deliver.c revision 159609
1/*
2 * Copyright (c) 1998-2006 Sendmail, Inc. and its suppliers.
3 *	All rights reserved.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5 * Copyright (c) 1988, 1993
6 *	The Regents of the University of California.  All rights reserved.
7 *
8 * By using this file, you agree to the terms and conditions set
9 * forth in the LICENSE file which can be found at the top level of
10 * the sendmail distribution.
11 *
12 */
13
14#include <sendmail.h>
15#include <sm/time.h>
16
17SM_RCSID("@(#)$Id: deliver.c,v 8.1003.2.1 2006/05/23 01:32:08 ca Exp $")
18
19#if HASSETUSERCONTEXT
20# include <login_cap.h>
21#endif /* HASSETUSERCONTEXT */
22
23#if NETINET || NETINET6
24# include <arpa/inet.h>
25#endif /* NETINET || NETINET6 */
26
27#if STARTTLS || SASL
28# include "sfsasl.h"
29#endif /* STARTTLS || SASL */
30
31static int	deliver __P((ENVELOPE *, ADDRESS *));
32static void	dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
33static void	mailfiletimeout __P((int));
34static void	endwaittimeout __P((int));
35static int	parse_hostsignature __P((char *, char **, MAILER *));
36static void	sendenvelope __P((ENVELOPE *, int));
37extern MCI	*mci_new __P((SM_RPOOL_T *));
38static int	coloncmp __P((const char *, const char *));
39
40#if STARTTLS
41static int	starttls __P((MAILER *, MCI *, ENVELOPE *));
42static int	endtlsclt __P((MCI *));
43#endif /* STARTTLS */
44# if STARTTLS || SASL
45static bool	iscltflgset __P((ENVELOPE *, int));
46# endif /* STARTTLS || SASL */
47
48/*
49**  SENDALL -- actually send all the messages.
50**
51**	Parameters:
52**		e -- the envelope to send.
53**		mode -- the delivery mode to use.  If SM_DEFAULT, use
54**			the current e->e_sendmode.
55**
56**	Returns:
57**		none.
58**
59**	Side Effects:
60**		Scans the send lists and sends everything it finds.
61**		Delivers any appropriate error messages.
62**		If we are running in a non-interactive mode, takes the
63**			appropriate action.
64*/
65
66void
67sendall(e, mode)
68	ENVELOPE *e;
69	int mode;
70{
71	register ADDRESS *q;
72	char *owner;
73	int otherowners;
74	int save_errno;
75	register ENVELOPE *ee;
76	ENVELOPE *splitenv = NULL;
77	int oldverbose = Verbose;
78	bool somedeliveries = false, expensive = false;
79	pid_t pid;
80
81	/*
82	**  If this message is to be discarded, don't bother sending
83	**  the message at all.
84	*/
85
86	if (bitset(EF_DISCARD, e->e_flags))
87	{
88		if (tTd(13, 1))
89			sm_dprintf("sendall: discarding id %s\n", e->e_id);
90		e->e_flags |= EF_CLRQUEUE;
91		if (LogLevel > 9)
92			logundelrcpts(e, "discarded", 9, true);
93		else if (LogLevel > 4)
94			sm_syslog(LOG_INFO, e->e_id, "discarded");
95		markstats(e, NULL, STATS_REJECT);
96		return;
97	}
98
99	/*
100	**  If we have had global, fatal errors, don't bother sending
101	**  the message at all if we are in SMTP mode.  Local errors
102	**  (e.g., a single address failing) will still cause the other
103	**  addresses to be sent.
104	*/
105
106	if (bitset(EF_FATALERRS, e->e_flags) &&
107	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
108	{
109		e->e_flags |= EF_CLRQUEUE;
110		return;
111	}
112
113	/* determine actual delivery mode */
114	if (mode == SM_DEFAULT)
115	{
116		mode = e->e_sendmode;
117		if (mode != SM_VERIFY && mode != SM_DEFER &&
118		    shouldqueue(e->e_msgpriority, e->e_ctime))
119			mode = SM_QUEUE;
120	}
121
122	if (tTd(13, 1))
123	{
124		sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
125			mode, e->e_id);
126		printaddr(sm_debug_file(), &e->e_from, false);
127		sm_dprintf("\te_flags = ");
128		printenvflags(e);
129		sm_dprintf("sendqueue:\n");
130		printaddr(sm_debug_file(), e->e_sendqueue, true);
131	}
132
133	/*
134	**  Do any preprocessing necessary for the mode we are running.
135	**	Check to make sure the hop count is reasonable.
136	**	Delete sends to the sender in mailing lists.
137	*/
138
139	CurEnv = e;
140	if (tTd(62, 1))
141		checkfds(NULL);
142
143	if (e->e_hopcount > MaxHopCount)
144	{
145		char *recip;
146
147		if (e->e_sendqueue != NULL &&
148		    e->e_sendqueue->q_paddr != NULL)
149			recip = e->e_sendqueue->q_paddr;
150		else
151			recip = "(nobody)";
152
153		errno = 0;
154		queueup(e, WILL_BE_QUEUED(mode), false);
155		e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
156		ExitStat = EX_UNAVAILABLE;
157		syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
158		       e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
159		       RealHostName == NULL ? "localhost" : RealHostName,
160		       recip);
161		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
162		{
163			if (QS_IS_DEAD(q->q_state))
164				continue;
165			q->q_state = QS_BADADDR;
166			q->q_status = "5.4.6";
167			q->q_rstatus = "554 5.4.6 Too many hops";
168		}
169		return;
170	}
171
172	/*
173	**  Do sender deletion.
174	**
175	**	If the sender should be queued up, skip this.
176	**	This can happen if the name server is hosed when you
177	**	are trying to send mail.  The result is that the sender
178	**	is instantiated in the queue as a recipient.
179	*/
180
181	if (!bitset(EF_METOO, e->e_flags) &&
182	    !QS_IS_QUEUEUP(e->e_from.q_state))
183	{
184		if (tTd(13, 5))
185		{
186			sm_dprintf("sendall: QS_SENDER ");
187			printaddr(sm_debug_file(), &e->e_from, false);
188		}
189		e->e_from.q_state = QS_SENDER;
190		(void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
191	}
192
193	/*
194	**  Handle alias owners.
195	**
196	**	We scan up the q_alias chain looking for owners.
197	**	We discard owners that are the same as the return path.
198	*/
199
200	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
201	{
202		register struct address *a;
203
204		for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
205			continue;
206		if (a != NULL)
207			q->q_owner = a->q_owner;
208
209		if (q->q_owner != NULL &&
210		    !QS_IS_DEAD(q->q_state) &&
211		    strcmp(q->q_owner, e->e_from.q_paddr) == 0)
212			q->q_owner = NULL;
213	}
214
215	if (tTd(13, 25))
216	{
217		sm_dprintf("\nAfter first owner pass, sendq =\n");
218		printaddr(sm_debug_file(), e->e_sendqueue, true);
219	}
220
221	owner = "";
222	otherowners = 1;
223	while (owner != NULL && otherowners > 0)
224	{
225		if (tTd(13, 28))
226			sm_dprintf("owner = \"%s\", otherowners = %d\n",
227				   owner, otherowners);
228		owner = NULL;
229		otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
230
231		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
232		{
233			if (tTd(13, 30))
234			{
235				sm_dprintf("Checking ");
236				printaddr(sm_debug_file(), q, false);
237			}
238			if (QS_IS_DEAD(q->q_state))
239			{
240				if (tTd(13, 30))
241					sm_dprintf("    ... QS_IS_DEAD\n");
242				continue;
243			}
244			if (tTd(13, 29) && !tTd(13, 30))
245			{
246				sm_dprintf("Checking ");
247				printaddr(sm_debug_file(), q, false);
248			}
249
250			if (q->q_owner != NULL)
251			{
252				if (owner == NULL)
253				{
254					if (tTd(13, 40))
255						sm_dprintf("    ... First owner = \"%s\"\n",
256							   q->q_owner);
257					owner = q->q_owner;
258				}
259				else if (owner != q->q_owner)
260				{
261					if (strcmp(owner, q->q_owner) == 0)
262					{
263						if (tTd(13, 40))
264							sm_dprintf("    ... Same owner = \"%s\"\n",
265								   owner);
266
267						/* make future comparisons cheap */
268						q->q_owner = owner;
269					}
270					else
271					{
272						if (tTd(13, 40))
273							sm_dprintf("    ... Another owner \"%s\"\n",
274								   q->q_owner);
275						otherowners++;
276					}
277					owner = q->q_owner;
278				}
279				else if (tTd(13, 40))
280					sm_dprintf("    ... Same owner = \"%s\"\n",
281						   owner);
282			}
283			else
284			{
285				if (tTd(13, 40))
286					sm_dprintf("    ... Null owner\n");
287				otherowners++;
288			}
289
290			if (QS_IS_BADADDR(q->q_state))
291			{
292				if (tTd(13, 30))
293					sm_dprintf("    ... QS_IS_BADADDR\n");
294				continue;
295			}
296
297			if (QS_IS_QUEUEUP(q->q_state))
298			{
299				MAILER *m = q->q_mailer;
300
301				/*
302				**  If we have temporary address failures
303				**  (e.g., dns failure) and a fallback MX is
304				**  set, send directly to the fallback MX host.
305				*/
306
307				if (FallbackMX != NULL &&
308				    !wordinclass(FallbackMX, 'w') &&
309				    mode != SM_VERIFY &&
310				    !bitnset(M_NOMX, m->m_flags) &&
311				    strcmp(m->m_mailer, "[IPC]") == 0 &&
312				    m->m_argv[0] != NULL &&
313				    strcmp(m->m_argv[0], "TCP") == 0)
314				{
315					int len;
316					char *p;
317
318					if (tTd(13, 30))
319						sm_dprintf("    ... FallbackMX\n");
320
321					len = strlen(FallbackMX) + 1;
322					p = sm_rpool_malloc_x(e->e_rpool, len);
323					(void) sm_strlcpy(p, FallbackMX, len);
324					q->q_state = QS_OK;
325					q->q_host = p;
326				}
327				else
328				{
329					if (tTd(13, 30))
330						sm_dprintf("    ... QS_IS_QUEUEUP\n");
331					continue;
332				}
333			}
334
335			/*
336			**  If this mailer is expensive, and if we don't
337			**  want to make connections now, just mark these
338			**  addresses and return.  This is useful if we
339			**  want to batch connections to reduce load.  This
340			**  will cause the messages to be queued up, and a
341			**  daemon will come along to send the messages later.
342			*/
343
344			if (NoConnect && !Verbose &&
345			    bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
346			{
347				if (tTd(13, 30))
348					sm_dprintf("    ... expensive\n");
349				q->q_state = QS_QUEUEUP;
350				expensive = true;
351			}
352			else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
353				 QueueLimitId == NULL &&
354				 QueueLimitSender == NULL &&
355				 QueueLimitRecipient == NULL)
356			{
357				if (tTd(13, 30))
358					sm_dprintf("    ... hold\n");
359				q->q_state = QS_QUEUEUP;
360				expensive = true;
361			}
362			else if (QueueMode != QM_QUARANTINE &&
363				 e->e_quarmsg != NULL)
364			{
365				if (tTd(13, 30))
366					sm_dprintf("    ... quarantine: %s\n",
367						   e->e_quarmsg);
368				q->q_state = QS_QUEUEUP;
369				expensive = true;
370			}
371			else
372			{
373				if (tTd(13, 30))
374					sm_dprintf("    ... deliverable\n");
375				somedeliveries = true;
376			}
377		}
378
379		if (owner != NULL && otherowners > 0)
380		{
381			/*
382			**  Split this envelope into two.
383			*/
384
385			ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
386							    sizeof *ee);
387			STRUCTCOPY(*e, *ee);
388			ee->e_message = NULL;
389			ee->e_id = NULL;
390			assign_queueid(ee);
391
392			if (tTd(13, 1))
393				sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
394					   e->e_id, ee->e_id, owner,
395					   otherowners);
396
397			ee->e_header = copyheader(e->e_header, ee->e_rpool);
398			ee->e_sendqueue = copyqueue(e->e_sendqueue,
399						    ee->e_rpool);
400			ee->e_errorqueue = copyqueue(e->e_errorqueue,
401						     ee->e_rpool);
402			ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
403			ee->e_flags |= EF_NORECEIPT;
404			setsender(owner, ee, NULL, '\0', true);
405			if (tTd(13, 5))
406			{
407				sm_dprintf("sendall(split): QS_SENDER ");
408				printaddr(sm_debug_file(), &ee->e_from, false);
409			}
410			ee->e_from.q_state = QS_SENDER;
411			ee->e_dfp = NULL;
412			ee->e_lockfp = NULL;
413			ee->e_xfp = NULL;
414			ee->e_qgrp = e->e_qgrp;
415			ee->e_qdir = e->e_qdir;
416			ee->e_errormode = EM_MAIL;
417			ee->e_sibling = splitenv;
418			ee->e_statmsg = NULL;
419			if (e->e_quarmsg != NULL)
420				ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
421								  e->e_quarmsg);
422			splitenv = ee;
423
424			for (q = e->e_sendqueue; q != NULL; q = q->q_next)
425			{
426				if (q->q_owner == owner)
427				{
428					q->q_state = QS_CLONED;
429					if (tTd(13, 6))
430						sm_dprintf("\t... stripping %s from original envelope\n",
431							   q->q_paddr);
432				}
433			}
434			for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
435			{
436				if (q->q_owner != owner)
437				{
438					q->q_state = QS_CLONED;
439					if (tTd(13, 6))
440						sm_dprintf("\t... dropping %s from cloned envelope\n",
441							   q->q_paddr);
442				}
443				else
444				{
445					/* clear DSN parameters */
446					q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
447					q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
448					if (tTd(13, 6))
449						sm_dprintf("\t... moving %s to cloned envelope\n",
450							   q->q_paddr);
451				}
452			}
453
454			if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
455				dup_queue_file(e, ee, DATAFL_LETTER);
456
457			/*
458			**  Give the split envelope access to the parent
459			**  transcript file for errors obtained while
460			**  processing the recipients (done before the
461			**  envelope splitting).
462			*/
463
464			if (e->e_xfp != NULL)
465				ee->e_xfp = sm_io_dup(e->e_xfp);
466
467			/* failed to dup e->e_xfp, start a new transcript */
468			if (ee->e_xfp == NULL)
469				openxscript(ee);
470
471			if (mode != SM_VERIFY && LogLevel > 4)
472				sm_syslog(LOG_INFO, e->e_id,
473					  "%s: clone: owner=%s",
474					  ee->e_id, owner);
475		}
476	}
477
478	if (owner != NULL)
479	{
480		setsender(owner, e, NULL, '\0', true);
481		if (tTd(13, 5))
482		{
483			sm_dprintf("sendall(owner): QS_SENDER ");
484			printaddr(sm_debug_file(), &e->e_from, false);
485		}
486		e->e_from.q_state = QS_SENDER;
487		e->e_errormode = EM_MAIL;
488		e->e_flags |= EF_NORECEIPT;
489		e->e_flags &= ~EF_FATALERRS;
490	}
491
492	/* if nothing to be delivered, just queue up everything */
493	if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
494	    mode != SM_VERIFY)
495	{
496		time_t now;
497
498		if (tTd(13, 29))
499			sm_dprintf("No deliveries: auto-queuing\n");
500		mode = SM_QUEUE;
501		now = curtime();
502
503		/* treat this as a delivery in terms of counting tries */
504		e->e_dtime = now;
505		if (!expensive)
506			e->e_ntries++;
507		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
508		{
509			ee->e_dtime = now;
510			if (!expensive)
511				ee->e_ntries++;
512		}
513	}
514
515	if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
516	     (mode != SM_VERIFY &&
517	      (SuperSafe == SAFE_REALLY ||
518	       SuperSafe == SAFE_REALLY_POSTMILTER))) &&
519	    (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
520	{
521		bool msync;
522
523		/*
524		**  Be sure everything is instantiated in the queue.
525		**  Split envelopes first in case the machine crashes.
526		**  If the original were done first, we may lose
527		**  recipients.
528		*/
529
530#if !HASFLOCK
531		msync = false;
532#else /* !HASFLOCK */
533		msync = mode == SM_FORK;
534#endif /* !HASFLOCK */
535
536		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
537			queueup(ee, WILL_BE_QUEUED(mode), msync);
538		queueup(e, WILL_BE_QUEUED(mode), msync);
539	}
540
541	if (tTd(62, 10))
542		checkfds("after envelope splitting");
543
544	/*
545	**  If we belong in background, fork now.
546	*/
547
548	if (tTd(13, 20))
549	{
550		sm_dprintf("sendall: final mode = %c\n", mode);
551		if (tTd(13, 21))
552		{
553			sm_dprintf("\n================ Final Send Queue(s) =====================\n");
554			sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
555				   e->e_id, e->e_from.q_paddr);
556			printaddr(sm_debug_file(), e->e_sendqueue, true);
557			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
558			{
559				sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
560					   ee->e_id, ee->e_from.q_paddr);
561				printaddr(sm_debug_file(), ee->e_sendqueue, true);
562			}
563			sm_dprintf("==========================================================\n\n");
564		}
565	}
566	switch (mode)
567	{
568	  case SM_VERIFY:
569		Verbose = 2;
570		break;
571
572	  case SM_QUEUE:
573	  case SM_DEFER:
574#if HASFLOCK
575  queueonly:
576#endif /* HASFLOCK */
577		if (e->e_nrcpts > 0)
578			e->e_flags |= EF_INQUEUE;
579		dropenvelope(e, splitenv != NULL, true);
580		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
581		{
582			if (ee->e_nrcpts > 0)
583				ee->e_flags |= EF_INQUEUE;
584			dropenvelope(ee, false, true);
585		}
586		return;
587
588	  case SM_FORK:
589		if (e->e_xfp != NULL)
590			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
591
592#if !HASFLOCK
593		/*
594		**  Since fcntl locking has the interesting semantic that
595		**  the lock is owned by a process, not by an open file
596		**  descriptor, we have to flush this to the queue, and
597		**  then restart from scratch in the child.
598		*/
599
600		{
601			/* save id for future use */
602			char *qid = e->e_id;
603
604			/* now drop the envelope in the parent */
605			e->e_flags |= EF_INQUEUE;
606			dropenvelope(e, splitenv != NULL, false);
607
608			/* arrange to reacquire lock after fork */
609			e->e_id = qid;
610		}
611
612		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
613		{
614			/* save id for future use */
615			char *qid = ee->e_id;
616
617			/* drop envelope in parent */
618			ee->e_flags |= EF_INQUEUE;
619			dropenvelope(ee, false, false);
620
621			/* and save qid for reacquisition */
622			ee->e_id = qid;
623		}
624
625#endif /* !HASFLOCK */
626
627		/*
628		**  Since the delivery may happen in a child and the parent
629		**  does not wait, the parent may close the maps thereby
630		**  removing any shared memory used by the map.  Therefore,
631		**  close the maps now so the child will dynamically open
632		**  them if necessary.
633		*/
634
635		closemaps(false);
636
637		pid = fork();
638		if (pid < 0)
639		{
640			syserr("deliver: fork 1");
641#if HASFLOCK
642			goto queueonly;
643#else /* HASFLOCK */
644			e->e_id = NULL;
645			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
646				ee->e_id = NULL;
647			return;
648#endif /* HASFLOCK */
649		}
650		else if (pid > 0)
651		{
652#if HASFLOCK
653			/* be sure we leave the temp files to our child */
654			/* close any random open files in the envelope */
655			closexscript(e);
656			if (e->e_dfp != NULL)
657				(void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
658			e->e_dfp = NULL;
659			e->e_flags &= ~EF_HAS_DF;
660
661			/* can't call unlockqueue to avoid unlink of xfp */
662			if (e->e_lockfp != NULL)
663				(void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
664			else
665				syserr("%s: sendall: null lockfp", e->e_id);
666			e->e_lockfp = NULL;
667#endif /* HASFLOCK */
668
669			/* make sure the parent doesn't own the envelope */
670			e->e_id = NULL;
671
672#if USE_DOUBLE_FORK
673			/* catch intermediate zombie */
674			(void) waitfor(pid);
675#endif /* USE_DOUBLE_FORK */
676			return;
677		}
678
679		/* Reset global flags */
680		RestartRequest = NULL;
681		RestartWorkGroup = false;
682		ShutdownRequest = NULL;
683		PendingSignal = 0;
684
685		/*
686		**  Initialize exception stack and default exception
687		**  handler for child process.
688		*/
689
690		sm_exc_newthread(fatal_error);
691
692		/*
693		**  Since we have accepted responsbility for the message,
694		**  change the SIGTERM handler.  intsig() (the old handler)
695		**  would remove the envelope if this was a command line
696		**  message submission.
697		*/
698
699		(void) sm_signal(SIGTERM, SIG_DFL);
700
701#if USE_DOUBLE_FORK
702		/* double fork to avoid zombies */
703		pid = fork();
704		if (pid > 0)
705			exit(EX_OK);
706		save_errno = errno;
707#endif /* USE_DOUBLE_FORK */
708
709		CurrentPid = getpid();
710
711		/* be sure we are immune from the terminal */
712		disconnect(2, e);
713		clearstats();
714
715		/* prevent parent from waiting if there was an error */
716		if (pid < 0)
717		{
718			errno = save_errno;
719			syserr("deliver: fork 2");
720#if HASFLOCK
721			e->e_flags |= EF_INQUEUE;
722#else /* HASFLOCK */
723			e->e_id = NULL;
724#endif /* HASFLOCK */
725			finis(true, true, ExitStat);
726		}
727
728		/* be sure to give error messages in child */
729		QuickAbort = false;
730
731		/*
732		**  Close any cached connections.
733		**
734		**	We don't send the QUIT protocol because the parent
735		**	still knows about the connection.
736		**
737		**	This should only happen when delivering an error
738		**	message.
739		*/
740
741		mci_flush(false, NULL);
742
743#if HASFLOCK
744		break;
745#else /* HASFLOCK */
746
747		/*
748		**  Now reacquire and run the various queue files.
749		*/
750
751		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
752		{
753			ENVELOPE *sibling = ee->e_sibling;
754
755			(void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
756				      false, false, ee);
757			ee->e_sibling = sibling;
758		}
759		(void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
760			      false, false, e);
761		finis(true, true, ExitStat);
762#endif /* HASFLOCK */
763	}
764
765	sendenvelope(e, mode);
766	dropenvelope(e, true, true);
767	for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
768	{
769		CurEnv = ee;
770		if (mode != SM_VERIFY)
771			openxscript(ee);
772		sendenvelope(ee, mode);
773		dropenvelope(ee, true, true);
774	}
775	CurEnv = e;
776
777	Verbose = oldverbose;
778	if (mode == SM_FORK)
779		finis(true, true, ExitStat);
780}
781
782static void
783sendenvelope(e, mode)
784	register ENVELOPE *e;
785	int mode;
786{
787	register ADDRESS *q;
788	bool didany;
789
790	if (tTd(13, 10))
791		sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
792			   e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
793			   e->e_flags);
794	if (LogLevel > 80)
795		sm_syslog(LOG_DEBUG, e->e_id,
796			  "sendenvelope, flags=0x%lx",
797			  e->e_flags);
798
799	/*
800	**  If we have had global, fatal errors, don't bother sending
801	**  the message at all if we are in SMTP mode.  Local errors
802	**  (e.g., a single address failing) will still cause the other
803	**  addresses to be sent.
804	*/
805
806	if (bitset(EF_FATALERRS, e->e_flags) &&
807	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
808	{
809		e->e_flags |= EF_CLRQUEUE;
810		return;
811	}
812
813	/*
814	**  Don't attempt deliveries if we want to bounce now
815	**  or if deliver-by time is exceeded.
816	*/
817
818	if (!bitset(EF_RESPONSE, e->e_flags) &&
819	    (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
820	     (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
821	      curtime() > e->e_ctime + e->e_deliver_by)))
822		return;
823
824	/*
825	**  Run through the list and send everything.
826	**
827	**	Set EF_GLOBALERRS so that error messages during delivery
828	**	result in returned mail.
