package Mail::SpamAssassin::Plugin::DNSEval;
use Mail::SpamAssassin::Plugin;
use Mail::SpamAssassin::Logger;
use Mail::SpamAssassin::Constants qw(:ip);
use strict;
use warnings;
use bytes;
use vars qw(@ISA);
@ISA = qw(Mail::SpamAssassin::Plugin);
sub new {
my $class = shift;
my $mailsaobject = shift;
$class = ref($class) || $class;
my $self = $class->SUPER::new($mailsaobject);
bless ($self, $class);
$self->{'evalrules'} = [
'check_rbl_accreditor',
'check_rbl',
'check_rbl_txt',
'check_rbl_sub',
'check_rbl_results_for',
'check_rbl_from_host',
'check_rbl_envfrom',
'check_dns_sender',
];
foreach(@{$self->{'evalrules'}}) {
$self->register_eval_rule($_);
}
return $self;
}
sub check_start {
my ($self, $opts) = @_;
foreach(@{$self->{'evalrules'}}) {
$opts->{'permsgstatus'}->register_plugin_eval_glue($_);
}
}
sub ip_list_uniq_and_strip_private {
my ($self, @origips) = @_;
my @ips = ();
my %seen = ();
my $IP_PRIVATE = IP_PRIVATE;
foreach my $ip (@origips) {
next unless $ip;
next if (exists ($seen{$ip})); $seen{$ip} = 1;
next if ($ip =~ /$IP_PRIVATE/o);
push(@ips, $ip);
}
return @ips;
}
sub check_rbl_accreditor {
my ($self, $pms, $rule, $set, $rbl_server, $subtest, $accreditor) = @_;
if (!defined $pms->{accreditor_tag}) {
$self->message_accreditor_tag($pms);
}
if ($pms->{accreditor_tag}->{$accreditor}) {
$self->check_rbl_backend($pms, $rule, $set, $rbl_server, 'A', $subtest);
}
return 0;
}
sub message_accreditor_tag {
my ($self, $pms) = @_;
my %acctags;
if ($pms->get('EnvelopeFrom:addr') =~ /[@.]a--([a-z0-9]{3,})\./i) {
(my $tag = $1) =~ tr/A-Z/a-z/;
$acctags{$tag} = -1;
}
my $accreditor_field = $pms->get('Accreditor');
if (defined($accreditor_field)) {
my @accreditors = split(/,/, $accreditor_field);
foreach my $accreditor (@accreditors) {
my @terms = split(' ', $accreditor);
if ($ my $tag = $terms[0];
$tag =~ tr/A-Z/a-z/;
$acctags{$tag} = -1;
}
}
}
$pms->{accreditor_tag} = \%acctags;
}
sub check_rbl_backend {
my ($self, $pms, $rule, $set, $rbl_server, $type, $subtest) = @_;
local ($_);
return 0 if $self->{main}->{conf}->{skip_rbl_checks};
return 0 unless $pms->is_dns_available();
$pms->load_resolver();
if (($rbl_server !~ /^(\d+)\.(\d+)\.(\d+)\.(\d+)$/) &&
(index($rbl_server, '.') >= 0) &&
($rbl_server !~ /\.$/)) {
$rbl_server .= ".";
}
dbg("dns: checking RBL $rbl_server, set $set");
my @fullips = map { $_->{ip} } @{$pms->{relays_untrusted}};
my @fullexternal = map {
(!$_->{internal}) ? ($_->{ip}) : ()
} @{$pms->{relays_trusted}};
push (@fullexternal, @fullips);
my $IP_ADDRESS = IP_ADDRESS;
my @originating = ();
for my $header ('X-Originating-IP', 'X-Apparently-From') {
my $str = $pms->get($header);
next unless $str;
push (@originating, ($str =~ m/($IP_ADDRESS)/g));
}
my @ips = $self->ip_list_uniq_and_strip_private(@fullips);
return 0 unless (scalar @ips + scalar @originating > 0);
dbg("dns: IPs found: full-external: ".join(", ", @fullexternal).
" untrusted: ".join(", ", @ips).
" originating: ".join(", ", @originating));
my $trusted = $self->{main}->{conf}->{trusted_networks};
if (scalar @ips + scalar @originating > 0) {
if ($set =~ /-(notfirsthop|lastexternal)$/)
{
@ips = $self->ip_list_uniq_and_strip_private(@fullexternal);
if ($1 eq "lastexternal") {
@ips = (defined $ips[0]) ? ($ips[0]) : ();
} else {
pop @ips if (scalar @ips > 1);
}
}
elsif ($set =~ /-(first|un)trusted$/)
{
my @tips = ();
foreach my $ip (@originating) {
if ($ip && !$trusted->contains_ip($ip)) {
push(@tips, $ip);
}
}
@ips = $self->ip_list_uniq_and_strip_private (@ips, @tips);
if ($1 eq "first") {
@ips = (defined $ips[0]) ? ($ips[0]) : ();
} else {
shift @ips;
}
}
else
{
my @tips = ();
foreach my $ip (@originating) {
if ($ip && !$trusted->contains_ip($ip)) {
push(@tips, $ip);
}
}
@ips = reverse $self->ip_list_uniq_and_strip_private (@ips, @tips);
my $checklast=$self->{main}->{conf}->{num_check_received};
if (scalar @ips > $checklast) {
splice (@ips, $checklast); }
}
}
dbg("dns: only inspecting the following IPs: ".join(", ", @ips));
eval {
foreach my $ip (@ips) {
next unless ($ip =~ /(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})/);
$pms->do_rbl_lookup($rule, $set, $type, $rbl_server,
"$4.$3.$2.$1.$rbl_server", $subtest);
}
};
return 0;
}
sub check_rbl {
my ($self, $pms, $rule, $set, $rbl_server, $subtest) = @_;
$self->check_rbl_backend($pms, $rule, $set, $rbl_server, 'A', $subtest);
}
sub check_rbl_txt {
my ($self, $pms, $rule, $set, $rbl_server, $subtest) = @_;
$self->check_rbl_backend($pms, $rule, $set, $rbl_server, 'TXT', $subtest);
}
sub check_rbl_sub {
my ($self, $pms, $rule, $set, $subtest) = @_;
return 0 if $self->{main}->{conf}->{skip_rbl_checks};
return 0 unless $pms->is_dns_available();
$pms->register_rbl_subtest($rule, $set, $subtest);
}
sub check_rbl_results_for {
check_rbl_sub(@_);
}
sub check_rbl_from_host {
_check_rbl_addresses(@_, $_[1]->all_from_addrs());
}
sub check_rbl_envfrom {
_check_rbl_addresses(@_, $_[1]->get('EnvelopeFrom:addr'));
}
sub _check_rbl_addresses {
my ($self, $pms, $rule, $set, $rbl_server, @addresses) = @_;
return 0 if $self->{main}->{conf}->{skip_rbl_checks};
return 0 unless $pms->is_dns_available();
my %hosts;
for my $address (@addresses) {
if ($address =~ m/\@(\S+\.\S+)/) {
$hosts{lc($1)} = 1;
}
}
return unless scalar keys %hosts;
$pms->load_resolver();
if (($rbl_server !~ /^(\d+)\.(\d+)\.(\d+)\.(\d+)$/) &&
(index($rbl_server, '.') >= 0) &&
($rbl_server !~ /\.$/)) {
$rbl_server .= ".";
}
dbg("dns: _check_rbl_addresses RBL $rbl_server, set $set");
for my $host (keys %hosts) {
$pms->do_rbl_lookup($rule, $set, 'A', $rbl_server, "$host.$rbl_server");
}
}
sub check_dns_sender {
my ($self, $pms, $rule) = @_;
my $host;
for my $from ($pms->get('EnvelopeFrom:addr')) {
next unless defined $from;
$from =~ tr/././s; if ($from =~ /\@(\S+\.\S+)/) {
$host = lc($1);
last;
}
}
return 0 unless defined $host;
return 0 unless $pms->is_dns_available();
$pms->load_resolver();
if ($host eq 'compiling.spamassassin.taint.org') {
return 0;
}
dbg("dns: checking A and MX for host $host");
$pms->do_dns_lookup($rule, 'A', $host);
$pms->do_dns_lookup($rule, 'MX', $host);
$pms->{sender_host} = $host;
return 0;
}
1;