mirror of
https://github.com/chillout2k/ExOTA-Milter.git
synced 2025-12-11 09:20:18 +00:00
526 lines
20 KiB
Python
526 lines
20 KiB
Python
import Milter
|
|
import sys
|
|
import traceback
|
|
import os
|
|
import logging
|
|
import string
|
|
import random
|
|
import re
|
|
import email.utils
|
|
import authres
|
|
import json
|
|
from policy import (
|
|
ExOTAPolicyException, ExOTAPolicyNotFoundException,
|
|
ExOTAPolicyBackendJSON, ExOTAPolicy
|
|
)
|
|
|
|
# Globals with defaults. Can/should be modified by ENV-variables on startup.
|
|
# ENV[MILTER_NAME]
|
|
g_milter_name = 'exota-milter'
|
|
# ENV[MILTER_SOCKET]
|
|
g_milter_socket = '/socket/' + g_milter_name
|
|
# ENV[MILTER_REJECT_MESSAGE]
|
|
g_milter_reject_message = 'Security policy violation!'
|
|
# ENV[MILTER_TMPFAIL_MESSAGE]
|
|
g_milter_tmpfail_message = 'Service temporarily not available! Please try again later.'
|
|
# ENV[LOG_LEVEL]
|
|
g_loglevel = logging.INFO
|
|
# ENV[MILTER_DKIM_ENABLED]
|
|
g_milter_dkim_enabled = False
|
|
# ENV[MILTER_DKIM_ALIGNMENT_REQUIRED]
|
|
g_milter_dkim_alignment_required = True
|
|
# ENV[MILTER_TRUSTED_AUTHSERVID]
|
|
g_milter_trusted_authservid = 'invalid'
|
|
# ENV[MILTER_POLICY_SOURCE]
|
|
g_milter_policy_source = 'file'
|
|
# ENV[MILTER_POLICY_FILE]
|
|
g_milter_policy_file = '/data/policy.json'
|
|
# ENV[MILTER_X509_ENABLED]
|
|
g_milter_x509_enabled = False
|
|
# ENV[MILTER_X509_TRUSTED_CN]
|
|
g_milter_x509_trusted_cn = 'mail.protection.outlook.com'
|
|
# ENV[MILTER_X509_IP_WHITELIST]
|
|
g_milter_x509_ip_whitelist = ['127.0.0.1','::1']
|
|
# ENV[MILTER_ADD_HEADER]
|
|
g_milter_add_header = False
|
|
# ENV[MILTER_AUTHSERVID]
|
|
g_milter_authservid = None
|
|
|
|
# Another globals
|
|
g_policy_backend = None
|
|
g_re_domain = re.compile(r'^.*@(\S+)$', re.IGNORECASE)
|
|
|
|
class ExOTAMilter(Milter.Base):
|
|
# Each new connection is handled in an own thread
|
|
def __init__(self):
|
|
self.x509_client_valid = False
|
|
self.client_ip = None
|
|
self.reset()
|
|
|
|
def reset(self):
|
|
self.conn_reused = False
|
|
self.hdr_from = None
|
|
self.hdr_from_domain = None
|
|
self.hdr_resent_from = None
|
|
self.hdr_resent_from_domain = None
|
|
self.forwarded = False
|
|
self.hdr_tenant_id = None
|
|
self.hdr_tenant_id_count = 0
|
|
self.x509_whitelisted = False
|
|
self.dkim_valid = False
|
|
self.passed_dkim_results = []
|
|
self.dkim_aligned = False
|
|
self.xar_hdr_count = 0
|
|
# https://stackoverflow.com/a/2257449
|
|
self.mconn_id = g_milter_name + ': ' + ''.join(
|
|
random.choice(string.ascii_lowercase + string.digits) for _ in range(8)
|
|
)
|
|
logging.debug(self.mconn_id + " reset()")
|
|
|
|
def smfir_reject(self, **kwargs):
|
|
message = g_milter_reject_message
|
|
if 'message' in kwargs:
|
|
message = kwargs['message']
|
|
if 'queue_id' in kwargs:
|
|
message = "queue_id: {0} - {1}".format(kwargs['queue_id'], message)
|
|
if 'reason' in kwargs:
|
|
message = "{0} - reason: {1}".format(message, kwargs['reason'])
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
": milter_action=reject message={0}".format(message)
