1c2aa98e2SPeter Wemm /* 2*5dd76dd0SGregory Neil Shapiro * Copyright (c) 1998-2007, 2009, 2010 Proofpoint, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 15d0cef73dSGregory Neil Shapiro #include "map.h" 1606f25ae9SGregory Neil Shapiro 17*5dd76dd0SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.698 2013/11/22 20:51:55 ca Exp $") 18c2aa98e2SPeter Wemm 19c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 20c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2106f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 22c2aa98e2SPeter Wemm 2340266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2406f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 25c2aa98e2SPeter Wemm # include <arpa/inet.h> 2606f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 27c2aa98e2SPeter Wemm # if NAMED_BIND 28c2aa98e2SPeter Wemm # ifndef NO_DATA 29c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 3006f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3106f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3240266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 33c2aa98e2SPeter Wemm 3442e5d165SGregory Neil Shapiro #if STARTTLS 3542e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3642e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3742e5d165SGregory Neil Shapiro 384e4196cbSGregory Neil Shapiro #include <sm/time.h> 39c2aa98e2SPeter Wemm 4006f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 41c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 42c2aa98e2SPeter Wemm # include <netinet/ip.h> 4306f25ae9SGregory Neil Shapiro # if HAS_IN_H 4406f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4506f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4606f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4806f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4906f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5006f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 51c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5206f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5306f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5406f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5506f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5606f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5706f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5806f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5906f25ae9SGregory Neil Shapiro 6040266059SGregory Neil Shapiro #include <sm/fdset.h> 6140266059SGregory Neil Shapiro 62d0cef73dSGregory Neil Shapiro #define DAEMON_C 1 63d0cef73dSGregory Neil Shapiro #include <daemon.h> 6413d88268SGregory Neil Shapiro 65b6bacd31SGregory Neil Shapiro static void connecttimeout __P((int)); 6640266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 6740266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 6840266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 69b6bacd31SGregory Neil Shapiro static void setsockaddroptions __P((char *, DAEMON_T *)); 70b6bacd31SGregory Neil Shapiro static void printdaemonflags __P((DAEMON_T *)); 71b6bacd31SGregory Neil Shapiro static int addr_family __P((char *)); 72b6bacd31SGregory Neil Shapiro static int addrcmp __P((struct hostent *, char *, SOCKADDR *)); 73b6bacd31SGregory Neil Shapiro static void authtimeout __P((int)); 74c2aa98e2SPeter Wemm 75c2aa98e2SPeter Wemm /* 76c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 77c2aa98e2SPeter Wemm ** 78c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 79c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 80c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 81c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 82c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 83c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 84c2aa98e2SPeter Wemm ** 85c2aa98e2SPeter Wemm ** getrequests(e) 86c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 87c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 88c2aa98e2SPeter Wemm ** OutChannel appropriately. 89c2aa98e2SPeter Wemm ** clrdaemon() 90c2aa98e2SPeter Wemm ** Close any open files associated with getting 91c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 92c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 93c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 94c2aa98e2SPeter Wemm ** code (if it cares). 9540266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 96c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 9740266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 9840266059SGregory Neil Shapiro ** describing the error. 99c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 100c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 101c2aa98e2SPeter Wemm */ 10206f25ae9SGregory Neil Shapiro 10340266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 10406f25ae9SGregory Neil Shapiro 10540266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 10606f25ae9SGregory Neil Shapiro 10740266059SGregory Neil Shapiro /* 108c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 109c2aa98e2SPeter Wemm ** 110c2aa98e2SPeter Wemm ** Parameters: 111c2aa98e2SPeter Wemm ** e -- the current envelope. 112c2aa98e2SPeter Wemm ** 113c2aa98e2SPeter Wemm ** Returns: 11406f25ae9SGregory Neil Shapiro ** pointer to flags. 115c2aa98e2SPeter Wemm ** 116c2aa98e2SPeter Wemm ** Side Effects: 117c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 118c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 119c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 120c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 121c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 122c2aa98e2SPeter Wemm ** to the communication channel. 12340266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 12440266059SGregory Neil Shapiro ** for some reason. 125c2aa98e2SPeter Wemm */ 126c2aa98e2SPeter Wemm 12706f25ae9SGregory Neil Shapiro BITMAP256 * 128c2aa98e2SPeter Wemm getrequests(e) 129c2aa98e2SPeter Wemm ENVELOPE *e; 130c2aa98e2SPeter Wemm { 131c2aa98e2SPeter Wemm int t; 13206f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 13306f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 134c2aa98e2SPeter Wemm #if XDEBUG 135c2aa98e2SPeter Wemm bool j_has_dot; 13606f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 137065a643dSPeter Wemm char status[MAXLINE]; 13806f25ae9SGregory Neil Shapiro SOCKADDR sa; 139d0cef73dSGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof(sa); 140605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 141605302a5SGregory Neil Shapiro time_t lastrun; 142605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 14306f25ae9SGregory Neil Shapiro # if NETUNIX 144065a643dSPeter Wemm extern int ControlSocket; 14506f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 14606f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 147c2aa98e2SPeter Wemm 14806f25ae9SGregory Neil Shapiro 149323f6dcbSGregory Neil Shapiro /* initialize data for function that generates queue ids */ 150323f6dcbSGregory Neil Shapiro init_qid_alg(); 15140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 152c2aa98e2SPeter Wemm { 15306f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 15440266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 15506f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 156c2aa98e2SPeter Wemm } 157193538b7SGregory Neil Shapiro 158c2aa98e2SPeter Wemm /* 159c2aa98e2SPeter Wemm ** Try to actually open the connection. 160c2aa98e2SPeter Wemm */ 161c2aa98e2SPeter Wemm 162c2aa98e2SPeter Wemm if (tTd(15, 1)) 16306f25ae9SGregory Neil Shapiro { 16440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 165193538b7SGregory Neil Shapiro { 16640266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 16706f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 16806f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 16906f25ae9SGregory Neil Shapiro } 170193538b7SGregory Neil Shapiro } 171c2aa98e2SPeter Wemm 172c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 17340266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 17440266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 175c2aa98e2SPeter Wemm 176065a643dSPeter Wemm if (opencontrolsocket() < 0) 177065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1782e43090eSPeter Wemm "daemon could not open control socket %s: %s", 17940266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 180065a643dSPeter Wemm 18140266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 18240266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 1838774250cSGregory Neil Shapiro 18440266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 18506f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 186c2aa98e2SPeter Wemm 187c2aa98e2SPeter Wemm #if XDEBUG 188c2aa98e2SPeter Wemm { 189c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 190c2aa98e2SPeter Wemm 191d0cef73dSGregory Neil Shapiro expand("\201j", jbuf, sizeof(jbuf), e); 192c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 193c2aa98e2SPeter Wemm } 19406f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 195c2aa98e2SPeter Wemm 196065a643dSPeter Wemm /* Add parent process as first item */ 197e92d3f3fSGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1, NULL); 198065a643dSPeter Wemm 199c2aa98e2SPeter Wemm if (tTd(15, 1)) 20006f25ae9SGregory Neil Shapiro { 20140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 2029bd497b8SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: socket %d\n", 20306f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 20406f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 20506f25ae9SGregory Neil Shapiro } 206c2aa98e2SPeter Wemm 207c2aa98e2SPeter Wemm for (;;) 208c2aa98e2SPeter Wemm { 209c2aa98e2SPeter Wemm register pid_t pid; 210c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 21140266059SGregory Neil Shapiro bool timedout = false; 21240266059SGregory Neil Shapiro bool control = false; 21306f25ae9SGregory Neil Shapiro int save_errno; 214c2aa98e2SPeter Wemm int pipefd[2]; 21540266059SGregory Neil Shapiro time_t now; 21642e5d165SGregory Neil Shapiro #if STARTTLS 21742e5d165SGregory Neil Shapiro long seed; 21842e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 219c2aa98e2SPeter Wemm 220c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 22140266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 222a7ec597cSGregory Neil Shapiro CHECK_RESTART; 2238774250cSGregory Neil Shapiro 22440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 22540266059SGregory Neil Shapiro { 226193538b7SGregory Neil Shapiro /* 22740266059SGregory Neil Shapiro ** XXX do this call outside the loop? 22840266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 229193538b7SGregory Neil Shapiro */ 230193538b7SGregory Neil Shapiro 23140266059SGregory Neil Shapiro now = curtime(); 23240266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 23306f25ae9SGregory Neil Shapiro continue; 23440266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 23540266059SGregory Neil Shapiro continue; 236d0cef73dSGregory Neil Shapiro if (refuseconnections(e, idx, curdaemon == idx)) 237c2aa98e2SPeter Wemm { 23806f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 239c2aa98e2SPeter Wemm { 240065a643dSPeter Wemm /* close socket so peer fails quickly */ 24106f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 24206f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 243c2aa98e2SPeter Wemm } 244c2aa98e2SPeter Wemm 245065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 24640266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 247065a643dSPeter Wemm } 24806f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 24906f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 250c2aa98e2SPeter Wemm { 25140266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 25206f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 25306f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 25406f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 25506f25ae9SGregory Neil Shapiro 256065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 25740266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 25840266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 259065a643dSPeter Wemm } 260c2aa98e2SPeter Wemm } 261c2aa98e2SPeter Wemm 2628774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 263a7ec597cSGregory Neil Shapiro CHECK_RESTART; 264e92d3f3fSGregory Neil Shapiro 26540266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 26606f25ae9SGregory Neil Shapiro 267c2aa98e2SPeter Wemm #if XDEBUG 268c2aa98e2SPeter Wemm /* check for disaster */ 269c2aa98e2SPeter Wemm { 270c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 271c2aa98e2SPeter Wemm 272d0cef73dSGregory Neil Shapiro expand("\201j", jbuf, sizeof(jbuf), e); 273c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 274c2aa98e2SPeter Wemm { 275c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 276c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 277c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 278c2aa98e2SPeter Wemm abort(); 279c2aa98e2SPeter Wemm } 280c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 281c2aa98e2SPeter Wemm { 282c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 283c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 284c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 285c2aa98e2SPeter Wemm abort(); 286c2aa98e2SPeter Wemm } 287c2aa98e2SPeter Wemm } 28806f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 289c2aa98e2SPeter Wemm 290c2aa98e2SPeter Wemm #if 0 291c2aa98e2SPeter Wemm /* 292c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 293c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 294c2aa98e2SPeter Wemm ** so is it worth doing this? 295c2aa98e2SPeter Wemm */ 296c2aa98e2SPeter Wemm 297065a643dSPeter Wemm if (DaemonSocket >= 0 && 29840266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 299c2aa98e2SPeter Wemm log an error here; 30006f25ae9SGregory Neil Shapiro #endif /* 0 */ 30140266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 30206f25ae9SGregory Neil Shapiro 303c2aa98e2SPeter Wemm for (;;) 304c2aa98e2SPeter Wemm { 30540266059SGregory Neil Shapiro bool setproc = false; 306065a643dSPeter Wemm int highest = -1; 307c2aa98e2SPeter Wemm fd_set readfds; 308c2aa98e2SPeter Wemm struct timeval timeout; 309c2aa98e2SPeter Wemm 310a7ec597cSGregory Neil Shapiro CHECK_RESTART; 311c2aa98e2SPeter Wemm FD_ZERO(&readfds); 31240266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 313065a643dSPeter Wemm { 31406f25ae9SGregory Neil Shapiro /* wait for a connection */ 31506f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 31606f25ae9SGregory Neil Shapiro { 317193538b7SGregory Neil Shapiro if (!setproc && 318193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 319193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 32006f25ae9SGregory Neil Shapiro { 32140266059SGregory Neil Shapiro sm_setproctitle(true, e, 32206f25ae9SGregory Neil Shapiro "accepting connections"); 32340266059SGregory Neil Shapiro setproc = true; 324065a643dSPeter Wemm } 32506f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 32606f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 32740266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 32840266059SGregory Neil Shapiro &readfds); 32906f25ae9SGregory Neil Shapiro } 33006f25ae9SGregory Neil Shapiro } 33106f25ae9SGregory Neil Shapiro 33206f25ae9SGregory Neil Shapiro #if NETUNIX 333065a643dSPeter Wemm if (ControlSocket >= 0) 334065a643dSPeter Wemm { 335065a643dSPeter Wemm if (ControlSocket > highest) 336065a643dSPeter Wemm highest = ControlSocket; 33740266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 338065a643dSPeter Wemm } 33906f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 34006f25ae9SGregory Neil Shapiro 341065a643dSPeter Wemm timeout.tv_sec = 5; 342c2aa98e2SPeter Wemm timeout.tv_usec = 0; 343c2aa98e2SPeter Wemm 344065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 345c2aa98e2SPeter Wemm NULL, NULL, &timeout); 346065a643dSPeter Wemm 3478774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 348a7ec597cSGregory Neil Shapiro CHECK_RESTART; 349193538b7SGregory Neil Shapiro 350193538b7SGregory Neil Shapiro curdaemon = -1; 35140266059SGregory Neil Shapiro if (doqueuerun()) 352605302a5SGregory Neil Shapiro { 35340266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 354605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 355605302a5SGregory Neil Shapiro lastrun = now; 356605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 357605302a5SGregory Neil Shapiro } 358605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 3594e4196cbSGregory Neil Shapiro else if (CheckQueueRunners > 0 && QueueIntvl > 0 && 3604e4196cbSGregory Neil Shapiro lastrun + QueueIntvl + CheckQueueRunners < now) 361605302a5SGregory Neil Shapiro { 362605302a5SGregory Neil Shapiro 363605302a5SGregory Neil Shapiro /* 364605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 365605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 366605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 367605302a5SGregory Neil Shapiro ** result of the function call. 368605302a5SGregory Neil Shapiro */ 369605302a5SGregory Neil Shapiro 370605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 371605302a5SGregory Neil Shapiro lastrun = now; 372605302a5SGregory Neil Shapiro } 373605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 37440266059SGregory Neil Shapiro 375065a643dSPeter Wemm if (t <= 0) 376065a643dSPeter Wemm { 37740266059SGregory Neil Shapiro timedout = true; 378065a643dSPeter Wemm break; 379065a643dSPeter Wemm } 380c2aa98e2SPeter Wemm 38140266059SGregory Neil Shapiro control = false; 382c2aa98e2SPeter Wemm errno = 0; 38306f25ae9SGregory Neil Shapiro 38406f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 38540266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 38606f25ae9SGregory Neil Shapiro idx = 0; 38740266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 388065a643dSPeter Wemm { 38906f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 39040266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 39140266059SGregory Neil Shapiro &readfds)) 39206f25ae9SGregory Neil Shapiro { 39306f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 394602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 395d0cef73dSGregory Neil Shapiro sizeof(RealHostAddr)); 39606f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 397065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 398065a643dSPeter Wemm &lotherend); 399602a2b1bSGregory Neil Shapiro 400602a2b1bSGregory Neil Shapiro /* 401602a2b1bSGregory Neil Shapiro ** If remote side closes before 402602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 403602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 404602a2b1bSGregory Neil Shapiro */ 405602a2b1bSGregory Neil Shapiro 406602a2b1bSGregory Neil Shapiro if (t >= 0 && 407602a2b1bSGregory Neil Shapiro (lotherend == 0 || 408602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 409602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 410602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 411602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 412602a2b1bSGregory Neil Shapiro { 413602a2b1bSGregory Neil Shapiro (void) close(t); 414602a2b1bSGregory Neil Shapiro t = -1; 415602a2b1bSGregory Neil Shapiro errno = EINVAL; 416602a2b1bSGregory Neil Shapiro } 41706f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 41806f25ae9SGregory Neil Shapiro break; 419065a643dSPeter Wemm } 42040266059SGregory Neil Shapiro if (++idx >= NDaemons) 42106f25ae9SGregory Neil Shapiro idx = 0; 42206f25ae9SGregory Neil Shapiro } 42306f25ae9SGregory Neil Shapiro #if NETUNIX 42406f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 42540266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 426065a643dSPeter Wemm { 427065a643dSPeter Wemm struct sockaddr_un sa_un; 428065a643dSPeter Wemm 429d0cef73dSGregory Neil Shapiro lotherend = sizeof(sa_un); 430d0cef73dSGregory Neil Shapiro memset(&sa_un, '\0', sizeof(sa_un)); 431065a643dSPeter Wemm t = accept(ControlSocket, 432065a643dSPeter Wemm (struct sockaddr *)&sa_un, 433065a643dSPeter Wemm &lotherend); 434602a2b1bSGregory Neil Shapiro 435602a2b1bSGregory Neil Shapiro /* 436602a2b1bSGregory Neil Shapiro ** If remote side closes before 437602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 438602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 439602a2b1bSGregory Neil Shapiro */ 440602a2b1bSGregory Neil Shapiro 441602a2b1bSGregory Neil Shapiro if (t >= 0 && 442602a2b1bSGregory Neil Shapiro (lotherend == 0 || 443602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 444602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 445602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 446602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 447602a2b1bSGregory Neil Shapiro { 448602a2b1bSGregory Neil Shapiro (void) close(t); 449602a2b1bSGregory Neil Shapiro t = -1; 450602a2b1bSGregory Neil Shapiro errno = EINVAL; 451602a2b1bSGregory Neil Shapiro } 452602a2b1bSGregory Neil Shapiro if (t >= 0) 45340266059SGregory Neil Shapiro control = true; 454065a643dSPeter Wemm } 455193538b7SGregory Neil Shapiro #else /* NETUNIX */ 456193538b7SGregory Neil Shapiro if (curdaemon == -1) 457193538b7SGregory Neil Shapiro { 458193538b7SGregory Neil Shapiro /* No daemon to service */ 459193538b7SGregory Neil Shapiro continue; 460193538b7SGregory Neil Shapiro } 46106f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 462c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 463c2aa98e2SPeter Wemm break; 464c2aa98e2SPeter Wemm } 465065a643dSPeter Wemm if (timedout) 466065a643dSPeter Wemm { 46740266059SGregory Neil Shapiro timedout = false; 468065a643dSPeter Wemm continue; 469065a643dSPeter Wemm } 47006f25ae9SGregory Neil Shapiro save_errno = errno; 47140266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 472c2aa98e2SPeter Wemm if (t < 0) 473c2aa98e2SPeter Wemm { 47406f25ae9SGregory Neil Shapiro errno = save_errno; 475e92d3f3fSGregory Neil Shapiro 476e92d3f3fSGregory Neil Shapiro /* let's ignore these temporary errors */ 477e92d3f3fSGregory Neil Shapiro if (save_errno == EINTR 478e92d3f3fSGregory Neil Shapiro #ifdef EAGAIN 479e92d3f3fSGregory Neil Shapiro || save_errno == EAGAIN 480e92d3f3fSGregory Neil Shapiro #endif /* EAGAIN */ 481e92d3f3fSGregory Neil Shapiro #ifdef ECONNABORTED 482e92d3f3fSGregory Neil Shapiro || save_errno == ECONNABORTED 483e92d3f3fSGregory Neil Shapiro #endif /* ECONNABORTED */ 484e92d3f3fSGregory Neil Shapiro #ifdef EWOULDBLOCK 485e92d3f3fSGregory Neil Shapiro || save_errno == EWOULDBLOCK 486e92d3f3fSGregory Neil Shapiro #endif /* EWOULDBLOCK */ 487e92d3f3fSGregory Neil Shapiro ) 488e92d3f3fSGregory Neil Shapiro continue; 489e92d3f3fSGregory Neil Shapiro 490c2aa98e2SPeter Wemm syserr("getrequests: accept"); 491c2aa98e2SPeter Wemm 492af9557fdSGregory Neil Shapiro if (curdaemon >= 0) 493af9557fdSGregory Neil Shapiro { 494af9557fdSGregory Neil Shapiro /* arrange to re-open socket next time around */ 49506f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 49606f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 49706f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 49806f25ae9SGregory Neil Shapiro /* 49906f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 50006f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 50106f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 50206f25ae9SGregory Neil Shapiro */ 50306f25ae9SGregory Neil Shapiro 504af9557fdSGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = 505af9557fdSGregory Neil Shapiro curtime() + 15; 50606f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 507af9557fdSGregory Neil Shapiro } 508c2aa98e2SPeter Wemm continue; 509c2aa98e2SPeter Wemm } 510c2aa98e2SPeter Wemm 51106f25ae9SGregory Neil Shapiro if (!control) 51206f25ae9SGregory Neil Shapiro { 51306f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 51406f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 51506f25ae9SGregory Neil Shapiro { 51606f25ae9SGregory Neil Shapiro case AF_UNSPEC: 51740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 51840266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 51906f25ae9SGregory Neil Shapiro break; 52040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 52140266059SGregory Neil Shapiro # if NETUNIX 52240266059SGregory Neil Shapiro case AF_UNIX: 52340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 52440266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 52540266059SGregory Neil Shapiro break; 52640266059SGregory Neil Shapiro # endif /* NETUNIX */ 52740266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 52806f25ae9SGregory Neil Shapiro #if NETINET 52906f25ae9SGregory Neil Shapiro case AF_INET: 53040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53140266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 53206f25ae9SGregory Neil Shapiro break; 53306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 53406f25ae9SGregory Neil Shapiro #if NETINET6 53506f25ae9SGregory Neil Shapiro case AF_INET6: 53640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53740266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 53806f25ae9SGregory Neil Shapiro break; 53906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 54006f25ae9SGregory Neil Shapiro #if NETISO 54106f25ae9SGregory Neil Shapiro case AF_ISO: 54240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54340266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 54406f25ae9SGregory Neil Shapiro break; 54506f25ae9SGregory Neil Shapiro #endif /* NETISO */ 54606f25ae9SGregory Neil Shapiro #if NETNS 54706f25ae9SGregory Neil Shapiro case AF_NS: 54840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54940266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 55006f25ae9SGregory Neil Shapiro break; 55106f25ae9SGregory Neil Shapiro #endif /* NETNS */ 55206f25ae9SGregory Neil Shapiro #if NETX25 55306f25ae9SGregory Neil Shapiro case AF_CCITT: 55440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55540266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 55606f25ae9SGregory Neil Shapiro break; 55706f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 55806f25ae9SGregory Neil Shapiro } 55940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56040266059SGregory Neil Shapiro macid("{daemon_name}"), 56140266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 56206f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 56340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56440266059SGregory Neil Shapiro macid("{daemon_flags}"), 56540266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 56606f25ae9SGregory Neil Shapiro else 56740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56840266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 56906f25ae9SGregory Neil Shapiro } 57006f25ae9SGregory Neil Shapiro 571c2aa98e2SPeter Wemm /* 572e92d3f3fSGregory Neil Shapiro ** If connection rate is exceeded here, connection shall be 573e92d3f3fSGregory Neil Shapiro ** refused later by a new call after fork() by the 574e92d3f3fSGregory Neil Shapiro ** validate_connection() function. Closing the connection 575e92d3f3fSGregory Neil Shapiro ** at this point violates RFC 2821. 