mirror of
https://github.com/chatmail/relay.git
synced 2026-05-11 08:24:37 +00:00
Compare commits
7 Commits
speed-adju
...
version-pe
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
aaed93ba78 | ||
|
|
e961ca2efb | ||
|
|
e665a6f432 | ||
|
|
75f61683fc | ||
|
|
7db26f33d9 | ||
|
|
2b90f7db37 | ||
|
|
e37dd5153a |
@@ -48,19 +48,3 @@ graph LR;
|
|||||||
The edges in this graph should not be taken too literally; they
|
The edges in this graph should not be taken too literally; they
|
||||||
reflect some sort of communication path or dependency relationship
|
reflect some sort of communication path or dependency relationship
|
||||||
between components of the chatmail server.
|
between components of the chatmail server.
|
||||||
|
|
||||||
## Message between users on the same relay
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
graph LR;
|
|
||||||
chatmail core --> |465|smtps/smtpd;
|
|
||||||
chatmail core --> |587|submission/smtpd;
|
|
||||||
smtps/smtpd --> |10080|filtermail;
|
|
||||||
submission/smtpd --> |10080|filtermail;
|
|
||||||
filtermail --> |10025|smtpd reinject;
|
|
||||||
smtpd reinject --> cleanup;
|
|
||||||
cleanup --> qmgr;
|
|
||||||
qmgr --> smtpd accepts message;
|
|
||||||
qmgr --> |lmtp|dovecot;
|
|
||||||
dovecot --> chatmail core;
|
|
||||||
```
|
|
||||||
|
|||||||
12
CHANGELOG.md
12
CHANGELOG.md
@@ -2,6 +2,15 @@
|
|||||||
|
|
||||||
## untagged
|
## untagged
|
||||||
|
|
||||||
|
- filtermail: run CPU-intensive handle_DATA in a thread pool executor
|
||||||
|
([#676](https://github.com/chatmail/relay/pull/676))
|
||||||
|
|
||||||
|
- don't use the complicated logging module in filtermail to exclude a potential source of errors.
|
||||||
|
([#674](https://github.com/chatmail/relay/pull/674))
|
||||||
|
|
||||||
|
- Specify nginx.conf to only handle `mail_domain`, www, and mta-sts domains
|
||||||
|
([#636](https://github.com/chatmail/relay/pull/636))
|
||||||
|
|
||||||
- Setup TURN server
|
- Setup TURN server
|
||||||
([#621](https://github.com/chatmail/relay/pull/621))
|
([#621](https://github.com/chatmail/relay/pull/621))
|
||||||
|
|
||||||
@@ -11,9 +20,6 @@
|
|||||||
- Update iroh-relay to 0.35.0
|
- Update iroh-relay to 0.35.0
|
||||||
([#650](https://github.com/chatmail/relay/pull/650))
|
([#650](https://github.com/chatmail/relay/pull/650))
|
||||||
|
|
||||||
- postfix: accept whole mail before passing it to filtermail
|
|
||||||
([#673](https://github.com/chatmail/relay/pull/673))
|
|
||||||
|
|
||||||
- filtermail: accept mails from Protonmail
|
- filtermail: accept mails from Protonmail
|
||||||
([#616](https://github.com/chatmail/relay/pull/655))
|
([#616](https://github.com/chatmail/relay/pull/655))
|
||||||
|
|
||||||
|
|||||||
@@ -2,7 +2,6 @@
|
|||||||
import asyncio
|
import asyncio
|
||||||
import base64
|
import base64
|
||||||
import binascii
|
import binascii
|
||||||
import logging
|
|
||||||
import sys
|
import sys
|
||||||
import time
|
import time
|
||||||
from email import policy
|
from email import policy
|
||||||
@@ -105,8 +104,8 @@ def check_armored_payload(payload: str, outgoing: bool):
|
|||||||
# Disallow comments in outgoing messages
|
# Disallow comments in outgoing messages
|
||||||
version_comment = "Version: "
|
version_comment = "Version: "
|
||||||
if payload.startswith(version_comment):
|
if payload.startswith(version_comment):
|
||||||
version_line = payload.splitlines()[0]
|
splitindex = payload.find("\r\n") + 2
|
||||||
payload = payload.removeprefix(version_line)
|
payload = payload[splitindex:]
|
||||||
if outgoing:
|
if outgoing:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
@@ -229,7 +228,7 @@ class OutgoingBeforeQueueHandler:
|
|||||||
