mirror of
https://github.com/mjl-/mox.git
synced 2024-12-26 08:23:48 +03:00
add pedantic mode (used by localserve) that refuses some behaviour that is invalid according to specifications and that we normally accept for compatibility
This commit is contained in:
parent
132f08913b
commit
317dc78397
16 changed files with 127 additions and 56 deletions
|
@ -35,7 +35,7 @@ See Quickstart below to get started.
|
|||
proxy), so port 443 can also be used to serve websites.
|
||||
- Prometheus metrics and structured logging for operational insight.
|
||||
- "localserve" subcommand for running mox locally for email-related
|
||||
testing/developing.
|
||||
testing/developing, including pedantic mode.
|
||||
|
||||
Mox is available under the MIT-license and was created by Mechiel Lukkien,
|
||||
mechiel@ueber.net. Mox includes the Public Suffix List by Mozilla, under Mozilla
|
||||
|
@ -109,8 +109,6 @@ The code is heavily cross-referenced with the RFCs for readability/maintainabili
|
|||
|
||||
## Roadmap
|
||||
|
||||
- Strict vs lax mode, defaulting to lax when receiving from the internet, and
|
||||
strict when sending.
|
||||
- Rate limiting and spam detection for submitted/outgoing messages, to reduce
|
||||
impact when an account gets compromised.
|
||||
- Privilege separation, isolating parts of the application to more restricted
|
||||
|
|
|
@ -38,6 +38,7 @@ type Static struct {
|
|||
Hostname string `sconf-doc:"Full hostname of system, e.g. mail.<domain>"`
|
||||
HostnameDomain dns.Domain `sconf:"-" json:"-"` // Parsed form of hostname.
|
||||
CheckUpdates bool `sconf:"optional" sconf-doc:"If enabled, a single DNS TXT lookup of _updates.xmox.nl is done every 24h to check for a new release. Each time a new release is found, a changelog is fetched from https://updates.xmox.nl and delivered to the postmaster mailbox."`
|
||||
Pedantic bool `sconf:"optional" sconf-doc:"In pedantic mode protocol violations (that happen in the wild) for SMTP/IMAP/etc result in errors instead of accepting such behaviour."`
|
||||
TLS struct {
|
||||
CA *struct {
|
||||
AdditionalToSystem bool `sconf:"optional"`
|
||||
|
|
|
@ -49,6 +49,10 @@ describe-static" and "mox config describe-domains":
|
|||
# (optional)
|
||||
CheckUpdates: false
|
||||
|
||||
# In pedantic mode protocol violations (that happen in the wild) for SMTP/IMAP/etc
|
||||
# result in errors instead of accepting such behaviour. (optional)
|
||||
Pedantic: false
|
||||
|
||||
# Global TLS configuration, e.g. for additional Certificate Authorities. Used for
|
||||
# outgoing SMTP connections, HTTPS requests. (optional)
|
||||
TLS:
|
||||
|
|
|
@ -7,6 +7,7 @@ import (
|
|||
"strings"
|
||||
|
||||
"github.com/mjl-/mox/dns"
|
||||
"github.com/mjl-/mox/moxvar"
|
||||
"github.com/mjl-/mox/smtp"
|
||||
)
|
||||
|
||||
|
@ -194,11 +195,12 @@ func (p *parser) xcanonical() string {
|
|||
return s
|
||||
}
|
||||
|
||||
func (p *parser) xdomain() dns.Domain {
|
||||
func (p *parser) xdomainselector(isselector bool) dns.Domain {
|
||||
subdomain := func(c rune, i int) bool {
|
||||
// domain names must always be a-labels, ../rfc/6376:1115 ../rfc/6376:1187 ../rfc/6376:1303
|
||||
// todo: add a "lax" mode where underscore is allowed if this is a selector? seen in the wild, but invalid: ../rfc/6376:581 ../rfc/5321:2303
|
||||
return isalphadigit(c) || (i > 0 && c == '-' && p.o+1 < len(p.s))
|
||||
// dkim selectors with underscores happen in the wild, accept them when not in
|
||||
// pedantic mode. ../rfc/6376:581 ../rfc/5321:2303
|
||||
return isalphadigit(c) || (i > 0 && (c == '-' || isselector && !moxvar.Pedantic && c == '_') && p.o+1 < len(p.s))
|
||||
}
|
||||
s := p.xtakefn1(false, subdomain)
|
||||
for p.hasPrefix(".") {
|
||||
|
@ -206,11 +208,23 @@ func (p *parser) xdomain() dns.Domain {
|
|||
}
|
||||
d, err := dns.ParseDomain(s)
|
||||
if err != nil {
|
||||
// ParseDomain does not allow underscore, work around it.
