docs/diploma

changeset 170:204683bfb4e7

wrote much about modules of an MTA
author meillo@marmaro.de
date Sat, 20 Dec 2008 20:37:09 +0100
parents fa086dbbdf10
children 9415e41e765e
files thesis/tex/4-MasqmailsFuture.tex
diffstat 1 files changed, 82 insertions(+), 40 deletions(-) [+]
line diff
     1.1 --- a/thesis/tex/4-MasqmailsFuture.tex	Fri Dec 19 23:35:38 2008 +0100
     1.2 +++ b/thesis/tex/4-MasqmailsFuture.tex	Sat Dec 20 20:37:09 2008 +0100
     1.3 @@ -37,8 +37,9 @@
     1.4  
     1.5  
     1.6  
     1.7 +\section{\masqmail\ next generation}
     1.8  
     1.9 -\section{Requirements}
    1.10 +\subsection{Requirements}
    1.11  
    1.12  Following is a list of current and future requirements to make \masqmail\ ready for the future.
    1.13  
    1.14 @@ -72,7 +73,7 @@
    1.15  
    1.16  
    1.17  
    1.18 -\section{Discussion on architecture}
    1.19 +\subsection{Discussion on architecture}
    1.20  
    1.21  A program's architecture is probably the most influencing design decision, and has the greatest impact on the program's future capabilities. %fixme: search quote ... check if good
    1.22  
    1.23 @@ -117,86 +118,127 @@
    1.24  
    1.25  
    1.26  
    1.27 -\subsection{Modules needed}
    1.28 +\subsection{Jobs of an MTA}
    1.29  
    1.30  This section tries to identify the needed modules for a modern \MTA. They are later the pieces of which the new architecture is built of.
    1.31  
    1.32 +The basic job of a \mta\ is to tranport mail from a sender to a recipient. This is the definition of such a program and this is how \person{Dent}\cite[page 19]{dent04} and \person{Hafiz} \cite[pages 3-5]{hafiz05} generally see its design.
    1.33  
    1.34 -\subsubsection*{The simple view}
    1.35 -
    1.36 -The basic job of a \mta\ is to tranport mail from a sender to a recipient. This is the definition of such a program and this is how \person{Dent}\cite[page 19]{dent04} and \person{Hafiz} \cite[pages 3-5]{hafiz05} start on the design.
    1.37 -
    1.38 -An \MTA\ therefor needs at least a mail receiving facility and a mail sending facility. But both, and probably all \MTA\ developers (excluded the only forwarders), see the need for a mail queue. A mail queue removed the need to deliver at once. They also provide fail-safe storage of mails until they are delivered.
    1.39 -
    1.40 +An \MTA\ therefor needs at least a mail receiving facility and a mail sending facility. Additionally probably all \MTA\ developers (excluded the only forwarders), see the need for a mail queue. A mail queue removes the need to deliver at once a message is received. They also provide fail-safe storage of mails until they are delivered.
    1.41  
    1.42  
    1.43  
    1.44  \subsubsection*{Incoming channels}
    1.45  
    1.46 -The second addition \person{Hafiz} made is the split of incoming and outgoing channels into local and remote. The question is, if this is nessesary. It is the way, it was done for a long time, but is this extra complexity needed?
    1.47 +\sendmail-compatible \mta{}s must support at least two incoming channels: mail submitted using the \sendmail\ command, and mail received via the \SMTP\ daemon. It is therefor common to split the incoming channel into local and remote. This is done by \qmail\ and \postfix. The same way is \person{Hafiz}'s view.
    1.48  
    1.49 -The common situation is incoming mail on port 25 using \SMTP\ and via the \texttt{sendmail} command. Outgoing mail is either sent using \SMTP, piped into local commands (for example \texttt{uucp}), or delivered locally by appending to a mailbox.
    1.50 +In contrast is \name{sendmail X}: Its locally submitted messages go to the \SMTP\ daemon, which is the only connection towards the mail queue. %fixme: is it a smtp dialog? or a second door?
    1.51 +\person{fanf} proposes a similar approach. He wants the \texttt{sendmail} command to be a simple \SMTP\ client that contacts the \SMTP\ daemon of the \MTA\ like it is done by connections from remote. The advantage here is one single module where all \SMTP\ dialog with submitters is done. Hence one single point to accept or refuse incoming mail. Additionally does the module to put mail into the queue not need to be \name{setuid} or \name{setgid} because it is only invoked from the \SMTP\ daemon. The \MTA's architecture would become simpler and common tasks are not duplicated in modules that do similar jobs.
    1.52  
    1.53 -The \MTA's architecture would be simpler if some of these channels could be merged. The reason is, if various modules do similar jobs, common things might need to be duplicated. On the other side is it better to have more independent modules if each one is simpler then.
    1.54 +But merging the input channels in the \SMTP\ daemon makes the \MTA\ heavily dependent on \SMTP\ being the main mail transfer protocol. To \qmail\ and \postfix\ new modules to support other ways of message receival may be added without change of other parts of the system. Also is it better to have more independent modules if each one is simpler then.
    1.55  
    1.56 -\qmail\ uses \name{qmail-inject} (local message in) and \name{qmail-smtpd} (remote message in), which both handle messages over to \name{qmail-queue} that puts it into the mail queue. \postfix's approach is similar. \name{sendmail X} %fixme: what about meta1 here?
    1.57 -used only \NAME{SMTPS}, which is for receiving mail from remote, to communicate with the queue manager \NAME{QMGR}. Mail from local goes over \NAME{SMTPS}.
    1.58 -
    1.59 -The \name{sendmail X} approach seems to be the simpler one, but does heavily rely on \SMTP\ being the main mail transfer protocol. To \qmail\ and \postfix\ new modules may be added to support other ways of message receival, without any change of other parts of the system.
    1.60 +With the increasing need for new protocols in mind, it seems better to have single modules for each incoming channel, although this leads to duplicated acceptance checks.
    1.61  
    1.62  
    1.63  \subsubsection*{Outgoing channels}
    1.64  
    1.65 +Outgoing mail is commonly either sent using \SMTP, piped into local commands (for example \texttt{uucp}), or delivered locally by appending to a mailbox.
    1.66 +
    1.67  Outgoing channels are similar for \qmail, \postfix, and \name{sendmail X}: All of them have a module to send mail using \SMTP, and one for writing into a local mailbox. Local mail delivery is a job that requires root priveledge to be able to switch to any user in order to write to his mailbox. Modular \MTA{}s do not need \name{setuid root}, but the local delivery process (or its parent) needs to run as root.
    1.68  
    1.69 -As mail delivery to local users, is \emph{not} included in the basic job of \MTA{}s, why should they care about it? In order to keep the system simple and to have programs do one job well, the local delivery job should be handed over to \NAME{MDA}s. \name{Mail delivery agents} are the tools that are specialized for local delivery. They know about the various mailbox formats and are aware of the problems of concurrent write access and thelike. Hence handling the message and the responsiblity for it over to a mail delivery agent, like \name{procmail} or \name{maildrop}, seems to be the right way to go.
    1.70 +As mail delivery to local users, is \emph{not} included in the basic job of an \MTA{}, why should it care about it? In order to keep the system simple and to have programs that do one job well, the local delivery job should be handed over to a specialist: the \name{mail delivery agent}. \NAME{MDA}s know about the various mailbox formats and are aware of the problems of concurrent write access and thelike. Hence handling the message and the responsiblity over to a \NAME{MDA}, like \name{procmail} or \name{maildrop}, seems to be the right way to go.
    1.71  
    1.72 -This means outgoing connections, piping mails into local commands needs to be implemented.
    1.73 +This means an outgoing connection that pipes mail into local commands is required. Other outgoing channels, one for each supportet protocol, may be designed like it was done in other \MTA{}s.
    1.74 +
    1.75 +
    1.76 +
    1.77 +\subsubsection*{Mail queue}
    1.78 +
    1.79 +Mail queues are probably used in all \mta{}s, excluding the simple forwarders. A mail queue is a essential requirement for \masqmail, as it is to be used for non-permanent online connections. This means, mail must be queued until a online connection is available to send the message.
    1.80 +
    1.81 +The mail queue and the module to manage it are the central part of the whole system. This demands especially for robustness and reliability, as a failure here can lead to loosing mail. An \MTA\ takes over responsibility for mail in accepting it, hence loosing mail messages is absolutely to avoid. This covers any kind of crash situation too. The worst thing acceptable to happen is a mail to be sent twice.
    1.82 +
    1.83 +\sendmail, \exim, \qmail, \name{sendmail X}, and \masqmail\ feature one single mail queue. \postfix\ has three of them: \name{incoming}, \name{active}, and \name{deferred}. (The \name{maildrop} queue is excluded, as it is only used for the \texttt{sendmail} command.)
