security - SMTP 服务器在 STARTTLS 完成之前断开

标签 security ssl connection starttls

与“smtp.gmail.com”服务器通信时,我使用 EHLO 命令从 gmail“为您服务”响应中获取问候语,然后使用 STARTTLS 命令并获取“2.0.0 准备启动 TLS”。在“STARTTLS”命令之后,我开始发送电子邮件数据,如“MAIL FROM: %s\n”,from“但是当我这样做时服务器连接关闭。我现在意识到服务器正在等待 TLS 协商,什么 TLS 协商我应该发送命令来建立握手吗?我引用了 RFC 文档中的第 5 章:[https://www.rfc-editor.org/rfc/rfc2487] 了解有关 TLS 协商的信息。

我使用的C++代码来自:[http://www.cplusplus.com/forum/windows/35333/]

#include <windows.h> 
#include <cstdio>
#include <iostream>
using namespace std;
#pragma comment(lib, "ws2_32.lib") //I added because of LNK2019 error
//#include <winsock2.h>  //on MSVC2008 - windows.h already includes winsock stuff    /* WSAGetLastError, WSAStartUp  */
#define snprintf _snprintf

static void sendmail_write(const int  sock,const char *str,const char *arg)
 {
    char buf[4096];

    if (arg != NULL)
        snprintf(buf, sizeof(buf), str, arg);
    else
        snprintf(buf, sizeof(buf), str);

    send(sock, buf, strlen(buf), 0);

// read a reply from server
    char outbuf[1024];
    int len=recv(sock,outbuf,1024,0);
    outbuf[len]='\0';
    cout <<outbuf;

}

static int sendmail(
                const char *from,
                const char *to,
                const char *subject,
                const char *body,
                const char *hostname,
        const char *user,
        const char *pass,
                const int   port
            ) {

    struct hostent *host;
    struct sockaddr_in saddr_in;
    int sock = 0;


    WSADATA wsaData;
    if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
        return -1;
    }


    sock = socket(AF_INET, SOCK_STREAM, 0);
    host = gethostbyname(hostname);

    saddr_in.sin_family      = AF_INET;
    saddr_in.sin_port        = htons((u_short)port);
    saddr_in.sin_addr.s_addr = 0;

    memcpy((char*)&(saddr_in.sin_addr), host->h_addr, host->h_length);

    if (connect(sock, (struct sockaddr*)&saddr_in, sizeof(saddr_in)) == -1) {
        return -2;
    }



    sendmail_write(sock, "EHLO %s\n",       "MyMailDomain");  // Should I use HELO or EHLO?

    sendmail_write(sock, "STARTTLS\n",""); // <----- starting TLS?

    sendmail_write(sock, "MAIL FROM: %s\n", from);    // from
    sendmail_write(sock, "RCPT TO: %s\n",   to);      // to
    sendmail_write(sock, "DATA\n",          NULL);    // begin data
    sendmail_write(sock, "From: %s\n",      from);
    sendmail_write(sock, "To: %s\n",        to);
    sendmail_write(sock, "Subject: %s\n",   subject);
    sendmail_write(sock, "\n",              NULL);
    sendmail_write(sock, "%s\n",            body);    // data
    sendmail_write(sock, ".\n",             NULL);    // end data
    sendmail_write(sock, "QUIT\n",          NULL);    // terminate

    closesocket(sock);

    return 0;
}


int main(int argc, char *argv[]) {
    int ret = sendmail(

        "user@gmail.com",  // from - put an email address here
        "touser@gmail.com", // to - put an email address here
        "subject",
        "body",
        "smtp.gmail.com",
    "user@gmail.com",
    "password",
        587
    );

    if (ret != 0)
        fprintf(stderr, "Failed to send mail (code: %i).\n", ret);
    else
        fprintf(stdout, "\nMail successfully sent.\n");

    return ret;
}

最佳答案

这是一个使用 OpenSSL 的快速、缩写的“STARTTLS”示例,没有任何错误检查(正确的头文件留作练习 - 这将有助于学习 OpenSSL):

SSL_CTX *ctx = SSL_CTX_new( SSLv23_client_method() );
SSL *ssl = SSL_new( ctx );

connect( sock, ( struct sockaddr * ) &saddr_in, sizeof( saddr_in ) );

send( sock, "EHLO X\r\n", strlen( "EHLO X\r\n" );

// drain any reply - you can examine this - it can have useful data in it
recv( sock, buf, sizeof( buf ) );

// switch this plaintext connection over to SSL/TLS
send( sock, ". STARTTLS\r\n", strlen( ". STARTTLS\r\n" );
recv( sock, buf, sizeof( buf ) );

// now start the SSL/TLS negotiation
SSL_set_fd( ssl, sock );
int rc = SSL_connect( ssl );

...

在此之后,假设 SSL_connect() 调用成功,您将使用 SSL_write( ssl, void *buf, int num ) 而不是 send( sock, void *buf, size_t num ) , 和 SSL_read() 而不是 recv()读取和写入用户名和密码等数据。请注意,您确实需要注意不完整的读写操作,以及返回 SSL_ERROR_WANT_READ 的失败。或 SSL_ERROR_WANT_WRITE来自 SSL_get_error() .例如,如果 SSL_read()失败,然后 SSL_get_error()返回 SSL_ERROR_WANT_READ ,您必须重试 SSL_read() .

而且您会想要添加大量错误检查 - 检查一切,并实际执行诸如 SSL_write() 之类的调用和 SSL_read()来自处理短写入和错误并正确重试的辅助函数。

让它工作将需要您进行一些反复试验。

关于security - SMTP 服务器在 STARTTLS 完成之前断开,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/46695469/

相关文章:

c# - Websocket 服务器最大并发连接 C#

c# - 通过反射加载程序集的风险

mysql - Windows 日志中的可疑 MySQL 警告 : what's happening there?

android - 为什么有些 HTTPS 请求无法在 Fiddler 上解密,而有些可以?

ssl - 缺少用于 SEO 的基本域证书

C#获取连接到PC的可移植设备

security - Internet Explorer 阻止此网站显示安全证书错误的内容

c# - 这些随机数是 'safe'

ssl - 服务器证书中的客户端身份验证 (1.3.6.1.5.5.7.3.2) OID

python - Python 中的最大 TCP 连接数?