At this stage of the project they can only receive SMTP message and store message it on inbound queue...
PHP SMTP daemon are Experimental Project of SMTP server daemon coded 100% in PHP with the PECL-Event extension.
Within this project they have implemented complete SMTP Client and Server stack 100% in PHP completely based on PECL-Event (libevent).
They start as standalone Multiprocess pre-forked server daemon, with a watchdog (using pcntl_fork and pecl-event to manage signal event of the worker).
They start as root (or not) and listen (EventListener) on socket port (can be <1025 if started as root) and impersonate to other user (if started as with use of posix setuid/gid).
The skeleton of the server part are based on SMTP event based example on php site by Andrew Rose : http://php.net/manual/fr/event.examples.php
The STARTTLS server part are from this example also, the client part has been developped from scratch.
The PHP daemon also inspired me. http://daemon.io/
The SMTP Implementation are largely based on D.J. Bernstein (QMAIL) implementation notes: http://cr.yp.to/smtp.html
Links | SMTP verbs |
---|---|
http://cr.yp.to/smtp/helo.html | HELO, RSET, and NOOP verbs |
http://cr.yp.to/smtp/ehlo.html | EHLO verb |
http://cr.yp.to/smtp/mail.html | MAIL, RCPT, and DATA verbs |
http://cr.yp.to/smtp/quit.html | QUIT verb |
http://cr.yp.to/smtp/vrfy.html | VRFY/EXPN verbs |
http://cr.yp.to/smtp/8bitmime.html | 8BITMIME extension |
http://cr.yp.to/smtp/size.html | SIZE extension |
PHP V5.5 minimum
PHP Extension:
-
PECL-Event >=1.11.0 (get last version from pecl-event git : https://bitbucket.org/osmanov/pecl-event/overview)
-
openssl
-
PCNTL
-
sysvsem
-
sysvshm
-
PCRE
-
POSIX
$ git clone https://github.com/ZenProjects/phpsmtpd.git
$ cd phpsmtpd
$ cp config/php-smtpd.ini.sample to config/php-smtpd.ini
edit config/php-smtpd.ini and change the different parametter needed.
create user for the daemon and change user parametter acordingly.
user = phpsmtpd
create /path/to/queue/basedir change the owner of this directory to "user" parameter.
queue_dir = /path/to/queue/basedir
- set tls=true for use SMTP STARTTLS
- set xclient=true for use XCLIENT extension (to use behind postfix or an smtp proxy)
- set xforward=true for use XFORWARD extension (to use behind postfix)
xclient = false
xforward = false
tls = false
like in this links:
ssl_server_crt = /path/to/hostname.certificat.chained.crt
ssl_server_key = /path/to/hostname.privatekey.key
$ sbin/smtpd --listen --daemon
to see if has started:
$ ps -ef | grep phpSMTP
root 70045 23858 0 02:01 pts/1 00:00:00 phpSMTPdaemon
root 70051 70045 0 02:01 pts/1 00:00:00 phpSMTPdaemon-Worker #0
root 70052 70045 0 02:01 pts/1 00:00:00 phpSMTPdaemon-Worker #1
root 70053 70045 0 02:01 pts/1 00:00:00 phpSMTPdaemon-Worker #2
root 70054 70045 0 02:01 pts/1 00:00:00 phpSMTPdaemon-Worker #3
root 70064 32148 0 02:01 pts/3 00:00:00 grep phpSMTP
Example in /etc/rsyslog.conf
:
# Log all the mail messages in one place.
mail.* -/path/to/maillog
And you can see debug information on this maillog:
$ tail -f /path/to/maillog
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Starting phpSMTPdaemon Serveur pid:70045 listen:127.0.0.1:2025 at <Sat, 08 Nov 2014 01:01:36 +0000>
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Using PHP v5.5.10
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: With PECL-Event v1.11.0
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: With OpenSSL 1.0.1e-fips 11 Feb 2013
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Loaded extensions Core,date,ereg,libxml,pcre,sqlite3,ctype,dba,dom,fileinfo,filter,hash,iconv,json,SPL,PDO,pdo_sqlite,openssl,posix,Reflection,session,SimpleXML,standard,tokenizer,xml,xmlreader,xmlwriter,apcu,curl,sockets,ftp,gd,mailparse,mbstring,mysql,mysqli,zlib,pcntl,pdo_mysql,pdo_pgsql,pgsql,pthreads,shmop,event,sysvmsg,sysvsem,sysvshm,tokyo_tyrant,zip,Phar,zmq,mhash,apc
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Try to run the daemon
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: CreateQueue... at /opt/phpsmtpd/includes/SMTPDaemon.php:53
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Run the daemon in listen mode
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: This machine has 4 processing unit
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: This EventProcessPool with 4 workers was created...
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Init shm /opt/phpsmtpd/ipc/scoreboard at 0xf521ba1f
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Init sem /opt/phpsmtpd/ipc/scoreboard_sem at 0x4eefbb99
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: QueueCount queue inbound = 178
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Starting Listening SMTP on 127.0.0.1:2025 at myhost.tld
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: hook <HeartBeat> set to <phpSMTPd\SMTPDaemon::SuperviseQueue>
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: Go in dispatch
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: EventProcessPoolManager start at Sat, 08 Nov 2014 01:01:36 +0000
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: EventProcessPoolManager Worker #0 forked with pid:70051 at Sat, 08 Nov 2014 01:01:36 +0000
Nov 8 02:01:36 hotpoint phpSMTPd[70051]: Worker #0 with pid:70051 started at <Sat, 08 Nov 2014 01:01:36 +0000>
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: EventProcessPoolManager Worker #1 forked with pid:70052 at Sat, 08 Nov 2014 01:01:36 +0000
Nov 8 02:01:36 hotpoint phpSMTPd[70052]: Worker #1 with pid:70052 started at <Sat, 08 Nov 2014 01:01:36 +0000>
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: EventProcessPoolManager Worker #2 forked with pid:70053 at Sat, 08 Nov 2014 01:01:36 +0000
Nov 8 02:01:36 hotpoint phpSMTPd[70053]: Worker #2 with pid:70053 started at <Sat, 08 Nov 2014 01:01:36 +0000>
Nov 8 02:01:36 hotpoint phpSMTPd[70045]: EventProcessPoolManager Worker #3 forked with pid:70054 at Sat, 08 Nov 2014 01:01:36 +0000
Nov 8 02:01:36 hotpoint phpSMTPd[70054]: Worker #3 with pid:70054 started at <Sat, 08 Nov 2014 01:01:36 +0000>
- Implement client part of SMTP, and implement this SMTP verbs: EHLO/HELO, STARTTLS, XFORWARD, XCLIENT, MAIL FROM, RCPT TO, QUIT
- no need HELP, SEND, SAML, SOML, TURN, ETRN verbs in this client
- for the moment no support for VRFY/EXPN, but possible addition to VRFY/EXPN support in future to check address
- based largely on D.J. Bernstein (author of QMAIL) implementation notes: http://cr.yp.to/smtp/client.html
- Conform with ESMTP standard RFC 1869 and implement this extension : 8BITMIME, STARTTLS, SIZE, XCLIENT, XFORWARD
- EHLO are sent systematicly (as say djb), and HELO only if $this->forceehlo is set to false and the SERVER not responded ESMTP in gretting
- NOTE: possible amelioration is to send HELO in case of error with EHLO for server that not support ESMTP.
- abort if SIZE receved form the server are larger than data message
- send xclient/xforward information if the server support it
- Transmit all XCLIENT attributs ($this->xclients array, it not set send [UNAVAILABLE]) found in XCLIENT EHLO response...
- Transmit all XFORWARD attributs ($this->xforwards array, it not set send [UNAVAILABLE]) found in XFORWARD EHLO response...
- STARTLS if the server claim to support it and the $this->tls attribut is set
- all are implemented
- not SIZE option on MAIL cmd for the moment...
- no Q-P conversion (for the moment, but in regard of djb note are not needed anymore...), send 8bit for all server even if the server not specify 8BITMIME in EHLO
- send quit, wait response and close connection
- NOTE: possible amelioration is to not wait response... like qmail client
- Implement this SMTP verbs: EHLO/HELO, STARTTLS, XFORWARD, XCLIENT, MAIL, RCPT, RSET, VRFY, NOOP, QUIT
- no HELP, SEND, SAML, SOML, TURN, ETRN verbs
- conforming to ESMTP standard RFC 1869 and implement this extension : 8BITMIME, STARTTLS, SIZE, XCLIENT, XFORWARD
- based largely on D.J. Bernstein (author of QMAIL) implementation notes: http://cr.yp.to/smtp.html
- support EHLO and HELO
- HELO not send extension like EHLO does
- send extension SIZE (send server configured maximum message size), 8BITMIME, VRFY as default
- send XCLIENT/XFORWARD extension if configuration enabeled
- send STARTTLS extension if configuration enabeled
- check resolvabilty of the hostname sended
- all are implemented
- MAIL and RCPT controle the address format
- RCPT controle if the destination are configured Mailling List
- controle the sequancing the cmds
- SIZE option on MAIL cmd are supported, and abort if the size is larger the server configured maximum.
