]> git.pld-linux.org Git - packages/postfix.git/blame - postfix-ident.patch
- 2.8.3 fixes CVE-2011-1720
[packages/postfix.git] / postfix-ident.patch
CommitLineData
06a490d4
JR
1diff -urN -x '*~' postfix-2.2.5/src/global/mail_params.h postfix-2.2.5-ident/src/global/mail_params.h
2--- postfix-2.2.5/src/global/mail_params.h 2006-02-22 16:20:15.000000000 +0100
3+++ postfix-2.2.5-ident/src/global/mail_params.h 2006-02-22 15:56:31.000000000 +0100
949c99f8
JR
4@@ -2346,6 +2346,9 @@
5 #define DEF_SMTP_EHLO_DIS_MAPS ""
6 extern char *var_smtp_ehlo_dis_maps;
7
8+#define VAR_SMTPD_IDENT_LOOKUP "smtpd_ident_lookup"
06a490d4
JR
9+#define DEF_SMTPD_IDENT_LOOKUP ""
10+extern char *var_smtpd_ident_lookup;
949c99f8
JR
11 /*
12 * SMTPD messages
13 */
06a490d4 14diff -urN -x '*~' postfix-2.2.5/src/smtpd/smtpd_ident.c postfix-2.2.5-ident/src/smtpd/smtpd_ident.c
949c99f8 15--- postfix-2.2.5/src/smtpd/smtpd_ident.c 1970-01-01 01:00:00.000000000 +0100
06a490d4 16+++ postfix-2.2.5-ident/src/smtpd/smtpd_ident.c 2006-02-22 15:56:31.000000000 +0100
949c99f8
JR
17@@ -0,0 +1,138 @@
18+#include <sys_defs.h>
19+#include <sys/socket.h>
20+#include <netinet/in.h>
21+#include <arpa/inet.h>
22+#include <stdio.h> /* strerror() */
23+#include <errno.h>
24+#include <string.h>
25+#include <mymalloc.h>
26+#include <sys/types.h>
27+#include <sys/time.h>
28+#include <unistd.h>
29+#include <vstream.h>
30+
31+#include <iostuff.h>
32+#include "smtpd.h"
33+
34+#define IDENT_MSGSIZE 256
35+#define IDENT_TIMEOUT 10
36+
37+#define CHOMP(STR) { char *tmp; tmp = STR; while (*tmp) { \
38+ if (*tmp == '\n' || *tmp == '\r') *tmp = '\0'; tmp++ ; } }
39+
40+char *smtpd_ident(struct sockaddr_in *peer_addr, struct sockaddr_in *smtpd_addr)
41+{
42+ int ident_sock;
43+ char ident_msg[IDENT_MSGSIZE + 1], *sp;
44+ char ident_user[IDENT_MSGSIZE + 1];
45+ struct sockaddr_in local_addr;
46+ struct sockaddr_in ident_addr;
47+ char *return_val;
48+ VSTREAM *ident_stream;
49+
50+ memset(ident_msg, 0, IDENT_MSGSIZE + 1);
51+ memset(ident_user, 0, IDENT_MSGSIZE + 1);
52+
53+ /*
54+ * Bind the local sockaddr to the same interface as smtpd before
55+ * connecting back to the auth port on the peer. This helps
56+ * with multihomed postfix servers. First, set up the address.
57+ */
58+
59+ /* Local sockname */
60+
61+ memset((char *) &local_addr, 0, sizeof(local_addr));
62+ local_addr.sin_family = AF_INET;
63+ memcpy((void *) &local_addr.sin_addr, (void *) &smtpd_addr->sin_addr, sizeof(local_addr.sin_addr));
64+
65+ /* Remote sockname + port */
66+
67+ memset((char *) &ident_addr, 0, sizeof(ident_addr));
68+ ident_addr.sin_family = AF_INET;
69+ memcpy((void *) &ident_addr.sin_addr, (void *) &peer_addr->sin_addr, sizeof(ident_addr.sin_addr));
70+ ident_addr.sin_port = htons(113);
71+
72+ do {
73+ /* socket call */
74+
75+ if ((ident_sock = socket(ident_addr.sin_family, SOCK_STREAM, 0)) < 0) {
76+ msg_warn("Can't allocate socket for ident lookup: %s", strerror(errno));
77+ break;
78+ }
79+
80+ /* Now bind the local sock to the interface */
81+
82+ if (bind(ident_sock, (struct sockaddr *)&local_addr, sizeof(local_addr)) < 0) {
83+ msg_warn("local bind of ident sock failed: %s", strerror(errno));
84+ break;
85+ }
86+
87+ /* connect() back to the smtp client host on port 113 */
88+
89+ if (connect(ident_sock, (struct sockaddr *) &ident_addr, sizeof(ident_addr )) < 0) {
90+ msg_warn( "ident connect to %s: %s", inet_ntoa(peer_addr->sin_addr),
91+ strerror(errno));
92+ break;
93+ }
94+
95+ /* Ok, make this a vstream */
96+
97+ ident_stream = vstream_fdopen(ident_sock, O_RDWR);
98+ ident_stream->timeout = IDENT_TIMEOUT;
99+
100+ /* Print the ident message to the remote host */
101+
102+ vstream_fprintf(ident_stream, "%d, %d\n", ntohs(peer_addr->sin_port), ntohs(smtpd_addr->sin_port));
103+ if (vstream_ftimeout(ident_stream)) {
104+ msg_warn( "ident write timed out to %s", inet_ntoa(peer_addr->sin_addr));
105+ break;
106+ }
107+
108+ /* Read back the result */
109+
110+ vstream_fread(ident_stream, ident_msg, IDENT_MSGSIZE);
111+ if (vstream_ftimeout(ident_stream)) {
112+ msg_warn( "ident read timed out to %s", inet_ntoa(peer_addr->sin_addr));
113+ break;
114+ }
115+
116+ /*
117+ * Should I even bother with this?