|
||||
if strings.Contains(s, "_") && isselector && !moxvar.Pedantic {
|
||||
return dns.Domain{ASCII: strings.ToLower(s)}
|
||||
}
|
||||
p.xerrorf("parsing domain %q: %s", s, err)
|
||||
}
|
||||
return d
|
||||
}
|
||||
|
||||
func (p *parser) xdomain() dns.Domain {
|
||||
return p.xdomainselector(false)
|
||||
}
|
||||
|
||||
func (p *parser) xselector() dns.Domain {
|
||||
return p.xdomainselector(true)
|
||||
}
|
||||
|
||||
func (p *parser) xhdrName(ignoreFWS bool) string {
|
||||
// ../rfc/6376:473
|
||||
// ../rfc/5322:1689
|
||||
|
@ -258,8 +272,8 @@ func (p *parser) xlocalpart() smtp.Localpart {
|
|||
s += "." + p.xatom()
|
||||
}
|
||||
}
|
||||
// todo: have a strict parser that only allows the actual max of 64 bytes. some services have large localparts because of generated (bounce) addresses.
|
||||
if len(s) > 128 {
|
||||
// In the wild, some services use large localparts for generated (bounce) addresses.
|
||||
if moxvar.Pedantic && len(s) > 64 || len(s) > 128 {
|
||||
// ../rfc/5321:3486
|
||||
p.xerrorf("localpart longer than 64 octets")
|
||||
}
|
||||
|
@ -458,10 +472,6 @@ func (p *parser) xqp(pipeEncoded, colonEncoded, ignoreFWS bool) string {
|
|||
return s
|
||||
}
|
||||
|
||||
func (p *parser) xselector() dns.Domain {
|
||||
return p.xdomain()
|
||||
}
|
||||
|
||||
func (p *parser) xtimestamp() int64 {
|
||||
// ../rfc/6376:1325 ../rfc/6376:1358
|
||||
return p.xnumber(12)
|
||||
|
|
2
doc.go
2
doc.go
|
@ -12,7 +12,7 @@ low-maintenance self-hosted email.
|
|||
|
||||
# Commands
|
||||
|
||||
mox [-config config/mox.conf] ...
|
||||
mox [-config config/mox.conf] [-pedantic] ...
|
||||
mox serve
|
||||
mox quickstart [-existing-webserver] [-hostname host] user@domain [user | uid]
|
||||
mox stop
|
||||
|
|
|
@ -32,7 +32,7 @@ func Parse(r io.ReaderAt) (*Message, *message.Part, error) {
|
|||
if part.MediaType != "MULTIPART" || part.MediaSubType != "REPORT" {
|
||||
return nil, nil, fmt.Errorf(`message has content-type %q, must have "message/report"`, strings.ToLower(part.MediaType+"/"+part.MediaSubType))
|
||||
}
|
||||
err = part.Walk()
|
||||
err = part.Walk(nil)
|
||||
if err != nil {
|
||||
return nil, nil, fmt.Errorf("parsing message parts: %v", err)
|
||||
}
|
||||
|
|
|
@ -296,6 +296,7 @@ func writeLocalConfig(log *mlog.Log, dir string) (rerr error) {
|
|||
Hostname: "localhost",
|
||||
User: fmt.Sprintf("%d", os.Getuid()),
|
||||
AdminPasswordFile: "adminpasswd",
|
||||
Pedantic: true,
|
||||
Listeners: map[string]config.Listener{
|
||||
"local": local,
|
||||
},
|
||||
|
|
35
main.go
35
main.go
|
@ -143,6 +143,7 @@ var commands = []struct {
|
|||
{"bumpuidvalidity", cmdBumpUIDValidity},
|
||||
{"dmarcdb addreport", cmdDMARCDBAddReport},
|
||||
{"ensureparsed", cmdEnsureParsed},
|
||||
{"message parse", cmdMessageParse},
|
||||
{"tlsrptdb addreport", cmdTLSRPTDBAddReport},
|
||||
{"updates addsigned", cmdUpdatesAddSigned},
|
||||
{"updates genkey", cmdUpdatesGenkey},
|
||||
|
@ -326,7 +327,7 @@ Used to generate documentation.
