1c2aa98e2SPeter Wemm /* 25dd76dd0SGregory Neil Shapiro * Copyright (c) 1998-2007, 2009, 2010 Proofpoint, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 15d0cef73dSGregory Neil Shapiro #include "map.h" 1606f25ae9SGregory Neil Shapiro 174313cc83SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.698 2013-11-22 20:51:55 ca Exp $") 18*2fb4f839SGregory Neil Shapiro #include <sm/sendmail.h> 19c2aa98e2SPeter Wemm 20c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 21c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 225b0945b5SGregory Neil Shapiro #endif 23c2aa98e2SPeter Wemm 2440266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2506f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 26c2aa98e2SPeter Wemm # include <arpa/inet.h> 275b0945b5SGregory Neil Shapiro # endif 28c2aa98e2SPeter Wemm # if NAMED_BIND 29c2aa98e2SPeter Wemm # ifndef NO_DATA 30c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 315b0945b5SGregory Neil Shapiro # endif 3206f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3340266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 34c2aa98e2SPeter Wemm 3542e5d165SGregory Neil Shapiro #if STARTTLS 3642e5d165SGregory Neil Shapiro # include <openssl/rand.h> 375b0945b5SGregory Neil Shapiro # if DANE 385b0945b5SGregory Neil Shapiro # include "tls.h" 395b0945b5SGregory Neil Shapiro # include "sm_resolve.h" 405b0945b5SGregory Neil Shapiro # endif 415b0945b5SGregory Neil Shapiro #endif 425b0945b5SGregory Neil Shapiro 43*2fb4f839SGregory Neil Shapiro #if _FFR_DMTRIGGER 44*2fb4f839SGregory Neil Shapiro # include <sm/notify.h> 45*2fb4f839SGregory Neil Shapiro #endif 46*2fb4f839SGregory Neil Shapiro 475b0945b5SGregory Neil Shapiro #if NETINET6 485b0945b5SGregory Neil Shapiro # define FREEHOSTENT(h, s) \ 495b0945b5SGregory Neil Shapiro do \ 505b0945b5SGregory Neil Shapiro { \ 515b0945b5SGregory Neil Shapiro if ((h) != (s) && (h) != NULL) \ 525b0945b5SGregory Neil Shapiro { \ 535b0945b5SGregory Neil Shapiro freehostent((h)); \ 545b0945b5SGregory Neil Shapiro (h) = NULL; \ 555b0945b5SGregory Neil Shapiro } \ 565b0945b5SGregory Neil Shapiro } while (0) 575b0945b5SGregory Neil Shapiro #else 585b0945b5SGregory Neil Shapiro # define FREEHOSTENT(h, s) 595b0945b5SGregory Neil Shapiro #endif 6042e5d165SGregory Neil Shapiro 614e4196cbSGregory Neil Shapiro #include <sm/time.h> 62c2aa98e2SPeter Wemm 6306f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 64c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 65c2aa98e2SPeter Wemm # include <netinet/ip.h> 6606f25ae9SGregory Neil Shapiro # if HAS_IN_H 6706f25ae9SGregory Neil Shapiro # include <netinet/in.h> 6806f25ae9SGregory Neil Shapiro # ifndef IPOPTION 6906f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 7006f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 7106f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 7206f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 7306f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 74c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 7506f25ae9SGregory Neil Shapiro # ifndef IPOPTION 7606f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 7706f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 7806f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 7906f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 8006f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 8106f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 8206f25ae9SGregory Neil Shapiro 8340266059SGregory Neil Shapiro #include <sm/fdset.h> 8440266059SGregory Neil Shapiro 855b0945b5SGregory Neil Shapiro #include <ratectrl.h> 865b0945b5SGregory Neil Shapiro 87d0cef73dSGregory Neil Shapiro #define DAEMON_C 1 88d0cef73dSGregory Neil Shapiro #include <daemon.h> 8913d88268SGregory Neil Shapiro 90b6bacd31SGregory Neil Shapiro static void connecttimeout __P((int)); 9140266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 9240266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 9340266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 94b6bacd31SGregory Neil Shapiro static void setsockaddroptions __P((char *, DAEMON_T *)); 95b6bacd31SGregory Neil Shapiro static void printdaemonflags __P((DAEMON_T *)); 96b6bacd31SGregory Neil Shapiro static int addr_family __P((char *)); 97b6bacd31SGregory Neil Shapiro static int addrcmp __P((struct hostent *, char *, SOCKADDR *)); 98b6bacd31SGregory Neil Shapiro static void authtimeout __P((int)); 99c2aa98e2SPeter Wemm 100c2aa98e2SPeter Wemm /* 101c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 102c2aa98e2SPeter Wemm ** 103c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 104c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 105c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 106c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 107c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 108c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 109c2aa98e2SPeter Wemm ** 110c2aa98e2SPeter Wemm ** getrequests(e) 111c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 112c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 113c2aa98e2SPeter Wemm ** OutChannel appropriately. 114c2aa98e2SPeter Wemm ** clrdaemon() 115c2aa98e2SPeter Wemm ** Close any open files associated with getting 116c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 117c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 118c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 119c2aa98e2SPeter Wemm ** code (if it cares). 12040266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 121c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 12240266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 12340266059SGregory Neil Shapiro ** describing the error. 124c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 125c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 126c2aa98e2SPeter Wemm */ 12706f25ae9SGregory Neil Shapiro 12840266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 12906f25ae9SGregory Neil Shapiro 13040266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 13106f25ae9SGregory Neil Shapiro 13240266059SGregory Neil Shapiro /* 133c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 134c2aa98e2SPeter Wemm ** 135c2aa98e2SPeter Wemm ** Parameters: 136c2aa98e2SPeter Wemm ** e -- the current envelope. 137c2aa98e2SPeter Wemm ** 138c2aa98e2SPeter Wemm ** Returns: 13906f25ae9SGregory Neil Shapiro ** pointer to flags. 140c2aa98e2SPeter Wemm ** 141c2aa98e2SPeter Wemm ** Side Effects: 142c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 143c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 144c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 145c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 146c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 147c2aa98e2SPeter Wemm ** to the communication channel. 14840266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 14940266059SGregory Neil Shapiro ** for some reason. 150c2aa98e2SPeter Wemm */ 151c2aa98e2SPeter Wemm 15206f25ae9SGregory Neil Shapiro BITMAP256 * 153c2aa98e2SPeter Wemm getrequests(e) 154c2aa98e2SPeter Wemm ENVELOPE *e; 155c2aa98e2SPeter Wemm { 156c2aa98e2SPeter Wemm int t; 15706f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15806f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 159c2aa98e2SPeter Wemm #if XDEBUG 160c2aa98e2SPeter Wemm bool j_has_dot; 1615b0945b5SGregory Neil Shapiro #endif 162065a643dSPeter Wemm char status[MAXLINE]; 16306f25ae9SGregory Neil Shapiro SOCKADDR sa; 164d0cef73dSGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof(sa); 165605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 166605302a5SGregory Neil Shapiro time_t lastrun; 1675b0945b5SGregory Neil Shapiro #endif 16806f25ae9SGregory Neil Shapiro #if NETUNIX 169065a643dSPeter Wemm extern int ControlSocket; 1705b0945b5SGregory Neil Shapiro #endif 17106f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 172c2aa98e2SPeter Wemm 17306f25ae9SGregory Neil Shapiro 174323f6dcbSGregory Neil Shapiro /* initialize data for function that generates queue ids */ 175323f6dcbSGregory Neil Shapiro init_qid_alg(); 17640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 177c2aa98e2SPeter Wemm { 17806f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 17940266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 18006f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 181c2aa98e2SPeter Wemm } 182193538b7SGregory Neil Shapiro 183c2aa98e2SPeter Wemm /* 184c2aa98e2SPeter Wemm ** Try to actually open the connection. 185c2aa98e2SPeter Wemm */ 186c2aa98e2SPeter Wemm 187c2aa98e2SPeter Wemm if (tTd(15, 1)) 18806f25ae9SGregory Neil Shapiro { 18940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 190193538b7SGregory Neil Shapiro { 19140266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 19206f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 19306f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 19406f25ae9SGregory Neil Shapiro } 195193538b7SGregory Neil Shapiro } 196c2aa98e2SPeter Wemm 197c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 19840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 19940266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 200c2aa98e2SPeter Wemm 201065a643dSPeter Wemm if (opencontrolsocket() < 0) 202065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 2032e43090eSPeter Wemm "daemon could not open control socket %s: %s", 20440266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 205065a643dSPeter Wemm 20640266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 20740266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 2088774250cSGregory Neil Shapiro 20940266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 21006f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 211c2aa98e2SPeter Wemm 212c2aa98e2SPeter Wemm #if XDEBUG 213c2aa98e2SPeter Wemm { 214c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 215c2aa98e2SPeter Wemm 216d0cef73dSGregory Neil Shapiro expand("\201j", jbuf, sizeof(jbuf), e); 217c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 218c2aa98e2SPeter Wemm } 21906f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 220c2aa98e2SPeter Wemm 221065a643dSPeter Wemm /* Add parent process as first item */ 222e92d3f3fSGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1, NULL); 223065a643dSPeter Wemm 224c2aa98e2SPeter Wemm if (tTd(15, 1)) 22506f25ae9SGregory Neil Shapiro { 22640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 2279bd497b8SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: socket %d\n", 22806f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 22906f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 23006f25ae9SGregory Neil Shapiro } 231c2aa98e2SPeter Wemm 232c2aa98e2SPeter Wemm for (;;) 233c2aa98e2SPeter Wemm { 234c2aa98e2SPeter Wemm register pid_t pid; 235c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 23640266059SGregory Neil Shapiro bool timedout = false; 23740266059SGregory Neil Shapiro bool control = false; 23806f25ae9SGregory Neil Shapiro int save_errno; 239c2aa98e2SPeter Wemm int pipefd[2]; 24040266059SGregory Neil Shapiro time_t now; 24142e5d165SGregory Neil Shapiro #if STARTTLS 24242e5d165SGregory Neil Shapiro long seed; 2435b0945b5SGregory Neil Shapiro #endif 244c2aa98e2SPeter Wemm 245c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 24640266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 247a7ec597cSGregory Neil Shapiro CHECK_RESTART; 2488774250cSGregory Neil Shapiro 24940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 25040266059SGregory Neil Shapiro { 251193538b7SGregory Neil Shapiro /* 25240266059SGregory Neil Shapiro ** XXX do this call outside the loop? 25340266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 254193538b7SGregory Neil Shapiro */ 255193538b7SGregory Neil Shapiro 25640266059SGregory Neil Shapiro now = curtime(); 25740266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 25806f25ae9SGregory Neil Shapiro continue; 25940266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 26040266059SGregory Neil Shapiro continue; 261d0cef73dSGregory Neil Shapiro if (refuseconnections(e, idx, curdaemon == idx)) 262c2aa98e2SPeter Wemm { 26306f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 264c2aa98e2SPeter Wemm { 265065a643dSPeter Wemm /* close socket so peer fails quickly */ 26606f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 26706f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 268c2aa98e2SPeter Wemm } 269c2aa98e2SPeter Wemm 270065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 27140266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 272065a643dSPeter Wemm } 27306f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 27406f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 275c2aa98e2SPeter Wemm { 27640266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 27706f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 27806f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 27906f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 28006f25ae9SGregory Neil Shapiro 281065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 28240266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 28340266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 284065a643dSPeter Wemm } 285c2aa98e2SPeter Wemm } 286c2aa98e2SPeter Wemm 2878774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 288a7ec597cSGregory Neil Shapiro CHECK_RESTART; 289e92d3f3fSGregory Neil Shapiro 29040266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 29106f25ae9SGregory Neil Shapiro 292c2aa98e2SPeter Wemm #if XDEBUG 293c2aa98e2SPeter Wemm /* check for disaster */ 294c2aa98e2SPeter Wemm { 295c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 296c2aa98e2SPeter Wemm 297d0cef73dSGregory Neil Shapiro expand("\201j", jbuf, sizeof(jbuf), e); 298c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 299c2aa98e2SPeter Wemm { 300c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 301c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 302c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 303c2aa98e2SPeter Wemm abort(); 304c2aa98e2SPeter Wemm } 305c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 306c2aa98e2SPeter Wemm { 307c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 308c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 309c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 310c2aa98e2SPeter Wemm abort(); 311c2aa98e2SPeter Wemm } 312c2aa98e2SPeter Wemm } 31306f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 314c2aa98e2SPeter Wemm 315c2aa98e2SPeter Wemm #if 0 316c2aa98e2SPeter Wemm /* 317c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 318c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 319c2aa98e2SPeter Wemm ** so is it worth doing this? 320c2aa98e2SPeter Wemm */ 321c2aa98e2SPeter Wemm 322065a643dSPeter Wemm if (DaemonSocket >= 0 && 32340266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 324c2aa98e2SPeter Wemm log an error here; 32506f25ae9SGregory Neil Shapiro #endif /* 0 */ 32640266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 32706f25ae9SGregory Neil Shapiro 328c2aa98e2SPeter Wemm for (;;) 329c2aa98e2SPeter Wemm { 33040266059SGregory Neil Shapiro bool setproc = false; 331065a643dSPeter Wemm int highest = -1; 332c2aa98e2SPeter Wemm fd_set readfds; 333c2aa98e2SPeter Wemm struct timeval timeout; 334c2aa98e2SPeter Wemm 335a7ec597cSGregory Neil Shapiro CHECK_RESTART; 336c2aa98e2SPeter Wemm FD_ZERO(&readfds); 33740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 338065a643dSPeter Wemm { 33906f25ae9SGregory Neil Shapiro /* wait for a connection */ 34006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 34106f25ae9SGregory Neil Shapiro { 342193538b7SGregory Neil Shapiro if (!setproc && 343193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 344193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 34506f25ae9SGregory Neil Shapiro { 34640266059SGregory Neil Shapiro sm_setproctitle(true, e, 34706f25ae9SGregory Neil Shapiro "accepting connections"); 34840266059SGregory Neil Shapiro setproc = true; 349065a643dSPeter Wemm } 35006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 35106f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 35240266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 35340266059SGregory Neil Shapiro &readfds); 35406f25ae9SGregory Neil Shapiro } 35506f25ae9SGregory Neil Shapiro } 35606f25ae9SGregory Neil Shapiro 35706f25ae9SGregory Neil Shapiro #if NETUNIX 358065a643dSPeter Wemm if (ControlSocket >= 0) 359065a643dSPeter Wemm { 360065a643dSPeter Wemm if (ControlSocket > highest) 361065a643dSPeter Wemm highest = ControlSocket; 36240266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 363065a643dSPeter Wemm } 36406f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 36506f25ae9SGregory Neil Shapiro 366065a643dSPeter Wemm timeout.tv_sec = 5; 367c2aa98e2SPeter Wemm timeout.tv_usec = 0; 368c2aa98e2SPeter Wemm 369065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 370c2aa98e2SPeter Wemm NULL, NULL, &timeout); 371065a643dSPeter Wemm 3728774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 373a7ec597cSGregory Neil Shapiro CHECK_RESTART; 374193538b7SGregory Neil Shapiro 375193538b7SGregory Neil Shapiro curdaemon = -1; 37640266059SGregory Neil Shapiro if (doqueuerun()) 377605302a5SGregory Neil Shapiro { 37840266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 379605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 380605302a5SGregory Neil Shapiro lastrun = now; 3815b0945b5SGregory Neil Shapiro #endif 382605302a5SGregory Neil Shapiro } 383605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 3844e4196cbSGregory Neil Shapiro else if (CheckQueueRunners > 0 && QueueIntvl > 0 && 3854e4196cbSGregory Neil Shapiro lastrun + QueueIntvl + CheckQueueRunners < now) 386605302a5SGregory Neil Shapiro { 387605302a5SGregory Neil Shapiro 388605302a5SGregory Neil Shapiro /* 389605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 390605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 391605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 392605302a5SGregory Neil Shapiro ** result of the function call. 393605302a5SGregory Neil Shapiro */ 394605302a5SGregory Neil Shapiro 395605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 396605302a5SGregory Neil Shapiro lastrun = now; 397605302a5SGregory Neil Shapiro } 398605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 39940266059SGregory Neil Shapiro 400065a643dSPeter Wemm if (t <= 0) 401065a643dSPeter Wemm { 40240266059SGregory Neil Shapiro timedout = true; 403065a643dSPeter Wemm break; 404065a643dSPeter Wemm } 405c2aa98e2SPeter Wemm 40640266059SGregory Neil Shapiro control = false; 407c2aa98e2SPeter Wemm errno = 0; 40806f25ae9SGregory Neil Shapiro 40906f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 41040266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 41106f25ae9SGregory Neil Shapiro idx = 0; 41240266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 413065a643dSPeter Wemm { 41406f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 41540266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 41640266059SGregory Neil Shapiro &readfds)) 41706f25ae9SGregory Neil Shapiro { 41806f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 419602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 420d0cef73dSGregory Neil Shapiro sizeof(RealHostAddr)); 42106f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 422065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 423065a643dSPeter Wemm &lotherend); 424602a2b1bSGregory Neil Shapiro 425602a2b1bSGregory Neil Shapiro /* 426602a2b1bSGregory Neil Shapiro ** If remote side closes before 427602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 428602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 429602a2b1bSGregory Neil Shapiro */ 430602a2b1bSGregory Neil Shapiro 431602a2b1bSGregory Neil Shapiro if (t >= 0 && 432602a2b1bSGregory Neil Shapiro (lotherend == 0 || 433602a2b1bSGregory Neil Shapiro #ifdef BSD4_4_SOCKADDR 434602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 4355b0945b5SGregory Neil Shapiro #endif 436602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 437602a2b1bSGregory Neil Shapiro { 438602a2b1bSGregory Neil Shapiro (void) close(t); 439602a2b1bSGregory Neil Shapiro t = -1; 440602a2b1bSGregory Neil Shapiro errno = EINVAL; 441602a2b1bSGregory Neil Shapiro } 44206f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 44306f25ae9SGregory Neil Shapiro break; 444065a643dSPeter Wemm } 44540266059SGregory Neil Shapiro if (++idx >= NDaemons) 44606f25ae9SGregory Neil Shapiro idx = 0; 44706f25ae9SGregory Neil Shapiro } 44806f25ae9SGregory Neil Shapiro #if NETUNIX 44906f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 45040266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 451065a643dSPeter Wemm { 452065a643dSPeter Wemm struct sockaddr_un sa_un; 453065a643dSPeter Wemm 454d0cef73dSGregory Neil Shapiro lotherend = sizeof(sa_un); 455d0cef73dSGregory Neil Shapiro memset(&sa_un, '\0', sizeof(sa_un)); 456065a643dSPeter Wemm t = accept(ControlSocket, 457065a643dSPeter Wemm (struct sockaddr *)&sa_un, 458065a643dSPeter Wemm &lotherend); 459602a2b1bSGregory Neil Shapiro 460602a2b1bSGregory Neil Shapiro /* 461602a2b1bSGregory Neil Shapiro ** If remote side closes before 462602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 463602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 464602a2b1bSGregory Neil Shapiro */ 465602a2b1bSGregory Neil Shapiro 466602a2b1bSGregory Neil Shapiro if (t >= 0 && 467602a2b1bSGregory Neil Shapiro (lotherend == 0 || 468602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 469602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 4705b0945b5SGregory Neil Shapiro # endif 471602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 472602a2b1bSGregory Neil Shapiro { 473602a2b1bSGregory Neil Shapiro (void) close(t); 474602a2b1bSGregory Neil Shapiro t = -1; 475602a2b1bSGregory Neil Shapiro errno = EINVAL; 476602a2b1bSGregory Neil Shapiro } 477602a2b1bSGregory Neil Shapiro if (t >= 0) 47840266059SGregory Neil Shapiro control = true; 479065a643dSPeter Wemm } 480193538b7SGregory Neil Shapiro #else /* NETUNIX */ 481193538b7SGregory Neil Shapiro if (curdaemon == -1) 482193538b7SGregory Neil Shapiro { 483193538b7SGregory Neil Shapiro /* No daemon to service */ 484193538b7SGregory Neil Shapiro continue; 485193538b7SGregory Neil Shapiro } 48606f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 487c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 488c2aa98e2SPeter Wemm break; 489c2aa98e2SPeter Wemm } 490065a643dSPeter Wemm if (timedout) 491065a643dSPeter Wemm { 49240266059SGregory Neil Shapiro timedout = false; 493065a643dSPeter Wemm continue; 494065a643dSPeter Wemm } 49506f25ae9SGregory Neil Shapiro save_errno = errno; 49640266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 497c2aa98e2SPeter Wemm if (t < 0) 498c2aa98e2SPeter Wemm { 49906f25ae9SGregory Neil Shapiro errno = save_errno; 500e92d3f3fSGregory Neil Shapiro 501e92d3f3fSGregory Neil Shapiro /* let's ignore these temporary errors */ 502e92d3f3fSGregory Neil Shapiro if (save_errno == EINTR 503e92d3f3fSGregory Neil Shapiro #ifdef EAGAIN 504e92d3f3fSGregory Neil Shapiro || save_errno == EAGAIN 5055b0945b5SGregory Neil Shapiro #endif 506e92d3f3fSGregory Neil Shapiro #ifdef ECONNABORTED 507e92d3f3fSGregory Neil Shapiro || save_errno == ECONNABORTED 5085b0945b5SGregory Neil Shapiro #endif 509e92d3f3fSGregory Neil Shapiro #ifdef EWOULDBLOCK 510e92d3f3fSGregory Neil Shapiro || save_errno == EWOULDBLOCK 5115b0945b5SGregory Neil Shapiro #endif 512e92d3f3fSGregory Neil Shapiro ) 513e92d3f3fSGregory Neil Shapiro continue; 514e92d3f3fSGregory Neil Shapiro 515c2aa98e2SPeter Wemm syserr("getrequests: accept"); 516c2aa98e2SPeter Wemm 517af9557fdSGregory Neil Shapiro if (curdaemon >= 0) 518af9557fdSGregory Neil Shapiro { 519af9557fdSGregory Neil Shapiro /* arrange to re-open socket next time around */ 52006f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 52106f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 52206f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 52306f25ae9SGregory Neil Shapiro /* 52406f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 52506f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 52606f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 52706f25ae9SGregory Neil Shapiro */ 52806f25ae9SGregory Neil Shapiro 529af9557fdSGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = 530af9557fdSGregory Neil Shapiro curtime() + 15; 53106f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 532af9557fdSGregory Neil Shapiro } 533c2aa98e2SPeter Wemm continue; 534c2aa98e2SPeter Wemm } 535c2aa98e2SPeter Wemm 53606f25ae9SGregory Neil Shapiro if (!control) 53706f25ae9SGregory Neil Shapiro { 53806f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 53906f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 54006f25ae9SGregory Neil Shapiro { 54106f25ae9SGregory Neil Shapiro case AF_UNSPEC: 54240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54340266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 54406f25ae9SGregory Neil Shapiro break; 54540266059SGregory Neil Shapiro #if NETUNIX 54640266059SGregory Neil Shapiro case AF_UNIX: 54740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54840266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 54940266059SGregory Neil Shapiro break; 5505b0945b5SGregory Neil Shapiro #endif 55106f25ae9SGregory Neil Shapiro #if NETINET 55206f25ae9SGregory Neil Shapiro case AF_INET: 55340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55440266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 55506f25ae9SGregory Neil Shapiro break; 5565b0945b5SGregory Neil Shapiro #endif 55706f25ae9SGregory Neil Shapiro #if NETINET6 55806f25ae9SGregory Neil Shapiro case AF_INET6: 55940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56040266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 56106f25ae9SGregory Neil Shapiro break; 5625b0945b5SGregory Neil Shapiro #endif 56306f25ae9SGregory Neil Shapiro #if NETISO 56406f25ae9SGregory Neil Shapiro case AF_ISO: 56540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56640266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 56706f25ae9SGregory Neil Shapiro break; 5685b0945b5SGregory Neil Shapiro #endif 56906f25ae9SGregory Neil Shapiro #if NETNS 57006f25ae9SGregory Neil Shapiro case AF_NS: 57140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57240266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 57306f25ae9SGregory Neil Shapiro break; 5745b0945b5SGregory Neil Shapiro #endif 57506f25ae9SGregory Neil Shapiro #if NETX25 57606f25ae9SGregory Neil Shapiro case AF_CCITT: 57740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57840266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 57906f25ae9SGregory Neil Shapiro break; 5805b0945b5SGregory Neil Shapiro #endif 58106f25ae9SGregory Neil Shapiro } 58240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58340266059SGregory Neil Shapiro macid("{daemon_name}"), 58440266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 58506f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 58640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58740266059SGregory Neil Shapiro macid("{daemon_flags}"), 58840266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 58906f25ae9SGregory Neil Shapiro else 59040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 59140266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 59206f25ae9SGregory Neil Shapiro } 59306f25ae9SGregory Neil Shapiro 594c2aa98e2SPeter Wemm /* 595e92d3f3fSGregory Neil Shapiro ** If connection rate is exceeded here, connection shall be 596e92d3f3fSGregory Neil Shapiro ** refused later by a new call after fork() by the 597e92d3f3fSGregory Neil Shapiro ** validate_connection() function. Closing the connection 598e92d3f3fSGregory Neil Shapiro ** at this point violates RFC 2821. 599e92d3f3fSGregory Neil Shapiro ** Do NOT remove this call, its side effects are needed. 600e92d3f3fSGregory Neil Shapiro */ 601e92d3f3fSGregory Neil Shapiro 602e92d3f3fSGregory Neil Shapiro connection_rate_check(&RealHostAddr, NULL); 603e92d3f3fSGregory Neil Shapiro 604e92d3f3fSGregory Neil Shapiro /* 605c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 606c2aa98e2SPeter Wemm */ 607c2aa98e2SPeter Wemm 608c2aa98e2SPeter Wemm if (tTd(15, 2)) 60940266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 61006f25ae9SGregory Neil Shapiro 61106f25ae9SGregory Neil Shapiro /* 61240266059SGregory Neil Shapiro ** Advance state of PRNG. 61340266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 61406f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 61506f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 61606f25ae9SGregory Neil Shapiro ** are not "really" random. 61706f25ae9SGregory Neil Shapiro */ 61842e5d165SGregory Neil Shapiro #if STARTTLS 61940266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 62042e5d165SGregory Neil Shapiro seed = get_random(); 62140266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 622d0cef73dSGregory Neil Shapiro sizeof(NextDiskSpaceCheck)); 623d0cef73dSGregory Neil Shapiro RAND_seed((void *) &now, sizeof(now)); 624d0cef73dSGregory Neil Shapiro RAND_seed((void *) &seed, sizeof(seed)); 62542e5d165SGregory Neil Shapiro #else /* STARTTLS */ 62606f25ae9SGregory Neil Shapiro (void) get_random(); 62742e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 628c2aa98e2SPeter Wemm 62940266059SGregory Neil Shapiro #if NAMED_BIND 63040266059SGregory Neil Shapiro /* 631e92d3f3fSGregory Neil Shapiro ** Update MX records for FallbackMX. 63240266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 63340266059SGregory Neil Shapiro ** response time. 63440266059SGregory Neil Shapiro */ 63540266059SGregory Neil Shapiro 636e92d3f3fSGregory Neil Shapiro if (FallbackMX != NULL) 637e92d3f3fSGregory Neil Shapiro (void) getfallbackmxrr(FallbackMX); 63840266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 63940266059SGregory Neil Shapiro 64013bd1963SGregory Neil Shapiro if (tTd(93, 100)) 64113bd1963SGregory Neil Shapiro { 64213bd1963SGregory Neil Shapiro /* don't fork, handle connection in this process */ 64313bd1963SGregory Neil Shapiro pid = 0; 64413bd1963SGregory Neil Shapiro pipefd[0] = pipefd[1] = -1; 64513bd1963SGregory Neil Shapiro } 64613bd1963SGregory Neil Shapiro else 64713bd1963SGregory Neil Shapiro { 648c2aa98e2SPeter Wemm /* 64913bd1963SGregory Neil Shapiro ** Create a pipe to keep the child from writing to 65013bd1963SGregory Neil Shapiro ** the socket until after the parent has closed 65113bd1963SGregory Neil Shapiro ** it. Otherwise the parent may hang if the child 65213bd1963SGregory Neil Shapiro ** has closed it first. 653c2aa98e2SPeter Wemm */ 654c2aa98e2SPeter Wemm 655c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 656c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 657c2aa98e2SPeter Wemm 65840266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 659c2aa98e2SPeter Wemm pid = fork(); 660c2aa98e2SPeter Wemm if (pid < 0) 661c2aa98e2SPeter Wemm { 662c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 663c2aa98e2SPeter Wemm if (pipefd[0] != -1) 664c2aa98e2SPeter Wemm { 665c2aa98e2SPeter Wemm (void) close(pipefd[0]); 666c2aa98e2SPeter Wemm (void) close(pipefd[1]); 667c2aa98e2SPeter Wemm } 66840266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 66906f25ae9SGregory Neil Shapiro (void) sleep(10); 670c2aa98e2SPeter Wemm (void) close(t); 671c2aa98e2SPeter Wemm continue; 672c2aa98e2SPeter Wemm } 67313bd1963SGregory Neil Shapiro } 674c2aa98e2SPeter Wemm 675c2aa98e2SPeter Wemm if (pid == 0) 676c2aa98e2SPeter Wemm { 677c2aa98e2SPeter Wemm char *p; 67840266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 679c2aa98e2SPeter Wemm 680c2aa98e2SPeter Wemm /* 681c2aa98e2SPeter Wemm ** CHILD -- return to caller. 682c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 683c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 684c2aa98e2SPeter Wemm */ 685c2aa98e2SPeter Wemm 6868774250cSGregory Neil Shapiro /* Reset global flags */ 6878774250cSGregory Neil Shapiro RestartRequest = NULL; 68840266059SGregory Neil Shapiro RestartWorkGroup = false; 6898774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6908774250cSGregory Neil Shapiro PendingSignal = 0; 69140266059SGregory Neil Shapiro CurrentPid = getpid(); 692e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 6938774250cSGregory Neil Shapiro 69440266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 69540266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 69640266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 69740266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 69840266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 69940266059SGregory Neil Shapiro 70040266059SGregory Neil Shapiro /* turn on profiling */ 70140266059SGregory Neil Shapiro /* SM_PROF(0); */ 70240266059SGregory Neil Shapiro 703*2fb4f839SGregory Neil Shapiro #if _FFR_DMTRIGGER 704*2fb4f839SGregory Neil Shapiro if (SM_TRIGGER == e->e_sendmode) 705*2fb4f839SGregory Neil Shapiro { 706*2fb4f839SGregory Neil Shapiro i = sm_notify_start(false, 0); 707*2fb4f839SGregory Neil Shapiro if (i != 0) 708*2fb4f839SGregory Neil Shapiro syserr("sm_notify_start(false) failed=%d", i); 709*2fb4f839SGregory Neil Shapiro } 710*2fb4f839SGregory Neil Shapiro #endif 711*2fb4f839SGregory Neil Shapiro 71240266059SGregory Neil Shapiro /* 71340266059SGregory Neil Shapiro ** Initialize exception stack and default exception 71440266059SGregory Neil Shapiro ** handler for child process. 71540266059SGregory Neil Shapiro */ 71640266059SGregory Neil Shapiro 71740266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 7188774250cSGregory Neil Shapiro 71906f25ae9SGregory Neil Shapiro if (!control) 72006f25ae9SGregory Neil Shapiro { 72140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 72240266059SGregory Neil Shapiro macid("{daemon_addr}"), 72340266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 724d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), "%d", 72506f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 72640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 72740266059SGregory Neil Shapiro macid("{daemon_port}"), status); 72806f25ae9SGregory Neil Shapiro } 72906f25ae9SGregory Neil Shapiro 73040266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 73106f25ae9SGregory Neil Shapiro { 73206f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 73306f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 73413058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 73506f25ae9SGregory Neil Shapiro } 736065a643dSPeter Wemm clrcontrol(); 73706f25ae9SGregory Neil Shapiro 73806f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 73906f25ae9SGregory Neil Shapiro if (control) 74006f25ae9SGregory Neil Shapiro { 74106f25ae9SGregory Neil Shapiro /* Add control socket process */ 74240266059SGregory Neil Shapiro proc_list_add(CurrentPid, 74340266059SGregory Neil Shapiro "console socket child", 744e92d3f3fSGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1, NULL); 74506f25ae9SGregory Neil Shapiro } 74606f25ae9SGregory Neil Shapiro else 74706f25ae9SGregory Neil Shapiro { 748c2aa98e2SPeter Wemm proc_list_clear(); 749c2aa98e2SPeter Wemm 75040266059SGregory Neil Shapiro /* clean up background delivery children */ 75140266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 75240266059SGregory Neil Shapiro 753065a643dSPeter Wemm /* Add parent process as first child item */ 75440266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 755e92d3f3fSGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1, NULL); 75606f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 757c2aa98e2SPeter Wemm QueueIntvl = 0; 758d0cef73dSGregory Neil Shapiro 759d0cef73dSGregory Neil Shapiro /* 760d0cef73dSGregory Neil Shapiro ** Hack: override global variables if 761d0cef73dSGregory Neil Shapiro ** the corresponding DaemonPortOption 762d0cef73dSGregory Neil Shapiro ** is set. 763d0cef73dSGregory Neil Shapiro */ 76413d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 76513d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_supersafe != 766d0cef73dSGregory Neil Shapiro DPO_NOTSET) 767d0cef73dSGregory Neil Shapiro SuperSafe = Daemons[curdaemon]. 768d0cef73dSGregory Neil Shapiro d_supersafe; 76913d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 77013d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_dm != DM_NOTSET) 77113d88268SGregory Neil Shapiro set_delivery_mode( 77213d88268SGregory Neil Shapiro Daemons[curdaemon].d_dm, e); 773d0cef73dSGregory Neil Shapiro 774d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_refuseLA != 775d0cef73dSGregory Neil Shapiro DPO_NOTSET) 776d0cef73dSGregory Neil Shapiro RefuseLA = Daemons[curdaemon]. 777d0cef73dSGregory Neil Shapiro d_refuseLA; 778d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_queueLA != DPO_NOTSET) 779d0cef73dSGregory Neil Shapiro QueueLA = Daemons[curdaemon].d_queueLA; 780d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_delayLA != DPO_NOTSET) 781d0cef73dSGregory Neil Shapiro DelayLA = Daemons[curdaemon].d_delayLA; 782d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_maxchildren != 783d0cef73dSGregory Neil Shapiro DPO_NOTSET) 784d0cef73dSGregory Neil Shapiro MaxChildren = Daemons[curdaemon]. 785d0cef73dSGregory Neil Shapiro d_maxchildren; 78613d88268SGregory Neil Shapiro 78740266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 788c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 78906f25ae9SGregory Neil Shapiro } 790c2aa98e2SPeter Wemm 791c2aa98e2SPeter Wemm if (pipefd[0] != -1) 792c2aa98e2SPeter Wemm { 793c2aa98e2SPeter Wemm auto char c; 794c2aa98e2SPeter Wemm 795c2aa98e2SPeter Wemm /* 796c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 797c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 798c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 799c2aa98e2SPeter Wemm ** socket until after the parent has closed 800c2aa98e2SPeter Wemm ** the pipe. 801c2aa98e2SPeter Wemm */ 802c2aa98e2SPeter Wemm 803c2aa98e2SPeter Wemm /* close the write end of the pipe */ 804c2aa98e2SPeter Wemm (void) close(pipefd[1]); 805c2aa98e2SPeter Wemm 806c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 807c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 808c2aa98e2SPeter Wemm errno == EINTR) 809c2aa98e2SPeter Wemm continue; 810c2aa98e2SPeter Wemm (void) close(pipefd[0]); 811c2aa98e2SPeter Wemm } 812c2aa98e2SPeter Wemm 81306f25ae9SGregory Neil Shapiro /* control socket processing */ 81406f25ae9SGregory Neil Shapiro if (control) 81506f25ae9SGregory Neil Shapiro { 81606f25ae9SGregory Neil Shapiro control_command(t, e); 81706f25ae9SGregory Neil Shapiro /* NOTREACHED */ 81806f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 81906f25ae9SGregory Neil Shapiro } 82006f25ae9SGregory Neil Shapiro 821c2aa98e2SPeter Wemm /* determine host name */ 822c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 82340266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 824c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 825c2aa98e2SPeter Wemm RealHostName = newstr(p); 82606f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 82706f25ae9SGregory Neil Shapiro { 82840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 82940266059SGregory Neil Shapiro macid("{client_resolve}"), 83040266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 83106f25ae9SGregory Neil Shapiro } 83206f25ae9SGregory Neil Shapiro else 833e92d3f3fSGregory Neil Shapiro { 83440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 83540266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 836e92d3f3fSGregory Neil Shapiro } 83740266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 838605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 839c2aa98e2SPeter Wemm 84040266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 84140266059SGregory Neil Shapiro SM_TIME_DEFAULT, 84240266059SGregory Neil Shapiro (void *) &t, 843e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, 84440266059SGregory Neil Shapiro NULL)) == NULL || 845c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 84640266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 84740266059SGregory Neil Shapiro SM_TIME_DEFAULT, 84840266059SGregory Neil Shapiro (void *) &t, 849e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, 85040266059SGregory Neil Shapiro NULL)) == NULL) 851c2aa98e2SPeter Wemm { 85240266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 85340266059SGregory Neil Shapiro t); 85440266059SGregory Neil Shapiro finis(false, true, EX_OK); 855c2aa98e2SPeter Wemm } 85640266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 857c2aa98e2SPeter Wemm 858c2aa98e2SPeter Wemm InChannel = inchannel; 859c2aa98e2SPeter Wemm OutChannel = outchannel; 86040266059SGregory Neil Shapiro DisConnected = false; 861c2aa98e2SPeter Wemm 862da7d7b9cSGregory Neil Shapiro #if _FFR_XCNCT 863da7d7b9cSGregory Neil Shapiro t = xconnect(inchannel); 864da7d7b9cSGregory Neil Shapiro if (t <= 0) 865da7d7b9cSGregory Neil Shapiro { 866da7d7b9cSGregory Neil Shapiro clrbitn(D_XCNCT, Daemons[curdaemon].d_flags); 867da7d7b9cSGregory Neil Shapiro clrbitn(D_XCNCT_M, Daemons[curdaemon].d_flags); 868da7d7b9cSGregory Neil Shapiro } 869da7d7b9cSGregory Neil Shapiro else 870da7d7b9cSGregory Neil Shapiro setbitn(t, Daemons[curdaemon].d_flags); 871da7d7b9cSGregory Neil Shapiro 872da7d7b9cSGregory Neil Shapiro #endif /* _FFR_XCNCT */ 873ba00ec3dSGregory Neil Shapiro 87440266059SGregory Neil Shapiro #if XLA 875c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 876c2aa98e2SPeter Wemm { 87706f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 87840266059SGregory Neil Shapiro finis(false, true, EX_OK); 879c2aa98e2SPeter Wemm } 88006f25ae9SGregory Neil Shapiro #endif /* XLA */ 88106f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 88240266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 88340266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 88406f25ae9SGregory Neil Shapiro { 88506f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 88606f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 88740266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 88840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 88940266059SGregory Neil Shapiro macid("{if_name}"), p); 89006f25ae9SGregory Neil Shapiro 89140266059SGregory Neil Shapiro /* 89240266059SGregory Neil Shapiro ** Do this only if it is not the loopback 89340266059SGregory Neil Shapiro ** interface. 89440266059SGregory Neil Shapiro */ 89540266059SGregory Neil Shapiro 89606f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 89706f25ae9SGregory Neil Shapiro { 89840266059SGregory Neil Shapiro char *addr; 89940266059SGregory Neil Shapiro char family[5]; 90040266059SGregory Neil Shapiro 90140266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 90240266059SGregory Neil Shapiro (void) sm_snprintf(family, 90340266059SGregory Neil Shapiro sizeof(family), 90440266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 90540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 90640266059SGregory Neil Shapiro A_TEMP, 90740266059SGregory Neil Shapiro macid("{if_addr}"), addr); 90840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 90940266059SGregory Neil Shapiro A_TEMP, 91040266059SGregory Neil Shapiro macid("{if_family}"), family); 91106f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 91240266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 91340266059SGregory Neil Shapiro addr, family); 91406f25ae9SGregory Neil Shapiro } 91506f25ae9SGregory Neil Shapiro else 91606f25ae9SGregory Neil Shapiro { 91740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 91840266059SGregory Neil Shapiro A_PERM, 91940266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 92040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 92140266059SGregory Neil Shapiro A_PERM, 92240266059SGregory Neil Shapiro macid("{if_family}"), NULL); 92306f25ae9SGregory Neil Shapiro } 92406f25ae9SGregory Neil Shapiro } 92506f25ae9SGregory Neil Shapiro else 92606f25ae9SGregory Neil Shapiro { 92706f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 92840266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 92940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 93040266059SGregory Neil Shapiro macid("{if_name}"), NULL); 93140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 93240266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 93340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 93440266059SGregory Neil Shapiro macid("{if_family}"), NULL); 93506f25ae9SGregory Neil Shapiro } 936c2aa98e2SPeter Wemm break; 937c2aa98e2SPeter Wemm } 938c2aa98e2SPeter Wemm 939c2aa98e2SPeter Wemm /* parent -- keep track of children */ 94006f25ae9SGregory Neil Shapiro if (control) 94106f25ae9SGregory Neil Shapiro { 942d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), 94340266059SGregory Neil Shapiro "control socket server child"); 944e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1, NULL); 94506f25ae9SGregory Neil Shapiro } 94606f25ae9SGregory Neil Shapiro else 94706f25ae9SGregory Neil Shapiro { 948d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), 94906f25ae9SGregory Neil Shapiro "SMTP server child for %s", 950065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 951e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1, 952e92d3f3fSGregory Neil Shapiro &RealHostAddr); 95306f25ae9SGregory Neil Shapiro } 95440266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 955c2aa98e2SPeter Wemm 956c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 957c2aa98e2SPeter Wemm if (pipefd[0] != -1) 95806f25ae9SGregory Neil Shapiro { 959c2aa98e2SPeter Wemm (void) close(pipefd[0]); 96006f25ae9SGregory Neil Shapiro pipefd[0] = -1; 96106f25ae9SGregory Neil Shapiro } 962c2aa98e2SPeter Wemm 963c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 964c2aa98e2SPeter Wemm (void) close(t); 965c2aa98e2SPeter Wemm 966c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 967c2aa98e2SPeter Wemm if (pipefd[1] != -1) 96806f25ae9SGregory Neil Shapiro { 969c2aa98e2SPeter Wemm (void) close(pipefd[1]); 97006f25ae9SGregory Neil Shapiro pipefd[1] = -1; 971c2aa98e2SPeter Wemm } 97206f25ae9SGregory Neil Shapiro } 973c2aa98e2SPeter Wemm if (tTd(15, 2)) 974*2fb4f839SGregory Neil Shapiro sm_dprintf("getrequests: returning\n"); 97540266059SGregory Neil Shapiro 97640266059SGregory Neil Shapiro #if MILTER 97740266059SGregory Neil Shapiro /* set the filters for this daemon */ 97840266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 97940266059SGregory Neil Shapiro { 98040266059SGregory Neil Shapiro for (i = 0; 98113bd1963SGregory Neil Shapiro (i < MAXFILTERS && 98213bd1963SGregory Neil Shapiro Daemons[curdaemon].d_inputfilters[i] != NULL); 98340266059SGregory Neil Shapiro i++) 98440266059SGregory Neil Shapiro { 98540266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 98640266059SGregory Neil Shapiro } 98740266059SGregory Neil Shapiro if (i < MAXFILTERS) 98840266059SGregory Neil Shapiro InputFilters[i] = NULL; 98940266059SGregory Neil Shapiro } 99040266059SGregory Neil Shapiro #endif /* MILTER */ 99106f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 992c2aa98e2SPeter Wemm } 99340266059SGregory Neil Shapiro 99440266059SGregory Neil Shapiro /* 99540266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 99640266059SGregory Neil Shapiro ** 99740266059SGregory Neil Shapiro ** Parameters: 99840266059SGregory Neil Shapiro ** e -- envelope. 99940266059SGregory Neil Shapiro ** 100040266059SGregory Neil Shapiro ** Returns: 100140266059SGregory Neil Shapiro ** none. 100240266059SGregory Neil Shapiro ** 100340266059SGregory Neil Shapiro ** Side Effects: 100440266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 100540266059SGregory Neil Shapiro */ 100640266059SGregory Neil Shapiro 100740266059SGregory Neil Shapiro static void 100840266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 100940266059SGregory Neil Shapiro ENVELOPE *e; 101040266059SGregory Neil Shapiro { 101140266059SGregory Neil Shapiro bool logged = false; 101240266059SGregory Neil Shapiro int idx; 101340266059SGregory Neil Shapiro time_t now; 101440266059SGregory Neil Shapiro 101540266059SGregory Neil Shapiro now = curtime(); 101640266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 101740266059SGregory Neil Shapiro return; 101840266059SGregory Neil Shapiro 101940266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 102040266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 102140266059SGregory Neil Shapiro { 102240266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 102340266059SGregory Neil Shapiro { 102440266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 102540266059SGregory Neil Shapiro continue; 102640266059SGregory Neil Shapiro 102740266059SGregory Neil Shapiro /* log only if not logged before */ 102840266059SGregory Neil Shapiro if (!logged) 102940266059SGregory Neil Shapiro { 103040266059SGregory Neil Shapiro if (LogLevel > 8) 103140266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 103240266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 103340266059SGregory Neil Shapiro MinBlocksFree); 103440266059SGregory Neil Shapiro sm_setproctitle(true, e, 103540266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 103640266059SGregory Neil Shapiro MinBlocksFree); 103740266059SGregory Neil Shapiro logged = true; 103840266059SGregory Neil Shapiro } 103940266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 104040266059SGregory Neil Shapiro } 104140266059SGregory Neil Shapiro } 104240266059SGregory Neil Shapiro else 104340266059SGregory Neil Shapiro { 104440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 104540266059SGregory Neil Shapiro { 104640266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 104740266059SGregory Neil Shapiro continue; 104840266059SGregory Neil Shapiro 104940266059SGregory Neil Shapiro /* log only if not logged before */ 105040266059SGregory Neil Shapiro if (!logged) 105140266059SGregory Neil Shapiro { 105240266059SGregory Neil Shapiro if (LogLevel > 8) 105340266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 105440266059SGregory Neil Shapiro "accepting new messages (again)"); 105540266059SGregory Neil Shapiro logged = true; 105640266059SGregory Neil Shapiro } 105740266059SGregory Neil Shapiro 105840266059SGregory Neil Shapiro /* title will be set later */ 105940266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 106040266059SGregory Neil Shapiro } 106140266059SGregory Neil Shapiro } 106240266059SGregory Neil Shapiro 106340266059SGregory Neil Shapiro /* only check disk space once a minute */ 106440266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 106540266059SGregory Neil Shapiro } 106640266059SGregory Neil Shapiro 106740266059SGregory Neil Shapiro /* 106806f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 1069c2aa98e2SPeter Wemm ** 107006f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 1071c2aa98e2SPeter Wemm ** 1072c2aa98e2SPeter Wemm ** Parameters: 107306f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 1074c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 1075c2aa98e2SPeter Wemm ** 1076c2aa98e2SPeter Wemm ** Returns: 1077c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 1078c2aa98e2SPeter Wemm ** 1079c2aa98e2SPeter Wemm ** Side Effects: 1080c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 1081c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 1082c2aa98e2SPeter Wemm */ 1083c2aa98e2SPeter Wemm 1084c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1085c2aa98e2SPeter Wemm 108606f25ae9SGregory Neil Shapiro static int 108706f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 108840266059SGregory Neil Shapiro DAEMON_T *d; 1089c2aa98e2SPeter Wemm bool firsttime; 1090c2aa98e2SPeter Wemm { 1091c2aa98e2SPeter Wemm int on = 1; 109206f25ae9SGregory Neil Shapiro int fdflags; 109306f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1094c2aa98e2SPeter Wemm int ntries = 0; 109506f25ae9SGregory Neil Shapiro int save_errno; 1096c2aa98e2SPeter Wemm 1097c2aa98e2SPeter Wemm if (tTd(15, 2)) 109840266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1099c2aa98e2SPeter Wemm 1100c2aa98e2SPeter Wemm do 1101c2aa98e2SPeter Wemm { 1102c2aa98e2SPeter Wemm if (ntries > 0) 110306f25ae9SGregory Neil Shapiro (void) sleep(5); 110406f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1105c2aa98e2SPeter Wemm { 110640266059SGregory Neil Shapiro #if NETUNIX 110740266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 110840266059SGregory Neil Shapiro { 110940266059SGregory Neil Shapiro int rval; 111040266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 111140266059SGregory Neil Shapiro 111240266059SGregory Neil Shapiro /* if not safe, don't use it */ 111340266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 111440266059SGregory Neil Shapiro RunAsUid, RunAsGid, 111540266059SGregory Neil Shapiro RunAsUserName, sff, 111640266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 111740266059SGregory Neil Shapiro if (rval != 0) 111840266059SGregory Neil Shapiro { 111940266059SGregory Neil Shapiro save_errno = errno; 112040266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 112140266059SGregory Neil Shapiro d->d_name, 112240266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 112340266059SGregory Neil Shapiro goto fail; 112440266059SGregory Neil Shapiro } 112540266059SGregory Neil Shapiro 112640266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 112740266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 112840266059SGregory Neil Shapiro } 112940266059SGregory Neil Shapiro #endif /* NETUNIX */ 113006f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 113106f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 113206f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1133c2aa98e2SPeter Wemm { 113406f25ae9SGregory Neil Shapiro save_errno = errno; 113540266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 113640266059SGregory Neil Shapiro d->d_name); 113740266059SGregory Neil Shapiro fail: 113840266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 113940266059SGregory Neil Shapiro (!transienterror(save_errno) || 114040266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 114140266059SGregory Neil Shapiro { 114240266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 114340266059SGregory Neil Shapiro d->d_name); 114440266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 114540266059SGregory Neil Shapiro d->d_socket = -1; 114640266059SGregory Neil Shapiro return -1; 114740266059SGregory Neil Shapiro } 1148c2aa98e2SPeter Wemm severe: 1149c2aa98e2SPeter Wemm if (LogLevel > 0) 1150c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 115140266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 115240266059SGregory Neil Shapiro d->d_name); 115306f25ae9SGregory Neil Shapiro d->d_socket = -1; 1154c2aa98e2SPeter Wemm continue; 1155c2aa98e2SPeter Wemm } 1156c2aa98e2SPeter Wemm 1157da7d7b9cSGregory Neil Shapiro if (!SM_FD_OK_SELECT(d->d_socket)) 115813bd1963SGregory Neil Shapiro { 115913bd1963SGregory Neil Shapiro save_errno = EINVAL; 116013bd1963SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: server SMTP socket (%d) too large", 116113bd1963SGregory Neil Shapiro d->d_name, d->d_socket); 116213bd1963SGregory Neil Shapiro goto fail; 116313bd1963SGregory Neil Shapiro } 116413bd1963SGregory Neil Shapiro 1165c2aa98e2SPeter Wemm /* turn on network debugging? */ 1166c2aa98e2SPeter Wemm if (tTd(15, 101)) 116706f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1168c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1169d0cef73dSGregory Neil Shapiro sizeof(on)); 1170c2aa98e2SPeter Wemm 117106f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1172d0cef73dSGregory Neil Shapiro SO_REUSEADDR, (char *)&on, sizeof(on)); 117306f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1174d0cef73dSGregory Neil Shapiro SO_KEEPALIVE, (char *)&on, sizeof(on)); 1175c2aa98e2SPeter Wemm 1176c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 117706f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1178c2aa98e2SPeter Wemm { 117906f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1180c2aa98e2SPeter