line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
# <@LICENSE> |
2
|
|
|
|
|
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more |
3
|
|
|
|
|
|
|
# contributor license agreements. See the NOTICE file distributed with |
4
|
|
|
|
|
|
|
# this work for additional information regarding copyright ownership. |
5
|
|
|
|
|
|
|
# The ASF licenses this file to you under the Apache License, Version 2.0 |
6
|
|
|
|
|
|
|
# (the "License"); you may not use this file except in compliance with |
7
|
|
|
|
|
|
|
# the License. You may obtain a copy of the License at: |
8
|
|
|
|
|
|
|
# |
9
|
|
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0 |
10
|
|
|
|
|
|
|
# |
11
|
|
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software |
12
|
|
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, |
13
|
|
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
14
|
|
|
|
|
|
|
# See the License for the specific language governing permissions and |
15
|
|
|
|
|
|
|
# limitations under the License. |
16
|
|
|
|
|
|
|
# </@LICENSE> |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
=head1 NAME |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
Mail::SpamAssassin::Plugin::DKIM - perform DKIM verification tests |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
=head1 SYNOPSIS |
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
loadplugin Mail::SpamAssassin::Plugin::DKIM [/path/to/DKIM.pm] |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
Taking into account signatures from any signing domains: |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
full DKIM_SIGNED eval:check_dkim_signed() |
29
|
|
|
|
|
|
|
full DKIM_VALID eval:check_dkim_valid() |
30
|
|
|
|
|
|
|
full DKIM_VALID_AU eval:check_dkim_valid_author_sig() |
31
|
|
|
|
|
|
|
full DKIM_VALID_EF eval:check_dkim_valid_envelopefrom() |
32
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
Taking into account signatures from specified signing domains only: |
34
|
|
|
|
|
|
|
(quotes may be omitted on domain names consisting only of letters, digits, |
35
|
|
|
|
|
|
|
dots, and minus characters) |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
full DKIM_SIGNED_MY1 eval:check_dkim_signed('dom1','dom2',...) |
38
|
|
|
|
|
|
|
full DKIM_VALID_MY1 eval:check_dkim_valid('dom1','dom2',...) |
39
|
|
|
|
|
|
|
full DKIM_VALID_AU_MY1 eval:check_dkim_valid_author_sig('d1','d2',...) |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
full __DKIM_DEPENDABLE eval:check_dkim_dependable() |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
Author Domain Signing Practices (ADSP) from any author domains: |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
header DKIM_ADSP_NXDOMAIN eval:check_dkim_adsp('N') |
46
|
|
|
|
|
|
|
header DKIM_ADSP_ALL eval:check_dkim_adsp('A') |
47
|
|
|
|
|
|
|
header DKIM_ADSP_DISCARD eval:check_dkim_adsp('D') |
48
|
|
|
|
|
|
|
header DKIM_ADSP_CUSTOM_LOW eval:check_dkim_adsp('1') |
49
|
|
|
|
|
|
|
header DKIM_ADSP_CUSTOM_MED eval:check_dkim_adsp('2') |
50
|
|
|
|
|
|
|
header DKIM_ADSP_CUSTOM_HIGH eval:check_dkim_adsp('3') |
51
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
Author Domain Signing Practices (ADSP) from specified author domains only: |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
header DKIM_ADSP_MY1 eval:check_dkim_adsp('*','dom1','dom2',...) |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
describe DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid |
57
|
|
|
|
|
|
|
describe DKIM_VALID Message has at least one valid DKIM or DK signature |
58
|
|
|
|
|
|
|
describe DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain |
59
|
|
|
|
|
|
|
describe DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain |
60
|
|
|
|
|
|
|
describe __DKIM_DEPENDABLE A validation failure not attributable to truncation |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
describe DKIM_ADSP_NXDOMAIN Domain not in DNS and no valid author domain signature |
63
|
|
|
|
|
|
|
describe DKIM_ADSP_ALL Domain signs all mail, no valid author domain signature |
64
|
|
|
|
|
|
|
describe DKIM_ADSP_DISCARD Domain signs all mail and suggests discarding mail with no valid author domain signature, no valid author domain signature |
65
|
|
|
|
|
|
|
describe DKIM_ADSP_CUSTOM_LOW adsp_override is CUSTOM_LOW, no valid author domain signature |
66
|
|
|
|
|
|
|
describe DKIM_ADSP_CUSTOM_MED adsp_override is CUSTOM_MED, no valid author domain signature |
67
|
|
|
|
|
|
|
describe DKIM_ADSP_CUSTOM_HIGH adsp_override is CUSTOM_HIGH, no valid author domain signature |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
For compatibility with pre-3.3.0 versions, the following are synonyms: |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
OLD: eval:check_dkim_verified = NEW: eval:check_dkim_valid |
72
|
|
|
|
|
|
|
OLD: eval:check_dkim_signall = NEW: eval:check_dkim_adsp('A') |
73
|
|
|
|
|
|
|
OLD: eval:check_dkim_signsome = NEW: redundant, semantically always true |
74
|
|
|
|
|
|
|
|
75
|
|
|
|
|
|
|
The __DKIM_DEPENDABLE eval rule deserves an explanation. The rule yields true |
76
|
|
|
|
|
|
|
when signatures are supplied by a caller, OR ELSE when signatures are obtained |
77
|
|
|
|
|
|
|
by this plugin AND either there are no signatures OR a rule __TRUNCATED was |
78
|
|
|
|
|
|
|
false. In other words: __DKIM_DEPENDABLE is true when failed signatures can |
79
|
|
|
|
|
|
|
not be attributed to message truncation when feeding a message to SpamAssassin. |
80
|
|
|
|
|
|
|
It can be consulted to prevent false positives on large but truncated messages |
81
|
|
|
|
|
|
|
with poor man's implementation of ADSP by hand-crafted rules. |
82
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
=head1 DESCRIPTION |
84
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
This SpamAssassin plugin implements DKIM lookups as described by the RFC 4871, |
86
|
|
|
|
|
|
|
as well as historical DomainKeys lookups, as described by RFC 4870, thanks |
87
|
|
|
|
|
|
|
to the support for both types of signatures by newer versions of module |
88
|
|
|
|
|
|
|
Mail::DKIM. |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
It requires the C<Mail::DKIM> CPAN module to operate. Many thanks to Jason Long |
91
|
|
|
|
|
|
|
for that module. |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
=head1 TAGS |
94
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
The following tags are added to the set, available for use in reports, |
96
|
|
|
|
|
|
|
header fields, other plugins, etc.: |
97
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
_DKIMIDENTITY_ |
99
|
|
|
|
|
|
|
Agent or User Identifier (AUID) (the 'i' tag) from valid signatures; |
100
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
_DKIMDOMAIN_ |
102
|
|
|
|
|
|
|
Signing Domain Identifier (SDID) (the 'd' tag) from valid signatures; |
103
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
_DKIMSELECTOR_ |
105
|
|
|
|
|
|
|
DKIM selector (the 's' tag) from valid signatures; |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
Identities and domains from signatures which failed verification are not |
108
|
|
|
|
|
|
|
included in these tags. Duplicates are eliminated (e.g. when there are two or |
109
|
|
|
|
|
|
|
more valid signatures from the same signer, only one copy makes it into a tag). |
110
|
|
|
|
|
|
|
Note that there may be more than one signature in a message - currently they |
111
|
|
|
|
|
|
|
are provided as a space-separated list, although this behaviour may change. |
112
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
=head1 SEE ALSO |
114
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
C<Mail::DKIM> Mail::SpamAssassin::Plugin(3) |
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
http://dkimproxy.sourceforge.net/ |
118
|
|
|
|
|
|
|
https://tools.ietf.org/rfc/rfc4871.txt |
119
|
|
|
|
|
|
|
https://tools.ietf.org/rfc/rfc4870.txt |
120
|
|
|
|
|
|
|
https://tools.ietf.org/rfc/rfc5617.txt |
121
|
|
|
|
|
|
|
https://datatracker.ietf.org/group/dkim/about/ |
122
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
=cut |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
use Mail::SpamAssassin::Plugin; |
127
|
22
|
|
|
22
|
|
338
|
use Mail::SpamAssassin::Logger; |
|
22
|
|
|
|
|
47
|
|
|
22
|
|
|
|
|
575
|
|
128
|
22
|
|
|
22
|
|
122
|
use Mail::SpamAssassin::Timeout; |
|
22
|
|
|
|
|
66
|
|
|
22
|
|
|
|
|
1328
|
|
129
|
22
|
|
|
22
|
|
2976
|
|
|
22
|
|
|
|
|
66
|
|
|
22
|
|
|
|
|
910
|
|
130
|
|
|
|
|
|
|
use strict; |
131
|
22
|
|
|
22
|
|
101
|
use warnings; |
|
22
|
|
|
|
|
179
|
|
|
22
|
|
|
|
|
472
|
|
132
|
22
|
|
|
22
|
|
93
|
# use bytes; |
|
22
|
|
|
|
|
40
|
|
|
22
|
|
|
|
|
558
|
|
133
|
|
|
|
|
|
|
use re 'taint'; |
134
|
22
|
|
|
22
|
|
216
|
|
|
22
|
|
|
|
|
1455
|
|
|
22
|
|
|
|
|
42765
|
|
135
|
|
|
|
|
|
|
our @ISA = qw(Mail::SpamAssassin::Plugin); |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
# constructor: register the eval rule |
138
|
|
|
|
|
|
|
my $class = shift; |
139
|
|
|
|
|
|
|
my $mailsaobject = shift; |
140
|
63
|
|
|
63
|
1
|
191
|
|
141
|
63
|
|
|
|
|
151
|
$class = ref($class) || $class; |
142
|
|
|
|
|
|
|
my $self = $class->SUPER::new($mailsaobject); |
143
|
63
|
|
33
|
|
|
471
|
bless ($self, $class); |
144
|
63
|
|
|
|
|
385
|
|
145
|
63
|
|
|
|
|
183
|
# signatures |
146
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_signed"); |
147
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_valid"); |
148
|
63
|
|
|
|
|
312
|
$self->register_eval_rule("check_dkim_valid_author_sig"); |
149
|
63
|
|
|
|
|
185
|
$self->register_eval_rule("check_dkim_testing"); |
150
|
63
|
|
|
|
|
227
|
$self->register_eval_rule("check_dkim_valid_envelopefrom"); |
151
|
63
|
|
|
|
|
189
|
|
152
|
63
|
|
|
|
|
204
|
# author domain signing practices |
153
