/** * STARTTLS Implementation * Provides an improved implementation for STARTTLS upgrades */ import * as plugins from '../../../plugins.js'; import { SmtpLogger } from './utils/logging.js'; import { loadCertificatesFromString, createTlsOptions } from './certificate-utils.js'; import { getSocketDetails } from './utils/helpers.js'; import { SmtpState } from '../interfaces.js'; /** * Enhanced STARTTLS handler for more reliable TLS upgrades */ export async function performStartTLS(socket, options) { return new Promise((resolve) => { try { const socketDetails = getSocketDetails(socket); SmtpLogger.info('Starting enhanced STARTTLS upgrade process', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort }); // Create a proper socket cleanup function const cleanupSocket = () => { // Remove all listeners to prevent memory leaks socket.removeAllListeners('data'); socket.removeAllListeners('error'); socket.removeAllListeners('close'); socket.removeAllListeners('end'); socket.removeAllListeners('drain'); }; // Prepare the socket for TLS upgrade socket.setNoDelay(true); // Critical: make sure there's no pending data before TLS handshake socket.pause(); // Add error handling for the base socket const handleSocketError = (err) => { SmtpLogger.error(`Socket error during STARTTLS preparation: ${err.message}`, { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort, error: err, stack: err.stack }); if (options.onFailure) { options.onFailure(err); } // Resolve with undefined to indicate failure resolve(undefined); }; socket.once('error', handleSocketError); // Load certificates let certificates; try { certificates = loadCertificatesFromString({ key: options.key, cert: options.cert, ca: options.ca }); } catch (certError) { SmtpLogger.error(`Certificate error during STARTTLS: ${certError instanceof Error ? certError.message : String(certError)}`); if (options.onFailure) { options.onFailure(certError instanceof Error ? certError : new Error(String(certError))); } resolve(undefined); return; } // Create TLS options optimized for STARTTLS const tlsOptions = createTlsOptions(certificates, true); // Create secure context let secureContext; try { secureContext = plugins.tls.createSecureContext(tlsOptions); } catch (contextError) { SmtpLogger.error(`Failed to create secure context: ${contextError instanceof Error ? contextError.message : String(contextError)}`); if (options.onFailure) { options.onFailure(contextError instanceof Error ? contextError : new Error(String(contextError))); } resolve(undefined); return; } // Log STARTTLS upgrade attempt SmtpLogger.debug('Attempting TLS socket upgrade with options', { minVersion: tlsOptions.minVersion, maxVersion: tlsOptions.maxVersion, handshakeTimeout: tlsOptions.handshakeTimeout }); // Use a safer approach to create the TLS socket const handshakeTimeout = 30000; // 30 seconds timeout for TLS handshake let handshakeTimeoutId; // Create the TLS socket using a conservative approach for STARTTLS const tlsSocket = new plugins.tls.TLSSocket(socket, { isServer: true, secureContext, // Server-side options (simpler is more reliable for STARTTLS) requestCert: false, rejectUnauthorized: false }); // Set up error handling for the TLS socket tlsSocket.once('error', (err) => { if (handshakeTimeoutId) { clearTimeout(handshakeTimeoutId); } SmtpLogger.error(`TLS error