118+ *
119+ * Even if so, don't worry about this failing, set the timeout low
120+ */
121+
122+ ident_stream->timeout = 2;
123+ vstream_fwrite(ident_stream, "quit\n", strlen("quit\n"));
124+
125+ if (strlen(ident_msg) == 0) {
126+ msg_warn( "Failed to get ident string from %s", inet_ntoa(peer_addr->sin_addr));
127+ break;
128+ }
129+
130+ if ((sp = strrchr(ident_msg, ':')) == NULL) {
131+ msg_warn( "Invalid ident string from %s", inet_ntoa(peer_addr->sin_addr));
132+ break;
133+ }
134+ sp++;
135+ CHOMP(sp);
136+ while (*sp && (*sp == ' ' || *sp == '\t')) {
137+ sp++;
138+ }
139+
140+ /* If we break before this line, we know we had some sort of bad error */
141+
142+ strncpy(ident_user, sp, IDENT_MSGSIZE);
143+ msg_info( "Received ident string %s from %s", sp, inet_ntoa(peer_addr->sin_addr));
144+
145+ } while (0);
146+
147+ if (strlen(ident_user) == 0) {
148+ msg_warn( "Failed to get ident user for %s", inet_ntoa(peer_addr->sin_addr));
149+ return NULL;
150+ }
151+
152+ vstream_fclose(ident_stream);
153+ return_val = mystrdup(ident_user);
154+ return return_val;
155+}
e6742683 156--- postfix-2.3-RC9/src/smtpd/smtpd.c.orig 2006-07-11 20:13:27.780850288 +0200
157+++ postfix-2.3-RC9/src/smtpd/smtpd.c 2006-07-11 20:27:06.515383720 +0200
158@@ -1024,6 +1024,7 @@
159 char *var_local_rwr_clients;
160 char *var_smtpd_ehlo_dis_words;
161 char *var_smtpd_ehlo_dis_maps;
162+char *var_smtpd_ident_lookup;
163
164 char *var_smtpd_tls_level;
165 bool var_smtpd_use_tls;
166@@ -1119,6 +1120,11 @@
167 int smtpd_input_transp_mask;
168
169 /*
170+ * Hosts that should be ident-queried
171+ */
172+NAMADR_LIST *smtpd_ident_lookup;
173+
174+ /*
175 * Forward declarations.
176 */
177 static void helo_reset(SMTPD_STATE *);
178@@ -2503,10 +2509,18 @@
179 * intermediate proxy.
180 */
a9621843 181 if (!proxy || state->xforward.flags == 0) {
e6742683 182- out_fprintf(out_stream, REC_TYPE_NORM,
183- "Received: from %s (%s [%s])",
184- state->helo_name ? state->helo_name : state->name,
185- state->name, state->rfc_addr);
186+ if (namadr_list_match(smtpd_ident_lookup, state->name, state->addr)) {
187+ out_fprintf(out_stream, REC_TYPE_NORM,
188+ "Received: from %s (%s [%s] ident=%s)",
189+ state->helo_name ? state->helo_name : state->name,
190+ state->name, state->rfc_addr,
191+ state->ident_user);
192+ } else {
193+ out_fprintf(out_stream, REC_TYPE_NORM,
194+ "Received: from %s (%s [%s])",
195+ state->helo_name ? state->helo_name : state->name,
196+ state->name, state->rfc_addr);
197+ }
198
199 #define VSTRING_STRDUP(s) vstring_strcpy(vstring_alloc(strlen(s) + 1), (s))
200
ce5d3fb8 201@@ -4451,6 +4451,9 @@
e6742683 202 xclient_hosts = namadr_list_init(MATCH_FLAG_NONE, var_xclient_hosts);
203 xforward_hosts = namadr_list_init(MATCH_FLAG_NONE, var_xforward_hosts);
204 hogger_list = namadr_list_init(MATCH_FLAG_NONE, var_smtpd_hoggers);
205+ smtpd_ident_lookup =
ce5d3fb8
ER
206+ namadr_list_init(match_parent_style(VAR_SMTPD_IDENT_LOOKUP),
207+ var_smtpd_ident_lookup);
208
209 /*
210 * Open maps before dropping privileges so we can read passwords etc.
