mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2025-04-04 00:17:06 +00:00
Fix issue where a postfix/submission connection using TLS on port 465 would be reported as "insecure"
This commit is contained in:
parent
fd2ff00a6e
commit
82e203b3ec
@ -24,6 +24,9 @@ mta_conn_fields = [
|
||||
'remote_auth_success',
|
||||
'remote_auth_attempts',
|
||||
'remote_used_starttls',
|
||||
'remote_used_tls',
|
||||
'tls_version',
|
||||
'tls_cipher',
|
||||
'disposition',
|
||||
]
|
||||
|
||||
@ -207,6 +210,15 @@ schema_updates = [
|
||||
"UPDATE db_info SET value='2' WHERE key='schema_version'"
|
||||
],
|
||||
|
||||
# update 3
|
||||
[
|
||||
"ALTER TABLE mta_connection ADD COLUMN remote_used_tls INTEGER DEFAULT 0",
|
||||
"ALTER TABLE mta_connection ADD COLUMN tls_version TEXT DEFAULT NULL COLLATE NOCASE",
|
||||
"ALTER TABLE mta_connection ADD COLUMN tls_cipher TEXT DEFAULT NULL COLLATE NOCASE",
|
||||
|
||||
"UPDATE db_info SET value='3' WHERE key='schema_version'"
|
||||
],
|
||||
|
||||
]
|
||||
|
||||
|
||||
|
@ -530,5 +530,6 @@ class DovecotLogHandler(CommonHandler):
|
||||
self.store(match['imap_conn'])
|
||||
return
|
||||
|
||||
self.log_match('IGNORED', None, line)
|
||||
if 'imap' in line:
|
||||
self.log_match('IGNORED', None, line)
|
||||
|
||||
|
@ -131,6 +131,12 @@ class PostfixLogHandler(CommonHandler):
|
||||
# 2=message_id
|
||||
self.re_postfix_message_id = re.compile('postfix/cleanup\[\d+\]: ([A-F0-9]+): message-id=(<[^>]*>)')
|
||||
|
||||
# 5a. Feb 8 08:25:37 mail postfix/cleanup[6908]: 74D901FB74: replace: header Received: from [IPv6:::1] (unknown [IPv6:xxx])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost. from unknown[x:x:x:x:x]; from=<user@tld> to=<user@tld> proto=ESMTP helo=<[IPv6:::1]>: Received: from authenticated-user (myhost.com [a.b.c.d])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost.com (Postfix) with ESMTPSA id 34E902FB74??for <user@tld>; Tue, 8 Feb 2022 08:25:37 -0500 (GMT)
|
||||
# 1=postfix_msg_id
|
||||
# 2=tls version (eg "1.3")
|
||||
# 3=tls cipher (eg "TLS_AES_128_GCM_SHA256")
|
||||
self.re_postfix_tls = re.compile('postfix/cleanup\[\d+\]: ([A-F0-9]+): replace: header Received: [^;]*\(using (TLSv[^ ]*) with cipher ([^ ]*)')
|
||||
|
||||
# 6. opendkim: POSTFIX-MSG-ID: <result>
|
||||
# Dec 6 08:21:33 mail opendkim[6267]: DD95A1F796: s=pf2014 d=github.com SSL
|
||||
# SSL:
|
||||
@ -535,7 +541,8 @@ class PostfixLogHandler(CommonHandler):
|
||||
"service": "smtpd" if m.group(2)=="smtpd" else "submission",
|
||||
"service_tid": m.group(3),
|
||||
"remote_host": m.group(4),
|
||||
"remote_ip": m.group(5)
|
||||
"remote_ip": m.group(5),
|
||||
'remote_used_tls': 0,
|
||||
}
|
||||
self.add_new_connection(mta_conn)
|
||||
return { 'mta_conn': mta_conn }
|
||||
@ -843,6 +850,22 @@ class PostfixLogHandler(CommonHandler):
|
||||
return { 'mta_conn':mta_conn, 'mta_accept':mta_accept }
|
||||
return True
|
||||
|
||||
|
||||
def match_postfix_tls(self, line):
|
||||
# 5a. Feb 8 08:25:37 mail postfix/cleanup[6908]: 74D901FB74: replace: header Received: from [IPv6:::1] (unknown [IPv6:xxx])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost. from unknown[x:x:x:x:x]; from=<user@tld> to=<user@tld> proto=ESMTP helo=<[IPv6:::1]>: Received: from authenticated-user (myhost.com [a.b.c.d])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost.com (Postfix) with ESMTPSA id 34E902FB74??for <user@tld>; Tue, 8 Feb 2022 08:25:37 -0500 (GMT)
|
||||
m = self.re_postfix_tls.search(line)
|
||||
if m:
|
||||
postfix_msg_id = m.group(1)
|
||||
v = {
|
||||
'remote_used_tls': 1,
|
||||
'tls_version': m.group(2),
|
||||
'tls_cipher': m.group(3)
|
||||
}
|
||||
mta_conn, mta_accept = self.find_by_postfix_msg_id(postfix_msg_id)
|
||||
if mta_conn and 'tls_version' not in mta_conn:
|
||||
mta_conn.update(v)
|
||||
return { 'mta_conn':mta_conn, 'mta_accept':mta_accept }
|
||||
return True
|
||||
|
||||
|
||||
def match_opendkim(self, line):
|
||||
@ -1231,6 +1254,7 @@ class PostfixLogHandler(CommonHandler):
|
||||
'disposition': 'reject'
|
||||
})
|
||||
elif mta_conn.get('remote_used_starttls',0)==0 and \
|
||||
mta_conn.get('remote_used_tls',0)==0 and \
|
||||
mta_conn.get('remote_ip') != '127.0.0.1':
|
||||
mta_conn.update({
|
||||
'disposition': 'insecure'
|
||||
@ -1349,6 +1373,11 @@ class PostfixLogHandler(CommonHandler):
|
||||
self.log_match('message_id', match, line)
|
||||
return
|
||||
|
||||
match = self.match_postfix_tls(line)
|
||||
if match:
|
||||
self.log_match('tls', match, line)
|
||||
return
|
||||
|
||||
match = self.match_opendkim(line)
|
||||
if match:
|
||||
self.log_match('opendkim', match, line)
|
||||
@ -1394,7 +1423,8 @@ class PostfixLogHandler(CommonHandler):
|
||||
# we're done - not queued and disconnected ... save it
|
||||
self.store(match['mta_conn'])
|
||||
return
|
||||
|
||||
self.log_match('IGNORED', None, line)
|
||||
|
||||
if 'postfix' in line:
|
||||
self.log_match('IGNORED', None, line)
|
||||
|
||||
|
||||
|
@ -8,6 +8,7 @@ log="./mail.log"
|
||||
pos="./pos.json"
|
||||
sqlite="./capture.sqlite"
|
||||
config="./config.json"
|
||||
loglevel="debug" #debug | info
|
||||
|
||||
if [ -e "./debug.log" ]; then
|
||||
log="./debug.log"
|
||||
@ -31,4 +32,5 @@ fi
|
||||
|
||||
echo "USING LOG: $log"
|
||||
echo "DB: $sqlite"
|
||||
python3 ../capture.py -d -loglevel info $@ -logfile "$log" -posfile "$pos" -sqlitefile "$sqlite" -config "$config"
|
||||
echo "LOGLEVEL: $loglevel"
|
||||
python3 ../capture.py -d -loglevel $loglevel $@ -logfile "$log" -posfile "$pos" -sqlitefile "$sqlite" -config "$config"
|
||||
|
Loading…
Reference in New Issue
Block a user