mirror of
https://seed.flo-the.dev/z3gWc1qgaeZaoGwL4WTstLNoqjayM.git
synced 2025-12-06 04:47:35 +01:00
add more tests, refactor sign and encrypt
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
This commit is contained in:
2
.gitignore
vendored
2
.gitignore
vendored
@@ -12,6 +12,8 @@ config.ini
|
||||
*.pfx
|
||||
*.crt
|
||||
*.pem
|
||||
!tests/privkey.pem
|
||||
!tests/signer.pem
|
||||
|
||||
# nix
|
||||
result
|
||||
|
||||
@@ -53,6 +53,7 @@ in
|
||||
# look for code smell
|
||||
pylint.enable = true;
|
||||
detect-private-keys.enable = true;
|
||||
detect-private-keys.excludes = [ "tests/" ];
|
||||
|
||||
};
|
||||
|
||||
|
||||
@@ -147,7 +147,7 @@ class Config:
|
||||
class SMTPClient(SMTP):
|
||||
"""Client part of library
|
||||
|
||||
This will connect to an upstream SMTP server to deliver the mal
|
||||
This will connect to an upstream SMTP server to deliver the mail
|
||||
|
||||
"""
|
||||
|
||||
@@ -206,7 +206,7 @@ class SMTPClient(SMTP):
|
||||
message (Message): message object
|
||||
|
||||
Returns:
|
||||
bytes: The signed message including the From and To Header
|
||||
bytes: The signed message
|
||||
"""
|
||||
with open(Path(self._config.smime_cert_private), "rb") as key_data:
|
||||
key = load_pem_private_key(key_data.read(), password=None)
|
||||
@@ -220,12 +220,20 @@ class SMTPClient(SMTP):
|
||||
.add_signer(cert, key, hashes.SHA512(), rsa_padding=padding.PKCS1v15())
|
||||
.sign(Encoding.SMIME, [pkcs7.PKCS7Options.DetachedSignature])
|
||||
)
|
||||
# Add correct headers
|
||||
# new = b"From: " + self._config.sender.encode() + b"\r\n" + output
|
||||
# new = b"To: " + ", ".join(self._config.recipients).encode() + b"\r\n" + new
|
||||
# new = b"Subject: " + message.get("Subject", "").encode() + b"\r\n" + new
|
||||
new = self._encrypt(output, message.get("Subject", ""))
|
||||
return new
|
||||
return output
|
||||
|
||||
def _encrypt_and_sign(self, message: Message) -> bytes:
|
||||
"""Sign and encrypt the message
|
||||
|
||||
Args:
|
||||
message (Message): message object
|
||||
|
||||
Returns:
|
||||
bytes: The signed and encrypted message including the From and To Header
|
||||
"""
|
||||
signed = self._sign(message)
|
||||
encrypt = self._encrypt(signed, message.get("Subject", ""))
|
||||
return encrypt
|
||||
|
||||
async def _send_message(
|
||||
self, message: bytes, sender: str, recipients: List[str]
|
||||
@@ -275,7 +283,7 @@ class SMTPClient(SMTP):
|
||||
f"'{message.get('Subject', '')}'"
|
||||
)
|
||||
if self._config.smime_cert:
|
||||
message = self._sign(message)
|
||||
message = self._encrypt_and_sign(message)
|
||||
async with (
|
||||
self._lock
|
||||
): # TODO: consumer task from spool queue, reusing connections
|
||||
|
||||
16
tests/privkey.pem
Normal file
16
tests/privkey.pem
Normal file
@@ -0,0 +1,16 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALb6E084QJJVnRGg
|
||||
Tij6Mc+ZzO3bV8Izt+A2RkpV4aYTjClVc2pLHh8KyjTA/bqnUYXfQCEDTHx2RsE5
|
||||
DqmyaYxWejcptw3Ht1YkZO2RW7zLSNQjlwFfcgf92XH1uzUxido/Lbw8LkHnJqCO
|
||||
4jemU9wP9b82JBgou91VEzqTfHPXAgMBAAECgYAc601d+fAKsMlQXdu8kj6JJy/C
|
||||
cCZgpTfskeduHEC7tN80MTM6m4C5O0VWLSJs+8DgvbYvAYx3J2Jra48rtu0DYrd/
|
||||
gWqijODMDr6l8jgEeA8DN0OwcWhTB6unowHzR7RadijzP0nOIiGyArPtguGk4XKw
|
||||
NcRoU36bxb/smBCaIQJBAOFMt0xTx6celUUB+b7HKNLe9kZb2shSZXzKIuzqAPJd
|
||||
8TafC2CSt6iFTfhwr+kARz300r0y/JrGG30a6B8kRb8CQQDP6PvDoY6atLU35h+l
|
||||
WjuvkOKaR6ny/uarNP3nHapxgC9cNUkySFBDrSIJhNorYSGSMxqhEGUPWHzhH0PG
|
||||
H0fpAkEAkelpXNl1mFpKOiMJZ/D8E3Wq8e5TRyF18NfIvr7eVhlZOxLN/4GFyHJt
|
||||
CNWSV8iCWzHPuhDnYCWlb+SZKHIJaQJACs4i94HX9XZazLLrBh7wZylyfW4oCPby
|
||||
agdxAqfqCcgNrg8e5LwZX8sJr9D1vbdolT6Orbw6ZFfG9bQ4Q32wsQJAZzbkDv+l
|
||||
UBCR9qNqEpOtyOhBV8b8NzKgI/SBjgNbfzOki3r88qkwbJSMOZPZv3kkwmkjLTfz
|
||||
x7eQLB/6eQFmFw==
|
||||
-----END PRIVATE KEY-----
|
||||
17
tests/signer.pem
Normal file
17
tests/signer.pem
Normal file
@@ -0,0 +1,17 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICsDCCAhmgAwIBAgIUF0xm6FBeRujH+4/G1506jAty04UwDQYJKoZIhvcNAQEL
|
||||
BQAwajELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
||||
GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEjMCEGCSqGSIb3DQEJARYUc2VuZGVy
|
||||
QGxvY2FsaG9zdC5jb20wHhcNMjQwNzA2MTEyMjU2WhcNMjUwNzA2MTEyMjU2WjBq
|
||||
MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50
|
||||
ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMSMwIQYJKoZIhvcNAQkBFhRzZW5kZXJAbG9j
|
||||
YWxob3N0LmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtvoTTzhAklWd
|
||||
EaBOKPoxz5nM7dtXwjO34DZGSlXhphOMKVVzakseHwrKNMD9uqdRhd9AIQNMfHZG
|
||||
wTkOqbJpjFZ6Nym3Dce3ViRk7ZFbvMtI1COXAV9yB/3ZcfW7NTGJ2j8tvDwuQecm
|
||||
oI7iN6ZT3A/1vzYkGCi73VUTOpN8c9cCAwEAAaNTMFEwHQYDVR0OBBYEFDFFLpTd
|
||||
y1co5C6OVCLJRgIicstMMB8GA1UdIwQYMBaAFDFFLpTdy1co5C6OVCLJRgIicstM
|
||||
MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADgYEATdAHRrnrl2aQ8SI3
|
||||
kQgUsTp5hHc3M5b2+ZbNYCsz7SYQBtHniGId9vBh941gUs8R8X16Cdp0pjVAayeU
|
||||
CCW1Zs47tA9IIT1hslOORibTcSQKr7TI+RprURyky8m2T9PbOSLgmnjlbydbxN7L
|
||||
hxx8dg1pWRfEKBSvO1gOkcTo7SQ=
|
||||
-----END CERTIFICATE-----
|
||||
@@ -21,13 +21,36 @@ Tests for smtprd_ng
|
||||
# pylint: disable=protected-access
|
||||
|
||||
import configparser
|
||||
import email
|
||||
import email.message
|
||||
from pathlib import Path
|
||||
|
||||
from M2Crypto import BIO, SMIME, X509
|
||||
|
||||
from smtprd_ng import smtprd
|
||||
|
||||
|
||||
def config() -> smtprd.ClientConfig:
|
||||
"""Return method for settings used here in test"""
|
||||
cfg = smtprd.ClientConfig(
|
||||
hostname="localhost",
|
||||
port=1234,
|
||||
username="user",
|
||||
password="pass",
|
||||
use_tls=False,
|
||||
start_tls=False,
|
||||
sender="sender",
|
||||
recipients=["recipient"],
|
||||
set_reply_to="",
|
||||
smime_to_cert=Path("tests", "signer.pem"),
|
||||
smime_cert=Path("tests", "signer.pem"),
|
||||
smime_cert_private=Path("tests", "privkey.pem"),
|
||||
)
|
||||
return cfg
|
||||
|
||||
|
||||
def test_config_from_config():
|
||||
"""Test opening and readig the config file"""
|
||||
"""Test opening and reading the config file"""
|
||||
config_parser: configparser.ConfigParser = configparser.ConfigParser()
|
||||
with open(Path("config.example"), "r", encoding="utf8") as fp:
|
||||
config_parser.read_file(fp)
|
||||
@@ -35,12 +58,79 @@ def test_config_from_config():
|
||||
assert cfg.server.hostname == "localhost"
|
||||
assert cfg.client.port == 465
|
||||
assert cfg.client.smime_cert == ""
|
||||
assert cfg.client.use_tls is True
|
||||
|
||||
|
||||
def test_config_from_ini():
|
||||
"""Test parsing the config file and using fallbacks"""
|
||||
"""Test parsing the config file and using fallbacks.
|
||||
This is mostly redundant to the above test"""
|
||||
cfg = smtprd.Config.from_ini(Path("config.example"))
|
||||
assert cfg.server.hostname == "localhost"
|
||||
assert cfg.client.port == 465
|
||||
assert cfg.client.smime_cert == ""
|
||||
assert cfg.client.use_tls is True
|
||||
|
||||
|
||||
def test_client_encrypt():
|
||||
"""Test encryption. Keys were generated with
|
||||
openssl req -newkey rsa:1024 -nodes -x509 -days 365 -out signer.pem
|
||||
"""
|
||||
|
||||
client = smtprd.SMTPClient(config())
|
||||
encrypted = client._encrypt(b"abc", "subject")
|
||||
lines = encrypted.decode().splitlines()
|
||||
# Test format of header
|
||||
assert lines[0] == "From: " + str(config().sender)
|
||||
assert lines[1] == "To: " + str(config().recipients[0])
|
||||
assert lines[2] == "Subject: " + "subject"
|
||||
assert lines[3] == "MIME-Version: 1.0"
|
||||
assert lines[4] == 'Content-Disposition: attachment; filename="smime.p7m"'
|
||||
assert (
|
||||
lines[5]
|
||||
== 'Content-Type: application/x-pkcs7-mime; smime-type=enveloped-data; name="smime.p7m"'
|
||||
)
|
||||
assert lines[6] == "Content-Transfer-Encoding: base64"
|
||||
# new line is important to seperate header from body
|
||||
assert lines[7] == ""
|
||||
assert (
|
||||
lines[8] == "MIIBdgYJKoZIhvcNAQcDoIIBZzCCAWMCAQAxggEeMIIBGgIBADCBgjBqMQswCQYD"
|
||||
)
|
||||
|
||||
s = SMIME.SMIME()
|
||||
s.load_key(config().smime_cert_private, config().smime_cert)
|
||||
buf = BIO.MemoryBuffer(encrypted)
|
||||
p7, _ = SMIME.smime_load_pkcs7_bio(buf)
|
||||
out = s.decrypt(p7)
|
||||
assert b"abc" in out
|
||||
|
||||
|
||||
def test_client_sign():
|
||||
"""Test signing"""
|
||||
client = smtprd.SMTPClient(config())
|
||||
message = email.message.EmailMessage()
|
||||
message.set_content("Test to sign")
|
||||
# header are needed, because email.message.Emailmessage will add a
|
||||
# newline between the boundary and the content if no header is found
|
||||
message.add_header("From", config().sender)
|
||||
message.add_header("To", config().recipients[0])
|
||||
message.add_header("Subject", "Test")
|
||||
signed = client._sign(message)
|
||||
assert "This is an S/MIME signed message" in signed.decode()
|
||||
assert "Test to sign" in signed.decode()
|
||||
|
||||
s = SMIME.SMIME()
|
||||
# Load the signer's cert.
|
||||
x509 = X509.load_cert(Path(config().smime_cert))
|
||||
sk = X509.X509_Stack()
|
||||
sk.push(x509)
|
||||
s.set_x509_stack(sk)
|
||||
# Load the signer's CA cert. In this case, because the signer's
|
||||
# cert is self-signed, it is the signer's cert itself.
|
||||
st = X509.X509_Store()
|
||||
st.load_info(str(config().smime_cert))
|
||||
s.set_x509_store(st)
|
||||
# Load the data, verify it.
|
||||
buf = BIO.MemoryBuffer(signed)
|
||||
p7, data = SMIME.smime_load_pkcs7_bio(buf)
|
||||
v = s.verify(p7, data)
|
||||
assert "Test to sign" in v.decode()
|
||||
|
||||
Reference in New Issue
Block a user