Socket
Socket
Sign inDemoInstall

smtp-server

Package Overview
Dependencies
0
Maintainers
1
Versions
65
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

    smtp-server

Create custom SMTP servers on the fly


Version published
Weekly downloads
128K
decreased by-1.69%
Maintainers
1
Install size
114 kB
Created
Weekly downloads
 

Changelog

Source

v1.6.0 2015-09-29

  • Catch errors thrown by dns.reverse on invalid remoteAddress values
  • Added onConnect handler to block unwanted connections (66784aea by jleal52)

Readme

Source

smtp-server

Create SMTP server instances on the fly. This is not a full-blown server application like Haraka but an easy way to add custom SMTP listeners to your app. This module is the successor for the server part of the (now deprecated) SMTP module simplesmtp. For matching SMTP client see smtp-connection.

Build Status npm version

Requires Node v0.12 or iojs. The module does not run on Node v0.10 as it uses Buffer.compare and TLSSocket.

Support smtp-server development

Donate to author

Usage

Install with npm

npm install smtp-server

Require in your script

var SMTPServer = require('smtp-server').SMTPServer;

Create SMTPServer instance

var server = new SMTPServer(options);

Where

  • options defines the behavior of the server
    • options.secure defines if the connection should use TLS (if true) or not (the default). See tls.createServer for additional options you can use with the options object to set up the server when using secure. If the server does not start in TLS mode, then it is still possible to upgrade clear text socket to TLS socket with the STARTTLS command (unless you disable support for it)
    • options.name optional hostname of the server, used for identifying to the client (defaults to os.hostname())
    • options.banner optional greeting message. This message is appended to the default ESMTP response.
    • options.size optional maximum allowed message size in bytes, see details here
    • options.authMethods optional array of allowed authentication methods, defaults to ['PLAIN', 'LOGIN']. Only the methods listed in this array are allowed, so if you set it to ['XOAUTH2'] then PLAIN and LOGIN are not available. Use ['PLAIN', 'LOGIN', 'XOAUTH2'] to allow all three. Authentication is only allowed in secure mode (either the server is started with secure: true option or STARTTLS command is used)
    • options.disabledCommands optional array of disabled commands (see all supported commands here). For example if you want to disable authentication, use ['AUTH'] as this value. If you want to allow authentication in clear text, set it to ['STARTTLS'].
    • options.hideSTARTTLS optional boolean, if set to true then allow using STARTTLS but do not advertise or require it. It only makes sense when creating integration test servers for testing the scenario where you want to try STARTTLS even when it is not advertised
    • options.sniOptions optional Map or an object of TLS options for SNI where servername is the key
    • options.logger optional bunyan compatible logger instance. By default logs to console. If set to false then nothing is logged
    • options.maxClients sets the maximum number of concurrently connected clients, defaults to Infinity
    • options.useProxy boolean, if set to true expects to be behind a proxy that emits a PROXY header (version 1 only)
    • options.socketTimeout how many milliseconds of inactivity to allow before disconnecting the client (defaults to 1 minute)
    • options.closeTimeout how many millisceonds to wait before disconnecting pending connections once server.close() has been called (defaults to 30 seconds)
    • options.onAuth is the callback to handle authentications (see details here)
    • options.onConnect is the callback to handle the client connection. (see details here)
    • options.onMailFrom is the callback to validate MAIL FROM commands (see details here)
    • options.onRcptTo is the callback to validate RCPT TO commands (see details here)
    • options.onData is the callback to handle incoming messages (see details here)

Additionally you can use the options from net.createServer and tls.createServer (applies if secure is set to true)

TLS and STARTLS notice

If you use secure: true option or you do not disable STARTTLS command then you SHOULD also define the key, cert and possibly ca properties to use a proper certificate. If you do no specify your own certificate then a pregenerated self-signed certificate for 'localhost' is used. Any respectful client refuses to accept such certificate.

Example

// This example starts a SMTP server using TLS with your own certificate and key
var server = new SMTPServer({
    secure: true,
    key: fs.readFileSync('private.key'),
    cert: fs.readFileSync('server.crt')
});
server.listen(465);

Start the server instance

server.listen(port[,host][,callback]);

Where

  • port is the port number to bound to
  • host is the optional host to bound to
  • callback is called once the server is bound

Handling errors

Errors can be handled by setting an 'error' event listener to the server instance

server.on('error', function(err){
    console.log('Error %s', err.message);
});

Handling Authentication

Authentication calls can be handled with onAuth handler

var server = new SMTPServer({
    onAuth: function(auth, session, callback){}
});

