text
stringlengths 1
93.6k
|
|---|
>>> q = query('0.0.0.0','','')
|
>>> p = q.parse_header_spf('''Pass (test) client-ip=70.98.79.77;
|
... envelope-from="evelyn@subjectsthum.com"; helo=mail.subjectsthum.com;
|
... receiver=mail.bmsi.com; mechanism=a; identity=mailfrom''')
|
>>> q.get_header(q.result)
|
'Pass (test) client-ip=70.98.79.77; envelope-from="evelyn@subjectsthum.com"; helo=mail.subjectsthum.com; receiver=mail.bmsi.com; mechanism=a; identity=mailfrom'
|
>>> o = q.parse_header_spf('''None (mail.bmsi.com: test)
|
... client-ip=163.247.46.150; envelope-from="admin@squiebras.cl";
|
... helo=mail.squiebras.cl; receiver=mail.bmsi.com; mechanism=mx/24;
|
... x-bestguess=pass; x-helo-spf=neutral; identity=mailfrom''')
|
>>> q.get_header(q.result,**o)
|
'None (mail.bmsi.com: test) client-ip=163.247.46.150; envelope-from="admin@squiebras.cl"; helo=mail.squiebras.cl; receiver=mail.bmsi.com; mechanism=mx/24; x-bestguess=pass; x-helo-spf=neutral; identity=mailfrom'
|
>>> o['bestguess']
|
'pass'
|
"""
|
a = val.split(None,1)
|
self.result = a[0].lower()
|
self.mechanism = None
|
if len(a) < 2: return 'none'
|
val = a[1]
|
if val.startswith('('):
|
pos = val.find(')')
|
if pos < 0: return self.result
|
self.comment = val[1:pos]
|
val = val[pos+1:]
|
msg = Message()
|
msg.add_header('Received-SPF','; '+val)
|
p = {}
|
for k,v in msg.get_params(header='Received-SPF'):
|
if k == 'client-ip':
|
self.set_ip(v)
|
elif k == 'envelope-from': self.s = v
|
elif k == 'helo': self.h = v
|
elif k == 'receiver': self.r = v
|
elif k == 'problem': self.mech = v
|
elif k == 'mechanism': self.mechanism = v
|
elif k == 'identity': self.ident = v
|
elif k.startswith('x-'): p[k[2:]] = v
|
self.l, self.o = split_email(self.s, self.h)
|
return p
|
def parse_header(self, val):
|
"""Set SPF values from Received-SPF or RFC 5451 Authentication Results header.
|
Useful when SPF has already been run on a trusted gateway machine. Auto
|
detects the header type and parses it. Use parse_header_spf or parse_header_ar
|
for each type if required.
|
Examples:
|
>>> q = query('0.0.0.0','','')
|
>>> p = q.parse_header('''Pass (test) client-ip=70.98.79.77;
|
... envelope-from="evelyn@subjectsthum.com"; helo=mail.subjectsthum.com;
|
... receiver=mail.bmsi.com; mechanism=a; identity=mailfrom''')
|
>>> q.get_header(q.result)
|
'Pass (test) client-ip=70.98.79.77; envelope-from="evelyn@subjectsthum.com"; helo=mail.subjectsthum.com; receiver=mail.bmsi.com; mechanism=a; identity=mailfrom'
|
>>> r = q.parse_header('''None (mail.bmsi.com: test)
|
... client-ip=163.247.46.150; envelope-from="admin@squiebras.cl";
|
... helo=mail.squiebras.cl; receiver=mail.bmsi.com; mechanism=mx/24;
|
... x-bestguess=pass; x-helo-spf=neutral; identity=mailfrom''')
|
>>> q.get_header(q.result,**r)
|
'None (mail.bmsi.com: test) client-ip=163.247.46.150; envelope-from="admin@squiebras.cl"; helo=mail.squiebras.cl; receiver=mail.bmsi.com; mechanism=mx/24; x-bestguess=pass; x-helo-spf=neutral; identity=mailfrom'
|
>>> r['bestguess']
|
'pass'
|
