| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Net::Sieve; |
|
2
|
1
|
|
|
1
|
|
49927
|
use strict; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
23
|
|
|
3
|
1
|
|
|
1
|
|
4
|
use warnings; |
|
|
1
|
|
|
|
|
1
|
|
|
|
1
|
|
|
|
|
32
|
|
|
4
|
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
=head1 NAME |
|
6
|
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
Net::Sieve - Implementation of managesieve protocol to manage sieve scripts |
|
8
|
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
10
|
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
use Net::Sieve; |
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
my $SieveServer = Net::Sieve->new ( |
|
14
|
|
|
|
|
|
|
server => 'imap.server.org', |
|
15
|
|
|
|
|
|
|
user => 'user', |
|
16
|
|
|
|
|
|
|
password => 'pass' , |
|
17
|
|
|
|
|
|
|
); |
|
18
|
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
foreach my $script ( $SieveServer->list() ) { |
|
20
|
|
|
|
|
|
|
print $script->{name}." ".$script->{status}."\n"; |
|
21
|
|
|
|
|
|
|
}; |
|
22
|
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
my $name_script = 'test'; |
|
24
|
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
# read |
|
26
|
|
|
|
|
|
|
print $SieveServer->get($name_script); |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
# write |
|
29
|
|
|
|
|
|
|
my $test_script=' |
|
30
|
|
|
|
|
|
|
require "fileinto"; |
|
31
|
|
|
|
|
|
|
## Place all these in the "Test" folder |
|
32
|
|
|
|
|
|
|
if header :contains "Subject" "[Test]" { |
|
33
|
|
|
|
|
|
|
fileinto "Test"; |
|
34
|
|
|
|
|
|
|
} |
|
35
|
|
|
|
|
|
|
'; |
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
# other |
|
38
|
|
|
|
|
|
|
$SieveServer->put($name_script,$new_script); |
|
39
|
|
|
|
|
|
|
$SieveServer->activate($name_script); |
|
40
|
|
|
|
|
|
|
$SieveServer->deactivate(); |
|
41
|
|
|
|
|
|
|
$SieveServer->delete($name_script); |
|
42
|
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
45
|
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
B is a package for clients for the "MANAGESIEVE" protocol, which is an Internet Draft protocol for manipulation of "Sieve" scripts in a repository. More simply, Net::Sieve lets you control your mail-filtering rule files on a mail server. |
|
47
|
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
B supports the use of "TLS" via the "STARTTLS" command. B open the connexion to the sieve server, methods allow to list all scripts, activate or deactivate scripts, read, delete or put scripts. |
|
49
|
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
Most of code come from the great Phil Pennock B command-line tool L. |
|
51
|
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
See L to manipulate Sieve scripts content. |
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
=cut |
|
55
|
|
|
|
|
|
|
|
|
56
|
1
|
|
|
1
|
|
230
|
use Authen::SASL 2.11 qw(Perl); |
|
|
1
|
|
|
|
|
784
|
|
|
|
1
|
|
|
|
|
4
|
|
|
57
|
|
|
|
|
|
|
# 2.11: first version with non-broken DIGEST-MD5 |
|
58
|
|
|
|
|
|
|
# Earlier versions don't allow server verification |
|
59
|
|
|
|
|
|
|
# NB: code still explicitly checks for a new-enough version, so |
|
60
|
|
|
|
|
|
|
# if you have an older version of Authen::SASL and know what you're |
|
61
|
|
|
|
|
|
|
# doing then you can remove this version check here. I advise |
|
62
|
|
|
|
|
|
|
# against it, though. |
|
63
|
|
|
|
|
|
|
# Perl: Need a way to ask which mechanism to send |
|
64
|
1
|
|
|
1
|
|
4293
|
use Authen::SASL::Perl::EXTERNAL; # We munge inside its private stuff. |
|
|
1
|
|
|
|
|
286
|
|
|
|
1
|
|
|
|
|
37
|
|
|
65
|
1
|
|
|
1
|
|
383
|
use IO::Socket::INET6; |
|
|
1
|
|
|
|
|
22417
|
|
|
|
1
|
|
|
|
|
5
|
|
|
66
|
1
|
|
|
1
|
|
917
|
use IO::Socket::SSL 0.97; # SSL_ca_path bogus before 0.97 |
|
|
1
|
|
|
|
|
47313
|
|
|
|
1
|
|
|
|
|
7
|
|
|
67
|
1
|
|
|
1
|
|
457
|
use MIME::Base64; |
|
|
1
|
|
|
|
|
481
|
|
|
|
1
|
|
|
|
|
49
|
|
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
BEGIN { |
|
70
|
1
|
|
|
1
|
|
6
|
use Exporter (); |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
19
|
|
|
71
|
1
|
|
|
1
|
|
3
|
use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS); |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
70
|
|
|
72
|
1
|
|
|
1
|
|
3
|
$VERSION = '0.12'; |
|
73
|
1
|
|
|
|
|
8
|
@ISA = qw(Exporter); |
|
74
|
|
|
|
|
|
|
#Give a hoot don't pollute, do not export more than needed by default |
|
75
|
1
|
|
|
|
|
1
|
@EXPORT = qw(); |
|
76
|
1
|
|
|
|
|
9
|
@EXPORT_OK = qw(); |
|
77
|
1
|
|
|
|
|
2700
|
%EXPORT_TAGS = (); |
|
78
|
|
|
|
|
|
|
} |
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
my %capa; |
|
82
|
|
|
|
|
|
|
my %raw_capabilities; |
|
83
|
|
|
|
|
|
|
my %capa_dosplit = map {$_ => 1} qw( SASL SIEVE ); |
|
84
|
|
|
|
|
|
|
# Key is permissably empty keyword, value if defined is closure to call with |
|
85
|
|
|
|
|
|
|
# capabilities after receiving complete list, for verifying permissability. |
|
86
|
|
|
|
|
|
|
# First param $sock, second \%capa, third \%raw_capabilities |
|
87
|
|
|
|
|
|
|
my %capa_permit_empty = ( |
|
88
|
|
|
|
|
|
|
# draft 7 onwards clarify that empty SASL is permitted, but is error |
|
89
|
|
|
|
|
|
|
# in absense of STARTTLS |
|
90
|
|
|
|
|
|
|
SASL => sub { |
|
91
|
|
|
|
|
|
|
return if exists $_[1]{STARTTLS}; |
|
92
|
|
|
|
|
|
|
# We die because there's no way to authenticate. |
|
93
|
|
|
|
|
|
|
# Spec states that after STARTTLS SASL must be non-empty |
|
94
|
|
|
|
|
|
|
warn "Empty SASL not permitted without STARTTLS\n"; |
|
95
|
|
|
|
|
|
|
}, |
|
96
|
|
|
|
|
|
|
SIEVE => undef, |
|
97
|
|
|
|
|
|
|
); |
|
98
|
|
|
|
|
|
|
my $DEBUGGING = 1; |
|
99
|
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
=head1 CONSTRUCTOR |
|
101
|
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
=head2 new |
|
103
|
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
Usage : |
|
105
|
|
|
|
|
|
|
my $SieveServer = Net::Sieve->new ( |
|
106
|
|
|
|
|
|
|
server => 'imap.server.org', |
|
107
|
|
|
|
|
|
|
user => 'user', |
|
108
|
|
|
|
|
|
|
password => 'pass' ); |
|
109
|
|
|
|
|
|
|
Returns : |
|
110
|
|
|
|
|
|
|
Net::Sieve object which contain current open socket |
|
111
|
|
|
|
|
|
|
Argument : |
|
112
|
|
|
|
|
|
|
