1c2aa98e2SPeter Wemm /* 2602a2b1bSGregory Neil Shapiro * Copyright (c) 1998-2001 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 16c2aa98e2SPeter Wemm 17c2aa98e2SPeter Wemm #ifndef lint 18c2aa98e2SPeter Wemm # ifdef DAEMON 1913058a91SGregory Neil Shapiro static char id[] = "@(#)$Id: daemon.c,v 8.401.4.68 2001/07/20 18:45:58 gshapiro Exp $ (with daemon mode)"; 2006f25ae9SGregory Neil Shapiro # else /* DAEMON */ 2113058a91SGregory Neil Shapiro static char id[] = "@(#)$Id: daemon.c,v 8.401.4.68 2001/07/20 18:45:58 gshapiro Exp $ (without daemon mode)"; 2206f25ae9SGregory Neil Shapiro # endif /* DAEMON */ 2306f25ae9SGregory Neil Shapiro #endif /* ! lint */ 24c2aa98e2SPeter Wemm 25c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 26c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2706f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 28c2aa98e2SPeter Wemm 29c2aa98e2SPeter Wemm #if DAEMON || defined(USE_SOCK_STREAM) 3006f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 31c2aa98e2SPeter Wemm # include <arpa/inet.h> 3206f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 33c2aa98e2SPeter Wemm # if NAMED_BIND 34c2aa98e2SPeter Wemm # ifndef NO_DATA 35c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 3606f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3706f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3806f25ae9SGregory Neil Shapiro #endif /* DAEMON || defined(USE_SOCK_STREAM) */ 39c2aa98e2SPeter Wemm 40c2aa98e2SPeter Wemm #if DAEMON 41c2aa98e2SPeter Wemm 4242e5d165SGregory Neil Shapiro # if STARTTLS 4342e5d165SGregory Neil Shapiro # include <openssl/rand.h> 4442e5d165SGregory Neil Shapiro # endif /* STARTTLS */ 4542e5d165SGregory Neil Shapiro 46c2aa98e2SPeter Wemm # include <sys/time.h> 47c2aa98e2SPeter Wemm 4806f25ae9SGregory Neil Shapiro # if IP_SRCROUTE && NETINET 49c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 50c2aa98e2SPeter Wemm # include <netinet/ip.h> 5106f25ae9SGregory Neil Shapiro # if HAS_IN_H 5206f25ae9SGregory Neil Shapiro # include <netinet/in.h> 5306f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5406f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 5506f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 5606f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 5706f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5806f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 59c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 6006f25ae9SGregory Neil Shapiro # ifndef IPOPTION 6106f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 6206f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 6306f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 6406f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 6506f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 6606f25ae9SGregory Neil Shapiro # endif /* IP_SRCROUTE && NETINET */ 6706f25ae9SGregory Neil Shapiro 6806f25ae9SGregory Neil Shapiro /* structure to describe a daemon */ 6906f25ae9SGregory Neil Shapiro struct daemon 7006f25ae9SGregory Neil Shapiro { 7106f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 7206f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 7306f25ae9SGregory Neil Shapiro u_short d_port; /* port number */ 7406f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 7506f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 7606f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7706f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7806f25ae9SGregory Neil Shapiro bool d_firsttime; 7906f25ae9SGregory Neil Shapiro int d_socksize; 8006f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 8106f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 8206f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 8306f25ae9SGregory Neil Shapiro }; 8406f25ae9SGregory Neil Shapiro 8506f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8606f25ae9SGregory Neil Shapiro 8706f25ae9SGregory Neil Shapiro static void connecttimeout __P((void)); 8806f25ae9SGregory Neil Shapiro static int opendaemonsocket __P((struct daemon *, bool)); 8906f25ae9SGregory Neil Shapiro static u_short setupdaemon __P((SOCKADDR *)); 908774250cSGregory Neil Shapiro static SIGFUNC_DECL sighup __P((int)); 918774250cSGregory Neil Shapiro static void restart_daemon __P((void)); 92c2aa98e2SPeter Wemm 93c2aa98e2SPeter Wemm /* 94c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 95c2aa98e2SPeter Wemm ** 96c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 97c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 98c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 99c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 100c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 101c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 102c2aa98e2SPeter Wemm ** 103c2aa98e2SPeter Wemm ** getrequests(e) 104c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 105c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 106c2aa98e2SPeter Wemm ** OutChannel appropriately. 107c2aa98e2SPeter Wemm ** clrdaemon() 108c2aa98e2SPeter Wemm ** Close any open files associated with getting 109c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 110c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 111c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 112c2aa98e2SPeter Wemm ** code (if it cares). 113c2aa98e2SPeter Wemm ** makeconnection(host, port, outfile, infile, e) 114c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 115c2aa98e2SPeter Wemm ** port. Set *outfile and *infile to the files 116c2aa98e2SPeter Wemm ** appropriate for communication. Returns zero on 117c2aa98e2SPeter Wemm ** success, else an exit status describing the 118c2aa98e2SPeter Wemm ** error. 119c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 120c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 121c2aa98e2SPeter Wemm */ 12206f25ae9SGregory Neil Shapiro 12306f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 12406f25ae9SGregory Neil Shapiro static int ndaemons = 0; /* actual number of daemons */ 12506f25ae9SGregory Neil Shapiro 12606f25ae9SGregory Neil Shapiro /* options for client */ 12706f25ae9SGregory Neil Shapiro static int TcpRcvBufferSize = 0; /* size of TCP receive buffer */ 12806f25ae9SGregory Neil Shapiro static int TcpSndBufferSize = 0; /* size of TCP send buffer */ 12906f25ae9SGregory Neil Shapiro 130c2aa98e2SPeter Wemm /* 131c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 132c2aa98e2SPeter Wemm ** 133c2aa98e2SPeter Wemm ** Parameters: 134c2aa98e2SPeter Wemm ** e -- the current envelope. 135c2aa98e2SPeter Wemm ** 136c2aa98e2SPeter Wemm ** Returns: 13706f25ae9SGregory Neil Shapiro ** pointer to flags. 138c2aa98e2SPeter Wemm ** 139c2aa98e2SPeter Wemm ** Side Effects: 140c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 141c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 142c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 143c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 144c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 145c2aa98e2SPeter Wemm ** to the communication channel. 146c2aa98e2SPeter Wemm */ 147c2aa98e2SPeter Wemm 14806f25ae9SGregory Neil Shapiro BITMAP256 * 149c2aa98e2SPeter Wemm getrequests(e) 150c2aa98e2SPeter Wemm ENVELOPE *e; 151c2aa98e2SPeter Wemm { 152c2aa98e2SPeter Wemm int t; 15306f25ae9SGregory Neil Shapiro time_t last_disk_space_check = 0; 15406f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15506f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 156c2aa98e2SPeter Wemm # if XDEBUG 157c2aa98e2SPeter Wemm bool j_has_dot; 15806f25ae9SGregory Neil Shapiro # endif /* XDEBUG */ 159065a643dSPeter Wemm char status[MAXLINE]; 16006f25ae9SGregory Neil Shapiro SOCKADDR sa; 16106f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 16206f25ae9SGregory Neil Shapiro # if NETUNIX 163065a643dSPeter Wemm extern int ControlSocket; 16406f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 16506f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 166c2aa98e2SPeter Wemm 16706f25ae9SGregory Neil Shapiro 16806f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 169c2aa98e2SPeter Wemm { 17006f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 17106f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime = TRUE; 17206f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 173c2aa98e2SPeter Wemm } 174193538b7SGregory Neil Shapiro 175c2aa98e2SPeter Wemm /* 176c2aa98e2SPeter Wemm ** Try to actually open the connection. 177c2aa98e2SPeter Wemm */ 178c2aa98e2SPeter Wemm 179c2aa98e2SPeter Wemm if (tTd(15, 1)) 18006f25ae9SGregory Neil Shapiro { 18106f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 182193538b7SGregory Neil Shapiro { 18306f25ae9SGregory Neil Shapiro dprintf("getrequests: daemon %s: port %d\n", 18406f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 18506f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 18606f25ae9SGregory Neil Shapiro } 187193538b7SGregory Neil Shapiro } 188c2aa98e2SPeter Wemm 189c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 19006f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 19106f25ae9SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], TRUE); 192c2aa98e2SPeter Wemm 193065a643dSPeter Wemm if (opencontrolsocket() < 0) 194065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1952e43090eSPeter Wemm "daemon could not open control socket %s: %s", 1962e43090eSPeter Wemm ControlSocketName, errstring(errno)); 197065a643dSPeter Wemm 198c2aa98e2SPeter Wemm (void) setsignal(SIGCHLD, reapchild); 1998774250cSGregory Neil Shapiro (void) setsignal(SIGHUP, sighup); 2008774250cSGregory Neil Shapiro 2018774250cSGregory Neil Shapiro /* workaround: can't seem to release the signal in the parent */ 2028774250cSGregory Neil Shapiro (void) releasesignal(SIGHUP); 203c2aa98e2SPeter Wemm 20406f25ae9SGregory Neil Shapiro /* write the pid to file */ 20506f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 206c2aa98e2SPeter Wemm 207c2aa98e2SPeter Wemm # if XDEBUG 208c2aa98e2SPeter Wemm { 209c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 210c2aa98e2SPeter Wemm 211c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 212c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 213c2aa98e2SPeter Wemm } 21406f25ae9SGregory Neil Shapiro # endif /* XDEBUG */ 215c2aa98e2SPeter Wemm 216065a643dSPeter Wemm /* Add parent process as first item */ 21706f25ae9SGregory Neil Shapiro proc_list_add(getpid(), "Sendmail daemon", PROC_DAEMON); 218065a643dSPeter Wemm 219c2aa98e2SPeter Wemm if (tTd(15, 1)) 22006f25ae9SGregory Neil Shapiro { 22106f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 22206f25ae9SGregory Neil Shapiro dprintf("getrequests: daemon %s: %d\n", 22306f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 22406f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 22506f25ae9SGregory Neil Shapiro } 226c2aa98e2SPeter Wemm 227c2aa98e2SPeter Wemm for (;;) 228c2aa98e2SPeter Wemm { 229c2aa98e2SPeter Wemm register pid_t pid; 230c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 231065a643dSPeter Wemm bool timedout = FALSE; 232065a643dSPeter Wemm bool control = FALSE; 23306f25ae9SGregory Neil Shapiro int save_errno; 234c2aa98e2SPeter Wemm int pipefd[2]; 235193538b7SGregory Neil Shapiro time_t timenow; 23642e5d165SGregory Neil Shapiro # if STARTTLS 23742e5d165SGregory Neil Shapiro long seed; 23842e5d165SGregory Neil Shapiro # endif /* STARTTLS */ 239193538b7SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int)); 240c2aa98e2SPeter Wemm 241c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 242c2aa98e2SPeter Wemm (void) blocksignal(SIGALRM); 24306f25ae9SGregory Neil Shapiro 2448774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 2458774250cSGregory Neil Shapiro shutdown_daemon(); 2468774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 2478774250cSGregory Neil Shapiro restart_daemon(); 2488774250cSGregory Neil Shapiro 249193538b7SGregory Neil Shapiro timenow = curtime(); 250193538b7SGregory Neil Shapiro 251193538b7SGregory Neil Shapiro /* 252193538b7SGregory Neil Shapiro ** Use ConnRateThrottle only if the 253193538b7SGregory Neil Shapiro ** last pass was for a connection 254193538b7SGregory Neil Shapiro */ 255193538b7SGregory Neil Shapiro 256193538b7SGregory Neil Shapiro if (ConnRateThrottle > 0 && curdaemon >= 0) 257193538b7SGregory Neil Shapiro { 258193538b7SGregory Neil Shapiro static int conncnt = 0; 259193538b7SGregory Neil Shapiro static time_t lastconn = 0; 260193538b7SGregory Neil Shapiro 261193538b7SGregory Neil Shapiro if (timenow != lastconn) 262193538b7SGregory Neil Shapiro { 263193538b7SGregory Neil Shapiro lastconn = timenow; 264193538b7SGregory Neil Shapiro conncnt = 1; 265193538b7SGregory Neil Shapiro } 266193538b7SGregory Neil Shapiro else if (++conncnt > ConnRateThrottle) 267193538b7SGregory Neil Shapiro { 268193538b7SGregory Neil Shapiro /* sleep to flatten out connection load */ 269193538b7SGregory Neil Shapiro sm_setproctitle(TRUE, e, 270193538b7SGregory Neil Shapiro "deferring connections: %d per second", 271193538b7SGregory Neil Shapiro ConnRateThrottle); 272193538b7SGregory Neil Shapiro if (LogLevel >= 9) 273193538b7SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 274193538b7SGregory Neil Shapiro "deferring connections: %d per second", 275193538b7SGregory Neil Shapiro ConnRateThrottle); 276193538b7SGregory Neil Shapiro (void) sleep(1); 277193538b7SGregory Neil Shapiro } 278193538b7SGregory Neil Shapiro } 279193538b7SGregory Neil Shapiro 28006f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 281065a643dSPeter Wemm { 282193538b7SGregory Neil Shapiro if (timenow < Daemons[idx].d_refuse_connections_until) 28306f25ae9SGregory Neil Shapiro continue; 28406f25ae9SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx)) 285c2aa98e2SPeter Wemm { 28606f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 287c2aa98e2SPeter Wemm { 288065a643dSPeter Wemm /* close socket so peer fails quickly */ 28906f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 29006f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 291c2aa98e2SPeter Wemm } 292c2aa98e2SPeter Wemm 293065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 294193538b7SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = timenow + 15; 295065a643dSPeter Wemm } 29606f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 29706f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 298c2aa98e2SPeter Wemm { 29906f25ae9SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel >= 9) 30006f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 30106f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 30206f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 30306f25ae9SGregory Neil Shapiro 304065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 30506f25ae9SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], FALSE); 30606f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime = FALSE; 307065a643dSPeter Wemm } 308c2aa98e2SPeter Wemm } 309c2aa98e2SPeter Wemm 3108774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 3118774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 3128774250cSGregory Neil Shapiro shutdown_daemon(); 3138774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 3148774250cSGregory Neil Shapiro restart_daemon(); 3158774250cSGregory Neil Shapiro 316193538b7SGregory Neil Shapiro if (timenow >= last_disk_space_check) 31706f25ae9SGregory Neil Shapiro { 318193538b7SGregory Neil Shapiro bool logged = FALSE; 319193538b7SGregory Neil Shapiro 32006f25ae9SGregory Neil Shapiro if (!enoughdiskspace(MinBlocksFree + 1, FALSE)) 32106f25ae9SGregory Neil Shapiro { 322193538b7SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 323193538b7SGregory Neil Shapiro { 32406f25ae9SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 32506f25ae9SGregory Neil Shapiro { 32606f25ae9SGregory Neil Shapiro /* log only if not logged before */ 327193538b7SGregory Neil Shapiro if (!logged) 328193538b7SGregory Neil Shapiro { 32906f25ae9SGregory Neil Shapiro if (LogLevel >= 9) 33006f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 33142e5d165SGregory Neil Shapiro "rejecting new messages: min free: %ld", 33206f25ae9SGregory Neil Shapiro MinBlocksFree); 333193538b7SGregory Neil Shapiro logged = TRUE; 33406f25ae9SGregory Neil Shapiro sm_setproctitle(TRUE, e, 33542e5d165SGregory Neil Shapiro "rejecting new messages: min free: %ld", 33606f25ae9SGregory Neil Shapiro MinBlocksFree); 337193538b7SGregory Neil Shapiro } 33806f25ae9SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 33906f25ae9SGregory Neil Shapiro } 34006f25ae9SGregory Neil Shapiro } 341193538b7SGregory Neil Shapiro } 342193538b7SGregory Neil Shapiro else 343193538b7SGregory Neil Shapiro { 344193538b7SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 345193538b7SGregory Neil Shapiro { 346193538b7SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 34706f25ae9SGregory Neil Shapiro { 34806f25ae9SGregory Neil Shapiro /* log only if not logged before */ 349193538b7SGregory Neil Shapiro if (!logged) 350193538b7SGregory Neil Shapiro { 35106f25ae9SGregory Neil Shapiro if (LogLevel >= 9) 35206f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 35306f25ae9SGregory Neil Shapiro "accepting new messages (again)"); 354193538b7SGregory Neil Shapiro logged = TRUE; 355193538b7SGregory Neil Shapiro } 356193538b7SGregory Neil Shapiro 35706f25ae9SGregory Neil Shapiro /* title will be set below */ 35806f25ae9SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 35906f25ae9SGregory Neil Shapiro } 360193538b7SGregory Neil Shapiro } 361193538b7SGregory Neil Shapiro } 36206f25ae9SGregory Neil Shapiro /* only check disk space once a minute */ 363193538b7SGregory Neil Shapiro last_disk_space_check = timenow + 60; 36406f25ae9SGregory Neil Shapiro } 36506f25ae9SGregory Neil Shapiro 366c2aa98e2SPeter Wemm # if XDEBUG 367c2aa98e2SPeter Wemm /* check for disaster */ 368c2aa98e2SPeter Wemm { 369c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 370c2aa98e2SPeter Wemm 371c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 372c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 373c2aa98e2SPeter Wemm { 374c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 375c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 376c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 377c2aa98e2SPeter Wemm abort(); 378c2aa98e2SPeter Wemm } 379c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 380c2aa98e2SPeter Wemm { 381c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 382c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 383c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 384c2aa98e2SPeter Wemm abort(); 385c2aa98e2SPeter Wemm } 386c2aa98e2SPeter Wemm } 38706f25ae9SGregory Neil Shapiro # endif /* XDEBUG */ 388c2aa98e2SPeter Wemm 389c2aa98e2SPeter Wemm # if 0 390c2aa98e2SPeter Wemm /* 391c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 392c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 393c2aa98e2SPeter Wemm ** so is it worth doing this? 394c2aa98e2SPeter Wemm */ 395c2aa98e2SPeter Wemm 396065a643dSPeter Wemm if (DaemonSocket >= 0 && 397065a643dSPeter Wemm SetNonBlocking(DaemonSocket, FALSE) < 0) 398c2aa98e2SPeter Wemm log an error here; 39906f25ae9SGregory Neil Shapiro # endif /* 0 */ 400c2aa98e2SPeter Wemm (void) releasesignal(SIGALRM); 40106f25ae9SGregory Neil Shapiro 402c2aa98e2SPeter Wemm for (;;) 403c2aa98e2SPeter Wemm { 404193538b7SGregory Neil Shapiro bool setproc = FALSE; 405065a643dSPeter Wemm int highest = -1; 406c2aa98e2SPeter Wemm fd_set readfds; 407c2aa98e2SPeter Wemm struct timeval timeout; 408c2aa98e2SPeter Wemm 4098774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 4108774250cSGregory Neil Shapiro shutdown_daemon(); 4118774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 4128774250cSGregory Neil Shapiro restart_daemon(); 4138774250cSGregory Neil Shapiro 414c2aa98e2SPeter Wemm FD_ZERO(&readfds); 415065a643dSPeter Wemm 41606f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 417065a643dSPeter Wemm { 41806f25ae9SGregory Neil Shapiro /* wait for a connection */ 41906f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 42006f25ae9SGregory Neil Shapiro { 421193538b7SGregory Neil Shapiro if (!setproc && 422193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 423193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 42406f25ae9SGregory Neil Shapiro { 42506f25ae9SGregory Neil Shapiro sm_setproctitle(TRUE, e, 42606f25ae9SGregory Neil Shapiro "accepting connections"); 427193538b7SGregory Neil Shapiro setproc = TRUE; 428065a643dSPeter Wemm } 42906f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 43006f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 43106f25ae9SGregory Neil Shapiro FD_SET((u_int)Daemons[idx].d_socket, &readfds); 43206f25ae9SGregory Neil Shapiro } 43306f25ae9SGregory Neil Shapiro } 43406f25ae9SGregory Neil Shapiro 43506f25ae9SGregory Neil Shapiro # if NETUNIX 436065a643dSPeter Wemm if (ControlSocket >= 0) 437065a643dSPeter Wemm { 438065a643dSPeter Wemm if (ControlSocket > highest) 439065a643dSPeter Wemm highest = ControlSocket; 440065a643dSPeter Wemm FD_SET(ControlSocket, &readfds); 441065a643dSPeter Wemm } 44206f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 44306f25ae9SGregory Neil Shapiro 444065a643dSPeter Wemm timeout.tv_sec = 5; 445c2aa98e2SPeter Wemm timeout.tv_usec = 0; 446c2aa98e2SPeter Wemm 447065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 448c2aa98e2SPeter Wemm NULL, NULL, &timeout); 449065a643dSPeter Wemm 4508774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 4518774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 4528774250cSGregory Neil Shapiro shutdown_daemon(); 4538774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 4548774250cSGregory Neil Shapiro restart_daemon(); 4558774250cSGregory Neil Shapiro 456193538b7SGregory Neil Shapiro 457193538b7SGregory Neil Shapiro 458c2aa98e2SPeter Wemm if (DoQueueRun) 459c2aa98e2SPeter Wemm (void) runqueue(TRUE, FALSE); 460193538b7SGregory Neil Shapiro 461193538b7SGregory Neil Shapiro curdaemon = -1; 462065a643dSPeter Wemm if (t <= 0) 463065a643dSPeter Wemm { 464065a643dSPeter Wemm timedout = TRUE; 465065a643dSPeter Wemm break; 466065a643dSPeter Wemm } 467c2aa98e2SPeter Wemm 468065a643dSPeter Wemm control = FALSE; 469c2aa98e2SPeter Wemm errno = 0; 47006f25ae9SGregory Neil Shapiro 47106f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 47206f25ae9SGregory Neil Shapiro if ((idx = olddaemon + 1) >= ndaemons) 47306f25ae9SGregory Neil Shapiro idx = 0; 47406f25ae9SGregory Neil Shapiro for (i = 0; i < ndaemons; i++) 475065a643dSPeter Wemm { 47606f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 47706f25ae9SGregory Neil Shapiro FD_ISSET(Daemons[idx].d_socket, &readfds)) 47806f25ae9SGregory Neil Shapiro { 47906f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 