net-imap 0.3.4 → 0.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of net-imap might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/.github/workflows/pages.yml +46 -0
- data/.github/workflows/test.yml +12 -12
- data/Gemfile +1 -0
- data/README.md +15 -4
- data/Rakefile +0 -7
- data/benchmarks/generate_parser_benchmarks +52 -0
- data/benchmarks/parser.yml +578 -0
- data/benchmarks/stringprep.yml +1 -1
- data/lib/net/imap/authenticators.rb +26 -57
- data/lib/net/imap/command_data.rb +13 -6
- data/lib/net/imap/data_encoding.rb +3 -3
- data/lib/net/imap/deprecated_client_options.rb +139 -0
- data/lib/net/imap/response_data.rb +46 -41
- data/lib/net/imap/response_parser/parser_utils.rb +230 -0
- data/lib/net/imap/response_parser.rb +665 -627
- data/lib/net/imap/sasl/anonymous_authenticator.rb +68 -0
- data/lib/net/imap/sasl/authentication_exchange.rb +107 -0
- data/lib/net/imap/sasl/authenticators.rb +118 -0
- data/lib/net/imap/sasl/client_adapter.rb +72 -0
- data/lib/net/imap/{authenticators/cram_md5.rb → sasl/cram_md5_authenticator.rb} +15 -9
- data/lib/net/imap/sasl/digest_md5_authenticator.rb +168 -0
- data/lib/net/imap/sasl/external_authenticator.rb +62 -0
- data/lib/net/imap/sasl/gs2_header.rb +80 -0
- data/lib/net/imap/{authenticators/login.rb → sasl/login_authenticator.rb} +19 -14
- data/lib/net/imap/sasl/oauthbearer_authenticator.rb +164 -0
- data/lib/net/imap/sasl/plain_authenticator.rb +93 -0
- data/lib/net/imap/sasl/protocol_adapters.rb +45 -0
- data/lib/net/imap/sasl/scram_algorithm.rb +58 -0
- data/lib/net/imap/sasl/scram_authenticator.rb +278 -0
- data/lib/net/imap/sasl/stringprep.rb +6 -66
- data/lib/net/imap/sasl/xoauth2_authenticator.rb +88 -0
- data/lib/net/imap/sasl.rb +144 -43
- data/lib/net/imap/sasl_adapter.rb +21 -0
- data/lib/net/imap/stringprep/nameprep.rb +70 -0
- data/lib/net/imap/stringprep/saslprep.rb +69 -0
- data/lib/net/imap/stringprep/saslprep_tables.rb +96 -0
- data/lib/net/imap/stringprep/tables.rb +146 -0
- data/lib/net/imap/stringprep/trace.rb +85 -0
- data/lib/net/imap/stringprep.rb +159 -0
- data/lib/net/imap.rb +976 -590
- data/net-imap.gemspec +2 -2
- data/rakelib/saslprep.rake +4 -4
- data/rakelib/string_prep_tables_generator.rb +82 -60
- metadata +31 -12
- data/lib/net/imap/authenticators/digest_md5.rb +0 -115
- data/lib/net/imap/authenticators/plain.rb +0 -41
- data/lib/net/imap/authenticators/xoauth2.rb +0 -20
- data/lib/net/imap/sasl/saslprep.rb +0 -55
- data/lib/net/imap/sasl/saslprep_tables.rb +0 -98
- data/lib/net/imap/sasl/stringprep_tables.rb +0 -153
@@ -0,0 +1,278 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "openssl"
|
4
|
+
require "securerandom"
|
5
|
+
|
6
|
+
require_relative "gs2_header"
|
7
|
+
require_relative "scram_algorithm"
