2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2012 Hiroyuki Yamamoto and the Claws Mail team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "claws-features.h"
27 #include <glib/gi18n.h>
40 static void smtp_session_destroy(Session *session);
42 static gint smtp_auth(SMTPSession *session);
44 static gint smtp_starttls(SMTPSession *session);
46 static gint smtp_auth_cram_md5(SMTPSession *session);
47 static gint smtp_auth_login(SMTPSession *session);
48 static gint smtp_auth_plain(SMTPSession *session);
50 static gint smtp_ehlo(SMTPSession *session);
51 static gint smtp_ehlo_recv(SMTPSession *session, const gchar *msg);
53 static gint smtp_helo(SMTPSession *session);
54 static gint smtp_rcpt(SMTPSession *session);
55 static gint smtp_data(SMTPSession *session);
56 static gint smtp_send_data(SMTPSession *session);
57 static gint smtp_make_ready(SMTPSession *session);
58 static gint smtp_eom(SMTPSession *session);
60 static gint smtp_session_recv_msg(Session *session, const gchar *msg);
61 static gint smtp_session_send_data_finished(Session *session, guint len);
64 Session *smtp_session_new(void *prefs_account)
68 session = g_new0(SMTPSession, 1);
70 session_init(SESSION(session), prefs_account, TRUE);
72 SESSION(session)->type = SESSION_SMTP;
74 SESSION(session)->recv_msg = smtp_session_recv_msg;
76 SESSION(session)->recv_data_finished = NULL;
77 SESSION(session)->send_data_finished = smtp_session_send_data_finished;
79 SESSION(session)->destroy = smtp_session_destroy;
81 session->state = SMTP_READY;
84 session->tls_init_done = FALSE;
87 session->hostname = NULL;
92 session->to_list = NULL;
93 session->cur_to = NULL;
95 session->send_data = NULL;
96 session->send_data_len = 0;
98 session->max_message_size = -1;
100 session->avail_auth_type = 0;
101 session->forced_auth_type = 0;
102 session->auth_type = 0;
103 session->esmtp_flags = 0;
105 session->error_val = SM_OK;
106 session->error_msg = NULL;
108 return SESSION(session);
111 static void smtp_session_destroy(Session *session)
113 SMTPSession *smtp_session = SMTP_SESSION(session);
115 g_free(smtp_session->hostname);
116 g_free(smtp_session->user);
117 g_free(smtp_session->pass);
118 g_free(smtp_session->from);
120 g_free(smtp_session->send_data);
122 g_free(smtp_session->error_msg);
125 gint smtp_from(SMTPSession *session)
127 gchar buf[MESSAGEBUFSIZE];
128 gchar *mail_size = NULL;
130 cm_return_val_if_fail(session->from != NULL, SM_ERROR);
132 session->state = SMTP_FROM;
134 if (session->is_esmtp && (session->esmtp_flags & ESMTP_SIZE)!=0)
135 mail_size = g_strdup_printf(" SIZE=%d", session->send_data_len);
137 mail_size = g_strdup("");
140 if (strchr(session->from, '<'))
141 g_snprintf(buf, sizeof(buf), "MAIL FROM:%s%s", session->from,
144 g_snprintf(buf, sizeof(buf), "MAIL FROM:<%s>%s", session->from,
149 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
151 log_print(LOG_PROTOCOL, "%sSMTP> %s\n", (session->is_esmtp?"E":""), buf);
156 static gint smtp_auth(SMTPSession *session)
159 cm_return_val_if_fail(session->user != NULL, SM_ERROR);
161 session->state = SMTP_AUTH;
163 if ((session->forced_auth_type == SMTPAUTH_CRAM_MD5
164 || session->forced_auth_type == 0)
166 (session->avail_auth_type & SMTPAUTH_CRAM_MD5) != 0)
167 smtp_auth_cram_md5(session);
168 else if ((session->forced_auth_type == SMTPAUTH_LOGIN
169 || session->forced_auth_type == 0)
171 (session->avail_auth_type & SMTPAUTH_LOGIN) != 0)
172 smtp_auth_login(session);
173 else if ((session->forced_auth_type == SMTPAUTH_PLAIN
174 || session->forced_auth_type == 0)
176 (session->avail_auth_type & SMTPAUTH_PLAIN) != 0)
177 smtp_auth_plain(session);