|
|
)
|
|
self.setreply('550','5.7.1', message)
|
|
return Milter.REJECT
|
|
|
|
def smfir_continue(self):
|
|
return Milter.CONTINUE
|
|
|
|
# Not registered/used callbacks
|
|
@Milter.nocallback
|
|
def hello(self, heloname):
|
|
return self.smfir_continue()
|
|
@Milter.nocallback
|
|
def eoh(self):
|
|
return self.smfir_continue()
|
|
@Milter.nocallback
|
|
def body(self, chunk):
|
|
return self.smfir_continue()
|
|
|
|
def connect(self, IPname, family, hostaddr):
|
|
self.client_ip = hostaddr[0]
|
|
return self.smfir_continue()
|
|
|
|
# Mandatory callback
|
|
def envfrom(self, mailfrom, *str):
|
|
logging.debug(self.mconn_id + "/FROM 5321.from={0}".format(mailfrom))
|
|
# Instance member values remain within reused SMTP-connections!
|
|
if self.conn_reused:
|
|
# Milter connection reused!
|
|
logging.debug(self.mconn_id + "/FROM connection reused!")
|
|
self.reset()
|
|
else:
|
|
self.conn_reused = True
|
|
logging.debug(self.mconn_id + "/FROM client_ip={0}".format(self.client_ip))
|
|
return self.smfir_continue()
|
|
|
|
# Mandatory callback
|
|
def envrcpt(self, to, *str):
|
|
logging.debug(self.mconn_id + "/RCPT 5321.rcpt={0}".format(to))
|
|
return self.smfir_continue()
|
|
|
|
def header(self, name, hval):
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: Header: {0}, Value: {1}".format(name, hval)
|
|
)
|
|
|
|
# Parse RFC-5322-From header
|
|
if(name.lower() == "From".lower()):
|
|
hdr_5322_from = email.utils.parseaddr(hval)
|
|
self.hdr_from = hdr_5322_from[1].lower()
|
|
m = re.match(g_re_domain, self.hdr_from)
|
|
if m is None:
|
|
logging.error(self.mconn_id + "/" + str(self.getsymval('i')) + "/HDR " +
|
|
"Could not determine domain-part of 5322.from=" + self.hdr_from
|
|
)
|
|
return self.smfir_reject(queue_id=self.getsymval('i'))
|
|
self.hdr_from_domain = m.group(1)
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: 5322.from={0}, 5322.from_domain={1}".format(
|
|
self.hdr_from, self.hdr_from_domain
|
|
)
|
|
)
|
|
|
|
# Parse RFC-5322-Resent-From header (Forwarded)
|
|
if(name.lower() == "Resent-From".lower()):
|
|
hdr_5322_resent_from = email.utils.parseaddr(hval)
|
|
self.hdr_resent_from = hdr_5322_resent_from[1].lower()
|
|
m = re.match(g_re_domain, self.hdr_resent_from)
|
|
if m is None:
|
|
logging.error(self.mconn_id + "/" + str(self.getsymval('i')) + "/HDR " +
|
|
"Could not determine domain-part of 5322.resent_from=" + self.hdr_resent_from
|
|
)
|
|
else:
|
|
self.hdr_resent_from_domain = m.group(1).lower()
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: 5322.resentfrom={0}, 5322.resent_from_domain={1}".format(
|
|
self.hdr_resent_from, self.hdr_resent_from_domain
|
|
)
|
|
)
|
|
|
|
# Parse non-standardized X-MS-Exchange-CrossTenant-Id header
|
|
elif(name.lower() == "X-MS-Exchange-CrossTenant-Id".lower()):
|
|
self.hdr_tenant_id_count += 1
|
|
self.hdr_tenant_id = hval.lower()
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: Tenant-ID: {0}".format(self.hdr_tenant_id)
|
|
)
|
|
|
|
# Parse RFC-7601 Authentication-Results header
|
|
elif(name.lower() == "Authentication-Results".lower()):