server : default localhost |
|
113
|
|
|
|
|
|
|
port : default 2000 |
|
114
|
|
|
|
|
|
|
user : default logname or $ENV{USERNAME} or $ENV{LOGNAME} |
|
115
|
|
|
|
|
|
|
password : |
|
116
|
|
|
|
|
|
|
net_domain : |
|
117
|
|
|
|
|
|
|
sslkeyfile : default search in /etc/ssl/certs |
|
118
|
|
|
|
|
|
|
sslcertfile : default search in /etc/ssl/certs |
|
119
|
|
|
|
|
|
|
autmech : to force a particular authentication mechanism |
|
120
|
|
|
|
|
|
|
authzid : request authorisation to act as the specified id |
|
121
|
|
|
|
|
|
|
realm : pass realm information to the authentication mechanism |
|
122
|
|
|
|
|
|
|
ssl_verif : default 0x01, set 0x00 to don't verify and allow self-signed cerificate |
|
123
|
|
|
|
|
|
|
notssl_verif: default 0x00, set 0x01 to don't verify and allow self-signed cerificate |
|
124
|
|
|
|
|
|
|
debug : default 0, set 1 to have transmission logs |
|
125
|
|
|
|
|
|
|
dumptlsinfo : dump tls information |
|
126
|
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
=cut |
|
128
|
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
sub new |
|
130
|
|
|
|
|
|
|
{ |
|
131
|
0
|
|
|
0
|
1
|
|
my ($class, %param) = @_; |
|
132
|
|
|
|
|
|
|
|
|
133
|
0
|
|
0
|
|
|
|
my $self = bless ({}, ref ($class) || $class); |
|
134
|
|
|
|
|
|
|
|
|
135
|
0
|
|
0
|
|
|
|
my $server = $param{server}||'localhost'; |
|
136
|
0
|
|
0
|
|
|
|
my $port = $param{port}||'2000'; |
|
137
|
0
|
|
|
|
|
|
my $user = $param{user}; |
|
138
|
0
|
|
|
|
|
|
my $password = $param{password}; |
|
139
|
0
|
|
0
|
|
|
|
my $net_domain = $param{net_domain}||AF_UNSPEC; |
|
140
|
0
|
|
|
|
|
|
my $sslkeyfile = $param{sslkeyfile}; |
|
141
|
0
|
|
|
|
|
|
my $sslcertfile = $param{sslcertfile}; |
|
142
|
0
|
|
|
|
|
|
my $realm = $param{realm}; |
|
143
|
0
|
|
|
|
|
|
my $authmech = $param{autmech}; |
|
144
|
0
|
|
|
|
|
|
my $authzid = $param{authzid}; |
|
145
|
0
|
|
|
|
|
|
my $ssl_verify = 0x01; |
|
146
|
0
|
0
|
|
|
|
|
$ssl_verify = 0x01 if $param{ssl_verify}; |
|
147
|
0
|
0
|
|
|
|
|
$ssl_verify = 0x00 if $param{ssl_verify} eq '0x00'; |
|
148
|
0
|
0
|
|
|
|
|
$ssl_verify = 0x00 if $param{notssl_verify}; |
|
149
|
0
|
|
|
|
|
|
my $dump_tls_information = $param{dumptlsinfo}; |
|
150
|
0
|
|
|
|
|
|
$DEBUGGING = $param{debug}; |
|
151
|
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
|
|
154
|
0
|
|
|
|
|
|
my %ssl_options = ( |
|
155
|
|
|
|
|
|
|
SSL_version => 'SSLv23:!SSLv2:!SSLv3', |
|
156
|
|
|
|
|
|
|
SSL_cipher_list => 'ALL:!aNULL:!NULL:!LOW:!EXP:!ADH:@STRENGTH', |
|
157
|
|
|
|
|
|
|
SSL_verify_mode => $ssl_verify, |
|
158
|
|
|
|
|
|
|
SSL_ca_path => '/etc/ssl/certs', |
|
159
|
|
|
|
|
|
|
); |
|
160
|
|
|
|
|
|
|
|
|
161
|
0
|
|
|
|
|
|
my $prioritise_auth_external = 0; |
|
162
|
0
|
|
|
|
|
|
my ($forbid_clearauth, $forbid_clearchan) = (0, 0); |
|
163
|
|
|
|
|
|
|
|
|
164
|
0
|
0
|
|
|
|
|
unless (defined $server) { |
|
165
|
0
|
|
|
|
|
|
$server = 'localhost'; |
|
166
|
0
|
0
|
0
|
|
|
|
if (exists $ENV{'IMAP_SERVER'} |
|
167
|
|
|
|
|
|
|
and $ENV{'IMAP_SERVER'} !~ m!^/!) { |
|
168
|
0
|
|
|
|
|
|
$server = $ENV{'IMAP_SERVER'}; |
|
169
|
|
|
|
|
|
|
# deal with a port number. |
|
170
|
0
|
0
|
|
|
|
|
unless ($server =~ /:.*:/) { # IPv6 address literal |
|
171
|
0
|
|
|
|
|
|
$server =~ s/:\d+\z//; |
|
172
|
|
|
|
|
|
|
} |
|
173
|
|
|
|
|
|
|
} |
|
174
|
|
|
|
|
|
|
} |
|
175
|
|
|
|
|
|
|
|
|
176
|
0
|
0
|
|
|
|
|
die "Bad server name\n" |
|
177
|
|
|
|
|
|
|
unless $server =~ /^[A-Za-z0-9_.-]+\z/; |
|
178
|
0
|
0
|
|
|
|
|
die "Bad port specification\n" |
|
179
|
|
|
|
|
|
|
unless $port =~ /^[A-Za-z0-9_()-]+\z/; |
|
180
|
|
|
|
|
|
|
|
|
181
|
0
|
0
|
|
|
|
|
unless (defined $user) { |
|
182
|
0
|
0
|
|
|
|
|
if ($^O eq "MSWin32") { |
|
183
|
|
|
|
|
|
|
# perlvar documents always "MSWin32" on Windows ... |
|
184
|
|
|
|
|
|
|
# what about 64bit windows? |
|
185
|
0
|
0
|
0
|
|
|
|
if (exists $ENV{USERNAME} and length $ENV{USERNAME}) { |
|
|
|
0
|
0
|
|
|
|
|
|
186
|
0
|
|
|
|
|
|
$user = $ENV{USERNAME}; |
|
187
|
|
|
|
|
|
|
} elsif (exists $ENV{LOGNAME} and length $ENV{LOGNAME}) { |
|
188
|
0
|
|
|
|
|
|
$user = $ENV{LOGNAME}; |
|
189
|
|
|
|
|
|
|
} else { |
|
190
|
0
|
|
|
|
|
|
die "Unable to figure out a default user, sorry.\n"; |
|
191
|
|
|
|
|
|
|
} |
|
192
|
|
|
|
|
|
|
} else { |
|
193
|
0
|
|
|
|
|
|
$user = getpwuid $>; |
|
194
|
|
|
|
|
|
|
} |
|
195
|
|
|
|
|
|
|
# this should handle the non-mswin32 case if 64bit _is_ different. |
|
196
|
0
|
0
|
|
|
|
|
die "Unable to figure out a default user, sorry!\n" |
|
197
|
|
|
|
|
|
|
unless defined $user; |
|
198
|
|
|
|
|
|
|
} |
|
199
|
|
|
|
|
|
|
|
|
200
|
0
|
0
|
0
|
|
|
|
if ((defined $sslkeyfile and not defined $sslcertfile) or |
|
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
201
|
|
|
|
|
|
|
(defined $sslcertfile and not defined $sslkeyfile)) { |
|
202
|
0
|
|
|
|
|
|
die "Need both a client key and cert for SSL certificate auth.\n"; |
|
203
|
|
|
|
|
|
|
} |
|
204
|
0
|
0
|
|
|
|
|
if (defined $sslkeyfile) { |
|
205
|
0
|
|
|
|
|
|
$ssl_options{SSL_use_cert} = 1; |
|
206
|
0
|
|
|
|
|
|
$ssl_options{SSL_key_file} = $sslkeyfile; |
|
207
|
0
|
|
|
|
|
|
$ssl_options{SSL_cert_file} = $sslcertfile; |
|
208
|
0
|
|
|
|
|
|
$prioritise_auth_external = 1; |
|
209
|
|
|
|
|
|
|
} |
|
210
|
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
|
|
212
|
0
|
|
|
|
|
|
my $sock = IO::Socket::INET6->new( |
|
213
|
|
|
|
|
|
|
PeerHost => $server, |
|
214
|
|
|
|
|
|
|
PeerPort => $port, |
|
215
|
|
|
|
|
|
|
Proto => 'tcp', |
|
216
|
|
|
|
|
|
|
Domain => $net_domain, |
|
217
|
|
|
|
|
|
|
MultiHomed => 1, # try multiple IPs (IPv4 works, v6 doesn't?) |
|
218
|
|
|
|
|
|
|
); |
|
219
|
0
|
0
|
|
|
|
|
unless (defined $sock) { |
|
220
|
0
|
|
|
|
|
|
my $extra = ''; |
|
221
|
0
|
0
|
0
|
|
|
|
if ($!{EINVAL} and $net_domain != AF_UNSPEC) { |
|
222
|
0
|
|
|
|
|
|
$extra = " (Probably no host record for overriden IP version)\n"; |
|
223
|
|
|
|
|
|
|
} |
|
224
|
0
|
|
|
|
|
|
die qq{Connection to "$server" [port $port] failed: $!\n$extra}; |
|
225
|
|
|
|
|
|
|
} |
|
226
|
|
|
|
|
|
|
|
|
227
|
0
|
|
|
|
|
|
$sock->autoflush(1); |
|
228
|
0
|
|
|
|
|
|
_debug("connection: remote host address is @{[$sock->peerhost()]}"); |
|
|
0
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
