authentication fix
This commit is contained in:
2
.gitignore
vendored
2
.gitignore
vendored
@@ -12,6 +12,8 @@ test.txt
|
||||
custom_test.py
|
||||
custom_test.sh
|
||||
.github/
|
||||
*.backup
|
||||
mytest_*
|
||||
|
||||
# C extensions
|
||||
*.so
|
||||
|
||||
@@ -1,16 +1,33 @@
|
||||
"""
|
||||
Authentication modules for the SMTP server.
|
||||
Enhanced authentication modules for the SMTP server using ESRV schema.
|
||||
|
||||
Security Features:
|
||||
- Users can only send as their own email or domain emails (if permitted)
|
||||
- IP authentication is domain-specific
|
||||
- Comprehensive audit logging
|
||||
- Enhanced validation and error handling
|
||||
"""
|
||||
|
||||
from datetime import datetime
|
||||
from aiosmtpd.smtp import AuthResult, LoginPassword
|
||||
from email_server.models import Session, User, Domain, WhitelistedIP, AuthLog, check_password
|
||||
from email_server.models import (
|
||||
Session, User, Domain, WhitelistedIP,
|
||||
check_password, log_auth_attempt, get_user_by_email,
|
||||
get_whitelisted_ip, get_domain_by_name
|
||||
)
|
||||
from email_server.tool_box import get_logger
|
||||
|
||||
logger = get_logger()
|
||||
|
||||
class Authenticator:
|
||||
"""Username/password authenticator."""
|
||||
class EnhancedAuthenticator:
|
||||
"""
|
||||
Enhanced username/password authenticator with sender validation.
|
||||
|
||||
Features:
|
||||
- Validates user credentials
|
||||
- Stores authenticated user info for sender validation
|
||||
- Comprehensive audit logging
|
||||
"""
|
||||
|
||||
def __call__(self, server, session, envelope, mechanism, auth_data):
|
||||
if not isinstance(auth_data, LoginPassword):
|
||||
@@ -25,82 +42,174 @@ class Authenticator:
|
||||
username = username.decode('utf-8')
|
||||
if isinstance(password, bytes):
|
||||
password = password.decode('utf-8')
|
||||
|
||||
session_db = Session()
|
||||
|
||||
peer_ip = session.peer[0]
|
||||
logger.debug(f'Authentication attempt: {username} from {peer_ip}')
|
||||
|
||||
try:
|
||||
peer_ip = session.peer[0]
|
||||
logger.debug(f'Authentication attempt: {username} from {peer_ip}')
|
||||
|
||||
# Look up user in database
|
||||
user = session_db.query(User).filter_by(email=username).first()
|
||||
user = get_user_by_email(username)
|
||||
|
||||
if user and check_password(password, user.password_hash):
|
||||
domain = session_db.query(Domain).filter_by(id=user.domain_id).first()
|
||||
auth_log = AuthLog(
|
||||
timestamp=datetime.now(),
|
||||
peer=str(session.peer),
|
||||
username=username,
|
||||
success=True,
|
||||
message=f'Successful login for {username}'
|
||||
)
|
||||
session_db.add(auth_log)
|
||||
session_db.commit()
|
||||
# Store authenticated user info in session for later validation
|
||||
session.authenticated_user = user
|
||||
session.auth_type = 'user'
|
||||
|
||||
logger.debug(f'Authenticated user: {username} from domain {domain.domain_name if domain else "unknown"}')
|
||||
# Don't include the SMTP response code in the message - let aiosmtpd handle it
|
||||
# Log successful authentication
|
||||
log_auth_attempt(
|
||||
auth_type='user',
|
||||
identifier=username,
|
||||
ip_address=peer_ip,
|
||||
success=True,
|
||||
message=f'Successful user authentication'
|
||||
)
|
||||
|
||||
logger.info(f'Authenticated user: {username} (ID: {user.id}, can_send_as_domain: {user.can_send_as_domain})')
|
||||
return AuthResult(success=True, handled=True)
|
||||
else:
|
||||
auth_log = AuthLog(
|
||||
timestamp=datetime.now(),
|
||||
peer=str(session.peer),
|
||||
username=username,
|
||||
# Log failed authentication
|
