smtpd.h revision 1.229
1/*	$OpenBSD: smtpd.h,v 1.229 2011/07/21 23:29:24 gilles Exp $	*/
2
3/*
4 * Copyright (c) 2008 Gilles Chehade <gilles@openbsd.org>
5 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
6 *
7 * Permission to use, copy, modify, and distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
10 *
11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 */
19
20#ifndef nitems
21#define nitems(_a) (sizeof((_a)) / sizeof((_a)[0]))
22#endif
23
24#define IMSG_SIZE_CHECK(p) do {					\
25		if (IMSG_DATA_SIZE(&imsg) != sizeof(*p))	\
26			fatalx("bad length imsg received");	\
27	} while (0)
28#define IMSG_DATA_SIZE(imsg)	((imsg)->hdr.len - IMSG_HEADER_SIZE)
29
30
31#define CONF_FILE		 "/etc/mail/smtpd.conf"
32#define MAX_LISTEN		 16
33#define PROC_COUNT		 9
34#define MAX_NAME_SIZE		 64
35
36#define MAX_HOPS_COUNT		 100
37
38/* sizes include the tailing '\0' */
39#define MAX_LINE_SIZE		 1024
40#define MAX_LOCALPART_SIZE	 128
41#define MAX_DOMAINPART_SIZE	 MAXHOSTNAMELEN
42#define MAX_TAG_SIZE		 32
43
44/* return and forward path size */
45#define MAX_PATH_SIZE		 256
46#define MAX_RULEBUFFER_LEN	 256
47
48#define SMTPD_QUEUE_INTERVAL	 (15 * 60)
49#define SMTPD_QUEUE_MAXINTERVAL	 (4 * 60 * 60)
50#define SMTPD_QUEUE_EXPIRY	 (4 * 24 * 60 * 60)
51#define SMTPD_USER		 "_smtpd"
52#define SMTPD_SOCKET		 "/var/run/smtpd.sock"
53#define SMTPD_BANNER		 "220 %s ESMTP OpenSMTPD"
54#define SMTPD_SESSION_TIMEOUT	 300
55#define SMTPD_BACKLOG		 5
56
57#define	PATH_MAILLOCAL		"/usr/libexec/mail.local"
58#define	PATH_SMTPCTL		"/usr/sbin/smtpctl"
59
60#define	DIRHASH_BUCKETS		 4096
61
62#define PATH_SPOOL		"/var/spool/smtpd"
63
64#define PATH_ENQUEUE		"/enqueue"
65#define PATH_INCOMING		"/incoming"
66#define PATH_QUEUE		"/queue"
67#define PATH_PURGE		"/purge"
68
69#define PATH_MESSAGE		"/message"
70#define PATH_ENVELOPES		"/envelopes"
71
72#define PATH_OFFLINE		"/offline"
73#define PATH_BOUNCE		"/bounce"
74
75/* number of MX records to lookup */
76#define MAX_MX_COUNT		10
77
78/* max response delay under flood conditions */
79#define MAX_RESPONSE_DELAY	60
80
81/* how many responses per state are undelayed */
82#define FAST_RESPONSES		2
83
84/* max len of any smtp line */
85#define	SMTP_LINE_MAX		16384
86
87#define F_STARTTLS		 0x01
88#define F_SMTPS			 0x02
89#define F_AUTH			 0x04
90#define F_SSL			(F_SMTPS|F_STARTTLS)
91
92#define F_SCERT			0x01
93#define F_CCERT			0x02
94
95#define ADVERTISE_TLS(s) \
96	((s)->s_l->flags & F_STARTTLS && !((s)->s_flags & F_SECURE))
97
98#define ADVERTISE_AUTH(s) \
99	((s)->s_l->flags & F_AUTH && (s)->s_flags & F_SECURE && \
100	 !((s)->s_flags & F_AUTHENTICATED))
101
102#define SET_IF_GREATER(x,y) do { y = MAX(x,y); } while(0)
103
104
105typedef u_int32_t	objid_t;
106
107struct netaddr {
108	struct sockaddr_storage ss;
109	int bits;
110};
111
112struct relayhost {
113	u_int8_t flags;
114	char hostname[MAXHOSTNAMELEN];
115	u_int16_t port;
116	char cert[PATH_MAX];
117	objid_t secmapid;
118};
119
120enum imsg_type {
121	IMSG_NONE,
122	IMSG_CTL_OK,		/* answer to smtpctl requests */
123	IMSG_CTL_FAIL,
124	IMSG_CTL_SHUTDOWN,
125	IMSG_CTL_VERBOSE,
126	IMSG_CONF_START,
127	IMSG_CONF_SSL,
128	IMSG_CONF_LISTENER,
129	IMSG_CONF_MAP,
130	IMSG_CONF_MAP_CONTENT,
131	IMSG_CONF_RULE,
132	IMSG_CONF_RULE_SOURCE,
133	IMSG_CONF_END,
134	IMSG_CONF_RELOAD,
135	IMSG_LKA_MAIL,
136	IMSG_LKA_RCPT,
137	IMSG_LKA_SECRET,
138	IMSG_LKA_RULEMATCH,
139	IMSG_MDA_SESS_NEW,
140	IMSG_MDA_DONE,
141	IMSG_MFA_RCPT,
142	IMSG_MFA_MAIL,
143
144	IMSG_QUEUE_CREATE_MESSAGE,
145	IMSG_QUEUE_SUBMIT_ENVELOPE,
146	IMSG_QUEUE_COMMIT_ENVELOPES,
147	IMSG_QUEUE_REMOVE_MESSAGE,
148	IMSG_QUEUE_COMMIT_MESSAGE,
149	IMSG_QUEUE_TEMPFAIL,
150	IMSG_QUEUE_PAUSE_LOCAL,
151	IMSG_QUEUE_PAUSE_OUTGOING,
152	IMSG_QUEUE_RESUME_LOCAL,
153	IMSG_QUEUE_RESUME_OUTGOING,
154
155	IMSG_QUEUE_MESSAGE_UPDATE,
156	IMSG_QUEUE_MESSAGE_FD,
157	IMSG_QUEUE_MESSAGE_FILE,
158	IMSG_QUEUE_SCHEDULE,
159	IMSG_QUEUE_REMOVE,
160
161	IMSG_RUNNER_REMOVE,
162	IMSG_RUNNER_SCHEDULE,
163
164	IMSG_BATCH_CREATE,
165	IMSG_BATCH_APPEND,
166	IMSG_BATCH_CLOSE,
167	IMSG_BATCH_DONE,
168
169	IMSG_PARENT_ENQUEUE_OFFLINE,
170	IMSG_PARENT_FORWARD_OPEN,
171	IMSG_PARENT_FORK_MDA,
172
173	IMSG_PARENT_AUTHENTICATE,
174	IMSG_PARENT_SEND_CONFIG,
175
176	IMSG_STATS,
177	IMSG_SMTP_ENQUEUE,
178	IMSG_SMTP_PAUSE,
179	IMSG_SMTP_RESUME,
180
181	IMSG_DNS_HOST,
182	IMSG_DNS_HOST_END,
183	IMSG_DNS_MX,
184	IMSG_DNS_PTR
185};
186
187enum blockmodes {
188	BM_NORMAL,
189	BM_NONBLOCK
190};
191
192struct imsgev {
193	struct imsgbuf		 ibuf;
194	void			(*handler)(int, short, void *);
195	struct event		 ev;
196	void			*data;
197	int			 proc;
198	short			 events;
199};
200
201struct ctl_conn {
202	TAILQ_ENTRY(ctl_conn)	 entry;
203	u_int8_t		 flags;
204#define CTL_CONN_NOTIFY		 0x01
205	struct imsgev		 iev;
206};
207TAILQ_HEAD(ctl_connlist, ctl_conn);
208
209struct ctl_id {
210	objid_t		 id;
211	char		 name[MAX_NAME_SIZE];
212};
213
214enum smtp_proc_type {
215	PROC_PARENT = 0,
216	PROC_SMTP,
217	PROC_MFA,
218	PROC_LKA,
219	PROC_QUEUE,
220	PROC_MDA,
221	PROC_MTA,
222	PROC_CONTROL,
223	PROC_RUNNER,
224} smtpd_process;
225
226struct peer {
227	enum smtp_proc_type	 id;
228	void			(*cb)(int, short, void *);
229};
230
231enum map_type {
232	T_SINGLE,
233	T_LIST,
234	T_HASH
235};
236
237enum map_src {
238	S_NONE,
239	S_DYN,
240	S_DNS,
241	S_PLAIN,
242	S_DB,
243	S_EXT
244};
245
246enum map_kind {
247	K_NONE,
248	K_ALIAS,
249	K_VIRTUAL,
250	K_SECRET
251};
252
253enum mapel_type {
254	ME_STRING,
255	ME_NET,
256	ME_NETMASK
257};
258
259struct mapel {
260	TAILQ_ENTRY(mapel)		 me_entry;
261	union mapel_data {
262		char			 med_string[MAX_LINE_SIZE];
263		struct netaddr		 med_addr;
264	}				 me_key;
265	union mapel_data		 me_val;
266};
267
268struct map {
269	TAILQ_ENTRY(map)		 m_entry;
270#define F_USED				 0x01
271#define F_DYNAMIC			 0x02
272	u_int8_t			 m_flags;
273	char				 m_name[MAX_LINE_SIZE];
274	objid_t				 m_id;
275	enum map_type			 m_type;
276	enum mapel_type			 m_eltype;
277	enum map_src			 m_src;
278	char				 m_config[MAXPATHLEN];
279	TAILQ_HEAD(mapel_list, mapel)	 m_contents;
280};
281
282
283struct map_backend {
284	void *(*open)(char *);
285	void (*close)(void *);
286	void *(*lookup)(void *, char *, enum map_kind);
287};
288
289
290enum cond_type {
291	C_ALL,
292	C_NET,
293	C_DOM,
294	C_VDOM
295};
296
297struct cond {
298	TAILQ_ENTRY(cond)		 c_entry;
299	objid_t				 c_map;
300	enum cond_type			 c_type;
301};
302
303enum action_type {
304	A_INVALID,
305	A_RELAY,
306	A_RELAYVIA,
307	A_MAILDIR,
308	A_MBOX,
309	A_FILENAME,
310	A_EXT
311};
312
313#define IS_MAILBOX(x)	((x).r_action == A_MAILDIR || (x).r_action == A_MBOX || (x).r_action == A_FILENAME)
314#define IS_RELAY(x)	((x).r_action == A_RELAY || (x).r_action == A_RELAYVIA)
315#define IS_EXT(x)	((x).r_action == A_EXT)
316
317struct rule {
318	TAILQ_ENTRY(rule)		 r_entry;
319	char				 r_tag[MAX_TAG_SIZE];
320	int				 r_accept;
321	struct map			*r_sources;
322	struct cond			 r_condition;
323	enum action_type		 r_action;
324	union rule_dest {
325		char			 buffer[MAX_RULEBUFFER_LEN];
326		struct relayhost       	 relayhost;
327	}				 r_value;
328
329	char				*r_user;
330	struct mailaddr			*r_as;
331	objid_t				 r_amap;
332	time_t				 r_qexpire;
333};
334
335struct mailaddr {
336	char	user[MAX_LOCALPART_SIZE];
337	char	domain[MAX_DOMAINPART_SIZE];
338};
339
340
341enum delivery_type {
342	D_INVALID = 0,
343	D_MDA,
344	D_MTA,
345	D_BOUNCE
346};
347
348enum delivery_status {
349	DS_PERMFAILURE	= 0x2,
350	DS_TEMPFAILURE	= 0x4,
351	DS_REJECTED	= 0x8,
352	DS_ACCEPTED	= 0x10,
353	DS_RETRY       	= 0x20,
354	DS_EDNS		= 0x40,
355	DS_ECONNECT	= 0x80
356};
357
358enum delivery_flags {
359	DF_RESOLVED		= 0x1,
360	DF_SCHEDULED		= 0x2,
361	DF_PROCESSING		= 0x4,
362	DF_AUTHENTICATED	= 0x8,
363	DF_ENQUEUED		= 0x10,
364	DF_FORCESCHEDULE	= 0x20,
365	DF_BOUNCE		= 0x40,
366	DF_INTERNAL		= 0x80 /* internal expansion forward */
367};
368
369union delivery_data {
370	char user[MAXLOGNAME];
371	char buffer[MAX_RULEBUFFER_LEN];
372	struct mailaddr mailaddr;
373};
374
375struct delivery_mda {
376	enum action_type	method;
377	union delivery_data	to;
378	char			as_user[MAXLOGNAME];
379};
380
381struct delivery_mta {
382	struct relayhost relay;
383	struct mailaddr	relay_as;
384};
385
386struct delivery {
387	u_int64_t			id;
388	enum delivery_type		type;
389
390	char				helo[MAXHOSTNAMELEN];
391	char				hostname[MAXHOSTNAMELEN];
392	char				errorline[MAX_LINE_SIZE];
393	struct sockaddr_storage		ss;
394
395	struct mailaddr			from;
396	struct mailaddr			rcpt;
397	struct mailaddr			rcpt_orig;
398
399	union delivery_method {
400		struct delivery_mda	mda;
401		struct delivery_mta	mta;
402	} agent;
403
404	time_t				 creation;
405	time_t				 lasttry;
406	time_t				 expire;
407	u_int8_t			 retry;
408	enum delivery_flags		 flags;
409	enum delivery_status		 status;
410};
411
412enum expand_type {
413	EXPAND_INVALID,
414	EXPAND_USERNAME,
415	EXPAND_FILENAME,
416	EXPAND_FILTER,
417	EXPAND_INCLUDE,
418	EXPAND_ADDRESS
419};
420
421enum expand_flags {
422	F_EXPAND_NONE,
423	F_EXPAND_DONE
424};
425
426struct expandnode {
427	RB_ENTRY(expandnode)	entry;
428	size_t			refcnt;
429	enum expand_flags      	flags;
430	enum expand_type       	type;
431	char			as_user[MAXLOGNAME];
432	union delivery_data    	u;
433};
434
435RB_HEAD(expandtree, expandnode);
436
437
438struct envelope {
439	TAILQ_ENTRY(envelope)		entry;
440
441	char				tag[MAX_TAG_SIZE];
442	struct rule			rule;
443
444	u_int64_t			session_id;
445	u_int64_t			batch_id;
446
447	struct delivery			delivery;
448};
449TAILQ_HEAD(deliverylist, envelope);
450
451
452enum child_type {
453	CHILD_INVALID,
454	CHILD_DAEMON,
455	CHILD_MDA,
456	CHILD_ENQUEUE_OFFLINE
457};
458
459struct child {
460	SPLAY_ENTRY(child)	 entry;
461	pid_t			 pid;
462	enum child_type		 type;
463	enum smtp_proc_type	 title;
464	int			 mda_out;
465	u_int32_t		 mda_id;
466};
467
468enum session_state {
469	S_INVALID = 0,
470	S_INIT,
471	S_GREETED,
472	S_TLS,
473	S_AUTH_INIT,
474	S_AUTH_USERNAME,
475	S_AUTH_PASSWORD,
476	S_AUTH_FINALIZE,
477	S_HELO,
478	S_MAIL_MFA,
479	S_MAIL_QUEUE,
480	S_MAIL,
481	S_RCPT_MFA,
482	S_RCPT,
483	S_DATA,
484	S_DATA_QUEUE,
485	S_DATACONTENT,
486	S_DONE,
487	S_QUIT
488};
489#define STATE_COUNT	18
490
491struct ssl {
492	SPLAY_ENTRY(ssl)	 ssl_nodes;
493	char			 ssl_name[PATH_MAX];
494	char			*ssl_cert;
495	off_t			 ssl_cert_len;
496	char			*ssl_key;
497	off_t			 ssl_key_len;
498	char			*ssl_dhparams;
499	off_t			 ssl_dhparams_len;
500	u_int8_t		 flags;
501};
502
503struct listener {
504	u_int8_t		 flags;
505	int			 fd;
506	struct sockaddr_storage	 ss;
507	in_port_t		 port;
508	struct timeval		 timeout;
509	struct event		 ev;
510	char			 ssl_cert_name[PATH_MAX];
511	struct ssl		*ssl;
512	void			*ssl_ctx;
513	char			 tag[MAX_TAG_SIZE];
514	TAILQ_ENTRY(listener)	 entry;
515};
516
517struct auth {
518	u_int64_t	 id;
519	char		 user[MAXLOGNAME];
520	char		 pass[MAX_LINE_SIZE];
521	int		 success;
522};
523
524enum session_flags {
525	F_EHLO		= 0x1,
526	F_QUIT		= 0x2,
527	F_8BITMIME	= 0x4,
528	F_SECURE	= 0x8,
529	F_AUTHENTICATED	= 0x10,
530	F_PEERHASTLS	= 0x20,
531	F_PEERHASAUTH	= 0x40,
532	F_WRITEONLY	= 0x80
533};
534
535struct session {
536	SPLAY_ENTRY(session)		 s_nodes;
537	u_int64_t			 s_id;
538
539	enum session_flags		 s_flags;
540	enum session_state		 s_state;
541	int				 s_fd;
542	struct sockaddr_storage		 s_ss;
543	char				 s_hostname[MAXHOSTNAMELEN];
544	struct event			 s_ev;
545	struct bufferevent		*s_bev;
546	struct listener			*s_l;
547	void				*s_ssl;
548	u_char				*s_buf;
549	int				 s_buflen;
550	struct timeval			 s_tv;
551	struct envelope			 s_msg;
552	short				 s_nresp[STATE_COUNT];
553	size_t				 rcptcount;
554	long				 s_datalen;
555
556	struct auth			 s_auth;
557
558	FILE				*datafp;
559	int				 mboxfd;
560	int				 messagefd;
561};
562
563
564/* ram-queue structures */
565struct ramqueue_host {
566	RB_ENTRY(ramqueue_host)		host_entry;
567	TAILQ_HEAD(,ramqueue_batch)	batch_queue;
568	u_int64_t			h_id;
569	char				hostname[MAXHOSTNAMELEN];
570};
571struct ramqueue_batch {
572	TAILQ_ENTRY(ramqueue_batch)	batch_entry;
573	TAILQ_HEAD(,ramqueue_envelope)	envelope_queue;
574	enum delivery_type		type;
575	u_int64_t			h_id;
576	u_int64_t			b_id;
577	u_int32_t      			msgid;
578	struct rule			rule;
579};
580struct ramqueue_envelope {
581	TAILQ_ENTRY(ramqueue_envelope)	 queue_entry;
582	TAILQ_ENTRY(ramqueue_envelope)	 batchqueue_entry;
583	struct ramqueue_host		*host;
584	struct ramqueue_batch		*batch;
585	u_int64_t      			 evpid;
586	time_t				 sched;
587};
588
589struct ramqueue {
590	struct ramqueue_envelope	       *current_evp;
591	RB_HEAD(hosttree, ramqueue_host)	hosttree;
592	TAILQ_HEAD(,ramqueue_envelope)		queue;
593};
594
595
596struct smtpd {
597	char					 sc_conffile[MAXPATHLEN];
598	size_t					 sc_maxsize;
599
600#define SMTPD_OPT_VERBOSE			 0x00000001
601#define SMTPD_OPT_NOACTION			 0x00000002
602	u_int32_t				 sc_opts;
603#define SMTPD_CONFIGURING			 0x00000001
604#define SMTPD_EXITING				 0x00000002
605#define SMTPD_MDA_PAUSED		       	 0x00000004
606#define SMTPD_MTA_PAUSED		       	 0x00000008
607#define SMTPD_SMTP_PAUSED		       	 0x00000010
608	u_int32_t				 sc_flags;
609	struct timeval				 sc_qintval;
610	int					 sc_qexpire;
611	u_int32_t				 sc_maxconn;
612	struct event				 sc_ev;
613	int					 *sc_pipes[PROC_COUNT]
614							[PROC_COUNT];
615	struct imsgev				*sc_ievs[PROC_COUNT];
616	int					 sc_instances[PROC_COUNT];
617	int					 sc_instance;
618	char					*sc_title[PROC_COUNT];
619	struct passwd				*sc_pw;
620	char					 sc_hostname[MAXHOSTNAMELEN];
621	struct ramqueue				 sc_rqueue;
622	struct queue_backend			*sc_queue;
623
624	TAILQ_HEAD(listenerlist, listener)	*sc_listeners;
625	TAILQ_HEAD(maplist, map)		*sc_maps, *sc_maps_reload;
626	TAILQ_HEAD(rulelist, rule)		*sc_rules, *sc_rules_reload;
627	SPLAY_HEAD(sessiontree, session)	 sc_sessions;
628	SPLAY_HEAD(msgtree, envelope)		 sc_messages;
629	SPLAY_HEAD(ssltree, ssl)		*sc_ssl;
630	SPLAY_HEAD(childtree, child)		 children;
631	SPLAY_HEAD(lkatree, lka_session)	 lka_sessions;
632	SPLAY_HEAD(mtatree, mta_session)	 mta_sessions;
633	LIST_HEAD(mdalist, mda_session)		 mda_sessions;
634
635	struct stats				*stats;
636};
637
638struct s_parent {
639	time_t		start;
640};
641
642struct s_queue {
643	size_t		inserts_local;
644	size_t		inserts_remote;
645};
646
647struct s_runner {
648	size_t		active;
649	size_t		maxactive;
650	size_t		bounces_active;
651	size_t		bounces_maxactive;
652	size_t		bounces;
653};
654
655struct s_session {
656	size_t		sessions;
657	size_t		sessions_inet4;
658	size_t		sessions_inet6;
659	size_t		sessions_active;
660	size_t		sessions_maxactive;
661
662	size_t		smtps;
663	size_t		smtps_active;
664	size_t		smtps_maxactive;
665
666	size_t		starttls;
667	size_t		starttls_active;
668	size_t		starttls_maxactive;
669
670	size_t		read_error;
671	size_t		read_timeout;
672	size_t		read_eof;
673	size_t		write_error;
674	size_t		write_timeout;
675	size_t		write_eof;
676	size_t		toofast;
677	size_t		tempfail;
678	size_t		linetoolong;
679	size_t		delays;
680};
681
682struct s_mda {
683	size_t		sessions;
684	size_t		sessions_active;
685	size_t		sessions_maxactive;
686};
687
688struct s_control {
689	size_t		sessions;
690	size_t		sessions_active;
691	size_t		sessions_maxactive;
692};
693
694struct s_lka {
695	size_t		queries;
696	size_t		queries_active;
697	size_t		queries_maxactive;
698	size_t		queries_mx;
699	size_t		queries_host;
700	size_t		queries_cname;
701	size_t		queries_failure;
702};
703
704struct s_ramqueue {
705	size_t		hosts;
706	size_t		batches;
707	size_t		envelopes;
708	size_t		hosts_max;
709	size_t		batches_max;
710	size_t		envelopes_max;
711};
712
713struct stats {
714	struct s_parent		 parent;
715	struct s_queue		 queue;
716	struct s_runner		 runner;
717	struct s_session	 mta;
718	struct s_mda		 mda;
719	struct s_session	 smtp;
720	struct s_control	 control;
721	struct s_lka		 lka;
722	struct s_ramqueue	 ramqueue;
723};
724
725struct reload {
726	int			fd;
727	int			ret;
728};
729
730struct submit_status {
731	u_int64_t			 id;
732	int				 code;
733	union submit_path {
734		struct mailaddr		 maddr;
735		u_int32_t		 msgid;
736		u_int64_t		 evpid;
737		char			 errormsg[MAX_LINE_SIZE];
738	}				 u;
739	enum delivery_flags		 flags;
740	struct sockaddr_storage		 ss;
741	struct envelope			 envelope;
742};
743
744struct forward_req {
745	u_int64_t			 id;
746	u_int8_t			 status;
747	char				 as_user[MAXLOGNAME];
748	struct envelope			 envelope;
749};
750
751enum dns_status {
752	DNS_OK = 0,
753	DNS_RETRY,
754	DNS_EINVAL,
755	DNS_ENONAME,
756	DNS_ENOTFOUND,
757};
758
759struct dns {
760	u_int64_t		 id;
761	char			 host[MAXHOSTNAMELEN];
762	int			 port;
763	int			 error;
764	int			 type;
765	struct imsgev		*asker;
766	struct sockaddr_storage	 ss;
767	struct dns		*next;
768};
769
770struct secret {
771	u_int64_t		 id;
772	objid_t			 secmapid;
773	char			 host[MAXHOSTNAMELEN];
774	char			 secret[MAX_LINE_SIZE];
775};
776
777struct mda_session {
778	LIST_ENTRY(mda_session)	 entry;
779	struct envelope		 msg;
780	struct msgbuf		 w;
781	struct event		 ev;
782	u_int32_t		 id;
783	FILE			*datafp;
784};
785
786struct deliver {
787	char			to[PATH_MAX];
788	char			user[MAXLOGNAME];
789	short			mode;
790};
791
792struct rulematch {
793	u_int64_t		 id;
794	struct submit_status	 ss;
795};
796
797enum lka_session_flags {
798	F_ERROR		= 0x1
799};
800
801struct lka_session {
802	SPLAY_ENTRY(lka_session)	 nodes;
803	u_int64_t			 id;
804
805	struct deliverylist		 deliverylist;
806	struct expandtree		 expandtree;
807
808	u_int8_t			 iterations;
809	u_int32_t			 pending;
810	enum lka_session_flags		 flags;
811	struct submit_status		 ss;
812};
813
814enum mta_state {
815	MTA_INVALID_STATE,
816	MTA_INIT,
817	MTA_SECRET,
818	MTA_DATA,
819	MTA_MX,
820	MTA_CONNECT,
821	MTA_PTR,
822	MTA_PROTOCOL,
823	MTA_DONE
824};
825
826/* mta session flags */
827#define	MTA_FORCE_ANYSSL	0x01
828#define	MTA_FORCE_SMTPS		0x02
829#define	MTA_ALLOW_PLAIN		0x04
830#define	MTA_USE_AUTH		0x08
831#define	MTA_FORCE_MX		0x10
832
833struct mta_relay {
834	TAILQ_ENTRY(mta_relay)	 entry;
835	struct sockaddr_storage	 sa;
836	char			 fqdn[MAXHOSTNAMELEN];
837	int			 used;
838};
839
840struct mta_session {
841	SPLAY_ENTRY(mta_session) entry;
842	u_int64_t		 id;
843	enum mta_state		 state;
844	char			*host;
845	int			 port;
846	int			 flags;
847	TAILQ_HEAD(,envelope)	 recipients;
848	TAILQ_HEAD(,mta_relay)	 relays;
849	objid_t			 secmapid;
850	char			*secret;
851	int			 fd;
852	FILE			*datafp;
853	struct event		 ev;
854	char			*cert;
855	void			*pcb;
856	struct ramqueue_batch	*batch;
857};
858
859
860/* maps return structures */
861struct map_secret {
862	char username[MAX_LINE_SIZE];
863	char password[MAX_LINE_SIZE];
864};
865
866struct map_alias {
867	size_t			nbnodes;
868	struct expandtree	expandtree;
869};
870
871struct map_virtual {
872	size_t			nbnodes;
873	struct expandtree	expandtree;
874};
875
876
877/* queue structures */
878enum queue_type {
879	QT_INVALID=0,
880	QT_FS
881};
882
883enum queue_kind {
884	Q_INVALID=0,
885	Q_ENQUEUE,
886	Q_INCOMING,
887	Q_QUEUE,
888	Q_PURGE,
889	Q_OFFLINE,
890	Q_BOUNCE
891};
892
893enum queue_op {
894	QOP_INVALID=0,
895	QOP_CREATE,
896	QOP_DELETE,
897	QOP_UPDATE,
898	QOP_COMMIT,
899	QOP_LOAD,
900	QOP_FD_R,
901	QOP_FD_RW,
902	QOP_PURGE
903};
904
905struct queue_backend {
906	enum queue_type	type;
907	int (*init)(void);
908	int (*message)(enum queue_kind, enum queue_op, u_int32_t *);
909	int (*envelope)(enum queue_kind, enum queue_op, struct envelope *);
910};
911
912
913/* auth structures */
914enum auth_type {
915	AUTH_INVALID=0,
916	AUTH_BSD,
917	AUTH_GETPWNAM,
918};
919
920struct auth_backend {
921	enum auth_type	type;
922	int (*authenticate)(char *, char *);
923};
924
925
926/* user structures */
927enum user_type {
928	USER_INVALID=0,
929	USER_GETPWNAM,
930};
931
932#define	MAXPASSWORDLEN	128
933struct user {
934	char username[MAXLOGNAME];
935	char directory[MAXPATHLEN];
936	char password[MAXPASSWORDLEN];
937	uid_t uid;
938	gid_t gid;
939};
940
941struct user_backend {
942	enum user_type	type;
943	int (*getbyname)(struct user *, char *);
944	int (*getbyuid)(struct user *, uid_t);
945};
946
947
948extern struct smtpd	*env;
949extern void (*imsg_callback)(struct imsgev *, struct imsg *);
950
951
952/* aliases.c */
953int aliases_exist(objid_t, char *);
954int aliases_get(objid_t, struct expandtree *, char *);
955int aliases_vdomain_exists(objid_t, char *);
956int aliases_virtual_exist(objid_t, struct mailaddr *);
957int aliases_virtual_get(objid_t, struct expandtree *, struct mailaddr *);
958int alias_parse(struct expandnode *, char *);
959
960
961/* auth_backend.c */
962struct auth_backend *auth_backend_lookup(enum auth_type);
963
964
965/* bounce.c */
966int bounce_session(int, struct envelope *);
967int bounce_session_switch(FILE *, enum session_state *, char *, struct envelope *);
968void bounce_event(int, short, void *);
969
970
971/* config.c */
972#define PURGE_LISTENERS		0x01
973#define PURGE_MAPS		0x02
974#define PURGE_RULES		0x04
975#define PURGE_SSL		0x08
976#define PURGE_EVERYTHING	0xff
977void purge_config(u_int8_t);
978void unconfigure(void);
979void configure(void);
980void init_pipes(void);
981void config_pipes(struct peer *, u_int);
982void config_peers(struct peer *, u_int);
983
984
985/* control.c */
986pid_t control(void);
987void session_socket_blockmode(int, enum blockmodes);
988void session_socket_no_linger(int);
989int session_socket_error(int);
990
991
992/* dns.c */
993void dns_query_host(char *, int, u_int64_t);
994void dns_query_mx(char *, int, u_int64_t);
995void dns_query_ptr(struct sockaddr_storage *, u_int64_t);
996void dns_async(struct imsgev *, int, struct dns *);
997
998
999/* enqueue.c */
1000int		 enqueue(int, char **);
1001int		 enqueue_offline(int, char **);
1002
1003
1004/* expand.c */
1005int expand_cmp(struct expandnode *, struct expandnode *);
1006void expandtree_increment_node(struct expandtree *, struct expandnode *);
1007void expandtree_decrement_node(struct expandtree *, struct expandnode *);
1008void expandtree_remove_node(struct expandtree *, struct expandnode *);
1009struct expandnode *expandtree_lookup(struct expandtree *, struct expandnode *);
1010void expandtree_free_nodes(struct expandtree *);
1011RB_PROTOTYPE(expandtree, expandnode, nodes, expand_cmp);
1012
1013
1014/* forward.c */
1015int forwards_get(int, struct expandtree *, char *);
1016
1017
1018/* lka.c */
1019pid_t lka(void);
1020int lka_session_cmp(struct lka_session *, struct lka_session *);
1021SPLAY_PROTOTYPE(lkatree, lka_session, nodes, lka_session_cmp);
1022
1023/* lka_session.c */
1024struct lka_session *lka_session_init(struct submit_status *);
1025void lka_session_fail(struct lka_session *);
1026void lka_session_destroy(struct lka_session *);
1027
1028
1029/* map.c */
1030void *map_lookup(objid_t, char *, enum map_kind);
1031struct map *map_find(objid_t);
1032struct map *map_findbyname(const char *);
1033
1034
1035/* mda.c */
1036pid_t mda(void);
1037
1038
1039/* mfa.c */
1040pid_t mfa(void);
1041
1042
1043/* mta.c */
1044pid_t mta(void);
1045int mta_session_cmp(struct mta_session *, struct mta_session *);
1046SPLAY_PROTOTYPE(mtatree, mta_session, entry, mta_session_cmp);
1047
1048
1049/* parse.y */
1050int parse_config(struct smtpd *, const char *, int);
1051int cmdline_symset(char *);
1052
1053
1054/* queue.c */
1055pid_t queue(void);
1056void queue_submit_envelope(struct envelope *);
1057void queue_commit_envelopes(struct envelope *);
1058
1059
1060/* queue_backend.c */
1061struct queue_backend *queue_backend_lookup(enum queue_type);
1062int queue_message_create(enum queue_kind, u_int32_t *);
1063int queue_message_delete(enum queue_kind, u_int32_t);
1064int queue_message_commit(enum queue_kind, u_int32_t);
1065int queue_message_fd_r(enum queue_kind, u_int32_t);
1066int queue_message_fd_rw(enum queue_kind, u_int32_t);
1067int queue_message_purge(enum queue_kind, u_int32_t);
1068int queue_envelope_create(enum queue_kind, struct envelope *);
1069int queue_envelope_delete(enum queue_kind, struct envelope *);
1070int queue_envelope_load(enum queue_kind, u_int64_t, struct envelope *);
1071int queue_envelope_update(enum queue_kind, struct envelope *);
1072
1073
1074/* queue_shared.c */
1075void queue_message_update(struct envelope *);
1076struct qwalk	*qwalk_new(char *);
1077int qwalk(struct qwalk *, char *);
1078void qwalk_close(struct qwalk *);
1079int bounce_record_message(struct envelope *, struct envelope *);
1080void show_queue(char *, int);
1081
1082
1083/* ramqueue.c */
1084void ramqueue_init(struct ramqueue *);
1085int ramqueue_load(struct ramqueue *, time_t *);
1086int ramqueue_load_offline(struct ramqueue *);
1087int ramqueue_host_cmp(struct ramqueue_host *, struct ramqueue_host *);
1088void ramqueue_remove(struct ramqueue *, struct ramqueue_envelope *);
1089int ramqueue_is_empty(struct ramqueue *);
1090int ramqueue_is_empty(struct ramqueue *);
1091int ramqueue_batch_is_empty(struct ramqueue_batch *);
1092int ramqueue_host_is_empty(struct ramqueue_host *);
1093void ramqueue_remove_batch(struct ramqueue_host *, struct ramqueue_batch *);
1094void ramqueue_remove_host(struct ramqueue *, struct ramqueue_host *);
1095void ramqueue_reschedule(struct ramqueue *, u_int64_t);
1096struct ramqueue_envelope *ramqueue_envelope_by_id(struct ramqueue *, u_int64_t);
1097struct ramqueue_envelope *ramqueue_first_envelope(struct ramqueue *);
1098struct ramqueue_envelope *ramqueue_next_envelope(struct ramqueue *);
1099struct ramqueue_envelope *ramqueue_batch_first_envelope(struct ramqueue_batch *);
1100RB_PROTOTYPE(hosttree, ramqueue_host, host_entry, ramqueue_host_cmp);
1101
1102
1103/* runner.c */
1104pid_t runner(void);
1105void message_reset_flags(struct envelope *);
1106
1107
1108/* smtp.c */
1109pid_t smtp(void);
1110void smtp_resume(void);
1111
1112
1113/* smtp_session.c */
1114void session_init(struct listener *, struct session *);
1115int session_cmp(struct session *, struct session *);
1116void session_pickup(struct session *, struct submit_status *);
1117void session_destroy(struct session *);
1118void session_respond(struct session *, char *, ...)
1119	__attribute__ ((format (printf, 2, 3)));
1120void session_bufferevent_new(struct session *);
1121SPLAY_PROTOTYPE(sessiontree, session, s_nodes, session_cmp);
1122
1123
1124/* smtpd.c */
1125int	 child_cmp(struct child *, struct child *);
1126void imsg_event_add(struct imsgev *);
1127void imsg_compose_event(struct imsgev *, u_int16_t, u_int32_t, pid_t,
1128    int, void *, u_int16_t);
1129void imsg_dispatch(int, short, void *);
1130SPLAY_PROTOTYPE(childtree, child, entry, child_cmp);
1131
1132
1133/* ssl.c */
1134void ssl_init(void);
1135void ssl_transaction(struct session *);
1136void ssl_session_init(struct session *);
1137void ssl_session_destroy(struct session *);
1138int ssl_load_certfile(const char *, u_int8_t);
1139void ssl_setup(struct listener *);
1140int ssl_cmp(struct ssl *, struct ssl *);
1141SPLAY_PROTOTYPE(ssltree, ssl, ssl_nodes, ssl_cmp);
1142
1143
1144/* ssl_privsep.c */
1145int	 ssl_ctx_use_private_key(void *, char *, off_t);
1146int	 ssl_ctx_use_certificate_chain(void *, char *, off_t);
1147
1148
1149/* user_backend.c */
1150struct user_backend *user_backend_lookup(enum user_type);
1151
1152
1153/* util.c */
1154typedef struct arglist arglist;
1155struct arglist {
1156	char    **list;
1157	u_int   num;
1158	u_int   nalloc;
1159};
1160void addargs(arglist *, char *, ...)
1161	__attribute__((format(printf, 2, 3)));
1162int bsnprintf(char *, size_t, const char *, ...)
1163	__attribute__ ((format (printf, 3, 4)));
1164int safe_fclose(FILE *);
1165int hostname_match(char *, char *);
1166int email_to_mailaddr(struct mailaddr *, char *);
1167int valid_localpart(char *);
1168int valid_domainpart(char *);
1169char *ss_to_text(struct sockaddr_storage *);
1170int valid_message_id(char *);
1171int valid_message_uid(char *);
1172char *time_to_text(time_t);
1173int secure_file(int, char *, char *, uid_t, int);
1174void lowercase(char *, char *, size_t);
1175void envelope_set_errormsg(struct envelope *, char *, ...);
1176char *envelope_get_errormsg(struct envelope *);
1177void sa_set_port(struct sockaddr *, int);
1178u_int64_t generate_uid(void);
1179void fdlimit(double);
1180int availdesc(void);
1181u_int32_t evpid_to_msgid(u_int64_t);
1182u_int64_t msgid_to_evpid(u_int32_t);
1183u_int32_t filename_to_msgid(char *);
1184u_int64_t filename_to_evpid(char *);
1185