net-imap 0.3.4 → 0.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of net-imap might be problematic. Click here for more details.

Files changed (51) hide show
  1. checksums.yaml +4 -4
  2. data/.github/workflows/pages.yml +46 -0
  3. data/.github/workflows/test.yml +12 -12
  4. data/Gemfile +1 -0
  5. data/README.md +15 -4
  6. data/Rakefile +0 -7
  7. data/benchmarks/generate_parser_benchmarks +52 -0
  8. data/benchmarks/parser.yml +578 -0
  9. data/benchmarks/stringprep.yml +1 -1
  10. data/lib/net/imap/authenticators.rb +26 -57
  11. data/lib/net/imap/command_data.rb +13 -6
  12. data/lib/net/imap/data_encoding.rb +3 -3
  13. data/lib/net/imap/deprecated_client_options.rb +139 -0
  14. data/lib/net/imap/response_data.rb +46 -41
  15. data/lib/net/imap/response_parser/parser_utils.rb +230 -0
  16. data/lib/net/imap/response_parser.rb +665 -627
  17. data/lib/net/imap/sasl/anonymous_authenticator.rb +68 -0
  18. data/lib/net/imap/sasl/authentication_exchange.rb +107 -0
  19. data/lib/net/imap/sasl/authenticators.rb +118 -0
  20. data/lib/net/imap/sasl/client_adapter.rb +72 -0
  21. data/lib/net/imap/{authenticators/cram_md5.rb → sasl/cram_md5_authenticator.rb} +15 -9
  22. data/lib/net/imap/sasl/digest_md5_authenticator.rb +168 -0
  23. data/lib/net/imap/sasl/external_authenticator.rb +62 -0
  24. data/lib/net/imap/sasl/gs2_header.rb +80 -0
  25. data/lib/net/imap/{authenticators/login.rb → sasl/login_authenticator.rb} +19 -14
  26. data/lib/net/imap/sasl/oauthbearer_authenticator.rb +164 -0
  27. data/lib/net/imap/sasl/plain_authenticator.rb +93 -0
  28. data/lib/net/imap/sasl/protocol_adapters.rb +45 -0
  29. data/lib/net/imap/sasl/scram_algorithm.rb +58 -0
  30. data/lib/net/imap/sasl/scram_authenticator.rb +278 -0
  31. data/lib/net/imap/sasl/stringprep.rb +6 -66
  32. data/lib/net/imap/sasl/xoauth2_authenticator.rb +88 -0
  33. data/lib/net/imap/sasl.rb +144 -43
  34. data/lib/net/imap/sasl_adapter.rb +21 -0
  35. data/lib/net/imap/stringprep/nameprep.rb +70 -0
  36. data/lib/net/imap/stringprep/saslprep.rb +69 -0
  37. data/lib/net/imap/stringprep/saslprep_tables.rb +96 -0
  38. data/lib/net/imap/stringprep/tables.rb +146 -0
  39. data/lib/net/imap/stringprep/trace.rb +85 -0
  40. data/lib/net/imap/stringprep.rb +159 -0
  41. data/lib/net/imap.rb +976 -590
  42. data/net-imap.gemspec +2 -2
  43. data/rakelib/saslprep.rake +4 -4
  44. data/rakelib/string_prep_tables_generator.rb +82 -60
  45. metadata +31 -12
  46. data/lib/net/imap/authenticators/digest_md5.rb +0 -115
  47. data/lib/net/imap/authenticators/plain.rb +0 -41
  48. data/lib/net/imap/authenticators/xoauth2.rb +0 -20
  49. data/lib/net/imap/sasl/saslprep.rb +0 -55
  50. data/lib/net/imap/sasl/saslprep_tables.rb +0 -98
  51. data/lib/net/imap/sasl/stringprep_tables.rb +0 -153
@@ -0,0 +1,80 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Net
4
+ class IMAP < Protocol
5
+ module SASL
6
+
7
+ # Originally defined for the GS2 mechanism family in
8
+ # RFC5801[https://tools.ietf.org/html/rfc5801],
9
+ # several different mechanisms start with a GS2 header:
10
+ # * +GS2-*+ --- RFC5801[https://tools.ietf.org/html/rfc5801]
11
+ # * +SCRAM-*+ --- RFC5802[https://tools.ietf.org/html/rfc5802]
12
+ # (ScramAuthenticator)
13
+ # * +SAML20+ --- RFC6595[https://tools.ietf.org/html/rfc6595]
14
+ # * +OPENID20+ --- RFC6616[https://tools.ietf.org/html/rfc6616]
15
+ # * +OAUTH10A+ --- RFC7628[https://tools.ietf.org/html/rfc7628]
16
+ # * +OAUTHBEARER+ --- RFC7628[https://tools.ietf.org/html/rfc7628]
17
+ # (OAuthBearerAuthenticator)
18
+ #
19
+ # Classes that include this module must implement +#authzid+.
