1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
4 /* Experimental ARC support for Exim
5 Copyright (c) Jeremy Harris 2018
10 #ifdef EXPERIMENTAL_ARC
11 # if !defined SUPPORT_SPF
12 # error SPF must also be enabled for ARC
13 # elif defined DISABLE_DKIM
14 # error DKIM must also be enabled for ARC
17 # include "functions.h"
18 # include "pdkim/pdkim.h"
19 # include "pdkim/signing.h"
21 extern pdkim_ctx * dkim_verify_ctx;
22 extern pdkim_ctx dkim_sign_ctx;
24 #define ARC_SIGN_OPT_TSTAMP BIT(0)
25 #define ARC_SIGN_OPT_EXPIRE BIT(1)
27 #define ARC_SIGN_DEFAULT_EXPIRE_DELTA (60 * 60 * 24 * 30) /* one month */
29 /******************************************************************************/
31 typedef struct hdr_rlist {
32 struct hdr_rlist * prev;
37 typedef struct arc_line {
38 header_line * complete; /* including the header name; nul-term */
41 /* identified tag contents */
54 /* tag content sub-portions */
61 /* modified copy of b= field in line */
65 typedef struct arc_set {
66 struct arc_set * next;
67 struct arc_set * prev;
74 const uschar * ams_verify_done;
75 BOOL ams_verify_passed;
78 typedef struct arc_ctx {
79 arc_set * arcset_chain;
80 arc_set * arcset_chain_last;
83 #define ARC_HDR_AAR US"ARC-Authentication-Results:"
84 #define ARC_HDRLEN_AAR 27
85 #define ARC_HDR_AMS US"ARC-Message-Signature:"
86 #define ARC_HDRLEN_AMS 22
87 #define ARC_HDR_AS US"ARC-Seal:"
88 #define ARC_HDRLEN_AS 9
89 #define HDR_AR US"Authentication-Results:"
94 static hdr_rlist * headers_rlist;
95 static arc_ctx arc_sign_ctx = { NULL };
96 static arc_ctx arc_verify_ctx = { NULL };
99 /******************************************************************************/
102 /* Get the instance number from the header.
105 arc_instance_from_hdr(const arc_line * al)
107 const uschar * s = al->i.data;
108 if (!s || !al->i.len) return 0;
109 return (unsigned) atoi(CCS s);
117 while (c && (c == ' ' || c == '\t' || c == '\n' || c == '\r')) c = *++s;
122 /* Locate instance struct on chain, inserting a new one if
123 needed. The chain is in increasing-instance-number order
124 by the "next" link, and we have a "prev" link also.
128 arc_find_set(arc_ctx * ctx, unsigned i)
130 arc_set ** pas, * as, * next, * prev;
132 for (pas = &ctx->arcset_chain, prev = NULL, next = ctx->arcset_chain;
133 as = *pas; pas = &as->next)
135 if (as->instance > i) break;
136 if (as->instance == i)
138 DEBUG(D_acl) debug_printf("ARC: existing instance %u\n", i);
145 DEBUG(D_acl) debug_printf("ARC: new instance %u\n", i);
146 *pas = as = store_get(sizeof(arc_set));
147 memset(as, 0, sizeof(arc_set));
154 ctx->arcset_chain_last = as;
160 /* Insert a tag content into the line structure.
161 Note this is a reference to existing data, not a copy.
162 Check for already-seen tag.
163 The string-pointer is on the '=' for entry. Update it past the
164 content (to the ;) on return;
168 arc_insert_tagvalue(arc_line * al, unsigned loff, uschar ** ss)
172 blob * b = (blob *)(US al + loff);
175 /* [FWS] tag-value [FWS] */
177 if (b->data) return US"fail";
178 s = skip_fws(s); /* FWS */
181 while ((c = *s) && c != ';') { len++; s++; }
183 while (len && ((c = s[-1]) == ' ' || c == '\t' || c == '\n' || c == '\r'))
184 { s--; len--; } /* FWS */
190 /* Inspect a header line, noting known tag fields.
191 Check for duplicates. */
194 arc_parse_line(arc_line * al, header_line * h, unsigned off, BOOL instance_only)
196 uschar * s = h->text + off;
197 uschar * r = NULL; /* compiler-quietening */
204 al->rawsig_no_b_val.data = store_get(h->slen + 1);
205 memcpy(al->rawsig_no_b_val.data, h->text, off); /* copy the header name blind */
206 r = al->rawsig_no_b_val.data + off;
207 al->rawsig_no_b_val.len = off;
210 /* tag-list = tag-spec *( ";" tag-spec ) [ ";" ] */
217 uschar * fieldstart = s;
218 uschar * bstart = NULL, * bend;
220 /* tag-spec = [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS] */
222 s = skip_fws(s); /* FWS */
224 /* debug_printf("%s: consider '%s'\n", __FUNCTION__, s); */
226 s = skip_fws(s); /* FWS */
229 if (!instance_only || tagchar == 'i') switch (tagchar)
231 case 'a': /* a= AMS algorithm */
233 if (*s != '=') return US"no 'a' value";
234 if (arc_insert_tagvalue(al, offsetof(arc_line, a), &s)) return US"a tag dup";
236 /* substructure: algo-hash (eg. rsa-sha256) */
238 t = al->a_algo.data = al->a.data;
240 if (!*t++ || ++i > al->a.len) return US"no '-' in 'a' value";
242 if (*t++ != '-') return US"no '-' in 'a' value";
244 al->a_hash.len = al->a.len - i - 1;
253 case '=': /* b= AMS signature */
254 if (al->b.data) return US"already b data";
257 /* The signature can have FWS inserted in the content;
258 make a stripped copy */
260 while ((c = *++s) && c != ';')
