X-Git-Url: https://vcs.fsf.org/?p=squirrelmail.git;a=blobdiff_plain;f=class%2Fdeliver%2FDeliver_SMTP.class.php;h=490f21b7af9bce9378cc159e4219d2f67e55e983;hp=19b306638772c6eadba18071ffaaa04021c228e5;hb=cc201b463e7d240bd4656795e5a3f0af14fb05c8;hpb=09c2c717cc82061c09c91359b2c59661854bb846 diff --git a/class/deliver/Deliver_SMTP.class.php b/class/deliver/Deliver_SMTP.class.php index 19b30663..490f21b7 100644 --- a/class/deliver/Deliver_SMTP.class.php +++ b/class/deliver/Deliver_SMTP.class.php @@ -1,228 +1,361 @@ authPop($host, '', $username, $pass); - } - - $rfc822_header = $message->rfc822_header; - $from = $rfc822_header->from[0]; - $to = $rfc822_header->to; - $cc = $rfc822_header->cc; - $bcc = $rfc822_header->bcc; - - if (($use_smtp_tls == true) and (check_php_version(4,3)) and (extension_loaded('openssl'))) { - $stream = fsockopen('tls://' . $host, $port, $errorNumber, $errorString); - } else { - $stream = fsockopen($host, $port, $errorNumber, $errorString); - } - - if (!$stream) { - $this->dlv_msg = $errorString; - $this->dlv_ret_nr = $errorNumber; - return(0); - } - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - - /* - * If $_SERVER['HTTP_HOST'] is set, use that in our HELO to the SMTP - * server. This should fix the DNS issues some people have had - */ - if (sqgetGlobalVar('HTTP_HOST', $HTTP_HOST, SQ_SERVER)) { // HTTP_HOST is set - // optionally trim off port number - if($p = strrpos($HTTP_HOST, ':')) { - $HTTP_HOST = substr($HTTP_HOST, 0, $p); + global $use_smtp_tls,$smtp_auth_mech; + + if ($authpop) { + $this->authPop($host, '', $user, $pass); } - $helohost = $HTTP_HOST; - } else { // For some reason, HTTP_HOST is not set - revert to old behavior - $helohost = $domain; - } - - /* Lets introduce ourselves */ - fputs($stream, "EHLO $helohost\r\n"); - $tmp = fgets($stream,1024); - if ($this->errorCheck($tmp,$stream)) { - return(0); - } - if (( $smtp_auth_mech == 'cram-md5') or ( $smtp_auth_mech == 'digest-md5' )) { - // Doing some form of non-plain auth - if ($smtp_auth_mech == 'cram-md5') { - fputs($stream, "AUTH CRAM-MD5\r\n"); - } elseif ($smtp_auth_mech == 'digest-md5') { - fputs($stream, "AUTH DIGEST-MD5\r\n"); - } - - $tmp = fgets($stream,1024); - - if ($this->errorCheck($tmp,$stream)) { - return(0); - } - - // At this point, $tmp should hold "334 " - $chall = substr($tmp,4); - // Depending on mechanism, generate response string - if ($smtp_auth_mech == 'cram-md5') { - $response = cram_md5_response($username,$pass,$chall); - } elseif ($smtp_auth_mech == 'digest-md5') { - $response = digest_md5_response($username,$pass,$chall,'smtp',$host); - } - fputs($stream, $response); - - // Let's see what the server had to say about that - $tmp = fgets($stream,1024); - if ($this->errorCheck($tmp,$stream)) { - return(0); - } - - // CRAM-MD5 is done at this point. If DIGEST-MD5, there's a bit more to go - if ($smtp_auth_mech == 'digest-md5') - { - // $tmp contains rspauth, but I don't store that yet. (No need yet) - fputs($stream,"\r\n"); - $tmp = fgets($stream,1024); - - if ($this->errorCheck($tmp,$stream)) { - return(0); - } - } - // CRAM-MD5 and DIGEST-MD5 code ends here - } elseif ($smtp_auth_mech == 'none') { - // No auth at all, just send helo and then send the mail - // We already said hi earlier, nothing more is needed. - } elseif ($smtp_auth_mech == 'login') { - // The LOGIN method - fputs($stream, "AUTH LOGIN\r\n"); - $tmp = fgets($stream, 