- no Q-P conversion, full 8BITMIME server.
- VRFY controle if the addresse are configured as mailing list
- NOOP do noop...
- RSET reset the enveloppe and restart sequencing to after EHLO/HELO
- QUIT close the connection after sending bye message
-
Prepare cert.pem certificate and privkey.pem private key files.
http://rene.bz/setting-smtp-authentication-over-tls-postfix/
-
Launch the server script
-
to test TLS support:
$ openssl s_client -connect localhost:25 -starttls smtp -crlf -quiet -state -msg
or
$ gnutls-cli --crlf --starttls -p 25 --debug 256 --insecure 127.0.0.1
-
send EHLO and STARTTLS
-
and after the response of STARTTLS
-
send CTRL-D and gnutls-cli go in TLS handcheck
-
You can test also with swaks: http://www.jetmore.org/john/code/swaks/
$ ./swaks --to [email protected] --from [email protected] --server 127.0.0.1:25 -tls
http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
http://en.wikipedia.org/wiki/Extended_SMTP
SMTP : RFC 5321 – Simple Mail Transfer Protocol
http://tools.ietf.org/html/rfc5321
ESMTP : RFC 1869 – SMTP Service Extensions
http://tools.ietf.org/html/rfc1869
Mail Message Format : RFC 5322 - Internet Message Format
http://tools.ietf.org/html/rfc5322
Requirements for Internet Hosts -- Application and Support
https://tools.ietf.org/html/rfc1123#page-48
SMTP Extension | RFC | Description |
---|---|---|
SIZE | 1870 | SMTP Service Extension for Message Size Declaration |
8BITMIME | 6152 | SMTP Service Extension for 8-bit MIME Transport |
STARTTLS | 3207 | SMTP Service Extension for Secure SMTP over Transport Layer Security |
AUTH | 4954 | SMTP Service Extension for Authentication |
PIPELINING | 2920 | SMTP Service Extension for Command Pipelining |
CHUNKING | 3030 | SMTP Service Extensions for Transmission of Large and Binary MIME Messages |
DSN | 3461 | Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs) |
ENHANCEDSTATUSCODES | 3463 | Enhanced Mail System Status Codes |
SMTPUTF8 | 6531 | SMTP Extension for Internationalized Email |
-
8BITMIME, client/server done partial
-
STARTLS, client/server done
-
SIZE, client/server done partial
-
XCLIENT, client/server done
-
XFORWARD, client/server done
-
PIPELINING, not done but planned
-
SMTP-AUTH, not done, planned CRAM-MD5, PLAIN only
http://tools.ietf.org/html/rfc4954 ==> SMTP AUTH are based on SASL
http://www.fehcom.de/qmail/smtpauth.html ==> extension for qmail, good starting point
http://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml ==> list of SASL mecanismes
http://tools.ietf.org/html/rfc4422 ==> SASL standard
http://tools.ietf.org/html/rfc2195 ==> SASL CRAM-MD5
http://tools.ietf.org/html/rfc4616 ==> SASL PLAIN
http://tools.ietf.org/id/draft-murchison-sasl-login-00.txt ==> SASL LOGIN
http://tools.ietf.org/html/rfc6331 ==> SASL DIGEST-MD5 (obsoleted)
http://tools.ietf.org/html/rfc5802 ==> SCRAM-*
http://tools.ietf.org/html/rfc4505 ==> ANONYMOUS
https://qmail.jms1.net/test-auth.shtml
- for use with authenticated relay (not for public mx relay)
-
TLS DANE, not done, planned
https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-13
https://datatracker.ietf.org/doc/draft-ietf-dane-smtp-with-dane/
-
ENHANCEDSTATUSCODES, not done possibly planned
http://tools.ietf.org/html/rfc2034 ==> the extension
http://tools.ietf.org/html/rfc3463 ==> List of Enhanced Mail System Status Codes
http://tools.ietf.org/html/rfc1894 ==> An Extensible Message Format for Delivery Status Notifications, defines a mechanism to send such coded material to users
-
SMTPUTF8, not done, not planned
http://www.postfix.org/SMTPUTF8_README.html
http://tools.ietf.org/html/rfc6531 ==> the SMTPUTF8 extension
http://tools.ietf.org/html/rfc6532 ==> Internationalized Email Headers
http://tools.ietf.org/html/rfc6533 ==> Internationalized Delivery Status and Disposition Notifications
-
DSN, not done, not planned
-
CHUNKING, not done, not planned