10 use POSIX
qw(strftime);
15 use Time
::HiRes qw
(gettimeofday
);
35 my $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
37 PVE
::JSONSchema
::register_format
('pmg-realm', \
&verify_realm
);
39 my ($realm, $noerr) = @_;
41 if ($realm !~ m/^${realm_regex}$/) {
42 return undef if $noerr;
43 die "value does not look like a valid realm\n";
48 PVE
::JSONSchema
::register_standard_option
('realm', {
49 description
=> "Authentication domain ID",
50 type
=> 'string', format
=> 'pmg-realm',
54 PVE
::JSONSchema
::register_format
('pmg-userid', \
&verify_username
);
56 my ($username, $noerr) = @_;
58 $username = '' if !$username;
59 my $len = length($username);
61 die "user name '$username' is too short\n" if !$noerr;
65 die "user name '$username' is too long ($len > 64)\n" if !$noerr;
69 # we only allow a limited set of characters
70 # colon is not allowed, because we store usernames in
71 # colon separated lists)!
72 # slash is not allowed because it is used as pve API delimiter
73 # also see "man useradd"
74 if ($username =~ m!^([^\s:/]+)\@(${realm_regex})$!) {
75 return wantarray ?
($username, $1, $2) : $username;
78 die "value '$username' does not look like a valid user name\n" if !$noerr;
83 PVE
::JSONSchema
::register_standard_option
('userid', {
84 description
=> "User ID",
85 type
=> 'string', format
=> 'pmg-userid',
90 PVE
::JSONSchema
::register_standard_option
('username', {
91 description
=> "Username (without realm)",
93 pattern
=> '[^\s:\/\@]{3,60}',
101 return $dbh->last_insert_id(
102 undef, undef, undef, undef, { sequence
=> $seq});
105 # quote all regex operators
109 $val =~ s/([\(\)\[\]\/\}\+\*\?\.\|\^\$\\])/\\$1/g;
114 sub file_older_than
{
115 my ($filename, $lasttime) = @_;
117 my $st = stat($filename);
119 return 0 if !defined($st);
121 return ($lasttime >= $st->ctime);
124 sub extract_filename
{
127 if (my $value = $head->recommended_filename()) {
129 if (my $decvalue = MIME
::Words
::decode_mimewords
($value)) {
130 $decvalue =~ s/\0/ /g;
131 $decvalue = PVE
::Tools
::trim
($decvalue);
140 my ($entity, $add_id, $id) = @_;
144 foreach my $tag (grep {/^x-proxmox-tmp/i} $entity->head->tags) {
145 $entity->head->delete ($tag);
148 $entity->head->replace('X-Proxmox-tmp-AID', $id) if $add_id;
150 foreach my $part ($entity->parts) {
151 $id = remove_marks
($part, $add_id, $id + 1);
158 my ($body, $dh) = @_;
162 foreach my $k (keys %$dh) {
165 $body =~ s/__\Q${k}\E__/$v/gs;
173 my ($entity, $sender, $targets, $xforward, $me, $nodsn) = @_;
181 my $smtp = Net
::SMTP-
>new('127.0.0.1', Port
=> 10025, Hello
=> $me) ||
182 die "unable to connect to localhost at port 10025";
184 if (defined($xforward)) {
187 foreach my $attr (keys %{$xforward}) {
188 $xfwd .= " $attr=$xforward->{$attr}";
191 if ($xfwd && $smtp->command("XFORWARD", $xfwd)->response() != CMD_OK
) {
192 syslog
('err', "xforward error - got: %s %s", $smtp->code, scalar($smtp->message));
196 if (!$smtp->mail($sender)) {
197 syslog
('err', "smtp error - got: %s %s", $smtp->code, scalar ($smtp->message));
198 die "smtp from: ERROR";
201 my $dsnopts = $nodsn ?