829	*/
830
831	e->e_nsent = 0;
832	e->e_flags |= EF_GLOBALERRS;
833
834	macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
835	macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
836	didany = false;
837
838	if (!bitset(EF_SPLIT, e->e_flags))
839	{
840		ENVELOPE *oldsib;
841		ENVELOPE *ee;
842
843		/*
844		**  Save old sibling and set it to NULL to avoid
845		**  queueing up the same envelopes again.
846		**  This requires that envelopes in that list have
847		**  been take care of before (or at some other place).
848		*/
849
850		oldsib = e->e_sibling;
851		e->e_sibling = NULL;
852		if (!split_by_recipient(e) &&
853		    bitset(EF_FATALERRS, e->e_flags))
854		{
855			if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
856				e->e_flags |= EF_CLRQUEUE;
857			return;
858		}
859		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
860			queueup(ee, false, true);
861
862		/* clean up */
863		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
864		{
865			/* now unlock the job */
866			closexscript(ee);
867			unlockqueue(ee);
868
869			/* this envelope is marked unused */
870			if (ee->e_dfp != NULL)
871			{
872				(void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
873				ee->e_dfp = NULL;
874			}
875			ee->e_id = NULL;
876			ee->e_flags &= ~EF_HAS_DF;
877		}
878		e->e_sibling = oldsib;
879	}
880
881	/* now run through the queue */
882	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
883	{
884#if XDEBUG
885		char wbuf[MAXNAME + 20];
886
887		(void) sm_snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
888				   MAXNAME, q->q_paddr);
889		checkfd012(wbuf);
890#endif /* XDEBUG */
891		if (mode == SM_VERIFY)
892		{
893			e->e_to = q->q_paddr;
894			if (QS_IS_SENDABLE(q->q_state))
895			{
896				if (q->q_host != NULL && q->q_host[0] != '\0')
897					message("deliverable: mailer %s, host %s, user %s",
898						q->q_mailer->m_name,
899						q->q_host,
900						q->q_user);
901				else
902					message("deliverable: mailer %s, user %s",
903						q->q_mailer->m_name,
904						q->q_user);
905			}
906		}
907		else if (QS_IS_OK(q->q_state))
908		{
909			/*
910			**  Checkpoint the send list every few addresses
911			*/
912
913			if (CheckpointInterval > 0 &&
914			    e->e_nsent >= CheckpointInterval)
915			{
916				queueup(e, false, false);
917				e->e_nsent = 0;
918			}
919			(void) deliver(e, q);
920			didany = true;
921		}
922	}
923	if (didany)
924	{
925		e->e_dtime = curtime();
926		e->e_ntries++;
927	}
928
929#if XDEBUG
930	checkfd012("end of sendenvelope");
931#endif /* XDEBUG */
932}
933
934#if REQUIRES_DIR_FSYNC
935/*
936**  SYNC_DIR -- fsync a directory based on a filename
937**
938**	Parameters:
939**		filename -- path of file
940**		panic -- panic?
941**
942**	Returns:
943**		none
944*/
945
946void
947sync_dir(filename, panic)
948	char *filename;
949	bool panic;
950{
951	int dirfd;
952	char *dirp;
953	char dir[MAXPATHLEN];
954
955	if (!RequiresDirfsync)
956		return;
957
958	/* filesystems which require the directory be synced */
959	dirp = strrchr(filename, '/');
960	if (dirp != NULL)
961	{
962		if (sm_strlcpy(dir, filename, sizeof dir) >= sizeof dir)
963			return;
964		dir[dirp - filename] = '\0';
965		dirp = dir;
966	}
967	else
968		dirp = ".";
969	dirfd = open(dirp, O_RDONLY, 0700);
970	if (tTd(40,32))
971		sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
972			  dirp, dirfd);
973	if (dirfd >= 0)
974	{
975		if (fsync(dirfd) < 0)
976		{
977			if (panic)
978				syserr("!sync_dir: cannot fsync directory %s",
979				       dirp);
980			else if (LogLevel > 1)
981				sm_syslog(LOG_ERR, NOQID,
982					  "sync_dir: cannot fsync directory %s: %s",
983					  dirp, sm_errstring(errno));
984		}
985		(void) close(dirfd);
986	}
987}
988#endif /* REQUIRES_DIR_FSYNC */
989/*
990**  DUP_QUEUE_FILE -- duplicate a queue file into a split queue
991**
992**	Parameters:
993**		e -- the existing envelope
994**		ee -- the new envelope
995**		type -- the queue file type (e.g., DATAFL_LETTER)
996**
997**	Returns:
998**		none
999*/
1000
1001static void
1002dup_queue_file(e, ee, type)
1003	ENVELOPE *e, *ee;
1004	int type;
1005{
1006	char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1007
1008	ee->e_dfp = NULL;
1009	ee->e_xfp = NULL;
1010
1011	/*
1012	**  Make sure both are in the same directory.
1013	*/
1014
1015	(void) sm_strlcpy(f1buf, queuename(e, type), sizeof f1buf);
1016	(void) sm_strlcpy(f2buf, queuename(ee, type), sizeof f2buf);
1017
1018	/* Force the df to disk if it's not there yet */
1019	if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1020	    sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1021	    errno != EINVAL)
1022	{
1023		syserr("!dup_queue_file: can't commit %s", f1buf);
1024		/* NOTREACHED */
1025	}
1026
1027	if (link(f1buf, f2buf) < 0)
1028	{
1029		int save_errno = errno;
1030
1031		syserr("sendall: link(%s, %s)", f1buf, f2buf);
1032		if (save_errno == EEXIST)
1033		{
1034			if (unlink(f2buf) < 0)
1035			{
1036				syserr("!sendall: unlink(%s): permanent",
1037				       f2buf);
1038				/* NOTREACHED */
1039			}
1040			if (link(f1buf, f2buf) < 0)
1041			{
1042				syserr("!sendall: link(%s, %s): permanent",
1043				       f1buf, f2buf);
1044				/* NOTREACHED */
1045			}
1046		}
1047	}
1048	SYNC_DIR(f2buf, true);
1049}
1050/*
1051**  DOFORK -- do a fork, retrying a couple of times on failure.
1052**
1053**	This MUST be a macro, since after a vfork we are running
1054**	two processes on the same stack!!!
1055**
1056**	Parameters:
1057**		none.
1058**
1059**	Returns:
1060**		From a macro???  You've got to be kidding!
1061**
1062**	Side Effects:
1063**		Modifies the ==> LOCAL <== variable 'pid', leaving:
1064**			pid of child in parent, zero in child.
1065**			-1 on unrecoverable error.
1066**
1067**	Notes:
1068**		I'm awfully sorry this looks so awful.  That's
1069**		vfork for you.....
1070*/
1071
1072#define NFORKTRIES	5
1073
1074#ifndef FORK
1075# define FORK	fork
1076#endif /* ! FORK */
1077
1078#define DOFORK(fORKfN) \
1079{\
1080	register int i;\
1081\
1082	for (i = NFORKTRIES; --i >= 0; )\
1083	{\
1084		pid = fORKfN();\
1085		if (pid >= 0)\
1086			break;\
1087		if (i > 0)\
1088			(void) sleep((unsigned) NFORKTRIES - i);\
1089	}\
1090}
1091/*
1092**  DOFORK -- simple fork interface to DOFORK.
1093**
1094**	Parameters:
1095**		none.
1096**
1097**	Returns:
1098**		pid of child in parent.
1099**		zero in child.
1100**		-1 on error.
1101**
1102**	Side Effects:
1103**		returns twice, once in parent and once in child.
1104*/
1105
1106pid_t
1107dofork()
1108{
1109	register pid_t pid = -1;
1110
1111	DOFORK(fork);
1112	return pid;
1113}
1114
1115/*
1116**  COLONCMP -- compare host-signatures up to first ':' or EOS
1117**
1118**	This takes two strings which happen to be host-signatures and
1119**	compares them. If the lowest preference portions of the MX-RR's
1120**	match (up to ':' or EOS, whichever is first), then we have
1121**	match. This is used for coattail-piggybacking messages during
1122**	message delivery.
1123**	If the signatures are the same up to the first ':' the remainder of
1124**	the signatures are then compared with a normal strcmp(). This saves
1125**	re-examining the first part of the signatures.
1126**
1127**	Parameters:
1128**		a - first host-signature
1129**		b - second host-signature
1130**
1131**	Returns:
1132**		HS_MATCH_NO -- no "match".
1133**		HS_MATCH_FIRST -- "match" for the first MX preference
1134**			(up to the first colon (':')).
1135**		HS_MATCH_FULL -- match for the entire MX record.
1136**
1137**	Side Effects:
1138**		none.
1139*/
1140
1141#define HS_MATCH_NO	0
1142#define HS_MATCH_FIRST	1
1143#define HS_MATCH_FULL	2
1144
1145static int
1146coloncmp(a, b)
1147	register const char *a;
1148	register const char *b;
1149{
1150	int ret = HS_MATCH_NO;
1151	int braclev = 0;
1152
1153	while (*a == *b++)
1154	{
1155		/* Need to account for IPv6 bracketed addresses */
1156		if (*a == '[')
1157			braclev++;
1158		else if (*a == ']' && braclev > 0)
1159			braclev--;
1160		else if (*a == ':' && braclev <= 0)
1161		{
1162			ret = HS_MATCH_FIRST;
1163			a++;
1164			break;
1165		}
1166		else if (*a == '\0')
1167			return HS_MATCH_FULL; /* a full match */
1168		a++;
1169	}
1170	if (ret == HS_MATCH_NO &&
1171	    braclev <= 0 &&
1172	    ((*a == '\0' && *(b - 1) == ':') ||
1173	     (*a == ':' && *(b - 1) == '\0')))
1174		return HS_MATCH_FIRST;
1175	if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1176		return HS_MATCH_FULL;
1177
1178	return ret;
1179}
1180
1181/*
1182**  SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1183**
1184**	Parameters:
1185**		e -- envelope
1186**		tried_fallbacksmarthost -- has been tried already? (in/out)
1187**		hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1188**		hbsz -- size of hostbuf
1189**		status -- current delivery status
1190**
1191**	Returns:
1192**		true iff FallbackSmartHost should be tried.
1193*/
1194
1195static bool
1196should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1197	ENVELOPE *e;
1198	bool *tried_fallbacksmarthost;
1199	char *hostbuf;
1200	size_t hbsz;
1201	int status;
1202{
1203	/*
1204	**  If the host was not found or a temporary failure occurred
1205	**  and a FallbackSmartHost is defined (and we have not yet
1206	**  tried it), then make one last try with it as the host.
1207	*/
1208
1209	if ((status == EX_NOHOST || status == EX_TEMPFAIL) &&
1210	    FallbackSmartHost != NULL && !*tried_fallbacksmarthost)
1211	{
1212		*tried_fallbacksmarthost = true;
1213		expand(FallbackSmartHost, hostbuf, hbsz, e);
1214		if (!wordinclass(hostbuf, 'w'))
1215		{
1216			if (tTd(11, 1))
1217				sm_dprintf("one last try with FallbackSmartHost %s\n",
1218					   hostbuf);
1219			return true;
1220		}
1221	}
1222	return false;
1223}
1224/*
1225**  DELIVER -- Deliver a message to a list of addresses.
1226**
1227**	This routine delivers to everyone on the same host as the
1228**	user on the head of the list.  It is clever about mailers
1229**	that don't handle multiple users.  It is NOT guaranteed
1230**	that it will deliver to all these addresses however -- so
1231**	deliver should be called once for each address on the
1232**	list.
1233**	Deliver tries to be as opportunistic as possible about piggybacking
1234**	messages. Some definitions to make understanding easier follow below.
1235**	Piggybacking occurs when an existing connection to a mail host can
1236**	be used to send the same message to more than one recipient at the
1237**	same time. So "no piggybacking" means one message for one recipient
1238**	per connection. "Intentional piggybacking" happens when the
1239**	recipients' host address (not the mail host address) is used to
1240**	attempt piggybacking. Recipients with the same host address
1241**	have the same mail host. "Coincidental piggybacking" relies on
1242**	piggybacking based on all the mail host addresses in the MX-RR. This
1243**	is "coincidental" in the fact it could not be predicted until the
1244**	MX Resource Records for the hosts were obtained and examined. For
1245**	example (preference order and equivalence is important, not values):
1246**		domain1 IN MX 10 mxhost-A
1247**			IN MX 20 mxhost-B
1248**		domain2 IN MX  4 mxhost-A
1249**			IN MX  8 mxhost-B
1250**	Domain1 and domain2 can piggyback the same message to mxhost-A or
1251**	mxhost-B (if mxhost-A cannot be reached).
1252**	"Coattail piggybacking" relaxes the strictness of "coincidental
1253**	piggybacking" in the hope that most significant (lowest value)
1254**	MX preference host(s) can create more piggybacking. For example
1255**	(again, preference order and equivalence is important, not values):
1256**		domain3 IN MX 100 mxhost-C
1257**			IN MX 100 mxhost-D
1258**			IN MX 200 mxhost-E
1259**		domain4 IN MX  50 mxhost-C
1260**			IN MX  50 mxhost-D
1261**			IN MX  80 mxhost-F
1262**	A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1263**	is available. Same with mxhost-D because in both RR's the preference
1264**	value is the same as mxhost-C, respectively.
1265**	So deliver attempts coattail piggybacking when possible. If the
1266**	first MX preference level hosts cannot be used then the piggybacking
1267**	reverts to coincidental piggybacking. Using the above example you
1268**	cannot deliver to mxhost-F for domain3 regardless of preference value.
1269**	("Coattail" from "riding on the coattails of your predecessor" meaning
1270**	gaining benefit from a predecessor effort with no or little addition
1271**	effort. The predecessor here being the preceding MX RR).
1272**
1273**	Parameters:
1274**		e -- the envelope to deliver.
1275**		firstto -- head of the address list to deliver to.
1276**
1277**	Returns:
1278**		zero -- successfully delivered.
1279**		else -- some failure, see ExitStat for more info.
1280**
1281**	Side Effects:
1282**		The standard input is passed off to someone.
1283*/
1284
1285static int
1286deliver(e, firstto)
1287	register ENVELOPE *e;
1288	ADDRESS *firstto;
1289{
1290	char *host;			/* host being sent to */
1291	char *user;			/* user being sent to */
1292	char **pvp;
1293	register char **mvp;
1294	register char *p;
1295	register MAILER *m;		/* mailer for this recipient */
1296	ADDRESS *volatile ctladdr;
1297#if HASSETUSERCONTEXT
1298	ADDRESS *volatile contextaddr = NULL;
1299#endif /* HASSETUSERCONTEXT */
1300	register MCI *volatile mci;
1301	register ADDRESS *SM_NONVOLATILE to = firstto;
1302	volatile bool clever = false;	/* running user smtp to this mailer */
1303	ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1304	int rcode;			/* response code */
1305	SM_NONVOLATILE int lmtp_rcode = EX_OK;
1306	SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1307	SM_NONVOLATILE int hostnum = 0;	/* current MX host index */
1308	char *firstsig;			/* signature of firstto */
1309	volatile pid_t pid = -1;
1310	char *volatile curhost;
1311	SM_NONVOLATILE unsigned short port = 0;
1312	SM_NONVOLATILE time_t enough = 0;
1313#if NETUNIX
1314	char *SM_NONVOLATILE mux_path = NULL;	/* path to UNIX domain socket */
1315#endif /* NETUNIX */
1316	time_t xstart;
1317	bool suidwarn;
1318	bool anyok;			/* at least one address was OK */
1319	SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1320	bool ovr;
1321	bool quarantine;
1322	int strsize;
1323	int rcptcount;
1324	int ret;
1325	static int tobufsize = 0;
1326	static char *tobuf = NULL;
1327	char *rpath;	/* translated return path */
1328	int mpvect[2];
1329	int rpvect[2];
1330	char *mxhosts[MAXMXHOSTS + 1];
1331	char *pv[MAXPV + 1];
1332	char buf[MAXNAME + 1];
1333	char cbuf[MAXPATHLEN];
1334
1335	errno = 0;
1336	if (!QS_IS_OK(to->q_state))
1337		return 0;
1338
1339	suidwarn = geteuid() == 0;
1340
1341	m = to->q_mailer;
1342	host = to->q_host;
1343	CurEnv = e;			/* just in case */
1344	e->e_statmsg = NULL;
1345	SmtpError[0] = '\0';
1346	xstart = curtime();
1347
1348	if (tTd(10, 1))
1349		sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1350			e->e_id, m->m_name, host, to->q_user);
1351	if (tTd(10, 100))
1352		printopenfds(false);
1353
1354	/*
1355	**  Clear {client_*} macros if this is a bounce message to
1356	**  prevent rejection by check_compat ruleset.
1357	*/
1358
1359	if (bitset(EF_RESPONSE, e->e_flags))
1360	{
1361		macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1362		macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1363		macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1364		macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1365		macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1366	}
1367
1368	SM_TRY
1369	{
1370	ADDRESS *skip_back = NULL;
1371
1372	/*
1373	**  Do initial argv setup.
1374	**	Insert the mailer name.  Notice that $x expansion is
1375	**	NOT done on the mailer name.  Then, if the mailer has
1376	**	a picky -f flag, we insert it as appropriate.  This
1377	**	code does not check for 'pv' overflow; this places a
1378	**	manifest lower limit of 4 for MAXPV.
1379	**		The from address rewrite is expected to make
1380	**		the address relative to the other end.
1381	*/
1382
1383	/* rewrite from address, using rewriting rules */
1384	rcode = EX_OK;
1385	if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1386		p = e->e_sender;
1387	else
1388		p = e->e_from.q_paddr;
1389	rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1390	if (strlen(rpath) > MAXSHORTSTR)
1391	{
1392		rpath = shortenstring(rpath, MAXSHORTSTR);
1393
1394		/* avoid bogus errno */
1395		errno = 0;
1396		syserr("remotename: huge return path %s", rpath);
1397	}
1398	rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1399	macdefine(&e->e_macro, A_PERM, 'g', rpath);
1400	macdefine(&e->e_macro, A_PERM, 'h', host);
1401	Errors = 0;
1402	pvp = pv;
1403	*pvp++ = m->m_argv[0];
1404
1405	/* ignore long term host status information if mailer flag W is set */
1406	if (bitnset(M_NOHOSTSTAT, m->m_flags))
1407		IgnoreHostStatus = true;
1408
1409	/* insert -f or -r flag as appropriate */
1410	if (FromFlag &&
1411	    (bitnset(M_FOPT, m->m_flags) ||
1412	     bitnset(M_ROPT, m->m_flags)))
1413	{
1414		if (bitnset(M_FOPT, m->m_flags))
1415			*pvp++ = "-f";
1416		else
1417			*pvp++ = "-r";
1418		*pvp++ = rpath;
1419	}
1420
1421	/*
1422	**  Append the other fixed parts of the argv.  These run
1423	**  up to the first entry containing "$u".  There can only
1424	**  be one of these, and there are only a few more slots
1425	**  in the pv after it.
1426	*/
1427
1428	for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1429	{
1430		/* can't use strchr here because of sign extension problems */
1431		while (*p != '\0')
1432		{
1433			if ((*p++ & 0377) == MACROEXPAND)
1434			{
1435				if (*p == 'u')
1436					break;
1437			}
1438		}
1439
1440		if (*p != '\0')
1441			break;
1442
1443		/* this entry is safe -- go ahead and process it */
1444		expand(*mvp, buf, sizeof buf, e);
1445		*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1446		if (pvp >= &pv[MAXPV - 3])
1447		{
1448			syserr("554 5.3.5 Too many parameters to %s before $u",
1449			       pv[0]);
1450			rcode = -1;
1451			goto cleanup;
1452		}
1453	}
1454
1455	/*
1456	**  If we have no substitution for the user name in the argument
1457	**  list, we know that we must supply the names otherwise -- and
1458	**  SMTP is the answer!!
1459	*/
1460
1461	if (*mvp == NULL)
1462	{
1463		/* running LMTP or SMTP */
1464		clever = true;
1465		*pvp = NULL;
1466	}
1467	else if (bitnset(M_LMTP, m->m_flags))
1468	{
1469		/* not running LMTP */
1470		sm_syslog(LOG_ERR, NULL,
1471			  "Warning: mailer %s: LMTP flag (F=z) turned off",
1472			  m->m_name);
1473		clrbitn(M_LMTP, m->m_flags);
1474	}
1475
1476	/*
1477	**  At this point *mvp points to the argument with $u.  We
1478	**  run through our address list and append all the addresses
1479	**  we can.  If we run out of space, do not fret!  We can
1480	**  always send another copy later.
1481	*/
1482
1483	e->e_to = NULL;
1484	strsize = 2;
1485	rcptcount = 0;
1486	ctladdr = NULL;
1487	if (firstto->q_signature == NULL)
1488		firstto->q_signature = hostsignature(firstto->q_mailer,
1489						     firstto->q_host);
1490	firstsig = firstto->q_signature;
1491
1492	for (; to != NULL; to = to->q_next)
1493	{
1494		/* avoid sending multiple recipients to dumb mailers */
1495		if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1496			break;
1497
1498		/* if already sent or not for this host, don't send */
1499		if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1500			continue;
1501
1502		/*
1503		**  Must be same mailer to keep grouping rcpts.
1504		**  If mailers don't match: continue; sendqueue is not
1505		**  sorted by mailers, so don't break;
1506		*/
1507
1508		if (to->q_mailer != firstto->q_mailer)
1509			continue;
1510
1511		if (to->q_signature == NULL) /* for safety */
1512			to->q_signature = hostsignature(to->q_mailer,
1513							to->q_host);
1514
1515		/*
1516		**  This is for coincidental and tailcoat piggybacking messages
1517		**  to the same mail host. While the signatures are identical
1518		**  (that's the MX-RR's are identical) we can do coincidental
1519		**  piggybacking. We try hard for coattail piggybacking
1520		**  with the same mail host when the next recipient has the
1521		**  same host at lowest preference. It may be that this
1522		**  won't work out, so 'skip_back' is maintained if a backup
1523		**  to coincidental piggybacking or full signature must happen.
1524		*/
1525
1526		ret = firstto == to ? HS_MATCH_FULL :
1527				      coloncmp(to->q_signature, firstsig);
1528		if (ret == HS_MATCH_FULL)
1529			skip_back = to;
1530		else if (ret == HS_MATCH_NO)
1531			break;
1532
1533		if (!clever)
1534		{
1535			/* avoid overflowing tobuf */
1536			strsize += strlen(to->q_paddr) + 1;
1537			if (strsize > TOBUFSIZE)
1538				break;
1539		}
1540
1541		if (++rcptcount > to->q_mailer->m_maxrcpt)
1542			break;
1543
1544		if (tTd(10, 1))
1545		{
1546			sm_dprintf("\nsend to ");
1547			printaddr(sm_debug_file(), to, false);
1548		}
1549
1550		/* compute effective uid/gid when sending */
1551		if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1552# if HASSETUSERCONTEXT
1553			contextaddr = ctladdr = getctladdr(to);
1554# else /* HASSETUSERCONTEXT */
1555			ctladdr = getctladdr(to);
1556# endif /* HASSETUSERCONTEXT */
1557
1558		if (tTd(10, 2))
1559		{
1560			sm_dprintf("ctladdr=");
1561			printaddr(sm_debug_file(), ctladdr, false);
1562		}
1563
1564		user = to->q_user;
1565		e->e_to = to->q_paddr;
1566
1567		/*
1568		**  Check to see that these people are allowed to
1569		**  talk to each other.
1570		**  Check also for overflow of e_msgsize.