||||
log_auth_attempt(
|
||||
auth_type='user',
|
||||
identifier=username,
|
||||
ip_address=peer_ip,
|
||||
success=False,
|
||||
message=f'Failed login for {username}: invalid credentials'
|
||||
message=f'Invalid credentials for {username}'
|
||||
)
|
||||
session_db.add(auth_log)
|
||||
session_db.commit()
|
||||
|
||||
logger.warning(f'Authentication failed for {username}: invalid credentials')
|
||||
return AuthResult(success=False, handled=True, message='535 Authentication failed')
|
||||
|
||||
except Exception as e:
|
||||
session_db.rollback()
|
||||
logger.error(f'Authentication error: {e}')
|
||||
logger.error(f'Authentication error for {username}: {e}')
|
||||
log_auth_attempt(
|
||||
auth_type='user',
|
||||
identifier=username,
|
||||
ip_address=peer_ip,
|
||||
success=False,
|
||||
message=f'Authentication error: {str(e)}'
|
||||
)
|
||||
return AuthResult(success=False, handled=True, message='451 Internal server error')
|
||||
finally:
|
||||
session_db.close()
|
||||
|
||||
class IPAuthenticator:
|
||||
"""IP-based authenticator for clients that don't provide credentials."""
|
||||
class EnhancedIPAuthenticator:
|
||||
"""
|
||||
Enhanced IP-based authenticator with domain-specific authorization.
|
||||
|
||||
def __call__(self, server, session, envelope, mechanism, auth_data):
|
||||
session_db = Session()
|
||||
try:
|
||||
peer_ip = session.peer[0]
|
||||
logger.debug(f'IP-based authentication attempt from: {peer_ip}')
|
||||
|
||||
# Check if IP is whitelisted
|
||||
whitelist = session_db.query(WhitelistedIP).filter_by(ip_address=peer_ip).first()
|
||||
if whitelist:
|
||||
domain = session_db.query(Domain).filter_by(id=whitelist.domain_id).first()
|
||||
if domain:
|
||||
auth_log = AuthLog(
|
||||
timestamp=datetime.now(),
|
||||
peer=str(session.peer),
|
||||
username=None,
|
||||
success=True,
|
||||
message=f'Authenticated via whitelisted IP for domain {domain.domain_name}'
|
||||
)
|
||||
session_db.add(auth_log)
|
||||
session_db.commit()
|
||||
logger.debug(f'Authenticated via whitelist: IP {peer_ip} for {domain.domain_name}')
|
||||
return AuthResult(success=True, handled=True, message='Authenticated via whitelist')
|
||||
Features:
|
||||
- Domain-specific IP authentication
|
||||
- Only allows sending for authorized domain
|
||||
- Comprehensive audit logging
|
||||
"""
|
||||
|
||||
def can_authenticate_for_domain(self, ip_address: str, domain_name: str) -> tuple[bool, str]:
|
||||
"""
|
||||
Check if IP can authenticate for a specific domain.
|
||||
|
||||
Args:
|
||||
ip_address: Client IP address
|
||||
domain_name: Domain to check authorization for
|
||||
|
||||
return AuthResult(success=False, handled=True, message='IP not whitelisted')
|
||||
Returns:
|
||||
(success, message) tuple
|
||||
"""
|
||||
try:
|
||||
whitelisted_ip = get_whitelisted_ip(ip_address, domain_name)
|
||||
if whitelisted_ip:
|
||||
return True, f"IP {ip_address} authorized for domain {domain_name}"
|
||||
else:
|
||||
return False, f"IP {ip_address} not authorized for domain {domain_name}"
|
||||
except Exception as e:
|
||||
session_db.rollback()
|
||||
logger.error(f'IP Authentication error: {e}')
|
||||
return AuthResult(success=False, handled=True, message='Server error')
|
||||
finally:
|
||||
session_db.close()
|
||||
logger.error(f"Error checking IP authorization: {e}")
|
||||
return False, f"Error checking IP authorization: {str(e)}"
|
||||
|
||||
def validate_sender_authorization(session, mail_from: str) -> tuple[bool, str]:
|
||||
"""
|
||||
Validate if the authenticated entity can send as the specified from address.
|
||||
|
||||
Args:
|
||||
session: SMTP session with authentication info
|
||||
mail_from: The MAIL FROM address
|
||||
|
||||
Returns:
|
||||
(authorized, message) tuple
|
||||
"""
|
||||
if not mail_from:
|
||||
return False, "No sender address provided"
|
||||
|
||||
# Extract domain from mail_from
|
||||
try:
|
||||
from_domain = mail_from.split('@')[1].lower() if '@' in mail_from else ''
|
||||
if not from_domain:
|
||||
return False, "Invalid sender address format"
|
||||
except (IndexError, AttributeError):
|
||||
return False, "Invalid sender address format"
|
||||
|
||||
peer_ip = session.peer[0]
|
||||
|
||||
# Check user authentication
|
||||
if hasattr(session, 'authenticated_user') and session.authenticated_user:
|
||||
user = session.authenticated_user
|
||||
|
||||
if user.can_send_as(mail_from):
|
||||
logger.info(f"User {user.email} authorized to send as {mail_from}")
|
||||
return True, f"User authorized to send as {mail_from}"
|
||||
else:
|
||||
message = f"User {user.email} not authorized to send as {mail_from}"
|
||||
logger.warning(message)
|
||||
log_auth_attempt(
|
||||
auth_type='sender_validation',
|
||||
identifier=f"{user.email} -> {mail_from}",
|
||||
ip_address=peer_ip,
|
||||
success=False,
|
||||
message=message
|
||||
)
|
||||
return False, message
|
||||
|
||||
# Check IP authentication for domain
|
||||
authenticator = EnhancedIPAuthenticator()
|
||||
can_auth, auth_message = authenticator.can_authenticate_for_domain(peer_ip, from_domain)
|
||||
|
||||
if can_auth:
|
||||
# Store IP auth info in session
|
||||
session.auth_type = 'ip'
|
||||
session.authorized_domain = from_domain
|
||||
|
||||
log_auth_attempt(
|
||||
auth_type='ip',
|
||||
identifier=f"{peer_ip} -> {from_domain}",
|
||||
ip_address=peer_ip,
|
||||
success=True,
|
||||
message=f"IP authorized for domain {from_domain}"
|
||||
)
|
||||
|
||||
logger.info(f"IP {peer_ip} authorized to send for domain {from_domain}")
|
||||
return True, f"IP authorized for domain {from_domain}"
|
||||
else:
|
||||
log_auth_attempt(
|
||||
auth_type='ip',
|
||||
identifier=f"{peer_ip} -> {from_domain}",
|
||||
ip_address=peer_ip,
|
||||
success=False,
|
||||
message=auth_message
|
||||
)
|
||||
|
||||
logger.warning(f"IP {peer_ip} not authorized for domain {from_domain}: {auth_message}")
|
||||
return False, f"Not authorized to send for domain {from_domain}"
|
||||
|
||||
def get_authenticated_domain_id(session) -> int:
|
||||
"""
|
||||
Get the domain ID for the authenticated entity.
|
||||
|
||||
Args:
|
||||
session: SMTP session with authentication info
|
||||
|
||||
Returns:
|
||||
Domain ID or None if not authenticated
|
||||
"""
|
||||
if hasattr(session, 'authenticated_user') and session.authenticated_user:
|
||||
return session.authenticated_user.domain_id
|
||||
|
||||
if hasattr(session, 'authorized_domain') and session.authorized_domain:
|
||||
domain = get_domain_by_name(session.authorized_domain)
|
||||
return domain.id if domain else None
|
||||
|
||||
return None
|
||||
|
||||
@@ -9,7 +9,7 @@ from email_server.tool_box import get_logger
|
||||
|
||||
logger = get_logger()
|
||||
|
||||
def add_domain(domain_name, requires_auth=True):
|
||||
def add_domain(domain_name):
|
||||
"""Add a new domain to the database."""
|
||||
session = Session()
|
||||
try:
|
||||
@@ -18,7 +18,7 @@ def add_domain(domain_name, requires_auth=True):
|
||||
print(f"Domain {domain_name} already exists")
|
||||
return False
|
||||
|
||||
domain = Domain(domain_name=domain_name, requires_auth=requires_auth)
|
||||
domain = Domain(domain_name=domain_name)
|
||||
session.add(domain)
|
||||
session.commit()
|
||||
print(f"Added domain: {domain_name}")
|
||||
|
||||
@@ -13,7 +13,6 @@ import random
|
||||
import string
|
||||
|
||||
settings = load_settings()
|
||||
DKIM_SELECTOR = settings['DKIM']['DKIM_SELECTOR']
|
||||
DKIM_KEY_SIZE = int(settings['DKIM']['DKIM_KEY_SIZE'])
|
||||
|
||||
logger = get_logger()
|
||||
|
||||
@@ -1,9 +1,15 @@
|
||||
"""
|
||||
Database models for the SMTP server.
|
||||
Database models for the SMTP server using ESRV schema.
|
||||
|
||||
Enhanced security features:
|
||||
- Users can only send as their own email or domain emails (if permitted)
|
||||
- IP authentication is domain-specific
|
||||
- All tables use 'esrv_' prefix for namespace isolation
|
||||
"""
|
||||
|
||||
from sqlalchemy import create_engine, Column, Integer, String, DateTime, Text, Boolean
|
||||
from sqlalchemy.orm import declarative_base, sessionmaker
|
||||
from sqlalchemy.orm import declarative_base, sessionmaker, relationship
|
||||
from sqlalchemy.sql import func
|
||||
from datetime import datetime
|
||||
import bcrypt
|
||||
from email_server.settings_loader import load_settings
|
||||
@@ -22,72 +28,279 @@ Session = sessionmaker(bind=engine)
|
||||
logger = get_logger()
|
||||
|
||||
class Domain(Base):
|
||||
__tablename__ = 'domains'
|
||||
"""Domain model with enhanced security features."""
|
||||
__tablename__ = 'esrv_domains'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
domain_name = Column(String, unique=True, nullable=False)
|
||||
requires_auth = Column(Boolean, default=True)
|
||||
is_active = Column(Boolean, default=True)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def __repr__(self):
|
||||
return f"<Domain(id={self.id}, domain_name='{self.domain_name}', active={self.is_active})>"
|
||||
|
||||
class User(Base):
|
||||
__tablename__ = 'users'
|
||||
"""
|
||||
User model with enhanced authentication controls.
|
||||
|
||||
Security features:
|
||||
- can_send_as_domain: If True, user can send as any email from their domain
|
||||
- If False, user can only send as their own email address
|
||||
"""
|
||||
__tablename__ = 'esrv_users'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
email = Column(String, unique=True, nullable=False)
|
||||
password_hash = Column(String, nullable=False)
|
||||
domain_id = Column(Integer, nullable=False)
|
||||
can_send_as_domain = Column(Boolean, default=False)
|
||||
is_active = Column(Boolean, default=True)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def can_send_as(self, from_address: str) -> bool:
|
||||
"""
|
||||
Check if this user can send emails as the given from_address.
|
||||
|
||||
Args:
|
||||
from_address: The email address the user wants to send from
|
||||
|
||||
Returns:
|
||||
True if user is allowed to send as this address
|
||||
"""
|
||||
# User can always send as their own email
|
||||
if from_address.lower() == self.email.lower():
|
||||
return True
|
||||
|
||||
# If user has domain privileges, check if from_address is from same domain
|
||||
if self.can_send_as_domain:
|
||||
user_domain = self.email.split('@')[1].lower()
|
||||
from_domain = from_address.split('@')[1].lower() if '@' in from_address else ''
|
||||
return user_domain == from_domain
|
||||
|
||||
return False
|
||||
|
||||
def __repr__(self):
|
||||
return f"<User(id={self.id}, email='{self.email}', domain_id={self.domain_id}, can_send_as_domain={self.can_send_as_domain})>"
|
||||
|
||||
class WhitelistedIP(Base):
|
||||
__tablename__ = 'whitelisted_ips'
|
||||
"""
|
||||
IP whitelist model with domain-specific authentication.
|
||||
|
||||
Security feature:
|
||||
- IPs can only send emails for their specific authorized domain
|
||||
"""
|
||||
__tablename__ = 'esrv_whitelisted_ips'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
ip_address = Column(String, unique=True, nullable=False)
|
||||
ip_address = Column(String, nullable=False)
|
||||
domain_id = Column(Integer, nullable=False)
|
||||
is_active = Column(Boolean, default=True)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def can_send_for_domain(self, domain_name: str) -> bool:
|
||||
"""
|
||||
Check if this IP can send emails for the given domain.
|
||||
|
||||
Args:
|
||||
domain_name: The domain name to check
|
||||
|
||||
Returns:
|
||||
True if IP is authorized for this domain
|
||||
"""
|
||||
if not self.is_active:
|
||||
return False
|
||||
|
||||
# Need to check against the actual domain
|
||||
session = Session()
|
||||
try:
|
||||
domain = session.query(Domain).filter_by(
|
||||
domain_name=domain_name.lower(),
|
||||
is_active=True
|
||||
).first()
|
||||
return domain and domain.id == self.domain_id
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
def __repr__(self):
|
||||
return f"<WhitelistedIP(id={self.id}, ip='{self.ip_address}', domain_id={self.domain_id})>"
|
||||
|
||||
class EmailLog(Base):
|
||||
__tablename__ = 'email_logs'
|
||||
"""Email log model for tracking sent emails."""
|
||||
__tablename__ = 'esrv_email_logs'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
message_id = Column(String, unique=True, nullable=False)
|
||||
timestamp = Column(DateTime, nullable=False)
|
||||
peer = Column(String, nullable=False)
|
||||
mail_from = Column(String, nullable=False)
|
||||
rcpt_tos = Column(String, nullable=False)
|
||||
content = Column(Text, nullable=False)
|
||||
from_address = Column(String, nullable=False)
|
||||
to_address = Column(String, nullable=False)
|
||||
subject = Column(Text)
|
||||
status = Column(String, nullable=False)
|
||||
dkim_signed = Column(Boolean, default=False)
|
||||
message = Column(Text)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def __repr__(self):
|
||||
return f"<EmailLog(id={self.id}, from='{self.from_address}', to='{self.to_address}', status='{self.status}')>"
|
||||
|
||||
class AuthLog(Base):
|
||||
__tablename__ = 'auth_logs'
|
||||
"""Authentication log model for security auditing."""
|
||||
__tablename__ = 'esrv_auth_logs'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
timestamp = Column(DateTime, nullable=False)
|
||||
peer = Column(String, nullable=False)
|
||||
username = Column(String)
|
||||
auth_type = Column(String, nullable=False) # 'user' or 'ip'
|
||||
identifier = Column(String, nullable=False) # email or IP address
|
||||
ip_address = Column(String)
|
||||
success = Column(Boolean, nullable=False)
|
||||
message = Column(String, nullable=False)
|
||||
message = Column(Text)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def __repr__(self):
|
||||
return f"<AuthLog(id={self.id}, type='{self.auth_type}', identifier='{self.identifier}', success={self.success})>"
|
||||
|
||||
class DKIMKey(Base):
|
||||
__tablename__ = 'dkim_keys'
|
||||
"""DKIM key model for email signing."""
|
||||
__tablename__ = 'esrv_dkim_keys'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
domain_id = Column(Integer, nullable=False)
|
||||
selector = Column(String, nullable=False)
|
||||
selector = Column(String, nullable=False, default='default')
|
||||
private_key = Column(Text, nullable=False)
|
||||
public_key = Column(Text, nullable=False)
|
||||
created_at = Column(DateTime, default=datetime.now)
|
||||
is_active = Column(Boolean, default=True)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def __repr__(self):
|
||||
return f"<DKIMKey(id={self.id}, domain_id={self.domain_id}, selector='{self.selector}', active={self.is_active})>"
|
||||
|
||||
class CustomHeader(Base):
|
||||
"""Model for storing custom headers per domain."""
