use Xdgmime;
use Data::Dumper;
use Digest::SHA;
+use Digest::MD5;
use Net::IP;
use Socket;
use RRDs;
use Filesys::Df;
use Encode;
+use utf8;
+no utf8;
+
use HTML::Entities;
use PVE::ProcFSTools;
use PMG::MailQueue;
use PMG::SMTPPrinter;
-my $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
-
-PVE::JSONSchema::register_format('pmg-realm', \&verify_realm);
-sub verify_realm {
- my ($realm, $noerr) = @_;
-
- if ($realm !~ m/^${realm_regex}$/) {
- return undef if $noerr;
- die "value does not look like a valid realm\n";
- }
- return $realm;
-}
+my $valid_pmg_realms = ['pam', 'pmg', 'quarantine'];
PVE::JSONSchema::register_standard_option('realm', {
description => "Authentication domain ID",
- type => 'string', format => 'pmg-realm',
+ type => 'string',
+ enum => $valid_pmg_realms,
maxLength => 32,
});
# colon separated lists)!
# slash is not allowed because it is used as pve API delimiter
# also see "man useradd"
- if ($username =~ m!^([^\s:/]+)\@(${realm_regex})$!) {
+ my $realm_list = join('|', @$valid_pmg_realms);
+ if ($username =~ m!^([^\s:/]+)\@(${realm_list})$!) {
return wantarray ? ($username, $1, $2) : $username;
}
PVE::JSONSchema::register_standard_option('pmg-email-address', {
description => "Email Address (allow most characters).",
type => 'string',
- pattern => '(?:|[^\s\/\@]+\@[^\s\/\@]+)',
+ pattern => '(?:[^\s\/\\\@]+\@[^\s\/\\\@]+)',
maxLength => 512,
minLength => 3,
});
+PVE::JSONSchema::register_standard_option('pmg-whiteblacklist-entry-list', {
+ description => "White/Blacklist entry list (allow most characters). Can contain globs",
+ type => 'string',
+ pattern => '(?:[^\s\/\\\;\,]+)(?:\,[^\s\/\\\;\,]+)*',
+ minLength => 3,
+});
+
sub lastid {
my ($dbh, $seq) = @_;
}
}
- if (!$smtp->mail($sender)) {
+ my $has_utf8_targets = 0;
+ foreach my $target (@$targets) {
+ if (utf8::is_utf8($target)) {
+ $has_utf8_targets = 1;
+ last;
+ }
+ }
+
+ my $mail_opts = " BODY=8BITMIME";
+ my $sender_addr;
+ if (utf8::is_utf8($sender)) {
+ $sender_addr = encode('UTF-8', $smtp->_addr($sender));
+ $mail_opts .= " SMTPUTF8";
+ } else {
+ $sender_addr = $smtp->_addr($sender);
+ $mail_opts .= " SMTPUTF8" if $has_utf8_targets;
+ }
+
+ if (!$smtp->_MAIL("FROM:" . $sender_addr . $mail_opts)) {
syslog('err', "smtp error - got: %s %s", $smtp->code, scalar ($smtp->message));
die "smtp from: ERROR";
}
- my $dsnopts = $nodsn ? {Notify => ['NEVER']} : {};
+ my $rcpt_opts = $nodsn ? " NOTIFY=NEVER" : "";
- if (!$smtp->to (@$targets, $dsnopts)) {
- syslog ('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
- die "smtp to: ERROR";
+ foreach my $target (@$targets) {
+ my $rcpt_addr;
+ if (utf8::is_utf8($target)) {
+ $rcpt_addr = encode('UTF-8', $smtp->_addr($target));
+ } else {
+ $rcpt_addr = $smtp->_addr($target);
+ }
+ if (!$smtp->_RCPT("TO:" . $rcpt_addr . $rcpt_opts)) {
+ syslog ('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
+ die "smtp to: ERROR";
+ }
}
# Output the head:
return $vinfo ? "$vinfo (clamav)" : undef;
}
+sub analyze_virus_avast {
+ my ($queue, $dname, $pmg_cfg) = @_;
+
+ my $timeout = 60*5;
+ my $vinfo;
+
+ my ($csec, $usec) = gettimeofday();
+
+ my $previous_alarm;
+
+ eval {
+
+ $previous_alarm = alarm($timeout);
+
+ $SIG{ALRM} = sub {
+ die "$queue->{logid}: Maximum time ($timeout sec) exceeded. " .
