X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=class%2Fdeliver%2FDeliver_SMTP.class.php;h=0fe1a40606a46e0db5423614ab4e13acf498c4dc;hb=78153530d3c8e63abbc5c193b89323de8b315117;hp=44c7cfb6a1690b2068e42d2ada0536b6266fc345;hpb=e1ee60fe48638eb837be029cc2ed56a8bb849d3a;p=squirrelmail.git diff --git a/class/deliver/Deliver_SMTP.class.php b/class/deliver/Deliver_SMTP.class.php index 44c7cfb6..0fe1a406 100644 --- a/class/deliver/Deliver_SMTP.class.php +++ b/class/deliver/Deliver_SMTP.class.php @@ -1,8 +1,351 @@ authPop($host, '', $user, $pass); + } + + $rfc822_header = $message->rfc822_header; + + $from = $rfc822_header->from[0]; + $to = $rfc822_header->to; + $cc = $rfc822_header->cc; + $bcc = $rfc822_header->bcc; + $content_type = $rfc822_header->content_type; + + // MAIL FROM: MUST be empty in cae of MDN (RFC2298) + if ($content_type->type0 == 'multipart' && + $content_type->type1 == 'report' && + isset($content_type->properties['report-type']) && + $content_type->properties['report-type']=='disposition-notification') { + $from->host = ''; + $from->mailbox = ''; + } + + if (($use_smtp_tls == true) and (check_php_version(4,3)) and (extension_loaded('openssl'))) { + $stream = @fsockopen('tls://' . $host, $port, $errorNumber, $errorString); + } else { + $stream = @fsockopen($host, $port, $errorNumber, $errorString); + } + + if (!$stream) { + $this->dlv_msg = $errorString; + $this->dlv_ret_nr = $errorNumber; + $this->dlv_server_msg = _("Can't open SMTP stream."); + return(0); + } + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + /* + * If $_SERVER['HTTP_HOST'] is set, use that in our HELO to the SMTP + * server. This should fix the DNS issues some people have had + */ + if (sqgetGlobalVar('HTTP_HOST', $HTTP_HOST, SQ_SERVER)) { // HTTP_HOST is set + // optionally trim off port number + if($p = strrpos($HTTP_HOST, ':')) { + $HTTP_HOST = substr($HTTP_HOST, 0, $p); + } + $helohost = $HTTP_HOST; + } else { // For some reason, HTTP_HOST is not set - revert to old behavior + $helohost = $domain; + } + + /* Lets introduce ourselves */ + fputs($stream, "EHLO $helohost\r\n"); + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + // fall back to HELO if EHLO is not supported + if ($this->dlv_ret_nr == '500') { + fputs($stream, "HELO $helohost\r\n"); + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + } else { + return(0); + } + } + + if (( $smtp_auth_mech == 'cram-md5') or ( $smtp_auth_mech == 'digest-md5' )) { + // Doing some form of non-plain auth + if ($smtp_auth_mech == 'cram-md5') { + fputs($stream, "AUTH CRAM-MD5\r\n"); + } elseif ($smtp_auth_mech == 'digest-md5') { + fputs($stream, "AUTH DIGEST-MD5\r\n"); + } + + $tmp = fgets($stream,1024); + + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + + // At this point, $tmp should hold "334 " + $chall = substr($tmp,4); + // Depending on mechanism, generate response string + if ($smtp_auth_mech == 'cram-md5') { + $response = cram_md5_response($user,$pass,$chall); + } elseif ($smtp_auth_mech == 'digest-md5') { + $response = digest_md5_response($user,$pass,$chall,'smtp',$host); + } + fputs($stream, $response); + + // Let's see what the server had to say about that + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + + // CRAM-MD5 is done at this point. If DIGEST-MD5, there's a bit more to go + if ($smtp_auth_mech == 'digest-md5') { + // $tmp contains rspauth, but I don't store that yet. (No need yet) + fputs($stream,"\r\n"); + $tmp = fgets($stream,1024); + + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + } + // CRAM-MD5 and DIGEST-MD5 code ends here + } elseif ($smtp_auth_mech == 'none') { + // No auth at all, just send helo and then send the mail + // We already said hi earlier, nothing more is needed. + } elseif ($smtp_auth_mech == 'login') { + // The LOGIN method + fputs($stream, "AUTH LOGIN\r\n"); + $tmp = fgets($stream, 1024); + + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + fputs($stream, base64_encode ($user) . "\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + fputs($stream, base64_encode($pass) . "\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } elseif ($smtp_auth_mech == "plain") { + /* SASL Plain */ + $auth = base64_encode("$user\0$user\0$pass"); + + $query = "AUTH PLAIN\r\n"; + fputs($stream, $query); + $read=fgets($stream, 1024); + + if (substr($read,0,3) == '334') { // OK so far.. + fputs($stream, "$auth\r\n"); + $read = fgets($stream, 1024); + } + + $results=explode(" ",$read,3); + $response=$results[1]; + $message=$results[2]; + } else { + /* Right here, they've reached an unsupported auth mechanism. + This is the ugliest hack I've ever done, but it'll do till I can fix + things up better tomorrow. So tired... */ + if ($this->errorCheck("535 Unable to use this auth type",$stream)) { + return(0); + } + } + + /* Ok, who is sending the message? */ + $fromaddress = ($from->mailbox && $from->host) ? + $from->mailbox.'