|
|||
func usage(l []cmd, unlisted bool) {
|
||||
var lines []string
|
||||
if !unlisted {
|
||||
lines = append(lines, "mox [-config config/mox.conf] ...")
|
||||
lines = append(lines, "mox [-config config/mox.conf] [-pedantic] ...")
|
||||
}
|
||||
for _, c := range l {
|
||||
c.gather()
|
||||
|
@ -352,6 +353,7 @@ func usage(l []cmd, unlisted bool) {
|
|||
}
|
||||
|
||||
var loglevel string
|
||||
var pedantic bool
|
||||
|
||||
// subcommands that are not "serve" should use this function to load the config, it
|
||||
// restores any loglevel specified on the command-line, instead of using the
|
||||
|
@ -362,6 +364,9 @@ func mustLoadConfig() {
|
|||
mox.Conf.Log[""] = level
|
||||
mlog.SetConfig(mox.Conf.Log)
|
||||
}
|
||||
if pedantic {
|
||||
moxvar.Pedantic = true
|
||||
}
|
||||
}
|
||||
|
||||
func main() {
|
||||
|
@ -380,6 +385,7 @@ func main() {
|
|||
|
||||
flag.StringVar(&mox.ConfigStaticPath, "config", envString("MOXCONF", "config/mox.conf"), "configuration file, other config files are looked up in the same directory, defaults to $MOXCONF with a fallback to mox.conf")
|
||||
flag.StringVar(&loglevel, "loglevel", "", "if non-empty, this log level is set early in startup")
|
||||
flag.BoolVar(&pedantic, "pedantic", false, "protocol violations result in errors instead of accepting/working around them")
|
||||
|
||||
flag.Usage = func() { usage(cmds, false) }
|
||||
flag.Parse()
|
||||
|
@ -387,6 +393,9 @@ func main() {
|
|||
if len(args) == 0 {
|
||||
usage(cmds, false)
|
||||
}
|
||||
if pedantic {
|
||||
moxvar.Pedantic = true
|
||||
}
|
||||
|
||||
mox.ConfigDynamicPath = filepath.Join(filepath.Dir(mox.ConfigStaticPath), "domains.conf")
|
||||
if level, ok := mlog.Levels[loglevel]; ok && loglevel != "" {
|
||||
|
@ -1898,6 +1907,30 @@ func cmdEnsureParsed(c *cmd) {
|
|||
fmt.Printf("%d messages updated\n", n)
|
||||
}
|
||||
|
||||
func cmdMessageParse(c *cmd) {
|
||||
c.unlisted = true
|
||||
c.params = "message.eml"
|
||||
c.help = "Parse message, print JSON representation."
