1c2aa98e2SPeter Wemm /* 213d88268SGregory Neil Shapiro * Copyright (c) 1998-2005 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 1613d88268SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.658 2005/02/02 18:19:28 ca Exp $") 17c2aa98e2SPeter Wemm 18c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 19c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2006f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 21c2aa98e2SPeter Wemm 2240266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 24c2aa98e2SPeter Wemm # include <arpa/inet.h> 2506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 26c2aa98e2SPeter Wemm # if NAMED_BIND 27c2aa98e2SPeter Wemm # ifndef NO_DATA 28c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 2906f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3140266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 32c2aa98e2SPeter Wemm 3342e5d165SGregory Neil Shapiro #if STARTTLS 3442e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3542e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3642e5d165SGregory Neil Shapiro 37c2aa98e2SPeter Wemm #include <sys/time.h> 38c2aa98e2SPeter Wemm 3906f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 40c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 41c2aa98e2SPeter Wemm # include <netinet/ip.h> 4206f25ae9SGregory Neil Shapiro # if HAS_IN_H 4306f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4406f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4506f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4606f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4806f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 4906f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 50c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5106f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5206f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5306f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5406f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5506f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5606f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5806f25ae9SGregory Neil Shapiro 5940266059SGregory Neil Shapiro #include <sm/fdset.h> 6040266059SGregory Neil Shapiro 6140266059SGregory Neil Shapiro /* structure to describe a daemon or a client */ 6206f25ae9SGregory Neil Shapiro struct daemon 6306f25ae9SGregory Neil Shapiro { 6406f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 6506f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 6640266059SGregory Neil Shapiro unsigned short d_port; /* port number */ 6706f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 6806f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 6906f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7006f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7106f25ae9SGregory Neil Shapiro bool d_firsttime; 7206f25ae9SGregory Neil Shapiro int d_socksize; 7306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 7406f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 7506f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 7640266059SGregory Neil Shapiro #if MILTER 7740266059SGregory Neil Shapiro char *d_inputfilterlist; 7840266059SGregory Neil Shapiro struct milter *d_inputfilters[MAXFILTERS]; 7940266059SGregory Neil Shapiro #endif /* MILTER */ 8013d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 8113d88268SGregory Neil Shapiro int d_supersafe; 8213d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 8313d88268SGregory Neil Shapiro #if _FFR_DM_PER_DAEMON 8413d88268SGregory Neil Shapiro int d_dm; /* DeliveryMode */ 8513d88268SGregory Neil Shapiro #endif /* _FFR_DM_PER_DAEMON */ 8606f25ae9SGregory Neil Shapiro }; 8706f25ae9SGregory Neil Shapiro 8806f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8906f25ae9SGregory Neil Shapiro 9013d88268SGregory Neil Shapiro #define SAFE_NOTSET (-1) /* SuperSafe (per daemon) option not set */ 9113d88268SGregory Neil Shapiro /* see also sendmail.h: SuperSafe values */ 9213d88268SGregory Neil Shapiro 9313d88268SGregory Neil Shapiro #define DM_NOTSET (-1) /* DeliveryMode (per daemon) option not set */ 9413d88268SGregory Neil Shapiro /* see also sendmail.h: values for e_sendmode -- send modes */ 9513d88268SGregory Neil Shapiro 96b6bacd31SGregory Neil Shapiro static void connecttimeout __P((int)); 9740266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 9840266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 9940266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 100b6bacd31SGregory Neil Shapiro static void setsockaddroptions __P((char *, DAEMON_T *)); 101b6bacd31SGregory Neil Shapiro static void printdaemonflags __P((DAEMON_T *)); 102b6bacd31SGregory Neil Shapiro static int addr_family __P((char *)); 103b6bacd31SGregory Neil Shapiro static int addrcmp __P((struct hostent *, char *, SOCKADDR *)); 104b6bacd31SGregory Neil Shapiro static void authtimeout __P((int)); 105c2aa98e2SPeter Wemm 106c2aa98e2SPeter Wemm /* 107c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 108c2aa98e2SPeter Wemm ** 109c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 110c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 111c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 112c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 113c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 114c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 115c2aa98e2SPeter Wemm ** 116c2aa98e2SPeter Wemm ** getrequests(e) 117c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 118c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 119c2aa98e2SPeter Wemm ** OutChannel appropriately. 120c2aa98e2SPeter Wemm ** clrdaemon() 121c2aa98e2SPeter Wemm ** Close any open files associated with getting 122c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 123c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 124c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 125c2aa98e2SPeter Wemm ** code (if it cares). 12640266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 127c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 12840266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 12940266059SGregory Neil Shapiro ** describing the error. 130c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 131c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 132c2aa98e2SPeter Wemm */ 13306f25ae9SGregory Neil Shapiro 13406f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 13540266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 13606f25ae9SGregory Neil Shapiro 13740266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 13806f25ae9SGregory Neil Shapiro 13940266059SGregory Neil Shapiro /* 140c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 141c2aa98e2SPeter Wemm ** 142c2aa98e2SPeter Wemm ** Parameters: 143c2aa98e2SPeter Wemm ** e -- the current envelope. 144c2aa98e2SPeter Wemm ** 145c2aa98e2SPeter Wemm ** Returns: 14606f25ae9SGregory Neil Shapiro ** pointer to flags. 147c2aa98e2SPeter Wemm ** 148c2aa98e2SPeter Wemm ** Side Effects: 149c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 150c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 151c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 152c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 153c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 154c2aa98e2SPeter Wemm ** to the communication channel. 15540266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 15640266059SGregory Neil Shapiro ** for some reason. 157c2aa98e2SPeter Wemm */ 158c2aa98e2SPeter Wemm 15906f25ae9SGregory Neil Shapiro BITMAP256 * 160c2aa98e2SPeter Wemm getrequests(e) 161c2aa98e2SPeter Wemm ENVELOPE *e; 162c2aa98e2SPeter Wemm { 163c2aa98e2SPeter Wemm int t; 16406f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 16506f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 166c2aa98e2SPeter Wemm #if XDEBUG 167c2aa98e2SPeter Wemm bool j_has_dot; 16806f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 169065a643dSPeter Wemm char status[MAXLINE]; 17006f25ae9SGregory Neil Shapiro SOCKADDR sa; 17106f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 172605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 173605302a5SGregory Neil Shapiro time_t lastrun; 174605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 17506f25ae9SGregory Neil Shapiro # if NETUNIX 176065a643dSPeter Wemm extern int ControlSocket; 17706f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 17806f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 17940266059SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int, bool)); 180c2aa98e2SPeter Wemm 18106f25ae9SGregory Neil Shapiro 182323f6dcbSGregory Neil Shapiro /* initialize data for function that generates queue ids */ 183323f6dcbSGregory Neil Shapiro init_qid_alg(); 18440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 185c2aa98e2SPeter Wemm { 18606f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 18740266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 18806f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 189c2aa98e2SPeter Wemm } 190193538b7SGregory Neil Shapiro 191c2aa98e2SPeter Wemm /* 192c2aa98e2SPeter Wemm ** Try to actually open the connection. 193c2aa98e2SPeter Wemm */ 194c2aa98e2SPeter Wemm 195c2aa98e2SPeter Wemm if (tTd(15, 1)) 19606f25ae9SGregory Neil Shapiro { 19740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 198193538b7SGregory Neil Shapiro { 19940266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 20006f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 20106f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 20206f25ae9SGregory Neil Shapiro } 203193538b7SGregory Neil Shapiro } 204c2aa98e2SPeter Wemm 205c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 20640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 20740266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 208c2aa98e2SPeter Wemm 209065a643dSPeter Wemm if (opencontrolsocket() < 0) 210065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 2112e43090eSPeter Wemm "daemon could not open control socket %s: %s", 21240266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 213065a643dSPeter Wemm 21440266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 21540266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 2168774250cSGregory Neil Shapiro 21740266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 21806f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 219c2aa98e2SPeter Wemm 220c2aa98e2SPeter Wemm #if XDEBUG 221c2aa98e2SPeter Wemm { 222c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 223c2aa98e2SPeter Wemm 224c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 225c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 226c2aa98e2SPeter Wemm } 22706f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 228c2aa98e2SPeter Wemm 229065a643dSPeter Wemm /* Add parent process as first item */ 230e92d3f3fSGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1, NULL); 231065a643dSPeter Wemm 232c2aa98e2SPeter Wemm if (tTd(15, 1)) 23306f25ae9SGregory Neil Shapiro { 23440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 23540266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: %d\n", 23606f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 23706f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 23806f25ae9SGregory Neil Shapiro } 239c2aa98e2SPeter Wemm 240c2aa98e2SPeter Wemm for (;;) 241c2aa98e2SPeter Wemm { 242c2aa98e2SPeter Wemm register pid_t pid; 243c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 24440266059SGregory Neil Shapiro bool timedout = false; 24540266059SGregory Neil Shapiro bool control = false; 24606f25ae9SGregory Neil Shapiro int save_errno; 247c2aa98e2SPeter Wemm int pipefd[2]; 24840266059SGregory Neil Shapiro time_t now; 24942e5d165SGregory Neil Shapiro #if STARTTLS 25042e5d165SGregory Neil Shapiro long seed; 25142e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 252c2aa98e2SPeter Wemm 253c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 25440266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 255a7ec597cSGregory Neil Shapiro CHECK_RESTART; 2568774250cSGregory Neil Shapiro 25740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 25840266059SGregory Neil Shapiro { 259193538b7SGregory Neil Shapiro /* 26040266059SGregory Neil Shapiro ** XXX do this call outside the loop? 26140266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 262193538b7SGregory Neil Shapiro */ 263193538b7SGregory Neil Shapiro 26440266059SGregory Neil Shapiro now = curtime(); 26540266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 26606f25ae9SGregory Neil Shapiro continue; 26740266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 26840266059SGregory Neil Shapiro continue; 26940266059SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx, 27040266059SGregory Neil Shapiro curdaemon == idx)) 271c2aa98e2SPeter Wemm { 27206f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 273c2aa98e2SPeter Wemm { 274065a643dSPeter Wemm /* close socket so peer fails quickly */ 27506f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 27606f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 277c2aa98e2SPeter Wemm } 278c2aa98e2SPeter Wemm 279065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 28040266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 281065a643dSPeter Wemm } 28206f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 28306f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 284c2aa98e2SPeter Wemm { 28540266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 28606f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 28706f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 28806f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 28906f25ae9SGregory Neil Shapiro 290065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 29140266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 29240266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 293065a643dSPeter Wemm } 294c2aa98e2SPeter Wemm } 295c2aa98e2SPeter Wemm 2968774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 297a7ec597cSGregory Neil Shapiro CHECK_RESTART; 298e92d3f3fSGregory Neil Shapiro 29940266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 30006f25ae9SGregory Neil Shapiro 301c2aa98e2SPeter Wemm #if XDEBUG 302c2aa98e2SPeter Wemm /* check for disaster */ 303c2aa98e2SPeter Wemm { 304c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 305c2aa98e2SPeter Wemm 306c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 307c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 308c2aa98e2SPeter Wemm { 309c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 310c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 311c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 312c2aa98e2SPeter Wemm abort(); 313c2aa98e2SPeter Wemm } 314c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 315c2aa98e2SPeter Wemm { 316c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 317c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 318c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 319c2aa98e2SPeter Wemm abort(); 320c2aa98e2SPeter Wemm } 321c2aa98e2SPeter Wemm } 32206f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 323c2aa98e2SPeter Wemm 324c2aa98e2SPeter Wemm #if 0 325c2aa98e2SPeter Wemm /* 326c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 327c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 328c2aa98e2SPeter Wemm ** so is it worth doing this? 329c2aa98e2SPeter Wemm */ 330c2aa98e2SPeter Wemm 331065a643dSPeter Wemm if (DaemonSocket >= 0 && 33240266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 333c2aa98e2SPeter Wemm log an error here; 33406f25ae9SGregory Neil Shapiro #endif /* 0 */ 33540266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 33606f25ae9SGregory Neil Shapiro 337c2aa98e2SPeter Wemm for (;;) 338c2aa98e2SPeter Wemm { 33940266059SGregory Neil Shapiro bool setproc = false; 340065a643dSPeter Wemm int highest = -1; 341c2aa98e2SPeter Wemm fd_set readfds; 342c2aa98e2SPeter Wemm struct timeval timeout; 343c2aa98e2SPeter Wemm 344a7ec597cSGregory Neil Shapiro CHECK_RESTART; 345c2aa98e2SPeter Wemm FD_ZERO(&readfds); 34640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 347065a643dSPeter Wemm { 34806f25ae9SGregory Neil Shapiro /* wait for a connection */ 34906f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 35006f25ae9SGregory Neil Shapiro { 351193538b7SGregory Neil Shapiro if (!setproc && 352193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 353193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 35406f25ae9SGregory Neil Shapiro { 35540266059SGregory Neil Shapiro sm_setproctitle(true, e, 35606f25ae9SGregory Neil Shapiro "accepting connections"); 35740266059SGregory Neil Shapiro setproc = true; 358065a643dSPeter Wemm } 35906f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 36006f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 36140266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 36240266059SGregory Neil Shapiro &readfds); 36306f25ae9SGregory Neil Shapiro } 36406f25ae9SGregory Neil Shapiro } 36506f25ae9SGregory Neil Shapiro 36606f25ae9SGregory Neil Shapiro #if NETUNIX 367065a643dSPeter Wemm if (ControlSocket >= 0) 368065a643dSPeter Wemm { 369065a643dSPeter Wemm if (ControlSocket > highest) 370065a643dSPeter Wemm highest = ControlSocket; 37140266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 372065a643dSPeter Wemm } 37306f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 37406f25ae9SGregory Neil Shapiro 375065a643dSPeter Wemm timeout.tv_sec = 5; 376c2aa98e2SPeter Wemm timeout.tv_usec = 0; 377c2aa98e2SPeter Wemm 378065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 379c2aa98e2SPeter Wemm NULL, NULL, &timeout); 380065a643dSPeter Wemm 3818774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 382a7ec597cSGregory Neil Shapiro CHECK_RESTART; 383193538b7SGregory Neil Shapiro 384193538b7SGregory Neil Shapiro curdaemon = -1; 38540266059SGregory Neil Shapiro if (doqueuerun()) 386605302a5SGregory Neil Shapiro { 38740266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 388605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 389605302a5SGregory Neil Shapiro lastrun = now; 390605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 391605302a5SGregory Neil Shapiro } 392605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 393605302a5SGregory Neil Shapiro else if (QueueIntvl > 0 && 394605302a5SGregory Neil Shapiro lastrun + QueueIntvl + 60 < now) 395605302a5SGregory Neil Shapiro { 396605302a5SGregory Neil Shapiro 397605302a5SGregory Neil Shapiro /* 398605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 399605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 400605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 401605302a5SGregory Neil Shapiro ** result of the function call. 402605302a5SGregory Neil Shapiro */ 403605302a5SGregory Neil Shapiro 404605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 405605302a5SGregory Neil Shapiro lastrun = now; 406605302a5SGregory Neil Shapiro } 407605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 40840266059SGregory Neil Shapiro 409065a643dSPeter Wemm if (t <= 0) 410065a643dSPeter Wemm { 41140266059SGregory Neil Shapiro timedout = true; 412065a643dSPeter Wemm break; 413065a643dSPeter Wemm } 414c2aa98e2SPeter Wemm 41540266059SGregory Neil Shapiro control = false; 416c2aa98e2SPeter Wemm errno = 0; 41706f25ae9SGregory Neil Shapiro 41806f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 41940266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 42006f25ae9SGregory Neil Shapiro idx = 0; 42140266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 422065a643dSPeter Wemm { 42306f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 42440266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 42540266059SGregory Neil Shapiro &readfds)) 42606f25ae9SGregory Neil Shapiro { 42706f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 428602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 429602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 43006f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 431065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 432065a643dSPeter Wemm &lotherend); 433602a2b1bSGregory Neil Shapiro 434602a2b1bSGregory Neil Shapiro /* 435602a2b1bSGregory Neil Shapiro ** If remote side closes before 436602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 437602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 438602a2b1bSGregory Neil Shapiro */ 439602a2b1bSGregory Neil Shapiro 440602a2b1bSGregory Neil Shapiro if (t >= 0 && 441602a2b1bSGregory Neil Shapiro (lotherend == 0 || 442602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 443602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 444602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 445602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 446602a2b1bSGregory Neil Shapiro { 447602a2b1bSGregory Neil Shapiro (void) close(t); 448602a2b1bSGregory Neil Shapiro t = -1; 449602a2b1bSGregory Neil Shapiro errno = EINVAL; 450602a2b1bSGregory Neil Shapiro } 45106f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 45206f25ae9SGregory Neil Shapiro break; 453065a643dSPeter Wemm } 45440266059SGregory Neil Shapiro if (++idx >= NDaemons) 45506f25ae9SGregory Neil Shapiro idx = 0; 45606f25ae9SGregory Neil Shapiro } 45706f25ae9SGregory Neil Shapiro #if NETUNIX 45806f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 45940266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 460065a643dSPeter Wemm { 461065a643dSPeter Wemm struct sockaddr_un sa_un; 462065a643dSPeter Wemm 463065a643dSPeter Wemm lotherend = sizeof sa_un; 464602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 465065a643dSPeter Wemm t = accept(ControlSocket, 466065a643dSPeter Wemm (struct sockaddr *)&sa_un, 467065a643dSPeter Wemm &lotherend); 468602a2b1bSGregory Neil Shapiro 469602a2b1bSGregory Neil Shapiro /* 470602a2b1bSGregory Neil Shapiro ** If remote side closes before 471602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 472602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 473602a2b1bSGregory Neil Shapiro */ 474602a2b1bSGregory Neil Shapiro 475602a2b1bSGregory Neil Shapiro if (t >= 0 && 476602a2b1bSGregory Neil Shapiro (lotherend == 0 || 477602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 478602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 479602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 480602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 481602a2b1bSGregory Neil Shapiro { 482602a2b1bSGregory Neil Shapiro (void) close(t); 483602a2b1bSGregory Neil Shapiro t = -1; 484602a2b1bSGregory Neil Shapiro errno = EINVAL; 485602a2b1bSGregory Neil Shapiro } 486602a2b1bSGregory Neil Shapiro if (t >= 0) 48740266059SGregory Neil Shapiro control = true; 488065a643dSPeter Wemm } 489193538b7SGregory Neil Shapiro #else /* NETUNIX */ 490193538b7SGregory Neil Shapiro if (curdaemon == -1) 491193538b7SGregory Neil Shapiro { 492193538b7SGregory Neil Shapiro /* No daemon to service */ 493193538b7SGregory Neil Shapiro continue; 494193538b7SGregory Neil Shapiro } 49506f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 496c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 497c2aa98e2SPeter Wemm break; 498c2aa98e2SPeter Wemm } 499065a643dSPeter Wemm if (timedout) 500065a643dSPeter Wemm { 50140266059SGregory Neil Shapiro timedout = false; 502065a643dSPeter Wemm continue; 503065a643dSPeter Wemm } 50406f25ae9SGregory Neil Shapiro save_errno = errno; 50540266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 506c2aa98e2SPeter Wemm if (t < 0) 507c2aa98e2SPeter Wemm { 50806f25ae9SGregory Neil Shapiro errno = save_errno; 509e92d3f3fSGregory Neil Shapiro 510e92d3f3fSGregory Neil Shapiro /* let's ignore these temporary errors */ 511e92d3f3fSGregory Neil Shapiro if (save_errno == EINTR 512e92d3f3fSGregory Neil Shapiro #ifdef EAGAIN 513e92d3f3fSGregory Neil Shapiro || save_errno == EAGAIN 514e92d3f3fSGregory Neil Shapiro #endif /* EAGAIN */ 515e92d3f3fSGregory Neil Shapiro #ifdef ECONNABORTED 516e92d3f3fSGregory Neil Shapiro || save_errno == ECONNABORTED 517e92d3f3fSGregory Neil Shapiro #endif /* ECONNABORTED */ 518e92d3f3fSGregory Neil Shapiro #ifdef EWOULDBLOCK 519e92d3f3fSGregory Neil Shapiro || save_errno == EWOULDBLOCK 520e92d3f3fSGregory Neil Shapiro #endif /* EWOULDBLOCK */ 521e92d3f3fSGregory Neil Shapiro ) 522e92d3f3fSGregory Neil Shapiro continue; 523e92d3f3fSGregory Neil Shapiro 524c2aa98e2SPeter Wemm syserr("getrequests: accept"); 525c2aa98e2SPeter Wemm 526c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 52706f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 52806f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 52906f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 53006f25ae9SGregory Neil Shapiro /* 53106f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 53206f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 53306f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 53406f25ae9SGregory Neil Shapiro */ 53506f25ae9SGregory Neil Shapiro 53640266059SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = curtime() + 15; 53706f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 538c2aa98e2SPeter Wemm continue; 539c2aa98e2SPeter Wemm } 540c2aa98e2SPeter Wemm 54106f25ae9SGregory Neil Shapiro if (!control) 54206f25ae9SGregory Neil Shapiro { 54306f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 54406f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 54506f25ae9SGregory Neil Shapiro { 54606f25ae9SGregory Neil Shapiro case AF_UNSPEC: 54740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54840266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 54906f25ae9SGregory Neil Shapiro break; 55040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 55140266059SGregory Neil Shapiro # if NETUNIX 55240266059SGregory Neil Shapiro case AF_UNIX: 55340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55440266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 55540266059SGregory Neil Shapiro break; 55640266059SGregory Neil Shapiro # endif /* NETUNIX */ 55740266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 55806f25ae9SGregory Neil Shapiro #if NETINET 55906f25ae9SGregory Neil Shapiro case AF_INET: 56040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56140266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 56206f25ae9SGregory Neil Shapiro break; 56306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 56406f25ae9SGregory Neil Shapiro #if NETINET6 56506f25ae9SGregory Neil Shapiro case AF_INET6: 56640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56740266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 56806f25ae9SGregory Neil Shapiro break; 56906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 57006f25ae9SGregory Neil Shapiro #if NETISO 57106f25ae9SGregory Neil Shapiro case AF_ISO: 57240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57340266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 57406f25ae9SGregory Neil Shapiro break; 57506f25ae9SGregory Neil Shapiro #endif /* NETISO */ 57606f25ae9SGregory Neil Shapiro #if NETNS 57706f25ae9SGregory Neil Shapiro case AF_NS: 57840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57940266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 58006f25ae9SGregory Neil Shapiro break; 58106f25ae9SGregory Neil Shapiro #endif /* NETNS */ 58206f25ae9SGregory Neil Shapiro #if NETX25 58306f25ae9SGregory Neil Shapiro case AF_CCITT: 58440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58540266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 58606f25ae9SGregory Neil Shapiro break; 58706f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 58806f25ae9SGregory Neil Shapiro } 58940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 59040266059SGregory Neil Shapiro macid("{daemon_name}"), 59140266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 59206f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 59340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 59440266059SGregory Neil Shapiro macid("{daemon_flags}"), 59540266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 59606f25ae9SGregory Neil Shapiro else 59740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 59840266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 59906f25ae9SGregory Neil Shapiro } 60006f25ae9SGregory Neil Shapiro 601c2aa98e2SPeter Wemm /* 602e92d3f3fSGregory Neil Shapiro ** If connection rate is exceeded here, connection shall be 603e92d3f3fSGregory Neil Shapiro ** refused later by a new call after fork() by the 604e92d3f3fSGregory Neil Shapiro ** validate_connection() function. Closing the connection 605e92d3f3fSGregory Neil Shapiro ** at this point violates RFC 2821. 