@'.$from->host : ''; + fputs($stream, 'MAIL FROM:<'.$fromaddress.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + /* send who the recipients are */ + for ($i = 0, $cnt = count($to); $i < $cnt; $i++) { + if (!$to[$i]->host) $to[$i]->host = $domain; + if ($to[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$to[$i]->mailbox.'@'.$to[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + + for ($i = 0, $cnt = count($cc); $i < $cnt; $i++) { + if (!$cc[$i]->host) $cc[$i]->host = $domain; + if ($cc[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$cc[$i]->mailbox.'@'.$cc[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + + for ($i = 0, $cnt = count($bcc); $i < $cnt; $i++) { + if (!$bcc[$i]->host) $bcc[$i]->host = $domain; + if ($bcc[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$bcc[$i]->mailbox.'@'.$bcc[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + /* Lets start sending the actual message */ + fputs($stream, "DATA\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + return $stream; + } + + function finalizeStream($stream) { + fputs($stream, "\r\n.\r\n"); /* end the DATA part */ + $tmp = fgets($stream, 1024); + $this->errorCheck($tmp, $stream); + if ($this->dlv_ret_nr != 250) { + return(0); + } + fputs($stream, "QUIT\r\n"); /* log off */ + fclose($stream); + return true; + } + + /* check if an SMTP reply is an error and set an error message) */ + function errorCheck($line, $smtpConnection) { + + $err_num = substr($line, 0, 3); + $this->dlv_ret_nr = $err_num; + $server_msg = substr($line, 4); + + while(substr($line, 0, 4) == ($err_num.'-')) { + $line = fgets($smtpConnection, 1024); + $server_msg .= substr($line, 4); + } + + if ( ((int) $err_num{0}) < 4) { + return false; + } + + switch ($err_num) { + case '421': $message = _("Service not available, closing channel"); + break; + case '432': $message = _("A password transition is needed"); + break; + case '450': $message = _("Requested mail action not taken: mailbox unavailable"); + break; + case '451': $message = _("Requested action aborted: error in processing"); + break; + case '452': $message = _("Requested action not taken: insufficient system storage"); + break; + case '454': $message = _("Temporary authentication failure"); + break; + case '500': $message = _("Syntax error; command not recognized"); + break; + case '501': $message = _("Syntax error in parameters or arguments"); + break; + case '502': $message = _("Command not implemented"); + break; + case '503': $message = _("Bad sequence of commands"); + break; + case '504': $message = _("Command parameter not implemented"); + break; + case '530': $message = _("Authentication required"); + break; + case '534': $message = _("Authentication mechanism is too weak"); + break; + case '535': $message = _("Authentication failed"); + break; + case '538': $message = _("Encryption required for requested authentication mechanism"); + break; + case '550': $message = _("Requested action not taken: mailbox unavailable"); + break; + case '551': $message = _("User not local; please try forwarding"); + break; + case '552': $message = _("Requested mail action aborted: exceeding storage allocation"); + break; + case '553': $message = _("Requested action not taken: mailbox name not allowed"); + break; + case '554': $message = _("Transaction failed"); + break; + default: $message = _("Unknown response"); + break; + } + + $this->dlv_msg = $message; + $this->dlv_server_msg = nl2br(htmlspecialchars($server_msg)); + + return true; + } + + function authPop($pop_server='', $pop_port='', $user, $pass) { + if (!$pop_port) { + $pop_port = 110; + } + if (!$pop_server) { + $pop_server = 'localhost'; + } + $popConnection = fsockopen($pop_server, $pop_port, $err_no, $err_str); + if (!$popConnection) { + error_log("Error connecting to POP Server ($pop_server:$pop_port)" + . " $err_no : $err_str"); + } else { + $tmp = fgets($popConnection, 1024); /* banner */ + if (substr($tmp, 0, 3) != '+OK') { + return(0); + } + fputs($popConnection, "USER $user\r\n"); + $tmp = fgets($popConnection, 1024); + if (substr($tmp, 0, 3) != '+OK') { + return(0); + } + fputs($popConnection, 'PASS ' . $pass . "\r\n"); + $tmp = fgets($popConnection, 1024); + if (substr($tmp, 0, 3) != '+OK') { + return(0); + } + fputs($popConnection, "QUIT\r\n"); /* log off */ + fclose($popConnection); + } + } } -?> + +?> \ No newline at end of file