20
+ module GS2Header
21
+ NO_NULL_CHARS = /\A[^\x00]+\z/u.freeze # :nodoc:
22
+
23
+ ##
24
+ # Matches {RFC5801 §4}[https://www.rfc-editor.org/rfc/rfc5801#section-4]
25
+ # +saslname+. The output from gs2_saslname_encode matches this Regexp.
26
+ RFC5801_SASLNAME = /\A(?:[^,=\x00]|=2C|=3D)+\z/u.freeze
27
+
28
+ # The {RFC5801 §4}[https://www.rfc-editor.org/rfc/rfc5801#section-4]
29
+ # +gs2-header+, which prefixes the #initial_client_response.
30
+ #
31
+ # >>>
32
+ # <em>Note: the actual GS2 header includes an optional flag to
33
+ # indicate that the GSS mechanism is not "standard", but since all of
34
+ # the SASL mechanisms using GS2 are "standard", we don't include that
35
+ # flag. A class for a nonstandard GSSAPI mechanism should prefix with
36
+ # "+F,+".</em>
37
+ def gs2_header
38
+ "#{gs2_cb_flag},#{gs2_authzid},"
39
+ end
40
+
41
+ # The {RFC5801 §4}[https://www.rfc-editor.org/rfc/rfc5801#section-4]
42
+ # +gs2-cb-flag+:
43
+ #
44
+ # "+n+":: The client doesn't support channel binding.
45
+ # "+y+":: The client does support channel binding
46
+ # but thinks the server does not.
47
+ # "+p+":: The client requires channel binding.
48
+ # The selected channel binding follows "+p=+".
49
+ #
50
+ # The default always returns "+n+". A mechanism that supports channel
51
+ # binding must override this method.
52
+ #
53
+ def gs2_cb_flag; "n" end
54
+
55
+ # The {RFC5801 §4}[https://www.rfc-editor.org/rfc/rfc5801#section-4]
56
+ # +gs2-authzid+ header, when +#authzid+ is not empty.
57
+ #
58
+ # If +#authzid+ is empty or +nil+, an empty string is returned.
59
+ def gs2_authzid
60
+ return "" if authzid.nil? || authzid == ""
61
+ "a=#{gs2_saslname_encode(authzid)}"
62
+ end
63
+
64
+ module_function
65
+
66
+ # Encodes +str+ to match RFC5801_SASLNAME.
67
+ def gs2_saslname_encode(str)
68
+ str = str.encode("UTF-8")
69
+ # Regexp#match raises "invalid byte sequence" for invalid UTF-8
70
+ NO_NULL_CHARS.match str or
71
+ raise ArgumentError, "invalid saslname: %p" % [str]
72
+ str
73
+ .gsub(?=, "=3D")
74
+ .gsub(?,, "=2C")
