Mercurial > notdcc
view dcclib/dnsbl.c @ 4:d329bb5c36d0
Changes making it compile the new upstream release
author | Peter Gervai <grin@grin.hu> |
---|---|
date | Tue, 10 Mar 2009 14:57:12 +0100 |
parents | c7f6b056b673 |
children |
line wrap: on
line source
/* Distributed Checksum Clearinghouse * * reject messages contain URLs that resolve to DNS blacklisted IP addresses * * Copyright (c) 2008 by Rhyolite Software, LLC * * This agreement is not applicable to any entity which sells anti-spam * solutions to others or provides an anti-spam solution as part of a * security solution sold to other entities, or to a private network * which employs the DCC or uses data provided by operation of the DCC * but does not provide corresponding data to other users. * * Permission to use, copy, modify, and distribute this software without * changes for any purpose with or without fee is hereby granted, provided * that the above copyright notice and this permission notice appear in all * copies and any distributed versions or copies are either unchanged * or not called anything similar to "DCC" or "Distributed Checksum * Clearinghouse". * * Parties not eligible to receive a license under this agreement can * obtain a commercial license to use DCC by contacting Rhyolite Software * at sales@rhyolite.com. * * A commercial license would be for Distributed Checksum and Reputation * Clearinghouse software. That software includes additional features. This * free license for Distributed ChecksumClearinghouse Software does not in any * way grant permision to use Distributed Checksum and Reputation Clearinghouse * software * * THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC * BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES * OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, * WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, * ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS * SOFTWARE. * * Rhyolite Software DCC 1.3.103-1.100 $Revision$ */ #include "helper.h" #include "dcc_heap_debug.h" #ifndef DCC_WIN32 #include <sys/wait.h> #include <arpa/inet.h> #endif #ifdef HAVE_RESOLV_H #include <resolv.h> #endif #ifdef HAVE_ARPA_NAMESER_H #include <arpa/nameser.h> #endif /* can check MX and NS addresses only with a standard resolver library */ #define MXNS_DNSBL #if !defined(HAVE__RES) || !defined(HAVE_RES_INIT) #undef HAVE__RES #undef HAVE_RES_INIT #undef MXNS_DNSBL #endif #if !defined (HAVE_RES_QUERY) || !defined(HAVE_DN_EXPAND) #undef MXNS_DNSBL #endif #if !defined(HAVE_HSTRERROR) #undef MXNS_DNSBL /* MX lookups need raw hsterror() */ #endif #if !defined(T_MX) || !defined(T_A) || !defined(T_AAAA) || !defined(T_NS) #undef MXNS_DNSBL #endif #if !defined(C_IN) || !defined(C_IN) || !defined(PACKETSZ) #undef MXNS_DNSBL #endif #if !defined(RES_DEFNAMES) || !defined(RES_DNSRCH) || !defined(RES_NOALIASES) #undef MXNS_DNSBL #endif DNSBL *dnsbls; static DNSBL_UNHIT dnsbl_groups; u_char have_dnsbl_groups; HELPER helper; u_char have_helpers; DCC_PATH dnsbl_progpath; static u_char is_helper; static const char *helper_str = ""; static u_char have_ipv4_dnsbl; static u_char have_ipv6_dnsbl; static u_char have_name_dnsbl; #define MAX_MSG_SECS 1000 #ifndef RES_TIMEOUT #define RES_TIMEOUT 3 #endif static int msg_secs = 25; /* total seconds/mail message */ static time_t msg_us; static int url_secs = 11; /* total seconds/host name */ static time_t url_us; /* Parse a string of the form: * "domain[,[IPaddr][,name|ipv4|ipv6]] * or of one of the forms: * set:progpath path of helper program * set:debug=X more logging * set:msg-secs=S total seconds checking blacklists/message * set:url-secs=S total seconds per host name * set:[no-]client client IP address checks * set:[no-]mail_host envelope mail_from checks * set:[no-]URL body URL checks * set:[no-]MX MX checks * set:[no-]NS NS checks * set:defaults restore defaults * set:group=X start group of DNSBLs * set:[no-]temp-fail timeout temporarily fails SMTP transaction * set:max_helpers=X override dccm or dccifd max_work * * set:[no-]envelope obsolete mail host & client * * set:helper=soc,fd,X start DNS resolver process */ u_char /* 0=bad */ dcc_parse_dnsbl(DCC_EMSG emsg, const char *entry, const char *progpath, u_char tfail) { static DNSBL_FGS cur_fgs = DNSBL_FG_DEFAULT; static const REPLY_TPLT *cur_reply = 0; static int bl_num = 0; static int cur_group = 0; DNSBL_GBITS gbit; DNSBL *dp, *dp1, **dpp; const char *tgt_ip; /* "hit" IP address of this blacklist */ DNSBL_DOM tgt_ip_buf; DNSBL_TYPE bl_type; struct in6_addr tgt, tgt_mask; int tgt_bits; u_char tgt_use_ipv6; DCC_EMSG addr_emsg; int error, bl_dom_len; int val; char *p; #ifdef HAVE_HELPERS int soc; int fd; int total_helpers; # define SAVE_ARG(arg) helper_save_arg("-B", arg) #else # define SAVE_ARG(arg) #endif if (progpath && dnsbl_progpath[0] == '\0') { const char *slash = strrchr(progpath, '/'); if (slash) ++slash; else slash = progpath; snprintf(dnsbl_progpath, sizeof(dnsbl_progpath), "%.