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_adsp"); |
154
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_dependable"); |
155
|
63
|
|
|
|
|
191
|
|
156
|
63
|
|
|
|
|
203
|
# whitelisting |
157
|
|
|
|
|
|
|
$self->register_eval_rule("check_for_dkim_whitelist_from"); |
158
|
|
|
|
|
|
|
$self->register_eval_rule("check_for_def_dkim_whitelist_from"); |
159
|
63
|
|
|
|
|
207
|
|
160
|
63
|
|
|
|
|
201
|
# old names (aliases) for compatibility |
161
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_verified"); # = check_dkim_valid |
162
|
|
|
|
|
|
|
$self->register_eval_rule("check_dkim_signall"); # = check_dkim_adsp('A') |
163
|
63
|
|
|
|
|
177
|
$self->register_eval_rule("check_dkim_signsome"); # redundant, always false |
164
|
63
|
|
|
|
|
209
|
|
165
|
63
|
|
|
|
|
175
|
$self->set_config($mailsaobject->{conf}); |
166
|
|
|
|
|
|
|
|
167
|
63
|
|
|
|
|
247
|
return $self; |
168
|
|
|
|
|
|
|
} |
169
|
63
|
|
|
|
|
582
|
|
170
|
|
|
|
|
|
|
########################################################################### |
171
|
|
|
|
|
|
|
|
172
|
|
|
|
|
|
|
my($self, $conf) = @_; |
173
|
|
|
|
|
|
|
my @cmds; |
174
|
|
|
|
|
|
|
|
175
|
63
|
|
|
63
|
0
|
149
|
=head1 USER SETTINGS |
176
|
63
|
|
|
|
|
119
|
|
177
|
|
|
|
|
|
|
=over 4 |
178
|
|
|
|
|
|
|
|
179
|
|
|
|
|
|
|
=item whitelist_from_dkim author@example.com [signing-domain] |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
Works similarly to whitelist_from, except that in addition to matching |
182
|
|
|
|
|
|
|
an author address (From) to the pattern in the first parameter, the message |
183
|
|
|
|
|
|
|
must also carry a valid Domain Keys Identified Mail (DKIM) signature made by |
184
|
|
|
|
|
|
|
a signing domain (SDID, i.e. the d= tag) that is acceptable to us. |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
Only one whitelist entry is allowed per line, as in C<whitelist_from_rcvd>. |
187
|
|
|
|
|
|
|
Multiple C<whitelist_from_dkim> lines are allowed. File-glob style characters |
188
|
|
|
|
|
|
|
are allowed for the From address (the first parameter), just like with |
189
|
|
|
|
|
|
|
C<whitelist_from_rcvd>. |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
The second parameter (the signing-domain) does not accept full file-glob style |
192
|
|
|
|
|
|
|
wildcards, although a simple '*.' (or just a '.') prefix to a domain name |
193
|
|
|
|
|
|
|
is recognized and implies any subdomain of the specified domain (but not |
194
|
|
|
|
|
|
|
the domain itself). |
195
|
|
|
|
|
|
|
|
196
|
|
|
|
|
|
|
If no signing-domain parameter is specified, the only acceptable signature |
197
|
|
|
|
|
|
|
will be an Author Domain Signature (sometimes called first-party signature) |
198
|
|
|
|
|
|
|
which is a signature where the signing domain (SDID) of a signature matches |
199
|
|
|
|
|
|
|
the domain of the author's address (i.e. the address in a From header field). |
200
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
Since this whitelist requires a DKIM check to be made, network tests must |
202
|
|
|
|
|
|
|
be enabled. |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
Examples of whitelisting based on an author domain signature (first-party): |
205
|
|
|
|
|
|
|
|
206
|
|
|
|
|
|
|
whitelist_from_dkim joe@example.com |
207
|
|
|
|
|
|
|
whitelist_from_dkim *@corp.example.com |
208
|
|
|
|
|
|
|
whitelist_from_dkim *@*.example.com |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
Examples of whitelisting based on third-party signatures: |
211
|
|
|
|
|
|
|
|
212
|
|
|
|
|
|
|
whitelist_from_dkim jane@example.net example.org |
213
|
|
|
|
|
|
|
whitelist_from_dkim rick@info.example.net example.net |
214
|
|
|
|
|
|
|
whitelist_from_dkim *@info.example.net example.net |
215
|
|
|
|
|
|
|
whitelist_from_dkim *@* mail7.remailer.example.com |
216
|
|
|
|
|
|
|
whitelist_from_dkim *@* *.remailer.example.com |
217
|
|
|
|
|
|
|
|
218
|
|
|
|
|
|
|
=item def_whitelist_from_dkim author@example.com [signing-domain] |
219
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
Same as C<whitelist_from_dkim>, but used for the default whitelist entries |
221
|
|
|
|
|
|
|
in the SpamAssassin distribution. The whitelist score is lower, because |
222
|
|
|
|
|
|
|
these are often targets for abuse of public mailers which sign their mail. |
223
|
|
|
|
|
|
|
|
224
|
|
|
|
|
|
|
=item unwhitelist_from_dkim author@example.com [signing-domain] |
225
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
Removes an email address with its corresponding signing-domain field |
227
|
|
|
|
|
|
|
from def_whitelist_from_dkim and whitelist_from_dkim tables, if it exists. |
228
|
|
|
|
|
|
|
Parameters to unwhitelist_from_dkim must exactly match the parameters of |
229
|
|
|
|
|
|
|
a corresponding whitelist_from_dkim or def_whitelist_from_dkim config |
230
|
|
|
|
|
|
|
option which created the entry, for it to be removed (a domain name is |
231
|
|
|
|
|
|
|
matched case-insensitively); i.e. if a signing-domain parameter was |
232
|
|
|
|
|
|
|
specified in a whitelisting command, it must also be specified in the |
233
|
|
|
|
|
|
|
unwhitelisting command. |
234
|
|
|
|
|
|
|
|
235
|
|
|
|
|
|
|
Useful for removing undesired default entries from a distributed configuration |
236
|
|
|
|
|
|
|
by a local or site-specific configuration or by C<user_prefs>. |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
=item adsp_override domain [signing-practices] |
239
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
Currently few domains publish their signing practices (RFC 5617 - ADSP), |
241
|
|
|
|
|
|
|
partly because the ADSP rfc is rather new, partly because they think |
242
|
|
|
|
|
|
|
hardly any recipient bothers to check it, and partly for fear that some |
243
|
|
|
|
|
|
|
recipients might lose mail due to problems in their signature validation |
244
|
|
|
|
|
|
|
procedures or mail mangling by mailers beyond their control. |
245
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
Nevertheless, recipients could benefit by knowing signing practices of a |
247
|
|
|
|
|
|
|
sending (author's) domain, for example to recognize forged mail claiming |
248
|
|
|
|
|
|
|
to be from certain domains which are popular targets for phishing, like |
249
|
|
|
|
|
|
|
financial institutions. Unfortunately, as signing practices are seldom |
250
|
|
|
|
|
|
|
published or are weak, it is hardly justifiable to look them up in DNS. |
251
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
To overcome this chicken-or-the-egg problem, the C<adsp_override> mechanism |
253
|
|
|
|
|
|
|
allows recipients using SpamAssassin to override published or defaulted |
254
|
|
|
|
|
|
|
ADSP for certain domains. This makes it possible to manually specify a |
255
|
|
|
|
|
|
|
stronger (or weaker) signing practices than a signing domain is willing |
256
|
|
|
|
|
|
|
to publish (explicitly or by default), and also save on a DNS lookup. |
257
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
Note that ADSP (published or overridden) is only consulted for messages |
259
|
|
|
|
|
|
|
which do not contain a valid DKIM signature from the author's domain. |
260
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
According to RFC 5617, signing practices can be one of the following: |
262
|
|
|
|
|
|
|
C<unknown>, C<all> and C<discardable>. |
263
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
C<unknown>: The domain might sign some or all email - messages from the |
265
|
|
|
|
|
|
|
domain may or may not have an Author Domain Signature. This is a default |
266
|
|
|
|
|
|
|
if a domain exists in DNS but no ADSP record is found. |
267
|
|
|
|
|
|
|
|
268
|
|
|
|
|
|
|
C<all>: All mail from the domain is signed with an Author Domain Signature. |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
C<discardable>: All mail from the domain is signed with an Author Domain |
271
|
|
|
|
|
|
|
Signature. Furthermore, if a message arrives without a valid Author Domain |
272
|
|
|
|
|
|
|
Signature, the domain encourages the recipient(s) to discard it. |
273
|
|
|
|
|
|
|
|
274
|
|
|
|
|
|
|
ADSP lookup can also determine that a domain is "out of scope", i.e., the |
275
|
|
|
|
|
|
|
domain does not exist (NXDOMAIN) in the DNS. |
276
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
To override domain's signing practices in a SpamAssassin configuration file, |
278
|
|
|
|
|
|
|
specify an C<adsp_override> directive for each sending domain to be overridden. |
279
|
|
|
|
|
|
|
|
280
|
|
|
|
|
|
|
Its first argument is a domain name. Author's domain is matched against it, |
281
|
|
|
|
|
|
|
matching is case insensitive. This is not a regular expression or a file-glob |
282
|
|
|
|
|
|
|
style wildcard, but limited wildcarding is still available: if this argument |
283
|
|
|
|
|
|
|
starts by a "*." (or is a sole "*"), author's domain matches if it is a |
284
|
|
|
|
|
|
|
subdomain (to one or more levels) of the argument. Otherwise (with no leading |
285
|
|
|
|
|
|
|
asterisk) the match must be exact (not a subdomain). |
286
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
An optional second parameter is one of the following keywords |
288
|
|
|
|
|
|
|
(case-insensitive): C<nxdomain>, C<unknown>, C<all>, C<discardable>, |
289
|
|
|
|
|
|
|
C<custom_low>, C<custom_med>, C<custom_high>. |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
Absence of this second parameter implies C<discardable>. If a domain is not |
292
|
|
|
|
|
|
|
listed by a C<adsp_override> directive nor does it explicitly publish any |
293
|
|
|
|
|
|
|
ADSP record, then C<unknown> is implied for valid domains, and C<nxdomain> |
294
|
|
|
|
|
|
|
for domains not existing in DNS. (Note: domain validity is only checked with |