75
+ end
76
+
77
+ end
78
+ end
79
+ end
80
+ end
@@ -17,21 +17,11 @@
17
17
  # compatibility with existing servers. See
18
18
  # {draft-murchison-sasl-login}[https://www.iana.org/go/draft-murchison-sasl-login]
19
19
  # for both specification and deprecation.
20
- class Net::IMAP::LoginAuthenticator
21
- def process(data)
22
- case @state
23
- when STATE_USER
24
- @state = STATE_PASSWORD
25
- return @user
26
- when STATE_PASSWORD
27
- return @password
28
- end
29
- end
30
-
31
- private
32
-
20
+ class Net::IMAP::SASL::LoginAuthenticator
33
21
  STATE_USER = :USER
34
22
  STATE_PASSWORD = :PASSWORD
23
+ STATE_DONE = :DONE
24
+ private_constant :STATE_USER, :STATE_PASSWORD, :STATE_DONE
35
25
 
36
26
  def initialize(user, password, warn_deprecation: true, **_ignored)
37
27
  if warn_deprecation
@@ -42,5 +32,20 @@ class Net::IMAP::LoginAuthenticator
42
32
  @state = STATE_USER
43
33
  end
44
34
 
45
- Net::IMAP.add_authenticator "LOGIN", self
35
+ def initial_response?; false end
36
+
37
+ def process(data)
38
+ case @state
39
+ when STATE_USER
40
+ @state = STATE_PASSWORD
41
+ return @user
42
+ when STATE_PASSWORD
43
+ @state = STATE_DONE
44
+ return @password
45
+ when STATE_DONE
46
+ raise ResponseParseError, data
47
+ end
48
+ end
49
+
50
+ def done?; @state == STATE_DONE end
46
51
  end
@@ -0,0 +1,164 @@
1
+ # frozen_string_literal: true
2
+
3
+ require_relative "gs2_header"
4
+
5
+ module Net
6
+ class IMAP < Protocol
7
+ module SASL
8
+
9
+ # Abstract base class for the SASL mechanisms defined in
10
+ # RFC7628[https://tools.ietf.org/html/rfc7628]:
11
+ # * OAUTHBEARER[rdoc-ref:OAuthBearerAuthenticator]
12
+ # (OAuthBearerAuthenticator)
13
+ # * OAUTH10A
14
+ class OAuthAuthenticator
15
+ include GS2Header
16
+
17
+ # Authorization identity: an identity to act as or on behalf of.
18
+ #
19
+ # If no explicit authorization identity is provided, it is usually
20
+ # derived from the authentication identity. For the OAuth-based
21
+ # mechanisms, the authentication identity is the identity established by
22
+ # the OAuth credential.
23
+ attr_reader :authzid
24
+
25
+ # Hostname to which the client connected.
26
+ attr_reader :host
27
+
28
+ # Service port to which the client connected.
29
+ attr_reader :port
30
+
31
+ # HTTP method. (optional)
32
+ attr_reader :mthd
33
+
34
+ # HTTP path data. (optional)
35
+ attr_reader :path
36
+
37
+ # HTTP post data. (optional)
38
+ attr_reader :post
39
+
40
+ # The query string. (optional)
41
+ attr_reader :qs
42
+
43
+ # Stores the most recent server "challenge". When authentication fails,
44
+ # this may hold information about the failure reason, as JSON.
45
+ attr_reader :last_server_response
46
+
47
+ # Creates an RFC7628[https://tools.ietf.org/html/rfc7628] OAuth
48
+ # authenticator.
49
+ #
50
+ # === Options
51
+ #
52
+ # See child classes for required configuration parameter(s). The
53
+ # following parameters are all optional, but protocols or servers may
54
+ # add requirements for #authzid, #host, #port, or any other parameter.
55
+ #
56
+ # * #authzid ― Identity to act as or on behalf of.
57
+ # * #host — Hostname to which the client connected.
58
+ # * #port — Service port to which the client connected.