|
||||
|
||||
args := c.Parse()
|
||||
if len(args) != 1 {
|
||||
c.Usage()
|
||||
}
|
||||
|
||||
f, err := os.Open(args[0])
|
||||
xcheckf(err, "open")
|
||||
defer f.Close()
|
||||
|
||||
part, err := message.Parse(f)
|
||||
xcheckf(err, "parsing message")
|
||||
err = part.Walk(nil)
|
||||
xcheckf(err, "parsing nested parts")
|
||||
enc := json.NewEncoder(os.Stdout)
|
||||
enc.SetIndent("", "\t")
|
||||
err = enc.Encode(part)
|
||||
xcheckf(err, "write")
|
||||
}
|
||||
|
||||
func cmdBumpUIDValidity(c *cmd) {
|
||||
c.unlisted = true
|
||||
c.params = "account mailbox"
|
||||
|
|
|
@ -26,6 +26,7 @@ import (
|
|||
"time"
|
||||
|
||||
"github.com/mjl-/mox/mlog"
|
||||
"github.com/mjl-/mox/moxvar"
|
||||
"github.com/mjl-/mox/smtp"
|
||||
)
|
||||
|
||||
|
@ -115,9 +116,19 @@ func Parse(r io.ReaderAt) (Part, error) {
|
|||
func EnsurePart(r io.ReaderAt, size int64) (Part, error) {
|
||||
p, err := Parse(r)
|
||||
if err == nil {
|
||||
err = p.Walk()
|
||||
err = p.Walk(nil)
|
||||
}
|
||||
if err != nil {
|
||||
np, err2 := fallbackPart(p, r, size)
|
||||
if err2 != nil {
|
||||
err = err2
|
||||
}
|
||||
p = np
|
||||
}
|
||||
return p, err
|
||||
}
|
||||
|
||||
func fallbackPart(p Part, r io.ReaderAt, size int64) (Part, error) {
|
||||
np := Part{
|
||||
HeaderOffset: p.HeaderOffset,
|
||||
BodyOffset: p.BodyOffset,
|
||||
|
@ -134,15 +145,10 @@ func EnsurePart(r io.ReaderAt, size int64) (Part, error) {
|
|||
// - RawLineCount and DecodedSize: set below.
|
||||
// - Parts: we are not treating this as a multipart message.
|
||||
}
|
||||
p = np
|
||||
p.SetReaderAt(r)
|
||||
np.SetReaderAt(r)
|
||||
// By reading body, the number of lines and decoded size will be set.
|
||||
_, err2 := io.Copy(io.Discard, p.Reader())
|
||||
if err2 != nil {
|
||||
err = err2
|
||||
}
|
||||
}
|
||||
return p, err
|
||||
_, err := io.Copy(io.Discard, np.Reader())
|
||||
return np, err
|
||||
}
|
||||
|
||||
// SetReaderAt sets r as reader for this part and all its sub parts, recursively.
|
||||
|
@ -170,7 +176,7 @@ func (p *Part) SetMessageReaderAt() error {
|
|||
}
|
||||
|
||||
// Walk through message, decoding along the way, and collecting mime part offsets and sizes, and line counts.
|
||||
func (p *Part) Walk() error {
|
||||
func (p *Part) Walk(parent *Part) error {
|
||||
if len(p.bound) == 0 {
|
||||
if p.MediaType == "MESSAGE" && (p.MediaSubType == "RFC822" || p.MediaSubType == "GLOBAL") {
|
||||
// todo: don't read whole submessage in memory...
|
||||
|
@ -178,14 +184,24 @@ func (p *Part) Walk() error {
|
|||
if err != nil {
|
||||
return err
|
||||
}
|
||||
mp, err := Parse(bytes.NewReader(buf))
|
||||
br := bytes.NewReader(buf)
|
||||
mp, err := Parse(br)
|
||||
if err != nil {
|
||||
return fmt.Errorf("parsing embedded message: %w", err)
|
||||
}
|
||||
// todo: if this is a DSN, we should have a lax parser that doesn't fail on unexpected end of file. this is quite common because MTA's can just truncate the original message.
|
||||
if err := mp.Walk(); err != nil {
|
||||
if err := mp.Walk(nil); err != nil {
|
||||
// If this is a DSN and we are not in pedantic mode, accept unexpected end of
|
||||
// message. This is quite common because MTA's sometimes just truncate the original
|
||||
// message in a place that makes the message invalid.