295
|
|
|
|
|
|
|
versions of Mail::DKIM 0.37 or later (actually since 0.36_5), the C<nxdomain> |
296
|
|
|
|
|
|
|
would never turn up with older versions). |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
The strong setting C<discardable> is useful for domains which are known |
299
|
|
|
|
|
|
|
to always sign their mail and to always send it directly to recipients |
300
|
|
|
|
|
|
|
(not to mailing lists), and are frequent targets of fishing attempts, |
301
|
|
|
|
|
|
|
such as financial institutions. The C<discardable> is also appropriate |
302
|
|
|
|
|
|
|
for domains which are known never to send any mail. |
303
|
|
|
|
|
|
|
|
304
|
|
|
|
|
|
|
When a message does not contain a valid signature by the author's domain |
305
|
|
|
|
|
|
|
(the domain in a From header field), the signing practices pertaining |
306
|
|
|
|
|
|
|
to author's domain determine which of the following rules fire and |
307
|
|
|
|
|
|
|
contributes its score: DKIM_ADSP_NXDOMAIN, DKIM_ADSP_ALL, DKIM_ADSP_DISCARD, |
308
|
|
|
|
|
|
|
DKIM_ADSP_CUSTOM_LOW, DKIM_ADSP_CUSTOM_MED, DKIM_ADSP_CUSTOM_HIGH. Not more |
309
|
|
|
|
|
|
|
than one of these rules can fire for messages that have one author (but see |
310
|
|
|
|
|
|
|
below). The last three can only result from a 'signing-practices' as given |
311
|
|
|
|
|
|
|
in a C<adsp_override> directive (not from a DNS lookup), and can serve as |
312
|
|
|
|
|
|
|
a convenient means of providing a different score if scores assigned to |
313
|
|
|
|
|
|
|
DKIM_ADSP_ALL or DKIM_ADSP_DISCARD are not considered suitable for some |
314
|
|
|
|
|
|
|
domains. |
315
|
|
|
|
|
|
|
|
316
|
|
|
|
|
|
|
RFC 5322 permits a message to have more than one author - multiple addresses |
317
|
|
|
|
|
|
|
may be listed in a single From header field. RFC 5617 defines that a message |
318
|
|
|
|
|
|
|
with multiple authors has multiple signing domain signing practices, but does |
319
|
|
|
|
|
|
|
not prescribe how these should be combined. In presence of multiple signing |
320
|
|
|
|
|
|
|
practices, more than one of the DKIM_ADSP_* rules may fire. |
321
|
|
|
|
|
|
|
|
322
|
|
|
|
|
|
|
As a precaution against firing DKIM_ADSP_* rules when there is a known local |
323
|
|
|
|
|
|
|
reason for a signature verification failure, the domain's ADSP is considered |
324
|
|
|
|
|
|
|
'unknown' when DNS lookups are disabled or a DNS lookup encountered a temporary |
325
|
|
|
|
|
|
|
problem on fetching a public key from the author's domain. Similarly, ADSP |
326
|
|
|
|
|
|
|
is considered 'unknown' when this plugin did its own signature verification |
327
|
|
|
|
|
|
|
(signatures were not passed to SA by a caller) and a metarule __TRUNCATED was |
328
|
|
|
|
|
|
|
triggered, indicating the caller intentionally passed a truncated message to |
329
|
|
|
|
|
|
|
SpamAssassin, which was a likely reason for a signature verification failure. |
330
|
|
|
|
|
|
|
|
331
|
|
|
|
|
|
|
Example: |
332
|
|
|
|
|
|
|
|
333
|
|
|
|
|
|
|
adsp_override *.mydomain.example.com discardable |
334
|
|
|
|
|
|
|
adsp_override *.neversends.example.com discardable |
335
|
|
|
|
|
|
|
|
336
|
|
|
|
|
|
|
adsp_override ebay.com |
337
|
|
|
|
|
|
|
adsp_override *.ebay.com |
338
|
|
|
|
|
|
|
adsp_override ebay.co.uk |
339
|
|
|
|
|
|
|
adsp_override *.ebay.co.uk |
340
|
|
|
|
|
|
|
adsp_override paypal.com |
341
|
|
|
|
|
|
|
adsp_override *.paypal.com |
342
|
|
|
|
|
|
|
adsp_override amazon.com |
343
|
|
|
|
|
|
|
adsp_override ealerts.bankofamerica.com |
344
|
|
|
|
|
|
|
adsp_override americangreetings.com |
345
|
|
|
|
|
|
|
adsp_override egreetings.com |
346
|
|
|
|
|
|
|
adsp_override bluemountain.com |
347
|
|
|
|
|
|
|
adsp_override hallmark.com all |
348
|
|
|
|
|
|
|
adsp_override *.hallmark.com all |
349
|
|
|
|
|
|
|
adsp_override youtube.com custom_high |
350
|
|
|
|
|
|
|
adsp_override google.com custom_low |
351
|
|
|
|
|
|
|
adsp_override gmail.com custom_low |
352
|
|
|
|
|
|
|
adsp_override googlemail.com custom_low |
353
|
|
|
|
|
|
|
adsp_override yahoo.com custom_low |
354
|
|
|
|
|
|
|
adsp_override yahoo.com.au custom_low |
355
|
|
|
|
|
|
|
adsp_override yahoo.se custom_low |
356
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
adsp_override junkmailerkbw0rr.com nxdomain |
358
|
|
|
|
|
|
|
adsp_override junkmailerd2hlsg.com nxdomain |
359
|
|
|
|
|
|
|
|
360
|
|
|
|
|
|
|
# effectively disables ADSP network DNS lookups for all other domains: |
361
|
|
|
|
|
|
|
adsp_override * unknown |
362
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
score DKIM_ADSP_ALL 2.5 |
364
|
|
|
|
|
|
|
score DKIM_ADSP_DISCARD 25 |
365
|
|
|
|
|
|
|
score DKIM_ADSP_NXDOMAIN 3 |
366
|
|
|
|
|
|
|
|
367
|
|
|
|
|
|
|
score DKIM_ADSP_CUSTOM_LOW 1 |
368
|
|
|
|
|
|
|
score DKIM_ADSP_CUSTOM_MED 3.5 |
369
|
|
|
|
|
|
|
score DKIM_ADSP_CUSTOM_HIGH 8 |
370
|
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
=item dkim_minimum_key_bits n (default: 1024) |
373
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
The smallest size of a signing key (in bits) for a valid signature to be |
375
|
|
|
|
|
|
|
considered for whitelisting. Additionally, the eval function check_dkim_valid() |
376
|
|
|
|
|
|
|
will return false on short keys when called with explicitly listed domains, |
377
|
|
|
|
|
|
|
and the eval function check_dkim_valid_author_sig() will return false on short |
378
|
|
|
|
|
|
|
keys (regardless of its arguments). Setting the option to 0 disables a key |
379
|
|
|
|
|
|
|
size check. |
380
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
Note that the option has no effect when the eval function check_dkim_valid() |
382
|
|
|
|
|
|
|
is called with no arguments (like in a rule DKIM_VALID). A mere presence of |
383
|
|
|
|
|
|
|
some valid signature on a message has no reputational value (without being |
384
|
|
|
|
|
|
|
associated with a particular domain), regardless of its key size - anyone can |
385
|
|
|
|
|
|
|
prepend its own signature on a copy of some third party mail and re-send it, |
386
|
|
|
|
|
|
|
which makes it no more trustworthy than without such signature. This is also |
387
|
|
|
|
|
|
|
a reason for a rule DKIM_VALID to have a near-zero score, i.e. a rule hit |
388
|
|
|
|
|
|
|
is only informational. |
389
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
=cut |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
push (@cmds, { |
393
|
|
|
|
|
|
|
setting => 'whitelist_from_dkim', |
394
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_ADDRLIST, |
395
|
|
|
|
|
|
|
code => sub { |
396
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
397
|
|
|
|
|
|
|
local ($1,$2); |
398
|
|
|
|
|
|
|
unless (defined $value && $value !~ /^$/) { |
399
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
400
|
0
|
|
|
|
|
0
|
} |
401
|
0
|
0
|
0
|
|
|
0
|
unless ($value =~ /^(\S+)(?:\s+(\S+))?$/) { |
402
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
403
|
|
|
|
|
|
|
} |
404
|
0
|
0
|
|
|
|
0
|
my $address = $1; |
405
|
0
|
|
|
|
|
0
|
my $sdid = defined $2 ? $2 : ''; # empty implies author domain signature |
406
|
|
|
|
|
|
|
$address =~ s/(\@[^@]*)\z/lc($1)/e; # lowercase the email address domain |
407
|
0
|
|
|
|
|
0
|
$self->{parser}->add_to_addrlist_dkim('whitelist_from_dkim', |
408
|
0
|
0
|
|
|
|
0
|
$address, lc $sdid); |
409
|
0
|
|
|
|
|
0
|
} |
|
0
|
|
|
|
|
0
|
|
410
|
0
|
|
|
|
|
0
|
}); |
411
|
|
|
|
|
|
|
|
412
|
|
|
|
|
|
|
push (@cmds, { |
413
|
63
|
|
|
|
|
576
|
setting => 'def_whitelist_from_dkim', |
414
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_ADDRLIST, |
415
|
|
|
|
|
|
|
code => sub { |
416
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
417
|
|
|
|
|
|
|
local ($1,$2); |
418
|
|
|
|
|
|
|
unless (defined $value && $value !~ /^$/) { |
419
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
420
|
0
|
|
|
|
|
0
|
} |
421
|
0
|
0
|
0
|
|
|
0
|
unless ($value =~ /^(\S+)(?:\s+(\S+))?$/) { |
422
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
423
|
|
|
|
|
|
|
} |
424
|
0
|
0
|
|
|
|
0
|
my $address = $1; |
425
|
0
|
|
|
|
|
0
|
my $sdid = defined $2 ? $2 : ''; # empty implies author domain signature |
426
|
|
|
|
|
|
|
$address =~ s/(\@[^@]*)\z/lc($1)/e; # lowercase the email address domain |
427
|
0
|
|
|
|
|
0
|
$self->{parser}->add_to_addrlist_dkim('def_whitelist_from_dkim', |
428
|
0
|
0
|
|
|
|
0
|
$address, lc $sdid); |
429
|
0
|
|
|
|
|
0
|
} |
|
0
|
|
|
|
|
0
|
|
430
|
0
|
|
|
|
|
0
|
}); |
431
|
|
|
|
|
|
|
|
432
|
|
|
|
|
|
|
push (@cmds, { |
433
|
63
|
|
|
|
|
478
|
setting => 'unwhitelist_from_dkim', |
434
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_ADDRLIST, |
435
|
|
|
|
|
|
|
code => sub { |
436
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
437
|
|
|
|
|
|
|
local ($1,$2); |
438
|
|
|
|
|
|
|
unless (defined $value && $value !~ /^$/) { |
439
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
440
|
0
|
|
|
|
|
0
|
} |
441
|
0
|
0
|
0
|
|
|
0
|
unless ($value =~ /^(\S+)(?:\s+(\S+))?$/) { |
442
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
443
|
|
|
|
|
|
|
} |
444
|
0
|
0
|
|
|
|
0
|
my $address = $1; |
445
|
0
|
|
|
|
|
0
|
my $sdid = defined $2 ? $2 : ''; # empty implies author domain signature |
446
|
|
|
|
|
|
|
$address =~ s/(\@[^@]*)\z/lc($1)/e; # lowercase the email address domain |
447
|
0
|
|
|
|
|
0
|
$self->{parser}->remove_from_addrlist_dkim('whitelist_from_dkim', |
448
|
0
|
0
|
|
|
|
0
|
$address, lc $sdid); |
449
|
0
|
|
|
|
|
0
|
$self->{parser}->remove_from_addrlist_dkim('def_whitelist_from_dkim', |
|
0
|
|
|
|
|
0
|
|
450
|
0
|
|
|
|
|
0
|
$address, lc $sdid); |
451
|
|
|
|
|
|
|
} |
452
|
0
|
|
|
|
|
0
|
}); |
453
|
|
|
|
|
|
|
|
454
|
|
|
|
|
|
|
push (@cmds, { |
455
|
63
|
|
|
|
|
456
|
setting => 'adsp_override', |
456
