Skip to content
Snippets Groups Projects
Select Git revision
  • 0febad19c17f86217697f567a75b39295cebeb4b
  • master default
  • v0.52.5
  • v0.52.4
  • v0.52.3
  • v0.52.2
  • v0.52.1
  • v0.52.0
  • v0.51.0
  • v0.50.0
  • v0.49.0
11 results

server.cnf

Blame
  • spf.py 35.93 KiB
    #!/usr/bin/env python
    """SPF (Sender Policy Framework) implementation.
    
    Copyright (c) 2003, Terence Way
    Portions Copyright (c) 2004,2005 Stuart Gathman <stuart@bmsi.com>
    This module is free software, and you may redistribute it and/or modify
    it under the same terms as Python itself, so long as this copyright message
    and disclaimer are retained in their original form.
    
    IN NO EVENT SHALL THE AUTHOR BE LIABLE TO ANY PARTY FOR DIRECT, INDIRECT,
    SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF
    THIS CODE, EVEN IF THE AUTHOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
    DAMAGE.
    
    THE AUTHOR SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, BUT NOT
    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
    PARTICULAR PURPOSE.  THE CODE PROVIDED HEREUNDER IS ON AN "AS IS" BASIS,
    AND THERE IS NO OBLIGATION WHATSOEVER TO PROVIDE MAINTENANCE,
    SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.
    
    For more information about SPF, a tool against email forgery, see
    	http://openspf.org/
    
    For news, bugfixes, etc. visit the home page for this implementation at
    	http://www.wayforward.net/spf/
    	http://sourceforge.net/projects/pymilter/
    """
    