|
|
230
|
0
|
|
|
|
|
|
$self->{_sock} = $sock; |
|
231
|
|
|
|
|
|
|
|
|
232
|
0
|
|
|
|
|
|
$self->_parse_capabilities(); |
|
233
|
|
|
|
|
|
|
|
|
234
|
0
|
|
|
|
|
|
$self->{_capa} = $raw_capabilities{SIEVE}; |
|
235
|
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
|
|
237
|
0
|
|
|
|
|
|
my $tls_bitlength = -1; |
|
238
|
|
|
|
|
|
|
|
|
239
|
0
|
0
|
|
|
|
|
if (exists $capa{STARTTLS}) { |
|
|
|
0
|
|
|
|
|
|
|
240
|
0
|
|
|
|
|
|
$self->ssend("STARTTLS"); |
|
241
|
0
|
|
|
|
|
|
$self->sget(); |
|
242
|
0
|
0
|
|
|
|
|
die "STARTTLS request rejected: $_\n" unless /^OK\b/; |
|
243
|
0
|
0
|
|
|
|
|
IO::Socket::SSL->start_SSL($sock, %ssl_options) or do { |
|
244
|
0
|
|
|
|
|
|
my $e = IO::Socket::SSL::errstr(); |
|
245
|
0
|
|
|
|
|
|
die "STARTTLS promotion failed: $e\n"; |
|
246
|
|
|
|
|
|
|
}; |
|
247
|
0
|
0
|
0
|
|
|
|
if (exists $main::{"Net::"} and exists $main::{"Net::"}{"SSLeay::"}) { |
|
248
|
0
|
|
|
|
|
|
my $t = Net::SSLeay::get_cipher_bits($sock->_get_ssl_object(), 0); |
|
249
|
0
|
0
|
0
|
|
|
|
$tls_bitlength = $t if defined $t and $t; |
|
250
|
|
|
|
|
|
|
} |
|
251
|
0
|
|
|
|
|
|
_debug("--- TLS activated here [$tls_bitlength bits]"); |
|
252
|
0
|
0
|
|
|
|
|
if ($dump_tls_information) { |
|
253
|
0
|
|
|
|
|
|
print $sock->dump_peer_certificate(); |
|
254
|
0
|
0
|
0
|
|
|
|
if ($DEBUGGING and |
|
|
|
|
0
|
|
|
|
|
|
255
|
|
|
|
|
|
|
exists $main::{"Net::"} and exists $main::{"Net::"}{"SSLeay::"}) { |
|
256
|
|
|
|
|
|
|
# IO::Socket::SSL depends upon Net::SSLeay |
|
257
|
|
|
|
|
|
|
# so this should be fairly safe, albeit messing |
|
258
|
|
|
|
|
|
|
# around behind IO::Socket::SSL's back. |
|
259
|
0
|
|
|
|
|
|
print STDERR Net::SSLeay::PEM_get_string_X509( |
|
260
|
|
|
|
|
|
|
$sock->peer_certificate()); |
|
261
|
|
|
|
|
|
|
} |
|
262
|
|
|
|
|
|
|
} |
|
263
|
0
|
|
|
|
|
|
$forbid_clearauth = 0; |
|
264
|
|
|
|
|
|
|
# Cyrus sieve might send CAPABILITY after STARTTLS without being |
|
265
|
|
|
|
|
|
|
# prompted for it. This breaks the command-response model. |
|
266
|
|
|
|
|
|
|
# We can't just check to see if there's data to read or not, since |
|
267
|
|
|
|
|
|
|
# that will break if the next data is delayed (race condition). |
|
268
|
|
|
|
|
|
|
# There is no protocol-compliant method to determine this, short |
|
269
|
|
|
|
|
|
|
# of "wait a while, see if anything comes along; if not, send |
|
270
|
|
|
|
|
|
|
# CAPABILITY ourselves". So, I broke protocol by sending the |
|
271
|
|
|
|
|
|
|
# non-existent command NOOP, then scan for the resulting NO. |
|
272
|
|
|
|
|
|
|
# This at least is stably deterministic. However, from draft 10 |
|
273
|
|
|
|
|
|
|
# onwards, NOOP is a registered available extension which returns |
|
274
|
|
|
|
|
|
|
# OK. |
|
275
|
|
|
|
|
|
|
# New problem: again, Cyrus timsieved. As of 2.3.13, it drops the |
|
276
|
|
|
|
|
|
|
# connection for an unknown command instead of returning NO. And |
|
277
|
|
|
|
|
|
|
# logs "Lost connection to client -- exiting" which is an interesting |
|
278
|
|
|
|
|
|
|
# way of saying "we dropped the connection". At this point, I give up |
|
279
|
|
|
|
|
|
|
# on protocol-deterministic checks and fall back to version checking. |
|
280
|
|
|
|
|
|
|
# Alas, Cyrus 2.2.x is still widely deployed because 2.3.x is the |
|
281
|
|
|
|
|
|
|
# development series and 2.2.x is officially the stable series. |
|
282
|
|
|
|
|
|
|
# This means that if they don't support NOOP by 2.3.14, I have to |
|
283
|
|
|
|
|
|
|
# figure out how to decide what is safe and backtrack which version |
|
284
|
|
|
|
|
|
|
# precisely was the first to send the capability response correctly. |
|
285
|
0
|
|
|
|
|
|
my $use_noop = 1; |
|
286
|
0
|
0
|
0
|
|
|
|
if (exists $capa{"IMPLEMENTATION"} and |
|
|
|
|
0
|
|
|
|
|
|
287
|
|
|
|
|
|
|
$capa{"IMPLEMENTATION"} =~ /^Cyrus timsieved v2\.3\.(\d+)/ and |
|
288
|
|
|
|
|
|
|
$1 >= 13) { |
|
289
|
0
|
|
|
|
|
|
_debug("--- Cyrus drops connection with dubious log msg if send NOOP, skip that"); |
|
290
|
0
|
|
|
|
|
|
$use_noop = 0; |
|
291
|
|
|
|
|
|
|
} |
|
292
|
|
|
|
|
|
|
|
|
293
|
0
|
0
|
|
|
|
|
if ($use_noop) { |
|
294
|
0
|
|
|
|
|
|
my $noop_tag = "STARTTLS-RESYNC-CAPA"; |
|
295
|
0
|
|
|
|
|
|
$self->ssend(qq{NOOP "$noop_tag"}); |
|
296
|
|
|
|
|
|
|
#if ($capa{IMPLEMENTATION} =~ /dovecot/i) { |
|
297
|
0
|
|
|
|
|
|
$self->_parse_capabilities( |
|
298
|
|
|
|
|
|
|
sent_a_noop => $noop_tag, |
|
299
|
|
|
|
|
|
|
# until_see_no => 0, |
|
300
|
|
|
|
|
|
|
external_first => $prioritise_auth_external); |
|
301
|
|
|
|
|
|
|
} |
|
302
|
|
|
|
|
|
|
else { |
|
303
|
0
|
|
|
|
|
|
$self->_parse_capabilities( |
|
304
|
|
|
|
|
|
|
# until_see_no => 1, |
|
305
|
|
|
|
|
|
|
external_first => $prioritise_auth_external); |
|
306
|
|
|
|
|
|
|
} |
|
307
|
0
|
0
|
|
|
|
|
unless (scalar keys %capa) { |
|
308
|
0
|
|
|
|
|
|
$self->ssend("CAPABILITY"); |
|
309
|
0
|
|
|
|
|
|
$self->_parse_capabilities( |
|
310
|
|
|
|
|
|
|
external_first => $prioritise_auth_external); |
|
311
|
|
|
|
|
|
|
} |
|
312
|
|
|
|
|
|
|
} elsif ($forbid_clearchan) { |
|
313
|
0
|
|
|
|
|
|
die "TLS not offered, SASL confidentiality not supported in client.\n"; |
|
314
|
|
|
|
|
|
|
} |
|
315
|
|
|
|
|
|
|
|
|
316
|
0
|
|
|
|
|
|
my %authen_sasl_params; |
|
317
|
0
|
|
|
|
|
|
$authen_sasl_params{callback}{user} = $user; |
|
318
|
0
|
0
|
|
|
|
|
if (defined $authzid) { |
|
319
|
0
|
|
|
|
|
|
$authen_sasl_params{callback}{authname} = $authzid; |
|
320
|
|
|
|
|
|
|
} |
|
321
|
0
|
0
|
|
|
|
|
if (defined $realm) { |
|
322
|
|
|
|
|
|
|
# for compatibility, we set it as a callback AND as a property (below) |
|
323
|
0
|
|
|
|
|
|
$authen_sasl_params{callback}{realm} = $realm; |
|
324
|
|
|
|
|
|
|
} |
|
325
|
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
|
|
327
|
0
|
|
|
|
|
|
$authen_sasl_params{callback}{pass} = $password; |
|
328
|
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
$self->closedie("Do not have an authentication mechanism list\n") |
|
331
|
0
|
0
|
|
|
|
|
unless ref($capa{SASL}) eq 'ARRAY'; |
|
332
|
0
|
0
|
|
|
|
|
if (defined $authmech) { |
|
333
|
0
|
|
|
|
|
|
$authmech = uc $authmech; |
|
334
|
0
|
0
|
|
|
|
|
if (grep {$_ eq $authmech} map {uc $_} @{$capa{SASL}}) { |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