*sdns-helper", (int)(slash-progpath), progpath); } /* pretend to turn on temp-fail for dccproc to get * DNSBLx(timeout) messages */ if (tfail) cur_fgs |= DNSBL_FG_TFAIL; /* handle parameter settings */ if (!CLITCMP(entry, "set:")) { const char *parm = entry+LITZ("set:"); #ifdef HAVE_HELPERS /* start running a helper process on the last, magic -B */ if (3 == sscanf(parm, HELPER_PAT, &soc, &fd, &total_helpers)) { helper_child(soc, fd, total_helpers); } #endif if (!CLITCMP(parm, "progpath=")) { BUFCPY(dnsbl_progpath, parm+LITZ("progpath=")); return 1; } if (!strcasecmp(parm, "debug")) { ++helper.debug; SAVE_ARG(entry); return 1; } if (1 == sscanf(parm, "debug=%d", &val)) { helper.debug = val; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "envelope")) { /* obsolete */ cur_fgs |= (DNSBL_FG_CLIENT | DNSBL_FG_MAIL_HOST); SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-envelope")) { /* obsolete */ cur_fgs &= ~(DNSBL_FG_CLIENT | DNSBL_FG_MAIL_HOST); SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "client")) { /* obsolete */ cur_fgs |= DNSBL_FG_CLIENT; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-client")) { /* obsolete */ cur_fgs &= ~DNSBL_FG_CLIENT; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "mail_host")) { /* obsolete */ cur_fgs |= DNSBL_FG_MAIL_HOST; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-mail_host")) { /* obsolete */ cur_fgs &= ~DNSBL_FG_MAIL_HOST; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "body")) { /* obsolete */ cur_fgs |= DNSBL_FG_URL; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "url")) { cur_fgs |= DNSBL_FG_URL; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-body")) { /* obsolete */ cur_fgs &= ~DNSBL_FG_URL; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-URL")) { cur_fgs &= ~DNSBL_FG_URL; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "mx")) { #ifdef MXNS_DNSBL cur_fgs |= DNSBL_FG_MX; SAVE_ARG(entry); return 1; #else dcc_pemsg(EX_USAGE, emsg, "MX DNS blacklist checks not supported"); return 0; #endif } if (!strcasecmp(parm, "no-mx")) { cur_fgs &= ~DNSBL_FG_MX; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "ns")) { #ifdef MXNS_DNSBL cur_fgs |= DNSBL_FG_MX; SAVE_ARG(entry); return 1; #else dcc_pemsg(EX_USAGE, emsg, "NS DNS blacklist checks not supported"); return 0; #endif } if (!strcasecmp(parm, "no-ns")) { cur_fgs &= ~DNSBL_FG_NS; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "defaults")) { cur_fgs = DNSBL_FG_DEFAULT; SAVE_ARG(entry); return 1; } if (!CLITCMP(parm, "rej-msg=")) { parm += LITZ("rej-msg="); if (*parm == '\0') cur_reply = 0; else cur_reply = dnsbl_parse_reply(parm); /* do not save for helpers */ return 1; } if (!CLITCMP(parm, "msg-secs=")) { parm += LITZ("msg-secs="); val = strtoul(parm, &p, 10); if (*p != '\0' || val < 1 || val > MAX_MSG_SECS) { dcc_pemsg(EX_USAGE, emsg, "bad number of seconds in \"-B %s\"", entry); return 0; } if (msg_secs != val) { msg_secs = val; SAVE_ARG(entry); } return 1; } if (!CLITCMP(parm, "url-secs=")) { parm += LITZ("url-secs="); val = strtoul(parm, &p, 10); if (*p != '\0' || val < 1 || val > MAX_MSG_SECS) { dcc_pemsg(EX_USAGE, emsg, "bad number of seconds in \"-B %s\"", entry); return 0; } if (url_secs != val) { url_secs = val; SAVE_ARG(entry); } return 1; } if (1 == sscanf(parm, "group=%d", &val) && val >= 1 && val <= MAX_DNSBL_GROUPS) { cur_group = val-1; have_dnsbl_groups = 1; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "temp-fail")) { cur_fgs |= DNSBL_FG_TFAIL; SAVE_ARG(entry); return 1; } if (!strcasecmp(parm, "no-temp-fail")) { cur_fgs &= ~DNSBL_FG_TFAIL; SAVE_ARG(entry); return 1; } if (1 == sscanf(parm, "max_helpers=%d", &val) && val >= 1 && val < 1000) { helper.max_helpers = val; SAVE_ARG(entry); return 1; } dcc_pemsg(EX_USAGE, emsg, "unrecognized \"-B %s\"", entry); return 0; } /* we must have a DNSBL specification */ bl_type = DNSBL_TYPE_IPV4; /* assume it is a simple IPv4 DNSBL */ tgt_ip = strchr(entry, ','); if (!tgt_ip) { bl_dom_len = strlen(entry); have_ipv4_dnsbl = 1; } else { bl_dom_len = tgt_ip - entry; ++tgt_ip; /* notice trailing ",name" or ",IPv4" */ p = strchr(tgt_ip, ','); if (!p) { have_ipv4_dnsbl = 1; } else { ++p; if (!strcasecmp(p, "name")) { bl_type = DNSBL_TYPE_NAME; have_name_dnsbl = 1; } else if (!strcasecmp(p, "IPV4")) { bl_type = DNSBL_TYPE_IPV4; have_ipv4_dnsbl = 1; } else if (!strcasecmp(p, "IPV6")) { bl_type = DNSBL_TYPE_IPV6; have_ipv6_dnsbl = 1; } else { dcc_pemsg(EX_NOHOST, emsg, "unknown DNSBL type in \"%s\"", entry); return 0; } STRLCPY(tgt_ip_buf.c, tgt_ip, min(ISZ(tgt_ip_buf), p-tgt_ip)); tgt_ip = tgt_ip_buf.c; } } if (entry[0] == '.') { ++entry; --bl_dom_len; } if (bl_dom_len < 1) { dcc_pemsg(EX_NOHOST, emsg, "invalid DNS blacklist \"%s\"", entry); return 0; } /* assume 127.0.0.2 if the target address is missing */ if (!tgt_ip || *tgt_ip == '\0') tgt_ip = "127.0.0.2"; if (!strcasecmp(tgt_ip, "any")) { /* That we get a result when we lookup up an address in the * in the DNSBL is all that matters in this case. * Whether it is IPv6 or IPv4 does not */ tgt_use_ipv6 = 2; memset(&tgt, 0, sizeof(tgt)); memset(&tgt_mask, 0, sizeof(tgt_mask)); } else if (0 != (tgt_bits = dcc_str2cidr(emsg, &tgt, &tgt_mask, &tgt_use_ipv6, tgt_ip, 0, 0))) { if (tgt_bits < 0) { dcc_pemsg(EX_NOHOST, addr_emsg, "invalid DNS blacklist %s \"%s\"", addr_emsg, entry); return 0; } } else { dcc_host_lock(); if (dcc_get_host(tgt_ip, 3, &error)) { /* prefer an IPv4 target address */ if (dcc_hostaddrs[0].sa.sa_family == AF_INET) { tgt_use_ipv6 = 0; dcc_ipv4toipv6(&tgt, dcc_hostaddrs[0].ipv4.sin_addr); } else { tgt_use_ipv6 = 1; tgt = dcc_hostaddrs[0].ipv6.sin6_addr; } dcc_host_unlock(); dcc_bits2mask(&tgt_mask, 128); } else { dcc_host_unlock(); dcc_pemsg(EX_NOHOST, emsg, "invalid DNSBL target IP address \"%s\": %s", tgt_ip, DCC_HSTRERROR(error)); return 0; } } if (bl_dom_len >= ISZ(DNSBL_DOM) - INET6_ADDRSTRLEN*2) { dcc_host_unlock(); /* we cannot fit the DNSBL base and the target name or address * into blw->probe. We need to do DNS lookups of names * like 33.22.11.10.dnsbl.example.com or * domain.dom.bl.example.com */ dcc_pemsg(EX_NOHOST, emsg, "DNSBL name \"%s\" too long", entry); return 0; } dp = dcc_malloc(sizeof(*dp)); memset(dp, 0, sizeof(*dp)); dp->tgt_use_ipv6 = tgt_use_ipv6; dp->tgt = tgt; dp->tgt_mask = tgt_mask; dp->bl_type = bl_type; dp->fgs = cur_fgs; dp->reply = cur_reply; memcpy(&dp->bl_dom.c, entry, bl_dom_len); dp->bl_dom_len = bl_dom_len+1; /* count trailing '\0' */ dp->bl_num = ++bl_num; dp->group = cur_group; gbit = DNSBL_G2B(dp->group); dnsbl_groups.all |= gbit; if (cur_fgs & DNSBL_FG_CLIENT) dnsbl_groups.client |= gbit; if (cur_fgs & DNSBL_FG_MAIL_HOST) { dnsbl_groups.mail_host |= gbit; if (cur_fgs & DNSBL_FG_MX) dnsbl_groups.mail_host_mx |= gbit; if (cur_fgs & DNSBL_FG_NS) dnsbl_groups.mail_host_ns |= gbit; } if (cur_fgs & DNSBL_FG_URL) { dnsbl_groups.url |= gbit; if (cur_fgs & DNSBL_FG_MX) dnsbl_groups.url_mx |= gbit; if (cur_fgs & DNSBL_FG_NS) dnsbl_groups.url_ns |= gbit; } /* link the DNSBLs in the order they are declared so that they * can be prioritized */ dpp = &dnsbls; for (;;) { dp1 = *dpp; if (!dp1) { *dpp = dp; break; } /* notice sufficiently duplicate DNSBLS */ if (!(dp->fgs & DNSBL_FG_DUP) && !dp1->dup && dp->tgt_use_ipv6 == dp1->tgt_use_ipv6 && dp->bl_type == dp1->bl_type && dp->bl_dom_len == dp1->bl_dom_len && !memcmp(dp->bl_dom.c, dp1->bl_dom.c, dp->bl_dom_len)) { dp->fgs |= DNSBL_FG_DUP; dp1->dup = dp; } dpp = &dp1->fwd; } SAVE_ARG(entry); return 1; #undef SAVE_ARG } /* resolve inconsistencies among the -B parameters */ static inline void fix_url_secs(void) { if (url_secs > msg_secs) url_secs = msg_secs; msg_us = msg_secs * DCC_US; url_us = url_secs * DCC_US; } static char * type_str(char *buf, int buf_len, const DNSBL_WORK *blw, DNSBL_FGS fgs) { const char *type; char sustr[DCC_SU2STR_SIZE]; int i; switch (fgs & DNSBL_FG_TYPES) { case DNSBL_FG_CLIENT: type = "SMTP client"; if (blw->tgt.dom.c[0] == '\0') { snprintf(buf, buf_len, "%s %s", type, dcc_ipv6tostr2(sustr, sizeof(sustr), &blw->tgt.addr)); return buf; } break; case DNSBL_FG_MAIL_HOST: type = "mail_host"; break; case DNSBL_FG_URL: type = "URL"; break; case DNSBL_FG_MX | DNSBL_FG_MAIL_HOST : type = "mail_host MX"; break; case DNSBL_FG_MX | DNSBL_FG_URL: type = "URL MX"; break; case DNSBL_FG_NS | DNSBL_FG_MAIL_HOST: type = "mail_host NS"; break; case DNSBL_FG_NS | DNSBL_FG_URL: type = "URL NS"; break; default: dcc_logbad(EX_SOFTWARE, "impossible DNSBL hit type %#x", fgs); break; } i = snprintf(buf, buf_len, "%s %s", type, blw->tgt.dom.c); if (i >= buf_len && buf_len > 4) strcpy(&buf[buf_len-4], "..."); return buf; } static void PATTRIB(4,5) dnsbl_log(const DNSBL_WORK *blw, const DNSBL_GROUP *blg, DNSBL_FGS fgs, const char *pat, ...) { char type_buf[sizeof(blg->btype_buf)]; const char *type0, *type1; char gbuf[8]; const char *gnum; char msg[256]; va_list args; va_start(args, pat); vsnprintf(msg, sizeof(msg), pat, args); va_end(args); if (fgs) { type0 = " "; type1 = type_str(type_buf, sizeof(type_buf), blw, fgs); } else { type0 = ""; type1 = ""; } if (!have_dnsbl_groups) { gnum = ""; } else if (!blg) { gnum = "*"; } else { snprintf(gbuf, sizeof(gbuf), "%d", (int)(blg - blw->groups)+1); gnum = gbuf; } if (helper.debug) { if (dcc_no_syslog) thr_trace_msg(blw->log_ctxt, "DNSBL%s%s%s%s %s", gnum, helper_str, type0, type1, msg); else thr_trace_msg(blw->log_ctxt, "%s DNSBL%s%s%s%s %s", blw->id, gnum, helper_str, type0, type1, msg); } else { thr_log_print(blw->log_ctxt, 1, "DNSBL%s%s%s%s %s\n", helper_str, gnum, type0, type1, msg); } } void dcc_dnsbl_result(ASK_ST *ask_stp, DNSBL_WORK *blw) { DNSBL *dp; DNSBL_GROUP *blg; int gnum; if (!blw) return; for (gnum = 0, blg = blw->groups; gnum < MAX_DNSBL_GROUPS; ++gnum, ++blg) { if (blg->fgs & DNSBL_FG_HITS) { *ask_stp |= (ASK_ST_DNSBL_HIT(gnum) | ASK_ST_LOGIT); dnsbl_log(blw, blg, 0, "%s %s=%s", blg->btype, blg->probe.c, blg->result); } else if (blg->fgs & DNSBL_FG_TIMEO) { *ask_stp |= ASK_ST_DNSBL_TIMEO(gnum); for (dp = dnsbls; dp; dp = dp->fwd) { if (dp->group != gnum) continue; if (dp->fgs & DNSBL_FG_TFAIL) { *ask_stp |= ASK_ST_DNSBL_TFAIL(gnum); break; } } } } } /* There are several timing requirements: * - Do not spend too much time on any single URL or envelope value. * - At helper.debug >=1, log the first DNSBL check in a group * unfinished for lack of time. Also log checks for single URLs that * are partially unfinished. * - At helper.debug >=2, log things that take a long time * - Minimize log messages, because the noise can be deafening. * - Mark unfinished groups */ /* A check has been abandoned or timed out. */ static void set_timeo(DNSBL_WORK *blw, DNSBL_FGS fgs) { DNSBL *dp; DNSBL_GROUP *blg; int gnum; /* groups that are marked as having suffered timeouts can be * hit by later URLs */ if (fgs == 0) { /* mark all groups if we don't know the type of request */ for (gnum = 0, blg = blw->groups; gnum < MAX_DNSBL_GROUPS; ++gnum, ++blg) { /* ignore groups that have hit or timed out */ if (!