1c2aa98e2SPeter Wemm /* 2602a2b1bSGregory Neil Shapiro * Copyright (c) 1998-2001 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 1640266059SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.603 2001/12/31 19:46:38 gshapiro Exp $") 17c2aa98e2SPeter Wemm 18c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 19c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2006f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 21c2aa98e2SPeter Wemm 2240266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 24c2aa98e2SPeter Wemm # include <arpa/inet.h> 2506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 26c2aa98e2SPeter Wemm # if NAMED_BIND 27c2aa98e2SPeter Wemm # ifndef NO_DATA 28c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 2906f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3140266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 32c2aa98e2SPeter Wemm 3342e5d165SGregory Neil Shapiro #if STARTTLS 3442e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3542e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3642e5d165SGregory Neil Shapiro 37c2aa98e2SPeter Wemm #include <sys/time.h> 38c2aa98e2SPeter Wemm 3906f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 40c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 41c2aa98e2SPeter Wemm # include <netinet/ip.h> 4206f25ae9SGregory Neil Shapiro # if HAS_IN_H 4306f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4406f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4506f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4606f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4806f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 4906f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 50c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5106f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5206f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5306f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5406f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5506f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5606f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5806f25ae9SGregory Neil Shapiro 5940266059SGregory Neil Shapiro #include <sm/fdset.h> 6040266059SGregory Neil Shapiro 6140266059SGregory Neil Shapiro /* structure to describe a daemon or a client */ 6206f25ae9SGregory Neil Shapiro struct daemon 6306f25ae9SGregory Neil Shapiro { 6406f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 6506f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 6640266059SGregory Neil Shapiro unsigned short d_port; /* port number */ 6706f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 6806f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 6906f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7006f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7106f25ae9SGregory Neil Shapiro bool d_firsttime; 7206f25ae9SGregory Neil Shapiro int d_socksize; 7306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 7406f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 7506f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 7640266059SGregory Neil Shapiro #if MILTER 7740266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 7840266059SGregory Neil Shapiro char *d_inputfilterlist; 7940266059SGregory Neil Shapiro struct milter *d_inputfilters[MAXFILTERS]; 8040266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 8140266059SGregory Neil Shapiro #endif /* MILTER */ 8206f25ae9SGregory Neil Shapiro }; 8306f25ae9SGregory Neil Shapiro 8406f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8506f25ae9SGregory Neil Shapiro 8606f25ae9SGregory Neil Shapiro static void connecttimeout __P((void)); 8740266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 8840266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 8940266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 90c2aa98e2SPeter Wemm 91c2aa98e2SPeter Wemm /* 92c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 93c2aa98e2SPeter Wemm ** 94c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 95c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 96c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 97c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 98c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 99c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 100c2aa98e2SPeter Wemm ** 101c2aa98e2SPeter Wemm ** getrequests(e) 102c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 103c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 104c2aa98e2SPeter Wemm ** OutChannel appropriately. 105c2aa98e2SPeter Wemm ** clrdaemon() 106c2aa98e2SPeter Wemm ** Close any open files associated with getting 107c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 108c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 109c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 110c2aa98e2SPeter Wemm ** code (if it cares). 11140266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 112c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 11340266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 11440266059SGregory Neil Shapiro ** describing the error. 115c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 116c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 117c2aa98e2SPeter Wemm */ 11806f25ae9SGregory Neil Shapiro 11906f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 12040266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 12106f25ae9SGregory Neil Shapiro 12240266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 12306f25ae9SGregory Neil Shapiro 12440266059SGregory Neil Shapiro /* 125c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 126c2aa98e2SPeter Wemm ** 127c2aa98e2SPeter Wemm ** Parameters: 128c2aa98e2SPeter Wemm ** e -- the current envelope. 129c2aa98e2SPeter Wemm ** 130c2aa98e2SPeter Wemm ** Returns: 13106f25ae9SGregory Neil Shapiro ** pointer to flags. 132c2aa98e2SPeter Wemm ** 133c2aa98e2SPeter Wemm ** Side Effects: 134c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 135c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 136c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 137c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 138c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 139c2aa98e2SPeter Wemm ** to the communication channel. 14040266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 14140266059SGregory Neil Shapiro ** for some reason. 142c2aa98e2SPeter Wemm */ 143c2aa98e2SPeter Wemm 14406f25ae9SGregory Neil Shapiro BITMAP256 * 145c2aa98e2SPeter Wemm getrequests(e) 146c2aa98e2SPeter Wemm ENVELOPE *e; 147c2aa98e2SPeter Wemm { 148c2aa98e2SPeter Wemm int t; 14906f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15006f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 151c2aa98e2SPeter Wemm #if XDEBUG 152c2aa98e2SPeter Wemm bool j_has_dot; 15306f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 154065a643dSPeter Wemm char status[MAXLINE]; 15506f25ae9SGregory Neil Shapiro SOCKADDR sa; 15606f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 15706f25ae9SGregory Neil Shapiro # if NETUNIX 158065a643dSPeter Wemm extern int ControlSocket; 15906f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 16006f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 16140266059SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int, bool)); 162c2aa98e2SPeter Wemm 16306f25ae9SGregory Neil Shapiro 16440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 165c2aa98e2SPeter Wemm { 16606f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 16740266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 16806f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 169c2aa98e2SPeter Wemm } 170193538b7SGregory Neil Shapiro 171c2aa98e2SPeter Wemm /* 172c2aa98e2SPeter Wemm ** Try to actually open the connection. 173c2aa98e2SPeter Wemm */ 174c2aa98e2SPeter Wemm 175c2aa98e2SPeter Wemm if (tTd(15, 1)) 17606f25ae9SGregory Neil Shapiro { 17740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 178193538b7SGregory Neil Shapiro { 17940266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 18006f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 18106f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 18206f25ae9SGregory Neil Shapiro } 183193538b7SGregory Neil Shapiro } 184c2aa98e2SPeter Wemm 185c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 18640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 18740266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 188c2aa98e2SPeter Wemm 189065a643dSPeter Wemm if (opencontrolsocket() < 0) 190065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1912e43090eSPeter Wemm "daemon could not open control socket %s: %s", 19240266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 193065a643dSPeter Wemm 19440266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 19540266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 1968774250cSGregory Neil Shapiro 19740266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 19806f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 199c2aa98e2SPeter Wemm 200c2aa98e2SPeter Wemm #if XDEBUG 201c2aa98e2SPeter Wemm { 202c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 203c2aa98e2SPeter Wemm 204c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 205c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 206c2aa98e2SPeter Wemm } 20706f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 208c2aa98e2SPeter Wemm 209065a643dSPeter Wemm /* Add parent process as first item */ 21040266059SGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1); 211065a643dSPeter Wemm 212c2aa98e2SPeter Wemm if (tTd(15, 1)) 21306f25ae9SGregory Neil Shapiro { 21440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 21540266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: %d\n", 21606f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 21706f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 21806f25ae9SGregory Neil Shapiro } 219c2aa98e2SPeter Wemm 220c2aa98e2SPeter Wemm for (;;) 221c2aa98e2SPeter Wemm { 222c2aa98e2SPeter Wemm register pid_t pid; 223c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 22440266059SGregory Neil Shapiro bool timedout = false; 22540266059SGregory Neil Shapiro bool control = false; 22606f25ae9SGregory Neil Shapiro int save_errno; 227c2aa98e2SPeter Wemm int pipefd[2]; 22840266059SGregory Neil Shapiro time_t now; 22942e5d165SGregory Neil Shapiro #if STARTTLS 23042e5d165SGregory Neil Shapiro long seed; 23142e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 232c2aa98e2SPeter Wemm 233c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 23440266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 23506f25ae9SGregory Neil Shapiro 2368774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 2378774250cSGregory Neil Shapiro shutdown_daemon(); 2388774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 2398774250cSGregory Neil Shapiro restart_daemon(); 24040266059SGregory Neil Shapiro else if (RestartWorkGroup) 24140266059SGregory Neil Shapiro restart_marked_work_groups(); 2428774250cSGregory Neil Shapiro 24340266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 24440266059SGregory Neil Shapiro { 245193538b7SGregory Neil Shapiro /* 24640266059SGregory Neil Shapiro ** XXX do this call outside the loop? 24740266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 248193538b7SGregory Neil Shapiro */ 249193538b7SGregory Neil Shapiro 25040266059SGregory Neil Shapiro now = curtime(); 25140266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 25206f25ae9SGregory Neil Shapiro continue; 25340266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 25440266059SGregory Neil Shapiro continue; 25540266059SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx, 25640266059SGregory Neil Shapiro curdaemon == idx)) 257c2aa98e2SPeter Wemm { 25806f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 259c2aa98e2SPeter Wemm { 260065a643dSPeter Wemm /* close socket so peer fails quickly */ 26106f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 26206f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 263c2aa98e2SPeter Wemm } 264c2aa98e2SPeter Wemm 265065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 26640266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 267065a643dSPeter Wemm } 26806f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 26906f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 270c2aa98e2SPeter Wemm { 27140266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 27206f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 27306f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 27406f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 27506f25ae9SGregory Neil Shapiro 276065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 27740266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 27840266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 279065a643dSPeter Wemm } 280c2aa98e2SPeter Wemm } 281c2aa98e2SPeter Wemm 2828774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 2838774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 2848774250cSGregory Neil Shapiro shutdown_daemon(); 2858774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 2868774250cSGregory Neil Shapiro restart_daemon(); 28740266059SGregory Neil Shapiro else if (RestartWorkGroup) 28840266059SGregory Neil Shapiro restart_marked_work_groups(); 2898774250cSGregory Neil Shapiro 29040266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 29106f25ae9SGregory Neil Shapiro 292c2aa98e2SPeter Wemm #if XDEBUG 293c2aa98e2SPeter Wemm /* check for disaster */ 294c2aa98e2SPeter Wemm { 295c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 296c2aa98e2SPeter Wemm 297c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 298c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 299c2aa98e2SPeter Wemm { 300c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 301c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 302c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 303c2aa98e2SPeter Wemm abort(); 304c2aa98e2SPeter Wemm } 305c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 306c2aa98e2SPeter Wemm { 307c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 308c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 309c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 310c2aa98e2SPeter Wemm abort(); 311c2aa98e2SPeter Wemm } 312c2aa98e2SPeter Wemm } 31306f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 314c2aa98e2SPeter Wemm 315c2aa98e2SPeter Wemm #if 0 316c2aa98e2SPeter Wemm /* 317c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 318c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 319c2aa98e2SPeter Wemm ** so is it worth doing this? 320c2aa98e2SPeter Wemm */ 321c2aa98e2SPeter Wemm 322065a643dSPeter Wemm if (DaemonSocket >= 0 && 32340266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 324c2aa98e2SPeter Wemm log an error here; 32506f25ae9SGregory Neil Shapiro #endif /* 0 */ 32640266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 32706f25ae9SGregory Neil Shapiro 328c2aa98e2SPeter Wemm for (;;) 329c2aa98e2SPeter Wemm { 33040266059SGregory Neil Shapiro bool setproc = false; 331065a643dSPeter Wemm int highest = -1; 332c2aa98e2SPeter Wemm fd_set readfds; 333c2aa98e2SPeter Wemm struct timeval timeout; 334c2aa98e2SPeter Wemm 3358774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 3368774250cSGregory Neil Shapiro shutdown_daemon(); 3378774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 3388774250cSGregory Neil Shapiro restart_daemon(); 33940266059SGregory Neil Shapiro else if (RestartWorkGroup) 34040266059SGregory Neil Shapiro restart_marked_work_groups(); 3418774250cSGregory Neil Shapiro 342c2aa98e2SPeter Wemm FD_ZERO(&readfds); 343065a643dSPeter Wemm 34440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 345065a643dSPeter Wemm { 34606f25ae9SGregory Neil Shapiro /* wait for a connection */ 34706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 34806f25ae9SGregory Neil Shapiro { 349193538b7SGregory Neil Shapiro if (!setproc && 350193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 351193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 35206f25ae9SGregory Neil Shapiro { 35340266059SGregory Neil Shapiro sm_setproctitle(true, e, 35406f25ae9SGregory Neil Shapiro "accepting connections"); 35540266059SGregory Neil Shapiro setproc = true; 356065a643dSPeter Wemm } 35706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 35806f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 35940266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 36040266059SGregory Neil Shapiro &readfds); 36106f25ae9SGregory Neil Shapiro } 36206f25ae9SGregory Neil Shapiro } 36306f25ae9SGregory Neil Shapiro 36406f25ae9SGregory Neil Shapiro #if NETUNIX 365065a643dSPeter Wemm if (ControlSocket >= 0) 366065a643dSPeter Wemm { 367065a643dSPeter Wemm if (ControlSocket > highest) 368065a643dSPeter Wemm highest = ControlSocket; 36940266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 370065a643dSPeter Wemm } 37106f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 37206f25ae9SGregory Neil Shapiro 373065a643dSPeter Wemm timeout.tv_sec = 5; 374c2aa98e2SPeter Wemm timeout.tv_usec = 0; 375c2aa98e2SPeter Wemm 376065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 377c2aa98e2SPeter Wemm NULL, NULL, &timeout); 378065a643dSPeter Wemm 3798774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 3808774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 3818774250cSGregory Neil Shapiro shutdown_daemon(); 3828774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 3838774250cSGregory Neil Shapiro restart_daemon(); 38440266059SGregory Neil Shapiro else if (RestartWorkGroup) 38540266059SGregory Neil Shapiro restart_marked_work_groups(); 3868774250cSGregory Neil Shapiro 387193538b7SGregory Neil Shapiro 388193538b7SGregory Neil Shapiro 389193538b7SGregory Neil Shapiro curdaemon = -1; 39040266059SGregory Neil Shapiro if (doqueuerun()) 39140266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 39240266059SGregory Neil Shapiro 393065a643dSPeter Wemm if (t <= 0) 394065a643dSPeter Wemm { 39540266059SGregory Neil Shapiro timedout = true; 396065a643dSPeter Wemm break; 397065a643dSPeter Wemm } 398c2aa98e2SPeter Wemm 39940266059SGregory Neil Shapiro control = false; 400c2aa98e2SPeter Wemm errno = 0; 40106f25ae9SGregory Neil Shapiro 40206f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 40340266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 40406f25ae9SGregory Neil Shapiro idx = 0; 40540266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 406065a643dSPeter Wemm { 40706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 40840266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 40940266059SGregory Neil Shapiro &readfds)) 41006f25ae9SGregory Neil Shapiro { 41106f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 412602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 413602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 41406f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 415065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 416065a643dSPeter Wemm &lotherend); 417602a2b1bSGregory Neil Shapiro 418602a2b1bSGregory Neil Shapiro /* 419602a2b1bSGregory Neil Shapiro ** If remote side closes before 420602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 421602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 422602a2b1bSGregory Neil Shapiro */ 423602a2b1bSGregory Neil Shapiro 424602a2b1bSGregory Neil Shapiro if (t >= 0 && 425602a2b1bSGregory Neil Shapiro (lotherend == 0 || 426602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 427602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 428602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 429602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 430602a2b1bSGregory Neil Shapiro { 431602a2b1bSGregory Neil Shapiro (void) close(t); 432602a2b1bSGregory Neil Shapiro t = -1; 433602a2b1bSGregory Neil Shapiro errno = EINVAL; 434602a2b1bSGregory Neil Shapiro } 43506f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 43606f25ae9SGregory Neil Shapiro break; 437065a643dSPeter Wemm } 43840266059SGregory Neil Shapiro if (++idx >= NDaemons) 43906f25ae9SGregory Neil Shapiro idx = 0; 44006f25ae9SGregory Neil Shapiro } 44106f25ae9SGregory Neil Shapiro #if NETUNIX 44206f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 44340266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 444065a643dSPeter Wemm { 445065a643dSPeter Wemm struct sockaddr_un sa_un; 446065a643dSPeter Wemm 447065a643dSPeter Wemm lotherend = sizeof sa_un; 448602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 449065a643dSPeter Wemm t = accept(ControlSocket, 450065a643dSPeter Wemm (struct sockaddr *)&sa_un, 451065a643dSPeter Wemm &lotherend); 452602a2b1bSGregory Neil Shapiro 453602a2b1bSGregory Neil Shapiro /* 454602a2b1bSGregory Neil Shapiro ** If remote side closes before 455602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 456602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 457602a2b1bSGregory Neil Shapiro */ 458602a2b1bSGregory Neil Shapiro 459602a2b1bSGregory Neil Shapiro if (t >= 0 && 460602a2b1bSGregory Neil Shapiro (lotherend == 0 || 461602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 462602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 463602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 464602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 465602a2b1bSGregory Neil Shapiro { 466602a2b1bSGregory Neil Shapiro (void) close(t); 467602a2b1bSGregory Neil Shapiro t = -1; 468602a2b1bSGregory Neil Shapiro errno = EINVAL; 469602a2b1bSGregory Neil Shapiro } 470602a2b1bSGregory Neil Shapiro if (t >= 0) 47140266059SGregory Neil Shapiro control = true; 472065a643dSPeter Wemm } 473193538b7SGregory Neil Shapiro #else /* NETUNIX */ 474193538b7SGregory Neil Shapiro if (curdaemon == -1) 475193538b7SGregory Neil Shapiro { 476193538b7SGregory Neil Shapiro /* No daemon to service */ 477193538b7SGregory Neil Shapiro continue; 478193538b7SGregory Neil Shapiro } 47906f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 480c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 481c2aa98e2SPeter Wemm break; 482c2aa98e2SPeter Wemm } 483065a643dSPeter Wemm if (timedout) 484065a643dSPeter Wemm { 48540266059SGregory Neil Shapiro timedout = false; 486065a643dSPeter Wemm continue; 487065a643dSPeter Wemm } 48806f25ae9SGregory Neil Shapiro save_errno = errno; 48940266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 490c2aa98e2SPeter Wemm if (t < 0) 491c2aa98e2SPeter Wemm { 49206f25ae9SGregory Neil Shapiro errno = save_errno; 493c2aa98e2SPeter Wemm syserr("getrequests: accept"); 494c2aa98e2SPeter Wemm 495c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 49606f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 49706f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 49806f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 49906f25ae9SGregory Neil Shapiro /* 50006f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 50106f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 50206f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 50306f25ae9SGregory Neil Shapiro */ 50406f25ae9SGregory Neil Shapiro 50540266059SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = curtime() + 15; 50606f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 507c2aa98e2SPeter Wemm continue; 508c2aa98e2SPeter Wemm } 509c2aa98e2SPeter Wemm 51006f25ae9SGregory Neil Shapiro if (!control) 51106f25ae9SGregory Neil Shapiro { 51206f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 51306f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 51406f25ae9SGregory Neil Shapiro { 51506f25ae9SGregory Neil Shapiro case AF_UNSPEC: 51640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 51740266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 51806f25ae9SGregory Neil Shapiro break; 51940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 52040266059SGregory Neil Shapiro # if NETUNIX 52140266059SGregory Neil Shapiro case AF_UNIX: 52240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 52340266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 52440266059SGregory Neil Shapiro break; 52540266059SGregory Neil Shapiro # endif /* NETUNIX */ 52640266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 52706f25ae9SGregory Neil Shapiro #if NETINET 52806f25ae9SGregory Neil Shapiro case AF_INET: 52940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53040266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 53106f25ae9SGregory Neil Shapiro break; 53206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 53306f25ae9SGregory Neil Shapiro #if NETINET6 53406f25ae9SGregory Neil Shapiro case AF_INET6: 53540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53640266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 53706f25ae9SGregory Neil Shapiro break; 53806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 53906f25ae9SGregory Neil Shapiro #if NETISO 54006f25ae9SGregory Neil Shapiro case AF_ISO: 54140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54240266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 54306f25ae9SGregory Neil Shapiro break; 54406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 54506f25ae9SGregory Neil Shapiro #if NETNS 54606f25ae9SGregory Neil Shapiro case AF_NS: 54740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54840266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 54906f25ae9SGregory Neil Shapiro break; 55006f25ae9SGregory Neil Shapiro #endif /* NETNS */ 55106f25ae9SGregory Neil Shapiro #if NETX25 55206f25ae9SGregory Neil Shapiro case AF_CCITT: 55340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55440266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 55506f25ae9SGregory Neil Shapiro break; 55606f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 55706f25ae9SGregory Neil Shapiro } 55840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55940266059SGregory Neil Shapiro macid("{daemon_name}"), 56040266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 56106f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 56240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56340266059SGregory Neil Shapiro macid("{daemon_flags}"), 56440266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 56506f25ae9SGregory Neil Shapiro else 56640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56740266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 56806f25ae9SGregory Neil Shapiro } 56906f25ae9SGregory Neil Shapiro 570c2aa98e2SPeter Wemm /* 571c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 572c2aa98e2SPeter Wemm */ 573c2aa98e2SPeter Wemm 574c2aa98e2SPeter Wemm if (tTd(15, 2)) 57540266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 57606f25ae9SGregory Neil Shapiro 57706f25ae9SGregory Neil Shapiro /* 57840266059SGregory Neil Shapiro ** Advance state of PRNG. 57940266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 58006f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 58106f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 58206f25ae9SGregory Neil Shapiro ** are not "really" random. 