261 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
262 g = string_catn(g, s, 1);
263 al->b.data = string_from_gstring(g);
265 gstring_reset_unused(g);
268 case 'h': /* bh= AMS body hash */
269 s = skip_fws(++s); /* FWS */
270 if (*s != '=') return US"no bh value";
271 if (al->bh.data) return US"already bh data";
273 /* The bodyhash can have FWS inserted in the content;
274 make a stripped copy */
276 while ((c = *++s) && c != ';')
277 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
278 g = string_catn(g, s, 1);
279 al->bh.data = string_from_gstring(g);
281 gstring_reset_unused(g);
291 case '=': /* c= AMS canonicalisation */
292 if (arc_insert_tagvalue(al, offsetof(arc_line, c), &s)) return US"c tag dup";
294 /* substructure: head/body (eg. relaxed/simple)) */
296 t = al->c_head.data = al->c.data;
298 if (!*t++ || ++i > al->a.len) break;
300 if (*t++ == '/') /* /body is optional */
303 al->c_body.len = al->c.len - i - 1;
307 al->c_body.data = US"simple";
311 case 'v': /* cv= AS validity */
312 if (*++s != '=') return US"cv tag val";
313 if (arc_insert_tagvalue(al, offsetof(arc_line, cv), &s)) return US"cv tag dup";
319 case 'd': /* d= AMS domain */
320 if (*s != '=') return US"d tag val";
321 if (arc_insert_tagvalue(al, offsetof(arc_line, d), &s)) return US"d tag dup";
323 case 'h': /* h= AMS headers */
324 if (*s != '=') return US"h tag val";
325 if (arc_insert_tagvalue(al, offsetof(arc_line, h), &s)) return US"h tag dup";
327 case 'i': /* i= ARC set instance */
328 if (*s != '=') return US"i tag val";
329 if (arc_insert_tagvalue(al, offsetof(arc_line, i), &s)) return US"i tag dup";
330 if (instance_only) goto done;
332 case 'l': /* l= bodylength */
333 if (*s != '=') return US"l tag val";
334 if (arc_insert_tagvalue(al, offsetof(arc_line, l), &s)) return US"l tag dup";
336 case 's': /* s= AMS selector */
337 if (*s != '=') return US"s tag val";
338 if (arc_insert_tagvalue(al, offsetof(arc_line, s), &s)) return US"s tag dup";
342 while ((c = *s) && c != ';') s++;
343 if (c) s++; /* ; after tag-spec */
345 /* for all but the b= tag, copy the field including FWS. For the b=,
346 drop the tag content. */
351 size_t n = bstart - fieldstart;
352 memcpy(r, fieldstart, n); /* FWS "b=" */
354 al->rawsig_no_b_val.len += n;
356 memcpy(r, bend, n); /* FWS ";" */
358 al->rawsig_no_b_val.len += n;
362 size_t n = s - fieldstart;
363 memcpy(r, fieldstart, n);
365 al->rawsig_no_b_val.len += n;
373 /* debug_printf("%s: finshed\n", __FUNCTION__); */
378 /* Insert one header line in the correct set of the chain,
379 adding instances as needed and checking for duplicate lines.
383 arc_insert_hdr(arc_ctx * ctx, header_line * h, unsigned off, unsigned hoff,
388 arc_line * al = store_get(sizeof(arc_line)), ** alp;
391 memset(al, 0, sizeof(arc_line));
393 if ((e = arc_parse_line(al, h, off, instance_only)))
395 DEBUG(D_acl) if (e) debug_printf("ARC: %s\n", e);
396 return US"line parse";
398 if (!(i = arc_instance_from_hdr(al))) return US"instance find";
399 if (i > 50) return US"overlarge instance number";
400 if (!(as = arc_find_set(ctx, i))) return US"set find";
401 if (*(alp = (arc_line **)(US as + hoff))) return US"dup hdr";
410 static const uschar *
411 arc_try_header(arc_ctx * ctx, header_line * h, BOOL instance_only)
415 /*debug_printf("consider hdr '%s'\n", h->text);*/
416 if (strncmpic(ARC_HDR_AAR, h->text, ARC_HDRLEN_AAR) == 0)
422 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
424 debug_printf("ARC: found AAR: %.*s\n", len, h->text);
426 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AAR, offsetof(arc_set, hdr_aar),
429 DEBUG(D_acl) debug_printf("inserting AAR: %s\n", e);
430 return US"inserting AAR";
433 else if (strncmpic(ARC_HDR_AMS, h->text, ARC_HDRLEN_AMS) == 0)
441 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
443 debug_printf("ARC: found AMS: %.*s\n", len, h->text);
445 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AMS, offsetof(arc_set, hdr_ams),
448 DEBUG(D_acl) debug_printf("inserting AMS: %s\n", e);
449 return US"inserting AMS";
453 /*XXX dubious selection of ams here */
454 ams = ctx->arcset_chain->hdr_ams;
457 ams->c_head.data = US"simple"; ams->c_head.len = 6;
458 ams->c_body = ams->c_head;
461 else if (strncmpic(ARC_HDR_AS, h->text, ARC_HDRLEN_AS) == 0)
467 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
469 debug_printf("ARC: found AS: %.*s\n", len, h->text);
471 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AS, offsetof(arc_set, hdr_as),
474 DEBUG(D_acl) debug_printf("inserting AS: %s\n", e);
475 return US"inserting AS";
483 /* Gather the chain of arc sets from the headers.
484 Check for duplicates while that is done. Also build the
485 reverse-order headers list;