(blw->unhit.all & DNSBL_G2B(gnum)) || (blg->fgs & DNSBL_FG_TIMEO)) continue; blg->fgs |= DNSBL_FG_TIMEO; } } else { /* mark only groups that still care about this type */ for (dp = dnsbls; dp; dp = dp->fwd) { /* this DNSBL does not care about this type * or the group to which it belongs has been hit */ if (!(dp->fgs & fgs & DNSBL_FG_HITS) || !(blw->unhit.all & DNSBL_G2B(dp->group))) continue; blw->groups[dp->group].fgs |= DNSBL_FG_TIMEO; } } /* no complaint if time remains */ if (blw->url_us >= blw->url_us_used) return; /* no more log messages if everything has been complained about */ if (blw->url_us < 0 || blw->msg_us < 0) return; /* only one final message/URL */ blw->url_us = -1; if (helper.debug < 2) return; if (is_helper) { /* Messages from the helper process go to the system * log but not the per-message log file. * The helper works on a single URL or envelope value * and so does not know about the time limit for the * entire message. */ dnsbl_log(blw, 0, fgs, "failed after %.1f url_secs used", blw->url_us_used / (DCC_US*1.0)); } else if (blw->msg_us > blw->url_us_used) { /* time remains for later URLs */ dnsbl_log(blw, 0, fgs, "failed after using %.1f url_secs;" " %.1f msg-secs remain", blw->url_us_used / (DCC_US*1.0), (blw->msg_us - blw->url_us_used) / (DCC_US*1.0)); } else { dnsbl_log(blw, 0, fgs, "failed after using %.1f sec", blw->url_us_used / (DCC_US*1.0)); } } /* see if we are out of time before doing something */ static inline u_char /* 0=too late */ time_ck_pre(DNSBL_WORK *blw, DNSBL_FGS fgs) { /* don't worry if there is plenty of time */ if (blw->url_us >= blw->url_us_used) return 1; /* There is no more time. Ether previous operations succeeded slowly * or failed and were logged. * In the first case, log this operation and mark the groups. */ set_timeo(blw, fgs); return 0; } /* see if we ran out of time after doing something */ static u_char /* 0=out of time */ time_ck_post(DNSBL_WORK *blw, DNSBL_FGS fgs, u_char timedout) /* 1=operation timed out */ { struct timeval now; time_t used_us; if (blw->url_us <= 0) return 0; /* previously out of time */ gettimeofday(&now, 0); used_us = tv_diff2us(&now, &blw->url_start); if (blw->url_us >= used_us && !timedout) { if (helper.debug > 1 && (used_us-blw->url_us_used) > url_us/4) dnsbl_log(blw, 0, fgs, "%s after using %.1f url_secs", timedout ? "failed" : "succeeded", (used_us - blw->url_us_used) / (DCC_US*1.0)); blw->url_us_used = used_us; return 1; } blw->url_us_used = used_us; set_timeo(blw, fgs); return 0; } /* start timer before we start to check something in the DNS blacklists * give up if we are already out of time */ static u_char /* 0=already too much time spent */ msg_secs_start(DNSBL_WORK *blw, DNSBL_FGS fgs) { blw->url_us = url_us; blw->url_us_used = 0; if (blw->msg_us <= 0) { if (blw->msg_us == 0) { /* out of time for next URL before we start it */ if (helper.debug) dnsbl_log(blw, 0, fgs, "%d msg-secs already exhausted", msg_secs); blw->msg_us = -1; /* only one log message */ blw->url_us = -1; } /* mark the groups but do not log anything */ set_timeo(blw, fgs); return 0; } gettimeofday(&blw->url_start, 0); return 1; } /* account for time used */ static void msg_secs_fin(DNSBL_WORK *blw) { if (blw->msg_us < 0) return; /* prevously out of time */ blw->msg_us -= blw->url_us_used; if (blw->msg_us > 0) return; if (blw->url_us >= blw->url_us_used) { /* The clock had no time for more DNS work for this * name or address, but we finished and so it might * not matter. * Ensure a log message on the next check, if any */ blw->msg_us = 0; } } #ifndef HAVE__RES static void dnsbl_res_delays(const DNSBL_WORK *blw UATTRIB) { return; } #else /* Limit resolver delays to as much as we are willing to wait * We should be talking to a local caching resolver. If it does not answer * immediately, it is unlikely to later. If it does eventually get an * answer, the answer will probably ready the next time we ask. * dcc_host_lock() must be held. */ static void dnsbl_res_delays(const DNSBL_WORK *blw) { static int init_res_retrans; static int init_res_retry; int budget; /* seconds we can afford */ int res_retrans; /* retransmition delay */ int res_retry; /* # of retransmissions */ int total; /* retrans*retry = worst case delay */ /* get the current value */ if (!_res.options & RES_INIT) { res_init(); init_res_retry = _res.retry; if (!init_res_retry) init_res_retry = 4; init_res_retrans = _res.retrans; if (!init_res_retrans) init_res_retrans = RES_TIMEOUT; } res_retry = init_res_retry; res_retrans = init_res_retrans; /* assume binary exponential backoffs as in the BIND resolver */ total = ((1<<res_retry) -1) * res_retrans; /* If the default values could take too long, then try 2 seconds. * If that is still too long, go to 1 retransmission and an initial * retransmission delay of 1/3 of the total allowed delay. * 1/3 from one exponential backoff for a total of 2**2-1=3 times * the initial delay. * We should be using a local caching DNS server and so should not * see many lost packets */ budget = (blw->url_us - blw->url_us_used + DCC_US/2) / DCC_US; if (budget < 