dbaa9dbd6c
on files in plugins dir: fixed a number of POD errors formatted some # comments into POD removed bare 1; (these are plugins, not perl modules) most instances of this were copy/pasted from a previous plugin that had it removed instances of # vim ts=N ... they weren't consistent, many didn't match .perltidyrc on modules that failed perl -c tests, added 'use Qpsmtpd::Constants;' Conflicts: plugins/async/check_earlytalker plugins/async/dns_whitelist_soft plugins/async/dnsbl plugins/async/queue/smtp-forward plugins/async/require_resolvable_fromhost plugins/async/rhsbl plugins/async/uribl plugins/auth/auth_checkpassword plugins/auth/auth_cvm_unix_local plugins/auth/auth_flat_file plugins/auth/auth_ldap_bind plugins/auth/auth_vpopmail plugins/auth/auth_vpopmail_sql plugins/auth/authdeny plugins/check_badmailfromto plugins/check_badrcptto_patterns plugins/check_bogus_bounce plugins/check_earlytalker plugins/check_norelay plugins/check_spamhelo plugins/connection_time plugins/dns_whitelist_soft plugins/dnsbl plugins/domainkeys plugins/greylisting plugins/hosts_allow plugins/http_config plugins/logging/adaptive plugins/logging/apache plugins/logging/connection_id plugins/logging/transaction_id plugins/logging/warn plugins/milter plugins/queue/exim-bsmtp plugins/queue/maildir plugins/queue/postfix-queue plugins/queue/smtp-forward plugins/quit_fortune plugins/random_error plugins/rcpt_map plugins/rcpt_regexp plugins/relay_only plugins/require_resolvable_fromhost plugins/rhsbl plugins/sender_permitted_from plugins/spamassassin plugins/tls plugins/tls_cert plugins/uribl plugins/virus/aveclient plugins/virus/bitdefender plugins/virus/clamav plugins/virus/clamdscan plugins/virus/hbedv plugins/virus/kavscanner plugins/virus/klez_filter plugins/virus/sophie plugins/virus/uvscan
167 lines
5.0 KiB
Perl
167 lines
5.0 KiB
Perl
#!perl -Tw
|
|
|
|
=head1 NAME
|
|
|
|
p0f - A TCP Fingerprinting Identification Plugin
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
Use TCP fingerprint info (remote computer OS, network distance, etc) to
|
|
implement more sophisticated anti-spam policies.
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
This p0f module inserts a 'p0f' note that other qpsmtpd plugins can inspect.
|
|
It includes the following information about the TCP fingerprint (link,
|
|
detail, distance, uptime, genre). Here's an example connection note:
|
|
|
|
genre => FreeBSD
|
|
detail => 6.x (1)
|
|
uptime => 1390
|
|
link => ethernet/modem
|
|
distance => 17
|
|
|
|
Which was parsed from this p0f fingerprint:
|
|
|
|
24.18.227.2:39435 - FreeBSD 6.x (1) (up: 1390 hrs)
|
|
-> 208.75.177.101:25 (distance 17, link: ethernet/modem)
|
|
|
|
=head1 MOTIVATION
|
|
|
|
This p0f plugin provides a way to make sophisticated policies for email
|
|
messages. For example, the vast majority of email connections to my server
|
|
from Windows computers are spam (>99%). But, I have a few clients that use
|
|
Exchange servers so I can't just block email from all Windows computers.
|
|
|
|
Same goes for greylisting. Finance companies (AmEx, BoA, etc) just love to
|
|
send notices that they won't queue and retry. Either they deliver at that
|
|
instant or never. When I enable greylisting, I lose valid messages. Grrr.
|
|
|
|
So, while I'm not willing to use greylisting, and I'm not willing to block
|
|
connections from Windows computers, I am quite willing to greylist all email
|
|
from Windows computers.
|
|
|
|
=head1 CONFIGURATION
|
|
|
|
Create a startup script for PF that creates a communication socket when your
|
|
server starts up.
|
|
|
|
p0f -u qpsmtpd -d -q -Q /tmp/.p0f_socket 'dst port 25' -o /dev/null
|
|
chown qpsmtpd /tmp/.p0f_socket
|
|
|
|
add an entry to config/plugins to enable p0f:
|
|
|
|
ident/p0f /tmp/.p0f_socket
|
|
|
|
=head2 local_ip
|
|
|
|
Use the local_ip option to override the IP address of your mail server. This
|
|
is useful if your mail server has a private IP because it is running behind
|
|
a firewall. For example, my mail server has the IP 127.0.0.6, but the world
|
|
knows my mail server as 208.75.177.101.
