MimeKit
MimeKit |   |  |
MimeKitLite |   | |
MailKit |   |  |
MailKitLite |   | |
What is MimeKit?
MimeKit is a C# library which may be used for the creation and parsing of messages using the Multipurpose
Internet Mail Extension (MIME), as defined by numerous IETF specifications.
Donate
MimeKit is a personal open source project that I have put thousands of hours into perfecting with the
goal of making it the very best MIME parser framework for .NET. I need your help to achieve this.
Donating helps pay for things such as web hosting, domain registration and licenses for developer tools
such as a performance profiler, memory profiler, a static code analysis tool, and more. It also helps
motivate me to continue working on the project.

History
As a developer and user of email clients, I had come to realize that the vast majority of email client
(and server) software had less-than-satisfactory MIME implementations. More often than not these email clients
created broken MIME messages and/or would incorrectly try to parse a MIME message thus subtracting from the full
benefits that MIME was meant to provide. MimeKit is meant to address this issue by following the MIME specification
as closely as possible while also providing programmers with an extremely easy to use high-level API.
This led me, at first, to implement another MIME parser library called GMime
which is implemented in C and later added a C# binding called GMime-Sharp.
Now that I typically find myself working in C# rather than lower level languages like C, I decided to
begin writing a new parser in C# which would not depend on GMime. This would also allow me to have more
flexibility in that I'd be able to use Generics and create a more .NET-compliant API.
Performance
While mainstream beliefs may suggest that C# can never be as fast as C, it turns out that with a bit of creative
parser design and a few clever optimizations
[1]
[2], MimeKit's
performance is actually on par with GMime.
Since GMime is pretty well-known as a high-performance native MIME parser and MimeKit more-or-less matches GMime's
performance, it stands to reason that MimeKit is likely unsurpassed in performance in the .NET MIME parser space.
For a comparison, as I blogged here
(I have since optimized MimeKit by at least another 30%), MimeKit is more than 25x faster than OpenPOP.NET, 75x
faster than SharpMimeTools, and 65x faster than regex-based parsers. Even the commercial MIME parser offerings such
as LimiLabs' Mail.dll and NewtonIdeas' Mime4Net cannot even come close to matching MimeKit's performance (they are
both orders of magnitude slower than MimeKit).
For comparison purposes, I've published a MIME parser benchmark
to make it easier for anyone else to compare the performance of MimeKit to their favourite MIME parser.
Here are the results:
Parsing startrek.msg (1000 iterations):
MimeKit: 0.6989221 seconds
OpenPop: 25.3056064 seconds
AE.Net.Mail: 17.5971438 seconds
MailSystem.NET: 26.3891218 seconds
MIMER: 76.4538978 seconds
Parsing xamarin3.msg (1000 iterations):
MimeKit: 3.4215505 seconds
OpenPop: 159.3308053 seconds
AE.Net.Mail: 132.3044291 seconds
MailSystem.NET: 133.5832078 seconds
MIMER: 784.433441 seconds
How does your MIME parser compare?
License Information
MIT License
Copyright (C) 2012-2025 .NET Foundation and Contributors
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Installing via NuGet
The easiest way to install MimeKit is via NuGet.
In Visual Studio's Package Manager Console,
enter the following command:
Install-Package MimeKit
Getting the Source Code
First, you'll need to clone MimeKit from my GitHub repository. To do this using the command-line version of Git,
you'll need to issue the following command in your terminal:
git clone --recursive https://github.com/jstedfast/MimeKit.git
If you are using TortoiseGit on Windows, you'll need to right-click in the directory
where you'd like to clone MimeKit and select Git Clone... in the menu. Once you do that, you'll get the
following dialog:

Fill in the areas outlined in red and then click OK. This will recursively clone MimeKit onto your local machine.
Updating the Source Code
Occasionally you might want to update your local copy of the source code if I have made changes to MimeKit since you
downloaded the source code in the step above. To do this using the command-line version fo Git, you'll need to issue
the following commands in your terminal within the MimeKit directory:
git pull
git submodule update
If you are using TortoiseGit on Windows, you'll need to right-click on the MimeKit
directory and select Git Sync... in the menu. Once you do that, you'll need to click the Pull and
Submodule Update buttons in the following dialog:

Building
In the top-level MimeKit directory, there are a number of solution files; they are:
- MimeKit.sln - includes projects for .NET Framework 4.6.2/4.7/4.8, .NETStandard 2.0/2.1, .NET 6.0 as well as the unit tests.
- MimeKitLite.sln - includes projects for the stripped-down versions of MimeKit that drop support for crypto.
Once you've opened the appropriate MimeKit solution file in Visual Studio,
you can choose the Debug or Release build configuration and then build.
Both Visual Studio 2022 and Visual Studio 2019 should be able to build MimeKit without any issues, but older versions such as
Visual Studio 2015 and 2017 will require modifications to the projects in order to build correctly. It has been reported that adding
NuGet package references to Microsoft.Net.Compilers >= 3.6.0
and System.ValueTuple >= 4.5.0 will allow MimeKit to build successfully.
Note: The Release build will generate the xml API documentation, but the Debug build will not.
Using MimeKit
Parsing Messages
One of the more common operations that MimeKit is meant for is parsing email messages from arbitrary streams.
There are two ways of accomplishing this task.
The first way is to use one of the Load methods
on MimeMessage
:
var message = MimeMessage.Load (stream);
Or you can load a message from a file path:
var message = MimeMessage.Load ("message.eml");
The second way is to use the MimeParser class. For the most
part, using the MimeParser
directly is not necessary unless you wish to parse a Unix mbox file stream. However, this is
how you would do it:
var parser = new MimeParser (stream, MimeFormat.Entity);
var message = parser.ParseMessage ();
For Unix mbox file streams, you would use the parser like this:
var parser = new MimeParser (stream, MimeFormat.Mbox);
while (!parser.IsEndOfStream) {
var message = parser.ParseMessage ();
}
Getting the Body of a Message
A common misunderstanding about email is that there is a well-defined message body and then a list
of attachments. This is not really the case. The reality is that MIME is a tree structure of content,
much like a file system.
Luckily, MIME does define a set of general rules for how mail clients should interpret this tree
structure of MIME parts. The Content-Disposition
header is meant to provide hints to the receiving
client as to which parts are meant to be displayed as part of the message body and which are meant
to be interpreted as attachments.
The Content-Disposition
header will generally have one of two values: inline
or attachment
.
The meaning of these values should be fairly obvious. If the value is attachment
, then the content
of said MIME part is meant to be presented as a file attachment separate from the core message.
However, if the value is inline
, then the content of that MIME part is meant to be displayed inline
within the mail client's rendering of the core message body. If the Content-Disposition
header does
not exist, then it should be treated as if the value were inline
.
Technically, every part that lacks a Content-Disposition
header or that is marked as inline
, then,
is part of the core message body.
There's a bit more to it than that, though.
Modern MIME messages will often contain a multipart/alternative
MIME container which will generally contain
a text/plain
and text/html
version of the text that the sender wrote. The text/html
version is typically
formatted much closer to what the sender saw in his or her WYSIWYG editor than the text/plain
version.
The reason for sending the message text in both formats is that not all mail clients are capable of displaying
HTML.
The receiving client should only display one of the alternative views contained within the multipart/alternative
container. Since alternative views are listed in order of least faithful to most faithful with what the sender
saw in his or her WYSIWYG editor, the receiving client should walk over the list of alternative views starting
at the end and working backwards until it finds a part that it is capable of displaying.
Example:
multipart/alternative
text/plain
text/html
As seen in the example above, the text/html
part is listed last because it is the most faithful to
what the sender saw in his or her WYSIWYG editor when writing the message.
To make matters even more complicated, sometimes modern mail clients will use a multipart/related
MIME container instead of a simple text/html
part in order to embed images and other content
within the HTML.
Example:
multipart/alternative
text/plain
multipart/related
text/html
image/jpeg
video/mp4
image/png
In the example above, one of the alternative views is a multipart/related
container which contains
an HTML version of the message body that references the sibling video and images.
Now that you have a rough idea of how a message is structured and how to interpret various MIME entities,
the next step is learning how to traverse the MIME tree using MimeKit.
Note: For your convenience, MimeKit's MimeMessage
class has two properties that can help you get the
text/plain
or text/html
version of the message body. These are TextBody
and HtmlBody
,
respectively.
Keep in mind, however, that at least with the HtmlBody
property, it may be that the HTML part is
a child of a multipart/related
, allowing it to refer to images and other types of media that
are also contained within that multipart/related
entity. This property is really only a convenience
property and is not a really good substitute for traversing the MIME structure yourself so that you
may properly interpret related content.
Traversing a MimeMessage
The MimeMessage.Body
is the top-level MIME entity of the message. Generally, it will either be a
TextPart
or a Multipart
.
As an example, if you wanted to rip out all of the attachments of a message, your code might look
something like this:
var attachments = new List<MimePart> ();
var multiparts = new List<Multipart> ();
var iter = new MimeIterator (message);
while (iter.MoveNext ()) {
var multipart = iter.Parent as Multipart;
var part = iter.Current as MimePart;
if (multipart != null && part != null && part.IsAttachment) {
multiparts.Add (multipart);
attachments.Add (part);
}
}
for (int i = 0; i < attachments.Count; i++)
multiparts[i].Remove (attachments[i]);
Quick and Dirty Enumeration of Message Body Parts
If you would rather skip the proper way of traversing a MIME tree, another option that MimeKit provides
is a simple enumerator over the message's body parts in a flat (depth-first) list.
You can access this flat list via the BodyParts
property, like so:
foreach (var part in message.BodyParts) {
}
Another helper property on the MimeMessage class is the Attachments
property which works
much the same way as the BodyParts
property except that it will only contain MIME parts
which have a Content-Disposition
header value that is set to attachment
.
Getting the Decoded Content of a MIME Part
At some point, you're going to want to extract the decoded content of a MimePart
(such as an image) and
save it to disk or feed it to a UI control to display it.
Once you've found the MimePart
object that you'd like to extract the content of, here's how you can
save the decoded content to a file:
var fileName = part.FileName;
using (var stream = File.Create (fileName)) {
part.Content.DecodeTo (stream);
}
You can also get access to the original raw content by "opening" the Content
. This might be useful
if you want to pass the content off to a UI control that can do its own loading from a stream.
using (var stream = part.Content.Open ()) {
imageControl.Load (stream);
}
There are a number of useful filters that can be applied to a FilteredStream
, so if you find this type of
interface appealing, I suggest taking a look at the available filters in the MimeKit.IO.Filters
namespace
or even write your own! The possibilities are limited only by your imagination.
Creating a Simple Message
Creating MIME messages using MimeKit is really trivial.
var message = new MimeMessage ();
message.From.Add (new MailboxAddress ("Joey", "joey@friends.com"));
message.To.Add (new MailboxAddress ("Alice", "alice@wonderland.com"));
message.Subject = "How you doin?";
message.Body = new TextPart ("plain") {
Text = @"Hey Alice,
What are you up to this weekend? Monica is throwing one of her parties on
Saturday and I was hoping you could make it.
Will you be my +1?
-- Joey
"
};
A TextPart
is a leaf-node MIME part with a text media-type. The first argument to the TextPart
constructor
specifies the media-subtype, in this case, "plain". Another media subtype you are probably familiar with
is the "html" subtype. Some other examples include "enriched", "rtf", and "csv".
The Text
property is the easiest way to both get and set the string content of the MIME part.
Creating a Message with Attachments
Attachments are just like any other MimePart
, the only difference is that they typically have
a Content-Disposition
header with a value of "attachment" instead of "inline" or no
Content-Disposition
header at all.
Typically, when a mail client adds attachments to a message, it will create a multipart/mixed
part and add the text body part and all of the file attachments to the multipart/mixed.
Here's how you can do that with MimeKit:
var message = new MimeMessage ();
message.From.Add (new MailboxAddress ("Joey", "joey@friends.com"));
message.To.Add (new MailboxAddress ("Alice", "alice@wonderland.com"));
message.Subject = "How you doin?";
var body = new TextPart ("plain") {
Text = @"Hey Alice,
What are you up to this weekend? Monica is throwing one of her parties on
Saturday and I was hoping you could make it.
Will you be my +1?
-- Joey
"
};
var attachment = new MimePart ("image", "gif") {
Content = new MimeContent (File.OpenRead (path), ContentEncoding.Default),
ContentDisposition = new ContentDisposition (ContentDisposition.Attachment),
ContentTransferEncoding = ContentEncoding.Base64,
FileName = Path.GetFileName (path)
};
var multipart = new Multipart ("mixed");
multipart.Add (body);
multipart.Add (attachment);
message.Body = multipart;
Of course, that is just a simple example. A lot of modern mail clients such as Outlook or Thunderbird will
send out both a text/html
and a text/plain
version of the message text. To do this, you'd create a
TextPart
for the text/plain
part and another TextPart
for the text/html
part and then add them to a
multipart/alternative
like so:
var attachment = CreateAttachment ();
var plain = CreateTextPlainPart ();
var html = CreateTextHtmlPart ();
var alternative = new Multipart ("alternative");
alternative.Add (plain);
alternative.Add (html);
var multipart = new Multipart ("mixed");
multipart.Add (alternative);
multipart.Add (attachment);
message.Body = multipart;
Creating a Message Using a BodyBuilder (not Arnold Schwarzenegger)
If you are used to System.Net.Mail's API for creating messages, you will probably find using a BodyBuilder
much more friendly than manually creating the tree of MIME parts. Here's how you could create a message body
using a BodyBuilder
:
var message = new MimeMessage ();
message.From.Add (new MailboxAddress ("Joey", "joey@friends.com"));
message.To.Add (new MailboxAddress ("Alice", "alice@wonderland.com"));
message.Subject = "How you doin?";
var builder = new BodyBuilder ();
builder.TextBody = @"Hey Alice,
What are you up to this weekend? Monica is throwing one of her parties on
Saturday and I was hoping you could make it.
Will you be my +1?
-- Joey
";
var contentId = MimeUtils.GenerateMessageId ();
builder.HtmlBody = string.Format (@"<p>Hey Alice,<br>
<p>What are you up to this weekend? Monica is throwing one of her parties on
Saturday and I was hoping you could make it.<br>
<p>Will you be my +1?<br>
<p>-- Joey<br>
<center><img src=""cid:{0}"" alt=""selfie.jpg""></center>", contentId);
builder.LinkedResources.Add (@"C:\Users\Joey\Documents\Selfies\selfie.jpg");
builder.LinkedResources[0].ContentId = contentId;
builder.Attachments.Add (@"C:\Users\Joey\Documents\party.ics");
message.Body = builder.ToMessageBody ();
Preparing to use MimeKit's S/MIME support
Before you can begin using MimeKit's S/MIME support, you will need to decide which
database to use for certificate storage.
If you are targetting any of the Xamarin platforms (or Linux), you won't need to do
anything (although you certainly can if you want to) because, by default, I've
configured MimeKit to use the Mono.Data.Sqlite binding to SQLite.
If you are on any of the Windows platforms, however, you'll need to decide on whether
to use one of the conveniently available backends such as the WindowsSecureMimeContext
backend or the TemporarySecureMimeContext
backend or else you'll need to pick a
System.Data provider such as
System.Data.SQLite to use with
the DefaultSecureMimeContext
base class.
If you opt for using the DefaultSecureMimeContext
backend, you'll need to implement
your own DefaultSecureMimeContext
subclass. Luckily, it's very simple to do.
Assuming you've chosen System.Data.SQLite, here's how you'd implement your own
DefaultSecureMimeContext
class:
using System.Data.SQLite;
using MimeKit.Cryptography;
using MyAppNamespace {
class MySecureMimeContext : DefaultSecureMimeContext
{
public MySecureMimeContext () : base (OpenDatabase ("C:\\wherever\\certdb.sqlite"))
{
}
static IX509CertificateDatabase OpenDatabase (string fileName)
{
var builder = new SQLiteConnectionStringBuilder ();
builder.DateTimeFormat = SQLiteDateFormats.Ticks;
builder.DataSource = fileName;
if (!File.Exists (fileName))
SQLiteConnection.CreateFile (fileName);
var sqlite = new SQLiteConnection (builder.ConnectionString);
sqlite.Open ();
return new SqliteCertificateDatabase (sqlite, "password");
}
}
}
Now that you've implemented your own SecureMimeContext
, you'll want to register it with MimeKit:
CryptographyContext.Register (typeof (MySecureMimeContext));
Now you are ready to encrypt, decrypt, sign and verify S/MIME messages!
Note: If you choose to use the WindowsSecureMimeContext
or TemporarySecureMimeContext
backend,
you should register that class instead.
Preparing to use MimeKit's PGP/MIME support
Like with S/MIME support, you also need to register your own OpenPgpContext
. Unlike S/MIME, however,
you don't need to choose a database if you subclass GnuPGContext
because it uses GnuPG's PGP keyrings
to load and store public and private keys. If you choose to subclass GnuPGContext
, the only thing you
you need to do is implement a password callback method:
using MimeKit.Cryptography;
namespace MyAppNamespace {
class MyGnuPGContext : GnuPGContext
{
public MyGnuPgContext () : base ()
{
}
protected override string GetPasswordForKey (PgpSecretKey key)
{
return "password";
}
}
}
Once again, to register your OpenPgpContext
, you can use the following code snippet:
CryptographyContext.Register (typeof (MyGnuPGContext));
Now you are ready to encrypt, decrypt, sign and verify PGP/MIME messages!
Encrypting Messages with S/MIME
S/MIME uses an application/pkcs7-mime
MIME part to encapsulate encrypted content (as well as other things).
var joey = new MailboxAddress ("Joey", "joey@friends.com");
var alice = new MailboxAddress ("Alice", "alice@wonderland.com");
var message = new MimeMessage ();
message.From.Add (joey);
message.To.Add (alice);
message.Subject = "How you doin?";
var body = CreateMessageBody ();
using (var ctx = new MySecureMimeContext ()) {
message.Body = ApplicationPkcs7Mime.Encrypt (ctx, message.To.Mailboxes, body);
}
Decrypting S/MIME Messages
As mentioned earlier, S/MIME uses an application/pkcs7-mime
part with an "smime-type" parameter with a value of
"enveloped-data" to encapsulate the encrypted content.
The first thing you must do is find the ApplicationPkcs7Mime
part (see the section on traversing MIME parts).
if (entity is ApplicationPkcs7Mime) {
var pkcs7 = (ApplicationPkcs7Mime) entity;
if (pkcs7.SecureMimeType == SecureMimeType.EnvelopedData)
return pkcs7.Decrypt ();
}
Encrypting Messages with PGP/MIME
Unlike S/MIME, PGP/MIME uses multipart/encrypted
to encapsulate its encrypted data.
var joey = new MailboxAddress ("Joey", "joey@friends.com");
var alice = new MailboxAddress ("Alice", "alice@wonderland.com");
var message = new MimeMessage ();
message.From.Add (joey);
message.To.Add (alice);
message.Subject = "How you doin?";
var body = CreateMessageBody ();
using (var ctx = new MyGnuPGContext ()) {
message.Body = MultipartEncrypted.Encrypt (ctx, message.To.Mailboxes, body);
}
Decrypting PGP/MIME Messages
As mentioned earlier, PGP/MIME uses a multipart/encrypted
part to encapsulate the encrypted content.
A multipart/encrypted
contains exactly 2 parts: the first MimeEntity
is the version information while the
second MimeEntity
is the actual encrypted content and will typically be an application/octet-stream
.
The first thing you must do is find the MultipartEncrypted
part (see the section on traversing MIME parts).
if (entity is MultipartEncrypted) {
var encrypted = (MultipartEncrypted) entity;
return encrypted.Decrypt ();
}
Digitally Signing Messages with S/MIME or PGP/MIME
Both S/MIME and PGP/MIME use a multipart/signed
to contain the signed content and the detached signature data.
Here's how you might digitally sign a message using S/MIME:
var joey = new MailboxAddress ("Joey", "joey@friends.com");
var alice = new MailboxAddress ("Alice", "alice@wonderland.com");
var message = new MimeMessage ();
message.From.Add (joey);
message.To.Add (alice);
message.Subject = "How you doin?";
var body = CreateMessageBody ();
using (var ctx = new MySecureMimeContext ()) {
message.Body = MultipartSigned.Create (ctx, joey, DigestAlgorithm.Sha1, body);
}
For S/MIME, if you have a way for the user to configure which S/MIME certificate to use
as their signing certificate, you could also do something more like this:
using (var ctx = new MySecureMimeContext ()) {
var certificate = GetJoeysX509Certificate ();
var signer = new CmsSigner (certificate);
signer.DigestAlgorithm = DigestAlgorithm.Sha1;
message.Body = MultipartSigned.Create (ctx, signer, body);
}
If you'd prefer to use PGP instead of S/MIME, things work almost exactly the same except that you
would use an OpenPGP cryptography context. For example, you might use a subclass of the
GnuPGContext
that comes with MimeKit if you want to re-use the user's GnuPG keyrings (you can't
use GnuPGContext
directly because it has no way of prompting the user for their passphrase).
For the sake of this example, let's pretend that you've written a minimal subclass of
MimeKit.Cryptography.GnuPGContext
that only overrides the GetPassword()
method and
that this subclass is called MyGnuPGContext
.
using (var ctx = new MyGnuPGContext ()) {
message.Body = MultipartSigned.Create (ctx, joey, DigestAlgorithm.Sha1, body);
}
Just like S/MIME, however, you can also do your own PGP key lookups instead of
relying on email addresses to match up with the user's private key.
using (var ctx = new MyGnuPGContext ()) {
var key = GetJoeysPrivatePgpKey ();
message.Body = MultipartSigned.Create (ctx, key, DigestAlgorithm.Sha1, body);
}
Verifying S/MIME and PGP/MIME Digital Signatures
As mentioned earlier, both S/MIME and PGP/MIME typically use a multipart/signed
part to contain the
signed content and the detached signature data.
A multipart/signed
contains exactly 2 parts: the first MimeEntity
is the signed content while the second
MimeEntity
is the detached signature and, by default, will either be an ApplicationPgpSignature
part or
an ApplicationPkcs7Signature
part (depending on whether the sending client signed using OpenPGP or S/MIME).
Because the multipart/signed
part may have been signed by multiple signers, it is important to
verify each of the digital signatures (one for each signer) that are returned by the
MultipartSigned.Verify()
method:
if (entity is MultipartSigned) {
var signed = (MultipartSigned) entity;
foreach (var signature in signed.Verify ()) {
try {
bool valid = signature.Verify ();
} catch (DigitalSignatureVerifyException) {
}
}
}
It should be noted, however, that while most S/MIME clients will use the preferred multipart/signed
approach, it is possible that you may encounter an application/pkcs7-mime
part with an "smime-type"
parameter set to "signed-data". Luckily, MimeKit can handle this format as well:
if (entity is ApplicationPkcs7Mime) {
var pkcs7 = (ApplicationPkcs7Mime) entity;
if (pkcs7.SecureMimeType == SecureMimeType.SignedData) {
MimeEntity extracted;
foreach (var signature in pkcs7.Verify (out extracted)) {
try {
bool valid = signature.Verify ();
} catch (DigitalSignatureVerifyException) {
}
}
}
}
Signing Messages with DKIM
In addition to OpenPGP and S/MIME, MimeKit also supports DKIM signatures. To sign a message using DKIM,
you'll first need a private key. In the following example, assume that the private key is saved in a
file called privatekey.pem:
var headers = new HeaderId[] { HeaderId.From, HeaderId.Subject, HeaderId.Date };
var signer = new DkimSigner ("privatekey.pem", "example.com", "brisbane", DkimSignatureAlgorithm.RsaSha256) {
HeaderCanonicalizationAlgorithm = DkimCanonicalizationAlgorithm.Simple,
BodyCanonicalizationAlgorithm = DkimCanonicalizationAlgorithm.Simple,
AgentOrUserIdentifier = "@eng.example.com",
QueryMethod = "dns/txt",
};
message.Prepare (EncodingConstraint.SevenBit);
signer.Sign (message, headers);
As you can see, it's fairly straight forward.
Verifying DKIM Signatures
Verifying DKIM signatures is slightly more involved than creating them because you'll need to write a custom
implementation of the IDkimPublicKeyLocator
interface. Typically, this custom class will need to download
the DKIM public keys via your chosen DNS library as they are requested by MimeKit during verification of
DKIM signature headers.
Once you've implemented a custom IDkimPublicKeyLocator
, verifying signatures is fairly trivial. Most of the work
needed will be in the IDkimPublicKeyLocator
implementation. As an example of how to implement this interface,
here is one possible implementation using the Heijden.DNS library:
using System;
using System.IO;
using System.Text;
using System.Threading;
using System.Threading.Tasks;
using System.Collections.Generic;
using Heijden.DNS;
using Org.BouncyCastle.Crypto;
using MimeKit;
using MimeKit.Cryptography;
namespace DkimVerifierExample
{
class DkimPublicKeyLocator : DkimPublicKeyLocatorBase
{
readonly Dictionary<string, AsymmetricKeyParameter> cache;
readonly Resolver resolver;
public DkimPublicKeyLocator ()
{
cache = new Dictionary<string, AsymmetricKeyParameter> ();
resolver = new Resolver ("8.8.8.8") {
TransportType = TransportType.Udp,
UseCache = true,
Retries = 3
};
}
AsymmetricKeyParameter DnsLookup (string domain, string selector, CancellationToken cancellationToken)
{
var query = selector + "._domainkey." + domain;
AsymmetricKeyParameter pubkey;
if (cache.TryGetValue (query, out pubkey))
return pubkey;
var response = resolver.Query (query, QType.TXT);
var builder = new StringBuilder ();
foreach (var record in response.RecordsTXT) {
foreach (var text in record.TXT)
builder.Append (text);
}
var txt = builder.ToString ();
pubkey = GetPublicKey (txt);
cache.Add (query, pubkey);
return pubkey;
}
public AsymmetricKeyParameter LocatePublicKey (string methods, string domain, string selector, CancellationToken cancellationToken = default (CancellationToken))
{
var methodList = methods.Split (new char[] { ':' }, StringSplitOptions.RemoveEmptyEntries);
for (int i = 0; i < methodList.Length; i++) {
if (methodList[i] == "dns/txt")
return DnsLookup (domain, selector, cancellationToken);
}
throw new NotSupportedException (string.Format ("{0} does not include any suported lookup methods.", methods));
}
public Task<AsymmetricKeyParameter> LocatePublicKeyAsync (string methods, string domain, string selector, CancellationToken cancellationToken = default (CancellationToken))
{
return Task.Run (() => {
return LocatePublicKey (methods, domain, selector, cancellationToken);
}, cancellationToken);
}
}
class Program
{
public static void Main (string[] args)
{
if (args.Length == 0) {
Help ();
return;
}
for (int i = 0; i < args.Length; i++) {
if (args[i] == "--help") {
Help ();
return;
}
}
var locator = new DkimPublicKeyLocator ();
var verifier = new DkimVerifier (locator);
for (int i = 0; i < args.Length; i++) {
if (!File.Exists (args[i])) {
Console.Error.WriteLine ("{0}: No such file.", args[i]);
continue;
}
Console.Write ("{0} -> ", args[i]);
var message = MimeMessage.Load (args[i]);
var index = message.Headers.IndexOf (HeaderId.DkimSignature);
if (index == -1) {
Console.WriteLine ("NO SIGNATURE");
continue;
}
var dkim = message.Headers[index];
if (verifier.Verify (message, dkim)) {
Console.ForegroundColor = ConsoleColor.Green;
Console.WriteLine ("VALID");
Console.ResetColor ();
} else {
Console.ForegroundColor = ConsoleColor.Red;
Console.WriteLine ("INVALID");
Console.ResetColor ();
}
}
}
static void Help ()
{
Console.WriteLine ("Usage is: DkimVerifier [options] [messages]");
Console.WriteLine ();
Console.WriteLine ("Options:");
Console.WriteLine (" --help This help menu.");
}
}
}
Signing Messages with ARC
Signing with ARC is similar to DKIM but quite a bit more involved. In order to sign with
ARC, you must first validate that the existing message is authentictic and produce
an ARC-Authentication-Results header containing the methods that you used to
authenticate the message as well as their results.
The abstract ArcSigner
class provided by MimeKit will need to be subclassed before it can be used. An example subclass
that provides 2 different implementations for generating the ARC-Authentication-Results header
can be seen below:
using System;
using System.Linq;
using System.Threading;
using System.Threading.Tasks;
using System.Collections.Generic;
using MimeKit;
using MimeKit.Cryptography;
namespace ArcSignerExample
{
class MyArcSigner : ArcSigner
{
public MyArcSigner (string fileName, string domain, string selector, DkimSigningAlgorithm algorithm = DkimSignatureAlgorithm.RsaSha256)
: base (fileName, domain, selector, algorithm)
{
}
protected override AuthenticationResults GenerateArcAuthenticationResults (FormatOptions options, MimeMessage message, CancellationToken cancellationToken)
{
const string AuthenticationServiceIdentifier = "lists.example.com";
var results = new AuthenticationResults (AuthenticationServiceIdentifier);
for (int i = 0; i < message.Headers.Count; i++) {
var header = message.Headers[i];
if (header.Id != HeaderId.AuthenticationResults)
continue;
if (!AuthenticationResults.TryParse (header.RawValue, out AuthenticationResults authres))