    # Changes:
    #    9-dec-2003, v1.1, Meng Weng Wong added PTR code, THANK YOU
    #   11-dec-2003, v1.2, ttw added macro expansion, exp=, and redirect=
    #   13-dec-2003, v1.3, ttw added %{o} original domain macro,
    #                      print spf result on command line, support default=,
    #                      support localhost, follow DNS CNAMEs, cache DNS results
    #                      during query, support Python 2.2 for Mac OS X
    #   16-dec-2003, v1.4, ttw fixed include handling (include is a mechanism,
    #                      complete with status results, so -include: should work.
    #                      Expand macros AFTER looking for status characters ?-+
    #                      so altavista.com SPF records work.
    #   17-dec-2003, v1.5, ttw use socket.inet_aton() instead of DNS.addr2bin, so
    #                      n, n.n, and n.n.n forms for IPv4 addresses work, and to
    #                      ditch the annoying Python 2.4 FutureWarning
    #   18-dec-2003, v1.6, Failures on Intel hardware: endianness.  Use ! on
    #                      struct.pack(), struct.unpack().
    #
    # Development taken over by Stuart Gathman <stuart@bmsi.com> since
    # Terrence is not responding to email.
    #
    # $Log$
    # Revision 1.17  2005/12/23 21:44:15  customdesigned
    # Always include keyword data in Received-SPF header.
    #
    # Revision 1.16  2005/12/01 22:42:32  customdesigned
    # improve gossip support.
    # Initialize srs_domain from srs.srs config property.  Should probably
    # always block unsigned DSN when signing all.
    #
    # Revision 1.15  2005/10/30 01:08:14  customdesigned
    # Ignore records missing spaces.
    #
    # Revision 1.14  2005/08/12 17:36:51  customdesigned
    # Trean non-existant include as no match in "lax" mode.
    #
    # Revision 1.13  2005/07/22 16:00:23  customdesigned
    # Limit CNAME chains independently of DNS lookup limit
    #
    # Revision 1.31  2005/07/22 02:11:50  customdesigned
    # Use dictionary to check for CNAME loops.  Check limit independently for
    # each top level name, just like for PTR.
    #
    # Revision 1.30  2005/07/21 20:07:31  customdesigned
    # Translate DNS error in DNSLookup.  This completely isolates DNS
    # dependencies to the DNSLookup method.
    #
    # Revision 1.29  2005/07/21 17:49:39  customdesigned
    # My best guess at what RFC intended for limiting CNAME loops.
    #
    # Revision 1.28  2005/07/21 17:37:08  customdesigned
    # Break out external DNSLookup method so that test suite can
    # duplicate CNAME loop bug.  Test zone data dictionary now
    # mirrors structure of real DNS.
    #
    # Revision 1.27  2005/07/21 15:26:06  customdesigned
    # First cut at updating docs.  Test suite is obsolete.
    #
    # Revision 1.26  2005/07/20 03:12:40  customdesigned
    # When not in strict mode, don't give PermErr for bad mechanism until
    # encountered during evaluation.
    #
    # Revision 1.25  2005/07/19 23:24:42  customdesigned
    # Validate all mechanisms before evaluating.
    #
    # Revision 1.24  2005/07/19 18:11:52  kitterma
    # Fix to change that compares type TXT and type SPF records.  Bug in the change
    # prevented records from being returned if it was published as TXT, but not SPF.
    #
    # Revision 1.23  2005/07/19 15:22:50  customdesigned
    # MX and PTR limits are MUST NOT check limits, and do not result in PermErr.
    # Also, check belongs in mx and ptr specific methods, not in dns() method.
    #
    # Revision 1.22  2005/07/19 05:02:29  customdesigned
    # FQDN test was broken.  Added test case.  Move FQDN test to after
    # macro expansion.
    #
    # Revision 1.21  2005/07/18 20:46:27  kitterma
    # Fixed reference problem in 1.20
    #
    # Revision 1.20  2005/07/18 20:21:47  kitterma
    # Change to dns_spf to go ahead and check for a type 99 (SPF) record even if a
    # TXT record is found and make sure if type SPF is present that they are
    # identical when using strict processing.
    #
    # Revision 1.19  2005/07/18 19:36:00  kitterma
    # Change to require at least one dot in a domain name.  Added PermError
    # description to indicate FQDN should be used.  This is a common error.
    #
    # Revision 1.18  2005/07/18 17:13:37  kitterma
    # Change macro processing to raise PermError on an unknown macro.
    # schlitt-spf-classic-02 para 8.1.  Change exp modifier processing to ignore
    # exp strings with syntax errors.  schlitt-spf-classic-02 para 6.2.
    #
    # Revision 1.17  2005/07/18 14:35:34  customdesigned
    # Remove debugging printf
    #
    # Revision 1.16  2005/07/18 14:34:14  customdesigned
    # Forgot to remove debugging print
    #
    # Revision 1.15  2005/07/15 21:17:36  customdesigned
    # Recursion limit raises AssertionError in strict mode, PermError otherwise.
    #
    # Revision 1.14  2005/07/15 20:34:11  customdesigned
    # Check whether DNS package already supports SPF before patching
    #
    # Revision 1.13  2005/07/15 20:01:22  customdesigned
    # Allow extended results for MX limit
    #
    # Revision 1.12  2005/07/15 19:12:09  customdesigned
    # Official IANA SPF record (type 99) support.
    #
    # Revision 1.11  2005/07/15 18:03:02  customdesigned
    # Fix unknown Received-SPF header broken by result changes
    #
    # Revision 1.10  2005/07/15 16:17:05  customdesigned
    # Start type99 support.
    # Make Scott's "/" support in parse_mechanism more elegant as requested.
    # Add test case for "/" support.
    #
    # Revision 1.9  2005/07/15 03:33:14  kitterma
    # Fix for bug 1238403 - Crash if non-CIDR / present.  Also added
    # validation check for valid IPv4 CIDR range.
    #
    # Revision 1.8  2005/07/14 04:18:01  customdesigned
    # Bring explanations and Received-SPF header into line with
    # the unknown=PermErr and error=TempErr convention.
    # Hope my case-sensitive mech fix doesn't clash with Scotts.
    #
    # Revision 1.7  2005/07/12 21:43:56  kitterma
    # Added processing to clarify some cases of unknown
    # qualifier errors (to distinguish between unknown qualifier and
    # unknown mechanism).
    # Also cleaned up comments from previous updates.
    #
    # Revision 1.6  2005/06/29 14:46:26  customdesigned
    # Distinguish trivial recursion from missing arg for diagnostic purposes.
    #
    # Revision 1.5  2005/06/28 17:48:56  customdesigned
    # Support extended processing results when a PermError should strictly occur.
    #
    # Revision 1.4  2005/06/22 15:54:54  customdesigned
    # Correct spelling.
    #
    # Revision 1.3  2005/06/22 00:08:24  kitterma
    # Changes from draft-mengwong overall DNS lookup and recursion
    # depth limits to draft-schlitt-spf-classic-02 DNS lookup, MX lookup, and
    # PTR lookup limits.  Recursion code is still present and functioning, but
    # it should be impossible to trip it.
    #
    # Revision 1.2  2005/06/21 16:46:09  kitterma
    # Updated definition of SPF, added reference to the sourceforge project site,
    # and deleted obsolete Microsoft Caller ID for Email XML translation routine.
    #
    # Revision 1.1.1.1  2005/06/20 19:57:32  customdesigned
    # Move Python SPF to its own module.
    #
    # Revision 1.5  2005/06/14 20:31:26  customdesigned
    # fix pychecker nits
    #
    # Revision 1.4  2005/06/02 04:18:55  customdesigned
    # Update copyright notices after reading article on /.
    #
    # Revision 1.3  2005/06/02 02:08:12  customdesigned
    # Reject on PermErr
    #
    # Revision 1.2  2005/05/31 18:57:59  customdesigned
    # Clear unknown mechanism list at proper time.
    #
    # Revision 1.24  2005/03/16 21:58:39  stuart
    # Change Milter module to package.
    #
    # Revision 1.22  2005/02/09 17:52:59  stuart
    # Report DNS errors as PermError rather than unknown.
    #
    # Revision 1.21  2004/11/20 16:37:03  stuart
    # Handle multi-segment TXT records.
    #
    # Revision 1.20  2004/11/19 06:10:30  stuart
    # Use PermError exception instead of reporting unknown.
    #
    # Revision 1.19  2004/11/09 23:00:18  stuart
    # Limit recursion and DNS lookups separately.
    #
    #
    # Revision 1.17  2004/09/10 18:08:26  stuart
    # Return unknown for null mechanism
    #
    # Revision 1.16  2004/09/04 23:27:06  stuart
    # More mechanism aliases.
    #
    # Revision 1.15  2004/08/30 21:19:05  stuart
    # Return unknown for invalid ip syntax in mechanism
    #
    # Revision 1.14  2004/08/23 02:28:24  stuart
    # Remove Perl usage message.
    #
    # Revision 1.13  2004/07/23 19:23:12  stuart
    # Always fail to match on ip6, until we support it properly.
    #
    # Revision 1.12  2004/07/23 18:48:15  stuart
    # Fold CID parsing into spf
    #
    # Revision 1.11  2004/07/21 21:32:01  stuart
    # Handle CID records (Microsoft XML format).
    #
    # Revision 1.10  2004/04/19 22:12:11  stuart
    # Release 0.6.9
    #
    # Revision 1.9  2004/04/18 03:29:35  stuart
    # Pass most tests except -local and -rcpt-to
    #
    # Revision 1.8  2004/04/17 22:17:55  stuart
    # Header comment method.
    #
    # Revision 1.7  2004/04/17 18:22:48  stuart
    # Support default explanation.
    #
    # Revision 1.6  2004/04/06 20:18:02  stuart
    # Fix bug in include
    #
    # Revision 1.5  2004/04/05 22:29:46  stuart
    # SPF best_guess,
    #
    # Revision 1.4  2004/03/25 03:27:34  stuart
    # Support delegation of SPF records.
    #
    # Revision 1.3  2004/03/13 12:23:23  stuart
    # Expanded result codes.  Tolerate common method misspellings.
    #
    
