You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

mime_parser.c 43KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "task.h"
  18. #include "mime_parser.h"
  19. #include "mime_headers.h"
  20. #include "message.h"
  21. #include "multipattern.h"
  22. #include "contrib/libottery/ottery.h"
  23. #include "contrib/uthash/utlist.h"
  24. #include <openssl/cms.h>
  25. #include <openssl/pkcs7.h>
  26. #include "contrib/fastutf8/fastutf8.h"
  27. struct rspamd_mime_parser_lib_ctx {
  28. struct rspamd_multipattern *mp_boundary;
  29. guchar hkey[rspamd_cryptobox_SIPKEYBYTES]; /* Key for hashing */
  30. guint key_usages;
  31. };
  32. struct rspamd_mime_parser_lib_ctx *lib_ctx = NULL;
  33. static const guint max_nested = 64;
  34. static const guint max_key_usages = 10000;
  35. #define msg_debug_mime(...) rspamd_conditional_debug_fast (NULL, task->from_addr, \
  36. rspamd_mime_log_id, "mime", task->task_pool->tag.uid, \
  37. G_STRFUNC, \
  38. __VA_ARGS__)
  39. INIT_LOG_MODULE(mime)
  40. #define RSPAMD_MIME_BOUNDARY_FLAG_CLOSED (1 << 0)
  41. #define RSPAMD_BOUNDARY_IS_CLOSED(b) ((b)->flags & RSPAMD_MIME_BOUNDARY_FLAG_CLOSED)
  42. struct rspamd_mime_boundary {
  43. goffset boundary;
  44. goffset start;
  45. guint64 hash;
  46. guint64 closed_hash;
  47. gint flags;
  48. };
  49. struct rspamd_mime_parser_ctx {
  50. GPtrArray *stack; /* Stack of parts */
  51. GArray *boundaries; /* Boundaries found in the whole message */
  52. const gchar *start;
  53. const gchar *pos;
  54. const gchar *end;
  55. struct rspamd_task *task;
  56. guint nesting;
  57. };
  58. static enum rspamd_mime_parse_error
  59. rspamd_mime_parse_multipart_part (struct rspamd_task *task,
  60. struct rspamd_mime_part *part,
  61. struct rspamd_mime_parser_ctx *st,
  62. GError **err);
  63. static enum rspamd_mime_parse_error
  64. rspamd_mime_parse_message (struct rspamd_task *task,
  65. struct rspamd_mime_part *part,
  66. struct rspamd_mime_parser_ctx *st,
  67. GError **err);
  68. static enum rspamd_mime_parse_error
  69. rspamd_mime_parse_normal_part (struct rspamd_task *task,
  70. struct rspamd_mime_part *part,
  71. struct rspamd_mime_parser_ctx *st,
  72. struct rspamd_content_type *ct,
  73. GError **err);
  74. static enum rspamd_mime_parse_error
  75. rspamd_mime_process_multipart_node (struct rspamd_task *task,
  76. struct rspamd_mime_parser_ctx *st,
  77. struct rspamd_mime_part *multipart,
  78. const gchar *start, const gchar *end,
  79. gboolean is_finished,
  80. GError **err);
  81. #define RSPAMD_MIME_QUARK (rspamd_mime_parser_quark())
  82. static GQuark
  83. rspamd_mime_parser_quark (void)
  84. {
  85. return g_quark_from_static_string ("mime-parser");
  86. }
  87. const gchar*
  88. rspamd_cte_to_string (enum rspamd_cte ct)
  89. {
  90. const gchar *ret = "unknown";
  91. switch (ct) {
  92. case RSPAMD_CTE_7BIT:
  93. ret = "7bit";
  94. break;
  95. case RSPAMD_CTE_8BIT:
  96. ret = "8bit";
  97. break;
  98. case RSPAMD_CTE_QP:
  99. ret = "quoted-printable";
  100. break;
  101. case RSPAMD_CTE_B64:
  102. ret = "base64";
  103. break;
  104. case RSPAMD_CTE_UUE:
  105. ret = "X-uuencode";
  106. break;
  107. default:
  108. break;
  109. }
  110. return ret;
  111. }
  112. enum rspamd_cte
  113. rspamd_cte_from_string (const gchar *str)
  114. {
  115. enum rspamd_cte ret = RSPAMD_CTE_UNKNOWN;
  116. g_assert (str != NULL);
  117. if (strcmp (str, "7bit") == 0) {
  118. ret = RSPAMD_CTE_7BIT;
  119. }
  120. else if (strcmp (str, "8bit") == 0) {
  121. ret = RSPAMD_CTE_8BIT;
  122. }
  123. else if (strcmp (str, "quoted-printable") == 0) {
  124. ret = RSPAMD_CTE_QP;
  125. }
  126. else if (strcmp (str, "base64") == 0) {
  127. ret = RSPAMD_CTE_B64;
  128. }
  129. else if (strcmp (str, "X-uuencode") == 0) {
  130. ret = RSPAMD_CTE_UUE;
  131. }
  132. else if (strcmp (str, "uuencode") == 0) {
  133. ret = RSPAMD_CTE_UUE;
  134. }
  135. else if (strcmp (str, "X-uue") == 0) {
  136. ret = RSPAMD_CTE_UUE;
  137. }
  138. return ret;
  139. }
  140. static void
  141. rspamd_mime_parser_init_lib (void)
  142. {
  143. lib_ctx = g_malloc0 (sizeof (*lib_ctx));
  144. lib_ctx->mp_boundary = rspamd_multipattern_create (RSPAMD_MULTIPATTERN_DEFAULT);
  145. g_assert (lib_ctx->mp_boundary != NULL);
  146. rspamd_multipattern_add_pattern (lib_ctx->mp_boundary, "\r--", 0);
  147. rspamd_multipattern_add_pattern (lib_ctx->mp_boundary, "\n--", 0);
  148. g_assert (rspamd_multipattern_compile (lib_ctx->mp_boundary, NULL));
  149. ottery_rand_bytes (lib_ctx->hkey, sizeof (lib_ctx->hkey));
  150. }
  151. static enum rspamd_cte
  152. rspamd_mime_parse_cte (const gchar *in, gsize len)
  153. {
  154. guint64 h;
  155. enum rspamd_cte ret = RSPAMD_CTE_UNKNOWN;
  156. in = rspamd_string_len_strip (in, &len, " \t;,.+-#!`~'");
  157. h = rspamd_cryptobox_fast_hash_specific (RSPAMD_CRYPTOBOX_XXHASH64,
  158. in, len, 0xdeadbabe);
  159. switch (h) {
  160. case 0xCEDAA7056B4753F7ULL: /* 7bit */
  161. ret = RSPAMD_CTE_7BIT;
  162. break;
  163. case 0x42E0745448B39FC1ULL: /* 8bit */
  164. case 0x6B169E6B155BADC0ULL: /* binary */
  165. ret = RSPAMD_CTE_8BIT;
  166. break;
  167. case 0x6D69A5BB02A633B0ULL: /* quoted-printable */
  168. ret = RSPAMD_CTE_QP;
  169. break;
  170. case 0x96305588A76DC9A9ULL: /* base64 */
  171. case 0x171029DE1B0423A9ULL: /* base-64 */
  172. ret = RSPAMD_CTE_B64;
  173. break;
  174. case 0x420b54dc00d13cecULL: /* uuencode */
  175. case 0x8df6700b8f6c4cf9ULL: /* x-uuencode */
  176. case 0x41f725ec544356d3ULL: /* x-uue */
  177. ret = RSPAMD_CTE_UUE;
  178. break;
  179. }
  180. return ret;
  181. }
  182. static enum rspamd_cte
