1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
4 /* Experimental ARC support for Exim
5 Copyright (c) Jeremy Harris 2018 - 2020
10 #if defined EXPERIMENTAL_ARC
11 # if defined DISABLE_DKIM
12 # error DKIM must also be enabled for ARC
15 # include "functions.h"
16 # include "pdkim/pdkim.h"
17 # include "pdkim/signing.h"
19 extern pdkim_ctx * dkim_verify_ctx;
20 extern pdkim_ctx dkim_sign_ctx;
22 #define ARC_SIGN_OPT_TSTAMP BIT(0)
23 #define ARC_SIGN_OPT_EXPIRE BIT(1)
25 #define ARC_SIGN_DEFAULT_EXPIRE_DELTA (60 * 60 * 24 * 30) /* one month */
27 /******************************************************************************/
29 typedef struct hdr_rlist {
30 struct hdr_rlist * prev;
35 typedef struct arc_line {
36 header_line * complete; /* including the header name; nul-term */
39 /* identified tag contents */
52 /* tag content sub-portions */
59 /* modified copy of b= field in line */
63 typedef struct arc_set {
64 struct arc_set * next;
65 struct arc_set * prev;
72 const uschar * ams_verify_done;
73 BOOL ams_verify_passed;
76 typedef struct arc_ctx {
77 arc_set * arcset_chain;
78 arc_set * arcset_chain_last;
81 #define ARC_HDR_AAR US"ARC-Authentication-Results:"
82 #define ARC_HDRLEN_AAR 27
83 #define ARC_HDR_AMS US"ARC-Message-Signature:"
84 #define ARC_HDRLEN_AMS 22
85 #define ARC_HDR_AS US"ARC-Seal:"
86 #define ARC_HDRLEN_AS 9
87 #define HDR_AR US"Authentication-Results:"
92 static hdr_rlist * headers_rlist;
93 static arc_ctx arc_sign_ctx = { NULL };
94 static arc_ctx arc_verify_ctx = { NULL };
97 /******************************************************************************/
100 /* Get the instance number from the header.
103 arc_instance_from_hdr(const arc_line * al)
105 const uschar * s = al->i.data;
106 if (!s || !al->i.len) return 0;
107 return (unsigned) atoi(CCS s);
115 while (c && (c == ' ' || c == '\t' || c == '\n' || c == '\r')) c = *++s;
120 /* Locate instance struct on chain, inserting a new one if
121 needed. The chain is in increasing-instance-number order
122 by the "next" link, and we have a "prev" link also.
126 arc_find_set(arc_ctx * ctx, unsigned i)
128 arc_set ** pas, * as, * next, * prev;
130 for (pas = &ctx->arcset_chain, prev = NULL, next = ctx->arcset_chain;
131 as = *pas; pas = &as->next)
133 if (as->instance > i) break;
134 if (as->instance == i)
136 DEBUG(D_acl) debug_printf("ARC: existing instance %u\n", i);
143 DEBUG(D_acl) debug_printf("ARC: new instance %u\n", i);
144 *pas = as = store_get(sizeof(arc_set), FALSE);
145 memset(as, 0, sizeof(arc_set));
152 ctx->arcset_chain_last = as;
158 /* Insert a tag content into the line structure.
159 Note this is a reference to existing data, not a copy.
160 Check for already-seen tag.
161 The string-pointer is on the '=' for entry. Update it past the
162 content (to the ;) on return;
166 arc_insert_tagvalue(arc_line * al, unsigned loff, uschar ** ss)
170 blob * b = (blob *)(US al + loff);
173 /* [FWS] tag-value [FWS] */
175 if (b->data) return US"fail";
176 s = skip_fws(s); /* FWS */
179 while ((c = *s) && c != ';') { len++; s++; }
181 while (len && ((c = s[-1]) == ' ' || c == '\t' || c == '\n' || c == '\r'))
182 { s--; len--; } /* FWS */
188 /* Inspect a header line, noting known tag fields.
189 Check for duplicates. */
192 arc_parse_line(arc_line * al, header_line * h, unsigned off, BOOL instance_only)
194 uschar * s = h->text + off;
195 uschar * r = NULL; /* compiler-quietening */
202 al->rawsig_no_b_val.data = store_get(h->slen + 1, TRUE); /* tainted */
203 memcpy(al->rawsig_no_b_val.data, h->text, off); /* copy the header name blind */
204 r = al->rawsig_no_b_val.data + off;
205 al->rawsig_no_b_val.len = off;
208 /* tag-list = tag-spec *( ";" tag-spec ) [ ";" ] */
215 uschar * fieldstart = s;
216 uschar * bstart = NULL, * bend;
218 /* tag-spec = [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS] */
220 s = skip_fws(s); /* FWS */
222 /* debug_printf("%s: consider '%s'\n", __FUNCTION__, s); */
224 s = skip_fws(s); /* FWS */
227 if (!instance_only || tagchar == 'i') switch (tagchar)
229 case 'a': /* a= AMS algorithm */
231 if (*s != '=') return US"no 'a' value";
232 if (arc_insert_tagvalue(al, offsetof(arc_line, a), &s)) return US"a tag dup";
234 /* substructure: algo-hash (eg. rsa-sha256) */
236 t = al->a_algo.data = al->a.data;
238 if (!*t++ || ++i > al->a.len) return US"no '-' in 'a' value";
240 if (*t++ != '-') return US"no '-' in 'a' value";
242 al->a_hash.len = al->a.len - i - 1;
251 case '=': /* b= AMS signature */
252 if (al->b.data) return US"already b data";
255 /* The signature can have FWS inserted in the content;
256 make a stripped copy */
258 while ((c = *++s) && c != ';')
259 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
260 g = string_catn(g, s, 1);