59
+ # * #mthd — HTTP method
60
+ # * #path — HTTP path data
61
+ # * #post — HTTP post data
62
+ # * #qs — HTTP query string
63
+ #
64
+ def initialize(authzid: nil, host: nil, port: nil,
65
+ mthd: nil, path: nil, post: nil, qs: nil, **)
66
+ @authzid = authzid
67
+ @host = host
68
+ @port = port
69
+ @mthd = mthd
70
+ @path = path
71
+ @post = post
72
+ @qs = qs
73
+ @done = false
74
+ end
75
+
76
+ # The {RFC7628 §3.1}[https://www.rfc-editor.org/rfc/rfc7628#section-3.1]
77
+ # formatted response.
78
+ def initial_client_response
79
+ kv_pairs = {
80
+ host: host, port: port, mthd: mthd, path: path, post: post, qs: qs,
81
+ auth: authorization, # authorization is implemented by subclasses
82
+ }.compact
83
+ [gs2_header, *kv_pairs.map {|kv| kv.join("=") }, "\1"].join("\1")
84
+ end
85
+
86
+ # Returns initial_client_response the first time, then "<tt>^A</tt>".
87
+ def process(data)
88
+ @last_server_response = data
89
+ done? ? "\1" : initial_client_response
90
+ ensure
91
+ @done = true
92
+ end
93
+
94
+ # Returns true when the initial client response was sent.
95
+ #
96
+ # The authentication should not succeed unless this returns true, but it
97
+ # does *not* indicate success.
98
+ def done?; @done end
99
+
100
+ # Value of the HTTP Authorization header
101
+ #
102
+ # <b>Implemented by subclasses.</b>
103
+ def authorization; raise "must be implemented by subclass" end
104
+
105
+ end
106
+
107
+ # Authenticator for the "+OAUTHBEARER+" SASL mechanism, specified in
108
+ # RFC7628[https://tools.ietf.org/html/rfc7628]. Authenticates using OAuth
109
+ # 2.0 bearer tokens, as described in
110
+ # RFC6750[https://tools.ietf.org/html/rfc6750]. Use via
111
+ # Net::IMAP#authenticate.
112
+ #
113
+ # RFC6750[https://tools.ietf.org/html/rfc6750] requires Transport Layer
114
+ # Security (TLS) to secure the protocol interaction between the client and
115
+ # the resource server. TLS _MUST_ be used for +OAUTHBEARER+ to protect
116
+ # the bearer token.
117
+ class OAuthBearerAuthenticator < OAuthAuthenticator
118
+
119
+ # An OAuth2 bearer token, generally the access token.
120
+ attr_reader :oauth2_token
121
+
122
+ # :call-seq:
123
+ # new(oauth2_token, **options) -> authenticator
124
+ # new(oauth2_token:, **options) -> authenticator
125
+ #
126
+ # Creates an Authenticator for the "+OAUTHBEARER+" SASL mechanism.
127
+ #
128
+ # Called by Net::IMAP#authenticate and similar methods on other clients.
129
+ #
130
+ # === Options
131
+ #
132
+ # Only +oauth2_token+ is required by the mechanism, however protocols
133
+ # and servers may add requirements for #authzid, #host, #port, or any
134
+ # other parameter.
135
+ #
136
+ # * #oauth2_token — An OAuth2 bearer token or access token. *Required.*
137
+ # May be provided as either regular or keyword argument.
138
+ # * #authzid ― Identity to act as or on behalf of.
139
+ # * #host — Hostname to which the client connected.
140
+ # * #port — Service port to which the client connected.
141
+ # * See OAuthAuthenticator documentation for less common parameters.
142
+ #
143
+ def initialize(oauth2_token_arg = nil, oauth2_token: nil, **args, &blk)
144
+ super(**args, &blk) # handles authzid, host, port, etc
145
+ oauth2_token && oauth2_token_arg and
146
+ raise ArgumentError, "conflicting values for oauth2_token"
147
+ @oauth2_token = oauth2_token || oauth2_token_arg or
148
+ raise ArgumentError, "missing oauth2_token"
149
+ end
150
+
151
+ # :call-seq:
152
+ # initial_response? -> true
153
+ #
154
+ # +OAUTHBEARER+ sends an initial client response.
