1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
4 /* Experimental ARC support for Exim
5 Copyright (c) Jeremy Harris 2018 - 2020
6 Copyright (c) The Exim Maintainers 2021 - 2022
11 #if defined EXPERIMENTAL_ARC
12 # if defined DISABLE_DKIM
13 # error DKIM must also be enabled for ARC
16 # include "functions.h"
17 # include "pdkim/pdkim.h"
18 # include "pdkim/signing.h"
20 extern pdkim_ctx * dkim_verify_ctx;
21 extern pdkim_ctx dkim_sign_ctx;
23 #define ARC_SIGN_OPT_TSTAMP BIT(0)
24 #define ARC_SIGN_OPT_EXPIRE BIT(1)
26 #define ARC_SIGN_DEFAULT_EXPIRE_DELTA (60 * 60 * 24 * 30) /* one month */
28 /******************************************************************************/
30 typedef struct hdr_rlist {
31 struct hdr_rlist * prev;
36 typedef struct arc_line {
37 header_line * complete; /* including the header name; nul-term */
40 /* identified tag contents */
53 /* tag content sub-portions */
60 /* modified copy of b= field in line */
64 typedef struct arc_set {
65 struct arc_set * next;
66 struct arc_set * prev;
73 const uschar * ams_verify_done;
74 BOOL ams_verify_passed;
77 typedef struct arc_ctx {
78 arc_set * arcset_chain;
79 arc_set * arcset_chain_last;
82 #define ARC_HDR_AAR US"ARC-Authentication-Results:"
83 #define ARC_HDRLEN_AAR 27
84 #define ARC_HDR_AMS US"ARC-Message-Signature:"
85 #define ARC_HDRLEN_AMS 22
86 #define ARC_HDR_AS US"ARC-Seal:"
87 #define ARC_HDRLEN_AS 9
88 #define HDR_AR US"Authentication-Results:"
93 static hdr_rlist * headers_rlist;
94 static arc_ctx arc_sign_ctx = { NULL };
95 static arc_ctx arc_verify_ctx = { NULL };
98 /******************************************************************************/
101 /* Get the instance number from the header.
104 arc_instance_from_hdr(const arc_line * al)
106 const uschar * s = al->i.data;
107 if (!s || !al->i.len) return 0;
108 return (unsigned) atoi(CCS s);
116 while (c && (c == ' ' || c == '\t' || c == '\n' || c == '\r')) c = *++s;
121 /* Locate instance struct on chain, inserting a new one if
122 needed. The chain is in increasing-instance-number order
123 by the "next" link, and we have a "prev" link also.
127 arc_find_set(arc_ctx * ctx, unsigned i)
129 arc_set ** pas, * as, * next, * prev;
131 for (pas = &ctx->arcset_chain, prev = NULL, next = ctx->arcset_chain;
132 as = *pas; pas = &as->next)
134 if (as->instance > i) break;
135 if (as->instance == i)
137 DEBUG(D_acl) debug_printf("ARC: existing instance %u\n", i);
144 DEBUG(D_acl) debug_printf("ARC: new instance %u\n", i);
145 *pas = as = store_get(sizeof(arc_set), GET_UNTAINTED);
146 memset(as, 0, sizeof(arc_set));
153 ctx->arcset_chain_last = as;
159 /* Insert a tag content into the line structure.
160 Note this is a reference to existing data, not a copy.
161 Check for already-seen tag.
162 The string-pointer is on the '=' for entry. Update it past the
163 content (to the ;) on return;
167 arc_insert_tagvalue(arc_line * al, unsigned loff, uschar ** ss)
171 blob * b = (blob *)(US al + loff);
174 /* [FWS] tag-value [FWS] */
176 if (b->data) return US"fail";
177 s = skip_fws(s); /* FWS */
180 while ((c = *s) && c != ';') { len++; s++; }
182 while (len && ((c = s[-1]) == ' ' || c == '\t' || c == '\n' || c == '\r'))
183 { s--; len--; } /* FWS */
189 /* Inspect a header line, noting known tag fields.
190 Check for duplicates. */
193 arc_parse_line(arc_line * al, header_line * h, unsigned off, BOOL instance_only)
195 uschar * s = h->text + off;
196 uschar * r = NULL; /* compiler-quietening */
203 al->rawsig_no_b_val.data = store_get(h->slen + 1, GET_TAINTED);
204 memcpy(al->rawsig_no_b_val.data, h->text, off); /* copy the header name blind */
205 r = al->rawsig_no_b_val.data + off;
206 al->rawsig_no_b_val.len = off;
209 /* tag-list = tag-spec *( ";" tag-spec ) [ ";" ] */
216 uschar * fieldstart = s;
217 uschar * bstart = NULL, * bend;
219 /* tag-spec = [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS] */
221 s = skip_fws(s); /* FWS */
223 /* debug_printf("%s: consider '%s'\n", __FUNCTION__, s); */
225 s = skip_fws(s); /* FWS */
228 if (!instance_only || tagchar == 'i') switch (tagchar)
230 case 'a': /* a= AMS algorithm */
232 if (*s != '=') return US"no 'a' value";
233 if (arc_insert_tagvalue(al, offsetof(arc_line, a), &s)) return US"a tag dup";
235 /* substructure: algo-hash (eg. rsa-sha256) */
237 t = al->a_algo.data = al->a.data;
239 if (!*t++ || ++i > al->a.len) return US"no '-' in 'a' value";
241 if (*t++ != '-') return US"no '-' in 'a' value";
243 al->a_hash.len = al->a.len - i - 1;
252 case '=': /* b= AMS signature */
253 if (al->b.data) return US"already b data";
256 /* The signature can have FWS inserted in the content;
257 make a stripped copy */
259 while ((c = *++s) && c != ';')
260 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
