| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272 | 
							- <?php
 
- function dkim($_action, $_data = null) {
 
- 	global $redis;
 
- 	global $lang;
 
-   switch ($_action) {
 
-     case 'add':
 
-       if ($_SESSION['mailcow_cc_role'] != "admin") {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'access_denied'
 
-         );
 
-         return false;
 
-       }
 
-       $key_length	= intval($_data['key_size']);
 
-       $dkim_selector = (isset($_data['dkim_selector'])) ? $_data['dkim_selector'] : 'dkim';
 
-       $domain	= $_data['domain'];
 
-       if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-       if ($redis->hGet('DKIM_PUB_KEYS', $domain)) {
 
-           $_SESSION['return'][] = array(
 
-             'type' => 'danger',
 
-             'log' => array(__FUNCTION__, $_action, $_data),
 
-             'msg' => 'dkim_domain_or_sel_invalid'
 
-           );
 
-           return false;
 
-       }
 
-       if (!ctype_alnum($dkim_selector)) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-       $config = array(
 
-         "digest_alg" => "sha256",
 
-         "private_key_bits" => $key_length,
 
-         "private_key_type" => OPENSSL_KEYTYPE_RSA,
 
-       );
 
-       if ($keypair_ressource = openssl_pkey_new($config)) {
 
-         $key_details = openssl_pkey_get_details($keypair_ressource);
 
-         $pubKey = implode(array_slice(
 
-             array_filter(
 
-               explode(PHP_EOL, $key_details['key'])
 
-             ), 1, -1)
 
-           );
 
-         // Save public key and selector to redis
 
-         try {
 
-           $redis->hSet('DKIM_PUB_KEYS', $domain, $pubKey);
 
-           $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
 
-         }
 
-         catch (RedisException $e) {
 
-           $_SESSION['return'][] = array(
 
-             'type' => 'danger',
 
-             'log' => array(__FUNCTION__, $_action, $_data),
 
-             'msg' => array('redis_error', $e)
 
-           );
 
-           return false;
 
-         }
 
-         // Export private key and save private key to redis
 
-         openssl_pkey_export($keypair_ressource, $privKey);
 
-         if (isset($privKey) && !empty($privKey)) {
 
-           try {
 
-             $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, trim($privKey));
 
-           }
 
-           catch (RedisException $e) {
 
-             $_SESSION['return'][] = array(
 
-               'type' => 'danger',
 
-               'log' => array(__FUNCTION__, $_action, $_data),
 
-               'msg' => array('redis_error', $e)
 
-             );
 
-             return false;
 
-           }
 
-         }
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'success',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_added'
 
-         );
 
-         return true;
 
-       }
 
-       else {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-     break;
 
-     case 'import':
 
-       if ($_SESSION['mailcow_cc_role'] != "admin") {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'access_denied'
 
-         );
 
-         return false;
 
-       }
 
-       $private_key_input = trim($_data['private_key_file']);
 
-       $private_key_normalized = preg_replace('~\r\n?~', "\n", $private_key_input);
 
-       $private_key = openssl_pkey_get_private($private_key_normalized);
 
-       if ($ssl_error = openssl_error_string()) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => array('private_key_error', $ssl_error)
 
-         );
 
-         return false;
 
-       }
 
-       // Explode by nl
 
-       $pem_public_key_array = explode(PHP_EOL, trim(openssl_pkey_get_details($private_key)['key']));
 
-       // Remove first and last line/item
 
-       array_shift($pem_public_key_array);
 
-       array_pop($pem_public_key_array);
 
-       // Implode as single string
 
-       $pem_public_key = implode('', $pem_public_key_array);
 
-       $dkim_selector = (isset($_data['dkim_selector'])) ? $_data['dkim_selector'] : 'dkim';
 
-       $domain	= $_data['domain'];
 
-       if (!is_valid_domain_name($domain)) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-       if ($redis->hGet('DKIM_PUB_KEYS', $domain)) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-       if (!ctype_alnum($dkim_selector)) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'dkim_domain_or_sel_invalid'
 
-         );
 
-         return false;
 
-       }
 
-       try {
 
-         $redis->hSet('DKIM_PUB_KEYS', $domain, $pem_public_key);
 
-         $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
 
-         $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, $private_key_normalized);
 
-       }
 
-       catch (RedisException $e) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => array('redis_error', $e)
 
