DNS: return explicit error code to caller on dnssec failure, for better logging
[exim.git] / src / src / routers / dnslookup.c
CommitLineData
0756eb3c
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
3386088d 5/* Copyright (c) University of Cambridge 1995 - 2015 */
0756eb3c
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8#include "../exim.h"
9#include "rf_functions.h"
10#include "dnslookup.h"
11
12
13
14/* Options specific to the dnslookup router. */
15
16optionlist dnslookup_router_options[] = {
17 { "check_secondary_mx", opt_bool,
18 (void *)(offsetof(dnslookup_router_options_block, check_secondary_mx)) },
19 { "check_srv", opt_stringptr,
20 (void *)(offsetof(dnslookup_router_options_block, check_srv)) },
bd4ece7d
JH
21 { "fail_defer_domains", opt_stringptr,
22 (void *)(offsetof(dnslookup_router_options_block, fail_defer_domains)) },
0756eb3c
PH
23 { "mx_domains", opt_stringptr,
24 (void *)(offsetof(dnslookup_router_options_block, mx_domains)) },
25 { "mx_fail_domains", opt_stringptr,
26 (void *)(offsetof(dnslookup_router_options_block, mx_fail_domains)) },
27 { "qualify_single", opt_bool,
28 (void *)(offsetof(dnslookup_router_options_block, qualify_single)) },
29 { "rewrite_headers", opt_bool,
30 (void *)(offsetof(dnslookup_router_options_block, rewrite_headers)) },
31 { "same_domain_copy_routing", opt_bool|opt_public,
32 (void *)(offsetof(router_instance, same_domain_copy_routing)) },
33 { "search_parents", opt_bool,
34 (void *)(offsetof(dnslookup_router_options_block, search_parents)) },
35 { "srv_fail_domains", opt_stringptr,
36 (void *)(offsetof(dnslookup_router_options_block, srv_fail_domains)) },
37 { "widen_domains", opt_stringptr,
38 (void *)(offsetof(dnslookup_router_options_block, widen_domains)) }
39};
40
41/* Size of the options list. An extern variable has to be used so that its
42address can appear in the tables drtables.c. */
43
44int dnslookup_router_options_count =
45 sizeof(dnslookup_router_options)/sizeof(optionlist);
46
47/* Default private options block for the dnslookup router. */
48
49dnslookup_router_options_block dnslookup_router_option_defaults = {
50 FALSE, /* check_secondary_mx */
51 TRUE, /* qualify_single */
52 FALSE, /* search_parents */
53 TRUE, /* rewrite_headers */
54 NULL, /* widen_domains */
55 NULL, /* mx_domains */
56 NULL, /* mx_fail_domains */
57 NULL, /* srv_fail_domains */
8c51eead 58 NULL, /* check_srv */
bd4ece7d 59 NULL /* fail_defer_domains */
0756eb3c
PH
60};
61
62
63
64/*************************************************
65* Initialization entry point *
66*************************************************/
67
68/* Called for each instance, after its options have been read, to enable
69consistency checks to be done, or anything else that needs to be set up. */
70
71void
72dnslookup_router_init(router_instance *rblock)
73{
74/*
75dnslookup_router_options_block *ob =
76 (dnslookup_router_options_block *)(rblock->options_block);
77*/
78rblock = rblock;
79}
80
81
82
83/*************************************************
84* Main entry point *
85*************************************************/
86
87/* See local README for interface details. This router returns:
88
89DECLINE
90 . the domain does not exist in the DNS
91 . MX records point to non-existent hosts (including RHS = IP address)
92 . a single SRV record has a host name of "." (=> no service)
93 . syntactically invalid mail domain
94 . check_secondary_mx set, and local host not in host list
95
96DEFER
97 . lookup defer for mx_domains
98 . timeout etc on DNS lookup
99 . verifying the errors address caused a deferment or a big disaster such
100 as an expansion failure (rf_get_errors_address)
101 . expanding a headers_{add,remove} string caused a deferment or another
102 expansion error (rf_get_munge_headers)
103 . a problem in rf_get_transport: no transport when one is needed;
104 failed to expand dynamic transport; failed to find dynamic transport
105 . failure to expand or find a uid/gid (rf_get_ugid via rf_queue_add)
106 . self = "freeze", self = "defer"
107
108PASS
109 . timeout etc on DNS lookup and pass_on_timeout set
110 . self = "pass"
111
112REROUTED
113 . routed to local host, but name was expanded by DNS lookup, so a
114 re-routing should take place
115 . self = "reroute"
116
117 In both cases the new address will have been set up as a child
118
119FAIL
120 . self = "fail"
121
122OK
123 added address to addr_local or addr_remote, as appropriate for the
124 type of transport; this includes the self="send" case.