|
|
|
|
Example config/plugins entry with local_ip override:
|
|
|
|
ident/p0f /tmp/.p0f_socket local_ip 208.75.177.101
|
|
|
|
All code heavily based upon the p0fq.pl included with the p0f distribution.
|
|
|
|
=head1 Environment requirements
|
|
|
|
p0f requires four pieces of information to look up the p0f fingerprint:
|
|
local_ip, local_port, remote_ip, and remote_port. TcpServer.pm has been
|
|
has been updated to provide that information when running under djb's
|
|
tcpserver. The async, forkserver, and prefork models will likely require
|
|
some additional changes to make sure these fields are populated.
|
|
|
|
=head1 ACKNOWLEDGEMENTS
|
|
|
|
Heavily based upon the p0fq.pl included with the p0f distribution.
|
|
|
|
=head1 AUTHORS
|
|
|
|
Matt Simerson <msimerson@cpan.org> - 5/1/2010
|
|
previous unnamed author
|
|
|
|
=cut
|
|
|
|
use IO::Socket;
|
|
use Net::IP;
|
|
|
|
my $QUERY_MAGIC = 0x0defaced;
|
|
|
|
sub register {
|
|
my ($self, $qp, $p0f_socket, %args) = @_;
|
|
|
|
$p0f_socket =~ /(.*)/; # untaint
|
|
$self->{_args}->{p0f_socket} = $1;
|
|
foreach (keys %args) {
|
|
$self->{_args}->{$_} = $args{$_};
|
|
}
|
|
}
|
|
|
|
sub hook_connect {
|
|
my($self, $qp) = @_;
|
|
|
|
my $p0f_socket = $self->{_args}->{p0f_socket};
|
|
my $local_ip = $self->{_args}{local_ip} || $self->qp->connection->local_ip;
|
|
|
|
my $src = new Net::IP ($self->qp->connection->remote_ip)
|
|
or $self->log(LOGERROR, "p0f: ".Net::IP::Error()), return (DECLINED);
|
|
my $dst = new Net::IP($local_ip)
|
|
or $self->log(LOGERROR, "p0f: ".NET::IP::Error()), return (DECLINED);
|
|
my $query = pack("L L L N N S S",
|
|
$QUERY_MAGIC,
|
|
1,
|
|
rand ^ 42 ^ time,
|
|
$src->intip(),
|
|
$dst->intip(),
|
|
$self->qp->connection->remote_port,
|
|
$self->qp->connection->local_port);
|
|
|
|
# Open the connection to p0f
|
|
socket(SOCK, PF_UNIX, SOCK_STREAM, 0)
|
|
or $self->log(LOGERROR, "p0f: socket: $!"), return (DECLINED);
|
|
connect(SOCK, sockaddr_un($p0f_socket))
|
|
or $self->log(LOGERROR, "p0f: connect: $!"), return (DECLINED);
|
|
defined syswrite SOCK, $query
|
|
or $self->log(LOGERROR, "p0f: write: $!"), close SOCK, return (DECLINED);
|
|
|
|
my $response;
|
|
defined sysread SOCK, $response, 1024
|
|
or $self->log(LOGERROR, "p0f: read: $!"), close SOCK, return (DECLINED);
|
|
close SOCK;
|
|
|
|
# Extract the response from p0f
|
|
my ($magic, $id, $type, $genre, $detail, $dist, $link, $tos, $fw,
|
|
$nat, $real, $score, $mflags, $uptime) =
|
|
unpack ("L L C Z20 Z40 c Z30 Z30 C C C s S N", $response);
|
|
|
|
if ($magic != $QUERY_MAGIC) {
|
|
$self->log(LOGERROR, "p0f: Bad response magic.");
|
|
return (DECLINED);
|
|
}
|
|
if ($type == 1) {
|
|
$self->log(LOGERROR, "p0f: P0f did not honor our query");
|
|
return (DECLINED);
|
|
}
|
|
if ($type == 2) {
|
|
$self->log(LOGWARN, "p0f: This connection is no longer in the cache");
|
|
return (DECLINED);
|
|
}
|
|
|
|
my $p0f = {
|
|
genre => $genre,
|
|
detail => $detail,
|
|
distance => $dist,
|
|
link => $link,
|
|
uptime => $uptime,
|
|
};
|
|
|
|
$self->qp->connection->notes('p0f', $p0f);
|
|
$self->log(LOGINFO, "Results: ".$p0f->{genre}." (".$p0f->{detail}.")");
|
|
$self->log(LOGERROR,"error: $@") if $@;
|
|
|
|
return DECLINED;
|
|
}
|