335
|
0
|
|
|
|
|
|
_debug("auth: will try requested SASL mechanism $authmech"); |
|
336
|
|
|
|
|
|
|
} else { |
|
337
|
0
|
|
|
|
|
|
$self->closedie("Server does not offer SASL mechanism $authmech\n"); |
|
338
|
|
|
|
|
|
|
} |
|
339
|
0
|
|
|
|
|
|
$authen_sasl_params{mechanism} = $authmech; |
|
340
|
|
|
|
|
|
|
} else { |
|
341
|
0
|
|
|
|
|
|
$authen_sasl_params{mechanism} = $raw_capabilities{SASL}; |
|
342
|
|
|
|
|
|
|
} |
|
343
|
|
|
|
|
|
|
|
|
344
|
0
|
|
|
|
|
|
my $sasl = Authen::SASL->new(%authen_sasl_params); |
|
345
|
0
|
0
|
|
|
|
|
die "SASL object init failed (local problem): $!\n" |
|
346
|
|
|
|
|
|
|
unless defined $sasl; |
|
347
|
|
|
|
|
|
|
|
|
348
|
0
|
|
|
|
|
|
my $secflags = 'noanonymous'; |
|
349
|
0
|
0
|
|
|
|
|
$secflags .= ' noplaintext' if $forbid_clearauth; |
|
350
|
0
|
0
|
|
|
|
|
my $authconversation = $sasl->client_new('sieve', $server, $secflags) |
|
351
|
|
|
|
|
|
|
or die "SASL conversation init failed (local problem): $!\n"; |
|
352
|
0
|
0
|
|
|
|
|
if ($tls_bitlength > 0) { |
|
353
|
0
|
|
|
|
|
|
$authconversation->property(externalssf => $tls_bitlength); |
|
354
|
|
|
|
|
|
|
} |
|
355
|
0
|
0
|
|
|
|
|
if (defined $realm) { |
|
356
|
0
|
|
|
|
|
|
$authconversation->property(realm => $realm); |
|
357
|
|
|
|
|
|
|
} |
|
358
|
|
|
|
|
|
|
{ |
|
359
|
0
|
0
|
|
|
|
|
my $sasl_m = $authconversation->mechanism() |
|
|
0
|
|
|
|
|
|
|
|
360
|
|
|
|
|
|
|
or die "Oh why can't I decide which auth mech to send?\n"; |
|
361
|
0
|
0
|
|
|
|
|
if ($sasl_m eq 'GSSAPI') { |
|
362
|
0
|
|
|
|
|
|
_debug("-A- GSSAPI sasl_m "); |
|
363
|
|
|
|
|
|
|
# gross hack, but it was bad of us to assume anything. |
|
364
|
|
|
|
|
|
|
# It also means that we ignore anything specified by the |
|
365
|
|
|
|
|
|
|
# user, which is good since it's Kerberos anyway. |
|
366
|
|
|
|
|
|
|
# (Major Assumption Alert!) |
|
367
|
0
|
|
|
|
|
|
$authconversation->callback( |
|
368
|
|
|
|
|
|
|
user => undef, |
|
369
|
|
|
|
|
|
|
pass => undef, |
|
370
|
|
|
|
|
|
|
); |
|
371
|
|
|
|
|
|
|
} |
|
372
|
|
|
|
|
|
|
|
|
373
|
0
|
|
|
|
|
|
my $sasl_tosend = $authconversation->client_start(); |
|
374
|
0
|
0
|
|
|
|
|
if ($authconversation->code()) { |
|
375
|
0
|
|
|
|
|
|
my $emsg = $authconversation->error(); |
|
376
|
0
|
|
|
|
|
|
$self->closedie("SASL Error: $emsg\n"); |
|
377
|
|
|
|
|
|
|
} |
|
378
|
|
|
|
|
|
|
|
|
379
|
0
|
0
|
0
|
|
|
|
if (defined $sasl_tosend and length $sasl_tosend) { |
|
380
|
0
|
|
|
|
|
|
my $mimedata = encode_base64($sasl_tosend, ''); |
|
381
|
0
|
|
|
|
|
|
my $mlen = length($mimedata); |
|
382
|
0
|
|
|
|
|
|
$self->ssend ( qq!AUTHENTICATE "$sasl_m" {${mlen}+}! ); |
|
383
|
0
|
|
|
|
|
|
$self->ssend ( $mimedata ); |
|
384
|
|
|
|
|
|
|
} else { |
|
385
|
0
|
|
|
|
|
|
$self->ssend ( qq{AUTHENTICATE "$sasl_m"} ); |
|
386
|
|
|
|
|
|
|
} |
|
387
|
0
|
|
|
|
|
|
$self->sget(); |
|
388
|
|
|
|
|
|
|
|
|
389
|
0
|
|
|
|
|
|
while ($_ !~ /^(OK|NO)(?:\s.*)?$/m) { |
|
390
|
0
|
|
|
|
|
|
my $challenge; |
|
391
|
0
|
0
|
|
|
|
|
if (/^"(.*)"\r?\n?$/) { |
|
392
|
0
|
|
|
|
|
|
$challenge = $1; |
|
393
|
|
|
|
|
|
|
} else { |
|
394
|
0
|
0
|
|
|
|
|
unless (/^\{(\d+)\+?}\r?$/m) { |
|
395
|
0
|
|
|
|
|
|
$self->sfinish ( "*" ); |
|
396
|
0
|
|
|
|
|
|
$self->closedie ("Failure to parse server SASL response.\n"); |
|
397
|
|
|
|
|
|
|
} |
|
398
|
0
|
|
|
|
|
|
($challenge = $_) =~ s/^{\d+\+?}\r?\n?//; |
|
399
|
|
|
|
|
|
|
} |
|
400
|
0
|
|
|
|
|
|
$challenge = decode_base64($challenge); |
|
401
|
|
|
|
|
|
|
|
|
402
|
0
|
|
|
|
|
|
my $response = $authconversation->client_step($challenge); |
|
403
|
0
|
0
|
|
|
|
|
if ($authconversation->code()) { |
|
404
|
0
|
|
|
|
|
|
my $emsg = $authconversation->error(); |
|
405
|
0
|
|
|
|
|
|
$self->closedie("SASL Error: $emsg\n"); |
|
406
|
|
|
|
|
|
|
} |
|
407
|
0
|
0
|
|
|
|
|
$response = '' unless defined $response; # sigh |
|
408
|
0
|
|
|
|
|
|
my $senddata = encode_base64($response, ''); |
|
409
|
0
|
|
|
|
|
|
my $sendlen = length $senddata; |
|
410
|
0
|
|
|
|
|
|
$self->ssend ( "{$sendlen+}" ); |
|
411
|
|
|
|
|
|
|
# okay, we send a blank line here even for 0 length data |
|
412
|
0
|
|
|
|
|
|
$self->ssend ( $senddata ); |
|
413
|
0
|
|
|
|
|
|
$self->sget(); |
|
414
|
|
|
|
|
|
|
} |
|
415
|
|
|
|
|
|
|
|
|
416
|
0
|
0
|
|
|
|
|
if (/^NO((?:\s.*)?)$/) { |
|
417
|
0
|
|
|
|
|
|
$self->closedie_NOmsg("Authentication refused by server"); |
|
418
|
|
|
|
|
|
|
} |
|
419
|
0
|
0
|
|
|
|
|
if (/^OK\s+\(SASL\s+\"([^"]+)\"\)$/) { |
|
420
|
|
|
|
|
|
|
# This _should_ be pre_sent with server-verification steps which |
|
421
|
|
|
|
|
|
|
# in other profiles expect an empty response. But Authen::SASL |
|
422
|
|
|
|
|
|
|
# doesn't let us confirm that we've finished authentication! |
|
423
|
|
|
|
|
|
|
# The assumption seems to be that the server only verifies us |
|
424
|
|
|
|
|
|
|
# so if it says "okay", we don't keep trying. |
|
425
|
0
|
|
|
|
|
|
my $final_auth = decode_base64($1); |
|
426
|
0
|
|
|
|
|
|
my $valid = $authconversation->client_step($final_auth); |
|
427
|
|
|
|
|
|
|
# With Authen::SASL before 2.11 (..::Perl 1.06), |
|
428
|
|
|
|
|
|
|
# Authen::SASL::Perl::DIGEST-MD5 module will complain at this |
|
429
|
|
|
|
|
|
|
# final step: |
|
430
|
|
|
|
|
|
|
# Server did not provide required field(s): algorithm nonce |
|
431
|
|
|
|
|
|
|
# which is bogus -- it's not required or expected. |
|
432
|
|
|
|
|
|
|
# Authen::SASL 2.11 fixes this, with ..::Perl 1.06 |
|
433
|
|
|
|
|
|
|
# We explicitly permit silent failure with the security |
|
434
|
|
|
|
|
|
|
# implications because we require a new enough version of |
|
435
|
|
|
|
|
|
|
# Authen::SASL at import time above and if someone removes |
|
436
|
|
|
|
|
|
|
# that check, then on their head be it. |
|
437
|
0
|
0
|
|
|
|
|
if ($authconversation->code()) { |
|
438
|
0
|
|
|
|
|
|
my $emsg = $authconversation->error(); |
|
439
|
0
|
0
|
|
|
|
|
if ($Authen::SASL::Perl::VERSION >= 1.06) { |
|
440
|
0
|
|
|
|
|
|
$self->closedie("SASL Error: $emsg\n"); |
|
441
|
|
|
|
|
|
|
} |
|
442
|
|
|
|
|
|
|
} |
|
443
|
0
|
0
|
0
|
|
|
|
if (defined $valid and length $valid) { |
|
444
|
0
|
|
|
|
|
|
$self->closedie("Server failed final verification [$valid]"); |
