cleaner messages, no popup if required
[claws.git] / src / smtp.c
1 /*
2  * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3  * Copyright (C) 1999-2002 Hiroyuki Yamamoto
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation; either version 2 of the License, or
8  * (at your option) any later version.
9  *
10  * This program is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  * GNU General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program; if not, write to the Free Software
17  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18  */
19
20 #ifdef HAVE_CONFIG_H
21 #  include "config.h"
22 #endif
23
24 #include <glib.h>
25 #include <stdio.h>
26 #include <string.h>
27
28 #include "intl.h"
29 #include "smtp.h"
30 #include "socket.h"
31 #include "md5.h"
32 #include "base64.h"
33 #include "utils.h"
34
35 static gint verbose = 1;
36
37 static gint smtp_starttls(SockInfo *sock);
38 static gint smtp_auth_cram_md5(SockInfo *sock, gchar *buf, gint len);
39 static gint smtp_auth_login(SockInfo *sock, gchar *buf, gint len);
40 static gint smtp_ok(SockInfo *sock, gchar *buf, gint len);
41
42 #if USE_SSL
43 Session *smtp_session_new(const gchar *server, gushort port,
44                           const gchar *domain,
45                           const gchar *user, const gchar *pass,
46                           SSLType ssl_type)
47 #else
48 Session *smtp_session_new(const gchar *server, gushort port,
49                           const gchar *domain,
50                           const gchar *user, const gchar *pass)
51 #endif
52 {
53         SMTPSession *session;
54         SockInfo *sock;
55         gboolean use_esmtp;
56         SMTPAuthType avail_auth_type = 0;
57         gint val;
58
59         g_return_val_if_fail(server != NULL, NULL);
60
61 #if USE_SSL
62         use_esmtp = user != NULL || ssl_type == SSL_STARTTLS;
63 #else
64         use_esmtp = user != NULL;
65 #endif
66
67         if ((sock = sock_connect(server, port)) == NULL) {
68                 log_warning(_("Can't connect to SMTP server: %s:%d\n"),
69                             server, port);
70                 return NULL;
71         }
72
73 #if USE_SSL
74         if (ssl_type == SSL_TUNNEL && !ssl_init_socket(sock)) {
75                 log_warning(_("SSL connection failed"));
76                 sock_close(sock);
77                 return NULL;
78         }
79 #endif
80
81         if (smtp_ok(sock, NULL, 0) != SM_OK) {
82                 log_warning(_("Error occurred while connecting to %s:%d\n"),
83                             server, port);
84                 sock_close(sock);
85                 return NULL;
86         }
87
88         if (!domain)
89                 domain = get_domain_name();
90
91         if (use_esmtp)
92                 val = smtp_ehlo(sock, domain, &avail_auth_type);
93         else
94                 val = smtp_helo(sock, domain);
95         if (val != SM_OK) {
96                 log_warning(_("Error occurred while sending HELO\n"));
97                 sock_close(sock);
98                 return NULL;
99         }
100
101 #if USE_SSL
102         if (ssl_type == SSL_STARTTLS) {
103                 val = smtp_starttls(sock);
104                 if (val != SM_OK) {
105                         log_warning(_("Error occurred while sending STARTTLS\n"));
106                         sock_close(sock);
107                         return NULL;
108                 }
109                 if (!ssl_init_socket_with_method(sock, SSL_METHOD_TLSv1)) {
110                         sock_close(sock);
111                         return NULL;
112                 }
113                 val = smtp_ehlo(sock, domain, &avail_auth_type);
114                 if (val != SM_OK) {
115                         log_warning(_("Error occurred while sending EHLO\n"));
116                         sock_close(sock);
117                         return NULL;