261 g = string_catn(g, s, 1);
262 if (!g) return US"no b= value";
263 al->b.data = string_from_gstring(g);
265 gstring_release_unused(g);
268 case 'h': /* bh= AMS body hash */
269 s = skip_fws(++s); /* FWS */
270 if (*s != '=') return US"no bh value";
271 if (al->bh.data) return US"already bh data";
273 /* The bodyhash can have FWS inserted in the content;
274 make a stripped copy */
276 while ((c = *++s) && c != ';')
277 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
278 g = string_catn(g, s, 1);
279 if (!g) return US"no bh= value";
280 al->bh.data = string_from_gstring(g);
282 gstring_release_unused(g);
292 case '=': /* c= AMS canonicalisation */
293 if (arc_insert_tagvalue(al, offsetof(arc_line, c), &s)) return US"c tag dup";
295 /* substructure: head/body (eg. relaxed/simple)) */
297 t = al->c_head.data = al->c.data;
299 if (!*t++ || ++i > al->a.len) break;
301 if (*t++ == '/') /* /body is optional */
304 al->c_body.len = al->c.len - i - 1;
308 al->c_body.data = US"simple";
312 case 'v': /* cv= AS validity */
313 if (*++s != '=') return US"cv tag val";
314 if (arc_insert_tagvalue(al, offsetof(arc_line, cv), &s)) return US"cv tag dup";
320 case 'd': /* d= AMS domain */
321 if (*s != '=') return US"d tag val";
322 if (arc_insert_tagvalue(al, offsetof(arc_line, d), &s)) return US"d tag dup";
324 case 'h': /* h= AMS headers */
325 if (*s != '=') return US"h tag val";
326 if (arc_insert_tagvalue(al, offsetof(arc_line, h), &s)) return US"h tag dup";
328 case 'i': /* i= ARC set instance */
329 if (*s != '=') return US"i tag val";
330 if (arc_insert_tagvalue(al, offsetof(arc_line, i), &s)) return US"i tag dup";
331 if (instance_only) goto done;
333 case 'l': /* l= bodylength */
334 if (*s != '=') return US"l tag val";
335 if (arc_insert_tagvalue(al, offsetof(arc_line, l), &s)) return US"l tag dup";
337 case 's': /* s= AMS selector */
338 if (*s != '=') return US"s tag val";
339 if (arc_insert_tagvalue(al, offsetof(arc_line, s), &s)) return US"s tag dup";
343 while ((c = *s) && c != ';') s++;
344 if (c) s++; /* ; after tag-spec */
346 /* for all but the b= tag, copy the field including FWS. For the b=,
347 drop the tag content. */
352 size_t n = bstart - fieldstart;
353 memcpy(r, fieldstart, n); /* FWS "b=" */
355 al->rawsig_no_b_val.len += n;
357 memcpy(r, bend, n); /* FWS ";" */
359 al->rawsig_no_b_val.len += n;
363 size_t n = s - fieldstart;
364 memcpy(r, fieldstart, n);
366 al->rawsig_no_b_val.len += n;
374 /* debug_printf("%s: finshed\n", __FUNCTION__); */
379 /* Insert one header line in the correct set of the chain,
380 adding instances as needed and checking for duplicate lines.
384 arc_insert_hdr(arc_ctx * ctx, header_line * h, unsigned off, unsigned hoff,
385 BOOL instance_only, arc_line ** alp_ret)
389 arc_line * al = store_get(sizeof(arc_line), GET_UNTAINTED), ** alp;
392 memset(al, 0, sizeof(arc_line));
394 if ((e = arc_parse_line(al, h, off, instance_only)))
396 DEBUG(D_acl) if (e) debug_printf("ARC: %s\n", e);
397 return US"line parse";
399 if (!(i = arc_instance_from_hdr(al))) return US"instance find";
400 if (i > 50) return US"overlarge instance number";
401 if (!(as = arc_find_set(ctx, i))) return US"set find";
402 if (*(alp = (arc_line **)(US as + hoff))) return US"dup hdr";
405 if (alp_ret) *alp_ret = al;
412 static const uschar *
413 arc_try_header(arc_ctx * ctx, header_line * h, BOOL instance_only)
417 /*debug_printf("consider hdr '%s'\n", h->text);*/
418 if (strncmpic(ARC_HDR_AAR, h->text, ARC_HDRLEN_AAR) == 0)
424 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
426 debug_printf("ARC: found AAR: %.*s\n", len, h->text);
428 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AAR, offsetof(arc_set, hdr_aar),
431 DEBUG(D_acl) debug_printf("inserting AAR: %s\n", e);
432 return US"inserting AAR";
435 else if (strncmpic(ARC_HDR_AMS, h->text, ARC_HDRLEN_AMS) == 0)
443 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
445 debug_printf("ARC: found AMS: %.*s\n", len, h->text);
447 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AMS, offsetof(arc_set, hdr_ams),
448 instance_only, &ams)))
450 DEBUG(D_acl) debug_printf("inserting AMS: %s\n", e);
451 return US"inserting AMS";
457 ams->c_head.data = US"simple"; ams->c_head.len = 6;
458 ams->c_body = ams->c_head;
461 else if (strncmpic(ARC_HDR_AS, h->text, ARC_HDRLEN_AS) == 0)
467 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
469 debug_printf("ARC: found AS: %.*s\n", len, h->text);
471 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AS, offsetof(arc_set, hdr_as),
472 instance_only, NULL)))
474 DEBUG(D_acl) debug_printf("inserting AS: %s\n", e);
475 return US"inserting AS";
483 /* Gather the chain of arc sets from the headers.
484 Check for duplicates while that is done. Also build the
485 reverse-order headers list;