Where

  • auth is an authentication object
    • method indicates the authentication method used, 'PLAIN', 'LOGIN' or 'XOAUTH2'
    • username is the username of the user
    • password is the password if LOGIN or PLAIN was used
    • accessToken is the OAuth2 bearer access token if 'XOAUTH2' was used as the authentication method
    • validatePassword is a function for validating CRAM-MD5 challenge responses. Takes the password of the user as an argument and returns true if the response matches the password
  • session includes information about the session like remoteAddress for the remote IP, see details here
  • callback is the function to run once the user is authenticated. Takes 2 arguments: (error, response)
    • error is an error to return if authentication failed. If you want to set custom error code, set responseCode to the error object
    • response is an object with the authentication results
      • user can be any value - if this is set then the user is considered logged in and this value is used later with the session data to identify the user. If this value is empty, then the authentication is considered failed
      • data is an object to return if XOAUTH2 authentication failed (do not set the error object in this case). This value is serialized to JSON and base64 encoded automatically, so you can just return the object

This module supports CRAM-MD5 but the use of it is discouraged as it requires access to unencrypted user passwords during the authentication process. You shouldn't store passwords unencrypted.

Examples

Password based authentication
var server = new SMTPServer({
    onAuth: function(auth, session, callback){
        if(auth.username !== 'abc' || auth.password !== 'def'){
            return callback(new Error('Invalid username or password'));
        }
        callback(null, {user: 123}); // where 123 is the user id or similar property
    }
});
OAuth2 authentication

XOAUTH2 support needs to enabled with the authMethods array option as it is disabled by default. If you support multiple authentication mechanisms, then you can check the used mechanism from the method property.

var server = new SMTPServer({
    authMethods: ['XOAUTH2'], // XOAUTH2 is not enabled by default
    onAuth: function(auth, session, callback){
        if(auth.method !== 'XOAUTH2'){
            // should never occur in this case as only XOAUTH2 is allowed
            return callback(new Error('Expecting XOAUTH2'));
        }
        if(auth.username !== 'abc' || auth.accessToken !== 'def'){
            return callback(null, {
                data: {
                    status: '401',
                    schemes: 'bearer mac',
                    scope: 'my_smtp_access_scope_name'
                }
            });
        }
        callback(null, {user: 123}); // where 123 is the user id or similar property
    }
});
CRAM-MD5 authentication

CRAM-MD5 support needs to enabled with the authMethods array option as it is disabled by default. If you support multiple authentication mechanisms, then you can check the used mechanism from the method property.

This authentication method does not return a password with the username but a response to a challenge. To validate the returned challenge response, the authentication object includes a method validatePassword that takes the actual plaintext password as an argument and returns either true if the password matches with the challenge response or false if it does not.

var server = new SMTPServer({
    authMethods: ['CRAM-MD5'], // CRAM-MD5 is not enabled by default
    onAuth: function(auth, session, callback){
        if(auth.method !== 'CRAM-MD5'){
            // should never occur in this case as only CRAM-MD5 is allowed
            return callback(new Error('Expecting CRAM-MD5'));
        }

        // CRAM-MD5 does not provide a password but a challenge response
        // that can be validated against the actual password of the user
        if(auth.username !== 'abc' || !auth.validatePassword('def')){
            return callback(new Error('Invalid username or password'));
        }

        callback(null, {user: 123}); // where 123 is the user id or similar property
    }
});

Validating client connection

By default any client connection is allowed. If you want to check the remoteAddress or clientHostname before any other command, you can set a handler for it with onConnect

var server = new SMTPServer({
    onConnect: function(session, callback){}
});

Where

  • session includes the remoteAddress and clientHostname values
  • callback is the function to run after validation. If you return an error object, the connection is rejected, otherwise it is accepted
var server = new SMTPServer({
    onConnect: function(address, session, callback){
        if(session.remoteAddress === '127.0.0.1'){
            return callback(new Error('No connections from localhost allowed'));
        }
        return callback(); // Accept the connection
    }
});

Validating sender addresses

By default all sender addresses (as long as these are in valid email format) are allowed. If you want to check the address before it is accepted you can set a handler for it with onMailFrom

var server = new SMTPServer({
    onMailFrom: function(address, session, callback){}
});

Where

  • address is an address object with the provided email address from MAIL FROM: command
  • session includes the envelope object and user data if logged in, see details here
  • callback is the function to run after validation. If you return an error object, the address is rejected, otherwise it is accepted
var server = new SMTPServer({
    onMailFrom: function(address, session, callback){
        if(address.address !== 'allowed@example.com'){
            return callback(new Error('Only allowed@example.com is allowed to send mail'));
        }
        return callback(); // Accept the address
    }
});

