Blob


1 /*
2 * Copyright (c) 2019 Martijn van Duren <martijn@openbsd.org>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16 #include <sys/types.h>
17 #include <sys/socket.h>
19 #include <arpa/inet.h>
20 #include <errno.h>
21 #include <event.h>
22 #include <inttypes.h>
23 #include <netdb.h>
24 #include <stdlib.h>
25 #include <stdarg.h>
26 #include <stdio.h>
27 #include <string.h>
28 #include <syslog.h>
29 #include <unistd.h>
30 #include <asr.h>
32 #include "opensmtpd.h"
34 struct dnsbl_session;
36 struct dnsbl_query {
37 struct event_asr *event;
38 int running;
39 int blacklist;
40 struct dnsbl_session *session;
41 };
43 struct dnsbl_session {
44 int listed;
45 int set_header;
46 int logged_mark;
47 struct dnsbl_query *query;
48 struct osmtpd_ctx *ctx;
49 };
51 static const char **blacklists = NULL;
52 static const char **printblacklists;
53 static size_t nblacklists = 0;
54 static int markspam = 0;
55 static int verbose = 0;
57 const char *dnsbl_printblacklist(const char *);
58 void dnsbl_connect(struct osmtpd_ctx *, const char *,
59 struct sockaddr_storage *);
60 void dnsbl_begin(struct osmtpd_ctx *, uint32_t);
61 void dnsbl_dataline(struct osmtpd_ctx *, const char *);
62 void dnsbl_resolve(struct asr_result *, void *);
63 void dnsbl_session_query_done(struct dnsbl_session *);
64 void *dnsbl_session_new(struct osmtpd_ctx *);
65 void dnsbl_session_free(struct osmtpd_ctx *, void *);
66 void usage(void);
68 int
69 main(int argc, char *argv[])
70 {
71 int ch;
72 size_t i;
74 while ((ch = getopt(argc, argv, "mv")) != -1) {
75 switch (ch) {
76 case 'm':
77 markspam = 1;
78 break;
79 case 'v':
80 verbose = 1;
81 break;
82 default:
83 usage();
84 }
85 }
87 if (pledge("stdio dns", NULL) == -1)
88 osmtpd_err(1, "pledge");
90 if ((nblacklists = argc - optind) == 0)
91 osmtpd_errx(1, "No blacklist specified");
93 blacklists = calloc(nblacklists, sizeof(*blacklists));
94 printblacklists = calloc(nblacklists, sizeof(*printblacklists));
95 if (printblacklists == NULL || blacklists == NULL)
96 osmtpd_err(1, "malloc");
97 for (i = 0; i < nblacklists; i++) {
98 blacklists[i] = argv[optind + i];
99 printblacklists[i] = dnsbl_printblacklist(argv[optind + i]);
102 osmtpd_register_filter_connect(dnsbl_connect);
103 osmtpd_local_session(dnsbl_session_new, dnsbl_session_free);
104 if (markspam) {
105 osmtpd_register_report_begin(1, dnsbl_begin);
106 osmtpd_register_filter_dataline(dnsbl_dataline);
108 osmtpd_run();
110 return 0;
113 const char *
114 dnsbl_printblacklist(const char *blacklist)
116 /* All of abusix is paid and has a key in the first spot */
117 if (strcasestr(blacklist, ".mail.abusix.zone") != NULL)
118 return strchr(blacklist, '.') + 1;
119 /* XXX assume dq.spamhaus.net is paid and has a key in the first spot */
120 if (strcasestr(blacklist, ".dq.spamhaus.net") != NULL)
121 return strchr(blacklist, '.') + 1;
122 return blacklist;
125 void
126 dnsbl_connect(struct osmtpd_ctx *ctx, const char *hostname,
127 struct sockaddr_storage *ss)
129 struct dnsbl_session *session = ctx->local_session;
130 struct asr_query *aq;
131 char query[255];
132 u_char *addr;
133 size_t i;
135 if (ss->ss_family == AF_INET)
136 addr = (u_char *)(&(((struct sockaddr_in *)ss)->sin_addr));
137 else
138 addr = (u_char *)(&(((struct sockaddr_in6 *)ss)->sin6_addr));
139 for (i = 0; i < nblacklists; i++) {
140 if (ss->ss_family == AF_INET) {
141 if (snprintf(query, sizeof(query), "%u.%u.%u.%u.%s",
142 addr[3], addr[2], addr[1], addr[0],
143 blacklists[i]) >= (int) sizeof(query))
144 osmtpd_errx(1,
145 "Can't create query, domain too long");
146 } else if (ss->ss_family == AF_INET6) {
147 if (snprintf(query, sizeof(query), "%hhx.%hhx.%hhx.%hhx"
148 ".%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx"
149 ".%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx"
150 ".%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%hhx.%s",
151 (u_char) (addr[15] & 0xf), (u_char) (addr[15] >> 4),
152 (u_char) (addr[14] & 0xf), (u_char) (addr[14] >> 4),