self.send_rate_limiter = SendRateLimiter()
|
self.send_rate_limiter = SendRateLimiter()
|
||||||
|
|
||||||
async def handle_MAIL(self, server, session, envelope, address, mail_options):
|
async def handle_MAIL(self, server, session, envelope, address, mail_options):
|
||||||
logging.info(f"handle_MAIL from {address}")
|
log_info(f"handle_MAIL from {address}")
|
||||||
envelope.mail_from = address
|
envelope.mail_from = address
|
||||||
max_sent = self.config.max_user_send_per_minute
|
max_sent = self.config.max_user_send_per_minute
|
||||||
if not self.send_rate_limiter.is_sending_allowed(address, max_sent):
|
if not self.send_rate_limiter.is_sending_allowed(address, max_sent):
|
||||||
@@ -242,11 +241,15 @@ class OutgoingBeforeQueueHandler:
|
|||||||
return "250 OK"
|
return "250 OK"
|
||||||
|
|
||||||
async def handle_DATA(self, server, session, envelope):
|
async def handle_DATA(self, server, session, envelope):
|
||||||
logging.info("handle_DATA before-queue")
|
loop = asyncio.get_running_loop()
|
||||||
|
return await loop.run_in_executor(None, self.sync_handle_DATA, envelope)
|
||||||
|
|
||||||
|
def sync_handle_DATA(self, envelope):
|
||||||
|
log_info("handle_DATA before-queue")
|
||||||
error = self.check_DATA(envelope)
|
error = self.check_DATA(envelope)
|
||||||
if error:
|
if error:
|
||||||
return error
|
return error
|
||||||
logging.info("re-injecting the mail that passed checks")
|
log_info("re-injecting the mail that passed checks")
|
||||||
client = SMTPClient("localhost", self.config.postfix_reinject_port)
|
client = SMTPClient("localhost", self.config.postfix_reinject_port)
|
||||||
client.sendmail(
|
client.sendmail(
|
||||||
envelope.mail_from, envelope.rcpt_tos, envelope.original_content
|
envelope.mail_from, envelope.rcpt_tos, envelope.original_content
|
||||||
@@ -255,7 +258,7 @@ class OutgoingBeforeQueueHandler:
|
|||||||
|
|
||||||
def check_DATA(self, envelope):
|
def check_DATA(self, envelope):
|
||||||
"""the central filtering function for e-mails."""
|
"""the central filtering function for e-mails."""
|
||||||
logging.info(f"Processing DATA message from {envelope.mail_from}")
|
log_info(f"Processing DATA message from {envelope.mail_from}")
|
||||||
|
|
||||||
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
||||||
mail_encrypted = check_encrypted(message, outgoing=True)
|
mail_encrypted = check_encrypted(message, outgoing=True)
|
||||||
@@ -295,11 +298,15 @@ class IncomingBeforeQueueHandler:
|
|||||||
self.config = config
|
self.config = config
|
||||||
|
|
||||||
async def handle_DATA(self, server, session, envelope):
|
async def handle_DATA(self, server, session, envelope):
|
||||||
logging.info("handle_DATA before-queue")
|
loop = asyncio.get_running_loop()
|
||||||
|
return await loop.run_in_executor(None, self.sync_handle_DATA, envelope)
|
||||||
|
|
||||||
|
def sync_handle_DATA(self, envelope):
|
||||||
|
log_info("handle_DATA before-queue")
|
||||||
error = self.check_DATA(envelope)
|
error = self.check_DATA(envelope)
|
||||||
if error:
|
if error:
|
||||||
return error
|
return error
|
||||||
logging.info("re-injecting the mail that passed checks")
|
log_info("re-injecting the mail that passed checks")
|
||||||
|
|
||||||
# the smtp daemon on reinject_port_incoming gives it to dkim milter
|
# the smtp daemon on reinject_port_incoming gives it to dkim milter
|
||||||
# which looks at source address to determine whether to verify or sign
|
# which looks at source address to determine whether to verify or sign
|
||||||
@@ -315,7 +322,7 @@ class IncomingBeforeQueueHandler:
|
|||||||
|
|
||||||
def check_DATA(self, envelope):
|
def check_DATA(self, envelope):
|
||||||
"""the central filtering function for e-mails."""