during STARTTLS: ${err.message}`, { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort, error: err, stack: err.stack }); // Clean up socket listeners cleanupSocket(); if (options.onFailure) { options.onFailure(err); } // Destroy the socket to ensure we don't have hanging connections tlsSocket.destroy(); resolve(undefined); }); // Set up handshake timeout manually for extra safety handshakeTimeoutId = setTimeout(() => { SmtpLogger.error('TLS handshake timed out', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort }); // Clean up socket listeners cleanupSocket(); if (options.onFailure) { options.onFailure(new Error('TLS handshake timed out')); } // Destroy the socket to ensure we don't have hanging connections tlsSocket.destroy(); resolve(undefined); }, handshakeTimeout); // Set up handler for successful TLS negotiation tlsSocket.once('secure', () => { if (handshakeTimeoutId) { clearTimeout(handshakeTimeoutId); } const protocol = tlsSocket.getProtocol(); const cipher = tlsSocket.getCipher(); SmtpLogger.info('TLS upgrade successful via STARTTLS', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort, protocol: protocol || 'unknown', cipher: cipher?.name || 'unknown' }); // Update socket mapping in session manager if (options.sessionManager) { const socketReplaced = options.sessionManager.replaceSocket(socket, tlsSocket); if (!socketReplaced) { SmtpLogger.error('Failed to replace socket in session manager after STARTTLS', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort }); } } // Re-attach event handlers from connection manager if (options.connectionManager) { try { options.connectionManager.setupSocketEventHandlers(tlsSocket); SmtpLogger.debug('Successfully re-attached connection manager event handlers to TLS socket', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort }); } catch (handlerError) { SmtpLogger.error('Failed to re-attach event handlers to TLS socket after STARTTLS', { remoteAddress: socketDetails.remoteAddress, remotePort: socketDetails.remotePort, error: handlerError instanceof Error ? handlerError : new Error(String(handlerError)) }); } } // Update session if provided if (options.session) { // Update session properties to indicate TLS is active options.session.useTLS = true; options.session.secure = true; // Reset session state as required by RFC 3207 // After STARTTLS, client must issue a new EHLO if (options.updateSessionState) { options.updateSessionState(options.session, SmtpState.GREETING); } } // Call success callback if provided if (options.onSuccess) { options.onSuccess(tlsSocket); } // Success - return the TLS socket resolve(tlsSocket); }); // Resume the socket after we've set up all handlers // This allows the TLS handshake to proceed socket.resume(); } catch (error) { SmtpLogger.error(`Unexpected error in STARTTLS: ${error instanceof Error ? error.message : String(error)}`, { error: error instanceof Error ? error : new Error(String(error)), stack: error instanceof Error ? error.stack : 'No stack trace available' }); if (options.onFailure) { options.onFailure(error instanceof Error ? error : new Error(String(error))); } resolve(undefined); } }); } //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"starttls-handler.js","sourceRoot":"","sources":["../../../../ts/mail/delivery/smtpserver/starttls-handler.