  183. rspamd_mime_part_get_cte_heuristic (struct rspamd_task *task,
  184. struct rspamd_mime_part *part)
  185. {
  186. const guint check_len = 128;
  187. guint real_len, nspaces = 0, neqsign = 0, n8bit = 0, nqpencoded = 0,
  188. padeqsign = 0, nupper = 0, nlower = 0;
  189. gboolean b64_chars = TRUE;
  190. const guchar *p, *end;
  191. enum rspamd_cte ret = RSPAMD_CTE_UNKNOWN;
  192. real_len = MIN (check_len, part->raw_data.len);
  193. p = (const guchar *)part->raw_data.begin;
  194. end = p + part->raw_data.len;
  195. while (p < end && g_ascii_isspace (*p)) {
  196. p ++;
  197. }
  198. if (end - p > sizeof ("begin-base64 ")) {
  199. const guchar *uue_start;
  200. if (memcmp (p, "begin ", sizeof ("begin ") - 1) == 0) {
  201. uue_start = p + sizeof ("begin ") - 1;
  202. while (uue_start < end && g_ascii_isspace (*uue_start)) {
  203. uue_start ++;
  204. }
  205. if (uue_start < end && g_ascii_isdigit (*uue_start)) {
  206. return RSPAMD_CTE_UUE;
  207. }
  208. }
  209. else if (memcmp (p, "begin-base64 ", sizeof ("begin-base64 ") - 1) == 0) {
  210. uue_start = p + sizeof ("begin ") - 1;
  211. while (uue_start < end && g_ascii_isspace (*uue_start)) {
  212. uue_start ++;
  213. }
  214. if (uue_start < end && g_ascii_isdigit (*uue_start)) {
  215. return RSPAMD_CTE_UUE;
  216. }
  217. }
  218. }
  219. /* Skip trailing spaces */
  220. while (end > p && g_ascii_isspace (*(end - 1))) {
  221. end --;
  222. }
  223. if (end > p + 2) {
  224. if (*(end - 1) == '=') {
  225. padeqsign ++;
  226. end --;
  227. }
  228. if (*(end - 1) == '=') {
  229. padeqsign ++;
  230. end --;
  231. }
  232. }
  233. /* Adjust end to analyse only first characters */
  234. if (end - p > real_len) {
  235. end = p + real_len;
  236. }
  237. while (p < end) {
  238. if (*p == ' ') {
  239. nspaces ++;
  240. }
  241. else if (*p == '=') {
  242. b64_chars = FALSE; /* Eqsign must not be inside base64 */
  243. neqsign ++;
  244. p ++;
  245. if (p + 2 < end && g_ascii_isxdigit (*p) && g_ascii_isxdigit (*(p + 1))) {
  246. p ++;
  247. nqpencoded ++;
  248. }
  249. continue;
  250. }
  251. else if (*p >= 0x80) {
  252. n8bit ++;
  253. b64_chars = FALSE;
  254. }
  255. else if (!(g_ascii_isalnum (*p) || *p == '/' || *p == '+')) {
  256. b64_chars = FALSE;
  257. }
  258. else if (g_ascii_isupper (*p)) {
  259. nupper ++;
  260. }
  261. else if (g_ascii_islower (*p)) {
  262. nlower ++;
  263. }
  264. p ++;
  265. }
  266. if (b64_chars && neqsign <= 2 && nspaces == 0) {
  267. /* Need more thinking */
  268. if (part->raw_data.len > 80) {
  269. if (padeqsign > 0) {
  270. ret = RSPAMD_CTE_B64;
  271. }
  272. else {
  273. /* We have a large piece of data with no spaces and base64
  274. * symbols only, no padding is detected as well...
  275. *
  276. * There is a small chance that our first 128 characters
  277. * are either some garbage or it is a base64 with no padding
  278. * (e.g. when it is not needed)
  279. */
  280. if (nupper > 1 && nlower > 1) {
  281. /*
  282. * We have both uppercase and lowercase letters, so it can be
  283. * base64
  284. */
  285. ret = RSPAMD_CTE_B64;
  286. }
  287. else {
  288. ret = RSPAMD_CTE_7BIT;
  289. }
  290. }
  291. }
  292. else {
  293. if (((end - (const guchar *)part->raw_data.begin) + padeqsign) % 4 == 0) {
  294. if (padeqsign == 0) {
  295. /*
  296. * It can be either base64 or plain text, hard to say
  297. * Let's assume that if we have > 1 uppercase it is
  298. * likely base64
  299. */
  300. if (nupper > 1 && nlower > 1) {
  301. ret = RSPAMD_CTE_B64;
  302. }
  303. else {
  304. ret = RSPAMD_CTE_7BIT;
  305. }
  306. }
  307. else {
  308. ret = RSPAMD_CTE_B64;
  309. }
  310. }
  311. else {
  312. /* No way */
  313. if (padeqsign == 1 || padeqsign == 2) {
  314. ret = RSPAMD_CTE_B64;
  315. }
  316. else {
  317. ret = RSPAMD_CTE_7BIT;
  318. }
  319. }
  320. }
  321. }
  322. else if (n8bit == 0) {
  323. if (neqsign > 2 && nqpencoded > 2) {
  324. ret = RSPAMD_CTE_QP;
  325. }
  326. else {
  327. ret = RSPAMD_CTE_7BIT;
  328. }
  329. }
  330. else {
  331. ret = RSPAMD_CTE_8BIT;
  332. }
  333. msg_debug_mime ("detected cte: %s", rspamd_cte_to_string (ret));
  334. return ret;
  335. }
  336. static void
  337. rspamd_mime_part_get_cte (struct rspamd_task *task,
  338. struct rspamd_mime_headers_table *hdrs,
  339. struct rspamd_mime_part *part,
  340. gboolean apply_heuristic)
  341. {
  342. struct rspamd_mime_header *hdr, *cur;
  343. enum rspamd_cte cte = RSPAMD_CTE_UNKNOWN;
  344. gboolean parent_propagated = FALSE;
  345. hdr = rspamd_message_get_header_from_hash(hdrs, "Content-Transfer-Encoding", FALSE);
  346. if (hdr == NULL) {
  347. if (part->parent_part && part->parent_part->cte != RSPAMD_CTE_UNKNOWN &&
  348. !(part->parent_part->flags & RSPAMD_MIME_PART_MISSING_CTE)) {
  349. part->cte = part->parent_part->cte;
  350. parent_propagated = TRUE;
  351. goto check_cte;
  352. }
  353. if (apply_heuristic) {
  354. part->cte = rspamd_mime_part_get_cte_heuristic (task, part);
  355. msg_info_task ("detected missing CTE for part as: %s",
  356. rspamd_cte_to_string (part->cte));
  357. }
  358. part->flags |= RSPAMD_MIME_PART_MISSING_CTE;
  359. }
  360. else {
  361. DL_FOREACH (hdr, cur) {
  362. gsize hlen;
  363. gchar lc_buf[128];
  364. hlen = rspamd_snprintf (lc_buf, sizeof (lc_buf), "%s", cur->value);
  365. rspamd_str_lc (lc_buf, hlen);
  366. cte = rspamd_mime_parse_cte (lc_buf, hlen);
  367. if (cte != RSPAMD_CTE_UNKNOWN) {
  368. part->cte = cte;
  369. break;
  370. }
  371. }
  372. check_cte:
  373. if (apply_heuristic) {
  374. if (part->cte == RSPAMD_CTE_UNKNOWN) {