    __author__ = "Terence Way"
    __email__ = "terry@wayforward.net"
    __version__ = "1.6: December 18, 2003"
    MODULE = 'spf'
    
    USAGE = """To check an incoming mail request:
        % python spf.py {ip} {sender} {helo}
        % python spf.py 69.55.226.139 tway@optsw.com mx1.wayforward.net
    
    To test an SPF record:
        % python spf.py "v=spf1..." {ip} {sender} {helo}
        % python spf.py "v=spf1 +mx +ip4:10.0.0.1 -all" 10.0.0.1 tway@foo.com a    
    
    To fetch an SPF record:
        % python spf.py {domain}
        % python spf.py wayforward.net
    
    To test this script (and to output this usage message):
        % python spf.py
    """
    
    import re
    import socket  # for inet_ntoa() and inet_aton()
    import struct  # for pack() and unpack()
    import time    # for time()
    
    import DNS	# http://pydns.sourceforge.net
    if not hasattr(DNS.Type,'SPF'):
      # patch in type99 support
      DNS.Type.SPF = 99
      DNS.Type.typemap[99] = 'SPF'
      DNS.Lib.RRunpacker.getSPFdata = DNS.Lib.RRunpacker.getTXTdata
    
    def DNSLookup(name,qtype):
      try:
        req = DNS.DnsRequest(name, qtype=qtype)
        resp = req.req()
        #resp.show()
        # key k: ('wayforward.net', 'A'), value v
        return [((a['name'], a['typename']), a['data']) for a in resp.answers]
      except DNS.DNSError,x:
        raise TempError,'DNS ' + str(x)
    
    def isSPF(txt):
      "Return True if txt has SPF record signature."
      return txt.startswith('v=spf1 ') or txt == 'v=spf1'
    
    # 32-bit IPv4 address mask
    MASK = 0xFFFFFFFFL
    
    # Regular expression to look for modifiers
    RE_MODIFIER = re.compile(r'^([a-zA-Z]+)=')
    
    # Regular expression to find macro expansions
    RE_CHAR = re.compile(r'%(%|_|-|(\{[a-zA-Z][0-9]*r?[^\}]*\}))')
    
    # Regular expression to break up a macro expansion
    RE_ARGS = re.compile(r'([0-9]*)(r?)([^0-9a-zA-Z]*)')
    
    RE_CIDR = re.compile(r'/([1-9]|1[0-9]*|2[0-9]*|3[0-2]*)$')
    
    # Local parts and senders have their delimiters replaced with '.' during
    # macro expansion
    #
    JOINERS = {'l': '.', 's': '.'}
    
    RESULTS = {'+': 'pass', '-': 'fail', '?': 'neutral', '~': 'softfail',
               'pass': 'pass', 'fail': 'fail', 'unknown': 'unknown',
    	   'error': 'error', 'neutral': 'neutral', 'softfail': 'softfail',
    	   'none': 'none', 'deny': 'fail' }
    
    EXPLANATIONS = {'pass': 'sender SPF verified', 'fail': 'access denied',
                    'unknown': 'permanent error in processing',
                    'error': 'temporary error in processing',
    		'softfail': 'domain in transition',
    		'neutral': 'access neither permitted nor denied',
    		'none': ''
    		}
    
    # if set to a domain name, search _spf.domain namespace if no SPF record
    # found in source domain.
    
    DELEGATE = None
    
    # support pre 2.2.1....
    try:
    	bool, True, False = bool, True, False
    except NameError:
    	False, True = 0, 1
    	def bool(x): return not not x
    # ...pre 2.2.1
    
    # standard default SPF record for best_guess
    DEFAULT_SPF = 'v=spf1 a/24 mx/24 ptr'
    
    # maximum DNS lookups allowed
    MAX_LOOKUP = 10 #draft-schlitt-spf-classic-02 Para 10.1
    MAX_MX = 10 #draft-schlitt-spf-classic-02 Para 10.1
    MAX_PTR = 10 #draft-schlitt-spf-classic-02 Para 10.1
    MAX_CNAME = 10 # analogous interpretation to MAX_PTR
    MAX_RECURSION = 20
    ALL_MECHANISMS = ('a', 'mx', 'ptr', 'exists', 'include', 'ip4', 'ip6', 'all')
    COMMON_MISTAKES = { 'prt': 'ptr', 'ip': 'ip4', 'ipv4': 'ip4', 'ipv6': 'ip6' }
    
    class TempError(Exception):
    	"Temporary SPF error"
    
    class PermError(Exception):
    	"Permanent SPF error"
    	def __init__(self,msg,mech=None,ext=None):
    	  Exception.__init__(self,msg,mech)
    	  self.msg = msg
    	  self.mech = mech
    	  self.ext = ext
    	def __str__(self):
    	  if self.mech:
    	    return '%s: %s'%(self.msg,self.mech)
    	  return self.msg
    
    def check(i, s, h,local=None,receiver=None):
    	"""Test an incoming MAIL FROM:<s>, from a client with ip address i.
    	h is the HELO/EHLO domain name.
    
    	Returns (result, mta-status-code, explanation) where result in
    	['pass', 'unknown', 'fail', 'error', 'softfail', 'none', 'neutral' ].
    
    	Example:
    	>>> check(i='127.0.0.1', s='terry@wayforward.net', h='localhost')
    	('pass', 250, 'local connections always pass')
    
    	#>>> check(i='61.51.192.42', s='liukebing@bcc.com', h='bmsi.com')
    
    	"""
    	return query(i=i, s=s, h=h,local=local,receiver=receiver).check()
    
    class query(object):
    	"""A query object keeps the relevant information about a single SPF
    	query:
    
    	i: ip address of SMTP client
    	s: sender declared in MAIL FROM:<>
    	l: local part of sender s
    	d: current domain, initially domain part of sender s
    	h: EHLO/HELO domain
    	v: 'in-addr' for IPv4 clients and 'ip6' for IPv6 clients
    	t: current timestamp
    	p: SMTP client domain name
    	o: domain part of sender s
    
    	This is also, by design, the same variables used in SPF macro
    	expansion.
    
