feat(smtp): fix DATA state machine; add SMTP_OPEN_RELAY mode
- Buffer DATA body until CRLF.CRLF terminator — fixes 502-on-every-body-line bug - SMTP_OPEN_RELAY=1: AUTH accepted (235), RCPT TO accepted for any domain, full DATA pipeline with queued-as message ID - Default (SMTP_OPEN_RELAY=0): credential harvester — AUTH rejected (535) but connection stays open, RCPT TO returns 554 relay denied - SASL PLAIN and LOGIN multi-step AUTH both decoded and logged - RSET clears all per-transaction state - Add development/SMTP_RELAY.md, IMAP_BAIT.md, ICS_SCADA.md, BUG_FIXES.md (live-tested service realism plans)
This commit is contained in:
303
tests/test_smtp.py
Normal file
303
tests/test_smtp.py
Normal file
@@ -0,0 +1,303 @@
|
||||
"""
|
||||
Tests for templates/smtp/server.py
|
||||
|
||||
Exercises both modes:
|
||||
- credential-harvester (SMTP_OPEN_RELAY=0, default)
|
||||
- open relay (SMTP_OPEN_RELAY=1)
|
||||
|
||||
Uses asyncio transport/protocol directly — no network socket needed.
|
||||
"""
|
||||
|
||||
import base64
|
||||
import importlib.util
|
||||
import sys
|
||||
from types import ModuleType
|
||||
from unittest.mock import MagicMock, patch
|
||||
|
||||
import pytest
|
||||
|
||||
|
||||
# ── Helpers ───────────────────────────────────────────────────────────────────
|
||||
|
||||
def _make_fake_decnet_logging() -> ModuleType:
|
||||
"""Return a stub decnet_logging module that does nothing."""
|
||||
mod = ModuleType("decnet_logging")
|
||||
mod.syslog_line = MagicMock(return_value="")
|
||||
mod.write_syslog_file = MagicMock()
|
||||
mod.forward_syslog = MagicMock()
|
||||
mod.SEVERITY_WARNING = 4
|
||||
mod.SEVERITY_INFO = 6
|
||||
return mod
|
||||
|
||||
|
||||
def _load_smtp(open_relay: bool):
|
||||
"""Import smtp server module with desired OPEN_RELAY value.
|
||||
|
||||
Injects a stub decnet_logging into sys.modules so the template can import
|
||||
it without needing the real file on sys.path.
|
||||
"""
|
||||
env = {"SMTP_OPEN_RELAY": "1" if open_relay else "0", "NODE_NAME": "testhost"}
|
||||
for key in list(sys.modules):
|
||||
if key in ("smtp_server", "decnet_logging"):
|
||||
del sys.modules[key]
|
||||
|
||||
sys.modules["decnet_logging"] = _make_fake_decnet_logging()
|
||||
|
||||
spec = importlib.util.spec_from_file_location("smtp_server", "templates/smtp/server.py")
|
||||
mod = importlib.util.module_from_spec(spec)
|
||||
with patch.dict("os.environ", env, clear=False):
|
||||
spec.loader.exec_module(mod)
|
||||
return mod
|
||||
|
||||
|
||||
def _make_protocol(mod):
|
||||
"""Return a (protocol, transport, written) triple. Banner is already discarded."""
|
||||
proto = mod.SMTPProtocol()
|
||||
transport = MagicMock()
|
||||
written: list[bytes] = []
|
||||
transport.write.side_effect = written.append
|
||||
proto.connection_made(transport)
|
||||
written.clear()
|
||||
return proto, transport, written
|
||||
|
||||
|
||||
def _send(proto, *lines: str) -> None:
|
||||
"""Feed CRLF-terminated lines to the protocol."""
|
||||
for line in lines:
|
||||
proto.data_received((line + "\r\n").encode())
|
||||
|
||||
|
||||
def _replies(written: list[bytes]) -> list[str]:
|
||||
"""Flatten written bytes into a list of non-empty response lines."""