Validating recipient addresses

By default all recipient addresses (as long as these are in valid email format) are allowed. If you want to check the address before it is accepted you can set a handler for it with onRcptTo

var server = new SMTPServer({
    onRcptTo: function(address, session, callback){}
});

Where

  • address is an address object with the provided email address from RCPT TO: command
  • session includes the envelope object and user data if logged in, see details here
  • callback is the function to run after validation. If you return an error object, the address is rejected, otherwise it is accepted
var server = new SMTPServer({
    onRcptTo: function(address, session, callback){
        if(address.address !== 'allowed@example.com'){
            return callback(new Error('Only allowed@example.com is allowed to receive mail'));
        }
        return callback(); // Accept the address
    }
});

Processing incoming message

You can get the stream for the incoming message with onData handler

var server = new SMTPServer({
    onData: function(stream, session, callback){}
});

Where

  • stream is a readable stream for the incoming message
  • session includes the envelope object and user data if logged in, see details here
  • callback is the function to run once the stream is ended and you have processed the outcome. If you return an error object, the message is rejected, otherwise it is accepted
var server = new SMTPServer({
    onData: function(stream, session, callback){
        stream.pipe(process.stdout); // print message to console
        stream.on('end', callback);
    }
});

This module does not prepend Received or any other header field to the streamed message. The entire message is streamed as-is with no modifications whatsoever. For compliancy you should add the Received data to the message yourself, see rfc5321 4.4. Trace Information for details.

Using SIZE extension

When creating the server you can define maximum allowed message size with the size option, see RFC1870 for details. This is not a strict limitation, the client is informed about the size limit but the client can still send a larger message than allowed, it is up to your application to reject or accept the oversized message. To check if the message was oversized, see stream.sizeExceeded property.

var server = new SMTPServer({
    size: 1024, // allow messages up to 1 kb
    onData: function(stream, session, callback){
        stream.pipe(process.stdout); // print message to console
        stream.on('end', function(){
            var err;
            if(stream.sizeExceeded){
                err = new Error('Message exceeds fixed maximum message size');
                err.responseCode = 552;
                return callback(err);
            }
            callback(null, 'Message queued as abcdef');
        });
    }
});

Session object

Session object that is passed to the handler functions includes the following properties

  • id random string identificator generated when the client connected
  • remoteAddress the IP address for the connected client
  • clientHostname reverse resolved hostname for remoteAddress
  • hostNameAppearsAs hostname the client provided with HELO/EHLO call
  • envelope includes denvelope data
    • mailFrom includes an address object or is set to false
    • rcptTo includes an array of address objects
  • user includes the user value returned with the authentication handler
  • transaction number of the current transaction. 1 is for the first message, 2 is for the 2nd message etc.

Address object

Address object in the mailFrom and rcptTo values include the following properties

  • address is the address provided with the MAIL FROM or RCPT TO command
  • args is an object with additional arguments (all key names are uppercase)

For example if the client runs the following commands:

C: MAIL FROM:<sender@example.com> SIZE=12345 RET=HDRS
C: RCPT TO:<recipient@example.com> NOTIFY=NEVER

then the envelope object is going go look like this:

{
  "mailFrom": {
    "address": "sender@example.com",
    "args": {
      "SIZE": "12345",
      "RET": "HDRS"
    }
  },
  "rcptTo": [
    {
      "address": "receiver@example.com",
      "args": {
        "NOTIFY": "NEVER"
      }
    }
  ]
}

Supported SMTP commands

Commands

  • AUTH LOGIN
  • AUTH PLAIN
  • AUTH XOAUTH2 not enabled by default, add to authMethods: ['XOAUTH2'] to enable
  • EHLO
  • DATA
  • HELO
  • HELP returns URL to RFC5321
  • MAIL
  • NOOP
  • QUIT
  • RCPT
  • RSET clears session info but does not renegotiate TLS session
  • STARTTLS
  • VRFY always returns positive 252 response

Extensions

  • PIPELINING
  • 8BITMIME allows 8bit message content
  • SMTPUTF8 accepts unicode e-mail addresses like δοκιμή@παράδειγμα.δοκιμή
  • SIZE limits maximum message size

Most notably, the ENHANCEDSTATUSCODES extension is not supported, all response codes use the standard three digit format and nothing else. I might change this in the future if I have time to revisit all responses and find the appropriate response codes.

CHUNKING is also missing. I might add support for it in the future but not at this moment since DATA already accepts a stream and CHUNKING is not supported everywhere.

License

MIT

Keywords

FAQs

Last updated on 29 Sep 2015

Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc