2023-01-30 16:27:06 +03:00
|
|
|
package dmarcdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
"github.com/prometheus/client_golang/prometheus/promauto"
|
|
|
|
|
|
|
|
"github.com/mjl-/bstore"
|
|
|
|
|
|
|
|
"github.com/mjl-/mox/dmarcrpt"
|
|
|
|
"github.com/mjl-/mox/dns"
|
|
|
|
"github.com/mjl-/mox/mox-"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2023-11-01 19:55:40 +03:00
|
|
|
ReportsDBTypes = []any{DomainFeedback{}} // Types stored in DB.
|
|
|
|
ReportsDB *bstore.DB // Exported for backups.
|
|
|
|
reportsMutex sync.Mutex
|
2023-01-30 16:27:06 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
metricEvaluated = promauto.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "mox_dmarcdb_policy_evaluated_total",
|
|
|
|
Help: "Number of policy evaluations.",
|
|
|
|
},
|
|
|
|
// We only register validated domains for which we have a config.
|
|
|
|
[]string{"domain", "disposition", "dkim", "spf"},
|
|
|
|
)
|
|
|
|
metricDKIM = promauto.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "mox_dmarcdb_dkim_result_total",
|
|
|
|
Help: "Number of DKIM results.",
|
|
|
|
},
|
|
|
|
[]string{"result"},
|
|
|
|
)
|
|
|
|
metricSPF = promauto.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "mox_dmarcdb_spf_result_total",
|
|
|
|
Help: "Number of SPF results.",
|
|
|
|
},
|
|
|
|
[]string{"result"},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
// DomainFeedback is a single report stored in the database.
|
|
|
|
type DomainFeedback struct {
|
|
|
|
ID int64
|
|
|
|
// Domain where DMARC DNS record was found, could be organizational domain.
|
|
|
|
Domain string `bstore:"index"`
|
|
|
|
// Domain in From-header.
|
|
|
|
FromDomain string `bstore:"index"`
|
|
|
|
dmarcrpt.Feedback
|
|
|
|
}
|
|
|
|
|
2023-11-01 19:55:40 +03:00
|
|
|
func reportsDB(ctx context.Context) (rdb *bstore.DB, rerr error) {
|
|
|
|
reportsMutex.Lock()
|
|
|
|
defer reportsMutex.Unlock()
|
|
|
|
if ReportsDB == nil {
|
2023-01-30 16:27:06 +03:00
|
|
|
p := mox.DataDirPath("dmarcrpt.db")
|
|
|
|
os.MkdirAll(filepath.Dir(p), 0770)
|
2023-11-01 19:55:40 +03:00
|
|
|
db, err := bstore.Open(ctx, p, &bstore.Options{Timeout: 5 * time.Second, Perm: 0660}, ReportsDBTypes...)
|
2023-01-30 16:27:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-11-01 19:55:40 +03:00
|
|
|
ReportsDB = db
|
2023-01-30 16:27:06 +03:00
|
|
|
}
|
2023-11-01 19:55:40 +03:00
|
|
|
return ReportsDB, nil
|
2023-01-30 16:27:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// AddReport adds a DMARC aggregate feedback report from an email to the database,
|
|
|
|
// and updates prometheus metrics.
|
|
|
|
//
|
|
|
|
// fromDomain is the domain in the report message From header.
|
|
|
|
func AddReport(ctx context.Context, f *dmarcrpt.Feedback, fromDomain dns.Domain) error {
|
2023-11-01 19:55:40 +03:00
|
|
|
db, err := reportsDB(ctx)
|
2023-01-30 16:27:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d, err := dns.ParseDomain(f.PolicyPublished.Domain)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("parsing domain in report: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
df := DomainFeedback{0, d.Name(), fromDomain.Name(), *f}
|
2023-05-22 15:40:36 +03:00
|
|
|
if err := db.Insert(ctx, &df); err != nil {
|
2023-01-30 16:27:06 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, r := range f.Records {
|
|
|
|
for _, dkim := range r.AuthResults.DKIM {
|
|
|
|
count := r.Row.Count
|
|
|
|
if count > 0 {
|
|
|
|
metricDKIM.With(prometheus.Labels{
|
|
|
|
"result": string(dkim.Result),
|
|
|
|
}).Add(float64(count))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, spf := range r.AuthResults.SPF {
|
|
|
|
count := r.Row.Count
|
|
|
|
if count > 0 {
|
|
|
|
metricSPF.With(prometheus.Labels{
|
|
|
|
"result": string(spf.Result),
|
|
|
|
}).Add(float64(count))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
count := r.Row.Count
|
|
|
|
if count > 0 {
|
|
|
|
pe := r.Row.PolicyEvaluated
|
|
|
|
metricEvaluated.With(prometheus.Labels{
|
|
|
|
"domain": f.PolicyPublished.Domain,
|
|
|
|
"disposition": string(pe.Disposition),
|
|
|
|
"dkim": string(pe.DKIM),
|
|
|
|
"spf": string(pe.SPF),
|
|
|
|
}).Add(float64(count))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Records returns all reports in the database.
|
|
|
|
func Records(ctx context.Context) ([]DomainFeedback, error) {
|
2023-11-01 19:55:40 +03:00
|
|
|
db, err := reportsDB(ctx)
|
2023-01-30 16:27:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-05-22 15:40:36 +03:00
|
|
|
return bstore.QueryDB[DomainFeedback](ctx, db).List()
|
2023-01-30 16:27:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// RecordID returns the report for the ID.
|
|
|
|
func RecordID(ctx context.Context, id int64) (DomainFeedback, error) {
|
2023-11-01 19:55:40 +03:00
|
|
|
db, err := reportsDB(ctx)
|
2023-01-30 16:27:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return DomainFeedback{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
e := DomainFeedback{ID: id}
|
2023-05-22 15:40:36 +03:00
|
|
|
err = db.Get(ctx, &e)
|
2023-01-30 16:27:06 +03:00
|
|
|
return e, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// RecordsPeriodDomain returns the reports overlapping start and end, for the given
|
|
|
|
// domain. If domain is empty, all records match for domain.
|
|
|
|
func RecordsPeriodDomain(ctx context.Context, start, end time.Time, domain string) ([]DomainFeedback, error) {
|
2023-11-01 19:55:40 +03:00
|
|
|
db, err := reportsDB(ctx)
|
2023-01-30 16:27:06 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
s := start.Unix()
|
|
|
|
e := end.Unix()
|
|
|
|
|
2023-05-22 15:40:36 +03:00
|
|
|
q := bstore.QueryDB[DomainFeedback](ctx, db)
|
2023-01-30 16:27:06 +03:00
|
|
|
if domain != "" {
|
|
|
|
q.FilterNonzero(DomainFeedback{Domain: domain})
|
|
|
|
}
|
|
|
|
q.FilterFn(func(d DomainFeedback) bool {
|
|
|
|
m := d.Feedback.ReportMetadata.DateRange
|
|
|
|
return m.Begin >= s && m.Begin < e || m.End > s && m.End <= e
|
|
|
|
})
|
|
|
|
return q.List()
|
|
|
|
}
|