functions.quarantine.inc.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455
  1. <?php
  2. function quarantine($_action, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. $_data_log = $_data;
  7. switch ($_action) {
  8. case 'delete':
  9. if (!is_array($_data['id'])) {
  10. $ids = array();
  11. $ids[] = $_data['id'];
  12. }
  13. else {
  14. $ids = $_data['id'];
  15. }
  16. if (!isset($_SESSION['acl']['quarantine']) || $_SESSION['acl']['quarantine'] != "1" ) {
  17. $_SESSION['return'][] = array(
  18. 'type' => 'danger',
  19. 'log' => array(__FUNCTION__, $_action, $_data_log),
  20. 'msg' => 'access_denied'
  21. );
  22. return false;
  23. }
  24. foreach ($ids as $id) {
  25. if (!is_numeric($id)) {
  26. $_SESSION['return'][] = array(
  27. 'type' => 'danger',
  28. 'log' => array(__FUNCTION__, $_action, $_data_log),
  29. 'msg' => 'access_denied'
  30. );
  31. continue;
  32. }
  33. $stmt = $pdo->prepare('SELECT `rcpt` FROM `quarantine` WHERE `id` = :id');
  34. $stmt->execute(array(':id' => $id));
  35. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  36. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt']) && $_SESSION['mailcow_cc_role'] != 'admin') {
  37. $_SESSION['return'][] = array(
  38. 'type' => 'danger',
  39. 'log' => array(__FUNCTION__, $_action, $_data_log),
  40. 'msg' => 'access_denied'
  41. );
  42. continue;
  43. }
  44. else {
  45. $stmt = $pdo->prepare("DELETE FROM `quarantine` WHERE `id` = :id");
  46. $stmt->execute(array(
  47. ':id' => $id
  48. ));
  49. }
  50. $_SESSION['return'][] = array(
  51. 'type' => 'success',
  52. 'log' => array(__FUNCTION__, $_action, $_data_log),
  53. 'msg' => array('item_deleted', $id)
  54. );
  55. }
  56. break;
  57. case 'edit':
  58. if (!isset($_SESSION['acl']['quarantine']) || $_SESSION['acl']['quarantine'] != "1" ) {
  59. $_SESSION['return'][] = array(
  60. 'type' => 'danger',
  61. 'log' => array(__FUNCTION__, $_action, $_data_log),
  62. 'msg' => 'access_denied'
  63. );
  64. return false;
  65. }
  66. // Edit settings
  67. if ($_data['action'] == 'settings') {
  68. if ($_SESSION['mailcow_cc_role'] != "admin") {
  69. $_SESSION['return'][] = array(
  70. 'type' => 'danger',
  71. 'log' => array(__FUNCTION__, $_action, $_data_log),
  72. 'msg' => 'access_denied'
  73. );
  74. return false;
  75. }
  76. $retention_size = $_data['retention_size'];
  77. if ($_data['release_format'] == 'attachment' || $_data['release_format'] == 'raw') {
  78. $release_format = $_data['release_format'];
  79. }
  80. else {
  81. $release_format = 'raw';
  82. }
  83. $max_size = $_data['max_size'];
  84. $exclude_domains = (array)$_data['exclude_domains'];
  85. try {
  86. $redis->Set('Q_RETENTION_SIZE', intval($retention_size));
  87. $redis->Set('Q_MAX_SIZE', intval($max_size));
  88. $redis->Set('Q_EXCLUDE_DOMAINS', json_encode($exclude_domains));
  89. $redis->Set('Q_RELEASE_FORMAT', $release_format);
  90. }
  91. catch (RedisException $e) {
  92. $_SESSION['return'][] = array(
  93. 'type' => 'danger',
  94. 'log' => array(__FUNCTION__, $_action, $_data_log),
  95. 'msg' => array('redis_error', $e)
  96. );
  97. return false;
  98. }
  99. $_SESSION['return'][] = array(
  100. 'type' => 'success',
  101. 'log' => array(__FUNCTION__, $_action, $_data_log),
  102. 'msg' => 'saved_settings'
  103. );
  104. }
  105. // Release item
  106. elseif ($_data['action'] == 'release') {
  107. if (!is_array($_data['id'])) {
  108. $ids = array();
  109. $ids[] = $_data['id'];
  110. }
  111. else {
  112. $ids = $_data['id'];
  113. }
  114. foreach ($ids as $id) {
  115. if (!is_numeric($id)) {
  116. $_SESSION['return'][] = array(
  117. 'type' => 'danger',
  118. 'log' => array(__FUNCTION__, $_action, $_data_log),
  119. 'msg' => 'access_denied'
  120. );
  121. continue;
  122. }