1) budget = 1; if (total >= budget) { res_retry = 2; /* 2 retries are often few enough */ total = ((1<<res_retry) -1) * res_retrans; /* if that is not few enough, * then reduce the retransmission delay to fit */ if (total >= budget) { res_retrans = budget/3; if (res_retrans == 0) res_retrans = 1; } } if (_res.retry != res_retry || _res.retrans != res_retrans) { _res.retry = res_retry; _res.retrans = res_retrans; if (helper.debug > 4) dnsbl_log(blw, 0, 0, "budget=%d _res.retry=%d" " _res.retrans=%d seconds", budget, res_retry, res_retrans); } } #endif /* !HAVE__RES */ static inline void blw_clear(DNSBL_WORK *blw) { DNSBL_GROUP *blg; blw->tgt.dom.c[0] = '\0'; blw->tgt_dom_len = 0; for (blg = blw->groups; blg <= LAST(blw->groups); ++blg) { blg->fgs = 0; blg->btype = 0; blg->result[0] = '\0'; blg->tgt.c[0] = '\0'; blg->probe.c[0] = '\0'; } } /* get ready to handle a mail message */ void dcc_dnsbl_init(DCC_GOT_CKS *cks, DCC_CLNT_CTXT *dcc_ctxt, void *log_ctxt, const char *id) { DNSBL_WORK *blw; int i; if (!dnsbls) return; blw = cks->dnsbl; if (!blw) { blw = dcc_malloc(sizeof(*blw)); memset(blw, 0, sizeof(*blw)); cks->dnsbl = blw; /* general initializations on the first use of DNS blacklists */ fix_url_secs(); } blw_clear(blw); blw->msg_us = msg_us; blw->id = id; blw->dcc_ctxt = dcc_ctxt; blw->log_ctxt = log_ctxt; blw->unhit = dnsbl_groups; for (i = 0; i < DIM(blw->tgt_cache); ++i) blw->tgt_cache[i].dom.c[0] = '\0'; blw->tgt_cache_pos = 0; } /* look for a host name or IP address in a DNS blacklist and its duplicates * and any hit groups of DNSBLs. * These DNS operations should be done with local default values for * RES_DEFNAMES, RES_DNSRCH, and RES_NOALIASES because the blacklist * might be something local and strange. */ static u_char /* 0=no more time or blacklists */ lookup(DNSBL_WORK *blw, const DNSBL_DOM *probe, /* look for this */ const DNSBL *dp, /* check this blacklist & its dups */ DNSBL_FGS fgs, /* type of lookup */ const void *tgt) /* IP address or whatever for tracing */ { # define NUM_SUSTRS 3 char sustrs[DCC_SU2STR_SIZE*NUM_SUSTRS+1+sizeof("...")]; const DCC_SOCKU *hap; struct in6_addr addr6; const struct in6_addr *addr6p; int error; DNSBL_GROUP *blg; DNSBL_GBITS gbit; u_char hit; char *p; int i; if (!time_ck_pre(blw, fgs)) return 0; /* resolve a list of IP addresses for the probe in the DNSBL */ dcc_host_lock(); dnsbl_res_delays(blw); if (!dcc_get_host(probe->c, dp->tgt_use_ipv6, &error)) { dcc_host_unlock(); if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "gethostbyname(%s): %s", probe->c, DCC_HSTRERROR(error)); return time_ck_post(blw, fgs, error == TRY_AGAIN); } /* check each address obtained for the probe in the DNSBL * for a hit in the list of duplicate references to this DNSBL */ hit = 0; do { /* skip this reference if it is for the wrong type of DNSBL */ if ((dp->fgs & fgs) != fgs) continue; /* skip this reference if the containing group has a hit */ blg = &blw->groups[dp->group]; if (blg->fgs & DNSBL_FG_HITS) continue; /* check all of the addresses for a hit with this reference */ for (hap = dcc_hostaddrs; hap < dcc_hostaddrs_end; ++hap) { /* finished if any answer is good enough * or if we get a match */ if (hap->sa.sa_family == AF_INET6) { addr6p = &hap->ipv6.sin6_addr; } else { addr6p = &addr6; dcc_ipv4toipv6(&addr6, hap->ipv4.sin_addr); } if (!DCC_IN_BLOCK(*addr6p, dp->tgt, dp->tgt_mask)) continue; /* got a hit */ blg->dnsbl = dp; blg->fgs = fgs; if (dp->bl_type == DNSBL_TYPE_IPV4) dcc_ipv4tostr(blg->tgt.c, sizeof(blg->tgt), tgt); else if (dp->bl_type == DNSBL_TYPE_IPV6) dcc_ipv6tostr(blg->tgt.c, sizeof(blg->tgt), tgt); else if (dp->bl_type == DNSBL_TYPE_NAME) BUFCPY(blg->tgt.c, tgt); blg->btype = type_str(blg->btype_buf, sizeof(blg->btype_buf), blw, blg->fgs); BUFCPY(blg->probe.c, probe->c); dcc_su2str2(blg->result, sizeof(blg->result), hap); if (helper.debug > 1 && (is_helper || !have_helpers)) dnsbl_log(blw, blg, fgs, "hit %s=%s", probe->c, dcc_su2str2(sustrs, sizeof(sustrs), hap)); gbit = DNSBL_G2B(dp->group); if (fgs & DNSBL_FG_CLIENT) blw->unhit.client &= ~gbit; if (fgs & DNSBL_FG_MAIL_HOST) { blw->unhit.mail_host &= ~gbit; if (fgs & DNSBL_FG_MX) blw->unhit.mail_host_mx &= ~gbit; if (fgs & DNSBL_FG_NS) blw->unhit.mail_host_ns &= ~gbit; } if (fgs & DNSBL_FG_URL) { blw->unhit.url &= ~gbit; if (fgs & DNSBL_FG_MX) blw->unhit.url_mx &= ~gbit; if (fgs & DNSBL_FG_NS) blw->unhit.url_ns &= ~gbit; } blw->unhit.all &= ~gbit; if (!blw->unhit.all) { dcc_host_unlock(); time_ck_post(blw, fgs, 0); return 0; } hit = 1; break; } /* check the results in duplicate references to the DNSBL */ } while ((dp = dp->dup) != 0); if (hit || helper.debug < 2) { dcc_host_unlock(); return time_ck_post(blw, fgs, 0); } p = sustrs; i = 0; do { dcc_su2str2(p, DCC_SU2STR_SIZE, &dcc_hostaddrs[i]); p += strlen(p); *p++ = ' '; *p = '\0'; if (p >= &sustrs[DCC_SU2STR_SIZE*NUM_SUSTRS]) { strcpy(p, "..."); break; } } while (dcc_hostaddrs_end > &dcc_hostaddrs[++i]); dcc_host_unlock(); dnsbl_log(blw, 0, fgs, "miss; gethostbyname(%s)=%s", probe->c, sustrs); return time_ck_post(blw, fgs, 0); #undef NUM_SUSTRS } /* check one IP address against the DNS blacklists */ static u_char /* 0=no more time or blacklists */ ip_lookup(DNSBL_WORK *blw, DNSBL_TYPE tgt_type, const void *tgt, /* in_addr* or in6_addr*, not aligned */ DNSBL_FGS fgs) /* type of lookup */ { const DNSBL *dp; const u_char *bp; DNSBL_DOM probe; /* check all DNSBLs for a group without a hit */ for (dp = dnsbls; dp; dp = dp->fwd) { if (dp->bl_type != tgt_type) continue; if ((dp->fgs & fgs) != fgs) continue; if (dp->fgs & DNSBL_FG_DUP) continue; if (!