10 use POSIX
qw(strftime);
15 use Time
::HiRes qw
(gettimeofday
);
34 my $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
36 PVE
::JSONSchema
::register_format
('pmg-realm', \
&verify_realm
);
38 my ($realm, $noerr) = @_;
40 if ($realm !~ m/^${realm_regex}$/) {
41 return undef if $noerr;
42 die "value does not look like a valid realm\n";
47 PVE
::JSONSchema
::register_standard_option
('realm', {
48 description
=> "Authentication domain ID",
49 type
=> 'string', format
=> 'pmg-realm',
53 PVE
::JSONSchema
::register_format
('pmg-userid', \
&verify_username
);
55 my ($username, $noerr) = @_;
57 $username = '' if !$username;
58 my $len = length($username);
60 die "user name '$username' is too short\n" if !$noerr;
64 die "user name '$username' is too long ($len > 64)\n" if !$noerr;
68 # we only allow a limited set of characters
69 # colon is not allowed, because we store usernames in
70 # colon separated lists)!
71 # slash is not allowed because it is used as pve API delimiter
72 # also see "man useradd"
73 if ($username =~ m!^([^\s:/]+)\@(${realm_regex})$!) {
74 return wantarray ?
($username, $1, $2) : $username;
77 die "value '$username' does not look like a valid user name\n" if !$noerr;
82 PVE
::JSONSchema
::register_standard_option
('userid', {
83 description
=> "User ID",
84 type
=> 'string', format
=> 'pmg-userid',
89 PVE
::JSONSchema
::register_standard_option
('username', {
90 description
=> "Username (without realm)",
92 pattern
=> '[^\s:\/\@]{3,60}',
100 return $dbh->last_insert_id(
101 undef, undef, undef, undef, { sequence
=> $seq});
104 sub file_older_than
{
105 my ($filename, $lasttime) = @_;
107 my $st = stat($filename);
109 return 0 if !defined($st);
111 return ($lasttime >= $st->ctime);
114 sub extract_filename
{
117 if (my $value = $head->recommended_filename()) {
119 if (my $decvalue = MIME
::Words
::decode_mimewords
($value)) {
120 $decvalue =~ s/\0/ /g;
121 $decvalue = PVE
::Tools
::trim
($decvalue);
130 my ($entity, $add_id, $id) = @_;
134 foreach my $tag (grep {/^x-proxmox-tmp/i} $entity->head->tags) {
135 $entity->head->delete ($tag);
138 $entity->head->replace('X-Proxmox-tmp-AID', $id) if $add_id;
140 foreach my $part ($entity->parts) {
141 $id = remove_marks
($part, $add_id, $id + 1);
148 my ($body, $dh) = @_;
152 foreach my $k (keys %$dh) {
155 $body =~ s/__\Q${k}\E__/$v/gs;
163 my ($entity, $sender, $targets, $xforward, $me, $nodsn) = @_;
171 my $smtp = Net
::SMTP-
>new('127.0.0.1', Port
=> 10025, Hello
=> $me) ||
172 die "unable to connect to localhost at port 10025";
174 if (defined($xforward)) {
177 foreach my $attr (keys %{$xforward}) {
178 $xfwd .= " $attr=$xforward->{$attr}";
181 if ($xfwd && $smtp->command("XFORWARD", $xfwd)->response() != CMD_OK
) {
182 syslog
('err', "xforward error - got: %s %s", $smtp->code, scalar($smtp->message));
186 if (!$smtp->mail($sender)) {
187 syslog
('err', "smtp error - got: %s %s", $smtp->code, scalar ($smtp->message));
188 die "smtp from: ERROR";
191 my $dsnopts = $nodsn ?
{Notify
=> ['NEVER']} : {};
193 if (!$smtp->to (@$targets, $dsnopts)) {
194 syslog
('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
195 die "smtp to: ERROR";
199 #$entity->sync_headers ();
202 my $out = PMG
::SMTPPrinter-
>new($smtp);
203 $entity->print($out);
205 # make sure we always have a newline at the end of the mail
206 # else dataend() fails
207 $smtp->datasend("\n");
209 if ($smtp->dataend()) {
210 my @msgs = $smtp->message;
211 $resmess = $msgs[$#msgs];
212 ($resid) = $resmess =~ m/Ok: queued as ([0-9A-Z]+)/;
213 $rescode = $smtp->code;
215 die sprintf("unexpected SMTP result - got: %s %s : WARNING", $smtp->code, $resmess);
218 my @msgs = $smtp->message;
219 $resmess = $msgs[$#msgs];
220 $rescode = $smtp->code;
221 die sprintf("sending data failed - got: %s %s : ERROR", $smtp->code, $resmess);
226 $smtp->quit if $smtp;
229 syslog
('err', $err);
232 return wantarray ?
($resid, $rescode, $resmess) : $resid;
235 sub analyze_virus_clam
{
236 my ($queue, $dname, $pmg_cfg) = @_;
241 my $clamdscan_opts = "--stdout";
243 my ($csec, $usec) = gettimeofday
();
249 $previous_alarm = alarm($timeout);
252 die "$queue->{logid}: Maximum time ($timeout sec) exceeded. " .
253 "virus analyze (clamav) failed: ERROR";
256 open(CMD
, "/usr/bin/clamdscan $clamdscan_opts '$dname'|") ||
257 die "$queue->{logid}: can't exec clamdscan: $! : ERROR";
262 while (defined(my $line = <CMD
>)) {
263 if ($line =~ m/^$dname.*:\s+([^ :]*)\s+FOUND$/) {
264 # we just use the first detected virus name
265 $vinfo = $1 if !$vinfo;
266 } elsif ($line =~ m/^Infected files:\s(\d*)$/i) {
275 alarm(0); # avoid race conditions
277 if (!defined($ifiles)) {
278 die "$queue->{logid}: got undefined output from " .
279 "virus detector: $response : ERROR";
283 syslog
('info', "$queue->{logid}: virus detected: $vinfo (clamav)");
288 alarm($previous_alarm);
290 my ($csec_end, $usec_end) = gettimeofday
();
291 $queue->{ptime_clam
} =
292 int (($csec_end-$csec)*1000 + ($usec_end - $usec)/1000);
295 syslog
('err', $err);
297 $queue->{errors
} = 1;
300 $queue->{vinfo_clam
} = $vinfo;
302 return $vinfo ?
"$vinfo (clamav)" : undef;
306 my ($queue, $filename, $pmg_cfg, $testmode) = @_;
308 # TODO: support other virus scanners?
310 # always scan with clamav
311 return analyze_virus_clam
($queue, $filename, $pmg_cfg);
314 sub magic_mime_type_for_file
{
317 # we do not use get_mime_type_for_file, because that considers
318 # filename extensions - we only want magic type detection
320 my $bufsize = Xdgmime
::xdg_mime_get_max_buffer_extents
();
321 die "got strange value for max_buffer_extents" if $bufsize > 4096*10;
323 my $ct = "application/octet-stream";
325 my $fh = IO
::File-
>new("<$filename") ||
326 die "unable to open file '$filename' - $!";
329 if (($len = $fh->read($buf, $bufsize)) > 0) {
330 $ct = xdg_mime_get_mime_type_for_data
($buf, $len);
334 die "unable to read file '$filename' - $!" if ($len < 0);
342 if (my $path = $entity->{PMX_decoded_path
}) {
344 # set a reasonable default if magic does not give a result
345 $entity->{PMX_magic_ct
} = $entity->head->mime_attr('content-type');
347 if (my $ct = magic_mime_type_for_file
($path)) {
348 if ($ct ne 'application/octet-stream' || !$entity->{PMX_magic_ct
}) {
349 $entity->{PMX_magic_ct
} = $ct;
353 my $filename = $entity->head->recommended_filename;
354 $filename = basename
($path) if !defined($filename) || $filename eq '';
356 if (my $ct = xdg_mime_get_mime_type_from_file_name
($filename)) {
357 $entity->{PMX_glob_ct
} = $ct;
361 foreach my $part ($entity->parts) {
362 add_ct_marks
($part);
366 # x509 certificate utils
368 # only write output if something fails
374 my $record_output = sub {
380 PVE
::Tools
::run_command
($cmd, outfunc
=> $record_output,
381 errfunc
=> $record_output);
386 print STDERR
$outbuf;
391 my $proxmox_tls_cert_fn = "/etc/pmg/pmg-tls.pem";
393 sub gen_proxmox_tls_cert
{
396 my $resolv = PVE
::INotify
::read_file
('resolvconf');
397 my $domain = $resolv->{search
};
399 my $company = $domain; # what else ?
400 my $cn = "*.$domain";
402 return if !$force && -f
$proxmox_tls_cert_fn;
404 my $sslconf = <<__EOD__;
405 RANDFILE = /root/.rnd
410 distinguished_name = req_distinguished_name
411 req_extensions = v3_req
413 string_mask = nombstr
415 [ req_distinguished_name ]
416 organizationalUnitName = Proxmox Mail Gateway
417 organizationName = $company
421 basicConstraints = CA:FALSE
423 keyUsage = nonRepudiation, digitalSignature, keyEncipherment
426 my $cfgfn = "/tmp/pmgtlsconf-$$.tmp";
427 my $fh = IO
::File-
>new ($cfgfn, "w");
432 my $cmd = ['openssl', 'req', '-batch', '-x509', '-new', '-sha256',
433 '-config', $cfgfn, '-days', 3650, '-nodes',
434 '-out', $proxmox_tls_cert_fn,
435 '-keyout', $proxmox_tls_cert_fn];
436 run_silent_cmd
($cmd);
440 unlink $proxmox_tls_cert_fn;
442 die "unable to generate proxmox certificate request:\n$err";
448 sub find_local_network_for_ip
{
451 my $testip = Net
::IP-
>new($ip);
453 my $isv6 = $testip->version == 6;
455 PVE
::ProcFSTools
::read_proc_net_ipv6_route
() :
456 PVE
::ProcFSTools
::read_proc_net_route
();
458 foreach my $entry (@$routes) {
461 $mask = $entry->{prefix
};
462 next if !$mask; # skip the default route...
464 $mask = $PVE::Network
::ipv4_mask_hash_localnet-
>{$entry->{mask
}};
465 next if !defined($mask);
467 my $cidr = "$entry->{dest}/$mask";
468 my $testnet = Net
::IP-
>new($cidr);
469 my $overlap = $testnet->overlaps($testip);
470 if ($overlap == $Net::IP
::IP_B_IN_A_OVERLAP
||
471 $overlap == $Net::IP
::IP_IDENTICAL
)
477 die "unable to detect local network for ip '$ip'\n";
480 my $service_aliases = {
481 'postfix' => 'postfix@-',
482 'postgres' => 'postgresql@9.6-main',
485 sub lookup_real_service_name
{
488 return $service_aliases->{$alias} // $alias;
491 sub get_full_service_state
{
498 if ($line =~ m/^([^=\s]+)=(.*)$/) {
503 $service = $service_aliases->{$service} // $service;
504 PVE
::Tools
::run_command
(['systemctl', 'show', $service], outfunc
=> $parser);
509 sub service_wait_stopped
{
510 my ($timeout, $service_list) = @_;
512 my $starttime = time();
514 foreach my $service (@$service_list) {
515 PVE
::Tools
::run_command
(['systemctl', 'stop', $service]);
521 foreach my $service (@$service_list) {
522 my $ss = get_full_service_state
($service);
523 my $state = $ss->{ActiveState
} // 'unknown';
525 if ($state ne 'inactive') {
526 if ((time() - $starttime) > $timeout) {
527 syslog
('err', "unable to stop services (got timeout)");
542 my ($service, $cmd) = @_;
544 die "unknown service command '$cmd'\n"
545 if $cmd !~ m/^(start|stop|restart|reload)$/;
547 if ($service eq 'pmgdaemon' || $service eq 'pmgproxy') {
548 if ($cmd eq 'restart') {
551 die "invalid service cmd '$service $cmd': ERROR";
555 $service = $service_aliases->{$service} // $service;
556 PVE
::Tools
::run_command
(['systemctl', $cmd, $service]);
559 # this is also used to get the IP of the local node
561 my ($nodename, $noerr) = @_;
563 my ($family, $packed_ip);
566 my @res = PVE
::Tools
::getaddrinfo_all
($nodename);
567 $family = $res[0]->{family
};
568 $packed_ip = (PVE
::Tools
::unpack_sockaddr_in46
($res[0]->{addr
}))[2];
572 die "hostname lookup failed:\n$@" if !$noerr;
576 my $ip = Socket
::inet_ntop
($family, $packed_ip);
577 if ($ip =~ m/^127\.|^::1$/) {
578 die "hostname lookup failed - got local IP address ($nodename = $ip)\n" if !$noerr;
582 return wantarray ?
