main.c revision 71345
1/* 2 * Copyright (c) 1998-2000 Sendmail, Inc. and its suppliers. 3 * All rights reserved. 4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5 * Copyright (c) 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * By using this file, you agree to the terms and conditions set 9 * forth in the LICENSE file which can be found at the top level of 10 * the sendmail distribution. 11 * 12 */ 13 14#ifndef lint 15static char copyright[] = 16"@(#) Copyright (c) 1998-2000 Sendmail, Inc. and its suppliers.\n\ 17 All rights reserved.\n\ 18 Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.\n\ 19 Copyright (c) 1988, 1993\n\ 20 The Regents of the University of California. All rights reserved.\n"; 21#endif /* ! lint */ 22 23#ifndef lint 24static char id[] = "@(#)$Id: main.c,v 8.485.4.38 2000/12/19 02:50:33 gshapiro Exp $"; 25#endif /* ! lint */ 26 27#define _DEFINE 28 29#include <sendmail.h> 30 31 32#if NETINET || NETINET6 33# include <arpa/inet.h> 34#endif /* NETINET || NETINET6 */ 35 36static void dump_class __P((STAB *, int)); 37static void obsolete __P((char **)); 38static void testmodeline __P((char *, ENVELOPE *)); 39 40/* 41** SENDMAIL -- Post mail to a set of destinations. 42** 43** This is the basic mail router. All user mail programs should 44** call this routine to actually deliver mail. Sendmail in 45** turn calls a bunch of mail servers that do the real work of 46** delivering the mail. 47** 48** Sendmail is driven by settings read in from /etc/mail/sendmail.cf 49** (read by readcf.c). 50** 51** Usage: 52** /usr/lib/sendmail [flags] addr ... 53** 54** See the associated documentation for details. 55** 56** Author: 57** Eric Allman, UCB/INGRES (until 10/81). 58** Britton-Lee, Inc., purveyors of fine 59** database computers (11/81 - 10/88). 60** International Computer Science Institute 61** (11/88 - 9/89). 62** UCB/Mammoth Project (10/89 - 7/95). 63** InReference, Inc. (8/95 - 1/97). 64** Sendmail, Inc. (1/98 - present). 65** The support of the my employers is gratefully acknowledged. 66** Few of them (Britton-Lee in particular) have had 67** anything to gain from my involvement in this project. 68*/ 69 70 71int NextMailer; /* "free" index into Mailer struct */ 72char *FullName; /* sender's full name */ 73ENVELOPE BlankEnvelope; /* a "blank" envelope */ 74static ENVELOPE MainEnvelope; /* the envelope around the basic letter */ 75ADDRESS NullAddress = /* a null address */ 76 { "", "", NULL, "" }; 77char *CommandLineArgs; /* command line args for pid file */ 78bool Warn_Q_option = FALSE; /* warn about Q option use */ 79char **SaveArgv; /* argument vector for re-execing */ 80static int MissingFds = 0; /* bit map of fds missing on startup */ 81 82#ifdef NGROUPS_MAX 83GIDSET_T InitialGidSet[NGROUPS_MAX]; 84#endif /* NGROUPS_MAX */ 85 86#if DAEMON && !SMTP 87ERROR %%%% Cannot have DAEMON mode without SMTP %%%% ERROR 88#endif /* DAEMON && !SMTP */ 89#if SMTP && !QUEUE 90ERROR %%%% Cannot have SMTP mode without QUEUE %%%% ERROR 91#endif /* SMTP && !QUEUE */ 92 93#define MAXCONFIGLEVEL 9 /* highest config version level known */ 94 95#if SASL 96static sasl_callback_t srvcallbacks[] = 97{ 98 { SASL_CB_VERIFYFILE, &safesaslfile, NULL }, 99 { SASL_CB_PROXY_POLICY, &proxy_policy, NULL }, 100 { SASL_CB_LIST_END, NULL, NULL } 101}; 102 103#endif /* SASL */ 104 105int SubmitMode; 106 107int 108main(argc, argv, envp) 109 int argc; 110 char **argv; 111 char **envp; 112{ 113 register char *p; 114 char **av; 115 extern char Version[]; 116 char *ep, *from; 117 STAB *st; 118 register int i; 119 int j; 120 int dp; 121 bool safecf = TRUE; 122 BITMAP256 *p_flags = NULL; /* daemon flags */ 123 bool warn_C_flag = FALSE; 124 bool auth = TRUE; /* whether to set e_auth_param */ 125 char warn_f_flag = '\0'; 126 bool run_in_foreground = FALSE; /* -bD mode */ 127 static bool reenter = FALSE; 128 struct passwd *pw; 129 struct hostent *hp; 130 char *nullserver = NULL; 131 char *authinfo = NULL; 132 char *sysloglabel = NULL; /* label for syslog */ 133 bool forged; 134 struct stat traf_st; /* for TrafficLog FIFO check */ 135 char jbuf[MAXHOSTNAMELEN]; /* holds MyHostName */ 136 static char rnamebuf[MAXNAME]; /* holds RealUserName */ 137 char *emptyenviron[1]; 138# if STARTTLS 139 bool tls_ok; 140# endif /* STARTTLS */ 141 QUEUE_CHAR *new; 142 extern int DtableSize; 143 extern int optind; 144 extern int opterr; 145 extern char *optarg; 146 extern char **environ; 147 148 /* 149 ** Check to see if we reentered. 150 ** This would normally happen if e_putheader or e_putbody 151 ** were NULL when invoked. 152 */ 153 154 if (reenter) 155 { 156 syserr("main: reentered!"); 157 abort(); 158 } 159 reenter = TRUE; 160 161 /* avoid null pointer dereferences */ 162 TermEscape.te_rv_on = TermEscape.te_rv_off = ""; 163 164 /* do machine-dependent initializations */ 165 init_md(argc, argv); 166 167 168 /* in 4.4BSD, the table can be huge; impose a reasonable limit */ 169 DtableSize = getdtsize(); 170 if (DtableSize > 256) 171 DtableSize = 256; 172 173 /* 174 ** Be sure we have enough file descriptors. 175 ** But also be sure that 0, 1, & 2 are open. 176 */ 177 178 fill_fd(STDIN_FILENO, NULL); 179 fill_fd(STDOUT_FILENO, NULL); 180 fill_fd(STDERR_FILENO, NULL); 181 182 i = DtableSize; 183 while (--i > 0) 184 { 185 if (i != STDIN_FILENO && i != STDOUT_FILENO && i != STDERR_FILENO) 186 (void) close(i); 187 } 188 errno = 0; 189 190#if LOG 191# ifdef LOG_MAIL 192 openlog("sendmail", LOG_PID, LOG_MAIL); 193# else /* LOG_MAIL */ 194 openlog("sendmail", LOG_PID); 195# endif /* LOG_MAIL */ 196#endif /* LOG */ 197 198 if (MissingFds != 0) 199 { 200 char mbuf[MAXLINE]; 201 202 mbuf[0] = '\0'; 203 if (bitset(1 << STDIN_FILENO, MissingFds)) 204 (void) strlcat(mbuf, ", stdin", sizeof mbuf); 205 if (bitset(1 << STDOUT_FILENO, MissingFds)) 206 (void) strlcat(mbuf, ", stdout", sizeof mbuf); 207 if (bitset(1 << STDERR_FILENO, MissingFds)) 208 (void) strlcat(mbuf, ", stderr", sizeof mbuf); 209 syserr("File descriptors missing on startup: %s", &mbuf[2]); 210 } 211 212 /* reset status from syserr() calls for missing file descriptors */ 213 Errors = 0; 214 ExitStat = EX_OK; 215 216 SubmitMode = SUBMIT_UNKNOWN; 217#if XDEBUG 218 checkfd012("after openlog"); 219#endif /* XDEBUG */ 220 221 /* 222 ** Seed the random number generator. 223 ** Used for queue file names, picking a queue directory, and 224 ** MX randomization. 225 */ 226 227 seed_random(); 228 229 tTsetup(tTdvect, sizeof tTdvect, "0-99.1"); 230 231#ifdef NGROUPS_MAX 232 /* save initial group set for future checks */ 233 i = getgroups(NGROUPS_MAX, InitialGidSet); 234 if (i == 0) 235 InitialGidSet[0] = (GID_T) -1; 236 while (i < NGROUPS_MAX) 237 InitialGidSet[i++] = InitialGidSet[0]; 238#endif /* NGROUPS_MAX */ 239 240 /* drop group id privileges (RunAsUser not yet set) */ 241 dp = drop_privileges(FALSE); 242 setstat(dp); 243 244# ifdef SIGUSR1 245 /* arrange to dump state on user-1 signal */ 246 (void) setsignal(SIGUSR1, sigusr1); 247# endif /* SIGUSR1 */ 248 249 /* initialize for setproctitle */ 250 initsetproctitle(argc, argv, envp); 251 252 /* Handle any non-getoptable constructions. */ 253 obsolete(argv); 254 255 /* 256 ** Do a quick prescan of the argument list. 257 */ 258 259 260#if defined(__osf__) || defined(_AIX3) 261# define OPTIONS "B:b:C:cd:e:F:f:Gh:IiL:M:mN:nO:o:p:q:R:r:sTtUV:vX:x" 262#endif /* defined(__osf__) || defined(_AIX3) */ 263#if defined(sony_news) 264# define OPTIONS "B:b:C:cd:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:q:R:r:sTtUV:vX:" 265#endif /* defined(sony_news) */ 266#ifndef OPTIONS 267# define OPTIONS "B:b:C:cd:e:F:f:Gh:IiL:M:mN:nO:o:p:q:R:r:sTtUV:vX:" 268#endif /* ! OPTIONS */ 269 opterr = 0; 270 while ((j = getopt(argc, argv, OPTIONS)) != -1) 271 { 272 switch (j) 273 { 274 case 'd': 275 /* hack attack -- see if should use ANSI mode */ 276 if (strcmp(optarg, "ANSI") == 0) 277 { 278 TermEscape.te_rv_on = "\033[7m"; 279 TermEscape.te_rv_off = "\033[0m"; 280 break; 281 } 282 tTflag(optarg); 283 setbuf(stdout, (char *) NULL); 284 break; 285 286 case 'G': /* relay (gateway) submission */ 287 SubmitMode |= SUBMIT_MTA; 288 break; 289 290 case 'L': 291 j = min(strlen(optarg), 24) + 1; 292 sysloglabel = xalloc(j); 293 (void) strlcpy(sysloglabel, optarg, j); 294 break; 295 296 case 'U': /* initial (user) submission */ 297 SubmitMode |= SUBMIT_MSA; 298 break; 299 } 300 } 301 opterr = 1; 302 303 if (sysloglabel != NULL) 304 { 305#if LOG 306 closelog(); 307# ifdef LOG_MAIL 308 openlog(sysloglabel, LOG_PID, LOG_MAIL); 309# else /* LOG_MAIL */ 310 openlog(sysloglabel, LOG_PID); 311# endif /* LOG_MAIL */ 312#endif /* LOG */ 313 } 314 315 /* set up the blank envelope */ 316 BlankEnvelope.e_puthdr = putheader; 317 BlankEnvelope.e_putbody = putbody; 318 BlankEnvelope.e_xfp = NULL; 319 STRUCTCOPY(NullAddress, BlankEnvelope.e_from); 320 CurEnv = &BlankEnvelope; 321 STRUCTCOPY(NullAddress, MainEnvelope.e_from); 322 323 /* 324 ** Set default values for variables. 325 ** These cannot be in initialized data space. 