{Notify
=> ['NEVER']} : {};
203 if (!$smtp->to (@$targets, $dsnopts)) {
204 syslog
('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
205 die "smtp to: ERROR";
209 #$entity->sync_headers ();
212 my $out = PMG
::SMTPPrinter-
>new($smtp);
213 $entity->print($out);
215 # make sure we always have a newline at the end of the mail
216 # else dataend() fails
217 $smtp->datasend("\n");
219 if ($smtp->dataend()) {
220 my @msgs = $smtp->message;
221 $resmess = $msgs[$#msgs];
222 ($resid) = $resmess =~ m/Ok: queued as ([0-9A-Z]+)/;
223 $rescode = $smtp->code;
225 die sprintf("unexpected SMTP result - got: %s %s : WARNING", $smtp->code, $resmess);
228 my @msgs = $smtp->message;
229 $resmess = $msgs[$#msgs];
230 $rescode = $smtp->code;
231 die sprintf("sending data failed - got: %s %s : ERROR", $smtp->code, $resmess);
236 $smtp->quit if $smtp;
239 syslog
('err', $err);
242 return wantarray ?
($resid, $rescode, $resmess) : $resid;
245 sub analyze_virus_clam
{
246 my ($queue, $dname, $pmg_cfg) = @_;
251 my $clamdscan_opts = "--stdout";
253 my ($csec, $usec) = gettimeofday
();
259 $previous_alarm = alarm($timeout);
262 die "$queue->{logid}: Maximum time ($timeout sec) exceeded. " .
263 "virus analyze (clamav) failed: ERROR";
266 open(CMD
, "/usr/bin/clamdscan $clamdscan_opts '$dname'|") ||
267 die "$queue->{logid}: can't exec clamdscan: $! : ERROR";
272 while (defined(my $line = <CMD
>)) {
273 if ($line =~ m/^$dname.*:\s+([^ :]*)\s+FOUND$/) {
274 # we just use the first detected virus name
275 $vinfo = $1 if !$vinfo;
276 } elsif ($line =~ m/^Infected files:\s(\d*)$/i) {
285 alarm(0); # avoid race conditions
287 if (!defined($ifiles)) {
288 die "$queue->{logid}: got undefined output from " .
289 "virus detector: $response : ERROR";
293 syslog
('info', "$queue->{logid}: virus detected: $vinfo (clamav)");
298 alarm($previous_alarm);
300 my ($csec_end, $usec_end) = gettimeofday
();
301 $queue->{ptime_clam
} =
302 int (($csec_end-$csec)*1000 + ($usec_end - $usec)/1000);
305 syslog
('err', $err);
307 $queue->{errors
} = 1;
310 $queue->{vinfo_clam
} = $vinfo;
312 return $vinfo ?
"$vinfo (clamav)" : undef;
316 my ($queue, $filename, $pmg_cfg, $testmode) = @_;
318 # TODO: support other virus scanners?
320 # always scan with clamav
321 return analyze_virus_clam
($queue, $filename, $pmg_cfg);
324 sub magic_mime_type_for_file
{
327 # we do not use get_mime_type_for_file, because that considers
328 # filename extensions - we only want magic type detection
330 my $bufsize = Xdgmime
::xdg_mime_get_max_buffer_extents
();
331 die "got strange value for max_buffer_extents" if $bufsize > 4096*10;
333 my $ct = "application/octet-stream";
335 my $fh = IO
::File-
>new("<$filename") ||
336 die "unable to open file '$filename' - $!";
339 if (($len = $fh->read($buf, $bufsize)) > 0) {
340 $ct = xdg_mime_get_mime_type_for_data
($buf, $len);
344 die "unable to read file '$filename' - $!" if ($len < 0);
352 if (my $path = $entity->{PMX_decoded_path
}) {
354 # set a reasonable default if magic does not give a result
355 $entity->{PMX_magic_ct
} = $entity->head->mime_attr('content-type');
357 if (my $ct = magic_mime_type_for_file
($path)) {
358 if ($ct ne 'application/octet-stream' || !$entity->{PMX_magic_ct
}) {
359 $entity->{PMX_magic_ct
} = $ct;
363 my $filename = $entity->head->recommended_filename;
364 $filename = basename
($path) if !defined($filename) || $filename eq '';
366 if (my $ct = xdg_mime_get_mime_type_from_file_name
($filename)) {
367 $entity->{PMX_glob_ct
} = $ct;
371 foreach my $part ($entity->parts) {
372 add_ct_marks
($part);
376 # x509 certificate utils
378 # only write output if something fails
384 my $record_output = sub {
390 PVE
::Tools
::run_command
($cmd, outfunc
=> $record_output,
391 errfunc
=> $record_output);
396 print STDERR
$outbuf;
401 my $proxmox_tls_cert_fn = "/etc/pmg/pmg-tls.pem";
403 sub gen_proxmox_tls_cert
{
406 my $resolv = PVE
::INotify
::read_file
('resolvconf');
407 my $domain = $resolv->{search
};
409 my $company = $domain; # what else ?