    	Also keeps cache: DNS cache.
    	"""
    	def __init__(self, i, s, h,local=None,receiver=None,strict=True):
    		self.i, self.s, self.h = i, s, h
    		if not s and h:
    		  self.s = 'postmaster@' + h
    		self.l, self.o = split_email(s, h)
    		self.t = str(int(time.time()))
    		self.v = 'in-addr'
    		self.d = self.o
    		self.p = None
    		if receiver:
    		  self.r = receiver
    		self.cache = {}
    		self.exps = dict(EXPLANATIONS)
    		self.local = local	# local policy
        		self.lookups = 0
    		# strict can be False, True, or 2 for harsh
    		self.strict = strict
    
    	def set_default_explanation(self,exp):
    		exps = self.exps
    		for i in 'softfail','fail','unknown':
    		  exps[i] = exp
    
    	def getp(self):
    		if not self.p:
    			p = self.dns_ptr(self.i)
    			if len(p) > 0:
    				self.p = p[0]
    			else:
    				self.p = self.i
    		return self.p
    
    	def best_guess(self,spf=DEFAULT_SPF):
    		"""Return a best guess based on a default SPF record"""
    		return self.check(spf)
    
    	def check(self, spf=None):
    		"""
    	Returns (result, mta-status-code, explanation) where result
    	in ['fail', 'softfail', 'neutral' 'unknown', 'pass', 'error', 'none']
    
    	Examples:
    	>>> q = query(s='strong-bad@email.example.com',
    	...           h='mx.example.org', i='192.0.2.3')
    	>>> q.check(spf='v=spf1 ?all')
    	('neutral', 250, 'access neither permitted nor denied')
    
    	>>> q.check(spf='v=spf1 ip4:192.0.0.0/8 ?all moo')
    	('unknown', 550, 'SPF Permanent Error: Unknown mechanism found: moo')
    
    	>>> q.check(spf='v=spf1 =a ?all moo')
    	('unknown', 550, 'SPF Permanent Error: Unknown qualifier, IETF draft para 4.6.1, found in: =a')
    
    	>>> q.check(spf='v=spf1 ip4:192.0.0.0/8 ~all')
    	('pass', 250, 'sender SPF verified')
    
    	>>> q.strict = False
    	>>> q.check(spf='v=spf1 ip4:192.0.0.0/8 -all moo')
    	('pass', 250, 'sender SPF verified')
    
    	>>> q.check(spf='v=spf1 ip4:192.1.0.0/16 moo -all')
    	('unknown', 550, 'SPF Permanent Error: Unknown mechanism found: moo')
    
    	>>> q.check(spf='v=spf1 ip4:192.1.0.0/16 ~all')
    	('softfail', 250, 'domain in transition')
    
    	>>> q.check(spf='v=spf1 -ip4:192.1.0.0/6 ~all')
    	('fail', 550, 'access denied')
    
    	# Assumes DNS available
    	>>> q.check()
    	('none', 250, '')
    		"""
    		self.mech = []		# unknown mechanisms
    		# If not strict, certain PermErrors (mispelled
    		# mechanisms, strict processing limits exceeded)
    		# will continue processing.  However, the exception
    		# that strict processing would raise is saved here
    		self.perm_error = None
    		if self.i.startswith('127.'):
    			return ('pass', 250, 'local connections always pass')
    
    		try:
    			self.lookups = 0
    			if not spf:
    			    spf = self.dns_spf(self.d)
    			if self.local and spf:
    			    spf += ' ' + self.local
    			rc = self.check1(spf, self.d, 0)
    			if self.perm_error:
    			  # extended processing succeeded, but strict failed
    			  self.perm_error.ext = rc
    			  raise self.perm_error
    			return rc
    		except TempError,x:
    			return ('error', 450, 'SPF Temporary Error: ' + str(x))
    		except PermError,x:
    		    self.prob = x.msg
    		    if x.mech:
    		      self.mech.append(x.mech)
    		    # Pre-Lentczner draft treats this as an unknown result
    		    # and equivalent to no SPF record.
    		    return ('unknown', 550, 'SPF Permanent Error: ' + str(x))
    
    	def check1(self, spf, domain, recursion):
    		# spf rfc: 3.7 Processing Limits
    		#
    		if recursion > MAX_RECURSION:
    			# This should never happen in strict mode
    			# because of the other limits we check,
    			# so if it does, there is something wrong with
    			# our code.  It is not a PermError because there is not
    			# necessarily anything wrong with the SPF record.
    			if self.strict:
    			  raise AssertionError('Too many levels of recursion')
    			# As an extended result, however, it should be
    			# a PermError.
    			raise PermError('Too many levels of recursion')
    		try:
    			tmp, self.d = self.d, domain
    			return self.check0(spf,recursion)
    		finally:
    			self.d = tmp
    
    	def validate_mechanism(self,mech):
    		"""Parse and validate a mechanism.
    	Returns mech,m,arg,cidrlength,result
    
    	Examples:
    	>>> q = query(s='strong-bad@email.example.com',
    	...           h='mx.example.org', i='192.0.2.3')
    	>>> q.validate_mechanism('A')
    	('A', 'a', 'email.example.com', 32, 'pass')
    
    	>>> q.validate_mechanism('?mx:%{d}/27')
    	('?mx:%{d}/27', 'mx', 'email.example.com', 27, 'neutral')
    
    	>>> q.validate_mechanism('-mx::%%%_/.Clara.de/27')
    	('-mx::%%%_/.Clara.de/27', 'mx', ':% /.Clara.de', 27, 'fail')
    