326 */ 327 328 setdefaults(&BlankEnvelope); 329 330 RealUid = getuid(); 331 RealGid = getgid(); 332 333 pw = sm_getpwuid(RealUid); 334 if (pw != NULL) 335 (void) snprintf(rnamebuf, sizeof rnamebuf, "%s", pw->pw_name); 336 else 337 (void) snprintf(rnamebuf, sizeof rnamebuf, "Unknown UID %d", 338 (int) RealUid); 339 340 RealUserName = rnamebuf; 341 342 if (tTd(0, 101)) 343 { 344 dprintf("Version %s\n", Version); 345 finis(FALSE, EX_OK); 346 } 347 348 /* 349 ** if running non-setuid binary as non-root, pretend 350 ** we are the RunAsUid 351 */ 352 if (RealUid != 0 && geteuid() == RealUid) 353 { 354 if (tTd(47, 1)) 355 dprintf("Non-setuid binary: RunAsUid = RealUid = %d\n", 356 (int)RealUid); 357 RunAsUid = RealUid; 358 } 359 else if (geteuid() != 0) 360 RunAsUid = geteuid(); 361 362 if (RealUid != 0 && getegid() == RealGid) 363 RunAsGid = RealGid; 364 365 if (tTd(47, 5)) 366 { 367 dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n", 368 (int)geteuid(), (int)getuid(), 369 (int)getegid(), (int)getgid()); 370 dprintf("main: RunAsUser = %d:%d\n", 371 (int)RunAsUid, (int)RunAsGid); 372 } 373 374 /* save command line arguments */ 375 j = 0; 376 for (av = argv; *av != NULL; ) 377 j += strlen(*av++) + 1; 378 SaveArgv = (char **) xalloc(sizeof (char *) * (argc + 1)); 379 CommandLineArgs = xalloc(j); 380 p = CommandLineArgs; 381 for (av = argv, i = 0; *av != NULL; ) 382 { 383 int h; 384 385 SaveArgv[i++] = newstr(*av); 386 if (av != argv) 387 *p++ = ' '; 388 (void) strlcpy(p, *av++, j); 389 h = strlen(p); 390 p += h; 391 j -= h + 1; 392 } 393 SaveArgv[i] = NULL; 394 395 if (tTd(0, 1)) 396 { 397 int ll; 398 extern char *CompileOptions[]; 399 400 dprintf("Version %s\n Compiled with:", Version); 401 av = CompileOptions; 402 ll = 7; 403 while (*av != NULL) 404 { 405 if (ll + strlen(*av) > 63) 406 { 407 dprintf("\n"); 408 ll = 0; 409 } 410 if (ll == 0) 411 dprintf("\t\t"); 412 else 413 dprintf(" "); 414 dprintf("%s", *av); 415 ll += strlen(*av++) + 1; 416 } 417 dprintf("\n"); 418 } 419 if (tTd(0, 10)) 420 { 421 int ll; 422 extern char *OsCompileOptions[]; 423 424 dprintf(" OS Defines:"); 425 av = OsCompileOptions; 426 ll = 7; 427 while (*av != NULL) 428 { 429 if (ll + strlen(*av) > 63) 430 { 431 dprintf("\n"); 432 ll = 0; 433 } 434 if (ll == 0) 435 dprintf("\t\t"); 436 else 437 dprintf(" "); 438 dprintf("%s", *av); 439 ll += strlen(*av++) + 1; 440 } 441 dprintf("\n"); 442#ifdef _PATH_UNIX 443 dprintf("Kernel symbols:\t%s\n", _PATH_UNIX); 444#endif /* _PATH_UNIX */ 445 dprintf(" Def Conf file:\t%s\n", getcfname()); 446 dprintf(" Def Pid file:\t%s\n", PidFile); 447 } 448 449 InChannel = stdin; 450 OutChannel = stdout; 451 452 /* clear sendmail's environment */ 453 ExternalEnviron = environ; 454 emptyenviron[0] = NULL; 455 environ = emptyenviron; 456 457 /* 458 ** restore any original TZ setting until TimeZoneSpec has been 459 ** determined - or early log messages may get bogus time stamps 460 */ 461 if ((p = getextenv("TZ")) != NULL) 462 { 463 char *tz; 464 int tzlen; 465 466 tzlen = strlen(p) + 4; 467 tz = xalloc(tzlen); 468 (void) snprintf(tz, tzlen, "TZ=%s", p); 469 (void) putenv(tz); 470 } 471 472 /* prime the child environment */ 473 setuserenv("AGENT", "sendmail"); 474 475 if (setsignal(SIGINT, SIG_IGN) != SIG_IGN) 476 (void) setsignal(SIGINT, intsig); 477 (void) setsignal(SIGTERM, intsig); 478 (void) setsignal(SIGPIPE, SIG_IGN); 479 OldUmask = umask(022); 480 OpMode = MD_DELIVER; 481 FullName = getextenv("NAME"); 482 483 /* 484 ** Initialize name server if it is going to be used. 485 */ 486 487#if NAMED_BIND 488 if (!bitset(RES_INIT, _res.options)) 489 (void) res_init(); 490 491 /* 492 ** hack to avoid crashes when debugging for the resolver is 493 ** turned on and sfio is used 494 */ 495 if (tTd(8, 8)) 496# if !SFIO || SFIO_STDIO_COMPAT 497 _res.options |= RES_DEBUG; 498# else /* !SFIO || SFIO_STDIO_COMPAT */ 499 dprintf("RES_DEBUG not available due to SFIO\n"); 500# endif /* !SFIO || SFIO_STDIO_COMPAT */ 501 else 502 _res.options &= ~RES_DEBUG; 503# ifdef RES_NOALIASES 504 _res.options |= RES_NOALIASES; 505# endif /* RES_NOALIASES */ 506 TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry; 507 TimeOuts.res_retry[RES_TO_FIRST] = _res.retry; 508 TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry; 509 TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans; 510 TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans; 511 TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans; 512#endif /* NAMED_BIND */ 513 514 errno = 0; 515 from = NULL; 516 517 /* initialize some macros, etc. */ 518 initmacros(CurEnv); 519 init_vendor_macros(CurEnv); 520 521 /* version */ 522 define('v', Version, CurEnv); 523 524 /* hostname */ 525 hp = myhostname(jbuf, sizeof jbuf); 526 if (jbuf[0] != '\0') 527 { 528 struct utsname utsname; 529 530 if (tTd(0, 4)) 531 dprintf("canonical name: %s\n", jbuf); 532 define('w', newstr(jbuf), CurEnv); /* must be new string */ 533 define('j', newstr(jbuf), CurEnv); 534 setclass('w', jbuf); 535 536 p = strchr(jbuf, '.'); 537 if (p != NULL) 538 { 539 if (p[1] != '\0') 540 { 541 define('m', newstr(&p[1]), CurEnv); 542 } 543 while (p != NULL && strchr(&p[1], '.') != NULL) 544 { 545 *p = '\0'; 546 if (tTd(0, 4)) 547 dprintf("\ta.k.a.: %s\n", jbuf); 548 setclass('w', jbuf); 549 *p++ = '.'; 550 p = strchr(p, '.'); 551 } 552 } 553 554 if (uname(&utsname) >= 0) 555 p = utsname.nodename; 556 else 557 { 558 if (tTd(0, 22)) 559 dprintf("uname failed (%s)\n", 560 errstring(errno)); 561 makelower(jbuf); 562 p = jbuf; 563 } 564 if (tTd(0, 4)) 565 dprintf(" UUCP nodename: %s\n", p); 566 p = newstr(p); 567 define('k', p, CurEnv); 568 setclass('k', p); 569 setclass('w', p); 570 } 571 if (hp != NULL) 572 { 573 for (av = hp->h_aliases; av != NULL && *av != NULL; av++) 574 { 575 if (tTd(0, 4)) 576 dprintf("\ta.k.a.: %s\n", *av); 577 setclass('w', *av); 578 } 579#if NETINET || NETINET6 580 for (i = 0; hp->h_addr_list[i] != NULL; i++) 581 { 582# if NETINET6 583 char *addr; 584 char buf6[INET6_ADDRSTRLEN]; 585 struct in6_addr ia6; 586# endif /* NETINET6 */ 587# if NETINET 588 struct in_addr ia; 589# endif /* NETINET */ 590 char ipbuf[103]; 591 592 ipbuf[0] = '\0'; 593 switch (hp->h_addrtype) 594 { 595# if NETINET 596 case AF_INET: 597 if (hp->h_length != INADDRSZ) 598 break; 599 600 memmove(&ia, hp->h_addr_list[i], INADDRSZ); 601 (void) snprintf(ipbuf, sizeof ipbuf, 602 "[%.100s]", inet_ntoa(ia)); 603 break; 604# endif /* NETINET */ 605 606# if NETINET6 607 case AF_INET6: 608 if (hp->h_length != IN6ADDRSZ) 609 break; 610 611 memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ); 612 addr = anynet_ntop(&ia6, buf6, sizeof buf6); 613 if (addr != NULL) 614 (void) snprintf(ipbuf, sizeof ipbuf, 615 "[%.100s]", addr); 616 break; 617# endif /* NETINET6 */ 618 } 619 if (ipbuf[0] == '\0') 620 break; 621 622 if (tTd(0, 4)) 623 dprintf("\ta.k.a.: %s\n", ipbuf); 624 setclass('w', ipbuf); 625 } 626#endif /* NETINET || NETINET6 */ 627#if _FFR_FREEHOSTENT && NETINET6 628 freehostent(hp); 629 hp = NULL; 630#endif /* _FFR_FREEHOSTENT && NETINET6 */ 631 } 632 633 /* current time */ 634 define('b', arpadate((char *) NULL), CurEnv); 635 /* current load average */ 636 CurrentLA = sm_getla(CurEnv); 637 638 QueueLimitRecipient = (QUEUE_CHAR *) NULL; 639 QueueLimitSender = (QUEUE_CHAR *) NULL; 640 QueueLimitId = (QUEUE_CHAR *) NULL; 641 642 /* 643 ** Crack argv. 644 */ 645 646 av = argv; 647 p = strrchr(*av, '/'); 648 if (p++ == NULL) 649 p = *av; 650 if (strcmp(p, "newaliases") == 0) 651 OpMode = MD_INITALIAS; 652 else if (strcmp(p, "mailq") == 0) 653 OpMode = MD_PRINT; 654 else if (strcmp(p, "smtpd") == 0) 655 OpMode = MD_DAEMON; 656 else if (strcmp(p, "hoststat") == 0) 657 OpMode = MD_HOSTSTAT; 658 else if (strcmp(p, "purgestat") == 0) 659 OpMode = MD_PURGESTAT; 660 661 optind = 1; 662 while ((j = getopt(argc, argv, OPTIONS)) != -1) 663 { 664 switch (j) 665 { 666 case 'b': /* operations mode */ 667 switch (j = *optarg) 668 { 669 case MD_DAEMON: 670 case MD_FGDAEMON: 671#if !DAEMON 672 usrerr("Daemon mode not implemented"); 673 ExitStat = EX_USAGE; 674 break; 675#endif /* !DAEMON */ 676 case MD_SMTP: 677#if !SMTP 678 usrerr("I don't speak SMTP"); 679 ExitStat = EX_USAGE; 680 break; 681#endif /* !SMTP */ 682 683 case MD_INITALIAS: 684 case MD_DELIVER: 685 case MD_VERIFY: 686 case MD_TEST: 687 case MD_PRINT: 688 case MD_HOSTSTAT: 689 case MD_PURGESTAT: 690 case MD_ARPAFTP: 691 OpMode = j; 692 break; 693 694 case MD_FREEZE: 695 usrerr("Frozen configurations unsupported"); 696 ExitStat = EX_USAGE; 697 break; 698 699 default: 700 usrerr("Invalid operation mode %c", j); 701 ExitStat = EX_USAGE; 702 break; 703 } 704 break; 705 706 case 'B': /* body type */ 707 CurEnv->e_bodytype = newstr(optarg); 708 break; 709 710 case 'C': /* select configuration file (already done) */ 711 if (RealUid != 0) 712 warn_C_flag = TRUE; 713 ConfFile = newstr(optarg); 714 dp = drop_privileges(TRUE); 715 setstat(dp); 716 safecf = FALSE; 717 break; 718 719 case 'd': /* debugging -- already done */ 720 break; 721 722 case 'f': /* from address */ 723 case 'r': /* obsolete -f flag */ 724 if (from != NULL) 725 { 726 usrerr("More than one \"from\" person"); 727 ExitStat = EX_USAGE; 728 break; 729 } 730 from = newstr(denlstring(optarg, TRUE, TRUE)); 731 if (strcmp(RealUserName, from) != 0) 732 warn_f_flag = j; 733 break; 734 735 case 'F': /* set full name */ 736 FullName = newstr(optarg); 737 break; 738 739 case 'G': /* relay (gateway) submission */ 740 /* already set */ 741 break; 742 743 case 'h': /* hop count */ 744 CurEnv->e_hopcount = (short) strtol(optarg, &ep, 10); 745 if (*ep) 746 { 747 usrerr("Bad hop count (%s)", optarg); 748 ExitStat = EX_USAGE; 749 } 750 break; 751 752 case 'L': /* program label */ 753 /* already set */ 754 break; 755 756 case 'n': /* don't alias */ 757 NoAlias = TRUE; 758 break; 759 760 case 'N': /* delivery status notifications */ 761 DefaultNotify |= QHASNOTIFY; 762 define(macid("{dsn_notify}", NULL), 763 newstr(optarg), CurEnv); 764 if (strcasecmp(optarg, "never") == 0) 765 break; 766 for (p = optarg; p != NULL; optarg = p) 767 { 768 p = strchr(p, ','); 769 if (p != NULL) 770 *p++ = '\0'; 771 if (strcasecmp(optarg, "success") == 0) 772 DefaultNotify |= QPINGONSUCCESS; 773 else if (strcasecmp(optarg, "failure") == 0) 774 DefaultNotify |= QPINGONFAILURE; 775 else if (strcasecmp(optarg, "delay") == 0) 776 DefaultNotify |= QPINGONDELAY; 777 else 778 { 779 usrerr("Invalid -N argument"); 780 ExitStat = EX_USAGE; 781 } 782 } 783 break; 784 785 case 'o': /* set option */ 786 setoption(*optarg, optarg + 1, FALSE, TRUE, CurEnv); 787 break; 788 789 case 'O': /* set option (long form) */ 790 setoption(' ', optarg, FALSE, TRUE, CurEnv); 791 break; 792 793 case 'p': /* set protocol */ 794 p = strchr(optarg, ':'); 795 if (p != NULL) 796 { 797 *p++ = '\0'; 798 if (*p != '\0') 799 { 800 ep = xalloc(strlen(p) + 1); 801 cleanstrcpy(ep, p, MAXNAME); 802 define('s', ep, CurEnv); 803 } 804 } 805 if (*optarg != '\0') 