|
445
|
|
|
|
|
|
|
} |
|
446
|
|
|
|
|
|
|
} |
|
447
|
|
|
|
|
|
|
|
|
448
|
|
|
|
|
|
|
} |
|
449
|
|
|
|
|
|
|
|
|
450
|
0
|
|
|
|
|
|
return $self; |
|
451
|
|
|
|
|
|
|
}; |
|
452
|
|
|
|
|
|
|
|
|
453
|
|
|
|
|
|
|
# destructor |
|
454
|
|
|
|
|
|
|
sub DESTROY { |
|
455
|
0
|
|
|
0
|
|
|
my $self = shift; |
|
456
|
|
|
|
|
|
|
|
|
457
|
0
|
0
|
|
|
|
|
$self->sfinish() if $self->{_sock}; |
|
458
|
|
|
|
|
|
|
} |
|
459
|
|
|
|
|
|
|
|
|
460
|
|
|
|
|
|
|
############# |
|
461
|
|
|
|
|
|
|
# public methods |
|
462
|
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
=head1 METHODS |
|
464
|
|
|
|
|
|
|
|
|
465
|
|
|
|
|
|
|
=head2 sock |
|
466
|
|
|
|
|
|
|
|
|
467
|
|
|
|
|
|
|
Usage : my $sock = $ServerSieve->sock(); |
|
468
|
|
|
|
|
|
|
Return : open socket |
|
469
|
|
|
|
|
|
|
Argument : nothing |
|
470
|
|
|
|
|
|
|
Purpose : access to socket |
|
471
|
|
|
|
|
|
|
|
|
472
|
|
|
|
|
|
|
=cut |
|
473
|
|
|
|
|
|
|
|
|
474
|
|
|
|
|
|
|
sub sock |
|
475
|
|
|
|
|
|
|
{ |
|
476
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
477
|
0
|
|
|
|
|
|
return $self->{_sock}; |
|
478
|
|
|
|
|
|
|
} |
|
479
|
|
|
|
|
|
|
|
|
480
|
|
|
|
|
|
|
=head2 capabilities |
|
481
|
|
|
|
|
|
|
|
|
482
|
|
|
|
|
|
|
Usage : my $script_capa = $ServerSieve->capabilities(); |
|
483
|
|
|
|
|
|
|
Return : string with white space separator |
|
484
|
|
|
|
|
|
|
Argument : nothing |
|
485
|
|
|
|
|
|
|
Purpose : retrieve sieve script capabilities |
|
486
|
|
|
|
|
|
|
|
|
487
|
|
|
|
|
|
|
=cut |
|
488
|
|
|
|
|
|
|
|
|
489
|
|
|
|
|
|
|
sub capabilities |
|
490
|
|
|
|
|
|
|
{ |
|
491
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
492
|
0
|
|
|
|
|
|
return $self->{_capa}; |
|
493
|
|
|
|
|
|
|
} |
|
494
|
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
=head2 list |
|
496
|
|
|
|
|
|
|
|
|
497
|
|
|
|
|
|
|
Usage : |
|
498
|
|
|
|
|
|
|
foreach my $script ( $ServerSieve->list() ) { |
|
499
|
|
|
|
|
|
|
print $script->{name}." ".$script->{status}."\n"; |
|
500
|
|
|
|
|
|
|
}; |
|
501
|
|
|
|
|
|
|
Return : array of hash with names and status scripts for current user |
|
502
|
|
|
|
|
|
|
Argument : nothing |
|
503
|
|
|
|
|
|
|
Purpose : list available scripts on server |
|
504
|
|
|
|
|
|
|
|
|
505
|
|
|
|
|
|
|
=cut |
|
506
|
|
|
|
|
|
|
|
|
507
|
|
|
|
|
|
|
sub list |
|
508
|
|
|
|
|
|
|
{ |
|
509
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
510
|
0
|
|
|
|
|
|
my @list_scripts; |
|
511
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
512
|
0
|
|
|
|
|
|
$self->ssend("LISTSCRIPTS"); |
|
513
|
0
|
|
|
|
|
|
$self->sget(); |
|
514
|
0
|
|
|
|
|
|
while (/^\"/) { |
|
515
|
0
|
|
|
|
|
|
my $line = $_; |
|
516
|
0
|
0
|
|
|
|
|
my $name = $1 if ($line =~ m/\"(.*?)\"/); |
|
517
|
0
|
0
|
|
|
|
|
my $status = ($line =~ m/ACTIVE/) ? 1 : 0; |
|
518
|
0
|
|
|
|
|
|
my %script = (name => $name, status => $status); |
|
519
|
0
|
|
|
|
|
|
push @list_scripts,\%script; |
|
520
|
0
|
|
|
|
|
|
$self->sget(); |
|
521
|
|
|
|
|
|
|
} |
|
522
|
|
|
|
|
|
|
|
|
523
|
0
|
|
|
|
|
|
return @list_scripts; |
|
524
|
|
|
|
|
|
|
} |
|
525
|
|
|
|
|
|
|
|
|
526
|
|
|
|
|
|
|
=head2 put |
|
527
|
|
|
|
|
|
|
|
|
528
|
|
|
|
|
|
|
Usage : $ServerSieve->put($name,$script); |
|
529
|
|
|
|
|
|
|
Return : 1 on success, 0 on missing name or script |
|
530
|
|
|
|
|
|
|
Argument : name, script |
|
531
|
|
|
|
|
|
|
Purpose : put script on server |
|
532
|
|
|
|
|
|
|
|
|
533
|
|
|
|
|
|
|
=cut |
|
534
|
|
|
|
|
|
|
|
|
535
|
|
|
|
|
|
|
sub put |
|
536
|
|
|
|
|
|
|
{ |
|
537
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
538
|
0
|
|
|
|
|
|
my $name = shift; |
|
539
|
0
|
|
|
|
|
|
my $script = shift; |
|
540
|
|
|
|
|
|
|
|
|
541
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
542
|
|
|
|
|
|
|
|
|
543
|
0
|
|
|
|
|
|
my $size = length($script); |
|
544
|
0
|
0
|
0
|
|
|
|
return 0 if (!$size || !$name); |
|
545
|
|
|
|
|
|
|
|
|
546
|
0
|
|
|
|
|
|
$self->ssend('PUTSCRIPT "'.$name.'" {'.$size.'+}'); |
|
547
|
0
|
|
|
|
|
|
$self->ssend('-noeol', $script); |
|
548
|
0
|
|
|
|
|
|
$self->ssend(''); |
|
549
|
0
|
|
|
|
|
|
$self->sget(); |
|
550
|
|
|
|
|
|
|
|
|
551
|
0
|
0
|
|
|
|
|
unless (/^OK((?:\s.*)?)$/) { |
|
552
|
0
|
|
|
|
|
|
warn "PUTSCRIPT(".$name.") failed: $_\n"; |
|
553
|
|
|
|
|
|
|
} |
|
554
|
|
|
|
|
|
|
|
|
555
|
0
|
|
|
|
|
|
return 1; |
|
556
|
|
|
|
|
|
|
} |
|
557
|
|
|
|
|
|
|
|
|
558
|
|
|
|
|
|
|
=head2 get |
|
559
|
|
|
|
|
|
|
|
|
560
|
|
|
|
|
|
|
Usage : my $script = $ServerSieve->get($name); |
|
561
|
|
|
|
|
|
|
Return : 0 on missing name, string with script on success |
|
562
|
|
|
|
|
|
|
Argument : name |
|
563
|
|
|
|
|
|
|
Purpose : put script on server |
|
564
|
|
|
|
|
|
|
|
|
565
|
|
|
|
|
|
|
=cut |
|
566
|
|
|
|
|
|
|
|
|
567
|
|
|
|
|
|
|
sub get |
|
568
|
|
|
|
|
|
|
{ |
|
569
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
570
|
0
|
|
|
|
|
|
my $name = shift; |
|
571
|
|
|
|
|
|
|
|
|
572
|
0
|
0
|
|
|
|
|
return 0 if (!$name); |
|
573
|
|
|
|
|
|
|
|
|
574
|
0
|
|
|
|
|
|
$self->ssend("GETSCRIPT \"$name\""); |
|
575
|
0
|
|
|
|
|
|
$self->sget(); |
|
576
|
0
|
0
|
|
|
|
|
if (/^NO((?:\s.*)?)$/) { |
|
577
|
0
|
|
|
|
|
|
die_NOmsg($1, qq{Script "$name" not returned by server}); |
|
578
|
|
|
|
|
|
|
} |
|
579
|
0
|
0
|
|
|
|
|
if (/^OK((?:\s.*)?)$/) { |
|
580
|
0
|
|
|
|
|
|
warn qq{Empty script "$name"? Not saved.\n}; |
|
581
|
0
|
|
|
|
|
|
return 0; |
|
582
|
|
|
|
|
|
|
} |
|
583
|
0
|
0
|
|
|
|
|
unless (/^\{(\d+)\+?}\r?$/m) { |
|
584
|
0
|
|
|
|
|
|
die "QUIT:Failed to parse server response to GETSCRIPT"; |
|
585
|
|
|
|
|
|
|
} |
|
586
|
0
|
|
|
|
|
|
my $contentdata = $_; |
|
587
|
0
|
|
|
|
|
|
$self->sget(); |
|
588
|
0
|
|
|
|
|
|
while (/^$/) { $self->sget(); } # extra newline but only for GETSCRIPT? |
|
|
0
|
|
|
|
|
|
|
|
589
|
0
|
0
|
|
|
|
|
unless (/^OK((?:\s.*)?)$/) { |
|
590
|
0
|
|
|
|
|
|
die_NOmsg($_, "Script retrieval not successful, not saving"); |
|
591
|
|
|
|
|
|
|
} |
|
592
|
0
|
|
|
|
|
|
$contentdata =~ s/^\{\d+\+?}\r?\n?//m; |
|
593
|
|
|
|
|
|
|
|
|
594
|
0
|
|
|
|
|
|
return $contentdata; |
|
595
|
|
|
|
|
|
|
} |
|
596
|
|
|
|
|
|
|
|
|
597
|
|
|
|
|
|
|
=head2 activate |
|
598
|
|
|
|
|
|
|
|
|
599
|
|
|
|
|
|
|