261 if (!g) return US"no b= value";
262 al->b.data = string_from_gstring(g);
264 gstring_release_unused(g);
267 case 'h': /* bh= AMS body hash */
268 s = skip_fws(++s); /* FWS */
269 if (*s != '=') return US"no bh value";
270 if (al->bh.data) return US"already bh data";
272 /* The bodyhash can have FWS inserted in the content;
273 make a stripped copy */
275 while ((c = *++s) && c != ';')
276 if (c != ' ' && c != '\t' && c != '\n' && c != '\r')
277 g = string_catn(g, s, 1);
278 if (!g) return US"no bh= value";
279 al->bh.data = string_from_gstring(g);
281 gstring_release_unused(g);
291 case '=': /* c= AMS canonicalisation */
292 if (arc_insert_tagvalue(al, offsetof(arc_line, c), &s)) return US"c tag dup";
294 /* substructure: head/body (eg. relaxed/simple)) */
296 t = al->c_head.data = al->c.data;
298 if (!*t++ || ++i > al->a.len) break;
300 if (*t++ == '/') /* /body is optional */
303 al->c_body.len = al->c.len - i - 1;
307 al->c_body.data = US"simple";
311 case 'v': /* cv= AS validity */
312 if (*++s != '=') return US"cv tag val";
313 if (arc_insert_tagvalue(al, offsetof(arc_line, cv), &s)) return US"cv tag dup";
319 case 'd': /* d= AMS domain */
320 if (*s != '=') return US"d tag val";
321 if (arc_insert_tagvalue(al, offsetof(arc_line, d), &s)) return US"d tag dup";
323 case 'h': /* h= AMS headers */
324 if (*s != '=') return US"h tag val";
325 if (arc_insert_tagvalue(al, offsetof(arc_line, h), &s)) return US"h tag dup";
327 case 'i': /* i= ARC set instance */
328 if (*s != '=') return US"i tag val";
329 if (arc_insert_tagvalue(al, offsetof(arc_line, i), &s)) return US"i tag dup";
330 if (instance_only) goto done;
332 case 'l': /* l= bodylength */
333 if (*s != '=') return US"l tag val";
334 if (arc_insert_tagvalue(al, offsetof(arc_line, l), &s)) return US"l tag dup";
336 case 's': /* s= AMS selector */
337 if (*s != '=') return US"s tag val";
338 if (arc_insert_tagvalue(al, offsetof(arc_line, s), &s)) return US"s tag dup";
342 while ((c = *s) && c != ';') s++;
343 if (c) s++; /* ; after tag-spec */
345 /* for all but the b= tag, copy the field including FWS. For the b=,
346 drop the tag content. */
351 size_t n = bstart - fieldstart;
352 memcpy(r, fieldstart, n); /* FWS "b=" */
354 al->rawsig_no_b_val.len += n;
356 memcpy(r, bend, n); /* FWS ";" */
358 al->rawsig_no_b_val.len += n;
362 size_t n = s - fieldstart;
363 memcpy(r, fieldstart, n);
365 al->rawsig_no_b_val.len += n;
373 /* debug_printf("%s: finshed\n", __FUNCTION__); */
378 /* Insert one header line in the correct set of the chain,
379 adding instances as needed and checking for duplicate lines.
383 arc_insert_hdr(arc_ctx * ctx, header_line * h, unsigned off, unsigned hoff,
384 BOOL instance_only, arc_line ** alp_ret)
388 arc_line * al = store_get(sizeof(arc_line), FALSE), ** alp;
391 memset(al, 0, sizeof(arc_line));
393 if ((e = arc_parse_line(al, h, off, instance_only)))
395 DEBUG(D_acl) if (e) debug_printf("ARC: %s\n", e);
396 return US"line parse";
398 if (!(i = arc_instance_from_hdr(al))) return US"instance find";
399 if (i > 50) return US"overlarge instance number";
400 if (!(as = arc_find_set(ctx, i))) return US"set find";
401 if (*(alp = (arc_line **)(US as + hoff))) return US"dup hdr";
404 if (alp_ret) *alp_ret = al;
411 static const uschar *
412 arc_try_header(arc_ctx * ctx, header_line * h, BOOL instance_only)
416 /*debug_printf("consider hdr '%s'\n", h->text);*/
417 if (strncmpic(ARC_HDR_AAR, h->text, ARC_HDRLEN_AAR) == 0)
423 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
425 debug_printf("ARC: found AAR: %.*s\n", len, h->text);
427 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AAR, offsetof(arc_set, hdr_aar),
430 DEBUG(D_acl) debug_printf("inserting AAR: %s\n", e);
431 return US"inserting AAR";
434 else if (strncmpic(ARC_HDR_AMS, h->text, ARC_HDRLEN_AMS) == 0)
442 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
444 debug_printf("ARC: found AMS: %.*s\n", len, h->text);
446 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AMS, offsetof(arc_set, hdr_ams),
447 instance_only, &ams)))
449 DEBUG(D_acl) debug_printf("inserting AMS: %s\n", e);
450 return US"inserting AMS";
456 ams->c_head.data = US"simple"; ams->c_head.len = 6;
457 ams->c_body = ams->c_head;
460 else if (strncmpic(ARC_HDR_AS, h->text, ARC_HDRLEN_AS) == 0)
466 for (s = h->text + h->slen; s[-1] == '\r' || s[-1] == '\n'; )
468 debug_printf("ARC: found AS: %.*s\n", len, h->text);
470 if ((e = arc_insert_hdr(ctx, h, ARC_HDRLEN_AS, offsetof(arc_set, hdr_as),
471 instance_only, NULL)))
473 DEBUG(D_acl) debug_printf("inserting AS: %s\n", e);
474 return US"inserting AS";
482 /* Gather the chain of arc sets from the headers.
483 Check for duplicates while that is done. Also build the
484 reverse-order headers list;