806 { 807 ep = xalloc(strlen(optarg) + 1); 808 cleanstrcpy(ep, optarg, MAXNAME); 809 define('r', ep, CurEnv); 810 } 811 break; 812 813 case 'q': /* run queue files at intervals */ 814#if QUEUE 815 /* sanity check */ 816 if (OpMode != MD_DELIVER && 817 OpMode != MD_DAEMON && 818 OpMode != MD_FGDAEMON && 819 OpMode != MD_PRINT && 820 OpMode != MD_QUEUERUN) 821 { 822 usrerr("Can not use -q with -b%c", OpMode); 823 ExitStat = EX_USAGE; 824 break; 825 } 826 827 /* don't override -bd, -bD or -bp */ 828 if (OpMode == MD_DELIVER) 829 OpMode = MD_QUEUERUN; 830 831 FullName = NULL; 832 833 switch (optarg[0]) 834 { 835 case 'I': 836 new = (QUEUE_CHAR *) xalloc(sizeof *new); 837 new->queue_match = newstr(&optarg[1]); 838 new->queue_next = QueueLimitId; 839 QueueLimitId = new; 840 break; 841 842 case 'R': 843 new = (QUEUE_CHAR *) xalloc(sizeof *new); 844 new->queue_match = newstr(&optarg[1]); 845 new->queue_next = QueueLimitRecipient; 846 QueueLimitRecipient = new; 847 break; 848 849 case 'S': 850 new = (QUEUE_CHAR *) xalloc(sizeof *new); 851 new->queue_match = newstr(&optarg[1]); 852 new->queue_next = QueueLimitSender; 853 QueueLimitSender = new; 854 break; 855 856 default: 857 i = Errors; 858 QueueIntvl = convtime(optarg, 'm'); 859 860 /* check for bad conversion */ 861 if (i < Errors) 862 ExitStat = EX_USAGE; 863 break; 864 } 865#else /* QUEUE */ 866 usrerr("I don't know about queues"); 867 ExitStat = EX_USAGE; 868#endif /* QUEUE */ 869 break; 870 871 case 'R': /* DSN RET: what to return */ 872 if (bitset(EF_RET_PARAM, CurEnv->e_flags)) 873 { 874 usrerr("Duplicate -R flag"); 875 ExitStat = EX_USAGE; 876 break; 877 } 878 CurEnv->e_flags |= EF_RET_PARAM; 879 if (strcasecmp(optarg, "hdrs") == 0) 880 CurEnv->e_flags |= EF_NO_BODY_RETN; 881 else if (strcasecmp(optarg, "full") != 0) 882 { 883 usrerr("Invalid -R value"); 884 ExitStat = EX_USAGE; 885 } 886 define(macid("{dsn_ret}", NULL), 887 newstr(optarg), CurEnv); 888 break; 889 890 case 't': /* read recipients from message */ 891 GrabTo = TRUE; 892 break; 893 894 case 'U': /* initial (user) submission */ 895 /* already set */ 896 break; 897 898 case 'V': /* DSN ENVID: set "original" envelope id */ 899 if (!xtextok(optarg)) 900 { 901 usrerr("Invalid syntax in -V flag"); 902 ExitStat = EX_USAGE; 903 } 904 else 905 { 906 CurEnv->e_envid = newstr(optarg); 907 define(macid("{dsn_envid}", NULL), 908 newstr(optarg), CurEnv); 909 } 910 break; 911 912 case 'X': /* traffic log file */ 913 dp = drop_privileges(TRUE); 914 setstat(dp); 915 if (stat(optarg, &traf_st) == 0 && 916 S_ISFIFO(traf_st.st_mode)) 917 TrafficLogFile = fopen(optarg, "w"); 918 else 919 TrafficLogFile = fopen(optarg, "a"); 920 if (TrafficLogFile == NULL) 921 { 922 syserr("cannot open %s", optarg); 923 ExitStat = EX_CANTCREAT; 924 break; 925 } 926#if HASSETVBUF 927 (void) setvbuf(TrafficLogFile, NULL, _IOLBF, 0); 928#else /* HASSETVBUF */ 929 (void) setlinebuf(TrafficLogFile); 930#endif /* HASSETVBUF */ 931 break; 932 933 /* compatibility flags */ 934 case 'c': /* connect to non-local mailers */ 935 case 'i': /* don't let dot stop me */ 936 case 'm': /* send to me too */ 937 case 'T': /* set timeout interval */ 938 case 'v': /* give blow-by-blow description */ 939 setoption(j, "T", FALSE, TRUE, CurEnv); 940 break; 941 942 case 'e': /* error message disposition */ 943 case 'M': /* define macro */ 944 setoption(j, optarg, FALSE, TRUE, CurEnv); 945 break; 946 947 case 's': /* save From lines in headers */ 948 setoption('f', "T", FALSE, TRUE, CurEnv); 949 break; 950 951#ifdef DBM 952 case 'I': /* initialize alias DBM file */ 953 OpMode = MD_INITALIAS; 954 break; 955#endif /* DBM */ 956 957#if defined(__osf__) || defined(_AIX3) 958 case 'x': /* random flag that OSF/1 & AIX mailx passes */ 959 break; 960#endif /* defined(__osf__) || defined(_AIX3) */ 961#if defined(sony_news) 962 case 'E': 963 case 'J': /* ignore flags for Japanese code conversion 964 implemented on Sony NEWS */ 965 break; 966#endif /* defined(sony_news) */ 967 968 default: 969 finis(TRUE, EX_USAGE); 970 break; 971 } 972 } 973 av += optind; 974 975 if (bitset(SUBMIT_MTA, SubmitMode) && 976 bitset(SUBMIT_MSA, SubmitMode)) 977 { 978 /* sanity check */ 979 errno = 0; /* reset to avoid bogus error messages */ 980 syserr("Cannot use both -G and -U together"); 981 } 982 else if (bitset(SUBMIT_MTA, SubmitMode)) 983 define(macid("{daemon_flags}", NULL), "CC f", CurEnv); 984 else if (bitset(SUBMIT_MSA, SubmitMode)) 985 { 986 define(macid("{daemon_flags}", NULL), "c u", CurEnv); 987 988 /* check for wrong OpMode */ 989 if (OpMode != MD_DELIVER && OpMode != MD_SMTP) 990 { 991 errno = 0; /* reset to avoid bogus error msgs */ 992 syserr("Cannot use -U and -b%c", OpMode); 993 } 994 } 995 else 996 { 997#if _FFR_DEFAULT_SUBMIT_TO_MSA 998 define(macid("{daemon_flags}", NULL), "c u", CurEnv); 999#else /* _FFR_DEFAULT_SUBMIT_TO_MSA */ 1000 /* EMPTY */ 1001#endif /* _FFR_DEFAULT_SUBMIT_TO_MSA */ 1002 } 1003 1004 /* 1005 ** Do basic initialization. 1006 ** Read system control file. 1007 ** Extract special fields for local use. 1008 */ 1009 1010 /* set up ${opMode} for use in config file */ 1011 { 1012 char mbuf[2]; 1013 1014 mbuf[0] = OpMode; 1015 mbuf[1] = '\0'; 1016 define(MID_OPMODE, newstr(mbuf), CurEnv); 1017 } 1018 1019#if XDEBUG 1020 checkfd012("before readcf"); 1021#endif /* XDEBUG */ 1022 vendor_pre_defaults(CurEnv); 1023 1024 readcf(getcfname(), safecf, CurEnv); 1025 ConfigFileRead = TRUE; 1026 vendor_post_defaults(CurEnv); 1027 1028 /* Enforce use of local time (null string overrides this) */ 1029 if (TimeZoneSpec == NULL) 1030 unsetenv("TZ"); 1031 else if (TimeZoneSpec[0] != '\0') 1032 setuserenv("TZ", TimeZoneSpec); 1033 else 1034 setuserenv("TZ", NULL); 1035 tzset(); 1036 1037 /* avoid denial-of-service attacks */ 1038 resetlimits(); 1039 1040 if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON) 1041 { 1042 /* drop privileges -- daemon mode done after socket/bind */ 1043 dp = drop_privileges(FALSE); 1044 setstat(dp); 1045 } 1046 1047#if NAMED_BIND 1048 _res.retry = TimeOuts.res_retry[RES_TO_DEFAULT]; 1049 _res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT]; 1050#endif /* NAMED_BIND */ 1051 1052 /* 1053 ** Find our real host name for future logging. 1054 */ 1055 1056 authinfo = getauthinfo(STDIN_FILENO, &forged); 1057 define('_', authinfo, CurEnv); 1058 1059 /* suppress error printing if errors mailed back or whatever */ 1060 if (CurEnv->e_errormode != EM_PRINT) 1061 HoldErrs = TRUE; 1062 1063 /* set up the $=m class now, after .cf has a chance to redefine $m */ 1064 expand("\201m", jbuf, sizeof jbuf, CurEnv); 1065 setclass('m', jbuf); 1066 1067 /* probe interfaces and locate any additional names */ 1068 if (!DontProbeInterfaces) 1069 load_if_names(); 1070 1071 if (tTd(0, 1)) 1072 { 1073 dprintf("\n============ SYSTEM IDENTITY (after readcf) ============"); 1074 dprintf("\n (short domain name) $w = "); 1075 xputs(macvalue('w', CurEnv)); 1076 dprintf("\n (canonical domain name) $j = "); 1077 xputs(macvalue('j', CurEnv)); 1078 dprintf("\n (subdomain name) $m = "); 1079 xputs(macvalue('m', CurEnv)); 1080 dprintf("\n (node name) $k = "); 1081 xputs(macvalue('k', CurEnv)); 1082 dprintf("\n========================================================\n\n"); 1083 } 1084 1085 /* 1086 ** Do more command line checking -- these are things that 1087 ** have to modify the results of reading the config file. 1088 */ 1089 1090 /* process authorization warnings from command line */ 1091 if (warn_C_flag) 1092 auth_warning(CurEnv, "Processed by %s with -C %s", 1093 RealUserName, ConfFile); 1094 if (Warn_Q_option && !wordinclass(RealUserName, 't')) 1095 auth_warning(CurEnv, "Processed from queue %s", QueueDir); 1096 1097 /* check body type for legality */ 1098 if (CurEnv->e_bodytype == NULL) 1099 /* EMPTY */ 1100 /* nothing */ ; 1101 else if (strcasecmp(CurEnv->e_bodytype, "7BIT") == 0) 1102 SevenBitInput = TRUE; 1103 else if (strcasecmp(CurEnv->e_bodytype, "8BITMIME") == 0) 1104 SevenBitInput = FALSE; 1105 else 1106 { 1107 usrerr("Illegal body type %s", CurEnv->e_bodytype); 1108 CurEnv->e_bodytype = NULL; 1109 } 1110 1111 /* tweak default DSN notifications */ 1112 if (DefaultNotify == 0) 1113 DefaultNotify = QPINGONFAILURE|QPINGONDELAY; 1114 1115 /* be sure we don't pick up bogus HOSTALIASES environment variable */ 1116 if (OpMode == MD_QUEUERUN && RealUid != 0) 1117 (void) unsetenv("HOSTALIASES"); 1118 1119 /* check for sane configuration level */ 1120 if (ConfigLevel > MAXCONFIGLEVEL) 1121 { 1122 syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)", 1123 ConfigLevel, Version, MAXCONFIGLEVEL); 1124 } 1125 1126 /* need MCI cache to have persistence */ 1127 if (HostStatDir != NULL && MaxMciCache == 0) 1128 { 1129 HostStatDir = NULL; 1130 printf("Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n"); 1131 } 1132 1133 /* need HostStatusDir in order to have SingleThreadDelivery */ 1134 if (SingleThreadDelivery && HostStatDir == NULL) 1135 { 1136 SingleThreadDelivery = FALSE; 1137 printf("Warning: HostStatusDirectory required for SingleThreadDelivery\n"); 1138 } 1139 1140 /* check for permissions */ 1141 if ((OpMode == MD_DAEMON || 1142 OpMode == MD_FGDAEMON || 1143 OpMode == MD_PURGESTAT) && 1144 RealUid != 0 && 1145 RealUid != TrustedUid) 1146 { 1147 if (LogLevel > 1) 1148 sm_syslog(LOG_ALERT, NOQID, 1149 "user %d attempted to %s", 1150 RealUid, 1151 OpMode != MD_PURGESTAT ? "run daemon" 1152 : "purge host status"); 1153 usrerr("Permission denied"); 1154 finis(FALSE, EX_USAGE); 1155 } 1156 if (OpMode == MD_INITALIAS && 1157 RealUid != 0 && 1158 RealUid != TrustedUid && 1159 !wordinclass(RealUserName, 't')) 1160 { 1161 if (LogLevel > 1) 1162 sm_syslog(LOG_ALERT, NOQID, 1163 "user %d attempted to rebuild the alias map", 1164 RealUid); 1165 usrerr("Permission denied"); 1166 finis(FALSE, EX_USAGE); 1167 } 1168 1169 if (MeToo) 1170 BlankEnvelope.e_flags |= EF_METOO; 1171 1172 switch (OpMode) 1173 { 1174 case MD_TEST: 1175 /* don't have persistent host status in