410 my $cn = "*.$domain";
412 return if !$force && -f
$proxmox_tls_cert_fn;
414 my $sslconf = <<__EOD__;
415 RANDFILE = /root/.rnd
420 distinguished_name = req_distinguished_name
421 req_extensions = v3_req
423 string_mask = nombstr
425 [ req_distinguished_name ]
426 organizationalUnitName = Proxmox Mail Gateway
427 organizationName = $company
431 basicConstraints = CA:FALSE
433 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
436 my $cfgfn = "/tmp/pmgtlsconf-$$.tmp";
437 my $fh = IO
::File-
>new ($cfgfn, "w");
442 my $cmd = ['openssl', 'req', '-batch', '-x509', '-new', '-sha256',
443 '-config', $cfgfn, '-days', 3650, '-nodes',
444 '-out', $proxmox_tls_cert_fn,
445 '-keyout', $proxmox_tls_cert_fn];
446 run_silent_cmd
($cmd);
450 unlink $proxmox_tls_cert_fn;
452 die "unable to generate proxmox certificate request:\n$err";
458 sub find_local_network_for_ip
{
461 my $testip = Net
::IP-
>new($ip);
463 my $isv6 = $testip->version == 6;
465 PVE
::ProcFSTools
::read_proc_net_ipv6_route
() :
466 PVE
::ProcFSTools
::read_proc_net_route
();
468 foreach my $entry (@$routes) {
471 $mask = $entry->{prefix
};
472 next if !$mask; # skip the default route...
474 $mask = $PVE::Network
::ipv4_mask_hash_localnet-
>{$entry->{mask
}};
475 next if !defined($mask);
477 my $cidr = "$entry->{dest}/$mask";
478 my $testnet = Net
::IP-
>new($cidr);
479 my $overlap = $testnet->overlaps($testip);
480 if ($overlap == $Net::IP
::IP_B_IN_A_OVERLAP
||
481 $overlap == $Net::IP
::IP_IDENTICAL
)
487 die "unable to detect local network for ip '$ip'\n";
490 my $service_aliases = {
491 'postfix' => 'postfix@-',
492 'postgres' => 'postgresql@9.6-main',
495 sub lookup_real_service_name
{
498 return $service_aliases->{$alias} // $alias;
501 sub get_full_service_state
{
508 if ($line =~ m/^([^=\s]+)=(.*)$/) {
513 $service = $service_aliases->{$service} // $service;
514 PVE
::Tools
::run_command
(['systemctl', 'show', $service], outfunc
=> $parser);
519 sub service_wait_stopped
{
520 my ($timeout, $service_list) = @_;
522 my $starttime = time();
524 foreach my $service (@$service_list) {
525 PVE
::Tools
::run_command
(['systemctl', 'stop', $service]);
531 foreach my $service (@$service_list) {
532 my $ss = get_full_service_state
($service);
533 my $state = $ss->{ActiveState
} // 'unknown';
535 if ($state ne 'inactive') {
536 if ((time() - $starttime) > $timeout) {
537 syslog
('err', "unable to stop services (got timeout)");
552 my ($service, $cmd) = @_;
554 die "unknown service command '$cmd'\n"
555 if $cmd !~ m/^(start|stop|restart|reload)$/;
557 if ($service eq 'pmgdaemon' || $service eq 'pmgproxy') {
558 if ($cmd eq 'restart') {
561 die "invalid service cmd '$service $cmd': ERROR";
565 $service = $service_aliases->{$service} // $service;
566 PVE
::Tools
::run_command
(['systemctl', $cmd, $service]);
569 # this is also used to get the IP of the local node
571 my ($nodename, $noerr) = @_;
573 my ($family, $packed_ip);
576 my @res = PVE
::Tools
::getaddrinfo_all
($nodename);
577 $family = $res[0]->{family
};
578 $packed_ip = (PVE
::Tools
::unpack_sockaddr_in46
($res[0]->{addr
}))[2];
582 die "hostname lookup failed:\n$@" if !$noerr;
586 my $ip = Socket
::inet_ntop
($family, $packed_ip);
587 if ($ip =~ m/^127\.|^::1$/) {
588 die "hostname lookup failed - got local IP address ($nodename = $ip)\n" if !$noerr;
592 return wantarray ?