|
||||
result = []
|
||||
for chunk in written:
|
||||
for line in chunk.decode().split("\r\n"):
|
||||
if line:
|
||||
result.append(line)
|
||||
return result
|
||||
|
||||
|
||||
# ── Fixtures ──────────────────────────────────────────────────────────────────
|
||||
|
||||
@pytest.fixture
|
||||
def relay_mod():
|
||||
return _load_smtp(open_relay=True)
|
||||
|
||||
@pytest.fixture
|
||||
def harvester_mod():
|
||||
return _load_smtp(open_relay=False)
|
||||
|
||||
|
||||
# ── Banner ────────────────────────────────────────────────────────────────────
|
||||
|
||||
def test_banner_is_220(relay_mod):
|
||||
proto, transport, written = _make_protocol(relay_mod)
|
||||
# written was cleared — re-trigger banner check via a fresh instance
|
||||
proto2 = relay_mod.SMTPProtocol()
|
||||
t2 = MagicMock()
|
||||
w2: list[bytes] = []
|
||||
t2.write.side_effect = w2.append
|
||||
proto2.connection_made(t2)
|
||||
banner = b"".join(w2).decode()
|
||||
assert banner.startswith("220")
|
||||
assert "ESMTP" in banner
|
||||
|
||||
|
||||
# ── EHLO ──────────────────────────────────────────────────────────────────────
|
||||
|
||||
def test_ehlo_returns_250_multiline(relay_mod):
|
||||
proto, _, written = _make_protocol(relay_mod)
|
||||
_send(proto, "EHLO attacker.com")
|
||||
combined = b"".join(written).decode()
|
||||
assert "250" in combined
|
||||
assert "AUTH" in combined
|
||||
assert "PIPELINING" in combined
|
||||
|
||||
|
||||
# ── OPEN RELAY MODE ───────────────────────────────────────────────────────────
|
||||
|
||||
class TestOpenRelay:
|
||||
|
||||
@staticmethod
|
||||
def _session(relay_mod, *lines):
|
||||
proto, _, written = _make_protocol(relay_mod)
|
||||
_send(proto, *lines)
|
||||
return _replies(written)
|
||||
|
||||
def test_auth_plain_accepted(self, relay_mod):
|
||||
creds = base64.b64encode(b"\x00admin\x00password").decode()
|
||||
replies = self._session(relay_mod, f"AUTH PLAIN {creds}")
|
||||
assert any(r.startswith("235") for r in replies)
|
||||
|
||||
def test_auth_login_multistep_accepted(self, relay_mod):
|
||||
proto, _, written = _make_protocol(relay_mod)
|
||||
_send(proto, "AUTH LOGIN")
|
||||
_send(proto, base64.b64encode(b"admin").decode())
|
||||
_send(proto, base64.b64encode(b"password").decode())
|
||||
replies = _replies(written)
|
||||
assert any(r.startswith("235") for r in replies)
|
||||
|
||||
def test_rcpt_to_any_domain_accepted(self, relay_mod):
|
||||
replies = self._session(
|
||||
relay_mod,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<spam@evil.com>",
|
||||
"RCPT TO:<victim@anydomain.com>",
|
||||
)
|
||||
assert any(r.startswith("250 2.1.5") for r in replies)
|
||||
|
||||
def test_full_relay_flow(self, relay_mod):
|
||||
replies = self._session(
|
||||
relay_mod,
|
||||
"EHLO attacker.com",
|
||||
"MAIL FROM:<hacker@evil.com>",
|
||||
"RCPT TO:<admin@target.com>",
|
||||
"DATA",
|
||||
"Subject: hello",
|
||||
"",
|
||||
"Body line 1",
|
||||
"Body line 2",
|
||||
".",
|
||||
"QUIT",
|
||||
)
|
||||
assert any(r.startswith("354") for r in replies), "Expected 354 after DATA"
|
||||
assert any("queued as" in r for r in replies), "Expected queued-as ID"
|
||||
assert any(r.startswith("221") for r in replies), "Expected 221 on QUIT"
|
||||
|
||||
def test_multi_recipient(self, relay_mod):
|
||||
replies = self._session(
|
||||
relay_mod,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<a@b.com>",
|
||||
"RCPT TO:<c@d.com>",
|
||||
"RCPT TO:<e@f.com>",
|
||||
"RCPT TO:<g@h.com>",
|
||||
"DATA",
|
||||
"Subject: spam",
|
||||
"",
|
||||
"hello",
|
||||
".",
|
||||
)
|
||||
assert len([r for r in replies if r.startswith("250 2.1.5")]) == 3
|
||||
|
||||
def test_dot_stuffing_stripped(self, relay_mod):
|
||||
"""Leading dot on a body line must be stripped per RFC 5321."""
|
||||
proto, _, written = _make_protocol(relay_mod)
|
||||
_send(proto,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<a@b.com>",
|
||||
"RCPT TO:<c@d.com>",
|
||||
"DATA",
|
||||
"..real dot line",
|
||||
"normal line",
|
||||
".",
|
||||
)
|
||||
replies = _replies(written)
|
||||
assert any("queued as" in r for r in replies)
|
||||
|
||||
def test_data_rejected_without_rcpt(self, relay_mod):
|
||||
replies = self._session(relay_mod, "EHLO x.com", "MAIL FROM:<a@b.com>", "DATA")
|
||||
assert any(r.startswith("503") for r in replies)
|
||||
|
||||
def test_rset_clears_transaction_state(self, relay_mod):
|
||||
proto, _, _ = _make_protocol(relay_mod)
|
||||
_send(proto, "EHLO x.com", "MAIL FROM:<a@b.com>", "RCPT TO:<c@d.com>", "RSET")
|
||||
assert proto._mail_from == ""
|
||||
assert proto._rcpt_to == []
|
||||
assert proto._in_data is False
|
||||
|
||||
def test_second_send_after_rset(self, relay_mod):
|
||||
"""A new transaction started after RSET must complete successfully."""
