CN111698242A - Mail forward proxy method, device, system, storage medium and electronic equipment - Google Patents

Mail forward proxy method, device, system, storage medium and electronic equipment Download PDF

Info

Publication number
CN111698242A
CN111698242A CN202010520251.8A CN202010520251A CN111698242A CN 111698242 A CN111698242 A CN 111698242A CN 202010520251 A CN202010520251 A CN 202010520251A CN 111698242 A CN111698242 A CN 111698242A
Authority
CN
China
Prior art keywords
sending
user information
mail
target
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010520251.8A
Other languages
Chinese (zh)
Inventor
苏赛
李育国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010520251.8A priority Critical patent/CN111698242A/en
Publication of CN111698242A publication Critical patent/CN111698242A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure relates to a method, an apparatus, a system, a storage medium and an electronic device for forward proxy of a mail, the method comprising: receiving user information sent by a sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment; determining whether the user information is target user information for sending the mail; and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server. Therefore, the user information sent outwards can be preliminarily verified, so that preliminary filtering of the user information is achieved, safety of data in an intranet environment is guaranteed, and meanwhile mail interaction is achieved. Moreover, technical support can be provided for ensuring the safety of data and avoiding internal data leakage.

Description

Mail forward proxy method, device, system, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of communications, and in particular, to a method, an apparatus, a system, a storage medium, and an electronic device for forward proxy of a mail.
Background
With the development of computer technology and network technology, security of user data is also more and more important, especially for enterprise users. In order to avoid leakage of data inside an enterprise, the enterprise service privatization can be deployed in a network island environment, or corresponding setting is performed on an intranet environment of the enterprise, so that the security of the data inside the enterprise is ensured. In this case, the network request needs to communicate with the external through proxy or gateway forwarding, for example, by means of HTTP, RPC (remote procedure Call) network, while the SMTP (Simple mail transfer protocol) protocol used for sending the mail cannot directly establish connection with the mail server when sending the mail.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In a first aspect, the present disclosure provides a mail forward proxy method, the method comprising:
receiving user information sent by a sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
determining whether the user information is target user information for sending the mail;
and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server.
In a second aspect, there is provided a mail forward proxy apparatus, the apparatus comprising:
the receiving module is used for receiving the user information sent by the sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
the determining module is used for determining whether the user information is target user information used for sending the mail;
and the sending module is used for sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information so as to forward the mail based on the target sending server.
In a third aspect, a mail agent system is provided, the system comprising:
the sending client is communicated with the sending proxy server and used for sending the user information and the mail to be sent to the sending proxy server;
a dispatch proxy server in communication with the dispatch client and the dispatch server for performing the steps of the method of the first aspect;
and the sending server is communicated with the sending proxy server and is used for verifying the user information sent by the sending proxy server and forwarding the mail.
In a fourth aspect, a computer-readable medium is provided, on which a computer program is stored which, when being executed by a processing device, carries out the steps of the method of the first aspect.
In a fifth aspect, an electronic device is provided, comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to carry out the steps of the method of the first aspect.
In the technical scheme, under the condition of establishing connection with a sending client, receiving user information sent by the sending client to determine whether the user information is target user information for sending a mail; and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server. Therefore, through the technical scheme, the user information sent outwards can be preliminarily verified, so that the preliminary filtering of the user information is realized, the safety of data in an intranet environment is guaranteed, and meanwhile, the mail interaction is realized. And when the mail is sent to the outside, the mail is sent to the corresponding target sending server for forwarding, so that corresponding safety analysis or detection can be carried out on the mail sent to the outside by the target sending server, and technical support is provided for ensuring the safety of data and avoiding internal data leakage.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow diagram of a mail forward proxy method provided in accordance with one embodiment of the present disclosure;
fig. 2 is a signaling interaction diagram between a sending client and a sending proxy server and a target sending server provided according to an embodiment of the present disclosure;
FIG. 3 is a flow diagram of an exemplary implementation of sending a mail to a target delivery server for user information provided in accordance with one embodiment of the present disclosure;
FIG. 4 is a block diagram of a mail forward proxy device provided in accordance with one embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device provided according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Fig. 1 is a flowchart of a mail forward proxy method provided according to an embodiment of the present disclosure, and as shown in fig. 1, the method may be applied to a sending proxy server to implement a mail forward proxy from a sending client to a target sending server, where the method includes:
in step 11, in the case of establishing a connection with a sending client, user information sent by the sending client is received, wherein the sending client is in an intranet environment.