125*/
126
127int
128dnslookup_router_entry(
129 router_instance *rblock, /* data for this instantiation */
130 address_item *addr, /* address we are working on */
131 struct passwd *pw, /* passwd entry after check_local_user */
fd6de02e 132 int verify, /* v_none/v_recipient/v_sender/v_expn */
0756eb3c
PH
133 address_item **addr_local, /* add it to this if it's local */
134 address_item **addr_remote, /* add it to this if it's remote */
135 address_item **addr_new, /* put new addresses on here */
136 address_item **addr_succeed) /* put old address here on success */
137{
138host_item h;
139int rc;
140int widen_sep = 0;
141int whichrrs = HOST_FIND_BY_MX | HOST_FIND_BY_A;
142dnslookup_router_options_block *ob =
143 (dnslookup_router_options_block *)(rblock->options_block);
144uschar *srv_service = NULL;
145uschar *widen = NULL;
55414b25
JH
146const uschar *pre_widen = addr->domain;
147const uschar *post_widen = NULL;
148const uschar *fully_qualified_name;
149const uschar *listptr;
0756eb3c
PH
150uschar widen_buffer[256];
151
152addr_new = addr_new; /* Keep picky compilers happy */
153addr_succeed = addr_succeed;
154
155DEBUG(D_route)
156 debug_printf("%s router called for %s\n domain = %s\n",
157 rblock->name, addr->address, addr->domain);
158
159/* If an SRV check is required, expand the service name */
160
bd4ece7d 161if (ob->check_srv)
0756eb3c 162 {
bd4ece7d
JH
163 if ( !(srv_service = expand_string(ob->check_srv))
164 && !expand_string_forcedfail)
0756eb3c
PH
165 {
166 addr->message = string_sprintf("%s router: failed to expand \"%s\": %s",
167 rblock->name, ob->check_srv, expand_string_message);
168 return DEFER;
169 }
170 else whichrrs |= HOST_FIND_BY_SRV;
171 }
172
173/* Set up the first of any widening domains. The code further down copes with
174either pre- or post-widening, but at present there is no way to turn on
175pre-widening, as actually doing so seems like a rather bad idea, and nobody has
176requested it. Pre-widening would cause local abbreviated names to take
177precedence over global names. For example, if the domain is "xxx.ch" it might
178be something in the "ch" toplevel domain, but it also might be xxx.ch.xyz.com.
179The choice of pre- or post-widening affects which takes precedence. If ever
180somebody comes up with some kind of requirement for pre-widening, presumably
fd6de02e
PH
181with some conditions under which it is done, it can be selected here.
182
183The rewrite_headers option works only when routing an address at transport
184time, because the alterations to the headers are not persistent so must be
185worked out immediately before they are used. Sender addresses are routed for
186verification purposes, but never at transport time, so any header changes that
187you might expect as a result of sender domain widening do not occur. Therefore
188we do not perform widening when verifying sender addresses; however, widening
a5f65aa4
TF
189sender addresses is OK if we do not have to rewrite the headers. A corollary
190of this is that if the current address is not the original address, then it
191does not appear in the message header so it is also OK to widen. The
192suppression of widening for sender addresses is silent because it is the
193normal desirable behaviour. */
194
bd4ece7d
JH
195if ( ob->widen_domains
196 && (verify != v_sender || !ob->rewrite_headers || addr->parent))
0756eb3c
PH
197 {
198 listptr = ob->widen_domains;
199 widen = string_nextinlist(&listptr, &widen_sep, widen_buffer,
200 sizeof(widen_buffer));
201
202/****
203 if (some condition requiring pre-widening)
204 {
205 post_widen = pre_widen;
206 pre_widen = NULL;
207 }
208****/
209 }
210
211/* Loop to cope with explicit widening of domains as configured. This code
212copes with widening that may happen before or after the original name. The
213decision as to which is taken above. */
214
215for (;;)
216 {
217 int flags = whichrrs;
218 BOOL removed = FALSE;
219
bd4ece7d 220 if (pre_widen)
0756eb3c
PH
221 {
222 h.name = pre_widen;
223 pre_widen = NULL;
224 }
bd4ece7d 225 else if (widen)
0756eb3c
PH
226 {
227 h.name = string_sprintf("%s.%s", addr->domain, widen);
