functions.dkim.inc.php 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. <?php
  2. function dkim($_action, $_data = null) {
  3. global $redis;
  4. global $lang;
  5. switch ($_action) {
  6. case 'add':
  7. if ($_SESSION['mailcow_cc_role'] != "admin") {
  8. $_SESSION['return'][] = array(
  9. 'type' => 'danger',
  10. 'log' => array(__FUNCTION__, $_action, $_data),
  11. 'msg' => 'access_denied'
  12. );
  13. return false;
  14. }
  15. $key_length = intval($_data['key_size']);
  16. $dkim_selector = (isset($_data['dkim_selector'])) ? $_data['dkim_selector'] : 'dkim';
  17. $domain = $_data['domain'];
  18. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  19. $_SESSION['return'][] = array(
  20. 'type' => 'danger',
  21. 'log' => array(__FUNCTION__, $_action, $_data),
  22. 'msg' => 'dkim_domain_or_sel_invalid'
  23. );
  24. return false;
  25. }
  26. if ($redis->hGet('DKIM_PUB_KEYS', $domain)) {
  27. $_SESSION['return'][] = array(
  28. 'type' => 'danger',
  29. 'log' => array(__FUNCTION__, $_action, $_data),
  30. 'msg' => 'dkim_domain_or_sel_invalid'
  31. );
  32. return false;
  33. }
  34. if (!ctype_alnum($dkim_selector)) {
  35. $_SESSION['return'][] = array(
  36. 'type' => 'danger',
  37. 'log' => array(__FUNCTION__, $_action, $_data),
  38. 'msg' => 'dkim_domain_or_sel_invalid'
  39. );
  40. return false;
  41. }
  42. $config = array(
  43. "digest_alg" => "sha256",
  44. "private_key_bits" => $key_length,
  45. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  46. );
  47. if ($keypair_ressource = openssl_pkey_new($config)) {
  48. $key_details = openssl_pkey_get_details($keypair_ressource);
  49. $pubKey = implode(array_slice(
  50. array_filter(
  51. explode(PHP_EOL, $key_details['key'])
  52. ), 1, -1)
  53. );
  54. // Save public key and selector to redis
  55. try {
  56. $redis->hSet('DKIM_PUB_KEYS', $domain, $pubKey);
  57. $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
  58. }
  59. catch (RedisException $e) {
  60. $_SESSION['return'][] = array(
  61. 'type' => 'danger',
  62. 'log' => array(__FUNCTION__, $_action, $_data),
  63. 'msg' => array('redis_error', $e)
  64. );
  65. return false;
  66. }
  67. // Export private key and save private key to redis
  68. openssl_pkey_export($keypair_ressource, $privKey);
  69. if (isset($privKey) && !empty($privKey)) {
  70. try {
  71. $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, trim($privKey));
  72. }
  73. catch (RedisException $e) {
  74. $_SESSION['return'][] = array(
  75. 'type' => 'danger',
  76. 'log' => array(__FUNCTION__, $_action, $_data),
  77. 'msg' => array('redis_error', $e)
  78. );
  79. return false;
  80. }
  81. }
  82. $_SESSION['return'][] = array(
  83. 'type' => 'success',
  84. 'log' => array(__FUNCTION__, $_action, $_data),
  85. 'msg' => 'dkim_added'
  86. );
  87. return true;
  88. }
  89. else {
  90. $_SESSION['return'][] = array(
  91. 'type' => 'danger',
  92. 'log' => array(__FUNCTION__, $_action, $_data),
  93. 'msg' => 'dkim_domain_or_sel_invalid'
  94. );
  95. return false;
  96. }
  97. break;
  98. case 'import':
  99. if ($_SESSION['mailcow_cc_role'] != "admin") {
  100. $_SESSION['return'][] = array(
  101. 'type' => 'danger',
  102. 'log' => array(__FUNCTION__, $_action, $_data),
  103. 'msg' => 'access_denied'
  104. );
  105. return false;
  106. }
  107. $private_key_input = trim($_data['private_key_file']);
  108. $private_key_normalized = preg_replace('~\r\n?~', "\n", $private_key_input);
  109. $private_key = openssl_pkey_get_private($private_key_normalized);
  110. if ($ssl_error = openssl_error_string()) {
  111. $_SESSION['return'][] = array(
  112. 'type' => 'danger',
  113. 'log' => array(__FUNCTION__, $_action, $_data),
  114. 'msg' => array('private_key_error', $ssl_error)
  115. );
  116. return false;
  117. }
  118. // Explode by nl
  119. $pem_public_key_array = explode(PHP_EOL, trim(openssl_pkey_get_details($private_key)['key']));
  120. // Remove first and last line/item
  121. array_shift($pem_public_key_array);
  122. array_pop($pem_public_key_array);
  123. // Implode as single string
  124. $pem_public_key = implode('', $pem_public_key_array);
  125. $dkim_selector = (isset($_data['dkim_selector'])) ? $_data['dkim_selector'] : 'dkim';
  126. $domain = $_data['domain'];
  127. if (!is_valid_domain_name($domain)) {
  128. $_SESSION['return'][] = array(
  129. 'type' => 'danger',
  130. 'log' => array(__FUNCTION__, $_action, $_data),
  131. 'msg' => 'dkim_domain_or_sel_invalid'
  132. );
  133. return false;
  134. }
  135. if ($redis->hGet('DKIM_PUB_KEYS', $domain)) {