486 Return: ARC state if determined, eg. by lack of any ARC chain.
489 static const uschar *
490 arc_vfy_collect_hdrs(arc_ctx * ctx)
493 hdr_rlist * r = NULL, * rprev = NULL;
496 DEBUG(D_acl) debug_printf("ARC: collecting arc sets\n");
497 for (h = header_list; h; h = h->next)
499 r = store_get(sizeof(hdr_rlist), FALSE);
505 if ((e = arc_try_header(ctx, h, FALSE)))
507 arc_state_reason = string_sprintf("collecting headers: %s", e);
513 if (!ctx->arcset_chain) return US"none";
519 arc_cv_match(arc_line * al, const uschar * s)
521 return Ustrncmp(s, al->cv.data, al->cv.len) == 0;
524 /******************************************************************************/
526 /* Return the hash of headers from the message that the AMS claims it
531 arc_get_verify_hhash(arc_ctx * ctx, arc_line * ams, blob * hhash)
533 const uschar * headernames = string_copyn(ams->h.data, ams->h.len);
537 BOOL relaxed = Ustrncmp(US"relaxed", ams->c_head.data, ams->c_head.len) == 0;
538 int hashtype = pdkim_hashname_to_hashtype(
539 ams->a_hash.data, ams->a_hash.len);
545 || !exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
548 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
552 /* For each headername in the list from the AMS (walking in order)
553 walk the message headers in reverse order, adding to the hash any
554 found for the first time. For that last point, maintain used-marks
555 on the list of message headers. */
557 DEBUG(D_acl) debug_printf("ARC: AMS header data for verification:\n");
559 for (r = headers_rlist; r; r = r->prev)
561 while ((hn = string_nextinlist(&headernames, &sep, NULL, 0)))
562 for (r = headers_rlist; r; r = r->prev)
564 && strncasecmp(CCS (s = r->h->text), CCS hn, Ustrlen(hn)) == 0
567 if (relaxed) s = pdkim_relax_header_n(s, r->h->slen, TRUE);
570 DEBUG(D_acl) pdkim_quoteprint(s, len);
571 exim_sha_update(&hhash_ctx, s, Ustrlen(s));
576 /* Finally add in the signature header (with the b= tag stripped); no CRLF */
578 s = ams->rawsig_no_b_val.data, len = ams->rawsig_no_b_val.len;
580 len = Ustrlen(s = pdkim_relax_header_n(s, len, FALSE));
581 DEBUG(D_acl) pdkim_quoteprint(s, len);
582 exim_sha_update(&hhash_ctx, s, len);
584 exim_sha_finish(&hhash_ctx, hhash);
586 { debug_printf("ARC: header hash: "); pdkim_hexprint(hhash->data, hhash->len); }
593 static pdkim_pubkey *
594 arc_line_to_pubkey(arc_line * al)
599 if (!(dns_txt = dkim_exim_query_dns_txt(string_sprintf("%.*s._domainkey.%.*s",
600 (int)al->s.len, al->s.data, (int)al->d.len, al->d.data))))
602 DEBUG(D_acl) debug_printf("pubkey dns lookup fail\n");
606 if ( !(p = pdkim_parse_pubkey_record(dns_txt))
607 || (Ustrcmp(p->srvtype, "*") != 0 && Ustrcmp(p->srvtype, "email") != 0)
610 DEBUG(D_acl) debug_printf("pubkey dns lookup format error\n");
614 /* If the pubkey limits use to specified hashes, reject unusable
615 signatures. XXX should we have looked for multiple dns records? */
619 const uschar * list = p->hashes, * ele;
622 while ((ele = string_nextinlist(&list, &sep, NULL, 0)))
623 if (Ustrncmp(ele, al->a_hash.data, al->a_hash.len) == 0) break;
626 DEBUG(D_acl) debug_printf("pubkey h=%s vs sig a=%.*s\n",
627 p->hashes, (int)al->a.len, al->a.data);
637 static pdkim_bodyhash *
638 arc_ams_setup_vfy_bodyhash(arc_line * ams)
640 int canon_head = -1, canon_body = -1;
643 if (!ams->c.data) ams->c.data = US"simple"; /* RFC 6376 (DKIM) default */
644 pdkim_cstring_to_canons(ams->c.data, ams->c.len, &canon_head, &canon_body);
645 bodylen = ams->l.data
646 ? strtol(CS string_copyn(ams->l.data, ams->l.len), NULL, 10) : -1;
648 return pdkim_set_bodyhash(dkim_verify_ctx,
649 pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len),
656 /* Verify an AMS. This is a DKIM-sig header, but with an ARC i= tag
657 and without a DKIM v= tag.
660 static const uschar *
661 arc_ams_verify(arc_ctx * ctx, arc_set * as)
663 arc_line * ams = as->hdr_ams;
670 const uschar * errstr;
672 as->ams_verify_done = US"in-progress";
674 /* Check the AMS has all the required tags:
678 "d=" domain (for key lookup)
679 "h=" headers (included in signature)
680 "s=" key-selector (for key lookup)
682 if ( !ams->a.data || !ams->b.data || !ams->bh.data || !ams->d.data
683 || !ams->h.data || !ams->s.data)
685 as->ams_verify_done = arc_state_reason = US"required tag missing";
690 /* The bodyhash should have been created earlier, and the dkim code should
691 have managed calculating it during message input. Find the reference to it. */
693 if (!(b = arc_ams_setup_vfy_bodyhash(ams)))
695 as->ams_verify_done = arc_state_reason = US"internal hash setup error";
701 debug_printf("ARC i=%d AMS Body bytes hashed: %lu\n"
702 " Body %.*s computed: ",
703 as->instance, b->signed_body_bytes,
704 (int)ams->a_hash.len, ams->a_hash.data);
705 pdkim_hexprint(CUS b->bh.data, b->bh.len);
708 /* We know the bh-tag blob is of a nul-term string, so safe as a string */
711 || (pdkim_decode_base64(ams->bh.data, &sighash), sighash.len != b->bh.len)
712 || memcmp(sighash.data, b->bh.data, b->bh.len) != 0
717 debug_printf("ARC i=%d AMS Body hash from headers: ", as->instance);
718 pdkim_hexprint(sighash.data, sighash.len);
719 debug_printf("ARC i=%d AMS Body hash did NOT match\n", as->instance);
721 return as->ams_verify_done = arc_state_reason = US"AMS body hash miscompare";
724 DEBUG(D_acl) debug_printf("ARC i=%d AMS Body hash compared OK\n", as->instance);
726 /* Get the public key from DNS */
728 if (!(p = arc_line_to_pubkey(ams)))
729 return as->ams_verify_done = arc_state_reason = US"pubkey problem";
731 /* We know the b-tag blob is of a nul-term string, so safe as a string */
732 pdkim_decode_base64(ams->b.data, &sighash);
734 arc_get_verify_hhash(ctx, ams, &hhash);
736 /* Setup the interface to the signing library */
738 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx, NULL)))
740 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
741 as->ams_verify_done = arc_state_reason = US"internal sigverify init error";
745 hashtype = pdkim_hashname_to_hashtype(ams->a_hash.data, ams->a_hash.len);
748 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify bad a_hash\n", as->instance);
749 return as->ams_verify_done = arc_state_reason = US"AMS sig nonverify";
752 if ((errstr = exim_dkim_verify(&vctx,
753 pdkim_hashes[hashtype].exim_hashmethod, &hhash, &sighash)))
755 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify %s\n", as->instance, errstr);
756 return as->ams_verify_done = arc_state_reason = US"AMS sig nonverify";
759 DEBUG(D_acl) debug_printf("ARC i=%d AMS verify pass\n", as->instance);
760 as->ams_verify_passed = TRUE;
766 /* Check the sets are instance-continuous and that all
767 members are present. Check that no arc_seals are "fail".
