mox/smtpserver/fuzz_test.go
Mechiel Lukkien 833a67fe3d add config option to disable tls client auth during tls handshakes
to work around clients, like the gmail smtp client, that tries to
authenticate with a webpki-issued certificate (which we don't know).

i tried specifying a list of accepted (subjects of) CA certs during the
tls handshake (with just 1 entry, with "xmox.nl" as common name), which
clients can use to influence their cert selection.  however, the gmail
smtp client ignores it, so not a solution for the issue where this was
raised. also, specifying a list of accepted certs could cause other
clients to not send their client cert anymore, breaking existing setups.

i also considered only asking for tls client auth when at least one
account has a tls pubkey configured. but decided against it since any
account can add one on their own (without system admin interaction),
changing behaviour of the system and potentially breaking existing
submission/tls configs.

we now also print the "subject" and "issuer" of certs when tls client
auth fails, should be useful for future debugging.

for issue #359
2025-06-09 12:33:10 +02:00

127 lines
3.1 KiB
Go

package smtpserver
import (
"fmt"
"net"
"os"
"path/filepath"
"testing"
"time"
"github.com/mjl-/mox/dns"
"github.com/mjl-/mox/mlog"
"github.com/mjl-/mox/mox-"
"github.com/mjl-/mox/queue"
"github.com/mjl-/mox/store"
)
// Fuzz the server. For each fuzz string, we set up servers in various connection states, and write the string as command.
func FuzzServer(f *testing.F) {
f.Add("HELO remote")
f.Add("EHLO remote")
f.Add("AUTH PLAIN")
f.Add("MAIL FROM:<remote@remote>")
f.Add("RCPT TO:<local@mox.example>")
f.Add("DATA")
f.Add(".")
f.Add("RSET")
f.Add("VRFY x")
f.Add("EXPN x")
f.Add("HELP")
f.Add("NOOP")
f.Add("QUIT")
log := mlog.New("smtpserver", nil)
mox.Context = ctxbg
mox.ConfigStaticPath = filepath.FromSlash("../testdata/smtpserverfuzz/mox.conf")
mox.MustLoadConfig(true, false)
store.Close() // May not be open, we ignore error.
dataDir := mox.ConfigDirPath(mox.Conf.Static.DataDir)
os.RemoveAll(dataDir)
err := store.Init(ctxbg)
if err != nil {
f.Fatalf("store init: %v", err)
}
defer store.Switchboard()()
acc, err := store.OpenAccount(log, "mjl", false)
if err != nil {
f.Fatalf("open account: %v", err)
}
defer func() {
acc.Close()
acc.WaitClosed()
}()
err = acc.SetPassword(log, "testtest")
if err != nil {
f.Fatalf("set password: %v", err)
}
err = queue.Init()
if err != nil {
f.Fatalf("queue init: %v", err)
}
defer queue.Shutdown()
comm := store.RegisterComm(acc)
defer comm.Unregister()
var cid int64 = 1
var fl *os.File
if false {
fl, err = os.Create("fuzz.log")
if err != nil {
f.Fatalf("fuzz log")
}
defer fl.Close()
}
flog := func(err error, msg string) {
if fl != nil && err != nil {
fmt.Fprintf(fl, "%s: %v\n", msg, err)
}
}
f.Fuzz(func(t *testing.T, s string) {
run := func(cmds []string) {
limitersInit() // Reset rate limiters.
serverConn, clientConn := net.Pipe()
defer serverConn.Close()
defer clientConn.Close()
go func() {
err := clientConn.SetDeadline(time.Now().Add(time.Second))
flog(err, "set client deadline")
_, err = clientConn.Read(make([]byte, 1024))
flog(err, "read ehlo")
for _, cmd := range cmds {
_, err = clientConn.Write([]byte(cmd + "\r\n"))
flog(err, "write command")
_, err = clientConn.Read(make([]byte, 1024))
flog(err, "read response")
}
_, err = clientConn.Write([]byte(s + "\r\n"))
flog(err, "write test command")
_, err = clientConn.Read(make([]byte, 1024))
flog(err, "read test response")
clientConn.Close()
serverConn.Close()
}()
resolver := dns.MockResolver{}
const submission = false
const viaHTTPS = false
err := serverConn.SetDeadline(time.Now().Add(time.Second))
flog(err, "set server deadline")
serve("test", cid, dns.Domain{ASCII: "mox.example"}, nil, serverConn, resolver, submission, false, viaHTTPS, false, 100<<10, false, false, false, nil, 0)
cid++
}
run([]string{})
run([]string{"EHLO remote"})
run([]string{"EHLO remote", "MAIL FROM:<remote@example.org>"})
run([]string{"EHLO remote", "MAIL FROM:<remote@example.org>", "RCPT TO:<mjl@mox.example>"})
// todo: submission with login
})
}