1c2aa98e2SPeter Wemm /* 2605302a5SGregory Neil Shapiro * Copyright (c) 1998-2002 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 1694c01205SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.612 2002/05/02 19:40:52 ca Exp $") 17c2aa98e2SPeter Wemm 18c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 19c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2006f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 21c2aa98e2SPeter Wemm 2240266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 24c2aa98e2SPeter Wemm # include <arpa/inet.h> 2506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 26c2aa98e2SPeter Wemm # if NAMED_BIND 27c2aa98e2SPeter Wemm # ifndef NO_DATA 28c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 2906f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3140266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 32c2aa98e2SPeter Wemm 3342e5d165SGregory Neil Shapiro #if STARTTLS 3442e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3542e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3642e5d165SGregory Neil Shapiro 37c2aa98e2SPeter Wemm #include <sys/time.h> 38c2aa98e2SPeter Wemm 3906f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 40c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 41c2aa98e2SPeter Wemm # include <netinet/ip.h> 4206f25ae9SGregory Neil Shapiro # if HAS_IN_H 4306f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4406f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4506f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4606f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4806f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 4906f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 50c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5106f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5206f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5306f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5406f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5506f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5606f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5806f25ae9SGregory Neil Shapiro 5940266059SGregory Neil Shapiro #include <sm/fdset.h> 6040266059SGregory Neil Shapiro 6140266059SGregory Neil Shapiro /* structure to describe a daemon or a client */ 6206f25ae9SGregory Neil Shapiro struct daemon 6306f25ae9SGregory Neil Shapiro { 6406f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 6506f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 6640266059SGregory Neil Shapiro unsigned short d_port; /* port number */ 6706f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 6806f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 6906f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7006f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7106f25ae9SGregory Neil Shapiro bool d_firsttime; 7206f25ae9SGregory Neil Shapiro int d_socksize; 7306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 7406f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 7506f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 7640266059SGregory Neil Shapiro #if MILTER 7740266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 7840266059SGregory Neil Shapiro char *d_inputfilterlist; 7940266059SGregory Neil Shapiro struct milter *d_inputfilters[MAXFILTERS]; 8040266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 8140266059SGregory Neil Shapiro #endif /* MILTER */ 8206f25ae9SGregory Neil Shapiro }; 8306f25ae9SGregory Neil Shapiro 8406f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8506f25ae9SGregory Neil Shapiro 8606f25ae9SGregory Neil Shapiro static void connecttimeout __P((void)); 8740266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 8840266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 8940266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 90c2aa98e2SPeter Wemm 91c2aa98e2SPeter Wemm /* 92c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 93c2aa98e2SPeter Wemm ** 94c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 95c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 96c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 97c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 98c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 99c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 100c2aa98e2SPeter Wemm ** 101c2aa98e2SPeter Wemm ** getrequests(e) 102c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 103c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 104c2aa98e2SPeter Wemm ** OutChannel appropriately. 105c2aa98e2SPeter Wemm ** clrdaemon() 106c2aa98e2SPeter Wemm ** Close any open files associated with getting 107c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 108c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 109c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 110c2aa98e2SPeter Wemm ** code (if it cares). 11140266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 112c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 11340266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 11440266059SGregory Neil Shapiro ** describing the error. 115c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 116c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 117c2aa98e2SPeter Wemm */ 11806f25ae9SGregory Neil Shapiro 11906f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 12040266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 12106f25ae9SGregory Neil Shapiro 12240266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 12306f25ae9SGregory Neil Shapiro 12440266059SGregory Neil Shapiro /* 125c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 126c2aa98e2SPeter Wemm ** 127c2aa98e2SPeter Wemm ** Parameters: 128c2aa98e2SPeter Wemm ** e -- the current envelope. 129c2aa98e2SPeter Wemm ** 130c2aa98e2SPeter Wemm ** Returns: 13106f25ae9SGregory Neil Shapiro ** pointer to flags. 132c2aa98e2SPeter Wemm ** 133c2aa98e2SPeter Wemm ** Side Effects: 134c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 135c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 136c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 137c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 138c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 139c2aa98e2SPeter Wemm ** to the communication channel. 14040266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 14140266059SGregory Neil Shapiro ** for some reason. 142c2aa98e2SPeter Wemm */ 143c2aa98e2SPeter Wemm 14406f25ae9SGregory Neil Shapiro BITMAP256 * 145c2aa98e2SPeter Wemm getrequests(e) 146c2aa98e2SPeter Wemm ENVELOPE *e; 147c2aa98e2SPeter Wemm { 148c2aa98e2SPeter Wemm int t; 14906f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15006f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 151c2aa98e2SPeter Wemm #if XDEBUG 152c2aa98e2SPeter Wemm bool j_has_dot; 15306f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 154065a643dSPeter Wemm char status[MAXLINE]; 15506f25ae9SGregory Neil Shapiro SOCKADDR sa; 15606f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 157605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 158605302a5SGregory Neil Shapiro time_t lastrun; 159605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 16006f25ae9SGregory Neil Shapiro # if NETUNIX 161065a643dSPeter Wemm extern int ControlSocket; 16206f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 16306f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 16440266059SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int, bool)); 165c2aa98e2SPeter Wemm 16606f25ae9SGregory Neil Shapiro 16740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 168c2aa98e2SPeter Wemm { 16906f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 17040266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 17106f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 172c2aa98e2SPeter Wemm } 173193538b7SGregory Neil Shapiro 174c2aa98e2SPeter Wemm /* 175c2aa98e2SPeter Wemm ** Try to actually open the connection. 176c2aa98e2SPeter Wemm */ 177c2aa98e2SPeter Wemm 178c2aa98e2SPeter Wemm if (tTd(15, 1)) 17906f25ae9SGregory Neil Shapiro { 18040266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 181193538b7SGregory Neil Shapiro { 18240266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 18306f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 18406f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 18506f25ae9SGregory Neil Shapiro } 186193538b7SGregory Neil Shapiro } 187c2aa98e2SPeter Wemm 188c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 18940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 19040266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 191c2aa98e2SPeter Wemm 192065a643dSPeter Wemm if (opencontrolsocket() < 0) 193065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1942e43090eSPeter Wemm "daemon could not open control socket %s: %s", 19540266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 196065a643dSPeter Wemm 19740266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 19840266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 1998774250cSGregory Neil Shapiro 20040266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 20106f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 202c2aa98e2SPeter Wemm 203c2aa98e2SPeter Wemm #if XDEBUG 204c2aa98e2SPeter Wemm { 205c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 206c2aa98e2SPeter Wemm 207c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 208c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 209c2aa98e2SPeter Wemm } 21006f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 211c2aa98e2SPeter Wemm 212065a643dSPeter Wemm /* Add parent process as first item */ 21340266059SGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1); 214065a643dSPeter Wemm 215c2aa98e2SPeter Wemm if (tTd(15, 1)) 21606f25ae9SGregory Neil Shapiro { 21740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 21840266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: %d\n", 21906f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 22006f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 22106f25ae9SGregory Neil Shapiro } 222c2aa98e2SPeter Wemm 223c2aa98e2SPeter Wemm for (;;) 224c2aa98e2SPeter Wemm { 225c2aa98e2SPeter Wemm register pid_t pid; 226c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 22740266059SGregory Neil Shapiro bool timedout = false; 22840266059SGregory Neil Shapiro bool control = false; 22906f25ae9SGregory Neil Shapiro int save_errno; 230c2aa98e2SPeter Wemm int pipefd[2]; 23140266059SGregory Neil Shapiro time_t now; 23242e5d165SGregory Neil Shapiro #if STARTTLS 23342e5d165SGregory Neil Shapiro long seed; 23442e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 235c2aa98e2SPeter Wemm 236c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 23740266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 23806f25ae9SGregory Neil Shapiro 2398774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 2408774250cSGregory Neil Shapiro shutdown_daemon(); 2418774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 2428774250cSGregory Neil Shapiro restart_daemon(); 24340266059SGregory Neil Shapiro else if (RestartWorkGroup) 24440266059SGregory Neil Shapiro restart_marked_work_groups(); 2458774250cSGregory Neil Shapiro 24640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 24740266059SGregory Neil Shapiro { 248193538b7SGregory Neil Shapiro /* 24940266059SGregory Neil Shapiro ** XXX do this call outside the loop? 25040266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 251193538b7SGregory Neil Shapiro */ 252193538b7SGregory Neil Shapiro 25340266059SGregory Neil Shapiro now = curtime(); 25440266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 25506f25ae9SGregory Neil Shapiro continue; 25640266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 25740266059SGregory Neil Shapiro continue; 25840266059SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx, 25940266059SGregory Neil Shapiro curdaemon == idx)) 260c2aa98e2SPeter Wemm { 26106f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 262c2aa98e2SPeter Wemm { 263065a643dSPeter Wemm /* close socket so peer fails quickly */ 26406f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 26506f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 266c2aa98e2SPeter Wemm } 267c2aa98e2SPeter Wemm 268065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 26940266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 