480602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 481602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 48206f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 483065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 484065a643dSPeter Wemm &lotherend); 485602a2b1bSGregory Neil Shapiro 486602a2b1bSGregory Neil Shapiro /* 487602a2b1bSGregory Neil Shapiro ** If remote side closes before 488602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 489602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 490602a2b1bSGregory Neil Shapiro */ 491602a2b1bSGregory Neil Shapiro 492602a2b1bSGregory Neil Shapiro if (t >= 0 && 493602a2b1bSGregory Neil Shapiro (lotherend == 0 || 494602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 495602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 496602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 497602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 498602a2b1bSGregory Neil Shapiro { 499602a2b1bSGregory Neil Shapiro (void) close(t); 500602a2b1bSGregory Neil Shapiro t = -1; 501602a2b1bSGregory Neil Shapiro errno = EINVAL; 502602a2b1bSGregory Neil Shapiro } 50306f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 50406f25ae9SGregory Neil Shapiro break; 505065a643dSPeter Wemm } 50606f25ae9SGregory Neil Shapiro if (++idx >= ndaemons) 50706f25ae9SGregory Neil Shapiro idx = 0; 50806f25ae9SGregory Neil Shapiro } 50906f25ae9SGregory Neil Shapiro # if NETUNIX 51006f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 511065a643dSPeter Wemm FD_ISSET(ControlSocket, &readfds)) 512065a643dSPeter Wemm { 513065a643dSPeter Wemm struct sockaddr_un sa_un; 514065a643dSPeter Wemm 515065a643dSPeter Wemm lotherend = sizeof sa_un; 516602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 517065a643dSPeter Wemm t = accept(ControlSocket, 518065a643dSPeter Wemm (struct sockaddr *)&sa_un, 519065a643dSPeter Wemm &lotherend); 520602a2b1bSGregory Neil Shapiro 521602a2b1bSGregory Neil Shapiro /* 522602a2b1bSGregory Neil Shapiro ** If remote side closes before 523602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 524602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 525602a2b1bSGregory Neil Shapiro */ 526602a2b1bSGregory Neil Shapiro 527602a2b1bSGregory Neil Shapiro if (t >= 0 && 528602a2b1bSGregory Neil Shapiro (lotherend == 0 || 529602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 530602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 531602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 532602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 533602a2b1bSGregory Neil Shapiro { 534602a2b1bSGregory Neil Shapiro (void) close(t); 535602a2b1bSGregory Neil Shapiro t = -1; 536602a2b1bSGregory Neil Shapiro errno = EINVAL; 537602a2b1bSGregory Neil Shapiro } 538602a2b1bSGregory Neil Shapiro if (t >= 0) 539065a643dSPeter Wemm control = TRUE; 540065a643dSPeter Wemm } 541193538b7SGregory Neil Shapiro # else /* NETUNIX */ 542193538b7SGregory Neil Shapiro if (curdaemon == -1) 543193538b7SGregory Neil Shapiro { 544193538b7SGregory Neil Shapiro /* No daemon to service */ 545193538b7SGregory Neil Shapiro continue; 546193538b7SGregory Neil Shapiro } 54706f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 548c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 549c2aa98e2SPeter Wemm break; 550c2aa98e2SPeter Wemm } 551065a643dSPeter Wemm if (timedout) 552065a643dSPeter Wemm { 553065a643dSPeter Wemm timedout = FALSE; 554065a643dSPeter Wemm continue; 555065a643dSPeter Wemm } 55606f25ae9SGregory Neil Shapiro save_errno = errno; 557193538b7SGregory Neil Shapiro timenow = curtime(); 558c2aa98e2SPeter Wemm (void) blocksignal(SIGALRM); 559c2aa98e2SPeter Wemm if (t < 0) 560c2aa98e2SPeter Wemm { 56106f25ae9SGregory Neil Shapiro errno = save_errno; 562c2aa98e2SPeter Wemm syserr("getrequests: accept"); 563c2aa98e2SPeter Wemm 564c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 56506f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 56606f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 56706f25ae9SGregory Neil Shapiro # if SO_REUSEADDR_IS_BROKEN 56806f25ae9SGregory Neil Shapiro /* 56906f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 57006f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 57106f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 57206f25ae9SGregory Neil Shapiro */ 57306f25ae9SGregory Neil Shapiro 574193538b7SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = timenow + 15; 57506f25ae9SGregory Neil Shapiro # endif /* SO_REUSEADDR_IS_BROKEN */ 576c2aa98e2SPeter Wemm continue; 577c2aa98e2SPeter Wemm } 578c2aa98e2SPeter Wemm 57906f25ae9SGregory Neil Shapiro if (!control) 58006f25ae9SGregory Neil Shapiro { 58106f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 58206f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 58306f25ae9SGregory Neil Shapiro { 58406f25ae9SGregory Neil Shapiro case AF_UNSPEC: 58506f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 58606f25ae9SGregory Neil Shapiro "unspec", &BlankEnvelope); 58706f25ae9SGregory Neil Shapiro break; 58806f25ae9SGregory Neil Shapiro # if NETINET 58906f25ae9SGregory Neil Shapiro case AF_INET: 59006f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 59106f25ae9SGregory Neil Shapiro "inet", &BlankEnvelope); 59206f25ae9SGregory Neil Shapiro break; 59306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 59406f25ae9SGregory Neil Shapiro # if NETINET6 59506f25ae9SGregory Neil Shapiro case AF_INET6: 59606f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 59706f25ae9SGregory Neil Shapiro "inet6", &BlankEnvelope); 59806f25ae9SGregory Neil Shapiro break; 59906f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 60006f25ae9SGregory Neil Shapiro # if NETISO 60106f25ae9SGregory Neil Shapiro case AF_ISO: 60206f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 60306f25ae9SGregory Neil Shapiro "iso", &BlankEnvelope); 60406f25ae9SGregory Neil Shapiro break; 60506f25ae9SGregory Neil Shapiro # endif /* NETISO */ 60606f25ae9SGregory Neil Shapiro # if NETNS 60706f25ae9SGregory Neil Shapiro case AF_NS: 60806f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 60906f25ae9SGregory Neil Shapiro "ns", &BlankEnvelope); 61006f25ae9SGregory Neil Shapiro break; 61106f25ae9SGregory Neil Shapiro # endif /* NETNS */ 61206f25ae9SGregory Neil Shapiro # if NETX25 61306f25ae9SGregory Neil Shapiro case AF_CCITT: 61406f25ae9SGregory Neil Shapiro define(macid("{daemon_family}", NULL), 61506f25ae9SGregory Neil Shapiro "x.25", &BlankEnvelope); 61606f25ae9SGregory Neil Shapiro break; 61706f25ae9SGregory Neil Shapiro # endif /* NETX25 */ 61806f25ae9SGregory Neil Shapiro } 61906f25ae9SGregory Neil Shapiro define(macid("{daemon_name}", NULL), 62006f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_name, &BlankEnvelope); 62106f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 62206f25ae9SGregory Neil Shapiro define(macid("{daemon_flags}", NULL), 62306f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_mflags, 62406f25ae9SGregory Neil Shapiro &BlankEnvelope); 62506f25ae9SGregory Neil Shapiro else 62606f25ae9SGregory Neil Shapiro define(macid("{daemon_flags}", NULL), 62706f25ae9SGregory Neil Shapiro "", &BlankEnvelope); 62806f25ae9SGregory Neil Shapiro } 62906f25ae9SGregory Neil Shapiro 630c2aa98e2SPeter Wemm /* 631c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 632c2aa98e2SPeter Wemm */ 633c2aa98e2SPeter Wemm 634c2aa98e2SPeter Wemm if (tTd(15, 2)) 63506f25ae9SGregory Neil Shapiro dprintf("getrequests: forking (fd = %d)\n", t); 63606f25ae9SGregory Neil Shapiro 63706f25ae9SGregory Neil Shapiro /* 63806f25ae9SGregory Neil Shapiro ** advance state of PRNG 63906f25ae9SGregory Neil Shapiro ** this is necessary because otherwise all child processes 64006f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 64106f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 64206f25ae9SGregory Neil Shapiro ** are not "really" random. 64306f25ae9SGregory Neil Shapiro */ 64442e5d165SGregory Neil Shapiro # if STARTTLS 64542e5d165SGregory Neil Shapiro seed = get_random(); 64642e5d165SGregory Neil Shapiro RAND_seed((void *) &last_disk_space_check, 64742e5d165SGregory Neil Shapiro sizeof last_disk_space_check); 64842e5d165SGregory Neil Shapiro RAND_seed((void *) &timenow, sizeof timenow); 64942e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 65042e5d165SGregory Neil Shapiro # else /* STARTTLS */ 65106f25ae9SGregory Neil Shapiro (void) get_random(); 65242e5d165SGregory Neil Shapiro # endif /* STARTTLS */ 653c2aa98e2SPeter Wemm 654193538b7SGregory Neil Shapiro #ifndef DEBUG_NO_FORK 655c2aa98e2SPeter Wemm /* 656c2aa98e2SPeter Wemm ** Create a pipe to keep the child from writing to the 657c2aa98e2SPeter Wemm ** socket until after the parent has closed it. Otherwise 658c2aa98e2SPeter Wemm ** the parent may hang if the child has closed it first. 659c2aa98e2SPeter Wemm */ 660c2aa98e2SPeter Wemm 661c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 662c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 663c2aa98e2SPeter Wemm 66406f25ae9SGregory Neil Shapiro (void) blocksignal(SIGCHLD); 665c2aa98e2SPeter Wemm pid = fork(); 666c2aa98e2SPeter Wemm if (pid < 0) 667c2aa98e2SPeter Wemm { 668c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 669c2aa98e2SPeter Wemm if (pipefd[0] != -1) 670c2aa98e2SPeter Wemm { 671c2aa98e2SPeter Wemm (void) close(pipefd[0]); 672c2aa98e2SPeter Wemm (void) close(pipefd[1]); 673c2aa98e2SPeter Wemm } 674c2aa98e2SPeter Wemm (void) releasesignal(SIGCHLD); 67506f25ae9SGregory Neil Shapiro (void) sleep(10); 676c2aa98e2SPeter Wemm (void) close(t); 677c2aa98e2SPeter Wemm continue; 678c2aa98e2SPeter Wemm } 679193538b7SGregory Neil Shapiro #else /* ! DEBUG_NO_FORK */ 680193538b7SGregory Neil Shapiro pid = 0; 681193538b7SGregory Neil Shapiro #endif /* ! DEBUG_NO_FORK */ 682c2aa98e2SPeter Wemm 683c2aa98e2SPeter Wemm if (pid == 0) 684c2aa98e2SPeter Wemm { 685c2aa98e2SPeter Wemm char *p; 68606f25ae9SGregory Neil Shapiro FILE *inchannel, *outchannel = NULL; 687c2aa98e2SPeter Wemm 688c2aa98e2SPeter Wemm /* 689c2aa98e2SPeter Wemm ** CHILD -- return to caller. 690c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 691c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 692c2aa98e2SPeter Wemm */ 693c2aa98e2SPeter Wemm 6948774250cSGregory Neil Shapiro /* Reset global flags */ 6958774250cSGregory Neil Shapiro RestartRequest = NULL; 6968774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6978774250cSGregory Neil Shapiro PendingSignal = 0; 6988774250cSGregory Neil Shapiro 6998774250cSGregory Neil Shapiro (void) releasesignal(SIGALRM); 7008774250cSGregory Neil Shapiro (void) releasesignal(SIGCHLD); 7018774250cSGregory Neil Shapiro (void) setsignal(SIGCHLD, SIG_DFL); 7028774250cSGregory Neil Shapiro (void) setsignal(SIGHUP, SIG_DFL); 7038774250cSGregory Neil Shapiro (void) setsignal(SIGTERM, intsig); 7048774250cSGregory Neil Shapiro 70506f25ae9SGregory Neil Shapiro if (!control) 70606f25ae9SGregory Neil Shapiro { 70706f25ae9SGregory Neil Shapiro define(macid("{daemon_addr}", NULL), 70806f25ae9SGregory Neil Shapiro newstr(anynet_ntoa(&Daemons[curdaemon].d_addr)), 70906f25ae9SGregory Neil Shapiro &BlankEnvelope); 71006f25ae9SGregory Neil Shapiro (void) snprintf(status, sizeof status, "%d", 71106f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 71206f25ae9SGregory Neil Shapiro define(macid("{daemon_port}", NULL), 71306f25ae9SGregory Neil Shapiro newstr(status), &BlankEnvelope); 71406f25ae9SGregory Neil Shapiro } 71506f25ae9SGregory Neil Shapiro 71606f25ae9SGregory Neil Shapiro for (idx = 0; idx < ndaemons; idx++) 71706f25ae9SGregory Neil Shapiro { 71806f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 71906f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 72013058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 72106f25ae9SGregory Neil Shapiro } 722065a643dSPeter Wemm clrcontrol(); 72306f25ae9SGregory Neil Shapiro 72406f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 72506f25ae9SGregory Neil Shapiro if (control) 72606f25ae9SGregory Neil Shapiro { 72706f25ae9SGregory Neil Shapiro /* Add control socket process */ 72806f25ae9SGregory Neil Shapiro proc_list_add(getpid(), "console socket child", 72906f25ae9SGregory Neil Shapiro PROC_CONTROL_CHILD); 73006f25ae9SGregory Neil Shapiro } 73106f25ae9SGregory Neil Shapiro else 73206f25ae9SGregory Neil Shapiro { 733c2aa98e2SPeter Wemm proc_list_clear(); 734c2aa98e2SPeter Wemm 735065a643dSPeter Wemm /* Add parent process as first child item */ 73606f25ae9SGregory Neil Shapiro proc_list_add(getpid(), "daemon child", 73706f25ae9SGregory Neil Shapiro PROC_DAEMON_CHILD); 738065a643dSPeter Wemm 73906f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 740c2aa98e2SPeter Wemm QueueIntvl = 0; 741c2aa98e2SPeter Wemm 74206f25ae9SGregory Neil Shapiro sm_setproctitle(TRUE, e, "startup with %s", 743c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 74406f25ae9SGregory Neil Shapiro } 745c2aa98e2SPeter Wemm 746193538b7SGregory Neil Shapiro #ifndef DEBUG_NO_FORK 747c2aa98e2SPeter Wemm if (pipefd[0] != -1) 748c2aa98e2SPeter Wemm { 749c2aa98e2SPeter Wemm auto char c; 750c2aa98e2SPeter Wemm 751c2aa98e2SPeter Wemm /* 752c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 753c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 754c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 755c2aa98e2SPeter Wemm ** socket until after the parent has closed 756c2aa98e2SPeter Wemm ** the pipe. 757c2aa98e2SPeter Wemm */ 758c2aa98e2SPeter Wemm 759c2aa98e2SPeter Wemm /* close the write end of the pipe */ 760c2aa98e2SPeter Wemm (void) close(pipefd[1]); 761c2aa98e2SPeter Wemm 762c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 763c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 764c2aa98e2SPeter Wemm errno == EINTR) 765c2aa98e2SPeter Wemm continue; 766c2aa98e2SPeter Wemm (void) close(pipefd[0]); 767c2aa98e2SPeter Wemm } 768193538b7SGregory Neil Shapiro #endif /* ! DEBUG_NO_FORK */ 769c2aa98e2SPeter Wemm 77006f25ae9SGregory Neil Shapiro /* control socket processing */ 77106f25ae9SGregory Neil Shapiro if (control) 77206f25ae9SGregory Neil Shapiro { 77306f25ae9SGregory Neil Shapiro control_command(t, e); 77406f25ae9SGregory Neil Shapiro 77506f25ae9SGregory Neil Shapiro /* NOTREACHED */ 77606f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 77706f25ae9SGregory Neil Shapiro } 77806f25ae9SGregory Neil Shapiro 779c2aa98e2SPeter Wemm /* determine host name */ 780c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 781c2aa98e2SPeter Wemm if (strlen(p) > (SIZE_T) MAXNAME) 782c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 783c2aa98e2SPeter Wemm RealHostName = newstr(p); 78406f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 78506f25ae9SGregory Neil Shapiro { 78606f25ae9SGregory Neil Shapiro /* TEMP, FAIL: which one? */ 78706f25ae9SGregory Neil Shapiro define(macid("{client_resolve}", NULL), 78806f25ae9SGregory Neil Shapiro (h_errno == TRY_AGAIN) ? "TEMP" : "FAIL", 78906f25ae9SGregory Neil Shapiro &BlankEnvelope); 79006f25ae9SGregory Neil Shapiro } 79106f25ae9SGregory Neil Shapiro else 79206f25ae9SGregory Neil Shapiro define(macid("{client_resolve}", NULL), "OK", 79306f25ae9SGregory Neil Shapiro &BlankEnvelope); 79406f25ae9SGregory Neil Shapiro sm_setproctitle(TRUE, e, "startup with %s", p); 795c2aa98e2SPeter Wemm 796c2aa98e2SPeter Wemm if ((inchannel = fdopen(t, "r")) == NULL || 797c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 798c2aa98e2SPeter Wemm (outchannel = fdopen(t, "w")) == NULL) 799c2aa98e2SPeter Wemm { 800c2aa98e2SPeter Wemm syserr("cannot open SMTP server channel, fd=%d", t); 801065a643dSPeter Wemm finis(FALSE, EX_OK); 802c2aa98e2SPeter Wemm } 803c2aa98e2SPeter Wemm 804c2aa98e2SPeter Wemm InChannel = inchannel; 805c2aa98e2SPeter Wemm OutChannel = outchannel; 806c2aa98e2SPeter Wemm DisConnected = FALSE; 807c2aa98e2SPeter Wemm 808c2aa98e2SPeter Wemm # ifdef XLA 809c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 810c2aa98e2SPeter Wemm { 81106f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 812065a643dSPeter Wemm finis(FALSE, EX_OK); 813c2aa98e2SPeter Wemm } 81406f25ae9SGregory Neil Shapiro # endif /* XLA */ 81506f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 81606f25ae9SGregory Neil Shapiro if (getsockname(fileno(InChannel), &sa.sa, 81706f25ae9SGregory Neil Shapiro &len) == 0) 81806f25ae9SGregory Neil Shapiro { 81906f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 82006f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 82106f25ae9SGregory Neil Shapiro dprintf("getreq: got name %s\n", p); 82206f25ae9SGregory Neil Shapiro define(macid("{if_name}", NULL), 82306f25ae9SGregory Neil Shapiro newstr(p), &BlankEnvelope); 82406f25ae9SGregory Neil Shapiro 82506f25ae9SGregory Neil Shapiro /* do this only if it is not the loopback */ 82606f25ae9SGregory Neil Shapiro /* interface: how to figure out? XXX */ 82706f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 82806f25ae9SGregory Neil Shapiro { 82906f25ae9SGregory Neil Shapiro define(macid("{if_addr}", NULL), 83006f25ae9SGregory Neil Shapiro newstr(anynet_ntoa(&sa)), 83106f25ae9SGregory Neil Shapiro &BlankEnvelope); 83206f25ae9SGregory Neil Shapiro p = xalloc(5); 83306f25ae9SGregory Neil Shapiro snprintf(p, 4, "%d", sa.sa.sa_family); 83406f25ae9SGregory Neil Shapiro define(macid("{if_family}", NULL), p, 83506f25ae9SGregory Neil Shapiro &BlankEnvelope); 83606f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 83706f25ae9SGregory Neil Shapiro dprintf("getreq: got addr %s and family %s\n", 83806f25ae9SGregory Neil Shapiro macvalue(macid("{if_addr}", NULL), 83906f25ae9SGregory Neil Shapiro &BlankEnvelope), 84006f25ae9SGregory Neil Shapiro macvalue(macid("{if_addr}", NULL), 84106f25ae9SGregory Neil Shapiro &BlankEnvelope)); 84206f25ae9SGregory Neil Shapiro } 84306f25ae9SGregory Neil Shapiro else 84406f25ae9SGregory Neil Shapiro { 84506f25ae9SGregory Neil Shapiro define(macid("{if_addr}", NULL), NULL, 84606f25ae9SGregory Neil Shapiro &BlankEnvelope); 84706f25ae9SGregory Neil Shapiro define(macid("{if_family}", NULL), NULL, 84806f25ae9SGregory Neil Shapiro &BlankEnvelope); 84906f25ae9SGregory Neil Shapiro } 85006f25ae9SGregory Neil Shapiro } 85106f25ae9SGregory Neil Shapiro else 85206f25ae9SGregory Neil Shapiro { 85306f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 85406f25ae9SGregory Neil Shapiro dprintf("getreq: getsockname failed\n"); 85506f25ae9SGregory Neil Shapiro define(macid("{if_name}", NULL), NULL, 85606f25ae9SGregory Neil Shapiro &BlankEnvelope); 85706f25ae9SGregory Neil Shapiro define(macid("{if_addr}", NULL), NULL, 85806f25ae9SGregory Neil Shapiro &BlankEnvelope); 85906f25ae9SGregory Neil Shapiro define(macid("{if_family}", NULL), NULL, 86006f25ae9SGregory Neil Shapiro &BlankEnvelope); 86106f25ae9SGregory Neil Shapiro } 862c2aa98e2SPeter Wemm break; 863c2aa98e2SPeter Wemm } 864c2aa98e2SPeter Wemm 865c2aa98e2SPeter Wemm /* parent -- keep track of children */ 86606f25ae9SGregory Neil Shapiro if (control) 86706f25ae9SGregory Neil Shapiro { 86806f25ae9SGregory Neil Shapiro snprintf(status, sizeof status, "control socket server child"); 86906f25ae9SGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL); 87006f25ae9SGregory Neil Shapiro } 87106f25ae9SGregory Neil Shapiro else 87206f25ae9SGregory Neil Shapiro { 87306f25ae9SGregory Neil Shapiro snprintf(status, sizeof status, 87406f25ae9SGregory Neil Shapiro "SMTP server child for %s", 875065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 87606f25ae9SGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON); 87706f25ae9SGregory Neil Shapiro } 878c2aa98e2SPeter Wemm (void) releasesignal(SIGCHLD); 879c2aa98e2SPeter Wemm 880c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 881c2aa98e2SPeter Wemm if (pipefd[0] != -1) 88206f25ae9SGregory Neil Shapiro { 883c2aa98e2SPeter Wemm (void) close(pipefd[0]); 88406f25ae9SGregory Neil Shapiro pipefd[0] = -1; 88506f25ae9SGregory Neil Shapiro } 886c2aa98e2SPeter Wemm 887c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 888c2aa98e2SPeter Wemm (void) close(t); 889c2aa98e2SPeter Wemm 890c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 891c2aa98e2SPeter Wemm if (pipefd[1] != -1) 89206f25ae9SGregory Neil Shapiro { 893c2aa98e2SPeter Wemm (void) close(pipefd[1]); 89406f25ae9SGregory Neil Shapiro pipefd[1] = -1; 895c2aa98e2SPeter Wemm } 89606f25ae9SGregory Neil Shapiro } 89706f25ae9SGregory Neil Shapiro 898c2aa98e2SPeter Wemm if (tTd(15, 2)) 89906f25ae9SGregory Neil Shapiro dprintf("getreq: returning\n"); 90006f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 901c2aa98e2SPeter Wemm } 902c2aa98e2SPeter Wemm /* 90306f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 904c2aa98e2SPeter Wemm ** 90506f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 906c2aa98e2SPeter Wemm ** 907c2aa98e2SPeter Wemm ** Parameters: 90806f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 909c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 910c2aa98e2SPeter Wemm ** 911c2aa98e2SPeter Wemm ** Returns: 912c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 913c2aa98e2SPeter Wemm ** 914c2aa98e2SPeter Wemm ** Side Effects: 915c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 916c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 917c2aa98e2SPeter Wemm */ 918c2aa98e2SPeter Wemm 919c2aa98e2SPeter Wemm # define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 920c2aa98e2SPeter Wemm 92106f25ae9SGregory Neil Shapiro static int 92206f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 92306f25ae9SGregory Neil Shapiro struct daemon *d; 924c2aa98e2SPeter Wemm bool firsttime; 925c2aa98e2SPeter Wemm { 926c2aa98e2SPeter Wemm int on = 1; 92706f25ae9SGregory Neil Shapiro int fdflags; 92806f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 929c2aa98e2SPeter Wemm int ntries = 0; 93006f25ae9SGregory Neil Shapiro int save_errno; 931c2aa98e2SPeter Wemm 932c2aa98e2SPeter Wemm if (tTd(15, 2)) 93306f25ae9SGregory Neil Shapiro dprintf("opendaemonsocket(%s)\n", d->d_name); 934c2aa98e2SPeter Wemm 935c2aa98e2SPeter Wemm do 936c2aa98e2SPeter Wemm { 937c2aa98e2SPeter Wemm if (ntries > 0) 93806f25ae9SGregory Neil Shapiro (void) sleep(5); 93906f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 940c2aa98e2SPeter Wemm { 94106f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 94206f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 94306f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 944c2aa98e2SPeter Wemm { 94506f25ae9SGregory Neil Shapiro save_errno = errno; 94606f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", d->d_name); 947c2aa98e2SPeter Wemm severe: 948c2aa98e2SPeter Wemm if (LogLevel > 0) 949c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 95006f25ae9SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", d->d_name); 