mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2025-04-05 00:27:25 +00:00
Fix issue where a postfix/submission connection using TLS on port 465 would be reported as "insecure"
This commit is contained in:
parent
fd2ff00a6e
commit
82e203b3ec
@ -24,6 +24,9 @@ mta_conn_fields = [
|
|||||||
'remote_auth_success',
|
'remote_auth_success',
|
||||||
'remote_auth_attempts',
|
'remote_auth_attempts',
|
||||||
'remote_used_starttls',
|
'remote_used_starttls',
|
||||||
|
'remote_used_tls',
|
||||||
|
'tls_version',
|
||||||
|
'tls_cipher',
|
||||||
'disposition',
|
'disposition',
|
||||||
]
|
]
|
||||||
|
|
||||||
@ -207,6 +210,15 @@ schema_updates = [
|
|||||||
"UPDATE db_info SET value='2' WHERE key='schema_version'"
|
"UPDATE db_info SET value='2' WHERE key='schema_version'"
|
||||||
],
|
],
|
||||||
|
|
||||||
|
# update 3
|
||||||
|
[
|
||||||
|
"ALTER TABLE mta_connection ADD COLUMN remote_used_tls INTEGER DEFAULT 0",
|
||||||
|
"ALTER TABLE mta_connection ADD COLUMN tls_version TEXT DEFAULT NULL COLLATE NOCASE",
|
||||||
|
"ALTER TABLE mta_connection ADD COLUMN tls_cipher TEXT DEFAULT NULL COLLATE NOCASE",
|
||||||
|
|
||||||
|
"UPDATE db_info SET value='3' WHERE key='schema_version'"
|
||||||
|
],
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
@ -530,5 +530,6 @@ class DovecotLogHandler(CommonHandler):
|
|||||||
self.store(match['imap_conn'])
|
self.store(match['imap_conn'])
|
||||||
return
|
return
|
||||||
|
|
||||||
self.log_match('IGNORED', None, line)
|
if 'imap' in line:
|
||||||
|
self.log_match('IGNORED', None, line)
|
||||||
|
|
||||||
|
@ -131,6 +131,12 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
# 2=message_id
|
# 2=message_id
|
||||||
self.re_postfix_message_id = re.compile('postfix/cleanup\[\d+\]: ([A-F0-9]+): message-id=(<[^>]*>)')
|
self.re_postfix_message_id = re.compile('postfix/cleanup\[\d+\]: ([A-F0-9]+): message-id=(<[^>]*>)')
|
||||||
|
|
||||||
|
# 5a. Feb 8 08:25:37 mail postfix/cleanup[6908]: 74D901FB74: replace: header Received: from [IPv6:::1] (unknown [IPv6:xxx])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost. from unknown[x:x:x:x:x]; from=<user@tld> to=<user@tld> proto=ESMTP helo=<[IPv6:::1]>: Received: from authenticated-user (myhost.com [a.b.c.d])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost.com (Postfix) with ESMTPSA id 34E902FB74??for <user@tld>; Tue, 8 Feb 2022 08:25:37 -0500 (GMT)
|
||||||
|
# 1=postfix_msg_id
|
||||||
|
# 2=tls version (eg "1.3")
|
||||||
|
# 3=tls cipher (eg "TLS_AES_128_GCM_SHA256")
|
||||||
|
self.re_postfix_tls = re.compile('postfix/cleanup\[\d+\]: ([A-F0-9]+): replace: header Received: [^;]*\(using (TLSv[^ ]*) with cipher ([^ ]*)')
|
||||||
|
|
||||||
# 6. opendkim: POSTFIX-MSG-ID: <result>
|
# 6. opendkim: POSTFIX-MSG-ID: <result>
|
||||||
# Dec 6 08:21:33 mail opendkim[6267]: DD95A1F796: s=pf2014 d=github.com SSL
|
# Dec 6 08:21:33 mail opendkim[6267]: DD95A1F796: s=pf2014 d=github.com SSL
|
||||||
# SSL:
|
# SSL:
|
||||||
@ -535,7 +541,8 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
"service": "smtpd" if m.group(2)=="smtpd" else "submission",
|
"service": "smtpd" if m.group(2)=="smtpd" else "submission",
|
||||||
"service_tid": m.group(3),
|
"service_tid": m.group(3),
|
||||||
"remote_host": m.group(4),
|
"remote_host": m.group(4),
|
||||||
"remote_ip": m.group(5)
|
"remote_ip": m.group(5),
|
||||||
|
'remote_used_tls': 0,
|
||||||
}
|
}
|
||||||
self.add_new_connection(mta_conn)
|
self.add_new_connection(mta_conn)
|
||||||
return { 'mta_conn': mta_conn }
|
return { 'mta_conn': mta_conn }
