X-Git-Url: http://git.madism.org/?a=blobdiff_plain;f=postlicyd%2Fstrlist.c;h=9469ad07fdfe539be9660980a8b271466a6bb165;hb=e327d3786ba0371eaaff8e6ba0fe3fc39f095ae2;hp=c2704f1f6ad557c97ddda6a8e18282213fb8f5f3;hpb=f47b916bf7581b0070431eb70f43710e4c79fc98;p=apps%2Fpfixtools.git diff --git a/postlicyd/strlist.c b/postlicyd/strlist.c index c2704f1..9469ad0 100644 --- a/postlicyd/strlist.c +++ b/postlicyd/strlist.c @@ -37,6 +37,7 @@ #include "trie.h" #include "file.h" #include "str.h" +#include "rbl.h" #include "policy_tokens.h" typedef struct strlist_config_t { @@ -45,6 +46,10 @@ typedef struct strlist_config_t { A(bool) reverses; A(bool) partiales; + A(char) hosts; + A(int) host_offsets; + A(int) host_weights; + int soft_threshold; int hard_threshold; @@ -59,6 +64,15 @@ typedef struct strlist_config_t { unsigned match_reverse :1; } strlist_config_t; +typedef struct strlist_async_data_t { + A(rbl_result_t) results; + int awaited; + uint32_t sum; + bool error; +} strlist_async_data_t; + +static filter_type_t filter_type = FTK_UNKNOWN; + static strlist_config_t *strlist_config_new(void) { @@ -72,6 +86,9 @@ static void strlist_config_delete(strlist_config_t **config) array_wipe((*config)->weights); array_wipe((*config)->reverses); array_wipe((*config)->partiales); + array_wipe((*config)->hosts); + array_wipe((*config)->host_offsets); + array_wipe((*config)->host_weights); p_delete(config); } } @@ -277,7 +294,7 @@ static bool strlist_filter_constructor(filter_t *filter) lock = false; } else { PARSE_CHECK(false, "illegal locking state %.*s", - p - current, current); + (int)(p - current), current); } break; @@ -293,7 +310,7 @@ static bool strlist_filter_constructor(filter_t *filter) reverse = false; } else { PARSE_CHECK(false, "illegal character order value %.*s", - p - current, current); + (int)(p - current), current); } break; @@ -301,7 +318,7 @@ static bool strlist_filter_constructor(filter_t *filter) weight = strtol(current, &next, 10); PARSE_CHECK(next == p && weight >= 0 && weight <= 1024, "illegal weight value %.*s", - (p - current), current); + (int)(p - current), current); break; case 3: @@ -350,7 +367,7 @@ static bool strlist_filter_constructor(filter_t *filter) lock = false; } else { PARSE_CHECK(false, "illegal locking state %.*s", - p - current, current); + (int)(p - current), current); } break; @@ -358,7 +375,7 @@ static bool strlist_filter_constructor(filter_t *filter) weight = strtol(current, &next, 10); PARSE_CHECK(next == p && weight >= 0 && weight <= 1024, "illegal weight value %.*s", - (p - current), current); + (int)(p - current), current); break; case 2: @@ -387,6 +404,39 @@ static bool strlist_filter_constructor(filter_t *filter) } } break; + /* dns parameter. + * weight:hostname. + * define a RBL to use through DNS resolution. + */ + case ATK_DNS: { + int weight = 0; + const char *current = param->value; + const char *p = m_strchrnul(param->value, ':'); + char *next = NULL; + for (int i = 0 ; i < 2 ; ++i) { + PARSE_CHECK(i == 1 || *p, + "host parameter must contains a weight option"); + switch (i) { + case 0: + weight = strtol(current, &next, 10); + PARSE_CHECK(next == p && weight >= 0 && weight <= 1024, + "illegal weight value %.