    1.84 +
    1.85 +\MTA\ setups that include content scanning tend to require two separate queues. To use \sendmail\ in such setups requires two independent instances, with two separate queues, running. \exim\ can handle it with special \name{router} and \name{transport} rules, but the data flow gets complicated. Hence an idea is to use two queues, \name{incoming} and \name{active} in \postfix's terminology, with the content scanning within the move from \name{incoming} to \name{active}.
    1.86  
    1.87  
    1.88  
    1.89  \subsubsection*{Sanitize mail}
    1.90 -generate valid headers: add, rewrite
    1.91 -... better before inserting into the queue
    1.92  
    1.93 -(determine the method to send at that position?)
    1.94 +Mail coming into the system often lacks important header lines. At least the required ones must be added from the \MTA. A good example is the \texttt{Message-Id:} header.
    1.95  
    1.96 +In \postfix, this is done by the \name{cleanup} module, which invokes \name{rewrite}. The position in the message flow is after coming from one of the several incoming channels and before the message is stored into the \name{incoming} queue. Modules that handle incoming channels may also add headers, for example the \texttt{From:} and \texttt{Date:} headers. \name{cleanup}, however, does a complete check to make the mail header complete and valid.
    1.97 +
    1.98 +Apart from deciding where to sanitize the mail header, is the question where to generate the envelope. The envelope specifies the actual recipient of the mail, no matter what the \texttt{To:}, \texttt{Cc:}, and \texttt{Bcc:} headers tell. Multiple reciptients lead to multiple different envelopes, containing all the same mail message.
    1.99 +
   1.100 +
   1.101 +
   1.102 +\subsubsection*{Choose route to use}
   1.103 +
   1.104 +One key feature of \masqmail\ is its ability to send mail out in different ways. The decision is based on the current online state and whether a route may be used for a message or not. The online state can be retrieved in tree ways, explained in \ref{sec:fixme}. A route to send is found by checking every available route for being able to transfer the current message, until one matches.
   1.105 +
   1.106 +This functionality should be implemented in the module that is responsible to invoke one of the outgoing channel modules (for example the one for \SMTP\ or the pipe module).
   1.107 +
   1.108 +\masqmail\ can rewrite the envelope's from address and the \texttt{From:} header, dependent on the outgoing route to use. This rewrite must be done \emph{after} it is clear which route a mail will take, of course, so this may be not the module where other header editing is done.
   1.109  
   1.110  
   1.111  
   1.112  \subsubsection*{Aliasing}
   1.113  
   1.114 -where to expand aliases?
   1.115 +Where should aliases get expanded? They appear in different kind. Important are the ones available in the \path{aliases} file. Aliases can be:
   1.116 +\begin{itemize}
   1.117 +	\item a different local user (e.g.\ ``\texttt{bob: alice}'')
   1.118 +	\item a remote user (e.g.\ ``\texttt{bob: john@example.com}'')
   1.119 +	\item a list of users (e.g.\ ``\texttt{bob: alice, john@example.com}'')
   1.120 +	\item a command (e.g.\ ``\texttt{bob: |foo}'')
   1.121 +\end{itemize}
   1.122 +Aliases can be cascaded like in the following example:
   1.123 +\begin{verbatim}
   1.124 +team:   alice, bob
   1.125 +bob:    bob@example.com
   1.126 +\end{verbatim}
   1.127  
   1.128 +Addresses expanding to lists of users lead to more envelopes. Aliases changing the reciptients domain part may require a different route to use.
   1.129  
   1.130 -
   1.131 -\subsubsection*{Mail queue}
   1.132 -
   1.133 -Mail queues are probably used in all \mta{}s, excluding the simple forwarders. A mail queue is a essential requirement for \masqmail, as it is to be used for non-permanent online connections.
   1.134 -
   1.135 -
   1.136 -
   1.137 -
   1.138 +Aliasing is often handled in expanding the alias and reinjecting the mail into the system. Unfortunately, the mail is processed twice using this approach; also does the system need to handle more mail this way. Is it needed to check the new recipient address for acceptance, or should it be accepted generally? (The aliase actually came from inside the system.) A second point for access control seems to be no choice.