|
||||
if errors.Is(err, errUnexpectedEOF) && !moxvar.Pedantic && parent != nil && len(parent.Parts) >= 3 && p == &parent.Parts[2] && parent.MediaType == "MULTIPART" && parent.MediaSubType == "REPORT" {
|
||||
mp, err = fallbackPart(mp, br, int64(len(buf)))
|
||||
if err != nil {
|
||||
return fmt.Errorf("parsing invalid embedded message: %w", err)
|
||||
}
|
||||
} else {
|
||||
return fmt.Errorf("parsing parts of embedded message: %w", err)
|
||||
}
|
||||
}
|
||||
// todo: if mp does not contain any non-identity content-transfer-encoding, we should set an offsetReader of p.r on mp, recursively.
|
||||
p.Message = &mp
|
||||
return nil
|
||||
|
@ -202,7 +218,7 @@ func (p *Part) Walk() error {
|
|||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if err := pp.Walk(); err != nil {
|
||||
if err := pp.Walk(p); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
|
|
@ -123,7 +123,7 @@ func TestBasic2(t *testing.T) {
|
|||
r = strings.NewReader(basicMsg2)
|
||||
p, err = Parse(r)
|
||||
tcheck(t, err, "new reader")
|
||||
err = p.Walk()
|
||||
err = p.Walk(nil)
|
||||
tcheck(t, err, "walk")
|
||||
if p.RawLineCount != 2 {
|
||||
t.Fatalf("basic message, got %d lines, expected 2", p.RawLineCount)
|
||||
|
@ -224,7 +224,7 @@ test
|
|||
tfail(t, err, errMissingClosingBoundary)
|
||||
|
||||
msg, _ = Parse(strings.NewReader(message))
|
||||
err = msg.Walk()
|
||||
err = msg.Walk(nil)
|
||||
tfail(t, err, errMissingClosingBoundary)
|
||||
}
|
||||
|
||||
|
@ -277,7 +277,7 @@ test
|
|||
tcheck(t, err, "walkmsg")
|
||||
|
||||
msg, _ = Parse(strings.NewReader(message))
|
||||
err = msg.Walk()
|
||||
err = msg.Walk(nil)
|
||||
tcheck(t, err, "msg.Walk")
|
||||
}
|
||||
|
||||
|
@ -380,7 +380,7 @@ Content-Transfer-Encoding: Quoted-printable
|
|||
}
|
||||
|
||||
msg, _ = Parse(strings.NewReader(nestedMessage))
|
||||
err = msg.Walk()
|
||||
err = msg.Walk(nil)
|
||||
tcheck(t, err, "msg.Walk")
|
||||
|
||||
}
|
||||
|
@ -497,5 +497,5 @@ func TestEmbedded2(t *testing.T) {
|
|||
buf = bytes.ReplaceAll(buf, []byte("\n"), []byte("\r\n"))
|
||||
|
||||
_, err = EnsurePart(bytes.NewReader(buf), int64(len(buf)))
|
||||
tfail(t, err, errUnexpectedEOF) // todo: be able to parse this without an error? truncate message/rfc822 in dsn.
|
||||
tfail(t, err, nil)
|
||||
}
|
||||
|
|
|
@ -32,6 +32,7 @@ import (
|
|||
"github.com/mjl-/mox/dns"
|
||||
"github.com/mjl-/mox/mlog"
|
||||
"github.com/mjl-/mox/moxio"
|
||||
"github.com/mjl-/mox/moxvar"
|
||||
"github.com/mjl-/mox/mtasts"
|
||||
"github.com/mjl-/mox/smtp"
|
||||
)
|
||||
|
@ -352,6 +353,8 @@ func SetConfig(c *Config) {
|
|||
RootCAs: Conf.Static.TLS.CertPool,
|
||||
}
|
||||
}
|
||||
|
||||
moxvar.Pedantic = c.Static.Pedantic
|
||||
}
|
||||
|
||||
// ParseConfig parses the static config at path p. If checkOnly is true, no changes
|
||||
|
|
4
moxvar/pedantic.go
Normal file
4
moxvar/pedantic.go
Normal file
|
@ -0,0 +1,4 @@
|
|||
package moxvar
|
||||
|
||||
// Pendantic mode, in moxvar to prevent cyclic imports.