test mode */ 1176 HostStatDir = NULL; 1177 if (Verbose == 0) 1178 Verbose = 2; 1179 CurEnv->e_errormode = EM_PRINT; 1180 HoldErrs = FALSE; 1181 break; 1182 1183 case MD_VERIFY: 1184 CurEnv->e_errormode = EM_PRINT; 1185 HoldErrs = FALSE; 1186 /* arrange to exit cleanly on hangup signal */ 1187 if (setsignal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL) 1188 (void) setsignal(SIGHUP, intsig); 1189 break; 1190 1191 case MD_FGDAEMON: 1192 run_in_foreground = TRUE; 1193 OpMode = MD_DAEMON; 1194 /* FALLTHROUGH */ 1195 1196 case MD_DAEMON: 1197 vendor_daemon_setup(CurEnv); 1198 1199 /* remove things that don't make sense in daemon mode */ 1200 FullName = NULL; 1201 GrabTo = FALSE; 1202 1203 /* arrange to restart on hangup signal */ 1204 if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/') 1205 sm_syslog(LOG_WARNING, NOQID, 1206 "daemon invoked without full pathname; kill -1 won't work"); 1207 (void) setsignal(SIGHUP, sighup); 1208 1209 /* workaround: can't seem to release the signal in the parent */ 1210 (void) releasesignal(SIGHUP); 1211 break; 1212 1213 case MD_INITALIAS: 1214 Verbose = 2; 1215 CurEnv->e_errormode = EM_PRINT; 1216 HoldErrs = FALSE; 1217 /* FALLTHROUGH */ 1218 1219 default: 1220 /* arrange to exit cleanly on hangup signal */ 1221 if (setsignal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL) 1222 (void) setsignal(SIGHUP, intsig); 1223 break; 1224 } 1225 1226 /* special considerations for FullName */ 1227 if (FullName != NULL) 1228 { 1229 char *full = NULL; 1230 1231 /* full names can't have newlines */ 1232 if (strchr(FullName, '\n') != NULL) 1233 { 1234 FullName = full = newstr(denlstring(FullName, TRUE, TRUE)); 1235 } 1236 /* check for characters that may have to be quoted */ 1237 if (!rfc822_string(FullName)) 1238 { 1239 /* 1240 ** Quote a full name with special characters 1241 ** as a comment so crackaddr() doesn't destroy 1242 ** the name portion of the address. 1243 */ 1244 FullName = addquotes(FullName); 1245 if (full != NULL) 1246 free(full); 1247 } 1248 } 1249 1250 /* do heuristic mode adjustment */ 1251 if (Verbose) 1252 { 1253 /* turn off noconnect option */ 1254 setoption('c', "F", TRUE, FALSE, CurEnv); 1255 1256 /* turn on interactive delivery */ 1257 setoption('d', "", TRUE, FALSE, CurEnv); 1258 } 1259 1260#ifdef VENDOR_CODE 1261 /* check for vendor mismatch */ 1262 if (VendorCode != VENDOR_CODE) 1263 { 1264 message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s", 1265 getvendor(VENDOR_CODE), getvendor(VendorCode)); 1266 } 1267#endif /* VENDOR_CODE */ 1268 1269 /* check for out of date configuration level */ 1270 if (ConfigLevel < MAXCONFIGLEVEL) 1271 { 1272 message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d", 1273 Version, MAXCONFIGLEVEL, ConfigLevel); 1274 } 1275 1276 if (ConfigLevel < 3) 1277 UseErrorsTo = TRUE; 1278 1279 /* set options that were previous macros */ 1280 if (SmtpGreeting == NULL) 1281 { 1282 if (ConfigLevel < 7 && (p = macvalue('e', CurEnv)) != NULL) 1283 SmtpGreeting = newstr(p); 1284 else 1285 SmtpGreeting = "\201j Sendmail \201v ready at \201b"; 1286 } 1287 if (UnixFromLine == NULL) 1288 { 1289 if (ConfigLevel < 7 && (p = macvalue('l', CurEnv)) != NULL) 1290 UnixFromLine = newstr(p); 1291 else 1292 UnixFromLine = "From \201g \201d"; 1293 } 1294 SmtpError[0] = '\0'; 1295 1296 /* our name for SMTP codes */ 1297 expand("\201j", jbuf, sizeof jbuf, CurEnv); 1298 MyHostName = jbuf; 1299 if (strchr(jbuf, '.') == NULL) 1300 message("WARNING: local host name (%s) is not qualified; fix $j in config file", 1301 jbuf); 1302 1303 /* make certain that this name is part of the $=w class */ 1304 setclass('w', MyHostName); 1305 1306 /* the indices of built-in mailers */ 1307 st = stab("local", ST_MAILER, ST_FIND); 1308 if (st != NULL) 1309 LocalMailer = st->s_mailer; 1310 else if (OpMode != MD_TEST || !warn_C_flag) 1311 syserr("No local mailer defined"); 1312 1313 st = stab("prog", ST_MAILER, ST_FIND); 1314 if (st == NULL) 1315 syserr("No prog mailer defined"); 1316 else 1317 { 1318 ProgMailer = st->s_mailer; 1319 clrbitn(M_MUSER, ProgMailer->m_flags); 1320 } 1321 1322 st = stab("*file*", ST_MAILER, ST_FIND); 1323 if (st == NULL) 1324 syserr("No *file* mailer defined"); 1325 else 1326 { 1327 FileMailer = st->s_mailer; 1328 clrbitn(M_MUSER, FileMailer->m_flags); 1329 } 1330 1331 st = stab("*include*", ST_MAILER, ST_FIND); 1332 if (st == NULL) 1333 syserr("No *include* mailer defined"); 1334 else 1335 InclMailer = st->s_mailer; 1336 1337 if (ConfigLevel < 6) 1338 { 1339 /* heuristic tweaking of local mailer for back compat */ 1340 if (LocalMailer != NULL) 1341 { 1342 setbitn(M_ALIASABLE, LocalMailer->m_flags); 1343 setbitn(M_HASPWENT, LocalMailer->m_flags); 1344 setbitn(M_TRYRULESET5, LocalMailer->m_flags); 1345 setbitn(M_CHECKINCLUDE, LocalMailer->m_flags); 1346 setbitn(M_CHECKPROG, LocalMailer->m_flags); 1347 setbitn(M_CHECKFILE, LocalMailer->m_flags); 1348 setbitn(M_CHECKUDB, LocalMailer->m_flags); 1349 } 1350 if (ProgMailer != NULL) 1351 setbitn(M_RUNASRCPT, ProgMailer->m_flags); 1352 if (FileMailer != NULL) 1353 setbitn(M_RUNASRCPT, FileMailer->m_flags); 1354 } 1355 if (ConfigLevel < 7) 1356 { 1357 if (LocalMailer != NULL) 1358 setbitn(M_VRFY250, LocalMailer->m_flags); 1359 if (ProgMailer != NULL) 1360 setbitn(M_VRFY250, ProgMailer->m_flags); 1361 if (FileMailer != NULL) 1362 setbitn(M_VRFY250, FileMailer->m_flags); 1363 } 1364 1365 /* MIME Content-Types that cannot be transfer encoded */ 1366 setclass('n', "multipart/signed"); 1367 1368 /* MIME message/xxx subtypes that can be treated as messages */ 1369 setclass('s', "rfc822"); 1370 1371 /* MIME Content-Transfer-Encodings that can be encoded */ 1372 setclass('e', "7bit"); 1373 setclass('e', "8bit"); 1374 setclass('e', "binary"); 1375 1376#ifdef USE_B_CLASS 1377 /* MIME Content-Types that should be treated as binary */ 1378 setclass('b', "image"); 1379 setclass('b', "audio"); 1380 setclass('b', "video"); 1381 setclass('b', "application/octet-stream"); 1382#endif /* USE_B_CLASS */ 1383 1384 /* MIME headers which have fields to check for overflow */ 1385 setclass(macid("{checkMIMEFieldHeaders}", NULL), "content-disposition"); 1386 setclass(macid("{checkMIMEFieldHeaders}", NULL), "content-type"); 1387 1388 /* MIME headers to check for length overflow */ 1389 setclass(macid("{checkMIMETextHeaders}", NULL), "content-description"); 1390 1391 /* MIME headers to check for overflow and rebalance */ 1392 setclass(macid("{checkMIMEHeaders}", NULL), "content-disposition"); 1393 setclass(macid("{checkMIMEHeaders}", NULL), "content-id"); 1394 setclass(macid("{checkMIMEHeaders}", NULL), "content-transfer-encoding"); 1395 setclass(macid("{checkMIMEHeaders}", NULL), "content-type"); 1396 setclass(macid("{checkMIMEHeaders}", NULL), "mime-version"); 1397 1398 /* Macros to save in the qf file -- don't remove any */ 1399 setclass(macid("{persistentMacros}", NULL), "r"); 1400 setclass(macid("{persistentMacros}", NULL), "s"); 1401 setclass(macid("{persistentMacros}", NULL), "_"); 1402 setclass(macid("{persistentMacros}", NULL), "{if_addr}"); 1403 setclass(macid("{persistentMacros}", NULL), "{daemon_flags}"); 1404 setclass(macid("{persistentMacros}", NULL), "{client_flags}"); 1405 1406 /* operate in queue directory */ 1407 if (QueueDir == NULL) 1408 { 1409 if (OpMode != MD_TEST) 1410 { 1411 syserr("QueueDirectory (Q) option must be set"); 1412 ExitStat = EX_CONFIG; 1413 } 1414 } 1415 else 1416 { 1417 /* 1418 ** If multiple queues wildcarded, use one for 1419 ** the daemon's home. Note that this preconditions 1420 ** a wildcarded QueueDir to a real pathname. 1421 */ 1422 1423 if (OpMode != MD_TEST) 1424 multiqueue_cache(); 1425 } 1426 1427 /* check host status directory for validity */ 1428 if (HostStatDir != NULL && !path_is_dir(HostStatDir, FALSE)) 1429 { 1430 /* cannot use this value */ 1431 if (tTd(0, 2)) 1432 dprintf("Cannot use HostStatusDirectory = %s: %s\n", 1433 HostStatDir, errstring(errno)); 1434 HostStatDir = NULL; 1435 } 1436 1437#if QUEUE 1438 if (OpMode == MD_QUEUERUN && RealUid != 0 && 1439 bitset(PRIV_RESTRICTQRUN, PrivacyFlags)) 1440 { 1441 struct stat stbuf; 1442 1443 /* check to see if we own the queue directory */ 1444 if (stat(".", &stbuf) < 0) 1445 syserr("main: cannot stat %s", QueueDir); 1446 if (stbuf.st_uid != RealUid) 1447 { 1448 /* nope, really a botch */ 1449 usrerr("You do not have permission to process the queue"); 1450 finis(FALSE, EX_NOPERM); 1451 } 1452 } 1453#endif /* QUEUE */ 1454 1455#if _FFR_MILTER 1456 /* sanity checks on milter filters */ 1457 if (OpMode == MD_DAEMON || OpMode == MD_SMTP) 1458 milter_parse_list(InputFilterList, InputFilters, MAXFILTERS); 1459#endif /* _FFR_MILTER */ 1460 1461 1462 /* if we've had errors so far, exit now */ 1463 if (ExitStat != EX_OK && OpMode != MD_TEST) 1464 finis(FALSE, ExitStat); 1465 1466#if XDEBUG 1467 checkfd012("before main() initmaps"); 1468#endif /* XDEBUG */ 1469 1470 /* 1471 ** Do operation-mode-dependent initialization. 1472 */ 1473 1474 switch (OpMode) 1475 { 1476 case MD_PRINT: 1477 /* print the queue */ 1478#if QUEUE 1479 dropenvelope(CurEnv, TRUE); 1480 (void) setsignal(SIGPIPE, quiesce); 1481 printqueue(); 1482 finis(FALSE, EX_OK); 1483#else /* QUEUE */ 1484 usrerr("No queue to print"); 1485 finis(FALSE, EX_UNAVAILABLE); 1486#endif /* QUEUE */ 1487 break; 1488 1489 case MD_HOSTSTAT: 1490 (void) setsignal(SIGPIPE, quiesce); 1491 (void) mci_traverse_persistent(mci_print_persistent, NULL); 1492 finis(FALSE, EX_OK); 1493 break; 1494 1495 case MD_PURGESTAT: 1496 (void) mci_traverse_persistent(mci_purge_persistent, NULL); 1497 finis(FALSE, EX_OK); 1498 break; 1499 1500 case MD_INITALIAS: 1501 /* initialize maps */ 1502 initmaps(); 1503 finis(FALSE, ExitStat); 1504 break; 1505 1506 case MD_SMTP: 1507 case MD_DAEMON: 1508 /* reset DSN parameters */ 1509 DefaultNotify = QPINGONFAILURE|QPINGONDELAY; 1510 define(macid("{dsn_notify}", NULL), NULL, CurEnv); 1511 CurEnv->e_envid = NULL; 1512 define(macid("{dsn_envid}", NULL), NULL, CurEnv); 1513 CurEnv->e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN); 1514 define(macid("{dsn_ret}", NULL), NULL, CurEnv); 1515 1516 /* don't open maps for daemon -- done below in child */ 1517 break; 1518 } 1519 1520 if (tTd(0, 15)) 1521 { 1522 /* print configuration table (or at least part of it) */ 1523 if (tTd(0, 90)) 1524 printrules(); 1525 for (i = 0; i < MAXMAILERS; i++) 1526 { 1527 if (Mailer[i] != NULL) 1528 printmailer(Mailer[i]); 1529 } 1530 } 1531 1532 /* 1533 ** Switch to the main envelope. 1534 */ 1535 1536 CurEnv = newenvelope(&MainEnvelope, CurEnv); 1537 MainEnvelope.e_flags = BlankEnvelope.e_flags; 1538 1539 /* 1540 ** If test mode, read addresses from stdin and process. 1541 */ 1542 1543 if (OpMode == MD_TEST) 1544 { 1545 char buf[MAXLINE]; 1546 1547#if _FFR_TESTMODE_DROP_PRIVS 1548 dp = drop_privileges(TRUE); 1549 if (dp != EX_OK) 1550 { 1551 CurEnv->e_id = NULL; 1552 finis(TRUE, dp); 1553 } 1554#endif /* _FFR_TESTMODE_DROP_PRIVS */ 1555 1556 if (isatty(fileno(stdin))) 1557 Verbose = 2; 1558 1559 if (Verbose) 1560 { 1561 printf("ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n"); 1562 printf("Enter <ruleset> <address>\n"); 1563 } 1564 if (setjmp(TopFrame) > 0) 1565 printf("\n"); 1566 (void) setsignal(SIGINT, intindebug); 1567 for (;;) 1568 { 1569 if (Verbose == 2) 1570 printf("> "); 1571 (void) fflush(stdout); 1572 if (fgets(buf, sizeof buf, stdin) == NULL) 1573 testmodeline("/quit", CurEnv); 1574 p = strchr(buf, '\n'); 1575 if (p != NULL) 1576 *p = '\0'; 1577 if (Verbose < 2) 1578 printf("> %s\n", buf); 1579 testmodeline(buf, CurEnv); 1580 } 1581 } 1582 1583#if SMTP 1584# if STARTTLS 1585 /* 1586 ** basic TLS initialization 1587 ** ignore result for now 1588 */ 1589 SSL_library_init(); 1590 SSL_load_error_strings(); 1591# if 0 1592 /* this is currently a macro for SSL_library_init */ 1593 SSLeay_add_ssl_algorithms(); 1594# endif /* 0 */ 1595 1596 /* initialize PRNG */ 1597 tls_ok = tls_rand_init(RandFile, 7); 1598 1599# endif /* STARTTLS */ 1600#endif /* SMTP */ 1601 1602#if QUEUE 1603 /* 1604 ** If collecting stuff from the queue, go start doing that. 1605 */ 1606 1607 if (OpMode == MD_QUEUERUN && QueueIntvl == 0) 1608 { 1609# if SMTP 1610# if STARTTLS 1611 if (tls_ok 1612 ) 1613 { 1614 /* init TLS for client, ignore result for now */ 1615 (void) initclttls(); 1616 } 1617# endif /* STARTTLS */ 1618# endif /* SMTP */ 1619 (void) runqueue(FALSE, Verbose); 1620 finis(TRUE, ExitStat); 1621 } 1622#endif /* QUEUE */ 1623 1624# if SASL 1625 if (OpMode == MD_SMTP || OpMode == MD_DAEMON) 1626 { 1627 /* give a syserr or just disable AUTH ? */ 1628 if ((i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK) 1629 syserr("!sasl_server_init failed! [%s]", 1630 sasl_errstring(i, NULL, NULL)); 1631 } 1632# endif /* SASL */ 1633 1634 /* 1635 ** If a daemon, wait for a request. 1636 ** getrequests will always return in a child. 1637 ** If we should also be processing the queue, start 1638 ** doing it in background. 1639 ** We check for any errors that might have happened 1640 ** during startup. 1641 */ 1642 1643 if (OpMode == MD_DAEMON || QueueIntvl != 0) 1644 { 1645 char dtype[200]; 1646 1647 if (!run_in_foreground && !tTd(99, 100)) 1648 { 1649 /* put us in background */ 1650 i = fork(); 1651 if (i < 0) 1652 syserr("daemon: cannot fork"); 1653 if (i != 0) 1654 finis(FALSE, EX_OK); 1655 1656 /* disconnect from our controlling tty */ 1657 disconnect(2, CurEnv); 1658 } 1659 1660 dtype[0] = '\0'; 1661 if (OpMode == MD_DAEMON) 1662 (void) strlcat(dtype, "+SMTP", sizeof dtype); 1663 if (QueueIntvl != 0) 1664 { 1665 (void) strlcat(dtype, "+queueing@", sizeof dtype); 1666 (void) strlcat(dtype, pintvl(QueueIntvl, TRUE), 1667 sizeof dtype); 1668 } 1669 if (tTd(0, 1)) 1670 (void) strlcat(dtype, "+debugging", sizeof dtype); 1671 1672 sm_syslog(LOG_INFO, NOQID, 1673 "starting daemon (%s): %s", Version, dtype + 1); 1674#ifdef XLA 1675 xla_create_file(); 1676#endif /* XLA */ 1677 1678 /* save daemon type in a macro for possible PidFile use */ 1679 define(macid("{daemon_info}", NULL), 1680 newstr(dtype + 1), &BlankEnvelope); 1681 1682 /* save queue interval in a macro for possible PidFile use */ 1683 define(macid("{queue_interval}", NULL), 1684 newstr(pintvl(QueueIntvl, TRUE)), CurEnv); 1685 1686#if QUEUE 1687 if (QueueIntvl != 0) 1688 { 1689 (void) runqueue(TRUE, FALSE); 1690 if (OpMode != MD_DAEMON) 1691 { 1692 /* write the pid to file */ 1693 log_sendmail_pid(CurEnv); 1694 for (;;) 1695 { 1696 (void) pause(); 1697 if (DoQueueRun) 1698 (void) runqueue(TRUE, FALSE); 1699 } 1700 } 1701 } 1702#endif /* QUEUE */ 1703 dropenvelope(CurEnv, TRUE); 1704 1705#if DAEMON 1706# if STARTTLS 1707 /* init TLS for server, ignore result for now */ 1708 (void) initsrvtls(); 1709# endif /* STARTTLS */ 1710 p_flags = getrequests(CurEnv); 1711 1712 /* drop privileges */ 1713 (void) drop_privileges(FALSE); 1714 1715 /* at this point we are in a child: reset state */ 1716 (void) newenvelope(CurEnv, CurEnv); 1717 1718 /* 1719 ** Get authentication data 1720 */ 1721 1722 authinfo = getauthinfo(fileno(InChannel), &forged); 1723 define('_', authinfo, &BlankEnvelope); 1724#endif /* DAEMON */ 1725 } 1726 1727 if (LogLevel > 9) 1728 { 1729 /* log connection information */ 1730 sm_syslog(LOG_INFO, NULL, "connect from %.100s", authinfo); 1731 } 1732 1733#if SMTP 1734 /* 1735 ** If running SMTP protocol, start collecting and executing 1736 ** commands. This will never return. 1737 */ 1738 1739 if (OpMode == MD_SMTP || OpMode == MD_DAEMON) 1740 { 1741 char pbuf[20]; 1742 1743 /* 1744 ** Save some macros for check_* rulesets. 1745 */ 1746 1747 if (forged) 1748 { 1749 char ipbuf[103]; 1750 1751 (void) snprintf(ipbuf, sizeof ipbuf, "[%.100s]", 1752 anynet_ntoa(&RealHostAddr)); 1753 define(macid("{client_name}", NULL), 1754 newstr(ipbuf), &BlankEnvelope); 1755 define(macid("{client_resolve}", NULL), 1756 "FORGED", &BlankEnvelope); 1757 } 1758 else 1759 define(macid("{client_name}", NULL), RealHostName, 1760 &BlankEnvelope); 1761 define(macid("{client_addr}", NULL), 1762 newstr(anynet_ntoa(&RealHostAddr)), &BlankEnvelope); 1763 (void)sm_getla(&BlankEnvelope); 1764 1765 switch(RealHostAddr.sa.sa_family) 1766 { 1767# if NETINET 1768 case AF_INET: 1769 (void) snprintf(pbuf, sizeof pbuf, "%d", 1770 RealHostAddr.sin.sin_port); 1771 break; 1772# endif /* NETINET */ 1773# if NETINET6 1774 case AF_INET6: 1775 (void) snprintf(pbuf, sizeof pbuf, "%d", 1776 RealHostAddr.sin6.sin6_port); 1777 break; 1778# endif /* NETINET6 */ 1779 default: 1780 (void) snprintf(pbuf, sizeof pbuf, "0"); 1781 break; 1782 } 1783 define(macid("{client_port}", NULL), 1784 newstr(pbuf), &BlankEnvelope); 1785 1786 if (OpMode == MD_DAEMON) 1787 { 1788 /* validate the connection */ 1789 HoldErrs = TRUE; 1790 nullserver = validate_connection(&RealHostAddr, 1791 RealHostName, CurEnv); 1792 HoldErrs = FALSE; 1793 } 1794 else if (p_flags == NULL) 1795 { 1796 p_flags = (BITMAP256 *) xalloc(sizeof *p_flags); 1797 clrbitmap(p_flags); 1798 } 1799# if STARTTLS 1800 if (OpMode == MD_SMTP) 1801 (void) initsrvtls(); 1802# endif /* STARTTLS */ 1803 1804 1805 smtp(nullserver, *p_flags, CurEnv); 1806 } 1807#endif /* SMTP */ 1808 1809 clearenvelope(CurEnv, FALSE); 1810 if (OpMode == MD_VERIFY) 1811 { 1812 set_delivery_mode(SM_VERIFY, CurEnv); 1813 PostMasterCopy = NULL; 1814 } 1815 else 1816 { 1817 /* interactive -- all errors are global */ 1818 CurEnv->e_flags |= EF_GLOBALERRS|EF_LOGSENDER; 1819 } 1820 1821 /* 1822 ** Do basic system initialization and set the sender 1823 */ 1824 1825 initsys(CurEnv); 1826 define(macid("{ntries}", NULL), "0", CurEnv); 1827 setsender(from, CurEnv, NULL, '\0', FALSE); 1828 if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') && 1829 (!bitnset(M_LOCALMAILER, CurEnv->e_from.q_mailer->m_flags) || 1830 strcmp(CurEnv->e_from.q_user, RealUserName) != 0)) 1831 { 1832 auth_warning(CurEnv, "%s set sender to %s using -%c", 1833 RealUserName, from, warn_f_flag); 1834#if SASL 1835 auth = FALSE; 1836#endif /* SASL */ 1837 } 1838 if (auth) 1839 { 1840 char *fv; 1841 1842 /* set the initial sender for AUTH= to $f@$j */ 1843 fv = macvalue('f', CurEnv); 1844 if (fv == NULL || *fv == '\0') 1845 CurEnv->e_auth_param = NULL; 1846 else 1847 { 1848 if (strchr(fv, '@') == NULL) 1849 { 1850 i = strlen(fv) + strlen(macvalue('j', CurEnv)) 1851 + 2; 1852 p = xalloc(i); 1853 (void) snprintf(p, i, "%s@%s", fv, 1854 macvalue('j', CurEnv)); 1855 } 1856 else 1857 p = newstr(fv); 1858 CurEnv->e_auth_param = newstr(xtextify(p, NULL)); 1859 } 1860 } 1861 if (macvalue('s', CurEnv) == NULL) 1862 define('s', RealHostName, CurEnv); 1863 1864 if (*av == NULL && !GrabTo) 1865 { 1866 CurEnv->e_to = NULL; 1867 CurEnv->e_flags |= EF_GLOBALERRS; 1868 HoldErrs = FALSE; 1869 usrerr("Recipient names must be specified"); 1870 1871 /* collect body for UUCP return */ 1872 if (OpMode != MD_VERIFY) 1873 collect(InChannel, FALSE, NULL, CurEnv); 1874 finis(TRUE, EX_USAGE); 1875 } 1876 1877 /* 1878 ** Scan argv and deliver the message to everyone. 1879 */ 1880 1881 sendtoargv(av, CurEnv); 1882 1883 /* if we have had errors sofar, arrange a meaningful exit stat */ 1884 if (Errors > 0 && ExitStat == EX_OK) 1885 ExitStat = EX_USAGE; 1886 1887#if _FFR_FIX_DASHT 1888 /* 1889 ** If using -t, force not sending to argv recipients, even 1890 ** if they are mentioned in the headers. 