|
||||
__tablename__ = 'custom_headers'
|
||||
"""Custom header model for domain-specific email headers."""
|
||||
__tablename__ = 'esrv_custom_headers'
|
||||
|
||||
id = Column(Integer, primary_key=True)
|
||||
domain_id = Column(Integer, nullable=False)
|
||||
header_name = Column(String, nullable=False)
|
||||
header_value = Column(String, nullable=False)
|
||||
is_active = Column(Boolean, default=True)
|
||||
created_at = Column(DateTime, default=func.now())
|
||||
|
||||
def __repr__(self):
|
||||
return f"<CustomHeader(id={self.id}, domain_id={self.domain_id}, header='{self.header_name}: {self.header_value}', active={self.is_active})>"
|
||||
|
||||
|
||||
def create_tables():
|
||||
"""Create all database tables."""
|
||||
"""Create all database tables using ESRV schema."""
|
||||
Base.metadata.create_all(engine)
|
||||
logger.info("Created ESRV database tables")
|
||||
|
||||
def hash_password(password):
|
||||
def hash_password(password: str) -> str:
|
||||
"""Hash a password using bcrypt."""
|
||||
return bcrypt.hashpw(password.encode('utf-8'), bcrypt.gensalt()).decode('utf-8')
|
||||
|
||||
def check_password(password, hashed):
|
||||
def check_password(password: str, hashed: str) -> bool:
|
||||
"""Check a password against its hash."""
|
||||
return bcrypt.checkpw(password.encode('utf-8'), hashed.encode('utf-8'))
|
||||
|
||||
def log_auth_attempt(auth_type: str, identifier: str, ip_address: str,
|
||||
success: bool, message: str) -> None:
|
||||
"""
|
||||
Log an authentication attempt for security auditing.
|
||||
|
||||
Args:
|
||||
auth_type: Type of auth ('user' or 'ip')
|
||||
identifier: User email or IP address
|
||||
ip_address: Client IP address
|
||||
success: Whether auth was successful
|
||||
message: Additional details
|
||||
"""
|
||||
session = Session()
|
||||
try:
|
||||
auth_log = AuthLog(
|
||||
auth_type=auth_type,
|
||||
identifier=identifier,
|
||||
ip_address=ip_address,
|
||||
success=success,
|
||||
message=message
|
||||
)
|
||||
session.add(auth_log)
|
||||
session.commit()
|
||||
logger.info(f"Auth log: {auth_type} {identifier} from {ip_address} - {'SUCCESS' if success else 'FAILED'}")
|
||||
except Exception as e:
|
||||
session.rollback()
|
||||
logger.error(f"Failed to log auth attempt: {e}")
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
def log_email(from_address: str, to_address: str, subject: str,
|
||||
status: str, message: str = None) -> None:
|
||||
"""
|
||||
Log an email send attempt.
|
||||
|
||||
Args:
|
||||
from_address: Sender email
|
||||
to_address: Recipient email
|
||||
subject: Email subject
|
||||
status: Send status ('sent', 'failed', etc.)
|
||||
message: Additional details
|
||||
"""
|
||||
session = Session()
|
||||
try:
|
||||
email_log = EmailLog(
|
||||
from_address=from_address,
|
||||
to_address=to_address,
|
||||
subject=subject,
|
||||
status=status,
|
||||
message=message
|
||||
)
|
||||
session.add(email_log)
|
||||
session.commit()
|
||||
logger.info(f"Email log: {from_address} -> {to_address} - {status}")
|
||||
except Exception as e:
|
||||
session.rollback()
|
||||
logger.error(f"Failed to log email: {e}")
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
def get_user_by_email(email: str):
|
||||
"""Get user by email address."""
|
||||
session = Session()
|
||||
try:
|
||||
return session.query(User).filter_by(email=email.lower(), is_active=True).first()
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
def get_domain_by_name(domain_name: str):
|
||||
"""Get domain by name."""