228 widen = string_nextinlist(&listptr, &widen_sep, widen_buffer,
229 sizeof(widen_buffer));
230 DEBUG(D_route) debug_printf("%s router widened %s to %s\n", rblock->name,
231 addr->domain, h.name);
232 }
bd4ece7d 233 else if (post_widen)
0756eb3c
PH
234 {
235 h.name = post_widen;
236 post_widen = NULL;
237 DEBUG(D_route) debug_printf("%s router trying %s after widening failed\n",
238 rblock->name, h.name);
239 }
240 else return DECLINE;
241
242 /* Set up the rest of the initial host item. Others may get chained on if
243 there is more than one IP address. We set it up here instead of outside the
244 loop so as to re-initialize if a previous try succeeded but was rejected
245 because of not having an MX record. */
246
247 h.next = NULL;
248 h.address = NULL;
249 h.port = PORT_NONE;
250 h.mx = MX_NONE;
251 h.status = hstatus_unknown;
252 h.why = hwhy_unknown;
253 h.last_try = 0;
254
255 /* Unfortunately, we cannot set the mx_only option in advance, because the
256 DNS lookup may extend an unqualified name. Therefore, we must do the test
a7fdad5b
TF
257 subsequently. We use the same logic as that for widen_domains above to avoid
258 requesting a header rewrite that cannot work. */
0756eb3c 259
bd4ece7d 260 if (verify != v_sender || !ob->rewrite_headers || addr->parent)
a7fdad5b
TF
261 {
262 if (ob->qualify_single) flags |= HOST_FIND_QUALIFY_SINGLE;
263 if (ob->search_parents) flags |= HOST_FIND_SEARCH_PARENTS;
264 }
0756eb3c 265
55414b25 266 rc = host_find_bydns(&h, CUS rblock->ignore_target_hosts, flags, srv_service,
8c51eead 267 ob->srv_fail_domains, ob->mx_fail_domains,
7cd171b7 268 &rblock->dnssec, &fully_qualified_name, &removed);
0756eb3c
PH
269 if (removed) setflag(addr, af_local_host_removed);
270
271 /* If host found with only address records, test for the domain's being in
272 the mx_domains list. Note that this applies also to SRV records; the name of
273 the option is historical. */
274
275 if ((rc == HOST_FOUND || rc == HOST_FOUND_LOCAL) && h.mx < 0 &&
bd4ece7d 276 ob->mx_domains)
55414b25 277 switch(match_isinlist(fully_qualified_name,
bd4ece7d 278 CUSS &(ob->mx_domains), 0,
0756eb3c
PH
279 &domainlist_anchor, addr->domain_cache, MCL_DOMAIN, TRUE, NULL))
280 {
281 case DEFER:
282 addr->message = US"lookup defer for mx_domains";
283 return DEFER;
284
285 case OK:
286 DEBUG(D_route) debug_printf("%s router rejected %s: no MX record(s)\n",
287 rblock->name, fully_qualified_name);
288 continue;
289 }
0756eb3c
PH
290
291 /* Deferral returns forthwith, and anything other than failure breaks the
292 loop. */
293
2546388c
JH
294 if (rc == HOST_FIND_SECURITY)
295 {
296 addr->message = US"host lookup done insecurely";
297 return DEFER;
298 }
0756eb3c
PH
299 if (rc == HOST_FIND_AGAIN)
300 {
301 if (rblock->pass_on_timeout)
302 {
303 DEBUG(D_route) debug_printf("%s router timed out, and pass_on_timeout is set\n",
304 rblock->name);
305 return PASS;
306 }
307 addr->message = US"host lookup did not complete";
308 return DEFER;
309 }
310
311 if (rc != HOST_FIND_FAILED) break;
312
1435d4b2
JH
313 if (ob->fail_defer_domains)
314 switch(match_isinlist(fully_qualified_name,
315 CUSS &ob->fail_defer_domains, 0,
316 &domainlist_anchor, addr->domain_cache, MCL_DOMAIN, TRUE, NULL))
317 {
318 case DEFER:
319 addr->message = US"lookup defer for fail_defer_domains option";
320 return DEFER;
321
322 case OK:
323 DEBUG(D_route) debug_printf("%s router: matched fail_defer_domains\n",
324 rblock->name);
325 addr->message = US"missing MX, or all MXs point to missing A records,"
326 " and defer requested";
327 return DEFER;
328 }
66afa403
TF
329 /* Check to see if the failure is the result of MX records pointing to
330 non-existent domains, and if so, set an appropriate error message; the case
331 of an MX or SRV record pointing to "." is another special case that we can
0756eb3c
PH
332 detect. Otherwise "unknown mail domain" is used, which is confusing. Also, in
333 this case don't do the widening. We need check only the first host to see if
334 its MX has been filled in, but there is no address, because if there were any
335 usable addresses returned, we would not have had HOST_FIND_FAILED.