|
||||
replies = self._session(
|
||||
relay_mod,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<a@b.com>",
|
||||
"RCPT TO:<c@d.com>",
|
||||
"RSET",
|
||||
"MAIL FROM:<new@b.com>",
|
||||
"RCPT TO:<new@d.com>",
|
||||
"DATA",
|
||||
"body",
|
||||
".",
|
||||
)
|
||||
assert any("queued as" in r for r in replies)
|
||||
|
||||
|
||||
# ── CREDENTIAL HARVESTER MODE ─────────────────────────────────────────────────
|
||||
|
||||
class TestCredentialHarvester:
|
||||
|
||||
@staticmethod
|
||||
def _session(harvester_mod, *lines):
|
||||
proto, _, written = _make_protocol(harvester_mod)
|
||||
_send(proto, *lines)
|
||||
return _replies(written)
|
||||
|
||||
def test_auth_plain_rejected_535(self, harvester_mod):
|
||||
creds = base64.b64encode(b"\x00admin\x00password").decode()
|
||||
replies = self._session(harvester_mod, f"AUTH PLAIN {creds}")
|
||||
assert any(r.startswith("535") for r in replies)
|
||||
|
||||
def test_auth_rejected_connection_stays_open(self, harvester_mod):
|
||||
"""After 535 the connection must stay alive — old code closed it immediately."""
|
||||
proto, transport, _ = _make_protocol(harvester_mod)
|
||||
creds = base64.b64encode(b"\x00admin\x00password").decode()
|
||||
_send(proto, f"AUTH PLAIN {creds}")
|
||||
transport.close.assert_not_called()
|
||||
|
||||
def test_rcpt_to_denied_554(self, harvester_mod):
|
||||
replies = self._session(
|
||||
harvester_mod,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<a@b.com>",
|
||||
"RCPT TO:<admin@target.com>",
|
||||
)
|
||||
assert any(r.startswith("554") for r in replies)
|
||||
|
||||
def test_relay_denied_blocks_data(self, harvester_mod):
|
||||
"""With all RCPT TO rejected, DATA must return 503."""
|
||||
replies = self._session(
|
||||
harvester_mod,
|
||||
"EHLO x.com",
|
||||
"MAIL FROM:<a@b.com>",
|
||||
"RCPT TO:<c@d.com>",
|
||||
"DATA",
|
||||
)
|
||||
assert any(r.startswith("503") for r in replies)
|
||||
|
||||
def test_noop_and_quit(self, harvester_mod):
|
||||
replies = self._session(harvester_mod, "NOOP", "QUIT")
|
||||
assert any(r.startswith("250") for r in replies)
|
||||
assert any(r.startswith("221") for r in replies)
|
||||
|
||||
def test_unknown_command_502(self, harvester_mod):
|
||||
replies = self._session(harvester_mod, "BADCMD foo")
|
||||
assert any(r.startswith("502") for r in replies)
|
||||
|
||||
def test_starttls_declined_454(self, harvester_mod):
|
||||
replies = self._session(harvester_mod, "STARTTLS")
|
||||
assert any(r.startswith("454") for r in replies)
|
||||
|
||||
|
||||
# ── Queue ID ──────────────────────────────────────────────────────────────────
|
||||
|
||||
def test_rand_msg_id_format(relay_mod):
|
||||
for _ in range(50):
|
||||
mid = relay_mod._rand_msg_id()
|
||||
assert len(mid) == 12
|
||||
assert mid.isalnum()
|
||||
|
||||
|
||||
# ── AUTH PLAIN decode ─────────────────────────────────────────────────────────
|
||||
|
||||
def test_decode_auth_plain_normal(relay_mod):
|
||||
blob = base64.b64encode(b"\x00alice\x00s3cr3t").decode()
|
||||
user, pw = relay_mod._decode_auth_plain(blob)
|
||||
assert user == "alice"
|
||||
assert pw == "s3cr3t"
|
||||
|
||||
|
||||
def test_decode_auth_plain_garbage_no_raise(relay_mod):
|
||||
user, pw = relay_mod._decode_auth_plain("!!!notbase64!!!")
|
||||
assert isinstance(user, str)
|
||||
assert isinstance(pw, str)
|
||||
Reference in New Issue
Block a user