Usage : $ServerSieve->activate($name); |
|
600
|
|
|
|
|
|
|
Return : 0 on pb, 1 on success |
|
601
|
|
|
|
|
|
|
Argument : name |
|
602
|
|
|
|
|
|
|
Purpose : set named script active and switch other scripts to unactive |
|
603
|
|
|
|
|
|
|
|
|
604
|
|
|
|
|
|
|
=cut |
|
605
|
|
|
|
|
|
|
|
|
606
|
|
|
|
|
|
|
sub activate { |
|
607
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
608
|
0
|
|
|
|
|
|
my $name = shift; |
|
609
|
|
|
|
|
|
|
|
|
610
|
0
|
|
|
|
|
|
$self->ssend("SETACTIVE \"$name\""); |
|
611
|
0
|
|
|
|
|
|
$self->sget(); |
|
612
|
0
|
0
|
|
|
|
|
unless (/^OK((?:\s.*)?)$/) { |
|
613
|
0
|
|
|
|
|
|
warn "SETACTIVE($name) failed: $_\n"; |
|
614
|
0
|
|
|
|
|
|
return 0; |
|
615
|
|
|
|
|
|
|
} |
|
616
|
|
|
|
|
|
|
|
|
617
|
0
|
|
|
|
|
|
return 1; |
|
618
|
|
|
|
|
|
|
} |
|
619
|
|
|
|
|
|
|
|
|
620
|
|
|
|
|
|
|
=head2 deactivate |
|
621
|
|
|
|
|
|
|
|
|
622
|
|
|
|
|
|
|
Usage : $ServerSieve->deactivate(); |
|
623
|
|
|
|
|
|
|
Return : activate response |
|
624
|
|
|
|
|
|
|
Argument : nothing |
|
625
|
|
|
|
|
|
|
Purpose : stop sieve processing, deactivate all scripts |
|
626
|
|
|
|
|
|
|
|
|
627
|
|
|
|
|
|
|
=cut |
|
628
|
|
|
|
|
|
|
|
|
629
|
|
|
|
|
|
|
sub deactivate { |
|
630
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
631
|
|
|
|
|
|
|
|
|
632
|
0
|
|
|
|
|
|
return $self->activate(""); |
|
633
|
|
|
|
|
|
|
} |
|
634
|
|
|
|
|
|
|
|
|
635
|
|
|
|
|
|
|
=head2 delete |
|
636
|
|
|
|
|
|
|
|
|
637
|
|
|
|
|
|
|
Usage : $ServerSieve->delete($name); |
|
638
|
|
|
|
|
|
|
Return : 0 on missing name, 1 on success |
|
639
|
|
|
|
|
|
|
Argument : name |
|
640
|
|
|
|
|
|
|
Purpose : delete script on server |
|
641
|
|
|
|
|
|
|
|
|
642
|
|
|
|
|
|
|
=cut |
|
643
|
|
|
|
|
|
|
|
|
644
|
|
|
|
|
|
|
sub delete { |
|
645
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
646
|
0
|
|
|
|
|
|
my $name = shift; |
|
647
|
|
|
|
|
|
|
|
|
648
|
0
|
0
|
|
|
|
|
return 0 if (!$name); |
|
649
|
|
|
|
|
|
|
|
|
650
|
0
|
|
|
|
|
|
$self->ssend("DELETESCRIPT \"$name\""); |
|
651
|
0
|
|
|
|
|
|
$self->sget(); |
|
652
|
0
|
0
|
|
|
|
|
unless (/^OK((?:\s.*)?)$/) { |
|
653
|
0
|
|
|
|
|
|
warn "DELETESCRIPT($name) failed: $_\n"; |
|
654
|
0
|
|
|
|
|
|
return 0; |
|
655
|
|
|
|
|
|
|
} |
|
656
|
|
|
|
|
|
|
|
|
657
|
0
|
|
|
|
|
|
return 1; |
|
658
|
|
|
|
|
|
|
} |
|
659
|
|
|
|
|
|
|
|
|
660
|
|
|
|
|
|
|
################### |
|
661
|
|
|
|
|
|
|
# private methods |
|
662
|
|
|
|
|
|
|
#functions |
|
663
|
|
|
|
|
|
|
|
|
664
|
|
|
|
|
|
|
sub _parse_capabilities |
|
665
|
|
|
|
|
|
|
{ |
|
666
|
0
|
|
|
0
|
|
|
my $self = shift; |
|
667
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
668
|
0
|
|
|
|
|
|
local %_ = @_; |
|
669
|
0
|
|
|
|
|
|
my $external_first = 0; |
|
670
|
0
|
0
|
|
|
|
|
$external_first = $_{external_first} if exists $_{external_first}; |
|
671
|
|
|
|
|
|
|
|
|
672
|
0
|
|
|
|
|
|
my @double_checks; |
|
673
|
0
|
|
|
|
|
|
%raw_capabilities = (); |
|
674
|
0
|
|
|
|
|
|
%capa = (); |
|
675
|
0
|
|
|
|
|
|
while (<$sock>) { |
|
676
|
0
|
|
|
|
|
|
chomp; s/\s*$//; |
|
|
0
|
|
|
|
|
|
|
|
677
|
0
|
0
|
|
|
|
|
_received() unless /^OK\b/; |
|
678
|
0
|
0
|
|
|
|
|
if (/^OK\b/) { |
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
679
|
0
|
|
|
|
|
|
$self->sget('-firstline', $_); |
|
680
|
0
|
0
|
|
|
|
|
last unless exists $_{sent_a_noop}; |
|
681
|
|
|
|
|
|
|
# See large comment below in STARTTLS explaining the |
|
682
|
|
|
|
|
|
|
# resync problem to understand why this is here. |
|
683
|
0
|
|
|
|
|
|
my $end_tag = $_{sent_a_noop}; |
|
684
|
0
|
0
|
0
|
|
|
|
unless (defined $end_tag and length $end_tag) { |
|
685
|
|
|
|
|
|
|
# Default tag in absense of client-specified |
|
686
|
|
|
|
|
|
|
# tag MUST be NOOP (2.11.2. NOOP Command) |
|
687
|
0
|
|
|
|
|
|
$self->closedie("Internal error: sent_a_noop without tag\n"); |
|
688
|
|
|
|
|
|
|
} |
|
689
|
|
|
|
|
|
|
# Play crude, just look for the tag anywhere in the |
|
690
|
|
|
|
|
|
|
# response, honouring only word boundaries. It's our |
|
691
|
|
|
|
|
|
|
# responsibility to make the tag long enough that this |
|
692
|
|
|
|
|
|
|
# works without tokenising. |
|
693
|
0
|
0
|
|
|
|
|
if ($_ =~ m/\b\Q${end_tag}\E\b/) { |
|
694
|
0
|
|
|
|
|
|
return; |
|
695
|
|
|
|
|
|
|
} |
|
696
|
|
|
|
|
|
|
# Okay, that's the "server understands NOOP" case, for |
|
697
|
|
|
|
|
|
|
# which the server should have advertised the |
|
698
|
|
|
|
|
|
|
# capability prior to TLS (and so subject to |
|
699
|
|
|
|
|
|
|
# tampering); we play fast and loose, so have to cover |
|
700
|
|
|
|
|
|
|
# the NO case below too. |
|
701
|
|
|
|
|
|
|
} elsif (/^\"([^"]+)\"\s+\"(.*)\"$/) { |
|
702
|
0
|
|
|
|
|
|
my ($k, $v) = (uc($1), $2); |
|
703
|
0
|
0
|
|
|
|
|
unless (length $v) { |
|
704
|
0
|
0
|
|
|
|
|
unless (exists $capa_permit_empty{$k}) { |
|
705
|
0
|
|
|
|
|
|
warn "Empty \"$k\" capability spec not permitted: $_\n"; |
|
706
|
|
|
|
|
|
|
# Don't keep the advertised capability unless |
|
707
|
|
|
|
|
|
|
# it has some value which is needed. Eg, |
|
708
|
|
|
|
|
|
|
# NOTIFY must list a mechanism to be useful. |
|
709
|
0
|
|
|
|
|
|
next; |
|
710
|
|
|
|
|
|
|
} |
|
711
|
0
|
0
|
|
|
|
|
if (defined $capa_permit_empty{$k}) { |
|
712
|
0
|
|
|
|
|
|
push @double_checks, $capa_permit_empty{$k}; |
|
713
|
|
|
|
|
|
|
} |
|
714
|
|
|
|
|
|
|
} |
|
715
|
0
|
0
|
|
|
|
|
if (exists $capa{$k}) { |
|
716
|
|
|
|
|
|
|
# won't catch if the first instance was ignored for an |
|
717
|
|
|
|
|
|
|
# impermissably empty value; by this point though we |
|
718
|
|
|
|
|
|
|
# would already have issued a warning and the server |
|
719
|
|
|
|
|
|
|
# is so fubar that it's not worth worrying about. |
|
720
|
0
|
|
|
|
|
|
warn "Protocol violation. Already seen capability \"$k\".\n" . |
|
721
|
|
|
|
|
|
|
"Ignoring second instance and continuing.\n"; |
|
722
|
0
|
|
|
|
|
|
next; |
|
723
|
|
|
|
|
|
|
} |
|
724
|
0
|
|
|
|
|
|
$raw_capabilities{$k} = $v; |
|
725
|
0
|
|
|
|
|
|
$capa{$k} = $v; |
|
726
|
0
|
0
|
|
|
|
|
if (exists $capa_dosplit{$k}) { |
|
727
|
0
|
|
|
|
|
|
$capa{$k} = [ split /\s+/, $v ]; |
|
728
|
|
|
|
|
|
|
} |
|
729
|
|
|
|
|
|
|
} elsif (/^\"([^"]+)\"$/) { |
|
730
|
0
|
|
|
|
|
|
$raw_capabilities{$1} = ''; |
|
731
|
0
|
|
|
|
|
|