|
|
if g_milter_dkim_enabled == True:
|
|
ar = None
|
|
try:
|
|
ar = authres.AuthenticationResultsHeader.parse(
|
|
"{0}: {1}".format(name, hval)
|
|
)
|
|
if ar.authserv_id == g_milter_trusted_authservid:
|
|
for ar_result in ar.results:
|
|
if ar_result.method == 'dkim':
|
|
if ar_result.result == 'pass':
|
|
self.passed_dkim_results.append({
|
|
"sdid": ar_result.header_d
|
|
})
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: DKIM passed SDID {0}".format(ar_result.header_d)
|
|
)
|
|
self.dkim_valid = True
|
|
else:
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: Ignoring authentication results of {0}".format(ar.authserv_id)
|
|
)
|
|
except Exception as e:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: AR-parse exception: {0}".format(str(e))
|
|
)
|
|
|
|
elif(name == "X-ExOTA-Authentication-Results"):
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/HDR: Found X-ExOTA-Authentication-Results header. Marking for deletion."
|
|
)
|
|
self.xar_hdr_count += 1
|
|
|
|
return self.smfir_continue()
|
|
|
|
# EOM is mandatory as well and thus always called by MTA
|
|
def eom(self):
|
|
# Here in EoM the final policy logic happens.
|
|
|
|
# Check if client certificate CN matches trusted CN
|
|
if g_milter_x509_enabled:
|
|
for whitelisted_client_ip in g_milter_x509_ip_whitelist:
|
|
if self.client_ip == whitelisted_client_ip:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i'))
|
|
+ "/EOM: x509 CN check: client-IP '{0}' is whitelisted".format(
|
|
whitelisted_client_ip
|
|
)
|
|
)
|
|
self.x509_whitelisted = True
|
|
if not self.x509_whitelisted:
|
|
cert_subject = self.getsymval('{cert_subject}')
|
|
if cert_subject is None:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i'))
|
|
+ "/EOM: No trusted x509 client CN found - action=reject"
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = 'No trusted x509 client CN found'
|
|
)
|
|
else:
|
|
if g_milter_x509_trusted_cn.lower() == cert_subject.lower():
|
|
self.x509_client_valid = True
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Trusted x509 client CN {0}".format(cert_subject)
|
|
)
|
|
else:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Untrusted x509 client CN {0} - action=reject".format(cert_subject)
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = "Untrusted x509 client CN: {0}".format(cert_subject)
|
|
)
|
|
|
|
if self.hdr_from is None:
|
|
logging.error(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: exception: could not determine 5322.from header - action=reject"
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = '5322.from header missing'
|
|
)
|
|
|
|
# Get policy for 5322.from_domain
|
|
policy = None
|
|
try:
|
|
policy = g_policy_backend.get(self.hdr_from_domain)
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Policy for 5322.from_domain={0} fetched from backend".format(
|
|
self.hdr_from_domain
|
|
)
|
|
)
|
|
except (ExOTAPolicyException, ExOTAPolicyNotFoundException) as e:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: 5322.from: {0}".format(e.message)
|
|
)