(blw->unhit.all & DNSBL_G2B(dp->group))) continue; bp = (u_char *)tgt; if (tgt_type == DNSBL_TYPE_IPV4) snprintf(probe.c, sizeof(probe.c), "%d.%d.%d.%d.%s", bp[3], bp[2], bp[1], bp[0], dp->bl_dom.c); else snprintf(probe.c, sizeof(probe.c), "%d.%d.%d.%d.%d.%d.%d.%d" ".%d.%d.%d.%d.%d.%d.%d.%d.%s", bp[15], bp[14], bp[13], bp[12], bp[11], bp[10], bp[9], bp[8], bp[7], bp[6], bp[5], bp[4], bp[3], bp[2], bp[1], bp[0], dp->bl_dom.c); if (!lookup(blw, &probe, dp, fgs, tgt)) return 0; } return 1; } /* convert a name to one or more IP addresses to be checked in a DNS blacklist. * dcc_host_lock() must be held. * These DNS operations need RES_DEFNAMES and RES_DNSRCH off and * RES_NOALIASES on when the name is an MX or NS server name. */ static u_char /* 0=failed */ dnsbl_get_host(DNSBL_WORK *blw, const DNSBL_DOM *dom, u_char use_ipv6, int *errorp, /* put error number here */ DNSBL_FGS fgs /* 0, DNSBL_FG_MX, or DNSBL_FG_NS */ #ifndef MXNS_DNSBL UATTRIB #endif ) { #ifdef MXNS_DNSBL u_long save_options; #endif u_char result; #ifdef MXNS_DNSBL save_options = _res.options; if (fgs & (DNSBL_FG_MX | DNSBL_FG_NS)) { _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); _res.options |= RES_NOALIASES; } #endif dnsbl_res_delays(blw); result = dcc_get_host(dom->c, use_ipv6, errorp); #ifdef MXNS_DNSBL if (fgs & (DNSBL_FG_MX | DNSBL_FG_NS)) _res.options = save_options; #endif return result; } /* look for a domain name in the DNS blacklists */ static u_char /* 0=no more time or blacklists */ name_lookup(DNSBL_WORK *blw, const DNSBL_DOM *tgt, DNSBL_FGS fgs) /* type of lookup */ { const DNSBL *dp; DNSBL_DOM probe; const char *p; int tgt_len, i; if (!have_name_dnsbl) return 1; for (dp = dnsbls; dp; dp = dp->fwd) { if (dp->bl_type != DNSBL_TYPE_NAME) continue; if ((dp->fgs & fgs) != fgs) continue; if (dp->fgs & DNSBL_FG_DUP) continue; if (!(blw->unhit.all & DNSBL_G2B(dp->group))) continue; /* trim trailing '.' from names */ p = tgt->c; tgt_len = strlen(p); if (tgt_len > 0 && p[tgt_len-1] == '.') --tgt_len; if (tgt_len != 0) { /* handle empty name */ /* truncate long names on the left and complain */ i = (tgt_len + dp->bl_dom_len) - (sizeof(probe.c) - 1); if (i > 0) { if (helper.debug) dnsbl_log(blw, 0, 0, "target \"%s\"" " is %d bytes too long", tgt->c, i); p += i; tgt_len -= i; } memcpy(&probe.c[0], p, tgt_len); probe.c[tgt_len++] = '.'; } memcpy(&probe.c[tgt_len], dp->bl_dom.c, dp->bl_dom_len); if (!lookup(blw, &probe, dp, fgs, tgt)) return 0; } return 1; } /* look for a domain name and its IP addresses in the DNS blacklists */ static u_char /* 0=no more time or blacklists */ name_ip_lookup(DNSBL_WORK *blw, const DNSBL_DOM *tgt, DNSBL_FGS fgs) /* type of lookup */ { const DCC_SOCKU *sup; struct in_addr ipv4[8]; struct in6_addr ipv6[4]; int i, error; /* check the name */ if (!name_lookup(blw, tgt, fgs)) return 0; /* cannot resolve a null name into an address to try in the DNSBLs */ if (tgt->c[0] == '\0') return 1; if (!time_ck_pre(blw, fgs)) return 0; /* check IPv4 addresses for the name in IPv4 DNSBLs */ if (have_ipv4_dnsbl) { dcc_host_lock(); /* first resolve IPv4 addresses for the URL or client name */ if (!dnsbl_get_host(blw, tgt, 0, &error, fgs)) { dcc_host_unlock(); if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "gethostbyname(%s): %s", tgt->c, DCC_HSTRERROR(error)); if (!time_ck_post(blw, fgs, error == TRY_AGAIN)) return 0; } else { /* Try several of the IP addresses for the domain. * Save any IP addresses we want to check before we * check them, because checking changes the array * of addresses. */ for (sup = dcc_hostaddrs, i = 0; sup < dcc_hostaddrs_end && i < DIM(ipv4); ++sup, ++i) { ipv4[i] = sup->ipv4.sin_addr; } dcc_host_unlock(); if (!time_ck_post(blw, fgs, 0)) return 0; /* check the addresses in all of the DNS blacklists */ do { if (!ip_lookup(blw, DNSBL_TYPE_IPV4, &ipv4[--i], fgs)) return 0; } while (i > 0); } } /* finally try IPv6 addresses for the name */ if (have_ipv6_dnsbl) { dcc_host_lock(); if (!dnsbl_get_host(blw, tgt, 1, &error, fgs)) { dcc_host_unlock(); if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "gethostbyname(%s): %s", tgt->c, DCC_HSTRERROR(error)); if (!time_ck_post(blw, fgs, error == TRY_AGAIN)) return 0; } else { for (sup = dcc_hostaddrs, i = 0; sup < dcc_hostaddrs_end && i < DIM(ipv6); ++sup, ++i) { ipv6[i] = sup->ipv6.sin6_addr; } dcc_host_unlock(); if (!time_ck_post(blw, fgs, 0)) return 0; do { if (!ip_lookup(blw, DNSBL_TYPE_IPV6, &ipv4[--i], fgs)) return 0; } while (i > 0); } } return 1; } /* check an SMTP client */ static void dnsbl_client(DNSBL_WORK *blw) { struct in_addr ipv4; if (blw->tgt.dom.c[0] != '\0' && blw->tgt.dom.c[0] != '[') name_lookup(blw, &blw->tgt.dom, DNSBL_FG_CLIENT); if (have_ipv4_dnsbl && dcc_ipv6toipv4(&ipv4, &blw->tgt.addr)) { if (!ip_lookup(blw, DNSBL_TYPE_IPV4, &ipv4, DNSBL_FG_CLIENT)) return; } if (have_ipv6_dnsbl && !ip_lookup(blw, DNSBL_TYPE_IPV6, &blw->tgt.addr, DNSBL_FG_CLIENT)) return; } #ifdef