As an example, as shown in fig. 2, it is a signaling interaction diagram between the sending client and the sending proxy server, target sending server. In S1, a TCP (transmission control Protocol) connection is established between the sending client 10 and the sending proxy server 20, and then the sending proxy server 20 returns a response message to the sending client 10, where the response message is used to determine whether the sending proxy server 20 can send a sending request to the sending client 10 at this time, if so, the sending proxy server 20 sends a status code 220 carried in the response message to the sending client 10 to indicate that the service of the newly connected user is ready (as shown in S2 in fig. 2), and if not, the sending proxy server 20 sends a status code 421 carried in the response message to the sending client 10 to indicate that the current service is unavailable, and at this time, the TCP connection with the sending client can be disconnected.
In this step, when the connection is established with the sending client, that is, the user information sent by the sending client can be received by acting on the sending request of the sending client. The user information may be user information logged in the sending client, such as a user name, a password, or the like, or may be a user name, a password, or the like used for sending in the sending client. Illustratively, the user information sent by the sending client can be received by the following modes:
for example, as shown in fig. 2, upon receiving the response message indicating that the current proxy service is available, the sending client 10 may send HELO information to the sending proxy server in S2, where the HELO information sent by the sending client is used to identify the sender' S own identity, and then the sending proxy server 20 may send a confirmation reply to the sending client (as shown in S4). In S5, the sending client 10 sends AUTH information to the sending proxy server 20, where the AUTH information is used to indicate a manner in which the sending client requests authentication from the sending proxy server, and may interact with the sending client based on three manners, such as play, log, and key-MD 5, to obtain the user information. As shown in fig. 2, the sending proxy server 20 may send an AUTH information reply to the sending client 10 (as shown at S6). If the AUTH information indicates the LOGIN authentication method, the user name information input by the user may be first transmitted when the user information is transmitted in S7, and then the password information input by the user may be transmitted, so as to obtain the user information, and then the sending proxy server 20 may feed back a response of receiving the user information to the sending client 10 (as shown in S8).
In step 12, it is determined whether the user information is target user information for sending a mail.
In the step, the user information is preliminarily checked to determine whether the mail can be sent outwards based on the user information, so that the safety of the internal data can be ensured to a certain extent.
In step 13, when it is determined that the user information is the target user information, the mail is transmitted to the target delivery server corresponding to the user information, and the mail is forwarded based on the target delivery server.
For example, in the case that it is determined that the mails can be sent out based on the user information, the mails sent out based on the user information are all sent to the corresponding target sending server. For example, if the service of enterprise a is deployed privately, enterprise a may set that registration and login can be completed only by using the corporate mailbox service of enterprise a. Therefore, according to the technical scheme, the mail sent by the enterprise A is sent to the sending server corresponding to the enterprise A, and then the mail is forwarded based on the target sending server, so that the mail is sent to the receiving server and sent to the corresponding mail receiving party.
Based on this, enterprise a can verify all outgoing mail, thereby ensuring that the data is in compliance. If the mailbox used for sending the mail outwards is not the company mailbox of the enterprise A, the user information can be determined not to be the target user information for sending the mail, and the mail can be directly intercepted at the moment, so that the data leakage through the mail can be prevented.
