main.c revision 71345
1/*
2 * Copyright (c) 1998-2000 Sendmail, Inc. and its suppliers.
3 *	All rights reserved.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5 * Copyright (c) 1988, 1993
6 *	The Regents of the University of California.  All rights reserved.
7 *
8 * By using this file, you agree to the terms and conditions set
9 * forth in the LICENSE file which can be found at the top level of
10 * the sendmail distribution.
11 *
12 */
13
14#ifndef lint
15static char copyright[] =
16"@(#) Copyright (c) 1998-2000 Sendmail, Inc. and its suppliers.\n\
17	All rights reserved.\n\
18     Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.\n\
19     Copyright (c) 1988, 1993\n\
20	The Regents of the University of California.  All rights reserved.\n";
21#endif /* ! lint */
22
23#ifndef lint
24static char id[] = "@(#)$Id: main.c,v 8.485.4.38 2000/12/19 02:50:33 gshapiro Exp $";
25#endif /* ! lint */
26
27#define	_DEFINE
28
29#include <sendmail.h>
30
31
32#if NETINET || NETINET6
33# include <arpa/inet.h>
34#endif /* NETINET || NETINET6 */
35
36static void	dump_class __P((STAB *, int));
37static void	obsolete __P((char **));
38static void	testmodeline __P((char *, ENVELOPE *));
39
40/*
41**  SENDMAIL -- Post mail to a set of destinations.
42**
43**	This is the basic mail router.  All user mail programs should
44**	call this routine to actually deliver mail.  Sendmail in
45**	turn calls a bunch of mail servers that do the real work of
46**	delivering the mail.
47**
48**	Sendmail is driven by settings read in from /etc/mail/sendmail.cf
49**	(read by readcf.c).
50**
51**	Usage:
52**		/usr/lib/sendmail [flags] addr ...
53**
54**		See the associated documentation for details.
55**
56**	Author:
57**		Eric Allman, UCB/INGRES (until 10/81).
58**			     Britton-Lee, Inc., purveyors of fine
59**				database computers (11/81 - 10/88).
60**			     International Computer Science Institute
61**				(11/88 - 9/89).
62**			     UCB/Mammoth Project (10/89 - 7/95).
63**			     InReference, Inc. (8/95 - 1/97).
64**			     Sendmail, Inc. (1/98 - present).
65**		The support of the my employers is gratefully acknowledged.
66**			Few of them (Britton-Lee in particular) have had
67**			anything to gain from my involvement in this project.
68*/
69
70
71int		NextMailer;	/* "free" index into Mailer struct */
72char		*FullName;	/* sender's full name */
73ENVELOPE	BlankEnvelope;	/* a "blank" envelope */
74static ENVELOPE	MainEnvelope;	/* the envelope around the basic letter */
75ADDRESS		NullAddress =	/* a null address */
76		{ "", "", NULL, "" };
77char		*CommandLineArgs;	/* command line args for pid file */
78bool		Warn_Q_option = FALSE;	/* warn about Q option use */
79char		**SaveArgv;	/* argument vector for re-execing */
80static int	MissingFds = 0;	/* bit map of fds missing on startup */
81
82#ifdef NGROUPS_MAX
83GIDSET_T	InitialGidSet[NGROUPS_MAX];
84#endif /* NGROUPS_MAX */
85
86#if DAEMON && !SMTP
87ERROR %%%%   Cannot have DAEMON mode without SMTP   %%%% ERROR
88#endif /* DAEMON && !SMTP */
89#if SMTP && !QUEUE
90ERROR %%%%   Cannot have SMTP mode without QUEUE   %%%% ERROR
91#endif /* SMTP && !QUEUE */
92
93#define MAXCONFIGLEVEL	9	/* highest config version level known */
94
95#if SASL
96static sasl_callback_t srvcallbacks[] =
97{
98	{	SASL_CB_VERIFYFILE,	&safesaslfile,	NULL	},
99	{	SASL_CB_PROXY_POLICY,	&proxy_policy,	NULL	},
100	{	SASL_CB_LIST_END,	NULL,		NULL	}
101};
102
103#endif /* SASL */
104
105int SubmitMode;
106
107int
108main(argc, argv, envp)
109	int argc;
110	char **argv;
111	char **envp;
112{
113	register char *p;
114	char **av;
115	extern char Version[];
116	char *ep, *from;
117	STAB *st;
118	register int i;
119	int j;
120	int dp;
121	bool safecf = TRUE;
122	BITMAP256 *p_flags = NULL;	/* daemon flags */
123	bool warn_C_flag = FALSE;
124	bool auth = TRUE;		/* whether to set e_auth_param */
125	char warn_f_flag = '\0';
126	bool run_in_foreground = FALSE;	/* -bD mode */
127	static bool reenter = FALSE;
128	struct passwd *pw;
129	struct hostent *hp;
130	char *nullserver = NULL;
131	char *authinfo = NULL;
132	char *sysloglabel = NULL;	/* label for syslog */
133	bool forged;
134	struct stat traf_st;		/* for TrafficLog FIFO check */
135	char jbuf[MAXHOSTNAMELEN];	/* holds MyHostName */
136	static char rnamebuf[MAXNAME];	/* holds RealUserName */
137	char *emptyenviron[1];
138# if STARTTLS
139	bool tls_ok;
140# endif /* STARTTLS */
141	QUEUE_CHAR *new;
142	extern int DtableSize;
143	extern int optind;
144	extern int opterr;
145	extern char *optarg;
146	extern char **environ;
147
148	/*
149	**  Check to see if we reentered.
150	**	This would normally happen if e_putheader or e_putbody
151	**	were NULL when invoked.
152	*/
153
154	if (reenter)
155	{
156		syserr("main: reentered!");
157		abort();
158	}
159	reenter = TRUE;
160
161	/* avoid null pointer dereferences */
162	TermEscape.te_rv_on = TermEscape.te_rv_off = "";
163
164	/* do machine-dependent initializations */
165	init_md(argc, argv);
166
167
168	/* in 4.4BSD, the table can be huge; impose a reasonable limit */
169	DtableSize = getdtsize();
170	if (DtableSize > 256)
171		DtableSize = 256;
172
173	/*
174	**  Be sure we have enough file descriptors.
175	**	But also be sure that 0, 1, & 2 are open.
176	*/
177
178	fill_fd(STDIN_FILENO, NULL);
179	fill_fd(STDOUT_FILENO, NULL);
180	fill_fd(STDERR_FILENO, NULL);
181
182	i = DtableSize;
183	while (--i > 0)
184	{
185		if (i != STDIN_FILENO && i != STDOUT_FILENO && i != STDERR_FILENO)
186			(void) close(i);
187	}
188	errno = 0;
189
190#if LOG
191#  ifdef LOG_MAIL
192	openlog("sendmail", LOG_PID, LOG_MAIL);
193#  else /* LOG_MAIL */
194	openlog("sendmail", LOG_PID);
195#  endif /* LOG_MAIL */
196#endif /* LOG */
197
198	if (MissingFds != 0)
199	{
200		char mbuf[MAXLINE];
201
202		mbuf[0] = '\0';
203		if (bitset(1 << STDIN_FILENO, MissingFds))
204			(void) strlcat(mbuf, ", stdin", sizeof mbuf);
205		if (bitset(1 << STDOUT_FILENO, MissingFds))
206			(void) strlcat(mbuf, ", stdout", sizeof mbuf);
207		if (bitset(1 << STDERR_FILENO, MissingFds))
208			(void) strlcat(mbuf, ", stderr", sizeof mbuf);
209		syserr("File descriptors missing on startup: %s", &mbuf[2]);
210	}
211
212	/* reset status from syserr() calls for missing file descriptors */
213	Errors = 0;
214	ExitStat = EX_OK;
215
216	SubmitMode = SUBMIT_UNKNOWN;
217#if XDEBUG
218	checkfd012("after openlog");
219#endif /* XDEBUG */
220
221	/*
222	**  Seed the random number generator.
223	**  Used for queue file names, picking a queue directory, and
224	**  MX randomization.
225	*/
226
227	seed_random();
228
229	tTsetup(tTdvect, sizeof tTdvect, "0-99.1");
230
231#ifdef NGROUPS_MAX
232	/* save initial group set for future checks */
233	i = getgroups(NGROUPS_MAX, InitialGidSet);
234	if (i == 0)
235		InitialGidSet[0] = (GID_T) -1;
236	while (i < NGROUPS_MAX)
237		InitialGidSet[i++] = InitialGidSet[0];
238#endif /* NGROUPS_MAX */
239
240	/* drop group id privileges (RunAsUser not yet set) */
241	dp = drop_privileges(FALSE);
242	setstat(dp);
243
244# ifdef SIGUSR1
245	/* arrange to dump state on user-1 signal */
246	(void) setsignal(SIGUSR1, sigusr1);
247# endif /* SIGUSR1 */
248
249	/* initialize for setproctitle */
250	initsetproctitle(argc, argv, envp);
251
252	/* Handle any non-getoptable constructions. */
253	obsolete(argv);
254
255	/*
256	**  Do a quick prescan of the argument list.
257	*/
258
259
260#if defined(__osf__) || defined(_AIX3)
261# define OPTIONS	"B:b:C:cd:e:F:f:Gh:IiL:M:mN:nO:o:p:q:R:r:sTtUV:vX:x"
262#endif /* defined(__osf__) || defined(_AIX3) */
263#if defined(sony_news)
264# define OPTIONS	"B:b:C:cd:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:q:R:r:sTtUV:vX:"
265#endif /* defined(sony_news) */
266#ifndef OPTIONS
267# define OPTIONS	"B:b:C:cd:e:F:f:Gh:IiL:M:mN:nO:o:p:q:R:r:sTtUV:vX:"
268#endif /* ! OPTIONS */
269	opterr = 0;
270	while ((j = getopt(argc, argv, OPTIONS)) != -1)
271	{
272		switch (j)
273		{
274		  case 'd':
275			/* hack attack -- see if should use ANSI mode */
276			if (strcmp(optarg, "ANSI") == 0)
277			{
278				TermEscape.te_rv_on = "\033[7m";
279				TermEscape.te_rv_off = "\033[0m";
280				break;
281			}
282			tTflag(optarg);
283			setbuf(stdout, (char *) NULL);
284			break;
285
286		  case 'G':	/* relay (gateway) submission */
287			SubmitMode |= SUBMIT_MTA;
288			break;
289
290		  case 'L':
291			j = min(strlen(optarg), 24) + 1;
292			sysloglabel = xalloc(j);
293			(void) strlcpy(sysloglabel, optarg, j);
294			break;
295
296		  case 'U':	/* initial (user) submission */
297			SubmitMode |= SUBMIT_MSA;
298			break;
299		}
300	}
301	opterr = 1;
302
303	if (sysloglabel != NULL)
304	{
305#if LOG
306		closelog();
307#  ifdef LOG_MAIL
308		openlog(sysloglabel, LOG_PID, LOG_MAIL);
309#  else /* LOG_MAIL */
310		openlog(sysloglabel, LOG_PID);
311#  endif /* LOG_MAIL */
312#endif /* LOG */
313	}
314
315	/* set up the blank envelope */
316	BlankEnvelope.e_puthdr = putheader;
317	BlankEnvelope.e_putbody = putbody;
318	BlankEnvelope.e_xfp = NULL;
319	STRUCTCOPY(NullAddress, BlankEnvelope.e_from);
320	CurEnv = &BlankEnvelope;
321	STRUCTCOPY(NullAddress, MainEnvelope.e_from);
322
323	/*
324	**  Set default values for variables.
325	**	These cannot be in initialized data space.
326	*/
327
328	setdefaults(&BlankEnvelope);
329
330	RealUid = getuid();
331	RealGid = getgid();
332
333	pw = sm_getpwuid(RealUid);
334	if (pw != NULL)
335		(void) snprintf(rnamebuf, sizeof rnamebuf, "%s", pw->pw_name);
336	else
337		(void) snprintf(rnamebuf, sizeof rnamebuf, "Unknown UID %d",
338				(int) RealUid);
339
340	RealUserName = rnamebuf;
341
342	if (tTd(0, 101))
343	{
344		dprintf("Version %s\n", Version);
345		finis(FALSE, EX_OK);
346	}
347
348	/*
349	**  if running non-setuid binary as non-root, pretend
350	**  we are the RunAsUid
351	*/
352	if (RealUid != 0 && geteuid() == RealUid)
353	{
354		if (tTd(47, 1))
355			dprintf("Non-setuid binary: RunAsUid = RealUid = %d\n",
356				(int)RealUid);
357		RunAsUid = RealUid;
358	}
359	else if (geteuid() != 0)
360		RunAsUid = geteuid();
361
362	if (RealUid != 0 && getegid() == RealGid)
363		RunAsGid = RealGid;
364
365	if (tTd(47, 5))
366	{
367		dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n",
368			(int)geteuid(), (int)getuid(),
369			(int)getegid(), (int)getgid());
370		dprintf("main: RunAsUser = %d:%d\n",
371			(int)RunAsUid, (int)RunAsGid);
372	}
373
374	/* save command line arguments */
375	j = 0;
376	for (av = argv; *av != NULL; )
377		j += strlen(*av++) + 1;
378	SaveArgv = (char **) xalloc(sizeof (char *) * (argc + 1));
379	CommandLineArgs = xalloc(j);
380	p = CommandLineArgs;
381	for (av = argv, i = 0; *av != NULL; )
382	{
383		int h;
384
385		SaveArgv[i++] = newstr(*av);
386		if (av != argv)
387			*p++ = ' ';
388		(void) strlcpy(p, *av++, j);
389		h = strlen(p);
390		p += h;
391		j -= h + 1;
392	}
393	SaveArgv[i] = NULL;
394
395	if (tTd(0, 1))
396	{
397		int ll;
398		extern char *CompileOptions[];
399
400		dprintf("Version %s\n Compiled with:", Version);
401		av = CompileOptions;
402		ll = 7;
403		while (*av != NULL)
404		{
405			if (ll + strlen(*av) > 63)
406			{
407				dprintf("\n");
408				ll = 0;
409			}
410			if (ll == 0)
411				dprintf("\t\t");
412			else
413				dprintf(" ");
414			dprintf("%s", *av);
415			ll += strlen(*av++) + 1;
416		}
417		dprintf("\n");
418	}
419	if (tTd(0, 10))
420	{
421		int ll;
422		extern char *OsCompileOptions[];
423
424		dprintf("    OS Defines:");
425		av = OsCompileOptions;
426		ll = 7;
427		while (*av != NULL)
428		{
429			if (ll + strlen(*av) > 63)
430			{
431				dprintf("\n");
432				ll = 0;
433			}
434			if (ll == 0)
435				dprintf("\t\t");
436			else
437				dprintf(" ");
438			dprintf("%s", *av);
439			ll += strlen(*av++) + 1;
440		}
441		dprintf("\n");
442#ifdef _PATH_UNIX
443		dprintf("Kernel symbols:\t%s\n", _PATH_UNIX);
444#endif /* _PATH_UNIX */
445		dprintf(" Def Conf file:\t%s\n", getcfname());
446		dprintf("  Def Pid file:\t%s\n", PidFile);
447	}
448
449	InChannel = stdin;
450	OutChannel = stdout;
451
452	/* clear sendmail's environment */
453	ExternalEnviron = environ;
454	emptyenviron[0] = NULL;
455	environ = emptyenviron;
456
457	/*
458	**  restore any original TZ setting until TimeZoneSpec has been
459	**  determined - or early log messages may get bogus time stamps
460	*/
461	if ((p = getextenv("TZ")) != NULL)
462	{
463		char *tz;
464		int tzlen;
465
466		tzlen = strlen(p) + 4;
467		tz = xalloc(tzlen);
468		(void) snprintf(tz, tzlen, "TZ=%s", p);
469		(void) putenv(tz);
470	}
471
472	/* prime the child environment */
473	setuserenv("AGENT", "sendmail");
474
475	if (setsignal(SIGINT, SIG_IGN) != SIG_IGN)
476		(void) setsignal(SIGINT, intsig);
477	(void) setsignal(SIGTERM, intsig);
478	(void) setsignal(SIGPIPE, SIG_IGN);
479	OldUmask = umask(022);
480	OpMode = MD_DELIVER;
481	FullName = getextenv("NAME");
482
483	/*
484	**  Initialize name server if it is going to be used.
485	*/
486
487#if NAMED_BIND
488	if (!bitset(RES_INIT, _res.options))
489		(void) res_init();
490
491	/*
492	**  hack to avoid crashes when debugging for the resolver is
493	**  turned on and sfio is used
494	*/
495	if (tTd(8, 8))
496# if !SFIO || SFIO_STDIO_COMPAT
497		_res.options |= RES_DEBUG;
498# else /* !SFIO || SFIO_STDIO_COMPAT */
499		dprintf("RES_DEBUG not available due to SFIO\n");
500# endif /* !SFIO || SFIO_STDIO_COMPAT */
501	else
502		_res.options &= ~RES_DEBUG;
503# ifdef RES_NOALIASES
504	_res.options |= RES_NOALIASES;
505# endif /* RES_NOALIASES */
506	TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry;
507	TimeOuts.res_retry[RES_TO_FIRST] = _res.retry;
508	TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry;
509	TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans;
510	TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans;
511	TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans;
512#endif /* NAMED_BIND */
513
514	errno = 0;
515	from = NULL;
516
517	/* initialize some macros, etc. */
518	initmacros(CurEnv);
519	init_vendor_macros(CurEnv);
520
521	/* version */
522	define('v', Version, CurEnv);
523
524	/* hostname */
525	hp = myhostname(jbuf, sizeof jbuf);
526	if (jbuf[0] != '\0')
527	{
528		struct	utsname	utsname;
529
530		if (tTd(0, 4))
531			dprintf("canonical name: %s\n", jbuf);
532		define('w', newstr(jbuf), CurEnv);	/* must be new string */
533		define('j', newstr(jbuf), CurEnv);
534		setclass('w', jbuf);
535
536		p = strchr(jbuf, '.');
537		if (p != NULL)
538		{
539			if (p[1] != '\0')
540			{
541				define('m', newstr(&p[1]), CurEnv);
542			}
543			while (p != NULL && strchr(&p[1], '.') != NULL)
544			{
545				*p = '\0';
546				if (tTd(0, 4))
547					dprintf("\ta.k.a.: %s\n", jbuf);
548				setclass('w', jbuf);
549				*p++ = '.';
550				p = strchr(p, '.');
551			}
552		}
553
554		if (uname(&utsname) >= 0)
555			p = utsname.nodename;
556		else
557		{
558			if (tTd(0, 22))
559				dprintf("uname failed (%s)\n",
560					errstring(errno));
561			makelower(jbuf);
562			p = jbuf;
563		}
564		if (tTd(0, 4))
565			dprintf(" UUCP nodename: %s\n", p);
566		p = newstr(p);
567		define('k', p, CurEnv);
568		setclass('k', p);
569		setclass('w', p);
570	}
571	if (hp != NULL)
572	{
573		for (av = hp->h_aliases; av != NULL && *av != NULL; av++)
574		{
575			if (tTd(0, 4))
576				dprintf("\ta.k.a.: %s\n", *av);
577			setclass('w', *av);
578		}
579#if NETINET || NETINET6
580		for (i = 0; hp->h_addr_list[i] != NULL; i++)
581		{
582# if NETINET6
583			char *addr;
584			char buf6[INET6_ADDRSTRLEN];
585			struct in6_addr ia6;
586# endif /* NETINET6 */
587# if NETINET
588			struct in_addr ia;
589# endif /* NETINET */
590			char ipbuf[103];
591
592			ipbuf[0] = '\0';
593			switch (hp->h_addrtype)
594			{
595# if NETINET
596			  case AF_INET:
597				if (hp->h_length != INADDRSZ)
598					break;
599
600				memmove(&ia, hp->h_addr_list[i], INADDRSZ);
601				(void) snprintf(ipbuf,	 sizeof ipbuf,
602						"[%.100s]", inet_ntoa(ia));
603				break;
604# endif /* NETINET */
605
606# if NETINET6
607			  case AF_INET6:
608				if (hp->h_length != IN6ADDRSZ)
609					break;
610
611				memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ);
612				addr = anynet_ntop(&ia6, buf6, sizeof buf6);
613				if (addr != NULL)
614					(void) snprintf(ipbuf, sizeof ipbuf,
615							"[%.100s]", addr);
616				break;
617# endif /* NETINET6 */
618			}
619			if (ipbuf[0] == '\0')
620				break;
621
622			if (tTd(0, 4))
623				dprintf("\ta.k.a.: %s\n", ipbuf);
624			setclass('w', ipbuf);
625		}
626#endif /* NETINET || NETINET6 */
627#if _FFR_FREEHOSTENT && NETINET6
628		freehostent(hp);
629		hp = NULL;
630#endif /* _FFR_FREEHOSTENT && NETINET6 */
631	}
632
633	/* current time */
634	define('b', arpadate((char *) NULL), CurEnv);
635	/* current load average */
636	CurrentLA = sm_getla(CurEnv);
637
638	QueueLimitRecipient = (QUEUE_CHAR *) NULL;
639	QueueLimitSender = (QUEUE_CHAR *) NULL;
640	QueueLimitId = (QUEUE_CHAR *) NULL;
641
642	/*
643	**  Crack argv.
644	*/
645
646	av = argv;
647	p = strrchr(*av, '/');
648	if (p++ == NULL)
649		p = *av;
650	if (strcmp(p, "newaliases") == 0)
651		OpMode = MD_INITALIAS;
652	else if (strcmp(p, "mailq") == 0)
653		OpMode = MD_PRINT;
654	else if (strcmp(p, "smtpd") == 0)
655		OpMode = MD_DAEMON;
656	else if (strcmp(p, "hoststat") == 0)
657		OpMode = MD_HOSTSTAT;
658	else if (strcmp(p, "purgestat") == 0)
659		OpMode = MD_PURGESTAT;
660
661	optind = 1;
662	while ((j = getopt(argc, argv, OPTIONS)) != -1)
663	{
664		switch (j)
665		{
666		  case 'b':	/* operations mode */
667			switch (j = *optarg)
668			{
669			  case MD_DAEMON:
670			  case MD_FGDAEMON:
671#if !DAEMON
672				usrerr("Daemon mode not implemented");
673				ExitStat = EX_USAGE;
674				break;
675#endif /* !DAEMON */
676			  case MD_SMTP:
677#if !SMTP
678				usrerr("I don't speak SMTP");
679				ExitStat = EX_USAGE;
680				break;
681#endif /* !SMTP */
682
683			  case MD_INITALIAS:
684			  case MD_DELIVER:
685			  case MD_VERIFY:
686			  case MD_TEST:
687			  case MD_PRINT:
688			  case MD_HOSTSTAT:
689			  case MD_PURGESTAT:
690			  case MD_ARPAFTP:
691				OpMode = j;
692				break;
693
694			  case MD_FREEZE:
695				usrerr("Frozen configurations unsupported");
696				ExitStat = EX_USAGE;
697				break;
698
699			  default:
700				usrerr("Invalid operation mode %c", j);
701				ExitStat = EX_USAGE;
702				break;
703			}
704			break;
705
706		  case 'B':	/* body type */
707			CurEnv->e_bodytype = newstr(optarg);
708			break;
709
710		  case 'C':	/* select configuration file (already done) */
711			if (RealUid != 0)
712				warn_C_flag = TRUE;
713			ConfFile = newstr(optarg);
714			dp = drop_privileges(TRUE);
715			setstat(dp);
716			safecf = FALSE;
717			break;
718
719		  case 'd':	/* debugging -- already done */
720			break;
721
722		  case 'f':	/* from address */
723		  case 'r':	/* obsolete -f flag */
724			if (from != NULL)
725			{
726				usrerr("More than one \"from\" person");
727				ExitStat = EX_USAGE;
728				break;
729			}
730			from = newstr(denlstring(optarg, TRUE, TRUE));
731			if (strcmp(RealUserName, from) != 0)
732				warn_f_flag = j;
733			break;
734
735		  case 'F':	/* set full name */
736			FullName = newstr(optarg);
737			break;
738
739		  case 'G':	/* relay (gateway) submission */
740			/* already set */
741			break;
742
743		  case 'h':	/* hop count */
744			CurEnv->e_hopcount = (short) strtol(optarg, &ep, 10);
745			if (*ep)
746			{
747				usrerr("Bad hop count (%s)", optarg);
748				ExitStat = EX_USAGE;
749			}
750			break;
751
752		  case 'L':	/* program label */
753			/* already set */
754			break;
755
756		  case 'n':	/* don't alias */
757			NoAlias = TRUE;
758			break;
759
760		  case 'N':	/* delivery status notifications */
761			DefaultNotify |= QHASNOTIFY;
762			define(macid("{dsn_notify}", NULL),
763			       newstr(optarg), CurEnv);
764			if (strcasecmp(optarg, "never") == 0)
765				break;
766			for (p = optarg; p != NULL; optarg = p)
767			{
768				p = strchr(p, ',');
769				if (p != NULL)
770					*p++ = '\0';
771				if (strcasecmp(optarg, "success") == 0)
772					DefaultNotify |= QPINGONSUCCESS;
773				else if (strcasecmp(optarg, "failure") == 0)
774					DefaultNotify |= QPINGONFAILURE;
775				else if (strcasecmp(optarg, "delay") == 0)
776					DefaultNotify |= QPINGONDELAY;
777				else
778				{
779					usrerr("Invalid -N argument");
780					ExitStat = EX_USAGE;
781				}
782			}
783			break;
784
785		  case 'o':	/* set option */
786			setoption(*optarg, optarg + 1, FALSE, TRUE, CurEnv);
787			break;
788
789		  case 'O':	/* set option (long form) */
790			setoption(' ', optarg, FALSE, TRUE, CurEnv);
791			break;
792
793		  case 'p':	/* set protocol */
794			p = strchr(optarg, ':');
795			if (p != NULL)
796			{
797				*p++ = '\0';
798				if (*p != '\0')
799				{
800					ep = xalloc(strlen(p) + 1);
801					cleanstrcpy(ep, p, MAXNAME);
802					define('s', ep, CurEnv);
803				}
804			}
805			if (*optarg != '\0')
806			{
807				ep = xalloc(strlen(optarg) + 1);
808				cleanstrcpy(ep, optarg, MAXNAME);
809				define('r', ep, CurEnv);
810			}
811			break;
812
813		  case 'q':	/* run queue files at intervals */
814#if QUEUE
815			/* sanity check */
816			if (OpMode != MD_DELIVER &&
817			    OpMode != MD_DAEMON &&
818			    OpMode != MD_FGDAEMON &&
819			    OpMode != MD_PRINT &&
820			    OpMode != MD_QUEUERUN)
821			{
822				usrerr("Can not use -q with -b%c", OpMode);
823				ExitStat = EX_USAGE;
824				break;
825			}
826
827			/* don't override -bd, -bD or -bp */
828			if (OpMode == MD_DELIVER)
829				OpMode = MD_QUEUERUN;
830
831			FullName = NULL;
832
833			switch (optarg[0])
834			{
835			  case 'I':
836				new = (QUEUE_CHAR *) xalloc(sizeof *new);
837				new->queue_match = newstr(&optarg[1]);
838				new->queue_next = QueueLimitId;
839				QueueLimitId = new;
840				break;
841
842			  case 'R':
843				new = (QUEUE_CHAR *) xalloc(sizeof *new);
844				new->queue_match = newstr(&optarg[1]);
845				new->queue_next = QueueLimitRecipient;
846				QueueLimitRecipient = new;
847				break;
848
849			  case 'S':
850				new = (QUEUE_CHAR *) xalloc(sizeof *new);
851				new->queue_match = newstr(&optarg[1]);
852				new->queue_next = QueueLimitSender;
853				QueueLimitSender = new;
854				break;
855
856			  default:
857				i = Errors;
858				QueueIntvl = convtime(optarg, 'm');
859
860				/* check for bad conversion */
861				if (i < Errors)
862					ExitStat = EX_USAGE;
863				break;
864			}
865#else /* QUEUE */
866			usrerr("I don't know about queues");
867			ExitStat = EX_USAGE;
868#endif /* QUEUE */
869			break;
870
871		  case 'R':	/* DSN RET: what to return */
872			if (bitset(EF_RET_PARAM, CurEnv->e_flags))
873			{
874				usrerr("Duplicate -R flag");
875				ExitStat = EX_USAGE;
876				break;
877			}
878			CurEnv->e_flags |= EF_RET_PARAM;
879			if (strcasecmp(optarg, "hdrs") == 0)
880				CurEnv->e_flags |= EF_NO_BODY_RETN;
881			else if (strcasecmp(optarg, "full") != 0)
882			{
883				usrerr("Invalid -R value");
884				ExitStat = EX_USAGE;
885			}
886			define(macid("{dsn_ret}", NULL),
887			       newstr(optarg), CurEnv);
888			break;
889
890		  case 't':	/* read recipients from message */
891			GrabTo = TRUE;
892			break;
893
894		  case 'U':	/* initial (user) submission */
895			/* already set */
896			break;
897
898		  case 'V':	/* DSN ENVID: set "original" envelope id */
899			if (!xtextok(optarg))
900			{
901				usrerr("Invalid syntax in -V flag");
902				ExitStat = EX_USAGE;
903			}
904			else
905			{
906				CurEnv->e_envid = newstr(optarg);
907				define(macid("{dsn_envid}", NULL),
908				       newstr(optarg), CurEnv);
909			}
910			break;
911
912		  case 'X':	/* traffic log file */
913			dp = drop_privileges(TRUE);
914			setstat(dp);
915			if (stat(optarg, &traf_st) == 0 &&
916			    S_ISFIFO(traf_st.st_mode))
917				TrafficLogFile = fopen(optarg, "w");
918			else
919				TrafficLogFile = fopen(optarg, "a");
920			if (TrafficLogFile == NULL)
921			{
922				syserr("cannot open %s", optarg);
923				ExitStat = EX_CANTCREAT;
924				break;
925			}
926#if HASSETVBUF
927			(void) setvbuf(TrafficLogFile, NULL, _IOLBF, 0);
928#else /* HASSETVBUF */
929			(void) setlinebuf(TrafficLogFile);
930#endif /* HASSETVBUF */
931			break;
932
933			/* compatibility flags */
934		  case 'c':	/* connect to non-local mailers */
935		  case 'i':	/* don't let dot stop me */
936		  case 'm':	/* send to me too */
937		  case 'T':	/* set timeout interval */
938		  case 'v':	/* give blow-by-blow description */
939			setoption(j, "T", FALSE, TRUE, CurEnv);
940			break;
941
942		  case 'e':	/* error message disposition */
943		  case 'M':	/* define macro */
944			setoption(j, optarg, FALSE, TRUE, CurEnv);
945			break;
946
947		  case 's':	/* save From lines in headers */
948			setoption('f', "T", FALSE, TRUE, CurEnv);
949			break;
950
951#ifdef DBM
952		  case 'I':	/* initialize alias DBM file */
953			OpMode = MD_INITALIAS;
954			break;
955#endif /* DBM */
956
957#if defined(__osf__) || defined(_AIX3)
958		  case 'x':	/* random flag that OSF/1 & AIX mailx passes */
959			break;
960#endif /* defined(__osf__) || defined(_AIX3) */
961#if defined(sony_news)
962		  case 'E':
963		  case 'J':	/* ignore flags for Japanese code conversion
964				   implemented on Sony NEWS */
965			break;
966#endif /* defined(sony_news) */
967
968		  default:
969			finis(TRUE, EX_USAGE);
970			break;
971		}
972	}
973	av += optind;
974
975	if (bitset(SUBMIT_MTA, SubmitMode) &&
976	    bitset(SUBMIT_MSA, SubmitMode))
977	{
978		/* sanity check */
979		errno = 0;	/* reset to avoid bogus error messages */
980		syserr("Cannot use both -G and -U together");
981	}
982	else if (bitset(SUBMIT_MTA, SubmitMode))
983		define(macid("{daemon_flags}", NULL), "CC f", CurEnv);
984	else if (bitset(SUBMIT_MSA, SubmitMode))
985	{
986		define(macid("{daemon_flags}", NULL), "c u", CurEnv);
987
988		/* check for wrong OpMode */
989		if (OpMode != MD_DELIVER && OpMode != MD_SMTP)
990		{
991			errno = 0;	/* reset to avoid bogus error msgs */
992			syserr("Cannot use -U and -b%c", OpMode);
993		}
994	}
995	else
996	{
997#if _FFR_DEFAULT_SUBMIT_TO_MSA
998		define(macid("{daemon_flags}", NULL), "c u", CurEnv);
999#else /* _FFR_DEFAULT_SUBMIT_TO_MSA */
1000		/* EMPTY */
1001#endif /* _FFR_DEFAULT_SUBMIT_TO_MSA */
1002	}
1003
1004	/*
1005	**  Do basic initialization.
1006	**	Read system control file.
1007	**	Extract special fields for local use.
1008	*/
1009
1010	/* set up ${opMode} for use in config file */
1011	{
1012		char mbuf[2];
1013
1014		mbuf[0] = OpMode;
1015		mbuf[1] = '\0';
1016		define(MID_OPMODE, newstr(mbuf), CurEnv);
1017	}
1018
1019#if XDEBUG
1020	checkfd012("before readcf");
1021#endif /* XDEBUG */
1022	vendor_pre_defaults(CurEnv);
1023
1024	readcf(getcfname(), safecf, CurEnv);
1025	ConfigFileRead = TRUE;
1026	vendor_post_defaults(CurEnv);
1027
1028	/* Enforce use of local time (null string overrides this) */
1029	if (TimeZoneSpec == NULL)
1030		unsetenv("TZ");
1031	else if (TimeZoneSpec[0] != '\0')
1032		setuserenv("TZ", TimeZoneSpec);
1033	else
1034		setuserenv("TZ", NULL);
1035	tzset();
1036
1037	/* avoid denial-of-service attacks */
1038	resetlimits();
1039
1040	if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON)
1041	{
1042		/* drop privileges -- daemon mode done after socket/bind */
1043		dp = drop_privileges(FALSE);
1044		setstat(dp);
1045	}
1046
1047#if NAMED_BIND
1048	_res.retry = TimeOuts.res_retry[RES_TO_DEFAULT];
1049	_res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT];
1050#endif /* NAMED_BIND */
1051
1052	/*
1053	**  Find our real host name for future logging.
1054	*/
1055
1056	authinfo = getauthinfo(STDIN_FILENO, &forged);
1057	define('_', authinfo, CurEnv);
1058
1059	/* suppress error printing if errors mailed back or whatever */
1060	if (CurEnv->e_errormode != EM_PRINT)
1061		HoldErrs = TRUE;
1062
1063	/* set up the $=m class now, after .cf has a chance to redefine $m */
1064	expand("\201m", jbuf, sizeof jbuf, CurEnv);
1065	setclass('m', jbuf);
1066
1067	/* probe interfaces and locate any additional names */
1068	if (!DontProbeInterfaces)
1069		load_if_names();
1070
1071	if (tTd(0, 1))
1072	{
1073		dprintf("\n============ SYSTEM IDENTITY (after readcf) ============");
1074		dprintf("\n      (short domain name) $w = ");
1075		xputs(macvalue('w', CurEnv));
1076		dprintf("\n  (canonical domain name) $j = ");
1077		xputs(macvalue('j', CurEnv));
1078		dprintf("\n         (subdomain name) $m = ");
1079		xputs(macvalue('m', CurEnv));
1080		dprintf("\n              (node name) $k = ");
1081		xputs(macvalue('k', CurEnv));
1082		dprintf("\n========================================================\n\n");
1083	}
1084
1085	/*
1086	**  Do more command line checking -- these are things that
1087	**  have to modify the results of reading the config file.
1088	*/
1089
1090	/* process authorization warnings from command line */
1091	if (warn_C_flag)
1092		auth_warning(CurEnv, "Processed by %s with -C %s",
1093			RealUserName, ConfFile);
1094	if (Warn_Q_option && !wordinclass(RealUserName, 't'))
1095		auth_warning(CurEnv, "Processed from queue %s", QueueDir);
1096
1097	/* check body type for legality */
1098	if (CurEnv->e_bodytype == NULL)
1099		/* EMPTY */
1100		/* nothing */ ;
1101	else if (strcasecmp(CurEnv->e_bodytype, "7BIT") == 0)
1102		SevenBitInput = TRUE;
1103	else if (strcasecmp(CurEnv->e_bodytype, "8BITMIME") == 0)
1104		SevenBitInput = FALSE;
1105	else
1106	{
1107		usrerr("Illegal body type %s", CurEnv->e_bodytype);
1108		CurEnv->e_bodytype = NULL;
1109	}
1110
1111	/* tweak default DSN notifications */
1112	if (DefaultNotify == 0)
1113		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
1114
1115	/* be sure we don't pick up bogus HOSTALIASES environment variable */
1116	if (OpMode == MD_QUEUERUN && RealUid != 0)
1117		(void) unsetenv("HOSTALIASES");
1118
1119	/* check for sane configuration level */
1120	if (ConfigLevel > MAXCONFIGLEVEL)
1121	{
1122		syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)",
1123			ConfigLevel, Version, MAXCONFIGLEVEL);
1124	}
1125
1126	/* need MCI cache to have persistence */
1127	if (HostStatDir != NULL && MaxMciCache == 0)
1128	{
1129		HostStatDir = NULL;
1130		printf("Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n");
1131	}
1132
1133	/* need HostStatusDir in order to have SingleThreadDelivery */
1134	if (SingleThreadDelivery && HostStatDir == NULL)
1135	{
1136		SingleThreadDelivery = FALSE;
1137		printf("Warning: HostStatusDirectory required for SingleThreadDelivery\n");
1138	}
1139
1140	/* check for permissions */
1141	if ((OpMode == MD_DAEMON ||
1142	     OpMode == MD_FGDAEMON ||
1143	     OpMode == MD_PURGESTAT) &&
1144	    RealUid != 0 &&
1145	    RealUid != TrustedUid)
1146	{
1147		if (LogLevel > 1)
1148			sm_syslog(LOG_ALERT, NOQID,
1149				  "user %d attempted to %s",
1150				  RealUid,
1151				  OpMode != MD_PURGESTAT ? "run daemon"
1152							 : "purge host status");
1153		usrerr("Permission denied");
1154		finis(FALSE, EX_USAGE);
1155	}
1156	if (OpMode == MD_INITALIAS &&
1157	    RealUid != 0 &&
1158	    RealUid != TrustedUid &&
1159	    !wordinclass(RealUserName, 't'))
1160	{
1161		if (LogLevel > 1)
1162			sm_syslog(LOG_ALERT, NOQID,
1163				  "user %d attempted to rebuild the alias map",
1164				  RealUid);
1165		usrerr("Permission denied");
1166		finis(FALSE, EX_USAGE);
1167	}
1168
1169	if (MeToo)
1170		BlankEnvelope.e_flags |= EF_METOO;
1171
1172	switch (OpMode)
1173	{
1174	  case MD_TEST:
1175		/* don't have persistent host status in test mode */
1176		HostStatDir = NULL;
1177		if (Verbose == 0)
1178			Verbose = 2;
1179		CurEnv->e_errormode = EM_PRINT;
1180		HoldErrs = FALSE;
1181		break;
1182
1183	  case MD_VERIFY:
1184		CurEnv->e_errormode = EM_PRINT;
1185		HoldErrs = FALSE;
1186		/* arrange to exit cleanly on hangup signal */
1187		if (setsignal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1188			(void) setsignal(SIGHUP, intsig);
1189		break;
1190
1191	  case MD_FGDAEMON:
1192		run_in_foreground = TRUE;
1193		OpMode = MD_DAEMON;
1194		/* FALLTHROUGH */
1195
1196	  case MD_DAEMON:
1197		vendor_daemon_setup(CurEnv);
1198
1199		/* remove things that don't make sense in daemon mode */
1200		FullName = NULL;
1201		GrabTo = FALSE;
1202
1203		/* arrange to restart on hangup signal */
1204		if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/')
1205			sm_syslog(LOG_WARNING, NOQID,
1206				  "daemon invoked without full pathname; kill -1 won't work");
1207		(void) setsignal(SIGHUP, sighup);
1208
1209		/* workaround: can't seem to release the signal in the parent */
1210		(void) releasesignal(SIGHUP);
1211		break;
1212
1213	  case MD_INITALIAS:
1214		Verbose = 2;
1215		CurEnv->e_errormode = EM_PRINT;
1216		HoldErrs = FALSE;
1217		/* FALLTHROUGH */
1218
1219	  default:
1220		/* arrange to exit cleanly on hangup signal */
1221		if (setsignal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1222			(void) setsignal(SIGHUP, intsig);
1223		break;
1224	}
1225
1226	/* special considerations for FullName */
1227	if (FullName != NULL)
1228	{
1229		char *full = NULL;
1230
1231		/* full names can't have newlines */
1232		if (strchr(FullName, '\n') != NULL)
1233		{
1234			FullName = full = newstr(denlstring(FullName, TRUE, TRUE));
1235		}
1236		/* check for characters that may have to be quoted */
1237		if (!rfc822_string(FullName))
1238		{
1239			/*
1240			**  Quote a full name with special characters
1241			**  as a comment so crackaddr() doesn't destroy
1242			**  the name portion of the address.
1243			*/
1244			FullName = addquotes(FullName);
1245			if (full != NULL)
1246				free(full);
1247		}
1248	}
1249
1250	/* do heuristic mode adjustment */
1251	if (Verbose)
1252	{
1253		/* turn off noconnect option */
1254		setoption('c', "F", TRUE, FALSE, CurEnv);
1255
1256		/* turn on interactive delivery */
1257		setoption('d', "", TRUE, FALSE, CurEnv);
1258	}
1259
1260#ifdef VENDOR_CODE
1261	/* check for vendor mismatch */
1262	if (VendorCode != VENDOR_CODE)
1263	{
1264		message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s",
1265			getvendor(VENDOR_CODE), getvendor(VendorCode));
1266	}
1267#endif /* VENDOR_CODE */
1268
1269	/* check for out of date configuration level */
1270	if (ConfigLevel < MAXCONFIGLEVEL)
1271	{
1272		message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d",
1273			Version, MAXCONFIGLEVEL, ConfigLevel);
1274	}
1275
1276	if (ConfigLevel < 3)
1277		UseErrorsTo = TRUE;
1278
1279	/* set options that were previous macros */
1280	if (SmtpGreeting == NULL)
1281	{
1282		if (ConfigLevel < 7 && (p = macvalue('e', CurEnv)) != NULL)
1283			SmtpGreeting = newstr(p);
1284		else
1285			SmtpGreeting = "\201j Sendmail \201v ready at \201b";
1286	}
1287	if (UnixFromLine == NULL)
1288	{
1289		if (ConfigLevel < 7 && (p = macvalue('l', CurEnv)) != NULL)
1290			UnixFromLine = newstr(p);
1291		else
1292			UnixFromLine = "From \201g  \201d";
1293	}
1294	SmtpError[0] = '\0';
1295
1296	/* our name for SMTP codes */
1297	expand("\201j", jbuf, sizeof jbuf, CurEnv);
1298	MyHostName = jbuf;
1299	if (strchr(jbuf, '.') == NULL)
1300		message("WARNING: local host name (%s) is not qualified; fix $j in config file",
1301			jbuf);
1302
1303	/* make certain that this name is part of the $=w class */
1304	setclass('w', MyHostName);
1305
1306	/* the indices of built-in mailers */
1307	st = stab("local", ST_MAILER, ST_FIND);
1308	if (st != NULL)
1309		LocalMailer = st->s_mailer;
1310	else if (OpMode != MD_TEST || !warn_C_flag)
1311		syserr("No local mailer defined");
1312
1313	st = stab("prog", ST_MAILER, ST_FIND);
1314	if (st == NULL)
1315		syserr("No prog mailer defined");
1316	else
1317	{
1318		ProgMailer = st->s_mailer;
1319		clrbitn(M_MUSER, ProgMailer->m_flags);
1320	}
1321
1322	st = stab("*file*", ST_MAILER, ST_FIND);
1323	if (st == NULL)
1324		syserr("No *file* mailer defined");
1325	else
1326	{
1327		FileMailer = st->s_mailer;
1328		clrbitn(M_MUSER, FileMailer->m_flags);
1329	}
1330
1331	st = stab("*include*", ST_MAILER, ST_FIND);
1332	if (st == NULL)
1333		syserr("No *include* mailer defined");
1334	else
1335		InclMailer = st->s_mailer;
1336
1337	if (ConfigLevel < 6)
1338	{
1339		/* heuristic tweaking of local mailer for back compat */
1340		if (LocalMailer != NULL)
1341		{
1342			setbitn(M_ALIASABLE, LocalMailer->m_flags);
1343			setbitn(M_HASPWENT, LocalMailer->m_flags);
1344			setbitn(M_TRYRULESET5, LocalMailer->m_flags);
1345			setbitn(M_CHECKINCLUDE, LocalMailer->m_flags);
1346			setbitn(M_CHECKPROG, LocalMailer->m_flags);
1347			setbitn(M_CHECKFILE, LocalMailer->m_flags);
1348			setbitn(M_CHECKUDB, LocalMailer->m_flags);
1349		}
1350		if (ProgMailer != NULL)
1351			setbitn(M_RUNASRCPT, ProgMailer->m_flags);
1352		if (FileMailer != NULL)
1353			setbitn(M_RUNASRCPT, FileMailer->m_flags);
1354	}
1355	if (ConfigLevel < 7)
1356	{
1357		if (LocalMailer != NULL)
1358			setbitn(M_VRFY250, LocalMailer->m_flags);
1359		if (ProgMailer != NULL)
1360			setbitn(M_VRFY250, ProgMailer->m_flags);
1361		if (FileMailer != NULL)
1362			setbitn(M_VRFY250, FileMailer->m_flags);
1363	}
1364
1365	/* MIME Content-Types that cannot be transfer encoded */
1366	setclass('n', "multipart/signed");
1367
1368	/* MIME message/xxx subtypes that can be treated as messages */
1369	setclass('s', "rfc822");
1370
1371	/* MIME Content-Transfer-Encodings that can be encoded */
1372	setclass('e', "7bit");
1373	setclass('e', "8bit");
1374	setclass('e', "binary");
1375
1376#ifdef USE_B_CLASS
1377	/* MIME Content-Types that should be treated as binary */
1378	setclass('b', "image");
1379	setclass('b', "audio");
1380	setclass('b', "video");
1381	setclass('b', "application/octet-stream");
1382#endif /* USE_B_CLASS */
1383
1384	/* MIME headers which have fields to check for overflow */
1385	setclass(macid("{checkMIMEFieldHeaders}", NULL), "content-disposition");
1386	setclass(macid("{checkMIMEFieldHeaders}", NULL), "content-type");
1387
1388	/* MIME headers to check for length overflow */
1389	setclass(macid("{checkMIMETextHeaders}", NULL), "content-description");
1390
1391	/* MIME headers to check for overflow and rebalance */
1392	setclass(macid("{checkMIMEHeaders}", NULL), "content-disposition");
1393	setclass(macid("{checkMIMEHeaders}", NULL), "content-id");
1394	setclass(macid("{checkMIMEHeaders}", NULL), "content-transfer-encoding");
1395	setclass(macid("{checkMIMEHeaders}", NULL), "content-type");
1396	setclass(macid("{checkMIMEHeaders}", NULL), "mime-version");
1397
1398	/* Macros to save in the qf file -- don't remove any */
1399	setclass(macid("{persistentMacros}", NULL), "r");
1400	setclass(macid("{persistentMacros}", NULL), "s");
1401	setclass(macid("{persistentMacros}", NULL), "_");
1402	setclass(macid("{persistentMacros}", NULL), "{if_addr}");
1403	setclass(macid("{persistentMacros}", NULL), "{daemon_flags}");
1404	setclass(macid("{persistentMacros}", NULL), "{client_flags}");
1405
1406	/* operate in queue directory */
1407	if (QueueDir == NULL)
1408	{
1409		if (OpMode != MD_TEST)
1410		{
1411			syserr("QueueDirectory (Q) option must be set");
1412			ExitStat = EX_CONFIG;
1413		}
1414	}
1415	else
1416	{
1417		/*
1418		**  If multiple queues wildcarded, use one for
1419		**  the daemon's home. Note that this preconditions
1420		**  a wildcarded QueueDir to a real pathname.
1421		*/
1422
1423		if (OpMode != MD_TEST)
1424			multiqueue_cache();
1425	}
1426
1427	/* check host status directory for validity */
1428	if (HostStatDir != NULL && !path_is_dir(HostStatDir, FALSE))
1429	{
1430		/* cannot use this value */
1431		if (tTd(0, 2))
1432			dprintf("Cannot use HostStatusDirectory = %s: %s\n",
1433				HostStatDir, errstring(errno));
1434		HostStatDir = NULL;
1435	}
1436
1437#if QUEUE
1438	if (OpMode == MD_QUEUERUN && RealUid != 0 &&
1439	    bitset(PRIV_RESTRICTQRUN, PrivacyFlags))
1440	{
1441		struct stat stbuf;
1442
1443		/* check to see if we own the queue directory */
1444		if (stat(".", &stbuf) < 0)
1445			syserr("main: cannot stat %s", QueueDir);
1446		if (stbuf.st_uid != RealUid)
1447		{
1448			/* nope, really a botch */
1449			usrerr("You do not have permission to process the queue");
1450			finis(FALSE, EX_NOPERM);
1451		}
1452	}
1453#endif /* QUEUE */
1454
1455#if _FFR_MILTER
1456	/* sanity checks on milter filters */
1457	if (OpMode == MD_DAEMON || OpMode == MD_SMTP)
1458		milter_parse_list(InputFilterList, InputFilters, MAXFILTERS);
1459#endif /* _FFR_MILTER */
1460
1461
1462	/* if we've had errors so far, exit now */
1463	if (ExitStat != EX_OK && OpMode != MD_TEST)
1464		finis(FALSE, ExitStat);
1465
1466#if XDEBUG
1467	checkfd012("before main() initmaps");
1468#endif /* XDEBUG */
1469
1470	/*
1471	**  Do operation-mode-dependent initialization.
1472	*/
1473
1474	switch (OpMode)
1475	{
1476	  case MD_PRINT:
1477		/* print the queue */
1478#if QUEUE
1479		dropenvelope(CurEnv, TRUE);
1480		(void) setsignal(SIGPIPE, quiesce);
1481		printqueue();
1482		finis(FALSE, EX_OK);
1483#else /* QUEUE */
1484		usrerr("No queue to print");
1485		finis(FALSE, EX_UNAVAILABLE);
1486#endif /* QUEUE */
1487		break;
1488
1489	  case MD_HOSTSTAT:
1490		(void) setsignal(SIGPIPE, quiesce);
1491		(void) mci_traverse_persistent(mci_print_persistent, NULL);
1492		finis(FALSE, EX_OK);
1493		break;
1494
1495	  case MD_PURGESTAT:
1496		(void) mci_traverse_persistent(mci_purge_persistent, NULL);
1497		finis(FALSE, EX_OK);
1498		break;
1499
1500	  case MD_INITALIAS:
1501		/* initialize maps */
1502		initmaps();
1503		finis(FALSE, ExitStat);
1504		break;
1505
1506	  case MD_SMTP:
1507	  case MD_DAEMON:
1508		/* reset DSN parameters */
1509		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
1510		define(macid("{dsn_notify}", NULL), NULL, CurEnv);
1511		CurEnv->e_envid = NULL;
1512		define(macid("{dsn_envid}", NULL), NULL, CurEnv);
1513		CurEnv->e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
1514		define(macid("{dsn_ret}", NULL), NULL, CurEnv);
1515
1516		/* don't open maps for daemon -- done below in child */
1517		break;
1518	}
1519
1520	if (tTd(0, 15))
1521	{
1522		/* print configuration table (or at least part of it) */
1523		if (tTd(0, 90))
1524			printrules();
1525		for (i = 0; i < MAXMAILERS; i++)
1526		{
1527			if (Mailer[i] != NULL)
1528				printmailer(Mailer[i]);
1529		}
1530	}
1531
1532	/*
1533	**  Switch to the main envelope.
1534	*/
1535
1536	CurEnv = newenvelope(&MainEnvelope, CurEnv);
1537	MainEnvelope.e_flags = BlankEnvelope.e_flags;
1538
1539	/*
1540	**  If test mode, read addresses from stdin and process.
1541	*/
1542
1543	if (OpMode == MD_TEST)
1544	{
1545		char buf[MAXLINE];
1546
1547#if _FFR_TESTMODE_DROP_PRIVS
1548		dp = drop_privileges(TRUE);
1549		if (dp != EX_OK)
1550		{
1551			CurEnv->e_id = NULL;
1552			finis(TRUE, dp);
1553		}
1554#endif /* _FFR_TESTMODE_DROP_PRIVS */
1555
1556		if (isatty(fileno(stdin)))
1557			Verbose = 2;
1558
1559		if (Verbose)
1560		{
1561			printf("ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n");
1562			printf("Enter <ruleset> <address>\n");
1563		}
1564		if (setjmp(TopFrame) > 0)
1565			printf("\n");
1566		(void) setsignal(SIGINT, intindebug);
1567		for (;;)
1568		{
1569			if (Verbose == 2)
1570				printf("> ");
1571			(void) fflush(stdout);
1572			if (fgets(buf, sizeof buf, stdin) == NULL)
1573				testmodeline("/quit", CurEnv);
1574			p = strchr(buf, '\n');
1575			if (p != NULL)
1576				*p = '\0';
1577			if (Verbose < 2)
1578				printf("> %s\n", buf);
1579			testmodeline(buf, CurEnv);
1580		}
1581	}
1582
1583#if SMTP
1584# if STARTTLS
1585	/*
1586	**  basic TLS initialization
1587	**  ignore result for now
1588	*/
1589	SSL_library_init();
1590	SSL_load_error_strings();
1591#  if 0
1592	/* this is currently a macro for SSL_library_init */
1593	SSLeay_add_ssl_algorithms();
1594#  endif /* 0 */
1595
1596	/* initialize PRNG */
1597	tls_ok = tls_rand_init(RandFile, 7);
1598
1599# endif /* STARTTLS */
1600#endif /* SMTP */
1601
1602#if QUEUE
1603	/*
1604	**  If collecting stuff from the queue, go start doing that.
1605	*/
1606
1607	if (OpMode == MD_QUEUERUN && QueueIntvl == 0)
1608	{
1609# if SMTP
1610#  if STARTTLS
1611		if (tls_ok
1612		   )
1613		{
1614			/* init TLS for client, ignore result for now */
1615			(void) initclttls();
1616		}
1617#  endif /* STARTTLS */
1618# endif /* SMTP */
1619		(void) runqueue(FALSE, Verbose);
1620		finis(TRUE, ExitStat);
1621	}
1622#endif /* QUEUE */
1623
1624# if SASL
1625	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
1626	{
1627		/* give a syserr or just disable AUTH ? */
1628		if ((i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK)
1629			syserr("!sasl_server_init failed! [%s]",
1630			       sasl_errstring(i, NULL, NULL));
1631	}
1632# endif /* SASL */
1633
1634	/*
1635	**  If a daemon, wait for a request.
1636	**	getrequests will always return in a child.
1637	**	If we should also be processing the queue, start
1638	**		doing it in background.
1639	**	We check for any errors that might have happened
1640	**		during startup.
1641	*/
1642
1643	if (OpMode == MD_DAEMON || QueueIntvl != 0)
1644	{
1645		char dtype[200];
1646
1647		if (!run_in_foreground && !tTd(99, 100))
1648		{
1649			/* put us in background */
1650			i = fork();
1651			if (i < 0)
1652				syserr("daemon: cannot fork");
1653			if (i != 0)
1654				finis(FALSE, EX_OK);
1655
1656			/* disconnect from our controlling tty */
1657			disconnect(2, CurEnv);
1658		}
1659
1660		dtype[0] = '\0';
1661		if (OpMode == MD_DAEMON)
1662			(void) strlcat(dtype, "+SMTP", sizeof dtype);
1663		if (QueueIntvl != 0)
1664		{
1665			(void) strlcat(dtype, "+queueing@", sizeof dtype);
1666			(void) strlcat(dtype, pintvl(QueueIntvl, TRUE),
1667				       sizeof dtype);
1668		}
1669		if (tTd(0, 1))
1670			(void) strlcat(dtype, "+debugging", sizeof dtype);
1671
1672		sm_syslog(LOG_INFO, NOQID,
1673			  "starting daemon (%s): %s", Version, dtype + 1);
1674#ifdef XLA
1675		xla_create_file();
1676#endif /* XLA */
1677
1678		/* save daemon type in a macro for possible PidFile use */
1679		define(macid("{daemon_info}", NULL),
1680		       newstr(dtype + 1), &BlankEnvelope);
1681
1682		/* save queue interval in a macro for possible PidFile use */
1683		define(macid("{queue_interval}", NULL),
1684		       newstr(pintvl(QueueIntvl, TRUE)), CurEnv);
1685
1686#if QUEUE
1687		if (QueueIntvl != 0)
1688		{
1689			(void) runqueue(TRUE, FALSE);
1690			if (OpMode != MD_DAEMON)
1691			{
1692				/* write the pid to file */
1693				log_sendmail_pid(CurEnv);
1694				for (;;)
1695				{
1696					(void) pause();
1697					if (DoQueueRun)
1698						(void) runqueue(TRUE, FALSE);
1699				}
1700			}
1701		}
1702#endif /* QUEUE */
1703		dropenvelope(CurEnv, TRUE);
1704
1705#if DAEMON
1706# if STARTTLS
1707		/* init TLS for server, ignore result for now */
1708		(void) initsrvtls();
1709# endif /* STARTTLS */
1710		p_flags = getrequests(CurEnv);
1711
1712		/* drop privileges */
1713		(void) drop_privileges(FALSE);
1714
1715		/* at this point we are in a child: reset state */
1716		(void) newenvelope(CurEnv, CurEnv);
1717
1718		/*
1719		**  Get authentication data
1720		*/
1721
1722		authinfo = getauthinfo(fileno(InChannel), &forged);
1723		define('_', authinfo, &BlankEnvelope);
1724#endif /* DAEMON */
1725	}
1726
1727	if (LogLevel > 9)
1728	{
1729		/* log connection information */
1730		sm_syslog(LOG_INFO, NULL, "connect from %.100s", authinfo);
1731	}
1732
1733#if SMTP
1734	/*
1735	**  If running SMTP protocol, start collecting and executing
1736	**  commands.  This will never return.
1737	*/
1738
1739	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
1740	{
1741		char pbuf[20];
1742
1743		/*
1744		**  Save some macros for check_* rulesets.
1745		*/
1746
1747		if (forged)
1748		{
1749			char ipbuf[103];
1750
1751			(void) snprintf(ipbuf, sizeof ipbuf, "[%.100s]",
1752					anynet_ntoa(&RealHostAddr));
1753			define(macid("{client_name}", NULL),
1754			       newstr(ipbuf), &BlankEnvelope);
1755			define(macid("{client_resolve}", NULL),
1756			       "FORGED", &BlankEnvelope);
1757		}
1758		else
1759			define(macid("{client_name}", NULL), RealHostName,
1760			       &BlankEnvelope);
1761		define(macid("{client_addr}", NULL),
1762		       newstr(anynet_ntoa(&RealHostAddr)), &BlankEnvelope);
1763		(void)sm_getla(&BlankEnvelope);
1764
1765		switch(RealHostAddr.sa.sa_family)
1766		{
1767# if NETINET
1768		  case AF_INET:
1769			(void) snprintf(pbuf, sizeof pbuf, "%d",
1770					RealHostAddr.sin.sin_port);
1771			break;
1772# endif /* NETINET */
1773# if NETINET6
1774		  case AF_INET6:
1775			(void) snprintf(pbuf, sizeof pbuf, "%d",
1776					RealHostAddr.sin6.sin6_port);
1777			break;
1778# endif /* NETINET6 */
1779		  default:
1780			(void) snprintf(pbuf, sizeof pbuf, "0");
1781			break;
1782		}
1783		define(macid("{client_port}", NULL),
1784		       newstr(pbuf), &BlankEnvelope);
1785
1786		if (OpMode == MD_DAEMON)
1787		{
1788			/* validate the connection */
1789			HoldErrs = TRUE;
1790			nullserver = validate_connection(&RealHostAddr,
1791							 RealHostName, CurEnv);
1792			HoldErrs = FALSE;
1793		}
1794		else if (p_flags == NULL)
1795		{
1796			p_flags = (BITMAP256 *) xalloc(sizeof *p_flags);
1797			clrbitmap(p_flags);
1798		}
1799# if STARTTLS
1800		if (OpMode == MD_SMTP)
1801			(void) initsrvtls();
1802# endif /* STARTTLS */
1803
1804
1805		smtp(nullserver, *p_flags, CurEnv);
1806	}
1807#endif /* SMTP */
1808
1809	clearenvelope(CurEnv, FALSE);
1810	if (OpMode == MD_VERIFY)
1811	{
1812		set_delivery_mode(SM_VERIFY, CurEnv);
1813		PostMasterCopy = NULL;
1814	}
1815	else
1816	{
1817		/* interactive -- all errors are global */
1818		CurEnv->e_flags |= EF_GLOBALERRS|EF_LOGSENDER;
1819	}
1820
1821	/*
1822	**  Do basic system initialization and set the sender
1823	*/
1824
1825	initsys(CurEnv);
1826	define(macid("{ntries}", NULL), "0", CurEnv);
1827	setsender(from, CurEnv, NULL, '\0', FALSE);
1828	if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') &&
1829	    (!bitnset(M_LOCALMAILER, CurEnv->e_from.q_mailer->m_flags) ||
1830	     strcmp(CurEnv->e_from.q_user, RealUserName) != 0))
1831	{
1832		auth_warning(CurEnv, "%s set sender to %s using -%c",
1833			RealUserName, from, warn_f_flag);
1834#if SASL
1835		auth = FALSE;
1836#endif /* SASL */
1837	}
1838	if (auth)
1839	{
1840		char *fv;
1841
1842		/* set the initial sender for AUTH= to $f@$j */
1843		fv = macvalue('f', CurEnv);
1844		if (fv == NULL || *fv == '\0')
1845			CurEnv->e_auth_param = NULL;
1846		else
1847		{
1848			if (strchr(fv, '@') == NULL)
1849			{
1850				i = strlen(fv) + strlen(macvalue('j', CurEnv))
1851				    + 2;
1852				p = xalloc(i);
1853				(void) snprintf(p, i, "%s@%s", fv,
1854						macvalue('j', CurEnv));
1855			}
1856			else
1857				p = newstr(fv);
1858			CurEnv->e_auth_param = newstr(xtextify(p, NULL));
1859		}
1860	}
1861	if (macvalue('s', CurEnv) == NULL)
1862		define('s', RealHostName, CurEnv);
1863
1864	if (*av == NULL && !GrabTo)
1865	{
1866		CurEnv->e_to = NULL;
1867		CurEnv->e_flags |= EF_GLOBALERRS;
1868		HoldErrs = FALSE;
1869		usrerr("Recipient names must be specified");
1870
1871		/* collect body for UUCP return */
1872		if (OpMode != MD_VERIFY)
1873			collect(InChannel, FALSE, NULL, CurEnv);
1874		finis(TRUE, EX_USAGE);
1875	}
1876
1877	/*
1878	**  Scan argv and deliver the message to everyone.
1879	*/
1880
1881	sendtoargv(av, CurEnv);
1882
1883	/* if we have had errors sofar, arrange a meaningful exit stat */
1884	if (Errors > 0 && ExitStat == EX_OK)
1885		ExitStat = EX_USAGE;
1886
1887#if _FFR_FIX_DASHT
1888	/*
1889	**  If using -t, force not sending to argv recipients, even
1890	**  if they are mentioned in the headers.
1891	*/
1892
1893	if (GrabTo)
1894	{
1895		ADDRESS *q;
1896
1897		for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next)
1898			q->q_state = QS_REMOVED;
1899	}
1900#endif /* _FFR_FIX_DASHT */
1901
1902	/*
1903	**  Read the input mail.
1904	*/
1905
1906	CurEnv->e_to = NULL;
1907	if (OpMode != MD_VERIFY || GrabTo)
1908	{
1909		int savederrors = Errors;
1910		long savedflags = CurEnv->e_flags & EF_FATALERRS;
1911
1912		CurEnv->e_flags |= EF_GLOBALERRS;
1913		CurEnv->e_flags &= ~EF_FATALERRS;
1914		Errors = 0;
1915		buffer_errors();
1916		collect(InChannel, FALSE, NULL, CurEnv);
1917
1918		/* header checks failed */
1919		if (Errors > 0)
1920		{
1921			/* Log who the mail would have gone to */
1922			if (LogLevel > 8 && CurEnv->e_message != NULL &&
1923			    !GrabTo)
1924			{
1925				ADDRESS *a;
1926
1927				for (a = CurEnv->e_sendqueue;
1928				     a != NULL;
1929				     a = a->q_next)
1930				{
1931					if (!QS_IS_UNDELIVERED(a->q_state))
1932						continue;
1933
1934					CurEnv->e_to = a->q_paddr;
1935					logdelivery(NULL, NULL, NULL,
1936						    CurEnv->e_message,
1937						    NULL, (time_t) 0, CurEnv);
1938				}
1939				CurEnv->e_to = NULL;
1940			}
1941			flush_errors(TRUE);
1942			finis(TRUE, ExitStat);
1943			/* NOTREACHED */
1944			return -1;
1945		}
1946
1947		/* bail out if message too large */
1948		if (bitset(EF_CLRQUEUE, CurEnv->e_flags))
1949		{
1950			finis(TRUE, ExitStat != EX_OK ? ExitStat : EX_DATAERR);
1951			/* NOTREACHED */
1952			return -1;
1953		}
1954		Errors = savederrors;
1955		CurEnv->e_flags |= savedflags;
1956	}
1957	errno = 0;
1958
1959	if (tTd(1, 1))
1960		dprintf("From person = \"%s\"\n", CurEnv->e_from.q_paddr);
1961
1962	/*
1963	**  Actually send everything.
1964	**	If verifying, just ack.
1965	*/
1966
1967	CurEnv->e_from.q_state = QS_SENDER;
1968	if (tTd(1, 5))
1969	{
1970		dprintf("main: QS_SENDER ");
1971		printaddr(&CurEnv->e_from, FALSE);
1972	}
1973	CurEnv->e_to = NULL;
1974	CurrentLA = sm_getla(CurEnv);
1975	GrabTo = FALSE;
1976#if NAMED_BIND
1977	_res.retry = TimeOuts.res_retry[RES_TO_FIRST];
1978	_res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
1979#endif /* NAMED_BIND */
1980	sendall(CurEnv, SM_DEFAULT);
1981
1982	/*
1983	**  All done.
1984	**	Don't send return error message if in VERIFY mode.
1985	*/
1986
1987	finis(TRUE, ExitStat);
1988	/* NOTREACHED */
1989	return ExitStat;
1990}
1991
1992/* ARGSUSED */
1993SIGFUNC_DECL
1994quiesce(sig)
1995	int sig;
1996{
1997	clear_events();
1998	finis(FALSE, EX_OK);
1999}
2000
2001/* ARGSUSED */
2002SIGFUNC_DECL
2003intindebug(sig)
2004	int sig;
2005{
2006	longjmp(TopFrame, 1);
2007	return SIGFUNC_RETURN;
2008}
2009/*
2010**  FINIS -- Clean up and exit.
2011**
2012**	Parameters:
2013**		drop -- whether or not to drop CurEnv envelope
2014**		exitstat -- exit status to use for exit() call
2015**
2016**	Returns:
2017**		never
2018**
2019**	Side Effects:
2020**		exits sendmail
2021*/
2022
2023void
2024finis(drop, exitstat)
2025	bool drop;
2026	volatile int exitstat;
2027{
2028
2029	if (tTd(2, 1))
2030	{
2031		dprintf("\n====finis: stat %d e_id=%s e_flags=",
2032			exitstat,
2033			CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id);
2034		printenvflags(CurEnv);
2035	}
2036	if (tTd(2, 9))
2037		printopenfds(FALSE);
2038
2039	/* if we fail in finis(), just exit */
2040	if (setjmp(TopFrame) != 0)
2041	{
2042		/* failed -- just give it up */
2043		goto forceexit;
2044	}
2045
2046	/* clean up temp files */
2047	CurEnv->e_to = NULL;
2048	if (drop)
2049	{
2050		if (CurEnv->e_id != NULL)
2051			dropenvelope(CurEnv, TRUE);
2052		else
2053			poststats(StatFile);
2054	}
2055
2056	/* flush any cached connections */
2057	mci_flush(TRUE, NULL);
2058
2059	/* close maps belonging to this pid */
2060	closemaps();
2061
2062#if USERDB
2063	/* close UserDatabase */
2064	_udbx_close();
2065#endif /* USERDB */
2066
2067#ifdef XLA
2068	/* clean up extended load average stuff */
2069	xla_all_end();
2070#endif /* XLA */
2071
2072	/* and exit */
2073  forceexit:
2074	if (LogLevel > 78)
2075		sm_syslog(LOG_DEBUG, CurEnv->e_id,
2076			  "finis, pid=%d",
2077			  getpid());
2078	if (exitstat == EX_TEMPFAIL || CurEnv->e_errormode == EM_BERKNET)
2079		exitstat = EX_OK;
2080
2081	sync_queue_time();
2082
2083	/* reset uid for process accounting */
2084	endpwent();
2085	(void) setuid(RealUid);
2086	exit(exitstat);
2087}
2088/*
2089**  INTSIG -- clean up on interrupt
2090**
2091**	This just arranges to exit.  It pessimizes in that it
2092**	may resend a message.
2093**
2094**	Parameters:
2095**		none.
2096**
2097**	Returns:
2098**		none.
2099**
2100**	Side Effects:
2101**		Unlocks the current job.
2102*/
2103
2104/* ARGSUSED */
2105SIGFUNC_DECL
2106intsig(sig)
2107	int sig;
2108{
2109	bool drop = FALSE;
2110
2111	clear_events();
2112	if (sig != 0 && LogLevel > 79)
2113		sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt");
2114	FileName = NULL;
2115	closecontrolsocket(TRUE);
2116#ifdef XLA
2117	xla_all_end();
2118#endif /* XLA */
2119
2120	/* Clean-up on aborted stdin message submission */
2121	if (CurEnv->e_id != NULL &&
2122	    (OpMode == MD_SMTP ||
2123	     OpMode == MD_DELIVER ||
2124	     OpMode == MD_ARPAFTP))
2125	{
2126		register ADDRESS *q;
2127
2128		/* don't return an error indication */
2129		CurEnv->e_to = NULL;
2130		CurEnv->e_flags &= ~EF_FATALERRS;
2131		CurEnv->e_flags |= EF_CLRQUEUE;
2132
2133		/*
2134		**  Spin through the addresses and
2135		**  mark them dead to prevent bounces
2136		*/
2137
2138		for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next)
2139			q->q_state = QS_DONTSEND;
2140
2141		/* and don't try to deliver the partial message either */
2142		if (InChild)
2143			ExitStat = EX_QUIT;
2144
2145		drop = TRUE;
2146	}
2147	else
2148		unlockqueue(CurEnv);
2149
2150	finis(drop, EX_OK);
2151}
2152/*
2153**  INITMACROS -- initialize the macro system
2154**
2155**	This just involves defining some macros that are actually
2156**	used internally as metasymbols to be themselves.
2157**
2158**	Parameters:
2159**		none.
2160**
2161**	Returns:
2162**		none.
2163**
2164**	Side Effects:
2165**		initializes several macros to be themselves.
2166*/
2167
2168struct metamac	MetaMacros[] =
2169{
2170	/* LHS pattern matching characters */
2171	{ '*', MATCHZANY },	{ '+', MATCHANY },	{ '-', MATCHONE },
2172	{ '=', MATCHCLASS },	{ '~', MATCHNCLASS },
2173
2174	/* these are RHS metasymbols */
2175	{ '#', CANONNET },	{ '@', CANONHOST },	{ ':', CANONUSER },
2176	{ '>', CALLSUBR },
2177
2178	/* the conditional operations */
2179	{ '?', CONDIF },	{ '|', CONDELSE },	{ '.', CONDFI },
2180
2181	/* the hostname lookup characters */
2182	{ '[', HOSTBEGIN },	{ ']', HOSTEND },
2183	{ '(', LOOKUPBEGIN },	{ ')', LOOKUPEND },
2184
2185	/* miscellaneous control characters */
2186	{ '&', MACRODEXPAND },
2187
2188	{ '\0', '\0' }
2189};
2190
2191#define MACBINDING(name, mid) \
2192		stab(name, ST_MACRO, ST_ENTER)->s_macro = mid; \
2193		MacroName[mid] = name;
2194
2195void
2196initmacros(e)
2197	register ENVELOPE *e;
2198{
2199	register struct metamac *m;
2200	register int c;
2201	char buf[5];
2202	extern char *MacroName[MAXMACROID + 1];
2203
2204	for (m = MetaMacros; m->metaname != '\0'; m++)
2205	{
2206		buf[0] = m->metaval;
2207		buf[1] = '\0';
2208		define(m->metaname, newstr(buf), e);
2209	}
2210	buf[0] = MATCHREPL;
2211	buf[2] = '\0';
2212	for (c = '0'; c <= '9'; c++)
2213	{
2214		buf[1] = c;
2215		define(c, newstr(buf), e);
2216	}
2217
2218	/* set defaults for some macros sendmail will use later */
2219	define('n', "MAILER-DAEMON", e);
2220
2221	/* set up external names for some internal macros */
2222	MACBINDING("opMode", MID_OPMODE);
2223	/*XXX should probably add equivalents for all short macros here XXX*/
2224}
2225/*
2226**  DISCONNECT -- remove our connection with any foreground process
2227**
2228**	Parameters:
2229**		droplev -- how "deeply" we should drop the line.
2230**			0 -- ignore signals, mail back errors, make sure
2231**			     output goes to stdout.
2232**			1 -- also, make stdout go to /dev/null.
2233**			2 -- also, disconnect from controlling terminal
2234**			     (only for daemon mode).
2235**		e -- the current envelope.
2236**
2237**	Returns:
2238**		none
2239**
2240**	Side Effects:
2241**		Trys to insure that we are immune to vagaries of
2242**		the controlling tty.
2243*/
2244
2245void
2246disconnect(droplev, e)
2247	int droplev;
2248	register ENVELOPE *e;
2249{
2250	int fd;
2251
2252	if (tTd(52, 1))
2253		dprintf("disconnect: In %d Out %d, e=%lx\n",
2254			fileno(InChannel), fileno(OutChannel), (u_long) e);
2255	if (tTd(52, 100))
2256	{
2257		dprintf("don't\n");
2258		return;
2259	}
2260	if (LogLevel > 93)
2261		sm_syslog(LOG_DEBUG, e->e_id,
2262			  "disconnect level %d",
2263			  droplev);
2264
2265	/* be sure we don't get nasty signals */
2266	(void) setsignal(SIGINT, SIG_IGN);
2267	(void) setsignal(SIGQUIT, SIG_IGN);
2268
2269	/* we can't communicate with our caller, so.... */
2270	HoldErrs = TRUE;
2271	CurEnv->e_errormode = EM_MAIL;
2272	Verbose = 0;
2273	DisConnected = TRUE;
2274
2275	/* all input from /dev/null */
2276	if (InChannel != stdin)
2277	{
2278		(void) fclose(InChannel);
2279		InChannel = stdin;
2280	}
2281	if (freopen("/dev/null", "r", stdin) == NULL)
2282		sm_syslog(LOG_ERR, e->e_id,
2283			  "disconnect: freopen(\"/dev/null\") failed: %s",
2284			  errstring(errno));
2285
2286	/* output to the transcript */
2287	if (OutChannel != stdout)
2288	{
2289		(void) fclose(OutChannel);
2290		OutChannel = stdout;
2291	}
2292	if (droplev > 0)
2293	{
2294		fd = open("/dev/null", O_WRONLY, 0666);
2295		if (fd == -1)
2296			sm_syslog(LOG_ERR, e->e_id,
2297				  "disconnect: open(\"/dev/null\") failed: %s",
2298				  errstring(errno));
2299		(void) fflush(stdout);
2300		(void) dup2(fd, STDOUT_FILENO);
2301		(void) dup2(fd, STDERR_FILENO);
2302		(void) close(fd);
2303	}
2304
2305	/* drop our controlling TTY completely if possible */
2306	if (droplev > 1)
2307	{
2308		(void) setsid();
2309		errno = 0;
2310	}
2311
2312#if XDEBUG
2313	checkfd012("disconnect");
2314#endif /* XDEBUG */
2315
2316	if (LogLevel > 71)
2317		sm_syslog(LOG_DEBUG, e->e_id,
2318			  "in background, pid=%d",
2319			  getpid());
2320
2321	errno = 0;
2322}
2323
2324static void
2325obsolete(argv)
2326	char *argv[];
2327{
2328	register char *ap;
2329	register char *op;
2330
2331	while ((ap = *++argv) != NULL)
2332	{
2333		/* Return if "--" or not an option of any form. */
2334		if (ap[0] != '-' || ap[1] == '-')
2335			return;
2336
2337		/* skip over options that do have a value */
2338		op = strchr(OPTIONS, ap[1]);
2339		if (op != NULL && *++op == ':' && ap[2] == '\0' &&
2340		    ap[1] != 'd' &&
2341#if defined(sony_news)
2342		    ap[1] != 'E' && ap[1] != 'J' &&
2343#endif /* defined(sony_news) */
2344		    argv[1] != NULL && argv[1][0] != '-')
2345		{
2346			argv++;
2347			continue;
2348		}
2349
2350		/* If -C doesn't have an argument, use sendmail.cf. */
2351#define	__DEFPATH	"sendmail.cf"
2352		if (ap[1] == 'C' && ap[2] == '\0')
2353		{
2354			*argv = xalloc(sizeof(__DEFPATH) + 2);
2355			(void) snprintf(argv[0], sizeof(__DEFPATH) + 2, "-C%s",
2356					__DEFPATH);
2357		}
2358
2359		/* If -q doesn't have an argument, run it once. */
2360		if (ap[1] == 'q' && ap[2] == '\0')
2361			*argv = "-q0";
2362
2363		/* if -d doesn't have an argument, use 0-99.1 */
2364		if (ap[1] == 'd' && ap[2] == '\0')
2365			*argv = "-d0-99.1";
2366
2367#if defined(sony_news)
2368		/* if -E doesn't have an argument, use -EC */
2369		if (ap[1] == 'E' && ap[2] == '\0')
2370			*argv = "-EC";
2371
2372		/* if -J doesn't have an argument, use -JJ */
2373		if (ap[1] == 'J' && ap[2] == '\0')
2374			*argv = "-JJ";
2375#endif /* defined(sony_news) */
2376	}
2377}
2378/*
2379**  AUTH_WARNING -- specify authorization warning
2380**
2381**	Parameters:
2382**		e -- the current envelope.
2383**		msg -- the text of the message.
2384**		args -- arguments to the message.
2385**
2386**	Returns:
2387**		none.
2388*/
2389
2390void
2391#ifdef __STDC__
2392auth_warning(register ENVELOPE *e, const char *msg, ...)
2393#else /* __STDC__ */
2394auth_warning(e, msg, va_alist)
2395	register ENVELOPE *e;
2396	const char *msg;
2397	va_dcl
2398#endif /* __STDC__ */
2399{
2400	char buf[MAXLINE];
2401	VA_LOCAL_DECL
2402
2403	if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags))
2404	{
2405		register char *p;
2406		static char hostbuf[48];
2407
2408		if (hostbuf[0] == '\0')
2409		{
2410			struct hostent *hp;
2411
2412			hp = myhostname(hostbuf, sizeof hostbuf);
2413#if _FFR_FREEHOSTENT && NETINET6
2414			if (hp != NULL)
2415			{
2416				freehostent(hp);
2417				hp = NULL;
2418			}
2419#endif /* _FFR_FREEHOSTENT && NETINET6 */
2420		}
2421
2422		(void) snprintf(buf, sizeof buf, "%s: ", hostbuf);
2423		p = &buf[strlen(buf)];
2424		VA_START(msg);
2425		vsnprintf(p, SPACELEFT(buf, p), msg, ap);
2426		VA_END;
2427		addheader("X-Authentication-Warning", buf, 0, &e->e_header);
2428		if (LogLevel > 3)
2429			sm_syslog(LOG_INFO, e->e_id,
2430				  "Authentication-Warning: %.400s",
2431				  buf);
2432	}
2433}
2434/*
2435**  GETEXTENV -- get from external environment
2436**
2437**	Parameters:
2438**		envar -- the name of the variable to retrieve
2439**
2440**	Returns:
2441**		The value, if any.
2442*/
2443
2444char *
2445getextenv(envar)
2446	const char *envar;
2447{
2448	char **envp;
2449	int l;
2450
2451	l = strlen(envar);
2452	for (envp = ExternalEnviron; *envp != NULL; envp++)
2453	{
2454		if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=')
2455			return &(*envp)[l + 1];
2456	}
2457	return NULL;
2458}
2459/*
2460**  SETUSERENV -- set an environment in the propogated environment
2461**
2462**	Parameters:
2463**		envar -- the name of the environment variable.
2464**		value -- the value to which it should be set.  If
2465**			null, this is extracted from the incoming
2466**			environment.  If that is not set, the call
2467**			to setuserenv is ignored.
2468**
2469**	Returns:
2470**		none.
2471*/
2472
2473void
2474setuserenv(envar, value)
2475	const char *envar;
2476	const char *value;
2477{
2478	int i, l;
2479	char **evp = UserEnviron;
2480	char *p;
2481
2482	if (value == NULL)
2483	{
2484		value = getextenv(envar);
2485		if (value == NULL)
2486			return;
2487	}
2488
2489	i = strlen(envar) + 1;
2490	l = strlen(value) + i + 1;
2491	p = (char *) xalloc(l);
2492	(void) snprintf(p, l, "%s=%s", envar, value);
2493
2494	while (*evp != NULL && strncmp(*evp, p, i) != 0)
2495		evp++;
2496	if (*evp != NULL)
2497	{
2498		*evp++ = p;
2499	}
2500	else if (evp < &UserEnviron[MAXUSERENVIRON])
2501	{
2502		*evp++ = p;
2503		*evp = NULL;
2504	}
2505
2506	/* make sure it is in our environment as well */
2507	if (putenv(p) < 0)
2508		syserr("setuserenv: putenv(%s) failed", p);
2509}
2510/*
2511**  DUMPSTATE -- dump state
2512**
2513**	For debugging.
2514*/
2515
2516void
2517dumpstate(when)
2518	char *when;
2519{
2520	register char *j = macvalue('j', CurEnv);
2521	int rs;
2522	extern int NextMacroId;
2523
2524	sm_syslog(LOG_DEBUG, CurEnv->e_id,
2525		  "--- dumping state on %s: $j = %s ---",
2526		  when,
2527		  j == NULL ? "<NULL>" : j);
2528	if (j != NULL)
2529	{
2530		if (!wordinclass(j, 'w'))
2531			sm_syslog(LOG_DEBUG, CurEnv->e_id,
2532				  "*** $j not in $=w ***");
2533	}
2534	sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren);
2535	sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)\n",
2536		  NextMacroId, MAXMACROID);
2537	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---");
2538	printopenfds(TRUE);
2539	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---");
2540	mci_dump_all(TRUE);
2541	rs = strtorwset("debug_dumpstate", NULL, ST_FIND);
2542	if (rs > 0)
2543	{
2544		int status;
2545		register char **pvp;
2546		char *pv[MAXATOM + 1];
2547
2548		pv[0] = NULL;
2549		status = rewrite(pv, rs, 0, CurEnv);
2550		sm_syslog(LOG_DEBUG, CurEnv->e_id,
2551			  "--- ruleset debug_dumpstate returns stat %d, pv: ---",
2552			  status);
2553		for (pvp = pv; *pvp != NULL; pvp++)
2554			sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp);
2555	}
2556	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---");
2557}
2558
2559
2560/* ARGSUSED */
2561SIGFUNC_DECL
2562sigusr1(sig)
2563	int sig;
2564{
2565	dumpstate("user signal");
2566	return SIGFUNC_RETURN;
2567}
2568
2569
2570/* ARGSUSED */
2571SIGFUNC_DECL
2572sighup(sig)
2573	int sig;
2574{
2575	int i;
2576	extern int DtableSize;
2577
2578	clear_events();
2579	(void) alarm(0);
2580	if (SaveArgv[0][0] != '/')
2581	{
2582		if (LogLevel > 3)
2583			sm_syslog(LOG_INFO, NOQID,
2584				  "could not restart: need full path");
2585		finis(FALSE, EX_OSFILE);
2586	}
2587	if (LogLevel > 3)
2588		sm_syslog(LOG_INFO, NOQID, "restarting %s %s",
2589			  sig == 0 ? "due to control command" : "on signal",
2590			  SaveArgv[0]);
2591
2592	/* Control socket restart? */
2593	if (sig != 0)
2594		(void) releasesignal(SIGHUP);
2595
2596	closecontrolsocket(TRUE);
2597	if (drop_privileges(TRUE) != EX_OK)
2598	{
2599		if (LogLevel > 0)
2600			sm_syslog(LOG_ALERT, NOQID,
2601				  "could not set[ug]id(%d, %d): %m",
2602				  RunAsUid, RunAsGid);
2603		finis(FALSE, EX_OSERR);
2604	}
2605
2606	/* arrange for all the files to be closed */
2607	for (i = 3; i < DtableSize; i++)
2608	{
2609		register int j;
2610
2611		if ((j = fcntl(i, F_GETFD, 0)) != -1)
2612			(void) fcntl(i, F_SETFD, j | FD_CLOEXEC);
2613	}
2614
2615	(void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron);
2616	if (LogLevel > 0)
2617		sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %m",
2618			  SaveArgv[0]);
2619	finis(FALSE, EX_OSFILE);
2620}
2621/*
2622**  DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option
2623**
2624**	Parameters:
2625**		to_real_uid -- if set, drop to the real uid instead
2626**			of the RunAsUser.
2627**
2628**	Returns:
2629**		EX_OSERR if the setuid failed.
2630**		EX_OK otherwise.
2631*/
2632
2633int
2634drop_privileges(to_real_uid)
2635	bool to_real_uid;
2636{
2637	int rval = EX_OK;
2638	GIDSET_T emptygidset[1];
2639
2640	if (tTd(47, 1))
2641		dprintf("drop_privileges(%d): Real[UG]id=%d:%d, RunAs[UG]id=%d:%d\n",
2642			(int)to_real_uid, (int)RealUid,
2643			(int)RealGid, (int)RunAsUid, (int)RunAsGid);
2644
2645	if (to_real_uid)
2646	{
2647		RunAsUserName = RealUserName;
2648		RunAsUid = RealUid;
2649		RunAsGid = RealGid;
2650	}
2651
2652	/* make sure no one can grab open descriptors for secret files */
2653	endpwent();
2654
2655	/* reset group permissions; these can be set later */
2656	emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid();
2657	if (setgroups(1, emptygidset) == -1 && geteuid() == 0)
2658	{
2659		syserr("drop_privileges: setgroups(1, %d) failed",
2660		       (int)emptygidset[0]);
2661		rval = EX_OSERR;
2662	}
2663
2664	/* reset primary group and user id */
2665	if ((to_real_uid || RunAsGid != 0) && setgid(RunAsGid) < 0)
2666	{
2667		syserr("drop_privileges: setgid(%d) failed", (int)RunAsGid);
2668		rval = EX_OSERR;
2669	}
2670	if (to_real_uid || RunAsUid != 0)
2671	{
2672		uid_t euid = geteuid();
2673
2674		if (setuid(RunAsUid) < 0)
2675		{
2676			syserr("drop_privileges: setuid(%d) failed",
2677			       (int)RunAsUid);
2678			rval = EX_OSERR;
2679		}
2680		else if (RunAsUid != 0 && setuid(0) == 0)
2681		{
2682			/*
2683			**  Believe it or not, the Linux capability model
2684			**  allows a non-root process to override setuid()
2685			**  on a process running as root and prevent that
2686			**  process from dropping privileges.
2687			*/
2688
2689			syserr("drop_privileges: setuid(0) succeeded (when it should not)");
2690			rval = EX_OSERR;
2691		}
2692		else if (RunAsUid != euid && setuid(euid) == 0)
2693		{
2694			/*
2695			**  Some operating systems will keep the saved-uid
2696			**  if a non-root effective-uid calls setuid(real-uid)
2697			**  making it possible to set it back again later.
2698			*/
2699
2700			syserr("drop_privileges: Unable to drop non-root set-user-id privileges");
2701			rval = EX_OSERR;
2702		}
2703	}
2704	if (tTd(47, 5))
2705	{
2706		dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n",
2707			(int)geteuid(), (int)getuid(),
2708			(int)getegid(), (int)getgid());
2709		dprintf("drop_privileges: RunAsUser = %d:%d\n",
2710			(int)RunAsUid, (int)RunAsGid);
2711		if (tTd(47, 10))
2712			dprintf("drop_privileges: rval = %d\n", rval);
2713	}
2714	return rval;
2715}
2716/*
2717**  FILL_FD -- make sure a file descriptor has been properly allocated
2718**
2719**	Used to make sure that stdin/out/err are allocated on startup
2720**
2721**	Parameters:
2722**		fd -- the file descriptor to be filled.
2723**		where -- a string used for logging.  If NULL, this is
2724**			being called on startup, and logging should
2725**			not be done.
2726**
2727**	Returns:
2728**		none
2729*/
2730
2731void
2732fill_fd(fd, where)
2733	int fd;
2734	char *where;
2735{
2736	int i;
2737	struct stat stbuf;
2738
2739	if (fstat(fd, &stbuf) >= 0 || errno != EBADF)
2740		return;
2741
2742	if (where != NULL)
2743		syserr("fill_fd: %s: fd %d not open", where, fd);
2744	else
2745		MissingFds |= 1 << fd;
2746	i = open("/dev/null", fd == 0 ? O_RDONLY : O_WRONLY, 0666);
2747	if (i < 0)
2748	{
2749		syserr("!fill_fd: %s: cannot open /dev/null",
2750			where == NULL ? "startup" : where);
2751	}
2752	if (fd != i)
2753	{
2754		(void) dup2(i, fd);
2755		(void) close(i);
2756	}
2757}
2758/*
2759**  TESTMODELINE -- process a test mode input line
2760**
2761**	Parameters:
2762**		line -- the input line.
2763**		e -- the current environment.
2764**	Syntax:
2765**		#  a comment
2766**		.X process X as a configuration line
2767**		=X dump a configuration item (such as mailers)
2768**		$X dump a macro or class
2769**		/X try an activity
2770**		X  normal process through rule set X
2771*/
2772
2773static void
2774testmodeline(line, e)
2775	char *line;
2776	ENVELOPE *e;
2777{
2778	register char *p;
2779	char *q;
2780	auto char *delimptr;
2781	int mid;
2782	int i, rs;
2783	STAB *map;
2784	char **s;
2785	struct rewrite *rw;
2786	ADDRESS a;
2787	static int tryflags = RF_COPYNONE;
2788	char exbuf[MAXLINE];
2789	extern u_char TokTypeNoC[];
2790
2791#if _FFR_ADDR_TYPE
2792	define(macid("{addr_type}", NULL), "e r", e);
2793#endif /* _FFR_ADDR_TYPE */
2794
2795	/* skip leading spaces */
2796	while (*line == ' ')
2797		line++;
2798
2799	switch (line[0])
2800	{
2801	  case '#':
2802	  case '\0':
2803		return;
2804
2805	  case '?':
2806		help("-bt", e);
2807		return;
2808
2809	  case '.':		/* config-style settings */
2810		switch (line[1])
2811		{
2812		  case 'D':
2813			mid = macid(&line[2], &delimptr);
2814			if (mid == 0)
2815				return;
2816			translate_dollars(delimptr);
2817			define(mid, newstr(delimptr), e);
2818			break;
2819
2820		  case 'C':
2821			if (line[2] == '\0')	/* not to call syserr() */
2822				return;
2823
2824			mid = macid(&line[2], &delimptr);
2825			if (mid == 0)
2826				return;
2827			translate_dollars(delimptr);
2828			expand(delimptr, exbuf, sizeof exbuf, e);
2829			p = exbuf;
2830			while (*p != '\0')
2831			{
2832				register char *wd;
2833				char delim;
2834
2835				while (*p != '\0' && isascii(*p) && isspace(*p))
2836					p++;
2837				wd = p;
2838				while (*p != '\0' && !(isascii(*p) && isspace(*p)))
2839					p++;
2840				delim = *p;
2841				*p = '\0';
2842				if (wd[0] != '\0')
2843					setclass(mid, wd);
2844				*p = delim;
2845			}
2846			break;
2847
2848		  case '\0':
2849			printf("Usage: .[DC]macro value(s)\n");
2850			break;
2851
2852		  default:
2853			printf("Unknown \".\" command %s\n", line);
2854			break;
2855		}
2856		return;
2857
2858	  case '=':		/* config-style settings */
2859		switch (line[1])
2860		{
2861		  case 'S':		/* dump rule set */
2862			rs = strtorwset(&line[2], NULL, ST_FIND);
2863			if (rs < 0)
2864			{
2865				printf("Undefined ruleset %s\n", &line[2]);
2866				return;
2867			}
2868			rw = RewriteRules[rs];
2869			if (rw == NULL)
2870				return;
2871			do
2872			{
2873				(void) putchar('R');
2874				s = rw->r_lhs;
2875				while (*s != NULL)
2876				{
2877					xputs(*s++);
2878					(void) putchar(' ');
2879				}
2880				(void) putchar('\t');
2881				(void) putchar('\t');
2882				s = rw->r_rhs;
2883				while (*s != NULL)
2884				{
2885					xputs(*s++);
2886					(void) putchar(' ');
2887				}
2888				(void) putchar('\n');
2889			} while ((rw = rw->r_next) != NULL);
2890			break;
2891
2892		  case 'M':
2893			for (i = 0; i < MAXMAILERS; i++)
2894			{
2895				if (Mailer[i] != NULL)
2896					printmailer(Mailer[i]);
2897			}
2898			break;
2899
2900		  case '\0':
2901			printf("Usage: =Sruleset or =M\n");
2902			break;
2903
2904		  default:
2905			printf("Unknown \"=\" command %s\n", line);
2906			break;
2907		}
2908		return;
2909
2910	  case '-':		/* set command-line-like opts */
2911		switch (line[1])
2912		{
2913		  case 'd':
2914			tTflag(&line[2]);
2915			break;
2916
2917		  case '\0':
2918			printf("Usage: -d{debug arguments}\n");
2919			break;
2920
2921		  default:
2922			printf("Unknown \"-\" command %s\n", line);
2923			break;
2924		}
2925		return;
2926
2927	  case '$':
2928		if (line[1] == '=')
2929		{
2930			mid = macid(&line[2], NULL);
2931			if (mid != 0)
2932				stabapply(dump_class, mid);
2933			return;
2934		}
2935		mid = macid(&line[1], NULL);
2936		if (mid == 0)
2937			return;
2938		p = macvalue(mid, e);
2939		if (p == NULL)
2940			printf("Undefined\n");
2941		else
2942		{
2943			xputs(p);
2944			printf("\n");
2945		}
2946		return;
2947
2948	  case '/':		/* miscellaneous commands */
2949		p = &line[strlen(line)];
2950		while (--p >= line && isascii(*p) && isspace(*p))
2951			*p = '\0';
2952		p = strpbrk(line, " \t");
2953		if (p != NULL)
2954		{
2955			while (isascii(*p) && isspace(*p))
2956				*p++ = '\0';
2957		}
2958		else
2959			p = "";
2960		if (line[1] == '\0')
2961		{
2962			printf("Usage: /[canon|map|mx|parse|try|tryflags]\n");
2963			return;
2964		}
2965		if (strcasecmp(&line[1], "quit") == 0)
2966		{
2967			CurEnv->e_id = NULL;
2968			finis(TRUE, ExitStat);
2969		}
2970		if (strcasecmp(&line[1], "mx") == 0)
2971		{
2972#if NAMED_BIND
2973			/* look up MX records */
2974			int nmx;
2975			auto int rcode;
2976			char *mxhosts[MAXMXHOSTS + 1];
2977
2978			if (*p == '\0')
2979			{
2980				printf("Usage: /mx address\n");
2981				return;
2982			}
2983			nmx = getmxrr(p, mxhosts, NULL, FALSE, &rcode);
2984			printf("getmxrr(%s) returns %d value(s):\n", p, nmx);
2985			for (i = 0; i < nmx; i++)
2986				printf("\t%s\n", mxhosts[i]);
2987#else /* NAMED_BIND */
2988			printf("No MX code compiled in\n");
2989#endif /* NAMED_BIND */
2990		}
2991		else if (strcasecmp(&line[1], "canon") == 0)
2992		{
2993			char host[MAXHOSTNAMELEN];
2994
2995			if (*p == '\0')
2996			{
2997				printf("Usage: /canon address\n");
2998				return;
2999			}
3000			else if (strlcpy(host, p, sizeof host) >= sizeof host)
3001			{
3002				printf("Name too long\n");
3003				return;
3004			}
3005			(void) getcanonname(host, sizeof host, HasWildcardMX);
3006			printf("getcanonname(%s) returns %s\n", p, host);
3007		}
3008		else if (strcasecmp(&line[1], "map") == 0)
3009		{
3010			auto int rcode = EX_OK;
3011			char *av[2];
3012
3013			if (*p == '\0')
3014			{
3015				printf("Usage: /map mapname key\n");
3016				return;
3017			}
3018			for (q = p; *q != '\0' && !(isascii(*q) && isspace(*q)); q++)
3019				continue;
3020			if (*q == '\0')
3021			{
3022				printf("No key specified\n");
3023				return;
3024			}
3025			*q++ = '\0';
3026			map = stab(p, ST_MAP, ST_FIND);
3027			if (map == NULL)
3028			{
3029				printf("Map named \"%s\" not found\n", p);
3030				return;
3031			}
3032			if (!bitset(MF_OPEN, map->s_map.map_mflags) &&
3033			    !openmap(&(map->s_map)))
3034			{
3035				printf("Map named \"%s\" not open\n", p);
3036				return;
3037			}
3038			printf("map_lookup: %s (%s) ", p, q);
3039			av[0] = q;
3040			av[1] = NULL;
3041			p = (*map->s_map.map_class->map_lookup)
3042					(&map->s_map, q, av, &rcode);
3043			if (p == NULL)
3044				printf("no match (%d)\n", rcode);
3045			else
3046				printf("returns %s (%d)\n", p, rcode);
3047		}
3048		else if (strcasecmp(&line[1], "try") == 0)
3049		{
3050			MAILER *m;
3051			STAB *st;
3052			auto int rcode = EX_OK;
3053
3054			q = strpbrk(p, " \t");
3055			if (q != NULL)
3056			{
3057				while (isascii(*q) && isspace(*q))
3058					*q++ = '\0';
3059			}
3060			if (q == NULL || *q == '\0')
3061			{
3062				printf("Usage: /try mailer address\n");
3063				return;
3064			}
3065			st = stab(p, ST_MAILER, ST_FIND);
3066			if (st == NULL)
3067			{
3068				printf("Unknown mailer %s\n", p);
3069				return;
3070			}
3071			m = st->s_mailer;
3072			printf("Trying %s %s address %s for mailer %s\n",
3073				bitset(RF_HEADERADDR, tryflags) ? "header" : "envelope",
3074				bitset(RF_SENDERADDR, tryflags) ? "sender" : "recipient",
3075				q, p);
3076			p = remotename(q, m, tryflags, &rcode, CurEnv);
3077			printf("Rcode = %d, addr = %s\n",
3078				rcode, p == NULL ? "<NULL>" : p);
3079			e->e_to = NULL;
3080		}
3081		else if (strcasecmp(&line[1], "tryflags") == 0)
3082		{
3083			if (*p == '\0')
3084			{
3085				printf("Usage: /tryflags [Hh|Ee][Ss|Rr]\n");
3086				return;
3087			}
3088			for (; *p != '\0'; p++)
3089			{
3090				switch (*p)
3091				{
3092				  case 'H':
3093				  case 'h':
3094					tryflags |= RF_HEADERADDR;
3095					break;
3096
3097				  case 'E':
3098				  case 'e':
3099					tryflags &= ~RF_HEADERADDR;
3100					break;
3101
3102				  case 'S':
3103				  case 's':
3104					tryflags |= RF_SENDERADDR;
3105					break;
3106
3107				  case 'R':
3108				  case 'r':
3109					tryflags &= ~RF_SENDERADDR;
3110					break;
3111				}
3112			}
3113#if _FFR_ADDR_TYPE
3114			exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e';
3115			exbuf[1] = ' ';
3116			exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r';
3117			exbuf[3] = '\0';
3118			define(macid("{addr_type}", NULL), newstr(exbuf), e);
3119#endif /* _FFR_ADDR_TYPE */
3120		}
3121		else if (strcasecmp(&line[1], "parse") == 0)
3122		{
3123			if (*p == '\0')
3124			{
3125				printf("Usage: /parse address\n");
3126				return;
3127			}
3128			q = crackaddr(p);
3129			printf("Cracked address = ");
3130			xputs(q);
3131			printf("\nParsing %s %s address\n",
3132				bitset(RF_HEADERADDR, tryflags) ? "header" : "envelope",
3133				bitset(RF_SENDERADDR, tryflags) ? "sender" : "recipient");
3134			if (parseaddr(p, &a, tryflags, '\0', NULL, e) == NULL)
3135				printf("Cannot parse\n");
3136			else if (a.q_host != NULL && a.q_host[0] != '\0')
3137				printf("mailer %s, host %s, user %s\n",
3138					a.q_mailer->m_name, a.q_host, a.q_user);
3139			else
3140				printf("mailer %s, user %s\n",
3141					a.q_mailer->m_name, a.q_user);
3142			e->e_to = NULL;
3143		}
3144		else
3145		{
3146			printf("Unknown \"/\" command %s\n", line);
3147		}
3148		return;
3149	}
3150
3151	for (p = line; isascii(*p) && isspace(*p); p++)
3152		continue;
3153	q = p;
3154	while (*p != '\0' && !(isascii(*p) && isspace(*p)))
3155		p++;
3156	if (*p == '\0')
3157	{
3158		printf("No address!\n");
3159		return;
3160	}
3161	*p = '\0';
3162	if (invalidaddr(p + 1, NULL))
3163		return;
3164	do
3165	{
3166		register char **pvp;
3167		char pvpbuf[PSBUFSIZE];
3168
3169		pvp = prescan(++p, ',', pvpbuf, sizeof pvpbuf,
3170			      &delimptr, ConfigLevel >= 9 ? TokTypeNoC : NULL);
3171		if (pvp == NULL)
3172			continue;
3173		p = q;
3174		while (*p != '\0')
3175		{
3176			int status;
3177
3178			rs = strtorwset(p, NULL, ST_FIND);
3179			if (rs < 0)
3180			{
3181				printf("Undefined ruleset %s\n", p);
3182				break;
3183			}
3184			status = rewrite(pvp, rs, 0, e);
3185			if (status != EX_OK)
3186				printf("== Ruleset %s (%d) status %d\n",
3187					p, rs, status);
3188			while (*p != '\0' && *p++ != ',')
3189				continue;
3190		}
3191	} while (*(p = delimptr) != '\0');
3192}
3193
3194static void
3195dump_class(s, id)
3196	register STAB *s;
3197	int id;
3198{
3199	if (s->s_type != ST_CLASS)
3200		return;
3201	if (bitnset(bitidx(id), s->s_class))
3202		printf("%s\n", s->s_name);
3203}
3204