2012-04-29 10:35:59 +02:00
|
|
|
#!perl -w
|
2004-06-29 23:45:35 +02:00
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2004-06-30 11:21:40 +02:00
|
|
|
auth_vpopmail_sql - Authenticate to vpopmail via MySQL
|
2004-06-29 23:45:35 +02:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
This plugin authenticates vpopmail users directly against a standard
|
|
|
|
vpopmail MySQL database. It makes the not-unreasonable assumption that
|
|
|
|
both pw_name and pw_domain are lowercase only (qmail doesn't actually care).
|
Changes by jpeacock@cpan.org (John Peacock)
o plugins/check_badmailfromto
- New plugin in the style of check_badmailfrom, which matches a pair
of FROM/TO and makes it seem like the recipient's address no longer
exists (but only from the matching sender's point of view). Useful
for stalkers and other harassment cases.
o plugins/dns_whitelist_soft
- New plugin to provide a DNS-based whitelist (good for distributed
sites).
o various files
- Replaced tab character with 8 spaces and adjusted line breaks for
better readability.
Changes by mct@toren.net (Michael C. Toren)
o lib/Qpsmtpd/SMTP.pm
- Assumes a MAIL FROM value of "<#@[]>" (utilized by qmail to
indicate a null sender when generating a doublebounce message)
is equivalent to "<>". Previously qpsmtpd complained that the
value could not be parsed.
- Adds LOGIN to the default list of supported auth mechanisms.
The documentation in Auth.pm indicated that auth-login was not
currently supported due to lack of functionality, however I can
confirm that LOGIN appears to work fine as tested by using msmtp
(http://msmtp.sourceforge.net/). Are there any indications that
LOGIN support is actually broken in the current implementation?
- Removes the "X-Qpsmtpd-Auth: True" header appended when a message
has been sent by an authenticated user. One problem with such a
header is that it's impossible to say which SMTP hop added it,
and it provides no information which could be used to backtrack
the transaction. I grepped through my mail archives a bit
looking for how other MTAs handled the problem, and decided it
would be best to place this information in the Received: header:
Received: from remotehost (HELO remotehost) (192.168.42.42)
(smtp-auth username foo, mechanism cram-md5)
by mail.netisland.net (qpsmtpd/0.28) with ESMTP; <date>
o lib/Qpsmtpd/Auth.pm:
- Documentation update for the arguments passed to an auth
handler; previously the $mechanism argument was not mentioned,
which threw off the argument offsets.
- Documentation update for auth-login removing the warning
that auth-login is not currently supported due to lack of
functionality.
- Fix to execute a generic auth hook when a more specific
auth-$mechanism hook does not exist. (Previously posted
to the list last week.)
- Upon authentication, sets $session->{_auth_user} and
$session->{_auth_mechanism} so that SMTP.pm can include them
in the Received: header.
o plugins/queue/qmail-queue
- Added a timestamp and the qmail-queue qp identifier to the
"Queued!" 250 message, for compatibility with qmail-smtpd, which
can be very useful for tracking message delivery from machine to
machine. For example, the new 250 message might be:
250 Queued! 1105927468 qp 3210 <1105927457@netisland.net>
qmail-smtpd returns:
250 ok 1106546213 qp 7129
Additionally, for consistency angle brackets are placed around
the Message-ID displayed in the 250 if they were missing in the
message header.
o plugins/check_badmailfrom:
- Changed the error message from "Mail from $bad not accepted
here" to "sorry, your envelope sender is in my badmailfrom
list", for compatibility with qmail-smtpd. I didn't see any
reason to share with the sender the value of $bad, especially
for situations where the sender was rejected resulting from a
wildcard.
o plugins/check_earlytalker:
o plugins/require_resolvable_fromhost:
- No longer checks for earlytalkers or resolvable senders if the
connection note "whitelistclient" is set, which is nice for
helping backup MX hosts empty their queue faster.
o plugins/count_unrecognized_commands:
- Return code changed from DENY_DISCONNECT, which isn't valid in
an unrecognized_command hook, to DENY, which in this context
drops the connection anyway. (Previously posted to the list
last week.)
git-svn-id: https://svn.perl.org/qpsmtpd/trunk@356 958fd67b-6ff1-0310-b445-bb7760255be9
2005-01-28 04:30:50 +01:00
|
|
|
If you are using CRAM-MD5, it also requires that vpopmail be built with the
|
|
|
|
recommended '--enable-clear-passwd=y' option, because there is no way
|
|
|
|
to compare the crypted password.
|
2004-06-29 23:45:35 +02:00
|
|
|
|
|
|
|
=head1 CONFIGURATION
|
|
|
|
|
2010-05-11 01:13:15 +02:00
|
|
|
echo "dbi:mysql:dbname=vpopmail;host=127.0.0.1" > config/vpopmail_mysql_dsn
|
|
|
|
echo "vpopmailuser" > config/vpopmail_mysql_user
|
|
|
|
echo "vpoppasswd" > config/vpopmail_mysql_pass
|
|
|
|
|
|
|
|
This can be a read-only database user since the plugin does not update the
|
|
|
|
last accessed time (yet, see below).