576e92d3f3fSGregory Neil Shapiro ** Do NOT remove this call, its side effects are needed. 577e92d3f3fSGregory Neil Shapiro */ 578e92d3f3fSGregory Neil Shapiro 579e92d3f3fSGregory Neil Shapiro connection_rate_check(&RealHostAddr, NULL); 580e92d3f3fSGregory Neil Shapiro 581e92d3f3fSGregory Neil Shapiro /* 582c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 583c2aa98e2SPeter Wemm */ 584c2aa98e2SPeter Wemm 585c2aa98e2SPeter Wemm if (tTd(15, 2)) 58640266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 58706f25ae9SGregory Neil Shapiro 58806f25ae9SGregory Neil Shapiro /* 58940266059SGregory Neil Shapiro ** Advance state of PRNG. 59040266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 59106f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 59206f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 59306f25ae9SGregory Neil Shapiro ** are not "really" random. 59406f25ae9SGregory Neil Shapiro */ 59542e5d165SGregory Neil Shapiro #if STARTTLS 59640266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 59742e5d165SGregory Neil Shapiro seed = get_random(); 59840266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 599d0cef73dSGregory Neil Shapiro sizeof(NextDiskSpaceCheck)); 600d0cef73dSGregory Neil Shapiro RAND_seed((void *) &now, sizeof(now)); 601d0cef73dSGregory Neil Shapiro RAND_seed((void *) &seed, sizeof(seed)); 60242e5d165SGregory Neil Shapiro #else /* STARTTLS */ 60306f25ae9SGregory Neil Shapiro (void) get_random(); 60442e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 605c2aa98e2SPeter Wemm 60640266059SGregory Neil Shapiro #if NAMED_BIND 60740266059SGregory Neil Shapiro /* 608e92d3f3fSGregory Neil Shapiro ** Update MX records for FallbackMX. 60940266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 61040266059SGregory Neil Shapiro ** response time. 61140266059SGregory Neil Shapiro */ 61240266059SGregory Neil Shapiro 613e92d3f3fSGregory Neil Shapiro if (FallbackMX != NULL) 614e92d3f3fSGregory Neil Shapiro (void) getfallbackmxrr(FallbackMX); 61540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 61640266059SGregory Neil Shapiro 61713bd1963SGregory Neil Shapiro if (tTd(93, 100)) 61813bd1963SGregory Neil Shapiro { 61913bd1963SGregory Neil Shapiro /* don't fork, handle connection in this process */ 62013bd1963SGregory Neil Shapiro pid = 0; 62113bd1963SGregory Neil Shapiro pipefd[0] = pipefd[1] = -1; 62213bd1963SGregory Neil Shapiro } 62313bd1963SGregory Neil Shapiro else 62413bd1963SGregory Neil Shapiro { 625c2aa98e2SPeter Wemm /* 62613bd1963SGregory Neil Shapiro ** Create a pipe to keep the child from writing to 62713bd1963SGregory Neil Shapiro ** the socket until after the parent has closed 62813bd1963SGregory Neil Shapiro ** it. Otherwise the parent may hang if the child 62913bd1963SGregory Neil Shapiro ** has closed it first. 630c2aa98e2SPeter Wemm */ 631c2aa98e2SPeter Wemm 632c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 633c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 634c2aa98e2SPeter Wemm 63540266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 636c2aa98e2SPeter Wemm pid = fork(); 637c2aa98e2SPeter Wemm if (pid < 0) 638c2aa98e2SPeter Wemm { 639c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 640c2aa98e2SPeter Wemm if (pipefd[0] != -1) 641c2aa98e2SPeter Wemm { 642c2aa98e2SPeter Wemm (void) close(pipefd[0]); 643c2aa98e2SPeter Wemm (void) close(pipefd[1]); 644c2aa98e2SPeter Wemm } 64540266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 64606f25ae9SGregory Neil Shapiro (void) sleep(10); 647c2aa98e2SPeter Wemm (void) close(t); 648c2aa98e2SPeter Wemm continue; 649c2aa98e2SPeter Wemm } 65013bd1963SGregory Neil Shapiro } 651c2aa98e2SPeter Wemm 652c2aa98e2SPeter Wemm if (pid == 0) 653c2aa98e2SPeter Wemm { 654c2aa98e2SPeter Wemm char *p; 65540266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 656c2aa98e2SPeter Wemm 657c2aa98e2SPeter Wemm /* 658c2aa98e2SPeter Wemm ** CHILD -- return to caller. 659c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 660c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 661c2aa98e2SPeter Wemm */ 662c2aa98e2SPeter Wemm 6638774250cSGregory Neil Shapiro /* Reset global flags */ 6648774250cSGregory Neil Shapiro RestartRequest = NULL; 66540266059SGregory Neil Shapiro RestartWorkGroup = false; 6668774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6678774250cSGregory Neil Shapiro PendingSignal = 0; 66840266059SGregory Neil Shapiro CurrentPid = getpid(); 669e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 6708774250cSGregory Neil Shapiro 67140266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 67240266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 67340266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 67440266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 67540266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 67640266059SGregory Neil Shapiro 67740266059SGregory Neil Shapiro /* turn on profiling */ 67840266059SGregory Neil Shapiro /* SM_PROF(0); */ 67940266059SGregory Neil Shapiro 68040266059SGregory Neil Shapiro /* 68140266059SGregory Neil Shapiro ** Initialize exception stack and default exception 68240266059SGregory Neil Shapiro ** handler for child process. 68340266059SGregory Neil Shapiro */ 68440266059SGregory Neil Shapiro 68540266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 6868774250cSGregory Neil Shapiro 68706f25ae9SGregory Neil Shapiro if (!control) 68806f25ae9SGregory Neil Shapiro { 68940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 69040266059SGregory Neil Shapiro macid("{daemon_addr}"), 69140266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 692d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), "%d", 69306f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 69440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 69540266059SGregory Neil Shapiro macid("{daemon_port}"), status); 69606f25ae9SGregory Neil Shapiro } 69706f25ae9SGregory Neil Shapiro 69840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 69906f25ae9SGregory Neil Shapiro { 70006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 70106f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 70213058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 70306f25ae9SGregory Neil Shapiro } 704065a643dSPeter Wemm clrcontrol(); 70506f25ae9SGregory Neil Shapiro 70606f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 70706f25ae9SGregory Neil Shapiro if (control) 70806f25ae9SGregory Neil Shapiro { 70906f25ae9SGregory Neil Shapiro /* Add control socket process */ 71040266059SGregory Neil Shapiro proc_list_add(CurrentPid, 71140266059SGregory Neil Shapiro "console socket child", 712e92d3f3fSGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1, NULL); 71306f25ae9SGregory Neil Shapiro } 71406f25ae9SGregory Neil Shapiro else 71506f25ae9SGregory Neil Shapiro { 716c2aa98e2SPeter Wemm proc_list_clear(); 717c2aa98e2SPeter Wemm 71840266059SGregory Neil Shapiro /* clean up background delivery children */ 71940266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 72040266059SGregory Neil Shapiro 721065a643dSPeter Wemm /* Add parent process as first child item */ 72240266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 723e92d3f3fSGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1, NULL); 72406f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 725c2aa98e2SPeter Wemm QueueIntvl = 0; 726d0cef73dSGregory Neil Shapiro 727d0cef73dSGregory Neil Shapiro /* 728d0cef73dSGregory Neil Shapiro ** Hack: override global variables if 729d0cef73dSGregory Neil Shapiro ** the corresponding DaemonPortOption 730d0cef73dSGregory Neil Shapiro ** is set. 731d0cef73dSGregory Neil Shapiro */ 73213d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 73313d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_supersafe != 734d0cef73dSGregory Neil Shapiro DPO_NOTSET) 735d0cef73dSGregory Neil Shapiro SuperSafe = Daemons[curdaemon]. 736d0cef73dSGregory Neil Shapiro d_supersafe; 73713d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 73813d88268SGregory Neil Shapiro if (Daemons[curdaemon].d_dm != DM_NOTSET) 73913d88268SGregory Neil Shapiro set_delivery_mode( 74013d88268SGregory Neil Shapiro Daemons[curdaemon].d_dm, e); 741d0cef73dSGregory Neil Shapiro 742d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_refuseLA != 743d0cef73dSGregory Neil Shapiro DPO_NOTSET) 744d0cef73dSGregory Neil Shapiro RefuseLA = Daemons[curdaemon]. 745d0cef73dSGregory Neil Shapiro d_refuseLA; 746d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_queueLA != DPO_NOTSET) 747d0cef73dSGregory Neil Shapiro QueueLA = Daemons[curdaemon].d_queueLA; 748d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_delayLA != DPO_NOTSET) 749d0cef73dSGregory Neil Shapiro DelayLA = Daemons[curdaemon].d_delayLA; 750d0cef73dSGregory Neil Shapiro if (Daemons[curdaemon].d_maxchildren != 751d0cef73dSGregory Neil Shapiro DPO_NOTSET) 752d0cef73dSGregory Neil Shapiro MaxChildren = Daemons[curdaemon]. 753d0cef73dSGregory Neil Shapiro d_maxchildren; 75413d88268SGregory Neil Shapiro 75540266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 756c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 75706f25ae9SGregory Neil Shapiro } 758c2aa98e2SPeter Wemm 759c2aa98e2SPeter Wemm if (pipefd[0] != -1) 760c2aa98e2SPeter Wemm { 761c2aa98e2SPeter Wemm auto char c; 762c2aa98e2SPeter Wemm 763c2aa98e2SPeter Wemm /* 764c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 765c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 766c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 767c2aa98e2SPeter Wemm ** socket until after the parent has closed 768c2aa98e2SPeter Wemm ** the pipe. 769c2aa98e2SPeter Wemm */ 770c2aa98e2SPeter Wemm 771c2aa98e2SPeter Wemm /* close the write end of the pipe */ 772c2aa98e2SPeter Wemm (void) close(pipefd[1]); 773c2aa98e2SPeter Wemm 774c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 775c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 776c2aa98e2SPeter Wemm errno == EINTR) 777c2aa98e2SPeter Wemm continue; 778c2aa98e2SPeter Wemm (void) close(pipefd[0]); 779c2aa98e2SPeter Wemm } 780c2aa98e2SPeter Wemm 78106f25ae9SGregory Neil Shapiro /* control socket processing */ 78206f25ae9SGregory Neil Shapiro if (control) 78306f25ae9SGregory Neil Shapiro { 78406f25ae9SGregory Neil Shapiro control_command(t, e); 78506f25ae9SGregory Neil Shapiro /* NOTREACHED */ 78606f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 78706f25ae9SGregory Neil Shapiro } 78806f25ae9SGregory Neil Shapiro 789c2aa98e2SPeter Wemm /* determine host name */ 790c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 79140266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 792c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 793c2aa98e2SPeter Wemm RealHostName = newstr(p); 79406f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 79506f25ae9SGregory Neil Shapiro { 79640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 79740266059SGregory Neil Shapiro macid("{client_resolve}"), 79840266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 79906f25ae9SGregory Neil Shapiro } 80006f25ae9SGregory Neil Shapiro else 801e92d3f3fSGregory Neil Shapiro { 80240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 80340266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 804e92d3f3fSGregory Neil Shapiro } 80540266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 806605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 807c2aa98e2SPeter Wemm 80840266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 80940266059SGregory Neil Shapiro SM_TIME_DEFAULT, 81040266059SGregory Neil Shapiro (void *) &t, 811e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, 81240266059SGregory Neil Shapiro NULL)) == NULL || 813c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 81440266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 81540266059SGregory Neil Shapiro SM_TIME_DEFAULT, 81640266059SGregory Neil Shapiro (void *) &t, 817e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, 81840266059SGregory Neil Shapiro NULL)) == NULL) 819c2aa98e2SPeter Wemm { 82040266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 82140266059SGregory Neil Shapiro t); 82240266059SGregory Neil Shapiro finis(false, true, EX_OK); 823c2aa98e2SPeter Wemm } 82440266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 825c2aa98e2SPeter Wemm 826c2aa98e2SPeter Wemm InChannel = inchannel; 827c2aa98e2SPeter Wemm OutChannel = outchannel; 82840266059SGregory Neil Shapiro DisConnected = false; 829c2aa98e2SPeter Wemm 830ba00ec3dSGregory Neil Shapiro 83140266059SGregory Neil Shapiro #if XLA 832c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 833c2aa98e2SPeter Wemm { 83406f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 83540266059SGregory Neil Shapiro finis(false, true, EX_OK); 836c2aa98e2SPeter Wemm } 83706f25ae9SGregory Neil Shapiro #endif /* XLA */ 83806f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 83940266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 84040266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 84106f25ae9SGregory Neil Shapiro { 84206f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 84306f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 84440266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 84540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 84640266059SGregory Neil Shapiro macid("{if_name}"), p); 84706f25ae9SGregory Neil Shapiro 84840266059SGregory Neil Shapiro /* 84940266059SGregory Neil Shapiro ** Do this only if it is not the loopback 85040266059SGregory Neil Shapiro ** interface. 85140266059SGregory Neil Shapiro */ 85240266059SGregory Neil Shapiro 85306f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 85406f25ae9SGregory Neil Shapiro { 85540266059SGregory Neil Shapiro char *addr; 85640266059SGregory Neil Shapiro char family[5]; 85740266059SGregory Neil Shapiro 85840266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 85940266059SGregory Neil Shapiro (void) sm_snprintf(family, 86040266059SGregory Neil Shapiro sizeof(family), 86140266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 86240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 86340266059SGregory Neil Shapiro A_TEMP, 86440266059SGregory Neil Shapiro macid("{if_addr}"), addr); 86540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 86640266059SGregory Neil Shapiro A_TEMP, 86740266059SGregory Neil Shapiro macid("{if_family}"), family); 86806f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 86940266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 87040266059SGregory Neil Shapiro addr, family); 87106f25ae9SGregory Neil Shapiro } 87206f25ae9SGregory Neil Shapiro else 87306f25ae9SGregory Neil Shapiro { 87440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 87540266059SGregory Neil Shapiro A_PERM, 87640266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 87740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 87840266059SGregory Neil Shapiro A_PERM, 87940266059SGregory Neil Shapiro macid("{if_family}"), NULL); 88006f25ae9SGregory Neil Shapiro } 88106f25ae9SGregory Neil Shapiro } 88206f25ae9SGregory Neil Shapiro else 88306f25ae9SGregory Neil Shapiro { 88406f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 88540266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 88640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 88740266059SGregory Neil Shapiro macid("{if_name}"), NULL); 88840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 88940266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 89040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 89140266059SGregory Neil Shapiro macid("{if_family}"), NULL); 89206f25ae9SGregory Neil Shapiro } 893c2aa98e2SPeter Wemm break; 894c2aa98e2SPeter Wemm } 895c2aa98e2SPeter Wemm 896c2aa98e2SPeter Wemm /* parent -- keep track of children */ 89706f25ae9SGregory Neil Shapiro if (control) 89806f25ae9SGregory Neil Shapiro { 899d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), 90040266059SGregory Neil Shapiro "control socket server child"); 901e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1, NULL); 90206f25ae9SGregory Neil Shapiro } 90306f25ae9SGregory Neil Shapiro else 90406f25ae9SGregory Neil Shapiro { 905d0cef73dSGregory Neil Shapiro (void) sm_snprintf(status, sizeof(status), 90606f25ae9SGregory Neil Shapiro "SMTP server child for %s", 907065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 908e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1, 909e92d3f3fSGregory Neil Shapiro &RealHostAddr); 91006f25ae9SGregory Neil Shapiro } 91140266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 912c2aa98e2SPeter Wemm 913c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 914c2aa98e2SPeter Wemm if (pipefd[0] != -1) 91506f25ae9SGregory Neil Shapiro { 916c2aa98e2SPeter Wemm (void) close(pipefd[0]); 91706f25ae9SGregory Neil Shapiro pipefd[0] = -1; 91806f25ae9SGregory Neil Shapiro } 919c2aa98e2SPeter Wemm 920c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 921c2aa98e2SPeter Wemm (void) close(t); 922c2aa98e2SPeter Wemm 923c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 924c2aa98e2SPeter Wemm if (pipefd[1] != -1) 92506f25ae9SGregory Neil Shapiro { 926c2aa98e2SPeter Wemm (void) close(pipefd[1]); 92706f25ae9SGregory Neil Shapiro pipefd[1] = -1; 928c2aa98e2SPeter Wemm } 92906f25ae9SGregory Neil Shapiro } 930c2aa98e2SPeter Wemm if (tTd(15, 2)) 93140266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 93240266059SGregory Neil Shapiro 93340266059SGregory Neil Shapiro #if MILTER 93440266059SGregory Neil Shapiro /* set the filters for this daemon */ 93540266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 93640266059SGregory Neil Shapiro { 93740266059SGregory Neil Shapiro for (i = 0; 93813bd1963SGregory Neil Shapiro (i < MAXFILTERS && 93913bd1963SGregory Neil Shapiro Daemons[curdaemon].d_inputfilters[i] != NULL); 94040266059SGregory Neil Shapiro i++) 94140266059SGregory Neil Shapiro { 94240266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 94340266059SGregory Neil Shapiro } 94440266059SGregory Neil Shapiro if (i < MAXFILTERS) 94540266059SGregory Neil Shapiro InputFilters[i] = NULL; 94640266059SGregory Neil Shapiro } 94740266059SGregory Neil Shapiro #endif /* MILTER */ 94806f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 949c2aa98e2SPeter Wemm } 95040266059SGregory Neil Shapiro 95140266059SGregory Neil Shapiro /* 95240266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 95340266059SGregory Neil Shapiro ** 95440266059SGregory Neil Shapiro ** Parameters: 95540266059SGregory Neil Shapiro ** e -- envelope. 95640266059SGregory Neil Shapiro ** 95740266059SGregory Neil Shapiro ** Returns: 95840266059SGregory Neil Shapiro ** none. 95940266059SGregory Neil Shapiro ** 96040266059SGregory Neil Shapiro ** Side Effects: 96140266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 96240266059SGregory Neil Shapiro */ 96340266059SGregory Neil Shapiro 96440266059SGregory Neil Shapiro static void 96540266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 96640266059SGregory Neil Shapiro ENVELOPE *e; 96740266059SGregory Neil Shapiro { 96840266059SGregory Neil Shapiro bool logged = false; 96940266059SGregory Neil Shapiro int idx; 97040266059SGregory Neil Shapiro time_t now; 97140266059SGregory Neil Shapiro 97240266059SGregory Neil Shapiro now = curtime(); 97340266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 97440266059SGregory Neil Shapiro return; 97540266059SGregory Neil Shapiro 97640266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 97740266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 97840266059SGregory Neil Shapiro { 97940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 98040266059SGregory Neil Shapiro { 98140266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 98240266059SGregory Neil Shapiro continue; 98340266059SGregory Neil Shapiro 98440266059SGregory Neil Shapiro /* log only if not logged before */ 98540266059SGregory Neil Shapiro if (!logged) 98640266059SGregory Neil Shapiro { 98740266059SGregory Neil Shapiro if (LogLevel > 8) 98840266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 98940266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 99040266059SGregory Neil Shapiro MinBlocksFree); 99140266059SGregory Neil Shapiro sm_setproctitle(true, e, 99240266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 99340266059SGregory Neil Shapiro MinBlocksFree); 99440266059SGregory Neil Shapiro logged = true; 99540266059SGregory Neil Shapiro } 99640266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 99740266059SGregory Neil Shapiro } 99840266059SGregory Neil Shapiro } 99940266059SGregory Neil Shapiro else 100040266059SGregory Neil Shapiro { 100140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 100240266059SGregory Neil Shapiro { 100340266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 100440266059SGregory Neil Shapiro continue; 100540266059SGregory Neil Shapiro 100640266059SGregory Neil Shapiro /* log only if not logged before */ 100740266059SGregory Neil Shapiro if (!logged) 100840266059SGregory Neil Shapiro { 100940266059SGregory Neil Shapiro if (LogLevel > 8) 101040266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 101140266059SGregory Neil Shapiro "accepting new messages (again)"); 101240266059SGregory Neil Shapiro logged = true; 101340266059SGregory Neil Shapiro } 101440266059SGregory Neil Shapiro 101540266059SGregory Neil Shapiro /* title will be set later */ 101640266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 101740266059SGregory Neil Shapiro } 101840266059SGregory Neil Shapiro } 101940266059SGregory Neil Shapiro 102040266059SGregory Neil Shapiro /* only check disk space once a minute */ 102140266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 102240266059SGregory Neil Shapiro } 102340266059SGregory Neil Shapiro 102440266059SGregory Neil Shapiro /* 102506f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 1026c2aa98e2SPeter Wemm ** 102706f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 1028c2aa98e2SPeter Wemm ** 1029c2aa98e2SPeter Wemm ** Parameters: 103006f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 1031c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 1032c2aa98e2SPeter Wemm ** 1033c2aa98e2SPeter Wemm ** Returns: 1034c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 1035c2aa98e2SPeter Wemm ** 1036c2aa98e2SPeter Wemm ** Side Effects: 1037c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 1038c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 1039c2aa98e2SPeter Wemm */ 1040c2aa98e2SPeter Wemm 1041c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1042c2aa98e2SPeter Wemm 104306f25ae9SGregory Neil Shapiro static int 104406f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 104540266059SGregory Neil Shapiro DAEMON_T *d; 1046c2aa98e2SPeter Wemm bool firsttime; 1047c2aa98e2SPeter Wemm { 1048c2aa98e2SPeter Wemm int on = 1; 104906f25ae9SGregory Neil Shapiro int fdflags; 105006f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1051c2aa98e2SPeter Wemm int ntries = 0; 105206f25ae9SGregory Neil Shapiro int save_errno; 1053c2aa98e2SPeter Wemm 1054c2aa98e2SPeter Wemm if (tTd(15, 2)) 105540266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1056c2aa98e2SPeter Wemm 1057c2aa98e2SPeter Wemm do 1058c2aa98e2SPeter Wemm { 1059c2aa98e2SPeter Wemm if (ntries > 0) 106006f25ae9SGregory Neil Shapiro (void) sleep(5); 106106f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1062c2aa98e2SPeter Wemm { 106340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 106440266059SGregory Neil Shapiro # if NETUNIX 106540266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 106640266059SGregory Neil Shapiro { 106740266059SGregory Neil Shapiro int rval; 106840266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 106940266059SGregory Neil Shapiro 107040266059SGregory Neil Shapiro /* if not safe, don't use it */ 107140266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 107240266059SGregory Neil Shapiro RunAsUid, RunAsGid, 107340266059SGregory Neil Shapiro RunAsUserName, sff, 107440266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 107540266059SGregory Neil Shapiro if (rval != 0) 107640266059SGregory Neil Shapiro { 107740266059SGregory Neil Shapiro save_errno = errno; 107840266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 107940266059SGregory Neil Shapiro d->d_name, 108040266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 108140266059SGregory Neil Shapiro goto fail; 108240266059SGregory Neil Shapiro } 108340266059SGregory Neil Shapiro 108440266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 108540266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 108640266059SGregory Neil Shapiro } 108740266059SGregory Neil Shapiro # endif /* NETUNIX */ 108840266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 108906f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 109006f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 109106f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1092c2aa98e2SPeter Wemm { 109306f25ae9SGregory Neil Shapiro save_errno = errno; 109440266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 109540266059SGregory Neil Shapiro d->d_name); 109640266059SGregory Neil Shapiro fail: 109740266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 109840266059SGregory Neil Shapiro (!transienterror(save_errno) || 109940266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 110040266059SGregory Neil Shapiro { 110140266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 110240266059SGregory Neil Shapiro d->d_name); 110340266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 110440266059SGregory Neil Shapiro d->d_socket = -1; 110540266059SGregory Neil Shapiro return -1; 110640266059SGregory Neil Shapiro } 1107c2aa98e2SPeter Wemm severe: 1108c2aa98e2SPeter Wemm if (LogLevel > 0) 1109c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 111040266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 111140266059SGregory Neil Shapiro d->d_name); 111206f25ae9SGregory Neil Shapiro d->d_socket = -1; 1113c2aa98e2SPeter Wemm continue; 1114c2aa98e2SPeter Wemm } 1115c2aa98e2SPeter Wemm 111613bd1963SGregory Neil Shapiro if (SM_FD_SETSIZE > 0 && d->d_socket >= SM_FD_SETSIZE) 111713bd1963SGregory Neil Shapiro { 111813bd1963SGregory Neil Shapiro save_errno = EINVAL; 111913bd1963SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: server SMTP socket (%d) too large", 112013bd1963SGregory Neil Shapiro d->d_name, d->d_socket); 