2020-01-18 17:58:34 +00:00
package imap
/ * TODO :
* - Have a counter per config for number of consecutive login errors and backoff ( e . g if supplied creds are incorrect )
* - Have a DB field "last_login_error" if last login failed
* - DB counter for non - campaign emails that the admin should investigate
* - Add field to User for numner of non - campaign emails reported
* /
import (
2020-06-17 01:02:09 +00:00
"bytes"
2020-01-18 17:58:34 +00:00
"context"
2020-06-17 01:13:24 +00:00
"path/filepath"
2020-01-18 17:58:34 +00:00
"regexp"
"strconv"
"strings"
"time"
log "github.com/gophish/gophish/logger"
2020-06-17 01:02:09 +00:00
"github.com/jordan-wright/email"
2020-01-18 17:58:34 +00:00
"github.com/gophish/gophish/models"
)
2020-09-24 01:40:21 +00:00
// Pattern for GoPhish emails e.g ?rid=AbC1234
// We include the optional quoted-printable 3D at the front, just in case decoding fails. e.g ?rid=3DAbC1234
// We also include alternative URL encoded representations of '=' and '?' to handle Microsoft ATP URLs e.g %3Frid%3DAbC1234
var goPhishRegex = regexp . MustCompile ( "((\\?|%3F)rid(=|%3D)(3D)?([A-Za-z0-9]{7}))" )
2020-01-18 17:58:34 +00:00
// Monitor is a worker that monitors IMAP servers for reported campaign emails
type Monitor struct {
cancel func ( )
}
// Monitor.start() checks for campaign emails
// As each account can have its own polling frequency set we need to run one Go routine for
// each, as well as keeping an eye on newly created user accounts.
func ( im * Monitor ) start ( ctx context . Context ) {
usermap := make ( map [ int64 ] int ) // Keep track of running go routines, one per user. We assume incrementing non-repeating UIDs (for the case where users are deleted and re-added).
for {
select {
case <- ctx . Done ( ) :
return
default :
dbusers , err := models . GetUsers ( ) //Slice of all user ids. Each user gets their own IMAP monitor routine.
if err != nil {
log . Error ( err )
break
}
for _ , dbuser := range dbusers {
if _ , ok := usermap [ dbuser . Id ] ; ! ok { // If we don't currently have a running Go routine for this user, start one.
log . Info ( "Starting new IMAP monitor for user " , dbuser . Username )
usermap [ dbuser . Id ] = 1
go monitor ( dbuser . Id , ctx )
}
}
time . Sleep ( 10 * time . Second ) // Every ten seconds we check if a new user has been created
}
}
}
// monitor will continuously login to the IMAP settings associated to the supplied user id (if the user account has IMAP settings, and they're enabled.)
// It also verifies the user account exists, and returns if not (for the case of a user being deleted).
func monitor ( uid int64 , ctx context . Context ) {
for {
select {
case <- ctx . Done ( ) :
return
default :
// 1. Check if user exists, if not, return.
_ , err := models . GetUser ( uid )
if err != nil { // Not sure if there's a better way to determine user existence via id.
log . Info ( "User " , uid , " seems to have been deleted. Stopping IMAP monitor for this user." )
return
}
// 2. Check if user has IMAP settings.
imapSettings , err := models . GetIMAP ( uid )
if err != nil {
log . Error ( err )
break
}
if len ( imapSettings ) > 0 {
im := imapSettings [ 0 ]
// 3. Check if IMAP is enabled
if im . Enabled {
2020-06-17 01:02:09 +00:00
log . Debug ( "Checking IMAP for user " , uid , ": " , im . Username , " -> " , im . Host )
2020-01-18 17:58:34 +00:00
checkForNewEmails ( im )
time . Sleep ( ( time . Duration ( im . IMAPFreq ) - 10 ) * time . Second ) // Subtract 10 to compensate for the default sleep of 10 at the bottom
}
}
}
time . Sleep ( 10 * time . Second )
}
}
// NewMonitor returns a new instance of imap.Monitor
func NewMonitor ( ) * Monitor {
im := & Monitor { }
return im
}
// Start launches the IMAP campaign monitor
func ( im * Monitor ) Start ( ) error {
log . Info ( "Starting IMAP monitor manager" )
ctx , cancel := context . WithCancel ( context . Background ( ) ) // ctx is the derivedContext
im . cancel = cancel
go im . start ( ctx )
return nil
}
// Shutdown attempts to gracefully shutdown the IMAP monitor.
func ( im * Monitor ) Shutdown ( ) error {
log . Info ( "Shutting down IMAP monitor manager" )
im . cancel ( )
return nil
}
// checkForNewEmails logs into an IMAP account and checks unread emails
// for the rid campaign identifier.