487 Return: ARC state if determined, eg. by lack of any ARC chain.
490 static const uschar *
491 arc_vfy_collect_hdrs(arc_ctx * ctx)
494 hdr_rlist * r = NULL, * rprev = NULL;
497 DEBUG(D_acl) debug_printf("ARC: collecting arc sets\n");
498 for (h = header_list; h; h = h->next)
500 r = store_get(sizeof(hdr_rlist), GET_UNTAINTED);
506 if ((e = arc_try_header(ctx, h, FALSE)))
508 arc_state_reason = string_sprintf("collecting headers: %s", e);
514 if (!ctx->arcset_chain) return US"none";
520 arc_cv_match(arc_line * al, const uschar * s)
522 return Ustrncmp(s, al->cv.data, al->cv.len) == 0;
525 /******************************************************************************/
527 /* Return the hash of headers from the message that the AMS claims it
532 arc_get_verify_hhash(arc_ctx * ctx, arc_line * ams, blob * hhash)
534 const uschar * headernames = string_copyn(ams->h.data, ams->h.len);
538 BOOL relaxed = Ustrncmp(US"relaxed", ams->c_head.data, ams->c_head.len) == 0;
539 int hashtype = pdkim_hashname_to_hashtype(
540 ams->a_hash.data, ams->a_hash.len);
546 || !exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
549 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
553 /* For each headername in the list from the AMS (walking in order)
554 walk the message headers in reverse order, adding to the hash any
555 found for the first time. For that last point, maintain used-marks
556 on the list of message headers. */
558 DEBUG(D_acl) debug_printf("ARC: AMS header data for verification:\n");
560 for (r = headers_rlist; r; r = r->prev)
562 while ((hn = string_nextinlist(&headernames, &sep, NULL, 0)))
563 for (r = headers_rlist; r; r = r->prev)
565 && strncasecmp(CCS (s = r->h->text), CCS hn, Ustrlen(hn)) == 0
568 if (relaxed) s = pdkim_relax_header_n(s, r->h->slen, TRUE);
571 DEBUG(D_acl) pdkim_quoteprint(s, len);
572 exim_sha_update_string(&hhash_ctx, s);
577 /* Finally add in the signature header (with the b= tag stripped); no CRLF */
579 s = ams->rawsig_no_b_val.data, len = ams->rawsig_no_b_val.len;
581 len = Ustrlen(s = pdkim_relax_header_n(s, len, FALSE));
582 DEBUG(D_acl) pdkim_quoteprint(s, len);
583 exim_sha_update(&hhash_ctx, s, len);
585 exim_sha_finish(&hhash_ctx, hhash);
587 { debug_printf("ARC: header hash: "); pdkim_hexprint(hhash->data, hhash->len); }
594 static pdkim_pubkey *
595 arc_line_to_pubkey(arc_line * al)
600 if (!(dns_txt = dkim_exim_query_dns_txt(string_sprintf("%.*s._domainkey.%.*s",
601 (int)al->s.len, al->s.data, (int)al->d.len, al->d.data))))
603 DEBUG(D_acl) debug_printf("pubkey dns lookup fail\n");
607 if ( !(p = pdkim_parse_pubkey_record(dns_txt))
608 || (Ustrcmp(p->srvtype, "*") != 0 && Ustrcmp(p->srvtype, "email") != 0)
611 DEBUG(D_acl) debug_printf("pubkey dns lookup format error\n");
615 /* If the pubkey limits use to specified hashes, reject unusable
616 signatures. XXX should we have looked for multiple dns records? */
620 const uschar * list = p->hashes, * ele;
623 while ((ele = string_nextinlist(&list, &sep, NULL, 0)))
624 if (Ustrncmp(ele, al->a_hash.data, al->a_hash.len) == 0) break;
627 DEBUG(D_acl) debug_printf("pubkey h=%s vs sig a=%.*s\n",
628 p->hashes, (int)al->a.len, al->a.data);
638 static pdkim_bodyhash *
639 arc_ams_setup_vfy_bodyhash(arc_line * ams)
641 int canon_head = -1, canon_body = -1;
644 if (!ams->c.data) ams->c.data = US"simple"; /* RFC 6376 (DKIM) default */
645 pdkim_cstring_to_canons(ams->c.data, ams->c.len, &canon_head, &canon_body);
646 bodylen = ams->l.data
647 ? strtol(CS string_copyn(ams->l.data, ams->l.len), NULL, 10) : -1;
649 return pdkim_set_bodyhash(dkim_verify_ctx,
650 pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len),
657 /* Verify an AMS. This is a DKIM-sig header, but with an ARC i= tag
658 and without a DKIM v= tag.
661 static const uschar *
662 arc_ams_verify(arc_ctx * ctx, arc_set * as)
664 arc_line * ams = as->hdr_ams;
671 const uschar * errstr;
673 as->ams_verify_done = US"in-progress";
675 /* Check the AMS has all the required tags:
679 "d=" domain (for key lookup)
680 "h=" headers (included in signature)
681 "s=" key-selector (for key lookup)
683 if ( !ams->a.data || !ams->b.data || !ams->bh.data || !ams->d.data
684 || !ams->h.data || !ams->s.data)
686 as->ams_verify_done = arc_state_reason = US"required tag missing";
691 /* The bodyhash should have been created earlier, and the dkim code should
692 have managed calculating it during message input. Find the reference to it. */
694 if (!(b = arc_ams_setup_vfy_bodyhash(ams)))
696 as->ams_verify_done = arc_state_reason = US"internal hash setup error";
702 debug_printf("ARC i=%d AMS Body bytes hashed: %lu\n"
703 " Body %.*s computed: ",
704 as->instance, b->signed_body_bytes,
705 (int)ams->a_hash.len, ams->a_hash.data);
706 pdkim_hexprint(CUS b->bh.data, b->bh.len);
709 /* We know the bh-tag blob is of a nul-term string, so safe as a string */
712 || (pdkim_decode_base64(ams->bh.data, &sighash), sighash.len != b->bh.len)
713 || memcmp(sighash.data, b->bh.data, b->bh.len) != 0
718 debug_printf("ARC i=%d AMS Body hash from headers: ", as->instance);
719 pdkim_hexprint(sighash.data, sighash.len);
720 debug_printf("ARC i=%d AMS Body hash did NOT match\n", as->instance);
722 return as->ams_verify_done = arc_state_reason = US"AMS body hash miscompare";
725 DEBUG(D_acl) debug_printf("ARC i=%d AMS Body hash compared OK\n", as->instance);
727 /* Get the public key from DNS */
729 if (!(p = arc_line_to_pubkey(ams)))
730 return as->ams_verify_done = arc_state_reason = US"pubkey problem";
732 /* We know the b-tag blob is of a nul-term string, so safe as a string */
733 pdkim_decode_base64(ams->b.data, &sighash);
735 arc_get_verify_hhash(ctx, ams, &hhash);
737 /* Setup the interface to the signing library */
739 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx, NULL)))
741 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
742 as->ams_verify_done = arc_state_reason = US"internal sigverify init error";
746 hashtype = pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len);
749 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify bad a_hash\n", as->instance);
750 return as->ams_verify_done = arc_state_reason = US"AMS sig nonverify";
753 if ((errstr = exim_dkim_verify(&vctx,
754 pdkim_hashes[hashtype].exim_hashmethod, &hhash, &sighash)))
756 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify %s\n", as->instance, errstr);
757 return as->ams_verify_done = arc_state_reason = US"AMS sig nonverify";
760 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify pass\n", as->instance);
761 as->ams_verify_passed = TRUE;
767 /* Check the sets are instance-continuous and that all
768 members are present. Check that no arc_seals are "fail".