$capa{$1} = 1; |
|
732
|
|
|
|
|
|
|
} elsif (/^NO\b/) { |
|
733
|
|
|
|
|
|
|
#return if exists $_{until_see_no}; |
|
734
|
0
|
0
|
|
|
|
|
return if exists $_{sent_a_noop}; |
|
735
|
0
|
|
|
|
|
|
warn "Unhandled server line: $_\n" |
|
736
|
|
|
|
|
|
|
} elsif (/^BYE\b(.*)/) { |
|
737
|
|
|
|
|
|
|
#closedie_NOmsg( $1, |
|
738
|
0
|
|
|
|
|
|
die ( |
|
739
|
|
|
|
|
|
|
"Server said BYE when we expected capabilities.\n"); |
|
740
|
|
|
|
|
|
|
} else { |
|
741
|
0
|
|
|
|
|
|
warn "Unhandled server line: $_\n" |
|
742
|
|
|
|
|
|
|
} |
|
743
|
|
|
|
|
|
|
}; |
|
744
|
|
|
|
|
|
|
|
|
745
|
|
|
|
|
|
|
die ( "Server does not return SIEVE capability, unable to continue.\n" ) |
|
746
|
0
|
0
|
|
|
|
|
unless exists $capa{SIEVE}; |
|
747
|
|
|
|
|
|
|
warn "Server does not return IMPLEMENTATION capability.\n" |
|
748
|
0
|
0
|
|
|
|
|
unless exists $capa{IMPLEMENTATION}; |
|
749
|
|
|
|
|
|
|
|
|
750
|
0
|
|
|
|
|
|
foreach my $check_sub (@double_checks) { |
|
751
|
0
|
|
|
|
|
|
$check_sub->($sock, \%capa, \%raw_capabilities); |
|
752
|
|
|
|
|
|
|
} |
|
753
|
|
|
|
|
|
|
|
|
754
|
0
|
0
|
|
|
|
|
if (grep {lc($_) eq 'enotify'} @{$capa{SIEVE}}) { |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
755
|
0
|
0
|
|
|
|
|
unless (exists $capa{NOTIFY}) { |
|
756
|
0
|
|
|
|
|
|
warn "enotify extension present, NOTIFY capability missing\n" . |
|
757
|
|
|
|
|
|
|
"This violates MANAGESIEVE specification.\n" . |
|
758
|
|
|
|
|
|
|
"Continuing anyway.\n"; |
|
759
|
|
|
|
|
|
|
} |
|
760
|
|
|
|
|
|
|
} |
|
761
|
|
|
|
|
|
|
|
|
762
|
0
|
0
|
0
|
|
|
|
if (exists $capa{SASL} and $external_first |
|
|
|
|
0
|
|
|
|
|
|
763
|
0
|
|
|
|
|
|
and grep {uc($_) eq 'EXTERNAL'} @{$capa{SASL}}) { |
|
|
0
|
|
|
|
|
|
|
|
764
|
|
|
|
|
|
|
# We do two things. We shift the EXTERNAL to the head of the |
|
765
|
|
|
|
|
|
|
# list, suggesting that it's the server's preferred choice. |
|
766
|
|
|
|
|
|
|
# We then mess around inside the Authen::SASL::Perl::EXTERNAL |
|
767
|
|
|
|
|
|
|
# private stuff (name starts with an underscore) to bump up |
|
768
|
|
|
|
|
|
|
# its priority -- for some reason, the method which is not |
|
769
|
|
|
|
|
|
|
# interactive and says "use information already available" |
|
770
|
|
|
|
|
|
|
# is less favoured than some others. |
|
771
|
0
|
|
|
|
|
|
_debug("auth: shifting EXTERNAL to start of mechanism list"); |
|
772
|
0
|
|
|
|
|
|
my @sasl = ('EXTERNAL'); |
|
773
|
0
|
|
|
|
|
|
foreach (@{$capa{SASL}}) { |
|
|
0
|
|
|
|
|
|
|
|
774
|
0
|
0
|
|
|
|
|
push @sasl, $_ unless uc($_) eq 'EXTERNAL'; |
|
775
|
|
|
|
|
|
|
} |
|
776
|
0
|
|
|
|
|
|
$capa{SASL} = \@sasl; |
|
777
|
0
|
|
|
|
|
|
$raw_capabilities{SASL} = join(' ', @sasl); |
|
778
|
1
|
|
|
1
|
|
7
|
no warnings 'redefine'; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
829
|
|
|
779
|
0
|
|
|
0
|
|
|
$Authen::SASL::Perl::EXTERNAL::{_order} = sub { 10 }; |
|
|
0
|
|
|
|
|
|
|
|
780
|
|
|
|
|
|
|
} |
|
781
|
|
|
|
|
|
|
} |
|
782
|
|
|
|
|
|
|
|
|
783
|
|
|
|
|
|
|
sub _debug |
|
784
|
|
|
|
|
|
|
{ |
|
785
|
0
|
0
|
|
0
|
|
|
return unless $DEBUGGING; |
|
786
|
0
|
|
|
|
|
|
print STDERR "$_[0]\n"; |
|
787
|
|
|
|
|
|
|
} |
|
788
|
|
|
|
|
|
|
|
|
789
|
|
|
|
|
|
|
sub _diag { |
|
790
|
0
|
|
|
0
|
|
|
my ($prefix, $data) = @_; |
|
791
|
0
|
|
|
|
|
|
$data =~ s/\r/\\r/g; $data =~ s/\n/\\n/g; $data =~ s/\t/\\t/g; |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
792
|
0
|
|
|
|
|
|
$data =~ s/([^[:graph:] ])/sprintf("%%%02X", ord $1)/eg; |
|
|
0
|
|
|
|
|
|
|
|
793
|
0
|
|
|
|
|
|
_debug "$prefix $data"; |
|
794
|
|
|
|
|
|
|
} |
|
795
|
0
|
0
|
|
0
|
|
|
sub _sent { my $t = defined $_[0] ? $_[0] : $_; _diag('>>>', $t) } |
|
|
0
|
|
|
|
|
|
|
|
796
|
0
|
0
|
|
0
|
|
|
sub _received { my $t = defined $_[0] ? $_[0] : $_; _diag('<<<', $t) } |
|
|
0
|
|
|
|
|
|
|
|
797
|
|
|
|
|
|
|
|
|
798
|
|
|
|
|
|
|
#sub _sent { $_[0] = $_ unless defined $_[0]; _debug ">>> $_[0]"; } |
|
799
|
|
|
|
|
|
|
#sub _received { $_[0] = $_ unless defined $_[0]; _debug "<<< $_[0]"; } |
|
800
|
|
|
|
|
|
|
|
|
801
|
|
|
|
|
|
|
# ###################################################################### |
|
802
|
|
|
|
|
|
|
# minor public routines |
|
803
|
|
|
|
|
|
|
|
|
804
|
|
|
|
|
|
|
=head1 Minor public methods |
|
805
|
|
|
|
|
|
|
|
|
806
|
|
|
|
|
|
|
=head2 ssend |
|
807
|
|
|
|
|
|
|
|
|
808
|
|
|
|
|
|
|
Usage : $self->ssend("GETSCRIPT \"$name\""); |
|
809
|
|
|
|
|
|
|
|
|
810
|
|
|
|
|
|
|
=cut |
|
811
|
|
|
|
|
|
|
|
|
812
|
|
|
|
|
|
|
sub ssend |
|
813
|
|
|
|
|
|
|
{ |
|
814
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
815
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
816
|
|
|
|
|
|
|
|
|
817
|
0
|
|
|
|
|
|
my $eol = "\r\n"; |
|
818
|
0
|
0
|
0
|
|
|
|
if (defined $_[0] and $_[0] eq '-noeol') { |
|
819
|
0
|
|
|
|
|
|
shift; |
|
820
|
0
|
|
|
|
|
|
$eol = ''; |
|
821
|
|
|
|
|
|
|
} |
|
822
|
0
|
|
|
|
|
|
foreach my $l (@_) { |
|
823
|
0
|
|
|
|
|
|
$sock->print("$l$eol"); |
|
824
|
|
|
|
|
|
|
# yes, the _debug output can have extra blank lines if supplied -noeol because |
|
825
|
|
|
|
|
|
|
# they're already pre_sent. Rather than mess around to tidy it up, I'm leaving |
|
826
|
|
|
|
|
|
|
# it because it's _debug output, not UI or protocol text. |
|
827
|
0
|
|
|
|
|
|
_sent ( "$l$eol" ); |
|
828
|
|
|
|
|
|
|
} |
|
829
|
|
|
|
|
|
|
} |
|
830
|
|
|
|
|
|
|
|
|
831
|
|
|
|
|
|
|
=head2 sget |
|
832
|
|
|
|
|
|
|
|
|
833
|
|
|
|
|
|
|
Usage: |
|
834
|
|
|
|
|
|
|
$self->sget(); |
|
835
|
|
|
|
|
|
|
unless (/^OK((?:\s.*)?)$/) { |
|
836
|
|
|
|
|
|
|
warn "SETACTIVE($name) failed: $_\n"; |
|
837
|
|
|
|
|
|
|
return 0; |
|
838
|
|
|
|
|
|
|
} |
|
839
|
|
|
|
|
|
|
|
|
840
|
|
|
|
|
|
|
=cut |
|
841
|
|
|
|
|
|
|
|
|
842
|
|
|
|
|
|
|
sub sget |
|
843
|
|
|
|
|
|
|
{ |
|
844
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
845
|
0
|
|
|
|
|
|
my $l = undef; |
|
846
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
847
|
0
|
|
|
|
|
|
my $dochomp = 1; |
|
848
|
0
|
|
|
|
|
|
while (@_) { |
|
849
|
0
|
|
|
|
|
|
my $t = shift; |
|
850
|
0
|
0
|
|
|
|
|
next unless defined $t; |
|
851
|
0
|
0
|
|
|
|
|
if ($t eq '-nochomp') { $dochomp = 0; next; } |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
852
|
0
|
0
|
|
|
|
|
if ($t eq '-firstline') { |