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,KAAK,OAAO,MAAM,qBAAqB,CAAC;AAC/C,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAChD,OAAO,EACL,0BAA0B,EAC1B,gBAAgB,EAEjB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AAEtD,OAAO,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAC;AAE7C;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CACnC,MAA0B,EAC1B,OAUC;IAED,OAAO,IAAI,OAAO,CAAoC,CAAC,OAAO,EAAE,EAAE;QAChE,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,gBAAgB,CAAC,MAAM,CAAC,CAAC;YAE/C,UAAU,CAAC,IAAI,CAAC,4CAA4C,EAAE;gBAC5D,aAAa,EAAE,aAAa,CAAC,aAAa;gBAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;aACrC,CAAC,CAAC;YAEH,0CAA0C;YAC1C,MAAM,aAAa,GAAG,GAAG,EAAE;gBACzB,+CAA+C;gBAC/C,MAAM,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;gBAClC,MAAM,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;gBACnC,MAAM,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;gBACnC,MAAM,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC;gBACjC,MAAM,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YACrC,CAAC,CAAC;YAEF,qCAAqC;YACrC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAExB,mEAAmE;YACnE,MAAM,CAAC,KAAK,EAAE,CAAC;YAEf,yCAAyC;YACzC,MAAM,iBAAiB,GAAG,CAAC,GAAU,EAAE,EAAE;gBACvC,UAAU,CAAC,KAAK,CAAC,6CAA6C,GAAG,CAAC,OAAO,EAAE,EAAE;oBAC3E,aAAa,EAAE,aAAa,CAAC,aAAa;oBAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;oBACpC,KAAK,EAAE,GAAG;oBACV,KAAK,EAAE,GAAG,CAAC,KAAK;iBACjB,CAAC,CAAC;gBAEH,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBACzB,CAAC;gBAED,6CAA6C;gBAC7C,OAAO,CAAC,SAAS,CAAC,CAAC;YACrB,CAAC,CAAC;YAEF,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAExC,oBAAoB;YACpB,IAAI,YAA8B,CAAC;YACnC,IAAI,CAAC;gBACH,YAAY,GAAG,0BAA0B,CAAC;oBACxC,GAAG,EAAE,OAAO,CAAC,GAAG;oBAChB,IAAI,EAAE,OAAO,CAAC,IAAI;oBAClB,EAAE,EAAE,OAAO,CAAC,EAAE;iBACf,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,UAAU,CAAC,KAAK,CAAC,sCAAsC,SAAS,YAAY,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAE7H,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,SAAS,YAAY,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;gBAC3F,CAAC;gBAED,OAAO,CAAC,SAAS,CAAC,CAAC;gBACnB,OAAO;YACT,CAAC;YAED,4CAA4C;YAC5C,MAAM,UAAU,GAAG,gBAAgB,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;YAExD,wBAAwB;YACxB,IAAI,aAAa,CAAC;YAClB,IAAI,CAAC;gBACH,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,UAAU,CAAC,CAAC;YAC9D,CAAC;YAAC,OAAO,YAAY,EAAE,CAAC;gBACtB,UAAU,CAAC,KAAK,CAAC,oCAAoC,YAAY,YAAY,KAAK,CAAC,CAAC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;gBAEpI,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,YAAY,YAAY,KAAK,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;gBACpG,CAAC;gBAED,OAAO,CAAC,SAAS,CAAC,CAAC;gBACnB,OAAO;YACT,CAAC;YAED,+BAA+B;YAC/B,UAAU,CAAC,KAAK,CAAC,4CAA4C,EAAE;gBAC7D,UAAU,EAAE,UAAU,CAAC,UAAU;gBACjC,UAAU,EAAE,UAAU,CAAC,UAAU;gBACjC,gBAAgB,EAAE,UAAU,CAAC,gBAAgB;aAC9C,CAAC,CAAC;YAEH,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,KAAK,CAAC,CAAC,uCAAuC;YACvE,IAAI,kBAA8C,CAAC;YAEnD,mEAAmE;YACnE,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,EAAE;gBAClD,QAAQ,EAAE,IAAI;gBACd,aAAa;gBACb,8DAA8D;gBAC9D,WAAW,EAAE,KAAK;gBAClB,kBAAkB,EAAE,KAAK;aAC1B,CAAC,CAAC;YAEH,2CAA2C;YAC3C,SAAS,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;gBAC9B,IAAI,kBAAkB,EAAE,CAAC;oBACvB,YAAY,CAAC,kBAAkB,CAAC,CAAC;gBACnC,CAAC;gBAED,UAAU,CAAC,KAAK,CAAC,8BAA8