func checkForNewEmails ( im models . IMAP ) {
im . Host = im . Host + ":" + strconv . Itoa ( int ( im . Port ) ) // Append port
mailServer := Mailbox {
2020-08-15 15:31:49 +00:00
Host : im . Host ,
TLS : im . TLS ,
2020-08-08 20:03:42 +00:00
IgnoreCertErrors : im . IgnoreCertErrors ,
2020-08-15 15:31:49 +00:00
User : im . Username ,
Pwd : im . Password ,
Folder : im . Folder ,
}
2020-01-18 17:58:34 +00:00
msgs , err := mailServer . GetUnread ( true , false )
if err != nil {
log . Error ( err )
return
}
// Update last_succesful_login here via im.Host
err = models . SuccessfulLogin ( & im )
if len ( msgs ) > 0 {
2020-06-17 01:02:09 +00:00
log . Debugf ( "%d new emails for %s" , len ( msgs ) , im . Username )
var reportingFailed [ ] uint32 // SeqNums of emails that were unable to be reported to phishing server, mark as unread
2020-06-17 01:13:24 +00:00
var deleteEmails [ ] uint32 // SeqNums of campaign emails. If DeleteReportedCampaignEmail is true, we will delete these
2020-01-18 17:58:34 +00:00
for _ , m := range msgs {
// Check if sender is from company's domain, if enabled. TODO: Make this an IMAP filter
if im . RestrictDomain != "" { // e.g domainResitct = widgets.com
splitEmail := strings . Split ( m . Email . From , "@" )
senderDomain := splitEmail [ len ( splitEmail ) - 1 ]
if senderDomain != im . RestrictDomain {
log . Debug ( "Ignoring email as not from company domain: " , senderDomain )
continue
}
}
2020-06-17 01:02:09 +00:00
rids , err := matchEmail ( m . Email ) // Search email Text, HTML, and each attachment for rid parameters
2020-01-18 17:58:34 +00:00
2020-06-17 01:02:09 +00:00
if err != nil {
log . Errorf ( "Error searching email for rids from user '%s': %s" , m . Email . From , err . Error ( ) )
continue
2020-06-17 01:13:24 +00:00
}
2020-06-17 01:02:09 +00:00
if len ( rids ) < 1 {
// In the future this should be an alert in Gophish
log . Infof ( "User '%s' reported email with subject '%s'. This is not a GoPhish campaign; you should investigate it." , m . Email . From , m . Email . Subject )
}
for rid := range rids {
2020-01-18 17:58:34 +00:00
log . Infof ( "User '%s' reported email with rid %s" , m . Email . From , rid )
result , err := models . GetResult ( rid )
if err != nil {
log . Error ( "Error reporting GoPhish email with rid " , rid , ": " , err . Error ( ) )
2020-06-17 01:02:09 +00:00
reportingFailed = append ( reportingFailed , m . SeqNum )
continue
2020-01-18 17:58:34 +00:00
}
2020-06-17 01:02:09 +00:00
err = result . HandleEmailReport ( models . EventDetails { } )
2020-01-18 17:58:34 +00:00
if err != nil {
2020-06-17 01:02:09 +00:00
log . Error ( "Error updating GoPhish email with rid " , rid , ": " , err . Error ( ) )
continue
2020-01-18 17:58:34 +00:00
}
2020-06-17 01:02:09 +00:00
if im . DeleteReportedCampaignEmail == true {
deleteEmails = append ( deleteEmails , m . SeqNum )
2020-01-18 17:58:34 +00:00
}
}
2020-06-17 01:13:24 +00:00
2020-01-18 17:58:34 +00:00
}
2020-06-17 01:02:09 +00:00
// Check if any emails were unable to be reported, so we can mark them as unread
if len ( reportingFailed ) > 0 {
log . Debugf ( "Marking %d emails as unread as failed to report" , len ( reportingFailed ) )
err := mailServer . MarkAsUnread ( reportingFailed ) // Set emails as unread that we failed to report to GoPhish
if err != nil {
log . Error ( "Unable to mark emails as unread: " , err . Error ( ) )
}
}
// If the DeleteReportedCampaignEmail flag is set, delete reported Gophish campaign emails
if len ( deleteEmails ) > 0 {
log . Debugf ( "Deleting %d campaign emails" , len ( deleteEmails ) )
err := mailServer . DeleteEmails ( deleteEmails ) // Delete GoPhish campaign emails.
if err != nil {
log . Error ( "Failed to delete emails: " , err . Error ( ) )
}
}
2020-06-17 01:13:24 +00:00
2020-01-18 17:58:34 +00:00
} else {
log . Debug ( "No new emails for " , im . Username )
}
}
2020-06-17 01:02:09 +00:00
2020-06-17 01:13:24 +00:00
func checkRIDs ( em * email . Email , rids map [ string ] bool ) {
2020-06-17 01:02:09 +00:00
// Check Text and HTML
emailContent := string ( em . Text ) + string ( em . HTML )
for _ , r := range goPhishRegex . FindAllStringSubmatch ( emailContent , - 1 ) {
newrid := r [ len ( r ) - 1 ]
if ! rids [ newrid ] {
rids [ newrid ] = true
}
}
}
// returns a slice of gophish rid paramters found in the email HTML, Text, and attachments
func matchEmail ( em * email . Email ) ( map [ string ] bool , error ) {
rids := make ( map [ string ] bool )
checkRIDs ( em , rids )
// Next check each attachment
for _ , a := range em . Attachments {
ext := filepath . Ext ( a . Filename )
if a . Header . Get ( "Content-Type" ) == "message/rfc822" || ext == ".eml" {
// Let's decode the email
rawBodyStream := bytes . NewReader ( a . Content )
attachmentEmail , err := email . NewEmailFromReader ( rawBodyStream )
if err != nil {
return rids , err
}
checkRIDs ( attachmentEmail , rids )
}
}
return rids , nil
}