112113bd1963SGregory Neil Shapiro goto fail; 112213bd1963SGregory Neil Shapiro } 112313bd1963SGregory Neil Shapiro 1124c2aa98e2SPeter Wemm /* turn on network debugging? */ 1125c2aa98e2SPeter Wemm if (tTd(15, 101)) 112606f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1127c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1128d0cef73dSGregory Neil Shapiro sizeof(on)); 1129c2aa98e2SPeter Wemm 113006f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1131d0cef73dSGregory Neil Shapiro SO_REUSEADDR, (char *)&on, sizeof(on)); 113206f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1133d0cef73dSGregory Neil Shapiro SO_KEEPALIVE, (char *)&on, sizeof(on)); 1134c2aa98e2SPeter Wemm 1135c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 113606f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1137c2aa98e2SPeter Wemm { 113806f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1139c2aa98e2SPeter Wemm SO_RCVBUF, 114006f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 114106f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 114206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1143c2aa98e2SPeter Wemm } 114406f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 114506f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 114606f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 114706f25ae9SGregory Neil Shapiro { 114806f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 114906f25ae9SGregory Neil Shapiro SO_SNDBUF, 115006f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 115106f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 115206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 115306f25ae9SGregory Neil Shapiro } 115406f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1155c2aa98e2SPeter Wemm 115606f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 115706f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 115806f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 115906f25ae9SGregory Neil Shapiro { 116006f25ae9SGregory Neil Shapiro save_errno = errno; 116106f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 116206f25ae9SGregory Neil Shapiro d->d_name, 116306f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 116440266059SGregory Neil Shapiro sm_errstring(save_errno)); 116506f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 116606f25ae9SGregory Neil Shapiro goto severe; 116706f25ae9SGregory Neil Shapiro } 116806f25ae9SGregory Neil Shapiro 116906f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1170c2aa98e2SPeter Wemm { 117140266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 117240266059SGregory Neil Shapiro # ifdef NETUNIX 117340266059SGregory Neil Shapiro case AF_UNIX: 1174d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sunix); 117540266059SGregory Neil Shapiro break; 117640266059SGregory Neil Shapiro # endif /* NETUNIX */ 117740266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1178c2aa98e2SPeter Wemm #if NETINET 1179c2aa98e2SPeter Wemm case AF_INET: 1180d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sin); 1181c2aa98e2SPeter Wemm break; 118206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 118306f25ae9SGregory Neil Shapiro 118406f25ae9SGregory Neil Shapiro #if NETINET6 118506f25ae9SGregory Neil Shapiro case AF_INET6: 1186d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.sin6); 118706f25ae9SGregory Neil Shapiro break; 118806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1189c2aa98e2SPeter Wemm 1190c2aa98e2SPeter Wemm #if NETISO 1191c2aa98e2SPeter Wemm case AF_ISO: 1192d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr.siso); 1193c2aa98e2SPeter Wemm break; 119406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1195c2aa98e2SPeter Wemm 1196c2aa98e2SPeter Wemm default: 1197d0cef73dSGregory Neil Shapiro socksize = sizeof(d->d_addr); 1198c2aa98e2SPeter Wemm break; 1199c2aa98e2SPeter Wemm } 1200c2aa98e2SPeter Wemm 120106f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1202c2aa98e2SPeter Wemm { 1203c2aa98e2SPeter Wemm /* probably another daemon already */ 120406f25ae9SGregory Neil Shapiro save_errno = errno; 120506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 120606f25ae9SGregory Neil Shapiro d->d_name); 120706f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 120840266059SGregory Neil Shapiro goto fail; 1209c2aa98e2SPeter Wemm } 1210c2aa98e2SPeter Wemm } 121106f25ae9SGregory Neil Shapiro if (!firsttime && 121206f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1213c2aa98e2SPeter Wemm { 121406f25ae9SGregory Neil Shapiro save_errno = errno; 121506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 121606f25ae9SGregory Neil Shapiro d->d_name); 121706f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1218c2aa98e2SPeter Wemm goto severe; 1219c2aa98e2SPeter Wemm } 1220c2aa98e2SPeter Wemm return socksize; 122106f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 122206f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 122306f25ae9SGregory Neil Shapiro d->d_name); 1224065a643dSPeter Wemm /* NOTREACHED */ 1225c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1226c2aa98e2SPeter Wemm } 122740266059SGregory Neil Shapiro /* 122806f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 122906f25ae9SGregory Neil Shapiro ** 123006f25ae9SGregory Neil Shapiro ** Parameters: 123106f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 123206f25ae9SGregory Neil Shapiro ** 123306f25ae9SGregory Neil Shapiro ** Returns: 123406f25ae9SGregory Neil Shapiro ** port number on which daemon should run 123506f25ae9SGregory Neil Shapiro ** 123606f25ae9SGregory Neil Shapiro */ 123740266059SGregory Neil Shapiro 123840266059SGregory Neil Shapiro static unsigned short 123906f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 124006f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 124106f25ae9SGregory Neil Shapiro { 124240266059SGregory Neil Shapiro unsigned short port; 124306f25ae9SGregory Neil Shapiro 124406f25ae9SGregory Neil Shapiro /* 124506f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 124606f25ae9SGregory Neil Shapiro */ 124706f25ae9SGregory Neil Shapiro 124806f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 124906f25ae9SGregory Neil Shapiro { 1250d0cef73dSGregory Neil Shapiro memset(daemonaddr, '\0', sizeof(*daemonaddr)); 125106f25ae9SGregory Neil Shapiro #if NETINET 125206f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 125306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 125406f25ae9SGregory Neil Shapiro } 125506f25ae9SGregory Neil Shapiro 125606f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 125706f25ae9SGregory Neil Shapiro { 125806f25ae9SGregory Neil Shapiro #if NETINET 125906f25ae9SGregory Neil Shapiro case AF_INET: 126006f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 1261e3793f76SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = 1262e3793f76SGregory Neil Shapiro LocalDaemon ? htonl(INADDR_LOOPBACK) : INADDR_ANY; 126306f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 126406f25ae9SGregory Neil Shapiro break; 126506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 126606f25ae9SGregory Neil Shapiro 126706f25ae9SGregory Neil Shapiro #if NETINET6 126806f25ae9SGregory Neil Shapiro case AF_INET6: 126906f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 1270e3793f76SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = 12716f9c8e5bSGregory Neil Shapiro (LocalDaemon && V6LoopbackAddrFound) ? 12726f9c8e5bSGregory Neil Shapiro in6addr_loopback : in6addr_any; 127306f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 127406f25ae9SGregory Neil Shapiro break; 127506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 127606f25ae9SGregory Neil Shapiro 127706f25ae9SGregory Neil Shapiro default: 127806f25ae9SGregory Neil Shapiro /* unknown protocol */ 127906f25ae9SGregory Neil Shapiro port = 0; 128006f25ae9SGregory Neil Shapiro break; 128106f25ae9SGregory Neil Shapiro } 128206f25ae9SGregory Neil Shapiro if (port == 0) 128306f25ae9SGregory Neil Shapiro { 128406f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 128506f25ae9SGregory Neil Shapiro port = htons(25); 128606f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 128706f25ae9SGregory Neil Shapiro { 128806f25ae9SGregory Neil Shapiro register struct servent *sp; 128906f25ae9SGregory Neil Shapiro 129006f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 129106f25ae9SGregory Neil Shapiro if (sp == NULL) 129206f25ae9SGregory Neil Shapiro { 129306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 129406f25ae9SGregory Neil Shapiro port = htons(25); 129506f25ae9SGregory Neil Shapiro } 129606f25ae9SGregory Neil Shapiro else 129706f25ae9SGregory Neil Shapiro port = sp->s_port; 129806f25ae9SGregory Neil Shapiro } 129906f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 130006f25ae9SGregory Neil Shapiro } 130106f25ae9SGregory Neil Shapiro 130206f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 130306f25ae9SGregory Neil Shapiro { 130406f25ae9SGregory Neil Shapiro #if NETINET 130506f25ae9SGregory Neil Shapiro case AF_INET: 130606f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 130706f25ae9SGregory Neil Shapiro break; 130806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 130906f25ae9SGregory Neil Shapiro 131006f25ae9SGregory Neil Shapiro #if NETINET6 131106f25ae9SGregory Neil Shapiro case AF_INET6: 131206f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 131306f25ae9SGregory Neil Shapiro break; 131406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 131506f25ae9SGregory Neil Shapiro 131606f25ae9SGregory Neil Shapiro default: 131706f25ae9SGregory Neil Shapiro /* unknown protocol */ 131806f25ae9SGregory Neil Shapiro break; 131906f25ae9SGregory Neil Shapiro } 132040266059SGregory Neil Shapiro return port; 132106f25ae9SGregory Neil Shapiro } 132240266059SGregory Neil Shapiro /* 1323c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1324c2aa98e2SPeter Wemm ** 1325c2aa98e2SPeter Wemm ** Parameters: 1326c2aa98e2SPeter Wemm ** none. 1327c2aa98e2SPeter Wemm ** 1328c2aa98e2SPeter Wemm ** Returns: 1329c2aa98e2SPeter Wemm ** none. 1330c2aa98e2SPeter Wemm ** 1331c2aa98e2SPeter Wemm ** Side Effects: 1332c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1333c2aa98e2SPeter Wemm */ 1334c2aa98e2SPeter Wemm 1335c2aa98e2SPeter Wemm void 1336c2aa98e2SPeter Wemm clrdaemon() 1337c2aa98e2SPeter Wemm { 133806f25ae9SGregory Neil Shapiro int i; 133906f25ae9SGregory Neil Shapiro 134040266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 134106f25ae9SGregory Neil Shapiro { 134206f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 134306f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 134406f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 134506f25ae9SGregory Neil Shapiro } 1346c2aa98e2SPeter Wemm } 134740266059SGregory Neil Shapiro 134840266059SGregory Neil Shapiro /* 134940266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 135040266059SGregory Neil Shapiro ** 135140266059SGregory Neil Shapiro ** Parameters: 135240266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 135340266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 135440266059SGregory Neil Shapiro ** 135540266059SGregory Neil Shapiro ** Returns: 135640266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 135740266059SGregory Neil Shapiro ** 135840266059SGregory Neil Shapiro ** Side Effects: 135940266059SGregory Neil Shapiro ** fills in modifiers. 136040266059SGregory Neil Shapiro */ 136140266059SGregory Neil Shapiro 136240266059SGregory Neil Shapiro char * 136340266059SGregory Neil Shapiro getmodifiers(v, modifiers) 136440266059SGregory Neil Shapiro char *v; 136540266059SGregory Neil Shapiro BITMAP256 modifiers; 136640266059SGregory Neil Shapiro { 136740266059SGregory Neil Shapiro int l; 136840266059SGregory Neil Shapiro char *h, *f, *flags; 136940266059SGregory Neil Shapiro 137040266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 137140266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 137240266059SGregory Neil Shapiro 137340266059SGregory Neil Shapiro /* is someone joking? */ 137440266059SGregory Neil Shapiro if (l < 0 || l > 256) 137540266059SGregory Neil Shapiro { 137640266059SGregory Neil Shapiro if (LogLevel > 2) 137740266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 137840266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 137940266059SGregory Neil Shapiro return NULL; 138040266059SGregory Neil Shapiro } 138140266059SGregory Neil Shapiro flags = xalloc(l); 138240266059SGregory Neil Shapiro f = flags; 138340266059SGregory Neil Shapiro clrbitmap(modifiers); 138440266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 138540266059SGregory Neil Shapiro { 138640266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 138740266059SGregory Neil Shapiro { 138840266059SGregory Neil Shapiro setbitn(*h, modifiers); 138940266059SGregory Neil Shapiro if (flags != f) 139040266059SGregory Neil Shapiro *flags++ = ' '; 139140266059SGregory Neil Shapiro *flags++ = *h; 139240266059SGregory Neil Shapiro if (isupper(*h)) 139340266059SGregory Neil Shapiro *flags++ = *h; 139440266059SGregory Neil Shapiro } 139540266059SGregory Neil Shapiro } 139640266059SGregory Neil Shapiro *flags++ = '\0'; 139740266059SGregory Neil Shapiro return f; 139840266059SGregory Neil Shapiro } 139940266059SGregory Neil Shapiro 140040266059SGregory Neil Shapiro /* 140140266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 140240266059SGregory Neil Shapiro ** 140340266059SGregory Neil Shapiro ** Parameters: 140440266059SGregory Neil Shapiro ** flag -- the flag to test. 140540266059SGregory Neil Shapiro ** 140640266059SGregory Neil Shapiro ** Returns: 140740266059SGregory Neil Shapiro ** true iff all daemons have set flag. 140840266059SGregory Neil Shapiro */ 140940266059SGregory Neil Shapiro 141040266059SGregory Neil Shapiro bool 141140266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 141240266059SGregory Neil Shapiro int flag; 141340266059SGregory Neil Shapiro { 141440266059SGregory Neil Shapiro int i; 141540266059SGregory Neil Shapiro 141640266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 141740266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 141840266059SGregory Neil Shapiro return false; 141940266059SGregory Neil Shapiro return true; 142040266059SGregory Neil Shapiro } 142140266059SGregory Neil Shapiro 142240266059SGregory Neil Shapiro /* 142306f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1424c2aa98e2SPeter Wemm ** 1425c2aa98e2SPeter Wemm ** Parameters: 1426c2aa98e2SPeter Wemm ** p -- the options line. 142706f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1428c2aa98e2SPeter Wemm ** 1429c2aa98e2SPeter Wemm ** Returns: 1430c2aa98e2SPeter Wemm ** none. 1431c2aa98e2SPeter Wemm */ 1432c2aa98e2SPeter Wemm 143306f25ae9SGregory Neil Shapiro static void 143406f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1435b6bacd31SGregory Neil Shapiro char *p; 143640266059SGregory Neil Shapiro DAEMON_T *d; 1437c2aa98e2SPeter Wemm { 143806f25ae9SGregory Neil Shapiro #if NETISO 1439193538b7SGregory Neil Shapiro short portno; 144006f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1441193538b7SGregory Neil Shapiro char *port = NULL; 1442193538b7SGregory Neil Shapiro char *addr = NULL; 144306f25ae9SGregory Neil Shapiro 144406f25ae9SGregory Neil Shapiro #if NETINET 144506f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 144606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 144706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 14484e4196cbSGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 1449d0cef73dSGregory Neil Shapiro d->d_supersafe = DPO_NOTSET; 14504e4196cbSGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 14514e4196cbSGregory Neil Shapiro d->d_dm = DM_NOTSET; 1452d0cef73dSGregory Neil Shapiro d->d_refuseLA = DPO_NOTSET; 1453d0cef73dSGregory Neil Shapiro d->d_queueLA = DPO_NOTSET; 1454d0cef73dSGregory Neil Shapiro d->d_delayLA = DPO_NOTSET; 1455d0cef73dSGregory Neil Shapiro d->d_maxchildren = DPO_NOTSET; 1456c2aa98e2SPeter Wemm 1457c2aa98e2SPeter Wemm while (p != NULL) 1458c2aa98e2SPeter Wemm { 1459c2aa98e2SPeter Wemm register char *f; 1460c2aa98e2SPeter Wemm register char *v; 1461c2aa98e2SPeter Wemm 1462c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1463c2aa98e2SPeter Wemm p++; 1464c2aa98e2SPeter Wemm if (*p == '\0') 1465c2aa98e2SPeter Wemm break; 1466c2aa98e2SPeter Wemm f = p; 1467c2aa98e2SPeter Wemm p = strchr(p, ','); 1468c2aa98e2SPeter Wemm if (p != NULL) 1469c2aa98e2SPeter Wemm *p++ = '\0'; 1470c2aa98e2SPeter Wemm v = strchr(f, '='); 1471c2aa98e2SPeter Wemm if (v == NULL) 1472c2aa98e2SPeter Wemm continue; 1473c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1474c2aa98e2SPeter Wemm continue; 1475c2aa98e2SPeter Wemm 1476c2aa98e2SPeter Wemm switch (*f) 1477c2aa98e2SPeter Wemm { 147813d88268SGregory Neil Shapiro case 'A': /* address */ 1479d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1480d0cef73dSGregory Neil Shapiro case 'a': 1481d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 148213d88268SGregory Neil Shapiro addr = v; 148313d88268SGregory Neil Shapiro break; 148413d88268SGregory Neil Shapiro 1485d0cef73dSGregory Neil Shapiro case 'c': 1486d0cef73dSGregory Neil Shapiro d->d_maxchildren = atoi(v); 1487d0cef73dSGregory Neil Shapiro break; 1488d0cef73dSGregory Neil Shapiro 148913d88268SGregory Neil Shapiro case 'D': /* DeliveryMode */ 149013d88268SGregory Neil Shapiro switch (*v) 149113d88268SGregory Neil Shapiro { 149213d88268SGregory Neil Shapiro case SM_QUEUE: 149313d88268SGregory Neil Shapiro case SM_DEFER: 149413d88268SGregory Neil Shapiro case SM_DELIVER: 149513d88268SGregory Neil Shapiro case SM_FORK: 149613d88268SGregory Neil Shapiro d->d_dm = *v; 149713d88268SGregory Neil Shapiro break; 149813d88268SGregory Neil Shapiro default: 149913d88268SGregory Neil Shapiro syserr("554 5.3.5 Unknown delivery mode %c", 150013d88268SGregory Neil Shapiro *v); 150113d88268SGregory Neil Shapiro break; 150213d88268SGregory Neil Shapiro } 150313d88268SGregory Neil Shapiro break; 1504d0cef73dSGregory Neil Shapiro 1505d0cef73dSGregory Neil Shapiro case 'd': /* delayLA */ 1506d0cef73dSGregory Neil Shapiro d->d_delayLA = atoi(v); 1507d0cef73dSGregory Neil Shapiro break; 150813d88268SGregory Neil Shapiro 1509c2aa98e2SPeter Wemm case 'F': /* address family */ 1510d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1511d0cef73dSGregory Neil Shapiro case 'f': 1512d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 1513c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 151406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 151540266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 151640266059SGregory Neil Shapiro # ifdef NETUNIX 151740266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 151840266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 151940266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 152040266059SGregory Neil Shapiro # endif /* NETUNIX */ 152140266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1522c2aa98e2SPeter Wemm #if NETINET 152340266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 152406f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 152506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 152606f25ae9SGregory Neil Shapiro #if NETINET6 152740266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 152806f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 152906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1530c2aa98e2SPeter Wemm #if NETISO 153140266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 153206f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 153306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1534c2aa98e2SPeter Wemm #if NETNS 153540266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 153606f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 153706f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1538c2aa98e2SPeter Wemm #if NETX25 153940266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 154006f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 154106f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1542c2aa98e2SPeter Wemm else 154306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 154406f25ae9SGregory Neil Shapiro v); 1545c2aa98e2SPeter Wemm break; 1546c2aa98e2SPeter Wemm 154740266059SGregory Neil Shapiro #if MILTER 154840266059SGregory Neil Shapiro case 'I': 1549d0cef73dSGregory Neil Shapiro # if !_FFR_DPO_CS 1550d0cef73dSGregory Neil Shapiro case 'i': 1551d0cef73dSGregory Neil Shapiro # endif /* !_FFR_DPO_CS */ 155240266059SGregory Neil Shapiro d->d_inputfilterlist = v; 155340266059SGregory Neil Shapiro break; 155440266059SGregory Neil Shapiro #endif /* MILTER */ 155540266059SGregory Neil Shapiro 1556c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 1557d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1558d0cef73dSGregory Neil Shapiro case 'l': 1559d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 156006f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 156106f25ae9SGregory Neil Shapiro break; 156206f25ae9SGregory Neil Shapiro 156306f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 1564d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1565d0cef73dSGregory Neil Shapiro case 'm': 1566d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 156740266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1568c2aa98e2SPeter Wemm break; 1569c2aa98e2SPeter Wemm 157013d88268SGregory Neil Shapiro case 'N': /* name */ 1571d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1572d0cef73dSGregory Neil Shapiro case 'n': 1573d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 157413d88268SGregory Neil Shapiro d->d_name = v; 157513d88268SGregory Neil Shapiro break; 157613d88268SGregory Neil Shapiro 157713d88268SGregory Neil Shapiro case 'P': /* port */ 1578d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1579d0cef73dSGregory Neil Shapiro case 'p': 1580d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 158113d88268SGregory Neil Shapiro port = v; 1582c2aa98e2SPeter Wemm break; 1583c2aa98e2SPeter Wemm 1584d0cef73dSGregory Neil Shapiro case 'q': 1585d0cef73dSGregory Neil Shapiro d->d_queueLA = atoi(v); 1586d0cef73dSGregory Neil Shapiro break; 1587d0cef73dSGregory Neil Shapiro 1588c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 158906f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 159006f25ae9SGregory Neil Shapiro break; 159106f25ae9SGregory Neil Shapiro 1592d0cef73dSGregory Neil Shapiro case 'r': 1593d0cef73dSGregory Neil Shapiro d->d_refuseLA = atoi(v); 1594d0cef73dSGregory Neil Shapiro break; 1595d0cef73dSGregory Neil Shapiro 159613d88268SGregory Neil Shapiro case 'S': /* send buffer size */ 1597d0cef73dSGregory Neil Shapiro #if !_FFR_DPO_CS 1598d0cef73dSGregory Neil Shapiro case 's': 1599d0cef73dSGregory Neil Shapiro #endif /* !