1571		*/
1572
1573		if (m->m_maxsize != 0 &&
1574		    (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1575		{
1576			e->e_flags |= EF_NO_BODY_RETN;
1577			if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1578				to->q_status = "5.2.3";
1579			else
1580				to->q_status = "5.3.4";
1581
1582			/* set to->q_rstatus = NULL; or to the following? */
1583			usrerrenh(to->q_status,
1584				  "552 Message is too large; %ld bytes max",
1585				  m->m_maxsize);
1586			markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1587			giveresponse(EX_UNAVAILABLE, to->q_status, m,
1588				     NULL, ctladdr, xstart, e, to);
1589			continue;
1590		}
1591		SM_SET_H_ERRNO(0);
1592		ovr = true;
1593
1594		/* do config file checking of compatibility */
1595		quarantine = (e->e_quarmsg != NULL);
1596		rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1597				e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1598				e->e_id);
1599		if (rcode == EX_OK)
1600		{
1601			/* do in-code checking if not discarding */
1602			if (!bitset(EF_DISCARD, e->e_flags))
1603			{
1604				rcode = checkcompat(to, e);
1605				ovr = false;
1606			}
1607		}
1608		if (rcode != EX_OK)
1609		{
1610			markfailure(e, to, NULL, rcode, ovr);
1611			giveresponse(rcode, to->q_status, m,
1612				     NULL, ctladdr, xstart, e, to);
1613			continue;
1614		}
1615		if (!quarantine && e->e_quarmsg != NULL)
1616		{
1617			/*
1618			**  check_compat or checkcompat() has tried
1619			**  to quarantine but that isn't supported.
1620			**  Revert the attempt.
1621			*/
1622
1623			e->e_quarmsg = NULL;
1624			macdefine(&e->e_macro, A_PERM,
1625				  macid("{quarantine}"), "");
1626		}
1627		if (bitset(EF_DISCARD, e->e_flags))
1628		{
1629			if (tTd(10, 5))
1630			{
1631				sm_dprintf("deliver: discarding recipient ");
1632				printaddr(sm_debug_file(), to, false);
1633			}
1634
1635			/* pretend the message was sent */
1636			/* XXX should we log something here? */
1637			to->q_state = QS_DISCARDED;
1638
1639			/*
1640			**  Remove discard bit to prevent discard of
1641			**  future recipients.  This is safe because the
1642			**  true "global discard" has been handled before
1643			**  we get here.
1644			*/
1645
1646			e->e_flags &= ~EF_DISCARD;
1647			continue;
1648		}
1649
1650		/*
1651		**  Strip quote bits from names if the mailer is dumb
1652		**	about them.
1653		*/
1654
1655		if (bitnset(M_STRIPQ, m->m_flags))
1656		{
1657			stripquotes(user);
1658			stripquotes(host);
1659		}
1660
1661		/*
1662		**  Strip all leading backslashes if requested and the
1663		**  next character is alphanumerical (the latter can
1664		**  probably relaxed a bit, see RFC2821).
1665		*/
1666
1667		if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1668			stripbackslash(user);
1669
1670		/* hack attack -- delivermail compatibility */
1671		if (m == ProgMailer && *user == '|')
1672			user++;
1673
1674		/*
1675		**  If an error message has already been given, don't
1676		**	bother to send to this address.
1677		**
1678		**	>>>>>>>>>> This clause assumes that the local mailer
1679		**	>> NOTE >> cannot do any further aliasing; that
1680		**	>>>>>>>>>> function is subsumed by sendmail.
1681		*/
1682
1683		if (!QS_IS_OK(to->q_state))
1684			continue;
1685
1686		/*
1687		**  See if this user name is "special".
1688		**	If the user name has a slash in it, assume that this
1689		**	is a file -- send it off without further ado.  Note
1690		**	that this type of addresses is not processed along
1691		**	with the others, so we fudge on the To person.
1692		*/
1693
1694		if (strcmp(m->m_mailer, "[FILE]") == 0)
1695		{
1696			macdefine(&e->e_macro, A_PERM, 'u', user);
1697			p = to->q_home;
1698			if (p == NULL && ctladdr != NULL)
1699				p = ctladdr->q_home;
1700			macdefine(&e->e_macro, A_PERM, 'z', p);
1701			expand(m->m_argv[1], buf, sizeof buf, e);
1702			if (strlen(buf) > 0)
1703				rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1704			else
1705			{
1706				syserr("empty filename specification for mailer %s",
1707				       m->m_name);
1708				rcode = EX_CONFIG;
1709			}
1710			giveresponse(rcode, to->q_status, m, NULL,
1711				     ctladdr, xstart, e, to);
1712			markfailure(e, to, NULL, rcode, true);
1713			e->e_nsent++;
1714			if (rcode == EX_OK)
1715			{
1716				to->q_state = QS_SENT;
1717				if (bitnset(M_LOCALMAILER, m->m_flags) &&
1718				    bitset(QPINGONSUCCESS, to->q_flags))
1719				{
1720					to->q_flags |= QDELIVERED;
1721					to->q_status = "2.1.5";
1722					(void) sm_io_fprintf(e->e_xfp,
1723							     SM_TIME_DEFAULT,
1724							     "%s... Successfully delivered\n",
1725							     to->q_paddr);
1726				}
1727			}
1728			to->q_statdate = curtime();
1729			markstats(e, to, STATS_NORMAL);
1730			continue;
1731		}
1732
1733		/*
1734		**  Address is verified -- add this user to mailer
1735		**  argv, and add it to the print list of recipients.
1736		*/
1737
1738		/* link together the chain of recipients */
1739		to->q_tchain = tochain;
1740		tochain = to;
1741		e->e_to = "[CHAIN]";
1742
1743		macdefine(&e->e_macro, A_PERM, 'u', user);  /* to user */
1744		p = to->q_home;
1745		if (p == NULL && ctladdr != NULL)
1746			p = ctladdr->q_home;
1747		macdefine(&e->e_macro, A_PERM, 'z', p);  /* user's home */
1748
1749		/* set the ${dsn_notify} macro if applicable */
1750		if (bitset(QHASNOTIFY, to->q_flags))
1751		{
1752			char notify[MAXLINE];
1753
1754			notify[0] = '\0';
1755			if (bitset(QPINGONSUCCESS, to->q_flags))
1756				(void) sm_strlcat(notify, "SUCCESS,",
1757						  sizeof notify);
1758			if (bitset(QPINGONFAILURE, to->q_flags))
1759				(void) sm_strlcat(notify, "FAILURE,",
1760						  sizeof notify);
1761			if (bitset(QPINGONDELAY, to->q_flags))
1762				(void) sm_strlcat(notify, "DELAY,",
1763						  sizeof notify);
1764
1765			/* Set to NEVER or drop trailing comma */
1766			if (notify[0] == '\0')
1767				(void) sm_strlcat(notify, "NEVER",
1768						  sizeof notify);
1769			else
1770				notify[strlen(notify) - 1] = '\0';
1771
1772			macdefine(&e->e_macro, A_TEMP,
1773				macid("{dsn_notify}"), notify);
1774		}
1775		else
1776			macdefine(&e->e_macro, A_PERM,
1777				macid("{dsn_notify}"), NULL);
1778
1779		/*
1780		**  Expand out this user into argument list.
1781		*/
1782
1783		if (!clever)
1784		{
1785			expand(*mvp, buf, sizeof buf, e);
1786			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1787			if (pvp >= &pv[MAXPV - 2])
1788			{
1789				/* allow some space for trailing parms */
1790				break;
1791			}
1792		}
1793	}
1794
1795	/* see if any addresses still exist */
1796	if (tochain == NULL)
1797	{
1798		rcode = 0;
1799		goto cleanup;
1800	}
1801
1802	/* print out messages as full list */
1803	strsize = 1;
1804	for (to = tochain; to != NULL; to = to->q_tchain)
1805		strsize += strlen(to->q_paddr) + 1;
1806	if (strsize < TOBUFSIZE)
1807		strsize = TOBUFSIZE;
1808	if (strsize > tobufsize)
1809	{
1810		SM_FREE_CLR(tobuf);
1811		tobuf = sm_pmalloc_x(strsize);
1812		tobufsize = strsize;
1813	}
1814	p = tobuf;
1815	*p = '\0';
1816	for (to = tochain; to != NULL; to = to->q_tchain)
1817	{
1818		(void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1819				   ",", to->q_paddr);
1820		p += strlen(p);
1821	}
1822	e->e_to = tobuf + 1;
1823
1824	/*
1825	**  Fill out any parameters after the $u parameter.
1826	*/
1827
1828	if (!clever)
1829	{
1830		while (*++mvp != NULL)
1831		{
1832			expand(*mvp, buf, sizeof buf, e);
1833			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1834			if (pvp >= &pv[MAXPV])
1835				syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1836				       pv[0]);
1837		}
1838	}
1839	*pvp++ = NULL;
1840
1841	/*
1842	**  Call the mailer.
1843	**	The argument vector gets built, pipes
1844	**	are created as necessary, and we fork & exec as
1845	**	appropriate.
1846	**	If we are running SMTP, we just need to clean up.
1847	*/
1848
1849	/* XXX this seems a bit wierd */
1850	if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1851	    bitset(QGOODUID, e->e_from.q_flags))
1852		ctladdr = &e->e_from;
1853
1854#if NAMED_BIND
1855	if (ConfigLevel < 2)
1856		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
1857#endif /* NAMED_BIND */
1858
1859	if (tTd(11, 1))
1860	{
1861		sm_dprintf("openmailer:");
1862		printav(sm_debug_file(), pv);
1863	}
1864	errno = 0;
1865	SM_SET_H_ERRNO(0);
1866	CurHostName = NULL;
1867
1868	/*
1869	**  Deal with the special case of mail handled through an IPC
1870	**  connection.
1871	**	In this case we don't actually fork.  We must be
1872	**	running SMTP for this to work.  We will return a
1873	**	zero pid to indicate that we are running IPC.
1874	**  We also handle a debug version that just talks to stdin/out.
1875	*/
1876
1877	curhost = NULL;
1878	SmtpPhase = NULL;
1879	mci = NULL;
1880
1881#if XDEBUG
1882	{
1883		char wbuf[MAXLINE];
1884
1885		/* make absolutely certain 0, 1, and 2 are in use */
1886		(void) sm_snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1887				   shortenstring(e->e_to, MAXSHORTSTR),
1888				   m->m_name);
1889		checkfd012(wbuf);
1890	}
1891#endif /* XDEBUG */
1892
1893	/* check for 8-bit available */
1894	if (bitset(EF_HAS8BIT, e->e_flags) &&
1895	    bitnset(M_7BITS, m->m_flags) &&
1896	    (bitset(EF_DONT_MIME, e->e_flags) ||
1897	     !(bitset(MM_MIME8BIT, MimeMode) ||
1898	       (bitset(EF_IS_MIME, e->e_flags) &&
1899		bitset(MM_CVTMIME, MimeMode)))))
1900	{
1901		e->e_status = "5.6.3";
1902		usrerrenh(e->e_status,
1903			  "554 Cannot send 8-bit data to 7-bit destination");
1904		rcode = EX_DATAERR;
1905		goto give_up;
1906	}
1907
1908	if (tTd(62, 8))
1909		checkfds("before delivery");
1910
1911	/* check for Local Person Communication -- not for mortals!!! */
1912	if (strcmp(m->m_mailer, "[LPC]") == 0)
1913	{
1914		if (clever)
1915		{
1916			/* flush any expired connections */
1917			(void) mci_scan(NULL);
1918
1919			/* try to get a cached connection or just a slot */
1920			mci = mci_get(m->m_name, m);
1921			if (mci->mci_host == NULL)
1922				mci->mci_host = m->m_name;
1923			CurHostName = mci->mci_host;
1924			if (mci->mci_state != MCIS_CLOSED)
1925			{
1926				message("Using cached SMTP/LPC connection for %s...",
1927					m->m_name);
1928				mci->mci_deliveries++;
1929				goto do_transfer;
1930			}
1931		}
1932		else
1933		{
1934			mci = mci_new(e->e_rpool);
1935		}
1936		mci->mci_in = smioin;
1937		mci->mci_out = smioout;
1938		mci->mci_mailer = m;
1939		mci->mci_host = m->m_name;
1940		if (clever)
1941		{
1942			mci->mci_state = MCIS_OPENING;
1943			mci_cache(mci);
1944		}
1945		else
1946			mci->mci_state = MCIS_OPEN;
1947	}
1948	else if (strcmp(m->m_mailer, "[IPC]") == 0)
1949	{
1950		register int i;
1951
1952		if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1953		{
1954			syserr("null destination for %s mailer", m->m_mailer);
1955			rcode = EX_CONFIG;
1956			goto give_up;
1957		}
1958
1959# if NETUNIX
1960		if (strcmp(pv[0], "FILE") == 0)
1961		{
1962			curhost = CurHostName = "localhost";
1963			mux_path = pv[1];
1964		}
1965		else
1966# endif /* NETUNIX */
1967		{
1968			CurHostName = pv[1];
1969			curhost = hostsignature(m, pv[1]);
1970		}
1971
1972		if (curhost == NULL || curhost[0] == '\0')
1973		{
1974			syserr("null host signature for %s", pv[1]);
1975			rcode = EX_CONFIG;
1976			goto give_up;
1977		}
1978
1979		if (!clever)
1980		{
1981			syserr("554 5.3.5 non-clever IPC");
1982			rcode = EX_CONFIG;
1983			goto give_up;
1984		}
1985		if (pv[2] != NULL
1986# if NETUNIX
1987		    && mux_path == NULL
1988# endif /* NETUNIX */
1989		    )
1990		{
1991			port = htons((unsigned short) atoi(pv[2]));
1992			if (port == 0)
1993			{
1994# ifdef NO_GETSERVBYNAME
1995				syserr("Invalid port number: %s", pv[2]);
1996# else /* NO_GETSERVBYNAME */
1997				struct servent *sp = getservbyname(pv[2], "tcp");
1998
1999				if (sp == NULL)
2000					syserr("Service %s unknown", pv[2]);
2001				else
2002					port = sp->s_port;
2003# endif /* NO_GETSERVBYNAME */
2004			}
2005		}
2006
2007		nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2008		if (TimeOuts.to_aconnect > 0)
2009			enough = curtime() + TimeOuts.to_aconnect;
2010tryhost:
2011		while (hostnum < nummxhosts)
2012		{
2013			char sep = ':';
2014			char *endp;
2015			static char hostbuf[MAXNAME + 1];
2016			bool tried_fallbacksmarthost = false;
2017
2018# if NETINET6
2019			if (*mxhosts[hostnum] == '[')
2020			{
2021				endp = strchr(mxhosts[hostnum] + 1, ']');
2022				if (endp != NULL)
2023					endp = strpbrk(endp + 1, ":,");
2024			}
2025			else
2026				endp = strpbrk(mxhosts[hostnum], ":,");
2027# else /* NETINET6 */
2028			endp = strpbrk(mxhosts[hostnum], ":,");
2029# endif /* NETINET6 */
2030			if (endp != NULL)
2031			{
2032				sep = *endp;
2033				*endp = '\0';
2034			}
2035
2036			if (hostnum == 1 && skip_back != NULL)
2037			{
2038				/*
2039				**  Coattail piggybacking is no longer an
2040				**  option with the mail host next to be tried
2041				**  no longer the lowest MX preference
2042				**  (hostnum == 1 meaning we're on the second
2043				**  preference). We do not try to coattail
2044				**  piggyback more than the first MX preference.
2045				**  Revert 'tochain' to last location for
2046				**  coincidental piggybacking. This works this
2047				**  easily because the q_tchain kept getting
2048				**  added to the top of the linked list.
2049				*/
2050
2051				tochain = skip_back;
2052			}
2053
2054			if (*mxhosts[hostnum] == '\0')
2055			{
2056				syserr("deliver: null host name in signature");
2057				hostnum++;
2058				if (endp != NULL)
2059					*endp = sep;
2060				continue;
2061			}
2062			(void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2063					  sizeof hostbuf);
2064			hostnum++;
2065			if (endp != NULL)
2066				*endp = sep;
2067
2068  one_last_try:
2069			/* see if we already know that this host is fried */
2070			CurHostName = hostbuf;
2071			mci = mci_get(hostbuf, m);
2072			if (mci->mci_state != MCIS_CLOSED)
2073			{
2074				char *type;
2075
2076				if (tTd(11, 1))
2077				{
2078					sm_dprintf("openmailer: ");
2079					mci_dump(sm_debug_file(), mci, false);
2080				}
2081				CurHostName = mci->mci_host;
2082				if (bitnset(M_LMTP, m->m_flags))
2083					type = "L";
2084				else if (bitset(MCIF_ESMTP, mci->mci_flags))
2085					type = "ES";
2086				else
2087					type = "S";
2088				message("Using cached %sMTP connection to %s via %s...",
2089					type, hostbuf, m->m_name);
2090				mci->mci_deliveries++;
2091				break;
2092			}
2093			mci->mci_mailer = m;
2094			if (mci->mci_exitstat != EX_OK)
2095			{
2096				if (mci->mci_exitstat == EX_TEMPFAIL)
2097					goodmxfound = true;
2098
2099				/* Try FallbackSmartHost? */
2100				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2101						    hostbuf, sizeof hostbuf,
2102						    mci->mci_exitstat))
2103					goto one_last_try;
2104
2105				continue;
2106			}
2107
2108			if (mci_lock_host(mci) != EX_OK)
2109			{
2110				mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2111				goodmxfound = true;
2112				continue;
2113			}
2114
2115			/* try the connection */
2116			sm_setproctitle(true, e, "%s %s: %s",
2117					qid_printname(e),
2118					hostbuf, "user open");
2119# if NETUNIX
2120			if (mux_path != NULL)
2121			{
2122				message("Connecting to %s via %s...",
2123					mux_path, m->m_name);
2124				i = makeconnection_ds((char *) mux_path, mci);
2125			}
2126			else
2127# endif /* NETUNIX */
2128			{
2129				if (port == 0)
2130					message("Connecting to %s via %s...",
2131						hostbuf, m->m_name);
2132				else
2133					message("Connecting to %s port %d via %s...",
2134						hostbuf, ntohs(port),
2135						m->m_name);
2136				i = makeconnection(hostbuf, port, mci, e,
2137						   enough);
2138			}
2139			mci->mci_errno = errno;
2140			mci->mci_lastuse = curtime();
2141			mci->mci_deliveries = 0;
2142			mci->mci_exitstat = i;
2143# if NAMED_BIND
2144			mci->mci_herrno = h_errno;
2145# endif /* NAMED_BIND */
2146
2147			/*
2148			**  Have we tried long enough to get a connection?
2149			**	If yes, skip to the fallback MX hosts
2150			**	(if existent).
2151			*/
2152
2153			if (enough > 0 && mci->mci_lastuse >= enough)
2154			{
2155				int h;
2156# if NAMED_BIND
2157				extern int NumFallbackMXHosts;
2158# else /* NAMED_BIND */
2159				const int NumFallbackMXHosts = 0;
2160# endif /* NAMED_BIND */
2161
2162				if (hostnum < nummxhosts && LogLevel > 9)
2163					sm_syslog(LOG_INFO, e->e_id,
2164						  "Timeout.to_aconnect occurred before exhausting all addresses");
2165
2166				/* turn off timeout if fallback available */
2167				if (NumFallbackMXHosts > 0)
2168					enough = 0;
2169
2170				/* skip to a fallback MX host */
2171				h = nummxhosts - NumFallbackMXHosts;
2172				if (hostnum < h)
2173					hostnum = h;
2174			}
2175			if (i == EX_OK)
2176			{
2177				goodmxfound = true;
2178				markstats(e, firstto, STATS_CONNECT);
2179				mci->mci_state = MCIS_OPENING;
2180				mci_cache(mci);
2181				if (TrafficLogFile != NULL)
2182					(void) sm_io_fprintf(TrafficLogFile,
2183							     SM_TIME_DEFAULT,
2184							     "%05d === CONNECT %s\n",
2185							     (int) CurrentPid,
2186							     hostbuf);
2187				break;
2188			}
2189			else
2190			{
2191				/* Try FallbackSmartHost? */
2192				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2193						    hostbuf, sizeof hostbuf, i))
2194					goto one_last_try;
2195
2196				if (tTd(11, 1))
2197					sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2198						   i, errno);
2199				if (i == EX_TEMPFAIL)
2200					goodmxfound = true;
2201				mci_unlock_host(mci);
2202			}
2203
2204			/* enter status of this host */
2205			setstat(i);
2206
2207			/* should print some message here for -v mode */
2208		}
2209		if (mci == NULL)
2210		{
2211			syserr("deliver: no host name");
2212			rcode = EX_SOFTWARE;
2213			goto give_up;
2214		}
2215		mci->mci_pid = 0;
2216	}
2217	else
2218	{
2219		/* flush any expired connections */
2220		(void) mci_scan(NULL);
2221		mci = NULL;
2222
2223		if (bitnset(M_LMTP, m->m_flags))
2224		{
2225			/* try to get a cached connection */
2226			mci = mci_get(m->m_name, m);
2227			if (mci->mci_host == NULL)
2228				mci->mci_host = m->m_name;
2229			CurHostName = mci->mci_host;
2230			if (mci->mci_state != MCIS_CLOSED)
2231			{
2232				message("Using cached LMTP connection for %s...",
2233					m->m_name);
2234				mci->mci_deliveries++;
2235				goto do_transfer;
2236			}
2237		}
2238
2239		/* announce the connection to verbose listeners */
2240		if (host == NULL || host[0] == '\0')
2241			message("Connecting to %s...", m->m_name);
2242		else
2243			message("Connecting to %s via %s...", host, m->m_name);
2244		if (TrafficLogFile != NULL)
2245		{
2246			char **av;
2247
2248			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2249					     "%05d === EXEC", (int) CurrentPid);
2250			for (av = pv; *av != NULL; av++)
2251				(void) sm_io_fprintf(TrafficLogFile,
2252						     SM_TIME_DEFAULT, " %s",
2253						     *av);
2254			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2255					     "\n");
2256		}
2257
2258#if XDEBUG
2259		checkfd012("before creating mail pipe");
2260#endif /* XDEBUG */
2261
2262		/* create a pipe to shove the mail through */
2263		if (pipe(mpvect) < 0)
2264		{
2265			syserr("%s... openmailer(%s): pipe (to mailer)",
2266			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2267			if (tTd(11, 1))
2268				sm_dprintf("openmailer: NULL\n");
2269			rcode = EX_OSERR;
2270			goto give_up;
2271		}
2272
2273#if XDEBUG
2274		/* make sure we didn't get one of the standard I/O files */
2275		if (mpvect[0] < 3 || mpvect[1] < 3)
2276		{
2277			syserr("%s... openmailer(%s): bogus mpvect %d %d",
2278			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2279			       mpvect[0], mpvect[1]);
2280			printopenfds(true);
2281			if (tTd(11, 1))
2282				sm_dprintf("openmailer: NULL\n");
2283			rcode = EX_OSERR;
2284			goto give_up;
2285		}
2286
2287		/* make sure system call isn't dead meat */
2288		checkfdopen(mpvect[0], "mpvect[0]");
2289		checkfdopen(mpvect[1], "mpvect[1]");
2290		if (mpvect[0] == mpvect[1] ||
2291		    (e->e_lockfp != NULL &&
2292		     (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2293						 NULL) ||
2294		      mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2295						 NULL))))
2296		{
2297			if (e->e_lockfp == NULL)
2298				syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2299				       shortenstring(e->e_to, MAXSHORTSTR),
2300				       m->m_name, mpvect[0], mpvect[1]);
2301			else
2302				syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2303				       shortenstring(e->e_to, MAXSHORTSTR),
2304				       m->m_name, mpvect[0], mpvect[1],
2305				       sm_io_getinfo(e->e_lockfp,
2306						     SM_IO_WHAT_FD, NULL));
2307		}
2308#endif /* XDEBUG */
2309
2310		/* create a return pipe */
2311		if (pipe(rpvect) < 0)
2312		{
2313			syserr("%s... openmailer(%s): pipe (from mailer)",
2314			       shortenstring(e->e_to, MAXSHORTSTR),
2315			       m->m_name);
2316			(void) close(mpvect[0]);
2317			(void) close(mpvect[1]);
2318			if (tTd(11, 1))
2319				sm_dprintf("openmailer: NULL\n");
2320			rcode = EX_OSERR;
2321			goto give_up;
2322		}
2323#if XDEBUG
2324		checkfdopen(rpvect[0], "rpvect[0]");
2325		checkfdopen(rpvect[1], "rpvect[1]");
2326#endif /* XDEBUG */
2327
2328		/*
2329		**  Actually fork the mailer process.