|
||||
session = Session()
|
||||
try:
|
||||
return session.query(Domain).filter_by(domain_name=domain_name.lower(), is_active=True).first()
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
def get_whitelisted_ip(ip_address: str, domain_name: str = None):
|
||||
"""
|
||||
Get whitelisted IP, optionally filtered by domain.
|
||||
|
||||
Args:
|
||||
ip_address: IP address to check
|
||||
domain_name: Optional domain name to restrict to
|
||||
|
||||
Returns:
|
||||
WhitelistedIP object if found and authorized for domain
|
||||
"""
|
||||
session = Session()
|
||||
try:
|
||||
query = session.query(WhitelistedIP).filter_by(
|
||||
ip_address=ip_address,
|
||||
is_active=True
|
||||
)
|
||||
|
||||
if domain_name:
|
||||
# Join with domain to check authorization
|
||||
domain = session.query(Domain).filter_by(
|
||||
domain_name=domain_name.lower(),
|
||||
is_active=True
|
||||
).first()
|
||||
if not domain:
|
||||
return None
|
||||
query = query.filter_by(domain_id=domain.id)
|
||||
|
||||
return query.first()
|
||||
finally:
|
||||
session.close()
|
||||
|
||||
@@ -9,7 +9,7 @@ from email_server.tool_box import get_logger
|
||||
|
||||
# Import our modules
|
||||
from email_server.models import create_tables
|
||||
from email_server.smtp_handler import CustomSMTPHandler, PlainController
|
||||
from email_server.smtp_handler import EnhancedCustomSMTPHandler, PlainController
|
||||
from email_server.tls_utils import generate_self_signed_cert, create_ssl_context
|
||||
from email_server.dkim_manager import DKIMManager
|
||||
from aiosmtpd.controller import Controller
|
||||
@@ -52,7 +52,7 @@ async def start_server():
|
||||
# Add example.com domain if not exists
|
||||
domain = session.query(Domain).filter_by(domain_name='example.com').first()
|
||||
if not domain:
|
||||
domain = Domain(domain_name='example.com', requires_auth=True)
|
||||
domain = Domain(domain_name='example.com')
|
||||
session.add(domain)
|
||||
session.commit()
|
||||
logger.debug("Added example.com domain")
|
||||
@@ -95,7 +95,7 @@ async def start_server():
|
||||
return
|
||||
|
||||
# Start plain SMTP server (with IP whitelist fallback)
|
||||
handler_plain = CustomSMTPHandler()
|
||||
handler_plain = EnhancedCustomSMTPHandler()
|
||||
controller_plain = PlainController(
|
||||
handler_plain,
|
||||
hostname=BIND_IP,
|
||||
@@ -106,7 +106,7 @@ async def start_server():
|
||||
logger.debug(f'Starting plain SMTP server on {HOSTNAME}:{SMTP_PORT}...')
|
||||
|
||||
# Start TLS SMTP server using closure pattern like the original
|
||||
handler_tls = CustomSMTPHandler()
|
||||
handler_tls = EnhancedCustomSMTPHandler()
|
||||
|
||||
# Define TLS controller class with ssl_context in closure (like original)
|
||||
class TLSController(Controller):
|
||||
|
||||
@@ -31,7 +31,6 @@ DEFAULTS = {
|
||||
'TLS_KEY_FILE': 'email_server/ssl_certs/server.key',
|
||||
},
|
||||
'DKIM': {
|
||||
'DKIM_SELECTOR': 'default',
|
||||
'DKIM_KEY_SIZE': '2048',
|
||||
},
|
||||
}
|
||||
|
||||
@@ -1,24 +1,37 @@
|
||||
"""
|
||||
SMTP handler for processing incoming emails.
|
||||
Enhanced SMTP handler for processing incoming emails with security controls.
