You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

milter.c 56KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187
  1. /*-
  2. * Copyright 2017 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "milter.h"
  18. #include "milter_internal.h"
  19. #include "email_addr.h"
  20. #include "addr.h"
  21. #include "unix-std.h"
  22. #include "logger.h"
  23. #include "ottery.h"
  24. #include "libserver/http/http_connection.h"
  25. #include "libserver/http/http_private.h"
  26. #include "libserver/protocol_internal.h"
  27. #include "libserver/cfg_file_private.h"
  28. #include "libmime/scan_result.h"
  29. #include "libserver/worker_util.h"
  30. #include "utlist.h"
  31. #define msg_err_milter(...) rspamd_default_log_function(G_LOG_LEVEL_CRITICAL, \
  32. "milter", priv->pool->tag.uid, \
  33. RSPAMD_LOG_FUNC, \
  34. __VA_ARGS__)
  35. #define msg_warn_milter(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  36. "milter", priv->pool->tag.uid, \
  37. RSPAMD_LOG_FUNC, \
  38. __VA_ARGS__)
  39. #define msg_info_milter(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  40. "milter", priv->pool->tag.uid, \
  41. RSPAMD_LOG_FUNC, \
  42. __VA_ARGS__)
  43. #define msg_debug_milter(...) rspamd_conditional_debug_fast (NULL, NULL, \
  44. rspamd_milter_log_id, "milter", priv->pool->tag.uid, \
  45. RSPAMD_LOG_FUNC, \
  46. __VA_ARGS__)
  47. INIT_LOG_MODULE(milter)
  48. static const struct rspamd_milter_context *milter_ctx = NULL;
  49. static gboolean rspamd_milter_handle_session (
  50. struct rspamd_milter_session *session,
  51. struct rspamd_milter_private *priv);
  52. static inline void rspamd_milter_plan_io (struct rspamd_milter_session *session,
  53. struct rspamd_milter_private *priv, gshort what);
  54. static GQuark
  55. rspamd_milter_quark (void)
  56. {
  57. return g_quark_from_static_string ("milter");
  58. }
  59. static void
  60. rspamd_milter_obuf_free (struct rspamd_milter_outbuf *obuf)
  61. {
  62. if (obuf) {
  63. if (obuf->buf) {
  64. rspamd_fstring_free (obuf->buf);
  65. }
  66. g_free (obuf);
  67. }
  68. }
  69. #define RSPAMD_MILTER_RESET_COMMON (1 << 0)
  70. #define RSPAMD_MILTER_RESET_IO (1 << 1)
  71. #define RSPAMD_MILTER_RESET_ADDR (1 << 2)
  72. #define RSPAMD_MILTER_RESET_MACRO (1 << 3)
  73. #define RSPAMD_MILTER_RESET_ALL (RSPAMD_MILTER_RESET_COMMON | \
  74. RSPAMD_MILTER_RESET_IO | \
  75. RSPAMD_MILTER_RESET_ADDR | \
  76. RSPAMD_MILTER_RESET_MACRO)
  77. #define RSPAMD_MILTER_RESET_QUIT_NC (RSPAMD_MILTER_RESET_COMMON | \
  78. RSPAMD_MILTER_RESET_ADDR | \
  79. RSPAMD_MILTER_RESET_MACRO)
  80. #define RSPAMD_MILTER_RESET_ABORT (RSPAMD_MILTER_RESET_COMMON)
  81. static void
  82. rspamd_milter_session_reset (struct rspamd_milter_session *session,
  83. guint how)
  84. {
  85. struct rspamd_milter_outbuf *obuf, *obuf_tmp;
  86. struct rspamd_milter_private *priv = session->priv;
  87. struct rspamd_email_address *cur;
  88. guint i;
  89. if (how & RSPAMD_MILTER_RESET_IO) {
  90. msg_debug_milter ("cleanup IO on abort");
  91. DL_FOREACH_SAFE (priv->out_chain, obuf, obuf_tmp) {
  92. rspamd_milter_obuf_free (obuf);
  93. }
  94. priv->out_chain = NULL;
  95. if (priv->parser.buf) {
  96. priv->parser.buf->len = 0;
  97. }
  98. }
  99. if (how & RSPAMD_MILTER_RESET_COMMON) {
  100. msg_debug_milter ("cleanup common data on abort");
  101. if (session->message) {
  102. session->message->len = 0;
  103. msg_debug_milter ("cleanup message on abort");
  104. }
  105. if (session->rcpts) {
  106. PTR_ARRAY_FOREACH (session->rcpts, i, cur) {
  107. rspamd_email_address_free (cur);
  108. }
  109. msg_debug_milter ("cleanup %d recipients on abort",
  110. (gint)session->rcpts->len);
  111. g_ptr_array_free (session->rcpts, TRUE);
  112. session->rcpts = NULL;
  113. }
  114. if (session->from) {
  115. msg_debug_milter ("cleanup from");
  116. rspamd_email_address_free (session->from);
  117. session->from = NULL;
  118. }
  119. if (priv->headers) {
  120. msg_debug_milter ("cleanup headers");
  121. gchar *k;
  122. GArray *ar;
  123. kh_foreach (priv->headers, k, ar, {
  124. g_free (k);
  125. g_array_free (ar, TRUE);
  126. });
  127. kh_clear (milter_headers_hash_t, priv->headers);
  128. }
  129. priv->cur_hdr = 0;
  130. }
  131. if (how & RSPAMD_MILTER_RESET_ADDR) {
  132. if (session->addr) {
  133. msg_debug_milter ("cleanup addr");
  134. rspamd_inet_address_free (session->addr);
  135. session->addr = NULL;
  136. }
  137. if (session->hostname) {
  138. msg_debug_milter ("cleanup hostname");
  139. session->hostname->len = 0;
  140. }
  141. }
  142. if (how & RSPAMD_MILTER_RESET_MACRO) {
  143. if (session->macros) {
  144. msg_debug_milter ("cleanup macros");
  145. g_hash_table_unref (session->macros);
  146. session->macros = NULL;
  147. }
  148. }
  149. }
  150. static void
  151. rspamd_milter_session_dtor (struct rspamd_milter_session *session)
  152. {
  153. struct rspamd_milter_private *priv;
  154. if (session) {
  155. priv = session->priv;
  156. msg_debug_milter ("destroying milter session");
  157. rspamd_ev_watcher_stop (priv->event_loop, &priv->ev);
  158. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ALL);
  159. close (priv->fd);
  160. if (priv->parser.buf) {
  161. rspamd_fstring_free (priv->parser.buf);
  162. }
  163. if (session->message) {
  164. rspamd_fstring_free (session->message);
  165. }
  166. if (session->helo) {
  167. rspamd_fstring_free (session->helo);
  168. }
  169. if (session->hostname) {
  170. rspamd_fstring_free (session->hostname);
  171. }
  172. if (priv->headers) {
  173. gchar *k;
  174. GArray *ar;
  175. kh_foreach (priv->headers, k, ar, {
  176. g_free (k);
  177. g_array_free (ar, TRUE);
  178. });
  179. kh_destroy (milter_headers_hash_t, priv->headers);
  180. }
  181. if (milter_ctx->sessions_cache) {
  182. rspamd_worker_session_cache_remove (milter_ctx->sessions_cache,
  183. session);
  184. }
  185. rspamd_mempool_delete (priv->pool);
  186. g_free (priv);
  187. g_free (session);
  188. }
  189. }
  190. static void
  191. rspamd_milter_on_protocol_error (struct rspamd_milter_session *session,
  192. struct rspamd_milter_private *priv, GError *err)
  193. {
  194. msg_debug_milter ("protocol error: %e", err);
  195. priv->state = RSPAMD_MILTER_WANNA_DIE;
  196. REF_RETAIN (session);
  197. priv->err_cb (priv->fd, session, priv->ud, err);
  198. REF_RELEASE (session);
  199. g_error_free (err);
  200. rspamd_milter_plan_io (session, priv, EV_WRITE);
  201. }
  202. static void
  203. rspamd_milter_on_protocol_ping (struct rspamd_milter_session *session,
  204. struct rspamd_milter_private *priv)
  205. {
  206. GError *err = NULL;
  207. static const gchar reply[] = "HTTP/1.1 200 OK\r\n"
  208. "Connection: close\r\n"
  209. "Server: rspamd/2.7 (milter mode)\r\n"
  210. "Content-Length: 6\r\n"
  211. "Content-Type: text/plain\r\n"
  212. "\r\n"
  213. "pong\r\n";
  214. if (write (priv->fd, reply, sizeof (reply)) == -1) {
  215. gint serrno = errno;
  216. msg_err_milter ("cannot write pong reply: %s", strerror (serrno));
