* stable-3.1: Update git submodules Verify hostname when sending emails via SMTP server with SMTPSClient Docs: Clarify that 'm' push option sets patch set description Change-Id: I5bf577afd6345610d6ee48b662096cbd81267507
191 lines
6.3 KiB
Java
191 lines
6.3 KiB
Java
// Copyright (C) 2009 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package org.apache.commons.net.smtp;
|
|
|
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
|
|
|
import com.google.common.io.BaseEncoding;
|
|
import com.google.gerrit.util.ssl.BlindTrustManager;
|
|
import java.io.IOException;
|
|
import java.io.UnsupportedEncodingException;
|
|
import java.security.InvalidKeyException;
|
|
import java.security.NoSuchAlgorithmException;
|
|
import java.util.Arrays;
|
|
import java.util.List;
|
|
import javax.crypto.Mac;
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
/**
|
|
* SMTP Client with authentication support and optional SSL processing and verification. {@link
|
|
* org.apache.commons.net.smtp.SMTPSClient} is used for the SSL handshake and hostname verification.
|
|
*
|
|
* <p>If shouldHandshakeOnConnect mode is selected, SSL/TLS negotiation starts right after the
|
|
* connection has been established. Otherwise SSL/TLS negotiation will only occur if {@link
|
|
* AuthSMTPClient#execTLS} is explicitly called and the server accepts the command.
|
|
*
|
|
* <p>Examples:
|
|
*
|
|
* <ul>
|
|
* <li>For SSL connection:
|
|
* <pre>
|
|
* AuthSMTPClient c = new AuthSMTPClient(true, sslVerify);
|
|
* c.connect("127.0.0.1", 465);
|
|
* </pre>
|
|
* <li>For TLS connection:
|
|
* <pre>
|
|
* AuthSMTPClient c = new AuthSMTPClient(false, sslVerify);
|
|
* c.connect("127.0.0.1", 25);
|
|
* if (c.execTLS()) { /rest of the commands here/ }
|
|
* </pre>
|
|
* <li>If SSL encryption is not required:
|
|
* <pre>
|
|
* AuthSMTPClient c = new AuthSMTPClient(false, false);
|
|
* c.connect("127.0.0.1", port);
|
|
* </pre>
|
|
*/
|
|
public class AuthSMTPClient extends SMTPSClient {
|
|
|
|
private String authTypes;
|
|
|
|
/**
|
|
* Constructs AuthSMTPClient.
|
|
*
|
|
* @param shouldHandshakeOnConnect the SSL processing mode, {@code true} if SSL negotiation should
|
|
* start right after connect, {@code false} if it will be started by the user explicitly or
|
|
* SSL negotiation is not required.
|
|
* @param sslVerificationEnabled {@code true} if the SMTP server's SSL certificate and hostname
|
|
* should be verified, {@code false} otherwise.
|
|
*/
|
|
public AuthSMTPClient(boolean shouldHandshakeOnConnect, boolean sslVerificationEnabled) {
|
|
// If SSL Encryption is required, SMTPSClient is used for the handshake.
|
|
// Otherwise, use SMTPSClient in 'explicit' mode without calling execTLS().
|
|
// See SMTPSClient._connectAction_ in commons-net-3.6.
|
|
super("TLS", shouldHandshakeOnConnect, UTF_8.name());
|
|
this.setEndpointCheckingEnabled(sslVerificationEnabled);
|
|
if (!sslVerificationEnabled) {
|
|
this.setTrustManager(new BlindTrustManager());
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public boolean login() throws IOException {
|
|
final String name = getLocalAddress().getHostName();
|
|
if (name == null) {
|
|
return false;
|
|
}
|
|
|
|
boolean ok = SMTPReply.isPositiveCompletion(sendCommand("EHLO", name));
|
|
authTypes = "";
|
|
for (String line : getReplyStrings()) {
|
|
if (line != null && (line.startsWith("250 AUTH ") || line.startsWith("250-AUTH "))) {
|
|
authTypes = line;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return ok;
|
|
}
|
|
|
|
public boolean auth(String smtpUser, String smtpPass) throws IOException {
|
|
List<String> types = Arrays.asList(authTypes.split(" "));
|
|
if ("".equals(authTypes)) {
|
|
// Server didn't advertise authentication support.