    	>>> q.validate_mechanism('~exists:%{i}.%{s1}.100/86400.rate.%{d}')
    	('~exists:%{i}.%{s1}.100/86400.rate.%{d}', 'exists', '192.0.2.3.com.100/86400.rate.email.example.com', 32, 'softfail')
    		"""
    		# a mechanism
    		m, arg, cidrlength = parse_mechanism(mech, self.d)
    		# map '?' '+' or '-' to 'unknown' 'pass' or 'fail'
    		if m:
    		  result = RESULTS.get(m[0])
    		  if result:
    			# eat '?' '+' or '-'
    			m = m[1:]
    		  else:
    			# default pass
    			result = 'pass'
    		if m in COMMON_MISTAKES:
    		  try:
    		    raise PermError('Unknown mechanism found',mech)
    		  except PermError, x:
    		    if self.strict: raise
    		    m = COMMON_MISTAKES[m]
    		    if not self.perm_error:
    		      self.perm_error = x
    		  
    		if m in ('a', 'mx', 'ptr', 'exists', 'include'):
    		  arg = self.expand(arg)
    		  if not (0 < arg.find('.') < len(arg) - 1):
    		    raise PermError('Invalid domain found (use FQDN)',
    			  arg)
    		  if m == 'include':
    		    if arg == self.d:
    		      if mech != 'include':
    			raise PermError('include has trivial recursion',mech)
    		      raise PermError('include mechanism missing domain',mech)
    		  return mech,m,arg,cidrlength,result
    		if m in ALL_MECHANISMS:
    		  return mech,m,arg,cidrlength,result
    		try:
    		  if m[1:] in ALL_MECHANISMS:
    		    raise PermError(
    		      'Unknown qualifier, IETF draft para 4.6.1, found in',
    		      mech)
    		  raise PermError('Unknown mechanism found',mech)
    		except PermError, x:
    		  if self.strict: raise
    		  return mech,m,arg,cidrlength,x
    
    	def check0(self, spf,recursion):
    		"""Test this query information against SPF text.
    
    		Returns (result, mta-status-code, explanation) where
    		result in ['fail', 'unknown', 'pass', 'none']
    		"""
    
    		if not spf:
    			return ('none', 250, EXPLANATIONS['none'])
    
    		# split string by whitespace, drop the 'v=spf1'
    		spf = spf.split()
    		# Catch case where SPF record has no spaces
    		# Can never happen with conforming dns_spf(), however
    		# in the future we might want to give permerror
    		# for common mistakes like IN TXT "v=spf1" "mx" "-all"
    		# in relaxed mode.
    		if spf[0] != 'v=spf1':   
    		    raise PermError('Invalid SPF record in', self.d)
    		spf = spf[1:]
    
    		# copy of explanations to be modified by exp=
    		exps = self.exps
    		redirect = None
    
    		# no mechanisms at all cause unknown result, unless
    		# overridden with 'default=' modifier
    		#
    		default = 'neutral'
    		mechs = []
    
    		# Look for modifiers
    		#
    		for mech in spf:
    		    m = RE_MODIFIER.split(mech)[1:]
    		    if len(m) != 2:
    		      mechs.append(self.validate_mechanism(mech))
    		      continue
    
    		    if m[0] == 'exp':
                            try:
                                self.set_default_explanation(self.get_explanation(m[1]))
                            except PermError:
                                pass
    		    elif m[0] == 'redirect':
    		        self.check_lookups()
    			redirect = self.expand(m[1])
    		    elif m[0] == 'default':
    			# default=- is the same as default=fail
    			default = RESULTS.get(m[1], default)
    
    		    # spf rfc: 3.6 Unrecognized Mechanisms and Modifiers
    
    		# Evaluate mechanisms
    		#
    		for mech,m,arg,cidrlength,result in mechs:
    
    		    if m == 'include':
    		      self.check_lookups()
    		      res,code,txt = self.check1(self.dns_spf(arg),
    					arg, recursion + 1)
    		      if res == 'pass':
    			break
    		      if res == 'none':
    			try:
    			  if self.strict or not self.perm_error:
    			    raise PermError(
    			      'No valid SPF record for included domain: %s'%arg,
    			      mech)
    			except PermError,x:
    			  if self.strict:
    			    raise x
    			  self.perm_error = x
    		      continue
    		    elif m == 'all':
    			    break
    
    		    elif m == 'exists':
    		        self.check_lookups()
    			if len(self.dns_a(arg)) > 0:
    				break
    
    		    elif m == 'a':
    		        self.check_lookups()
    			if cidrmatch(self.i, self.dns_a(arg), cidrlength):
    			      break
    
    		    elif m == 'mx':
    		        self.check_lookups()
    			if cidrmatch(self.i, self.dns_mx(arg), cidrlength):
    			      break
    
    		    elif m == 'ip4' and arg != self.d:
    			try:
    			    if cidrmatch(self.i, [arg], cidrlength):
    				break
    			except socket.error:
    			    raise PermError('syntax error',mech)
    			    
    		    elif m == 'ip6':
    			# Until we support IPV6, we should never
    			# get an IPv6 connection.  So this mech
    			# will never match.
    			pass
    
    		    elif m == 'ptr':
    		        self.check_lookups()
    			if domainmatch(self.validated_ptrs(self.i), arg):
    				break
    
    		    else:
    		      raise result
    		else:
    		    # no matches
    		    if redirect:
    			return self.check1(self.dns_spf(redirect),
    					       redirect, recursion + 1)
    		    else:
    			result = default
    
    		if result == 'fail':
    		    return (result, 550, exps[result])
    		else:
    		    return (result, 250, exps[result])
    
    	def check_lookups(self):
    	    self.lookups = self.lookups + 1
    	    if self.lookups > MAX_LOOKUP:
    	      try:
    		if self.strict or not self.perm_error:
    		  raise PermError('Too many DNS lookups')
    	      except PermError,x:
    		if self.strict or self.lookups > MAX_LOOKUP*4:
    		  raise x
    		self.perm_error = x
    
    	def get_explanation(self, spec):
    		"""Expand an explanation."""
    		if spec:
    		  return self.expand(''.join(self.dns_txt(self.expand(spec))))
    		else:
    		  return 'explanation : Required option is missing'
    
    	def expand(self, str):
    		"""Do SPF RFC macro expansion.
    