|
8
|
+
|
9
|
+
module Net
|
10
|
+
class IMAP
|
11
|
+
module SASL
|
12
|
+
|
13
|
+
# Abstract base class for the "+SCRAM-*+" family of SASL mechanisms,
|
14
|
+
# defined in RFC5802[https://tools.ietf.org/html/rfc5802]. Use via
|
15
|
+
# Net::IMAP#authenticate.
|
16
|
+
#
|
17
|
+
# Directly supported:
|
18
|
+
# * +SCRAM-SHA-1+ --- ScramSHA1Authenticator
|
19
|
+
# * +SCRAM-SHA-256+ --- ScramSHA256Authenticator
|
20
|
+
#
|
21
|
+
# New +SCRAM-*+ mechanisms can easily be added for any hash algorithm
|
22
|
+
# supported by
|
23
|
+
# OpenSSL::Digest[https://ruby.github.io/openssl/OpenSSL/Digest.html].
|
24
|
+
# Subclasses need only set an appropriate +DIGEST_NAME+ constant.
|
25
|
+
#
|
26
|
+
# === SCRAM algorithm
|
27
|
+
#
|
28
|
+
# See the documentation and method definitions on ScramAlgorithm for an
|
29
|
+
# overview of the algorithm. The different mechanisms differ only by
|
30
|
+
# which hash function that is used (or by support for channel binding with
|
31
|
+
# +-PLUS+).
|
32
|
+
#
|
33
|
+
# See also the methods on GS2Header.
|
34
|
+
#
|
35
|
+
# ==== Server messages
|
36
|
+
#
|
37
|
+
# As server messages are received, they are validated and loaded into
|
38
|
+
# the various attributes, e.g: #snonce, #salt, #iterations, #verifier,
|
39
|
+
# #server_error, etc.
|
40
|
+
#
|
41
|
+
# Unlike many other SASL mechanisms, the +SCRAM-*+ family supports mutual
|
42
|
+
# authentication and can return server error data in the server messages.
|
43
|
+
# If #process raises an Error for the server-final-message, then
|
44
|
+
# server_error may contain error details.
|
45
|
+
#
|
46
|
+
# === TLS Channel binding
|
47
|
+
#
|
48
|
+
# <em>The <tt>SCRAM-*-PLUS</tt> mechanisms and channel binding are not
|
49
|
+
# supported yet.</em>
|
50
|
+
#
|
51
|
+
# === Caching SCRAM secrets
|
52
|
+
#
|
53
|
+
# <em>Caching of salted_password, client_key, stored_key, and server_key
|
54
|
+
# is not supported yet.</em>
|
55
|
+
#
|
56
|
+
class ScramAuthenticator
|
57
|
+
include GS2Header
|
58
|
+
include ScramAlgorithm
|
59
|
+
|
60
|
+
# :call-seq:
|
61
|
+
# new(username, password, **options) -> auth_ctx
|
62
|
+
# new(username:, password:, **options) -> auth_ctx
|
63
|
+
#
|
64
|
+
# Creates an authenticator for one of the "+SCRAM-*+" SASL mechanisms.
|
65
|
+
# Each subclass defines #digest to match a specific mechanism.
|
66
|
+
#
|
67
|
+
# Called by Net::IMAP#authenticate and similar methods on other clients.
|
68
|
+
#
|
69
|
+
# === Parameters
|
70
|
+
#
|
71
|
+
# * #username ― Identity whose #password is used. Aliased as #authcid.
|
72
|
+
# * #password ― Password or passphrase associated with this #username.
|
73
|
+
# * #authzid ― Alternate identity to act as or on behalf of. Optional.
|
74
|
+
# * #min_iterations - Overrides the default value (4096). Optional.
|
75
|
+
#
|
76
|
+
# See the documentation on the corresponding attributes for more.
|
77
|
+
def initialize(username_arg = nil, password_arg = nil,
|
78
|
+
username: nil, password: nil, authcid: nil, authzid: nil,
|
79
|
+
min_iterations: 4096, # see both RFC5802 and RFC7677
|
80
|
+
cnonce: nil, # must only be set in tests
|
81
|
+
**options)
|
82
|
+
@username = username || username_arg || authcid or
|
83
|
+
raise ArgumentError, "missing username (authcid)"
|
84
|
+
[username, username_arg, authcid].compact.count == 1 or
|
85
|
+
raise ArgumentError, "conflicting values for username (authcid)"
|
86
|
+
@password = password || password_arg or
|
87
|
+
raise ArgumentError, "missing password"
|
88
|
+
[password, password_arg].compact.count == 1 or
|
89
|
+
raise ArgumentError, "conflicting values for password"
|
90
|
+
@authzid = authzid
|
91
|
+
|
92
|
+
@min_iterations = Integer min_iterations
|
93
|
+
@min_iterations.positive? or
|
94
|
+
raise ArgumentError, "min_iterations must be positive"
|
95
|
+
@cnonce = cnonce || SecureRandom.base64(32)