336
337 As a common cause of this problem is MX records with IP addresses on the
338 RHS, give a special message in this case. */
339
340 if (h.mx >= 0 && h.address == NULL)
341 {
ca02eafb 342 setflag(addr, af_pass_message); /* This is not a security risk */
0756eb3c 343 if (h.name[0] == 0)
66afa403 344 addr->message = US"an MX or SRV record indicated no SMTP service";
0756eb3c
PH
345 else
346 {
bd4ece7d 347 addr->basic_errno = ERRNO_UNKNOWNHOST;
0756eb3c 348 addr->message = US"all relevant MX records point to non-existent hosts";
7e66e54d 349 if (!allow_mx_to_ip && string_is_ip_address(h.name, NULL) != 0)
0756eb3c
PH
350 {
351 addr->user_message =
352 string_sprintf("It appears that the DNS operator for %s\n"
353 "has installed an invalid MX record with an IP address\n"
354 "instead of a domain name on the right hand side.", addr->domain);
355 addr->message = string_sprintf("%s or (invalidly) to IP addresses",
356 addr->message);
357 }
358 }
359 return DECLINE;
360 }
361
362 /* If there's a syntax error, do not continue with any widening, and note
363 the error. */
364
365 if (host_find_failed_syntax)
366 {
367 addr->message = string_sprintf("mail domain \"%s\" is syntactically "
368 "invalid", h.name);
369 return DECLINE;
370 }
371 }
372
373/* If the original domain name has been changed as a result of the host lookup,
374set up a child address for rerouting and request header rewrites if so
375configured. Then yield REROUTED. However, if the only change is a change of
376case in the domain name, which some resolvers yield (others don't), just change
377the domain name in the original address so that the official version is used in
378RCPT commands. */
379
380if (Ustrcmp(addr->domain, fully_qualified_name) != 0)
381 {
382 if (strcmpic(addr->domain, fully_qualified_name) == 0)
383 {
384 uschar *at = Ustrrchr(addr->address, '@');
385 memcpy(at+1, fully_qualified_name, Ustrlen(at+1));
386 }
387 else
388 {
389 rf_change_domain(addr, fully_qualified_name, ob->rewrite_headers, addr_new);
390 return REROUTED;
391 }
392 }
393
394/* If the yield is HOST_FOUND_LOCAL, the remote domain name either found MX
395records with the lowest numbered one pointing to a host with an IP address that
396is set on one of the interfaces of this machine, or found A records or got
397addresses from gethostbyname() that contain one for this machine. This can
398happen quite legitimately if the original name was a shortened form of a
399domain, but we will have picked that up already via the name change test above.
400
401Otherwise, the action to be taken can be configured by the self option, the
402handling of which is in a separate function, as it is also required for other
403routers. */
404
405if (rc == HOST_FOUND_LOCAL)
406 {
407 rc = rf_self_action(addr, &h, rblock->self_code, rblock->self_rewrite,
408 rblock->self, addr_new);
409 if (rc != OK) return rc;
410 }
411
412/* Otherwise, insist on being a secondary MX if so configured */
413
414else if (ob->check_secondary_mx && !testflag(addr, af_local_host_removed))
415 {
416 DEBUG(D_route) debug_printf("check_secondary_mx set and local host not secondary\n");
417 return DECLINE;
418 }
419
420/* Set up the errors address, if any. */
421
d43cbe25 422rc = rf_get_errors_address(addr, rblock, verify, &addr->prop.errors_address);
0756eb3c
PH
423if (rc != OK) return rc;
424
425/* Set up the additional and removeable headers for this address. */
426
d43cbe25
JH
427rc = rf_get_munge_headers(addr, rblock, &addr->prop.extra_headers,
428 &addr->prop.remove_headers);
0756eb3c
PH
429if (rc != OK) return rc;
430
431/* Get store in which to preserve the original host item, chained on
432to the address. */
433
434addr->host_list = store_get(sizeof(host_item));
435addr->host_list[0] = h;
436
437/* Fill in the transport and queue the address for delivery. */
438
439if (!rf_get_transport(rblock->transport_name, &(rblock->transport),
440 addr, rblock->name, NULL))
441 return DEFER;
442
443addr->transport = rblock->transport;
444
445return rf_queue_add(addr, addr_local, addr_remote, rblock, pw)?
446 OK : DEFER;
447}
448
449/* End of routers/dnslookup.c */
bd4ece7d
JH
450/* vi: aw ai sw=2
451*/