    		Examples:
    		>>> q = query(s='strong-bad@email.example.com',
    		...           h='mx.example.org', i='192.0.2.3')
    		>>> q.p = 'mx.example.org'
    
    		>>> q.expand('%{d}')
    		'email.example.com'
    
    		>>> q.expand('%{d4}')
    		'email.example.com'
    
    		>>> q.expand('%{d3}')
    		'email.example.com'
    
    		>>> q.expand('%{d2}')
    		'example.com'
    
    		>>> q.expand('%{d1}')
    		'com'
    
    		>>> q.expand('%{p}')
    		'mx.example.org'
    
    		>>> q.expand('%{p2}')
    		'example.org'
    
    		>>> q.expand('%{dr}')
    		'com.example.email'
    	
    		>>> q.expand('%{d2r}')
    		'example.email'
    
    		>>> q.expand('%{l}')
    		'strong-bad'
    
    		>>> q.expand('%{l-}')
    		'strong.bad'
    
    		>>> q.expand('%{lr}')
    		'strong-bad'
    
    		>>> q.expand('%{lr-}')
    		'bad.strong'
    
    		>>> q.expand('%{l1r-}')
    		'strong'
    
    		>>> q.expand('%{ir}.%{v}._spf.%{d2}')
    		'3.2.0.192.in-addr._spf.example.com'
    
    		>>> q.expand('%{lr-}.lp._spf.%{d2}')
    		'bad.strong.lp._spf.example.com'
    
    		>>> q.expand('%{lr-}.lp.%{ir}.%{v}._spf.%{d2}')
    		'bad.strong.lp.3.2.0.192.in-addr._spf.example.com'
    
    		>>> q.expand('%{ir}.%{v}.%{l1r-}.lp._spf.%{d2}')
    		'3.2.0.192.in-addr.strong.lp._spf.example.com'
    
    		>>> q.expand('%{p2}.trusted-domains.example.net')
    		'example.org.trusted-domains.example.net'
    
    		>>> q.expand('%{p2}.trusted-domains.example.net')
    		'example.org.trusted-domains.example.net'
    
    		"""
    		end = 0
    		result = ''
    		for i in RE_CHAR.finditer(str):
    			result += str[end:i.start()]
    			macro = str[i.start():i.end()]
    			if macro == '%%':
    				result += '%'
    			elif macro == '%_':
    				result += ' '
    			elif macro == '%-':
    				result += '%20'
    			else:
    				letter = macro[2].lower()
    				if letter == 'p':
    					self.getp()
    				expansion = getattr(self, letter, 'Macro Error')
    				if expansion:
                                            if expansion == 'Macro Error':
                                                raise PermError('Unknown Macro Encountered') 
    					result += expand_one(expansion,
    						macro[3:-1],
    					        JOINERS.get(letter))
    
    			end = i.end()
    		return result + str[end:]
    
    	def dns_spf(self, domain):
    		"""Get the SPF record recorded in DNS for a specific domain
    		name.  Returns None if not found, or if more than one record
    		is found.
    		"""
    		# for performance, check for most common case of TXT first
    		a = [t for t in self.dns_txt(domain) if isSPF(t)]
    		if len(a) == 1 and self.strict < 2:
    		    return a[0]   			
    		# check official SPF type first when it becomes more popular
    		b = [t for t in self.dns_99(domain) if isSPF(t)]
    		if len(b) == 1:
    		    # FIXME: really must fully parse each record
    		    # and compare with appropriate parts case insensitive.
    		    if self.strict >= 2 and len(a) == 1 and a[0] != b[0]:
    		        raise PermError(
    'v=spf1 records of both type TXT and SPF (type 99) present, but not identical')
    		    return b[0]
    		if len(a) == 1:
    		    return a[0]	# return TXT if SPF wasn't found
    		if DELEGATE:	# use local record if neither found
    		    a = [t
    		      for t in self.dns_txt(domain+'._spf.'+DELEGATE)
    			if isSPF(t)
    		    ]
    		    if len(a) == 1: return a[0]
    		return None
    
    	def dns_txt(self, domainname):
    		"Get a list of TXT records for a domain name."
    		if domainname:
    		  return [''.join(a) for a in self.dns(domainname, 'TXT')]
    		return []
    	def dns_99(self, domainname):
    		"Get a list of type SPF=99 records for a domain name."
    		if domainname:
    		  return [''.join(a) for a in self.dns(domainname, 'SPF')]
    		return []
    
    	def dns_mx(self, domainname):
    		"""Get a list of IP addresses for all MX exchanges for a
    		domain name.
    		"""
    # draft-schlitt-spf-classic-02 section 5.4 "mx"
    # To prevent DoS attacks, more than 10 MX names MUST NOT be looked up
    		if self.strict:
    		  max = MAX_MX
    		else:
    		  max = MAX_MX * 4
    		return [a for mx in self.dns(domainname, 'MX')[:max] \
    		          for a in self.dns_a(mx[1])]
    
    	def dns_a(self, domainname):
    		"""Get a list of IP addresses for a domainname."""
    		if domainname:
    		  return self.dns(domainname, 'A')
    		return []
    
    	def dns_aaaa(self, domainname):
    		"""Get a list of IPv6 addresses for a domainname."""
    		return self.dns(domainname, 'AAAA')
    
    	def validated_ptrs(self, i):
    		"""Figure out the validated PTR domain names for a given IP
    		address.
    		"""
    # To prevent DoS attacks, more than 10 PTR names MUST NOT be looked up
    		if self.strict:
    		  max = MAX_PTR
    		else:
    		  max = MAX_PTR * 4
    		return [p for p in self.dns_ptr(i)[:max] if i in self.dns_a(p)]
    
    	def dns_ptr(self, i):
    		"""Get a list of domain names for an IP address."""
    		return self.dns(reverse_dots(i) + ".in-addr.arpa", 'PTR')
    
    	def dns(self, name, qtype, cnames=None):
    		"""DNS query.
    