769 Set the highest instance number global.
770 Verify the latest AMS.
773 arc_headers_check(arc_ctx * ctx)
777 BOOL ams_fail_found = FALSE;
779 if (!(as = ctx->arcset_chain_last))
782 for(inst = as->instance; as; as = as->prev, inst--)
784 if (as->instance != inst)
785 arc_state_reason = string_sprintf("i=%d (sequence; expected %d)",
787 else if (!as->hdr_aar || !as->hdr_ams || !as->hdr_as)
788 arc_state_reason = string_sprintf("i=%d (missing header)", as->instance);
789 else if (arc_cv_match(as->hdr_as, US"fail"))
790 arc_state_reason = string_sprintf("i=%d (cv)", as->instance);
794 DEBUG(D_acl) debug_printf("ARC chain fail at %s\n", arc_state_reason);
798 /* Evaluate the oldest-pass AMS validation while we're here.
799 It does not affect the AS chain validation but is reported as
803 if (arc_ams_verify(ctx, as))
804 ams_fail_found = TRUE;
806 arc_oldest_pass = inst;
807 arc_state_reason = NULL;
811 arc_state_reason = string_sprintf("(sequence; expected i=%d)", inst);
812 DEBUG(D_acl) debug_printf("ARC chain fail %s\n", arc_state_reason);
816 arc_received = ctx->arcset_chain_last;
817 arc_received_instance = arc_received->instance;
819 /* We can skip the latest-AMS validation, if we already did it. */
821 as = ctx->arcset_chain_last;
822 if (!as->ams_verify_passed)
824 if (as->ams_verify_done)
826 arc_state_reason = as->ams_verify_done;
829 if (!!arc_ams_verify(ctx, as))
836 /******************************************************************************/
837 static const uschar *
838 arc_seal_verify(arc_ctx * ctx, arc_set * as)
840 arc_line * hdr_as = as->hdr_as;
848 const uschar * errstr;
850 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d\n", as->instance);
852 1. If the value of the "cv" tag on that seal is "fail", the
853 chain state is "fail" and the algorithm stops here. (This
854 step SHOULD be skipped if the earlier step (2.1) was
857 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
858 == "none" && i != 1)) then the chain state is "fail" and the
859 algorithm stops here (note that the ordering of the logic is
860 structured for short-circuit evaluation).
863 if ( as->instance == 1 && !arc_cv_match(hdr_as, US"none")
864 || arc_cv_match(hdr_as, US"none") && as->instance != 1
867 arc_state_reason = US"seal cv state";
872 3. Initialize a hash function corresponding to the "a" tag of
876 hashtype = pdkim_hashname_to_hashtype(hdr_as->a_hash.data, hdr_as->a_hash.len);
879 || !exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
882 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
883 arc_state_reason = US"seal hash setup error";
888 4. Compute the canonicalized form of the ARC header fields, in
889 the order described in Section 5.4.2, using the "relaxed"
890 header canonicalization defined in Section 3.4.2 of
891 [RFC6376]. Pass the canonicalized result to the hash
894 Headers are CRLF-separated, but the last one is not crlf-terminated.
897 DEBUG(D_acl) debug_printf("ARC: AS header data for verification:\n");
898 for (as2 = ctx->arcset_chain;
899 as2 && as2->instance <= as->instance;
907 if (!(s = al->relaxed))
908 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
909 al->complete->slen, TRUE);
911 DEBUG(D_acl) pdkim_quoteprint(s, len);
912 exim_sha_update(&hhash_ctx, s, len);
915 if (!(s = al->relaxed))
916 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
917 al->complete->slen, TRUE);
919 DEBUG(D_acl) pdkim_quoteprint(s, len);
920 exim_sha_update(&hhash_ctx, s, len);
923 if (as2->instance == as->instance)
924 s = pdkim_relax_header_n(al->rawsig_no_b_val.data,
925 al->rawsig_no_b_val.len, FALSE);
926 else if (!(s = al->relaxed))
927 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
928 al->complete->slen, TRUE);
930 DEBUG(D_acl) pdkim_quoteprint(s, len);
931 exim_sha_update(&hhash_ctx, s, len);
935 5. Retrieve the final digest from the hash function.
938 exim_sha_finish(&hhash_ctx, &hhash_computed);
941 debug_printf("ARC i=%d AS Header %.*s computed: ",
942 as->instance, (int)hdr_as->a_hash.len, hdr_as->a_hash.data);
943 pdkim_hexprint(hhash_computed.data, hhash_computed.len);
948 6. Retrieve the public key identified by the "s" and "d" tags in
949 the ARC-Seal, as described in Section 4.1.6.
952 if (!(p = arc_line_to_pubkey(hdr_as)))
953 return US"pubkey problem";
956 7. Determine whether the signature portion ("b" tag) of the ARC-
957 Seal and the digest computed above are valid according to the
958 public key. (See also Section Section 8.4 for failure case
961 8. If the signature is not valid, the chain state is "fail" and
962 the algorithm stops here.
965 /* We know the b-tag blob is of a nul-term string, so safe as a string */
966 pdkim_decode_base64(hdr_as->b.data, &sighash);
968 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx, NULL)))
970 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
974 if ((errstr = exim_dkim_verify(&vctx,
975 pdkim_hashes[hashtype].exim_hashmethod,
976 &hhash_computed, &sighash)))
979 debug_printf("ARC i=%d AS headers verify: %s\n", as->instance, errstr);
980 arc_state_reason = US"seal sigverify error";
984 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d pass\n", as->instance);
989 static const uschar *
990 arc_verify_seals(arc_ctx * ctx)
992 arc_set * as = ctx->arcset_chain_last;
997 for ( ; as; as = as->prev) if (arc_seal_verify(ctx, as)) return US"fail";
999 DEBUG(D_acl) debug_printf("ARC: AS vfy overall pass\n");
1002 /******************************************************************************/
1004 /* Do ARC verification. Called from DATA ACL, on a verify = arc
1005 condition. No arguments; we are checking globals.
1007 Return: The ARC state, or NULL on error.
1011 acl_verify_arc(void)
1015 memset(&arc_verify_ctx, 0, sizeof(arc_verify_ctx));
1017 if (!dkim_verify_ctx)
1019 DEBUG(D_acl) debug_printf("ARC: no DKIM verify context\n");
1023 /* AS evaluation, per
1024 https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-10#section-6
1026 /* 1. Collect all ARC sets currently on the message. If there were
1027 none, the ARC state is "none" and the algorithm stops here.