95106f25ae9SGregory Neil Shapiro d->d_socket = -1; 952c2aa98e2SPeter Wemm continue; 953c2aa98e2SPeter Wemm } 954c2aa98e2SPeter Wemm 955c2aa98e2SPeter Wemm /* turn on network debugging? */ 956c2aa98e2SPeter Wemm if (tTd(15, 101)) 95706f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 958c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 959c2aa98e2SPeter Wemm sizeof on); 960c2aa98e2SPeter Wemm 96106f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 962c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 96306f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 964c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 965c2aa98e2SPeter Wemm 966c2aa98e2SPeter Wemm # ifdef SO_RCVBUF 96706f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 968c2aa98e2SPeter Wemm { 96906f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 970c2aa98e2SPeter Wemm SO_RCVBUF, 97106f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 97206f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 97306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 974c2aa98e2SPeter Wemm } 97506f25ae9SGregory Neil Shapiro # endif /* SO_RCVBUF */ 97606f25ae9SGregory Neil Shapiro # ifdef SO_SNDBUF 97706f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 97806f25ae9SGregory Neil Shapiro { 97906f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 98006f25ae9SGregory Neil Shapiro SO_SNDBUF, 98106f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 98206f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 98306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 98406f25ae9SGregory Neil Shapiro } 98506f25ae9SGregory Neil Shapiro # endif /* SO_SNDBUF */ 986c2aa98e2SPeter Wemm 98706f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 98806f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 98906f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 99006f25ae9SGregory Neil Shapiro { 99106f25ae9SGregory Neil Shapiro save_errno = errno; 99206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 99306f25ae9SGregory Neil Shapiro d->d_name, 99406f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 99506f25ae9SGregory Neil Shapiro errstring(save_errno)); 99606f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 99706f25ae9SGregory Neil Shapiro goto severe; 99806f25ae9SGregory Neil Shapiro } 99906f25ae9SGregory Neil Shapiro 100006f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1001c2aa98e2SPeter Wemm { 1002c2aa98e2SPeter Wemm # if NETINET 1003c2aa98e2SPeter Wemm case AF_INET: 100406f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1005c2aa98e2SPeter Wemm break; 100606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 100706f25ae9SGregory Neil Shapiro 100806f25ae9SGregory Neil Shapiro # if NETINET6 100906f25ae9SGregory Neil Shapiro case AF_INET6: 101006f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 101106f25ae9SGregory Neil Shapiro break; 101206f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 1013c2aa98e2SPeter Wemm 1014c2aa98e2SPeter Wemm # if NETISO 1015c2aa98e2SPeter Wemm case AF_ISO: 101606f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1017c2aa98e2SPeter Wemm break; 101806f25ae9SGregory Neil Shapiro # endif /* NETISO */ 1019c2aa98e2SPeter Wemm 1020c2aa98e2SPeter Wemm default: 102106f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1022c2aa98e2SPeter Wemm break; 1023c2aa98e2SPeter Wemm } 1024c2aa98e2SPeter Wemm 102506f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1026c2aa98e2SPeter Wemm { 1027c2aa98e2SPeter Wemm /* probably another daemon already */ 102806f25ae9SGregory Neil Shapiro save_errno = errno; 102906f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 103006f25ae9SGregory Neil Shapiro d->d_name); 103106f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1032c2aa98e2SPeter Wemm goto severe; 1033c2aa98e2SPeter Wemm } 1034c2aa98e2SPeter Wemm } 103506f25ae9SGregory Neil Shapiro if (!firsttime && 103606f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1037c2aa98e2SPeter Wemm { 103806f25ae9SGregory Neil Shapiro save_errno = errno; 103906f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 104006f25ae9SGregory Neil Shapiro d->d_name); 104106f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1042c2aa98e2SPeter Wemm goto severe; 1043c2aa98e2SPeter Wemm } 1044c2aa98e2SPeter Wemm return socksize; 104506f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 104606f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 104706f25ae9SGregory Neil Shapiro d->d_name); 1048065a643dSPeter Wemm /* NOTREACHED */ 1049c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1050c2aa98e2SPeter Wemm } 1051c2aa98e2SPeter Wemm /* 105206f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 105306f25ae9SGregory Neil Shapiro ** 105406f25ae9SGregory Neil Shapiro ** Parameters: 105506f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 105606f25ae9SGregory Neil Shapiro ** daemon -- number of daemon 105706f25ae9SGregory Neil Shapiro ** 105806f25ae9SGregory Neil Shapiro ** Returns: 105906f25ae9SGregory Neil Shapiro ** port number on which daemon should run 106006f25ae9SGregory Neil Shapiro ** 106106f25ae9SGregory Neil Shapiro */ 106206f25ae9SGregory Neil Shapiro static u_short 106306f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 106406f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 106506f25ae9SGregory Neil Shapiro { 106606f25ae9SGregory Neil Shapiro u_short port; 106706f25ae9SGregory Neil Shapiro 106806f25ae9SGregory Neil Shapiro /* 106906f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 107006f25ae9SGregory Neil Shapiro */ 107106f25ae9SGregory Neil Shapiro 107206f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 107306f25ae9SGregory Neil Shapiro { 107406f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 107506f25ae9SGregory Neil Shapiro # if NETINET 107606f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 107706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 107806f25ae9SGregory Neil Shapiro } 107906f25ae9SGregory Neil Shapiro 108006f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 108106f25ae9SGregory Neil Shapiro { 108206f25ae9SGregory Neil Shapiro # if NETINET 108306f25ae9SGregory Neil Shapiro case AF_INET: 108406f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 108506f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 108606f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 108706f25ae9SGregory Neil Shapiro break; 108806f25ae9SGregory Neil Shapiro # endif /* NETINET */ 108906f25ae9SGregory Neil Shapiro 109006f25ae9SGregory Neil Shapiro # if NETINET6 109106f25ae9SGregory Neil Shapiro case AF_INET6: 109206f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 109306f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 109406f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 109506f25ae9SGregory Neil Shapiro break; 109606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 109706f25ae9SGregory Neil Shapiro 109806f25ae9SGregory Neil Shapiro default: 109906f25ae9SGregory Neil Shapiro /* unknown protocol */ 110006f25ae9SGregory Neil Shapiro port = 0; 110106f25ae9SGregory Neil Shapiro break; 110206f25ae9SGregory Neil Shapiro } 110306f25ae9SGregory Neil Shapiro if (port == 0) 110406f25ae9SGregory Neil Shapiro { 110506f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 110606f25ae9SGregory Neil Shapiro port = htons(25); 110706f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 110806f25ae9SGregory Neil Shapiro { 110906f25ae9SGregory Neil Shapiro register struct servent *sp; 111006f25ae9SGregory Neil Shapiro 111106f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 111206f25ae9SGregory Neil Shapiro if (sp == NULL) 111306f25ae9SGregory Neil Shapiro { 111406f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 111506f25ae9SGregory Neil Shapiro port = htons(25); 111606f25ae9SGregory Neil Shapiro } 111706f25ae9SGregory Neil Shapiro else 111806f25ae9SGregory Neil Shapiro port = sp->s_port; 111906f25ae9SGregory Neil Shapiro } 112006f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 112106f25ae9SGregory Neil Shapiro } 112206f25ae9SGregory Neil Shapiro 112306f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 112406f25ae9SGregory Neil Shapiro { 112506f25ae9SGregory Neil Shapiro # if NETINET 112606f25ae9SGregory Neil Shapiro case AF_INET: 112706f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 112806f25ae9SGregory Neil Shapiro break; 112906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 113006f25ae9SGregory Neil Shapiro 113106f25ae9SGregory Neil Shapiro # if NETINET6 113206f25ae9SGregory Neil Shapiro case AF_INET6: 113306f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 113406f25ae9SGregory Neil Shapiro break; 113506f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 113606f25ae9SGregory Neil Shapiro 113706f25ae9SGregory Neil Shapiro default: 113806f25ae9SGregory Neil Shapiro /* unknown protocol */ 113906f25ae9SGregory Neil Shapiro break; 114006f25ae9SGregory Neil Shapiro } 114106f25ae9SGregory Neil Shapiro return(port); 114206f25ae9SGregory Neil Shapiro } 114306f25ae9SGregory Neil Shapiro /* 1144c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1145c2aa98e2SPeter Wemm ** 1146c2aa98e2SPeter Wemm ** Parameters: 1147c2aa98e2SPeter Wemm ** none. 1148c2aa98e2SPeter Wemm ** 1149c2aa98e2SPeter Wemm ** Returns: 1150c2aa98e2SPeter Wemm ** none. 1151c2aa98e2SPeter Wemm ** 1152c2aa98e2SPeter Wemm ** Side Effects: 1153c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1154c2aa98e2SPeter Wemm */ 1155c2aa98e2SPeter Wemm 1156c2aa98e2SPeter Wemm void 1157c2aa98e2SPeter Wemm clrdaemon() 1158c2aa98e2SPeter Wemm { 115906f25ae9SGregory Neil Shapiro int i; 116006f25ae9SGregory Neil Shapiro 116106f25ae9SGregory Neil Shapiro for (i = 0; i < ndaemons; i++) 116206f25ae9SGregory Neil Shapiro { 116306f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 116406f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 116506f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 116606f25ae9SGregory Neil Shapiro } 1167c2aa98e2SPeter Wemm } 1168c2aa98e2SPeter Wemm /* 116906f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1170c2aa98e2SPeter Wemm ** 1171c2aa98e2SPeter Wemm ** Parameters: 1172c2aa98e2SPeter Wemm ** p -- the options line. 117306f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1174c2aa98e2SPeter Wemm ** 1175c2aa98e2SPeter Wemm ** Returns: 1176c2aa98e2SPeter Wemm ** none. 1177c2aa98e2SPeter Wemm */ 1178c2aa98e2SPeter Wemm 117906f25ae9SGregory Neil Shapiro static void 118006f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1181c2aa98e2SPeter Wemm register char *p; 118206f25ae9SGregory Neil Shapiro struct daemon *d; 1183c2aa98e2SPeter Wemm { 118406f25ae9SGregory Neil Shapiro # if NETISO 1185193538b7SGregory Neil Shapiro short portno; 118606f25ae9SGregory Neil Shapiro # endif /* NETISO */ 118706f25ae9SGregory Neil Shapiro int l; 118806f25ae9SGregory Neil Shapiro char *h, *flags; 1189193538b7SGregory Neil Shapiro char *port = NULL; 1190193538b7SGregory Neil Shapiro char *addr = NULL; 119106f25ae9SGregory Neil Shapiro 119206f25ae9SGregory Neil Shapiro # if NETINET 119306f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 119406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 119506f25ae9SGregory Neil Shapiro # endif /* NETINET */ 1196c2aa98e2SPeter Wemm 1197c2aa98e2SPeter Wemm while (p != NULL) 1198c2aa98e2SPeter Wemm { 1199c2aa98e2SPeter Wemm register char *f; 1200c2aa98e2SPeter Wemm register char *v; 1201c2aa98e2SPeter Wemm 1202c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1203c2aa98e2SPeter Wemm p++; 1204c2aa98e2SPeter Wemm if (*p == '\0') 1205c2aa98e2SPeter Wemm break; 1206c2aa98e2SPeter Wemm f = p; 1207c2aa98e2SPeter Wemm p = strchr(p, ','); 1208c2aa98e2SPeter Wemm if (p != NULL) 1209c2aa98e2SPeter Wemm *p++ = '\0'; 1210c2aa98e2SPeter Wemm v = strchr(f, '='); 1211c2aa98e2SPeter Wemm if (v == NULL) 1212c2aa98e2SPeter Wemm continue; 1213c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1214c2aa98e2SPeter Wemm continue; 1215c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1216c2aa98e2SPeter Wemm *f = toupper(*f); 1217c2aa98e2SPeter Wemm 1218c2aa98e2SPeter Wemm switch (*f) 1219c2aa98e2SPeter Wemm { 1220c2aa98e2SPeter Wemm case 'F': /* address family */ 1221c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 122206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 1223c2aa98e2SPeter Wemm # if NETINET 1224c2aa98e2SPeter Wemm else if (strcasecmp(v, "inet") == 0) 122506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 122606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 122706f25ae9SGregory Neil Shapiro # if NETINET6 122806f25ae9SGregory Neil Shapiro else if (strcasecmp(v, "inet6") == 0) 122906f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 123006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 1231c2aa98e2SPeter Wemm # if NETISO 1232c2aa98e2SPeter Wemm else if (strcasecmp(v, "iso") == 0) 123306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 123406f25ae9SGregory Neil Shapiro # endif /* NETISO */ 1235c2aa98e2SPeter Wemm # if NETNS 1236c2aa98e2SPeter Wemm else if (strcasecmp(v, "ns") == 0) 123706f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 123806f25ae9SGregory Neil Shapiro # endif /* NETNS */ 1239c2aa98e2SPeter Wemm # if NETX25 1240c2aa98e2SPeter Wemm else if (strcasecmp(v, "x.25") == 0) 124106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 124206f25ae9SGregory Neil Shapiro # endif /* NETX25 */ 1243c2aa98e2SPeter Wemm else 124406f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 124506f25ae9SGregory Neil Shapiro v); 1246c2aa98e2SPeter Wemm break; 1247c2aa98e2SPeter Wemm 1248c2aa98e2SPeter Wemm case 'A': /* address */ 1249193538b7SGregory Neil Shapiro addr = v; 1250c2aa98e2SPeter Wemm break; 1251c2aa98e2SPeter Wemm 1252c2aa98e2SPeter Wemm case 'P': /* port */ 1253193538b7SGregory Neil Shapiro port = v; 1254c2aa98e2SPeter Wemm break; 1255c2aa98e2SPeter Wemm 1256c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 125706f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 125806f25ae9SGregory Neil Shapiro break; 125906f25ae9SGregory Neil Shapiro 126006f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 126106f25ae9SGregory Neil Shapiro l = 3 * strlen(v) + 3; 126206f25ae9SGregory Neil Shapiro h = v; 126306f25ae9SGregory Neil Shapiro flags = xalloc(l); 126406f25ae9SGregory Neil Shapiro d->d_mflags = flags; 126506f25ae9SGregory Neil Shapiro for (; *h != '\0'; h++) 126606f25ae9SGregory Neil Shapiro { 126706f25ae9SGregory Neil Shapiro if (!(isascii(*h) && isspace(*h))) 126806f25ae9SGregory Neil Shapiro { 126906f25ae9SGregory Neil Shapiro if (flags != d->d_mflags) 127042e5d165SGregory Neil Shapiro *flags++ = ' '; 127106f25ae9SGregory Neil Shapiro *flags++ = *h; 127206f25ae9SGregory Neil Shapiro if (isupper(*h)) 127306f25ae9SGregory Neil Shapiro *flags++ = *h; 127406f25ae9SGregory Neil Shapiro } 127506f25ae9SGregory Neil Shapiro } 127606f25ae9SGregory Neil Shapiro *flags++ = '\0'; 127706f25ae9SGregory Neil Shapiro for (; *v != '\0'; v++) 127806f25ae9SGregory Neil Shapiro if (!(isascii(*v) && isspace(*v))) 1279193538b7SGregory Neil Shapiro setbitn(bitidx(*v), d->d_flags); 1280c2aa98e2SPeter Wemm break; 1281c2aa98e2SPeter Wemm 1282c2aa98e2SPeter Wemm case 'S': /* send buffer size */ 128306f25ae9SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1284c2aa98e2SPeter Wemm break; 1285c2aa98e2SPeter Wemm 1286c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 128706f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 128806f25ae9SGregory Neil Shapiro break; 128906f25ae9SGregory Neil Shapiro 129006f25ae9SGregory Neil Shapiro case 'N': /* name */ 129106f25ae9SGregory Neil Shapiro d->d_name = v; 1292c2aa98e2SPeter Wemm break; 1293c2aa98e2SPeter Wemm 1294c2aa98e2SPeter Wemm default: 129506f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 129606f25ae9SGregory Neil Shapiro f); 1297c2aa98e2SPeter Wemm } 1298c2aa98e2SPeter Wemm } 1299193538b7SGregory Neil Shapiro 1300193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1301193538b7SGregory Neil Shapiro if (addr != NULL) 1302193538b7SGregory Neil Shapiro { 1303193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1304193538b7SGregory Neil Shapiro { 1305193538b7SGregory Neil Shapiro # if NETINET 1306193538b7SGregory Neil Shapiro case AF_INET: 1307193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 1308193538b7SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) == INADDR_NONE)) 1309193538b7SGregory Neil Shapiro { 1310193538b7SGregory Neil Shapiro register struct hostent *hp; 1311193538b7SGregory Neil Shapiro 1312193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1313193538b7SGregory Neil Shapiro if (hp == NULL) 1314193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1315193538b7SGregory Neil Shapiro addr); 1316193538b7SGregory Neil Shapiro else 1317193538b7SGregory Neil Shapiro { 1318193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1319193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1320193538b7SGregory Neil Shapiro hp->h_addr_list++; 1321193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1322193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1323193538b7SGregory Neil Shapiro addr); 1324193538b7SGregory Neil Shapiro else 1325193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1326193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1327193538b7SGregory Neil Shapiro INADDRSZ); 1328193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 1329193538b7SGregory Neil Shapiro freehostent(hp); 1330193538b7SGregory Neil Shapiro hp = NULL; 1331193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 1332193538b7SGregory Neil Shapiro } 1333193538b7SGregory Neil Shapiro } 1334193538b7SGregory Neil Shapiro break; 1335193538b7SGregory Neil Shapiro # endif /* NETINET */ 1336193538b7SGregory Neil Shapiro 1337193538b7SGregory Neil Shapiro # if NETINET6 1338193538b7SGregory Neil Shapiro case AF_INET6: 1339193538b7SGregory Neil Shapiro if (!isascii(*addr) || 1340193538b7SGregory Neil Shapiro (!isxdigit(*addr) && *addr != ':') || 1341193538b7SGregory Neil Shapiro inet_pton(AF_INET6, addr, 1342193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1343193538b7SGregory Neil Shapiro { 1344193538b7SGregory Neil Shapiro register struct hostent *hp; 1345193538b7SGregory Neil Shapiro 1346193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1347193538b7SGregory Neil Shapiro if (hp == NULL) 1348193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1349193538b7SGregory Neil Shapiro addr); 1350193538b7SGregory Neil Shapiro else 1351193538b7SGregory Neil Shapiro { 1352193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1353193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1354193538b7SGregory Neil Shapiro hp->h_addr_list++; 1355193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1356193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1357193538b7SGregory Neil Shapiro addr); 1358193538b7SGregory Neil Shapiro else 1359193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1360193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1361193538b7SGregory Neil Shapiro IN6ADDRSZ); 1362193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT 1363193538b7SGregory Neil Shapiro freehostent(hp); 1364193538b7SGregory Neil Shapiro hp = NULL; 1365193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT */ 1366193538b7SGregory Neil Shapiro } 1367193538b7SGregory Neil Shapiro } 1368193538b7SGregory Neil Shapiro break; 1369193538b7SGregory Neil Shapiro # endif /* NETINET6 */ 1370193538b7SGregory Neil Shapiro 1371193538b7SGregory Neil Shapiro default: 1372193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1373193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1374193538b7SGregory Neil Shapiro break; 1375193538b7SGregory Neil Shapiro } 1376193538b7SGregory Neil Shapiro } 1377193538b7SGregory Neil Shapiro 1378193538b7SGregory Neil Shapiro if (port != NULL) 1379193538b7SGregory Neil Shapiro { 1380193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1381193538b7SGregory Neil Shapiro { 1382193538b7SGregory Neil Shapiro # if NETINET 1383193538b7SGregory Neil Shapiro case AF_INET: 1384193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 1385193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((u_short)atoi((const char *)port)); 1386193538b7SGregory Neil Shapiro else 1387193538b7SGregory Neil Shapiro { 1388193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1389193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1390193538b7SGregory Neil Shapiro port); 1391193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1392193538b7SGregory Neil Shapiro register struct servent *sp; 1393193538b7SGregory Neil Shapiro 1394193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1395193538b7SGregory Neil Shapiro if (sp == NULL) 1396193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1397193538b7SGregory Neil Shapiro port); 1398193538b7SGregory Neil Shapiro else 1399193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1400193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1401193538b7SGregory Neil Shapiro } 1402193538b7SGregory Neil Shapiro break; 1403193538b7SGregory Neil Shapiro # endif /* NETINET */ 1404193538b7SGregory Neil Shapiro 1405193538b7SGregory Neil Shapiro # if NETINET6 1406193538b7SGregory Neil Shapiro case AF_INET6: 1407193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 1408193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((u_short)atoi(port)); 1409193538b7SGregory Neil Shapiro else 1410193538b7SGregory Neil Shapiro { 1411193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1412193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1413193538b7SGregory Neil Shapiro port); 1414193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1415193538b7SGregory Neil Shapiro register struct servent *sp; 1416193538b7SGregory Neil Shapiro 1417193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1418193538b7SGregory Neil Shapiro if (sp == NULL) 1419193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1420193538b7SGregory Neil Shapiro port); 1421193538b7SGregory Neil Shapiro else 1422193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1423193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1424193538b7SGregory Neil Shapiro } 1425193538b7SGregory Neil Shapiro break; 1426193538b7SGregory Neil Shapiro # endif /* NETINET6 */ 1427193538b7SGregory Neil Shapiro 1428193538b7SGregory Neil Shapiro # if NETISO 1429193538b7SGregory Neil Shapiro case AF_ISO: 1430193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1431193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 1432193538b7SGregory Neil Shapiro portno = htons((u_short)atoi(port)); 1433193538b7SGregory Neil Shapiro else 1434193538b7SGregory Neil Shapiro { 1435193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1436193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1437193538b7SGregory Neil Shapiro port); 1438193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1439193538b7SGregory Neil Shapiro register struct servent *sp; 1440193538b7SGregory Neil Shapiro 1441193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1442193538b7SGregory Neil Shapiro if (sp == NULL) 1443193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1444193538b7SGregory Neil Shapiro port); 1445193538b7SGregory Neil Shapiro else 1446193538b7SGregory Neil Shapiro portno = sp->s_port; 1447193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1448193538b7SGregory Neil Shapiro } 1449193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1450193538b7SGregory Neil Shapiro (char *) &portno, 2); 1451193538b7SGregory Neil Shapiro break; 1452193538b7SGregory Neil Shapiro # endif /* NETISO */ 1453193538b7SGregory Neil Shapiro 1454193538b7SGregory Neil Shapiro default: 1455193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1456193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1457193538b7SGregory Neil Shapiro break; 1458193538b7SGregory Neil Shapiro } 1459193538b7SGregory Neil Shapiro } 1460c2aa98e2SPeter Wemm } 1461c2aa98e2SPeter Wemm /* 146206f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 146306f25ae9SGregory Neil Shapiro ** 146406f25ae9SGregory Neil Shapiro ** Parameters: 146506f25ae9SGregory Neil Shapiro ** p -- the options line. 146606f25ae9SGregory Neil Shapiro ** 146706f25ae9SGregory Neil Shapiro ** Returns: 146806f25ae9SGregory Neil Shapiro ** TRUE if successful, FALSE otherwise. 