Deleted Added
sdiff udiff text old ( 141858 ) new ( 147078 )
full compact
1/*
2 * Copyright (c) 1998-2005 Sendmail, Inc. and its suppliers.
3 * All rights reserved.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.
5 * Copyright (c) 1988, 1993
6 * The Regents of the University of California. All rights reserved.
7 *
8 * By using this file, you agree to the terms and conditions set
9 * forth in the LICENSE file which can be found at the top level of
10 * the sendmail distribution.
11 *
12 */
13
14#include <sendmail.h>
15#include <sys/time.h>
16
17SM_RCSID("@(#)$Id: deliver.c,v 8.986 2005/03/05 02:28:50 ca Exp $")
18
19#if HASSETUSERCONTEXT
20# include <login_cap.h>
21#endif /* HASSETUSERCONTEXT */
22
23#if NETINET || NETINET6
24# include <arpa/inet.h>
25#endif /* NETINET || NETINET6 */
26
27#if STARTTLS || SASL
28# include "sfsasl.h"
29#endif /* STARTTLS || SASL */
30
31static int deliver __P((ENVELOPE *, ADDRESS *));
32static void dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
33static void mailfiletimeout __P((int));
34static void endwaittimeout __P((int));
35static int parse_hostsignature __P((char *, char **, MAILER *));
36static void sendenvelope __P((ENVELOPE *, int));
37extern MCI *mci_new __P((SM_RPOOL_T *));
38static int coloncmp __P((const char *, const char *));
39
40#if STARTTLS
41static int starttls __P((MAILER *, MCI *, ENVELOPE *));
42static int endtlsclt __P((MCI *));
43#endif /* STARTTLS */
44# if STARTTLS || SASL
45static bool iscltflgset __P((ENVELOPE *, int));
46# endif /* STARTTLS || SASL */
47
48/*
49** SENDALL -- actually send all the messages.
50**
51** Parameters:
52** e -- the envelope to send.
53** mode -- the delivery mode to use. If SM_DEFAULT, use
54** the current e->e_sendmode.
55**
56** Returns:
57** none.
58**
59** Side Effects:
60** Scans the send lists and sends everything it finds.
61** Delivers any appropriate error messages.
62** If we are running in a non-interactive mode, takes the
63** appropriate action.
64*/
65
66void
67sendall(e, mode)
68 ENVELOPE *e;
69 int mode;
70{
71 register ADDRESS *q;
72 char *owner;
73 int otherowners;
74 int save_errno;
75 register ENVELOPE *ee;
76 ENVELOPE *splitenv = NULL;
77 int oldverbose = Verbose;
78 bool somedeliveries = false, expensive = false;
79 pid_t pid;
80
81 /*
82 ** If this message is to be discarded, don't bother sending
83 ** the message at all.
84 */
85
86 if (bitset(EF_DISCARD, e->e_flags))
87 {
88 if (tTd(13, 1))
89 sm_dprintf("sendall: discarding id %s\n", e->e_id);
90 e->e_flags |= EF_CLRQUEUE;
91 if (LogLevel > 9)
92 logundelrcpts(e, "discarded", 9, true);
93 else if (LogLevel > 4)
94 sm_syslog(LOG_INFO, e->e_id, "discarded");
95 markstats(e, NULL, STATS_REJECT);
96 return;
97 }
98
99 /*
100 ** If we have had global, fatal errors, don't bother sending
101 ** the message at all if we are in SMTP mode. Local errors
102 ** (e.g., a single address failing) will still cause the other
103 ** addresses to be sent.
104 */
105
106 if (bitset(EF_FATALERRS, e->e_flags) &&
107 (OpMode == MD_SMTP || OpMode == MD_DAEMON))
108 {
109 e->e_flags |= EF_CLRQUEUE;
110 return;
111 }
112
113 /* determine actual delivery mode */
114 if (mode == SM_DEFAULT)
115 {
116 mode = e->e_sendmode;
117 if (mode != SM_VERIFY && mode != SM_DEFER &&
118 shouldqueue(e->e_msgpriority, e->e_ctime))
119 mode = SM_QUEUE;
120 }
121
122 if (tTd(13, 1))
123 {
124 sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
125 mode, e->e_id);
126 printaddr(sm_debug_file(), &e->e_from, false);
127 sm_dprintf("\te_flags = ");
128 printenvflags(e);
129 sm_dprintf("sendqueue:\n");
130 printaddr(sm_debug_file(), e->e_sendqueue, true);
131 }
132
133 /*
134 ** Do any preprocessing necessary for the mode we are running.
135 ** Check to make sure the hop count is reasonable.
136 ** Delete sends to the sender in mailing lists.
137 */
138
139 CurEnv = e;
140 if (tTd(62, 1))
141 checkfds(NULL);
142
143 if (e->e_hopcount > MaxHopCount)
144 {
145 char *recip;
146
147 if (e->e_sendqueue != NULL &&
148 e->e_sendqueue->q_paddr != NULL)
149 recip = e->e_sendqueue->q_paddr;
150 else
151 recip = "(nobody)";
152
153 errno = 0;
154 queueup(e, WILL_BE_QUEUED(mode), false);
155 e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
156 ExitStat = EX_UNAVAILABLE;
157 syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
158 e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
159 RealHostName == NULL ? "localhost" : RealHostName,
160 recip);
161 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
162 {
163 if (QS_IS_DEAD(q->q_state))
164 continue;
165 q->q_state = QS_BADADDR;
166 q->q_status = "5.4.6";
167 q->q_rstatus = "554 5.4.6 Too many hops";
168 }
169 return;
170 }
171
172 /*
173 ** Do sender deletion.
174 **
175 ** If the sender should be queued up, skip this.
176 ** This can happen if the name server is hosed when you
177 ** are trying to send mail. The result is that the sender
178 ** is instantiated in the queue as a recipient.
179 */
180
181 if (!bitset(EF_METOO, e->e_flags) &&
182 !QS_IS_QUEUEUP(e->e_from.q_state))
183 {
184 if (tTd(13, 5))
185 {
186 sm_dprintf("sendall: QS_SENDER ");
187 printaddr(sm_debug_file(), &e->e_from, false);
188 }
189 e->e_from.q_state = QS_SENDER;
190 (void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
191 }
192
193 /*
194 ** Handle alias owners.
195 **
196 ** We scan up the q_alias chain looking for owners.
197 ** We discard owners that are the same as the return path.
198 */
199
200 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
201 {
202 register struct address *a;
203
204 for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
205 continue;
206 if (a != NULL)
207 q->q_owner = a->q_owner;
208
209 if (q->q_owner != NULL &&
210 !QS_IS_DEAD(q->q_state) &&
211 strcmp(q->q_owner, e->e_from.q_paddr) == 0)
212 q->q_owner = NULL;
213 }
214
215 if (tTd(13, 25))
216 {
217 sm_dprintf("\nAfter first owner pass, sendq =\n");
218 printaddr(sm_debug_file(), e->e_sendqueue, true);
219 }
220
221 owner = "";
222 otherowners = 1;
223 while (owner != NULL && otherowners > 0)
224 {
225 if (tTd(13, 28))
226 sm_dprintf("owner = \"%s\", otherowners = %d\n",
227 owner, otherowners);
228 owner = NULL;
229 otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
230
231 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
232 {
233 if (tTd(13, 30))
234 {
235 sm_dprintf("Checking ");
236 printaddr(sm_debug_file(), q, false);
237 }
238 if (QS_IS_DEAD(q->q_state))
239 {
240 if (tTd(13, 30))
241 sm_dprintf(" ... QS_IS_DEAD\n");
242 continue;
243 }
244 if (tTd(13, 29) && !tTd(13, 30))
245 {
246 sm_dprintf("Checking ");
247 printaddr(sm_debug_file(), q, false);
248 }
249
250 if (q->q_owner != NULL)
251 {
252 if (owner == NULL)
253 {
254 if (tTd(13, 40))
255 sm_dprintf(" ... First owner = \"%s\"\n",
256 q->q_owner);
257 owner = q->q_owner;
258 }
259 else if (owner != q->q_owner)
260 {
261 if (strcmp(owner, q->q_owner) == 0)
262 {
263 if (tTd(13, 40))
264 sm_dprintf(" ... Same owner = \"%s\"\n",
265 owner);
266
267 /* make future comparisons cheap */
268 q->q_owner = owner;
269 }
270 else
271 {
272 if (tTd(13, 40))
273 sm_dprintf(" ... Another owner \"%s\"\n",
274 q->q_owner);
275 otherowners++;
276 }
277 owner = q->q_owner;
278 }
279 else if (tTd(13, 40))
280 sm_dprintf(" ... Same owner = \"%s\"\n",
281 owner);
282 }
283 else
284 {
285 if (tTd(13, 40))
286 sm_dprintf(" ... Null owner\n");
287 otherowners++;
288 }
289
290 if (QS_IS_BADADDR(q->q_state))
291 {
292 if (tTd(13, 30))
293 sm_dprintf(" ... QS_IS_BADADDR\n");
294 continue;
295 }
296
297 if (QS_IS_QUEUEUP(q->q_state))
298 {
299 MAILER *m = q->q_mailer;
300
301 /*
302 ** If we have temporary address failures
303 ** (e.g., dns failure) and a fallback MX is
304 ** set, send directly to the fallback MX host.
305 */
306
307 if (FallbackMX != NULL &&
308 !wordinclass(FallbackMX, 'w') &&
309 mode != SM_VERIFY &&
310 !bitnset(M_NOMX, m->m_flags) &&
311 strcmp(m->m_mailer, "[IPC]") == 0 &&
312 m->m_argv[0] != NULL &&
313 strcmp(m->m_argv[0], "TCP") == 0)
314 {
315 int len;
316 char *p;
317
318 if (tTd(13, 30))
319 sm_dprintf(" ... FallbackMX\n");
320
321 len = strlen(FallbackMX) + 1;
322 p = sm_rpool_malloc_x(e->e_rpool, len);
323 (void) sm_strlcpy(p, FallbackMX, len);
324 q->q_state = QS_OK;
325 q->q_host = p;
326 }
327 else
328 {
329 if (tTd(13, 30))
330 sm_dprintf(" ... QS_IS_QUEUEUP\n");
331 continue;
332 }
333 }
334
335 /*
336 ** If this mailer is expensive, and if we don't
337 ** want to make connections now, just mark these
338 ** addresses and return. This is useful if we
339 ** want to batch connections to reduce load. This
340 ** will cause the messages to be queued up, and a
341 ** daemon will come along to send the messages later.
342 */
343
344 if (NoConnect && !Verbose &&
345 bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
346 {
347 if (tTd(13, 30))
348 sm_dprintf(" ... expensive\n");
349 q->q_state = QS_QUEUEUP;
350 expensive = true;
351 }
352 else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
353 QueueLimitId == NULL &&
354 QueueLimitSender == NULL &&
355 QueueLimitRecipient == NULL)
356 {
357 if (tTd(13, 30))
358 sm_dprintf(" ... hold\n");
359 q->q_state = QS_QUEUEUP;
360 expensive = true;
361 }
362 else if (QueueMode != QM_QUARANTINE &&
363 e->e_quarmsg != NULL)
364 {
365 if (tTd(13, 30))
366 sm_dprintf(" ... quarantine: %s\n",
367 e->e_quarmsg);
368 q->q_state = QS_QUEUEUP;
369 expensive = true;
370 }
371 else
372 {
373 if (tTd(13, 30))
374 sm_dprintf(" ... deliverable\n");
375 somedeliveries = true;
376 }
377 }
378
379 if (owner != NULL && otherowners > 0)
380 {
381 /*
382 ** Split this envelope into two.
383 */
384
385 ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
386 sizeof *ee);
387 STRUCTCOPY(*e, *ee);
388 ee->e_message = NULL;
389 ee->e_id = NULL;
390 assign_queueid(ee);
391
392 if (tTd(13, 1))
393 sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
394 e->e_id, ee->e_id, owner,
395 otherowners);
396
397 ee->e_header = copyheader(e->e_header, ee->e_rpool);
398 ee->e_sendqueue = copyqueue(e->e_sendqueue,
399 ee->e_rpool);
400 ee->e_errorqueue = copyqueue(e->e_errorqueue,
401 ee->e_rpool);
402 ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
403 ee->e_flags |= EF_NORECEIPT;
404 setsender(owner, ee, NULL, '\0', true);
405 if (tTd(13, 5))
406 {
407 sm_dprintf("sendall(split): QS_SENDER ");
408 printaddr(sm_debug_file(), &ee->e_from, false);
409 }
410 ee->e_from.q_state = QS_SENDER;
411 ee->e_dfp = NULL;
412 ee->e_lockfp = NULL;
413 ee->e_xfp = NULL;
414 ee->e_qgrp = e->e_qgrp;
415 ee->e_qdir = e->e_qdir;
416 ee->e_errormode = EM_MAIL;
417 ee->e_sibling = splitenv;
418 ee->e_statmsg = NULL;
419 if (e->e_quarmsg != NULL)
420 ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
421 e->e_quarmsg);
422 splitenv = ee;
423
424 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
425 {
426 if (q->q_owner == owner)
427 {
428 q->q_state = QS_CLONED;
429 if (tTd(13, 6))
430 sm_dprintf("\t... stripping %s from original envelope\n",
431 q->q_paddr);
432 }
433 }
434 for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
435 {
436 if (q->q_owner != owner)
437 {
438 q->q_state = QS_CLONED;
439 if (tTd(13, 6))
440 sm_dprintf("\t... dropping %s from cloned envelope\n",
441 q->q_paddr);
442 }
443 else
444 {
445 /* clear DSN parameters */
446 q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
447 q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
448 if (tTd(13, 6))
449 sm_dprintf("\t... moving %s to cloned envelope\n",
450 q->q_paddr);
451 }
452 }
453
454 if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
455 dup_queue_file(e, ee, DATAFL_LETTER);
456
457 /*
458 ** Give the split envelope access to the parent
459 ** transcript file for errors obtained while
460 ** processing the recipients (done before the
461 ** envelope splitting).
462 */
463
464 if (e->e_xfp != NULL)
465 ee->e_xfp = sm_io_dup(e->e_xfp);
466
467 /* failed to dup e->e_xfp, start a new transcript */
468 if (ee->e_xfp == NULL)
469 openxscript(ee);
470
471 if (mode != SM_VERIFY && LogLevel > 4)
472 sm_syslog(LOG_INFO, e->e_id,
473 "%s: clone: owner=%s",
474 ee->e_id, owner);
475 }
476 }
477
478 if (owner != NULL)
479 {
480 setsender(owner, e, NULL, '\0', true);
481 if (tTd(13, 5))
482 {
483 sm_dprintf("sendall(owner): QS_SENDER ");
484 printaddr(sm_debug_file(), &e->e_from, false);
485 }
486 e->e_from.q_state = QS_SENDER;
487 e->e_errormode = EM_MAIL;
488 e->e_flags |= EF_NORECEIPT;
489 e->e_flags &= ~EF_FATALERRS;
490 }
491
492 /* if nothing to be delivered, just queue up everything */
493 if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
494 mode != SM_VERIFY)
495 {
496 time_t now;
497
498 if (tTd(13, 29))
499 sm_dprintf("No deliveries: auto-queuing\n");
500 mode = SM_QUEUE;
501 now = curtime();
502
503 /* treat this as a delivery in terms of counting tries */
504 e->e_dtime = now;
505 if (!expensive)
506 e->e_ntries++;
507 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
508 {
509 ee->e_dtime = now;
510 if (!expensive)
511 ee->e_ntries++;
512 }
513 }
514
515 if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
516 (mode != SM_VERIFY &&
517 (SuperSafe == SAFE_REALLY ||
518 SuperSafe == SAFE_REALLY_POSTMILTER))) &&
519 (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
520 {
521 bool msync;
522
523 /*
524 ** Be sure everything is instantiated in the queue.
525 ** Split envelopes first in case the machine crashes.
526 ** If the original were done first, we may lose
527 ** recipients.
528 */
529
530#if !HASFLOCK
531 msync = false;
532#else /* !HASFLOCK */
533 msync = mode == SM_FORK;
534#endif /* !HASFLOCK */
535
536 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
537 queueup(ee, WILL_BE_QUEUED(mode), msync);
538 queueup(e, WILL_BE_QUEUED(mode), msync);
539 }
540
541 if (tTd(62, 10))
542 checkfds("after envelope splitting");
543
544 /*
545 ** If we belong in background, fork now.
546 */
547
548 if (tTd(13, 20))
549 {
550 sm_dprintf("sendall: final mode = %c\n", mode);
551 if (tTd(13, 21))
552 {
553 sm_dprintf("\n================ Final Send Queue(s) =====================\n");
554 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n",
555 e->e_id, e->e_from.q_paddr);
556 printaddr(sm_debug_file(), e->e_sendqueue, true);
557 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
558 {
559 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n",
560 ee->e_id, ee->e_from.q_paddr);
561 printaddr(sm_debug_file(), ee->e_sendqueue, true);
562 }
563 sm_dprintf("==========================================================\n\n");
564 }
565 }
566 switch (mode)
567 {
568 case SM_VERIFY:
569 Verbose = 2;
570 break;
571
572 case SM_QUEUE:
573 case SM_DEFER:
574#if HASFLOCK
575 queueonly:
576#endif /* HASFLOCK */
577 if (e->e_nrcpts > 0)
578 e->e_flags |= EF_INQUEUE;
579 dropenvelope(e, splitenv != NULL, true);
580 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
581 {
582 if (ee->e_nrcpts > 0)
583 ee->e_flags |= EF_INQUEUE;
584 dropenvelope(ee, false, true);
585 }
586 return;
587
588 case SM_FORK:
589 if (e->e_xfp != NULL)
590 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
591
592#if !HASFLOCK
593 /*
594 ** Since fcntl locking has the interesting semantic that
595 ** the lock is owned by a process, not by an open file
596 ** descriptor, we have to flush this to the queue, and
597 ** then restart from scratch in the child.
598 */
599
600 {
601 /* save id for future use */
602 char *qid = e->e_id;
603
604 /* now drop the envelope in the parent */
605 e->e_flags |= EF_INQUEUE;
606 dropenvelope(e, splitenv != NULL, false);
607
608 /* arrange to reacquire lock after fork */
609 e->e_id = qid;
610 }
611
612 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
613 {
614 /* save id for future use */
615 char *qid = ee->e_id;
616
617 /* drop envelope in parent */
618 ee->e_flags |= EF_INQUEUE;
619 dropenvelope(ee, false, false);
620
621 /* and save qid for reacquisition */
622 ee->e_id = qid;
623 }
624
625#endif /* !HASFLOCK */
626
627 /*
628 ** Since the delivery may happen in a child and the parent
629 ** does not wait, the parent may close the maps thereby
630 ** removing any shared memory used by the map. Therefore,
631 ** close the maps now so the child will dynamically open
632 ** them if necessary.
633 */
634
635 closemaps(false);
636
637 pid = fork();
638 if (pid < 0)
639 {
640 syserr("deliver: fork 1");
641#if HASFLOCK
642 goto queueonly;
643#else /* HASFLOCK */
644 e->e_id = NULL;
645 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
646 ee->e_id = NULL;
647 return;
648#endif /* HASFLOCK */
649 }
650 else if (pid > 0)
651 {
652#if HASFLOCK
653 /* be sure we leave the temp files to our child */
654 /* close any random open files in the envelope */
655 closexscript(e);
656 if (e->e_dfp != NULL)
657 (void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
658 e->e_dfp = NULL;
659 e->e_flags &= ~EF_HAS_DF;
660
661 /* can't call unlockqueue to avoid unlink of xfp */
662 if (e->e_lockfp != NULL)
663 (void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
664 else
665 syserr("%s: sendall: null lockfp", e->e_id);
666 e->e_lockfp = NULL;
667#endif /* HASFLOCK */
668
669 /* make sure the parent doesn't own the envelope */
670 e->e_id = NULL;
671
672#if USE_DOUBLE_FORK
673 /* catch intermediate zombie */
674 (void) waitfor(pid);
675#endif /* USE_DOUBLE_FORK */
676 return;
677 }
678
679 /* Reset global flags */
680 RestartRequest = NULL;
681 RestartWorkGroup = false;
682 ShutdownRequest = NULL;
683 PendingSignal = 0;
684
685 /*
686 ** Initialize exception stack and default exception
687 ** handler for child process.
688 */
689
690 sm_exc_newthread(fatal_error);
691
692 /*
693 ** Since we have accepted responsbility for the message,
694 ** change the SIGTERM handler. intsig() (the old handler)
695 ** would remove the envelope if this was a command line
696 ** message submission.
697 */
698
699 (void) sm_signal(SIGTERM, SIG_DFL);
700
701#if USE_DOUBLE_FORK
702 /* double fork to avoid zombies */
703 pid = fork();
704 if (pid > 0)
705 exit(EX_OK);
706 save_errno = errno;
707#endif /* USE_DOUBLE_FORK */
708
709 CurrentPid = getpid();
710
711 /* be sure we are immune from the terminal */
712 disconnect(2, e);
713 clearstats();
714
715 /* prevent parent from waiting if there was an error */
716 if (pid < 0)
717 {
718 errno = save_errno;
719 syserr("deliver: fork 2");
720#if HASFLOCK
721 e->e_flags |= EF_INQUEUE;
722#else /* HASFLOCK */
723 e->e_id = NULL;
724#endif /* HASFLOCK */
725 finis(true, true, ExitStat);
726 }
727
728 /* be sure to give error messages in child */
729 QuickAbort = false;
730
731 /*
732 ** Close any cached connections.
733 **
734 ** We don't send the QUIT protocol because the parent
735 ** still knows about the connection.
736 **
737 ** This should only happen when delivering an error
738 ** message.
739 */
740
741 mci_flush(false, NULL);
742
743#if HASFLOCK
744 break;
745#else /* HASFLOCK */
746
747 /*
748 ** Now reacquire and run the various queue files.
749 */
750
751 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
752 {
753 ENVELOPE *sibling = ee->e_sibling;
754
755 (void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
756 false, false, ee);
757 ee->e_sibling = sibling;
758 }
759 (void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
760 false, false, e);
761 finis(true, true, ExitStat);
762#endif /* HASFLOCK */
763 }
764
765 sendenvelope(e, mode);
766 dropenvelope(e, true, true);
767 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
768 {
769 CurEnv = ee;
770 if (mode != SM_VERIFY)
771 openxscript(ee);
772 sendenvelope(ee, mode);
773 dropenvelope(ee, true, true);
774 }
775 CurEnv = e;
776
777 Verbose = oldverbose;
778 if (mode == SM_FORK)
779 finis(true, true, ExitStat);
780}
781
782static void
783sendenvelope(e, mode)
784 register ENVELOPE *e;
785 int mode;
786{
787 register ADDRESS *q;
788 bool didany;
789
790 if (tTd(13, 10))
791 sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
792 e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
793 e->e_flags);
794 if (LogLevel > 80)
795 sm_syslog(LOG_DEBUG, e->e_id,
796 "sendenvelope, flags=0x%lx",
797 e->e_flags);
798
799 /*
800 ** If we have had global, fatal errors, don't bother sending
801 ** the message at all if we are in SMTP mode. Local errors
802 ** (e.g., a single address failing) will still cause the other
803 ** addresses to be sent.
804 */
805
806 if (bitset(EF_FATALERRS, e->e_flags) &&
807 (OpMode == MD_SMTP || OpMode == MD_DAEMON))
808 {
809 e->e_flags |= EF_CLRQUEUE;
810 return;
811 }
812
813 /*
814 ** Don't attempt deliveries if we want to bounce now
815 ** or if deliver-by time is exceeded.
816 */
817
818 if (!bitset(EF_RESPONSE, e->e_flags) &&
819 (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
820 (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
821 curtime() > e->e_ctime + e->e_deliver_by)))
822 return;
823
824 /*
825 ** Run through the list and send everything.
826 **
827 ** Set EF_GLOBALERRS so that error messages during delivery
828 ** result in returned mail.
829 */
830
831 e->e_nsent = 0;
832 e->e_flags |= EF_GLOBALERRS;
833
834 macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
835 macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
836 didany = false;
837
838 if (!bitset(EF_SPLIT, e->e_flags))
839 {
840 ENVELOPE *oldsib;
841 ENVELOPE *ee;
842
843 /*
844 ** Save old sibling and set it to NULL to avoid
845 ** queueing up the same envelopes again.
846 ** This requires that envelopes in that list have
847 ** been take care of before (or at some other place).
848 */
849
850 oldsib = e->e_sibling;
851 e->e_sibling = NULL;
852 if (!split_by_recipient(e) &&
853 bitset(EF_FATALERRS, e->e_flags))
854 {
855 if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
856 e->e_flags |= EF_CLRQUEUE;
857 return;
858 }
859 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
860 queueup(ee, false, true);
861
862 /* clean up */
863 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
864 {
865 /* now unlock the job */
866 closexscript(ee);
867 unlockqueue(ee);
868
869 /* this envelope is marked unused */
870 if (ee->e_dfp != NULL)
871 {
872 (void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
873 ee->e_dfp = NULL;
874 }
875 ee->e_id = NULL;
876 ee->e_flags &= ~EF_HAS_DF;
877 }
878 e->e_sibling = oldsib;
879 }
880
881 /* now run through the queue */
882 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
883 {
884#if XDEBUG
885 char wbuf[MAXNAME + 20];
886
887 (void) sm_snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
888 MAXNAME, q->q_paddr);
889 checkfd012(wbuf);
890#endif /* XDEBUG */
891 if (mode == SM_VERIFY)
892 {
893 e->e_to = q->q_paddr;
894 if (QS_IS_SENDABLE(q->q_state))
895 {
896 if (q->q_host != NULL && q->q_host[0] != '\0')
897 message("deliverable: mailer %s, host %s, user %s",
898 q->q_mailer->m_name,
899 q->q_host,
900 q->q_user);
901 else
902 message("deliverable: mailer %s, user %s",
903 q->q_mailer->m_name,
904 q->q_user);
905 }
906 }
907 else if (QS_IS_OK(q->q_state))
908 {
909 /*
910 ** Checkpoint the send list every few addresses
911 */
912
913 if (CheckpointInterval > 0 &&
914 e->e_nsent >= CheckpointInterval)
915 {
916 queueup(e, false, false);
917 e->e_nsent = 0;
918 }
919 (void) deliver(e, q);
920 didany = true;
921 }
922 }
923 if (didany)
924 {
925 e->e_dtime = curtime();
926 e->e_ntries++;
927 }
928
929#if XDEBUG
930 checkfd012("end of sendenvelope");
931#endif /* XDEBUG */
932}
933
934#if REQUIRES_DIR_FSYNC
935/*
936** SYNC_DIR -- fsync a directory based on a filename
937**
938** Parameters:
939** filename -- path of file
940** panic -- panic?
941**
942** Returns:
943** none
944*/
945
946void
947sync_dir(filename, panic)
948 char *filename;
949 bool panic;
950{
951 int dirfd;
952 char *dirp;
953 char dir[MAXPATHLEN];
954
955 if (!RequiresDirfsync)
956 return;
957
958 /* filesystems which require the directory be synced */
959 dirp = strrchr(filename, '/');
960 if (dirp != NULL)
961 {
962 if (sm_strlcpy(dir, filename, sizeof dir) >= sizeof dir)
963 return;
964 dir[dirp - filename] = '\0';
965 dirp = dir;
966 }
967 else
968 dirp = ".";
969 dirfd = open(dirp, O_RDONLY, 0700);
970 if (tTd(40,32))
971 sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
972 dirp, dirfd);
973 if (dirfd >= 0)
974 {
975 if (fsync(dirfd) < 0)
976 {
977 if (panic)
978 syserr("!sync_dir: cannot fsync directory %s",
979 dirp);
980 else if (LogLevel > 1)
981 sm_syslog(LOG_ERR, NOQID,
982 "sync_dir: cannot fsync directory %s: %s",
983 dirp, sm_errstring(errno));
984 }
985 (void) close(dirfd);
986 }
987}
988#endif /* REQUIRES_DIR_FSYNC */
989/*
990** DUP_QUEUE_FILE -- duplicate a queue file into a split queue
991**
992** Parameters:
993** e -- the existing envelope
994** ee -- the new envelope
995** type -- the queue file type (e.g., DATAFL_LETTER)
996**
997** Returns:
998** none
999*/
1000
1001static void
1002dup_queue_file(e, ee, type)
1003 ENVELOPE *e, *ee;
1004 int type;
1005{
1006 char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1007
1008 ee->e_dfp = NULL;
1009 ee->e_xfp = NULL;
1010
1011 /*
1012 ** Make sure both are in the same directory.
1013 */
1014
1015 (void) sm_strlcpy(f1buf, queuename(e, type), sizeof f1buf);
1016 (void) sm_strlcpy(f2buf, queuename(ee, type), sizeof f2buf);
1017
1018 /* Force the df to disk if it's not there yet */
1019 if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1020 sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1021 errno != EINVAL)
1022 {
1023 syserr("!dup_queue_file: can't commit %s", f1buf);
1024 /* NOTREACHED */
1025 }
1026
1027 if (link(f1buf, f2buf) < 0)
1028 {
1029 int save_errno = errno;
1030
1031 syserr("sendall: link(%s, %s)", f1buf, f2buf);
1032 if (save_errno == EEXIST)
1033 {
1034 if (unlink(f2buf) < 0)
1035 {
1036 syserr("!sendall: unlink(%s): permanent",
1037 f2buf);
1038 /* NOTREACHED */
1039 }
1040 if (link(f1buf, f2buf) < 0)
1041 {
1042 syserr("!sendall: link(%s, %s): permanent",
1043 f1buf, f2buf);
1044 /* NOTREACHED */
1045 }
1046 }
1047 }
1048 SYNC_DIR(f2buf, true);
1049}
1050/*
1051** DOFORK -- do a fork, retrying a couple of times on failure.
1052**
1053** This MUST be a macro, since after a vfork we are running
1054** two processes on the same stack!!!
1055**
1056** Parameters:
1057** none.
1058**
1059** Returns:
1060** From a macro??? You've got to be kidding!
1061**
1062** Side Effects:
1063** Modifies the ==> LOCAL <== variable 'pid', leaving:
1064** pid of child in parent, zero in child.
1065** -1 on unrecoverable error.
1066**
1067** Notes:
1068** I'm awfully sorry this looks so awful. That's
1069** vfork for you.....
1070*/
1071
1072#define NFORKTRIES 5
1073
1074#ifndef FORK
1075# define FORK fork
1076#endif /* ! FORK */
1077
1078#define DOFORK(fORKfN) \
1079{\
1080 register int i;\
1081\
1082 for (i = NFORKTRIES; --i >= 0; )\
1083 {\
1084 pid = fORKfN();\
1085 if (pid >= 0)\
1086 break;\
1087 if (i > 0)\
1088 (void) sleep((unsigned) NFORKTRIES - i);\
1089 }\
1090}
1091/*
1092** DOFORK -- simple fork interface to DOFORK.
1093**
1094** Parameters:
1095** none.
1096**
1097** Returns:
1098** pid of child in parent.
1099** zero in child.
1100** -1 on error.
1101**
1102** Side Effects:
1103** returns twice, once in parent and once in child.
1104*/
1105
1106pid_t
1107dofork()
1108{
1109 register pid_t pid = -1;
1110
1111 DOFORK(fork);
1112 return pid;
1113}
1114
1115/*
1116** COLONCMP -- compare host-signatures up to first ':' or EOS
1117**
1118** This takes two strings which happen to be host-signatures and
1119** compares them. If the lowest preference portions of the MX-RR's
1120** match (up to ':' or EOS, whichever is first), then we have
1121** match. This is used for coattail-piggybacking messages during
1122** message delivery.
1123** If the signatures are the same up to the first ':' the remainder of
1124** the signatures are then compared with a normal strcmp(). This saves
1125** re-examining the first part of the signatures.
1126**
1127** Parameters:
1128** a - first host-signature
1129** b - second host-signature
1130**
1131** Returns:
1132** HS_MATCH_NO -- no "match".
1133** HS_MATCH_FIRST -- "match" for the first MX preference
1134** (up to the first colon (':')).
1135** HS_MATCH_FULL -- match for the entire MX record.
1136**
1137** Side Effects:
1138** none.
1139*/
1140
1141#define HS_MATCH_NO 0
1142#define HS_MATCH_FIRST 1
1143#define HS_MATCH_FULL 2
1144
1145static int
1146coloncmp(a, b)
1147 register const char *a;
1148 register const char *b;
1149{
1150 int ret = HS_MATCH_NO;
1151 int braclev = 0;
1152
1153 while (*a == *b++)
1154 {
1155 /* Need to account for IPv6 bracketed addresses */
1156 if (*a == '[')
1157 braclev++;
1158 else if (*a == ']' && braclev > 0)
1159 braclev--;
1160 else if (*a == ':' && braclev <= 0)
1161 {
1162 ret = HS_MATCH_FIRST;
1163 a++;
1164 break;
1165 }
1166 else if (*a == '\0')
1167 return HS_MATCH_FULL; /* a full match */
1168 a++;
1169 }
1170 if (ret == HS_MATCH_NO &&
1171 braclev <= 0 &&
1172 ((*a == '\0' && *(b - 1) == ':') ||
1173 (*a == ':' && *(b - 1) == '\0')))
1174 return HS_MATCH_FIRST;
1175 if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1176 return HS_MATCH_FULL;
1177
1178 return ret;
1179}
1180
1181/*
1182** SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1183**
1184** Parameters:
1185** e -- envelope
1186** tried_fallbacksmarthost -- has been tried already? (in/out)
1187** hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1188** hbsz -- size of hostbuf
1189** status -- current delivery status
1190**
1191** Returns:
1192** true iff FallbackSmartHost should be tried.
1193*/
1194
1195static bool
1196should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1197 ENVELOPE *e;
1198 bool *tried_fallbacksmarthost;
1199 char *hostbuf;
1200 size_t hbsz;
1201 int status;
1202{
1203 /*
1204 ** If the host was not found and a FallbackSmartHost is defined
1205 ** (and we have not yet tried it), then make one last try with
1206 ** it as the host.
1207 */
1208
1209 if (status == EX_NOHOST && FallbackSmartHost != NULL &&
1210 !*tried_fallbacksmarthost)
1211 {
1212 *tried_fallbacksmarthost = true;
1213 expand(FallbackSmartHost, hostbuf, hbsz, e);
1214 if (!wordinclass(hostbuf, 'w'))
1215 {
1216 if (tTd(11, 1))
1217 sm_dprintf("one last try with FallbackSmartHost %s\n",
1218 hostbuf);
1219 return true;
1220 }
1221 }
1222 return false;
1223}
1224/*
1225** DELIVER -- Deliver a message to a list of addresses.
1226**
1227** This routine delivers to everyone on the same host as the
1228** user on the head of the list. It is clever about mailers
1229** that don't handle multiple users. It is NOT guaranteed
1230** that it will deliver to all these addresses however -- so
1231** deliver should be called once for each address on the
1232** list.
1233** Deliver tries to be as opportunistic as possible about piggybacking
1234** messages. Some definitions to make understanding easier follow below.
1235** Piggybacking occurs when an existing connection to a mail host can
1236** be used to send the same message to more than one recipient at the
1237** same time. So "no piggybacking" means one message for one recipient
1238** per connection. "Intentional piggybacking" happens when the
1239** recipients' host address (not the mail host address) is used to
1240** attempt piggybacking. Recipients with the same host address
1241** have the same mail host. "Coincidental piggybacking" relies on
1242** piggybacking based on all the mail host addresses in the MX-RR. This
1243** is "coincidental" in the fact it could not be predicted until the
1244** MX Resource Records for the hosts were obtained and examined. For
1245** example (preference order and equivalence is important, not values):
1246** domain1 IN MX 10 mxhost-A
1247** IN MX 20 mxhost-B
1248** domain2 IN MX 4 mxhost-A
1249** IN MX 8 mxhost-B
1250** Domain1 and domain2 can piggyback the same message to mxhost-A or
1251** mxhost-B (if mxhost-A cannot be reached).
1252** "Coattail piggybacking" relaxes the strictness of "coincidental
1253** piggybacking" in the hope that most significant (lowest value)
1254** MX preference host(s) can create more piggybacking. For example
1255** (again, preference order and equivalence is important, not values):
1256** domain3 IN MX 100 mxhost-C
1257** IN MX 100 mxhost-D
1258** IN MX 200 mxhost-E
1259** domain4 IN MX 50 mxhost-C
1260** IN MX 50 mxhost-D
1261** IN MX 80 mxhost-F
1262** A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1263** is available. Same with mxhost-D because in both RR's the preference
1264** value is the same as mxhost-C, respectively.
1265** So deliver attempts coattail piggybacking when possible. If the
1266** first MX preference level hosts cannot be used then the piggybacking
1267** reverts to coincidental piggybacking. Using the above example you
1268** cannot deliver to mxhost-F for domain3 regardless of preference value.
1269** ("Coattail" from "riding on the coattails of your predecessor" meaning
1270** gaining benefit from a predecessor effort with no or little addition
1271** effort. The predecessor here being the preceding MX RR).
1272**
1273** Parameters:
1274** e -- the envelope to deliver.
1275** firstto -- head of the address list to deliver to.
1276**
1277** Returns:
1278** zero -- successfully delivered.
1279** else -- some failure, see ExitStat for more info.
1280**
1281** Side Effects:
1282** The standard input is passed off to someone.
1283*/
1284
1285static int
1286deliver(e, firstto)
1287 register ENVELOPE *e;
1288 ADDRESS *firstto;
1289{
1290 char *host; /* host being sent to */
1291 char *user; /* user being sent to */
1292 char **pvp;
1293 register char **mvp;
1294 register char *p;
1295 register MAILER *m; /* mailer for this recipient */
1296 ADDRESS *volatile ctladdr;
1297#if HASSETUSERCONTEXT
1298 ADDRESS *volatile contextaddr = NULL;
1299#endif /* HASSETUSERCONTEXT */
1300 register MCI *volatile mci;
1301 register ADDRESS *SM_NONVOLATILE to = firstto;
1302 volatile bool clever = false; /* running user smtp to this mailer */
1303 ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1304 int rcode; /* response code */
1305 SM_NONVOLATILE int lmtp_rcode = EX_OK;
1306 SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1307 SM_NONVOLATILE int hostnum = 0; /* current MX host index */
1308 char *firstsig; /* signature of firstto */
1309 volatile pid_t pid = -1;
1310 char *volatile curhost;
1311 SM_NONVOLATILE unsigned short port = 0;
1312 SM_NONVOLATILE time_t enough = 0;
1313#if NETUNIX
1314 char *SM_NONVOLATILE mux_path = NULL; /* path to UNIX domain socket */
1315#endif /* NETUNIX */
1316 time_t xstart;
1317 bool suidwarn;
1318 bool anyok; /* at least one address was OK */
1319 SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1320 bool ovr;
1321 bool quarantine;
1322 int strsize;
1323 int rcptcount;
1324 int ret;
1325 static int tobufsize = 0;
1326 static char *tobuf = NULL;
1327 char *rpath; /* translated return path */
1328 int mpvect[2];
1329 int rpvect[2];
1330 char *mxhosts[MAXMXHOSTS + 1];
1331 char *pv[MAXPV + 1];
1332 char buf[MAXNAME + 1];
1333 char cbuf[MAXPATHLEN];
1334
1335 errno = 0;
1336 if (!QS_IS_OK(to->q_state))
1337 return 0;
1338
1339 suidwarn = geteuid() == 0;
1340
1341 m = to->q_mailer;
1342 host = to->q_host;
1343 CurEnv = e; /* just in case */
1344 e->e_statmsg = NULL;
1345 SmtpError[0] = '\0';
1346 xstart = curtime();
1347
1348 if (tTd(10, 1))
1349 sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1350 e->e_id, m->m_name, host, to->q_user);
1351 if (tTd(10, 100))
1352 printopenfds(false);
1353
1354 /*
1355 ** Clear {client_*} macros if this is a bounce message to
1356 ** prevent rejection by check_compat ruleset.
1357 */
1358
1359 if (bitset(EF_RESPONSE, e->e_flags))
1360 {
1361 macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1362 macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1363 macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1364 macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1365 macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1366 }
1367
1368 SM_TRY
1369 {
1370 ADDRESS *skip_back = NULL;
1371
1372 /*
1373 ** Do initial argv setup.
1374 ** Insert the mailer name. Notice that $x expansion is
1375 ** NOT done on the mailer name. Then, if the mailer has
1376 ** a picky -f flag, we insert it as appropriate. This
1377 ** code does not check for 'pv' overflow; this places a
1378 ** manifest lower limit of 4 for MAXPV.
1379 ** The from address rewrite is expected to make
1380 ** the address relative to the other end.
1381 */
1382
1383 /* rewrite from address, using rewriting rules */
1384 rcode = EX_OK;
1385 if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1386 p = e->e_sender;
1387 else
1388 p = e->e_from.q_paddr;
1389 rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1390 if (strlen(rpath) > MAXSHORTSTR)
1391 {
1392 rpath = shortenstring(rpath, MAXSHORTSTR);
1393
1394 /* avoid bogus errno */
1395 errno = 0;
1396 syserr("remotename: huge return path %s", rpath);
1397 }
1398 rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1399 macdefine(&e->e_macro, A_PERM, 'g', rpath);
1400 macdefine(&e->e_macro, A_PERM, 'h', host);
1401 Errors = 0;
1402 pvp = pv;
1403 *pvp++ = m->m_argv[0];
1404
1405 /* ignore long term host status information if mailer flag W is set */
1406 if (bitnset(M_NOHOSTSTAT, m->m_flags))
1407 IgnoreHostStatus = true;
1408
1409 /* insert -f or -r flag as appropriate */
1410 if (FromFlag &&
1411 (bitnset(M_FOPT, m->m_flags) ||
1412 bitnset(M_ROPT, m->m_flags)))
1413 {
1414 if (bitnset(M_FOPT, m->m_flags))
1415 *pvp++ = "-f";
1416 else
1417 *pvp++ = "-r";
1418 *pvp++ = rpath;
1419 }
1420
1421 /*
1422 ** Append the other fixed parts of the argv. These run
1423 ** up to the first entry containing "$u". There can only
1424 ** be one of these, and there are only a few more slots
1425 ** in the pv after it.
1426 */
1427
1428 for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1429 {
1430 /* can't use strchr here because of sign extension problems */
1431 while (*p != '\0')
1432 {
1433 if ((*p++ & 0377) == MACROEXPAND)
1434 {
1435 if (*p == 'u')
1436 break;
1437 }
1438 }
1439
1440 if (*p != '\0')
1441 break;
1442
1443 /* this entry is safe -- go ahead and process it */
1444 expand(*mvp, buf, sizeof buf, e);
1445 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1446 if (pvp >= &pv[MAXPV - 3])
1447 {
1448 syserr("554 5.3.5 Too many parameters to %s before $u",
1449 pv[0]);
1450 rcode = -1;
1451 goto cleanup;
1452 }
1453 }
1454
1455 /*
1456 ** If we have no substitution for the user name in the argument
1457 ** list, we know that we must supply the names otherwise -- and
1458 ** SMTP is the answer!!
1459 */
1460
1461 if (*mvp == NULL)
1462 {
1463 /* running LMTP or SMTP */
1464 clever = true;
1465 *pvp = NULL;
1466 }
1467 else if (bitnset(M_LMTP, m->m_flags))
1468 {
1469 /* not running LMTP */
1470 sm_syslog(LOG_ERR, NULL,
1471 "Warning: mailer %s: LMTP flag (F=z) turned off",
1472 m->m_name);
1473 clrbitn(M_LMTP, m->m_flags);
1474 }
1475
1476 /*
1477 ** At this point *mvp points to the argument with $u. We
1478 ** run through our address list and append all the addresses
1479 ** we can. If we run out of space, do not fret! We can
1480 ** always send another copy later.
1481 */
1482
1483 e->e_to = NULL;
1484 strsize = 2;
1485 rcptcount = 0;
1486 ctladdr = NULL;
1487 if (firstto->q_signature == NULL)
1488 firstto->q_signature = hostsignature(firstto->q_mailer,
1489 firstto->q_host);
1490 firstsig = firstto->q_signature;
1491
1492 for (; to != NULL; to = to->q_next)
1493 {
1494 /* avoid sending multiple recipients to dumb mailers */
1495 if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1496 break;
1497
1498 /* if already sent or not for this host, don't send */
1499 if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1500 continue;
1501
1502 /*
1503 ** Must be same mailer to keep grouping rcpts.
1504 ** If mailers don't match: continue; sendqueue is not
1505 ** sorted by mailers, so don't break;
1506 */
1507
1508 if (to->q_mailer != firstto->q_mailer)
1509 continue;
1510
1511 if (to->q_signature == NULL) /* for safety */
1512 to->q_signature = hostsignature(to->q_mailer,
1513 to->q_host);
1514
1515 /*
1516 ** This is for coincidental and tailcoat piggybacking messages
1517 ** to the same mail host. While the signatures are identical
1518 ** (that's the MX-RR's are identical) we can do coincidental
1519 ** piggybacking. We try hard for coattail piggybacking
1520 ** with the same mail host when the next recipient has the
1521 ** same host at lowest preference. It may be that this
1522 ** won't work out, so 'skip_back' is maintained if a backup
1523 ** to coincidental piggybacking or full signature must happen.
1524 */
1525
1526 ret = firstto == to ? HS_MATCH_FULL :
1527 coloncmp(to->q_signature, firstsig);
1528 if (ret == HS_MATCH_FULL)
1529 skip_back = to;
1530 else if (ret == HS_MATCH_NO)
1531 break;
1532
1533 if (!clever)
1534 {
1535 /* avoid overflowing tobuf */
1536 strsize += strlen(to->q_paddr) + 1;
1537 if (strsize > TOBUFSIZE)
1538 break;
1539 }
1540
1541 if (++rcptcount > to->q_mailer->m_maxrcpt)
1542 break;
1543
1544 if (tTd(10, 1))
1545 {
1546 sm_dprintf("\nsend to ");
1547 printaddr(sm_debug_file(), to, false);
1548 }
1549
1550 /* compute effective uid/gid when sending */
1551 if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1552# if HASSETUSERCONTEXT
1553 contextaddr = ctladdr = getctladdr(to);
1554# else /* HASSETUSERCONTEXT */
1555 ctladdr = getctladdr(to);
1556# endif /* HASSETUSERCONTEXT */
1557
1558 if (tTd(10, 2))
1559 {
1560 sm_dprintf("ctladdr=");
1561 printaddr(sm_debug_file(), ctladdr, false);
1562 }
1563
1564 user = to->q_user;
1565 e->e_to = to->q_paddr;
1566
1567 /*
1568 ** Check to see that these people are allowed to
1569 ** talk to each other.
1570 ** Check also for overflow of e_msgsize.
1571 */
1572
1573 if (m->m_maxsize != 0 &&
1574 (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1575 {
1576 e->e_flags |= EF_NO_BODY_RETN;
1577 if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1578 to->q_status = "5.2.3";
1579 else
1580 to->q_status = "5.3.4";
1581
1582 /* set to->q_rstatus = NULL; or to the following? */
1583 usrerrenh(to->q_status,
1584 "552 Message is too large; %ld bytes max",
1585 m->m_maxsize);
1586 markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1587 giveresponse(EX_UNAVAILABLE, to->q_status, m,
1588 NULL, ctladdr, xstart, e, to);
1589 continue;
1590 }
1591 SM_SET_H_ERRNO(0);
1592 ovr = true;
1593
1594 /* do config file checking of compatibility */
1595 quarantine = (e->e_quarmsg != NULL);
1596 rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1597 e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1598 e->e_id);
1599 if (rcode == EX_OK)
1600 {
1601 /* do in-code checking if not discarding */
1602 if (!bitset(EF_DISCARD, e->e_flags))
1603 {
1604 rcode = checkcompat(to, e);
1605 ovr = false;
1606 }
1607 }
1608 if (rcode != EX_OK)
1609 {
1610 markfailure(e, to, NULL, rcode, ovr);
1611 giveresponse(rcode, to->q_status, m,
1612 NULL, ctladdr, xstart, e, to);
1613 continue;
1614 }
1615 if (!quarantine && e->e_quarmsg != NULL)
1616 {
1617 /*
1618 ** check_compat or checkcompat() has tried
1619 ** to quarantine but that isn't supported.
1620 ** Revert the attempt.
1621 */
1622
1623 e->e_quarmsg = NULL;
1624 macdefine(&e->e_macro, A_PERM,
1625 macid("{quarantine}"), "");
1626 }
1627 if (bitset(EF_DISCARD, e->e_flags))
1628 {
1629 if (tTd(10, 5))
1630 {
1631 sm_dprintf("deliver: discarding recipient ");
1632 printaddr(sm_debug_file(), to, false);
1633 }
1634
1635 /* pretend the message was sent */
1636 /* XXX should we log something here? */
1637 to->q_state = QS_DISCARDED;
1638
1639 /*
1640 ** Remove discard bit to prevent discard of
1641 ** future recipients. This is safe because the
1642 ** true "global discard" has been handled before
1643 ** we get here.
1644 */
1645
1646 e->e_flags &= ~EF_DISCARD;
1647 continue;
1648 }
1649
1650 /*
1651 ** Strip quote bits from names if the mailer is dumb
1652 ** about them.
1653 */
1654
1655 if (bitnset(M_STRIPQ, m->m_flags))
1656 {
1657 stripquotes(user);
1658 stripquotes(host);
1659 }
1660
1661 /*
1662 ** Strip all leading backslashes if requested and the
1663 ** next character is alphanumerical (the latter can
1664 ** probably relaxed a bit, see RFC2821).
1665 */
1666
1667 if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1668 stripbackslash(user);
1669
1670 /* hack attack -- delivermail compatibility */
1671 if (m == ProgMailer && *user == '|')
1672 user++;
1673
1674 /*
1675 ** If an error message has already been given, don't
1676 ** bother to send to this address.
1677 **
1678 ** >>>>>>>>>> This clause assumes that the local mailer
1679 ** >> NOTE >> cannot do any further aliasing; that
1680 ** >>>>>>>>>> function is subsumed by sendmail.
1681 */
1682
1683 if (!QS_IS_OK(to->q_state))
1684 continue;
1685
1686 /*
1687 ** See if this user name is "special".
1688 ** If the user name has a slash in it, assume that this
1689 ** is a file -- send it off without further ado. Note
1690 ** that this type of addresses is not processed along
1691 ** with the others, so we fudge on the To person.
1692 */
1693
1694 if (strcmp(m->m_mailer, "[FILE]") == 0)
1695 {
1696 macdefine(&e->e_macro, A_PERM, 'u', user);
1697 p = to->q_home;
1698 if (p == NULL && ctladdr != NULL)
1699 p = ctladdr->q_home;
1700 macdefine(&e->e_macro, A_PERM, 'z', p);
1701 expand(m->m_argv[1], buf, sizeof buf, e);
1702 if (strlen(buf) > 0)
1703 rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1704 else
1705 {
1706 syserr("empty filename specification for mailer %s",
1707 m->m_name);
1708 rcode = EX_CONFIG;
1709 }
1710 giveresponse(rcode, to->q_status, m, NULL,
1711 ctladdr, xstart, e, to);
1712 markfailure(e, to, NULL, rcode, true);
1713 e->e_nsent++;
1714 if (rcode == EX_OK)
1715 {
1716 to->q_state = QS_SENT;
1717 if (bitnset(M_LOCALMAILER, m->m_flags) &&
1718 bitset(QPINGONSUCCESS, to->q_flags))
1719 {
1720 to->q_flags |= QDELIVERED;
1721 to->q_status = "2.1.5";
1722 (void) sm_io_fprintf(e->e_xfp,
1723 SM_TIME_DEFAULT,
1724 "%s... Successfully delivered\n",
1725 to->q_paddr);
1726 }
1727 }
1728 to->q_statdate = curtime();
1729 markstats(e, to, STATS_NORMAL);
1730 continue;
1731 }
1732
1733 /*
1734 ** Address is verified -- add this user to mailer
1735 ** argv, and add it to the print list of recipients.
1736 */
1737
1738 /* link together the chain of recipients */
1739 to->q_tchain = tochain;
1740 tochain = to;
1741 e->e_to = "[CHAIN]";
1742
1743 macdefine(&e->e_macro, A_PERM, 'u', user); /* to user */
1744 p = to->q_home;
1745 if (p == NULL && ctladdr != NULL)
1746 p = ctladdr->q_home;
1747 macdefine(&e->e_macro, A_PERM, 'z', p); /* user's home */
1748
1749 /* set the ${dsn_notify} macro if applicable */
1750 if (bitset(QHASNOTIFY, to->q_flags))
1751 {
1752 char notify[MAXLINE];
1753
1754 notify[0] = '\0';
1755 if (bitset(QPINGONSUCCESS, to->q_flags))
1756 (void) sm_strlcat(notify, "SUCCESS,",
1757 sizeof notify);
1758 if (bitset(QPINGONFAILURE, to->q_flags))
1759 (void) sm_strlcat(notify, "FAILURE,",
1760 sizeof notify);
1761 if (bitset(QPINGONDELAY, to->q_flags))
1762 (void) sm_strlcat(notify, "DELAY,",
1763 sizeof notify);
1764
1765 /* Set to NEVER or drop trailing comma */
1766 if (notify[0] == '\0')
1767 (void) sm_strlcat(notify, "NEVER",
1768 sizeof notify);
1769 else
1770 notify[strlen(notify) - 1] = '\0';
1771
1772 macdefine(&e->e_macro, A_TEMP,
1773 macid("{dsn_notify}"), notify);
1774 }
1775 else
1776 macdefine(&e->e_macro, A_PERM,
1777 macid("{dsn_notify}"), NULL);
1778
1779 /*
1780 ** Expand out this user into argument list.
1781 */
1782
1783 if (!clever)
1784 {
1785 expand(*mvp, buf, sizeof buf, e);
1786 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1787 if (pvp >= &pv[MAXPV - 2])
1788 {
1789 /* allow some space for trailing parms */
1790 break;
1791 }
1792 }
1793 }
1794
1795 /* see if any addresses still exist */
1796 if (tochain == NULL)
1797 {
1798 rcode = 0;
1799 goto cleanup;
1800 }
1801
1802 /* print out messages as full list */
1803 strsize = 1;
1804 for (to = tochain; to != NULL; to = to->q_tchain)
1805 strsize += strlen(to->q_paddr) + 1;
1806 if (strsize < TOBUFSIZE)
1807 strsize = TOBUFSIZE;
1808 if (strsize > tobufsize)
1809 {
1810 SM_FREE_CLR(tobuf);
1811 tobuf = sm_pmalloc_x(strsize);
1812 tobufsize = strsize;
1813 }
1814 p = tobuf;
1815 *p = '\0';
1816 for (to = tochain; to != NULL; to = to->q_tchain)
1817 {
1818 (void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1819 ",", to->q_paddr);
1820 p += strlen(p);
1821 }
1822 e->e_to = tobuf + 1;
1823
1824 /*
1825 ** Fill out any parameters after the $u parameter.
1826 */
1827
1828 if (!clever)
1829 {
1830 while (*++mvp != NULL)
1831 {
1832 expand(*mvp, buf, sizeof buf, e);
1833 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1834 if (pvp >= &pv[MAXPV])
1835 syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1836 pv[0]);
1837 }
1838 }
1839 *pvp++ = NULL;
1840
1841 /*
1842 ** Call the mailer.
1843 ** The argument vector gets built, pipes
1844 ** are created as necessary, and we fork & exec as
1845 ** appropriate.
1846 ** If we are running SMTP, we just need to clean up.
1847 */
1848
1849 /* XXX this seems a bit wierd */
1850 if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1851 bitset(QGOODUID, e->e_from.q_flags))
1852 ctladdr = &e->e_from;
1853
1854#if NAMED_BIND
1855 if (ConfigLevel < 2)
1856 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */
1857#endif /* NAMED_BIND */
1858
1859 if (tTd(11, 1))
1860 {
1861 sm_dprintf("openmailer:");
1862 printav(sm_debug_file(), pv);
1863 }
1864 errno = 0;
1865 SM_SET_H_ERRNO(0);
1866 CurHostName = NULL;
1867
1868 /*
1869 ** Deal with the special case of mail handled through an IPC
1870 ** connection.
1871 ** In this case we don't actually fork. We must be
1872 ** running SMTP for this to work. We will return a
1873 ** zero pid to indicate that we are running IPC.
1874 ** We also handle a debug version that just talks to stdin/out.
1875 */
1876
1877 curhost = NULL;
1878 SmtpPhase = NULL;
1879 mci = NULL;
1880
1881#if XDEBUG
1882 {
1883 char wbuf[MAXLINE];
1884
1885 /* make absolutely certain 0, 1, and 2 are in use */
1886 (void) sm_snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1887 shortenstring(e->e_to, MAXSHORTSTR),
1888 m->m_name);
1889 checkfd012(wbuf);
1890 }
1891#endif /* XDEBUG */
1892
1893 /* check for 8-bit available */
1894 if (bitset(EF_HAS8BIT, e->e_flags) &&
1895 bitnset(M_7BITS, m->m_flags) &&
1896 (bitset(EF_DONT_MIME, e->e_flags) ||
1897 !(bitset(MM_MIME8BIT, MimeMode) ||
1898 (bitset(EF_IS_MIME, e->e_flags) &&
1899 bitset(MM_CVTMIME, MimeMode)))))
1900 {
1901 e->e_status = "5.6.3";
1902 usrerrenh(e->e_status,
1903 "554 Cannot send 8-bit data to 7-bit destination");
1904 rcode = EX_DATAERR;
1905 goto give_up;
1906 }
1907
1908 if (tTd(62, 8))
1909 checkfds("before delivery");
1910
1911 /* check for Local Person Communication -- not for mortals!!! */
1912 if (strcmp(m->m_mailer, "[LPC]") == 0)
1913 {
1914 if (clever)
1915 {
1916 /* flush any expired connections */
1917 (void) mci_scan(NULL);
1918
1919 /* try to get a cached connection or just a slot */
1920 mci = mci_get(m->m_name, m);
1921 if (mci->mci_host == NULL)
1922 mci->mci_host = m->m_name;
1923 CurHostName = mci->mci_host;
1924 if (mci->mci_state != MCIS_CLOSED)
1925 {
1926 message("Using cached SMTP/LPC connection for %s...",
1927 m->m_name);
1928 mci->mci_deliveries++;
1929 goto do_transfer;
1930 }
1931 }
1932 else
1933 {
1934 mci = mci_new(e->e_rpool);
1935 }
1936 mci->mci_in = smioin;
1937 mci->mci_out = smioout;
1938 mci->mci_mailer = m;
1939 mci->mci_host = m->m_name;
1940 if (clever)
1941 {
1942 mci->mci_state = MCIS_OPENING;
1943 mci_cache(mci);
1944 }
1945 else
1946 mci->mci_state = MCIS_OPEN;
1947 }
1948 else if (strcmp(m->m_mailer, "[IPC]") == 0)
1949 {
1950 register int i;
1951
1952 if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1953 {
1954 syserr("null destination for %s mailer", m->m_mailer);
1955 rcode = EX_CONFIG;
1956 goto give_up;
1957 }
1958
1959# if NETUNIX
1960 if (strcmp(pv[0], "FILE") == 0)
1961 {
1962 curhost = CurHostName = "localhost";
1963 mux_path = pv[1];
1964 }
1965 else
1966# endif /* NETUNIX */
1967 {
1968 CurHostName = pv[1];
1969 curhost = hostsignature(m, pv[1]);
1970 }
1971
1972 if (curhost == NULL || curhost[0] == '\0')
1973 {
1974 syserr("null host signature for %s", pv[1]);
1975 rcode = EX_CONFIG;
1976 goto give_up;
1977 }
1978
1979 if (!clever)
1980 {
1981 syserr("554 5.3.5 non-clever IPC");
1982 rcode = EX_CONFIG;
1983 goto give_up;
1984 }
1985 if (pv[2] != NULL
1986# if NETUNIX
1987 && mux_path == NULL
1988# endif /* NETUNIX */
1989 )
1990 {
1991 port = htons((unsigned short) atoi(pv[2]));
1992 if (port == 0)
1993 {
1994# ifdef NO_GETSERVBYNAME
1995 syserr("Invalid port number: %s", pv[2]);
1996# else /* NO_GETSERVBYNAME */
1997 struct servent *sp = getservbyname(pv[2], "tcp");
1998
1999 if (sp == NULL)
2000 syserr("Service %s unknown", pv[2]);
2001 else
2002 port = sp->s_port;
2003# endif /* NO_GETSERVBYNAME */
2004 }
2005 }
2006
2007 nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2008 if (TimeOuts.to_aconnect > 0)
2009 enough = curtime() + TimeOuts.to_aconnect;
2010tryhost:
2011 while (hostnum < nummxhosts)
2012 {
2013 char sep = ':';
2014 char *endp;
2015 static char hostbuf[MAXNAME + 1];
2016 bool tried_fallbacksmarthost = false;
2017
2018# if NETINET6
2019 if (*mxhosts[hostnum] == '[')
2020 {
2021 endp = strchr(mxhosts[hostnum] + 1, ']');
2022 if (endp != NULL)
2023 endp = strpbrk(endp + 1, ":,");
2024 }
2025 else
2026 endp = strpbrk(mxhosts[hostnum], ":,");
2027# else /* NETINET6 */
2028 endp = strpbrk(mxhosts[hostnum], ":,");
2029# endif /* NETINET6 */
2030 if (endp != NULL)
2031 {
2032 sep = *endp;
2033 *endp = '\0';
2034 }
2035
2036 if (hostnum == 1 && skip_back != NULL)
2037 {
2038 /*
2039 ** Coattail piggybacking is no longer an
2040 ** option with the mail host next to be tried
2041 ** no longer the lowest MX preference
2042 ** (hostnum == 1 meaning we're on the second
2043 ** preference). We do not try to coattail
2044 ** piggyback more than the first MX preference.
2045 ** Revert 'tochain' to last location for
2046 ** coincidental piggybacking. This works this
2047 ** easily because the q_tchain kept getting
2048 ** added to the top of the linked list.
2049 */
2050
2051 tochain = skip_back;
2052 }
2053
2054 if (*mxhosts[hostnum] == '\0')
2055 {
2056 syserr("deliver: null host name in signature");
2057 hostnum++;
2058 if (endp != NULL)
2059 *endp = sep;
2060 continue;
2061 }
2062 (void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2063 sizeof hostbuf);
2064 hostnum++;
2065 if (endp != NULL)
2066 *endp = sep;
2067
2068 one_last_try:
2069 /* see if we already know that this host is fried */
2070 CurHostName = hostbuf;
2071 mci = mci_get(hostbuf, m);
2072 if (mci->mci_state != MCIS_CLOSED)
2073 {
2074 char *type;
2075
2076 if (tTd(11, 1))
2077 {
2078 sm_dprintf("openmailer: ");
2079 mci_dump(sm_debug_file(), mci, false);
2080 }
2081 CurHostName = mci->mci_host;
2082 if (bitnset(M_LMTP, m->m_flags))
2083 type = "L";
2084 else if (bitset(MCIF_ESMTP, mci->mci_flags))
2085 type = "ES";
2086 else
2087 type = "S";
2088 message("Using cached %sMTP connection to %s via %s...",
2089 type, hostbuf, m->m_name);
2090 mci->mci_deliveries++;
2091 break;
2092 }
2093 mci->mci_mailer = m;
2094 if (mci->mci_exitstat != EX_OK)
2095 {
2096 if (mci->mci_exitstat == EX_TEMPFAIL)
2097 goodmxfound = true;
2098
2099 /* Try FallbackSmartHost? */
2100 if (should_try_fbsh(e, &tried_fallbacksmarthost,
2101 hostbuf, sizeof hostbuf,
2102 mci->mci_exitstat))
2103 goto one_last_try;
2104
2105 continue;
2106 }
2107
2108 if (mci_lock_host(mci) != EX_OK)
2109 {
2110 mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2111 goodmxfound = true;
2112 continue;
2113 }
2114
2115 /* try the connection */
2116 sm_setproctitle(true, e, "%s %s: %s",
2117 qid_printname(e),
2118 hostbuf, "user open");
2119# if NETUNIX
2120 if (mux_path != NULL)
2121 {
2122 message("Connecting to %s via %s...",
2123 mux_path, m->m_name);
2124 i = makeconnection_ds((char *) mux_path, mci);
2125 }
2126 else
2127# endif /* NETUNIX */
2128 {
2129 if (port == 0)
2130 message("Connecting to %s via %s...",
2131 hostbuf, m->m_name);
2132 else
2133 message("Connecting to %s port %d via %s...",
2134 hostbuf, ntohs(port),
2135 m->m_name);
2136 i = makeconnection(hostbuf, port, mci, e,
2137 enough);
2138 }
2139 mci->mci_errno = errno;
2140 mci->mci_lastuse = curtime();
2141 mci->mci_deliveries = 0;
2142 mci->mci_exitstat = i;
2143# if NAMED_BIND
2144 mci->mci_herrno = h_errno;
2145# endif /* NAMED_BIND */
2146
2147 /*
2148 ** Have we tried long enough to get a connection?
2149 ** If yes, skip to the fallback MX hosts
2150 ** (if existent).
2151 */
2152
2153 if (enough > 0 && mci->mci_lastuse >= enough)
2154 {
2155 int h;
2156# if NAMED_BIND
2157 extern int NumFallbackMXHosts;
2158# else /* NAMED_BIND */
2159 const int NumFallbackMXHosts = 0;
2160# endif /* NAMED_BIND */
2161
2162 if (hostnum < nummxhosts && LogLevel > 9)
2163 sm_syslog(LOG_INFO, e->e_id,
2164 "Timeout.to_aconnect occurred before exhausting all addresses");
2165
2166 /* turn off timeout if fallback available */
2167 if (NumFallbackMXHosts > 0)
2168 enough = 0;
2169
2170 /* skip to a fallback MX host */
2171 h = nummxhosts - NumFallbackMXHosts;
2172 if (hostnum < h)
2173 hostnum = h;
2174 }
2175 if (i == EX_OK)
2176 {
2177 goodmxfound = true;
2178 markstats(e, firstto, STATS_CONNECT);
2179 mci->mci_state = MCIS_OPENING;
2180 mci_cache(mci);
2181 if (TrafficLogFile != NULL)
2182 (void) sm_io_fprintf(TrafficLogFile,
2183 SM_TIME_DEFAULT,
2184 "%05d === CONNECT %s\n",
2185 (int) CurrentPid,
2186 hostbuf);
2187 break;
2188 }
2189 else
2190 {
2191 /* Try FallbackSmartHost? */
2192 if (should_try_fbsh(e, &tried_fallbacksmarthost,
2193 hostbuf, sizeof hostbuf, i))
2194 goto one_last_try;
2195
2196 if (tTd(11, 1))
2197 sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2198 i, errno);
2199 if (i == EX_TEMPFAIL)
2200 goodmxfound = true;
2201 mci_unlock_host(mci);
2202 }
2203
2204 /* enter status of this host */
2205 setstat(i);
2206
2207 /* should print some message here for -v mode */
2208 }
2209 if (mci == NULL)
2210 {
2211 syserr("deliver: no host name");
2212 rcode = EX_SOFTWARE;
2213 goto give_up;
2214 }
2215 mci->mci_pid = 0;
2216 }
2217 else
2218 {
2219 /* flush any expired connections */
2220 (void) mci_scan(NULL);
2221 mci = NULL;
2222
2223 if (bitnset(M_LMTP, m->m_flags))
2224 {
2225 /* try to get a cached connection */
2226 mci = mci_get(m->m_name, m);
2227 if (mci->mci_host == NULL)
2228 mci->mci_host = m->m_name;
2229 CurHostName = mci->mci_host;
2230 if (mci->mci_state != MCIS_CLOSED)
2231 {
2232 message("Using cached LMTP connection for %s...",
2233 m->m_name);
2234 mci->mci_deliveries++;
2235 goto do_transfer;
2236 }
2237 }
2238
2239 /* announce the connection to verbose listeners */
2240 if (host == NULL || host[0] == '\0')
2241 message("Connecting to %s...", m->m_name);
2242 else
2243 message("Connecting to %s via %s...", host, m->m_name);
2244 if (TrafficLogFile != NULL)
2245 {
2246 char **av;
2247
2248 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2249 "%05d === EXEC", (int) CurrentPid);
2250 for (av = pv; *av != NULL; av++)
2251 (void) sm_io_fprintf(TrafficLogFile,
2252 SM_TIME_DEFAULT, " %s",
2253 *av);
2254 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2255 "\n");
2256 }
2257
2258#if XDEBUG
2259 checkfd012("before creating mail pipe");
2260#endif /* XDEBUG */
2261
2262 /* create a pipe to shove the mail through */
2263 if (pipe(mpvect) < 0)
2264 {
2265 syserr("%s... openmailer(%s): pipe (to mailer)",
2266 shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2267 if (tTd(11, 1))
2268 sm_dprintf("openmailer: NULL\n");
2269 rcode = EX_OSERR;
2270 goto give_up;
2271 }
2272
2273#if XDEBUG
2274 /* make sure we didn't get one of the standard I/O files */
2275 if (mpvect[0] < 3 || mpvect[1] < 3)
2276 {
2277 syserr("%s... openmailer(%s): bogus mpvect %d %d",
2278 shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2279 mpvect[0], mpvect[1]);
2280 printopenfds(true);
2281 if (tTd(11, 1))
2282 sm_dprintf("openmailer: NULL\n");
2283 rcode = EX_OSERR;
2284 goto give_up;
2285 }
2286
2287 /* make sure system call isn't dead meat */
2288 checkfdopen(mpvect[0], "mpvect[0]");
2289 checkfdopen(mpvect[1], "mpvect[1]");
2290 if (mpvect[0] == mpvect[1] ||
2291 (e->e_lockfp != NULL &&
2292 (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2293 NULL) ||
2294 mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2295 NULL))))
2296 {
2297 if (e->e_lockfp == NULL)
2298 syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2299 shortenstring(e->e_to, MAXSHORTSTR),
2300 m->m_name, mpvect[0], mpvect[1]);
2301 else
2302 syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2303 shortenstring(e->e_to, MAXSHORTSTR),
2304 m->m_name, mpvect[0], mpvect[1],
2305 sm_io_getinfo(e->e_lockfp,
2306 SM_IO_WHAT_FD, NULL));
2307 }
2308#endif /* XDEBUG */
2309
2310 /* create a return pipe */
2311 if (pipe(rpvect) < 0)
2312 {
2313 syserr("%s... openmailer(%s): pipe (from mailer)",
2314 shortenstring(e->e_to, MAXSHORTSTR),
2315 m->m_name);
2316 (void) close(mpvect[0]);
2317 (void) close(mpvect[1]);
2318 if (tTd(11, 1))
2319 sm_dprintf("openmailer: NULL\n");
2320 rcode = EX_OSERR;
2321 goto give_up;
2322 }
2323#if XDEBUG
2324 checkfdopen(rpvect[0], "rpvect[0]");
2325 checkfdopen(rpvect[1], "rpvect[1]");
2326#endif /* XDEBUG */
2327
2328 /*
2329 ** Actually fork the mailer process.
2330 ** DOFORK is clever about retrying.
2331 **
2332 ** Dispose of SIGCHLD signal catchers that may be laying
2333 ** around so that endmailer will get it.
2334 */
2335
2336 if (e->e_xfp != NULL) /* for debugging */
2337 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2338 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2339 (void) sm_signal(SIGCHLD, SIG_DFL);
2340
2341
2342 DOFORK(FORK);
2343 /* pid is set by DOFORK */
2344
2345 if (pid < 0)
2346 {
2347 /* failure */
2348 syserr("%s... openmailer(%s): cannot fork",
2349 shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2350 (void) close(mpvect[0]);
2351 (void) close(mpvect[1]);
2352 (void) close(rpvect[0]);
2353 (void) close(rpvect[1]);
2354 if (tTd(11, 1))
2355 sm_dprintf("openmailer: NULL\n");
2356 rcode = EX_OSERR;
2357 goto give_up;
2358 }
2359 else if (pid == 0)
2360 {
2361 int save_errno;
2362 int sff;
2363 int new_euid = NO_UID;
2364 int new_ruid = NO_UID;
2365 int new_gid = NO_GID;
2366 char *user = NULL;
2367 struct stat stb;
2368 extern int DtableSize;
2369
2370 CurrentPid = getpid();
2371
2372 /* clear the events to turn off SIGALRMs */
2373 sm_clear_events();
2374
2375 /* Reset global flags */
2376 RestartRequest = NULL;
2377 RestartWorkGroup = false;
2378 ShutdownRequest = NULL;
2379 PendingSignal = 0;
2380
2381 if (e->e_lockfp != NULL)
2382 (void) close(sm_io_getinfo(e->e_lockfp,
2383 SM_IO_WHAT_FD,
2384 NULL));
2385
2386 /* child -- set up input & exec mailer */
2387 (void) sm_signal(SIGALRM, sm_signal_noop);
2388 (void) sm_signal(SIGCHLD, SIG_DFL);
2389 (void) sm_signal(SIGHUP, SIG_IGN);
2390 (void) sm_signal(SIGINT, SIG_IGN);
2391 (void) sm_signal(SIGTERM, SIG_DFL);
2392# ifdef SIGUSR1
2393 (void) sm_signal(SIGUSR1, sm_signal_noop);
2394# endif /* SIGUSR1 */
2395
2396 if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2397 stb.st_mode = 0;
2398
2399# if HASSETUSERCONTEXT
2400 /*
2401 ** Set user resources.
2402 */
2403
2404 if (contextaddr != NULL)
2405 {
2406 int sucflags;
2407 struct passwd *pwd;
2408
2409 if (contextaddr->q_ruser != NULL)
2410 pwd = sm_getpwnam(contextaddr->q_ruser);
2411 else
2412 pwd = sm_getpwnam(contextaddr->q_user);
2413 sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2414#ifdef LOGIN_SETMAC
2415 sucflags |= LOGIN_SETMAC;
2416#endif /* LOGIN_SETMAC */
2417 if (pwd != NULL &&
2418 setusercontext(NULL, pwd, pwd->pw_uid,
2419 sucflags) == -1 &&
2420 suidwarn)
2421 {
2422 syserr("openmailer: setusercontext() failed");
2423 exit(EX_TEMPFAIL);
2424 }
2425 }
2426# endif /* HASSETUSERCONTEXT */
2427
2428#if HASNICE
2429 /* tweak niceness */
2430 if (m->m_nice != 0)
2431 (void) nice(m->m_nice);
2432#endif /* HASNICE */
2433
2434 /* reset group id */
2435 if (bitnset(M_SPECIFIC_UID, m->m_flags))
2436 {
2437 if (m->m_gid == NO_GID)
2438 new_gid = RunAsGid;
2439 else
2440 new_gid = m->m_gid;
2441 }
2442 else if (bitset(S_ISGID, stb.st_mode))
2443 new_gid = stb.st_gid;
2444 else if (ctladdr != NULL && ctladdr->q_gid != 0)
2445 {
2446 if (!DontInitGroups)
2447 {
2448 user = ctladdr->q_ruser;
2449 if (user == NULL)
2450 user = ctladdr->q_user;
2451
2452 if (initgroups(user,
2453 ctladdr->q_gid) == -1
2454 && suidwarn)
2455 {
2456 syserr("openmailer: initgroups(%s, %d) failed",
2457 user, ctladdr->q_gid);
2458 exit(EX_TEMPFAIL);
2459 }
2460 }
2461 else
2462 {
2463 GIDSET_T gidset[1];
2464
2465 gidset[0] = ctladdr->q_gid;
2466 if (setgroups(1, gidset) == -1
2467 && suidwarn)
2468 {
2469 syserr("openmailer: setgroups() failed");
2470 exit(EX_TEMPFAIL);
2471 }
2472 }
2473 new_gid = ctladdr->q_gid;
2474 }
2475 else
2476 {
2477 if (!DontInitGroups)
2478 {
2479 user = DefUser;
2480 if (initgroups(DefUser, DefGid) == -1 &&
2481 suidwarn)
2482 {
2483 syserr("openmailer: initgroups(%s, %d) failed",
2484 DefUser, DefGid);
2485 exit(EX_TEMPFAIL);
2486 }
2487 }
2488 else
2489 {
2490 GIDSET_T gidset[1];
2491
2492 gidset[0] = DefGid;
2493 if (setgroups(1, gidset) == -1
2494 && suidwarn)
2495 {
2496 syserr("openmailer: setgroups() failed");
2497 exit(EX_TEMPFAIL);
2498 }
2499 }
2500 if (m->m_gid == NO_GID)
2501 new_gid = DefGid;
2502 else
2503 new_gid = m->m_gid;
2504 }
2505 if (new_gid != NO_GID)
2506 {
2507 if (RunAsUid != 0 &&
2508 bitnset(M_SPECIFIC_UID, m->m_flags) &&
2509 new_gid != getgid() &&
2510 new_gid != getegid())
2511 {
2512 /* Only root can change the gid */
2513 syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2514 (int) RunAsUid, (int) new_gid,
2515 (int) getgid(), (int) getegid());
2516 exit(EX_TEMPFAIL);
2517 }
2518
2519 if (setgid(new_gid) < 0 && suidwarn)
2520 {
2521 syserr("openmailer: setgid(%ld) failed",
2522 (long) new_gid);
2523 exit(EX_TEMPFAIL);
2524 }
2525 }
2526
2527 /* change root to some "safe" directory */
2528 if (m->m_rootdir != NULL)
2529 {
2530 expand(m->m_rootdir, cbuf, sizeof cbuf, e);
2531 if (tTd(11, 20))
2532 sm_dprintf("openmailer: chroot %s\n",
2533 cbuf);
2534 if (chroot(cbuf) < 0)
2535 {
2536 syserr("openmailer: Cannot chroot(%s)",
2537 cbuf);
2538 exit(EX_TEMPFAIL);
2539 }
2540 if (chdir("/") < 0)
2541 {
2542 syserr("openmailer: cannot chdir(/)");
2543 exit(EX_TEMPFAIL);
2544 }
2545 }
2546
2547 /* reset user id */
2548 endpwent();
2549 sm_mbdb_terminate();
2550 if (bitnset(M_SPECIFIC_UID, m->m_flags))
2551 {
2552 if (m->m_uid == NO_UID)
2553 new_euid = RunAsUid;
2554 else
2555 new_euid = m->m_uid;
2556
2557 /*
2558 ** Undo the effects of the uid change in main
2559 ** for signal handling. The real uid may
2560 ** be used by mailer in adding a "From "
2561 ** line.
2562 */
2563
2564 if (RealUid != 0 && RealUid != getuid())
2565 {
2566# if MAILER_SETUID_METHOD == USE_SETEUID
2567# if HASSETREUID
2568 if (setreuid(RealUid, geteuid()) < 0)
2569 {
2570 syserr("openmailer: setreuid(%d, %d) failed",
2571 (int) RealUid, (int) geteuid());
2572 exit(EX_OSERR);
2573 }
2574# endif /* HASSETREUID */
2575# endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2576# if MAILER_SETUID_METHOD == USE_SETREUID
2577 new_ruid = RealUid;
2578# endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2579 }
2580 }
2581 else if (bitset(S_ISUID, stb.st_mode))
2582 new_ruid = stb.st_uid;
2583 else if (ctladdr != NULL && ctladdr->q_uid != 0)
2584 new_ruid = ctladdr->q_uid;
2585 else if (m->m_uid != NO_UID)
2586 new_ruid = m->m_uid;
2587 else
2588 new_ruid = DefUid;
2589
2590# if _FFR_USE_SETLOGIN
2591 /* run disconnected from terminal and set login name */
2592 if (setsid() >= 0 &&
2593 ctladdr != NULL && ctladdr->q_uid != 0 &&
2594 new_euid == ctladdr->q_uid)
2595 {
2596 struct passwd *pwd;
2597
2598 pwd = sm_getpwuid(ctladdr->q_uid);
2599 if (pwd != NULL && suidwarn)
2600 (void) setlogin(pwd->pw_name);
2601 endpwent();
2602 }
2603# endif /* _FFR_USE_SETLOGIN */
2604
2605 if (new_euid != NO_UID)
2606 {
2607 if (RunAsUid != 0 && new_euid != RunAsUid)
2608 {
2609 /* Only root can change the uid */
2610 syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2611 (int) new_euid, (int) RunAsUid);
2612 exit(EX_TEMPFAIL);
2613 }
2614
2615 vendor_set_uid(new_euid);
2616# if MAILER_SETUID_METHOD == USE_SETEUID
2617 if (seteuid(new_euid) < 0 && suidwarn)
2618 {
2619 syserr("openmailer: seteuid(%ld) failed",
2620 (long) new_euid);
2621 exit(EX_TEMPFAIL);
2622 }
2623# endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2624# if MAILER_SETUID_METHOD == USE_SETREUID
2625 if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2626 {
2627 syserr("openmailer: setreuid(%ld, %ld) failed",
2628 (long) new_ruid, (long) new_euid);
2629 exit(EX_TEMPFAIL);
2630 }
2631# endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2632# if MAILER_SETUID_METHOD == USE_SETUID
2633 if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2634 {
2635 syserr("openmailer: setuid(%ld) failed",
2636 (long) new_euid);
2637 exit(EX_TEMPFAIL);
2638 }
2639# endif /* MAILER_SETUID_METHOD == USE_SETUID */
2640 }
2641 else if (new_ruid != NO_UID)
2642 {
2643 vendor_set_uid(new_ruid);
2644 if (setuid(new_ruid) < 0 && suidwarn)
2645 {
2646 syserr("openmailer: setuid(%ld) failed",
2647 (long) new_ruid);
2648 exit(EX_TEMPFAIL);
2649 }
2650 }
2651
2652 if (tTd(11, 2))
2653 sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2654 (int) getuid(), (int) geteuid(),
2655 (int) getgid(), (int) getegid());
2656
2657 /* move into some "safe" directory */
2658 if (m->m_execdir != NULL)
2659 {
2660 char *q;
2661
2662 for (p = m->m_execdir; p != NULL; p = q)
2663 {
2664 q = strchr(p, ':');
2665 if (q != NULL)
2666 *q = '\0';
2667 expand(p, cbuf, sizeof cbuf, e);
2668 if (q != NULL)
2669 *q++ = ':';
2670 if (tTd(11, 20))
2671 sm_dprintf("openmailer: trydir %s\n",
2672 cbuf);
2673 if (cbuf[0] != '\0' &&
2674 chdir(cbuf) >= 0)
2675 break;
2676 }
2677 }
2678
2679 /* Check safety of program to be run */
2680 sff = SFF_ROOTOK|SFF_EXECOK;
2681 if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2682 DontBlameSendmail))
2683 sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2684 if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2685 DontBlameSendmail))
2686 sff |= SFF_NOPATHCHECK;
2687 else
2688 sff |= SFF_SAFEDIRPATH;
2689 ret = safefile(m->m_mailer, getuid(), getgid(),
2690 user, sff, 0, NULL);
2691 if (ret != 0)
2692 sm_syslog(LOG_INFO, e->e_id,
2693 "Warning: program %s unsafe: %s",
2694 m->m_mailer, sm_errstring(ret));
2695
2696 /* arrange to filter std & diag output of command */
2697 (void) close(rpvect[0]);
2698 if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2699 {
2700 syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2701 shortenstring(e->e_to, MAXSHORTSTR),
2702 m->m_name, rpvect[1]);
2703 _exit(EX_OSERR);
2704 }
2705 (void) close(rpvect[1]);
2706
2707 if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2708 {
2709 syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2710 shortenstring(e->e_to, MAXSHORTSTR),
2711 m->m_name);
2712 _exit(EX_OSERR);
2713 }
2714
2715 /* arrange to get standard input */
2716 (void) close(mpvect[1]);
2717 if (dup2(mpvect[0], STDIN_FILENO) < 0)
2718 {
2719 syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2720 shortenstring(e->e_to, MAXSHORTSTR),
2721 m->m_name, mpvect[0]);
2722 _exit(EX_OSERR);
2723 }
2724 (void) close(mpvect[0]);
2725
2726 /* arrange for all the files to be closed */
2727 sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2728
2729# if !_FFR_USE_SETLOGIN
2730 /* run disconnected from terminal */
2731 (void) setsid();
2732# endif /* !_FFR_USE_SETLOGIN */
2733
2734 /* try to execute the mailer */
2735 (void) execve(m->m_mailer, (ARGV_T) pv,
2736 (ARGV_T) UserEnviron);
2737 save_errno = errno;
2738 syserr("Cannot exec %s", m->m_mailer);
2739 if (bitnset(M_LOCALMAILER, m->m_flags) ||
2740 transienterror(save_errno))
2741 _exit(EX_OSERR);
2742 _exit(EX_UNAVAILABLE);
2743 }
2744
2745 /*
2746 ** Set up return value.
2747 */
2748
2749 if (mci == NULL)
2750 {
2751 if (clever)
2752 {
2753 /*
2754 ** Allocate from general heap, not
2755 ** envelope rpool, because this mci
2756 ** is going to be cached.
2757 */
2758
2759 mci = mci_new(NULL);
2760 }
2761 else
2762 {
2763 /*
2764 ** Prevent a storage leak by allocating
2765 ** this from the envelope rpool.
2766 */
2767
2768 mci = mci_new(e->e_rpool);
2769 }
2770 }
2771 mci->mci_mailer = m;
2772 if (clever)
2773 {
2774 mci->mci_state = MCIS_OPENING;
2775 mci_cache(mci);
2776 }
2777 else
2778 {
2779 mci->mci_state = MCIS_OPEN;
2780 }
2781 mci->mci_pid = pid;
2782 (void) close(mpvect[0]);
2783 mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2784 (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2785 NULL);
2786 if (mci->mci_out == NULL)
2787 {
2788 syserr("deliver: cannot create mailer output channel, fd=%d",
2789 mpvect[1]);
2790 (void) close(mpvect[1]);
2791 (void) close(rpvect[0]);
2792 (void) close(rpvect[1]);
2793 rcode = EX_OSERR;
2794 goto give_up;
2795 }
2796
2797 (void) close(rpvect[1]);
2798 mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2799 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2800 NULL);
2801 if (mci->mci_in == NULL)
2802 {
2803 syserr("deliver: cannot create mailer input channel, fd=%d",
2804 mpvect[1]);
2805 (void) close(rpvect[0]);
2806 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2807 mci->mci_out = NULL;
2808 rcode = EX_OSERR;
2809 goto give_up;
2810 }
2811 }
2812
2813 /*
2814 ** If we are in SMTP opening state, send initial protocol.
2815 */
2816
2817 if (bitnset(M_7BITS, m->m_flags) &&
2818 (!clever || mci->mci_state == MCIS_OPENING))
2819 mci->mci_flags |= MCIF_7BIT;
2820 if (clever && mci->mci_state != MCIS_CLOSED)
2821 {
2822# if STARTTLS || SASL
2823 int dotpos;
2824 char *srvname;
2825 extern SOCKADDR CurHostAddr;
2826# endif /* STARTTLS || SASL */
2827
2828# if SASL
2829# define DONE_AUTH(f) bitset(MCIF_AUTHACT, f)
2830# endif /* SASL */
2831# if STARTTLS
2832# define DONE_STARTTLS(f) bitset(MCIF_TLSACT, f)
2833# endif /* STARTTLS */
2834# define ONLY_HELO(f) bitset(MCIF_ONLY_EHLO, f)
2835# define SET_HELO(f) f |= MCIF_ONLY_EHLO
2836# define CLR_HELO(f) f &= ~MCIF_ONLY_EHLO
2837
2838# if STARTTLS || SASL
2839 /* don't use CurHostName, it is changed in many places */
2840 if (mci->mci_host != NULL)
2841 {
2842 srvname = mci->mci_host;
2843 dotpos = strlen(srvname) - 1;
2844 if (dotpos >= 0)
2845 {
2846 if (srvname[dotpos] == '.')
2847 srvname[dotpos] = '\0';
2848 else
2849 dotpos = -1;
2850 }
2851 }
2852 else if (mci->mci_mailer != NULL)
2853 {
2854 srvname = mci->mci_mailer->m_name;
2855 dotpos = -1;
2856 }
2857 else
2858 {
2859 srvname = "local";
2860 dotpos = -1;
2861 }
2862
2863 /* don't set {server_name} to NULL or "": see getauth() */
2864 macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2865 srvname);
2866
2867 /* CurHostAddr is set by makeconnection() and mci_get() */
2868 if (CurHostAddr.sa.sa_family != 0)
2869 {
2870 macdefine(&mci->mci_macro, A_TEMP,
2871 macid("{server_addr}"),
2872 anynet_ntoa(&CurHostAddr));
2873 }
2874 else if (mci->mci_mailer != NULL)
2875 {
2876 /* mailer name is unique, use it as address */
2877 macdefine(&mci->mci_macro, A_PERM,
2878 macid("{server_addr}"),
2879 mci->mci_mailer->m_name);
2880 }
2881 else
2882 {
2883 /* don't set it to NULL or "": see getauth() */
2884 macdefine(&mci->mci_macro, A_PERM,
2885 macid("{server_addr}"), "0");
2886 }
2887
2888 /* undo change of srvname (mci->mci_host) */
2889 if (dotpos >= 0)
2890 srvname[dotpos] = '.';
2891
2892reconnect: /* after switching to an encrypted connection */
2893# endif /* STARTTLS || SASL */
2894
2895 /* set the current connection information */
2896 e->e_mci = mci;
2897# if SASL
2898 mci->mci_saslcap = NULL;
2899# endif /* SASL */
2900 smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2901 CLR_HELO(mci->mci_flags);
2902
2903 if (IS_DLVR_RETURN(e))
2904 {
2905 /*
2906 ** Check whether other side can deliver e-mail
2907 ** fast enough
2908 */
2909
2910 if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2911 {
2912 e->e_status = "5.4.7";
2913 usrerrenh(e->e_status,
2914 "554 Server does not support Deliver By");
2915 rcode = EX_UNAVAILABLE;
2916 goto give_up;
2917 }
2918 if (e->e_deliver_by > 0 &&
2919 e->e_deliver_by - (curtime() - e->e_ctime) <
2920 mci->mci_min_by)
2921 {
2922 e->e_status = "5.4.7";
2923 usrerrenh(e->e_status,
2924 "554 Message can't be delivered in time; %ld < %ld",
2925 e->e_deliver_by - (curtime() - e->e_ctime),
2926 mci->mci_min_by);
2927 rcode = EX_UNAVAILABLE;
2928 goto give_up;
2929 }
2930 }
2931
2932# if STARTTLS
2933 /* first TLS then AUTH to provide a security layer */
2934 if (mci->mci_state != MCIS_CLOSED &&
2935 !DONE_STARTTLS(mci->mci_flags))
2936 {
2937 int olderrors;
2938 bool usetls;
2939 bool saveQuickAbort = QuickAbort;
2940 bool saveSuprErrs = SuprErrs;
2941 char *host = NULL;
2942
2943 rcode = EX_OK;
2944 usetls = bitset(MCIF_TLS, mci->mci_flags);
2945 if (usetls)
2946 usetls = !iscltflgset(e, D_NOTLS);
2947
2948 if (usetls)
2949 {
2950 host = macvalue(macid("{server_name}"), e);
2951 olderrors = Errors;
2952 QuickAbort = false;
2953 SuprErrs = true;
2954 if (rscheck("try_tls", host, NULL, e,
2955 RSF_RMCOMM, 7, host, NOQID) != EX_OK
2956 || Errors > olderrors)
2957 usetls = false;
2958 SuprErrs = saveSuprErrs;
2959 QuickAbort = saveQuickAbort;
2960 }
2961
2962 if (usetls)
2963 {
2964 if ((rcode = starttls(m, mci, e)) == EX_OK)
2965 {
2966 /* start again without STARTTLS */
2967 mci->mci_flags |= MCIF_TLSACT;
2968 }
2969 else
2970 {
2971 char *s;
2972
2973 /*
2974 ** TLS negotation failed, what to do?
2975 ** fall back to unencrypted connection
2976 ** or abort? How to decide?
2977 ** set a macro and call a ruleset.
2978 */
2979
2980 mci->mci_flags &= ~MCIF_TLS;
2981 switch (rcode)
2982 {
2983 case EX_TEMPFAIL:
2984 s = "TEMP";
2985 break;
2986 case EX_USAGE:
2987 s = "USAGE";
2988 break;
2989 case EX_PROTOCOL:
2990 s = "PROTOCOL";
2991 break;
2992 case EX_SOFTWARE:
2993 s = "SOFTWARE";
2994 break;
2995
2996 /* everything else is a failure */
2997 default:
2998 s = "FAILURE";
2999 rcode = EX_TEMPFAIL;
3000 }
3001 macdefine(&e->e_macro, A_PERM,
3002 macid("{verify}"), s);
3003 }
3004 }
3005 else
3006 macdefine(&e->e_macro, A_PERM,
3007 macid("{verify}"), "NONE");
3008 olderrors = Errors;
3009 QuickAbort = false;
3010 SuprErrs = true;
3011
3012 /*
3013 ** rcode == EX_SOFTWARE is special:
3014 ** the TLS negotation failed
3015 ** we have to drop the connection no matter what
3016 ** However, we call tls_server to give it the chance
3017 ** to log the problem and return an appropriate
3018 ** error code.
3019 */
3020
3021 if (rscheck("tls_server",
3022 macvalue(macid("{verify}"), e),
3023 NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3024 host, NOQID) != EX_OK ||
3025 Errors > olderrors ||
3026 rcode == EX_SOFTWARE)
3027 {
3028 char enhsc[ENHSCLEN];
3029 extern char MsgBuf[];
3030
3031 if (ISSMTPCODE(MsgBuf) &&
3032 extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3033 {
3034 p = sm_rpool_strdup_x(e->e_rpool,
3035 MsgBuf);
3036 }
3037 else
3038 {
3039 p = "403 4.7.0 server not authenticated.";
3040 (void) sm_strlcpy(enhsc, "4.7.0",
3041 sizeof enhsc);
3042 }
3043 SuprErrs = saveSuprErrs;
3044 QuickAbort = saveQuickAbort;
3045
3046 if (rcode == EX_SOFTWARE)
3047 {
3048 /* drop the connection */
3049 mci->mci_state = MCIS_QUITING;
3050 if (mci->mci_in != NULL)
3051 {
3052 (void) sm_io_close(mci->mci_in,
3053 SM_TIME_DEFAULT);
3054 mci->mci_in = NULL;
3055 }
3056 mci->mci_flags &= ~MCIF_TLSACT;
3057 (void) endmailer(mci, e, pv);
3058 }
3059 else
3060 {
3061 /* abort transfer */
3062 smtpquit(m, mci, e);
3063 }
3064
3065 /* avoid bogus error msg */
3066 mci->mci_errno = 0;
3067
3068 /* temp or permanent failure? */
3069 rcode = (*p == '4') ? EX_TEMPFAIL
3070 : EX_UNAVAILABLE;
3071 mci_setstat(mci, rcode, enhsc, p);
3072
3073 /*
3074 ** hack to get the error message into
3075 ** the envelope (done in giveresponse())
3076 */
3077
3078 (void) sm_strlcpy(SmtpError, p,
3079 sizeof SmtpError);
3080 }
3081 QuickAbort = saveQuickAbort;
3082 SuprErrs = saveSuprErrs;
3083 if (DONE_STARTTLS(mci->mci_flags) &&
3084 mci->mci_state != MCIS_CLOSED)
3085 {
3086 SET_HELO(mci->mci_flags);
3087 mci->mci_flags &= ~MCIF_EXTENS;
3088 goto reconnect;
3089 }
3090 }
3091# endif /* STARTTLS */
3092# if SASL
3093 /* if other server supports authentication let's authenticate */
3094 if (mci->mci_state != MCIS_CLOSED &&
3095 mci->mci_saslcap != NULL &&
3096 !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3097 {
3098 /* Should we require some minimum authentication? */
3099 if ((ret = smtpauth(m, mci, e)) == EX_OK)
3100 {
3101 int result;
3102 sasl_ssf_t *ssf = NULL;
3103
3104 /* Get security strength (features) */
3105 result = sasl_getprop(mci->mci_conn, SASL_SSF,
3106# if SASL >= 20000
3107 (const void **) &ssf);
3108# else /* SASL >= 20000 */
3109 (void **) &ssf);
3110# endif /* SASL >= 20000 */
3111
3112 /* XXX authid? */
3113 if (LogLevel > 9)
3114 sm_syslog(LOG_INFO, NOQID,
3115 "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3116 mci->mci_host,
3117 macvalue(macid("{auth_type}"), e),
3118 result == SASL_OK ? *ssf : 0);
3119
3120 /*
3121 ** Only switch to encrypted connection
3122 ** if a security layer has been negotiated
3123 */
3124
3125 if (result == SASL_OK && *ssf > 0)
3126 {
3127 /*
3128 ** Convert I/O layer to use SASL.
3129 ** If the call fails, the connection
3130 ** is aborted.
3131 */
3132
3133 if (sfdcsasl(&mci->mci_in,
3134 &mci->mci_out,
3135 mci->mci_conn) == 0)
3136 {
3137 mci->mci_flags &= ~MCIF_EXTENS;
3138 mci->mci_flags |= MCIF_AUTHACT|
3139 MCIF_ONLY_EHLO;
3140 goto reconnect;
3141 }
3142 syserr("AUTH TLS switch failed in client");
3143 }
3144 /* else? XXX */
3145 mci->mci_flags |= MCIF_AUTHACT;
3146
3147 }
3148 else if (ret == EX_TEMPFAIL)
3149 {
3150 if (LogLevel > 8)
3151 sm_syslog(LOG_ERR, NOQID,
3152 "AUTH=client, relay=%.100s, temporary failure, connection abort",
3153 mci->mci_host);
3154 smtpquit(m, mci, e);
3155
3156 /* avoid bogus error msg */
3157 mci->mci_errno = 0;
3158 rcode = EX_TEMPFAIL;
3159 mci_setstat(mci, rcode, "4.3.0", p);
3160
3161 /*
3162 ** hack to get the error message into
3163 ** the envelope (done in giveresponse())
3164 */
3165
3166 (void) sm_strlcpy(SmtpError,
3167 "Temporary AUTH failure",
3168 sizeof SmtpError);
3169 }
3170 }
3171# endif /* SASL */
3172 }
3173
3174
3175do_transfer:
3176 /* clear out per-message flags from connection structure */
3177 mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3178
3179 if (bitset(EF_HAS8BIT, e->e_flags) &&
3180 !bitset(EF_DONT_MIME, e->e_flags) &&
3181 bitnset(M_7BITS, m->m_flags))
3182 mci->mci_flags |= MCIF_CVT8TO7;
3183
3184#if MIME7TO8
3185 if (bitnset(M_MAKE8BIT, m->m_flags) &&
3186 !bitset(MCIF_7BIT, mci->mci_flags) &&
3187 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3188 (sm_strcasecmp(p, "quoted-printable") == 0 ||
3189 sm_strcasecmp(p, "base64") == 0) &&
3190 (p = hvalue("Content-Type", e->e_header)) != NULL)
3191 {
3192 /* may want to convert 7 -> 8 */
3193 /* XXX should really parse it here -- and use a class XXX */
3194 if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3195 (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3196 mci->mci_flags |= MCIF_CVT7TO8;
3197 }
3198#endif /* MIME7TO8 */
3199
3200 if (tTd(11, 1))
3201 {
3202 sm_dprintf("openmailer: ");
3203 mci_dump(sm_debug_file(), mci, false);
3204 }
3205
3206#if _FFR_CLIENT_SIZE
3207 /*
3208 ** See if we know the maximum size and
3209 ** abort if the message is too big.
3210 **
3211 ** NOTE: _FFR_CLIENT_SIZE is untested.
3212 */
3213
3214 if (bitset(MCIF_SIZE, mci->mci_flags) &&
3215 mci->mci_maxsize > 0 &&
3216 e->e_msgsize > mci->mci_maxsize)
3217 {
3218 e->e_flags |= EF_NO_BODY_RETN;
3219 if (bitnset(M_LOCALMAILER, m->m_flags))
3220 e->e_status = "5.2.3";
3221 else
3222 e->e_status = "5.3.4";
3223
3224 usrerrenh(e->e_status,
3225 "552 Message is too large; %ld bytes max",
3226 mci->mci_maxsize);
3227 rcode = EX_DATAERR;
3228
3229 /* Need an e_message for error */
3230 (void) sm_snprintf(SmtpError, sizeof SmtpError,
3231 "Message is too large; %ld bytes max",
3232 mci->mci_maxsize);
3233 goto give_up;
3234 }
3235#endif /* _FFR_CLIENT_SIZE */
3236
3237 if (mci->mci_state != MCIS_OPEN)
3238 {
3239 /* couldn't open the mailer */
3240 rcode = mci->mci_exitstat;
3241 errno = mci->mci_errno;
3242 SM_SET_H_ERRNO(mci->mci_herrno);
3243 if (rcode == EX_OK)
3244 {
3245 /* shouldn't happen */
3246 syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3247 (unsigned long) mci, rcode, errno,
3248 mci->mci_state, firstsig);
3249 mci_dump_all(smioout, true);
3250 rcode = EX_SOFTWARE;
3251 }
3252 else if (nummxhosts > hostnum)
3253 {
3254 /* try next MX site */
3255 goto tryhost;
3256 }
3257 }
3258 else if (!clever)
3259 {
3260 /*
3261 ** Format and send message.
3262 */
3263
3264 putfromline(mci, e);
3265 (*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3266 (*e->e_putbody)(mci, e, NULL);
3267
3268 /* get the exit status */
3269 rcode = endmailer(mci, e, pv);
3270 if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3271 {
3272 /*
3273 ** Need an e_message for mailq display.
3274 ** We set SmtpError as
3275 */
3276
3277 (void) sm_snprintf(SmtpError, sizeof SmtpError,
3278 "%s mailer (%s) exited with EX_TEMPFAIL",
3279 m->m_name, m->m_mailer);
3280 }
3281 }
3282 else
3283 {
3284 /*
3285 ** Send the MAIL FROM: protocol
3286 */
3287
3288 /* XXX this isn't pipelined... */
3289 rcode = smtpmailfrom(m, mci, e);
3290 if (rcode == EX_OK)
3291 {
3292 register int i;
3293# if PIPELINING
3294 ADDRESS *volatile pchain;
3295# endif /* PIPELINING */
3296
3297 /* send the recipient list */
3298 tobuf[0] = '\0';
3299 mci->mci_retryrcpt = false;
3300 mci->mci_tolist = tobuf;
3301# if PIPELINING
3302 pchain = NULL;
3303 mci->mci_nextaddr = NULL;
3304# endif /* PIPELINING */
3305
3306 for (to = tochain; to != NULL; to = to->q_tchain)
3307 {
3308 if (!QS_IS_UNMARKED(to->q_state))
3309 continue;
3310
3311 /* mark recipient state as "ok so far" */
3312 to->q_state = QS_OK;
3313 e->e_to = to->q_paddr;
3314# if STARTTLS
3315 i = rscheck("tls_rcpt", to->q_user, NULL, e,
3316 RSF_RMCOMM|RSF_COUNT, 3,
3317 mci->mci_host, e->e_id);
3318 if (i != EX_OK)
3319 {
3320 markfailure(e, to, mci, i, false);
3321 giveresponse(i, to->q_status, m, mci,
3322 ctladdr, xstart, e, to);
3323 if (i == EX_TEMPFAIL)
3324 {
3325 mci->mci_retryrcpt = true;
3326 to->q_state = QS_RETRY;
3327 }
3328 continue;
3329 }
3330# endif /* STARTTLS */
3331
3332 i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3333# if PIPELINING
3334 if (i == EX_OK &&
3335 bitset(MCIF_PIPELINED, mci->mci_flags))
3336 {
3337 /*
3338 ** Add new element to list of
3339 ** recipients for pipelining.
3340 */
3341
3342 to->q_pchain = NULL;
3343 if (mci->mci_nextaddr == NULL)
3344 mci->mci_nextaddr = to;
3345 if (pchain == NULL)
3346 pchain = to;
3347 else
3348 {
3349 pchain->q_pchain = to;
3350 pchain = pchain->q_pchain;
3351 }
3352 }
3353# endif /* PIPELINING */
3354 if (i != EX_OK)
3355 {
3356 markfailure(e, to, mci, i, false);
3357 giveresponse(i, to->q_status, m, mci,
3358 ctladdr, xstart, e, to);
3359 if (i == EX_TEMPFAIL)
3360 to->q_state = QS_RETRY;
3361 }
3362 }
3363
3364 /* No recipients in list and no missing responses? */
3365 if (tobuf[0] == '\0'
3366# if PIPELINING
3367 && mci->mci_nextaddr == NULL
3368# endif /* PIPELINING */
3369 )
3370 {
3371 rcode = EX_OK;
3372 e->e_to = NULL;
3373 if (bitset(MCIF_CACHED, mci->mci_flags))
3374 smtprset(m, mci, e);
3375 }
3376 else
3377 {
3378 e->e_to = tobuf + 1;
3379 rcode = smtpdata(m, mci, e, ctladdr, xstart);
3380 }
3381 }
3382 if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3383 {
3384 /* try next MX site */
3385 goto tryhost;
3386 }
3387 }
3388#if NAMED_BIND
3389 if (ConfigLevel < 2)
3390 _res.options |= RES_DEFNAMES | RES_DNSRCH; /* XXX */
3391#endif /* NAMED_BIND */
3392
3393 if (tTd(62, 1))
3394 checkfds("after delivery");
3395
3396 /*
3397 ** Do final status disposal.
3398 ** We check for something in tobuf for the SMTP case.
3399 ** If we got a temporary failure, arrange to queue the
3400 ** addressees.
3401 */
3402
3403 give_up:
3404 if (bitnset(M_LMTP, m->m_flags))
3405 {
3406 lmtp_rcode = rcode;
3407 tobuf[0] = '\0';
3408 anyok = false;
3409 strsize = 0;
3410 }
3411 else
3412 anyok = rcode == EX_OK;
3413
3414 for (to = tochain; to != NULL; to = to->q_tchain)
3415 {
3416 /* see if address already marked */
3417 if (!QS_IS_OK(to->q_state))
3418 continue;
3419
3420 /* if running LMTP, get the status for each address */
3421 if (bitnset(M_LMTP, m->m_flags))
3422 {
3423 if (lmtp_rcode == EX_OK)
3424 rcode = smtpgetstat(m, mci, e);
3425 if (rcode == EX_OK)
3426 {
3427 strsize += sm_strlcat2(tobuf + strsize, ",",
3428 to->q_paddr,
3429 tobufsize - strsize);
3430 SM_ASSERT(strsize < tobufsize);
3431 anyok = true;
3432 }
3433 else
3434 {
3435 e->e_to = to->q_paddr;
3436 markfailure(e, to, mci, rcode, true);
3437 giveresponse(rcode, to->q_status, m, mci,
3438 ctladdr, xstart, e, to);
3439 e->e_to = tobuf + 1;
3440 continue;
3441 }
3442 }
3443 else
3444 {
3445 /* mark bad addresses */
3446 if (rcode != EX_OK)
3447 {
3448 if (goodmxfound && rcode == EX_NOHOST)
3449 rcode = EX_TEMPFAIL;
3450 markfailure(e, to, mci, rcode, true);
3451 continue;
3452 }
3453 }
3454
3455 /* successful delivery */
3456 to->q_state = QS_SENT;
3457 to->q_statdate = curtime();
3458 e->e_nsent++;
3459
3460 /*
3461 ** Checkpoint the send list every few addresses
3462 */
3463
3464 if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3465 {
3466 queueup(e, false, false);
3467 e->e_nsent = 0;
3468 }
3469
3470 if (bitnset(M_LOCALMAILER, m->m_flags) &&
3471 bitset(QPINGONSUCCESS, to->q_flags))
3472 {
3473 to->q_flags |= QDELIVERED;
3474 to->q_status = "2.1.5";
3475 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3476 "%s... Successfully delivered\n",
3477 to->q_paddr);
3478 }
3479 else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3480 bitset(QPRIMARY, to->q_flags) &&
3481 !bitset(MCIF_DSN, mci->mci_flags))
3482 {
3483 to->q_flags |= QRELAYED;
3484 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3485 "%s... relayed; expect no further notifications\n",
3486 to->q_paddr);
3487 }
3488 else if (IS_DLVR_NOTIFY(e) &&
3489 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3490 bitset(QPRIMARY, to->q_flags) &&
3491 (!bitset(QHASNOTIFY, to->q_flags) ||
3492 bitset(QPINGONSUCCESS, to->q_flags) ||
3493 bitset(QPINGONFAILURE, to->q_flags) ||
3494 bitset(QPINGONDELAY, to->q_flags)))
3495 {
3496 /* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3497 to->q_flags |= QBYNRELAY;
3498 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3499 "%s... Deliver-by notify: relayed\n",
3500 to->q_paddr);
3501 }
3502 else if (IS_DLVR_TRACE(e) &&
3503 (!bitset(QHASNOTIFY, to->q_flags) ||
3504 bitset(QPINGONSUCCESS, to->q_flags) ||
3505 bitset(QPINGONFAILURE, to->q_flags) ||
3506 bitset(QPINGONDELAY, to->q_flags)) &&
3507 bitset(QPRIMARY, to->q_flags))
3508 {
3509 /* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3510 to->q_flags |= QBYTRACE;
3511 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3512 "%s... Deliver-By trace: relayed\n",
3513 to->q_paddr);
3514 }
3515 }
3516
3517 if (bitnset(M_LMTP, m->m_flags))
3518 {
3519 /*
3520 ** Global information applies to the last recipient only;
3521 ** clear it out to avoid bogus errors.
3522 */
3523
3524 rcode = EX_OK;
3525 e->e_statmsg = NULL;
3526
3527 /* reset the mci state for the next transaction */
3528 if (mci != NULL &&
3529 (mci->mci_state == MCIS_MAIL ||
3530 mci->mci_state == MCIS_RCPT ||
3531 mci->mci_state == MCIS_DATA))
3532 {
3533 mci->mci_state = MCIS_OPEN;
3534 SmtpPhase = mci->mci_phase = "idle";
3535 sm_setproctitle(true, e, "%s: %s", CurHostName,
3536 mci->mci_phase);
3537 }
3538 }
3539
3540 if (tobuf[0] != '\0')
3541 {
3542 giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3543#if 0
3544 /*
3545 ** This code is disabled for now because I am not
3546 ** sure that copying status from the first recipient
3547 ** to all non-status'ed recipients is a good idea.
3548 */
3549
3550 if (tochain->q_message != NULL &&
3551 !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3552 {
3553 for (to = tochain->q_tchain; to != NULL;
3554 to = to->q_tchain)
3555 {
3556 /* see if address already marked */
3557 if (QS_IS_QUEUEUP(to->q_state) &&
3558 to->q_message == NULL)
3559 to->q_message = sm_rpool_strdup_x(e->e_rpool,
3560 tochain->q_message);
3561 }
3562 }
3563#endif /* 0 */
3564 }
3565 if (anyok)
3566 markstats(e, tochain, STATS_NORMAL);
3567 mci_store_persistent(mci);
3568
3569 /* Some recipients were tempfailed, try them on the next host */
3570 if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3571 {
3572 /* try next MX site */
3573 goto tryhost;
3574 }
3575
3576 /* now close the connection */
3577 if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3578 !bitset(MCIF_CACHED, mci->mci_flags))
3579 smtpquit(m, mci, e);
3580
3581cleanup: ;
3582 }
3583 SM_FINALLY
3584 {
3585 /*
3586 ** Restore state and return.
3587 */
3588#if XDEBUG
3589 char wbuf[MAXLINE];
3590
3591 /* make absolutely certain 0, 1, and 2 are in use */
3592 (void) sm_snprintf(wbuf, sizeof wbuf,
3593 "%s... end of deliver(%s)",
3594 e->e_to == NULL ? "NO-TO-LIST"
3595 : shortenstring(e->e_to,
3596 MAXSHORTSTR),
3597 m->m_name);
3598 checkfd012(wbuf);
3599#endif /* XDEBUG */
3600
3601 errno = 0;
3602
3603 /*
3604 ** It was originally necessary to set macro 'g' to NULL
3605 ** because it previously pointed to an auto buffer.
3606 ** We don't do this any more, so this may be unnecessary.
3607 */
3608
3609 macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3610 e->e_to = NULL;
3611 }
3612 SM_END_TRY
3613 return rcode;
3614}
3615
3616/*
3617** MARKFAILURE -- mark a failure on a specific address.
3618**
3619** Parameters:
3620** e -- the envelope we are sending.
3621** q -- the address to mark.
3622** mci -- mailer connection information.
3623** rcode -- the code signifying the particular failure.
3624** ovr -- override an existing code?
3625**
3626** Returns:
3627** none.
3628**
3629** Side Effects:
3630** marks the address (and possibly the envelope) with the
3631** failure so that an error will be returned or
3632** the message will be queued, as appropriate.
3633*/
3634
3635void
3636markfailure(e, q, mci, rcode, ovr)
3637 register ENVELOPE *e;
3638 register ADDRESS *q;
3639 register MCI *mci;
3640 int rcode;
3641 bool ovr;
3642{
3643 int save_errno = errno;
3644 char *status = NULL;
3645 char *rstatus = NULL;
3646
3647 switch (rcode)
3648 {
3649 case EX_OK:
3650 break;
3651
3652 case EX_TEMPFAIL:
3653 case EX_IOERR:
3654 case EX_OSERR:
3655 q->q_state = QS_QUEUEUP;
3656 break;
3657
3658 default:
3659 q->q_state = QS_BADADDR;
3660 break;
3661 }
3662
3663 /* find most specific error code possible */
3664 if (mci != NULL && mci->mci_status != NULL)
3665 {
3666 status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3667 if (mci->mci_rstatus != NULL)
3668 rstatus = sm_rpool_strdup_x(e->e_rpool,
3669 mci->mci_rstatus);
3670 else
3671 rstatus = NULL;
3672 }
3673 else if (e->e_status != NULL)
3674 {
3675 status = e->e_status;
3676 rstatus = NULL;
3677 }
3678 else
3679 {
3680 switch (rcode)
3681 {
3682 case EX_USAGE:
3683 status = "5.5.4";
3684 break;
3685
3686 case EX_DATAERR:
3687 status = "5.5.2";
3688 break;
3689
3690 case EX_NOUSER:
3691 status = "5.1.1";
3692 break;
3693
3694 case EX_NOHOST:
3695 status = "5.1.2";
3696 break;
3697
3698 case EX_NOINPUT:
3699 case EX_CANTCREAT:
3700 case EX_NOPERM:
3701 status = "5.3.0";
3702 break;
3703
3704 case EX_UNAVAILABLE:
3705 case EX_SOFTWARE:
3706 case EX_OSFILE:
3707 case EX_PROTOCOL:
3708 case EX_CONFIG:
3709 status = "5.5.0";
3710 break;
3711
3712 case EX_OSERR:
3713 case EX_IOERR:
3714 status = "4.5.0";
3715 break;
3716
3717 case EX_TEMPFAIL:
3718 status = "4.2.0";
3719 break;
3720 }
3721 }
3722
3723 /* new status? */
3724 if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3725 *q->q_status == '\0' || *q->q_status < *status))
3726 {
3727 q->q_status = status;
3728 q->q_rstatus = rstatus;
3729 }
3730 if (rcode != EX_OK && q->q_rstatus == NULL &&
3731 q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3732 sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3733 {
3734 char buf[16];
3735
3736 (void) sm_snprintf(buf, sizeof buf, "%d", rcode);
3737 q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3738 }
3739
3740 q->q_statdate = curtime();
3741 if (CurHostName != NULL && CurHostName[0] != '\0' &&
3742 mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3743 q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3744
3745 /* restore errno */
3746 errno = save_errno;
3747}
3748/*
3749** ENDMAILER -- Wait for mailer to terminate.
3750**
3751** We should never get fatal errors (e.g., segmentation
3752** violation), so we report those specially. For other
3753** errors, we choose a status message (into statmsg),
3754** and if it represents an error, we print it.
3755**
3756** Parameters:
3757** mci -- the mailer connection info.
3758** e -- the current envelope.
3759** pv -- the parameter vector that invoked the mailer
3760** (for error messages).
3761**
3762** Returns:
3763** exit code of mailer.
3764**
3765** Side Effects:
3766** none.
3767*/
3768
3769static jmp_buf EndWaitTimeout;
3770
3771static void
3772endwaittimeout(ignore)
3773 int ignore;
3774{
3775 /*
3776 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3777 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3778 ** DOING.
3779 */
3780
3781 errno = ETIMEDOUT;
3782 longjmp(EndWaitTimeout, 1);
3783}
3784
3785int
3786endmailer(mci, e, pv)
3787 register MCI *mci;
3788 register ENVELOPE *e;
3789 char **pv;
3790{
3791 int st;
3792 int save_errno = errno;
3793 char buf[MAXLINE];
3794 SM_EVENT *ev = NULL;
3795
3796
3797 mci_unlock_host(mci);
3798
3799 /* close output to mailer */
3800 if (mci->mci_out != NULL)
3801 {
3802 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3803 mci->mci_out = NULL;
3804 }
3805
3806 /* copy any remaining input to transcript */
3807 if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3808 e->e_xfp != NULL)
3809 {
3810 while (sfgets(buf, sizeof buf, mci->mci_in,
3811 TimeOuts.to_quit, "Draining Input") != NULL)
3812 (void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3813 }
3814
3815#if SASL
3816 /* close SASL connection */
3817 if (bitset(MCIF_AUTHACT, mci->mci_flags))
3818 {
3819 sasl_dispose(&mci->mci_conn);
3820 mci->mci_flags &= ~MCIF_AUTHACT;
3821 }
3822#endif /* SASL */
3823
3824#if STARTTLS
3825 /* shutdown TLS */
3826 (void) endtlsclt(mci);
3827#endif /* STARTTLS */
3828
3829 /* now close the input */
3830 if (mci->mci_in != NULL)
3831 {
3832 (void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3833 mci->mci_in = NULL;
3834 }
3835 mci->mci_state = MCIS_CLOSED;
3836
3837 errno = save_errno;
3838
3839 /* in the IPC case there is nothing to wait for */
3840 if (mci->mci_pid == 0)
3841 return EX_OK;
3842
3843 /* put a timeout around the wait */
3844 if (mci->mci_mailer->m_wait > 0)
3845 {
3846 if (setjmp(EndWaitTimeout) == 0)
3847 ev = sm_setevent(mci->mci_mailer->m_wait,
3848 endwaittimeout, 0);
3849 else
3850 {
3851 syserr("endmailer %s: wait timeout (%ld)",
3852 mci->mci_mailer->m_name,
3853 (long) mci->mci_mailer->m_wait);
3854 return EX_TEMPFAIL;
3855 }
3856 }
3857
3858 /* wait for the mailer process, collect status */
3859 st = waitfor(mci->mci_pid);
3860 save_errno = errno;
3861 if (ev != NULL)
3862 sm_clrevent(ev);
3863 errno = save_errno;
3864
3865 if (st == -1)
3866 {
3867 syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3868 return EX_SOFTWARE;
3869 }
3870
3871 if (WIFEXITED(st))
3872 {
3873 /* normal death -- return status */
3874 return (WEXITSTATUS(st));
3875 }
3876
3877 /* it died a horrid death */
3878 syserr("451 4.3.0 mailer %s died with signal %d%s",
3879 mci->mci_mailer->m_name, WTERMSIG(st),
3880 WCOREDUMP(st) ? " (core dumped)" :
3881 (WIFSTOPPED(st) ? " (stopped)" : ""));
3882
3883 /* log the arguments */
3884 if (pv != NULL && e->e_xfp != NULL)
3885 {
3886 register char **av;
3887
3888 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3889 for (av = pv; *av != NULL; av++)
3890 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3891 *av);
3892 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3893 }
3894
3895 ExitStat = EX_TEMPFAIL;
3896 return EX_TEMPFAIL;
3897}
3898/*
3899** GIVERESPONSE -- Interpret an error response from a mailer
3900**
3901** Parameters:
3902** status -- the status code from the mailer (high byte
3903** only; core dumps must have been taken care of
3904** already).
3905** dsn -- the DSN associated with the address, if any.
3906** m -- the mailer info for this mailer.
3907** mci -- the mailer connection info -- can be NULL if the
3908** response is given before the connection is made.
3909** ctladdr -- the controlling address for the recipient
3910** address(es).
3911** xstart -- the transaction start time, for computing
3912** transaction delays.
3913** e -- the current envelope.
3914** to -- the current recipient (NULL if none).
3915**
3916** Returns:
3917** none.
3918**
3919** Side Effects:
3920** Errors may be incremented.
3921** ExitStat may be set.
3922*/
3923
3924void
3925giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3926 int status;
3927 char *dsn;
3928 register MAILER *m;
3929 register MCI *mci;
3930 ADDRESS *ctladdr;
3931 time_t xstart;
3932 ENVELOPE *e;
3933 ADDRESS *to;
3934{
3935 register const char *statmsg;
3936 int errnum = errno;
3937 int off = 4;
3938 bool usestat = false;
3939 char dsnbuf[ENHSCLEN];
3940 char buf[MAXLINE];
3941 char *exmsg;
3942
3943 if (e == NULL)
3944 syserr("giveresponse: null envelope");
3945
3946 /*
3947 ** Compute status message from code.
3948 */
3949
3950 exmsg = sm_sysexmsg(status);
3951 if (status == 0)
3952 {
3953 statmsg = "250 2.0.0 Sent";
3954 if (e->e_statmsg != NULL)
3955 {
3956 (void) sm_snprintf(buf, sizeof buf, "%s (%s)",
3957 statmsg,
3958 shortenstring(e->e_statmsg, 403));
3959 statmsg = buf;
3960 }
3961 }
3962 else if (exmsg == NULL)
3963 {
3964 (void) sm_snprintf(buf, sizeof buf,
3965 "554 5.3.0 unknown mailer error %d",
3966 status);
3967 status = EX_UNAVAILABLE;
3968 statmsg = buf;
3969 usestat = true;
3970 }
3971 else if (status == EX_TEMPFAIL)
3972 {
3973 char *bp = buf;
3974
3975 (void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
3976 bp += strlen(bp);
3977#if NAMED_BIND
3978 if (h_errno == TRY_AGAIN)
3979 statmsg = sm_errstring(h_errno + E_DNSBASE);
3980 else
3981#endif /* NAMED_BIND */
3982 {
3983 if (errnum != 0)
3984 statmsg = sm_errstring(errnum);
3985 else
3986 statmsg = SmtpError;
3987 }
3988 if (statmsg != NULL && statmsg[0] != '\0')
3989 {
3990 switch (errnum)
3991 {
3992#ifdef ENETDOWN
3993 case ENETDOWN: /* Network is down */
3994#endif /* ENETDOWN */
3995#ifdef ENETUNREACH
3996 case ENETUNREACH: /* Network is unreachable */
3997#endif /* ENETUNREACH */
3998#ifdef ENETRESET
3999 case ENETRESET: /* Network dropped connection on reset */
4000#endif /* ENETRESET */
4001#ifdef ECONNABORTED
4002 case ECONNABORTED: /* Software caused connection abort */
4003#endif /* ECONNABORTED */
4004#ifdef EHOSTDOWN
4005 case EHOSTDOWN: /* Host is down */
4006#endif /* EHOSTDOWN */
4007#ifdef EHOSTUNREACH
4008 case EHOSTUNREACH: /* No route to host */
4009#endif /* EHOSTUNREACH */
4010 if (mci != NULL && mci->mci_host != NULL)
4011 {
4012 (void) sm_strlcpyn(bp,
4013 SPACELEFT(buf, bp),
4014 2, ": ",
4015 mci->mci_host);
4016 bp += strlen(bp);
4017 }
4018 break;
4019 }
4020 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4021 statmsg);
4022 usestat = true;
4023 }
4024 statmsg = buf;
4025 }
4026#if NAMED_BIND
4027 else if (status == EX_NOHOST && h_errno != 0)
4028 {
4029 statmsg = sm_errstring(h_errno + E_DNSBASE);
4030 (void) sm_snprintf(buf, sizeof buf, "%s (%s)", exmsg + 1,
4031 statmsg);
4032 statmsg = buf;
4033 usestat = true;
4034 }
4035#endif /* NAMED_BIND */
4036 else
4037 {
4038 statmsg = exmsg;
4039 if (*statmsg++ == ':' && errnum != 0)
4040 {
4041 (void) sm_snprintf(buf, sizeof buf, "%s: %s", statmsg,
4042 sm_errstring(errnum));
4043 statmsg = buf;
4044 usestat = true;
4045 }
4046 else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4047 {
4048 (void) sm_snprintf(buf, sizeof buf, "%s (%s)", statmsg,
4049 shortenstring(e->e_statmsg, 403));
4050 statmsg = buf;
4051 usestat = true;
4052 }
4053 }
4054
4055 /*
4056 ** Print the message as appropriate
4057 */
4058
4059 if (status == EX_OK || status == EX_TEMPFAIL)
4060 {
4061 extern char MsgBuf[];
4062
4063 if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4064 {
4065 if (dsn == NULL)
4066 {
4067 (void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4068 "%.*s", off, statmsg + 4);
4069 dsn = dsnbuf;
4070 }
4071 off += 5;
4072 }
4073 else
4074 {
4075 off = 4;
4076 }
4077 message("%s", statmsg + off);
4078 if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4079 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4080 &MsgBuf[4]);
4081 }
4082 else
4083 {
4084 char mbuf[ENHSCLEN + 4];
4085
4086 Errors++;
4087 if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4088 off < sizeof mbuf - 4)
4089 {
4090 if (dsn == NULL)
4091 {
4092 (void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4093 "%.*s", off, statmsg + 4);
4094 dsn = dsnbuf;
4095 }
4096 off += 5;
4097
4098 /* copy only part of statmsg to mbuf */
4099 (void) sm_strlcpy(mbuf, statmsg, off);
4100 (void) sm_strlcat(mbuf, " %s", sizeof mbuf);
4101 }
4102 else
4103 {
4104 dsnbuf[0] = '\0';
4105 (void) sm_snprintf(mbuf, sizeof mbuf, "%.3s %%s",
4106 statmsg);
4107 off = 4;
4108 }
4109 usrerr(mbuf, &statmsg[off]);
4110 }
4111
4112 /*
4113 ** Final cleanup.
4114 ** Log a record of the transaction. Compute the new
4115 ** ExitStat -- if we already had an error, stick with
4116 ** that.
4117 */
4118
4119 if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4120 LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4121 logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4122
4123 if (tTd(11, 2))
4124 sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4125 status,
4126 dsn == NULL ? "<NULL>" : dsn,
4127 e->e_message == NULL ? "<NULL>" : e->e_message,
4128 errnum);
4129
4130 if (status != EX_TEMPFAIL)
4131 setstat(status);
4132 if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4133 e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4134 if (status != EX_OK && to != NULL && to->q_message == NULL)
4135 {
4136 if (!usestat && e->e_message != NULL)
4137 to->q_message = sm_rpool_strdup_x(e->e_rpool,
4138 e->e_message);
4139 else
4140 to->q_message = sm_rpool_strdup_x(e->e_rpool,
4141 statmsg + off);
4142 }
4143 errno = 0;
4144 SM_SET_H_ERRNO(0);
4145}
4146/*
4147** LOGDELIVERY -- log the delivery in the system log
4148**
4149** Care is taken to avoid logging lines that are too long, because
4150** some versions of syslog have an unfortunate proclivity for core
4151** dumping. This is a hack, to be sure, that is at best empirical.
4152**
4153** Parameters:
4154** m -- the mailer info. Can be NULL for initial queue.
4155** mci -- the mailer connection info -- can be NULL if the
4156** log is occurring when no connection is active.
4157** dsn -- the DSN attached to the status.
4158** status -- the message to print for the status.
4159** ctladdr -- the controlling address for the to list.
4160** xstart -- the transaction start time, used for
4161** computing transaction delay.
4162** e -- the current envelope.
4163**
4164** Returns:
4165** none
4166**
4167** Side Effects:
4168** none
4169*/
4170
4171void
4172logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4173 MAILER *m;
4174 register MCI *mci;
4175 char *dsn;
4176 const char *status;
4177 ADDRESS *ctladdr;
4178 time_t xstart;
4179 register ENVELOPE *e;
4180{
4181 register char *bp;
4182 register char *p;
4183 int l;
4184 time_t now = curtime();
4185 char buf[1024];
4186
4187#if (SYSLOG_BUFSIZE) >= 256
4188 /* ctladdr: max 106 bytes */
4189 bp = buf;
4190 if (ctladdr != NULL)
4191 {
4192 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4193 shortenstring(ctladdr->q_paddr, 83));
4194 bp += strlen(bp);
4195 if (bitset(QGOODUID, ctladdr->q_flags))
4196 {
4197 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4198 (int) ctladdr->q_uid,
4199 (int) ctladdr->q_gid);
4200 bp += strlen(bp);
4201 }
4202 }
4203
4204 /* delay & xdelay: max 41 bytes */
4205 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4206 pintvl(now - e->e_ctime, true));
4207 bp += strlen(bp);
4208
4209 if (xstart != (time_t) 0)
4210 {
4211 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4212 pintvl(now - xstart, true));
4213 bp += strlen(bp);
4214 }
4215
4216 /* mailer: assume about 19 bytes (max 10 byte mailer name) */
4217 if (m != NULL)
4218 {
4219 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4220 m->m_name);
4221 bp += strlen(bp);
4222 }
4223
4224 /* pri: changes with each delivery attempt */
4225 (void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4226 e->e_msgpriority);
4227 bp += strlen(bp);
4228
4229 /* relay: max 66 bytes for IPv4 addresses */
4230 if (mci != NULL && mci->mci_host != NULL)
4231 {
4232 extern SOCKADDR CurHostAddr;
4233
4234 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4235 shortenstring(mci->mci_host, 40));
4236 bp += strlen(bp);
4237
4238 if (CurHostAddr.sa.sa_family != 0)
4239 {
4240 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4241 anynet_ntoa(&CurHostAddr));
4242 }
4243 }
4244 else if (strcmp(status, "quarantined") == 0)
4245 {
4246 if (e->e_quarmsg != NULL)
4247 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4248 ", quarantine=%s",
4249 shortenstring(e->e_quarmsg, 40));
4250 }
4251 else if (strcmp(status, "queued") != 0)
4252 {
4253 p = macvalue('h', e);
4254 if (p != NULL && p[0] != '\0')
4255 {
4256 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4257 ", relay=%s", shortenstring(p, 40));
4258 }
4259 }
4260 bp += strlen(bp);
4261
4262 /* dsn */
4263 if (dsn != NULL && *dsn != '\0')
4264 {
4265 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4266 shortenstring(dsn, ENHSCLEN));
4267 bp += strlen(bp);
4268 }
4269
4270#if _FFR_LOG_NTRIES
4271 /* ntries */
4272 if (e->e_ntries >= 0)
4273 {
4274 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4275 ", ntries=%d", e->e_ntries + 1);
4276 bp += strlen(bp);
4277 }
4278#endif /* _FFR_LOG_NTRIES */
4279
4280# define STATLEN (((SYSLOG_BUFSIZE) - 100) / 4)
4281# if (STATLEN) < 63
4282# undef STATLEN
4283# define STATLEN 63
4284# endif /* (STATLEN) < 63 */
4285# if (STATLEN) > 203
4286# undef STATLEN
4287# define STATLEN 203
4288# endif /* (STATLEN) > 203 */
4289
4290 /* stat: max 210 bytes */
4291 if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
4292 {
4293 /* desperation move -- truncate data */
4294 bp = buf + sizeof buf - ((STATLEN) + 17);
4295 (void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4296 bp += 3;
4297 }
4298
4299 (void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4300 bp += strlen(bp);
4301
4302 (void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4303 SPACELEFT(buf, bp));
4304
4305 /* id, to: max 13 + TOBUFSIZE bytes */
4306 l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4307 if (l < 0)
4308 l = 0;
4309 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4310 while (strlen(p) >= l)
4311 {
4312 register char *q;
4313
4314 for (q = p + l; q > p; q--)
4315 {
4316 if (*q == ',')
4317 break;
4318 }
4319 if (p == q)
4320 break;
4321 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4322 (int) (++q - p), p, buf);
4323 p = q;
4324 }
4325 sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4326
4327#else /* (SYSLOG_BUFSIZE) >= 256 */
4328
4329 l = SYSLOG_BUFSIZE - 85;
4330 if (l < 0)
4331 l = 0;
4332 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4333 while (strlen(p) >= l)
4334 {
4335 register char *q;
4336
4337 for (q = p + l; q > p; q--)
4338 {
4339 if (*q == ',')
4340 break;
4341 }
4342 if (p == q)
4343 break;
4344
4345 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4346 (int) (++q - p), p);
4347 p = q;
4348 }
4349 sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4350
4351 if (ctladdr != NULL)
4352 {
4353 bp = buf;
4354 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4355 shortenstring(ctladdr->q_paddr, 83));
4356 bp += strlen(bp);
4357 if (bitset(QGOODUID, ctladdr->q_flags))
4358 {
4359 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4360 ctladdr->q_uid, ctladdr->q_gid);
4361 bp += strlen(bp);
4362 }
4363 sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4364 }
4365 bp = buf;
4366 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4367 pintvl(now - e->e_ctime, true));
4368 bp += strlen(bp);
4369 if (xstart != (time_t) 0)
4370 {
4371 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4372 pintvl(now - xstart, true));
4373 bp += strlen(bp);
4374 }
4375
4376 if (m != NULL)
4377 {
4378 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4379 m->m_name);
4380 bp += strlen(bp);
4381 }
4382 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4383
4384 buf[0] = '\0';
4385 bp = buf;
4386 if (mci != NULL && mci->mci_host != NULL)
4387 {
4388 extern SOCKADDR CurHostAddr;
4389
4390 (void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4391 mci->mci_host);
4392 bp += strlen(bp);
4393
4394 if (CurHostAddr.sa.sa_family != 0)
4395 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4396 " [%.100s]",
4397 anynet_ntoa(&CurHostAddr));
4398 }
4399 else if (strcmp(status, "quarantined") == 0)
4400 {
4401 if (e->e_quarmsg != NULL)
4402 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4403 ", quarantine=%.100s",
4404 e->e_quarmsg);
4405 }
4406 else if (strcmp(status, "queued") != 0)
4407 {
4408 p = macvalue('h', e);
4409 if (p != NULL && p[0] != '\0')
4410 (void) sm_snprintf(buf, sizeof buf, "relay=%.100s", p);
4411 }
4412 if (buf[0] != '\0')
4413 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4414
4415 sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4416#endif /* (SYSLOG_BUFSIZE) >= 256 */
4417}
4418/*
4419** PUTFROMLINE -- output a UNIX-style from line (or whatever)
4420**
4421** This can be made an arbitrary message separator by changing $l
4422**
4423** One of the ugliest hacks seen by human eyes is contained herein:
4424** UUCP wants those stupid "remote from <host>" lines. Why oh why
4425** does a well-meaning programmer such as myself have to deal with
4426** this kind of antique garbage????
4427**
4428** Parameters:
4429** mci -- the connection information.
4430** e -- the envelope.
4431**
4432** Returns:
4433** none
4434**
4435** Side Effects:
4436** outputs some text to fp.
4437*/
4438
4439void
4440putfromline(mci, e)
4441 register MCI *mci;
4442 ENVELOPE *e;
4443{
4444 char *template = UnixFromLine;
4445 char buf[MAXLINE];
4446 char xbuf[MAXLINE];
4447
4448 if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4449 return;
4450
4451 mci->mci_flags |= MCIF_INHEADER;
4452
4453 if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4454 {
4455 char *bang;
4456
4457 expand("\201g", buf, sizeof buf, e);
4458 bang = strchr(buf, '!');
4459 if (bang == NULL)
4460 {
4461 char *at;
4462 char hname[MAXNAME];
4463
4464 /*
4465 ** If we can construct a UUCP path, do so
4466 */
4467
4468 at = strrchr(buf, '@');
4469 if (at == NULL)
4470 {
4471 expand("\201k", hname, sizeof hname, e);
4472 at = hname;
4473 }
4474 else
4475 *at++ = '\0';
4476 (void) sm_snprintf(xbuf, sizeof xbuf,
4477 "From %.800s \201d remote from %.100s\n",
4478 buf, at);
4479 }
4480 else
4481 {
4482 *bang++ = '\0';
4483 (void) sm_snprintf(xbuf, sizeof xbuf,
4484 "From %.800s \201d remote from %.100s\n",
4485 bang, buf);
4486 template = xbuf;
4487 }
4488 }
4489 expand(template, buf, sizeof buf, e);
4490 putxline(buf, strlen(buf), mci, PXLF_HEADER);
4491}
4492/*
4493** PUTBODY -- put the body of a message.
4494**
4495** Parameters:
4496** mci -- the connection information.
4497** e -- the envelope to put out.
4498** separator -- if non-NULL, a message separator that must
4499** not be permitted in the resulting message.
4500**
4501** Returns:
4502** none.
4503**
4504** Side Effects:
4505** The message is written onto fp.
4506*/
4507
4508/* values for output state variable */
4509#define OS_HEAD 0 /* at beginning of line */
4510#define OS_CR 1 /* read a carriage return */
4511#define OS_INLINE 2 /* putting rest of line */
4512
4513void
4514putbody(mci, e, separator)
4515 register MCI *mci;
4516 register ENVELOPE *e;
4517 char *separator;
4518{
4519 bool dead = false;
4520 char buf[MAXLINE];
4521#if MIME8TO7
4522 char *boundaries[MAXMIMENESTING + 1];
4523#endif /* MIME8TO7 */
4524
4525 /*
4526 ** Output the body of the message
4527 */
4528
4529 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4530 {
4531 char *df = queuename(e, DATAFL_LETTER);
4532
4533 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4534 SM_IO_RDONLY_B, NULL);
4535 if (e->e_dfp == NULL)
4536 {
4537 char *msg = "!putbody: Cannot open %s for %s from %s";
4538
4539 if (errno == ENOENT)
4540 msg++;
4541 syserr(msg, df, e->e_to, e->e_from.q_paddr);
4542 }
4543
4544 }
4545 if (e->e_dfp == NULL)
4546 {
4547 if (bitset(MCIF_INHEADER, mci->mci_flags))
4548 {
4549 putline("", mci);
4550 mci->mci_flags &= ~MCIF_INHEADER;
4551 }
4552 putline("<<< No Message Collected >>>", mci);
4553 goto endofmessage;
4554 }
4555
4556 if (e->e_dfino == (ino_t) 0)
4557 {
4558 struct stat stbuf;
4559
4560 if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4561 < 0)
4562 e->e_dfino = -1;
4563 else
4564 {
4565 e->e_dfdev = stbuf.st_dev;
4566 e->e_dfino = stbuf.st_ino;
4567 }
4568 }
4569
4570 /* paranoia: the data file should always be in a rewound state */
4571 (void) bfrewind(e->e_dfp);
4572
4573#if MIME8TO7
4574 if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4575 {
4576 /*
4577 ** Do 8 to 7 bit MIME conversion.
4578 */
4579
4580 /* make sure it looks like a MIME message */
4581 if (hvalue("MIME-Version", e->e_header) == NULL)
4582 putline("MIME-Version: 1.0", mci);
4583
4584 if (hvalue("Content-Type", e->e_header) == NULL)
4585 {
4586 (void) sm_snprintf(buf, sizeof buf,
4587 "Content-Type: text/plain; charset=%s",
4588 defcharset(e));
4589 putline(buf, mci);
4590 }
4591
4592 /* now do the hard work */
4593 boundaries[0] = NULL;
4594 mci->mci_flags |= MCIF_INHEADER;
4595 (void) mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER);
4596 }
4597# if MIME7TO8
4598 else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4599 {
4600 (void) mime7to8(mci, e->e_header, e);
4601 }
4602# endif /* MIME7TO8 */
4603 else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4604 {
4605 bool oldsuprerrs = SuprErrs;
4606
4607 /* Use mime8to7 to check multipart for MIME header overflows */
4608 boundaries[0] = NULL;
4609 mci->mci_flags |= MCIF_INHEADER;
4610
4611 /*
4612 ** If EF_DONT_MIME is set, we have a broken MIME message
4613 ** and don't want to generate a new bounce message whose
4614 ** body propagates the broken MIME. We can't just not call
4615 ** mime8to7() as is done above since we need the security
4616 ** checks. The best we can do is suppress the errors.
4617 */
4618
4619 if (bitset(EF_DONT_MIME, e->e_flags))
4620 SuprErrs = true;
4621
4622 (void) mime8to7(mci, e->e_header, e, boundaries,
4623 M87F_OUTER|M87F_NO8TO7);
4624
4625 /* restore SuprErrs */
4626 SuprErrs = oldsuprerrs;
4627 }
4628 else
4629#endif /* MIME8TO7 */
4630 {
4631 int ostate;
4632 register char *bp;
4633 register char *pbp;
4634 register int c;
4635 register char *xp;
4636 int padc;
4637 char *buflim;
4638 int pos = 0;
4639 char peekbuf[12];
4640
4641 if (bitset(MCIF_INHEADER, mci->mci_flags))
4642 {
4643 putline("", mci);
4644 mci->mci_flags &= ~MCIF_INHEADER;
4645 }
4646
4647 /* determine end of buffer; allow for short mailer lines */
4648 buflim = &buf[sizeof buf - 1];
4649 if (mci->mci_mailer->m_linelimit > 0 &&
4650 mci->mci_mailer->m_linelimit < sizeof buf - 1)
4651 buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4652
4653 /* copy temp file to output with mapping */
4654 ostate = OS_HEAD;
4655 bp = buf;
4656 pbp = peekbuf;
4657 while (!sm_io_error(mci->mci_out) && !dead)
4658 {
4659 if (pbp > peekbuf)
4660 c = *--pbp;
4661 else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4662 == SM_IO_EOF)
4663 break;
4664 if (bitset(MCIF_7BIT, mci->mci_flags))
4665 c &= 0x7f;
4666 switch (ostate)
4667 {
4668 case OS_HEAD:
4669 if (c == '\0' &&
4670 bitnset(M_NONULLS,
4671 mci->mci_mailer->m_flags))
4672 break;
4673 if (c != '\r' && c != '\n' && bp < buflim)
4674 {
4675 *bp++ = c;
4676 break;
4677 }
4678
4679 /* check beginning of line for special cases */
4680 *bp = '\0';
4681 pos = 0;
4682 padc = SM_IO_EOF;
4683 if (buf[0] == 'F' &&
4684 bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4685 && strncmp(buf, "From ", 5) == 0)
4686 {
4687 padc = '>';
4688 }
4689 if (buf[0] == '-' && buf[1] == '-' &&
4690 separator != NULL)
4691 {
4692 /* possible separator */
4693 int sl = strlen(separator);
4694
4695 if (strncmp(&buf[2], separator, sl)
4696 == 0)
4697 padc = ' ';
4698 }
4699 if (buf[0] == '.' &&
4700 bitnset(M_XDOT, mci->mci_mailer->m_flags))
4701 {
4702 padc = '.';
4703 }
4704
4705 /* now copy out saved line */
4706 if (TrafficLogFile != NULL)
4707 {
4708 (void) sm_io_fprintf(TrafficLogFile,
4709 SM_TIME_DEFAULT,
4710 "%05d >>> ",
4711 (int) CurrentPid);
4712 if (padc != SM_IO_EOF)
4713 (void) sm_io_putc(TrafficLogFile,
4714 SM_TIME_DEFAULT,
4715 padc);
4716 for (xp = buf; xp < bp; xp++)
4717 (void) sm_io_putc(TrafficLogFile,
4718 SM_TIME_DEFAULT,
4719 (unsigned char) *xp);
4720 if (c == '\n')
4721 (void) sm_io_fputs(TrafficLogFile,
4722 SM_TIME_DEFAULT,
4723 mci->mci_mailer->m_eol);
4724 }
4725 if (padc != SM_IO_EOF)
4726 {
4727 if (sm_io_putc(mci->mci_out,
4728 SM_TIME_DEFAULT, padc)
4729 == SM_IO_EOF)
4730 {
4731 dead = true;
4732 continue;
4733 }
4734 else
4735 {
4736 /* record progress for DATA timeout */
4737 DataProgress = true;
4738 }
4739 pos++;
4740 }
4741 for (xp = buf; xp < bp; xp++)
4742 {
4743 if (sm_io_putc(mci->mci_out,
4744 SM_TIME_DEFAULT,
4745 (unsigned char) *xp)
4746 == SM_IO_EOF)
4747 {
4748 dead = true;
4749 break;
4750 }
4751 else
4752 {
4753 /* record progress for DATA timeout */
4754 DataProgress = true;
4755 }
4756 }
4757 if (dead)
4758 continue;
4759 if (c == '\n')
4760 {
4761 if (sm_io_fputs(mci->mci_out,
4762 SM_TIME_DEFAULT,
4763 mci->mci_mailer->m_eol)
4764 == SM_IO_EOF)
4765 break;
4766 else
4767 {
4768 /* record progress for DATA timeout */
4769 DataProgress = true;
4770 }
4771 pos = 0;
4772 }
4773 else
4774 {
4775 pos += bp - buf;
4776 if (c != '\r')
4777 {
4778 SM_ASSERT(pbp < peekbuf +
4779 sizeof(peekbuf));
4780 *pbp++ = c;
4781 }
4782 }
4783
4784 bp = buf;
4785
4786 /* determine next state */
4787 if (c == '\n')
4788 ostate = OS_HEAD;
4789 else if (c == '\r')
4790 ostate = OS_CR;
4791 else
4792 ostate = OS_INLINE;
4793 continue;
4794
4795 case OS_CR:
4796 if (c == '\n')
4797 {
4798 /* got CRLF */
4799 if (sm_io_fputs(mci->mci_out,
4800 SM_TIME_DEFAULT,
4801 mci->mci_mailer->m_eol)
4802 == SM_IO_EOF)
4803 continue;
4804 else
4805 {
4806 /* record progress for DATA timeout */
4807 DataProgress = true;
4808 }
4809
4810 if (TrafficLogFile != NULL)
4811 {
4812 (void) sm_io_fputs(TrafficLogFile,
4813 SM_TIME_DEFAULT,
4814 mci->mci_mailer->m_eol);
4815 }
4816 ostate = OS_HEAD;
4817 continue;
4818 }
4819
4820 /* had a naked carriage return */
4821 SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4822 *pbp++ = c;
4823 c = '\r';
4824 ostate = OS_INLINE;
4825 goto putch;
4826
4827 case OS_INLINE:
4828 if (c == '\r')
4829 {
4830 ostate = OS_CR;
4831 continue;
4832 }
4833 if (c == '\0' &&
4834 bitnset(M_NONULLS,
4835 mci->mci_mailer->m_flags))
4836 break;
4837putch:
4838 if (mci->mci_mailer->m_linelimit > 0 &&
4839 pos >= mci->mci_mailer->m_linelimit - 1 &&
4840 c != '\n')
4841 {
4842 int d;
4843
4844 /* check next character for EOL */
4845 if (pbp > peekbuf)
4846 d = *(pbp - 1);
4847 else if ((d = sm_io_getc(e->e_dfp,
4848 SM_TIME_DEFAULT))
4849 != SM_IO_EOF)
4850 {
4851 SM_ASSERT(pbp < peekbuf +
4852 sizeof(peekbuf));
4853 *pbp++ = d;
4854 }
4855
4856 if (d == '\n' || d == SM_IO_EOF)
4857 {
4858 if (TrafficLogFile != NULL)
4859 (void) sm_io_putc(TrafficLogFile,
4860 SM_TIME_DEFAULT,
4861 (unsigned char) c);
4862 if (sm_io_putc(mci->mci_out,
4863 SM_TIME_DEFAULT,
4864 (unsigned char) c)
4865 == SM_IO_EOF)
4866 {
4867 dead = true;
4868 continue;
4869 }
4870 else
4871 {
4872 /* record progress for DATA timeout */
4873 DataProgress = true;
4874 }
4875 pos++;
4876 continue;
4877 }
4878
4879 if (sm_io_putc(mci->mci_out,
4880 SM_TIME_DEFAULT, '!')
4881 == SM_IO_EOF ||
4882 sm_io_fputs(mci->mci_out,
4883 SM_TIME_DEFAULT,
4884 mci->mci_mailer->m_eol)
4885 == SM_IO_EOF)
4886 {
4887 dead = true;
4888 continue;
4889 }
4890 else
4891 {
4892 /* record progress for DATA timeout */
4893 DataProgress = true;
4894 }
4895
4896 if (TrafficLogFile != NULL)
4897 {
4898 (void) sm_io_fprintf(TrafficLogFile,
4899 SM_TIME_DEFAULT,
4900 "!%s",
4901 mci->mci_mailer->m_eol);
4902 }
4903 ostate = OS_HEAD;
4904 SM_ASSERT(pbp < peekbuf +
4905 sizeof(peekbuf));
4906 *pbp++ = c;
4907 continue;
4908 }
4909 if (c == '\n')
4910 {
4911 if (TrafficLogFile != NULL)
4912 (void) sm_io_fputs(TrafficLogFile,
4913 SM_TIME_DEFAULT,
4914 mci->mci_mailer->m_eol);
4915 if (sm_io_fputs(mci->mci_out,
4916 SM_TIME_DEFAULT,
4917 mci->mci_mailer->m_eol)
4918 == SM_IO_EOF)
4919 continue;
4920 else
4921 {
4922 /* record progress for DATA timeout */
4923 DataProgress = true;
4924 }
4925 pos = 0;
4926 ostate = OS_HEAD;
4927 }
4928 else
4929 {
4930 if (TrafficLogFile != NULL)
4931 (void) sm_io_putc(TrafficLogFile,
4932 SM_TIME_DEFAULT,
4933 (unsigned char) c);
4934 if (sm_io_putc(mci->mci_out,
4935 SM_TIME_DEFAULT,
4936 (unsigned char) c)
4937 == SM_IO_EOF)
4938 {
4939 dead = true;
4940 continue;
4941 }
4942 else
4943 {
4944 /* record progress for DATA timeout */
4945 DataProgress = true;
4946 }
4947 pos++;
4948 ostate = OS_INLINE;
4949 }
4950 break;
4951 }
4952 }
4953
4954 /* make sure we are at the beginning of a line */
4955 if (bp > buf)
4956 {
4957 if (TrafficLogFile != NULL)
4958 {
4959 for (xp = buf; xp < bp; xp++)
4960 (void) sm_io_putc(TrafficLogFile,
4961 SM_TIME_DEFAULT,
4962 (unsigned char) *xp);
4963 }
4964 for (xp = buf; xp < bp; xp++)
4965 {
4966 if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4967 (unsigned char) *xp)
4968 == SM_IO_EOF)
4969 {
4970 dead = true;
4971 break;
4972 }
4973 else
4974 {
4975 /* record progress for DATA timeout */
4976 DataProgress = true;
4977 }
4978 }
4979 pos += bp - buf;
4980 }
4981 if (!dead && pos > 0)
4982 {
4983 if (TrafficLogFile != NULL)
4984 (void) sm_io_fputs(TrafficLogFile,
4985 SM_TIME_DEFAULT,
4986 mci->mci_mailer->m_eol);
4987 (void) sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
4988 mci->mci_mailer->m_eol);
4989
4990 /* record progress for DATA timeout */
4991 DataProgress = true;
4992 }
4993 }
4994
4995 if (sm_io_error(e->e_dfp))
4996 {
4997 syserr("putbody: %s/%cf%s: read error",
4998 qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
4999 DATAFL_LETTER, e->e_id);
5000 ExitStat = EX_IOERR;
5001 }
5002
5003endofmessage:
5004 /*
5005 ** Since mailfile() uses e_dfp in a child process,
5006 ** the file offset in the stdio library for the
5007 ** parent process will not agree with the in-kernel
5008 ** file offset since the file descriptor is shared
5009 ** between the processes. Therefore, it is vital
5010 ** that the file always be rewound. This forces the
5011 ** kernel offset (lseek) and stdio library (ftell)
5012 ** offset to match.
5013 */
5014
5015 if (e->e_dfp != NULL)
5016 (void) bfrewind(e->e_dfp);
5017
5018 /* some mailers want extra blank line at end of message */
5019 if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5020 buf[0] != '\0' && buf[0] != '\n')
5021 putline("", mci);
5022
5023 (void) sm_io_flush(mci->mci_out, SM_TIME_DEFAULT);
5024 if (sm_io_error(mci->mci_out) && errno != EPIPE)
5025 {
5026 syserr("putbody: write error");
5027 ExitStat = EX_IOERR;
5028 }
5029
5030 errno = 0;
5031}
5032/*
5033** MAILFILE -- Send a message to a file.
5034**
5035** If the file has the set-user-ID/set-group-ID bits set, but NO
5036** execute bits, sendmail will try to become the owner of that file
5037** rather than the real user. Obviously, this only works if
5038** sendmail runs as root.
5039**
5040** This could be done as a subordinate mailer, except that it
5041** is used implicitly to save messages in ~/dead.letter. We
5042** view this as being sufficiently important as to include it
5043** here. For example, if the system is dying, we shouldn't have
5044** to create another process plus some pipes to save the message.
5045**
5046** Parameters:
5047** filename -- the name of the file to send to.
5048** mailer -- mailer definition for recipient -- if NULL,
5049** use FileMailer.
5050** ctladdr -- the controlling address header -- includes
5051** the userid/groupid to be when sending.
5052** sfflags -- flags for opening.
5053** e -- the current envelope.
5054**
5055** Returns:
5056** The exit code associated with the operation.
5057**
5058** Side Effects:
5059** none.
5060*/
5061
5062# define RETURN(st) exit(st);
5063
5064static jmp_buf CtxMailfileTimeout;
5065
5066int
5067mailfile(filename, mailer, ctladdr, sfflags, e)
5068 char *volatile filename;
5069 MAILER *volatile mailer;
5070 ADDRESS *ctladdr;
5071 volatile long sfflags;
5072 register ENVELOPE *e;
5073{
5074 register SM_FILE_T *f;
5075 register pid_t pid = -1;
5076 volatile int mode;
5077 int len;
5078 off_t curoff;
5079 bool suidwarn = geteuid() == 0;
5080 char *p;
5081 char *volatile realfile;
5082 SM_EVENT *ev;
5083 char buf[MAXPATHLEN];
5084 char targetfile[MAXPATHLEN];
5085
5086 if (tTd(11, 1))
5087 {
5088 sm_dprintf("mailfile %s\n ctladdr=", filename);
5089 printaddr(sm_debug_file(), ctladdr, false);
5090 }
5091
5092 if (mailer == NULL)
5093 mailer = FileMailer;
5094
5095 if (e->e_xfp != NULL)
5096 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5097
5098 /*
5099 ** Special case /dev/null. This allows us to restrict file
5100 ** delivery to regular files only.
5101 */
5102
5103 if (sm_path_isdevnull(filename))
5104 return EX_OK;
5105
5106 /* check for 8-bit available */
5107 if (bitset(EF_HAS8BIT, e->e_flags) &&
5108 bitnset(M_7BITS, mailer->m_flags) &&
5109 (bitset(EF_DONT_MIME, e->e_flags) ||
5110 !(bitset(MM_MIME8BIT, MimeMode) ||
5111 (bitset(EF_IS_MIME, e->e_flags) &&
5112 bitset(MM_CVTMIME, MimeMode)))))
5113 {
5114 e->e_status = "5.6.3";
5115 usrerrenh(e->e_status,
5116 "554 Cannot send 8-bit data to 7-bit destination");
5117 errno = 0;
5118 return EX_DATAERR;
5119 }
5120
5121 /* Find the actual file */
5122 if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5123 {
5124 len = strlen(SafeFileEnv);
5125
5126 if (strncmp(SafeFileEnv, filename, len) == 0)
5127 filename += len;
5128
5129 if (len + strlen(filename) + 1 >= sizeof targetfile)
5130 {
5131 syserr("mailfile: filename too long (%s/%s)",
5132 SafeFileEnv, filename);
5133 return EX_CANTCREAT;
5134 }
5135 (void) sm_strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
5136 realfile = targetfile + len;
5137 if (*filename == '/')
5138 filename++;
5139 if (*filename != '\0')
5140 {
5141 /* paranoia: trailing / should be removed in readcf */
5142 if (targetfile[len - 1] != '/')
5143 (void) sm_strlcat(targetfile,
5144 "/", sizeof targetfile);
5145 (void) sm_strlcat(targetfile, filename,
5146 sizeof targetfile);
5147 }
5148 }
5149 else if (mailer->m_rootdir != NULL)
5150 {
5151 expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
5152 len = strlen(targetfile);
5153
5154 if (strncmp(targetfile, filename, len) == 0)
5155 filename += len;
5156
5157 if (len + strlen(filename) + 1 >= sizeof targetfile)
5158 {
5159 syserr("mailfile: filename too long (%s/%s)",
5160 targetfile, filename);
5161 return EX_CANTCREAT;
5162 }
5163 realfile = targetfile + len;
5164 if (targetfile[len - 1] != '/')
5165 (void) sm_strlcat(targetfile, "/", sizeof targetfile);
5166 if (*filename == '/')
5167 (void) sm_strlcat(targetfile, filename + 1,
5168 sizeof targetfile);
5169 else
5170 (void) sm_strlcat(targetfile, filename,
5171 sizeof targetfile);
5172 }
5173 else
5174 {
5175 if (sm_strlcpy(targetfile, filename, sizeof targetfile) >=
5176 sizeof targetfile)
5177 {
5178 syserr("mailfile: filename too long (%s)", filename);
5179 return EX_CANTCREAT;
5180 }
5181 realfile = targetfile;
5182 }
5183
5184 /*
5185 ** Fork so we can change permissions here.
5186 ** Note that we MUST use fork, not vfork, because of
5187 ** the complications of calling subroutines, etc.
5188 */
5189
5190
5191 /*
5192 ** Dispose of SIGCHLD signal catchers that may be laying
5193 ** around so that the waitfor() below will get it.
5194 */
5195
5196 (void) sm_signal(SIGCHLD, SIG_DFL);
5197
5198 DOFORK(fork);
5199
5200 if (pid < 0)
5201 return EX_OSERR;
5202 else if (pid == 0)
5203 {
5204 /* child -- actually write to file */
5205 struct stat stb;
5206 MCI mcibuf;
5207 int err;
5208 volatile int oflags = O_WRONLY|O_APPEND;
5209
5210 /* Reset global flags */
5211 RestartRequest = NULL;
5212 RestartWorkGroup = false;
5213 ShutdownRequest = NULL;
5214 PendingSignal = 0;
5215 CurrentPid = getpid();
5216
5217 if (e->e_lockfp != NULL)
5218 (void) close(sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
5219 NULL));
5220
5221 (void) sm_signal(SIGINT, SIG_DFL);
5222 (void) sm_signal(SIGHUP, SIG_DFL);
5223 (void) sm_signal(SIGTERM, SIG_DFL);
5224 (void) umask(OldUmask);
5225 e->e_to = filename;
5226 ExitStat = EX_OK;
5227
5228 if (setjmp(CtxMailfileTimeout) != 0)
5229 {
5230 RETURN(EX_TEMPFAIL);
5231 }
5232
5233 if (TimeOuts.to_fileopen > 0)
5234 ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5235 0);
5236 else
5237 ev = NULL;
5238
5239 /* check file mode to see if set-user-ID */
5240 if (stat(targetfile, &stb) < 0)
5241 mode = FileMode;
5242 else
5243 mode = stb.st_mode;
5244
5245 /* limit the errors to those actually caused in the child */
5246 errno = 0;
5247 ExitStat = EX_OK;
5248
5249 /* Allow alias expansions to use the S_IS{U,G}ID bits */
5250 if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5251 bitset(SFF_RUNASREALUID, sfflags))
5252 {
5253 /* ignore set-user-ID and set-group-ID bits */
5254 mode &= ~(S_ISGID|S_ISUID);
5255 if (tTd(11, 20))
5256 sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5257 }
5258
5259 /* we have to open the data file BEFORE setuid() */
5260 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5261 {
5262 char *df = queuename(e, DATAFL_LETTER);
5263
5264 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5265 SM_IO_RDONLY_B, NULL);
5266 if (e->e_dfp == NULL)
5267 {
5268 syserr("mailfile: Cannot open %s for %s from %s",
5269 df, e->e_to, e->e_from.q_paddr);
5270 }
5271 }
5272
5273 /* select a new user to run as */
5274 if (!bitset(SFF_RUNASREALUID, sfflags))
5275 {
5276 if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5277 {
5278 RealUserName = NULL;
5279 if (mailer->m_uid == NO_UID)
5280 RealUid = RunAsUid;
5281 else
5282 RealUid = mailer->m_uid;
5283 if (RunAsUid != 0 && RealUid != RunAsUid)
5284 {
5285 /* Only root can change the uid */
5286 syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5287 (int) RunAsUid, (int) RealUid);
5288 RETURN(EX_TEMPFAIL);
5289 }
5290 }
5291 else if (bitset(S_ISUID, mode))
5292 {
5293 RealUserName = NULL;
5294 RealUid = stb.st_uid;
5295 }
5296 else if (ctladdr != NULL && ctladdr->q_uid != 0)
5297 {
5298 if (ctladdr->q_ruser != NULL)
5299 RealUserName = ctladdr->q_ruser;
5300 else
5301 RealUserName = ctladdr->q_user;
5302 RealUid = ctladdr->q_uid;
5303 }
5304 else if (mailer != NULL && mailer->m_uid != NO_UID)
5305 {
5306 RealUserName = DefUser;
5307 RealUid = mailer->m_uid;
5308 }
5309 else
5310 {
5311 RealUserName = DefUser;
5312 RealUid = DefUid;
5313 }
5314
5315 /* select a new group to run as */
5316 if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5317 {
5318 if (mailer->m_gid == NO_GID)
5319 RealGid = RunAsGid;
5320 else
5321 RealGid = mailer->m_gid;
5322 if (RunAsUid != 0 &&
5323 (RealGid != getgid() ||
5324 RealGid != getegid()))
5325 {
5326 /* Only root can change the gid */
5327 syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5328 (int) RealGid, (int) RunAsUid,
5329 (int) getgid(), (int) getegid());
5330 RETURN(EX_TEMPFAIL);
5331 }
5332 }
5333 else if (bitset(S_ISGID, mode))
5334 RealGid = stb.st_gid;
5335 else if (ctladdr != NULL &&
5336 ctladdr->q_uid == DefUid &&
5337 ctladdr->q_gid == 0)
5338 {
5339 /*
5340 ** Special case: This means it is an
5341 ** alias and we should act as DefaultUser.
5342 ** See alias()'s comments.
5343 */
5344
5345 RealGid = DefGid;
5346 RealUserName = DefUser;
5347 }
5348 else if (ctladdr != NULL && ctladdr->q_uid != 0)
5349 RealGid = ctladdr->q_gid;
5350 else if (mailer != NULL && mailer->m_gid != NO_GID)
5351 RealGid = mailer->m_gid;
5352 else
5353 RealGid = DefGid;
5354 }
5355
5356 /* last ditch */
5357 if (!bitset(SFF_ROOTOK, sfflags))
5358 {
5359 if (RealUid == 0)
5360 RealUid = DefUid;
5361 if (RealGid == 0)
5362 RealGid = DefGid;
5363 }
5364
5365 /* set group id list (needs /etc/group access) */
5366 if (RealUserName != NULL && !DontInitGroups)
5367 {
5368 if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5369 {
5370 syserr("mailfile: initgroups(%s, %d) failed",
5371 RealUserName, RealGid);
5372 RETURN(EX_TEMPFAIL);
5373 }
5374 }
5375 else
5376 {
5377 GIDSET_T gidset[1];
5378
5379 gidset[0] = RealGid;
5380 if (setgroups(1, gidset) == -1 && suidwarn)
5381 {
5382 syserr("mailfile: setgroups() failed");
5383 RETURN(EX_TEMPFAIL);
5384 }
5385 }
5386
5387 /*
5388 ** If you have a safe environment, go into it.
5389 */
5390
5391 if (realfile != targetfile)
5392 {
5393 char save;
5394
5395 save = *realfile;
5396 *realfile = '\0';
5397 if (tTd(11, 20))
5398 sm_dprintf("mailfile: chroot %s\n", targetfile);
5399 if (chroot(targetfile) < 0)
5400 {
5401 syserr("mailfile: Cannot chroot(%s)",
5402 targetfile);
5403 RETURN(EX_CANTCREAT);
5404 }
5405 *realfile = save;
5406 }
5407
5408 if (tTd(11, 40))
5409 sm_dprintf("mailfile: deliver to %s\n", realfile);
5410
5411 if (chdir("/") < 0)
5412 {
5413 syserr("mailfile: cannot chdir(/)");
5414 RETURN(EX_CANTCREAT);
5415 }
5416
5417 /* now reset the group and user ids */
5418 endpwent();
5419 sm_mbdb_terminate();
5420 if (setgid(RealGid) < 0 && suidwarn)
5421 {
5422 syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5423 RETURN(EX_TEMPFAIL);
5424 }
5425 vendor_set_uid(RealUid);
5426 if (setuid(RealUid) < 0 && suidwarn)
5427 {
5428 syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5429 RETURN(EX_TEMPFAIL);
5430 }
5431
5432 if (tTd(11, 2))
5433 sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5434 (int) getuid(), (int) geteuid(),
5435 (int) getgid(), (int) getegid());
5436
5437
5438 /* move into some "safe" directory */
5439 if (mailer->m_execdir != NULL)
5440 {
5441 char *q;
5442
5443 for (p = mailer->m_execdir; p != NULL; p = q)
5444 {
5445 q = strchr(p, ':');
5446 if (q != NULL)
5447 *q = '\0';
5448 expand(p, buf, sizeof buf, e);
5449 if (q != NULL)
5450 *q++ = ':';
5451 if (tTd(11, 20))
5452 sm_dprintf("mailfile: trydir %s\n",
5453 buf);
5454 if (buf[0] != '\0' && chdir(buf) >= 0)
5455 break;
5456 }
5457 }
5458
5459 /*
5460 ** Recheck the file after we have assumed the ID of the
5461 ** delivery user to make sure we can deliver to it as
5462 ** that user. This is necessary if sendmail is running
5463 ** as root and the file is on an NFS mount which treats
5464 ** root as nobody.