0a41a8cf 211@@ -5076,6 +5093,7 @@
e6742683 212 VAR_MILT_V, DEF_MILT_V, &var_milt_v, 1, 0,
0a41a8cf 213 VAR_STRESS, DEF_STRESS, &var_stress, 0, 0,
e6742683 214 VAR_REJECT_REPLY_MSG_ACCESS_DENIED, DEF_REJECT_REPLY_MSG_ACCESS_DENIED, &var_reject_reply_msg_access_denied, 1, 0,
215+ VAR_SMTPD_IDENT_LOOKUP, DEF_SMTPD_IDENT_LOOKUP, &var_smtpd_ident_lookup, 0, 0,
0a41a8cf 216 VAR_UNV_FROM_WHY, DEF_UNV_FROM_WHY, &var_unv_from_why, 0, 0,
217 VAR_UNV_RCPT_WHY, DEF_UNV_RCPT_WHY, &var_unv_rcpt_why, 0, 0,
218 VAR_REJECT_TMPF_ACT, DEF_REJECT_TMPF_ACT, &var_reject_tmpf_act, 1, 0,
e6742683 219--- postfix-2.3-RC9/src/smtpd/smtpd.h.orig 2006-07-09 21:49:21.000000000 +0200
220+++ postfix-2.3-RC9/src/smtpd/smtpd.h 2006-07-11 20:30:43.993322048 +0200
221@@ -77,6 +77,7 @@
222 char *addr; /* client host address string */
223 char *namaddr; /* combined name and address */
224 char *rfc_addr; /* address for RFC 2821 */
225+ char *ident_user; /* user name returned by ident RFC 1413 */
226 int addr_family; /* address family */
227 struct sockaddr_storage sockaddr; /* binary client endpoint */
228 int name_status; /* 2=ok 4=soft 5=hard 6=forged */
229@@ -266,6 +267,8 @@
230 extern void smtpd_peer_init(SMTPD_STATE *state);
231 extern void smtpd_peer_reset(SMTPD_STATE *state);
232
233+extern char *smtpd_ident(struct sockaddr_in *peer_addr, struct sockaddr_in *smtpd_addr);
234+
235 #define SMTPD_PEER_CODE_OK 2
236 #define SMTPD_PEER_CODE_TEMP 4
237 #define SMTPD_PEER_CODE_PERM 5
238--- postfix-2.3-RC9/src/smtpd/smtpd_peer.c.orig 2006-07-08 02:51:33.000000000 +0200
239+++ postfix-2.3-RC9/src/smtpd/smtpd_peer.c 2006-07-11 20:41:04.935924424 +0200
240@@ -98,6 +98,7 @@
949c99f8
JR
241
242 #include <sys_defs.h>
243 #include <sys/socket.h>
244+#include <sys/types.h>
245 #include <netinet/in.h>
246 #include <arpa/inet.h>
247 #include <stdio.h> /* strerror() */
e6742683 248@@ -116,6 +117,7 @@
06a490d4 249
949c99f8
JR
250 /* Global library. */
251
06a490d4 252+#include <namadr_list.h>
949c99f8 253 #include <mail_proto.h>
949c99f8 254 #include <valid_mailhost_addr.h>
e6742683 255 #include <mail_params.h>
256@@ -124,6 +126,8 @@
06a490d4
JR
257
258 #include "smtpd.h"
259
260+extern NAMADR_LIST *smtpd_ident_lookup;
261+
262 /* smtpd_peer_init - initialize peer information */
263
264 void smtpd_peer_init(SMTPD_STATE *state)
e6742683 265@@ -131,6 +135,9 @@
266 const char *myname = "smtpd_peer_init";
267 SOCKADDR_SIZE sa_length;
949c99f8
JR
268 struct sockaddr *sa;
269+ struct sockaddr_in serv_sin;
270+ char *ident_user = NULL;
afe23fca 271+ SOCKADDR_SIZE sa_len;
949c99f8
JR
272 INET_PROTO_INFO *proto_info = inet_proto_info();
273
274 sa = (struct sockaddr *) & (state->sockaddr);
ce5d3fb8 275@@ -177,6 +177,7 @@
e6742683 276 state->addr_family = AF_UNSPEC;
277 state->name_status = SMTPD_PEER_CODE_PERM;
278 state->reverse_name_status = SMTPD_PEER_CODE_PERM;
06a490d4 279+ state->ident_user = mystrdup("NO-USER");
ce5d3fb8 280 state->port = mystrdup(CLIENT_PORT_UNKNOWN);
949c99f8 281 }
ce5d3fb8 282
e6742683 283@@ -302,6 +310,7 @@
949c99f8
JR
284 if (aierr) {
285 msg_warn("%s: hostname %s verification failed: %s",
286 state->addr, state->name, MAI_STRERROR(aierr));
06a490d4 287+ state->ident_user = mystrdup("NO-USER");
949c99f8 288 REJECT_PEER_NAME(state, (TEMP_AI_ERROR(aierr) ?
