mirror of
https://github.com/mjl-/mox.git
synced 2024-12-26 16:33:47 +03:00
e7699708ef
in smtpserver, we store dmarc evaluations (under the right conditions). in dmarcdb, we periodically (hourly) send dmarc reports if there are evaluations. for failed deliveries, we deliver the dsn quietly to a submailbox of the postmaster mailbox. this is on by default, but can be disabled in mox.conf.
172 lines
4.2 KiB
Go
172 lines
4.2 KiB
Go
package dmarcdb
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"github.com/prometheus/client_golang/prometheus/promauto"
|
|
|
|
"github.com/mjl-/bstore"
|
|
|
|
"github.com/mjl-/mox/dmarcrpt"
|
|
"github.com/mjl-/mox/dns"
|
|
"github.com/mjl-/mox/mox-"
|
|
)
|
|
|
|
var (
|
|
ReportsDBTypes = []any{DomainFeedback{}} // Types stored in DB.
|
|
ReportsDB *bstore.DB // Exported for backups.
|
|
reportsMutex sync.Mutex
|
|
)
|
|
|
|
var (
|
|
metricEvaluated = promauto.NewCounterVec(
|
|
prometheus.CounterOpts{
|
|
Name: "mox_dmarcdb_policy_evaluated_total",
|
|
Help: "Number of policy evaluations.",
|
|
},
|
|
// We only register validated domains for which we have a config.
|
|
[]string{"domain", "disposition", "dkim", "spf"},
|
|
)
|
|
metricDKIM = promauto.NewCounterVec(
|
|
prometheus.CounterOpts{
|
|
Name: "mox_dmarcdb_dkim_result_total",
|
|
Help: "Number of DKIM results.",
|
|
},
|
|
[]string{"result"},
|
|
)
|
|
metricSPF = promauto.NewCounterVec(
|
|
prometheus.CounterOpts{
|
|
Name: "mox_dmarcdb_spf_result_total",
|
|
Help: "Number of SPF results.",
|
|
},
|
|
[]string{"result"},
|
|
)
|
|
)
|
|
|
|
// DomainFeedback is a single report stored in the database.
|
|
type DomainFeedback struct {
|
|
ID int64
|
|
// Domain where DMARC DNS record was found, could be organizational domain.
|
|
Domain string `bstore:"index"`
|
|
// Domain in From-header.
|
|
FromDomain string `bstore:"index"`
|
|
dmarcrpt.Feedback
|
|
}
|
|
|
|
func reportsDB(ctx context.Context) (rdb *bstore.DB, rerr error) {
|
|
reportsMutex.Lock()
|
|
defer reportsMutex.Unlock()
|
|
if ReportsDB == nil {
|
|
p := mox.DataDirPath("dmarcrpt.db")
|
|
os.MkdirAll(filepath.Dir(p), 0770)
|
|
db, err := bstore.Open(ctx, p, &bstore.Options{Timeout: 5 * time.Second, Perm: 0660}, ReportsDBTypes...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ReportsDB = db
|
|
}
|
|
return ReportsDB, nil
|
|
}
|
|
|
|
// AddReport adds a DMARC aggregate feedback report from an email to the database,
|
|
// and updates prometheus metrics.
|
|
//
|
|
// fromDomain is the domain in the report message From header.
|
|
func AddReport(ctx context.Context, f *dmarcrpt.Feedback, fromDomain dns.Domain) error {
|
|
db, err := reportsDB(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
d, err := dns.ParseDomain(f.PolicyPublished.Domain)
|
|
if err != nil {
|
|
return fmt.Errorf("parsing domain in report: %v", err)
|
|
}
|
|
|
|
df := DomainFeedback{0, d.Name(), fromDomain.Name(), *f}
|
|
if err := db.Insert(ctx, &df); err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, r := range f.Records {
|
|
for _, dkim := range r.AuthResults.DKIM {
|
|
count := r.Row.Count
|
|
if count > 0 {
|
|
metricDKIM.With(prometheus.Labels{
|
|
"result": string(dkim.Result),
|
|
}).Add(float64(count))
|
|
}
|
|
}
|
|
|
|
for _, spf := range r.AuthResults.SPF {
|
|
count := r.Row.Count
|
|
if count > 0 {
|
|
metricSPF.With(prometheus.Labels{
|
|
"result": string(spf.Result),
|
|
}).Add(float64(count))
|
|
}
|
|
}
|
|
|
|
count := r.Row.Count
|
|
if count > 0 {
|
|
pe := r.Row.PolicyEvaluated
|
|
metricEvaluated.With(prometheus.Labels{
|
|
"domain": f.PolicyPublished.Domain,
|
|
"disposition": string(pe.Disposition),
|
|
"dkim": string(pe.DKIM),
|
|
"spf": string(pe.SPF),
|
|
}).Add(float64(count))
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Records returns all reports in the database.
|
|
func Records(ctx context.Context) ([]DomainFeedback, error) {
|
|
db, err := reportsDB(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return bstore.QueryDB[DomainFeedback](ctx, db).List()
|
|
}
|
|
|
|
// RecordID returns the report for the ID.
|
|
func RecordID(ctx context.Context, id int64) (DomainFeedback, error) {
|
|
db, err := reportsDB(ctx)
|
|
if err != nil {
|
|
return DomainFeedback{}, err
|
|
}
|
|
|
|
e := DomainFeedback{ID: id}
|
|
err = db.Get(ctx, &e)
|
|
return e, err
|
|
}
|
|
|
|
// RecordsPeriodDomain returns the reports overlapping start and end, for the given
|
|
// domain. If domain is empty, all records match for domain.
|
|
func RecordsPeriodDomain(ctx context.Context, start, end time.Time, domain string) ([]DomainFeedback, error) {
|
|
db, err := reportsDB(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
s := start.Unix()
|
|
e := end.Unix()
|
|
|
|
q := bstore.QueryDB[DomainFeedback](ctx, db)
|
|
if domain != "" {
|
|
q.FilterNonzero(DomainFeedback{Domain: domain})
|
|
}
|
|
q.FilterFn(func(d DomainFeedback) bool {
|
|
m := d.Feedback.ReportMetadata.DateRange
|
|
return m.Begin >= s && m.Begin < e || m.End > s && m.End <= e
|
|
})
|
|
return q.List()
|
|
}
|