153 (u_char) (addr[13] & 0xf), (u_char) (addr[13] >> 4),
154 (u_char) (addr[12] & 0xf), (u_char) (addr[12] >> 4),
155 (u_char) (addr[11] & 0xf), (u_char) (addr[11] >> 4),
156 (u_char) (addr[10] & 0xf), (u_char) (addr[10] >> 4),
157 (u_char) (addr[9] & 0xf), (u_char) (addr[9] >> 4),
158 (u_char) (addr[8] & 0xf), (u_char) (addr[8] >> 4),
159 (u_char) (addr[7] & 0xf), (u_char) (addr[8] >> 4),
160 (u_char) (addr[6] & 0xf), (u_char) (addr[7] >> 4),
161 (u_char) (addr[5] & 0xf), (u_char) (addr[5] >> 4),
162 (u_char) (addr[4] & 0xf), (u_char) (addr[4] >> 4),
163 (u_char) (addr[3] & 0xf), (u_char) (addr[3] >> 4),
164 (u_char) (addr[2] & 0xf), (u_char) (addr[2] >> 4),
165 (u_char) (addr[1] & 0xf), (u_char) (addr[1] >> 4),
166 (u_char) (addr[0] & 0xf), (u_char) (addr[0] >> 4),
167 blacklists[i]) >= (int) sizeof(query))
168 osmtpd_errx(1,
169 "Can't create query, domain too long");
170 } else
171 osmtpd_errx(1, "Invalid address family received");
173 aq = gethostbyname_async(query, NULL);
174 session->query[i].event = event_asr_run(aq, dnsbl_resolve,
175 &(session->query[i]));
176 session->query[i].blacklist = i;
177 session->query[i].session = session;
178 session->query[i].running = 1;
182 void
183 dnsbl_resolve(struct asr_result *result, void *arg)
185 struct dnsbl_query *query = arg;
186 struct dnsbl_session *session = query->session;
187 size_t i;
189 query->running = 0;
190 query->event = NULL;
191 if (result->ar_hostent != NULL) {
192 if (!markspam) {
193 osmtpd_filter_disconnect(session->ctx, "Listed at %s",
194 printblacklists[query->blacklist]);
195 fprintf(stderr, "%016"PRIx64" listed at %s: rejected\n",
196 session->ctx->reqid,
197 printblacklists[query->blacklist]);
198 } else {
199 session->listed = query->blacklist;
200 osmtpd_filter_proceed(session->ctx);
201 /* Delay logging until we have a message */
203 dnsbl_session_query_done(session);
204 return;
206 if (result->ar_h_errno != HOST_NOT_FOUND) {
207 osmtpd_filter_disconnect(session->ctx, "DNS error on %s",
208 printblacklists[query->blacklist]);
209 dnsbl_session_query_done(session);
210 return;
213 for (i = 0; i < nblacklists; i++) {
214 if (session->query[i].running)
215 return;
217 osmtpd_filter_proceed(session->ctx);
218 if (verbose)
219 fprintf(stderr, "%016"PRIx64" not listed\n",
220 session->ctx->reqid);
223 void
224 dnsbl_begin(struct osmtpd_ctx *ctx, uint32_t msgid)
226 struct dnsbl_session *session = ctx->local_session;
228 if (session->listed != -1) {
229 if (!session->logged_mark) {
230 fprintf(stderr, "%016"PRIx64" listed at %s: Marking as "
231 "spam\n", ctx->reqid,
232 printblacklists[session->listed]);
233 session->logged_mark = 1;
235 session->set_header = 1;
239 void
240 dnsbl_dataline(struct osmtpd_ctx *ctx, const char *line)
242 struct dnsbl_session *session = ctx->local_session;
244 if (session->set_header) {
245 osmtpd_filter_dataline(ctx, "X-Spam: yes");
246 osmtpd_filter_dataline(ctx, "X-Spam-DNSBL: Listed at %s",
247 printblacklists[session->listed]);
248 session->set_header = 0;
251 osmtpd_filter_dataline(ctx, "%s", line);
254 void
255 dnsbl_session_query_done(struct dnsbl_session *session)
257 size_t i;
259 for (i = 0; i < nblacklists; i++) {
260 if (session->query[i].running) {
261 event_asr_abort(session->query[i].event);
262 session->query[i].running = 0;
267 void *
268 dnsbl_session_new(struct osmtpd_ctx *ctx)
270 struct dnsbl_session *session;
272 if ((session = calloc(1, sizeof(*session))) == NULL)
273 osmtpd_err(1, "malloc");
274 if ((session->query = calloc(nblacklists, sizeof(*(session->query))))
275 == NULL)
276 osmtpd_err(1, "malloc");
277 session->listed = -1;
278 session->set_header = 0;
279 session->logged_mark = 0;
280 session->ctx = ctx;
282 return session;
285 void
286 dnsbl_session_free(struct osmtpd_ctx *ctx, void *data)
288 struct dnsbl_session *session = data;
290 dnsbl_session_query_done(session);
291 free(session->query);
292 free(session);
295 __dead void
296 usage(void)
298 fprintf(stderr, "usage: filter-dnsbl [-m] blacklist [...]\n");
299 exit(1);