  217. g_set_error (&err, rspamd_milter_quark (), serrno, "ping command IO error: %s",
  218. strerror (serrno));
  219. priv->state = RSPAMD_MILTER_WANNA_DIE;
  220. REF_RETAIN (session);
  221. priv->err_cb (priv->fd, session, priv->ud, err);
  222. REF_RELEASE (session);
  223. g_error_free (err);
  224. }
  225. else {
  226. priv->state = RSPAMD_MILTER_PONG_AND_DIE;
  227. rspamd_milter_plan_io (session, priv, EV_WRITE);
  228. }
  229. }
  230. static gint
  231. rspamd_milter_http_on_url (http_parser * parser, const gchar *at, size_t length)
  232. {
  233. GString *url = (GString *)parser->data;
  234. g_string_append_len (url, at, length);
  235. return 0;
  236. }
  237. static void
  238. rspamd_milter_io_handler (gint fd, gshort what, void *ud)
  239. {
  240. struct rspamd_milter_session *session = ud;
  241. struct rspamd_milter_private *priv;
  242. GError *err;
  243. priv = session->priv;
  244. if (what == EV_TIMEOUT) {
  245. msg_debug_milter ("connection timed out");
  246. err = g_error_new (rspamd_milter_quark (), ETIMEDOUT, "connection "
  247. "timed out");
  248. rspamd_milter_on_protocol_error (session, priv, err);
  249. }
  250. else {
  251. rspamd_milter_handle_session (session, priv);
  252. }
  253. }
  254. static inline void
  255. rspamd_milter_plan_io (struct rspamd_milter_session *session,
  256. struct rspamd_milter_private *priv, gshort what)
  257. {
  258. rspamd_ev_watcher_reschedule (priv->event_loop, &priv->ev, what);
  259. }
  260. #define READ_INT_32(pos, var) do { \
  261. memcpy (&(var), (pos), sizeof (var)); \
  262. (pos) += sizeof (var); \
  263. (var) = ntohl (var); \
  264. } while (0)
  265. #define READ_INT_16(pos, var) do { \
  266. memcpy (&(var), (pos), sizeof (var)); \
  267. (pos) += sizeof (var); \
  268. (var) = ntohs (var); \
  269. } while (0)
  270. static gboolean
  271. rspamd_milter_process_command (struct rspamd_milter_session *session,
  272. struct rspamd_milter_private *priv)
  273. {
  274. GError *err;
  275. rspamd_fstring_t *buf;
  276. const guchar *pos, *end, *zero;
  277. guint cmdlen;
  278. guint32 version, actions, protocol;
  279. buf = priv->parser.buf;
  280. pos = buf->str + priv->parser.cmd_start;
  281. cmdlen = priv->parser.datalen;
  282. end = pos + cmdlen;
  283. switch (priv->parser.cur_cmd) {
  284. case RSPAMD_MILTER_CMD_ABORT:
  285. msg_debug_milter ("got abort command");
  286. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ABORT);
  287. break;
  288. case RSPAMD_MILTER_CMD_BODY:
  289. if (!session->message) {
  290. session->message = rspamd_fstring_sized_new (
  291. RSPAMD_MILTER_MESSAGE_CHUNK);
  292. }
  293. msg_debug_milter ("got body chunk: %d bytes", (int)cmdlen);
  294. session->message = rspamd_fstring_append (session->message,
  295. pos, cmdlen);
  296. break;
  297. case RSPAMD_MILTER_CMD_CONNECT:
  298. msg_debug_milter ("got connect command");
  299. /*
  300. * char hostname[]: Hostname, NUL terminated
  301. * char family: Protocol family
  302. * uint16 port: Port number (SMFIA_INET or SMFIA_INET6 only)
  303. * char address[]: IP address (ASCII) or unix socket path, NUL terminated
  304. */
  305. zero = memchr (pos, '\0', cmdlen);
  306. if (zero == NULL || zero > (end - sizeof (guint16) + 1)) {
  307. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  308. "connect command (no name)");
  309. rspamd_milter_on_protocol_error (session, priv, err);
  310. return FALSE;
  311. }
  312. else {
  313. guchar proto;
  314. guint16 port;
  315. gchar ip6_str[INET6_ADDRSTRLEN + 3];
  316. gsize r;
  317. /*
  318. * Important notice: Postfix do NOT use this command to pass
  319. * client's info (e.g. hostname is not really here)
  320. * Sendmail will pass it here
  321. */
  322. if (session->hostname == NULL) {
  323. session->hostname = rspamd_fstring_new_init (pos, zero - pos);
  324. msg_debug_milter ("got hostname on connect phase: %V",
  325. session->hostname);
  326. }
  327. else {
  328. session->hostname = rspamd_fstring_assign (session->hostname,
  329. pos, zero - pos);
  330. msg_debug_milter ("rewrote hostname on connect phase: %V",
  331. session->hostname);
  332. }
  333. pos = zero + 1;
  334. proto = *pos ++;
  335. if (proto == RSPAMD_MILTER_CONN_UNKNOWN) {
  336. /* We have no information about host */
  337. msg_debug_milter ("unknown connect address");
  338. }
  339. else {
  340. READ_INT_16 (pos, port);
  341. if (pos >= end) {
  342. /* No IP somehow */
  343. msg_debug_milter ("unknown connect IP/socket");
  344. }
  345. else {
  346. zero = memchr (pos, '\0', end - pos);
  347. if (zero == NULL) {
  348. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  349. "connect command (no zero terminated IP)");
  350. rspamd_milter_on_protocol_error (session, priv, err);
  351. return FALSE;
  352. }
  353. switch (proto) {
  354. case RSPAMD_MILTER_CONN_UNIX:
  355. session->addr = rspamd_inet_address_new (AF_UNIX,
  356. pos);
  357. break;
  358. case RSPAMD_MILTER_CONN_INET:
  359. session->addr = rspamd_inet_address_new (AF_INET, NULL);
  360. if (!rspamd_parse_inet_address_ip (pos, zero - pos,
  361. session->addr)) {
  362. err = g_error_new (rspamd_milter_quark (), EINVAL,
  363. "invalid connect command (bad IPv4)");
  364. rspamd_milter_on_protocol_error (session, priv,
  365. err);
  366. return FALSE;
  367. }
  368. rspamd_inet_address_set_port (session->addr, port);
  369. break;
  370. case RSPAMD_MILTER_CONN_INET6:
  371. session->addr = rspamd_inet_address_new (AF_INET6, NULL);
  372. if (zero - pos > sizeof ("IPv6:") &&
  373. rspamd_lc_cmp (pos, "IPv6:",
  374. sizeof ("IPv6:") - 1) == 0) {
  375. /* Kill sendmail please */
  376. pos += sizeof ("IPv6:") - 1;
  377. if (*pos != '[') {
  378. /* Add explicit braces */
  379. r = rspamd_snprintf (ip6_str, sizeof (ip6_str),
  380. "[%*s]", (int)(zero - pos), pos);
  381. }
  382. else {
  383. r = rspamd_strlcpy (ip6_str, pos, sizeof (ip6_str));
  384. }
  385. }
  386. else {
  387. r = rspamd_strlcpy (ip6_str, pos, sizeof (ip6_str));
  388. }
  389. if (!rspamd_parse_inet_address_ip (ip6_str, r,
  390. session->addr)) {
  391. err = g_error_new (rspamd_milter_quark (), EINVAL,
  392. "invalid connect command (bad IPv6)");
  393. rspamd_milter_on_protocol_error (session, priv,
  394. err);
  395. return FALSE;
  396. }
  397. rspamd_inet_address_set_port (session->addr, port);
  398. break;
  399. default:
  400. err = g_error_new (rspamd_milter_quark (), EINVAL,
  401. "invalid connect command (bad protocol: %c)",
  402. proto);
  403. rspamd_milter_on_protocol_error (session, priv,
  404. err);
  405. return FALSE;
  406. }
  407. }
  408. }
  409. msg_info_milter ("got connection from %s",
  410. rspamd_inet_address_to_string_pretty (session->addr));
  411. }
  412. break;
  413. case RSPAMD_MILTER_CMD_MACRO:
  414. msg_debug_milter ("got macro command");
  415. /*
  416. * Format is
  417. * 1 byte - command associated (we don't care about it)
  418. * 0-terminated name
  419. * 0-terminated value
  420. * ...