1030 if ((res = arc_vfy_collect_hdrs(&arc_verify_ctx)))
1033 /* 2. If the form of any ARC set is invalid (e.g., does not contain
1034 exactly one of each of the three ARC-specific header fields),
1035 then the chain state is "fail" and the algorithm stops here.
1037 1. To avoid the overhead of unnecessary computation and delay
1038 from crypto and DNS operations, the cv value for all ARC-
1039 Seal(s) MAY be checked at this point. If any of the values
1040 are "fail", then the overall state of the chain is "fail" and
1041 the algorithm stops here.
1043 3. Conduct verification of the ARC-Message-Signature header field
1044 bearing the highest instance number. If this verification fails,
1045 then the chain state is "fail" and the algorithm stops here.
1048 if ((res = arc_headers_check(&arc_verify_ctx)))
1051 /* 4. For each ARC-Seal from the "N"th instance to the first, apply the
1054 1. If the value of the "cv" tag on that seal is "fail", the
1055 chain state is "fail" and the algorithm stops here. (This
1056 step SHOULD be skipped if the earlier step (2.1) was
1059 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
1060 == "none" && i != 1)) then the chain state is "fail" and the
1061 algorithm stops here (note that the ordering of the logic is
1062 structured for short-circuit evaluation).
1064 3. Initialize a hash function corresponding to the "a" tag of
1067 4. Compute the canonicalized form of the ARC header fields, in
1068 the order described in Section 5.4.2, using the "relaxed"
1069 header canonicalization defined in Section 3.4.2 of
1070 [RFC6376]. Pass the canonicalized result to the hash
1073 5. Retrieve the final digest from the hash function.
1075 6. Retrieve the public key identified by the "s" and "d" tags in
1076 the ARC-Seal, as described in Section 4.1.6.
1078 7. Determine whether the signature portion ("b" tag) of the ARC-
1079 Seal and the digest computed above are valid according to the
1080 public key. (See also Section Section 8.4 for failure case
1083 8. If the signature is not valid, the chain state is "fail" and
1084 the algorithm stops here.
1086 5. If all seals pass validation, then the chain state is "pass", and
1087 the algorithm is complete.
1090 if ((res = arc_verify_seals(&arc_verify_ctx)))
1099 /******************************************************************************/
1101 /* Prepend the header to the rlist */
1104 arc_rlist_entry(hdr_rlist * list, const uschar * s, int len)
1106 hdr_rlist * r = store_get(sizeof(hdr_rlist) + sizeof(header_line), GET_UNTAINTED);
1107 header_line * h = r->h = (header_line *)(r+1);
1120 /* Walk the given headers strings identifying each header, and construct
1121 a reverse-order list.
1125 arc_sign_scan_headers(arc_ctx * ctx, gstring * sigheaders)
1128 hdr_rlist * rheaders = NULL;
1130 s = sigheaders ? sigheaders->s : NULL;
1133 const uschar * s2 = s;
1135 /* This works for either NL or CRLF lines; also nul-termination */
1137 if (*s2 == '\n' && s2[1] != '\t' && s2[1] != ' ') break;
1138 s2++; /* move past end of line */
1140 rheaders = arc_rlist_entry(rheaders, s, s2 - s);
1148 /* Return the A-R content, without identity, with line-ending and
1152 arc_sign_find_ar(header_line * headers, const uschar * identity, blob * ret)
1155 int ilen = Ustrlen(identity);
1158 for(h = headers; h; h = h->next)
1160 uschar * s = h->text, c;
1163 if (Ustrncmp(s, HDR_AR, HDRLEN_AR) != 0) continue;
1164 s += HDRLEN_AR, len -= HDRLEN_AR; /* header name */
1166 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1167 s++, len--; /* FWS */
1168 if (Ustrncmp(s, identity, ilen) != 0) continue;
1169 s += ilen; len -= ilen; /* identity */
1170 if (len <= 0) continue;
1171 if ((c = *s) && c == ';') s++, len--; /* identity terminator */
1173 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1174 s++, len--; /* FWS */
1175 if (len <= 0) continue;
1185 /* Append a constructed AAR including CRLF. Add it to the arc_ctx too. */
1188 arc_sign_append_aar(gstring * g, arc_ctx * ctx,
1189 const uschar * identity, int instance, blob * ar)
1191 int aar_off = gstring_length(g);
1193 store_get(sizeof(arc_set) + sizeof(arc_line) + sizeof(header_line), GET_UNTAINTED);
1194 arc_line * al = (arc_line *)(as+1);
1195 header_line * h = (header_line *)(al+1);
1197 g = string_catn(g, ARC_HDR_AAR, ARC_HDRLEN_AAR);
1198 g = string_fmt_append(g, " i=%d; %s;\r\n\t", instance, identity);
1199 g = string_catn(g, US ar->data, ar->len);
1201 h->slen = g->ptr - aar_off;
1202 h->text = g->s + aar_off;
1205 as->prev = ctx->arcset_chain_last;
1206 as->instance = instance;
1209 ctx->arcset_chain = as;
1211 ctx->arcset_chain_last->next = as;
1212 ctx->arcset_chain_last = as;
1214 DEBUG(D_transport) debug_printf("ARC: AAR '%.*s'\n", h->slen - 2, h->text);
1221 arc_sig_from_pseudoheader(gstring * hdata, int hashtype, const uschar * privkey,
1222 blob * sig, const uschar * why)
1224 hashmethod hm = /*sig->keytype == KEYTYPE_ED25519*/ FALSE
1225 ? HASH_SHA2_512 : pdkim_hashes[hashtype].exim_hashmethod;
1228 const uschar * errstr;
1233 debug_printf("ARC: %s header data for signing:\n", why);
1234 pdkim_quoteprint(hdata->s, hdata->ptr);
1236 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1237 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1238 exim_sha_finish(&hhash_ctx, &hhash);
1239 debug_printf("ARC: header hash: "); pdkim_hexprint(hhash.data, hhash.len);