>>> q = query('192.0.2.3','strong-bad@email.example.com','mx.example.org')
|
>>> q.mechanism = 'unknown'
|
>>> p = q.parse_header_ar('''Authentication-Results: bmsi.com; spf=neutral \\n (abuse@kitterman.com: 192.0.2.3 is neither permitted nor denied by domain of email.example.com) \\n smtp.mailfrom=email.example.com \\n (sender=strong-bad@email.example.com; helo=mx.example.org; client-ip=192.0.2.3; receiver=abuse@kitterman.com; mechanism=?all)''')
|
>>> q.get_header(q.result, header_type='authres', aid='bmsi.com')
|
'Authentication-Results: bmsi.com; spf=neutral (unknown: 192.0.2.3 is neither permitted nor denied by domain of email.example.com) smtp.mailfrom=email.example.com (sender=email.example.com; helo=mx.example.org; client-ip=192.0.2.3; receiver=unknown; mechanism=unknown)'
|
>>> p = q.parse_header_ar('''Authentication-Results: bmsi.com; spf=None (mail.bmsi.com: test; client-ip=163.247.46.150) smtp.mailfrom=admin@squiebras.cl (helo=mail.squiebras.cl; receiver=mail.bmsi.com; mechanism=mx/24)''')
|
>>> q.get_header(q.result, header_type='authres', aid='bmsi.com')
|
'Authentication-Results: bmsi.com; spf=none (unknown: 192.0.2.3 is neither permitted nor denied by domain of email.example.com) smtp.mailfrom=admin@squiebras.cl (sender=admin@squiebras.cl; helo=mx.example.org; client-ip=192.0.2.3; receiver=unknown; mechanism=unknown)'
|
"""
|
if val.startswith('Authentication-Results:'):
|
return(self.parse_header_ar(val))
|
else:
|
return(self.parse_header_spf(val))
|
def get_header(self, res, receiver=None, header_type='spf', aid=None, **kv):
|
"""
|
Generate Received-SPF or Authentication Results header based on the
|
last lookup.
|
>>> q = query(s='strong-bad@email.example.com', h='mx.example.org',
|
... i='192.0.2.3')
|
>>> q.r='abuse@kitterman.com'
|
>>> q.check(spf='v=spf1 ?all')
|
('neutral', 250, 'access neither permitted nor denied')
|
>>> q.get_header('neutral')
|
'Neutral (abuse@kitterman.com: 192.0.2.3 is neither permitted nor denied by domain of email.example.com) client-ip=192.0.2.3; envelope-from="strong-bad@email.example.com"; helo=mx.example.org; receiver=abuse@kitterman.com; mechanism=?all; identity=mailfrom'
|
>>> q.check(spf='v=spf1 redirect=controlledmail.com exp=_exp.controlledmail.com')
|
('fail', 550, 'SPF fail - not authorized')
|
>>> q.get_header('fail')
|
'Fail (abuse@kitterman.com: domain of email.example.com does not designate 192.0.2.3 as permitted sender) client-ip=192.0.2.3; envelope-from="strong-bad@email.example.com"; helo=mx.example.org; receiver=abuse@kitterman.com; mechanism=-all; identity=mailfrom'
|
>>> q.check(spf='v=spf1 ip4:192.0.0.0/8 ?all moo')
|
('permerror', 550, 'SPF Permanent Error: Unknown mechanism found: moo')
|
>>> q.get_header('permerror')
|
'PermError (abuse@kitterman.com: permanent error in processing domain of email.example.com: Unknown mechanism found) client-ip=192.0.2.3; envelope-from="strong-bad@email.example.com"; helo=mx.example.org; receiver=abuse@kitterman.com; problem=moo; identity=mailfrom'
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.