Wemm SO_RCVBUF, 118106f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 118206f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 118306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1184c2aa98e2SPeter Wemm } 118506f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 118606f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 118706f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 118806f25ae9SGregory Neil Shapiro { 118906f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 119006f25ae9SGregory Neil Shapiro SO_SNDBUF, 119106f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 119206f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 119306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 119406f25ae9SGregory Neil Shapiro } 119506f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1196c2aa98e2SPeter Wemm 119706f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 119806f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 119906f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 120006f25ae9SGregory Neil Shapiro { 120106f25ae9SGregory Neil Shapiro save_errno = errno; 120206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 120306f25ae9SGregory Neil Shapiro d->d_name, 120406f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 120540266059SGregory Neil Shapiro sm_errstring(save_errno)); 120606f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 120706f25ae9SGregory Neil Shapiro goto severe; 120806f25ae9SGregory Neil Shapiro } 120906f25ae9SGregory Neil Shapiro 121006f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1211c2aa98e2SPeter Wemm { 121240266059SGregory Neil Shapiro #ifdef NETUNIX 121340266059SGregory Neil Shapiro case AF_UNIX: 1214d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sunix); 121540266059SGregory Neil Shapiro break; 12165b0945b5SGregory Neil Shapiro #endif 1217c2aa98e2SPeter Wemm #if NETINET 1218c2aa98e2SPeter Wemm case AF_INET: 1219d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sin); 1220c2aa98e2SPeter Wemm break; 12215b0945b5SGregory Neil Shapiro #endif 122206f25ae9SGregory Neil Shapiro 122306f25ae9SGregory Neil Shapiro #if NETINET6 122406f25ae9SGregory Neil Shapiro case AF_INET6: 1225d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sin6); 122606f25ae9SGregory Neil Shapiro break; 12275b0945b5SGregory Neil Shapiro #endif 1228c2aa98e2SPeter Wemm 1229c2aa98e2SPeter Wemm #if NETISO 1230c2aa98e2SPeter Wemm case AF_ISO: 1231d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.siso); 1232c2aa98e2SPeter Wemm break; 12335b0945b5SGregory Neil Shapiro #endif 1234c2aa98e2SPeter Wemm 1235c2aa98e2SPeter Wemm default: 1236d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr); 1237c2aa98e2SPeter Wemm break; 1238c2aa98e2SPeter Wemm } 1239c2aa98e2SPeter Wemm 124006f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1241c2aa98e2SPeter Wemm { 1242c2aa98e2SPeter Wemm /* probably another daemon already */ 124306f25ae9SGregory Neil Shapiro save_errno = errno; 124406f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 124506f25ae9SGregory Neil Shapiro d->d_name); 124606f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 124740266059SGregory Neil Shapiro goto fail; 1248c2aa98e2SPeter Wemm } 1249c2aa98e2SPeter Wemm } 125006f25ae9SGregory Neil Shapiro if (!firsttime && 125106f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1252c2aa98e2SPeter Wemm { 125306f25ae9SGregory Neil Shapiro save_errno = errno; 125406f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 125506f25ae9SGregory Neil Shapiro d->d_name); 125606f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1257c2aa98e2SPeter Wemm goto severe; 1258c2aa98e2SPeter Wemm } 1259c2aa98e2SPeter Wemm return socksize; 126006f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 126106f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 126206f25ae9SGregory Neil Shapiro d->d_name); 1263065a643dSPeter Wemm /* NOTREACHED */ 1264c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1265c2aa98e2SPeter Wemm } 126640266059SGregory Neil Shapiro /* 126706f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 126806f25ae9SGregory Neil Shapiro ** 126906f25ae9SGregory Neil Shapiro ** Parameters: 127006f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 127106f25ae9SGregory Neil Shapiro ** 127206f25ae9SGregory Neil Shapiro ** Returns: 127306f25ae9SGregory Neil Shapiro ** port number on which daemon should run 127406f25ae9SGregory Neil Shapiro ** 127506f25ae9SGregory Neil Shapiro */ 127640266059SGregory Neil Shapiro 127740266059SGregory Neil Shapiro static unsigned short 127806f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 127906f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 128006f25ae9SGregory Neil Shapiro { 128140266059SGregory Neil Shapiro unsigned short port; 128206f25ae9SGregory Neil Shapiro 128306f25ae9SGregory Neil Shapiro /* 128406f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 128506f25ae9SGregory Neil Shapiro */ 128606f25ae9SGregory Neil Shapiro 128706f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 128806f25ae9SGregory Neil Shapiro { 1289d0cef73dSGregory Neil Shapiro memset(daemonaddr, '\0', sizeof(*daemonaddr)); 129006f25ae9SGregory Neil Shapiro #if NETINET 129106f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 12925b0945b5SGregory Neil Shapiro #endif 129306f25ae9SGregory Neil Shapiro } 129406f25ae9SGregory Neil Shapiro 129506f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 129606f25ae9SGregory Neil Shapiro { 129706f25ae9SGregory Neil Shapiro #if NETINET 129806f25ae9SGregory Neil Shapiro case AF_INET: 129906f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 1300e3793f76SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = 1301e3793f76SGregory Neil Shapiro LocalDaemon ? htonl(INADDR_LOOPBACK) : INADDR_ANY; 130206f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 130306f25ae9SGregory Neil Shapiro break; 130406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 130506f25ae9SGregory Neil Shapiro 130606f25ae9SGregory Neil Shapiro #if NETINET6 130706f25ae9SGregory Neil Shapiro case AF_INET6: 130806f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 1309e3793f76SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = 13106f9c8e5bSGregory Neil Shapiro (LocalDaemon && V6LoopbackAddrFound) ? 13116f9c8e5bSGregory Neil Shapiro in6addr_loopback : in6addr_any; 131206f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 131306f25ae9SGregory Neil Shapiro break; 131406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 131506f25ae9SGregory Neil Shapiro 131606f25ae9SGregory Neil Shapiro default: 131706f25ae9SGregory Neil Shapiro /* unknown protocol */ 131806f25ae9SGregory Neil Shapiro port = 0; 131906f25ae9SGregory Neil Shapiro break; 132006f25ae9SGregory Neil Shapiro } 132106f25ae9SGregory Neil Shapiro if (port == 0) 132206f25ae9SGregory Neil Shapiro { 132306f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 132406f25ae9SGregory Neil Shapiro port = htons(25); 132506f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 132606f25ae9SGregory Neil Shapiro { 132706f25ae9SGregory Neil Shapiro register struct servent *sp; 132806f25ae9SGregory Neil Shapiro 132906f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 133006f25ae9SGregory Neil Shapiro if (sp == NULL) 133106f25ae9SGregory Neil Shapiro { 133206f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 133306f25ae9SGregory Neil Shapiro port = htons(25); 133406f25ae9SGregory Neil Shapiro } 133506f25ae9SGregory Neil Shapiro else 133606f25ae9SGregory Neil Shapiro port = sp->s_port; 133706f25ae9SGregory Neil Shapiro } 133806f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 133906f25ae9SGregory Neil Shapiro } 134006f25ae9SGregory Neil Shapiro 134106f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 134206f25ae9SGregory Neil Shapiro { 134306f25ae9SGregory Neil Shapiro #if NETINET 134406f25ae9SGregory Neil Shapiro case AF_INET: 134506f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 134606f25ae9SGregory Neil Shapiro break; 13475b0945b5SGregory Neil Shapiro #endif 134806f25ae9SGregory Neil Shapiro 134906f25ae9SGregory Neil Shapiro #if NETINET6 135006f25ae9SGregory Neil Shapiro case AF_INET6: 135106f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 135206f25ae9SGregory Neil Shapiro break; 13535b0945b5SGregory Neil Shapiro #endif 135406f25ae9SGregory Neil Shapiro 135506f25ae9SGregory Neil Shapiro default: 135606f25ae9SGregory Neil Shapiro /* unknown protocol */ 135706f25ae9SGregory Neil Shapiro break; 135806f25ae9SGregory Neil Shapiro } 135940266059SGregory Neil Shapiro return port; 136006f25ae9SGregory Neil Shapiro } 136140266059SGregory Neil Shapiro /* 1362c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1363c2aa98e2SPeter Wemm ** 1364c2aa98e2SPeter Wemm ** Parameters: 1365c2aa98e2SPeter Wemm ** none. 1366c2aa98e2SPeter Wemm ** 1367c2aa98e2SPeter Wemm ** Returns: 1368c2aa98e2SPeter Wemm ** none. 1369c2aa98e2SPeter Wemm ** 1370c2aa98e2SPeter Wemm ** Side Effects: 1371c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1372c2aa98e2SPeter Wemm */ 1373c2aa98e2SPeter Wemm 1374c2aa98e2SPeter Wemm void 1375c2aa98e2SPeter Wemm clrdaemon() 1376c2aa98e2SPeter Wemm { 137706f25ae9SGregory Neil Shapiro int i; 137806f25ae9SGregory Neil Shapiro 137940266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 138006f25ae9SGregory Neil Shapiro { 138106f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 138206f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 138306f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 138406f25ae9SGregory Neil Shapiro } 1385c2aa98e2SPeter Wemm } 138640266059SGregory Neil Shapiro 138740266059SGregory Neil Shapiro /* 138840266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 138940266059SGregory Neil Shapiro ** 139040266059SGregory Neil Shapiro ** Parameters: 139140266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 139240266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 139340266059SGregory Neil Shapiro ** 139440266059SGregory Neil Shapiro ** Returns: 139540266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 139640266059SGregory Neil Shapiro ** 139740266059SGregory Neil Shapiro ** Side Effects: 139840266059SGregory Neil Shapiro ** fills in modifiers. 139940266059SGregory Neil Shapiro */ 140040266059SGregory Neil Shapiro 140140266059SGregory Neil Shapiro char * 140240266059SGregory Neil Shapiro getmodifiers(v, modifiers) 140340266059SGregory Neil Shapiro char *v; 140440266059SGregory Neil Shapiro BITMAP256 modifiers; 140540266059SGregory Neil Shapiro { 140640266059SGregory Neil Shapiro int l; 140740266059SGregory Neil Shapiro char *h, *f, *flags; 140840266059SGregory Neil Shapiro 140940266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 141040266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 141140266059SGregory Neil Shapiro 141240266059SGregory Neil Shapiro /* is someone joking? */ 141340266059SGregory Neil Shapiro if (l < 0 || l > 256) 141440266059SGregory Neil Shapiro { 141540266059SGregory Neil Shapiro if (LogLevel > 2) 141640266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 141740266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 141840266059SGregory Neil Shapiro return NULL; 141940266059SGregory Neil Shapiro } 142040266059SGregory Neil Shapiro flags = xalloc(l); 142140266059SGregory Neil Shapiro f = flags; 142240266059SGregory Neil Shapiro clrbitmap(modifiers); 142340266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 142440266059SGregory Neil Shapiro { 142540266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 142640266059SGregory Neil Shapiro { 142740266059SGregory Neil Shapiro setbitn(*h, modifiers); 142840266059SGregory Neil Shapiro if (flags != f) 142940266059SGregory Neil Shapiro *flags++ = ' '; 143040266059SGregory Neil Shapiro *flags++ = *h; 143140266059SGregory Neil Shapiro if (isupper(*h)) 143240266059SGregory Neil Shapiro *flags++ = *h; 143340266059SGregory Neil Shapiro } 143440266059SGregory Neil Shapiro } 143540266059SGregory Neil Shapiro *flags++ = '\0'; 143640266059SGregory Neil Shapiro return f; 143740266059SGregory Neil Shapiro } 143840266059SGregory Neil Shapiro 143940266059SGregory Neil Shapiro /* 144040266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 144140266059SGregory Neil Shapiro ** 144240266059SGregory Neil Shapiro ** Parameters: 144340266059SGregory Neil Shapiro ** flag -- the flag to test. 144440266059SGregory Neil Shapiro ** 144540266059SGregory Neil Shapiro ** Returns: 144640266059SGregory Neil Shapiro ** true iff all daemons have set flag. 144740266059SGregory Neil Shapiro */ 144840266059SGregory Neil Shapiro 144940266059SGregory Neil Shapiro bool 145040266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 145140266059SGregory Neil Shapiro int flag; 145240266059SGregory Neil Shapiro { 145340266059SGregory Neil Shapiro int i; 145440266059SGregory Neil Shapiro 145540266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 145640266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 145740266059SGregory Neil Shapiro return false; 145840266059SGregory Neil Shapiro return true; 145940266059SGregory Neil Shapiro } 146040266059SGregory Neil Shapiro 146140266059SGregory Neil Shapiro /* 146206f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1463c2aa98e2SPeter Wemm ** 1464c2aa98e2SPeter Wemm ** Parameters: 1465c2aa98e2SPeter Wemm ** p -- the options line. 146606f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1467c2aa98e2SPeter Wemm ** 1468c2aa98e2SPeter Wemm ** Returns: 1469c2aa98e2SPeter Wemm ** none. 1470c2aa98e2SPeter Wemm */ 1471c2aa98e2SPeter Wemm 147206f25ae9SGregory Neil Shapiro static void 147306f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1474b6bacd31SGregory Neil Shapiro char *p; 147540266059SGregory Neil Shapiro DAEMON_T *d; 1476c2aa98e2SPeter Wemm { 147706f25ae9SGregory Neil Shapiro #if NETISO 1478193538b7SGregory Neil Shapiro short portno; 14795b0945b5SGregory Neil Shapiro #endif 1480193538b7SGregory Neil Shapiro char *port = NULL; 1481193538b7SGregory Neil Shapiro char *addr = NULL; 148206f25ae9SGregory Neil Shapiro 148306f25ae9SGregory Neil Shapiro #if NETINET 148406f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 148506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 14865b0945b5SGregory Neil Shapiro #endif 14874e4196cbSGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 1488d0cef73dSGregory Neil Shapiro d->d_supersafe = DPO_NOTSET; 14895b0945b5SGregory Neil Shapiro #endif 14904e4196cbSGregory Neil Shapiro d->d_dm = DM_NOTSET; 1491d0cef73dSGregory Neil Shapiro d->d_refuseLA = DPO_NOTSET; 1492d0cef73dSGregory Neil Shapiro d->d_queueLA = DPO_NOTSET; 1493d0cef73dSGregory Neil Shapiro d->d_delayLA = DPO_NOTSET; 1494d0cef73dSGregory Neil Shapiro d->d_maxchildren = DPO_NOTSET; 1495c2aa98e2SPeter Wemm 1496c2aa98e2SPeter Wemm while (p != NULL) 1497c2aa98e2SPeter Wemm { 1498c2aa98e2SPeter Wemm register char *f; 1499c2aa98e2SPeter Wemm register char *v; 1500c2aa98e2SPeter Wemm 15015b0945b5SGregory Neil Shapiro while (SM_ISSPACE(*p)) 1502c2aa98e2SPeter Wemm p++; 1503c2aa98e2SPeter Wemm if (*p == '\0') 1504c2aa98e2SPeter Wemm break; 1505c2aa98e2SPeter Wemm f = p; 1506c2aa98e2SPeter Wemm p = strchr(p, ','); 1507c2aa98e2SPeter Wemm if (p != NULL) 1508c2aa98e2SPeter Wemm *p++ = '\0'; 1509c2aa98e2SPeter Wemm v = strchr(f, '='); 1510c2aa98e2SPeter Wemm if (v == NULL) 1511c2aa98e2SPeter Wemm continue; 1512c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1513c2aa98e2SPeter Wemm continue; 1514c2aa98e2SPeter Wemm 1515c2aa98e2SPeter Wemm switch (*f) 1516c2aa98e2SPeter Wemm { 151713d88268SGregory Neil Shapiro case 'A': /* address */ 1518d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1519d0cef73dSGregory Neil Shapiro case 'a': 15205b0945b5SGregory Neil Shapiro #endif 152113d88268SGregory Neil Shapiro addr = v; 152213d88268SGregory Neil Shapiro break; 152313d88268SGregory Neil Shapiro 1524d0cef73dSGregory Neil Shapiro case 'c': 1525d0cef73dSGregory Neil Shapiro d->d_maxchildren = atoi(v); 1526d0cef73dSGregory Neil Shapiro break; 1527d0cef73dSGregory Neil Shapiro 152813d88268SGregory Neil Shapiro case 'D': /* DeliveryMode */ 152913d88268SGregory Neil Shapiro switch (*v) 153013d88268SGregory Neil Shapiro { 153113d88268SGregory Neil Shapiro case SM_QUEUE: 153213d88268SGregory Neil Shapiro case SM_DEFER: 153313d88268SGregory Neil Shapiro case SM_DELIVER: 153413d88268SGregory Neil Shapiro case SM_FORK: 1535da7d7b9cSGregory Neil Shapiro #if _FFR_PROXY 1536da7d7b9cSGregory Neil Shapiro case SM_PROXY_REQ: 15375b0945b5SGregory Neil Shapiro #endif 153813d88268SGregory Neil Shapiro d->d_dm = *v; 153913d88268SGregory Neil Shapiro break; 154013d88268SGregory Neil Shapiro default: 154113d88268SGregory Neil Shapiro syserr("554 5.3.5 Unknown delivery mode %c", 154213d88268SGregory Neil Shapiro *v); 154313d88268SGregory Neil Shapiro break; 154413d88268SGregory Neil Shapiro } 154513d88268SGregory Neil Shapiro break; 1546d0cef73dSGregory Neil Shapiro 1547d0cef73dSGregory Neil Shapiro case 'd': /* delayLA */ 1548d0cef73dSGregory Neil Shapiro d->d_delayLA = atoi(v); 1549d0cef73dSGregory Neil Shapiro break; 155013d88268SGregory Neil Shapiro 1551c2aa98e2SPeter Wemm case 'F': /* address family */ 1552d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1553d0cef73dSGregory Neil Shapiro case 'f': 15545b0945b5SGregory Neil Shapiro #endif 1555c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 155606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 155740266059SGregory Neil Shapiro #ifdef NETUNIX 1558*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "unix") || 1559*2fb4f839SGregory Neil Shapiro SM_STRCASEEQ(v, "local")) 156040266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 15615b0945b5SGregory Neil Shapiro #endif 1562c2aa98e2SPeter Wemm #if NETINET 1563*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "inet")) 156406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 15655b0945b5SGregory Neil Shapiro #endif 156606f25ae9SGregory Neil Shapiro #if NETINET6 1567*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "inet6")) 156806f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 15695b0945b5SGregory Neil Shapiro #endif 1570c2aa98e2SPeter Wemm #if NETISO 1571*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "iso")) 157206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 15735b0945b5SGregory Neil Shapiro #endif 1574c2aa98e2SPeter Wemm #if NETNS 1575*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "ns")) 157606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 15775b0945b5SGregory Neil Shapiro #endif 1578c2aa98e2SPeter Wemm #if NETX25 1579*2fb4f839SGregory Neil Shapiro else if (SM_STRCASEEQ(v, "x.25")) 158006f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 15815b0945b5SGregory Neil Shapiro #endif 1582c2aa98e2SPeter Wemm else 158306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 158406f25ae9SGregory Neil Shapiro v); 1585c2aa98e2SPeter Wemm break; 1586c2aa98e2SPeter Wemm 158740266059SGregory Neil Shapiro #if MILTER 158840266059SGregory Neil Shapiro case 'I': 1589d0cef73dSGregory Neil Shapiro # if !_FFR_DPO_CS 1590d0cef73dSGregory Neil Shapiro case 'i': 15915b0945b5SGregory Neil Shapiro # endif 159240266059SGregory Neil Shapiro d->d_inputfilterlist = v; 159340266059SGregory Neil Shapiro break; 159440266059SGregory Neil Shapiro #endif /* MILTER */ 159540266059SGregory Neil Shapiro 1596c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 1597d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1598d0cef73dSGregory Neil Shapiro case 'l': 15995b0945b5SGregory Neil Shapiro #endif 160006f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 160106f25ae9SGregory Neil Shapiro break; 160206f25ae9SGregory Neil Shapiro 160306f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 1604d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1605d0cef73dSGregory Neil Shapiro case 'm': 16065b0945b5SGregory Neil Shapiro #endif 160740266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1608c2aa98e2SPeter Wemm break; 1609c2aa98e2SPeter Wemm 161013d88268SGregory Neil Shapiro case 'N': /* name */ 1611d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1612d0cef73dSGregory Neil Shapiro case 'n': 16135b0945b5SGregory Neil Shapiro #endif 161413d88268SGregory Neil Shapiro d->d_name = v; 161513d88268SGregory Neil Shapiro break; 161613d88268SGregory Neil Shapiro 161713d88268SGregory Neil Shapiro case 'P': /* port */ 1618d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1619d0cef73dSGregory Neil Shapiro case 'p': 16205b0945b5SGregory Neil Shapiro #endif 162113d88268SGregory Neil Shapiro port = v; 1622c2aa98e2SPeter Wemm break; 1623c2aa98e2SPeter Wemm 1624d0cef73dSGregory Neil Shapiro case 'q': 1625d0cef73dSGregory Neil Shapiro d->d_queueLA = atoi(v); 1626d0cef73dSGregory Neil Shapiro break; 1627d0cef73dSGregory Neil Shapiro 1628c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 162906f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 163006f25ae9SGregory Neil Shapiro break; 163106f25ae9SGregory Neil Shapiro 1632d0cef73dSGregory Neil Shapiro case 'r': 1633d0cef73dSGregory Neil Shapiro d->d_refuseLA = atoi(v); 1634d0cef73dSGregory Neil Shapiro break; 1635d0cef73dSGregory Neil Shapiro 163613d88268SGregory Neil Shapiro case 'S': /* send buffer size */ 1637d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1638d0cef73dSGregory Neil Shapiro case 's': 16395b0945b5SGregory Neil Shapiro #endif 164013d88268SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1641c2aa98e2SPeter Wemm break; 1642c2aa98e2SPeter Wemm 164313d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 164413d88268SGregory Neil Shapiro case 'T': /* SuperSafe */ 164513d88268SGregory Neil Shapiro if (tolower(*v) == 'i') 164613d88268SGregory Neil Shapiro d->d_supersafe = SAFE_INTERACTIVE; 164713d88268SGregory Neil Shapiro else if (tolower(*v) == 'p') 164813d88268SGregory Neil Shapiro # if MILTER 164913d88268SGregory Neil Shapiro d->d_supersafe = SAFE_REALLY_POSTMILTER; 165013d88268SGregory Neil Shapiro # else /* MILTER */ 165113d88268SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 165213d88268SGregory Neil Shapiro "Warning: SuperSafe=PostMilter requires Milter support (-DMILTER)\n"); 165313d88268SGregory Neil Shapiro # endif /* MILTER */ 165413d88268SGregory Neil Shapiro else 165513d88268SGregory Neil Shapiro d->d_supersafe = atobool(v) ? SAFE_REALLY 165613d88268SGregory Neil Shapiro : SAFE_NO; 165713d88268SGregory Neil Shapiro break; 165813d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 165913d88268SGregory Neil Shapiro 1660c2aa98e2SPeter Wemm default: 166106f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 166206f25ae9SGregory Neil Shapiro f); 1663c2aa98e2SPeter Wemm } 1664c2aa98e2SPeter Wemm } 1665193538b7SGregory Neil Shapiro 1666193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1667193538b7SGregory Neil Shapiro if (addr != NULL) 1668193538b7SGregory Neil Shapiro { 1669193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1670193538b7SGregory Neil Shapiro { 167140266059SGregory Neil Shapiro #if NETUNIX 167240266059SGregory Neil Shapiro case AF_UNIX: 167340266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 167440266059SGregory Neil Shapiro { 167540266059SGregory Neil Shapiro errno = ENAMETOOLONG; 1676da7d7b9cSGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %ld", 1677da7d7b9cSGregory Neil Shapiro addr, 1678da7d7b9cSGregory Neil Shapiro (long) sizeof(d->d_addr.sunix.sun_path)); 167940266059SGregory Neil Shapiro break; 168040266059SGregory Neil Shapiro } 168140266059SGregory Neil Shapiro 168240266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 168340266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 168440266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 168540266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 168640266059SGregory Neil Shapiro addr, 168740266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 168840266059SGregory Neil Shapiro break; 168940266059SGregory Neil Shapiro #endif /* NETUNIX */ 1690193538b7SGregory Neil Shapiro #if NETINET 1691193538b7SGregory Neil Shapiro case AF_INET: 1692193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 169340266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 169440266059SGregory Neil Shapiro == INADDR_NONE)) 1695193538b7SGregory Neil Shapiro { 1696193538b7SGregory Neil Shapiro register struct hostent *hp; 1697193538b7SGregory Neil Shapiro 1698193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1699193538b7SGregory Neil Shapiro if (hp == NULL) 1700193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1701193538b7SGregory Neil Shapiro addr); 1702193538b7SGregory Neil Shapiro else 1703193538b7SGregory Neil Shapiro { 1704193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1705193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1706193538b7SGregory Neil Shapiro hp->h_addr_list++; 1707193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1708193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1709193538b7SGregory Neil Shapiro addr); 1710193538b7SGregory Neil Shapiro else 1711193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1712193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1713193538b7SGregory Neil Shapiro INADDRSZ); 17145b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 1715193538b7SGregory Neil Shapiro } 1716193538b7SGregory Neil Shapiro } 1717193538b7SGregory Neil Shapiro break; 1718193538b7SGregory Neil Shapiro #endif /* NETINET */ 1719193538b7SGregory Neil Shapiro 1720193538b7SGregory Neil Shapiro #if NETINET6 1721193538b7SGregory Neil Shapiro case AF_INET6: 172240266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1723193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1724193538b7SGregory Neil Shapiro { 1725193538b7SGregory Neil Shapiro register struct hostent *hp; 1726193538b7SGregory Neil Shapiro 1727193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1728193538b7SGregory Neil Shapiro if (hp == NULL) 1729193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1730193538b7SGregory Neil Shapiro addr); 1731193538b7SGregory Neil Shapiro else 1732193538b7SGregory Neil Shapiro { 1733193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1734193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1735193538b7SGregory Neil Shapiro hp->h_addr_list++; 1736193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1737193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1738193538b7SGregory Neil Shapiro addr); 1739193538b7SGregory Neil Shapiro else 1740193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1741193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1742193538b7SGregory Neil Shapiro IN6ADDRSZ); 17435b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 1744193538b7SGregory Neil Shapiro } 1745193538b7SGregory Neil Shapiro } 1746193538b7SGregory Neil Shapiro break; 1747193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1748193538b7SGregory Neil Shapiro 1749193538b7SGregory Neil Shapiro default: 1750193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1751193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1752193538b7SGregory Neil Shapiro break; 1753193538b7SGregory Neil Shapiro } 1754193538b7SGregory Neil Shapiro } 1755193538b7SGregory Neil Shapiro 1756193538b7SGregory Neil Shapiro if (port != NULL) 1757193538b7SGregory Neil Shapiro { 1758193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1759193538b7SGregory Neil Shapiro { 1760193538b7SGregory Neil Shapiro #if NETINET 1761193538b7SGregory Neil Shapiro case AF_INET: 1762193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 176340266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 176440266059SGregory Neil Shapiro atoi((const char *) port)); 1765193538b7SGregory Neil Shapiro else 1766193538b7SGregory Neil Shapiro { 1767193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1768193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1769193538b7SGregory Neil Shapiro port); 1770193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1771193538b7SGregory Neil Shapiro register struct servent *sp; 1772193538b7SGregory Neil Shapiro 1773193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1774193538b7SGregory Neil Shapiro if (sp == NULL) 1775193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1776193538b7SGregory Neil Shapiro port); 1777193538b7SGregory Neil Shapiro else 1778193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1779193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1780193538b7SGregory Neil Shapiro } 1781193538b7SGregory Neil Shapiro break; 1782193538b7SGregory Neil Shapiro #endif /* NETINET */ 1783193538b7SGregory Neil Shapiro 1784193538b7SGregory Neil Shapiro #if NETINET6 1785193538b7SGregory Neil Shapiro case AF_INET6: 1786193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 178740266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 178840266059SGregory Neil Shapiro atoi(port)); 1789193538b7SGregory Neil Shapiro else 1790193538b7SGregory Neil Shapiro { 1791193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1792193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1793193538b7SGregory Neil Shapiro port); 1794193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1795193538b7SGregory Neil Shapiro register struct servent *sp; 1796193538b7SGregory Neil Shapiro 1797193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1798193538b7SGregory Neil Shapiro if (sp == NULL) 1799193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1800193538b7SGregory Neil Shapiro port); 1801193538b7SGregory Neil Shapiro else 1802193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1803193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1804193538b7SGregory Neil Shapiro } 1805193538b7SGregory Neil Shapiro break; 1806193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1807193538b7SGregory Neil Shapiro 1808193538b7SGregory Neil Shapiro #if NETISO 1809193538b7SGregory Neil Shapiro case AF_ISO: 1810193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1811193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 181240266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1813193538b7SGregory Neil Shapiro else 1814193538b7SGregory Neil Shapiro { 1815193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1816193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1817193538b7SGregory Neil Shapiro port); 1818193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1819193538b7SGregory Neil Shapiro register struct servent *sp; 1820193538b7SGregory Neil Shapiro 1821193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1822193538b7SGregory Neil Shapiro if (sp == NULL) 1823193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1824193538b7SGregory Neil Shapiro port); 1825193538b7SGregory Neil Shapiro else 1826193538b7SGregory Neil Shapiro portno = sp->s_port; 1827193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1828193538b7SGregory Neil Shapiro } 1829193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1830193538b7SGregory Neil Shapiro (char *) &portno, 2); 1831193538b7SGregory Neil Shapiro break; 1832193538b7SGregory Neil Shapiro #endif /* NETISO */ 1833193538b7SGregory Neil Shapiro 1834193538b7SGregory Neil Shapiro default: 1835193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1836193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1837193538b7SGregory Neil Shapiro break; 1838193538b7SGregory Neil Shapiro } 1839193538b7SGregory Neil Shapiro } 1840c2aa98e2SPeter Wemm } 184140266059SGregory Neil Shapiro /* 184206f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 184306f25ae9SGregory Neil Shapiro ** 184406f25ae9SGregory Neil Shapiro ** Parameters: 184506f25ae9SGregory Neil Shapiro ** p -- the options line. 184606f25ae9SGregory Neil Shapiro ** 184706f25ae9SGregory Neil Shapiro ** Returns: 184840266059SGregory Neil Shapiro ** true if successful, false otherwise. 184940266059SGregory Neil Shapiro ** 185040266059SGregory Neil Shapiro ** Side Effects: 185140266059SGregory Neil Shapiro ** increments number of daemons. 185206f25ae9SGregory Neil Shapiro */ 185306f25ae9SGregory Neil Shapiro 185440266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 185540266059SGregory Neil Shapiro 1856739ac4d4SGregory Neil Shapiro struct dflags 1857739ac4d4SGregory Neil Shapiro { 1858739ac4d4SGregory Neil Shapiro char *d_name; 1859739ac4d4SGregory Neil Shapiro int d_flag; 1860739ac4d4SGregory Neil Shapiro }; 1861739ac4d4SGregory Neil Shapiro 1862739ac4d4SGregory Neil Shapiro static struct dflags DaemonFlags[] = 1863739ac4d4SGregory Neil Shapiro { 1864739ac4d4SGregory Neil Shapiro { "AUTHREQ", D_AUTHREQ }, 1865739ac4d4SGregory Neil Shapiro { "BINDIF", D_BINDIF }, 1866739ac4d4SGregory Neil Shapiro { "CANONREQ", D_CANONREQ }, 1867739ac4d4SGregory Neil Shapiro { "IFNHELO", D_IFNHELO }, 1868739ac4d4SGregory Neil Shapiro { "FQMAIL", D_FQMAIL }, 1869739ac4d4SGregory Neil Shapiro { "FQRCPT", D_FQRCPT }, 1870739ac4d4SGregory Neil Shapiro { "SMTPS", D_SMTPS }, 1871739ac4d4SGregory Neil Shapiro { "UNQUALOK", D_UNQUALOK }, 1872739ac4d4SGregory Neil Shapiro { "NOAUTH", D_NOAUTH }, 1873739ac4d4SGregory Neil Shapiro { "NOCANON", D_NOCANON }, 1874739ac4d4SGregory Neil Shapiro { "NOETRN", D_NOETRN }, 1875739ac4d4SGregory Neil Shapiro { "NOTLS", D_NOTLS }, 1876739ac4d4SGregory Neil Shapiro { "ETRNONLY", D_ETRNONLY }, 1877739ac4d4SGregory Neil Shapiro { "OPTIONAL", D_OPTIONAL }, 1878739ac4d4SGregory Neil Shapiro { "DISABLE", D_DISABLE }, 1879739ac4d4SGregory Neil Shapiro { "ISSET", D_ISSET }, 1880739ac4d4SGregory Neil Shapiro { NULL, 0 } 1881739ac4d4SGregory Neil Shapiro }; 1882739ac4d4SGregory Neil Shapiro 1883739ac4d4SGregory Neil Shapiro static void 1884739ac4d4SGregory Neil Shapiro printdaemonflags(d) 1885739ac4d4SGregory Neil Shapiro DAEMON_T *d; 1886739ac4d4SGregory Neil Shapiro { 1887739ac4d4SGregory Neil Shapiro register struct dflags *df; 1888739ac4d4SGregory Neil Shapiro bool first = true; 1889739ac4d4SGregory Neil Shapiro 1890739ac4d4SGregory Neil Shapiro for (df = DaemonFlags; df->d_name != NULL; df++) 1891739ac4d4SGregory Neil Shapiro { 1892739ac4d4SGregory Neil Shapiro if (!bitnset(df->d_flag, d->d_flags)) 1893739ac4d4SGregory Neil Shapiro continue; 1894739ac4d4SGregory Neil Shapiro if (first) 1895e92d3f3fSGregory Neil Shapiro sm_dprintf("<%s", df->d_name); 1896739ac4d4SGregory Neil Shapiro else 1897e92d3f3fSGregory Neil Shapiro sm_dprintf(",%s", df->d_name); 1898739ac4d4SGregory Neil Shapiro first = false; 1899739ac4d4SGregory Neil Shapiro } 1900739ac4d4SGregory Neil Shapiro if (!first) 1901e92d3f3fSGregory Neil Shapiro sm_dprintf(">"); 1902739ac4d4SGregory Neil Shapiro } 1903739ac4d4SGregory Neil Shapiro 190406f25ae9SGregory Neil Shapiro bool 190506f25ae9SGregory Neil Shapiro setdaemonoptions(p) 190606f25ae9SGregory Neil Shapiro register char *p; 190706f25ae9SGregory Neil Shapiro { 190840266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 190940266059SGregory Neil Shapiro return false; 191040266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 191140266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 191240266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 191340266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 191406f25ae9SGregory Neil Shapiro 191540266059SGregory Neil Shapiro #if MILTER 191640266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 191740266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 19185b0945b5SGregory Neil Shapiro #endif 191940266059SGregory Neil Shapiro 192040266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 192140266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 192206f25ae9SGregory Neil Shapiro else 192306f25ae9SGregory Neil Shapiro { 192406f25ae9SGregory Neil Shapiro char num[30]; 192506f25ae9SGregory Neil Shapiro 1926d0cef73dSGregory Neil Shapiro (void) sm_snprintf(num, sizeof(num), "Daemon%d", NDaemons); 192740266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 192806f25ae9SGregory Neil Shapiro } 192906f25ae9SGregory Neil Shapiro 193006f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 193106f25ae9SGregory Neil Shapiro { 193240266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 1933739ac4d4SGregory Neil Shapiro printdaemonflags(&Daemons[NDaemons]); 193440266059SGregory Neil Shapiro sm_dprintf("\n"); 193506f25ae9SGregory Neil Shapiro } 193640266059SGregory Neil Shapiro ++NDaemons; 193740266059SGregory Neil Shapiro return true; 193806f25ae9SGregory Neil Shapiro } 193940266059SGregory Neil Shapiro /* 194006f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 194106f25ae9SGregory Neil Shapiro ** 194206f25ae9SGregory Neil Shapiro ** Parameters: 194306f25ae9SGregory Neil Shapiro ** none 194406f25ae9SGregory Neil Shapiro ** 194506f25ae9SGregory Neil Shapiro ** Returns: 194606f25ae9SGregory Neil Shapiro ** none 194706f25ae9SGregory Neil Shapiro ** 194806f25ae9SGregory Neil Shapiro ** Side Effects: 194906f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 195006f25ae9SGregory Neil Shapiro */ 195140266059SGregory Neil Shapiro 195206f25ae9SGregory Neil Shapiro void 195306f25ae9SGregory Neil Shapiro initdaemon() 195406f25ae9SGregory Neil Shapiro { 195540266059SGregory Neil Shapiro if (NDaemons == 0) 195606f25ae9SGregory Neil Shapiro { 195740266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 195840266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 195940266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 196040266059SGregory Neil Shapiro NDaemons = 1; 196106f25ae9SGregory Neil Shapiro } 196206f25ae9SGregory Neil Shapiro } 196340266059SGregory Neil Shapiro /* 196406f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 196506f25ae9SGregory Neil Shapiro ** 196606f25ae9SGregory Neil Shapiro ** Parameters: 196706f25ae9SGregory Neil Shapiro ** p -- the options line. 196806f25ae9SGregory Neil Shapiro ** 196906f25ae9SGregory Neil Shapiro ** Returns: 197006f25ae9SGregory Neil Shapiro ** none. 197106f25ae9SGregory Neil Shapiro */ 197206f25ae9SGregory Neil Shapiro 197340266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 197406f25ae9SGregory Neil Shapiro 197506f25ae9SGregory Neil Shapiro void 197606f25ae9SGregory Neil Shapiro setclientoptions(p) 197706f25ae9SGregory Neil Shapiro register char *p; 197806f25ae9SGregory Neil Shapiro { 197940266059SGregory Neil Shapiro int family; 198040266059SGregory Neil Shapiro DAEMON_T d; 198106f25ae9SGregory Neil Shapiro 1982d0cef73dSGregory Neil Shapiro memset(&d, '\0', sizeof(d)); 198306f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 198406f25ae9SGregory Neil Shapiro 198506f25ae9SGregory Neil Shapiro /* grab what we need */ 198640266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 198740266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 198840266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 198940266059SGregory Neil Shapiro if (d.d_name != NULL) 199040266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 199106f25ae9SGregory Neil Shapiro else 199240266059SGregory Neil Shapiro { 199340266059SGregory Neil Shapiro char num[30]; 199440266059SGregory Neil Shapiro 1995d0cef73dSGregory Neil Shapiro (void) sm_snprintf(num, sizeof(num), "Client%d", family); 199640266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 199706f25ae9SGregory Neil Shapiro } 199840266059SGregory Neil Shapiro } 199940266059SGregory Neil Shapiro /* 200006f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 200106f25ae9SGregory Neil Shapiro ** 200206f25ae9SGregory Neil Shapiro ** Parameters: 200306f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 200406f25ae9SGregory Neil Shapiro ** 200506f25ae9SGregory Neil Shapiro ** Returns: 200606f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 200706f25ae9SGregory Neil Shapiro ** 200806f25ae9SGregory Neil Shapiro ** Side Effects: 200906f25ae9SGregory Neil Shapiro ** none. 201006f25ae9SGregory Neil Shapiro */ 201106f25ae9SGregory Neil Shapiro 201206f25ae9SGregory Neil Shapiro static int 201306f25ae9SGregory Neil Shapiro addr_family(addr) 201406f25ae9SGregory Neil Shapiro char *addr; 201506f25ae9SGregory Neil Shapiro { 201606f25ae9SGregory Neil Shapiro #if NETINET6 201706f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 20185b0945b5SGregory Neil Shapiro #endif 201906f25ae9SGregory Neil Shapiro 202006f25ae9SGregory Neil Shapiro #if NETINET 202106f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 202206f25ae9SGregory Neil Shapiro { 202306f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 202440266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 202506f25ae9SGregory Neil Shapiro return AF_INET; 202606f25ae9SGregory Neil Shapiro } 202706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 202806f25ae9SGregory Neil Shapiro #if NETINET6 202940266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 203006f25ae9SGregory Neil Shapiro { 203106f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 203240266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 203306f25ae9SGregory Neil Shapiro return AF_INET6; 203406f25ae9SGregory Neil Shapiro } 203506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 203640266059SGregory Neil Shapiro #if NETUNIX 203740266059SGregory Neil Shapiro if (*addr == '/') 203840266059SGregory Neil Shapiro { 203906f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 204040266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 204140266059SGregory Neil Shapiro return AF_UNIX; 204240266059SGregory Neil Shapiro } 204340266059SGregory Neil Shapiro #endif /* NETUNIX */ 204440266059SGregory Neil Shapiro if (tTd(16, 9)) 204540266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 204606f25ae9SGregory Neil Shapiro return AF_UNSPEC; 204706f25ae9SGregory Neil Shapiro } 204840266059SGregory Neil Shapiro 204940266059SGregory Neil Shapiro /* 205040266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 205140266059SGregory Neil Shapiro ** 205240266059SGregory Neil Shapiro ** Parameters: 205340266059SGregory Neil Shapiro ** flag -- the flag to test. 205440266059SGregory Neil Shapiro ** 205540266059SGregory Neil Shapiro ** Returns: 205640266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 205740266059SGregory Neil Shapiro */ 205840266059SGregory Neil Shapiro 205940266059SGregory Neil Shapiro bool 206040266059SGregory Neil Shapiro chkclientmodifiers(flag) 206140266059SGregory Neil Shapiro int flag; 206240266059SGregory Neil Shapiro { 206340266059SGregory Neil Shapiro int i; 206440266059SGregory Neil Shapiro bool flagisset; 206540266059SGregory Neil Shapiro 206640266059SGregory Neil Shapiro flagisset = false; 206740266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 206840266059SGregory Neil Shapiro { 206940266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 207040266059SGregory Neil Shapiro { 207140266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 207240266059SGregory Neil Shapiro return false; 207340266059SGregory Neil Shapiro flagisset = true; 207440266059SGregory Neil Shapiro } 207540266059SGregory Neil Shapiro } 207640266059SGregory Neil Shapiro return flagisset; 207740266059SGregory Neil Shapiro } 207840266059SGregory Neil Shapiro 207940266059SGregory Neil Shapiro #if MILTER 208040266059SGregory Neil Shapiro /* 2081da7d7b9cSGregory Neil Shapiro ** SETUP_DAEMON_MILTERS -- Parse per-socket filters 208240266059SGregory Neil Shapiro ** 208340266059SGregory Neil Shapiro ** Parameters: 208440266059SGregory Neil Shapiro ** none 208540266059SGregory Neil Shapiro ** 208640266059SGregory Neil Shapiro ** Returns: 208740266059SGregory Neil Shapiro ** none 208840266059SGregory Neil Shapiro */ 208940266059SGregory Neil Shapiro 209040266059SGregory Neil Shapiro void 209140266059SGregory Neil Shapiro setup_daemon_milters() 209240266059SGregory Neil Shapiro { 209340266059SGregory Neil Shapiro int idx; 209440266059SGregory Neil Shapiro 209540266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 209640266059SGregory Neil Shapiro { 209740266059SGregory Neil Shapiro /* no need to configure the daemons */ 209840266059SGregory Neil Shapiro return; 209940266059SGregory Neil Shapiro } 210040266059SGregory Neil Shapiro 210140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 210240266059SGregory Neil Shapiro { 210340266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 210440266059SGregory Neil Shapiro { 210540266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 210640266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 210740266059SGregory Neil Shapiro MAXFILTERS); 210840266059SGregory Neil Shapiro } 210940266059SGregory Neil Shapiro } 211040266059SGregory Neil Shapiro } 211140266059SGregory Neil Shapiro #endif /* MILTER */ 211240266059SGregory Neil Shapiro /* 211306f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 2114c2aa98e2SPeter Wemm ** 2115c2aa98e2SPeter Wemm ** Parameters: 2116c2aa98e2SPeter Wemm ** host -- the name of the host. 2117c2aa98e2SPeter Wemm ** port -- the port number to connect to. 2118c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 2119c2aa98e2SPeter Wemm ** structure to be filled in. 2120c2aa98e2SPeter Wemm ** e -- the current envelope. 212140266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 212240266059SGregory Neil Shapiro ** (0 means no limit) 2123c2aa98e2SPeter Wemm ** 2124c2aa98e2SPeter Wemm ** Returns: 2125c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 2126c2aa98e2SPeter Wemm ** made and if not why not. 2127c2aa98e2SPeter Wemm ** 2128c2aa98e2SPeter Wemm ** Side Effects: 2129c2aa98e2SPeter Wemm ** none. 2130c2aa98e2SPeter Wemm */ 2131c2aa98e2SPeter Wemm 2132c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 2133c2aa98e2SPeter Wemm 2134c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 2135c2aa98e2SPeter Wemm 2136c2aa98e2SPeter Wemm int 21375b0945b5SGregory Neil Shapiro makeconnection(host, port, mci, e, enough 21385b0945b5SGregory Neil Shapiro #if DANE 21395b0945b5SGregory Neil Shapiro , ptlsa_flags 21405b0945b5SGregory Neil Shapiro #endif 21415b0945b5SGregory Neil Shapiro ) 2142c2aa98e2SPeter Wemm char *host; 214340266059SGregory Neil Shapiro volatile unsigned int port; 2144c2aa98e2SPeter Wemm register MCI *mci; 2145c2aa98e2SPeter Wemm ENVELOPE *e; 214640266059SGregory Neil Shapiro time_t enough; 21475b0945b5SGregory Neil Shapiro #if DANE 21485b0945b5SGregory Neil Shapiro unsigned long *ptlsa_flags; 21495b0945b5SGregory Neil Shapiro #endif 2150c2aa98e2SPeter Wemm { 2151c2aa98e2SPeter Wemm register volatile int addrno = 0; 215240266059SGregory Neil Shapiro volatile int s; 2153c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 2154c2aa98e2SPeter Wemm SOCKADDR addr; 215506f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 215606f25ae9SGregory Neil Shapiro int save_errno = 0; 215706f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 2158af9557fdSGregory Neil Shapiro volatile bool firstconnect = true; 215940266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 216006f25ae9SGregory Neil Shapiro #if NETINET6 216140266059SGregory Neil Shapiro volatile bool v6found = false; 21625b0945b5SGregory Neil Shapiro #endif 216306f25ae9SGregory Neil Shapiro volatile int family = InetMode; 216406f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 216506f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 216606f25ae9SGregory Neil Shapiro volatile bool clt_bind; 216706f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 216806f25ae9SGregory Neil Shapiro char *p; 216906f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 21705b0945b5SGregory Neil Shapiro #if DANE 21715b0945b5SGregory Neil Shapiro unsigned long tlsa_flags; 21725b0945b5SGregory Neil Shapiro #endif 21735b0945b5SGregory Neil Shapiro #if DANE && NETINET6 21745b0945b5SGregory Neil Shapiro struct hostent *volatile hs = (struct hostent *) NULL; 21755b0945b5SGregory Neil Shapiro #else 21765b0945b5SGregory Neil Shapiro # define hs ((struct hostent *) NULL) 21775b0945b5SGregory Neil Shapiro #endif 21785b0945b5SGregory Neil Shapiro 21795b0945b5SGregory Neil Shapiro #if DANE 21805b0945b5SGregory Neil Shapiro SM_REQUIRE(ptlsa_flags != NULL); 21815b0945b5SGregory Neil Shapiro tlsa_flags = *ptlsa_flags; 21825b0945b5SGregory Neil Shapiro *ptlsa_flags &= ~(TLSAFLALWAYS|TLSAFLSECURE); 21835b0945b5SGregory Neil Shapiro #endif 218406f25ae9SGregory Neil Shapiro 218540266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 218606f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 218740266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 218806f25ae9SGregory Neil Shapiro { 218906f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 219006f25ae9SGregory Neil Shapiro { 21915b0945b5SGregory Neil Shapiro if (!(SM_ISSPACE(*p))) 2192193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 219306f25ae9SGregory Neil Shapiro } 219406f25ae9SGregory Neil Shapiro } 219506f25ae9SGregory Neil Shapiro 219606f25ae9SGregory Neil Shapiro #if NETINET6 219706f25ae9SGregory Neil Shapiro v4retry: 21985b0945b5SGregory Neil Shapiro #endif 219940266059SGregory Neil Shapiro clt_bind = false; 220006f25ae9SGregory Neil Shapiro 220106f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 220206f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 220340266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2204602a2b1bSGregory Neil Shapiro *p != '\0') 220506f25ae9SGregory Neil Shapiro { 220606f25ae9SGregory Neil Shapiro #if NETINET6 220706f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 22085b0945b5SGregory Neil Shapiro #endif 220906f25ae9SGregory Neil Shapiro 2210d0cef73dSGregory Neil Shapiro memset(&clt_addr, '\0', sizeof(clt_addr)); 221106f25ae9SGregory Neil Shapiro 221206f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 221306f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 221406f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 221506f25ae9SGregory Neil Shapiro { 221606f25ae9SGregory Neil Shapiro #if NETINET 221706f25ae9SGregory Neil Shapiro case AF_INET: 2218602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2219602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 22209bd497b8SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != 22219bd497b8SGregory Neil Shapiro htonl(INADDR_LOOPBACK)) 222206f25ae9SGregory Neil Shapiro { 222340266059SGregory Neil Shapiro clt_bind = true; 222406f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in); 222506f25ae9SGregory Neil Shapiro } 222606f25ae9SGregory Neil Shapiro break; 222706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 222806f25ae9SGregory Neil Shapiro 222906f25ae9SGregory Neil Shapiro #if NETINET6 223006f25ae9SGregory Neil Shapiro case AF_INET6: 223106f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 2232d0cef73dSGregory Neil Shapiro (void) sm_snprintf(p6, sizeof(p6), 223340266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 223406f25ae9SGregory Neil Shapiro else 2235d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof(p6)); 223640266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2237602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2238602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 223906f25ae9SGregory Neil Shapiro { 224040266059SGregory Neil Shapiro clt_bind = true; 224106f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in6); 224206f25ae9SGregory Neil Shapiro } 224306f25ae9SGregory Neil Shapiro break; 224406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 224506f25ae9SGregory Neil Shapiro 224606f25ae9SGregory Neil Shapiro #if 0 224706f25ae9SGregory Neil Shapiro default: 224806f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 224906f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 225006f25ae9SGregory Neil Shapiro break; 225106f25ae9SGregory Neil Shapiro #endif /* 0 */ 225206f25ae9SGregory Neil Shapiro } 225306f25ae9SGregory Neil Shapiro if (clt_bind) 225406f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 225506f25ae9SGregory Neil Shapiro } 225640266059SGregory Neil Shapiro 225740266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 225840266059SGregory Neil Shapiro if (!clt_bind) 225906f25ae9SGregory Neil Shapiro { 226040266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 226106f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 226206f25ae9SGregory Neil Shapiro { 226306f25ae9SGregory Neil Shapiro #if NETINET 226406f25ae9SGregory Neil Shapiro case AF_INET: 226506f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 2266e3793f76SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = LocalDaemon ? 2267e3793f76SGregory Neil Shapiro htonl(INADDR_LOOPBACK) : INADDR_ANY; 226806f25ae9SGregory Neil Shapiro else 226940266059SGregory Neil Shapiro clt_bind = true; 227006f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 227140266059SGregory Neil Shapiro clt_bind = true; 227206f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in); 227306f25ae9SGregory Neil Shapiro break; 227406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 227506f25ae9SGregory Neil Shapiro #if NETINET6 227606f25ae9SGregory Neil Shapiro case AF_INET6: 227706f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 22786f9c8e5bSGregory Neil Shapiro clt_addr.sin6.sin6_addr = 22796f9c8e5bSGregory Neil Shapiro (LocalDaemon && V6LoopbackAddrFound) ? 2280e3793f76SGregory Neil Shapiro in6addr_loopback : in6addr_any; 228106f25ae9SGregory Neil Shapiro else 228240266059SGregory Neil Shapiro clt_bind = true; 228306f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in6); 228406f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 228540266059SGregory Neil Shapiro clt_bind = true; 228606f25ae9SGregory Neil Shapiro break; 228706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 228806f25ae9SGregory Neil Shapiro #if NETISO 228906f25ae9SGregory Neil Shapiro case AF_ISO: 2290d0cef73dSGregory Neil Shapiro socksize = sizeof(clt_addr.siso); 229140266059SGregory Neil Shapiro clt_bind = true; 229206f25ae9SGregory Neil Shapiro break; 229306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 229406f25ae9SGregory Neil Shapiro default: 229506f25ae9SGregory Neil Shapiro break; 229606f25ae9SGregory Neil Shapiro } 229706f25ae9SGregory Neil Shapiro } 2298c2aa98e2SPeter Wemm 2299c2aa98e2SPeter Wemm /* 2300c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2301c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2302c2aa98e2SPeter Wemm */ 2303c2aa98e2SPeter Wemm 2304602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2305c2aa98e2SPeter Wemm errno = 0; 2306d0cef73dSGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof(CurHostAddr)); 2307d0cef73dSGregory Neil Shapiro memset(&addr, '\0', sizeof(addr)); 2308c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2309c2aa98e2SPeter Wemm CurHostName = host; 2310c2aa98e2SPeter Wemm 2311c2aa98e2SPeter Wemm if (host[0] == '[') 2312c2aa98e2SPeter Wemm { 231306f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2314c2aa98e2SPeter Wemm if (p != NULL) 2315c2aa98e2SPeter Wemm { 2316c2aa98e2SPeter Wemm #if NETINET 231706f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 23185b0945b5SGregory Neil Shapiro #endif 231906f25ae9SGregory Neil Shapiro #if NETINET6 232006f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 23215b0945b5SGregory Neil Shapiro #endif 232206f25ae9SGregory Neil Shapiro 232306f25ae9SGregory Neil Shapiro *p = '\0'; 232406f25ae9SGregory Neil Shapiro #if NETINET6 2325d0cef73dSGregory Neil Shapiro memset(&hid6, '\0', sizeof(hid6)); 23265b0945b5SGregory Neil Shapiro #endif 232706f25ae9SGregory Neil Shapiro #if NETINET 232806f25ae9SGregory Neil Shapiro if (family == AF_INET && 232906f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 233006f25ae9SGregory Neil Shapiro { 233106f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 233206f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 233306f25ae9SGregory Neil Shapiro } 233406f25ae9SGregory Neil Shapiro else 233506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 233606f25ae9SGregory Neil Shapiro #if NETINET6 233706f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 233840266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 233906f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 234006f25ae9SGregory Neil Shapiro { 234106f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 234206f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 234306f25ae9SGregory Neil Shapiro } 234406f25ae9SGregory Neil Shapiro else 234506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2346c2aa98e2SPeter Wemm { 2347c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 234806f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2349c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2350c2aa98e2SPeter Wemm { 2351c2aa98e2SPeter Wemm #if NAMED_BIND 2352c2aa98e2SPeter Wemm int oldopts = _res.options; 2353c2aa98e2SPeter Wemm 2354c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 235506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2356c2aa98e2SPeter Wemm p[-1] = '\0'; 235706f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 235806f25ae9SGregory Neil Shapiro family); 2359c2aa98e2SPeter Wemm p[-1] = '.'; 2360c2aa98e2SPeter Wemm #if NAMED_BIND 2361c2aa98e2SPeter Wemm _res.options = oldopts; 23625b0945b5SGregory Neil Shapiro #endif 2363c2aa98e2SPeter Wemm } 2364c2aa98e2SPeter Wemm *p = ']'; 2365c2aa98e2SPeter Wemm goto gothostent; 2366c2aa98e2SPeter Wemm } 2367c2aa98e2SPeter Wemm *p = ']'; 2368c2aa98e2SPeter Wemm } 2369c2aa98e2SPeter Wemm if (p == NULL) 2370c2aa98e2SPeter Wemm { 2371c2aa98e2SPeter Wemm extern char MsgBuf[]; 2372c2aa98e2SPeter Wemm 237306f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 237406f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 237506f25ae9SGregory Neil Shapiro host); 2376c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 237706f25ae9SGregory Neil Shapiro errno = EINVAL; 2378c2aa98e2SPeter Wemm return EX_NOHOST; 2379c2aa98e2SPeter Wemm } 2380c2aa98e2SPeter Wemm } 2381c2aa98e2SPeter Wemm else 2382c2aa98e2SPeter Wemm { 2383c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2384c2aa98e2SPeter Wemm { 238506f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 23865b0945b5SGregory Neil Shapiro #if DANE 23875b0945b5SGregory Neil Shapiro if (tTd(16, 40)) 23885b0945b5SGregory Neil Shapiro sm_dprintf("makeconnection: tlsa_flags=%lX, host=%s\n", 23895b0945b5SGregory Neil Shapiro tlsa_flags, host); 23905b0945b5SGregory Neil Shapiro if (DANEMODE(tlsa_flags) == DANE_SECURE 23915b0945b5SGregory Neil Shapiro # if DNSSEC_TEST 23925b0945b5SGregory Neil Shapiro || tTd(8, 120) 23935b0945b5SGregory Neil Shapiro # endif 23945b0945b5SGregory Neil Shapiro ) 23955b0945b5SGregory Neil Shapiro { 23965b0945b5SGregory Neil Shapiro DNS_REPLY_T *rr; 23975b0945b5SGregory Neil Shapiro int err, herr; 23985b0945b5SGregory Neil Shapiro 23995b0945b5SGregory Neil Shapiro rr = dns_lookup_int(host, C_IN, FAM2T_(family), 24005b0945b5SGregory Neil Shapiro 0, 0, SM_RES_DNSSEC, 0, &err, &herr); 24015b0945b5SGregory Neil Shapiro 24025b0945b5SGregory Neil Shapiro /* 24035b0945b5SGregory Neil Shapiro ** Check for errors! 24045b0945b5SGregory Neil Shapiro ** If no ad: turn off TLSA. 2405*2fb4f839SGregory Neil Shapiro ** permfail: use "normal" method? 24065b0945b5SGregory Neil Shapiro ** tempfail: delay or use "normal" method? 24075b0945b5SGregory Neil Shapiro */ 24085b0945b5SGregory Neil Shapiro 24095b0945b5SGregory Neil Shapiro if (rr != NULL && rr->dns_r_h.ad == 1) 24105b0945b5SGregory Neil Shapiro { 24115b0945b5SGregory Neil Shapiro *ptlsa_flags |= DANE_SECURE; 24125b0945b5SGregory Neil Shapiro if ((TLSAFLTEMP & *ptlsa_flags) != 0) 24135b0945b5SGregory Neil Shapiro { 24145b0945b5SGregory Neil Shapiro dns_free_data(rr); 24155b0945b5SGregory Neil Shapiro rr = NULL; 24165b0945b5SGregory Neil Shapiro return EX_TEMPFAIL; 24175b0945b5SGregory Neil Shapiro } 24185b0945b5SGregory Neil Shapiro hp = dns2he(rr, family); 24195b0945b5SGregory Neil Shapiro # if NETINET6 24205b0945b5SGregory Neil Shapiro hs = hp; 24215b0945b5SGregory Neil Shapiro # endif 24225b0945b5SGregory Neil Shapiro } 24235b0945b5SGregory Neil Shapiro 24245b0945b5SGregory Neil Shapiro /* other possible "tempfails"? */ 24255b0945b5SGregory Neil Shapiro if (rr == NULL && h_errno == TRY_AGAIN) 24265b0945b5SGregory Neil Shapiro goto gothostent; 24275b0945b5SGregory Neil Shapiro 24285b0945b5SGregory Neil Shapiro dns_free_data(rr); 24295b0945b5SGregory Neil Shapiro rr = NULL; 24305b0945b5SGregory Neil Shapiro } 24315b0945b5SGregory Neil Shapiro #endif 24325b0945b5SGregory Neil Shapiro if (hp == NULL) 243306f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2434c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2435c2aa98e2SPeter Wemm { 2436c2aa98e2SPeter Wemm #if NAMED_BIND 2437c2aa98e2SPeter Wemm int oldopts = _res.options; 2438c2aa98e2SPeter Wemm 2439c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 24405b0945b5SGregory Neil Shapiro #endif 2441c2aa98e2SPeter Wemm *p = '\0'; 244206f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2443c2aa98e2SPeter Wemm *p = '.'; 2444c2aa98e2SPeter Wemm #if NAMED_BIND 2445c2aa98e2SPeter Wemm _res.options = oldopts; 24465b0945b5SGregory Neil Shapiro #endif 2447c2aa98e2SPeter Wemm } 2448c2aa98e2SPeter Wemm } 2449c2aa98e2SPeter Wemm gothostent: 24509bd497b8SGregory Neil Shapiro if (hp == NULL || hp->h_addr == NULL) 2451c2aa98e2SPeter Wemm { 2452c2aa98e2SPeter Wemm #if NAMED_BIND 2453c2aa98e2SPeter Wemm /* check for name server timeouts */ 245440266059SGregory Neil Shapiro # if NETINET6 245540266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 24565dd76dd0SGregory Neil Shapiro (h_errno == TRY_AGAIN || errno == ETIMEDOUT)) 245740266059SGregory Neil Shapiro { 245840266059SGregory Neil Shapiro /* 245940266059SGregory Neil Shapiro ** An attempt with family AF_INET may 24605dd76dd0SGregory Neil Shapiro ** succeed. By skipping the next section 246140266059SGregory Neil Shapiro ** of code, we will try AF_INET before 246240266059SGregory Neil Shapiro ** failing. 246340266059SGregory Neil Shapiro */ 246440266059SGregory Neil Shapiro 246540266059SGregory Neil Shapiro if (tTd(16, 10)) 246640266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 246740266059SGregory Neil Shapiro } 246840266059SGregory Neil Shapiro else 246940266059SGregory Neil Shapiro # endif /* NETINET6 */ 2470*2fb4f839SGregory Neil Shapiro /* "else" in #if code above */ 247140266059SGregory Neil Shapiro { 247240266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 2473d0cef73dSGregory Neil Shapiro # if _FFR_GETHBN_ExFILE 2474d0cef73dSGregory Neil Shapiro # ifdef EMFILE 2475d0cef73dSGregory Neil Shapiro errno == EMFILE || 24765b0945b5SGregory Neil Shapiro # endif 2477d0cef73dSGregory Neil Shapiro # ifdef ENFILE 2478d0cef73dSGregory Neil Shapiro errno == ENFILE || 24795b0945b5SGregory Neil Shapiro # endif 2480d0cef73dSGregory Neil Shapiro # endif /* _FFR_GETHBN_ExFILE */ 248140266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2482c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2483c2aa98e2SPeter Wemm { 248406f25ae9SGregory Neil Shapiro save_errno = errno; 248540266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 248640266059SGregory Neil Shapiro "4.4.3", NULL); 248706f25ae9SGregory Neil Shapiro errno = save_errno; 2488c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2489c2aa98e2SPeter Wemm } 249040266059SGregory Neil Shapiro } 249106f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 249206f25ae9SGregory Neil Shapiro #if NETINET6 249306f25ae9SGregory Neil Shapiro /* 249406f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 249506f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 249606f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 249706f25ae9SGregory Neil Shapiro */ 249806f25ae9SGregory Neil Shapiro 249906f25ae9SGregory Neil Shapiro if (family == AF_INET6) 250006f25ae9SGregory Neil Shapiro { 250106f25ae9SGregory Neil Shapiro family = AF_INET; 250206f25ae9SGregory Neil Shapiro goto v4retry; 250306f25ae9SGregory Neil Shapiro } 250406f25ae9SGregory Neil Shapiro if (v6found) 250506f25ae9SGregory Neil Shapiro goto v6tempfail; 250606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 250706f25ae9SGregory Neil Shapiro save_errno = errno; 2508c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 250906f25ae9SGregory Neil Shapiro errno = save_errno; 251006f25ae9SGregory Neil Shapiro return EX_NOHOST; 2511c2aa98e2SPeter Wemm } 2512c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2513c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2514c2aa98e2SPeter Wemm { 2515c2aa98e2SPeter Wemm #if NETINET 2516c2aa98e2SPeter Wemm case AF_INET: 251706f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 251806f25ae9SGregory Neil Shapiro hp->h_addr, 2519c2aa98e2SPeter Wemm INADDRSZ); 2520c2aa98e2SPeter Wemm break; 252106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 252206f25ae9SGregory Neil Shapiro 252306f25ae9SGregory Neil Shapiro #if NETINET6 252406f25ae9SGregory Neil Shapiro case AF_INET6: 252506f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 252606f25ae9SGregory Neil Shapiro hp->h_addr, 252706f25ae9SGregory Neil Shapiro IN6ADDRSZ); 252806f25ae9SGregory Neil Shapiro break; 252906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2530c2aa98e2SPeter Wemm 2531c2aa98e2SPeter Wemm default: 2532d0cef73dSGregory Neil Shapiro if (hp->h_length > sizeof(addr.sa.sa_data)) 2533c2aa98e2SPeter Wemm { 2534c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2535c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2536c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 253706f25ae9SGregory Neil Shapiro errno = EINVAL; 2538c2aa98e2SPeter Wemm return EX_NOHOST; 2539c2aa98e2SPeter Wemm } 254040266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2541c2aa98e2SPeter Wemm break; 2542c2aa98e2SPeter Wemm } 2543c2aa98e2SPeter Wemm addrno = 1; 2544c2aa98e2SPeter Wemm } 2545c2aa98e2SPeter Wemm 25465b0945b5SGregory Neil Shapiro #if _FFR_TESTS 25475b0945b5SGregory Neil Shapiro /* 25485b0945b5SGregory Neil Shapiro ** Hack for testing. 25495b0945b5SGregory Neil Shapiro ** Hardcoded: 25505b0945b5SGregory Neil Shapiro ** 10.1.1.12: see meta1.tns XREF IP address 25515b0945b5SGregory Neil Shapiro ** 8754: see common.sh XREF SNKPORT2 25525b0945b5SGregory Neil Shapiro */ 25535b0945b5SGregory Neil Shapiro 2554*2fb4f839SGregory Neil Shapiro if (tTd(77, 101) && hp != NULL && hp->h_addrtype == AF_INET && 25555b0945b5SGregory Neil Shapiro addr.sin.sin_addr.s_addr == inet_addr("10.1.1.12")) 25565b0945b5SGregory Neil Shapiro { 25575b0945b5SGregory Neil Shapiro addr.sin.sin_addr.s_addr = inet_addr("127.0.0.1"); 25585b0945b5SGregory Neil Shapiro port = htons(8754); 25595b0945b5SGregory Neil Shapiro sm_dprintf("hack host=%s addr=[%s].%d\n", host, 25605b0945b5SGregory Neil Shapiro anynet_ntoa(&addr), ntohs(port)); 25615b0945b5SGregory Neil Shapiro } 25625b0945b5SGregory Neil Shapiro #endif 25635b0945b5SGregory Neil Shapiro 2564c2aa98e2SPeter Wemm /* 2565c2aa98e2SPeter Wemm ** Determine the port number. 2566c2aa98e2SPeter Wemm */ 2567c2aa98e2SPeter Wemm 2568c2aa98e2SPeter Wemm if (port == 0) 2569c2aa98e2SPeter Wemm { 257006f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 257106f25ae9SGregory Neil Shapiro port = htons(25); 257206f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2573c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2574c2aa98e2SPeter Wemm 2575c2aa98e2SPeter Wemm if (sp == NULL) 2576c2aa98e2SPeter Wemm { 2577c2aa98e2SPeter Wemm if (LogLevel > 2) 2578c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2579c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2580c2aa98e2SPeter Wemm port = htons(25); 2581c2aa98e2SPeter Wemm } 2582c2aa98e2SPeter Wemm else 2583c2aa98e2SPeter Wemm port = sp->s_port; 258406f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2585c2aa98e2SPeter Wemm } 2586c2aa98e2SPeter Wemm 258740266059SGregory Neil Shapiro #if NETINET6 258840266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 258940266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 259040266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 259140266059SGregory Neil Shapiro { 259240266059SGregory Neil Shapiro /* 259340266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 259440266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 259540266059SGregory Neil Shapiro ** for IPv4. 259640266059SGregory Neil Shapiro */ 259740266059SGregory Neil Shapiro 259840266059SGregory Neil Shapiro goto nextaddr; 259940266059SGregory Neil Shapiro } 260040266059SGregory Neil Shapiro #endif /* NETINET6 */ 260140266059SGregory Neil Shapiro 2602c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2603c2aa98e2SPeter Wemm { 2604c2aa98e2SPeter Wemm #if NETINET 2605c2aa98e2SPeter Wemm case AF_INET: 2606c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2607c2aa98e2SPeter Wemm addrlen = sizeof(struct sockaddr_in); 2608c2aa98e2SPeter Wemm break; 260906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 261006f25ae9SGregory Neil Shapiro 261106f25ae9SGregory Neil Shapiro #if NETINET6 261206f25ae9SGregory Neil Shapiro case AF_INET6: 261306f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 261406f25ae9SGregory Neil Shapiro addrlen = sizeof(struct sockaddr_in6); 261506f25ae9SGregory Neil Shapiro break; 261606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2617c2aa98e2SPeter Wemm 2618c2aa98e2SPeter Wemm #if NETISO 2619c2aa98e2SPeter Wemm case AF_ISO: 2620c2aa98e2SPeter Wemm /* assume two byte transport selector */ 262106f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2622c2aa98e2SPeter Wemm addrlen = sizeof(struct sockaddr_iso); 2623c2aa98e2SPeter Wemm break; 262406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2625c2aa98e2SPeter Wemm 2626c2aa98e2SPeter Wemm default: 2627c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2628c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 262906f25ae9SGregory Neil Shapiro errno = EINVAL; 26305b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 263106f25ae9SGregory Neil Shapiro return EX_NOHOST; 2632c2aa98e2SPeter Wemm } 2633c2aa98e2SPeter Wemm 2634c2aa98e2SPeter Wemm /* 2635c2aa98e2SPeter Wemm ** Try to actually open the connection. 2636c2aa98e2SPeter Wemm */ 2637c2aa98e2SPeter Wemm 263840266059SGregory Neil Shapiro #if XLA 2639c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2640c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2641193538b7SGregory Neil Shapiro { 26425b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 2643c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2644193538b7SGregory Neil Shapiro } 264506f25ae9SGregory Neil Shapiro #endif /* XLA */ 2646c2aa98e2SPeter Wemm 26475b0945b5SGregory Neil Shapiro #if _FFR_OCC 26485b0945b5SGregory Neil Shapiro # define OCC_CLOSE occ_close(e, mci, host, &addr) 26495b0945b5SGregory Neil Shapiro /* HACK!!!! just to see if this can work at all... */ 26505b0945b5SGregory Neil Shapiro if (occ_exceeded(e, mci, host, &addr)) 26515b0945b5SGregory Neil Shapiro { 26525b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 26535b0945b5SGregory Neil Shapiro sm_syslog(LOG_DEBUG, e->e_id, 26545b0945b5SGregory Neil Shapiro "stat=occ_exceeded, host=%s, addr=%s", 26555b0945b5SGregory Neil Shapiro host, anynet_ntoa(&addr)); 26565b0945b5SGregory Neil Shapiro 26575b0945b5SGregory Neil Shapiro /* 26585b0945b5SGregory Neil Shapiro ** to get a more specific stat= message set errno 26595b0945b5SGregory Neil Shapiro ** or make up one in sm, see sm_errstring() 26605b0945b5SGregory Neil Shapiro */ 26615b0945b5SGregory Neil Shapiro 26625b0945b5SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", "450 occ_exceeded"); /* check D.S.N */ 26635b0945b5SGregory Neil Shapiro errno = EAGAIN; 26645b0945b5SGregory Neil Shapiro return EX_TEMPFAIL; 26655b0945b5SGregory Neil Shapiro } 26665b0945b5SGregory Neil Shapiro #else /* _FFR_OCC */ 26675b0945b5SGregory Neil Shapiro # define OCC_CLOSE 26685b0945b5SGregory Neil Shapiro #endif /* _FFR_OCC */ 26695b0945b5SGregory Neil Shapiro 2670c2aa98e2SPeter Wemm for (;;) 2671c2aa98e2SPeter Wemm { 2672c2aa98e2SPeter Wemm if (tTd(16, 1)) 267340266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 26748774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 267540266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2676c2aa98e2SPeter Wemm 2677c2aa98e2SPeter Wemm /* save for logging */ 2678c2aa98e2SPeter Wemm CurHostAddr = addr; 2679c2aa98e2SPeter Wemm 268040266059SGregory Neil Shapiro #if HASRRESVPORT 2681c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2682c2aa98e2SPeter Wemm { 2683c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2684c2aa98e2SPeter Wemm 2685c2aa98e2SPeter Wemm s = rresvport(&rport); 2686c2aa98e2SPeter Wemm } 2687c2aa98e2SPeter Wemm else 268840266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2689*2fb4f839SGregory Neil Shapiro /* "else" in #if code above */ 2690c2aa98e2SPeter Wemm { 269140266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2692c2aa98e2SPeter Wemm } 2693c2aa98e2SPeter Wemm if (s < 0) 2694c2aa98e2SPeter Wemm { 269506f25ae9SGregory Neil Shapiro save_errno = errno; 2696c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 269740266059SGregory Neil Shapiro #if XLA 2698c2aa98e2SPeter Wemm xla_host_end(host); 26995b0945b5SGregory Neil Shapiro #endif 2700c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 27015b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 270206f25ae9SGregory Neil Shapiro errno = save_errno; 27035b0945b5SGregory Neil Shapiro OCC_CLOSE; 2704c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2705c2aa98e2SPeter Wemm } 2706c2aa98e2SPeter Wemm 2707c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 270840266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2709c2aa98e2SPeter Wemm { 2710c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 271140266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 271240266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2713c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2714c2aa98e2SPeter Wemm } 271506f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 271606f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 271740266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 271806f25ae9SGregory Neil Shapiro { 271906f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 272040266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 272140266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 272206f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 272306f25ae9SGregory Neil Shapiro } 272406f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 272506f25ae9SGregory Neil Shapiro 2726c2aa98e2SPeter Wemm if (tTd(16, 1)) 272740266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2728c2aa98e2SPeter Wemm 2729c2aa98e2SPeter Wemm /* turn on network debugging? */ 2730c2aa98e2SPeter Wemm if (tTd(16, 101)) 2731c2aa98e2SPeter Wemm { 2732c2aa98e2SPeter Wemm int on = 1; 273306f25ae9SGregory Neil Shapiro 2734c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2735d0cef73dSGregory Neil Shapiro (char *)&on, sizeof(on)); 2736c2aa98e2SPeter Wemm } 273740266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 273840266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2739c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2740c2aa98e2SPeter Wemm 274106f25ae9SGregory Neil Shapiro if (clt_bind) 274206f25ae9SGregory Neil Shapiro { 274306f25ae9SGregory Neil Shapiro int on = 1; 274406f25ae9SGregory Neil Shapiro 274506f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 274606f25ae9SGregory Neil Shapiro { 274706f25ae9SGregory Neil Shapiro #if NETINET 274806f25ae9SGregory Neil Shapiro case AF_INET: 274906f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 275006f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 275106f25ae9SGregory Neil Shapiro SO_REUSEADDR, 275206f25ae9SGregory Neil Shapiro (char *) &on, 2753d0cef73dSGregory Neil Shapiro sizeof(on)); 275406f25ae9SGregory Neil Shapiro break; 275506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 275606f25ae9SGregory Neil Shapiro 275706f25ae9SGregory Neil Shapiro #if NETINET6 275806f25ae9SGregory Neil Shapiro case AF_INET6: 275906f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 276006f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 276106f25ae9SGregory Neil Shapiro SO_REUSEADDR, 276206f25ae9SGregory Neil Shapiro (char *) &on, 2763d0cef73dSGregory Neil Shapiro sizeof(on)); 276406f25ae9SGregory Neil Shapiro break; 276506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 276606f25ae9SGregory Neil Shapiro } 276706f25ae9SGregory Neil Shapiro 276806f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 276906f25ae9SGregory Neil Shapiro { 277006f25ae9SGregory Neil Shapiro save_errno = errno; 277106f25ae9SGregory Neil Shapiro (void) close(s); 277206f25ae9SGregory Neil Shapiro errno = save_errno; 277306f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 277406f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 27755b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 277606f25ae9SGregory Neil Shapiro errno = save_errno; 27775b0945b5SGregory Neil Shapiro OCC_CLOSE; 277806f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 277906f25ae9SGregory Neil Shapiro } 278006f25ae9SGregory Neil Shapiro } 278106f25ae9SGregory Neil Shapiro 2782c2aa98e2SPeter Wemm /* 2783c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2784c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2785c2aa98e2SPeter Wemm */ 2786c2aa98e2SPeter Wemm 2787c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2788c2aa98e2SPeter Wemm { 2789c2aa98e2SPeter Wemm int i; 2790c2aa98e2SPeter Wemm 2791c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 279240266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 27938774250cSGregory Neil Shapiro connecttimeout, 0); 2794c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 279540266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 27968774250cSGregory Neil Shapiro connecttimeout, 0); 2797c2aa98e2SPeter Wemm else 2798c2aa98e2SPeter Wemm ev = NULL; 2799c2aa98e2SPeter Wemm 280006f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 280106f25ae9SGregory Neil Shapiro { 280206f25ae9SGregory Neil Shapiro #if NETINET 280306f25ae9SGregory Neil Shapiro case AF_INET: 280406f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 28056f9c8e5bSGregory Neil Shapiro addr.sa.sa_family = ConnectOnlyTo.sa.sa_family; 28065b0945b5SGregory Neil Shapiro if (ConnectOnlyTo.sin.sin_port != 0) 28075b0945b5SGregory Neil Shapiro { 28085b0945b5SGregory Neil Shapiro port = ConnectOnlyTo.sin.sin_port; 28095b0945b5SGregory Neil Shapiro addr.sin.sin_port = port; 28105b0945b5SGregory Neil Shapiro } 281106f25ae9SGregory Neil Shapiro break; 281206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 281306f25ae9SGregory Neil Shapiro 281406f25ae9SGregory Neil Shapiro #if NETINET6 281506f25ae9SGregory Neil Shapiro case AF_INET6: 281606f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 281706f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 281806f25ae9SGregory Neil Shapiro IN6ADDRSZ); 28195b0945b5SGregory Neil Shapiro if (ConnectOnlyTo.sin6.sin6_port != 0) 28205b0945b5SGregory Neil Shapiro { 28215b0945b5SGregory Neil Shapiro port = ConnectOnlyTo.sin6.sin6_port; 28225b0945b5SGregory Neil Shapiro addr.sin6.sin6_port = port; 28235b0945b5SGregory Neil Shapiro } 282406f25ae9SGregory Neil Shapiro break; 282506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 282606f25ae9SGregory Neil Shapiro } 2827b6bacd31SGregory Neil Shapiro if (tTd(16, 1)) 28285b0945b5SGregory Neil Shapiro sm_dprintf("Connecting to [%s].%d...\n", 28295b0945b5SGregory Neil Shapiro anynet_ntoa(&addr), ntohs(port)); 28305b0945b5SGregory Neil Shapiro 2831*2fb4f839SGregory Neil Shapiro #if _FFR_TESTS 2832*2fb4f839SGregory Neil Shapiro if (tTd(77, 101) 2833*2fb4f839SGregory Neil Shapiro /* && AF_INET == addr.sin.sin_family */ 2834*2fb4f839SGregory Neil Shapiro && addr.sin.sin_addr.s_addr >= 2835*2fb4f839SGregory Neil Shapiro inet_addr("255.255.255.1") 2836*2fb4f839SGregory Neil Shapiro && addr.sin.sin_addr.s_addr <= 2837*2fb4f839SGregory Neil Shapiro inet_addr("255.255.255.255") 2838*2fb4f839SGregory Neil Shapiro ) 2839*2fb4f839SGregory Neil Shapiro { 2840*2fb4f839SGregory Neil Shapiro i = -1; 2841*2fb4f839SGregory Neil Shapiro save_errno = ntohl(addr.sin.sin_addr.s_addr) - 2842*2fb4f839SGregory Neil Shapiro ntohl(inet_addr("255.255.255.0")); 2843*2fb4f839SGregory Neil Shapiro sm_dprintf("hack: fail connection=%d\n", 2844*2fb4f839SGregory Neil Shapiro save_errno); 2845*2fb4f839SGregory Neil Shapiro errno = save_errno; 2846*2fb4f839SGregory Neil Shapiro } 2847*2fb4f839SGregory Neil Shapiro else 2848*2fb4f839SGregory Neil Shapiro /* Watch out of changes below! */ 2849*2fb4f839SGregory Neil Shapiro #endif /* _FFR_TESTS */ 2850c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 285106f25ae9SGregory Neil Shapiro save_errno = errno; 2852c2aa98e2SPeter Wemm if (ev != NULL) 285340266059SGregory Neil Shapiro sm_clrevent(ev); 2854c2aa98e2SPeter Wemm if (i >= 0) 2855c2aa98e2SPeter Wemm break; 2856c2aa98e2SPeter Wemm } 2857c2aa98e2SPeter Wemm else 285806f25ae9SGregory Neil Shapiro save_errno = errno; 2859c2aa98e2SPeter Wemm 2860605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2861605302a5SGregory Neil Shapiro (void) close(s); 2862605302a5SGregory Neil Shapiro 2863c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 286440266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 286540266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2866c2aa98e2SPeter Wemm { 2867c2aa98e2SPeter Wemm if (tTd(16, 1)) 286840266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 286940266059SGregory Neil Shapiro sm_errstring(save_errno)); 287040266059SGregory Neil Shapiro firstconnect = false; 287106f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2872c2aa98e2SPeter Wemm continue; 2873c2aa98e2SPeter Wemm } 2874c2aa98e2SPeter Wemm 287540266059SGregory Neil Shapiro if (LogLevel > 13) 2876c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 28775b0945b5SGregory Neil Shapiro "makeconnection (%s [%s].%d (%d)) failed: %s", 28785b0945b5SGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 28795b0945b5SGregory Neil Shapiro (int) addr.sa.sa_family, 288040266059SGregory Neil Shapiro sm_errstring(save_errno)); 2881c2aa98e2SPeter Wemm 288240266059SGregory Neil Shapiro #if NETINET6 288340266059SGregory Neil Shapiro nextaddr: 288440266059SGregory Neil Shapiro #endif /* NETINET6 */ 288540266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 288640266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2887c2aa98e2SPeter Wemm { 2888c2aa98e2SPeter Wemm if (tTd(16, 1)) 288940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 289040266059SGregory Neil Shapiro sm_errstring(save_errno)); 2891c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2892c2aa98e2SPeter Wemm { 2893c2aa98e2SPeter Wemm #if NETINET 2894c2aa98e2SPeter Wemm case AF_INET: 289506f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 289606f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2897c2aa98e2SPeter Wemm INADDRSZ); 2898c2aa98e2SPeter Wemm break; 289906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 290006f25ae9SGregory Neil Shapiro 290106f25ae9SGregory Neil Shapiro #if NETINET6 290206f25ae9SGregory Neil Shapiro case AF_INET6: 290306f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 290406f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 290506f25ae9SGregory Neil Shapiro IN6ADDRSZ); 290606f25ae9SGregory Neil Shapiro break; 290706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2908c2aa98e2SPeter Wemm 2909c2aa98e2SPeter Wemm default: 291006f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 291106f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2912c2aa98e2SPeter Wemm hp->h_length); 2913c2aa98e2SPeter Wemm break; 2914c2aa98e2SPeter Wemm } 2915c2aa98e2SPeter Wemm continue; 2916c2aa98e2SPeter Wemm } 291706f25ae9SGregory Neil Shapiro errno = save_errno; 2918c2aa98e2SPeter Wemm 291906f25ae9SGregory Neil Shapiro #if NETINET6 292006f25ae9SGregory Neil Shapiro if (family == AF_INET6) 292106f25ae9SGregory Neil Shapiro { 292206f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 292340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 292440266059SGregory Neil Shapiro sm_errstring(save_errno)); 292540266059SGregory Neil Shapiro v6found = true; 292606f25ae9SGregory Neil Shapiro family = AF_INET; 29275b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 292806f25ae9SGregory Neil Shapiro goto v4retry; 292906f25ae9SGregory Neil Shapiro } 293006f25ae9SGregory Neil Shapiro v6tempfail: 293106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2932c2aa98e2SPeter Wemm /* couldn't open connection */ 293306f25ae9SGregory Neil Shapiro #if NETINET6 293406f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 293506f25ae9SGregory Neil Shapiro if (errno > 0) 29365b0945b5SGregory Neil Shapiro #endif 293706f25ae9SGregory Neil Shapiro save_errno = errno; 293806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 293940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 294040266059SGregory Neil Shapiro sm_errstring(save_errno)); 294140266059SGregory Neil Shapiro #if XLA 2942c2aa98e2SPeter Wemm xla_host_end(host); 29435b0945b5SGregory Neil Shapiro #endif 2944c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 29455b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 294606f25ae9SGregory Neil Shapiro errno = save_errno; 29475b0945b5SGregory Neil Shapiro OCC_CLOSE; 2948c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2949c2aa98e2SPeter Wemm } 2950c2aa98e2SPeter Wemm 29515b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, hs); 2952193538b7SGregory Neil Shapiro 2953c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 295406f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 295540266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 295640266059SGregory Neil Shapiro (void *) &s, 2957e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, NULL)) == NULL || 2958c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 295940266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 296040266059SGregory Neil Shapiro (void *) &s, 2961e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, NULL)) == NULL) 2962c2aa98e2SPeter Wemm { 296306f25ae9SGregory Neil Shapiro save_errno = errno; 2964c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2965c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 2966*2fb4f839SGregory Neil Shapiro SM_CLOSE_FP(mci->mci_out); 296706f25ae9SGregory Neil Shapiro (void) close(s); 296806f25ae9SGregory Neil Shapiro errno = save_errno; 29695b0945b5SGregory Neil Shapiro OCC_CLOSE; 297006f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 297106f25ae9SGregory Neil Shapiro } 297240266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 297340266059SGregory Neil Shapiro 297440266059SGregory Neil Shapiro /* set {client_flags} */ 297540266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 297640266059SGregory Neil Shapiro { 2977*2fb4f839SGregory Neil Shapiro char flags[64]; /* XXX */ 2978*2fb4f839SGregory Neil Shapiro 2979*2fb4f839SGregory Neil Shapiro /* 2980*2fb4f839SGregory Neil Shapiro ** For now just concatenate the flags as there is no 2981*2fb4f839SGregory Neil Shapiro ** overlap yet. 2982*2fb4f839SGregory Neil Shapiro */ 2983*2fb4f839SGregory Neil Shapiro 2984*2fb4f839SGregory Neil Shapiro p = macvalue(macid("{client_flags}"), e); 2985*2fb4f839SGregory Neil Shapiro flags[0] = '\0'; 2986*2fb4f839SGregory Neil Shapiro if (!SM_IS_EMPTY(p)) 2987*2fb4f839SGregory Neil Shapiro { 2988*2fb4f839SGregory Neil Shapiro (void) sm_strlcpy(flags, p, sizeof(flags)); 2989*2fb4f839SGregory Neil Shapiro (void) sm_strlcat(flags, " ", sizeof(flags)); 299040266059SGregory Neil Shapiro } 2991*2fb4f839SGregory Neil Shapiro (void) sm_strlcat(flags, 2992*2fb4f839SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags, 2993*2fb4f839SGregory Neil Shapiro sizeof(flags)); 2994*2fb4f839SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, macid("{client_flags}"), 2995*2fb4f839SGregory Neil Shapiro flags); 2996*2fb4f839SGregory Neil Shapiro } 299740266059SGregory Neil Shapiro 299840266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 299940266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 300040266059SGregory Neil Shapiro { 300140266059SGregory Neil Shapiro /* look for just this one flag */ 300240266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 300340266059SGregory Neil Shapiro } 300406f25ae9SGregory Neil Shapiro 300506f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 3006d0cef73dSGregory Neil Shapiro len = sizeof(addr); 300706f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 300806f25ae9SGregory Neil Shapiro { 300906f25ae9SGregory Neil Shapiro char *name; 30105b0945b5SGregory Neil Shapiro 30115b0945b5SGregory Neil Shapiro if (!isloopback(addr)) 30125b0945b5SGregory Neil Shapiro { 30135b0945b5SGregory Neil Shapiro char familystr[5]; 301406f25ae9SGregory Neil Shapiro 301540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 301640266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 30175b0945b5SGregory Neil Shapiro (void) sm_snprintf(familystr, sizeof(familystr), "%d", 301840266059SGregory Neil Shapiro addr.sa.sa_family); 301940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 30205b0945b5SGregory Neil Shapiro macid("{if_family_out}"), familystr); 30215b0945b5SGregory Neil Shapiro } 30225b0945b5SGregory Neil Shapiro else 30235b0945b5SGregory Neil Shapiro { 30245b0945b5SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 30255b0945b5SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 30265b0945b5SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 30275b0945b5SGregory Neil Shapiro macid("{if_family_out}"), NULL); 30285b0945b5SGregory Neil Shapiro } 302906f25ae9SGregory Neil Shapiro 303006f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 303140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 303240266059SGregory Neil Shapiro macid("{if_name_out}"), name); 303306f25ae9SGregory Neil Shapiro if (LogLevel > 11) 303406f25ae9SGregory Neil Shapiro { 303506f25ae9SGregory Neil Shapiro /* log connection information */ 303606f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 303706f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 303806f25ae9SGregory Neil Shapiro } 303906f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 304006f25ae9SGregory Neil Shapiro { 304106f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 304206f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 304306f25ae9SGregory Neil Shapiro } 304406f25ae9SGregory Neil Shapiro } 304506f25ae9SGregory Neil Shapiro else 304606f25ae9SGregory Neil Shapiro { 304740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 304840266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 304940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 305040266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 305140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 305240266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 305306f25ae9SGregory Neil Shapiro } 3054e92d3f3fSGregory Neil Shapiro 3055e92d3f3fSGregory Neil Shapiro /* Use the configured HeloName as appropriate */ 3056e92d3f3fSGregory Neil Shapiro if (HeloName != NULL && HeloName[0] != '\0') 30576f9c8e5bSGregory Neil Shapiro { 30585b0945b5SGregory Neil Shapiro SM_FREE(mci->mci_heloname); 3059e92d3f3fSGregory Neil Shapiro mci->mci_heloname = newstr(HeloName); 30606f9c8e5bSGregory Neil Shapiro } 3061e92d3f3fSGregory Neil Shapiro 306206f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 306306f25ae9SGregory Neil Shapiro return EX_OK; 306406f25ae9SGregory Neil Shapiro } 306506f25ae9SGregory Neil Shapiro 306606f25ae9SGregory Neil Shapiro static void 3067b6bacd31SGregory Neil Shapiro connecttimeout(ignore) 3068b6bacd31SGregory Neil Shapiro int ignore; 306906f25ae9SGregory Neil Shapiro { 30708774250cSGregory Neil Shapiro /* 30718774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 30728774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 30738774250cSGregory Neil Shapiro ** DOING. 30748774250cSGregory Neil Shapiro */ 30758774250cSGregory Neil Shapiro 307606f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 307706f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 307806f25ae9SGregory Neil Shapiro } 307940266059SGregory Neil Shapiro /* 308006f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 308106f25ae9SGregory Neil Shapiro ** 308206f25ae9SGregory Neil Shapiro ** Parameters: 308306f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 308406f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 308506f25ae9SGregory Neil Shapiro ** structure to be filled in. 308606f25ae9SGregory Neil Shapiro ** 308706f25ae9SGregory Neil Shapiro ** Returns: 308806f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 308906f25ae9SGregory Neil Shapiro ** made and if not why not. 309006f25ae9SGregory Neil Shapiro ** 309106f25ae9SGregory Neil Shapiro ** Side Effects: 309206f25ae9SGregory Neil Shapiro ** none. 309306f25ae9SGregory Neil Shapiro */ 309406f25ae9SGregory Neil Shapiro 309506f25ae9SGregory Neil Shapiro #if NETUNIX 309640266059SGregory Neil Shapiro int 309740266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 309806f25ae9SGregory Neil Shapiro char *mux_path; 309906f25ae9SGregory Neil Shapiro register MCI *mci; 310006f25ae9SGregory Neil Shapiro { 310106f25ae9SGregory Neil Shapiro int sock; 310206f25ae9SGregory Neil Shapiro int rval, save_errno; 310306f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 310406f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 310506f25ae9SGregory Neil Shapiro 310606f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 310706f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 310806f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 310906f25ae9SGregory Neil Shapiro 311006f25ae9SGregory Neil Shapiro if (rval != 0) 311106f25ae9SGregory Neil Shapiro { 3112e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket %s", 3113e92d3f3fSGregory Neil Shapiro mux_path); 311406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 311506f25ae9SGregory Neil Shapiro errno = rval; 311606f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 311706f25ae9SGregory Neil Shapiro } 311806f25ae9SGregory Neil Shapiro 311906f25ae9SGregory Neil Shapiro /* prepare address structure */ 3120d0cef73dSGregory Neil Shapiro memset(&unix_addr, '\0', sizeof(unix_addr)); 312106f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 312206f25ae9SGregory Neil Shapiro 3123d0cef73dSGregory Neil Shapiro if (strlen(mux_path) >= sizeof(unix_addr.sun_path)) 312406f25ae9SGregory Neil Shapiro { 3125e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: domain socket name %s too long", 3126e92d3f3fSGregory Neil Shapiro mux_path); 312740266059SGregory Neil Shapiro 312840266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 312906f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 313006f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 313106f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 313206f25ae9SGregory Neil Shapiro } 313340266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 3134d0cef73dSGregory Neil Shapiro sizeof(unix_addr.sun_path)); 313506f25ae9SGregory Neil Shapiro 313606f25ae9SGregory Neil Shapiro /* initialize domain socket */ 313706f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 313806f25ae9SGregory Neil Shapiro if (sock == -1) 313906f25ae9SGregory Neil Shapiro { 314006f25ae9SGregory Neil Shapiro save_errno = errno; 3141e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket %s", 3142e92d3f3fSGregory Neil Shapiro mux_path); 314306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 314406f25ae9SGregory Neil Shapiro errno = save_errno; 314506f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 314606f25ae9SGregory Neil Shapiro } 314706f25ae9SGregory Neil Shapiro 314806f25ae9SGregory Neil Shapiro /* connect to server */ 314906f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 315006f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 315106f25ae9SGregory Neil Shapiro { 315206f25ae9SGregory Neil Shapiro save_errno = errno; 315306f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 315406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 315506f25ae9SGregory Neil Shapiro (void) close(sock); 315606f25ae9SGregory Neil Shapiro errno = save_errno; 315706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 315806f25ae9SGregory Neil Shapiro } 315906f25ae9SGregory Neil Shapiro 316006f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 316106f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 316240266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 3163e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY_B, NULL)) 316440266059SGregory Neil Shapiro == NULL 316540266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 316640266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 3167e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY_B, NULL)) 316840266059SGregory Neil Shapiro == NULL) 316906f25ae9SGregory Neil Shapiro { 317006f25ae9SGregory Neil Shapiro save_errno = errno; 317106f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 317206f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 3173*2fb4f839SGregory Neil Shapiro SM_CLOSE_FP(mci->mci_out); 317406f25ae9SGregory Neil Shapiro (void) close(sock); 317506f25ae9SGregory Neil Shapiro errno = save_errno; 3176c2aa98e2SPeter Wemm return EX_TEMPFAIL; 3177c2aa98e2SPeter Wemm } 317840266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 3179c2aa98e2SPeter Wemm 3180c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 318106f25ae9SGregory Neil Shapiro errno = 0; 318206f25ae9SGregory Neil Shapiro return EX_OK; 3183c2aa98e2SPeter Wemm } 318406f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 318540266059SGregory Neil Shapiro /* 318640266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 31878774250cSGregory Neil Shapiro ** 31888774250cSGregory Neil Shapiro ** Parameters: 318940266059SGregory Neil Shapiro ** none. 31908774250cSGregory Neil Shapiro ** 31918774250cSGregory Neil Shapiro ** Returns: 31928774250cSGregory Neil Shapiro ** none. 31938774250cSGregory Neil Shapiro ** 31948774250cSGregory Neil Shapiro ** Side Effects: 319540266059SGregory Neil Shapiro ** closes control socket, exits. 31968774250cSGregory Neil Shapiro */ 31978774250cSGregory Neil Shapiro 319840266059SGregory Neil Shapiro void 319940266059SGregory Neil Shapiro shutdown_daemon() 32008774250cSGregory Neil Shapiro { 320140266059SGregory Neil Shapiro int i; 320240266059SGregory Neil Shapiro char *reason; 32038774250cSGregory Neil Shapiro 320440266059SGregory Neil Shapiro sm_allsignals(true); 320540266059SGregory Neil Shapiro 320640266059SGregory Neil Shapiro reason = ShutdownRequest; 320740266059SGregory Neil Shapiro ShutdownRequest = NULL; 320840266059SGregory Neil Shapiro PendingSignal = 0; 320940266059SGregory Neil Shapiro 3210e92d3f3fSGregory Neil Shapiro if (LogLevel > 9) 3211e92d3f3fSGregory Neil Shapiro sm_syslog(LOG_INFO, CurEnv->e_id, "stopping daemon, reason=%s", 321240266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 321340266059SGregory Neil Shapiro 321440266059SGregory Neil Shapiro FileName = NULL; 321540266059SGregory Neil Shapiro closecontrolsocket(true); 321640266059SGregory Neil Shapiro #if XLA 321740266059SGregory Neil Shapiro xla_all_end(); 32185b0945b5SGregory Neil Shapiro #endif 321940266059SGregory Neil Shapiro 322040266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 322140266059SGregory Neil Shapiro { 322240266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 322340266059SGregory Neil Shapiro { 322440266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 322540266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 322640266059SGregory Neil Shapiro 322740266059SGregory Neil Shapiro #if NETUNIX 322840266059SGregory Neil Shapiro /* Remove named sockets */ 322940266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 323040266059SGregory Neil Shapiro { 323140266059SGregory Neil Shapiro int rval; 323240266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 323340266059SGregory Neil Shapiro 323440266059SGregory Neil Shapiro /* if not safe, don't use it */ 323540266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 323640266059SGregory Neil Shapiro RunAsUid, RunAsGid, 323740266059SGregory Neil Shapiro RunAsUserName, sff, 323840266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 323940266059SGregory Neil Shapiro if (rval == 0 && 324040266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 324140266059SGregory Neil Shapiro { 324240266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 324340266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 324440266059SGregory Neil Shapiro Daemons[i].d_name, 324540266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 324640266059SGregory Neil Shapiro sm_errstring(errno)); 32478774250cSGregory Neil Shapiro } 324840266059SGregory Neil Shapiro } 324940266059SGregory Neil Shapiro #endif /* NETUNIX */ 325040266059SGregory Neil Shapiro } 325140266059SGregory Neil Shapiro } 325240266059SGregory Neil Shapiro 325340266059SGregory Neil Shapiro finis(false, true, EX_OK); 325440266059SGregory Neil Shapiro } 325540266059SGregory Neil Shapiro /* 32568774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 32578774250cSGregory Neil Shapiro ** 32588774250cSGregory Neil Shapiro ** Parameters: 32598774250cSGregory Neil Shapiro ** none. 32608774250cSGregory Neil Shapiro ** 32618774250cSGregory Neil Shapiro ** Returns: 32628774250cSGregory Neil Shapiro ** none. 32638774250cSGregory Neil Shapiro ** 32648774250cSGregory Neil Shapiro ** Side Effects: 32658774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 32668774250cSGregory Neil Shapiro */ 32678774250cSGregory Neil Shapiro 326813058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 326913058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 327013058a91SGregory Neil Shapiro do \ 327113058a91SGregory Neil Shapiro { \ 327240266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 327313058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 327440266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 327513058a91SGregory Neil Shapiro } while (0) 327613058a91SGregory Neil Shapiro 327740266059SGregory Neil Shapiro void 32788774250cSGregory Neil Shapiro restart_daemon() 32798774250cSGregory Neil Shapiro { 328040266059SGregory Neil Shapiro bool drop; 32818774250cSGregory Neil Shapiro int save_errno; 32828774250cSGregory Neil Shapiro char *reason; 328313058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 32848774250cSGregory Neil Shapiro extern int DtableSize; 32858774250cSGregory Neil Shapiro 328613058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 328740266059SGregory Neil Shapiro sm_clear_events(); 328840266059SGregory Neil Shapiro sm_allsignals(true); 32898774250cSGregory Neil Shapiro 32908774250cSGregory Neil Shapiro reason = RestartRequest; 32918774250cSGregory Neil Shapiro RestartRequest = NULL; 32928774250cSGregory Neil Shapiro PendingSignal = 0; 32938774250cSGregory Neil Shapiro 32948774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 32958774250cSGregory Neil Shapiro { 32968774250cSGregory Neil Shapiro if (LogLevel > 3) 32978774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 32988774250cSGregory Neil Shapiro "could not restart: need full path"); 329940266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 330040266059SGregory Neil Shapiro /* NOTREACHED */ 33018774250cSGregory Neil Shapiro } 33028774250cSGregory Neil Shapiro if (LogLevel > 3) 33038774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 33048774250cSGregory Neil Shapiro SaveArgv[0], 33058774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 33068774250cSGregory Neil Shapiro 330740266059SGregory Neil Shapiro closecontrolsocket(true); 330894c01205SGregory Neil Shapiro #if SM_CONF_SHM 330994c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 33105b0945b5SGregory Neil Shapiro #endif 331140266059SGregory Neil Shapiro 3312e92d3f3fSGregory Neil Shapiro /* close locked pid file */ 3313e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 3314e92d3f3fSGregory Neil Shapiro 331540266059SGregory Neil Shapiro /* 331640266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 331740266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 331840266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 331940266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 332040266059SGregory Neil Shapiro */ 332140266059SGregory Neil Shapiro 332240266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 332340266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 332440266059SGregory Neil Shapiro 332540266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 33268774250cSGregory Neil Shapiro { 33278774250cSGregory Neil Shapiro if (LogLevel > 0) 33288774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 332940266059SGregory Neil Shapiro "could not drop privileges: %s", 333040266059SGregory Neil Shapiro sm_errstring(errno)); 333140266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 333240266059SGregory Neil Shapiro /* NOTREACHED */ 33338774250cSGregory Neil Shapiro } 33348774250cSGregory Neil Shapiro 3335e92d3f3fSGregory Neil Shapiro sm_close_on_exec(STDERR_FILENO + 1, DtableSize); 33368774250cSGregory Neil Shapiro 333713058a91SGregory Neil Shapiro /* 333813058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 333913058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 334013058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 334113058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 334213058a91SGregory Neil Shapiro */ 334313058a91SGregory Neil Shapiro 334413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 334513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 334613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 334713058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 334813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 334913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 335013058a91SGregory Neil Shapiro #ifdef SIGUSR1 335113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 33525b0945b5SGregory Neil Shapiro #endif 3353605302a5SGregory Neil Shapiro 3354605302a5SGregory Neil Shapiro /* Turn back on signals */ 335540266059SGregory Neil Shapiro sm_allsignals(false); 33568774250cSGregory Neil Shapiro 33578774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 33588774250cSGregory Neil Shapiro save_errno = errno; 33598774250cSGregory Neil Shapiro 336013058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 336140266059SGregory Neil Shapiro sm_allsignals(true); 336213058a91SGregory Neil Shapiro 336313058a91SGregory Neil Shapiro /* For finis() events */ 336440266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 336513058a91SGregory Neil Shapiro 336613058a91SGregory Neil Shapiro #ifdef SIGUSR1 336713058a91SGregory Neil Shapiro /* For debugging finis() */ 336840266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 33695b0945b5SGregory Neil Shapiro #endif 33708774250cSGregory Neil Shapiro 33718774250cSGregory Neil Shapiro errno = save_errno; 33728774250cSGregory Neil Shapiro if (LogLevel > 0) 337340266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 337440266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 337540266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 337640266059SGregory Neil Shapiro /* NOTREACHED */ 33778774250cSGregory Neil Shapiro } 337840266059SGregory Neil Shapiro /* 3379c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3380c2aa98e2SPeter Wemm ** 3381c2aa98e2SPeter Wemm ** Parameters: 3382c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3383c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3384c2aa98e2SPeter Wemm ** 3385c2aa98e2SPeter Wemm ** Returns: 3386c2aa98e2SPeter Wemm ** A list of aliases for this host. 3387c2aa98e2SPeter Wemm ** 3388c2aa98e2SPeter Wemm ** Side Effects: 3389c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3390c2aa98e2SPeter Wemm */ 3391c2aa98e2SPeter Wemm 3392c2aa98e2SPeter Wemm struct hostent * 3393c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3394c2aa98e2SPeter Wemm char hostbuf[]; 3395c2aa98e2SPeter Wemm int size; 3396c2aa98e2SPeter Wemm { 3397c2aa98e2SPeter Wemm register struct hostent *hp; 3398c2aa98e2SPeter Wemm 3399602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 340040266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 340106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 340213058a91SGregory Neil Shapiro #if NETINET && NETINET6 340313058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 340413058a91SGregory Neil Shapiro { 340513058a91SGregory Neil Shapiro /* 340613058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 340713058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 340813058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 340913058a91SGregory Neil Shapiro */ 341013058a91SGregory Neil Shapiro 341113058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 341213058a91SGregory Neil Shapiro } 341313058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3414c2aa98e2SPeter Wemm if (hp == NULL) 3415c2aa98e2SPeter Wemm return NULL; 3416c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 341706f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 341806f25ae9SGregory Neil Shapiro 341906f25ae9SGregory Neil Shapiro #if NETINFO 342006f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3421c2aa98e2SPeter Wemm { 342206f25ae9SGregory Neil Shapiro char *domainname; 342306f25ae9SGregory Neil Shapiro 342406f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 342506f25ae9SGregory Neil Shapiro "domain", '\0'); 342606f25ae9SGregory Neil Shapiro if (domainname != NULL && 342706f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 342840266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 342906f25ae9SGregory Neil Shapiro } 343006f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3431c2aa98e2SPeter Wemm 3432c2aa98e2SPeter Wemm /* 3433c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3434c2aa98e2SPeter Wemm ** dotted alias. 3435c2aa98e2SPeter Wemm */ 3436c2aa98e2SPeter Wemm 3437c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3438c2aa98e2SPeter Wemm { 3439c2aa98e2SPeter Wemm char **ha; 3440c2aa98e2SPeter Wemm 344106f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3442c2aa98e2SPeter Wemm { 3443c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3444c2aa98e2SPeter Wemm { 344506f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3446c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3447c2aa98e2SPeter Wemm break; 3448c2aa98e2SPeter Wemm } 3449c2aa98e2SPeter Wemm } 3450c2aa98e2SPeter Wemm } 3451c2aa98e2SPeter Wemm 3452c2aa98e2SPeter Wemm /* 3453c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3454c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3455c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3456c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3457c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3458c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3459c2aa98e2SPeter Wemm */ 3460c2aa98e2SPeter Wemm 3461c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 34625b0945b5SGregory Neil Shapiro getcanonname(hostbuf, size, true, NULL) == HOST_NOTFOUND) 3463c2aa98e2SPeter Wemm { 3464e3793f76SGregory Neil Shapiro sm_syslog(LocalDaemon ? LOG_WARNING : LOG_CRIT, NOQID, 3465c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3466c2aa98e2SPeter Wemm hostbuf); 3467c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3468c2aa98e2SPeter Wemm hostbuf); 346906f25ae9SGregory Neil Shapiro (void) sleep(60); 34705b0945b5SGregory Neil Shapiro if (getcanonname(hostbuf, size, true, NULL) == HOST_NOTFOUND) 3471c2aa98e2SPeter Wemm { 3472e3793f76SGregory Neil Shapiro sm_syslog(LocalDaemon ? LOG_WARNING : LOG_ALERT, NOQID, 3473c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3474c2aa98e2SPeter Wemm hostbuf); 3475c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3476c2aa98e2SPeter Wemm hostbuf); 3477c2aa98e2SPeter Wemm } 3478c2aa98e2SPeter Wemm } 347906f25ae9SGregory Neil Shapiro return hp; 3480c2aa98e2SPeter Wemm } 348140266059SGregory Neil Shapiro /* 3482c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3483c2aa98e2SPeter Wemm ** 3484c2aa98e2SPeter Wemm ** Parameters: 3485c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3486c2aa98e2SPeter Wemm ** ha -- actual first address 3487c2aa98e2SPeter Wemm ** sa -- second address 3488c2aa98e2SPeter Wemm ** 3489c2aa98e2SPeter Wemm ** Returns: 3490c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3491c2aa98e2SPeter Wemm ** else -- they don't match 3492c2aa98e2SPeter Wemm */ 3493c2aa98e2SPeter Wemm 349406f25ae9SGregory Neil Shapiro static int 3495c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3496c2aa98e2SPeter Wemm struct hostent *hp; 3497c2aa98e2SPeter Wemm char *ha; 3498c2aa98e2SPeter Wemm SOCKADDR *sa; 3499c2aa98e2SPeter Wemm { 350006f25ae9SGregory Neil Shapiro #if NETINET6 350140266059SGregory Neil Shapiro unsigned char *a; 35025b0945b5SGregory Neil Shapiro #endif 350306f25ae9SGregory Neil Shapiro 3504c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3505c2aa98e2SPeter Wemm { 350606f25ae9SGregory Neil Shapiro #if NETINET 3507c2aa98e2SPeter Wemm case AF_INET: 3508c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 350906f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3510c2aa98e2SPeter Wemm break; 35115b0945b5SGregory Neil Shapiro #endif 3512c2aa98e2SPeter Wemm 351306f25ae9SGregory Neil Shapiro #if NETINET6 351406f25ae9SGregory Neil Shapiro case AF_INET6: 351540266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 351606f25ae9SGregory Neil Shapiro 351706f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 351806f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 351906f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 352006f25ae9SGregory Neil Shapiro 352106f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 352206f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 352306f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 352406f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 352506f25ae9SGregory Neil Shapiro break; 352606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3527c2aa98e2SPeter Wemm } 3528c2aa98e2SPeter Wemm return -1; 3529c2aa98e2SPeter Wemm } 353040266059SGregory Neil Shapiro /* 353106f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3532c2aa98e2SPeter Wemm ** 3533c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3534c2aa98e2SPeter Wemm ** 3535c2aa98e2SPeter Wemm ** Parameters: 3536c2aa98e2SPeter Wemm ** fd -- the descriptor 353740266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3538c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 353940266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3540c2aa98e2SPeter Wemm ** 3541c2aa98e2SPeter Wemm ** Returns: 3542c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3543c2aa98e2SPeter Wemm */ 3544c2aa98e2SPeter Wemm 3545c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3546c2aa98e2SPeter Wemm 3547c2aa98e2SPeter Wemm static void 3548b6bacd31SGregory Neil Shapiro authtimeout(ignore) 3549b6bacd31SGregory Neil Shapiro int ignore; 3550c2aa98e2SPeter Wemm { 35518774250cSGregory Neil Shapiro /* 35528774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 35538774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 35548774250cSGregory Neil Shapiro ** DOING. 35558774250cSGregory Neil Shapiro */ 35568774250cSGregory Neil Shapiro 35578774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3558c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3559c2aa98e2SPeter Wemm } 3560c2aa98e2SPeter Wemm 3561c2aa98e2SPeter Wemm char * 3562c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3563c2aa98e2SPeter Wemm int fd; 3564c2aa98e2SPeter Wemm bool *may_be_forged; 3565c2aa98e2SPeter Wemm { 356640266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3567c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3568c2aa98e2SPeter Wemm register char *volatile p = NULL; 3569c2aa98e2SPeter Wemm SOCKADDR la; 3570c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 357140266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3572c2aa98e2SPeter Wemm register struct servent *sp; 357340266059SGregory Neil Shapiro # if NETINET 357440266059SGregory Neil Shapiro static unsigned short port4 = 0; 35755b0945b5SGregory Neil Shapiro # endif 357640266059SGregory Neil Shapiro # if NETINET6 357740266059SGregory Neil Shapiro static unsigned short port6 = 0; 35785b0945b5SGregory Neil Shapiro # endif 357940266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3580c2aa98e2SPeter Wemm volatile int s; 3581c2aa98e2SPeter Wemm int i = 0; 358240266059SGregory Neil Shapiro size_t len; 358340266059SGregory Neil Shapiro SM_EVENT *ev; 3584c2aa98e2SPeter Wemm int nleft; 3585c2aa98e2SPeter Wemm struct hostent *hp; 3586c2aa98e2SPeter Wemm char *ostype = NULL; 3587c2aa98e2SPeter Wemm char **ha; 3588*2fb4f839SGregory Neil Shapiro char ibuf[MAXNAME + 1]; /* EAI:ok? it's a hostname from OS */ 3589*2fb4f839SGregory Neil Shapiro static char hbuf[MAXNAME + MAXAUTHINFO + 11]; /* EAI:ok? (as above)*/ 3590c2aa98e2SPeter Wemm 3591da7d7b9cSGregory Neil Shapiro *may_be_forged = true; 3592d0cef73dSGregory Neil Shapiro falen = sizeof(RealHostAddr); 3593c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3594c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3595c2aa98e2SPeter Wemm { 359606f25ae9SGregory Neil Shapiro if (i < 0) 359706f25ae9SGregory Neil Shapiro { 359806f25ae9SGregory Neil Shapiro /* 359906f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 360006f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 360106f25ae9SGregory Neil Shapiro ** happen later. 360206f25ae9SGregory Neil Shapiro */ 360340266059SGregory Neil Shapiro 360406f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3605c2aa98e2SPeter Wemm return NULL; 360606f25ae9SGregory Neil Shapiro errno = 0; 360706f25ae9SGregory Neil Shapiro } 3608da7d7b9cSGregory Neil Shapiro 3609da7d7b9cSGregory Neil Shapiro *may_be_forged = false; 3610d0cef73dSGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof(hbuf), 2, RealUserName, 361140266059SGregory Neil Shapiro "@localhost"); 3612c2aa98e2SPeter Wemm if (tTd(9, 1)) 361340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3614c2aa98e2SPeter Wemm return hbuf; 3615c2aa98e2SPeter Wemm } 3616c2aa98e2SPeter Wemm 3617c2aa98e2SPeter Wemm if (RealHostName == NULL) 3618c2aa98e2SPeter Wemm { 3619c2aa98e2SPeter Wemm /* translate that to a host name */ 3620c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3621c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 362240266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3623c2aa98e2SPeter Wemm } 3624c2aa98e2SPeter Wemm 3625c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 3626da7d7b9cSGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] == '[' || 3627da7d7b9cSGregory Neil Shapiro RealHostName[0] == '[') 3628da7d7b9cSGregory Neil Shapiro *may_be_forged = false; 3629da7d7b9cSGregory Neil Shapiro else 3630c2aa98e2SPeter Wemm { 363113058a91SGregory Neil Shapiro int family; 3632c2aa98e2SPeter Wemm 363313058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 363413058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 363513058a91SGregory Neil Shapiro /* 363613058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 363713058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 363813058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 363913058a91SGregory Neil Shapiro ** RealHostAddr. 364013058a91SGregory Neil Shapiro ** 364113058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 364213058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 364313058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 364413058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 364513058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 364613058a91SGregory Neil Shapiro */ 364713058a91SGregory Neil Shapiro 364813058a91SGregory Neil Shapiro if (family == AF_INET6 && 364913058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 365013058a91SGregory Neil Shapiro family = AF_INET; 365113058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 365213058a91SGregory Neil Shapiro 365313058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 365413058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3655da7d7b9cSGregory Neil Shapiro if (hp != NULL) 3656c2aa98e2SPeter Wemm { 3657c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 365840266059SGregory Neil Shapiro { 3659c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3660da7d7b9cSGregory Neil Shapiro { 3661da7d7b9cSGregory Neil Shapiro *may_be_forged = false; 3662c2aa98e2SPeter Wemm break; 366340266059SGregory Neil Shapiro } 3664da7d7b9cSGregory Neil Shapiro } 36655b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 3666c2aa98e2SPeter Wemm } 3667c2aa98e2SPeter Wemm } 3668c2aa98e2SPeter Wemm 3669c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3670c2aa98e2SPeter Wemm goto noident; 3671c2aa98e2SPeter Wemm 3672d0cef73dSGregory Neil Shapiro lalen = sizeof(la); 367306f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 367406f25ae9SGregory Neil Shapiro { 367506f25ae9SGregory Neil Shapiro #if NETINET 367606f25ae9SGregory Neil Shapiro case AF_INET: 367706f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 367806f25ae9SGregory Neil Shapiro lalen <= 0 || 3679c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3680c2aa98e2SPeter Wemm { 3681c2aa98e2SPeter Wemm /* no ident info */ 3682c2aa98e2SPeter Wemm goto noident; 3683c2aa98e2SPeter Wemm } 368406f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3685c2aa98e2SPeter Wemm 3686c2aa98e2SPeter Wemm /* create ident query */ 3687d0cef73dSGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof(ibuf), "%d,%d\r\n", 368806f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 368906f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3690c2aa98e2SPeter Wemm 3691c2aa98e2SPeter Wemm /* create local address */ 3692c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3693c2aa98e2SPeter Wemm 3694c2aa98e2SPeter Wemm /* create foreign address */ 369506f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 369606f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 369706f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 369840266059SGregory Neil Shapiro 369940266059SGregory Neil Shapiro /* 370040266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 370140266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 370240266059SGregory Neil Shapiro ** spent in this routine). 370340266059SGregory Neil Shapiro ** Hence we store the port in a static variable 370440266059SGregory Neil Shapiro ** to save this time. 370540266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 370640266059SGregory Neil Shapiro ** This code makes the assumption that the port number 370740266059SGregory Neil Shapiro ** is not 0. 370840266059SGregory Neil Shapiro */ 370940266059SGregory Neil Shapiro 371040266059SGregory Neil Shapiro if (port4 == 0) 371140266059SGregory Neil Shapiro { 3712c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3713c2aa98e2SPeter Wemm if (sp != NULL) 371440266059SGregory Neil Shapiro port4 = sp->s_port; 3715c2aa98e2SPeter Wemm else 371640266059SGregory Neil Shapiro port4 = htons(113); 371740266059SGregory Neil Shapiro } 371840266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 371906f25ae9SGregory Neil Shapiro break; 372006f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 372106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 372206f25ae9SGregory Neil Shapiro 372306f25ae9SGregory Neil Shapiro #if NETINET6 372406f25ae9SGregory Neil Shapiro case AF_INET6: 372506f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 372606f25ae9SGregory Neil Shapiro lalen <= 0 || 372706f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 372806f25ae9SGregory Neil Shapiro { 372906f25ae9SGregory Neil Shapiro /* no ident info */ 373006f25ae9SGregory Neil Shapiro goto noident; 373106f25ae9SGregory Neil Shapiro } 373206f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 373306f25ae9SGregory Neil Shapiro 373406f25ae9SGregory Neil Shapiro /* create ident query */ 3735d0cef73dSGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof(ibuf), "%d,%d\r\n", 373606f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 373706f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 373806f25ae9SGregory Neil Shapiro 373906f25ae9SGregory Neil Shapiro /* create local address */ 374006f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 374106f25ae9SGregory Neil Shapiro 374206f25ae9SGregory Neil Shapiro /* create foreign address */ 374306f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 374406f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 374506f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 374640266059SGregory Neil Shapiro if (port6 == 0) 374740266059SGregory Neil Shapiro { 374806f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 374906f25ae9SGregory Neil Shapiro if (sp != NULL) 375040266059SGregory Neil Shapiro port6 = sp->s_port; 375106f25ae9SGregory Neil Shapiro else 375240266059SGregory Neil Shapiro port6 = htons(113); 375340266059SGregory Neil Shapiro } 375440266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 375506f25ae9SGregory Neil Shapiro break; 375606f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 375706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 375806f25ae9SGregory Neil Shapiro default: 375906f25ae9SGregory Neil Shapiro /* no ident info */ 376006f25ae9SGregory Neil Shapiro goto noident; 376106f25ae9SGregory Neil Shapiro } 3762c2aa98e2SPeter Wemm 3763c2aa98e2SPeter Wemm s = -1; 3764c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3765c2aa98e2SPeter Wemm { 3766c2aa98e2SPeter Wemm if (s >= 0) 3767c2aa98e2SPeter Wemm (void) close(s); 3768c2aa98e2SPeter Wemm goto noident; 3769c2aa98e2SPeter Wemm } 3770c2aa98e2SPeter Wemm 3771c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 377240266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3773c2aa98e2SPeter Wemm 3774c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 377506f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3776c2aa98e2SPeter Wemm if (s < 0) 3777c2aa98e2SPeter Wemm { 377840266059SGregory Neil Shapiro sm_clrevent(ev); 3779c2aa98e2SPeter Wemm goto noident; 3780c2aa98e2SPeter Wemm } 378106f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 378206f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3783c2aa98e2SPeter Wemm goto closeident; 3784c2aa98e2SPeter Wemm 3785c2aa98e2SPeter Wemm if (tTd(9, 10)) 378640266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3787c2aa98e2SPeter Wemm 3788c2aa98e2SPeter Wemm /* send query */ 3789c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3790c2aa98e2SPeter Wemm goto closeident; 3791c2aa98e2SPeter Wemm 3792c2aa98e2SPeter Wemm /* get result */ 3793c2aa98e2SPeter Wemm p = &ibuf[0]; 3794d0cef73dSGregory Neil Shapiro nleft = sizeof(ibuf) - 1; 3795c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3796c2aa98e2SPeter Wemm { 3797323f6dcbSGregory Neil Shapiro char *s; 3798323f6dcbSGregory Neil Shapiro 3799c2aa98e2SPeter Wemm p += i; 3800c2aa98e2SPeter Wemm nleft -= i; 3801c2aa98e2SPeter Wemm *p = '\0'; 3802323f6dcbSGregory Neil Shapiro if ((s = strchr(ibuf, '\n')) != NULL) 3803323f6dcbSGregory Neil Shapiro { 3804323f6dcbSGregory Neil Shapiro if (p > s + 1) 3805323f6dcbSGregory Neil Shapiro { 3806323f6dcbSGregory Neil Shapiro p = s + 1; 3807323f6dcbSGregory Neil Shapiro *p = '\0'; 3808323f6dcbSGregory Neil Shapiro } 3809323f6dcbSGregory Neil Shapiro break; 3810323f6dcbSGregory Neil Shapiro } 3811323f6dcbSGregory Neil Shapiro if (nleft <= 0) 3812c2aa98e2SPeter Wemm break; 3813c2aa98e2SPeter Wemm } 3814c2aa98e2SPeter Wemm (void) close(s); 381540266059SGregory Neil Shapiro sm_clrevent(ev); 3816c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3817c2aa98e2SPeter Wemm goto noident; 3818c2aa98e2SPeter Wemm 3819d9986b26SGregory Neil Shapiro if (p >= &ibuf[2] && *--p == '\n' && *--p == '\r') 3820c2aa98e2SPeter Wemm p--; 3821c2aa98e2SPeter Wemm *++p = '\0'; 3822c2aa98e2SPeter Wemm 3823c2aa98e2SPeter Wemm if (tTd(9, 3)) 382440266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3825c2aa98e2SPeter Wemm 3826c2aa98e2SPeter Wemm /* parse result */ 3827c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3828c2aa98e2SPeter Wemm if (p == NULL) 3829c2aa98e2SPeter Wemm { 3830c2aa98e2SPeter Wemm /* malformed response */ 3831c2aa98e2SPeter Wemm goto noident; 3832c2aa98e2SPeter Wemm } 3833c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3834c2aa98e2SPeter Wemm continue; 383540266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3836c2aa98e2SPeter Wemm { 3837c2aa98e2SPeter Wemm /* presumably an error string */ 3838c2aa98e2SPeter Wemm goto noident; 3839c2aa98e2SPeter Wemm } 3840c2aa98e2SPeter Wemm p += 6; 38415b0945b5SGregory Neil Shapiro while (SM_ISSPACE(*p)) 3842c2aa98e2SPeter Wemm p++; 3843c2aa98e2SPeter Wemm if (*p++ != ':') 3844c2aa98e2SPeter Wemm { 3845c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3846c2aa98e2SPeter Wemm goto noident; 3847c2aa98e2SPeter Wemm } 3848c2aa98e2SPeter Wemm 3849c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 38505b0945b5SGregory Neil Shapiro while (SM_ISSPACE(*p)) 3851c2aa98e2SPeter Wemm p++; 3852c2aa98e2SPeter Wemm ostype = p; 3853c2aa98e2SPeter Wemm p = strchr(p, ':'); 3854c2aa98e2SPeter Wemm if (p == NULL) 3855c2aa98e2SPeter Wemm { 3856c2aa98e2SPeter Wemm /* malformed response */ 3857c2aa98e2SPeter Wemm goto noident; 3858c2aa98e2SPeter Wemm } 3859c2aa98e2SPeter Wemm else 3860c2aa98e2SPeter Wemm { 3861c2aa98e2SPeter Wemm char *charset; 3862c2aa98e2SPeter Wemm 3863c2aa98e2SPeter Wemm *p = '\0'; 3864c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3865c2aa98e2SPeter Wemm if (charset != NULL) 3866c2aa98e2SPeter Wemm *charset = '\0'; 3867c2aa98e2SPeter Wemm } 3868c2aa98e2SPeter Wemm 3869c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3870c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3871c2aa98e2SPeter Wemm continue; 3872c2aa98e2SPeter Wemm 3873c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 387440266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3875c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3876c2aa98e2SPeter Wemm { 3877d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof(hbuf)); 387813bd1963SGregory Neil Shapiro cleanstrcpy(&hbuf[6], p, MAXAUTHINFO); 3879c2aa98e2SPeter Wemm } 3880c2aa98e2SPeter Wemm else 388113bd1963SGregory Neil Shapiro cleanstrcpy(hbuf, p, MAXAUTHINFO); 388240266059SGregory Neil Shapiro len = strlen(hbuf); 3883d0cef73dSGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof(hbuf) - len, 2, "@", 3884c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3885c2aa98e2SPeter Wemm goto postident; 3886c2aa98e2SPeter Wemm 3887c2aa98e2SPeter Wemm closeident: 3888c2aa98e2SPeter Wemm (void) close(s); 388940266059SGregory Neil Shapiro sm_clrevent(ev); 3890c2aa98e2SPeter Wemm 3891c2aa98e2SPeter Wemm noident: 389206f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 389306f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 389406f25ae9SGregory Neil Shapiro { 389506f25ae9SGregory Neil Shapiro #if NETINET 389606f25ae9SGregory Neil Shapiro case AF_INET: 389706f25ae9SGregory Neil Shapiro if (port > 0) 389806f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 389906f25ae9SGregory Neil Shapiro break; 390006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 390106f25ae9SGregory Neil Shapiro 390206f25ae9SGregory Neil Shapiro #if NETINET6 390306f25ae9SGregory Neil Shapiro case AF_INET6: 390406f25ae9SGregory Neil Shapiro if (port > 0) 390506f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 390606f25ae9SGregory Neil Shapiro break; 390706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 390806f25ae9SGregory Neil Shapiro } 390906f25ae9SGregory Neil Shapiro 3910c2aa98e2SPeter Wemm if (RealHostName == NULL) 3911c2aa98e2SPeter Wemm { 3912c2aa98e2SPeter Wemm if (tTd(9, 1)) 391340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3914c2aa98e2SPeter Wemm return NULL; 3915c2aa98e2SPeter Wemm } 3916d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof(hbuf)); 3917c2aa98e2SPeter Wemm 3918c2aa98e2SPeter Wemm postident: 3919c2aa98e2SPeter Wemm #if IP_SRCROUTE 3920c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3921c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 39225b0945b5SGregory Neil Shapiro # endif 3923c2aa98e2SPeter Wemm /* 3924c2aa98e2SPeter Wemm ** Extract IP source routing information. 3925c2aa98e2SPeter Wemm ** 3926c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3927c2aa98e2SPeter Wemm ** through c to d: 3928c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3929c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3930c2aa98e2SPeter Wemm ** 3931c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3932c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3933c2aa98e2SPeter Wemm ** p - pointer to hbuf 3934c2aa98e2SPeter Wemm */ 3935c2aa98e2SPeter Wemm 3936c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3937c2aa98e2SPeter Wemm { 3938c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3939c2aa98e2SPeter Wemm int j; 394040266059SGregory Neil Shapiro unsigned char *q; 394140266059SGregory Neil Shapiro unsigned char *o; 3942c2aa98e2SPeter Wemm int l; 394306f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3944c2aa98e2SPeter Wemm 3945d0cef73dSGregory Neil Shapiro ipoptlen = sizeof(ipopt); 3946c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3947c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3948c2aa98e2SPeter Wemm goto noipsr; 3949c2aa98e2SPeter Wemm if (ipoptlen == 0) 3950c2aa98e2SPeter Wemm goto noipsr; 395140266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 395240266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3953c2aa98e2SPeter Wemm { 3954c2aa98e2SPeter Wemm switch (*o) 3955c2aa98e2SPeter Wemm { 3956c2aa98e2SPeter Wemm case IPOPT_EOL: 3957c2aa98e2SPeter Wemm o = NULL; 3958c2aa98e2SPeter Wemm break; 3959c2aa98e2SPeter Wemm 3960c2aa98e2SPeter Wemm case IPOPT_NOP: 3961c2aa98e2SPeter Wemm o++; 3962c2aa98e2SPeter Wemm break; 3963c2aa98e2SPeter Wemm 3964c2aa98e2SPeter Wemm case IPOPT_SSRR: 3965c2aa98e2SPeter Wemm case IPOPT_LSRR: 3966c2aa98e2SPeter Wemm /* 3967c2aa98e2SPeter Wemm ** Source routing. 3968c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3969c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3970c2aa98e2SPeter Wemm ** including option type and 3971c2aa98e2SPeter Wemm ** length. 3972c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3973c2aa98e2SPeter Wemm ** data. 3974c2aa98e2SPeter Wemm ** o[3] begins the route data. 3975c2aa98e2SPeter Wemm */ 3976c2aa98e2SPeter Wemm 3977c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3978d0cef73dSGregory Neil Shapiro l = sizeof(hbuf) - (hbuf - p) - 6; 397940266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 398040266059SGregory Neil Shapiro " [%s@%.*s", 3981c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3982c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 398306f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3984c2aa98e2SPeter Wemm i = strlen(p); 3985c2aa98e2SPeter Wemm p += i; 3986c2aa98e2SPeter Wemm l -= strlen(p); 3987c2aa98e2SPeter Wemm 3988c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3989c2aa98e2SPeter Wemm 3990c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3991c2aa98e2SPeter Wemm q = &o[3]; 3992c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3993c2aa98e2SPeter Wemm { 399406f25ae9SGregory Neil Shapiro struct in_addr addr; 399506f25ae9SGregory Neil Shapiro 3996c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 399740266059SGregory Neil Shapiro (void) sm_snprintf(p, 399840266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3999c2aa98e2SPeter Wemm "%c%.*s", 4000c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 4001c2aa98e2SPeter Wemm l > 240 ? 120 : 4002c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 4003c2aa98e2SPeter Wemm inet_ntoa(addr)); 4004c2aa98e2SPeter Wemm i = strlen(p); 4005c2aa98e2SPeter Wemm p += i; 4006c2aa98e2SPeter Wemm l -= i + 1; 4007c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 4008c2aa98e2SPeter Wemm } 4009c2aa98e2SPeter Wemm o += o[1]; 4010c2aa98e2SPeter Wemm break; 4011c2aa98e2SPeter Wemm 4012c2aa98e2SPeter Wemm default: 4013c2aa98e2SPeter Wemm /* Skip over option */ 4014c2aa98e2SPeter Wemm o += o[1]; 4015c2aa98e2SPeter Wemm break; 4016c2aa98e2SPeter Wemm } 4017c2aa98e2SPeter Wemm } 401840266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 4019c2aa98e2SPeter Wemm goto postipsr; 4020c2aa98e2SPeter Wemm } 4021c2aa98e2SPeter Wemm 4022c2aa98e2SPeter Wemm noipsr: 402306f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 4024c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 4025c2aa98e2SPeter Wemm { 4026c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 402740266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 4028c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 4029c2aa98e2SPeter Wemm } 4030c2aa98e2SPeter Wemm if (*may_be_forged) 4031c2aa98e2SPeter Wemm { 4032c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 403340266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 403440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 403540266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 4036c2aa98e2SPeter Wemm } 4037c2aa98e2SPeter Wemm 4038c2aa98e2SPeter Wemm #if IP_SRCROUTE 4039c2aa98e2SPeter Wemm postipsr: 404006f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 404106f25ae9SGregory Neil Shapiro 404206f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 404306f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 404406f25ae9SGregory Neil Shapiro { 404506f25ae9SGregory Neil Shapiro #if NETINET 404606f25ae9SGregory Neil Shapiro case AF_INET: 404706f25ae9SGregory Neil Shapiro if (port > 0) 404806f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 404906f25ae9SGregory Neil Shapiro break; 405006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 405106f25ae9SGregory Neil Shapiro 405206f25ae9SGregory Neil Shapiro #if NETINET6 405306f25ae9SGregory Neil Shapiro case AF_INET6: 405406f25ae9SGregory Neil Shapiro if (port > 0) 405506f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 405606f25ae9SGregory Neil Shapiro break; 405706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 405806f25ae9SGregory Neil Shapiro } 405906f25ae9SGregory Neil Shapiro 406040266059SGregory Neil Shapiro if (tTd(9, 1)) 406140266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 4062c2aa98e2SPeter Wemm return hbuf; 4063c2aa98e2SPeter Wemm } 406440266059SGregory Neil Shapiro /* 4065c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 4066c2aa98e2SPeter Wemm ** 4067c2aa98e2SPeter Wemm ** Parameters: 4068c2aa98e2SPeter Wemm ** map -- a pointer to this map. 4069c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 4070c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 4071c2aa98e2SPeter Wemm ** functions. 4072c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 4073c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 4074c2aa98e2SPeter Wemm ** 4075c2aa98e2SPeter Wemm ** Returns: 4076c2aa98e2SPeter Wemm ** The mapping, if found. 4077c2aa98e2SPeter Wemm ** NULL if no mapping found. 4078c2aa98e2SPeter Wemm ** 4079c2aa98e2SPeter Wemm ** Side Effects: 4080c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 4081c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 4082c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 4083c2aa98e2SPeter Wemm ** status only to be returned). 4084c2aa98e2SPeter Wemm */ 4085c2aa98e2SPeter Wemm 4086c2aa98e2SPeter Wemm char * 4087c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 4088c2aa98e2SPeter Wemm MAP *map; 4089c2aa98e2SPeter Wemm char *name; 4090c2aa98e2SPeter Wemm char **av; 4091c2aa98e2SPeter Wemm int *statp; 4092c2aa98e2SPeter Wemm { 4093c2aa98e2SPeter Wemm register struct hostent *hp; 409406f25ae9SGregory Neil Shapiro #if NETINET 4095c2aa98e2SPeter Wemm struct in_addr in_addr; 40965b0945b5SGregory Neil Shapiro #endif 409706f25ae9SGregory Neil Shapiro #if NETINET6 409806f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 40995b0945b5SGregory Neil Shapiro #endif 410006f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 4101c2aa98e2SPeter Wemm register STAB *s; 410240266059SGregory Neil Shapiro time_t now; 410340266059SGregory Neil Shapiro #if NAMED_BIND 410440266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 410540266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 41065b0945b5SGregory Neil Shapiro #endif 4107*2fb4f839SGregory Neil Shapiro char hbuf[MAXNAME + 1]; /* is (host)name in 'x' format? */ 4108c2aa98e2SPeter Wemm 4109c2aa98e2SPeter Wemm /* 4110c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 411140266059SGregory Neil Shapiro ** return it (unless expired). 4112c2aa98e2SPeter Wemm */ 4113c2aa98e2SPeter Wemm 411440266059SGregory Neil Shapiro now = curtime(); 4115c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 411640266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 411740266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 4118c2aa98e2SPeter Wemm { 4119c2aa98e2SPeter Wemm if (tTd(9, 1)) 412040266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 4121c2aa98e2SPeter Wemm name, 4122c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 4123c2aa98e2SPeter Wemm ? "NULL" 4124c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 4125c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 4126602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 4127c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 4128c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 4129c2aa98e2SPeter Wemm { 4130c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 4131c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 4132c2aa98e2SPeter Wemm shortenstring(name, 33)); 4133c2aa98e2SPeter Wemm } 4134c2aa98e2SPeter Wemm if (*statp != EX_OK) 4135c2aa98e2SPeter Wemm return NULL; 4136c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 4137c2aa98e2SPeter Wemm { 4138c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno=%d, h_errno=%d", 4139c2aa98e2SPeter Wemm name, 4140c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 4141c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 4142c2aa98e2SPeter Wemm return NULL; 4143c2aa98e2SPeter Wemm } 41445b0945b5SGregory Neil Shapiro if (bitset(NCF_SECURE, s->s_namecanon.nc_flags)) 41455b0945b5SGregory Neil Shapiro map->map_mflags |= MF_SECURE; 41465b0945b5SGregory Neil Shapiro else 41475b0945b5SGregory Neil Shapiro map->map_mflags &= ~MF_SECURE; 4148c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 4149c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 4150c2aa98e2SPeter Wemm else 4151c2aa98e2SPeter Wemm cp = map_rewrite(map, 4152c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 4153c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 4154c2aa98e2SPeter Wemm av); 4155c2aa98e2SPeter Wemm return cp; 4156c2aa98e2SPeter Wemm } 4157c2aa98e2SPeter Wemm 4158c2aa98e2SPeter Wemm /* 4159c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 4160c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 4161c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 4162c2aa98e2SPeter Wemm */ 4163c2aa98e2SPeter Wemm 416406f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 416506f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 4166c2aa98e2SPeter Wemm { 4167c2aa98e2SPeter Wemm if (tTd(9, 1)) 416840266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 4169c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 4170c2aa98e2SPeter Wemm return NULL; 4171c2aa98e2SPeter Wemm } 4172c2aa98e2SPeter Wemm 4173c2aa98e2SPeter Wemm /* 4174c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 4175c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 4176c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 4177c2aa98e2SPeter Wemm ** unknown. 4178c2aa98e2SPeter Wemm */ 4179c2aa98e2SPeter Wemm 418006f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 418140266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 418240266059SGregory Neil Shapiro #if NAMED_BIND 418340266059SGregory Neil Shapiro if (map->map_timeout > 0) 418440266059SGregory Neil Shapiro { 418540266059SGregory Neil Shapiro retrans = _res.retrans; 418640266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 418740266059SGregory Neil Shapiro } 418840266059SGregory Neil Shapiro if (map->map_retry > 0) 418940266059SGregory Neil Shapiro { 419040266059SGregory Neil Shapiro retry = _res.retry; 419140266059SGregory Neil Shapiro _res.retry = map->map_retry; 419240266059SGregory Neil Shapiro } 419340266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 419440266059SGregory Neil Shapiro 419540266059SGregory Neil Shapiro /* set default TTL */ 419640266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 4197c2aa98e2SPeter Wemm if (*name != '[') 4198c2aa98e2SPeter Wemm { 41995b0945b5SGregory Neil Shapiro int ttl, r; 4200*2fb4f839SGregory Neil Shapiro #if USE_EAI 4201*2fb4f839SGregory Neil Shapiro bool utf8; 420240266059SGregory Neil Shapiro 4203*2fb4f839SGregory Neil Shapiro utf8 = !addr_is_ascii(name); 4204*2fb4f839SGregory Neil Shapiro if (utf8) 4205*2fb4f839SGregory Neil Shapiro { 4206*2fb4f839SGregory Neil Shapiro (void) sm_strlcpy(hbuf, hn2alabel(name), sizeof(hbuf)); 4207*2fb4f839SGregory Neil Shapiro 4208*2fb4f839SGregory Neil Shapiro /* if this is not a FQHN then do not restore it */ 4209*2fb4f839SGregory Neil Shapiro utf8 = strchr(hbuf, '.') != NULL; 4210*2fb4f839SGregory Neil Shapiro } 4211*2fb4f839SGregory Neil Shapiro else 4212*2fb4f839SGregory Neil Shapiro #endif /* USE_EAI */ 4213*2fb4f839SGregory Neil Shapiro /* "else" in #if code above */ 4214*2fb4f839SGregory Neil Shapiro { 4215d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof(hbuf)); 4216*2fb4f839SGregory Neil Shapiro } 42175b0945b5SGregory Neil Shapiro 42185b0945b5SGregory Neil Shapiro r = getcanonname(hbuf, sizeof(hbuf) - 1, !HasWildcardMX, &ttl); 42195b0945b5SGregory Neil Shapiro if (r != HOST_NOTFOUND) 422040266059SGregory Neil Shapiro { 4221*2fb4f839SGregory Neil Shapiro #if USE_EAI 4222*2fb4f839SGregory Neil Shapiro /* 4223*2fb4f839SGregory Neil Shapiro ** Restore original. XXX Check if modified? 4224*2fb4f839SGregory Neil Shapiro ** If so, convert it via hn2ulabel() 4225*2fb4f839SGregory Neil Shapiro ** (not available yet)? 4226*2fb4f839SGregory Neil Shapiro */ 4227*2fb4f839SGregory Neil Shapiro 4228*2fb4f839SGregory Neil Shapiro if (utf8) 4229*2fb4f839SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof(hbuf)); 4230*2fb4f839SGregory Neil Shapiro #endif 423106f25ae9SGregory Neil Shapiro ans = hbuf; 423240266059SGregory Neil Shapiro if (ttl > 0) 423340266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 423440266059SGregory Neil Shapiro SM_DEFAULT_TTL); 42355b0945b5SGregory Neil Shapiro 42365b0945b5SGregory Neil Shapiro if (HOST_SECURE == r) 42375b0945b5SGregory Neil Shapiro { 42385b0945b5SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_SECURE; 42395b0945b5SGregory Neil Shapiro map->map_mflags |= MF_SECURE; 42405b0945b5SGregory Neil Shapiro } 42415b0945b5SGregory Neil Shapiro else 42425b0945b5SGregory Neil Shapiro { 42435b0945b5SGregory Neil Shapiro s->s_namecanon.nc_flags &= ~NCF_SECURE; 42445b0945b5SGregory Neil Shapiro map->map_mflags &= ~MF_SECURE; 42455b0945b5SGregory Neil Shapiro } 424640266059SGregory Neil Shapiro } 4247c2aa98e2SPeter Wemm } 4248c2aa98e2SPeter Wemm else 4249c2aa98e2SPeter Wemm { 425006f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 4251193538b7SGregory Neil Shapiro { 4252193538b7SGregory Neil Shapiro if (tTd(9, 1)) 425340266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 425406f25ae9SGregory Neil Shapiro return NULL; 4255193538b7SGregory Neil Shapiro } 425606f25ae9SGregory Neil Shapiro *cp = '\0'; 425706f25ae9SGregory Neil Shapiro 425806f25ae9SGregory Neil Shapiro hp = NULL; 42595b0945b5SGregory Neil Shapiro 42605b0945b5SGregory Neil Shapiro /* should this be considered secure? */ 42615b0945b5SGregory Neil Shapiro map->map_mflags &= ~MF_SECURE; 426206f25ae9SGregory Neil Shapiro #if NETINET 426306f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 426406f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 426506f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 426606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 426706f25ae9SGregory Neil Shapiro #if NETINET6 426806f25ae9SGregory Neil Shapiro if (hp == NULL && 426940266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 427006f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 427106f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 427206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 427306f25ae9SGregory Neil Shapiro *cp = ']'; 427406f25ae9SGregory Neil Shapiro 427506f25ae9SGregory Neil Shapiro if (hp != NULL) 427606f25ae9SGregory Neil Shapiro { 427706f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 427840266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 427940266059SGregory Neil Shapiro #if NETINET6 428040266059SGregory Neil Shapiro if (ans == hp->h_name) 428140266059SGregory Neil Shapiro { 4282*2fb4f839SGregory Neil Shapiro static char n[MAXNAME + 1]; /* EAI:ok */ 428340266059SGregory Neil Shapiro 428440266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 4285d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof(n)); 428640266059SGregory Neil Shapiro ans = n; 428740266059SGregory Neil Shapiro } 42885b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 428940266059SGregory Neil Shapiro #endif /* NETINET6 */ 429006f25ae9SGregory Neil Shapiro } 429106f25ae9SGregory Neil Shapiro } 429240266059SGregory Neil Shapiro #if NAMED_BIND 429340266059SGregory Neil Shapiro if (map->map_timeout > 0) 429440266059SGregory Neil Shapiro _res.retrans = retrans; 429540266059SGregory Neil Shapiro if (map->map_retry > 0) 429640266059SGregory Neil Shapiro _res.retry = retry; 429740266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 429806f25ae9SGregory Neil Shapiro 429906f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 430006f25ae9SGregory Neil Shapiro 430106f25ae9SGregory Neil Shapiro /* Found an answer */ 430206f25ae9SGregory Neil Shapiro if (ans != NULL) 430306f25ae9SGregory Neil Shapiro { 430406f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 430540266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 430640266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 430740266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 430806f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 430906f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 431006f25ae9SGregory Neil Shapiro else 431106f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 4312193538b7SGregory Neil Shapiro if (tTd(9, 1)) 431340266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 431406f25ae9SGregory Neil Shapiro return cp; 431506f25ae9SGregory Neil Shapiro } 431606f25ae9SGregory Neil Shapiro 431706f25ae9SGregory Neil Shapiro 431806f25ae9SGregory Neil Shapiro /* No match found */ 4319c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 4320c2aa98e2SPeter Wemm #if NAMED_BIND 4321c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 4322c2aa98e2SPeter Wemm if (tTd(9, 1)) 432340266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 4324c2aa98e2SPeter Wemm switch (h_errno) 4325c2aa98e2SPeter Wemm { 4326c2aa98e2SPeter Wemm case TRY_AGAIN: 4327c2aa98e2SPeter Wemm if (UseNameServer) 4328c2aa98e2SPeter Wemm { 4329c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 4330c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 4331c2aa98e2SPeter Wemm shortenstring(name, 33)); 4332c2aa98e2SPeter Wemm } 4333c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 4334c2aa98e2SPeter Wemm break; 4335c2aa98e2SPeter Wemm 4336c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 4337c2aa98e2SPeter Wemm case NO_DATA: 4338c2aa98e2SPeter Wemm *statp = EX_NOHOST; 4339c2aa98e2SPeter Wemm break; 4340c2aa98e2SPeter Wemm 4341c2aa98e2SPeter Wemm case NO_RECOVERY: 4342c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 4343c2aa98e2SPeter Wemm break; 4344c2aa98e2SPeter Wemm 4345c2aa98e2SPeter Wemm default: 4346c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 4347c2aa98e2SPeter Wemm break; 4348c2aa98e2SPeter Wemm } 434906f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 4350c2aa98e2SPeter Wemm if (tTd(9, 1)) 435140266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 4352c2aa98e2SPeter Wemm *statp = EX_NOHOST; 435306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 4354c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 4355c2aa98e2SPeter Wemm return NULL; 4356c2aa98e2SPeter Wemm } 4357c2aa98e2SPeter Wemm /* 4358c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 435940266059SGregory Neil Shapiro ** 436040266059SGregory Neil Shapiro ** Parameters: 436140266059SGregory Neil Shapiro ** map -- a pointer to this map. 436240266059SGregory Neil Shapiro ** args -- argument string. 436340266059SGregory Neil Shapiro ** 436440266059SGregory Neil Shapiro ** Returns: 436540266059SGregory Neil Shapiro ** true. 4366c2aa98e2SPeter Wemm */ 4367c2aa98e2SPeter Wemm 4368c2aa98e2SPeter Wemm bool 4369c2aa98e2SPeter Wemm host_map_init(map, args) 4370c2aa98e2SPeter Wemm MAP *map; 4371c2aa98e2SPeter Wemm char *args; 4372c2aa98e2SPeter Wemm { 4373c2aa98e2SPeter Wemm register char *p = args; 4374c2aa98e2SPeter Wemm 4375c2aa98e2SPeter Wemm for (;;) 4376c2aa98e2SPeter Wemm { 43775b0945b5SGregory Neil Shapiro while (SM_ISSPACE(*p)) 4378c2aa98e2SPeter Wemm p++; 4379c2aa98e2SPeter Wemm if (*p != '-') 4380c2aa98e2SPeter Wemm break; 4381c2aa98e2SPeter Wemm switch (*++p) 4382c2aa98e2SPeter Wemm { 4383c2aa98e2SPeter Wemm case 'a': 4384c2aa98e2SPeter Wemm map->map_app = ++p; 4385c2aa98e2SPeter Wemm break; 4386c2aa98e2SPeter Wemm 4387c2aa98e2SPeter Wemm case 'T': 4388c2aa98e2SPeter Wemm map->map_tapp = ++p; 4389c2aa98e2SPeter Wemm break; 4390c2aa98e2SPeter Wemm 4391c2aa98e2SPeter Wemm case 'm': 4392c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 4393c2aa98e2SPeter Wemm break; 4394c2aa98e2SPeter Wemm 4395c2aa98e2SPeter Wemm case 't': 4396c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 4397c2aa98e2SPeter Wemm break; 439806f25ae9SGregory Neil Shapiro 439906f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 440006f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 440106f25ae9SGregory Neil Shapiro break; 440206f25ae9SGregory Neil Shapiro 440306f25ae9SGregory Neil Shapiro case 'D': 440406f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 440506f25ae9SGregory Neil Shapiro break; 440640266059SGregory Neil Shapiro 440740266059SGregory Neil Shapiro case 'd': 440840266059SGregory Neil Shapiro { 440940266059SGregory Neil Shapiro char *h; 441040266059SGregory Neil Shapiro 441140266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 441240266059SGregory Neil Shapiro continue; 441340266059SGregory Neil Shapiro h = strchr(p, ' '); 441440266059SGregory Neil Shapiro if (h != NULL) 441540266059SGregory Neil Shapiro *h = '\0'; 441640266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 441740266059SGregory Neil Shapiro if (h != NULL) 441840266059SGregory Neil Shapiro *h = ' '; 441940266059SGregory Neil Shapiro } 442040266059SGregory Neil Shapiro break; 442140266059SGregory Neil Shapiro 442240266059SGregory Neil Shapiro case 'r': 442340266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 442440266059SGregory Neil Shapiro continue; 442540266059SGregory Neil Shapiro map->map_retry = atoi(p); 442640266059SGregory Neil Shapiro break; 4427c2aa98e2SPeter Wemm } 44285b0945b5SGregory Neil Shapiro while (*p != '\0' && !(SM_ISSPACE(*p))) 4429c2aa98e2SPeter Wemm p++; 4430c2aa98e2SPeter Wemm if (*p != '\0') 4431c2aa98e2SPeter Wemm *p++ = '\0'; 4432c2aa98e2SPeter Wemm } 4433c2aa98e2SPeter Wemm if (map->map_app != NULL) 4434c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4435c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4436c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 443740266059SGregory Neil Shapiro return true; 4438c2aa98e2SPeter Wemm } 443940266059SGregory Neil Shapiro 444006f25ae9SGregory Neil Shapiro #if NETINET6 444106f25ae9SGregory Neil Shapiro /* 444206f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 444306f25ae9SGregory Neil Shapiro ** 444406f25ae9SGregory Neil Shapiro ** Parameters: 444506f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 444606f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 444706f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 444806f25ae9SGregory Neil Shapiro ** 444906f25ae9SGregory Neil Shapiro ** Returns: 445006f25ae9SGregory Neil Shapiro ** A printable version of that structure. 445106f25ae9SGregory Neil Shapiro */ 445240266059SGregory Neil Shapiro 445306f25ae9SGregory Neil Shapiro char * 445406f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 445506f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 445606f25ae9SGregory Neil Shapiro char *dst; 445706f25ae9SGregory Neil Shapiro size_t dst_len; 445806f25ae9SGregory Neil Shapiro { 445906f25ae9SGregory Neil Shapiro register char *ap; 446006f25ae9SGregory Neil Shapiro 446106f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 446206f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 446306f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 446406f25ae9SGregory Neil Shapiro dst, dst_len); 446506f25ae9SGregory Neil Shapiro else 446640266059SGregory Neil Shapiro { 446740266059SGregory Neil Shapiro char *d; 446840266059SGregory Neil Shapiro size_t sz; 446940266059SGregory Neil Shapiro 447040266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 447140266059SGregory Neil Shapiro d = dst; 447240266059SGregory Neil Shapiro 447340266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 447440266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 447540266059SGregory Neil Shapiro if (sz >= dst_len) 447640266059SGregory Neil Shapiro return NULL; 447740266059SGregory Neil Shapiro dst += sz; 447840266059SGregory Neil Shapiro dst_len -= sz; 4479da7d7b9cSGregory Neil Shapiro if (UseCompressedIPv6Addresses) 448006f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 4481da7d7b9cSGregory Neil Shapiro else 4482da7d7b9cSGregory Neil Shapiro ap = sm_inet6_ntop(s6a, dst, dst_len); 448340266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 448440266059SGregory Neil Shapiro if (ap != NULL) 448540266059SGregory Neil Shapiro ap = d; 448640266059SGregory Neil Shapiro } 448706f25ae9SGregory Neil Shapiro return ap; 448806f25ae9SGregory Neil Shapiro } 448940266059SGregory Neil Shapiro 449040266059SGregory Neil Shapiro /* 449140266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 449240266059SGregory Neil Shapiro ** 449340266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 449440266059SGregory Neil Shapiro ** 449540266059SGregory Neil Shapiro ** Parameters: 449640266059SGregory Neil Shapiro ** family -- address family 449740266059SGregory Neil Shapiro ** src -- string 449840266059SGregory Neil Shapiro ** dst -- destination address structure 449940266059SGregory Neil Shapiro ** 450040266059SGregory Neil Shapiro ** Returns: 450140266059SGregory Neil Shapiro ** 1 if the address was valid 45025b0945b5SGregory Neil Shapiro ** 0 if the address wasn't parsable 450340266059SGregory Neil Shapiro ** -1 if error 450440266059SGregory Neil Shapiro */ 450540266059SGregory Neil Shapiro 450640266059SGregory Neil Shapiro int 450740266059SGregory Neil Shapiro anynet_pton(family, src, dst) 450840266059SGregory Neil Shapiro int family; 450940266059SGregory Neil Shapiro const char *src; 451040266059SGregory Neil Shapiro void *dst; 451140266059SGregory Neil Shapiro { 451240266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 451340266059SGregory Neil Shapiro src += 5; 451440266059SGregory Neil Shapiro return inet_pton(family, src, dst); 451540266059SGregory Neil Shapiro } 451606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 451740266059SGregory Neil Shapiro /* 4518c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4519c2aa98e2SPeter Wemm ** 4520c2aa98e2SPeter Wemm ** Parameters: 4521c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4522c2aa98e2SPeter Wemm ** 4523c2aa98e2SPeter Wemm ** Returns: 4524c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4525c2aa98e2SPeter Wemm */ 4526c2aa98e2SPeter Wemm 4527c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4528c2aa98e2SPeter Wemm 4529c2aa98e2SPeter Wemm # if NETLINK 4530c2aa98e2SPeter Wemm # include <net/if_dl.h> 45315b0945b5SGregory Neil Shapiro # endif 4532c2aa98e2SPeter Wemm 4533c2aa98e2SPeter Wemm char * 4534c2aa98e2SPeter Wemm anynet_ntoa(sap) 4535c2aa98e2SPeter Wemm register SOCKADDR *sap; 4536c2aa98e2SPeter Wemm { 4537c2aa98e2SPeter Wemm register char *bp; 4538c2aa98e2SPeter Wemm register char *ap; 4539c2aa98e2SPeter Wemm int l; 4540c2aa98e2SPeter Wemm static char buf[100]; 4541c2aa98e2SPeter Wemm 4542c2aa98e2SPeter Wemm /* check for null/zero family */ 4543c2aa98e2SPeter Wemm if (sap == NULL) 4544c2aa98e2SPeter Wemm return "NULLADDR"; 4545c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4546c2aa98e2SPeter Wemm return "0"; 4547c2aa98e2SPeter Wemm 4548c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4549c2aa98e2SPeter Wemm { 4550c2aa98e2SPeter Wemm # if NETUNIX 4551c2aa98e2SPeter Wemm case AF_UNIX: 4552c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 4553d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[UNIX: %.64s]", 4554c2aa98e2SPeter Wemm sap->sunix.sun_path); 4555c2aa98e2SPeter Wemm else 4556d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof(buf)); 4557c2aa98e2SPeter Wemm return buf; 455806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4559c2aa98e2SPeter Wemm 4560c2aa98e2SPeter Wemm # if NETINET 4561c2aa98e2SPeter Wemm case AF_INET: 456206f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 45635b0945b5SGregory Neil Shapiro # endif 456406f25ae9SGregory Neil Shapiro 456506f25ae9SGregory Neil Shapiro # if NETINET6 456606f25ae9SGregory Neil Shapiro case AF_INET6: 4567d0cef73dSGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof(buf)); 456806f25ae9SGregory Neil Shapiro if (ap != NULL) 456906f25ae9SGregory Neil Shapiro return ap; 457006f25ae9SGregory Neil Shapiro break; 457106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4572c2aa98e2SPeter Wemm 4573c2aa98e2SPeter Wemm # if NETLINK 4574c2aa98e2SPeter Wemm case AF_LINK: 4575d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[LINK: %s]", 4576c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4577c2aa98e2SPeter Wemm return buf; 457806f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4579c2aa98e2SPeter Wemm default: 4580c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4581c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4582c2aa98e2SPeter Wemm break; 4583c2aa98e2SPeter Wemm } 4584c2aa98e2SPeter Wemm 4585c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 4586d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "Family %d: ", sap->sa.sa_family); 4587c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4588c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4589*2fb4f839SGregory Neil Shapiro for (l = sizeof(sap->sa.sa_data); --l >= 0 && SPACELEFT(buf, bp) > 3; ) 4590c2aa98e2SPeter Wemm { 459140266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 459240266059SGregory Neil Shapiro *ap++ & 0377); 4593c2aa98e2SPeter Wemm bp += 3; 4594c2aa98e2SPeter Wemm } 4595*2fb4f839SGregory Neil Shapiro SM_ASSERT(bp > buf); 4596*2fb4f839SGregory Neil Shapiro SM_ASSERT(bp <= buf + sizeof(buf)); 4597c2aa98e2SPeter Wemm *--bp = '\0'; 4598c2aa98e2SPeter Wemm return buf; 4599c2aa98e2SPeter Wemm } 460040266059SGregory Neil Shapiro /* 4601c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4602c2aa98e2SPeter Wemm ** 4603c2aa98e2SPeter Wemm ** Parameters: 4604c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4605c2aa98e2SPeter Wemm ** 4606c2aa98e2SPeter Wemm ** Returns: 4607c2aa98e2SPeter Wemm ** text representation of host name. 4608c2aa98e2SPeter Wemm ** 4609c2aa98e2SPeter Wemm ** Side Effects: 4610c2aa98e2SPeter Wemm ** none. 4611c2aa98e2SPeter Wemm */ 4612c2aa98e2SPeter Wemm 4613c2aa98e2SPeter Wemm char * 4614c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4615c2aa98e2SPeter Wemm register SOCKADDR *sap; 4616c2aa98e2SPeter Wemm { 4617c2aa98e2SPeter Wemm register struct hostent *hp; 461806f25ae9SGregory Neil Shapiro # if NAMED_BIND 4619c2aa98e2SPeter Wemm int saveretry; 46205b0945b5SGregory Neil Shapiro # endif 462106f25ae9SGregory Neil Shapiro # if NETINET6 462206f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 462306f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4624c2aa98e2SPeter Wemm 4625c2aa98e2SPeter Wemm # if NAMED_BIND 4626c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4627c2aa98e2SPeter Wemm saveretry = _res.retry; 462806f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 462906f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4630ba00ec3dSGregory Neil Shapiro if (_res.retry == 0) 4631ba00ec3dSGregory Neil Shapiro _res.retry = 1; 4632c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4633c2aa98e2SPeter Wemm 4634c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4635c2aa98e2SPeter Wemm { 4636c2aa98e2SPeter Wemm # if NETINET 4637c2aa98e2SPeter Wemm case AF_INET: 4638c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 463940266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4640c2aa98e2SPeter Wemm break; 464106f25ae9SGregory Neil Shapiro # endif /* NETINET */ 464206f25ae9SGregory Neil Shapiro 464306f25ae9SGregory Neil Shapiro # if NETINET6 464406f25ae9SGregory Neil Shapiro case AF_INET6: 464506f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 464640266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 464706f25ae9SGregory Neil Shapiro break; 464806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4649c2aa98e2SPeter Wemm 4650c2aa98e2SPeter Wemm # if NETISO 4651c2aa98e2SPeter Wemm case AF_ISO: 4652c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 4653d0cef73dSGregory Neil Shapiro sizeof(sap->siso.siso_addr), AF_ISO); 4654c2aa98e2SPeter Wemm break; 465506f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4656c2aa98e2SPeter Wemm 4657c2aa98e2SPeter Wemm # if NETUNIX 4658c2aa98e2SPeter Wemm case AF_UNIX: 4659c2aa98e2SPeter Wemm hp = NULL; 4660c2aa98e2SPeter Wemm break; 466106f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4662c2aa98e2SPeter Wemm 4663c2aa98e2SPeter Wemm default: 4664d0cef73dSGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof(sap->sa.sa_data), 4665c2aa98e2SPeter Wemm sap->sa.sa_family); 4666c2aa98e2SPeter Wemm break; 4667c2aa98e2SPeter Wemm } 4668c2aa98e2SPeter Wemm 4669c2aa98e2SPeter Wemm # if NAMED_BIND 4670c2aa98e2SPeter Wemm _res.retry = saveretry; 46715b0945b5SGregory Neil Shapiro # endif 4672c2aa98e2SPeter Wemm 467306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 467406f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 467506f25ae9SGregory Neil Shapiro # if NETINET6 467606f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 467706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 467806f25ae9SGregory Neil Shapiro # if NETINET 467906f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 46805b0945b5SGregory Neil Shapiro # endif 468106f25ae9SGregory Neil Shapiro ) 4682193538b7SGregory Neil Shapiro { 4683193538b7SGregory Neil Shapiro char *name; 4684193538b7SGregory Neil Shapiro 468540266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 468640266059SGregory Neil Shapiro # if NETINET6 4687193538b7SGregory Neil Shapiro if (name == hp->h_name) 4688193538b7SGregory Neil Shapiro { 4689*2fb4f839SGregory Neil Shapiro static char n[MAXNAME + 1]; /* EAI:ok */ 4690193538b7SGregory Neil Shapiro 4691193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 4692d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof(n)); 4693193538b7SGregory Neil Shapiro name = n; 4694193538b7SGregory Neil Shapiro } 46955b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 469640266059SGregory Neil Shapiro # endif /* NETINET6 */ 4697193538b7SGregory Neil Shapiro return name; 4698193538b7SGregory Neil Shapiro } 469906f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4700193538b7SGregory Neil Shapiro 47015b0945b5SGregory Neil Shapiro FREEHOSTENT(hp, NULL); 4702193538b7SGregory Neil Shapiro 4703c2aa98e2SPeter Wemm # if NETUNIX 470406f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4705c2aa98e2SPeter Wemm return "localhost"; 47065b0945b5SGregory Neil Shapiro # endif 4707c2aa98e2SPeter Wemm { 4708c2aa98e2SPeter Wemm static char buf[203]; 4709c2aa98e2SPeter Wemm 4710d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[%.200s]", 471140266059SGregory Neil Shapiro anynet_ntoa(sap)); 4712c2aa98e2SPeter Wemm return buf; 4713c2aa98e2SPeter Wemm } 4714c2aa98e2SPeter Wemm } 471506f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4716