58306f25ae9SGregory Neil Shapiro */ 58442e5d165SGregory Neil Shapiro #if STARTTLS 58540266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 58642e5d165SGregory Neil Shapiro seed = get_random(); 58740266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 58840266059SGregory Neil Shapiro sizeof NextDiskSpaceCheck); 58940266059SGregory Neil Shapiro RAND_seed((void *) &now, sizeof now); 59042e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 59142e5d165SGregory Neil Shapiro #else /* STARTTLS */ 59206f25ae9SGregory Neil Shapiro (void) get_random(); 59342e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 594c2aa98e2SPeter Wemm 59540266059SGregory Neil Shapiro #if NAMED_BIND 59640266059SGregory Neil Shapiro /* 59740266059SGregory Neil Shapiro ** Update MX records for FallBackMX. 59840266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 59940266059SGregory Neil Shapiro ** response time. 60040266059SGregory Neil Shapiro */ 60140266059SGregory Neil Shapiro 60240266059SGregory Neil Shapiro if (FallBackMX != NULL) 60340266059SGregory Neil Shapiro (void) getfallbackmxrr(FallBackMX); 60440266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 60540266059SGregory Neil Shapiro 60640266059SGregory Neil Shapiro #if !PROFILING 607c2aa98e2SPeter Wemm /* 608c2aa98e2SPeter Wemm ** Create a pipe to keep the child from writing to the 609c2aa98e2SPeter Wemm ** socket until after the parent has closed it. Otherwise 610c2aa98e2SPeter Wemm ** the parent may hang if the child has closed it first. 611c2aa98e2SPeter Wemm */ 612c2aa98e2SPeter Wemm 613c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 614c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 615c2aa98e2SPeter Wemm 61640266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 617c2aa98e2SPeter Wemm pid = fork(); 618c2aa98e2SPeter Wemm if (pid < 0) 619c2aa98e2SPeter Wemm { 620c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 621c2aa98e2SPeter Wemm if (pipefd[0] != -1) 622c2aa98e2SPeter Wemm { 623c2aa98e2SPeter Wemm (void) close(pipefd[0]); 624c2aa98e2SPeter Wemm (void) close(pipefd[1]); 625c2aa98e2SPeter Wemm } 62640266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 62706f25ae9SGregory Neil Shapiro (void) sleep(10); 628c2aa98e2SPeter Wemm (void) close(t); 629c2aa98e2SPeter Wemm continue; 630c2aa98e2SPeter Wemm } 63140266059SGregory Neil Shapiro 63240266059SGregory Neil Shapiro #else /* !PROFILING */ 633193538b7SGregory Neil Shapiro pid = 0; 63440266059SGregory Neil Shapiro #endif /* !PROFILING */ 635c2aa98e2SPeter Wemm 636c2aa98e2SPeter Wemm if (pid == 0) 637c2aa98e2SPeter Wemm { 638c2aa98e2SPeter Wemm char *p; 63940266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 640c2aa98e2SPeter Wemm 641c2aa98e2SPeter Wemm /* 642c2aa98e2SPeter Wemm ** CHILD -- return to caller. 643c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 644c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 645c2aa98e2SPeter Wemm */ 646c2aa98e2SPeter Wemm 6478774250cSGregory Neil Shapiro /* Reset global flags */ 6488774250cSGregory Neil Shapiro RestartRequest = NULL; 64940266059SGregory Neil Shapiro RestartWorkGroup = false; 6508774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6518774250cSGregory Neil Shapiro PendingSignal = 0; 65240266059SGregory Neil Shapiro CurrentPid = getpid(); 6538774250cSGregory Neil Shapiro 65440266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 65540266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 65640266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 65740266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 65840266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 65940266059SGregory Neil Shapiro 66040266059SGregory Neil Shapiro /* turn on profiling */ 66140266059SGregory Neil Shapiro /* SM_PROF(0); */ 66240266059SGregory Neil Shapiro 66340266059SGregory Neil Shapiro /* 66440266059SGregory Neil Shapiro ** Initialize exception stack and default exception 66540266059SGregory Neil Shapiro ** handler for child process. 66640266059SGregory Neil Shapiro */ 66740266059SGregory Neil Shapiro 66840266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 6698774250cSGregory Neil Shapiro 67006f25ae9SGregory Neil Shapiro if (!control) 67106f25ae9SGregory Neil Shapiro { 67240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 67340266059SGregory Neil Shapiro macid("{daemon_addr}"), 67440266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 67540266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, "%d", 67606f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 67740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 67840266059SGregory Neil Shapiro macid("{daemon_port}"), status); 67906f25ae9SGregory Neil Shapiro } 68006f25ae9SGregory Neil Shapiro 68140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 68206f25ae9SGregory Neil Shapiro { 68306f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 68406f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 68513058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 68606f25ae9SGregory Neil Shapiro } 687065a643dSPeter Wemm clrcontrol(); 68806f25ae9SGregory Neil Shapiro 68906f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 69006f25ae9SGregory Neil Shapiro if (control) 69106f25ae9SGregory Neil Shapiro { 69206f25ae9SGregory Neil Shapiro /* Add control socket process */ 69340266059SGregory Neil Shapiro proc_list_add(CurrentPid, 69440266059SGregory Neil Shapiro "console socket child", 69540266059SGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1); 69606f25ae9SGregory Neil Shapiro } 69706f25ae9SGregory Neil Shapiro else 69806f25ae9SGregory Neil Shapiro { 699c2aa98e2SPeter Wemm proc_list_clear(); 700c2aa98e2SPeter Wemm 70140266059SGregory Neil Shapiro /* clean up background delivery children */ 70240266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 70340266059SGregory Neil Shapiro 704065a643dSPeter Wemm /* Add parent process as first child item */ 70540266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 70640266059SGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1); 707065a643dSPeter Wemm 70806f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 709c2aa98e2SPeter Wemm QueueIntvl = 0; 710c2aa98e2SPeter Wemm 71140266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 712c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 71306f25ae9SGregory Neil Shapiro } 714c2aa98e2SPeter Wemm 71540266059SGregory Neil Shapiro #if !PROFILING 716c2aa98e2SPeter Wemm if (pipefd[0] != -1) 717c2aa98e2SPeter Wemm { 718c2aa98e2SPeter Wemm auto char c; 719c2aa98e2SPeter Wemm 720c2aa98e2SPeter Wemm /* 721c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 722c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 723c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 724c2aa98e2SPeter Wemm ** socket until after the parent has closed 725c2aa98e2SPeter Wemm ** the pipe. 726c2aa98e2SPeter Wemm */ 727c2aa98e2SPeter Wemm 728c2aa98e2SPeter Wemm /* close the write end of the pipe */ 729c2aa98e2SPeter Wemm (void) close(pipefd[1]); 730c2aa98e2SPeter Wemm 731c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 732c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 733c2aa98e2SPeter Wemm errno == EINTR) 734c2aa98e2SPeter Wemm continue; 735c2aa98e2SPeter Wemm (void) close(pipefd[0]); 736c2aa98e2SPeter Wemm } 73740266059SGregory Neil Shapiro #endif /* !PROFILING */ 738c2aa98e2SPeter Wemm 73906f25ae9SGregory Neil Shapiro /* control socket processing */ 74006f25ae9SGregory Neil Shapiro if (control) 74106f25ae9SGregory Neil Shapiro { 74206f25ae9SGregory Neil Shapiro control_command(t, e); 74306f25ae9SGregory Neil Shapiro /* NOTREACHED */ 74406f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 74506f25ae9SGregory Neil Shapiro } 74606f25ae9SGregory Neil Shapiro 747c2aa98e2SPeter Wemm /* determine host name */ 748c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 74940266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 750c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 751c2aa98e2SPeter Wemm RealHostName = newstr(p); 75206f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 75306f25ae9SGregory Neil Shapiro { 75440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 75540266059SGregory Neil Shapiro macid("{client_resolve}"), 75640266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 75706f25ae9SGregory Neil Shapiro } 75806f25ae9SGregory Neil Shapiro else 75940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 76040266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 76140266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 762c2aa98e2SPeter Wemm 76340266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 76440266059SGregory Neil Shapiro SM_TIME_DEFAULT, 76540266059SGregory Neil Shapiro (void *) &t, 76640266059SGregory Neil Shapiro SM_IO_RDONLY, 76740266059SGregory Neil Shapiro NULL)) == NULL || 768c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 76940266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 77040266059SGregory Neil Shapiro SM_TIME_DEFAULT, 77140266059SGregory Neil Shapiro (void *) &t, 77240266059SGregory Neil Shapiro SM_IO_WRONLY, 77340266059SGregory Neil Shapiro NULL)) == NULL) 774c2aa98e2SPeter Wemm { 77540266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 77640266059SGregory Neil Shapiro t); 77740266059SGregory Neil Shapiro finis(false, true, EX_OK); 778c2aa98e2SPeter Wemm } 77940266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 780c2aa98e2SPeter Wemm 781c2aa98e2SPeter Wemm InChannel = inchannel; 782c2aa98e2SPeter Wemm OutChannel = outchannel; 78340266059SGregory Neil Shapiro DisConnected = false; 784c2aa98e2SPeter Wemm 78540266059SGregory Neil Shapiro #if XLA 786c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 787c2aa98e2SPeter Wemm { 78806f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 78940266059SGregory Neil Shapiro finis(false, true, EX_OK); 790c2aa98e2SPeter Wemm } 79106f25ae9SGregory Neil Shapiro #endif /* XLA */ 79206f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 79340266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 79440266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 79506f25ae9SGregory Neil Shapiro { 79606f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 79706f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 79840266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 79940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 80040266059SGregory Neil Shapiro macid("{if_name}"), p); 80106f25ae9SGregory Neil Shapiro 80240266059SGregory Neil Shapiro /* 80340266059SGregory Neil Shapiro ** Do this only if it is not the loopback 80440266059SGregory Neil Shapiro ** interface. 80540266059SGregory Neil Shapiro */ 80640266059SGregory Neil Shapiro 80706f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 80806f25ae9SGregory Neil Shapiro { 80940266059SGregory Neil Shapiro char *addr; 81040266059SGregory Neil Shapiro char family[5]; 81140266059SGregory Neil Shapiro 81240266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 81340266059SGregory Neil Shapiro (void) sm_snprintf(family, 81440266059SGregory Neil Shapiro sizeof(family), 81540266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 81640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 81740266059SGregory Neil Shapiro A_TEMP, 81840266059SGregory Neil Shapiro macid("{if_addr}"), addr); 81940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 82040266059SGregory Neil Shapiro A_TEMP, 82140266059SGregory Neil Shapiro macid("{if_family}"), family); 82206f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 82340266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 82440266059SGregory Neil Shapiro addr, family); 82506f25ae9SGregory Neil Shapiro } 82606f25ae9SGregory Neil Shapiro else 82706f25ae9SGregory Neil Shapiro { 82840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 82940266059SGregory Neil Shapiro A_PERM, 83040266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 83140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 83240266059SGregory Neil Shapiro A_PERM, 83340266059SGregory Neil Shapiro macid("{if_family}"), NULL); 83406f25ae9SGregory Neil Shapiro } 83506f25ae9SGregory Neil Shapiro } 83606f25ae9SGregory Neil Shapiro else 83706f25ae9SGregory Neil Shapiro { 83806f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 83940266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 84040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84140266059SGregory Neil Shapiro macid("{if_name}"), NULL); 84240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84340266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 84440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84540266059SGregory Neil Shapiro macid("{if_family}"), NULL); 84606f25ae9SGregory Neil Shapiro } 847c2aa98e2SPeter Wemm break; 848c2aa98e2SPeter Wemm } 849c2aa98e2SPeter Wemm 850c2aa98e2SPeter Wemm /* parent -- keep track of children */ 85106f25ae9SGregory Neil Shapiro if (control) 85206f25ae9SGregory Neil Shapiro { 85340266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 85440266059SGregory Neil Shapiro "control socket server child"); 85540266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1); 85606f25ae9SGregory Neil Shapiro } 85706f25ae9SGregory Neil Shapiro else 85806f25ae9SGregory Neil Shapiro { 85940266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 86006f25ae9SGregory Neil Shapiro "SMTP server child for %s", 861065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 86240266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1); 86306f25ae9SGregory Neil Shapiro } 86440266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 865c2aa98e2SPeter Wemm 866c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 867c2aa98e2SPeter Wemm if (pipefd[0] != -1) 86806f25ae9SGregory Neil Shapiro { 869c2aa98e2SPeter Wemm (void) close(pipefd[0]); 87006f25ae9SGregory Neil Shapiro pipefd[0] = -1; 87106f25ae9SGregory Neil Shapiro } 872c2aa98e2SPeter Wemm 873c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 874c2aa98e2SPeter Wemm (void) close(t); 875c2aa98e2SPeter Wemm 876c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 877c2aa98e2SPeter Wemm if (pipefd[1] != -1) 87806f25ae9SGregory Neil Shapiro { 879c2aa98e2SPeter Wemm (void) close(pipefd[1]); 88006f25ae9SGregory Neil Shapiro pipefd[1] = -1; 881c2aa98e2SPeter Wemm } 88206f25ae9SGregory Neil Shapiro } 883c2aa98e2SPeter Wemm if (tTd(15, 2)) 88440266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 88540266059SGregory Neil Shapiro 88640266059SGregory Neil Shapiro #if MILTER 88740266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 88840266059SGregory Neil Shapiro /* set the filters for this daemon */ 88940266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 89040266059SGregory Neil Shapiro { 89140266059SGregory Neil Shapiro for (i = 0; 89240266059SGregory Neil Shapiro (Daemons[curdaemon].d_inputfilters[i] != NULL && 89340266059SGregory Neil Shapiro i < MAXFILTERS); 89440266059SGregory Neil Shapiro i++) 89540266059SGregory Neil Shapiro { 89640266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 89740266059SGregory Neil Shapiro } 89840266059SGregory Neil Shapiro if (i < MAXFILTERS) 89940266059SGregory Neil Shapiro InputFilters[i] = NULL; 90040266059SGregory Neil Shapiro } 90140266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 90240266059SGregory Neil Shapiro #endif /* MILTER */ 90306f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 904c2aa98e2SPeter Wemm } 90540266059SGregory Neil Shapiro 90640266059SGregory Neil Shapiro /* 90740266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 90840266059SGregory Neil Shapiro ** 90940266059SGregory Neil Shapiro ** Parameters: 91040266059SGregory Neil Shapiro ** e -- envelope. 91140266059SGregory Neil Shapiro ** 91240266059SGregory Neil Shapiro ** Returns: 91340266059SGregory Neil Shapiro ** none. 91440266059SGregory Neil Shapiro ** 91540266059SGregory Neil Shapiro ** Side Effects: 91640266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 91740266059SGregory Neil Shapiro */ 91840266059SGregory Neil Shapiro 91940266059SGregory Neil Shapiro static void 92040266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 92140266059SGregory Neil Shapiro ENVELOPE *e; 92240266059SGregory Neil Shapiro { 92340266059SGregory Neil Shapiro bool logged = false; 92440266059SGregory Neil Shapiro int idx; 92540266059SGregory Neil Shapiro time_t now; 92640266059SGregory Neil Shapiro 92740266059SGregory Neil Shapiro now = curtime(); 92840266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 92940266059SGregory Neil Shapiro return; 93040266059SGregory Neil Shapiro 93140266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 93240266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 93340266059SGregory Neil Shapiro { 93440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 93540266059SGregory Neil Shapiro { 93640266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 93740266059SGregory Neil Shapiro continue; 93840266059SGregory Neil Shapiro 93940266059SGregory Neil Shapiro /* log only if not logged before */ 94040266059SGregory Neil Shapiro if (!logged) 94140266059SGregory Neil Shapiro { 94240266059SGregory Neil Shapiro if (LogLevel > 8) 94340266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 94440266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 94540266059SGregory Neil Shapiro MinBlocksFree); 94640266059SGregory Neil Shapiro sm_setproctitle(true, e, 94740266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 94840266059SGregory Neil Shapiro MinBlocksFree); 94940266059SGregory Neil Shapiro logged = true; 95040266059SGregory Neil Shapiro } 95140266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 95240266059SGregory Neil Shapiro } 95340266059SGregory Neil Shapiro } 95440266059SGregory Neil Shapiro else 95540266059SGregory Neil Shapiro { 95640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 95740266059SGregory Neil Shapiro { 95840266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 95940266059SGregory Neil Shapiro continue; 96040266059SGregory Neil Shapiro 96140266059SGregory Neil Shapiro /* log only if not logged before */ 96240266059SGregory Neil Shapiro if (!logged) 96340266059SGregory Neil Shapiro { 96440266059SGregory Neil Shapiro if (LogLevel > 8) 96540266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 96640266059SGregory Neil Shapiro "accepting new messages (again)"); 96740266059SGregory Neil Shapiro logged = true; 96840266059SGregory Neil Shapiro } 96940266059SGregory Neil Shapiro 97040266059SGregory Neil Shapiro /* title will be set later */ 97140266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 97240266059SGregory Neil Shapiro } 97340266059SGregory Neil Shapiro } 97440266059SGregory Neil Shapiro 97540266059SGregory Neil Shapiro /* only check disk space once a minute */ 97640266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 97740266059SGregory Neil Shapiro } 97840266059SGregory Neil Shapiro 97940266059SGregory Neil Shapiro /* 98006f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 981c2aa98e2SPeter Wemm ** 98206f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 983c2aa98e2SPeter Wemm ** 984c2aa98e2SPeter Wemm ** Parameters: 98506f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 986c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 987c2aa98e2SPeter Wemm ** 988c2aa98e2SPeter Wemm ** Returns: 989c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 990c2aa98e2SPeter Wemm ** 991c2aa98e2SPeter Wemm ** Side Effects: 992c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 993c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 994c2aa98e2SPeter Wemm */ 995c2aa98e2SPeter Wemm 996c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 997c2aa98e2SPeter Wemm 99806f25ae9SGregory Neil Shapiro static int 99906f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 100040266059SGregory Neil Shapiro DAEMON_T *d; 1001c2aa98e2SPeter Wemm bool firsttime; 1002c2aa98e2SPeter Wemm { 1003c2aa98e2SPeter Wemm int on = 1; 100406f25ae9SGregory Neil Shapiro int fdflags; 100506f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1006c2aa98e2SPeter Wemm int ntries = 0; 100706f25ae9SGregory Neil Shapiro int save_errno; 1008c2aa98e2SPeter Wemm 1009c2aa98e2SPeter Wemm if (tTd(15, 2)) 101040266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1011c2aa98e2SPeter Wemm 1012c2aa98e2SPeter Wemm do 1013c2aa98e2SPeter Wemm { 1014c2aa98e2SPeter Wemm if (ntries > 0) 101506f25ae9SGregory Neil Shapiro (void) sleep(5); 101606f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1017c2aa98e2SPeter Wemm { 101840266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 101940266059SGregory Neil Shapiro # if NETUNIX 102040266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 102140266059SGregory Neil Shapiro { 102240266059SGregory Neil Shapiro int rval; 102340266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 102440266059SGregory Neil Shapiro 102540266059SGregory Neil Shapiro /* if not safe, don't use it */ 102640266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 102740266059SGregory Neil Shapiro RunAsUid, RunAsGid, 102840266059SGregory Neil Shapiro RunAsUserName, sff, 102940266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 103040266059SGregory Neil Shapiro if (rval != 0) 103140266059SGregory Neil Shapiro { 103240266059SGregory Neil Shapiro save_errno = errno; 103340266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 103440266059SGregory Neil Shapiro d->d_name, 103540266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 103640266059SGregory Neil Shapiro goto fail; 103740266059SGregory Neil Shapiro } 103840266059SGregory Neil Shapiro 103940266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 104040266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 104140266059SGregory Neil Shapiro } 104240266059SGregory Neil Shapiro # endif /* NETUNIX */ 104340266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 104406f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 104506f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 104606f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1047c2aa98e2SPeter Wemm { 104806f25ae9SGregory Neil Shapiro save_errno = errno; 104940266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 105040266059SGregory Neil Shapiro d->d_name); 105140266059SGregory Neil Shapiro fail: 105240266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 105340266059SGregory Neil Shapiro (!transienterror(save_errno) || 105440266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 105540266059SGregory Neil Shapiro { 105640266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 105740266059SGregory Neil Shapiro d->d_name); 105840266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 105940266059SGregory Neil Shapiro d->d_socket = -1; 106040266059SGregory Neil Shapiro return -1; 106140266059SGregory Neil Shapiro } 1062c2aa98e2SPeter Wemm severe: 1063c2aa98e2SPeter Wemm if (LogLevel > 0) 1064c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 106540266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 106640266059SGregory Neil Shapiro d->d_name); 106706f25ae9SGregory Neil Shapiro d->d_socket = -1; 1068c2aa98e2SPeter Wemm continue; 1069c2aa98e2SPeter Wemm } 1070c2aa98e2SPeter Wemm 1071c2aa98e2SPeter Wemm /* turn on network debugging? */ 1072c2aa98e2SPeter Wemm if (tTd(15, 101)) 