487 Return: ARC state if determined, eg. by lack of any ARC chain.
490 static const uschar *
491 arc_vfy_collect_hdrs(arc_ctx * ctx)
494 hdr_rlist * r = NULL, * rprev = NULL;
497 DEBUG(D_acl) debug_printf("ARC: collecting arc sets\n");
498 for (h = header_list; h; h = h->next)
500 r = store_get(sizeof(hdr_rlist));
506 if ((e = arc_try_header(ctx, h, FALSE)))
508 arc_state_reason = string_sprintf("collecting headers: %s", e);
514 if (!ctx->arcset_chain) return US"none";
520 arc_cv_match(arc_line * al, const uschar * s)
522 return Ustrncmp(s, al->cv.data, al->cv.len) == 0;
525 /******************************************************************************/
527 /* Return the hash of headers from the message that the AMS claims it
532 arc_get_verify_hhash(arc_ctx * ctx, arc_line * ams, blob * hhash)
534 const uschar * headernames = string_copyn(ams->h.data, ams->h.len);
538 BOOL relaxed = Ustrncmp(US"relaxed", ams->c_head.data, ams->c_head.len) == 0;
539 int hashtype = pdkim_hashname_to_hashtype(
540 ams->a_hash.data, ams->a_hash.len);
545 if (!exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
548 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
552 /* For each headername in the list from the AMS (walking in order)
553 walk the message headers in reverse order, adding to the hash any
554 found for the first time. For that last point, maintain used-marks
555 on the list of message headers. */
557 DEBUG(D_acl) debug_printf("ARC: AMS header data for verification:\n");
559 for (r = headers_rlist; r; r = r->prev)
561 while ((hn = string_nextinlist(&headernames, &sep, NULL, 0)))
562 for (r = headers_rlist; r; r = r->prev)
564 && strncasecmp(CCS (s = r->h->text), CCS hn, Ustrlen(hn)) == 0
567 if (relaxed) s = pdkim_relax_header_n(s, r->h->slen, TRUE);
570 DEBUG(D_acl) pdkim_quoteprint(s, len);
571 exim_sha_update(&hhash_ctx, s, Ustrlen(s));
576 /* Finally add in the signature header (with the b= tag stripped); no CRLF */
578 s = ams->rawsig_no_b_val.data, len = ams->rawsig_no_b_val.len;
580 len = Ustrlen(s = pdkim_relax_header_n(s, len, FALSE));
581 DEBUG(D_acl) pdkim_quoteprint(s, len);
582 exim_sha_update(&hhash_ctx, s, len);
584 exim_sha_finish(&hhash_ctx, hhash);
586 { debug_printf("ARC: header hash: "); pdkim_hexprint(hhash->data, hhash->len); }
593 static pdkim_pubkey *
594 arc_line_to_pubkey(arc_line * al)
599 if (!(dns_txt = dkim_exim_query_dns_txt(string_sprintf("%.*s._domainkey.%.*s",
600 al->s.len, al->s.data, al->d.len, al->d.data))))
602 DEBUG(D_acl) debug_printf("pubkey dns lookup fail\n");
606 if ( !(p = pdkim_parse_pubkey_record(dns_txt))
607 || (Ustrcmp(p->srvtype, "*") != 0 && Ustrcmp(p->srvtype, "email") != 0)
610 DEBUG(D_acl) debug_printf("pubkey dns lookup format error\n");
614 /* If the pubkey limits use to specified hashes, reject unusable
615 signatures. XXX should we have looked for multiple dns records? */
619 const uschar * list = p->hashes, * ele;
622 while ((ele = string_nextinlist(&list, &sep, NULL, 0)))
623 if (Ustrncmp(ele, al->a_hash.data, al->a_hash.len) == 0) break;
626 DEBUG(D_acl) debug_printf("pubkey h=%s vs sig a=%.*s\n",
627 p->hashes, (int)al->a.len, al->a.data);
637 static pdkim_bodyhash *
638 arc_ams_setup_vfy_bodyhash(arc_line * ams)
640 int canon_head, canon_body;
643 if (!ams->c.data) ams->c.data = US"simple"; /* RFC 6376 (DKIM) default */
644 pdkim_cstring_to_canons(ams->c.data, ams->c.len, &canon_head, &canon_body);
645 bodylen = ams->l.data
646 ? strtol(CS string_copyn(ams->l.data, ams->l.len), NULL, 10) : -1;
648 return pdkim_set_bodyhash(dkim_verify_ctx,
649 pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len),
656 /* Verify an AMS. This is a DKIM-sig header, but with an ARC i= tag
657 and without a DKIM v= tag.
660 static const uschar *
661 arc_ams_verify(arc_ctx * ctx, arc_set * as)
663 arc_line * ams = as->hdr_ams;
670 const uschar * errstr;
672 as->ams_verify_done = US"in-progress";
674 /* Check the AMS has all the required tags:
678 "d=" domain (for key lookup)
679 "h=" headers (included in signature)
680 "s=" key-selector (for key lookup)
682 if ( !ams->a.data || !ams->b.data || !ams->bh.data || !ams->d.data
683 || !ams->h.data || !ams->s.data)
685 as->ams_verify_done = arc_state_reason = US"required tag missing";
690 /* The bodyhash should have been created earlier, and the dkim code should
691 have managed calculating it during message input. Find the reference to it. */
693 if (!(b = arc_ams_setup_vfy_bodyhash(ams)))
695 as->ams_verify_done = arc_state_reason = US"internal hash setup error";
701 debug_printf("ARC i=%d AMS Body bytes hashed: %lu\n"
702 " Body %.*s computed: ",
703 as->instance, b->signed_body_bytes,
704 (int)ams->a_hash.len, ams->a_hash.data);
705 pdkim_hexprint(CUS b->bh.data, b->bh.len);
708 /* We know the bh-tag blob is of a nul-term string, so safe as a string */
711 || (pdkim_decode_base64(ams->bh.data, &sighash), sighash.len != b->bh.len)
712 || memcmp(sighash.data, b->bh.data, b->bh.len) != 0
717 debug_printf("ARC i=%d AMS Body hash from headers: ", as->instance);
718 pdkim_hexprint(sighash.data, sighash.len);
719 debug_printf("ARC i=%d AMS Body hash did NOT match\n", as->instance);
721 return as->ams_verify_done = arc_state_reason = US"AMS body hash miscompare";
724 DEBUG(D_acl) debug_printf("ARC i=%d AMS Body hash compared OK\n", as->instance);
726 /* Get the public key from DNS */
728 if (!(p = arc_line_to_pubkey(ams)))
729 return as->ams_verify_done = arc_state_reason = US"pubkey problem";
731 /* We know the b-tag blob is of a nul-term string, so safe as a string */
732 pdkim_decode_base64(ams->b.data, &sighash);
734 arc_get_verify_hhash(ctx, ams, &hhash);
736 /* Setup the interface to the signing library */
738 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx)))
740 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
741 as->ams_verify_done = arc_state_reason = US"internal sigverify init error";
745 hashtype = pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len);
747 if ((errstr = exim_dkim_verify(&vctx,
748 pdkim_hashes[hashtype].exim_hashmethod, &hhash, &sighash)))
750 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify %s\n", as->instance, errstr);
751 return as->ams_verify_done = arc_state_reason = US"AMS sig nonverify";
754 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify pass\n", as->instance);
755 as->ams_verify_passed = TRUE;
761 /* Check the sets are instance-continuous and that all
762 members are present. Check that no arc_seals are "fail".