155
+ def initial_response?; true end
156
+
157
+ # Value of the HTTP Authorization header
158
+ def authorization; "Bearer #{oauth2_token}" end
159
+
160
+ end
161
+ end
162
+
163
+ end
164
+ end
@@ -0,0 +1,93 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Authenticator for the "+PLAIN+" SASL mechanism, specified in
4
+ # RFC-4616[https://tools.ietf.org/html/rfc4616]. See Net::IMAP#authenticate.
5
+ #
6
+ # +PLAIN+ authentication sends the password in cleartext.
7
+ # RFC-3501[https://tools.ietf.org/html/rfc3501] encourages servers to disable
8
+ # cleartext authentication until after TLS has been negotiated.
9
+ # RFC-8314[https://tools.ietf.org/html/rfc8314] recommends TLS version 1.2 or
10
+ # greater be used for all traffic, and deprecate cleartext access ASAP. +PLAIN+
11
+ # can be secured by TLS encryption.
12
+ class Net::IMAP::SASL::PlainAuthenticator
13
+
14
+ NULL = -"\0".b
15
+ private_constant :NULL
16
+
17
+ # Authentication identity: the identity that matches the #password.
18
+ #
19
+ # RFC-2831[https://tools.ietf.org/html/rfc2831] uses the term +username+.
20
+ # "Authentication identity" is the generic term used by
21
+ # RFC-4422[https://tools.ietf.org/html/rfc4422].
22
+ # RFC-4616[https://tools.ietf.org/html/rfc4616] and many later RFCs abbreviate
23
+ # this to +authcid+.
24
+ attr_reader :username
25
+
26
+ # A password or passphrase that matches the #username.
27
+ attr_reader :password
28
+
29
+ # Authorization identity: an identity to act as or on behalf of. The identity
30
+ # form is application protocol specific. If not provided or left blank, the
31
+ # server derives an authorization identity from the authentication identity.
32
+ # The server is responsible for verifying the client's credentials and
33
+ # verifying that the identity it associates with the client's authentication
34
+ # identity is allowed to act as (or on behalf of) the authorization identity.
35
+ #
36
+ # For example, an administrator or superuser might take on another role:
37
+ #
38
+ # imap.authenticate "PLAIN", "root", passwd, authzid: "user"
39
+ #
40
+ attr_reader :authzid
41
+
42
+ # :call-seq:
43
+ # new(username, password, authzid: nil, **) -> authenticator
44
+ # new(username:, password:, authzid: nil, **) -> authenticator
45
+ #
46
+ # Creates an Authenticator for the "+PLAIN+" SASL mechanism.
47
+ #
48
+ # Called by Net::IMAP#authenticate and similar methods on other clients.
49
+ #
50
+ # === Parameters
51
+ #
52
+ # * #username ― Identity whose +password+ is used.
53
+ # * #password ― Password or passphrase associated with this username+.
54
+ # * #authzid ― Alternate identity to act as or on behalf of. Optional.
55
+ #
56
+ # See attribute documentation for more details.
57
+ def initialize(user = nil, pass = nil,
58
+ username: nil, password: nil, authzid: nil, **)
59
+ [username, user].compact.count == 1 or
60
+ raise ArgumentError, "conflicting values for username"
61
+ [password, pass].compact.count == 1 or
62
+ raise ArgumentError, "conflicting values for password"
63
+ username ||= user or raise ArgumentError, "missing username"
64
+ password ||= pass or raise ArgumentError, "missing password"
65
+ raise ArgumentError, "username contains NULL" if username.include?(NULL)
66
+ raise ArgumentError, "password contains NULL" if password.include?(NULL)
67
+ raise ArgumentError, "authzid contains NULL" if authzid&.include?(NULL)
68
+ @username = username
69
+ @password = password
70
+ @authzid = authzid
71
+ @done = false
72
+ end
73
+
74
+ # :call-seq:
75
+ # initial_response? -> true
76
+ #
77
+ # +PLAIN+ can send an initial client response.