($ip, $family) : $ip;
588 # make sure the file exists (else postmap fails)
589 IO
::File-
>new($filename, 'a', 0644);
592 PVE
::Tools
::run_command
(
593 ['/usr/sbin/postmap', $filename],
594 errmsg
=> "unable to update postfix table $filename");
605 my $read_cvd_info = sub {
606 my ($dbname, $dbfile) = @_;
609 my $fh = IO
::File-
>new("<$dbfile");
611 warn "cant open ClamAV Database $dbname ($dbfile) - $!\n";
614 $fh->read($header, 512);
617 ## ClamAV-VDB:16 Mar 2016 23-17 +0000:57:4218790:60:06386f34a16ebeea2733ab037f0536be:
618 if ($header =~ m/^(ClamAV-VDB):([^:]+):(\d+):(\d+):/) {
619 my ($ftype, $btime, $version, $nsigs) = ($1, $2, $3, $4);
623 build_time
=> $btime,
628 warn "unable to parse ClamAV Database $dbname ($dbfile)\n";
633 my $filename = "/var/lib/clamav/main.inc/main.info";
634 $filename = "/var/lib/clamav/main.cvd" if ! -f
$filename;
636 $read_cvd_info->('main', $filename) if -f
$filename;
639 $filename = "/var/lib/clamav/daily.inc/daily.info";
640 $filename = "/var/lib/clamav/daily.cvd" if ! -f
$filename;
641 $filename = "/var/lib/clamav/daily.cld" if ! -f
$filename;
643 $read_cvd_info->('daily', $filename) if -f
$filename;
645 $filename = "/var/lib/clamav/bytecode.cvd";
646 $read_cvd_info->('bytecode', $filename) if -f
$filename;
648 $filename = "/var/lib/clamav/safebrowsing.cvd";
649 $read_cvd_info->('safebrowsing', $filename) if -f
$filename;
651 my $ss_dbs_fn = "/var/lib/clamav-unofficial-sigs/configs/ss-include-dbs.txt";
652 my $ss_dbs_files = {};
653 if (my $ssfh = IO
::File-
>new("<${ss_dbs_fn}")) {
654 while (defined(my $line = <$ssfh>)) {
656 $ss_dbs_files->{$line} = 1;
661 foreach $filename (</var/lib
/clamav/*>) {
662 my $fn = basename
($filename);
663 next if !$ss_dbs_files->{$fn};
665 my $fh = IO
::File-
>new("<$filename");
666 next if !defined($fh);
669 my $mtime = $st->mtime();
670 $last = $mtime if $mtime > $last;
671 while (defined(my $line = <$fh>)) { $nsigs++; }
676 name
=> 'sanesecurity',
677 type
=> 'unofficial',
678 build_time
=> strftime
("%d %b %Y %H-%M %z", localtime($last)),
687 my $rrd_dir = "/var/lib/rrdcached/db";
688 my $rrdcached_socket = "/var/run/rrdcached.sock";
691 "DS:loadavg:GAUGE:120:0:U",
692 "DS:maxcpu:GAUGE:120:0:U",
693 "DS:cpu:GAUGE:120:0:U",
694 "DS:iowait:GAUGE:120:0:U",
695 "DS:memtotal:GAUGE:120:0:U",
696 "DS:memused:GAUGE:120:0:U",
697 "DS:swaptotal:GAUGE:120:0:U",
698 "DS:swapused:GAUGE:120:0:U",
699 "DS:roottotal:GAUGE:120:0:U",
700 "DS:rootused:GAUGE:120:0:U",
701 "DS:netin:DERIVE:120:0:U",
702 "DS:netout:DERIVE:120:0:U",
704 "RRA:AVERAGE:0.5:1:70", # 1 min avg - one hour
705 "RRA:AVERAGE:0.5:30:70", # 30 min avg - one day
706 "RRA:AVERAGE:0.5:180:70", # 3 hour avg - one week
707 "RRA:AVERAGE:0.5:720:70", # 12 hour avg - one month
708 "RRA:AVERAGE:0.5:10080:70", # 7 day avg - ony year
710 "RRA:MAX:0.5:1:70", # 1 min max - one hour