|
96
|
+
end
|
97
|
+
|
98
|
+
# Authentication identity: the identity that matches the #password.
|
99
|
+
attr_reader :username
|
100
|
+
alias authcid username
|
101
|
+
|
102
|
+
# A password or passphrase that matches the #username.
|
103
|
+
attr_reader :password
|
104
|
+
|
105
|
+
# Authorization identity: an identity to act as or on behalf of. The
|
106
|
+
# identity form is application protocol specific. If not provided or
|
107
|
+
# left blank, the server derives an authorization identity from the
|
108
|
+
# authentication identity. For example, an administrator or superuser
|
109
|
+
# might take on another role:
|
110
|
+
#
|
111
|
+
# imap.authenticate "SCRAM-SHA-256", "root", passwd, authzid: "user"
|
112
|
+
#
|
113
|
+
# The server is responsible for verifying the client's credentials and
|
114
|
+
# verifying that the identity it associates with the client's
|
115
|
+
# authentication identity is allowed to act as (or on behalf of) the
|
116
|
+
# authorization identity.
|
117
|
+
attr_reader :authzid
|
118
|
+
|
119
|
+
# The minimal allowed iteration count. Lower #iterations will raise an
|
120
|
+
# Error.
|
121
|
+
attr_reader :min_iterations
|
122
|
+
|
123
|
+
# The client nonce, generated by SecureRandom
|
124
|
+
attr_reader :cnonce
|
125
|
+
|
126
|
+
# The server nonce, which must start with #cnonce
|
127
|
+
attr_reader :snonce
|
128
|
+
|
129
|
+
# The salt used by the server for this user
|
130
|
+
attr_reader :salt
|
131
|
+
|
132
|
+
# The iteration count for the selected hash function and user
|
133
|
+
attr_reader :iterations
|
134
|
+
|
135
|
+
# An error reported by the server during the \SASL exchange.
|
136
|
+
#
|
137
|
+
# Does not include errors reported by the protocol, e.g.
|
138
|
+
# Net::IMAP::NoResponseError.
|
139
|
+
attr_reader :server_error
|
140
|
+
|
141
|
+
# Returns a new OpenSSL::Digest object, set to the appropriate hash
|
142
|
+
# function for the chosen mechanism.
|
143
|
+
#
|
144
|
+
# <em>The class's +DIGEST_NAME+ constant must be set to the name of an
|
145
|
+
# algorithm supported by OpenSSL::Digest.</em>
|
146
|
+
def digest; OpenSSL::Digest.new self.class::DIGEST_NAME end
|
147
|
+
|
148
|
+
# See {RFC5802 §7}[https://www.rfc-editor.org/rfc/rfc5802#section-7]
|
149
|
+
# +client-first-message+.
|
150
|
+
def initial_client_response
|
151
|
+
"#{gs2_header}#{client_first_message_bare}"
|
152
|
+
end
|
153
|
+
|
154
|
+
# responds to the server's challenges
|
155
|
+
def process(challenge)
|
156
|
+
case (@state ||= :initial_client_response)
|
157
|
+
when :initial_client_response
|
158
|
+
initial_client_response.tap { @state = :server_first_message }
|
159
|
+
when :server_first_message
|
160
|
+
recv_server_first_message challenge
|
161
|
+
final_message_with_proof.tap { @state = :server_final_message }
|
162
|
+
when :server_final_message
|
163
|
+
recv_server_final_message challenge
|
164
|
+
"".tap { @state = :done }
|
165
|
+
else
|
166
|
+
raise Error, "server sent after complete, %p" % [challenge]
|
167
|
+
end
|
168
|
+
rescue Exception => ex
|
169
|
+
@state = ex
|
170
|
+
raise
|
171
|
+
end
|
172
|
+
|
173
|
+
# Is the authentication exchange complete?
|
174
|
+
#
|
175
|
+
# If false, another server continuation is required.
|
176
|
+
def done?; @state == :done end
|
177
|
+
|
178
|
+
private
|
179
|
+
|
180
|
+
# Need to store this for auth_message
|
181
|
+
attr_reader :server_first_message
|
182
|
+
|
183
|
+
def format_message(hash) hash.map { _1.join("=") }.join(",") end
|
184
|
+
|
185
|
+
def recv_server_first_message(server_first_message)
|
186
|
+
@server_first_message = server_first_message
|
187
|
+
sparams = parse_challenge server_first_message
|
188
|
+
@snonce = sparams["r"] or
|
189
|
+
raise Error, "server did not send nonce"
|
190
|
+
@salt = sparams["s"]&.unpack1("m") or
|
191
|
+
raise Error, "server did not send salt"
|
192
|
+
@iterations = sparams["i"]&.then {|i| Integer i } or
|
193
|
+
raise Error, "server did not send iteration count"
|
194
|
+
min_iterations <= iterations or
|
195
|
+
raise Error, "too few iterations: %d" % [iterations]
|
196
|
+
mext = sparams["m"] and
|
197
|
+
raise Error, "mandatory extension: %p" % [mext]
|
198
|
+
snonce.start_with? cnonce or
|
199
|
+
raise Error, "invalid server nonce"
|
200
|
+
end
|
201
|
+
|
202
|
+
def recv_server_final_message(server_final_message)
|
203
|
+
sparams = parse_challenge server_final_message
|
204
|
+
@server_error = sparams["e"] and
|
205
|
+
raise Error, "server error: %s" % [server_error]
|
206
|
+
verifier = sparams["v"].unpack1("m") or
|
207
|
+
raise Error, "server did not send verifier"
|
208
|
+
verifier == server_signature or
|
209
|
+
raise Error, "server verify failed: %p != %p" % [
|
210
|
+
server_signature, verifier
|
211
|
+
]
|
212
|
+
end
|
213
|
+
|
214
|
+
# See {RFC5802 §7}[https://www.rfc-editor.org/rfc/rfc5802#section-7]
|
215
|
+
# +client-first-message-bare+.
|
216
|
+
def client_first_message_bare
|
217
|
+
@client_first_message_bare ||=
|
218
|
+
format_message(n: gs2_saslname_encode(SASL.saslprep(username)),
|
219
|
+
r: cnonce)