  421. */
  422. if (session->macros == NULL) {
  423. session->macros = g_hash_table_new_full (rspamd_ftok_icase_hash,
  424. rspamd_ftok_icase_equal,
  425. rspamd_fstring_mapped_ftok_free,
  426. rspamd_fstring_mapped_ftok_free);
  427. }
  428. /* Ignore one byte */
  429. pos ++;
  430. while (pos < end) {
  431. zero = memchr (pos, '\0', cmdlen);
  432. if (zero == NULL || zero >= end) {
  433. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  434. "macro command (no name)");
  435. rspamd_milter_on_protocol_error (session, priv, err);
  436. return FALSE;
  437. }
  438. else {
  439. rspamd_fstring_t *name, *value;
  440. rspamd_ftok_t *name_tok, *value_tok;
  441. const guchar *zero_val;
  442. zero_val = memchr (zero + 1, '\0', end - zero - 1);
  443. if (zero_val != NULL && end > zero_val) {
  444. name = rspamd_fstring_new_init (pos, zero - pos);
  445. value = rspamd_fstring_new_init (zero + 1,
  446. zero_val - zero - 1);
  447. name_tok = rspamd_ftok_map (name);
  448. value_tok = rspamd_ftok_map (value);
  449. g_hash_table_replace (session->macros, name_tok, value_tok);
  450. msg_debug_milter ("got macro: %T -> %T",
  451. name_tok, value_tok);
  452. cmdlen -= zero_val - pos;
  453. pos = zero_val + 1;
  454. }
  455. else {
  456. err = g_error_new (rspamd_milter_quark (), EINVAL,
  457. "invalid macro command (bad value)");
  458. rspamd_milter_on_protocol_error (session, priv, err);
  459. return FALSE;
  460. }
  461. }
  462. }
  463. break;
  464. case RSPAMD_MILTER_CMD_BODYEOB:
  465. msg_debug_milter ("got eob command");
  466. REF_RETAIN (session);
  467. priv->fin_cb (priv->fd, session, priv->ud);
  468. REF_RELEASE (session);
  469. break;
  470. case RSPAMD_MILTER_CMD_HELO:
  471. msg_debug_milter ("got helo command");
  472. if (end > pos && *(end - 1) == '\0') {
  473. if (session->helo == NULL) {
  474. session->helo = rspamd_fstring_new_init (pos, cmdlen - 1);
  475. }
  476. else {
  477. session->helo = rspamd_fstring_assign (session->helo,
  478. pos, cmdlen - 1);
  479. }
  480. }
  481. else if (end > pos) {
  482. /* Should not happen */
  483. if (session->helo == NULL) {
  484. session->helo = rspamd_fstring_new_init (pos, cmdlen);
  485. }
  486. else {
  487. session->helo = rspamd_fstring_assign (session->helo,
  488. pos, cmdlen);
  489. }
  490. }
  491. msg_debug_milter ("got helo value: %V", session->helo);
  492. break;
  493. case RSPAMD_MILTER_CMD_QUIT_NC:
  494. /* We need to reset session and start over */
  495. msg_debug_milter ("got quit_nc command");
  496. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_QUIT_NC);
  497. break;
  498. case RSPAMD_MILTER_CMD_HEADER:
  499. msg_debug_milter ("got header command");
  500. if (!session->message) {
  501. session->message = rspamd_fstring_sized_new (
  502. RSPAMD_MILTER_MESSAGE_CHUNK);
  503. }
  504. zero = memchr (pos, '\0', cmdlen);
  505. if (zero == NULL) {
  506. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  507. "header command (no name)");
  508. rspamd_milter_on_protocol_error (session, priv, err);
  509. return FALSE;
  510. }
  511. else {
  512. if (end > zero && *(end - 1) == '\0') {
  513. khiter_t k;
  514. gint res;
  515. k = kh_get (milter_headers_hash_t, priv->headers, (gchar *)pos);
  516. if (k == kh_end (priv->headers)) {
  517. GArray *ar;
  518. k = kh_put (milter_headers_hash_t, priv->headers,
  519. g_strdup (pos), &res);
  520. ar = g_array_new (FALSE, FALSE, sizeof (gint));
  521. g_array_append_val (ar, priv->cur_hdr);
  522. kh_value (priv->headers, k) = ar;
  523. }
  524. else {
  525. g_array_append_val (kh_value (priv->headers, k),
  526. priv->cur_hdr);
  527. }
  528. rspamd_printf_fstring (&session->message, "%*s: %*s\r\n",
  529. (int)(zero - pos), pos,
  530. (int)(end - zero - 2), zero + 1);
  531. priv->cur_hdr ++;
  532. }
  533. else {
  534. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  535. "header command (bad value)");
  536. rspamd_milter_on_protocol_error (session, priv, err);
  537. return FALSE;
  538. }
  539. }
  540. break;
  541. case RSPAMD_MILTER_CMD_MAIL:
  542. msg_debug_milter ("mail command");
  543. while (pos < end) {
  544. struct rspamd_email_address *addr;
  545. gchar *cpy;
  546. zero = memchr (pos, '\0', end - pos);
  547. if (zero && zero > pos) {
  548. cpy = rspamd_mempool_alloc (priv->pool, zero - pos);
  549. memcpy (cpy, pos, zero - pos);
  550. msg_debug_milter ("got mail: %*s", (int)(zero - pos), cpy);
  551. addr = rspamd_email_address_from_smtp (cpy, zero - pos);
  552. if (addr) {
  553. session->from = addr;
  554. }
  555. /* TODO: parse esmtp arguments */
  556. break;
  557. }
  558. else {
  559. msg_debug_milter ("got weird from: %*s", (int)(end - pos),
  560. pos);
  561. /* That actually should not happen */
  562. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  563. memcpy (cpy, pos, end - pos);
  564. addr = rspamd_email_address_from_smtp (cpy, end - pos);
  565. if (addr) {
  566. session->from = addr;
  567. }
  568. break;
  569. }
  570. }
  571. break;
  572. case RSPAMD_MILTER_CMD_EOH:
  573. msg_debug_milter ("got eoh command");
  574. if (!session->message) {
  575. session->message = rspamd_fstring_sized_new (
  576. RSPAMD_MILTER_MESSAGE_CHUNK);
  577. }
  578. session->message = rspamd_fstring_append (session->message,
  579. "\r\n", 2);
  580. break;
  581. case RSPAMD_MILTER_CMD_OPTNEG:
  582. if (cmdlen != sizeof (guint32) * 3) {
  583. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  584. "optneg command");
  585. rspamd_milter_on_protocol_error (session, priv, err);
  586. return FALSE;
  587. }
  588. READ_INT_32 (pos, version);
  589. READ_INT_32 (pos, actions);
  590. READ_INT_32 (pos, protocol);
  591. msg_debug_milter ("optneg: version: %d, actions: %d, protocol: %d",
  592. version, actions, protocol);
  593. if (version < RSPAMD_MILTER_PROTO_VER) {
  594. msg_warn_milter ("MTA specifies too old protocol: %d, "
  595. "aborting connection", version);
  596. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  597. "protocol version: %d", version);
  598. rspamd_milter_on_protocol_error (session, priv, err);
  599. return FALSE;
  600. }
  601. version = RSPAMD_MILTER_PROTO_VER;
  602. actions |= RSPAMD_MILTER_ACTIONS_MASK;
  603. protocol = RSPAMD_MILTER_FLAG_NOREPLY_MASK;
  604. return rspamd_milter_send_action (session, RSPAMD_MILTER_OPTNEG,
  605. version, actions, protocol);
  606. break;
  607. case RSPAMD_MILTER_CMD_QUIT:
  608. if (priv->out_chain) {
  609. msg_debug_milter ("quit command, refcount: %d, "
  610. "some output buffers left - draining",
  611. session->ref.refcount);
  612. priv->state = RSPAMD_MILTER_WRITE_AND_DIE;
  613. }
  614. else {
  615. msg_debug_milter ("quit command, refcount: %d",
  616. session->ref.refcount);
  617. priv->state = RSPAMD_MILTER_WANNA_DIE;
  618. REF_RETAIN (session);
  619. priv->fin_cb (priv->fd, session, priv->ud);
  620. REF_RELEASE (session);
  621. return FALSE;
  622. }
  623. break;
  624. case RSPAMD_MILTER_CMD_RCPT:
  625. msg_debug_milter ("rcpt command");
  626. while (pos < end) {
  627. struct rspamd_email_address *addr;
  628. gchar *cpy;
  629. zero = memchr (pos, '\0', end - pos);
  630. if (zero && zero > pos) {
  631. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  632. memcpy (cpy, pos, end - pos);
  633. msg_debug_milter ("got rcpt: %*s", (int)(zero - pos), cpy);
  634. addr = rspamd_email_address_from_smtp (cpy, zero - pos);
  635. if (addr) {
  636. if (!session->rcpts) {
  637. session->rcpts = g_ptr_array_sized_new (1);
  638. }
  639. g_ptr_array_add (session->rcpts, addr);
  640. }
  641. pos = zero + 1;
  642. }
  643. else {
  644. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  645. memcpy (cpy, pos, end - pos);
  646. msg_debug_milter ("got weird rcpt: %*s", (int)(end - pos),
  647. pos);
  648. /* That actually should not happen */
  649. addr = rspamd_email_address_from_smtp (cpy, end - pos);
  650. if (addr) {
  651. if (!session->rcpts) {
  652. session->rcpts = g_ptr_array_sized_new (1);
  653. }
  654. g_ptr_array_add (session->rcpts, addr);
  655. }
  656. break;
  657. }
  658. }
  659. break;
  660. case RSPAMD_MILTER_CMD_DATA:
  661. if (!session->message) {
  662. session->message = rspamd_fstring_sized_new (
  663. RSPAMD_MILTER_MESSAGE_CHUNK);
  664. }
  665. msg_debug_milter ("got data command");
  666. /* We do not need reply as specified */