    		If the result is in cache, return that.  Otherwise pull the
    		result from DNS, and cache ALL answers, so additional info
    		is available for further queries later.
    
    		CNAMEs are followed.
    
    		If there is no data, [] is returned.
    
    		pre: qtype in ['A', 'AAAA', 'MX', 'PTR', 'TXT', 'SPF']
    		post: isinstance(__return__, types.ListType)
    		"""
    		result = self.cache.get( (name, qtype) )
    		cname = None
    		if not result:
    			for k,v in DNSLookup(name,qtype):
    			    if k == (name, 'CNAME'):
    				cname = v
    			    self.cache.setdefault(k, []).append(v)
    			result = self.cache.get( (name, qtype), [])
    		if not result and cname:
    			if not cnames:
    			  cnames = {}
    			elif len(cnames) >= MAX_CNAME:
    			  raise PermError(
    			    'Length of CNAME chain exceeds %d' % MAX_CNAME)
    			cnames[name] = cname
    			if cname in cnames:
    			  raise PermError,'CNAME loop'
    			result = self.dns(cname, qtype, cnames=cnames)
    		return result
    
    	def get_header(self,res,receiver=None):
    	  if not receiver:
    	    receiver = self.r
    	  if res in ('unknown','permerror'):
    	    txt = ' '.join([res] + self.mech)
    	  else:
    	    txt = res
    	  return '%s (%s: %s) client-ip=%s; envelope-from=%s; helo=%s;' % (
    	  	txt,receiver,self.get_header_comment(res),self.i,
    	        self.l + '@' + self.o, self.h)
    
    	def get_header_comment(self,res):
    		"""Return comment for Received-SPF header.
    		"""
    		sender = self.o
    		if res == 'pass':
    		  if self.i.startswith('127.'):
    		    return "localhost is always allowed."
    		  else: return \
    		    "domain of %s designates %s as permitted sender" \
    			% (sender,self.i)
    		elif res == 'softfail': return \
          "transitioning domain of %s does not designate %s as permitted sender" \
    			% (sender,self.i)
    		elif res == 'neutral': return \
    		    "%s is neither permitted nor denied by domain of %s" \
    		    	% (self.i,sender)
    		elif res == 'none': return \
    		    "%s is neither permitted nor denied by domain of %s" \
    		    	% (self.i,sender)
    		    #"%s does not designate permitted sender hosts" % sender
    		elif res in ('unknown','permerror'): return \
    		    "permanent error in processing domain of %s: %s" \
    		    	% (sender, self.prob)
    		elif res in ('error','temperror'): return \
    		    "temporary error in processing during lookup of %s" % sender
    		elif res == 'fail': return \
    		    "domain of %s does not designate %s as permitted sender" \
    			% (sender,self.i)
    		raise ValueError("invalid SPF result for header comment: "+res)
    
    def split_email(s, h):
    	"""Given a sender email s and a HELO domain h, create a valid tuple
    	(l, d) local-part and domain-part.
    
    	Examples:
    	>>> split_email('', 'wayforward.net')
    	('postmaster', 'wayforward.net')
    
    	>>> split_email('foo.com', 'wayforward.net')
    	('postmaster', 'foo.com')
    
    	>>> split_email('terry@wayforward.net', 'optsw.com')
    	('terry', 'wayforward.net')
    	"""
    	if not s:
    		return 'postmaster', h
    	else:
    		parts = s.split('@', 1)
    		if len(parts) == 2:
    			return tuple(parts)
    		else:
    			return 'postmaster', s
    
    def parse_mechanism(str, d):
    	"""Breaks A, MX, IP4, and PTR mechanisms into a (name, domain,
    	cidr) tuple.  The domain portion defaults to d if not present,
    	the cidr defaults to 32 if not present.
    
    	Examples:
    	>>> parse_mechanism('a', 'foo.com')
    	('a', 'foo.com', 32)
    
    	>>> parse_mechanism('a:bar.com', 'foo.com')
    	('a', 'bar.com', 32)
    
    	>>> parse_mechanism('a/24', 'foo.com')
    	('a', 'foo.com', 24)
    
    	>>> parse_mechanism('A:foo:bar.com/16', 'foo.com')
    	('a', 'foo:bar.com', 16)
    
    	>>> parse_mechanism('-exists:%{i}.%{s1}.100/86400.rate.%{d}','foo.com')
    	('-exists', '%{i}.%{s1}.100/86400.rate.%{d}', 32)
    
    	>>> parse_mechanism('mx::%%%_/.Claranet.de/27','foo.com')
    	('mx', ':%%%_/.Claranet.de', 27)
    
    	>>> parse_mechanism('mx:%{d}/27','foo.com')
    	('mx', '%{d}', 27)
    
    	>>> parse_mechanism('iP4:192.0.0.0/8','foo.com')
    	('ip4', '192.0.0.0', 8)
    	"""
    	a = RE_CIDR.split(str)
    	if len(a) == 3:
    		a, port = a[0], int(a[1])
    	else:
    		a, port = str, 32
    
    	b = a.split(':',1)
    	if len(b) == 2:
    		return b[0].lower(), b[1], port
    	else:
    		return a.lower(), d, port
    
    def reverse_dots(name):
    	"""Reverse dotted IP addresses or domain names.
    