  375. part->cte = rspamd_mime_part_get_cte_heuristic (task, part);
  376. msg_info_task ("corrected bad CTE for part to: %s",
  377. rspamd_cte_to_string (part->cte));
  378. }
  379. else if (part->cte == RSPAMD_CTE_B64 ||
  380. part->cte == RSPAMD_CTE_QP) {
  381. /* Additionally check sanity */
  382. cte = rspamd_mime_part_get_cte_heuristic (task, part);
  383. if (cte == RSPAMD_CTE_8BIT) {
  384. msg_info_task (
  385. "incorrect cte specified for part: %s, %s detected",
  386. rspamd_cte_to_string (part->cte),
  387. rspamd_cte_to_string (cte));
  388. part->cte = cte;
  389. part->flags |= RSPAMD_MIME_PART_BAD_CTE;
  390. }
  391. else if (cte != part->cte && parent_propagated) {
  392. part->cte = cte;
  393. msg_info_task ("detected missing CTE for part as: %s",
  394. rspamd_cte_to_string (part->cte));
  395. }
  396. }
  397. else {
  398. msg_debug_mime ("processed cte: %s",
  399. rspamd_cte_to_string (cte));
  400. }
  401. }
  402. else {
  403. msg_debug_mime ("processed cte: %s", rspamd_cte_to_string (cte));
  404. }
  405. }
  406. }
  407. static void
  408. rspamd_mime_part_get_cd (struct rspamd_task *task, struct rspamd_mime_part *part)
  409. {
  410. struct rspamd_mime_header *hdr, *cur;
  411. struct rspamd_content_disposition *cd = NULL;
  412. rspamd_ftok_t srch;
  413. struct rspamd_content_type_param *found;
  414. hdr = rspamd_message_get_header_from_hash(part->raw_headers,
  415. "Content-Disposition", FALSE);
  416. if (hdr == NULL) {
  417. cd = rspamd_mempool_alloc0 (task->task_pool, sizeof (*cd));
  418. cd->type = RSPAMD_CT_INLINE;
  419. /* We can also have content disposition definitions in Content-Type */
  420. if (part->ct && part->ct->attrs) {
  421. RSPAMD_FTOK_ASSIGN (&srch, "name");
  422. found = g_hash_table_lookup (part->ct->attrs, &srch);
  423. if (!found) {
  424. RSPAMD_FTOK_ASSIGN (&srch, "filename");
  425. found = g_hash_table_lookup (part->ct->attrs, &srch);
  426. }
  427. if (found) {
  428. cd->type = RSPAMD_CT_ATTACHMENT;
  429. memcpy (&cd->filename, &found->value, sizeof (cd->filename));
  430. }
  431. }
  432. }
  433. else {
  434. DL_FOREACH (hdr, cur) {
  435. gsize hlen;
  436. cd = NULL;
  437. if (cur->value) {
  438. hlen = strlen (cur->value);
  439. cd = rspamd_content_disposition_parse (cur->value, hlen,
  440. task->task_pool);
  441. }
  442. if (cd) {
  443. /* We still need to check filename */
  444. if (cd->filename.len == 0) {
  445. if (part->ct && part->ct->attrs) {
  446. RSPAMD_FTOK_ASSIGN (&srch, "name");
  447. found = g_hash_table_lookup (part->ct->attrs, &srch);
  448. if (!found) {
  449. RSPAMD_FTOK_ASSIGN (&srch, "filename");
  450. found = g_hash_table_lookup (part->ct->attrs, &srch);
  451. }
  452. if (found) {
  453. cd->type = RSPAMD_CT_ATTACHMENT;
  454. memcpy (&cd->filename, &found->value,
  455. sizeof (cd->filename));
  456. }
  457. }
  458. }
  459. msg_debug_mime ("processed content disposition: %s, file: \"%T\"",
  460. cd->lc_data, &cd->filename);
  461. break;
  462. }
  463. else if (part->ct) {
  464. /*
  465. * Even in case of malformed Content-Disposition, we can still
  466. * fall back to Content-Type
  467. */
  468. cd = rspamd_mempool_alloc0 (task->task_pool, sizeof (*cd));
  469. cd->type = RSPAMD_CT_INLINE;
  470. /* We can also have content disposition definitions in Content-Type */
  471. if (part->ct->attrs) {
  472. RSPAMD_FTOK_ASSIGN (&srch, "name");
  473. found = g_hash_table_lookup (part->ct->attrs, &srch);
  474. if (!found) {
  475. RSPAMD_FTOK_ASSIGN (&srch, "filename");
  476. found = g_hash_table_lookup (part->ct->attrs, &srch);
  477. }
  478. if (found) {
  479. cd->type = RSPAMD_CT_ATTACHMENT;
  480. memcpy (&cd->filename, &found->value, sizeof (cd->filename));
  481. }
  482. }
  483. }
  484. }
  485. }
  486. part->cd = cd;
  487. }
  488. void
  489. rspamd_mime_parser_calc_digest (struct rspamd_mime_part *part)
  490. {
  491. /* Blake2b applied to string 'rspamd' */
  492. static const guchar hash_key[] = {
  493. 0xef,0x43,0xae,0x80,0xcc,0x8d,0xc3,0x4c,
  494. 0x6f,0x1b,0xd6,0x18,0x1b,0xae,0x87,0x74,
  495. 0x0c,0xca,0xf7,0x8e,0x5f,0x2e,0x54,0x32,
  496. 0xf6,0x79,0xb9,0x27,0x26,0x96,0x20,0x92,
  497. 0x70,0x07,0x85,0xeb,0x83,0xf7,0x89,0xe0,
  498. 0xd7,0x32,0x2a,0xd2,0x1a,0x64,0x41,0xef,
  499. 0x49,0xff,0xc3,0x8c,0x54,0xf9,0x67,0x74,
  500. 0x30,0x1e,0x70,0x2e,0xb7,0x12,0x09,0xfe,
  501. };
  502. if (part->parsed_data.len > 0) {
  503. rspamd_cryptobox_hash (part->digest,
  504. part->parsed_data.begin, part->parsed_data.len,
  505. hash_key, sizeof (hash_key));
  506. }
  507. }
  508. static enum rspamd_mime_parse_error
  509. rspamd_mime_parse_normal_part (struct rspamd_task *task,
  510. struct rspamd_mime_part *part,
  511. struct rspamd_mime_parser_ctx *st,
  512. struct rspamd_content_type *ct,
  513. GError **err)
  514. {
  515. rspamd_fstring_t *parsed;
  516. gssize r;
  517. g_assert (part != NULL);
  518. rspamd_mime_part_get_cte (task, part->raw_headers, part,
  519. part->ct && !(part->ct->flags & RSPAMD_CONTENT_TYPE_MESSAGE));
  520. rspamd_mime_part_get_cd (task, part);
  521. switch (part->cte) {
  522. case RSPAMD_CTE_7BIT:
  523. case RSPAMD_CTE_8BIT:
  524. case RSPAMD_CTE_UNKNOWN:
  525. if (part->ct && (part->ct->flags & RSPAMD_CONTENT_TYPE_MISSING)) {
  526. if (part->cte != RSPAMD_CTE_7BIT) {
  527. /* We have something that has a missing content-type,
  528. * but it has non-7bit characters.
  529. *
  530. * In theory, it is very unsafe to process it as a text part
  531. * as we unlikely get some sane result
  532. */
  533. /*
  534. * On the other hand, there is an evidence that some
  535. * emails actually rely on that.