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
457
|
|
|
|
|
|
|
code => sub { |
458
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
459
|
|
|
|
|
|
|
local ($1,$2); |
460
|
|
|
|
|
|
|
unless (defined $value && $value !~ /^$/) { |
461
|
305
|
|
|
305
|
|
920
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
462
|
305
|
|
|
|
|
754
|
} |
463
|
305
|
50
|
33
|
|
|
1596
|
unless ($value =~ /^ \@? ( [*a-z0-9._-]+ ) |
464
|
0
|
|
|
|
|
0
|
(?: \s+ (nxdomain|unknown|all|discardable| |
465
|
|
|
|
|
|
|
custom_low|custom_med|custom_high) )?$/ix) { |
466
|
305
|
50
|
|
|
|
1459
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
467
|
|
|
|
|
|
|
} |
468
|
|
|
|
|
|
|
my $domain = lc $1; # author's domain |
469
|
0
|
|
|
|
|
0
|
my $adsp = $2; # author domain signing practices |
470
|
|
|
|
|
|
|
$adsp = 'discardable' if !defined $adsp; |
471
|
305
|
|
|
|
|
916
|
$adsp = lc $adsp; |
472
|
305
|
|
|
|
|
635
|
if ($adsp eq 'custom_low' ) { $adsp = '1' } |
473
|
305
|
100
|
|
|
|
749
|
elsif ($adsp eq 'custom_med' ) { $adsp = '2' } |
474
|
305
|
|
|
|
|
613
|
elsif ($adsp eq 'custom_high') { $adsp = '3' } |
475
|
305
|
50
|
|
|
|
1063
|
else { $adsp = uc substr($adsp,0,1) } # N/U/A/D/1/2/3 |
|
0
|
50
|
|
|
|
0
|
|
|
|
50
|
|
|
|
|
|
476
|
0
|
|
|
|
|
0
|
$self->{parser}->{conf}->{adsp_override}->{$domain} = $adsp; |
477
|
0
|
|
|
|
|
0
|
} |
478
|
305
|
|
|
|
|
912
|
}); |
479
|
305
|
|
|
|
|
2093
|
|
480
|
|
|
|
|
|
|
# minimal signing key size in bits that is acceptable for whitelisting |
481
|
63
|
|
|
|
|
451
|
push (@cmds, { |
482
|
|
|
|
|
|
|
setting => 'dkim_minimum_key_bits', |
483
|
|
|
|
|
|
|
default => 1024, |
484
|
63
|
|
|
|
|
274
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_NUMERIC, |
485
|
|
|
|
|
|
|
}); |
486
|
|
|
|
|
|
|
|
487
|
|
|
|
|
|
|
=back |
488
|
|
|
|
|
|
|
|
489
|
|
|
|
|
|
|
=head1 ADMINISTRATOR SETTINGS |
490
|
|
|
|
|
|
|
|
491
|
|
|
|
|
|
|
=over 4 |
492
|
|
|
|
|
|
|
|
493
|
|
|
|
|
|
|
=item dkim_timeout n (default: 5) |
494
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
How many seconds to wait for a DKIM query to complete, before scanning |
496
|
|
|
|
|
|
|
continues without the DKIM result. A numeric value is optionally suffixed |
497
|
|
|
|
|
|
|
by a time unit (s, m, h, d, w, indicating seconds (default), minutes, hours, |
498
|
|
|
|
|
|
|
days, weeks). |
499
|
|
|
|
|
|
|
|
500
|
|
|
|
|
|
|
=back |
501
|
|
|
|
|
|
|
|
502
|
|
|
|
|
|
|
=cut |
503
|
|
|
|
|
|
|
|
504
|
|
|
|
|
|
|
push (@cmds, { |
505
|
|
|
|
|
|
|
setting => 'dkim_timeout', |
506
|
|
|
|
|
|
|
is_admin => 1, |
507
|
63
|
|
|
|
|
284
|
default => 5, |
508
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_DURATION |
509
|
|
|
|
|
|
|
}); |
510
|
|
|
|
|
|
|
|
511
|
|
|
|
|
|
|
$conf->{parser}->register_commands(\@cmds); |
512
|
|
|
|
|
|
|
} |
513
|
|
|
|
|
|
|
|
514
|
63
|
|
|
|
|
309
|
# --------------------------------------------------------------------------- |
515
|
|
|
|
|
|
|
|
516
|
|
|
|
|
|
|
my ($self, $pms, $full_ref, @acceptable_domains) = @_; |
517
|
|
|
|
|
|
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
518
|
|
|
|
|
|
|
my $result = 0; |
519
|
|
|
|
|
|
|
if (!$pms->{dkim_signed}) { |
520
|
81
|
|
|
81
|
0
|
187
|
# don't bother |
521
|
81
|
50
|
|
|
|
221
|
} elsif (!@acceptable_domains) { |
522
|
81
|
|
|
|
|
116
|
$result = 1; # no additional constraints, any signing domain will do |
523
|
81
|
50
|
|
|
|
295
|
} else { |
|
|
0
|
|
|
|
|
|
524
|
|
|
|
|
|
|
$result = $self->_check_dkim_signed_by($pms,0,0,\@acceptable_domains); |
525
|
|
|
|
|
|
|
} |
526
|
0
|
|
|
|
|
0
|
return $result; |
527
|
|
|
|
|
|
|
} |
528
|
0
|
|
|
|
|
0
|
|
529
|
|
|
|
|
|
|
my ($self, $pms, $full_ref, @acceptable_domains) = @_; |
530
|
81
|
|
|
|
|
1173
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
531
|
|
|
|
|
|
|
my $result = 0; |
532
|
|
|
|
|
|
|
if (!$pms->{dkim_valid}) { |
533
|
|
|
|
|
|
|
# don't bother |
534
|
81
|
|
|
81
|
0
|
195
|
} elsif (!@acceptable_domains) { |
535
|
81
|
50
|
|
|
|
233
|
$result = 1; # no additional constraints, any signing domain will do, |
536
|
81
|
|
|
|
|
127
|
# also any signing key size will do |
537
|
81
|
50
|
|
|
|
267
|
} else { |
|
|
0
|
|
|
|
|
|
538
|
|
|
|
|
|
|
$result = $self->_check_dkim_signed_by($pms,1,0,\@acceptable_domains); |
539
|
|
|
|
|
|
|
} |
540
|
0
|
|
|
|
|
0
|
return $result; |
541
|
|
|
|
|
|
|
} |
542
|
|
|
|
|
|
|
|
543
|
0
|
|
|
|
|
0
|
my ($self, $pms, $full_ref, @acceptable_domains) = @_; |
544
|
|
|
|
|
|
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
545
|
81
|
|
|
|
|
1099
|
my $result = 0; |
546
|
|
|
|
|
|
|
if (!%{$pms->{dkim_has_valid_author_sig}}) { |
547
|
|
|
|
|
|
|
# don't bother |
548
|
|
|
|
|
|
|
} else { |
549
|
81
|
|
|
81
|
0
|
207
|
$result = $self->_check_dkim_signed_by($pms,1,1,\@acceptable_domains); |
550
|
81
|
50
|
|
|
|
256
|
} |
551
|
81
|
|
|
|
|
120
|
return $result; |
552
|
81
|
50
|
|
|
|
115
|
} |
|
81
|
|
|
|
|
301
|
|
553
|
|
|
|
|
|
|
|
554
|
|
|
|
|
|
|
my ($self, $pms, $full_ref) = @_; |
555
|
0
|
|
|
|
|
0
|
my $result = 0; |
556
|
|
|
|
|
|
|
my $envfrom=$self->{'main'}->{'registryboundaries'}->uri_to_domain($pms->get("EnvelopeFrom")); |
557
|
81
|
|
|
|
|
1131
|
# if no envelopeFrom, it cannot be valid |
558
|
|
|
|
|
|
|
return $result if !$envfrom; |
559
|
|
|
|
|
|
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
560
|
|
|
|
|
|
|
if (!$pms->{dkim_valid}) { |
561
|
0
|
|
|
0
|
0
|
0
|
# don't bother |
562
|
0
|
|
|
|
|
0
|
} else { |
563
|
0
|
|
|
|
|
0
|
$result = $self->_check_dkim_signed_by($pms,1,0,[$envfrom]); |
564
|
|
|
|
|
|
|
} |
565
|
0
|
0
|
|
|
|
0
|
return $result; |
566
|
0
|
0
|
|
|
|
0
|
} |
567
|
0
|
0
|
|
|
|
0
|
|
568
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
569
|
|
|
|
|
|
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
570
|
0
|
|
|
|
|
0
|
return $pms->{dkim_signatures_dependable}; |
571
|
|
|
|
|
|
|
} |
572
|
0
|
|
|
|
|
0
|
|
573
|
|
|
|
|
|
|
# mosnomer, old synonym for check_dkim_valid, kept for compatibility |
574
|
|
|
|
|
|
|
return check_dkim_valid(@_); |
575
|
|
|
|
|
|
|
} |
576
|
0
|
|
|
0
|
0
|
0
|
|
577
|
0
|
0
|
|
|
|
0
|
# no valid Author Domain Signature && ADSP matches the argument |
578
|
0
|
|
|
|
|
0
|
my ($self, $pms, $adsp_char, @domains_list) = @_; |
579
|
|
|
|
|
|
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
580
|
|
|
|
|
|
|
my $result = 0; |
581
|
|
|
|
|
|
|
if (!$pms->{dkim_signatures_ready}) { |
582
|
|
|
|
|
|
|
# don't bother |
583
|
0
|
|
|
0
|
0
|
0
|
} else { |
584
|
|
|
|
|
|
|
$self->_check_dkim_adsp($pms) if !$pms->{dkim_checked_adsp}; |
585
|
|
|
|
|
|
|
|
586
|
|
|
|
|
|
|
# an asterisk indicates any ADSP type can match (as long as |
587
|
|
|
|
|
|
|
# there is no valid author domain signature present) |
588
|
486
|
|
|
486
|
0
|
1633
|
$adsp_char = 'NAD123' if $adsp_char eq '*'; # a shorthand for NAD123 |
589
|
486
|
100
|
|
|
|
1461
|
|
590
|
486
|
|
|
|
|
671
|
if ( !(grep { index($adsp_char,$_) >= 0 } values %{$pms->{dkim_adsp}}) ) { |
591
|
486
|
100
|
|
|
|
1083
|
# not the right ADSP type |
592
|
|
|
|
|
|
|
} elsif (!@domains_list) { |
593
|
|
|
|
|
|
|
$result = 1; # no additional constraints, any author domain will do |
594
|
24
|
100
|
|
|
|
66
|
} else { |
595
|
|
|
|
|
|
|
local $1; |
596
|
|
|
|
|
|
|
my %author_domains = %{$pms->{dkim_author_domains}}; |
597
|
|
|
|
|
|
|
foreach my $dom (@domains_list) { |
598
|
24
|
50
|
|
|
|
74
|
if ($dom =~ /^\*?\.(.*)\z/s) { # domain itself or its subdomain |
599
|
|
|
|
|
|
|
my $doms = lc $1; |
600
|
24
|
100
|
|
|
|
34
|
if ($author_domains{$doms} || |
|
24
|
50
|
|
|
|
163
|
|
|
24
|
|
|
|
|
73
|
|
601
|
|
|
|
|
|
|
(grep { /\.\Q$doms\E\z/s } keys %author_domains) ) { |
602
|
|
|
|
|
|
|
$result = 1; last; |
603
|
4
|
|
|
|
|
11
|
} |
604
|
|
|
|
|
|
|
} else { # match on domain (not a subdomain) |
605
|
0
|
|
|
|
|
0
|
if ($author_domains{lc $dom}) { |
606
|
0
|
|
|
|
|
0
|
$result = 1; last; |
|
0
|
|
|
|
|
0
|
|
607
|
0
|
|
|
|
|
0
|
} |
608
|
0
|
0
|
|
|
|
0
|
} |
609
|
0
|
|
|
|
|
0
|
} |
610
|
0
|
0
|
0
|
|
|
0
|
} |
611
|
0
|
|
|
|
|
0
|
} |
612
|
0
|
|
|
|
|
0
|
return $result; |
|
0
|
|
|
|
|
0
|
|
613
|
|
|
|
|
|
|
} |
614
|
|
|
|
|
|
|
|
615
|
0
|
0
|
|
|
|
0
|
# useless, semantically always true according to ADSP (RFC 5617) |
616
|
0
|
|
|
|
|
0
|
my ($self, $pms) = @_; |
|
0
|
|
|
|
|
0
|
|
617
|
|
|
|
|
|
|
# the signsome is semantically always true, and thus redundant; |
618
|
|
|
|
|
|
|
# for compatibility just returns false to prevent |
619
|
|
|
|
|
|
|
# a legacy rule DKIM_POLICY_SIGNSOME from always firing |
620
|
|
|
|
|
|
|
return 0; |
621
|
|
|
|
|
|
|
} |
622
|
486
|
|
|
|
|
6953
|
|
623
|
|
|
|
|
|
|
# synonym with check_dkim_adsp('A'), kept for compatibility |
624
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
625
|
|
|
|
|
|
|
check_dkim_adsp($self, $pms, 'A'); |
626
|
|
|
|
|
|
|
} |
627
|
0
|
|
|
0
|
0
|
0
|
|
628
|
|
|
|
|
|
|
# public key carries a testing flag |
629
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
630
|
|
|
|
|
|
|
my $result = 0; |
631
|
0
|
|
|
|
|
0
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
632
|
|
|
|
|
|
|
$result = 1 if $pms->{dkim_key_testing}; |
633
|
|
|
|
|
|
|
return $result; |
634
|
|
|
|
|
|
|
} |
635
|
|
|
|
|
|
|
|
636
|
0
|
|
|
0
|
0
|
0
|
my ($self, $pms) = @_; |
637
|
0
|
|
|
|
|
0
|
$self->_check_dkim_whitelist($pms) if !$pms->{whitelist_checked}; |
638
|
|
|
|
|
|
|
return $pms->{dkim_match_in_whitelist_from_dkim} || |
639
|
|
|
|
|
|
|
$pms->{dkim_match_in_whitelist_auth}; |
640
|
|
|
|
|
|
|
} |
641
|
|
|
|
|
|
|
|
642
|
0
|
|
|
0
|
0
|
0
|
my ($self, $pms) = @_; |
643
|
0
|
|
|
|
|
0
|
$self->_check_dkim_whitelist($pms) if !$pms->{whitelist_checked}; |
644
|
0
|
0
|
|
|
|