_FFR_DPO_CS */ 160013d88268SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1601c2aa98e2SPeter Wemm break; 1602c2aa98e2SPeter Wemm 160313d88268SGregory Neil Shapiro #if _FFR_SS_PER_DAEMON 160413d88268SGregory Neil Shapiro case 'T': /* SuperSafe */ 160513d88268SGregory Neil Shapiro if (tolower(*v) == 'i') 160613d88268SGregory Neil Shapiro d->d_supersafe = SAFE_INTERACTIVE; 160713d88268SGregory Neil Shapiro else if (tolower(*v) == 'p') 160813d88268SGregory Neil Shapiro # if MILTER 160913d88268SGregory Neil Shapiro d->d_supersafe = SAFE_REALLY_POSTMILTER; 161013d88268SGregory Neil Shapiro # else /* MILTER */ 161113d88268SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 161213d88268SGregory Neil Shapiro "Warning: SuperSafe=PostMilter requires Milter support (-DMILTER)\n"); 161313d88268SGregory Neil Shapiro # endif /* MILTER */ 161413d88268SGregory Neil Shapiro else 161513d88268SGregory Neil Shapiro d->d_supersafe = atobool(v) ? SAFE_REALLY 161613d88268SGregory Neil Shapiro : SAFE_NO; 161713d88268SGregory Neil Shapiro break; 161813d88268SGregory Neil Shapiro #endif /* _FFR_SS_PER_DAEMON */ 161913d88268SGregory Neil Shapiro 1620c2aa98e2SPeter Wemm default: 162106f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 162206f25ae9SGregory Neil Shapiro f); 1623c2aa98e2SPeter Wemm } 1624c2aa98e2SPeter Wemm } 1625193538b7SGregory Neil Shapiro 1626193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1627193538b7SGregory Neil Shapiro if (addr != NULL) 1628193538b7SGregory Neil Shapiro { 1629193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1630193538b7SGregory Neil Shapiro { 163140266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 163240266059SGregory Neil Shapiro # if NETUNIX 163340266059SGregory Neil Shapiro case AF_UNIX: 163440266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 163540266059SGregory Neil Shapiro { 163640266059SGregory Neil Shapiro errno = ENAMETOOLONG; 163740266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 163840266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 163940266059SGregory Neil Shapiro break; 164040266059SGregory Neil Shapiro } 164140266059SGregory Neil Shapiro 164240266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 164340266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 164440266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 164540266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 164640266059SGregory Neil Shapiro addr, 164740266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 164840266059SGregory Neil Shapiro break; 164940266059SGregory Neil Shapiro # endif /* NETUNIX */ 165040266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1651193538b7SGregory Neil Shapiro #if NETINET 1652193538b7SGregory Neil Shapiro case AF_INET: 1653193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 165440266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 165540266059SGregory Neil Shapiro == INADDR_NONE)) 1656193538b7SGregory Neil Shapiro { 1657193538b7SGregory Neil Shapiro register struct hostent *hp; 1658193538b7SGregory Neil Shapiro 1659193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1660193538b7SGregory Neil Shapiro if (hp == NULL) 1661193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1662193538b7SGregory Neil Shapiro addr); 1663193538b7SGregory Neil Shapiro else 1664193538b7SGregory Neil Shapiro { 1665193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1666193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1667193538b7SGregory Neil Shapiro hp->h_addr_list++; 1668193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1669193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1670193538b7SGregory Neil Shapiro addr); 1671193538b7SGregory Neil Shapiro else 1672193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1673193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1674193538b7SGregory Neil Shapiro INADDRSZ); 167540266059SGregory Neil Shapiro # if NETINET6 1676193538b7SGregory Neil Shapiro freehostent(hp); 1677193538b7SGregory Neil Shapiro hp = NULL; 167840266059SGregory Neil Shapiro # endif /* NETINET6 */ 1679193538b7SGregory Neil Shapiro } 1680193538b7SGregory Neil Shapiro } 1681193538b7SGregory Neil Shapiro break; 1682193538b7SGregory Neil Shapiro #endif /* NETINET */ 1683193538b7SGregory Neil Shapiro 1684193538b7SGregory Neil Shapiro #if NETINET6 1685193538b7SGregory Neil Shapiro case AF_INET6: 168640266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1687193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1688193538b7SGregory Neil Shapiro { 1689193538b7SGregory Neil Shapiro register struct hostent *hp; 1690193538b7SGregory Neil Shapiro 1691193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1692193538b7SGregory Neil Shapiro if (hp == NULL) 1693193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1694193538b7SGregory Neil Shapiro addr); 1695193538b7SGregory Neil Shapiro else 1696193538b7SGregory Neil Shapiro { 1697193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1698193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1699193538b7SGregory Neil Shapiro hp->h_addr_list++; 1700193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1701193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1702193538b7SGregory Neil Shapiro addr); 1703193538b7SGregory Neil Shapiro else 1704193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1705193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1706193538b7SGregory Neil Shapiro IN6ADDRSZ); 1707193538b7SGregory Neil Shapiro freehostent(hp); 1708193538b7SGregory Neil Shapiro hp = NULL; 1709193538b7SGregory Neil Shapiro } 1710193538b7SGregory Neil Shapiro } 1711193538b7SGregory Neil Shapiro break; 1712193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1713193538b7SGregory Neil Shapiro 1714193538b7SGregory Neil Shapiro default: 1715193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1716193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1717193538b7SGregory Neil Shapiro break; 1718193538b7SGregory Neil Shapiro } 1719193538b7SGregory Neil Shapiro } 1720193538b7SGregory Neil Shapiro 1721193538b7SGregory Neil Shapiro if (port != NULL) 1722193538b7SGregory Neil Shapiro { 1723193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1724193538b7SGregory Neil Shapiro { 1725193538b7SGregory Neil Shapiro #if NETINET 1726193538b7SGregory Neil Shapiro case AF_INET: 1727193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 172840266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 172940266059SGregory Neil Shapiro atoi((const char *) port)); 1730193538b7SGregory Neil Shapiro else 1731193538b7SGregory Neil Shapiro { 1732193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1733193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1734193538b7SGregory Neil Shapiro port); 1735193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1736193538b7SGregory Neil Shapiro register struct servent *sp; 1737193538b7SGregory Neil Shapiro 1738193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1739193538b7SGregory Neil Shapiro if (sp == NULL) 1740193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1741193538b7SGregory Neil Shapiro port); 1742193538b7SGregory Neil Shapiro else 1743193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1744193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1745193538b7SGregory Neil Shapiro } 1746193538b7SGregory Neil Shapiro break; 1747193538b7SGregory Neil Shapiro #endif /* NETINET */ 1748193538b7SGregory Neil Shapiro 1749193538b7SGregory Neil Shapiro #if NETINET6 1750193538b7SGregory Neil Shapiro case AF_INET6: 1751193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 175240266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 175340266059SGregory Neil Shapiro atoi(port)); 1754193538b7SGregory Neil Shapiro else 1755193538b7SGregory Neil Shapiro { 1756193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1757193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1758193538b7SGregory Neil Shapiro port); 1759193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1760193538b7SGregory Neil Shapiro register struct servent *sp; 1761193538b7SGregory Neil Shapiro 1762193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1763193538b7SGregory Neil Shapiro if (sp == NULL) 1764193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1765193538b7SGregory Neil Shapiro port); 1766193538b7SGregory Neil Shapiro else 1767193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1768193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1769193538b7SGregory Neil Shapiro } 1770193538b7SGregory Neil Shapiro break; 1771193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1772193538b7SGregory Neil Shapiro 1773193538b7SGregory Neil Shapiro #if NETISO 1774193538b7SGregory Neil Shapiro case AF_ISO: 1775193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1776193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 177740266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1778193538b7SGregory Neil Shapiro else 1779193538b7SGregory Neil Shapiro { 1780193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1781193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1782193538b7SGregory Neil Shapiro port); 1783193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1784193538b7SGregory Neil Shapiro register struct servent *sp; 1785193538b7SGregory Neil Shapiro 1786193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1787193538b7SGregory Neil Shapiro if (sp == NULL) 1788193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1789193538b7SGregory Neil Shapiro port); 1790193538b7SGregory Neil Shapiro else 1791193538b7SGregory Neil Shapiro portno = sp->s_port; 1792193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1793193538b7SGregory Neil Shapiro } 1794193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1795193538b7SGregory Neil Shapiro (char *) &portno, 2); 1796193538b7SGregory Neil Shapiro break; 1797193538b7SGregory Neil Shapiro #endif /* NETISO */ 1798193538b7SGregory Neil Shapiro 1799193538b7SGregory Neil Shapiro default: 1800193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1801193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1802193538b7SGregory Neil Shapiro break; 1803193538b7SGregory Neil Shapiro } 1804193538b7SGregory Neil Shapiro } 1805c2aa98e2SPeter Wemm } 180640266059SGregory Neil Shapiro /* 180706f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 180806f25ae9SGregory Neil Shapiro ** 180906f25ae9SGregory Neil Shapiro ** Parameters: 181006f25ae9SGregory Neil Shapiro ** p -- the options line. 181106f25ae9SGregory Neil Shapiro ** 181206f25ae9SGregory Neil Shapiro ** Returns: 181340266059SGregory Neil Shapiro ** true if successful, false otherwise. 181440266059SGregory Neil Shapiro ** 181540266059SGregory Neil Shapiro ** Side Effects: 181640266059SGregory Neil Shapiro ** increments number of daemons. 181706f25ae9SGregory Neil Shapiro */ 181806f25ae9SGregory Neil Shapiro 181940266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 182040266059SGregory Neil Shapiro 1821739ac4d4SGregory Neil Shapiro struct dflags 1822739ac4d4SGregory Neil Shapiro { 1823739ac4d4SGregory Neil Shapiro char *d_name; 1824739ac4d4SGregory Neil Shapiro int d_flag; 1825739ac4d4SGregory Neil Shapiro }; 1826739ac4d4SGregory Neil Shapiro 1827739ac4d4SGregory Neil Shapiro static struct dflags DaemonFlags[] = 1828739ac4d4SGregory Neil Shapiro { 1829739ac4d4SGregory Neil Shapiro { "AUTHREQ", D_AUTHREQ }, 1830739ac4d4SGregory Neil Shapiro { "BINDIF", D_BINDIF }, 1831739ac4d4SGregory Neil Shapiro { "CANONREQ", D_CANONREQ }, 1832739ac4d4SGregory Neil Shapiro { "IFNHELO", D_IFNHELO }, 1833739ac4d4SGregory Neil Shapiro { "FQMAIL", D_FQMAIL }, 1834739ac4d4SGregory Neil Shapiro { "FQRCPT", D_FQRCPT }, 1835739ac4d4SGregory Neil Shapiro { "SMTPS", D_SMTPS }, 1836739ac4d4SGregory Neil Shapiro { "UNQUALOK", D_UNQUALOK }, 1837739ac4d4SGregory Neil Shapiro { "NOAUTH", D_NOAUTH }, 1838739ac4d4SGregory Neil Shapiro { "NOCANON", D_NOCANON }, 1839739ac4d4SGregory Neil Shapiro { "NOETRN", D_NOETRN }, 1840739ac4d4SGregory Neil Shapiro { "NOTLS", D_NOTLS }, 1841739ac4d4SGregory Neil Shapiro { "ETRNONLY", D_ETRNONLY }, 1842739ac4d4SGregory Neil Shapiro { "OPTIONAL", D_OPTIONAL }, 1843739ac4d4SGregory Neil Shapiro { "DISABLE", D_DISABLE }, 1844739ac4d4SGregory Neil Shapiro { "ISSET", D_ISSET }, 1845739ac4d4SGregory Neil Shapiro { NULL, 0 } 1846739ac4d4SGregory Neil Shapiro }; 1847739ac4d4SGregory Neil Shapiro 1848739ac4d4SGregory Neil Shapiro static void 1849739ac4d4SGregory Neil Shapiro printdaemonflags(d) 1850739ac4d4SGregory Neil Shapiro DAEMON_T *d; 1851739ac4d4SGregory Neil Shapiro { 1852739ac4d4SGregory Neil Shapiro register struct dflags *df; 1853739ac4d4SGregory Neil Shapiro bool first = true; 1854739ac4d4SGregory Neil Shapiro 1855739ac4d4SGregory Neil Shapiro for (df = DaemonFlags; df->d_name != NULL; df++) 1856739ac4d4SGregory Neil Shapiro { 1857739ac4d4SGregory Neil Shapiro if (!bitnset(df->d_flag, d->d_flags)) 1858739ac4d4SGregory Neil Shapiro continue; 1859739ac4d4SGregory Neil Shapiro if (first) 1860e92d3f3fSGregory Neil Shapiro sm_dprintf("<%s", df->d_name); 1861739ac4d4SGregory Neil Shapiro else 1862e92d3f3fSGregory Neil Shapiro sm_dprintf(",%s", df->d_name); 1863739ac4d4SGregory Neil Shapiro first = false; 1864739ac4d4SGregory Neil Shapiro } 1865739ac4d4SGregory Neil Shapiro if (!first) 1866e92d3f3fSGregory Neil Shapiro sm_dprintf(">"); 1867739ac4d4SGregory Neil Shapiro } 1868739ac4d4SGregory Neil Shapiro 186906f25ae9SGregory Neil Shapiro bool 187006f25ae9SGregory Neil Shapiro setdaemonoptions(p) 187106f25ae9SGregory Neil Shapiro register char *p; 187206f25ae9SGregory Neil Shapiro { 187340266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 187440266059SGregory Neil Shapiro return false; 187540266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 187640266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 187740266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 187840266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 187906f25ae9SGregory Neil Shapiro 188040266059SGregory Neil Shapiro #if MILTER 188140266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 188240266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 188340266059SGregory Neil Shapiro #endif /* MILTER */ 188440266059SGregory Neil Shapiro 188540266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 188640266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 188706f25ae9SGregory Neil Shapiro else 188806f25ae9SGregory Neil Shapiro { 188906f25ae9SGregory Neil Shapiro char num[30]; 189006f25ae9SGregory Neil Shapiro 1891d0cef73dSGregory Neil Shapiro (void) sm_snprintf(num, sizeof(num), "Daemon%d", NDaemons); 189240266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 189306f25ae9SGregory Neil Shapiro } 189406f25ae9SGregory Neil Shapiro 189506f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 189606f25ae9SGregory Neil Shapiro { 189740266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 1898739ac4d4SGregory Neil Shapiro printdaemonflags(&Daemons[NDaemons]); 189940266059SGregory Neil Shapiro sm_dprintf("\n"); 190006f25ae9SGregory Neil Shapiro } 190140266059SGregory Neil Shapiro ++NDaemons; 190240266059SGregory Neil Shapiro return true; 190306f25ae9SGregory Neil Shapiro } 190440266059SGregory Neil Shapiro /* 190506f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 190606f25ae9SGregory Neil Shapiro ** 190706f25ae9SGregory Neil Shapiro ** Parameters: 190806f25ae9SGregory Neil Shapiro ** none 190906f25ae9SGregory Neil Shapiro ** 191006f25ae9SGregory Neil Shapiro ** Returns: 191106f25ae9SGregory Neil Shapiro ** none 191206f25ae9SGregory Neil Shapiro ** 191306f25ae9SGregory Neil Shapiro ** Side Effects: 191406f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 191506f25ae9SGregory Neil Shapiro */ 191640266059SGregory Neil Shapiro 191706f25ae9SGregory Neil Shapiro void 191806f25ae9SGregory Neil Shapiro initdaemon() 191906f25ae9SGregory Neil Shapiro { 192040266059SGregory Neil Shapiro if (NDaemons == 0) 192106f25ae9SGregory Neil Shapiro { 192240266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 192340266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 192440266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 192540266059SGregory Neil Shapiro NDaemons = 1; 192606f25ae9SGregory Neil Shapiro } 192706f25ae9SGregory Neil Shapiro } 192840266059SGregory Neil Shapiro /* 192906f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 193006f25ae9SGregory Neil Shapiro ** 193106f25ae9SGregory Neil Shapiro ** Parameters: 193206f25ae9SGregory Neil Shapiro ** p -- the options line. 193306f25ae9SGregory Neil Shapiro ** 193406f25ae9SGregory Neil Shapiro ** Returns: 193506f25ae9SGregory Neil Shapiro ** none. 193606f25ae9SGregory Neil Shapiro */ 193706f25ae9SGregory Neil Shapiro 193840266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 193906f25ae9SGregory Neil Shapiro 194006f25ae9SGregory Neil Shapiro void 194106f25ae9SGregory Neil Shapiro setclientoptions(p) 194206f25ae9SGregory Neil Shapiro register char *p; 194306f25ae9SGregory Neil Shapiro { 194440266059SGregory Neil Shapiro int family; 194540266059SGregory Neil Shapiro DAEMON_T d; 194606f25ae9SGregory Neil Shapiro 1947d0cef73dSGregory Neil Shapiro memset(&d, '\0', sizeof(d)); 194806f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 194906f25ae9SGregory Neil Shapiro 195006f25ae9SGregory Neil Shapiro /* grab what we need */ 195140266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 195240266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 195340266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 195440266059SGregory Neil Shapiro if (d.d_name != NULL) 195540266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 195606f25ae9SGregory Neil Shapiro else 195740266059SGregory Neil Shapiro { 195840266059SGregory Neil Shapiro char num[30]; 195940266059SGregory Neil Shapiro 1960d0cef73dSGregory Neil Shapiro (void) sm_snprintf(num, sizeof(num), "Client%d", family); 196140266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 196206f25ae9SGregory Neil Shapiro } 196340266059SGregory Neil Shapiro } 196440266059SGregory Neil Shapiro /* 196506f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 196606f25ae9SGregory Neil Shapiro ** 196706f25ae9SGregory Neil Shapiro ** Parameters: 196806f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 196906f25ae9SGregory Neil Shapiro ** 197006f25ae9SGregory Neil Shapiro ** Returns: 197106f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 197206f25ae9SGregory Neil Shapiro ** 197306f25ae9SGregory Neil Shapiro ** Side Effects: 197406f25ae9SGregory Neil Shapiro ** none. 197506f25ae9SGregory Neil Shapiro */ 197606f25ae9SGregory Neil Shapiro 197706f25ae9SGregory Neil Shapiro static int 197806f25ae9SGregory Neil Shapiro addr_family(addr) 197906f25ae9SGregory Neil Shapiro char *addr; 198006f25ae9SGregory Neil Shapiro { 198106f25ae9SGregory Neil Shapiro #if NETINET6 198206f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 198306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 198406f25ae9SGregory Neil Shapiro 198506f25ae9SGregory Neil Shapiro #if NETINET 198606f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 198706f25ae9SGregory Neil Shapiro { 198806f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 198940266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 199006f25ae9SGregory Neil Shapiro return AF_INET; 199106f25ae9SGregory Neil Shapiro } 199206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 199306f25ae9SGregory Neil Shapiro #if NETINET6 199440266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 199506f25ae9SGregory Neil Shapiro { 199606f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 199740266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 199806f25ae9SGregory Neil Shapiro return AF_INET6; 199906f25ae9SGregory Neil Shapiro } 200006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 200140266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 200240266059SGregory Neil Shapiro # if NETUNIX 200340266059SGregory Neil Shapiro if (*addr == '/') 200440266059SGregory Neil Shapiro { 200506f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 200640266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 200740266059SGregory Neil Shapiro return AF_UNIX; 200840266059SGregory Neil Shapiro } 200940266059SGregory Neil Shapiro # endif /* NETUNIX */ 201040266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 201140266059SGregory Neil Shapiro if (tTd(16, 9)) 201240266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 201306f25ae9SGregory Neil Shapiro return AF_UNSPEC; 201406f25ae9SGregory Neil Shapiro } 201540266059SGregory Neil Shapiro 201640266059SGregory Neil Shapiro /* 201740266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 201840266059SGregory Neil Shapiro ** 201940266059SGregory Neil Shapiro ** Parameters: 202040266059SGregory Neil Shapiro ** flag -- the flag to test. 202140266059SGregory Neil Shapiro ** 202240266059SGregory Neil Shapiro ** Returns: 202340266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 202440266059SGregory Neil Shapiro */ 202540266059SGregory Neil Shapiro 202640266059SGregory Neil Shapiro bool 202740266059SGregory Neil Shapiro chkclientmodifiers(flag) 202840266059SGregory Neil Shapiro int flag; 202940266059SGregory Neil Shapiro { 203040266059SGregory Neil Shapiro int i; 203140266059SGregory Neil Shapiro bool flagisset; 203240266059SGregory Neil Shapiro 203340266059SGregory Neil Shapiro flagisset = false; 203440266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 203540266059SGregory Neil Shapiro { 203640266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 203740266059SGregory Neil Shapiro { 203840266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 203940266059SGregory Neil Shapiro return false; 204040266059SGregory Neil Shapiro flagisset = true; 204140266059SGregory Neil Shapiro } 204240266059SGregory Neil Shapiro } 204340266059SGregory Neil Shapiro return flagisset; 204440266059SGregory Neil Shapiro } 204540266059SGregory Neil Shapiro 204640266059SGregory Neil Shapiro #if MILTER 204740266059SGregory Neil Shapiro /* 204840266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 204940266059SGregory Neil Shapiro ** 205040266059SGregory Neil Shapiro ** Parameters: 205140266059SGregory Neil Shapiro ** none 205240266059SGregory Neil Shapiro ** 205340266059SGregory Neil Shapiro ** Returns: 205440266059SGregory Neil Shapiro ** none 205540266059SGregory Neil Shapiro */ 205640266059SGregory Neil Shapiro 205740266059SGregory Neil Shapiro void 205840266059SGregory Neil Shapiro setup_daemon_milters() 205940266059SGregory Neil Shapiro { 206040266059SGregory Neil Shapiro int idx; 206140266059SGregory Neil Shapiro 206240266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 206340266059SGregory Neil Shapiro { 206440266059SGregory Neil Shapiro /* no need to configure the daemons */ 206540266059SGregory Neil Shapiro return; 206640266059SGregory Neil Shapiro } 206740266059SGregory Neil Shapiro 206840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 206940266059SGregory Neil Shapiro { 207040266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 207140266059SGregory Neil Shapiro { 207240266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 207340266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 207440266059SGregory Neil Shapiro MAXFILTERS); 207540266059SGregory Neil Shapiro } 207640266059SGregory Neil Shapiro } 207740266059SGregory Neil Shapiro } 207840266059SGregory Neil Shapiro #endif /* MILTER */ 207940266059SGregory Neil Shapiro /* 208006f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 2081c2aa98e2SPeter Wemm ** 2082c2aa98e2SPeter Wemm ** Parameters: 2083c2aa98e2SPeter Wemm ** host -- the name of the host. 2084c2aa98e2SPeter Wemm ** port -- the port number to connect to. 2085c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 2086c2aa98e2SPeter Wemm ** structure to be filled in. 2087c2aa98e2SPeter Wemm ** e -- the current envelope. 208840266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 208940266059SGregory Neil Shapiro ** (0 means no limit) 2090c2aa98e2SPeter Wemm ** 2091c2aa98e2SPeter Wemm ** Returns: 2092c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 2093c2aa98e2SPeter Wemm ** made and if not why not. 2094c2aa98e2SPeter Wemm ** 2095c2aa98e2SPeter Wemm ** Side Effects: 2096c2aa98e2SPeter Wemm ** none. 2097c2aa98e2SPeter Wemm */ 2098c2aa98e2SPeter Wemm 2099c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 2100c2aa98e2SPeter Wemm 2101c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 2102c2aa98e2SPeter Wemm 2103c2aa98e2SPeter Wemm int 210440266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 2105c2aa98e2SPeter Wemm char *host; 210640266059SGregory Neil Shapiro volatile unsigned int port; 2107c2aa98e2SPeter Wemm register MCI *mci; 2108c2aa98e2SPeter Wemm ENVELOPE *e; 210940266059SGregory Neil Shapiro time_t enough; 2110c2aa98e2SPeter Wemm { 2111c2aa98e2SPeter Wemm register volatile int addrno = 0; 211240266059SGregory Neil Shapiro volatile int s; 2113c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 2114c2aa98e2SPeter Wemm SOCKADDR addr; 211506f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 211606f25ae9SGregory Neil Shapiro int save_errno = 0; 211706f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 2118af9557fdSGregory Neil Shapiro volatile bool firstconnect = true; 211940266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 212006f25ae9SGregory Neil Shapiro #if NETINET6 212140266059SGregory Neil Shapiro volatile bool v6found = false; 212206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 212306f25ae9SGregory Neil Shapiro volatile int family = InetMode; 212406f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 212506f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 212606f25ae9SGregory Neil Shapiro volatile bool clt_bind; 212706f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 212806f25ae9SGregory Neil Shapiro char *p; 212906f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 213006f25ae9SGregory Neil Shapiro 213140266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 213206f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 213340266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 213406f25ae9SGregory Neil Shapiro { 213506f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 213606f25ae9SGregory Neil Shapiro { 213706f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 2138193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 213906f25ae9SGregory Neil Shapiro } 214006f25ae9SGregory Neil Shapiro } 214106f25ae9SGregory Neil Shapiro 214206f25ae9SGregory Neil Shapiro #if NETINET6 214306f25ae9SGregory Neil Shapiro v4retry: 214406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 214540266059SGregory Neil Shapiro clt_bind = false; 214606f25ae9SGregory Neil Shapiro 214706f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 214806f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 214940266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2150602a2b1bSGregory Neil Shapiro *p != '\0') 215106f25ae9SGregory Neil Shapiro { 215206f25ae9SGregory Neil Shapiro #if NETINET6 215306f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 215406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 215506f25ae9SGregory Neil Shapiro 2156d0cef73dSGregory Neil Shapiro memset(&clt_addr, '\0', sizeof(clt_addr)); 215706f25ae9SGregory Neil Shapiro 215806f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 215906f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 216006f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 216106f25ae9SGregory Neil Shapiro { 216206f25ae9SGregory Neil Shapiro #if NETINET 216306f25ae9SGregory Neil Shapiro case AF_INET: 2164602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2165602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 21669bd497b8SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != 21679bd497b8SGregory Neil Shapiro htonl(INADDR_LOOPBACK)) 216806f25ae9SGregory Neil Shapiro { 216940266059SGregory Neil Shapiro clt_bind = true; 217006f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in); 217106f25ae9SGregory Neil Shapiro } 217206f25ae9SGregory Neil Shapiro break; 217306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 217406f25ae9SGregory Neil Shapiro 217506f25ae9SGregory Neil Shapiro #if NETINET6 217606f25ae9SGregory Neil Shapiro case AF_INET6: 217706f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 2178d0cef73dSGregory Neil Shapiro (void) sm_snprintf(p6, sizeof(p6), 217940266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 218006f25ae9SGregory Neil Shapiro else 2181d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof(p6)); 218240266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2183602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2184602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 218506f25ae9SGregory Neil Shapiro { 218640266059SGregory Neil Shapiro clt_bind = true; 218706f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in6); 218806f25ae9SGregory Neil Shapiro } 218906f25ae9SGregory Neil Shapiro break; 219006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 219106f25ae9SGregory Neil Shapiro 219206f25ae9SGregory Neil Shapiro #if 0 219306f25ae9SGregory Neil Shapiro default: 219406f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 219506f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 219606f25ae9SGregory Neil Shapiro break; 219706f25ae9SGregory Neil Shapiro #endif /* 0 */ 219806f25ae9SGregory Neil Shapiro } 219906f25ae9SGregory Neil Shapiro if (clt_bind) 220006f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 220106f25ae9SGregory Neil Shapiro } 220240266059SGregory Neil Shapiro 220340266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 220440266059SGregory Neil Shapiro if (!clt_bind) 220506f25ae9SGregory Neil Shapiro { 220640266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 220706f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 220806f25ae9SGregory Neil Shapiro { 220906f25ae9SGregory Neil Shapiro #if NETINET 221006f25ae9SGregory Neil Shapiro case AF_INET: 221106f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 2212e3793f76SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = LocalDaemon ? 2213e3793f76SGregory Neil Shapiro htonl(INADDR_LOOPBACK) : INADDR_ANY; 221406f25ae9SGregory Neil Shapiro else 221540266059SGregory Neil Shapiro clt_bind = true; 221606f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 221740266059SGregory Neil Shapiro clt_bind = true; 221806f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in); 221906f25ae9SGregory Neil Shapiro break; 222006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 222106f25ae9SGregory Neil Shapiro #if NETINET6 222206f25ae9SGregory Neil Shapiro case AF_INET6: 222306f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 22246f9c8e5bSGregory Neil Shapiro clt_addr.sin6.sin6_addr = 22256f9c8e5bSGregory Neil Shapiro (LocalDaemon && V6LoopbackAddrFound) ? 2226e3793f76SGregory Neil Shapiro in6addr_loopback : in6addr_any; 222706f25ae9SGregory Neil Shapiro else 222840266059SGregory Neil Shapiro clt_bind = true; 222906f25ae9SGregory Neil Shapiro socksize = sizeof(struct sockaddr_in6); 223006f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 223140266059SGregory Neil Shapiro clt_bind = true; 223206f25ae9SGregory Neil Shapiro break; 223306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 223406f25ae9SGregory Neil Shapiro #if NETISO 223506f25ae9SGregory Neil Shapiro case AF_ISO: 2236d0cef73dSGregory Neil Shapiro socksize = sizeof(clt_addr.siso); 223740266059SGregory Neil Shapiro clt_bind = true; 223806f25ae9SGregory Neil Shapiro break; 223906f25ae9SGregory Neil Shapiro #endif /* NETISO */ 224006f25ae9SGregory Neil Shapiro default: 224106f25ae9SGregory Neil Shapiro break; 224206f25ae9SGregory Neil Shapiro } 224306f25ae9SGregory Neil Shapiro } 2244c2aa98e2SPeter Wemm 2245c2aa98e2SPeter Wemm /* 2246c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2247c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2248c2aa98e2SPeter Wemm */ 2249c2aa98e2SPeter Wemm 2250602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2251c2aa98e2SPeter Wemm errno = 0; 2252d0cef73dSGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof(CurHostAddr)); 2253d0cef73dSGregory Neil Shapiro memset(&addr, '\0', sizeof(addr)); 2254c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2255c2aa98e2SPeter Wemm CurHostName = host; 2256c2aa98e2SPeter Wemm 2257c2aa98e2SPeter Wemm if (host[0] == '[') 2258c2aa98e2SPeter Wemm { 225906f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2260c2aa98e2SPeter Wemm if (p != NULL) 2261c2aa98e2SPeter Wemm { 2262c2aa98e2SPeter Wemm #if NETINET 226306f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 226406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 226506f25ae9SGregory Neil Shapiro #if NETINET6 226606f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 226706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 226806f25ae9SGregory Neil Shapiro 226906f25ae9SGregory Neil Shapiro *p = '\0'; 227006f25ae9SGregory Neil Shapiro #if NETINET6 2271d0cef73dSGregory Neil Shapiro memset(&hid6, '\0', sizeof(hid6)); 227206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 227306f25ae9SGregory Neil Shapiro #if NETINET 227406f25ae9SGregory Neil Shapiro if (family == AF_INET && 227506f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 227606f25ae9SGregory Neil Shapiro { 227706f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 227806f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 227906f25ae9SGregory Neil Shapiro } 228006f25ae9SGregory Neil Shapiro else 228106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 228206f25ae9SGregory Neil Shapiro #if NETINET6 228306f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 228440266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 228506f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 228606f25ae9SGregory Neil Shapiro { 228706f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 228806f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 228906f25ae9SGregory Neil Shapiro } 229006f25ae9SGregory Neil Shapiro else 229106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2292c2aa98e2SPeter Wemm { 2293c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 229406f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2295c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2296c2aa98e2SPeter Wemm { 2297c2aa98e2SPeter Wemm #if NAMED_BIND 2298c2aa98e2SPeter Wemm int oldopts = _res.options; 2299c2aa98e2SPeter Wemm 2300c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 230106f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2302c2aa98e2SPeter Wemm p[-1] = '\0'; 230306f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 230406f25ae9SGregory Neil Shapiro family); 2305c2aa98e2SPeter Wemm p[-1] = '.'; 2306c2aa98e2SPeter Wemm #if NAMED_BIND 2307c2aa98e2SPeter Wemm _res.options = oldopts; 230806f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2309c2aa98e2SPeter Wemm } 2310c2aa98e2SPeter Wemm *p = ']'; 2311c2aa98e2SPeter Wemm goto gothostent; 2312c2aa98e2SPeter Wemm } 2313c2aa98e2SPeter Wemm *p = ']'; 2314c2aa98e2SPeter Wemm } 2315c2aa98e2SPeter Wemm if (p == NULL) 2316c2aa98e2SPeter Wemm { 2317c2aa98e2SPeter Wemm extern char MsgBuf[]; 2318c2aa98e2SPeter Wemm 231906f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 232006f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 232106f25ae9SGregory Neil Shapiro host); 2322c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 232306f25ae9SGregory Neil Shapiro errno = EINVAL; 2324c2aa98e2SPeter Wemm return EX_NOHOST; 2325c2aa98e2SPeter Wemm } 2326c2aa98e2SPeter Wemm } 2327c2aa98e2SPeter Wemm else 2328c2aa98e2SPeter Wemm { 2329c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2330c2aa98e2SPeter Wemm { 233106f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 233206f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2333c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2334c2aa98e2SPeter Wemm { 2335c2aa98e2SPeter Wemm #if NAMED_BIND 2336c2aa98e2SPeter Wemm int oldopts = _res.options; 2337c2aa98e2SPeter Wemm 2338c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 233906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2340c2aa98e2SPeter Wemm *p = '\0'; 234106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2342c2aa98e2SPeter Wemm *p = '.'; 2343c2aa98e2SPeter Wemm #if NAMED_BIND 2344c2aa98e2SPeter Wemm _res.options = oldopts; 234506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2346c2aa98e2SPeter Wemm } 2347c2aa98e2SPeter Wemm } 2348c2aa98e2SPeter Wemm gothostent: 23499bd497b8SGregory Neil Shapiro if (hp == NULL || hp->h_addr == NULL) 2350c2aa98e2SPeter Wemm { 2351c2aa98e2SPeter Wemm #if NAMED_BIND 2352c2aa98e2SPeter Wemm /* check for name server timeouts */ 235340266059SGregory Neil Shapiro # if NETINET6 235440266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 2355*5dd76dd0SGregory Neil Shapiro (h_errno == TRY_AGAIN || errno == ETIMEDOUT)) 235640266059SGregory Neil Shapiro { 235740266059SGregory Neil Shapiro /* 235840266059SGregory Neil Shapiro ** An attempt with family AF_INET may 2359*5dd76dd0SGregory Neil Shapiro ** succeed. By skipping the next section 236040266059SGregory Neil Shapiro ** of code, we will try AF_INET before 236140266059SGregory Neil Shapiro ** failing. 236240266059SGregory Neil Shapiro */ 236340266059SGregory Neil Shapiro 236440266059SGregory Neil Shapiro if (tTd(16, 10)) 236540266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 236640266059SGregory Neil Shapiro } 236740266059SGregory Neil Shapiro else 236840266059SGregory Neil Shapiro # endif /* NETINET6 */ 236940266059SGregory Neil Shapiro { 237040266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 2371d0cef73dSGregory Neil Shapiro # if _FFR_GETHBN_ExFILE 2372d0cef73dSGregory Neil Shapiro # ifdef EMFILE 2373d0cef73dSGregory Neil Shapiro errno == EMFILE || 2374d0cef73dSGregory Neil Shapiro # endif /* EMFILE */ 2375d0cef73dSGregory Neil Shapiro # ifdef ENFILE 2376d0cef73dSGregory Neil Shapiro errno == ENFILE || 2377d0cef73dSGregory Neil Shapiro # endif /* ENFILE */ 2378d0cef73dSGregory Neil Shapiro # endif /* _FFR_GETHBN_ExFILE */ 237940266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2380c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2381c2aa98e2SPeter Wemm { 238206f25ae9SGregory Neil Shapiro save_errno = errno; 238340266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 238440266059SGregory Neil Shapiro "4.4.3", NULL); 238506f25ae9SGregory Neil Shapiro errno = save_errno; 2386c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2387c2aa98e2SPeter Wemm } 238840266059SGregory Neil Shapiro } 238906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 239006f25ae9SGregory Neil Shapiro #if NETINET6 239106f25ae9SGregory Neil Shapiro /* 239206f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 239306f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 239406f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 239506f25ae9SGregory Neil Shapiro */ 239606f25ae9SGregory Neil Shapiro 239706f25ae9SGregory Neil Shapiro if (family == AF_INET6) 239806f25ae9SGregory Neil Shapiro { 239906f25ae9SGregory Neil Shapiro family = AF_INET; 240006f25ae9SGregory Neil Shapiro goto v4retry; 240106f25ae9SGregory Neil Shapiro } 240206f25ae9SGregory Neil Shapiro if (v6found) 240306f25ae9SGregory Neil Shapiro goto v6tempfail; 240406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 240506f25ae9SGregory Neil Shapiro save_errno = errno; 2406c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 240706f25ae9SGregory Neil Shapiro errno = save_errno; 240806f25ae9SGregory Neil Shapiro return EX_NOHOST; 2409c2aa98e2SPeter Wemm } 2410c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2411c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2412c2aa98e2SPeter Wemm { 2413c2aa98e2SPeter Wemm #if NETINET 2414c2aa98e2SPeter Wemm case AF_INET: 241506f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 241606f25ae9SGregory Neil Shapiro hp->h_addr, 2417c2aa98e2SPeter Wemm INADDRSZ); 2418c2aa98e2SPeter Wemm break; 241906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 242006f25ae9SGregory Neil Shapiro 242106f25ae9SGregory Neil Shapiro #if NETINET6 242206f25ae9SGregory Neil Shapiro case AF_INET6: 242306f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 242406f25ae9SGregory Neil Shapiro hp->h_addr, 242506f25ae9SGregory Neil Shapiro IN6ADDRSZ); 242606f25ae9SGregory Neil Shapiro break; 242706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2428c2aa98e2SPeter Wemm 2429c2aa98e2SPeter Wemm default: 2430d0cef73dSGregory Neil Shapiro if (hp->h_length > sizeof(addr.sa.sa_data)) 2431c2aa98e2SPeter Wemm { 2432c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2433c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2434c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 243506f25ae9SGregory Neil Shapiro errno = EINVAL; 2436c2aa98e2SPeter Wemm return EX_NOHOST; 2437c2aa98e2SPeter Wemm } 243840266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2439c2aa98e2SPeter Wemm break; 2440c2aa98e2SPeter Wemm } 2441c2aa98e2SPeter Wemm addrno = 1; 2442c2aa98e2SPeter Wemm } 2443c2aa98e2SPeter Wemm 2444c2aa98e2SPeter Wemm /* 2445c2aa98e2SPeter Wemm ** Determine the port number. 2446c2aa98e2SPeter Wemm */ 2447c2aa98e2SPeter Wemm 2448c2aa98e2SPeter Wemm if (port == 0) 2449c2aa98e2SPeter Wemm { 245006f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 245106f25ae9SGregory Neil Shapiro port = htons(25); 245206f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2453c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2454c2aa98e2SPeter Wemm 2455c2aa98e2SPeter Wemm if (sp == NULL) 2456c2aa98e2SPeter Wemm { 2457c2aa98e2SPeter Wemm if (LogLevel > 2) 2458c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2459c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2460c2aa98e2SPeter Wemm port = htons(25); 2461c2aa98e2SPeter Wemm } 2462c2aa98e2SPeter Wemm else 2463c2aa98e2SPeter Wemm port = sp->s_port; 246406f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2465c2aa98e2SPeter Wemm } 2466c2aa98e2SPeter Wemm 246740266059SGregory Neil Shapiro #if NETINET6 246840266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 246940266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 247040266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 247140266059SGregory Neil Shapiro { 247240266059SGregory Neil Shapiro /* 247340266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 247440266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 247540266059SGregory Neil Shapiro ** for IPv4. 247640266059SGregory Neil Shapiro */ 247740266059SGregory Neil Shapiro 247840266059SGregory Neil Shapiro goto nextaddr; 247940266059SGregory Neil Shapiro } 248040266059SGregory Neil Shapiro #endif /* NETINET6 */ 248140266059SGregory Neil Shapiro 2482c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2483c2aa98e2SPeter Wemm { 2484c2aa98e2SPeter Wemm #if NETINET 2485c2aa98e2SPeter Wemm case AF_INET: 2486c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2487c2aa98e2SPeter Wemm addrlen = sizeof(struct sockaddr_in); 2488c2aa98e2SPeter Wemm break; 248906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 249006f25ae9SGregory Neil Shapiro 249106f25ae9SGregory Neil Shapiro #if NETINET6 249206f25ae9SGregory Neil Shapiro case AF_INET6: 249306f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 249406f25ae9SGregory Neil Shapiro addrlen = sizeof(struct sockaddr_in6); 249506f25ae9SGregory Neil Shapiro break; 249606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2497c2aa98e2SPeter Wemm 2498c2aa98e2SPeter Wemm #if NETISO 2499c2aa98e2SPeter Wemm case AF_ISO: 2500c2aa98e2SPeter Wemm /* assume two byte transport selector */ 250106f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2502c2aa98e2SPeter Wemm addrlen = sizeof(struct sockaddr_iso); 2503c2aa98e2SPeter Wemm break; 250406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2505c2aa98e2SPeter Wemm 2506c2aa98e2SPeter Wemm default: 2507c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2508c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 250906f25ae9SGregory Neil Shapiro errno = EINVAL; 251040266059SGregory Neil Shapiro #if NETINET6 2511193538b7SGregory Neil Shapiro if (hp != NULL) 2512193538b7SGregory Neil Shapiro freehostent(hp); 251340266059SGregory Neil Shapiro #endif /* NETINET6 */ 251406f25ae9SGregory Neil Shapiro return EX_NOHOST; 2515c2aa98e2SPeter Wemm } 2516c2aa98e2SPeter Wemm 2517c2aa98e2SPeter Wemm /* 2518c2aa98e2SPeter Wemm ** Try to actually open the connection. 2519c2aa98e2SPeter Wemm */ 2520c2aa98e2SPeter Wemm 252140266059SGregory Neil Shapiro #if XLA 2522c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2523c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2524193538b7SGregory Neil Shapiro { 252540266059SGregory Neil Shapiro # if NETINET6 2526193538b7SGregory Neil Shapiro if (hp != NULL) 2527193538b7SGregory Neil Shapiro freehostent(hp); 252840266059SGregory Neil Shapiro # endif /* NETINET6 */ 2529c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2530193538b7SGregory Neil Shapiro } 253106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2532c2aa98e2SPeter Wemm 2533c2aa98e2SPeter Wemm for (;;) 2534c2aa98e2SPeter Wemm { 2535c2aa98e2SPeter Wemm if (tTd(16, 1)) 253640266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 25378774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 253840266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2539c2aa98e2SPeter Wemm 2540c2aa98e2SPeter Wemm /* save for logging */ 2541c2aa98e2SPeter Wemm CurHostAddr = addr; 2542c2aa98e2SPeter Wemm 254340266059SGregory Neil Shapiro #if HASRRESVPORT 2544c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2545c2aa98e2SPeter Wemm { 2546c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2547c2aa98e2SPeter Wemm 2548c2aa98e2SPeter Wemm s = rresvport(&rport); 2549c2aa98e2SPeter Wemm } 2550c2aa98e2SPeter Wemm else 255140266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2552c2aa98e2SPeter Wemm { 255340266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2554c2aa98e2SPeter Wemm } 2555c2aa98e2SPeter Wemm if (s < 0) 2556c2aa98e2SPeter Wemm { 255706f25ae9SGregory Neil Shapiro save_errno = errno; 2558c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 255940266059SGregory Neil Shapiro #if XLA 2560c2aa98e2SPeter Wemm xla_host_end(host); 256106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2562c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 256340266059SGregory Neil Shapiro #if NETINET6 2564193538b7SGregory Neil Shapiro if (hp != NULL) 2565193538b7SGregory Neil Shapiro freehostent(hp); 256640266059SGregory Neil Shapiro #endif /* NETINET6 */ 256706f25ae9SGregory Neil Shapiro errno = save_errno; 2568c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2569c2aa98e2SPeter Wemm } 2570c2aa98e2SPeter Wemm 2571c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 257240266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2573c2aa98e2SPeter Wemm { 2574c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 257540266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 257640266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2577c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2578c2aa98e2SPeter Wemm } 257906f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 258006f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 258140266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 258206f25ae9SGregory Neil Shapiro { 258306f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 258440266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 258540266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 258606f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 258706f25ae9SGregory Neil Shapiro } 258806f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 258906f25ae9SGregory Neil Shapiro 2590c2aa98e2SPeter Wemm if (tTd(16, 1)) 259140266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2592c2aa98e2SPeter Wemm 2593c2aa98e2SPeter Wemm /* turn on network debugging? */ 2594c2aa98e2SPeter Wemm if (tTd(16, 101)) 2595c2aa98e2SPeter Wemm { 2596c2aa98e2SPeter Wemm int on = 1; 259706f25ae9SGregory Neil Shapiro 2598c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2599d0cef73dSGregory Neil Shapiro (char *)&on, sizeof(on)); 2600c2aa98e2SPeter Wemm } 260140266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 260240266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2603c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2604c2aa98e2SPeter Wemm 260506f25ae9SGregory Neil Shapiro if (clt_bind) 260606f25ae9SGregory Neil Shapiro { 260706f25ae9SGregory Neil Shapiro int on = 1; 260806f25ae9SGregory Neil Shapiro 260906f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 261006f25ae9SGregory Neil Shapiro { 261106f25ae9SGregory Neil Shapiro #if NETINET 261206f25ae9SGregory Neil Shapiro case AF_INET: 261306f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 261406f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 261506f25ae9SGregory Neil Shapiro SO_REUSEADDR, 261606f25ae9SGregory Neil Shapiro (char *) &on, 2617d0cef73dSGregory Neil Shapiro sizeof(on)); 261806f25ae9SGregory Neil Shapiro break; 261906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 262006f25ae9SGregory Neil Shapiro 262106f25ae9SGregory Neil Shapiro #if NETINET6 262206f25ae9SGregory Neil Shapiro case AF_INET6: 262306f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 262406f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 262506f25ae9SGregory Neil Shapiro SO_REUSEADDR, 262606f25ae9SGregory Neil Shapiro (char *) &on, 2627d0cef73dSGregory Neil Shapiro sizeof(on)); 262806f25ae9SGregory Neil Shapiro break; 262906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 263006f25ae9SGregory Neil Shapiro } 263106f25ae9SGregory Neil Shapiro 263206f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 263306f25ae9SGregory Neil Shapiro { 263406f25ae9SGregory Neil Shapiro save_errno = errno; 263506f25ae9SGregory Neil Shapiro (void) close(s); 263606f25ae9SGregory Neil Shapiro errno = save_errno; 263706f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 263806f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 263940266059SGregory Neil Shapiro #if NETINET6 2640193538b7SGregory Neil Shapiro if (hp != NULL) 2641193538b7SGregory Neil Shapiro freehostent(hp); 264240266059SGregory Neil Shapiro #endif /* NETINET6 */ 264306f25ae9SGregory Neil Shapiro errno = save_errno; 264406f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 264506f25ae9SGregory Neil Shapiro } 264606f25ae9SGregory Neil Shapiro } 264706f25ae9SGregory Neil Shapiro 2648c2aa98e2SPeter Wemm /* 2649c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2650c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2651c2aa98e2SPeter Wemm */ 2652c2aa98e2SPeter Wemm 2653c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2654c2aa98e2SPeter Wemm { 2655c2aa98e2SPeter Wemm int i; 2656c2aa98e2SPeter Wemm 2657c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 265840266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 26598774250cSGregory Neil Shapiro connecttimeout, 0); 2660c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 266140266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 26628774250cSGregory Neil Shapiro connecttimeout, 0); 2663c2aa98e2SPeter Wemm else 2664c2aa98e2SPeter Wemm ev = NULL; 2665c2aa98e2SPeter Wemm 266606f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 266706f25ae9SGregory Neil Shapiro { 266806f25ae9SGregory Neil Shapiro #if NETINET 266906f25ae9SGregory Neil Shapiro case AF_INET: 267006f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 26716f9c8e5bSGregory Neil Shapiro addr.sa.sa_family = ConnectOnlyTo.sa.sa_family; 267206f25ae9SGregory Neil Shapiro break; 267306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 267406f25ae9SGregory Neil Shapiro 267506f25ae9SGregory Neil Shapiro #if NETINET6 267606f25ae9SGregory Neil Shapiro case AF_INET6: 267706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 267806f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 267906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 268006f25ae9SGregory Neil Shapiro break; 268106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 268206f25ae9SGregory Neil Shapiro } 2683b6bacd31SGregory Neil Shapiro if (tTd(16, 1)) 2684b6bacd31SGregory Neil Shapiro sm_dprintf("Connecting to [%s]...\n", anynet_ntoa(&addr)); 2685c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 268606f25ae9SGregory Neil Shapiro save_errno = errno; 2687c2aa98e2SPeter Wemm if (ev != NULL) 268840266059SGregory Neil Shapiro sm_clrevent(ev); 2689c2aa98e2SPeter Wemm if (i >= 0) 2690c2aa98e2SPeter Wemm break; 2691c2aa98e2SPeter Wemm } 2692c2aa98e2SPeter Wemm else 269306f25ae9SGregory Neil Shapiro save_errno = errno; 2694c2aa98e2SPeter Wemm 2695605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2696605302a5SGregory Neil Shapiro (void) close(s); 2697605302a5SGregory Neil Shapiro 2698c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 269940266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 270040266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2701c2aa98e2SPeter Wemm { 2702c2aa98e2SPeter Wemm if (tTd(16, 1)) 270340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 270440266059SGregory Neil Shapiro sm_errstring(save_errno)); 270540266059SGregory Neil Shapiro firstconnect = false; 270606f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2707c2aa98e2SPeter Wemm continue; 2708c2aa98e2SPeter Wemm } 2709c2aa98e2SPeter Wemm 271040266059SGregory Neil Shapiro if (LogLevel > 13) 2711c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2712c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2713c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 271440266059SGregory Neil Shapiro sm_errstring(save_errno)); 2715c2aa98e2SPeter Wemm 271640266059SGregory Neil Shapiro #if NETINET6 271740266059SGregory Neil Shapiro nextaddr: 271840266059SGregory Neil Shapiro #endif /* NETINET6 */ 271940266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 272040266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2721c2aa98e2SPeter Wemm { 2722c2aa98e2SPeter Wemm if (tTd(16, 1)) 272340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 272440266059SGregory Neil Shapiro sm_errstring(save_errno)); 2725c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2726c2aa98e2SPeter Wemm { 2727c2aa98e2SPeter Wemm #if NETINET 2728c2aa98e2SPeter Wemm case AF_INET: 272906f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 273006f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2731c2aa98e2SPeter Wemm INADDRSZ); 2732c2aa98e2SPeter Wemm break; 273306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 273406f25ae9SGregory Neil Shapiro 273506f25ae9SGregory Neil Shapiro #if NETINET6 273606f25ae9SGregory Neil Shapiro case AF_INET6: 273706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 273806f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 273906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 274006f25ae9SGregory Neil Shapiro break; 274106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2742c2aa98e2SPeter Wemm 2743c2aa98e2SPeter Wemm default: 274406f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 274506f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2746c2aa98e2SPeter Wemm hp->h_length); 2747c2aa98e2SPeter Wemm break; 2748c2aa98e2SPeter Wemm } 2749c2aa98e2SPeter Wemm continue; 2750c2aa98e2SPeter Wemm } 275106f25ae9SGregory Neil Shapiro errno = save_errno; 2752c2aa98e2SPeter Wemm 275306f25ae9SGregory Neil Shapiro #if NETINET6 275406f25ae9SGregory Neil Shapiro if (family == AF_INET6) 275506f25ae9SGregory Neil Shapiro { 275606f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 275740266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 275840266059SGregory Neil Shapiro sm_errstring(save_errno)); 275940266059SGregory Neil Shapiro v6found = true; 276006f25ae9SGregory Neil Shapiro family = AF_INET; 2761193538b7SGregory Neil Shapiro if (hp != NULL) 2762193538b7SGregory Neil Shapiro { 2763193538b7SGregory Neil Shapiro freehostent(hp); 2764193538b7SGregory Neil Shapiro hp = NULL; 2765193538b7SGregory Neil Shapiro } 276606f25ae9SGregory Neil Shapiro goto v4retry; 276706f25ae9SGregory Neil Shapiro } 276806f25ae9SGregory Neil Shapiro v6tempfail: 276906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2770c2aa98e2SPeter Wemm /* couldn't open connection */ 277106f25ae9SGregory Neil Shapiro #if NETINET6 277206f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 277306f25ae9SGregory Neil Shapiro if (errno > 0) 277406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 277506f25ae9SGregory Neil Shapiro save_errno = errno; 277606f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 277740266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 277840266059SGregory Neil Shapiro sm_errstring(save_errno)); 277940266059SGregory Neil Shapiro #if XLA 2780c2aa98e2SPeter Wemm xla_host_end(host); 278106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2782c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 278340266059SGregory Neil Shapiro #if NETINET6 2784193538b7SGregory Neil Shapiro if (hp != NULL) 2785193538b7SGregory Neil Shapiro freehostent(hp); 278640266059SGregory Neil Shapiro #endif /* NETINET6 */ 278706f25ae9SGregory Neil Shapiro errno = save_errno; 2788c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2789c2aa98e2SPeter Wemm } 2790c2aa98e2SPeter Wemm 279140266059SGregory Neil Shapiro #if NETINET6 2792193538b7SGregory Neil Shapiro if (hp != NULL) 2793193538b7SGregory Neil Shapiro { 2794193538b7SGregory