  536. * So we apply an expensive hack here:
  537. * if there are no 8bit characters -OR- the content is valid
  538. * UTF8, we can still imply Content-Type == text/plain
  539. */
  540. if (rspamd_str_has_8bit (part->raw_data.begin, part->raw_data.len) &&
  541. !rspamd_fast_utf8_validate (part->raw_data.begin, part->raw_data.len)) {
  542. part->ct->flags &= ~RSPAMD_CONTENT_TYPE_TEXT;
  543. part->ct->flags |= RSPAMD_CONTENT_TYPE_BROKEN;
  544. }
  545. }
  546. }
  547. if (part->ct && (part->ct->flags & RSPAMD_CONTENT_TYPE_TEXT)) {
  548. /* Need to copy text as we have couple of in-place change functions */
  549. parsed = rspamd_fstring_sized_new (part->raw_data.len);
  550. parsed->len = part->raw_data.len;
  551. memcpy (parsed->str, part->raw_data.begin, parsed->len);
  552. part->parsed_data.begin = parsed->str;
  553. part->parsed_data.len = parsed->len;
  554. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  555. rspamd_mempool_add_destructor (task->task_pool,
  556. (rspamd_mempool_destruct_t)rspamd_fstring_free, parsed);
  557. }
  558. else {
  559. part->parsed_data.begin = part->raw_data.begin;
  560. part->parsed_data.len = part->raw_data.len;
  561. }
  562. break;
  563. case RSPAMD_CTE_QP:
  564. parsed = rspamd_fstring_sized_new (part->raw_data.len);
  565. r = rspamd_decode_qp_buf (part->raw_data.begin, part->raw_data.len,
  566. parsed->str, parsed->allocated);
  567. if (r != -1) {
  568. parsed->len = r;
  569. part->parsed_data.begin = parsed->str;
  570. part->parsed_data.len = parsed->len;
  571. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  572. rspamd_mempool_add_destructor (task->task_pool,
  573. (rspamd_mempool_destruct_t)rspamd_fstring_free, parsed);
  574. }
  575. else {
  576. msg_err_task ("invalid quoted-printable encoded part, assume 8bit");
  577. if (part->ct) {
  578. part->ct->flags |= RSPAMD_CONTENT_TYPE_BROKEN;
  579. }
  580. part->cte = RSPAMD_CTE_8BIT;
  581. memcpy (parsed->str, part->raw_data.begin, part->raw_data.len);
  582. parsed->len = part->raw_data.len;
  583. part->parsed_data.begin = parsed->str;
  584. part->parsed_data.len = parsed->len;
  585. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  586. rspamd_mempool_add_destructor (task->task_pool,
  587. (rspamd_mempool_destruct_t)rspamd_fstring_free, parsed);
  588. }
  589. break;
  590. case RSPAMD_CTE_B64:
  591. parsed = rspamd_fstring_sized_new (part->raw_data.len / 4 * 3 + 12);
  592. rspamd_cryptobox_base64_decode (part->raw_data.begin,
  593. part->raw_data.len,
  594. parsed->str, &parsed->len);
  595. part->parsed_data.begin = parsed->str;
  596. part->parsed_data.len = parsed->len;
  597. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  598. rspamd_mempool_add_destructor (task->task_pool,
  599. (rspamd_mempool_destruct_t)rspamd_fstring_free, parsed);
  600. break;
  601. case RSPAMD_CTE_UUE:
  602. parsed = rspamd_fstring_sized_new (part->raw_data.len / 4 * 3 + 12);
  603. r = rspamd_decode_uue_buf (part->raw_data.begin, part->raw_data.len,
  604. parsed->str, parsed->allocated);
  605. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  606. rspamd_mempool_add_destructor (task->task_pool,
  607. (rspamd_mempool_destruct_t)rspamd_fstring_free, parsed);
  608. if (r != -1) {
  609. parsed->len = r;
  610. part->parsed_data.begin = parsed->str;
  611. part->parsed_data.len = parsed->len;
  612. }
  613. else {
  614. msg_err_task ("invalid uuencoding in encoded part, assume 8bit");
  615. if (part->ct) {
  616. part->ct->flags |= RSPAMD_CONTENT_TYPE_BROKEN;
  617. }
  618. part->cte = RSPAMD_CTE_8BIT;
  619. parsed->len = MIN (part->raw_data.len, parsed->allocated);
  620. memcpy (parsed->str, part->raw_data.begin, parsed->len);
  621. rspamd_mempool_notify_alloc (task->task_pool, parsed->len);
  622. part->parsed_data.begin = parsed->str;
  623. part->parsed_data.len = parsed->len;
  624. }
  625. break;
  626. default:
  627. g_assert_not_reached ();
  628. }
  629. part->part_number = MESSAGE_FIELD (task, parts)->len;
  630. part->urls = g_ptr_array_new ();
  631. g_ptr_array_add (MESSAGE_FIELD (task, parts), part);
  632. msg_debug_mime ("parsed data part %T/%T of length %z (%z orig), %s cte",
  633. &part->ct->type, &part->ct->subtype, part->parsed_data.len,
  634. part->raw_data.len, rspamd_cte_to_string (part->cte));
  635. rspamd_mime_parser_calc_digest (part);
  636. if (ct && (ct->flags & RSPAMD_CONTENT_TYPE_SMIME)) {
  637. CMS_ContentInfo *cms;
  638. const unsigned char *der_beg = part->parsed_data.begin;
  639. cms = d2i_CMS_ContentInfo (NULL, &der_beg, part->parsed_data.len);
  640. if (cms) {
  641. const ASN1_OBJECT *asn_ct = CMS_get0_eContentType (cms);
  642. int ct_nid = OBJ_obj2nid (asn_ct);
  643. if (ct_nid == NID_pkcs7_data) {
  644. BIO *bio = BIO_new_mem_buf (part->parsed_data.begin,
  645. part->parsed_data.len);
  646. PKCS7 *p7;
  647. p7 = d2i_PKCS7_bio (bio, NULL);
  648. if (p7) {
  649. ct_nid = OBJ_obj2nid (p7->type);
  650. if (ct_nid == NID_pkcs7_signed) {
  651. PKCS7 *p7_signed_content = p7->d.sign->contents;
  652. ct_nid = OBJ_obj2nid (p7_signed_content->type);
  653. if (ct_nid == NID_pkcs7_data && p7_signed_content->d.data) {
  654. int ret;
  655. msg_debug_mime ("found an additional part inside of "
  656. "smime structure of type %T/%T; length=%d",
  657. &ct->type, &ct->subtype, p7_signed_content->d.data->length);
  658. /*
  659. * Since ASN.1 structures are freed, we need to copy
  660. * the content
  661. */
  662. gchar *cpy = rspamd_mempool_alloc (task->task_pool,
  663. p7_signed_content->d.data->length);
  664. memcpy (cpy, p7_signed_content->d.data->data,
  665. p7_signed_content->d.data->length);
  666. ret = rspamd_mime_process_multipart_node (task,
  667. st, NULL,
  668. cpy,cpy + p7_signed_content->d.data->length,
  669. TRUE, err);
  670. PKCS7_free (p7);
  671. BIO_free (bio);
  672. CMS_ContentInfo_free (cms);
  673. return ret;
  674. }
  675. }
  676. PKCS7_free (p7);
  677. }
  678. BIO_free (bio);
  679. }
  680. CMS_ContentInfo_free (cms);
  681. }
  682. }
  683. return RSPAMD_MIME_PARSE_OK;
  684. }
  685. struct rspamd_mime_multipart_cbdata {
  686. struct rspamd_task *task;
  687. struct rspamd_mime_part *multipart;
  688. struct rspamd_mime_parser_ctx *st;
  689. const gchar *part_start;
  690. rspamd_ftok_t *cur_boundary;
  691. guint64 bhash;
  692. GError **err;
  693. };
  694. static enum rspamd_mime_parse_error