  123. $stmt = $pdo->prepare('SELECT `msg`, `qid`, `sender`, `rcpt` FROM `quarantine` WHERE `id` = :id');
  124. $stmt->execute(array(':id' => $id));
  125. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  126. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt'])) {
  127. $_SESSION['return'][] = array(
  128. 'type' => 'danger',
  129. 'msg' => 'access_denied'
  130. );
  131. continue;
  132. }
  133. $sender = (isset($row['sender'])) ? $row['sender'] : 'sender-unknown@rspamd';
  134. if (!empty(gethostbynamel('postfix-mailcow'))) {
  135. $postfix = 'postfix-mailcow';
  136. }
  137. if (!empty(gethostbynamel('postfix'))) {
  138. $postfix = 'postfix';
  139. }
  140. else {
  141. $_SESSION['return'][] = array(
  142. 'type' => 'warning',
  143. 'log' => array(__FUNCTION__, $_action, $_data_log),
  144. 'msg' => array('release_send_failed', 'Cannot determine Postfix host')
  145. );
  146. continue;
  147. }
  148. try {
  149. $release_format = $redis->Get('Q_RELEASE_FORMAT');
  150. }
  151. catch (RedisException $e) {
  152. $_SESSION['return'][] = array(
  153. 'type' => 'danger',
  154. 'log' => array(__FUNCTION__, $_action, $_data_log),
  155. 'msg' => array('redis_error', $e)
  156. );
  157. return false;
  158. }
  159. if ($release_format == 'attachment') {
  160. try {
  161. $mail = new PHPMailer(true);
  162. $mail->isSMTP();
  163. $mail->SMTPDebug = 0;
  164. $mail->SMTPOptions = array(
  165. 'ssl' => array(
  166. 'verify_peer' => false,
  167. 'verify_peer_name' => false,
  168. 'allow_self_signed' => true
  169. )
  170. );
  171. if (!empty(gethostbynamel('postfix-mailcow'))) {
  172. $postfix = 'postfix-mailcow';
  173. }
  174. if (!empty(gethostbynamel('postfix'))) {
  175. $postfix = 'postfix';
  176. }
  177. else {
  178. $_SESSION['return'][] = array(
  179. 'type' => 'warning',
  180. 'log' => array(__FUNCTION__, $_action, $_data_log),
  181. 'msg' => array('release_send_failed', 'Cannot determine Postfix host')
  182. );
  183. continue;
  184. }
  185. $mail->Host = $postfix;
  186. $mail->Port = 590;
  187. $mail->setFrom($sender);
  188. $mail->CharSet = 'UTF-8';
  189. $mail->Subject = sprintf($lang['quarantine']['release_subject'], $row['qid']);
  190. $mail->addAddress($row['rcpt']);
  191. $mail->IsHTML(false);
  192. $msg_tmpf = tempnam("/tmp", $row['qid']);
  193. file_put_contents($msg_tmpf, $row['msg']);
  194. $mail->addAttachment($msg_tmpf, $row['qid'] . '.eml');
  195. $mail->Body = sprintf($lang['quarantine']['release_body']);
  196. $mail->send();
  197. unlink($msg_tmpf);
  198. }
  199. catch (phpmailerException $e) {
  200. unlink($msg_tmpf);
  201. $_SESSION['return'][] = array(
  202. 'type' => 'warning',
  203. 'log' => array(__FUNCTION__, $_action, $_data_log),
  204. 'msg' => array('release_send_failed', $e->errorMessage())
  205. );
  206. continue;
  207. }
  208. }
  209. elseif ($release_format == 'raw') {
  210. $postfix_talk = array(
  211. array('220', 'HELO quarantine' . chr(10)),
  212. array('250', 'MAIL FROM: ' . $sender . chr(10)),
  213. array('250', 'RCPT TO: ' . $row['rcpt'] . chr(10)),
  214. array('250', 'DATA' . chr(10)),
  215. array('354', $row['msg'] . chr(10) . '.' . chr(10)),
  216. array('250', 'QUIT' . chr(10)),
  217. array('221', '')
  218. );
  219. // Thanks to https://stackoverflow.com/questions/6632399/given-an-email-as-raw-text-how-can-i-send-it-using-php
  220. $smtp_connection = fsockopen($postfix, 590, $errno, $errstr, 1);
  221. if (!$smtp_connection) {
  222. $_SESSION['return'][] = array(
  223. 'type' => 'warning',
  224. 'log' => array(__FUNCTION__, $_action, $_data_log),
  225. 'msg' => 'Cannot connect to Postfix'
  226. );
  227. return false;
  228. }
  229. for ($i=0; $i < count($postfix_talk); $i++) {
  230. $smtp_resource = fgets($smtp_connection, 256);
  231. if (substr($smtp_resource, 0, 3) !== $postfix_talk[$i][0]) {