  667. break;
  668. default:
  669. msg_debug_milter ("got bad command: %c", priv->parser.cur_cmd);
  670. break;
  671. }
  672. return TRUE;
  673. }
  674. static gboolean
  675. rspamd_milter_is_valid_cmd (guchar c)
  676. {
  677. switch (c) {
  678. case RSPAMD_MILTER_CMD_ABORT:
  679. case RSPAMD_MILTER_CMD_BODY:
  680. case RSPAMD_MILTER_CMD_CONNECT:
  681. case RSPAMD_MILTER_CMD_MACRO:
  682. case RSPAMD_MILTER_CMD_BODYEOB:
  683. case RSPAMD_MILTER_CMD_HELO:
  684. case RSPAMD_MILTER_CMD_QUIT_NC:
  685. case RSPAMD_MILTER_CMD_HEADER:
  686. case RSPAMD_MILTER_CMD_MAIL:
  687. case RSPAMD_MILTER_CMD_EOH:
  688. case RSPAMD_MILTER_CMD_OPTNEG:
  689. case RSPAMD_MILTER_CMD_QUIT:
  690. case RSPAMD_MILTER_CMD_RCPT:
  691. case RSPAMD_MILTER_CMD_DATA:
  692. case RSPAMD_MILTER_CMD_UNKNOWN:
  693. return TRUE;
  694. default:
  695. break;
  696. }
  697. return FALSE;
  698. }
  699. static gboolean
  700. rspamd_milter_consume_input (struct rspamd_milter_session *session,
  701. struct rspamd_milter_private *priv)
  702. {
  703. const guchar *p, *end;
  704. GError *err;
  705. p = priv->parser.buf->str + priv->parser.pos;
  706. end = priv->parser.buf->str + priv->parser.buf->len;
  707. while (p < end) {
  708. msg_debug_milter("offset: %d, state: %d",
  709. (gint)(p - (const guchar *)priv->parser.buf->str),
  710. priv->parser.state);
  711. switch (priv->parser.state) {
  712. case st_len_1:
  713. /* The first length byte in big endian order */
  714. priv->parser.datalen = 0;
  715. priv->parser.datalen |= ((gsize)*p) << 24;
  716. priv->parser.state = st_len_2;
  717. p++;
  718. break;
  719. case st_len_2:
  720. /* The second length byte in big endian order */
  721. priv->parser.datalen |= ((gsize)*p) << 16;
  722. priv->parser.state = st_len_3;
  723. p++;
  724. break;
  725. case st_len_3:
  726. /* The third length byte in big endian order */
  727. priv->parser.datalen |= ((gsize)*p) << 8;
  728. priv->parser.state = st_len_4;
  729. p++;
  730. break;
  731. case st_len_4:
  732. /* The fourth length byte in big endian order */
  733. priv->parser.datalen |= ((gsize)*p);
  734. priv->parser.state = st_read_cmd;
  735. p++;
  736. break;
  737. case st_read_cmd:
  738. priv->parser.cur_cmd = *p;
  739. priv->parser.state = st_read_data;
  740. if (priv->parser.datalen < 1) {
  741. err = g_error_new (rspamd_milter_quark (), EINVAL,
  742. "Command length is too short");
  743. rspamd_milter_on_protocol_error (session, priv, err);
  744. return FALSE;
  745. }
  746. else {
  747. /* Eat command itself */
  748. priv->parser.datalen --;
  749. }
  750. p++;
  751. priv->parser.cmd_start = p - (const guchar *)priv->parser.buf->str;
  752. break;
  753. case st_read_data:
  754. /* We might need some more data in buffer for further steps */
  755. if (priv->parser.datalen >
  756. RSPAMD_MILTER_MESSAGE_CHUNK * 2) {
  757. /* Check if we have HTTP input instead of milter */
  758. if (priv->parser.buf->len > sizeof ("GET") &&
  759. memcmp (priv->parser.buf->str, "GET", 3) == 0) {
  760. struct http_parser http_parser;
  761. struct http_parser_settings http_callbacks;
  762. GString *url = g_string_new (NULL);
  763. /* Hack, hack, hack */
  764. /*
  765. * This code is assumed to read `/ping` command and
  766. * handle it to monitor port's availability since
  767. * milter protocol is stupid and does not allow to do that
  768. * This code also assumes that HTTP request can be read
  769. * as as single data chunk which is not true in some cases
  770. * In general, don't use it for anything but ping checks
  771. */
  772. memset (&http_callbacks, 0, sizeof (http_callbacks));
  773. http_parser.data = url;
  774. http_parser_init (&http_parser, HTTP_REQUEST);
  775. http_callbacks.on_url = rspamd_milter_http_on_url;
  776. http_parser_execute (&http_parser, &http_callbacks,
  777. priv->parser.buf->str, priv->parser.buf->len);
  778. if (url->len == sizeof ("/ping") - 1 &&
  779. rspamd_lc_cmp (url->str, "/ping", url->len) == 0) {
  780. rspamd_milter_on_protocol_ping (session, priv);
  781. g_string_free (url, TRUE);
  782. return TRUE;
  783. }
  784. else {
  785. err = g_error_new (rspamd_milter_quark (), EINVAL,
  786. "HTTP GET request is not supported in milter mode, url: %s",
  787. url->str);
  788. }
  789. g_string_free (url, TRUE);
  790. }
  791. else if (priv->parser.buf->len > sizeof ("POST") &&
  792. memcmp (priv->parser.buf->str, "POST", 4) == 0) {
  793. err = g_error_new (rspamd_milter_quark (), EINVAL,
  794. "HTTP POST request is not supported in milter mode");
  795. }
  796. else {
  797. err = g_error_new (rspamd_milter_quark (), E2BIG,
  798. "Command length is too big: %zd",
  799. priv->parser.datalen);
  800. }
  801. rspamd_milter_on_protocol_error (session, priv, err);
  802. return FALSE;
  803. }
  804. if (!rspamd_milter_is_valid_cmd (priv->parser.cur_cmd)) {
  805. err = g_error_new (rspamd_milter_quark (), E2BIG,
  806. "Unvalid command: %c",
  807. priv->parser.cur_cmd);
  808. rspamd_milter_on_protocol_error (session, priv, err);
  809. return FALSE;
  810. }
  811. if (priv->parser.buf->allocated < priv->parser.datalen) {
  812. priv->parser.pos = p - (const guchar *)priv->parser.buf->str;
  813. priv->parser.buf = rspamd_fstring_grow (priv->parser.buf,
  814. priv->parser.buf->len + priv->parser.datalen);
  815. /* This can realloc buffer */
  816. rspamd_milter_plan_io (session, priv, EV_READ);
  817. goto end;
  818. }
  819. else {
  820. /* We may have the full command available */
  821. if (p + priv->parser.datalen <= end) {
  822. /* We can process command */
  823. if (!rspamd_milter_process_command (session, priv)) {
  824. return FALSE;
  825. }
  826. p += priv->parser.datalen;
  827. priv->parser.state = st_len_1;
  828. priv->parser.cur_cmd = '\0';
  829. priv->parser.cmd_start = 0;
  830. }
  831. else {
  832. /* Need to read more */
  833. priv->parser.pos = p - (const guchar *)priv->parser.buf->str;
  834. rspamd_milter_plan_io (session, priv, EV_READ);
  835. goto end;
  836. }
  837. }
  838. break;
  839. }
  840. }
  841. /* Leftover */
  842. switch (priv->parser.state) {
  843. case st_read_data:
  844. if (p + priv->parser.datalen <= end) {
  845. if (!rspamd_milter_process_command (session, priv)) {
  846. return FALSE;
  847. }
  848. priv->parser.state = st_len_1;
  849. priv->parser.cur_cmd = '\0';
  850. priv->parser.cmd_start = 0;
  851. }
  852. break;
  853. default:
  854. /* No need to do anything */
  855. break;
  856. }
  857. if (p == end) {
  858. priv->parser.buf->len = 0;
  859. priv->parser.pos = 0;
  860. priv->parser.cmd_start = 0;
  861. }
  862. if (priv->out_chain) {
  863. rspamd_milter_plan_io (session, priv, EV_READ|EV_WRITE);
  864. }
  865. else {
  866. rspamd_milter_plan_io (session, priv, EV_READ);
  867. }
  868. end:
  869. return TRUE;
  870. }
  871. static gboolean
  872. rspamd_milter_handle_session (struct rspamd_milter_session *session,
  873. struct rspamd_milter_private *priv)
  874. {
  875. struct rspamd_milter_outbuf *obuf, *obuf_tmp;
  876. gssize r, to_write;
  877. GError *err;
  878. g_assert (session != NULL);
  879. switch (priv->state) {
  880. case RSPAMD_MILTER_READ_MORE:
  881. if (priv->parser.buf->len >= priv->parser.buf->allocated) {
  882. priv->parser.buf = rspamd_fstring_grow (priv->parser.buf,
  883. priv->parser.buf->len * 2);
  884. }
  885. r = read (priv->fd, priv->parser.buf->str + priv->parser.buf->len,
  886. priv->parser.buf->allocated - priv->parser.buf->len);
  887. msg_debug_milter ("read %z bytes, %z remain, %z allocated",
  888. r, priv->parser.buf->len, priv->parser.buf->allocated);
  889. if (r == -1) {
  890. if (errno == EAGAIN || errno == EINTR) {
  891. rspamd_milter_plan_io (session, priv, EV_READ);
  892. return TRUE;
  893. }
  894. else {
  895. /* Fatal IO error */
  896. err = g_error_new (rspamd_milter_quark (), errno,
  897. "IO read error: %s", strerror (errno));
  898. REF_RETAIN (session);
  899. priv->err_cb (priv->fd, session, priv->ud, err);
  900. REF_RELEASE (session);
  901. g_error_free (err);
  902. REF_RELEASE (session);
  903. return FALSE;
  904. }
  905. }
  906. else if (r == 0) {
  907. err = g_error_new (rspamd_milter_quark (), ECONNRESET,
  908. "Unexpected EOF");
  909. REF_RETAIN (session);
  910. priv->err_cb (priv->fd, session, priv->ud, err);
  911. REF_RELEASE (session);