-         );
 
-         return false;
 
-       }
 
-       unset($private_key_normalized);
 
-       unset($private_key);
 
-       unset($private_key_input);
 
-       try {
 
-       }
 
-       catch (RedisException $e) {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => array('redis_error', $e)
 
-         );
 
-         return false;
 
-       }
 
-       $_SESSION['return'][] = array(
 
-         'type' => 'success',
 
-         'log' => array(__FUNCTION__, $_action, $_data),
 
-         'msg' => 'dkim_added'
 
-       );
 
-       return true;
 
-     break;
 
-     case 'details':
 
-       if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
 
-         return false;
 
-       }
 
-       $dkimdata = array();
 
-       if ($redis_dkim_key_data = $redis->hGet('DKIM_PUB_KEYS', $_data)) {
 
-         $dkimdata['pubkey'] = $redis_dkim_key_data;
 
-         if (strlen($dkimdata['pubkey']) < 391) {
 
-           $dkimdata['length'] = "1024";
 
-         }
 
-         elseif (strlen($dkimdata['pubkey']) < 736) {
 
-           $dkimdata['length'] = "2048";
 
-         }
 
-         elseif (strlen($dkimdata['pubkey']) < 1416) {
 
-           $dkimdata['length'] = "4096";
 
-         }
 
-         else {
 
-           $dkimdata['length'] = ">= 8192";
 
-         }
 
-         $dkimdata['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . $redis_dkim_key_data;
 
-         $dkimdata['dkim_selector'] = $redis->hGet('DKIM_SELECTORS', $_data);
 
-         $dkimdata['privkey'] = $redis->hGet('DKIM_PRIV_KEYS', $dkimdata['dkim_selector'] . $_data);
 
-         if ($GLOBALS['SHOW_DKIM_PRIV_KEYS'] === true) {
 
-           $dkimdata['privkey'] = base64_encode($redis->hGet('DKIM_PRIV_KEYS', $dkimdata['dkim_selector'] . '.' . $_data));
 
-         }
 
-         else {
 
-           $dkimdata['privkey'] = base64_encode('Please set $SHOW_DKIM_PRIV_KEYS to true to show DKIM private keys.');
 
-         }
 
-       }
 
-       return $dkimdata;
 
-     break;
 
-     case 'blind':
 
-       if ($_SESSION['mailcow_cc_role'] != "admin") {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'access_denied'
 
-         );
 
-         return false;
 
-       }
 
-       $blinddkim = array();
 
-       foreach ($redis->hKeys('DKIM_PUB_KEYS') as $redis_dkim_domain) {
 
-         $blinddkim[] = $redis_dkim_domain;
 
-       }
 
-       return array_diff($blinddkim, array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains')));
 
-     break;
 
-     case 'delete':
 
-       $domains = (array)$_data['domains'];
 
-       if ($_SESSION['mailcow_cc_role'] != "admin") {
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'danger',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => 'access_denied'
 
-         );
 
-         return false;
 
-       }
 
-       foreach ($domains as $domain) {
 
-         if (!is_valid_domain_name($domain)) {
 
-           $_SESSION['return'][] = array(
 
-             'type' => 'danger',
 
-             'log' => array(__FUNCTION__, $_action, $_data),
 
-             'msg' => array('dkim_domain_or_sel_invalid', $domain)
 
-           );
 
-           continue;
 
-         }
 
-         try {
 
-           $selector = $redis->hGet('DKIM_SELECTORS', $domain);
 
-           $redis->hDel('DKIM_PUB_KEYS', $domain);
 
-           $redis->hDel('DKIM_PRIV_KEYS', $selector . '.' . $domain);
 
-           $redis->hDel('DKIM_SELECTORS', $domain);
 
-         }
 
-         catch (RedisException $e) {
 
-           $_SESSION['return'][] = array(
 
-             'type' => 'danger',
 
-             'log' => array(__FUNCTION__, $_action, $_data),
 
-             'msg' => array('redis_error', $e)
 
-           );
 
-           continue;
 
-         }
 
-         $_SESSION['return'][] = array(
 
-           'type' => 'success',
 
-           'log' => array(__FUNCTION__, $_action, $_data),
 
-           'msg' => array('dkim_removed', htmlspecialchars($domain))
 
-         );
 
-       }
 
-     break;
 
-   }
 
- }
 
 
  |