  232. $ret = substr($smtp_resource, 0, 3);
  233. $ret = (empty($ret)) ? '-' : $ret;
  234. $_SESSION['return'][] = array(
  235. 'type' => 'warning',
  236. 'log' => array(__FUNCTION__, $_action, $_data_log),
  237. 'msg' => 'Postfix returned SMTP code ' . $smtp_resource . ', expected ' . $postfix_talk[$i][0]
  238. );
  239. return false;
  240. }
  241. if ($postfix_talk[$i][1] !== '') {
  242. fputs($smtp_connection, $postfix_talk[$i][1]);
  243. }
  244. }
  245. fclose($smtp_connection);
  246. }
  247. try {
  248. $stmt = $pdo->prepare("DELETE FROM `quarantine` WHERE `id` = :id");
  249. $stmt->execute(array(
  250. ':id' => $id
  251. ));
  252. }
  253. catch (PDOException $e) {
  254. $_SESSION['return'][] = array(
  255. 'type' => 'danger',
  256. 'log' => array(__FUNCTION__, $_action, $_data_log),
  257. 'msg' => array('mysql_error', $e)
  258. );
  259. continue;
  260. }
  261. $_SESSION['return'][] = array(
  262. 'type' => 'success',
  263. 'log' => array(__FUNCTION__, $_action, $_data_log),
  264. 'msg' => array('item_released', $id)
  265. );
  266. }
  267. }
  268. elseif ($_data['action'] == 'learnspam') {
  269. if (!is_array($_data['id'])) {
  270. $ids = array();
  271. $ids[] = $_data['id'];
  272. }
  273. else {
  274. $ids = $_data['id'];
  275. }
  276. foreach ($ids as $id) {
  277. if (!is_numeric($id)) {
  278. $_SESSION['return'][] = array(
  279. 'type' => 'danger',
  280. 'log' => array(__FUNCTION__, $_action, $_data_log),
  281. 'msg' => 'access_denied'
  282. );
  283. continue;
  284. }
  285. $stmt = $pdo->prepare('SELECT `msg`, `rcpt` FROM `quarantine` WHERE `id` = :id');
  286. $stmt->execute(array(':id' => $id));
  287. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  288. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt']) && $_SESSION['mailcow_cc_role'] != 'admin') {
  289. $_SESSION['return'][] = array(
  290. 'type' => 'danger',
  291. 'msg' => 'access_denied'
  292. );
  293. continue;
  294. }
  295. $curl = curl_init();
  296. curl_setopt($curl, CURLOPT_UNIX_SOCKET_PATH, '/var/lib/rspamd/rspamd.sock');
  297. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  298. curl_setopt($curl, CURLOPT_POST, 1);
  299. curl_setopt($curl, CURLOPT_TIMEOUT, 30);
  300. curl_setopt($curl, CURLOPT_HTTPHEADER, array('Content-Type: text/plain'));
  301. curl_setopt($curl, CURLOPT_URL,"http://rspamd/learnspam");
  302. curl_setopt($curl, CURLOPT_POSTFIELDS, $row['msg']);
  303. $response = curl_exec($curl);
  304. if (!curl_errno($curl)) {
  305. $response = json_decode($response, true);
  306. if (isset($response['error'])) {
  307. if (stripos($response['error'], 'already learned') === false) {
  308. $_SESSION['return'][] = array(
  309. 'type' => 'danger',
  310. 'log' => array(__FUNCTION__),
  311. 'msg' => array('spam_learn_error', $response['error'])
  312. );
  313. continue;
  314. }
  315. }
  316. curl_close($curl);
  317. $curl = curl_init();
  318. curl_setopt($curl, CURLOPT_UNIX_SOCKET_PATH, '/var/lib/rspamd/rspamd.sock');
  319. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  320. curl_setopt($curl, CURLOPT_POST, 1);
  321. curl_setopt($curl, CURLOPT_TIMEOUT, 30);
  322. curl_setopt($curl, CURLOPT_HTTPHEADER, array('Content-Type: text/plain', 'Flag: 11'));
  323. curl_setopt($curl, CURLOPT_URL,"http://rspamd/fuzzyadd");
  324. curl_setopt($curl, CURLOPT_POSTFIELDS, $row['msg']);
  325. $response = curl_exec($curl);
  326. if (!curl_errno($curl)) {
  327. $response = json_decode($response, true);
  328. if (isset($response['error'])) {
  329. $_SESSION['return'][] = array(
  330. 'type' => 'warning',
  331. 'log' => array(__FUNCTION__),
  332. 'msg' => array('fuzzy_learn_error', $response['error'])
  333. );
  334. }
  335. curl_close($curl);
  336. try {
  337. $stmt = $pdo->prepare("DELETE FROM `quarantine` WHERE `id` = :id");
  338. $stmt->execute(array(
  339. ':id' => $id
  340. ));
  341. }
  342. catch (PDOException $e) {
  343. $_SESSION['return'][] = array(
  344. 'type' => 'danger',
  345. 'log' => array(__FUNCTION__, $_action, $_data_log),
  346. 'msg' => array('mysql_error', $e)
  347. );
  348. continue;
  349. }
  350. $_SESSION['return'][] = array(
  351. 'type' => 'success',
  352. 'log' => array(__FUNCTION__),
  353. 'msg' => array('qlearn_spam', $id)
  354. );
  355. continue;
  356. }
  357. else {
  358. curl_close($curl);
  359. $_SESSION['return'][] = array(
  360. 'type' => 'danger',
  361. 'log' => array(__FUNCTION__),
  362. 'msg' => array('spam_learn_error', 'Curl: ' . curl_strerror(curl_errno($curl)))
  363. );
  364. continue;
  365. }
  366. curl_close($curl);
  367. $_SESSION['return'][] = array(
  368. 'type' => 'danger',
  369. 'log' => array(__FUNCTION__),
  370. 'msg' => array('learn_spam_error', 'unknown')
  371. );
  372. continue;
  373. }
  374. else {
  375. $_SESSION['return'][] = array(
  376. 'type' => 'danger',
  377. 'log' => array(__FUNCTION__),
  378. 'msg' => array('spam_learn_error', 'Curl: ' . curl_strerror(curl_errno($curl)))
  379. );
  380. curl_close($curl);
  381. continue;
  382. }
  383. curl_close($curl);
  384. $_SESSION['return'][] = array(
  385. 'type' => 'danger',
  386. 'log' => array(__FUNCTION__),
  387. 'msg' => array('learn_spam_error', 'unknown')
  388. );
  389. continue;
  390. }
  391. }
  392. return true;
  393. break;
  394. case 'get':
  395. if ($_SESSION['mailcow_cc_role'] == "user") {
  396. $stmt = $pdo->prepare('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine` WHERE `rcpt` = :mbox');
  397. $stmt->execute(array(':mbox' => $_SESSION['mailcow_cc_username']));
  398. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  399. while($row = array_shift($rows)) {
  400. $q_meta[] = $row;
  401. }
  402. }
  403. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  404. $stmt = $pdo->query('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine`');
  405. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  406. while($row = array_shift($rows)) {
  407. $q_meta[] = $row;
  408. }
  409. }
  410. else {
  411. $domains = array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains'));
  412. foreach ($domains as $domain) {
  413. $stmt = $pdo->prepare('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine` WHERE `rcpt` REGEXP :domain');
  414. $stmt->execute(array(':domain' => '@' . $domain . '$'));
  415. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  416. while($row = array_shift($rows)) {
  417. $q_meta[] = $row;
  418. }
  419. }
  420. }
  421. return $q_meta;
  422. break;
  423. case 'settings':
  424. try {
  425. if ($_SESSION['mailcow_cc_role'] == "admin") {
  426. $settings['exclude_domains'] = json_decode($redis->Get('Q_EXCLUDE_DOMAINS'), true);
  427. }
  428. $settings['max_size'] = $redis->Get('Q_MAX_SIZE');
  429. $settings['retention_size'] = $redis->Get('Q_RETENTION_SIZE');
  430. $settings['release_format'] = $redis->Get('Q_RELEASE_FORMAT');
  431. }
  432. catch (RedisException $e) {
  433. $_SESSION['return'][] = array(
  434. 'type' => 'danger',
  435. 'log' => array(__FUNCTION__, $_action, $_data_log),
  436. 'msg' => array('redis_error', $e)
  437. );
  438. return false;
  439. }
  440. return $settings;
  441. break;
  442. case 'details':
  443. if (!is_numeric($_data) || empty($_data)) {
  444. return false;
  445. }
  446. $stmt = $pdo->prepare('SELECT `rcpt`, `symbols`, `msg`, `domain` FROM `quarantine` WHERE `id`= :id');
  447. $stmt->execute(array(':id' => $_data));
  448. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  449. if (hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt'])) {
  450. return $row;
  451. }
  452. return false;
  453. break;
  454. }
  455. }