711 "RRA:MAX:0.5:30:70", # 30 min max - one day
712 "RRA:MAX:0.5:180:70", # 3 hour max - one week
713 "RRA:MAX:0.5:720:70", # 12 hour max - one month
714 "RRA:MAX:0.5:10080:70", # 7 day max - ony year
717 sub cond_create_rrd_file
{
718 my ($filename, $rrddef) = @_;
720 return if -f
$filename;
722 my @args = ($filename);
724 push @args, "--daemon" => "unix:${rrdcached_socket}"
725 if -S
$rrdcached_socket;
727 push @args, '--step', 60;
729 push @args, @$rrddef;
731 # print "TEST: " . join(' ', @args) . "\n";
734 my $err = RRDs
::error
;
735 die "RRD error: $err\n" if $err;
738 sub update_node_status_rrd
{
740 my $filename = "$rrd_dir/pmg-node-v1.rrd";
741 cond_create_rrd_file
($filename, $rrd_def_node);
743 my ($avg1, $avg5, $avg15) = PVE
::ProcFSTools
::read_loadavg
();
745 my $stat = PVE
::ProcFSTools
::read_proc_stat
();
747 my $netdev = PVE
::ProcFSTools
::read_proc_net_dev
();
749 my ($uptime) = PVE
::ProcFSTools
::read_proc_uptime
();
751 my $cpuinfo = PVE
::ProcFSTools
::read_cpuinfo
();
753 my $maxcpu = $cpuinfo->{cpus
};
755 # traffic from/to physical interface cards
758 foreach my $dev (keys %$netdev) {
759 next if $dev !~ m/^eth\d+$/;
760 $netin += $netdev->{$dev}->{receive
};
761 $netout += $netdev->{$dev}->{transmit
};
764 my $meminfo = PVE
::ProcFSTools
::read_meminfo
();
766 my $dinfo = df
('/', 1); # output is bytes
770 # everything not free is considered to be used
771 my $dused = $dinfo->{blocks
} - $dinfo->{bfree
};
773 my $data = "$ctime:$avg1:$maxcpu:$stat->{cpu}:$stat->{wait}:" .
774 "$meminfo->{memtotal}:$meminfo->{memused}:" .
775 "$meminfo->{swaptotal}:$meminfo->{swapused}:" .
776 "$dinfo->{blocks}:$dused:$netin:$netout";
779 my @args = ($filename);
781 push @args, "--daemon" => "unix:${rrdcached_socket}"
782 if -S
$rrdcached_socket;
786 # print "TEST: " . join(' ', @args) . "\n";
789 my $err = RRDs
::error
;
790 die "RRD error: $err\n" if $err;
793 sub create_rrd_data
{
794 my ($rrdname, $timeframe, $cf) = @_;
796 my $rrd = "${rrd_dir}/$rrdname";
800 day
=> [ 60*30, 70 ],
801 week
=> [ 60*180, 70 ],
802 month
=> [ 60*720, 70 ],
803 year
=> [ 60*10080, 70 ],
806 my ($reso, $count) = @{$setup->{$timeframe}};
807 my $ctime = $reso*int(time()/$reso);
808 my $req_start = $ctime - $reso*$count;
810 $cf = "AVERAGE" if !$cf;
818 push @args, "--daemon" => "unix:${rrdcached_socket}"
819 if -S
$rrdcached_socket;
821 my ($start, $step, $names, $data) = RRDs
::fetch
($rrd, $cf, @args);
823 my $err = RRDs
::error
;
824 die "RRD error: $err\n" if $err;
826 die "got wrong time resolution ($step != $reso)\n"
830 my $fields = scalar(@$names);
831 for my $line (@$data) {
832 my $entry = { 'time' => $start };
834 for (my $i = 0; $i < $fields; $i++) {
835 my $name = $names->[$i];
836 if (defined(my $val = $line->[$i])) {
837 $entry->{$name} = $val;
839 # leave empty fields undefined
840 # maybe make this configurable?