118                 }
119         }
120 #endif
121
122         session = g_new(SMTPSession, 1);
123         SESSION(session)->type             = SESSION_SMTP;
124         SESSION(session)->server           = g_strdup(server);
125         SESSION(session)->sock             = sock;
126         SESSION(session)->connected        = TRUE;
127         SESSION(session)->phase            = SESSION_READY;
128         SESSION(session)->last_access_time = 0;
129         SESSION(session)->data             = NULL;
130
131         SESSION(session)->destroy          = smtp_session_destroy;
132
133         session->avail_auth_type           = avail_auth_type;
134         session->user                      = user ? g_strdup(user) : NULL;
135         session->pass                      = pass ? g_strdup(pass) :
136                                              user ? g_strdup("") : NULL;
137
138         return SESSION(session);
139 }
140
141 void smtp_session_destroy(Session *session)
142 {
143         sock_close(session->sock);
144         session->sock = NULL;
145
146         g_free(SMTP_SESSION(session)->user);
147         g_free(SMTP_SESSION(session)->pass);
148 }
149
150 gint smtp_from(SMTPSession *session, const gchar *from,
151                SMTPAuthType forced_auth_type)
152 {
153         gchar buf[MSGBUFSIZE];
154
155         g_return_val_if_fail(session != NULL, SM_ERROR);
156         g_return_val_if_fail(from != NULL, SM_ERROR);
157
158         if (session->user) {
159                 if (smtp_auth(session, forced_auth_type) != SM_OK)
160                         return SM_AUTHFAIL;
161         }
162
163         if (strchr(from, '<'))
164                 g_snprintf(buf, sizeof(buf), "MAIL FROM: %s", from);
165         else
166                 g_snprintf(buf, sizeof(buf), "MAIL FROM: <%s>", from);
167
168         sock_printf(SESSION(session)->sock, "%s\r\n", buf);
169         if (verbose)
170                 log_print("SMTP> %s\n", buf);
171
172         return smtp_ok(SESSION(session)->sock, NULL, 0);
173 }
174
175 gint smtp_auth(SMTPSession *session, SMTPAuthType forced_auth_type)
176 {
177         gchar buf[MSGBUFSIZE];
178         SMTPAuthType authtype = 0;
179         guchar hexdigest[33];
180         gchar *challenge, *response, *response64;
181         gint challengelen;
182         SockInfo *sock;
183
184         g_return_val_if_fail(session != NULL, SM_ERROR);
185         g_return_val_if_fail(session->user != NULL, SM_ERROR);
186
187         sock = SESSION(session)->sock;
188
189         if ((forced_auth_type == SMTPAUTH_CRAM_MD5 ||
190              (forced_auth_type == 0 &&
191               (session->avail_auth_type & SMTPAUTH_CRAM_MD5) != 0)) &&
192             smtp_auth_cram_md5(sock, buf, sizeof(buf)) == SM_OK)
193                 authtype = SMTPAUTH_CRAM_MD5;
194         else if ((forced_auth_type == SMTPAUTH_LOGIN ||
195                   (forced_auth_type == 0 &&
196                    (session->avail_auth_type & SMTPAUTH_LOGIN) != 0)) &&
197                  smtp_auth_login(sock, buf, sizeof(buf)) == SM_OK)
198                 authtype = SMTPAUTH_LOGIN;
199         else {
200                 log_warning(_("SMTP AUTH not available\n"));
201                 return SM_AUTHFAIL;
202         }
203
204         switch (authtype) {
205         case SMTPAUTH_LOGIN:
206                 if (!strncmp(buf, "334 ", 4))
207                         base64_encode(buf, session->user, strlen(session->user));
208                 else
209                         /* Server rejects AUTH */
210                         g_snprintf(buf, sizeof(buf), "*");
211
212                 sock_printf(sock, "%s\r\n", buf);
213                 if (verbose) log_print("ESMTP> [USERID]\n");
214
215                 smtp_ok(sock, buf, sizeof(buf));
216
217                 if (!strncmp(buf, "334 ", 4))