1242 if (FALSE /*need hash for Ed25519 or GCrypt signing*/ )
1245 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1246 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1247 exim_sha_finish(&hhash_ctx, &hhash);
1251 hhash.data = hdata->s;
1252 hhash.len = hdata->ptr;
1255 if ( (errstr = exim_dkim_signing_init(privkey, &sctx))
1256 || (errstr = exim_dkim_sign(&sctx, hm, &hhash, sig)))
1258 log_write(0, LOG_MAIN, "ARC: %s signing: %s\n", why, errstr);
1260 debug_printf("private key, or private-key file content, was: '%s'\n",
1270 arc_sign_append_sig(gstring * g, blob * sig)
1272 /*debug_printf("%s: raw sig ", __FUNCTION__); pdkim_hexprint(sig->data, sig->len);*/
1273 sig->data = pdkim_encode_base64(sig);
1274 sig->len = Ustrlen(sig->data);
1277 int len = MIN(sig->len, 74);
1278 g = string_catn(g, sig->data, len);
1279 if ((sig->len -= len) == 0) break;
1281 g = string_catn(g, US"\r\n\t ", 5);
1283 g = string_catn(g, US";\r\n", 3);
1284 gstring_release_unused(g);
1285 string_from_gstring(g);
1290 /* Append a constructed AMS including CRLF. Add it to the arc_ctx too. */
1293 arc_sign_append_ams(gstring * g, arc_ctx * ctx, int instance,
1294 const uschar * identity, const uschar * selector, blob * bodyhash,
1295 hdr_rlist * rheaders, const uschar * privkey, unsigned options)
1298 gstring * hdata = NULL;
1300 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1303 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line), GET_UNTAINTED);
1304 header_line * h = (header_line *)(al+1);
1306 /* debug_printf("%s\n", __FUNCTION__); */
1308 /* Construct the to-be-signed AMS pseudo-header: everything but the sig. */
1311 g = string_fmt_append(g, "%s i=%d; a=rsa-sha256; c=relaxed; d=%s; s=%s",
1312 ARC_HDR_AMS, instance, identity, selector); /*XXX hardwired a= */
1313 if (options & ARC_SIGN_OPT_TSTAMP)
1314 g = string_fmt_append(g, "; t=%lu", (u_long)now);
1315 if (options & ARC_SIGN_OPT_EXPIRE)
1316 g = string_fmt_append(g, "; x=%lu", (u_long)expire);
1317 g = string_fmt_append(g, ";\r\n\tbh=%s;\r\n\th=",
1318 pdkim_encode_base64(bodyhash));
1320 for(col = 3; rheaders; rheaders = rheaders->prev)
1322 const uschar * hnames = US"DKIM-Signature:" PDKIM_DEFAULT_SIGN_HEADERS;
1323 uschar * name, * htext = rheaders->h->text;
1326 /* Spot headers of interest */
1328 while ((name = string_nextinlist(&hnames, &sep, NULL, 0)))
1330 int len = Ustrlen(name);
1331 if (strncasecmp(CCS htext, CCS name, len) == 0)
1333 /* If too long, fold line in h= field */
1335 if (col + len > 78) g = string_catn(g, US"\r\n\t ", 5), col = 3;
1337 /* Add name to h= list */
1339 g = string_catn(g, name, len);
1340 g = string_catn(g, US":", 1);
1343 /* Accumulate header for hashing/signing */
1345 hdata = string_cat(hdata,
1346 pdkim_relax_header_n(htext, rheaders->h->slen, TRUE)); /*XXX hardwired */
1352 /* Lose the last colon from the h= list */
1354 if (g->s[g->ptr - 1] == ':') g->ptr--;
1356 g = string_catn(g, US";\r\n\tb=;", 7);
1358 /* Include the pseudo-header in the accumulation */
1360 s = pdkim_relax_header_n(g->s + ams_off, g->ptr - ams_off, FALSE);
1361 hdata = string_cat(hdata, s);
1363 /* Calculate the signature from the accumulation */
1364 /*XXX does that need further relaxation? there are spaces embedded in the b= strings! */
1366 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AMS"))
1369 /* Lose the trailing semicolon from the psuedo-header, and append the signature
1370 (folded over lines) and termination to complete it. */
1373 g = arc_sign_append_sig(g, &sig);
1375 h->slen = g->ptr - ams_off;
1376 h->text = g->s + ams_off;
1378 ctx->arcset_chain_last->hdr_ams = al;
1380 DEBUG(D_transport) debug_printf("ARC: AMS '%.*s'\n", h->slen - 2, h->text);
1386 /* Look for an arc= result in an A-R header blob. We know that its data
1387 happens to be a NUL-term string. */
1390 arc_ar_cv_status(blob * ar)
1392 const uschar * resinfo = ar->data;
1394 uschar * methodspec, * s;
1396 while ((methodspec = string_nextinlist(&resinfo, &sep, NULL, 0)))
1397 if (Ustrncmp(methodspec, US"arc=", 4) == 0)
1400 for (s = methodspec += 4;
1401 (c = *s) && c != ';' && c != ' ' && c != '\r' && c != '\n'; ) s++;
1402 return string_copyn(methodspec, s - methodspec);
1409 /* Build the AS header and prepend it */
1412 arc_sign_prepend_as(gstring * arcset_interim, arc_ctx * ctx,
1413 int instance, const uschar * identity, const uschar * selector, blob * ar,
1414 const uschar * privkey, unsigned options)
1417 uschar * status = arc_ar_cv_status(ar);
1418 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line), GET_UNTAINTED);
1419 header_line * h = (header_line *)(al+1);
1420 uschar * badline_str;
1422 gstring * hdata = NULL;
1423 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1429 - no h= tag; implicit coverage
1430 - arc status from A-R
1432 - coverage is just the new ARC set
1433 including self (but with an empty b= in self)
1435 - all ARC set headers, set-number order, aar then ams then as,
1436 including self (but with an empty b= in self)
1438 DEBUG(D_transport) debug_printf("ARC: building AS for status '%s'\n", status);
1440 /* Construct the AS except for the signature */
1442 arcset = string_append(NULL, 9,
1444 US" i=", string_sprintf("%d", instance),
1446 US"; a=rsa-sha256; d=", identity, /*XXX hardwired */
1447 US"; s=", selector); /*XXX same as AMS */
1448 if (options & ARC_SIGN_OPT_TSTAMP)