In the technical scheme, under the condition of establishing connection with a sending client, receiving user information sent by the sending client to determine whether the user information is target user information for sending a mail; and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server. Therefore, through the technical scheme, the user information sent outwards can be preliminarily verified, so that the preliminary filtering of the user information is realized, the safety of data in an intranet environment is guaranteed, and meanwhile, the mail interaction is realized. And when the mail is sent to the outside, the mail is sent to the corresponding target sending server for forwarding, so that corresponding safety analysis or detection can be carried out on the mail sent to the outside by the target sending server, and technical support is provided for ensuring the safety of data and avoiding internal data leakage.
Optionally, in step 12, an exemplary implementation of determining whether the user information is the target user information for sending the mail is as follows, and the step may include one of the following:
firstly, matching the user information with first filtering information in a user white list; and if first filtering information corresponding to the user information exists in the user white list, determining that the user information is the target user information.
In this embodiment, the user white list includes filtering information that allows the mail to be sent. Exemplarily, taking an intranet as an example, in order to ensure that the internal data of the enterprise is not leaked, a permission to send a mail to the outside using an enterprise mailbox (@ abc.com) may be set, and then, filtering information may be generated according to the configuration requirement, and exemplarily, the filtering information may be represented by a fuzzy matching expression, so that a subsequent matching process may be facilitated. In this embodiment, the acquired user information may be matched with filtering information in a user white list, and when a postbox suffix in the user information is @ abc.com, it may be determined that the user information is matched with the filtering information in the user white list information, that is, first filtering information corresponding to the user information exists in the user white list, so that it may be directly determined that the user information is target user information.
Secondly, matching the user information with second filtering information in a user blacklist; and if second filtering information corresponding to the user information does not exist in the user blacklist, determining the user information as the target user information.
In this embodiment, the user blacklist includes filtering information that does not allow the mail to be sent. For example, in order to avoid that the enterprise data is acquired by a certain type of enterprise B, it may be set that the mailbox (@ rst.com) of the type of enterprise B is not allowed to be used for sending out the mail, and then the filtering information may be generated according to the configuration requirement. In this embodiment, the acquired user information may be matched with each filtering information in the user blacklist, and when a postbox suffix in the user information is @ rst.com, it may be determined that the user information is matched with the filtering information in the user blacklist information, that is, the first filtering information corresponding to the user information exists in the user blacklist, and at this time, the mail may be directly intercepted; if each piece of filtering information in the user blacklist does not match with the user information, the user information can be determined to be target user information.
Therefore, by the technical scheme, the user information of the outward sent mails can be preliminarily matched, so that the user information is preliminarily filtered, the use requirements of users are met, and the accuracy and the data safety of the mail forward proxy method are improved.
Optionally, in step 13, an exemplary implementation manner of sending the mail to the target sending-out server corresponding to the user information is as follows, and the step may include:
and determining whether the sender information is consistent with the user information or not according to the sender information sent by the sender client.
For example, in the case where it is determined that the user information is the target user information, that is, the mail can be sent out based on the user information, the sending client may send its corresponding sender information, that is, FROM information of the mail header, as shown in fig. 2, and the sending client 10 may send the sender information to the sending proxy server 20 (as shown in S9).
In an actual use scenario, when a mail receiver receives a mail, the mail receiver can only determine the identity of a mail sender through the FROM information of the mail, so that part of illegal users can simulate legal users by modifying the FROM information, and send the mail to other users, for example, the purpose of pretending is realized by filling in the nonexistent FROM information or the FROM information of other legal users intentionally, so that the information displayed when the mail receiver receives the mail is the information of the legal users. In a normal sending scene of the email, the user information and the sender information should be consistent, and therefore, in this embodiment, by matching the sender information sent by the sender client with the user information sent by the sender client, it can be determined whether the sender information is tampered.