|
|
|
|
|
|
|
|
This module supports PLAIN, LOGIN, and CRAM-MD5 authentication methods. You
|
|
|
|
can disable undesired methods by editing this module and uncommenting
|
2004-06-29 23:45:35 +02:00
|
|
|
the lines in the register() sub. See the POD for Qspmtpd::Auth for more
|
|
|
|
details on the ramifications of supporting various authentication methods.
|
|
|
|
|
|
|
|
The remote user must login with a fully qualified e-mail address (i.e. both
|
2010-05-11 01:13:15 +02:00
|
|
|
account name and domain), even if they don't normally need to. This is
|
2004-06-29 23:45:35 +02:00
|
|
|
because the vpopmail table has a unique index on pw_name/pw_domain, and this
|
|
|
|
module requires that only a single record be returned from the database.
|
|
|
|
|
2010-05-11 01:13:15 +02:00
|
|
|
=head1 LIMITATIONS
|
|
|
|
|
|
|
|
This authentication modules does not recognize domain aliases. So, if you have
|
|
|
|
the domain example.com, with domain aliases for example.org and example.net,
|
|
|
|
smtp-auth will only work for $user@example.com. If you have domain aliases,
|
2010-05-11 08:19:05 +02:00
|
|
|
consider using another plugin (see SEE ALSO).
|
2010-05-11 01:13:15 +02:00
|
|
|
|
2004-06-29 23:45:35 +02:00
|
|
|
=head1 FUTURE DIRECTION
|
|
|
|
|
|
|
|
The default MySQL configuration for vpopmail includes a table to log access,
|
|
|
|
lastauth, which could conceivably be updated upon sucessful authentication.
|
|
|
|
The addition of this feature is left as an exercise for someone who cares. ;)
|
|
|
|
|
2010-05-11 08:19:05 +02:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
For an overview of the vpopmail authentication plugins and their merits,
|
|
|
|
please read the VPOPMAIL section in docs/authentication.pod
|
|
|
|
|
2004-06-29 23:45:35 +02:00
|
|
|
=head1 AUTHOR
|
|
|
|
|
|
|
|
John Peacock <jpeacock@cpan.org>
|
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE
|
|
|
|
|
|
|
|
Copyright (c) 2004 John Peacock
|
|
|
|
|
|
|
|
This plugin is licensed under the same terms as the qpsmtpd package itself.
|
|
|
|
Please see the LICENSE file included with qpsmtpd for details.
|
|
|
|
|
|
|
|
=cut
|
|
|
|
|
2012-05-07 09:35:59 +02:00
|
|
|
use strict;
|
|
|
|
use warnings;
|
|
|
|
|
2012-05-09 00:04:10 +02:00
|
|
|
use Qpsmtpd::Auth;
|
2012-05-04 22:04:28 +02:00
|
|
|
use Qpsmtpd::Constants;
|
2012-05-09 00:04:10 +02:00
|
|
|
|
2012-05-21 22:11:49 +02:00
|
|
|
#use DBI; # done in ->register
|
2012-05-04 22:04:28 +02:00
|
|
|
|
2004-06-29 23:45:35 +02:00
|
|
|
sub register {
|
2013-04-21 06:50:39 +02:00
|
|
|
my ($self, $qp) = @_;
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2012-05-21 22:11:49 +02:00
|
|
|
eval 'use DBI';
|
2013-04-21 06:50:39 +02:00
|
|
|
if ($@) {
|
2012-05-21 22:11:49 +02:00
|
|
|
warn "plugin disabled. is DBI installed?\n";
|
|
|
|
$self->log(LOGERROR, "skip: plugin disabled. is DBI installed?\n");
|
|
|
|
return;
|
2013-04-21 06:50:39 +02:00
|
|
|
}
|
2012-05-21 22:11:49 +02:00
|
|
|
|
2012-05-04 22:04:28 +02:00
|
|
|
$self->register_hook('auth-plain', 'auth_vmysql');
|
|
|
|
$self->register_hook('auth-login', 'auth_vmysql');
|
|
|
|
$self->register_hook('auth-cram-md5', 'auth_vmysql');
|
2004-06-29 23:45:35 +02:00
|
|
|
}
|
|
|
|
|
2012-05-07 09:35:59 +02:00
|
|
|
sub get_db_handle {
|
|
|
|
my $self = shift;
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
my $dsn = $self->qp->config("vpopmail_mysql_dsn")