|
|
# Forwarded message? Maybe the Resent-From header domain matches.
|
|
if self.hdr_resent_from_domain is not None:
|
|
try:
|
|
policy = g_policy_backend.get(self.hdr_resent_from_domain)
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Policy for 5322.resent_from_domain={0} fetched from backend".format(
|
|
self.hdr_resent_from_domain
|
|
)
|
|
)
|
|
self.forwarded = True
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Forwarded message -> Policy for 5322.resent_from_domain={0} found.".format(
|
|
self.hdr_resent_from_domain
|
|
)
|
|
)
|
|
except (ExOTAPolicyException, ExOTAPolicyNotFoundException) as e:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: 5322.resent-from: {0}".format(e.message)
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = "No policy for 5322.resent_from_domain {0}".format(
|
|
self.hdr_resent_from_domain
|
|
)
|
|
)
|
|
else:
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = "No policy for 5322.from_domain {0}".format(self.hdr_from_domain)
|
|
)
|
|
|
|
if self.hdr_tenant_id is None:
|
|
logging.error(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: exception: could not determine X-MS-Exchange-CrossTenant-Id - action=reject"
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = 'Tenant-ID is missing!'
|
|
)
|
|
if self.hdr_tenant_id_count > 1:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: More than one tenant-IDs for {0} found - action=reject".format(
|
|
self.hdr_from_domain
|
|
)
|
|
)
|
|
return self.smfir_reject(queue_id=self.getsymval('i'))
|
|
if self.hdr_tenant_id == policy.get_tenant_id():
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: tenant_id={0} status=match".format(self.hdr_tenant_id)
|
|
)
|
|
else:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: tenant_id={0} status=no_match - action=reject".format(
|
|
self.hdr_tenant_id
|
|
)
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = 'No policy match for tenant-id'
|
|
)
|
|
|
|
if g_milter_dkim_enabled and policy.is_dkim_enabled():
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: 5322.from_domain={0} dkim_auth=enabled".format(self.hdr_from_domain)
|
|
)
|
|
if self.dkim_valid:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Valid DKIM signatures found"
|
|
)
|
|
for passed_dkim_result in self.passed_dkim_results:
|
|
if self.hdr_from_domain == passed_dkim_result['sdid']:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Found aligned DKIM signature for SDID: {0}".format(
|
|
passed_dkim_result['sdid']
|
|
)
|
|
)
|
|
self.dkim_aligned = True
|
|
if not self.dkim_aligned:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: No aligned DKIM signatures found!"
|
|
)
|
|
if g_milter_dkim_alignment_required:
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = 'DKIM alignment required!'
|
|
)
|
|
else:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: No valid DKIM authentication result found"
|
|
)
|
|
return self.smfir_reject(
|
|
queue_id = self.getsymval('i'),
|
|
reason = 'No valid DKIM authentication results found'
|
|
)
|
|
|
|
# Delete all existing X-ExOTA-Authentication-Results headers
|
|
for i in range(self.xar_hdr_count, 0, -1):
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Deleting X-ExOTA-Authentication-Results header"
|
|
)
|
|
try:
|
|
self.chgheader("X-ExOTA-Authentication-Results", i-1, '')
|
|
except Exception as e:
|
|
logging.error(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Deleting X-ExOTA-Authentication-Results failed: {0}".format(str(e))
|
|
)
|
|
|
|
if g_milter_add_header:
|
|
try:
|
|
addhdr_value = str(
|
|
"{0};\n" +
|
|
" auth=pass 5322_from_domain={1} dkim={2} dkim_aligned={3} " +
|
|
"x509_client_trust={4} forwarded={5}"
|
|
).format(
|
|
g_milter_authservid, self.hdr_from_domain, policy.is_dkim_enabled(),
|
|
self.dkim_aligned, g_milter_x509_enabled, self.forwarded
|
|
)
|
|
logging.debug(addhdr_value)
|
|
self.addheader("X-ExOTA-Authentication-Results", addhdr_value)
|
|
logging.debug(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: AR-header added"
|
|
)
|
|
except Exception as e:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: addheader(AR) failed: {0}".format(str(e))
|
|
)
|
|
|
|
if g_milter_dkim_enabled:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Tenant successfully authorized (dkim_enabled={0} dkim_aligned={1})".format(
|
|
policy.is_dkim_enabled(), self.dkim_aligned
|
|
)
|
|
)
|
|
else:
|
|
logging.info(self.mconn_id + "/" + str(self.getsymval('i')) +
|
|
"/EOM: Tenant successfully authorized"
|
|
)
|
|
return self.smfir_continue()
|
|
|
|
def abort(self):
|
|
# Client disconnected prematurely
|
|
logging.debug(self.mconn_id + "/ABORT")
|
|
return self.smfir_continue()
|
|
|
|
def close(self):