($ip, $family) : $ip;
598 # make sure the file exists (else postmap fails)
599 IO
::File-
>new($filename, 'a', 0644);
602 PVE
::Tools
::run_command
(
603 ['/usr/sbin/postmap', $filename],
604 errmsg
=> "unable to update postfix table $filename");
615 my $read_cvd_info = sub {
616 my ($dbname, $dbfile) = @_;
619 my $fh = IO
::File-
>new("<$dbfile");
621 warn "cant open ClamAV Database $dbname ($dbfile) - $!\n";
624 $fh->read($header, 512);
627 ## ClamAV-VDB:16 Mar 2016 23-17 +0000:57:4218790:60:06386f34a16ebeea2733ab037f0536be:
628 if ($header =~ m/^(ClamAV-VDB):([^:]+):(\d+):(\d+):/) {
629 my ($ftype, $btime, $version, $nsigs) = ($1, $2, $3, $4);
633 build_time
=> $btime,
638 warn "unable to parse ClamAV Database $dbname ($dbfile)\n";
643 my $filename = "/var/lib/clamav/main.inc/main.info";
644 $filename = "/var/lib/clamav/main.cvd" if ! -f
$filename;
646 $read_cvd_info->('main', $filename) if -f
$filename;
649 $filename = "/var/lib/clamav/daily.inc/daily.info";
650 $filename = "/var/lib/clamav/daily.cvd" if ! -f
$filename;
651 $filename = "/var/lib/clamav/daily.cld" if ! -f
$filename;
653 $read_cvd_info->('daily', $filename) if -f
$filename;
655 $filename = "/var/lib/clamav/bytecode.cvd";
656 $read_cvd_info->('bytecode', $filename) if -f
$filename;
658 $filename = "/var/lib/clamav/safebrowsing.cvd";
659 $read_cvd_info->('safebrowsing', $filename) if -f
$filename;
661 my $ss_dbs_fn = "/var/lib/clamav-unofficial-sigs/configs/ss-include-dbs.txt";
662 my $ss_dbs_files = {};
663 if (my $ssfh = IO
::File-
>new("<${ss_dbs_fn}")) {
664 while (defined(my $line = <$ssfh>)) {
666 $ss_dbs_files->{$line} = 1;
671 foreach $filename (</var/lib
/clamav/*>) {
672 my $fn = basename
($filename);
673 next if !$ss_dbs_files->{$fn};
675 my $fh = IO
::File-
>new("<$filename");
676 next if !defined($fh);
679 my $mtime = $st->mtime();
680 $last = $mtime if $mtime > $last;
681 while (defined(my $line = <$fh>)) { $nsigs++; }
686 name
=> 'sanesecurity',
687 type
=> 'unofficial',
688 build_time
=> strftime
("%d %b %Y %H-%M %z", localtime($last)),
697 my $rrd_dir = "/var/lib/rrdcached/db";
698 my $rrdcached_socket = "/var/run/rrdcached.sock";
701 "DS:loadavg:GAUGE:120:0:U",
702 "DS:maxcpu:GAUGE:120:0:U",
703 "DS:cpu:GAUGE:120:0:U",
704 "DS:iowait:GAUGE:120:0:U",
705 "DS:memtotal:GAUGE:120:0:U",
706 "DS:memused:GAUGE:120:0:U",
707 "DS:swaptotal:GAUGE:120:0:U",
708 "DS:swapused:GAUGE:120:0:U",
709 "DS:roottotal:GAUGE:120:0:U",
710 "DS:rootused:GAUGE:120:0:U",
711 "DS:netin:DERIVE:120:0:U",
712 "DS:netout:DERIVE:120:0:U",
714 "RRA:AVERAGE:0.5:1:70", # 1 min avg - one hour
715 "RRA:AVERAGE:0.5:30:70", # 30 min avg - one day
716 "RRA:AVERAGE:0.5:180:70", # 3 hour avg - one week
717 "RRA:AVERAGE:0.5:720:70", # 12 hour avg - one month
718 "RRA:AVERAGE:0.5:10080:70", # 7 day avg - ony year
720 "RRA:MAX:0.5:1:70", # 1 min max - one hour