218                         base64_encode(buf, session->pass, strlen(session->pass));
219                 else
220                         /* Server rejects AUTH */
221                         g_snprintf(buf, sizeof(buf), "*");
222
223                 sock_printf(sock, "%s\r\n", buf);
224                 if (verbose) log_print("ESMTP> [PASSWORD]\n");
225                 break;
226         case SMTPAUTH_CRAM_MD5:
227                 if (!strncmp(buf, "334 ", 4)) {
228                         challenge = g_malloc(strlen(buf + 4) + 1);
229                         challengelen = base64_decode(challenge, buf + 4, -1);
230                         challenge[challengelen] = '\0';
231                         if (verbose)
232                                 log_print("ESMTP< [Decoded: %s]\n", challenge);
233
234                         g_snprintf(buf, sizeof(buf), "%s", session->pass);
235                         md5_hex_hmac(hexdigest, challenge, challengelen,
236                                      buf, strlen(session->pass));
237                         g_free(challenge);
238
239                         response = g_strdup_printf
240                                 ("%s %s", session->user, hexdigest);
241                         if (verbose)
242                                 log_print("ESMTP> [Encoded: %s]\n", response);
243
244                         response64 = g_malloc((strlen(response) + 3) * 2 + 1);
245                         base64_encode(response64, response, strlen(response));
246                         g_free(response);
247
248                         sock_printf(sock, "%s\r\n", response64);
249                         if (verbose) log_print("ESMTP> %s\n", response64);
250                         g_free(response64);
251                 } else {
252                         /* Server rejects AUTH */
253                         g_snprintf(buf, sizeof(buf), "*");
254                         sock_printf(sock, "%s\r\n", buf);
255                         if (verbose)
256                                 log_print("ESMTP> %s\n", buf);
257                 }
258                 break;
259         case SMTPAUTH_DIGEST_MD5:
260         default:
261                 /* stop smtp_auth when no correct authtype */
262                 g_snprintf(buf, sizeof(buf), "*");
263                 sock_printf(sock, "%s\r\n", buf);
264                 if (verbose) log_print("ESMTP> %s\n", buf);
265                 break;
266         }
267
268         return smtp_ok(sock, NULL, 0);
269 }
270
271 gint smtp_ehlo(SockInfo *sock, const gchar *hostname,
272                SMTPAuthType *avail_auth_type)
273 {
274         gchar buf[MSGBUFSIZE];
275
276         *avail_auth_type = 0;
277
278         sock_printf(sock, "EHLO %s\r\n", hostname);
279         if (verbose)
280                 log_print("ESMTP> EHLO %s\n", hostname);
281
282         while ((sock_gets(sock, buf, sizeof(buf) - 1)) != -1) {
283                 if (strlen(buf) < 4)
284                         return SM_ERROR;
285                 strretchomp(buf);
286
287                 if (verbose)
288                         log_print("ESMTP< %s\n", buf);
289
290                 if (strncmp(buf, "250-", 4) == 0) {
291                         gchar *p = buf;
292                         p += 4;
293                         if (g_strncasecmp(p, "AUTH", 4) == 0) {
294                                 p += 5;
295                                 if (strcasestr(p, "LOGIN"))
296                                         *avail_auth_type |= SMTPAUTH_LOGIN;
297                                 if (strcasestr(p, "CRAM-MD5"))
298                                         *avail_auth_type |= SMTPAUTH_CRAM_MD5;
299                                 if (strcasestr(p, "DIGEST-MD5"))
300                                         *avail_auth_type |= SMTPAUTH_DIGEST_MD5;
301                         }
