR AZ_FORMAT_ERROR AZ_IO_ERROR);
my $retval = 1;
# need to set up a temporary minimal error handler
Archive::Zip::setErrorHandler(sub { return 5 });
my $sts = $zip->read($part->full_name);
Archive::Zip::setErrorHandler(sub { die @_ });
my($any_unsupp_compmeth,$any_zero_length);
my($encryptedcount,$extractedcount) = (0,0);
if ($sts != AZ_OK) { # not a zip? corrupted zip file? other errors?
if ($testing_for_sfx && $sts == AZ_FORMAT_ERROR) {
# a normal status for executable that is not a self extracting archive
do_log(4, "do_unzip: ok, exe is not a zip sfx: %s (%s)",
$err_nm[$sts], $sts);
} else {
do_log(-1, "do_unzip: not a zip: %s (%s)", $err_nm[$sts], $sts);
# $part->attributes_add('U'); # perhaps not, it flags as **UNCHECKED** too
# # many bounces containing chopped-off zip
}
$retval = 0;
} else {
my $item_num = 0; my $parent_placement = $part->mime_placement;
for my $mem ($zip->members) {
my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$item_num++; $newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared($mem->fileName);
my $compmeth = $mem->compressionMethod;
if ($compmeth!=COMPRESSION_DEFLATED && $compmeth!=COMPRESSION_STORED) {
$any_unsupp_compmeth = $compmeth;
$newpart_obj->attributes_add('U');
} elsif ($mem->isEncrypted) {
$encryptedcount++;
$newpart_obj->attributes_add('U','C');
} elsif ($mem->isDirectory) {
$newpart_obj->attributes_add('D');
} else {
# want to read uncompressed - set to COMPRESSION_STORED
my $oldc = $mem->desiredCompressionMethod(COMPRESSION_STORED);
$sts = $mem->rewindData;
$sts == AZ_OK or die sprintf("%s: error rew. member data: %s (%s)",
$part->base_name, $err_nm[$sts], $sts);
my $newpart = $newpart_obj->full_name;
my $outpart = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$outpart->open($newpart, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create file $newpart: $!";
binmode($outpart) or die "Can't set file $newpart to binmode: $!";
my $size = 0;
while ($sts == AZ_OK) {
my $buf_ref;
($buf_ref, $sts) = $mem->readChunk;
$sts == AZ_OK || $sts == AZ_STREAM_END
or die sprintf("%s: error reading member: %s (%s)",
$part->base_name, $err_nm[$sts], $sts);
my $buf_len = length($$buf_ref);
if ($buf_len > 0) {
$size += $buf_len;
$outpart->print($$buf_ref) or die "Can't write to $newpart: $!";
consumed_bytes($buf_len, 'do_unzip');
}
}
$any_zero_length = 1 if $size == 0;
$newpart_obj->size($size);
$outpart->close or die "Error closing $newpart: $!";
$mem->desiredCompressionMethod($oldc);
$mem->endRead;
$extractedcount++;
}
}
snmp_count('OpsDecByArZip');
}
if ($any_unsupp_compmeth) {
$retval = 2;
do_log(-1, "do_unzip: %s, unsupported compression method: %s",
$part->base_name, $any_unsupp_compmeth);
} elsif ($any_zero_length) { # possible zip vulnerability exploit
$retval = 2;
do_log(1, "do_unzip: %s, members of zero length, archive retained",
$part->base_name);
} elsif ($encryptedcount) {
$retval = 2;
do_log(1,
"do_unzip: %s, %d members are encrypted, %s extracted, archive retained",
$part->base_name, $encryptedcount,
!$extractedcount ? 'none' : $extractedcount);
}
$retval;
}
# use external decompressor program from the compress/gzip/bzip2/xz/lz4 family
#
sub do_uncompress($$$) {
my($part, $tempdir, $decompressor) = @_;
ll(4) && do_log(4,"do_uncompress %s by %s", $part->base_name,$decompressor);
my $decompressor_name = basename((split(' ',$decompressor))[0]);
snmp_count("OpsDecBy\u${decompressor_name}");
my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement($part->mime_placement."/1");
my $newpart = $newpart_obj->full_name;
my($type_short, $name_declared) = ($part->type_short, $part->name_declared);
local($1); my(@rn); # collect recommended file names
push(@rn,$1)
if $part->type_long =~ /^\S+\s+compressed data, was "(.+)"(\z|, from\b)/;
for my $name_d (!ref $name_declared ? ($name_declared) : @$name_declared) {
next if $name_d eq '';
my $name = $name_d;
for (!ref $type_short ? ($type_short) : @$type_short) {
$_ eq 'F' and $name=~s/\.F\z//;
$_ eq 'Z' and $name=~s/\.Z\z// || $name=~s/\.tg?z\z/.tar/;
$_ eq 'gz' and $name=~s/\.gz\z// || $name=~s/\.tgz\z/.tar/;
$_ eq 'bz' and $name=~s/\.bz\z// || $name=~s/\.tbz\z/.tar/;
$_ eq 'bz2' and $name=~s/\.bz2?\z// || $name=~s/\.tbz2?\z/.tar/;
$_ eq 'xz' and $name=~s/\.xz\z// || $name=~s/\.txz\z/.tar/;
$_ eq 'lzma' and $name=~s/\.lzma\z// || $name=~s/\.tlz\z/.tar/;
$_ eq 'lrz' and $name=~s/\.lrz\z//;
$_ eq 'lzo' and $name=~s/\.lzo\z//;
$_ eq 'lz4' and $name=~s/\.lz4\z//;
$_ eq 'rpm' and $name=~s/\.rpm\z/.cpio/;
}
push(@rn,$name) if !grep($_ eq $name, @rn);
}
$newpart_obj->name_declared(@rn==1 ? $rn[0] : \@rn) if @rn;
my($proc_fh,$pid); my $retval = 1;
prolong_timer('do_uncompress_pre'); # restart timer
my $eval_stat;
eval {
($proc_fh,$pid) =
run_command($part->full_name, '/dev/null', split(' ',$decompressor));
my($rv,$err) = run_command_copy($newpart,$proc_fh,$pid); # may die
undef $proc_fh; undef $pid;
if (!proc_status_ok($rv,$err)) {
# unlink($newpart) or die "Can't unlink $newpart: $!";
my $msg = sprintf('Error running decompressor %s on %s, %s',
$decompressor, $part->base_name, exit_status_str($rv,$err));
# bzip2 and gzip use status 2 as a warning about corrupted file
if (proc_status_ok($rv,$err, 2)) {do_log(0,"%s",$msg)} else {die $msg}
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_uncompress'); # restart timer
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$decompressor,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
die "do_uncompress: $eval_stat\n"; # propagate failure
}
$retval;
}
# use Compress::Zlib to inflate
#
sub do_gunzip($$) {
my($part, $tempdir) = @_; my $retval = 0;
do_log(4, "Inflating gzip archive %s", $part->base_name);
snmp_count('OpsDecByZlib');
my $gz = Amavis::IO::Zlib->new;
$gz->open($part->full_name,'rb')
or die("do_gunzip: Can't open gzip file ".$part->full_name.": $!");
my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement($part->mime_placement."/1");
my $newpart = $newpart_obj->full_name;
my $outpart = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$outpart->open($newpart, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create file $newpart: $!";
binmode($outpart) or die "Can't set file $newpart to binmode: $!";
my($nbytes,$buff); my $size = 0;
while (($nbytes=$gz->read($buff,16384)) > 0) {
$outpart->print($buff) or die "Can't write to $newpart: $!";
$size += $nbytes; consumed_bytes($nbytes, 'do_gunzip');
}
my $err = defined $nbytes ? 0 : $!;
$newpart_obj->size($size);
$outpart->close or die "Error closing $newpart: $!";
undef $buff; # release storage
my(@rn); # collect recommended file name
my $name_declared = $part->name_declared;
for my $name_d (!ref $name_declared ? ($name_declared) : @$name_declared) {
next if $name_d eq '';
my $name = $name_d;
$name=~s/\.(gz|Z)\z// || $name=~s/\.tgz\z/.tar/;
push(@rn,$name) if !grep($_ eq $name, @rn);
}
$newpart_obj->name_declared(@rn==1 ? $rn[0] : \@rn) if @rn;
if (defined $nbytes && $nbytes==0) { $retval = 1 } # success
else {
do_log(-1, "do_gunzip: Error reading file %s: %s", $part->full_name,$err);
unlink($newpart) or die "Can't unlink $newpart: $!";
$newpart_obj->size(undef); $retval = 0;
}
$gz->close or die "Error closing gzipped file: $!";
$retval;
}
# DROPED SUPPORT for Archive::Tar; main drawback of this module is: it either
# loads an entire tar into memory (horrors!), or when using extract_archive()
# it does not relativize absolute paths (which makes it possible to store
# members in any directory writable by uid), and does not provide a way to
# capture contents of members with the same name. Use pax program instead!
#
#use Archive::Tar;
#sub do_tar($$) {
# my($part, $tempdir) = @_;
# snmp_count('OpsDecByArTar');
# # Work around bug in Archive-Tar
# my $tar = eval { Archive::Tar->new($part->full_name) };
# if (!defined($tar)) {
# chomp $@;
# do_log(4, "Faulty archive %s: %s", $part->full_name, $@);
# die $@ if $@ =~ /^timed out\b/; # resignal timeout
# return 0;
# }
# do_log(4,"Untarring %s", $part->base_name);
# my $item_num = 0; my $parent_placement = $part->mime_placement;
# my(@list) = $tar->list_files;
# for (@list) {
# next if m{/\z}; # ignore directories
# # this is bad (reads whole file into scalar)
# # need some error handling, too
# my $data = $tar->get_content($_);
# my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
# $item_num++; $newpart_obj->mime_placement("$parent_placement/$item_num");
# my $newpart = $newpart_obj->full_name;
# my $outpart = IO::File->new;
# # O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
# $outpart->open($newpart, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
# or die "Can't create file $newpart: $!";
# binmode($outpart) or die "Can't set file $newpart to binmode: $!";
# $outpart->print($data) or die "Can't write to $newpart: $!";
# $newpart_obj->size(length($data));
# consumed_bytes(length($data), 'do_tar');
# $outpart->close or die "Error closing $newpart: $!";
# }
# 1;
#}
# use external program to expand 7-Zip archives
#
sub do_7zip($$$;$) {
my($part, $tempdir, $archiver, $testing_for_sfx) = @_;
ll(4) && do_log(4, "Expanding 7-Zip archive %s", $part->base_name);
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}Attempt");
my $last_line; my $any_encrypted; my $bytes = 0; my $mem_cnt = 0;
my $retval = 1; my($proc_fh,$pid); my $fn = $part->full_name;
prolong_timer('do_7zip_pre'); # restart timer
my $eval_stat;
eval {
($proc_fh,$pid) = run_command(undef, '&1', $archiver,
'l', '-slt', "-w$tempdir/parts", '--', $fn);
my @list;
my $ln; my($name,$size,$attr,$enc); my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
$last_line = $ln if $ln =~ /\S/; # keep last nonempty line
chomp($ln); local($1);
if ($ln !~ /\S/) { # empty line separates members
if (defined $attr && $attr =~ /^D/) {
do_log(5,'do_7zip: member: %s "%s", (skipped directory)',
$attr,$name);
} elsif (defined $enc && defined $name) {
do_log(5,'do_7zip: member: %s "%s", %s bytes (skipped encrypted)',
$attr,$name,$size);
# make a phantom entry - carrying only name and attributes
my $parent_placement = $part->mime_placement;
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement("$parent_placement/$entries_cnt");
$newpart_obj->name_declared($name);
$newpart_obj->attributes_add('U','C');
} elsif (defined $name || defined $size) {
do_log(5,'do_7zip: member: %s "%s", %s bytes',
$attr, $name, defined $size ? $size : '?');
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES) {
die "Maximum number of files ($MAXFILES) exceeded";
}
if (defined $size && $size > 0) {
push(@list, untaint($name));
$bytes += $size; $mem_cnt++;
}
}
undef $name; undef $size; undef $attr; undef $enc;
}
elsif ($ln =~ /^Path = (.*)\z/s) { $name = $1 }
elsif ($ln =~ /^Size = ([0-9]+)\z/s) { $size = $1 }
elsif ($ln =~ /^Attributes = (.*)\z/s) { $attr = $1 }
elsif ($ln =~ /^Encrypted = \+\z/s) { $enc = $any_encrypted = 1 }
elsif ($ln =~ /^ERROR:.* Can not open encrypted archive\. Wrong password\?\z/s) {
do_log(5,'do_7zip: archive is encrypted');
$part->attributes_add('U','C');
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (1): $!";
do_log(-1,"unexpected(do_7zip_1): %s",$!) if !defined($ln) && $! == EAGAIN;
if (defined $name || defined $size) {
do_log(5,'do_7zip: member: %s "%s", %s bytes', $attr,$name,$size);
if (defined $size && $size > 0) { $bytes += $size; $mem_cnt++ }
}
# consume all remaining output to avoid broken pipe
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
$last_line = $ln if $ln =~ /\S/;
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (2): $!";
do_log(-1,"unexpected(do_7zip_2): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid; local($1,$2);
if (proc_status_ok($rv,$err,1) && $mem_cnt > 0 && $bytes > 0) { # just warn
do_log(4,"do_7zip: warning, %s", exit_status_str($rv,$err));
} elsif (!proc_status_ok($rv,$err)) {
die sprintf("can't get a list of archive members: %s; %s",
exit_status_str($rv,$err), $last_line);
}
if ($mem_cnt > 0 || $bytes > 0) {
consumed_bytes($bytes, 'do_7zip-pre', 1); # pre-check on estimated size
snmp_count("OpsDecBy\u${decompressor_name}");
if (!$any_encrypted) {
# supplying an empty list extracts all files, avoids exceeding the
# argv size limit as there is no need to exclude excrypted members
# (which would result in 7z returning a nonzero status)
@list = ();
}
($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'x', '-bd', '-y',
"-w$tempdir/parts", "-o$tempdir/parts/7zip", '--',
$fn, @list);
collect_results($proc_fh,$pid,$archiver,16384,[0,1]);
undef $proc_fh; undef $pid;
my $errn = lstat("$tempdir/parts/7zip") ? 0 : 0+$!;
if ($errn != ENOENT) {
my $b = flatten_and_tidy_dir("$tempdir/parts/7zip",
"$tempdir/parts", $part);
consumed_bytes($b, 'do_7zip');
}
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_7zip'); # restart timer
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
# if ($testing_for_sfx) { die "do_7zip: $eval_stat" }
# else { do_log(-1, "do_7zip: %s", $eval_stat) };
die "do_7zip: $eval_stat\n" # propagate failure
}
$retval;
}
# use external program to expand RAR archives
#
sub do_unrar($$$;$) {
my($part, $tempdir, $archiver, $testing_for_sfx) = @_;
ll(4) && do_log(4, "Expanding RAR archive %s", $part->base_name);
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}Attempt");
# unrar exit codes: SUCCESS=0, WARNING=1, FATAL_ERROR=2, CRC_ERROR=3,
# LOCK_ERROR=4, WRITE_ERROR=5, OPEN_ERROR=6, USER_ERROR=7, MEMORY_ERROR=8,
# CREATE_ERROR=9, USER_BREAK=255
my(@list); my $hypcount = 0; my $encryptedcount = 0;
my $lcnt = 0; my $member_name; my $bytes = 0; my $last_line;
my $item_num = 0; my $parent_placement = $part->mime_placement;
my $retval = 1; my $fn = $part->full_name; my($proc_fh,$pid);
my $unrarvers = 5;
my(@common_rar_switches) = qw(-c- -p- -idcdp); # -av-
prolong_timer('do_unrar_pre'); # restart timer
my $eval_stat;
eval {
($proc_fh,$pid) =
run_command(undef, '&1', $archiver, 'v',@common_rar_switches,'--',$fn);
# jump hoops because there is no simple way to just list all the files
my $ln; my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
$last_line = $ln if $ln !~ /^\s*$/; # keep last nonempty line
chomp;
if ($ln =~ /^unexpected end of archive/) {
last;
} elsif ($ln =~ /^------/) {
$hypcount++;
last if $hypcount >= 2;
} elsif ($hypcount < 1 && $ln =~ /^Encrypted file:/) {
do_log(4,"do_unrar: %s", $ln);
$part->attributes_add('U','C');
} elsif ($hypcount < 1 &&
$ln =~ /^\s+Size\s+Packed Ratio\s+Date\s+Time\s+Attr\s+CRC/) {
do_log(5,"do_unrar: found unrar version < 5");
$unrarvers = 4;
} elsif ($hypcount == 1) {
if ($unrarvers >= 5) {
local($1,$2,$3,$4,$5);
if ($ln !~ /^ ([* ]) \s+ \S+ \s+ (\d+) \s+ (\d+) \s+
( \d+ % | --> | <-- | <-> ) \s+
\S+ \s+ \S+ \s+ \S+ \s+ (.*)/xs) {
do_log($testing_for_sfx ? 4 : -1,
"do_unrar: can't parse info line for \"%s\" %s",
$member_name,$ln);
} else {
$member_name = $5;
if ($1 eq '*') { # member is encrypted
$encryptedcount++; $item_num++;
# make a phantom entry - carrying only name and attributes
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared($member_name);
$newpart_obj->attributes_add('U','C');
} else { # makes no sense extracting encrypted files
do_log(5,'do_unrar: member: "%s", size: %s', $member_name,$2);
if ($2 > 0) { $bytes += $2; push(@list, $member_name) }
}
undef $member_name;
}
} else { # old version of unrar
$lcnt++; local($1,$2,$3);
if ($lcnt % 2 == 0) { # information line (every other line)
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if ($ln !~ /^ \s+ (\d+) \s+ (\d+) \s+
( \d+% | --> | <-- | <-> )/xs) {
do_log($testing_for_sfx ? 4 : -1,
"do_unrar: can't parse info line for \"%s\" %s",
$member_name,$ln);
} elsif (defined $member_name) {
do_log(5,'do_unrar: member: "%s", size: %s', $member_name,$1);
if ($1 > 0) { $bytes += $1; push(@list, $member_name) }
}
undef $member_name;
} elsif ($ln =~ /^(.)(.*)\z/s) {
$member_name = $2; # all but the first character (space or '*')
if ($1 eq '*') { # member is encrypted
$encryptedcount++; $item_num++;
# make a phantom entry - carrying only name and attributes
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared($member_name);
$newpart_obj->attributes_add('U','C');
undef $member_name; # makes no sense extracting encrypted files
}
}
}
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (1): $!";
do_log(-1,"unexpected(unrar_1): %s",$!) if !defined($ln) && $! == EAGAIN;
$ln = undef; # consume all remaining output to avoid broken pipe
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0)
{ $last_line = $ln if $ln !~ /^\s*$/ }
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (2): $!";
do_log(-1,"unexpected(unrar_2): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid; local($1,$2);
if (proc_status_ok($rv,$err, 7)) { # USER_ERROR
die printf("perhaps this %s does not recognize switches ".
"-av- and -idcdp, it is probably too old. Upgrade: %s",
$archiver, 'http://www.rarlab.com/');
} elsif (proc_status_ok($rv,$err, 3)) { # CRC_ERROR
# NOTE: password protected files in the archive cause CRC_ERROR
do_log(4,"do_unrar: CRC_ERROR - undecipherable, %s",
exit_status_str($rv,$err));
$part->attributes_add('U');
} elsif (proc_status_ok($rv,$err, 1) && @list && $bytes > 0) {
# WARNING, probably still ok
do_log(4,"do_unrar: warning, %s", exit_status_str($rv,$err));
} elsif (!proc_status_ok($rv,$err)) {
die("can't get a list of archive members: " .
exit_status_str($rv,$err) ."; ".$last_line);
} elsif (!$bytes && $last_line =~ /^\Q$fn\E is not RAR archive$/) {
chomp($last_line); die $last_line;
} elsif ($last_line !~ /^\s*(\d+)\s+(\d+)/s) {
do_log(-1,"do_unrar: unable to obtain orig total size: %s", $last_line);
} else {
do_log(4,"do_unrar: summary size: %d, sum of sizes: %d",
$2,$bytes) if abs($bytes - $2) > 100;
$bytes = $2 if $2 > $bytes;
}
consumed_bytes($bytes, 'do_unrar-pre', 1); # pre-check on estimated size
if (!@list) {
do_log(4,"do_unrar: no archive members, or not an archive at all");
if ($testing_for_sfx) { return 0 } else { $part->attributes_add('U') }
} else {
snmp_count("OpsDecBy\u${decompressor_name}");
# unrar/rar can make a dir by itself, but can't hurt (sparc64 problem?)
mkdir("$tempdir/parts/rar", 0750)
or die "Can't mkdir $tempdir/parts/rar: $!";
($proc_fh,$pid) =
run_command(undef, '&1', $archiver, qw(x -inul -ver -o- -kb),
@common_rar_switches, '--', $fn, "$tempdir/parts/rar/");
collect_results($proc_fh,$pid,$archiver,16384,
[0,1,3] ); # one of: SUCCESS, WARNING, CRC
undef $proc_fh; undef $pid;
my $errn = lstat("$tempdir/parts/rar") ? 0 : 0+$!;
if ($errn != ENOENT) {
my $b = flatten_and_tidy_dir("$tempdir/parts/rar",
"$tempdir/parts", $part);
consumed_bytes($b, 'do_unrar');
}
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_unrar'); # restart timer
if ($encryptedcount) {
do_log(1,
"do_unrar: %s, %d members are encrypted, %s extracted, archive retained",
$part->base_name, $encryptedcount, !@list ? 'none' : scalar(@list) );
$retval = 2;
}
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
# if ($testing_for_sfx) { die "do_unrar: $eval_stat" }
# else { do_log(-1, "do_unrar: %s", $eval_stat) };
die "do_unrar: $eval_stat\n" # propagate failure
}
$retval;
}
# use external program to expand LHA archives
#
sub do_lha($$$;$) {
my($part, $tempdir, $archiver, $testing_for_sfx) = @_;
ll(4) && do_log(4, "Expanding LHA archive %s", $part->base_name);
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}Attempt");
# lha needs extension .exe to understand SFX!
# the downside is that in this case it only sees MS files in an archive
my $fn = $part->full_name;
symlink($fn, $fn.".exe")
or die sprintf("Can't symlink %s %s.exe: %s", $fn, $fn, $!);
my(@list); my(@checkerr); my $retval = 1; my($proc_fh,$pid);
prolong_timer('do_lha_pre'); # restart timer
my $eval_stat;
eval {
# ($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'lq', $fn);
($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'lq', $fn.".exe");
my $ln; my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
chomp($ln); local($1);
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if ($ln =~ m{/\z}) {
# ignore directories
} elsif ($ln =~ /^LHa: (Warning|Fatal error): /) {
push(@checkerr,$ln) if @checkerr < 3;
} elsif ($ln=~m{^(?:\S+\s+\d+/\d+|.{23})(?:\s+\S+){5}\s*(\S.*?)\s*\z}s) {
my $name = $1; $name = $1 if $name =~ m{^(.*) -> (.*)\z}s; # symlink
push(@list, $name);
} else { do_log(5,"do_lha: skip: %s", $ln) }
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading: $!";
do_log(-1,"unexpected(do_lha): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
if (!proc_status_ok($child_stat,$err) || @checkerr) {
die('(' . join(", ",@checkerr) .') ' .exit_status_str($child_stat,$err));
} elsif (!@list) {
$part->attributes_add('U') if !$testing_for_sfx;
die "no archive members, or not an archive at all";
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_lha'); # restart timer
if (defined $eval_stat) {
unlink($fn.".exe") or do_log(-1, "Can't unlink %s.exe: %s", $fn,$!);
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
# if ($testing_for_sfx) { die "do_lha: $eval_stat" }
# else { do_log(-1, "do_lha: %s", $eval_stat) };
die "do_lha: $eval_stat\n"; # propagate failure
} else { # preliminary archive traversal done, now extract files
snmp_count("OpsDecBy\u${decompressor_name}");
my $rv;
eval {
# store_mgr may die, make sure we unlink the .exe file
$rv = store_mgr($tempdir, $part, \@list, $archiver, 'pq', $fn.".exe");
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
unlink($fn.".exe") or do_log(-1, "Can't unlink %s.exe: %s", $fn,$!);
if (defined $eval_stat) { die "do_lha: $eval_stat\n" } # propagate failure
$rv==0 or die exit_status_str($rv);
}
$retval;
}
# use external program to expand ARC archives;
# works with original arc, or a GPL licensed 'nomarch'
# (http://rus.members.beeb.net/nomarch.html)
#
sub do_arc($$$) {
my($part, $tempdir, $archiver) = @_;
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}");
my $is_nomarch = $archiver =~ /nomarch/i;
ll(4) && do_log(4,"Unarcing %s, using %s",
$part->base_name, ($is_nomarch ? "nomarch" : "arc") );
my $cmdargs = ($is_nomarch ? '-l -U' : 'ln') . ' ' . $part->full_name;
my($proc_fh,$pid) = run_command(undef, '/dev/null', $archiver,
split(' ',$cmdargs));
my(@list); my $ln; my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
push(@list,$ln);
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading: $!";
do_log(-1,"unexpected(do_arc): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
proc_status_ok($child_stat,$err)
or do_log(-1, 'do_arc: %s',exit_status_str($child_stat,$err));
#*** no spaces in filenames allowed???
local($1); s/^([^ \t\r\n]*).*\z/$1/s for @list; # keep only filenames
if (@list) {
# store_mgr may die, allow failure to propagate
my $rv = store_mgr($tempdir, $part, \@list, $archiver,
($is_nomarch ? ('-p', '-U') : 'p'), $part->full_name);
do_log(-1, 'arc %', exit_status_str($rv)) if $rv;
}
1;
}
# use external program to expand ZOO archives
#
sub do_zoo($$$) {
my($part, $tempdir, $archiver) = @_;
my $is_unzoo = $archiver =~ m{\bunzoo[^/]*\z}i ? 1 : 0;
ll(4) && do_log(4,"Expanding ZOO archive %s, using %s",
$part->base_name, ($is_unzoo ? "unzoo" : "zoo") );
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}");
my(@list); my $separ_count = 0; my $bytes = 0; my($ln,$last_line);
my $retval = 1; my $fn = $part->full_name; my($proc_fh,$pid);
symlink($fn, "$fn.zoo") # Zoo needs extension of .zoo!
or die sprintf("Can't symlink %s %s.zoo: %s", $fn,$fn,$!);
prolong_timer('do_zoo_pre'); # restart timer
my $eval_stat; my $entries_cnt = 0;
eval {
($proc_fh,$pid) = run_command(undef, '&1', $archiver,
$is_unzoo ? qw(-l) : qw(l), "$fn.zoo");
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
$last_line = $ln if $ln !~ /^\s*$/; # keep last nonempty line
if ($ln =~ /^------/) { $separ_count++ }
elsif ($separ_count == 1) {
local($1,$2);
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if ($ln !~ /^\s*(\d+)(?:\s+\S+){6}\s+(?:[0-7]{3,})?\s*(.*)$/) {
do_log(3,"do_zoo: can't parse line %s", $ln);
} else {
do_log(5,'do_zoo: member: "%s", size: %s', $2,$1);
if ($1 > 0) { $bytes += $1; push(@list,$2) }
}
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading: $!";
do_log(-1,"unexpected(do_zoo): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid; local($1);
if (!proc_status_ok($rv,$err)) {
die("can't get a list of archive members: " .
exit_status_str($rv,$err) ."; ".$last_line);
} elsif ($last_line !~ /^\s*(\d+)\s+\d+%\s+\d+/s) {
do_log(-1,"do_zoo: unable to obtain orig total size: %s", $last_line);
} else {
do_log(4,"do_zoo: summary size: %d, sum of sizes: %d",
$1,$bytes) if abs($bytes - $1) > 100;
$bytes = $1 if $1 > $bytes;
}
consumed_bytes($bytes, 'do_zoo-pre', 1); # pre-check on estimated size
$retval = 0 if @list;
if (!$is_unzoo) {
# unzoo cannot cleanly extract to stdout without prepending a clutter
# store_mgr may die
my $rv = store_mgr($tempdir,$part,\@list,$archiver,'xpqqq:',"$fn.zoo");
do_log(-1,"do_zoo (store_mgr) %s", exit_status_str($rv)) if $rv;
} else { # this code section can handle zoo and unzoo
# but zoo is unsafe in this mode (and so is unzoo, a little less so)
my $cwd = "$tempdir/parts/zoo";
mkdir($cwd, 0750) or die "Can't mkdir $cwd: $!";
chdir($cwd) or die "Can't chdir to $cwd: $!";
# don't use "-j ./" in unzoo, it does not protect from relative paths!
# "-j X" is less bad, but: "unzoo: 'X/h/user/01.lis' cannot be created"
($proc_fh,$pid) =
run_command(undef, '&1', $archiver,
$is_unzoo ? qw(-x -j X) : qw(x),
"$fn.zoo", $is_unzoo ? '*;*' : () );
collect_results($proc_fh,$pid,$archiver,16384,[0]);
undef $proc_fh; undef $pid;
my $b = flatten_and_tidy_dir("$tempdir/parts/zoo",
"$tempdir/parts", $part);
consumed_bytes($b, 'do_zoo');
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_zoo'); # restart timer
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
do_log(-1,"do_zoo: %s", $eval_stat);
}
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
unlink("$fn.zoo") or die "Can't unlink $fn.zoo: $!";
if (defined $eval_stat) { die "do_zoo: $eval_stat\n" } # propagate failure
$retval;
}
# use external program to expand ARJ archives
#
sub do_unarj($$$;$) {
my($part, $tempdir, $archiver, $testing_for_sfx) = @_;
do_log(4, "Expanding ARJ archive %s", $part->base_name);
my $decompressor_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${decompressor_name}Attempt");
# options to arj, ignored by unarj
# provide some password in -g to turn fatal error into 'bad password' error
$ENV{ARJ_SW} = "-i -jo -b5 -2h -jyc -ja1 -gsecret -w$tempdir/parts";
# unarj needs extension of .arj!
my $fn = $part->full_name;
symlink($part->full_name, $fn.".arj")
or die sprintf("Can't symlink %s %s.arj: %s", $fn, $fn, $!);
my $retval = 1; my($proc_fh,$pid);
prolong_timer('do_unarj_pre'); # restart timer
my $eval_stat;
eval {
# obtain total original size of archive members from the index/listing
($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'l', $fn.".arj");
my $last_line; my $ln;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0)
{ $last_line = $ln if $ln !~ /^\s*$/ }
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (1): $!";
do_log(-1,"unexpected(do_unarj_1): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
if (!proc_status_ok($rv,$err, 0,1,3)) { # one of: success, warn, CRC err
$part->attributes_add('U') if !$testing_for_sfx;
die "not an ARJ archive? ".exit_status_str($rv,$err);
} elsif ($last_line =~ /^\Q$fn\E.arj is not an ARJ archive$/) {
die "last line: $last_line";
} elsif ($last_line !~ /^\s*(\d+)\s*files\s*(\d+)/s) {
$part->attributes_add('U') if !$testing_for_sfx;
die "unable to obtain orig size of files: $last_line, ".
exit_status_str($rv,$err);
} else {
consumed_bytes($2, 'do_unarj-pre', 1); # pre-check on estimated size
}
# unarj has very limited extraction options, arj is much better!
mkdir("$tempdir/parts/arj",0750)
or die "Can't mkdir $tempdir/parts/arj: $!";
chdir("$tempdir/parts/arj")
or die "Can't chdir to $tempdir/parts/arj: $!";
snmp_count("OpsDecBy\u${decompressor_name}");
($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'e', $fn.".arj");
my($encryptedcount,$skippedcount,$entries_cnt) = (0,0,0);
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
$encryptedcount++
if $ln =~ /^(Extracting.*\bBad file data or bad password|File is password encrypted, Skipped)\b/s;
$skippedcount++
if $ln =~ /(\bexists|^File is password encrypted|^Unsupported .*), Skipped\b/s;
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (2): $!";
do_log(-1,"unexpected(do_unarj_2): %s",$!) if !defined($ln) && $! == EAGAIN;
$err = 0; $proc_fh->close or $err = $!;
$rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid;
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
if (proc_status_ok($rv,$err, 0,1)) {} # success, warn
elsif (proc_status_ok($rv,$err, 3)) # CRC err
{ $part->attributes_add('U') if !$testing_for_sfx }
else { do_log(0, "unarj: error extracting: %s",exit_status_str($rv,$err)) }
# add attributes to the parent object, because we didn't remember names
# of its scrambled members
$part->attributes_add('U') if $encryptedcount || $skippedcount;
$part->attributes_add('C') if $encryptedcount;
my $errn = lstat("$tempdir/parts/arj") ? 0 : 0+$!;
if ($errn != ENOENT) {
my $b = flatten_and_tidy_dir("$tempdir/parts/arj",
"$tempdir/parts",$part);
consumed_bytes($b, 'do_unarj');
snmp_count("OpsDecBy\u${decompressor_name}");
}
proc_status_ok($rv,$err, 0,1,3) # one of: success, warn, CRC err
or die "unarj: can't extract archive members: ".
exit_status_str($rv,$err);
if ($encryptedcount || $skippedcount) {
do_log(1,
"do_unarj: %s, %d members are encrypted, %d skipped, archive retained",
$part->base_name, $encryptedcount, $skippedcount);
$retval = 2;
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_unarj'); # restart timer
unlink($fn.".arj") or die "Can't unlink $fn.arj: $!";
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
# if ($testing_for_sfx) { die "do_unarj: $eval_stat" }
# else { do_log(-1, "do_unarj: %s", $eval_stat) };
die "do_unarj: $eval_stat\n" # propagate failure
}
$retval;
}
# use external program to expand TNEF archives
#
sub do_tnef_ext($$$) {
my($part, $tempdir, $archiver) = @_;
do_log(4, "Extracting from TNEF encapsulation (ext) %s", $part->base_name);
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
mkdir("$tempdir/parts/tnef",0750)
or die "Can't mkdir $tempdir/parts/tnef: $!";
my $retval = 1; my($proc_fh,$pid);
prolong_timer('do_tnef_ext_pre'); # restart timer
my $rem_quota = max(10*1024, untaint(consumed_bytes(0,'do_tnef_ext')));
my $eval_stat;
eval {
($proc_fh,$pid) = run_command(undef, '&1', $archiver,
'--number-backups', '-x', "$rem_quota",
'-C', "$tempdir/parts/tnef", '-f', $part->full_name);
collect_results($proc_fh,$pid,$archiver,16384,[0]);
undef $proc_fh; undef $pid; 1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_tnef_ext'); # restart timer
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
do_log(-1, "tnef_ext: %s", $eval_stat);
}
my $b = flatten_and_tidy_dir("$tempdir/parts/tnef","$tempdir/parts",$part);
if ($b > 0) {
do_log(4, "tnef_ext extracted %d bytes from a tnef container", $b);
consumed_bytes($b, 'do_tnef_ext');
}
if (defined $eval_stat) { die "do_tnef_ext: $eval_stat\n" } # propagate
$retval;
}
# use Convert-TNEF
#
use vars qw($have_tnef_module);
sub do_tnef($$) {
my($part, $tempdir) = @_;
do_log(4, "Extracting from TNEF encapsulation (int) %s", $part->base_name);
if (!defined $have_tnef_module) {
eval {
require Convert::TNEF && ($have_tnef_module = 1);
} or do {
$have_tnef_module = 0;
chomp $@; $@ =~ s/ \(you may need to install the .*\z//i;
do_log(5,"module Convert::TNEF unavailable: %s", $@);
};
}
return 0 if !$have_tnef_module;
snmp_count('OpsDecByTnef');
my $tnef = Convert::TNEF->read_in($part->full_name,
{output_dir=>"$tempdir/parts", buffer_size=>16384, ignore_checksum=>1});
defined $tnef or die "Convert::TNEF failed: ".$Convert::TNEF::errstr;
my $item_num = 0; my $parent_placement = $part->mime_placement;
for my $a ($tnef->message, $tnef->attachments) {
for my $attr_name ('AttachData','Attachment') {
my $dh = $a->datahandle($attr_name);
if (defined $dh) {
my $newpart_obj = Amavis::Unpackers::Part->new("$tempdir/parts",$part);
$item_num++;
$newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared([$a->name, $a->longname]);
my $newpart = $newpart_obj->full_name;
my $outpart = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$outpart->open($newpart, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640)
or die "Can't create file $newpart: $!";
binmode($outpart) or die "Can't set file $newpart to binmode: $!";
my $filepath = $dh->path; my $size = 0;
if (defined $filepath) {
my($io,$nbytes,$buff); $dh->binmode(1);
$io = $dh->open("r") or die "Can't open MIME::Body handle: $!";
while (($nbytes=$io->read($buff,16384)) > 0) {
$outpart->print($buff) or die "Can't write to $newpart: $!";
$size += $nbytes; consumed_bytes($nbytes, 'do_tnef_1');
}
defined $nbytes or die "Error reading from MIME::Body handle: $!";
$io->close or die "Error closing MIME::Body handle: $!";
undef $buff; # release storage
} else {
my $buff = $dh->as_string; my $nbytes = length($buff);
$outpart->print($buff) or die "Can't write to $newpart: $!";
$size += $nbytes; consumed_bytes($nbytes, 'do_tnef_2');
}
$newpart_obj->size($size);
$outpart->close or die "Error closing $newpart: $!";
}
}
}
$tnef->purge if defined $tnef;
1;
}
# The pax and cpio utilities usually support the following archive formats:
# cpio, bcpio, sv4cpio, sv4crc, tar (old tar), ustar (POSIX.2 tar).
# The utilities from http://heirloom.sourceforge.net/ support
# several other tar/cpio variants such as SCO, Sun, DEC, Cray, SGI
#
sub do_pax_cpio($$$) {
my($part, $tempdir, $archiver) = @_;
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
ll(4) && do_log(4,"Expanding archive %s, using %s",
$part->base_name,$archiver_name);
my $is_pax = $archiver_name =~ /^cpio/i ? 0 : 1;
do_log(-1,"WARN: Using %s instead of pax can be a security ".
"risk; please add: \$pax='pax'; to amavisd.conf and check that ".
"the pax(1) utility is available on the system!",
$archiver_name) if !$is_pax;
my(@cmdargs) = $is_pax ? qw(-v) : qw(-i -t -v);
my($proc_fh,$pid) = run_command($part->full_name, '/dev/null',
$archiver, @cmdargs);
my $bytes = 0; local($1,$2); local($_); my $entries_cnt = 0;
for ($! = 0; defined($_=$proc_fh->getline); $! = 0) {
chomp;
next if /^\d+ blocks\z/;
last if /^(cpio|pax): (.*bytes read|End of archive volume)/;
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if (!/^ (?: \S+\s+ ){4} (\d+) \s+ (.+) \z/xs) {
do_log(-1,"do_pax_cpio: can't parse toc line: %s", $_);
} else {
my($size,$mem) = ($1,$2);
if ($mem =~ /^( (?: \s* \S+ ){3} (?: \s+ \d{4}, )? ) \s+ (.+)\z/xs) {
$mem = $2; # strip away time and date
} elsif ($mem =~ /^\S \s+ (.+)\z/xs) {
# -rwxr-xr-x 1 1121 users 3135 C errorReport.sh
$mem = $1; # strip away a letter in place of a date (?)
}
$mem = $1 if $is_pax && $mem =~ /^(.*) =[=>] (.*)\z/; # hard or soft link
do_log(5,'do_pax_cpio: size: %5s, member: "%s"', $size,$mem);
$bytes += $size if $size > 0;
}
}
defined $_ || $! == 0 || $! == EAGAIN or die "Error reading (1): $!";
do_log(-1,"unexpected(pax_cpio_1): %s",$!) if !defined($_) && $! == EAGAIN;
# consume remaining output to avoid broken pipe
collect_results($proc_fh,$pid,'do_pax_cpio/1',16384,[0]);
undef $proc_fh; undef $pid;
consumed_bytes($bytes, 'do_pax_cpio/pre', 1); # pre-check on estimated size
mkdir("$tempdir/parts/arch", 0750)
or die "Can't mkdir $tempdir/parts/arch: $!";
my $name_clash = 0;
my(%orig_names); # maps filenames to archive member names when possible
prolong_timer('do_pax_cpio_pre'); # restart timer
my $eval_stat;
eval {
chdir("$tempdir/parts/arch")
or die "Can't chdir to $tempdir/parts/arch: $!";
my(@cmdargs) = $is_pax ? qw(-r -k -p am -s /[^A-Za-z0-9_]/-/gp)
: qw(-i -d --no-absolute-filenames --no-preserve-owner);
($proc_fh,$pid) = run_command($part->full_name, '&1', $archiver, @cmdargs);
my $output = ''; my $ln; my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
chomp($ln);
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if (!$is_pax || $ln !~ /^(.*) >> (\S*)\z/) { $output .= $ln."\n" }
else { # parse output from pax -s///p
my($member_name,$file_name) = ($1,$2);
if (!exists $orig_names{$file_name}) {
$orig_names{$file_name} = $member_name;
} else {
do_log(0,'do_pax_cpio: member "%s" is hidden by a '.
'previous archive member "%s", file: %s',
$member_name, $orig_names{$file_name}, $file_name);
undef $orig_names{$file_name}; # cause it to exist but undefined
$name_clash = 1;
}
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading (2): $!";
do_log(-1,"unexpected(pax_cpio_2): %s",$!) if !defined($ln) && $! == EAGAIN;
my $err = 0; $proc_fh->close or $err = $!;
my $child_stat = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
undef $proc_fh; undef $pid; chomp($output);
proc_status_ok($child_stat,$err)
or die(exit_status_str($child_stat,$err).' '.$output);
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('do_pax_cpio'); # restart timer
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
my $b = flatten_and_tidy_dir("$tempdir/parts/arch", "$tempdir/parts",
$part, 0, \%orig_names);
consumed_bytes($b, 'do_pax_cpio');
if (defined $eval_stat) {
chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
die "do_pax_cpio: $eval_stat\n"; # propagate failure
}
$name_clash ? 2 : 1;
}
# command line unpacker from stuffit.com for Linux
# decodes Macintosh StuffIt archives and others
# (but it appears the Linux version is buggy and a security risk, not to use!)
#
sub do_unstuff($$$) {
my($part, $tempdir, $archiver) = @_;
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
do_log(4,"Expanding archive %s, using %s", $part->base_name,$archiver_name);
mkdir("$tempdir/parts/unstuff", 0750)
or die "Can't mkdir $tempdir/parts/unstuff: $!";
my($proc_fh,$pid) = run_command(undef, '&1', $archiver, # '-q',
"-d=$tempdir/parts/unstuff", $part->full_name);
collect_results($proc_fh,$pid,$archiver,16384,[0]);
undef $proc_fh; undef $pid;
my $b = flatten_and_tidy_dir("$tempdir/parts/unstuff",
"$tempdir/parts", $part);
consumed_bytes($b, 'do_unstuff');
1;
}
# ar is a standard Unix binary archiver, also used by Debian packages
#
sub do_ar($$$) {
my($part, $tempdir, $archiver) = @_;
ll(4) && do_log(4,"Expanding Unix ar archive %s", $part->full_name);
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
my($proc_fh,$pid) = run_command(undef, '/dev/null',
$archiver, 'tv', $part->full_name);
my $ln; my $bytes = 0; local($1,$2,$3); my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
chomp($ln);
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if ($ln !~ /^(?:\S+\s+){2}(\d+)\s+((?:\S+\s+){3}\S+)\s+(.*)\z/) {
do_log(-1,"do_ar: can't parse contents listing line: %s", $ln);
} else {
do_log(5,"do_ar: member: \"%s\", size: %s", $3,$1);
$bytes += $1 if $1 > 0;
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading: $!";
do_log(-1,"unexpected(do_ar): %s",$!) if !defined($ln) && $! == EAGAIN;
# consume remaining output to avoid broken pipe
collect_results($proc_fh,$pid,'ar-1',16384,[0]);
undef $proc_fh; undef $pid;
consumed_bytes($bytes, 'do_ar-pre', 1); # pre-check on estimated size
mkdir("$tempdir/parts/ar", 0750)
or die "Can't mkdir $tempdir/parts/ar: $!";
chdir("$tempdir/parts/ar") or die "Can't chdir to $tempdir/parts/ar: $!";
($proc_fh,$pid) = run_command(undef, '&1', $archiver, 'x', $part->full_name);
collect_results($proc_fh,$pid,'ar-2',16384,[0]);
undef $proc_fh; undef $pid;
chdir($tempdir) or die "Can't chdir to $tempdir: $!";
my $b = flatten_and_tidy_dir("$tempdir/parts/ar","$tempdir/parts",$part);
consumed_bytes($b, 'do_ar');
1;
}
sub do_cabextract($$$) {
my($part, $tempdir, $archiver) = @_;
do_log(4, "Expanding cab archive %s", $part->base_name);
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
my($proc_fh,$pid) =
run_command(undef, '/dev/null', $archiver, '-l', $part->full_name);
local($1,$2); my $bytes = 0; my $ln; my $entries_cnt = 0;
for ($! = 0; defined($ln=$proc_fh->getline); $! = 0) {
chomp($ln);
next if $ln =~ /^(?: ?File size|----|Viewing cabinet:|\z)/s;
next if $ln =~ /^\s*All done, no errors/s;
if ($entries_cnt++, $MAXFILES && $entries_cnt > $MAXFILES)
{ die "Maximum number of files ($MAXFILES) exceeded" }
if ($ln !~ /^\s* (\d+) \s* \| [^|]* \| \s (.*) \z/x) {
do_log(-1, "do_cabextract: can't parse toc line: %s", $ln);
} else {
do_log(5, 'do_cabextract: member: "%s", size: %s', $2,$1);
$bytes += $1 if $1 > 0;
}
}
defined $ln || $! == 0 || $! == EAGAIN or die "Error reading: $!";
do_log(-1,"unexpected(cabextract): %s",$!) if !defined($ln) && $! == EAGAIN;
# consume remaining output to avoid broken pipe (just in case)
collect_results($proc_fh,$pid,'cabextract-1',16384,[0]);
undef $proc_fh; undef $pid;
mkdir("$tempdir/parts/cab",0750) or die "Can't mkdir $tempdir/parts/cab: $!";
($proc_fh,$pid) = run_command(undef, '/dev/null', $archiver, '-q', '-d',
"$tempdir/parts/cab", $part->full_name);
collect_results($proc_fh,$pid,'cabextract-2',16384,[0]);
undef $proc_fh; undef $pid;
my $b = flatten_and_tidy_dir("$tempdir/parts/cab", "$tempdir/parts", $part);
consumed_bytes($b, 'do_cabextract');
1;
}
sub do_ole($$$) {
my($part, $tempdir, $archiver) = @_;
do_log(4,"Expanding MS OLE document %s", $part->base_name);
my $archiver_name = basename((split(' ',$archiver))[0]);
snmp_count("OpsDecBy\u${archiver_name}");
mkdir("$tempdir/parts/ole",0750) or die "Can't mkdir $tempdir/parts/ole: $!";
my($proc_fh,$pid) = run_command(undef, '&1', $archiver, '-v',
'-i', $part->full_name, '-d',"$tempdir/parts/ole");
# Not all Microsoft documents contain embedded objects, and we won't know
# until we look. The ripOLE program knows how to check if we do in fact
# have an OLE document; but it exits with code 102 if we don't. This isn't
# really an error, so we add "102" to the list of successful exit codes.
collect_results($proc_fh,$pid,$archiver,16384,[0,102]);
undef $proc_fh; undef $pid;
my $b = flatten_and_tidy_dir("$tempdir/parts/ole", "$tempdir/parts", $part);
if ($b > 0) {
do_log(4, "ripOLE extracted %d bytes from an OLE document", $b);
consumed_bytes($b, 'do_ole');
}
2; # always keep the original OLE document
}
# Check for self-extracting archives. Note that we do not depend on
# file magic here since it's not reliable. Instead we will try each
# archiver.
#
sub do_executable($$@) {
my($part, $tempdir, $unrar, $lha, $unarj) = @_;
ll(4) && do_log(4,"Check whether %s is a self-extracting archive",
$part->base_name);
# # ZIP?
# return 2 if eval { do_unzip($part,$tempdir,undef,1) };
# chomp $@;
# do_log(3, "do_executable: not a ZIP sfx, ignoring: %s", $@) if $@ ne '';
# RAR?
return 2 if defined $unrar && eval { do_unrar($part,$tempdir,$unrar,1) };
chomp $@;
do_log(3, "do_executable: not a RAR sfx, ignoring: %s", $@) if $@ ne '';
# # LHA? not safe, tends to crash
# return 2 if defined $lha && eval { do_lha($part,$tempdir,$lha,1) };
# chomp $@;
# do_log(3, "do_executable: not an LHA sfx, ignoring: %s", $@) if $@ ne '';
# ARJ?
return 2 if defined $unarj && eval { do_unarj($part,$tempdir,$unarj,1) };
chomp $@;
do_log(3, "do_executable: not an ARJ sfx, ignoring: %s", $@) if $@ ne '';
0;
}
# my($k,$v,$fn);
# while (($k,$v) = each(%::)) {
# local(*e)=$v; $fn=fileno(\*e);
# printf STDOUT ("%-10s %-10s %s\n",$k,$v,$fn) if defined $fn;
# }
# Given a file handle (typically opened pipe to a subprocess, as returned
# by run_command), copy from it to a specified output file in binary mode.
#
sub run_command_copy($$$) {
my($outfile, $ifh, $pid) = @_;
my $ofh = IO::File->new;
# O_WRONLY etc. can become tainted in Perl5.8.9 [perlbug #62502]
$ofh->open($outfile, untaint(O_CREAT|O_EXCL|O_WRONLY), 0640) # calls sysopen
or die "Can't create file $outfile: $!";
binmode($ofh) or die "Can't set file $outfile to binmode: $!";
binmode($ifh) or die "Can't set binmode on pipe: $!";
my($eval_stat, $rv, $rerr); $rerr = 0;
eval {
my($nread, $nwrite, $tosend, $offset, $inbuf);
for (;;) {
$nread = sysread($ifh, $inbuf, 65536);
if (!defined($nread)) {
if ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # just in case
} else {
die "Error reading: $!";
}
} elsif ($nread < 1) { # sysread returns 0 at eof
last;
} else {
consumed_bytes($nread, 'run_command_copy');
$tosend = $nread; $offset = 0;
while ($tosend > 0) { # handle partial writes
$nwrite = syswrite($ofh, $inbuf, $tosend, $offset);
if (!defined($nwrite)) {
if ($! == EAGAIN || $! == EINTR) {
Time::HiRes::sleep(0.1); # just in case
} else {
die "Error writing to $outfile: $!";
}
} elsif ($nwrite < 1) {
Time::HiRes::sleep(0.1); # just in case
} else {
$tosend -= $nwrite; $offset += $nwrite;
}
}
}
}
$ifh->close or $rerr = $!;
$rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
$ofh->close or die "Error closing $outfile: $!";
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
# remember error, close socket ignoring status
$rerr = $!; $ifh->close;
$rv = defined $pid && waitpid($pid,0) > 0 ? $? : undef;
do_log(-1, "run_command_copy: %s", $eval_stat);
$ofh->close or do_log(-1, "Error closing %s: %s", $outfile,$!);
};
if (defined $eval_stat) { die "run_ccpy: $eval_stat\n" } # propagate failure
($rv,$rerr); # return subprocess termination status and reading/close errno
}
# extract listed files from archive and store each in a new file
#
sub store_mgr($$$@) {
my($tempdir, $parent_obj, $list, $archiver, @args) = @_;
my $item_num = 0; my $parent_placement = $parent_obj->mime_placement;
my $retval = 0; my($proc_fh,$pid);
prolong_timer('store_mgr_pre'); # restart timer
my $eval_stat;
eval {
for my $f (@$list) {
next if $f =~ m{/\z}; # ignore directories
my $newpart_obj =
Amavis::Unpackers::Part->new("$tempdir/parts",$parent_obj);
$item_num++; $newpart_obj->mime_placement("$parent_placement/$item_num");
$newpart_obj->name_declared($f); # store tainted name
my $newpart = $newpart_obj->full_name;
ll(5) && do_log(5,'store_mgr: extracting "%s" to file %s using %s',
$f, $newpart, $archiver);
if ($f =~ m{^\.?[A-Za-z0-9_][A-Za-z0-9/._=~-]*\z}) { #presumably safe arg
} else { # this is not too bad, as run_command does not use shell
do_log(1, 'store_mgr: NOTICE: suspicious file name "%s"', $f);
}
($proc_fh,$pid) = run_command(undef, '/dev/null',
$archiver, @args, untaint($f));
my($rv,$err) = run_command_copy($newpart,$proc_fh,$pid); # may die
my $ll = proc_status_ok($rv,$err) ? 5 : 1;
ll($ll) && do_log($ll,"store_mgr: extracted by %s, %s",
$archiver, exit_status_str($rv,$err));
$retval = $rv if $retval == 0 && $rv != 0;
}
1;
} or do { $eval_stat = $@ ne '' ? $@ : "errno=$!" };
prolong_timer('store_mgr'); # restart timer
if (defined $eval_stat) {
$retval = 0; chomp $eval_stat;
kill_proc($pid,$archiver,1,$proc_fh,$eval_stat) if defined $pid;
undef $proc_fh; undef $pid;
die "store_mgr: $eval_stat\n"; # propagate failure
}
$retval; # return the first nonzero status (if any), or 0
}
1;
__DATA__
#
package Amavis::DKIM::CustomSigner;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
sub new {
my($class,%params) = @_;
bless { %params }, $class;
}
sub sign_digest {
my($self_key, $digest_alg_name, $digest) = @_;
my $code = $self_key->{CustomSigner};
&$code($digest_alg_name, $digest, %$self_key);
}
1;
package Amavis::DKIM;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&dkim_key_postprocess &generate_authentication_results
&dkim_make_signatures &adjust_score_by_signer_reputation
&collect_some_dkim_info);
import Amavis::Conf qw(:platform c cr ca $myproduct_name
%dkim_signing_keys_by_domain
@dkim_signing_keys_list @dkim_signing_keys_storage);
import Amavis::Util qw(min max minmax untaint ll do_log unique_list
format_time_interval get_deadline
idn_to_ascii mail_addr_idn_to_ascii idn_to_utf8
safe_encode_utf8 proto_encode proto_decode);
import Amavis::rfc2821_2822_Tools qw(split_address quote_rfc2821_local
qquote_rfc2821_local);
import Amavis::Timing qw(section_time);
import Amavis::Lookup qw(lookup lookup2);
}
use subs @EXPORT_OK;
use IO::File ();
use Crypt::OpenSSL::RSA ();
use MIME::Base64;
use Net::DNS::Resolver;
use Mail::DKIM::Verifier 0.31;
use Mail::DKIM::Signer 0.31;
use Mail::DKIM::TextWrap;
use Mail::DKIM::Signature;
use Mail::DKIM::DkSignature;
# Convert private keys (as strings in PEM format) into RSA objects
# and do some pre-processing on @dkim_signing_keys_list entries
# (may run unprivileged)
#
sub dkim_key_postprocess() {
# convert private keys (as strings in PEM format) into RSA objects
for my $ks (@dkim_signing_keys_storage) {
my($pkcs1,$dev,$inode,$fname) = @$ks;
if (ref $pkcs1 && UNIVERSAL::isa($pkcs1,'Crypt::OpenSSL::RSA')) {
# it is already a Crypt::OpenSSL::RSA object
} else {
# assume a string is a private key in PEM format, convert it to RSA obj
$ks->[0] = $pkcs1 = Crypt::OpenSSL::RSA->new_private_key($pkcs1);
}
my $key_size = 8 * $pkcs1->size;
my $minimum_key_bits = c('dkim_minimum_key_bits');
if ($key_size < 1024) {
do_log(0,"NOTE: DKIM %d-bit signing key is shorter than ".
"a recommended RFC 6376 minimum of %d bits, file: %s",
$key_size, 1024, $fname);
} elsif ($minimum_key_bits && $key_size < $minimum_key_bits) {
do_log(0,"INFO: DKIM %d-bit signing key is shorter than ".
"a configured \$dkim_minimum_key_bits of %d bits, file: %s",
$key_size, $minimum_key_bits, $fname);
}
}
for my $ent (@dkim_signing_keys_list) {
my $domain = $ent->{domain};
$dkim_signing_keys_by_domain{$domain} = []
if !$dkim_signing_keys_by_domain{$domain};
}
my $any_wild; my $j = 0;
for my $ent (@dkim_signing_keys_list) {
$ent->{v} = 'DKIM1' if !defined $ent->{v}; # provide a default
if (defined $ent->{n}) { # encode n as qp-section (RFC 6376, RFC 2047)
$ent->{n} =~ s{([\000-\037\177=;"])}{sprintf('=%02X',ord($1))}gse;
}
my $domain = $ent->{domain};
if (exists $ent->{g}) {
do_log(0,"INFO: the 'g' tag is historic (RFC 6376), signers are ".
"advised not to include a 'g' tag in key records: ".
"s=%s d=%s g=%s", $ent->{selector}, $domain, $ent->{g});
}
if (ref($domain) eq 'Regexp') {
$ent->{domain_re} = $domain;
$any_wild = sprintf("key#%d, %s", $j+1, $domain) if !defined $any_wild;
} elsif ($domain =~ /\*/) {
# wildcarded signing domain in a key declaration, evil, asks for trouble!
# support wildcards in signing domain for compatibility with dkim_milter
my $regexp = $domain;
$regexp =~ s/\*{2,}/*/gs; # collapse successive wildcards
# '*' is a wildcard, quote the rest
$regexp =~ s{ ([@\#/.^\$|*+?(){}\[\]\\]) }
{ $1 eq '*' ? '.*' : '\\'.$1 }xgse;
$regexp = '^' . $regexp . '\\z'; # implicit anchors
$regexp =~ s/^\^\.\*//s; # remove leading anchor if redundant
$regexp =~ s/\.\*\\z\z//s; # remove trailing anchor if redundant
$regexp = '(?:)' if $regexp eq ''; # just in case, non-empty regexp
# presence of {'domain_re'} entry lets get_dkim_key use this regexp
# instead of a direct string comparison with {'domain'}
$ent->{domain_re} = qr{$regexp}; # compiled regexp object
$any_wild = sprintf("key#%d, %s", $j+1, $domain) if !defined $any_wild;
}
# %dkim_signing_keys_by_domain entries contain lists of indices into
# the @dkim_signing_keys_list of all potentially applicable signing keys.
# This hash (keyed by domain name) avoids linear searching for signing
# keys for all fully-specified domains in @dkim_signing_keys_list.
# Wildcarded entries must still be looked up sequentially at run-time
# to preserve the declared order and the 'first match wins' paradigm.
# Such entries are only supported for compatibility with dkim_milter
# and are evil because amavisd has no quick way of verifying that DNS RR
# really exists, so signatures generated by amavisd can fail when not all
# possible DNS resource records exist for wildcarded signing domains.
#
if (!defined($ent->{domain_re})) { # no regexp, just plain match on domain
push(@{$dkim_signing_keys_by_domain{$domain}}, $j);
} else { # a wildcard in a signing domain, compatibility with dkim_milter
# wildcarded signing domain potentially matches any _by_domain entry
for my $d (keys %dkim_signing_keys_by_domain) {
push(@{$dkim_signing_keys_by_domain{$d}}, $j);
}
# the '*' entry collects only wildcarded signing keys
$dkim_signing_keys_by_domain{'*'} = []
if !$dkim_signing_keys_by_domain{'*'};
push(@{$dkim_signing_keys_by_domain{'*'}}, $j);
}
$j++;
}
do_log(0,"dkim: wildcard in signing domain (%s), may produce unverifiable ".
"signatures with no published public key, avoid!", $any_wild)
if $any_wild;
}
# Fetch a private DKIM signing key for a given signing domain, with its
# resource-record (RR) constraints compatible with proposed signature options.
# The first such key is returned as a hash; if no key is found an empty hash
# is returned. When a selector (s) is given it must match the selector of
# a key; when algorithm (a) is given, the key type and a hash algorithm must
# match the desired use too; the service type (s) must be 'email' or '*';
# when identity (i) is given it must match the granularity (g) of a key.
# RFC 6376: the "g=" tag has been deprecated in this version of the DKIM
# specification (and thus MUST now be ignored), signers are advised not to
# include the "g=" tag in key records.
#
# sign.opts. key options
# ---------- -----------
# d => domain
# s => selector
# a => k, h(list)
# i => g, t=s
#
sub get_dkim_key(@) {
@_ % 2 == 0 or die "get_dkim_key: a list of pairs is expected as query opts";
my(%options) = @_; # signature options (v, a, c, d, h, i, l, q, s, t, x, z),
# of which d is required, while s, a and t are optional but taken into
# account in searching for a compatible key - the rest are ignored
my(%key_options);
my $domain = $options{d}; my $selector = $options{s};
defined $domain && $domain ne ''
or die "get_dkim_key: domain is required, but tag 'd' is missing";
$domain = idn_to_ascii($domain);
$selector = idn_to_ascii($selector) if defined $selector;
my(@indices) = $dkim_signing_keys_by_domain{$domain} ?
@{$dkim_signing_keys_by_domain{$domain}} :
$dkim_signing_keys_by_domain{'*'} ?
@{$dkim_signing_keys_by_domain{'*'}} : ();
if (@indices) {
$selector = $selector eq '' ? undef : lc($selector) if defined $selector;
local($1,$2);
my($keytype,$hashalg) =
defined $options{a} && $options{a} =~ /^([a-z0-9]+)-(.*)\z/is ? ($1,$2)
: ('rsa',undef);
my($identity_localpart,$identity_domain) =
!defined($options{i}) ? () : split_address($options{i});
$identity_localpart = '' if !defined $identity_localpart;
$identity_domain = '' if !defined $identity_domain;
$identity_domain =
idn_to_ascii($identity_domain) if $identity_domain ne '';
# find the first key (associated with a domain) with compatible options
for my $j (@indices) {
my $ent = $dkim_signing_keys_list[$j];
next unless defined $ent->{domain_re} ? $domain =~ $ent->{domain_re}
: $domain eq $ent->{domain};
next if defined $selector && $ent->{selector} ne $selector;
next if $keytype ne (exists $ent->{k} ? $ent->{k} : 'rsa');
next if exists $ent->{s} &&
!(grep($_ eq '*' || $_ eq 'email', split(/:/, $ent->{s})) );
next if defined $hashalg && exists $ent->{'h'} &&
!(grep($_ eq $hashalg, split(/:/, $ent->{'h'})) );
if (defined($options{i})) {
if ($identity_domain eq $domain) {
# ok
} elsif (exists $ent->{t} && (grep($_ eq 's', split(/:/,$ent->{t})))) {
next; # no subdomains allowed
}
# the 'g' tag is now historic, RFC 6376
if (!exists($ent->{g}) || $ent->{g} eq '*') {
# ok
} elsif ($ent->{g} =~ /^ ([^*]*) \* (.*) \z/xs) {
next if $identity_localpart !~ /^ \Q$1\E .* \Q$2\E \z/xs;
} else {
next if $identity_localpart ne $ent->{g};
}
}
%key_options = %$ent; last; # found a suitable match
}
}
if (defined $key_options{key_storage_ind}) {
# obtain actual key from @dkim_signing_keys_storage
($key_options{key}) =
@{$dkim_signing_keys_storage[$key_options{key_storage_ind}]};
}
%key_options;
}
# send a query to a signing service, collect its response and parse it;
# the protocol is much like the AM.PDP protocol, except that attributes
# are different
#
sub query_signing_service($$) {
my($server, $query) = @_;
my($remaining_time, $deadline) = get_deadline('query_signing_service');
my $sock = Amavis::IO::RW->new($server, Eol => "\015\012", Timeout => 10);
$sock or die "Error connecting to a signing server $server: $!";
my $req_id = sprintf("%08x", rand(0x7fffffff));
my $req_id_attr = proto_encode('request_id', $req_id);
$sock->print(join('', map($_."\015\012", (@$query, $req_id_attr, ''))))
or die "Error sending a query to a signing server";
ll(5) && do_log(5, "dkim: query_signing_service, query: %s",
join('; ', @$query, $req_id_attr));
$sock->flush or die "Error flushing signing server session";
# collect a reply
$sock->timeout(max(2, $deadline - Time::HiRes::time));
my(%attr,$ln); local($1,$2);
while (defined($ln = $sock->get_response_line)) {
last if $ln eq "\015\012"; # end of a response block
if ($ln =~ /^ ([^=\000\012]*?) = ([^\012]*?) \015\012 \z/xsi) {
$attr{proto_decode($1)} = proto_decode($2);
}
}
$sock->close or die "Error closing session to a signing server $server: $!";
ll(5) && do_log(5, "dkim: query_signing_service, got: %s",
join('; ', map($_.'='.$attr{$_}, keys %attr)));
$attr{request_id} eq $req_id
or die "Answer id '$attr{request_id}' from $server ".
"does not match the query id '$req_id'";
\%attr;
}
# send candidate originator addresses and signature options to a signing
# service and let it choose a selector 's' and a domain 'd', thus uniquely
# identifying a signing key
#
sub let_signing_service_choose($$$$) {
my($server, $msginfo, $sender_search_list_ref, $sig_opt_prelim) = @_;
my(@query) = (
proto_encode('request', 'choose_key'),
proto_encode('log_id', $msginfo->log_id),
);
# provide some additional information potentially useful in decision-making
if ($sig_opt_prelim) {
for my $opt (sort keys %$sig_opt_prelim) {
push(@query, proto_encode('sig.'.$opt, $sig_opt_prelim->{$opt}));
}
}
push(@query, proto_encode('sender', $msginfo->sender_smtp));
for my $r (@{$msginfo->per_recip_data}) {
push(@query, proto_encode('recip', $r->recip_addr_smtp));
}
for my $pair (!$sender_search_list_ref ? () : @$sender_search_list_ref) {
my($addr,$addr_src) = @$pair;
push(@query, proto_encode('candidate', $addr_src,
qquote_rfc2821_local($addr)));
}
my $attr;
eval {
$attr = query_signing_service($server,\@query); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(0, "query_signing_service failed: %s", $eval_stat);
};
my(%sig_options, $chosen_addr_src, $chosen_addr);
if ($attr) {
for my $opt (keys %$attr) {
if ($opt =~ /^sig\.(.+)\z/) {
$sig_options{$1} = $attr->{$opt} if !exists($sig_options{$1});
}
}
if (defined $attr->{chosen_candidate}) {
($chosen_addr_src, $chosen_addr) =
split(' ', $attr->{chosen_candidate}, 2);
}
}
(!$attr ? undef : \%sig_options, $chosen_addr_src, $chosen_addr);
}
# a CustomSigner callback routine passed to Mail::DKIM in place of a key;
# the routine will be called by Mail::DKIM::Algorithm::*rsa_sha* routines
# instead of calling their own Mail::DKIM::PrivateKey::sign_digest()
#
sub remote_signer {
my($digest_alg_name, $digest, %args) = @_;
# $digest: header digest (binary), ready for signing,
# e.g. $algorithm->{header_digest}->digest
my $server = $args{Server}; # our own info passed back to us
my $msginfo = $args{MsgInfo}; # our own info passed back to us
my(@query) = (
proto_encode('request', 'sign'),
proto_encode('digest_alg', $digest_alg_name),
proto_encode('digest', encode_base64($digest,'')),
proto_encode('s', $args{Selector}),
proto_encode('d', $args{Domain}),
proto_encode('log_id', $msginfo->log_id),
);
my($attr, $b, $reason);
eval {
$attr = query_signing_service($server, \@query); 1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$reason = $eval_stat;
};
if ($attr) { $b = $attr->{b}; $reason = $attr->{reason} }
if (!defined($b) || $b eq '') {
$reason = 'no signature from a signing server' if !defined $reason;
# die "Can't sign, $reason, query: " . join('; ',@query) . "\n";
do_log(0, "dkim: can't sign, %s, query: %s", $reason, join('; ',@query));
return ''; # Mail::DKIM::Algorithm::rsa_sha256 doesn't like undef
}
decode_base64($b); # resulting signature
}
# prepare requested DKIM signatures for a provided message,
# returning them as a list of Mail::DKIM::Signature objects
#
sub dkim_make_signatures($$;$) {
my($msginfo,$initial_submission,$callback) = @_;
my(@signatures); # resulting signature objects
my(%sig_options); # signature options and constraints for choosing a key
my(%key_options); # options associated with a signing key, IDN as ACE
my(@tried_domains); # used for logging a failure
my($chosen_addr,$chosen_addr_src); my $do_sign = 0;
my $fm = $msginfo->rfc2822_from; # authors
my(@rfc2822_from) = !defined($fm) ? () : ref $fm ? @$fm : $fm;
my $allowed_hdrs = cr('allowed_added_header_fields');
my $from_str = join(', ', qquote_rfc2821_local(@rfc2822_from)); # logging
substr($from_str,100) = '[...]' if length($from_str) > 100;
if (!$allowed_hdrs || !$allowed_hdrs->{lc('DKIM-Signature')}) {
do_log(5, "dkim: inserting a DKIM-Signature header field disabled");
} elsif (!$msginfo->originating) {
do_log(5, "dkim: not signing mail which is not originating from our site");
} elsif ($msginfo->is_in_contents_category(CC_VIRUS)) {
do_log(2, "dkim: not signing infected mail (from inside), From: %s",
$from_str);
} elsif ($msginfo->is_in_contents_category(CC_SPAM)) {
# it is prudent not to sign outgoing spam, otherwise an attacker may be
# able to replay a signed message, re-sending it to other recipients
# in bulk directly from botnets
do_log(2, "dkim: not signing spam (from inside), From: %s", $from_str);
} elsif ($msginfo->is_in_contents_category(CC_SPAMMY)) {
do_log(2, "dkim: not signing suspected spam (from inside), From: %s",
$from_str);
} else {
# Choose a signing key based on the first match on the following
# addresses (in this order): 2822.From, followed by 2822.Resent-From and
# 2822.Resent-Sender address pairs traversed top-down by resent blocks,
# followed by 2822.Sender and 2821.mail_from. We choose to look up
# a From first, as it generates an author domain signature, but the
# search order on remaining entries is admittedly unusual.
# Btw, dkim-milter uses the following search order:
# Resent-Sender, Resent-From, Sender, From.
# Only a signature based on 2822.From is considered an author domain
# signature, others are just third-party signatures and have no more
# merit than any other third-party signature according to RFC 6376.
#
my $rf = $msginfo->rfc2822_resent_from;
my $rs = $msginfo->rfc2822_resent_sender;
my(@rfc2822_resent_from, @rfc2822_resent_sender);
@rfc2822_resent_from = @$rf if defined $rf;
@rfc2822_resent_sender = @$rs if defined $rs;
my(@search_list); # collects candidate addresses for choosing a signing key
# author addresses go first (typically exactly one, but possibly more)
push(@search_list, map([$_,'From'], @rfc2822_from));
# merge Resent-From and Resent-Sender addresses by resent blocks, top-down;
# a merge is simplified by the fact that there is an equal number of
# resent blocks in @rfc2822_resent_from and @rfc2822_resent_sender lists
while (@rfc2822_resent_from || @rfc2822_resent_sender) {
# for each resent block
while (@rfc2822_resent_from) {
my $addr = shift(@rfc2822_resent_from);
last if !defined $addr; # undef delimits resent blocks
push(@search_list, [$addr, 'Resent-From']);
}
while (@rfc2822_resent_sender) {
my $addr = shift(@rfc2822_resent_sender);
last if !defined $addr; # undef delimits resent blocks
push(@search_list, [$addr, 'Resent-Sender']);
}
}
push(@search_list, [$msginfo->rfc2822_sender, 'Sender']);
push(@search_list, [$msginfo->sender, 'mail_from']);
{ # remove duplicates and empty addresses
my(%addr_seen);
@search_list =
grep { my($a,$src) = @$_; defined $a && $a ne '' && !$addr_seen{$a}++ }
@search_list;
}
ll(2) && do_log(2, "dkim: candidate originators: %s",
join(", ", map($_->[1].':'.qquote_rfc2821_local($_->[0]),
@search_list)));
# dkim_signwith_sd() may provide a ref to a pair [selector,domain] - if
# available (e.g. by a custom hook), it will force signing with a private
# key associated with this selector and domain, otherwise we fall back
# to consulting an external service if available, or else we use our
# built-in algorithm for choosing a selector & domain and their associated
# signing key
#
my $sd_pair = $msginfo->dkim_signwith_sd;
if (ref($sd_pair) eq 'ARRAY') {
my($s,$d) = @$sd_pair;
if (defined $s && $s ne '' && defined $d && $d ne '') {
do_log(5, "dkim: dkim_signwith_sd presets d=%s, s=%s", $d,$s);
$sig_options{s} = $s; $sig_options{d} = $d;
}
}
my $dkim_signing_service = c('dkim_signing_service');
if (defined $dkim_signing_service && $dkim_signing_service ne '') {
# try the signing service: it should provide an 's' and 'd' if it has
# a suitable signing key available, and/or may supply signing options,
# overriding the defaults set so far
my $sig_opt_ref;
($sig_opt_ref, $chosen_addr_src, $chosen_addr) =
let_signing_service_choose($dkim_signing_service,
$msginfo, \@search_list, undef);
if ($sig_opt_ref) { # merge returned signature options with ours
while (my($k,$v) = each(%$sig_opt_ref)) {
$sig_options{$k} = $v if defined $v;
}
}
}
my $sobm = ca('dkim_signature_options_bysender_maps');
# last resort: fall back to our local configuration settings
for my $pair (@search_list) {
my($addr,$addr_src) = @$pair;
my($addr_localpart,$addr_domain) = split_address($addr);
# fetch a list of hashes from all entries matching the address
my($dkim_options_ref,$mk_ref);
($dkim_options_ref,$mk_ref) = lookup2(1,$addr,$sobm) if $sobm && @$sobm;
$dkim_options_ref = [] if !defined $dkim_options_ref;
# signature options (parenthesized options are set automatically;
# the RFC 6651 (failure reporting) added a tag: r=y) :
# (v), a, (b), (bh), c, d, (h), i, (l), q, r, s, (t), x, (z)
# place a catchall default at the end of the list of options;
push(@$dkim_options_ref, { c => 'relaxed/simple', a => 'rsa-sha256' });
# start each iteration with the same set of options collected so far
my(%tmp_sig_options) = %sig_options;
# traverse list of hashes from specific to general, first match wins
for my $opts_hash_ref (@$dkim_options_ref) {
next if ref $opts_hash_ref ne 'HASH'; # just in case
while (my($k,$v) = each(%$opts_hash_ref)) { # for each entry in a hash
$tmp_sig_options{$k} = $v if !exists $tmp_sig_options{$k};
}
}
# a default for a signing domain is a domain of each tried address
if (!exists($tmp_sig_options{d})) {
my $d = $addr_domain; $d =~ s/^\@//; $tmp_sig_options{d} = $d;
}
push(@tried_domains, $tmp_sig_options{d});
ll(5) && do_log(5, "dkim: signature options for %s(%s): %s",
$addr, $addr_src,
join('; ', map($_.'='.$tmp_sig_options{$_},
keys %tmp_sig_options)));
# find a private key associated with a signing domain and selector,
# and meeting constraints
%key_options = get_dkim_key(%tmp_sig_options)
if defined $tmp_sig_options{d} && $tmp_sig_options{d} ne '';
# my(@domain_path); # host.sub.example.com sub.example.com example.com com
# $addr_domain =~ s/^\@//; $addr_domain =~ s/\.\z//;
# if ($addr_domain !~ /\[/) { # don't split address literals
# for (my $d=$addr_domain; $d ne ''; $d =~ s/^[^.]*(?:\.|\z)//s)
# { push(@domain_path,$d) }
# }
# for my $d (@domain_path) {
# $tmp_sig_options{d} = $d;
# %key_options = get_dkim_key(%tmp_sig_options);
# last if defined $key_options{key};
# }
my $key = $key_options{key};
if (defined $key && $key ne '') { # found; copy the key and its options
$tmp_sig_options{key} = $key;
$tmp_sig_options{s} = idn_to_utf8($key_options{selector});
$chosen_addr = $addr; $chosen_addr_src = $addr_src;
# merge the just collected signature options into the final set
while (my($k,$v) = each(%tmp_sig_options)) {
$sig_options{$k} = $v if defined $v;
}
last;
}
}
# provide defaults for 'c' and 'a' tags if missing
$sig_options{c} = 'relaxed/simple' if !exists $sig_options{c};
$sig_options{a} = 'rsa-sha256' if !exists $sig_options{a};
# prepare for a second stage of using an external signing service:
# when we do have a 's' and 'd', thus uniquely identifying a signing key,
# but do not have a key ourselves, we'll provide a callback routine
# in place of a key object so that Mail::DKIM will call it at the time
# of signing, and our routine will consult a remote signing service
#
if (!defined $sig_options{key} &&
defined $dkim_signing_service && $dkim_signing_service ne '' &&
defined $sig_options{d} && $sig_options{d} ne '' &&
defined $sig_options{s} && $sig_options{s} ne '') {
my $s = $sig_options{s}; my $d = $sig_options{d};
# let Mail::DKIM use our custom code for signing (pref. 0.38 or later)
$key_options{key} = Amavis::DKIM::CustomSigner->new(
CustomSigner => \&remote_signer, MsgInfo => $msginfo,
Selector => idn_to_ascii($s),
Domain => idn_to_ascii($d),
Server => $dkim_signing_service);
$key_options{selector} = $s; $key_options{domain} = $d;
$sig_options{key} = $key_options{key};
}
my $sig_opt_d_ace = idn_to_ascii($sig_options{d});
if (!defined $sig_opt_d_ace || $sig_opt_d_ace eq '') {
do_log(2, "dkim: not signing, empty signing domain, From: %s",$from_str);
} elsif (!defined $sig_options{key} || $sig_options{key} eq '') {
do_log(2, "dkim: not signing, no applicable private key for domains %s,".