270065a643dSPeter Wemm } 27106f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 27206f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 273c2aa98e2SPeter Wemm { 27440266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 27506f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 27606f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 27706f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 27806f25ae9SGregory Neil Shapiro 279065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 28040266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 28140266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 282065a643dSPeter Wemm } 283c2aa98e2SPeter Wemm } 284c2aa98e2SPeter Wemm 2858774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 2868774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 2878774250cSGregory Neil Shapiro shutdown_daemon(); 2888774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 2898774250cSGregory Neil Shapiro restart_daemon(); 29040266059SGregory Neil Shapiro else if (RestartWorkGroup) 29140266059SGregory Neil Shapiro restart_marked_work_groups(); 2928774250cSGregory Neil Shapiro 29340266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 29406f25ae9SGregory Neil Shapiro 295c2aa98e2SPeter Wemm #if XDEBUG 296c2aa98e2SPeter Wemm /* check for disaster */ 297c2aa98e2SPeter Wemm { 298c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 299c2aa98e2SPeter Wemm 300c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 301c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 302c2aa98e2SPeter Wemm { 303c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 304c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 305c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 306c2aa98e2SPeter Wemm abort(); 307c2aa98e2SPeter Wemm } 308c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 309c2aa98e2SPeter Wemm { 310c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 311c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 312c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 313c2aa98e2SPeter Wemm abort(); 314c2aa98e2SPeter Wemm } 315c2aa98e2SPeter Wemm } 31606f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 317c2aa98e2SPeter Wemm 318c2aa98e2SPeter Wemm #if 0 319c2aa98e2SPeter Wemm /* 320c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 321c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 322c2aa98e2SPeter Wemm ** so is it worth doing this? 323c2aa98e2SPeter Wemm */ 324c2aa98e2SPeter Wemm 325065a643dSPeter Wemm if (DaemonSocket >= 0 && 32640266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 327c2aa98e2SPeter Wemm log an error here; 32806f25ae9SGregory Neil Shapiro #endif /* 0 */ 32940266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 33006f25ae9SGregory Neil Shapiro 331c2aa98e2SPeter Wemm for (;;) 332c2aa98e2SPeter Wemm { 33340266059SGregory Neil Shapiro bool setproc = false; 334065a643dSPeter Wemm int highest = -1; 335c2aa98e2SPeter Wemm fd_set readfds; 336c2aa98e2SPeter Wemm struct timeval timeout; 337c2aa98e2SPeter Wemm 3388774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 3398774250cSGregory Neil Shapiro shutdown_daemon(); 3408774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 3418774250cSGregory Neil Shapiro restart_daemon(); 34240266059SGregory Neil Shapiro else if (RestartWorkGroup) 34340266059SGregory Neil Shapiro restart_marked_work_groups(); 3448774250cSGregory Neil Shapiro 345c2aa98e2SPeter Wemm FD_ZERO(&readfds); 346065a643dSPeter Wemm 34740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 348065a643dSPeter Wemm { 34906f25ae9SGregory Neil Shapiro /* wait for a connection */ 35006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 35106f25ae9SGregory Neil Shapiro { 352193538b7SGregory Neil Shapiro if (!setproc && 353193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 354193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 35506f25ae9SGregory Neil Shapiro { 35640266059SGregory Neil Shapiro sm_setproctitle(true, e, 35706f25ae9SGregory Neil Shapiro "accepting connections"); 35840266059SGregory Neil Shapiro setproc = true; 359065a643dSPeter Wemm } 36006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 36106f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 36240266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 36340266059SGregory Neil Shapiro &readfds); 36406f25ae9SGregory Neil Shapiro } 36506f25ae9SGregory Neil Shapiro } 36606f25ae9SGregory Neil Shapiro 36706f25ae9SGregory Neil Shapiro #if NETUNIX 368065a643dSPeter Wemm if (ControlSocket >= 0) 369065a643dSPeter Wemm { 370065a643dSPeter Wemm if (ControlSocket > highest) 371065a643dSPeter Wemm highest = ControlSocket; 37240266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 373065a643dSPeter Wemm } 37406f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 37506f25ae9SGregory Neil Shapiro 376065a643dSPeter Wemm timeout.tv_sec = 5; 377c2aa98e2SPeter Wemm timeout.tv_usec = 0; 378c2aa98e2SPeter Wemm 379065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 380c2aa98e2SPeter Wemm NULL, NULL, &timeout); 381065a643dSPeter Wemm 3828774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 3838774250cSGregory Neil Shapiro if (ShutdownRequest != NULL) 3848774250cSGregory Neil Shapiro shutdown_daemon(); 3858774250cSGregory Neil Shapiro else if (RestartRequest != NULL) 3868774250cSGregory Neil Shapiro restart_daemon(); 38740266059SGregory Neil Shapiro else if (RestartWorkGroup) 38840266059SGregory Neil Shapiro restart_marked_work_groups(); 3898774250cSGregory Neil Shapiro 390193538b7SGregory Neil Shapiro 391193538b7SGregory Neil Shapiro 392193538b7SGregory Neil Shapiro curdaemon = -1; 39340266059SGregory Neil Shapiro if (doqueuerun()) 394605302a5SGregory Neil Shapiro { 39540266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 396605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 397605302a5SGregory Neil Shapiro lastrun = now; 398605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 399605302a5SGregory Neil Shapiro } 400605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 401605302a5SGregory Neil Shapiro else if (QueueIntvl > 0 && 402605302a5SGregory Neil Shapiro lastrun + QueueIntvl + 60 < now) 403605302a5SGregory Neil Shapiro { 404605302a5SGregory Neil Shapiro 405605302a5SGregory Neil Shapiro /* 406605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 407605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 408605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 409605302a5SGregory Neil Shapiro ** result of the function call. 410605302a5SGregory Neil Shapiro */ 411605302a5SGregory Neil Shapiro 412605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 413605302a5SGregory Neil Shapiro lastrun = now; 414605302a5SGregory Neil Shapiro } 415605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 41640266059SGregory Neil Shapiro 417065a643dSPeter Wemm if (t <= 0) 418065a643dSPeter Wemm { 41940266059SGregory Neil Shapiro timedout = true; 420065a643dSPeter Wemm break; 421065a643dSPeter Wemm } 422c2aa98e2SPeter Wemm 42340266059SGregory Neil Shapiro control = false; 424c2aa98e2SPeter Wemm errno = 0; 42506f25ae9SGregory Neil Shapiro 42606f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 42740266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 42806f25ae9SGregory Neil Shapiro idx = 0; 42940266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 430065a643dSPeter Wemm { 43106f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 43240266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 43340266059SGregory Neil Shapiro &readfds)) 43406f25ae9SGregory Neil Shapiro { 43506f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 436602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 437602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 43806f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 439065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 440065a643dSPeter Wemm &lotherend); 441602a2b1bSGregory Neil Shapiro 442602a2b1bSGregory Neil Shapiro /* 443602a2b1bSGregory Neil Shapiro ** If remote side closes before 444602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 445602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 446602a2b1bSGregory Neil Shapiro */ 447602a2b1bSGregory Neil Shapiro 448602a2b1bSGregory Neil Shapiro if (t >= 0 && 449602a2b1bSGregory Neil Shapiro (lotherend == 0 || 450602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 451602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 452602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 453602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 454602a2b1bSGregory Neil Shapiro { 455602a2b1bSGregory Neil Shapiro (void) close(t); 456602a2b1bSGregory Neil Shapiro t = -1; 457602a2b1bSGregory Neil Shapiro errno = EINVAL; 458602a2b1bSGregory Neil Shapiro } 45906f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 46006f25ae9SGregory Neil Shapiro break; 461065a643dSPeter Wemm } 46240266059SGregory Neil Shapiro if (++idx >= NDaemons) 46306f25ae9SGregory Neil Shapiro idx = 0; 46406f25ae9SGregory Neil Shapiro } 46506f25ae9SGregory Neil Shapiro #if NETUNIX 46606f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 46740266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 468065a643dSPeter Wemm { 469065a643dSPeter Wemm struct sockaddr_un sa_un; 470065a643dSPeter Wemm 471065a643dSPeter Wemm lotherend = sizeof sa_un; 472602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 473065a643dSPeter Wemm t = accept(ControlSocket, 474065a643dSPeter Wemm (struct sockaddr *)&sa_un, 475065a643dSPeter Wemm &lotherend); 476602a2b1bSGregory Neil Shapiro 477602a2b1bSGregory Neil Shapiro /* 478602a2b1bSGregory Neil Shapiro ** If remote side closes before 479602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 480602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 481602a2b1bSGregory Neil Shapiro */ 482602a2b1bSGregory Neil Shapiro 483602a2b1bSGregory Neil Shapiro if (t >= 0 && 484602a2b1bSGregory Neil Shapiro (lotherend == 0 || 485602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 486602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 487602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 488602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 489602a2b1bSGregory Neil Shapiro { 490602a2b1bSGregory Neil Shapiro (void) close(t); 491602a2b1bSGregory Neil Shapiro t = -1; 492602a2b1bSGregory Neil Shapiro errno = EINVAL; 493602a2b1bSGregory Neil Shapiro } 494602a2b1bSGregory Neil Shapiro if (t >= 0) 49540266059SGregory Neil Shapiro control = true; 496065a643dSPeter Wemm } 497193538b7SGregory Neil Shapiro #else /* NETUNIX */ 498193538b7SGregory Neil Shapiro if (curdaemon == -1) 499193538b7SGregory Neil Shapiro { 500193538b7SGregory Neil Shapiro /* No daemon to service */ 501193538b7SGregory Neil Shapiro continue; 502193538b7SGregory Neil Shapiro } 50306f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 504c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 505c2aa98e2SPeter Wemm break; 506c2aa98e2SPeter Wemm } 507065a643dSPeter Wemm if (timedout) 508065a643dSPeter Wemm { 50940266059SGregory Neil Shapiro timedout = false; 510065a643dSPeter Wemm continue; 511065a643dSPeter Wemm } 51206f25ae9SGregory Neil Shapiro save_errno = errno; 51340266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 514c2aa98e2SPeter Wemm if (t < 0) 515c2aa98e2SPeter Wemm { 51606f25ae9SGregory Neil Shapiro errno = save_errno; 517c2aa98e2SPeter Wemm syserr("getrequests: accept"); 518c2aa98e2SPeter Wemm 519c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 52006f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 52106f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 52206f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 52306f25ae9SGregory Neil Shapiro /* 52406f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 52506f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 52606f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 52706f25ae9SGregory Neil Shapiro */ 52806f25ae9SGregory Neil Shapiro 52940266059SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = curtime() + 15; 53006f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 531c2aa98e2SPeter Wemm continue; 532c2aa98e2SPeter Wemm } 533c2aa98e2SPeter Wemm 53406f25ae9SGregory Neil Shapiro if (!control) 53506f25ae9SGregory Neil Shapiro { 53606f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 53706f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 