606e92d3f3fSGregory Neil Shapiro ** Do NOT remove this call, its side effects are needed. 607e92d3f3fSGregory Neil Shapiro */ 608e92d3f3fSGregory Neil Shapiro 609e92d3f3fSGregory Neil Shapiro connection_rate_check(&RealHostAddr, NULL); 610e92d3f3fSGregory Neil Shapiro 611e92d3f3fSGregory Neil Shapiro /* 612c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 613c2aa98e2SPeter Wemm */ 614c2aa98e2SPeter Wemm 615c2aa98e2SPeter Wemm if (tTd(15, 2)) 61640266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 61706f25ae9SGregory Neil Shapiro 61806f25ae9SGregory Neil Shapiro /* 61940266059SGregory Neil Shapiro ** Advance state of PRNG. 62040266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 62106f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 62206f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 62306f25ae9SGregory Neil Shapiro ** are not "really" random. 62406f25ae9SGregory Neil Shapiro */ 62542e5d165SGregory Neil Shapiro #if STARTTLS 62640266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 62742e5d165SGregory Neil Shapiro seed = get_random(); 62840266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 62940266059SGregory Neil Shapiro sizeof NextDiskSpaceCheck); 63040266059SGregory Neil Shapiro RAND_seed((void *) &now, sizeof now); 63142e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 63242e5d165SGregory Neil Shapiro #else /* STARTTLS */ 63306f25ae9SGregory Neil Shapiro (void) get_random(); 63442e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 635c2aa98e2SPeter Wemm 63640266059SGregory Neil Shapiro #if NAMED_BIND 63740266059SGregory Neil Shapiro /* 638e92d3f3fSGregory Neil Shapiro ** Update MX records for FallbackMX. 63940266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 64040266059SGregory Neil Shapiro ** response time. 64140266059SGregory Neil Shapiro */ 64240266059SGregory Neil Shapiro 643e92d3f3fSGregory Neil Shapiro if (FallbackMX != NULL) 644e92d3f3fSGregory Neil Shapiro (void) getfallbackmxrr(FallbackMX); 64540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 64640266059SGregory Neil Shapiro 64713bd1963SGregory Neil Shapiro if (tTd(93, 100)) 64813bd1963SGregory Neil Shapiro { 64913bd1963SGregory Neil Shapiro /* don't fork, handle connection in this process */ 65013bd1963SGregory Neil Shapiro pid = 0; 65113bd1963SGregory Neil Shapiro pipefd[0] = pipefd[1] = -1; 65213bd1963SGregory Neil Shapiro } 65313bd1963SGregory Neil Shapiro else 65413bd1963SGregory Neil Shapiro { 655c2aa98e2SPeter Wemm /* 65613bd1963SGregory Neil Shapiro ** Create a pipe to keep the child from writing to 65713bd1963SGregory Neil Shapiro ** the socket until after the parent has closed 65813bd1963SGregory Neil Shapiro ** it. Otherwise the parent may hang if the child 65913bd1963SGregory Neil Shapiro ** has closed it first. 660c2aa98e2SPeter Wemm */ 661c2aa98e2SPeter Wemm 662c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 663c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 664c2aa98e2SPeter Wemm 66540266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 666c2aa98e2SPeter Wemm pid = fork(); 667c2aa98e2SPeter Wemm if (pid < 0) 668c2aa98e2SPeter Wemm { 669c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 670c2aa98e2SPeter Wemm if (pipefd[0] != -1) 671c2aa98e2SPeter Wemm { 672c2aa98e2SPeter Wemm (void) close(pipefd[0]); 673c2aa98e2SPeter Wemm (void) close(pipefd[1]); 674c2aa98e2SPeter Wemm } 67540266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 67606f25ae9SGregory Neil Shapiro (void) sleep(10); 677c2aa98e2SPeter Wemm (void) close(t); 678c2aa98e2SPeter Wemm continue; 679c2aa98e2SPeter Wemm } 68013bd1963SGregory Neil Shapiro } 681c2aa98e2SPeter Wemm 682c2aa98e2SPeter Wemm if (pid == 0) 683c2aa98e2SPeter Wemm { 684c2aa98e2SPeter Wemm char *p; 68540266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 686c2aa98e2SPeter Wemm 687c2aa98e2SPeter Wemm /* 688c2aa98e2SPeter Wemm ** CHILD -- return to caller. 689c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 690c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 691c2aa98e2SPeter Wemm */ 692c2aa98e2SPeter Wemm 6938774250cSGregory Neil Shapiro /* Reset global flags */ 6948774250cSGregory Neil Shapiro RestartRequest = NULL; 69540266059SGregory Neil Shapiro RestartWorkGroup = false; 6968774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6978774250cSGregory Neil Shapiro PendingSignal = 0; 69840266059SGregory Neil Shapiro CurrentPid = getpid(); 699e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 7008774250cSGregory Neil Shapiro 70140266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 70240266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 70340266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 70440266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 70540266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 70640266059SGregory Neil Shapiro 70740266059SGregory Neil Shapiro /* turn on profiling */ 70840266059SGregory Neil Shapiro /* SM_PROF(0); */ 70940266059SGregory Neil Shapiro 71040266059SGregory Neil Shapiro /* 71140266059SGregory Neil Shapiro ** Initialize exception stack and default exception 71240266059SGregory Neil Shapiro ** handler for child process. 71340266059SGregory Neil Shapiro */ 71440266059SGregory Neil Shapiro 71540266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 7168774250cSGregory Neil Shapiro 71706f25ae9SGregory Neil Shapiro if (!control) 71806f25ae9SGregory Neil Shapiro { 71940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 72040266059SGregory Neil Shapiro macid("{daemon_addr}"), 72140266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 72240266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, "%d", 72306f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 72440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 72540266059SGregory Neil Shapiro macid("{daemon_port}"), status); 72606f25ae9SGregory Neil Shapiro } 72706f25ae9SGregory Neil Shapiro 72840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 72906f25ae9SGregory Neil Shapiro { 73006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 73106f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 73213058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 73306f25ae9SGregory Neil Shapiro } 734065a643dSPeter Wemm clrcontrol(); 73506f25ae9SGregory Neil Shapiro 73606f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 73706f25ae9SGregory Neil Shapiro if (control) 73806f25ae9SGregory Neil Shapiro { 73906f25ae9SGregory Neil Shapiro /* Add control socket process */ 74040266059SGregory Neil Shapiro proc_list_add(CurrentPid, 74140266059SGregory Neil Shapiro "console socket child", 742e92d3f3fSGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1, NULL); 74306f25ae9SGregory Neil Shapiro } 74406f25ae9SGregory Neil Shapiro else 74506f25ae9SGregory Neil Shapiro { 746c2aa98e2SPeter Wemm proc_list_clear(); 747c2aa98e2SPeter Wemm 74840266059SGregory Neil Shapiro /* clean up background delivery children */ 74940266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 75040266059SGregory Neil Shapiro 751065a643dSPeter Wemm /* Add parent process as first child item */ 75240266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 753e92d3f3fSGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1, NULL); 754065a643dSPeter Wemm 75506f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 756c2aa98e2SPeter Wemm QueueIntvl = 0; 75713d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 75813d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_supersafe != 75913d88268SGregory Neil Shapiro SAFE_NOTSET) 76013d88268SGregory Neil Shapiro SuperSafe = Daemons[curdaemon].d_supersafe; 76113d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 76213d88268SGregory Neil Shapiro #if _FFR_DM_PER_DAEMON 76313d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_dm != DM_NOTSET) 76413d88268SGregory Neil Shapiro set_delivery_mode( 76513d88268SGregory Neil Shapiro Daemons[curdaemon].d_dm, e); 76613d88268SGregory Neil Shapiro #endif /* _FFR_DM_PER_DAEMON */ 76713d88268SGregory Neil Shapiro 768c2aa98e2SPeter Wemm 76940266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 770c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 77106f25ae9SGregory Neil Shapiro } 772c2aa98e2SPeter Wemm 773c2aa98e2SPeter Wemm if (pipefd[0] != -1) 774c2aa98e2SPeter Wemm { 775c2aa98e2SPeter Wemm auto char c; 776c2aa98e2SPeter Wemm 777c2aa98e2SPeter Wemm /* 778c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 779c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 780c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 781c2aa98e2SPeter Wemm ** socket until after the parent has closed 782c2aa98e2SPeter Wemm ** the pipe. 783c2aa98e2SPeter Wemm */ 784c2aa98e2SPeter Wemm 785c2aa98e2SPeter Wemm /* close the write end of the pipe */ 786c2aa98e2SPeter Wemm (void) close(pipefd[1]); 787c2aa98e2SPeter Wemm 788c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 789c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 790c2aa98e2SPeter Wemm errno == EINTR) 791c2aa98e2SPeter Wemm continue; 792c2aa98e2SPeter Wemm (void) close(pipefd[0]); 793c2aa98e2SPeter Wemm } 794c2aa98e2SPeter Wemm 79506f25ae9SGregory Neil Shapiro /* control socket processing */ 79606f25ae9SGregory Neil Shapiro if (control) 79706f25ae9SGregory Neil Shapiro { 79806f25ae9SGregory Neil Shapiro control_command(t, e); 79906f25ae9SGregory Neil Shapiro /* NOTREACHED */ 80006f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 80106f25ae9SGregory Neil Shapiro } 80206f25ae9SGregory Neil Shapiro 803c2aa98e2SPeter Wemm /* determine host name */ 804c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 80540266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 806c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 807c2aa98e2SPeter Wemm RealHostName = newstr(p); 80806f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 80906f25ae9SGregory Neil Shapiro { 81040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 81140266059SGregory Neil Shapiro macid("{client_resolve}"), 81240266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 81306f25ae9SGregory Neil Shapiro } 81406f25ae9SGregory Neil Shapiro else 815e92d3f3fSGregory Neil Shapiro { 81640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 81740266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 818e92d3f3fSGregory Neil Shapiro } 81940266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 820605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 821c2aa98e2SPeter Wemm 82240266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 82340266059SGregory Neil Shapiro SM_TIME_DEFAULT, 82440266059SGregory Neil Shapiro (void *) &t, 825e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, 82640266059SGregory Neil Shapiro NULL)) == NULL || 827c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 82840266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 82940266059SGregory Neil Shapiro SM_TIME_DEFAULT, 83040266059SGregory Neil Shapiro (void *) &t, 831e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, 83240266059SGregory Neil Shapiro NULL)) == NULL) 833c2aa98e2SPeter Wemm { 83440266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 83540266059SGregory Neil Shapiro t); 83640266059SGregory Neil Shapiro finis(false, true, EX_OK); 837c2aa98e2SPeter Wemm } 83840266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 839c2aa98e2SPeter Wemm 840c2aa98e2SPeter Wemm InChannel = inchannel; 841c2aa98e2SPeter Wemm OutChannel = outchannel; 84240266059SGregory Neil Shapiro DisConnected = false; 843c2aa98e2SPeter Wemm 84440266059SGregory Neil Shapiro #if XLA 845c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 846c2aa98e2SPeter Wemm { 84706f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 84840266059SGregory Neil Shapiro finis(false, true, EX_OK); 849c2aa98e2SPeter Wemm } 85006f25ae9SGregory Neil Shapiro #endif /* XLA */ 85106f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 85240266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 85340266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 85406f25ae9SGregory Neil Shapiro { 85506f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 85606f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 85740266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 85840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 85940266059SGregory Neil Shapiro macid("{if_name}"), p); 86006f25ae9SGregory Neil Shapiro 86140266059SGregory Neil Shapiro /* 86240266059SGregory Neil Shapiro ** Do this only if it is not the loopback 86340266059SGregory Neil Shapiro ** interface. 86440266059SGregory Neil Shapiro */ 86540266059SGregory Neil Shapiro 86606f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 86706f25ae9SGregory Neil Shapiro { 86840266059SGregory Neil Shapiro char *addr; 86940266059SGregory Neil Shapiro char family[5]; 87040266059SGregory Neil Shapiro 87140266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 87240266059SGregory Neil Shapiro (void) sm_snprintf(family, 87340266059SGregory Neil Shapiro sizeof(family), 87440266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 87540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 87640266059SGregory Neil Shapiro A_TEMP, 87740266059SGregory Neil Shapiro macid("{if_addr}"), addr); 87840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 87940266059SGregory Neil Shapiro A_TEMP, 88040266059SGregory Neil Shapiro macid("{if_family}"), family); 88106f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 88240266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 88340266059SGregory Neil Shapiro addr, family); 88406f25ae9SGregory Neil Shapiro } 88506f25ae9SGregory Neil Shapiro else 88606f25ae9SGregory Neil Shapiro { 88740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 88840266059SGregory Neil Shapiro A_PERM, 88940266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 89040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 89140266059SGregory Neil Shapiro A_PERM, 89240266059SGregory Neil Shapiro macid("{if_family}"), NULL); 89306f25ae9SGregory Neil Shapiro } 89406f25ae9SGregory Neil Shapiro } 89506f25ae9SGregory Neil Shapiro else 89606f25ae9SGregory Neil Shapiro { 89706f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 89840266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 89940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 90040266059SGregory Neil Shapiro macid("{if_name}"), NULL); 90140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 90240266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 90340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 90440266059SGregory Neil Shapiro macid("{if_family}"), NULL); 90506f25ae9SGregory Neil Shapiro } 906c2aa98e2SPeter Wemm break; 907c2aa98e2SPeter Wemm } 908c2aa98e2SPeter Wemm 909c2aa98e2SPeter Wemm /* parent -- keep track of children */ 91006f25ae9SGregory Neil Shapiro if (control) 91106f25ae9SGregory Neil Shapiro { 91240266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 91340266059SGregory Neil Shapiro "control socket server child"); 914e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1, NULL); 91506f25ae9SGregory Neil Shapiro } 91606f25ae9SGregory Neil Shapiro else 91706f25ae9SGregory Neil Shapiro { 91840266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 91906f25ae9SGregory Neil Shapiro "SMTP server child for %s", 920065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 921e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1, 922e92d3f3fSGregory Neil Shapiro &RealHostAddr); 92306f25ae9SGregory Neil Shapiro } 92440266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 925c2aa98e2SPeter Wemm 926c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 927c2aa98e2SPeter Wemm if (pipefd[0] != -1) 92806f25ae9SGregory Neil Shapiro { 929c2aa98e2SPeter Wemm (void) close(pipefd[0]); 93006f25ae9SGregory Neil Shapiro pipefd[0] = -1; 93106f25ae9SGregory Neil Shapiro } 932c2aa98e2SPeter Wemm 933c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 934c2aa98e2SPeter Wemm (void) close(t); 935c2aa98e2SPeter Wemm 936c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 937c2aa98e2SPeter Wemm if (pipefd[1] != -1) 93806f25ae9SGregory Neil Shapiro { 939c2aa98e2SPeter Wemm (void) close(pipefd[1]); 94006f25ae9SGregory Neil Shapiro pipefd[1] = -1; 941c2aa98e2SPeter Wemm } 94206f25ae9SGregory Neil Shapiro } 943c2aa98e2SPeter Wemm if (tTd(15, 2)) 94440266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 94540266059SGregory Neil Shapiro 94640266059SGregory Neil Shapiro #if MILTER 94740266059SGregory Neil Shapiro /* set the filters for this daemon */ 94840266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 94940266059SGregory Neil Shapiro { 95040266059SGregory Neil Shapiro for (i = 0; 95113bd1963SGregory Neil Shapiro (i < MAXFILTERS && 95213bd1963SGregory Neil Shapiro Daemons[curdaemon].d_inputfilters[i] != NULL); 95340266059SGregory Neil Shapiro i++) 95440266059SGregory Neil Shapiro { 95540266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 95640266059SGregory Neil Shapiro } 95740266059SGregory Neil Shapiro if (i < MAXFILTERS) 95840266059SGregory Neil Shapiro InputFilters[i] = NULL; 95940266059SGregory Neil Shapiro } 96040266059SGregory Neil Shapiro #endif /* MILTER */ 96106f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 962c2aa98e2SPeter Wemm } 96340266059SGregory Neil Shapiro 96440266059SGregory Neil Shapiro /* 96540266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 96640266059SGregory Neil Shapiro ** 96740266059SGregory Neil Shapiro ** Parameters: 96840266059SGregory Neil Shapiro ** e -- envelope. 96940266059SGregory Neil Shapiro ** 97040266059SGregory Neil Shapiro ** Returns: 97140266059SGregory Neil Shapiro ** none. 97240266059SGregory Neil Shapiro ** 97340266059SGregory Neil Shapiro ** Side Effects: 97440266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 97540266059SGregory Neil Shapiro */ 97640266059SGregory Neil Shapiro 97740266059SGregory Neil Shapiro static void 97840266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 97940266059SGregory Neil Shapiro ENVELOPE *e; 98040266059SGregory Neil Shapiro { 98140266059SGregory Neil Shapiro bool logged = false; 98240266059SGregory Neil Shapiro int idx; 98340266059SGregory Neil Shapiro time_t now; 98440266059SGregory Neil Shapiro 98540266059SGregory Neil Shapiro now = curtime(); 98640266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 98740266059SGregory Neil Shapiro return; 98840266059SGregory Neil Shapiro 98940266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 99040266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 99140266059SGregory Neil Shapiro { 99240266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 99340266059SGregory Neil Shapiro { 99440266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 99540266059SGregory Neil Shapiro continue; 99640266059SGregory Neil Shapiro 99740266059SGregory Neil Shapiro /* log only if not logged before */ 99840266059SGregory Neil Shapiro if (!logged) 99940266059SGregory Neil Shapiro { 100040266059SGregory Neil Shapiro if (LogLevel > 8) 100140266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 100240266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 100340266059SGregory Neil Shapiro MinBlocksFree); 100440266059SGregory Neil Shapiro sm_setproctitle(true, e, 100540266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 100640266059SGregory Neil Shapiro MinBlocksFree); 100740266059SGregory Neil Shapiro logged = true; 100840266059SGregory Neil Shapiro } 100940266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 101040266059SGregory Neil Shapiro } 101140266059SGregory Neil Shapiro } 101240266059SGregory Neil Shapiro else 101340266059SGregory Neil Shapiro { 101440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 101540266059SGregory Neil Shapiro { 101640266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 101740266059SGregory Neil Shapiro continue; 101840266059SGregory Neil Shapiro 101940266059SGregory Neil Shapiro /* log only if not logged before */ 102040266059SGregory Neil Shapiro if (!logged) 102140266059SGregory Neil Shapiro { 102240266059SGregory Neil Shapiro if (LogLevel > 8) 102340266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 102440266059SGregory Neil Shapiro "accepting new messages (again)"); 102540266059SGregory Neil Shapiro logged = true; 102640266059SGregory Neil Shapiro } 102740266059SGregory Neil Shapiro 102840266059SGregory Neil Shapiro /* title will be set later */ 102940266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 103040266059SGregory Neil Shapiro } 103140266059SGregory Neil Shapiro } 103240266059SGregory Neil Shapiro 103340266059SGregory Neil Shapiro /* only check disk space once a minute */ 103440266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 103540266059SGregory Neil Shapiro } 103640266059SGregory Neil Shapiro 103740266059SGregory Neil Shapiro /* 103806f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 1039c2aa98e2SPeter Wemm ** 104006f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 1041c2aa98e2SPeter Wemm ** 1042c2aa98e2SPeter Wemm ** Parameters: 104306f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 1044c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 1045c2aa98e2SPeter Wemm ** 1046c2aa98e2SPeter Wemm ** Returns: 1047c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 1048c2aa98e2SPeter Wemm ** 1049c2aa98e2SPeter Wemm ** Side Effects: 1050c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 1051c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 1052c2aa98e2SPeter Wemm */ 1053c2aa98e2SPeter Wemm 1054c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1055c2aa98e2SPeter Wemm 105606f25ae9SGregory Neil Shapiro static int 105706f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 105840266059SGregory Neil Shapiro DAEMON_T *d; 1059c2aa98e2SPeter Wemm bool firsttime; 1060c2aa98e2SPeter Wemm { 1061c2aa98e2SPeter Wemm int on = 1; 106206f25ae9SGregory Neil Shapiro int fdflags; 106306f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1064c2aa98e2SPeter Wemm int ntries = 0; 106506f25ae9SGregory Neil Shapiro int save_errno; 1066c2aa98e2SPeter Wemm 1067c2aa98e2SPeter Wemm if (tTd(15, 2)) 106840266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1069c2aa98e2SPeter Wemm 1070c2aa98e2SPeter Wemm do 1071c2aa98e2SPeter Wemm { 1072c2aa98e2SPeter Wemm if (ntries > 0) 107306f25ae9SGregory Neil Shapiro (void) sleep(5); 107406f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1075c2aa98e2SPeter Wemm { 107640266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 107740266059SGregory Neil Shapiro # if NETUNIX 107840266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 107940266059SGregory Neil Shapiro { 108040266059SGregory Neil Shapiro int rval; 108140266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 108240266059SGregory Neil Shapiro 108340266059SGregory Neil Shapiro /* if not safe, don't use it */ 108440266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 108540266059SGregory Neil Shapiro RunAsUid, RunAsGid, 108640266059SGregory Neil Shapiro RunAsUserName, sff, 108740266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 108840266059SGregory Neil Shapiro if (rval != 0) 108940266059SGregory Neil Shapiro { 109040266059SGregory Neil Shapiro save_errno = errno; 109140266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 109240266059SGregory Neil Shapiro d->d_name, 109340266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 109440266059SGregory Neil Shapiro goto fail; 109540266059SGregory Neil Shapiro } 109640266059SGregory Neil Shapiro 109740266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 109840266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 109940266059SGregory Neil Shapiro } 110040266059SGregory Neil Shapiro # endif /* NETUNIX */ 110140266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 110206f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 110306f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 110406f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1105c2aa98e2SPeter Wemm { 110606f25ae9SGregory Neil Shapiro save_errno = errno; 110740266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 