|
220
|
+
end
|
221
|
+
|
222
|
+
# See {RFC5802 §7}[https://www.rfc-editor.org/rfc/rfc5802#section-7]
|
223
|
+
# +client-final-message+.
|
224
|
+
def final_message_with_proof
|
225
|
+
proof = [client_proof].pack("m0")
|
226
|
+
"#{client_final_message_without_proof},p=#{proof}"
|
227
|
+
end
|
228
|
+
|
229
|
+
# See {RFC5802 §7}[https://www.rfc-editor.org/rfc/rfc5802#section-7]
|
230
|
+
# +client-final-message-without-proof+.
|
231
|
+
def client_final_message_without_proof
|
232
|
+
@client_final_message_without_proof ||=
|
233
|
+
format_message(c: [cbind_input].pack("m0"), # channel-binding
|
234
|
+
r: snonce) # nonce
|
235
|
+
end
|
236
|
+
|
237
|
+
# See {RFC5802 §7}[https://www.rfc-editor.org/rfc/rfc5802#section-7]
|
238
|
+
# +cbind-input+.
|
239
|
+
#
|
240
|
+
# >>>
|
241
|
+
# *TODO:* implement channel binding, appending +cbind-data+ here.
|
242
|
+
alias cbind_input gs2_header
|
243
|
+
|
244
|
+
# RFC5802 specifies "that the order of attributes in client or server
|
245
|
+
# messages is fixed, with the exception of extension attributes", but
|
246
|
+
# this parses it simply as a hash, without respect to order. Note that
|
247
|
+
# repeated keys (violating the spec) will use the last value.
|
248
|
+
def parse_challenge(challenge)
|
249
|
+
challenge.split(/,/).to_h {|pair| pair.split(/=/, 2) }
|
250
|
+
rescue ArgumentError
|
251
|
+
raise Error, "unparsable challenge: %p" % [challenge]
|
252
|
+
end
|
253
|
+
|
254
|
+
end
|
255
|
+
|
256
|
+
# Authenticator for the "+SCRAM-SHA-1+" SASL mechanism, defined in
|
257
|
+
# RFC5802[https://tools.ietf.org/html/rfc5802].
|
258
|
+
#
|
259
|
+
# Uses the "SHA-1" digest algorithm from OpenSSL::Digest.
|
260
|
+
#
|
261
|
+
# See ScramAuthenticator.
|
262
|
+
class ScramSHA1Authenticator < ScramAuthenticator
|
263
|
+
DIGEST_NAME = "SHA1"
|
264
|
+
end
|
265
|
+
|
266
|
+
# Authenticator for the "+SCRAM-SHA-256+" SASL mechanism, defined in
|
267
|
+
# RFC7677[https://tools.ietf.org/html/rfc7677].
|
268
|
+
#
|
269
|
+
# Uses the "SHA-256" digest algorithm from OpenSSL::Digest.
|
270
|
+
#
|
271
|
+
# See ScramAuthenticator.
|
272
|
+
class ScramSHA256Authenticator < ScramAuthenticator
|
273
|
+
DIGEST_NAME = "SHA256"
|
274
|
+
end
|
275
|
+
|
276
|
+
end
|
277
|
+
end
|
278
|
+
end
|
@@ -1,72 +1,12 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
-
require_relative "stringprep_tables"
|
4
|
-
|
5
3
|
module Net::IMAP::SASL
|
6
4
|
|
7
|
-
#
|
8
|
-
|
9
|
-
#
|
10
|
-
#
|
11
|
-
|
12
|
-
|
13
|
-
# TODO: generic StringPrep mapping (not needed for SASLprep implementation)
|
14
|
-
#++
|
15
|
-
module StringPrep
|
16
|
-
|
17
|
-
# Returns a Regexp matching the given +table+ name.
|
18
|
-
def self.[](table)
|
19
|
-
TABLE_REGEXPS.fetch(table)
|
20
|
-
end
|
21
|
-
|
22
|
-
module_function
|
23
|
-
|
24
|
-
# Checks +string+ for any codepoint in +tables+. Raises a
|
25
|
-
# ProhibitedCodepoint describing the first matching table.
|
26
|
-
#
|
27
|
-
# Also checks bidirectional characters, when <tt>bidi: true</tt>, which may
|
28
|
-
# raise a BidiStringError.
|
29
|
-
#
|
30
|
-
# +profile+ is an optional string which will be added to any exception that
|
31
|
-
# is raised (it does not affect behavior).
|
32
|
-
def check_prohibited!(string, *tables, bidi: false, profile: nil)
|
33
|
-
tables = TABLE_TITLES.keys.grep(/^C/) if tables.empty?