721 "RRA:MAX:0.5:30:70", # 30 min max - one day
722 "RRA:MAX:0.5:180:70", # 3 hour max - one week
723 "RRA:MAX:0.5:720:70", # 12 hour max - one month
724 "RRA:MAX:0.5:10080:70", # 7 day max - ony year
727 sub cond_create_rrd_file
{
728 my ($filename, $rrddef) = @_;
730 return if -f
$filename;
732 my @args = ($filename);
734 push @args, "--daemon" => "unix:${rrdcached_socket}"
735 if -S
$rrdcached_socket;
737 push @args, '--step', 60;
739 push @args, @$rrddef;
741 # print "TEST: " . join(' ', @args) . "\n";
744 my $err = RRDs
::error
;
745 die "RRD error: $err\n" if $err;
748 sub update_node_status_rrd
{
750 my $filename = "$rrd_dir/pmg-node-v1.rrd";
751 cond_create_rrd_file
($filename, $rrd_def_node);
753 my ($avg1, $avg5, $avg15) = PVE
::ProcFSTools
::read_loadavg
();
755 my $stat = PVE
::ProcFSTools
::read_proc_stat
();
757 my $netdev = PVE
::ProcFSTools
::read_proc_net_dev
();
759 my ($uptime) = PVE
::ProcFSTools
::read_proc_uptime
();
761 my $cpuinfo = PVE
::ProcFSTools
::read_cpuinfo
();
763 my $maxcpu = $cpuinfo->{cpus
};
765 # traffic from/to physical interface cards
768 foreach my $dev (keys %$netdev) {
769 next if $dev !~ m/^eth\d+$/;
770 $netin += $netdev->{$dev}->{receive
};
771 $netout += $netdev->{$dev}->{transmit
};
774 my $meminfo = PVE
::ProcFSTools
::read_meminfo
();
776 my $dinfo = df
('/', 1); # output is bytes
780 # everything not free is considered to be used
781 my $dused = $dinfo->{blocks
} - $dinfo->{bfree
};
783 my $data = "$ctime:$avg1:$maxcpu:$stat->{cpu}:$stat->{wait}:" .
784 "$meminfo->{memtotal}:$meminfo->{memused}:" .
785 "$meminfo->{swaptotal}:$meminfo->{swapused}:" .
786 "$dinfo->{blocks}:$dused:$netin:$netout";
789 my @args = ($filename);
791 push @args, "--daemon" => "unix:${rrdcached_socket}"
792 if -S
$rrdcached_socket;
796 # print "TEST: " . join(' ', @args) . "\n";
799 my $err = RRDs
::error
;
800 die "RRD error: $err\n" if $err;
803 sub create_rrd_data
{
804 my ($rrdname, $timeframe, $cf) = @_;
806 my $rrd = "${rrd_dir}/$rrdname";
810 day
=> [ 60*30, 70 ],
811 week
=> [ 60*180, 70 ],
812 month
=> [ 60*720, 70 ],
813 year
=> [ 60*10080, 70 ],
816 my ($reso, $count) = @{$setup->{$timeframe}};
817 my $ctime = $reso*int(time()/$reso);
818 my $req_start = $ctime - $reso*$count;
820 $cf = "AVERAGE" if !$cf;
828 push @args, "--daemon" => "unix:${rrdcached_socket}"
829 if -S
$rrdcached_socket;
831 my ($start, $step, $names, $data) = RRDs
::fetch
($rrd, $cf, @args);
833 my $err = RRDs
::error
;
834 die "RRD error: $err\n" if $err;
836 die "got wrong time resolution ($step != $reso)\n"
840 my $fields = scalar(@$names);
841 for my $line (@$data) {
842 my $entry = { 'time' => $start };
844 for (my $i = 0; $i < $fields; $i++) {
845 my $name = $names->[$i];
846 if (defined(my $val = $line->[$i])) {
847 $entry->{$name} = $val;
849 # leave empty fields undefined
850 # maybe make this configurable?