110840266059SGregory Neil Shapiro d->d_name); 110940266059SGregory Neil Shapiro fail: 111040266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 111140266059SGregory Neil Shapiro (!transienterror(save_errno) || 111240266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 111340266059SGregory Neil Shapiro { 111440266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 111540266059SGregory Neil Shapiro d->d_name); 111640266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 111740266059SGregory Neil Shapiro d->d_socket = -1; 111840266059SGregory Neil Shapiro return -1; 111940266059SGregory Neil Shapiro } 1120c2aa98e2SPeter Wemm severe: 1121c2aa98e2SPeter Wemm if (LogLevel > 0) 1122c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 112340266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 112440266059SGregory Neil Shapiro d->d_name); 112506f25ae9SGregory Neil Shapiro d->d_socket = -1; 1126c2aa98e2SPeter Wemm continue; 1127c2aa98e2SPeter Wemm } 1128c2aa98e2SPeter Wemm 112913bd1963SGregory Neil Shapiro if (SM_FD_SETSIZE > 0 && d->d_socket >= SM_FD_SETSIZE) 113013bd1963SGregory Neil Shapiro { 113113bd1963SGregory Neil Shapiro save_errno = EINVAL; 113213bd1963SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: server SMTP socket (%d) too large", 113313bd1963SGregory Neil Shapiro d->d_name, d->d_socket); 113413bd1963SGregory Neil Shapiro goto fail; 113513bd1963SGregory Neil Shapiro } 113613bd1963SGregory Neil Shapiro 1137c2aa98e2SPeter Wemm /* turn on network debugging? */ 1138c2aa98e2SPeter Wemm if (tTd(15, 101)) 113906f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1140c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1141c2aa98e2SPeter Wemm sizeof on); 1142c2aa98e2SPeter Wemm 114306f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1144c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 114506f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1146c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 1147c2aa98e2SPeter Wemm 1148c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 114906f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1150c2aa98e2SPeter Wemm { 115106f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1152c2aa98e2SPeter Wemm SO_RCVBUF, 115306f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 115406f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 115506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1156c2aa98e2SPeter Wemm } 115706f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 115806f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 115906f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 116006f25ae9SGregory Neil Shapiro { 116106f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 116206f25ae9SGregory Neil Shapiro SO_SNDBUF, 116306f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 116406f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 116506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 116606f25ae9SGregory Neil Shapiro } 116706f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1168c2aa98e2SPeter Wemm 116906f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 117006f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 117106f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 117206f25ae9SGregory Neil Shapiro { 117306f25ae9SGregory Neil Shapiro save_errno = errno; 117406f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 117506f25ae9SGregory Neil Shapiro d->d_name, 117606f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 117740266059SGregory Neil Shapiro sm_errstring(save_errno)); 117806f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 117906f25ae9SGregory Neil Shapiro goto severe; 118006f25ae9SGregory Neil Shapiro } 118106f25ae9SGregory Neil Shapiro 118206f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1183c2aa98e2SPeter Wemm { 118440266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 118540266059SGregory Neil Shapiro # ifdef NETUNIX 118640266059SGregory Neil Shapiro case AF_UNIX: 118740266059SGregory Neil Shapiro socksize = sizeof d->d_addr.sunix; 118840266059SGregory Neil Shapiro break; 118940266059SGregory Neil Shapiro # endif /* NETUNIX */ 119040266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1191c2aa98e2SPeter Wemm #if NETINET 1192c2aa98e2SPeter Wemm case AF_INET: 119306f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1194c2aa98e2SPeter Wemm break; 119506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 119606f25ae9SGregory Neil Shapiro 119706f25ae9SGregory Neil Shapiro #if NETINET6 119806f25ae9SGregory Neil Shapiro case AF_INET6: 119906f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 120006f25ae9SGregory Neil Shapiro break; 120106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1202c2aa98e2SPeter Wemm 1203c2aa98e2SPeter Wemm #if NETISO 1204c2aa98e2SPeter Wemm case AF_ISO: 120506f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1206c2aa98e2SPeter Wemm break; 120706f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1208c2aa98e2SPeter Wemm 1209c2aa98e2SPeter Wemm default: 121006f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1211c2aa98e2SPeter Wemm break; 1212c2aa98e2SPeter Wemm } 1213c2aa98e2SPeter Wemm 121406f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1215c2aa98e2SPeter Wemm { 1216c2aa98e2SPeter Wemm /* probably another daemon already */ 121706f25ae9SGregory Neil Shapiro save_errno = errno; 121806f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 121906f25ae9SGregory Neil Shapiro d->d_name); 122006f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 122140266059SGregory Neil Shapiro goto fail; 1222c2aa98e2SPeter Wemm } 1223c2aa98e2SPeter Wemm } 122406f25ae9SGregory Neil Shapiro if (!firsttime && 122506f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1226c2aa98e2SPeter Wemm { 122706f25ae9SGregory Neil Shapiro save_errno = errno; 122806f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 122906f25ae9SGregory Neil Shapiro d->d_name); 123006f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1231c2aa98e2SPeter Wemm goto severe; 1232c2aa98e2SPeter Wemm } 1233c2aa98e2SPeter Wemm return socksize; 123406f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 123506f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 123606f25ae9SGregory Neil Shapiro d->d_name); 1237065a643dSPeter Wemm /* NOTREACHED */ 1238c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1239c2aa98e2SPeter Wemm } 124040266059SGregory Neil Shapiro /* 124106f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 124206f25ae9SGregory Neil Shapiro ** 124306f25ae9SGregory Neil Shapiro ** Parameters: 124406f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 124506f25ae9SGregory Neil Shapiro ** 124606f25ae9SGregory Neil Shapiro ** Returns: 124706f25ae9SGregory Neil Shapiro ** port number on which daemon should run 124806f25ae9SGregory Neil Shapiro ** 124906f25ae9SGregory Neil Shapiro */ 125040266059SGregory Neil Shapiro 125140266059SGregory Neil Shapiro static unsigned short 125206f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 125306f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 125406f25ae9SGregory Neil Shapiro { 125540266059SGregory Neil Shapiro unsigned short port; 125606f25ae9SGregory Neil Shapiro 125706f25ae9SGregory Neil Shapiro /* 125806f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 125906f25ae9SGregory Neil Shapiro */ 126006f25ae9SGregory Neil Shapiro 126106f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 126206f25ae9SGregory Neil Shapiro { 126306f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 126406f25ae9SGregory Neil Shapiro #if NETINET 126506f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 126606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 126706f25ae9SGregory Neil Shapiro } 126806f25ae9SGregory Neil Shapiro 126906f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 127006f25ae9SGregory Neil Shapiro { 127106f25ae9SGregory Neil Shapiro #if NETINET 127206f25ae9SGregory Neil Shapiro case AF_INET: 127306f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 127406f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 127506f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 127606f25ae9SGregory Neil Shapiro break; 127706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 127806f25ae9SGregory Neil Shapiro 127906f25ae9SGregory Neil Shapiro #if NETINET6 128006f25ae9SGregory Neil Shapiro case AF_INET6: 128106f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 128206f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 128306f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 128406f25ae9SGregory Neil Shapiro break; 128506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 128606f25ae9SGregory Neil Shapiro 128706f25ae9SGregory Neil Shapiro default: 128806f25ae9SGregory Neil Shapiro /* unknown protocol */ 128906f25ae9SGregory Neil Shapiro port = 0; 129006f25ae9SGregory Neil Shapiro break; 129106f25ae9SGregory Neil Shapiro } 129206f25ae9SGregory Neil Shapiro if (port == 0) 129306f25ae9SGregory Neil Shapiro { 129406f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 129506f25ae9SGregory Neil Shapiro port = htons(25); 129606f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 129706f25ae9SGregory Neil Shapiro { 129806f25ae9SGregory Neil Shapiro register struct servent *sp; 129906f25ae9SGregory Neil Shapiro 130006f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 130106f25ae9SGregory Neil Shapiro if (sp == NULL) 130206f25ae9SGregory Neil Shapiro { 130306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 130406f25ae9SGregory Neil Shapiro port = htons(25); 130506f25ae9SGregory Neil Shapiro } 130606f25ae9SGregory Neil Shapiro else 130706f25ae9SGregory Neil Shapiro port = sp->s_port; 130806f25ae9SGregory Neil Shapiro } 130906f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 131006f25ae9SGregory Neil Shapiro } 131106f25ae9SGregory Neil Shapiro 131206f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 131306f25ae9SGregory Neil Shapiro { 131406f25ae9SGregory Neil Shapiro #if NETINET 131506f25ae9SGregory Neil Shapiro case AF_INET: 131606f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 131706f25ae9SGregory Neil Shapiro break; 131806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 131906f25ae9SGregory Neil Shapiro 132006f25ae9SGregory Neil Shapiro #if NETINET6 132106f25ae9SGregory Neil Shapiro case AF_INET6: 132206f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 132306f25ae9SGregory Neil Shapiro break; 132406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 132506f25ae9SGregory Neil Shapiro 132606f25ae9SGregory Neil Shapiro default: 132706f25ae9SGregory Neil Shapiro /* unknown protocol */ 132806f25ae9SGregory Neil Shapiro break; 132906f25ae9SGregory Neil Shapiro } 133040266059SGregory Neil Shapiro return port; 133106f25ae9SGregory Neil Shapiro } 133240266059SGregory Neil Shapiro /* 1333c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1334c2aa98e2SPeter Wemm ** 1335c2aa98e2SPeter Wemm ** Parameters: 1336c2aa98e2SPeter Wemm ** none. 1337c2aa98e2SPeter Wemm ** 1338c2aa98e2SPeter Wemm ** Returns: 1339c2aa98e2SPeter Wemm ** none. 1340c2aa98e2SPeter Wemm ** 1341c2aa98e2SPeter Wemm ** Side Effects: 1342c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1343c2aa98e2SPeter Wemm */ 1344c2aa98e2SPeter Wemm 1345c2aa98e2SPeter Wemm void 1346c2aa98e2SPeter Wemm clrdaemon() 1347c2aa98e2SPeter Wemm { 134806f25ae9SGregory Neil Shapiro int i; 134906f25ae9SGregory Neil Shapiro 135040266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 135106f25ae9SGregory Neil Shapiro { 135206f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 135306f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 135406f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 135506f25ae9SGregory Neil Shapiro } 1356c2aa98e2SPeter Wemm } 135740266059SGregory Neil Shapiro 135840266059SGregory Neil Shapiro /* 135940266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 136040266059SGregory Neil Shapiro ** 136140266059SGregory Neil Shapiro ** Parameters: 136240266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 136340266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 136440266059SGregory Neil Shapiro ** 136540266059SGregory Neil Shapiro ** Returns: 136640266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 136740266059SGregory Neil Shapiro ** 136840266059SGregory Neil Shapiro ** Side Effects: 136940266059SGregory Neil Shapiro ** fills in modifiers. 137040266059SGregory Neil Shapiro */ 137140266059SGregory Neil Shapiro 137240266059SGregory Neil Shapiro char * 137340266059SGregory Neil Shapiro getmodifiers(v, modifiers) 137440266059SGregory Neil Shapiro char *v; 137540266059SGregory Neil Shapiro BITMAP256 modifiers; 137640266059SGregory Neil Shapiro { 137740266059SGregory Neil Shapiro int l; 137840266059SGregory Neil Shapiro char *h, *f, *flags; 137940266059SGregory Neil Shapiro 138040266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 138140266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 138240266059SGregory Neil Shapiro 138340266059SGregory Neil Shapiro /* is someone joking? */ 138440266059SGregory Neil Shapiro if (l < 0 || l > 256) 138540266059SGregory Neil Shapiro { 138640266059SGregory Neil Shapiro if (LogLevel > 2) 138740266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 138840266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 138940266059SGregory Neil Shapiro return NULL; 139040266059SGregory Neil Shapiro } 139140266059SGregory Neil Shapiro flags = xalloc(l); 139240266059SGregory Neil Shapiro f = flags; 139340266059SGregory Neil Shapiro clrbitmap(modifiers); 139440266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 139540266059SGregory Neil Shapiro { 139640266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 139740266059SGregory Neil Shapiro { 139840266059SGregory Neil Shapiro setbitn(*h, modifiers); 139940266059SGregory Neil Shapiro if (flags != f) 140040266059SGregory Neil Shapiro *flags++ = ' '; 140140266059SGregory Neil Shapiro *flags++ = *h; 140240266059SGregory Neil Shapiro if (isupper(*h)) 140340266059SGregory Neil Shapiro *flags++ = *h; 140440266059SGregory Neil Shapiro } 140540266059SGregory Neil Shapiro } 140640266059SGregory Neil Shapiro *flags++ = '\0'; 140740266059SGregory Neil Shapiro return f; 140840266059SGregory Neil Shapiro } 140940266059SGregory Neil Shapiro 141040266059SGregory Neil Shapiro /* 141140266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 141240266059SGregory Neil Shapiro ** 141340266059SGregory Neil Shapiro ** Parameters: 141440266059SGregory Neil Shapiro ** flag -- the flag to test. 141540266059SGregory Neil Shapiro ** 141640266059SGregory Neil Shapiro ** Returns: 141740266059SGregory Neil Shapiro ** true iff all daemons have set flag. 141840266059SGregory Neil Shapiro */ 141940266059SGregory Neil Shapiro 142040266059SGregory Neil Shapiro bool 142140266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 142240266059SGregory Neil Shapiro int flag; 142340266059SGregory Neil Shapiro { 142440266059SGregory Neil Shapiro int i; 142540266059SGregory Neil Shapiro 142640266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 142740266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 142840266059SGregory Neil Shapiro return false; 142940266059SGregory Neil Shapiro return true; 143040266059SGregory Neil Shapiro } 143140266059SGregory Neil Shapiro 143240266059SGregory Neil Shapiro /* 143306f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1434c2aa98e2SPeter Wemm ** 1435c2aa98e2SPeter Wemm ** Parameters: 1436c2aa98e2SPeter Wemm ** p -- the options line. 143706f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1438c2aa98e2SPeter Wemm ** 1439c2aa98e2SPeter Wemm ** Returns: 1440c2aa98e2SPeter Wemm ** none. 1441c2aa98e2SPeter Wemm */ 1442c2aa98e2SPeter Wemm 144306f25ae9SGregory Neil Shapiro static void 144406f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1445b6bacd31SGregory Neil Shapiro char *p; 144640266059SGregory Neil Shapiro DAEMON_T *d; 1447c2aa98e2SPeter Wemm { 144806f25ae9SGregory Neil Shapiro #if NETISO 1449193538b7SGregory Neil Shapiro short portno; 145006f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1451193538b7SGregory Neil Shapiro char *port = NULL; 1452193538b7SGregory Neil Shapiro char *addr = NULL; 145306f25ae9SGregory Neil Shapiro 145406f25ae9SGregory Neil Shapiro #if NETINET 145506f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 145606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 145706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 1458c2aa98e2SPeter Wemm 1459c2aa98e2SPeter Wemm while (p != NULL) 1460c2aa98e2SPeter Wemm { 1461c2aa98e2SPeter Wemm register char *f; 1462c2aa98e2SPeter Wemm register char *v; 1463c2aa98e2SPeter Wemm 1464c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1465c2aa98e2SPeter Wemm p++; 1466c2aa98e2SPeter Wemm if (*p == '\0') 1467c2aa98e2SPeter Wemm break; 1468c2aa98e2SPeter Wemm f = p; 1469c2aa98e2SPeter Wemm p = strchr(p, ','); 1470c2aa98e2SPeter Wemm if (p != NULL) 1471c2aa98e2SPeter Wemm *p++ = '\0'; 1472c2aa98e2SPeter Wemm v = strchr(f, '='); 1473c2aa98e2SPeter Wemm if (v == NULL) 1474c2aa98e2SPeter Wemm continue; 1475c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1476c2aa98e2SPeter Wemm continue; 1477c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1478c2aa98e2SPeter Wemm *f = toupper(*f); 147913d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 148013d88268SGregory Neil Shapiro d->d_supersafe = SAFE_NOTSET; 148113d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 148213d88268SGregory Neil Shapiro #if _FFR_DM_PER_DAEMON 148313d88268SGregory Neil Shapiro d->d_dm = DM_NOTSET; 148413d88268SGregory Neil Shapiro #endif /* _FFR_DM_PER_DAEMON */ 1485c2aa98e2SPeter Wemm 1486c2aa98e2SPeter Wemm switch (*f) 1487c2aa98e2SPeter Wemm { 148813d88268SGregory Neil Shapiro case 'A': /* address */ 148913d88268SGregory Neil Shapiro addr = v; 149013d88268SGregory Neil Shapiro break; 149113d88268SGregory Neil Shapiro 149213d88268SGregory Neil Shapiro #if _FFR_DM_PER_DAEMON 149313d88268SGregory Neil Shapiro case 'D': /* DeliveryMode */ 149413d88268SGregory Neil Shapiro switch (*v) 149513d88268SGregory Neil Shapiro { 149613d88268SGregory Neil Shapiro case SM_QUEUE: 149713d88268SGregory Neil Shapiro case SM_DEFER: 149813d88268SGregory Neil Shapiro case SM_DELIVER: 149913d88268SGregory Neil Shapiro case SM_FORK: 150013d88268SGregory Neil Shapiro d->d_dm = *v; 150113d88268SGregory Neil Shapiro break; 150213d88268SGregory Neil Shapiro default: 150313d88268SGregory Neil Shapiro syserr("554 5.3.5 Unknown delivery mode %c", 150413d88268SGregory Neil Shapiro *v); 150513d88268SGregory Neil Shapiro break; 150613d88268SGregory Neil Shapiro } 150713d88268SGregory Neil Shapiro break; 150813d88268SGregory Neil Shapiro #endif /* _FFR_DM_PER_DAEMON */ 150913d88268SGregory Neil Shapiro 1510c2aa98e2SPeter Wemm case 'F': /* address family */ 1511c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 151206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 151340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 151440266059SGregory Neil Shapiro # ifdef NETUNIX 151540266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 151640266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 151740266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 151840266059SGregory Neil Shapiro # endif /* NETUNIX */ 151940266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1520c2aa98e2SPeter Wemm #if NETINET 152140266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 152206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 152306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 152406f25ae9SGregory Neil Shapiro #if NETINET6 152540266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 152606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 152706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1528c2aa98e2SPeter Wemm #if NETISO 152940266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 153006f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 153106f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1532c2aa98e2SPeter Wemm #if NETNS 153340266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 153406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 153506f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1536c2aa98e2SPeter Wemm #if NETX25 153740266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 153806f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 153906f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1540c2aa98e2SPeter Wemm else 154106f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 154206f25ae9SGregory Neil Shapiro v); 1543c2aa98e2SPeter Wemm break; 1544c2aa98e2SPeter Wemm 154540266059SGregory Neil Shapiro #if MILTER 154640266059SGregory Neil Shapiro case 'I': 154740266059SGregory Neil Shapiro d->d_inputfilterlist = v; 154840266059SGregory Neil Shapiro break; 154940266059SGregory Neil Shapiro #endif /* MILTER */ 155040266059SGregory Neil Shapiro 1551c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 155206f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 155306f25ae9SGregory Neil Shapiro break; 155406f25ae9SGregory Neil Shapiro 155506f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 155640266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1557c2aa98e2SPeter Wemm break; 1558c2aa98e2SPeter Wemm 155913d88268SGregory Neil Shapiro case 'N': /* name */ 156013d88268SGregory Neil Shapiro d->d_name = v; 156113d88268SGregory Neil Shapiro break; 156213d88268SGregory Neil Shapiro 156313d88268SGregory Neil Shapiro case 'P': /* port */ 156413d88268SGregory Neil Shapiro port = v; 1565c2aa98e2SPeter Wemm break; 1566c2aa98e2SPeter Wemm 1567c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 156806f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 156906f25ae9SGregory Neil Shapiro break; 157006f25ae9SGregory Neil Shapiro 157113d88268SGregory Neil Shapiro case 'S': /* send buffer size */ 157213d88268SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1573c2aa98e2SPeter Wemm break; 1574c2aa98e2SPeter Wemm 157513d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 157613d88268SGregory Neil Shapiro case 'T': /* SuperSafe */ 157713d88268SGregory Neil Shapiro if (tolower(*v) == 'i') 157813d88268SGregory Neil Shapiro d->d_supersafe = SAFE_INTERACTIVE; 157913d88268SGregory Neil Shapiro else if (tolower(*v) == 'p') 158013d88268SGregory Neil Shapiro # if MILTER 158113d88268SGregory Neil Shapiro d->d_supersafe = SAFE_REALLY_POSTMILTER; 158213d88268SGregory Neil Shapiro # else /* MILTER */ 158313d88268SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 158413d88268SGregory Neil Shapiro "Warning: SuperSafe=PostMilter requires Milter support (-DMILTER)\n"); 158513d88268SGregory Neil Shapiro # endif /* MILTER */ 158613d88268SGregory Neil Shapiro else 158713d88268SGregory Neil Shapiro d->d_supersafe = atobool(v) ? SAFE_REALLY 158813d88268SGregory Neil Shapiro : SAFE_NO; 158913d88268SGregory Neil Shapiro break; 159013d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 159113d88268SGregory Neil Shapiro 1592c2aa98e2SPeter Wemm default: 159306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 159406f25ae9SGregory Neil Shapiro f); 1595c2aa98e2SPeter Wemm } 1596c2aa98e2SPeter Wemm } 1597193538b7SGregory Neil Shapiro 1598193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1599193538b7SGregory Neil Shapiro if (addr != NULL) 1600193538b7SGregory Neil Shapiro { 1601193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1602193538b7SGregory Neil Shapiro { 160340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 160440266059SGregory Neil Shapiro # if NETUNIX 160540266059SGregory Neil Shapiro case AF_UNIX: 160640266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 160740266059SGregory Neil Shapiro { 160840266059SGregory Neil Shapiro errno = ENAMETOOLONG; 160940266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 161040266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 161140266059SGregory Neil Shapiro break; 161240266059SGregory Neil Shapiro } 161340266059SGregory Neil Shapiro 161440266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 161540266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 161640266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 161740266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 161840266059SGregory Neil Shapiro addr, 161940266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 162040266059SGregory Neil Shapiro break; 162140266059SGregory Neil Shapiro # endif /* NETUNIX */ 162240266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1623193538b7SGregory Neil Shapiro #if NETINET 1624193538b7SGregory Neil Shapiro case AF_INET: 1625193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 162640266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 162740266059SGregory Neil Shapiro == INADDR_NONE)) 1628193538b7SGregory Neil Shapiro { 1629193538b7SGregory Neil Shapiro register struct hostent *hp; 1630193538b7SGregory Neil Shapiro 1631193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1632193538b7SGregory Neil Shapiro if (hp == NULL) 1633193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1634193538b7SGregory Neil Shapiro addr); 1635193538b7SGregory Neil Shapiro else 1636193538b7SGregory Neil Shapiro { 1637193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1638193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1639193538b7SGregory Neil Shapiro hp->h_addr_list++; 1640193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1641193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1642193538b7SGregory Neil Shapiro addr); 1643193538b7SGregory Neil Shapiro else 1644193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1645193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1646193538b7SGregory Neil Shapiro INADDRSZ); 164740266059SGregory Neil Shapiro # if NETINET6 1648193538b7SGregory Neil Shapiro freehostent(hp); 1649193538b7SGregory Neil Shapiro hp = NULL; 165040266059SGregory Neil Shapiro # endif /* NETINET6 */ 1651193538b7SGregory Neil Shapiro } 1652193538b7SGregory Neil Shapiro } 1653193538b7SGregory Neil Shapiro break; 1654193538b7SGregory Neil Shapiro #endif /* NETINET */ 1655193538b7SGregory Neil Shapiro 1656193538b7SGregory Neil Shapiro #if NETINET6 1657193538b7SGregory Neil Shapiro case AF_INET6: 165840266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1659193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1660193538b7SGregory