    	Example:
    	>>> reverse_dots('192.168.0.145')
    	'145.0.168.192'
    
    	>>> reverse_dots('email.example.com')
    	'com.example.email'
    	"""
    	a = name.split('.')
    	a.reverse()
    	return '.'.join(a)
    
    def domainmatch(ptrs, domainsuffix):
    	"""grep for a given domain suffix against a list of validated PTR
    	domain names.
    
    	Examples:
    	>>> domainmatch(['FOO.COM'], 'foo.com')
    	1
    
    	>>> domainmatch(['moo.foo.com'], 'FOO.COM')
    	1
    
    	>>> domainmatch(['moo.bar.com'], 'foo.com')
    	0
    
    	"""
    	domainsuffix = domainsuffix.lower()
    	for ptr in ptrs:
    		ptr = ptr.lower()
    
    		if ptr == domainsuffix or ptr.endswith('.' + domainsuffix):
    			return True
    
    	return False
    
    def cidrmatch(i, ipaddrs, cidr_length = 32):
    	"""Match an IP address against a list of other IP addresses.
    
    	Examples:
    	>>> cidrmatch('192.168.0.45', ['192.168.0.44', '192.168.0.45'])
    	1
    
    	>>> cidrmatch('192.168.0.43', ['192.168.0.44', '192.168.0.45'])
    	0
    
    	>>> cidrmatch('192.168.0.43', ['192.168.0.44', '192.168.0.45'], 24)
    	1
    	"""
    	c = cidr(i, cidr_length)
    	for ip in ipaddrs:
    		if cidr(ip, cidr_length) == c:
    			return True
    	return False
    
    def cidr(i, n):
    	"""Convert an IP address string with a CIDR mask into a 32-bit
    	integer.
    
    	i must be a string of numbers 0..255 separated by dots '.'::
    	pre: forall([0 <= int(p) < 256 for p in i.split('.')])
    
    	n is a number of bits to mask::
    	pre: 0 <= n <= 32
    
    	Examples:
    	>>> bin2addr(cidr('192.168.5.45', 32))
    	'192.168.5.45'
    	>>> bin2addr(cidr('192.168.5.45', 24))
    	'192.168.5.0'
    	>>> bin2addr(cidr('192.168.0.45', 8))
    	'192.0.0.0'
    	"""
    	return ~(MASK >> n) & MASK & addr2bin(i)
    
    def addr2bin(str):
    	"""Convert a string IPv4 address into an unsigned integer.
    
    	Examples::
    	>>> addr2bin('127.0.0.1')
    	2130706433L
    
    	>>> addr2bin('127.0.0.1') == socket.INADDR_LOOPBACK
    	1
    
    	>>> addr2bin('255.255.255.254')
    	4294967294L
    
    	>>> addr2bin('192.168.0.1')
    	3232235521L
    
    	Unlike DNS.addr2bin, the n, n.n, and n.n.n forms for IP addresses
    	are handled as well::
    	>>> addr2bin('10.65536')
    	167837696L
    	>>> 10 * (2 ** 24) + 65536
    	167837696
    
    	>>> addr2bin('10.93.512')
    	173867520L
    	>>> 10 * (2 ** 24) + 93 * (2 ** 16) + 512
    	173867520
    	"""
    	return struct.unpack("!L", socket.inet_aton(str))[0]
    
    def bin2addr(addr):
    	"""Convert a numeric IPv4 address into string n.n.n.n form.
    
    	Examples::
    	>>> bin2addr(socket.INADDR_LOOPBACK)
    	'127.0.0.1'
    
    	>>> bin2addr(socket.INADDR_ANY)
    	'0.0.0.0'
    
    	>>> bin2addr(socket.INADDR_NONE)
    	'255.255.255.255'
    	"""
    	return socket.inet_ntoa(struct.pack("!L", addr))
    
    def expand_one(expansion, str, joiner):
    	if not str:
    		return expansion
    	ln, reverse, delimiters = RE_ARGS.split(str)[1:4]
    	if not delimiters:
    		delimiters = '.'
    	expansion = split(expansion, delimiters, joiner)
    	if reverse: expansion.reverse()
    	if ln: expansion = expansion[-int(ln)*2+1:]
    	return ''.join(expansion)
    
    def split(str, delimiters, joiner=None):
    	"""Split a string into pieces by a set of delimiter characters.  The
    	resulting list is delimited by joiner, or the original delimiter if
    	joiner is not specified.
    
    	Examples:
    	>>> split('192.168.0.45', '.')
    	['192', '.', '168', '.', '0', '.', '45']
    
    	>>> split('terry@wayforward.net', '@.')
    	['terry', '@', 'wayforward', '.', 'net']
    
    	>>> split('terry@wayforward.net', '@.', '.')
    	['terry', '.', 'wayforward', '.', 'net']
    	"""
    	result, element = [], ''
    	for c in str:
    		if c in delimiters:
    			result.append(element)
    			element = ''
    			if joiner:
    				result.append(joiner)
    			else:
    				result.append(c)
    		else:
    			element += c
    	result.append(element)
    	return result
    
    def _test():
    	import doctest, spf
    	return doctest.testmod(spf)
    
    DNS.DiscoverNameServers() # Fails on Mac OS X? Add domain to /etc/resolv.conf
    
    if __name__ == '__main__':
    	import sys
    	if len(sys.argv) == 1:
    		print USAGE
    		_test()
    	elif len(sys.argv) == 2:
    		q = query(i='127.0.0.1', s='localhost', h='unknown',
    			receiver=socket.gethostname())
    		print q.dns_spf(sys.argv[1])
    	elif len(sys.argv) == 4:
    		print check(i=sys.argv[1], s=sys.argv[2], h=sys.argv[3],
    			receiver=socket.gethostname())
    	elif len(sys.argv) == 5:
    		i, s, h = sys.argv[2:]
    		q = query(i=i, s=s, h=h, receiver=socket.gethostname(),
    			strict=False)
    		print q.check(sys.argv[1])
    		if q.perm_error: print q.perm_error.ext
    	else:
    		print USAGE