" s=%s, From: %s",
join(", ",@tried_domains), $sig_options{s}, $from_str);
} else {
# copy key's options to signature options for convenience
for (keys %key_options) {
$sig_options{'KEY.'.$_} = $key_options{$_} if /^[ghknst]\z/;
}
$sig_options{'KEY.key_ind'} = $key_options{key_ind};
# check matching of identity to a signing domain or provide a default;
# presence of a t=s flag in a public key RR prohibits subdomains in i
my $key_allows_subdomains =
grep($_ eq 's', split(/:/,$sig_options{'KEY.t'})) ? 0 : 1;
if (defined $sig_options{i}) { # explicitly given, possibly empty
# have mercy: provide a leading '@' if missing
$sig_options{i} = '@'.$sig_options{i} if $sig_options{i} ne '' &&
$sig_options{i} !~ /\@/;
} elsif (!$key_allows_subdomains) {
# we have no other choice but to keep it at its default @d
} else { # the public key record permits subdomains
# provide default for i in a form of a sender's domain
local($1);
if ($chosen_addr =~ /\@([^\@]*)\z/) {
my $identity_domain = $1;
if (idn_to_ascii($identity_domain) =~ /.\.\Q$sig_opt_d_ace\E\z/s) {
$sig_options{i} = '@'.$identity_domain;
do_log(5, "dkim: identity defaults to %s", $sig_options{i});
}
}
}
if (!defined $sig_options{i} || $sig_options{i} eq '') {
$do_sign = 1; # just sign, don't bother with i
} else { # check if the requested i is compatible with d
local($1);
my $identity_domain = $sig_options{i} =~ /\@([^\@]*)\z/ ? $1 : '';
my $identity_domain_ace = idn_to_ascii($identity_domain);
if (!$key_allows_subdomains && $identity_domain_ace ne $sig_opt_d_ace){
do_log(2, "dkim: not signing, identity domain %s not the same as ".
"a signing domain %s, flags t=%s, From: %s",
$sig_options{i}, $sig_options{d}, $sig_options{'KEY.t'},
$from_str);
} elsif ($key_allows_subdomains &&
$identity_domain_ace !~ /(?:^|\.)\Q$sig_opt_d_ace\E\z/i) {
do_log(2, "dkim: not signing, identity %s not a subdomain of %s, ".
"From: %s", $sig_options{i}, $sig_options{d}, $from_str);
} else {
$do_sign = 1;
}
}
}
}
my $sig_opt_d_ace = idn_to_ascii($sig_options{d});
if ($do_sign) { # avoid adding same signature on multiple passes through MTA
my $sigs_ref = $msginfo->dkim_signatures_valid;
if ($sigs_ref) {
for my $sig (@$sigs_ref) {
if ( idn_to_ascii($sig->domain) eq $sig_opt_d_ace &&
(!defined $sig_options{i} || $sig_options{i} eq $sig->identity)) {
do_log(2, "dkim: not signing, already signed by domain %s, ".
"From: %s", $sig_opt_d_ace, $from_str);
$do_sign = 0;
}
}
}
}
if ($do_sign) {
# relative expiration time
if (defined $sig_options{ttl} && $sig_options{ttl} > 0) {
my $xt = $msginfo->rx_time + $sig_options{ttl};
$sig_options{x} = int($xt) + ($xt > int($xt) ? 1 : 0); # ceiling
}
# remove redundant options with RFC 6376 -default values
for my $k (keys %sig_options) { delete $sig_options{$k} if !defined $k }
delete $sig_options{i} if $sig_options{i} =~ /^\@/ &&
idn_to_ascii($sig_options{i}) eq '@'.$sig_opt_d_ace;
delete $sig_options{c} if $sig_options{c} eq 'simple/simple' ||
$sig_options{c} eq 'simple';
delete $sig_options{q} if $sig_options{q} eq 'dns/txt';
if (ref $callback eq 'CODE') { &$callback($msginfo,\%sig_options) }
if (ll(2)) {
my $opts = join(', ',map($_ eq 'key' ? ()
: ($_ . '=>' . safe_encode_utf8($sig_options{$_})),
sort keys %sig_options));
do_log(2,"dkim: signing (%s), From: %s (%s:%s), %s",
grep(/\@\Q$sig_opt_d_ace\E\z/si,
map(mail_addr_idn_to_ascii($_), @rfc2822_from))
? 'author' : '3rd-party',
$from_str, $chosen_addr_src, qquote_rfc2821_local($chosen_addr),
$opts);
}
my $key = $sig_options{key};
if (UNIVERSAL::isa($key,'Crypt::OpenSSL::RSA')) {
# my $pkcs1 = $key->get_private_key_string; # most compact
# $pkcs1 =~ s/^---.*?---(?:\r?\n|\z)//gm; $pkcs1 =~ tr/\r\n//d;
# $key = Mail::DKIM::PrivateKey->load(Data => $pkcs1);
$key = Mail::DKIM::PrivateKey->load(Cork => $key); # avail since 0.31
} elsif (ref $key) {
# already a Mail::DKIM::PrivateKey or Amavis::DKIM::CustomSigner object
} else {
$key = Mail::DKIM::PrivateKey->load(File => $key); # read from a file
}
# Sendmail milter interface does not provide a just-generated Received
# header field to milters. Milters therefore need to fabricate a pseudo
# Received header field in order to provide client IP address to a filter.
# Unfortunately it is not possible to reliably fabricate a header field
# which will exactly match the later-inserted one, so we must not sign
# it to avoid a likely possibility of a signature being invalidated.
my $conn = $msginfo->conn_obj;
my $appl_proto = !$conn ? undef : $conn->appl_proto;
my $skip_topmost_received = defined($appl_proto) &&
($appl_proto eq 'AM.PDP' || $appl_proto eq 'AM.CL');
my $policyfn = sub {
my $dkim = $_[0];
my $signed_header_fields_ref = cr('signed_header_fields') || {};
my $hfn = $dkim->{header_field_names};
my(@field_names_to_be_signed);
#
# when $signed_header_fields_ref->{$nm} is greater than 1 it indicates
# that one surplus occurrence of a header filed name in an 'h' tag
# should be inserted, consequently prohibiting further instances of
# such header field to be added to a message header section without
# breaking a signature; useful for example for a From and Subject
#
if ($hfn) {
my(%hfn_cnt);
$hfn_cnt{lc $_}++ for @$hfn;
for (@$hfn) {
my $nm = lc($_);
push(@field_names_to_be_signed, $nm); $hfn_cnt{$nm}--;
if (!$hfn_cnt{$nm} && $signed_header_fields_ref->{$nm} > 1) {
# causes signing one additional null occurrence of a header field
push(@field_names_to_be_signed, $nm);
}
}
}
@field_names_to_be_signed =
grep($signed_header_fields_ref->{$_}, @field_names_to_be_signed);
if ($skip_topmost_received) { # don't sign topmost Received header field
for my $j (0..$#field_names_to_be_signed) {
if (lc($field_names_to_be_signed[$j]) eq 'received')
{ splice(@field_names_to_be_signed,$j,1); last }
}
}
my $expiration;
if (defined $sig_options{x}) {
$expiration = $sig_options{x};
my $j = int($expiration);
$expiration = $expiration > $j ? $j+1 : $j; # ceiling
}
# RFC 6531 section 3.2: Any domain name to be looked up in the DNS
# MUST conform to and be processed as specified for Internationalizing
# Domain Names in Applications (IDNA) [RFC5890]. When doing lookups,
# the SMTPUTF8-aware SMTP client or server MUST either use a Unicode-
# aware DNS library, or transform the internationalized domain name
# to A-label form (i.e., a fully- qualified domain name that contains
# one or more A-labels but no U-labels) as specified in RFC 5890.
$dkim->add_signature( Mail::DKIM::Signature->new(
Selector => idn_to_ascii($sig_options{s}),
Domain => idn_to_ascii($sig_options{d}),
Timestamp => int($msginfo->rx_time), # floor
Headers => join(':', reverse @field_names_to_be_signed),
Key => $key,
!defined $sig_options{c} ? () : (Method => $sig_options{c}),
!defined $sig_options{a} ? () : (Algorithm => $sig_options{a}),
!defined $sig_options{q} ? () : (Query => $sig_options{q}),
!defined $sig_options{i} ? () : (Identity =>
mail_addr_idn_to_ascii($sig_options{i})),
!defined $expiration ? () : (Expiration => $expiration), # ceiling
));
undef;
}; # end sub
my $dkim_wrapper;
eval {
my $dkim_signer = Mail::DKIM::Signer->new(Policy => $policyfn);
$dkim_signer or die "Could not create a Mail::DKIM::Signer object\n";
#
# NOTE: dkim wrapper will strip bare CR before signing, which suits
# forwarding by SMTP which does the same; with other forwarding methods
# such as a pipe or milter, bare CRs in a message may break signatures
#
# feeding mail to a DKIM signer
$dkim_wrapper = Amavis::Out::SMTP->new_dkim_wrapper($dkim_signer,1);
my $msg = $msginfo->mail_text; # a file handle or a MIME::Entity object
my $msg_str_ref = $msginfo->mail_text_str; # have an in-memory copy?
$msg = $msg_str_ref if ref $msg_str_ref;
my $hdr_edits = $msginfo->header_edits;
$hdr_edits = Amavis::Out::EditHeader->new if !$hdr_edits;
my($received_cnt,$file_position) =
$hdr_edits->write_header($msginfo,$dkim_wrapper,!$initial_submission);
if (!defined $msg) {
# empty mail
} elsif (ref $msg eq 'SCALAR') {
# do it in chunks, saves memory, cache friendly
while ($file_position < length($$msg)) {
$dkim_wrapper->print(substr($$msg,$file_position,16384))
or die "Can't write to dkim signer: $!";
$file_position += 16384; # may overshoot, no problem
}
} elsif ($msg->isa('MIME::Entity')) {
$msg->print_body($dkim_wrapper);
} else {
my($nbytes,$buff);
while (($nbytes = $msg->read($buff,16384)) > 0) {
$dkim_wrapper->print($buff) or die "Can't write to dkim signer: $!";
}
defined $nbytes or die "Error reading: $!";
}
$dkim_wrapper->close or die "Can't close dkim wrapper: $!";
undef $dkim_wrapper;
$dkim_signer->CLOSE or die "Can't close dkim signer: $!";
@signatures = $dkim_signer->signatures;
undef $dkim_signer;
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(0, "dkim: signing error: %s", $eval_stat);
};
if (defined $dkim_wrapper) { $dkim_wrapper->close } # ignoring status
section_time('fwd-data-dkim');
}
# signatures must have all the required tags: d, s, b, bh; check to make sure
# if (ll(5)) { do_log(5, "dkim: %s", $_->as_string) for @signatures }
my(@sane_signatures);
for my $s (@signatures) {
my(@missing);
for my $pair ( ['d', $s->domain], ['s', $s->selector],
['b', $s->data], ['bh', $s->body_hash] ) {
my($tag,$val) = @$pair;
push(@missing,$tag) if !defined($val) || $val eq '';
}
if (!@missing) {
push(@sane_signatures, $s);
# remember just the last one (typically the only one)
$msginfo->dkim_signwith_sd( [$s->selector, $s->domain] );
} else {
do_log(2, "dkim: signature is missing tag %s, skipping: %s",
join(',',@missing), $s->as_string);
}
}
@sane_signatures;
}
# Prepare Authentication-Results header fields according to RFC 7601.
#
sub generate_authentication_results($;$$) {
my($msginfo,$allow_none,$sigs_ref) = @_;
$sigs_ref = $msginfo->dkim_signatures_all if @_ < 3; # for all by default
my $authservid = c('myauthservid');
$authservid = c('myhostname') if !defined $authservid || $authservid eq '';
$authservid = idn_to_ascii($authservid);
# note that RFC 7601 declares A-R header field as structured, which is why
# we are inserting a \n into top-level locations suitable for folding,
# and let sub hdr() choose suitable folding points
my(@results, %all_b, %all_b_valid, %all_b_8);
my($sig_cnt_dk, $sig_cnt_dkim, $result_str) = (0, 0, '');
for my $sig (!$sigs_ref ? () : @$sigs_ref) { # first pass
my($sig_result, $details, $str);
$sig_result = $sig->result;
if (defined $sig_result) {
$sig_result = lc $sig_result;
} else {
($sig_result, $details) = ('pass', 'just generated, assumed good');
$sig->result($sig_result, $details);
}
my $valid = $sig_result eq 'pass';
if ($valid) {
my $expiration_time = $sig->expiration;
if (defined $expiration_time &&
$expiration_time =~ /^0*\d{1,10}\z/ &&
$msginfo->rx_time > $expiration_time) {
($sig_result, $details) = ('fail', 'good, but expired');
$sig->result($sig_result, $details);
$valid = 0;
}
}
if ($sig->isa('Mail::DKIM::DkSignature')) { $sig_cnt_dk++ }
else { $sig_cnt_dkim++ };
my $b = $sig->data;
if (defined $b) {
$b =~ tr/ \t\n//d; # remove FWS, just in case
$all_b_8{substr($b,0,8)}++;
$all_b{$b}++;
$all_b_valid{$b}++ if $valid;
}
}
# RFC 7601 result: none, pass, fail, policy, neutral, temperror, permerror
# Mail::DKIM result: pass, fail, invalid, temperror, none
for my $sig (!$sigs_ref ? () : @$sigs_ref) { # second pass
my $result_val; # RFC 7601 result value
my $sig_result = lc $sig->result;
my $details = $sig->result_detail;
my $valid = $sig_result eq 'pass';
if ($valid) {
$result_val = 'pass';
} else {
# map a Mail::DKIM::Signature result into an RFC 7601 result value
$result_val = $sig_result eq 'temperror' ? 'temperror'
: $sig_result eq 'fail' ? 'fail'
: $sig_result eq 'invalid' ? 'neutral' : 'permerror';
}
my $sdid_ace = idn_to_ascii($sig->domain);
my $str = '';
my $add_header_b; # RFC 6008, should we add a header.b for this signature?
my $key_size = eval {
my $pk = $sig->get_public_key;
$pk && $pk->cork && $pk->cork->size * 8;
};
if ($sig->isa('Mail::DKIM::DkSignature')) {
$add_header_b = 1 if $sig_cnt_dk > 1;
my $rfc2822_sender = $msginfo->rfc2822_sender;
my $fm = $msginfo->rfc2822_from;
my(@rfc2822_from) = !defined($fm) ? () : ref $fm ? @$fm : $fm;
my $id_ace = defined $sdid_ace ? '@'.$sdid_ace : '';
$str .= ";\n domainkeys=" . $result_val;
$str .= sprintf(' (%d-bit key)', $key_size) if $key_size;
if (defined $details && $details ne '' && lc $details ne lc $result_val){
local($1); # turn it into an RFC 2045 quoted-string
$details =~ s{([\000-\037\177"\\])}{\\$1}gs; # RFC 5322 qtext
$str .= "\n reason=\"$details\"";
}
if (@rfc2822_from && $rfc2822_from[0] =~ /(\@[^\@]*)\z/s &&
idn_to_ascii($1) eq $id_ace) {
$str .= "\n header.from=" .
join(',', map(quote_rfc2821_local($_), @rfc2822_from));
}
if (defined($rfc2822_sender) && $rfc2822_sender =~ /(\@[^\@]*)\z/s &&
idn_to_ascii($1) eq $id_ace) {
$str .= "\n header.sender=" . quote_rfc2821_local($rfc2822_sender);
}
} else { # a DKIM signature
$add_header_b = 1 if $sig_cnt_dkim > 1;
$str .= ";\n dkim=" . $result_val;
$str .= sprintf(' (%d-bit key)', $key_size) if $key_size;
if (defined $details && $details ne '' && lc $details ne lc $result_val){
local($1); # turn it into an RFC 2045 quoted-string
$details =~ s{([\000-\037\177"\\])}{\\$1}gs; # RFC 5322 qtext
$str .= "\n reason=\"$details\"";
}
}
$str .= "\n header.d=" . $sdid_ace if defined $sdid_ace;
my $b = $sig->data;
if (defined $b && $add_header_b) {
# RFC 6008: The value associated with this item in the header field
# MUST be at least the first eight characters of the digital signature
# (the "b=" tag from a DKIM-Signature) for which a result is being
# relayed, and MUST be long enough to be unique among the results
# being reported.
$b =~ tr/ \t\n//d; # remove FWS, just in case
if ($b !~ m{^ [A-Za-z0-9+/]+ =* \z}xs) { # ensure base64 syntax
do_log(2, "generate_AR: bad signature tag b=%s", $b);
} elsif ($all_b{$b} > 1 && $all_b_valid{$b} && !$valid) {
# exact duplicates: do not report invalid ones if at least one is valid
# RFC 6008 section 6.2.: a cautious implementation could discard
# the false negative in that instance.
do_log(2, "generate_AR: not reporting bad duplicates: %s", $b);
$str = ''; # ditch the report for this signature
} elsif ($all_b_8{$b} > $all_b{$b}) {
do_log(2, "generate_AR: not reporting b for collisions: %s", $b);
} else {
$str .= "\n header.b=" . '"'.substr($b,0,8) .'"';
}
}
$result_str .= $str;
}
# just provide a single A-R with all results combined
push(@results, $result_str) if $result_str ne '';
push(@results, ";\n dkim=none") if !@results && $allow_none;
$_ = sprintf("%s (%s)%s", $authservid, $myproduct_name, $_) for @results;
@results; # none, one, or more A-R header field bodies
}
# adjust spam score for each recipient so that the final spam score
# will be shifted towards a fixed score assigned to a signing domain (its
# 'reputation', as obtained through @signer_reputation_maps); the formula is:
# adjusted_spam_score = f*reputation + (1-f)*spam_score; 0 <= f <= 1
# which has the same semantics as auto_whitelist_factor in SpamAssassin AWL
#
sub adjust_score_by_signer_reputation($) {
my $msginfo = $_[0];
my $reputation_factor = c('reputation_factor');
$reputation_factor = 0 if $reputation_factor < 0;
$reputation_factor = 1 if $reputation_factor > 1;
my $sigs_ref = $msginfo->dkim_signatures_valid;
if (defined $reputation_factor && $reputation_factor > 0 &&
$sigs_ref && @$sigs_ref) {
my($best_reputation_signer,$best_reputation_score);
my $minimum_key_bits = c('dkim_minimum_key_bits');
my $srm = ca('signer_reputation_maps');
# walk through all valid signatures, find best (smallest) reputation value
for my $sig (@$sigs_ref) {
my $sdid = $sig->domain;
my($val,$key) = lookup2(0, '@'.$sdid, $srm);
if (defined $val &&
(!defined $best_reputation_score || $val < $best_reputation_score)) {
my $key_size;
$key_size = eval {
my $pk = $sig->get_public_key;
$pk && $pk->cork && $pk->cork->size * 8 } if $minimum_key_bits;
if ($key_size && $key_size < $minimum_key_bits) {
do_log(1, "dkim: reputation for signing domain %s not used, ".