1891 */ 1892 1893 if (GrabTo) 1894 { 1895 ADDRESS *q; 1896 1897 for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next) 1898 q->q_state = QS_REMOVED; 1899 } 1900#endif /* _FFR_FIX_DASHT */ 1901 1902 /* 1903 ** Read the input mail. 1904 */ 1905 1906 CurEnv->e_to = NULL; 1907 if (OpMode != MD_VERIFY || GrabTo) 1908 { 1909 int savederrors = Errors; 1910 long savedflags = CurEnv->e_flags & EF_FATALERRS; 1911 1912 CurEnv->e_flags |= EF_GLOBALERRS; 1913 CurEnv->e_flags &= ~EF_FATALERRS; 1914 Errors = 0; 1915 buffer_errors(); 1916 collect(InChannel, FALSE, NULL, CurEnv); 1917 1918 /* header checks failed */ 1919 if (Errors > 0) 1920 { 1921 /* Log who the mail would have gone to */ 1922 if (LogLevel > 8 && CurEnv->e_message != NULL && 1923 !GrabTo) 1924 { 1925 ADDRESS *a; 1926 1927 for (a = CurEnv->e_sendqueue; 1928 a != NULL; 1929 a = a->q_next) 1930 { 1931 if (!QS_IS_UNDELIVERED(a->q_state)) 1932 continue; 1933 1934 CurEnv->e_to = a->q_paddr; 1935 logdelivery(NULL, NULL, NULL, 1936 CurEnv->e_message, 1937 NULL, (time_t) 0, CurEnv); 1938 } 1939 CurEnv->e_to = NULL; 1940 } 1941 flush_errors(TRUE); 1942 finis(TRUE, ExitStat); 1943 /* NOTREACHED */ 1944 return -1; 1945 } 1946 1947 /* bail out if message too large */ 1948 if (bitset(EF_CLRQUEUE, CurEnv->e_flags)) 1949 { 1950 finis(TRUE, ExitStat != EX_OK ? ExitStat : EX_DATAERR); 1951 /* NOTREACHED */ 1952 return -1; 1953 } 1954 Errors = savederrors; 1955 CurEnv->e_flags |= savedflags; 1956 } 1957 errno = 0; 1958 1959 if (tTd(1, 1)) 1960 dprintf("From person = \"%s\"\n", CurEnv->e_from.q_paddr); 1961 1962 /* 1963 ** Actually send everything. 1964 ** If verifying, just ack. 1965 */ 1966 1967 CurEnv->e_from.q_state = QS_SENDER; 1968 if (tTd(1, 5)) 1969 { 1970 dprintf("main: QS_SENDER "); 1971 printaddr(&CurEnv->e_from, FALSE); 1972 } 1973 CurEnv->e_to = NULL; 1974 CurrentLA = sm_getla(CurEnv); 1975 GrabTo = FALSE; 1976#if NAMED_BIND 1977 _res.retry = TimeOuts.res_retry[RES_TO_FIRST]; 1978 _res.retrans = TimeOuts.res_retrans[RES_TO_FIRST]; 1979#endif /* NAMED_BIND */ 1980 sendall(CurEnv, SM_DEFAULT); 1981 1982 /* 1983 ** All done. 1984 ** Don't send return error message if in VERIFY mode. 1985 */ 1986 1987 finis(TRUE, ExitStat); 1988 /* NOTREACHED */ 1989 return ExitStat; 1990} 1991 1992/* ARGSUSED */ 1993SIGFUNC_DECL 1994quiesce(sig) 1995 int sig; 1996{ 1997 clear_events(); 1998 finis(FALSE, EX_OK); 1999} 2000 2001/* ARGSUSED */ 2002SIGFUNC_DECL 2003intindebug(sig) 2004 int sig; 2005{ 2006 longjmp(TopFrame, 1); 2007 return SIGFUNC_RETURN; 2008} 2009/* 2010** FINIS -- Clean up and exit. 2011** 2012** Parameters: 2013** drop -- whether or not to drop CurEnv envelope 2014** exitstat -- exit status to use for exit() call 2015** 2016** Returns: 2017** never 2018** 2019** Side Effects: 2020** exits sendmail 2021*/ 2022 2023void 2024finis(drop, exitstat) 2025 bool drop; 2026 volatile int exitstat; 2027{ 2028 2029 if (tTd(2, 1)) 2030 { 2031 dprintf("\n====finis: stat %d e_id=%s e_flags=", 2032 exitstat, 2033 CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id); 2034 printenvflags(CurEnv); 2035 } 2036 if (tTd(2, 9)) 2037 printopenfds(FALSE); 2038 2039 /* if we fail in finis(), just exit */ 2040 if (setjmp(TopFrame) != 0) 2041 { 2042 /* failed -- just give it up */ 2043 goto forceexit; 2044 } 2045 2046 /* clean up temp files */ 2047 CurEnv->e_to = NULL; 2048 if (drop) 2049 { 2050 if (CurEnv->e_id != NULL) 2051 dropenvelope(CurEnv, TRUE); 2052 else 2053 poststats(StatFile); 2054 } 2055 2056 /* flush any cached connections */ 2057 mci_flush(TRUE, NULL); 2058 2059 /* close maps belonging to this pid */ 2060 closemaps(); 2061 2062#if USERDB 2063 /* close UserDatabase */ 2064 _udbx_close(); 2065#endif /* USERDB */ 2066 2067#ifdef XLA 2068 /* clean up extended load average stuff */ 2069 xla_all_end(); 2070#endif /* XLA */ 2071 2072 /* and exit */ 2073 forceexit: 2074 if (LogLevel > 78) 2075 sm_syslog(LOG_DEBUG, CurEnv->e_id, 2076 "finis, pid=%d", 2077 getpid()); 2078 if (exitstat == EX_TEMPFAIL || CurEnv->e_errormode == EM_BERKNET) 2079 exitstat = EX_OK; 2080 2081 sync_queue_time(); 2082 2083 /* reset uid for process accounting */ 2084 endpwent(); 2085 (void) setuid(RealUid); 2086 exit(exitstat); 2087} 2088/* 2089** INTSIG -- clean up on interrupt 2090** 2091** This just arranges to exit. It pessimizes in that it 2092** may resend a message. 2093** 2094** Parameters: 2095** none. 2096** 2097** Returns: 2098** none. 2099** 2100** Side Effects: 2101** Unlocks the current job. 2102*/ 2103 2104/* ARGSUSED */ 2105SIGFUNC_DECL 2106intsig(sig) 2107 int sig; 2108{ 2109 bool drop = FALSE; 2110 2111 clear_events(); 2112 if (sig != 0 && LogLevel > 79) 2113 sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt"); 2114 FileName = NULL; 2115 closecontrolsocket(TRUE); 2116#ifdef XLA 2117 xla_all_end(); 2118#endif /* XLA */ 2119 2120 /* Clean-up on aborted stdin message submission */ 2121 if (CurEnv->e_id != NULL && 2122 (OpMode == MD_SMTP || 2123 OpMode == MD_DELIVER || 2124 OpMode == MD_ARPAFTP)) 2125 { 2126 register ADDRESS *q; 2127 2128 /* don't return an error indication */ 2129 CurEnv->e_to = NULL; 2130 CurEnv->e_flags &= ~EF_FATALERRS; 2131 CurEnv->e_flags |= EF_CLRQUEUE; 2132 2133 /* 2134 ** Spin through the addresses and 2135 ** mark them dead to prevent bounces 2136 */ 2137 2138 for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next) 2139 q->q_state = QS_DONTSEND; 2140 2141 /* and don't try to deliver the partial message either */ 2142 if (InChild) 2143 ExitStat = EX_QUIT; 2144 2145 drop = TRUE; 2146 } 2147 else 2148 unlockqueue(CurEnv); 2149 2150 finis(drop, EX_OK); 2151} 2152/* 2153** INITMACROS -- initialize the macro system 2154** 2155** This just involves defining some macros that are actually 2156** used internally as metasymbols to be themselves. 2157** 2158** Parameters: 2159** none. 2160** 2161** Returns: 2162** none. 2163** 2164** Side Effects: 2165** initializes several macros to be themselves. 2166*/ 2167 2168struct metamac MetaMacros[] = 2169{ 2170 /* LHS pattern matching characters */ 2171 { '*', MATCHZANY }, { '+', MATCHANY }, { '-', MATCHONE }, 2172 { '=', MATCHCLASS }, { '~', MATCHNCLASS }, 2173 2174 /* these are RHS metasymbols */ 2175 { '#', CANONNET }, { '@', CANONHOST }, { ':', CANONUSER }, 2176 { '>', CALLSUBR }, 2177 2178 /* the conditional operations */ 2179 { '?', CONDIF }, { '|', CONDELSE }, { '.', CONDFI }, 2180 2181 /* the hostname lookup characters */ 2182 { '[', HOSTBEGIN }, { ']', HOSTEND }, 2183 { '(', LOOKUPBEGIN }, { ')', LOOKUPEND }, 2184 2185 /* miscellaneous control characters */ 2186 { '&', MACRODEXPAND }, 2187 2188 { '\0', '\0' } 2189}; 2190 2191#define MACBINDING(name, mid) \ 2192 stab(name, ST_MACRO, ST_ENTER)->s_macro = mid; \ 2193 MacroName[mid] = name; 2194 2195void 2196initmacros(e) 2197 register ENVELOPE *e; 2198{ 2199 register struct metamac *m; 2200 register int c; 2201 char buf[5]; 2202 extern char *MacroName[MAXMACROID + 1]; 2203 2204 for (m = MetaMacros; m->metaname != '\0'; m++) 2205 { 2206 buf[0] = m->metaval; 2207 buf[1] = '\0'; 2208 define(m->metaname, newstr(buf), e); 2209 } 2210 buf[0] = MATCHREPL; 2211 buf[2] = '\0'; 2212 for (c = '0'; c <= '9'; c++) 2213 { 2214 buf[1] = c; 2215 define(c, newstr(buf), e); 2216 } 2217 2218 /* set defaults for some macros sendmail will use later */ 2219 define('n', "MAILER-DAEMON", e); 2220 2221 /* set up external names for some internal macros */ 2222 MACBINDING("opMode", MID_OPMODE); 2223 /*XXX should probably add equivalents for all short macros here XXX*/ 2224} 2225/* 2226** DISCONNECT -- remove our connection with any foreground process 2227** 2228** Parameters: 2229** droplev -- how "deeply" we should drop the line. 2230** 0 -- ignore signals, mail back errors, make sure 2231** output goes to stdout. 2232** 1 -- also, make stdout go to /dev/null. 2233** 2 -- also, disconnect from controlling terminal 2234** (only for daemon mode). 2235** e -- the current envelope. 2236** 2237** Returns: 2238** none 2239** 2240** Side Effects: 2241** Trys to insure that we are immune to vagaries of 2242** the controlling tty. 2243*/ 2244 2245void 2246disconnect(droplev, e) 2247 int droplev; 2248 register ENVELOPE *e; 2249{ 2250 int fd; 2251 2252 if (tTd(52, 1)) 2253 dprintf("disconnect: In %d Out %d, e=%lx\n", 2254 fileno(InChannel), fileno(OutChannel), (u_long) e); 2255 if (tTd(52, 100)) 2256 { 2257 dprintf("don't\n"); 2258 return; 2259 } 2260 if (LogLevel > 93) 2261 sm_syslog(LOG_DEBUG, e->e_id, 2262 "disconnect level %d", 2263 droplev); 2264 2265 /* be sure we don't get nasty signals */ 2266 (void) setsignal(SIGINT, SIG_IGN); 2267 (void) setsignal(SIGQUIT, SIG_IGN); 2268 2269 /* we can't communicate with our caller, so.... */ 2270 HoldErrs = TRUE; 2271 CurEnv->e_errormode = EM_MAIL; 2272 Verbose = 0; 2273 DisConnected = TRUE; 2274 2275 /* all input from /dev/null */ 2276 if (InChannel != stdin) 2277 { 2278 (void) fclose(InChannel); 2279 InChannel = stdin; 2280 } 2281 if (freopen("/dev/null", "r", stdin) == NULL) 2282 sm_syslog(LOG_ERR, e->e_id, 2283 "disconnect: freopen(\"/dev/null\") failed: %s", 2284 errstring(errno)); 2285 2286 /* output to the transcript */ 2287 if (OutChannel != stdout) 2288 { 2289 (void) fclose(OutChannel); 2290 OutChannel = stdout; 2291 } 2292 if (droplev > 0) 2293 { 2294 fd = open("/dev/null", O_WRONLY, 0666); 2295 if (fd == -1) 2296 sm_syslog(LOG_ERR, e->e_id, 2297 "disconnect: open(\"/dev/null\") failed: %s", 2298 errstring(errno)); 2299 (void) fflush(stdout); 2300 (void) dup2(fd, STDOUT_FILENO); 2301 (void) dup2(fd, STDERR_FILENO); 2302 (void) close(fd); 2303 } 2304 2305 /* drop our controlling TTY completely if possible */ 2306 if (droplev > 1) 2307 { 2308 (void) setsid(); 2309 errno = 0; 2310 } 2311 2312#if XDEBUG 2313 checkfd012("disconnect"); 2314#endif /* XDEBUG */ 2315 2316 if (LogLevel > 71) 2317 sm_syslog(LOG_DEBUG, e->e_id, 2318 "in background, pid=%d", 2319 getpid()); 2320 2321 errno = 0; 2322} 2323 2324static void 2325obsolete(argv) 2326 char *argv[]; 2327{ 2328 register char *ap; 2329 register char *op; 2330 2331 while ((ap = *++argv) != NULL) 2332 { 2333 /* Return if "--" or not an option of any form. */ 2334 if (ap[0] != '-' || ap[1] == '-') 2335 return; 2336 2337 /* skip over options that do have a value */ 2338 op = strchr(OPTIONS, ap[1]); 2339 if (op != NULL && *++op == ':' && ap[2] == '\0' && 2340 ap[1] != 'd' && 2341#if defined(sony_news) 2342 ap[1] != 'E' && ap[1] != 'J' && 2343#endif /* defined(sony_news) */ 2344 argv[1] != NULL && argv[1][0] != '-') 2345 { 2346 argv++; 2347 continue; 2348 } 2349 2350 /* If -C doesn't have an argument, use sendmail.cf. */ 2351#define __DEFPATH "sendmail.cf" 2352 if (ap[1] == 'C' && ap[2] == '\0') 2353 { 2354 *argv = xalloc(sizeof(__DEFPATH) + 2); 2355 (void) snprintf(argv[0], sizeof(__DEFPATH) + 2, "-C%s", 2356 __DEFPATH); 2357 } 2358 2359 /* If -q doesn't have an argument, run it once. */ 2360 if (ap[1] == 'q' && ap[2] == '\0') 2361 *argv = "-q0"; 2362 2363 /* if -d doesn't have an argument, use 0-99.1 */ 2364 if (ap[1] == 'd' && ap[2] == '\0') 2365 *argv = "-d0-99.1"; 2366 2367#if defined(sony_news) 2368 /* if -E doesn't have an argument, use -EC */ 2369 if (ap[1] == 'E' && ap[2] == '\0') 2370 *argv = "-EC"; 2371 2372 /* if -J doesn't have an argument, use -JJ */ 2373 if (ap[1] == 'J' && ap[2] == '\0') 2374 *argv = "-JJ"; 2375#endif /* defined(sony_news) */ 2376 } 2377} 2378/* 2379** AUTH_WARNING -- specify authorization warning 2380** 2381** Parameters: 2382** e -- the current envelope. 