  912. g_error_free (err);
  913. REF_RELEASE (session);
  914. return FALSE;
  915. }
  916. else {
  917. priv->parser.buf->len += r;
  918. return rspamd_milter_consume_input (session, priv);
  919. }
  920. break;
  921. case RSPAMD_MILTER_WRITE_REPLY:
  922. case RSPAMD_MILTER_WRITE_AND_DIE:
  923. if (priv->out_chain == NULL) {
  924. if (priv->state == RSPAMD_MILTER_WRITE_AND_DIE) {
  925. /* Finished writing, let's die finally */
  926. msg_debug_milter ("output drained, terminating, refcount: %d",
  927. session->ref.refcount);
  928. /* Session should be destroyed by fin_cb... */
  929. REF_RETAIN (session);
  930. priv->fin_cb (priv->fd, session, priv->ud);
  931. REF_RELEASE (session);
  932. return FALSE;
  933. }
  934. else {
  935. /* We have written everything, so we can read something */
  936. priv->state = RSPAMD_MILTER_READ_MORE;
  937. rspamd_milter_plan_io (session, priv, EV_READ);
  938. }
  939. }
  940. else {
  941. DL_FOREACH_SAFE (priv->out_chain, obuf, obuf_tmp) {
  942. to_write = obuf->buf->len - obuf->pos;
  943. g_assert (to_write > 0);
  944. r = write (priv->fd, obuf->buf->str + obuf->pos, to_write);
  945. if (r == -1) {
  946. if (errno == EAGAIN || errno == EINTR) {
  947. rspamd_milter_plan_io (session, priv, EV_WRITE);
  948. }
  949. else {
  950. /* Fatal IO error */
  951. err = g_error_new (rspamd_milter_quark (), errno,
  952. "IO write error: %s", strerror (errno));
  953. REF_RETAIN (session);
  954. priv->err_cb (priv->fd, session, priv->ud, err);
  955. REF_RELEASE (session);
  956. g_error_free (err);
  957. REF_RELEASE (session);
  958. return FALSE;
  959. }
  960. }
  961. else if (r == 0) {
  962. err = g_error_new (rspamd_milter_quark (), ECONNRESET,
  963. "Unexpected EOF");
  964. REF_RETAIN (session);
  965. priv->err_cb (priv->fd, session, priv->ud, err);
  966. REF_RELEASE (session);
  967. g_error_free (err);
  968. REF_RELEASE (session);
  969. return FALSE;
  970. }
  971. else {
  972. if (r == to_write) {
  973. /* We have done with this buf */
  974. DL_DELETE (priv->out_chain, obuf);
  975. rspamd_milter_obuf_free (obuf);
  976. }
  977. else {
  978. /* We need to plan another write */
  979. obuf->pos += r;
  980. rspamd_milter_plan_io (session, priv, EV_WRITE);
  981. return TRUE;
  982. }
  983. }
  984. }
  985. /* Here we have written everything, so we can plan reading */
  986. priv->state = RSPAMD_MILTER_READ_MORE;
  987. rspamd_milter_plan_io (session, priv, EV_READ);
  988. }
  989. break;
  990. case RSPAMD_MILTER_WANNA_DIE:
  991. /* We are here after processing everything, so release session */
  992. REF_RELEASE (session);
  993. return FALSE;
  994. break;
  995. case RSPAMD_MILTER_PONG_AND_DIE:
  996. err = g_error_new (rspamd_milter_quark (), 0,
  997. "ping command");
  998. REF_RETAIN (session);
  999. priv->err_cb (priv->fd, session, priv->ud, err);
  1000. REF_RELEASE (session);
  1001. g_error_free (err);
  1002. REF_RELEASE (session);
  1003. return FALSE;
  1004. break;
  1005. }
  1006. return TRUE;
  1007. }
  1008. gboolean
  1009. rspamd_milter_handle_socket (gint fd, ev_tstamp timeout,
  1010. rspamd_mempool_t *pool,
  1011. struct ev_loop *ev_base, rspamd_milter_finish finish_cb,
  1012. rspamd_milter_error error_cb, void *ud)
  1013. {
  1014. struct rspamd_milter_session *session;
  1015. struct rspamd_milter_private *priv;
  1016. gint nfd = dup (fd);
  1017. if (nfd == -1) {
  1018. GError *err = g_error_new (rspamd_milter_quark (), errno,
  1019. "dup failed: %s", strerror (errno));
  1020. error_cb (fd, NULL, ud, err);
  1021. return FALSE;
  1022. }
  1023. g_assert (finish_cb != NULL);
  1024. g_assert (error_cb != NULL);
  1025. g_assert (milter_ctx != NULL);
  1026. session = g_malloc0 (sizeof (*session));
  1027. priv = g_malloc0 (sizeof (*priv));
  1028. priv->fd = nfd;
  1029. priv->ud = ud;
  1030. priv->fin_cb = finish_cb;
  1031. priv->err_cb = error_cb;
  1032. priv->parser.state = st_len_1;
  1033. priv->parser.buf = rspamd_fstring_sized_new (RSPAMD_MILTER_MESSAGE_CHUNK + 5);
  1034. priv->event_loop = ev_base;
  1035. priv->state = RSPAMD_MILTER_READ_MORE;
  1036. priv->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "milter", 0);
  1037. priv->discard_on_reject = milter_ctx->discard_on_reject;
  1038. priv->quarantine_on_reject = milter_ctx->quarantine_on_reject;
  1039. priv->ev.timeout = timeout;
  1040. rspamd_ev_watcher_init (&priv->ev, priv->fd, EV_READ|EV_WRITE,
  1041. rspamd_milter_io_handler, session);
  1042. if (pool) {
  1043. /* Copy tag */
  1044. memcpy (priv->pool->tag.uid, pool->tag.uid, sizeof (pool->tag.uid));
  1045. }
  1046. priv->headers = kh_init (milter_headers_hash_t);
  1047. kh_resize (milter_headers_hash_t, priv->headers, 32);
  1048. session->priv = priv;
  1049. REF_INIT_RETAIN (session, rspamd_milter_session_dtor);
  1050. if (milter_ctx->sessions_cache) {
  1051. rspamd_worker_session_cache_add (milter_ctx->sessions_cache,
  1052. priv->pool->tag.uid, &session->ref.refcount, session);
  1053. }
  1054. return rspamd_milter_handle_session (session, priv);
  1055. }
  1056. gboolean
  1057. rspamd_milter_set_reply (struct rspamd_milter_session *session,
  1058. rspamd_fstring_t *rcode,
  1059. rspamd_fstring_t *xcode,
  1060. rspamd_fstring_t *reply)
  1061. {
  1062. GString *buf;
  1063. gboolean ret;
  1064. buf = g_string_sized_new (xcode->len + rcode->len + reply->len + 2);
  1065. rspamd_printf_gstring (buf, "%V %V %V", rcode, xcode, reply);
  1066. ret = rspamd_milter_send_action (session, RSPAMD_MILTER_REPLYCODE,
  1067. buf);
  1068. g_string_free (buf, TRUE);
  1069. return ret;
  1070. }
  1071. #define SET_COMMAND(cmd, sz, reply, pos) do { \
  1072. guint32 _len; \
  1073. _len = (sz) + 1; \
  1074. (reply) = rspamd_fstring_sized_new (sizeof (_len) + _len); \
  1075. (reply)->len = sizeof (_len) + _len; \
  1076. _len = htonl (_len); \
  1077. memcpy ((reply)->str, &_len, sizeof (_len)); \
  1078. (reply)->str[sizeof(_len)] = (cmd); \
  1079. (pos) = (guchar *)(reply)->str + sizeof (_len) + 1; \
  1080. } while (0)
  1081. gboolean
  1082. rspamd_milter_send_action (struct rspamd_milter_session *session,
  1083. enum rspamd_milter_reply act, ...)
  1084. {
  1085. guint32 ver, actions, protocol, idx;
  1086. va_list ap;
  1087. guchar cmd, *pos;
  1088. rspamd_fstring_t *reply = NULL;
  1089. gsize len;
  1090. GString *name, *value;
  1091. const char *reason, *body_str;
  1092. struct rspamd_milter_outbuf *obuf;
  1093. struct rspamd_milter_private *priv = session->priv;
  1094. va_start (ap, act);
  1095. cmd = act;
  1096. switch (act) {
  1097. case RSPAMD_MILTER_ACCEPT:
  1098. case RSPAMD_MILTER_CONTINUE:
  1099. case RSPAMD_MILTER_DISCARD:
  1100. case RSPAMD_MILTER_PROGRESS:
  1101. case RSPAMD_MILTER_REJECT:
  1102. case RSPAMD_MILTER_TEMPFAIL:
  1103. /* No additional arguments */
  1104. msg_debug_milter ("send %c command", cmd);
  1105. SET_COMMAND (cmd, 0, reply, pos);
  1106. break;
  1107. case RSPAMD_MILTER_QUARANTINE:
  1108. reason = va_arg (ap, const char *);
  1109. if (reason == NULL) {
  1110. reason = "";
  1111. }
  1112. len = strlen (reason);
  1113. msg_debug_milter ("send quarantine action %s", reason);
  1114. SET_COMMAND (cmd, len + 1, reply, pos);
  1115. memcpy (pos, reason, len + 1);
  1116. break;
  1117. case RSPAMD_MILTER_ADDHEADER:
  1118. name = va_arg (ap, GString *);
  1119. value = va_arg (ap, GString *);
  1120. /* Name and value must be zero terminated */
  1121. msg_debug_milter ("add header command - \"%v\"=\"%v\"", name, value);
  1122. SET_COMMAND (cmd, name->len + value->len + 2, reply, pos);
  1123. memcpy (pos, name->str, name->len + 1);
  1124. pos += name->len + 1;
  1125. memcpy (pos, value->str, value->len + 1);
  1126. break;
  1127. case RSPAMD_MILTER_CHGHEADER:
  1128. case RSPAMD_MILTER_INSHEADER:
  1129. idx = va_arg (ap, guint32);
  1130. name = va_arg (ap, GString *);
  1131. value = va_arg (ap, GString *);
  1132. msg_debug_milter ("change/insert header command pos = %d- \"%v\"=\"%v\"",
  1133. idx, name, value);
  1134. /* Name and value must be zero terminated */
  1135. SET_COMMAND (cmd, name->len + value->len + 2 + sizeof (guint32),
  1136. reply, pos);
  1137. idx = htonl (idx);
  1138. memcpy (pos, &idx, sizeof (idx));
  1139. pos += sizeof (idx);
  1140. memcpy (pos, name->str, name->len + 1);
  1141. pos += name->len + 1;
  1142. memcpy (pos, value->str, value->len + 1);