|
||||||
@ -844,6 +851,22 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def match_postfix_tls(self, line):
|
||||||
|
# 5a. Feb 8 08:25:37 mail postfix/cleanup[6908]: 74D901FB74: replace: header Received: from [IPv6:::1] (unknown [IPv6:xxx])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost. from unknown[x:x:x:x:x]; from=<user@tld> to=<user@tld> proto=ESMTP helo=<[IPv6:::1]>: Received: from authenticated-user (myhost.com [a.b.c.d])??(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))??(No client certificate requested)??by myhost.com (Postfix) with ESMTPSA id 34E902FB74??for <user@tld>; Tue, 8 Feb 2022 08:25:37 -0500 (GMT)
|
||||||
|
m = self.re_postfix_tls.search(line)
|
||||||
|
if m:
|
||||||
|
postfix_msg_id = m.group(1)
|
||||||
|
v = {
|
||||||
|
'remote_used_tls': 1,
|
||||||
|
'tls_version': m.group(2),
|
||||||
|
'tls_cipher': m.group(3)
|
||||||
|
}
|
||||||
|
mta_conn, mta_accept = self.find_by_postfix_msg_id(postfix_msg_id)
|
||||||
|
if mta_conn and 'tls_version' not in mta_conn:
|
||||||
|
mta_conn.update(v)
|
||||||
|
return { 'mta_conn':mta_conn, 'mta_accept':mta_accept }
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
def match_opendkim(self, line):
|
def match_opendkim(self, line):
|
||||||
# 1=postfix_msg_id
|
# 1=postfix_msg_id
|
||||||
@ -1231,6 +1254,7 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
'disposition': 'reject'
|
'disposition': 'reject'
|
||||||
})
|
})
|
||||||
elif mta_conn.get('remote_used_starttls',0)==0 and \
|
elif mta_conn.get('remote_used_starttls',0)==0 and \
|
||||||
|
mta_conn.get('remote_used_tls',0)==0 and \
|
||||||
mta_conn.get('remote_ip') != '127.0.0.1':
|
mta_conn.get('remote_ip') != '127.0.0.1':
|
||||||
mta_conn.update({
|
mta_conn.update({
|
||||||
'disposition': 'insecure'
|
'disposition': 'insecure'
|
||||||
@ -1349,6 +1373,11 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
self.log_match('message_id', match, line)
|
self.log_match('message_id', match, line)
|
||||||
return
|
return
|
||||||
|
|
||||||
|
match = self.match_postfix_tls(line)
|
||||||
|
if match:
|
||||||
|
self.log_match('tls', match, line)
|
||||||
|
return
|
||||||
|
|
||||||
match = self.match_opendkim(line)
|
match = self.match_opendkim(line)
|
||||||
if match:
|
if match:
|
||||||
self.log_match('opendkim', match, line)
|
self.log_match('opendkim', match, line)
|
||||||
@ -1395,6 +1424,7 @@ class PostfixLogHandler(CommonHandler):
|
|||||||
self.store(match['mta_conn'])
|
self.store(match['mta_conn'])
|
||||||
return
|
return
|
||||||
|
|
||||||
self.log_match('IGNORED', None, line)
|
if 'postfix' in line:
|
||||||
|
self.log_match('IGNORED', None, line)
|
||||||
|
|
||||||
|
|
||||||
|
@ -8,6 +8,7 @@ log="./mail.log"
|
|||||||
pos="./pos.json"
|
pos="./pos.json"
|
||||||
sqlite="./capture.sqlite"
|
sqlite="./capture.sqlite"
|
||||||
config="./config.json"
|
config="./config.json"
|
||||||
|
loglevel="debug" #debug | info
|
||||||
|
|
||||||
if [ -e "./debug.log" ]; then
|
if [ -e "./debug.log" ]; then
|
||||||
log="./debug.log"
|
log="./debug.log"
|
||||||
@ -31,4 +32,5 @@ fi
|
|||||||
|
|
||||||
echo "USING LOG: $log"
|
echo "USING LOG: $log"
|
||||||
echo "DB: $sqlite"
|
echo "DB: $sqlite"
|
||||||
python3 ../capture.py -d -loglevel info $@ -logfile "$log" -posfile "$pos" -sqlitefile "$sqlite" -config "$config"
|
echo "LOGLEVEL: $loglevel"
|
||||||
|
python3 ../capture.py -d -loglevel $loglevel $@ -logfile "$log" -posfile "$pos" -sqlitefile "$sqlite" -config "$config"
|
||||||
|
Loading…
Reference in New Issue
Block a user