146906f25ae9SGregory Neil Shapiro */ 147006f25ae9SGregory Neil Shapiro 147106f25ae9SGregory Neil Shapiro bool 147206f25ae9SGregory Neil Shapiro setdaemonoptions(p) 147306f25ae9SGregory Neil Shapiro register char *p; 147406f25ae9SGregory Neil Shapiro { 147506f25ae9SGregory Neil Shapiro if (ndaemons >= MAXDAEMONS) 147606f25ae9SGregory Neil Shapiro return FALSE; 147706f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_socket = -1; 147806f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_listenqueue = 10; 147906f25ae9SGregory Neil Shapiro clrbitmap(Daemons[ndaemons].d_flags); 148006f25ae9SGregory Neil Shapiro setsockaddroptions(p, &Daemons[ndaemons]); 148106f25ae9SGregory Neil Shapiro 148206f25ae9SGregory Neil Shapiro if (Daemons[ndaemons].d_name != NULL) 148306f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_name = newstr(Daemons[ndaemons].d_name); 148406f25ae9SGregory Neil Shapiro else 148506f25ae9SGregory Neil Shapiro { 148606f25ae9SGregory Neil Shapiro char num[30]; 148706f25ae9SGregory Neil Shapiro 148806f25ae9SGregory Neil Shapiro snprintf(num, sizeof num, "Daemon%d", ndaemons); 148906f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_name = newstr(num); 149006f25ae9SGregory Neil Shapiro } 149106f25ae9SGregory Neil Shapiro 149206f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 149306f25ae9SGregory Neil Shapiro { 149406f25ae9SGregory Neil Shapiro dprintf("Daemon %s flags: ", Daemons[ndaemons].d_name); 149506f25ae9SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[ndaemons].d_flags)) 149606f25ae9SGregory Neil Shapiro dprintf("ETRNONLY "); 149706f25ae9SGregory Neil Shapiro if (bitnset(D_NOETRN, Daemons[ndaemons].d_flags)) 149806f25ae9SGregory Neil Shapiro dprintf("NOETRN "); 149906f25ae9SGregory Neil Shapiro dprintf("\n"); 150006f25ae9SGregory Neil Shapiro } 150106f25ae9SGregory Neil Shapiro ++ndaemons; 150206f25ae9SGregory Neil Shapiro return TRUE; 150306f25ae9SGregory Neil Shapiro } 150406f25ae9SGregory Neil Shapiro /* 150506f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 150606f25ae9SGregory Neil Shapiro ** 150706f25ae9SGregory Neil Shapiro ** Parameters: 150806f25ae9SGregory Neil Shapiro ** none 150906f25ae9SGregory Neil Shapiro ** 151006f25ae9SGregory Neil Shapiro ** Returns: 151106f25ae9SGregory Neil Shapiro ** none 151206f25ae9SGregory Neil Shapiro ** 151306f25ae9SGregory Neil Shapiro ** Side Effects: 151406f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 151506f25ae9SGregory Neil Shapiro */ 151606f25ae9SGregory Neil Shapiro void 151706f25ae9SGregory Neil Shapiro initdaemon() 151806f25ae9SGregory Neil Shapiro { 151906f25ae9SGregory Neil Shapiro if (ndaemons == 0) 152006f25ae9SGregory Neil Shapiro { 152106f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_socket = -1; 152206f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_listenqueue = 10; 152306f25ae9SGregory Neil Shapiro Daemons[ndaemons].d_name = "Daemon0"; 152406f25ae9SGregory Neil Shapiro ndaemons = 1; 152506f25ae9SGregory Neil Shapiro } 152606f25ae9SGregory Neil Shapiro } 152706f25ae9SGregory Neil Shapiro /* 152806f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 152906f25ae9SGregory Neil Shapiro ** 153006f25ae9SGregory Neil Shapiro ** Parameters: 153106f25ae9SGregory Neil Shapiro ** p -- the options line. 153206f25ae9SGregory Neil Shapiro ** 153306f25ae9SGregory Neil Shapiro ** Returns: 153406f25ae9SGregory Neil Shapiro ** none. 153506f25ae9SGregory Neil Shapiro */ 153606f25ae9SGregory Neil Shapiro 153706f25ae9SGregory Neil Shapiro static SOCKADDR ClientAddr; /* address for client */ 153806f25ae9SGregory Neil Shapiro 153906f25ae9SGregory Neil Shapiro void 154006f25ae9SGregory Neil Shapiro setclientoptions(p) 154106f25ae9SGregory Neil Shapiro register char *p; 154206f25ae9SGregory Neil Shapiro { 154306f25ae9SGregory Neil Shapiro struct daemon d; 154406f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 154506f25ae9SGregory Neil Shapiro 154606f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 154706f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 154806f25ae9SGregory Neil Shapiro 154906f25ae9SGregory Neil Shapiro /* grab what we need */ 155006f25ae9SGregory Neil Shapiro memcpy(&ClientAddr, &d.d_addr, sizeof ClientAddr); 155106f25ae9SGregory Neil Shapiro TcpSndBufferSize = d.d_tcpsndbufsize; 155206f25ae9SGregory Neil Shapiro TcpRcvBufferSize = d.d_tcprcvbufsize; 155306f25ae9SGregory Neil Shapiro if (d.d_mflags != NULL) 155406f25ae9SGregory Neil Shapiro define(macid("{client_flags}", NULL), d.d_mflags, 155506f25ae9SGregory Neil Shapiro &BlankEnvelope); 155606f25ae9SGregory Neil Shapiro else 155706f25ae9SGregory Neil Shapiro define(macid("{client_flags}", NULL), "", &BlankEnvelope); 155806f25ae9SGregory Neil Shapiro } 155906f25ae9SGregory Neil Shapiro /* 156006f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 156106f25ae9SGregory Neil Shapiro ** 156206f25ae9SGregory Neil Shapiro ** Parameters: 156306f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 156406f25ae9SGregory Neil Shapiro ** 156506f25ae9SGregory Neil Shapiro ** Returns: 156606f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 156706f25ae9SGregory Neil Shapiro ** 156806f25ae9SGregory Neil Shapiro ** Side Effects: 156906f25ae9SGregory Neil Shapiro ** none. 157006f25ae9SGregory Neil Shapiro */ 157106f25ae9SGregory Neil Shapiro 157206f25ae9SGregory Neil Shapiro static int 157306f25ae9SGregory Neil Shapiro addr_family(addr) 157406f25ae9SGregory Neil Shapiro char *addr; 157506f25ae9SGregory Neil Shapiro { 157606f25ae9SGregory Neil Shapiro # if NETINET6 157706f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 157806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 157906f25ae9SGregory Neil Shapiro 158006f25ae9SGregory Neil Shapiro # if NETINET 158106f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 158206f25ae9SGregory Neil Shapiro { 158306f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 158406f25ae9SGregory Neil Shapiro printf("addr_family(%s): INET\n", addr); 158506f25ae9SGregory Neil Shapiro return AF_INET; 158606f25ae9SGregory Neil Shapiro } 158706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 158806f25ae9SGregory Neil Shapiro # if NETINET6 158906f25ae9SGregory Neil Shapiro if (inet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 159006f25ae9SGregory Neil Shapiro { 159106f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 159206f25ae9SGregory Neil Shapiro printf("addr_family(%s): INET6\n", addr); 159306f25ae9SGregory Neil Shapiro return AF_INET6; 159406f25ae9SGregory Neil Shapiro } 159506f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 159606f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 159706f25ae9SGregory Neil Shapiro printf("addr_family(%s): UNSPEC\n", addr); 159806f25ae9SGregory Neil Shapiro return AF_UNSPEC; 159906f25ae9SGregory Neil Shapiro } 160006f25ae9SGregory Neil Shapiro /* 160106f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 1602c2aa98e2SPeter Wemm ** 1603c2aa98e2SPeter Wemm ** Parameters: 1604c2aa98e2SPeter Wemm ** host -- the name of the host. 1605c2aa98e2SPeter Wemm ** port -- the port number to connect to. 1606c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 1607c2aa98e2SPeter Wemm ** structure to be filled in. 1608c2aa98e2SPeter Wemm ** e -- the current envelope. 1609c2aa98e2SPeter Wemm ** 1610c2aa98e2SPeter Wemm ** Returns: 1611c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 1612c2aa98e2SPeter Wemm ** made and if not why not. 1613c2aa98e2SPeter Wemm ** 1614c2aa98e2SPeter Wemm ** Side Effects: 1615c2aa98e2SPeter Wemm ** none. 1616c2aa98e2SPeter Wemm */ 1617c2aa98e2SPeter Wemm 1618c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 1619c2aa98e2SPeter Wemm 1620c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 1621c2aa98e2SPeter Wemm 1622c2aa98e2SPeter Wemm int 1623c2aa98e2SPeter Wemm makeconnection(host, port, mci, e) 1624c2aa98e2SPeter Wemm char *host; 162506f25ae9SGregory Neil Shapiro volatile u_int port; 1626c2aa98e2SPeter Wemm register MCI *mci; 1627c2aa98e2SPeter Wemm ENVELOPE *e; 1628c2aa98e2SPeter Wemm { 1629c2aa98e2SPeter Wemm register volatile int addrno = 0; 1630c2aa98e2SPeter Wemm register volatile int s; 1631c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *)NULL; 1632c2aa98e2SPeter Wemm SOCKADDR addr; 163306f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 163406f25ae9SGregory Neil Shapiro int save_errno = 0; 163506f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 1636c2aa98e2SPeter Wemm volatile bool firstconnect; 1637c2aa98e2SPeter Wemm EVENT *volatile ev = NULL; 163806f25ae9SGregory Neil Shapiro # if NETINET6 163906f25ae9SGregory Neil Shapiro volatile bool v6found = FALSE; 164006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 164106f25ae9SGregory Neil Shapiro volatile int family = InetMode; 164206f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 164306f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 164406f25ae9SGregory Neil Shapiro volatile bool clt_bind; 164506f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 164606f25ae9SGregory Neil Shapiro char *p; 164706f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 164806f25ae9SGregory Neil Shapiro 164906f25ae9SGregory Neil Shapiro /* retranslate ${daemon_flags} into bitmap */ 165006f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 165106f25ae9SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}", NULL), e)) != NULL) 165206f25ae9SGregory Neil Shapiro { 165306f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 165406f25ae9SGregory Neil Shapiro { 165506f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 1656193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 165706f25ae9SGregory Neil Shapiro } 165806f25ae9SGregory Neil Shapiro } 165906f25ae9SGregory Neil Shapiro 166006f25ae9SGregory Neil Shapiro /* "add" ${client_flags} to bitmap */ 166106f25ae9SGregory Neil Shapiro if ((p = macvalue(macid("{client_flags}", NULL), e)) != NULL) 166206f25ae9SGregory Neil Shapiro { 166306f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 166406f25ae9SGregory Neil Shapiro { 166506f25ae9SGregory Neil Shapiro /* look for just this one flag */ 166606f25ae9SGregory Neil Shapiro if (*p == D_IFNHELO) 166706f25ae9SGregory Neil Shapiro { 1668193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 166906f25ae9SGregory Neil Shapiro break; 167006f25ae9SGregory Neil Shapiro } 167106f25ae9SGregory Neil Shapiro } 167206f25ae9SGregory Neil Shapiro } 167306f25ae9SGregory Neil Shapiro 167406f25ae9SGregory Neil Shapiro # if NETINET6 167506f25ae9SGregory Neil Shapiro v4retry: 167606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 167706f25ae9SGregory Neil Shapiro clt_bind = FALSE; 167806f25ae9SGregory Neil Shapiro 167906f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 168006f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 1681602a2b1bSGregory Neil Shapiro (p = macvalue(macid("{if_addr}", NULL), e)) != NULL && 1682602a2b1bSGregory Neil Shapiro *p != '\0') 168306f25ae9SGregory Neil Shapiro { 168406f25ae9SGregory Neil Shapiro # if NETINET6 168506f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 168606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 168706f25ae9SGregory Neil Shapiro 168806f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 168906f25ae9SGregory Neil Shapiro 169006f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 169106f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 169206f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 169306f25ae9SGregory Neil Shapiro { 169406f25ae9SGregory Neil Shapiro # if NETINET 169506f25ae9SGregory Neil Shapiro case AF_INET: 1696602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 1697602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 1698602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 169906f25ae9SGregory Neil Shapiro { 170006f25ae9SGregory Neil Shapiro clt_bind = TRUE; 170106f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 170206f25ae9SGregory Neil Shapiro } 170306f25ae9SGregory Neil Shapiro break; 170406f25ae9SGregory Neil Shapiro # endif /* NETINET */ 170506f25ae9SGregory Neil Shapiro 170606f25ae9SGregory Neil Shapiro # if NETINET6 170706f25ae9SGregory Neil Shapiro case AF_INET6: 170806f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 170906f25ae9SGregory Neil Shapiro snprintf(p6, sizeof p6, "::ffff:%s", p); 171006f25ae9SGregory Neil Shapiro else 171106f25ae9SGregory Neil Shapiro strlcpy(p6, p, sizeof p6); 171206f25ae9SGregory Neil Shapiro if (inet_pton(AF_INET6, p6, 1713602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 1714602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 171506f25ae9SGregory Neil Shapiro { 171606f25ae9SGregory Neil Shapiro clt_bind = TRUE; 171706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 171806f25ae9SGregory Neil Shapiro } 171906f25ae9SGregory Neil Shapiro break; 172006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 172106f25ae9SGregory Neil Shapiro 172206f25ae9SGregory Neil Shapiro # if 0 172306f25ae9SGregory Neil Shapiro default: 172406f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 172506f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 172606f25ae9SGregory Neil Shapiro break; 172706f25ae9SGregory Neil Shapiro # endif /* 0 */ 172806f25ae9SGregory Neil Shapiro } 172906f25ae9SGregory Neil Shapiro if (clt_bind) 173006f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 173106f25ae9SGregory Neil Shapiro } 173206f25ae9SGregory Neil Shapiro else 173306f25ae9SGregory Neil Shapiro { 173406f25ae9SGregory Neil Shapiro STRUCTCOPY(ClientAddr, clt_addr); 173506f25ae9SGregory Neil Shapiro if (clt_addr.sa.sa_family == AF_UNSPEC) 17368774250cSGregory Neil Shapiro clt_addr.sa.sa_family = family; 173706f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 173806f25ae9SGregory Neil Shapiro { 173906f25ae9SGregory Neil Shapiro # if NETINET 174006f25ae9SGregory Neil Shapiro case AF_INET: 174106f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 174206f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 174306f25ae9SGregory Neil Shapiro else 174406f25ae9SGregory Neil Shapiro clt_bind = TRUE; 174506f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 174606f25ae9SGregory Neil Shapiro clt_bind = TRUE; 174706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 174806f25ae9SGregory Neil Shapiro break; 174906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 175006f25ae9SGregory Neil Shapiro # if NETINET6 175106f25ae9SGregory Neil Shapiro case AF_INET6: 175206f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 175306f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 175406f25ae9SGregory Neil Shapiro else 175506f25ae9SGregory Neil Shapiro clt_bind = TRUE; 175606f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 175706f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 175806f25ae9SGregory Neil Shapiro clt_bind = TRUE; 175906f25ae9SGregory Neil Shapiro break; 176006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 176106f25ae9SGregory Neil Shapiro # if NETISO 176206f25ae9SGregory Neil Shapiro case AF_ISO: 176306f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 176406f25ae9SGregory Neil Shapiro clt_bind = TRUE; 176506f25ae9SGregory Neil Shapiro break; 176606f25ae9SGregory Neil Shapiro # endif /* NETISO */ 176706f25ae9SGregory Neil Shapiro default: 176806f25ae9SGregory Neil Shapiro break; 176906f25ae9SGregory Neil Shapiro } 177006f25ae9SGregory Neil Shapiro } 1771c2aa98e2SPeter Wemm 1772c2aa98e2SPeter Wemm /* 1773c2aa98e2SPeter Wemm ** Set up the address for the mailer. 1774c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 1775c2aa98e2SPeter Wemm */ 1776c2aa98e2SPeter Wemm 1777c2aa98e2SPeter Wemm # if NAMED_BIND 1778602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 177906f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 1780c2aa98e2SPeter Wemm errno = 0; 178106f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 178206f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 1783c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 1784c2aa98e2SPeter Wemm CurHostName = host; 1785c2aa98e2SPeter Wemm 1786c2aa98e2SPeter Wemm if (host[0] == '[') 1787c2aa98e2SPeter Wemm { 178806f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 1789c2aa98e2SPeter Wemm if (p != NULL) 1790c2aa98e2SPeter Wemm { 1791c2aa98e2SPeter Wemm # if NETINET 179206f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 179306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 179406f25ae9SGregory Neil Shapiro # if NETINET6 179506f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 179606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 179706f25ae9SGregory Neil Shapiro 179806f25ae9SGregory Neil Shapiro *p = '\0'; 179906f25ae9SGregory Neil Shapiro # if NETINET6 180006f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 180106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 180206f25ae9SGregory Neil Shapiro # if NETINET 180306f25ae9SGregory Neil Shapiro if (family == AF_INET && 180406f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 180506f25ae9SGregory Neil Shapiro { 180606f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 180706f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 180806f25ae9SGregory Neil Shapiro } 180906f25ae9SGregory Neil Shapiro else 181006f25ae9SGregory Neil Shapiro # endif /* NETINET */ 181106f25ae9SGregory Neil Shapiro # if NETINET6 181206f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 181306f25ae9SGregory Neil Shapiro inet_pton(AF_INET6, &host[1], 181406f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 181506f25ae9SGregory Neil Shapiro { 181606f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 181706f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 181806f25ae9SGregory Neil Shapiro } 181906f25ae9SGregory Neil Shapiro else 182006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 1821c2aa98e2SPeter Wemm { 1822c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 182306f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 1824c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 1825c2aa98e2SPeter Wemm { 1826c2aa98e2SPeter Wemm # if NAMED_BIND 1827c2aa98e2SPeter Wemm int oldopts = _res.options; 1828c2aa98e2SPeter Wemm 1829c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 183006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 1831c2aa98e2SPeter Wemm p[-1] = '\0'; 183206f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 183306f25ae9SGregory Neil Shapiro family); 1834c2aa98e2SPeter Wemm p[-1] = '.'; 1835c2aa98e2SPeter Wemm # if NAMED_BIND 1836c2aa98e2SPeter Wemm _res.options = oldopts; 183706f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 1838c2aa98e2SPeter Wemm } 1839c2aa98e2SPeter Wemm *p = ']'; 1840c2aa98e2SPeter Wemm goto gothostent; 1841c2aa98e2SPeter Wemm } 1842c2aa98e2SPeter Wemm *p = ']'; 1843c2aa98e2SPeter Wemm } 1844c2aa98e2SPeter Wemm if (p == NULL) 1845c2aa98e2SPeter Wemm { 1846c2aa98e2SPeter Wemm extern char MsgBuf[]; 1847c2aa98e2SPeter Wemm 184806f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 184906f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 185006f25ae9SGregory Neil Shapiro host); 1851c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 185206f25ae9SGregory Neil Shapiro errno = EINVAL; 1853c2aa98e2SPeter Wemm return EX_NOHOST; 1854c2aa98e2SPeter Wemm } 1855c2aa98e2SPeter Wemm } 1856c2aa98e2SPeter Wemm else 1857c2aa98e2SPeter Wemm { 1858c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 1859c2aa98e2SPeter Wemm { 186006f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 186106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 1862c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 1863c2aa98e2SPeter Wemm { 1864c2aa98e2SPeter Wemm # if NAMED_BIND 1865c2aa98e2SPeter Wemm int oldopts = _res.options; 1866c2aa98e2SPeter Wemm 1867c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 186806f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 1869c2aa98e2SPeter Wemm *p = '\0'; 187006f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 1871c2aa98e2SPeter Wemm *p = '.'; 1872c2aa98e2SPeter Wemm # if NAMED_BIND 1873c2aa98e2SPeter Wemm _res.options = oldopts; 187406f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 1875c2aa98e2SPeter Wemm } 1876c2aa98e2SPeter Wemm } 1877c2aa98e2SPeter Wemm gothostent: 1878c2aa98e2SPeter Wemm if (hp == NULL) 1879c2aa98e2SPeter Wemm { 1880c2aa98e2SPeter Wemm # if NAMED_BIND 1881c2aa98e2SPeter Wemm /* check for name server timeouts */ 1882c2aa98e2SPeter Wemm if (errno == ETIMEDOUT || h_errno == TRY_AGAIN || 1883c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 1884c2aa98e2SPeter Wemm { 188506f25ae9SGregory Neil Shapiro save_errno = errno; 1886c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.3", NULL); 188706f25ae9SGregory Neil Shapiro errno = save_errno; 1888c2aa98e2SPeter Wemm return EX_TEMPFAIL; 1889c2aa98e2SPeter Wemm } 189006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 189106f25ae9SGregory Neil Shapiro # if NETINET6 189206f25ae9SGregory Neil Shapiro /* 189306f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 189406f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 189506f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 189606f25ae9SGregory Neil Shapiro */ 189706f25ae9SGregory Neil Shapiro 189806f25ae9SGregory Neil Shapiro if (family == AF_INET6) 189906f25ae9SGregory Neil Shapiro { 190006f25ae9SGregory Neil Shapiro family = AF_INET; 190106f25ae9SGregory Neil Shapiro goto v4retry; 190206f25ae9SGregory Neil Shapiro } 190306f25ae9SGregory Neil Shapiro if (v6found) 190406f25ae9SGregory Neil Shapiro goto v6tempfail; 190506f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 190606f25ae9SGregory Neil Shapiro save_errno = errno; 1907c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 190806f25ae9SGregory Neil Shapiro errno = save_errno; 190906f25ae9SGregory Neil Shapiro return EX_NOHOST; 1910c2aa98e2SPeter Wemm } 1911c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 1912c2aa98e2SPeter Wemm switch (hp->h_addrtype) 1913c2aa98e2SPeter Wemm { 1914c2aa98e2SPeter Wemm # if NETINET 1915c2aa98e2SPeter Wemm case AF_INET: 191606f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 191706f25ae9SGregory Neil Shapiro hp->h_addr, 1918c2aa98e2SPeter Wemm INADDRSZ); 1919c2aa98e2SPeter Wemm break; 192006f25ae9SGregory Neil Shapiro # endif /* NETINET */ 192106f25ae9SGregory Neil Shapiro 192206f25ae9SGregory Neil Shapiro # if NETINET6 192306f25ae9SGregory Neil Shapiro case AF_INET6: 192406f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 192506f25ae9SGregory Neil Shapiro hp->h_addr, 192606f25ae9SGregory Neil Shapiro IN6ADDRSZ); 192706f25ae9SGregory Neil Shapiro break; 192806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 1929c2aa98e2SPeter Wemm 1930c2aa98e2SPeter Wemm default: 1931c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 1932c2aa98e2SPeter Wemm { 1933c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 1934c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 1935c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 193606f25ae9SGregory Neil Shapiro errno = EINVAL; 1937c2aa98e2SPeter Wemm return EX_NOHOST; 1938c2aa98e2SPeter Wemm } 193906f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 194006f25ae9SGregory Neil Shapiro hp->h_addr, 1941c2aa98e2SPeter Wemm hp->h_length); 1942c2aa98e2SPeter Wemm break; 1943c2aa98e2SPeter Wemm } 1944c2aa98e2SPeter Wemm addrno = 1; 1945c2aa98e2SPeter Wemm } 1946c2aa98e2SPeter Wemm 1947c2aa98e2SPeter Wemm /* 1948c2aa98e2SPeter Wemm ** Determine the port number. 1949c2aa98e2SPeter Wemm */ 1950c2aa98e2SPeter Wemm 1951c2aa98e2SPeter Wemm if (port == 0) 1952c2aa98e2SPeter Wemm { 195306f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 195406f25ae9SGregory Neil Shapiro port = htons(25); 195506f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1956c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 1957c2aa98e2SPeter Wemm 1958c2aa98e2SPeter Wemm if (sp == NULL) 1959c2aa98e2SPeter Wemm { 1960c2aa98e2SPeter Wemm if (LogLevel > 2) 1961c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 1962c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 1963c2aa98e2SPeter Wemm port = htons(25); 1964c2aa98e2SPeter Wemm } 1965c2aa98e2SPeter Wemm else 1966c2aa98e2SPeter Wemm port = sp->s_port; 196706f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1968c2aa98e2SPeter Wemm } 1969c2aa98e2SPeter Wemm 1970c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 1971c2aa98e2SPeter Wemm { 1972c2aa98e2SPeter Wemm # if NETINET 1973c2aa98e2SPeter Wemm case AF_INET: 1974c2aa98e2SPeter Wemm addr.sin.sin_port = port; 1975c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 1976c2aa98e2SPeter Wemm break; 197706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 197806f25ae9SGregory Neil Shapiro 197906f25ae9SGregory Neil Shapiro # if NETINET6 198006f25ae9SGregory Neil Shapiro case AF_INET6: 198106f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 198206f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 198306f25ae9SGregory Neil Shapiro break; 198406f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 1985c2aa98e2SPeter Wemm 1986c2aa98e2SPeter Wemm # if NETISO 1987c2aa98e2SPeter Wemm case AF_ISO: 1988c2aa98e2SPeter Wemm /* assume two byte transport selector */ 198906f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 1990c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 1991c2aa98e2SPeter Wemm break; 199206f25ae9SGregory Neil Shapiro # endif /* NETISO */ 1993c2aa98e2SPeter Wemm 1994c2aa98e2SPeter Wemm default: 1995c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 1996c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 199706f25ae9SGregory Neil Shapiro errno = EINVAL; 1998193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 1999193538b7SGregory Neil Shapiro if (hp != NULL) 2000193538b7SGregory Neil Shapiro freehostent(hp); 2001193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 200206f25ae9SGregory Neil Shapiro return EX_NOHOST; 2003c2aa98e2SPeter Wemm } 2004c2aa98e2SPeter Wemm 2005c2aa98e2SPeter Wemm /* 2006c2aa98e2SPeter Wemm ** Try to actually open the connection. 2007c2aa98e2SPeter Wemm */ 2008c2aa98e2SPeter Wemm 2009c2aa98e2SPeter Wemm # ifdef XLA 2010c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2011c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2012193538b7SGregory Neil Shapiro { 2013193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2014193538b7SGregory Neil Shapiro if (hp != NULL) 2015193538b7SGregory Neil Shapiro freehostent(hp); 2016193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 2017c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2018193538b7SGregory Neil Shapiro } 201906f25ae9SGregory Neil Shapiro # endif /* XLA */ 2020c2aa98e2SPeter Wemm 2021c2aa98e2SPeter Wemm firstconnect = TRUE; 2022c2aa98e2SPeter Wemm for (;;) 2023c2aa98e2SPeter Wemm { 2024c2aa98e2SPeter Wemm if (tTd(16, 1)) 20258774250cSGregory Neil Shapiro dprintf("makeconnection (%s [%s].%d (%d))\n", 20268774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 20278774250cSGregory Neil Shapiro addr.sa.sa_family); 2028c2aa98e2SPeter Wemm 2029c2aa98e2SPeter Wemm /* save for logging */ 2030c2aa98e2SPeter Wemm CurHostAddr = addr; 2031c2aa98e2SPeter Wemm 2032c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2033c2aa98e2SPeter Wemm { 2034c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2035c2aa98e2SPeter Wemm 2036c2aa98e2SPeter Wemm s = rresvport(&rport); 2037c2aa98e2SPeter Wemm } 2038c2aa98e2SPeter Wemm else 2039c2aa98e2SPeter Wemm { 20408774250cSGregory Neil Shapiro s = socket(clt_addr.sa.sa_family, SOCK_STREAM, 0); 2041c2aa98e2SPeter Wemm } 2042c2aa98e2SPeter Wemm if (s < 0) 2043c2aa98e2SPeter Wemm { 204406f25ae9SGregory Neil Shapiro save_errno = errno; 2045c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 2046c2aa98e2SPeter Wemm # ifdef XLA 2047c2aa98e2SPeter Wemm xla_host_end(host); 204806f25ae9SGregory Neil Shapiro # endif /* XLA */ 2049c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 2050193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2051193538b7SGregory Neil Shapiro if (hp != NULL) 2052193538b7SGregory Neil Shapiro freehostent(hp); 2053193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 205406f25ae9SGregory Neil Shapiro errno = save_errno; 2055c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2056c2aa98e2SPeter Wemm } 2057c2aa98e2SPeter Wemm 2058c2aa98e2SPeter Wemm # ifdef SO_SNDBUF 2059c2aa98e2SPeter Wemm if (TcpSndBufferSize > 0) 2060c2aa98e2SPeter Wemm { 2061c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 2062c2aa98e2SPeter Wemm (char *) &TcpSndBufferSize, 2063c2aa98e2SPeter Wemm sizeof(TcpSndBufferSize)) < 0) 2064c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2065c2aa98e2SPeter Wemm } 206606f25ae9SGregory Neil Shapiro # endif /* SO_SNDBUF */ 206706f25ae9SGregory Neil Shapiro # ifdef SO_RCVBUF 206806f25ae9SGregory Neil Shapiro if (TcpRcvBufferSize > 0) 206906f25ae9SGregory Neil Shapiro { 207006f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 207106f25ae9SGregory Neil Shapiro (char *) &TcpRcvBufferSize, 207206f25ae9SGregory Neil Shapiro sizeof(TcpRcvBufferSize)) < 0) 207306f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 207406f25ae9SGregory Neil Shapiro } 207506f25ae9SGregory Neil Shapiro # endif /* SO_RCVBUF */ 207606f25ae9SGregory Neil Shapiro 2077c2aa98e2SPeter Wemm 2078c2aa98e2SPeter Wemm if (tTd(16, 1)) 207906f25ae9SGregory Neil Shapiro dprintf("makeconnection: fd=%d\n", s); 2080c2aa98e2SPeter Wemm 2081c2aa98e2SPeter Wemm /* turn on network debugging? */ 2082c2aa98e2SPeter Wemm if (tTd(16, 101)) 2083c2aa98e2SPeter Wemm { 2084c2aa98e2SPeter Wemm int on = 1; 208506f25ae9SGregory Neil Shapiro 2086c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2087c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2088c2aa98e2SPeter Wemm } 2089c2aa98e2SPeter Wemm if (e->e_xfp != NULL) 2090c2aa98e2SPeter Wemm (void) fflush(e->e_xfp); /* for debugging */ 2091c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2092c2aa98e2SPeter Wemm 209306f25ae9SGregory Neil Shapiro if (clt_bind) 209406f25ae9SGregory Neil Shapiro { 209506f25ae9SGregory Neil Shapiro int on = 1; 209606f25ae9SGregory Neil Shapiro 209706f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 209806f25ae9SGregory Neil Shapiro { 209906f25ae9SGregory Neil Shapiro # if NETINET 210006f25ae9SGregory Neil Shapiro case AF_INET: 210106f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 210206f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 210306f25ae9SGregory Neil Shapiro SO_REUSEADDR, 210406f25ae9SGregory Neil Shapiro (char *) &on, 210506f25ae9SGregory Neil Shapiro sizeof on); 210606f25ae9SGregory Neil Shapiro break; 210706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 210806f25ae9SGregory Neil Shapiro 210906f25ae9SGregory Neil Shapiro # if NETINET6 211006f25ae9SGregory Neil Shapiro case AF_INET6: 211106f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 211206f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 211306f25ae9SGregory Neil Shapiro SO_REUSEADDR, 211406f25ae9SGregory Neil Shapiro (char *) &on, 211506f25ae9SGregory Neil Shapiro sizeof on); 211606f25ae9SGregory Neil Shapiro break; 211706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 211806f25ae9SGregory Neil Shapiro } 211906f25ae9SGregory Neil Shapiro 212006f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 212106f25ae9SGregory Neil Shapiro { 212206f25ae9SGregory Neil Shapiro save_errno = errno; 212306f25ae9SGregory Neil Shapiro (void) close(s); 212406f25ae9SGregory Neil Shapiro errno = save_errno; 212506f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 212606f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 2127193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2128193538b7SGregory Neil Shapiro if (hp != NULL) 2129193538b7SGregory Neil Shapiro freehostent(hp); 2130193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 213106f25ae9SGregory Neil Shapiro errno = save_errno; 213206f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 213306f25ae9SGregory Neil Shapiro } 213406f25ae9SGregory Neil Shapiro } 213506f25ae9SGregory Neil Shapiro 2136c2aa98e2SPeter Wemm /* 2137c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2138c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2139c2aa98e2SPeter Wemm */ 2140c2aa98e2SPeter Wemm 2141c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2142c2aa98e2SPeter Wemm { 2143c2aa98e2SPeter Wemm int i; 2144c2aa98e2SPeter Wemm 2145c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 21468774250cSGregory Neil Shapiro ev = setevent(TimeOuts.to_iconnect, 21478774250cSGregory Neil Shapiro connecttimeout, 0); 2148c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 21498774250cSGregory Neil Shapiro ev = setevent(TimeOuts.to_connect, 21508774250cSGregory Neil Shapiro connecttimeout, 0); 2151c2aa98e2SPeter Wemm else 2152c2aa98e2SPeter Wemm ev = NULL; 2153c2aa98e2SPeter Wemm 215406f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 215506f25ae9SGregory Neil Shapiro { 215606f25ae9SGregory Neil Shapiro # if NETINET 215706f25ae9SGregory Neil Shapiro case AF_INET: 215806f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 215906f25ae9SGregory Neil Shapiro break; 216006f25ae9SGregory Neil Shapiro # endif /* NETINET */ 216106f25ae9SGregory Neil Shapiro 216206f25ae9SGregory Neil Shapiro # if NETINET6 216306f25ae9SGregory Neil Shapiro case AF_INET6: 216406f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 216506f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 216606f25ae9SGregory Neil Shapiro IN6ADDRSZ); 216706f25ae9SGregory Neil Shapiro break; 216806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 216906f25ae9SGregory Neil Shapiro } 2170c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 217106f25ae9SGregory Neil Shapiro save_errno = errno; 2172c2aa98e2SPeter Wemm if (ev != NULL) 2173c2aa98e2SPeter Wemm clrevent(ev); 2174c2aa98e2SPeter Wemm if (i >= 0) 2175c2aa98e2SPeter Wemm break; 2176c2aa98e2SPeter Wemm } 2177c2aa98e2SPeter Wemm else 217806f25ae9SGregory Neil Shapiro save_errno = errno; 2179c2aa98e2SPeter Wemm 2180c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 2181c2aa98e2SPeter Wemm if (DialDelay > 0 && firstconnect) 2182c2aa98e2SPeter Wemm { 2183c2aa98e2SPeter Wemm if (tTd(16, 1)) 218406f25ae9SGregory Neil Shapiro dprintf("Connect failed (%s); trying again...\n", 218506f25ae9SGregory Neil Shapiro errstring(save_errno)); 2186c2aa98e2SPeter Wemm firstconnect = FALSE; 218706f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2188c2aa98e2SPeter Wemm continue; 2189c2aa98e2SPeter Wemm } 2190c2aa98e2SPeter Wemm 2191c2aa98e2SPeter Wemm /* couldn't connect.... figure out why */ 2192c2aa98e2SPeter Wemm (void) close(s); 2193c2aa98e2SPeter Wemm 2194c2aa98e2SPeter Wemm if (LogLevel >= 14) 2195c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2196c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2197c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 219806f25ae9SGregory Neil Shapiro errstring(save_errno)); 2199c2aa98e2SPeter Wemm 2200c2aa98e2SPeter Wemm if (hp != NULL && hp->h_addr_list[addrno] != NULL) 2201c2aa98e2SPeter Wemm { 2202c2aa98e2SPeter Wemm if (tTd(16, 1)) 220306f25ae9SGregory Neil Shapiro dprintf("Connect failed (%s); trying new address....\n", 220406f25ae9SGregory Neil Shapiro errstring(save_errno)); 2205c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2206c2aa98e2SPeter Wemm { 2207c2aa98e2SPeter Wemm # if NETINET 2208c2aa98e2SPeter Wemm case AF_INET: 220906f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 221006f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2211c2aa98e2SPeter Wemm INADDRSZ); 2212c2aa98e2SPeter Wemm break; 221306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 221406f25ae9SGregory Neil Shapiro 221506f25ae9SGregory Neil Shapiro # if NETINET6 221606f25ae9SGregory Neil Shapiro case AF_INET6: 221706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 221806f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 221906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 222006f25ae9SGregory Neil Shapiro break; 222106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 2222c2aa98e2SPeter Wemm 2223c2aa98e2SPeter Wemm default: 222406f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 222506f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2226c2aa98e2SPeter Wemm hp->h_length); 2227c2aa98e2SPeter Wemm break; 2228c2aa98e2SPeter Wemm } 2229c2aa98e2SPeter Wemm continue; 2230c2aa98e2SPeter Wemm } 223106f25ae9SGregory Neil Shapiro errno = save_errno; 2232c2aa98e2SPeter Wemm 223306f25ae9SGregory Neil Shapiro # if NETINET6 223406f25ae9SGregory Neil Shapiro if (family == AF_INET6) 223506f25ae9SGregory Neil Shapiro { 223606f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 223706f25ae9SGregory Neil Shapiro dprintf("Connect failed (%s); retrying with AF_INET....\n", 223806f25ae9SGregory Neil Shapiro errstring(save_errno)); 223906f25ae9SGregory Neil Shapiro v6found = TRUE; 224006f25ae9SGregory Neil Shapiro family = AF_INET; 2241193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT 2242193538b7SGregory Neil Shapiro if (hp != NULL) 2243193538b7SGregory Neil Shapiro { 2244193538b7SGregory Neil Shapiro freehostent(hp); 2245193538b7SGregory Neil Shapiro hp = NULL; 2246193538b7SGregory Neil Shapiro } 2247193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT */ 224806f25ae9SGregory Neil Shapiro goto v4retry; 224906f25ae9SGregory Neil Shapiro } 225006f25ae9SGregory Neil Shapiro v6tempfail: 225106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 2252c2aa98e2SPeter Wemm /* couldn't open connection */ 225306f25ae9SGregory Neil Shapiro # if NETINET6 225406f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 225506f25ae9SGregory Neil Shapiro if (errno > 0) 225606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 225706f25ae9SGregory Neil Shapiro save_errno = errno; 225806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 225906f25ae9SGregory Neil Shapiro dprintf("Connect failed (%s)\n", errstring(save_errno)); 2260c2aa98e2SPeter Wemm # ifdef XLA 2261c2aa98e2SPeter Wemm xla_host_end(host); 226206f25ae9SGregory Neil Shapiro # endif /* XLA */ 2263c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 2264193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2265193538b7SGregory Neil Shapiro if (hp != NULL) 2266193538b7SGregory Neil Shapiro freehostent(hp); 2267193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 226806f25ae9SGregory Neil Shapiro errno = save_errno; 2269c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2270c2aa98e2SPeter Wemm } 2271c2aa98e2SPeter Wemm 2272193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2273193538b7SGregory Neil Shapiro if (hp != NULL) 2274193538b7SGregory Neil Shapiro { 2275193538b7SGregory Neil Shapiro freehostent(hp); 2276193538b7SGregory Neil Shapiro hp = NULL; 2277193538b7SGregory Neil Shapiro } 2278193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 2279193538b7SGregory Neil Shapiro 2280c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 228106f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 2282c2aa98e2SPeter Wemm if ((mci->mci_out = fdopen(s, "w")) == NULL || 2283c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 2284c2aa98e2SPeter Wemm (mci->mci_in = fdopen(s, "r")) == NULL) 2285c2aa98e2SPeter Wemm { 228606f25ae9SGregory Neil Shapiro save_errno = errno; 2287c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2288c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 228906f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 229006f25ae9SGregory Neil Shapiro (void) fclose(mci->mci_out); 229106f25ae9SGregory Neil Shapiro (void) close(s); 229206f25ae9SGregory Neil Shapiro errno = save_errno; 229306f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 229406f25ae9SGregory Neil Shapiro } 229506f25ae9SGregory Neil Shapiro 229606f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 229706f25ae9SGregory Neil Shapiro len = sizeof addr; 229806f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 229906f25ae9SGregory Neil Shapiro { 230006f25ae9SGregory Neil Shapiro char *name; 230106f25ae9SGregory Neil Shapiro char *p; 230206f25ae9SGregory Neil Shapiro 230306f25ae9SGregory Neil Shapiro define(macid("{if_addr}", NULL), newstr(anynet_ntoa(&addr)), 230406f25ae9SGregory Neil Shapiro &BlankEnvelope); 230506f25ae9SGregory Neil Shapiro p = xalloc(5); 230606f25ae9SGregory Neil Shapiro snprintf(p, 4, "%d", addr.sa.sa_family); 230706f25ae9SGregory Neil Shapiro define(macid("{if_family}", NULL), p, &BlankEnvelope); 230806f25ae9SGregory Neil Shapiro 230906f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 231006f25ae9SGregory Neil Shapiro define(macid("{if_name}", NULL), newstr(name), &BlankEnvelope); 231106f25ae9SGregory Neil Shapiro if (LogLevel > 11) 231206f25ae9SGregory Neil Shapiro { 231306f25ae9SGregory Neil Shapiro /* log connection information */ 231406f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 231506f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 231606f25ae9SGregory Neil Shapiro } 231706f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 231806f25ae9SGregory Neil Shapiro { 231906f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 232006f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 232106f25ae9SGregory Neil Shapiro } 232206f25ae9SGregory Neil Shapiro } 232306f25ae9SGregory Neil Shapiro else 232406f25ae9SGregory Neil Shapiro { 232506f25ae9SGregory Neil Shapiro define(macid("{if_name}", NULL), NULL, &BlankEnvelope); 232606f25ae9SGregory Neil Shapiro define(macid("{if_addr}", NULL), NULL, &BlankEnvelope); 232706f25ae9SGregory Neil Shapiro define(macid("{if_family}", NULL), NULL, &BlankEnvelope); 232806f25ae9SGregory Neil Shapiro } 232906f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 233006f25ae9SGregory Neil Shapiro return EX_OK; 233106f25ae9SGregory Neil Shapiro } 233206f25ae9SGregory Neil Shapiro 233306f25ae9SGregory Neil Shapiro static void 233406f25ae9SGregory Neil Shapiro connecttimeout() 233506f25ae9SGregory Neil Shapiro { 23368774250cSGregory Neil Shapiro /* 23378774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 23388774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 23398774250cSGregory Neil Shapiro ** DOING. 