smtpd.h revision 1.229
1/* $OpenBSD: smtpd.h,v 1.229 2011/07/21 23:29:24 gilles Exp $ */ 2 3/* 4 * Copyright (c) 2008 Gilles Chehade <gilles@openbsd.org> 5 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> 6 * 7 * Permission to use, copy, modify, and distribute this software for any 8 * purpose with or without fee is hereby granted, provided that the above 9 * copyright notice and this permission notice appear in all copies. 10 * 11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18 */ 19 20#ifndef nitems 21#define nitems(_a) (sizeof((_a)) / sizeof((_a)[0])) 22#endif 23 24#define IMSG_SIZE_CHECK(p) do { \ 25 if (IMSG_DATA_SIZE(&imsg) != sizeof(*p)) \ 26 fatalx("bad length imsg received"); \ 27 } while (0) 28#define IMSG_DATA_SIZE(imsg) ((imsg)->hdr.len - IMSG_HEADER_SIZE) 29 30 31#define CONF_FILE "/etc/mail/smtpd.conf" 32#define MAX_LISTEN 16 33#define PROC_COUNT 9 34#define MAX_NAME_SIZE 64 35 36#define MAX_HOPS_COUNT 100 37 38/* sizes include the tailing '\0' */ 39#define MAX_LINE_SIZE 1024 40#define MAX_LOCALPART_SIZE 128 41#define MAX_DOMAINPART_SIZE MAXHOSTNAMELEN 42#define MAX_TAG_SIZE 32 43 44/* return and forward path size */ 45#define MAX_PATH_SIZE 256 46#define MAX_RULEBUFFER_LEN 256 47 48#define SMTPD_QUEUE_INTERVAL (15 * 60) 49#define SMTPD_QUEUE_MAXINTERVAL (4 * 60 * 60) 50#define SMTPD_QUEUE_EXPIRY (4 * 24 * 60 * 60) 51#define SMTPD_USER "_smtpd" 52#define SMTPD_SOCKET "/var/run/smtpd.sock" 53#define SMTPD_BANNER "220 %s ESMTP OpenSMTPD" 54#define SMTPD_SESSION_TIMEOUT 300 55#define SMTPD_BACKLOG 5 56 57#define PATH_MAILLOCAL "/usr/libexec/mail.local" 58#define PATH_SMTPCTL "/usr/sbin/smtpctl" 59 60#define DIRHASH_BUCKETS 4096 61 62#define PATH_SPOOL "/var/spool/smtpd" 63 64#define PATH_ENQUEUE "/enqueue" 65#define PATH_INCOMING "/incoming" 66#define PATH_QUEUE "/queue" 67#define PATH_PURGE "/purge" 68 69#define PATH_MESSAGE "/message" 70#define PATH_ENVELOPES "/envelopes" 71 72#define PATH_OFFLINE "/offline" 73#define PATH_BOUNCE "/bounce" 74 75/* number of MX records to lookup */ 76#define MAX_MX_COUNT 10 77 78/* max response delay under flood conditions */ 79#define MAX_RESPONSE_DELAY 60 80 81/* how many responses per state are undelayed */ 82#define FAST_RESPONSES 2 83 84/* max len of any smtp line */ 85#define SMTP_LINE_MAX 16384 86 87#define F_STARTTLS 0x01 88#define F_SMTPS 0x02 89#define F_AUTH 0x04 90#define F_SSL (F_SMTPS|F_STARTTLS) 91 92#define F_SCERT 0x01 93#define F_CCERT 0x02 94 95#define ADVERTISE_TLS(s) \ 96 ((s)->s_l->flags & F_STARTTLS && !((s)->s_flags & F_SECURE)) 97 98#define ADVERTISE_AUTH(s) \ 99 ((s)->s_l->flags & F_AUTH && (s)->s_flags & F_SECURE && \ 100 !((s)->s_flags & F_AUTHENTICATED)) 101 102#define SET_IF_GREATER(x,y) do { y = MAX(x,y); } while(0) 103 104 105typedef u_int32_t objid_t; 106 107struct netaddr { 108 struct sockaddr_storage ss; 109 int bits; 110}; 111 112struct relayhost { 113 u_int8_t flags; 114 char hostname[MAXHOSTNAMELEN]; 115 u_int16_t port; 116 char cert[PATH_MAX]; 117 objid_t secmapid; 118}; 119 120enum imsg_type { 121 IMSG_NONE, 122 IMSG_CTL_OK, /* answer to smtpctl requests */ 123 IMSG_CTL_FAIL, 124 IMSG_CTL_SHUTDOWN, 125 IMSG_CTL_VERBOSE, 126 IMSG_CONF_START, 127 IMSG_CONF_SSL, 128 IMSG_CONF_LISTENER, 129 IMSG_CONF_MAP, 130 IMSG_CONF_MAP_CONTENT, 131 IMSG_CONF_RULE, 132 IMSG_CONF_RULE_SOURCE, 133 IMSG_CONF_END, 134 IMSG_CONF_RELOAD, 135 IMSG_LKA_MAIL, 136 IMSG_LKA_RCPT, 137 IMSG_LKA_SECRET, 138 IMSG_LKA_RULEMATCH, 139 IMSG_MDA_SESS_NEW, 