107306f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1074c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1075c2aa98e2SPeter Wemm sizeof on); 1076c2aa98e2SPeter Wemm 107706f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1078c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 107906f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1080c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 1081c2aa98e2SPeter Wemm 1082c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 108306f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1084c2aa98e2SPeter Wemm { 108506f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1086c2aa98e2SPeter Wemm SO_RCVBUF, 108706f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 108806f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 108906f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1090c2aa98e2SPeter Wemm } 109106f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 109206f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 109306f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 109406f25ae9SGregory Neil Shapiro { 109506f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 109606f25ae9SGregory Neil Shapiro SO_SNDBUF, 109706f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 109806f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 109906f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 110006f25ae9SGregory Neil Shapiro } 110106f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1102c2aa98e2SPeter Wemm 110306f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 110406f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 110506f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 110606f25ae9SGregory Neil Shapiro { 110706f25ae9SGregory Neil Shapiro save_errno = errno; 110806f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 110906f25ae9SGregory Neil Shapiro d->d_name, 111006f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 111140266059SGregory Neil Shapiro sm_errstring(save_errno)); 111206f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 111306f25ae9SGregory Neil Shapiro goto severe; 111406f25ae9SGregory Neil Shapiro } 111506f25ae9SGregory Neil Shapiro 111606f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1117c2aa98e2SPeter Wemm { 111840266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 111940266059SGregory Neil Shapiro # ifdef NETUNIX 112040266059SGregory Neil Shapiro case AF_UNIX: 112140266059SGregory Neil Shapiro socksize = sizeof d->d_addr.sunix; 112240266059SGregory Neil Shapiro break; 112340266059SGregory Neil Shapiro # endif /* NETUNIX */ 112440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1125c2aa98e2SPeter Wemm #if NETINET 1126c2aa98e2SPeter Wemm case AF_INET: 112706f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1128c2aa98e2SPeter Wemm break; 112906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 113006f25ae9SGregory Neil Shapiro 113106f25ae9SGregory Neil Shapiro #if NETINET6 113206f25ae9SGregory Neil Shapiro case AF_INET6: 113306f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 113406f25ae9SGregory Neil Shapiro break; 113506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1136c2aa98e2SPeter Wemm 1137c2aa98e2SPeter Wemm #if NETISO 1138c2aa98e2SPeter Wemm case AF_ISO: 113906f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1140c2aa98e2SPeter Wemm break; 114106f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1142c2aa98e2SPeter Wemm 1143c2aa98e2SPeter Wemm default: 114406f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1145c2aa98e2SPeter Wemm break; 1146c2aa98e2SPeter Wemm } 1147c2aa98e2SPeter Wemm 114806f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1149c2aa98e2SPeter Wemm { 1150c2aa98e2SPeter Wemm /* probably another daemon already */ 115106f25ae9SGregory Neil Shapiro save_errno = errno; 115206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 115306f25ae9SGregory Neil Shapiro d->d_name); 115406f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 115540266059SGregory Neil Shapiro goto fail; 1156c2aa98e2SPeter Wemm } 1157c2aa98e2SPeter Wemm } 115806f25ae9SGregory Neil Shapiro if (!firsttime && 115906f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1160c2aa98e2SPeter Wemm { 116106f25ae9SGregory Neil Shapiro save_errno = errno; 116206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 116306f25ae9SGregory Neil Shapiro d->d_name); 116406f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1165c2aa98e2SPeter Wemm goto severe; 1166c2aa98e2SPeter Wemm } 1167c2aa98e2SPeter Wemm return socksize; 116806f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 116906f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 117006f25ae9SGregory Neil Shapiro d->d_name); 1171065a643dSPeter Wemm /* NOTREACHED */ 1172c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1173c2aa98e2SPeter Wemm } 117440266059SGregory Neil Shapiro /* 117506f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 117606f25ae9SGregory Neil Shapiro ** 117706f25ae9SGregory Neil Shapiro ** Parameters: 117806f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 117906f25ae9SGregory Neil Shapiro ** 118006f25ae9SGregory Neil Shapiro ** Returns: 118106f25ae9SGregory Neil Shapiro ** port number on which daemon should run 118206f25ae9SGregory Neil Shapiro ** 118306f25ae9SGregory Neil Shapiro */ 118440266059SGregory Neil Shapiro 118540266059SGregory Neil Shapiro static unsigned short 118606f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 118706f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 118806f25ae9SGregory Neil Shapiro { 118940266059SGregory Neil Shapiro unsigned short port; 119006f25ae9SGregory Neil Shapiro 119106f25ae9SGregory Neil Shapiro /* 119206f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 119306f25ae9SGregory Neil Shapiro */ 119406f25ae9SGregory Neil Shapiro 119506f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 119606f25ae9SGregory Neil Shapiro { 119706f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 119806f25ae9SGregory Neil Shapiro #if NETINET 119906f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 120006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 120106f25ae9SGregory Neil Shapiro } 120206f25ae9SGregory Neil Shapiro 120306f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 120406f25ae9SGregory Neil Shapiro { 120506f25ae9SGregory Neil Shapiro #if NETINET 120606f25ae9SGregory Neil Shapiro case AF_INET: 120706f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 120806f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 120906f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 121006f25ae9SGregory Neil Shapiro break; 121106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 121206f25ae9SGregory Neil Shapiro 121306f25ae9SGregory Neil Shapiro #if NETINET6 121406f25ae9SGregory Neil Shapiro case AF_INET6: 121506f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 121606f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 121706f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 121806f25ae9SGregory Neil Shapiro break; 121906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 122006f25ae9SGregory Neil Shapiro 122106f25ae9SGregory Neil Shapiro default: 122206f25ae9SGregory Neil Shapiro /* unknown protocol */ 122306f25ae9SGregory Neil Shapiro port = 0; 122406f25ae9SGregory Neil Shapiro break; 122506f25ae9SGregory Neil Shapiro } 122606f25ae9SGregory Neil Shapiro if (port == 0) 122706f25ae9SGregory Neil Shapiro { 122806f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 122906f25ae9SGregory Neil Shapiro port = htons(25); 123006f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 123106f25ae9SGregory Neil Shapiro { 123206f25ae9SGregory Neil Shapiro register struct servent *sp; 123306f25ae9SGregory Neil Shapiro 123406f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 123506f25ae9SGregory Neil Shapiro if (sp == NULL) 123606f25ae9SGregory Neil Shapiro { 123706f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 123806f25ae9SGregory Neil Shapiro port = htons(25); 123906f25ae9SGregory Neil Shapiro } 124006f25ae9SGregory Neil Shapiro else 124106f25ae9SGregory Neil Shapiro port = sp->s_port; 124206f25ae9SGregory Neil Shapiro } 124306f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 124406f25ae9SGregory Neil Shapiro } 124506f25ae9SGregory Neil Shapiro 124606f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 124706f25ae9SGregory Neil Shapiro { 124806f25ae9SGregory Neil Shapiro #if NETINET 124906f25ae9SGregory Neil Shapiro case AF_INET: 125006f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 125106f25ae9SGregory Neil Shapiro break; 125206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 125306f25ae9SGregory Neil Shapiro 125406f25ae9SGregory Neil Shapiro #if NETINET6 125506f25ae9SGregory Neil Shapiro case AF_INET6: 125606f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 125706f25ae9SGregory Neil Shapiro break; 125806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 125906f25ae9SGregory Neil Shapiro 126006f25ae9SGregory Neil Shapiro default: 126106f25ae9SGregory Neil Shapiro /* unknown protocol */ 126206f25ae9SGregory Neil Shapiro break; 126306f25ae9SGregory Neil Shapiro } 126440266059SGregory Neil Shapiro return port; 126506f25ae9SGregory Neil Shapiro } 126640266059SGregory Neil Shapiro /* 1267c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1268c2aa98e2SPeter Wemm ** 1269c2aa98e2SPeter Wemm ** Parameters: 1270c2aa98e2SPeter Wemm ** none. 1271c2aa98e2SPeter Wemm ** 1272c2aa98e2SPeter Wemm ** Returns: 1273c2aa98e2SPeter Wemm ** none. 1274c2aa98e2SPeter Wemm ** 1275c2aa98e2SPeter Wemm ** Side Effects: 1276c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1277c2aa98e2SPeter Wemm */ 1278c2aa98e2SPeter Wemm 1279c2aa98e2SPeter Wemm void 1280c2aa98e2SPeter Wemm clrdaemon() 1281c2aa98e2SPeter Wemm { 128206f25ae9SGregory Neil Shapiro int i; 128306f25ae9SGregory Neil Shapiro 128440266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 128506f25ae9SGregory Neil Shapiro { 128606f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 128706f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 128806f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 128906f25ae9SGregory Neil Shapiro } 1290c2aa98e2SPeter Wemm } 129140266059SGregory Neil Shapiro 129240266059SGregory Neil Shapiro /* 129340266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 129440266059SGregory Neil Shapiro ** 129540266059SGregory Neil Shapiro ** Parameters: 129640266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 129740266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 129840266059SGregory Neil Shapiro ** 129940266059SGregory Neil Shapiro ** Returns: 130040266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 130140266059SGregory Neil Shapiro ** 130240266059SGregory Neil Shapiro ** Side Effects: 130340266059SGregory Neil Shapiro ** fills in modifiers. 130440266059SGregory Neil Shapiro */ 130540266059SGregory Neil Shapiro 130640266059SGregory Neil Shapiro char * 130740266059SGregory Neil Shapiro getmodifiers(v, modifiers) 130840266059SGregory Neil Shapiro char *v; 130940266059SGregory Neil Shapiro BITMAP256 modifiers; 131040266059SGregory Neil Shapiro { 131140266059SGregory Neil Shapiro int l; 131240266059SGregory Neil Shapiro char *h, *f, *flags; 131340266059SGregory Neil Shapiro 131440266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 131540266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 131640266059SGregory Neil Shapiro 131740266059SGregory Neil Shapiro /* is someone joking? */ 131840266059SGregory Neil Shapiro if (l < 0 || l > 256) 131940266059SGregory Neil Shapiro { 132040266059SGregory Neil Shapiro if (LogLevel > 2) 132140266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 132240266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 132340266059SGregory Neil Shapiro return NULL; 132440266059SGregory Neil Shapiro } 132540266059SGregory Neil Shapiro flags = xalloc(l); 132640266059SGregory Neil Shapiro f = flags; 132740266059SGregory Neil Shapiro clrbitmap(modifiers); 132840266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 132940266059SGregory Neil Shapiro { 133040266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 133140266059SGregory Neil Shapiro { 133240266059SGregory Neil Shapiro setbitn(*h, modifiers); 133340266059SGregory Neil Shapiro if (flags != f) 133440266059SGregory Neil Shapiro *flags++ = ' '; 133540266059SGregory Neil Shapiro *flags++ = *h; 133640266059SGregory Neil Shapiro if (isupper(*h)) 133740266059SGregory Neil Shapiro *flags++ = *h; 133840266059SGregory Neil Shapiro } 133940266059SGregory Neil Shapiro } 134040266059SGregory Neil Shapiro *flags++ = '\0'; 134140266059SGregory Neil Shapiro return f; 134240266059SGregory Neil Shapiro } 134340266059SGregory Neil Shapiro 134440266059SGregory Neil Shapiro /* 134540266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 134640266059SGregory Neil Shapiro ** 134740266059SGregory Neil Shapiro ** Parameters: 134840266059SGregory Neil Shapiro ** flag -- the flag to test. 134940266059SGregory Neil Shapiro ** 135040266059SGregory Neil Shapiro ** Returns: 135140266059SGregory Neil Shapiro ** true iff all daemons have set flag. 135240266059SGregory Neil Shapiro */ 135340266059SGregory Neil Shapiro 135440266059SGregory Neil Shapiro bool 135540266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 135640266059SGregory Neil Shapiro int flag; 135740266059SGregory Neil Shapiro { 135840266059SGregory Neil Shapiro int i; 135940266059SGregory Neil Shapiro 136040266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 136140266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 136240266059SGregory Neil Shapiro return false; 136340266059SGregory Neil Shapiro return true; 136440266059SGregory Neil Shapiro } 136540266059SGregory Neil Shapiro 136640266059SGregory Neil Shapiro /* 136706f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1368c2aa98e2SPeter Wemm ** 1369c2aa98e2SPeter Wemm ** Parameters: 1370c2aa98e2SPeter Wemm ** p -- the options line. 137106f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1372c2aa98e2SPeter Wemm ** 1373c2aa98e2SPeter Wemm ** Returns: 1374c2aa98e2SPeter Wemm ** none. 1375c2aa98e2SPeter Wemm */ 1376c2aa98e2SPeter Wemm 137706f25ae9SGregory Neil Shapiro static void 137806f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1379c2aa98e2SPeter Wemm register char *p; 138040266059SGregory Neil Shapiro DAEMON_T *d; 1381c2aa98e2SPeter Wemm { 138206f25ae9SGregory Neil Shapiro #if NETISO 1383193538b7SGregory Neil Shapiro short portno; 138406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1385193538b7SGregory Neil Shapiro char *port = NULL; 1386193538b7SGregory Neil Shapiro char *addr = NULL; 138706f25ae9SGregory Neil Shapiro 138806f25ae9SGregory Neil Shapiro #if NETINET 138906f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 139006f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 139106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 1392c2aa98e2SPeter Wemm 1393c2aa98e2SPeter Wemm while (p != NULL) 1394c2aa98e2SPeter Wemm { 1395c2aa98e2SPeter Wemm register char *f; 1396c2aa98e2SPeter Wemm register char *v; 1397c2aa98e2SPeter Wemm 1398c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1399c2aa98e2SPeter Wemm p++; 1400c2aa98e2SPeter Wemm if (*p == '\0') 1401c2aa98e2SPeter Wemm break; 1402c2aa98e2SPeter Wemm f = p; 1403c2aa98e2SPeter Wemm p = strchr(p, ','); 1404c2aa98e2SPeter Wemm if (p != NULL) 1405c2aa98e2SPeter Wemm *p++ = '\0'; 1406c2aa98e2SPeter Wemm v = strchr(f, '='); 1407c2aa98e2SPeter Wemm if (v == NULL) 1408c2aa98e2SPeter Wemm continue; 1409c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1410c2aa98e2SPeter Wemm continue; 1411c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1412c2aa98e2SPeter Wemm *f = toupper(*f); 1413c2aa98e2SPeter Wemm 1414c2aa98e2SPeter Wemm switch (*f) 1415c2aa98e2SPeter Wemm { 1416c2aa98e2SPeter Wemm case 'F': /* address family */ 1417c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 141806f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 141940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 142040266059SGregory Neil Shapiro # ifdef NETUNIX 142140266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 142240266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 142340266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 142440266059SGregory Neil Shapiro # endif /* NETUNIX */ 142540266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1426c2aa98e2SPeter Wemm #if NETINET 142740266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 142806f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 142906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 143006f25ae9SGregory Neil Shapiro #if NETINET6 143140266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 143206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 143306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1434c2aa98e2SPeter Wemm #if NETISO 143540266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 143606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 143706f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1438c2aa98e2SPeter Wemm #if NETNS 143940266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 144006f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 144106f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1442c2aa98e2SPeter Wemm #if NETX25 144340266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 144406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 144506f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1446c2aa98e2SPeter Wemm else 144706f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 144806f25ae9SGregory Neil Shapiro v); 1449c2aa98e2SPeter Wemm break; 1450c2aa98e2SPeter Wemm 1451c2aa98e2SPeter Wemm case 'A': /* address */ 1452193538b7SGregory Neil Shapiro addr = v; 1453c2aa98e2SPeter Wemm break; 1454c2aa98e2SPeter Wemm 145540266059SGregory Neil Shapiro #if MILTER 145640266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 145740266059SGregory Neil Shapiro case 'I': 145840266059SGregory Neil Shapiro d->d_inputfilterlist = v; 145940266059SGregory Neil Shapiro break; 146040266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 146140266059SGregory Neil Shapiro #endif /* MILTER */ 146240266059SGregory Neil Shapiro 1463c2aa98e2SPeter Wemm case 'P': /* port */ 1464193538b7SGregory Neil Shapiro port = v; 1465c2aa98e2SPeter Wemm break; 1466c2aa98e2SPeter Wemm 1467c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 146806f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 146906f25ae9SGregory Neil Shapiro break; 147006f25ae9SGregory Neil Shapiro 147106f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 147240266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1473c2aa98e2SPeter Wemm break; 1474c2aa98e2SPeter Wemm 1475c2aa98e2SPeter Wemm case 'S': /* send buffer size */ 147606f25ae9SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1477c2aa98e2SPeter Wemm break; 1478c2aa98e2SPeter Wemm 1479c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 148006f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 148106f25ae9SGregory Neil Shapiro break; 148206f25ae9SGregory Neil Shapiro 148306f25ae9SGregory Neil Shapiro case 'N': /* name */ 148406f25ae9SGregory Neil Shapiro d->d_name = v; 1485c2aa98e2SPeter Wemm break; 1486c2aa98e2SPeter Wemm 1487c2aa98e2SPeter Wemm default: 148806f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 148906f25ae9SGregory Neil Shapiro f); 1490c2aa98e2SPeter Wemm } 1491c2aa98e2SPeter Wemm } 1492193538b7SGregory Neil Shapiro 1493193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1494193538b7SGregory Neil Shapiro if (addr != NULL) 1495193538b7SGregory Neil Shapiro { 1496193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1497193538b7SGregory Neil Shapiro { 149840266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 149940266059SGregory Neil Shapiro # if NETUNIX 150040266059SGregory Neil Shapiro case AF_UNIX: 150140266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 150240266059SGregory Neil Shapiro { 150340266059SGregory Neil Shapiro errno = ENAMETOOLONG; 150440266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 150540266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 150640266059SGregory Neil Shapiro break; 150740266059SGregory Neil Shapiro } 150840266059SGregory Neil Shapiro 150940266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 151040266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 151140266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 151240266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 151340266059SGregory Neil Shapiro addr, 151440266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 151540266059SGregory Neil Shapiro break; 151640266059SGregory Neil Shapiro # endif /* NETUNIX */ 151740266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1518193538b7SGregory Neil Shapiro #if NETINET 1519193538b7SGregory Neil Shapiro case AF_INET: 1520193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 152140266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 152240266059SGregory Neil Shapiro == INADDR_NONE)) 1523193538b7SGregory Neil Shapiro { 1524193538b7SGregory Neil Shapiro register struct hostent *hp; 1525193538b7SGregory Neil Shapiro 1526193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1527193538b7SGregory Neil Shapiro if (hp == NULL) 1528193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1529193538b7SGregory Neil Shapiro addr); 1530193538b7SGregory Neil Shapiro else 1531193538b7SGregory Neil Shapiro { 1532193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1533193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1534193538b7SGregory Neil Shapiro hp->h_addr_list++; 1535193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1536193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1537193538b7SGregory Neil Shapiro addr); 1538193538b7SGregory Neil Shapiro else 1539193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1540193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1541193538b7SGregory Neil Shapiro INADDRSZ); 154240266059SGregory Neil Shapiro # if NETINET6 1543193538b7SGregory Neil Shapiro freehostent(hp); 1544193538b7SGregory Neil Shapiro hp = NULL; 154540266059SGregory Neil Shapiro # endif /* NETINET6 */ 1546193538b7SGregory Neil Shapiro } 1547193538b7SGregory Neil Shapiro } 1548193538b7SGregory Neil Shapiro break; 1549193538b7SGregory Neil Shapiro #endif /* NETINET */ 1550193538b7SGregory Neil Shapiro 1551193538b7SGregory Neil Shapiro #if NETINET6 1552193538b7SGregory Neil Shapiro case AF_INET6: 155340266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1554193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1555193538b7SGregory Neil Shapiro { 1556193538b7SGregory Neil Shapiro register struct hostent *hp; 1557193538b7SGregory Neil Shapiro 1558193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1559193538b7SGregory Neil Shapiro if (hp == NULL) 1560193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1561193538b7SGregory Neil Shapiro addr); 1562193538b7SGregory Neil Shapiro else 1563193538b7SGregory Neil Shapiro { 1564193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1565193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1566193538b7SGregory Neil Shapiro hp->h_addr_list++; 1567193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1568193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1569193538b7SGregory Neil Shapiro addr); 1570193538b7SGregory Neil Shapiro else 1571193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1572193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1573193538b7SGregory Neil Shapiro IN6ADDRSZ); 1574193538b7SGregory Neil Shapiro freehostent(hp); 1575193538b7SGregory Neil Shapiro hp = NULL; 1576193538b7SGregory Neil Shapiro } 1577193538b7SGregory Neil Shapiro } 1578193538b7SGregory Neil Shapiro break; 1579193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1580193538b7SGregory Neil Shapiro 1581193538b7SGregory Neil Shapiro default: 1582193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1583193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1584193538b7SGregory Neil Shapiro break; 1585193538b7SGregory Neil Shapiro } 1586193538b7SGregory Neil Shapiro } 1587193538b7SGregory Neil Shapiro 1588193538b7SGregory Neil Shapiro if (port != NULL) 1589193538b7SGregory Neil Shapiro { 1590193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1591193538b7SGregory Neil Shapiro { 1592193538b7SGregory Neil Shapiro #if NETINET 1593193538b7SGregory Neil Shapiro case AF_INET: 1594193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 159540266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 159640266059SGregory Neil Shapiro atoi((const char *) port)); 1597193538b7SGregory Neil Shapiro else 1598193538b7SGregory Neil Shapiro { 1599193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1600193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1601193538b7SGregory Neil Shapiro port); 1602193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1603193538b7SGregory Neil Shapiro register struct servent *sp; 1604193538b7SGregory Neil Shapiro 1605193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1606193538b7SGregory Neil Shapiro if (sp == NULL) 1607193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1608193538b7SGregory Neil Shapiro port); 1609193538b7SGregory Neil Shapiro else 1610193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1611193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1612193538b7SGregory Neil Shapiro } 1613193538b7SGregory Neil Shapiro break; 1614193538b7SGregory Neil Shapiro #endif /* NETINET */ 1615193538b7SGregory Neil Shapiro 1616193538b7SGregory Neil Shapiro #if NETINET6 1617193538b7SGregory Neil Shapiro case AF_INET6: 1618193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 161940266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 162040266059SGregory Neil Shapiro atoi(port)); 1621193538b7SGregory Neil Shapiro else 1622193538b7SGregory Neil Shapiro { 1623193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1624193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1625193538b7SGregory Neil Shapiro port); 1626193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1627193538b7SGregory Neil Shapiro register struct servent *sp; 1628193538b7SGregory Neil Shapiro 1629193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1630193538b7SGregory Neil Shapiro if (sp == NULL) 1631193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1632193538b7SGregory Neil Shapiro port); 1633193538b7SGregory Neil Shapiro else 1634193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1635193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1636193538b7SGregory Neil Shapiro } 1637193538b7SGregory Neil Shapiro break; 1638193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1639193538b7SGregory Neil Shapiro 1640193538b7SGregory Neil Shapiro #if NETISO 1641193538b7SGregory Neil Shapiro case AF_ISO: 1642193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1643193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 164440266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1645193538b7SGregory Neil Shapiro else 1646193538b7SGregory Neil Shapiro { 1647193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1648193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1649193538b7SGregory Neil Shapiro port); 1650193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1651193538b7SGregory Neil Shapiro register struct servent *sp; 1652193538b7SGregory Neil Shapiro 1653193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1654193538b7SGregory Neil Shapiro if (sp == NULL) 1655193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1656193538b7SGregory Neil Shapiro port); 1657193538b7SGregory Neil Shapiro else 1658193538b7SGregory Neil Shapiro portno = sp->s_port; 1659193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1660193538b7SGregory Neil Shapiro } 1661193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1662193538b7SGregory Neil Shapiro (char *) &portno, 2); 1663193538b7SGregory Neil Shapiro break; 1664193538b7SGregory Neil Shapiro #endif /* NETISO */ 1665193538b7SGregory Neil Shapiro 1666193538b7SGregory Neil Shapiro default: 1667193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1668193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1669193538b7SGregory Neil Shapiro break; 1670193538b7SGregory Neil Shapiro } 1671193538b7SGregory Neil Shapiro } 1672c2aa98e2SPeter Wemm } 167340266059SGregory Neil Shapiro /* 167406f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 167506f25ae9SGregory Neil Shapiro ** 167606f25ae9SGregory Neil Shapiro ** Parameters: 167706f25ae9SGregory Neil Shapiro ** p -- the options line. 167806f25ae9SGregory Neil Shapiro ** 167906f25ae9SGregory Neil Shapiro ** Returns: 168040266059SGregory Neil Shapiro ** true if successful, false otherwise. 168140266059SGregory Neil Shapiro ** 168240266059SGregory Neil Shapiro ** Side Effects: 168340266059SGregory Neil Shapiro ** increments number of daemons. 168406f25ae9SGregory Neil Shapiro */ 168506f25ae9SGregory Neil Shapiro 168640266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 168740266059SGregory Neil Shapiro 168806f25ae9SGregory Neil Shapiro bool 168906f25ae9SGregory Neil Shapiro setdaemonoptions(p) 169006f25ae9SGregory Neil Shapiro register char *p; 169106f25ae9SGregory Neil Shapiro { 169240266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 169340266059SGregory Neil Shapiro return false; 169440266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 169540266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 169640266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 169740266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 169806f25ae9SGregory Neil Shapiro 169940266059SGregory Neil Shapiro #if MILTER 170040266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 170140266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 170240266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 170340266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 170440266059SGregory Neil Shapiro #endif /* MILTER */ 170540266059SGregory Neil Shapiro 170640266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 170740266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 170806f25ae9SGregory Neil Shapiro else 170906f25ae9SGregory Neil Shapiro { 171006f25ae9SGregory Neil Shapiro char num[30]; 171106f25ae9SGregory Neil Shapiro 171240266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Daemon%d", NDaemons); 171340266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 171406f25ae9SGregory Neil Shapiro } 171506f25ae9SGregory Neil Shapiro 171606f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 171706f25ae9SGregory Neil Shapiro { 171840266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 171940266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[NDaemons].d_flags)) 172040266059SGregory Neil Shapiro sm_dprintf("ETRNONLY "); 172140266059SGregory Neil Shapiro if (bitnset(D_NOETRN, Daemons[NDaemons].d_flags)) 172240266059SGregory Neil Shapiro sm_dprintf("NOETRN "); 172340266059SGregory Neil Shapiro sm_dprintf("\n"); 172406f25ae9SGregory Neil Shapiro } 172540266059SGregory Neil Shapiro ++NDaemons; 172640266059SGregory Neil Shapiro return true; 172706f25ae9SGregory Neil Shapiro } 172840266059SGregory Neil Shapiro /* 172906f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 173006f25ae9SGregory Neil Shapiro ** 173106f25ae9SGregory Neil Shapiro ** Parameters: 173206f25ae9SGregory Neil Shapiro ** none 173306f25ae9SGregory Neil Shapiro ** 173406f25ae9SGregory Neil Shapiro ** Returns: 173506f25ae9SGregory Neil Shapiro ** none 173606f25ae9SGregory Neil Shapiro ** 173706f25ae9SGregory Neil Shapiro ** Side Effects: 173806f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 173906f25ae9SGregory Neil Shapiro */ 174040266059SGregory Neil Shapiro 174106f25ae9SGregory Neil Shapiro void 174206f25ae9SGregory Neil Shapiro initdaemon() 174306f25ae9SGregory Neil Shapiro { 174440266059SGregory Neil Shapiro if (NDaemons == 0) 174506f25ae9SGregory Neil Shapiro { 174640266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 174740266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 174840266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 174940266059SGregory Neil Shapiro NDaemons = 1; 175006f25ae9SGregory Neil Shapiro } 175106f25ae9SGregory Neil Shapiro } 175240266059SGregory Neil Shapiro /* 175306f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 175406f25ae9SGregory Neil Shapiro ** 175506f25ae9SGregory Neil Shapiro ** Parameters: 175606f25ae9SGregory Neil Shapiro ** p -- the options line. 175706f25ae9SGregory Neil Shapiro ** 175806f25ae9SGregory Neil Shapiro ** Returns: 175906f25ae9SGregory Neil Shapiro ** none. 176006f25ae9SGregory Neil Shapiro */ 176106f25ae9SGregory Neil Shapiro 176240266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 176306f25ae9SGregory Neil Shapiro 176406f25ae9SGregory Neil Shapiro void 176506f25ae9SGregory Neil Shapiro setclientoptions(p) 176606f25ae9SGregory Neil Shapiro register char *p; 176706f25ae9SGregory Neil Shapiro { 176840266059SGregory Neil Shapiro int family; 176940266059SGregory Neil Shapiro DAEMON_T d; 177006f25ae9SGregory Neil Shapiro 177106f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 177206f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 177306f25ae9SGregory Neil Shapiro 177406f25ae9SGregory Neil Shapiro /* grab what we need */ 177540266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 177640266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 177740266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 177840266059SGregory Neil Shapiro if (d.d_name != NULL) 177940266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 178006f25ae9SGregory Neil Shapiro else 178140266059SGregory Neil Shapiro { 178240266059SGregory Neil Shapiro char num[30]; 178340266059SGregory Neil Shapiro 178440266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Client%d", family); 178540266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 178606f25ae9SGregory Neil Shapiro } 178740266059SGregory Neil Shapiro } 178840266059SGregory Neil Shapiro /* 178906f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 179006f25ae9SGregory Neil Shapiro ** 179106f25ae9SGregory Neil Shapiro ** Parameters: 179206f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 179306f25ae9SGregory Neil Shapiro ** 179406f25ae9SGregory Neil Shapiro ** Returns: 179506f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 179606f25ae9SGregory Neil Shapiro ** 179706f25ae9SGregory Neil Shapiro ** Side Effects: 179806f25ae9SGregory Neil Shapiro ** none. 179906f25ae9SGregory Neil Shapiro */ 180006f25ae9SGregory Neil Shapiro 180106f25ae9SGregory Neil Shapiro static int 180206f25ae9SGregory Neil Shapiro addr_family(addr) 180306f25ae9SGregory Neil Shapiro char *addr; 180406f25ae9SGregory Neil Shapiro { 180506f25ae9SGregory Neil Shapiro #if NETINET6 180606f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 180706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 180806f25ae9SGregory Neil Shapiro 180906f25ae9SGregory Neil Shapiro #if NETINET 181006f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 181106f25ae9SGregory Neil Shapiro { 181206f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 181340266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 181406f25ae9SGregory Neil Shapiro return AF_INET; 181506f25ae9SGregory Neil Shapiro } 181606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 181706f25ae9SGregory Neil Shapiro #if NETINET6 181840266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 181906f25ae9SGregory Neil Shapiro { 182006f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 182140266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 182206f25ae9SGregory Neil Shapiro return AF_INET6; 182306f25ae9SGregory Neil Shapiro } 182406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 182540266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 182640266059SGregory Neil Shapiro # if NETUNIX 182740266059SGregory Neil Shapiro if (*addr == '/') 182840266059SGregory Neil Shapiro { 182906f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 183040266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 183140266059SGregory Neil Shapiro return AF_UNIX; 183240266059SGregory Neil Shapiro } 183340266059SGregory Neil Shapiro # endif /* NETUNIX */ 183440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 183540266059SGregory Neil Shapiro if (tTd(16, 9)) 183640266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 183706f25ae9SGregory Neil Shapiro return AF_UNSPEC; 183806f25ae9SGregory Neil Shapiro } 183940266059SGregory Neil Shapiro 184040266059SGregory Neil Shapiro /* 184140266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 184240266059SGregory Neil Shapiro ** 184340266059SGregory Neil Shapiro ** Parameters: 184440266059SGregory Neil Shapiro ** flag -- the flag to test. 184540266059SGregory Neil Shapiro ** 184640266059SGregory Neil Shapiro ** Returns: 184740266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 184840266059SGregory Neil Shapiro */ 184940266059SGregory Neil Shapiro 185040266059SGregory Neil Shapiro bool 185140266059SGregory Neil Shapiro chkclientmodifiers(flag) 185240266059SGregory Neil Shapiro int flag; 185340266059SGregory Neil Shapiro { 185440266059SGregory Neil Shapiro int i; 185540266059SGregory Neil Shapiro bool flagisset; 185640266059SGregory Neil Shapiro 185740266059SGregory Neil Shapiro flagisset = false; 185840266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 185940266059SGregory Neil Shapiro { 186040266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 186140266059SGregory Neil Shapiro { 186240266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 186340266059SGregory Neil Shapiro return false; 186440266059SGregory Neil Shapiro flagisset = true; 186540266059SGregory Neil Shapiro } 186640266059SGregory Neil Shapiro } 186740266059SGregory Neil Shapiro return flagisset; 186840266059SGregory Neil Shapiro } 186940266059SGregory Neil Shapiro 187040266059SGregory Neil Shapiro #if MILTER 187140266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 187240266059SGregory Neil Shapiro /* 187340266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 187440266059SGregory Neil Shapiro ** 187540266059SGregory Neil Shapiro ** Parameters: 187640266059SGregory Neil Shapiro ** none 187740266059SGregory Neil Shapiro ** 187840266059SGregory Neil Shapiro ** Returns: 187940266059SGregory Neil Shapiro ** none 188040266059SGregory Neil Shapiro */ 188140266059SGregory Neil Shapiro 188240266059SGregory Neil Shapiro void 188340266059SGregory Neil Shapiro setup_daemon_milters() 188440266059SGregory Neil Shapiro { 188540266059SGregory Neil Shapiro int idx; 188640266059SGregory Neil Shapiro 188740266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 188840266059SGregory Neil Shapiro { 188940266059SGregory Neil Shapiro /* no need to configure the daemons */ 189040266059SGregory Neil Shapiro return; 189140266059SGregory Neil Shapiro } 189240266059SGregory Neil Shapiro 189340266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 189440266059SGregory Neil Shapiro { 189540266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 189640266059SGregory Neil Shapiro { 189740266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 189840266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 189940266059SGregory Neil Shapiro MAXFILTERS); 190040266059SGregory Neil Shapiro } 190140266059SGregory Neil Shapiro } 190240266059SGregory Neil Shapiro } 190340266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 190440266059SGregory Neil Shapiro #endif /* MILTER */ 190540266059SGregory Neil Shapiro /* 190606f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 1907c2aa98e2SPeter Wemm ** 1908c2aa98e2SPeter Wemm ** Parameters: 1909c2aa98e2SPeter Wemm ** host -- the name of the host. 1910c2aa98e2SPeter Wemm ** port -- the port number to connect to. 1911c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 1912c2aa98e2SPeter Wemm ** structure to be filled in. 1913c2aa98e2SPeter Wemm ** e -- the current envelope. 191440266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 191540266059SGregory Neil Shapiro ** (0 means no limit) 1916c2aa98e2SPeter Wemm ** 1917c2aa98e2SPeter Wemm ** Returns: 1918c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 1919c2aa98e2SPeter Wemm ** made and if not why not. 1920c2aa98e2SPeter Wemm ** 1921c2aa98e2SPeter Wemm ** Side Effects: 1922c2aa98e2SPeter Wemm ** none. 1923c2aa98e2SPeter Wemm */ 1924c2aa98e2SPeter Wemm 1925c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 1926c2aa98e2SPeter Wemm 1927c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 1928c2aa98e2SPeter Wemm 1929c2aa98e2SPeter Wemm int 193040266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 1931c2aa98e2SPeter Wemm char *host; 193240266059SGregory Neil Shapiro volatile unsigned int port; 1933c2aa98e2SPeter Wemm register MCI *mci; 1934c2aa98e2SPeter Wemm ENVELOPE *e; 193540266059SGregory Neil Shapiro time_t enough; 1936c2aa98e2SPeter Wemm { 1937c2aa98e2SPeter Wemm register volatile int addrno = 0; 193840266059SGregory Neil Shapiro volatile int s; 1939c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 1940c2aa98e2SPeter Wemm SOCKADDR addr; 194106f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 194206f25ae9SGregory Neil Shapiro int save_errno = 0; 194306f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 1944c2aa98e2SPeter Wemm volatile bool firstconnect; 194540266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 194606f25ae9SGregory Neil Shapiro #if NETINET6 194740266059SGregory Neil Shapiro volatile bool v6found = false; 194806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 194906f25ae9SGregory Neil Shapiro volatile int family = InetMode; 195006f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 195106f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 195206f25ae9SGregory Neil Shapiro volatile bool clt_bind; 195306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 195406f25ae9SGregory Neil Shapiro char *p; 195506f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 195606f25ae9SGregory Neil Shapiro 195740266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 195806f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 195940266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 196006f25ae9SGregory Neil Shapiro { 196106f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 196206f25ae9SGregory Neil Shapiro { 196306f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 1964193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 196506f25ae9SGregory Neil Shapiro } 196606f25ae9SGregory Neil Shapiro } 196706f25ae9SGregory Neil Shapiro 196806f25ae9SGregory Neil Shapiro #if NETINET6 196906f25ae9SGregory Neil Shapiro v4retry: 197006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 197140266059SGregory Neil Shapiro clt_bind = false; 197206f25ae9SGregory Neil Shapiro 197306f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 197406f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 197540266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 1976602a2b1bSGregory Neil Shapiro *p != '\0') 197706f25ae9SGregory Neil Shapiro { 197806f25ae9SGregory Neil Shapiro #if NETINET6 197906f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 198006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 198106f25ae9SGregory Neil Shapiro 198206f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 198306f25ae9SGregory Neil Shapiro 198406f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 198506f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 198606f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 198706f25ae9SGregory Neil Shapiro { 198806f25ae9SGregory Neil Shapiro #if NETINET 198906f25ae9SGregory Neil Shapiro case AF_INET: 1990602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 1991602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 1992602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 199306f25ae9SGregory Neil Shapiro { 199440266059SGregory Neil Shapiro clt_bind = true; 199506f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 199606f25ae9SGregory Neil Shapiro } 199706f25ae9SGregory Neil Shapiro break; 199806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 199906f25ae9SGregory Neil Shapiro 200006f25ae9SGregory Neil Shapiro #if NETINET6 200106f25ae9SGregory Neil Shapiro case AF_INET6: 200206f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 200340266059SGregory Neil Shapiro (void) sm_snprintf(p6, sizeof p6, 200440266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 200506f25ae9SGregory Neil Shapiro else 200640266059SGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof p6); 200740266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2008602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2009602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 201006f25ae9SGregory Neil Shapiro { 201140266059SGregory Neil Shapiro clt_bind = true; 201206f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 201306f25ae9SGregory Neil Shapiro } 201406f25ae9SGregory Neil Shapiro break; 201506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 201606f25ae9SGregory Neil Shapiro 201706f25ae9SGregory Neil Shapiro #if 0 201806f25ae9SGregory Neil Shapiro default: 201906f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 202006f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 202106f25ae9SGregory Neil Shapiro break; 202206f25ae9SGregory Neil Shapiro #endif /* 0 */ 202306f25ae9SGregory Neil Shapiro } 202406f25ae9SGregory Neil Shapiro if (clt_bind) 202506f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 202606f25ae9SGregory Neil Shapiro } 202740266059SGregory Neil Shapiro 202840266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 202940266059SGregory Neil Shapiro if (!clt_bind) 203006f25ae9SGregory Neil Shapiro { 203140266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 203206f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 203306f25ae9SGregory Neil Shapiro { 203406f25ae9SGregory Neil Shapiro #if NETINET 203506f25ae9SGregory Neil Shapiro case AF_INET: 203606f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 203706f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 203806f25ae9SGregory Neil Shapiro else 203940266059SGregory Neil Shapiro clt_bind = true; 204006f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 204140266059SGregory Neil Shapiro clt_bind = true; 204206f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 204306f25ae9SGregory Neil Shapiro break; 204406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 204506f25ae9SGregory Neil Shapiro #if NETINET6 204606f25ae9SGregory Neil Shapiro case AF_INET6: 204706f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 204806f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 204906f25ae9SGregory Neil Shapiro else 205040266059SGregory Neil Shapiro clt_bind = true; 205106f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 205206f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 205340266059SGregory Neil Shapiro clt_bind = true; 205406f25ae9SGregory Neil Shapiro break; 205506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 205606f25ae9SGregory Neil Shapiro #if NETISO 205706f25ae9SGregory Neil Shapiro case AF_ISO: 205806f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 205940266059SGregory Neil Shapiro clt_bind = true; 206006f25ae9SGregory Neil Shapiro break; 206106f25ae9SGregory Neil Shapiro #endif /* NETISO */ 206206f25ae9SGregory Neil Shapiro default: 206306f25ae9SGregory Neil Shapiro break; 206406f25ae9SGregory Neil Shapiro } 206506f25ae9SGregory Neil Shapiro } 2066c2aa98e2SPeter Wemm 2067c2aa98e2SPeter Wemm /* 2068c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2069c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2070c2aa98e2SPeter Wemm */ 2071c2aa98e2SPeter Wemm 2072602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2073c2aa98e2SPeter Wemm errno = 0; 207406f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 207506f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 2076c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2077c2aa98e2SPeter Wemm CurHostName = host; 2078c2aa98e2SPeter Wemm 2079c2aa98e2SPeter Wemm if (host[0] == '[') 2080c2aa98e2SPeter Wemm { 208106f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2082c2aa98e2SPeter Wemm if (p != NULL) 2083c2aa98e2SPeter Wemm { 2084c2aa98e2SPeter Wemm #if NETINET 208506f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 208606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 208706f25ae9SGregory Neil Shapiro #if NETINET6 208806f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 208906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 209006f25ae9SGregory Neil Shapiro 209106f25ae9SGregory Neil Shapiro *p = '\0'; 209206f25ae9SGregory Neil Shapiro #if NETINET6 209306f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 209406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 209506f25ae9SGregory Neil Shapiro #if NETINET 209606f25ae9SGregory Neil Shapiro if (family == AF_INET && 209706f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 209806f25ae9SGregory Neil Shapiro { 209906f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 210006f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 210106f25ae9SGregory Neil Shapiro } 210206f25ae9SGregory Neil Shapiro else 210306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 210406f25ae9SGregory Neil Shapiro #if NETINET6 210506f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 210640266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 210706f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 210806f25ae9SGregory Neil Shapiro { 210906f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 211006f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 211106f25ae9SGregory Neil Shapiro } 211206f25ae9SGregory Neil Shapiro else 211306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2114c2aa98e2SPeter Wemm { 2115c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 211606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2117c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2118c2aa98e2SPeter Wemm { 2119c2aa98e2SPeter Wemm #if NAMED_BIND 2120c2aa98e2SPeter Wemm int oldopts = _res.options; 2121c2aa98e2SPeter Wemm 2122c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 212306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2124c2aa98e2SPeter Wemm p[-1] = '\0'; 212506f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 212606f25ae9SGregory Neil Shapiro family); 2127c2aa98e2SPeter Wemm p[-1] = '.'; 2128c2aa98e2SPeter Wemm #if NAMED_BIND 2129c2aa98e2SPeter Wemm _res.options = oldopts; 213006f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2131c2aa98e2SPeter Wemm } 2132c2aa98e2SPeter Wemm *p = ']'; 2133c2aa98e2SPeter Wemm goto gothostent; 2134c2aa98e2SPeter Wemm } 2135c2aa98e2SPeter Wemm *p = ']'; 2136c2aa98e2SPeter Wemm } 2137c2aa98e2SPeter Wemm if (p == NULL) 2138c2aa98e2SPeter Wemm { 2139c2aa98e2SPeter Wemm extern char MsgBuf[]; 2140c2aa98e2SPeter Wemm 214106f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 214206f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 214306f25ae9SGregory Neil Shapiro host); 2144c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 214506f25ae9SGregory Neil Shapiro errno = EINVAL; 2146c2aa98e2SPeter Wemm return EX_NOHOST; 2147c2aa98e2SPeter Wemm } 2148c2aa98e2SPeter Wemm } 2149c2aa98e2SPeter Wemm else 2150c2aa98e2SPeter Wemm { 2151c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2152c2aa98e2SPeter Wemm { 215306f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 215406f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2155c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2156c2aa98e2SPeter Wemm { 2157c2aa98e2SPeter Wemm #if NAMED_BIND 2158c2aa98e2SPeter Wemm int oldopts = _res.options; 2159c2aa98e2SPeter Wemm 2160c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 216106f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2162c2aa98e2SPeter Wemm *p = '\0'; 216306f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2164c2aa98e2SPeter Wemm *p = '.'; 2165c2aa98e2SPeter Wemm #if NAMED_BIND 2166c2aa98e2SPeter Wemm _res.options = oldopts; 216706f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2168c2aa98e2SPeter Wemm } 2169c2aa98e2SPeter Wemm } 2170c2aa98e2SPeter Wemm gothostent: 2171c2aa98e2SPeter Wemm if (hp == NULL) 2172c2aa98e2SPeter Wemm { 2173c2aa98e2SPeter Wemm #if NAMED_BIND 2174c2aa98e2SPeter Wemm /* check for name server timeouts */ 217540266059SGregory Neil Shapiro # if NETINET6 217640266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 217740266059SGregory Neil Shapiro errno == ETIMEDOUT) 217840266059SGregory Neil Shapiro { 217940266059SGregory Neil Shapiro /* 218040266059SGregory Neil Shapiro ** An attempt with family AF_INET may 218140266059SGregory Neil Shapiro ** succeed By skipping the next section 218240266059SGregory Neil Shapiro ** of code, we will try AF_INET before 218340266059SGregory Neil Shapiro ** failing. 218440266059SGregory Neil Shapiro */ 218540266059SGregory Neil Shapiro 218640266059SGregory Neil Shapiro if (tTd(16, 10)) 218740266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 218840266059SGregory Neil Shapiro } 218940266059SGregory Neil Shapiro else 219040266059SGregory Neil Shapiro # endif /* NETINET6 */ 219140266059SGregory Neil Shapiro { 219240266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 219340266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2194c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2195c2aa98e2SPeter Wemm { 219606f25ae9SGregory Neil Shapiro save_errno = errno; 219740266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 219840266059SGregory Neil Shapiro "4.4.3", NULL); 219906f25ae9SGregory Neil Shapiro errno = save_errno; 2200c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2201c2aa98e2SPeter Wemm } 220240266059SGregory Neil Shapiro } 220306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 220406f25ae9SGregory Neil Shapiro #if NETINET6 220506f25ae9SGregory Neil Shapiro /* 220606f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 220706f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 220806f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 220906f25ae9SGregory Neil Shapiro */ 221006f25ae9SGregory Neil Shapiro 221106f25ae9SGregory Neil Shapiro if (family == AF_INET6) 221206f25ae9SGregory Neil Shapiro { 221306f25ae9SGregory Neil Shapiro family = AF_INET; 221406f25ae9SGregory Neil Shapiro goto v4retry; 221506f25ae9SGregory Neil Shapiro } 221606f25ae9SGregory Neil Shapiro if (v6found) 221706f25ae9SGregory Neil Shapiro goto v6tempfail; 221806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 221906f25ae9SGregory Neil Shapiro save_errno = errno; 2220c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 222106f25ae9SGregory Neil Shapiro errno = save_errno; 222206f25ae9SGregory Neil Shapiro return EX_NOHOST; 2223c2aa98e2SPeter Wemm } 2224c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2225c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2226c2aa98e2SPeter Wemm { 2227c2aa98e2SPeter Wemm #if NETINET 2228c2aa98e2SPeter Wemm case AF_INET: 222906f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 223006f25ae9SGregory Neil Shapiro hp->h_addr, 2231c2aa98e2SPeter Wemm INADDRSZ); 2232c2aa98e2SPeter Wemm break; 223306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 223406f25ae9SGregory Neil Shapiro 223506f25ae9SGregory Neil Shapiro #if NETINET6 223606f25ae9SGregory Neil Shapiro case AF_INET6: 223706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 223806f25ae9SGregory Neil Shapiro hp->h_addr, 223906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 224006f25ae9SGregory Neil Shapiro break; 224106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2242c2aa98e2SPeter Wemm 2243c2aa98e2SPeter Wemm default: 2244c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 2245c2aa98e2SPeter Wemm { 2246c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2247c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2248c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 224906f25ae9SGregory Neil Shapiro errno = EINVAL; 2250c2aa98e2SPeter Wemm return EX_NOHOST; 2251c2aa98e2SPeter Wemm } 225240266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2253c2aa98e2SPeter Wemm break; 2254c2aa98e2SPeter Wemm } 2255c2aa98e2SPeter Wemm addrno = 1; 2256c2aa98e2SPeter Wemm } 2257c2aa98e2SPeter Wemm 2258c2aa98e2SPeter Wemm /* 2259c2aa98e2SPeter Wemm ** Determine the port number. 2260c2aa98e2SPeter Wemm */ 2261c2aa98e2SPeter Wemm 2262c2aa98e2SPeter Wemm if (port == 0) 2263c2aa98e2SPeter Wemm { 226406f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 226506f25ae9SGregory Neil Shapiro port = htons(25); 226606f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2267c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2268c2aa98e2SPeter Wemm 2269c2aa98e2SPeter Wemm if (sp == NULL) 2270c2aa98e2SPeter Wemm { 2271c2aa98e2SPeter Wemm if (LogLevel > 2) 2272c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2273c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2274c2aa98e2SPeter Wemm port = htons(25); 2275c2aa98e2SPeter Wemm } 2276c2aa98e2SPeter Wemm else 2277c2aa98e2SPeter Wemm port = sp->s_port; 227806f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2279c2aa98e2SPeter Wemm } 2280c2aa98e2SPeter Wemm 228140266059SGregory Neil Shapiro #if NETINET6 228240266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 228340266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 228440266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 228540266059SGregory Neil Shapiro { 228640266059SGregory Neil Shapiro /* 228740266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 228840266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 228940266059SGregory Neil Shapiro ** for IPv4. 229040266059SGregory Neil Shapiro */ 229140266059SGregory Neil Shapiro 229240266059SGregory Neil Shapiro goto nextaddr; 229340266059SGregory Neil Shapiro } 229440266059SGregory Neil Shapiro #endif /* NETINET6 */ 229540266059SGregory Neil Shapiro 2296c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2297c2aa98e2SPeter Wemm { 2298c2aa98e2SPeter Wemm #if NETINET 2299c2aa98e2SPeter Wemm case AF_INET: 2300c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2301c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 2302c2aa98e2SPeter Wemm break; 230306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 230406f25ae9SGregory Neil Shapiro 230506f25ae9SGregory Neil Shapiro #if NETINET6 230606f25ae9SGregory Neil Shapiro case AF_INET6: 230706f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 230806f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 230906f25ae9SGregory Neil Shapiro break; 231006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2311c2aa98e2SPeter Wemm 2312c2aa98e2SPeter Wemm #if NETISO 2313c2aa98e2SPeter Wemm case AF_ISO: 2314c2aa98e2SPeter Wemm /* assume two byte transport selector */ 231506f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2316c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 2317c2aa98e2SPeter Wemm break; 231806f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2319c2aa98e2SPeter Wemm 2320c2aa98e2SPeter Wemm default: 2321c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2322c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 232306f25ae9SGregory Neil Shapiro errno = EINVAL; 232440266059SGregory Neil Shapiro #if NETINET6 2325193538b7SGregory Neil Shapiro if (hp != NULL) 2326193538b7SGregory Neil Shapiro freehostent(hp); 232740266059SGregory Neil Shapiro #endif /* NETINET6 */ 232806f25ae9SGregory Neil Shapiro return EX_NOHOST; 2329c2aa98e2SPeter Wemm } 2330c2aa98e2SPeter Wemm 2331c2aa98e2SPeter Wemm /* 2332c2aa98e2SPeter Wemm ** Try to actually open the connection. 2333c2aa98e2SPeter Wemm */ 2334c2aa98e2SPeter Wemm 233540266059SGregory Neil Shapiro #if XLA 2336c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2337c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2338193538b7SGregory Neil Shapiro { 233940266059SGregory Neil Shapiro # if NETINET6 2340193538b7SGregory Neil Shapiro if (hp != NULL) 2341193538b7SGregory Neil Shapiro freehostent(hp); 234240266059SGregory Neil Shapiro # endif /* NETINET6 */ 2343c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2344193538b7SGregory Neil Shapiro } 234506f25ae9SGregory Neil Shapiro #endif /* XLA */ 2346c2aa98e2SPeter Wemm 234740266059SGregory Neil Shapiro firstconnect = true; 2348c2aa98e2SPeter Wemm for (;;) 2349c2aa98e2SPeter Wemm { 2350c2aa98e2SPeter Wemm if (tTd(16, 1)) 235140266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 23528774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 235340266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2354c2aa98e2SPeter Wemm 2355c2aa98e2SPeter Wemm /* save for logging */ 2356c2aa98e2SPeter Wemm CurHostAddr = addr; 2357c2aa98e2SPeter Wemm 235840266059SGregory Neil Shapiro #if HASRRESVPORT 2359c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2360c2aa98e2SPeter Wemm { 2361c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2362c2aa98e2SPeter Wemm 2363c2aa98e2SPeter Wemm s = rresvport(&rport); 2364c2aa98e2SPeter Wemm } 2365c2aa98e2SPeter Wemm else 236640266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2367c2aa98e2SPeter Wemm { 236840266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2369c2aa98e2SPeter Wemm } 2370c2aa98e2SPeter Wemm if (s < 0) 2371c2aa98e2SPeter Wemm { 237206f25ae9SGregory Neil Shapiro save_errno = errno; 2373c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 237440266059SGregory Neil Shapiro #if XLA 2375c2aa98e2SPeter Wemm xla_host_end(host); 237606f25ae9SGregory Neil Shapiro #endif /* XLA */ 2377c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 237840266059SGregory Neil Shapiro #if NETINET6 2379193538b7SGregory Neil Shapiro if (hp != NULL) 2380193538b7SGregory Neil Shapiro freehostent(hp); 238140266059SGregory Neil Shapiro #endif /* NETINET6 */ 238206f25ae9SGregory Neil Shapiro errno = save_errno; 2383c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2384c2aa98e2SPeter Wemm } 2385c2aa98e2SPeter Wemm 2386c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 238740266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2388c2aa98e2SPeter Wemm { 2389c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 239040266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 239140266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2392c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2393c2aa98e2SPeter Wemm } 239406f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 239506f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 239640266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 239706f25ae9SGregory Neil Shapiro { 239806f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 239940266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 240040266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 240106f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 240206f25ae9SGregory Neil Shapiro } 240306f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 240406f25ae9SGregory Neil Shapiro 2405c2aa98e2SPeter Wemm if (tTd(16, 1)) 240640266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2407c2aa98e2SPeter Wemm 2408c2aa98e2SPeter Wemm /* turn on network debugging? */ 2409c2aa98e2SPeter Wemm if (tTd(16, 101)) 2410c2aa98e2SPeter Wemm { 2411c2aa98e2SPeter Wemm int on = 1; 241206f25ae9SGregory Neil Shapiro 2413c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2414c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2415c2aa98e2SPeter Wemm } 241640266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 241740266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2418c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2419c2aa98e2SPeter Wemm 242006f25ae9SGregory Neil Shapiro if (clt_bind) 242106f25ae9SGregory Neil Shapiro { 242206f25ae9SGregory Neil Shapiro int on = 1; 242306f25ae9SGregory Neil Shapiro 242406f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 242506f25ae9SGregory Neil Shapiro { 242606f25ae9SGregory Neil Shapiro #if NETINET 242706f25ae9SGregory Neil Shapiro case AF_INET: 242806f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 242906f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 243006f25ae9SGregory Neil Shapiro SO_REUSEADDR, 243106f25ae9SGregory Neil Shapiro (char *) &on, 243206f25ae9SGregory Neil Shapiro sizeof on); 243306f25ae9SGregory Neil Shapiro break; 243406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 243506f25ae9SGregory Neil Shapiro 243606f25ae9SGregory Neil Shapiro #if NETINET6 243706f25ae9SGregory Neil Shapiro case AF_INET6: 243806f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 243906f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 244006f25ae9SGregory Neil Shapiro SO_REUSEADDR, 244106f25ae9SGregory Neil Shapiro (char *) &on, 244206f25ae9SGregory Neil Shapiro sizeof on); 244306f25ae9SGregory Neil Shapiro break; 244406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 244506f25ae9SGregory Neil Shapiro } 244606f25ae9SGregory Neil Shapiro 244706f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 244806f25ae9SGregory Neil Shapiro { 244906f25ae9SGregory Neil Shapiro save_errno = errno; 245006f25ae9SGregory Neil Shapiro (void) close(s); 245106f25ae9SGregory Neil Shapiro errno = save_errno; 245206f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 245306f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 245440266059SGregory Neil Shapiro #if NETINET6 2455193538b7SGregory Neil Shapiro if (hp != NULL) 2456193538b7SGregory Neil Shapiro freehostent(hp); 245740266059SGregory Neil Shapiro #endif /* NETINET6 */ 245806f25ae9SGregory Neil Shapiro errno = save_errno; 245906f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 246006f25ae9SGregory Neil Shapiro } 246106f25ae9SGregory Neil Shapiro } 246206f25ae9SGregory Neil Shapiro 2463c2aa98e2SPeter Wemm /* 2464c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2465c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2466c2aa98e2SPeter Wemm */ 2467c2aa98e2SPeter Wemm 2468c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2469c2aa98e2SPeter Wemm { 2470c2aa98e2SPeter Wemm int i; 2471c2aa98e2SPeter Wemm 2472c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 247340266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 24748774250cSGregory Neil Shapiro connecttimeout, 0); 2475c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 247640266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 24778774250cSGregory Neil Shapiro connecttimeout, 0); 2478c2aa98e2SPeter Wemm else 2479c2aa98e2SPeter Wemm ev = NULL; 2480c2aa98e2SPeter Wemm 248106f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 248206f25ae9SGregory Neil Shapiro { 248306f25ae9SGregory Neil Shapiro #if NETINET 248406f25ae9SGregory Neil Shapiro case AF_INET: 248506f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 248606f25ae9SGregory Neil Shapiro break; 248706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 248806f25ae9SGregory Neil Shapiro 248906f25ae9SGregory Neil Shapiro #if NETINET6 249006f25ae9SGregory Neil Shapiro case AF_INET6: 249106f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 249206f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 249306f25ae9SGregory Neil Shapiro IN6ADDRSZ); 249406f25ae9SGregory Neil Shapiro break; 249506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 249606f25ae9SGregory Neil Shapiro } 2497c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 249806f25ae9SGregory Neil Shapiro save_errno = errno; 2499c2aa98e2SPeter Wemm if (ev != NULL) 250040266059SGregory Neil Shapiro sm_clrevent(ev); 2501c2aa98e2SPeter Wemm if (i >= 0) 2502c2aa98e2SPeter Wemm break; 2503c2aa98e2SPeter Wemm } 2504c2aa98e2SPeter Wemm else 250506f25ae9SGregory Neil Shapiro save_errno = errno; 2506c2aa98e2SPeter Wemm 2507c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 250840266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 250940266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2510c2aa98e2SPeter Wemm { 2511c2aa98e2SPeter Wemm if (tTd(16, 1)) 251240266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 251340266059SGregory Neil Shapiro sm_errstring(save_errno)); 251440266059SGregory Neil Shapiro firstconnect = false; 251506f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2516c2aa98e2SPeter Wemm continue; 2517c2aa98e2SPeter Wemm } 2518c2aa98e2SPeter Wemm 2519c2aa98e2SPeter Wemm /* couldn't connect.... figure out why */ 2520c2aa98e2SPeter Wemm (void) close(s); 2521c2aa98e2SPeter Wemm 252240266059SGregory Neil Shapiro if (LogLevel > 13) 2523c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2524c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2525c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 252640266059SGregory Neil Shapiro sm_errstring(save_errno)); 2527c2aa98e2SPeter Wemm 252840266059SGregory Neil Shapiro #if NETINET6 252940266059SGregory Neil Shapiro nextaddr: 253040266059SGregory Neil Shapiro #endif /* NETINET6 */ 253140266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 253240266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2533c2aa98e2SPeter Wemm { 2534c2aa98e2SPeter Wemm if (tTd(16, 1)) 253540266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 253640266059SGregory Neil Shapiro sm_errstring(save_errno)); 2537c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2538c2aa98e2SPeter Wemm { 2539c2aa98e2SPeter Wemm #if NETINET 2540c2aa98e2SPeter Wemm case AF_INET: 254106f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 254206f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2543c2aa98e2SPeter Wemm INADDRSZ); 2544c2aa98e2SPeter Wemm break; 254506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 254606f25ae9SGregory Neil Shapiro 254706f25ae9SGregory Neil Shapiro #if NETINET6 254806f25ae9SGregory Neil Shapiro case AF_INET6: 254906f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 255006f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 255106f25ae9SGregory Neil Shapiro IN6ADDRSZ); 255206f25ae9SGregory Neil Shapiro break; 255306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2554c2aa98e2SPeter Wemm 2555c2aa98e2SPeter Wemm default: 255606f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 255706f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2558c2aa98e2SPeter Wemm hp->h_length); 2559c2aa98e2SPeter Wemm break; 2560c2aa98e2SPeter Wemm } 2561c2aa98e2SPeter Wemm continue; 2562c2aa98e2SPeter Wemm } 256306f25ae9SGregory Neil Shapiro errno = save_errno; 2564c2aa98e2SPeter Wemm 256506f25ae9SGregory Neil Shapiro #if NETINET6 256606f25ae9SGregory Neil Shapiro if (family == AF_INET6) 256706f25ae9SGregory Neil Shapiro { 256806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 256940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 257040266059SGregory Neil Shapiro sm_errstring(save_errno)); 257140266059SGregory Neil Shapiro v6found = true; 257206f25ae9SGregory Neil Shapiro family = AF_INET; 2573193538b7SGregory Neil Shapiro if (hp != NULL) 2574193538b7SGregory Neil Shapiro { 2575193538b7SGregory Neil Shapiro freehostent(hp); 2576193538b7SGregory Neil Shapiro hp = NULL; 2577193538b7SGregory Neil Shapiro } 257806f25ae9SGregory Neil Shapiro goto v4retry; 257906f25ae9SGregory Neil Shapiro } 258006f25ae9SGregory Neil Shapiro v6tempfail: 258106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2582c2aa98e2SPeter Wemm /* couldn't open connection */ 258306f25ae9SGregory Neil Shapiro #if NETINET6 258406f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 258506f25ae9SGregory Neil Shapiro if (errno > 0) 258606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 258706f25ae9SGregory Neil Shapiro save_errno = errno; 258806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 258940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 259040266059SGregory Neil Shapiro sm_errstring(save_errno)); 259140266059SGregory Neil Shapiro #if XLA 2592c2aa98e2SPeter Wemm xla_host_end(host); 259306f25ae9SGregory Neil Shapiro #endif /* XLA */ 2594c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 259540266059SGregory Neil Shapiro #if NETINET6 2596193538b7SGregory Neil Shapiro if (hp != NULL) 2597193538b7SGregory Neil Shapiro freehostent(hp); 259840266059SGregory Neil Shapiro #endif /* NETINET6 */ 259906f25ae9SGregory Neil Shapiro errno = save_errno; 2600c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2601c2aa98e2SPeter Wemm } 2602c2aa98e2SPeter Wemm 260340266059SGregory Neil Shapiro #if NETINET6 2604193538b7SGregory Neil Shapiro if (hp != NULL) 2605193538b7SGregory Neil Shapiro { 2606193538b7SGregory Neil Shapiro freehostent(hp); 2607193538b7SGregory Neil Shapiro hp = NULL; 2608193538b7SGregory Neil Shapiro } 260940266059SGregory Neil Shapiro #endif /* NETINET6 */ 2610193538b7SGregory Neil Shapiro 2611c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 261206f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 261340266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 261440266059SGregory Neil Shapiro (void *) &s, 261540266059SGregory Neil Shapiro SM_IO_WRONLY, NULL)) == NULL || 2616c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 261740266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 261840266059SGregory Neil Shapiro (void *) &s, 261940266059SGregory Neil Shapiro SM_IO_RDONLY, NULL)) == NULL) 2620c2aa98e2SPeter Wemm { 262106f25ae9SGregory Neil Shapiro save_errno = errno; 2622c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2623c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 262406f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 262540266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 262606f25ae9SGregory Neil Shapiro (void) close(s); 262706f25ae9SGregory Neil Shapiro errno = save_errno; 262806f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 262906f25ae9SGregory Neil Shapiro } 263040266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 263140266059SGregory Neil Shapiro 263240266059SGregory Neil Shapiro /* set {client_flags} */ 263340266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 263440266059SGregory Neil Shapiro { 263540266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 263640266059SGregory Neil Shapiro macid("{client_flags}"), 263740266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 263840266059SGregory Neil Shapiro } 263940266059SGregory Neil Shapiro else 264040266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 264140266059SGregory Neil Shapiro macid("{client_flags}"), ""); 264240266059SGregory Neil Shapiro 264340266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 264440266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 264540266059SGregory Neil Shapiro { 264640266059SGregory Neil Shapiro /* look for just this one flag */ 264740266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 264840266059SGregory Neil Shapiro } 264906f25ae9SGregory Neil Shapiro 265006f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 265106f25ae9SGregory Neil Shapiro len = sizeof addr; 265206f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 265306f25ae9SGregory Neil Shapiro { 265406f25ae9SGregory Neil Shapiro char *name; 265540266059SGregory Neil Shapiro char family[5]; 265606f25ae9SGregory Neil Shapiro 265740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 265840266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 265940266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 266040266059SGregory Neil Shapiro addr.sa.sa_family); 266140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 266240266059SGregory Neil Shapiro macid("{if_family_out}"), family); 266306f25ae9SGregory Neil Shapiro 266406f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 266540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 266640266059SGregory Neil Shapiro macid("{if_name_out}"), name); 266706f25ae9SGregory Neil Shapiro if (LogLevel > 11) 266806f25ae9SGregory Neil Shapiro { 266906f25ae9SGregory Neil Shapiro /* log connection information */ 267006f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 267106f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 267206f25ae9SGregory Neil Shapiro } 267306f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 267406f25ae9SGregory Neil Shapiro { 267506f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 267606f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 267706f25ae9SGregory Neil Shapiro } 267806f25ae9SGregory Neil Shapiro } 267906f25ae9SGregory Neil Shapiro else 268006f25ae9SGregory Neil Shapiro { 268140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 268240266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 268340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 268440266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 268540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 268640266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 268706f25ae9SGregory Neil Shapiro } 268806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 268906f25ae9SGregory Neil Shapiro return EX_OK; 269006f25ae9SGregory Neil Shapiro } 269106f25ae9SGregory Neil Shapiro 269206f25ae9SGregory Neil Shapiro static void 269306f25ae9SGregory Neil Shapiro connecttimeout() 269406f25ae9SGregory Neil Shapiro { 26958774250cSGregory Neil Shapiro /* 26968774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 26978774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 26988774250cSGregory Neil Shapiro ** DOING. 26998774250cSGregory Neil Shapiro */ 27008774250cSGregory Neil Shapiro 270106f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 270206f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 270306f25ae9SGregory Neil Shapiro } 270440266059SGregory Neil Shapiro /* 270506f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 270606f25ae9SGregory Neil Shapiro ** 270706f25ae9SGregory Neil Shapiro ** Parameters: 270806f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 270906f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 271006f25ae9SGregory Neil Shapiro ** structure to be filled in. 271106f25ae9SGregory Neil Shapiro ** 271206f25ae9SGregory Neil Shapiro ** Returns: 271306f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 271406f25ae9SGregory Neil Shapiro ** made and if not why not. 271506f25ae9SGregory Neil Shapiro ** 271606f25ae9SGregory Neil Shapiro ** Side Effects: 271706f25ae9SGregory Neil Shapiro ** none. 271806f25ae9SGregory Neil Shapiro */ 271906f25ae9SGregory Neil Shapiro 272006f25ae9SGregory Neil Shapiro #if NETUNIX 272140266059SGregory Neil Shapiro int 272240266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 272306f25ae9SGregory Neil Shapiro char *mux_path; 272406f25ae9SGregory Neil Shapiro register MCI *mci; 272506f25ae9SGregory Neil Shapiro { 272606f25ae9SGregory Neil Shapiro int sock; 272706f25ae9SGregory Neil Shapiro int rval, save_errno; 272806f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 272906f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 273006f25ae9SGregory Neil Shapiro 273106f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 273206f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 273306f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 273406f25ae9SGregory Neil Shapiro 273506f25ae9SGregory Neil Shapiro if (rval != 0) 273606f25ae9SGregory Neil Shapiro { 273706f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket"); 273806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 273906f25ae9SGregory Neil Shapiro errno = rval; 274006f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 274106f25ae9SGregory Neil Shapiro } 274206f25ae9SGregory Neil Shapiro 274306f25ae9SGregory Neil Shapiro /* prepare address structure */ 274406f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 274506f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 274606f25ae9SGregory Neil Shapiro 274706f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 274806f25ae9SGregory Neil Shapiro { 274906f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: domain socket name too long"); 275040266059SGregory Neil Shapiro 275140266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 275206f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 275306f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 275406f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 275506f25ae9SGregory Neil Shapiro } 275640266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 275740266059SGregory Neil Shapiro sizeof unix_addr.sun_path); 275806f25ae9SGregory Neil Shapiro 275906f25ae9SGregory Neil Shapiro /* initialize domain socket */ 276006f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 276106f25ae9SGregory Neil Shapiro if (sock == -1) 276206f25ae9SGregory Neil Shapiro { 276306f25ae9SGregory Neil Shapiro save_errno = errno; 276406f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket"); 276506f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 276606f25ae9SGregory Neil Shapiro errno = save_errno; 276706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 276806f25ae9SGregory Neil Shapiro } 276906f25ae9SGregory Neil Shapiro 277006f25ae9SGregory Neil Shapiro /* connect to server */ 277106f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 277206f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 277306f25ae9SGregory Neil Shapiro { 277406f25ae9SGregory Neil Shapiro save_errno = errno; 277506f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 277606f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 277706f25ae9SGregory Neil Shapiro (void) close(sock); 277806f25ae9SGregory Neil Shapiro errno = save_errno; 277906f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 278006f25ae9SGregory Neil Shapiro } 278106f25ae9SGregory Neil Shapiro 278206f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 278306f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 278440266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 278540266059SGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY, NULL)) 278640266059SGregory Neil Shapiro == NULL 278740266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 278840266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 278940266059SGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY, NULL)) 279040266059SGregory Neil Shapiro == NULL) 279106f25ae9SGregory Neil Shapiro { 279206f25ae9SGregory Neil Shapiro save_errno = errno; 279306f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 279406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 279506f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 279640266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 279706f25ae9SGregory Neil Shapiro (void) close(sock); 279806f25ae9SGregory Neil Shapiro errno = save_errno; 2799c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2800c2aa98e2SPeter Wemm } 280140266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 2802c2aa98e2SPeter Wemm 2803c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 280406f25ae9SGregory Neil Shapiro errno = 0; 280506f25ae9SGregory Neil Shapiro return EX_OK; 2806c2aa98e2SPeter Wemm } 280706f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 280840266059SGregory Neil Shapiro /* 280940266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 28108774250cSGregory Neil Shapiro ** 28118774250cSGregory Neil Shapiro ** Parameters: 281240266059SGregory Neil Shapiro ** none. 28138774250cSGregory Neil Shapiro ** 28148774250cSGregory Neil Shapiro ** Returns: 28158774250cSGregory Neil Shapiro ** none. 28168774250cSGregory Neil Shapiro ** 28178774250cSGregory Neil Shapiro ** Side Effects: 281840266059SGregory Neil Shapiro ** closes control socket, exits. 28198774250cSGregory Neil Shapiro */ 28208774250cSGregory Neil Shapiro 282140266059SGregory Neil Shapiro void 282240266059SGregory Neil Shapiro shutdown_daemon() 28238774250cSGregory Neil Shapiro { 282440266059SGregory Neil Shapiro int i; 282540266059SGregory Neil Shapiro char *reason; 28268774250cSGregory Neil Shapiro 282740266059SGregory Neil Shapiro sm_allsignals(true); 282840266059SGregory Neil Shapiro 282940266059SGregory Neil Shapiro reason = ShutdownRequest; 283040266059SGregory Neil Shapiro ShutdownRequest = NULL; 283140266059SGregory Neil Shapiro PendingSignal = 0; 283240266059SGregory Neil Shapiro 283340266059SGregory Neil Shapiro if (LogLevel > 79) 283440266059SGregory Neil Shapiro sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt (%s)", 283540266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 283640266059SGregory Neil Shapiro 283740266059SGregory Neil Shapiro FileName = NULL; 283840266059SGregory Neil Shapiro closecontrolsocket(true); 283940266059SGregory Neil Shapiro #if XLA 284040266059SGregory Neil Shapiro xla_all_end(); 284140266059SGregory Neil Shapiro #endif /* XLA */ 284240266059SGregory Neil Shapiro 284340266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 284440266059SGregory Neil Shapiro { 284540266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 284640266059SGregory Neil Shapiro { 284740266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 284840266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 284940266059SGregory Neil Shapiro 285040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 285140266059SGregory Neil Shapiro # if NETUNIX 285240266059SGregory Neil Shapiro /* Remove named sockets */ 285340266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 285440266059SGregory Neil Shapiro { 285540266059SGregory Neil Shapiro int rval; 285640266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 285740266059SGregory Neil Shapiro 285840266059SGregory Neil Shapiro /* if not safe, don't use it */ 285940266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 286040266059SGregory Neil Shapiro RunAsUid, RunAsGid, 286140266059SGregory Neil Shapiro RunAsUserName, sff, 286240266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 286340266059SGregory Neil Shapiro if (rval == 0 && 286440266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 286540266059SGregory Neil Shapiro { 286640266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 286740266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 286840266059SGregory Neil Shapiro Daemons[i].d_name, 286940266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 287040266059SGregory Neil Shapiro sm_errstring(errno)); 28718774250cSGregory Neil Shapiro } 287240266059SGregory Neil Shapiro } 287340266059SGregory Neil Shapiro # endif /* NETUNIX */ 287440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 287540266059SGregory Neil Shapiro } 287640266059SGregory Neil Shapiro } 287740266059SGregory Neil Shapiro 287840266059SGregory Neil Shapiro finis(false, true, EX_OK); 287940266059SGregory Neil Shapiro } 288040266059SGregory Neil Shapiro /* 28818774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 28828774250cSGregory Neil Shapiro ** 28838774250cSGregory Neil Shapiro ** Parameters: 28848774250cSGregory Neil Shapiro ** none. 28858774250cSGregory Neil Shapiro ** 28868774250cSGregory Neil Shapiro ** Returns: 28878774250cSGregory Neil Shapiro ** none. 28888774250cSGregory Neil Shapiro ** 28898774250cSGregory Neil Shapiro ** Side Effects: 28908774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 28918774250cSGregory Neil Shapiro */ 28928774250cSGregory Neil Shapiro 289313058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 289413058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 289513058a91SGregory Neil Shapiro do \ 289613058a91SGregory Neil Shapiro { \ 289740266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 289813058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 289940266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 290013058a91SGregory Neil Shapiro } while (0) 290113058a91SGregory Neil Shapiro 290240266059SGregory Neil Shapiro void 29038774250cSGregory Neil Shapiro restart_daemon() 29048774250cSGregory Neil Shapiro { 290540266059SGregory Neil Shapiro bool drop; 29068774250cSGregory Neil Shapiro int i; 29078774250cSGregory Neil Shapiro int save_errno; 29088774250cSGregory Neil Shapiro char *reason; 290913058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 29108774250cSGregory Neil Shapiro extern int DtableSize; 29118774250cSGregory Neil Shapiro 291213058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 291340266059SGregory Neil Shapiro sm_clear_events(); 291440266059SGregory Neil Shapiro sm_allsignals(true); 29158774250cSGregory Neil Shapiro 29168774250cSGregory Neil Shapiro reason = RestartRequest; 29178774250cSGregory Neil Shapiro RestartRequest = NULL; 29188774250cSGregory Neil Shapiro PendingSignal = 0; 29198774250cSGregory Neil Shapiro 29208774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 29218774250cSGregory Neil Shapiro { 29228774250cSGregory Neil Shapiro if (LogLevel > 3) 29238774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 29248774250cSGregory Neil Shapiro "could not restart: need full path"); 292540266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 292640266059SGregory Neil Shapiro /* NOTREACHED */ 29278774250cSGregory Neil Shapiro } 29288774250cSGregory Neil Shapiro if (LogLevel > 3) 29298774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 29308774250cSGregory Neil Shapiro SaveArgv[0], 29318774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 29328774250cSGregory Neil Shapiro 293340266059SGregory Neil Shapiro closecontrolsocket(true); 293440266059SGregory Neil Shapiro 293540266059SGregory Neil Shapiro /* 293640266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 293740266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 293840266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 293940266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 294040266059SGregory Neil Shapiro */ 294140266059SGregory Neil Shapiro 294240266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 294340266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 294440266059SGregory Neil Shapiro 294540266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 29468774250cSGregory Neil Shapiro { 29478774250cSGregory Neil Shapiro if (LogLevel > 0) 29488774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 294940266059SGregory Neil Shapiro "could not drop privileges: %s", 295040266059SGregory Neil Shapiro sm_errstring(errno)); 295140266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 295240266059SGregory Neil Shapiro /* NOTREACHED */ 29538774250cSGregory Neil Shapiro } 29548774250cSGregory Neil Shapiro 29558774250cSGregory Neil Shapiro /* arrange for all the files to be closed */ 29568774250cSGregory Neil Shapiro for (i = 3; i < DtableSize; i++) 29578774250cSGregory Neil Shapiro { 29588774250cSGregory Neil Shapiro register int j; 29598774250cSGregory Neil Shapiro 29608774250cSGregory Neil Shapiro if ((j = fcntl(i, F_GETFD, 0)) != -1) 29618774250cSGregory Neil Shapiro (void) fcntl(i, F_SETFD, j | FD_CLOEXEC); 29628774250cSGregory Neil Shapiro } 296340266059SGregory Neil Shapiro #if SM_CONF_SHM 296440266059SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 296540266059SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 29668774250cSGregory Neil Shapiro 296713058a91SGregory Neil Shapiro /* 296813058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 296913058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 297013058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 297113058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 297213058a91SGregory Neil Shapiro */ 297313058a91SGregory Neil Shapiro 297413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 297513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 297613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 297713058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 297813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 297913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 298013058a91SGregory Neil Shapiro #ifdef SIGUSR1 298113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 298213058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 298340266059SGregory Neil Shapiro sm_allsignals(false); 29848774250cSGregory Neil Shapiro 29858774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 29868774250cSGregory Neil Shapiro save_errno = errno; 29878774250cSGregory Neil Shapiro 298813058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 298940266059SGregory Neil Shapiro sm_allsignals(true); 299013058a91SGregory Neil Shapiro 299113058a91SGregory Neil Shapiro /* For finis() events */ 299240266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 299313058a91SGregory Neil Shapiro 299413058a91SGregory Neil Shapiro #ifdef SIGUSR1 299513058a91SGregory Neil Shapiro /* For debugging finis() */ 299640266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 299713058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 29988774250cSGregory Neil Shapiro 29998774250cSGregory Neil Shapiro errno = save_errno; 30008774250cSGregory Neil Shapiro if (LogLevel > 0) 300140266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 300240266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 300340266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 300440266059SGregory Neil Shapiro /* NOTREACHED */ 30058774250cSGregory Neil Shapiro } 300640266059SGregory Neil Shapiro /* 3007c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3008c2aa98e2SPeter Wemm ** 3009c2aa98e2SPeter Wemm ** Parameters: 3010c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3011c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3012c2aa98e2SPeter Wemm ** 3013c2aa98e2SPeter Wemm ** Returns: 3014c2aa98e2SPeter Wemm ** A list of aliases for this host. 3015c2aa98e2SPeter Wemm ** 3016c2aa98e2SPeter Wemm ** Side Effects: 3017c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3018c2aa98e2SPeter Wemm */ 3019c2aa98e2SPeter Wemm 3020c2aa98e2SPeter Wemm struct hostent * 3021c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3022c2aa98e2SPeter Wemm char hostbuf[]; 3023c2aa98e2SPeter Wemm int size; 3024c2aa98e2SPeter Wemm { 3025c2aa98e2SPeter Wemm register struct hostent *hp; 3026c2aa98e2SPeter Wemm 3027602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 302840266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 302906f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 303013058a91SGregory Neil Shapiro #if NETINET && NETINET6 303113058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 303213058a91SGregory Neil Shapiro { 303313058a91SGregory Neil Shapiro /* 303413058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 303513058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 303613058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 303713058a91SGregory Neil Shapiro */ 303813058a91SGregory Neil Shapiro 303913058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 304013058a91SGregory Neil Shapiro } 304113058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3042c2aa98e2SPeter Wemm if (hp == NULL) 3043c2aa98e2SPeter Wemm return NULL; 3044c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 304506f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 304606f25ae9SGregory Neil Shapiro 304706f25ae9SGregory Neil Shapiro #if NETINFO 304806f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3049c2aa98e2SPeter Wemm { 305006f25ae9SGregory Neil Shapiro char *domainname; 305106f25ae9SGregory Neil Shapiro 305206f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 305306f25ae9SGregory Neil Shapiro "domain", '\0'); 305406f25ae9SGregory Neil Shapiro if (domainname != NULL && 305506f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 305640266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 305706f25ae9SGregory Neil Shapiro } 305806f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3059c2aa98e2SPeter Wemm 3060c2aa98e2SPeter Wemm /* 3061c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3062c2aa98e2SPeter Wemm ** dotted alias. 3063c2aa98e2SPeter Wemm */ 3064c2aa98e2SPeter Wemm 3065c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3066c2aa98e2SPeter Wemm { 3067c2aa98e2SPeter Wemm char **ha; 3068c2aa98e2SPeter Wemm 306906f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3070c2aa98e2SPeter Wemm { 3071c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3072c2aa98e2SPeter Wemm { 307306f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3074c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3075c2aa98e2SPeter Wemm break; 3076c2aa98e2SPeter Wemm } 3077c2aa98e2SPeter Wemm } 3078c2aa98e2SPeter Wemm } 3079c2aa98e2SPeter Wemm 3080c2aa98e2SPeter Wemm /* 3081c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3082c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3083c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3084c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3085c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3086c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3087c2aa98e2SPeter Wemm */ 3088c2aa98e2SPeter Wemm 3089c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 309040266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3091c2aa98e2SPeter Wemm { 3092c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 3093c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3094c2aa98e2SPeter Wemm hostbuf); 3095c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3096c2aa98e2SPeter Wemm hostbuf); 309706f25ae9SGregory Neil Shapiro (void) sleep(60); 309840266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3099c2aa98e2SPeter Wemm { 3100c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 3101c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3102c2aa98e2SPeter Wemm hostbuf); 3103c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3104c2aa98e2SPeter Wemm hostbuf); 3105c2aa98e2SPeter Wemm } 3106c2aa98e2SPeter Wemm } 310706f25ae9SGregory Neil Shapiro return hp; 3108c2aa98e2SPeter Wemm } 310940266059SGregory Neil Shapiro /* 3110c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3111c2aa98e2SPeter Wemm ** 3112c2aa98e2SPeter Wemm ** Parameters: 3113c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3114c2aa98e2SPeter Wemm ** ha -- actual first address 3115c2aa98e2SPeter Wemm ** sa -- second address 3116c2aa98e2SPeter Wemm ** 3117c2aa98e2SPeter Wemm ** Returns: 3118c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3119c2aa98e2SPeter Wemm ** else -- they don't match 3120c2aa98e2SPeter Wemm */ 3121c2aa98e2SPeter Wemm 312206f25ae9SGregory Neil Shapiro static int 3123c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3124c2aa98e2SPeter Wemm struct hostent *hp; 3125c2aa98e2SPeter Wemm char *ha; 3126c2aa98e2SPeter Wemm SOCKADDR *sa; 3127c2aa98e2SPeter Wemm { 312806f25ae9SGregory Neil Shapiro #if NETINET6 312940266059SGregory Neil Shapiro unsigned char *a; 313006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 313106f25ae9SGregory Neil Shapiro 3132c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3133c2aa98e2SPeter Wemm { 313406f25ae9SGregory Neil Shapiro #if NETINET 3135c2aa98e2SPeter Wemm case AF_INET: 3136c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 313706f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3138c2aa98e2SPeter Wemm break; 313906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3140c2aa98e2SPeter Wemm 314106f25ae9SGregory Neil Shapiro #if NETINET6 314206f25ae9SGregory Neil Shapiro case AF_INET6: 314340266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 314406f25ae9SGregory Neil Shapiro 314506f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 314606f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 314706f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 314806f25ae9SGregory Neil Shapiro 314906f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 315006f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 315106f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 315206f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 315306f25ae9SGregory Neil Shapiro break; 315406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3155c2aa98e2SPeter Wemm } 3156c2aa98e2SPeter Wemm return -1; 3157c2aa98e2SPeter Wemm } 315840266059SGregory Neil Shapiro /* 315906f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3160c2aa98e2SPeter Wemm ** 3161c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3162c2aa98e2SPeter Wemm ** 3163c2aa98e2SPeter Wemm ** Parameters: 3164c2aa98e2SPeter Wemm ** fd -- the descriptor 316540266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3166c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 316740266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3168c2aa98e2SPeter Wemm ** 3169c2aa98e2SPeter Wemm ** Returns: 3170c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3171c2aa98e2SPeter Wemm */ 3172c2aa98e2SPeter Wemm 3173c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3174c2aa98e2SPeter Wemm 3175c2aa98e2SPeter Wemm static void 3176c2aa98e2SPeter Wemm authtimeout() 3177c2aa98e2SPeter Wemm { 31788774250cSGregory Neil Shapiro /* 31798774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 31808774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 31818774250cSGregory Neil Shapiro ** DOING. 31828774250cSGregory Neil Shapiro */ 31838774250cSGregory Neil Shapiro 31848774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3185c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3186c2aa98e2SPeter Wemm } 3187c2aa98e2SPeter Wemm 3188c2aa98e2SPeter Wemm char * 3189c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3190c2aa98e2SPeter Wemm int fd; 3191c2aa98e2SPeter Wemm bool *may_be_forged; 3192c2aa98e2SPeter Wemm { 319340266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3194c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3195c2aa98e2SPeter Wemm register char *volatile p = NULL; 3196c2aa98e2SPeter Wemm SOCKADDR la; 3197c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 319840266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3199c2aa98e2SPeter Wemm register struct servent *sp; 320040266059SGregory Neil Shapiro # if NETINET 320140266059SGregory Neil Shapiro static unsigned short port4 = 0; 320240266059SGregory Neil Shapiro # endif /* NETINET */ 320340266059SGregory Neil Shapiro # if NETINET6 320440266059SGregory Neil Shapiro static unsigned short port6 = 0; 320540266059SGregory Neil Shapiro # endif /* NETINET6 */ 320640266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3207c2aa98e2SPeter Wemm volatile int s; 3208c2aa98e2SPeter Wemm int i = 0; 320940266059SGregory Neil Shapiro size_t len; 321040266059SGregory Neil Shapiro SM_EVENT *ev; 3211c2aa98e2SPeter Wemm int nleft; 3212c2aa98e2SPeter Wemm struct hostent *hp; 3213c2aa98e2SPeter Wemm char *ostype = NULL; 3214c2aa98e2SPeter Wemm char **ha; 3215c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 3216c2aa98e2SPeter Wemm static char hbuf[MAXNAME * 2 + 11]; 3217c2aa98e2SPeter Wemm 321840266059SGregory Neil Shapiro *may_be_forged = false; 3219c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 3220c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3221c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3222c2aa98e2SPeter Wemm { 322306f25ae9SGregory Neil Shapiro if (i < 0) 322406f25ae9SGregory Neil Shapiro { 322506f25ae9SGregory Neil Shapiro /* 322606f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 322706f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 322806f25ae9SGregory Neil Shapiro ** happen later. 322906f25ae9SGregory Neil Shapiro */ 323040266059SGregory Neil Shapiro 323106f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3232c2aa98e2SPeter Wemm return NULL; 323306f25ae9SGregory Neil Shapiro errno = 0; 323406f25ae9SGregory Neil Shapiro } 323540266059SGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof hbuf, 2, RealUserName, 323640266059SGregory Neil Shapiro "@localhost"); 3237c2aa98e2SPeter Wemm if (tTd(9, 1)) 323840266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3239c2aa98e2SPeter Wemm return hbuf; 3240c2aa98e2SPeter Wemm } 3241c2aa98e2SPeter Wemm 3242c2aa98e2SPeter Wemm if (RealHostName == NULL) 3243c2aa98e2SPeter Wemm { 3244c2aa98e2SPeter Wemm /* translate that to a host name */ 3245c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3246c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 324740266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3248c2aa98e2SPeter Wemm } 3249c2aa98e2SPeter Wemm 3250c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 325140266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 325240266059SGregory Neil Shapiro RealHostName[0] != '[') 3253c2aa98e2SPeter Wemm { 325413058a91SGregory Neil Shapiro int family; 3255c2aa98e2SPeter Wemm 325613058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 325713058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 325813058a91SGregory Neil Shapiro /* 325913058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 326013058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 326113058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 326213058a91SGregory Neil Shapiro ** RealHostAddr. 326313058a91SGregory Neil Shapiro ** 326413058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 326513058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 326613058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 326713058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 326813058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 326913058a91SGregory Neil Shapiro */ 327013058a91SGregory Neil Shapiro 327113058a91SGregory Neil Shapiro if (family == AF_INET6 && 327213058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 327313058a91SGregory Neil Shapiro family = AF_INET; 327413058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 327513058a91SGregory Neil Shapiro 327613058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 327713058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3278c2aa98e2SPeter Wemm if (hp == NULL) 327940266059SGregory Neil Shapiro *may_be_forged = true; 3280c2aa98e2SPeter Wemm else 3281c2aa98e2SPeter Wemm { 3282c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 328340266059SGregory Neil Shapiro { 3284c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3285c2aa98e2SPeter Wemm break; 328640266059SGregory Neil Shapiro } 3287c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 328840266059SGregory Neil Shapiro #if NETINET6 3289193538b7SGregory Neil Shapiro freehostent(hp); 3290193538b7SGregory Neil Shapiro hp = NULL; 329140266059SGregory Neil Shapiro #endif /* NETINET6 */ 3292c2aa98e2SPeter Wemm } 3293c2aa98e2SPeter Wemm } 3294c2aa98e2SPeter Wemm 3295c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3296c2aa98e2SPeter Wemm goto noident; 3297c2aa98e2SPeter Wemm 3298c2aa98e2SPeter Wemm lalen = sizeof la; 329906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 330006f25ae9SGregory Neil Shapiro { 330106f25ae9SGregory Neil Shapiro #if NETINET 330206f25ae9SGregory Neil Shapiro case AF_INET: 330306f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 330406f25ae9SGregory Neil Shapiro lalen <= 0 || 3305c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3306c2aa98e2SPeter Wemm { 3307c2aa98e2SPeter Wemm /* no ident info */ 3308c2aa98e2SPeter Wemm goto noident; 3309c2aa98e2SPeter Wemm } 331006f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3311c2aa98e2SPeter Wemm 3312c2aa98e2SPeter Wemm /* create ident query */ 331340266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 331406f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 331506f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3316c2aa98e2SPeter Wemm 3317c2aa98e2SPeter Wemm /* create local address */ 3318c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3319c2aa98e2SPeter Wemm 3320c2aa98e2SPeter Wemm /* create foreign address */ 332106f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 332206f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 332306f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 332440266059SGregory Neil Shapiro 332540266059SGregory Neil Shapiro /* 332640266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 332740266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 332840266059SGregory Neil Shapiro ** spent in this routine). 332940266059SGregory Neil Shapiro ** Hence we store the port in a static variable 333040266059SGregory Neil Shapiro ** to save this time. 333140266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 333240266059SGregory Neil Shapiro ** This code makes the assumption that the port number 333340266059SGregory Neil Shapiro ** is not 0. 333440266059SGregory Neil Shapiro */ 333540266059SGregory Neil Shapiro 333640266059SGregory Neil Shapiro if (port4 == 0) 333740266059SGregory Neil Shapiro { 3338c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3339c2aa98e2SPeter Wemm if (sp != NULL) 334040266059SGregory Neil Shapiro port4 = sp->s_port; 3341c2aa98e2SPeter Wemm else 334240266059SGregory Neil Shapiro port4 = htons(113); 334340266059SGregory Neil Shapiro } 334440266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 334506f25ae9SGregory Neil Shapiro break; 334606f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 334706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 334806f25ae9SGregory Neil Shapiro 334906f25ae9SGregory Neil Shapiro #if NETINET6 335006f25ae9SGregory Neil Shapiro case AF_INET6: 335106f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 335206f25ae9SGregory Neil Shapiro lalen <= 0 || 335306f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 335406f25ae9SGregory Neil Shapiro { 335506f25ae9SGregory Neil Shapiro /* no ident info */ 335606f25ae9SGregory Neil Shapiro goto noident; 335706f25ae9SGregory Neil Shapiro } 335806f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 335906f25ae9SGregory Neil Shapiro 336006f25ae9SGregory Neil Shapiro /* create ident query */ 336140266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 336206f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 336306f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 336406f25ae9SGregory Neil Shapiro 336506f25ae9SGregory Neil Shapiro /* create local address */ 336606f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 336706f25ae9SGregory Neil Shapiro 336806f25ae9SGregory Neil Shapiro /* create foreign address */ 336906f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 337006f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 337106f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 337240266059SGregory Neil Shapiro if (port6 == 0) 337340266059SGregory Neil Shapiro { 337406f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 337506f25ae9SGregory Neil Shapiro if (sp != NULL) 337640266059SGregory Neil Shapiro port6 = sp->s_port; 337706f25ae9SGregory Neil Shapiro else 337840266059SGregory Neil Shapiro port6 = htons(113); 337940266059SGregory Neil Shapiro } 338040266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 338106f25ae9SGregory Neil Shapiro break; 338206f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 338306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 338406f25ae9SGregory Neil Shapiro default: 338506f25ae9SGregory Neil Shapiro /* no ident info */ 338606f25ae9SGregory Neil Shapiro goto noident; 338706f25ae9SGregory Neil Shapiro } 3388c2aa98e2SPeter Wemm 3389c2aa98e2SPeter Wemm s = -1; 3390c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3391c2aa98e2SPeter Wemm { 3392c2aa98e2SPeter Wemm if (s >= 0) 3393c2aa98e2SPeter Wemm (void) close(s); 3394c2aa98e2SPeter Wemm goto noident; 3395c2aa98e2SPeter Wemm } 3396c2aa98e2SPeter Wemm 3397c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 339840266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3399c2aa98e2SPeter Wemm 340006f25ae9SGregory Neil Shapiro 3401c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 340206f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3403c2aa98e2SPeter Wemm if (s < 0) 3404c2aa98e2SPeter Wemm { 340540266059SGregory Neil Shapiro sm_clrevent(ev); 3406c2aa98e2SPeter Wemm goto noident; 3407c2aa98e2SPeter Wemm } 340806f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 340906f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3410c2aa98e2SPeter Wemm goto closeident; 3411c2aa98e2SPeter Wemm 3412c2aa98e2SPeter Wemm if (tTd(9, 10)) 341340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3414c2aa98e2SPeter Wemm 3415c2aa98e2SPeter Wemm /* send query */ 3416c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3417c2aa98e2SPeter Wemm goto closeident; 3418c2aa98e2SPeter Wemm 3419c2aa98e2SPeter Wemm /* get result */ 3420c2aa98e2SPeter Wemm p = &ibuf[0]; 3421c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 3422c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3423c2aa98e2SPeter Wemm { 3424c2aa98e2SPeter Wemm p += i; 3425c2aa98e2SPeter Wemm nleft -= i; 3426c2aa98e2SPeter Wemm *p = '\0'; 342740266059SGregory Neil Shapiro if (strchr(ibuf, '\n') != NULL || nleft <= 0) 3428c2aa98e2SPeter Wemm break; 3429c2aa98e2SPeter Wemm } 3430c2aa98e2SPeter Wemm (void) close(s); 343140266059SGregory Neil Shapiro sm_clrevent(ev); 3432c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3433c2aa98e2SPeter Wemm goto noident; 3434c2aa98e2SPeter Wemm 3435c2aa98e2SPeter Wemm if (*--p == '\n' && *--p == '\r') 3436c2aa98e2SPeter Wemm p--; 3437c2aa98e2SPeter Wemm *++p = '\0'; 3438c2aa98e2SPeter Wemm 3439c2aa98e2SPeter Wemm if (tTd(9, 3)) 344040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3441c2aa98e2SPeter Wemm 3442c2aa98e2SPeter Wemm /* parse result */ 3443c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3444c2aa98e2SPeter Wemm if (p == NULL) 3445c2aa98e2SPeter Wemm { 3446c2aa98e2SPeter Wemm /* malformed response */ 3447c2aa98e2SPeter Wemm goto noident; 3448c2aa98e2SPeter Wemm } 3449c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3450c2aa98e2SPeter Wemm continue; 345140266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3452c2aa98e2SPeter Wemm { 3453c2aa98e2SPeter Wemm /* presumably an error string */ 3454c2aa98e2SPeter Wemm goto noident; 3455c2aa98e2SPeter Wemm } 3456c2aa98e2SPeter Wemm p += 6; 3457c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3458c2aa98e2SPeter Wemm p++; 3459c2aa98e2SPeter Wemm if (*p++ != ':') 3460c2aa98e2SPeter Wemm { 3461c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3462c2aa98e2SPeter Wemm goto noident; 3463c2aa98e2SPeter Wemm } 3464c2aa98e2SPeter Wemm 3465c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3466c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3467c2aa98e2SPeter Wemm p++; 3468c2aa98e2SPeter Wemm ostype = p; 3469c2aa98e2SPeter Wemm p = strchr(p, ':'); 3470c2aa98e2SPeter Wemm if (p == NULL) 3471c2aa98e2SPeter Wemm { 3472c2aa98e2SPeter Wemm /* malformed response */ 3473c2aa98e2SPeter Wemm goto noident; 3474c2aa98e2SPeter Wemm } 3475c2aa98e2SPeter Wemm else 3476c2aa98e2SPeter Wemm { 3477c2aa98e2SPeter Wemm char *charset; 3478c2aa98e2SPeter Wemm 3479c2aa98e2SPeter Wemm *p = '\0'; 3480c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3481c2aa98e2SPeter Wemm if (charset != NULL) 3482c2aa98e2SPeter Wemm *charset = '\0'; 3483c2aa98e2SPeter Wemm } 3484c2aa98e2SPeter Wemm 3485c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3486c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3487c2aa98e2SPeter Wemm continue; 3488c2aa98e2SPeter Wemm 3489c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 349040266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3491c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3492c2aa98e2SPeter Wemm { 349340266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof hbuf); 3494c2aa98e2SPeter Wemm cleanstrcpy(&hbuf[6], p, MAXNAME); 3495c2aa98e2SPeter Wemm } 3496c2aa98e2SPeter Wemm else 3497c2aa98e2SPeter Wemm cleanstrcpy(hbuf, p, MAXNAME); 349840266059SGregory Neil Shapiro len = strlen(hbuf); 349940266059SGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof hbuf - len, 2, "@", 3500c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3501c2aa98e2SPeter Wemm goto postident; 3502c2aa98e2SPeter Wemm 3503c2aa98e2SPeter Wemm closeident: 3504c2aa98e2SPeter Wemm (void) close(s); 350540266059SGregory Neil Shapiro sm_clrevent(ev); 3506c2aa98e2SPeter Wemm 3507c2aa98e2SPeter Wemm noident: 350806f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 350906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 351006f25ae9SGregory Neil Shapiro { 351106f25ae9SGregory Neil Shapiro #if NETINET 351206f25ae9SGregory Neil Shapiro case AF_INET: 351306f25ae9SGregory Neil Shapiro if (port > 0) 351406f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 351506f25ae9SGregory Neil Shapiro break; 351606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 351706f25ae9SGregory Neil Shapiro 351806f25ae9SGregory Neil Shapiro #if NETINET6 351906f25ae9SGregory Neil Shapiro case AF_INET6: 352006f25ae9SGregory Neil Shapiro if (port > 0) 352106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 352206f25ae9SGregory Neil Shapiro break; 352306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 352406f25ae9SGregory Neil Shapiro } 352506f25ae9SGregory Neil Shapiro 3526c2aa98e2SPeter Wemm if (RealHostName == NULL) 3527c2aa98e2SPeter Wemm { 3528c2aa98e2SPeter Wemm if (tTd(9, 1)) 352940266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3530c2aa98e2SPeter Wemm return NULL; 3531c2aa98e2SPeter Wemm } 353240266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof hbuf); 3533c2aa98e2SPeter Wemm 3534c2aa98e2SPeter Wemm postident: 3535c2aa98e2SPeter Wemm #if IP_SRCROUTE 3536c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3537c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 353806f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3539c2aa98e2SPeter Wemm /* 3540c2aa98e2SPeter Wemm ** Extract IP source routing information. 3541c2aa98e2SPeter Wemm ** 3542c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3543c2aa98e2SPeter Wemm ** through c to d: 3544c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3545c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3546c2aa98e2SPeter Wemm ** 3547c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3548c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3549c2aa98e2SPeter Wemm ** p - pointer to hbuf 3550c2aa98e2SPeter Wemm */ 3551c2aa98e2SPeter Wemm 3552c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3553c2aa98e2SPeter Wemm { 3554c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3555c2aa98e2SPeter Wemm int j; 355640266059SGregory Neil Shapiro unsigned char *q; 355740266059SGregory Neil Shapiro unsigned char *o; 3558c2aa98e2SPeter Wemm int l; 355906f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3560c2aa98e2SPeter Wemm 3561c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3562c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3563c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3564c2aa98e2SPeter Wemm goto noipsr; 3565c2aa98e2SPeter Wemm if (ipoptlen == 0) 3566c2aa98e2SPeter Wemm goto noipsr; 356740266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 356840266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3569c2aa98e2SPeter Wemm { 3570c2aa98e2SPeter Wemm switch (*o) 3571c2aa98e2SPeter Wemm { 3572c2aa98e2SPeter Wemm case IPOPT_EOL: 3573c2aa98e2SPeter Wemm o = NULL; 3574c2aa98e2SPeter Wemm break; 3575c2aa98e2SPeter Wemm 3576c2aa98e2SPeter Wemm case IPOPT_NOP: 3577c2aa98e2SPeter Wemm o++; 3578c2aa98e2SPeter Wemm break; 3579c2aa98e2SPeter Wemm 3580c2aa98e2SPeter Wemm case IPOPT_SSRR: 3581c2aa98e2SPeter Wemm case IPOPT_LSRR: 3582c2aa98e2SPeter Wemm /* 3583c2aa98e2SPeter Wemm ** Source routing. 3584c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3585c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3586c2aa98e2SPeter Wemm ** including option type and 3587c2aa98e2SPeter Wemm ** length. 3588c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3589c2aa98e2SPeter Wemm ** data. 3590c2aa98e2SPeter Wemm ** o[3] begins the route data. 3591c2aa98e2SPeter Wemm */ 3592c2aa98e2SPeter Wemm 3593c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3594c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 359540266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 359640266059SGregory Neil Shapiro " [%s@%.*s", 3597c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3598c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 359906f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3600c2aa98e2SPeter Wemm i = strlen(p); 3601c2aa98e2SPeter Wemm p += i; 3602c2aa98e2SPeter Wemm l -= strlen(p); 3603c2aa98e2SPeter Wemm 3604c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3605c2aa98e2SPeter Wemm 3606c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3607c2aa98e2SPeter Wemm q = &o[3]; 3608c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3609c2aa98e2SPeter Wemm { 361006f25ae9SGregory Neil Shapiro struct in_addr addr; 361106f25ae9SGregory Neil Shapiro 3612c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 361340266059SGregory Neil Shapiro (void) sm_snprintf(p, 361440266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3615c2aa98e2SPeter Wemm "%c%.*s", 3616c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3617c2aa98e2SPeter Wemm l > 240 ? 120 : 3618c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3619c2aa98e2SPeter Wemm inet_ntoa(addr)); 3620c2aa98e2SPeter Wemm i = strlen(p); 3621c2aa98e2SPeter Wemm p += i; 3622c2aa98e2SPeter Wemm l -= i + 1; 3623c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3624c2aa98e2SPeter Wemm } 3625c2aa98e2SPeter Wemm o += o[1]; 3626c2aa98e2SPeter Wemm break; 3627c2aa98e2SPeter Wemm 3628c2aa98e2SPeter Wemm default: 3629c2aa98e2SPeter Wemm /* Skip over option */ 3630c2aa98e2SPeter Wemm o += o[1]; 3631c2aa98e2SPeter Wemm break; 3632c2aa98e2SPeter Wemm } 3633c2aa98e2SPeter Wemm } 363440266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3635c2aa98e2SPeter Wemm goto postipsr; 3636c2aa98e2SPeter Wemm } 3637c2aa98e2SPeter Wemm 3638c2aa98e2SPeter Wemm noipsr: 363906f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3640c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3641c2aa98e2SPeter Wemm { 3642c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 364340266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3644c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3645c2aa98e2SPeter Wemm } 3646c2aa98e2SPeter Wemm if (*may_be_forged) 3647c2aa98e2SPeter Wemm { 3648c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 364940266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 365040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 365140266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3652c2aa98e2SPeter Wemm } 3653c2aa98e2SPeter Wemm 3654c2aa98e2SPeter Wemm #if IP_SRCROUTE 3655c2aa98e2SPeter Wemm postipsr: 365606f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 365706f25ae9SGregory Neil Shapiro 365806f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 365906f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 366006f25ae9SGregory Neil Shapiro { 366106f25ae9SGregory Neil Shapiro #if NETINET 366206f25ae9SGregory Neil Shapiro case AF_INET: 366306f25ae9SGregory Neil Shapiro if (port > 0) 366406f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 366506f25ae9SGregory Neil Shapiro break; 366606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 366706f25ae9SGregory Neil Shapiro 366806f25ae9SGregory Neil Shapiro #if NETINET6 366906f25ae9SGregory Neil Shapiro case AF_INET6: 367006f25ae9SGregory Neil Shapiro if (port > 0) 367106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 367206f25ae9SGregory Neil Shapiro break; 367306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 367406f25ae9SGregory Neil Shapiro } 367506f25ae9SGregory Neil Shapiro 367640266059SGregory Neil Shapiro if (tTd(9, 1)) 367740266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3678c2aa98e2SPeter Wemm return hbuf; 3679c2aa98e2SPeter Wemm } 368040266059SGregory Neil Shapiro /* 3681c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3682c2aa98e2SPeter Wemm ** 3683c2aa98e2SPeter Wemm ** Parameters: 3684c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3685c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3686c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3687c2aa98e2SPeter Wemm ** functions. 3688c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3689c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3690c2aa98e2SPeter Wemm ** 3691c2aa98e2SPeter Wemm ** Returns: 3692c2aa98e2SPeter Wemm ** The mapping, if found. 3693c2aa98e2SPeter Wemm ** NULL if no mapping found. 3694c2aa98e2SPeter Wemm ** 3695c2aa98e2SPeter Wemm ** Side Effects: 3696c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3697c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3698c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3699c2aa98e2SPeter Wemm ** status only to be returned). 3700c2aa98e2SPeter Wemm */ 3701c2aa98e2SPeter Wemm 3702c2aa98e2SPeter Wemm char * 3703c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3704c2aa98e2SPeter Wemm MAP *map; 3705c2aa98e2SPeter Wemm char *name; 3706c2aa98e2SPeter Wemm char **av; 3707c2aa98e2SPeter Wemm int *statp; 3708c2aa98e2SPeter Wemm { 3709c2aa98e2SPeter Wemm register struct hostent *hp; 371006f25ae9SGregory Neil Shapiro #if NETINET 3711c2aa98e2SPeter Wemm struct in_addr in_addr; 371206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 371306f25ae9SGregory Neil Shapiro #if NETINET6 371406f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 371506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 371606f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3717c2aa98e2SPeter Wemm register STAB *s; 371840266059SGregory Neil Shapiro time_t now; 371940266059SGregory Neil Shapiro #if NAMED_BIND 372040266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 372140266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 372240266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3723c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3724c2aa98e2SPeter Wemm 3725c2aa98e2SPeter Wemm /* 3726c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 372740266059SGregory Neil Shapiro ** return it (unless expired). 