23408774250cSGregory Neil Shapiro */ 23418774250cSGregory Neil Shapiro 234206f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 234306f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 234406f25ae9SGregory Neil Shapiro } 234506f25ae9SGregory Neil Shapiro /* 234606f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 234706f25ae9SGregory Neil Shapiro ** 234806f25ae9SGregory Neil Shapiro ** Parameters: 234906f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 235006f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 235106f25ae9SGregory Neil Shapiro ** structure to be filled in. 235206f25ae9SGregory Neil Shapiro ** 235306f25ae9SGregory Neil Shapiro ** Returns: 235406f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 235506f25ae9SGregory Neil Shapiro ** made and if not why not. 235606f25ae9SGregory Neil Shapiro ** 235706f25ae9SGregory Neil Shapiro ** Side Effects: 235806f25ae9SGregory Neil Shapiro ** none. 235906f25ae9SGregory Neil Shapiro */ 236006f25ae9SGregory Neil Shapiro 236106f25ae9SGregory Neil Shapiro # if NETUNIX 236206f25ae9SGregory Neil Shapiro int makeconnection_ds(mux_path, mci) 236306f25ae9SGregory Neil Shapiro char *mux_path; 236406f25ae9SGregory Neil Shapiro register MCI *mci; 236506f25ae9SGregory Neil Shapiro { 236606f25ae9SGregory Neil Shapiro int sock; 236706f25ae9SGregory Neil Shapiro int rval, save_errno; 236806f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 236906f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 237006f25ae9SGregory Neil Shapiro 237106f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 237206f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 237306f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 237406f25ae9SGregory Neil Shapiro 237506f25ae9SGregory Neil Shapiro if (rval != 0) 237606f25ae9SGregory Neil Shapiro { 237706f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket"); 237806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 237906f25ae9SGregory Neil Shapiro errno = rval; 238006f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 238106f25ae9SGregory Neil Shapiro } 238206f25ae9SGregory Neil Shapiro 238306f25ae9SGregory Neil Shapiro /* prepare address structure */ 238406f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 238506f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 238606f25ae9SGregory Neil Shapiro 238706f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 238806f25ae9SGregory Neil Shapiro { 238906f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: domain socket name too long"); 239006f25ae9SGregory Neil Shapiro /* XXX why TEMPFAIL ? */ 239106f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 239206f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 239306f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 239406f25ae9SGregory Neil Shapiro } 239506f25ae9SGregory Neil Shapiro (void) strlcpy(unix_addr.sun_path, mux_path, sizeof unix_addr.sun_path); 239606f25ae9SGregory Neil Shapiro 239706f25ae9SGregory Neil Shapiro /* initialize domain socket */ 239806f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 239906f25ae9SGregory Neil Shapiro if (sock == -1) 240006f25ae9SGregory Neil Shapiro { 240106f25ae9SGregory Neil Shapiro save_errno = errno; 240206f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket"); 240306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 240406f25ae9SGregory Neil Shapiro errno = save_errno; 240506f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 240606f25ae9SGregory Neil Shapiro } 240706f25ae9SGregory Neil Shapiro 240806f25ae9SGregory Neil Shapiro /* connect to server */ 240906f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 241006f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 241106f25ae9SGregory Neil Shapiro { 241206f25ae9SGregory Neil Shapiro save_errno = errno; 241306f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 241406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 241506f25ae9SGregory Neil Shapiro (void) close(sock); 241606f25ae9SGregory Neil Shapiro errno = save_errno; 241706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 241806f25ae9SGregory Neil Shapiro } 241906f25ae9SGregory Neil Shapiro 242006f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 242106f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 242206f25ae9SGregory Neil Shapiro if ((mci->mci_out = fdopen(sock, "w")) == NULL || 242306f25ae9SGregory Neil Shapiro (sock = dup(sock)) < 0 || 242406f25ae9SGregory Neil Shapiro (mci->mci_in = fdopen(sock, "r")) == NULL) 242506f25ae9SGregory Neil Shapiro { 242606f25ae9SGregory Neil Shapiro save_errno = errno; 242706f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 242806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 242906f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 243006f25ae9SGregory Neil Shapiro (void) fclose(mci->mci_out); 243106f25ae9SGregory Neil Shapiro (void) close(sock); 243206f25ae9SGregory Neil Shapiro errno = save_errno; 2433c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2434c2aa98e2SPeter Wemm } 2435c2aa98e2SPeter Wemm 2436c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 243706f25ae9SGregory Neil Shapiro errno = 0; 243806f25ae9SGregory Neil Shapiro return EX_OK; 2439c2aa98e2SPeter Wemm } 244006f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 2441c2aa98e2SPeter Wemm /* 24428774250cSGregory Neil Shapiro ** SIGHUP -- handle a SIGHUP signal 24438774250cSGregory Neil Shapiro ** 24448774250cSGregory Neil Shapiro ** Parameters: 24458774250cSGregory Neil Shapiro ** sig -- incoming signal. 24468774250cSGregory Neil Shapiro ** 24478774250cSGregory Neil Shapiro ** Returns: 24488774250cSGregory Neil Shapiro ** none. 24498774250cSGregory Neil Shapiro ** 24508774250cSGregory Neil Shapiro ** Side Effects: 24518774250cSGregory Neil Shapiro ** Sets RestartRequest which should cause the daemon 24528774250cSGregory Neil Shapiro ** to restart. 24538774250cSGregory Neil Shapiro ** 24548774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 24558774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 24568774250cSGregory Neil Shapiro ** DOING. 24578774250cSGregory Neil Shapiro */ 24588774250cSGregory Neil Shapiro 24598774250cSGregory Neil Shapiro /* ARGSUSED */ 24608774250cSGregory Neil Shapiro static SIGFUNC_DECL 24618774250cSGregory Neil Shapiro sighup(sig) 24628774250cSGregory Neil Shapiro int sig; 24638774250cSGregory Neil Shapiro { 24648774250cSGregory Neil Shapiro int save_errno = errno; 24658774250cSGregory Neil Shapiro 24668774250cSGregory Neil Shapiro FIX_SYSV_SIGNAL(sig, sighup); 24678774250cSGregory Neil Shapiro RestartRequest = "signal"; 24688774250cSGregory Neil Shapiro errno = save_errno; 24698774250cSGregory Neil Shapiro return SIGFUNC_RETURN; 24708774250cSGregory Neil Shapiro } 24718774250cSGregory Neil Shapiro /* 24728774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 24738774250cSGregory Neil Shapiro ** 24748774250cSGregory Neil Shapiro ** Parameters: 24758774250cSGregory Neil Shapiro ** none. 24768774250cSGregory Neil Shapiro ** 24778774250cSGregory Neil Shapiro ** Returns: 24788774250cSGregory Neil Shapiro ** none. 24798774250cSGregory Neil Shapiro ** 24808774250cSGregory Neil Shapiro ** Side Effects: 24818774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 24828774250cSGregory Neil Shapiro */ 24838774250cSGregory Neil Shapiro 248413058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 248513058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 248613058a91SGregory Neil Shapiro do \ 248713058a91SGregory Neil Shapiro { \ 248813058a91SGregory Neil Shapiro (old) = setsignal((sig), sm_signal_noop); \ 248913058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 249013058a91SGregory Neil Shapiro (void) setsignal((sig), (old)); \ 249113058a91SGregory Neil Shapiro } while (0) 249213058a91SGregory Neil Shapiro 24938774250cSGregory Neil Shapiro static void 24948774250cSGregory Neil Shapiro restart_daemon() 24958774250cSGregory Neil Shapiro { 24968774250cSGregory Neil Shapiro int i; 24978774250cSGregory Neil Shapiro int save_errno; 24988774250cSGregory Neil Shapiro char *reason; 249913058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 25008774250cSGregory Neil Shapiro extern int DtableSize; 25018774250cSGregory Neil Shapiro 250213058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 250313058a91SGregory Neil Shapiro clear_events(); 25048774250cSGregory Neil Shapiro allsignals(TRUE); 25058774250cSGregory Neil Shapiro 25068774250cSGregory Neil Shapiro reason = RestartRequest; 25078774250cSGregory Neil Shapiro RestartRequest = NULL; 25088774250cSGregory Neil Shapiro PendingSignal = 0; 25098774250cSGregory Neil Shapiro 25108774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 25118774250cSGregory Neil Shapiro { 25128774250cSGregory Neil Shapiro if (LogLevel > 3) 25138774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 25148774250cSGregory Neil Shapiro "could not restart: need full path"); 25158774250cSGregory Neil Shapiro finis(FALSE, EX_OSFILE); 25168774250cSGregory Neil Shapiro } 25178774250cSGregory Neil Shapiro if (LogLevel > 3) 25188774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 25198774250cSGregory Neil Shapiro SaveArgv[0], 25208774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 25218774250cSGregory Neil Shapiro 25228774250cSGregory Neil Shapiro closecontrolsocket(TRUE); 25238774250cSGregory Neil Shapiro if (drop_privileges(TRUE) != EX_OK) 25248774250cSGregory Neil Shapiro { 25258774250cSGregory Neil Shapiro if (LogLevel > 0) 25268774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 25278774250cSGregory Neil Shapiro "could not set[ug]id(%d, %d): %m", 25288774250cSGregory Neil Shapiro RunAsUid, RunAsGid); 25298774250cSGregory Neil Shapiro finis(FALSE, EX_OSERR); 25308774250cSGregory Neil Shapiro } 25318774250cSGregory Neil Shapiro 25328774250cSGregory Neil Shapiro /* arrange for all the files to be closed */ 25338774250cSGregory Neil Shapiro for (i = 3; i < DtableSize; i++) 25348774250cSGregory Neil Shapiro { 25358774250cSGregory Neil Shapiro register int j; 25368774250cSGregory Neil Shapiro 25378774250cSGregory Neil Shapiro if ((j = fcntl(i, F_GETFD, 0)) != -1) 25388774250cSGregory Neil Shapiro (void) fcntl(i, F_SETFD, j | FD_CLOEXEC); 25398774250cSGregory Neil Shapiro } 25408774250cSGregory Neil Shapiro 254113058a91SGregory Neil Shapiro /* 254213058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 254313058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 254413058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 254513058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 254613058a91SGregory Neil Shapiro */ 254713058a91SGregory Neil Shapiro 254813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 254913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 255013058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 255113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 255213058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 255313058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 255413058a91SGregory Neil Shapiro #ifdef SIGUSR1 255513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 255613058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 25578774250cSGregory Neil Shapiro allsignals(FALSE); 25588774250cSGregory Neil Shapiro 25598774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 25608774250cSGregory Neil Shapiro save_errno = errno; 25618774250cSGregory Neil Shapiro 256213058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 25638774250cSGregory Neil Shapiro allsignals(TRUE); 256413058a91SGregory Neil Shapiro 256513058a91SGregory Neil Shapiro /* For finis() events */ 25668774250cSGregory Neil Shapiro (void) setsignal(SIGALRM, oalrm); 256713058a91SGregory Neil Shapiro 256813058a91SGregory Neil Shapiro #ifdef SIGUSR1 256913058a91SGregory Neil Shapiro /* For debugging finis() */ 25708774250cSGregory Neil Shapiro (void) setsignal(SIGUSR1, ousr1); 257113058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 25728774250cSGregory Neil Shapiro 25738774250cSGregory Neil Shapiro errno = save_errno; 25748774250cSGregory Neil Shapiro if (LogLevel > 0) 25758774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %m", 25768774250cSGregory Neil Shapiro SaveArgv[0]); 25778774250cSGregory Neil Shapiro finis(FALSE, EX_OSFILE); 25788774250cSGregory Neil Shapiro } 25798774250cSGregory Neil Shapiro /* 2580c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 2581c2aa98e2SPeter Wemm ** 2582c2aa98e2SPeter Wemm ** Parameters: 2583c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 2584c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 2585c2aa98e2SPeter Wemm ** 2586c2aa98e2SPeter Wemm ** Returns: 2587c2aa98e2SPeter Wemm ** A list of aliases for this host. 2588c2aa98e2SPeter Wemm ** 2589c2aa98e2SPeter Wemm ** Side Effects: 2590c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 2591c2aa98e2SPeter Wemm */ 2592c2aa98e2SPeter Wemm 2593c2aa98e2SPeter Wemm struct hostent * 2594c2aa98e2SPeter Wemm myhostname(hostbuf, size) 2595c2aa98e2SPeter Wemm char hostbuf[]; 2596c2aa98e2SPeter Wemm int size; 2597c2aa98e2SPeter Wemm { 2598c2aa98e2SPeter Wemm register struct hostent *hp; 2599c2aa98e2SPeter Wemm 2600602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 260106f25ae9SGregory Neil Shapiro (void) strlcpy(hostbuf, "localhost", size); 260206f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 260313058a91SGregory Neil Shapiro # if NETINET && NETINET6 260413058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 260513058a91SGregory Neil Shapiro { 260613058a91SGregory Neil Shapiro /* 260713058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 260813058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 260913058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 261013058a91SGregory Neil Shapiro */ 261113058a91SGregory Neil Shapiro 261213058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 261313058a91SGregory Neil Shapiro } 261413058a91SGregory Neil Shapiro # endif /* NETINET && NETINET6 */ 261513058a91SGregory Neil Shapiro 2616c2aa98e2SPeter Wemm if (hp == NULL) 2617c2aa98e2SPeter Wemm return NULL; 2618c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 261906f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 262006f25ae9SGregory Neil Shapiro 262106f25ae9SGregory Neil Shapiro # if NETINFO 262206f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 2623c2aa98e2SPeter Wemm { 262406f25ae9SGregory Neil Shapiro char *domainname; 262506f25ae9SGregory Neil Shapiro 262606f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 262706f25ae9SGregory Neil Shapiro "domain", '\0'); 262806f25ae9SGregory Neil Shapiro if (domainname != NULL && 262906f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 263006f25ae9SGregory Neil Shapiro { 263106f25ae9SGregory Neil Shapiro (void) strlcat(hostbuf, ".", size); 263206f25ae9SGregory Neil Shapiro (void) strlcat(hostbuf, domainname, size); 2633c2aa98e2SPeter Wemm } 263406f25ae9SGregory Neil Shapiro } 263506f25ae9SGregory Neil Shapiro # endif /* NETINFO */ 2636c2aa98e2SPeter Wemm 2637c2aa98e2SPeter Wemm /* 2638c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 2639c2aa98e2SPeter Wemm ** dotted alias. 2640c2aa98e2SPeter Wemm */ 2641c2aa98e2SPeter Wemm 2642c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 2643c2aa98e2SPeter Wemm { 2644c2aa98e2SPeter Wemm char **ha; 2645c2aa98e2SPeter Wemm 264606f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 2647c2aa98e2SPeter Wemm { 2648c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 2649c2aa98e2SPeter Wemm { 265006f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 2651c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 2652c2aa98e2SPeter Wemm break; 2653c2aa98e2SPeter Wemm } 2654c2aa98e2SPeter Wemm } 2655c2aa98e2SPeter Wemm } 2656c2aa98e2SPeter Wemm 2657c2aa98e2SPeter Wemm /* 2658c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 2659c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 2660c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 2661c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 2662c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 2663c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 2664c2aa98e2SPeter Wemm */ 2665c2aa98e2SPeter Wemm 2666c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 2667c2aa98e2SPeter Wemm !getcanonname(hostbuf, size, TRUE)) 2668c2aa98e2SPeter Wemm { 2669c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 2670c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 2671c2aa98e2SPeter Wemm hostbuf); 2672c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 2673c2aa98e2SPeter Wemm hostbuf); 267406f25ae9SGregory Neil Shapiro (void) sleep(60); 2675c2aa98e2SPeter Wemm if (!getcanonname(hostbuf, size, TRUE)) 2676c2aa98e2SPeter Wemm { 2677c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 2678c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 2679c2aa98e2SPeter Wemm hostbuf); 2680c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 2681c2aa98e2SPeter Wemm hostbuf); 2682c2aa98e2SPeter Wemm } 2683c2aa98e2SPeter Wemm } 268406f25ae9SGregory Neil Shapiro return hp; 2685c2aa98e2SPeter Wemm } 2686c2aa98e2SPeter Wemm /* 2687c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 2688c2aa98e2SPeter Wemm ** 2689c2aa98e2SPeter Wemm ** Parameters: 2690c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 2691c2aa98e2SPeter Wemm ** ha -- actual first address 2692c2aa98e2SPeter Wemm ** sa -- second address 2693c2aa98e2SPeter Wemm ** 2694c2aa98e2SPeter Wemm ** Returns: 2695c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 2696c2aa98e2SPeter Wemm ** else -- they don't match 2697c2aa98e2SPeter Wemm */ 2698c2aa98e2SPeter Wemm 269906f25ae9SGregory Neil Shapiro static int 2700c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 2701c2aa98e2SPeter Wemm struct hostent *hp; 2702c2aa98e2SPeter Wemm char *ha; 2703c2aa98e2SPeter Wemm SOCKADDR *sa; 2704c2aa98e2SPeter Wemm { 270506f25ae9SGregory Neil Shapiro # if NETINET6 270606f25ae9SGregory Neil Shapiro u_char *a; 270706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 270806f25ae9SGregory Neil Shapiro 2709c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 2710c2aa98e2SPeter Wemm { 271106f25ae9SGregory Neil Shapiro # if NETINET 2712c2aa98e2SPeter Wemm case AF_INET: 2713c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 271406f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 2715c2aa98e2SPeter Wemm break; 271606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 2717c2aa98e2SPeter Wemm 271806f25ae9SGregory Neil Shapiro # if NETINET6 271906f25ae9SGregory Neil Shapiro case AF_INET6: 272006f25ae9SGregory Neil Shapiro a = (u_char *) &sa->sin6.sin6_addr; 272106f25ae9SGregory Neil Shapiro 272206f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 272306f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 272406f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 272506f25ae9SGregory Neil Shapiro 272606f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 272706f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 272806f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 272906f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 273006f25ae9SGregory Neil Shapiro break; 273106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 2732c2aa98e2SPeter Wemm } 2733c2aa98e2SPeter Wemm return -1; 2734c2aa98e2SPeter Wemm } 2735c2aa98e2SPeter Wemm /* 273606f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 2737c2aa98e2SPeter Wemm ** 2738c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 2739c2aa98e2SPeter Wemm ** 2740c2aa98e2SPeter Wemm ** Parameters: 2741c2aa98e2SPeter Wemm ** fd -- the descriptor 2742c2aa98e2SPeter Wemm ** may_be_forged -- an outage that is set to TRUE if the 2743c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 2744c2aa98e2SPeter Wemm ** RealHostAddr; set to FALSE if they do match. 2745c2aa98e2SPeter Wemm ** 2746c2aa98e2SPeter Wemm ** Returns: 2747c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 2748c2aa98e2SPeter Wemm */ 2749c2aa98e2SPeter Wemm 2750c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 2751c2aa98e2SPeter Wemm 2752c2aa98e2SPeter Wemm static void 2753c2aa98e2SPeter Wemm authtimeout() 2754c2aa98e2SPeter Wemm { 27558774250cSGregory Neil Shapiro /* 27568774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 27578774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 27588774250cSGregory Neil Shapiro ** DOING. 27598774250cSGregory Neil Shapiro */ 27608774250cSGregory Neil Shapiro 27618774250cSGregory Neil Shapiro errno = ETIMEDOUT; 2762c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 2763c2aa98e2SPeter Wemm } 2764c2aa98e2SPeter Wemm 2765c2aa98e2SPeter Wemm char * 2766c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 2767c2aa98e2SPeter Wemm int fd; 2768c2aa98e2SPeter Wemm bool *may_be_forged; 2769c2aa98e2SPeter Wemm { 277042e5d165SGregory Neil Shapiro volatile u_short port = 0; 2771c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 2772c2aa98e2SPeter Wemm register char *volatile p = NULL; 2773c2aa98e2SPeter Wemm SOCKADDR la; 2774c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 2775c2aa98e2SPeter Wemm register struct servent *sp; 2776c2aa98e2SPeter Wemm volatile int s; 2777c2aa98e2SPeter Wemm int i = 0; 2778c2aa98e2SPeter Wemm EVENT *ev; 2779c2aa98e2SPeter Wemm int nleft; 2780c2aa98e2SPeter Wemm struct hostent *hp; 2781c2aa98e2SPeter Wemm char *ostype = NULL; 2782c2aa98e2SPeter Wemm char **ha; 2783c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 2784c2aa98e2SPeter Wemm static char hbuf[MAXNAME * 2 + 11]; 2785c2aa98e2SPeter Wemm 2786c2aa98e2SPeter Wemm *may_be_forged = FALSE; 2787c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 2788c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 2789c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 2790c2aa98e2SPeter Wemm { 279106f25ae9SGregory Neil Shapiro if (i < 0) 279206f25ae9SGregory Neil Shapiro { 279306f25ae9SGregory Neil Shapiro /* 279406f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 279506f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 279606f25ae9SGregory Neil Shapiro ** happen later. 279706f25ae9SGregory Neil Shapiro */ 279806f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 2799c2aa98e2SPeter Wemm return NULL; 280006f25ae9SGregory Neil Shapiro errno = 0; 280106f25ae9SGregory Neil Shapiro } 2802c2aa98e2SPeter Wemm (void) snprintf(hbuf, sizeof hbuf, "%s@localhost", 2803c2aa98e2SPeter Wemm RealUserName); 2804c2aa98e2SPeter Wemm if (tTd(9, 1)) 280506f25ae9SGregory Neil Shapiro dprintf("getauthinfo: %s\n", hbuf); 2806c2aa98e2SPeter Wemm return hbuf; 2807c2aa98e2SPeter Wemm } 2808c2aa98e2SPeter Wemm 2809c2aa98e2SPeter Wemm if (RealHostName == NULL) 2810c2aa98e2SPeter Wemm { 2811c2aa98e2SPeter Wemm /* translate that to a host name */ 2812c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 2813c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 2814065a643dSPeter Wemm RealHostName[MAXNAME] = '\0'; 2815c2aa98e2SPeter Wemm } 2816c2aa98e2SPeter Wemm 2817c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 2818c2aa98e2SPeter Wemm if (anynet_ntoa(&RealHostAddr)[0] == '[' || 2819c2aa98e2SPeter Wemm RealHostName[0] == '[') 2820c2aa98e2SPeter Wemm { 2821c2aa98e2SPeter Wemm /* 2822c2aa98e2SPeter Wemm ** address is not a socket or have an 2823c2aa98e2SPeter Wemm ** IP address with no forward lookup 2824c2aa98e2SPeter Wemm */ 2825c2aa98e2SPeter Wemm *may_be_forged = FALSE; 2826c2aa98e2SPeter Wemm } 2827c2aa98e2SPeter Wemm else 2828c2aa98e2SPeter Wemm { 282913058a91SGregory Neil Shapiro int family; 2830c2aa98e2SPeter Wemm 283113058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 283213058a91SGregory Neil Shapiro # if NETINET6 && NEEDSGETIPNODE 283313058a91SGregory Neil Shapiro /* 283413058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 283513058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 283613058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 283713058a91SGregory Neil Shapiro ** RealHostAddr. 