"valid signature ignored, %d-bit key is shorter than %d",
$sdid, $key_size, $minimum_key_bits);
} else {
$best_reputation_signer = $sdid;
$best_reputation_score = $val;
}
}
}
if (defined $best_reputation_score) {
my $ll = 2; # initial log level
for my $r (@{$msginfo->per_recip_data}) {
my $spam_level = $r->spam_level;
next if !defined $spam_level;
my $new_level = $reputation_factor * $best_reputation_score
+ (1-$reputation_factor) * $spam_level;
$r->spam_level($new_level);
my $spam_tests = 'AM.DKIM_REPUT=' .
(0+sprintf("%.3f", $new_level-$spam_level));
if (!$r->spam_tests) {
$r->spam_tests([ \$spam_tests ]);
} else {
unshift(@{$r->spam_tests}, \$spam_tests);
}
ll($ll) &&
do_log($ll, "dkim: score %.3f adjusted to %.3f due to reputation ".
"(%s) of a signer domain %s", $spam_level, $new_level,
$best_reputation_score, $best_reputation_signer);
$ll = 5; # reduce log clutter after the first recipient
}
}
}
}
# check if we have a valid author domain signature, and do
# other DKIM pre-processing; called from collect_some_dkim()
#
sub collect_some_dkim_info($) {
my $msginfo = $_[0];
my $rfc2822_sender = $msginfo->rfc2822_sender;
my(@rfc2822_from) = $msginfo->rfc2822_from;
# now that we have a parsed From, check if we have a valid
# author domain signature and do other DKIM pre-processing
my(@bank_names, %bn_auth_already_queried);
my $atpbm = ca('author_to_policy_bank_maps');
my(@signatures_valid);
my $sigs_ref = $msginfo->dkim_signatures_all;
my $sig_ind = 0; # index of a signature in a signature array
for my $sig (!$sigs_ref ? () : @$sigs_ref) { # for each signature
my $valid = lc($sig->result) eq 'pass';
my($timestamp_age, $creation_time, $expiration_time);
if (!$sig->isa('Mail::DKIM::DkSignature')) {
$creation_time = $sig->timestamp; # method only implemented for DKIM sig
$timestamp_age = $msginfo->rx_time - $creation_time
if defined $creation_time && $creation_time =~ /^0*\d{1,10}\z/;
}
$expiration_time = $sig->expiration;
my $expired =
defined $expiration_time && $expiration_time =~ /^0*\d{1,10}\z/ &&
($msginfo->rx_time > $expiration_time ||
( defined $creation_time && $creation_time =~ /^0*\d{1,10}\z/ &&
$creation_time > $expiration_time )
);
my($pubkey, $key_size, $eval_stat);
eval {
# Mail::DKIM >=0.31 caches a public key result
$pubkey = $sig->get_public_key; # can die with "not available"
$pubkey or die "No public key";
$key_size = $pubkey->cork && $pubkey->cork->size * 8;
$key_size or die "Can't determine a public key size";
1;
} or do {
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
do_log(5, "dkim: public key s=%s d=%s, error: %s",
$sig->selector, $sig->domain, $eval_stat);
};
if ($pubkey && ll(5)) {
# RFC 6376: Although the "g=" tag has been deprecated in this version
# of the DKIM specification (and thus MUST now be ignored), signers are
# advised not to include the "g=" tag in key records...
do_log(5, "dkim: public key s=%s d=%s%s, %d-bit key",
$sig->selector, $sig->domain,
join('', map { my $v = $pubkey->get_tag($_);
defined $v ? " $_=$v" : '' } qw(v g h k t s)),
$key_size||0 );
}
# See if a signature matches address in any of the sender/author fields.
# In the absence of an explicit Sender header field, the first author
# acts as the 'agent responsible for the transmission of the message'.
my(@addr_list) = ($msginfo->sender,
defined $rfc2822_sender ? $rfc2822_sender : $rfc2822_from[0],
@rfc2822_from);
my $sdid_ace = idn_to_ascii($sig->domain);
for my $addr (@addr_list) {
next if !defined $addr;
local($1); my $domain;
$domain = $1 if $addr =~ /\@([^\@]*)\z/s;
# turn addresses in @addr_list into booleans, representing match outcome
$addr = defined $domain && idn_to_ascii($domain) eq $sdid_ace ? 1 : 0;
}
# # Label which header fields are covered by each signature;
# # doesn't work for old DomainKeys signatures where h may be missing
# # and where recurring header fields may only be listed once.
# # NOTE: currently unused and commented out
# { my(%field_counts);
# my(@signed_header_field_names) = map(lc($_), $sig->headerlist); # 'h' tag
# $field_counts{$_}++ for @signed_header_field_names;
# for (my $j=-1; ; $j--) { # walk through header fields, bottom-up
# my($f_ind,$fld) = $msginfo->get_header_field2(undef,$j);
# last if !defined $f_ind; # reached the top
# local $1;
# my $f_name; $f_name = lc $1 if $fld =~ /^([^:]*?)[ \t]*:/s;
# if ($field_counts{$f_name} > 0) { # header field is covered by this sig
# $msginfo->header_field_signed_by($f_ind,$sig_ind); # store sig index
# $field_counts{$f_name}--;
# }
# }
# }
if ($valid && !$expired) {
push(@signatures_valid, $sig);
my $sig_domain = $sig->domain;
$sig_domain = '?' if !$sig_domain; # make sure it is true as a boolean
#
# note that only the author domain signature (based on RFC 2822.From)
# is a valid concept in ADSP; we are also using the same rules to match
# against RFC 2822.Sender and envelope sender address, but results are
# only of informational/curiosity interest and deeper significance
# must not be attributed to dkim_envsender_sig and dkim_sender_sig!
#
$msginfo->dkim_envsender_sig($sig_domain) if $addr_list[0];
$msginfo->dkim_sender_sig($sig_domain) if $addr_list[1];
$msginfo->dkim_author_sig($sig_domain)
if grep($_, @addr_list[2..$#addr_list]); # SDID matches addr
$msginfo->dkim_thirdparty_sig($sig_domain) if !$msginfo->dkim_author_sig;
if (@$atpbm) { # any author to policy bank name mappings?
for my $j (0..$#rfc2822_from) { # for each author (usually only one)
my $key_ace = mail_addr_idn_to_ascii($rfc2822_from[$j]);
# query key: as-is author address for author domain signatures, and
# author address with '/@signer-domain' appended for 3rd party sign.
# e.g.: 'user@example.com', 'user@sub.example.com/@example.org'
my $sdid_ace = idn_to_ascii($sig->domain);
for my $opt ( ($addr_list[$j+2] ? '' : ()), '/@'.$sdid_ace ) {
next if $bn_auth_already_queried{$key_ace.$opt};
my($result,$matchingkey) = lookup2(0,$key_ace,$atpbm,
Label=>'AuthToPB', $opt eq '' ? () : (AppendStr=>$opt));
$bn_auth_already_queried{$key_ace.$opt} = 1;
next if !$result;
if ($result eq '1') {
# a handy usability trick to supply a hardwired policy bank
# name when acl-style lookup table is used, which can only
# return a boolean (undef, 0, or 1)
$result = 'AUTHOR_APPROVED';
}
my $minimum_key_bits = c('dkim_minimum_key_bits');
# $result is a list of bank names as a comma-separated string
local $1;
my(@pbn) = map(/^\s*(\S.*?)\s*\z/s ? $1 : (), split(/,/, $result));
if (!@pbn) {
# no policy banks specified, nothing to do
} elsif ($key_size && $minimum_key_bits &&
$key_size < $minimum_key_bits) {
do_log(1, "dkim: policy bank %s by %s NOT LOADED, valid ".
"signature ignored, %d-bit key is shorter than %d",
join(',',@pbn), $matchingkey,
$key_size, $minimum_key_bits);
} else {
push(@bank_names, @pbn);
ll(2) && do_log(2, "dkim: policy bank %s by %s",
join(',',@pbn), $matchingkey);
}
}
}
}
}
ll(2) && do_log(2, "dkim: %s%s%s %s signature by d=%s, From: %s, ".
"a=%s, c=%s, s=%s, i=%s%s%s%s",
$valid ? 'VALID' : 'FAILED', $expired ? ', EXPIRED' : '',
$timestamp_age >= -1 ? ''
: ', IN_FUTURE:('.format_time_interval(-$timestamp_age).')',
join('+', (map($_ ? 'Author' : (), @addr_list[2..$#addr_list])),
$addr_list[1] ? 'Sender' : (),
$addr_list[0] ? 'MailFrom' : (),
!grep($_, @addr_list) ? 'third-party' : ()),
$sig->domain, join(", ", qquote_rfc2821_local(@rfc2822_from)),
$sig->algorithm, scalar($sig->canonicalization),
$sig->selector, $sig->identity,
!$msginfo->originating ? ''
: ', ORIG [' . $msginfo->client_addr . ']:' . $msginfo->client_port,
!defined($msginfo->is_mlist) ? '' : ", m.list(".$msginfo->is_mlist.")",
$valid ? '' : ', '.$sig->result_detail,
);
$sig_ind++;
}
Amavis::load_policy_bank($_,$msginfo) for @bank_names;
$msginfo->originating(c('originating'));
$msginfo->dkim_signatures_valid(\@signatures_valid) if @signatures_valid;
# if (ll(5) && $sig_ind > 0) {
# # show which header fields are covered by which signature
# for (my $j=0; ; $j++) {
# my($f_ind,$fld) = $msginfo->get_header_field2(undef,$j);
# last if !defined $f_ind;
# my(@sig_ind) = $msginfo->header_field_signed_by($f_ind);
# do_log(5, "dkim: %-5s %s.", !@sig_ind ? '' : '['.join(',',@sig_ind).']',
# substr($fld,0,54));
# }
# }
}
1;
__DATA__
#
package Amavis::Tools;
use strict;
use re 'taint';
use warnings;
use warnings FATAL => qw(utf8 void);
no warnings 'uninitialized';
# use warnings 'extra'; no warnings 'experimental::re_strict'; use re 'strict';
BEGIN {
require Exporter;
use vars qw(@ISA @EXPORT @EXPORT_OK %EXPORT_TAGS $VERSION);
$VERSION = '2.412';
@ISA = qw(Exporter);
@EXPORT_OK = qw(&show_or_test_dkim_public_keys &generate_dkim_private_key
&convert_dkim_keys_file);
import Amavis::Conf qw(:platform c cr ca
@dkim_signing_keys_list @dkim_signing_keys_storage);
import Amavis::Util qw(untaint ll do_log
safe_encode_utf8_inplace idn_to_ascii idn_to_utf8);
import Amavis::rfc2821_2822_Tools qw(rfc2822_timestamp);
}
use subs @EXPORT_OK;
use Errno qw(ENOENT EACCES);
use IO::File qw(O_RDONLY O_WRONLY O_RDWR O_APPEND O_CREAT O_EXCL);
use Crypt::OpenSSL::RSA ();
# Prints DNS TXT resource records for corresponding DKIM private keys (as
# previously declared by calls to dkim_key) in a format directly suitable
# for inclusion in DNS zone files. If an argument is provided the result is
# restricted to listed domains only, otherwise RR for all domains are shown.
# Note that a domain may have more than one RR: one RR for each selector.
#
# When a search argument is provided (even if '.'), the printed list is
# sorted according to reversed domain labels (e.g. com.example.sub.host),
# entries with the same domain are kept in original order. When there are
# no search arguments, the original order is retained.
#
sub show_or_test_dkim_public_keys($$) {
my($cmd,$args) = @_;
# when list is empty all domains are implied
my(@seek_domains) = map(idn_to_ascii($_), @$args);
my(@sort_list) = map { my $d = lc($dkim_signing_keys_list[$_]->{domain});
my $d_re = $dkim_signing_keys_list[$_]->{domain_re};
[$_, $d, $d_re, join('.',reverse split(/\./,$d,-1))] }
0 .. $#dkim_signing_keys_list;
if (@seek_domains) { # sort only when there are any search arguments present
@sort_list = sort {$a->[3] cmp $b->[3] || $a->[0] <=> $b->[0]} @sort_list;
}
my $any = 0;
for my $e (@sort_list) {
my($j,$domain,$domain_re) = @$e; local($1);
safe_encode_utf8_inplace($domain); # to octets (if not already)
my $domain_ace = idn_to_ascii($domain);
next if @seek_domains &&
!grep { defined $domain_re ? lc($_) =~ /$domain_re/
: /^\.(.*)\z/s ?
$domain_ace eq lc($1) ||
$domain_ace =~ /(?:\.|\z)\Q$1\E\z/si
: $domain_ace eq lc($_) } @seek_domains;
$any++;
my $key_opts = $dkim_signing_keys_list[$j];
if ($cmd eq 'testkeys' || $cmd eq 'testkey') {
test_dkim_key(%$key_opts);
} else {
my $selector = $key_opts->{selector};
safe_encode_utf8_inplace($selector); # to octets (if not already)
my $selector_ace = idn_to_ascii($selector);
my $key_storage_ind = $key_opts->{key_storage_ind};
my($key,$dev,$inode,$fname) =
@{ $dkim_signing_keys_storage[$key_storage_ind] };
my(@pub) = split(/\r?\n/, $key->get_public_key_x509_string);
@pub = grep(!/^---.*?---\z/ && !/^[ \t]*\z/, @pub);
my(@tags) = map($_.'='.$key_opts->{$_},
grep(defined $key_opts->{$_}, qw(v g h k s t n)));
my $key_size = 8 * $key->size;
printf("; key#%d %d bits, s=%s, d=%s%s\n",
$key_opts->{key_ind} + 1, $key_size,
$selector, $domain,
defined $fname ? ', '.$fname : '');
printf("; CANNOT DECLARE A WILDCARDED LABEL IN DNS, ".
"AVOID OR EDIT MANUALLY!\n") if defined $key_opts->{domain_re};
printf("%s._domainkey.%s.\t%s TXT (%s)\n\n",
$selector_ace, $domain_ace, '3600',
join('', map("\n" . ' "' . $_ . '"',
join('; ',@tags,'p='), @pub)) );
}
}
if (!@dkim_signing_keys_list) {
printf("No DKIM private keys declared in a config file.\n");
} elsif (!$any) {
printf("No DKIM private keys match the selection list.\n");
}
}
sub test_dkim_key(@) {
my(%key_options) = @_;
my $now = Time::HiRes::time;
my $key_storage_ind = $key_options{key_storage_ind};
my($key,$dev,$inode,$fname) =
@{ $dkim_signing_keys_storage[$key_storage_ind] };
if (UNIVERSAL::isa($key,'Crypt::OpenSSL::RSA')) {
$key = Mail::DKIM::PrivateKey->load(Cork => $key); # avail since 0.31
# my $pkcs1 = $key->get_private_key_string; # most compact
# $pkcs1 =~ s/^---.*?---(?:\r?\n|\z)//gm; $pkcs1 =~ tr/\r\n//d;
# $key = Mail::DKIM::PrivateKey->load(Data => $pkcs1);
}
my $domain = idn_to_utf8($key_options{domain});
my $domain_ace = idn_to_ascii($domain);
my $selector_ace = idn_to_ascii($key_options{selector});
my $policyfn = sub {
my $dkim = $_[0];
$dkim->add_signature( Mail::DKIM::Signature->new(
Selector => $selector_ace, Domain => $domain_ace,
Method => 'simple/simple', Algorithm => 'rsa-sha256',
Timestamp => int($now), Expiration => int($now)+24*3600, Key => $key,
)); undef;
};
my $msg = sprintf(
"From: test\@%s\nMessage-ID: <123\@%s>\nDate: %s\nSubject: test\n\ntest\n",
$domain, $domain, rfc2822_timestamp($now));
$msg =~ s{\n}{\015\012}gs;
my(@gen_signatures, @read_signatures);
eval {
my $dkim_signer = Mail::DKIM::Signer->new(Policy => $policyfn);
$dkim_signer or die "Could not create a Mail::DKIM::Signer object";
$dkim_signer->PRINT($msg) or die "Can't write to dkim: $!";
$dkim_signer->CLOSE or die "Can't close dkim signer: $!";
@gen_signatures = $dkim_signer->signatures;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
print STDERR "dkim signing failed: $eval_stat\n";
};
$msg = $_->as_string . "\015\012" . $msg for @gen_signatures;
eval {
my $dkim_verifier = Mail::DKIM::Verifier->new;
$dkim_verifier or die "Could not create a Mail::DKIM::Verifier object";
$dkim_verifier->PRINT($msg) or die "Can't write to dkim: $!";
$dkim_verifier->CLOSE or die "Can't close dkim_verifier: $!";
@read_signatures = $dkim_verifier->signatures;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
print STDERR "dkim verification failed: $eval_stat\n";
};
# printf("%s\n", $fname) if defined $fname;
printf("TESTING#%d %s: %s => %s\n",
$key_options{key_ind} + 1, $domain,
$_->selector . '._domainkey.' . $_->domain,
$_->result_detail) for @read_signatures;
}
sub generate_dkim_private_key(@) {
my($fname,$nbits) = @_;
my $fh;
eval {
$nbits = 1024 if !defined($nbits) || $nbits eq '';
$nbits =~ /^\d+\z/ or die "Number of bits in a key must be numeric\n";
$nbits >= 512
or die "Number of bits is below 512 (suggested 1024..2048)\n";
$nbits <= 4096
or die "Number of bits too large (suggested 1024..2048)\n";
defined $fname && $fname ne ''
or die "File name for a key not provided\n";
$nbits >= 1024
or printf STDERR ("INFO: RFC 6376 states: Signers MUST use RSA keys ".
"of at least 1024 bits for long-lived keys.\n");
$fh = IO::File->new;
$fh->open(untaint($fname), O_CREAT|O_EXCL|O_RDWR, 0600)
or die "Can't create file \"$fname\": $!\n";
my $rsa = Crypt::OpenSSL::RSA->generate_key($nbits);
$fh->print($rsa->get_private_key_string)
or die "Error writing key to a file \"$fname\": $!\n";
$fh->close or die "Can't close file \"$fname\": $!\n";
undef $fh;
printf STDERR ("Private RSA key successfully written to file \"%s\" ".