Neil Shapiro { 1661193538b7SGregory Neil Shapiro register struct hostent *hp; 1662193538b7SGregory Neil Shapiro 1663193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1664193538b7SGregory Neil Shapiro if (hp == NULL) 1665193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1666193538b7SGregory Neil Shapiro addr); 1667193538b7SGregory Neil Shapiro else 1668193538b7SGregory Neil Shapiro { 1669193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1670193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1671193538b7SGregory Neil Shapiro hp->h_addr_list++; 1672193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1673193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1674193538b7SGregory Neil Shapiro addr); 1675193538b7SGregory Neil Shapiro else 1676193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1677193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1678193538b7SGregory Neil Shapiro IN6ADDRSZ); 1679193538b7SGregory Neil Shapiro freehostent(hp); 1680193538b7SGregory Neil Shapiro hp = NULL; 1681193538b7SGregory Neil Shapiro } 1682193538b7SGregory Neil Shapiro } 1683193538b7SGregory Neil Shapiro break; 1684193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1685193538b7SGregory Neil Shapiro 1686193538b7SGregory Neil Shapiro default: 1687193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1688193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1689193538b7SGregory Neil Shapiro break; 1690193538b7SGregory Neil Shapiro } 1691193538b7SGregory Neil Shapiro } 1692193538b7SGregory Neil Shapiro 1693193538b7SGregory Neil Shapiro if (port != NULL) 1694193538b7SGregory Neil Shapiro { 1695193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1696193538b7SGregory Neil Shapiro { 1697193538b7SGregory Neil Shapiro #if NETINET 1698193538b7SGregory Neil Shapiro case AF_INET: 1699193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 170040266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 170140266059SGregory Neil Shapiro atoi((const char *) port)); 1702193538b7SGregory Neil Shapiro else 1703193538b7SGregory Neil Shapiro { 1704193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1705193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1706193538b7SGregory Neil Shapiro port); 1707193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1708193538b7SGregory Neil Shapiro register struct servent *sp; 1709193538b7SGregory Neil Shapiro 1710193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1711193538b7SGregory Neil Shapiro if (sp == NULL) 1712193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1713193538b7SGregory Neil Shapiro port); 1714193538b7SGregory Neil Shapiro else 1715193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1716193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1717193538b7SGregory Neil Shapiro } 1718193538b7SGregory Neil Shapiro break; 1719193538b7SGregory Neil Shapiro #endif /* NETINET */ 1720193538b7SGregory Neil Shapiro 1721193538b7SGregory Neil Shapiro #if NETINET6 1722193538b7SGregory Neil Shapiro case AF_INET6: 1723193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 172440266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 172540266059SGregory Neil Shapiro atoi(port)); 1726193538b7SGregory Neil Shapiro else 1727193538b7SGregory Neil Shapiro { 1728193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1729193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1730193538b7SGregory Neil Shapiro port); 1731193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1732193538b7SGregory Neil Shapiro register struct servent *sp; 1733193538b7SGregory Neil Shapiro 1734193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1735193538b7SGregory Neil Shapiro if (sp == NULL) 1736193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1737193538b7SGregory Neil Shapiro port); 1738193538b7SGregory Neil Shapiro else 1739193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1740193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1741193538b7SGregory Neil Shapiro } 1742193538b7SGregory Neil Shapiro break; 1743193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1744193538b7SGregory Neil Shapiro 1745193538b7SGregory Neil Shapiro #if NETISO 1746193538b7SGregory Neil Shapiro case AF_ISO: 1747193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1748193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 174940266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1750193538b7SGregory Neil Shapiro else 1751193538b7SGregory Neil Shapiro { 1752193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1753193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1754193538b7SGregory Neil Shapiro port); 1755193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1756193538b7SGregory Neil Shapiro register struct servent *sp; 1757193538b7SGregory Neil Shapiro 1758193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1759193538b7SGregory Neil Shapiro if (sp == NULL) 1760193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1761193538b7SGregory Neil Shapiro port); 1762193538b7SGregory Neil Shapiro else 1763193538b7SGregory Neil Shapiro portno = sp->s_port; 1764193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1765193538b7SGregory Neil Shapiro } 1766193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1767193538b7SGregory Neil Shapiro (char *) &portno, 2); 1768193538b7SGregory Neil Shapiro break; 1769193538b7SGregory Neil Shapiro #endif /* NETISO */ 1770193538b7SGregory Neil Shapiro 1771193538b7SGregory Neil Shapiro default: 1772193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1773193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1774193538b7SGregory Neil Shapiro break; 1775193538b7SGregory Neil Shapiro } 1776193538b7SGregory Neil Shapiro } 1777c2aa98e2SPeter Wemm } 177840266059SGregory Neil Shapiro /* 177906f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 178006f25ae9SGregory Neil Shapiro ** 178106f25ae9SGregory Neil Shapiro ** Parameters: 178206f25ae9SGregory Neil Shapiro ** p -- the options line. 178306f25ae9SGregory Neil Shapiro ** 178406f25ae9SGregory Neil Shapiro ** Returns: 178540266059SGregory Neil Shapiro ** true if successful, false otherwise. 178640266059SGregory Neil Shapiro ** 178740266059SGregory Neil Shapiro ** Side Effects: 178840266059SGregory Neil Shapiro ** increments number of daemons. 178906f25ae9SGregory Neil Shapiro */ 179006f25ae9SGregory Neil Shapiro 179140266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 179240266059SGregory Neil Shapiro 1793739ac4d4SGregory Neil Shapiro struct dflags 1794739ac4d4SGregory Neil Shapiro { 1795739ac4d4SGregory Neil Shapiro char *d_name; 1796739ac4d4SGregory Neil Shapiro int d_flag; 1797739ac4d4SGregory Neil Shapiro }; 1798739ac4d4SGregory Neil Shapiro 1799739ac4d4SGregory Neil Shapiro static struct dflags DaemonFlags[] = 1800739ac4d4SGregory Neil Shapiro { 1801739ac4d4SGregory Neil Shapiro { "AUTHREQ", D_AUTHREQ }, 1802739ac4d4SGregory Neil Shapiro { "BINDIF", D_BINDIF }, 1803739ac4d4SGregory Neil Shapiro { "CANONREQ", D_CANONREQ }, 1804739ac4d4SGregory Neil Shapiro { "IFNHELO", D_IFNHELO }, 1805739ac4d4SGregory Neil Shapiro { "FQMAIL", D_FQMAIL }, 1806739ac4d4SGregory Neil Shapiro { "FQRCPT", D_FQRCPT }, 1807739ac4d4SGregory Neil Shapiro { "SMTPS", D_SMTPS }, 1808739ac4d4SGregory Neil Shapiro { "UNQUALOK", D_UNQUALOK }, 1809739ac4d4SGregory Neil Shapiro { "NOAUTH", D_NOAUTH }, 1810739ac4d4SGregory Neil Shapiro { "NOCANON", D_NOCANON }, 1811739ac4d4SGregory Neil Shapiro { "NOETRN", D_NOETRN }, 1812739ac4d4SGregory Neil Shapiro { "NOTLS", D_NOTLS }, 1813739ac4d4SGregory Neil Shapiro { "ETRNONLY", D_ETRNONLY }, 1814739ac4d4SGregory Neil Shapiro { "OPTIONAL", D_OPTIONAL }, 1815739ac4d4SGregory Neil Shapiro { "DISABLE", D_DISABLE }, 1816739ac4d4SGregory Neil Shapiro { "ISSET", D_ISSET }, 1817739ac4d4SGregory Neil Shapiro { NULL, 0 } 1818739ac4d4SGregory Neil Shapiro }; 1819739ac4d4SGregory Neil Shapiro 1820739ac4d4SGregory Neil Shapiro static void 1821739ac4d4SGregory Neil Shapiro printdaemonflags(d) 1822739ac4d4SGregory Neil Shapiro DAEMON_T *d; 1823739ac4d4SGregory Neil Shapiro { 1824739ac4d4SGregory Neil Shapiro register struct dflags *df; 1825739ac4d4SGregory Neil Shapiro bool first = true; 1826739ac4d4SGregory Neil Shapiro 1827739ac4d4SGregory Neil Shapiro for (df = DaemonFlags; df->d_name != NULL; df++) 1828739ac4d4SGregory Neil Shapiro { 1829739ac4d4SGregory Neil Shapiro if (!bitnset(df->d_flag, d->d_flags)) 1830739ac4d4SGregory Neil Shapiro continue; 1831739ac4d4SGregory Neil Shapiro if (first) 1832e92d3f3fSGregory Neil Shapiro sm_dprintf("<%s", df->d_name); 1833739ac4d4SGregory Neil Shapiro else 1834e92d3f3fSGregory Neil Shapiro sm_dprintf(",%s", df->d_name); 1835739ac4d4SGregory Neil Shapiro first = false; 1836739ac4d4SGregory Neil Shapiro } 1837739ac4d4SGregory Neil Shapiro if (!first) 1838e92d3f3fSGregory Neil Shapiro sm_dprintf(">"); 1839739ac4d4SGregory Neil Shapiro } 1840739ac4d4SGregory Neil Shapiro 184106f25ae9SGregory Neil Shapiro bool 184206f25ae9SGregory Neil Shapiro setdaemonoptions(p) 184306f25ae9SGregory Neil Shapiro register char *p; 184406f25ae9SGregory Neil Shapiro { 184540266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 184640266059SGregory Neil Shapiro return false; 184740266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 184840266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 184940266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 185040266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 185106f25ae9SGregory Neil Shapiro 185240266059SGregory Neil Shapiro #if MILTER 185340266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 185440266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 185540266059SGregory Neil Shapiro #endif /* MILTER */ 185640266059SGregory Neil Shapiro 185740266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 185840266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 185906f25ae9SGregory Neil Shapiro else 186006f25ae9SGregory Neil Shapiro { 186106f25ae9SGregory Neil Shapiro char num[30]; 186206f25ae9SGregory Neil Shapiro 186340266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Daemon%d", NDaemons); 186440266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 186506f25ae9SGregory Neil Shapiro } 186606f25ae9SGregory Neil Shapiro 186706f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 186806f25ae9SGregory Neil Shapiro { 186940266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 1870739ac4d4SGregory Neil Shapiro printdaemonflags(&Daemons[NDaemons]); 187140266059SGregory Neil Shapiro sm_dprintf("\n"); 187206f25ae9SGregory Neil Shapiro } 187340266059SGregory Neil Shapiro ++NDaemons; 187440266059SGregory Neil Shapiro return true; 187506f25ae9SGregory Neil Shapiro } 187640266059SGregory Neil Shapiro /* 187706f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 187806f25ae9SGregory Neil Shapiro ** 187906f25ae9SGregory Neil Shapiro ** Parameters: 188006f25ae9SGregory Neil Shapiro ** none 188106f25ae9SGregory Neil Shapiro ** 188206f25ae9SGregory Neil Shapiro ** Returns: 188306f25ae9SGregory Neil Shapiro ** none 188406f25ae9SGregory Neil Shapiro ** 188506f25ae9SGregory Neil Shapiro ** Side Effects: 188606f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 188706f25ae9SGregory Neil Shapiro */ 188840266059SGregory Neil Shapiro 188906f25ae9SGregory Neil Shapiro void 189006f25ae9SGregory Neil Shapiro initdaemon() 189106f25ae9SGregory Neil Shapiro { 189240266059SGregory Neil Shapiro if (NDaemons == 0) 189306f25ae9SGregory Neil Shapiro { 189440266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 189540266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 189640266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 189740266059SGregory Neil Shapiro NDaemons = 1; 189806f25ae9SGregory Neil Shapiro } 189906f25ae9SGregory Neil Shapiro } 190040266059SGregory Neil Shapiro /* 190106f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 190206f25ae9SGregory Neil Shapiro ** 190306f25ae9SGregory Neil Shapiro ** Parameters: 190406f25ae9SGregory Neil Shapiro ** p -- the options line. 190506f25ae9SGregory Neil Shapiro ** 190606f25ae9SGregory Neil Shapiro ** Returns: 190706f25ae9SGregory Neil Shapiro ** none. 190806f25ae9SGregory Neil Shapiro */ 190906f25ae9SGregory Neil Shapiro 191040266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 191106f25ae9SGregory Neil Shapiro 191206f25ae9SGregory Neil Shapiro void 191306f25ae9SGregory Neil Shapiro setclientoptions(p) 191406f25ae9SGregory Neil Shapiro register char *p; 191506f25ae9SGregory Neil Shapiro { 191640266059SGregory Neil Shapiro int family; 191740266059SGregory Neil Shapiro DAEMON_T d; 191806f25ae9SGregory Neil Shapiro 191906f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 192006f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 192106f25ae9SGregory Neil Shapiro 192206f25ae9SGregory Neil Shapiro /* grab what we need */ 192340266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 192440266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 192540266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 192640266059SGregory Neil Shapiro if (d.d_name != NULL) 192740266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 192806f25ae9SGregory Neil Shapiro else 192940266059SGregory Neil Shapiro { 193040266059SGregory Neil Shapiro char num[30]; 193140266059SGregory Neil Shapiro 193240266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Client%d", family); 193340266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 193406f25ae9SGregory Neil Shapiro } 193540266059SGregory Neil Shapiro } 193640266059SGregory Neil Shapiro /* 193706f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 193806f25ae9SGregory Neil Shapiro ** 193906f25ae9SGregory Neil Shapiro ** Parameters: 194006f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 194106f25ae9SGregory Neil Shapiro ** 194206f25ae9SGregory Neil Shapiro ** Returns: 194306f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 194406f25ae9SGregory Neil Shapiro ** 194506f25ae9SGregory Neil Shapiro ** Side Effects: 194606f25ae9SGregory Neil Shapiro ** none. 194706f25ae9SGregory Neil Shapiro */ 194806f25ae9SGregory Neil Shapiro 194906f25ae9SGregory Neil Shapiro static int 195006f25ae9SGregory Neil Shapiro addr_family(addr) 195106f25ae9SGregory Neil Shapiro char *addr; 195206f25ae9SGregory Neil Shapiro { 195306f25ae9SGregory Neil Shapiro #if NETINET6 195406f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 195506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 195606f25ae9SGregory Neil Shapiro 195706f25ae9SGregory Neil Shapiro #if NETINET 195806f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 195906f25ae9SGregory Neil Shapiro { 196006f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 196140266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 196206f25ae9SGregory Neil Shapiro return AF_INET; 196306f25ae9SGregory Neil Shapiro } 196406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 196506f25ae9SGregory Neil Shapiro #if NETINET6 196640266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 196706f25ae9SGregory Neil Shapiro { 196806f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 196940266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 197006f25ae9SGregory Neil Shapiro return AF_INET6; 197106f25ae9SGregory Neil Shapiro } 197206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 197340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 197440266059SGregory Neil Shapiro # if NETUNIX 197540266059SGregory Neil Shapiro if (*addr == '/') 197640266059SGregory Neil Shapiro { 197706f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 197840266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 197940266059SGregory Neil Shapiro return AF_UNIX; 198040266059SGregory Neil Shapiro } 198140266059SGregory Neil Shapiro # endif /* NETUNIX */ 198240266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 198340266059SGregory Neil Shapiro if (tTd(16, 9)) 198440266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 198506f25ae9SGregory Neil Shapiro return AF_UNSPEC; 198606f25ae9SGregory Neil Shapiro } 198740266059SGregory Neil Shapiro 198840266059SGregory Neil Shapiro /* 198940266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 199040266059SGregory Neil Shapiro ** 199140266059SGregory Neil Shapiro ** Parameters: 199240266059SGregory Neil Shapiro ** flag -- the flag to test. 199340266059SGregory Neil Shapiro ** 199440266059SGregory Neil Shapiro ** Returns: 199540266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 199640266059SGregory Neil Shapiro */ 199740266059SGregory Neil Shapiro 199840266059SGregory Neil Shapiro bool 199940266059SGregory Neil Shapiro chkclientmodifiers(flag) 200040266059SGregory Neil Shapiro int flag; 200140266059SGregory Neil Shapiro { 200240266059SGregory Neil Shapiro int i; 200340266059SGregory Neil Shapiro bool flagisset; 200440266059SGregory Neil Shapiro 200540266059SGregory Neil Shapiro flagisset = false; 200640266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 200740266059SGregory Neil Shapiro { 200840266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 200940266059SGregory Neil Shapiro { 201040266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 201140266059SGregory Neil Shapiro return false; 201240266059SGregory Neil Shapiro flagisset = true; 201340266059SGregory Neil Shapiro } 201440266059SGregory Neil Shapiro } 201540266059SGregory Neil Shapiro return flagisset; 201640266059SGregory Neil Shapiro } 201740266059SGregory Neil Shapiro 201840266059SGregory Neil Shapiro #if MILTER 201940266059SGregory Neil Shapiro /* 202040266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 202140266059SGregory Neil Shapiro ** 202240266059SGregory Neil Shapiro ** Parameters: 202340266059SGregory Neil Shapiro ** none 202440266059SGregory Neil Shapiro ** 202540266059SGregory Neil Shapiro ** Returns: 202640266059SGregory Neil Shapiro ** none 202740266059SGregory Neil Shapiro */ 202840266059SGregory Neil Shapiro 202940266059SGregory Neil Shapiro void 203040266059SGregory Neil Shapiro setup_daemon_milters() 203140266059SGregory Neil Shapiro { 203240266059SGregory Neil Shapiro int idx; 203340266059SGregory Neil Shapiro 203440266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 203540266059SGregory Neil Shapiro { 203640266059SGregory Neil Shapiro /* no need to configure the daemons */ 203740266059SGregory Neil Shapiro return; 203840266059SGregory Neil Shapiro } 203940266059SGregory Neil Shapiro 204040266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 204140266059SGregory Neil Shapiro { 204240266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 204340266059SGregory Neil Shapiro { 204440266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 204540266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 204640266059SGregory Neil Shapiro MAXFILTERS); 204740266059SGregory Neil Shapiro } 204840266059SGregory Neil Shapiro } 204940266059SGregory Neil Shapiro } 205040266059SGregory Neil Shapiro #endif /* MILTER */ 205140266059SGregory Neil Shapiro /* 205206f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 2053c2aa98e2SPeter Wemm ** 2054c2aa98e2SPeter Wemm ** Parameters: 2055c2aa98e2SPeter Wemm ** host -- the name of the host. 2056c2aa98e2SPeter Wemm ** port -- the port number to connect to. 2057c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 2058c2aa98e2SPeter Wemm ** structure to be filled in. 2059c2aa98e2SPeter Wemm ** e -- the current envelope. 206040266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 206140266059SGregory Neil Shapiro ** (0 means no limit) 2062c2aa98e2SPeter Wemm ** 2063c2aa98e2SPeter Wemm ** Returns: 2064c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 2065c2aa98e2SPeter Wemm ** made and if not why not. 2066c2aa98e2SPeter Wemm ** 2067c2aa98e2SPeter Wemm ** Side Effects: 2068c2aa98e2SPeter Wemm ** none. 2069c2aa98e2SPeter Wemm */ 2070c2aa98e2SPeter Wemm 2071c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 2072c2aa98e2SPeter Wemm 2073c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 2074c2aa98e2SPeter Wemm 2075c2aa98e2SPeter Wemm int 207640266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 2077c2aa98e2SPeter Wemm char *host; 207840266059SGregory Neil Shapiro volatile unsigned int port; 2079c2aa98e2SPeter Wemm register MCI *mci; 2080c2aa98e2SPeter Wemm ENVELOPE *e; 208140266059SGregory Neil Shapiro time_t enough; 2082c2aa98e2SPeter Wemm { 2083c2aa98e2SPeter Wemm register volatile int addrno = 0; 208440266059SGregory Neil Shapiro volatile int s; 2085c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 2086c2aa98e2SPeter Wemm SOCKADDR addr; 208706f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 208806f25ae9SGregory Neil Shapiro int save_errno = 0; 208906f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 2090c2aa98e2SPeter Wemm volatile bool firstconnect; 209140266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 209206f25ae9SGregory Neil Shapiro #if NETINET6 209340266059SGregory Neil Shapiro volatile bool v6found = false; 209406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 209506f25ae9SGregory Neil Shapiro volatile int family = InetMode; 209606f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 209706f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 209806f25ae9SGregory Neil Shapiro volatile bool clt_bind; 209906f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 210006f25ae9SGregory Neil Shapiro char *p; 210106f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 210206f25ae9SGregory Neil Shapiro 210340266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 210406f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 210540266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 210606f25ae9SGregory Neil Shapiro { 210706f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 210806f25ae9SGregory Neil Shapiro { 210906f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 2110193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 211106f25ae9SGregory Neil Shapiro } 211206f25ae9SGregory Neil Shapiro } 211306f25ae9SGregory Neil Shapiro 211406f25ae9SGregory Neil Shapiro #if NETINET6 211506f25ae9SGregory Neil Shapiro v4retry: 211606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 211740266059SGregory Neil Shapiro clt_bind = false; 211806f25ae9SGregory Neil Shapiro 211906f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 212006f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 212140266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2122602a2b1bSGregory Neil Shapiro *p != '\0') 212306f25ae9SGregory Neil Shapiro { 212406f25ae9SGregory Neil Shapiro #if NETINET6 212506f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 212606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 212706f25ae9SGregory Neil Shapiro 212806f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 212906f25ae9SGregory Neil Shapiro 213006f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 213106f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 213206f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 213306f25ae9SGregory Neil Shapiro { 213406f25ae9SGregory Neil Shapiro #if NETINET 213506f25ae9SGregory Neil Shapiro case AF_INET: 2136602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2137602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 2138602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 213906f25ae9SGregory Neil Shapiro { 214040266059SGregory Neil Shapiro clt_bind = true; 214106f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 214206f25ae9SGregory Neil Shapiro } 214306f25ae9SGregory Neil Shapiro break; 214406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 214506f25ae9SGregory Neil Shapiro 214606f25ae9SGregory Neil Shapiro #if NETINET6 214706f25ae9SGregory Neil Shapiro case AF_INET6: 214806f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 214940266059SGregory Neil Shapiro (void) sm_snprintf(p6, sizeof p6, 215040266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 215106f25ae9SGregory Neil Shapiro else 215240266059SGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof p6); 215340266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2154602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2155602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 215606f25ae9SGregory Neil Shapiro { 215740266059SGregory Neil Shapiro clt_bind = true; 215806f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 215906f25ae9SGregory Neil Shapiro } 216006f25ae9SGregory Neil Shapiro break; 216106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 216206f25ae9SGregory Neil Shapiro 216306f25ae9SGregory Neil Shapiro #if 0 216406f25ae9SGregory Neil Shapiro default: 216506f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 216606f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 216706f25ae9SGregory Neil Shapiro break; 216806f25ae9SGregory Neil Shapiro #endif /* 0 */ 216906f25ae9SGregory Neil Shapiro } 217006f25ae9SGregory Neil Shapiro if (clt_bind) 217106f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 217206f25ae9SGregory Neil Shapiro } 217340266059SGregory Neil Shapiro 217440266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 217540266059SGregory Neil Shapiro if (!clt_bind) 217606f25ae9SGregory Neil Shapiro { 217740266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 217806f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 217906f25ae9SGregory Neil Shapiro { 218006f25ae9SGregory Neil Shapiro #if NETINET 218106f25ae9SGregory Neil Shapiro case AF_INET: 218206f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 218306f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 218406f25ae9SGregory Neil Shapiro else 218540266059SGregory Neil Shapiro clt_bind = true; 218606f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 218740266059SGregory Neil Shapiro clt_bind = true; 218806f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 218906f25ae9SGregory Neil Shapiro break; 219006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 219106f25ae9SGregory Neil Shapiro #if NETINET6 219206f25ae9SGregory Neil Shapiro case AF_INET6: 219306f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 219406f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 219506f25ae9SGregory Neil Shapiro else 219640266059SGregory Neil Shapiro clt_bind = true; 219706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 219806f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 219940266059SGregory Neil Shapiro clt_bind = true; 220006f25ae9SGregory Neil Shapiro break; 220106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 220206f25ae9SGregory Neil Shapiro #if NETISO 220306f25ae9SGregory Neil Shapiro case AF_ISO: 220406f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 220540266059SGregory Neil Shapiro clt_bind = true; 220606f25ae9SGregory Neil Shapiro break; 220706f25ae9SGregory Neil Shapiro #endif /* NETISO */ 220806f25ae9SGregory Neil Shapiro default: 220906f25ae9SGregory Neil Shapiro break; 221006f25ae9SGregory Neil Shapiro } 221106f25ae9SGregory Neil Shapiro } 2212c2aa98e2SPeter Wemm 2213c2aa98e2SPeter Wemm /* 2214c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2215c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2216c2aa98e2SPeter Wemm */ 2217c2aa98e2SPeter Wemm 2218602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2219c2aa98e2SPeter Wemm errno = 0; 222006f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 222106f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 2222c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2223c2aa98e2SPeter Wemm CurHostName = host; 2224c2aa98e2SPeter Wemm 2225c2aa98e2SPeter Wemm if (host[0] == '[') 2226c2aa98e2SPeter Wemm { 222706f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2228c2aa98e2SPeter Wemm if (p != NULL) 2229c2aa98e2SPeter Wemm { 2230c2aa98e2SPeter Wemm #if NETINET 223106f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 223206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 223306f25ae9SGregory Neil Shapiro #if NETINET6 223406f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 223506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 223606f25ae9SGregory Neil Shapiro 223706f25ae9SGregory Neil Shapiro *p = '\0'; 223806f25ae9SGregory Neil Shapiro #if NETINET6 223906f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 224006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 224106f25ae9SGregory Neil Shapiro #if NETINET 224206f25ae9SGregory Neil Shapiro if (family == AF_INET && 224306f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 224406f25ae9SGregory Neil Shapiro { 224506f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 224606f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 224706f25ae9SGregory Neil Shapiro } 224806f25ae9SGregory Neil Shapiro else 224906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 225006f25ae9SGregory Neil Shapiro #if NETINET6 225106f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 225240266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 225306f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 225406f25ae9SGregory Neil Shapiro { 225506f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 225606f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 225706f25ae9SGregory Neil Shapiro } 225806f25ae9SGregory Neil Shapiro else 225906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2260c2aa98e2SPeter Wemm { 2261c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 226206f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2263c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2264c2aa98e2SPeter Wemm { 2265c2aa98e2SPeter Wemm #if NAMED_BIND 2266c2aa98e2SPeter Wemm int oldopts = _res.options; 2267c2aa98e2SPeter Wemm 2268c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 226906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2270c2aa98e2SPeter Wemm p[-1] = '\0'; 227106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 227206f25ae9SGregory Neil Shapiro family); 2273c2aa98e2SPeter Wemm p[-1] = '.'; 2274c2aa98e2SPeter Wemm #if NAMED_BIND 2275c2aa98e2SPeter Wemm _res.options = oldopts; 227606f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2277c2aa98e2SPeter Wemm } 2278c2aa98e2SPeter Wemm *p = ']'; 2279c2aa98e2SPeter Wemm goto gothostent; 2280c2aa98e2SPeter Wemm } 2281c2aa98e2SPeter Wemm *p = ']'; 2282c2aa98e2SPeter Wemm } 2283c2aa98e2SPeter Wemm if (p == NULL) 2284c2aa98e2SPeter Wemm { 2285c2aa98e2SPeter Wemm extern char MsgBuf[]; 2286c2aa98e2SPeter Wemm 228706f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 228806f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 228906f25ae9SGregory Neil Shapiro host); 2290c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 229106f25ae9SGregory Neil Shapiro errno = EINVAL; 2292c2aa98e2SPeter Wemm return EX_NOHOST; 2293c2aa98e2SPeter Wemm } 2294c2aa98e2SPeter Wemm } 2295c2aa98e2SPeter Wemm else 2296c2aa98e2SPeter Wemm { 2297c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2298c2aa98e2SPeter Wemm { 229906f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 230006f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2301c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2302c2aa98e2SPeter Wemm { 2303c2aa98e2SPeter Wemm #if NAMED_BIND 2304c2aa98e2SPeter Wemm int oldopts = _res.options; 2305c2aa98e2SPeter Wemm 2306c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 230706f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2308c2aa98e2SPeter Wemm *p = '\0'; 230906f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2310c2aa98e2SPeter Wemm *p = '.'; 2311c2aa98e2SPeter Wemm #if NAMED_BIND 2312c2aa98e2SPeter Wemm _res.options = oldopts; 231306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2314c2aa98e2SPeter Wemm } 2315c2aa98e2SPeter Wemm } 2316c2aa98e2SPeter Wemm gothostent: 2317c2aa98e2SPeter Wemm if (hp == NULL) 2318c2aa98e2SPeter Wemm { 2319c2aa98e2SPeter Wemm #if NAMED_BIND 2320c2aa98e2SPeter Wemm /* check for name server timeouts */ 232140266059SGregory Neil Shapiro # if NETINET6 232240266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 232340266059SGregory Neil Shapiro errno == ETIMEDOUT) 232440266059SGregory Neil Shapiro { 232540266059SGregory Neil Shapiro /* 232640266059SGregory Neil Shapiro ** An attempt with family AF_INET may 232740266059SGregory Neil Shapiro ** succeed By skipping the next section 232840266059SGregory Neil Shapiro ** of code, we will try AF_INET before 232940266059SGregory Neil Shapiro ** failing. 233040266059SGregory Neil Shapiro */ 233140266059SGregory Neil Shapiro 233240266059SGregory Neil Shapiro if (tTd(16, 10)) 233340266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 233440266059SGregory Neil Shapiro } 233540266059SGregory Neil Shapiro else 233640266059SGregory Neil Shapiro # endif /* NETINET6 */ 233740266059SGregory Neil Shapiro { 233840266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 233940266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2340c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2341c2aa98e2SPeter Wemm { 234206f25ae9SGregory Neil Shapiro save_errno = errno; 234340266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 234440266059SGregory Neil Shapiro "4.4.3", NULL); 234506f25ae9SGregory Neil Shapiro errno = save_errno; 2346c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2347c2aa98e2SPeter Wemm } 234840266059SGregory Neil Shapiro } 234906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 235006f25ae9SGregory Neil Shapiro #if NETINET6 235106f25ae9SGregory Neil Shapiro /* 235206f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 235306f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 235406f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 235506f25ae9SGregory Neil Shapiro */ 235606f25ae9SGregory Neil Shapiro 235706f25ae9SGregory Neil Shapiro if (family == AF_INET6) 235806f25ae9SGregory Neil Shapiro { 235906f25ae9SGregory Neil Shapiro family = AF_INET; 236006f25ae9SGregory Neil Shapiro goto v4retry; 236106f25ae9SGregory Neil Shapiro } 236206f25ae9SGregory Neil Shapiro if (v6found) 236306f25ae9SGregory Neil Shapiro goto v6tempfail; 236406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 236506f25ae9SGregory Neil Shapiro save_errno = errno; 2366c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 236706f25ae9SGregory Neil Shapiro errno = save_errno; 236806f25ae9SGregory Neil Shapiro return EX_NOHOST; 2369c2aa98e2SPeter Wemm } 2370c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2371c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2372c2aa98e2SPeter Wemm { 2373c2aa98e2SPeter Wemm #if NETINET 2374c2aa98e2SPeter Wemm case AF_INET: 237506f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 237606f25ae9SGregory Neil Shapiro hp->h_addr, 2377c2aa98e2SPeter Wemm INADDRSZ); 2378c2aa98e2SPeter Wemm break; 237906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 238006f25ae9SGregory Neil Shapiro 238106f25ae9SGregory Neil Shapiro #if NETINET6 238206f25ae9SGregory Neil Shapiro case AF_INET6: 238306f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 238406f25ae9SGregory Neil Shapiro hp->h_addr, 238506f25ae9SGregory Neil Shapiro IN6ADDRSZ); 238606f25ae9SGregory Neil Shapiro break; 238706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2388c2aa98e2SPeter Wemm 2389c2aa98e2SPeter Wemm default: 2390c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 2391c2aa98e2SPeter Wemm { 2392c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2393c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2394c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 239506f25ae9SGregory Neil Shapiro errno = EINVAL; 2396c2aa98e2SPeter Wemm return EX_NOHOST; 2397c2aa98e2SPeter Wemm } 239840266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2399c2aa98e2SPeter Wemm break; 2400c2aa98e2SPeter Wemm } 2401c2aa98e2SPeter Wemm addrno = 1; 2402c2aa98e2SPeter Wemm } 2403c2aa98e2SPeter Wemm 2404c2aa98e2SPeter Wemm /* 2405c2aa98e2SPeter Wemm ** Determine the port number. 2406c2aa98e2SPeter Wemm */ 2407c2aa98e2SPeter Wemm 2408c2aa98e2SPeter Wemm if (port == 0) 2409c2aa98e2SPeter Wemm { 241006f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 241106f25ae9SGregory Neil Shapiro port = htons(25); 241206f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2413c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2414c2aa98e2SPeter Wemm 2415c2aa98e2SPeter Wemm if (sp == NULL) 2416c2aa98e2SPeter Wemm { 2417c2aa98e2SPeter Wemm if (LogLevel > 2) 2418c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2419c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2420c2aa98e2SPeter Wemm port = htons(25); 2421c2aa98e2SPeter Wemm } 2422c2aa98e2SPeter Wemm else 2423c2aa98e2SPeter Wemm port = sp->s_port; 242406f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2425c2aa98e2SPeter Wemm } 2426c2aa98e2SPeter Wemm 242740266059SGregory Neil Shapiro #if NETINET6 242840266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 242940266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 243040266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 243140266059SGregory Neil Shapiro { 243240266059SGregory Neil Shapiro /* 243340266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 243440266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 243540266059SGregory Neil Shapiro ** for IPv4. 243640266059SGregory Neil Shapiro */ 243740266059SGregory Neil Shapiro 243840266059SGregory Neil Shapiro goto nextaddr; 243940266059SGregory Neil Shapiro } 244040266059SGregory Neil Shapiro #endif /* NETINET6 */ 244140266059SGregory Neil Shapiro 2442c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2443c2aa98e2SPeter Wemm { 2444c2aa98e2SPeter Wemm #if NETINET 2445c2aa98e2SPeter Wemm case AF_INET: 2446c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2447c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 2448c2aa98e2SPeter Wemm break; 244906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 245006f25ae9SGregory Neil Shapiro 245106f25ae9SGregory Neil Shapiro #if NETINET6 245206f25ae9SGregory Neil Shapiro case AF_INET6: 245306f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 245406f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 245506f25ae9SGregory Neil Shapiro break; 245606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2457c2aa98e2SPeter Wemm 2458c2aa98e2SPeter Wemm #if NETISO 2459c2aa98e2SPeter Wemm case AF_ISO: 2460c2aa98e2SPeter Wemm /* assume two byte transport selector */ 246106f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2462c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 2463c2aa98e2SPeter Wemm break; 246406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2465c2aa98e2SPeter Wemm 2466c2aa98e2SPeter Wemm default: 2467c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2468c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 246906f25ae9SGregory Neil Shapiro errno = EINVAL; 247040266059SGregory Neil Shapiro #if NETINET6 2471193538b7SGregory Neil Shapiro if (hp != NULL) 2472193538b7SGregory Neil Shapiro freehostent(hp); 247340266059SGregory Neil Shapiro #endif /* NETINET6 */ 247406f25ae9SGregory Neil Shapiro return EX_NOHOST; 2475c2aa98e2SPeter Wemm } 2476c2aa98e2SPeter Wemm 2477c2aa98e2SPeter Wemm /* 2478c2aa98e2SPeter Wemm ** Try to actually open the connection. 2479c2aa98e2SPeter Wemm */ 2480c2aa98e2SPeter Wemm 248140266059SGregory Neil Shapiro #if XLA 2482c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2483c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2484193538b7SGregory Neil Shapiro { 248540266059SGregory Neil Shapiro # if NETINET6 2486193538b7SGregory Neil Shapiro if (hp != NULL) 2487193538b7SGregory Neil Shapiro freehostent(hp); 248840266059SGregory Neil Shapiro # endif /* NETINET6 */ 2489c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2490193538b7SGregory Neil Shapiro } 249106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2492c2aa98e2SPeter Wemm 249340266059SGregory Neil Shapiro firstconnect = true; 2494c2aa98e2SPeter Wemm for (;;) 2495c2aa98e2SPeter Wemm { 2496c2aa98e2SPeter Wemm if (tTd(16, 1)) 249740266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 24988774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 249940266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2500c2aa98e2SPeter Wemm 2501c2aa98e2SPeter Wemm /* save for logging */ 2502c2aa98e2SPeter Wemm CurHostAddr = addr; 2503c2aa98e2SPeter Wemm 250440266059SGregory Neil Shapiro #if HASRRESVPORT 2505c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2506c2aa98e2SPeter Wemm { 2507c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2508c2aa98e2SPeter Wemm 2509c2aa98e2SPeter Wemm s = rresvport(&rport); 2510c2aa98e2SPeter Wemm } 2511c2aa98e2SPeter Wemm else 251240266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2513c2aa98e2SPeter Wemm { 251440266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2515c2aa98e2SPeter Wemm } 2516c2aa98e2SPeter Wemm if (s < 0) 2517c2aa98e2SPeter Wemm { 251806f25ae9SGregory Neil Shapiro save_errno = errno; 2519c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 252040266059SGregory Neil Shapiro #if XLA 2521c2aa98e2SPeter Wemm xla_host_end(host); 252206f25ae9SGregory Neil Shapiro #endif /* XLA */ 2523c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 252440266059SGregory Neil Shapiro #if NETINET6 2525193538b7SGregory Neil Shapiro if (hp != NULL) 2526193538b7SGregory Neil Shapiro freehostent(hp); 252740266059SGregory Neil Shapiro #endif /* NETINET6 */ 252806f25ae9SGregory Neil Shapiro errno = save_errno; 2529c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2530c2aa98e2SPeter Wemm } 2531c2aa98e2SPeter Wemm 2532c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 253340266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2534c2aa98e2SPeter Wemm { 2535c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 253640266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 253740266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2538c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2539c2aa98e2SPeter Wemm } 254006f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 254106f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 254240266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 254306f25ae9SGregory Neil Shapiro { 254406f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 254540266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 254640266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 254706f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 254806f25ae9SGregory Neil Shapiro } 254906f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 255006f25ae9SGregory Neil Shapiro 2551c2aa98e2SPeter Wemm if (tTd(16, 1)) 255240266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2553c2aa98e2SPeter Wemm 2554c2aa98e2SPeter Wemm /* turn on network debugging? */ 2555c2aa98e2SPeter Wemm if (tTd(16, 101)) 2556c2aa98e2SPeter Wemm { 2557c2aa98e2SPeter Wemm int on = 1; 255806f25ae9SGregory Neil Shapiro 2559c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2560c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2561c2aa98e2SPeter Wemm } 256240266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 256340266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2564c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2565c2aa98e2SPeter Wemm 256606f25ae9SGregory Neil Shapiro if (clt_bind) 256706f25ae9SGregory Neil Shapiro { 256806f25ae9SGregory Neil Shapiro int on = 1; 256906f25ae9SGregory Neil Shapiro 257006f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 257106f25ae9SGregory Neil Shapiro { 257206f25ae9SGregory Neil Shapiro #if NETINET 257306f25ae9SGregory Neil Shapiro case AF_INET: 257406f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 257506f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 257606f25ae9SGregory Neil Shapiro SO_REUSEADDR, 257706f25ae9SGregory Neil Shapiro (char *) &on, 257806f25ae9SGregory Neil Shapiro sizeof on); 257906f25ae9SGregory Neil Shapiro break; 258006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 258106f25ae9SGregory Neil Shapiro 258206f25ae9SGregory Neil Shapiro #if NETINET6 258306f25ae9SGregory Neil Shapiro case AF_INET6: 258406f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 258506f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 258606f25ae9SGregory Neil Shapiro SO_REUSEADDR, 258706f25ae9SGregory Neil Shapiro (char *) &on, 258806f25ae9SGregory Neil Shapiro sizeof on); 258906f25ae9SGregory Neil Shapiro break; 259006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 259106f25ae9SGregory Neil Shapiro } 259206f25ae9SGregory Neil Shapiro 259306f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 259406f25ae9SGregory Neil Shapiro { 259506f25ae9SGregory Neil Shapiro save_errno = errno; 259606f25ae9SGregory Neil Shapiro (void) close(s); 259706f25ae9SGregory Neil Shapiro errno = save_errno; 259806f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 259906f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 260040266059SGregory Neil Shapiro #if NETINET6 2601193538b7SGregory Neil Shapiro if (hp != NULL) 2602193538b7SGregory Neil Shapiro freehostent(hp); 260340266059SGregory Neil Shapiro #endif /* NETINET6 */ 260406f25ae9SGregory Neil Shapiro errno = save_errno; 260506f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 260606f25ae9SGregory Neil Shapiro } 260706f25ae9SGregory Neil Shapiro } 260806f25ae9SGregory Neil Shapiro 2609c2aa98e2SPeter Wemm /* 2610c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2611c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2612c2aa98e2SPeter Wemm */ 2613c2aa98e2SPeter Wemm 2614c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2615c2aa98e2SPeter Wemm { 2616c2aa98e2SPeter Wemm int i; 2617c2aa98e2SPeter Wemm 2618c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 261940266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 26208774250cSGregory Neil Shapiro connecttimeout, 0); 2621c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 262240266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 26238774250cSGregory Neil Shapiro connecttimeout, 0); 2624c2aa98e2SPeter Wemm else 2625c2aa98e2SPeter Wemm ev = NULL; 2626c2aa98e2SPeter Wemm 262706f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 262806f25ae9SGregory Neil Shapiro { 262906f25ae9SGregory Neil Shapiro #if NETINET 263006f25ae9SGregory Neil Shapiro case AF_INET: 263106f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 263206f25ae9SGregory Neil Shapiro break; 263306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 263406f25ae9SGregory Neil Shapiro 263506f25ae9SGregory Neil Shapiro #if NETINET6 263606f25ae9SGregory Neil Shapiro case AF_INET6: 263706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 263806f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 263906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 264006f25ae9SGregory Neil Shapiro break; 264106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 264206f25ae9SGregory Neil Shapiro } 2643b6bacd31SGregory Neil Shapiro if (tTd(16, 1)) 2644b6bacd31SGregory Neil Shapiro sm_dprintf("Connecting to [%s]...\n", anynet_ntoa(&addr)); 2645c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 264606f25ae9SGregory Neil Shapiro save_errno = errno; 2647c2aa98e2SPeter Wemm if (ev != NULL) 264840266059SGregory Neil Shapiro sm_clrevent(ev); 2649c2aa98e2SPeter Wemm if (i >= 0) 2650c2aa98e2SPeter Wemm break; 2651c2aa98e2SPeter Wemm } 2652c2aa98e2SPeter Wemm else 265306f25ae9SGregory Neil Shapiro save_errno = errno; 2654c2aa98e2SPeter Wemm 2655605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2656605302a5SGregory Neil Shapiro (void) close(s); 2657605302a5SGregory Neil Shapiro 2658c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 265940266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 266040266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2661c2aa98e2SPeter Wemm { 2662c2aa98e2SPeter Wemm if (tTd(16, 1)) 266340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 266440266059SGregory Neil Shapiro sm_errstring(save_errno)); 266540266059SGregory Neil Shapiro firstconnect = false; 266606f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2667c2aa98e2SPeter Wemm continue; 2668c2aa98e2SPeter Wemm } 2669c2aa98e2SPeter Wemm 267040266059SGregory Neil Shapiro if (LogLevel > 13) 2671c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2672c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2673c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 267440266059SGregory Neil Shapiro sm_errstring(save_errno)); 2675c2aa98e2SPeter Wemm 267640266059SGregory Neil Shapiro #if NETINET6 267740266059SGregory Neil Shapiro nextaddr: 267840266059SGregory Neil Shapiro #endif /* NETINET6 */ 267940266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 268040266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2681c2aa98e2SPeter Wemm { 2682c2aa98e2SPeter Wemm if (tTd(16, 1)) 268340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 268440266059SGregory Neil Shapiro sm_errstring(save_errno)); 2685c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2686c2aa98e2SPeter Wemm { 2687c2aa98e2SPeter Wemm #if NETINET 2688c2aa98e2SPeter Wemm case AF_INET: 268906f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 269006f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2691c2aa98e2SPeter Wemm INADDRSZ); 2692c2aa98e2SPeter Wemm break; 269306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 269406f25ae9SGregory Neil Shapiro 269506f25ae9SGregory Neil Shapiro #if NETINET6 269606f25ae9SGregory Neil Shapiro case AF_INET6: 269706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 269806f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 269906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 270006f25ae9SGregory Neil Shapiro break; 270106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2702c2aa98e2SPeter Wemm 2703c2aa98e2SPeter Wemm default: 270406f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 270506f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2706c2aa98e2SPeter Wemm hp->h_length); 2707c2aa98e2SPeter Wemm break; 2708c2aa98e2SPeter Wemm } 2709c2aa98e2SPeter Wemm continue; 2710c2aa98e2SPeter Wemm } 271106f25ae9SGregory Neil Shapiro errno = save_errno; 2712c2aa98e2SPeter Wemm 271306f25ae9SGregory Neil Shapiro #if NETINET6 271406f25ae9SGregory Neil Shapiro if (family == AF_INET6) 271506f25ae9SGregory Neil Shapiro { 271606f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 271740266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 271840266059SGregory Neil Shapiro sm_errstring(save_errno)); 271940266059SGregory Neil Shapiro v6found = true; 272006f25ae9SGregory Neil Shapiro family = AF_INET; 2721193538b7SGregory Neil Shapiro if (hp != NULL) 2722193538b7SGregory Neil Shapiro { 2723193538b7SGregory Neil Shapiro freehostent(hp); 2724193538b7SGregory Neil Shapiro hp = NULL; 2725193538b7SGregory Neil Shapiro } 272606f25ae9SGregory Neil Shapiro goto v4retry; 272706f25ae9SGregory Neil Shapiro } 272806f25ae9SGregory Neil Shapiro v6tempfail: 272906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2730c2aa98e2SPeter Wemm /* couldn't open connection */ 273106f25ae9SGregory Neil Shapiro #if NETINET6 273206f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 273306f25ae9SGregory Neil Shapiro if (errno > 0) 273406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 273506f25ae9SGregory Neil Shapiro save_errno = errno; 273606f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 273740266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 273840266059SGregory Neil Shapiro sm_errstring(save_errno)); 273940266059SGregory Neil Shapiro #if XLA 2740c2aa98e2SPeter Wemm xla_host_end(host); 274106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2742c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 274340266059SGregory Neil Shapiro #if NETINET6 2744193538b7SGregory Neil Shapiro if (hp != NULL) 2745193538b7SGregory Neil Shapiro freehostent(hp); 274640266059SGregory Neil Shapiro #endif /* NETINET6 */ 274706f25ae9SGregory Neil Shapiro errno = save_errno; 2748c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2749c2aa98e2SPeter Wemm } 2750c2aa98e2SPeter Wemm 275140266059SGregory Neil Shapiro #if NETINET6 2752193538b7SGregory Neil Shapiro if (hp != NULL) 2753193538b7SGregory Neil Shapiro { 2754193538b7SGregory Neil Shapiro freehostent(hp); 2755193538b7SGregory Neil Shapiro hp = NULL; 2756193538b7SGregory Neil Shapiro } 275740266059SGregory Neil Shapiro #endif /* NETINET6 */ 2758193538b7SGregory Neil Shapiro 2759c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 276006f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 276140266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 276240266059SGregory Neil Shapiro (void *) &s, 2763e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, NULL)) == NULL || 2764c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 276540266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 276640266059SGregory Neil Shapiro (void *) &s, 2767e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, NULL)) == NULL) 2768c2aa98e2SPeter Wemm { 276906f25ae9SGregory Neil Shapiro save_errno = errno; 2770c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2771c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 277206f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 277340266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 277406f25ae9SGregory Neil Shapiro (void) close(s); 277506f25ae9SGregory Neil Shapiro errno = save_errno; 277606f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 277706f25ae9SGregory Neil Shapiro } 277840266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 277940266059SGregory Neil Shapiro 278040266059SGregory Neil Shapiro /* set {client_flags} */ 278140266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 278240266059SGregory Neil Shapiro { 278340266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 278440266059SGregory Neil Shapiro macid("{client_flags}"), 278540266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 278640266059SGregory Neil Shapiro } 278740266059SGregory Neil Shapiro else 278840266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 278940266059SGregory Neil Shapiro macid("{client_flags}"), ""); 279040266059SGregory Neil Shapiro 279140266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 279240266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 279340266059SGregory Neil Shapiro { 279440266059SGregory Neil Shapiro /* look for just this one flag */ 279540266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 279640266059SGregory Neil Shapiro } 279706f25ae9SGregory Neil Shapiro 279806f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 279906f25ae9SGregory Neil Shapiro len = sizeof addr; 280006f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 280106f25ae9SGregory Neil Shapiro { 280206f25ae9SGregory Neil Shapiro char *name; 280340266059SGregory Neil Shapiro char family[5]; 280406f25ae9SGregory Neil Shapiro 280540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 280640266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 280740266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 280840266059SGregory Neil Shapiro addr.sa.sa_family); 280940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 281040266059SGregory Neil Shapiro macid("{if_family_out}"), family); 281106f25ae9SGregory Neil Shapiro 281206f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 281340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 281440266059SGregory Neil Shapiro macid("{if_name_out}"), name); 281506f25ae9SGregory Neil Shapiro if (LogLevel > 11) 281606f25ae9SGregory Neil Shapiro { 281706f25ae9SGregory Neil Shapiro /* log connection information */ 281806f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 281906f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 282006f25ae9SGregory Neil Shapiro } 282106f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 282206f25ae9SGregory Neil Shapiro { 282306f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 282406f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 282506f25ae9SGregory Neil Shapiro } 282606f25ae9SGregory Neil Shapiro } 282706f25ae9SGregory Neil Shapiro else 282806f25ae9SGregory Neil Shapiro { 282940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 283040266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 283140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 283240266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 283340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 283440266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 283506f25ae9SGregory Neil Shapiro } 2836e92d3f3fSGregory Neil Shapiro 2837e92d3f3fSGregory Neil Shapiro #if _FFR_HELONAME 2838e92d3f3fSGregory Neil Shapiro /* Use the configured HeloName as appropriate */ 2839e92d3f3fSGregory Neil Shapiro if (HeloName != NULL && HeloName[0] != '\0') 2840e92d3f3fSGregory Neil Shapiro mci->mci_heloname = newstr(HeloName); 2841e92d3f3fSGregory Neil Shapiro #endif /* _FFR_HELONAME */ 2842e92d3f3fSGregory Neil Shapiro 284306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 284406f25ae9SGregory Neil Shapiro return EX_OK; 284506f25ae9SGregory Neil Shapiro } 284606f25ae9SGregory Neil Shapiro 284706f25ae9SGregory Neil Shapiro static void 2848b6bacd31SGregory Neil Shapiro connecttimeout(ignore) 2849b6bacd31SGregory Neil Shapiro int ignore; 285006f25ae9SGregory Neil Shapiro { 28518774250cSGregory Neil Shapiro /* 28528774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 28538774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 28548774250cSGregory Neil Shapiro ** DOING. 28558774250cSGregory Neil Shapiro */ 28568774250cSGregory Neil Shapiro 285706f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 285806f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 285906f25ae9SGregory Neil Shapiro } 286040266059SGregory Neil Shapiro /* 286106f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 286206f25ae9SGregory Neil Shapiro ** 286306f25ae9SGregory Neil Shapiro ** Parameters: 286406f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 286506f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 286606f25ae9SGregory Neil Shapiro ** structure to be filled in. 286706f25ae9SGregory Neil Shapiro ** 286806f25ae9SGregory Neil Shapiro ** Returns: 286906f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 287006f25ae9SGregory Neil Shapiro ** made and if not why not. 287106f25ae9SGregory Neil Shapiro ** 287206f25ae9SGregory Neil Shapiro ** Side Effects: 287306f25ae9SGregory Neil Shapiro ** none. 287406f25ae9SGregory Neil Shapiro */ 287506f25ae9SGregory Neil Shapiro 287606f25ae9SGregory Neil Shapiro #if NETUNIX 287740266059SGregory Neil Shapiro int 287840266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 287906f25ae9SGregory Neil Shapiro char *mux_path; 288006f25ae9SGregory Neil Shapiro register MCI *mci; 288106f25ae9SGregory Neil Shapiro { 288206f25ae9SGregory Neil Shapiro int sock; 288306f25ae9SGregory Neil Shapiro int rval, save_errno; 288406f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 288506f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 288606f25ae9SGregory Neil Shapiro 288706f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 288806f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 288906f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 289006f25ae9SGregory Neil Shapiro 289106f25ae9SGregory Neil Shapiro if (rval != 0) 289206f25ae9SGregory Neil Shapiro { 2893e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket %s", 2894e92d3f3fSGregory Neil Shapiro mux_path); 289506f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 289606f25ae9SGregory Neil Shapiro errno = rval; 289706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 289806f25ae9SGregory Neil Shapiro } 289906f25ae9SGregory Neil Shapiro 290006f25ae9SGregory Neil Shapiro /* prepare address structure */ 290106f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 290206f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 290306f25ae9SGregory Neil Shapiro 290406f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 290506f25ae9SGregory Neil Shapiro { 2906e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: domain socket name %s too long", 2907e92d3f3fSGregory Neil Shapiro mux_path); 290840266059SGregory Neil Shapiro 290940266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 291006f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 291106f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 291206f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 291306f25ae9SGregory Neil Shapiro } 291440266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 291540266059SGregory Neil Shapiro sizeof unix_addr.sun_path); 291606f25ae9SGregory Neil Shapiro 291706f25ae9SGregory Neil Shapiro /* initialize domain socket */ 291806f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 291906f25ae9SGregory Neil Shapiro if (sock == -1) 292006f25ae9SGregory Neil Shapiro { 292106f25ae9SGregory Neil Shapiro save_errno = errno; 2922e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket %s", 2923e92d3f3fSGregory Neil Shapiro mux_path); 292406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 292506f25ae9SGregory Neil Shapiro errno = save_errno; 292606f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 292706f25ae9SGregory Neil Shapiro } 292806f25ae9SGregory Neil Shapiro 292906f25ae9SGregory Neil Shapiro /* connect to server */ 293006f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 293106f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 293206f25ae9SGregory Neil Shapiro { 293306f25ae9SGregory Neil Shapiro save_errno = errno; 293406f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 293506f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 293606f25ae9SGregory Neil Shapiro (void) close(sock); 293706f25ae9SGregory Neil Shapiro errno = save_errno; 293806f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 293906f25ae9SGregory Neil Shapiro } 294006f25ae9SGregory Neil Shapiro 294106f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 294206f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 294340266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2944e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY_B, NULL)) 294540266059SGregory Neil Shapiro == NULL 294640266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 294740266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2948e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY_B, NULL)) 294940266059SGregory Neil Shapiro == NULL) 295006f25ae9SGregory Neil Shapiro { 295106f25ae9SGregory Neil Shapiro save_errno = errno; 295206f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 295306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 295406f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 295540266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 295606f25ae9SGregory Neil Shapiro (void) close(sock); 295706f25ae9SGregory Neil Shapiro errno = save_errno; 2958c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2959c2aa98e2SPeter Wemm } 296040266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 2961c2aa98e2SPeter Wemm 2962c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 296306f25ae9SGregory Neil Shapiro errno = 0; 296406f25ae9SGregory Neil Shapiro return EX_OK; 2965c2aa98e2SPeter Wemm } 296606f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 296740266059SGregory Neil Shapiro /* 296840266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 29698774250cSGregory Neil Shapiro ** 29708774250cSGregory Neil Shapiro ** Parameters: 297140266059SGregory Neil Shapiro ** none. 29728774250cSGregory Neil Shapiro ** 29738774250cSGregory Neil Shapiro ** Returns: 29748774250cSGregory Neil Shapiro ** none. 29758774250cSGregory Neil Shapiro ** 29768774250cSGregory Neil Shapiro ** Side Effects: 297740266059SGregory Neil Shapiro ** closes control socket, exits. 29788774250cSGregory Neil Shapiro */ 29798774250cSGregory Neil Shapiro 298040266059SGregory Neil Shapiro void 298140266059SGregory Neil Shapiro shutdown_daemon() 29828774250cSGregory Neil Shapiro { 298340266059SGregory Neil Shapiro int i; 298440266059SGregory Neil Shapiro char *reason; 29858774250cSGregory Neil Shapiro 298640266059SGregory Neil Shapiro sm_allsignals(true); 298740266059SGregory Neil Shapiro 298840266059SGregory Neil Shapiro reason = ShutdownRequest; 298940266059SGregory Neil Shapiro ShutdownRequest = NULL; 299040266059SGregory Neil Shapiro PendingSignal = 0; 299140266059SGregory Neil Shapiro 2992e92d3f3fSGregory Neil Shapiro if (LogLevel > 9) 2993e92d3f3fSGregory Neil Shapiro sm_syslog(LOG_INFO, CurEnv->e_id, "stopping daemon, reason=%s", 299440266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 299540266059SGregory Neil Shapiro 299640266059SGregory Neil Shapiro FileName = NULL; 299740266059SGregory Neil Shapiro closecontrolsocket(true); 299840266059SGregory Neil Shapiro #if XLA 299940266059SGregory Neil Shapiro xla_all_end(); 300040266059SGregory Neil Shapiro #endif /* XLA */ 300140266059SGregory Neil Shapiro 300240266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 300340266059SGregory Neil Shapiro { 300440266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 300540266059SGregory Neil Shapiro { 300640266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 300740266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 300840266059SGregory Neil Shapiro 300940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 301040266059SGregory Neil Shapiro # if NETUNIX 301140266059SGregory Neil Shapiro /* Remove named sockets */ 301240266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 301340266059SGregory Neil Shapiro { 301440266059SGregory Neil Shapiro int rval; 301540266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 301640266059SGregory Neil Shapiro 301740266059SGregory Neil Shapiro /* if not safe, don't use it */ 301840266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 301940266059SGregory Neil Shapiro RunAsUid, RunAsGid, 302040266059SGregory Neil Shapiro RunAsUserName, sff, 302140266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 302240266059SGregory Neil Shapiro if (rval == 0 && 302340266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 302440266059SGregory Neil Shapiro { 302540266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 302640266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 302740266059SGregory Neil Shapiro Daemons[i].d_name, 302840266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 302940266059SGregory Neil Shapiro sm_errstring(errno)); 30308774250cSGregory Neil Shapiro } 303140266059SGregory Neil Shapiro } 303240266059SGregory Neil Shapiro # endif /* NETUNIX */ 303340266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 303440266059SGregory Neil Shapiro } 303540266059SGregory Neil Shapiro } 303640266059SGregory Neil Shapiro 303740266059SGregory Neil Shapiro finis(false, true, EX_OK); 303840266059SGregory Neil Shapiro } 303940266059SGregory Neil Shapiro /* 30408774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 30418774250cSGregory Neil Shapiro ** 30428774250cSGregory Neil Shapiro ** Parameters: 30438774250cSGregory Neil Shapiro ** none. 30448774250cSGregory Neil Shapiro ** 30458774250cSGregory Neil Shapiro ** Returns: 30468774250cSGregory Neil Shapiro ** none. 30478774250cSGregory Neil Shapiro ** 30488774250cSGregory Neil Shapiro ** Side Effects: 30498774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 30508774250cSGregory Neil Shapiro */ 30518774250cSGregory Neil Shapiro 305213058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 305313058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 305413058a91SGregory Neil Shapiro do \ 305513058a91SGregory Neil Shapiro { \ 305640266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 305713058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 305840266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 305913058a91SGregory Neil Shapiro } while (0) 306013058a91SGregory Neil Shapiro 306140266059SGregory Neil Shapiro void 30628774250cSGregory Neil Shapiro restart_daemon() 30638774250cSGregory Neil Shapiro { 306440266059SGregory Neil Shapiro bool drop; 30658774250cSGregory Neil Shapiro int save_errno; 30668774250cSGregory Neil Shapiro char *reason; 306713058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 30688774250cSGregory Neil Shapiro extern int DtableSize; 30698774250cSGregory Neil Shapiro 307013058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 307140266059SGregory Neil Shapiro sm_clear_events(); 307240266059SGregory Neil Shapiro sm_allsignals(true); 30738774250cSGregory Neil Shapiro 30748774250cSGregory Neil Shapiro reason = RestartRequest; 30758774250cSGregory Neil Shapiro RestartRequest = NULL; 30768774250cSGregory Neil Shapiro PendingSignal = 0; 30778774250cSGregory Neil Shapiro 30788774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 30798774250cSGregory Neil Shapiro { 30808774250cSGregory Neil Shapiro if (LogLevel > 3) 30818774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 30828774250cSGregory Neil Shapiro "could not restart: need full path"); 308340266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 308440266059SGregory Neil Shapiro /* NOTREACHED */ 30858774250cSGregory Neil Shapiro } 30868774250cSGregory Neil Shapiro if (LogLevel > 3) 30878774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 30888774250cSGregory Neil Shapiro SaveArgv[0], 30898774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 30908774250cSGregory Neil Shapiro 309140266059SGregory Neil Shapiro closecontrolsocket(true); 309294c01205SGregory Neil Shapiro #if SM_CONF_SHM 309394c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 309494c01205SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 309540266059SGregory Neil Shapiro 3096e92d3f3fSGregory Neil Shapiro /* close locked pid file */ 3097e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 3098e92d3f3fSGregory Neil Shapiro 309940266059SGregory Neil Shapiro /* 310040266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 310140266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 310240266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 310340266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 310440266059SGregory Neil Shapiro */ 310540266059SGregory Neil Shapiro 310640266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 310740266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 310840266059SGregory Neil Shapiro 310940266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 31108774250cSGregory Neil Shapiro { 31118774250cSGregory Neil Shapiro if (LogLevel > 0) 31128774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 311340266059SGregory Neil Shapiro "could not drop privileges: %s", 311440266059SGregory Neil Shapiro sm_errstring(errno)); 311540266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 311640266059SGregory Neil Shapiro /* NOTREACHED */ 31178774250cSGregory Neil Shapiro } 31188774250cSGregory Neil Shapiro 3119e92d3f3fSGregory Neil Shapiro sm_close_on_exec(STDERR_FILENO + 1, DtableSize); 31208774250cSGregory Neil Shapiro 312113058a91SGregory Neil Shapiro /* 312213058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 312313058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 312413058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 312513058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 312613058a91SGregory Neil Shapiro */ 312713058a91SGregory Neil Shapiro 312813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 312913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 313013058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 313113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 313213058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 313313058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 313413058a91SGregory Neil Shapiro #ifdef SIGUSR1 313513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 313613058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 3137605302a5SGregory Neil Shapiro 3138605302a5SGregory Neil Shapiro /* Turn back on signals */ 313940266059SGregory Neil Shapiro sm_allsignals(false); 31408774250cSGregory Neil Shapiro 31418774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 31428774250cSGregory Neil Shapiro save_errno = errno; 31438774250cSGregory Neil Shapiro 314413058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 314540266059SGregory Neil Shapiro sm_allsignals(true); 314613058a91SGregory Neil Shapiro 314713058a91SGregory Neil Shapiro /* For finis() events */ 314840266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 314913058a91SGregory Neil Shapiro 315013058a91SGregory Neil Shapiro #ifdef SIGUSR1 315113058a91SGregory Neil Shapiro /* For debugging finis() */ 315240266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 315313058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 31548774250cSGregory Neil Shapiro 31558774250cSGregory Neil Shapiro errno = save_errno; 31568774250cSGregory Neil Shapiro if (LogLevel > 0) 315740266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 315840266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 315940266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 316040266059SGregory Neil Shapiro /* NOTREACHED */ 31618774250cSGregory Neil Shapiro } 316240266059SGregory Neil Shapiro /* 3163c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3164c2aa98e2SPeter Wemm ** 3165c2aa98e2SPeter Wemm ** Parameters: 3166c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3167c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3168c2aa98e2SPeter Wemm ** 3169c2aa98e2SPeter Wemm ** Returns: 3170c2aa98e2SPeter Wemm ** A list of aliases for this host. 3171c2aa98e2SPeter Wemm ** 3172c2aa98e2SPeter Wemm ** Side Effects: 3173c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3174c2aa98e2SPeter Wemm */ 3175c2aa98e2SPeter Wemm 3176c2aa98e2SPeter Wemm struct hostent * 3177c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3178c2aa98e2SPeter Wemm char hostbuf[]; 3179c2aa98e2SPeter Wemm int size; 3180c2aa98e2SPeter Wemm { 3181c2aa98e2SPeter Wemm register struct hostent *hp; 3182c2aa98e2SPeter Wemm 3183602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 318440266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 318506f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 318613058a91SGregory Neil Shapiro #if NETINET && NETINET6 318713058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 318813058a91SGregory Neil Shapiro { 318913058a91SGregory Neil Shapiro /* 319013058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 319113058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 319213058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 319313058a91SGregory Neil Shapiro */ 319413058a91SGregory Neil Shapiro 319513058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 319613058a91SGregory Neil Shapiro } 319713058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3198c2aa98e2SPeter Wemm if (hp == NULL) 3199c2aa98e2SPeter Wemm return NULL; 3200c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 320106f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 320206f25ae9SGregory Neil Shapiro 320306f25ae9SGregory Neil Shapiro #if NETINFO 320406f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3205c2aa98e2SPeter Wemm { 320606f25ae9SGregory Neil Shapiro char *domainname; 320706f25ae9SGregory Neil Shapiro 320806f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 320906f25ae9SGregory Neil Shapiro "domain", '\0'); 321006f25ae9SGregory Neil Shapiro if (domainname != NULL && 321106f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 321240266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 321306f25ae9SGregory Neil Shapiro } 321406f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3215c2aa98e2SPeter Wemm 3216c2aa98e2SPeter Wemm /* 3217c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3218c2aa98e2SPeter Wemm ** dotted alias. 3219c2aa98e2SPeter Wemm */ 3220c2aa98e2SPeter Wemm 3221c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3222c2aa98e2SPeter Wemm { 3223c2aa98e2SPeter Wemm char **ha; 3224c2aa98e2SPeter Wemm 322506f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3226c2aa98e2SPeter Wemm { 3227c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3228c2aa98e2SPeter Wemm { 322906f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3230c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3231c2aa98e2SPeter Wemm break; 3232c2aa98e2SPeter Wemm } 3233c2aa98e2SPeter Wemm } 3234c2aa98e2SPeter Wemm } 3235c2aa98e2SPeter Wemm 3236c2aa98e2SPeter Wemm /* 3237c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3238c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3239c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3240c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3241c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3242c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3243c2aa98e2SPeter Wemm */ 3244c2aa98e2SPeter Wemm 3245c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 324640266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3247c2aa98e2SPeter Wemm { 3248c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 3249c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3250c2aa98e2SPeter Wemm hostbuf); 3251c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3252c2aa98e2SPeter Wemm hostbuf); 325306f25ae9SGregory Neil Shapiro (void) sleep(60); 325440266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3255c2aa98e2SPeter Wemm { 3256c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 3257c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3258c2aa98e2SPeter Wemm hostbuf); 3259c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3260c2aa98e2SPeter Wemm hostbuf); 3261c2aa98e2SPeter Wemm } 3262c2aa98e2SPeter Wemm } 326306f25ae9SGregory Neil Shapiro return hp; 3264c2aa98e2SPeter Wemm } 326540266059SGregory Neil Shapiro /* 3266c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3267c2aa98e2SPeter Wemm ** 3268c2aa98e2SPeter Wemm ** Parameters: 3269c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3270c2aa98e2SPeter Wemm ** ha -- actual first address 3271c2aa98e2SPeter Wemm ** sa -- second address 3272c2aa98e2SPeter Wemm ** 3273c2aa98e2SPeter Wemm ** Returns: 3274c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3275c2aa98e2SPeter Wemm ** else -- they don't match 3276c2aa98e2SPeter Wemm */ 3277c2aa98e2SPeter Wemm 327806f25ae9SGregory Neil Shapiro static int 3279c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3280c2aa98e2SPeter Wemm struct hostent *hp; 3281c2aa98e2SPeter Wemm char *ha; 3282c2aa98e2SPeter Wemm SOCKADDR *sa; 3283c2aa98e2SPeter Wemm { 328406f25ae9SGregory Neil Shapiro #if NETINET6 328540266059SGregory Neil Shapiro unsigned char *a; 328606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 328706f25ae9SGregory Neil Shapiro 3288c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3289c2aa98e2SPeter Wemm { 329006f25ae9SGregory Neil Shapiro #if NETINET 3291c2aa98e2SPeter Wemm case AF_INET: 3292c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 329306f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3294c2aa98e2SPeter Wemm break; 329506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3296c2aa98e2SPeter Wemm 329706f25ae9SGregory Neil Shapiro #if NETINET6 329806f25ae9SGregory Neil Shapiro case AF_INET6: 329940266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 330006f25ae9SGregory Neil Shapiro 330106f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 330206f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 330306f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 330406f25ae9SGregory Neil Shapiro 330506f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 330606f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 330706f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 330806f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 330906f25ae9SGregory Neil Shapiro break; 331006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3311c2aa98e2SPeter Wemm } 3312c2aa98e2SPeter Wemm return -1; 3313c2aa98e2SPeter Wemm } 331440266059SGregory Neil Shapiro /* 331506f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3316c2aa98e2SPeter Wemm ** 3317c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3318c2aa98e2SPeter Wemm ** 3319c2aa98e2SPeter Wemm ** Parameters: 3320c2aa98e2SPeter Wemm ** fd -- the descriptor 332140266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3322c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 332340266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3324c2aa98e2SPeter Wemm ** 3325c2aa98e2SPeter Wemm ** Returns: 3326c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3327c2aa98e2SPeter Wemm */ 3328c2aa98e2SPeter Wemm 3329c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3330c2aa98e2SPeter Wemm 3331c2aa98e2SPeter Wemm static void 3332b6bacd31SGregory Neil Shapiro authtimeout(ignore) 3333b6bacd31SGregory Neil Shapiro int ignore; 3334c2aa98e2SPeter Wemm { 33358774250cSGregory Neil Shapiro /* 33368774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 33378774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 33388774250cSGregory Neil Shapiro ** DOING. 33398774250cSGregory Neil Shapiro */ 33408774250cSGregory Neil Shapiro 33418774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3342c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3343c2aa98e2SPeter Wemm } 3344c2aa98e2SPeter Wemm 3345c2aa98e2SPeter Wemm char * 3346c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3347c2aa98e2SPeter Wemm int fd; 3348c2aa98e2SPeter Wemm bool *may_be_forged; 3349c2aa98e2SPeter Wemm { 335040266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3351c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3352c2aa98e2SPeter Wemm register char *volatile p = NULL; 3353c2aa98e2SPeter Wemm SOCKADDR la; 3354c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 335540266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3356c2aa98e2SPeter Wemm register struct servent *sp; 335740266059SGregory Neil Shapiro # if NETINET 335840266059SGregory Neil Shapiro static unsigned short port4 = 0; 335940266059SGregory Neil Shapiro # endif /* NETINET */ 336040266059SGregory Neil Shapiro # if NETINET6 336140266059SGregory Neil Shapiro static unsigned short port6 = 0; 336240266059SGregory Neil Shapiro # endif /* NETINET6 */ 336340266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3364c2aa98e2SPeter Wemm volatile int s; 3365c2aa98e2SPeter Wemm int i = 0; 336640266059SGregory Neil Shapiro size_t len; 336740266059SGregory Neil Shapiro SM_EVENT *ev; 3368c2aa98e2SPeter Wemm int nleft; 3369c2aa98e2SPeter Wemm struct hostent *hp; 3370c2aa98e2SPeter Wemm char *ostype = NULL; 3371c2aa98e2SPeter Wemm char **ha; 3372c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 337313bd1963SGregory Neil Shapiro static char hbuf[MAXNAME + MAXAUTHINFO + 11]; 3374c2aa98e2SPeter Wemm 337540266059SGregory Neil Shapiro *may_be_forged = false; 3376c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 3377c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3378c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3379c2aa98e2SPeter Wemm { 338006f25ae9SGregory Neil Shapiro if (i < 0) 338106f25ae9SGregory Neil Shapiro { 338206f25ae9SGregory Neil Shapiro /* 338306f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 338406f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 338506f25ae9SGregory Neil Shapiro ** happen later. 338606f25ae9SGregory Neil Shapiro */ 338740266059SGregory Neil Shapiro 338806f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3389c2aa98e2SPeter Wemm return NULL; 339006f25ae9SGregory Neil Shapiro errno = 0; 339106f25ae9SGregory Neil Shapiro } 339240266059SGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof hbuf, 2, RealUserName, 339340266059SGregory Neil Shapiro "@localhost"); 3394c2aa98e2SPeter Wemm if (tTd(9, 1)) 339540266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3396c2aa98e2SPeter Wemm return hbuf; 3397c2aa98e2SPeter Wemm } 3398c2aa98e2SPeter Wemm 3399c2aa98e2SPeter Wemm if (RealHostName == NULL) 3400c2aa98e2SPeter Wemm { 3401c2aa98e2SPeter Wemm /* translate that to a host name */ 3402c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3403c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 340440266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3405c2aa98e2SPeter Wemm } 3406c2aa98e2SPeter Wemm 3407c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 340840266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 340940266059SGregory Neil Shapiro RealHostName[0] != '[') 3410c2aa98e2SPeter Wemm { 341113058a91SGregory Neil Shapiro int family; 3412c2aa98e2SPeter Wemm 341313058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 341413058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 341513058a91SGregory Neil Shapiro /* 341613058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 341713058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 341813058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 341913058a91SGregory Neil Shapiro ** RealHostAddr. 342013058a91SGregory Neil Shapiro ** 342113058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 342213058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 342313058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 342413058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 342513058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 342613058a91SGregory Neil Shapiro */ 342713058a91SGregory Neil Shapiro 342813058a91SGregory Neil Shapiro if (family == AF_INET6 && 342913058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 343013058a91SGregory Neil Shapiro family = AF_INET; 343113058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 343213058a91SGregory Neil Shapiro 343313058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 343413058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3435c2aa98e2SPeter Wemm if (hp == NULL) 3436a7ec597cSGregory Neil Shapiro { 3437e92d3f3fSGregory Neil Shapiro /* XXX: Could be a temporary error on forward lookup */ 343840266059SGregory Neil Shapiro *may_be_forged = true; 3439a7ec597cSGregory Neil Shapiro } 3440c2aa98e2SPeter Wemm else 3441c2aa98e2SPeter Wemm { 3442c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 344340266059SGregory Neil Shapiro { 3444c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3445c2aa98e2SPeter Wemm break; 344640266059SGregory Neil Shapiro } 3447c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 344840266059SGregory Neil Shapiro #if NETINET6 3449193538b7SGregory Neil Shapiro freehostent(hp); 3450193538b7SGregory Neil Shapiro hp = NULL; 345140266059SGregory Neil Shapiro #endif /* NETINET6 */ 3452c2aa98e2SPeter Wemm } 3453c2aa98e2SPeter Wemm } 3454c2aa98e2SPeter Wemm 3455c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3456c2aa98e2SPeter Wemm goto noident; 3457c2aa98e2SPeter Wemm 3458c2aa98e2SPeter Wemm lalen = sizeof la; 345906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 346006f25ae9SGregory Neil Shapiro { 346106f25ae9SGregory Neil Shapiro #if NETINET 346206f25ae9SGregory Neil Shapiro case AF_INET: 346306f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 346406f25ae9SGregory Neil Shapiro lalen <= 0 || 3465c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3466c2aa98e2SPeter Wemm { 3467c2aa98e2SPeter Wemm /* no ident info */ 3468c2aa98e2SPeter Wemm goto noident; 3469c2aa98e2SPeter Wemm } 347006f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3471c2aa98e2SPeter Wemm 3472c2aa98e2SPeter Wemm /* create ident query */ 347340266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 347406f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 347506f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3476c2aa98e2SPeter Wemm 3477c2aa98e2SPeter Wemm /* create local address */ 3478c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3479c2aa98e2SPeter Wemm 3480c2aa98e2SPeter Wemm /* create foreign address */ 348106f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 348206f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 348306f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 348440266059SGregory Neil Shapiro 348540266059SGregory Neil Shapiro /* 348640266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 348740266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 348840266059SGregory Neil Shapiro ** spent in this routine). 348940266059SGregory Neil Shapiro ** Hence we store the port in a static variable 349040266059SGregory Neil Shapiro ** to save this time. 349140266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 349240266059SGregory Neil Shapiro ** This code makes the assumption that the port number 349340266059SGregory Neil Shapiro ** is not 0. 349440266059SGregory Neil Shapiro */ 349540266059SGregory Neil Shapiro 349640266059SGregory Neil Shapiro if (port4 == 0) 349740266059SGregory Neil Shapiro { 3498c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3499c2aa98e2SPeter Wemm if (sp != NULL) 350040266059SGregory Neil Shapiro port4 = sp->s_port; 3501c2aa98e2SPeter Wemm else 350240266059SGregory Neil Shapiro port4 = htons(113); 350340266059SGregory Neil Shapiro } 350440266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 350506f25ae9SGregory Neil Shapiro break; 350606f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 350706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 350806f25ae9SGregory Neil Shapiro 350906f25ae9SGregory Neil Shapiro #if NETINET6 351006f25ae9SGregory Neil Shapiro case AF_INET6: 351106f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 351206f25ae9SGregory Neil Shapiro lalen <= 0 || 351306f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 351406f25ae9SGregory Neil Shapiro { 351506f25ae9SGregory Neil Shapiro /* no ident info */ 351606f25ae9SGregory Neil Shapiro goto noident; 351706f25ae9SGregory Neil Shapiro } 351806f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 351906f25ae9SGregory Neil Shapiro 352006f25ae9SGregory Neil Shapiro /* create ident query */ 352140266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 352206f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 352306f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 352406f25ae9SGregory Neil Shapiro 352506f25ae9SGregory Neil Shapiro /* create local address */ 352606f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 352706f25ae9SGregory Neil Shapiro 352806f25ae9SGregory Neil Shapiro /* create foreign address */ 352906f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 353006f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 353106f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 353240266059SGregory Neil Shapiro if (port6 == 0) 353340266059SGregory Neil Shapiro { 353406f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 353506f25ae9SGregory Neil Shapiro if (sp != NULL) 353640266059SGregory Neil Shapiro port6 = sp->s_port; 353706f25ae9SGregory Neil Shapiro else 353840266059SGregory Neil Shapiro port6 = htons(113); 353940266059SGregory Neil Shapiro } 354040266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 354106f25ae9SGregory Neil Shapiro break; 354206f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 354306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 354406f25ae9SGregory Neil Shapiro default: 354506f25ae9SGregory Neil Shapiro /* no ident info */ 354606f25ae9SGregory Neil Shapiro goto noident; 354706f25ae9SGregory Neil Shapiro } 3548c2aa98e2SPeter Wemm 3549c2aa98e2SPeter Wemm s = -1; 3550c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3551c2aa98e2SPeter Wemm { 3552c2aa98e2SPeter Wemm if (s >= 0) 3553c2aa98e2SPeter Wemm (void) close(s); 3554c2aa98e2SPeter Wemm goto noident; 3555c2aa98e2SPeter Wemm } 3556c2aa98e2SPeter Wemm 3557c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 355840266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3559c2aa98e2SPeter Wemm 3560c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 356106f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3562c2aa98e2SPeter Wemm if (s < 0) 3563c2aa98e2SPeter Wemm { 356440266059SGregory Neil Shapiro sm_clrevent(ev); 3565c2aa98e2SPeter Wemm goto noident; 3566c2aa98e2SPeter Wemm } 356706f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 356806f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3569c2aa98e2SPeter Wemm goto closeident; 3570c2aa98e2SPeter Wemm 3571c2aa98e2SPeter Wemm if (tTd(9, 10)) 357240266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3573c2aa98e2SPeter Wemm 3574c2aa98e2SPeter Wemm /* send query */ 3575c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3576c2aa98e2SPeter Wemm goto closeident; 3577c2aa98e2SPeter Wemm 3578c2aa98e2SPeter Wemm /* get result */ 3579c2aa98e2SPeter Wemm p = &ibuf[0]; 3580c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 3581c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3582c2aa98e2SPeter Wemm { 3583323f6dcbSGregory Neil Shapiro char *s; 3584323f6dcbSGregory Neil Shapiro 3585c2aa98e2SPeter Wemm p += i; 3586c2aa98e2SPeter Wemm nleft -= i; 3587c2aa98e2SPeter Wemm *p = '\0'; 3588323f6dcbSGregory Neil Shapiro if ((s = strchr(ibuf, '\n')) != NULL) 3589323f6dcbSGregory Neil Shapiro { 3590323f6dcbSGregory Neil Shapiro if (p > s + 1) 3591323f6dcbSGregory Neil Shapiro { 3592323f6dcbSGregory Neil Shapiro p = s + 1; 3593323f6dcbSGregory Neil Shapiro *p = '\0'; 3594323f6dcbSGregory Neil Shapiro } 3595323f6dcbSGregory Neil Shapiro break; 3596323f6dcbSGregory Neil Shapiro } 3597323f6dcbSGregory Neil Shapiro if (nleft <= 0) 3598c2aa98e2SPeter Wemm break; 3599c2aa98e2SPeter Wemm } 3600c2aa98e2SPeter Wemm (void) close(s); 360140266059SGregory Neil Shapiro sm_clrevent(ev); 3602c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3603c2aa98e2SPeter Wemm goto noident; 3604c2aa98e2SPeter Wemm 3605d9986b26SGregory Neil Shapiro if (p >= &ibuf[2] && *--p == '\n' && *--p == '\r') 3606c2aa98e2SPeter Wemm p--; 3607c2aa98e2SPeter Wemm *++p = '\0'; 3608c2aa98e2SPeter Wemm 3609c2aa98e2SPeter Wemm if (tTd(9, 3)) 361040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3611c2aa98e2SPeter Wemm 3612c2aa98e2SPeter Wemm /* parse result */ 3613c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3614c2aa98e2SPeter Wemm if (p == NULL) 3615c2aa98e2SPeter Wemm { 3616c2aa98e2SPeter Wemm /* malformed response */ 3617c2aa98e2SPeter Wemm goto noident; 3618c2aa98e2SPeter Wemm } 3619c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3620c2aa98e2SPeter Wemm continue; 362140266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3622c2aa98e2SPeter Wemm { 3623c2aa98e2SPeter Wemm /* presumably an error string */ 3624c2aa98e2SPeter Wemm goto noident; 3625c2aa98e2SPeter Wemm } 3626c2aa98e2SPeter Wemm p += 6; 3627c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3628c2aa98e2SPeter Wemm p++; 3629c2aa98e2SPeter Wemm if (*p++ != ':') 3630c2aa98e2SPeter Wemm { 3631c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3632c2aa98e2SPeter Wemm goto noident; 3633c2aa98e2SPeter Wemm } 3634c2aa98e2SPeter Wemm 3635c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3636c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3637c2aa98e2SPeter Wemm p++; 3638c2aa98e2SPeter Wemm ostype = p; 3639c2aa98e2SPeter Wemm p = strchr(p, ':'); 3640c2aa98e2SPeter Wemm if (p == NULL) 3641c2aa98e2SPeter Wemm { 3642c2aa98e2SPeter Wemm /* malformed response */ 3643c2aa98e2SPeter Wemm goto noident; 3644c2aa98e2SPeter Wemm } 3645c2aa98e2SPeter Wemm else 3646c2aa98e2SPeter Wemm { 3647c2aa98e2SPeter Wemm char *charset; 3648c2aa98e2SPeter Wemm 3649c2aa98e2SPeter Wemm *p = '\0'; 3650c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3651c2aa98e2SPeter Wemm if (charset != NULL) 3652c2aa98e2SPeter Wemm *charset = '\0'; 3653c2aa98e2SPeter Wemm } 3654c2aa98e2SPeter Wemm 3655c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3656c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3657c2aa98e2SPeter Wemm continue; 3658c2aa98e2SPeter Wemm 3659c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 366040266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3661c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3662c2aa98e2SPeter Wemm { 366340266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof hbuf); 366413bd1963SGregory Neil Shapiro cleanstrcpy(&hbuf[6], p, MAXAUTHINFO); 3665c2aa98e2SPeter Wemm } 3666c2aa98e2SPeter Wemm else 366713bd1963SGregory Neil Shapiro cleanstrcpy(hbuf, p, MAXAUTHINFO); 366840266059SGregory Neil Shapiro len = strlen(hbuf); 366940266059SGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof hbuf - len, 2, "@", 3670c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3671c2aa98e2SPeter Wemm goto postident; 3672c2aa98e2SPeter Wemm 3673c2aa98e2SPeter Wemm closeident: 3674c2aa98e2SPeter Wemm (void) close(s); 367540266059SGregory Neil Shapiro sm_clrevent(ev); 3676c2aa98e2SPeter Wemm 3677c2aa98e2SPeter Wemm noident: 367806f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 367906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 368006f25ae9SGregory Neil Shapiro { 368106f25ae9SGregory Neil Shapiro #if NETINET 368206f25ae9SGregory Neil Shapiro case AF_INET: 368306f25ae9SGregory Neil Shapiro if (port > 0) 368406f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 368506f25ae9SGregory Neil Shapiro break; 368606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 368706f25ae9SGregory Neil Shapiro 368806f25ae9SGregory Neil Shapiro #if NETINET6 368906f25ae9SGregory Neil Shapiro case AF_INET6: 369006f25ae9SGregory Neil Shapiro if (port > 0) 369106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 369206f25ae9SGregory Neil Shapiro break; 369306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 369406f25ae9SGregory Neil Shapiro } 369506f25ae9SGregory Neil Shapiro 3696c2aa98e2SPeter Wemm if (RealHostName == NULL) 3697c2aa98e2SPeter Wemm { 3698c2aa98e2SPeter Wemm if (tTd(9, 1)) 369940266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3700c2aa98e2SPeter Wemm return NULL; 3701c2aa98e2SPeter Wemm } 370240266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof hbuf); 3703c2aa98e2SPeter Wemm 3704c2aa98e2SPeter Wemm postident: 3705c2aa98e2SPeter Wemm #if IP_SRCROUTE 3706c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3707c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 370806f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3709c2aa98e2SPeter Wemm /* 3710c2aa98e2SPeter Wemm ** Extract IP source routing information. 3711c2aa98e2SPeter Wemm ** 3712c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3713c2aa98e2SPeter Wemm ** through c to d: 3714c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3715c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3716c2aa98e2SPeter Wemm ** 3717c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3718c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3719c2aa98e2SPeter Wemm ** p - pointer to hbuf 3720c2aa98e2SPeter Wemm */ 3721c2aa98e2SPeter Wemm 3722c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3723c2aa98e2SPeter Wemm { 3724c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3725c2aa98e2SPeter Wemm int j; 372640266059SGregory Neil Shapiro unsigned char *q; 372740266059SGregory Neil Shapiro unsigned char *o; 3728c2aa98e2SPeter Wemm int l; 372906f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3730c2aa98e2SPeter Wemm 3731c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3732c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3733c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3734c2aa98e2SPeter Wemm goto noipsr; 3735c2aa98e2SPeter Wemm if (ipoptlen == 0) 3736c2aa98e2SPeter Wemm goto noipsr; 373740266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 373840266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3739c2aa98e2SPeter Wemm { 3740c2aa98e2SPeter Wemm switch (*o) 3741c2aa98e2SPeter Wemm { 3742c2aa98e2SPeter Wemm case IPOPT_EOL: 3743c2aa98e2SPeter Wemm o = NULL; 3744c2aa98e2SPeter Wemm break; 3745c2aa98e2SPeter Wemm 3746c2aa98e2SPeter Wemm case IPOPT_NOP: 3747c2aa98e2SPeter Wemm o++; 3748c2aa98e2SPeter Wemm break; 3749c2aa98e2SPeter Wemm 3750c2aa98e2SPeter Wemm case IPOPT_SSRR: 3751c2aa98e2SPeter Wemm case IPOPT_LSRR: 3752c2aa98e2SPeter Wemm /* 3753c2aa98e2SPeter Wemm ** Source routing. 3754c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3755c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3756c2aa98e2SPeter Wemm ** including option type and 3757c2aa98e2SPeter Wemm ** length. 3758c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3759c2aa98e2SPeter Wemm ** data. 3760c2aa98e2SPeter Wemm ** o[3] begins the route data. 3761c2aa98e2SPeter Wemm */ 3762c2aa98e2SPeter Wemm 3763c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3764c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 376540266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 376640266059SGregory Neil Shapiro " [%s@%.*s", 3767c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3768c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 376906f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3770c2aa98e2SPeter Wemm i = strlen(p); 3771c2aa98e2SPeter Wemm p += i; 3772c2aa98e2SPeter Wemm l -= strlen(p); 3773c2aa98e2SPeter Wemm 3774c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3775c2aa98e2SPeter Wemm 3776c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3777c2aa98e2SPeter Wemm q = &o[3]; 3778c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3779c2aa98e2SPeter Wemm { 378006f25ae9SGregory Neil Shapiro struct in_addr addr; 378106f25ae9SGregory Neil Shapiro 3782c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 378340266059SGregory Neil Shapiro (void) sm_snprintf(p, 378440266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3785c2aa98e2SPeter Wemm "%c%.*s", 3786c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3787c2aa98e2SPeter Wemm l > 240 ? 120 : 3788c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3789c2aa98e2SPeter Wemm inet_ntoa(addr)); 3790c2aa98e2SPeter Wemm i = strlen(p); 3791c2aa98e2SPeter Wemm p += i; 3792c2aa98e2SPeter Wemm l -= i + 1; 3793c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3794c2aa98e2SPeter Wemm } 3795c2aa98e2SPeter Wemm o += o[1]; 3796c2aa98e2SPeter Wemm break; 3797c2aa98e2SPeter Wemm 3798c2aa98e2SPeter Wemm default: 3799c2aa98e2SPeter Wemm /* Skip over option */ 3800c2aa98e2SPeter Wemm o += o[1]; 3801c2aa98e2SPeter Wemm break; 3802c2aa98e2SPeter Wemm } 3803c2aa98e2SPeter Wemm } 380440266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3805c2aa98e2SPeter Wemm goto postipsr; 3806c2aa98e2SPeter Wemm } 3807c2aa98e2SPeter Wemm 3808c2aa98e2SPeter Wemm noipsr: 380906f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3810c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3811c2aa98e2SPeter Wemm { 3812c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 381340266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3814c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3815c2aa98e2SPeter Wemm } 3816c2aa98e2SPeter Wemm if (*may_be_forged) 3817c2aa98e2SPeter Wemm { 3818c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 381940266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 382040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 382140266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3822c2aa98e2SPeter Wemm } 3823c2aa98e2SPeter Wemm 3824c2aa98e2SPeter Wemm #if IP_SRCROUTE 3825c2aa98e2SPeter Wemm postipsr: 382606f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 382706f25ae9SGregory Neil Shapiro 382806f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 382906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 383006f25ae9SGregory Neil Shapiro { 383106f25ae9SGregory Neil Shapiro #if NETINET 383206f25ae9SGregory Neil Shapiro case AF_INET: 383306f25ae9SGregory Neil Shapiro if (port > 0) 383406f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 383506f25ae9SGregory Neil Shapiro break; 383606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 383706f25ae9SGregory Neil Shapiro 383806f25ae9SGregory Neil Shapiro #if NETINET6 383906f25ae9SGregory Neil Shapiro case AF_INET6: 384006f25ae9SGregory Neil Shapiro if (port > 0) 384106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 384206f25ae9SGregory Neil Shapiro break; 384306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 384406f25ae9SGregory Neil Shapiro } 384506f25ae9SGregory Neil Shapiro 384640266059SGregory Neil Shapiro if (tTd(9, 1)) 384740266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3848c2aa98e2SPeter Wemm return hbuf; 3849c2aa98e2SPeter Wemm } 385040266059SGregory Neil Shapiro /* 3851c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3852c2aa98e2SPeter Wemm ** 3853c2aa98e2SPeter Wemm ** Parameters: 3854c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3855c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3856c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3857c2aa98e2SPeter Wemm ** functions. 3858c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3859c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3860c2aa98e2SPeter Wemm ** 3861c2aa98e2SPeter Wemm ** Returns: 3862c2aa98e2SPeter Wemm ** The mapping, if found. 3863c2aa98e2SPeter Wemm ** NULL if no mapping found. 3864c2aa98e2SPeter Wemm ** 3865c2aa98e2SPeter Wemm ** Side Effects: 3866c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3867c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3868c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3869c2aa98e2SPeter Wemm ** status only to be returned). 3870c2aa98e2SPeter Wemm */ 3871c2aa98e2SPeter Wemm 3872c2aa98e2SPeter Wemm char * 3873c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3874c2aa98e2SPeter Wemm MAP *map; 3875c2aa98e2SPeter Wemm char *name; 3876c2aa98e2SPeter Wemm char **av; 3877c2aa98e2SPeter Wemm int *statp; 3878c2aa98e2SPeter Wemm { 3879c2aa98e2SPeter Wemm register struct hostent *hp; 388006f25ae9SGregory Neil Shapiro #if NETINET 3881c2aa98e2SPeter Wemm struct in_addr in_addr; 388206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 388306f25ae9SGregory Neil Shapiro #if NETINET6 388406f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 388506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 388606f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3887c2aa98e2SPeter Wemm register STAB *s; 388840266059SGregory Neil Shapiro time_t now; 388940266059SGregory Neil Shapiro #if NAMED_BIND 389040266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 389140266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 389240266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3893c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3894c2aa98e2SPeter Wemm 3895c2aa98e2SPeter Wemm /* 3896c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 389740266059SGregory Neil Shapiro ** return it (unless expired). 3898c2aa98e2SPeter Wemm */ 3899c2aa98e2SPeter Wemm 390040266059SGregory Neil Shapiro now = curtime(); 3901c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 390240266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 390340266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3904c2aa98e2SPeter Wemm { 3905c2aa98e2SPeter Wemm if (tTd(9, 1)) 390640266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3907c2aa98e2SPeter Wemm name, 3908c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3909c2aa98e2SPeter Wemm ? "NULL" 3910c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3911c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3912602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3913c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3914c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3915c2aa98e2SPeter Wemm { 3916c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3917c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3918c2aa98e2SPeter Wemm shortenstring(name, 33)); 3919c2aa98e2SPeter Wemm } 3920c2aa98e2SPeter Wemm if (*statp != EX_OK) 3921c2aa98e2SPeter Wemm return NULL; 3922c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3923c2aa98e2SPeter Wemm { 3924c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno=%d, h_errno=%d", 3925c2aa98e2SPeter Wemm name, 3926c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3927c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3928c2aa98e2SPeter Wemm return NULL; 3929c2aa98e2SPeter Wemm } 3930c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3931c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3932c2aa98e2SPeter Wemm else 3933c2aa98e2SPeter Wemm cp = map_rewrite(map, 3934c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3935c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3936c2aa98e2SPeter Wemm av); 3937c2aa98e2SPeter Wemm return cp; 3938c2aa98e2SPeter Wemm } 3939c2aa98e2SPeter Wemm 3940c2aa98e2SPeter Wemm /* 3941c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3942c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3943c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3944c2aa98e2SPeter Wemm */ 3945c2aa98e2SPeter Wemm 394606f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 394706f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3948c2aa98e2SPeter Wemm { 3949c2aa98e2SPeter Wemm if (tTd(9, 1)) 395040266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3951c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3952c2aa98e2SPeter Wemm return NULL; 3953c2aa98e2SPeter Wemm } 3954c2aa98e2SPeter Wemm 3955c2aa98e2SPeter Wemm /* 3956c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3957c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3958c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3959c2aa98e2SPeter Wemm ** unknown. 3960c2aa98e2SPeter Wemm */ 3961c2aa98e2SPeter Wemm 396206f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 396340266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 396440266059SGregory Neil Shapiro #if NAMED_BIND 396540266059SGregory Neil Shapiro if (map->map_timeout > 0) 396640266059SGregory Neil Shapiro { 396740266059SGregory Neil Shapiro retrans = _res.retrans; 396840266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 396940266059SGregory Neil Shapiro } 397040266059SGregory Neil Shapiro if (map->map_retry > 0) 397140266059SGregory Neil Shapiro { 397240266059SGregory Neil Shapiro retry = _res.retry; 397340266059SGregory Neil Shapiro _res.retry = map->map_retry; 397440266059SGregory Neil Shapiro } 397540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 397640266059SGregory Neil Shapiro 397740266059SGregory Neil Shapiro /* set default TTL */ 397840266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 3979c2aa98e2SPeter Wemm if (*name != '[') 3980c2aa98e2SPeter Wemm { 398140266059SGregory Neil Shapiro int ttl; 398240266059SGregory Neil Shapiro 398340266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof hbuf); 398440266059SGregory Neil Shapiro if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX, &ttl)) 398540266059SGregory Neil Shapiro { 398606f25ae9SGregory Neil Shapiro ans = hbuf; 398740266059SGregory Neil Shapiro if (ttl > 0) 398840266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 398940266059SGregory Neil Shapiro SM_DEFAULT_TTL); 399040266059SGregory Neil Shapiro } 3991c2aa98e2SPeter Wemm } 3992c2aa98e2SPeter Wemm else 3993c2aa98e2SPeter Wemm { 399406f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3995193538b7SGregory Neil Shapiro { 3996193538b7SGregory Neil Shapiro if (tTd(9, 1)) 399740266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 399806f25ae9SGregory Neil Shapiro return NULL; 3999193538b7SGregory Neil Shapiro } 400006f25ae9SGregory Neil Shapiro *cp = '\0'; 400106f25ae9SGregory Neil Shapiro 400206f25ae9SGregory Neil Shapiro hp = NULL; 400306f25ae9SGregory Neil Shapiro #if NETINET 400406f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 400506f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 400606f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 400706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 400806f25ae9SGregory Neil Shapiro #if NETINET6 400906f25ae9SGregory Neil Shapiro if (hp == NULL && 401040266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 401106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 401206f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 401306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 401406f25ae9SGregory Neil Shapiro *cp = ']'; 401506f25ae9SGregory Neil Shapiro 401606f25ae9SGregory Neil Shapiro if (hp != NULL) 401706f25ae9SGregory Neil Shapiro { 401806f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 401940266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 402040266059SGregory Neil Shapiro #if NETINET6 402140266059SGregory Neil Shapiro if (ans == hp->h_name) 402240266059SGregory Neil Shapiro { 402340266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 402440266059SGregory Neil Shapiro 402540266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 402640266059SGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof n); 402740266059SGregory Neil Shapiro ans = n; 402840266059SGregory Neil Shapiro } 4029193538b7SGregory Neil Shapiro freehostent(hp); 4030193538b7SGregory Neil Shapiro hp = NULL; 403140266059SGregory Neil Shapiro #endif /* NETINET6 */ 403206f25ae9SGregory Neil Shapiro } 403306f25ae9SGregory Neil Shapiro } 403440266059SGregory Neil Shapiro #if NAMED_BIND 403540266059SGregory Neil Shapiro if (map->map_timeout > 0) 403640266059SGregory Neil Shapiro _res.retrans = retrans; 403740266059SGregory Neil Shapiro if (map->map_retry > 0) 403840266059SGregory Neil Shapiro _res.retry = retry; 403940266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 404006f25ae9SGregory Neil Shapiro 404106f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 404206f25ae9SGregory Neil Shapiro 404306f25ae9SGregory Neil Shapiro /* Found an answer */ 404406f25ae9SGregory Neil Shapiro if (ans != NULL) 404506f25ae9SGregory Neil Shapiro { 404606f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 404740266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 404840266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 404940266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 405006f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 405106f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 405206f25ae9SGregory Neil Shapiro else 405306f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 4054193538b7SGregory Neil Shapiro if (tTd(9, 1)) 405540266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 405606f25ae9SGregory Neil Shapiro return cp; 405706f25ae9SGregory Neil Shapiro } 405806f25ae9SGregory Neil Shapiro 405906f25ae9SGregory Neil Shapiro 406006f25ae9SGregory Neil Shapiro /* No match found */ 4061c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 4062c2aa98e2SPeter Wemm #if NAMED_BIND 4063c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 4064c2aa98e2SPeter Wemm if (tTd(9, 1)) 406540266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 4066c2aa98e2SPeter Wemm switch (h_errno) 4067c2aa98e2SPeter Wemm { 4068c2aa98e2SPeter Wemm case TRY_AGAIN: 4069c2aa98e2SPeter Wemm if (UseNameServer) 4070c2aa98e2SPeter Wemm { 4071c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 4072c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 4073c2aa98e2SPeter Wemm shortenstring(name, 33)); 4074c2aa98e2SPeter Wemm } 4075c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 4076c2aa98e2SPeter Wemm break; 4077c2aa98e2SPeter Wemm 4078c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 4079c2aa98e2SPeter Wemm case NO_DATA: 4080c2aa98e2SPeter Wemm *statp = EX_NOHOST; 4081c2aa98e2SPeter Wemm break; 4082c2aa98e2SPeter Wemm 4083c2aa98e2SPeter Wemm case NO_RECOVERY: 4084c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 4085c2aa98e2SPeter Wemm break; 4086c2aa98e2SPeter Wemm 4087c2aa98e2SPeter Wemm default: 4088c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 4089c2aa98e2SPeter Wemm break; 4090c2aa98e2SPeter Wemm } 409106f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 4092c2aa98e2SPeter Wemm if (tTd(9, 1)) 409340266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 4094c2aa98e2SPeter Wemm *statp = EX_NOHOST; 409506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 4096c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 4097c2aa98e2SPeter Wemm return NULL; 4098c2aa98e2SPeter Wemm } 4099c2aa98e2SPeter Wemm /* 4100c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 410140266059SGregory Neil Shapiro ** 410240266059SGregory Neil Shapiro ** Parameters: 410340266059SGregory Neil Shapiro ** map -- a pointer to this map. 410440266059SGregory Neil Shapiro ** args -- argument string. 410540266059SGregory Neil Shapiro ** 410640266059SGregory Neil Shapiro ** Returns: 410740266059SGregory Neil Shapiro ** true. 4108c2aa98e2SPeter Wemm */ 4109c2aa98e2SPeter Wemm 4110c2aa98e2SPeter Wemm bool 4111c2aa98e2SPeter Wemm host_map_init(map, args) 4112c2aa98e2SPeter Wemm MAP *map; 4113c2aa98e2SPeter Wemm char *args; 4114c2aa98e2SPeter Wemm { 4115c2aa98e2SPeter Wemm register char *p = args; 4116c2aa98e2SPeter Wemm 4117c2aa98e2SPeter Wemm for (;;) 4118c2aa98e2SPeter Wemm { 4119c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 4120c2aa98e2SPeter Wemm p++; 4121c2aa98e2SPeter Wemm if (*p != '-') 4122c2aa98e2SPeter Wemm break; 4123c2aa98e2SPeter Wemm switch (*++p) 4124c2aa98e2SPeter Wemm { 4125c2aa98e2SPeter Wemm case 'a': 4126c2aa98e2SPeter Wemm map->map_app = ++p; 4127c2aa98e2SPeter Wemm break; 4128c2aa98e2SPeter Wemm 4129c2aa98e2SPeter Wemm case 'T': 4130c2aa98e2SPeter Wemm map->map_tapp = ++p; 4131c2aa98e2SPeter Wemm break; 4132c2aa98e2SPeter Wemm 4133c2aa98e2SPeter Wemm case 'm': 4134c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 4135c2aa98e2SPeter Wemm break; 4136c2aa98e2SPeter Wemm 4137c2aa98e2SPeter Wemm case 't': 4138c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 4139c2aa98e2SPeter Wemm break; 414006f25ae9SGregory Neil Shapiro 414106f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 414206f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 414306f25ae9SGregory Neil Shapiro break; 414406f25ae9SGregory Neil Shapiro 414506f25ae9SGregory Neil Shapiro case 'D': 414606f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 414706f25ae9SGregory Neil Shapiro break; 414840266059SGregory Neil Shapiro 414940266059SGregory Neil Shapiro case 'd': 415040266059SGregory Neil Shapiro { 415140266059SGregory Neil Shapiro char *h; 415240266059SGregory Neil Shapiro 415340266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 415440266059SGregory Neil Shapiro continue; 415540266059SGregory Neil Shapiro h = strchr(p, ' '); 415640266059SGregory Neil Shapiro if (h != NULL) 415740266059SGregory Neil Shapiro *h = '\0'; 415840266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 415940266059SGregory Neil Shapiro if (h != NULL) 416040266059SGregory Neil Shapiro *h = ' '; 416140266059SGregory Neil Shapiro } 416240266059SGregory Neil Shapiro break; 416340266059SGregory Neil Shapiro 416440266059SGregory Neil Shapiro case 'r': 416540266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 416640266059SGregory Neil Shapiro continue; 416740266059SGregory Neil Shapiro map->map_retry = atoi(p); 416840266059SGregory Neil Shapiro break; 4169c2aa98e2SPeter Wemm } 4170c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4171c2aa98e2SPeter Wemm p++; 4172c2aa98e2SPeter Wemm if (*p != '\0') 4173c2aa98e2SPeter Wemm *p++ = '\0'; 4174c2aa98e2SPeter Wemm } 4175c2aa98e2SPeter Wemm if (map->map_app != NULL) 4176c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4177c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4178c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 417940266059SGregory Neil Shapiro return true; 4180c2aa98e2SPeter Wemm } 418140266059SGregory Neil Shapiro 418206f25ae9SGregory Neil Shapiro #if NETINET6 418306f25ae9SGregory Neil Shapiro /* 418406f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 418506f25ae9SGregory Neil Shapiro ** 418606f25ae9SGregory Neil Shapiro ** Parameters: 418706f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 418806f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 418906f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 419006f25ae9SGregory Neil Shapiro ** 419106f25ae9SGregory Neil Shapiro ** Returns: 419206f25ae9SGregory Neil Shapiro ** A printable version of that structure. 419306f25ae9SGregory Neil Shapiro */ 419440266059SGregory Neil Shapiro 419506f25ae9SGregory Neil Shapiro char * 419606f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 419706f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 419806f25ae9SGregory Neil Shapiro char *dst; 419906f25ae9SGregory Neil Shapiro size_t dst_len; 420006f25ae9SGregory Neil Shapiro { 420106f25ae9SGregory Neil Shapiro register char *ap; 420206f25ae9SGregory Neil Shapiro 420306f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 420406f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 420506f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 420606f25ae9SGregory Neil Shapiro dst, dst_len); 420706f25ae9SGregory Neil Shapiro else 420840266059SGregory Neil Shapiro { 420940266059SGregory Neil Shapiro char *d; 421040266059SGregory Neil Shapiro size_t sz; 421140266059SGregory Neil Shapiro 421240266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 421340266059SGregory Neil Shapiro d = dst; 421440266059SGregory Neil Shapiro 421540266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 421640266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 421740266059SGregory Neil Shapiro if (sz >= dst_len) 421840266059SGregory Neil Shapiro return NULL; 421940266059SGregory Neil Shapiro dst += sz; 422040266059SGregory Neil Shapiro dst_len -= sz; 422106f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 422240266059SGregory Neil Shapiro 422340266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 422440266059SGregory Neil Shapiro if (ap != NULL) 422540266059SGregory Neil Shapiro ap = d; 422640266059SGregory Neil Shapiro } 422706f25ae9SGregory Neil Shapiro return ap; 422806f25ae9SGregory Neil Shapiro } 422940266059SGregory Neil Shapiro 423040266059SGregory Neil Shapiro /* 423140266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 423240266059SGregory Neil Shapiro ** 423340266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 423440266059SGregory Neil Shapiro ** 423540266059SGregory Neil Shapiro ** Parameters: 423640266059SGregory Neil Shapiro ** family -- address family 423740266059SGregory Neil Shapiro ** src -- string 423840266059SGregory Neil Shapiro ** dst -- destination address structure 423940266059SGregory Neil Shapiro ** 424040266059SGregory Neil Shapiro ** Returns: 424140266059SGregory Neil Shapiro ** 1 if the address was valid 424240266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 424340266059SGregory Neil Shapiro ** -1 if error 424440266059SGregory Neil Shapiro */ 424540266059SGregory Neil Shapiro 424640266059SGregory Neil Shapiro int 424740266059SGregory Neil Shapiro anynet_pton(family, src, dst) 424840266059SGregory Neil Shapiro int family; 424940266059SGregory Neil Shapiro const char *src; 425040266059SGregory Neil Shapiro void *dst; 425140266059SGregory Neil Shapiro { 425240266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 425340266059SGregory Neil Shapiro src += 5; 425440266059SGregory Neil Shapiro return inet_pton(family, src, dst); 425540266059SGregory Neil Shapiro } 425606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 425740266059SGregory Neil Shapiro /* 4258c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4259c2aa98e2SPeter Wemm ** 4260c2aa98e2SPeter Wemm ** Parameters: 4261c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4262c2aa98e2SPeter Wemm ** 4263c2aa98e2SPeter Wemm ** Returns: 4264c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4265c2aa98e2SPeter Wemm */ 4266c2aa98e2SPeter Wemm 4267c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4268c2aa98e2SPeter Wemm 4269c2aa98e2SPeter Wemm # if NETLINK 4270c2aa98e2SPeter Wemm # include <net/if_dl.h> 427106f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4272c2aa98e2SPeter Wemm 4273c2aa98e2SPeter Wemm char * 4274c2aa98e2SPeter Wemm anynet_ntoa(sap) 4275c2aa98e2SPeter Wemm register SOCKADDR *sap; 4276c2aa98e2SPeter Wemm { 4277c2aa98e2SPeter Wemm register char *bp; 4278c2aa98e2SPeter Wemm register char *ap; 4279c2aa98e2SPeter Wemm int l; 4280c2aa98e2SPeter Wemm static char buf[100]; 4281c2aa98e2SPeter Wemm 4282c2aa98e2SPeter Wemm /* check for null/zero family */ 4283c2aa98e2SPeter Wemm if (sap == NULL) 4284c2aa98e2SPeter Wemm return "NULLADDR"; 4285c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4286c2aa98e2SPeter Wemm return "0"; 4287c2aa98e2SPeter Wemm 4288c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4289c2aa98e2SPeter Wemm { 4290c2aa98e2SPeter Wemm # if NETUNIX 4291c2aa98e2SPeter Wemm case AF_UNIX: 4292c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 429340266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[UNIX: %.64s]", 4294c2aa98e2SPeter Wemm sap->sunix.sun_path); 4295c2aa98e2SPeter Wemm else 429640266059SGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof buf); 4297c2aa98e2SPeter Wemm return buf; 429806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4299c2aa98e2SPeter Wemm 4300c2aa98e2SPeter Wemm # if NETINET 4301c2aa98e2SPeter Wemm case AF_INET: 430206f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 430306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 430406f25ae9SGregory Neil Shapiro 430506f25ae9SGregory Neil Shapiro # if NETINET6 430606f25ae9SGregory Neil Shapiro case AF_INET6: 430706f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 430806f25ae9SGregory Neil Shapiro if (ap != NULL) 430906f25ae9SGregory Neil Shapiro return ap; 431006f25ae9SGregory Neil Shapiro break; 431106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4312c2aa98e2SPeter Wemm 4313c2aa98e2SPeter Wemm # if NETLINK 4314c2aa98e2SPeter Wemm case AF_LINK: 431540266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[LINK: %s]", 4316c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4317c2aa98e2SPeter Wemm return buf; 431806f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4319c2aa98e2SPeter Wemm default: 4320c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4321c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4322c2aa98e2SPeter Wemm break; 4323c2aa98e2SPeter Wemm } 4324c2aa98e2SPeter Wemm 4325c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 432640266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 4327c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4328c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4329c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 4330c2aa98e2SPeter Wemm { 433140266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 433240266059SGregory Neil Shapiro *ap++ & 0377); 4333c2aa98e2SPeter Wemm bp += 3; 4334c2aa98e2SPeter Wemm } 4335c2aa98e2SPeter Wemm *--bp = '\0'; 4336c2aa98e2SPeter Wemm return buf; 4337c2aa98e2SPeter Wemm } 433840266059SGregory Neil Shapiro /* 4339c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4340c2aa98e2SPeter Wemm ** 4341c2aa98e2SPeter Wemm ** Parameters: 4342c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4343c2aa98e2SPeter Wemm ** 4344c2aa98e2SPeter Wemm ** Returns: 4345c2aa98e2SPeter Wemm ** text representation of host name. 4346c2aa98e2SPeter Wemm ** 4347c2aa98e2SPeter Wemm ** Side Effects: 4348c2aa98e2SPeter Wemm ** none. 4349c2aa98e2SPeter Wemm */ 4350c2aa98e2SPeter Wemm 4351c2aa98e2SPeter Wemm char * 4352c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4353c2aa98e2SPeter Wemm register SOCKADDR *sap; 4354c2aa98e2SPeter Wemm { 4355c2aa98e2SPeter Wemm register struct hostent *hp; 435606f25ae9SGregory Neil Shapiro # if NAMED_BIND 4357c2aa98e2SPeter Wemm int saveretry; 435806f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 435906f25ae9SGregory Neil Shapiro # if NETINET6 436006f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 436106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4362c2aa98e2SPeter Wemm 4363c2aa98e2SPeter Wemm # if NAMED_BIND 4364c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4365c2aa98e2SPeter Wemm saveretry = _res.retry; 436606f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 436706f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4368c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4369c2aa98e2SPeter Wemm 4370c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4371c2aa98e2SPeter Wemm { 4372c2aa98e2SPeter Wemm # if NETINET 4373c2aa98e2SPeter Wemm case AF_INET: 4374c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 437540266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4376c2aa98e2SPeter Wemm break; 437706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 437806f25ae9SGregory Neil Shapiro 437906f25ae9SGregory Neil Shapiro # if NETINET6 438006f25ae9SGregory Neil Shapiro case AF_INET6: 438106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 438240266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 438306f25ae9SGregory Neil Shapiro break; 438406f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4385c2aa98e2SPeter Wemm 4386c2aa98e2SPeter Wemm # if NETISO 4387c2aa98e2SPeter Wemm case AF_ISO: 4388c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 438940266059SGregory Neil Shapiro sizeof sap->siso.siso_addr, AF_ISO); 4390c2aa98e2SPeter Wemm break; 439106f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4392c2aa98e2SPeter Wemm 4393c2aa98e2SPeter Wemm # if NETUNIX 4394c2aa98e2SPeter Wemm case AF_UNIX: 4395c2aa98e2SPeter Wemm hp = NULL; 4396c2aa98e2SPeter Wemm break; 439706f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4398c2aa98e2SPeter Wemm 4399c2aa98e2SPeter Wemm default: 440040266059SGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof sap->sa.sa_data, 4401c2aa98e2SPeter Wemm sap->sa.sa_family); 4402c2aa98e2SPeter Wemm break; 4403c2aa98e2SPeter Wemm } 4404c2aa98e2SPeter Wemm 4405c2aa98e2SPeter Wemm # if NAMED_BIND 4406c2aa98e2SPeter Wemm _res.retry = saveretry; 4407c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4408c2aa98e2SPeter Wemm 440906f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 441006f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 441106f25ae9SGregory Neil Shapiro # if NETINET6 441206f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 441306f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 441406f25ae9SGregory Neil Shapiro # if NETINET 441506f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 441606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 441706f25ae9SGregory Neil Shapiro ) 4418193538b7SGregory Neil Shapiro { 4419193538b7SGregory Neil Shapiro char *name; 4420193538b7SGregory Neil Shapiro 442140266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 442240266059SGregory Neil Shapiro # if NETINET6 4423193538b7SGregory Neil Shapiro if (name == hp->h_name) 4424193538b7SGregory Neil Shapiro { 4425193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4426193538b7SGregory Neil Shapiro 4427193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 442840266059SGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof n); 4429193538b7SGregory Neil Shapiro name = n; 4430193538b7SGregory Neil Shapiro } 4431193538b7SGregory Neil Shapiro freehostent(hp); 443240266059SGregory Neil Shapiro # endif /* NETINET6 */ 4433193538b7SGregory Neil Shapiro return name; 4434193538b7SGregory Neil Shapiro } 443506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4436193538b7SGregory Neil Shapiro 443740266059SGregory Neil Shapiro # if NETINET6 4438193538b7SGregory Neil Shapiro if (hp != NULL) 4439193538b7SGregory Neil Shapiro { 4440193538b7SGregory Neil Shapiro freehostent(hp); 4441193538b7SGregory Neil Shapiro hp = NULL; 4442193538b7SGregory Neil Shapiro } 444340266059SGregory Neil Shapiro # endif /* NETINET6 */ 4444193538b7SGregory Neil Shapiro 4445c2aa98e2SPeter Wemm # if NETUNIX 444606f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4447c2aa98e2SPeter Wemm return "localhost"; 444806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4449c2aa98e2SPeter Wemm { 4450c2aa98e2SPeter Wemm static char buf[203]; 4451c2aa98e2SPeter Wemm 445240266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[%.200s]", 445340266059SGregory Neil Shapiro anynet_ntoa(sap)); 4454c2aa98e2SPeter Wemm return buf; 4455c2aa98e2SPeter Wemm } 4456c2aa98e2SPeter Wemm } 445706f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4458