  695. rspamd_mime_process_multipart_node (struct rspamd_task *task,
  696. struct rspamd_mime_parser_ctx *st,
  697. struct rspamd_mime_part *multipart,
  698. const gchar *start, const gchar *end,
  699. gboolean is_finished,
  700. GError **err)
  701. {
  702. struct rspamd_content_type *ct, *sel = NULL;
  703. struct rspamd_mime_header *hdr = NULL, *cur;
  704. struct rspamd_mime_part *npart;
  705. GString str;
  706. goffset hdr_pos, body_pos;
  707. enum rspamd_mime_parse_error ret = RSPAMD_MIME_PARSE_FATAL;
  708. str.str = (gchar *)start;
  709. str.len = end - start;
  710. if (*start == '\n' || *start == '\r') {
  711. /*
  712. * We have a part that starts from newline which means that
  713. * there are completely no headers in this part,
  714. * hence we assume it as a text part
  715. */
  716. hdr_pos = 0;
  717. body_pos = 0;
  718. if (!is_finished) {
  719. /* Ignore garbage */
  720. const gchar *p = start;
  721. gboolean seen_something = FALSE;
  722. while (p < end) {
  723. if (g_ascii_isalnum (*p)) {
  724. seen_something = TRUE;
  725. break;
  726. }
  727. p ++;
  728. }
  729. if (!seen_something) {
  730. return RSPAMD_MIME_PARSE_NO_PART;
  731. }
  732. }
  733. }
  734. else {
  735. hdr_pos = rspamd_string_find_eoh (&str, &body_pos);
  736. }
  737. npart = rspamd_mempool_alloc0 (task->task_pool,
  738. sizeof (struct rspamd_mime_part));
  739. npart->parent_part = multipart;
  740. npart->raw_headers = rspamd_message_headers_new ();
  741. npart->headers_order = NULL;
  742. if (multipart) {
  743. if (multipart->specific.mp->children == NULL) {
  744. multipart->specific.mp->children = g_ptr_array_sized_new (2);
  745. }
  746. g_ptr_array_add (multipart->specific.mp->children, npart);
  747. }
  748. if (hdr_pos > 0 && hdr_pos < str.len) {
  749. npart->raw_headers_str = str.str;
  750. npart->raw_headers_len = hdr_pos;
  751. npart->raw_data.begin = start + body_pos;
  752. npart->raw_data.len = (end - start) - body_pos;
  753. if (npart->raw_headers_len > 0) {
  754. rspamd_mime_headers_process (task, npart->raw_headers,
  755. &npart->headers_order,
  756. npart->raw_headers_str,
  757. npart->raw_headers_len,
  758. FALSE);
  759. /* Preserve the natural order */
  760. if (npart->headers_order) {
  761. LL_REVERSE2 (npart->headers_order, ord_next);
  762. }
  763. }
  764. hdr = rspamd_message_get_header_from_hash(npart->raw_headers,
  765. "Content-Type", FALSE);
  766. }
  767. else {
  768. npart->raw_headers_str = 0;
  769. npart->raw_headers_len = 0;
  770. npart->raw_data.begin = start;
  771. npart->raw_data.len = end - start;
  772. }
  773. if (hdr != NULL) {
  774. DL_FOREACH (hdr, cur) {
  775. ct = rspamd_content_type_parse (cur->value, strlen (cur->value),
  776. task->task_pool);
  777. /* Here we prefer multipart content-type or any content-type */
  778. if (ct) {
  779. if (sel == NULL) {
  780. sel = ct;
  781. }
  782. else if (ct->flags & RSPAMD_CONTENT_TYPE_MULTIPART) {
  783. sel = ct;
  784. }
  785. }
  786. }
  787. }
  788. if (sel == NULL) {
  789. sel = rspamd_mempool_alloc0 (task->task_pool, sizeof (*sel));
  790. RSPAMD_FTOK_ASSIGN (&sel->type, "text");
  791. RSPAMD_FTOK_ASSIGN (&sel->subtype, "plain");
  792. }
  793. npart->ct = sel;
  794. if (sel->flags & RSPAMD_CONTENT_TYPE_MULTIPART) {
  795. st->nesting ++;
  796. g_ptr_array_add (st->stack, npart);
  797. npart->part_type = RSPAMD_MIME_PART_MULTIPART;
  798. npart->specific.mp = rspamd_mempool_alloc0 (task->task_pool,
  799. sizeof (struct rspamd_mime_multipart));
  800. memcpy (&npart->specific.mp->boundary, &sel->orig_boundary,
  801. sizeof (rspamd_ftok_t));
  802. ret = rspamd_mime_parse_multipart_part (task, npart, st, err);
  803. }
  804. else if (sel->flags & RSPAMD_CONTENT_TYPE_MESSAGE) {
  805. st->nesting ++;
  806. g_ptr_array_add (st->stack, npart);
  807. npart->part_type = RSPAMD_MIME_PART_MESSAGE;
  808. if ((ret = rspamd_mime_parse_normal_part (task, npart, st, sel, err))
  809. == RSPAMD_MIME_PARSE_OK) {
  810. ret = rspamd_mime_parse_message (task, npart, st, err);
  811. }
  812. }
  813. else {
  814. ret = rspamd_mime_parse_normal_part (task, npart, st, sel, err);
  815. }
  816. return ret;
  817. }
  818. static enum rspamd_mime_parse_error
  819. rspamd_mime_parse_multipart_cb (struct rspamd_task *task,
  820. struct rspamd_mime_part *multipart,
  821. struct rspamd_mime_parser_ctx *st,
  822. struct rspamd_mime_multipart_cbdata *cb,
  823. struct rspamd_mime_boundary *b)
  824. {
  825. const gchar *pos = st->start + b->boundary;
  826. enum rspamd_mime_parse_error ret;
  827. task = cb->task;
  828. /* Now check boundary */
  829. if (!cb->part_start) {
  830. cb->part_start = st->start + b->start;
  831. st->pos = cb->part_start;
  832. }
  833. else {
  834. /*
  835. * We have seen the start of the boundary,
  836. * but it might be unsuitable (e.g. in broken headers)
  837. */
  838. if (cb->part_start < pos && cb->cur_boundary) {
  839. if ((ret = rspamd_mime_process_multipart_node (task, cb->st,
  840. cb->multipart, cb->part_start, pos, TRUE, cb->err))
  841. != RSPAMD_MIME_PARSE_OK) {
  842. return ret;
  843. }
  844. if (b->start > 0) {
  845. /* Go towards the next part */
  846. cb->part_start = st->start + b->start;
  847. cb->st->pos = cb->part_start;
  848. }
  849. }
  850. else {
  851. /* We have an empty boundary, do nothing */
  852. }
  853. }
  854. return RSPAMD_MIME_PARSE_OK;
  855. }
  856. static enum rspamd_mime_parse_error
  857. rspamd_multipart_boundaries_filter (struct rspamd_task *task,
  858. struct rspamd_mime_part *multipart,
  859. struct rspamd_mime_parser_ctx *st,
  860. struct rspamd_mime_multipart_cbdata *cb)
  861. {
  862. struct rspamd_mime_boundary *cur;
  863. goffset last_offset;
  864. guint i, sel = 0;
  865. enum rspamd_mime_parse_error ret;
  866. last_offset = (multipart->raw_data.begin - st->start) +
  867. multipart->raw_data.len;
  868. /* Find the first offset suitable for this part */
  869. for (i = 0; i < st->boundaries->len; i ++) {
  870. cur = &g_array_index (st->boundaries, struct rspamd_mime_boundary, i);
  871. if (cur->start >= multipart->raw_data.begin - st->start) {
  872. if (cb->cur_boundary) {
  873. /* Check boundary */
  874. msg_debug_mime ("compare %L and %L (and %L)",
  875. cb->bhash, cur->hash, cur->closed_hash);
  876. if (cb->bhash == cur->hash) {
  877. sel = i;
  878. break;
  879. }
  880. else if (cb->bhash == cur->closed_hash) {