|
|
# Always called, even when abort is called.
|
|
# Clean up any external resources here.
|
|
logging.debug(self.mconn_id + "/CLOSE")
|
|
return self.smfir_continue()
|
|
|
|
if __name__ == "__main__":
|
|
if 'LOG_LEVEL' in os.environ:
|
|
if re.match(r'^info$', os.environ['LOG_LEVEL'], re.IGNORECASE):
|
|
g_loglevel = logging.INFO
|
|
elif re.match(r'^warn|warning$', os.environ['LOG_LEVEL'], re.IGNORECASE):
|
|
g_loglevel = logging.WARN
|
|
elif re.match(r'^error$', os.environ['LOG_LEVEL'], re.IGNORECASE):
|
|
g_loglevel = logging.ERROR
|
|
elif re.match(r'debug', os.environ['LOG_LEVEL'], re.IGNORECASE):
|
|
g_loglevel = logging.DEBUG
|
|
logging.basicConfig(
|
|
filename=None, # log to stdout
|
|
format='%(asctime)s: %(levelname)s %(message)s',
|
|
level=g_loglevel
|
|
)
|
|
if 'MILTER_NAME' in os.environ:
|
|
g_milter_name = os.environ['MILTER_NAME']
|
|
logging.info("ENV[MILTER_NAME]: {0}".format(g_milter_name))
|
|
if 'MILTER_SOCKET' in os.environ:
|
|
g_milter_socket = os.environ['MILTER_SOCKET']
|
|
logging.info("ENV[MILTER_SOCKET]: {0}".format(g_milter_socket))
|
|
if 'MILTER_REJECT_MESSAGE' in os.environ:
|
|
g_milter_reject_message = os.environ['MILTER_REJECT_MESSAGE']
|
|
logging.info("ENV[MILTER_REJECT_MESSAGE]: {0}".format(g_milter_reject_message))
|
|
if 'MILTER_TMPFAIL_MESSAGE' in os.environ:
|
|
g_milter_tmpfail_message = os.environ['MILTER_TMPFAIL_MESSAGE']
|
|
logging.info("ENV[MILTER_TMPFAIL_MESSAGE]: {0}".format(g_milter_tmpfail_message))
|
|
if 'MILTER_DKIM_ENABLED' in os.environ:
|
|
g_milter_dkim_enabled = True
|
|
if 'MILTER_TRUSTED_AUTHSERVID' in os.environ:
|
|
g_milter_trusted_authservid = os.environ['MILTER_TRUSTED_AUTHSERVID'].lower()
|
|
logging.info("ENV[MILTER_TRUSTED_AUTHSERVID]: {0}".format(g_milter_trusted_authservid))
|
|
else:
|
|
logging.error("ENV[MILTER_TRUSTED_AUTHSERVID] is mandatory!")
|
|
sys.exit(1)
|
|
if 'MILTER_DKIM_ALIGNMENT_REQUIRED' in os.environ:
|
|
if os.environ['MILTER_DKIM_ALIGNMENT_REQUIRED'] == 'True':
|
|
g_milter_dkim_alignment_required = True
|
|
elif os.environ['MILTER_DKIM_ALIGNMENT_REQUIRED'] == 'False':
|
|
g_milter_dkim_alignment_required = False
|
|
else:
|
|
logging.error("ENV[MILTER_DKIM_ALIGNMENT_REQUIRED] must be a boolean type: 'True' or 'False'!")