2383** msg -- the text of the message. 2384** args -- arguments to the message. 2385** 2386** Returns: 2387** none. 2388*/ 2389 2390void 2391#ifdef __STDC__ 2392auth_warning(register ENVELOPE *e, const char *msg, ...) 2393#else /* __STDC__ */ 2394auth_warning(e, msg, va_alist) 2395 register ENVELOPE *e; 2396 const char *msg; 2397 va_dcl 2398#endif /* __STDC__ */ 2399{ 2400 char buf[MAXLINE]; 2401 VA_LOCAL_DECL 2402 2403 if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags)) 2404 { 2405 register char *p; 2406 static char hostbuf[48]; 2407 2408 if (hostbuf[0] == '\0') 2409 { 2410 struct hostent *hp; 2411 2412 hp = myhostname(hostbuf, sizeof hostbuf); 2413#if _FFR_FREEHOSTENT && NETINET6 2414 if (hp != NULL) 2415 { 2416 freehostent(hp); 2417 hp = NULL; 2418 } 2419#endif /* _FFR_FREEHOSTENT && NETINET6 */ 2420 } 2421 2422 (void) snprintf(buf, sizeof buf, "%s: ", hostbuf); 2423 p = &buf[strlen(buf)]; 2424 VA_START(msg); 2425 vsnprintf(p, SPACELEFT(buf, p), msg, ap); 2426 VA_END; 2427 addheader("X-Authentication-Warning", buf, 0, &e->e_header); 2428 if (LogLevel > 3) 2429 sm_syslog(LOG_INFO, e->e_id, 2430 "Authentication-Warning: %.400s", 2431 buf); 2432 } 2433} 2434/* 2435** GETEXTENV -- get from external environment 2436** 2437** Parameters: 2438** envar -- the name of the variable to retrieve 2439** 2440** Returns: 2441** The value, if any. 2442*/ 2443 2444char * 2445getextenv(envar) 2446 const char *envar; 2447{ 2448 char **envp; 2449 int l; 2450 2451 l = strlen(envar); 2452 for (envp = ExternalEnviron; *envp != NULL; envp++) 2453 { 2454 if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=') 2455 return &(*envp)[l + 1]; 2456 } 2457 return NULL; 2458} 2459/* 2460** SETUSERENV -- set an environment in the propogated environment 2461** 2462** Parameters: 2463** envar -- the name of the environment variable. 2464** value -- the value to which it should be set. If 2465** null, this is extracted from the incoming 2466** environment. If that is not set, the call 2467** to setuserenv is ignored. 2468** 2469** Returns: 2470** none. 2471*/ 2472 2473void 2474setuserenv(envar, value) 2475 const char *envar; 2476 const char *value; 2477{ 2478 int i, l; 2479 char **evp = UserEnviron; 2480 char *p; 2481 2482 if (value == NULL) 2483 { 2484 value = getextenv(envar); 2485 if (value == NULL) 2486 return; 2487 } 2488 2489 i = strlen(envar) + 1; 2490 l = strlen(value) + i + 1; 2491 p = (char *) xalloc(l); 2492 (void) snprintf(p, l, "%s=%s", envar, value); 2493 2494 while (*evp != NULL && strncmp(*evp, p, i) != 0) 2495 evp++; 2496 if (*evp != NULL) 2497 { 2498 *evp++ = p; 2499 } 2500 else if (evp < &UserEnviron[MAXUSERENVIRON]) 2501 { 2502 *evp++ = p; 2503 *evp = NULL; 2504 } 2505 2506 /* make sure it is in our environment as well */ 2507 if (putenv(p) < 0) 2508 syserr("setuserenv: putenv(%s) failed", p); 2509} 2510/* 2511** DUMPSTATE -- dump state 2512** 2513** For debugging. 2514*/ 2515 2516void 2517dumpstate(when) 2518 char *when; 2519{ 2520 register char *j = macvalue('j', CurEnv); 2521 int rs; 2522 extern int NextMacroId; 2523 2524 sm_syslog(LOG_DEBUG, CurEnv->e_id, 2525 "--- dumping state on %s: $j = %s ---", 2526 when, 2527 j == NULL ? "<NULL>" : j); 2528 if (j != NULL) 2529 { 2530 if (!wordinclass(j, 'w')) 2531 sm_syslog(LOG_DEBUG, CurEnv->e_id, 2532 "*** $j not in $=w ***"); 2533 } 2534 sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren); 2535 sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)\n", 2536 NextMacroId, MAXMACROID); 2537 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---"); 2538 printopenfds(TRUE); 2539 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---"); 2540 mci_dump_all(TRUE); 2541 rs = strtorwset("debug_dumpstate", NULL, ST_FIND); 2542 if (rs > 0) 2543 { 2544 int status; 2545 register char **pvp; 2546 char *pv[MAXATOM + 1]; 2547 2548 pv[0] = NULL; 2549 status = rewrite(pv, rs, 0, CurEnv); 2550 sm_syslog(LOG_DEBUG, CurEnv->e_id, 2551 "--- ruleset debug_dumpstate returns stat %d, pv: ---", 2552 status); 2553 for (pvp = pv; *pvp != NULL; pvp++) 2554 sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp); 2555 } 2556 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---"); 2557} 2558 2559 2560/* ARGSUSED */ 2561SIGFUNC_DECL 2562sigusr1(sig) 2563 int sig; 2564{ 2565 dumpstate("user signal"); 2566 return SIGFUNC_RETURN; 2567} 2568 2569 2570/* ARGSUSED */ 2571SIGFUNC_DECL 2572sighup(sig) 2573 int sig; 2574{ 2575 int i; 2576 extern int DtableSize; 2577 2578 clear_events(); 2579 (void) alarm(0); 2580 if (SaveArgv[0][0] != '/') 2581 { 2582 if (LogLevel > 3) 2583 sm_syslog(LOG_INFO, NOQID, 2584 "could not restart: need full path"); 2585 finis(FALSE, EX_OSFILE); 2586 } 2587 if (LogLevel > 3) 2588 sm_syslog(LOG_INFO, NOQID, "restarting %s %s", 2589 sig == 0 ? "due to control command" : "on signal", 2590 SaveArgv[0]); 2591 2592 /* Control socket restart? */ 2593 if (sig != 0) 2594 (void) releasesignal(SIGHUP); 2595 2596 closecontrolsocket(TRUE); 2597 if (drop_privileges(TRUE) != EX_OK) 2598 { 2599 if (LogLevel > 0) 2600 sm_syslog(LOG_ALERT, NOQID, 2601 "could not set[ug]id(%d, %d): %m", 2602 RunAsUid, RunAsGid); 2603 finis(FALSE, EX_OSERR); 2604 } 2605 2606 /* arrange for all the files to be closed */ 2607 for (i = 3; i < DtableSize; i++) 2608 { 2609 register int j; 2610 2611 if ((j = fcntl(i, F_GETFD, 0)) != -1) 2612 (void) fcntl(i, F_SETFD, j | FD_CLOEXEC); 2613 } 2614 2615 (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 2616 if (LogLevel > 0) 2617 sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %m", 2618 SaveArgv[0]); 2619 finis(FALSE, EX_OSFILE); 2620} 2621/* 2622** DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option 2623** 2624** Parameters: 2625** to_real_uid -- if set, drop to the real uid instead 2626** of the RunAsUser. 2627** 2628** Returns: 2629** EX_OSERR if the setuid failed. 2630** EX_OK otherwise. 2631*/ 2632 2633int 2634drop_privileges(to_real_uid) 2635 bool to_real_uid; 2636{ 2637 int rval = EX_OK; 2638 GIDSET_T emptygidset[1]; 2639 2640 if (tTd(47, 1)) 2641 dprintf("drop_privileges(%d): Real[UG]id=%d:%d, RunAs[UG]id=%d:%d\n", 2642 (int)to_real_uid, (int)RealUid, 2643 (int)RealGid, (int)RunAsUid, (int)RunAsGid); 2644 2645 if (to_real_uid) 2646 { 2647 RunAsUserName = RealUserName; 2648 RunAsUid = RealUid; 2649 RunAsGid = RealGid; 2650 } 2651 2652 /* make sure no one can grab open descriptors for secret files */ 2653 endpwent(); 2654 2655 /* reset group permissions; these can be set later */ 2656 emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid(); 2657 if (setgroups(1, emptygidset) == -1 && geteuid() == 0) 2658 { 2659 syserr("drop_privileges: setgroups(1, %d) failed", 2660 (int)emptygidset[0]); 2661 rval = EX_OSERR; 2662 } 2663 2664 /* reset primary group and user id */ 2665 if ((to_real_uid || RunAsGid != 0) && setgid(RunAsGid) < 0) 2666 { 2667 syserr("drop_privileges: setgid(%d) failed", (int)RunAsGid); 2668 rval = EX_OSERR; 2669 } 2670 if (to_real_uid || RunAsUid != 0) 2671 { 2672 uid_t euid = geteuid(); 2673 2674 if (setuid(RunAsUid) < 0) 2675 { 2676 syserr("drop_privileges: setuid(%d) failed", 2677 (int)RunAsUid); 2678 rval = EX_OSERR; 2679 } 2680 else if (RunAsUid != 0 && setuid(0) == 0) 2681 { 2682 /* 2683 ** Believe it or not, the Linux capability model 2684 ** allows a non-root process to override setuid() 2685 ** on a process running as root and prevent that 2686 ** process from dropping privileges. 2687 */ 2688 2689 syserr("drop_privileges: setuid(0) succeeded (when it should not)"); 2690 rval = EX_OSERR; 2691 } 2692 else if (RunAsUid != euid && setuid(euid) == 0) 2693 { 2694 /* 2695 ** Some operating systems will keep the saved-uid 2696 ** if a non-root effective-uid calls setuid(real-uid) 2697 ** making it possible to set it back again later. 2698 */ 2699 2700 syserr("drop_privileges: Unable to drop non-root set-user-id privileges"); 2701 rval = EX_OSERR; 2702 } 2703 } 2704 if (tTd(47, 5)) 2705 { 2706 dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n", 2707 (int)geteuid(), (int)getuid(), 2708 (int)getegid(), (int)getgid()); 2709 dprintf("drop_privileges: RunAsUser = %d:%d\n", 2710 (int)RunAsUid, (int)RunAsGid); 2711 if (tTd(47, 10)) 2712 dprintf("drop_privileges: rval = %d\n", rval); 2713 } 2714 return rval; 2715} 2716/* 2717** FILL_FD -- make sure a file descriptor has been properly allocated 2718** 2719** Used to make sure that stdin/out/err are allocated on startup 2720** 2721** Parameters: 2722** fd -- the file descriptor to be filled. 2723** where -- a string used for logging. If NULL, this is 2724** being called on startup, and logging should 2725** not be done. 2726** 2727** Returns: 2728** none 2729*/ 2730 2731void 2732fill_fd(fd, where) 2733 int fd; 2734 char *where; 2735{ 2736 int i; 2737 struct stat stbuf; 2738 2739 if (fstat(fd, &stbuf) >= 0 || errno != EBADF) 2740 return; 2741 2742 if (where != NULL) 2743 syserr("fill_fd: %s: fd %d not open", where, fd); 2744 else 2745 MissingFds |= 1 << fd; 2746 i = open("/dev/null", fd == 0 ? O_RDONLY : O_WRONLY, 0666); 2747 if (i < 0) 2748 { 2749 syserr("!fill_fd: %s: cannot open /dev/null", 2750 where == NULL ? "startup" : where); 2751 } 2752 if (fd != i) 2753 { 2754 (void) dup2(i, fd); 2755 (void) close(i); 2756 } 2757} 2758/* 2759** TESTMODELINE -- process a test mode input line 2760** 2761** Parameters: 2762** line -- the input line. 2763** e -- the current environment. 