283813058a91SGregory Neil Shapiro ** 283913058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 284013058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 284113058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 284213058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 284313058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 284413058a91SGregory Neil Shapiro */ 284513058a91SGregory Neil Shapiro 284613058a91SGregory Neil Shapiro if (family == AF_INET6 && 284713058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 284813058a91SGregory Neil Shapiro family = AF_INET; 284913058a91SGregory Neil Shapiro # endif /* NETINET6 && NEEDSGETIPNODE */ 285013058a91SGregory Neil Shapiro 285113058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 285213058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 2853c2aa98e2SPeter Wemm if (hp == NULL) 2854c2aa98e2SPeter Wemm *may_be_forged = TRUE; 2855c2aa98e2SPeter Wemm else 2856c2aa98e2SPeter Wemm { 2857c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 2858c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 2859c2aa98e2SPeter Wemm break; 2860c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 2861193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 2862193538b7SGregory Neil Shapiro freehostent(hp); 2863193538b7SGregory Neil Shapiro hp = NULL; 2864193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 2865c2aa98e2SPeter Wemm } 2866c2aa98e2SPeter Wemm } 2867c2aa98e2SPeter Wemm 2868c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 2869c2aa98e2SPeter Wemm goto noident; 2870c2aa98e2SPeter Wemm 2871c2aa98e2SPeter Wemm lalen = sizeof la; 287206f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 287306f25ae9SGregory Neil Shapiro { 287406f25ae9SGregory Neil Shapiro # if NETINET 287506f25ae9SGregory Neil Shapiro case AF_INET: 287606f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 287706f25ae9SGregory Neil Shapiro lalen <= 0 || 2878c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 2879c2aa98e2SPeter Wemm { 2880c2aa98e2SPeter Wemm /* no ident info */ 2881c2aa98e2SPeter Wemm goto noident; 2882c2aa98e2SPeter Wemm } 288306f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 2884c2aa98e2SPeter Wemm 2885c2aa98e2SPeter Wemm /* create ident query */ 2886c2aa98e2SPeter Wemm (void) snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 288706f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 288806f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 2889c2aa98e2SPeter Wemm 2890c2aa98e2SPeter Wemm /* create local address */ 2891c2aa98e2SPeter Wemm la.sin.sin_port = 0; 2892c2aa98e2SPeter Wemm 2893c2aa98e2SPeter Wemm /* create foreign address */ 289406f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 289506f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 289606f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 2897c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 2898c2aa98e2SPeter Wemm if (sp != NULL) 2899c2aa98e2SPeter Wemm RealHostAddr.sin.sin_port = sp->s_port; 2900c2aa98e2SPeter Wemm else 2901c2aa98e2SPeter Wemm RealHostAddr.sin.sin_port = htons(113); 290206f25ae9SGregory Neil Shapiro break; 290306f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 290406f25ae9SGregory Neil Shapiro # endif /* NETINET */ 290506f25ae9SGregory Neil Shapiro 290606f25ae9SGregory Neil Shapiro # if NETINET6 290706f25ae9SGregory Neil Shapiro case AF_INET6: 290806f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 290906f25ae9SGregory Neil Shapiro lalen <= 0 || 291006f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 291106f25ae9SGregory Neil Shapiro { 291206f25ae9SGregory Neil Shapiro /* no ident info */ 291306f25ae9SGregory Neil Shapiro goto noident; 291406f25ae9SGregory Neil Shapiro } 291506f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 291606f25ae9SGregory Neil Shapiro 291706f25ae9SGregory Neil Shapiro /* create ident query */ 291806f25ae9SGregory Neil Shapiro (void) snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 291906f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 292006f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 292106f25ae9SGregory Neil Shapiro 292206f25ae9SGregory Neil Shapiro /* create local address */ 292306f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 292406f25ae9SGregory Neil Shapiro 292506f25ae9SGregory Neil Shapiro /* create foreign address */ 292606f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 292706f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 292806f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 292906f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 293006f25ae9SGregory Neil Shapiro if (sp != NULL) 293106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = sp->s_port; 293206f25ae9SGregory Neil Shapiro else 293306f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 293406f25ae9SGregory Neil Shapiro break; 293506f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 293606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 293706f25ae9SGregory Neil Shapiro default: 293806f25ae9SGregory Neil Shapiro /* no ident info */ 293906f25ae9SGregory Neil Shapiro goto noident; 294006f25ae9SGregory Neil Shapiro } 2941c2aa98e2SPeter Wemm 2942c2aa98e2SPeter Wemm s = -1; 2943c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 2944c2aa98e2SPeter Wemm { 2945c2aa98e2SPeter Wemm if (s >= 0) 2946c2aa98e2SPeter Wemm (void) close(s); 2947c2aa98e2SPeter Wemm goto noident; 2948c2aa98e2SPeter Wemm } 2949c2aa98e2SPeter Wemm 2950c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 2951c2aa98e2SPeter Wemm ev = setevent(TimeOuts.to_ident, authtimeout, 0); 2952c2aa98e2SPeter Wemm 295306f25ae9SGregory Neil Shapiro 2954c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 295506f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 2956c2aa98e2SPeter Wemm if (s < 0) 2957c2aa98e2SPeter Wemm { 2958c2aa98e2SPeter Wemm clrevent(ev); 2959c2aa98e2SPeter Wemm goto noident; 2960c2aa98e2SPeter Wemm } 296106f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 296206f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 2963c2aa98e2SPeter Wemm { 2964c2aa98e2SPeter Wemm goto closeident; 2965c2aa98e2SPeter Wemm } 2966c2aa98e2SPeter Wemm 2967c2aa98e2SPeter Wemm if (tTd(9, 10)) 296806f25ae9SGregory Neil Shapiro dprintf("getauthinfo: sent %s", ibuf); 2969c2aa98e2SPeter Wemm 2970c2aa98e2SPeter Wemm /* send query */ 2971c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 2972c2aa98e2SPeter Wemm goto closeident; 2973c2aa98e2SPeter Wemm 2974c2aa98e2SPeter Wemm /* get result */ 2975c2aa98e2SPeter Wemm p = &ibuf[0]; 2976c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 2977c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 2978c2aa98e2SPeter Wemm { 2979c2aa98e2SPeter Wemm p += i; 2980c2aa98e2SPeter Wemm nleft -= i; 2981c2aa98e2SPeter Wemm *p = '\0'; 2982c2aa98e2SPeter Wemm if (strchr(ibuf, '\n') != NULL) 2983c2aa98e2SPeter Wemm break; 2984c2aa98e2SPeter Wemm } 2985c2aa98e2SPeter Wemm (void) close(s); 2986c2aa98e2SPeter Wemm clrevent(ev); 2987c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 2988c2aa98e2SPeter Wemm goto noident; 2989c2aa98e2SPeter Wemm 2990c2aa98e2SPeter Wemm if (*--p == '\n' && *--p == '\r') 2991c2aa98e2SPeter Wemm p--; 2992c2aa98e2SPeter Wemm *++p = '\0'; 2993c2aa98e2SPeter Wemm 2994c2aa98e2SPeter Wemm if (tTd(9, 3)) 299506f25ae9SGregory Neil Shapiro dprintf("getauthinfo: got %s\n", ibuf); 2996c2aa98e2SPeter Wemm 2997c2aa98e2SPeter Wemm /* parse result */ 2998c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 2999c2aa98e2SPeter Wemm if (p == NULL) 3000c2aa98e2SPeter Wemm { 3001c2aa98e2SPeter Wemm /* malformed response */ 3002c2aa98e2SPeter Wemm goto noident; 3003c2aa98e2SPeter Wemm } 3004c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3005c2aa98e2SPeter Wemm continue; 3006c2aa98e2SPeter Wemm if (strncasecmp(p, "userid", 6) != 0) 3007c2aa98e2SPeter Wemm { 3008c2aa98e2SPeter Wemm /* presumably an error string */ 3009c2aa98e2SPeter Wemm goto noident; 3010c2aa98e2SPeter Wemm } 3011c2aa98e2SPeter Wemm p += 6; 3012c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3013c2aa98e2SPeter Wemm p++; 3014c2aa98e2SPeter Wemm if (*p++ != ':') 3015c2aa98e2SPeter Wemm { 3016c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3017c2aa98e2SPeter Wemm goto noident; 3018c2aa98e2SPeter Wemm } 3019c2aa98e2SPeter Wemm 3020c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3021c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3022c2aa98e2SPeter Wemm p++; 3023c2aa98e2SPeter Wemm ostype = p; 3024c2aa98e2SPeter Wemm p = strchr(p, ':'); 3025c2aa98e2SPeter Wemm if (p == NULL) 3026c2aa98e2SPeter Wemm { 3027c2aa98e2SPeter Wemm /* malformed response */ 3028c2aa98e2SPeter Wemm goto noident; 3029c2aa98e2SPeter Wemm } 3030c2aa98e2SPeter Wemm else 3031c2aa98e2SPeter Wemm { 3032c2aa98e2SPeter Wemm char *charset; 3033c2aa98e2SPeter Wemm 3034c2aa98e2SPeter Wemm *p = '\0'; 3035c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3036c2aa98e2SPeter Wemm if (charset != NULL) 3037c2aa98e2SPeter Wemm *charset = '\0'; 3038c2aa98e2SPeter Wemm } 3039c2aa98e2SPeter Wemm 3040c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3041c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3042c2aa98e2SPeter Wemm continue; 3043c2aa98e2SPeter Wemm 3044c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 3045c2aa98e2SPeter Wemm if (strncasecmp(ostype, "other", 5) == 0 && 3046c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3047c2aa98e2SPeter Wemm { 3048c2aa98e2SPeter Wemm snprintf(hbuf, sizeof hbuf, "IDENT:"); 3049c2aa98e2SPeter Wemm cleanstrcpy(&hbuf[6], p, MAXNAME); 3050c2aa98e2SPeter Wemm } 3051c2aa98e2SPeter Wemm else 3052c2aa98e2SPeter Wemm cleanstrcpy(hbuf, p, MAXNAME); 3053c2aa98e2SPeter Wemm i = strlen(hbuf); 3054c2aa98e2SPeter Wemm snprintf(&hbuf[i], sizeof hbuf - i, "@%s", 3055c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3056c2aa98e2SPeter Wemm goto postident; 3057c2aa98e2SPeter Wemm 3058c2aa98e2SPeter Wemm closeident: 3059c2aa98e2SPeter Wemm (void) close(s); 3060c2aa98e2SPeter Wemm clrevent(ev); 3061c2aa98e2SPeter Wemm 3062c2aa98e2SPeter Wemm noident: 306306f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 306406f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 306506f25ae9SGregory Neil Shapiro { 306606f25ae9SGregory Neil Shapiro # if NETINET 306706f25ae9SGregory Neil Shapiro case AF_INET: 306806f25ae9SGregory Neil Shapiro if (port > 0) 306906f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 307006f25ae9SGregory Neil Shapiro break; 307106f25ae9SGregory Neil Shapiro # endif /* NETINET */ 307206f25ae9SGregory Neil Shapiro 307306f25ae9SGregory Neil Shapiro # if NETINET6 307406f25ae9SGregory Neil Shapiro case AF_INET6: 307506f25ae9SGregory Neil Shapiro if (port > 0) 307606f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 307706f25ae9SGregory Neil Shapiro break; 307806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 307906f25ae9SGregory Neil Shapiro } 308006f25ae9SGregory Neil Shapiro 3081c2aa98e2SPeter Wemm if (RealHostName == NULL) 3082c2aa98e2SPeter Wemm { 3083c2aa98e2SPeter Wemm if (tTd(9, 1)) 308406f25ae9SGregory Neil Shapiro dprintf("getauthinfo: NULL\n"); 3085c2aa98e2SPeter Wemm return NULL; 3086c2aa98e2SPeter Wemm } 3087c2aa98e2SPeter Wemm snprintf(hbuf, sizeof hbuf, "%s", RealHostName); 3088c2aa98e2SPeter Wemm 3089c2aa98e2SPeter Wemm postident: 3090c2aa98e2SPeter Wemm # if IP_SRCROUTE 3091c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3092c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 309306f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3094c2aa98e2SPeter Wemm /* 3095c2aa98e2SPeter Wemm ** Extract IP source routing information. 3096c2aa98e2SPeter Wemm ** 3097c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3098c2aa98e2SPeter Wemm ** through c to d: 3099c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3100c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3101c2aa98e2SPeter Wemm ** 3102c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3103c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3104c2aa98e2SPeter Wemm ** p - pointer to hbuf 3105c2aa98e2SPeter Wemm */ 3106c2aa98e2SPeter Wemm 3107c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3108c2aa98e2SPeter Wemm { 3109c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3110c2aa98e2SPeter Wemm int j; 3111c2aa98e2SPeter Wemm u_char *q; 3112c2aa98e2SPeter Wemm u_char *o; 3113c2aa98e2SPeter Wemm int l; 311406f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3115c2aa98e2SPeter Wemm 3116c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3117c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3118c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3119c2aa98e2SPeter Wemm goto noipsr; 3120c2aa98e2SPeter Wemm if (ipoptlen == 0) 3121c2aa98e2SPeter Wemm goto noipsr; 312206f25ae9SGregory Neil Shapiro o = (u_char *) ipopt.IP_LIST; 3123c2aa98e2SPeter Wemm while (o != NULL && o < (u_char *) &ipopt + ipoptlen) 3124c2aa98e2SPeter Wemm { 3125c2aa98e2SPeter Wemm switch (*o) 3126c2aa98e2SPeter Wemm { 3127c2aa98e2SPeter Wemm case IPOPT_EOL: 3128c2aa98e2SPeter Wemm o = NULL; 3129c2aa98e2SPeter Wemm break; 3130c2aa98e2SPeter Wemm 3131c2aa98e2SPeter Wemm case IPOPT_NOP: 3132c2aa98e2SPeter Wemm o++; 3133c2aa98e2SPeter Wemm break; 3134c2aa98e2SPeter Wemm 3135c2aa98e2SPeter Wemm case IPOPT_SSRR: 3136c2aa98e2SPeter Wemm case IPOPT_LSRR: 3137c2aa98e2SPeter Wemm /* 3138c2aa98e2SPeter Wemm ** Source routing. 3139c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3140c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3141c2aa98e2SPeter Wemm ** including option type and 3142c2aa98e2SPeter Wemm ** length. 3143c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3144c2aa98e2SPeter Wemm ** data. 3145c2aa98e2SPeter Wemm ** o[3] begins the route data. 3146c2aa98e2SPeter Wemm */ 3147c2aa98e2SPeter Wemm 3148c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3149c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 3150c2aa98e2SPeter Wemm snprintf(p, SPACELEFT(hbuf, p), " [%s@%.*s", 3151c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3152c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 315306f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3154c2aa98e2SPeter Wemm i = strlen(p); 3155c2aa98e2SPeter Wemm p += i; 3156c2aa98e2SPeter Wemm l -= strlen(p); 3157c2aa98e2SPeter Wemm 3158c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3159c2aa98e2SPeter Wemm 3160c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3161c2aa98e2SPeter Wemm q = &o[3]; 3162c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3163c2aa98e2SPeter Wemm { 316406f25ae9SGregory Neil Shapiro struct in_addr addr; 316506f25ae9SGregory Neil Shapiro 3166c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 3167c2aa98e2SPeter Wemm snprintf(p, SPACELEFT(hbuf, p), 3168c2aa98e2SPeter Wemm "%c%.*s", 3169c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3170c2aa98e2SPeter Wemm l > 240 ? 120 : 3171c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3172c2aa98e2SPeter Wemm inet_ntoa(addr)); 3173c2aa98e2SPeter Wemm i = strlen(p); 3174c2aa98e2SPeter Wemm p += i; 3175c2aa98e2SPeter Wemm l -= i + 1; 3176c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3177c2aa98e2SPeter Wemm } 3178c2aa98e2SPeter Wemm o += o[1]; 3179c2aa98e2SPeter Wemm break; 3180c2aa98e2SPeter Wemm 3181c2aa98e2SPeter Wemm default: 3182c2aa98e2SPeter Wemm /* Skip over option */ 3183c2aa98e2SPeter Wemm o += o[1]; 3184c2aa98e2SPeter Wemm break; 3185c2aa98e2SPeter Wemm } 3186c2aa98e2SPeter Wemm } 3187c2aa98e2SPeter Wemm snprintf(p, SPACELEFT(hbuf, p), "]"); 3188c2aa98e2SPeter Wemm goto postipsr; 3189c2aa98e2SPeter Wemm } 3190c2aa98e2SPeter Wemm 3191c2aa98e2SPeter Wemm noipsr: 319206f25ae9SGregory Neil Shapiro # endif /* IP_SRCROUTE */ 3193c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3194c2aa98e2SPeter Wemm { 3195c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3196c2aa98e2SPeter Wemm (void) snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3197c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3198c2aa98e2SPeter Wemm } 3199c2aa98e2SPeter Wemm if (*may_be_forged) 3200c2aa98e2SPeter Wemm { 3201c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3202c2aa98e2SPeter Wemm (void) snprintf(p, SPACELEFT(hbuf, p), " (may be forged)"); 3203c2aa98e2SPeter Wemm } 3204c2aa98e2SPeter Wemm 3205c2aa98e2SPeter Wemm # if IP_SRCROUTE 3206c2aa98e2SPeter Wemm postipsr: 320706f25ae9SGregory Neil Shapiro # endif /* IP_SRCROUTE */ 3208c2aa98e2SPeter Wemm if (tTd(9, 1)) 320906f25ae9SGregory Neil Shapiro dprintf("getauthinfo: %s\n", hbuf); 321006f25ae9SGregory Neil Shapiro 321106f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 321206f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 321306f25ae9SGregory Neil Shapiro { 321406f25ae9SGregory Neil Shapiro # if NETINET 321506f25ae9SGregory Neil Shapiro case AF_INET: 321606f25ae9SGregory Neil Shapiro if (port > 0) 321706f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 321806f25ae9SGregory Neil Shapiro break; 321906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 322006f25ae9SGregory Neil Shapiro 322106f25ae9SGregory Neil Shapiro # if NETINET6 322206f25ae9SGregory Neil Shapiro case AF_INET6: 322306f25ae9SGregory Neil Shapiro if (port > 0) 322406f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 322506f25ae9SGregory Neil Shapiro break; 322606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 322706f25ae9SGregory Neil Shapiro } 322806f25ae9SGregory Neil Shapiro 3229c2aa98e2SPeter Wemm return hbuf; 3230c2aa98e2SPeter Wemm } 3231c2aa98e2SPeter Wemm /* 3232c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3233c2aa98e2SPeter Wemm ** 3234c2aa98e2SPeter Wemm ** Parameters: 3235c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3236c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3237c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3238c2aa98e2SPeter Wemm ** functions. 3239c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3240c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3241c2aa98e2SPeter Wemm ** 3242c2aa98e2SPeter Wemm ** Returns: 3243c2aa98e2SPeter Wemm ** The mapping, if found. 3244c2aa98e2SPeter Wemm ** NULL if no mapping found. 3245c2aa98e2SPeter Wemm ** 3246c2aa98e2SPeter Wemm ** Side Effects: 3247c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3248c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3249c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3250c2aa98e2SPeter Wemm ** status only to be returned). 3251c2aa98e2SPeter Wemm */ 3252c2aa98e2SPeter Wemm 3253c2aa98e2SPeter Wemm char * 3254c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3255c2aa98e2SPeter Wemm MAP *map; 3256c2aa98e2SPeter Wemm char *name; 3257c2aa98e2SPeter Wemm char **av; 3258c2aa98e2SPeter Wemm int *statp; 3259c2aa98e2SPeter Wemm { 3260c2aa98e2SPeter Wemm register struct hostent *hp; 326106f25ae9SGregory Neil Shapiro # if NETINET 3262c2aa98e2SPeter Wemm struct in_addr in_addr; 326306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 326406f25ae9SGregory Neil Shapiro # if NETINET6 326506f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 326606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 326706f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3268c2aa98e2SPeter Wemm register STAB *s; 3269c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3270c2aa98e2SPeter Wemm 3271c2aa98e2SPeter Wemm /* 3272c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 3273c2aa98e2SPeter Wemm ** return it. 3274c2aa98e2SPeter Wemm */ 3275c2aa98e2SPeter Wemm 3276c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 3277c2aa98e2SPeter Wemm if (bitset(NCF_VALID, s->s_namecanon.nc_flags)) 3278c2aa98e2SPeter Wemm { 3279c2aa98e2SPeter Wemm if (tTd(9, 1)) 328006f25ae9SGregory Neil Shapiro dprintf("host_map_lookup(%s) => CACHE %s\n", 3281c2aa98e2SPeter Wemm name, 3282c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3283c2aa98e2SPeter Wemm ? "NULL" 3284c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3285c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3286c2aa98e2SPeter Wemm # if NAMED_BIND 3287602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 328806f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3289c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3290c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3291c2aa98e2SPeter Wemm { 3292c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3293c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3294c2aa98e2SPeter Wemm shortenstring(name, 33)); 3295c2aa98e2SPeter Wemm } 3296c2aa98e2SPeter Wemm if (*statp != EX_OK) 3297c2aa98e2SPeter Wemm return NULL; 3298c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3299c2aa98e2SPeter Wemm { 3300c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno = %d, h_errno = %d", 3301c2aa98e2SPeter Wemm name, 3302c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3303c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3304c2aa98e2SPeter Wemm return NULL; 3305c2aa98e2SPeter Wemm } 3306c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3307c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3308c2aa98e2SPeter Wemm else 3309c2aa98e2SPeter Wemm cp = map_rewrite(map, 3310c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3311c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3312c2aa98e2SPeter Wemm av); 3313c2aa98e2SPeter Wemm return cp; 3314c2aa98e2SPeter Wemm } 3315c2aa98e2SPeter Wemm 3316c2aa98e2SPeter Wemm /* 3317c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3318c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3319c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3320c2aa98e2SPeter Wemm */ 3321c2aa98e2SPeter Wemm 332206f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 332306f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3324c2aa98e2SPeter Wemm { 3325c2aa98e2SPeter Wemm if (tTd(9, 1)) 332606f25ae9SGregory Neil Shapiro dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3327c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3328c2aa98e2SPeter Wemm return NULL; 3329c2aa98e2SPeter Wemm } 3330c2aa98e2SPeter Wemm 3331c2aa98e2SPeter Wemm /* 3332c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3333c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3334c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3335c2aa98e2SPeter Wemm ** unknown. 3336c2aa98e2SPeter Wemm */ 3337c2aa98e2SPeter Wemm 333806f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 333906f25ae9SGregory Neil Shapiro dprintf("host_map_lookup(%s) => ", name); 3340c2aa98e2SPeter Wemm if (*name != '[') 3341c2aa98e2SPeter Wemm { 3342c2aa98e2SPeter Wemm snprintf(hbuf, sizeof hbuf, "%s", name); 3343c2aa98e2SPeter Wemm if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX)) 334406f25ae9SGregory Neil Shapiro ans = hbuf; 3345c2aa98e2SPeter Wemm } 3346c2aa98e2SPeter Wemm else 3347c2aa98e2SPeter Wemm { 334806f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3349193538b7SGregory Neil Shapiro { 3350193538b7SGregory Neil Shapiro if (tTd(9, 1)) 3351193538b7SGregory Neil Shapiro dprintf("FAILED\n"); 335206f25ae9SGregory Neil Shapiro return NULL; 3353193538b7SGregory Neil Shapiro } 335406f25ae9SGregory Neil Shapiro *cp = '\0'; 335506f25ae9SGregory Neil Shapiro 335606f25ae9SGregory Neil Shapiro hp = NULL; 335706f25ae9SGregory Neil Shapiro # if NETINET 335806f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 335906f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 336006f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 336106f25ae9SGregory Neil Shapiro # endif /* NETINET */ 336206f25ae9SGregory Neil Shapiro # if NETINET6 336306f25ae9SGregory Neil Shapiro if (hp == NULL && 336406f25ae9SGregory Neil Shapiro inet_pton(AF_INET6, &name[1], &in6_addr) == 1) 336506f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 336606f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 336706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 336806f25ae9SGregory Neil Shapiro *cp = ']'; 336906f25ae9SGregory Neil Shapiro 337006f25ae9SGregory Neil Shapiro if (hp != NULL) 337106f25ae9SGregory Neil Shapiro { 337206f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 337306f25ae9SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, TRUE, TRUE); 3374193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 3375193538b7SGregory Neil Shapiro freehostent(hp); 3376193538b7SGregory Neil Shapiro hp = NULL; 3377193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 337806f25ae9SGregory Neil Shapiro } 337906f25ae9SGregory Neil Shapiro } 338006f25ae9SGregory Neil Shapiro 338106f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 338206f25ae9SGregory Neil Shapiro 338306f25ae9SGregory Neil Shapiro /* Found an answer */ 338406f25ae9SGregory Neil Shapiro if (ans != NULL) 338506f25ae9SGregory Neil Shapiro { 338606f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 338706f25ae9SGregory Neil Shapiro s->s_namecanon.nc_cname = newstr(ans); 338806f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 338906f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 339006f25ae9SGregory Neil Shapiro else 339106f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 3392193538b7SGregory Neil Shapiro if (tTd(9, 1)) 3393193538b7SGregory Neil Shapiro dprintf("FOUND %s\n", ans); 339406f25ae9SGregory Neil Shapiro return cp; 339506f25ae9SGregory Neil Shapiro } 339606f25ae9SGregory Neil Shapiro 339706f25ae9SGregory Neil Shapiro 339806f25ae9SGregory Neil Shapiro /* No match found */ 3399c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 3400c2aa98e2SPeter Wemm # if NAMED_BIND 3401c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 3402c2aa98e2SPeter Wemm if (tTd(9, 1)) 340306f25ae9SGregory Neil Shapiro dprintf("FAIL (%d)\n", h_errno); 3404c2aa98e2SPeter Wemm switch (h_errno) 3405c2aa98e2SPeter Wemm { 3406c2aa98e2SPeter Wemm case TRY_AGAIN: 3407c2aa98e2SPeter Wemm if (UseNameServer) 3408c2aa98e2SPeter Wemm { 3409c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3410c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3411c2aa98e2SPeter Wemm shortenstring(name, 33)); 3412c2aa98e2SPeter Wemm } 3413c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3414c2aa98e2SPeter Wemm break; 3415c2aa98e2SPeter Wemm 3416c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 3417c2aa98e2SPeter Wemm case NO_DATA: 3418c2aa98e2SPeter Wemm *statp = EX_NOHOST; 3419c2aa98e2SPeter Wemm break; 3420c2aa98e2SPeter Wemm 3421c2aa98e2SPeter Wemm case NO_RECOVERY: 3422c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 3423c2aa98e2SPeter Wemm break; 3424c2aa98e2SPeter Wemm 3425c2aa98e2SPeter Wemm default: 3426c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 3427c2aa98e2SPeter Wemm break; 3428c2aa98e2SPeter Wemm } 342906f25ae9SGregory Neil Shapiro # else /* NAMED_BIND */ 3430c2aa98e2SPeter Wemm if (tTd(9, 1)) 343106f25ae9SGregory Neil Shapiro dprintf("FAIL\n"); 3432c2aa98e2SPeter Wemm *statp = EX_NOHOST; 343306f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3434c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 3435c2aa98e2SPeter Wemm return NULL; 3436c2aa98e2SPeter Wemm } 3437c2aa98e2SPeter Wemm #else /* DAEMON */ 3438c2aa98e2SPeter Wemm /* code for systems without sophisticated networking */ 3439c2aa98e2SPeter Wemm 3440c2aa98e2SPeter Wemm /* 3441c2aa98e2SPeter Wemm ** MYHOSTNAME -- stub version for case of no daemon code. 3442c2aa98e2SPeter Wemm ** 3443c2aa98e2SPeter Wemm ** Can't convert to upper case here because might be a UUCP name. 3444c2aa98e2SPeter Wemm ** 3445c2aa98e2SPeter Wemm ** Mark, you can change this to be anything you want...... 3446c2aa98e2SPeter Wemm */ 3447c2aa98e2SPeter Wemm 3448c2aa98e2SPeter Wemm char ** 3449c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3450c2aa98e2SPeter Wemm char hostbuf[]; 3451c2aa98e2SPeter Wemm int size; 3452c2aa98e2SPeter Wemm { 3453c2aa98e2SPeter Wemm register FILE *f; 3454c2aa98e2SPeter Wemm 3455c2aa98e2SPeter Wemm hostbuf[0] = '\0'; 3456c2aa98e2SPeter Wemm f = fopen("/usr/include/whoami", "r"); 3457c2aa98e2SPeter Wemm if (f != NULL) 3458c2aa98e2SPeter Wemm { 3459c2aa98e2SPeter Wemm (void) fgets(hostbuf, size, f); 3460c2aa98e2SPeter Wemm fixcrlf(hostbuf, TRUE); 3461c2aa98e2SPeter Wemm (void) fclose(f); 3462c2aa98e2SPeter Wemm } 3463602a2b1bSGregory Neil Shapiro if (hostbuf[0] == '\0') 3464602a2b1bSGregory Neil Shapiro (void) strlcpy(hostbuf, "localhost", size); 346506f25ae9SGregory Neil Shapiro return NULL; 3466c2aa98e2SPeter Wemm } 3467c2aa98e2SPeter Wemm /* 346806f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3469c2aa98e2SPeter Wemm ** 3470c2aa98e2SPeter Wemm ** Parameters: 3471c2aa98e2SPeter Wemm ** fd -- the descriptor 3472c2aa98e2SPeter Wemm ** may_be_forged -- an outage that is set to TRUE if the 3473c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 3474c2aa98e2SPeter Wemm ** RealHostAddr; set to FALSE if they do match. 3475c2aa98e2SPeter Wemm ** 3476c2aa98e2SPeter Wemm ** Returns: 3477c2aa98e2SPeter Wemm ** The host name associated with this descriptor, if it can 3478c2aa98e2SPeter Wemm ** be determined. 3479c2aa98e2SPeter Wemm ** NULL otherwise. 3480c2aa98e2SPeter Wemm ** 3481c2aa98e2SPeter Wemm ** Side Effects: 3482c2aa98e2SPeter Wemm ** none 3483c2aa98e2SPeter Wemm */ 3484c2aa98e2SPeter Wemm 3485c2aa98e2SPeter Wemm char * 3486c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3487c2aa98e2SPeter Wemm int fd; 3488c2aa98e2SPeter Wemm bool *may_be_forged; 3489c2aa98e2SPeter Wemm { 3490c2aa98e2SPeter Wemm *may_be_forged = FALSE; 3491c2aa98e2SPeter Wemm return NULL; 3492c2aa98e2SPeter Wemm } 3493c2aa98e2SPeter Wemm /* 349406f25ae9SGregory Neil Shapiro ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3495c2aa98e2SPeter Wemm ** 3496c2aa98e2SPeter Wemm ** Parameters: 3497c2aa98e2SPeter Wemm ** map -- a pointer to the database map. 3498c2aa98e2SPeter Wemm ** name -- a buffer containing a hostname. 3499c2aa98e2SPeter Wemm ** avp -- a pointer to a (cf file defined) argument vector. 3500c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter). 3501c2aa98e2SPeter Wemm ** 3502c2aa98e2SPeter Wemm ** Returns: 3503c2aa98e2SPeter Wemm ** mapped host name 3504c2aa98e2SPeter Wemm ** FALSE otherwise. 3505c2aa98e2SPeter Wemm ** 3506c2aa98e2SPeter Wemm ** Side Effects: 3507c2aa98e2SPeter Wemm ** Looks up the host specified in name. If it is not 3508c2aa98e2SPeter Wemm ** the canonical name for that host, replace it with 3509c2aa98e2SPeter Wemm ** the canonical name. If the name is unknown, or it 3510c2aa98e2SPeter Wemm ** is already the canonical name, leave it unchanged. 3511c2aa98e2SPeter Wemm */ 3512c2aa98e2SPeter Wemm 3513c2aa98e2SPeter Wemm /*ARGSUSED*/ 3514c2aa98e2SPeter Wemm char * 3515c2aa98e2SPeter Wemm host_map_lookup(map, name, avp, statp) 3516c2aa98e2SPeter Wemm MAP *map; 3517c2aa98e2SPeter Wemm char *name; 3518c2aa98e2SPeter Wemm char **avp; 3519c2aa98e2SPeter Wemm char *statp; 3520c2aa98e2SPeter Wemm { 352106f25ae9SGregory Neil Shapiro register struct hostent *hp = NULL; 3522c2aa98e2SPeter Wemm char *cp; 3523c2aa98e2SPeter Wemm 352406f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(name, InetMode); 352506f25ae9SGregory Neil Shapiro if (hp == NULL && InetMode != AF_INET) 352606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(name, AF_INET); 3527c2aa98e2SPeter Wemm if (hp == NULL) 3528c2aa98e2SPeter Wemm { 352906f25ae9SGregory Neil Shapiro # if NAMED_BIND 353006f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 353106f25ae9SGregory Neil Shapiro dprintf("FAIL (%d)\n", h_errno); 353206f25ae9SGregory Neil Shapiro switch (h_errno) 353306f25ae9SGregory Neil Shapiro { 353406f25ae9SGregory Neil Shapiro case TRY_AGAIN: 353506f25ae9SGregory Neil Shapiro if (UseNameServer) 353606f25ae9SGregory Neil Shapiro { 353706f25ae9SGregory Neil Shapiro CurEnv->e_status = "4.4.3"; 353806f25ae9SGregory Neil Shapiro message("851 %s: Name server timeout", 353906f25ae9SGregory Neil Shapiro shortenstring(name, 33)); 354006f25ae9SGregory Neil Shapiro } 354106f25ae9SGregory Neil Shapiro *statp = EX_TEMPFAIL; 354206f25ae9SGregory Neil Shapiro break; 354306f25ae9SGregory Neil Shapiro 354406f25ae9SGregory Neil Shapiro case HOST_NOT_FOUND: 354506f25ae9SGregory Neil Shapiro case NO_DATA: 3546c2aa98e2SPeter Wemm *statp = EX_NOHOST; 354706f25ae9SGregory Neil Shapiro break; 354806f25ae9SGregory Neil Shapiro 354906f25ae9SGregory Neil Shapiro case NO_RECOVERY: 355006f25ae9SGregory Neil Shapiro *statp = EX_SOFTWARE; 355106f25ae9SGregory Neil Shapiro break; 355206f25ae9SGregory Neil Shapiro 355306f25ae9SGregory Neil Shapiro default: 355406f25ae9SGregory Neil Shapiro *statp = EX_UNAVAILABLE; 355506f25ae9SGregory Neil Shapiro break; 355606f25ae9SGregory Neil Shapiro } 355706f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 355806f25ae9SGregory Neil Shapiro *statp = EX_NOHOST; 355906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 3560c2aa98e2SPeter Wemm return NULL; 3561c2aa98e2SPeter Wemm } 3562c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3563c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3564c2aa98e2SPeter Wemm else 3565c2aa98e2SPeter Wemm cp = map_rewrite(map, hp->h_name, strlen(hp->h_name), avp); 3566193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 3567193538b7SGregory Neil Shapiro freehostent(hp); 3568193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 3569c2aa98e2SPeter Wemm return cp; 3570c2aa98e2SPeter Wemm } 3571c2aa98e2SPeter Wemm 3572c2aa98e2SPeter Wemm #endif /* DAEMON */ 3573c2aa98e2SPeter Wemm /* 3574c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 3575c2aa98e2SPeter Wemm */ 3576c2aa98e2SPeter Wemm 3577c2aa98e2SPeter Wemm bool 3578c2aa98e2SPeter Wemm host_map_init(map, args) 3579c2aa98e2SPeter Wemm MAP *map; 3580c2aa98e2SPeter Wemm char *args; 3581c2aa98e2SPeter Wemm { 3582c2aa98e2SPeter Wemm register char *p = args; 3583c2aa98e2SPeter Wemm 3584c2aa98e2SPeter Wemm for (;;) 3585c2aa98e2SPeter Wemm { 3586c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3587c2aa98e2SPeter Wemm p++; 3588c2aa98e2SPeter Wemm if (*p != '-') 3589c2aa98e2SPeter Wemm break; 3590c2aa98e2SPeter Wemm switch (*++p) 3591c2aa98e2SPeter Wemm { 3592c2aa98e2SPeter Wemm case 'a': 3593c2aa98e2SPeter Wemm map->map_app = ++p; 3594c2aa98e2SPeter Wemm break; 3595c2aa98e2SPeter Wemm 3596c2aa98e2SPeter Wemm case 'T': 3597c2aa98e2SPeter Wemm map->map_tapp = ++p; 3598c2aa98e2SPeter Wemm break; 3599c2aa98e2SPeter Wemm 3600c2aa98e2SPeter Wemm case 'm': 3601c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 3602c2aa98e2SPeter Wemm break; 3603c2aa98e2SPeter Wemm 3604c2aa98e2SPeter Wemm case 't': 3605c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 3606c2aa98e2SPeter Wemm break; 360706f25ae9SGregory Neil Shapiro 360806f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 360906f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 361006f25ae9SGregory Neil Shapiro break; 361106f25ae9SGregory Neil Shapiro 361206f25ae9SGregory Neil Shapiro case 'D': 361306f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 361406f25ae9SGregory Neil Shapiro break; 3615c2aa98e2SPeter Wemm } 3616c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 3617c2aa98e2SPeter Wemm p++; 3618c2aa98e2SPeter Wemm if (*p != '\0') 3619c2aa98e2SPeter Wemm *p++ = '\0'; 3620c2aa98e2SPeter Wemm } 3621c2aa98e2SPeter Wemm if (map->map_app != NULL) 3622c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 3623c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 3624c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 3625c2aa98e2SPeter Wemm return TRUE; 3626c2aa98e2SPeter Wemm } 362706f25ae9SGregory Neil Shapiro 362806f25ae9SGregory Neil Shapiro #if NETINET6 362906f25ae9SGregory Neil Shapiro /* 363006f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 363106f25ae9SGregory Neil Shapiro ** 363206f25ae9SGregory Neil Shapiro ** Parameters: 363306f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 363406f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 363506f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 363606f25ae9SGregory Neil Shapiro ** 363706f25ae9SGregory Neil Shapiro ** Returns: 363806f25ae9SGregory Neil Shapiro ** A printable version of that structure. 363906f25ae9SGregory Neil Shapiro */ 364006f25ae9SGregory Neil Shapiro char * 364106f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 364206f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 364306f25ae9SGregory Neil Shapiro char *dst; 364406f25ae9SGregory Neil Shapiro size_t dst_len; 364506f25ae9SGregory Neil Shapiro { 364606f25ae9SGregory Neil Shapiro register char *ap; 364706f25ae9SGregory Neil Shapiro 364806f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 364906f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 365006f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 365106f25ae9SGregory Neil Shapiro dst, dst_len); 365206f25ae9SGregory Neil Shapiro else 365306f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 365406f25ae9SGregory Neil Shapiro return ap; 365506f25ae9SGregory Neil Shapiro } 365606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3657c2aa98e2SPeter Wemm /* 3658c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 3659c2aa98e2SPeter Wemm ** 3660c2aa98e2SPeter Wemm ** Parameters: 3661c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 3662c2aa98e2SPeter Wemm ** 3663c2aa98e2SPeter Wemm ** Returns: 3664c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 3665c2aa98e2SPeter Wemm */ 3666c2aa98e2SPeter Wemm 3667c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 3668c2aa98e2SPeter Wemm 3669c2aa98e2SPeter Wemm # if NETLINK 3670c2aa98e2SPeter Wemm # include <net/if_dl.h> 367106f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 3672c2aa98e2SPeter Wemm 3673c2aa98e2SPeter Wemm char * 3674c2aa98e2SPeter Wemm anynet_ntoa(sap) 3675c2aa98e2SPeter Wemm register SOCKADDR *sap; 3676c2aa98e2SPeter Wemm { 3677c2aa98e2SPeter Wemm register char *bp; 3678c2aa98e2SPeter Wemm register char *ap; 3679c2aa98e2SPeter Wemm int l; 3680c2aa98e2SPeter Wemm static char buf[100]; 3681c2aa98e2SPeter Wemm 3682c2aa98e2SPeter Wemm /* check for null/zero family */ 3683c2aa98e2SPeter Wemm if (sap == NULL) 3684c2aa98e2SPeter Wemm return "NULLADDR"; 3685c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 3686c2aa98e2SPeter Wemm return "0"; 3687c2aa98e2SPeter Wemm 3688c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 3689c2aa98e2SPeter Wemm { 3690c2aa98e2SPeter Wemm # if NETUNIX 3691c2aa98e2SPeter Wemm case AF_UNIX: 3692c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 3693c2aa98e2SPeter Wemm snprintf(buf, sizeof buf, "[UNIX: %.64s]", 3694c2aa98e2SPeter Wemm sap->sunix.sun_path); 3695c2aa98e2SPeter Wemm else 3696c2aa98e2SPeter Wemm snprintf(buf, sizeof buf, "[UNIX: localhost]"); 3697c2aa98e2SPeter Wemm return buf; 369806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 3699c2aa98e2SPeter Wemm 3700c2aa98e2SPeter Wemm # if NETINET 3701c2aa98e2SPeter Wemm case AF_INET: 370206f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 370306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 370406f25ae9SGregory Neil Shapiro 370506f25ae9SGregory Neil Shapiro # if NETINET6 370606f25ae9SGregory Neil Shapiro case AF_INET6: 370706f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 370806f25ae9SGregory Neil Shapiro if (ap != NULL) 370906f25ae9SGregory Neil Shapiro return ap; 371006f25ae9SGregory Neil Shapiro break; 371106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 3712c2aa98e2SPeter Wemm 3713c2aa98e2SPeter Wemm # if NETLINK 3714c2aa98e2SPeter Wemm case AF_LINK: 3715c2aa98e2SPeter Wemm snprintf(buf, sizeof buf, "[LINK: %s]", 3716c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 3717c2aa98e2SPeter Wemm return buf; 371806f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 3719c2aa98e2SPeter Wemm default: 3720c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 3721c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 3722c2aa98e2SPeter Wemm break; 3723c2aa98e2SPeter Wemm } 3724c2aa98e2SPeter Wemm 3725c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 3726c2aa98e2SPeter Wemm (void) snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 3727c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 3728c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 3729c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 3730c2aa98e2SPeter Wemm { 3731c2aa98e2SPeter Wemm (void) snprintf(bp, SPACELEFT(buf, bp), "%02x:", *ap++ & 0377); 3732c2aa98e2SPeter Wemm bp += 3; 3733c2aa98e2SPeter Wemm } 3734c2aa98e2SPeter Wemm *--bp = '\0'; 3735c2aa98e2SPeter Wemm return buf; 3736c2aa98e2SPeter Wemm } 3737c2aa98e2SPeter Wemm /* 3738c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 3739c2aa98e2SPeter Wemm ** 3740c2aa98e2SPeter Wemm ** Parameters: 3741c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 3742c2aa98e2SPeter Wemm ** 3743c2aa98e2SPeter Wemm ** Returns: 3744c2aa98e2SPeter Wemm ** text representation of host name. 3745c2aa98e2SPeter Wemm ** 3746c2aa98e2SPeter Wemm ** Side Effects: 3747c2aa98e2SPeter Wemm ** none. 3748c2aa98e2SPeter Wemm */ 3749c2aa98e2SPeter Wemm 3750c2aa98e2SPeter Wemm char * 3751c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 3752c2aa98e2SPeter Wemm register SOCKADDR *sap; 3753c2aa98e2SPeter Wemm { 3754c2aa98e2SPeter Wemm register struct hostent *hp; 375506f25ae9SGregory Neil Shapiro # if NAMED_BIND 3756c2aa98e2SPeter Wemm int saveretry; 375706f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 375806f25ae9SGregory Neil Shapiro # if NETINET6 375906f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 376006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 3761c2aa98e2SPeter Wemm 3762c2aa98e2SPeter Wemm # if NAMED_BIND 3763c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 3764c2aa98e2SPeter Wemm saveretry = _res.retry; 376506f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 376606f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 3767c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 3768c2aa98e2SPeter Wemm 3769c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 3770c2aa98e2SPeter Wemm { 3771c2aa98e2SPeter Wemm # if NETINET 3772c2aa98e2SPeter Wemm case AF_INET: 3773c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 3774c2aa98e2SPeter Wemm INADDRSZ, 3775c2aa98e2SPeter Wemm AF_INET); 3776c2aa98e2SPeter Wemm break; 377706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 377806f25ae9SGregory Neil Shapiro 377906f25ae9SGregory Neil Shapiro # if NETINET6 378006f25ae9SGregory Neil Shapiro case AF_INET6: 378106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 378206f25ae9SGregory Neil Shapiro IN6ADDRSZ, 378306f25ae9SGregory Neil Shapiro AF_INET6); 378406f25ae9SGregory Neil Shapiro break; 378506f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 3786c2aa98e2SPeter Wemm 3787c2aa98e2SPeter Wemm # if NETISO 3788c2aa98e2SPeter Wemm case AF_ISO: 3789c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 3790c2aa98e2SPeter Wemm sizeof sap->siso.siso_addr, 3791c2aa98e2SPeter Wemm AF_ISO); 3792c2aa98e2SPeter Wemm break; 379306f25ae9SGregory Neil Shapiro # endif /* NETISO */ 3794c2aa98e2SPeter Wemm 3795c2aa98e2SPeter Wemm # if NETUNIX 3796c2aa98e2SPeter Wemm case AF_UNIX: 3797c2aa98e2SPeter Wemm hp = NULL; 3798c2aa98e2SPeter Wemm break; 379906f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 3800c2aa98e2SPeter Wemm 3801c2aa98e2SPeter Wemm default: 3802c2aa98e2SPeter Wemm hp = sm_gethostbyaddr(sap->sa.sa_data, 3803c2aa98e2SPeter Wemm sizeof sap->sa.sa_data, 3804c2aa98e2SPeter Wemm sap->sa.sa_family); 3805c2aa98e2SPeter Wemm break; 3806c2aa98e2SPeter Wemm } 3807c2aa98e2SPeter Wemm 3808c2aa98e2SPeter Wemm # if NAMED_BIND 3809c2aa98e2SPeter Wemm _res.retry = saveretry; 3810c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 3811c2aa98e2SPeter Wemm 381206f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 381306f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 381406f25ae9SGregory Neil Shapiro # if NETINET6 381506f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 381606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 381706f25ae9SGregory Neil Shapiro # if NETINET 381806f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 381906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 382006f25ae9SGregory Neil Shapiro ) 3821193538b7SGregory Neil Shapiro { 3822193538b7SGregory Neil Shapiro char *name; 3823193538b7SGregory Neil Shapiro 3824193538b7SGregory Neil Shapiro name = denlstring((char *) hp->h_name, TRUE, TRUE); 3825193538b7SGregory Neil Shapiro 3826193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 3827193538b7SGregory Neil Shapiro if (name == hp->h_name) 3828193538b7SGregory Neil Shapiro { 3829193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 3830193538b7SGregory Neil Shapiro 3831193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 3832193538b7SGregory Neil Shapiro strlcpy(n, name, sizeof n); 3833193538b7SGregory Neil Shapiro name = n; 3834193538b7SGregory Neil Shapiro } 3835193538b7SGregory Neil Shapiro 3836193538b7SGregory Neil Shapiro freehostent(hp); 3837193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 3838193538b7SGregory Neil Shapiro return name; 3839193538b7SGregory Neil Shapiro } 384006f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 3841193538b7SGregory Neil Shapiro 3842193538b7SGregory Neil Shapiro # if _FFR_FREEHOSTENT && NETINET6 3843193538b7SGregory Neil Shapiro if (hp != NULL) 3844193538b7SGregory Neil Shapiro { 3845193538b7SGregory Neil Shapiro freehostent(hp); 3846193538b7SGregory Neil Shapiro hp = NULL; 3847193538b7SGregory Neil Shapiro } 3848193538b7SGregory Neil Shapiro # endif /* _FFR_FREEHOSTENT && NETINET6 */ 3849193538b7SGregory Neil Shapiro 3850c2aa98e2SPeter Wemm # if NETUNIX 385106f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 3852c2aa98e2SPeter Wemm return "localhost"; 385306f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 3854c2aa98e2SPeter Wemm { 3855c2aa98e2SPeter Wemm static char buf[203]; 3856c2aa98e2SPeter Wemm 3857c2aa98e2SPeter Wemm (void) snprintf(buf, sizeof buf, "[%.200s]", anynet_ntoa(sap)); 3858c2aa98e2SPeter Wemm return buf; 3859c2aa98e2SPeter Wemm } 3860c2aa98e2SPeter Wemm } 386106f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 3862