|
|
|
|
|| "dbi:mysql:dbname=vpopmail;host=127.0.0.1";
|
2010-05-11 01:13:15 +02:00
|
|
|
my $dbuser = $self->qp->config("vpopmail_mysql_user") || "vpopmailuser";
|
|
|
|
my $dbpass = $self->qp->config("vpopmail_mysql_pass") || "vpoppasswd";
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2014-09-15 22:32:52 +02:00
|
|
|
my $dbh;
|
|
|
|
eval { $dbh = DBI->connect($dsn, $dbuser, $dbpass); };
|
|
|
|
if (!$dbh) {
|
|
|
|
$self->log(LOGERROR, "skip: db connection failed: $!");
|
|
|
|
$self->log(LOGERROR, $@) if $@;
|
2013-04-21 06:50:39 +02:00
|
|
|
return;
|
|
|
|
};
|
2004-06-29 23:45:35 +02:00
|
|
|
$dbh->{ShowErrorStatement} = 1;
|
2012-05-07 09:35:59 +02:00
|
|
|
return $dbh;
|
2013-04-21 06:50:39 +02:00
|
|
|
}
|
2012-05-07 09:35:59 +02:00
|
|
|
|
|
|
|
sub get_vpopmail_user {
|
2013-04-21 06:50:39 +02:00
|
|
|
my ($self, $dbh, $user) = @_;
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
my ($pw_name, $pw_domain) = split /@/, lc($user);
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
if (!defined $pw_domain) {
|
|
|
|
$self->log(LOGINFO, "skip: missing domain: " . lc $user);
|
2012-05-07 09:35:59 +02:00
|
|
|
return;
|
2013-04-21 06:50:39 +02:00
|
|
|
}
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2012-05-07 09:35:59 +02:00
|
|
|
$self->log(LOGDEBUG, "auth_vpopmail_sql: $user");
|
2004-09-23 20:54:58 +02:00
|
|
|
|
2012-05-07 09:35:59 +02:00
|
|
|
my $query = "SELECT pw_passwd,pw_clear_passwd
|
2010-05-11 01:13:15 +02:00
|
|
|
FROM vpopmail
|
2012-05-07 09:35:59 +02:00
|
|
|
WHERE pw_name = ?
|
|
|
|
AND pw_domain = ?";
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
my $sth = $dbh->prepare($query);
|
|
|
|
$sth->execute($pw_name, $pw_domain);
|
2012-05-07 09:35:59 +02:00
|
|
|
my $userd_ref = $sth->fetchrow_hashref;
|
2004-06-29 23:45:35 +02:00
|
|
|
$sth->finish;
|
|
|
|
$dbh->disconnect;
|
2012-05-07 09:35:59 +02:00
|
|
|
return $userd_ref;
|
2013-04-21 06:50:39 +02:00
|
|
|
}
|
2012-05-07 09:35:59 +02:00
|
|
|
|
|
|
|
sub auth_vmysql {
|
2013-04-21 06:50:39 +02:00
|
|
|
my ($self, $transaction, $method, $user, $passClear, $passHash, $ticket) =
|
|
|
|
@_;
|
2012-05-07 09:35:59 +02:00
|
|
|
|
|
|
|
my $dbh = $self->get_db_handle() or return DECLINED;
|
2012-05-09 00:04:10 +02:00
|
|
|
my $u = $self->get_vpopmail_user($dbh, $user) or return DECLINED;
|
2004-06-29 23:45:35 +02:00
|
|
|
|
2005-02-10 15:33:13 +01:00
|
|
|
# if vpopmail was not built with '--enable-clear-passwd=y'
|
|
|
|
# then pw_clear_passwd may not even exist
|
2012-05-09 00:04:10 +02:00
|
|
|
# my $pw_clear_passwd = $db_user->{'pw_clear_passwd'};
|
2012-05-07 09:35:59 +02:00
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
if (!$u->{pw_passwd} && !$u->{pw_clear_passwd}) {
|
2012-05-07 09:35:59 +02:00
|
|
|
$self->log(LOGINFO, "fail: no such user");
|
2013-04-21 06:50:39 +02:00
|
|
|
return (DENY, "auth_vmysql - no such user");
|
|
|
|
}
|
2012-05-07 09:35:59 +02:00
|
|
|
|
|
|
|
# at this point, the user name has matched
|
|
|
|
|
2013-04-21 06:50:39 +02:00
|
|
|
return
|
|
|
|
Qpsmtpd::Auth::validate_password(
|
|
|
|
$self,
|
|
|
|
src_clear => $u->{pw_clear_passwd},
|
|
|
|
src_crypt => $u->{pw_passwd},
|
|
|
|
attempt_clear => $passClear,
|
|
|
|
attempt_hash => $passHash,
|
|
|
|
method => $method,
|
|
|
|
ticket => $ticket,
|
|
|
|
deny => DENY,
|
|
|
|
);
|
2004-06-29 23:45:35 +02:00
|
|
|
}
|
|
|
|
|