Neil Shapiro freehostent(hp); 2795193538b7SGregory Neil Shapiro hp = NULL; 2796193538b7SGregory Neil Shapiro } 279740266059SGregory Neil Shapiro #endif /* NETINET6 */ 2798193538b7SGregory Neil Shapiro 2799c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 280006f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 280140266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 280240266059SGregory Neil Shapiro (void *) &s, 2803e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, NULL)) == NULL || 2804c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 280540266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 280640266059SGregory Neil Shapiro (void *) &s, 2807e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, NULL)) == NULL) 2808c2aa98e2SPeter Wemm { 280906f25ae9SGregory Neil Shapiro save_errno = errno; 2810c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2811c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 281206f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 281340266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 281406f25ae9SGregory Neil Shapiro (void) close(s); 281506f25ae9SGregory Neil Shapiro errno = save_errno; 281606f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 281706f25ae9SGregory Neil Shapiro } 281840266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 281940266059SGregory Neil Shapiro 282040266059SGregory Neil Shapiro /* set {client_flags} */ 282140266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 282240266059SGregory Neil Shapiro { 282340266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 282440266059SGregory Neil Shapiro macid("{client_flags}"), 282540266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 282640266059SGregory Neil Shapiro } 282740266059SGregory Neil Shapiro else 282840266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 282940266059SGregory Neil Shapiro macid("{client_flags}"), ""); 283040266059SGregory Neil Shapiro 283140266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 283240266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 283340266059SGregory Neil Shapiro { 283440266059SGregory Neil Shapiro /* look for just this one flag */ 283540266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 283640266059SGregory Neil Shapiro } 283706f25ae9SGregory Neil Shapiro 283806f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 2839d0cef73dSGregory Neil Shapiro len = sizeof(addr); 284006f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 284106f25ae9SGregory Neil Shapiro { 284206f25ae9SGregory Neil Shapiro char *name; 284340266059SGregory Neil Shapiro char family[5]; 284406f25ae9SGregory Neil Shapiro 284540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 284640266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 284740266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 284840266059SGregory Neil Shapiro addr.sa.sa_family); 284940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 285040266059SGregory Neil Shapiro macid("{if_family_out}"), family); 285106f25ae9SGregory Neil Shapiro 285206f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 285340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 285440266059SGregory Neil Shapiro macid("{if_name_out}"), name); 285506f25ae9SGregory Neil Shapiro if (LogLevel > 11) 285606f25ae9SGregory Neil Shapiro { 285706f25ae9SGregory Neil Shapiro /* log connection information */ 285806f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 285906f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 286006f25ae9SGregory Neil Shapiro } 286106f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 286206f25ae9SGregory Neil Shapiro { 286306f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 286406f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 286506f25ae9SGregory Neil Shapiro } 286606f25ae9SGregory Neil Shapiro } 286706f25ae9SGregory Neil Shapiro else 286806f25ae9SGregory Neil Shapiro { 286940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 287040266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 287140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 287240266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 287340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 287440266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 287506f25ae9SGregory Neil Shapiro } 2876e92d3f3fSGregory Neil Shapiro 2877e92d3f3fSGregory Neil Shapiro /* Use the configured HeloName as appropriate */ 2878e92d3f3fSGregory Neil Shapiro if (HeloName != NULL && HeloName[0] != '\0') 28796f9c8e5bSGregory Neil Shapiro { 28806f9c8e5bSGregory Neil Shapiro SM_FREE_CLR(mci->mci_heloname); 2881e92d3f3fSGregory Neil Shapiro mci->mci_heloname = newstr(HeloName); 28826f9c8e5bSGregory Neil Shapiro } 2883e92d3f3fSGregory Neil Shapiro 288406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 288506f25ae9SGregory Neil Shapiro return EX_OK; 288606f25ae9SGregory Neil Shapiro } 288706f25ae9SGregory Neil Shapiro 288806f25ae9SGregory Neil Shapiro static void 2889b6bacd31SGregory Neil Shapiro connecttimeout(ignore) 2890b6bacd31SGregory Neil Shapiro int ignore; 289106f25ae9SGregory Neil Shapiro { 28928774250cSGregory Neil Shapiro /* 28938774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 28948774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 28958774250cSGregory Neil Shapiro ** DOING. 28968774250cSGregory Neil Shapiro */ 28978774250cSGregory Neil Shapiro 289806f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 289906f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 290006f25ae9SGregory Neil Shapiro } 290140266059SGregory Neil Shapiro /* 290206f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 290306f25ae9SGregory Neil Shapiro ** 290406f25ae9SGregory Neil Shapiro ** Parameters: 290506f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 290606f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 290706f25ae9SGregory Neil Shapiro ** structure to be filled in. 290806f25ae9SGregory Neil Shapiro ** 290906f25ae9SGregory Neil Shapiro ** Returns: 291006f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 291106f25ae9SGregory Neil Shapiro ** made and if not why not. 291206f25ae9SGregory Neil Shapiro ** 291306f25ae9SGregory Neil Shapiro ** Side Effects: 291406f25ae9SGregory Neil Shapiro ** none. 291506f25ae9SGregory Neil Shapiro */ 291606f25ae9SGregory Neil Shapiro 291706f25ae9SGregory Neil Shapiro #if NETUNIX 291840266059SGregory Neil Shapiro int 291940266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 292006f25ae9SGregory Neil Shapiro char *mux_path; 292106f25ae9SGregory Neil Shapiro register MCI *mci; 292206f25ae9SGregory Neil Shapiro { 292306f25ae9SGregory Neil Shapiro int sock; 292406f25ae9SGregory Neil Shapiro int rval, save_errno; 292506f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 292606f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 292706f25ae9SGregory Neil Shapiro 292806f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 292906f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 293006f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 293106f25ae9SGregory Neil Shapiro 293206f25ae9SGregory Neil Shapiro if (rval != 0) 293306f25ae9SGregory Neil Shapiro { 2934e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket %s", 2935e92d3f3fSGregory Neil Shapiro mux_path); 293606f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 293706f25ae9SGregory Neil Shapiro errno = rval; 293806f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 293906f25ae9SGregory Neil Shapiro } 294006f25ae9SGregory Neil Shapiro 294106f25ae9SGregory Neil Shapiro /* prepare address structure */ 2942d0cef73dSGregory Neil Shapiro memset(&unix_addr, '\0', sizeof(unix_addr)); 294306f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 294406f25ae9SGregory Neil Shapiro 2945d0cef73dSGregory Neil Shapiro if (strlen(mux_path) >= sizeof(unix_addr.sun_path)) 294606f25ae9SGregory Neil Shapiro { 2947e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: domain socket name %s too long", 2948e92d3f3fSGregory Neil Shapiro mux_path); 294940266059SGregory Neil Shapiro 295040266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 295106f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 295206f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 295306f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 295406f25ae9SGregory Neil Shapiro } 295540266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 2956d0cef73dSGregory Neil Shapiro sizeof(unix_addr.sun_path)); 295706f25ae9SGregory Neil Shapiro 295806f25ae9SGregory Neil Shapiro /* initialize domain socket */ 295906f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 296006f25ae9SGregory Neil Shapiro if (sock == -1) 296106f25ae9SGregory Neil Shapiro { 296206f25ae9SGregory Neil Shapiro save_errno = errno; 2963e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket %s", 2964e92d3f3fSGregory Neil Shapiro mux_path); 296506f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 296606f25ae9SGregory Neil Shapiro errno = save_errno; 296706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 296806f25ae9SGregory Neil Shapiro } 296906f25ae9SGregory Neil Shapiro 297006f25ae9SGregory Neil Shapiro /* connect to server */ 297106f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 297206f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 297306f25ae9SGregory Neil Shapiro { 297406f25ae9SGregory Neil Shapiro save_errno = errno; 297506f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 297606f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 297706f25ae9SGregory Neil Shapiro (void) close(sock); 297806f25ae9SGregory Neil Shapiro errno = save_errno; 297906f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 298006f25ae9SGregory Neil Shapiro } 298106f25ae9SGregory Neil Shapiro 298206f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 298306f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 298440266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2985e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY_B, NULL)) 298640266059SGregory Neil Shapiro == NULL 298740266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 298840266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2989e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY_B, NULL)) 299040266059SGregory Neil Shapiro == NULL) 299106f25ae9SGregory Neil Shapiro { 299206f25ae9SGregory Neil Shapiro save_errno = errno; 299306f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 299406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 299506f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 299640266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 299706f25ae9SGregory Neil Shapiro (void) close(sock); 299806f25ae9SGregory Neil Shapiro errno = save_errno; 2999c2aa98e2SPeter Wemm return EX_TEMPFAIL; 3000c2aa98e2SPeter Wemm } 300140266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 3002c2aa98e2SPeter Wemm 3003c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 300406f25ae9SGregory Neil Shapiro errno = 0; 300506f25ae9SGregory Neil Shapiro return EX_OK; 3006c2aa98e2SPeter Wemm } 300706f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 300840266059SGregory Neil Shapiro /* 300940266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 30108774250cSGregory Neil Shapiro ** 30118774250cSGregory Neil Shapiro ** Parameters: 301240266059SGregory Neil Shapiro ** none. 30138774250cSGregory Neil Shapiro ** 30148774250cSGregory Neil Shapiro ** Returns: 30158774250cSGregory Neil Shapiro ** none. 30168774250cSGregory Neil Shapiro ** 30178774250cSGregory Neil Shapiro ** Side Effects: 301840266059SGregory Neil Shapiro ** closes control socket, exits. 30198774250cSGregory Neil Shapiro */ 30208774250cSGregory Neil Shapiro 302140266059SGregory Neil Shapiro void 302240266059SGregory Neil Shapiro shutdown_daemon() 30238774250cSGregory Neil Shapiro { 302440266059SGregory Neil Shapiro int i; 302540266059SGregory Neil Shapiro char *reason; 30268774250cSGregory Neil Shapiro 302740266059SGregory Neil Shapiro sm_allsignals(true); 302840266059SGregory Neil Shapiro 302940266059SGregory Neil Shapiro reason = ShutdownRequest; 303040266059SGregory Neil Shapiro ShutdownRequest = NULL; 303140266059SGregory Neil Shapiro PendingSignal = 0; 303240266059SGregory Neil Shapiro 3033e92d3f3fSGregory Neil Shapiro if (LogLevel > 9) 3034e92d3f3fSGregory Neil Shapiro sm_syslog(LOG_INFO, CurEnv->e_id, "stopping daemon, reason=%s", 303540266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 303640266059SGregory Neil Shapiro 303740266059SGregory Neil Shapiro FileName = NULL; 303840266059SGregory Neil Shapiro closecontrolsocket(true); 303940266059SGregory Neil Shapiro #if XLA 304040266059SGregory Neil Shapiro xla_all_end(); 304140266059SGregory Neil Shapiro #endif /* XLA */ 304240266059SGregory Neil Shapiro 304340266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 304440266059SGregory Neil Shapiro { 304540266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 304640266059SGregory Neil Shapiro { 304740266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 304840266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 304940266059SGregory Neil Shapiro 305040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 305140266059SGregory Neil Shapiro # if NETUNIX 305240266059SGregory Neil Shapiro /* Remove named sockets */ 305340266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 305440266059SGregory Neil Shapiro { 305540266059SGregory Neil Shapiro int rval; 305640266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 305740266059SGregory Neil Shapiro 305840266059SGregory Neil Shapiro /* if not safe, don't use it */ 305940266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 306040266059SGregory Neil Shapiro RunAsUid, RunAsGid, 306140266059SGregory Neil Shapiro RunAsUserName, sff, 306240266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 306340266059SGregory Neil Shapiro if (rval == 0 && 306440266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 306540266059SGregory Neil Shapiro { 306640266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 306740266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 306840266059SGregory Neil Shapiro Daemons[i].d_name, 306940266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 307040266059SGregory Neil Shapiro sm_errstring(errno)); 30718774250cSGregory Neil Shapiro } 307240266059SGregory Neil Shapiro } 307340266059SGregory Neil Shapiro # endif /* NETUNIX */ 307440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 307540266059SGregory Neil Shapiro } 307640266059SGregory Neil Shapiro } 307740266059SGregory Neil Shapiro 307840266059SGregory Neil Shapiro finis(false, true, EX_OK); 307940266059SGregory Neil Shapiro } 308040266059SGregory Neil Shapiro /* 30818774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 30828774250cSGregory Neil Shapiro ** 30838774250cSGregory Neil Shapiro ** Parameters: 30848774250cSGregory Neil Shapiro ** none. 30858774250cSGregory Neil Shapiro ** 30868774250cSGregory Neil Shapiro ** Returns: 30878774250cSGregory Neil Shapiro ** none. 30888774250cSGregory Neil Shapiro ** 30898774250cSGregory Neil Shapiro ** Side Effects: 30908774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 30918774250cSGregory Neil Shapiro */ 30928774250cSGregory Neil Shapiro 309313058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 309413058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 309513058a91SGregory Neil Shapiro do \ 309613058a91SGregory Neil Shapiro { \ 309740266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 309813058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 309940266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 310013058a91SGregory Neil Shapiro } while (0) 310113058a91SGregory Neil Shapiro 310240266059SGregory Neil Shapiro void 31038774250cSGregory Neil Shapiro restart_daemon() 31048774250cSGregory Neil Shapiro { 310540266059SGregory Neil Shapiro bool drop; 31068774250cSGregory Neil Shapiro int save_errno; 31078774250cSGregory Neil Shapiro char *reason; 310813058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 31098774250cSGregory Neil Shapiro extern int DtableSize; 31108774250cSGregory Neil Shapiro 311113058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 311240266059SGregory Neil Shapiro sm_clear_events(); 311340266059SGregory Neil Shapiro sm_allsignals(true); 31148774250cSGregory Neil Shapiro 31158774250cSGregory Neil Shapiro reason = RestartRequest; 31168774250cSGregory Neil Shapiro RestartRequest = NULL; 31178774250cSGregory Neil Shapiro PendingSignal = 0; 31188774250cSGregory Neil Shapiro 31198774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 31208774250cSGregory Neil Shapiro { 31218774250cSGregory Neil Shapiro if (LogLevel > 3) 31228774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 31238774250cSGregory Neil Shapiro "could not restart: need full path"); 312440266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 312540266059SGregory Neil Shapiro /* NOTREACHED */ 31268774250cSGregory Neil Shapiro } 31278774250cSGregory Neil Shapiro if (LogLevel > 3) 31288774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 31298774250cSGregory Neil Shapiro SaveArgv[0], 31308774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 31318774250cSGregory Neil Shapiro 313240266059SGregory Neil Shapiro closecontrolsocket(true); 313394c01205SGregory Neil Shapiro #if SM_CONF_SHM 313494c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 313594c01205SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 313640266059SGregory Neil Shapiro 3137e92d3f3fSGregory Neil Shapiro /* close locked pid file */ 3138e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 3139e92d3f3fSGregory Neil Shapiro 314040266059SGregory Neil Shapiro /* 314140266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 314240266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 314340266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 314440266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 314540266059SGregory Neil Shapiro */ 314640266059SGregory Neil Shapiro 314740266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 314840266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 314940266059SGregory Neil Shapiro 315040266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 31518774250cSGregory Neil Shapiro { 31528774250cSGregory Neil Shapiro if (LogLevel > 0) 31538774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 315440266059SGregory Neil Shapiro "could not drop privileges: %s", 315540266059SGregory Neil Shapiro sm_errstring(errno)); 315640266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 315740266059SGregory Neil Shapiro /* NOTREACHED */ 31588774250cSGregory Neil Shapiro } 31598774250cSGregory Neil Shapiro 3160e92d3f3fSGregory Neil Shapiro sm_close_on_exec(STDERR_FILENO + 1, DtableSize); 31618774250cSGregory Neil Shapiro 316213058a91SGregory Neil Shapiro /* 316313058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 316413058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 316513058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 316613058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 316713058a91SGregory Neil Shapiro */ 316813058a91SGregory Neil Shapiro 316913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 317013058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 317113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 317213058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 317313058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 317413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 317513058a91SGregory Neil Shapiro #ifdef SIGUSR1 317613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 317713058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 3178605302a5SGregory Neil Shapiro 3179605302a5SGregory Neil Shapiro /* Turn back on signals */ 318040266059SGregory Neil Shapiro sm_allsignals(false); 31818774250cSGregory Neil Shapiro 31828774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 31838774250cSGregory Neil Shapiro save_errno = errno; 31848774250cSGregory Neil Shapiro 318513058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 318640266059SGregory Neil Shapiro sm_allsignals(true); 318713058a91SGregory Neil Shapiro 318813058a91SGregory Neil Shapiro /* For finis() events */ 318940266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 319013058a91SGregory Neil Shapiro 319113058a91SGregory Neil Shapiro #ifdef SIGUSR1 319213058a91SGregory Neil Shapiro /* For debugging finis() */ 319340266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 319413058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 31958774250cSGregory Neil Shapiro 31968774250cSGregory Neil Shapiro errno = save_errno; 31978774250cSGregory Neil Shapiro if (LogLevel > 0) 319840266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 319940266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 320040266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 320140266059SGregory Neil Shapiro /* NOTREACHED */ 32028774250cSGregory Neil Shapiro } 320340266059SGregory Neil Shapiro /* 3204c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3205c2aa98e2SPeter Wemm ** 3206c2aa98e2SPeter Wemm ** Parameters: 3207c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3208c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3209c2aa98e2SPeter Wemm ** 3210c2aa98e2SPeter Wemm ** Returns: 3211c2aa98e2SPeter Wemm ** A list of aliases for this host. 3212c2aa98e2SPeter Wemm ** 3213c2aa98e2SPeter Wemm ** Side Effects: 3214c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3215c2aa98e2SPeter Wemm */ 3216c2aa98e2SPeter Wemm 3217c2aa98e2SPeter Wemm struct hostent * 3218c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3219c2aa98e2SPeter Wemm char hostbuf[]; 3220c2aa98e2SPeter Wemm int size; 3221c2aa98e2SPeter Wemm { 3222c2aa98e2SPeter Wemm register struct hostent *hp; 3223c2aa98e2SPeter Wemm 3224602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 322540266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 322606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 322713058a91SGregory Neil Shapiro #if NETINET && NETINET6 322813058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 322913058a91SGregory Neil Shapiro { 323013058a91SGregory Neil Shapiro /* 323113058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 323213058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 323313058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 323413058a91SGregory Neil Shapiro */ 323513058a91SGregory Neil Shapiro 323613058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 323713058a91SGregory Neil Shapiro } 323813058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3239c2aa98e2SPeter Wemm if (hp == NULL) 3240c2aa98e2SPeter Wemm return NULL; 3241c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 324206f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 324306f25ae9SGregory Neil Shapiro 324406f25ae9SGregory Neil Shapiro #if NETINFO 324506f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3246c2aa98e2SPeter Wemm { 324706f25ae9SGregory Neil Shapiro char *domainname; 324806f25ae9SGregory Neil Shapiro 324906f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 325006f25ae9SGregory Neil Shapiro "domain", '\0'); 325106f25ae9SGregory Neil Shapiro if (domainname != NULL && 325206f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 325340266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 325406f25ae9SGregory Neil Shapiro } 325506f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3256c2aa98e2SPeter Wemm 3257c2aa98e2SPeter Wemm /* 3258c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3259c2aa98e2SPeter Wemm ** dotted alias. 3260c2aa98e2SPeter Wemm */ 3261c2aa98e2SPeter Wemm 3262c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3263c2aa98e2SPeter Wemm { 3264c2aa98e2SPeter Wemm char **ha; 3265c2aa98e2SPeter Wemm 326606f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3267c2aa98e2SPeter Wemm { 3268c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3269c2aa98e2SPeter Wemm { 327006f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3271c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3272c2aa98e2SPeter Wemm break; 3273c2aa98e2SPeter Wemm } 3274c2aa98e2SPeter Wemm } 3275c2aa98e2SPeter Wemm } 3276c2aa98e2SPeter Wemm 3277c2aa98e2SPeter Wemm /* 3278c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3279c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3280c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3281c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3282c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3283c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3284c2aa98e2SPeter Wemm */ 3285c2aa98e2SPeter Wemm 3286c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 328740266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3288c2aa98e2SPeter Wemm { 3289e3793f76SGregory Neil Shapiro sm_syslog(LocalDaemon ? LOG_WARNING : LOG_CRIT, NOQID, 3290c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3291c2aa98e2SPeter Wemm hostbuf); 3292c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3293c2aa98e2SPeter Wemm hostbuf); 329406f25ae9SGregory Neil Shapiro (void) sleep(60); 329540266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3296c2aa98e2SPeter Wemm { 3297e3793f76SGregory Neil Shapiro sm_syslog(LocalDaemon ? LOG_WARNING : LOG_ALERT, NOQID, 3298c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3299c2aa98e2SPeter Wemm hostbuf); 3300c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3301c2aa98e2SPeter Wemm hostbuf); 3302c2aa98e2SPeter Wemm } 3303c2aa98e2SPeter Wemm } 330406f25ae9SGregory Neil Shapiro return hp; 3305c2aa98e2SPeter Wemm } 330640266059SGregory Neil Shapiro /* 3307c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3308c2aa98e2SPeter Wemm ** 3309c2aa98e2SPeter Wemm ** Parameters: 3310c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3311c2aa98e2SPeter Wemm ** ha -- actual first address 3312c2aa98e2SPeter Wemm ** sa -- second address 3313c2aa98e2SPeter Wemm ** 3314c2aa98e2SPeter Wemm ** Returns: 3315c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3316c2aa98e2SPeter Wemm ** else -- they don't match 3317c2aa98e2SPeter Wemm */ 3318c2aa98e2SPeter Wemm 331906f25ae9SGregory Neil Shapiro static int 3320c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3321c2aa98e2SPeter Wemm struct hostent *hp; 3322c2aa98e2SPeter Wemm char *ha; 3323c2aa98e2SPeter Wemm SOCKADDR *sa; 3324c2aa98e2SPeter Wemm { 332506f25ae9SGregory Neil Shapiro #if NETINET6 332640266059SGregory Neil Shapiro unsigned char *a; 332706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 332806f25ae9SGregory Neil Shapiro 3329c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3330c2aa98e2SPeter Wemm { 333106f25ae9SGregory Neil Shapiro #if NETINET 3332c2aa98e2SPeter Wemm case AF_INET: 3333c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 333406f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3335c2aa98e2SPeter Wemm break; 333606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3337c2aa98e2SPeter Wemm 333806f25ae9SGregory Neil Shapiro #if NETINET6 333906f25ae9SGregory Neil Shapiro case AF_INET6: 334040266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 334106f25ae9SGregory Neil Shapiro 334206f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 334306f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 334406f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 334506f25ae9SGregory Neil Shapiro 334606f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 334706f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 334806f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 334906f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 335006f25ae9SGregory Neil Shapiro break; 335106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3352c2aa98e2SPeter Wemm } 3353c2aa98e2SPeter Wemm return -1; 3354c2aa98e2SPeter Wemm } 335540266059SGregory Neil Shapiro /* 335606f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3357c2aa98e2SPeter Wemm ** 3358c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3359c2aa98e2SPeter Wemm ** 3360c2aa98e2SPeter Wemm ** Parameters: 3361c2aa98e2SPeter Wemm ** fd -- the descriptor 336240266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3363c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 336440266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3365c2aa98e2SPeter Wemm ** 3366c2aa98e2SPeter Wemm ** Returns: 3367c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3368c2aa98e2SPeter Wemm */ 3369c2aa98e2SPeter Wemm 3370c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3371c2aa98e2SPeter Wemm 3372c2aa98e2SPeter Wemm static void 3373b6bacd31SGregory Neil Shapiro authtimeout(ignore) 3374b6bacd31SGregory Neil Shapiro int ignore; 3375c2aa98e2SPeter Wemm { 33768774250cSGregory Neil Shapiro /* 33778774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 33788774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 33798774250cSGregory Neil Shapiro ** DOING. 33808774250cSGregory Neil Shapiro */ 33818774250cSGregory Neil Shapiro 33828774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3383c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3384c2aa98e2SPeter Wemm } 3385c2aa98e2SPeter Wemm 3386c2aa98e2SPeter Wemm char * 3387c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3388c2aa98e2SPeter Wemm int fd; 3389c2aa98e2SPeter Wemm bool *may_be_forged; 3390c2aa98e2SPeter Wemm { 339140266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3392c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3393c2aa98e2SPeter Wemm register char *volatile p = NULL; 3394c2aa98e2SPeter Wemm SOCKADDR la; 3395c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 339640266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3397c2aa98e2SPeter Wemm register struct servent *sp; 339840266059SGregory Neil Shapiro # if NETINET 339940266059SGregory Neil Shapiro static unsigned short port4 = 0; 340040266059SGregory Neil Shapiro # endif /* NETINET */ 340140266059SGregory Neil Shapiro # if NETINET6 340240266059SGregory Neil Shapiro static unsigned short port6 = 0; 340340266059SGregory Neil Shapiro # endif /* NETINET6 */ 340440266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3405c2aa98e2SPeter Wemm volatile int s; 3406c2aa98e2SPeter Wemm int i = 0; 340740266059SGregory Neil Shapiro size_t len; 340840266059SGregory Neil Shapiro SM_EVENT *ev; 3409c2aa98e2SPeter Wemm int nleft; 3410c2aa98e2SPeter Wemm struct hostent *hp; 3411c2aa98e2SPeter Wemm char *ostype = NULL; 3412c2aa98e2SPeter Wemm char **ha; 3413c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 341413bd1963SGregory Neil Shapiro static char hbuf[MAXNAME + MAXAUTHINFO + 11]; 3415c2aa98e2SPeter Wemm 341640266059SGregory Neil Shapiro *may_be_forged = false; 3417d0cef73dSGregory Neil Shapiro falen = sizeof(RealHostAddr); 3418c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3419c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3420c2aa98e2SPeter Wemm { 342106f25ae9SGregory Neil Shapiro if (i < 0) 342206f25ae9SGregory Neil Shapiro { 342306f25ae9SGregory Neil Shapiro /* 342406f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 342506f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 342606f25ae9SGregory Neil Shapiro ** happen later. 342706f25ae9SGregory Neil Shapiro */ 342840266059SGregory Neil Shapiro 342906f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3430c2aa98e2SPeter Wemm return NULL; 343106f25ae9SGregory Neil Shapiro errno = 0; 343206f25ae9SGregory Neil Shapiro } 3433d0cef73dSGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof(hbuf), 2, RealUserName, 343440266059SGregory Neil Shapiro "@localhost"); 3435c2aa98e2SPeter Wemm if (tTd(9, 1)) 343640266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3437c2aa98e2SPeter Wemm return hbuf; 3438c2aa98e2SPeter Wemm } 3439c2aa98e2SPeter Wemm 3440c2aa98e2SPeter Wemm if (RealHostName == NULL) 3441c2aa98e2SPeter Wemm { 3442c2aa98e2SPeter Wemm /* translate that to a host name */ 3443c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3444c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 344540266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3446c2aa98e2SPeter Wemm } 3447c2aa98e2SPeter Wemm 3448c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 344940266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 345040266059SGregory Neil Shapiro RealHostName[0] != '[') 3451c2aa98e2SPeter Wemm { 345213058a91SGregory Neil Shapiro int family; 3453c2aa98e2SPeter Wemm 345413058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 345513058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 345613058a91SGregory Neil Shapiro /* 345713058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 345813058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 345913058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 346013058a91SGregory Neil Shapiro ** RealHostAddr. 346113058a91SGregory Neil Shapiro ** 346213058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 346313058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 346413058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 346513058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 346613058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 346713058a91SGregory Neil Shapiro */ 346813058a91SGregory Neil Shapiro 346913058a91SGregory Neil Shapiro if (family == AF_INET6 && 347013058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 347113058a91SGregory Neil Shapiro family = AF_INET; 347213058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 347313058a91SGregory Neil Shapiro 347413058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 347513058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3476c2aa98e2SPeter Wemm if (hp == NULL) 3477a7ec597cSGregory Neil Shapiro { 3478e92d3f3fSGregory Neil Shapiro /* XXX: Could be a temporary error on forward lookup */ 347940266059SGregory Neil Shapiro *may_be_forged = true; 3480a7ec597cSGregory Neil Shapiro } 3481c2aa98e2SPeter Wemm else 3482c2aa98e2SPeter Wemm { 3483c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 348440266059SGregory Neil Shapiro { 3485c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3486c2aa98e2SPeter Wemm break; 348740266059SGregory Neil Shapiro } 3488c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 348940266059SGregory Neil Shapiro #if NETINET6 3490193538b7SGregory Neil Shapiro freehostent(hp); 3491193538b7SGregory Neil Shapiro hp = NULL; 349240266059SGregory Neil Shapiro #endif /* NETINET6 */ 3493c2aa98e2SPeter Wemm } 3494c2aa98e2SPeter Wemm } 3495c2aa98e2SPeter Wemm 3496c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3497c2aa98e2SPeter Wemm goto noident; 3498c2aa98e2SPeter Wemm 3499d0cef73dSGregory Neil Shapiro lalen = sizeof(la); 350006f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 350106f25ae9SGregory Neil Shapiro { 350206f25ae9SGregory Neil Shapiro #if NETINET 350306f25ae9SGregory Neil Shapiro case AF_INET: 350406f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 350506f25ae9SGregory Neil Shapiro lalen <= 0 || 3506c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3507c2aa98e2SPeter Wemm { 3508c2aa98e2SPeter Wemm /* no ident info */ 3509c2aa98e2SPeter Wemm goto noident; 3510c2aa98e2SPeter Wemm } 351106f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3512c2aa98e2SPeter Wemm 3513c2aa98e2SPeter Wemm /* create ident query */ 3514d0cef73dSGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof(ibuf), "%d,%d\r\n", 351506f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 351606f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3517c2aa98e2SPeter Wemm 3518c2aa98e2SPeter Wemm /* create local address */ 3519c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3520c2aa98e2SPeter Wemm 3521c2aa98e2SPeter Wemm /* create foreign address */ 352206f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 352306f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 352406f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 352540266059SGregory Neil Shapiro 352640266059SGregory Neil Shapiro /* 352740266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 352840266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 352940266059SGregory Neil Shapiro ** spent in this routine). 353040266059SGregory Neil Shapiro ** Hence we store the port in a static variable 353140266059SGregory Neil Shapiro ** to save this time. 353240266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 353340266059SGregory Neil Shapiro ** This code makes the assumption that the port number 353440266059SGregory Neil Shapiro ** is not 0. 353540266059SGregory Neil Shapiro */ 353640266059SGregory Neil Shapiro 353740266059SGregory Neil Shapiro if (port4 == 0) 353840266059SGregory Neil Shapiro { 3539c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3540c2aa98e2SPeter Wemm if (sp != NULL) 354140266059SGregory Neil Shapiro port4 = sp->s_port; 3542c2aa98e2SPeter Wemm else 354340266059SGregory Neil Shapiro port4 = htons(113); 354440266059SGregory Neil Shapiro } 354540266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 354606f25ae9SGregory Neil Shapiro break; 354706f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 354806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 354906f25ae9SGregory Neil Shapiro 355006f25ae9SGregory Neil Shapiro #if NETINET6 355106f25ae9SGregory Neil Shapiro case AF_INET6: 355206f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 355306f25ae9SGregory Neil Shapiro lalen <= 0 || 355406f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 355506f25ae9SGregory Neil Shapiro { 355606f25ae9SGregory Neil Shapiro /* no ident info */ 355706f25ae9SGregory Neil Shapiro goto noident; 355806f25ae9SGregory Neil Shapiro } 355906f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 356006f25ae9SGregory Neil Shapiro 356106f25ae9SGregory Neil Shapiro /* create ident query */ 3562d0cef73dSGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof(ibuf), "%d,%d\r\n", 356306f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 356406f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 356506f25ae9SGregory Neil Shapiro 356606f25ae9SGregory Neil Shapiro /* create local address */ 356706f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 356806f25ae9SGregory Neil Shapiro 356906f25ae9SGregory Neil Shapiro /* create foreign address */ 357006f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 357106f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 357206f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 357340266059SGregory Neil Shapiro if (port6 == 0) 357440266059SGregory Neil Shapiro { 357506f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 357606f25ae9SGregory Neil Shapiro if (sp != NULL) 357740266059SGregory Neil Shapiro port6 = sp->s_port; 357806f25ae9SGregory Neil Shapiro else 357940266059SGregory Neil Shapiro port6 = htons(113); 358040266059SGregory Neil Shapiro } 358140266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 358206f25ae9SGregory Neil Shapiro break; 358306f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 358406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 358506f25ae9SGregory Neil Shapiro default: 358606f25ae9SGregory Neil Shapiro /* no ident info */ 358706f25ae9SGregory Neil Shapiro goto noident; 358806f25ae9SGregory Neil Shapiro } 3589c2aa98e2SPeter Wemm 3590c2aa98e2SPeter Wemm s = -1; 3591c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3592c2aa98e2SPeter Wemm { 3593c2aa98e2SPeter Wemm if (s >= 0) 3594c2aa98e2SPeter Wemm (void) close(s); 3595c2aa98e2SPeter Wemm goto noident; 3596c2aa98e2SPeter Wemm } 3597c2aa98e2SPeter Wemm 3598c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 359940266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3600c2aa98e2SPeter Wemm 3601c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 360206f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3603c2aa98e2SPeter Wemm if (s < 0) 3604c2aa98e2SPeter Wemm { 360540266059SGregory Neil Shapiro sm_clrevent(ev); 3606c2aa98e2SPeter Wemm goto noident; 3607c2aa98e2SPeter Wemm } 360806f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 360906f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3610c2aa98e2SPeter Wemm goto closeident; 3611c2aa98e2SPeter Wemm 3612c2aa98e2SPeter Wemm if (tTd(9, 10)) 361340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3614c2aa98e2SPeter Wemm 3615c2aa98e2SPeter Wemm /* send query */ 3616c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3617c2aa98e2SPeter Wemm goto closeident; 3618c2aa98e2SPeter Wemm 3619c2aa98e2SPeter Wemm /* get result */ 3620c2aa98e2SPeter Wemm p = &ibuf[0]; 3621d0cef73dSGregory Neil Shapiro nleft = sizeof(ibuf) - 1; 3622c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3623c2aa98e2SPeter Wemm { 3624323f6dcbSGregory Neil Shapiro char *s; 3625323f6dcbSGregory Neil Shapiro 3626c2aa98e2SPeter Wemm p += i; 3627c2aa98e2SPeter Wemm nleft -= i; 3628c2aa98e2SPeter Wemm *p = '\0'; 3629323f6dcbSGregory Neil Shapiro if ((s = strchr(ibuf, '\n')) != NULL) 3630323f6dcbSGregory Neil Shapiro { 3631323f6dcbSGregory Neil Shapiro if (p > s + 1) 3632323f6dcbSGregory Neil Shapiro { 3633323f6dcbSGregory Neil Shapiro p = s + 1; 3634323f6dcbSGregory Neil Shapiro *p = '\0'; 3635323f6dcbSGregory Neil Shapiro } 3636323f6dcbSGregory Neil Shapiro break; 3637323f6dcbSGregory Neil Shapiro } 3638323f6dcbSGregory Neil Shapiro if (nleft <= 0) 3639c2aa98e2SPeter Wemm break; 3640c2aa98e2SPeter Wemm } 3641c2aa98e2SPeter Wemm (void) close(s); 364240266059SGregory Neil Shapiro sm_clrevent(ev); 3643c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3644c2aa98e2SPeter Wemm goto noident; 3645c2aa98e2SPeter Wemm 3646d9986b26SGregory Neil Shapiro if (p >= &ibuf[2] && *--p == '\n' && *--p == '\r') 3647c2aa98e2SPeter Wemm p--; 3648c2aa98e2SPeter Wemm *++p = '\0'; 3649c2aa98e2SPeter Wemm 3650c2aa98e2SPeter Wemm if (tTd(9, 3)) 365140266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3652c2aa98e2SPeter Wemm 3653c2aa98e2SPeter Wemm /* parse result */ 3654c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3655c2aa98e2SPeter Wemm if (p == NULL) 3656c2aa98e2SPeter Wemm { 3657c2aa98e2SPeter Wemm /* malformed response */ 3658c2aa98e2SPeter Wemm goto noident; 3659c2aa98e2SPeter Wemm } 3660c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3661c2aa98e2SPeter Wemm continue; 366240266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3663c2aa98e2SPeter Wemm { 3664c2aa98e2SPeter Wemm /* presumably an error string */ 3665c2aa98e2SPeter Wemm goto noident; 3666c2aa98e2SPeter Wemm } 3667c2aa98e2SPeter Wemm p += 6; 3668c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3669c2aa98e2SPeter Wemm p++; 3670c2aa98e2SPeter Wemm if (*p++ != ':') 3671c2aa98e2SPeter Wemm { 3672c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3673c2aa98e2SPeter Wemm goto noident; 3674c2aa98e2SPeter Wemm } 3675c2aa98e2SPeter Wemm 3676c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3677c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3678c2aa98e2SPeter Wemm p++; 3679c2aa98e2SPeter Wemm ostype = p; 3680c2aa98e2SPeter Wemm p = strchr(p, ':'); 3681c2aa98e2SPeter Wemm if (p == NULL) 3682c2aa98e2SPeter Wemm { 3683c2aa98e2SPeter Wemm /* malformed response */ 3684c2aa98e2SPeter Wemm goto noident; 3685c2aa98e2SPeter Wemm } 3686c2aa98e2SPeter Wemm else 3687c2aa98e2SPeter Wemm { 3688c2aa98e2SPeter Wemm char *charset; 3689c2aa98e2SPeter Wemm 3690c2aa98e2SPeter Wemm *p = '\0'; 3691c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3692c2aa98e2SPeter Wemm if (charset != NULL) 3693c2aa98e2SPeter Wemm *charset = '\0'; 3694c2aa98e2SPeter Wemm } 3695c2aa98e2SPeter Wemm 3696c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3697c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3698c2aa98e2SPeter Wemm continue; 3699c2aa98e2SPeter Wemm 3700c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 370140266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3702c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3703c2aa98e2SPeter Wemm { 3704d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof(hbuf)); 370513bd1963SGregory Neil Shapiro cleanstrcpy(&hbuf[6], p, MAXAUTHINFO); 3706c2aa98e2SPeter Wemm } 3707c2aa98e2SPeter Wemm else 370813bd1963SGregory Neil Shapiro cleanstrcpy(hbuf, p, MAXAUTHINFO); 370940266059SGregory Neil Shapiro len = strlen(hbuf); 3710d0cef73dSGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof(hbuf) - len, 2, "@", 3711c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3712c2aa98e2SPeter Wemm goto postident; 3713c2aa98e2SPeter Wemm 3714c2aa98e2SPeter Wemm closeident: 3715c2aa98e2SPeter Wemm (void) close(s); 371640266059SGregory Neil Shapiro sm_clrevent(ev); 3717c2aa98e2SPeter Wemm 3718c2aa98e2SPeter Wemm noident: 371906f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 372006f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 372106f25ae9SGregory Neil Shapiro { 372206f25ae9SGregory Neil Shapiro #if NETINET 372306f25ae9SGregory Neil Shapiro case AF_INET: 372406f25ae9SGregory Neil Shapiro if (port > 0) 372506f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 372606f25ae9SGregory Neil Shapiro break; 372706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 372806f25ae9SGregory Neil Shapiro 372906f25ae9SGregory Neil Shapiro #if NETINET6 373006f25ae9SGregory Neil Shapiro case AF_INET6: 373106f25ae9SGregory Neil Shapiro if (port > 0) 373206f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 373306f25ae9SGregory Neil Shapiro break; 373406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 373506f25ae9SGregory Neil Shapiro } 373606f25ae9SGregory Neil Shapiro 3737c2aa98e2SPeter Wemm if (RealHostName == NULL) 3738c2aa98e2SPeter Wemm { 3739c2aa98e2SPeter Wemm if (tTd(9, 1)) 374040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3741c2aa98e2SPeter Wemm return NULL; 3742c2aa98e2SPeter Wemm } 3743d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof(hbuf)); 3744c2aa98e2SPeter Wemm 3745c2aa98e2SPeter Wemm postident: 3746c2aa98e2SPeter Wemm #if IP_SRCROUTE 3747c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3748c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 374906f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3750c2aa98e2SPeter Wemm /* 3751c2aa98e2SPeter Wemm ** Extract IP source routing information. 3752c2aa98e2SPeter Wemm ** 3753c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3754c2aa98e2SPeter Wemm ** through c to d: 3755c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3756c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3757c2aa98e2SPeter Wemm ** 3758c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3759c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3760c2aa98e2SPeter Wemm ** p - pointer to hbuf 3761c2aa98e2SPeter Wemm */ 3762c2aa98e2SPeter Wemm 3763c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3764c2aa98e2SPeter Wemm { 3765c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3766c2aa98e2SPeter Wemm int j; 376740266059SGregory Neil Shapiro unsigned char *q; 376840266059SGregory Neil Shapiro unsigned char *o; 3769c2aa98e2SPeter Wemm int l; 377006f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3771c2aa98e2SPeter Wemm 3772d0cef73dSGregory Neil Shapiro ipoptlen = sizeof(ipopt); 3773c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3774c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3775c2aa98e2SPeter Wemm goto noipsr; 3776c2aa98e2SPeter Wemm if (ipoptlen == 0) 3777c2aa98e2SPeter Wemm goto noipsr; 377840266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 377940266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3780c2aa98e2SPeter Wemm { 3781c2aa98e2SPeter Wemm switch (*o) 3782c2aa98e2SPeter Wemm { 3783c2aa98e2SPeter Wemm case IPOPT_EOL: 3784c2aa98e2SPeter Wemm o = NULL; 3785c2aa98e2SPeter Wemm break; 3786c2aa98e2SPeter Wemm 3787c2aa98e2SPeter Wemm case IPOPT_NOP: 3788c2aa98e2SPeter Wemm o++; 3789c2aa98e2SPeter Wemm break; 3790c2aa98e2SPeter Wemm 3791c2aa98e2SPeter Wemm case IPOPT_SSRR: 3792c2aa98e2SPeter Wemm case IPOPT_LSRR: 3793c2aa98e2SPeter Wemm /* 3794c2aa98e2SPeter Wemm ** Source routing. 3795c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3796c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3797c2aa98e2SPeter Wemm ** including option type and 3798c2aa98e2SPeter Wemm ** length. 3799c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3800c2aa98e2SPeter Wemm ** data. 3801c2aa98e2SPeter Wemm ** o[3] begins the route data. 3802c2aa98e2SPeter Wemm */ 3803c2aa98e2SPeter Wemm 3804c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3805d0cef73dSGregory Neil Shapiro l = sizeof(hbuf) - (hbuf - p) - 6; 380640266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 380740266059SGregory Neil Shapiro " [%s@%.*s", 3808c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3809c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 381006f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3811c2aa98e2SPeter Wemm i = strlen(p); 3812c2aa98e2SPeter Wemm p += i; 3813c2aa98e2SPeter Wemm l -= strlen(p); 3814c2aa98e2SPeter Wemm 3815c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3816c2aa98e2SPeter Wemm 3817c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3818c2aa98e2SPeter Wemm q = &o[3]; 3819c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3820c2aa98e2SPeter Wemm { 382106f25ae9SGregory Neil Shapiro struct in_addr addr; 382206f25ae9SGregory Neil Shapiro 3823c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 382440266059SGregory Neil Shapiro (void) sm_snprintf(p, 382540266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3826c2aa98e2SPeter Wemm "%c%.*s", 3827c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3828c2aa98e2SPeter Wemm l > 240 ? 120 : 3829c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3830c2aa98e2SPeter Wemm inet_ntoa(addr)); 3831c2aa98e2SPeter Wemm i = strlen(p); 3832c2aa98e2SPeter Wemm p += i; 3833c2aa98e2SPeter Wemm l -= i + 1; 3834c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3835c2aa98e2SPeter Wemm } 3836c2aa98e2SPeter Wemm o += o[1]; 3837c2aa98e2SPeter Wemm break; 3838c2aa98e2SPeter Wemm 3839c2aa98e2SPeter Wemm default: 3840c2aa98e2SPeter Wemm /* Skip over option */ 3841c2aa98e2SPeter Wemm o += o[1]; 3842c2aa98e2SPeter Wemm break; 3843c2aa98e2SPeter Wemm } 3844c2aa98e2SPeter Wemm } 384540266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3846c2aa98e2SPeter Wemm goto postipsr; 3847c2aa98e2SPeter Wemm } 3848c2aa98e2SPeter Wemm 3849c2aa98e2SPeter Wemm noipsr: 385006f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3851c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3852c2aa98e2SPeter Wemm { 3853c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 385440266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3855c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3856c2aa98e2SPeter Wemm } 3857c2aa98e2SPeter Wemm if (*may_be_forged) 3858c2aa98e2SPeter Wemm { 3859c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 386040266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 386140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 386240266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3863c2aa98e2SPeter Wemm } 3864c2aa98e2SPeter Wemm 3865c2aa98e2SPeter Wemm #if IP_SRCROUTE 3866c2aa98e2SPeter Wemm postipsr: 386706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 386806f25ae9SGregory Neil Shapiro 386906f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 387006f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 387106f25ae9SGregory Neil Shapiro { 387206f25ae9SGregory Neil Shapiro #if NETINET 387306f25ae9SGregory Neil Shapiro case AF_INET: 387406f25ae9SGregory Neil Shapiro if (port > 0) 387506f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 387606f25ae9SGregory Neil Shapiro break; 387706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 387806f25ae9SGregory Neil Shapiro 387906f25ae9SGregory Neil Shapiro #if NETINET6 388006f25ae9SGregory Neil Shapiro case AF_INET6: 388106f25ae9SGregory Neil Shapiro if (port > 0) 388206f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 388306f25ae9SGregory Neil Shapiro break; 388406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 388506f25ae9SGregory Neil Shapiro } 388606f25ae9SGregory Neil Shapiro 388740266059SGregory Neil Shapiro if (tTd(9, 1)) 388840266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3889c2aa98e2SPeter Wemm return hbuf; 3890c2aa98e2SPeter Wemm } 389140266059SGregory Neil Shapiro /* 3892c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3893c2aa98e2SPeter Wemm ** 3894c2aa98e2SPeter Wemm ** Parameters: 3895c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3896c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3897c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3898c2aa98e2SPeter Wemm ** functions. 3899c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3900c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3901c2aa98e2SPeter Wemm ** 3902c2aa98e2SPeter Wemm ** Returns: 3903c2aa98e2SPeter Wemm ** The mapping, if found. 3904c2aa98e2SPeter Wemm ** NULL if no mapping found. 3905c2aa98e2SPeter Wemm ** 3906c2aa98e2SPeter Wemm ** Side Effects: 3907c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3908c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3909c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3910c2aa98e2SPeter Wemm ** status only to be returned). 