140 IMSG_MDA_DONE, 141 IMSG_MFA_RCPT, 142 IMSG_MFA_MAIL, 143 144 IMSG_QUEUE_CREATE_MESSAGE, 145 IMSG_QUEUE_SUBMIT_ENVELOPE, 146 IMSG_QUEUE_COMMIT_ENVELOPES, 147 IMSG_QUEUE_REMOVE_MESSAGE, 148 IMSG_QUEUE_COMMIT_MESSAGE, 149 IMSG_QUEUE_TEMPFAIL, 150 IMSG_QUEUE_PAUSE_LOCAL, 151 IMSG_QUEUE_PAUSE_OUTGOING, 152 IMSG_QUEUE_RESUME_LOCAL, 153 IMSG_QUEUE_RESUME_OUTGOING, 154 155 IMSG_QUEUE_MESSAGE_UPDATE, 156 IMSG_QUEUE_MESSAGE_FD, 157 IMSG_QUEUE_MESSAGE_FILE, 158 IMSG_QUEUE_SCHEDULE, 159 IMSG_QUEUE_REMOVE, 160 161 IMSG_RUNNER_REMOVE, 162 IMSG_RUNNER_SCHEDULE, 163 164 IMSG_BATCH_CREATE, 165 IMSG_BATCH_APPEND, 166 IMSG_BATCH_CLOSE, 167 IMSG_BATCH_DONE, 168 169 IMSG_PARENT_ENQUEUE_OFFLINE, 170 IMSG_PARENT_FORWARD_OPEN, 171 IMSG_PARENT_FORK_MDA, 172 173 IMSG_PARENT_AUTHENTICATE, 174 IMSG_PARENT_SEND_CONFIG, 175 176 IMSG_STATS, 177 IMSG_SMTP_ENQUEUE, 178 IMSG_SMTP_PAUSE, 179 IMSG_SMTP_RESUME, 180 181 IMSG_DNS_HOST, 182 IMSG_DNS_HOST_END, 183 IMSG_DNS_MX, 184 IMSG_DNS_PTR 185}; 186 187enum blockmodes { 188 BM_NORMAL, 189 BM_NONBLOCK 190}; 191 192struct imsgev { 193 struct imsgbuf ibuf; 194 void (*handler)(int, short, void *); 195 struct event ev; 196 void *data; 197 int proc; 198 short events; 199}; 200 201struct ctl_conn { 202 TAILQ_ENTRY(ctl_conn) entry; 203 u_int8_t flags; 204#define CTL_CONN_NOTIFY 0x01 205 struct imsgev iev; 206}; 207TAILQ_HEAD(ctl_connlist, ctl_conn); 208 209struct ctl_id { 210 objid_t id; 211 char name[MAX_NAME_SIZE]; 212}; 213 214enum smtp_proc_type { 215 PROC_PARENT = 0, 216 PROC_SMTP, 217 PROC_MFA, 218 PROC_LKA, 219 PROC_QUEUE, 220 PROC_MDA, 221 PROC_MTA, 222 PROC_CONTROL, 223 PROC_RUNNER, 224} smtpd_process; 225 226struct peer { 227 enum smtp_proc_type id; 228 void (*cb)(int, short, void *); 229}; 230 231enum map_type { 232 T_SINGLE, 233 T_LIST, 234 T_HASH 235}; 236 237enum map_src { 238 S_NONE, 239 S_DYN, 240 S_DNS, 241 S_PLAIN, 242 S_DB, 243 S_EXT 244}; 245 246enum map_kind { 247 K_NONE, 248 K_ALIAS, 249 K_VIRTUAL, 250 K_SECRET 251}; 252 253enum mapel_type { 254 ME_STRING, 255 ME_NET, 256 ME_NETMASK 257}; 258 259struct mapel { 260 TAILQ_ENTRY(mapel) me_entry; 261 union mapel_data { 262 char med_string[MAX_LINE_SIZE]; 263 struct netaddr med_addr; 264 } me_key; 265 union mapel_data me_val; 266}; 267 268struct map { 269 TAILQ_ENTRY(map) m_entry; 270#define F_USED 0x01 271#define F_DYNAMIC 0x02 272 u_int8_t m_flags; 273 char m_name[MAX_LINE_SIZE]; 274 objid_t m_id; 275 enum map_type m_type; 276 enum mapel_type m_eltype; 277 enum map_src m_src; 278 char m_config[MAXPATHLEN]; 279 TAILQ_HEAD(mapel_list, mapel) m_contents; 280}; 281 282 283struct map_backend { 284 void *(*open)(char *); 285 void (*close)(void *); 286 void *(*lookup)(void *, char *, enum map_kind); 287}; 288 289 290enum cond_type { 291 C_ALL, 292 C_NET, 293 C_DOM, 294 C_VDOM 295}; 296 297struct cond { 298 TAILQ_ENTRY(cond) c_entry; 299 objid_t c_map; 300 enum cond_type c_type; 301}; 302 303enum action_type { 304 A_INVALID, 305 A_RELAY, 306 A_RELAYVIA, 307 A_MAILDIR, 308 A_MBOX, 309 A_FILENAME, 310 A_EXT 311}; 312 313#define IS_MAILBOX(x) ((x).r_action == A_MAILDIR || (x).r_action == A_MBOX || (x).r_action == A_FILENAME) 314#define IS_RELAY(x) ((x).r_action == A_RELAY || (x).r_action == A_RELAYVIA) 315#define IS_EXT(x) ((x).r_action == A_EXT) 316 317struct rule { 318 TAILQ_ENTRY(rule) r_entry; 319 char r_tag[MAX_TAG_SIZE]; 320 int r_accept; 321 struct map *r_sources; 322 struct cond r_condition; 323 enum action_type r_action; 