"(%d bits, PEM format) \n", $fname,$nbits);
1;
} or do {
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat;
$fh->close if defined $fh; # ignoring status
die "genrsa: $eval_stat\n";
}
}
# Reads a dkim-filter -compatible key specifications. From the dkim-filter
# man page: The keyfile should contain a set of lines of the form
# sender-pattern:signing-domain:keypath where sender-pattern is a pattern
# to match against message senders (with a special character "*" interpreted
# as "zero or more characters"), signing-domain is the domain to announce as
# the signing domain when generating signatures (or a '*', implying author's
# domain), and keypath is a path to the PEM-formatted private key to be used
# for signing messages which match the sender-pattern. The selector used in
# the signature will be the filename portion of keypath. A line starting
# with "/" is interpreted as a root directory for keys, meaning the keypath
# values after that line in the file are taken relative to that path. If a
# file referenced by keypath cannot be opened, the filter will try again by
# appending ".pem" and then ".private". '#'-delimited comments and blank
# lines are ignored.
#
sub convert_dkim_keys_file($) {
my $keysfile = $_[0];
my $inp = IO::File->new;
$inp->open($keysfile,'<')
or die "dkim_key_file: Can't open file $keysfile for reading: $!";
my($basedir,@options,@opt_re,%domain_selectors); my $rn = 0; my $ln;
for ($! = 0; defined($ln=$inp->getline); $! = 0) {
chomp($ln); $rn++; local($1); my($selector,$key_fn);
if ($ln =~ /^ \s* (?: \# | \z)/xs) {
# skip empty and all-comment lines
} elsif ($ln =~ m{^/}) {
$basedir = $ln; $basedir .= '/' if $basedir !~ m{/\z};
} else {
my($sender_pattern, $signing_domain, $keypath) =
map { my $s = $_; $s =~ s/^\s+//; $s =~ s/\s+\z//; $s }
split(/:/, $ln, 3);
defined $sender_pattern && $sender_pattern ne ''
or die "Error in $keysfile, empty sender pattern, line $rn: $ln\n";
defined $keypath && $keypath ne '' || $signing_domain eq ''
or die "Error in $keysfile, empty file name field, line $rn: $ln\n";
$keypath = $basedir . $keypath if defined $basedir && $keypath !~ m{^/};
for my $ext ('', '.pem', '.private') {
my $errn = stat($keypath.$ext) ? 0 : 0+$!;
if ($errn != ENOENT) { $key_fn = $keypath.$ext; last }
}
defined $key_fn
or die "File $keypath does not exist, $keysfile line $rn: $ln\n";
$selector = lc($1) if $keypath =~ m{ (?: ^ | / ) ( [^/]+? )
(?: \.pem | \.private )? \z }xs;
# must convert sender pattern to unquoted form to match actual addresses
my $sender_domain;
if ($sender_pattern eq '*' || $sender_pattern eq '*@*') {
$sender_pattern = $sender_domain = '*';
} else {
my $sender_localpart;
($sender_localpart, $sender_domain) =
Amavis::rfc2821_2822_Tools::split_address(
Amavis::rfc2821_2822_Tools::unquote_rfc2821_local($sender_pattern));
$sender_domain =~ s/^\@//;
$sender_pattern = $sender_localpart.'@'.idn_to_ascii($sender_domain);
}
if ($signing_domain eq '*') { $signing_domain = $sender_domain }
$signing_domain = idn_to_ascii($signing_domain);
if ($signing_domain ne '' &&
!$domain_selectors{$signing_domain}{$selector}) {
# dkim_key($signing_domain,$selector,$key_fn); # declare a signing key
printf("dkim_key(%-18s %-12s '%s');\n",
"'".$signing_domain."',", "'".$selector."',", $key_fn);
$domain_selectors{$signing_domain}{$selector} = 1;
}
if ($signing_domain eq $sender_domain) { $signing_domain = '*' }
push(@options, [$sender_pattern, $signing_domain, $selector]);
}
}
defined $ln || $! == 0 or die "Error reading from $keysfile: $!";
$inp->close or die "Error closing $keysfile: $!";
#
# prepare by_sender signature options lookup table when non-default
# signing is required (e.g. third-party signatures)
#
my $in_options = 0;
for my $opt (@options) {
my($sender_pattern, $signing_domain, $selector) = @$opt;
if ($signing_domain eq '*') {
# implies author domain signature, no need for special options
} else {
$sender_pattern =~ s/\*{2,}/*/gs; # collapse successive wildcards
$sender_pattern =~ # '*' is a wildcard, quote the rest
s{ ([@\#/.^\$|*+?(){}\[\]\\]) }{ $1 eq '*' ? '.*' : '\\'.$1 }xgse;
$sender_pattern = '^' . $sender_pattern . '\\z'; # implicit anchors
# remove trailing first, leading next, preferring /^.*\z/ -> /^/, not /\z/
$sender_pattern =~ s/\.\*\\z\z//s; # remove trailing anchor if redundant
$sender_pattern =~ s/^\^\.\*//s; # remove leading anchor if redundant
$sender_pattern = '(?:)' if $sender_pattern eq ''; # just in case
$signing_domain = undef if $signing_domain eq '';
$selector = undef if $selector eq '';
# case insensitive matching for compatibility with dkim-milter
push(@opt_re, [ qr/$sender_pattern/is =>
( !defined($signing_domain) ||
keys(%{$domain_selectors{$signing_domain}})==1
? { d => $signing_domain }
: { d => $signing_domain, s => $selector } ) ]);
if (!$in_options) {
printf("\n%s\n", '@dkim_signature_options_bysender_maps = (new_RE(');
$in_options = 1;
}
printf(" [ %-30s => { d=>%s%s} ],\n",
'qr/' . $sender_pattern . '/is',
!defined($signing_domain) ? 'undef' : "'".$signing_domain."'",
!defined($signing_domain) ||
keys %{$domain_selectors{$signing_domain}} == 1 ? ''
: !defined($selector) ? ', s=>undef' : ", s=>'".$selector."'");
}
}
printf("%s\n", '));') if $in_options;
# use Devel::Peek qw(Dump);
# use Data::Dump (); Data::Dump::dump(@opt_re);
# unshift(@dkim_signature_options_bysender_maps,
# Amavis::Lookup::RE->new(@opt_re)) if @opt_re;
}
1;
__DATA__
#
# =============================================================================
# This text section governs how a main per-message amavisd-new log entry (at
# log level 0) is formed (config variable $log_short_templ). Empty disables it.
[?%#D|#|Passed #
[? [:ccat|major] |#
OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER-[:ccat|minor]|SPAMMY|SPAM|\
UNCHECKED[?[:ccat|minor]||-ENCRYPTED|]|BANNED (%F)|INFECTED (%V)]#
{[:actions_performed]}#
,[?%p|| %p][?%a||[?%l|| LOCAL] [:client_addr_port]][?%e|| \[%e\]] [:mail_addr_decode_octets|%s] -> [%D|[:mail_addr_decode_octets|%D]|,]#
[? %q ||, quarantine: %q]#
[? %Q ||, Queue-ID: %Q]#
[? %m ||, Message-ID: [:mail_addr_decode_octets|%m]]#
[? %r ||, Resent-Message-ID: [:mail_addr_decode_octets|%r]]#
[? %i ||, mail_id: %i]#
, Hits: [:SCORE]#
, size: %z#
[? [:partition_tag] ||, pt: [:partition_tag]]#
[~[:remote_mta_smtp_response]|["^$"]||[", queued_as: "]]\
[remote_mta_smtp_response|[~%x|["queued as ([0-9A-Za-z]+)$"]|["%1"]|["%0"]]|/]#
#, Subject: [:dquote|[:mime2utf8|[:header_field_octets|Subject]|100|1]]#
#, From: [:uquote|[:mail_addr_decode_octets|[:rfc2822_from]]]#
#[? %#T ||, Tests: \[[%T|,]\]]#
[? [:dkim|sig_sd] ||, dkim_sd=[:dkim|sig_sd]]#
[? [:dkim|newsig_sd] ||, dkim_new=[:dkim|newsig_sd]]#
, %y ms#
]
[?%#O|#|Blocked #
[? [:ccat|major|blocking] |#
OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER-[:ccat|minor]|SPAMMY|SPAM|\
UNCHECKED[?[:ccat|minor]||-ENCRYPTED|]|BANNED (%F)|INFECTED (%V)]#
{[:actions_performed]}#
,[?%p|| %p][?%a||[?%l|| LOCAL] [:client_addr_port]][?%e|| \[%e\]] [:mail_addr_decode_octets|%s] -> [%O|[:mail_addr_decode_octets|%O]|,]#
[? %q ||, quarantine: %q]#
[? %Q ||, Queue-ID: %Q]#
[? %m ||, Message-ID: [:mail_addr_decode_octets|%m]]#
[? %r ||, Resent-Message-ID: [:mail_addr_decode_octets|%r]]#
[? %i ||, mail_id: %i]#
, Hits: [:SCORE]#
, size: %z#
[? [:partition_tag] ||, pt: [:partition_tag]]#
#, Subject: [:dquote|[:mime2utf8|[:header_field_octets|Subject]|100|1]]#
#, From: [:uquote|[:mail_addr_decode_octets|[:rfc2822_from]]]#
#[? %#T ||, Tests: \[[%T|,]\]]#
[? [:dkim|sig_sd] ||, dkim_sd=[:dkim|sig_sd]]#
[? [:dkim|newsig_sd] ||, dkim_new=[:dkim|newsig_sd]]#
, %y ms#
]
__DATA__
#
# =============================================================================
# This text section governs how a verbose per-message amavisd-new log entry
# is formed (config variable $log_verbose_templ). An empty text will prevent
# a verbose log entry, multiline text will produce multiple log entries, one
# for each nonempty line. Syntax is explained in the README.customize file.
[?%#D|#|Passed #
[? [:ccat|major] |#
OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER-[:ccat|minor]|SPAMMY|SPAM|\
UNCHECKED[?[:ccat|minor]||-ENCRYPTED|]|BANNED (%F)|INFECTED (%V)]#
{[:actions_performed]}#
,[?%p|| %p][?%a||[?%l|| LOCAL] [:client_addr_port]][?%e|| \[%e\]] [:client_protocol]/[:protocol] [:mail_addr_decode_octets|%s] -> [%D|[:mail_addr_decode_octets|%D]|,]#
#, ([ip_trace_public|%x| < ])#
, ([ip_proto_trace_public|%x| < ])#
[? [:tls_in] ||, tls: [:tls_in]]#
[? %q ||, quarantine: %q]#
[? %Q ||, Queue-ID: %Q]#
[? %m ||, Message-ID: [:mail_addr_decode_octets|%m]]#
[? %r ||, Resent-Message-ID: [:mail_addr_decode_octets|%r]]#
, mail_id: %i#
#, secret_id: [:secret_id]#
, b: [:substr|[:b64urlenc|[:body_digest]]|0|9]#
, Hits: [:SCORE]#
, size: %z#
[? [:partition_tag] ||, pt: [:partition_tag]]#
[~[:remote_mta_smtp_response]|["^$"]||[", queued_as: "]]\
[remote_mta_smtp_response|[~%x|["queued as ([0-9A-Za-z]+)$"]|["%1"]|["%0"]]|/]#
, Subject: [:dquote|[:mime2utf8|[:header_field_octets|Subject]|100|1]]#
, From: [:uquote|[:mail_addr_decode_octets|[:rfc2822_from]]]#
[? [:dkim|author] || (dkim:AUTHOR)]#
[? [:useragent|name] ||, [:useragent|name]: [:uquote|[:useragent|body]]]#
, helo=[:client_helo]#
[? %#T ||, Tests: \[[%T|,]\]]#
#[:supplementary_info|VERSION|, SA: %%s]#
#[:supplementary_info|RULESVERSION|, rules: %%s]#
[? [:banning_rule_key] ||, b.key=[:banning_rule_key]]#
[? [:banning_rule_comment] ||, b.com=[:banning_rule_comment]]#
[? [:banning_rule_rhs] ||, b.rhs=[:banning_rule_rhs]]#
[? [:banned_parts_as_attr] ||, b.parts=[:banned_parts_as_attr]]#
[:supplementary_info|SCTYPE|, shortcircuit=%%s]#
[:supplementary_info|AUTOLEARN|, autolearn=%%s]#
[:supplementary_info|AUTOLEARNSCORE|, autolearnscore=%%s]#
[? [:supplementary_info|LANGUAGES] ||, languages=[:uquote|[:supplementary_info|LANGUAGES]]]#
[? [:supplementary_info|RELAYCOUNTRY] ||, relaycountry=[:uquote|[:supplementary_info|RELAYCOUNTRY]]]#
[? [:supplementary_info|ASN] ||, asn=[:uquote|[:supplementary_info|ASN] [:supplementary_info|ASNCIDR]]]#
#[? [:supplementary_info|DCCB] ||, dcc=[:supplementary_info|DCCB]:[:uquote|[:supplementary_info|DCCR]]]#
#[? [:supplementary_info|DCCREP] ||, dcc_rep=[:supplementary_info|DCCREP]]#
#[:supplementary_info|AWLSIGNERMEAN|, signer_avg=%%s]#
#[? [:dkim|domain] ||, dkim_d=[:dkim|domain]]#
[? [:dkim|identity] ||, dkim_i=[:dkim|identity]]#
[? [:dkim|sig_sd] ||, dkim_sd=[:dkim|sig_sd]]#
[? [:dkim|newsig_sd] ||, dkim_new=[:dkim|newsig_sd]]#
[? [:rusage|ru_maxrss] ||, rss=[:rusage|ru_maxrss]]#
, %y ms#
]
[?%#O|#|Blocked #
[? [:ccat|major|blocking] |#
OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER-[:ccat|minor]|SPAMMY|SPAM|\
UNCHECKED[?[:ccat|minor]||-ENCRYPTED|]|BANNED (%F)|INFECTED (%V)]#
{[:actions_performed]}#
,[?%p|| %p][?%a||[?%l|| LOCAL] [:client_addr_port]][?%e|| \[%e\]] [:client_protocol]/[:protocol] [:mail_addr_decode_octets|%s] -> [%O|[:mail_addr_decode_octets|%O]|,]#
#, ([ip_trace_public|%x| < ])#
, ([ip_proto_trace_public|%x| < ])#
[? [:tls_in] ||, tls: [:tls_in]]#
[? %q ||, quarantine: %q]#
[? %Q ||, Queue-ID: %Q]#
[? %m ||, Message-ID: [:mail_addr_decode_octets|%m]]#
[? %r ||, Resent-Message-ID: [:mail_addr_decode_octets|%r]]#
, mail_id: %i#
#, secret_id: [:secret_id]#
, b: [:substr|[:b64urlenc|[:body_digest]]|0|9]#
, Hits: [:SCORE]#
, size: %z#
[? [:partition_tag] ||, pt: [:partition_tag]]#
, Subject: [:dquote|[:mime2utf8|[:header_field_octets|Subject]|100|1]]#
, From: [:uquote|[:mail_addr_decode_octets|[:rfc2822_from]]]#
[? [:dkim|author] || (dkim:AUTHOR)]#
[? [:useragent|name] ||, [:useragent|name]: [:uquote|[:useragent|body]]]#
, helo=[:client_helo]#
[? %#T ||, Tests: \[[%T|,]\]]#
#[:supplementary_info|VERSION|, SA: %%s]#
#[:supplementary_info|RULESVERSION|, rules: %%s]#
[? [:banning_rule_key] ||, b.key=[:banning_rule_key]]#
[? [:banning_rule_comment] ||, b.com=[:banning_rule_comment]]#
[? [:banning_rule_rhs] ||, b.rhs=[:banning_rule_rhs]]#
[? [:banned_parts_as_attr] ||, b.parts=[:banned_parts_as_attr]]#
[:supplementary_info|SCTYPE|, shortcircuit=%%s]#
[:supplementary_info|AUTOLEARN|, autolearn=%%s]#
[:supplementary_info|AUTOLEARNSCORE|, autolearnscore=%%s]#
[? [:supplementary_info|LANGUAGES] ||, languages=[:uquote|[:supplementary_info|LANGUAGES]]]#
[? [:supplementary_info|RELAYCOUNTRY] ||, relaycountry=[:uquote|[:supplementary_info|RELAYCOUNTRY]]]#
[? [:supplementary_info|ASN] ||, asn=[:uquote|[:supplementary_info|ASN] [:supplementary_info|ASNCIDR]]]#
#[? [:supplementary_info|DCCB] ||, dcc=[:supplementary_info|DCCB]:[:uquote|[:supplementary_info|DCCR]]]#
#[? [:supplementary_info|DCCREP] ||, dcc_rep=[:supplementary_info|DCCREP]]#
#[:supplementary_info|AWLSIGNERMEAN|, signer_avg=%%s]#
#[? [:dkim|domain] ||, dkim_d=[:dkim|domain]]#
[? [:dkim|identity] ||, dkim_i=[:dkim|identity]]#
[? [:dkim|sig_sd] ||, dkim_sd=[:dkim|sig_sd]]#
[? [:dkim|newsig_sd] ||, dkim_new=[:dkim|newsig_sd]]#
[? [:rusage|ru_maxrss] ||, rss=[:rusage|ru_maxrss]]#
, %y ms#
]
__DATA__
#
# =============================================================================
# This text section governs how a main per-recipient amavisd-new log entry
# is formed (config variable $log_recip_templ). An empty text will prevent a
# log entry, multi-line text will produce multiple log entries, one for each
# nonempty line. Macro %. might be useful, it counts recipients starting
# from 1. Syntax is explained in the README.customize file.
# Long header fields will be automatically wrapped by the program.
#
[?%#D|#|Passed #
#([:ccat|name|main]) #
[? [:ccat|major] |OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER|SPAMMY|SPAM|\
UNCHECKED|BANNED (%F)|INFECTED (%V)]#
, [:mail_addr_decode_octets|%s] -> [%D|[:mail_addr_decode_octets|%D]|,], Hits: %c#
, tag=[:tag_level], tag2=[:tag2_level], kill=[:kill_level]#
[~[:remote_mta_smtp_response]|["^$"]||\
["queued as ([0-9A-Za-z]+)"]|[", queued_as: %1"]|[", fwd: %0"]]#
, %0/%1/%2/%k#
]
[?%#O|#|Blocked #
#([:ccat|name|blocking]) #
[? [:ccat|major|blocking] |#
OTHER|CLEAN|MTA-BLOCKED|OVERSIZED|BAD-HEADER|SPAMMY|SPAM|\
UNCHECKED|BANNED (%F)|INFECTED (%V)]#
, [:mail_addr_decode_octets|%s] -> [%D|[:mail_addr_decode_octets|%D]|,], Hits: %c#
, tag=[:tag_level], tag2=[:tag2_level], kill=[:kill_level]#
, %0/%1/%2/%k#
]
__DATA__
#
# =============================================================================
# This is a template for (neutral: non-virus, non-spam, non-banned)
# DELIVERY STATUS NOTIFICATIONS to sender.
# For syntax and customization instructions see README.customize.
# The From, To and Date header fields will be provided automatically.
# Long header fields will be automatically wrapped by the program.
#
Subject: [?%#D|Undeliverable mail|Delivery status notification]\
[? [:ccat|major] |||, MTA-BLOCKED\
|, OVERSIZED message\
|, invalid header section[=explain_badh|1]\
[?[:ccat|minor]||: bad MIME|: unencoded 8-bit character\
|: improper use of control char|: all-whitespace header line\
|: header line longer than 998 characters|: header field syntax error\
|: missing required header field|: duplicate header field|]\
|, UNSOLICITED BULK EMAIL apparently from you\
|, UNSOLICITED BULK EMAIL apparently from you\
|, contents UNCHECKED\
|, BANNED contents type (%F)\
|, VIRUS in message apparently from you (%V)\
]
Message-ID: <DSN%i@%h>
[? %#D |#|Your message WAS SUCCESSFULLY RELAYED to:\
[%D|\n [:mail_addr_decode|%D]|]
[~[:dsn_notify]|["\\bSUCCESS\\b"]|\
and you explicitly requested a delivery status notification on success.\n]\
]
[? %#N |#|The message WAS NOT relayed to:\
[%N|\n [:mail_addr_decode|%N]|]
]
[:wrap|78|||This [?%#D|nondelivery|delivery] report was \
generated by the program amavisd-new at host %h. \
Our internal reference code for your message is %n/%i]
# ccat_min 0: other, 1: bad MIME, 2: 8-bit char, 3: NUL/CR,
# 4: empty, 5: long, 6: syntax, 7: missing, 8: multiple
[? [:explain_badh] ||[? [:ccat|minor]
|INVALID HEADER
|INVALID HEADER: BAD MIME HEADER SECTION OR BAD MIME STRUCTURE
|INVALID HEADER: INVALID NON-ASCII CHARACTERS IN HEADER SECTION
|INVALID HEADER: INVALID CONTROL CHARACTERS IN HEADER SECTION
|INVALID HEADER: FOLDED HEADER FIELD LINE MADE UP ENTIRELY OF WHITESPACE
|INVALID HEADER: HEADER LINE LONGER THAN RFC 5322 LIMIT OF 998 CHARACTERS
|INVALID HEADER: HEADER FIELD SYNTAX ERROR
|INVALID HEADER: MISSING REQUIRED HEADER FIELD
|INVALID HEADER: DUPLICATE HEADER FIELD
|INVALID HEADER
]
[[:wrap|78| | |%X]\n]
]\
#
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? %#X|#|[? [:useragent] |#|[:wrap|78|| |[:useragent]]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
# ccat_min 0: other, 1: bad MIME, 2: 8-bit char, 3: NUL/CR,
# 4: empty, 5: long, 6: syntax, 7: missing, 8: multiple
[? [:explain_badh] ||[? [:ccat|minor]
|# 0: other
|# 1: bad MIME
|# 2: 8-bit char
WHAT IS AN INVALID CHARACTER IN A MAIL HEADER SECTION?