  1143. break;
  1144. case RSPAMD_MILTER_REPLBODY:
  1145. len = va_arg (ap, gsize);
  1146. body_str = va_arg (ap, const char *);
  1147. msg_debug_milter ("want to change body; size = %uz",
  1148. len);
  1149. SET_COMMAND (cmd, len, reply, pos);
  1150. memcpy (pos, body_str, len);
  1151. break;
  1152. case RSPAMD_MILTER_REPLYCODE:
  1153. case RSPAMD_MILTER_ADDRCPT:
  1154. case RSPAMD_MILTER_DELRCPT:
  1155. case RSPAMD_MILTER_CHGFROM:
  1156. /* Single GString * argument */
  1157. value = va_arg (ap, GString *);
  1158. msg_debug_milter ("command %c; value=%v", cmd, value);
  1159. SET_COMMAND (cmd, value->len + 1, reply, pos);
  1160. memcpy (pos, value->str, value->len + 1);
  1161. break;
  1162. case RSPAMD_MILTER_OPTNEG:
  1163. ver = va_arg (ap, guint32);
  1164. actions = va_arg (ap, guint32);
  1165. protocol = va_arg (ap, guint32);
  1166. msg_debug_milter ("optneg reply: ver=%d, actions=%d, protocol=%d",
  1167. ver, actions, protocol);
  1168. ver = htonl (ver);
  1169. actions = htonl (actions);
  1170. protocol = htonl (protocol);
  1171. SET_COMMAND (cmd, sizeof (guint32) * 3, reply, pos);
  1172. memcpy (pos, &ver, sizeof (ver));
  1173. pos += sizeof (ver);
  1174. memcpy (pos, &actions, sizeof (actions));
  1175. pos += sizeof (actions);
  1176. memcpy (pos, &protocol, sizeof (protocol));
  1177. break;
  1178. default:
  1179. msg_err_milter ("invalid command: %c", cmd);
  1180. break;
  1181. }
  1182. va_end (ap);
  1183. if (reply) {
  1184. obuf = g_malloc (sizeof (*obuf));
  1185. obuf->buf = reply;
  1186. obuf->pos = 0;
  1187. DL_APPEND (priv->out_chain, obuf);
  1188. priv->state = RSPAMD_MILTER_WRITE_REPLY;
  1189. rspamd_milter_plan_io (session, priv, EV_WRITE);
  1190. return TRUE;
  1191. }
  1192. return FALSE;
  1193. }
  1194. gboolean
  1195. rspamd_milter_add_header (struct rspamd_milter_session *session,
  1196. GString *name, GString *value)
  1197. {
  1198. return rspamd_milter_send_action (session, RSPAMD_MILTER_ADDHEADER,
  1199. name, value);
  1200. }
  1201. gboolean
  1202. rspamd_milter_del_header (struct rspamd_milter_session *session,
  1203. GString *name)
  1204. {
  1205. GString value;
  1206. guint32 idx = 1;
  1207. value.str = (gchar *)"";
  1208. value.len = 0;
  1209. return rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1210. idx, name, &value);
  1211. }
  1212. void
  1213. rspamd_milter_session_unref (struct rspamd_milter_session *session)
  1214. {
  1215. REF_RELEASE (session);
  1216. }
  1217. struct rspamd_milter_session *
  1218. rspamd_milter_session_ref (struct rspamd_milter_session *session)
  1219. {
  1220. REF_RETAIN (session);
  1221. return session;
  1222. }
  1223. #define IF_MACRO(lit) RSPAMD_FTOK_ASSIGN (&srch, (lit)); \
  1224. found = g_hash_table_lookup (session->macros, &srch); \
  1225. if (found)
  1226. static void
  1227. rspamd_milter_macro_http (struct rspamd_milter_session *session,
  1228. struct rspamd_http_message *msg)
  1229. {
  1230. rspamd_ftok_t *found, srch;
  1231. struct rspamd_milter_private *priv = session->priv;
  1232. /*
  1233. * We assume postfix macros here, sendmail ones might be slightly
  1234. * different
  1235. */
  1236. if (!session->macros) {
  1237. return;
  1238. }
  1239. IF_MACRO("{i}") {
  1240. rspamd_http_message_add_header_len (msg, QUEUE_ID_HEADER,
  1241. found->begin, found->len);
  1242. }
  1243. else {
  1244. IF_MACRO("i") {
  1245. rspamd_http_message_add_header_len (msg, QUEUE_ID_HEADER,
  1246. found->begin, found->len);
  1247. }
  1248. }
  1249. IF_MACRO("{v}") {
  1250. rspamd_http_message_add_header_len (msg, USER_AGENT_HEADER,
  1251. found->begin, found->len);
  1252. }
  1253. else {
  1254. IF_MACRO("v") {
  1255. rspamd_http_message_add_header_len (msg, USER_AGENT_HEADER,
  1256. found->begin, found->len);
  1257. }
  1258. }
  1259. IF_MACRO("{cipher}") {
  1260. rspamd_http_message_add_header_len (msg, TLS_CIPHER_HEADER,
  1261. found->begin, found->len);
  1262. }
  1263. IF_MACRO("{tls_version}") {
  1264. rspamd_http_message_add_header_len (msg, TLS_VERSION_HEADER,
  1265. found->begin, found->len);
  1266. }
  1267. IF_MACRO("{auth_authen}") {
  1268. rspamd_http_message_add_header_len (msg, USER_HEADER,
  1269. found->begin, found->len);
  1270. }
  1271. IF_MACRO("{rcpt_mailer}") {
  1272. rspamd_http_message_add_header_len (msg, MAILER_HEADER,
  1273. found->begin, found->len);
  1274. }
  1275. if (milter_ctx->client_ca_name) {
  1276. IF_MACRO ("{cert_issuer}") {
  1277. rspamd_http_message_add_header_len (msg, CERT_ISSUER_HEADER,
  1278. found->begin, found->len);
  1279. if (found->len == strlen (milter_ctx->client_ca_name) &&
  1280. rspamd_cryptobox_memcmp (found->begin,
  1281. milter_ctx->client_ca_name, found->len) == 0) {
  1282. msg_debug_milter ("process certificate issued by %T", found);
  1283. IF_MACRO("{cert_subject}") {
  1284. rspamd_http_message_add_header_len (msg, USER_HEADER,
  1285. found->begin, found->len);
  1286. }
  1287. }
  1288. else {
  1289. msg_debug_milter ("skip certificate issued by %T", found);
  1290. }
  1291. }
  1292. }
  1293. else {
  1294. IF_MACRO ("{cert_issuer}") {
  1295. rspamd_http_message_add_header_len (msg, CERT_ISSUER_HEADER,
  1296. found->begin, found->len);
  1297. }
  1298. }
  1299. if (!session->hostname || session->hostname->len == 0) {
  1300. IF_MACRO("{client_name}") {
  1301. if (!(found->len == sizeof ("unknown") - 1 &&
  1302. memcmp (found->begin, "unknown",
  1303. sizeof ("unknown") - 1) == 0)) {
  1304. rspamd_http_message_add_header_len (msg, HOSTNAME_HEADER,
  1305. found->begin, found->len);
  1306. }
  1307. else {
  1308. msg_debug_milter ("skip unknown hostname from being added");
  1309. }
  1310. }
  1311. }
  1312. IF_MACRO("{daemon_name}") {
  1313. /* Postfix style */
  1314. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1315. found->begin, found->len);
  1316. }
  1317. else {
  1318. /* Sendmail style */
  1319. IF_MACRO("{j}") {
  1320. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1321. found->begin, found->len);
  1322. }
  1323. else {
  1324. IF_MACRO("j") {
  1325. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1326. found->begin, found->len);
  1327. }
  1328. }
  1329. }
  1330. }
  1331. struct rspamd_http_message *
  1332. rspamd_milter_to_http (struct rspamd_milter_session *session)
  1333. {
  1334. struct rspamd_http_message *msg;
  1335. guint i;
  1336. struct rspamd_email_address *rcpt;
  1337. struct rspamd_milter_private *priv = session->priv;
  1338. g_assert (session != NULL);
  1339. msg = rspamd_http_new_message (HTTP_REQUEST);
  1340. msg->url = rspamd_fstring_assign (msg->url, "/" MSG_CMD_CHECK_V2,
  1341. sizeof ("/" MSG_CMD_CHECK_V2) - 1);
  1342. if (session->message) {
  1343. rspamd_http_message_set_body_from_fstring_steal (msg, session->message);
  1344. session->message = NULL;
  1345. }
  1346. if (session->hostname && RSPAMD_FSTRING_LEN (session->hostname) > 0) {
  1347. if (!(session->hostname->len == sizeof ("unknown") - 1 &&
  1348. memcmp (RSPAMD_FSTRING_DATA (session->hostname), "unknown",
  1349. sizeof ("unknown") - 1) == 0)) {
  1350. rspamd_http_message_add_header_fstr (msg, HOSTNAME_HEADER,
  1351. session->hostname);
  1352. }
  1353. else {
  1354. msg_debug_milter ("skip unknown hostname from being added");
  1355. }
  1356. }
  1357. if (session->helo && session->helo->len > 0) {
  1358. rspamd_http_message_add_header_fstr (msg, HELO_HEADER,
  1359. session->helo);
  1360. }
  1361. if (session->from) {
  1362. rspamd_http_message_add_header_len (msg, FROM_HEADER,
  1363. session->from->raw, session->from->raw_len);
  1364. }
  1365. if (session->rcpts) {
  1366. PTR_ARRAY_FOREACH (session->rcpts, i, rcpt) {
  1367. rspamd_http_message_add_header_len (msg, RCPT_HEADER,
  1368. rcpt->raw, rcpt->raw_len);
  1369. }
  1370. }
  1371. if (session->addr) {
  1372. if (rspamd_inet_address_get_af (session->addr) != AF_UNIX) {
  1373. rspamd_http_message_add_header (msg, IP_ADDR_HEADER,
  1374. rspamd_inet_address_to_string_pretty (session->addr));
  1375. }
  1376. else {
  1377. rspamd_http_message_add_header (msg, IP_ADDR_HEADER,
  1378. rspamd_inet_address_to_string (session->addr));
  1379. }
  1380. }
  1381. rspamd_milter_macro_http (session, msg);
  1382. rspamd_http_message_add_header (msg, FLAGS_HEADER, "milter,body_block");
  1383. return msg;
  1384. }