|
||||
|
||||
Security Features:
|
||||
- Users can only send as their own email or domain emails (if permitted)
|
||||
- IP authentication is domain-specific
|
||||
- Sender authorization validation
|
||||
- Enhanced header management
|
||||
"""
|
||||
|
||||
import uuid
|
||||
from datetime import datetime
|
||||
from aiosmtpd.smtp import SMTP as AIOSMTP, AuthResult
|
||||
from aiosmtpd.controller import Controller
|
||||
from email_server.auth import Authenticator, IPAuthenticator
|
||||
from email_server.auth import EnhancedAuthenticator, EnhancedIPAuthenticator, validate_sender_authorization, get_authenticated_domain_id
|
||||
from email_server.email_relay import EmailRelay
|
||||
from email_server.dkim_manager import DKIMManager
|
||||
from email_server.tool_box import get_logger
|
||||
|
||||
logger = get_logger()
|
||||
|
||||
class CombinedAuthenticator:
|
||||
"""Combined authenticator that tries username/password first, then falls back to IP whitelist."""
|
||||
class EnhancedCombinedAuthenticator:
|
||||
"""
|
||||
Enhanced combined authenticator with sender validation support.
|
||||
|
||||
Features:
|
||||
- User authentication with session storage
|
||||
- IP-based authentication with domain validation
|
||||
- Fallback authentication logic
|
||||
"""
|
||||
|
||||
def __init__(self):
|
||||
self.user_auth = Authenticator()
|
||||
self.ip_auth = IPAuthenticator()
|
||||
self.user_auth = EnhancedAuthenticator()
|
||||
self.ip_auth = EnhancedIPAuthenticator()
|
||||
|
||||
def __call__(self, server, session, envelope, mechanism, auth_data):
|
||||
from aiosmtpd.smtp import LoginPassword
|
||||
@@ -31,16 +44,17 @@ class CombinedAuthenticator:
|
||||
# If user auth fails, don't try IP auth - return the failure
|
||||
return result
|
||||
|
||||
# If no auth_data provided, try IP-based authentication
|
||||
return self.ip_auth(server, session, envelope, mechanism, auth_data)
|
||||
# If no auth_data provided, IP auth will be validated during MAIL FROM
|
||||
# For now, allow the connection to proceed
|
||||
return AuthResult(success=True, handled=True)
|
||||
|
||||
class CustomSMTPHandler:
|
||||
"""Custom SMTP handler for processing emails."""
|
||||
class EnhancedCustomSMTPHandler:
|
||||
"""Enhanced custom SMTP handler with security controls."""
|
||||
|
||||
def __init__(self):
|
||||
self.authenticator = Authenticator()
|
||||
self.ip_authenticator = IPAuthenticator()
|
||||
self.combined_authenticator = CombinedAuthenticator()
|
||||
self.authenticator = EnhancedAuthenticator()
|
||||
self.ip_authenticator = EnhancedIPAuthenticator()
|
||||
self.combined_authenticator = EnhancedCombinedAuthenticator()
|
||||
self.email_relay = EmailRelay()
|
||||
self.dkim_manager = DKIMManager()
|
||||
self.auth_require_tls = False
|
||||
@@ -198,9 +212,25 @@ class CustomSMTPHandler:
|
||||
return '250 OK'
|
||||
|
||||
async def handle_MAIL(self, server, session, envelope, address, mail_options):
|
||||
"""Handle MAIL FROM command - validate sender."""
|
||||
"""
|
||||
Handle MAIL FROM command with enhanced sender validation.
|
||||
|
||||
Security Features:
|
||||
- Validates user can send as the specified address
|
||||
- Validates IP authorization for domain
|
||||
- Comprehensive audit logging
|
||||
"""
|
||||
logger.debug(f'MAIL FROM: {address}')
|
||||
|
||||
# Validate sender authorization
|
||||
authorized, message = validate_sender_authorization(session, address)
|
||||
|
||||
if not authorized:
|
||||
logger.warning(f'MAIL FROM rejected: {address} - {message}')
|
||||
return f'550 {message}'
|
||||
|
||||
envelope.mail_from = address
|
||||
logger.info(f'MAIL FROM accepted: {address} - {message}')
|
||||
return '250 OK'
|
||||
|
||||
class TLSController(Controller):
|
||||
|
||||
Reference in New Issue
Block a user