Illustratively, the account information in the user information acquired in step 11 is 1234@ abc.com, and in this step, the account information in the sender information sent by the sending client when sending the email is 1233@ abc.com. In this case, it may be determined that the user information is inconsistent with the account information in the sender information, that is, the user information is inconsistent with the sender information, and at this time, it indicates that the sender information of the email is modified, and the sending of the email may be directly rejected.
And sending the mail to the target sending server under the condition that the sender information is consistent with the user information.
In the technical scheme, whether the sender information is consistent with the user information is verified, the fact that a sending user displayed when the mail is sent to the mail receiver is a real legal user can be guaranteed, the sender information and the user information are verified, sending of junk mails or illegal mails (such as phishing mails) can be effectively avoided, accuracy of displaying information of the mail receiver is guaranteed, internal data are prevented from being leaked through the illegal mails, and safety of the internal data can be improved.
Optionally, the method further comprises:
and storing the user information, wherein the obtained user information can be cached, so that the user information can be prevented from being repeatedly obtained for many times when sending multiple mails based on the user information.
In step 13, an exemplary implementation manner of sending the mail to the target sending-out server corresponding to the user information is as follows, as shown in fig. 3, and this step may include:
in step 31, the target delivery server is determined based on the sender information sent by the delivery client.
For example, the sender information may include a sender address, and a target sender server corresponding to the sender information may be determined based on smtp server domain name mapping through suffix information of the sender address, where the domain name mapping may be preset. For example, if the sender address in the sender information is 1234@ abc.com, and the suffix information thereof is abc.com, the destination sender server determined based on the domain name mapping is smtp.
In step 32, a connection is established with the target sending server, and the user information is sent to the target sending server, so that the target sending server verifies whether the user information is legal or not.
After the target sending-out server is determined, a connection can be established with the target sending-out server, wherein the connection establishment mode is a conventional technology in the field and is not described herein again. The sending proxy server 20 may establish a connection with the target sending server 30 to validate the user information by the target sending server 30, as shown at S10 in fig. 2.
In the prior art, the validity of the user information needs to be verified by a separate HTTP authentication server, that is, the proxy server sends the user information to the authentication server through an HTTP protocol, and when the authentication server receives the user information, the authentication server verifies whether a user name, a password and the like in the user information are matched, so as to determine whether the user information is valid. However, in the above process, the user information is transmitted between the proxy server and the HTTP authentication service by using the HTTP protocol, which is easily intercepted or packet-capturing, resulting in leakage of the user information. And all the agent processes need to be authenticated by the single authentication server, the pressure for processing the authentication request is high, the performance requirement on the authentication server is high, and the efficiency of the mail system is influenced by the performance of the authentication server.
Based on this, in one possible embodiment of the present disclosure, after the proxy server establishes a connection with the target sending-out server, the user information may be directly sent to the target sending-out server based on the SMTP protocol, so that the target sending-out server verifies whether the user information is legal, thereby implementing distributed verification of the user information.
In another possible embodiment of the present disclosure, sending the user information to a target sending server may include: the user information is encrypted to obtain encrypted user information, and for example, the user information may be encrypted by TLS (transport layer Security). And then, sending the encrypted user information to the target sending server based on an SMTP protocol. Therefore, in this embodiment, the security and data integrity of the transmitted user information can be further ensured.
Therefore, by the technical scheme, the user information can be verified without an additional authentication server, the user information can be verified in a dispersed mode, the high-performance requirement of the user information verification on the server is lowered, and the efficiency of the mail forward proxy is improved. In addition, the framework for deploying the mail agent can be simplified, and the performance of the forward mail agent is further improved.
In step 33, in the case of receiving a response message indicating that the user information is legitimate, which is transmitted from the destination server, the mail is transmitted to the destination server.
After the target sending-out server confirms that the user information is legal, the mail sending can be carried out based on the user information, and at the moment, the mail can be sent to the target sending-out server, so that the forward proxy of the mail is realized. Illustratively, as shown in FIG. 2, the sending proxy server 20 may send a legitimacy verification reply to the sending client 10 to notify it that it is verified.