53806f25ae9SGregory Neil Shapiro { 53906f25ae9SGregory Neil Shapiro case AF_UNSPEC: 54040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54140266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 54206f25ae9SGregory Neil Shapiro break; 54340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 54440266059SGregory Neil Shapiro # if NETUNIX 54540266059SGregory Neil Shapiro case AF_UNIX: 54640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54740266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 54840266059SGregory Neil Shapiro break; 54940266059SGregory Neil Shapiro # endif /* NETUNIX */ 55040266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 55106f25ae9SGregory Neil Shapiro #if NETINET 55206f25ae9SGregory Neil Shapiro case AF_INET: 55340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55440266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 55506f25ae9SGregory Neil Shapiro break; 55606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 55706f25ae9SGregory Neil Shapiro #if NETINET6 55806f25ae9SGregory Neil Shapiro case AF_INET6: 55940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56040266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 56106f25ae9SGregory Neil Shapiro break; 56206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 56306f25ae9SGregory Neil Shapiro #if NETISO 56406f25ae9SGregory Neil Shapiro case AF_ISO: 56540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56640266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 56706f25ae9SGregory Neil Shapiro break; 56806f25ae9SGregory Neil Shapiro #endif /* NETISO */ 56906f25ae9SGregory Neil Shapiro #if NETNS 57006f25ae9SGregory Neil Shapiro case AF_NS: 57140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57240266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 57306f25ae9SGregory Neil Shapiro break; 57406f25ae9SGregory Neil Shapiro #endif /* NETNS */ 57506f25ae9SGregory Neil Shapiro #if NETX25 57606f25ae9SGregory Neil Shapiro case AF_CCITT: 57740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57840266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 57906f25ae9SGregory Neil Shapiro break; 58006f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 58106f25ae9SGregory Neil Shapiro } 58240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58340266059SGregory Neil Shapiro macid("{daemon_name}"), 58440266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 58506f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 58640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58740266059SGregory Neil Shapiro macid("{daemon_flags}"), 58840266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 58906f25ae9SGregory Neil Shapiro else 59040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 59140266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 59206f25ae9SGregory Neil Shapiro } 59306f25ae9SGregory Neil Shapiro 594c2aa98e2SPeter Wemm /* 595c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 596c2aa98e2SPeter Wemm */ 597c2aa98e2SPeter Wemm 598c2aa98e2SPeter Wemm if (tTd(15, 2)) 59940266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 60006f25ae9SGregory Neil Shapiro 60106f25ae9SGregory Neil Shapiro /* 60240266059SGregory Neil Shapiro ** Advance state of PRNG. 60340266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 60406f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 60506f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 60606f25ae9SGregory Neil Shapiro ** are not "really" random. 60706f25ae9SGregory Neil Shapiro */ 60842e5d165SGregory Neil Shapiro #if STARTTLS 60940266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 61042e5d165SGregory Neil Shapiro seed = get_random(); 61140266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 61240266059SGregory Neil Shapiro sizeof NextDiskSpaceCheck); 61340266059SGregory Neil Shapiro RAND_seed((void *) &now, sizeof now); 61442e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 61542e5d165SGregory Neil Shapiro #else /* STARTTLS */ 61606f25ae9SGregory Neil Shapiro (void) get_random(); 61742e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 618c2aa98e2SPeter Wemm 61940266059SGregory Neil Shapiro #if NAMED_BIND 62040266059SGregory Neil Shapiro /* 62140266059SGregory Neil Shapiro ** Update MX records for FallBackMX. 62240266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 62340266059SGregory Neil Shapiro ** response time. 62440266059SGregory Neil Shapiro */ 62540266059SGregory Neil Shapiro 62640266059SGregory Neil Shapiro if (FallBackMX != NULL) 62740266059SGregory Neil Shapiro (void) getfallbackmxrr(FallBackMX); 62840266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 62940266059SGregory Neil Shapiro 63040266059SGregory Neil Shapiro #if !PROFILING 631c2aa98e2SPeter Wemm /* 632c2aa98e2SPeter Wemm ** Create a pipe to keep the child from writing to the 633c2aa98e2SPeter Wemm ** socket until after the parent has closed it. Otherwise 634c2aa98e2SPeter Wemm ** the parent may hang if the child has closed it first. 635c2aa98e2SPeter Wemm */ 636c2aa98e2SPeter Wemm 637c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 638c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 639c2aa98e2SPeter Wemm 64040266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 641c2aa98e2SPeter Wemm pid = fork(); 642c2aa98e2SPeter Wemm if (pid < 0) 643c2aa98e2SPeter Wemm { 644c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 645c2aa98e2SPeter Wemm if (pipefd[0] != -1) 646c2aa98e2SPeter Wemm { 647c2aa98e2SPeter Wemm (void) close(pipefd[0]); 648c2aa98e2SPeter Wemm (void) close(pipefd[1]); 649c2aa98e2SPeter Wemm } 65040266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 65106f25ae9SGregory Neil Shapiro (void) sleep(10); 652c2aa98e2SPeter Wemm (void) close(t); 653c2aa98e2SPeter Wemm continue; 654c2aa98e2SPeter Wemm } 65540266059SGregory Neil Shapiro 65640266059SGregory Neil Shapiro #else /* !PROFILING */ 657193538b7SGregory Neil Shapiro pid = 0; 65840266059SGregory Neil Shapiro #endif /* !PROFILING */ 659c2aa98e2SPeter Wemm 660c2aa98e2SPeter Wemm if (pid == 0) 661c2aa98e2SPeter Wemm { 662c2aa98e2SPeter Wemm char *p; 66340266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 664c2aa98e2SPeter Wemm 665c2aa98e2SPeter Wemm /* 666c2aa98e2SPeter Wemm ** CHILD -- return to caller. 667c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 668c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 669c2aa98e2SPeter Wemm */ 670c2aa98e2SPeter Wemm 6718774250cSGregory Neil Shapiro /* Reset global flags */ 6728774250cSGregory Neil Shapiro RestartRequest = NULL; 67340266059SGregory Neil Shapiro RestartWorkGroup = false; 6748774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6758774250cSGregory Neil Shapiro PendingSignal = 0; 67640266059SGregory Neil Shapiro CurrentPid = getpid(); 6778774250cSGregory Neil Shapiro 67840266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 67940266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 68040266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 68140266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 68240266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 68340266059SGregory Neil Shapiro 68440266059SGregory Neil Shapiro /* turn on profiling */ 68540266059SGregory Neil Shapiro /* SM_PROF(0); */ 68640266059SGregory Neil Shapiro 68740266059SGregory Neil Shapiro /* 68840266059SGregory Neil Shapiro ** Initialize exception stack and default exception 68940266059SGregory Neil Shapiro ** handler for child process. 69040266059SGregory Neil Shapiro */ 69140266059SGregory Neil Shapiro 69240266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 6938774250cSGregory Neil Shapiro 69406f25ae9SGregory Neil Shapiro if (!control) 69506f25ae9SGregory Neil Shapiro { 69640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 69740266059SGregory Neil Shapiro macid("{daemon_addr}"), 69840266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 69940266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, "%d", 70006f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 70140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 70240266059SGregory Neil Shapiro macid("{daemon_port}"), status); 70306f25ae9SGregory Neil Shapiro } 70406f25ae9SGregory Neil Shapiro 70540266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 70606f25ae9SGregory Neil Shapiro { 70706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 70806f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 70913058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 71006f25ae9SGregory Neil Shapiro } 711065a643dSPeter Wemm clrcontrol(); 71206f25ae9SGregory Neil Shapiro 71306f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 71406f25ae9SGregory Neil Shapiro if (control) 71506f25ae9SGregory Neil Shapiro { 71606f25ae9SGregory Neil Shapiro /* Add control socket process */ 71740266059SGregory Neil Shapiro proc_list_add(CurrentPid, 71840266059SGregory Neil Shapiro "console socket child", 71940266059SGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1); 72006f25ae9SGregory Neil Shapiro } 72106f25ae9SGregory Neil Shapiro else 72206f25ae9SGregory Neil Shapiro { 723c2aa98e2SPeter Wemm proc_list_clear(); 724c2aa98e2SPeter Wemm 72540266059SGregory Neil Shapiro /* clean up background delivery children */ 72640266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 72740266059SGregory Neil Shapiro 728065a643dSPeter Wemm /* Add parent process as first child item */ 72940266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 73040266059SGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1); 731065a643dSPeter Wemm 73206f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 733c2aa98e2SPeter Wemm QueueIntvl = 0; 734c2aa98e2SPeter Wemm 73540266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 736c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 73706f25ae9SGregory Neil Shapiro } 738c2aa98e2SPeter Wemm 73940266059SGregory Neil Shapiro #if !PROFILING 740c2aa98e2SPeter Wemm if (pipefd[0] != -1) 741c2aa98e2SPeter Wemm { 742c2aa98e2SPeter Wemm auto char c; 743c2aa98e2SPeter Wemm 744c2aa98e2SPeter Wemm /* 745c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 746c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 747c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 748c2aa98e2SPeter Wemm ** socket until after the parent has closed 749c2aa98e2SPeter Wemm ** the pipe. 750c2aa98e2SPeter Wemm */ 751c2aa98e2SPeter Wemm 752c2aa98e2SPeter Wemm /* close the write end of the pipe */ 753c2aa98e2SPeter Wemm (void) close(pipefd[1]); 754c2aa98e2SPeter Wemm 755c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 756c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 757c2aa98e2SPeter Wemm errno == EINTR) 758c2aa98e2SPeter Wemm continue; 759c2aa98e2SPeter Wemm (void) close(pipefd[0]); 760c2aa98e2SPeter Wemm } 76140266059SGregory Neil Shapiro #endif /* !PROFILING */ 762c2aa98e2SPeter Wemm 76306f25ae9SGregory Neil Shapiro /* control socket processing */ 76406f25ae9SGregory Neil Shapiro if (control) 76506f25ae9SGregory Neil Shapiro { 76606f25ae9SGregory Neil Shapiro control_command(t, e); 76706f25ae9SGregory Neil Shapiro /* NOTREACHED */ 76806f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 76906f25ae9SGregory Neil Shapiro } 77006f25ae9SGregory Neil Shapiro 771c2aa98e2SPeter Wemm /* determine host name */ 772c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 77340266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 774c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 775c2aa98e2SPeter Wemm RealHostName = newstr(p); 77606f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 77706f25ae9SGregory Neil Shapiro { 77840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 77940266059SGregory Neil Shapiro macid("{client_resolve}"), 78040266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 78106f25ae9SGregory Neil Shapiro } 78206f25ae9SGregory Neil Shapiro else 78340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 78440266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 78540266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 786605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 787c2aa98e2SPeter Wemm 78840266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 78940266059SGregory Neil Shapiro SM_TIME_DEFAULT, 79040266059SGregory Neil Shapiro (void *) &t, 79140266059SGregory Neil Shapiro SM_IO_RDONLY, 79240266059SGregory Neil Shapiro NULL)) == NULL || 793c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 79440266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 79540266059SGregory Neil Shapiro SM_TIME_DEFAULT, 79640266059SGregory Neil Shapiro (void *) &t, 79740266059SGregory Neil Shapiro SM_IO_WRONLY, 79840266059SGregory Neil Shapiro NULL)) == NULL) 799c2aa98e2SPeter Wemm { 80040266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 80140266059SGregory Neil Shapiro t); 80240266059SGregory Neil Shapiro finis(false, true, EX_OK); 803c2aa98e2SPeter Wemm } 80440266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 805c2aa98e2SPeter Wemm 806c2aa98e2SPeter Wemm InChannel = inchannel; 807c2aa98e2SPeter Wemm OutChannel = outchannel; 80840266059SGregory Neil Shapiro DisConnected = false; 809c2aa98e2SPeter Wemm 81040266059SGregory Neil Shapiro #if XLA 811c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 812c2aa98e2SPeter Wemm { 81306f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 81440266059SGregory Neil Shapiro finis(false, true, EX_OK); 815c2aa98e2SPeter Wemm } 81606f25ae9SGregory Neil Shapiro #endif /* XLA */ 81706f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 81840266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 81940266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 82006f25ae9SGregory Neil Shapiro { 82106f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 82206f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 82340266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 82440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 82540266059SGregory Neil Shapiro macid("{if_name}"), p); 82606f25ae9SGregory Neil Shapiro 82740266059SGregory Neil Shapiro /* 82840266059SGregory Neil Shapiro ** Do this only if it is not the loopback 82940266059SGregory Neil Shapiro ** interface. 