continue;
if (authres.AuthenticationServiceIdentifier != AuthenticationServiceIdentifier)
continue;
foreach (var result in authres.Results) {
if (!results.Results.Any (r => r.Method == result.Method))
results.Results.Add (result);
}
}
return results;
}
protected override async Task<AuthenticationResults> GenerateArcAuthenticationResultsAsync (FormatOptions options, MimeMessage message, CancellationToken cancellationToken)
{
const string AuthenticationServiceIdentifier = "lists.example.com";
var results = new AuthenticationResults (AuthenticationServiceIdentifier);
var locator = new DkimPublicKeyLocator ();
var dkimVerifier = new DkimVerifier (locator);
var arcVerifier = new ArcVerifier (locator);
AuthenticationMethodResult method;
try {
var arc = await arcVerifier.VerifyAsync (message, cancellationToken);
var result = arc.Chain.ToString ().ToLowerInvariant ();
method = new AuthenticationMethodResult ("arc", result);
results.Results.Add (method);
} catch {
method = new AuthenticationMethodResult ("arc", "fail");
method.Reason = "DNS error";
results.Results.Add (method);
}
foreach (var dkimHeader in message.Headers.Where (h => h.Id == HeaderId.DkimSignature)) {
string result;
try {
if (await dkimVerifier.VerifyAsync (message, cancellationToken)) {
result = "pass";
} else {
result = "fail";
}
} catch {
result = "fail";
}
method = new AuthenticationMethodResult ("dkim", result);
var params = dkimHeader.Value.Replace (" ", "").Split (new char[] { ';' });
var i = params.FirstOrDefault (p => p.StartsWith ("i=", StringComparison.Ordinal));
var b = params.FirstOrDefault (p => p.StartsWith ("b=", StringComparison.Ordinal));
if (i != null)
method.Parameters.Add ("header.i", i.Substring (2));
if (b != null)
method.Parameters.Add ("header.b", b.Substring (2, 8));
results.Results.Add (method);
}
return results;
}
}
}
Once you have a custom ArcSigner
class, the actual logic for signing is almost identical to DKIM.
Note: As with the DKIM signing example above, assume that the private key is saved in a
file called privatekey.pem:
var headers = new HeaderId[] { HeaderId.From, HeaderId.Subject, HeaderId.Date };
var signer = new MyArcSigner ("privatekey.pem", "example.com", "brisbane", DkimSignatureAlgorithm.RsaSha256) {
HeaderCanonicalizationAlgorithm = DkimCanonicalizationAlgorithm.Relaxed,
BodyCanonicalizationAlgorithm = DkimCanonicalizationAlgorithm.Relaxed,
AgentOrUserIdentifier = "@eng.example.com"
};
message.Prepare (EncodingConstraint.SevenBit);
signer.Sign (message, headers);
Verifying ARC Signatures
Just like with verifying DKIM signatures, you will need to implement the IDkimPublicKeyLocator
interface. To see an example of how to implement this interface, see the DKIM signature verification
example above.
The ArcVerifier
works exactly the same as the DkimVerifier
except that it is not necessary
to provide a Header
argument to the Verify
or VerifyAsync
method.
var verifier = new ArcVerifier (new DkimPublicKeyLocator ());
var results = await verifier.VerifyAsync (message);
Console.WriteLine ("ARC results: {0}", results.Chain);
Contributing
The first thing you'll need to do is fork MimeKit to your own GitHub repository. For instructions on how to
do that, see the section titled Getting the Source Code.
If you use Visual Studio for Mac or MonoDevelop,
all of the solution files are configured with the coding style used by MimeKit. If you use Visual Studio on Windows or
some other editor, please try to maintain the existing coding style as best as you can.
Once you've got some changes that you'd like to submit upstream to the official MimeKit repository,
send me a Pull Request and I will try to review your changes in a timely manner.
If you'd like to contribute but don't have any particular features in mind to work on, check out the issue
tracker and look for something that might pique your interest!
Reporting Bugs
Have a bug or a feature request? Please open a new
bug report
or
feature request.
Before opening a new issue, please search through any existing issues
to avoid submitting duplicates. It may also be worth checking the
FAQ for common questions that other developers
have had.
If you are getting an exception from somewhere within MimeKit, don't just provide the Exception.Message
string. Please include the Exception.StackTrace
as well. The Message
, by itself, is often useless.
Documentation
API documentation can be found at https://www.mimekit.net/docs.
A copy of the XML-formatted API reference documentation is also included in the NuGet package.
.NET Foundation
MimeKit is a .NET Foundation project.
This project has adopted the code of conduct defined by the Contributor Covenant to clarify expected behavior in our community. For more information, see the .NET Foundation Code of Conduct.