  881. /* Not a closing element in fact */
  882. cur->flags &= ~(RSPAMD_MIME_BOUNDARY_FLAG_CLOSED);
  883. cur->hash = cur->closed_hash;
  884. sel = i;
  885. break;
  886. }
  887. }
  888. else {
  889. /* Set current boundary */
  890. cb->cur_boundary = rspamd_mempool_alloc (task->task_pool,
  891. sizeof (rspamd_ftok_t));
  892. cb->cur_boundary->begin = st->start + cur->boundary;
  893. cb->cur_boundary->len = 0;
  894. cb->bhash = cur->hash;
  895. sel = i;
  896. break;
  897. }
  898. }
  899. }
  900. /* Now we can go forward with boundaries that are same to what we have */
  901. for (i = sel; i < st->boundaries->len; i ++) {
  902. cur = &g_array_index (st->boundaries, struct rspamd_mime_boundary, i);
  903. if (cur->boundary > last_offset) {
  904. break;
  905. }
  906. if (cur->hash == cb->bhash || cur->closed_hash == cb->bhash) {
  907. if ((ret = rspamd_mime_parse_multipart_cb (task, multipart, st,
  908. cb, cur)) != RSPAMD_MIME_PARSE_OK) {
  909. return ret;
  910. }
  911. if (cur->closed_hash == cb->bhash) {
  912. /* We have again fake closed hash */
  913. cur->flags &= ~(RSPAMD_MIME_BOUNDARY_FLAG_CLOSED);
  914. cur->hash = cur->closed_hash;
  915. }
  916. if (RSPAMD_BOUNDARY_IS_CLOSED (cur)) {
  917. /* We also might check the next boundary... */
  918. if (i < st->boundaries->len - 1) {
  919. cur = &g_array_index (st->boundaries,
  920. struct rspamd_mime_boundary, i + 1);
  921. if (cur->hash == cb->bhash) {
  922. continue;
  923. }
  924. else if (cur->closed_hash == cb->bhash) {
  925. /* We have again fake closed hash */
  926. cur->flags &= ~(RSPAMD_MIME_BOUNDARY_FLAG_CLOSED);
  927. cur->hash = cur->closed_hash;
  928. continue;
  929. }
  930. }
  931. break;
  932. }
  933. }
  934. }
  935. if (i == st->boundaries->len && cb->cur_boundary) {
  936. /* Process the last part */
  937. struct rspamd_mime_boundary fb;
  938. fb.boundary = last_offset;
  939. fb.start = -1;
  940. if ((ret = rspamd_mime_parse_multipart_cb (task, multipart, st,
  941. cb, &fb)) != RSPAMD_MIME_PARSE_OK) {
  942. return ret;
  943. }
  944. }
  945. return RSPAMD_MIME_PARSE_OK;
  946. }
  947. static enum rspamd_mime_parse_error
  948. rspamd_mime_parse_multipart_part (struct rspamd_task *task,
  949. struct rspamd_mime_part *part,
  950. struct rspamd_mime_parser_ctx *st,
  951. GError **err)
  952. {
  953. struct rspamd_mime_multipart_cbdata cbdata;
  954. enum rspamd_mime_parse_error ret;
  955. if (st->nesting > max_nested) {
  956. g_set_error (err, RSPAMD_MIME_QUARK, E2BIG, "Nesting level is too high: %d",
  957. st->nesting);
  958. return RSPAMD_MIME_PARSE_NESTING;
  959. }
  960. part->part_number = MESSAGE_FIELD (task, parts)->len;
  961. part->urls = g_ptr_array_new ();
  962. g_ptr_array_add (MESSAGE_FIELD (task, parts), part);
  963. st->nesting ++;
  964. rspamd_mime_part_get_cte (task, part->raw_headers, part, FALSE);
  965. st->pos = part->raw_data.begin;
  966. cbdata.multipart = part;
  967. cbdata.task = task;
  968. cbdata.st = st;
  969. cbdata.part_start = NULL;
  970. cbdata.err = err;
  971. if (part->ct->boundary.len > 0) {
  972. /* We know our boundary */
  973. cbdata.cur_boundary = &part->ct->boundary;
  974. rspamd_cryptobox_siphash ((guchar *)&cbdata.bhash,
  975. cbdata.cur_boundary->begin, cbdata.cur_boundary->len,
  976. lib_ctx->hkey);
  977. msg_debug_mime ("hash: %T -> %L", cbdata.cur_boundary, cbdata.bhash);
  978. }
  979. else {
  980. /* Guess boundary */
  981. cbdata.cur_boundary = NULL;
  982. cbdata.bhash = 0;
  983. }
  984. ret = rspamd_multipart_boundaries_filter (task, part, st, &cbdata);
  985. /* Cleanup stack */
  986. st->nesting --;
  987. g_ptr_array_remove_index_fast (st->stack, st->stack->len - 1);
  988. return ret;
  989. }
  990. /* Process boundary like structures in a message */
  991. static gint
  992. rspamd_mime_preprocess_cb (struct rspamd_multipattern *mp,
  993. guint strnum,
  994. gint match_start,
  995. gint match_pos,
  996. const gchar *text,
  997. gsize len,
  998. void *context)
  999. {
  1000. const gchar *end = text + len, *p = text + match_pos, *bend;
  1001. gchar *lc_copy;
  1002. gsize blen;
  1003. gboolean closing = FALSE;
  1004. struct rspamd_mime_boundary b;
  1005. struct rspamd_mime_parser_ctx *st = context;
  1006. struct rspamd_task *task;
  1007. task = st->task;
  1008. if (G_LIKELY (p < end)) {
  1009. gboolean seen_non_dash = FALSE;
  1010. blen = 0;
  1011. while (p < end) {
  1012. if (*p == '\r' || *p == '\n') {
  1013. break;
  1014. }
  1015. else if (*p != '-') {
  1016. seen_non_dash = TRUE;
  1017. }
  1018. blen ++;
  1019. p ++;
  1020. }
  1021. if (blen > 0 && seen_non_dash) {
  1022. /* We have found something like boundary */
  1023. p = text + match_pos;
  1024. bend = p + blen - 1;
  1025. if (*bend == '-') {
  1026. /* We need to verify last -- */
  1027. if (bend > p + 1 && *(bend - 1) == '-') {
  1028. closing = TRUE;
  1029. bend --;
  1030. blen -= 2;
  1031. }
  1032. else {
  1033. /* Not a closing boundary somehow */
  1034. bend ++;
  1035. }
  1036. }
  1037. else {
  1038. bend ++;
  1039. }
  1040. while (bend < end) {
  1041. if (*bend == '\r') {
  1042. bend ++;
  1043. /* \r\n */
  1044. if (bend < end && *bend == '\n') {
  1045. bend ++;
  1046. }
  1047. }
  1048. else if (*bend == '\n') {
  1049. /* \n */
  1050. bend ++;
  1051. }
  1052. else if (g_ascii_isspace (*bend)){
  1053. /* Spaces in the same line, skip them */
  1054. bend ++;
  1055. continue;
  1056. }
  1057. break;
  1058. }
  1059. b.boundary = p - st->start - 2;
  1060. b.start = bend - st->start;
  1061. if (closing) {
  1062. lc_copy = g_malloc (blen + 2);
  1063. memcpy (lc_copy, p, blen + 2);
  1064. rspamd_str_lc (lc_copy, blen + 2);
  1065. }
  1066. else {
  1067. lc_copy = g_malloc (blen);
  1068. memcpy (lc_copy, p, blen);
  1069. rspamd_str_lc (lc_copy, blen);
  1070. }
  1071. rspamd_cryptobox_siphash ((guchar *)&b.hash, lc_copy, blen,
  1072. lib_ctx->hkey);
  1073. msg_debug_mime ("normal hash: %*s -> %L, %d boffset, %d data offset",
  1074. (gint)blen, lc_copy, b.hash, (int)b.boundary, (int)b.start);
  1075. if (closing) {
  1076. b.flags = RSPAMD_MIME_BOUNDARY_FLAG_CLOSED;
  1077. rspamd_cryptobox_siphash ((guchar *)&b.closed_hash, lc_copy,
  1078. blen + 2,
  1079. lib_ctx->hkey);
  1080. msg_debug_mime ("closing hash: %*s -> %L, %d boffset, %d data offset",
  1081. (gint)blen + 2, lc_copy,
  1082. b.closed_hash,
  1083. (int)b.boundary, (int)b.start);
  1084. }
  1085. else {
  1086. b.flags = 0;
  1087. b.closed_hash = 0;
  1088. }
  1089. g_free (lc_copy);
  1090. g_array_append_val (st->boundaries, b);
  1091. }
  1092. }
  1093. return 0;
  1094. }
  1095. static goffset
  1096. rspamd_mime_parser_headers_heuristic (GString *input, goffset *body_start)
  1097. {
  1098. const gsize default_max_len = 76;
  1099. gsize max_len = MIN (input->len, default_max_len);
  1100. const gchar *p, *end;
  1101. enum {
  1102. st_before_colon = 0,
  1103. st_colon,
  1104. st_spaces_after_colon,
  1105. st_value,
  1106. st_error
  1107. } state = st_before_colon;
  1108. p = input->str;
  1109. end = p + max_len;
  1110. while (p < end) {
  1111. switch (state) {
  1112. case st_before_colon:
  1113. if (G_UNLIKELY (*p == ':')) {
  1114. state = st_colon;
  1115. }
  1116. else if (G_UNLIKELY (!g_ascii_isgraph (*p))) {
  1117. state = st_error;
  1118. }
  1119. p ++;
  1120. break;
  1121. case st_colon:
  1122. if (g_ascii_isspace (*p)) {
  1123. state = st_spaces_after_colon;
  1124. }
  1125. else {
  1126. state = st_value;
  1127. }
  1128. p ++;
  1129. break;
  1130. case st_spaces_after_colon:
  1131. if (!g_ascii_isspace (*p)) {
  1132. state = st_value;
  1133. }
  1134. p ++;
  1135. break;
  1136. case st_value:
  1137. /* We accept any value */
  1138. goto end;
  1139. break;
  1140. case st_error:
  1141. return (-1);
  1142. break;
  1143. }
  1144. }
  1145. end:
  1146. if (state == st_value) {
  1147. if (body_start) {
  1148. *body_start = input->len;
  1149. }
  1150. return input->len;
  1151. }
  1152. return (-1);
  1153. }
  1154. static void
  1155. rspamd_mime_preprocess_message (struct rspamd_task *task,
  1156. struct rspamd_mime_part *top,
  1157. struct rspamd_mime_parser_ctx *st)
  1158. {
  1159. if (top->raw_data.begin >= st->pos) {
  1160. rspamd_multipattern_lookup (lib_ctx->mp_boundary,
  1161. top->raw_data.begin - 1,
  1162. top->raw_data.len + 1,
  1163. rspamd_mime_preprocess_cb, st, NULL);
  1164. }
  1165. else {
  1166. rspamd_multipattern_lookup (lib_ctx->mp_boundary,
  1167. st->pos,
  1168. st->end - st->pos,
  1169. rspamd_mime_preprocess_cb, st, NULL);
  1170. }
  1171. }
  1172. static void
  1173. rspamd_mime_parse_stack_free (struct rspamd_mime_parser_ctx *st)
  1174. {
  1175. if (st) {
  1176. g_ptr_array_free (st->stack, TRUE);
  1177. g_array_free (st->boundaries, TRUE);
  1178. g_free (st);
  1179. }
  1180. }
  1181. static enum rspamd_mime_parse_error
  1182. rspamd_mime_parse_message (struct rspamd_task *task,
  1183. struct rspamd_mime_part *part,
  1184. struct rspamd_mime_parser_ctx *st,
  1185. GError **err)
  1186. {
  1187. struct rspamd_content_type *ct, *sel = NULL;
  1188. struct rspamd_mime_header *hdr = NULL, *cur;
  1189. const gchar *pbegin, *p;
  1190. gsize plen, len;
  1191. struct rspamd_mime_part *npart;
  1192. goffset hdr_pos, body_pos;
  1193. guint i;
  1194. enum rspamd_mime_parse_error ret = RSPAMD_MIME_PARSE_OK;
  1195. GString str;
  1196. struct rspamd_mime_parser_ctx *nst = st;
  1197. if (st->nesting > max_nested) {
  1198. g_set_error (err, RSPAMD_MIME_QUARK, E2BIG, "Nesting level is too high: %d",
  1199. st->nesting);
  1200. return RSPAMD_MIME_PARSE_NESTING;
  1201. }
  1202. /* Allocate real part */
  1203. npart = rspamd_mempool_alloc0 (task->task_pool,
  1204. sizeof (struct rspamd_mime_part));
  1205. if (part == NULL) {
  1206. /* Top level message */
  1207. p = task->msg.begin;
  1208. len = task->msg.len;
  1209. str.str = (gchar *)p;
  1210. str.len = len;
  1211. hdr_pos = rspamd_string_find_eoh (&str, &body_pos);
  1212. if (hdr_pos > 0 && hdr_pos < str.len) {
  1213. MESSAGE_FIELD (task, raw_headers_content).begin = str.str;
  1214. MESSAGE_FIELD (task, raw_headers_content).len = hdr_pos;
  1215. MESSAGE_FIELD (task, raw_headers_content).body_start = str.str + body_pos;
  1216. if (MESSAGE_FIELD (task, raw_headers_content).len > 0) {
  1217. rspamd_mime_headers_process (task,
  1218. MESSAGE_FIELD (task, raw_headers),
  1219. &MESSAGE_FIELD (task, headers_order),
  1220. MESSAGE_FIELD (task, raw_headers_content).begin,
  1221. MESSAGE_FIELD (task, raw_headers_content).len,
  1222. TRUE);
  1223. npart->raw_headers = rspamd_message_headers_ref (
  1224. MESSAGE_FIELD (task, raw_headers));
  1225. /* Preserve the natural order */
  1226. if (MESSAGE_FIELD (task, headers_order)) {
  1227. LL_REVERSE2 (MESSAGE_FIELD (task, headers_order), ord_next);
  1228. }
  1229. }
  1230. hdr = rspamd_message_get_header_from_hash(
  1231. MESSAGE_FIELD (task, raw_headers),
  1232. "Content-Type", FALSE);
  1233. }
  1234. else {
  1235. /* First apply heuristic, maybe we have just headers */
  1236. hdr_pos = rspamd_mime_parser_headers_heuristic (&str, &body_pos);
  1237. if (hdr_pos > 0 && hdr_pos <= str.len) {
  1238. MESSAGE_FIELD (task, raw_headers_content).begin = str.str;
  1239. MESSAGE_FIELD (task, raw_headers_content).len = hdr_pos;
  1240. MESSAGE_FIELD (task, raw_headers_content).body_start = str.str +
  1241. body_pos;
  1242. if (MESSAGE_FIELD (task, raw_headers_content).len > 0) {
  1243. rspamd_mime_headers_process (task,
  1244. MESSAGE_FIELD (task, raw_headers),
  1245. &MESSAGE_FIELD (task, headers_order),
  1246. MESSAGE_FIELD (task, raw_headers_content).begin,
  1247. MESSAGE_FIELD (task, raw_headers_content).len,
  1248. TRUE);
  1249. npart->raw_headers = rspamd_message_headers_ref (
  1250. MESSAGE_FIELD (task, raw_headers));
  1251. /* Preserve the natural order */
  1252. if (MESSAGE_FIELD (task, headers_order)) {
  1253. LL_REVERSE2 (MESSAGE_FIELD (task, headers_order), ord_next);
  1254. }
  1255. }
  1256. hdr = rspamd_message_get_header_from_hash(
  1257. MESSAGE_FIELD (task, raw_headers),
  1258. "Content-Type", FALSE);
  1259. task->flags |= RSPAMD_TASK_FLAG_BROKEN_HEADERS;
  1260. }
  1261. else {
  1262. body_pos = 0;
  1263. }
  1264. }
  1265. pbegin = st->start + body_pos;
  1266. plen = st->end - pbegin;
  1267. npart->headers_order = NULL;
  1268. }
  1269. else {
  1270. /*
  1271. * Here are dragons:
  1272. * We allocate new parser context as we need to shift pointers
  1273. */
  1274. nst = g_malloc0 (sizeof (*st));
  1275. nst->stack = g_ptr_array_sized_new (4);
  1276. nst->boundaries = g_array_sized_new (FALSE, FALSE,
  1277. sizeof (struct rspamd_mime_boundary), 8);
  1278. nst->start = part->parsed_data.begin;