|
|
sys.exit(1)
|
|
logging.info("ENV[MILTER_DKIM_ALIGNMENT_REQUIRED]: {0}".format(
|
|
g_milter_dkim_alignment_required
|
|
))
|
|
logging.info("ENV[MILTER_DKIM_ENABLED]: {0}".format(g_milter_dkim_enabled))
|
|
if 'MILTER_X509_ENABLED' in os.environ:
|
|
g_milter_x509_enabled = True
|
|
if 'MILTER_X509_TRUSTED_CN' in os.environ:
|
|
g_milter_x509_trusted_cn = os.environ['MILTER_X509_TRUSTED_CN']
|
|
logging.info("ENV[MILTER_X509_TRUSTED_CN]: {0}".format(g_milter_x509_trusted_cn))
|
|
if 'MILTER_X509_IP_WHITELIST' in os.environ:
|
|
g_milter_x509_ip_whitelist = "".join(os.environ['MILTER_X509_IP_WHITELIST'].split())
|
|
g_milter_x509_ip_whitelist = g_milter_x509_ip_whitelist.split(',')
|
|
logging.info("ENV[MILTER_X509_IP_WHITELIST]: {0}".format(g_milter_x509_ip_whitelist))
|
|
logging.info("ENV[MILTER_X509_ENABLED]: {0}".format(g_milter_x509_enabled))
|
|
if 'MILTER_POLICY_SOURCE' in os.environ:
|
|
g_milter_policy_source = os.environ['MILTER_POLICY_SOURCE']
|
|
logging.info("ENV[MILTER_POLICY_SOURCE]: {0}".format(g_milter_policy_source))
|
|
if 'MILTER_ADD_HEADER' in os.environ:
|
|
g_milter_add_header = True
|
|
if 'MILTER_AUTHSERVID' in os.environ:
|
|
g_milter_authservid = os.environ['MILTER_AUTHSERVID']
|
|
if not re.match(r'^\S+$', g_milter_authservid):
|
|
logging.error("ENV[MILTER_AUTHSERVID] is invalid: {0}".format(g_milter_authservid))
|
|
logging.info("ENV[MILTER_AUTHSERVID]: {0}".format(g_milter_authservid))
|
|
else:
|
|
logging.error("ENV[MILTER_AUTHSERVID] is mandatory!")
|
|
sys.exit(1)
|
|
logging.info("ENV[MILTER_ADD_HEADER]: {0}".format(g_milter_add_header))
|
|
if g_milter_policy_source == 'file':
|
|
if 'MILTER_POLICY_FILE' in os.environ:
|
|
g_milter_policy_file = os.environ['MILTER_POLICY_FILE']
|
|
logging.info("ENV[MILTER_POLICY_FILE]: {0}".format(g_milter_policy_file))
|
|
try:
|
|
g_policy_backend = ExOTAPolicyBackendJSON(g_milter_policy_file)
|
|
logging.info("JSON policy backend initialized")
|
|
except ExOTAPolicyException as e:
|
|
logging.error("Policy backend error: {0}".format(e.message))
|
|
sys.exit(1)
|
|
else:
|
|
logging.error("ENV[MILTER_POLICY_FILE] is mandatory!")
|
|
sys.exit(1)
|
|
elif g_milter_policy_source == 'ldap':
|
|
logging.debug("LDAP-Backend not supported yet!")
|
|
sys.exit(1)
|
|
else:
|
|
logging.debug("Unsupported backend: {0}!".format(g_milter_policy_source))
|
|
sys.exit(1)
|
|
try:
|
|
timeout = 600
|
|
# Register to have the Milter factory create instances of your class:
|
|
Milter.factory = ExOTAMilter
|
|
Milter.set_flags(Milter.ADDHDRS + Milter.CHGHDRS)
|
|
logging.info("Startup " + g_milter_name +
|
|
"@socket: " + g_milter_socket
|
|
)
|
|
Milter.runmilter(g_milter_name,g_milter_socket,timeout,True)
|
|
logging.info("Shutdown " + g_milter_name)
|
|
except:
|
|
logging.error("MAIN-EXCEPTION: " + traceback.format_exc())
|
|
sys.exit(1) |