768 Set the highest instance number global.
769 Verify the latest AMS.
772 arc_headers_check(arc_ctx * ctx)
776 BOOL ams_fail_found = FALSE;
778 if (!(as = ctx->arcset_chain_last))
781 for(inst = as->instance; as; as = as->prev, inst--)
783 if (as->instance != inst)
784 arc_state_reason = string_sprintf("i=%d (sequence; expected %d)",
786 else if (!as->hdr_aar || !as->hdr_ams || !as->hdr_as)
787 arc_state_reason = string_sprintf("i=%d (missing header)", as->instance);
788 else if (arc_cv_match(as->hdr_as, US"fail"))
789 arc_state_reason = string_sprintf("i=%d (cv)", as->instance);
793 DEBUG(D_acl) debug_printf("ARC chain fail at %s\n", arc_state_reason);
797 /* Evaluate the oldest-pass AMS validation while we're here.
798 It does not affect the AS chain validation but is reported as
802 if (arc_ams_verify(ctx, as))
803 ams_fail_found = TRUE;
805 arc_oldest_pass = inst;
806 arc_state_reason = NULL;
810 arc_state_reason = string_sprintf("(sequence; expected i=%d)", inst);
811 DEBUG(D_acl) debug_printf("ARC chain fail %s\n", arc_state_reason);
815 arc_received = ctx->arcset_chain_last;
816 arc_received_instance = arc_received->instance;
818 /* We can skip the latest-AMS validation, if we already did it. */
820 as = ctx->arcset_chain_last;
821 if (!as->ams_verify_passed)
823 if (as->ams_verify_done)
825 arc_state_reason = as->ams_verify_done;
828 if (!!arc_ams_verify(ctx, as))
835 /******************************************************************************/
836 static const uschar *
837 arc_seal_verify(arc_ctx * ctx, arc_set * as)
839 arc_line * hdr_as = as->hdr_as;
847 const uschar * errstr;
849 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d\n", as->instance);
851 1. If the value of the "cv" tag on that seal is "fail", the
852 chain state is "fail" and the algorithm stops here. (This
853 step SHOULD be skipped if the earlier step (2.1) was
856 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
857 == "none" && i != 1)) then the chain state is "fail" and the
858 algorithm stops here (note that the ordering of the logic is
859 structured for short-circuit evaluation).
862 if ( as->instance == 1 && !arc_cv_match(hdr_as, US"none")
863 || arc_cv_match(hdr_as, US"none") && as->instance != 1
866 arc_state_reason = US"seal cv state";
871 3. Initialize a hash function corresponding to the "a" tag of
875 hashtype = pdkim_hashname_to_hashtype(hdr_as->a_hash.data, hdr_as->a_hash.len);
878 || !exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod))
881 debug_printf("ARC: hash setup error, possibly nonhandled hashtype\n");
882 arc_state_reason = US"seal hash setup error";
887 4. Compute the canonicalized form of the ARC header fields, in
888 the order described in Section 5.4.2, using the "relaxed"
889 header canonicalization defined in Section 3.4.2 of
890 [RFC6376]. Pass the canonicalized result to the hash
893 Headers are CRLF-separated, but the last one is not crlf-terminated.
896 DEBUG(D_acl) debug_printf("ARC: AS header data for verification:\n");
897 for (as2 = ctx->arcset_chain;
898 as2 && as2->instance <= as->instance;
906 if (!(s = al->relaxed))
907 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
908 al->complete->slen, TRUE);
910 DEBUG(D_acl) pdkim_quoteprint(s, len);
911 exim_sha_update(&hhash_ctx, s, len);
914 if (!(s = al->relaxed))
915 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
916 al->complete->slen, TRUE);
918 DEBUG(D_acl) pdkim_quoteprint(s, len);
919 exim_sha_update(&hhash_ctx, s, len);
922 if (as2->instance == as->instance)
923 s = pdkim_relax_header_n(al->rawsig_no_b_val.data,
924 al->rawsig_no_b_val.len, FALSE);
925 else if (!(s = al->relaxed))
926 al->relaxed = s = pdkim_relax_header_n(al->complete->text,
927 al->complete->slen, TRUE);
929 DEBUG(D_acl) pdkim_quoteprint(s, len);
930 exim_sha_update(&hhash_ctx, s, len);
934 5. Retrieve the final digest from the hash function.
937 exim_sha_finish(&hhash_ctx, &hhash_computed);
940 debug_printf("ARC i=%d AS Header %.*s computed: ",
941 as->instance, (int)hdr_as->a_hash.len, hdr_as->a_hash.data);
942 pdkim_hexprint(hhash_computed.data, hhash_computed.len);
947 6. Retrieve the public key identified by the "s" and "d" tags in
948 the ARC-Seal, as described in Section 4.1.6.
951 if (!(p = arc_line_to_pubkey(hdr_as)))
952 return US"pubkey problem";
955 7. Determine whether the signature portion ("b" tag) of the ARC-
956 Seal and the digest computed above are valid according to the
957 public key. (See also Section Section 8.4 for failure case
960 8. If the signature is not valid, the chain state is "fail" and
961 the algorithm stops here.
964 /* We know the b-tag blob is of a nul-term string, so safe as a string */
965 pdkim_decode_base64(hdr_as->b.data, &sighash);
967 if ((errstr = exim_dkim_verify_init(&p->key, KEYFMT_DER, &vctx, NULL)))
969 DEBUG(D_acl) debug_printf("ARC verify init: %s\n", errstr);
973 if ((errstr = exim_dkim_verify(&vctx,
974 pdkim_hashes[hashtype].exim_hashmethod,
975 &hhash_computed, &sighash)))
978 debug_printf("ARC i=%d AS headers verify: %s\n", as->instance, errstr);
979 arc_state_reason = US"seal sigverify error";
983 DEBUG(D_acl) debug_printf("ARC: AS vfy i=%d pass\n", as->instance);
988 static const uschar *
989 arc_verify_seals(arc_ctx * ctx)
991 arc_set * as = ctx->arcset_chain_last;
996 for ( ; as; as = as->prev) if (arc_seal_verify(ctx, as)) return US"fail";
998 DEBUG(D_acl) debug_printf("ARC: AS vfy overall pass\n");
1001 /******************************************************************************/
1003 /* Do ARC verification. Called from DATA ACL, on a verify = arc
1004 condition. No arguments; we are checking globals.