MXNS_DNSBL /* look at DNS resource records */ static u_char /* 1=continue 0=stop looking */ rr_lookup(DNSBL_WORK *blw, const char *name, /* see if this domain is blacklisted */ DNSBL_FGS fgs, u_short req_type) /* T_A, T_AAAA, or T_MX */ { union { u_char buf[PACKETSZ+20]; HEADER hdr; } answer; DNSBL_DOM dom; const u_char *ap, *ap1, *eom; int cnt, skip; u_short resp_type; u_short resp_class, rdlength; int i; if (!time_ck_pre(blw, fgs)) return 0; /* resolve a set of RRs of the desired type for a name */ dnsbl_res_delays(blw); dcc_host_lock(); i = res_query(name, C_IN, req_type, answer.buf, sizeof(answer.buf)); dcc_host_unlock(); if (i < 0) { /* use raw hstrerror() here because we are using the * raw resolver */ if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "res_query(%s): %s", name, hstrerror(h_errno)); /* stop looking after too much time or NXDOMAIN */ return (time_ck_post(blw, fgs, h_errno == TRY_AGAIN) && h_errno != HOST_NOT_FOUND); } if (!time_ck_post(blw, fgs, 0)) return 0; ap = &answer.buf[HFIXEDSZ]; if (i > ISZ(answer.buf)) i = ISZ(answer.buf); eom = &answer.buf[i]; /* skip the question */ cnt = ntohs(answer.hdr.qdcount); while (--cnt >= 0) { skip = dn_skipname(ap, eom); if (skip < 0) { if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "dn_skipname(%s)=%d", name, skip); /* look for other RRs */ return 1; } ap += skip+QFIXEDSZ; } /* check each name or address RR in the answer section */ for (cnt = ntohs(answer.hdr.ancount); --cnt >= 0 && ap < eom; ap += rdlength) { /* get the name */ skip = dn_expand(answer.buf, eom, ap, dom.c, sizeof(dom.c)); if (skip < 0) { if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "answer dn_expand(%s)=%d", name, skip); return 1; } ap += skip; /* get RR type and class and skip strange RRs */ GETSHORT(resp_type, ap); GETSHORT(resp_class, ap); ap += 4; /* skip TTL */ GETSHORT(rdlength, ap); /* get rdlength */ /* we care only about relevant answers */ if (resp_type != req_type || resp_class != C_IN) continue; if (req_type == T_MX) { /* check MX name */ ap1 = ap + 2; /* skip MX preference */ skip = dn_expand(answer.buf, eom, ap1, dom.c, sizeof(dom.c)); if (skip < 0) { if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "MX dn_expand(%s)=%d", name, skip); return 1; } if (dom.c[0] == '\0' && helper.debug > 1) dnsbl_log(blw, 0, fgs, "null MX name"); if (!name_ip_lookup(blw, &dom, fgs)) return 0; } else if (req_type == T_A) { if (!ip_lookup(blw, DNSBL_TYPE_IPV4, ap, fgs)) return 0; #ifndef NO_IPV6 } else if (req_type == T_AAAA) { if (!ip_lookup(blw, DNSBL_TYPE_IPV6, ap, fgs)) return 0; #endif } } /* check the authority section only if we care about name servers * and we are not looking for MX servers */ if ((fgs & DNSBL_FG_MX) || 0 == ((fgs & DNSBL_FG_URL) ? blw->unhit.url_ns : blw->unhit.mail_host_ns)) return 1; /* we could look at the additional section, but it can be incomplete */ fgs |= DNSBL_FG_NS; for (cnt = ntohs(answer.hdr.nscount); --cnt >= 0 && ap < eom; ap += rdlength) { /* get the name */ skip = dn_expand(answer.buf, eom, ap, dom.c, sizeof(dom.c)); if (skip < 0) { if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "ns dn_expand(%s)=%d", name, skip); return 1; } ap += skip; /* get RR type and class */ GETSHORT(resp_type, ap); GETSHORT(resp_class, ap); ap += 4; /* skip TTL */ GETSHORT(rdlength, ap); /* get rdlength */ /* we care only about NS RRs */ if (resp_type != T_NS || resp_class != C_IN) continue; skip = dn_expand(answer.buf, eom, ap, dom.c, sizeof(dom.c)); if (skip < 0) { if (helper.debug > 1) dnsbl_log(blw, 0, fgs, "ns answer dn_expand(%s)=%d", name, skip); return 1; } if (dom.c[0] == '\0' && helper.debug > 1) dnsbl_log(blw, 0, fgs, "null NS name"); if (!name_ip_lookup(blw, &dom, fgs)) return 0; } return 1; } #endif /* MXNS_DNSBL */ /* look for a domain in the DNS blacklists, including its MX & NS servers */ static void dnsbl_name_host_url(DNSBL_WORK *blw, DNSBL_FGS fg) { struct in_addr ipv4; #ifndef NO_IPV6 struct dcc_in6_addr ipv6; #endif /* recognize an ASCII IP address */ ipv4.s_addr = inet_addr(blw->tgt.dom.c); if (INADDR_NONE != ipv4.s_addr) { ip_lookup(blw, DNSBL_TYPE_IPV4, &ipv4, fg); return; } #ifndef NO_IPV6 if (0 < inet_pton(AF_INET6, blw->tgt.dom.c, &ipv6)) { ip_lookup(blw, DNSBL_TYPE_IPV6, &ipv6, fg); return; } #endif #ifndef MXNS_DNSBL /* check simple name and its addresses if we do not have a * resolver library */ name_ip_lookup(blw, &blw->tgt.dom, fg); #else /* MXNS_DNSBL */ /* If we have a resolver library, check first for the name itself */ if (!name_lookup(blw, &blw->tgt.dom, fg)) return; /* Look for name servers in the authority section after asking for * A RRs. You cannot rely on the bad guys' DNS servers to answer an * ANY request */ if (have_ipv4_dnsbl && !rr_lookup(blw, blw->tgt.dom.c, fg, T_A)) return; #ifndef NO_IPV6 if (have_ipv6_dnsbl && !rr_lookup(blw, blw->tgt.dom.c, fg, T_AAAA)) return; #endif /* Check MX servers if allowed by at least one DNS blacklist. * To ape the fall back to A RRs when MX RRs are missing, we need to * check A RR for evil. However, we've already done that */ if (0 != ((fg & DNSBL_FG_URL) ? blw->unhit.url_mx : blw->unhit.mail_host_mx)) rr_lookup(blw, blw->tgt.dom.c, fg | DNSBL_FG_MX, T_MX); #endif /* MXNS_DNSBL */ } #ifdef