763 Set the highest instance number global.
764 Verify the latest AMS.
767 arc_headers_check(arc_ctx * ctx)
771 BOOL ams_fail_found = FALSE;
773 if (!(as = ctx->arcset_chain_last))
776 for(inst = as->instance; as; as = as->prev, inst--)
778 if (as->instance != inst)
779 arc_state_reason = string_sprintf("i=%d (sequence; expected %d)",
781 else if (!as->hdr_aar || !as->hdr_ams || !as->hdr_as)
782 arc_state_reason = string_sprintf("i=%d (missing header)", as->instance);
783 else if (arc_cv_match(as->hdr_as, US"fail"))
784 arc_state_reason = string_sprintf("i=%d (cv)", as->instance);
788 DEBUG(D_acl) debug_printf("ARC chain fail at %s\n", arc_state_reason);
792 /* Evaluate the oldest-pass AMS validation while we're here.
793 It does not affect the AS chain validation but is reported as
797 if (arc_ams_verify(ctx, as))
798 ams_fail_found = TRUE;
800 arc_oldest_pass = inst;
801 arc_state_reason = NULL;
805 arc_state_reason = string_sprintf("(sequence; expected i=%d)", inst);
806 DEBUG(D_acl) debug_printf("ARC chain fail %s\n", arc_state_reason);
810 arc_received = ctx->arcset_chain_last;
811 arc_received_instance = arc_received->instance;
813 /* We can skip the latest-AMS validation, if we already did it. */
815 as = ctx->arcset_chain_last;
816 if (!as->ams_verify_passed)
818 if (as->ams_verify_done)
820 arc_state_reason = as->ams_verify_done;
823 if (!!arc_ams_verify(ctx, as))
830 /******************************************************************************/
831 static const uschar *
832 arc_seal_verify(arc_ctx * ctx, arc_set * as)
834 arc_line * hdr_as = as->hdr_as;
842 const uschar * errstr;
844 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d\n", as->instance);
846 1. If the value of the "cv" tag on that seal is "fail", the
847 chain state is "fail" and the algorithm stops here. (This
848 step SHOULD be skipped if the earlier step (2.1) was
851 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
852 == "none" && i != 1)) then the chain state is "fail" and the
853 algorithm stops here (note that the ordering of the logic is
854 structured for short-circuit evaluation).
857 if ( as->instance == 1 && !arc_cv_match(hdr_as, US"none")
858 || arc_cv_match(hdr_as, US"none") && as->instance != 1
861 arc_state_reason = US"seal cv state";
866 3. Initialize a hash function corresponding to the "a" tag of
870 hashtype = pdkim_hashname_to_hashtype(hdr_as->a_hash.data, hdr_as->a_hash.len);
872 if (!exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
875 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
876 arc_state_reason = US"seal hash setup error";
881 4. Compute the canonicalized form of the ARC header fields, in
882 the order described in Section 5.4.2, using the "relaxed"
883 header canonicalization defined in Section 3.4.2 of
884 [RFC6376]. Pass the canonicalized result to the hash
887 Headers are CRLF-separated, but the last one is not crlf-terminated.
890 DEBUG(D_acl) debug_printf("ARC: AS header data for verification:\n");
891 for (as2 = ctx->arcset_chain;
892 as2 && as2->instance <= as->instance;
900 if (!(s = al->relaxed))
901 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
902 al->complete->slen, TRUE);
904 DEBUG(D_acl) pdkim_quoteprint(s, len);
905 exim_sha_update(&hhash_ctx, s, len);
908 if (!(s = al->relaxed))
909 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
910 al->complete->slen, TRUE);
912 DEBUG(D_acl) pdkim_quoteprint(s, len);
913 exim_sha_update(&hhash_ctx, s, len);
916 if (as2->instance == as->instance)
917 s = pdkim_relax_header_n(al->rawsig_no_b_val.data,
918 al->rawsig_no_b_val.len, FALSE);
919 else if (!(s = al->relaxed))
920 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
921 al->complete->slen, TRUE);
923 DEBUG(D_acl) pdkim_quoteprint(s, len);
924 exim_sha_update(&hhash_ctx, s, len);
928 5. Retrieve the final digest from the hash function.
931 exim_sha_finish(&hhash_ctx, &hhash_computed);
934 debug_printf("ARC i=%d AS Header %.*s computed: ",
935 as->instance, (int)hdr_as->a_hash.len, hdr_as->a_hash.data);
936 pdkim_hexprint(hhash_computed.data, hhash_computed.len);
941 6. Retrieve the public key identified by the "s" and "d" tags in
942 the ARC-Seal, as described in Section 4.1.6.
945 if (!(p = arc_line_to_pubkey(hdr_as)))
946 return US"pubkey problem";
949 7. Determine whether the signature portion ("b" tag) of the ARC-
950 Seal and the digest computed above are valid according to the
951 public key. (See also Section Section 8.4 for failure case
954 8. If the signature is not valid, the chain state is "fail" and
955 the algorithm stops here.
958 /* We know the b-tag blob is of a nul-term string, so safe as a string */
959 pdkim_decode_base64(hdr_as->b.data, &sighash);
961 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx)))
963 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
967 hashtype = pdkim_hashname_to_hashtype(hdr_as->a_hash.data, hdr_as->a_hash.len);
969 if ((errstr = exim_dkim_verify(&vctx,
970 pdkim_hashes[hashtype].exim_hashmethod,
971 &hhash_computed, &sighash)))
974 debug_printf("ARC i=%d AS headers verify: %s\n", as->instance, errstr);
975 arc_state_reason = US"seal sigverify error";
979 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d pass\n", as->instance);
984 static const uschar *
985 arc_verify_seals(arc_ctx * ctx)
987 arc_set * as = ctx->arcset_chain;
994 if (arc_seal_verify(ctx, as)) return US"fail";
997 DEBUG(D_acl) debug_printf("ARC: AS vfy overall pass\n");
1000 /******************************************************************************/
1002 /* Do ARC verification. Called from DATA ACL, on a verify = arc
1003 condition. No arguments; we are checking globals.