0
|
return $pms->{dkim_match_in_def_whitelist_from_dkim} || |
645
|
0
|
0
|
|
|
|
0
|
$pms->{dkim_match_in_def_whitelist_auth}; |
646
|
0
|
|
|
|
|
0
|
} |
647
|
|
|
|
|
|
|
|
648
|
|
|
|
|
|
|
# --------------------------------------------------------------------------- |
649
|
|
|
|
|
|
|
|
650
|
0
|
|
|
0
|
0
|
0
|
my ($self) = @_; |
651
|
0
|
0
|
|
|
|
0
|
|
652
|
|
|
|
|
|
|
if (!$self->{tried_loading}) { |
653
|
0
|
|
0
|
|
|
0
|
$self->{service_available} = 0; |
654
|
|
|
|
|
|
|
my $timemethod = $self->{main}->UNIVERSAL::can("time_method") && |
655
|
|
|
|
|
|
|
$self->{main}->time_method("dkim_load_modules"); |
656
|
|
|
|
|
|
|
my $eval_stat; |
657
|
0
|
|
|
0
|
0
|
0
|
eval { |
658
|
0
|
0
|
|
|
|
0
|
# Have to do this so that RPM doesn't find these as required perl modules. |
659
|
|
|
|
|
|
|
{ require Mail::DKIM::Verifier } |
660
|
0
|
|
0
|
|
|
0
|
} or do { |
661
|
|
|
|
|
|
|
$eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat; |
662
|
|
|
|
|
|
|
}; |
663
|
|
|
|
|
|
|
$self->{tried_loading} = 1; |
664
|
|
|
|
|
|
|
|
665
|
|
|
|
|
|
|
if (defined $eval_stat) { |
666
|
8
|
|
|
8
|
|
15
|
dbg("dkim: cannot load Mail::DKIM module, DKIM checks disabled: %s", |
667
|
|
|
|
|
|
|
$eval_stat); |
668
|
8
|
100
|
|
|
|
19
|
} else { |
669
|
1
|
|
|
|
|
2
|
use version 0.77; |
670
|
|
|
|
|
|
|
my $version = Mail::DKIM::Verifier->VERSION; |
671
|
1
|
|
33
|
|
|
10
|
if (version->parse($version) >= version->parse(0.31)) { |
672
|
1
|
|
|
|
|
2
|
dbg("dkim: using Mail::DKIM version $version"); |
673
|
|
|
|
|
|
|
} else { |
674
|
|
|
|
|
|
|
info("dkim: Mail::DKIM $version is older than the required ". |
675
|
1
|
|
|
|
|
1
|
"minimal version 0.31, suggested upgrade to 0.37 or later!"); |
|
1
|
|
|
|
|
427
|
|
676
|
1
|
50
|
|
|
|
2
|
} |
677
|
0
|
0
|
|
|
|
0
|
$self->{service_available} = 1; |
|
0
|
|
|
|
|
0
|
|
678
|
|
|
|
|
|
|
|
679
|
1
|
|
|
|
|
35939
|
my $adsp_avail = |
680
|
|
|
|
|
|
|
eval { require Mail::DKIM::AuthorDomainPolicy }; # since 0.34 |
681
|
1
|
50
|
|
|
|
4
|
if (!$adsp_avail) { # fallback to pre-ADSP policy |
682
|
0
|
|
|
|
|
0
|
eval { require Mail::DKIM::DkimPolicy } # ignoring status |
683
|
|
|
|
|
|
|
} |
684
|
|
|
|
|
|
|
} |
685
|
22
|
|
|
22
|
|
9955
|
} |
|
22
|
|
|
|
|
37988
|
|
|
22
|
|
|
|
|
142
|
|
686
|
1
|
|
|
|
|
16
|
return $self->{service_available}; |
687
|
1
|
50
|
|
|
|
16
|
} |
688
|
1
|
|
|
|
|
6
|
|
689
|
|
|
|
|
|
|
# --------------------------------------------------------------------------- |
690
|
0
|
|
|
|
|
0
|
|
691
|
|
|
|
|
|
|
my ($self, $pms, $must_be_valid, $must_be_author_domain_signature, |
692
|
|
|
|
|
|
|
$acceptable_domains_ref) = @_; |
693
|
1
|
|
|
|
|
4
|
my $result = 0; |
694
|
|
|
|
|
|
|
my $verifier = $pms->{dkim_verifier}; |
695
|
|
|
|
|
|
|
my $minimum_key_bits = $pms->{conf}->{dkim_minimum_key_bits}; |
696
|
1
|
|
|
|
|
2
|
foreach my $sig (@{$pms->{dkim_signatures}}) { |
|
1
|
|
|
|
|
7
|
|
697
|
1
|
50
|
|
|
|
4
|
next if !defined $sig; |
698
|
0
|
|
|
|
|
0
|
if ($must_be_valid) { |
|
0
|
|
|
|
|
0
|
|
699
|
|
|
|
|
|
|
next if ($sig->UNIVERSAL::can("result") ? $sig : $verifier) |
700
|
|
|
|
|
|
|
->result ne 'pass'; |
701
|
|
|
|
|
|
|
next if $sig->UNIVERSAL::can("check_expiration") && |
702
|
8
|
|
|
|
|
23
|
!$sig->check_expiration; |
703
|
|
|
|
|
|
|
next if $minimum_key_bits && $sig->{_spamassassin_key_size} && |
704
|
|
|
|
|
|
|
$sig->{_spamassassin_key_size} < $minimum_key_bits; |
705
|
|
|
|
|
|
|
} |
706
|
|
|
|
|
|
|
my $sdid = $sig->domain; |
707
|
|
|
|
|
|
|
next if !defined $sdid; # a signature with a missing required tag 'd' ? |
708
|
0
|
|
|
0
|
|
0
|
$sdid = lc $sdid; |
709
|
|
|
|
|
|
|
if ($must_be_author_domain_signature) { |
710
|
0
|
|
|
|
|
0
|
next if !$pms->{dkim_author_domains}->{$sdid}; |
711
|
0
|
|
|
|
|
0
|
} |
712
|
0
|
|
|
|
|
0
|
if (!@$acceptable_domains_ref) { |
713
|
0
|
|
|
|
|
0
|
$result = 1; |
|
0
|
|
|
|
|
0
|
|
714
|
0
|
0
|
|
|
|
0
|
} else { |
715
|
0
|
0
|
|
|
|
0
|
foreach my $ad (@$acceptable_domains_ref) { |
716
|
0
|
0
|
|
|
|
0
|
if ($ad =~ /^\*?\.(.*)\z/s) { # domain itself or its subdomain |
|
|
0
|
|
|
|
|
|
717
|
|
|
|
|
|
|
my $d = lc $1; |
718
|
0
|
0
|
0
|
|
|
0
|
if ($sdid eq $d || $sdid =~ /\.\Q$d\E\z/s) { $result = 1; last } |
719
|
|
|
|
|
|
|
} else { # match on domain (not a subdomain) |
720
|
|
|
|
|
|
|
if ($sdid eq lc $ad) { $result = 1; last } |
721
|
0
|
0
|
0
|
|
|
0
|
} |
|
|
|
0
|
|
|
|
|
722
|
|
|
|
|
|
|
} |
723
|
0
|
|
|
|
|
0
|
} |
724
|
0
|
0
|
|
|
|
0
|
last if $result; |
725
|
0
|
|
|
|
|
0
|
} |
726
|
0
|
0
|
|
|
|
0
|
return $result; |
727
|
0
|
0
|
|
|
|
0
|
} |
728
|
|
|
|
|
|
|
|
729
|
0
|
0
|
|
|
|
0
|
my ($self, $pms) = @_; |
730
|
0
|
|
|
|
|
0
|
|
731
|
|
|
|
|
|
|
# Note that RFC 5322 permits multiple addresses in the From header field, |
732
|
0
|
|
|
|
|
0
|
# and according to RFC 5617 such message has multiple authors and hence |
733
|
0
|
0
|
|
|
|
0
|
# multiple "Author Domain Signing Practices". For the time being the |
734
|
0
|
|
|
|
|
0
|
# SpamAssassin's get() can only provide a single author! |
735
|
0
|
0
|
0
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
736
|
|
|
|
|
|
|
my %author_domains; local $1; |
737
|
0
|
0
|
|
|
|
0
|
my @authors = grep { defined $_ } ( $pms->get('from:addr',undef) ); |
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
738
|
|
|
|
|
|
|
for (@authors) { |
739
|
|
|
|
|
|
|
# be tolerant, ignore trailing WSP after a domain name |
740
|
|
|
|
|
|
|
$author_domains{lc $1} = 1 if /\@([^\@]+?)[ \t]*\z/s; |
741
|
0
|
0
|
|
|
|
0
|
} |
742
|
|
|
|
|
|
|
$pms->{dkim_author_addresses} = \@authors; # list of full addresses |
743
|
0
|
|
|
|
|
0
|
$pms->{dkim_author_domains} = \%author_domains; # hash of their domains |
744
|
|
|
|
|
|
|
} |
745
|
|
|
|
|
|
|
|
746
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
747
|
81
|
|
|
81
|
|
187
|
|
748
|
|
|
|
|
|
|
my $conf = $pms->{conf}; |
749
|
|
|
|
|
|
|
my($verifier, @signatures, @valid_signatures); |
750
|
|
|
|
|
|
|
|
751
|
|
|
|
|
|
|
$pms->{dkim_checked_signature} = 1; # has this sub already been invoked? |
752
|
|
|
|
|
|
|
$pms->{dkim_signatures_ready} = 0; # have we obtained & verified signatures? |
753
|
|
|
|
|
|
|
$pms->{dkim_signatures_dependable} = 0; |
754
|
81
|
|
|
|
|
152
|
# dkim_signatures_dependable = |
|
81
|
|
|
|
|
198
|
|
755
|
81
|
|
|
|
|
266
|
# (signatures supplied by a caller) or |
|
81
|
|
|
|
|
393
|
|
756
|
81
|
|
|
|
|
246
|
# ( (signatures obtained by this plugin) and |
757
|
|
|
|
|
|
|
# (no signatures, or message was not truncated) ) |
758
|
42
|
50
|
|
|
|
479
|
$pms->{dkim_signatures} = \@signatures; |
759
|
|
|
|
|
|
|
$pms->{dkim_valid_signatures} = \@valid_signatures; |
760
|
81
|
|
|
|
|
270
|
$pms->{dkim_signed} = 0; |
761
|
81
|
|
|
|
|
327
|
$pms->{dkim_valid} = 0; |
762
|
|
|
|
|
|
|
$pms->{dkim_key_testing} = 0; |
763
|
|
|
|
|
|
|
# the following hashes are keyed by a signing domain (SDID): |
764
|
|
|
|
|
|
|
$pms->{dkim_author_sig_tempfailed} = {}; # DNS timeout verifying author sign. |
765
|
81
|
|
|
81
|
|
175
|
$pms->{dkim_has_valid_author_sig} = {}; # a valid author domain signature |
766
|
|
|
|
|
|
|
$pms->{dkim_has_any_author_sig} = {}; # valid or invalid author domain sign. |
767
|
81
|
|
|
|
|
168
|
|
768
|
81
|
|
|
|
|
158
|
$self->_get_authors($pms) if !$pms->{dkim_author_addresses}; |
769
|
|
|
|
|
|
|
|
770
|
81
|
|
|
|
|
197
|
my $suppl_attrib = $pms->{msg}->{suppl_attrib}; |
771
|
81
|
|
|
|
|
163
|
if (defined $suppl_attrib && exists $suppl_attrib->{dkim_signatures}) { |
772
|
81
|
|
|
|
|
161
|
# caller of SpamAssassin already supplied DKIM signature objects |
773
|
|
|
|
|
|
|
my $provided_signatures = $suppl_attrib->{dkim_signatures}; |
774
|
|
|
|
|
|
|
@signatures = @$provided_signatures if ref $provided_signatures; |
775
|
|
|
|
|
|
|
$pms->{dkim_signatures_ready} = 1; |
776
|
|
|
|
|
|
|
$pms->{dkim_signatures_dependable} = 1; |
777
|
81
|
|
|
|
|
222
|
dbg("dkim: signatures provided by the caller, %d signatures", |
778
|
81
|
|
|
|
|
155
|
scalar(@signatures)); |
779
|
81
|
|
|
|
|
164
|
} |
780
|
81
|
|
|
|
|
224
|
|
781
|
81
|
|
|
|
|
173
|
if ($pms->{dkim_signatures_ready}) { |
782
|
|
|
|
|
|
|
# signatures already available and verified |
783
|
81
|
|
|
|
|
217
|
} elsif (!$pms->is_dns_available()) { |
784
|
81
|
|
|
|
|
260
|
dbg("dkim: signature verification disabled, DNS resolving not available"); |
785
|
81
|
|
|
|
|
204
|
} elsif (!$self->_dkim_load_modules()) { |
786
|
|
|
|
|
|
|
# Mail::DKIM module not available |
787
|
81
|
50
|
|
|
|
402
|
} else { |
788
|
|
|
|
|
|
|
# signature objects not provided by the caller, must verify for ourselves |
789
|
81
|
|
|
|
|
204
|
my $timemethod = $self->{main}->UNIVERSAL::can("time_method") && |
790
|
81
|
50
|
33
|
|
|
414
|
$self->{main}->time_method("check_dkim_signature"); |
791
|
|
|
|
|
|
|
use version 0.77; |
792
|
0
|
|
|
|
|
0
|
if (version->parse(Mail::DKIM::Verifier->VERSION) >= version->parse(0.40)) { |
793
|
0
|
0
|
|
|
|
0
|
my $edns = $conf->{dns_options}->{edns}; |
794
|
0
|
|
|
|
|
0
|
if ($edns && $edns >= 1024) { |
795
|
0
|
|
|
|
|
0
|
# Let Mail::DKIM use our interface to Net::DNS::Resolver. |
796
|
0
|
|
|
|
|
0
|
# Only do so if EDNS0 provides a reasonably-sized UDP payload size, |
797
|
|
|
|
|
|
|
# as our interface does not provide a DNS fallback to TCP, unlike |
798
|
|
|
|
|
|
|
# the Net::DNS::Resolver::send which does provide it. |
799
|
|
|
|
|
|
|
my $res = $self->{main}->{resolver}; |
800
|
81
|
50
|
|
|
|
456
|
dbg("dkim: providing our own resolver: %s", ref $res); |
|
|
100
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
801
|
|
|
|
|
|
|
Mail::DKIM::DNS::resolver($res); |
802
|
|
|
|
|
|
|
} |
803
|
77
|
|
|
|
|
246
|
} |
804
|
|
|
|
|