Thereafter, in S12, the sending proxy server 20 may wait for the recipient information sent by the receiving client 10 and forward the recipient information to the target sending server 30; and forwards the acknowledgement reply fed back by the target distribution server 30 to the distribution client 10 in S13. The sending proxy server 20 waits for the mail data information (such as the body and the title) sent from the sending/receiving client terminal 10 and transfers the mail data information to the target sending server 30 in S14, and returns the data information fed back from the target sending server 30 to the sending client terminal 10 and transfers the data information to the sending client terminal 10 in S15. Thereafter, in S16, the sending client 10 may send an end flag to the sending proxy server 20 after the mail writing is finished, and the sending proxy server 20 forwards the end flag to the target sending server 30 to notify the target sending server that the mail sending is finished, at which time the target sending server may send out the mail.
Therefore, according to the technical scheme, the legality of the user information can be verified through the target sending server, an additional authentication server is not needed, and meanwhile the user legality verification efficiency can be improved. In addition, the mail forward proxy method provided by the disclosure can be deployed independently, the architecture of the mail proxy is simplified, and the processing performance of the mail forward proxy is further improved.
Optionally, the sending of the mail to the target sending server corresponding to the user information may include the above-mentioned two verifications of the user information, that is, a consistency verification to verify whether the user information is consistent with the sender information and a validity verification to verify validity of the user information. For example, the consistency verification can be performed on the user information first, and after the consistency verification is passed, the validity verification of the user information is performed, so that the problem that the sending client sends mails to the outside by bypassing the limitation of the target user information, or sends junk mails or phishing mails to the outside can be avoided, and the legality of mail sending and the safety of internal data are ensured. The specific verification method is described in detail above, and is not described herein again.
Optionally, the method further comprises: in the case of receiving a response message indicating that the user information is not legitimate, which is transmitted from the target delivery server, indicating that the mail cannot be transmitted based on the user information, a notification message indicating that the user information verification failed may be transmitted to the delivery client to prompt the user by the delivery client.
Optionally, the method further comprises:
and deleting the stored user information under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is illegal or disconnecting the response message from the target sending server.
In an embodiment, when a response message indicating that the user information is not legitimate is received from the target delivery server, indicating that mail transmission is not possible based on the user information, and the user information is invalid user information, the stored user information may be deleted in this case.
In another embodiment, the disconnection from the target sending server indicates that the mail sending process is finished. For example, as shown in fig. 2, the sending client 10 may send a disconnection request to the sending proxy server 20, so that the sending proxy server 20 sends a disconnection request to the target sending proxy server 30 (as in S17), and then, in S18, the target sending proxy server 30 may disconnect the TCP connection with the sending proxy server 20 in response to the disconnection request, and in S19, the sending proxy server 20 disconnects the TCP connection with the sending client 10 in response to the disconnection request. The user information is deleted at the moment, so that the cache can be cleared in time, the occupation of storage resources is saved, the influence of the user information on the next connection establishment can be avoided, and the use safety of the user information is ensured.
The present disclosure also provides a mail agent system, the system comprising:
the sending client is communicated with the sending proxy server and used for sending the user information and the mail to be sent to the sending proxy server;
a mail sending proxy server, which is communicated with the mail sending client and the mail sending server and is used for executing the steps of the mail forward proxy method;
and the sending server is communicated with the sending proxy server and is used for verifying the user information sent by the sending proxy server and forwarding the mail.
The specific implementation of the sending proxy server has been described in detail above, and is not described herein again.
The present disclosure also provides a mail forward proxy apparatus, which may be applied to a mail forwarding proxy server, for example, the apparatus 100 including:
a receiving module 101, configured to receive user information sent by a sender client when a connection is established with the sender client, where the sender client is in an intranet environment;
a determining module 102, configured to determine whether the user information is target user information for sending an email;
a sending module 103, configured to send, when it is determined that the user information is the target user information, an email to a target sending server corresponding to the user information, so as to forward the email based on the target sending server.