1005 Return: The ARC state, or NULL on error.
1009 acl_verify_arc(void)
1013 memset(&arc_verify_ctx, 0, sizeof(arc_verify_ctx));
1015 if (!dkim_verify_ctx)
1017 DEBUG(D_acl) debug_printf("ARC: no DKIM verify context\n");
1021 /* AS evaluation, per
1022 https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-10#section-6
1024 /* 1. Collect all ARC sets currently on the message. If there were
1025 none, the ARC state is "none" and the algorithm stops here.
1028 if ((res = arc_vfy_collect_hdrs(&arc_verify_ctx)))
1031 /* 2. If the form of any ARC set is invalid (e.g., does not contain
1032 exactly one of each of the three ARC-specific header fields),
1033 then the chain state is "fail" and the algorithm stops here.
1035 1. To avoid the overhead of unnecessary computation and delay
1036 from crypto and DNS operations, the cv value for all ARC-
1037 Seal(s) MAY be checked at this point. If any of the values
1038 are "fail", then the overall state of the chain is "fail" and
1039 the algorithm stops here.
1041 3. Conduct verification of the ARC-Message-Signature header field
1042 bearing the highest instance number. If this verification fails,
1043 then the chain state is "fail" and the algorithm stops here.
1046 if ((res = arc_headers_check(&arc_verify_ctx)))
1049 /* 4. For each ARC-Seal from the "N"th instance to the first, apply the
1052 1. If the value of the "cv" tag on that seal is "fail", the
1053 chain state is "fail" and the algorithm stops here. (This
1054 step SHOULD be skipped if the earlier step (2.1) was
1057 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
1058 == "none" && i != 1)) then the chain state is "fail" and the
1059 algorithm stops here (note that the ordering of the logic is
1060 structured for short-circuit evaluation).
1062 3. Initialize a hash function corresponding to the "a" tag of
1065 4. Compute the canonicalized form of the ARC header fields, in
1066 the order described in Section 5.4.2, using the "relaxed"
1067 header canonicalization defined in Section 3.4.2 of
1068 [RFC6376]. Pass the canonicalized result to the hash
1071 5. Retrieve the final digest from the hash function.
1073 6. Retrieve the public key identified by the "s" and "d" tags in
1074 the ARC-Seal, as described in Section 4.1.6.
1076 7. Determine whether the signature portion ("b" tag) of the ARC-
1077 Seal and the digest computed above are valid according to the
1078 public key. (See also Section Section 8.4 for failure case
1081 8. If the signature is not valid, the chain state is "fail" and
1082 the algorithm stops here.
1084 5. If all seals pass validation, then the chain state is "pass", and
1085 the algorithm is complete.
1088 if ((res = arc_verify_seals(&arc_verify_ctx)))
1097 /******************************************************************************/
1099 /* Prepend the header to the rlist */
1102 arc_rlist_entry(hdr_rlist * list, const uschar * s, int len)
1104 hdr_rlist * r = store_get(sizeof(hdr_rlist) + sizeof(header_line));
1105 header_line * h = r->h = (header_line *)(r+1);
1114 /* This works for either NL or CRLF lines; also nul-termination */
1116 if (*s == '\n' && s[1] != '\t' && s[1] != ' ') break;
1117 s++; /* move past end of line */
1123 /* Walk the given headers strings identifying each header, and construct
1124 a reverse-order list.
1128 arc_sign_scan_headers(arc_ctx * ctx, gstring * sigheaders)
1131 hdr_rlist * rheaders = NULL;
1133 s = sigheaders ? sigheaders->s : NULL;
1136 const uschar * s2 = s;
1138 /* This works for either NL or CRLF lines; also nul-termination */
1140 if (*s2 == '\n' && s2[1] != '\t' && s2[1] != ' ') break;
1141 s2++; /* move past end of line */
1143 rheaders = arc_rlist_entry(rheaders, s, s2 - s);
1151 /* Return the A-R content, without identity, with line-ending and
1155 arc_sign_find_ar(header_line * headers, const uschar * identity, blob * ret)
1158 int ilen = Ustrlen(identity);
1161 for(h = headers; h; h = h->next)
1163 uschar * s = h->text, c;
1166 if (Ustrncmp(s, HDR_AR, HDRLEN_AR) != 0) continue;
1167 s += HDRLEN_AR, len -= HDRLEN_AR; /* header name */
1169 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1170 s++, len--; /* FWS */
1171 if (Ustrncmp(s, identity, ilen) != 0) continue;
1172 s += ilen; len -= ilen; /* identity */
1173 if (len <= 0) continue;
1174 if ((c = *s) && c == ';') s++, len--; /* identity terminator */
1176 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1177 s++, len--; /* FWS */
1178 if (len <= 0) continue;
1188 /* Append a constructed AAR including CRLF. Add it to the arc_ctx too. */
1191 arc_sign_append_aar(gstring * g, arc_ctx * ctx,
1192 const uschar * identity, int instance, blob * ar)
1194 int aar_off = g ? g->ptr : 0;
1195 arc_set * as = store_get(sizeof(arc_set) + sizeof(arc_line) + sizeof(header_line));
1196 arc_line * al = (arc_line *)(as+1);
1197 header_line * h = (header_line *)(al+1);
1199 g = string_catn(g, ARC_HDR_AAR, ARC_HDRLEN_AAR);
1200 g = string_cat(g, string_sprintf(" i=%d; %s;\r\n\t", instance, identity));
1201 g = string_catn(g, US ar->data, ar->len);
1203 h->slen = g->ptr - aar_off;
1204 h->text = g->s + aar_off;
1207 as->prev = ctx->arcset_chain_last;
1208 as->instance = instance;
1211 ctx->arcset_chain = as;
1213 ctx->arcset_chain_last->next = as;
1214 ctx->arcset_chain_last = as;
1216 DEBUG(D_transport) debug_printf("ARC: AAR '%.*s'\n", h->slen - 2, h->text);