2330		**	DOFORK is clever about retrying.
2331		**
2332		**	Dispose of SIGCHLD signal catchers that may be laying
2333		**	around so that endmailer will get it.
2334		*/
2335
2336		if (e->e_xfp != NULL)	/* for debugging */
2337			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2338		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2339		(void) sm_signal(SIGCHLD, SIG_DFL);
2340
2341
2342		DOFORK(FORK);
2343		/* pid is set by DOFORK */
2344
2345		if (pid < 0)
2346		{
2347			/* failure */
2348			syserr("%s... openmailer(%s): cannot fork",
2349			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2350			(void) close(mpvect[0]);
2351			(void) close(mpvect[1]);
2352			(void) close(rpvect[0]);
2353			(void) close(rpvect[1]);
2354			if (tTd(11, 1))
2355				sm_dprintf("openmailer: NULL\n");
2356			rcode = EX_OSERR;
2357			goto give_up;
2358		}
2359		else if (pid == 0)
2360		{
2361			int save_errno;
2362			int sff;
2363			int new_euid = NO_UID;
2364			int new_ruid = NO_UID;
2365			int new_gid = NO_GID;
2366			char *user = NULL;
2367			struct stat stb;
2368			extern int DtableSize;
2369
2370			CurrentPid = getpid();
2371
2372			/* clear the events to turn off SIGALRMs */
2373			sm_clear_events();
2374
2375			/* Reset global flags */
2376			RestartRequest = NULL;
2377			RestartWorkGroup = false;
2378			ShutdownRequest = NULL;
2379			PendingSignal = 0;
2380
2381			if (e->e_lockfp != NULL)
2382				(void) close(sm_io_getinfo(e->e_lockfp,
2383							   SM_IO_WHAT_FD,
2384							   NULL));
2385
2386			/* child -- set up input & exec mailer */
2387			(void) sm_signal(SIGALRM, sm_signal_noop);
2388			(void) sm_signal(SIGCHLD, SIG_DFL);
2389			(void) sm_signal(SIGHUP, SIG_IGN);
2390			(void) sm_signal(SIGINT, SIG_IGN);
2391			(void) sm_signal(SIGTERM, SIG_DFL);
2392# ifdef SIGUSR1
2393			(void) sm_signal(SIGUSR1, sm_signal_noop);
2394# endif /* SIGUSR1 */
2395
2396			if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2397				stb.st_mode = 0;
2398
2399# if HASSETUSERCONTEXT
2400			/*
2401			**  Set user resources.
2402			*/
2403
2404			if (contextaddr != NULL)
2405			{
2406				int sucflags;
2407				struct passwd *pwd;
2408
2409				if (contextaddr->q_ruser != NULL)
2410					pwd = sm_getpwnam(contextaddr->q_ruser);
2411				else
2412					pwd = sm_getpwnam(contextaddr->q_user);
2413				sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2414#ifdef LOGIN_SETMAC
2415				sucflags |= LOGIN_SETMAC;
2416#endif /* LOGIN_SETMAC */
2417				if (pwd != NULL &&
2418				    setusercontext(NULL, pwd, pwd->pw_uid,
2419						   sucflags) == -1 &&
2420				    suidwarn)
2421				{
2422					syserr("openmailer: setusercontext() failed");
2423					exit(EX_TEMPFAIL);
2424				}
2425			}
2426# endif /* HASSETUSERCONTEXT */
2427
2428#if HASNICE
2429			/* tweak niceness */
2430			if (m->m_nice != 0)
2431				(void) nice(m->m_nice);
2432#endif /* HASNICE */
2433
2434			/* reset group id */
2435			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2436			{
2437				if (m->m_gid == NO_GID)
2438					new_gid = RunAsGid;
2439				else
2440					new_gid = m->m_gid;
2441			}
2442			else if (bitset(S_ISGID, stb.st_mode))
2443				new_gid = stb.st_gid;
2444			else if (ctladdr != NULL && ctladdr->q_gid != 0)
2445			{
2446				if (!DontInitGroups)
2447				{
2448					user = ctladdr->q_ruser;
2449					if (user == NULL)
2450						user = ctladdr->q_user;
2451
2452					if (initgroups(user,
2453						       ctladdr->q_gid) == -1
2454					    && suidwarn)
2455					{
2456						syserr("openmailer: initgroups(%s, %d) failed",
2457							user, ctladdr->q_gid);
2458						exit(EX_TEMPFAIL);
2459					}
2460				}
2461				else
2462				{
2463					GIDSET_T gidset[1];
2464
2465					gidset[0] = ctladdr->q_gid;
2466					if (setgroups(1, gidset) == -1
2467					    && suidwarn)
2468					{
2469						syserr("openmailer: setgroups() failed");
2470						exit(EX_TEMPFAIL);
2471					}
2472				}
2473				new_gid = ctladdr->q_gid;
2474			}
2475			else
2476			{
2477				if (!DontInitGroups)
2478				{
2479					user = DefUser;
2480					if (initgroups(DefUser, DefGid) == -1 &&
2481					    suidwarn)
2482					{
2483						syserr("openmailer: initgroups(%s, %d) failed",
2484						       DefUser, DefGid);
2485						exit(EX_TEMPFAIL);
2486					}
2487				}
2488				else
2489				{
2490					GIDSET_T gidset[1];
2491
2492					gidset[0] = DefGid;
2493					if (setgroups(1, gidset) == -1
2494					    && suidwarn)
2495					{
2496						syserr("openmailer: setgroups() failed");
2497						exit(EX_TEMPFAIL);
2498					}
2499				}
2500				if (m->m_gid == NO_GID)
2501					new_gid = DefGid;
2502				else
2503					new_gid = m->m_gid;
2504			}
2505			if (new_gid != NO_GID)
2506			{
2507				if (RunAsUid != 0 &&
2508				    bitnset(M_SPECIFIC_UID, m->m_flags) &&
2509				    new_gid != getgid() &&
2510				    new_gid != getegid())
2511				{
2512					/* Only root can change the gid */
2513					syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2514					       (int) RunAsUid, (int) new_gid,
2515					       (int) getgid(), (int) getegid());
2516					exit(EX_TEMPFAIL);
2517				}
2518
2519				if (setgid(new_gid) < 0 && suidwarn)
2520				{
2521					syserr("openmailer: setgid(%ld) failed",
2522					       (long) new_gid);
2523					exit(EX_TEMPFAIL);
2524				}
2525			}
2526
2527			/* change root to some "safe" directory */
2528			if (m->m_rootdir != NULL)
2529			{
2530				expand(m->m_rootdir, cbuf, sizeof cbuf, e);
2531				if (tTd(11, 20))
2532					sm_dprintf("openmailer: chroot %s\n",
2533						   cbuf);
2534				if (chroot(cbuf) < 0)
2535				{
2536					syserr("openmailer: Cannot chroot(%s)",
2537					       cbuf);
2538					exit(EX_TEMPFAIL);
2539				}
2540				if (chdir("/") < 0)
2541				{
2542					syserr("openmailer: cannot chdir(/)");
2543					exit(EX_TEMPFAIL);
2544				}
2545			}
2546
2547			/* reset user id */
2548			endpwent();
2549			sm_mbdb_terminate();
2550			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2551			{
2552				if (m->m_uid == NO_UID)
2553					new_euid = RunAsUid;
2554				else
2555					new_euid = m->m_uid;
2556
2557				/*
2558				**  Undo the effects of the uid change in main
2559				**  for signal handling.  The real uid may
2560				**  be used by mailer in adding a "From "
2561				**  line.
2562				*/
2563
2564				if (RealUid != 0 && RealUid != getuid())
2565				{
2566# if MAILER_SETUID_METHOD == USE_SETEUID
2567#  if HASSETREUID
2568					if (setreuid(RealUid, geteuid()) < 0)
2569					{
2570						syserr("openmailer: setreuid(%d, %d) failed",
2571						       (int) RealUid, (int) geteuid());
2572						exit(EX_OSERR);
2573					}
2574#  endif /* HASSETREUID */
2575# endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2576# if MAILER_SETUID_METHOD == USE_SETREUID
2577					new_ruid = RealUid;
2578# endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2579				}
2580			}
2581			else if (bitset(S_ISUID, stb.st_mode))
2582				new_ruid = stb.st_uid;
2583			else if (ctladdr != NULL && ctladdr->q_uid != 0)
2584				new_ruid = ctladdr->q_uid;
2585			else if (m->m_uid != NO_UID)
2586				new_ruid = m->m_uid;
2587			else
2588				new_ruid = DefUid;
2589
2590# if _FFR_USE_SETLOGIN
2591			/* run disconnected from terminal and set login name */
2592			if (setsid() >= 0 &&
2593			    ctladdr != NULL && ctladdr->q_uid != 0 &&
2594			    new_euid == ctladdr->q_uid)
2595			{
2596				struct passwd *pwd;
2597
2598				pwd = sm_getpwuid(ctladdr->q_uid);
2599				if (pwd != NULL && suidwarn)
2600					(void) setlogin(pwd->pw_name);
2601				endpwent();
2602			}
2603# endif /* _FFR_USE_SETLOGIN */
2604
2605			if (new_euid != NO_UID)
2606			{
2607				if (RunAsUid != 0 && new_euid != RunAsUid)
2608				{
2609					/* Only root can change the uid */
2610					syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2611					       (int) new_euid, (int) RunAsUid);
2612					exit(EX_TEMPFAIL);
2613				}
2614
2615				vendor_set_uid(new_euid);
2616# if MAILER_SETUID_METHOD == USE_SETEUID
2617				if (seteuid(new_euid) < 0 && suidwarn)
2618				{
2619					syserr("openmailer: seteuid(%ld) failed",
2620					       (long) new_euid);
2621					exit(EX_TEMPFAIL);
2622				}
2623# endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2624# if MAILER_SETUID_METHOD == USE_SETREUID
2625				if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2626				{
2627					syserr("openmailer: setreuid(%ld, %ld) failed",
2628					       (long) new_ruid, (long) new_euid);
2629					exit(EX_TEMPFAIL);
2630				}
2631# endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2632# if MAILER_SETUID_METHOD == USE_SETUID
2633				if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2634				{
2635					syserr("openmailer: setuid(%ld) failed",
2636					       (long) new_euid);
2637					exit(EX_TEMPFAIL);
2638				}
2639# endif /* MAILER_SETUID_METHOD == USE_SETUID */
2640			}
2641			else if (new_ruid != NO_UID)
2642			{
2643				vendor_set_uid(new_ruid);
2644				if (setuid(new_ruid) < 0 && suidwarn)
2645				{
2646					syserr("openmailer: setuid(%ld) failed",
2647					       (long) new_ruid);
2648					exit(EX_TEMPFAIL);
2649				}
2650			}
2651
2652			if (tTd(11, 2))
2653				sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2654					   (int) getuid(), (int) geteuid(),
2655					   (int) getgid(), (int) getegid());
2656
2657			/* move into some "safe" directory */
2658			if (m->m_execdir != NULL)
2659			{
2660				char *q;
2661
2662				for (p = m->m_execdir; p != NULL; p = q)
2663				{
2664					q = strchr(p, ':');
2665					if (q != NULL)
2666						*q = '\0';
2667					expand(p, cbuf, sizeof cbuf, e);
2668					if (q != NULL)
2669						*q++ = ':';
2670					if (tTd(11, 20))
2671						sm_dprintf("openmailer: trydir %s\n",
2672							   cbuf);
2673					if (cbuf[0] != '\0' &&
2674					    chdir(cbuf) >= 0)
2675						break;
2676				}
2677			}
2678
2679			/* Check safety of program to be run */
2680			sff = SFF_ROOTOK|SFF_EXECOK;
2681			if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2682				     DontBlameSendmail))
2683				sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2684			if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2685				    DontBlameSendmail))
2686				sff |= SFF_NOPATHCHECK;
2687			else
2688				sff |= SFF_SAFEDIRPATH;
2689			ret = safefile(m->m_mailer, getuid(), getgid(),
2690				       user, sff, 0, NULL);
2691			if (ret != 0)
2692				sm_syslog(LOG_INFO, e->e_id,
2693					  "Warning: program %s unsafe: %s",
2694					  m->m_mailer, sm_errstring(ret));
2695
2696			/* arrange to filter std & diag output of command */
2697			(void) close(rpvect[0]);
2698			if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2699			{
2700				syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2701				       shortenstring(e->e_to, MAXSHORTSTR),
2702				       m->m_name, rpvect[1]);
2703				_exit(EX_OSERR);
2704			}
2705			(void) close(rpvect[1]);
2706
2707			if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2708			{
2709				syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2710				       shortenstring(e->e_to, MAXSHORTSTR),
2711				       m->m_name);
2712				_exit(EX_OSERR);
2713			}
2714
2715			/* arrange to get standard input */
2716			(void) close(mpvect[1]);
2717			if (dup2(mpvect[0], STDIN_FILENO) < 0)
2718			{
2719				syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2720				       shortenstring(e->e_to, MAXSHORTSTR),
2721				       m->m_name, mpvect[0]);
2722				_exit(EX_OSERR);
2723			}
2724			(void) close(mpvect[0]);
2725
2726			/* arrange for all the files to be closed */
2727			sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2728
2729# if !_FFR_USE_SETLOGIN
2730			/* run disconnected from terminal */
2731			(void) setsid();
2732# endif /* !_FFR_USE_SETLOGIN */
2733
2734			/* try to execute the mailer */
2735			(void) execve(m->m_mailer, (ARGV_T) pv,
2736				      (ARGV_T) UserEnviron);
2737			save_errno = errno;
2738			syserr("Cannot exec %s", m->m_mailer);
2739			if (bitnset(M_LOCALMAILER, m->m_flags) ||
2740			    transienterror(save_errno))
2741				_exit(EX_OSERR);
2742			_exit(EX_UNAVAILABLE);
2743		}
2744
2745		/*
2746		**  Set up return value.
2747		*/
2748
2749		if (mci == NULL)
2750		{
2751			if (clever)
2752			{
2753				/*
2754				**  Allocate from general heap, not
2755				**  envelope rpool, because this mci
2756				**  is going to be cached.
2757				*/
2758
2759				mci = mci_new(NULL);
2760			}
2761			else
2762			{
2763				/*
2764				**  Prevent a storage leak by allocating
2765				**  this from the envelope rpool.
2766				*/
2767
2768				mci = mci_new(e->e_rpool);
2769			}
2770		}
2771		mci->mci_mailer = m;
2772		if (clever)
2773		{
2774			mci->mci_state = MCIS_OPENING;
2775			mci_cache(mci);
2776		}
2777		else
2778		{
2779			mci->mci_state = MCIS_OPEN;
2780		}
2781		mci->mci_pid = pid;
2782		(void) close(mpvect[0]);
2783		mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2784					  (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2785					  NULL);
2786		if (mci->mci_out == NULL)
2787		{
2788			syserr("deliver: cannot create mailer output channel, fd=%d",
2789			       mpvect[1]);
2790			(void) close(mpvect[1]);
2791			(void) close(rpvect[0]);
2792			(void) close(rpvect[1]);
2793			rcode = EX_OSERR;
2794			goto give_up;
2795		}
2796
2797		(void) close(rpvect[1]);
2798		mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2799					 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2800					 NULL);
2801		if (mci->mci_in == NULL)
2802		{
2803			syserr("deliver: cannot create mailer input channel, fd=%d",
2804			       mpvect[1]);
2805			(void) close(rpvect[0]);
2806			(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2807			mci->mci_out = NULL;
2808			rcode = EX_OSERR;
2809			goto give_up;
2810		}
2811	}
2812
2813	/*
2814	**  If we are in SMTP opening state, send initial protocol.
2815	*/
2816
2817	if (bitnset(M_7BITS, m->m_flags) &&
2818	    (!clever || mci->mci_state == MCIS_OPENING))
2819		mci->mci_flags |= MCIF_7BIT;
2820	if (clever && mci->mci_state != MCIS_CLOSED)
2821	{
2822# if STARTTLS || SASL
2823		int dotpos;
2824		char *srvname;
2825		extern SOCKADDR CurHostAddr;
2826# endif /* STARTTLS || SASL */
2827
2828# if SASL
2829#  define DONE_AUTH(f)		bitset(MCIF_AUTHACT, f)
2830# endif /* SASL */
2831# if STARTTLS
2832#  define DONE_STARTTLS(f)	bitset(MCIF_TLSACT, f)
2833# endif /* STARTTLS */
2834# define ONLY_HELO(f)		bitset(MCIF_ONLY_EHLO, f)
2835# define SET_HELO(f)		f |= MCIF_ONLY_EHLO
2836# define CLR_HELO(f)		f &= ~MCIF_ONLY_EHLO
2837
2838# if STARTTLS || SASL
2839		/* don't use CurHostName, it is changed in many places */
2840		if (mci->mci_host != NULL)
2841		{
2842			srvname = mci->mci_host;
2843			dotpos = strlen(srvname) - 1;
2844			if (dotpos >= 0)
2845			{
2846				if (srvname[dotpos] == '.')
2847					srvname[dotpos] = '\0';
2848				else
2849					dotpos = -1;
2850			}
2851		}
2852		else if (mci->mci_mailer != NULL)
2853		{
2854			srvname = mci->mci_mailer->m_name;
2855			dotpos = -1;
2856		}
2857		else
2858		{
2859			srvname = "local";
2860			dotpos = -1;
2861		}
2862
2863		/* don't set {server_name} to NULL or "": see getauth() */
2864		macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2865			  srvname);
2866
2867		/* CurHostAddr is set by makeconnection() and mci_get() */
2868		if (CurHostAddr.sa.sa_family != 0)
2869		{
2870			macdefine(&mci->mci_macro, A_TEMP,
2871				  macid("{server_addr}"),
2872				  anynet_ntoa(&CurHostAddr));
2873		}
2874		else if (mci->mci_mailer != NULL)
2875		{
2876			/* mailer name is unique, use it as address */
2877			macdefine(&mci->mci_macro, A_PERM,
2878				  macid("{server_addr}"),
2879				  mci->mci_mailer->m_name);
2880		}
2881		else
2882		{
2883			/* don't set it to NULL or "": see getauth() */
2884			macdefine(&mci->mci_macro, A_PERM,
2885				  macid("{server_addr}"), "0");
2886		}
2887
2888		/* undo change of srvname (mci->mci_host) */
2889		if (dotpos >= 0)
2890			srvname[dotpos] = '.';
2891
2892reconnect:	/* after switching to an encrypted connection */
2893# endif /* STARTTLS || SASL */
2894
2895		/* set the current connection information */
2896		e->e_mci = mci;
2897# if SASL
2898		mci->mci_saslcap = NULL;
2899# endif /* SASL */
2900		smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2901		CLR_HELO(mci->mci_flags);
2902
2903		if (IS_DLVR_RETURN(e))
2904		{
2905			/*
2906			**  Check whether other side can deliver e-mail
2907			**  fast enough
2908			*/
2909
2910			if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2911			{
2912				e->e_status = "5.4.7";
2913				usrerrenh(e->e_status,
2914					  "554 Server does not support Deliver By");
2915				rcode = EX_UNAVAILABLE;
2916				goto give_up;
2917			}
2918			if (e->e_deliver_by > 0 &&
2919			    e->e_deliver_by - (curtime() - e->e_ctime) <
2920			    mci->mci_min_by)
2921			{
2922				e->e_status = "5.4.7";
2923				usrerrenh(e->e_status,
2924					  "554 Message can't be delivered in time; %ld < %ld",
2925					  e->e_deliver_by - (curtime() - e->e_ctime),
2926					  mci->mci_min_by);
2927				rcode = EX_UNAVAILABLE;
2928				goto give_up;
2929			}
2930		}
2931
2932# if STARTTLS
2933		/* first TLS then AUTH to provide a security layer */
2934		if (mci->mci_state != MCIS_CLOSED &&
2935		    !DONE_STARTTLS(mci->mci_flags))
2936		{
2937			int olderrors;
2938			bool usetls;
2939			bool saveQuickAbort = QuickAbort;
2940			bool saveSuprErrs = SuprErrs;
2941			char *host = NULL;
2942
2943			rcode = EX_OK;
2944			usetls = bitset(MCIF_TLS, mci->mci_flags);
2945			if (usetls)
2946				usetls = !iscltflgset(e, D_NOTLS);
2947
2948			if (usetls)
2949			{
2950				host = macvalue(macid("{server_name}"), e);
2951				olderrors = Errors;
2952				QuickAbort = false;
2953				SuprErrs = true;
2954				if (rscheck("try_tls", host, NULL, e,
2955					    RSF_RMCOMM, 7, host, NOQID) != EX_OK
2956				    || Errors > olderrors)
2957					usetls = false;
2958				SuprErrs = saveSuprErrs;
2959				QuickAbort = saveQuickAbort;
2960			}
2961
2962			if (usetls)
2963			{
2964				if ((rcode = starttls(m, mci, e)) == EX_OK)
2965				{
2966					/* start again without STARTTLS */
2967					mci->mci_flags |= MCIF_TLSACT;
2968				}
2969				else
2970				{
2971					char *s;
2972
2973					/*
2974					**  TLS negotation failed, what to do?
2975					**  fall back to unencrypted connection
2976					**  or abort? How to decide?
2977					**  set a macro and call a ruleset.
2978					*/
2979
2980					mci->mci_flags &= ~MCIF_TLS;
2981					switch (rcode)
2982					{
2983					  case EX_TEMPFAIL:
2984						s = "TEMP";
2985						break;
2986					  case EX_USAGE:
2987						s = "USAGE";
2988						break;
2989					  case EX_PROTOCOL:
2990						s = "PROTOCOL";
2991						break;
2992					  case EX_SOFTWARE:
2993						s = "SOFTWARE";
2994						break;
2995					  case EX_UNAVAILABLE:
2996						s = "NONE";
2997						break;
2998
2999					  /* everything else is a failure */
3000					  default:
3001						s = "FAILURE";
3002						rcode = EX_TEMPFAIL;
3003					}
3004					macdefine(&e->e_macro, A_PERM,
3005						  macid("{verify}"), s);
3006				}
3007			}
3008			else
3009				macdefine(&e->e_macro, A_PERM,
3010					  macid("{verify}"), "NONE");
3011			olderrors = Errors;
3012			QuickAbort = false;
3013			SuprErrs = true;
3014
3015			/*
3016			**  rcode == EX_SOFTWARE is special:
3017			**  the TLS negotation failed
3018			**  we have to drop the connection no matter what
3019			**  However, we call tls_server to give it the chance
3020			**  to log the problem and return an appropriate
3021			**  error code.