5465 */
5466
5467#if HASLSTAT
5468 if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5469 err = stat(realfile, &stb);
5470 else
5471 err = lstat(realfile, &stb);
5472#else /* HASLSTAT */
5473 err = stat(realfile, &stb);
5474#endif /* HASLSTAT */
5475
5476 if (err < 0)
5477 {
5478 stb.st_mode = ST_MODE_NOFILE;
5479 mode = FileMode;
5480 oflags |= O_CREAT|O_EXCL;
5481 }
5482 else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5483 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5484 DontBlameSendmail) &&
5485 stb.st_nlink != 1) ||
5486 (realfile != targetfile && !S_ISREG(mode)))
5487 exit(EX_CANTCREAT);
5488 else
5489 mode = stb.st_mode;
5490
5491 if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5492 sfflags |= SFF_NOSLINK;
5493 if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5494 sfflags |= SFF_NOHLINK;
5495 sfflags &= ~SFF_OPENASROOT;
5496 f = safefopen(realfile, oflags, mode, sfflags);
5497 if (f == NULL)
5498 {
5499 if (transienterror(errno))
5500 {
5501 usrerr("454 4.3.0 cannot open %s: %s",
5502 shortenstring(realfile, MAXSHORTSTR),
5503 sm_errstring(errno));
5504 RETURN(EX_TEMPFAIL);
5505 }
5506 else
5507 {
5508 usrerr("554 5.3.0 cannot open %s: %s",
5509 shortenstring(realfile, MAXSHORTSTR),
5510 sm_errstring(errno));
5511 RETURN(EX_CANTCREAT);
5512 }
5513 }
5514 if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5515 &stb))
5516 {
5517 syserr("554 5.3.0 file changed after open");
5518 RETURN(EX_CANTCREAT);
5519 }
5520 if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5521 {
5522 syserr("554 5.3.0 cannot fstat %s",
5523 sm_errstring(errno));
5524 RETURN(EX_CANTCREAT);
5525 }
5526
5527 curoff = stb.st_size;
5528
5529 if (ev != NULL)
5530 sm_clrevent(ev);
5531
5532 memset(&mcibuf, '\0', sizeof mcibuf);
5533 mcibuf.mci_mailer = mailer;
5534 mcibuf.mci_out = f;
5535 if (bitnset(M_7BITS, mailer->m_flags))
5536 mcibuf.mci_flags |= MCIF_7BIT;
5537
5538 /* clear out per-message flags from connection structure */
5539 mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5540
5541 if (bitset(EF_HAS8BIT, e->e_flags) &&
5542 !bitset(EF_DONT_MIME, e->e_flags) &&
5543 bitnset(M_7BITS, mailer->m_flags))
5544 mcibuf.mci_flags |= MCIF_CVT8TO7;
5545
5546#if MIME7TO8
5547 if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5548 !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5549 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5550 (sm_strcasecmp(p, "quoted-printable") == 0 ||
5551 sm_strcasecmp(p, "base64") == 0) &&
5552 (p = hvalue("Content-Type", e->e_header)) != NULL)
5553 {
5554 /* may want to convert 7 -> 8 */
5555 /* XXX should really parse it here -- and use a class XXX */
5556 if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5557 (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5558 mcibuf.mci_flags |= MCIF_CVT7TO8;
5559 }
5560#endif /* MIME7TO8 */
5561
5562 putfromline(&mcibuf, e);
5563 (*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER);
5564 (*e->e_putbody)(&mcibuf, e, NULL);
5565 putline("\n", &mcibuf);
5566 if (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5567 (SuperSafe != SAFE_NO &&
5568 fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5569 sm_io_error(f))
5570 {
5571 setstat(EX_IOERR);
5572#if !NOFTRUNCATE
5573 (void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5574 curoff);
5575#endif /* !NOFTRUNCATE */
5576 }
5577
5578 /* reset ISUID & ISGID bits for paranoid systems */
5579#if HASFCHMOD
5580 (void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5581 (MODE_T) mode);
5582#else /* HASFCHMOD */
5583 (void) chmod(filename, (MODE_T) mode);
5584#endif /* HASFCHMOD */
5585 if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5586 setstat(EX_IOERR);
5587 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5588 (void) setuid(RealUid);
5589 exit(ExitStat);
5590 /* NOTREACHED */
5591 }
5592 else
5593 {
5594 /* parent -- wait for exit status */
5595 int st;
5596
5597 st = waitfor(pid);
5598 if (st == -1)
5599 {
5600 syserr("mailfile: %s: wait", mailer->m_name);
5601 return EX_SOFTWARE;
5602 }
5603 if (WIFEXITED(st))
5604 {
5605 errno = 0;
5606 return (WEXITSTATUS(st));
5607 }
5608 else
5609 {
5610 syserr("mailfile: %s: child died on signal %d",
5611 mailer->m_name, st);
5612 return EX_UNAVAILABLE;
5613 }
5614 /* NOTREACHED */
5615 }
5616 return EX_UNAVAILABLE; /* avoid compiler warning on IRIX */
5617}
5618
5619static void
5620mailfiletimeout(ignore)
5621 int ignore;
5622{
5623 /*
5624 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
5625 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5626 ** DOING.
5627 */
5628
5629 errno = ETIMEDOUT;
5630 longjmp(CtxMailfileTimeout, 1);
5631}
5632/*
5633** HOSTSIGNATURE -- return the "signature" for a host.
5634**
5635** The signature describes how we are going to send this -- it
5636** can be just the hostname (for non-Internet hosts) or can be
5637** an ordered list of MX hosts.
5638**
5639** Parameters:
5640** m -- the mailer describing this host.
5641** host -- the host name.
5642**
5643** Returns:
5644** The signature for this host.
5645**
5646** Side Effects:
5647** Can tweak the symbol table.
5648*/
5649
5650#define MAXHOSTSIGNATURE 8192 /* max len of hostsignature */
5651
5652char *
5653hostsignature(m, host)
5654 register MAILER *m;
5655 char *host;
5656{
5657 register char *p;
5658 register STAB *s;
5659 time_t now;
5660#if NAMED_BIND
5661 char sep = ':';
5662 char prevsep = ':';
5663 int i;
5664 int len;
5665 int nmx;
5666 int hl;
5667 char *hp;
5668 char *endp;
5669 int oldoptions = _res.options;
5670 char *mxhosts[MAXMXHOSTS + 1];
5671 unsigned short mxprefs[MAXMXHOSTS + 1];
5672#endif /* NAMED_BIND */
5673
5674 if (tTd(17, 3))
5675 sm_dprintf("hostsignature(%s)\n", host);
5676
5677 /*
5678 ** If local delivery (and not remote), just return a constant.
5679 */
5680
5681 if (bitnset(M_LOCALMAILER, m->m_flags) &&
5682 strcmp(m->m_mailer, "[IPC]") != 0 &&
5683 !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5684 return "localhost";
5685
5686 /* an empty host does not have MX records */
5687 if (*host == '\0')
5688 return "_empty_";
5689
5690 /*
5691 ** Check to see if this uses IPC -- if not, it can't have MX records.
5692 */
5693
5694 if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5695 CurEnv->e_sendmode == SM_DEFER)
5696 {
5697 /* just an ordinary mailer or deferred mode */
5698 return host;
5699 }
5700#if NETUNIX
5701 else if (m->m_argv[0] != NULL &&
5702 strcmp(m->m_argv[0], "FILE") == 0)
5703 {
5704 /* rendezvous in the file system, no MX records */
5705 return host;
5706 }
5707#endif /* NETUNIX */
5708
5709 /*
5710 ** Look it up in the symbol table.
5711 */
5712
5713 now = curtime();
5714 s = stab(host, ST_HOSTSIG, ST_ENTER);
5715 if (s->s_hostsig.hs_sig != NULL)
5716 {
5717 if (s->s_hostsig.hs_exp >= now)
5718 {
5719 if (tTd(17, 3))
5720 sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5721 s->s_hostsig.hs_sig);
5722 return s->s_hostsig.hs_sig;
5723 }
5724
5725 /* signature is expired: clear it */
5726 sm_free(s->s_hostsig.hs_sig);
5727 s->s_hostsig.hs_sig = NULL;
5728 }
5729
5730 /* set default TTL */
5731 s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5732
5733 /*
5734 ** Not already there or expired -- create a signature.
5735 */
5736
5737#if NAMED_BIND
5738 if (ConfigLevel < 2)
5739 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */
5740
5741 for (hp = host; hp != NULL; hp = endp)
5742 {
5743#if NETINET6
5744 if (*hp == '[')
5745 {
5746 endp = strchr(hp + 1, ']');
5747 if (endp != NULL)
5748 endp = strpbrk(endp + 1, ":,");
5749 }
5750 else
5751 endp = strpbrk(hp, ":,");
5752#else /* NETINET6 */
5753 endp = strpbrk(hp, ":,");
5754#endif /* NETINET6 */
5755 if (endp != NULL)
5756 {
5757 sep = *endp;
5758 *endp = '\0';
5759 }
5760
5761 if (bitnset(M_NOMX, m->m_flags))
5762 {
5763 /* skip MX lookups */
5764 nmx = 1;
5765 mxhosts[0] = hp;
5766 }
5767 else
5768 {
5769 auto int rcode;
5770 int ttl;
5771
5772 nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5773 &ttl);
5774 if (nmx <= 0)
5775 {
5776 int save_errno;
5777 register MCI *mci;
5778
5779 /* update the connection info for this host */
5780 save_errno = errno;
5781 mci = mci_get(hp, m);
5782 mci->mci_errno = save_errno;
5783 mci->mci_herrno = h_errno;
5784 mci->mci_lastuse = now;
5785 if (rcode == EX_NOHOST)
5786 mci_setstat(mci, rcode, "5.1.2",
5787 "550 Host unknown");
5788 else
5789 mci_setstat(mci, rcode, NULL, NULL);
5790
5791 /* use the original host name as signature */
5792 nmx = 1;
5793 mxhosts[0] = hp;
5794 }
5795 if (tTd(17, 3))
5796 sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5797 nmx, mxhosts[0]);
5798
5799 /*
5800 ** Set new TTL: we use only one!
5801 ** We could try to use the minimum instead.
5802 */
5803
5804 s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5805 }
5806
5807 len = 0;
5808 for (i = 0; i < nmx; i++)
5809 len += strlen(mxhosts[i]) + 1;
5810 if (s->s_hostsig.hs_sig != NULL)
5811 len += strlen(s->s_hostsig.hs_sig) + 1;
5812 if (len < 0 || len >= MAXHOSTSIGNATURE)
5813 {
5814 sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5815 host, MAXHOSTSIGNATURE, len);
5816 len = MAXHOSTSIGNATURE;
5817 }
5818 p = sm_pmalloc_x(len);
5819 if (s->s_hostsig.hs_sig != NULL)
5820 {
5821 (void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5822 sm_free(s->s_hostsig.hs_sig); /* XXX */
5823 s->s_hostsig.hs_sig = p;
5824 hl = strlen(p);
5825 p += hl;
5826 *p++ = prevsep;
5827 len -= hl + 1;
5828 }
5829 else
5830 s->s_hostsig.hs_sig = p;
5831 for (i = 0; i < nmx; i++)
5832 {
5833 hl = strlen(mxhosts[i]);
5834 if (len - 1 < hl || len <= 1)
5835 {
5836 /* force to drop out of outer loop */
5837 len = -1;
5838 break;
5839 }
5840 if (i != 0)
5841 {
5842 if (mxprefs[i] == mxprefs[i - 1])
5843 *p++ = ',';
5844 else
5845 *p++ = ':';
5846 len--;
5847 }
5848 (void) sm_strlcpy(p, mxhosts[i], len);
5849 p += hl;
5850 len -= hl;
5851 }
5852
5853 /*
5854 ** break out of loop if len exceeded MAXHOSTSIGNATURE
5855 ** because we won't have more space for further hosts
5856 ** anyway (separated by : in the .cf file).
5857 */
5858
5859 if (len < 0)
5860 break;
5861 if (endp != NULL)
5862 *endp++ = sep;
5863 prevsep = sep;
5864 }
5865 makelower(s->s_hostsig.hs_sig);
5866 if (ConfigLevel < 2)
5867 _res.options = oldoptions;
5868#else /* NAMED_BIND */
5869 /* not using BIND -- the signature is just the host name */
5870 /*
5871 ** 'host' points to storage that will be freed after we are
5872 ** done processing the current envelope, so we copy it.
5873 */
5874 s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5875#endif /* NAMED_BIND */
5876 if (tTd(17, 1))
5877 sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5878 return s->s_hostsig.hs_sig;
5879}
5880/*
5881** PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5882**
5883** The signature describes how we are going to send this -- it
5884** can be just the hostname (for non-Internet hosts) or can be
5885** an ordered list of MX hosts which must be randomized for equal
5886** MX preference values.
5887**
5888** Parameters:
5889** sig -- the host signature.
5890** mxhosts -- array to populate.
5891** mailer -- mailer.
5892**
5893** Returns:
5894** The number of hosts inserted into mxhosts array.
5895**
5896** Side Effects:
5897** Randomizes equal MX preference hosts in mxhosts.
5898*/
5899
5900static int
5901parse_hostsignature(sig, mxhosts, mailer)
5902 char *sig;
5903 char **mxhosts;
5904 MAILER *mailer;
5905{
5906 unsigned short curpref = 0;
5907 int nmx = 0, i, j; /* NOTE: i, j, and nmx must have same type */
5908 char *hp, *endp;
5909 unsigned short prefer[MAXMXHOSTS];
5910 long rndm[MAXMXHOSTS];
5911
5912 for (hp = sig; hp != NULL; hp = endp)
5913 {
5914 char sep = ':';
5915
5916#if NETINET6
5917 if (*hp == '[')
5918 {
5919 endp = strchr(hp + 1, ']');
5920 if (endp != NULL)
5921 endp = strpbrk(endp + 1, ":,");
5922 }
5923 else
5924 endp = strpbrk(hp, ":,");
5925#else /* NETINET6 */
5926 endp = strpbrk(hp, ":,");
5927#endif /* NETINET6 */
5928 if (endp != NULL)
5929 {
5930 sep = *endp;
5931 *endp = '\0';
5932 }
5933
5934 mxhosts[nmx] = hp;
5935 prefer[nmx] = curpref;
5936 if (mci_match(hp, mailer))
5937 rndm[nmx] = 0;
5938 else
5939 rndm[nmx] = get_random();
5940
5941 if (endp != NULL)
5942 {
5943 /*
5944 ** Since we don't have the original MX prefs,
5945 ** make our own. If the separator is a ':', that
5946 ** means the preference for the next host will be
5947 ** higher than this one, so simply increment curpref.
5948 */
5949
5950 if (sep == ':')
5951 curpref++;
5952
5953 *endp++ = sep;
5954 }
5955 if (++nmx >= MAXMXHOSTS)
5956 break;
5957 }
5958
5959 /* sort the records using the random factor for equal preferences */
5960 for (i = 0; i < nmx; i++)
5961 {
5962 for (j = i + 1; j < nmx; j++)
5963 {
5964 /*
5965 ** List is already sorted by MX preference, only
5966 ** need to look for equal preference MX records
5967 */
5968
5969 if (prefer[i] < prefer[j])
5970 break;
5971
5972 if (prefer[i] > prefer[j] ||
5973 (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5974 {
5975 register unsigned short tempp;
5976 register long tempr;
5977 register char *temp1;
5978
5979 tempp = prefer[i];
5980 prefer[i] = prefer[j];
5981 prefer[j] = tempp;
5982 temp1 = mxhosts[i];
5983 mxhosts[i] = mxhosts[j];
5984 mxhosts[j] = temp1;
5985 tempr = rndm[i];
5986 rndm[i] = rndm[j];
5987 rndm[j] = tempr;
5988 }
5989 }
5990 }
5991 return nmx;
5992}
5993
5994# if STARTTLS
5995static SSL_CTX *clt_ctx = NULL;
5996static bool tls_ok_clt = true;
5997
5998/*
5999** SETCLTTLS -- client side TLS: allow/disallow.
6000**
6001** Parameters:
6002** tls_ok -- should tls be done?
6003**
6004** Returns:
6005** none.
6006**
6007** Side Effects:
6008** sets tls_ok_clt (static variable in this module)
6009*/
6010
6011void
6012setclttls(tls_ok)
6013 bool tls_ok;
6014{
6015 tls_ok_clt = tls_ok;
6016 return;
6017}
6018/*
6019** INITCLTTLS -- initialize client side TLS
6020**
6021** Parameters:
6022** tls_ok -- should tls initialization be done?
6023**
6024** Returns:
6025** succeeded?
6026**
6027** Side Effects:
6028** sets tls_ok_clt (static variable in this module)
6029*/
6030
6031bool
6032initclttls(tls_ok)
6033 bool tls_ok;
6034{
6035 if (!tls_ok_clt)
6036 return false;
6037 tls_ok_clt = tls_ok;
6038 if (!tls_ok_clt)
6039 return false;
6040 if (clt_ctx != NULL)
6041 return true; /* already done */
6042 tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, false, CltCertFile,
6043 CltKeyFile, CACertPath, CACertFile, DHParams);
6044 return tls_ok_clt;
6045}
6046
6047/*
6048** STARTTLS -- try to start secure connection (client side)
6049**
6050** Parameters:
6051** m -- the mailer.
6052** mci -- the mailer connection info.
6053** e -- the envelope.
6054**
6055** Returns:
6056** success?
6057** (maybe this should be some other code than EX_
6058** that denotes which stage failed.)
6059*/
6060
6061static int
6062starttls(m, mci, e)
6063 MAILER *m;
6064 MCI *mci;
6065 ENVELOPE *e;
6066{
6067 int smtpresult;
6068 int result = 0;
6069 int rfd, wfd;
6070 SSL *clt_ssl = NULL;
6071 time_t tlsstart;
6072
6073 if (clt_ctx == NULL && !initclttls(true))
6074 return EX_TEMPFAIL;
6075 smtpmessage("STARTTLS", m, mci);
6076
6077 /* get the reply */
6078 smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6079 XS_STARTTLS);
6080
6081 /* check return code from server */
6082 if (smtpresult == 454)
6083 return EX_TEMPFAIL;
6084 if (smtpresult == 501)
6085 return EX_USAGE;
6086 if (smtpresult == -1)
6087 return smtpresult;
6088 if (smtpresult != 220)
6089 return EX_PROTOCOL;
6090
6091 if (LogLevel > 13)
6092 sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6093
6094 /* start connection */
6095 if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6096 {
6097 if (LogLevel > 5)
6098 {
6099 sm_syslog(LOG_ERR, NOQID,
6100 "STARTTLS=client, error: SSL_new failed");
6101 if (LogLevel > 9)
6102 tlslogerr("client");
6103 }
6104 return EX_SOFTWARE;
6105 }
6106
6107 rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6108 wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6109
6110 /* SSL_clear(clt_ssl); ? */
6111 if (rfd < 0 || wfd < 0 ||
6112 (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6113 (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6114 {
6115 if (LogLevel > 5)
6116 {
6117 sm_syslog(LOG_ERR, NOQID,
6118 "STARTTLS=client, error: SSL_set_xfd failed=%d",
6119 result);
6120 if (LogLevel > 9)
6121 tlslogerr("client");
6122 }
6123 return EX_SOFTWARE;
6124 }
6125 SSL_set_connect_state(clt_ssl);
6126 tlsstart = curtime();
6127
6128ssl_retry:
6129 if ((result = SSL_connect(clt_ssl)) <= 0)
6130 {
6131 int i;
6132 bool timedout;
6133 time_t left;
6134 time_t now = curtime();
6135 struct timeval tv;
6136
6137 /* what to do in this case? */
6138 i = SSL_get_error(clt_ssl, result);
6139
6140 /*
6141 ** For SSL_ERROR_WANT_{READ,WRITE}:
6142 ** There is not a complete SSL record available yet
6143 ** or there is only a partial SSL record removed from
6144 ** the network (socket) buffer into the SSL buffer.
6145 ** The SSL_connect will only succeed when a full
6146 ** SSL record is available (assuming a "real" error
6147 ** doesn't happen). To handle when a "real" error
6148 ** does happen the select is set for exceptions too.
6149 ** The connection may be re-negotiated during this time
6150 ** so both read and write "want errors" need to be handled.
6151 ** A select() exception loops back so that a proper SSL
6152 ** error message can be gotten.
6153 */
6154
6155 left = TimeOuts.to_starttls - (now - tlsstart);
6156 timedout = left <= 0;
6157 if (!timedout)
6158 {
6159 tv.tv_sec = left;
6160 tv.tv_usec = 0;
6161 }
6162
6163 if (!timedout && FD_SETSIZE > 0 &&
6164 (rfd >= FD_SETSIZE ||
6165 (i == SSL_ERROR_WANT_WRITE && wfd >= FD_SETSIZE)))
6166 {
6167 if (LogLevel > 5)
6168 {
6169 sm_syslog(LOG_ERR, e->e_id,
6170 "STARTTLS=client, error: fd %d/%d too large",
6171 rfd, wfd);
6172 if (LogLevel > 8)
6173 tlslogerr("client");
6174 }
6175 errno = EINVAL;
6176 goto tlsfail;
6177 }
6178 if (!timedout && i == SSL_ERROR_WANT_READ)
6179 {
6180 fd_set ssl_maskr, ssl_maskx;
6181
6182 FD_ZERO(&ssl_maskr);
6183 FD_SET(rfd, &ssl_maskr);
6184 FD_ZERO(&ssl_maskx);
6185 FD_SET(rfd, &ssl_maskx);
6186 if (select(rfd + 1, &ssl_maskr, NULL, &ssl_maskx, &tv)
6187 > 0)
6188 goto ssl_retry;
6189 }
6190 if (!timedout && i == SSL_ERROR_WANT_WRITE)
6191 {
6192 fd_set ssl_maskw, ssl_maskx;
6193
6194 FD_ZERO(&ssl_maskw);
6195 FD_SET(wfd, &ssl_maskw);
6196 FD_ZERO(&ssl_maskx);
6197 FD_SET(rfd, &ssl_maskx);
6198 if (select(wfd + 1, NULL, &ssl_maskw, &ssl_maskx, &tv)
6199 > 0)
6200 goto ssl_retry;
6201 }
6202 if (LogLevel > 5)
6203 {
6204 sm_syslog(LOG_ERR, e->e_id,
6205 "STARTTLS=client, error: connect failed=%d, SSL_error=%d, timedout=%d, errno=%d",
6206 result, i, (int) timedout, errno);
6207 if (LogLevel > 8)
6208 tlslogerr("client");
6209 }
6210tlsfail:
6211 SSL_free(clt_ssl);
6212 clt_ssl = NULL;
6213 return EX_SOFTWARE;
6214 }
6215 mci->mci_ssl = clt_ssl;
6216 result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6217 &mci->mci_macro, true);
6218
6219 /* switch to use TLS... */
6220 if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6221 return EX_OK;
6222
6223 /* failure */
6224 SSL_free(clt_ssl);
6225 clt_ssl = NULL;
6226 return EX_SOFTWARE;
6227}
6228/*
6229** ENDTLSCLT -- shutdown secure connection (client side)
6230**
6231** Parameters:
6232** mci -- the mailer connection info.
6233**
6234** Returns:
6235** success?
6236*/
6237
6238static int
6239endtlsclt(mci)
6240 MCI *mci;
6241{
6242 int r;
6243
6244 if (!bitset(MCIF_TLSACT, mci->mci_flags))
6245 return EX_OK;
6246 r = endtls(mci->mci_ssl, "client");
6247 mci->mci_flags &= ~MCIF_TLSACT;
6248 return r;
6249}
6250# endif /* STARTTLS */
6251# if STARTTLS || SASL
6252/*
6253** ISCLTFLGSET -- check whether client flag is set.
6254**
6255** Parameters:
6256** e -- envelope.
6257** flag -- flag to check in {client_flags}
6258**
6259** Returns:
6260** true iff flag is set.
6261*/
6262
6263static bool
6264iscltflgset(e, flag)
6265 ENVELOPE *e;
6266 int flag;
6267{
6268 char *p;
6269
6270 p = macvalue(macid("{client_flags}"), e);
6271 if (p == NULL)
6272 return false;
6273 for (; *p != '\0'; p++)
6274 {
6275 /* look for just this one flag */
6276 if (*p == (char) flag)
6277 return true;
6278 }
6279 return false;
6280}
6281# endif /* STARTTLS || SASL */