1006 Return: The ARC state, or NULL on error.
1010 acl_verify_arc(void)
1014 memset(&arc_verify_ctx, 0, sizeof(arc_verify_ctx));
1016 if (!dkim_verify_ctx)
1018 DEBUG(D_acl) debug_printf("ARC: no DKIM verify context\n");
1022 /* AS evaluation, per
1023 https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-10#section-6
1025 /* 1. Collect all ARC sets currently on the message. If there were
1026 none, the ARC state is "none" and the algorithm stops here.
1029 if ((res = arc_vfy_collect_hdrs(&arc_verify_ctx)))
1032 /* 2. If the form of any ARC set is invalid (e.g., does not contain
1033 exactly one of each of the three ARC-specific header fields),
1034 then the chain state is "fail" and the algorithm stops here.
1036 1. To avoid the overhead of unnecessary computation and delay
1037 from crypto and DNS operations, the cv value for all ARC-
1038 Seal(s) MAY be checked at this point. If any of the values
1039 are "fail", then the overall state of the chain is "fail" and
1040 the algorithm stops here.
1042 3. Conduct verification of the ARC-Message-Signature header field
1043 bearing the highest instance number. If this verification fails,
1044 then the chain state is "fail" and the algorithm stops here.
1047 if ((res = arc_headers_check(&arc_verify_ctx)))
1050 /* 4. For each ARC-Seal from the "N"th instance to the first, apply the
1053 1. If the value of the "cv" tag on that seal is "fail", the
1054 chain state is "fail" and the algorithm stops here. (This
1055 step SHOULD be skipped if the earlier step (2.1) was
1058 2. In Boolean nomenclature: if ((i == 1 && cv != "none") or (cv
1059 == "none" && i != 1)) then the chain state is "fail" and the
1060 algorithm stops here (note that the ordering of the logic is
1061 structured for short-circuit evaluation).
1063 3. Initialize a hash function corresponding to the "a" tag of
1066 4. Compute the canonicalized form of the ARC header fields, in
1067 the order described in Section 5.4.2, using the "relaxed"
1068 header canonicalization defined in Section 3.4.2 of
1069 [RFC6376]. Pass the canonicalized result to the hash
1072 5. Retrieve the final digest from the hash function.
1074 6. Retrieve the public key identified by the "s" and "d" tags in
1075 the ARC-Seal, as described in Section 4.1.6.
1077 7. Determine whether the signature portion ("b" tag) of the ARC-
1078 Seal and the digest computed above are valid according to the
1079 public key. (See also Section Section 8.4 for failure case
1082 8. If the signature is not valid, the chain state is "fail" and
1083 the algorithm stops here.
1085 5. If all seals pass validation, then the chain state is "pass", and
1086 the algorithm is complete.
1089 if ((res = arc_verify_seals(&arc_verify_ctx)))
1098 /******************************************************************************/
1100 /* Prepend the header to the rlist */
1103 arc_rlist_entry(hdr_rlist * list, const uschar * s, int len)
1105 hdr_rlist * r = store_get(sizeof(hdr_rlist) + sizeof(header_line), FALSE);
1106 header_line * h = r->h = (header_line *)(r+1);
1115 /* This works for either NL or CRLF lines; also nul-termination */
1117 if (*s == '\n' && s[1] != '\t' && s[1] != ' ') break;
1118 s++; /* move past end of line */
1124 /* Walk the given headers strings identifying each header, and construct
1125 a reverse-order list.
1129 arc_sign_scan_headers(arc_ctx * ctx, gstring * sigheaders)
1132 hdr_rlist * rheaders = NULL;
1134 s = sigheaders ? sigheaders->s : NULL;
1137 const uschar * s2 = s;
1139 /* This works for either NL or CRLF lines; also nul-termination */
1141 if (*s2 == '\n' && s2[1] != '\t' && s2[1] != ' ') break;
1142 s2++; /* move past end of line */
1144 rheaders = arc_rlist_entry(rheaders, s, s2 - s);
1152 /* Return the A-R content, without identity, with line-ending and
1156 arc_sign_find_ar(header_line * headers, const uschar * identity, blob * ret)
1159 int ilen = Ustrlen(identity);
1162 for(h = headers; h; h = h->next)
1164 uschar * s = h->text, c;
1167 if (Ustrncmp(s, HDR_AR, HDRLEN_AR) != 0) continue;
1168 s += HDRLEN_AR, len -= HDRLEN_AR; /* header name */
1170 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1171 s++, len--; /* FWS */
1172 if (Ustrncmp(s, identity, ilen) != 0) continue;
1173 s += ilen; len -= ilen; /* identity */
1174 if (len <= 0) continue;
1175 if ((c = *s) && c == ';') s++, len--; /* identity terminator */
1177 && (c = *s) && (c == ' ' || c == '\t' || c == '\r' || c == '\n'))
1178 s++, len--; /* FWS */
1179 if (len <= 0) continue;
1189 /* Append a constructed AAR including CRLF. Add it to the arc_ctx too. */
1192 arc_sign_append_aar(gstring * g, arc_ctx * ctx,
1193 const uschar * identity, int instance, blob * ar)
1195 int aar_off = gstring_length(g);
1197 store_get(sizeof(arc_set) + sizeof(arc_line) + sizeof(header_line), FALSE);
1198 arc_line * al = (arc_line *)(as+1);
1199 header_line * h = (header_line *)(al+1);
1201 g = string_catn(g, ARC_HDR_AAR, ARC_HDRLEN_AAR);
1202 g = string_fmt_append(g, " i=%d; %s;\r\n\t", instance, identity);
1203 g = string_catn(g, US ar->data, ar->len);
1205 h->slen = g->ptr - aar_off;
1206 h->text = g->s + aar_off;
1209 as->prev = ctx->arcset_chain_last;
1210 as->instance = instance;
1213 ctx->arcset_chain = as;
1215 ctx->arcset_chain_last->next = as;
1216 ctx->arcset_chain_last = as;
1218 DEBUG(D_transport) debug_printf("ARC: AAR '%.*s'\n", h->slen - 2, h->text);
1225 arc_sig_from_pseudoheader(gstring * hdata, int hashtype, const uschar * privkey,
1226 blob * sig, const uschar * why)
1228 hashmethod hm = /*sig->keytype == KEYTYPE_ED25519*/ FALSE
1229 ? HASH_SHA2_512 : pdkim_hashes[hashtype].exim_hashmethod;
1232 const uschar * errstr;
1237 debug_printf("ARC: %s header data for signing:\n", why);
1238 pdkim_quoteprint(hdata->s, hdata->ptr);
1240 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1241 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1242 exim_sha_finish(&hhash_ctx, &hhash);
1243 debug_printf("ARC: header hash: "); pdkim_hexprint(hhash.data, hhash.len);
1246 if (FALSE /*need hash for Ed25519 or GCrypt signing*/ )
1249 (void) exim_sha_init(&hhash_ctx, pdkim_hashes[hashtype].exim_hashmethod);
1250 exim_sha_update(&hhash_ctx, hdata->s, hdata->ptr);
1251 exim_sha_finish(&hhash_ctx, &hhash);
1255 hhash.data = hdata->s;
1256 hhash.len = hdata->ptr;
1259 if ( (errstr = exim_dkim_signing_init(privkey, &sctx))
1260 || (errstr = exim_dkim_sign(&sctx, hm, &hhash, sig)))
1262 log_write(0, LOG_MAIN, "ARC: %s signing: %s\n", why, errstr);
1264 debug_printf("private key, or private-key file content, was: '%s'\n",
1274 arc_sign_append_sig(gstring * g, blob * sig)
1276 /*debug_printf("%s: raw sig ", __FUNCTION__); pdkim_hexprint(sig->data, sig->len);*/
1277 sig->data = pdkim_encode_base64(sig);
1278 sig->len = Ustrlen(sig->data);
1281 int len = MIN(sig->len, 74);
1282 g = string_catn(g, sig->data, len);
1283 if ((sig->len -= len) == 0) break;
1285 g = string_catn(g, US"\r\n\t ", 5);
1287 g = string_catn(g, US";\r\n", 3);
1288 gstring_release_unused(g);
1289 string_from_gstring(g);
1294 /* Append a constructed AMS including CRLF. Add it to the arc_ctx too. */
1297 arc_sign_append_ams(gstring * g, arc_ctx * ctx, int instance,
1298 const uschar * identity, const uschar * selector, blob * bodyhash,
1299 hdr_rlist * rheaders, const uschar * privkey, unsigned options)
1302 gstring * hdata = NULL;
1304 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1307 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line), FALSE);
1308 header_line * h = (header_line *)(al+1);
1310 /* debug_printf("%s\n", __FUNCTION__); */
1312 /* Construct the to-be-signed AMS pseudo-header: everything but the sig. */
1315 g = string_fmt_append(g, "%s i=%d; a=rsa-sha256; c=relaxed; d=%s; s=%s",
1316 ARC_HDR_AMS, instance, identity, selector); /*XXX hardwired a= */
1317 if (options & ARC_SIGN_OPT_TSTAMP)
1318 g = string_fmt_append(g, "; t=%lu", (u_long)now);
1319 if (options & ARC_SIGN_OPT_EXPIRE)
1320 g = string_fmt_append(g, "; x=%lu", (u_long)expire);
1321 g = string_fmt_append(g, ";\r\n\tbh=%s;\r\n\th=",
1322 pdkim_encode_base64(bodyhash));
1324 for(col = 3; rheaders; rheaders = rheaders->prev)
1326 const uschar * hnames = US"DKIM-Signature:" PDKIM_DEFAULT_SIGN_HEADERS;
1327 uschar * name, * htext = rheaders->h->text;
1330 /* Spot headers of interest */
1332 while ((name = string_nextinlist(&hnames, &sep, NULL, 0)))
1334 int len = Ustrlen(name);
1335 if (strncasecmp(CCS htext, CCS name, len) == 0)
1337 /* If too long, fold line in h= field */
1339 if (col + len > 78) g = string_catn(g, US"\r\n\t ", 5), col = 3;
1341 /* Add name to h= list */
1343 g = string_catn(g, name, len);
1344 g = string_catn(g, US":", 1);
1347 /* Accumulate header for hashing/signing */
1349 hdata = string_cat(hdata,
1350 pdkim_relax_header_n(htext, rheaders->h->slen, TRUE)); /*XXX hardwired */
1356 /* Lose the last colon from the h= list */
1358 if (g->s[g->ptr - 1] == ':') g->ptr--;
1360 g = string_catn(g, US";\r\n\tb=;", 7);
1362 /* Include the pseudo-header in the accumulation */
1364 s = pdkim_relax_header_n(g->s + ams_off, g->ptr - ams_off, FALSE);
1365 hdata = string_cat(hdata, s);
1367 /* Calculate the signature from the accumulation */
1368 /*XXX does that need further relaxation? there are spaces embedded in the b= strings! */
1370 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AMS"))
1373 /* Lose the trailing semicolon from the psuedo-header, and append the signature
1374 (folded over lines) and termination to complete it. */
1377 g = arc_sign_append_sig(g, &sig);
1379 h->slen = g->ptr - ams_off;
1380 h->text = g->s + ams_off;
1382 ctx->arcset_chain_last->hdr_ams = al;
1384 DEBUG(D_transport) debug_printf("ARC: AMS '%.*s'\n", h->slen - 2, h->text);
1390 /* Look for an arc= result in an A-R header blob. We know that its data
1391 happens to be a NUL-term string. */
1394 arc_ar_cv_status(blob * ar)
1396 const uschar * resinfo = ar->data;
1398 uschar * methodspec, * s;
1400 while ((methodspec = string_nextinlist(&resinfo, &sep, NULL, 0)))
1401 if (Ustrncmp(methodspec, US"arc=", 4) == 0)
1404 for (s = methodspec += 4;
1405 (c = *s) && c != ';' && c != ' ' && c != '\r' && c != '\n'; ) s++;
1406 return string_copyn(methodspec, s - methodspec);
1413 /* Build the AS header and prepend it */
1416 arc_sign_prepend_as(gstring * arcset_interim, arc_ctx * ctx,
1417 int instance, const uschar * identity, const uschar * selector, blob * ar,
1418 const uschar * privkey, unsigned options)
1421 uschar * status = arc_ar_cv_status(ar);
1422 arc_line * al = store_get(sizeof(header_line) + sizeof(arc_line), FALSE);
1423 header_line * h = (header_line *)(al+1);
1424 uschar * badline_str;
1426 gstring * hdata = NULL;
1427 int hashtype = pdkim_hashname_to_hashtype(US"sha256", 6); /*XXX hardwired */
1433 - no h= tag; implicit coverage
1434 - arc status from A-R
1436 - coverage is just the new ARC set
1437 including self (but with an empty b= in self)