1449 arcset = string_append(arcset, 2,
1450 US"; t=", string_sprintf("%lu", (u_long)now));
1451 arcset = string_cat(arcset,
1454 h->slen = arcset->ptr;
1455 h->text = arcset->s;
1457 ctx->arcset_chain_last->hdr_as = al;
1459 /* For any but "fail" chain-verify status, walk the entire chain in order by
1460 instance. For fail, only the new arc-set. Accumulate the elements walked. */
1462 for (arc_set * as = Ustrcmp(status, US"fail") == 0
1463 ? ctx->arcset_chain_last : ctx->arcset_chain;
1467 /* Accumulate AAR then AMS then AS. Relaxed canonicalisation
1468 is required per standard. */
1470 badline_str = US"aar";
1471 if (!(l = as->hdr_aar)) goto badline;
1473 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1474 badline_str = US"ams";
1475 if (!(l = as->hdr_ams)) goto badline;
1477 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1478 badline_str = US"as";
1479 if (!(l = as->hdr_as)) goto badline;
1481 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, !!as->next));
1484 /* Calculate the signature from the accumulation */
1486 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AS"))
1489 /* Lose the trailing semicolon */
1491 arcset = arc_sign_append_sig(arcset, &sig);
1492 DEBUG(D_transport) debug_printf("ARC: AS '%.*s'\n", arcset->ptr - 2, arcset->s);
1494 /* Finally, append the AMS and AAR to the new AS */
1496 return string_catn(arcset, arcset_interim->s, arcset_interim->ptr);
1500 debug_printf("ARC: while building AS, missing %s in chain\n", badline_str);
1505 /**************************************/
1507 /* Return pointer to pdkim_bodyhash for given hash method, creating new
1512 arc_ams_setup_sign_bodyhash(void)
1514 int canon_head, canon_body;
1516 DEBUG(D_transport) debug_printf("ARC: requesting bodyhash\n");
1517 pdkim_cstring_to_canons(US"relaxed", 7, &canon_head, &canon_body); /*XXX hardwired */
1518 return pdkim_set_bodyhash(&dkim_sign_ctx,
1519 pdkim_hashname_to_hashtype(US"sha256", 6), /*XXX hardwired */
1529 memset(&arc_sign_ctx, 0, sizeof(arc_sign_ctx));
1530 headers_rlist = NULL;
1535 /* A "normal" header line, identified by DKIM processing. These arrive before
1536 the call to arc_sign(), which carries any newly-created DKIM headers - and
1537 those go textually before the normal ones in the message.
1539 We have to take the feed from DKIM as, in the transport-filter case, the
1540 headers are not in memory at the time of the call to arc_sign().
1542 Take a copy of the header and construct a reverse-order list.
1543 Also parse ARC-chain headers and build the chain struct, retaining pointers
1547 static const uschar *
1548 arc_header_sign_feed(gstring * g)
1550 uschar * s = string_copyn(g->s, g->ptr);
1551 headers_rlist = arc_rlist_entry(headers_rlist, s, g->ptr);
1552 return arc_try_header(&arc_sign_ctx, headers_rlist->h, TRUE);
1557 /* Per RFCs 6376, 7489 the only allowed chars in either an ADMD id
1558 or a selector are ALPHA/DIGGIT/'-'/'.'
1560 Check, to help catch misconfigurations such as a missing selector
1561 element in the arc_sign list.
1565 arc_valid_id(const uschar * s)
1567 for (uschar c; c = *s++; )
1568 if (!isalnum(c) && c != '-' && c != '.') return FALSE;
1574 /* ARC signing. Called from the smtp transport, if the arc_sign option is set.
1575 The dkim_exim_sign() function has already been called, so will have hashed the
1576 message body for us so long as we requested a hash previously.
1579 signspec Three-element colon-sep list: identity, selector, privkey.
1580 Optional fourth element: comma-sep list of options.
1582 sigheaders Any signature headers already generated, eg. by DKIM, or NULL
1586 Set of headers to prepend to the message, including the supplied sigheaders
1587 but not the plainheaders.
1591 arc_sign(const uschar * signspec, gstring * sigheaders, uschar ** errstr)
1593 const uschar * identity, * selector, * privkey, * opts, * s;
1594 unsigned options = 0;
1596 header_line * headers;
1597 hdr_rlist * rheaders;
1605 /* Parse the signing specification */
1607 if (!(identity = string_nextinlist(&signspec, &sep, NULL, 0)) || !*identity)
1608 { s = US"identity"; goto bad_arg_ret; }
1609 if (!(selector = string_nextinlist(&signspec, &sep, NULL, 0)) || !*selector)
1610 { s = US"selector"; goto bad_arg_ret; }
1611 if (!(privkey = string_nextinlist(&signspec, &sep, NULL, 0)) || !*privkey)
1612 { s = US"privkey"; goto bad_arg_ret; }
1613 if (!arc_valid_id(identity))
1614 { s = US"identity"; goto bad_arg_ret; }
1615 if (!arc_valid_id(selector))
1616 { s = US"selector"; goto bad_arg_ret; }
1617 if (*privkey == '/' && !(privkey = expand_file_big_buffer(privkey)))
1618 goto ret_sigheaders;
1620 if ((opts = string_nextinlist(&signspec, &sep, NULL, 0)))
1623 while ((s = string_nextinlist(&opts, &osep, NULL, 0)))
1624 if (Ustrcmp(s, "timestamps") == 0)
1626 options |= ARC_SIGN_OPT_TSTAMP;
1627 if (!now) now = time(NULL);
1629 else if (Ustrncmp(s, "expire", 6) == 0)
1631 options |= ARC_SIGN_OPT_EXPIRE;
1632 if (*(s += 6) == '=')
1635 if (!(expire = (time_t)atoi(CS ++s)))
1636 expire = ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1637 if (!now) now = time(NULL);
1641 expire = (time_t)atol(CS s);
1644 if (!now) now = time(NULL);
1645 expire = now + ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1650 DEBUG(D_transport) debug_printf("ARC: sign for %s\n", identity);
1652 /* Make an rlist of any new DKIM headers, then add the "normals" rlist to it.