324 union rule_dest { 325 char buffer[MAX_RULEBUFFER_LEN]; 326 struct relayhost relayhost; 327 } r_value; 328 329 char *r_user; 330 struct mailaddr *r_as; 331 objid_t r_amap; 332 time_t r_qexpire; 333}; 334 335struct mailaddr { 336 char user[MAX_LOCALPART_SIZE]; 337 char domain[MAX_DOMAINPART_SIZE]; 338}; 339 340 341enum delivery_type { 342 D_INVALID = 0, 343 D_MDA, 344 D_MTA, 345 D_BOUNCE 346}; 347 348enum delivery_status { 349 DS_PERMFAILURE = 0x2, 350 DS_TEMPFAILURE = 0x4, 351 DS_REJECTED = 0x8, 352 DS_ACCEPTED = 0x10, 353 DS_RETRY = 0x20, 354 DS_EDNS = 0x40, 355 DS_ECONNECT = 0x80 356}; 357 358enum delivery_flags { 359 DF_RESOLVED = 0x1, 360 DF_SCHEDULED = 0x2, 361 DF_PROCESSING = 0x4, 362 DF_AUTHENTICATED = 0x8, 363 DF_ENQUEUED = 0x10, 364 DF_FORCESCHEDULE = 0x20, 365 DF_BOUNCE = 0x40, 366 DF_INTERNAL = 0x80 /* internal expansion forward */ 367}; 368 369union delivery_data { 370 char user[MAXLOGNAME]; 371 char buffer[MAX_RULEBUFFER_LEN]; 372 struct mailaddr mailaddr; 373}; 374 375struct delivery_mda { 376 enum action_type method; 377 union delivery_data to; 378 char as_user[MAXLOGNAME]; 379}; 380 381struct delivery_mta { 382 struct relayhost relay; 383 struct mailaddr relay_as; 384}; 385 386struct delivery { 387 u_int64_t id; 388 enum delivery_type type; 389 390 char helo[MAXHOSTNAMELEN]; 391 char hostname[MAXHOSTNAMELEN]; 392 char errorline[MAX_LINE_SIZE]; 393 struct sockaddr_storage ss; 394 395 struct mailaddr from; 396 struct mailaddr rcpt; 397 struct mailaddr rcpt_orig; 398 399 union delivery_method { 400 struct delivery_mda mda; 401 struct delivery_mta mta; 402 } agent; 403 404 time_t creation; 405 time_t lasttry; 406 time_t expire; 407 u_int8_t retry; 408 enum delivery_flags flags; 409 enum delivery_status status; 410}; 411 412enum expand_type { 413 EXPAND_INVALID, 414 EXPAND_USERNAME, 415 EXPAND_FILENAME, 416 EXPAND_FILTER, 417 EXPAND_INCLUDE, 418 EXPAND_ADDRESS 419}; 420 421enum expand_flags { 422 F_EXPAND_NONE, 423 F_EXPAND_DONE 424}; 425 426struct expandnode { 427 RB_ENTRY(expandnode) entry; 428 size_t refcnt; 429 enum expand_flags flags; 430 enum expand_type type; 431 char as_user[MAXLOGNAME]; 432 union delivery_data u; 433}; 434 435RB_HEAD(expandtree, expandnode); 436 437 438struct envelope { 439 TAILQ_ENTRY(envelope) entry; 440 441 char tag[MAX_TAG_SIZE]; 442 struct rule rule; 443 444 u_int64_t session_id; 445 u_int64_t batch_id; 446 447 struct delivery delivery; 448}; 449TAILQ_HEAD(deliverylist, envelope); 450 451 452enum child_type { 453 CHILD_INVALID, 454 CHILD_DAEMON, 455 CHILD_MDA, 456 CHILD_ENQUEUE_OFFLINE 457}; 458 459struct child { 460 SPLAY_ENTRY(child) entry; 461 pid_t pid; 462 enum child_type type; 463 enum smtp_proc_type title; 464 int mda_out; 465 u_int32_t mda_id; 466}; 467 468enum session_state { 469 S_INVALID = 0, 470 S_INIT, 471 S_GREETED, 472 S_TLS, 473 S_AUTH_INIT, 474 S_AUTH_USERNAME, 475 S_AUTH_PASSWORD, 476 S_AUTH_FINALIZE, 477 S_HELO, 478 S_MAIL_MFA, 479 S_MAIL_QUEUE, 480 S_MAIL, 481 S_RCPT_MFA, 482 S_RCPT, 483 S_DATA, 484 S_DATA_QUEUE, 485 S_DATACONTENT, 486 S_DONE, 487 S_QUIT 488}; 489#define STATE_COUNT 18 490 491struct ssl { 492 SPLAY_ENTRY(ssl) ssl_nodes; 493 char ssl_name[PATH_MAX]; 494 char *ssl_cert; 495 off_t ssl_cert_len; 496 char *ssl_key; 497 off_t ssl_key_len; 498 char *ssl_dhparams; 499 off_t ssl_dhparams_len; 500 u_int8_t flags; 501}; 502 503struct listener { 504 u_int8_t flags; 505 int fd; 506 struct sockaddr_storage ss; 507 in_port_t port; 508 struct timeval timeout; 509 struct event ev; 510 char ssl_cert_name[PATH_MAX]; 511 struct ssl *ssl; 512 void *ssl_ctx; 513 char tag[MAX_TAG_SIZE]; 514 TAILQ_ENTRY(listener) entry; 515}; 516 517struct auth { 518 u_int64_t id; 519 char user[MAXLOGNAME]; 520 char pass[MAX_LINE_SIZE]; 521 int success; 522}; 523 524enum session_flags { 525 F_EHLO = 0x1, 526 F_QUIT = 0x2, 527 F_8BITMIME = 0x4, 528 F_SECURE = 0x8, 529 F_AUTHENTICATED = 0x10, 530 F_PEERHASTLS = 0x20, 531 F_PEERHASAUTH = 0x40, 532 F_WRITEONLY = 0x80 533}; 534 535struct session { 536 SPLAY_ENTRY(session) s_nodes; 537 u_int64_t s_id; 538 539 enum session_flags s_flags; 540 enum session_state s_state; 541 int s_fd; 542 struct sockaddr_storage s_ss; 543 char s_hostname[MAXHOSTNAMELEN]; 544 struct event s_ev; 545 struct bufferevent *s_bev; 546 struct listener *s_l; 547 void *s_ssl; 548 u_char *s_buf; 549 int s_buflen; 550 struct timeval s_tv; 551 struct envelope s_msg; 552 short s_nresp[STATE_COUNT]; 553 size_t rcptcount; 554 long s_datalen; 555 556 struct auth s_auth; 557 558 FILE *datafp; 559 int mboxfd; 560 int messagefd; 561}; 562 563 564/* ram-queue structures */ 565struct ramqueue_host { 566 RB_ENTRY(ramqueue_host) host_entry; 567 TAILQ_HEAD(,ramqueue_batch) batch_queue; 568 u_int64_t h_id; 569 char hostname[MAXHOSTNAMELEN]; 570}; 571struct ramqueue_batch { 572 TAILQ_ENTRY(ramqueue_batch) batch_entry; 573 TAILQ_HEAD(,ramqueue_envelope) envelope_queue; 574 enum delivery_type type; 575 u_int64_t h_id; 576 u_int64_t b_id; 577 u_int32_t msgid; 578 struct rule rule; 579}; 580struct ramqueue_envelope { 581 TAILQ_ENTRY(ramqueue_envelope) queue_entry; 582 TAILQ_ENTRY(ramqueue_envelope) batchqueue_entry; 583 struct ramqueue_host *host; 584 struct ramqueue_batch *batch; 585 u_int64_t evpid; 586 time_t sched; 587}; 588 589struct ramqueue { 590 struct ramqueue_envelope *current_evp; 591 RB_HEAD(hosttree, ramqueue_host) hosttree; 592 TAILQ_HEAD(,ramqueue_envelope) queue; 593}; 594 595 596struct smtpd { 597 char sc_conffile[MAXPATHLEN]; 598 size_t sc_maxsize; 599 600#define SMTPD_OPT_VERBOSE 0x00000001 601#define SMTPD_OPT_NOACTION 0x00000002 602 u_int32_t sc_opts; 603#define SMTPD_CONFIGURING 0x00000001 604#define SMTPD_EXITING 0x00000002 605#define SMTPD_MDA_PAUSED 0x00000004 606#define SMTPD_MTA_PAUSED 0x00000008 607#define SMTPD_SMTP_PAUSED 0x00000010 608 u_int32_t sc_flags; 609 struct timeval sc_qintval; 610 int sc_qexpire; 611 u_int32_t sc_maxconn; 612 struct event sc_ev; 613 int *sc_pipes[PROC_COUNT] 614 [PROC_COUNT]; 615 struct imsgev *sc_ievs[PROC_COUNT]; 616 int sc_instances[PROC_COUNT]; 617 int sc_instance; 618 char *sc_title[PROC_COUNT]; 619 struct passwd *sc_pw; 620 char sc_hostname[MAXHOSTNAMELEN]; 621 struct ramqueue sc_rqueue; 622 struct queue_backend *sc_queue; 623 624 TAILQ_HEAD(listenerlist, listener) *sc_listeners; 625 TAILQ_HEAD(maplist, map) *sc_maps, *sc_maps_reload; 626 TAILQ_HEAD(rulelist, rule) *sc_rules, *sc_rules_reload; 627 SPLAY_HEAD(sessiontree, session) sc_sessions; 628 SPLAY_HEAD(msgtree, envelope) sc_messages; 629 SPLAY_HEAD(ssltree, ssl) *sc_ssl; 630 SPLAY_HEAD(childtree, child) children; 631 SPLAY_HEAD(lkatree, lka_session) lka_sessions; 632 SPLAY_HEAD(mtatree, mta_session) mta_sessions; 633 LIST_HEAD(mdalist, mda_session) mda_sessions; 634 635 struct stats *stats; 636}; 637 638struct s_parent { 639 time_t start; 640}; 641 642struct s_queue { 643 size_t inserts_local; 644 size_t inserts_remote; 645}; 646 647struct s_runner { 648 size_t active; 649 size_t maxactive; 650 size_t bounces_active; 651 size_t bounces_maxactive; 652 size_t bounces; 653}; 654 655struct s_session { 656 size_t sessions; 657 size_t sessions_inet4; 658 size_t sessions_inet6; 659 size_t sessions_active; 660 size_t sessions_maxactive; 661 662 size_t smtps; 663 size_t smtps_active; 664 size_t smtps_maxactive; 665 666 size_t starttls; 667 size_t starttls_active; 668 size_t starttls_maxactive; 669 670 size_t read_error; 671 size_t read_timeout; 672 size_t read_eof; 673 size_t write_error; 674 size_t write_timeout; 675 size_t write_eof; 676 size_t toofast; 677 size_t tempfail; 678 size_t linetoolong; 679 size_t delays; 680}; 681 682struct s_mda { 683 size_t sessions; 684 size_t sessions_active; 685 size_t sessions_maxactive; 686}; 687 688struct s_control { 689 size_t sessions; 690 size_t sessions_active; 691 size_t sessions_maxactive; 692}; 693 694struct s_lka { 695 size_t queries; 696 size_t queries_active; 697 size_t queries_maxactive; 698 size_t queries_mx; 699 size_t queries_host; 700 size_t queries_cname; 701 size_t queries_failure; 702}; 703 704struct s_ramqueue { 705 size_t hosts; 706 size_t batches; 707 size_t envelopes; 708 size_t hosts_max; 709 size_t batches_max; 710 size_t envelopes_max; 711}; 712 713struct stats { 714 struct s_parent parent; 715 struct s_queue queue; 716 struct s_runner runner; 717 struct s_session mta; 718 struct s_mda mda; 719 struct s_session smtp; 720 struct s_control control; 721 struct s_lka lka; 722 struct s_ramqueue ramqueue; 723}; 724 725struct reload { 726 int fd; 727 int ret; 728}; 729 730struct submit_status { 731 u_int64_t id; 732 int code; 733 union submit_path { 734 struct mailaddr maddr; 735 u_int32_t msgid; 736 u_int64_t evpid; 737 char errormsg[MAX_LINE_SIZE]; 738 } u; 739 enum delivery_flags flags; 740 struct sockaddr_storage ss; 741 struct envelope envelope; 742}; 743 744struct forward_req { 745 u_int64_t id; 746 u_int8_t status; 747 char as_user[MAXLOGNAME]; 748 struct envelope envelope; 749}; 750 751enum dns_status { 752 DNS_OK = 0, 753 DNS_RETRY, 754 DNS_EINVAL, 755 DNS_ENONAME, 756 DNS_ENOTFOUND, 757}; 758 759struct dns { 760 u_int64_t id; 761 char host[MAXHOSTNAMELEN]; 762 int port; 763 int error; 764 int type; 765 struct imsgev *asker; 766 struct sockaddr_storage ss; 767 struct dns *next; 768}; 769 770struct secret { 771 u_int64_t id; 772 objid_t secmapid; 773 char host[MAXHOSTNAMELEN]; 774 char secret[MAX_LINE_SIZE]; 775}; 776 777struct mda_session { 778 LIST_ENTRY(mda_session) entry; 779 struct envelope msg; 780 struct msgbuf w; 781 struct event ev; 782 u_int32_t id; 783 FILE *datafp; 784}; 785 786struct deliver { 787 char to[PATH_MAX]; 788 char user[MAXLOGNAME]; 789 short mode; 790}; 791 792struct rulematch { 793 u_int64_t id; 794 struct submit_status ss; 795}; 796 797enum lka_session_flags { 798 F_ERROR = 0x1 799}; 800 801struct lka_session { 802 SPLAY_ENTRY(lka_session) nodes; 803 u_int64_t id; 804 805 struct deliverylist deliverylist; 806 struct expandtree expandtree; 807 808 u_int8_t iterations; 809 u_int32_t pending; 810 enum lka_session_flags flags; 811 struct submit_status ss; 812}; 813 814enum mta_state { 815 MTA_INVALID_STATE, 816 MTA_INIT, 817 MTA_SECRET, 818 MTA_DATA, 819 MTA_MX, 820 MTA_CONNECT, 821 MTA_PTR, 822 MTA_PROTOCOL, 823 MTA_DONE 824}; 825 826/* mta session flags */ 827#define MTA_FORCE_ANYSSL 0x01 828#define MTA_FORCE_SMTPS 0x02 829#define MTA_ALLOW_PLAIN 0x04 830#define MTA_USE_AUTH 0x08 831#define MTA_FORCE_MX 0x10 832 833struct mta_relay { 834 TAILQ_ENTRY(mta_relay) entry; 835 struct sockaddr_storage sa; 836 char fqdn[MAXHOSTNAMELEN]; 837 int used; 838}; 839 840struct mta_session { 841 SPLAY_ENTRY(mta_session) entry; 842 u_int64_t id; 843 enum mta_state state; 844 char *host; 845 int port; 846 int flags; 847 TAILQ_HEAD(,envelope) recipients; 848 TAILQ_HEAD(,mta_relay) relays; 849 objid_t secmapid; 850 char *secret; 851 int fd; 852 FILE *datafp; 853 struct event ev; 854 char *cert; 855 void *pcb; 856 struct ramqueue_batch *batch; 857}; 858 859 860/* maps return structures */ 861struct map_secret { 862 char username[MAX_LINE_SIZE]; 863 char password[MAX_LINE_SIZE]; 864}; 865 866struct map_alias { 867 size_t nbnodes; 868 struct expandtree expandtree; 869}; 870 871struct map_virtual { 872 size_t nbnodes; 873 struct expandtree expandtree; 874}; 875 876 877/* queue structures */ 878enum queue_type { 879 QT_INVALID=0, 880 QT_FS 881}; 882 883enum queue_kind { 884 Q_INVALID=0, 885 Q_ENQUEUE, 886 Q_INCOMING, 887 Q_QUEUE, 888 Q_PURGE, 889 Q_OFFLINE, 890 Q_BOUNCE 891}; 892 893enum queue_op { 894 QOP_INVALID=0, 895 QOP_CREATE, 896 QOP_DELETE, 897 QOP_UPDATE, 898 QOP_COMMIT, 899 QOP_LOAD, 900 QOP_FD_R, 901 QOP_FD_RW, 902 QOP_PURGE 903}; 904 905struct queue_backend { 906 enum queue_type type; 907 int (*init)(void); 908 int (*message)(enum queue_kind, enum queue_op, u_int32_t *); 909 int (*envelope)(enum queue_kind, enum queue_op, struct envelope *); 910}; 911 912 913/* auth structures */ 914enum auth_type { 915 AUTH_INVALID=0, 916 AUTH_BSD, 917 AUTH_GETPWNAM, 918}; 919 920struct auth_backend { 921 enum auth_type type; 922 int (*authenticate)(char *, char *); 923}; 924 925 926/* user structures */ 927enum user_type { 928 USER_INVALID=0, 929 USER_GETPWNAM, 930}; 931 932#define MAXPASSWORDLEN 128 933struct user { 934 char username[MAXLOGNAME]; 935 char directory[MAXPATHLEN]; 936 char password[MAXPASSWORDLEN]; 937 uid_t uid; 938 gid_t gid; 939}; 940 941struct user_backend { 942 enum user_type type; 943 int (*getbyname)(struct user *, char *); 944 int (*getbyuid)(struct user *, uid_t); 945}; 946 947 948extern struct smtpd *env; 949extern void (*imsg_callback)(struct imsgev *, struct imsg *); 950 951 952/* aliases.c */ 953int aliases_exist(objid_t, char *); 954int aliases_get(objid_t, struct expandtree *, char *); 955int aliases_vdomain_exists(objid_t, char *); 956int aliases_virtual_exist(objid_t, struct mailaddr *); 957int aliases_virtual_get(objid_t, struct expandtree *, struct mailaddr *); 958int alias_parse(struct expandnode *, char *); 959 960 961/* auth_backend.c */ 962struct auth_backend *auth_backend_lookup(enum auth_type); 963 964 965/* bounce.c */ 966int bounce_session(int, struct envelope *); 967int bounce_session_switch(FILE *, enum session_state *, char *, struct envelope *); 968void bounce_event(int, short, void *); 969 970 971/* config.c */ 972#define PURGE_LISTENERS 0x01 973#define PURGE_MAPS 0x02 974#define PURGE_RULES 0x04 975#define PURGE_SSL 0x08 976#define PURGE_EVERYTHING 0xff 977void purge_config(u_int8_t); 978void unconfigure(void); 979void configure(void); 980void init_pipes(void); 981void config_pipes(struct peer *, u_int); 982void config_peers(struct peer *, u_int); 983 984 985/* control.c */ 986pid_t control(void); 987void session_socket_blockmode(int, enum blockmodes); 988void session_socket_no_linger(int); 989int session_socket_error(int); 990 991 992/* dns.c */ 993void dns_query_host(char *, int, u_int64_t); 994void dns_query_mx(char *, int, u_int64_t); 995void dns_query_ptr(struct sockaddr_storage *, u_int64_t); 996void dns_async(struct imsgev *, int, struct dns *); 997 998 999/* enqueue.c */ 1000int enqueue(int, char **); 1001int enqueue_offline(int, char **); 1002 1003 1004/* expand.c */ 1005int expand_cmp(struct expandnode *, struct expandnode *); 1006void expandtree_increment_node(struct expandtree *, struct expandnode *); 1007void expandtree_decrement_node(struct expandtree *, struct expandnode *); 1008void expandtree_remove_node(struct expandtree *, struct expandnode *); 1009struct expandnode *expandtree_lookup(struct expandtree *, struct expandnode *); 1010void expandtree_free_nodes(struct expandtree *); 1011RB_PROTOTYPE(expandtree, expandnode, nodes, expand_cmp); 1012 1013 1014/* forward.c */ 1015int forwards_get(int, struct expandtree *, char *); 1016 1017 1018/* lka.c */ 1019pid_t lka(void); 1020int lka_session_cmp(struct lka_session *, struct lka_session *); 1021SPLAY_PROTOTYPE(lkatree, lka_session, nodes, lka_session_cmp); 1022 1023/* lka_session.c */ 1024struct lka_session *lka_session_init(struct submit_status *); 1025void lka_session_fail(struct lka_session *); 1026void lka_session_destroy(struct lka_session *); 1027 1028 1029/* map.c */ 1030void *map_lookup(objid_t, char *, enum map_kind); 1031struct map *map_find(objid_t); 1032struct map *map_findbyname(const char *); 1033 1034 1035/* mda.c */ 1036pid_t mda(void); 1037 1038 1039/* mfa.c */ 1040pid_t mfa(void); 1041 1042 1043/* mta.c */ 1044pid_t mta(void); 1045int mta_session_cmp(struct mta_session *, struct mta_session *); 1046SPLAY_PROTOTYPE(mtatree, mta_session, entry, mta_session_cmp); 1047 1048 1049/* parse.y */ 1050int parse_config(struct smtpd *, const char *, int); 1051int cmdline_symset(char *); 1052 1053 1054/* queue.c */ 1055pid_t queue(void); 1056void queue_submit_envelope(struct envelope *); 1057void queue_commit_envelopes(struct envelope *); 1058 1059 1060/* queue_backend.c */ 1061struct queue_backend *queue_backend_lookup(enum queue_type); 1062int queue_message_create(enum queue_kind, u_int32_t *); 1063int queue_message_delete(enum queue_kind, u_int32_t); 1064int queue_message_commit(enum queue_kind, u_int32_t); 1065int queue_message_fd_r(enum queue_kind, u_int32_t); 1066int queue_message_fd_rw(enum queue_kind, u_int32_t); 1067int queue_message_purge(enum queue_kind, u_int32_t); 1068int queue_envelope_create(enum queue_kind, struct envelope *); 1069int queue_envelope_delete(enum queue_kind, struct envelope *); 1070int queue_envelope_load(enum queue_kind, u_int64_t, struct envelope *); 1071int queue_envelope_update(enum queue_kind, struct envelope *); 1072 1073 1074/* queue_shared.c */ 1075void queue_message_update(struct envelope *); 1076struct qwalk *qwalk_new(char *); 1077int qwalk(struct qwalk *, char *); 1078void qwalk_close(struct qwalk *); 1079int bounce_record_message(struct envelope *, struct envelope *); 1080void show_queue(char *, int); 1081 1082 1083/* ramqueue.c */ 1084void ramqueue_init(struct ramqueue *); 1085int ramqueue_load(struct ramqueue *, time_t *); 1086int ramqueue_load_offline(struct ramqueue *); 1087int ramqueue_host_cmp(struct ramqueue_host *, struct ramqueue_host *); 1088void ramqueue_remove(struct ramqueue *, struct ramqueue_envelope *); 1089int ramqueue_is_empty(struct ramqueue *); 1090int ramqueue_is_empty(struct ramqueue *); 1091int ramqueue_batch_is_empty(struct ramqueue_batch *); 1092int ramqueue_host_is_empty(struct ramqueue_host *); 1093void ramqueue_remove_batch(struct ramqueue_host *, struct ramqueue_batch *); 1094void ramqueue_remove_host(struct ramqueue *, struct ramqueue_host *); 1095void ramqueue_reschedule(struct ramqueue *, u_int64_t); 1096struct ramqueue_envelope *ramqueue_envelope_by_id(struct ramqueue *, u_int64_t); 1097struct ramqueue_envelope *ramqueue_first_envelope(struct ramqueue *); 1098struct ramqueue_envelope *ramqueue_next_envelope(struct ramqueue *); 1099struct ramqueue_envelope *ramqueue_batch_first_envelope(struct ramqueue_batch *); 1100RB_PROTOTYPE(hosttree, ramqueue_host, host_entry, ramqueue_host_cmp); 1101 1102 1103/* runner.c */ 1104pid_t runner(void); 1105void message_reset_flags(struct envelope *); 1106 1107 1108/* smtp.c */ 1109pid_t smtp(void); 1110void smtp_resume(void); 1111 1112 1113/* smtp_session.c */ 1114void session_init(struct listener *, struct session *); 1115int session_cmp(struct session *, struct session *); 1116void session_pickup(struct session *, struct submit_status *); 1117void session_destroy(struct session *); 1118void session_respond(struct session *, char *, ...) 1119 __attribute__ ((format (printf, 2, 3))); 1120void session_bufferevent_new(struct session *); 1121SPLAY_PROTOTYPE(sessiontree, session, s_nodes, session_cmp); 1122 1123 1124/* smtpd.c */ 1125int child_cmp(struct child *, struct child *); 1126void imsg_event_add(struct imsgev *); 1127void imsg_compose_event(struct imsgev *, u_int16_t, u_int32_t, pid_t, 1128 int, void *, u_int16_t); 1129void imsg_dispatch(int, short, void *); 1130SPLAY_PROTOTYPE(childtree, child, entry, child_cmp); 1131 1132 1133/* ssl.c */ 1134void ssl_init(void); 1135void ssl_transaction(struct session *); 1136void ssl_session_init(struct session *); 1137void ssl_session_destroy(struct session *); 1138int ssl_load_certfile(const char *, u_int8_t); 1139void ssl_setup(struct listener *); 1140int ssl_cmp(struct ssl *, struct ssl *); 1141SPLAY_PROTOTYPE(ssltree, ssl, ssl_nodes, ssl_cmp); 1142 1143 1144/* ssl_privsep.c */ 1145int ssl_ctx_use_private_key(void *, char *, off_t); 1146int ssl_ctx_use_certificate_chain(void *, char *, off_t); 1147 1148 1149/* user_backend.c */ 1150struct user_backend *user_backend_lookup(enum user_type); 1151 1152 1153/* util.c */ 1154typedef struct arglist arglist; 1155struct arglist { 1156 char **list; 1157 u_int num; 1158 u_int nalloc; 1159}; 1160void addargs(arglist *, char *, ...) 1161 __attribute__((format(printf, 2, 3))); 1162int bsnprintf(char *, size_t, const char *, ...) 1163 __attribute__ ((format (printf, 3, 4))); 1164int safe_fclose(FILE *); 1165int hostname_match(char *, char *); 1166int email_to_mailaddr(struct mailaddr *, char *); 1167int valid_localpart(char *); 1168int valid_domainpart(char *); 1169char *ss_to_text(struct sockaddr_storage *); 1170int valid_message_id(char *); 1171int valid_message_uid(char *); 1172char *time_to_text(time_t); 1173int secure_file(int, char *, char *, uid_t, int); 1174void lowercase(char *, char *, size_t); 1175void envelope_set_errormsg(struct envelope *, char *, ...); 1176char *envelope_get_errormsg(struct envelope *); 1177void sa_set_port(struct sockaddr *, int); 1178u_int64_t generate_uid(void); 1179void fdlimit(double); 1180int availdesc(void); 1181u_int32_t evpid_to_msgid(u_int64_t); 1182u_int64_t msgid_to_evpid(u_int32_t); 1183u_int32_t filename_to_msgid(char *); 1184u_int64_t filename_to_evpid(char *); 1185