1223 arc_sig_from_pseudoheader(gstring * hdata, int hashtype, const uschar * privkey,
1224 blob * sig, const uschar * why)
1226 hashmethod hm = /*sig->keytype == KEYTYPE_ED25519*/ FALSE
1227 ? HASH_SHA2_512 : pdkim_hashes[hashtype].exim_hashmethod;
1230 const uschar * errstr;
1235 debug_printf("ARC: %s header data for signing:\n", why);
1236 pdkim_quoteprint(hdata->s, hdata->ptr);
1238 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1239 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1240 exim_sha_finish(&hhash_ctx, &hhash);
1241 debug_printf("ARC: header hash: "); pdkim_hexprint(hhash.data, hhash.len);
1244 if (FALSE /*need hash for Ed25519 or GCrypt signing*/ )
1247 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1248 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1249 exim_sha_finish(&hhash_ctx, &hhash);
1253 hhash.data = hdata->s;
1254 hhash.len = hdata->ptr;
1257 if ( (errstr = exim_dkim_signing_init(privkey, &sctx))
1258 || (errstr = exim_dkim_sign(&sctx, hm, &hhash, sig)))
1260 log_write(0, LOG_MAIN, "ARC: %s signing: %s\n", why, errstr);
1262 debug_printf("private key, or private-key file content, was: '%s'\n",
1272 arc_sign_append_sig(gstring * g, blob * sig)
1274 /*debug_printf("%s: raw sig ", __FUNCTION__); pdkim_hexprint(sig->data, sig->len);*/
1275 sig->data = pdkim_encode_base64(sig);
1276 sig->len = Ustrlen(sig->data);
1279 int len = MIN(sig->len, 74);
1280 g = string_catn(g, sig->data, len);
1281 if ((sig->len -= len) == 0) break;
1283 g = string_catn(g, US"\r\n\t ", 5);
1285 g = string_catn(g, US";\r\n", 3);
1286 gstring_reset_unused(g);
1287 string_from_gstring(g);
1292 /* Append a constructed AMS including CRLF. Add it to the arc_ctx too. */
1295 arc_sign_append_ams(gstring * g, arc_ctx * ctx, int instance,
1296 const uschar * identity, const uschar * selector, blob * bodyhash,
1297 hdr_rlist * rheaders, const uschar * privkey, unsigned options)
1300 gstring * hdata = NULL;
1302 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1305 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line));
1306 header_line * h = (header_line *)(al+1);
1308 /* debug_printf("%s\n", __FUNCTION__); */
1310 /* Construct the to-be-signed AMS pseudo-header: everything but the sig. */
1313 g = string_append(g, 7,
1315 US" i=", string_sprintf("%d", instance),
1316 US"; a=rsa-sha256; c=relaxed; d=", identity, /*XXX hardwired */
1317 US"; s=", selector);
1318 if (options & ARC_SIGN_OPT_TSTAMP)
1319 g = string_append(g, 2,
1320 US"; t=", string_sprintf("%lu", (u_long)now));
1321 if (options & ARC_SIGN_OPT_EXPIRE)
1322 g = string_append(g, 2,
1323 US"; x=", string_sprintf("%lu", (u_long)expire));
1324 g = string_append(g, 3,
1325 US";\r\n\tbh=", pdkim_encode_base64(bodyhash),
1328 for(col = 3; rheaders; rheaders = rheaders->prev)
1330 const uschar * hnames = US"DKIM-Signature:" PDKIM_DEFAULT_SIGN_HEADERS;
1331 uschar * name, * htext = rheaders->h->text;
1334 /* Spot headers of interest */
1336 while ((name = string_nextinlist(&hnames, &sep, NULL, 0)))
1338 int len = Ustrlen(name);
1339 if (strncasecmp(CCS htext, CCS name, len) == 0)
1341 /* If too long, fold line in h= field */
1343 if (col + len > 78) g = string_catn(g, US"\r\n\t ", 5), col = 3;
1345 /* Add name to h= list */
1347 g = string_catn(g, name, len);
1348 g = string_catn(g, US":", 1);
1351 /* Accumulate header for hashing/signing */
1353 hdata = string_cat(hdata,
1354 pdkim_relax_header_n(htext, rheaders->h->slen, TRUE)); /*XXX hardwired */
1360 /* Lose the last colon from the h= list */
1362 if (g->s[g->ptr - 1] == ':') g->ptr--;
1364 g = string_catn(g, US";\r\n\tb=;", 7);
1366 /* Include the pseudo-header in the accumulation */
1368 s = pdkim_relax_header_n(g->s + ams_off, g->ptr - ams_off, FALSE);
1369 hdata = string_cat(hdata, s);
1371 /* Calculate the signature from the accumulation */
1372 /*XXX does that need further relaxation? there are spaces embedded in the b= strings! */
1374 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AMS"))
1377 /* Lose the trailing semicolon from the psuedo-header, and append the signature
1378 (folded over lines) and termination to complete it. */
1381 g = arc_sign_append_sig(g, &sig);
1383 h->slen = g->ptr - ams_off;
1384 h->text = g->s + ams_off;
1386 ctx->arcset_chain_last->hdr_ams = al;
1388 DEBUG(D_transport) debug_printf("ARC: AMS '%.*s'\n", h->slen - 2, h->text);
1394 /* Look for an arc= result in an A-R header blob. We know that its data
1395 happens to be a NUL-term string. */
1398 arc_ar_cv_status(blob * ar)
1400 const uschar * resinfo = ar->data;
1402 uschar * methodspec, * s;
1404 while ((methodspec = string_nextinlist(&resinfo, &sep, NULL, 0)))
1405 if (Ustrncmp(methodspec, US"arc=", 4) == 0)
1408 for (s = methodspec += 4;
1409 (c = *s) && c != ';' && c != ' ' && c != '\r' && c != '\n'; ) s++;
1410 return string_copyn(methodspec, s - methodspec);
1417 /* Build the AS header and prepend it */
1420 arc_sign_prepend_as(gstring * arcset_interim, arc_ctx * ctx,
1421 int instance, const uschar * identity, const uschar * selector, blob * ar,
1422 const uschar * privkey, unsigned options)
1426 uschar * status = arc_ar_cv_status(ar);
1427 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line));
1428 header_line * h = (header_line *)(al+1);
1430 gstring * hdata = NULL;