+ "virus analyze (avast) failed: ERROR";
+ };
+
+ open(my $cmd, '-|', '/bin/scan', $dname) ||
+ die "$queue->{logid}: can't exec avast scan: $! : ERROR";
+
+ my $response = '';
+ while (defined(my $line = <$cmd>)) {
+ if ($line =~ m/^$dname\s+(.*\S)\s*$/) {
+ # we just use the first detected virus name
+ $vinfo = $1 if !$vinfo;
+ }
+
+ $response .= $line;
+ }
+
+ close($cmd);
+
+ alarm(0); # avoid race conditions
+
+ if ($vinfo) {
+ syslog('info', "$queue->{logid}: virus detected: $vinfo (avast)");
+ }
+ };
+ my $err = $@;
+
+ alarm($previous_alarm);
+
+ my ($csec_end, $usec_end) = gettimeofday();
+ $queue->{ptime_clam} =
+ int (($csec_end-$csec)*1000 + ($usec_end - $usec)/1000);
+
+ if ($err) {
+ syslog ('err', $err);
+ $vinfo = undef;
+ $queue->{errors} = 1;
+ }
+
+ return undef if !$vinfo;
+
+ $queue->{vinfo_avast} = $vinfo;
+
+ return "$vinfo (avast)";
+}
+
sub analyze_virus {
my ($queue, $filename, $pmg_cfg, $testmode) = @_;
# TODO: support other virus scanners?
- # always scan with clamav
- return analyze_virus_clam($queue, $filename, $pmg_cfg);
+ if ($testmode) {
+ my $vinfo_clam = analyze_virus_clam($queue, $filename, $pmg_cfg);
+ my $vinfo_avast = analyze_virus_avast($queue, $filename, $pmg_cfg);
+
+ return $vinfo_avast || $vinfo_clam;
+ }
+
+ my $enable_avast = $pmg_cfg->get('admin', 'avast');
+
+ if ($enable_avast) {
+ if (my $vinfo = analyze_virus_avast($queue, $filename, $pmg_cfg)) {
+ return $vinfo;
+ }
+ }
+
+ my $enable_clamav = $pmg_cfg->get('admin', 'clamav');
+
+ if ($enable_clamav) {
+ if (my $vinfo = analyze_virus_clam($queue, $filename, $pmg_cfg)) {
+ return $vinfo;
+ }
+ }
+
+ return undef;
}
sub magic_mime_type_for_file {
}
sub find_local_network_for_ip {
- my ($ip) = @_;
+ my ($ip, $noerr) = @_;
my $testip = Net::IP->new($ip);
}
}
+ return undef if $noerr;
+
die "unable to detect local network for ip '$ip'\n";
}
return $res;
}
+our $db_service_list = [
+ 'pmgpolicy', 'pmgmirror', 'pmgtunnel', 'pmg-smtp-filter' ];
+
sub service_wait_stopped {
my ($timeout, $service_list) = @_;
my ($service, $cmd) = @_;
die "unknown service command '$cmd'\n"
- if $cmd !~ m/^(start|stop|restart|reload)$/;
+ if $cmd !~ m/^(start|stop|restart|reload|reload-or-restart)$/;
if ($service eq 'pmgdaemon' || $service eq 'pmgproxy') {
- if ($cmd eq 'restart') {
- # OK
- } else {
- die "invalid service cmd '$service $cmd': ERROR";
- }
+ die "invalid service cmd '$service $cmd': ERROR" if $cmd eq 'stop';
+ } elsif ($service eq 'fetchmail') {
+ # use restart instead of start - else it does not start 'exited' unit
+ # after setting START_DAEMON=yes in /etc/default/fetchmail
+ $cmd = 'restart' if $cmd eq 'start';
}
$service = $service_aliases->{$service} // $service;
# make sure the file exists (else postmap fails)
IO::File->new($filename, 'a', 0644);
- my $age_src = -M $filename // 0;
- my $age_dst = -M "$filename.db" // 10000000000;
+ my $mtime_src = (CORE::stat($filename))[9] //
+ die "unbale to read mtime of $filename\n";
+
+ my $mtime_dst = (CORE::stat("$filename.db"))[9] // 0;
# if not changed, do nothing
- return if $age_src > $age_dst;
