![Oracle Drags Its Feet in the JavaScript Trademark Dispute](https://cdn.sanity.io/images/cgdhsj6q/production/919c3b22c24f93884c548d60cbb338e819ff2435-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
github.com/fzerorubigd/smtpd
An SMTP server package written in Go.
This code is based on mhale/smtpd which is also based on Brad Fitzpatrick's go-smtpd.
I refactored the code, almost entirely, the main addition was :
In general: create the server and pass a handler function to it as for the HTTP server. the usage is like this:
srv , err := smtpd.NewServer(
smtpd.WithAddress(":2525"),
smtpd.WithAppName("appname"),
smtpd.WithHostname("hostname"),
smtpd.WithDebug(debugHandler),
smtpd.AllowAuthMechanisms("LOGIN", true),
)
// Handle the err ...
// Then run the server
err = srv.ListenAndServeContext(ctx)
// Handle the err ...
Error handling is ignored in th example.
For TLS support, add the paths to the certificate and key files as for the HTTP server using the WithTLS
and WithTLSPassphrase
options.
The handler function must have the following definition:
func handler(remoteAddr net.Addr, from string, to []string, data []byte)
The parameters are:
SMTP over TLS works slightly differently to how you might expect if you are used to the HTTP protocol. Some helpful links for background information are:
The TLS support has three server configuration options. The bare minimum requirement to enable TLS is to supply certificate and key files as in the TLS example below.
WithTLS
and WithTLSPassphrase
This option allows custom TLS configurations such as requiring strong ciphers or using other certificate creation methods. If a certificate file and a key file are supplied to the ConfigureTLS function, the default TLS configuration for Go will be used. The default value for TLSConfig is nil, which disables TLS support.
RequireTLS
This option sets whether TLS is optional or required. If set to true, the only allowed commands are NOOP, EHLO, STARTTLS and QUIT (as specified in RFC 3207) until the connection is upgraded to TLS i.e. until STARTTLS is issued. This option is ignored if TLS is not configured i.e. if TLSConfig is nil. The default is false.
OnlyTLS
This option sets whether the listening socket requires an immediate TLS handshake after connecting. It is equivalent to using HTTPS in web servers, or the now defunct SMTPS on port 465. This option is ignored if TLS is not configured i.e. if TLSConfig is nil. The default is false.
There is also a related package configuration option.
WithDebug
This option determines if the data being read from or written to the client will be logged. This may help with debugging when using encrypted connections. The default is false.
The authentication support offers three mechanisms (CRAM-MD5, LOGIN and PLAIN) and has three server configuration options. The bare minimum requirement to enable authentication is to supply an authentication handler function as in the authentication example below.
WithAuthHandler
This option provides an authentication handler function which is called to determine the validity of the supplied credentials. Also, this option sets whether authentication is optional or required. If set to true, the only allowed commands are AUTH, EHLO, HELO, NOOP, RSET and QUIT (as specified in RFC 4954) until the session is authenticated. This option is ignored if authentication is not configured i.e. if AuthHandler is nil. The default is false. If both TLS and authentication are required, the TLS requirements take priority.
AllowAuthMechanisms
This option allows the list of allowed authentication mechanisms to be explicitly set, overriding the default settings.
RFC 4954 specifies that the LOGIN and PLAIN mechanisms require TLS to be in use as they send the password in plaintext. By default, smtpd follows this requirement, and will not advertise or allow LOGIN and PLAIN until a TLS connection is established. This behaviour can be overridden during testing by using the AuthMechs option. For example, to enable the PLAIN mechanism regardless of TLS:
AllowAuthMechanisms("PLAIN", true)
The LOGIN and PLAIN mechanisms send the password to the server, but CRAM-MD5 does not - it sends a hash of the password, with a salt supplied by the server. In order to authenticate a session using CRAM-MD5, the server must have access to the plaintext password so it can hash it with the same salt and compare it to the hash sent by the client. If passwords are stored in a hashed format (and they should be), they cannot be transformed into plaintext, and therefore CRAM-MD5 cannot be used. To disable the CRAM-MD5 mechanism:
AllowAuthMechanisms("CRAM-MD5", false)
The Go SMTP client cancels the authentication exchange by sending an asterisk to the server after a failed authentication attempt. The server will ignore this behaviour.
The following example code creates a new server with the name "MyServerApp" that listens on the localhost address and port 2525. Upon receipt of a new mail message, the handler function parses the mail and prints the subject header.
package main
import (
"bytes"
"log"
"net"
"net/mail"
"github.com/fzerorubigd/smtpd"
)
func mailHandler(origin net.Addr, from string, to []string, data []byte) {
msg, _ := mail.ReadMessage(bytes.NewReader(data))
subject := msg.Header.Get("Subject")
log.Printf("Received mail from %s for %s with subject %s", from, to[0], subject)
}
func main() {
srv , err := smtpd.NewServer(
mailHandler,
smtpd.WithAddress("127.0.0.1:2525"),
smtpd.WithAppName("MyServerApp"),
)
if err != nil {
panic(err)
}
if err = srv.ListenAndServe() ; err != nil {
panic(err)
}
}
Using the example code above, only adding the following option (or the one with passphrase) to the NewServer
function
// Only if you want to use TLS :
smtpd.WithTLS("/path/to/server.crt", "/path/to/server.key")
This allows STARTTLS to be listed as a supported extension and allows clients to upgrade connections to TLS by sending a STARTTLS command.
As the package level helper functions do not set the TLSRequired or TLSListener options for compatibility reasons, manual creation of a Server struct is necessary in order to use them.
With the same mailHandler
as above:
// Add this option to NewServer
smtpd.WithRcptHandler(
func (remoteAddr net.Addr, from string, to string) bool {
domain = getDomain(to)
return domain == "mail.example.com"
})
With the same mailHandler
as above:
smtpd.WithAuthHandler(
func (remoteAddr net.Addr, mechanism string, username []byte, password []byte, shared []byte) (bool, error) {
return string(username) == "valid" && string(password) == "password", nil
}, true,
)
This allows AUTH to be listed as a supported extension, CRAM-MD5
as a supported mechanism, and allows clients to authenticate by sending an AUTH command.
The tests cover the supported SMTP command set and line parsing. A single server is created listening on an ephemeral port (52525) for the duration of the tests. Each test creates a new client connection for processing commands.
For the TLS, size and authentication tests, a different server is created with a net.Pipe connection inside each individual test, in order to change the server settings for each test.
The TLS and authentication support has also been manually tested with Go client code, Ruby client code, and macOS's Mail.app.
Some of the code in this package was copied or adapted from code found in Brad Fitzpatrick's go-smtpd. As such, those sections of code are subject to their original copyright and license. The remaining code from mhale/smtpd is in public domain. the code in this library is MIT (Not sure if I can change the License).
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.