2019-12-18 14:25:09 +01:00
|
|
|
import time
|
|
|
|
import sys
|
|
|
|
import logging
|
|
|
|
|
|
|
|
import Milter
|
|
|
|
|
2019-12-18 15:12:33 +01:00
|
|
|
import re
|
|
|
|
|
2019-12-18 14:25:09 +01:00
|
|
|
# Basic logger that also logs to stdout
|
|
|
|
# TODO: Improve this a lot.
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
logger.setLevel(logging.DEBUG)
|
|
|
|
|
|
|
|
handler = logging.StreamHandler(sys.stdout)
|
|
|
|
handler.setLevel(logging.DEBUG)
|
2019-12-18 15:35:23 +01:00
|
|
|
formatter = logging.Formatter('%(asctime)s - %(levelname)s - %(message)s')
|
2019-12-18 14:25:09 +01:00
|
|
|
handler.setFormatter(formatter)
|
|
|
|
|
|
|
|
logger.addHandler(handler)
|
|
|
|
|
2019-12-18 16:33:54 +01:00
|
|
|
split_from_regex = re.compile('(?P<from_label>.*)<(?P<from_address>.*)>$')
|
2019-12-18 15:35:23 +01:00
|
|
|
address_domain_regex = re.compile('.*@(?P<domain>[\.\w-]+)')
|
|
|
|
|
2019-12-18 15:12:33 +01:00
|
|
|
|
2019-12-18 16:41:55 +01:00
|
|
|
def normalizeRawFromHeader(value):
|
|
|
|
return value.replace('\n', '').replace('\r', '').strip()
|
|
|
|
|
|
|
|
|
2019-12-18 16:33:54 +01:00
|
|
|
def parseFromHeader(value):
|
2019-12-18 16:41:55 +01:00
|
|
|
"""Split 'From:'-header into label and address values."""
|
2019-12-18 15:12:33 +01:00
|
|
|
match = split_from_regex.match(value)
|
2019-12-18 16:43:59 +01:00
|
|
|
if match is None:
|
|
|
|
return None
|
2019-12-18 16:33:54 +01:00
|
|
|
result = {
|
2019-12-18 15:12:33 +01:00
|
|
|
'label': match.group('from_label').strip(),
|
|
|
|
'address': match.group('from_address').strip()
|
|
|
|
}
|
2019-12-18 16:33:54 +01:00
|
|
|
result['label_domain'] = getDomainFromLabel(result['label'])
|
|
|
|
result['address_domain'] = getDomainFromAddress(result['address'])
|
|
|
|
return result
|
2019-12-18 15:35:23 +01:00
|
|
|
|
|
|
|
|
2019-12-18 16:33:54 +01:00
|
|
|
def getDomainFromLabel(label):
|
2019-12-18 15:35:23 +01:00
|
|
|
""" Check whether given 'From:' header label contains something that looks like an email address."""
|
2019-12-18 16:33:54 +01:00
|
|
|
match = address_domain_regex.match(label)
|
|
|
|
return match.group('domain').strip() if match is not None else None
|
2019-12-18 15:35:23 +01:00
|
|
|
|
|
|
|
|
2019-12-18 16:33:54 +01:00
|
|
|
def getDomainFromAddress(address):
|
|
|
|
match = address_domain_regex.match(address)
|
|
|
|
return match.group('domain').strip() if match is not None else None
|
2019-12-18 15:35:23 +01:00
|
|
|
|
2019-12-18 15:12:33 +01:00
|
|
|
|
2019-12-18 14:25:09 +01:00
|
|
|
class SuspiciousFrom(Milter.Base):
|
|
|
|
def __init__(self):
|
|
|
|
self.id = Milter.uniqueID()
|
2019-12-18 16:33:54 +01:00
|
|
|
self.reset()
|
2019-12-18 16:43:59 +01:00
|
|
|
logger.debug(f"({self.id}) Instanciated.")
|
2019-12-18 16:33:54 +01:00
|
|
|
|
|
|
|
def reset(self):
|
2019-12-18 15:35:23 +01:00
|
|
|
self.final_result = Milter.ACCEPT
|
2019-12-18 15:12:33 +01:00
|
|
|
self.new_headers = []
|
2019-12-18 14:25:09 +01:00
|
|
|
|
|
|
|
def header(self, field, value):
|
2019-12-18 15:35:23 +01:00
|
|
|
"""Header hook gets called for every header within the email processed."""
|
2019-12-18 15:12:33 +01:00
|
|
|
if field.lower() == 'from':
|
2019-12-18 16:33:54 +01:00
|
|
|
logger.debug(f"({self.id}) Got \"From:\" header raw value: '{value}'")
|
2019-12-18 16:41:55 +01:00
|
|
|
value = normalizeRawFromHeader(value)
|
2019-12-18 16:33:54 +01:00
|
|
|
if value == '':
|
|
|
|
logger.info(f"Got empty from header value! WTF! Skipping.")
|
|
|
|
return Milter.CONTINUE
|
|
|
|
data = parseFromHeader(value)
|
2019-12-18 16:43:59 +01:00
|
|
|
if data is None:
|
|
|
|
logger.info(f"Failed to parse given from header value! Skipping.")
|
|
|
|
return Milter.CONTINUE
|
2019-12-18 16:33:54 +01:00
|
|
|
logger.info(f"({self.id}) Label: '{data['label']}', Address: '{data['address']}'")
|
|
|
|
if data['label_domain'] is not None:
|
|
|
|
logger.debug(f"({self.id}) Label '{data['label']}' contains an address with domain '{data['label_domain']}'.")
|
|
|
|
if data['label_domain'].lower() == data['address_domain'].lower():
|
|
|
|
logger.info(f"({self.id}) Label domain '{data['label_domain']}' matches address domain '{data['address_domain']}'. Good!")
|
|
|
|
self.new_headers.append({'name': 'X-From-Checked', 'value': 'OK - Label domain matches address domain'})
|
2019-12-18 15:35:23 +01:00
|
|
|
else:
|
2019-12-18 16:33:54 +01:00
|
|
|
logger.info(f"({self.id}) Label domain '{data['label_domain']}' did NOT match address domain '{data['address_domain']}'. BAD!")
|
|
|
|
self.new_headers.append({'name': 'X-From-Checked', 'value': 'FAIL - Label domain does NOT match address domain'})
|
2019-12-18 15:12:33 +01:00
|
|
|
else:
|
|
|
|
# Supposedly no additional address in the label, accept it for now
|
|
|
|
# TODO: Also decode utf-8 weirdness and check in there
|
2019-12-18 16:33:54 +01:00
|
|
|
logger.info(f"({self.id}) Label '{data['label']}' probably did not contain an address. Everything is fine.")
|
|
|
|
self.new_headers.append({'name': 'X-From-Checked', 'value': 'OK - No address found in label'})
|
2019-12-18 15:35:23 +01:00
|
|
|
self.final_result = Milter.ACCEPT
|
|
|
|
# Use continue here, so we can reach eom hook.
|
|
|
|
# TODO: Log and react if multiple From-headers are found?
|
|
|
|
return Milter.CONTINUE
|
2019-12-18 15:12:33 +01:00
|
|
|
|
|
|
|
def eom(self):
|
2019-12-18 15:35:23 +01:00
|
|
|
"""EOM hook gets called at the end of message processed. Headers and final verdict are applied only here."""
|
2019-12-18 16:33:54 +01:00
|
|
|
logger.info(f"({self.id}) EOM: Final verdict is {self.final_result}. New headers: {self.new_headers}")
|
2019-12-18 15:12:33 +01:00
|
|
|
for new_header in self.new_headers:
|
|
|
|
self.addheader(new_header['name'], new_header['value'])
|
2019-12-18 16:43:59 +01:00
|
|
|
logger.debug(f"({self.id}) EOM: Reseting self.")
|
2019-12-18 16:33:54 +01:00
|
|
|
self.reset()
|
2019-12-18 15:35:23 +01:00
|
|
|
return self.final_result
|
2019-12-18 15:12:33 +01:00
|
|
|
|
2019-12-18 14:25:09 +01:00
|
|
|
|
|
|
|
def main():
|
2019-12-18 15:35:23 +01:00
|
|
|
# TODO: Move this into configuration of some sort.
|
2019-12-18 14:25:09 +01:00
|
|
|
milter_socket = "inet:7777@127.0.0.1"
|
|
|
|
milter_timeout = 60
|
|
|
|
Milter.factory = SuspiciousFrom
|
|
|
|
logger.info(f"Starting Milter.")
|
|
|
|
# This call blocks the main thread.
|
2019-12-18 15:35:23 +01:00
|
|
|
# TODO: Improve handling CTRL+C
|
2019-12-18 14:25:09 +01:00
|
|
|
Milter.runmilter("SuspiciousFromMilter", milter_socket, milter_timeout, rmsock=False)
|
|
|
|
logger.info(f"Milter finished running.")
|
|
|
|
|
2019-12-18 15:35:23 +01:00
|
|
|
|
2019-12-18 14:25:09 +01:00
|
|
|
if __name__ == "__main__":
|
|
|
|
main()
|