The RFC 5322 document specifies rules for forming internet messages.
It does not allow the use of characters with codes above 127 to be
used directly (non-encoded) in a mail header section.
If such characters (e.g. with diacritics, or non-Latin) from UTF-8
or other character set need to be included in a message header
section, such message needs to be submitted to an SMTPUTF8-capable
mailer (RFC 6532), or these characters need to be properly encoded
according to RFC 2047.
Necessary encoding is normally done transparently by a mail reader
or other mail generating software. If automatic encoding is not
available (e.g. by some old MUA) it is a user's responsibility
to avoid using such characters in a header section, or to encode
them manually. Typically offending header fields in this category
are 'Subject', 'Organization', and comment fields or display names
in e-mail addresses of 'From', 'To', or 'Cc'.
Sometimes such invalid header fields are inserted automatically
by some MUA, MTA, content filter, or other mail handling service.
If this is the case, such service needs to be fixed or properly
configured. Typically the offending header fields in this category
are 'Date', 'Received', 'X-Mailer', 'X-Priority', 'X-Scanned', etc.
If you don't know how to fix or avoid the problem, please report it
to _your_ postmaster or system manager.
#
[~[:useragent]|^X-Mailer:\\s*Microsoft Outlook Express 6\\.00|["
If using Microsoft Outlook Express as your MUA, make sure its
settings under:
Tools -> Options -> Send -> Mail Sending Format -> Plain & HTML
are: "MIME format" MUST BE selected,
and "Allow 8-bit characters in headers" MUST NOT be enabled!
"]]#
|# 3: NUL/CR
IMPROPER USE OF CONTROL CHARACTER IN A MESSAGE HEADER SECTION
The RFC 5322 document specifies rules for forming internet messages.
It does not allow the use of control characters NUL and bare CR
to be used directly in a mail header section.
|# 4: empty
IMPROPERLY FOLDED HEADER FIELD LINE MADE UP ENTIRELY OF WHITESPACE
The RFC 5322 document specifies rules for forming internet messages.
In section '3.2.2. Folding white space and comments' it explicitly
prohibits folding of header fields in such a way that any line of a
folded header field is made up entirely of white-space characters
(control characters SP and HTAB) and nothing else.
|# 5: long
HEADER LINE LONGER THAN RFC 5322 LIMIT OF 998 CHARACTERS
The RFC 5322 document specifies rules for forming internet messages.
Section '2.1.1. Line Length Limits' prohibits each line of a header
section to be more than 998 characters in length (excluding the CRLF).
|# 6: syntax
|# 7: missing
MISSING REQUIRED HEADER FIELD
The RFC 5322 document specifies rules for forming internet messages.
Section '3.6. Field Definitions' specifies that certain header fields
are required (origination date field and the "From:" originator field).
|# 8: multiple
DUPLICATE HEADER FIELD
The RFC 5322 document specifies rules for forming internet messages.
Section '3.6. Field Definitions' specifies that certain header fields
must not occur more than once in a message header section.
|# other
]]#
__DATA__
#
# =============================================================================
# This is a template for VIRUS/BANNED SENDER NOTIFICATIONS.
# For syntax and customization instructions see README.customize.
# The From, To and Date header fields will be provided automatically.
# Long header fields will be automatically wrapped by the program.
#
Subject: [? [:ccat|major]
|Clean message from you\
|Clean message from you\
|Clean message from you (MTA blocked)\
|OVERSIZED message from you\
|BAD-HEADER in message from you\
|Spam claiming to be from you\
|Spam claiming to be from you\
|A message with UNCHECKED contents from you\
|BANNED contents from you (%F)\
|VIRUS in message apparently from you (%V)\
]
[? %m |#|In-Reply-To: [:mail_addr_decode|%m]]
Message-ID: <VS%i@%h>
[? [:ccat|major] |Clean|Clean|MTA-BLOCKED|OVERSIZED|INVALID HEADER|\
Spammy|Spam|UNCHECKED contents|BANNED CONTENTS ALERT|VIRUS ALERT]
Our content checker found
[? %#V |#|[:wrap|78| | |[? %#V |viruses|virus|viruses]: %V]]
[? %#F |#|[:wrap|78| | |banned [? %#F |names|name|names]: %F]]
[? %#X |#|[[:wrap|78| | |%X]\n]]
in email presumably from you [:mail_addr_decode|%s]
to the following [? %#R |recipients|recipient|recipients]:\
[%R|\n-> [:mail_addr_decode|%R]|]
Our internal reference code for your message is %n/%i
[? %a |#|[:wrap|78|| |First upstream SMTP client IP address: [:client_addr_port] %g]]
[:wrap|78|| |Received trace: [ip_proto_trace_all|%x| < ]]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[? %#D |Delivery of the email was stopped!
]#
[? %#V ||Please check your system for viruses,
or ask your system administrator to do so.
]#
[? %#V |[? %#F ||#
The message [?%#D|has been blocked|triggered this warning] because it contains a component
(as a MIME part or nested within) with declared name
or MIME type or contents type violating our access policy.
To transfer contents that may be considered risky or unwanted
by site policies, or simply too large for mailing, please consider
publishing your content on the web, and only sending a URL of the
document to the recipient.
Depending on the recipient and sender site policies, with a little
effort it might still be possible to send any contents (including
viruses) using one of the following methods:
- encrypted using pgp, gpg or other encryption methods;
- wrapped in a password-protected or scrambled container or archive
(e.g.: zip -e, arj -g, arc g, rar -p, or other methods)
Note that if the contents is not intended to be secret, the
encryption key or password may be included in the same message
for recipient's convenience.
We are sorry for inconvenience if the contents was not malicious.
The purpose of these restrictions is to avoid the most common
propagation methods used by viruses and other malware. These often
exploit automatic mechanisms and security holes in more popular
mail readers. By requiring an explicit and decisive action from a
recipient to decode mail, a danger of automatic malware propagation
is largely reduced.
#
# Details of our mail restrictions policy are available at ...
]]#
__DATA__
#
# =============================================================================
# This is a template for non-spam (e.g. VIRUS,...) ADMINISTRATOR NOTIFICATIONS.
# For syntax and customization instructions see README.customize.
# Long header fields will be automatically wrapped by the program.
#
From: %f
Date: %d
Subject: [? [:ccat|major] |Clean mail|Clean mail|MTA-blocked mail|\
OVERSIZED mail|INVALID HEADER in mail|Spammy|Spam|UNCHECKED contents in mail|\
BANNED contents (%F) in mail|VIRUS (%V) in mail]\
FROM [?%l||LOCAL ][?%a||[:client_addr_port] ][:mail_addr_decode|%s]
To: [? %#T |undisclosed-recipients:;|[%T|, ]]
[? %#C |#|Cc: [%C|, ]]
Message-ID: <VA%i@%h>
[? %#V |No viruses were found.
|A virus was found: %V
|Two viruses were found:\n %V
|%#V viruses were found:\n %V
]
[? %#F |#|[:wrap|78|| |Banned [?%#F|names|name|names]: %F]]
[? %#X |#|Bad header:[\n[:wrap|78| | |%X]]]
[? %#W |#\
|Scanner detecting a virus: %W
|Scanners detecting a virus: %W
]
Content type: [:ccat|name|main]#
[? [:ccat|is_blocked_by_nonmain] ||, blocked for [:ccat|name]]
Internal reference code for the message is %n/%i
[? %a |#|[:wrap|78|| |First upstream SMTP client IP address: [:client_addr_port] %g]]
[:wrap|78|| |Received trace: [ip_proto_trace_all|%x| < ]]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[? %q |Not quarantined.|The message has been quarantined as: %q]
[? %#S |Notification to sender will not be mailed.
]#
[? %#D |#|The message WILL BE relayed to:[%D|\n[:mail_addr_decode|%D]|]
]
[? %#N |#|The message WAS NOT relayed to:[%N|\n[:mail_addr_decode|%N]|]
]
[? %#V |#|[? %#v |#|Virus scanner output:[\n %v]
]]
__DATA__
#
# =============================================================================
# This is a template for VIRUS/BANNED/BAD-HEADER RECIPIENTS NOTIFICATIONS.
# For syntax and customization instructions see README.customize.
# Long header fields will be automatically wrapped by the program.
#
From: %f
Date: %d
Subject: [? [:ccat|major] |Clean mail|Clean mail|MTA-blocked mail|\
OVERSIZED mail|INVALID HEADER in mail|Spammy|Spam|UNCHECKED contents in mail|\
BANNED contents (%F) in mail|VIRUS (%V) in mail] TO YOU from [:mail_addr_decode|%s]
[? [:header_field|To] |To: undisclosed-recipients:;|To: [:header_field|To]]
[? [:header_field|Cc] |#|Cc: [:header_field|Cc]]
Message-ID: <VR%i@%h>
[? %#V |[? %#F ||BANNED CONTENTS ALERT]|VIRUS ALERT]
Our content checker found
[? %#V |#|[:wrap|78| | |[?%#V|viruses|virus|viruses]: %V]]
[? %#F |#|[:wrap|78| | |banned [?%#F|names|name|names]: %F]]
[? %#X |#|[[:wrap|78| | |%X]\n]]
in an email to you [? %#V |from:|from probably faked sender:]
[:mail_addr_decode|%o]
[? %#V |#|claiming to be: [:mail_addr_decode|%s]]
Content type: [:ccat|name|main]#
[? [:ccat|is_blocked_by_nonmain] ||, blocked for [:ccat|name]]
Our internal reference code for your message is %n/%i
[? %a |#|[:wrap|78|| |First upstream SMTP client IP address: [:client_addr_port] %g]]
[:wrap|78|| |Received trace: [ip_proto_trace_all|%x| < ]]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? [:useragent] |#|[:wrap|78|| |[:useragent]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[? %q |Not quarantined.|The message has been quarantined as: %q]
Please contact your system administrator for details.
__DATA__
#
# =============================================================================
# This is a template for spam SENDER NOTIFICATIONS.
# For syntax and customization instructions see README.customize.
# The From, To and Date header fields will be provided automatically.
# Long header fields will be automatically wrapped by the program.
#
Subject: Considered UNSOLICITED BULK EMAIL, apparently from you
[? %m |#|In-Reply-To: [:mail_addr_decode|%m]]
Message-ID: <SS%i@%h>
A message from [:mail_addr_decode|%s]\
[%R|\nto: [:mail_addr_decode|%R]|]
was considered unsolicited bulk e-mail (UBE).
Our internal reference code for your message is %n/%i
The message carried your return address, so it was either a genuine mail
from you, or a sender address was faked and your e-mail address abused
by third party, in which case we apologize for undesired notification.
We do try to minimize backscatter for more prominent cases of UBE and
for infected mail, but for less obvious cases some balance between
losing genuine mail and sending undesired backscatter is sought,
and there can be some collateral damage on either side.
[? %a |#|[:wrap|78|| |First upstream SMTP client IP address: [:client_addr_port] %g]]
[:wrap|78|| |Received trace: [ip_proto_trace_all|%x| < ]]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
# [? [:useragent] |#|[:wrap|78|| |[:useragent]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[? %#X |#|\n[[:wrap|78|| |%X]\n]]
[? %#D |Delivery of the email was stopped!
]#
#
# Spam scanner report:
# [%A
# ]\
__DATA__
#
# =============================================================================
# This is a template for spam ADMINISTRATOR NOTIFICATIONS.
# For syntax and customization instructions see README.customize.
# Long header fields will be automatically wrapped by the program.
#
From: %f
Date: %d
Subject: Spam FROM [?%l||LOCAL ][?%a||[:client_addr_port] ][:mail_addr_decode|%s]
To: [? %#T |undisclosed-recipients:;|[%T|, ]]
[? %#C |#|Cc: [%C|, ]]
Message-ID: <SA%i@%h>
Content type: [:ccat|name|main]#
[? [:ccat|is_blocked_by_nonmain] ||, blocked for [:ccat|name]]
Internal reference code for the message is %n/%i
[? %a |#|[:wrap|78|| |First upstream SMTP client IP address: [:client_addr_port] %g]]
[:wrap|78|| |Received trace: [ip_proto_trace_all|%x| < ]]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? [:useragent] |#|[:wrap|78|| |[:useragent]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[? %q |Not quarantined.|The message has been quarantined as: %q]
[? %#D |#|The message WILL BE relayed to:[%D|\n[:mail_addr_decode|%D]|]
]
[? %#N |#|The message WAS NOT relayed to:[%N|\n[:mail_addr_decode|%N]|]
]
Spam scanner report:
[%A
]\
__DATA__
#
# =============================================================================
# This is a template for the plain text part of a RELEASE FROM A QUARANTINE,
# applicable if a chosen release format is 'attach' (not 'resend').
#
From: %f
Date: %d
Subject: \[released message\] %j
To: [? %#T |undisclosed-recipients:;|[%T|, ]]
[? %#C |#|Cc: [%C|, ]]
Message-ID: <QRA%i@%h>
Please find attached a message which was held in a quarantine,
and has now been released.
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s][?[:dkim|envsender]|| (OK)]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
# [? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
# [? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
# [? [:useragent] |#|[:wrap|78|| |[:useragent]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
Our internal reference code for the message is %n/%i
#
[~[:report_format]|["^attach$"]|["[? [:attachment_password] |#|
Contents of the attached mail message may pose a threat to your computer or
could be a social engineering deception, so it should be handled cautiously.
To prevent undesired automatic opening, the attached original mail message
has been wrapped in a password-protected ZIP archive.
Here is the password that allows opening of the attached archive:
[:attachment_password]
Note that the attachment is not strongly encrypted and the password
is not a strong secret (being displayed in this non-encrypted text),
so this attachment is not suitable for guarding a secret contents.
The sole purpose of this password protection it to prevent undesired
accidental or automatic opening of a message, either by some filtering
software, a virus scanner, or by a mail reader.
]"]|]#
__DATA__
#
# =============================================================================
# This is a template for the plain text part of a problem/feedback report,
# with either the original message included in-line, or attached,
# or the message is structured as a FEEDBACK REPORT NOTIFICATIONS format.
# See RFC 5965 - "An Extensible Format for Email Feedback Reports".
#
From: %f
Date: %d
Subject: Fw: %j
To: [? %#T |undisclosed-recipients:;|[%T|, ]]
[? %#C |#|Cc: [%C|, ]]
Message-ID: <ARF%i@%h>
#Auto-Submitted: auto-generated
This is an e-mail [:feedback_type] report for a message \
[? %a |\nreceived on %d,|received from\nIP address [:client_addr_port] on %d,]
[:wrap|78|| |Return-Path: [:mail_addr_decode|%s]]
[:wrap|78|| |From: [:mime_decode|[:header_field_octets|From]|100]\
[?[:dkim|author]|| (dkim:AUTHOR)]]
[? [:header_field|Sender]|#|\
[:wrap|78|| |Sender: [:mime_decode|[:header_field_octets|Sender]|100]\
[?[:dkim|sender]|| (dkim:SENDER)]]]
[? %m |#|[:wrap|78|| |Message-ID: [:mail_addr_decode|%m]]]
[? %r |#|[:wrap|78|| |Resent-Message-ID: [:mail_addr_decode|%r]]]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[?[:dkim|author]|#|
A first-party DKIM or DomainKeys signature is valid, d=[:dkim|author].]
Reporting-MTA: %h
Our internal reference code for the message is %n/%i
[~[:report_format]|["^(arf|attach|dsn)$"]|["\
A complete original message is attached.
[~[:report_format]|["^arf$"]|\
For more information on the ARF format please see RFC 5965.
]"]|["\
A complete original message in its pristine form follows:
"]]#
__DATA__
#
# =============================================================================
# This is a template for the plain text part of an auto response (e.g.
# vacation, out-of-office), see RFC 3834.
#
From: %f
Date: %d
To: [? %#T |undisclosed-recipients:;|[%T|, ]]
[? %#C |#|Cc: [%C|, ]]
Reply-To: postmaster@%h
Message-ID: <ARE%i@%h>
Auto-Submitted: auto-replied
[:wrap|76||\t|Subject: Auto: autoresponse to: [:mail_addr_decode|%s]]
[? %m |#|In-Reply-To: [:mail_addr_decode|%m]]
Precedence: junk
This is an auto-response to a message \
[? %a |\nreceived on %d,|received from\nIP address [:client_addr_port] on %d,]
envelope sender: [:mail_addr_decode|%s]
(author) From: [:rfc2822_from]
[? %j |#|[:wrap|78|| |Subject: [:mime_decode|[:header_field_octets|Subject]|100]]]
[?[:dkim|author]|#|
A first-party DKIM or DomainKeys signature is valid, d=[:dkim|author].]