|
|
$verifier = Mail::DKIM::Verifier->new; |
805
|
|
|
|
|
|
|
if (!$verifier) { |
806
|
|
|
|
|
|
|
dbg("dkim: cannot create Mail::DKIM::Verifier object"); |
807
|
|
|
|
|
|
|
return; |
808
|
|
|
|
|
|
|
} |
809
|
4
|
|
33
|
|
|
29
|
$pms->{dkim_verifier} = $verifier; |
810
|
22
|
|
|
22
|
|
16455
|
# |
|
22
|
|
|
|
|
356
|
|
|
22
|
|
|
|
|
147
|
|
811
|
4
|
50
|
|
|
|
97
|
# feed content of a message into verifier, using \r\n endings, |
812
|
4
|
|
|
|
|
10
|
# required by Mail::DKIM API (see bug 5300) |
813
|
4
|
50
|
33
|
|
|
16
|
# note: bug 5179 comment 28: perl does silly things on non-Unix platforms |
814
|
|
|
|
|
|
|
# unless we use \015\012 instead of \r\n |
815
|
|
|
|
|
|
|
eval { |
816
|
|
|
|
|
|
|
my $str = $pms->{msg}->get_pristine(); |
817
|
|
|
|
|
|
|
$str =~ s/\r?\n/\015\012/sg; # ensure \015\012 ending |
818
|
4
|
|
|
|
|
7
|
$verifier->PRINT($str); |
819
|
4
|
|
|
|
|
16
|
1; |
820
|
4
|
|
|
|
|
17
|
} or do { # intercept die() exceptions and render safe |
821
|
|
|
|
|
|
|
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat; |
822
|
|
|
|
|
|
|
dbg("dkim: verification failed, intercepted error: $eval_stat"); |
823
|
4
|
|
|
|
|
48
|
return 0; # cannot verify message |
824
|
4
|
50
|
|
|
|
175
|
}; |
825
|
0
|
|
|
|
|
0
|
|
826
|
0
|
|
|
|
|
0
|
my $timeout = $conf->{dkim_timeout}; |
827
|
|
|
|
|
|
|
my $timer = Mail::SpamAssassin::Timeout->new( |
828
|
4
|
|
|
|
|
9
|
{ secs => $timeout, deadline => $pms->{master_deadline} }); |
829
|
|
|
|
|
|
|
|
830
|
|
|
|
|
|
|
my $err = $timer->run_and_catch(sub { |
831
|
|
|
|
|
|
|
dbg("dkim: performing public key lookup and signature verification"); |
832
|
|
|
|
|
|
|
$verifier->CLOSE(); # the action happens here |
833
|
|
|
|
|
|
|
|
834
|
|
|
|
|
|
|
# currently SpamAssassin's parsing is better than Mail::Address parsing, |
835
|
4
|
|
|
|
|
15
|
# don't bother fetching $verifier->message_originator->address |
836
|
4
|
|
|
|
|
64
|
# to replace what we already have in $pms->{dkim_author_addresses} |
837
|
4
|
|
|
|
|
22
|
|
838
|
4
|
|
|
|
|
916
|
# versions before 0.29 only provided a public interface to fetch one |
839
|
4
|
50
|
|
|
|
6
|
# signature, newer versions allow access to all signatures of a message |
840
|
0
|
0
|
|
|
|
0
|
@signatures = $verifier->UNIVERSAL::can("signatures") ? |
|
0
|
|
|
|
|
0
|
|
841
|
0
|
|
|
|
|
0
|
$verifier->signatures : $verifier->signature; |
842
|
0
|
|
|
|
|
0
|
}); |
843
|
|
|
|
|
|
|
if ($timer->timed_out()) { |
844
|
|
|
|
|
|
|
dbg("dkim: public key lookup or verification timed out after %s s", |
845
|
4
|
|
|
|
|
11
|
$timeout ); |
846
|
|
|
|
|
|
|
#*** |
847
|
4
|
|
|
|
|
26
|
# $pms->{dkim_author_sig_tempfailed}->{$_} = 1 for ... |
848
|
|
|
|
|
|
|
|
849
|
|
|
|
|
|
|
} elsif ($err) { |
850
|
4
|
|
|
4
|
|
11
|
chomp $err; |
851
|
4
|
|
|
|
|
17
|
dbg("dkim: public key lookup or verification failed: $err"); |
852
|
|
|
|
|
|
|
} |
853
|
|
|
|
|
|
|
$pms->{dkim_signatures_ready} = 1; |
854
|
|
|
|
|
|
|
if (!@signatures || !$pms->{tests_already_hit}->{'__TRUNCATED'}) { |
855
|
|
|
|
|
|
|
$pms->{dkim_signatures_dependable} = 1; |
856
|
|
|
|
|
|
|
} |
857
|
|
|
|
|
|
|
} |
858
|
|
|
|
|
|
|
|
859
|
4
|
50
|
|
|
|
99
|
if ($pms->{dkim_signatures_ready}) { |
860
|
|
|
|
|
|
|
my $sig_result_supported; |
861
|
4
|
|
|
|
|
30
|
my $minimum_key_bits = $conf->{dkim_minimum_key_bits}; |
862
|
4
|
50
|
|
|
|
22
|
foreach my $signature (@signatures) { |
|
|
50
|
|
|
|
|
|
863
|
0
|
|
|
|
|
0
|
# old versions of Mail::DKIM would give undef for an invalid signature |
864
|
|
|
|
|
|
|
next if !defined $signature; |
865
|
|
|
|
|
|
|
next if !$signature->selector; # empty selector |
866
|
|
|
|
|
|
|
|
867
|
|
|
|
|
|
|
$sig_result_supported = $signature->UNIVERSAL::can("result_detail"); |
868
|
|
|
|
|
|
|
my($info, $valid, $expired); |
869
|
0
|
|
|
|
|
0
|
$valid = |
870
|
0
|
|
|
|
|
0
|
($sig_result_supported ? $signature : $verifier)->result eq 'pass'; |
871
|
|
|
|
|
|
|
$info = $valid ? 'VALID' : 'FAILED'; |
872
|
4
|
|
|
|
|
9
|
if ($valid && $signature->UNIVERSAL::can("check_expiration")) { |
873
|
4
|
50
|
33
|
|
|
15
|
$expired = !$signature->check_expiration; |
874
|
4
|
|
|
|
|
15
|
$info .= ' EXPIRED' if $expired; |
875
|
|
|
|
|
|
|
} |
876
|
|
|
|
|
|
|
my $key_size; |
877
|
|
|
|
|
|
|
if ($valid && !$expired && $minimum_key_bits) { |
878
|
81
|
100
|
|
|
|
342
|
$key_size = eval { my $pk = $signature->get_public_key; |
879
|
4
|
|
|
|
|
7
|
$pk && $pk->cork && $pk->cork->size * 8 }; |
880
|
4
|
|
|
|
|
7
|
if ($key_size) { |
881
|
4
|
|
|
|
|
10
|
$signature->{_spamassassin_key_size} = $key_size; # stash it for later |
882
|
|
|
|
|
|
|
$info .= " WEAK($key_size)" if $key_size < $minimum_key_bits; |
883
|
0
|
0
|
|
|
|
0
|
} |
884
|
0
|
0
|
|
|
|
0
|
} |
885
|
|
|
|
|
|
|
push(@valid_signatures, $signature) if $valid && !$expired; |
886
|
0
|
|
|
|
|
0
|
|
887
|
0
|
|
|
|
|
0
|
# check if we have a potential Author Domain Signature, valid or not |
888
|
0
|
0
|
|
|
|
0
|
my $d = $signature->domain; |
889
|
|
|
|
|
|
|
if (!defined $d) { |
890
|
0
|
0
|
|
|
|
0
|
# can be undefined on a broken signature with missing required tags |
891
|
0
|
0
|
0
|
|
|
0
|
} else { |
892
|
0
|
|
|
|
|
0
|
$d = lc $d; |
893
|
0
|
0
|
|
|
|
0
|
if ($pms->{dkim_author_domains}->{$d}) { # SDID matches author domain |
894
|
|
|
|
|
|
|
$pms->{dkim_has_any_author_sig}->{$d} = 1; |
895
|
0
|
|
|
|
|
0
|
if ($valid && !$expired && |
896
|
0
|
0
|
0
|
|
|
0
|
$key_size && $key_size >= $minimum_key_bits) { |
|
|
|
0
|
|
|
|
|
897
|
0
|
|
|
|
|
0
|
$pms->{dkim_has_valid_author_sig}->{$d} = 1; |
|
0
|
|
|
|
|
0
|
|
898
|
0
|
0
|
0
|
|
|
0
|
} elsif ( ($sig_result_supported ? $signature |
899
|
0
|
0
|
|
|
|
0
|
: $verifier)->result_detail |
900
|
0
|
|
|
|
|
0
|
=~ /\b(?:timed out|SERVFAIL)\b/i) { |
901
|
0
|
0
|
|
|
|
0
|
$pms->{dkim_author_sig_tempfailed}->{$d} = 1; |
902
|
|
|
|
|
|
|
} |
903
|
|
|
|
|
|
|
} |
904
|
0
|
0
|
0
|
|
|
0
|
} |
905
|
|
|
|
|
|
|
if (would_log("dbg","dkim")) { |
906
|
|
|
|
|
|
|
dbg("dkim: %s %s, i=%s, d=%s, s=%s, a=%s, c=%s, %s, %s, %s", |
907
|
0
|
|
|
|
|
0
|
$info, |
908
|
0
|
0
|
|
|
|
0
|
$signature->isa('Mail::DKIM::DkSignature') ? 'DK' : 'DKIM', |
909
|
|
|
|
|
|
|
map(!defined $_ ? '(undef)' : $_, |
910
|
|
|
|
|
|
|
$signature->identity, $d, $signature->selector, |
911
|
0
|
|
|
|
|
0
|
$signature->algorithm, scalar($signature->canonicalization), |
912
|
0
|
0
|
|
|
|
0
|
$key_size ? "key_bits=$key_size" : "unknown key size", |
913
|
0
|
|
|
|
|
0
|
($sig_result_supported ? $signature : $verifier)->result ), |
914
|
0
|
0
|
0
|
|
|
0
|
defined $d && $pms->{dkim_author_domains}->{$d} |
|
|
0
|
0
|
|
|
|
|
|
|
0
|
0
|
|
|
|
|
915
|
|
|
|
|
|
|
? 'matches author domain' |
916
|
0
|
|
|
|
|
0
|
: 'does not match author domain', |
917
|
|
|
|
|
|
|
); |
918
|
|
|
|
|
|
|
} |
919
|
|
|
|
|
|
|
} |
920
|
0
|
|
|
|
|
0
|
if (@valid_signatures) { |
921
|
|
|
|
|
|
|
$pms->{dkim_signed} = 1; |
922
|
|
|
|
|
|
|
$pms->{dkim_valid} = 1; |
923
|
|
|
|
|
|
|
# let the result stand out more clearly in the log, use uppercase |
924
|
0
|
0
|
|
|
|
0
|
my $sig = $valid_signatures[0]; |
925
|
|
|
|
|
|
|
my $sig_res = ($sig_result_supported ? $sig : $verifier)->result_detail; |
926
|
|
|
|
|
|
|
dbg("dkim: signature verification result: %s", uc($sig_res)); |
927
|
|
|
|
|
|
|
|
928
|
|
|
|
|
|
|
# supply values for both tags |
929
|
|
|
|
|
|
|
my(%seen1, %seen2, %seen3, @identity_list, @domain_list, @selector_list); |
930
|
|
|
|
|
|
|
@identity_list = grep(defined $_ && $_ ne '' && !$seen1{$_}++, |
931
|
|
|
|
|
|
|
map($_->identity, @valid_signatures)); |
932
|
|
|
|
|
|
|
@domain_list = grep(defined $_ && $_ ne '' && !$seen2{$_}++, |
933
|
0
|
0
|
0
|
|
|
0
|
map($_->domain, @valid_signatures)); |
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
934
|
|
|
|
|
|
|
@selector_list = grep(defined $_ && $_ ne '' && !$seen3{$_}++, |
935
|
|
|
|
|
|
|
map($_->selector, @valid_signatures)); |
936
|
|
|
|
|
|
|
$pms->set_tag('DKIMIDENTITY', |
937
|
|
|
|
|
|
|
@identity_list == 1 ? $identity_list[0] : \@identity_list); |
938
|
|
|
|
|
|
|
$pms->set_tag('DKIMDOMAIN', |
939
|
4
|
50
|
|
|
|
13
|
@domain_list == 1 ? $domain_list[0] : \@domain_list); |
|
|
50
|
|
|
|
|
|
940
|
0
|
|
|
|
|
0
|
$pms->set_tag('DKIMSELECTOR', |
941
|
0
|
|
|
|
|
0
|
@selector_list == 1 ? $selector_list[0] : \@selector_list); |
942
|
|
|
|
|
|
|
} elsif (@signatures) { |
943
|
0
|
|
|
|
|
0
|
$pms->{dkim_signed} = 1; |
944
|
0
|
0
|
|
|
|
0
|
my $sig = $signatures[0]; |
945
|
0
|
|
|
|
|
0
|
my $sig_res = |
946
|
|
|
|
|
|
|
($sig_result_supported && $sig ? $sig : $verifier)->result_detail; |
947
|
|
|
|
|
|
|
dbg("dkim: signature verification result: %s", uc($sig_res)); |
948
|
0
|
|
|
|
|
0
|
} else { |
949
|
0
|
|
0
|
|
|
0
|
dbg("dkim: signature verification result: none"); |
950
|
|
|
|
|
|
|
} |
951
|
0
|
|
0
|
|
|
0
|
} |
952
|
|
|
|
|
|
|
} |
953
|
0
|
|
0
|
|
|
0
|
|
954
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
955
|
0
|
0
|
|
|
|
0
|
|
956
|
|
|
|
|
|
|
$pms->{dkim_checked_adsp} = 1; |
957
|
0
|
0
|
|
|
|
0
|
|
958
|
|
|
|
|
|
|
# a message may have multiple authors (RFC 5322), |
959
|
0
|
0
|
|
|
|
0
|
# and hence multiple signing policies (RFC 5617) |
960
|
|
|
|
|
|
|
$pms->{dkim_adsp} = {}; # a hash: author_domain => adsp |
961
|
|
|
|
|
|
|
my $practices_as_string = ''; |
962
|
0
|
|
|
|
|
0
|
|
963
|
0
|
|
|
|
|
0
|
$self->_get_authors($pms) if !$pms->{dkim_author_addresses}; |
964
|
0
|
0
|
0
|
|
|
0
|
|
965
|
|
|
|
|
|
|
# collect only fully qualified domain names, allow '-', think of IDN |
966
|
0
|
|
|
|
|
0
|
my @author_domains = grep { /.\.[a-z-]{2,}\z/si } |
967
|
|
|
|
|
|
|
keys %{$pms->{dkim_author_domains}}; |
968
|
4
|
|
|
|
|
17
|
|
969
|