1653 Then scan the list for an A-R header. */
1655 string_from_gstring(sigheaders);
1656 if ((rheaders = arc_sign_scan_headers(&arc_sign_ctx, sigheaders)))
1659 for (rp = &headers_rlist; *rp; ) rp = &(*rp)->prev;
1663 /* Finally, build a normal-order headers list */
1664 /*XXX only needed for hunt-the-AR? */
1665 /*XXX also, we really should be accepting any number of ADMD-matching ARs */
1667 header_line * hnext = NULL;
1668 for (rheaders = headers_rlist; rheaders;
1669 hnext = rheaders->h, rheaders = rheaders->prev)
1670 rheaders->h->next = hnext;
1674 if (!(arc_sign_find_ar(headers, identity, &ar)))
1676 log_write(0, LOG_MAIN, "ARC: no Authentication-Results header for signing");
1677 goto ret_sigheaders;
1680 /* We previously built the data-struct for the existing ARC chain, if any, using a headers
1681 feed from the DKIM module. Use that to give the instance number for the ARC set we are
1685 if (arc_sign_ctx.arcset_chain_last)
1686 debug_printf("ARC: existing chain highest instance: %d\n",
1687 arc_sign_ctx.arcset_chain_last->instance);
1689 debug_printf("ARC: no existing chain\n");
1691 instance = arc_sign_ctx.arcset_chain_last ? arc_sign_ctx.arcset_chain_last->instance + 1 : 1;
1695 - copy the A-R; prepend i= & identity
1698 g = arc_sign_append_aar(g, &arc_sign_ctx, identity, instance, &ar);
1702 - Looks fairly like a DKIM sig
1703 - Cover all DKIM sig headers as well as the usuals
1706 - we must have requested a suitable bodyhash previously
1709 b = arc_ams_setup_sign_bodyhash();
1710 g = arc_sign_append_ams(g, &arc_sign_ctx, instance, identity, selector,
1711 &b->bh, headers_rlist, privkey, options);
1716 - no h= tag; implicit coverage
1717 - arc status from A-R
1719 - coverage is just the new ARC set
1720 including self (but with an empty b= in self)
1722 - all ARC set headers, set-number order, aar then ams then as,
1723 including self (but with an empty b= in self)
1727 g = arc_sign_prepend_as(g, &arc_sign_ctx, instance, identity, selector, &ar,
1730 /* Finally, append the dkim headers and return the lot. */
1732 if (sigheaders) g = string_catn(g, sigheaders->s, sigheaders->ptr);
1735 if (!g) return string_get(1);
1736 (void) string_from_gstring(g);
1737 gstring_release_unused(g);
1742 log_write(0, LOG_MAIN, "ARC: bad signing-specification (%s)", s);
1749 /******************************************************************************/
1751 /* Check to see if the line is an AMS and if so, set up to validate it.
1752 Called from the DKIM input processing. This must be done now as the message
1753 body data is hashed during input.
1755 We call the DKIM code to request a body-hash; it has the facility already
1756 and the hash parameters might be common with other requests.
1759 static const uschar *
1760 arc_header_vfy_feed(gstring * g)
1767 if (!dkim_verify_ctx) return US"no dkim context";
1769 if (strncmpic(ARC_HDR_AMS, g->s, ARC_HDRLEN_AMS) != 0) return US"not AMS";
1771 DEBUG(D_receive) debug_printf("ARC: spotted AMS header\n");
1772 /* Parse the AMS header */
1777 memset(&al, 0, sizeof(arc_line));
1778 if ((errstr = arc_parse_line(&al, &h, ARC_HDRLEN_AMS, FALSE)))
1780 DEBUG(D_acl) if (errstr) debug_printf("ARC: %s\n", errstr);
1784 if (!al.a_hash.data)
1786 DEBUG(D_acl) debug_printf("ARC: no a_hash from '%.*s'\n", h.slen, h.text);
1793 al.c_body.data = US"simple"; al.c_body.len = 6;
1794 al.c_head = al.c_body;
1797 /* Ask the dkim code to calc a bodyhash with those specs */
1799 if (!(b = arc_ams_setup_vfy_bodyhash(&al)))
1800 return US"dkim hash setup fail";
1802 /* Discard the reference; search again at verify time, knowing that one
1803 should have been created here. */
1808 return US"line parsing error";
1813 /* A header line has been identified by DKIM processing.
1817 is_vfy TRUE for verify mode or FALSE for signing mode
1820 NULL for success, or an error string (probably unused)
1824 arc_header_feed(gstring * g, BOOL is_vfy)
1826 return is_vfy ? arc_header_vfy_feed(g) : arc_header_sign_feed(g);
1831 /******************************************************************************/
1833 /* Construct the list of domains from the ARC chain after validation */
1836 fn_arc_domains(void)
1842 for (as = arc_verify_ctx.arcset_chain, inst = 1; as; as = as->next, inst++)
1844 arc_line * hdr_as = as->hdr_as;
1847 blob * d = &hdr_as->d;
1849 for (; inst < as->instance; inst++)
1850 g = string_catn(g, US":", 1);
1852 g = d->data && d->len
1853 ? string_append_listele_n(g, ':', d->data, d->len)
1854 : string_catn(g, US":", 1);
1857 g = string_catn(g, US":", 1);
1859 return g ? g->s : US"";
1863 /* Construct an Authentication-Results header portion, for the ARC module */
1866 authres_arc(gstring * g)
1870 arc_line * highest_ams;
1871 int start = 0; /* Compiler quietening */
1872 DEBUG(D_acl) start = g->ptr;
1874 g = string_append(g, 2, US";\n\tarc=", arc_state);
1875 if (arc_received_instance > 0)
1877 g = string_fmt_append(g, " (i=%d)", arc_received_instance);
1878 if (arc_state_reason)
1879 g = string_append(g, 3, US"(", arc_state_reason, US")");
1880 g = string_catn(g, US" header.s=", 10);
1881 highest_ams = arc_received->hdr_ams;
1882 g = string_catn(g, highest_ams->s.data, highest_ams->s.len);
1884 g = string_fmt_append(g, " arc.oldest-pass=%d", arc_oldest_pass);
1886 if (sender_host_address)
1887 g = string_append(g, 2, US" smtp.remote-ip=", sender_host_address);
1889 else if (arc_state_reason)
1890 g = string_append(g, 3, US" (", arc_state_reason, US")");
1891 DEBUG(D_acl) debug_printf("ARC: authres '%.*s'\n",
1892 g->ptr - start - 3, g->s + start + 3);
1895 DEBUG(D_acl) debug_printf("ARC: no authres\n");
1900 # endif /* DISABLE_DKIM */
1901 #endif /* EXPERIMENTAL_ARC */