B,GAAG,CAAC,OAAO,EAAE,EAAE;oBAC5D,aAAa,EAAE,aAAa,CAAC,aAAa;oBAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;oBACpC,KAAK,EAAE,GAAG;oBACV,KAAK,EAAE,GAAG,CAAC,KAAK;iBACjB,CAAC,CAAC;gBAEH,4BAA4B;gBAC5B,aAAa,EAAE,CAAC;gBAEhB,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBACzB,CAAC;gBAED,iEAAiE;gBACjE,SAAS,CAAC,OAAO,EAAE,CAAC;gBACpB,OAAO,CAAC,SAAS,CAAC,CAAC;YACrB,CAAC,CAAC,CAAC;YAEH,qDAAqD;YACrD,kBAAkB,GAAG,UAAU,CAAC,GAAG,EAAE;gBACnC,UAAU,CAAC,KAAK,CAAC,yBAAyB,EAAE;oBAC1C,aAAa,EAAE,aAAa,CAAC,aAAa;oBAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;iBACrC,CAAC,CAAC;gBAEH,4BAA4B;gBAC5B,aAAa,EAAE,CAAC;gBAEhB,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC;gBAC1D,CAAC;gBAED,iEAAiE;gBACjE,SAAS,CAAC,OAAO,EAAE,CAAC;gBACpB,OAAO,CAAC,SAAS,CAAC,CAAC;YACrB,CAAC,EAAE,gBAAgB,CAAC,CAAC;YAErB,gDAAgD;YAChD,SAAS,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,EAAE;gBAC5B,IAAI,kBAAkB,EAAE,CAAC;oBACvB,YAAY,CAAC,kBAAkB,CAAC,CAAC;gBACnC,CAAC;gBAED,MAAM,QAAQ,GAAG,SAAS,CAAC,WAAW,EAAE,CAAC;gBACzC,MAAM,MAAM,GAAG,SAAS,CAAC,SAAS,EAAE,CAAC;gBAErC,UAAU,CAAC,IAAI,CAAC,qCAAqC,EAAE;oBACrD,aAAa,EAAE,aAAa,CAAC,aAAa;oBAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;oBACpC,QAAQ,EAAE,QAAQ,IAAI,SAAS;oBAC/B,MAAM,EAAE,MAAM,EAAE,IAAI,IAAI,SAAS;iBAClC,CAAC,CAAC;gBAEH,2CAA2C;gBAC3C,IAAI,OAAO,CAAC,cAAc,EAAE,CAAC;oBAC3B,MAAM,cAAc,GAAG,OAAO,CAAC,cAAc,CAAC,aAAa,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;oBAC/E,IAAI,CAAC,cAAc,EAAE,CAAC;wBACpB,UAAU,CAAC,KAAK,CAAC,4DAA4D,EAAE;4BAC7E,aAAa,EAAE,aAAa,CAAC,aAAa;4BAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;yBACrC,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,mDAAmD;gBACnD,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,OAAO,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,SAAS,CAAC,CAAC;wBAC9D,UAAU,CAAC,KAAK,CAAC,0EAA0E,EAAE;4BAC3F,aAAa,EAAE,aAAa,CAAC,aAAa;4BAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;yBACrC,CAAC,CAAC;oBACL,CAAC;oBAAC,OAAO,YAAY,EAAE,CAAC;wBACtB,UAAU,CAAC,KAAK,CAAC,iEAAiE,EAAE;4BAClF,aAAa,EAAE,aAAa,CAAC,aAAa;4BAC1C,UAAU,EAAE,aAAa,CAAC,UAAU;4BACpC,KAAK,EAAE,YAAY,YAAY,KAAK,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;yBACtF,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,6BAA6B;gBAC7B,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;oBACpB,sDAAsD;oBACtD,OAAO,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;oBAC9B,OAAO,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;oBAE9B,8CAA8C;oBAC9C,+CAA+C;oBAC/C,IAAI,OAAO,CAAC,kBAAkB,EAAE,CAAC;wBAC/B,OAAO,CAAC,kBAAkB,CAAC,OAAO,CAAC,OAAO,EAAE,SAAS,CAAC,QAAQ,CAAC,CAAC;oBAClE,CAAC;gBACH,CAAC;gBAED,oCAAoC;gBACpC,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;gBAC/B,CAAC;gBAED,kCAAkC;gBAClC,OAAO,CAAC,SAAS,CAAC,CAAC;YACrB,CAAC,CAAC,CAAC;YAEH,oDAAoD;YACpD,2CAA2C;YAC3C,MAAM,CAAC,MAAM,EAAE,CAAC;QAElB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,UAAU,CAAC,KAAK,CAAC,iCAAiC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,EAAE;gBAC1G,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAChE,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,0BAA0B;aACzE,CAAC,CAAC;YAEH,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;gBACtB,OAAO,CAAC,SAAS,CAAC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAC/E,CAAC;YAED,OAAO,CAAC,SAAS,CAAC,CAAC;QACrB,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC"}