|
853
|
0
|
0
|
|
|
|
|
die "Missing sget -firstline parameter" |
|
854
|
|
|
|
|
|
|
unless defined $_[0]; |
|
855
|
0
|
|
|
|
|
|
$l = $_[0]; |
|
856
|
0
|
|
|
|
|
|
shift; |
|
857
|
0
|
|
|
|
|
|
next; |
|
858
|
|
|
|
|
|
|
} |
|
859
|
0
|
|
|
|
|
|
die "Unknown sget parameter [$t]"; |
|
860
|
|
|
|
|
|
|
} |
|
861
|
0
|
0
|
|
|
|
|
$l = $sock->getline() unless defined $l; |
|
862
|
0
|
0
|
|
|
|
|
unless (defined $l) { |
|
863
|
0
|
|
|
|
|
|
_debug "... no line read, connection dropped?"; |
|
864
|
0
|
|
|
|
|
|
die "Connection dropped unexpectedly when trying to read.\n"; |
|
865
|
|
|
|
|
|
|
} |
|
866
|
0
|
0
|
|
|
|
|
if ($l =~ /{(\d+)\+?}\s*\n?\z/) { |
|
867
|
0
|
|
|
|
|
|
_debug("... literal string response, length $1"); |
|
868
|
0
|
|
|
|
|
|
my $len = $1; |
|
869
|
0
|
0
|
|
|
|
|
if ($len == 0) { |
|
870
|
0
|
|
|
|
|
|
my $discard = $sock->getline(); |
|
871
|
|
|
|
|
|
|
} else { |
|
872
|
0
|
|
|
|
|
|
while ($len > 0) { |
|
873
|
0
|
|
|
|
|
|
my $extra = $sock->getline(); |
|
874
|
0
|
|
|
|
|
|
$len -= length($extra); |
|
875
|
0
|
|
|
|
|
|
$l .= $extra; |
|
876
|
|
|
|
|
|
|
} |
|
877
|
|
|
|
|
|
|
} |
|
878
|
0
|
|
|
|
|
|
$dochomp = 0; |
|
879
|
|
|
|
|
|
|
} |
|
880
|
0
|
0
|
|
|
|
|
if ($dochomp) { |
|
881
|
0
|
|
|
|
|
|
chomp $l; $l =~ s/\s*$//; |
|
|
0
|
|
|
|
|
|
|
|
882
|
|
|
|
|
|
|
} |
|
883
|
0
|
|
|
|
|
|
_received($l); |
|
884
|
0
|
0
|
|
|
|
|
if (defined wantarray) { |
|
885
|
0
|
|
|
|
|
|
return $l; |
|
886
|
|
|
|
|
|
|
} else { |
|
887
|
0
|
|
|
|
|
|
$_ = $l; |
|
888
|
|
|
|
|
|
|
} |
|
889
|
|
|
|
|
|
|
} |
|
890
|
|
|
|
|
|
|
|
|
891
|
|
|
|
|
|
|
=head2 sfinish |
|
892
|
|
|
|
|
|
|
|
|
893
|
|
|
|
|
|
|
send LOGOUT |
|
894
|
|
|
|
|
|
|
|
|
895
|
|
|
|
|
|
|
=cut |
|
896
|
|
|
|
|
|
|
|
|
897
|
|
|
|
|
|
|
sub sfinish |
|
898
|
|
|
|
|
|
|
{ |
|
899
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
900
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
901
|
0
|
0
|
|
|
|
|
if (defined $_[0]) { |
|
902
|
0
|
|
|
|
|
|
$self->ssend($_[0]); |
|
903
|
0
|
|
|
|
|
|
$self->sget(); |
|
904
|
|
|
|
|
|
|
} |
|
905
|
0
|
|
|
|
|
|
$self->ssend("LOGOUT"); |
|
906
|
0
|
|
|
|
|
|
$self->sget(); |
|
907
|
0
|
0
|
|
|
|
|
if (/^OK/) { |
|
908
|
0
|
|
|
|
|
|
undef $self->{_sock}; |
|
909
|
0
|
|
|
|
|
|
return 1; |
|
910
|
|
|
|
|
|
|
}; |
|
911
|
|
|
|
|
|
|
} |
|
912
|
|
|
|
|
|
|
|
|
913
|
|
|
|
|
|
|
=head2 closedie |
|
914
|
|
|
|
|
|
|
|
|
915
|
|
|
|
|
|
|
send LOGOUT and die |
|
916
|
|
|
|
|
|
|
|
|
917
|
|
|
|
|
|
|
=cut |
|
918
|
|
|
|
|
|
|
|
|
919
|
|
|
|
|
|
|
sub closedie |
|
920
|
|
|
|
|
|
|
{ |
|
921
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
922
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
923
|
0
|
|
|
|
|
|
my $e = $!; |
|
924
|
0
|
|
|
|
|
|
$self->sfinish(); |
|
925
|
0
|
|
|
|
|
|
$! = $e; |
|
926
|
0
|
|
|
|
|
|
die @_; |
|
927
|
|
|
|
|
|
|
} |
|
928
|
|
|
|
|
|
|
|
|
929
|
|
|
|
|
|
|
=head2 closedie_NOmsg |
|
930
|
|
|
|
|
|
|
|
|
931
|
|
|
|
|
|
|
closedie whitout message |
|
932
|
|
|
|
|
|
|
|
|
933
|
|
|
|
|
|
|
=cut |
|
934
|
|
|
|
|
|
|
|
|
935
|
|
|
|
|
|
|
sub closedie_NOmsg |
|
936
|
|
|
|
|
|
|
{ |
|
937
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
|
938
|
0
|
|
|
|
|
|
my $sock = $self->{_sock}; |
|
939
|
0
|
|
|
|
|
|
my $suffix = shift; |
|
940
|
0
|
|
|
|
|
|
$self->sfinish(); |
|
941
|
0
|
|
|
|
|
|
die $suffix; |
|
942
|
|
|
|
|
|
|
} |
|
943
|
|
|
|
|
|
|
|
|
944
|
|
|
|
|
|
|
=head2 die_NOmsg |
|
945
|
|
|
|
|
|
|
|
|
946
|
|
|
|
|
|
|
die |
|
947
|
|
|
|
|
|
|
|
|
948
|
|
|
|
|
|
|
=cut |
|
949
|
|
|
|
|
|
|
|
|
950
|
|
|
|
|
|
|
sub die_NOmsg |
|
951
|
|
|
|
|
|
|
{ |
|
952
|
0
|
|
|
0
|
1
|
|
my $suffix = shift; |
|
953
|
0
|
|
|
|
|
|
my $msg = shift; |
|
954
|
0
|
0
|
|
|
|
|
if (length $suffix) { |
|
955
|
0
|
|
|
|
|
|
$msg .= ':' . $suffix . "\n"; |
|
956
|
|
|
|
|
|
|
} else { |
|
957
|
0
|
|
|
|
|
|
$msg .= ".\n"; |
|
958
|
|
|
|
|
|
|
} |
|
959
|
0
|
|
|
|
|
|
die $msg; |
|
960
|
|
|
|
|
|
|
} |
|
961
|
|
|
|
|
|
|
|
|
962
|
|
|
|
|
|
|
|
|
963
|
|
|
|
|
|
|
=head1 BUGS |
|
964
|
|
|
|
|
|
|
|
|
965
|
|
|
|
|
|
|
I don't try plain text or client certificate authentication. |
|
966
|
|
|
|
|
|
|
|
|
967
|
|
|
|
|
|
|
You can debug TLS connexion with openssl : |
|
968
|
|
|
|
|
|
|
|
|
969
|
|
|
|
|
|
|
openssl s_client -connect your.server.org:2000 -tls1 -CApath /etc/apache/ssl.crt/somecrt.crt -starttls imap |
|
970
|
|
|
|
|
|
|
|
|
971
|
|
|
|
|
|
|
See response in C |
|
972
|
|
|
|
|
|
|
|
|
973
|
|
|
|
|
|
|
Or with gnutls-cli |
|
974
|
|
|
|
|
|
|
|
|
975
|
|
|
|
|
|
|
gnutls-cli -s -p 4190 --crlf --insecure your.server.org |
|
976
|
|
|
|
|
|
|
|
|
977
|
|
|
|
|
|
|
Use Ctrl+D after STARTTLS to begin TLS negotiation |
|
978
|
|
|
|
|
|
|
|
|
979
|
|
|
|
|
|
|
=head1 SUPPORT |
|
980
|
|
|
|
|
|
|
|
|
981
|
|
|
|
|
|
|
Please report any bugs or feature requests to "bug-net-sieve at rt.cpan.org", or through the web interface at L. I will be notified, and then you'll automatically be notified of progress on your bug as I make changes. |
|
982
|
|
|
|
|
|
|
|
|
983
|
|
|
|
|
|
|
=head1 AUTHOR |
|
984
|
|
|
|
|
|
|
|
|
985
|
|
|
|
|
|
|
Yves Agostini |
|
986
|
|
|
|
|
|
|
|
|
987
|
|
|
|
|
|
|
=head1 COPYRIGHT |
|
988
|
|
|
|
|
|
|
|
|
989
|
|
|
|
|
|
|
Copyright 2008-2017 Yves Agostini - |
|
990
|
|
|
|
|
|
|
|
|
991
|
|
|
|
|
|
|
This program is free software; you can redistribute |
|
992
|
|
|
|
|
|
|
it and/or modify it under the same terms as Perl itself. |
|
993
|
|
|
|
|
|
|
|
|
994
|
|
|
|
|
|
|
The full text of the license can be found in the |
|
995
|
|
|
|
|
|
|
LICENSE file included with this module. |
|
996
|
|
|
|
|
|
|
|
|
997
|
|
|
|
|
|
|
B source code is under a BSD-style license and re-licensed for Net::Sieve with permission of the author. |
|
998
|
|
|
|
|
|
|
|
|
999
|
|
|
|
|
|
|
=head1 SEE ALSO |
|
1000
|
|
|
|
|
|
|
|
|
1001
|
|
|
|
|
|
|
L |
|
1002
|
|
|
|
|
|
|
|
|
1003
|
|
|
|
|
|
|
=cut |
|
1004
|
|
|
|
|
|
|
|
|
1005
|
|
|
|
|
|
|
#################### main pod documentation end ################### |
|
1006
|
|
|
|
|
|
|
|
|
1007
|
|
|
|
|
|
|
|
|
1008
|
|
|
|
|
|
|
1; |
|
1009
|
|
|
|
|
|
|
# The preceding line will help the module return a true value |
|
1010
|
|
|
|
|
|
|
|