302                 } else if ((buf[0] == '1' || buf[0] == '2' || buf[0] == '3') &&
303                     (buf[3] == ' ' || buf[3] == '\0'))
304                         return SM_OK;
305                 else if (buf[3] != '-')
306                         return SM_ERROR;
307                 else if (buf[0] == '5' && buf[1] == '0' &&
308                          (buf[2] == '4' || buf[2] == '3' || buf[2] == '1'))
309                         return SM_ERROR;
310         }
311
312         return SM_UNRECOVERABLE;
313 }
314
315 static gint smtp_starttls(SockInfo *sock)
316 {
317         sock_printf(sock, "STARTTLS\r\n");
318         if (verbose)
319                 log_print("ESMTP> STARTTLS\n");
320
321         return smtp_ok(sock, NULL, 0);
322 }
323
324 static gint smtp_auth_cram_md5(SockInfo *sock, gchar *buf, gint len)
325 {
326         sock_printf(sock, "AUTH CRAM-MD5\r\n");
327         if (verbose)
328                 log_print("ESMTP> AUTH CRAM-MD5\n");
329
330         return smtp_ok(sock, buf, len);
331 }
332
333 static gint smtp_auth_login(SockInfo *sock, gchar *buf, gint len)
334 {
335         sock_printf(sock, "AUTH LOGIN\r\n");
336         if (verbose)
337                 log_print("ESMTP> AUTH LOGIN\n");
338
339         return smtp_ok(sock, buf, len);
340 }
341
342 gint smtp_helo(SockInfo *sock, const gchar *hostname)
343 {
344         sock_printf(sock, "HELO %s\r\n", hostname);
345         if (verbose)
346                 log_print("SMTP> HELO %s\n", hostname);
347
348         return smtp_ok(sock, NULL, 0);
349 }
350
351 gint smtp_rcpt(SockInfo *sock, const gchar *to)
352 {
353         gchar buf[MSGBUFSIZE];
354
355         if (strchr(to, '<'))
356                 g_snprintf(buf, sizeof(buf), "RCPT TO: %s", to);
357         else
358                 g_snprintf(buf, sizeof(buf), "RCPT TO: <%s>", to);
359
360         sock_printf(sock, "%s\r\n", buf);
361         if (verbose)
362                 log_print("SMTP> %s\n", buf);
363
364         return smtp_ok(sock, NULL, 0);
365 }
366
367 gint smtp_data(SockInfo *sock)
368 {
369         sock_printf(sock, "DATA\r\n");
370         if (verbose)
371                 log_print("SMTP> DATA\n");
372
373         return smtp_ok(sock, NULL, 0);
374 }
375
376 gint smtp_rset(SockInfo *sock)
377 {
378         sock_printf(sock, "RSET\r\n");
379         if (verbose)
380                 log_print("SMTP> RSET\n");
381
382         return smtp_ok(sock, NULL, 0);
383 }
384
385 gint smtp_quit(SockInfo *sock)
386 {
387         sock_printf(sock, "QUIT\r\n");
388         if (verbose)
389                 log_print("SMTP> QUIT\n");
390
391         return smtp_ok(sock, NULL, 0);
392 }
393
394 gint smtp_eom(SockInfo *sock)
395 {
396         sock_printf(sock, ".\r\n");
397         if (verbose)
398                 log_print("SMTP> . (EOM)\n");
399
400         return smtp_ok(sock, NULL, 0);
401 }
402
403 static gint smtp_ok(SockInfo *sock, gchar *buf, gint len)
404 {
405         gchar tmpbuf[MSGBUFSIZE];
406
407         if (!buf) {
408                 buf = tmpbuf;
409                 len = sizeof(tmpbuf);
410         }
411
412         while ((sock_gets(sock, buf, len - 1)) != -1) {
413                 if (strlen(buf) < 4)
414                         return SM_ERROR;
415                 strretchomp(buf);
416
417                 if (verbose)
418                         log_print("SMTP< %s\n", buf);
419
420                 if ((buf[0] == '1' || buf[0] == '2' || buf[0] == '3') &&
421                     (buf[3] == ' ' || buf[3] == '\0'))
422                         return SM_OK;
423                 else if (buf[3] != '-')
424                         return SM_ERROR;
425                 else if (buf[0] == '5' && buf[1] == '0' &&
426                          (buf[2] == '4' || buf[2] == '3' || buf[2] == '1'))
427                         return SM_ERROR;
428         }
429
430         return SM_UNRECOVERABLE;
431 }