1024); - - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - fputs($stream, base64_encode ($username) . "\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - - fputs($stream, base64_encode($pass) . "\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - } elseif ($smtp_auth_mech == "plain") { - /* SASL Plain */ - $auth = base64_encode("$username\0$username\0$pass"); - - $query = "AUTH PLAIN\r\n"; - fputs($stream, $query); - $read=fgets($stream, 1024); - - if (substr($read,0,3) == '334') { // OK so far.. - fputs($stream, "$auth\r\n"); - $read = fgets($stream, 1024); - } - - $results=explode(" ",$read,3); - $response=$results[1]; - $message=$results[2]; - - - } else { - /* Right here, they've reached an unsupported auth mechanism. - This is the ugliest hack I've ever done, but it'll do till I can fix - things up better tomorrow. So tired... */ - if ($this->errorCheck("535 Unable to use this auth type",$stream)) { - return(0); - } - } - - /* Ok, who is sending the message? */ - fputs($stream, 'MAIL FROM:<'.$from->mailbox.'@'.$from->host.">\r\n"); + $rfc822_header = $message->rfc822_header; + + $from = $rfc822_header->from[0]; + $to = $rfc822_header->to; + $cc = $rfc822_header->cc; + $bcc = $rfc822_header->bcc; + $content_type = $rfc822_header->content_type; + + // MAIL FROM: MUST be empty in cae of MDN (RFC2298) + if ($content_type->type0 == 'multipart' && + $content_type->type1 == 'report' && + isset($content_type->properties['report-type']) && + $content_type->properties['report-type']=='disposition-notification') { + // reinitialize the from object because otherwise the from header somehow + // is affected. This $from var is used for smtp command MAIL FROM which + // is not the same as what we put in the rfc822 header. + $from = new AddressStructure(); + $from->host = ''; + $from->mailbox = ''; + } + + if ($use_smtp_tls == 1) { + if ((check_php_version(4,3)) && (extension_loaded('openssl'))) { + $stream = @fsockopen('tls://' . $host, $port, $errorNumber, $errorString); + $this->tls_enabled = true; + } else { + /** + * don't connect to server when user asks for smtps and + * PHP does not support it. + */ + $errorNumber = ''; + $errorString = _("Secure SMTP (TLS) is enabled in SquirrelMail configuration, but used PHP version does not support it."); + } + } else { + $stream = @fsockopen($host, $port, $errorNumber, $errorString); + } + + if (!$stream) { + // reset tls state var to default value, if connection fails + $this->tls_enabled = false; + // set error messages + $this->dlv_msg = $errorString; + $this->dlv_ret_nr = $errorNumber; + $this->dlv_server_msg = _("Can't open SMTP stream."); + return(0); + } + // get server greeting + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + /* + * If $_SERVER['HTTP_HOST'] is set, use that in our HELO to the SMTP + * server. This should fix the DNS issues some people have had + */ + if (sqgetGlobalVar('HTTP_HOST', $HTTP_HOST, SQ_SERVER)) { // HTTP_HOST is set + // optionally trim off port number + if($p = strrpos($HTTP_HOST, ':')) { + $HTTP_HOST = substr($HTTP_HOST, 0, $p); + } + $helohost = $HTTP_HOST; + } else { // For some reason, HTTP_HOST is not set - revert to old behavior + $helohost = $domain; + } + + /* Lets introduce ourselves */ + fputs($stream, "EHLO $helohost\r\n"); + // Read ehlo response + $tmp = $this->parse_ehlo_response($stream); + if ($this->errorCheck($tmp,$stream)) { + // fall back to HELO if EHLO is not supported (error 5xx) + if ($this->dlv_ret_nr{0} == '5') { + fputs($stream, "HELO $helohost\r\n"); + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + } else { + return(0); + } + } + + /** + * Implementing SMTP STARTTLS (rfc2487) in php 5.1.0+ + * http://www.php.net/stream-socket-enable-crypto + */ + if ($use_smtp_tls === 2) { + if (function_exists('stream_socket_enable_crypto')) { + // don't try starting tls, when client thinks that it is already active + if ($this->tls_enabled) { + $this->dlv_msg = _("TLS session is already activated."); + return 0; + } elseif (!array_key_exists('STARTTLS',$this->ehlo)) { + // check for starttls in ehlo response + $this->dlv_msg = _("SMTP STARTTLS is enabled in SquirrelMail configuration, but used SMTP server does not support it"); + return 0; + } + + // issue starttls command + fputs($stream, "STARTTLS\r\n"); + // get response + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + return 0; + } + + // start crypto on connection. suppress function errors. + if (@stream_socket_enable_crypto($stream,true,STREAM_CRYPTO_METHOD_TLS_CLIENT)) { + // starttls was successful (rfc2487 5.2 Result of the STARTTLS Command) + // get new EHLO response + fputs($stream, "EHLO $helohost\r\n"); + // Read ehlo response + $tmp = $this->parse_ehlo_response($stream); + if ($this->errorCheck($tmp,$stream)) { + // don't revert to helo here. server must support ESMTP + return 0; + } + // set information about started tls + $this->tls_enabled = true; + } else { + /** + * stream_socket_enable_crypto() call failed. + */ + $this->dlv_msg = _("Unable to start TLS."); + return 0; + // Bug: can't get error message. See comments in sqimap_create_stream(). + } + } else { + // php install does not support stream_socket_enable_crypto() function + $this->dlv_msg = _("SMTP STARTTLS is enabled in SquirrelMail configuration, but used PHP version does not support functions that allow to enable encryption on open socket."); + return 0; + } + } + + // FIXME: check ehlo response before using authentication + if (( $smtp_auth_mech == 'cram-md5') or ( $smtp_auth_mech == 'digest-md5' )) { + // Doing some form of non-plain auth + if ($smtp_auth_mech == 'cram-md5') { + fputs($stream, "AUTH CRAM-MD5\r\n"); + } elseif ($smtp_auth_mech == 'digest-md5') { + fputs($stream, "AUTH DIGEST-MD5\r\n"); + } + + $tmp = fgets($stream,1024); + + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + + // At this point, $tmp should hold "334 " + $chall = substr($tmp,4); + // Depending on mechanism, generate response string + if ($smtp_auth_mech == 'cram-md5') { + $response = cram_md5_response($user,$pass,$chall); + } elseif ($smtp_auth_mech == 'digest-md5') { + $response = digest_md5_response($user,$pass,$chall,'smtp',$host); + } + fputs($stream, $response); + + // Let's see what the server had to say about that + $tmp = fgets($stream,1024); + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + + // CRAM-MD5 is done at this point. If DIGEST-MD5, there's a bit more to go + if ($smtp_auth_mech == 'digest-md5') { + // $tmp contains rspauth, but I don't store that yet. (No need yet) + fputs($stream,"\r\n"); + $tmp = fgets($stream,1024); + + if ($this->errorCheck($tmp,$stream)) { + return(0); + } + } + // CRAM-MD5 and DIGEST-MD5 code ends here + } elseif ($smtp_auth_mech == 'none') { + // No auth at all, just send helo and then send the mail + // We already said hi earlier, nothing more is needed. + } elseif ($smtp_auth_mech == 'login') { + // The