1431 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1437 - no h= tag; implicit coverage
1438 - arc status from A-R
1440 - coverage is just the new ARC set
1441 including self (but with an empty b= in self)
1443 - all ARC set headers, set-number order, aar then ams then as,
1444 including self (but with an empty b= in self)
1447 /* Construct the AS except for the signature */
1449 arcset = string_append(NULL, 9,
1451 US" i=", string_sprintf("%d", instance),
1453 US"; a=rsa-sha256; d=", identity, /*XXX hardwired */
1454 US"; s=", selector); /*XXX same as AMS */
1455 if (options & ARC_SIGN_OPT_TSTAMP)
1456 arcset = string_append(arcset, 2,
1457 US"; t=", string_sprintf("%lu", (u_long)now));
1458 arcset = string_cat(arcset,
1461 h->slen = arcset->ptr;
1462 h->text = arcset->s;
1464 ctx->arcset_chain_last->hdr_as = al;
1466 /* For any but "fail" chain-verify status, walk the entire chain in order by
1467 instance. For fail, only the new arc-set. Accumulate the elements walked. */
1469 for (as = Ustrcmp(status, US"fail") == 0
1470 ? ctx->arcset_chain_last : ctx->arcset_chain;
1473 /* Accumulate AAR then AMS then AS. Relaxed canonicalisation
1474 is required per standard. */
1476 h = as->hdr_aar->complete;
1477 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1478 h = as->hdr_ams->complete;
1479 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1480 h = as->hdr_as->complete;
1481 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, !!as->next));
1484 /* Calculate the signature from the accumulation */
1486 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AS"))
1489 /* Lose the trailing semicolon */
1491 arcset = arc_sign_append_sig(arcset, &sig);
1492 DEBUG(D_transport) debug_printf("ARC: AS '%.*s'\n", arcset->ptr - 2, arcset->s);
1494 /* Finally, append the AMS and AAR to the new AS */
1496 return string_catn(arcset, arcset_interim->s, arcset_interim->ptr);
1500 /**************************************/
1502 /* Return pointer to pdkim_bodyhash for given hash method, creating new
1507 arc_ams_setup_sign_bodyhash(void)
1509 int canon_head, canon_body;
1511 DEBUG(D_transport) debug_printf("ARC: requesting bodyhash\n");
1512 pdkim_cstring_to_canons(US"relaxed", 7, &canon_head, &canon_body); /*XXX hardwired */
1513 return pdkim_set_bodyhash(&dkim_sign_ctx,
1514 pdkim_hashname_to_hashtype(US"sha256", 6), /*XXX hardwired */
1524 memset(&arc_sign_ctx, 0, sizeof(arc_sign_ctx));
1529 /* A "normal" header line, identified by DKIM processing. These arrive before
1530 the call to arc_sign(), which carries any newly-created DKIM headers - and
1531 those go textually before the normal ones in the message.
1533 We have to take the feed from DKIM as, in the transport-filter case, the
1534 headers are not in memory at the time of the call to arc_sign().
1536 Take a copy of the header and construct a reverse-order list.
1537 Also parse ARC-chain headers and build the chain struct, retaining pointers
1541 static const uschar *
1542 arc_header_sign_feed(gstring * g)
1544 uschar * s = string_copyn(g->s, g->ptr);
1545 headers_rlist = arc_rlist_entry(headers_rlist, s, g->ptr);
1546 return arc_try_header(&arc_sign_ctx, headers_rlist->h, TRUE);
1551 /* ARC signing. Called from the smtp transport, if the arc_sign option is set.
1552 The dkim_exim_sign() function has already been called, so will have hashed the
1553 message body for us so long as we requested a hash previously.
1556 signspec Three-element colon-sep list: identity, selector, privkey.
1557 Optional fourth element: comma-sep list of options.
1559 sigheaders Any signature headers already generated, eg. by DKIM, or NULL
1563 Set of headers to prepend to the message, including the supplied sigheaders
1564 but not the plainheaders.
1568 arc_sign(const uschar * signspec, gstring * sigheaders, uschar ** errstr)
1570 const uschar * identity, * selector, * privkey, * opts, * s;
1571 unsigned options = 0;
1573 header_line * headers;
1574 hdr_rlist * rheaders;
1582 /* Parse the signing specification */
1584 identity = string_nextinlist(&signspec, &sep, NULL, 0);
1585 selector = string_nextinlist(&signspec, &sep, NULL, 0);
1586 if ( !*identity || !*selector
1587 || !(privkey = string_nextinlist(&signspec, &sep, NULL, 0)) || !*privkey)
1589 log_write(0, LOG_MAIN, "ARC: bad signing-specification (%s)",
1590 !*identity ? "identity" : !*selector ? "selector" : "private-key");
1591 return sigheaders ? sigheaders : string_get(0);
1593 if (*privkey == '/' && !(privkey = expand_file_big_buffer(privkey)))
1594 return sigheaders ? sigheaders : string_get(0);
1596 if ((opts = string_nextinlist(&signspec, &sep, NULL, 0)))
1599 while ((s = string_nextinlist(&opts, &osep, NULL, 0)))
1600 if (Ustrcmp(s, "timestamps") == 0)
1602 options |= ARC_SIGN_OPT_TSTAMP;
1603 if (!now) now = time(NULL);
1605 else if (Ustrncmp(s, "expire", 6) == 0)
1607 options |= ARC_SIGN_OPT_EXPIRE;
1608 if (*(s += 6) == '=')
1611 if (!(expire = (time_t)atoi(++s)))
1612 expire = ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1613 if (!now) now = time(NULL);
1617 expire = (time_t)atol(s);
1620 if (!now) now = time(NULL);
1621 expire = now + ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1626 DEBUG(D_transport) debug_printf("ARC: sign for %s\n", identity);
1628 /* Make an rlist of any new DKIM headers, then add the "normals" rlist to it.