  1279. nst->end = nst->start + part->parsed_data.len;
  1280. nst->pos = nst->start;
  1281. nst->task = st->task;
  1282. nst->nesting = st->nesting;
  1283. st->nesting ++;
  1284. str.str = (gchar *)part->parsed_data.begin;
  1285. str.len = part->parsed_data.len;
  1286. hdr_pos = rspamd_string_find_eoh (&str, &body_pos);
  1287. npart->raw_headers = rspamd_message_headers_new ();
  1288. npart->headers_order = NULL;
  1289. if (hdr_pos > 0 && hdr_pos < str.len) {
  1290. npart->raw_headers_str = str.str;
  1291. npart->raw_headers_len = hdr_pos;
  1292. npart->raw_data.begin = str.str + body_pos;
  1293. if (npart->raw_headers_len > 0) {
  1294. rspamd_mime_headers_process (task,
  1295. npart->raw_headers,
  1296. &npart->headers_order,
  1297. npart->raw_headers_str,
  1298. npart->raw_headers_len,
  1299. FALSE);
  1300. /* Preserve the natural order */
  1301. if (npart->headers_order) {
  1302. LL_REVERSE2 (npart->headers_order, ord_next);
  1303. }
  1304. }
  1305. hdr = rspamd_message_get_header_from_hash(npart->raw_headers,
  1306. "Content-Type", FALSE);
  1307. }
  1308. else {
  1309. body_pos = 0;
  1310. }
  1311. pbegin = part->parsed_data.begin + body_pos;
  1312. plen = part->parsed_data.len - body_pos;
  1313. }
  1314. npart->raw_data.begin = pbegin;
  1315. npart->raw_data.len = plen;
  1316. npart->parent_part = part;
  1317. if (hdr == NULL) {
  1318. sel = NULL;
  1319. }
  1320. else {
  1321. DL_FOREACH (hdr, cur) {
  1322. ct = rspamd_content_type_parse (cur->value, strlen (cur->value),
  1323. task->task_pool);
  1324. /* Here we prefer multipart content-type or any content-type */
  1325. if (ct) {
  1326. if (sel == NULL) {
  1327. sel = ct;
  1328. }
  1329. else if (ct->flags & RSPAMD_CONTENT_TYPE_MULTIPART) {
  1330. sel = ct;
  1331. }
  1332. }
  1333. }
  1334. }
  1335. if (sel == NULL) {
  1336. /* For messages we automatically assume plaintext */
  1337. msg_info_task ("cannot find content-type for a message, assume text/plain");
  1338. sel = rspamd_mempool_alloc0 (task->task_pool, sizeof (*sel));
  1339. sel->flags = RSPAMD_CONTENT_TYPE_TEXT|RSPAMD_CONTENT_TYPE_MISSING;
  1340. RSPAMD_FTOK_ASSIGN (&sel->type, "text");
  1341. RSPAMD_FTOK_ASSIGN (&sel->subtype, "plain");
  1342. }
  1343. npart->ct = sel;
  1344. if ((part == NULL || nst != st) &&
  1345. (sel->flags & (RSPAMD_CONTENT_TYPE_MULTIPART|RSPAMD_CONTENT_TYPE_MESSAGE))) {
  1346. /* Not a trivial message, need to preprocess */
  1347. rspamd_mime_preprocess_message (task, npart, nst);
  1348. }
  1349. if (sel->flags & RSPAMD_CONTENT_TYPE_MULTIPART) {
  1350. g_ptr_array_add (nst->stack, npart);
  1351. nst->nesting ++;
  1352. npart->part_type = RSPAMD_MIME_PART_MULTIPART;
  1353. npart->specific.mp = rspamd_mempool_alloc0 (task->task_pool,
  1354. sizeof (struct rspamd_mime_multipart));
  1355. memcpy (&npart->specific.mp->boundary, &sel->orig_boundary,
  1356. sizeof (rspamd_ftok_t));
  1357. ret = rspamd_mime_parse_multipart_part (task, npart, nst, err);
  1358. }
  1359. else if (sel->flags & RSPAMD_CONTENT_TYPE_MESSAGE) {
  1360. if ((ret = rspamd_mime_parse_normal_part (task, npart, nst, sel, err))
  1361. == RSPAMD_MIME_PARSE_OK) {
  1362. npart->part_type = RSPAMD_MIME_PART_MESSAGE;
  1363. ret = rspamd_mime_parse_message (task, npart, nst, err);
  1364. }
  1365. }
  1366. else {
  1367. ret = rspamd_mime_parse_normal_part (task, npart, nst, sel, err);
  1368. }
  1369. if (ret != RSPAMD_MIME_PARSE_OK) {
  1370. return ret;
  1371. }
  1372. if (part && st->stack->len > 0) {
  1373. /* Remove message part from the parent stack */
  1374. g_ptr_array_remove_index_fast (st->stack, st->stack->len - 1);
  1375. st->nesting --;
  1376. }
  1377. /* Process leftovers for boundaries */
  1378. if (nst->boundaries) {
  1379. struct rspamd_mime_boundary *boundary, *start_boundary = NULL,
  1380. *end_boundary = NULL;
  1381. goffset cur_offset = nst->pos - nst->start,
  1382. end_offset = st->end - st->start;
  1383. guint sel_idx = 0;
  1384. for (;;) {
  1385. start_boundary = NULL;
  1386. for (i = sel_idx; i < nst->boundaries->len; i++) {
  1387. boundary = &g_array_index (nst->boundaries,
  1388. struct rspamd_mime_boundary, i);
  1389. if (boundary->start > cur_offset &&
  1390. boundary->boundary < end_offset &&
  1391. !RSPAMD_BOUNDARY_IS_CLOSED (boundary)) {
  1392. start_boundary = boundary;
  1393. sel_idx = i;
  1394. break;
  1395. }
  1396. }
  1397. if (start_boundary) {
  1398. const gchar *start, *end;
  1399. if (nst->boundaries->len > sel_idx + 1) {
  1400. end_boundary = &g_array_index (nst->boundaries,
  1401. struct rspamd_mime_boundary, sel_idx + 1);
  1402. end = nst->start + end_boundary->boundary;
  1403. }
  1404. else {
  1405. end = nst->end;
  1406. }
  1407. sel_idx ++;
  1408. start = nst->start + start_boundary->start;
  1409. if (end > start &&
  1410. (ret = rspamd_mime_process_multipart_node (task, nst,
  1411. NULL, start, end, FALSE, err)) != RSPAMD_MIME_PARSE_OK) {
  1412. if (nst != st) {
  1413. rspamd_mime_parse_stack_free (nst);
  1414. }
  1415. if (ret == RSPAMD_MIME_PARSE_NO_PART) {
  1416. return RSPAMD_MIME_PARSE_OK;
  1417. }
  1418. return ret;
  1419. }
  1420. }
  1421. else {
  1422. break;
  1423. }
  1424. }
  1425. }
  1426. if (nst != st) {
  1427. rspamd_mime_parse_stack_free (nst);
  1428. }
  1429. return ret;
  1430. }
  1431. enum rspamd_mime_parse_error
  1432. rspamd_mime_parse_task (struct rspamd_task *task, GError **err)
  1433. {
  1434. struct rspamd_mime_parser_ctx *st;
  1435. enum rspamd_mime_parse_error ret = RSPAMD_MIME_PARSE_OK;
  1436. if (lib_ctx == NULL) {
  1437. rspamd_mime_parser_init_lib ();
  1438. }
  1439. if (++lib_ctx->key_usages > max_key_usages) {
  1440. /* Regenerate siphash key */
  1441. ottery_rand_bytes (lib_ctx->hkey, sizeof (lib_ctx->hkey));
  1442. lib_ctx->key_usages = 0;
  1443. }
  1444. st = g_malloc0 (sizeof (*st));
  1445. st->stack = g_ptr_array_sized_new (4);
  1446. st->pos = MESSAGE_FIELD (task, raw_headers_content).body_start;
  1447. st->end = task->msg.begin + task->msg.len;
  1448. st->boundaries = g_array_sized_new (FALSE, FALSE,
  1449. sizeof (struct rspamd_mime_boundary), 8);
  1450. st->task = task;
  1451. if (st->pos == NULL) {
  1452. st->pos = task->msg.begin;
  1453. }
  1454. st->start = task->msg.begin;
  1455. ret = rspamd_mime_parse_message (task, NULL, st, err);
  1456. rspamd_mime_parse_stack_free (st);
  1457. return ret;
  1458. }