*s", + (int)(p - current), current); + break; + + case 1: + array_add(config->host_offsets, array_len(config->hosts)); + array_append(config->hosts, current, strlen(current) + 1); + array_add(config->host_weights, weight); + break; + } + if (i != 1) { + current = p + 1; + p = m_strchrnul(current, ':'); + } + } + } break; + /* hard_threshold parameter is an integer. * If the matching score is greater or equal than this threshold, * the hook "hard_match" is called. @@ -429,7 +479,7 @@ static bool strlist_filter_constructor(filter_t *filter) CASE(RECIPIENT, recipient, email); #undef CASE default: - PARSE_CHECK(false, "unknown field %.*s", p - current, current); + PARSE_CHECK(false, "unknown field %.*s", (int)(p - current), current); break; } if (!*p) { @@ -446,7 +496,7 @@ static bool strlist_filter_constructor(filter_t *filter) PARSE_CHECK(config->is_email != config->is_hostname, "matched field MUST be emails XOR hostnames"); - PARSE_CHECK(config->tries.len, + PARSE_CHECK(config->tries.len || config->host_offsets.len, "no file parameter in the filter %s", filter->name); filter->data = config; return true; @@ -459,12 +509,81 @@ static void strlist_filter_destructor(filter_t *filter) filter->data = config; } -static filter_result_t strlist_filter(const filter_t *filter, const query_t *query) +static void strlist_filter_async(rbl_result_t *result, void *arg) +{ + filter_context_t *context = arg; + const filter_t *filter = context->current_filter; + const strlist_config_t *data = filter->data; + strlist_async_data_t *async = context->contexts[filter_type]; + + if (*result != RBL_ERROR) { + async->error = false; + } + --async->awaited; + + debug("got asynchronous request result for filter %s, rbl %d, still awaiting %d answers", + filter->name, result - array_ptr(async->results, 0), async->awaited); + + if (async->awaited == 0) { + filter_result_t res = HTK_FAIL; + if (async->error) { + res = HTK_ERROR; + } else { + uint32_t j = 0; +#define DO_SUM(Field) \ + if (data->match_ ## Field) { \ + for (uint32_t i = 0 ; i < array_len(data->host_offsets) ; ++i) { \ + int weight = array_elt(data->host_weights, i); \ + \ + switch (array_elt(async->results, j)) { \ + case RBL_ASYNC: \ + crit("no more awaited answer but result is ASYNC"); \ + abort(); \ + case RBL_FOUND: \ + async->sum += weight; \ + break; \ + default: \ + break; \ + } \ + ++j; \ + } \ + } + DO_SUM(helo); + DO_SUM(client); + DO_SUM(reverse); + DO_SUM(recipient); + DO_SUM(sender); +#undef DO_SUM + debug("score is %d", async->sum); + if (async->sum >= (uint32_t)data->hard_threshold) { + res = HTK_HARD_MATCH; + } else if (async->sum >= (uint32_t)data->soft_threshold) { + res = HTK_SOFT_MATCH; + } + } + debug("answering to filter %s", filter->name); + filter_post_async_result(context, res); + } +} + + +static filter_result_t strlist_filter(const filter_t *filter, const query_t *query, + filter_context_t *context) { char reverse[BUFSIZ]; char normal[BUFSIZ]; const strlist_config_t *config = filter->data; - int sum = 0; + strlist_async_data_t *async = context->contexts[filter_type]; + int result_pos = 0; + async->sum = 0; + async->error = true; + array_ensure_exact_capacity(async->results, (config->match_client + + config->match_sender + config->match_helo + + config->match_recipient + config->match_reverse) + * array_len(config->host_offsets)); + async->awaited = 0; + + if (config->is_email && ((config->match_sender && query->state < SMTP_MAIL) || (config->match_recipient && query->state != SMTP_RCPT))) { @@ -487,52 +606,101 @@ static filter_result_t strlist_filter(const filter_t *filter, const query_t *que const bool part = array_elt(config->partiales, i); \ if ((!part && trie_lookup(trie, rev ? reverse : normal)) \ || (part && trie_prefix(trie, rev ? reverse : normal))) { \ - sum += weight; \ - if (sum >= config->hard_threshold) { \ + async->sum += weight; \ + if (async->sum >= (uint32_t)config->hard_threshold) { \ return HTK_HARD_MATCH; \ } \ } \ + async->error = false; \ + } \ + } +#define DNS(Flag, Field) \ + if (config->match_ ## Flag) { \ + const int len = m_strlen(query->Field); \ + strlist_copy(normal, query->Field, len, false); \ + for (uint32_t i = 0 ; len > 0 && i < config->host_offsets.len ; ++i) { \ + const char *rbl = array_ptr(config->hosts, \ + array_elt(config->host_offsets, i)); \ + debug("running check of field %s (%s) against %s", STR(Field), \ + normal, rbl); \ + if (rhbl_check(rbl, normal, array_ptr(async->results, result_pos), \ + strlist_filter_async, context)) { \ + async->error = false; \ + ++async->awaited; \ + } \ + ++result_pos; \ } \ } + if (config->is_email) { LOOKUP(sender, sender); LOOKUP(recipient, recipient); + DNS(sender, sender); + DNS(recipient, recipient); } else if (config->is_hostname) { LOOKUP(helo, helo_name); LOOKUP(client, client_name); LOOKUP(reverse, reverse_client_name); LOOKUP(recipient, recipient_domain); LOOKUP(sender, sender_domain); + DNS(helo, helo_name); + DNS(client, client_name); + DNS(reverse, reverse_client_name); + DNS(recipient, recipient_domain); + DNS(sender, sender_domain); } +#undef DNS #undef LOOKUP - if (sum >= config->hard_threshold) { + if (async->awaited > 0) { + return HTK_ASYNC; + } + if (async->error) { + err("filter %s: all the rbls returned an error", filter->name); + return HTK_ERROR; + } + if (async->sum >= (uint32_t)config->hard_threshold) { return HTK_HARD_MATCH; - } else if (sum >= config->soft_threshold) { + } else if (async->sum >= (uint32_t)config->soft_threshold) { return HTK_SOFT_MATCH; } else { return HTK_FAIL; } } +static void *strlist_context_constructor(void) +{ + return p_new(strlist_async_data_t, 1); +} + +static void strlist_context_destructor(void *data) +{ + strlist_async_data_t *ctx = data; + array_wipe(ctx->results); + p_delete(&ctx); +} + static int strlist_init(void) { - filter_type_t type = filter_register("strlist", strlist_filter_constructor, - strlist_filter_destructor, strlist_filter); + filter_type = filter_register("strlist", strlist_filter_constructor, + strlist_filter_destructor, strlist_filter, + strlist_context_constructor, + strlist_context_destructor); /* Hooks. */ - (void)filter_hook_register(type, "abort"); - (void)filter_hook_register(type, "error"); - (void)filter_hook_register(type, "fail"); - (void)filter_hook_register(type, "hard_match"); - (void)filter_hook_register(type, "soft_match"); + (void)filter_hook_register(filter_type, "abort"); + (void)filter_hook_register(filter_type, "error"); + (void)filter_hook_register(filter_type, "fail"); + (void)filter_hook_register(filter_type, "hard_match"); + (void)filter_hook_register(filter_type, "soft_match"); /* Parameters. */ - (void)filter_param_register(type, "file"); - (void)filter_param_register(type, "rbldns"); - (void)filter_param_register(type, "hard_threshold"); - (void)filter_param_register(type, "soft_threshold"); - (void)filter_param_register(type, "fields"); + (void)filter_param_register(filter_type, "file"); + (void)filter_param_register(filter_type, "rbldns"); + (void)filter_param_register(filter_type, "dns"); + (void)filter_param_register(filter_type, "hard_threshold"); + (void)filter_param_register(filter_type, "soft_threshold"); + (void)filter_param_register(filter_type, "fields"); return 0; } module_init(strlist_init);