|
34
|
-
tables |= %w[C.8] if bidi
|
35
|
-
table = tables.find {|t| TABLE_REGEXPS[t].match?(string) }
|
36
|
-
raise ProhibitedCodepoint.new(
|
37
|
-
table, string: string, profile: nil
|
38
|
-
) if table
|
39
|
-
check_bidi!(string, profile: profile) if bidi
|
40
|
-
end
|
41
|
-
|
42
|
-
# Checks that +string+ obeys all of the "Bidirectional Characters"
|
43
|
-
# requirements in RFC-3454, §6:
|
44
|
-
#
|
45
|
-
# * The characters in \StringPrep\[\"C.8\"] MUST be prohibited
|
46
|
-
# * If a string contains any RandALCat character, the string MUST NOT
|
47
|
-
# contain any LCat character.
|
48
|
-
# * If a string contains any RandALCat character, a RandALCat
|
49
|
-
# character MUST be the first character of the string, and a
|
50
|
-
# RandALCat character MUST be the last character of the string.
|
51
|
-
#
|
52
|
-
# This is usually combined with #check_prohibited!, so table "C.8" is only
|
53
|
-
# checked when <tt>c_8: true</tt>.
|
54
|
-
#
|
55
|
-
# Raises either ProhibitedCodepoint or BidiStringError unless all
|
56
|
-
# requirements are met. +profile+ is an optional string which will be
|
57
|
-
# added to any exception that is raised (it does not affect behavior).
|
58
|
-
def check_bidi!(string, c_8: false, profile: nil)
|
59
|
-
check_prohibited!(string, "C.8", profile: profile) if c_8
|
60
|
-
if BIDI_FAILS_REQ2.match?(string)
|
61
|
-
raise BidiStringError.new(
|
62
|
-
BIDI_DESC_REQ2, string: string, profile: profile,
|
63
|
-
)
|
64
|
-
elsif BIDI_FAILS_REQ3.match?(string)
|
65
|
-
raise BidiStringError.new(
|
66
|
-
BIDI_DESC_REQ3, string: string, profile: profile,
|
67
|
-
)
|
68
|
-
end
|
69
|
-
end
|
5
|
+
# Alias for Net::IMAP::StringPrep::SASLprep.
|
6
|
+
SASLprep = Net::IMAP::StringPrep::SASLprep
|
7
|
+
StringPrep = Net::IMAP::StringPrep # :nodoc:
|
8
|
+
BidiStringError = Net::IMAP::StringPrep::BidiStringError # :nodoc:
|
9
|
+
ProhibitedCodepoint = Net::IMAP::StringPrep::ProhibitedCodepoint # :nodoc:
|
10
|
+
StringPrepError = Net::IMAP::StringPrep::StringPrepError # :nodoc:
|
70
11
|
|
71
|
-
end
|
72
12
|
end
|
@@ -0,0 +1,88 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Authenticator for the "+XOAUTH2+" SASL mechanism. This mechanism was
|
4
|
+
# originally created for GMail and widely adopted by hosted email providers.
|
5
|
+
# +XOAUTH2+ has been documented by
|
6
|
+
# Google[https://developers.google.com/gmail/imap/xoauth2-protocol] and
|
7
|
+
# Microsoft[https://learn.microsoft.com/en-us/exchange/client-developer/legacy-protocols/how-to-authenticate-an-imap-pop-smtp-application-by-using-oauth].
|
8
|
+
#
|
9
|
+
# This mechanism requires an OAuth2 +access_token+ which has been authorized
|
10
|
+
# with the appropriate OAuth2 scopes to access IMAP. These scopes are not
|
11
|
+
# standardized---consult each email service provider's documentation.
|
12
|
+
#
|
13
|
+
# Although this mechanism was never standardized and has been obsoleted by
|
14
|
+
# "+OAUTHBEARER+", it is still very widely supported.
|
15
|
+
#
|
16
|
+
# See Net::IMAP::SASL:: OAuthBearerAuthenticator.
|
17
|
+
class Net::IMAP::SASL::XOAuth2Authenticator
|
18
|
+
|
19
|
+
# It is unclear from {Google's original XOAUTH2
|
20
|
+
# documentation}[https://developers.google.com/gmail/imap/xoauth2-protocol],
|
21
|
+
# whether "User" refers to the authentication identity (+authcid+) or the
|
22
|
+
# authorization identity (+authzid+). It appears to behave as +authzid+.
|
23
|
+
#
|
24
|
+
# {Microsoft's documentation for shared
|
25
|
+
# mailboxes}[https://learn.microsoft.com/en-us/exchange/client-developer/legacy-protocols/how-to-authenticate-an-imap-pop-smtp-application-by-using-oauth#sasl-xoauth2-authentication-for-shared-mailboxes-in-office-365]