3022			*/
3023
3024			if (rscheck("tls_server",
3025				    macvalue(macid("{verify}"), e),
3026				    NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3027				    host, NOQID) != EX_OK ||
3028			    Errors > olderrors ||
3029			    rcode == EX_SOFTWARE)
3030			{
3031				char enhsc[ENHSCLEN];
3032				extern char MsgBuf[];
3033
3034				if (ISSMTPCODE(MsgBuf) &&
3035				    extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3036				{
3037					p = sm_rpool_strdup_x(e->e_rpool,
3038							      MsgBuf);
3039				}
3040				else
3041				{
3042					p = "403 4.7.0 server not authenticated.";
3043					(void) sm_strlcpy(enhsc, "4.7.0",
3044							  sizeof enhsc);
3045				}
3046				SuprErrs = saveSuprErrs;
3047				QuickAbort = saveQuickAbort;
3048
3049				if (rcode == EX_SOFTWARE)
3050				{
3051					/* drop the connection */
3052					mci->mci_state = MCIS_QUITING;
3053					if (mci->mci_in != NULL)
3054					{
3055						(void) sm_io_close(mci->mci_in,
3056								   SM_TIME_DEFAULT);
3057						mci->mci_in = NULL;
3058					}
3059					mci->mci_flags &= ~MCIF_TLSACT;
3060					(void) endmailer(mci, e, pv);
3061				}
3062				else
3063				{
3064					/* abort transfer */
3065					smtpquit(m, mci, e);
3066				}
3067
3068				/* avoid bogus error msg */
3069				mci->mci_errno = 0;
3070
3071				/* temp or permanent failure? */
3072				rcode = (*p == '4') ? EX_TEMPFAIL
3073						    : EX_UNAVAILABLE;
3074				mci_setstat(mci, rcode, enhsc, p);
3075
3076				/*
3077				**  hack to get the error message into
3078				**  the envelope (done in giveresponse())
3079				*/
3080
3081				(void) sm_strlcpy(SmtpError, p,
3082						  sizeof SmtpError);
3083			}
3084			QuickAbort = saveQuickAbort;
3085			SuprErrs = saveSuprErrs;
3086			if (DONE_STARTTLS(mci->mci_flags) &&
3087			    mci->mci_state != MCIS_CLOSED)
3088			{
3089				SET_HELO(mci->mci_flags);
3090				mci->mci_flags &= ~MCIF_EXTENS;
3091				goto reconnect;
3092			}
3093		}
3094# endif /* STARTTLS */
3095# if SASL
3096		/* if other server supports authentication let's authenticate */
3097		if (mci->mci_state != MCIS_CLOSED &&
3098		    mci->mci_saslcap != NULL &&
3099		    !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3100		{
3101			/* Should we require some minimum authentication? */
3102			if ((ret = smtpauth(m, mci, e)) == EX_OK)
3103			{
3104				int result;
3105				sasl_ssf_t *ssf = NULL;
3106
3107				/* Get security strength (features) */
3108				result = sasl_getprop(mci->mci_conn, SASL_SSF,
3109# if SASL >= 20000
3110						      (const void **) &ssf);
3111# else /* SASL >= 20000 */
3112						      (void **) &ssf);
3113# endif /* SASL >= 20000 */
3114
3115				/* XXX authid? */
3116				if (LogLevel > 9)
3117					sm_syslog(LOG_INFO, NOQID,
3118						  "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3119						  mci->mci_host,
3120						  macvalue(macid("{auth_type}"), e),
3121						  result == SASL_OK ? *ssf : 0);
3122
3123				/*
3124				**  Only switch to encrypted connection
3125				**  if a security layer has been negotiated
3126				*/
3127
3128				if (result == SASL_OK && *ssf > 0)
3129				{
3130					int tmo;
3131
3132					/*
3133					**  Convert I/O layer to use SASL.
3134					**  If the call fails, the connection
3135					**  is aborted.
3136					*/
3137
3138					tmo = DATA_PROGRESS_TIMEOUT * 1000;
3139					if (sfdcsasl(&mci->mci_in,
3140						     &mci->mci_out,
3141						     mci->mci_conn, tmo) == 0)
3142					{
3143						mci->mci_flags &= ~MCIF_EXTENS;
3144						mci->mci_flags |= MCIF_AUTHACT|
3145								  MCIF_ONLY_EHLO;
3146						goto reconnect;
3147					}
3148					syserr("AUTH TLS switch failed in client");
3149				}
3150				/* else? XXX */
3151				mci->mci_flags |= MCIF_AUTHACT;
3152
3153			}
3154			else if (ret == EX_TEMPFAIL)
3155			{
3156				if (LogLevel > 8)
3157					sm_syslog(LOG_ERR, NOQID,
3158						  "AUTH=client, relay=%.100s, temporary failure, connection abort",
3159						  mci->mci_host);
3160				smtpquit(m, mci, e);
3161
3162				/* avoid bogus error msg */
3163				mci->mci_errno = 0;
3164				rcode = EX_TEMPFAIL;
3165				mci_setstat(mci, rcode, "4.3.0", p);
3166
3167				/*
3168				**  hack to get the error message into
3169				**  the envelope (done in giveresponse())
3170				*/
3171
3172				(void) sm_strlcpy(SmtpError,
3173						  "Temporary AUTH failure",
3174						  sizeof SmtpError);
3175			}
3176		}
3177# endif /* SASL */
3178	}
3179
3180
3181do_transfer:
3182	/* clear out per-message flags from connection structure */
3183	mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3184
3185	if (bitset(EF_HAS8BIT, e->e_flags) &&
3186	    !bitset(EF_DONT_MIME, e->e_flags) &&
3187	    bitnset(M_7BITS, m->m_flags))
3188		mci->mci_flags |= MCIF_CVT8TO7;
3189
3190#if MIME7TO8
3191	if (bitnset(M_MAKE8BIT, m->m_flags) &&
3192	    !bitset(MCIF_7BIT, mci->mci_flags) &&
3193	    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3194	     (sm_strcasecmp(p, "quoted-printable") == 0 ||
3195	      sm_strcasecmp(p, "base64") == 0) &&
3196	    (p = hvalue("Content-Type", e->e_header)) != NULL)
3197	{
3198		/* may want to convert 7 -> 8 */
3199		/* XXX should really parse it here -- and use a class XXX */
3200		if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3201		    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3202			mci->mci_flags |= MCIF_CVT7TO8;
3203	}
3204#endif /* MIME7TO8 */
3205
3206	if (tTd(11, 1))
3207	{
3208		sm_dprintf("openmailer: ");
3209		mci_dump(sm_debug_file(), mci, false);
3210	}
3211
3212#if _FFR_CLIENT_SIZE
3213	/*
3214	**  See if we know the maximum size and
3215	**  abort if the message is too big.
3216	**
3217	**  NOTE: _FFR_CLIENT_SIZE is untested.
3218	*/
3219
3220	if (bitset(MCIF_SIZE, mci->mci_flags) &&
3221	    mci->mci_maxsize > 0 &&
3222	    e->e_msgsize > mci->mci_maxsize)
3223	{
3224		e->e_flags |= EF_NO_BODY_RETN;
3225		if (bitnset(M_LOCALMAILER, m->m_flags))
3226			e->e_status = "5.2.3";
3227		else
3228			e->e_status = "5.3.4";
3229
3230		usrerrenh(e->e_status,
3231			  "552 Message is too large; %ld bytes max",
3232			  mci->mci_maxsize);
3233		rcode = EX_DATAERR;
3234
3235		/* Need an e_message for error */
3236		(void) sm_snprintf(SmtpError, sizeof SmtpError,
3237				   "Message is too large; %ld bytes max",
3238				   mci->mci_maxsize);
3239		goto give_up;
3240	}
3241#endif /* _FFR_CLIENT_SIZE */
3242
3243	if (mci->mci_state != MCIS_OPEN)
3244	{
3245		/* couldn't open the mailer */
3246		rcode = mci->mci_exitstat;
3247		errno = mci->mci_errno;
3248		SM_SET_H_ERRNO(mci->mci_herrno);
3249		if (rcode == EX_OK)
3250		{
3251			/* shouldn't happen */
3252			syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3253			       (unsigned long) mci, rcode, errno,
3254			       mci->mci_state, firstsig);
3255			mci_dump_all(smioout, true);
3256			rcode = EX_SOFTWARE;
3257		}
3258		else if (nummxhosts > hostnum)
3259		{
3260			/* try next MX site */
3261			goto tryhost;
3262		}
3263	}
3264	else if (!clever)
3265	{
3266		bool ok;
3267
3268		/*
3269		**  Format and send message.
3270		*/
3271
3272		rcode = EX_OK;
3273		errno = 0;
3274		ok = putfromline(mci, e);
3275		if (ok)
3276			ok = (*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3277		if (ok)
3278			ok = (*e->e_putbody)(mci, e, NULL);
3279
3280		/*
3281		**  Ignore an I/O error that was caused by EPIPE.
3282		**  Some broken mailers don't read the entire body
3283		**  but just exit() thus causing an I/O error.
3284		*/
3285
3286		if (!ok && (sm_io_error(mci->mci_out) && errno == EPIPE))
3287			ok = true;
3288
3289		/* (always) get the exit status */
3290		rcode = endmailer(mci, e, pv);
3291		if (!ok)
3292			rcode = EX_TEMPFAIL;
3293		if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3294		{
3295			/*
3296			**  Need an e_message for mailq display.
3297			**  We set SmtpError as
3298			*/
3299
3300			(void) sm_snprintf(SmtpError, sizeof SmtpError,
3301					   "%s mailer (%s) exited with EX_TEMPFAIL",
3302					   m->m_name, m->m_mailer);
3303		}
3304	}
3305	else
3306	{
3307		/*
3308		**  Send the MAIL FROM: protocol
3309		*/
3310
3311		/* XXX this isn't pipelined... */
3312		rcode = smtpmailfrom(m, mci, e);
3313		if (rcode == EX_OK)
3314		{
3315			register int i;
3316# if PIPELINING
3317			ADDRESS *volatile pchain;
3318# endif /* PIPELINING */
3319
3320			/* send the recipient list */
3321			tobuf[0] = '\0';
3322			mci->mci_retryrcpt = false;
3323			mci->mci_tolist = tobuf;
3324# if PIPELINING
3325			pchain = NULL;
3326			mci->mci_nextaddr = NULL;
3327# endif /* PIPELINING */
3328
3329			for (to = tochain; to != NULL; to = to->q_tchain)
3330			{
3331				if (!QS_IS_UNMARKED(to->q_state))
3332					continue;
3333
3334				/* mark recipient state as "ok so far" */
3335				to->q_state = QS_OK;
3336				e->e_to = to->q_paddr;
3337# if STARTTLS
3338				i = rscheck("tls_rcpt", to->q_user, NULL, e,
3339					    RSF_RMCOMM|RSF_COUNT, 3,
3340					    mci->mci_host, e->e_id);
3341				if (i != EX_OK)
3342				{
3343					markfailure(e, to, mci, i, false);
3344					giveresponse(i, to->q_status,  m, mci,
3345						     ctladdr, xstart, e, to);
3346					if (i == EX_TEMPFAIL)
3347					{
3348						mci->mci_retryrcpt = true;
3349						to->q_state = QS_RETRY;
3350					}
3351					continue;
3352				}
3353# endif /* STARTTLS */
3354
3355				i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3356# if PIPELINING
3357				if (i == EX_OK &&
3358				    bitset(MCIF_PIPELINED, mci->mci_flags))
3359				{
3360					/*
3361					**  Add new element to list of
3362					**  recipients for pipelining.
3363					*/
3364
3365					to->q_pchain = NULL;
3366					if (mci->mci_nextaddr == NULL)
3367						mci->mci_nextaddr = to;
3368					if (pchain == NULL)
3369						pchain = to;
3370					else
3371					{
3372						pchain->q_pchain = to;
3373						pchain = pchain->q_pchain;
3374					}
3375				}
3376# endif /* PIPELINING */
3377				if (i != EX_OK)
3378				{
3379					markfailure(e, to, mci, i, false);
3380					giveresponse(i, to->q_status, m, mci,
3381						     ctladdr, xstart, e, to);
3382					if (i == EX_TEMPFAIL)
3383						to->q_state = QS_RETRY;
3384				}
3385			}
3386
3387			/* No recipients in list and no missing responses? */
3388			if (tobuf[0] == '\0'
3389# if PIPELINING
3390			    && mci->mci_nextaddr == NULL
3391# endif /* PIPELINING */
3392			   )
3393			{
3394				rcode = EX_OK;
3395				e->e_to = NULL;
3396				if (bitset(MCIF_CACHED, mci->mci_flags))
3397					smtprset(m, mci, e);
3398			}
3399			else
3400			{
3401				e->e_to = tobuf + 1;
3402				rcode = smtpdata(m, mci, e, ctladdr, xstart);
3403			}
3404		}
3405		if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3406		{
3407			/* try next MX site */
3408			goto tryhost;
3409		}
3410	}
3411#if NAMED_BIND
3412	if (ConfigLevel < 2)
3413		_res.options |= RES_DEFNAMES | RES_DNSRCH;	/* XXX */
3414#endif /* NAMED_BIND */
3415
3416	if (tTd(62, 1))
3417		checkfds("after delivery");
3418
3419	/*
3420	**  Do final status disposal.
3421	**	We check for something in tobuf for the SMTP case.
3422	**	If we got a temporary failure, arrange to queue the
3423	**		addressees.
3424	*/
3425
3426  give_up:
3427	if (bitnset(M_LMTP, m->m_flags))
3428	{
3429		lmtp_rcode = rcode;
3430		tobuf[0] = '\0';
3431		anyok = false;
3432		strsize = 0;
3433	}
3434	else
3435		anyok = rcode == EX_OK;
3436
3437	for (to = tochain; to != NULL; to = to->q_tchain)
3438	{
3439		/* see if address already marked */
3440		if (!QS_IS_OK(to->q_state))
3441			continue;
3442
3443		/* if running LMTP, get the status for each address */
3444		if (bitnset(M_LMTP, m->m_flags))
3445		{
3446			if (lmtp_rcode == EX_OK)
3447				rcode = smtpgetstat(m, mci, e);
3448			if (rcode == EX_OK)
3449			{
3450				strsize += sm_strlcat2(tobuf + strsize, ",",
3451						to->q_paddr,
3452						tobufsize - strsize);
3453				SM_ASSERT(strsize < tobufsize);
3454				anyok = true;
3455			}
3456			else
3457			{
3458				e->e_to = to->q_paddr;
3459				markfailure(e, to, mci, rcode, true);
3460				giveresponse(rcode, to->q_status, m, mci,
3461					     ctladdr, xstart, e, to);
3462				e->e_to = tobuf + 1;
3463				continue;
3464			}
3465		}
3466		else
3467		{
3468			/* mark bad addresses */
3469			if (rcode != EX_OK)
3470			{
3471				if (goodmxfound && rcode == EX_NOHOST)
3472					rcode = EX_TEMPFAIL;
3473				markfailure(e, to, mci, rcode, true);
3474				continue;
3475			}
3476		}
3477
3478		/* successful delivery */
3479		to->q_state = QS_SENT;
3480		to->q_statdate = curtime();
3481		e->e_nsent++;
3482
3483		/*
3484		**  Checkpoint the send list every few addresses
3485		*/
3486
3487		if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3488		{
3489			queueup(e, false, false);
3490			e->e_nsent = 0;
3491		}
3492
3493		if (bitnset(M_LOCALMAILER, m->m_flags) &&
3494		    bitset(QPINGONSUCCESS, to->q_flags))
3495		{
3496			to->q_flags |= QDELIVERED;
3497			to->q_status = "2.1.5";
3498			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3499					     "%s... Successfully delivered\n",
3500					     to->q_paddr);
3501		}
3502		else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3503			 bitset(QPRIMARY, to->q_flags) &&
3504			 !bitset(MCIF_DSN, mci->mci_flags))
3505		{
3506			to->q_flags |= QRELAYED;
3507			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3508					     "%s... relayed; expect no further notifications\n",
3509					     to->q_paddr);
3510		}
3511		else if (IS_DLVR_NOTIFY(e) &&
3512			 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3513			 bitset(QPRIMARY, to->q_flags) &&
3514			 (!bitset(QHASNOTIFY, to->q_flags) ||
3515			  bitset(QPINGONSUCCESS, to->q_flags) ||
3516			  bitset(QPINGONFAILURE, to->q_flags) ||
3517			  bitset(QPINGONDELAY, to->q_flags)))
3518		{
3519			/* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3520			to->q_flags |= QBYNRELAY;
3521			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3522					     "%s... Deliver-by notify: relayed\n",
3523					     to->q_paddr);
3524		}
3525		else if (IS_DLVR_TRACE(e) &&
3526			 (!bitset(QHASNOTIFY, to->q_flags) ||
3527			  bitset(QPINGONSUCCESS, to->q_flags) ||
3528			  bitset(QPINGONFAILURE, to->q_flags) ||
3529			  bitset(QPINGONDELAY, to->q_flags)) &&
3530			 bitset(QPRIMARY, to->q_flags))
3531		{
3532			/* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3533			to->q_flags |= QBYTRACE;
3534			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3535					     "%s... Deliver-By trace: relayed\n",
3536					     to->q_paddr);
3537		}
3538	}
3539
3540	if (bitnset(M_LMTP, m->m_flags))
3541	{
3542		/*
3543		**  Global information applies to the last recipient only;
3544		**  clear it out to avoid bogus errors.
3545		*/
3546
3547		rcode = EX_OK;
3548		e->e_statmsg = NULL;
3549
3550		/* reset the mci state for the next transaction */
3551		if (mci != NULL &&
3552		    (mci->mci_state == MCIS_MAIL ||
3553		     mci->mci_state == MCIS_RCPT ||
3554		     mci->mci_state == MCIS_DATA))
3555		{
3556			mci->mci_state = MCIS_OPEN;
3557			SmtpPhase = mci->mci_phase = "idle";
3558			sm_setproctitle(true, e, "%s: %s", CurHostName,
3559					mci->mci_phase);
3560		}
3561	}
3562
3563	if (tobuf[0] != '\0')
3564	{
3565		giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3566#if 0
3567		/*
3568		**  This code is disabled for now because I am not
3569		**  sure that copying status from the first recipient
3570		**  to all non-status'ed recipients is a good idea.
3571		*/
3572
3573		if (tochain->q_message != NULL &&
3574		    !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3575		{
3576			for (to = tochain->q_tchain; to != NULL;
3577			     to = to->q_tchain)
3578			{
3579				/* see if address already marked */
3580				if (QS_IS_QUEUEUP(to->q_state) &&
3581				    to->q_message == NULL)
3582					to->q_message = sm_rpool_strdup_x(e->e_rpool,
3583							tochain->q_message);
3584			}
3585		}
3586#endif /* 0 */
3587	}
3588	if (anyok)
3589		markstats(e, tochain, STATS_NORMAL);
3590	mci_store_persistent(mci);
3591
3592	/* Some recipients were tempfailed, try them on the next host */
3593	if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3594	{
3595		/* try next MX site */
3596		goto tryhost;
3597	}
3598
3599	/* now close the connection */
3600	if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3601	    !bitset(MCIF_CACHED, mci->mci_flags))
3602		smtpquit(m, mci, e);
3603
3604cleanup: ;
3605	}
3606	SM_FINALLY
3607	{
3608		/*
3609		**  Restore state and return.
3610		*/
3611#if XDEBUG
3612		char wbuf[MAXLINE];
3613
3614		/* make absolutely certain 0, 1, and 2 are in use */
3615		(void) sm_snprintf(wbuf, sizeof wbuf,
3616				   "%s... end of deliver(%s)",
3617				   e->e_to == NULL ? "NO-TO-LIST"
3618						   : shortenstring(e->e_to,
3619								   MAXSHORTSTR),
3620				  m->m_name);
3621		checkfd012(wbuf);
3622#endif /* XDEBUG */
3623
3624		errno = 0;
3625
3626		/*
3627		**  It was originally necessary to set macro 'g' to NULL
3628		**  because it previously pointed to an auto buffer.
3629		**  We don't do this any more, so this may be unnecessary.
3630		*/
3631
3632		macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3633		e->e_to = NULL;
3634	}
3635	SM_END_TRY
3636	return rcode;
3637}
3638
3639/*
3640**  MARKFAILURE -- mark a failure on a specific address.
3641**
3642**	Parameters:
3643**		e -- the envelope we are sending.
3644**		q -- the address to mark.
3645**		mci -- mailer connection information.
3646**		rcode -- the code signifying the particular failure.
3647**		ovr -- override an existing code?
3648**
3649**	Returns:
3650**		none.
3651**
3652**	Side Effects:
3653**		marks the address (and possibly the envelope) with the
3654**			failure so that an error will be returned or
3655**			the message will be queued, as appropriate.
3656*/
3657
3658void
3659markfailure(e, q, mci, rcode, ovr)
3660	register ENVELOPE *e;
3661	register ADDRESS *q;
3662	register MCI *mci;
3663	int rcode;
3664	bool ovr;
3665{
3666	int save_errno = errno;
3667	char *status = NULL;
3668	char *rstatus = NULL;
3669
3670	switch (rcode)
3671	{
3672	  case EX_OK:
3673		break;
3674
3675	  case EX_TEMPFAIL:
3676	  case EX_IOERR:
3677	  case EX_OSERR:
3678		q->q_state = QS_QUEUEUP;
3679		break;
3680
3681	  default:
3682		q->q_state = QS_BADADDR;
3683		break;
3684	}
3685
3686	/* find most specific error code possible */
3687	if (mci != NULL && mci->mci_status != NULL)
3688	{
3689		status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3690		if (mci->mci_rstatus != NULL)
3691			rstatus = sm_rpool_strdup_x(e->e_rpool,
3692						    mci->mci_rstatus);
3693		else
3694			rstatus = NULL;
3695	}
3696	else if (e->e_status != NULL)
3697	{
3698		status = e->e_status;
3699		rstatus = NULL;
3700	}
3701	else
3702	{
3703		switch (rcode)
3704		{
3705		  case EX_USAGE:
3706			status = "5.5.4";
3707			break;
3708
3709		  case EX_DATAERR:
3710			status = "5.5.2";
3711			break;
3712
3713		  case EX_NOUSER:
3714			status = "5.1.1";
3715			break;
3716
3717		  case EX_NOHOST:
3718			status = "5.1.2";
3719			break;
3720
3721		  case EX_NOINPUT:
3722		  case EX_CANTCREAT:
3723		  case EX_NOPERM:
3724			status = "5.3.0";
3725			break;
3726
3727		  case EX_UNAVAILABLE:
3728		  case EX_SOFTWARE:
3729		  case EX_OSFILE:
3730		  case EX_PROTOCOL:
3731		  case EX_CONFIG:
3732			status = "5.5.0";
3733			break;
3734
3735		  case EX_OSERR:
3736		  case EX_IOERR:
3737			status = "4.5.0";
3738			break;
3739
3740		  case EX_TEMPFAIL:
3741			status = "4.2.0";
3742			break;
3743		}
3744	}
3745
3746	/* new status? */
3747	if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3748	    *q->q_status == '\0' || *q->q_status < *status))
3749	{
3750		q->q_status = status;
3751		q->q_rstatus = rstatus;
3752	}
3753	if (rcode != EX_OK && q->q_rstatus == NULL &&
3754	    q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3755	    sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3756	{
3757		char buf[16];
3758
3759		(void) sm_snprintf(buf, sizeof buf, "%d", rcode);
3760		q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3761	}
3762
3763	q->q_statdate = curtime();
3764	if (CurHostName != NULL && CurHostName[0] != '\0' &&
3765	    mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3766		q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3767
3768	/* restore errno */
3769	errno = save_errno;
3770}
3771/*
3772**  ENDMAILER -- Wait for mailer to terminate.
3773**
3774**	We should never get fatal errors (e.g., segmentation
3775**	violation), so we report those specially.  For other
3776**	errors, we choose a status message (into statmsg),
3777**	and if it represents an error, we print it.
3778**
3779**	Parameters:
3780**		mci -- the mailer connection info.
3781**		e -- the current envelope.
3782**		pv -- the parameter vector that invoked the mailer
3783**			(for error messages).
3784**
3785**	Returns:
3786**		exit code of mailer.
3787**
3788**	Side Effects:
3789**		none.
3790*/
3791
3792static jmp_buf	EndWaitTimeout;
3793
3794static void
3795endwaittimeout(ignore)
3796	int ignore;
3797{
3798	/*
3799	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3800	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3801	**	DOING.