Optionally, the sending module includes:
the first determining submodule is used for determining whether the sender information is consistent with the user information according to the sender information sent by the sender client;
and the first sending submodule is used for sending the mail to the target sending server under the condition that the sender information is consistent with the user information.
Optionally, the apparatus further comprises:
the storage module is used for storing the user information;
the sending module comprises:
the second determining submodule is used for determining the target sending server according to the sender information sent by the sending client;
the second sending submodule is used for establishing connection with the target sending server and sending the user information to the target sending server so that the target sending server verifies whether the user information is legal or not;
and the third sending submodule is used for sending the mail to the target sending server under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is legal.
Optionally, the apparatus further comprises:
and the deleting module is used for deleting the stored user information under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is illegal or disconnecting the user information from the target sending server.
Optionally, the second sending submodule includes:
the encryption submodule is used for encrypting the user information to obtain encrypted user information;
and the fourth sending submodule is used for sending the encrypted user information to the target sending server based on an SMTP protocol.
Optionally, the determining module comprises one of:
the third determining submodule is used for matching the user information with the first filtering information in the user white list; if first filtering information corresponding to the user information exists in the user white list, determining the user information as the target user information;
the fourth determining submodule is used for matching the user information with second filtering information in a user blacklist; and if second filtering information corresponding to the user information does not exist in the user blacklist, determining the user information as the target user information.
Referring now to FIG. 5, a block diagram of an electronic device 600 suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 600 may include a processing means (e.g., central processing unit, graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving user information sent by a sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment; determining whether the user information is target user information for sending the mail; and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present disclosure may be implemented by software or hardware. The name of the module does not in some cases form a limitation on the module itself, and for example, the receiving module may also be described as a "module that receives the user information sent by the sending client in the case of establishing a connection with the sending client".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Example 1 provides a mail forward proxy method, according to one or more embodiments of the present disclosure, wherein the method comprises:
receiving user information sent by a sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
determining whether the user information is target user information for sending the mail;
and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server.
Example 2 provides the method of example 1, wherein the sending a mail to a target sending server corresponding to the user information includes:
determining whether the sender information is consistent with the user information according to the sender information sent by the sender client;
and sending the mail to the target sending server under the condition that the sender information is consistent with the user information.
Example 3 provides the method of example 1 or 2, wherein the method further comprises:
storing the user information;
the sending the mail to the target sending server corresponding to the user information comprises the following steps:
determining the target sending server according to the sender information sent by the sending client;
establishing connection with the target sending server, and sending the user information to the target sending server so that the target sending server verifies whether the user information is legal or not;
and sending the mail to the target sending server under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is legal.
Example 4 provides the method of example 3, wherein the method further comprises:
and deleting the stored user information under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is illegal or disconnecting the response message from the target sending server.
Example 5 provides the method of example 3, wherein the sending the user information to the target sending server includes:
encrypting the user information to obtain the encrypted user information;
and sending the encrypted user information to the target sending server based on an SMTP protocol.
Example 6 provides the method of example 1, wherein the determining whether the user information is target user information for sending a mail includes one of:
matching the user information with first filtering information in a user white list; if first filtering information corresponding to the user information exists in the user white list, determining the user information as the target user information;
matching the user information with second filtering information in a user blacklist; and if second filtering information corresponding to the user information does not exist in the user blacklist, determining the user information as the target user information.
Example 7 provides a mail forward proxy apparatus, according to one or more embodiments of the present disclosure, wherein the apparatus comprises:
the receiving module is used for receiving the user information sent by the sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
the determining module is used for determining whether the user information is target user information used for sending the mail;
and the sending module is used for sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information so as to forward the mail based on the target sending server.