|
26
|
+
# clearly indicate that the Office 365 server interprets it as the
|
27
|
+
# authorization identity.
|
28
|
+
attr_reader :username
|
29
|
+
|
30
|
+
# An OAuth2 access token which has been authorized with the appropriate OAuth2
|
31
|
+
# scopes to use the service for #username.
|
32
|
+
attr_reader :oauth2_token
|
33
|
+
|
34
|
+
# :call-seq:
|
35
|
+
# new(username, oauth2_token, **) -> authenticator
|
36
|
+
# new(username:, oauth2_token:, **) -> authenticator
|
37
|
+
#
|
38
|
+
# Creates an Authenticator for the "+XOAUTH2+" SASL mechanism, as specified by
|
39
|
+
# Google[https://developers.google.com/gmail/imap/xoauth2-protocol],
|
40
|
+
# Microsoft[https://learn.microsoft.com/en-us/exchange/client-developer/legacy-protocols/how-to-authenticate-an-imap-pop-smtp-application-by-using-oauth]
|
41
|
+
# and Yahoo[https://senders.yahooinc.com/developer/documentation].
|
42
|
+
#
|
43
|
+
# === Properties
|
44
|
+
#
|
45
|
+
# * #username --- the username for the account being accessed.
|
46
|
+
# * #oauth2_token --- An OAuth2.0 access token which is authorized to access
|
47
|
+
# the service for #username.
|
48
|
+
#
|
49
|
+
# See the documentation for each attribute for more details.
|
50
|
+
def initialize(user = nil, token = nil, username: nil, oauth2_token: nil, **)
|
51
|
+
@username = username || user or
|
52
|
+
raise ArgumentError, "missing username"
|
53
|
+
@oauth2_token = oauth2_token || token or
|
54
|
+
raise ArgumentError, "missing oauth2_token"
|
55
|
+
[username, user].compact.count == 1 or
|
56
|
+
raise ArgumentError, "conflicting values for username"
|
57
|
+
[oauth2_token, token].compact.count == 1 or
|
58
|
+
raise ArgumentError, "conflicting values for oauth2_token"
|
59
|
+
@done = false
|
60
|
+
end
|
61
|
+
|
62
|
+
# :call-seq:
|
63
|
+
# initial_response? -> true
|
64
|
+
#
|
65
|
+
# +PLAIN+ can send an initial client response.
|
66
|
+
def initial_response?; true end
|
67
|
+
|
68
|
+
# Returns the XOAUTH2 formatted response, which combines the +username+
|
69
|
+
# with the +oauth2_token+.
|
70
|
+
def process(_data)
|
71
|
+
build_oauth2_string(@username, @oauth2_token)
|
72
|
+
ensure
|
73
|
+
@done = true
|
74
|
+
end
|
75
|
+
|
76
|
+
# Returns true when the initial client response was sent.
|
77
|
+
#
|
78
|
+
# The authentication should not succeed unless this returns true, but it
|
79
|
+
# does *not* indicate success.
|
80
|
+
def done?; @done end
|
81
|
+
|
82
|
+
private
|
83
|
+
|
84
|
+
def build_oauth2_string(username, oauth2_token)
|
85
|
+
format("user=%s\1auth=Bearer %s\1\1", username, oauth2_token)
|
86
|
+
end
|
87
|
+
|
88
|
+
end
|
data/lib/net/imap/sasl.rb
CHANGED
@@ -6,12 +6,11 @@ module Net
|
|
6
6
|
# Pluggable authentication mechanisms for protocols which support SASL
|
7
7
|
# (Simple Authentication and Security Layer), such as IMAP4, SMTP, LDAP, and
|
8
8
|
# XMPP. {RFC-4422}[https://tools.ietf.org/html/rfc4422] specifies the
|
9
|
-
# common SASL framework
|
10
|
-
#
|
11
|
-
#
|
12
|
-
#
|
13
|
-
#
|
14
|
-
# between protocols and mechanisms as illustrated in the following diagram."
|
9
|
+
# common \SASL framework:
|
10
|
+
# >>>
|
11
|
+
# SASL is conceptually a framework that provides an abstraction layer
|
12
|
+
# between protocols and mechanisms as illustrated in the following
|
13
|
+
# diagram.
|
15
14
|
#
|
16
15
|
# SMTP LDAP XMPP Other protocols ...
|
17
16
|
# \ | | /
|
@@ -21,58 +20,160 @@ module Net
|
|
21
20
|
# / | | \
|
22
21
|
# EXTERNAL GSSAPI PLAIN Other mechanisms ...
|
23
22
|
#
|
23
|
+
# Net::IMAP uses SASL via the Net::IMAP#authenticate method.
|
24
|
+
#
|
25
|
+
# == Mechanisms
|
26
|
+
#
|
27
|
+
# Each mechanism has different properties and requirements. Please consult
|
28
|
+
# the documentation for the specific mechanisms you are using:
|
29
|
+
#
|
30
|
+
# +ANONYMOUS+::
|
31
|
+
# See AnonymousAuthenticator.
|
32
|
+
#
|
33
|
+
# Allows the user to gain access to public services or resources without
|
34
|
+
# authenticating or disclosing an identity.
|
35
|
+
#
|
36
|
+
# +EXTERNAL+::
|
37
|
+
# See ExternalAuthenticator.
|
38
|
+
#
|
39
|
+
# Authenticates using already established credentials, such as a TLS
|
40
|
+
# certificate or IPsec.
|
41
|
+
#
|
42
|
+
# +OAUTHBEARER+::
|
43
|
+
# See OAuthBearerAuthenticator.
|
44
|
+
#
|
45
|
+
# Login using an OAuth2 Bearer token. This is the standard mechanism
|
46
|
+
# for using OAuth2 with \SASL, but it is not yet deployed as widely as
|
47
|
+
# +XOAUTH2+.
|
48
|
+
#
|
49
|
+
# +PLAIN+::
|
50
|
+
# See PlainAuthenticator.
|
51
|
+
#
|
52
|
+
# Login using clear-text username and password.
|
53
|
+
#
|
54
|
+
# +SCRAM-SHA-1+::
|
55
|
+
# +SCRAM-SHA-256+::
|
56
|
+
# See ScramAuthenticator.
|
57
|
+
#
|
58
|
+
# Login by username and password. The password is not sent to the
|
59
|
+
# server but is used in a salted challenge/response exchange.
|
60
|
+
# +SCRAM-SHA-1+ and +SCRAM-SHA-256+ are directly supported by
|
61
|
+
# Net::IMAP::SASL. New authenticators can easily be added for any other
|
62
|
+
# <tt>SCRAM-*</tt> mechanism if the digest algorithm is supported by
|
63
|
+
# OpenSSL::Digest.
|
64
|
+
#
|
65
|
+
# +XOAUTH2+::
|
66
|
+
# See XOAuth2Authenticator.
|
67
|
+
#
|
68
|
+
# Login using a username and an OAuth2 access token. Non-standard and
|
69
|
+
# obsoleted by +OAUTHBEARER+, but widely supported.
|
70
|
+
#
|
71
|
+
# See the {SASL mechanism
|
72
|
+
# registry}[https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml]
|
73
|
+
# for a list of all SASL mechanisms and their specifications. To register
|
74
|
+
# new authenticators, see Authenticators.
|
75
|
+
#
|
76
|
+
# === Deprecated mechanisms
|
77
|
+
#
|
78
|
+
# <em>Obsolete mechanisms should be avoided, but are still available for
|
79
|
+
# backwards compatibility.</em>
|
80
|
+
#
|
81
|
+
# >>>
|
82
|
+
# For +DIGEST-MD5+ see DigestMD5Authenticator.
|
83
|
+
#
|
84
|
+
# For +LOGIN+, see LoginAuthenticator.
|
85
|
+
#
|
86
|
+
# For +CRAM-MD5+, see CramMD5Authenticator.
|
87
|
+
#
|
88
|
+
# <em>Using a deprecated mechanism will print a warning.</em>
|
89
|
+
#
|
24
90
|
module SASL
|
91
|
+
# Exception class for any client error detected during the authentication
|
92
|
+
# exchange.
|
93
|
+
#
|
94
|
+
# When the _server_ reports an authentication failure, it will respond
|
95
|
+
# with a protocol specific error instead, e.g: +BAD+ or +NO+ in IMAP.
|
96
|
+
#
|
97
|
+
# When the client encounters any error, it *must* consider the
|
98
|
+
# authentication exchange to be unsuccessful and it might need to drop the
|
99
|
+
# connection. For example, if the server reports that the authentication
|
100
|
+
# exchange was successful or the protocol does not allow additional
|
101
|
+
# authentication attempts.
|
102
|
+
Error = Class.new(StandardError)
|
25
103
|
|
26
|
-
#
|
104
|
+
# Indicates an authentication exchange that will be or has been canceled
|
105
|
+
# by the client, not due to any error or failure during processing.
|
106
|
+
AuthenticationCanceled = Class.new(Error)
|
27
107
|
|
28
|
-
|
29
|
-
|
108
|
+
# Indicates an error when processing a server challenge, e.g: an invalid
|
109
|
+
# or unparsable challenge. An underlying exception may be available as
|
110
|
+
# the exception's #cause.
|
111
|
+
AuthenticationError = Class.new(Error)
|
30
112
|
|
31
|
-
#
|
32
|
-
#
|
33
|
-
|
34
|
-
attr_reader :string, :profile
|
113
|
+
# Indicates that authentication cannot proceed because one of the server's
|
114
|
+
# messages has not passed integrity checks.
|
115
|
+
AuthenticationFailed = Class.new(Error)
|
35
116
|
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
end
|
117
|
+
# Indicates that authentication cannot proceed because one of the server's
|
118
|
+
# ended authentication prematurely.
|
119
|
+
class AuthenticationIncomplete < AuthenticationFailed
|
120
|
+
# The success response from the server
|
121
|
+
attr_reader :response
|
42
122
|
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
attr_reader :table
|
47
|
-
|
48
|
-
def initialize(table, *args, **kwargs)
|
49
|
-
@table = -table.to_str
|
50
|
-
details = (title = StringPrep::TABLE_TITLES[table]) ?