3802	*/
3803
3804	errno = ETIMEDOUT;
3805	longjmp(EndWaitTimeout, 1);
3806}
3807
3808int
3809endmailer(mci, e, pv)
3810	register MCI *mci;
3811	register ENVELOPE *e;
3812	char **pv;
3813{
3814	int st;
3815	int save_errno = errno;
3816	char buf[MAXLINE];
3817	SM_EVENT *ev = NULL;
3818
3819
3820	mci_unlock_host(mci);
3821
3822	/* close output to mailer */
3823	if (mci->mci_out != NULL)
3824	{
3825		(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3826		mci->mci_out = NULL;
3827	}
3828
3829	/* copy any remaining input to transcript */
3830	if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3831	    e->e_xfp != NULL)
3832	{
3833		while (sfgets(buf, sizeof buf, mci->mci_in,
3834			      TimeOuts.to_quit, "Draining Input") != NULL)
3835			(void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3836	}
3837
3838#if SASL
3839	/* close SASL connection */
3840	if (bitset(MCIF_AUTHACT, mci->mci_flags))
3841	{
3842		sasl_dispose(&mci->mci_conn);
3843		mci->mci_flags &= ~MCIF_AUTHACT;
3844	}
3845#endif /* SASL */
3846
3847#if STARTTLS
3848	/* shutdown TLS */
3849	(void) endtlsclt(mci);
3850#endif /* STARTTLS */
3851
3852	/* now close the input */
3853	if (mci->mci_in != NULL)
3854	{
3855		(void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3856		mci->mci_in = NULL;
3857	}
3858	mci->mci_state = MCIS_CLOSED;
3859
3860	errno = save_errno;
3861
3862	/* in the IPC case there is nothing to wait for */
3863	if (mci->mci_pid == 0)
3864		return EX_OK;
3865
3866	/* put a timeout around the wait */
3867	if (mci->mci_mailer->m_wait > 0)
3868	{
3869		if (setjmp(EndWaitTimeout) == 0)
3870			ev = sm_setevent(mci->mci_mailer->m_wait,
3871					 endwaittimeout, 0);
3872		else
3873		{
3874			syserr("endmailer %s: wait timeout (%ld)",
3875			       mci->mci_mailer->m_name,
3876			       (long) mci->mci_mailer->m_wait);
3877			return EX_TEMPFAIL;
3878		}
3879	}
3880
3881	/* wait for the mailer process, collect status */
3882	st = waitfor(mci->mci_pid);
3883	save_errno = errno;
3884	if (ev != NULL)
3885		sm_clrevent(ev);
3886	errno = save_errno;
3887
3888	if (st == -1)
3889	{
3890		syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3891		return EX_SOFTWARE;
3892	}
3893
3894	if (WIFEXITED(st))
3895	{
3896		/* normal death -- return status */
3897		return (WEXITSTATUS(st));
3898	}
3899
3900	/* it died a horrid death */
3901	syserr("451 4.3.0 mailer %s died with signal %d%s",
3902		mci->mci_mailer->m_name, WTERMSIG(st),
3903		WCOREDUMP(st) ? " (core dumped)" :
3904		(WIFSTOPPED(st) ? " (stopped)" : ""));
3905
3906	/* log the arguments */
3907	if (pv != NULL && e->e_xfp != NULL)
3908	{
3909		register char **av;
3910
3911		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3912		for (av = pv; *av != NULL; av++)
3913			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3914					     *av);
3915		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3916	}
3917
3918	ExitStat = EX_TEMPFAIL;
3919	return EX_TEMPFAIL;
3920}
3921/*
3922**  GIVERESPONSE -- Interpret an error response from a mailer
3923**
3924**	Parameters:
3925**		status -- the status code from the mailer (high byte
3926**			only; core dumps must have been taken care of
3927**			already).
3928**		dsn -- the DSN associated with the address, if any.
3929**		m -- the mailer info for this mailer.
3930**		mci -- the mailer connection info -- can be NULL if the
3931**			response is given before the connection is made.
3932**		ctladdr -- the controlling address for the recipient
3933**			address(es).
3934**		xstart -- the transaction start time, for computing
3935**			transaction delays.
3936**		e -- the current envelope.
3937**		to -- the current recipient (NULL if none).
3938**
3939**	Returns:
3940**		none.
3941**
3942**	Side Effects:
3943**		Errors may be incremented.
3944**		ExitStat may be set.
3945*/
3946
3947void
3948giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3949	int status;
3950	char *dsn;
3951	register MAILER *m;
3952	register MCI *mci;
3953	ADDRESS *ctladdr;
3954	time_t xstart;
3955	ENVELOPE *e;
3956	ADDRESS *to;
3957{
3958	register const char *statmsg;
3959	int errnum = errno;
3960	int off = 4;
3961	bool usestat = false;
3962	char dsnbuf[ENHSCLEN];
3963	char buf[MAXLINE];
3964	char *exmsg;
3965
3966	if (e == NULL)
3967	{
3968		syserr("giveresponse: null envelope");
3969		/* NOTREACHED */
3970		SM_ASSERT(0);
3971	}
3972
3973	/*
3974	**  Compute status message from code.
3975	*/
3976
3977	exmsg = sm_sysexmsg(status);
3978	if (status == 0)
3979	{
3980		statmsg = "250 2.0.0 Sent";
3981		if (e->e_statmsg != NULL)
3982		{
3983			(void) sm_snprintf(buf, sizeof buf, "%s (%s)",
3984					   statmsg,
3985					   shortenstring(e->e_statmsg, 403));
3986			statmsg = buf;
3987		}
3988	}
3989	else if (exmsg == NULL)
3990	{
3991		(void) sm_snprintf(buf, sizeof buf,
3992				   "554 5.3.0 unknown mailer error %d",
3993				   status);
3994		status = EX_UNAVAILABLE;
3995		statmsg = buf;
3996		usestat = true;
3997	}
3998	else if (status == EX_TEMPFAIL)
3999	{
4000		char *bp = buf;
4001
4002		(void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
4003		bp += strlen(bp);
4004#if NAMED_BIND
4005		if (h_errno == TRY_AGAIN)
4006			statmsg = sm_errstring(h_errno + E_DNSBASE);
4007		else
4008#endif /* NAMED_BIND */
4009		{
4010			if (errnum != 0)
4011				statmsg = sm_errstring(errnum);
4012			else
4013				statmsg = SmtpError;
4014		}
4015		if (statmsg != NULL && statmsg[0] != '\0')
4016		{
4017			switch (errnum)
4018			{
4019#ifdef ENETDOWN
4020			  case ENETDOWN:	/* Network is down */
4021#endif /* ENETDOWN */
4022#ifdef ENETUNREACH
4023			  case ENETUNREACH:	/* Network is unreachable */
4024#endif /* ENETUNREACH */
4025#ifdef ENETRESET
4026			  case ENETRESET:	/* Network dropped connection on reset */
4027#endif /* ENETRESET */
4028#ifdef ECONNABORTED
4029			  case ECONNABORTED:	/* Software caused connection abort */
4030#endif /* ECONNABORTED */
4031#ifdef EHOSTDOWN
4032			  case EHOSTDOWN:	/* Host is down */
4033#endif /* EHOSTDOWN */
4034#ifdef EHOSTUNREACH
4035			  case EHOSTUNREACH:	/* No route to host */
4036#endif /* EHOSTUNREACH */
4037				if (mci != NULL && mci->mci_host != NULL)
4038				{
4039					(void) sm_strlcpyn(bp,
4040							   SPACELEFT(buf, bp),
4041							   2, ": ",
4042							   mci->mci_host);
4043					bp += strlen(bp);
4044				}
4045				break;
4046			}
4047			(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4048					   statmsg);
4049			usestat = true;
4050		}
4051		statmsg = buf;
4052	}
4053#if NAMED_BIND
4054	else if (status == EX_NOHOST && h_errno != 0)
4055	{
4056		statmsg = sm_errstring(h_errno + E_DNSBASE);
4057		(void) sm_snprintf(buf, sizeof buf, "%s (%s)", exmsg + 1,
4058				   statmsg);
4059		statmsg = buf;
4060		usestat = true;
4061	}
4062#endif /* NAMED_BIND */
4063	else
4064	{
4065		statmsg = exmsg;
4066		if (*statmsg++ == ':' && errnum != 0)
4067		{
4068			(void) sm_snprintf(buf, sizeof buf, "%s: %s", statmsg,
4069					   sm_errstring(errnum));
4070			statmsg = buf;
4071			usestat = true;
4072		}
4073		else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4074		{
4075			(void) sm_snprintf(buf, sizeof buf, "%s (%s)", statmsg,
4076					   shortenstring(e->e_statmsg, 403));
4077			statmsg = buf;
4078			usestat = true;
4079		}
4080	}
4081
4082	/*
4083	**  Print the message as appropriate
4084	*/
4085
4086	if (status == EX_OK || status == EX_TEMPFAIL)
4087	{
4088		extern char MsgBuf[];
4089
4090		if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4091		{
4092			if (dsn == NULL)
4093			{
4094				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4095						   "%.*s", off, statmsg + 4);
4096				dsn = dsnbuf;
4097			}
4098			off += 5;
4099		}
4100		else
4101		{
4102			off = 4;
4103		}
4104		message("%s", statmsg + off);
4105		if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4106			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4107					     &MsgBuf[4]);
4108	}
4109	else
4110	{
4111		char mbuf[ENHSCLEN + 4];
4112
4113		Errors++;
4114		if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4115		    off < sizeof mbuf - 4)
4116		{
4117			if (dsn == NULL)
4118			{
4119				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4120						   "%.*s", off, statmsg + 4);
4121				dsn = dsnbuf;
4122			}
4123			off += 5;
4124
4125			/* copy only part of statmsg to mbuf */
4126			(void) sm_strlcpy(mbuf, statmsg, off);
4127			(void) sm_strlcat(mbuf, " %s", sizeof mbuf);
4128		}
4129		else
4130		{
4131			dsnbuf[0] = '\0';
4132			(void) sm_snprintf(mbuf, sizeof mbuf, "%.3s %%s",
4133					   statmsg);
4134			off = 4;
4135		}
4136		usrerr(mbuf, &statmsg[off]);
4137	}
4138
4139	/*
4140	**  Final cleanup.
4141	**	Log a record of the transaction.  Compute the new
4142	**	ExitStat -- if we already had an error, stick with
4143	**	that.
4144	*/
4145
4146	if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4147	    LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4148		logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4149
4150	if (tTd(11, 2))
4151		sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4152			   status,
4153			   dsn == NULL ? "<NULL>" : dsn,
4154			   e->e_message == NULL ? "<NULL>" : e->e_message,
4155			   errnum);
4156
4157	if (status != EX_TEMPFAIL)
4158		setstat(status);
4159	if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4160		e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4161	if (status != EX_OK && to != NULL && to->q_message == NULL)
4162	{
4163		if (!usestat && e->e_message != NULL)
4164			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4165							  e->e_message);
4166		else
4167			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4168							  statmsg + off);
4169	}
4170	errno = 0;
4171	SM_SET_H_ERRNO(0);
4172}
4173/*
4174**  LOGDELIVERY -- log the delivery in the system log
4175**
4176**	Care is taken to avoid logging lines that are too long, because
4177**	some versions of syslog have an unfortunate proclivity for core
4178**	dumping.  This is a hack, to be sure, that is at best empirical.
4179**
4180**	Parameters:
4181**		m -- the mailer info.  Can be NULL for initial queue.
4182**		mci -- the mailer connection info -- can be NULL if the
4183**			log is occurring when no connection is active.
4184**		dsn -- the DSN attached to the status.
4185**		status -- the message to print for the status.
4186**		ctladdr -- the controlling address for the to list.
4187**		xstart -- the transaction start time, used for
4188**			computing transaction delay.
4189**		e -- the current envelope.
4190**
4191**	Returns:
4192**		none
4193**
4194**	Side Effects:
4195**		none
4196*/
4197
4198void
4199logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4200	MAILER *m;
4201	register MCI *mci;
4202	char *dsn;
4203	const char *status;
4204	ADDRESS *ctladdr;
4205	time_t xstart;
4206	register ENVELOPE *e;
4207{
4208	register char *bp;
4209	register char *p;
4210	int l;
4211	time_t now = curtime();
4212	char buf[1024];
4213
4214#if (SYSLOG_BUFSIZE) >= 256
4215	/* ctladdr: max 106 bytes */
4216	bp = buf;
4217	if (ctladdr != NULL)
4218	{
4219		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4220				   shortenstring(ctladdr->q_paddr, 83));
4221		bp += strlen(bp);
4222		if (bitset(QGOODUID, ctladdr->q_flags))
4223		{
4224			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4225					   (int) ctladdr->q_uid,
4226					   (int) ctladdr->q_gid);
4227			bp += strlen(bp);
4228		}
4229	}
4230
4231	/* delay & xdelay: max 41 bytes */
4232	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4233			   pintvl(now - e->e_ctime, true));
4234	bp += strlen(bp);
4235
4236	if (xstart != (time_t) 0)
4237	{
4238		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4239				   pintvl(now - xstart, true));
4240		bp += strlen(bp);
4241	}
4242
4243	/* mailer: assume about 19 bytes (max 10 byte mailer name) */
4244	if (m != NULL)
4245	{
4246		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4247				   m->m_name);
4248		bp += strlen(bp);
4249	}
4250
4251	/* pri: changes with each delivery attempt */
4252	(void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4253		e->e_msgpriority);
4254	bp += strlen(bp);
4255
4256	/* relay: max 66 bytes for IPv4 addresses */
4257	if (mci != NULL && mci->mci_host != NULL)
4258	{
4259		extern SOCKADDR CurHostAddr;
4260
4261		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4262				   shortenstring(mci->mci_host, 40));
4263		bp += strlen(bp);
4264
4265		if (CurHostAddr.sa.sa_family != 0)
4266		{
4267			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4268					   anynet_ntoa(&CurHostAddr));
4269		}
4270	}
4271	else if (strcmp(status, "quarantined") == 0)
4272	{
4273		if (e->e_quarmsg != NULL)
4274			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4275					   ", quarantine=%s",
4276					   shortenstring(e->e_quarmsg, 40));
4277	}
4278	else if (strcmp(status, "queued") != 0)
4279	{
4280		p = macvalue('h', e);
4281		if (p != NULL && p[0] != '\0')
4282		{
4283			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4284					   ", relay=%s", shortenstring(p, 40));
4285		}
4286	}
4287	bp += strlen(bp);
4288
4289	/* dsn */
4290	if (dsn != NULL && *dsn != '\0')
4291	{
4292		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4293				   shortenstring(dsn, ENHSCLEN));
4294		bp += strlen(bp);
4295	}
4296
4297#if _FFR_LOG_NTRIES
4298	/* ntries */
4299	if (e->e_ntries >= 0)
4300	{
4301		(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4302				   ", ntries=%d", e->e_ntries + 1);
4303		bp += strlen(bp);
4304	}
4305#endif /* _FFR_LOG_NTRIES */
4306
4307# define STATLEN		(((SYSLOG_BUFSIZE) - 100) / 4)
4308# if (STATLEN) < 63
4309#  undef STATLEN
4310#  define STATLEN	63
4311# endif /* (STATLEN) < 63 */
4312# if (STATLEN) > 203
4313#  undef STATLEN
4314#  define STATLEN	203
4315# endif /* (STATLEN) > 203 */
4316
4317	/* stat: max 210 bytes */
4318	if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
4319	{
4320		/* desperation move -- truncate data */
4321		bp = buf + sizeof buf - ((STATLEN) + 17);
4322		(void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4323		bp += 3;
4324	}
4325
4326	(void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4327	bp += strlen(bp);
4328
4329	(void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4330			  SPACELEFT(buf, bp));
4331
4332	/* id, to: max 13 + TOBUFSIZE bytes */
4333	l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4334	if (l < 0)
4335		l = 0;
4336	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4337	while (strlen(p) >= l)
4338	{
4339		register char *q;
4340
4341		for (q = p + l; q > p; q--)
4342		{
4343			if (*q == ',')
4344				break;
4345		}
4346		if (p == q)
4347			break;
4348		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4349			  (int) (++q - p), p, buf);
4350		p = q;
4351	}
4352	sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4353
4354#else /* (SYSLOG_BUFSIZE) >= 256 */
4355
4356	l = SYSLOG_BUFSIZE - 85;
4357	if (l < 0)
4358		l = 0;
4359	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4360	while (strlen(p) >= l)
4361	{
4362		register char *q;
4363
4364		for (q = p + l; q > p; q--)
4365		{
4366			if (*q == ',')
4367				break;
4368		}
4369		if (p == q)
4370			break;
4371
4372		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4373			  (int) (++q - p), p);
4374		p = q;
4375	}
4376	sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4377
4378	if (ctladdr != NULL)
4379	{
4380		bp = buf;
4381		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4382				   shortenstring(ctladdr->q_paddr, 83));
4383		bp += strlen(bp);
4384		if (bitset(QGOODUID, ctladdr->q_flags))
4385		{
4386			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4387					   ctladdr->q_uid, ctladdr->q_gid);
4388			bp += strlen(bp);
4389		}
4390		sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4391	}
4392	bp = buf;
4393	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4394			   pintvl(now - e->e_ctime, true));
4395	bp += strlen(bp);
4396	if (xstart != (time_t) 0)
4397	{
4398		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4399				   pintvl(now - xstart, true));
4400		bp += strlen(bp);
4401	}
4402
4403	if (m != NULL)
4404	{
4405		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4406				   m->m_name);
4407		bp += strlen(bp);
4408	}
4409	sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4410
4411	buf[0] = '\0';
4412	bp = buf;
4413	if (mci != NULL && mci->mci_host != NULL)
4414	{
4415		extern SOCKADDR CurHostAddr;
4416
4417		(void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4418				   mci->mci_host);
4419		bp += strlen(bp);
4420
4421		if (CurHostAddr.sa.sa_family != 0)
4422			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4423					   " [%.100s]",
4424					   anynet_ntoa(&CurHostAddr));
4425	}
4426	else if (strcmp(status, "quarantined") == 0)
4427	{
4428		if (e->e_quarmsg != NULL)
4429			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4430					   ", quarantine=%.100s",
4431					   e->e_quarmsg);
4432	}
4433	else if (strcmp(status, "queued") != 0)
4434	{
4435		p = macvalue('h', e);
4436		if (p != NULL && p[0] != '\0')
4437			(void) sm_snprintf(buf, sizeof buf, "relay=%.100s", p);
4438	}
4439	if (buf[0] != '\0')
4440		sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4441
4442	sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4443#endif /* (SYSLOG_BUFSIZE) >= 256 */
4444}
4445/*
4446**  PUTFROMLINE -- output a UNIX-style from line (or whatever)
4447**
4448**	This can be made an arbitrary message separator by changing $l
4449**
4450**	One of the ugliest hacks seen by human eyes is contained herein:
4451**	UUCP wants those stupid "remote from <host>" lines.  Why oh why
4452**	does a well-meaning programmer such as myself have to deal with
4453**	this kind of antique garbage????
4454**
4455**	Parameters:
4456**		mci -- the connection information.
4457**		e -- the envelope.
4458**
4459**	Returns:
4460**		true iff line was written successfully
4461**
4462**	Side Effects:
4463**		outputs some text to fp.
4464*/
4465
4466bool
4467putfromline(mci, e)
4468	register MCI *mci;
4469	ENVELOPE *e;
4470{
4471	char *template = UnixFromLine;
4472	char buf[MAXLINE];
4473	char xbuf[MAXLINE];
4474
4475	if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4476		return true;
4477
4478	mci->mci_flags |= MCIF_INHEADER;
4479
4480	if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4481	{
4482		char *bang;
4483
4484		expand("\201g", buf, sizeof buf, e);
4485		bang = strchr(buf, '!');
4486		if (bang == NULL)
4487		{
4488			char *at;
4489			char hname[MAXNAME];
4490
4491			/*
4492			**  If we can construct a UUCP path, do so
4493			*/
4494
4495			at = strrchr(buf, '@');
4496			if (at == NULL)
4497			{
4498				expand("\201k", hname, sizeof hname, e);
4499				at = hname;
4500			}
4501			else
4502				*at++ = '\0';
4503			(void) sm_snprintf(xbuf, sizeof xbuf,
4504					   "From %.800s  \201d remote from %.100s\n",
4505					   buf, at);
4506		}
4507		else
4508		{
4509			*bang++ = '\0';
4510			(void) sm_snprintf(xbuf, sizeof xbuf,
4511					   "From %.800s  \201d remote from %.100s\n",
4512					   bang, buf);
4513			template = xbuf;
4514		}
4515	}
4516	expand(template, buf, sizeof buf, e);
4517	return putxline(buf, strlen(buf), mci, PXLF_HEADER);
4518}
4519
4520/*
4521**  PUTBODY -- put the body of a message.
4522**
4523**	Parameters:
4524**		mci -- the connection information.
4525**		e -- the envelope to put out.
4526**		separator -- if non-NULL, a message separator that must
4527**			not be permitted in the resulting message.
4528**
4529**	Returns:
4530**		true iff message was written successfully
4531**
4532**	Side Effects:
4533**		The message is written onto fp.
4534*/
4535
4536/* values for output state variable */
4537#define OSTATE_HEAD	0	/* at beginning of line */
4538#define OSTATE_CR	1	/* read a carriage return */
4539#define OSTATE_INLINE	2	/* putting rest of line */
4540
4541bool
4542putbody(mci, e, separator)
4543	register MCI *mci;
4544	register ENVELOPE *e;
4545	char *separator;
4546{
4547	bool dead = false;
4548	bool ioerr = false;
4549	int save_errno;
4550	char buf[MAXLINE];
4551#if MIME8TO7
4552	char *boundaries[MAXMIMENESTING + 1];
4553#endif /* MIME8TO7 */
4554
4555	/*
4556	**  Output the body of the message
4557	*/
4558
4559	if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4560	{
4561		char *df = queuename(e, DATAFL_LETTER);
4562
4563		e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4564				      SM_IO_RDONLY_B, NULL);
4565		if (e->e_dfp == NULL)
4566		{
4567			char *msg = "!putbody: Cannot open %s for %s from %s";
4568
4569			if (errno == ENOENT)
4570				msg++;
4571			syserr(msg, df, e->e_to, e->e_from.q_paddr);
4572		}
4573
4574	}
4575	if (e->e_dfp == NULL)
4576	{
4577		if (bitset(MCIF_INHEADER, mci->mci_flags))
4578		{
4579			if (!putline("", mci))
4580				goto writeerr;
4581			mci->mci_flags &= ~MCIF_INHEADER;
4582		}
4583		if (!putline("<<< No Message Collected >>>", mci))
4584			goto writeerr;
4585		goto endofmessage;
4586	}
4587
4588	if (e->e_dfino == (ino_t) 0)
4589	{
4590		struct stat stbuf;
4591
4592		if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4593		    < 0)
4594			e->e_dfino = -1;
4595		else
4596		{
4597			e->e_dfdev = stbuf.st_dev;
4598			e->e_dfino = stbuf.st_ino;
4599		}
4600	}
4601
4602	/* paranoia: the data file should always be in a rewound state */
4603	(void) bfrewind(e->e_dfp);
4604
4605	/* simulate an I/O timeout when used as source */
4606	if (tTd(84, 101))
4607		sleep(319);
4608
4609#if MIME8TO7
4610	if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4611	{
4612		/*
4613		**  Do 8 to 7 bit MIME conversion.
4614		*/
4615
4616		/* make sure it looks like a MIME message */
4617		if (hvalue("MIME-Version", e->e_header) == NULL &&
4618		    !putline("MIME-Version: 1.0", mci))
4619			goto writeerr;
4620
4621		if (hvalue("Content-Type", e->e_header) == NULL)
4622		{
4623			(void) sm_snprintf(buf, sizeof buf,
4624					   "Content-Type: text/plain; charset=%s",
4625					   defcharset(e));
4626			if (!putline(buf, mci))
4627				goto writeerr;
4628		}
4629
4630		/* now do the hard work */
4631		boundaries[0] = NULL;
4632		mci->mci_flags |= MCIF_INHEADER;
4633		if (mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER, 0) ==
4634								SM_IO_EOF)
4635			goto writeerr;
4636	}
4637# if MIME7TO8
4638	else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4639	{
4640		if (!mime7to8(mci, e->e_header, e))
4641			goto writeerr;
4642	}
4643# endif /* MIME7TO8 */
4644	else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4645	{
4646		bool oldsuprerrs = SuprErrs;
4647
4648		/* Use mime8to7 to check multipart for MIME header overflows */
4649		boundaries[0] = NULL;
4650		mci->mci_flags |= MCIF_INHEADER;
4651
4652		/*
4653		**  If EF_DONT_MIME is set, we have a broken MIME message
4654		**  and don't want to generate a new bounce message whose
4655		**  body propagates the broken MIME.  We can't just not call
4656		**  mime8to7() as is done above since we need the security
4657		**  checks.  The best we can do is suppress the errors.
