System.Net.Mail.SmtpClient 无法针对 POP3 服务器进行身份验证,对吧?
我们的一位客户似乎拥有一个非常古老的电子邮件系统,该系统要求您在允许您通过 SMTP 服务器发送消息之前先通过 POP3 服务器进行身份验证。遗憾的是,我们必须相信客户告诉我们的内容,因为我们无法访问他们的设施。但据我记得,几年前有一些邮件系统,一旦您登录到 POP3,STMP 服务器就会对客户端 IP 保持开放几分钟。
我们的应用程序使用 System.Net.Mail.SmtpClient 发送消息,但它似乎无法对这些类型的服务器进行身份验证。这是正确的吗?如果是这样,最简单的解决方法是什么?我正在考虑一个最小的 POP3 实现(只是协议的登录部分)。那行得通吗?
提前致谢。
One of our customer seems to have a very old email system, those that ask you to authenticate to the POP3 server before allowing you to send messages through the SMTP server. Regrettably, we have to believe in what our customer tell us for we cannot access their facilities. But as far as I remember, years ago there were mail systems that once you log into the POP3, the STMP server is kept open for a few minutes for the client IP.
Our application sends messages by using System.Net.Mail.SmtpClient which seems to be unable to authenticate to those kinds of servers. Is that correct? If so, what would be the simplest workaround? I was thinking of a minimal POP3 implementation (just the login part of the protocol). Would that work?
Thanks in advance.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
可能的答案是:“不”,即使该组件很早就支持它,它也很早就被删除了。为什么?
我曾研究过各种 IMAP 之前的电子邮件系统,但从未研究过其中任何一种。
但我记得有人将其联系在一起,因为 POP 客户端用户可以轻松地完成这项工作。
听起来您已经能够将解决方法应用于现有环境,POP 是一个非常简单的协议,RFC 说(等等...等等)。
我希望在解决眼前的问题后,您可以将它们迁移到更安全的地方。
我不再做邮件安全了,但有几个要点:
POP 使用密码,如果您处于编程环境中,它可能不是很强(POP3 时代的许多密码库都会对前 8 个字符进行哈希处理,即使他们接受更长的密码)并且必须进行硬编码。
POP 连接几乎肯定没有加密。 (可能有带有 SSL 的 POP 的独立部署,但业界花了很长时间才让 IMAP 通过 SSL 工作,我怀疑加密的 POP 环境在加密上是否安全)。所有这一切都是 TLS 之前的时代。
最后,打开瞬态 IP 级开放 SMTP 中继,可能听起来很安全,但仍然很危险,特别是因为那些真正想扰乱你网络的人喜欢这个东西。这意味着真正基础的黑客无法使用该网关,但他们可以。
Likely answer: "No", and even if the component supported it very early on, it was removed long ago. Why?
I worked on a wide variety of pre-IMAP email systems, but never worked on one of these.
But my recollection was there were people that linked this together, because POP client users could easily make this work.
It sounds like you have been able to apply a workaround to your existing environment, POP is a very simple protocol, the RFC says (blah...blah).
I hope that after solving the immediate problem, you can migrate them to something more secure.
I don't do mail security anymore, but a couple important points:
POP uses passwords, and if you are in a programmatic environment, it probably wasn't very strong (many password libraries in the POP3 days hashed the first 8 characters even if they accepted longer passwords) and will have to be hardcoded.
The POP connection is almost certainly not encrypted. (There may have been isolated deployments of POP w/ SSL, but it took the industry so long to get IMAP working over SSL, I doubt an encrypted POP environment is cryptographically secure). All of this is the pre-TLS era.
Last of all, opening transient IP-level open SMTP relay, might sound safe, but is still dangerous, especially because the people who really want to mess with you network love this stuff. It means really basic hackers can't use the gateway, but they can.