|
51
|
-
"%s [%s]" % [title, table] : table
|
52
|
-
message = "String contains a prohibited codepoint: %s" % [details]
|
53
|
-
super(message, *args, **kwargs)
|
123
|
+
def initialize(response, message = "authentication ended prematurely")
|
124
|
+
super(message)
|
125
|
+
@response = response
|
54
126
|
end
|
55
127
|
end
|
56
128
|
|
57
|
-
#
|
58
|
-
|
59
|
-
|
129
|
+
# autoloading to avoid loading all of the regexps when they aren't used.
|
130
|
+
sasl_stringprep_rb = File.expand_path("sasl/stringprep", __dir__)
|
131
|
+
autoload :StringPrep, sasl_stringprep_rb
|
132
|
+
autoload :SASLprep, sasl_stringprep_rb
|
133
|
+
autoload :StringPrepError, sasl_stringprep_rb
|
134
|
+
autoload :ProhibitedCodepoint, sasl_stringprep_rb
|
135
|
+
autoload :BidiStringError, sasl_stringprep_rb
|
136
|
+
|
137
|
+
sasl_dir = File.expand_path("sasl", __dir__)
|
138
|
+
autoload :AuthenticationExchange, "#{sasl_dir}/authentication_exchange"
|
139
|
+
autoload :ClientAdapter, "#{sasl_dir}/client_adapter"
|
140
|
+
autoload :ProtocolAdapters, "#{sasl_dir}/protocol_adapters"
|
141
|
+
|
142
|
+
autoload :Authenticators, "#{sasl_dir}/authenticators"
|
143
|
+
autoload :GS2Header, "#{sasl_dir}/gs2_header"
|
144
|
+
autoload :ScramAlgorithm, "#{sasl_dir}/scram_algorithm"
|
145
|
+
|
146
|
+
autoload :AnonymousAuthenticator, "#{sasl_dir}/anonymous_authenticator"
|
147
|
+
autoload :ExternalAuthenticator, "#{sasl_dir}/external_authenticator"
|
148
|
+
autoload :OAuthBearerAuthenticator, "#{sasl_dir}/oauthbearer_authenticator"
|
149
|
+
autoload :PlainAuthenticator, "#{sasl_dir}/plain_authenticator"
|
150
|
+
autoload :ScramAuthenticator, "#{sasl_dir}/scram_authenticator"
|
151
|
+
autoload :ScramSHA1Authenticator, "#{sasl_dir}/scram_authenticator"
|
152
|
+
autoload :ScramSHA256Authenticator, "#{sasl_dir}/scram_authenticator"
|
153
|
+
autoload :XOAuth2Authenticator, "#{sasl_dir}/xoauth2_authenticator"
|
154
|
+
|
155
|
+
autoload :CramMD5Authenticator, "#{sasl_dir}/cram_md5_authenticator"
|
156
|
+
autoload :DigestMD5Authenticator, "#{sasl_dir}/digest_md5_authenticator"
|
157
|
+
autoload :LoginAuthenticator, "#{sasl_dir}/login_authenticator"
|
158
|
+
|
159
|
+
# Returns the default global SASL::Authenticators instance.
|
160
|
+
def self.authenticators; @authenticators ||= Authenticators.new end
|
161
|
+
|
162
|
+
# Delegates to <tt>registry.new</tt> See Authenticators#new.
|
163
|
+
def self.authenticator(*args, registry: authenticators, **kwargs, &block)
|
164
|
+
registry.new(*args, **kwargs, &block)
|
60
165
|
end
|
61
166
|
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
extend self
|
167
|
+
# Delegates to ::authenticators. See Authenticators#add_authenticator.
|
168
|
+
def self.add_authenticator(...) authenticators.add_authenticator(...) end
|
169
|
+
|
170
|
+
module_function
|
67
171
|
|
68
|
-
# See SASLprep#saslprep.
|
172
|
+
# See Net::IMAP::StringPrep::SASLprep#saslprep.
|
69
173
|
def saslprep(string, **opts)
|
70
|
-
SASLprep.saslprep(string, **opts)
|
174
|
+
Net::IMAP::StringPrep::SASLprep.saslprep(string, **opts)
|
71
175
|
end
|
72
176
|
|
73
177
|
end
|
74
178
|
end
|
75
|
-
|
76
179
|
end
|
77
|
-
|
78
|
-
Net::IMAP.extend Net::IMAP::SASL
|
@@ -0,0 +1,21 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Net
|
4
|
+
class IMAP
|
5
|
+
|
6
|
+
# Experimental
|
7
|
+
class SASLAdapter < SASL::ClientAdapter
|
8
|
+
include SASL::ProtocolAdapters::IMAP
|
9
|
+
|
10
|
+
RESPONSE_ERRORS = [NoResponseError, BadResponseError, ByeResponseError]
|
11
|
+
.freeze
|
12
|
+
|
13
|
+
def response_errors; RESPONSE_ERRORS end
|
14
|
+
def sasl_ir_capable?; client.capable?("SASL-IR") end
|
15
|
+
def auth_capable?(mechanism); client.auth_capable?(mechanism) end
|
16
|
+
def drop_connection; client.logout! end
|
17
|
+
def drop_connection!; client.disconnect end
|
18
|
+
end
|
19
|
+
|
20
|
+
end
|
21
|
+
end
|