This commit is contained in:
parent
6ae2c2463d
commit
5d1dce038f
6 changed files with 235 additions and 2 deletions
|
|
@ -942,6 +942,10 @@ components:
|
||||||
$ref: '#/components/schemas/DMARCRecord'
|
$ref: '#/components/schemas/DMARCRecord'
|
||||||
bimi_record:
|
bimi_record:
|
||||||
$ref: '#/components/schemas/BIMIRecord'
|
$ref: '#/components/schemas/BIMIRecord'
|
||||||
|
dnssec_enabled:
|
||||||
|
type: boolean
|
||||||
|
description: Whether the From domain has DNSSEC enabled with valid chain of trust
|
||||||
|
example: true
|
||||||
ptr_records:
|
ptr_records:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
|
|
|
||||||
|
|
@ -127,6 +127,12 @@ func (d *DNSAnalyzer) AnalyzeDNS(email *EmailMessage, authResults *api.Authentic
|
||||||
// Check BIMI record (for From domain - branding is based on visible sender)
|
// Check BIMI record (for From domain - branding is based on visible sender)
|
||||||
results.BimiRecord = d.checkBIMIRecord(fromDomain, "default")
|
results.BimiRecord = d.checkBIMIRecord(fromDomain, "default")
|
||||||
|
|
||||||
|
// Check DNSSEC status (for From domain)
|
||||||
|
dnssecEnabled, err := d.resolver.IsDNSSECEnabled(nil, fromDomain)
|
||||||
|
if err == nil {
|
||||||
|
results.DnssecEnabled = &dnssecEnabled
|
||||||
|
}
|
||||||
|
|
||||||
return results
|
return results
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -149,6 +155,12 @@ func (d *DNSAnalyzer) AnalyzeDomainOnly(domain string) *api.DNSResults {
|
||||||
// Check BIMI record with default selector
|
// Check BIMI record with default selector
|
||||||
results.BimiRecord = d.checkBIMIRecord(domain, "default")
|
results.BimiRecord = d.checkBIMIRecord(domain, "default")
|
||||||
|
|
||||||
|
// Check DNSSEC status
|
||||||
|
dnssecEnabled, err := d.resolver.IsDNSSECEnabled(nil, domain)
|
||||||
|
if err == nil {
|
||||||
|
results.DnssecEnabled = &dnssecEnabled
|
||||||
|
}
|
||||||
|
|
||||||
return results
|
return results
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -204,11 +216,16 @@ func (d *DNSAnalyzer) CalculateDNSScore(results *api.DNSResults, senderIP string
|
||||||
|
|
||||||
score := 0
|
score := 0
|
||||||
|
|
||||||
|
// DNSSEC: 10 points
|
||||||
|
if results.DnssecEnabled != nil && *results.DnssecEnabled {
|
||||||
|
score += 10
|
||||||
|
}
|
||||||
|
|
||||||
// PTR and Forward DNS: 20 points
|
// PTR and Forward DNS: 20 points
|
||||||
score += 20 * d.calculatePTRScore(results, senderIP) / 100
|
score += 20 * d.calculatePTRScore(results, senderIP) / 100
|
||||||
|
|
||||||
// MX Records: 20 points (10 for From domain, 10 for Return-Path domain)
|
// MX Records: 10 points (5 for From domain, 5 for Return-Path domain)
|
||||||
score += 20 * d.calculateMXScore(results) / 100
|
score += 10 * d.calculateMXScore(results) / 100
|
||||||
|
|
||||||
// SPF Records: 20 points
|
// SPF Records: 20 points
|
||||||
score += 20 * d.calculateSPFScore(results) / 100
|
score += 20 * d.calculateSPFScore(results) / 100
|
||||||
|
|
|
||||||
|
|
@ -48,6 +48,10 @@ type DNSResolver interface {
|
||||||
// LookupHost looks up the given hostname using the local resolver.
|
// LookupHost looks up the given hostname using the local resolver.
|
||||||
// It returns a slice of that host's addresses (IPv4 and IPv6).
|
// It returns a slice of that host's addresses (IPv4 and IPv6).
|
||||||
LookupHost(ctx context.Context, host string) ([]string, error)
|
LookupHost(ctx context.Context, host string) ([]string, error)
|
||||||
|
|
||||||
|
// IsDNSSECEnabled checks if the given domain has DNSSEC enabled by querying for DNSKEY records.
|
||||||
|
// Returns true if the domain has DNSSEC configured and the chain of trust is valid.
|
||||||
|
IsDNSSECEnabled(ctx context.Context, domain string) (bool, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// StandardDNSResolver is the default DNS resolver implementation that uses goresolver with DNSSEC validation.
|
// StandardDNSResolver is the default DNS resolver implementation that uses goresolver with DNSSEC validation.