HAVE_HELPERS /* do some DNSBL work in a helper process */ u_char /* 1=try to send the response */ dnsbl_work(const DNSBL_REQ *req, DNSBL_RESP *resp) { DNSBL_WORK blw; DNSBL_RESP_GROUP *rst; DNSBL_GROUP *blg; int gnum, i; blw_clear(&blw); blw.url_start = req->hdr.start; blw.msg_us = MAX_MSG_SECS*DCC_US*2; blw.url_us = req->hdr.avail_us; blw.url_us_used = 0; blw.id = req->hdr.id; blw.dcc_ctxt = 0; blw.log_ctxt = 0; if (!is_helper) { /* this must be the first job for this helper process */ is_helper = 1; helper_str = " helper"; fix_url_secs(); } blw.unhit = req->unhit; for (i = 0, blg = blw.groups; i < MAX_DNSBL_GROUPS; ++i, ++blg) blg->fgs = req->fgs[i]; switch (req->fg) { case DNSBL_FG_CLIENT: /* SMTP client IP address */ blw.tgt.addr = req->tgt.addr; BUFCPY(blw.tgt.dom.c, req->tgt.dom.c); dnsbl_client(&blw); break; case DNSBL_FG_MAIL_HOST: /* envelope mail_from */ case DNSBL_FG_URL: /* URL in body */ BUFCPY(blw.tgt.dom.c, req->tgt.dom.c); dnsbl_name_host_url(&blw, req->fg); break; default: dcc_logbad(EX_SOFTWARE, "%s DNSBL%s unknown type %d", req->hdr.id, helper_str, req->fg); } resp->unhit = blw.unhit; for (gnum = 0, blg = blw.groups, rst = resp->groups; gnum < MAX_DNSBL_GROUPS; ++gnum, ++rst, ++blg) { rst->fgs = blg->fgs; /* copy hit & timeout flags */ if (0 == ((resp->unhit.all ^ req->unhit.all) & DNSBL_G2B(gnum))) { /* no new hit here in the helper * or had a hit in the parent */ rst->bl_num = -1; rst->probe.c[0] = '\0'; rst->result[0] = '\0'; } else { rst->bl_num = blg->dnsbl->bl_num; BUFCPY(rst->tgt.c, blg->tgt.c); BUFCPY(rst->probe.c, blg->probe.c); BUFCPY(rst->result, blg->result); } } return 1; } /* ask a helper process to check for something in the DNS blacklists */ static void use_helper(DNSBL_WORK *blw, DNSBL_FGS fg) { DNSBL_REQ req; DNSBL_RESP resp; DNSBL_RESP_GROUP *rst; DNSBL_GROUP *blg; const DNSBL *dp; int gnum, i; memset(&req, 0, sizeof(req)); BUFCPY(req.hdr.id, blw->id); req.unhit = blw->unhit; for (gnum = 0, blg = blw->groups; gnum < MAX_DNSBL_GROUPS; ++gnum, ++blg) req.fgs[gnum] = blg->fgs; req.fg = fg; switch (fg) { case DNSBL_FG_CLIENT: BUFCPY(req.tgt.dom.c, blw->tgt.dom.c); req.tgt.addr = blw->tgt.addr; break; case DNSBL_FG_MAIL_HOST: case DNSBL_FG_URL: BUFCPY(req.tgt.dom.c, blw->tgt.dom.c); break; default: dcc_logbad(EX_SOFTWARE, "unknown DNSBL type %d", fg); } if (!ask_helper(blw->dcc_ctxt, blw->log_ctxt, url_us, &req.hdr, sizeof(req), &resp.hdr, sizeof(resp))) { time_ck_post(blw, fg, 1); msg_secs_fin(blw); return; } blw->unhit = resp.unhit; /* record hits and timeouts seen by the helper */ for (gnum = 0, blg = blw->groups, rst = resp.groups; gnum < MAX_DNSBL_GROUPS; ++gnum, ++rst, ++blg) { blg->fgs = rst->fgs; if (0 == ((resp.unhit.all ^ req.unhit.all) & DNSBL_G2B(gnum))) continue; /* This group has a new hit. * Discover the right DNSBL so we can use the right * template for the SMTP status message */ for (i = rst->bl_num, dp = dnsbls; i > 1; --i, dp = dp->fwd) { if (!dp) dcc_logbad(EX_SOFTWARE, "bad helper DNSBL #%d", rst->bl_num); } blg->dnsbl = dp; BUFCPY(blg->tgt.c, rst->tgt.c); BUFCPY(blg->probe.c, rst->probe.c); BUFCPY(blg->result, rst->result); blg->btype = type_str(blg->btype_buf, sizeof(blg->btype_buf), blw, blg->fgs); } msg_secs_fin(blw); } #endif /* HAVE_HELPERS */ void dcc_client_dnsbl(DNSBL_WORK *blw, const struct in6_addr *addr, const char *name) { /* nothing to do if no client DNS blacklists have been configured */ if (!blw || !blw->unhit.client) return; /* or if we have already spent too much time checking blacklists */ if (!msg_secs_start(blw, DNSBL_FG_CLIENT)) return; BUFCPY(blw->tgt.dom.c, name); blw->tgt.addr = *addr; #ifdef HAVE_HELPERS if (have_helpers) { use_helper(blw, DNSBL_FG_CLIENT); return; } #endif dnsbl_client(blw); msg_secs_fin(blw); } void dcc_mail_host_dnsbl(DNSBL_WORK *blw, const char *host) { /* nothing to do if no DNS blacklists have been configured * or we do not have an envelope Mail_From host name * or no recipients care about mail_host hits */ if (!blw || !blw->unhit.mail_host || !host || *host == '\0') return; /* or no still active DNSBLs care about the Mail_From host name */ /* or if we have already spent too much time checking blacklists */ if (!msg_secs_start(blw, DNSBL_FG_MAIL_HOST)) return; BUFCPY(blw->tgt.dom.c, host); #ifdef HAVE_HELPERS if (have_helpers) { use_helper(blw, DNSBL_FG_MAIL_HOST); return; } #endif dnsbl_name_host_url(blw, DNSBL_FG_MAIL_HOST); msg_secs_fin(blw); } void url_dnsbl(DNSBL_WORK *blw) { int i; /* nothing to do if no body URL DNSBLs have been configured * or if we already have hits for all DNSBLs */ if (!blw || !blw->unhit.url) return; /* or if we have already spent too much time checking blacklists */ if (!msg_secs_start(blw, DNSBL_FG_URL)) return; /* avoid checking the same names */ for (i = 0; i < DIM(blw->tgt_cache); ++i) { if (!strcmp(blw->tgt.dom.c, blw->tgt_cache[i].dom.c)) { if (helper.debug > 1) dnsbl_log(blw, 0, DNSBL_FG_URL, "tgt_cache hit"); blw->tgt_cache_pos = i; return; } } BUFCPY(blw->tgt_cache[blw->tgt_cache_pos].dom.c, blw->tgt.dom.c); blw->tgt_cache_pos = (blw->tgt_cache_pos + 1) % DIM(blw->tgt_cache); #ifdef HAVE_HELPERS if (have_helpers) { use_helper(blw, DNSBL_FG_URL); return; } #endif dnsbl_name_host_url(blw, DNSBL_FG_URL); msg_secs_fin(blw); }