178 else if (session->forced_auth_type == 0) {
179 log_warning(LOG_PROTOCOL, _("No SMTP AUTH method available\n"));
182 log_warning(LOG_PROTOCOL, _("Selected SMTP AUTH method not available\n"));
189 static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
191 gchar buf[MESSAGEBUFSIZE], *tmp;
193 switch (session->auth_type) {
195 session->state = SMTP_AUTH_LOGIN_USER;
197 if (!strncmp(msg, "334 ", 4)) {
198 tmp = g_base64_encode(session->user, strlen(session->user));
200 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
206 log_print(LOG_PROTOCOL, "ESMTP> [USERID]\n");
208 /* Server rejects AUTH */
209 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
212 log_print(LOG_PROTOCOL, "ESMTP> *\n");
215 case SMTPAUTH_CRAM_MD5:
216 session->state = SMTP_AUTH_CRAM_MD5;
218 if (!strncmp(msg, "334 ", 4)) {
221 gchar *challenge, *tmp;
223 guchar hexdigest[33];
225 tmp = g_base64_decode(msg + 4, &challengelen);
226 challenge = g_strndup(tmp, challengelen);
228 log_print(LOG_PROTOCOL, "ESMTP< [Decoded: %s]\n", challenge);
230 g_snprintf(buf, sizeof(buf), "%s", session->pass);
231 md5_hex_hmac(hexdigest, challenge, challengelen,
232 buf, strlen(session->pass));
235 response = g_strdup_printf
236 ("%s %s", session->user, hexdigest);
237 log_print(LOG_PROTOCOL, "ESMTP> [Encoded: %s]\n", response);
239 response64 = g_base64_encode(response, strlen(response));
242 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
247 log_print(LOG_PROTOCOL, "ESMTP> %s\n", response64);
250 /* Server rejects AUTH */
251 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
254 log_print(LOG_PROTOCOL, "ESMTP> *\n");
257 case SMTPAUTH_DIGEST_MD5:
259 /* stop smtp_auth when no correct authtype */
260 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "*") < 0)
262 log_print(LOG_PROTOCOL, "ESMTP> *\n");
269 static gint smtp_auth_login_user_recv(SMTPSession *session, const gchar *msg)
271 gchar buf[MESSAGEBUFSIZE], *tmp;
274 session->state = SMTP_AUTH_LOGIN_PASS;
276 if (!strncmp(msg, "334 ", 4)) {
277 tmp = g_base64_encode(session->pass, strlen(session->pass));
278 len = g_strlcat(buf, tmp, MESSAGEBUFSIZE);
279 if (len >= MESSAGEBUFSIZE) {
280 /* This should never happen, and even if it does, all it will do
281 * is send an incorrect password so auth will fail. That's why
282 * we're printing this debug message, so investigating user or dev
283 * will know what's wrong. */
284 debug_print("Truncation of password occured in g_strlcat().\n");
288 /* Server rejects AUTH */
289 g_snprintf(buf, sizeof(buf), "*");
292 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
295 log_print(LOG_PROTOCOL, "ESMTP> [PASSWORD]\n");
300 static gint smtp_ehlo(SMTPSession *session)
302 gchar buf[MESSAGEBUFSIZE];
304 session->state = SMTP_EHLO;
306 session->avail_auth_type = 0;
308 g_snprintf(buf, sizeof(buf), "EHLO %s",
309 session->hostname ? session->hostname : get_domain_name());
310 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
312 log_print(LOG_PROTOCOL, "ESMTP> %s\n", buf);
317 static gint smtp_ehlo_recv(SMTPSession *session, const gchar *msg)
319 if (strncmp(msg, "250", 3) == 0) {
320 const gchar *p = msg;
322 if (*p == '-' || *p == ' ') p++;
323 if (g_ascii_strncasecmp(p, "AUTH", 4) == 0) {
325 if (strcasestr(p, "PLAIN"))
326 session->avail_auth_type |= SMTPAUTH_PLAIN;
327 if (strcasestr(p, "LOGIN"))
328 session->avail_auth_type |= SMTPAUTH_LOGIN;
329 if (strcasestr(p, "CRAM-MD5"))
330 session->avail_auth_type |= SMTPAUTH_CRAM_MD5;
331 if (strcasestr(p, "DIGEST-MD5"))
332 session->avail_auth_type |= SMTPAUTH_DIGEST_MD5;
334 if (g_ascii_strncasecmp(p, "SIZE", 4) == 0) {
336 session->max_message_size = atoi(p);
337 session->esmtp_flags |= ESMTP_SIZE;