|
|
|
|
|
|
my %label = |
970
|
|
|
|
|
|
|
('D' => 'discardable', 'A' => 'all', 'U' => 'unknown', 'N' => 'nxdomain', |
971
|
|
|
|
|
|
|
'1' => 'custom_low', '2' => 'custom_med', '3' => 'custom_high'); |
972
|
|
|
|
|
|
|
|
973
|
|
|
|
|
|
|
# must check the message first to obtain signer, domain, and verif. status |
974
|
4
|
|
|
4
|
|
14
|
$self->_check_dkim_signature($pms) if !$pms->{dkim_checked_signature}; |
975
|
|
|
|
|
|
|
|
976
|
4
|
|
|
|
|
9
|
if (!$pms->{dkim_signatures_ready}) { |
977
|
|
|
|
|
|
|
dbg("dkim: adsp not retrieved, signatures not obtained"); |
978
|
|
|
|
|
|
|
|
979
|
|
|
|
|
|
|
} elsif (!@author_domains) { |
980
|
4
|
|
|
|
|
9
|
dbg("dkim: adsp not retrieved, no author f.q. domain name"); |
981
|
4
|
|
|
|
|
7
|
$practices_as_string = 'no author domains, ignored'; |
982
|
|
|
|
|
|
|
|
983
|
4
|
50
|
|
|
|
12
|
} else { |
984
|
|
|
|
|
|
|
|
985
|
|
|
|
|
|
|
foreach my $author_domain (@author_domains) { |
986
|
4
|
|
|
|
|
29
|
my $adsp; |
987
|
4
|
|
|
|
|
7
|
|
|
4
|
|
|
|
|
13
|
|
988
|
|
|
|
|
|
|
if ($pms->{dkim_has_valid_author_sig}->{$author_domain}) { |
989
|
4
|
|
|
|
|
24
|
# don't fetch adsp when valid |
990
|
|
|
|
|
|
|
# RFC 5617: If a message has an Author Domain Signature, ADSP provides |
991
|
|
|
|
|
|
|
# no benefit relative to that domain since the message is already known |
992
|
|
|
|
|
|
|
# to be compliant with any possible ADSP for that domain. [...] |
993
|
|
|
|
|
|
|
# implementations SHOULD avoid doing unnecessary DNS lookups |
994
|
4
|
50
|
|
|
|
10
|
# |
995
|
|
|
|
|
|
|
dbg("dkim: adsp not retrieved, author domain signature is valid"); |
996
|
4
|
50
|
|
|
|
15
|
$practices_as_string = 'valid a. d. signature'; |
|
|
50
|
|
|
|
|
|
997
|
0
|
|
|
|
|
0
|
|
998
|
|
|
|
|
|
|
} elsif ($pms->{dkim_author_sig_tempfailed}->{$author_domain}) { |
999
|
|
|
|
|
|
|
dbg("dkim: adsp ignored, tempfail varifying author domain signature"); |
1000
|
0
|
|
|
|
|
0
|
$practices_as_string = 'pub key tempfailed, ignored'; |
1001
|
0
|
|
|
|
|
0
|
|
1002
|
|
|
|
|
|
|
} elsif ($pms->{dkim_has_any_author_sig}->{$author_domain} && |
1003
|
|
|
|
|
|
|
!$pms->{dkim_signatures_dependable}) { |
1004
|
|
|
|
|
|
|
# the message did have an Author Domain Signature but it wasn't valid; |
1005
|
4
|
|
|
|
|
7
|
# we also believe the message was truncated just before being passed |
1006
|
4
|
|
|
|
|
8
|
# to SpamAssassin, which is a likely reason for verification failure, |
1007
|
|
|
|
|
|
|
# so we shouldn't take it too harsh with ADSP rules - just pretend |
1008
|
4
|
50
|
33
|
|
|
21
|
# the ADSP was 'unknown' |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
1009
|
|
|
|
|
|
|
# |
1010
|
|
|
|
|
|
|
dbg("dkim: adsp ignored, message was truncated, ". |
1011
|
|
|
|
|
|
|
"invalid author domain signature"); |
1012
|
|
|
|
|
|
|
$practices_as_string = 'truncated, ignored'; |
1013
|
|
|
|
|
|
|
|
1014
|
|
|
|
|
|
|
} else { |
1015
|
0
|
|
|
|
|
0
|
# search the adsp_override list |
1016
|
0
|
|
|
|
|
0
|
|
1017
|
|
|
|
|
|
|
# for a domain a.b.c.d it searches the hash in the following order: |
1018
|
|
|
|
|
|
|
# a.b.c.d |
1019
|
0
|
|
|
|
|
0
|
# *.b.c.d |
1020
|
0
|
|
|
|
|
0
|
# *.c.d |
1021
|
|
|
|
|
|
|
# *.d |
1022
|
|
|
|
|
|
|
# * |
1023
|
|
|
|
|
|
|
my $matched_key; |
1024
|
|
|
|
|
|
|
my $p = $pms->{conf}->{adsp_override}; |
1025
|
|
|
|
|
|
|
if ($p) { |
1026
|
|
|
|
|
|
|
my @d = split(/\./, $author_domain); |
1027
|
|
|
|
|
|
|
@d = map { shift @d; join('.', '*', @d) } (0..$#d); |
1028
|
|
|
|
|
|
|
for my $key ($author_domain, @d) { |
1029
|
|
|
|
|
|
|
$adsp = $p->{$key}; |
1030
|
0
|
|
|
|
|
0
|
if (defined $adsp) { $matched_key = $key; last } |
1031
|
|
|
|
|
|
|
} |
1032
|
0
|
|
|
|
|
0
|
} |
1033
|
|
|
|
|
|
|
|
1034
|
|
|
|
|
|
|
if (defined $adsp) { |
1035
|
|
|
|
|
|
|
dbg("dkim: adsp override for domain %s", $author_domain); |
1036
|
|
|
|
|
|
|
$practices_as_string = 'override'; |
1037
|
|
|
|
|
|
|
$practices_as_string .= |
1038
|
|
|
|
|
|
|
" by $matched_key" if $matched_key ne $author_domain; |
1039
|
|
|
|
|
|
|
|
1040
|
|
|
|
|
|
|
} elsif (!$pms->is_dns_available()) { |
1041
|
|
|
|
|
|
|
dbg("dkim: adsp not retrieved, DNS resolving not available"); |
1042
|
|
|
|
|
|
|
|
1043
|
4
|
|
|
|
|
5
|
} elsif (!$self->_dkim_load_modules()) { |
1044
|
4
|
|
|
|
|
10
|
dbg("dkim: adsp not retrieved, module Mail::DKIM not available"); |
1045
|
4
|
50
|
|
|
|
9
|
|
1046
|
4
|
|
|
|
|
12
|
} else { # do the ADSP DNS lookup |
1047
|
4
|
|
|
|
|
13
|
my $timemethod = $self->{main}->UNIVERSAL::can("time_method") && |
|
10
|
|
|
|
|
11
|
|
|
10
|
|
|
|
|
26
|
|
1048
|
4
|
|
|
|
|
10
|
$self->{main}->time_method("check_dkim_adsp"); |
1049
|
14
|
|
|
|
|
19
|
|
1050
|
14
|
50
|
|
|
|
29
|
my $practices; # author domain signing practices object |
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
1051
|
|
|
|
|
|
|
my $timeout = $pms->{conf}->{dkim_timeout}; |
1052
|
|
|
|
|
|
|
my $timer = Mail::SpamAssassin::Timeout->new( |
1053
|
|
|
|
|
|
|
{ secs => $timeout, deadline => $pms->{master_deadline} }); |
1054
|
4
|
50
|
|
|
|
17
|
my $err = $timer->run_and_catch(sub { |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
1055
|
0
|
|
|
|
|
0
|
eval { |
1056
|
0
|
|
|
|
|
0
|
if (Mail::DKIM::AuthorDomainPolicy->UNIVERSAL::can("fetch")) { |
1057
|
0
|
0
|
|
|
|
0
|
dbg("dkim: adsp: performing lookup on _adsp._domainkey.%s", |
1058
|
|
|
|
|
|
|
$author_domain); |
1059
|
|
|
|
|
|
|
# get our Net::DNS::Resolver object |
1060
|
|
|
|
|
|
|
my $res = $self->{main}->{resolver}->get_resolver; |
1061
|
0
|
|
|
|
|
0
|
$practices = Mail::DKIM::AuthorDomainPolicy->fetch( |
1062
|
|
|
|
|
|
|
Protocol => "dns", Domain => $author_domain, |
1063
|
|
|
|
|
|
|
DnsResolver => $res); |
1064
|
0
|
|
|
|
|
0
|
} |
1065
|
|
|
|
|
|
|
1; |
1066
|
|
|
|
|
|
|
} or do { |
1067
|
|
|
|
|
|
|
# fetching/parsing adsp record may throw error, ignore such s.p. |
1068
|
4
|
|
33
|
|
|
39
|
my $eval_stat = $@ ne '' ? $@ : "errno=$!"; chomp $eval_stat; |
1069
|
|
|
|
|
|
|
dbg("dkim: adsp: fetch or parse on domain %s failed: %s", |
1070
|
4
|
|
|
|
|
50
|
$author_domain, $eval_stat); |
1071
|
4
|
|
|
|
|
9
|
undef $practices; |
1072
|
|
|
|
|
|
|
}; |
1073
|
4
|
|
|
|
|
23
|
}); |
1074
|
|
|
|
|
|
|
if ($timer->timed_out()) { |
1075
|
|
|
|
|
|
|
dbg("dkim: adsp lookup on domain %s timed out after %s seconds", |
1076
|
4
|
50
|
|
|
|
34
|
$author_domain, $timeout); |
1077
|
4
|
|
|
|
|
15
|
} elsif ($err) { |
1078
|
|
|
|
|
|
|
chomp $err; |
1079
|
|
|
|
|
|
|
dbg("dkim: adsp lookup on domain %s failed: %s", |
1080
|
4
|
|
|
|
|
20
|
$author_domain, $err); |
1081
|
4
|
|
|
|
|
16
|
} else { |
1082
|
|
|
|
|
|
|
my $sp; # ADSP: unknown / all / discardable |
1083
|
|
|
|
|
|
|
($sp) = $practices->policy if $practices; |
1084
|
|
|
|
|
|
|
if (!defined $sp || $sp eq '') { # SERVFAIL or a timeout |
1085
|
4
|
|
|
|
|
630
|
dbg("dkim: signing practices on %s unavailable", $author_domain); |
1086
|
4
|
50
|
|
4
|
|
9
|
$adsp = 'U'; |
1087
|
|
|
|
|
|
|
$practices_as_string = 'dns: no result'; |
1088
|
0
|
0
|
|
|
|
0
|
} else { |
|
0
|
|
|
|
|
0
|
|
1089
|
0
|
|
|
|
|
0
|
$adsp = $sp eq "unknown" ? 'U' # most common |
1090
|
|
|
|
|
|
|
: $sp eq "all" ? 'A' |
1091
|
0
|
|
|
|
|
0
|
: $sp eq "discardable" ? 'D' # ADSP |
1092
|
|
|
|
|
|
|
: $sp eq "strict" ? 'D' # old style SSP |
1093
|
4
|
|
|
|
|
33
|
: uc($sp) eq "NXDOMAIN" ? 'N' |
1094
|
4
|
50
|
|
|
|
31
|
: 'U'; |
|
|
50
|
|
|
|
|
|
1095
|
0
|
|
|
|
|
0
|
$practices_as_string = 'dns: ' . $sp; |
1096
|
|
|
|
|
|
|
} |
1097
|
|
|
|
|
|
|
} |
1098
|
0
|
|
|
|
|
0
|
} |
1099
|
0
|
|
|
|
|
0
|
} |
1100
|
|
|
|
|
|
|
|
1101
|
|
|
|
|
|
|
# is signing practices available? |
1102
|
4
|
|
|
|
|
7
|
$pms->{dkim_adsp}->{$author_domain} = $adsp if defined $adsp; |
1103
|
4
|
50
|
|
|
|
21
|
|
1104
|
4
|
50
|
33
|
|
|
73
|
dbg("dkim: adsp result: %s (%s), author domain '%s'", |
1105
|
0
|
|
|
|
|
0
|
!defined($adsp) ? '-' : $adsp.'/'.$label{$adsp}, |
1106
|
0
|
|
|
|
|
0
|
$practices_as_string, $author_domain); |
1107
|
0
|
|
|
|
|
0
|
} |
1108
|
|
|
|
|
|
|
} |
1109
|
4
|
50
|
|
|
|
30
|
} |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
1110
|
|
|
|
|
|
|
|
1111
|
|
|
|
|
|
|
my ($self, $pms) = @_; |
1112
|
|
|
|
|
|
|
|
1113
|
|
|
|
|
|
|
$pms->{whitelist_checked} = 1; |
1114
|
|
|
|
|
|
|
|
1115
|
4
|
|
|
|
|
21
|
$self->_get_authors($pms) if !$pms->{dkim_author_addresses}; |
1116
|
|
|
|
|
|
|
|
1117
|
|
|
|
|
|
|
my $authors_str = join(", ", @{$pms->{dkim_author_addresses}}); |
1118
|
|
|
|
|
|
|
if ($authors_str eq '') { |
1119
|
|
|
|
|
|
|
dbg("dkim: check_dkim_whitelist: could not find author address"); |
1120
|
|
|
|
|
|
|
return; |
1121
|
|
|
|
|
|
|
} |
1122
|
4
|
50
|
|
|
|
19
|
|
1123
|
|
|
|
|
|
|
# collect whitelist entries matching the author from all lists |
1124
|
|
|
|
|
|
|
my @acceptable_sdid_tuples; |
1125
|
4
|
50
|
|
|
|
23
|
$self->_wlcheck_acceptable_signature($pms, \@acceptable_sdid_tuples, |
1126
|
|
|
|
|
|
|
'def_whitelist_from_dkim'); |
1127
|
|
|
|
|
|
|
$self->_wlcheck_author_signature($pms, \@acceptable_sdid_tuples, |
1128
|
|
|
|
|
|
|
'def_whitelist_auth'); |
1129
|
|
|
|
|
|
|
$self->_wlcheck_acceptable_signature($pms, \@acceptable_sdid_tuples, |
1130
|
|
|
|
|
|
|
'whitelist_from_dkim'); |
1131
|
|
|
|
|
|
|
$self->_wlcheck_author_signature($pms, \@acceptable_sdid_tuples, |
1132
|
0
|
|
|
0
|
|
|
'whitelist_auth'); |
1133
|
|
|
|
|
|
|
if (!@acceptable_sdid_tuples) { |
1134
|
0
|
|
|
|
|
|
dbg("dkim: no wl entries match author %s, no need to verify sigs", |
1135
|
|
|
|
|
|
|
$authors_str); |
1136
|
0
|
0
|
|
|
|
|
return; |
1137
|
|
|
|
|
|
|
} |
1138
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
1139
|
0
|
0
|
|
|
|
|