860 my ($charset, $data) = @_;
864 eval { $res = encode_entities
(decode
($charset, $data)); };
877 foreach my $r (MIME
::Words
::decode_mimewords
($enc)) {
881 $res .= decode
($cs, $d);
894 sub rfc1522_to_html
{
902 foreach my $r (MIME
::Words
::decode_mimewords
($enc)) {
906 $res .= encode_entities
(decode
($cs, $d));
908 $res .= encode_entities
($d);
919 # RFC 2047 B-ENCODING http://rfc.net/rfc2047.html
920 # (Q-Encoding is complex and error prone)
924 my $CRLF = "\015\012";
926 # Nonprintables (controls + x7F + 8bit):
927 my $NONPRINT = "\\x00-\\x1F\\x7F-\\xFF";
929 # always use utf-8 (work with japanese character sets)
930 $txt = encode
("UTF-8", $txt);
932 return $txt if $txt !~ /[$NONPRINT]/o;
936 while ($txt =~ s/^(.{1,42})//sm) {
937 my $t = MIME
::Words
::encode_mimeword
($1, 'B', 'UTF-8');
938 $res .= $res ?
"\015\012\t$t" : $t;
944 sub load_sa_descriptions
{
946 my @dirs = ('/usr/share/spamassassin',
947 '/usr/share/spamassassin-extra');
951 my $parse_sa_file = sub {
954 open(my $fh,'<', $file);
955 return if !defined($fh);
957 while (defined(my $line = <$fh>)) {
958 if ($line =~ m/^describe\s+(\S+)\s+(.*)\s*$/) {
959 my ($name, $desc) = ($1, $2);
960 next if $res->{$name};
961 $res->{$name}->{desc
} = $desc;
962 if ($desc =~ m
|[\
(\s
](http
:\
/\/\S
+\
.[^\s\
.\
)]+\
.[^\s\
.\
)]+)|i
) {
963 $res->{$name}->{url
} = $1;
970 foreach my $dir (@dirs) {
971 foreach my $file (<$dir/*.cf
>) {
972 $parse_sa_file->($file);
982 my $days = int($uptime/86400);
983 $uptime -= $days*86400;
985 my $hours = int($uptime/3600);
986 $uptime -= $hours*3600;
988 my $mins = $uptime/60;
991 my $ds = $days > 1 ?
'days' : 'day';
992 return sprintf "%d $ds %02d:%02d", $days, $hours, $mins;
994 return sprintf "%02d:%02d", $hours, $mins;
998 sub finalize_report
{
999 my ($tt, $template, $data, $mailfrom, $receiver, $debug) = @_;
1003 $tt->process($template, $data, \
$html) ||
1004 die $tt->error() . "\n";
1007 if ($html =~ m
|^\s
*<title
>(.*)</title
>|m
) {
1010 die "unable to extract template title\n";
1013 my $top = MIME
::Entity-
>build(
1014 Type
=> "multipart/related",
1015 To
=> $data->{pmail
},
1017 Subject
=> bencode_header
(decode_entities
($title)));
1021 Type
=> "text/html",
1022 Encoding
=> $debug ?
'binary' : 'quoted-printable');
1028 # we use an empty envelope sender (we dont want to receive NDRs)
1029 PMG
::Utils
::reinject_mail
($top, '', [$receiver], undef, $data->{fqdn
});