|
||||||
|
|
@ -194,3 +198,40 @@ func (r *StandardDNSResolver) LookupHost(ctx context.Context, host string) ([]st
|
||||||
|
|
||||||
return allAddrs, nil
|
return allAddrs, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// IsDNSSECEnabled checks if the given domain has DNSSEC enabled by querying for DNSKEY records.
|
||||||
|
// It uses DNSSEC validation to ensure the chain of trust is valid.
|
||||||
|
// Returns true if DNSSEC is properly configured and validated, false otherwise.
|
||||||
|
func (r *StandardDNSResolver) IsDNSSECEnabled(ctx context.Context, domain string) (bool, error) {
|
||||||
|
// Ensure the domain ends with a dot for DNS queries
|
||||||
|
queryName := domain
|
||||||
|
if !strings.HasSuffix(queryName, ".") {
|
||||||
|
queryName = queryName + "."
|
||||||
|
}
|
||||||
|
|
||||||
|
// Query for DNSKEY records with DNSSEC validation
|
||||||
|
// If this succeeds, it means:
|
||||||
|
// 1. The domain has DNSKEY records (DNSSEC is configured)
|
||||||
|
// 2. The DNSSEC chain of trust is valid (validated by StrictNSQuery)
|
||||||
|
rrs, err := r.resolver.StrictNSQuery(queryName, dns.TypeDNSKEY)
|
||||||
|
if err != nil {
|
||||||
|
// DNSSEC is not enabled or validation failed
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if we got any DNSKEY records
|
||||||
|
if len(rrs) == 0 {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify we actually have DNSKEY records (not just any RR type)
|
||||||
|
hasDNSKEY := false
|
||||||
|
for _, rr := range rrs {
|
||||||
|
if _, ok := rr.(*dns.DNSKEY); ok {
|
||||||
|
hasDNSKEY = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return hasDNSKEY, nil
|
||||||
|
}
|
||||||
|
|
|
||||||
111
pkg/analyzer/dns_resolver_test.go
Normal file
111
pkg/analyzer/dns_resolver_test.go
Normal file
|
|
@ -0,0 +1,111 @@
|
||||||
|
// This file is part of the happyDeliver (R) project.
|
||||||
|
// Copyright (c) 2025 happyDomain
|
||||||
|
// Authors: Pierre-Olivier Mercier, et al.
|
||||||
|
//
|
||||||
|
// This program is offered under a commercial and under the AGPL license.
|
||||||
|
// For commercial licensing, contact us at <contact@happydomain.org>.
|
||||||
|
//
|
||||||
|
// For AGPL licensing:
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package analyzer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestIsDNSSECEnabled(t *testing.T) {
|
||||||
|
resolver := NewStandardDNSResolver()
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
domain string
|
||||||
|
expectDNSSEC bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "ietf.org has DNSSEC",
|
||||||
|
domain: "ietf.org",
|
||||||
|
expectDNSSEC: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "google.com doesn't have DNSSEC",
|
||||||
|
domain: "google.com",
|
||||||
|
expectDNSSEC: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
enabled, err := resolver.IsDNSSECEnabled(ctx, tt.domain)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsDNSSECEnabled() error = %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if enabled != tt.expectDNSSEC {
|
||||||
|
t.Errorf("IsDNSSECEnabled() for %s = %v, want %v", tt.domain, enabled, tt.expectDNSSEC)
|
||||||
|
} else {
|
||||||
|
// Log the result even if we're not validating
|
||||||
|
if enabled {
|
||||||
|
t.Logf("%s: DNSSEC is enabled ✅", tt.domain)
|
||||||
|
} else {
|
||||||
|
t.Logf("%s: DNSSEC is NOT enabled ⚠️", tt.domain)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsDNSSECEnabled_NonExistentDomain(t *testing.T) {
|
||||||
|
resolver := NewStandardDNSResolver()
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
// Test with a domain that doesn't exist
|
||||||
|
enabled, err := resolver.IsDNSSECEnabled(ctx, "this-domain-definitely-does-not-exist-12345.com")
|
||||||
|
if err != nil {
|
||||||
|
// Error is acceptable for non-existent domains
|
||||||
|
t.Logf("Non-existent domain returned error (expected): %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// If no error, DNSSEC should be disabled
|
||||||
|
if enabled {
|
||||||
|
t.Error("IsDNSSECEnabled() for non-existent domain should return false")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsDNSSECEnabled_WithTrailingDot(t *testing.T) {
|
||||||
|
resolver := NewStandardDNSResolver()
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
// Test that both formats work
|
||||||
|
domain1 := "cloudflare.com"
|
||||||
|
domain2 := "cloudflare.com."