1439 - all ARC set headers, set-number order, aar then ams then as,
1440 including self (but with an empty b= in self)
1442 DEBUG(D_transport) debug_printf("ARC: building AS for status '%s'\n", status);
1444 /* Construct the AS except for the signature */
1446 arcset = string_append(NULL, 9,
1448 US" i=", string_sprintf("%d", instance),
1450 US"; a=rsa-sha256; d=", identity, /*XXX hardwired */
1451 US"; s=", selector); /*XXX same as AMS */
1452 if (options & ARC_SIGN_OPT_TSTAMP)
1453 arcset = string_append(arcset, 2,
1454 US"; t=", string_sprintf("%lu", (u_long)now));
1455 arcset = string_cat(arcset,
1458 h->slen = arcset->ptr;
1459 h->text = arcset->s;
1461 ctx->arcset_chain_last->hdr_as = al;
1463 /* For any but "fail" chain-verify status, walk the entire chain in order by
1464 instance. For fail, only the new arc-set. Accumulate the elements walked. */
1466 for (arc_set * as = Ustrcmp(status, US"fail") == 0
1467 ? ctx->arcset_chain_last : ctx->arcset_chain;
1471 /* Accumulate AAR then AMS then AS. Relaxed canonicalisation
1472 is required per standard. */
1474 badline_str = US"aar";
1475 if (!(l = as->hdr_aar)) goto badline;
1477 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1478 badline_str = US"ams";
1479 if (!(l = as->hdr_ams)) goto badline;
1481 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, TRUE));
1482 badline_str = US"as";
1483 if (!(l = as->hdr_as)) goto badline;
1485 hdata = string_cat(hdata, pdkim_relax_header_n(h->text, h->slen, !!as->next));
1488 /* Calculate the signature from the accumulation */
1490 if (!arc_sig_from_pseudoheader(hdata, hashtype, privkey, &sig, US"AS"))
1493 /* Lose the trailing semicolon */
1495 arcset = arc_sign_append_sig(arcset, &sig);
1496 DEBUG(D_transport) debug_printf("ARC: AS '%.*s'\n", arcset->ptr - 2, arcset->s);
1498 /* Finally, append the AMS and AAR to the new AS */
1500 return string_catn(arcset, arcset_interim->s, arcset_interim->ptr);
1504 debug_printf("ARC: while building AS, missing %s in chain\n", badline_str);
1509 /**************************************/
1511 /* Return pointer to pdkim_bodyhash for given hash method, creating new
1516 arc_ams_setup_sign_bodyhash(void)
1518 int canon_head, canon_body;
1520 DEBUG(D_transport) debug_printf("ARC: requesting bodyhash\n");
1521 pdkim_cstring_to_canons(US"relaxed", 7, &canon_head, &canon_body); /*XXX hardwired */
1522 return pdkim_set_bodyhash(&dkim_sign_ctx,
1523 pdkim_hashname_to_hashtype(US"sha256", 6), /*XXX hardwired */
1533 memset(&arc_sign_ctx, 0, sizeof(arc_sign_ctx));
1538 /* A "normal" header line, identified by DKIM processing. These arrive before
1539 the call to arc_sign(), which carries any newly-created DKIM headers - and
1540 those go textually before the normal ones in the message.
1542 We have to take the feed from DKIM as, in the transport-filter case, the
1543 headers are not in memory at the time of the call to arc_sign().
1545 Take a copy of the header and construct a reverse-order list.
1546 Also parse ARC-chain headers and build the chain struct, retaining pointers
1550 static const uschar *
1551 arc_header_sign_feed(gstring * g)
1553 uschar * s = string_copyn(g->s, g->ptr);
1554 headers_rlist = arc_rlist_entry(headers_rlist, s, g->ptr);
1555 return arc_try_header(&arc_sign_ctx, headers_rlist->h, TRUE);
1560 /* ARC signing. Called from the smtp transport, if the arc_sign option is set.
1561 The dkim_exim_sign() function has already been called, so will have hashed the
1562 message body for us so long as we requested a hash previously.
1565 signspec Three-element colon-sep list: identity, selector, privkey.
1566 Optional fourth element: comma-sep list of options.
1568 sigheaders Any signature headers already generated, eg. by DKIM, or NULL
1572 Set of headers to prepend to the message, including the supplied sigheaders
1573 but not the plainheaders.
1577 arc_sign(const uschar * signspec, gstring * sigheaders, uschar ** errstr)
1579 const uschar * identity, * selector, * privkey, * opts, * s;
1580 unsigned options = 0;
1582 header_line * headers;
1583 hdr_rlist * rheaders;
1591 /* Parse the signing specification */
1593 identity = string_nextinlist(&signspec, &sep, NULL, 0);
1594 selector = string_nextinlist(&signspec, &sep, NULL, 0);
1595 if ( !*identity || !*selector
1596 || !(privkey = string_nextinlist(&signspec, &sep, NULL, 0)) || !*privkey)
1598 log_write(0, LOG_MAIN, "ARC: bad signing-specification (%s)",
1599 !*identity ? "identity" : !*selector ? "selector" : "private-key");
1600 return sigheaders ? sigheaders : string_get(0);
1602 if (*privkey == '/' && !(privkey = expand_file_big_buffer(privkey)))
1603 return sigheaders ? sigheaders : string_get(0);
1605 if ((opts = string_nextinlist(&signspec, &sep, NULL, 0)))
1608 while ((s = string_nextinlist(&opts, &osep, NULL, 0)))
1609 if (Ustrcmp(s, "timestamps") == 0)
1611 options |= ARC_SIGN_OPT_TSTAMP;
1612 if (!now) now = time(NULL);
1614 else if (Ustrncmp(s, "expire", 6) == 0)
1616 options |= ARC_SIGN_OPT_EXPIRE;
1617 if (*(s += 6) == '=')
1620 if (!(expire = (time_t)atoi(CS ++s)))
1621 expire = ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1622 if (!now) now = time(NULL);
1626 expire = (time_t)atol(CS s);
1629 if (!now) now = time(NULL);
1630 expire = now + ARC_SIGN_DEFAULT_EXPIRE_DELTA;
1635 DEBUG(D_transport) debug_printf("ARC: sign for %s\n", identity);
1637 /* Make an rlist of any new DKIM headers, then add the "normals" rlist to it.
1638 Then scan the list for an A-R header. */
1640 string_from_gstring(sigheaders);
1641 if ((rheaders = arc_sign_scan_headers(&arc_sign_ctx, sigheaders)))
1644 for (rp = &headers_rlist; *rp; ) rp = &(*rp)->prev;
1648 /* Finally, build a normal-order headers list */
1649 /*XXX only needed for hunt-the-AR? */
1650 /*XXX also, we really should be accepting any number of ADMD-matching ARs */
1652 header_line * hnext = NULL;
1653 for (rheaders = headers_rlist; rheaders;
1654 hnext = rheaders->h, rheaders = rheaders->prev)
1655 rheaders->h->next = hnext;
1659 if (!(arc_sign_find_ar(headers, identity, &ar)))
1661 log_write(0, LOG_MAIN, "ARC: no Authentication-Results header for signing");
1662 return sigheaders ? sigheaders : string_get(0);
1665 /* We previously built the data-struct for the existing ARC chain, if any, using a headers
1666 feed from the DKIM module. Use that to give the instance number for the ARC set we are
1670 if (arc_sign_ctx.arcset_chain_last)
1671 debug_printf("ARC: existing chain highest instance: %d\n",
1672 arc_sign_ctx.arcset_chain_last->instance);
1674 debug_printf("ARC: no existing chain\n");
1676 instance = arc_sign_ctx.arcset_chain_last ? arc_sign_ctx.arcset_chain_last->instance + 1 : 1;
1680 - copy the A-R; prepend i= & identity
1683 g = arc_sign_append_aar(g, &arc_sign_ctx, identity, instance, &ar);
1687 - Looks fairly like a DKIM sig
1688 - Cover all DKIM sig headers as well as the usuals
1691 - we must have requested a suitable bodyhash previously
1694 b = arc_ams_setup_sign_bodyhash();
1695 g = arc_sign_append_ams(g, &arc_sign_ctx, instance, identity, selector,
1696 &b->bh, headers_rlist, privkey, options);
1701 - no h= tag; implicit coverage
1702 - arc status from A-R
1704 - coverage is just the new ARC set
1705 including self (but with an empty b= in self)
1707 - all ARC set headers, set-number order, aar then ams then as,
1708 including self (but with an empty b= in self)
1712 g = arc_sign_prepend_as(g, &arc_sign_ctx, instance, identity, selector, &ar,
1715 /* Finally, append the dkim headers and return the lot. */
1717 if (sigheaders) g = string_catn(g, sigheaders->s, sigheaders->ptr);
1718 (void) string_from_gstring(g);
1719 gstring_release_unused(g);
1724 /******************************************************************************/
1726 /* Check to see if the line is an AMS and if so, set up to validate it.
1727 Called from the DKIM input processing. This must be done now as the message
1728 body data is hashed during input.
1730 We call the DKIM code to request a body-hash; it has the facility already
1731 and the hash parameters might be common with other requests.
1734 static const uschar *
1735 arc_header_vfy_feed(gstring * g)
1742 if (!dkim_verify_ctx) return US"no dkim context";
1744 if (strncmpic(ARC_HDR_AMS, g->s, ARC_HDRLEN_AMS) != 0) return US"not AMS";
1746 DEBUG(D_receive) debug_printf("ARC: spotted AMS header\n");
1747 /* Parse the AMS header */
1752 memset(&al, 0, sizeof(arc_line));
1753 if ((errstr = arc_parse_line(&al, &h, ARC_HDRLEN_AMS, FALSE)))
1755 DEBUG(D_acl) if (errstr) debug_printf("ARC: %s\n", errstr);
1759 if (!al.a_hash.data)
1761 DEBUG(D_acl) debug_printf("ARC: no a_hash from '%.*s'\n", h.slen, h.text);
1768 al.c_body.data = US"simple"; al.c_body.len = 6;
1769 al.c_head = al.c_body;
1772 /* Ask the dkim code to calc a bodyhash with those specs */
1774 if (!(b = arc_ams_setup_vfy_bodyhash(&al)))
1775 return US"dkim hash setup fail";
1777 /* Discard the reference; search again at verify time, knowing that one
1778 should have been created here. */
1783 return US"line parsing error";
1788 /* A header line has been identified by DKIM processing.
1792 is_vfy TRUE for verify mode or FALSE for signing mode
1795 NULL for success, or an error string (probably unused)
1799 arc_header_feed(gstring * g, BOOL is_vfy)
1801 return is_vfy ? arc_header_vfy_feed(g) : arc_header_sign_feed(g);
1806 /******************************************************************************/
1808 /* Construct the list of domains from the ARC chain after validation */
1811 fn_arc_domains(void)
1817 for (as = arc_verify_ctx.arcset_chain, inst = 1; as; as = as->next, inst++)
1819 arc_line * hdr_as = as->hdr_as;
1822 blob * d = &hdr_as->d;
1824 for (; inst < as->instance; inst++)
1825 g = string_catn(g, US":", 1);
1827 g = d->data && d->len
1828 ? string_append_listele_n(g, ':', d->data, d->len)
1829 : string_catn(g, US":", 1);
1832 g = string_catn(g, US":", 1);
1834 return g ? g->s : US"";
1838 /* Construct an Authentication-Results header portion, for the ARC module */
1841 authres_arc(gstring * g)
1845 arc_line * highest_ams;
1846 int start = 0; /* Compiler quietening */
1847 DEBUG(D_acl) start = g->ptr;
1849 g = string_append(g, 2, US";\n\tarc=", arc_state);
1850 if (arc_received_instance > 0)
1852 g = string_fmt_append(g, " (i=%d)", arc_received_instance);
1853 if (arc_state_reason)
1854 g = string_append(g, 3, US"(", arc_state_reason, US")");
1855 g = string_catn(g, US" header.s=", 10);
1856 highest_ams = arc_received->hdr_ams;
1857 g = string_catn(g, highest_ams->s.data, highest_ams->s.len);
1859 g = string_fmt_append(g, " arc.oldest-pass=%d", arc_oldest_pass);
1861 if (sender_host_address)
1862 g = string_append(g, 2, US" smtp.remote-ip=", sender_host_address);
1864 else if (arc_state_reason)
1865 g = string_append(g, 3, US" (", arc_state_reason, US")");
1866 DEBUG(D_acl) debug_printf("ARC: authres '%.*s'\n",
1867 g->ptr - start - 3, g->s + start + 3);
1870 DEBUG(D_acl) debug_printf("ARC: no authres\n");
1875 # endif /* DISABLE_DKIM */
1876 #endif /* EXPERIMENTAL_ARC */