339 if (g_ascii_strncasecmp(p, "STARTTLS", 8) == 0) {
341 session->avail_auth_type |= SMTPAUTH_TLS_AVAILABLE;
344 } else if ((msg[0] == '1' || msg[0] == '2' || msg[0] == '3') &&
345 (msg[3] == ' ' || msg[3] == '\0'))
347 else if (msg[0] == '5' && msg[1] == '0' &&
348 (msg[2] == '4' || msg[2] == '3' || msg[2] == '1'))
355 static gint smtp_starttls(SMTPSession *session)
357 session->state = SMTP_STARTTLS;
359 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "STARTTLS") < 0)
361 log_print(LOG_PROTOCOL, "ESMTP> STARTTLS\n");
367 static gint smtp_auth_cram_md5(SMTPSession *session)
369 session->state = SMTP_AUTH;
370 session->auth_type = SMTPAUTH_CRAM_MD5;
372 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH CRAM-MD5") < 0)
374 log_print(LOG_PROTOCOL, "ESMTP> AUTH CRAM-MD5\n");
379 static gint smtp_auth_plain(SMTPSession *session)
381 gchar buf[MESSAGEBUFSIZE], *b64buf, *out;
384 session->state = SMTP_AUTH_PLAIN;
385 session->auth_type = SMTPAUTH_PLAIN;
387 memset(buf, 0, sizeof buf);
389 /* "\0user\0password" */
390 len = sprintf(buf, "%c%s%c%s", '\0', session->user, '\0', session->pass);
391 b64buf = g_base64_encode(buf, len);
392 out = g_strconcat("AUTH PLAIN ", b64buf, NULL);
395 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, out) < 0) {
402 log_print(LOG_PROTOCOL, "ESMTP> [AUTH PLAIN]\n");
409 static gint smtp_auth_login(SMTPSession *session)
411 session->state = SMTP_AUTH;
412 session->auth_type = SMTPAUTH_LOGIN;
414 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH LOGIN") < 0)
416 log_print(LOG_PROTOCOL, "ESMTP> AUTH LOGIN\n");
421 static gint smtp_helo(SMTPSession *session)
423 gchar buf[MESSAGEBUFSIZE];
425 session->state = SMTP_HELO;
427 g_snprintf(buf, sizeof(buf), "HELO %s",
428 session->hostname ? session->hostname : get_domain_name());
429 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
431 log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
436 static gint smtp_rcpt(SMTPSession *session)
438 gchar buf[MESSAGEBUFSIZE];
441 cm_return_val_if_fail(session->cur_to != NULL, SM_ERROR);
443 session->state = SMTP_RCPT;
445 to = (gchar *)session->cur_to->data;
448 g_snprintf(buf, sizeof(buf), "RCPT TO:%s", to);
450 g_snprintf(buf, sizeof(buf), "RCPT TO:<%s>", to);
451 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
453 log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
455 session->cur_to = session->cur_to->next;
460 static gint smtp_data(SMTPSession *session)
462 session->state = SMTP_DATA;
464 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "DATA") < 0)
466 log_print(LOG_PROTOCOL, "SMTP> DATA\n");
471 static gint smtp_send_data(SMTPSession *session)
473 session->state = SMTP_SEND_DATA;
475 session_send_data(SESSION(session), session->send_data,
476 session->send_data_len);
481 static gint smtp_make_ready(SMTPSession *session)
483 session->state = SMTP_MAIL_SENT_OK;
488 gint smtp_quit(SMTPSession *session)
490 session->state = SMTP_QUIT;
492 session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "QUIT");
493 log_print(LOG_PROTOCOL, "SMTP> QUIT\n");
498 static gint smtp_eom(SMTPSession *session)
500 session->state = SMTP_EOM;
502 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, ".") < 0)
504 log_print(LOG_PROTOCOL, "SMTP> . (EOM)\n");
509 static gint smtp_session_recv_msg(Session *session, const gchar *msg)
511 SMTPSession *smtp_session = SMTP_SESSION(session);
512 gboolean cont = FALSE;
515 if (strlen(msg) < 4) {
516 log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
520 switch (smtp_session->state) {
524 case SMTP_AUTH_PLAIN:
525 case SMTP_AUTH_LOGIN_USER:
526 case SMTP_AUTH_LOGIN_PASS:
527 case SMTP_AUTH_CRAM_MD5:
528 log_print(LOG_PROTOCOL, "ESMTP< %s\n", msg);
531 log_print(LOG_PROTOCOL, "SMTP< %s\n", msg);
535 /* ignore all multiline responses except for EHLO */
536 if (msg[3] == '-' && smtp_session->state != SMTP_EHLO)
537 return session_recv_msg(session);
539 if (msg[0] == '5' && msg[1] == '0' &&
540 (msg[2] == '4' || msg[2] == '3' || msg[2] == '1')) {
541 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
542 smtp_session->state = SMTP_ERROR;
543 smtp_session->error_val = SM_ERROR;
544 g_free(smtp_session->error_msg);
545 smtp_session->error_msg = g_strdup(msg);
549 if (!strncmp(msg, "535", 3)) {
550 log_warning(LOG_PROTOCOL, _("error occurred on authentication\n"));
551 smtp_session->state = SMTP_ERROR;
552 smtp_session->error_val = SM_AUTHFAIL;
553 g_free(smtp_session->error_msg);
554 smtp_session->error_msg = g_strdup(msg);
558 if (msg[0] != '1' && msg[0] != '2' && msg[0] != '3') {
559 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
560 smtp_session->state = SMTP_ERROR;
561 smtp_session->error_val = SM_ERROR;
562 g_free(smtp_session->error_msg);
563 smtp_session->error_msg = g_strdup(msg);
569 else if (msg[3] != ' ' && msg[3] != '\0') {
570 log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
571 smtp_session->state = SMTP_ERROR;
572 smtp_session->error_val = SM_UNRECOVERABLE;
576 switch (smtp_session->state) {
578 if (strstr(msg, "ESMTP"))
579 smtp_session->is_esmtp = TRUE;
581 if (smtp_session->user || session->ssl_type != SSL_NONE ||
582 smtp_session->is_esmtp)
584 if (smtp_session->user || smtp_session->is_esmtp)
586 ret = smtp_ehlo(smtp_session);
588 ret = smtp_helo(smtp_session);
591 ret = smtp_from(smtp_session);
594 ret = smtp_ehlo_recv(smtp_session, msg);
597 if (smtp_session->max_message_size > 0
598 && smtp_session->max_message_size <
599 smtp_session->send_data_len) {
600 log_warning(LOG_PROTOCOL, _("Message is too big "
601 "(Maximum size is %s)\n"),
603 (goffset)(smtp_session->max_message_size)));
604 smtp_session->state = SMTP_ERROR;
605 smtp_session->error_val = SM_ERROR;
609 if (session->ssl_type == SSL_STARTTLS &&
610 smtp_session->tls_init_done == FALSE) {
611 ret = smtp_starttls(smtp_session);
615 if (smtp_session->user) {
616 if (smtp_auth(smtp_session) != SM_OK) {
618 if (session->ssl_type == SSL_NONE
619 && smtp_session->tls_init_done == FALSE
620 && (smtp_session->avail_auth_type & SMTPAUTH_TLS_AVAILABLE))
621 ret = smtp_starttls(smtp_session);
624 ret = smtp_from(smtp_session);
627 ret = smtp_from(smtp_session);
631 if (session_start_tls(session) < 0) {
632 log_warning(LOG_PROTOCOL, _("couldn't start TLS session\n"));
633 smtp_session->state = SMTP_ERROR;
634 smtp_session->error_val = SM_ERROR;
637 smtp_session->tls_init_done = TRUE;
638 ret = smtp_ehlo(smtp_session);
642 ret = smtp_auth_recv(smtp_session, msg);
644 case SMTP_AUTH_LOGIN_USER:
645 ret = smtp_auth_login_user_recv(smtp_session, msg);
647 case SMTP_AUTH_PLAIN:
648 case SMTP_AUTH_LOGIN_PASS:
649 case SMTP_AUTH_CRAM_MD5:
650 ret = smtp_from(smtp_session);
653 if (smtp_session->cur_to)
654 ret = smtp_rcpt(smtp_session);
657 if (smtp_session->cur_to)
658 ret = smtp_rcpt(smtp_session);
660 ret = smtp_data(smtp_session);
663 ret = smtp_send_data(smtp_session);
666 smtp_make_ready(smtp_session);
669 session_disconnect(session);
673 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
674 smtp_session->error_val = SM_ERROR;
678 if (cont && ret == SM_OK)
679 return session_recv_msg(session);
682 smtp_session->error_val = SM_ERROR;
684 return ret == SM_OK ? 0 : -1;
687 static gint smtp_session_send_data_finished(Session *session, guint len)
689 return smtp_eom(SMTP_SESSION(session));