/* * Bittorrent Client using Qt4 and libtorrent. * Copyright (C) 2011 Christophe Dumez * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * * In addition, as a special exception, the copyright holders give permission to * link this program with the OpenSSL project's "OpenSSL" library (or with * modified versions of it that use the same license as the "OpenSSL" library), * and distribute the linked executables. You must obey the GNU General Public * License in all respects for all of the code used other than "OpenSSL". If you * modify file(s), you may extend this exception to your version of the file(s), * but you are not obligated to do so. If you do not wish to do so, delete this * exception statement from your version. * * Contact : chris@qbittorrent.org */ /* * This code is based on QxtSmtp from libqxt (http://libqxt.org) */ #include "smtp.h" #include "preferences.h" #include "qbtsession.h" #include #ifndef QT_NO_OPENSSL #include #else #include #endif #include #include #include #include #include const short DEFAULT_PORT = 25; const short DEFAULT_PORT_SSL = 465; QByteArray hmacMD5(QByteArray key, const QByteArray &msg) { const int blockSize = 64; // HMAC-MD5 block size if (key.length() > blockSize) { // if key is longer than block size (64), reduce key length with MD5 compression key = QCryptographicHash::hash(key, QCryptographicHash::Md5); } QByteArray innerPadding(blockSize, char(0x36)); // initialize inner padding with char "6" QByteArray outerPadding(blockSize, char(0x5c)); // initialize outer padding with char "\" // ascii characters 0x36 ("6") and 0x5c ("\") are selected because they have large // Hamming distance (http://en.wikipedia.org/wiki/Hamming_distance) for (int i = 0; i < key.length(); i++) { innerPadding[i] = innerPadding[i] ^ key.at(i); // XOR operation between every byte in key and innerpadding, of key length outerPadding[i] = outerPadding[i] ^ key.at(i); // XOR operation between every byte in key and outerpadding, of key length } // result = hash ( outerPadding CONCAT hash ( innerPadding CONCAT baseString ) ).toBase64 QByteArray total = outerPadding; QByteArray part = innerPadding; part.append(msg); total.append(QCryptographicHash::hash(part, QCryptographicHash::Md5)); return QCryptographicHash::hash(total, QCryptographicHash::Md5); } Smtp::Smtp(QObject *parent): QObject(parent), state(Init), use_ssl(false) { #ifndef QT_NO_OPENSSL socket = new QSslSocket(this); #else socket = new QTcpSocket(this); #endif connect(socket, SIGNAL(readyRead()), SLOT(readyRead())); connect(socket, SIGNAL(disconnected()), SLOT(deleteLater())); // Test hmacMD5 function (http://www.faqs.org/rfcs/rfc2202.html) Q_ASSERT(hmacMD5("Jefe", "what do ya want for nothing?").toHex() == "750c783e6ab0b503eaa86e310a5db738"); Q_ASSERT(hmacMD5(QByteArray::fromHex("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"), "Hi There").toHex() == "9294727a3638bb1c13f48ef8158bfc9d"); } Smtp::~Smtp() { qDebug() << Q_FUNC_INFO; } void Smtp::sendMail(const QString &from, const QString &to, const QString &subject, const QString &body) { Preferences* const pref = Preferences::instance(); QTextCodec* latin1 = QTextCodec::codecForName("latin1"); message = ""; message += encode_mime_header("Date", QDateTime::currentDateTime().toUTC().toString("ddd, d MMM yyyy hh:mm:ss UT"), latin1); message += encode_mime_header("From", from, latin1); message += encode_mime_header("Subject", subject, latin1); message += encode_mime_header("To", to, latin1); message += "MIME-Version: 1.0\r\n"; message += "Content-Type: text/plain; charset=UTF-8\r\n"; message += "Content-Transfer-Encoding: base64\r\n"; message += "\r\n"; // Encode the body in base64 QString crlf_body = body; QByteArray b = crlf_body.replace("\n","\r\n").toUtf8().toBase64(); int ct = b.length(); for (int i = 0; i < ct; i += 78) { message += b.mid(i, 78); } this->from = from; rcpt = to; // Authentication if (pref->getMailNotificationSMTPAuth()) { username = pref->getMailNotificationSMTPUsername(); password = pref->getMailNotificationSMTPPassword(); } // Connect to SMTP server #ifndef QT_NO_OPENSSL if (pref->getMailNotificationSMTPSSL()) { socket->connectToHostEncrypted(pref->getMailNotificationSMTP(), DEFAULT_PORT_SSL); use_ssl = true; } else { #endif socket->connectToHost(pref->getMailNotificationSMTP(), DEFAULT_PORT); use_ssl = false; #ifndef QT_NO_OPENSSL } #endif } void Smtp::readyRead() { qDebug() << Q_FUNC_INFO; // SMTP is line-oriented buffer += socket->readAll(); while (true) { int pos = buffer.indexOf("\r\n"); if (pos < 0) return; // Loop exit condition QByteArray line = buffer.left(pos); buffer = buffer.mid(pos + 2); qDebug() << "Response line:" << line; // Extract reponse code QByteArray code = line.left(3); switch(state) { case Init: { if (code[0] == '2') { // Connection was successful ehlo(); } else { logError("Connection failed, unrecognized reply: "+line); state = Close; } break; } case EhloSent: case HeloSent: case EhloGreetReceived: parseEhloResponse(code, line[3] != ' ', line.mid(4)); break; #ifndef QT_NO_OPENSSL case StartTLSSent: if (code == "220") { socket->startClientEncryption(); ehlo(); } else { authenticate(); } break; #endif case AuthRequestSent: case AuthUsernameSent: if (authType == AuthPlain) authPlain(); else if (authType == AuthLogin) authLogin(); else authCramMD5(line.mid(4)); break; case AuthSent: case Authenticated: if (code[0] == '2') { qDebug() << "Sending ..."; socket->write("mail from:<" + from.toLatin1() + ">\r\n"); socket->flush(); state = Rcpt; } else { // Authentication failed! logError("Authentication failed, msg: "+line); state = Close; } break; case Rcpt: if (code[0] == '2') { socket->write("rcpt to:<" + rcpt.toLatin1() + ">\r\n"); socket->flush(); state = Data; } else { logError(" was rejected by server, msg: "+line); state = Close; } break; case Data: if (code[0] == '2') { socket->write("data\r\n"); socket->flush(); state = Body; } else { logError(" was rejected by server, msg: "+line); state = Close; } break; case Body: if (code[0] == '3') { socket->write(message + "\r\n.\r\n"); socket->flush(); state = Quit; } else { logError(" was rejected by server, msg: "+line); state = Close; } break; case Quit: if (code[0] == '2') { socket->write("QUIT\r\n"); socket->flush(); // here, we just close. state = Close; } else { logError("Message was rejected by the server, error: "+line); state = Close; } break; default: qDebug() << "Disconnecting from host"; socket->disconnectFromHost(); return; } } } QByteArray Smtp::encode_mime_header(const QString& key, const QString& value, QTextCodec* latin1, const QByteArray& prefix) { QByteArray rv = ""; QByteArray line = key.toLatin1() + ": "; if (!prefix.isEmpty()) line += prefix; if (!value.contains("=?") && latin1->canEncode(value)) { bool firstWord = true; foreach (const QByteArray& word, value.toLatin1().split(' ')) { if (line.size() > 78) { rv = rv + line + "\r\n"; line.clear(); } if (firstWord) line += word; else line += " " + word; firstWord = false; } } else { // The text cannot be losslessly encoded as Latin-1. Therefore, we // must use base64 encoding. QByteArray utf8 = value.toUtf8(); // Use base64 encoding QByteArray base64 = utf8.toBase64(); int ct = base64.length(); line += "=?utf-8?b?"; for (int i = 0; i < ct; i += 4) { /*if (line.length() > 72) { rv += line + "?\n\r"; line = " =?utf-8?b?"; }*/ line = line + base64.mid(i, 4); } line += "?="; // end encoded-word atom } return rv + line + "\r\n"; } void Smtp::ehlo() { QByteArray address = "127.0.0.1"; foreach (const QHostAddress& addr, QNetworkInterface::allAddresses()) { if (addr == QHostAddress::LocalHost || addr == QHostAddress::LocalHostIPv6) continue; address = addr.toString().toLatin1(); break; } // Send EHLO socket->write("ehlo "+ address + "\r\n"); socket->flush(); state = EhloSent; } void Smtp::parseEhloResponse(const QByteArray& code, bool continued, const QString& line) { if (code != "250") { // Error if (state == EhloSent) { // try to send HELO instead of EHLO qDebug() << "EHLO failed, trying HELO instead..."; socket->write("helo\r\n"); socket->flush(); state = HeloSent; } else { // Both EHLO and HELO failed, chances are this is NOT // a SMTP server logError("Both EHLO and HELO failed, msg: "+line); state = Close; } return; } if (state != EhloGreetReceived) { if (!continued) { // greeting only, no extensions qDebug() << "No extension"; state = EhloDone; } else { // greeting followed by extensions state = EhloGreetReceived; qDebug () << "EHLO greet received"; return; } } else { qDebug() << Q_FUNC_INFO << "Supported extension: " << line.section(' ', 0, 0).toUpper() << line.section(' ', 1); extensions[line.section(' ', 0, 0).toUpper()] = line.section(' ', 1); if (!continued) state = EhloDone; } if (state != EhloDone) return; if (extensions.contains("STARTTLS") && use_ssl) { qDebug() << "STARTTLS"; startTLS(); } else { authenticate(); } } void Smtp::authenticate() { qDebug() << Q_FUNC_INFO; if (!extensions.contains("AUTH") || username.isEmpty() || password.isEmpty()) { // Skip authentication qDebug() << "Skipping authentication..."; state = Authenticated; return; } // AUTH extension is supported, check which // authentication modes are supported by // the server QStringList auth = extensions["AUTH"].toUpper().split(' ', QString::SkipEmptyParts); if (auth.contains("CRAM-MD5")) { qDebug() << "Using CRAM-MD5 authentication..."; authCramMD5(); } else if (auth.contains("PLAIN")) { qDebug() << "Using PLAIN authentication..."; authPlain(); } else if (auth.contains("LOGIN")) { qDebug() << "Using LOGIN authentication..."; authLogin(); } else { // Skip authentication logError("The SMTP server does not seem to support any of the authentications modes " "we support [CRAM-MD5|PLAIN|LOGIN], skipping authentication, " "knowing it is likely to fail... Server Auth Modes: "+auth.join("|")); state = Authenticated; } } void Smtp::startTLS() { qDebug() << Q_FUNC_INFO; #ifndef QT_NO_OPENSSL socket->write("starttls\r\n"); socket->flush(); state = StartTLSSent; #else authenticate(); #endif } void Smtp::authCramMD5(const QByteArray& challenge) { if (state != AuthRequestSent) { socket->write("auth cram-md5\r\n"); socket->flush(); authType = AuthCramMD5; state = AuthRequestSent; } else { QByteArray response = username.toLatin1() + ' ' + hmacMD5(password.toLatin1(), QByteArray::fromBase64(challenge)).toHex(); socket->write(response.toBase64() + "\r\n"); socket->flush(); state = AuthSent; } } void Smtp::authPlain() { if (state != AuthRequestSent) { authType = AuthPlain; // Prepare Auth string QByteArray auth; auth += '\0'; auth += username.toLatin1(); qDebug() << "username: " << username.toLatin1(); auth += '\0'; auth += password.toLatin1(); qDebug() << "password: " << password.toLatin1(); // Send it socket->write("auth plain "+ auth.toBase64() + "\r\n"); socket->flush(); state = AuthSent; } } void Smtp::authLogin() { if (state != AuthRequestSent && state != AuthUsernameSent) { socket->write("auth login\r\n"); socket->flush(); authType = AuthLogin; state = AuthRequestSent; } else if (state == AuthRequestSent) { socket->write(username.toLatin1().toBase64() + "\r\n"); socket->flush(); state = AuthUsernameSent; } else { socket->write(password.toLatin1().toBase64() + "\r\n"); socket->flush(); state = AuthSent; } } void Smtp::logError(const QString &msg) { qDebug() << "Email Notification Error:" << msg; QBtSession::instance()->addConsoleMessage("Email Notification Error: "+msg, "red"); }