2764** Syntax: 2765** # a comment 2766** .X process X as a configuration line 2767** =X dump a configuration item (such as mailers) 2768** $X dump a macro or class 2769** /X try an activity 2770** X normal process through rule set X 2771*/ 2772 2773static void 2774testmodeline(line, e) 2775 char *line; 2776 ENVELOPE *e; 2777{ 2778 register char *p; 2779 char *q; 2780 auto char *delimptr; 2781 int mid; 2782 int i, rs; 2783 STAB *map; 2784 char **s; 2785 struct rewrite *rw; 2786 ADDRESS a; 2787 static int tryflags = RF_COPYNONE; 2788 char exbuf[MAXLINE]; 2789 extern u_char TokTypeNoC[]; 2790 2791#if _FFR_ADDR_TYPE 2792 define(macid("{addr_type}", NULL), "e r", e); 2793#endif /* _FFR_ADDR_TYPE */ 2794 2795 /* skip leading spaces */ 2796 while (*line == ' ') 2797 line++; 2798 2799 switch (line[0]) 2800 { 2801 case '#': 2802 case '\0': 2803 return; 2804 2805 case '?': 2806 help("-bt", e); 2807 return; 2808 2809 case '.': /* config-style settings */ 2810 switch (line[1]) 2811 { 2812 case 'D': 2813 mid = macid(&line[2], &delimptr); 2814 if (mid == 0) 2815 return; 2816 translate_dollars(delimptr); 2817 define(mid, newstr(delimptr), e); 2818 break; 2819 2820 case 'C': 2821 if (line[2] == '\0') /* not to call syserr() */ 2822 return; 2823 2824 mid = macid(&line[2], &delimptr); 2825 if (mid == 0) 2826 return; 2827 translate_dollars(delimptr); 2828 expand(delimptr, exbuf, sizeof exbuf, e); 2829 p = exbuf; 2830 while (*p != '\0') 2831 { 2832 register char *wd; 2833 char delim; 2834 2835 while (*p != '\0' && isascii(*p) && isspace(*p)) 2836 p++; 2837 wd = p; 2838 while (*p != '\0' && !(isascii(*p) && isspace(*p))) 2839 p++; 2840 delim = *p; 2841 *p = '\0'; 2842 if (wd[0] != '\0') 2843 setclass(mid, wd); 2844 *p = delim; 2845 } 2846 break; 2847 2848 case '\0': 2849 printf("Usage: .[DC]macro value(s)\n"); 2850 break; 2851 2852 default: 2853 printf("Unknown \".\" command %s\n", line); 2854 break; 2855 } 2856 return; 2857 2858 case '=': /* config-style settings */ 2859 switch (line[1]) 2860 { 2861 case 'S': /* dump rule set */ 2862 rs = strtorwset(&line[2], NULL, ST_FIND); 2863 if (rs < 0) 2864 { 2865 printf("Undefined ruleset %s\n", &line[2]); 2866 return; 2867 } 2868 rw = RewriteRules[rs]; 2869 if (rw == NULL) 2870 return; 2871 do 2872 { 2873 (void) putchar('R'); 2874 s = rw->r_lhs; 2875 while (*s != NULL) 2876 { 2877 xputs(*s++); 2878 (void) putchar(' '); 2879 } 2880 (void) putchar('\t'); 2881 (void) putchar('\t'); 2882 s = rw->r_rhs; 2883 while (*s != NULL) 2884 { 2885 xputs(*s++); 2886 (void) putchar(' '); 2887 } 2888 (void) putchar('\n'); 2889 } while ((rw = rw->r_next) != NULL); 2890 break; 2891 2892 case 'M': 2893 for (i = 0; i < MAXMAILERS; i++) 2894 { 2895 if (Mailer[i] != NULL) 2896 printmailer(Mailer[i]); 2897 } 2898 break; 2899 2900 case '\0': 2901 printf("Usage: =Sruleset or =M\n"); 2902 break; 2903 2904 default: 2905 printf("Unknown \"=\" command %s\n", line); 2906 break; 2907 } 2908 return; 2909 2910 case '-': /* set command-line-like opts */ 2911 switch (line[1]) 2912 { 2913 case 'd': 2914 tTflag(&line[2]); 2915 break; 2916 2917 case '\0': 2918 printf("Usage: -d{debug arguments}\n"); 2919 break; 2920 2921 default: 2922 printf("Unknown \"-\" command %s\n", line); 2923 break; 2924 } 2925 return; 2926 2927 case '$': 2928 if (line[1] == '=') 2929 { 2930 mid = macid(&line[2], NULL); 2931 if (mid != 0) 2932 stabapply(dump_class, mid); 2933 return; 2934 } 2935 mid = macid(&line[1], NULL); 2936 if (mid == 0) 2937 return; 2938 p = macvalue(mid, e); 2939 if (p == NULL) 2940 printf("Undefined\n"); 2941 else 2942 { 2943 xputs(p); 2944 printf("\n"); 2945 } 2946 return; 2947 2948 case '/': /* miscellaneous commands */ 2949 p = &line[strlen(line)]; 2950 while (--p >= line && isascii(*p) && isspace(*p)) 2951 *p = '\0'; 2952 p = strpbrk(line, " \t"); 2953 if (p != NULL) 2954 { 2955 while (isascii(*p) && isspace(*p)) 2956 *p++ = '\0'; 2957 } 2958 else 2959 p = ""; 2960 if (line[1] == '\0') 2961 { 2962 printf("Usage: /[canon|map|mx|parse|try|tryflags]\n"); 2963 return; 2964 } 2965 if (strcasecmp(&line[1], "quit") == 0) 2966 { 2967 CurEnv->e_id = NULL; 2968 finis(TRUE, ExitStat); 2969 } 2970 if (strcasecmp(&line[1], "mx") == 0) 2971 { 2972#if NAMED_BIND 2973 /* look up MX records */ 2974 int nmx; 2975 auto int rcode; 2976 char *mxhosts[MAXMXHOSTS + 1]; 2977 2978 if (*p == '\0') 2979 { 2980 printf("Usage: /mx address\n"); 2981 return; 2982 } 2983 nmx = getmxrr(p, mxhosts, NULL, FALSE, &rcode); 2984 printf("getmxrr(%s) returns %d value(s):\n", p, nmx); 2985 for (i = 0; i < nmx; i++) 2986 printf("\t%s\n", mxhosts[i]); 2987#else /* NAMED_BIND */ 2988 printf("No MX code compiled in\n"); 2989#endif /* NAMED_BIND */ 2990 } 2991 else if (strcasecmp(&line[1], "canon") == 0) 2992 { 2993 char host[MAXHOSTNAMELEN]; 2994 2995 if (*p == '\0') 2996 { 2997 printf("Usage: /canon address\n"); 2998 return; 2999 } 3000 else if (strlcpy(host, p, sizeof host) >= sizeof host) 3001 { 3002 printf("Name too long\n"); 3003 return; 3004 } 3005 (void) getcanonname(host, sizeof host, HasWildcardMX); 3006 printf("getcanonname(%s) returns %s\n", p, host); 3007 } 3008 else if (strcasecmp(&line[1], "map") == 0) 3009 { 3010 auto int rcode = EX_OK; 3011 char *av[2]; 3012 3013 if (*p == '\0') 3014 { 3015 printf("Usage: /map mapname key\n"); 3016 return; 3017 } 3018 for (q = p; *q != '\0' && !(isascii(*q) && isspace(*q)); q++) 3019 continue; 3020 if (*q == '\0') 3021 { 3022 printf("No key specified\n"); 3023 return; 3024 } 3025 *q++ = '\0'; 3026 map = stab(p, ST_MAP, ST_FIND); 3027 if (map == NULL) 3028 { 3029 printf("Map named \"%s\" not found\n", p); 3030 return; 3031 } 3032 if (!bitset(MF_OPEN, map->s_map.map_mflags) && 3033 !openmap(&(map->s_map))) 3034 { 3035 printf("Map named \"%s\" not open\n", p); 3036 return; 3037 } 3038 printf("map_lookup: %s (%s) ", p, q); 3039 av[0] = q; 3040 av[1] = NULL; 3041 p = (*map->s_map.map_class->map_lookup) 3042 (&map->s_map, q, av, &rcode); 3043 if (p == NULL) 3044 printf("no match (%d)\n", rcode); 3045 else 3046 printf("returns %s (%d)\n", p, rcode); 3047 } 3048 else if (strcasecmp(&line[1], "try") == 0) 3049 { 3050 MAILER *m; 3051 STAB *st; 3052 auto int rcode = EX_OK; 3053 3054 q = strpbrk(p, " \t"); 3055 if (q != NULL) 3056 { 3057 while (isascii(*q) && isspace(*q)) 3058 *q++ = '\0'; 3059 } 3060 if (q == NULL || *q == '\0') 3061 { 3062 printf("Usage: /try mailer address\n"); 3063 return; 3064 } 3065 st = stab(p, ST_MAILER, ST_FIND); 3066 if (st == NULL) 3067 { 3068 printf("Unknown mailer %s\n", p); 3069 return; 3070 } 3071 m = st->s_mailer; 3072 printf("Trying %s %s address %s for mailer %s\n", 3073 bitset(RF_HEADERADDR, tryflags) ? "header" : "envelope", 3074 bitset(RF_SENDERADDR, tryflags) ? "sender" : "recipient", 3075 q, p); 3076 p = remotename(q, m, tryflags, &rcode, CurEnv); 3077 printf("Rcode = %d, addr = %s\n", 3078 rcode, p == NULL ? "<NULL>" : p); 3079 e->e_to = NULL; 3080 } 3081 else if (strcasecmp(&line[1], "tryflags") == 0) 3082 { 3083 if (*p == '\0') 3084 { 3085 printf("Usage: /tryflags [Hh|Ee][Ss|Rr]\n"); 3086 return; 3087 } 3088 for (; *p != '\0'; p++) 3089 { 3090 switch (*p) 3091 { 3092 case 'H': 3093 case 'h': 3094 tryflags |= RF_HEADERADDR; 3095 break; 3096 3097 case 'E': 3098 case 'e': 3099 tryflags &= ~RF_HEADERADDR; 3100 break; 3101 3102 case 'S': 3103 case 's': 3104 tryflags |= RF_SENDERADDR; 3105 break; 3106 3107 case 'R': 3108 case 'r': 3109 tryflags &= ~RF_SENDERADDR; 3110 break; 3111 } 3112 } 3113#if _FFR_ADDR_TYPE 3114 exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e'; 3115 exbuf[1] = ' '; 3116 exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r'; 3117 exbuf[3] = '\0'; 3118 define(macid("{addr_type}", NULL), newstr(exbuf), e); 3119#endif /* _FFR_ADDR_TYPE */ 3120 } 3121 else if (strcasecmp(&line[1], "parse") == 0) 3122 { 3123 if (*p == '\0') 3124 { 3125 printf("Usage: /parse address\n"); 3126 return; 3127 } 3128 q = crackaddr(p); 3129 printf("Cracked address = "); 3130 xputs(q); 3131 printf("\nParsing %s %s address\n", 3132 bitset(RF_HEADERADDR, tryflags) ? "header" : "envelope", 3133 bitset(RF_SENDERADDR, tryflags) ? "sender" : "recipient"); 3134 if (parseaddr(p, &a, tryflags, '\0', NULL, e) == NULL) 3135 printf("Cannot parse\n"); 3136 else if (a.q_host != NULL && a.q_host[0] != '\0') 3137 printf("mailer %s, host %s, user %s\n", 3138 a.q_mailer->m_name, a.q_host, a.q_user); 3139 else 3140 printf("mailer %s, user %s\n", 3141 a.q_mailer->m_name, a.q_user); 3142 e->e_to = NULL; 3143 } 3144 else 3145 { 3146 printf("Unknown \"/\" command %s\n", line); 3147 } 3148 return; 3149 } 3150 3151 for (p = line; isascii(*p) && isspace(*p); p++) 3152 continue; 3153 q = p; 3154 while (*p != '\0' && !(isascii(*p) && isspace(*p))) 3155 p++; 3156 if (*p == '\0') 3157 { 3158 printf("No address!\n"); 3159 return; 3160 } 3161 *p = '\0'; 3162 if (invalidaddr(p + 1, NULL)) 3163 return; 3164 do 3165 { 3166 register char **pvp; 3167 char pvpbuf[PSBUFSIZE]; 3168 3169 pvp = prescan(++p, ',', pvpbuf, sizeof pvpbuf, 3170 &delimptr, ConfigLevel >= 9 ? TokTypeNoC : NULL); 3171 if (pvp == NULL) 3172 continue; 3173 p = q; 3174 while (*p != '\0') 3175 { 3176 int status; 3177 3178 rs = strtorwset(p, NULL, ST_FIND); 3179 if (rs < 0) 3180 { 3181 printf("Undefined ruleset %s\n", p); 3182 break; 3183 } 3184 status = rewrite(pvp, rs, 0, e); 3185 if (status != EX_OK) 3186 printf("== Ruleset %s (%d) status %d\n", 3187 p, rs, status); 3188 while (*p != '\0' && *p++ != ',') 3189 continue; 3190 } 3191 } while (*(p = delimptr) != '\0'); 3192} 3193 3194static void 3195dump_class(s, id) 3196 register STAB *s; 3197 int id; 3198{ 3199 if (s->s_type != ST_CLASS) 3200 return; 3201 if (bitnset(bitidx(id), s->s_class)) 3202 printf("%s\n", s->s_name); 3203} 3204