e6742683 289 SMTPD_PEER_CODE_TEMP : SMTPD_PEER_CODE_FORGED));
949c99f8 290 } else {
e6742683 291@@ -323,6 +332,20 @@
949c99f8
JR
292 freeaddrinfo(res0);
293 }
294 }
295+
06a490d4 296+ if (namadr_list_match(smtpd_ident_lookup, state->name, state->addr)) {
949c99f8
JR
297+ /* If getsockname fails, just forget it */
298+ sa_len = sizeof(serv_sin);
299+ if (getsockname(vstream_fileno(state->client), (struct sockaddr *)&serv_sin, &sa_len) >= 0) {
300+ ident_user = smtpd_ident((struct sockaddr_in *)sa, &serv_sin);
301+ if (ident_user == NULL)
302+ state->ident_user = mystrdup("NO-USER");
303+ else
304+ state->ident_user = ident_user;
305+ } else
306+ msg_warn("getsockname failed while doing ident lookup: %s", strerror(errno));
06a490d4
JR
307+ } else
308+ state->ident_user = mystrdup("NO-USER");
949c99f8
JR
309 }
310
311 /*
ce5d3fb8 312@@ -390,7 +391,8 @@
e6742683 313 state->name_status = SMTPD_PEER_CODE_OK;
314 state->reverse_name_status = SMTPD_PEER_CODE_OK;
ce5d3fb8
ER
315 state->port = mystrdup("0"); /* XXX bogus. */
316- }
06a490d4 317+ state->ident_user = mystrdup("NO-USER");
ce5d3fb8 318+ }
949c99f8
JR
319
320 /*
ce5d3fb8
ER
321 * Do the name[addr]:port formatting for pretty reports.
322@@ -410,5 +412,6 @@
949c99f8
JR
323 myfree(state->addr);
324 myfree(state->namaddr);
325 myfree(state->rfc_addr);
06a490d4 326+ myfree(state->ident_user);
ce5d3fb8 327 myfree(state->port);
949c99f8 328 }
1f618f35 329--- postfix-2.8.3/src/smtpd/Makefile.in~ 2011-05-17 14:28:28.406666872 +0200
330+++ postfix-2.8.3/src/smtpd/Makefile.in 2011-05-17 14:31:06.946666872 +0200
331@@ -2,11 +2,11 @@
332 SRCS = smtpd.c smtpd_token.c smtpd_check.c smtpd_chat.c smtpd_state.c \
333 smtpd_peer.c smtpd_sasl_proto.c smtpd_sasl_glue.c smtpd_proxy.c \
334 smtpd_xforward.c smtpd_dsn_fix.c smtpd_milter.c smtpd_resolve.c \
335- smtpd_expand.c
336+ smtpd_expand.c smtpd_ident.c
337 OBJS = smtpd.o smtpd_token.o smtpd_check.o smtpd_chat.o smtpd_state.o \
338 smtpd_peer.o smtpd_sasl_proto.o smtpd_sasl_glue.o smtpd_proxy.o \
339 smtpd_xforward.o smtpd_dsn_fix.o smtpd_milter.o smtpd_resolve.o \
340- smtpd_expand.o
341+ smtpd_expand.o smtpd_ident.o
342 HDRS = smtpd_token.h smtpd_check.h smtpd_chat.h smtpd_sasl_proto.h \
343 smtpd_sasl_glue.h smtpd_proxy.h smtpd_dsn_fix.h smtpd_milter.h \
344 smtpd_resolve.h smtpd_expand.h
This page took 0.082034 seconds and 4 git commands to generate.