3728c2aa98e2SPeter Wemm */ 3729c2aa98e2SPeter Wemm 373040266059SGregory Neil Shapiro now = curtime(); 3731c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 373240266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 373340266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3734c2aa98e2SPeter Wemm { 3735c2aa98e2SPeter Wemm if (tTd(9, 1)) 373640266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3737c2aa98e2SPeter Wemm name, 3738c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3739c2aa98e2SPeter Wemm ? "NULL" 3740c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3741c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3742602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3743c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3744c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3745c2aa98e2SPeter Wemm { 3746c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3747c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3748c2aa98e2SPeter Wemm shortenstring(name, 33)); 3749c2aa98e2SPeter Wemm } 3750c2aa98e2SPeter Wemm if (*statp != EX_OK) 3751c2aa98e2SPeter Wemm return NULL; 3752c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3753c2aa98e2SPeter Wemm { 3754c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno = %d, h_errno = %d", 3755c2aa98e2SPeter Wemm name, 3756c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3757c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3758c2aa98e2SPeter Wemm return NULL; 3759c2aa98e2SPeter Wemm } 3760c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3761c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3762c2aa98e2SPeter Wemm else 3763c2aa98e2SPeter Wemm cp = map_rewrite(map, 3764c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3765c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3766c2aa98e2SPeter Wemm av); 3767c2aa98e2SPeter Wemm return cp; 3768c2aa98e2SPeter Wemm } 3769c2aa98e2SPeter Wemm 3770c2aa98e2SPeter Wemm /* 3771c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3772c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3773c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3774c2aa98e2SPeter Wemm */ 3775c2aa98e2SPeter Wemm 377606f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 377706f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3778c2aa98e2SPeter Wemm { 3779c2aa98e2SPeter Wemm if (tTd(9, 1)) 378040266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3781c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3782c2aa98e2SPeter Wemm return NULL; 3783c2aa98e2SPeter Wemm } 3784c2aa98e2SPeter Wemm 3785c2aa98e2SPeter Wemm /* 3786c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3787c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3788c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3789c2aa98e2SPeter Wemm ** unknown. 3790c2aa98e2SPeter Wemm */ 3791c2aa98e2SPeter Wemm 379206f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 379340266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 379440266059SGregory Neil Shapiro #if NAMED_BIND 379540266059SGregory Neil Shapiro if (map->map_timeout > 0) 379640266059SGregory Neil Shapiro { 379740266059SGregory Neil Shapiro retrans = _res.retrans; 379840266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 379940266059SGregory Neil Shapiro } 380040266059SGregory Neil Shapiro if (map->map_retry > 0) 380140266059SGregory Neil Shapiro { 380240266059SGregory Neil Shapiro retry = _res.retry; 380340266059SGregory Neil Shapiro _res.retry = map->map_retry; 380440266059SGregory Neil Shapiro } 380540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 380640266059SGregory Neil Shapiro 380740266059SGregory Neil Shapiro /* set default TTL */ 380840266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 3809c2aa98e2SPeter Wemm if (*name != '[') 3810c2aa98e2SPeter Wemm { 381140266059SGregory Neil Shapiro int ttl; 381240266059SGregory Neil Shapiro 381340266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof hbuf); 381440266059SGregory Neil Shapiro if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX, &ttl)) 381540266059SGregory Neil Shapiro { 381606f25ae9SGregory Neil Shapiro ans = hbuf; 381740266059SGregory Neil Shapiro if (ttl > 0) 381840266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 381940266059SGregory Neil Shapiro SM_DEFAULT_TTL); 382040266059SGregory Neil Shapiro } 3821c2aa98e2SPeter Wemm } 3822c2aa98e2SPeter Wemm else 3823c2aa98e2SPeter Wemm { 382406f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3825193538b7SGregory Neil Shapiro { 3826193538b7SGregory Neil Shapiro if (tTd(9, 1)) 382740266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 382806f25ae9SGregory Neil Shapiro return NULL; 3829193538b7SGregory Neil Shapiro } 383006f25ae9SGregory Neil Shapiro *cp = '\0'; 383106f25ae9SGregory Neil Shapiro 383206f25ae9SGregory Neil Shapiro hp = NULL; 383306f25ae9SGregory Neil Shapiro #if NETINET 383406f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 383506f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 383606f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 383706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 383806f25ae9SGregory Neil Shapiro #if NETINET6 383906f25ae9SGregory Neil Shapiro if (hp == NULL && 384040266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 384106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 384206f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 384306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 384406f25ae9SGregory Neil Shapiro *cp = ']'; 384506f25ae9SGregory Neil Shapiro 384606f25ae9SGregory Neil Shapiro if (hp != NULL) 384706f25ae9SGregory Neil Shapiro { 384806f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 384940266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 385040266059SGregory Neil Shapiro #if NETINET6 385140266059SGregory Neil Shapiro if (ans == hp->h_name) 385240266059SGregory Neil Shapiro { 385340266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 385440266059SGregory Neil Shapiro 385540266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 385640266059SGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof n); 385740266059SGregory Neil Shapiro ans = n; 385840266059SGregory Neil Shapiro } 3859193538b7SGregory Neil Shapiro freehostent(hp); 3860193538b7SGregory Neil Shapiro hp = NULL; 386140266059SGregory Neil Shapiro #endif /* NETINET6 */ 386206f25ae9SGregory Neil Shapiro } 386306f25ae9SGregory Neil Shapiro } 386440266059SGregory Neil Shapiro #if NAMED_BIND 386540266059SGregory Neil Shapiro if (map->map_timeout > 0) 386640266059SGregory Neil Shapiro _res.retrans = retrans; 386740266059SGregory Neil Shapiro if (map->map_retry > 0) 386840266059SGregory Neil Shapiro _res.retry = retry; 386940266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 387006f25ae9SGregory Neil Shapiro 387106f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 387206f25ae9SGregory Neil Shapiro 387306f25ae9SGregory Neil Shapiro /* Found an answer */ 387406f25ae9SGregory Neil Shapiro if (ans != NULL) 387506f25ae9SGregory Neil Shapiro { 387606f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 387740266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 387840266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 387940266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 388006f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 388106f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 388206f25ae9SGregory Neil Shapiro else 388306f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 3884193538b7SGregory Neil Shapiro if (tTd(9, 1)) 388540266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 388606f25ae9SGregory Neil Shapiro return cp; 388706f25ae9SGregory Neil Shapiro } 388806f25ae9SGregory Neil Shapiro 388906f25ae9SGregory Neil Shapiro 389006f25ae9SGregory Neil Shapiro /* No match found */ 3891c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 3892c2aa98e2SPeter Wemm #if NAMED_BIND 3893c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 3894c2aa98e2SPeter Wemm if (tTd(9, 1)) 389540266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 3896c2aa98e2SPeter Wemm switch (h_errno) 3897c2aa98e2SPeter Wemm { 3898c2aa98e2SPeter Wemm case TRY_AGAIN: 3899c2aa98e2SPeter Wemm if (UseNameServer) 3900c2aa98e2SPeter Wemm { 3901c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3902c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3903c2aa98e2SPeter Wemm shortenstring(name, 33)); 3904c2aa98e2SPeter Wemm } 3905c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3906c2aa98e2SPeter Wemm break; 3907c2aa98e2SPeter Wemm 3908c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 3909c2aa98e2SPeter Wemm case NO_DATA: 3910c2aa98e2SPeter Wemm *statp = EX_NOHOST; 3911c2aa98e2SPeter Wemm break; 3912c2aa98e2SPeter Wemm 3913c2aa98e2SPeter Wemm case NO_RECOVERY: 3914c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 3915c2aa98e2SPeter Wemm break; 3916c2aa98e2SPeter Wemm 3917c2aa98e2SPeter Wemm default: 3918c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 3919c2aa98e2SPeter Wemm break; 3920c2aa98e2SPeter Wemm } 392106f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 3922c2aa98e2SPeter Wemm if (tTd(9, 1)) 392340266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 3924c2aa98e2SPeter Wemm *statp = EX_NOHOST; 392506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 3926c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 3927c2aa98e2SPeter Wemm return NULL; 3928c2aa98e2SPeter Wemm } 3929c2aa98e2SPeter Wemm /* 3930c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 393140266059SGregory Neil Shapiro ** 393240266059SGregory Neil Shapiro ** Parameters: 393340266059SGregory Neil Shapiro ** map -- a pointer to this map. 393440266059SGregory Neil Shapiro ** args -- argument string. 393540266059SGregory Neil Shapiro ** 393640266059SGregory Neil Shapiro ** Returns: 393740266059SGregory Neil Shapiro ** true. 3938c2aa98e2SPeter Wemm */ 3939c2aa98e2SPeter Wemm 3940c2aa98e2SPeter Wemm bool 3941c2aa98e2SPeter Wemm host_map_init(map, args) 3942c2aa98e2SPeter Wemm MAP *map; 3943c2aa98e2SPeter Wemm char *args; 3944c2aa98e2SPeter Wemm { 3945c2aa98e2SPeter Wemm register char *p = args; 3946c2aa98e2SPeter Wemm 3947c2aa98e2SPeter Wemm for (;;) 3948c2aa98e2SPeter Wemm { 3949c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3950c2aa98e2SPeter Wemm p++; 3951c2aa98e2SPeter Wemm if (*p != '-') 3952c2aa98e2SPeter Wemm break; 3953c2aa98e2SPeter Wemm switch (*++p) 3954c2aa98e2SPeter Wemm { 3955c2aa98e2SPeter Wemm case 'a': 3956c2aa98e2SPeter Wemm map->map_app = ++p; 3957c2aa98e2SPeter Wemm break; 3958c2aa98e2SPeter Wemm 3959c2aa98e2SPeter Wemm case 'T': 3960c2aa98e2SPeter Wemm map->map_tapp = ++p; 3961c2aa98e2SPeter Wemm break; 3962c2aa98e2SPeter Wemm 3963c2aa98e2SPeter Wemm case 'm': 3964c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 3965c2aa98e2SPeter Wemm break; 3966c2aa98e2SPeter Wemm 3967c2aa98e2SPeter Wemm case 't': 3968c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 3969c2aa98e2SPeter Wemm break; 397006f25ae9SGregory Neil Shapiro 397106f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 397206f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 397306f25ae9SGregory Neil Shapiro break; 397406f25ae9SGregory Neil Shapiro 397506f25ae9SGregory Neil Shapiro case 'D': 397606f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 397706f25ae9SGregory Neil Shapiro break; 397840266059SGregory Neil Shapiro 397940266059SGregory Neil Shapiro case 'd': 398040266059SGregory Neil Shapiro { 398140266059SGregory Neil Shapiro char *h; 398240266059SGregory Neil Shapiro 398340266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 398440266059SGregory Neil Shapiro continue; 398540266059SGregory Neil Shapiro h = strchr(p, ' '); 398640266059SGregory Neil Shapiro if (h != NULL) 398740266059SGregory Neil Shapiro *h = '\0'; 398840266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 398940266059SGregory Neil Shapiro if (h != NULL) 399040266059SGregory Neil Shapiro *h = ' '; 399140266059SGregory Neil Shapiro } 399240266059SGregory Neil Shapiro break; 399340266059SGregory Neil Shapiro 399440266059SGregory Neil Shapiro case 'r': 399540266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 399640266059SGregory Neil Shapiro continue; 399740266059SGregory Neil Shapiro map->map_retry = atoi(p); 399840266059SGregory Neil Shapiro break; 3999c2aa98e2SPeter Wemm } 4000c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4001c2aa98e2SPeter Wemm p++; 4002c2aa98e2SPeter Wemm if (*p != '\0') 4003c2aa98e2SPeter Wemm *p++ = '\0'; 4004c2aa98e2SPeter Wemm } 4005c2aa98e2SPeter Wemm if (map->map_app != NULL) 4006c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4007c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4008c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 400940266059SGregory Neil Shapiro return true; 4010c2aa98e2SPeter Wemm } 401140266059SGregory Neil Shapiro 401206f25ae9SGregory Neil Shapiro #if NETINET6 401306f25ae9SGregory Neil Shapiro /* 401406f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 401506f25ae9SGregory Neil Shapiro ** 401606f25ae9SGregory Neil Shapiro ** Parameters: 401706f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 401806f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 401906f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 402006f25ae9SGregory Neil Shapiro ** 402106f25ae9SGregory Neil Shapiro ** Returns: 402206f25ae9SGregory Neil Shapiro ** A printable version of that structure. 402306f25ae9SGregory Neil Shapiro */ 402440266059SGregory Neil Shapiro 402506f25ae9SGregory Neil Shapiro char * 402606f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 402706f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 402806f25ae9SGregory Neil Shapiro char *dst; 402906f25ae9SGregory Neil Shapiro size_t dst_len; 403006f25ae9SGregory Neil Shapiro { 403106f25ae9SGregory Neil Shapiro register char *ap; 403206f25ae9SGregory Neil Shapiro 403306f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 403406f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 403506f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 403606f25ae9SGregory Neil Shapiro dst, dst_len); 403706f25ae9SGregory Neil Shapiro else 403840266059SGregory Neil Shapiro { 403940266059SGregory Neil Shapiro char *d; 404040266059SGregory Neil Shapiro size_t sz; 404140266059SGregory Neil Shapiro 404240266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 404340266059SGregory Neil Shapiro d = dst; 404440266059SGregory Neil Shapiro 404540266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 404640266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 404740266059SGregory Neil Shapiro if (sz >= dst_len) 404840266059SGregory Neil Shapiro return NULL; 404940266059SGregory Neil Shapiro dst += sz; 405040266059SGregory Neil Shapiro dst_len -= sz; 405106f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 405240266059SGregory Neil Shapiro 405340266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 405440266059SGregory Neil Shapiro if (ap != NULL) 405540266059SGregory Neil Shapiro ap = d; 405640266059SGregory Neil Shapiro } 405706f25ae9SGregory Neil Shapiro return ap; 405806f25ae9SGregory Neil Shapiro } 405940266059SGregory Neil Shapiro 406040266059SGregory Neil Shapiro /* 406140266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 406240266059SGregory Neil Shapiro ** 406340266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 406440266059SGregory Neil Shapiro ** 406540266059SGregory Neil Shapiro ** Parameters: 406640266059SGregory Neil Shapiro ** family -- address family 406740266059SGregory Neil Shapiro ** src -- string 406840266059SGregory Neil Shapiro ** dst -- destination address structure 406940266059SGregory Neil Shapiro ** 407040266059SGregory Neil Shapiro ** Returns: 407140266059SGregory Neil Shapiro ** 1 if the address was valid 407240266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 407340266059SGregory Neil Shapiro ** -1 if error 407440266059SGregory Neil Shapiro */ 407540266059SGregory Neil Shapiro 407640266059SGregory Neil Shapiro int 407740266059SGregory Neil Shapiro anynet_pton(family, src, dst) 407840266059SGregory Neil Shapiro int family; 407940266059SGregory Neil Shapiro const char *src; 408040266059SGregory Neil Shapiro void *dst; 408140266059SGregory Neil Shapiro { 408240266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 408340266059SGregory Neil Shapiro src += 5; 408440266059SGregory Neil Shapiro return inet_pton(family, src, dst); 408540266059SGregory Neil Shapiro } 408606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 408740266059SGregory Neil Shapiro /* 4088c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4089c2aa98e2SPeter Wemm ** 4090c2aa98e2SPeter Wemm ** Parameters: 4091c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4092c2aa98e2SPeter Wemm ** 4093c2aa98e2SPeter Wemm ** Returns: 4094c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4095c2aa98e2SPeter Wemm */ 4096c2aa98e2SPeter Wemm 4097c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4098c2aa98e2SPeter Wemm 4099c2aa98e2SPeter Wemm # if NETLINK 4100c2aa98e2SPeter Wemm # include <net/if_dl.h> 410106f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4102c2aa98e2SPeter Wemm 4103c2aa98e2SPeter Wemm char * 4104c2aa98e2SPeter Wemm anynet_ntoa(sap) 4105c2aa98e2SPeter Wemm register SOCKADDR *sap; 4106c2aa98e2SPeter Wemm { 4107c2aa98e2SPeter Wemm register char *bp; 4108c2aa98e2SPeter Wemm register char *ap; 4109c2aa98e2SPeter Wemm int l; 4110c2aa98e2SPeter Wemm static char buf[100]; 4111c2aa98e2SPeter Wemm 4112c2aa98e2SPeter Wemm /* check for null/zero family */ 4113c2aa98e2SPeter Wemm if (sap == NULL) 4114c2aa98e2SPeter Wemm return "NULLADDR"; 4115c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4116c2aa98e2SPeter Wemm return "0"; 4117c2aa98e2SPeter Wemm 4118c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4119c2aa98e2SPeter Wemm { 4120c2aa98e2SPeter Wemm # if NETUNIX 4121c2aa98e2SPeter Wemm case AF_UNIX: 4122c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 412340266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[UNIX: %.64s]", 4124c2aa98e2SPeter Wemm sap->sunix.sun_path); 4125c2aa98e2SPeter Wemm else 412640266059SGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof buf); 4127c2aa98e2SPeter Wemm return buf; 412806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4129c2aa98e2SPeter Wemm 4130c2aa98e2SPeter Wemm # if NETINET 4131c2aa98e2SPeter Wemm case AF_INET: 413206f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 413306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 413406f25ae9SGregory Neil Shapiro 413506f25ae9SGregory Neil Shapiro # if NETINET6 413606f25ae9SGregory Neil Shapiro case AF_INET6: 413706f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 413806f25ae9SGregory Neil Shapiro if (ap != NULL) 413906f25ae9SGregory Neil Shapiro return ap; 414006f25ae9SGregory Neil Shapiro break; 414106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4142c2aa98e2SPeter Wemm 4143c2aa98e2SPeter Wemm # if NETLINK 4144c2aa98e2SPeter Wemm case AF_LINK: 414540266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[LINK: %s]", 4146c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4147c2aa98e2SPeter Wemm return buf; 414806f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4149c2aa98e2SPeter Wemm default: 4150c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4151c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4152c2aa98e2SPeter Wemm break; 4153c2aa98e2SPeter Wemm } 4154c2aa98e2SPeter Wemm 4155c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 415640266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 4157c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4158c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4159c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 4160c2aa98e2SPeter Wemm { 416140266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 416240266059SGregory Neil Shapiro *ap++ & 0377); 4163c2aa98e2SPeter Wemm bp += 3; 4164c2aa98e2SPeter Wemm } 4165c2aa98e2SPeter Wemm *--bp = '\0'; 4166c2aa98e2SPeter Wemm return buf; 4167c2aa98e2SPeter Wemm } 416840266059SGregory Neil Shapiro /* 4169c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4170c2aa98e2SPeter Wemm ** 4171c2aa98e2SPeter Wemm ** Parameters: 4172c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4173c2aa98e2SPeter Wemm ** 4174c2aa98e2SPeter Wemm ** Returns: 4175c2aa98e2SPeter Wemm ** text representation of host name. 4176c2aa98e2SPeter Wemm ** 4177c2aa98e2SPeter Wemm ** Side Effects: 4178c2aa98e2SPeter Wemm ** none. 4179c2aa98e2SPeter Wemm */ 4180c2aa98e2SPeter Wemm 4181c2aa98e2SPeter Wemm char * 4182c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4183c2aa98e2SPeter Wemm register SOCKADDR *sap; 4184c2aa98e2SPeter Wemm { 4185c2aa98e2SPeter Wemm register struct hostent *hp; 418606f25ae9SGregory Neil Shapiro # if NAMED_BIND 4187c2aa98e2SPeter Wemm int saveretry; 418806f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 418906f25ae9SGregory Neil Shapiro # if NETINET6 419006f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 419106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4192c2aa98e2SPeter Wemm 4193c2aa98e2SPeter Wemm # if NAMED_BIND 4194c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4195c2aa98e2SPeter Wemm saveretry = _res.retry; 419606f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 419706f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4198c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4199c2aa98e2SPeter Wemm 4200c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4201c2aa98e2SPeter Wemm { 4202c2aa98e2SPeter Wemm # if NETINET 4203c2aa98e2SPeter Wemm case AF_INET: 4204c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 420540266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4206c2aa98e2SPeter Wemm break; 420706f25ae9SGregory Neil Shapiro # endif /* NETINET */ 420806f25ae9SGregory Neil Shapiro 420906f25ae9SGregory Neil Shapiro # if NETINET6 421006f25ae9SGregory Neil Shapiro case AF_INET6: 421106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 421240266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 421306f25ae9SGregory Neil Shapiro break; 421406f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4215c2aa98e2SPeter Wemm 4216c2aa98e2SPeter Wemm # if NETISO 4217c2aa98e2SPeter Wemm case AF_ISO: 4218c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 421940266059SGregory Neil Shapiro sizeof sap->siso.siso_addr, AF_ISO); 4220c2aa98e2SPeter Wemm break; 422106f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4222c2aa98e2SPeter Wemm 4223c2aa98e2SPeter Wemm # if NETUNIX 4224c2aa98e2SPeter Wemm case AF_UNIX: 4225c2aa98e2SPeter Wemm hp = NULL; 4226c2aa98e2SPeter Wemm break; 422706f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4228c2aa98e2SPeter Wemm 4229c2aa98e2SPeter Wemm default: 423040266059SGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof sap->sa.sa_data, 4231c2aa98e2SPeter Wemm sap->sa.sa_family); 4232c2aa98e2SPeter Wemm break; 4233c2aa98e2SPeter Wemm } 4234c2aa98e2SPeter Wemm 4235c2aa98e2SPeter Wemm # if NAMED_BIND 4236c2aa98e2SPeter Wemm _res.retry = saveretry; 4237c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4238c2aa98e2SPeter Wemm 423906f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 424006f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 424106f25ae9SGregory Neil Shapiro # if NETINET6 424206f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 424306f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 424406f25ae9SGregory Neil Shapiro # if NETINET 424506f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 424606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 424706f25ae9SGregory Neil Shapiro ) 4248193538b7SGregory Neil Shapiro { 4249193538b7SGregory Neil Shapiro char *name; 4250193538b7SGregory Neil Shapiro 425140266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 425240266059SGregory Neil Shapiro # if NETINET6 4253193538b7SGregory Neil Shapiro if (name == hp->h_name) 4254193538b7SGregory Neil Shapiro { 4255193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4256193538b7SGregory Neil Shapiro 4257193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 425840266059SGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof n); 4259193538b7SGregory Neil Shapiro name = n; 4260193538b7SGregory Neil Shapiro } 4261193538b7SGregory Neil Shapiro freehostent(hp); 426240266059SGregory Neil Shapiro # endif /* NETINET6 */ 4263193538b7SGregory Neil Shapiro return name; 4264193538b7SGregory Neil Shapiro } 426506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4266193538b7SGregory Neil Shapiro 426740266059SGregory Neil Shapiro # if NETINET6 4268193538b7SGregory Neil Shapiro if (hp != NULL) 4269193538b7SGregory Neil Shapiro { 4270193538b7SGregory Neil Shapiro freehostent(hp); 4271193538b7SGregory Neil Shapiro hp = NULL; 4272193538b7SGregory Neil Shapiro } 427340266059SGregory Neil Shapiro # endif /* NETINET6 */ 4274193538b7SGregory Neil Shapiro 4275c2aa98e2SPeter Wemm # if NETUNIX 427606f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4277c2aa98e2SPeter Wemm return "localhost"; 427806f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4279c2aa98e2SPeter Wemm { 4280c2aa98e2SPeter Wemm static char buf[203]; 4281c2aa98e2SPeter Wemm 428240266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[%.200s]", 428340266059SGregory Neil Shapiro anynet_ntoa(sap)); 4284c2aa98e2SPeter Wemm return buf; 4285c2aa98e2SPeter Wemm } 4286c2aa98e2SPeter Wemm } 428706f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4288