LOGIN method + fputs($stream, "AUTH LOGIN\r\n"); + $tmp = fgets($stream, 1024); + + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + fputs($stream, base64_encode ($user) . "\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + fputs($stream, base64_encode($pass) . "\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } elseif ($smtp_auth_mech == "plain") { + /* SASL Plain */ + $auth = base64_encode("$user\0$user\0$pass"); + + $query = "AUTH PLAIN\r\n"; + fputs($stream, $query); + $read=fgets($stream, 1024); + + if (substr($read,0,3) == '334') { // OK so far.. + fputs($stream, "$auth\r\n"); + $read = fgets($stream, 1024); + } + + $results=explode(" ",$read,3); + $response=$results[1]; + $message=$results[2]; + } else { + /* Right here, they've reached an unsupported auth mechanism. + This is the ugliest hack I've ever done, but it'll do till I can fix + things up better tomorrow. So tired... */ + if ($this->errorCheck("535 Unable to use this auth type",$stream)) { + return(0); + } + } + + /* Ok, who is sending the message? */ + $fromaddress = ($from->mailbox && $from->host) ? + $from->mailbox.'@'.$from->host : ''; + fputs($stream, 'MAIL FROM:<'.$fromaddress.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + + /* send who the recipients are */ + for ($i = 0, $cnt = count($to); $i < $cnt; $i++) { + if (!$to[$i]->host) $to[$i]->host = $domain; + if ($to[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$to[$i]->mailbox.'@'.$to[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + + for ($i = 0, $cnt = count($cc); $i < $cnt; $i++) { + if (!$cc[$i]->host) $cc[$i]->host = $domain; + if ($cc[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$cc[$i]->mailbox.'@'.$cc[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + + for ($i = 0, $cnt = count($bcc); $i < $cnt; $i++) { + if (!$bcc[$i]->host) $bcc[$i]->host = $domain; + if ($bcc[$i]->mailbox) { + fputs($stream, 'RCPT TO:<'.$bcc[$i]->mailbox.'@'.$bcc[$i]->host.">\r\n"); + $tmp = fgets($stream, 1024); + if ($this->errorCheck($tmp, $stream)) { + return(0); + } + } + } + /* Lets start sending the actual message */ + fputs($stream, "DATA\r\n"); $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - - /* send who the recipients are */ - for ($i = 0, $cnt = count($to); $i < $cnt; $i++) { - if (!$to[$i]->host) $to[$i]->host = $domain; - if ($to[$i]->mailbox) { - fputs($stream, 'RCPT TO:<'.$to[$i]->mailbox.'@'.$to[$i]->host.">\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - } - } - - for ($i = 0, $cnt = count($cc); $i < $cnt; $i++) { - if (!$cc[$i]->host) $cc[$i]->host = $domain; - if ($cc[$i]->mailbox) { - fputs($stream, 'RCPT TO:<'.$cc[$i]->mailbox.'@'.$cc[$i]->host.">\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - } - } - - for ($i = 0, $cnt = count($bcc); $i < $cnt; $i++) { - if (!$bcc[$i]->host) $bcc[$i]->host = $domain; - if ($bcc[$i]->mailbox) { - fputs($stream, 'RCPT TO:<'.$bcc[$i]->mailbox.'@'.$bcc[$i]->host.">\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - } + if ($this->errorCheck($tmp, $stream)) { + return(0); } - /* Lets start sending the actual message */ - fputs($stream, "DATA\r\n"); - $tmp = fgets($stream, 1024); - if ($this->errorCheck($tmp, $stream)) { - return(0); - } - return $stream; + return $stream; } - + function finalizeStream($stream) { - fputs($stream, ".\r\n"); /* end the DATA part */ - $tmp = fgets($stream, 1024); - $this->errorCheck($tmp, $stream); - if ($this->dlv_ret_nr != 250) { - return(0); - } - fputs($stream, "QUIT\r\n"); /* log off */ - fclose($stream); - return true; + fputs($stream, "\r\n.