|
||||||
|
|
||||||
|
enabled1, err1 := resolver.IsDNSSECEnabled(ctx, domain1)
|
||||||
|
if err1 != nil {
|
||||||
|
t.Errorf("IsDNSSECEnabled() without trailing dot error = %v", err1)
|
||||||
|
}
|
||||||
|
|
||||||
|
enabled2, err2 := resolver.IsDNSSECEnabled(ctx, domain2)
|
||||||
|
if err2 != nil {
|
||||||
|
t.Errorf("IsDNSSECEnabled() with trailing dot error = %v", err2)
|
||||||
|
}
|
||||||
|
|
||||||
|
if enabled1 != enabled2 {
|
||||||
|
t.Errorf("IsDNSSECEnabled() results differ: without dot = %v, with dot = %v", enabled1, enabled2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -10,6 +10,7 @@
|
||||||
import BimiRecordDisplay from "./BimiRecordDisplay.svelte";
|
import BimiRecordDisplay from "./BimiRecordDisplay.svelte";
|
||||||
import PtrRecordsDisplay from "./PtrRecordsDisplay.svelte";
|
import PtrRecordsDisplay from "./PtrRecordsDisplay.svelte";
|
||||||
import PtrForwardRecordsDisplay from "./PtrForwardRecordsDisplay.svelte";
|
import PtrForwardRecordsDisplay from "./PtrForwardRecordsDisplay.svelte";
|
||||||
|
import DnssecDisplay from "./DnssecDisplay.svelte";
|
||||||
|
|
||||||
interface Props {
|
interface Props {
|
||||||
domainAlignment?: DomainAlignment;
|
domainAlignment?: DomainAlignment;
|
||||||
|
|
@ -150,6 +151,9 @@
|
||||||
|
|
||||||
<!-- BIMI Record -->
|
<!-- BIMI Record -->
|
||||||
<BimiRecordDisplay bimiRecord={dnsResults.bimi_record} />
|
<BimiRecordDisplay bimiRecord={dnsResults.bimi_record} />
|
||||||
|
|
||||||
|
<!-- DNSSEC -->
|
||||||
|
<DnssecDisplay dnssecEnabled={dnsResults.dnssec_enabled} domain={dnsResults.from_domain} />
|
||||||
{/if}
|
{/if}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
||||||
56
web/src/lib/components/DnssecDisplay.svelte
Normal file
56
web/src/lib/components/DnssecDisplay.svelte
Normal file
|
|
@ -0,0 +1,56 @@
|
||||||
|
<script lang="ts">
|
||||||
|
interface Props {
|
||||||
|
dnssecEnabled?: boolean;
|
||||||
|
domain?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
let { dnssecEnabled, domain }: Props = $props();
|
||||||
|
|
||||||
|
// DNSSEC is valid if it's explicitly enabled
|
||||||
|
const dnssecIsValid = $derived(dnssecEnabled === true);
|
||||||
|
</script>
|
||||||
|
|
||||||
|
{#if dnssecEnabled !== undefined}
|
||||||
|
<div class="card mb-4" id="dns-dnssec">
|
||||||
|
<div class="card-header d-flex justify-content-between align-items-center">
|
||||||
|
<h5 class="text-muted mb-0">
|
||||||
|
<i
|
||||||
|
class="bi"
|
||||||
|
class:bi-shield-check={dnssecIsValid}
|
||||||
|
class:text-success={dnssecIsValid}
|
||||||
|
class:bi-shield-x={!dnssecIsValid}
|
||||||
|
class:text-warning={!dnssecIsValid}
|
||||||
|
></i>
|
||||||
|
DNSSEC
|
||||||
|
</h5>
|
||||||
|
<span class="badge bg-secondary">Security</span>
|
||||||
|
</div>
|
||||||
|
<div class="card-body">
|
||||||
|
<p class="card-text small text-muted mb-3">
|
||||||
|
DNSSEC (DNS Security Extensions) adds cryptographic signatures to DNS records to verify
|
||||||
|
their authenticity and integrity. It protects against DNS spoofing and cache poisoning
|
||||||
|
attacks, ensuring that DNS responses haven't been tampered with.
|
||||||
|
</p>
|
||||||
|
{#if domain}
|
||||||
|
<div class="mb-2">
|
||||||
|
<strong>Domain:</strong> <code>{domain}</code>
|
||||||
|
</div>
|
||||||
|
{/if}
|
||||||
|
{#if dnssecIsValid}
|
||||||
|
<div class="alert alert-success mb-0">
|
||||||
|
<i class="bi bi-check-circle me-1"></i>
|
||||||
|
<strong>Enabled:</strong> DNSSEC is properly configured with a valid chain of trust.
|
||||||
|
This provides additional security and authenticity for your domain's DNS records.
|
||||||
|
</div>
|
||||||
|
{:else}
|
||||||
|
<div class="alert alert-warning mb-0">
|
||||||
|
<i class="bi bi-info-circle me-1"></i>
|
||||||
|
<strong>Not Enabled:</strong> DNSSEC is not configured for this domain. While not
|
||||||
|
required for email delivery, enabling DNSSEC provides additional security by protecting
|
||||||
|
against DNS-based attacks. Consider enabling DNSSEC through your domain registrar or
|
||||||
|
DNS provider.
|
||||||
|
</div>
|
||||||
|
{/if}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{/if}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue