diff --git a/.env.template b/.env.template index 0189cc7a..7417d0ba 100644 --- a/.env.template +++ b/.env.template @@ -525,6 +525,13 @@ ## Only use this as a last resort if you are not able to use a valid certificate. # SMTP_ACCEPT_INVALID_HOSTNAMES=false +## Accept additional root certs +## Paths to PEM files, separated by semicolons +# SMTP_ADDITIONAL_ROOT_CERTS= + +## Use system root certificate store for TLS host verification +# SMTP_USE_SYSTEM_ROOT_CERTS=true + ########################## ### Rocket settings ### ########################## diff --git a/src/config.rs b/src/config.rs index 489a229d..a4470aea 100644 --- a/src/config.rs +++ b/src/config.rs @@ -674,6 +674,10 @@ make_config! { smtp_accept_invalid_certs: bool, true, def, false; /// Accept Invalid Hostnames (Know the risks!) |> DANGEROUS: Allow invalid hostnames. This option introduces significant vulnerabilities to man-in-the-middle attacks! smtp_accept_invalid_hostnames: bool, true, def, false; + /// Accept additional root certs |> Paths to PEM files, separated by semicolons + smtp_additional_root_certs: String, true, option; + /// Use system root certificate store for TLS host verification + smtp_use_system_root_certs: bool, true, def, true; }, /// Email 2FA Settings diff --git a/src/mail.rs b/src/mail.rs index 151554a1..a481df08 100644 --- a/src/mail.rs +++ b/src/mail.rs @@ -1,12 +1,13 @@ use std::str::FromStr; use chrono::NaiveDateTime; +use once_cell::sync::Lazy; use percent_encoding::{percent_encode, NON_ALPHANUMERIC}; use lettre::{ message::{Attachment, Body, Mailbox, Message, MultiPart, SinglePart}, transport::smtp::authentication::{Credentials, Mechanism as SmtpAuthMechanism}, - transport::smtp::client::{Tls, TlsParameters}, + transport::smtp::client::{Certificate, CertificateStore, Tls, TlsParameters}, transport::smtp::extension::ClientId, Address, AsyncSendmailTransport, AsyncSmtpTransport, AsyncTransport, Tokio1Executor, }; @@ -29,6 +30,21 @@ fn sendmail_transport() -> AsyncSendmailTransport { } } +static SMTP_ADDITIONAL_ROOT_CERTS: Lazy>> = Lazy::new(|| { + Some( + CONFIG + .smtp_additional_root_certs()? + .split(';') + .filter(|path| !path.is_empty()) + .map(|path| { + let cert = std::fs::read(path) + .unwrap_or_else(|e| panic!("Error loading additional SMTP root certificate file {path}.\n{e}")); + Certificate::from_pem(&cert).unwrap_or_else(|e| panic!("Error decoding certificate file {path}.\n{e}")) + }) + .collect(), + ) +}); + fn smtp_transport() -> AsyncSmtpTransport { use std::time::Duration; let host = CONFIG.smtp_host().unwrap(); @@ -46,6 +62,14 @@ fn smtp_transport() -> AsyncSmtpTransport { if CONFIG.smtp_accept_invalid_certs() { tls_parameters = tls_parameters.dangerous_accept_invalid_certs(true); } + if let Some(ref certs) = *SMTP_ADDITIONAL_ROOT_CERTS { + for cert in certs { + tls_parameters = tls_parameters.add_root_certificate(cert.clone()); + } + } + if !CONFIG.smtp_use_system_root_certs() { + tls_parameters = tls_parameters.certificate_store(CertificateStore::None); + } let tls_parameters = tls_parameters.build().unwrap(); if CONFIG.smtp_security() == *"force_tls" {