4658		*/
4659
4660		if (bitset(EF_DONT_MIME, e->e_flags))
4661			SuprErrs = true;
4662
4663		if (mime8to7(mci, e->e_header, e, boundaries,
4664				M87F_OUTER|M87F_NO8TO7, 0) == SM_IO_EOF)
4665			goto writeerr;
4666
4667		/* restore SuprErrs */
4668		SuprErrs = oldsuprerrs;
4669	}
4670	else
4671#endif /* MIME8TO7 */
4672	{
4673		int ostate;
4674		register char *bp;
4675		register char *pbp;
4676		register int c;
4677		register char *xp;
4678		int padc;
4679		char *buflim;
4680		int pos = 0;
4681		char peekbuf[12];
4682
4683		if (bitset(MCIF_INHEADER, mci->mci_flags))
4684		{
4685			if (!putline("", mci))
4686				goto writeerr;
4687			mci->mci_flags &= ~MCIF_INHEADER;
4688		}
4689
4690		/* determine end of buffer; allow for short mailer lines */
4691		buflim = &buf[sizeof buf - 1];
4692		if (mci->mci_mailer->m_linelimit > 0 &&
4693		    mci->mci_mailer->m_linelimit < sizeof buf - 1)
4694			buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4695
4696		/* copy temp file to output with mapping */
4697		ostate = OSTATE_HEAD;
4698		bp = buf;
4699		pbp = peekbuf;
4700		while (!sm_io_error(mci->mci_out) && !dead)
4701		{
4702			if (pbp > peekbuf)
4703				c = *--pbp;
4704			else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4705				 == SM_IO_EOF)
4706				break;
4707			if (bitset(MCIF_7BIT, mci->mci_flags))
4708				c &= 0x7f;
4709			switch (ostate)
4710			{
4711			  case OSTATE_HEAD:
4712				if (c == '\0' &&
4713				    bitnset(M_NONULLS,
4714					    mci->mci_mailer->m_flags))
4715					break;
4716				if (c != '\r' && c != '\n' && bp < buflim)
4717				{
4718					*bp++ = c;
4719					break;
4720				}
4721
4722				/* check beginning of line for special cases */
4723				*bp = '\0';
4724				pos = 0;
4725				padc = SM_IO_EOF;
4726				if (buf[0] == 'F' &&
4727				    bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4728				    && strncmp(buf, "From ", 5) == 0)
4729				{
4730					padc = '>';
4731				}
4732				if (buf[0] == '-' && buf[1] == '-' &&
4733				    separator != NULL)
4734				{
4735					/* possible separator */
4736					int sl = strlen(separator);
4737
4738					if (strncmp(&buf[2], separator, sl)
4739					    == 0)
4740						padc = ' ';
4741				}
4742				if (buf[0] == '.' &&
4743				    bitnset(M_XDOT, mci->mci_mailer->m_flags))
4744				{
4745					padc = '.';
4746				}
4747
4748				/* now copy out saved line */
4749				if (TrafficLogFile != NULL)
4750				{
4751					(void) sm_io_fprintf(TrafficLogFile,
4752							     SM_TIME_DEFAULT,
4753							     "%05d >>> ",
4754							     (int) CurrentPid);
4755					if (padc != SM_IO_EOF)
4756						(void) sm_io_putc(TrafficLogFile,
4757								  SM_TIME_DEFAULT,
4758								  padc);
4759					for (xp = buf; xp < bp; xp++)
4760						(void) sm_io_putc(TrafficLogFile,
4761								  SM_TIME_DEFAULT,
4762								  (unsigned char) *xp);
4763					if (c == '\n')
4764						(void) sm_io_fputs(TrafficLogFile,
4765								   SM_TIME_DEFAULT,
4766								   mci->mci_mailer->m_eol);
4767				}
4768				if (padc != SM_IO_EOF)
4769				{
4770					if (sm_io_putc(mci->mci_out,
4771						       SM_TIME_DEFAULT, padc)
4772					    == SM_IO_EOF)
4773					{
4774						dead = true;
4775						continue;
4776					}
4777					pos++;
4778				}
4779				for (xp = buf; xp < bp; xp++)
4780				{
4781					if (sm_io_putc(mci->mci_out,
4782						       SM_TIME_DEFAULT,
4783						       (unsigned char) *xp)
4784					    == SM_IO_EOF)
4785					{
4786						dead = true;
4787						break;
4788					}
4789				}
4790				if (dead)
4791					continue;
4792				if (c == '\n')
4793				{
4794					if (sm_io_fputs(mci->mci_out,
4795							SM_TIME_DEFAULT,
4796							mci->mci_mailer->m_eol)
4797							== SM_IO_EOF)
4798						break;
4799					pos = 0;
4800				}
4801				else
4802				{
4803					pos += bp - buf;
4804					if (c != '\r')
4805					{
4806						SM_ASSERT(pbp < peekbuf +
4807								sizeof(peekbuf));
4808						*pbp++ = c;
4809					}
4810				}
4811
4812				bp = buf;
4813
4814				/* determine next state */
4815				if (c == '\n')
4816					ostate = OSTATE_HEAD;
4817				else if (c == '\r')
4818					ostate = OSTATE_CR;
4819				else
4820					ostate = OSTATE_INLINE;
4821				continue;
4822
4823			  case OSTATE_CR:
4824				if (c == '\n')
4825				{
4826					/* got CRLF */
4827					if (sm_io_fputs(mci->mci_out,
4828							SM_TIME_DEFAULT,
4829							mci->mci_mailer->m_eol)
4830							== SM_IO_EOF)
4831						continue;
4832
4833					if (TrafficLogFile != NULL)
4834					{
4835						(void) sm_io_fputs(TrafficLogFile,
4836								   SM_TIME_DEFAULT,
4837								   mci->mci_mailer->m_eol);
4838					}
4839					ostate = OSTATE_HEAD;
4840					continue;
4841				}
4842
4843				/* had a naked carriage return */
4844				SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4845				*pbp++ = c;
4846				c = '\r';
4847				ostate = OSTATE_INLINE;
4848				goto putch;
4849
4850			  case OSTATE_INLINE:
4851				if (c == '\r')
4852				{
4853					ostate = OSTATE_CR;
4854					continue;
4855				}
4856				if (c == '\0' &&
4857				    bitnset(M_NONULLS,
4858					    mci->mci_mailer->m_flags))
4859					break;
4860putch:
4861				if (mci->mci_mailer->m_linelimit > 0 &&
4862				    pos >= mci->mci_mailer->m_linelimit - 1 &&
4863				    c != '\n')
4864				{
4865					int d;
4866
4867					/* check next character for EOL */
4868					if (pbp > peekbuf)
4869						d = *(pbp - 1);
4870					else if ((d = sm_io_getc(e->e_dfp,
4871								 SM_TIME_DEFAULT))
4872						 != SM_IO_EOF)
4873					{
4874						SM_ASSERT(pbp < peekbuf +
4875								sizeof(peekbuf));
4876						*pbp++ = d;
4877					}
4878
4879					if (d == '\n' || d == SM_IO_EOF)
4880					{
4881						if (TrafficLogFile != NULL)
4882							(void) sm_io_putc(TrafficLogFile,
4883									  SM_TIME_DEFAULT,
4884									  (unsigned char) c);
4885						if (sm_io_putc(mci->mci_out,
4886							       SM_TIME_DEFAULT,
4887							       (unsigned char) c)
4888							       == SM_IO_EOF)
4889						{
4890							dead = true;
4891							continue;
4892						}
4893						pos++;
4894						continue;
4895					}
4896
4897					if (sm_io_putc(mci->mci_out,
4898						       SM_TIME_DEFAULT, '!')
4899					    == SM_IO_EOF ||
4900					    sm_io_fputs(mci->mci_out,
4901							SM_TIME_DEFAULT,
4902							mci->mci_mailer->m_eol)
4903					    == SM_IO_EOF)
4904					{
4905						dead = true;
4906						continue;
4907					}
4908
4909					if (TrafficLogFile != NULL)
4910					{
4911						(void) sm_io_fprintf(TrafficLogFile,
4912								     SM_TIME_DEFAULT,
4913								     "!%s",
4914								     mci->mci_mailer->m_eol);
4915					}
4916					ostate = OSTATE_HEAD;
4917					SM_ASSERT(pbp < peekbuf +
4918							sizeof(peekbuf));
4919					*pbp++ = c;
4920					continue;
4921				}
4922				if (c == '\n')
4923				{
4924					if (TrafficLogFile != NULL)
4925						(void) sm_io_fputs(TrafficLogFile,
4926								   SM_TIME_DEFAULT,
4927								   mci->mci_mailer->m_eol);
4928					if (sm_io_fputs(mci->mci_out,
4929							SM_TIME_DEFAULT,
4930							mci->mci_mailer->m_eol)
4931							== SM_IO_EOF)
4932						continue;
4933					pos = 0;
4934					ostate = OSTATE_HEAD;
4935				}
4936				else
4937				{
4938					if (TrafficLogFile != NULL)
4939						(void) sm_io_putc(TrafficLogFile,
4940								  SM_TIME_DEFAULT,
4941								  (unsigned char) c);
4942					if (sm_io_putc(mci->mci_out,
4943						       SM_TIME_DEFAULT,
4944						       (unsigned char) c)
4945					    == SM_IO_EOF)
4946					{
4947						dead = true;
4948						continue;
4949					}
4950					pos++;
4951					ostate = OSTATE_INLINE;
4952				}
4953				break;
4954			}
4955		}
4956
4957		/* make sure we are at the beginning of a line */
4958		if (bp > buf)
4959		{
4960			if (TrafficLogFile != NULL)
4961			{
4962				for (xp = buf; xp < bp; xp++)
4963					(void) sm_io_putc(TrafficLogFile,
4964							  SM_TIME_DEFAULT,
4965							  (unsigned char) *xp);
4966			}
4967			for (xp = buf; xp < bp; xp++)
4968			{
4969				if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4970					       (unsigned char) *xp)
4971				    == SM_IO_EOF)
4972				{
4973					dead = true;
4974					break;
4975				}
4976			}
4977			pos += bp - buf;
4978		}
4979		if (!dead && pos > 0)
4980		{
4981			if (TrafficLogFile != NULL)
4982				(void) sm_io_fputs(TrafficLogFile,
4983						   SM_TIME_DEFAULT,
4984						   mci->mci_mailer->m_eol);
4985			if (sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
4986					   mci->mci_mailer->m_eol) == SM_IO_EOF)
4987				goto writeerr;
4988		}
4989	}
4990
4991	if (sm_io_error(e->e_dfp))
4992	{
4993		syserr("putbody: %s/%cf%s: read error",
4994		       qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
4995		       DATAFL_LETTER, e->e_id);
4996		ExitStat = EX_IOERR;
4997		ioerr = true;
4998	}
4999
5000endofmessage:
5001	/*
5002	**  Since mailfile() uses e_dfp in a child process,
5003	**  the file offset in the stdio library for the
5004	**  parent process will not agree with the in-kernel
5005	**  file offset since the file descriptor is shared
5006	**  between the processes.  Therefore, it is vital
5007	**  that the file always be rewound.  This forces the
5008	**  kernel offset (lseek) and stdio library (ftell)
5009	**  offset to match.
5010	*/
5011
5012	save_errno = errno;
5013	if (e->e_dfp != NULL)
5014		(void) bfrewind(e->e_dfp);
5015
5016	/* some mailers want extra blank line at end of message */
5017	if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5018	    buf[0] != '\0' && buf[0] != '\n')
5019	{
5020		if (!putline("", mci))
5021			goto writeerr;
5022	}
5023
5024	if (!dead &&
5025	    (sm_io_flush(mci->mci_out, SM_TIME_DEFAULT) == SM_IO_EOF ||
5026	     (sm_io_error(mci->mci_out) && errno != EPIPE)))
5027	{
5028		save_errno = errno;
5029		syserr("putbody: write error");
5030		ExitStat = EX_IOERR;
5031		ioerr = true;
5032	}
5033
5034	errno = save_errno;
5035	return !dead && !ioerr;
5036
5037  writeerr:
5038	return false;
5039}
5040
5041/*
5042**  MAILFILE -- Send a message to a file.
5043**
5044**	If the file has the set-user-ID/set-group-ID bits set, but NO
5045**	execute bits, sendmail will try to become the owner of that file
5046**	rather than the real user.  Obviously, this only works if
5047**	sendmail runs as root.
5048**
5049**	This could be done as a subordinate mailer, except that it
5050**	is used implicitly to save messages in ~/dead.letter.  We
5051**	view this as being sufficiently important as to include it
5052**	here.  For example, if the system is dying, we shouldn't have
5053**	to create another process plus some pipes to save the message.
5054**
5055**	Parameters:
5056**		filename -- the name of the file to send to.
5057**		mailer -- mailer definition for recipient -- if NULL,
5058**			use FileMailer.
5059**		ctladdr -- the controlling address header -- includes
5060**			the userid/groupid to be when sending.
5061**		sfflags -- flags for opening.
5062**		e -- the current envelope.
5063**
5064**	Returns:
5065**		The exit code associated with the operation.
5066**
5067**	Side Effects:
5068**		none.
5069*/
5070
5071# define RETURN(st)			exit(st);
5072
5073static jmp_buf	CtxMailfileTimeout;
5074
5075int
5076mailfile(filename, mailer, ctladdr, sfflags, e)
5077	char *volatile filename;
5078	MAILER *volatile mailer;
5079	ADDRESS *ctladdr;
5080	volatile long sfflags;
5081	register ENVELOPE *e;
5082{
5083	register SM_FILE_T *f;
5084	register pid_t pid = -1;
5085	volatile int mode;
5086	int len;
5087	off_t curoff;
5088	bool suidwarn = geteuid() == 0;
5089	char *p;
5090	char *volatile realfile;
5091	SM_EVENT *ev;
5092	char buf[MAXPATHLEN];
5093	char targetfile[MAXPATHLEN];
5094
5095	if (tTd(11, 1))
5096	{
5097		sm_dprintf("mailfile %s\n  ctladdr=", filename);
5098		printaddr(sm_debug_file(), ctladdr, false);
5099	}
5100
5101	if (mailer == NULL)
5102		mailer = FileMailer;
5103
5104	if (e->e_xfp != NULL)
5105		(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5106
5107	/*
5108	**  Special case /dev/null.  This allows us to restrict file
5109	**  delivery to regular files only.
5110	*/
5111
5112	if (sm_path_isdevnull(filename))
5113		return EX_OK;
5114
5115	/* check for 8-bit available */
5116	if (bitset(EF_HAS8BIT, e->e_flags) &&
5117	    bitnset(M_7BITS, mailer->m_flags) &&
5118	    (bitset(EF_DONT_MIME, e->e_flags) ||
5119	     !(bitset(MM_MIME8BIT, MimeMode) ||
5120	       (bitset(EF_IS_MIME, e->e_flags) &&
5121		bitset(MM_CVTMIME, MimeMode)))))
5122	{
5123		e->e_status = "5.6.3";
5124		usrerrenh(e->e_status,
5125			  "554 Cannot send 8-bit data to 7-bit destination");
5126		errno = 0;
5127		return EX_DATAERR;
5128	}
5129
5130	/* Find the actual file */
5131	if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5132	{
5133		len = strlen(SafeFileEnv);
5134
5135		if (strncmp(SafeFileEnv, filename, len) == 0)
5136			filename += len;
5137
5138		if (len + strlen(filename) + 1 >= sizeof targetfile)
5139		{
5140			syserr("mailfile: filename too long (%s/%s)",
5141			       SafeFileEnv, filename);
5142			return EX_CANTCREAT;
5143		}
5144		(void) sm_strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
5145		realfile = targetfile + len;
5146		if (*filename == '/')
5147			filename++;
5148		if (*filename != '\0')
5149		{
5150			/* paranoia: trailing / should be removed in readcf */
5151			if (targetfile[len - 1] != '/')
5152				(void) sm_strlcat(targetfile,
5153						  "/", sizeof targetfile);
5154			(void) sm_strlcat(targetfile, filename,
5155					  sizeof targetfile);
5156		}
5157	}
5158	else if (mailer->m_rootdir != NULL)
5159	{
5160		expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
5161		len = strlen(targetfile);
5162
5163		if (strncmp(targetfile, filename, len) == 0)
5164			filename += len;
5165
5166		if (len + strlen(filename) + 1 >= sizeof targetfile)
5167		{
5168			syserr("mailfile: filename too long (%s/%s)",
5169			       targetfile, filename);
5170			return EX_CANTCREAT;
5171		}
5172		realfile = targetfile + len;
5173		if (targetfile[len - 1] != '/')
5174			(void) sm_strlcat(targetfile, "/", sizeof targetfile);
5175		if (*filename == '/')
5176			(void) sm_strlcat(targetfile, filename + 1,
5177					  sizeof targetfile);
5178		else
5179			(void) sm_strlcat(targetfile, filename,
5180					  sizeof targetfile);
5181	}
5182	else
5183	{
5184		if (sm_strlcpy(targetfile, filename, sizeof targetfile) >=
5185		    sizeof targetfile)
5186		{
5187			syserr("mailfile: filename too long (%s)", filename);
5188			return EX_CANTCREAT;
5189		}
5190		realfile = targetfile;
5191	}
5192
5193	/*
5194	**  Fork so we can change permissions here.
5195	**	Note that we MUST use fork, not vfork, because of
5196	**	the complications of calling subroutines, etc.
5197	*/
5198
5199
5200	/*
5201	**  Dispose of SIGCHLD signal catchers that may be laying
5202	**  around so that the waitfor() below will get it.
5203	*/
5204
5205	(void) sm_signal(SIGCHLD, SIG_DFL);
5206
5207	DOFORK(fork);
5208
5209	if (pid < 0)
5210		return EX_OSERR;
5211	else if (pid == 0)
5212	{
5213		/* child -- actually write to file */
5214		struct stat stb;
5215		MCI mcibuf;
5216		int err;
5217		volatile int oflags = O_WRONLY|O_APPEND;
5218
5219		/* Reset global flags */
5220		RestartRequest = NULL;
5221		RestartWorkGroup = false;
5222		ShutdownRequest = NULL;
5223		PendingSignal = 0;
5224		CurrentPid = getpid();
5225
5226		if (e->e_lockfp != NULL)
5227		{
5228			int fd;
5229
5230			fd = sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, NULL);
5231			/* SM_ASSERT(fd >= 0); */
5232			if (fd >= 0)
5233				(void) close(fd);
5234		}
5235
5236		(void) sm_signal(SIGINT, SIG_DFL);
5237		(void) sm_signal(SIGHUP, SIG_DFL);
5238		(void) sm_signal(SIGTERM, SIG_DFL);
5239		(void) umask(OldUmask);
5240		e->e_to = filename;
5241		ExitStat = EX_OK;
5242
5243		if (setjmp(CtxMailfileTimeout) != 0)
5244		{
5245			RETURN(EX_TEMPFAIL);
5246		}
5247
5248		if (TimeOuts.to_fileopen > 0)
5249			ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5250					 0);
5251		else
5252			ev = NULL;
5253
5254		/* check file mode to see if set-user-ID */
5255		if (stat(targetfile, &stb) < 0)
5256			mode = FileMode;
5257		else
5258			mode = stb.st_mode;
5259
5260		/* limit the errors to those actually caused in the child */
5261		errno = 0;
5262		ExitStat = EX_OK;
5263
5264		/* Allow alias expansions to use the S_IS{U,G}ID bits */
5265		if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5266		    bitset(SFF_RUNASREALUID, sfflags))
5267		{
5268			/* ignore set-user-ID and set-group-ID bits */
5269			mode &= ~(S_ISGID|S_ISUID);
5270			if (tTd(11, 20))
5271				sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5272		}
5273
5274		/* we have to open the data file BEFORE setuid() */
5275		if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5276		{
5277			char *df = queuename(e, DATAFL_LETTER);
5278
5279			e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5280					      SM_IO_RDONLY_B, NULL);
5281			if (e->e_dfp == NULL)
5282			{
5283				syserr("mailfile: Cannot open %s for %s from %s",
5284					df, e->e_to, e->e_from.q_paddr);
5285			}
5286		}
5287
5288		/* select a new user to run as */
5289		if (!bitset(SFF_RUNASREALUID, sfflags))
5290		{
5291			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5292			{
5293				RealUserName = NULL;
5294				if (mailer->m_uid == NO_UID)
5295					RealUid = RunAsUid;
5296				else
5297					RealUid = mailer->m_uid;
5298				if (RunAsUid != 0 && RealUid != RunAsUid)
5299				{
5300					/* Only root can change the uid */
5301					syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5302						(int) RunAsUid, (int) RealUid);
5303					RETURN(EX_TEMPFAIL);
5304				}
5305			}
5306			else if (bitset(S_ISUID, mode))
5307			{
5308				RealUserName = NULL;
5309				RealUid = stb.st_uid;
5310			}
5311			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5312			{
5313				if (ctladdr->q_ruser != NULL)
5314					RealUserName = ctladdr->q_ruser;
5315				else
5316					RealUserName = ctladdr->q_user;
5317				RealUid = ctladdr->q_uid;
5318			}
5319			else if (mailer != NULL && mailer->m_uid != NO_UID)
5320			{
5321				RealUserName = DefUser;
5322				RealUid = mailer->m_uid;
5323			}
5324			else
5325			{
5326				RealUserName = DefUser;
5327				RealUid = DefUid;
5328			}
5329
5330			/* select a new group to run as */
5331			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5332			{
5333				if (mailer->m_gid == NO_GID)
5334					RealGid = RunAsGid;
5335				else
5336					RealGid = mailer->m_gid;
5337				if (RunAsUid != 0 &&
5338				    (RealGid != getgid() ||
5339				     RealGid != getegid()))
5340				{
5341					/* Only root can change the gid */
5342					syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5343					       (int) RealGid, (int) RunAsUid,
5344					       (int) getgid(), (int) getegid());
5345					RETURN(EX_TEMPFAIL);
5346				}
5347			}
5348			else if (bitset(S_ISGID, mode))
5349				RealGid = stb.st_gid;
5350			else if (ctladdr != NULL &&
5351				 ctladdr->q_uid == DefUid &&
5352				 ctladdr->q_gid == 0)
5353			{
5354				/*
5355				**  Special case:  This means it is an
5356				**  alias and we should act as DefaultUser.
5357				**  See alias()'s comments.
5358				*/
5359
5360				RealGid = DefGid;
5361				RealUserName = DefUser;
5362			}
5363			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5364				RealGid = ctladdr->q_gid;
5365			else if (mailer != NULL && mailer->m_gid != NO_GID)
5366				RealGid = mailer->m_gid;
5367			else
5368				RealGid = DefGid;
5369		}
5370
5371		/* last ditch */
5372		if (!bitset(SFF_ROOTOK, sfflags))
5373		{
5374			if (RealUid == 0)
5375				RealUid = DefUid;
5376			if (RealGid == 0)
5377				RealGid = DefGid;
5378		}
5379
5380		/* set group id list (needs /etc/group access) */
5381		if (RealUserName != NULL && !DontInitGroups)
5382		{
5383			if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5384			{
5385				syserr("mailfile: initgroups(%s, %d) failed",
5386					RealUserName, RealGid);
5387				RETURN(EX_TEMPFAIL);
5388			}
5389		}
5390		else
5391		{
5392			GIDSET_T gidset[1];
5393
5394			gidset[0] = RealGid;
5395			if (setgroups(1, gidset) == -1 && suidwarn)
5396			{
5397				syserr("mailfile: setgroups() failed");
5398				RETURN(EX_TEMPFAIL);
5399			}
5400		}
5401
5402		/*
5403		**  If you have a safe environment, go into it.
5404		*/
5405
5406		if (realfile != targetfile)
5407		{
5408			char save;
5409
5410			save = *realfile;
5411			*realfile = '\0';
5412			if (tTd(11, 20))
5413				sm_dprintf("mailfile: chroot %s\n", targetfile);
5414			if (chroot(targetfile) < 0)
5415			{
5416				syserr("mailfile: Cannot chroot(%s)",
5417				       targetfile);
5418				RETURN(EX_CANTCREAT);
5419			}
5420			*realfile = save;
5421		}
5422
5423		if (tTd(11, 40))
5424			sm_dprintf("mailfile: deliver to %s\n", realfile);
5425
5426		if (chdir("/") < 0)
5427		{
5428			syserr("mailfile: cannot chdir(/)");
5429			RETURN(EX_CANTCREAT);
5430		}
5431
5432		/* now reset the group and user ids */
5433		endpwent();
5434		sm_mbdb_terminate();
5435		if (setgid(RealGid) < 0 && suidwarn)
5436		{
5437			syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5438			RETURN(EX_TEMPFAIL);
5439		}
5440		vendor_set_uid(RealUid);
5441		if (setuid(RealUid) < 0 && suidwarn)
5442		{
5443			syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5444			RETURN(EX_TEMPFAIL);
5445		}
5446
5447		if (tTd(11, 2))
5448			sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5449				(int) getuid(), (int) geteuid(),
5450				(int) getgid(), (int) getegid());
5451
5452
5453		/* move into some "safe" directory */
5454		if (mailer->m_execdir != NULL)
5455		{
5456			char *q;
5457
5458			for (p = mailer->m_execdir; p != NULL; p = q)
5459			{
5460				q = strchr(p, ':');
5461				if (q != NULL)
5462					*q = '\0';
5463				expand(p, buf, sizeof buf, e);
5464				if (q != NULL)
5465					*q++ = ':';
5466				if (tTd(11, 20))
5467					sm_dprintf("mailfile: trydir %s\n",
5468						   buf);
5469				if (buf[0] != '\0' && chdir(buf) >= 0)
5470					break;
5471			}
5472		}
5473
5474		/*
5475		**  Recheck the file after we have assumed the ID of the
5476		**  delivery user to make sure we can deliver to it as
5477		**  that user.  This is necessary if sendmail is running
5478		**  as root and the file is on an NFS mount which treats
5479		**  root as nobody.
5480		*/
5481
5482#if HASLSTAT
5483		if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5484			err = stat(realfile, &stb);
5485		else
5486			err = lstat(realfile, &stb);
5487#else /* HASLSTAT */
5488		err = stat(realfile, &stb);
5489#endif /* HASLSTAT */
5490
5491		if (err < 0)
5492		{
5493			stb.st_mode = ST_MODE_NOFILE;
5494			mode = FileMode;
5495			oflags |= O_CREAT|O_EXCL;
5496		}
5497		else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5498			 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5499				   DontBlameSendmail) &&
5500			  stb.st_nlink != 1) ||
5501			 (realfile != targetfile && !S_ISREG(mode)))
5502			exit(EX_CANTCREAT);
5503		else
5504			mode = stb.st_mode;
5505
5506		if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5507			sfflags |= SFF_NOSLINK;
5508		if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5509			sfflags |= SFF_NOHLINK;
5510		sfflags &= ~SFF_OPENASROOT;
5511		f = safefopen(realfile, oflags, mode, sfflags);
5512		if (f == NULL)
5513		{
5514			if (transienterror(errno))
5515			{
5516				usrerr("454 4.3.0 cannot open %s: %s",
5517				       shortenstring(realfile, MAXSHORTSTR),
5518				       sm_errstring(errno));
5519				RETURN(EX_TEMPFAIL);
5520			}
5521			else
5522			{
5523				usrerr("554 5.3.0 cannot open %s: %s",
5524				       shortenstring(realfile, MAXSHORTSTR),
5525				       sm_errstring(errno));
5526				RETURN(EX_CANTCREAT);
5527			}
5528		}
5529		if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5530		    &stb))
5531		{
5532			syserr("554 5.3.0 file changed after open");
5533			RETURN(EX_CANTCREAT);
5534		}
5535		if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5536		{
5537			syserr("554 5.3.0 cannot fstat %s",
5538				sm_errstring(errno));
5539			RETURN(EX_CANTCREAT);
5540		}
5541
5542		curoff = stb.st_size;
5543
5544		if (ev != NULL)
5545			sm_clrevent(ev);
5546
5547		memset(&mcibuf, '\0', sizeof mcibuf);
5548		mcibuf.mci_mailer = mailer;
5549		mcibuf.mci_out = f;
5550		if (bitnset(M_7BITS, mailer->m_flags))
5551			mcibuf.mci_flags |= MCIF_7BIT;
5552
5553		/* clear out per-message flags from connection structure */
5554		mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5555
5556		if (bitset(EF_HAS8BIT, e->e_flags) &&
5557		    !bitset(EF_DONT_MIME, e->e_flags) &&
5558		    bitnset(M_7BITS, mailer->m_flags))
5559			mcibuf.mci_flags |= MCIF_CVT8TO7;
5560
5561#if MIME7TO8
5562		if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5563		    !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5564		    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5565		    (sm_strcasecmp(p, "quoted-printable") == 0 ||
5566		     sm_strcasecmp(p, "base64") == 0) &&
5567		    (p = hvalue("Content-Type", e->e_header)) != NULL)
5568		{
5569			/* may want to convert 7 -> 8 */
5570			/* XXX should really parse it here -- and use a class XXX */
5571			if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5572			    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5573				mcibuf.mci_flags |= MCIF_CVT7TO8;
5574		}
5575#endif /* MIME7TO8 */
5576
5577		if (!putfromline(&mcibuf, e) ||
5578		    !(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER) ||
5579		    !(*e->e_putbody)(&mcibuf, e, NULL) ||
5580		    !putline("\n", &mcibuf) ||
5581		    (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5582		    (SuperSafe != SAFE_NO &&
5583		     fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5584		    sm_io_error(f)))
5585		{
5586			setstat(EX_IOERR);
5587#if !NOFTRUNCATE
5588			(void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5589					 curoff);
5590#endif /* !NOFTRUNCATE */
5591		}
5592
5593		/* reset ISUID & ISGID bits for paranoid systems */
5594#if HASFCHMOD
5595		(void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5596			      (MODE_T) mode);
5597#else /* HASFCHMOD */
5598		(void) chmod(filename, (MODE_T) mode);
5599#endif /* HASFCHMOD */
5600		if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5601			setstat(EX_IOERR);
5602		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5603		(void) setuid(RealUid);
5604		exit(ExitStat);
5605		/* NOTREACHED */
5606	}
5607	else
5608	{
5609		/* parent -- wait for exit status */
5610		int st;
5611
5612		st = waitfor(pid);
5613		if (st == -1)
5614		{
5615			syserr("mailfile: %s: wait", mailer->m_name);
5616			return EX_SOFTWARE;
5617		}
5618		if (WIFEXITED(st))
5619		{
5620			errno = 0;
5621			return (WEXITSTATUS(st));
5622		}
5623		else
5624		{
5625			syserr("mailfile: %s: child died on signal %d",
5626			       mailer->m_name, st);
5627			return EX_UNAVAILABLE;
5628		}
5629		/* NOTREACHED */
5630	}
5631	return EX_UNAVAILABLE;	/* avoid compiler warning on IRIX */
5632}
5633
5634static void
5635mailfiletimeout(ignore)
5636	int ignore;
5637{
5638	/*
5639	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
5640	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5641	**	DOING.
5642	*/
5643
5644	errno = ETIMEDOUT;
5645	longjmp(CtxMailfileTimeout, 1);
5646}
5647/*
5648**  HOSTSIGNATURE -- return the "signature" for a host.
5649**
5650**	The signature describes how we are going to send this -- it
5651**	can be just the hostname (for non-Internet hosts) or can be
5652**	an ordered list of MX hosts.
5653**
5654**	Parameters:
5655**		m -- the mailer describing this host.
5656**		host -- the host name.
5657**
5658**	Returns:
5659**		The signature for this host.
5660**
5661**	Side Effects:
5662**		Can tweak the symbol table.
5663*/
5664
5665#define MAXHOSTSIGNATURE	8192	/* max len of hostsignature */
5666
5667char *
5668hostsignature(m, host)
5669	register MAILER *m;
5670	char *host;
5671{
5672	register char *p;
5673	register STAB *s;
5674	time_t now;
5675#if NAMED_BIND
5676	char sep = ':';
5677	char prevsep = ':';
5678	int i;
5679	int len;
5680	int nmx;
5681	int hl;
5682	char *hp;
5683	char *endp;
5684	int oldoptions = _res.options;
5685	char *mxhosts[MAXMXHOSTS + 1];
5686	unsigned short mxprefs[MAXMXHOSTS + 1];
5687#endif /* NAMED_BIND */
5688
5689	if (tTd(17, 3))
5690		sm_dprintf("hostsignature(%s)\n", host);
5691
5692	/*
5693	**  If local delivery (and not remote), just return a constant.
5694	*/
5695
5696	if (bitnset(M_LOCALMAILER, m->m_flags) &&
5697	    strcmp(m->m_mailer, "[IPC]") != 0 &&
5698	    !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5699		return "localhost";
5700
5701	/* an empty host does not have MX records */
5702	if (*host == '\0')
5703		return "_empty_";
5704
5705	/*
5706	**  Check to see if this uses IPC -- if not, it can't have MX records.
5707	*/
5708
5709	if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5710	    CurEnv->e_sendmode == SM_DEFER)
5711	{
5712		/* just an ordinary mailer or deferred mode */
5713		return host;
5714	}
5715#if NETUNIX
5716	else if (m->m_argv[0] != NULL &&
5717		 strcmp(m->m_argv[0], "FILE") == 0)
5718	{
5719		/* rendezvous in the file system, no MX records */
5720		return host;
5721	}
5722#endif /* NETUNIX */
5723
5724	/*
5725	**  Look it up in the symbol table.
5726	*/
5727
5728	now = curtime();
5729	s = stab(host, ST_HOSTSIG, ST_ENTER);
5730	if (s->s_hostsig.hs_sig != NULL)
5731	{
5732		if (s->s_hostsig.hs_exp >= now)
5733		{
5734			if (tTd(17, 3))
5735				sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5736					   s->s_hostsig.hs_sig);
5737			return s->s_hostsig.hs_sig;
5738		}
5739
5740		/* signature is expired: clear it */
5741		sm_free(s->s_hostsig.hs_sig);
5742		s->s_hostsig.hs_sig = NULL;
5743	}
5744
5745	/* set default TTL */
5746	s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5747
5748	/*
5749	**  Not already there or expired -- create a signature.
5750	*/
5751
5752#if NAMED_BIND
5753	if (ConfigLevel < 2)
5754		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
5755
5756	for (hp = host; hp != NULL; hp = endp)
5757	{
5758#if NETINET6
5759		if (*hp == '[')
5760		{
5761			endp = strchr(hp + 1, ']');
5762			if (endp != NULL)
5763				endp = strpbrk(endp + 1, ":,");
5764		}
5765		else
5766			endp = strpbrk(hp, ":,");
5767#else /* NETINET6 */
5768		endp = strpbrk(hp, ":,");
5769#endif /* NETINET6 */
5770		if (endp != NULL)
5771		{
5772			sep = *endp;
5773			*endp = '\0';
5774		}
5775
5776		if (bitnset(M_NOMX, m->m_flags))
5777		{
5778			/* skip MX lookups */
5779			nmx = 1;
5780			mxhosts[0] = hp;
5781		}
5782		else
5783		{
5784			auto int rcode;
5785			int ttl;
5786
5787			nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5788				      &ttl);
5789			if (nmx <= 0)
5790			{
5791				int save_errno;
5792				register MCI *mci;
5793
5794				/* update the connection info for this host */
5795				save_errno = errno;
5796				mci = mci_get(hp, m);
5797				mci->mci_errno = save_errno;
5798				mci->mci_herrno = h_errno;
5799				mci->mci_lastuse = now;
5800				if (rcode == EX_NOHOST)
5801					mci_setstat(mci, rcode, "5.1.2",
5802						    "550 Host unknown");
5803				else
5804					mci_setstat(mci, rcode, NULL, NULL);
5805
5806				/* use the original host name as signature */
5807				nmx = 1;
5808				mxhosts[0] = hp;
5809			}
5810			if (tTd(17, 3))
5811				sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5812					   nmx, mxhosts[0]);
5813
5814			/*
5815			**  Set new TTL: we use only one!
5816			**	We could try to use the minimum instead.
5817			*/
5818
5819			s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5820		}
5821
5822		len = 0;
5823		for (i = 0; i < nmx; i++)
5824			len += strlen(mxhosts[i]) + 1;
5825		if (s->s_hostsig.hs_sig != NULL)
5826			len += strlen(s->s_hostsig.hs_sig) + 1;
5827		if (len < 0 || len >= MAXHOSTSIGNATURE)
5828		{
5829			sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5830				  host, MAXHOSTSIGNATURE, len);
5831			len = MAXHOSTSIGNATURE;
5832		}
5833		p = sm_pmalloc_x(len);
5834		if (s->s_hostsig.hs_sig != NULL)
5835		{
5836			(void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5837			sm_free(s->s_hostsig.hs_sig); /* XXX */
5838			s->s_hostsig.hs_sig = p;
5839			hl = strlen(p);
5840			p += hl;
5841			*p++ = prevsep;
5842			len -= hl + 1;
5843		}
5844		else
5845			s->s_hostsig.hs_sig = p;
5846		for (i = 0; i < nmx; i++)
5847		{
5848			hl = strlen(mxhosts[i]);
5849			if (len - 1 < hl || len <= 1)
5850			{
5851				/* force to drop out of outer loop */
5852				len = -1;
5853				break;
5854			}
5855			if (i != 0)
5856			{
5857				if (mxprefs[i] == mxprefs[i - 1])
5858					*p++ = ',';
5859				else
5860					*p++ = ':';
5861				len--;
5862			}
5863			(void) sm_strlcpy(p, mxhosts[i], len);
5864			p += hl;
5865			len -= hl;
5866		}
5867
5868		/*
5869		**  break out of loop if len exceeded MAXHOSTSIGNATURE
5870		**  because we won't have more space for further hosts
5871		**  anyway (separated by : in the .cf file).
5872		*/
5873
5874		if (len < 0)
5875			break;
5876		if (endp != NULL)
5877			*endp++ = sep;
5878		prevsep = sep;
5879	}
5880	makelower(s->s_hostsig.hs_sig);
5881	if (ConfigLevel < 2)
5882		_res.options = oldoptions;
5883#else /* NAMED_BIND */
5884	/* not using BIND -- the signature is just the host name */
5885	/*
5886	**  'host' points to storage that will be freed after we are
5887	**  done processing the current envelope, so we copy it.
5888	*/
5889	s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5890#endif /* NAMED_BIND */
5891	if (tTd(17, 1))
5892		sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5893	return s->s_hostsig.hs_sig;
5894}
5895/*
5896**  PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5897**
5898**	The signature describes how we are going to send this -- it
5899**	can be just the hostname (for non-Internet hosts) or can be
5900**	an ordered list of MX hosts which must be randomized for equal
5901**	MX preference values.
5902**
5903**	Parameters:
5904**		sig -- the host signature.
5905**		mxhosts -- array to populate.
5906**		mailer -- mailer.
5907**
5908**	Returns:
5909**		The number of hosts inserted into mxhosts array.
5910**
5911**	Side Effects:
5912**		Randomizes equal MX preference hosts in mxhosts.
5913*/
5914
5915static int
5916parse_hostsignature(sig, mxhosts, mailer)
5917	char *sig;
5918	char **mxhosts;
5919	MAILER *mailer;
5920{
5921	unsigned short curpref = 0;
5922	int nmx = 0, i, j;	/* NOTE: i, j, and nmx must have same type */
5923	char *hp, *endp;
5924	unsigned short prefer[MAXMXHOSTS];
5925	long rndm[MAXMXHOSTS];
5926
5927	for (hp = sig; hp != NULL; hp = endp)
5928	{
5929		char sep = ':';
5930
5931#if NETINET6
5932		if (*hp == '[')
5933		{
5934			endp = strchr(hp + 1, ']');
5935			if (endp != NULL)
5936				endp = strpbrk(endp + 1, ":,");
5937		}
5938		else
5939			endp = strpbrk(hp, ":,");
5940#else /* NETINET6 */
5941		endp = strpbrk(hp, ":,");
5942#endif /* NETINET6 */
5943		if (endp != NULL)
5944		{
5945			sep = *endp;
5946			*endp = '\0';
5947		}
5948
5949		mxhosts[nmx] = hp;
5950		prefer[nmx] = curpref;
5951		if (mci_match(hp, mailer))
5952			rndm[nmx] = 0;
5953		else
5954			rndm[nmx] = get_random();
5955
5956		if (endp != NULL)
5957		{
5958			/*
5959			**  Since we don't have the original MX prefs,
5960			**  make our own.  If the separator is a ':', that
5961			**  means the preference for the next host will be
5962			**  higher than this one, so simply increment curpref.
5963			*/
5964
5965			if (sep == ':')
5966				curpref++;
5967
5968			*endp++ = sep;
5969		}
5970		if (++nmx >= MAXMXHOSTS)
5971			break;
5972	}
5973
5974	/* sort the records using the random factor for equal preferences */
5975	for (i = 0; i < nmx; i++)
5976	{
5977		for (j = i + 1; j < nmx; j++)
5978		{
5979			/*
5980			**  List is already sorted by MX preference, only
5981			**  need to look for equal preference MX records
5982			*/
5983
5984			if (prefer[i] < prefer[j])
5985				break;
5986
5987			if (prefer[i] > prefer[j] ||
5988			    (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5989			{
5990				register unsigned short tempp;
5991				register long tempr;
5992				register char *temp1;
5993
5994				tempp = prefer[i];
5995				prefer[i] = prefer[j];
5996				prefer[j] = tempp;
5997				temp1 = mxhosts[i];
5998				mxhosts[i] = mxhosts[j];
5999				mxhosts[j] = temp1;
6000				tempr = rndm[i];
6001				rndm[i] = rndm[j];
6002				rndm[j] = tempr;
6003			}
6004		}
6005	}
6006	return nmx;
6007}
6008
6009# if STARTTLS
6010static SSL_CTX	*clt_ctx = NULL;
6011static bool	tls_ok_clt = true;
6012
6013/*
6014**  SETCLTTLS -- client side TLS: allow/disallow.
6015**
6016**	Parameters:
6017**		tls_ok -- should tls be done?
6018**
6019**	Returns:
6020**		none.
6021**
6022**	Side Effects:
6023**		sets tls_ok_clt (static variable in this module)
6024*/
6025
6026void
6027setclttls(tls_ok)
6028	bool tls_ok;
6029{
6030	tls_ok_clt = tls_ok;
6031	return;
6032}
6033/*
6034**  INITCLTTLS -- initialize client side TLS
6035**
6036**	Parameters:
6037**		tls_ok -- should tls initialization be done?
6038**
6039**	Returns:
6040**		succeeded?
6041**
6042**	Side Effects:
6043**		sets tls_ok_clt (static variable in this module)
6044*/
6045
6046bool
6047initclttls(tls_ok)
6048	bool tls_ok;
6049{
6050	if (!tls_ok_clt)
6051		return false;
6052	tls_ok_clt = tls_ok;
6053	if (!tls_ok_clt)
6054		return false;
6055	if (clt_ctx != NULL)
6056		return true;	/* already done */
6057	tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, false, CltCertFile,
6058			     CltKeyFile, CACertPath, CACertFile, DHParams);
6059	return tls_ok_clt;
6060}
6061
6062/*
6063**  STARTTLS -- try to start secure connection (client side)
6064**
6065**	Parameters:
6066**		m -- the mailer.
6067**		mci -- the mailer connection info.
6068**		e -- the envelope.
6069**
6070**	Returns:
6071**		success?
6072**		(maybe this should be some other code than EX_
6073**		that denotes which stage failed.)
6074*/
6075
6076static int
6077starttls(m, mci, e)
6078	MAILER *m;
6079	MCI *mci;
6080	ENVELOPE *e;
6081{
6082	int smtpresult;
6083	int result = 0;
6084	int rfd, wfd;
6085	SSL *clt_ssl = NULL;
6086	time_t tlsstart;
6087
6088	if (clt_ctx == NULL && !initclttls(true))
6089		return EX_TEMPFAIL;
6090	smtpmessage("STARTTLS", m, mci);
6091
6092	/* get the reply */
6093	smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6094			XS_STARTTLS);
6095
6096	/* check return code from server */
6097	if (REPLYTYPE(smtpresult) == 4)
6098		return EX_TEMPFAIL;
6099	if (smtpresult == 501)
6100		return EX_USAGE;
6101	if (smtpresult == -1)
6102		return smtpresult;
6103
6104	/* not an expected reply but we have to deal with it */
6105	if (REPLYTYPE(smtpresult) == 5)
6106		return EX_UNAVAILABLE;
6107	if (smtpresult != 220)
6108		return EX_PROTOCOL;
6109
6110	if (LogLevel > 13)
6111		sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6112
6113	/* start connection */
6114	if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6115	{
6116		if (LogLevel > 5)
6117		{
6118			sm_syslog(LOG_ERR, NOQID,
6119				  "STARTTLS=client, error: SSL_new failed");
6120			if (LogLevel > 9)
6121				tlslogerr("client");
6122		}
6123		return EX_SOFTWARE;
6124	}
6125
6126	rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6127	wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6128
6129	/* SSL_clear(clt_ssl); ? */
6130	if (rfd < 0 || wfd < 0 ||
6131	    (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6132	    (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6133	{
6134		if (LogLevel > 5)
6135		{
6136			sm_syslog(LOG_ERR, NOQID,
6137				  "STARTTLS=client, error: SSL_set_xfd failed=%d",
6138				  result);
6139			if (LogLevel > 9)
6140				tlslogerr("client");
6141		}
6142		return EX_SOFTWARE;
6143	}
6144	SSL_set_connect_state(clt_ssl);
6145	tlsstart = curtime();
6146
6147ssl_retry:
6148	if ((result = SSL_connect(clt_ssl)) <= 0)
6149	{
6150		int i, ssl_err;
6151
6152		ssl_err = SSL_get_error(clt_ssl, result);
6153		i = tls_retry(clt_ssl, rfd, wfd, tlsstart,
6154			TimeOuts.to_starttls, ssl_err, "client");
6155		if (i > 0)
6156			goto ssl_retry;
6157
6158		if (LogLevel > 5)
6159		{
6160			sm_syslog(LOG_WARNING, NOQID,
6161				  "STARTTLS=client, error: connect failed=%d, SSL_error=%d, errno=%d, retry=%d",
6162				  result, ssl_err, errno, i);
6163			if (LogLevel > 8)
6164				tlslogerr("client");
6165		}
6166
6167		SSL_free(clt_ssl);
6168		clt_ssl = NULL;
6169		return EX_SOFTWARE;
6170	}
6171	mci->mci_ssl = clt_ssl;
6172	result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6173			      &mci->mci_macro, true);
6174
6175	/* switch to use TLS... */
6176	if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6177		return EX_OK;
6178
6179	/* failure */
6180	SSL_free(clt_ssl);
6181	clt_ssl = NULL;
6182	return EX_SOFTWARE;
6183}
6184/*
6185**  ENDTLSCLT -- shutdown secure connection (client side)
6186**
6187**	Parameters:
6188**		mci -- the mailer connection info.
6189**
6190**	Returns:
6191**		success?
6192*/
6193
6194static int
6195endtlsclt(mci)
6196	MCI *mci;
6197{
6198	int r;
6199
6200	if (!bitset(MCIF_TLSACT, mci->mci_flags))
6201		return EX_OK;
6202	r = endtls(mci->mci_ssl, "client");
6203	mci->mci_flags &= ~MCIF_TLSACT;
6204	return r;
6205}
6206# endif /* STARTTLS */
6207# if STARTTLS || SASL
6208/*
6209**  ISCLTFLGSET -- check whether client flag is set.
6210**
6211**	Parameters:
6212**		e -- envelope.
6213**		flag -- flag to check in {client_flags}
6214**
6215**	Returns:
6216**		true iff flag is set.
6217*/
6218
6219static bool
6220iscltflgset(e, flag)
6221	ENVELOPE *e;
6222	int flag;
6223{
6224	char *p;
6225
6226	p = macvalue(macid("{client_flags}"), e);
6227	if (p == NULL)
6228		return false;
6229	for (; *p != '\0'; p++)
6230	{
6231		/* look for just this one flag */
6232		if (*p == (char) flag)
6233			return true;
6234	}
6235	return false;
6236}
6237# endif /* STARTTLS || SASL */
6238