# if the message doesn't pass DKIM validation, it can't pass DKIM whitelist |
1140
|
0
|
|
|
|
|
|
|
1141
|
0
|
|
|
|
|
|
# trigger a DKIM check; |
1142
|
|
|
|
|
|
|
# continue if one or more signatures are valid or we want the debug info |
1143
|
|
|
|
|
|
|
return unless $self->check_dkim_valid($pms) || would_log("dbg","dkim"); |
1144
|
|
|
|
|
|
|
return unless $pms->{dkim_signatures_ready}; |
1145
|
0
|
|
|
|
|
|
|
1146
|
0
|
|
|
|
|
|
# now do all the matching in one go, against all signatures in a message |
1147
|
|
|
|
|
|
|
my($any_match_at_all, $any_match_by_wl_ref) = |
1148
|
0
|
|
|
|
|
|
_wlcheck_list($self, $pms, \@acceptable_sdid_tuples); |
1149
|
|
|
|
|
|
|
|
1150
|
0
|
|
|
|
|
|
my(@valid,@fail); |
1151
|
|
|
|
|
|
|
foreach my $wl (keys %$any_match_by_wl_ref) { |
1152
|
0
|
|
|
|
|
|
my $match = $any_match_by_wl_ref->{$wl}; |
1153
|
|
|
|
|
|
|
if (defined $match) { |
1154
|
0
|
0
|
|
|
|
|
$pms->{"dkim_match_in_$wl"} = 1 if $match; |
1155
|
0
|
|
|
|
|
|
push(@{$match ? \@valid : \@fail}, "$wl/$match"); |
1156
|
|
|
|
|
|
|
} |
1157
|
0
|
|
|
|
|
|
} |
1158
|
|
|
|
|
|
|
if (@valid) { |
1159
|
|
|
|
|
|
|
dbg("dkim: author %s, WHITELISTED by %s", |
1160
|
|
|
|
|
|
|
$authors_str, join(", ",@valid)); |
1161
|
|
|
|
|
|
|
} elsif (@fail) { |
1162
|
|
|
|
|
|
|
dbg("dkim: author %s, found in %s BUT IGNORED", |
1163
|
|
|
|
|
|
|
$authors_str, join(", ",@fail)); |
1164
|
0
|
0
|
0
|
|
|
|
} else { |
1165
|
0
|
0
|
|
|
|
|
dbg("dkim: author %s, not in any dkim whitelist", $authors_str); |
1166
|
|
|
|
|
|
|
} |
1167
|
|
|
|
|
|
|
} |
1168
|
0
|
|
|
|
|
|
|
1169
|
|
|
|
|
|
|
# check for verifier-acceptable signatures; an empty (or undefined) signing |
1170
|
|
|
|
|
|
|
# domain in a whitelist implies checking for an Author Domain Signature |
1171
|
0
|
|
|
|
|
|
# |
1172
|
0
|
|
|
|
|
|
my ($self, $pms, $acceptable_sdid_tuples_ref, $wl) = @_; |
1173
|
0
|
|
|
|
|
|
my $wl_ref = $pms->{conf}->{$wl}; |
1174
|
0
|
0
|
|
|
|
|
foreach my $author (@{$pms->{dkim_author_addresses}}) { |
1175
|
0
|
0
|
|
|
|
|
foreach my $white_addr (keys %$wl_ref) { |
1176
|
0
|
0
|
|
|
|
|
my $wl_addr_ref = $wl_ref->{$white_addr}; |
|
0
|
|
|
|
|
|
|
1177
|
|
|
|
|
|
|
my $re = qr/$wl_addr_ref->{re}/i; |
1178
|
|
|
|
|
|
|
# dbg("dkim: WL %s %s, d: %s", $wl, $white_addr, |
1179
|
0
|
0
|
|
|
|
|
# join(", ", map { $_ eq '' ? "''" : $_ } @{$wl_addr_ref->{domain}})); |
|
|
0
|
|
|
|
|
|
1180
|
0
|
|
|
|
|
|
if ($author =~ $re) { |
1181
|
|
|
|
|
|
|
foreach my $sdid (@{$wl_addr_ref->{domain}}) { |
1182
|
|
|
|
|
|
|
push(@$acceptable_sdid_tuples_ref, [$author,$sdid,$wl,$re]); |
1183
|
0
|
|
|
|
|
|
} |
1184
|
|
|
|
|
|
|
} |
1185
|
|
|
|
|
|
|
} |
1186
|
0
|
|
|
|
|
|
} |
1187
|
|
|
|
|
|
|
} |
1188
|
|
|
|
|
|
|
|
1189
|
|
|
|
|
|
|
# use a traditional whitelist_from -style addrlist, the only acceptable DKIM |
1190
|
|
|
|
|
|
|
# signature is an Author Domain Signature. Note: don't pre-parse and store |
1191
|
|
|
|
|
|
|
# domains; that's inefficient memory-wise and only saves one m// |
1192
|
|
|
|
|
|
|
# |
1193
|
|
|
|
|
|
|
my ($self, $pms, $acceptable_sdid_tuples_ref, $wl) = @_; |
1194
|
0
|
|
|
0
|
|
|
my $wl_ref = $pms->{conf}->{$wl}; |
1195
|
0
|
|
|
|
|
|
foreach my $author (@{$pms->{dkim_author_addresses}}) { |
1196
|
0
|
|
|
|
|
|
foreach my $white_addr (keys %$wl_ref) { |
|
0
|
|
|
|
|
|
|
1197
|
0
|
|
|
|
|
|
my $re = qr/$wl_ref->{$white_addr}/i; |
1198
|
0
|
|
|
|
|
|
# dbg("dkim: WL %s %s", $wl, $white_addr); |
1199
|
0
|
|
|
|
|
|
if ($author =~ $re) { |
1200
|
|
|
|
|
|
|
push(@$acceptable_sdid_tuples_ref, [$author,undef,$wl,$re]); |
1201
|
|
|
|
|
|
|
} |
1202
|
0
|
0
|
|
|
|
|
} |
1203
|
0
|
|
|
|
|
|
} |
|
0
|
|
|
|
|
|
|
1204
|
0
|
|
|
|
|
|
} |
1205
|
|
|
|
|
|
|
|
1206
|
|
|
|
|
|
|
my ($self, $pms, $acceptable_sdid_tuples_ref) = @_; |
1207
|
|
|
|
|
|
|
|
1208
|
|
|
|
|
|
|
my %any_match_by_wl; |
1209
|
|
|
|
|
|
|
my $any_match_at_all = 0; |
1210
|
|
|
|
|
|
|
my $verifier = $pms->{dkim_verifier}; |
1211
|
|
|
|
|
|
|
my $minimum_key_bits = $pms->{conf}->{dkim_minimum_key_bits}; |
1212
|
|
|
|
|
|
|
|
1213
|
|
|
|
|
|
|
# walk through all signatures present in a message |
1214
|
|
|
|
|
|
|
foreach my $signature (@{$pms->{dkim_signatures}}) { |
1215
|
|
|
|
|
|
|
# old versions of Mail::DKIM would give undef for an invalid signature |
1216
|
0
|
|
|
0
|
|
|
next if !defined $signature; |
1217
|
0
|
|
|
|
|
|
next if !$signature->selector; # empty selector |
1218
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
1219
|
0
|
|
|
|
|
|
my $sig_result_supported = $signature->UNIVERSAL::can("result_detail"); |
1220
|
0
|
|
|
|
|
|
my($info, $valid, $expired, $key_size_weak); |
1221
|
|
|
|
|
|
|
$valid = |
1222
|
0
|
0
|
|
|
|
|
($sig_result_supported ? $signature : $verifier)->result eq 'pass'; |
1223
|
0
|
|
|
|
|
|
$info = $valid ? 'VALID' : 'FAILED'; |
1224
|
|
|
|
|
|
|
if ($valid && $signature->UNIVERSAL::can("check_expiration")) { |
1225
|
|
|
|
|
|
|
$expired = !$signature->check_expiration; |
1226
|
|
|
|
|
|
|
$info .= ' EXPIRED' if $expired; |
1227
|
|
|
|
|
|
|
} |
1228
|
|
|
|
|
|
|
if ($valid && !$expired && $minimum_key_bits) { |
1229
|
|
|
|
|
|
|
my $key_size = $signature->{_spamassassin_key_size}; |
1230
|
0
|
|
|
0
|
|
|
if ($key_size && $key_size < $minimum_key_bits) { |
1231
|
|
|
|
|
|
|
$info .= " WEAK($key_size)"; $key_size_weak = 1; |
1232
|
0
|
|
|
|
|
|
} |
1233
|
0
|
|
|
|
|
|
} |
1234
|
0
|
|
|
|
|
|
|
1235
|
0
|
|
|
|
|
|
my $sdid = $signature->domain; |
1236
|
|
|
|
|
|
|
$sdid = lc $sdid if defined $sdid; |
1237
|
|
|
|
|
|
|
|
1238
|
0
|
|
|
|
|
|
my %tried_authors; |
|
0
|
|
|
|
|
|
|
1239
|
|
|
|
|
|
|
foreach my $entry (@$acceptable_sdid_tuples_ref) { |
1240
|
0
|
0
|
|
|
|
|
my($author, $acceptable_sdid, $wl, $re) = @$entry; |
1241
|
0
|
0
|
|
|
|
|
# $re and $wl are here for logging purposes only, $re already checked. |
1242
|
|
|
|
|
|
|
# The $acceptable_sdid is a verifier-acceptable signing domain |
1243
|
0
|
|
|
|
|
|
# identifier (to be matched against a 'd' tag in signatures). |
1244
|
0
|
|
|
|
|
|
# When $acceptable_sdid is undef or an empty string it implies |
1245
|
0
|
0
|
|
|
|
|
# a check for Author Domain Signature. |
1246
|
|
|
|
|
|
|
|
1247
|
0
|
0
|
|
|
|
|
local $1; |
1248
|
0
|
0
|
0
|
|
|
|
my $author_domain = $author !~ /\@([^\@]+)\z/s ? '' : lc $1; |
1249
|
0
|
|
|
|
|
|
$tried_authors{$author} = 1; # for logging purposes |
1250
|
0
|
0
|
|
|
|
|
|
1251
|
|
|
|
|
|
|
my $matches = 0; |
1252
|
0
|
0
|
0
|
|
|
|
if (!defined $sdid) { |
|
|
|
0
|
|
|
|
|
1253
|
0
|
|
|
|
|
|
# don't bother, invalid signature with a missing 'd' tag |
1254
|
0
|
0
|
0
|
|
|
|
|
1255
|
0
|
|
|
|
|
|
} elsif (!defined $acceptable_sdid || $acceptable_sdid eq '') { |
|
0
|
|
|
|
|
|
|
1256
|
|
|
|
|
|
|
# An "Author Domain Signature" (sometimes called a first-party |
1257
|
|
|
|
|
|
|
# signature) is a Valid Signature in which the domain name of the |
1258
|
|
|
|
|
|
|
# DKIM signing entity, i.e., the d= tag in the DKIM-Signature header |
1259
|
0
|
|
|
|
|
|
# field, is the same as the domain name in the Author Address. |
1260
|
0
|
0
|
|
|
|
|
# Following [RFC5321], domain name comparisons are case insensitive. |
1261
|
|
|
|
|
|
|
|
1262
|
0
|
|
|
|
|
|
# checking for Author Domain Signature |
1263
|
0
|
|
|
|
|
|
$matches = 1 if $sdid eq $author_domain; |
1264
|
0
|
|
|
|
|
|
|
1265
|
|
|
|
|
|
|
} else { # checking for verifier-acceptable signature |
1266
|
|
|
|
|
|
|
# The second argument to a 'whitelist_from_dkim' option is now (since |
1267
|
|
|
|
|
|
|
# version 3.3.0) supposed to be a signing domain (SDID), no longer an |
1268
|
|
|
|
|
|
|
# identity (AUID). Nevertheless, be prepared to accept the full e-mail |
1269
|
|
|
|
|
|
|
# address there for compatibility, and just ignore its local-part. |
1270
|
|
|
|
|
|
|
|
1271
|
0
|
|
|
|
|
|
$acceptable_sdid = $1 if $acceptable_sdid =~ /\@([^\@]*)\z/s; |
1272
|
0
|
0
|
|
|
|
|
if ($acceptable_sdid =~ s/^\*?\.//s) { |
1273
|
0
|
|
|
|
|
|
$matches = 1 if $sdid =~ /\.\Q$acceptable_sdid\E\z/si; |
1274
|
|
|
|
|
|
|
} else { |
1275
|
0
|
|
|
|
|
|
$matches = 1 if $sdid eq lc $acceptable_sdid; |
1276
|
0
|
0
|
0
|
|
|
|
} |
|
|
0
|
|
|
|
|
|
1277
|
|
|
|
|
|
|
} |
1278
|
|
|
|
|
|
|
if ($matches) { |
1279
|
|
|
|
|
|
|
if (would_log("dbg","dkim")) { |
1280
|
|
|
|
|
|
|
if ($sdid eq $author_domain) { |
1281
|
|
|
|
|
|
|
dbg("dkim: %s author domain signature by %s, MATCHES %s %s", |
1282
|
|
|
|
|
|
|
$info, $sdid, $wl, $re); |
1283
|
|
|
|
|
|
|
} else { |
1284
|
|
|
|
|
|
|
dbg("dkim: %s third-party signature by %s, author domain %s, ". |
1285
|
|
|
|
|
|
|
"MATCHES %s %s", $info, $sdid, $author_domain, $wl, $re); |
1286
|
|
|
|
|
|
|
} |
1287
|
0
|
0
|
|
|
|
|
} |
1288
|
|
|
|
|
|
|
# a defined value indicates at least a match, not necessarily valid |
1289
|
|
|
|
|
|
|
# (this complication servers to preserve logging compatibility) |
1290
|
|
|
|
|
|
|
$any_match_by_wl{$wl} = '' if !exists $any_match_by_wl{$wl}; |
1291
|
|
|
|
|
|
|
} |
1292
|
|
|
|
|
|
|
# only valid signature can cause whitelisting |
1293
|
|
|
|
|
|
|
$matches = 0 if !$valid || $expired || $key_size_weak; |
1294
|
|
|
|
|
|
|
|
1295
|
0
|
0
|
|
|
|
|
if ($matches) { |
1296
|
0
|
0
|
|
|
|
|
$any_match_at_all = 1; |
1297
|
0
|
0
|
|
|
|
|
$any_match_by_wl{$wl} = $sdid; # value used for debug logging |
1298
|
|
|
|
|
|
|
} |
1299
|
0
|
0
|
|
|
|
|
} |
1300
|
|
|
|
|
|
|
dbg("dkim: %s signature by %s, author %s, no valid matches", |
1301
|
|
|
|
|
|
|
$info, defined $sdid ? $sdid : '(undef)', |
1302
|
0
|
0
|
|
|
|
|
join(", ", keys %tried_authors)) if !$any_match_at_all; |
1303
|
0
|
0
|
|
|
|
|
} |
1304
|
0
|
0
|
|
|
|
|
return ($any_match_at_all, \%any_match_by_wl); |
1305
|
0
|
|
|
|
|
|
} |
1306
|
|
|
|
|
|
|
|
1307
|
|
|
|
|
|
|
1; |