# SMTP request mode
The following is the session process. For detailed code examples, please go to here
S: 220 SendCloud Inbound Server ESMTP Haraka 2.2.4 ready
C: ehlo ifaxin.com
S: 250-SendCloud Inbound Server Hello, Haraka is at your service.
S: 250-PIPELINING
S: 250-8BITMIME
S: 250-SIZE 16000000
S: 250 AUTH LOGIN
C: AUTH LOGIN base64(api_user)
S: 334 UGFzc3dvcmQ6
C: base64(api_key)
S: 235 Authentication successful
C: mail FROM:<support@ifaxin.com>
S: 250 sender <support@ifaxin.com> OK
C: rcpt TO:<ben@ifaxin.com>
S: 250 recipient <ben@ifaxin.com> OK
C: data
S: 354 go ahead, make my day
C: ... ...
C: .
S: 250 #1426390015358_15_6484_8661.sc-10_10_127_51-inbound#Queued
C: quit
S: 221 SendCloud Inbound Server closing connection. Have a jolly good day
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Note
: the SMTP call returns 536 frequency limited, which means that the total number of API and SMTP calls per apiuser per minute cannot exceed 20000 times.
# Using label function for SMTP access
When verify , the label ID splicing after API_USER .
api_user + '#' + label_id
Without label:
S: 250-SendCloud Inbound Server Hello, Haraka is at your service.
S: 250-PIPELINING
S: 250-8BITMIME
S: 250-SIZE 16000000
S: 250-STARTTLS
S: 250 AUTH LOGIN
C: AUTH LOGIN base64(api_user)
2
3
4
5
6
7
8
With label:
S: 250-SendCloud Inbound Server Hello, Haraka is at your service.
S: 250-PIPELINING
S: 250-8BITMIME
S: 250-SIZE 16000000
S: 250-STARTTLS
S: 250 AUTH LOGIN
C: AUTH LOGIN base64(api_user + '#' + label_id)
2
3
4
5
6
7
8
python code snippet :
# without label:
s = SMTP('%s:%d' % (HOST, PORT))
s.set_debuglevel(DEBUG_MODE)
if USE_SSL:
s.starttls()
s.login(API_USER, API_KEY)
# with label:
s = SMTP('%s:%d' % (HOST, PORT))
s.set_debuglevel(DEBUG_MODE)
if USE_SSL:
s.starttls()
s.login(API_USER + '#' + label_id, API_KEY)
2
3
4
5
6
7
8
9
10
11
12
13
# Send embedded pictures by SMTP
Code examples :
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from email.mime.image import MIMEImage
import smtplib
class MyEmail:
def __init__(self):
self.smtp = smtplib.SMTP()
self.login_username = 'postmaster@testdomain.sendcloud.org'
self.login_password = '*****'
self.sender = 'postmaster@testdomain.sendcloud.org' # same as login_username
self.receiver = 'test123@qq.com'
self.host = 'smtp.sendcloud.net'
self.port = 25
def connect(self):
self.smtp.connect(self.host)
def login(self):
self.smtp.login(self.login_username, self.login_password)
def send(self):
msg = MIMEMultipart('related')
msg['From'] = self.sender
msg['To'] = self.receiver
email_title = 'python test inline image'
msg['Subject'] = email_title
content = MIMEText('test image content <img src="cid:image1" alt="xxxxx">', 'html', 'utf-8')
msg.attach(content)
fp = open('./test.png','rb')
img = MIMEImage(fp.read())
img.add_header('Content-ID','image1') #the value of content-id is the cid in html
msg.attach(img)
self.smtp.sendmail(self.sender, self.receiver, msg.as_string())
def quit(self):
self.smtp.quit()
def send():
myemail = MyEmail()
myemail.connect()
myemail.login()
myemail.send()
myemail.quit()
if __name__ == "__main__":
send()
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
# SMTP protocol requests sending mail encrypted
The hole vulnerability indicates that SSL V3.0 is completely insecure now, so users can access the encryption protocol through SMTP, which supports tls-v1.0-v1.2, and does not support SSL 3.0 or earlier. Ports 25 / 2525 / 587 all support starttls encryption. Users need to add a piece of encryption code to the code, such as Java language props.setProperty("mail.smtp.starttls.enable", "true");