Example 8 provides a mail agent system, wherein the system comprises:
the sending client is communicated with the sending proxy server and used for sending the user information and the mail to be sent to the sending proxy server;
a mail forwarding agent server, in communication with the mail forwarding client and the mail forwarding server, for performing the steps of the mail forwarding agent method according to any one of examples 1 to 6;
and the sending server is communicated with the sending proxy server and is used for verifying the user information sent by the sending proxy server and forwarding the mail.
Example 9 provides a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processing apparatus, implements the steps of the mail forward proxy method of any of examples 1-6 above.
Example 10 provides, in accordance with one or more embodiments of the present disclosure, an electronic device, comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to implement the steps of the mail forward proxy method of any of examples 1-6 above.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

Claims (10)

1. A mail forward proxy method, the method comprising:
receiving user information sent by a sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
determining whether the user information is target user information for sending the mail;
and sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information, so as to forward the mail based on the target sending server.
2. The method of claim 1, wherein the sending the mail to the target sending server corresponding to the user information comprises:
determining whether the sender information is consistent with the user information according to the sender information sent by the sender client;
and sending the mail to the target sending server under the condition that the sender information is consistent with the user information.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
storing the user information;
the sending the mail to the target sending server corresponding to the user information comprises the following steps:
determining the target sending server according to the sender information sent by the sending client;
establishing connection with the target sending server, and sending the user information to the target sending server so that the target sending server verifies whether the user information is legal or not;
and sending the mail to the target sending server under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is legal.
4. The method of claim 3, further comprising:
and deleting the stored user information under the condition of receiving a response message which is sent by the target sending server and indicates that the user information is illegal or disconnecting the response message from the target sending server.
5. The method of claim 3, wherein sending the user information to the target sending server comprises:
encrypting the user information to obtain the encrypted user information;
and sending the encrypted user information to the target sending server based on an SMTP protocol.
6. The method of claim 1, wherein the determining whether the user information is target user information for sending a mail comprises one of:
matching the user information with first filtering information in a user white list; if first filtering information corresponding to the user information exists in the user white list, determining the user information as the target user information;
matching the user information with second filtering information in a user blacklist; and if second filtering information corresponding to the user information does not exist in the user blacklist, determining the user information as the target user information.
7. A mail forward proxy apparatus, the apparatus comprising:
the receiving module is used for receiving the user information sent by the sending client under the condition of establishing connection with the sending client, wherein the sending client is in an intranet environment;
the determining module is used for determining whether the user information is target user information used for sending the mail;
and the sending module is used for sending the mail to a target sending server corresponding to the user information under the condition that the user information is determined to be the target user information so as to forward the mail based on the target sending server.
8. A mail brokering system, the system comprising:
the sending client is communicated with the sending proxy server and used for sending the user information and the mail to be sent to the sending proxy server;
a dispatch proxy server in communication with the dispatch client and the dispatch server for performing the steps of the method of any of claims 1-6;
and the sending server is communicated with the sending proxy server and is used for verifying the user information sent by the sending proxy server and forwarding the mail.
9. A computer-readable medium, on which a computer program is stored, characterized in that the program, when being executed by processing means, carries out the steps of the method of any one of claims 1 to 6.
10. An electronic device, comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to carry out the steps of the method according to any one of claims 1 to 6.