3911c2aa98e2SPeter Wemm */ 3912c2aa98e2SPeter Wemm 3913c2aa98e2SPeter Wemm char * 3914c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3915c2aa98e2SPeter Wemm MAP *map; 3916c2aa98e2SPeter Wemm char *name; 3917c2aa98e2SPeter Wemm char **av; 3918c2aa98e2SPeter Wemm int *statp; 3919c2aa98e2SPeter Wemm { 3920c2aa98e2SPeter Wemm register struct hostent *hp; 392106f25ae9SGregory Neil Shapiro #if NETINET 3922c2aa98e2SPeter Wemm struct in_addr in_addr; 392306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 392406f25ae9SGregory Neil Shapiro #if NETINET6 392506f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 392606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 392706f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3928c2aa98e2SPeter Wemm register STAB *s; 392940266059SGregory Neil Shapiro time_t now; 393040266059SGregory Neil Shapiro #if NAMED_BIND 393140266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 393240266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 393340266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3934c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3935c2aa98e2SPeter Wemm 3936c2aa98e2SPeter Wemm /* 3937c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 393840266059SGregory Neil Shapiro ** return it (unless expired). 3939c2aa98e2SPeter Wemm */ 3940c2aa98e2SPeter Wemm 394140266059SGregory Neil Shapiro now = curtime(); 3942c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 394340266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 394440266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3945c2aa98e2SPeter Wemm { 3946c2aa98e2SPeter Wemm if (tTd(9, 1)) 394740266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3948c2aa98e2SPeter Wemm name, 3949c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3950c2aa98e2SPeter Wemm ? "NULL" 3951c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3952c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3953602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3954c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3955c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3956c2aa98e2SPeter Wemm { 3957c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3958c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3959c2aa98e2SPeter Wemm shortenstring(name, 33)); 3960c2aa98e2SPeter Wemm } 3961c2aa98e2SPeter Wemm if (*statp != EX_OK) 3962c2aa98e2SPeter Wemm return NULL; 3963c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3964c2aa98e2SPeter Wemm { 3965c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno=%d, h_errno=%d", 3966c2aa98e2SPeter Wemm name, 3967c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3968c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3969c2aa98e2SPeter Wemm return NULL; 3970c2aa98e2SPeter Wemm } 3971c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3972c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3973c2aa98e2SPeter Wemm else 3974c2aa98e2SPeter Wemm cp = map_rewrite(map, 3975c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3976c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3977c2aa98e2SPeter Wemm av); 3978c2aa98e2SPeter Wemm return cp; 3979c2aa98e2SPeter Wemm } 3980c2aa98e2SPeter Wemm 3981c2aa98e2SPeter Wemm /* 3982c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3983c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3984c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3985c2aa98e2SPeter Wemm */ 3986c2aa98e2SPeter Wemm 398706f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 398806f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3989c2aa98e2SPeter Wemm { 3990c2aa98e2SPeter Wemm if (tTd(9, 1)) 399140266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3992c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3993c2aa98e2SPeter Wemm return NULL; 3994c2aa98e2SPeter Wemm } 3995c2aa98e2SPeter Wemm 3996c2aa98e2SPeter Wemm /* 3997c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3998c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3999c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 4000c2aa98e2SPeter Wemm ** unknown. 4001c2aa98e2SPeter Wemm */ 4002c2aa98e2SPeter Wemm 400306f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 400440266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 400540266059SGregory Neil Shapiro #if NAMED_BIND 400640266059SGregory Neil Shapiro if (map->map_timeout > 0) 400740266059SGregory Neil Shapiro { 400840266059SGregory Neil Shapiro retrans = _res.retrans; 400940266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 401040266059SGregory Neil Shapiro } 401140266059SGregory Neil Shapiro if (map->map_retry > 0) 401240266059SGregory Neil Shapiro { 401340266059SGregory Neil Shapiro retry = _res.retry; 401440266059SGregory Neil Shapiro _res.retry = map->map_retry; 401540266059SGregory Neil Shapiro } 401640266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 401740266059SGregory Neil Shapiro 401840266059SGregory Neil Shapiro /* set default TTL */ 401940266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 4020c2aa98e2SPeter Wemm if (*name != '[') 4021c2aa98e2SPeter Wemm { 402240266059SGregory Neil Shapiro int ttl; 402340266059SGregory Neil Shapiro 4024d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof(hbuf)); 4025d0cef73dSGregory Neil Shapiro if (getcanonname(hbuf, sizeof(hbuf) - 1, !HasWildcardMX, &ttl)) 402640266059SGregory Neil Shapiro { 402706f25ae9SGregory Neil Shapiro ans = hbuf; 402840266059SGregory Neil Shapiro if (ttl > 0) 402940266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 403040266059SGregory Neil Shapiro SM_DEFAULT_TTL); 403140266059SGregory Neil Shapiro } 4032c2aa98e2SPeter Wemm } 4033c2aa98e2SPeter Wemm else 4034c2aa98e2SPeter Wemm { 403506f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 4036193538b7SGregory Neil Shapiro { 4037193538b7SGregory Neil Shapiro if (tTd(9, 1)) 403840266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 403906f25ae9SGregory Neil Shapiro return NULL; 4040193538b7SGregory Neil Shapiro } 404106f25ae9SGregory Neil Shapiro *cp = '\0'; 404206f25ae9SGregory Neil Shapiro 404306f25ae9SGregory Neil Shapiro hp = NULL; 404406f25ae9SGregory Neil Shapiro #if NETINET 404506f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 404606f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 404706f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 404806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 404906f25ae9SGregory Neil Shapiro #if NETINET6 405006f25ae9SGregory Neil Shapiro if (hp == NULL && 405140266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 405206f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 405306f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 405406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 405506f25ae9SGregory Neil Shapiro *cp = ']'; 405606f25ae9SGregory Neil Shapiro 405706f25ae9SGregory Neil Shapiro if (hp != NULL) 405806f25ae9SGregory Neil Shapiro { 405906f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 406040266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 406140266059SGregory Neil Shapiro #if NETINET6 406240266059SGregory Neil Shapiro if (ans == hp->h_name) 406340266059SGregory Neil Shapiro { 406440266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 406540266059SGregory Neil Shapiro 406640266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 4067d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof(n)); 406840266059SGregory Neil Shapiro ans = n; 406940266059SGregory Neil Shapiro } 4070193538b7SGregory Neil Shapiro freehostent(hp); 4071193538b7SGregory Neil Shapiro hp = NULL; 407240266059SGregory Neil Shapiro #endif /* NETINET6 */ 407306f25ae9SGregory Neil Shapiro } 407406f25ae9SGregory Neil Shapiro } 407540266059SGregory Neil Shapiro #if NAMED_BIND 407640266059SGregory Neil Shapiro if (map->map_timeout > 0) 407740266059SGregory Neil Shapiro _res.retrans = retrans; 407840266059SGregory Neil Shapiro if (map->map_retry > 0) 407940266059SGregory Neil Shapiro _res.retry = retry; 408040266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 408106f25ae9SGregory Neil Shapiro 408206f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 408306f25ae9SGregory Neil Shapiro 408406f25ae9SGregory Neil Shapiro /* Found an answer */ 408506f25ae9SGregory Neil Shapiro if (ans != NULL) 408606f25ae9SGregory Neil Shapiro { 408706f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 408840266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 408940266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 409040266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 409106f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 409206f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 409306f25ae9SGregory Neil Shapiro else 409406f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 4095193538b7SGregory Neil Shapiro if (tTd(9, 1)) 409640266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 409706f25ae9SGregory Neil Shapiro return cp; 409806f25ae9SGregory Neil Shapiro } 409906f25ae9SGregory Neil Shapiro 410006f25ae9SGregory Neil Shapiro 410106f25ae9SGregory Neil Shapiro /* No match found */ 4102c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 4103c2aa98e2SPeter Wemm #if NAMED_BIND 4104c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 4105c2aa98e2SPeter Wemm if (tTd(9, 1)) 410640266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 4107c2aa98e2SPeter Wemm switch (h_errno) 4108c2aa98e2SPeter Wemm { 4109c2aa98e2SPeter Wemm case TRY_AGAIN: 4110c2aa98e2SPeter Wemm if (UseNameServer) 4111c2aa98e2SPeter Wemm { 4112c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 4113c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 4114c2aa98e2SPeter Wemm shortenstring(name, 33)); 4115c2aa98e2SPeter Wemm } 4116c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 4117c2aa98e2SPeter Wemm break; 4118c2aa98e2SPeter Wemm 4119c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 4120c2aa98e2SPeter Wemm case NO_DATA: 4121c2aa98e2SPeter Wemm *statp = EX_NOHOST; 4122c2aa98e2SPeter Wemm break; 4123c2aa98e2SPeter Wemm 4124c2aa98e2SPeter Wemm case NO_RECOVERY: 4125c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 4126c2aa98e2SPeter Wemm break; 4127c2aa98e2SPeter Wemm 4128c2aa98e2SPeter Wemm default: 4129c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 4130c2aa98e2SPeter Wemm break; 4131c2aa98e2SPeter Wemm } 413206f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 4133c2aa98e2SPeter Wemm if (tTd(9, 1)) 413440266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 4135c2aa98e2SPeter Wemm *statp = EX_NOHOST; 413606f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 4137c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 4138c2aa98e2SPeter Wemm return NULL; 4139c2aa98e2SPeter Wemm } 4140c2aa98e2SPeter Wemm /* 4141c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 414240266059SGregory Neil Shapiro ** 414340266059SGregory Neil Shapiro ** Parameters: 414440266059SGregory Neil Shapiro ** map -- a pointer to this map. 414540266059SGregory Neil Shapiro ** args -- argument string. 414640266059SGregory Neil Shapiro ** 414740266059SGregory Neil Shapiro ** Returns: 414840266059SGregory Neil Shapiro ** true. 4149c2aa98e2SPeter Wemm */ 4150c2aa98e2SPeter Wemm 4151c2aa98e2SPeter Wemm bool 4152c2aa98e2SPeter Wemm host_map_init(map, args) 4153c2aa98e2SPeter Wemm MAP *map; 4154c2aa98e2SPeter Wemm char *args; 4155c2aa98e2SPeter Wemm { 4156c2aa98e2SPeter Wemm register char *p = args; 4157c2aa98e2SPeter Wemm 4158c2aa98e2SPeter Wemm for (;;) 4159c2aa98e2SPeter Wemm { 4160c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 4161c2aa98e2SPeter Wemm p++; 4162c2aa98e2SPeter Wemm if (*p != '-') 4163c2aa98e2SPeter Wemm break; 4164c2aa98e2SPeter Wemm switch (*++p) 4165c2aa98e2SPeter Wemm { 4166c2aa98e2SPeter Wemm case 'a': 4167c2aa98e2SPeter Wemm map->map_app = ++p; 4168c2aa98e2SPeter Wemm break; 4169c2aa98e2SPeter Wemm 4170c2aa98e2SPeter Wemm case 'T': 4171c2aa98e2SPeter Wemm map->map_tapp = ++p; 4172c2aa98e2SPeter Wemm break; 4173c2aa98e2SPeter Wemm 4174c2aa98e2SPeter Wemm case 'm': 4175c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 4176c2aa98e2SPeter Wemm break; 4177c2aa98e2SPeter Wemm 4178c2aa98e2SPeter Wemm case 't': 4179c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 4180c2aa98e2SPeter Wemm break; 418106f25ae9SGregory Neil Shapiro 418206f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 418306f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 418406f25ae9SGregory Neil Shapiro break; 418506f25ae9SGregory Neil Shapiro 418606f25ae9SGregory Neil Shapiro case 'D': 418706f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 418806f25ae9SGregory Neil Shapiro break; 418940266059SGregory Neil Shapiro 419040266059SGregory Neil Shapiro case 'd': 419140266059SGregory Neil Shapiro { 419240266059SGregory Neil Shapiro char *h; 419340266059SGregory Neil Shapiro 419440266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 419540266059SGregory Neil Shapiro continue; 419640266059SGregory Neil Shapiro h = strchr(p, ' '); 419740266059SGregory Neil Shapiro if (h != NULL) 419840266059SGregory Neil Shapiro *h = '\0'; 419940266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 420040266059SGregory Neil Shapiro if (h != NULL) 420140266059SGregory Neil Shapiro *h = ' '; 420240266059SGregory Neil Shapiro } 420340266059SGregory Neil Shapiro break; 420440266059SGregory Neil Shapiro 420540266059SGregory Neil Shapiro case 'r': 420640266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 420740266059SGregory Neil Shapiro continue; 420840266059SGregory Neil Shapiro map->map_retry = atoi(p); 420940266059SGregory Neil Shapiro break; 4210c2aa98e2SPeter Wemm } 4211c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4212c2aa98e2SPeter Wemm p++; 4213c2aa98e2SPeter Wemm if (*p != '\0') 4214c2aa98e2SPeter Wemm *p++ = '\0'; 4215c2aa98e2SPeter Wemm } 4216c2aa98e2SPeter Wemm if (map->map_app != NULL) 4217c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4218c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4219c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 422040266059SGregory Neil Shapiro return true; 4221c2aa98e2SPeter Wemm } 422240266059SGregory Neil Shapiro 422306f25ae9SGregory Neil Shapiro #if NETINET6 422406f25ae9SGregory Neil Shapiro /* 422506f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 422606f25ae9SGregory Neil Shapiro ** 422706f25ae9SGregory Neil Shapiro ** Parameters: 422806f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 422906f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 423006f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 423106f25ae9SGregory Neil Shapiro ** 423206f25ae9SGregory Neil Shapiro ** Returns: 423306f25ae9SGregory Neil Shapiro ** A printable version of that structure. 423406f25ae9SGregory Neil Shapiro */ 423540266059SGregory Neil Shapiro 423606f25ae9SGregory Neil Shapiro char * 423706f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 423806f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 423906f25ae9SGregory Neil Shapiro char *dst; 424006f25ae9SGregory Neil Shapiro size_t dst_len; 424106f25ae9SGregory Neil Shapiro { 424206f25ae9SGregory Neil Shapiro register char *ap; 424306f25ae9SGregory Neil Shapiro 424406f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 424506f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 424606f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 424706f25ae9SGregory Neil Shapiro dst, dst_len); 424806f25ae9SGregory Neil Shapiro else 424940266059SGregory Neil Shapiro { 425040266059SGregory Neil Shapiro char *d; 425140266059SGregory Neil Shapiro size_t sz; 425240266059SGregory Neil Shapiro 425340266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 425440266059SGregory Neil Shapiro d = dst; 425540266059SGregory Neil Shapiro 425640266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 425740266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 425840266059SGregory Neil Shapiro if (sz >= dst_len) 425940266059SGregory Neil Shapiro return NULL; 426040266059SGregory Neil Shapiro dst += sz; 426140266059SGregory Neil Shapiro dst_len -= sz; 4262*5dd76dd0SGregory Neil Shapiro # if _FFR_IPV6_FULL 4263*5dd76dd0SGregory Neil Shapiro ap = sm_inet6_ntop(s6a, dst, dst_len); 4264*5dd76dd0SGregory Neil Shapiro # else /* _FFR_IPV6_FULL */ 426506f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 4266*5dd76dd0SGregory Neil Shapiro # endif /* _FFR_IPV6_FULL */ 426740266059SGregory Neil Shapiro 426840266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 426940266059SGregory Neil Shapiro if (ap != NULL) 427040266059SGregory Neil Shapiro ap = d; 427140266059SGregory Neil Shapiro } 427206f25ae9SGregory Neil Shapiro return ap; 427306f25ae9SGregory Neil Shapiro } 427440266059SGregory Neil Shapiro 427540266059SGregory Neil Shapiro /* 427640266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 427740266059SGregory Neil Shapiro ** 427840266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 427940266059SGregory Neil Shapiro ** 428040266059SGregory Neil Shapiro ** Parameters: 428140266059SGregory Neil Shapiro ** family -- address family 428240266059SGregory Neil Shapiro ** src -- string 428340266059SGregory Neil Shapiro ** dst -- destination address structure 428440266059SGregory Neil Shapiro ** 428540266059SGregory Neil Shapiro ** Returns: 428640266059SGregory Neil Shapiro ** 1 if the address was valid 428740266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 428840266059SGregory Neil Shapiro ** -1 if error 428940266059SGregory Neil Shapiro */ 429040266059SGregory Neil Shapiro 429140266059SGregory Neil Shapiro int 429240266059SGregory Neil Shapiro anynet_pton(family, src, dst) 429340266059SGregory Neil Shapiro int family; 429440266059SGregory Neil Shapiro const char *src; 429540266059SGregory Neil Shapiro void *dst; 429640266059SGregory Neil Shapiro { 429740266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 429840266059SGregory Neil Shapiro src += 5; 429940266059SGregory Neil Shapiro return inet_pton(family, src, dst); 430040266059SGregory Neil Shapiro } 430106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 430240266059SGregory Neil Shapiro /* 4303c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4304c2aa98e2SPeter Wemm ** 4305c2aa98e2SPeter Wemm ** Parameters: 4306c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4307c2aa98e2SPeter Wemm ** 4308c2aa98e2SPeter Wemm ** Returns: 4309c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4310c2aa98e2SPeter Wemm */ 4311c2aa98e2SPeter Wemm 4312c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4313c2aa98e2SPeter Wemm 4314c2aa98e2SPeter Wemm # if NETLINK 4315c2aa98e2SPeter Wemm # include <net/if_dl.h> 431606f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4317c2aa98e2SPeter Wemm 4318c2aa98e2SPeter Wemm char * 4319c2aa98e2SPeter Wemm anynet_ntoa(sap) 4320c2aa98e2SPeter Wemm register SOCKADDR *sap; 4321c2aa98e2SPeter Wemm { 4322c2aa98e2SPeter Wemm register char *bp; 4323c2aa98e2SPeter Wemm register char *ap; 4324c2aa98e2SPeter Wemm int l; 4325c2aa98e2SPeter Wemm static char buf[100]; 4326c2aa98e2SPeter Wemm 4327c2aa98e2SPeter Wemm /* check for null/zero family */ 4328c2aa98e2SPeter Wemm if (sap == NULL) 4329c2aa98e2SPeter Wemm return "NULLADDR"; 4330c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4331c2aa98e2SPeter Wemm return "0"; 4332c2aa98e2SPeter Wemm 4333c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4334c2aa98e2SPeter Wemm { 4335c2aa98e2SPeter Wemm # if NETUNIX 4336c2aa98e2SPeter Wemm case AF_UNIX: 4337c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 4338d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[UNIX: %.64s]", 4339c2aa98e2SPeter Wemm sap->sunix.sun_path); 4340c2aa98e2SPeter Wemm else 4341d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof(buf)); 4342c2aa98e2SPeter Wemm return buf; 434306f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4344c2aa98e2SPeter Wemm 4345c2aa98e2SPeter Wemm # if NETINET 4346c2aa98e2SPeter Wemm case AF_INET: 434706f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 434806f25ae9SGregory Neil Shapiro # endif /* NETINET */ 434906f25ae9SGregory Neil Shapiro 435006f25ae9SGregory Neil Shapiro # if NETINET6 435106f25ae9SGregory Neil Shapiro case AF_INET6: 4352d0cef73dSGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof(buf)); 435306f25ae9SGregory Neil Shapiro if (ap != NULL) 435406f25ae9SGregory Neil Shapiro return ap; 435506f25ae9SGregory Neil Shapiro break; 435606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4357c2aa98e2SPeter Wemm 4358c2aa98e2SPeter Wemm # if NETLINK 4359c2aa98e2SPeter Wemm case AF_LINK: 4360d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[LINK: %s]", 4361c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4362c2aa98e2SPeter Wemm return buf; 436306f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4364c2aa98e2SPeter Wemm default: 4365c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4366c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4367c2aa98e2SPeter Wemm break; 4368c2aa98e2SPeter Wemm } 4369c2aa98e2SPeter Wemm 4370c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 4371d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "Family %d: ", sap->sa.sa_family); 4372c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4373c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4374d0cef73dSGregory Neil Shapiro for (l = sizeof(sap->sa.sa_data); --l >= 0; ) 4375c2aa98e2SPeter Wemm { 437640266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 437740266059SGregory Neil Shapiro *ap++ & 0377); 4378c2aa98e2SPeter Wemm bp += 3; 4379c2aa98e2SPeter Wemm } 4380c2aa98e2SPeter Wemm *--bp = '\0'; 4381c2aa98e2SPeter Wemm return buf; 4382c2aa98e2SPeter Wemm } 438340266059SGregory Neil Shapiro /* 4384c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4385c2aa98e2SPeter Wemm ** 4386c2aa98e2SPeter Wemm ** Parameters: 4387c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4388c2aa98e2SPeter Wemm ** 4389c2aa98e2SPeter Wemm ** Returns: 4390c2aa98e2SPeter Wemm ** text representation of host name. 4391c2aa98e2SPeter Wemm ** 4392c2aa98e2SPeter Wemm ** Side Effects: 4393c2aa98e2SPeter Wemm ** none. 4394c2aa98e2SPeter Wemm */ 4395c2aa98e2SPeter Wemm 4396c2aa98e2SPeter Wemm char * 4397c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4398c2aa98e2SPeter Wemm register SOCKADDR *sap; 4399c2aa98e2SPeter Wemm { 4400c2aa98e2SPeter Wemm register struct hostent *hp; 440106f25ae9SGregory Neil Shapiro # if NAMED_BIND 4402c2aa98e2SPeter Wemm int saveretry; 440306f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 440406f25ae9SGregory Neil Shapiro # if NETINET6 440506f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 440606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4407c2aa98e2SPeter Wemm 4408c2aa98e2SPeter Wemm # if NAMED_BIND 4409c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4410c2aa98e2SPeter Wemm saveretry = _res.retry; 441106f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 441206f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4413ba00ec3dSGregory Neil Shapiro if (_res.retry == 0) 4414ba00ec3dSGregory Neil Shapiro _res.retry = 1; 4415c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4416c2aa98e2SPeter Wemm 4417c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4418c2aa98e2SPeter Wemm { 4419c2aa98e2SPeter Wemm # if NETINET 4420c2aa98e2SPeter Wemm case AF_INET: 4421c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 442240266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4423c2aa98e2SPeter Wemm break; 442406f25ae9SGregory Neil Shapiro # endif /* NETINET */ 442506f25ae9SGregory Neil Shapiro 442606f25ae9SGregory Neil Shapiro # if NETINET6 442706f25ae9SGregory Neil Shapiro case AF_INET6: 442806f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 442940266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 443006f25ae9SGregory Neil Shapiro break; 443106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4432c2aa98e2SPeter Wemm 4433c2aa98e2SPeter Wemm # if NETISO 4434c2aa98e2SPeter Wemm case AF_ISO: 4435c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 4436d0cef73dSGregory Neil Shapiro sizeof(sap->siso.siso_addr), AF_ISO); 4437c2aa98e2SPeter Wemm break; 443806f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4439c2aa98e2SPeter Wemm 4440c2aa98e2SPeter Wemm # if NETUNIX 4441c2aa98e2SPeter Wemm case AF_UNIX: 4442c2aa98e2SPeter Wemm hp = NULL; 4443c2aa98e2SPeter Wemm break; 444406f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4445c2aa98e2SPeter Wemm 4446c2aa98e2SPeter Wemm default: 4447d0cef73dSGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof(sap->sa.sa_data), 4448c2aa98e2SPeter Wemm sap->sa.sa_family); 4449c2aa98e2SPeter Wemm break; 4450c2aa98e2SPeter Wemm } 4451c2aa98e2SPeter Wemm 4452c2aa98e2SPeter Wemm # if NAMED_BIND 4453c2aa98e2SPeter Wemm _res.retry = saveretry; 4454c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4455c2aa98e2SPeter Wemm 445606f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 445706f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 445806f25ae9SGregory Neil Shapiro # if NETINET6 445906f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 446006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 446106f25ae9SGregory Neil Shapiro # if NETINET 446206f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 446306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 446406f25ae9SGregory Neil Shapiro ) 4465193538b7SGregory Neil Shapiro { 4466193538b7SGregory Neil Shapiro char *name; 4467193538b7SGregory Neil Shapiro 446840266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 446940266059SGregory Neil Shapiro # if NETINET6 4470193538b7SGregory Neil Shapiro if (name == hp->h_name) 4471193538b7SGregory Neil Shapiro { 4472193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4473193538b7SGregory Neil Shapiro 4474193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 4475d0cef73dSGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof(n)); 4476193538b7SGregory Neil Shapiro name = n; 4477193538b7SGregory Neil Shapiro } 4478193538b7SGregory Neil Shapiro freehostent(hp); 447940266059SGregory Neil Shapiro # endif /* NETINET6 */ 4480193538b7SGregory Neil Shapiro return name; 4481193538b7SGregory Neil Shapiro } 448206f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4483193538b7SGregory Neil Shapiro 448440266059SGregory Neil Shapiro # if NETINET6 4485193538b7SGregory Neil Shapiro if (hp != NULL) 4486193538b7SGregory Neil Shapiro { 4487193538b7SGregory Neil Shapiro freehostent(hp); 4488193538b7SGregory Neil Shapiro hp = NULL; 4489193538b7SGregory Neil Shapiro } 449040266059SGregory Neil Shapiro # endif /* NETINET6 */ 4491193538b7SGregory Neil Shapiro 4492c2aa98e2SPeter Wemm # if NETUNIX 449306f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4494c2aa98e2SPeter Wemm return "localhost"; 449506f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4496c2aa98e2SPeter Wemm { 4497c2aa98e2SPeter Wemm static char buf[203]; 4498c2aa98e2SPeter Wemm 4499d0cef73dSGregory Neil Shapiro (void) sm_snprintf(buf, sizeof(buf), "[%.200s]", 450040266059SGregory Neil Shapiro anynet_ntoa(sap)); 4501c2aa98e2SPeter Wemm return buf; 4502c2aa98e2SPeter Wemm } 4503c2aa98e2SPeter Wemm } 450406f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4505