【失败尝试】自研SMTP服务器前置中间件

Security Classification: 【C-1】 | Publish Time:2024-06-26 | Category:Coding | Edit
Old Version | Diff | Latest Version
Expiry Notice: The article was published three months ago. Please independently assess the validity of the technical methods and code mentioned within. :)

AI Summary: 本文讨论了在使用内网穿透的情况下,如何解决邮件发送和接收中的IP地址异常问题。由于内网穿透导致发件人IP与SPF记录不一致,邮件可能被标记为垃圾邮件,且关闭SPF会带来邮件伪造的风险。为解决这些问题,作者提出了自研SMTP服务器前置中间件的方案,通过接管邮件服务器的25端口流量并进行透传来处理邮件。 在实现中,作者尝试解析TLS流量以获取明文邮件内容,但发现现代邮件服务提供商通常要求使用TLS加密。为此,作者尝试通过修改ClientHello环节的加密套件列表来强制降级TLS连接,成功接收到明文流量。然与Gmail的TLS 1.3协议不兼容,导致无法降级并获取邮件信息。 最终,作者意识到邮件伪造问题难以解决,因此放弃了使用群晖MailPlus与内网穿透的方案,尽管在此过程中学习了网络原理与协议解析的相关知识。 --- (From Model:gpt-4o-mini-2024-07-18)


Web3 Info

The ownership of the data in this article is secured by blockchain encryption technology and smart contracts, and is solely owned by the creator.


Comment List

© Copyright: This article is an original work and the copyright belongs to the  Depy's docs  unless marked as Reproduced

Please contact the blogger for authorization to reprint


『📕Category 』