|
||||
var Pedantic bool
|
|
@ -7,6 +7,7 @@ import (
|
|||
"strings"
|
||||
|
||||
"github.com/mjl-/mox/dns"
|
||||
"github.com/mjl-/mox/moxvar"
|
||||
)
|
||||
|
||||
var ErrBadAddress = errors.New("invalid email address")
|
||||
|
@ -256,8 +257,8 @@ func (p *parser) xlocalpart() Localpart {
|
|||
s += "." + p.xatom()
|
||||
}
|
||||
}
|
||||
// todo: have a strict parser that only allows the actual max of 64 bytes. some services have large localparts because of generated (bounce) addresses.
|
||||
if len(s) > 128 {
|
||||
// In the wild, some services use large localparts for generated (bounce) addresses.
|
||||
if moxvar.Pedantic && len(s) > 64 || len(s) > 128 {
|
||||
// ../rfc/5321:3486
|
||||
p.xerrorf("localpart longer than 64 octets")
|
||||
}
|
||||
|
|
|
@ -8,6 +8,7 @@ import (
|
|||
"strings"
|
||||
|
||||
"github.com/mjl-/mox/dns"
|
||||
"github.com/mjl-/mox/moxvar"
|
||||
"github.com/mjl-/mox/smtp"
|
||||
)
|
||||
|
||||
|
@ -325,8 +326,8 @@ func (p *parser) xlocalpart() smtp.Localpart {
|
|||
s += "." + p.xatom(true)
|
||||
}
|
||||
}
|
||||
// todo: have a strict parser that only allows the actual max of 64 bytes. some services have large localparts because of generated (bounce) addresses.
|
||||
if len(s) > 128 {
|
||||
// In the wild, some services use large localparts for generated (bounce) addresses.
|
||||
if moxvar.Pedantic && len(s) > 64 || len(s) > 128 {
|
||||
// ../rfc/5321:3486
|
||||
p.xerrorf("localpart longer than 64 octets")
|
||||
}
|
||||
|
|
|
@ -284,8 +284,6 @@ type conn struct {
|
|||
ncmds int // Number of commands processed. Used to abort connection when first incoming command is unknown/invalid.
|
||||
dnsBLs []dns.Domain
|
||||
|
||||
// todo future: add a flag for "pedantic" mode, causing us to be strict. e.g. interpreting some SHOULD as MUST. ../rfc/5321:4076
|
||||
|
||||
// If non-zero, taken into account during Read and Write. Set while processing DATA
|
||||
// command, we don't want the entire delivery to take too long.
|
||||
deadline time.Time
|
||||
|
@ -1509,8 +1507,9 @@ func (c *conn) cmdData(p *parser) {
|
|||
// ../rfc/6409:541
|
||||
xsmtpUserErrorf(smtp.C554TransactionFailed, smtp.SeMsg6Other0, "message requires both header and body section")
|
||||
}
|
||||
// todo: check disabled because ios mail will attempt to send smtputf8 with non-ascii in message from localpart without using 8bitmime. we should have a non-lax mode that disallows this behaviour.
|
||||
if false && msgWriter.Has8bit && !c.has8bitmime {
|
||||
// Check only for pedantic mode because ios mail will attempt to send smtputf8 with
|
||||
// non-ascii in message from localpart without using 8bitmime.
|
||||
if moxvar.Pedantic && msgWriter.Has8bit && !c.has8bitmime {
|
||||
// ../rfc/5321:906
|
||||
xsmtpUserErrorf(smtp.C500BadSyntax, smtp.SeMsg6Other0, "message with non-us-ascii requires 8bitmime extension")
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
Return-Path: <>
|
||||
Date: Sun, 06 Apr 2008 09:38:06 +0900
|
||||
MIME-Version: 1.0
|
||||
Content-Type: Multipart/Mixed;
|
||||
Content-Type: multipart/report;
|
||||
boundary="------------Boundary-00=_JFOVO7CXFVB00L32QL80"
|
||||
|
||||
--------------Boundary-00=_JFOVO7CXFVB00L32QL80
|
||||
|
|
Loading…
Reference in a new issue