|
|
//
|
|
return true;
|
|
}
|
|
|
|
if (smtpPass == null) {
|
|
smtpPass = "";
|
|
}
|
|
if (types.contains("CRAM-SHA1")) {
|
|
return authCram(smtpUser, smtpPass, "SHA1");
|
|
}
|
|
if (types.contains("CRAM-MD5")) {
|
|
return authCram(smtpUser, smtpPass, "MD5");
|
|
}
|
|
if (types.contains("LOGIN")) {
|
|
return authLogin(smtpUser, smtpPass);
|
|
}
|
|
if (types.contains("PLAIN")) {
|
|
return authPlain(smtpUser, smtpPass);
|
|
}
|
|
throw new IOException("Unsupported AUTH: " + authTypes);
|
|
}
|
|
|
|
private boolean authCram(String smtpUser, String smtpPass, String alg)
|
|
throws UnsupportedEncodingException, IOException {
|
|
final String macName = "Hmac" + alg;
|
|
if (sendCommand("AUTH", "CRAM-" + alg) != 334) {
|
|
return false;
|
|
}
|
|
|
|
final String enc = getReplyStrings()[0].split(" ", 2)[1];
|
|
final byte[] nonce = BaseEncoding.base64().decode(enc);
|
|
final String sec;
|
|
try {
|
|
Mac mac = Mac.getInstance(macName);
|
|
mac.init(new SecretKeySpec(smtpPass.getBytes(UTF_8), macName));
|
|
sec = toHex(mac.doFinal(nonce));
|
|
} catch (NoSuchAlgorithmException | InvalidKeyException e) {
|
|
throw new IOException("Cannot use CRAM-" + alg, e);
|
|
}
|
|
|
|
String token = smtpUser + ' ' + sec;
|
|
String cmd = encodeBase64(token.getBytes(UTF_8));
|
|
return SMTPReply.isPositiveCompletion(sendCommand(cmd));
|
|
}
|
|
|
|
private boolean authLogin(String smtpUser, String smtpPass)
|
|
throws UnsupportedEncodingException, IOException {
|
|
if (sendCommand("AUTH", "LOGIN") != 334) {
|
|
return false;
|
|
}
|
|
|
|
String cmd = encodeBase64(smtpUser.getBytes(UTF_8));
|
|
if (sendCommand(cmd) != 334) {
|
|
return false;
|
|
}
|
|
|
|
cmd = encodeBase64(smtpPass.getBytes(UTF_8));
|
|
return SMTPReply.isPositiveCompletion(sendCommand(cmd));
|
|
}
|
|
|
|
private static final char[] hexchar = {
|
|
'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'
|
|
};
|
|
|
|
private String toHex(byte[] b) {
|
|
final StringBuilder sec = new StringBuilder();
|
|
for (byte c : b) {
|
|
final int u = (c >> 4) & 0xf;
|
|
final int l = c & 0xf;
|
|
sec.append(hexchar[u]);
|
|
sec.append(hexchar[l]);
|
|
}
|
|
return sec.toString();
|
|
}
|
|
|
|
private boolean authPlain(String smtpUser, String smtpPass)
|
|
throws UnsupportedEncodingException, IOException {
|
|
String token = '\0' + smtpUser + '\0' + smtpPass;
|
|
String cmd = "PLAIN " + encodeBase64(token.getBytes(UTF_8));
|
|
return SMTPReply.isPositiveCompletion(sendCommand("AUTH", cmd));
|
|
}
|
|
|
|
private static String encodeBase64(byte[] data) {
|
|
return BaseEncoding.base64().encode(data);
|
|
}
|
|
}
|