+ return if $mtime_src <= $mtime_dst;
eval {
PVE::Tools::run_command(
my $netin = 0;
my $netout = 0;
foreach my $dev (keys %$netdev) {
- next if $dev !~ m/^eth\d+$/;
+ next if $dev !~ m/^$PVE::Network::PHYSICAL_NIC_RE$/;
$netin += $netdev->{$dev}->{receive};
$netout += $netdev->{$dev}->{transmit};
}
}
sub load_sa_descriptions {
+ my ($additional_dirs) = @_;
my @dirs = ('/usr/share/spamassassin',
'/usr/share/spamassassin-extra');
+ push @dirs, @$additional_dirs if @$additional_dirs;
+
my $res = {};
my $parse_sa_file = sub {
}
}
+ $res->{'ClamAVHeuristics'}->{desc} = "ClamAV heuristic tests";
+
return $res;
}
return ($start, $end);
}
+my $rbl_scan_last_cursor;
+my $rbl_scan_start_time = time();
+
+sub scan_journal_for_rbl_rejects {
+
+ # example postscreen log entry for RBL rejects
+ # Aug 29 08:00:36 proxmox postfix/postscreen[11266]: NOQUEUE: reject: RCPT from [x.x.x.x]:1234: 550 5.7.1 Service unavailable; client [x.x.x.x] blocked using zen.spamhaus.org; from=<xxxx>, to=<yyyy>, proto=ESMTP, helo=<zzz>
+
+ # example for PREGREET reject
+ # Dec 7 06:57:11 proxmox postfix/postscreen[32084]: PREGREET 14 after 0.23 from [x.x.x.x]:63492: EHLO yyyyy\r\n
+
+ my $identifier = 'postfix/postscreen';
+
+ my $rbl_count = 0;
+ my $pregreet_count = 0;
+
+ my $parser = sub {
+ my $line = shift;
+
+ if ($line =~ m/^--\scursor:\s(\S+)$/) {
+ $rbl_scan_last_cursor = $1;
+ return;
+ }
+
+ if ($line =~ m/\s$identifier\[\d+\]:\sNOQUEUE:\sreject:.*550 5.7.1 Service unavailable;/) {
+ $rbl_count++;
+ } elsif ($line =~ m/\s$identifier\[\d+\]:\sPREGREET\s\d+\safter\s/) {
+ $pregreet_count++;
+ }
+ };
+
+ # limit to last 5000 lines to avoid long delays
+ my $cmd = ['journalctl', '--show-cursor', '-o', 'short-unix', '--no-pager',
+ '--identifier', $identifier, '-n', 5000];
+
+ if (defined($rbl_scan_last_cursor)) {
+ push @$cmd, "--after-cursor=${rbl_scan_last_cursor}";
+ } else {
+ push @$cmd, "--since=@" . $rbl_scan_start_time;
+ }
+
+ PVE::Tools::run_command($cmd, outfunc => $parser);
+
+ return ($rbl_count, $pregreet_count);
+}
+
+my $hwaddress;
+
+sub get_hwaddress {
+
+ return $hwaddress if defined ($hwaddress);
+
+ my $fn = '/etc/ssh/ssh_host_rsa_key.pub';
+ my $sshkey = PVE::Tools::file_get_contents($fn);
+ $hwaddress = uc(Digest::MD5::md5_hex($sshkey));
+
+ return $hwaddress;
+}
+
+my $default_locale = "en_US.UTF-8 UTF-8";
+
+sub cond_add_default_locale {
+
+ my $filename = "/etc/locale.gen";
+
+ open(my $infh, "<", $filename) || return;
+
+ while (defined(my $line = <$infh>)) {
+ if ($line =~ m/^\Q${default_locale}\E/) {
+ # already configured
+ return;
+ }
+ }
+
+ seek($infh, 0, 0) // return; # seek failed
+
+ open(my $outfh, ">", "$filename.tmp") || return;
+
+ my $done;
+ while (defined(my $line = <$infh>)) {
+ if ($line =~ m/^#\s*\Q${default_locale}\E.*/) {
+ print $outfh "${default_locale}\n" if !$done;
+ $done = 1;
+ } else {
+ print $outfh $line;
+ }
+ }
+
+ print STDERR "generation pmg default locale\n";
+
+ rename("$filename.tmp", $filename) || return; # rename failed
+
+ system("dpkg-reconfigure locales -f noninteractive");
+}
+
1;