  1385. void *
  1386. rspamd_milter_update_userdata (struct rspamd_milter_session *session,
  1387. void *ud)
  1388. {
  1389. struct rspamd_milter_private *priv = session->priv;
  1390. void *prev_ud;
  1391. prev_ud = priv->ud;
  1392. priv->ud = ud;
  1393. return prev_ud;
  1394. }
  1395. static void
  1396. rspamd_milter_remove_header_safe (struct rspamd_milter_session *session,
  1397. const gchar *key, gint nhdr)
  1398. {
  1399. gint i;
  1400. GString *hname, *hvalue;
  1401. struct rspamd_milter_private *priv = session->priv;
  1402. khiter_t k;
  1403. GArray *ar;
  1404. k = kh_get (milter_headers_hash_t, priv->headers, (char *)key);
  1405. if (k != kh_end (priv->headers)) {
  1406. ar = kh_val (priv->headers, k);
  1407. hname = g_string_new (key);
  1408. hvalue = g_string_new ("");
  1409. if (nhdr >= 1) {
  1410. rspamd_milter_send_action (session,
  1411. RSPAMD_MILTER_CHGHEADER,
  1412. nhdr, hname, hvalue);
  1413. }
  1414. else if (nhdr == 0 && ar->len > 0) {
  1415. /* We need to clear all headers */
  1416. for (i = ar->len; i > 0; i --) {
  1417. rspamd_milter_send_action (session,
  1418. RSPAMD_MILTER_CHGHEADER,
  1419. i, hname, hvalue);
  1420. }
  1421. }
  1422. else {
  1423. /* Remove from the end */
  1424. if (nhdr >= -(ar->len)) {
  1425. rspamd_milter_send_action (session,
  1426. RSPAMD_MILTER_CHGHEADER,
  1427. ar->len + nhdr + 1, hname, hvalue);
  1428. }
  1429. }
  1430. g_string_free (hname, TRUE);
  1431. g_string_free (hvalue, TRUE);
  1432. }
  1433. }
  1434. static void
  1435. rspamd_milter_extract_single_header (struct rspamd_milter_session *session,
  1436. const gchar *hdr, const ucl_object_t *obj)
  1437. {
  1438. GString *hname, *hvalue;
  1439. struct rspamd_milter_private *priv = session->priv;
  1440. gint idx = -1;
  1441. const ucl_object_t *val;
  1442. val = ucl_object_lookup (obj, "value");
  1443. if (val && ucl_object_type (val) == UCL_STRING) {
  1444. const ucl_object_t *idx_obj;
  1445. gboolean has_idx = FALSE;
  1446. idx_obj = ucl_object_lookup_any (obj, "order",
  1447. "index", NULL);
  1448. if (idx_obj) {
  1449. idx = ucl_object_toint (idx_obj);
  1450. has_idx = TRUE;
  1451. }
  1452. hname = g_string_new (hdr);
  1453. hvalue = g_string_new (ucl_object_tostring (val));
  1454. if (has_idx) {
  1455. if (idx >= 0) {
  1456. rspamd_milter_send_action (session,
  1457. RSPAMD_MILTER_INSHEADER,
  1458. idx,
  1459. hname, hvalue);
  1460. }
  1461. else {
  1462. /* Calculate negative offset */
  1463. if (-idx <= priv->cur_hdr) {
  1464. rspamd_milter_send_action (session,
  1465. RSPAMD_MILTER_INSHEADER,
  1466. priv->cur_hdr + idx + 1,
  1467. hname, hvalue);
  1468. }
  1469. else {
  1470. rspamd_milter_send_action (session,
  1471. RSPAMD_MILTER_INSHEADER,
  1472. 0,
  1473. hname, hvalue);
  1474. }
  1475. }
  1476. }
  1477. else {
  1478. rspamd_milter_send_action (session,
  1479. RSPAMD_MILTER_ADDHEADER,
  1480. hname, hvalue);
  1481. }
  1482. g_string_free (hname, TRUE);
  1483. g_string_free (hvalue, TRUE);
  1484. }
  1485. }
  1486. /*
  1487. * Returns `TRUE` if action has been processed internally by this function
  1488. */
  1489. static gboolean
  1490. rspamd_milter_process_milter_block (struct rspamd_milter_session *session,
  1491. const ucl_object_t *obj, struct rspamd_action *action)
  1492. {
  1493. const ucl_object_t *elt, *cur;
  1494. ucl_object_iter_t it;
  1495. struct rspamd_milter_private *priv = session->priv;
  1496. GString *hname, *hvalue;
  1497. if (obj && ucl_object_type (obj) == UCL_OBJECT) {
  1498. elt = ucl_object_lookup (obj, "remove_headers");
  1499. /*
  1500. * remove_headers: {"name": 1, ... }
  1501. * where number is the header's position starting from '1'
  1502. */
  1503. if (elt && ucl_object_type (elt) == UCL_OBJECT) {
  1504. it = NULL;
  1505. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1506. if (ucl_object_type (cur) == UCL_INT) {
  1507. rspamd_milter_remove_header_safe (session,
  1508. ucl_object_key (cur),
  1509. ucl_object_toint (cur));
  1510. }
  1511. }
  1512. }
  1513. elt = ucl_object_lookup (obj, "add_headers");
  1514. /*
  1515. * add_headers: {"name": "value", ... }
  1516. * name could have multiple values
  1517. * -or- (since 1.7)
  1518. * {"name": {"value": "val", "order": 0}, ... }
  1519. */
  1520. if (elt && ucl_object_type (elt) == UCL_OBJECT) {
  1521. it = NULL;
  1522. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1523. const char *key_name = ucl_object_key (cur);
  1524. if (ucl_object_type (cur) == UCL_STRING) {
  1525. /*
  1526. * Legacy support of {"name": "value", ... } with
  1527. * multiple names under the same name
  1528. */
  1529. ucl_object_iter_t *elt_it;
  1530. const ucl_object_t *cur_elt;
  1531. elt_it = ucl_object_iterate_new (cur);
  1532. while ((cur_elt = ucl_object_iterate_safe (elt_it, false)) != NULL) {
  1533. if (ucl_object_type (cur_elt) == UCL_STRING) {
  1534. hname = g_string_new (key_name);
  1535. hvalue = g_string_new (ucl_object_tostring (cur_elt));
  1536. rspamd_milter_send_action (session,
  1537. RSPAMD_MILTER_ADDHEADER,
  1538. hname, hvalue);
  1539. g_string_free (hname, TRUE);
  1540. g_string_free (hvalue, TRUE);
  1541. }
  1542. else {
  1543. msg_warn_milter("legacy header with name %s, that has not a string value: %s",
  1544. key_name, ucl_object_type_to_string(cur_elt->type));
  1545. }
  1546. }
  1547. ucl_object_iterate_free (elt_it);
  1548. }
  1549. else {
  1550. if (ucl_object_type (cur) == UCL_OBJECT) {
  1551. rspamd_milter_extract_single_header (session,
  1552. key_name, cur);
  1553. }
  1554. else if (ucl_object_type (cur) == UCL_ARRAY) {
  1555. /* Multiple values for the same key */
  1556. ucl_object_iter_t *array_it;
  1557. const ucl_object_t *array_elt;
  1558. array_it = ucl_object_iterate_new (cur);
  1559. while ((array_elt = ucl_object_iterate_safe (array_it,
  1560. true)) != NULL) {
  1561. rspamd_milter_extract_single_header (session,
  1562. key_name, array_elt);
  1563. }
  1564. ucl_object_iterate_free (array_it);
  1565. }
  1566. else {
  1567. msg_warn_milter("non-legacy header with name %s, that has unsupported value type: %s",
  1568. key_name, ucl_object_type_to_string(cur->type));
  1569. }
  1570. }
  1571. }
  1572. }
  1573. elt = ucl_object_lookup (obj, "change_from");
  1574. if (elt && ucl_object_type (elt) == UCL_STRING) {
  1575. hvalue = g_string_new (ucl_object_tostring (elt));
  1576. rspamd_milter_send_action (session,
  1577. RSPAMD_MILTER_CHGFROM,
  1578. hvalue);
  1579. g_string_free (hvalue, TRUE);
  1580. }
  1581. elt = ucl_object_lookup (obj, "add_rcpt");
  1582. if (elt && ucl_object_type (elt) == UCL_ARRAY) {
  1583. it = NULL;
  1584. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1585. hvalue = g_string_new (ucl_object_tostring (cur));
  1586. rspamd_milter_send_action (session,
  1587. RSPAMD_MILTER_ADDRCPT,
  1588. hvalue);
  1589. g_string_free (hvalue, TRUE);
  1590. }
  1591. }
  1592. elt = ucl_object_lookup (obj, "del_rcpt");
  1593. if (elt && ucl_object_type (elt) == UCL_ARRAY) {
  1594. it = NULL;
  1595. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1596. hvalue = g_string_new (ucl_object_tostring (cur));
  1597. rspamd_milter_send_action (session,
  1598. RSPAMD_MILTER_DELRCPT,
  1599. hvalue);
  1600. g_string_free (hvalue, TRUE);
  1601. }
  1602. }
  1603. elt = ucl_object_lookup (obj, "reject");
  1604. if (elt && ucl_object_type (elt) == UCL_STRING) {
  1605. if (strcmp (ucl_object_tostring (elt), "discard") == 0) {
  1606. priv->discard_on_reject = TRUE;
  1607. msg_info_milter ("discard message instead of rejection");
  1608. }
  1609. else if (strcmp (ucl_object_tostring (elt), "quarantine") == 0) {
  1610. priv->quarantine_on_reject = TRUE;
  1611. msg_info_milter ("quarantine message instead of rejection");
  1612. }
  1613. else {
  1614. priv->discard_on_reject = FALSE;
  1615. priv->quarantine_on_reject = FALSE;
  1616. }
  1617. }
  1618. elt = ucl_object_lookup (obj, "no_action");
  1619. if (elt && ucl_object_type (elt) == UCL_BOOLEAN) {
  1620. priv->no_action = ucl_object_toboolean (elt);
  1621. }
  1622. }
  1623. if (action->action_type == METRIC_ACTION_ADD_HEADER) {
  1624. elt = ucl_object_lookup (obj, "spam_header");
  1625. if (elt) {
  1626. if (ucl_object_type (elt) == UCL_STRING) {
  1627. rspamd_milter_remove_header_safe (session,
  1628. milter_ctx->spam_header,