CN202010520251.8A 2020-06-09 2020-06-09 Mail forward proxy method, device, system, storage medium and electronic equipment Pending CN111698242A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010520251.8A CN111698242A (en) 2020-06-09 2020-06-09 Mail forward proxy method, device, system, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010520251.8A CN111698242A (en) 2020-06-09 2020-06-09 Mail forward proxy method, device, system, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN111698242A true CN111698242A (en) 2020-09-22

Family

ID=72479984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010520251.8A Pending CN111698242A (en) 2020-06-09 2020-06-09 Mail forward proxy method, device, system, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111698242A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114866505A (en) * 2022-04-12 2022-08-05 上海蒜芽信息科技有限公司 Mail sending method, system, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030191969A1 (en) * 2000-02-08 2003-10-09 Katsikas Peter L. System for eliminating unauthorized electronic mail
CN102170436A (en) * 2011-04-18 2011-08-31 深圳市联软科技有限公司 Mail safety getaway as well as method and system for filtering mails
CN103428077A (en) * 2013-08-22 2013-12-04 北京明朝万达科技有限公司 Method and system for safely receiving and sending mails
CN103532833A (en) * 2013-11-05 2014-01-22 中国联合网络通信集团有限公司 Business system access method, terminal and agency service system
CN103888348A (en) * 2014-03-28 2014-06-25 新浪网技术(中国)有限公司 E-mail application system and method and device for transferring E-mails
CN107707462A (en) * 2017-10-31 2018-02-16 下代互联网重大应用技术(北京)工程研究中心有限公司 Spam emergency processing method based on cloud computing
CN110855611A (en) * 2019-10-10 2020-02-28 平安科技(深圳)有限公司 Data outgoing method, device and related equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030191969A1 (en) * 2000-02-08 2003-10-09 Katsikas Peter L. System for eliminating unauthorized electronic mail
CN102170436A (en) * 2011-04-18 2011-08-31 深圳市联软科技有限公司 Mail safety getaway as well as method and system for filtering mails
CN103428077A (en) * 2013-08-22 2013-12-04 北京明朝万达科技有限公司 Method and system for safely receiving and sending mails
CN103532833A (en) * 2013-11-05 2014-01-22 中国联合网络通信集团有限公司 Business system access method, terminal and agency service system
CN103888348A (en) * 2014-03-28 2014-06-25 新浪网技术(中国)有限公司 E-mail application system and method and device for transferring E-mails
CN107707462A (en) * 2017-10-31 2018-02-16 下代互联网重大应用技术(北京)工程研究中心有限公司 Spam emergency processing method based on cloud computing
CN110855611A (en) * 2019-10-10 2020-02-28 平安科技(深圳)有限公司 Data outgoing method, device and related equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114866505A (en) * 2022-04-12 2022-08-05 上海蒜芽信息科技有限公司 Mail sending method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111639319A (en) User resource authorization method, device and computer readable storage medium
US11489831B2 (en) Communication system and computer readable storage medium
CN112866385B (en) Interface calling method and device, electronic equipment and storage medium
US20210176234A1 (en) Cooperative communication validation
US10841293B2 (en) Gateway device for authentication and authorization of applications and/or servers for data transfer between applications and/or servers
CN113347206A (en) Network access method and device
CN111914229A (en) Identity authentication method and device, electronic equipment and storage medium
CN110851210A (en) Interface program calling method, device, equipment and storage medium
CN112437044B (en) Instant messaging method and device
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN113949566A (en) Resource access method, device, electronic equipment and medium
WO2022083589A1 (en) Terminal control method and apparatus, and terminal and storage medium
CN114125027B (en) Communication establishment method and device, electronic equipment and storage medium
CN113438256B (en) Data transmission method, system and proxy server based on double-layer SSL
CN112953815B (en) Information access control method, device, equipment and storage medium
CN111698242A (en) Mail forward proxy method, device, system, storage medium and electronic equipment
WO2023207788A1 (en) Information processing method and apparatus, electronic device, and storage medium
CN113162836A (en) Virtual local area network communication method and device, cloud server, medium and electronic equipment
US20160044028A1 (en) Message authentication
CN111614660B (en) Method and device for detecting safety verification defects and electronic equipment
CN114048498A (en) Data sharing method, device, equipment and medium
CN114884933A (en) Information processing method, device, electronic equipment and storage medium
LU100700B1 (en) Method and devices for keyless secure data communication
CN113763646A (en) Device control method, device, electronic device and computer readable medium
CN114006897A (en) File transmission method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200922

RJ01 Rejection of invention patent application after publication