78
+ def initial_response?; true end
79
+
80
+ # Responds with the client's credentials.
81
+ def process(data)
82
+ return "#@authzid\0#@username\0#@password"
83
+ ensure
84
+ @done = true
85
+ end
86
+
87
+ # Returns true when the initial client response was sent.
88
+ #
89
+ # The authentication should not succeed unless this returns true, but it
90
+ # does *not* indicate success.
91
+ def done?; @done end
92
+
93
+ end
@@ -0,0 +1,45 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Net
4
+ class IMAP
5
+ module SASL
6
+
7
+ module ProtocolAdapters
8
+ # This API is experimental, and may change.
9
+ module Generic
10
+ def command_name; "AUTHENTICATE" end
11
+ def service; raise "Implement in subclass or module" end
12
+ def host; client.host end
13
+ def port; client.port end
14
+ def encode_ir(string) string.empty? ? "=" : encode(string) end
15
+ def encode(string) [string].pack("m0") end
16
+ def decode(string) string.unpack1("m0") end
17
+ def cancel_response; "*" end
18
+ end
19
+
20
+ # See RFC-3501 (IMAP4rev1), RFC-4959 (SASL-IR capability),
21
+ # and RFC-9051 (IMAP4rev2).
22
+ module IMAP
23
+ include Generic
24
+ def service; "imap" end
25
+ end
26
+
27
+ # See RFC-4954 (AUTH capability).
28
+ module SMTP
29
+ include Generic
30
+ def command_name; "AUTH" end
31
+ def service; "smtp" end
32
+ end
33
+
34
+ # See RFC-5034 (SASL capability).
35
+ module POP
36
+ include Generic
37
+ def command_name; "AUTH" end
38
+ def service; "pop" end
39
+ end
40
+
41
+ end
42
+
43
+ end
44
+ end
45
+ end
@@ -0,0 +1,58 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Net
4
+ class IMAP
5
+ module SASL
6
+
7
+ # For method descriptions,
8
+ # see {RFC5802 §2.2}[https://www.rfc-editor.org/rfc/rfc5802#section-2.2]
9
+ # and {RFC5802 §3}[https://www.rfc-editor.org/rfc/rfc5802#section-3].
10
+ module ScramAlgorithm
11
+ def Normalize(str) SASL.saslprep(str) end
12
+
13
+ def Hi(str, salt, iterations)
14
+ length = digest.digest_length
15
+ OpenSSL::KDF.pbkdf2_hmac(
16
+ str,
17
+ salt: salt,
18
+ iterations: iterations,
19
+ length: length,
20
+ hash: digest,
21
+ )
22
+ end
23
+
24
+ def H(str) digest.digest str end
25
+
26
+ def HMAC(key, data) OpenSSL::HMAC.digest(digest, key, data) end
27
+
28
+ def XOR(str1, str2)
29
+ str1.unpack("C*")
30
+ .zip(str2.unpack("C*"))
31
+ .map {|a, b| a ^ b }
32
+ .pack("C*")
33
+ end
34
+
35
+ def auth_message
36
+ [
37
+ client_first_message_bare,
38
+ server_first_message,
39
+ client_final_message_without_proof,
40
+ ]
41
+ .join(",")
42
+ end
43
+
44
+ def salted_password
45
+ Hi(Normalize(password), salt, iterations)
46
+ end
47
+
48
+ def client_key; HMAC(salted_password, "Client Key") end
49
+ def server_key; HMAC(salted_password, "Server Key") end
50
+ def stored_key; H(client_key) end
51
+ def client_signature; HMAC(stored_key, auth_message) end
52
+ def server_signature; HMAC(server_key, auth_message) end
53
+ def client_proof; XOR(client_key, client_signature) end
54
+ end
55
+
56
+ end
57
+ end
58
+ end