  1629. 0);
  1630. hname = g_string_new (milter_ctx->spam_header);
  1631. hvalue = g_string_new (ucl_object_tostring (elt));
  1632. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1633. (guint32)1, hname, hvalue);
  1634. g_string_free (hname, TRUE);
  1635. g_string_free (hvalue, TRUE);
  1636. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1637. return TRUE;
  1638. }
  1639. else if (ucl_object_type (elt) == UCL_OBJECT) {
  1640. it = NULL;
  1641. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1642. rspamd_milter_remove_header_safe (session,
  1643. ucl_object_key (cur),
  1644. 0);
  1645. hname = g_string_new (ucl_object_key (cur));
  1646. hvalue = g_string_new (ucl_object_tostring (cur));
  1647. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1648. (guint32) 1, hname, hvalue);
  1649. g_string_free (hname, TRUE);
  1650. g_string_free (hvalue, TRUE);
  1651. }
  1652. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1653. return TRUE;
  1654. }
  1655. }
  1656. }
  1657. return FALSE;
  1658. }
  1659. void
  1660. rspamd_milter_send_task_results (struct rspamd_milter_session *session,
  1661. const ucl_object_t *results,
  1662. const gchar *new_body,
  1663. gsize bodylen)
  1664. {
  1665. const ucl_object_t *elt;
  1666. struct rspamd_milter_private *priv = session->priv;
  1667. const gchar *str_action;
  1668. struct rspamd_action *action;
  1669. rspamd_fstring_t *xcode = NULL, *rcode = NULL, *reply = NULL;
  1670. GString *hname, *hvalue;
  1671. gboolean processed = FALSE;
  1672. if (results == NULL) {
  1673. msg_err_milter ("cannot find scan results, tempfail");
  1674. rspamd_milter_send_action (session, RSPAMD_MILTER_TEMPFAIL);
  1675. goto cleanup;
  1676. }
  1677. elt = ucl_object_lookup (results, "action");
  1678. if (!elt) {
  1679. msg_err_milter ("cannot find action in results, tempfail");
  1680. rspamd_milter_send_action (session, RSPAMD_MILTER_TEMPFAIL);
  1681. goto cleanup;
  1682. }
  1683. str_action = ucl_object_tostring (elt);
  1684. action = rspamd_config_get_action (milter_ctx->cfg, str_action);
  1685. if (action == NULL) {
  1686. msg_err_milter ("action %s has not been registered", str_action);
  1687. rspamd_milter_send_action (session, RSPAMD_MILTER_TEMPFAIL);
  1688. goto cleanup;
  1689. }
  1690. elt = ucl_object_lookup (results, "messages");
  1691. if (elt) {
  1692. const ucl_object_t *smtp_res;
  1693. const gchar *msg;
  1694. gsize len = 0;
  1695. smtp_res = ucl_object_lookup (elt, "smtp_message");
  1696. if (smtp_res) {
  1697. msg = ucl_object_tolstring (smtp_res, &len);
  1698. reply = rspamd_fstring_new_init (msg, len);
  1699. }
  1700. }
  1701. /* Deal with milter headers */
  1702. elt = ucl_object_lookup (results, "milter");
  1703. if (elt) {
  1704. processed = rspamd_milter_process_milter_block (session, elt, action);
  1705. }
  1706. /* DKIM-Signature */
  1707. elt = ucl_object_lookup (results, "dkim-signature");
  1708. if (elt) {
  1709. hname = g_string_new (RSPAMD_MILTER_DKIM_HEADER);
  1710. if (ucl_object_type (elt) == UCL_STRING) {
  1711. hvalue = g_string_new (ucl_object_tostring (elt));
  1712. rspamd_milter_send_action (session, RSPAMD_MILTER_INSHEADER,
  1713. 1, hname, hvalue);
  1714. g_string_free (hvalue, TRUE);
  1715. }
  1716. else {
  1717. ucl_object_iter_t it;
  1718. const ucl_object_t *cur;
  1719. int i = 1;
  1720. it = ucl_object_iterate_new (elt);
  1721. while ((cur = ucl_object_iterate_safe (it, true)) != NULL) {
  1722. hvalue = g_string_new (ucl_object_tostring (cur));
  1723. rspamd_milter_send_action (session, RSPAMD_MILTER_INSHEADER,
  1724. i++, hname, hvalue);
  1725. g_string_free (hvalue, TRUE);
  1726. }
  1727. ucl_object_iterate_free (it);
  1728. }
  1729. g_string_free (hname, TRUE);
  1730. }
  1731. if (processed) {
  1732. goto cleanup;
  1733. }
  1734. if (new_body) {
  1735. rspamd_milter_send_action (session, RSPAMD_MILTER_REPLBODY,
  1736. bodylen, new_body);
  1737. }
  1738. if (priv->no_action) {
  1739. msg_info_milter ("do not apply action %s, no_action is set",
  1740. str_action);
  1741. hname = g_string_new (RSPAMD_MILTER_ACTION_HEADER);
  1742. hvalue = g_string_new (str_action);
  1743. rspamd_milter_send_action (session, RSPAMD_MILTER_ADDHEADER,
  1744. hname, hvalue);
  1745. g_string_free (hname, TRUE);
  1746. g_string_free (hvalue, TRUE);
  1747. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1748. goto cleanup;
  1749. }
  1750. switch (action->action_type) {
  1751. case METRIC_ACTION_REJECT:
  1752. if (priv->discard_on_reject) {
  1753. rspamd_milter_send_action (session, RSPAMD_MILTER_DISCARD);
  1754. }
  1755. else if (priv->quarantine_on_reject) {
  1756. /* TODO: be more flexible about SMTP messages */
  1757. rspamd_milter_send_action (session, RSPAMD_MILTER_QUARANTINE,
  1758. RSPAMD_MILTER_QUARANTINE_MESSAGE);
  1759. /* Quarantine also requires accept action, all hail Sendmail */
  1760. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1761. }
  1762. else {
  1763. rcode = rspamd_fstring_new_init (RSPAMD_MILTER_RCODE_REJECT,
  1764. sizeof (RSPAMD_MILTER_RCODE_REJECT) - 1);
  1765. xcode = rspamd_fstring_new_init (RSPAMD_MILTER_XCODE_REJECT,
  1766. sizeof (RSPAMD_MILTER_XCODE_REJECT) - 1);
  1767. if (!reply) {
  1768. if (milter_ctx->reject_message == NULL) {
  1769. reply = rspamd_fstring_new_init (
  1770. RSPAMD_MILTER_REJECT_MESSAGE,
  1771. sizeof (RSPAMD_MILTER_REJECT_MESSAGE) - 1);
  1772. }
  1773. else {
  1774. reply = rspamd_fstring_new_init (milter_ctx->reject_message,
  1775. strlen (milter_ctx->reject_message));
  1776. }
  1777. }
  1778. rspamd_milter_set_reply (session, rcode, xcode, reply);
  1779. }
  1780. break;
  1781. case METRIC_ACTION_SOFT_REJECT:
  1782. rcode = rspamd_fstring_new_init (RSPAMD_MILTER_RCODE_TEMPFAIL,
  1783. sizeof (RSPAMD_MILTER_RCODE_TEMPFAIL) - 1);
  1784. xcode = rspamd_fstring_new_init (RSPAMD_MILTER_XCODE_TEMPFAIL,
  1785. sizeof (RSPAMD_MILTER_XCODE_TEMPFAIL) - 1);
  1786. if (!reply) {
  1787. reply = rspamd_fstring_new_init (RSPAMD_MILTER_TEMPFAIL_MESSAGE,
  1788. sizeof (RSPAMD_MILTER_TEMPFAIL_MESSAGE) - 1);
  1789. }
  1790. rspamd_milter_set_reply (session, rcode, xcode, reply);
  1791. break;
  1792. case METRIC_ACTION_REWRITE_SUBJECT:
  1793. elt = ucl_object_lookup (results, "subject");
  1794. if (elt) {
  1795. hname = g_string_new ("Subject");
  1796. hvalue = g_string_new (ucl_object_tostring (elt));
  1797. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1798. (guint32)1, hname, hvalue);
  1799. g_string_free (hname, TRUE);
  1800. g_string_free (hvalue, TRUE);
  1801. }
  1802. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1803. break;
  1804. case METRIC_ACTION_ADD_HEADER:
  1805. /* Remove existing headers */
  1806. rspamd_milter_remove_header_safe (session,
  1807. milter_ctx->spam_header,
  1808. 0);
  1809. hname = g_string_new (milter_ctx->spam_header);
  1810. hvalue = g_string_new ("Yes");
  1811. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1812. (guint32)1, hname, hvalue);
  1813. g_string_free (hname, TRUE);
  1814. g_string_free (hvalue, TRUE);
  1815. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1816. break;
  1817. case METRIC_ACTION_QUARANTINE:
  1818. /* TODO: be more flexible about SMTP messages */
  1819. rspamd_milter_send_action (session, RSPAMD_MILTER_QUARANTINE,
  1820. RSPAMD_MILTER_QUARANTINE_MESSAGE);
  1821. /* Quarantine also requires accept action, all hail Sendmail */
  1822. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1823. break;
  1824. case METRIC_ACTION_DISCARD:
  1825. rspamd_milter_send_action (session, RSPAMD_MILTER_DISCARD);
  1826. break;
  1827. case METRIC_ACTION_GREYLIST:
  1828. case METRIC_ACTION_NOACTION:
  1829. default:
  1830. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1831. break;
  1832. }
  1833. cleanup:
  1834. rspamd_fstring_free (rcode);
  1835. rspamd_fstring_free (xcode);
  1836. rspamd_fstring_free (reply);
  1837. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ABORT);
  1838. }
  1839. void
  1840. rspamd_milter_init_library (const struct rspamd_milter_context *ctx)
  1841. {
  1842. milter_ctx = ctx;
  1843. }
  1844. rspamd_mempool_t *
  1845. rspamd_milter_get_session_pool (struct rspamd_milter_session *session)
  1846. {
  1847. struct rspamd_milter_private *priv = session->priv;
  1848. return priv->pool;
  1849. }