   1.139  
   1.140  
   1.141  
   1.142  \subsubsection*{Authentication}
   1.143  
   1.144 -either by
   1.145 -- network/ip address
   1.146 -	easiest: restricting by static IP addresses (Access control via hosts.allow/hosts.deny)
   1.147 -or
   1.148 -- some kind of auth (for dynamic remote hosts)
   1.149 -	adds complexity
   1.150 -	- SASL
   1.151 -	- POP/IMAP: pop-before-smtp, DRAC, WHOSON
   1.152 -	- TLS (certificates)
   1.153 +One thing to avoid is being an \name{open relay}. Open relays allow to relay mail from everywhere to everywhere. This is a major source of spam. The solution is restricting relay\footnote{Relaying is passing mail, that is not from and not for the own system, through it.} access.
   1.154  
   1.155 +Several ways to restrict access are available. The most simple one is restrictiction by the \NAME{IP} address. No extra complexity is added this way, but static \NAME{IP} addresses are mandatory. This kind of restriction may be enabled using the operating system's \path{hosts.allow} and \path{hosts.deny} files. To allow only connections to port 25 from localhost or the local network \texttt{192.168.100.0/24} insert the line ``\texttt{25: ALL}'' into \path{hosts.deny} and ``\texttt{25: 127.0.0.1, 192.168.100.}'' into \path{hosts.allow}.
   1.156 +
   1.157 +If static access restriction is not possible, for example if mail from locations with changing \NAME{IP} addresses wants to be accepted, some kind of authentication mechanism is required. Three common kinds exist:
   1.158 +\begin{enumerate}
   1.159 +\item \SMTP-after-\NAME{POP}: uses authenication on the \NAME{POP} protocol to permit incoming \SMTP\ connections for a limited time afterwards.
   1.160 +\item \SMTP authentication: is an extension to \SMTP. Authentication can be requested before mail is accepted.
   1.161 +\item Certificates: confirm the identity of someone.
   1.162 +\end{enumerate}
   1.163 +The first mechanism requires a \NAME{POP} (or \NAME{IMAP}) server running on the same host (or a trusted one), to enable the \SMTP\ server to use the login dates on the \NAME{POP} server. This is a common practice used by mail service providers, but is not adequate for the environments \masqmail\ is designed for.
   1.164 +
   1.165 +Certificate based authentication, like provided by \NAME{TLS}, suffers from the overhead of certificate management. But \NAME{TLS} provides encryption too, so is useful anyway.
   1.166 +
   1.167 +\SMTP\ authentication (also refered to as \NAME{SMTP-AUTH}) suppoert is easiest received by using a \name{Simple Authentication and Security Layer} implementation. \person{Dent} sees in \NAME{SASL} the best solution for authenticating dynamic users:
   1.168  \begin{quote}
   1.169 -None of these add-ons is an ideal solution. They require additional code compiled into your existing daemons that may then require special write accesss to system files. They also require additional work for busy system administrators. If you cannot use any of the nonauthenticating alternatives mentioned earlier, or your business requirements demand that all of thyour users' mail pass through your system no matter where they are on the Internet, SASL is probably the solution that offers the most reliable and scalable method to authenticate users.
   1.170 +%None of these add-ons is an ideal solution. They require additional code compiled into your existing daemons that may then require special write accesss to system files. They also require additional work for busy system administrators. If you cannot use any of the nonauthenticating alternatives mentioned earlier, or your business requirements demand that all of your users' mail pass through your system no matter where they are on the Internet, SASL is probably the solution that offers the most reliable and scalable method to authenticate users.
   1.171 +None of these [authentication methods] is an ideal solution. They require additional code compiled into your existing daemons that may then require special write accesss to system files. They also require additional work for busy system administrators. If you cannot use any of the nonauthenticating alternatives mentioned earlier, or your business requirements demand that all of your users' mail pass through your system no matter where they are on the Internet, \NAME{SASL} is probably the solution that offers the most reliable and scalable method to authenticate users.
   1.172  \cite[page 44]{dent04}
   1.173  \end{quote}
   1.174  
   1.175 +%either by
   1.176 +%- network/ip address
   1.177 +%	easiest: restricting by static IP addresses (Access control via hosts.allow/hosts.deny)
   1.178 +%or
   1.179 +%- some kind of auth (for dynamic remote hosts)
   1.180 +%	adds complexity
   1.181 +%	- SASL
   1.182 +%	- POP/IMAP: pop-before-smtp, DRAC, WHOSON
   1.183 +%	- TLS (certificates)
   1.184 +
   1.185 +
   1.186  
   1.187  \subsubsection*{Encryption}
   1.188