\r\n"); /* end the DATA part */ + $tmp = fgets($stream, 1024); + $this->errorCheck($tmp, $stream); + if ($this->dlv_ret_nr != 250) { + return(0); + } + fputs($stream, "QUIT\r\n"); /* log off */ + fclose($stream); + return true; } - + /* check if an SMTP reply is an error and set an error message) */ function errorCheck($line, $smtpConnection) { @@ -235,9 +368,8 @@ class Deliver_SMTP extends Deliver { $server_msg .= substr($line, 4); } - if ( ((int) $err_num{0}) < 4) - { - return false; + if ( ((int) $err_num{0}) < 4) { + return false; } switch ($err_num) { @@ -262,7 +394,7 @@ class Deliver_SMTP extends Deliver { case '503': $message = _("Bad sequence of commands"); break; case '504': $message = _("Command parameter not implemented"); - break; + break; case '530': $message = _("Authentication required"); break; case '534': $message = _("Authentication mechanism is too weak"); @@ -286,11 +418,11 @@ class Deliver_SMTP extends Deliver { } $this->dlv_msg = $message; - $this->dlv_server_msg = nl2br(htmlspecialchars($server_msg)); + $this->dlv_server_msg = $server_msg; return true; } - + function authPop($pop_server='', $pop_port='', $user, $pass) { if (!$pop_port) { $pop_port = 110; @@ -301,7 +433,7 @@ class Deliver_SMTP extends Deliver { $popConnection = fsockopen($pop_server, $pop_port, $err_no, $err_str); if (!$popConnection) { error_log("Error connecting to POP Server ($pop_server:$pop_port)" - . " $err_no : $err_str"); + . " $err_no : $err_str"); } else { $tmp = fgets($popConnection, 1024); /* banner */ if (substr($tmp, 0, 3) != '+OK') { @@ -321,6 +453,64 @@ class Deliver_SMTP extends Deliver { fclose($popConnection); } } -} -?> + /** + * Parses ESMTP EHLO response (rfc1869) + * + * Reads SMTP response to EHLO command and fills class variables + * (ehlo array and domain string). Returns last line. + * @param stream $stream smtp connection stream. + * @return string last ehlo line + * @since 1.5.1 + */ + function parse_ehlo_response($stream) { + // don't cache ehlo information + $this->ehlo=array(); + $ret = ''; + $firstline = true; + /** + * ehlo mailclient.example.org + * 250-mail.example.org + * 250-PIPELINING + * 250-SIZE 52428800 + * 250-DATAZ + * 250-STARTTLS + * 250-AUTH LOGIN PLAIN + * 250 8BITMIME + */ + while ($line=fgets($stream, 1024)){ + // match[1] = first symbol after 250 + // match[2] = domain or ehlo-keyword + // match[3] = greeting or ehlo-param + // match space after keyword in ehlo-keyword CR LF + if (preg_match("/^250(-|\s)(\S*)\s+(\S.*)\r\n/",$line,$match)|| + preg_match("/^250(-|\s)(\S*)\s*\r\n/",$line,$match)) { + if ($firstline) { + // first ehlo line (250[-\ ]domain SP greeting) + $this->domain = $match[2]; + $firstline=false; + } elseif (!isset($match[3])) { + // simple one word extension + $this->ehlo[strtoupper($match[2])]=''; + } elseif (!preg_match("/\s/",trim($match[3]))) { + // extension with one option + // yes, I know about ctype extension. no, i don't want to depend on it + $this->ehlo[strtoupper($match[2])]=trim($match[3]); + } else { + // ehlo-param with spaces + $this->ehlo[strtoupper($match[2])]=explode(' ',trim($match[3])); + } + if ($match[1]==' ') { + // stop while cycle, if we reach last 250 line + $ret = $line; + break; + } + } else { + // this is not 250 response + $ret = $line; + break; + } + } + return $ret; + } +}