  136. $_SESSION['return'][] = array(
  137. 'type' => 'danger',
  138. 'log' => array(__FUNCTION__, $_action, $_data),
  139. 'msg' => 'dkim_domain_or_sel_invalid'
  140. );
  141. return false;
  142. }
  143. if (!ctype_alnum($dkim_selector)) {
  144. $_SESSION['return'][] = array(
  145. 'type' => 'danger',
  146. 'log' => array(__FUNCTION__, $_action, $_data),
  147. 'msg' => 'dkim_domain_or_sel_invalid'
  148. );
  149. return false;
  150. }
  151. try {
  152. $redis->hSet('DKIM_PUB_KEYS', $domain, $pem_public_key);
  153. $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
  154. $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, $private_key_normalized);
  155. }
  156. catch (RedisException $e) {
  157. $_SESSION['return'][] = array(
  158. 'type' => 'danger',
  159. 'log' => array(__FUNCTION__, $_action, $_data),
  160. 'msg' => array('redis_error', $e)
  161. );
  162. return false;
  163. }
  164. unset($private_key_normalized);
  165. unset($private_key);
  166. unset($private_key_input);
  167. try {
  168. }
  169. catch (RedisException $e) {
  170. $_SESSION['return'][] = array(
  171. 'type' => 'danger',
  172. 'log' => array(__FUNCTION__, $_action, $_data),
  173. 'msg' => array('redis_error', $e)
  174. );
  175. return false;
  176. }
  177. $_SESSION['return'][] = array(
  178. 'type' => 'success',
  179. 'log' => array(__FUNCTION__, $_action, $_data),
  180. 'msg' => 'dkim_added'
  181. );
  182. return true;
  183. break;
  184. case 'details':
  185. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  186. return false;
  187. }
  188. $dkimdata = array();
  189. if ($redis_dkim_key_data = $redis->hGet('DKIM_PUB_KEYS', $_data)) {
  190. $dkimdata['pubkey'] = $redis_dkim_key_data;
  191. if (strlen($dkimdata['pubkey']) < 391) {
  192. $dkimdata['length'] = "1024";
  193. }
  194. elseif (strlen($dkimdata['pubkey']) < 736) {
  195. $dkimdata['length'] = "2048";
  196. }
  197. elseif (strlen($dkimdata['pubkey']) < 1416) {
  198. $dkimdata['length'] = "4096";
  199. }
  200. else {
  201. $dkimdata['length'] = ">= 8192";
  202. }
  203. $dkimdata['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . $redis_dkim_key_data;
  204. $dkimdata['dkim_selector'] = $redis->hGet('DKIM_SELECTORS', $_data);
  205. $dkimdata['privkey'] = $redis->hGet('DKIM_PRIV_KEYS', $dkimdata['dkim_selector'] . $_data);
  206. if ($GLOBALS['SHOW_DKIM_PRIV_KEYS'] === true) {
  207. $dkimdata['privkey'] = base64_encode($redis->hGet('DKIM_PRIV_KEYS', $dkimdata['dkim_selector'] . '.' . $_data));
  208. }
  209. else {
  210. $dkimdata['privkey'] = base64_encode('Please set $SHOW_DKIM_PRIV_KEYS to true to show DKIM private keys.');
  211. }
  212. }
  213. return $dkimdata;
  214. break;
  215. case 'blind':
  216. if ($_SESSION['mailcow_cc_role'] != "admin") {
  217. $_SESSION['return'][] = array(
  218. 'type' => 'danger',
  219. 'log' => array(__FUNCTION__, $_action, $_data),
  220. 'msg' => 'access_denied'
  221. );
  222. return false;
  223. }
  224. $blinddkim = array();
  225. foreach ($redis->hKeys('DKIM_PUB_KEYS') as $redis_dkim_domain) {
  226. $blinddkim[] = $redis_dkim_domain;
  227. }
  228. return array_diff($blinddkim, array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains')));
  229. break;
  230. case 'delete':
  231. $domains = (array)$_data['domains'];
  232. if ($_SESSION['mailcow_cc_role'] != "admin") {
  233. $_SESSION['return'][] = array(
  234. 'type' => 'danger',
  235. 'log' => array(__FUNCTION__, $_action, $_data),
  236. 'msg' => 'access_denied'
  237. );
  238. return false;
  239. }
  240. foreach ($domains as $domain) {
  241. if (!is_valid_domain_name($domain)) {
  242. $_SESSION['return'][] = array(
  243. 'type' => 'danger',
  244. 'log' => array(__FUNCTION__, $_action, $_data),
  245. 'msg' => array('dkim_domain_or_sel_invalid', $domain)
  246. );
  247. continue;
  248. }
  249. try {
  250. $selector = $redis->hGet('DKIM_SELECTORS', $domain);
  251. $redis->hDel('DKIM_PUB_KEYS', $domain);
  252. $redis->hDel('DKIM_PRIV_KEYS', $selector . '.' . $domain);
  253. $redis->hDel('DKIM_SELECTORS', $domain);
  254. }
  255. catch (RedisException $e) {
  256. $_SESSION['return'][] = array(
  257. 'type' => 'danger',
  258. 'log' => array(__FUNCTION__, $_action, $_data),
  259. 'msg' => array('redis_error', $e)
  260. );
  261. continue;
  262. }
  263. $_SESSION['return'][] = array(
  264. 'type' => 'success',
  265. 'log' => array(__FUNCTION__, $_action, $_data),
  266. 'msg' => array('dkim_removed', htmlspecialchars($domain))
  267. );
  268. }
  269. break;
  270. }
  271. }