1629 Then scan the list for an A-R header. */
1631 string_from_gstring(sigheaders);
1632 if ((rheaders = arc_sign_scan_headers(&arc_sign_ctx, sigheaders)))
1635 for (rp = &headers_rlist; *rp; ) rp = &(*rp)->prev;
1639 /* Finally, build a normal-order headers list */
1640 /*XXX only needed for hunt-the-AR? */
1641 /*XXX also, we really should be accepting any number of ADMD-matching ARs */
1643 header_line * hnext = NULL;
1644 for (rheaders = headers_rlist; rheaders;
1645 hnext = rheaders->h, rheaders = rheaders->prev)
1646 rheaders->h->next = hnext;
1650 if (!(arc_sign_find_ar(headers, identity, &ar)))
1652 log_write(0, LOG_MAIN, "ARC: no Authentication-Results header for signing");
1653 return sigheaders ? sigheaders : string_get(0);
1656 /* We previously built the data-struct for the existing ARC chain, if any, using a headers
1657 feed from the DKIM module. Use that to give the instance number for the ARC set we are
1661 if (arc_sign_ctx.arcset_chain_last)
1662 debug_printf("ARC: existing chain highest instance: %d\n",
1663 arc_sign_ctx.arcset_chain_last->instance);
1665 debug_printf("ARC: no existing chain\n");
1667 instance = arc_sign_ctx.arcset_chain_last ? arc_sign_ctx.arcset_chain_last->instance + 1 : 1;
1671 - copy the A-R; prepend i= & identity
1674 g = arc_sign_append_aar(g, &arc_sign_ctx, identity, instance, &ar);
1678 - Looks fairly like a DKIM sig
1679 - Cover all DKIM sig headers as well as the usuals
1682 - we must have requested a suitable bodyhash previously
1685 b = arc_ams_setup_sign_bodyhash();
1686 g = arc_sign_append_ams(g, &arc_sign_ctx, instance, identity, selector,
1687 &b->bh, headers_rlist, privkey, options);
1692 - no h= tag; implicit coverage
1693 - arc status from A-R
1695 - coverage is just the new ARC set
1696 including self (but with an empty b= in self)
1698 - all ARC set headers, set-number order, aar then ams then as,
1699 including self (but with an empty b= in self)
1703 g = arc_sign_prepend_as(g, &arc_sign_ctx, instance, identity, selector, &ar,
1706 /* Finally, append the dkim headers and return the lot. */
1708 g = string_catn(g, sigheaders->s, sigheaders->ptr);
1709 (void) string_from_gstring(g);
1710 gstring_reset_unused(g);
1715 /******************************************************************************/
1717 /* Check to see if the line is an AMS and if so, set up to validate it.
1718 Called from the DKIM input processing. This must be done now as the message
1719 body data is hashed during input.
1721 We call the DKIM code to request a body-hash; it has the facility already
1722 and the hash parameters might be common with other requests.
1725 static const uschar *
1726 arc_header_vfy_feed(gstring * g)
1733 if (!dkim_verify_ctx) return US"no dkim context";
1735 if (strncmpic(ARC_HDR_AMS, g->s, ARC_HDRLEN_AMS) != 0) return US"not AMS";
1737 DEBUG(D_receive) debug_printf("ARC: spotted AMS header\n");
1738 /* Parse the AMS header */
1743 memset(&al, 0, sizeof(arc_line));
1744 if ((errstr = arc_parse_line(&al, &h, ARC_HDRLEN_AMS, FALSE)))
1746 DEBUG(D_acl) if (errstr) debug_printf("ARC: %s\n", errstr);
1747 return US"line parsing error";
1753 al.c_body.data = US"simple"; al.c_body.len = 6;
1754 al.c_head = al.c_body;
1757 /* Ask the dkim code to calc a bodyhash with those specs */
1759 if (!(b = arc_ams_setup_vfy_bodyhash(&al)))
1760 return US"dkim hash setup fail";
1762 /* Discard the reference; search again at verify time, knowing that one
1763 should have been created here. */
1770 /* A header line has been identified by DKIM processing.
1774 is_vfy TRUE for verify mode or FALSE for signing mode
1777 NULL for success, or an error string (probably unused)
1781 arc_header_feed(gstring * g, BOOL is_vfy)
1783 return is_vfy ? arc_header_vfy_feed(g) : arc_header_sign_feed(g);
1788 /******************************************************************************/
1790 /* Construct the list of domains from the ARC chain after validation */
1793 fn_arc_domains(void)
1799 for (as = arc_verify_ctx.arcset_chain, inst = 1; as; as = as->next, inst++)
1801 arc_line * hdr_as = as->hdr_as;
1804 blob * d = &hdr_as->d;
1806 for (; inst < as->instance; inst++)
1807 g = string_catn(g, US":", 1);
1809 g = d->data && d->len
1810 ? string_append_listele_n(g, ':', d->data, d->len)
1811 : string_catn(g, US":", 1);
1814 g = string_catn(g, US":", 1);
1816 return g ? g->s : US"";
1820 /* Construct an Authentication-Results header portion, for the ARC module */
1823 authres_arc(gstring * g)
1827 arc_line * highest_ams;
1828 int start = 0; /* Compiler quietening */
1829 DEBUG(D_acl) start = g->ptr;
1831 g = string_append(g, 2, US";\n\tarc=", arc_state);
1832 if (arc_received_instance > 0)
1834 g = string_append(g, 3, US" (i=",
1835 string_sprintf("%d", arc_received_instance), US")");
1836 if (arc_state_reason)
1837 g = string_append(g, 3, US"(", arc_state_reason, US")");
1838 g = string_catn(g, US" header.s=", 10);
1839 highest_ams = arc_received->hdr_ams;
1840 g = string_catn(g, highest_ams->s.data, highest_ams->s.len);
1842 g = string_append(g, 2,
1843 US" arc.oldest-pass=", string_sprintf("%d", arc_oldest_pass));
1845 if (sender_host_address)
1846 g = string_append(g, 2, US" smtp.client-ip=", sender_host_address);
1848 else if (arc_state_reason)
1849 g = string_append(g, 3, US" (", arc_state_reason, US")");
1850 DEBUG(D_acl) debug_printf("ARC: authres '%.*s'\n",
1851 g->ptr - start - 3, g->s + start + 3);
1854 DEBUG(D_acl) debug_printf("ARC: no authres\n");
1859 # endif /* SUPPORT_SPF */
1860 #endif /* EXPERIMENTAL_ARC */