|
"""the central filtering function for e-mails."""
|
||||||
logging.info(f"Processing DATA message from {envelope.mail_from}")
|
log_info(f"Processing DATA message from {envelope.mail_from}")
|
||||||
|
|
||||||
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
||||||
mail_encrypted = check_encrypted(message, outgoing=False)
|
mail_encrypted = check_encrypted(message, outgoing=False)
|
||||||
@@ -357,16 +364,19 @@ class SendRateLimiter:
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def log_info(msg):
|
||||||
|
print(msg, file=sys.stderr)
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
args = sys.argv[1:]
|
args = sys.argv[1:]
|
||||||
assert len(args) == 2
|
assert len(args) == 2
|
||||||
config = read_config(args[0])
|
config = read_config(args[0])
|
||||||
mode = args[1]
|
mode = args[1]
|
||||||
logging.basicConfig(level=logging.WARN)
|
|
||||||
loop = asyncio.new_event_loop()
|
loop = asyncio.new_event_loop()
|
||||||
asyncio.set_event_loop(loop)
|
asyncio.set_event_loop(loop)
|
||||||
assert mode in ["incoming", "outgoing"]
|
assert mode in ["incoming", "outgoing"]
|
||||||
task = asyncmain_beforequeue(config, mode)
|
task = asyncmain_beforequeue(config, mode)
|
||||||
loop.create_task(task)
|
loop.create_task(task)
|
||||||
logging.info("entering serving loop")
|
log_info("entering serving loop")
|
||||||
loop.run_forever()
|
loop.run_forever()
|
||||||
|
|||||||
@@ -66,7 +66,7 @@ http {
|
|||||||
|
|
||||||
index index.html index.htm;
|
index index.html index.htm;
|
||||||
|
|
||||||
server_name _;
|
server_name {{ config.domain_name }} www.{{ config.domain_name }} mta-sts.{{ config.domain_name }};
|
||||||
|
|
||||||
access_log syslog:server=unix:/dev/log,facility=local7;
|
access_log syslog:server=unix:/dev/log,facility=local7;
|
||||||
|
|
||||||
|
|||||||
@@ -31,7 +31,6 @@ submission inet n - y - 5000 smtpd
|
|||||||
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o smtpd_client_connection_count_limit=1000
|
-o smtpd_client_connection_count_limit=1000
|
||||||
-o smtpd_proxy_options=speed_adjust
|
|
||||||
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
smtps inet n - y - 5000 smtpd
|
smtps inet n - y - 5000 smtpd
|
||||||
-o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
@@ -49,7 +48,6 @@ smtps inet n - y - 5000 smtpd
|
|||||||
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
-o smtpd_client_connection_count_limit=1000
|
-o smtpd_client_connection_count_limit=1000
|
||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o smtpd_proxy_options=speed_adjust
|
|
||||||
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
|||||||
@@ -195,8 +195,9 @@ def test_exceed_rate_limit(cmsetup, gencreds, maildata, chatmail_config):
|
|||||||
except smtplib.SMTPException as e:
|
except smtplib.SMTPException as e:
|
||||||
if i < chatmail_config.max_user_send_per_minute:
|
if i < chatmail_config.max_user_send_per_minute:
|
||||||
pytest.fail(f"rate limit was exceeded too early with msg {i}")
|
pytest.fail(f"rate limit was exceeded too early with msg {i}")
|
||||||
assert e.smtp_code == 450
|
outcome = e.recipients[user2.addr]
|
||||||
assert b"4.7.1: Too much mail from" in e.smtp_error
|
assert outcome[0] == 450
|
||||||
|
assert b"4.7.1: Too much mail from" in outcome[1]
|
||||||
return
|
return
|
||||||
pytest.fail("Rate limit was not exceeded")
|
pytest.fail("Rate limit was not exceeded")
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user