83040266059SGregory Neil Shapiro */ 83140266059SGregory Neil Shapiro 83206f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 83306f25ae9SGregory Neil Shapiro { 83440266059SGregory Neil Shapiro char *addr; 83540266059SGregory Neil Shapiro char family[5]; 83640266059SGregory Neil Shapiro 83740266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 83840266059SGregory Neil Shapiro (void) sm_snprintf(family, 83940266059SGregory Neil Shapiro sizeof(family), 84040266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 84140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 84240266059SGregory Neil Shapiro A_TEMP, 84340266059SGregory Neil Shapiro macid("{if_addr}"), addr); 84440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 84540266059SGregory Neil Shapiro A_TEMP, 84640266059SGregory Neil Shapiro macid("{if_family}"), family); 84706f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 84840266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 84940266059SGregory Neil Shapiro addr, family); 85006f25ae9SGregory Neil Shapiro } 85106f25ae9SGregory Neil Shapiro else 85206f25ae9SGregory Neil Shapiro { 85340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 85440266059SGregory Neil Shapiro A_PERM, 85540266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 85640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 85740266059SGregory Neil Shapiro A_PERM, 85840266059SGregory Neil Shapiro macid("{if_family}"), NULL); 85906f25ae9SGregory Neil Shapiro } 86006f25ae9SGregory Neil Shapiro } 86106f25ae9SGregory Neil Shapiro else 86206f25ae9SGregory Neil Shapiro { 86306f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 86440266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 86540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 86640266059SGregory Neil Shapiro macid("{if_name}"), NULL); 86740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 86840266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 86940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 87040266059SGregory Neil Shapiro macid("{if_family}"), NULL); 87106f25ae9SGregory Neil Shapiro } 872c2aa98e2SPeter Wemm break; 873c2aa98e2SPeter Wemm } 874c2aa98e2SPeter Wemm 875c2aa98e2SPeter Wemm /* parent -- keep track of children */ 87606f25ae9SGregory Neil Shapiro if (control) 87706f25ae9SGregory Neil Shapiro { 87840266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 87940266059SGregory Neil Shapiro "control socket server child"); 88040266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1); 88106f25ae9SGregory Neil Shapiro } 88206f25ae9SGregory Neil Shapiro else 88306f25ae9SGregory Neil Shapiro { 88440266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 88506f25ae9SGregory Neil Shapiro "SMTP server child for %s", 886065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 88740266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1); 88806f25ae9SGregory Neil Shapiro } 88940266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 890c2aa98e2SPeter Wemm 891c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 892c2aa98e2SPeter Wemm if (pipefd[0] != -1) 89306f25ae9SGregory Neil Shapiro { 894c2aa98e2SPeter Wemm (void) close(pipefd[0]); 89506f25ae9SGregory Neil Shapiro pipefd[0] = -1; 89606f25ae9SGregory Neil Shapiro } 897c2aa98e2SPeter Wemm 898c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 899c2aa98e2SPeter Wemm (void) close(t); 900c2aa98e2SPeter Wemm 901c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 902c2aa98e2SPeter Wemm if (pipefd[1] != -1) 90306f25ae9SGregory Neil Shapiro { 904c2aa98e2SPeter Wemm (void) close(pipefd[1]); 90506f25ae9SGregory Neil Shapiro pipefd[1] = -1; 906c2aa98e2SPeter Wemm } 90706f25ae9SGregory Neil Shapiro } 908c2aa98e2SPeter Wemm if (tTd(15, 2)) 90940266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 91040266059SGregory Neil Shapiro 91140266059SGregory Neil Shapiro #if MILTER 91240266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 91340266059SGregory Neil Shapiro /* set the filters for this daemon */ 91440266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 91540266059SGregory Neil Shapiro { 91640266059SGregory Neil Shapiro for (i = 0; 91740266059SGregory Neil Shapiro (Daemons[curdaemon].d_inputfilters[i] != NULL && 91840266059SGregory Neil Shapiro i < MAXFILTERS); 91940266059SGregory Neil Shapiro i++) 92040266059SGregory Neil Shapiro { 92140266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 92240266059SGregory Neil Shapiro } 92340266059SGregory Neil Shapiro if (i < MAXFILTERS) 92440266059SGregory Neil Shapiro InputFilters[i] = NULL; 92540266059SGregory Neil Shapiro } 92640266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 92740266059SGregory Neil Shapiro #endif /* MILTER */ 92806f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 929c2aa98e2SPeter Wemm } 93040266059SGregory Neil Shapiro 93140266059SGregory Neil Shapiro /* 93240266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 93340266059SGregory Neil Shapiro ** 93440266059SGregory Neil Shapiro ** Parameters: 93540266059SGregory Neil Shapiro ** e -- envelope. 93640266059SGregory Neil Shapiro ** 93740266059SGregory Neil Shapiro ** Returns: 93840266059SGregory Neil Shapiro ** none. 93940266059SGregory Neil Shapiro ** 94040266059SGregory Neil Shapiro ** Side Effects: 94140266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 94240266059SGregory Neil Shapiro */ 94340266059SGregory Neil Shapiro 94440266059SGregory Neil Shapiro static void 94540266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 94640266059SGregory Neil Shapiro ENVELOPE *e; 94740266059SGregory Neil Shapiro { 94840266059SGregory Neil Shapiro bool logged = false; 94940266059SGregory Neil Shapiro int idx; 95040266059SGregory Neil Shapiro time_t now; 95140266059SGregory Neil Shapiro 95240266059SGregory Neil Shapiro now = curtime(); 95340266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 95440266059SGregory Neil Shapiro return; 95540266059SGregory Neil Shapiro 95640266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 95740266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 95840266059SGregory Neil Shapiro { 95940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 96040266059SGregory Neil Shapiro { 96140266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 96240266059SGregory Neil Shapiro continue; 96340266059SGregory Neil Shapiro 96440266059SGregory Neil Shapiro /* log only if not logged before */ 96540266059SGregory Neil Shapiro if (!logged) 96640266059SGregory Neil Shapiro { 96740266059SGregory Neil Shapiro if (LogLevel > 8) 96840266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 96940266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 97040266059SGregory Neil Shapiro MinBlocksFree); 97140266059SGregory Neil Shapiro sm_setproctitle(true, e, 97240266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 97340266059SGregory Neil Shapiro MinBlocksFree); 97440266059SGregory Neil Shapiro logged = true; 97540266059SGregory Neil Shapiro } 97640266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 97740266059SGregory Neil Shapiro } 97840266059SGregory Neil Shapiro } 97940266059SGregory Neil Shapiro else 98040266059SGregory Neil Shapiro { 98140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 98240266059SGregory Neil Shapiro { 98340266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 98440266059SGregory Neil Shapiro continue; 98540266059SGregory Neil Shapiro 98640266059SGregory Neil Shapiro /* log only if not logged before */ 98740266059SGregory Neil Shapiro if (!logged) 98840266059SGregory Neil Shapiro { 98940266059SGregory Neil Shapiro if (LogLevel > 8) 99040266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 99140266059SGregory Neil Shapiro "accepting new messages (again)"); 99240266059SGregory Neil Shapiro logged = true; 99340266059SGregory Neil Shapiro } 99440266059SGregory Neil Shapiro 99540266059SGregory Neil Shapiro /* title will be set later */ 99640266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 99740266059SGregory Neil Shapiro } 99840266059SGregory Neil Shapiro } 99940266059SGregory Neil Shapiro 100040266059SGregory Neil Shapiro /* only check disk space once a minute */ 100140266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 100240266059SGregory Neil Shapiro } 100340266059SGregory Neil Shapiro 100440266059SGregory Neil Shapiro /* 100506f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 1006c2aa98e2SPeter Wemm ** 100706f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 1008c2aa98e2SPeter Wemm ** 1009c2aa98e2SPeter Wemm ** Parameters: 101006f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 1011c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 1012c2aa98e2SPeter Wemm ** 1013c2aa98e2SPeter Wemm ** Returns: 1014c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 1015c2aa98e2SPeter Wemm ** 1016c2aa98e2SPeter Wemm ** Side Effects: 1017c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 1018c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 1019c2aa98e2SPeter Wemm */ 1020c2aa98e2SPeter Wemm 1021c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1022c2aa98e2SPeter Wemm 102306f25ae9SGregory Neil Shapiro static int 102406f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 102540266059SGregory Neil Shapiro DAEMON_T *d; 1026c2aa98e2SPeter Wemm bool firsttime; 1027c2aa98e2SPeter Wemm { 1028c2aa98e2SPeter Wemm int on = 1; 102906f25ae9SGregory Neil Shapiro int fdflags; 103006f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1031c2aa98e2SPeter Wemm int ntries = 0; 103206f25ae9SGregory Neil Shapiro int save_errno; 1033c2aa98e2SPeter Wemm 1034c2aa98e2SPeter Wemm if (tTd(15, 2)) 103540266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1036c2aa98e2SPeter Wemm 1037c2aa98e2SPeter Wemm do 1038c2aa98e2SPeter Wemm { 1039c2aa98e2SPeter Wemm if (ntries > 0) 104006f25ae9SGregory Neil Shapiro (void) sleep(5); 104106f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1042c2aa98e2SPeter Wemm { 104340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 104440266059SGregory Neil Shapiro # if NETUNIX 104540266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 104640266059SGregory Neil Shapiro { 104740266059SGregory Neil Shapiro int rval; 104840266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 104940266059SGregory Neil Shapiro 105040266059SGregory Neil Shapiro /* if not safe, don't use it */ 105140266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 105240266059SGregory Neil Shapiro RunAsUid, RunAsGid, 105340266059SGregory Neil Shapiro RunAsUserName, sff, 105440266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 105540266059SGregory Neil Shapiro if (rval != 0) 105640266059SGregory Neil Shapiro { 105740266059SGregory Neil Shapiro save_errno = errno; 105840266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 105940266059SGregory Neil Shapiro d->d_name, 106040266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 106140266059SGregory Neil Shapiro goto fail; 106240266059SGregory Neil Shapiro } 106340266059SGregory Neil Shapiro 106440266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 106540266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 106640266059SGregory Neil Shapiro } 106740266059SGregory Neil Shapiro # endif /* NETUNIX */ 106840266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 106906f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 107006f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 107106f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1072c2aa98e2SPeter Wemm { 107306f25ae9SGregory Neil Shapiro save_errno = errno; 107440266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 107540266059SGregory Neil Shapiro d->d_name); 107640266059SGregory Neil Shapiro fail: 107740266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 107840266059SGregory Neil Shapiro (!transienterror(save_errno) || 107940266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 108040266059SGregory Neil Shapiro { 108140266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 108240266059SGregory Neil Shapiro d->d_name); 108340266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 108440266059SGregory Neil Shapiro d->d_socket = -1; 108540266059SGregory Neil Shapiro return -1; 108640266059SGregory Neil Shapiro } 1087c2aa98e2SPeter Wemm severe: 1088c2aa98e2SPeter Wemm if (LogLevel > 0) 1089c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 109040266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 109140266059SGregory Neil Shapiro d->d_name); 109206f25ae9SGregory Neil Shapiro d->d_socket = -1; 1093c2aa98e2SPeter Wemm continue; 1094c2aa98e2SPeter Wemm } 1095c2aa98e2SPeter Wemm 1096c2aa98e2SPeter Wemm /* turn on network debugging? */ 1097c2aa98e2SPeter Wemm if (tTd(15, 101)) 109806f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1099c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1100c2aa98e2SPeter Wemm sizeof on); 1101c2aa98e2SPeter Wemm 110206f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1103c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 110406f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1105c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 1106c2aa98e2SPeter Wemm 1107c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 110806f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1109c2aa98e2SPeter Wemm { 111006f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1111c2aa98e2SPeter Wemm SO_RCVBUF, 111206f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 111306f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 111406f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1115c2aa98e2SPeter Wemm } 111606f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 111706f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 111806f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 111906f25ae9SGregory Neil Shapiro { 112006f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 112106f25ae9SGregory Neil Shapiro SO_SNDBUF, 112206f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 112306f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 112406f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 112506f25ae9SGregory Neil Shapiro } 112606f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1127c2aa98e2SPeter Wemm 112806f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 112906f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 113006f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 113106f25ae9SGregory Neil Shapiro { 113206f25ae9SGregory Neil Shapiro save_errno = errno; 113306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 113406f25ae9SGregory Neil Shapiro d->d_name, 113506f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 113640266059SGregory Neil Shapiro sm_errstring(save_errno)); 113706f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 113806f25ae9SGregory Neil Shapiro goto severe; 113906f25ae9SGregory Neil Shapiro } 114006f25ae9SGregory Neil Shapiro 114106f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1142c2aa98e2SPeter Wemm { 114340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 114440266059SGregory Neil Shapiro # ifdef NETUNIX 114540266059SGregory Neil Shapiro case AF_UNIX: 114640266059SGregory Neil Shapiro socksize = sizeof d->d_addr.sunix; 114740266059SGregory Neil Shapiro break; 114840266059SGregory Neil Shapiro # endif /* NETUNIX */ 114940266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1150c2aa98e2SPeter Wemm #if NETINET 1151c2aa98e2SPeter Wemm case AF_INET: 115206f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1153c2aa98e2SPeter Wemm break; 115406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 115506f25ae9SGregory Neil Shapiro 115606f25ae9SGregory Neil Shapiro #if NETINET6 115706f25ae9SGregory Neil Shapiro case AF_INET6: 115806f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 115906f25ae9SGregory Neil Shapiro break; 116006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1161c2aa98e2SPeter Wemm 1162c2aa98e2SPeter Wemm #if NETISO 1163c2aa98e2SPeter Wemm case AF_ISO: 116406f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1165c2aa98e2SPeter Wemm break; 116606f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1167c2aa98e2SPeter Wemm 1168c2aa98e2SPeter Wemm default: 116906f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1170c2aa98e2SPeter Wemm break; 1171c2aa98e2SPeter Wemm } 1172c2aa98e2SPeter Wemm 117306f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1174c2aa98e2SPeter Wemm { 1175c2aa98e2SPeter Wemm /* probably another daemon already */ 117606f25ae9SGregory Neil Shapiro save_errno = errno; 117706f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 117806f25ae9SGregory Neil Shapiro d->d_name); 117906f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 118040266059SGregory Neil Shapiro goto fail; 1181c2aa98e2SPeter Wemm } 1182c2aa98e2SPeter Wemm } 118306f25ae9SGregory Neil Shapiro if (!firsttime && 118406f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1185c2aa98e2SPeter Wemm { 118606f25ae9SGregory Neil Shapiro save_errno = errno; 118706f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 118806f25ae9SGregory Neil Shapiro d->d_name); 118906f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1190c2aa98e2SPeter Wemm goto severe; 1191c2aa98e2SPeter Wemm } 1192c2aa98e2SPeter Wemm return socksize; 119306f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 119406f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 119506f25ae9SGregory Neil Shapiro d->d_name); 1196065a643dSPeter Wemm /* NOTREACHED */ 1197c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1198c2aa98e2SPeter Wemm } 119940266059SGregory Neil Shapiro /* 120006f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 120106f25ae9SGregory Neil Shapiro ** 120206f25ae9SGregory Neil Shapiro ** Parameters: 120306f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 120406f25ae9SGregory Neil Shapiro ** 120506f25ae9SGregory Neil Shapiro ** Returns: 120606f25ae9SGregory Neil Shapiro ** port number on which daemon should run 120706f25ae9SGregory Neil Shapiro ** 120806f25ae9SGregory Neil Shapiro */ 120940266059SGregory Neil Shapiro 121040266059SGregory Neil Shapiro static unsigned short 121106f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 121206f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 121306f25ae9SGregory Neil Shapiro { 121440266059SGregory Neil Shapiro unsigned short port; 121506f25ae9SGregory Neil Shapiro 121606f25ae9SGregory Neil Shapiro /* 121706f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 121806f25ae9SGregory Neil Shapiro */ 121906f25ae9SGregory Neil Shapiro 122006f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 122106f25ae9SGregory Neil Shapiro { 122206f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 122306f25ae9SGregory Neil Shapiro #if NETINET 122406f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 122506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 122606f25ae9SGregory Neil Shapiro } 122706f25ae9SGregory Neil Shapiro 122806f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 122906f25ae9SGregory Neil Shapiro { 123006f25ae9SGregory Neil Shapiro #if NETINET 123106f25ae9SGregory Neil Shapiro case AF_INET: 123206f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 123306f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 123406f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 123506f25ae9SGregory Neil Shapiro break; 123606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 123706f25ae9SGregory Neil Shapiro 123806f25ae9SGregory Neil Shapiro #if NETINET6 123906f25ae9SGregory Neil Shapiro case AF_INET6: 124006f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 124106f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 124206f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 124306f25ae9SGregory Neil Shapiro break; 124406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 124506f25ae9SGregory Neil Shapiro 124606f25ae9SGregory Neil Shapiro default: 124706f25ae9SGregory Neil Shapiro /* unknown protocol */ 124806f25ae9SGregory Neil Shapiro port = 0; 124906f25ae9SGregory Neil Shapiro break; 125006f25ae9SGregory Neil Shapiro } 125106f25ae9SGregory Neil Shapiro if (port == 0) 125206f25ae9SGregory Neil Shapiro { 125306f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 125406f25ae9SGregory Neil Shapiro port = htons(25); 125506f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 125606f25ae9SGregory Neil Shapiro { 125706f25ae9SGregory Neil Shapiro register struct servent *sp; 125806f25ae9SGregory Neil Shapiro 125906f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 126006f25ae9SGregory Neil Shapiro if (sp == NULL) 126106f25ae9SGregory Neil Shapiro { 126206f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 126306f25ae9SGregory Neil Shapiro port = htons(25); 126406f25ae9SGregory Neil Shapiro } 126506f25ae9SGregory Neil Shapiro else 126606f25ae9SGregory Neil Shapiro port = sp->s_port; 126706f25ae9SGregory Neil Shapiro } 126806f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 126906f25ae9SGregory Neil Shapiro } 127006f25ae9SGregory Neil Shapiro 127106f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 127206f25ae9SGregory Neil Shapiro { 127306f25ae9SGregory Neil Shapiro #if NETINET 127406f25ae9SGregory Neil Shapiro case AF_INET: 127506f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 127606f25ae9SGregory Neil Shapiro break; 127706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 127806f25ae9SGregory Neil Shapiro 127906f25ae9SGregory Neil Shapiro #if NETINET6 128006f25ae9SGregory Neil Shapiro case AF_INET6: 128106f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 128206f25ae9SGregory Neil Shapiro break; 128306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 128406f25ae9SGregory Neil Shapiro 128506f25ae9SGregory Neil Shapiro default: 128606f25ae9SGregory Neil Shapiro /* unknown protocol */ 128706f25ae9SGregory Neil Shapiro break; 128806f25ae9SGregory Neil Shapiro } 128940266059SGregory Neil Shapiro return port; 129006f25ae9SGregory Neil Shapiro } 129140266059SGregory Neil Shapiro /* 1292c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1293c2aa98e2SPeter Wemm ** 1294c2aa98e2SPeter Wemm ** Parameters: 1295c2aa98e2SPeter Wemm ** none. 1296c2aa98e2SPeter Wemm ** 1297c2aa98e2SPeter Wemm ** Returns: 1298c2aa98e2SPeter Wemm ** none. 1299c2aa98e2SPeter Wemm ** 1300c2aa98e2SPeter Wemm ** Side Effects: 1301c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1302c2aa98e2SPeter Wemm */ 1303c2aa98e2SPeter Wemm 1304c2aa98e2SPeter Wemm void 1305c2aa98e2SPeter Wemm clrdaemon() 1306c2aa98e2SPeter Wemm { 130706f25ae9SGregory Neil Shapiro int i; 130806f25ae9SGregory Neil Shapiro 130940266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 131006f25ae9SGregory Neil Shapiro { 131106f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 131206f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 131306f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 131406f25ae9SGregory Neil Shapiro } 1315c2aa98e2SPeter Wemm } 131640266059SGregory Neil Shapiro 131740266059SGregory Neil Shapiro /* 131840266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 131940266059SGregory Neil Shapiro ** 132040266059SGregory Neil Shapiro ** Parameters: 132140266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 132240266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 132340266059SGregory Neil Shapiro ** 132440266059SGregory Neil Shapiro ** Returns: 132540266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 132640266059SGregory Neil Shapiro ** 132740266059SGregory Neil Shapiro ** Side Effects: 132840266059SGregory Neil Shapiro ** fills in modifiers. 132940266059SGregory Neil Shapiro */ 133040266059SGregory Neil Shapiro 133140266059SGregory Neil Shapiro char * 133240266059SGregory Neil Shapiro getmodifiers(v, modifiers) 133340266059SGregory Neil Shapiro char *v; 133440266059SGregory Neil Shapiro BITMAP256 modifiers; 133540266059SGregory Neil Shapiro { 133640266059SGregory Neil Shapiro int l; 133740266059SGregory Neil Shapiro char *h, *f, *flags; 133840266059SGregory Neil Shapiro 133940266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 134040266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 134140266059SGregory Neil Shapiro 134240266059SGregory Neil Shapiro /* is someone joking? */ 134340266059SGregory Neil Shapiro if (l < 0 || l > 256) 134440266059SGregory Neil Shapiro { 134540266059SGregory Neil Shapiro if (LogLevel > 2) 134640266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 134740266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 134840266059SGregory Neil Shapiro return NULL; 134940266059SGregory Neil Shapiro } 135040266059SGregory Neil Shapiro flags = xalloc(l); 135140266059SGregory Neil Shapiro f = flags; 135240266059SGregory Neil Shapiro clrbitmap(modifiers); 135340266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 135440266059SGregory Neil Shapiro { 135540266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 135640266059SGregory Neil Shapiro { 135740266059SGregory Neil Shapiro setbitn(*h, modifiers); 135840266059SGregory Neil Shapiro if (flags != f) 135940266059SGregory Neil Shapiro *flags++ = ' '; 136040266059SGregory Neil Shapiro *flags++ = *h; 136140266059SGregory Neil Shapiro if (isupper(*h)) 136240266059SGregory Neil Shapiro *flags++ = *h; 136340266059SGregory Neil Shapiro } 136440266059SGregory Neil Shapiro } 136540266059SGregory Neil Shapiro *flags++ = '\0'; 136640266059SGregory Neil Shapiro return f; 136740266059SGregory Neil Shapiro } 136840266059SGregory Neil Shapiro 136940266059SGregory Neil Shapiro /* 137040266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 137140266059SGregory Neil Shapiro ** 137240266059SGregory Neil Shapiro ** Parameters: 137340266059SGregory Neil Shapiro ** flag -- the flag to test. 137440266059SGregory Neil Shapiro ** 137540266059SGregory Neil Shapiro ** Returns: 137640266059SGregory Neil Shapiro ** true iff all daemons have set flag. 137740266059SGregory Neil Shapiro */ 137840266059SGregory Neil Shapiro 137940266059SGregory Neil Shapiro bool 138040266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 138140266059SGregory Neil Shapiro int flag; 138240266059SGregory Neil Shapiro { 138340266059SGregory Neil Shapiro int i; 138440266059SGregory Neil Shapiro 138540266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 138640266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 138740266059SGregory Neil Shapiro return false; 138840266059SGregory Neil Shapiro return true; 138940266059SGregory Neil Shapiro } 139040266059SGregory Neil Shapiro 139140266059SGregory Neil Shapiro /* 139206f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1393c2aa98e2SPeter Wemm ** 1394c2aa98e2SPeter Wemm ** Parameters: 1395c2aa98e2SPeter Wemm ** p -- the options line. 139606f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1397c2aa98e2SPeter Wemm ** 1398c2aa98e2SPeter Wemm ** Returns: 1399c2aa98e2SPeter Wemm ** none. 1400c2aa98e2SPeter Wemm */ 1401c2aa98e2SPeter Wemm 140206f25ae9SGregory Neil Shapiro static void 140306f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1404c2aa98e2SPeter Wemm register char *p; 140540266059SGregory Neil Shapiro DAEMON_T *d; 1406c2aa98e2SPeter Wemm { 140706f25ae9SGregory Neil Shapiro #if NETISO 1408193538b7SGregory Neil Shapiro short portno; 140906f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1410193538b7SGregory Neil Shapiro char *port = NULL; 1411193538b7SGregory Neil Shapiro char *addr = NULL; 141206f25ae9SGregory Neil Shapiro 141306f25ae9SGregory Neil Shapiro #if NETINET 141406f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 141506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 141606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 1417c2aa98e2SPeter Wemm 1418c2aa98e2SPeter Wemm while (p != NULL) 1419c2aa98e2SPeter Wemm { 1420c2aa98e2SPeter Wemm register char *f; 1421c2aa98e2SPeter Wemm register char *v; 1422c2aa98e2SPeter Wemm 1423c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1424c2aa98e2SPeter Wemm p++; 1425c2aa98e2SPeter Wemm if (*p == '\0') 1426c2aa98e2SPeter Wemm break; 1427c2aa98e2SPeter Wemm f = p; 1428c2aa98e2SPeter Wemm p = strchr(p, ','); 1429c2aa98e2SPeter Wemm if (p != NULL) 1430c2aa98e2SPeter Wemm *p++ = '\0'; 1431c2aa98e2SPeter Wemm v = strchr(f, '='); 1432c2aa98e2SPeter Wemm if (v == NULL) 1433c2aa98e2SPeter Wemm continue; 1434c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1435c2aa98e2SPeter Wemm continue; 1436c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1437c2aa98e2SPeter Wemm *f = toupper(*f); 1438c2aa98e2SPeter Wemm 1439c2aa98e2SPeter Wemm switch (*f) 1440c2aa98e2SPeter Wemm { 1441c2aa98e2SPeter Wemm case 'F': /* address family */ 1442c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 144306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 144440266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 144540266059SGregory Neil Shapiro # ifdef NETUNIX 144640266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 144740266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 144840266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 144940266059SGregory Neil Shapiro # endif /* NETUNIX */ 145040266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1451c2aa98e2SPeter Wemm #if NETINET 145240266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 145306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 145406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 145506f25ae9SGregory Neil Shapiro #if NETINET6 145640266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 145706f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 145806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1459c2aa98e2SPeter Wemm #if NETISO 146040266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 146106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 146206f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1463c2aa98e2SPeter Wemm #if NETNS 146440266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 146506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 146606f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1467c2aa98e2SPeter Wemm #if NETX25 146840266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 146906f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 147006f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1471c2aa98e2SPeter Wemm else 147206f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 147306f25ae9SGregory Neil Shapiro v); 1474c2aa98e2SPeter Wemm break; 1475c2aa98e2SPeter Wemm 1476c2aa98e2SPeter Wemm case 'A': /* address */ 1477193538b7SGregory Neil Shapiro addr = v; 1478c2aa98e2SPeter Wemm break; 1479c2aa98e2SPeter Wemm 148040266059SGregory Neil Shapiro #if MILTER 148140266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 148240266059SGregory Neil Shapiro case 'I': 148340266059SGregory Neil Shapiro d->d_inputfilterlist = v; 148440266059SGregory Neil Shapiro break; 148540266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 148640266059SGregory Neil Shapiro #endif /* MILTER */ 148740266059SGregory Neil Shapiro 1488c2aa98e2SPeter Wemm case 'P': /* port */ 1489193538b7SGregory Neil Shapiro port = v; 1490c2aa98e2SPeter Wemm break; 1491c2aa98e2SPeter Wemm 1492c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 149306f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 149406f25ae9SGregory Neil Shapiro break; 149506f25ae9SGregory Neil Shapiro 149606f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 149740266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1498c2aa98e2SPeter Wemm break; 1499c2aa98e2SPeter Wemm 1500c2aa98e2SPeter Wemm case 'S': /* send buffer size */ 150106f25ae9SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1502c2aa98e2SPeter Wemm break; 1503c2aa98e2SPeter Wemm 1504c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 150506f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 150606f25ae9SGregory Neil Shapiro break; 150706f25ae9SGregory Neil Shapiro 150806f25ae9SGregory Neil Shapiro case 'N': /* name */ 150906f25ae9SGregory Neil Shapiro d->d_name = v; 1510c2aa98e2SPeter Wemm break; 1511c2aa98e2SPeter Wemm 1512c2aa98e2SPeter Wemm default: 151306f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 151406f25ae9SGregory Neil Shapiro f); 1515c2aa98e2SPeter Wemm } 1516c2aa98e2SPeter Wemm } 1517193538b7SGregory Neil Shapiro 1518193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1519193538b7SGregory Neil Shapiro if (addr != NULL) 1520193538b7SGregory Neil Shapiro { 1521193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1522193538b7SGregory Neil Shapiro { 152340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 152440266059SGregory Neil Shapiro # if NETUNIX 152540266059SGregory Neil Shapiro case AF_UNIX: 152640266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 152740266059SGregory Neil Shapiro { 152840266059SGregory Neil Shapiro errno = ENAMETOOLONG; 152940266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 153040266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 153140266059SGregory Neil Shapiro break; 153240266059SGregory Neil Shapiro } 153340266059SGregory Neil Shapiro 153440266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 153540266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 153640266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 153740266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 153840266059SGregory Neil Shapiro addr, 153940266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 154040266059SGregory Neil Shapiro break; 154140266059SGregory Neil Shapiro # endif /* NETUNIX */ 154240266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1543193538b7SGregory Neil Shapiro #if NETINET 1544193538b7SGregory Neil Shapiro case AF_INET: 1545193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 154640266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 154740266059SGregory Neil Shapiro == INADDR_NONE)) 1548193538b7SGregory Neil Shapiro { 1549193538b7SGregory Neil Shapiro register struct hostent *hp; 1550193538b7SGregory Neil Shapiro 1551193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1552193538b7SGregory Neil Shapiro if (hp == NULL) 1553193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1554193538b7SGregory Neil Shapiro addr); 1555193538b7SGregory Neil Shapiro else 1556193538b7SGregory Neil Shapiro { 1557193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1558193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1559193538b7SGregory Neil Shapiro hp->h_addr_list++; 1560193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1561193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1562193538b7SGregory Neil Shapiro addr); 1563193538b7SGregory Neil Shapiro else 1564193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1565193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1566193538b7SGregory Neil Shapiro INADDRSZ); 156740266059SGregory Neil Shapiro # if NETINET6 1568193538b7SGregory Neil Shapiro freehostent(hp); 1569193538b7SGregory Neil Shapiro hp = NULL; 157040266059SGregory Neil Shapiro # endif /* NETINET6 */ 1571193538b7SGregory Neil Shapiro } 1572193538b7SGregory Neil Shapiro } 1573193538b7SGregory Neil Shapiro break; 1574193538b7SGregory Neil Shapiro #endif /* NETINET */ 1575193538b7SGregory Neil Shapiro 1576193538b7SGregory Neil Shapiro #if NETINET6 1577193538b7SGregory Neil Shapiro case AF_INET6: 157840266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1579193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1580193538b7SGregory Neil Shapiro { 1581193538b7SGregory Neil Shapiro register struct hostent *hp; 1582193538b7SGregory Neil Shapiro 1583193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1584193538b7SGregory Neil Shapiro if (hp == NULL) 1585193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1586193538b7SGregory Neil Shapiro addr); 1587193538b7SGregory Neil Shapiro else 1588193538b7SGregory Neil Shapiro { 1589193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1590193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1591193538b7SGregory Neil Shapiro hp->h_addr_list++; 1592193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1593193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1594193538b7SGregory Neil Shapiro addr); 1595193538b7SGregory Neil Shapiro else 1596193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1597193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1598193538b7SGregory Neil Shapiro IN6ADDRSZ); 1599193538b7SGregory Neil Shapiro freehostent(hp); 1600193538b7SGregory Neil Shapiro hp = NULL; 1601193538b7SGregory Neil Shapiro } 1602193538b7SGregory Neil Shapiro } 1603193538b7SGregory Neil Shapiro break; 1604193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1605193538b7SGregory Neil Shapiro 1606193538b7SGregory Neil Shapiro default: 1607193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1608193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1609193538b7SGregory Neil Shapiro break; 1610193538b7SGregory Neil Shapiro } 1611193538b7SGregory Neil Shapiro } 1612193538b7SGregory Neil Shapiro 1613193538b7SGregory Neil Shapiro if (port != NULL) 1614193538b7SGregory Neil Shapiro { 1615193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1616193538b7SGregory Neil Shapiro { 1617193538b7SGregory Neil Shapiro #if NETINET 1618193538b7SGregory Neil Shapiro case AF_INET: 1619193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 162040266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 162140266059SGregory Neil Shapiro atoi((const char *) port)); 1622193538b7SGregory Neil Shapiro else 1623193538b7SGregory Neil Shapiro { 1624193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1625193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1626193538b7SGregory Neil Shapiro port); 1627193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1628193538b7SGregory Neil Shapiro register struct servent *sp; 1629193538b7SGregory Neil Shapiro 1630193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1631193538b7SGregory Neil Shapiro if (sp == NULL) 1632193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1633193538b7SGregory Neil Shapiro port); 1634193538b7SGregory Neil Shapiro else 1635193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1636193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1637193538b7SGregory Neil Shapiro } 1638193538b7SGregory Neil Shapiro break; 1639193538b7SGregory Neil Shapiro #endif /* NETINET */ 1640193538b7SGregory Neil Shapiro 1641193538b7SGregory Neil Shapiro #if NETINET6 1642193538b7SGregory Neil Shapiro case AF_INET6: 1643193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 164440266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 164540266059SGregory Neil Shapiro atoi(port)); 1646193538b7SGregory Neil Shapiro else 1647193538b7SGregory Neil Shapiro { 1648193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1649193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1650193538b7SGregory Neil Shapiro port); 1651193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1652193538b7SGregory Neil Shapiro register struct servent *sp; 1653193538b7SGregory Neil Shapiro 1654193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1655193538b7SGregory Neil Shapiro if (sp == NULL) 1656193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1657193538b7SGregory Neil Shapiro port); 1658193538b7SGregory Neil Shapiro else 1659193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1660193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1661193538b7SGregory Neil Shapiro } 1662193538b7SGregory Neil Shapiro break; 1663193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1664193538b7SGregory Neil Shapiro 1665193538b7SGregory Neil Shapiro #if NETISO 1666193538b7SGregory Neil Shapiro case AF_ISO: 1667193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1668193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 166940266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1670193538b7SGregory Neil Shapiro else 1671193538b7SGregory Neil Shapiro { 1672193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1673193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1674193538b7SGregory Neil Shapiro port); 1675193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1676193538b7SGregory Neil Shapiro register struct servent *sp; 1677193538b7SGregory Neil Shapiro 1678193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1679193538b7SGregory Neil Shapiro if (sp == NULL) 1680193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1681193538b7SGregory Neil Shapiro port); 1682193538b7SGregory Neil Shapiro else 1683193538b7SGregory Neil Shapiro portno = sp->s_port; 1684193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1685193538b7SGregory Neil Shapiro } 1686193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1687193538b7SGregory Neil Shapiro (char *) &portno, 2); 1688193538b7SGregory Neil Shapiro break; 1689193538b7SGregory Neil Shapiro #endif /* NETISO */ 1690193538b7SGregory Neil Shapiro 1691193538b7SGregory Neil Shapiro default: 1692193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1693193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1694193538b7SGregory Neil Shapiro break; 1695193538b7SGregory Neil Shapiro } 1696193538b7SGregory Neil Shapiro } 1697c2aa98e2SPeter Wemm } 169840266059SGregory Neil Shapiro /* 169906f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 170006f25ae9SGregory Neil Shapiro ** 170106f25ae9SGregory Neil Shapiro ** Parameters: 170206f25ae9SGregory Neil Shapiro ** p -- the options line. 170306f25ae9SGregory Neil Shapiro ** 170406f25ae9SGregory Neil Shapiro ** Returns: 170540266059SGregory Neil Shapiro ** true if successful, false otherwise. 170640266059SGregory Neil Shapiro ** 170740266059SGregory Neil Shapiro ** Side Effects: 170840266059SGregory Neil Shapiro ** increments number of daemons. 170906f25ae9SGregory Neil Shapiro */ 171006f25ae9SGregory Neil Shapiro 171140266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 171240266059SGregory Neil Shapiro 171306f25ae9SGregory Neil Shapiro bool 171406f25ae9SGregory Neil Shapiro setdaemonoptions(p) 171506f25ae9SGregory Neil Shapiro register char *p; 171606f25ae9SGregory Neil Shapiro { 171740266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 171840266059SGregory Neil Shapiro return false; 171940266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 172040266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 172140266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 172240266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 172306f25ae9SGregory Neil Shapiro 172440266059SGregory Neil Shapiro #if MILTER 172540266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 172640266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 172740266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 172840266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 172940266059SGregory Neil Shapiro #endif /* MILTER */ 173040266059SGregory Neil Shapiro 173140266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 173240266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 173306f25ae9SGregory Neil Shapiro else 173406f25ae9SGregory Neil Shapiro { 173506f25ae9SGregory Neil Shapiro char num[30]; 173606f25ae9SGregory Neil Shapiro 173740266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Daemon%d", NDaemons); 173840266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 173906f25ae9SGregory Neil Shapiro } 174006f25ae9SGregory Neil Shapiro 174106f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 174206f25ae9SGregory Neil Shapiro { 174340266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 174440266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[NDaemons].d_flags)) 174540266059SGregory Neil Shapiro sm_dprintf("ETRNONLY "); 174640266059SGregory Neil Shapiro if (bitnset(D_NOETRN, Daemons[NDaemons].d_flags)) 174740266059SGregory Neil Shapiro sm_dprintf("NOETRN "); 174840266059SGregory Neil Shapiro sm_dprintf("\n"); 174906f25ae9SGregory Neil Shapiro } 175040266059SGregory Neil Shapiro ++NDaemons; 175140266059SGregory Neil Shapiro return true; 175206f25ae9SGregory Neil Shapiro } 175340266059SGregory Neil Shapiro /* 175406f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 175506f25ae9SGregory Neil Shapiro ** 175606f25ae9SGregory Neil Shapiro ** Parameters: 175706f25ae9SGregory Neil Shapiro ** none 175806f25ae9SGregory Neil Shapiro ** 175906f25ae9SGregory Neil Shapiro ** Returns: 176006f25ae9SGregory Neil Shapiro ** none 176106f25ae9SGregory Neil Shapiro ** 176206f25ae9SGregory Neil Shapiro ** Side Effects: 176306f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 176406f25ae9SGregory Neil Shapiro */ 176540266059SGregory Neil Shapiro 176606f25ae9SGregory Neil Shapiro void 176706f25ae9SGregory Neil Shapiro initdaemon() 176806f25ae9SGregory Neil Shapiro { 176940266059SGregory Neil Shapiro if (NDaemons == 0) 177006f25ae9SGregory Neil Shapiro { 177140266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 177240266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 177340266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 177440266059SGregory Neil Shapiro NDaemons = 1; 177506f25ae9SGregory Neil Shapiro } 177606f25ae9SGregory Neil Shapiro } 177740266059SGregory Neil Shapiro /* 177806f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 177906f25ae9SGregory Neil Shapiro ** 178006f25ae9SGregory Neil Shapiro ** Parameters: 178106f25ae9SGregory Neil Shapiro ** p -- the options line. 178206f25ae9SGregory Neil Shapiro ** 178306f25ae9SGregory Neil Shapiro ** Returns: 178406f25ae9SGregory Neil Shapiro ** none. 178506f25ae9SGregory Neil Shapiro */ 178606f25ae9SGregory Neil Shapiro 178740266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 178806f25ae9SGregory Neil Shapiro 178906f25ae9SGregory Neil Shapiro void 179006f25ae9SGregory Neil Shapiro setclientoptions(p) 179106f25ae9SGregory Neil Shapiro register char *p; 179206f25ae9SGregory Neil Shapiro { 179340266059SGregory Neil Shapiro int family; 179440266059SGregory Neil Shapiro DAEMON_T d; 179506f25ae9SGregory Neil Shapiro 179606f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 179706f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 179806f25ae9SGregory Neil Shapiro 179906f25ae9SGregory Neil Shapiro /* grab what we need */ 180040266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 180140266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 180240266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 180340266059SGregory Neil Shapiro if (d.d_name != NULL) 180440266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 180506f25ae9SGregory Neil Shapiro else 180640266059SGregory Neil Shapiro { 180740266059SGregory Neil Shapiro char num[30]; 180840266059SGregory Neil Shapiro 180940266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Client%d", family); 181040266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 181106f25ae9SGregory Neil Shapiro } 181240266059SGregory Neil Shapiro } 181340266059SGregory Neil Shapiro /* 181406f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 181506f25ae9SGregory Neil Shapiro ** 181606f25ae9SGregory Neil Shapiro ** Parameters: 181706f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 181806f25ae9SGregory Neil Shapiro ** 181906f25ae9SGregory Neil Shapiro ** Returns: 182006f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 182106f25ae9SGregory Neil Shapiro ** 182206f25ae9SGregory Neil Shapiro ** Side Effects: 182306f25ae9SGregory Neil Shapiro ** none. 182406f25ae9SGregory Neil Shapiro */ 182506f25ae9SGregory Neil Shapiro 182606f25ae9SGregory Neil Shapiro static int 182706f25ae9SGregory Neil Shapiro addr_family(addr) 182806f25ae9SGregory Neil Shapiro char *addr; 182906f25ae9SGregory Neil Shapiro { 183006f25ae9SGregory Neil Shapiro #if NETINET6 183106f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 183206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 183306f25ae9SGregory Neil Shapiro 183406f25ae9SGregory Neil Shapiro #if NETINET 183506f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 183606f25ae9SGregory Neil Shapiro { 183706f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 183840266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 183906f25ae9SGregory Neil Shapiro return AF_INET; 184006f25ae9SGregory Neil Shapiro } 184106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 184206f25ae9SGregory Neil Shapiro #if NETINET6 184340266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 184406f25ae9SGregory Neil Shapiro { 184506f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 184640266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 184706f25ae9SGregory Neil Shapiro return AF_INET6; 184806f25ae9SGregory Neil Shapiro } 184906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 185040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 185140266059SGregory Neil Shapiro # if NETUNIX 185240266059SGregory Neil Shapiro if (*addr == '/') 185340266059SGregory Neil Shapiro { 185406f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 185540266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 185640266059SGregory Neil Shapiro return AF_UNIX; 185740266059SGregory Neil Shapiro } 185840266059SGregory Neil Shapiro # endif /* NETUNIX */ 185940266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 186040266059SGregory Neil Shapiro if (tTd(16, 9)) 186140266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 186206f25ae9SGregory Neil Shapiro return AF_UNSPEC; 186306f25ae9SGregory Neil Shapiro } 186440266059SGregory Neil Shapiro 186540266059SGregory Neil Shapiro /* 186640266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 186740266059SGregory Neil Shapiro ** 186840266059SGregory Neil Shapiro ** Parameters: 186940266059SGregory Neil Shapiro ** flag -- the flag to test. 187040266059SGregory Neil Shapiro ** 187140266059SGregory Neil Shapiro ** Returns: 187240266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 187340266059SGregory Neil Shapiro */ 187440266059SGregory Neil Shapiro 187540266059SGregory Neil Shapiro bool 187640266059SGregory Neil Shapiro chkclientmodifiers(flag) 187740266059SGregory Neil Shapiro int flag; 187840266059SGregory Neil Shapiro { 187940266059SGregory Neil Shapiro int i; 188040266059SGregory Neil Shapiro bool flagisset; 188140266059SGregory Neil Shapiro 188240266059SGregory Neil Shapiro flagisset = false; 188340266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 188440266059SGregory Neil Shapiro { 188540266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 188640266059SGregory Neil Shapiro { 188740266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 188840266059SGregory Neil Shapiro return false; 188940266059SGregory Neil Shapiro flagisset = true; 189040266059SGregory Neil Shapiro } 189140266059SGregory Neil Shapiro } 189240266059SGregory Neil Shapiro return flagisset; 189340266059SGregory Neil Shapiro } 189440266059SGregory Neil Shapiro 189540266059SGregory Neil Shapiro #if MILTER 189640266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 189740266059SGregory Neil Shapiro /* 189840266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 189940266059SGregory Neil Shapiro ** 190040266059SGregory Neil Shapiro ** Parameters: 190140266059SGregory Neil Shapiro ** none 190240266059SGregory Neil Shapiro ** 190340266059SGregory Neil Shapiro ** Returns: 190440266059SGregory Neil Shapiro ** none 190540266059SGregory Neil Shapiro */ 190640266059SGregory Neil Shapiro 190740266059SGregory Neil Shapiro void 190840266059SGregory Neil Shapiro setup_daemon_milters() 190940266059SGregory Neil Shapiro { 191040266059SGregory Neil Shapiro int idx; 191140266059SGregory Neil Shapiro 191240266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 191340266059SGregory Neil Shapiro { 191440266059SGregory Neil Shapiro /* no need to configure the daemons */ 191540266059SGregory Neil Shapiro return; 191640266059SGregory Neil Shapiro } 191740266059SGregory Neil Shapiro 191840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 191940266059SGregory Neil Shapiro { 192040266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 192140266059SGregory Neil Shapiro { 192240266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 192340266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 192440266059SGregory Neil Shapiro MAXFILTERS); 192540266059SGregory Neil Shapiro } 192640266059SGregory Neil Shapiro } 192740266059SGregory Neil Shapiro } 192840266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 192940266059SGregory Neil Shapiro #endif /* MILTER */ 193040266059SGregory Neil Shapiro /* 193106f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 1932c2aa98e2SPeter Wemm ** 1933c2aa98e2SPeter Wemm ** Parameters: 1934c2aa98e2SPeter Wemm ** host -- the name of the host. 1935c2aa98e2SPeter Wemm ** port -- the port number to connect to. 1936c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 1937c2aa98e2SPeter Wemm ** structure to be filled in. 1938c2aa98e2SPeter Wemm ** e -- the current envelope. 193940266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 194040266059SGregory Neil Shapiro ** (0 means no limit) 1941c2aa98e2SPeter Wemm ** 1942c2aa98e2SPeter Wemm ** Returns: 1943c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 1944c2aa98e2SPeter Wemm ** made and if not why not. 1945c2aa98e2SPeter Wemm ** 1946c2aa98e2SPeter Wemm ** Side Effects: 1947c2aa98e2SPeter Wemm ** none. 1948c2aa98e2SPeter Wemm */ 1949c2aa98e2SPeter Wemm 1950c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 1951c2aa98e2SPeter Wemm 1952c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 1953c2aa98e2SPeter Wemm 1954c2aa98e2SPeter Wemm int 195540266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 1956c2aa98e2SPeter Wemm char *host; 195740266059SGregory Neil Shapiro volatile unsigned int port; 1958c2aa98e2SPeter Wemm register MCI *mci; 1959c2aa98e2SPeter Wemm ENVELOPE *e; 196040266059SGregory Neil Shapiro time_t enough; 1961c2aa98e2SPeter Wemm { 1962c2aa98e2SPeter Wemm register volatile int addrno = 0; 196340266059SGregory Neil Shapiro volatile int s; 1964c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 1965c2aa98e2SPeter Wemm SOCKADDR addr; 196606f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 196706f25ae9SGregory Neil Shapiro int save_errno = 0; 196806f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 1969c2aa98e2SPeter Wemm volatile bool firstconnect; 197040266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 197106f25ae9SGregory Neil Shapiro #if NETINET6 197240266059SGregory Neil Shapiro volatile bool v6found = false; 197306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 197406f25ae9SGregory Neil Shapiro volatile int family = InetMode; 197506f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 197606f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 197706f25ae9SGregory Neil Shapiro volatile bool clt_bind; 197806f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 197906f25ae9SGregory Neil Shapiro char *p; 198006f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 198106f25ae9SGregory Neil Shapiro 198240266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 198306f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 198440266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 198506f25ae9SGregory Neil Shapiro { 198606f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 198706f25ae9SGregory Neil Shapiro { 198806f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 1989193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 199006f25ae9SGregory Neil Shapiro } 199106f25ae9SGregory Neil Shapiro } 199206f25ae9SGregory Neil Shapiro 199306f25ae9SGregory Neil Shapiro #if NETINET6 199406f25ae9SGregory Neil Shapiro v4retry: 199506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 199640266059SGregory Neil Shapiro clt_bind = false; 199706f25ae9SGregory Neil Shapiro 199806f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 199906f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 200040266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2001602a2b1bSGregory Neil Shapiro *p != '\0') 200206f25ae9SGregory Neil Shapiro { 200306f25ae9SGregory Neil Shapiro #if NETINET6 200406f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 200506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 200606f25ae9SGregory Neil Shapiro 200706f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 200806f25ae9SGregory Neil Shapiro 200906f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 201006f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 201106f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 201206f25ae9SGregory Neil Shapiro { 201306f25ae9SGregory Neil Shapiro #if NETINET 201406f25ae9SGregory Neil Shapiro case AF_INET: 2015602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2016602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 2017602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 201806f25ae9SGregory Neil Shapiro { 201940266059SGregory Neil Shapiro clt_bind = true; 202006f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 202106f25ae9SGregory Neil Shapiro } 202206f25ae9SGregory Neil Shapiro break; 202306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 202406f25ae9SGregory Neil Shapiro 202506f25ae9SGregory Neil Shapiro #if NETINET6 202606f25ae9SGregory Neil Shapiro case AF_INET6: 202706f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 202840266059SGregory Neil Shapiro (void) sm_snprintf(p6, sizeof p6, 202940266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 203006f25ae9SGregory Neil Shapiro else 203140266059SGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof p6); 203240266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2033602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2034602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 203506f25ae9SGregory Neil Shapiro { 203640266059SGregory Neil Shapiro clt_bind = true; 203706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 203806f25ae9SGregory Neil Shapiro } 203906f25ae9SGregory Neil Shapiro break; 204006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 204106f25ae9SGregory Neil Shapiro 204206f25ae9SGregory Neil Shapiro #if 0 204306f25ae9SGregory Neil Shapiro default: 204406f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 204506f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 204606f25ae9SGregory Neil Shapiro break; 204706f25ae9SGregory Neil Shapiro #endif /* 0 */ 204806f25ae9SGregory Neil Shapiro } 204906f25ae9SGregory Neil Shapiro if (clt_bind) 205006f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 205106f25ae9SGregory Neil Shapiro } 205240266059SGregory Neil Shapiro 205340266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 205440266059SGregory Neil Shapiro if (!clt_bind) 205506f25ae9SGregory Neil Shapiro { 205640266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 205706f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 205806f25ae9SGregory Neil Shapiro { 205906f25ae9SGregory Neil Shapiro #if NETINET 206006f25ae9SGregory Neil Shapiro case AF_INET: 206106f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 206206f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 206306f25ae9SGregory Neil Shapiro else 206440266059SGregory Neil Shapiro clt_bind = true; 206506f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 206640266059SGregory Neil Shapiro clt_bind = true; 206706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 206806f25ae9SGregory Neil Shapiro break; 206906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 207006f25ae9SGregory Neil Shapiro #if NETINET6 207106f25ae9SGregory Neil Shapiro case AF_INET6: 207206f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 207306f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 207406f25ae9SGregory Neil Shapiro else 207540266059SGregory Neil Shapiro clt_bind = true; 207606f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 207706f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 207840266059SGregory Neil Shapiro clt_bind = true; 207906f25ae9SGregory Neil Shapiro break; 208006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 208106f25ae9SGregory Neil Shapiro #if NETISO 208206f25ae9SGregory Neil Shapiro case AF_ISO: 208306f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 208440266059SGregory Neil Shapiro clt_bind = true; 208506f25ae9SGregory Neil Shapiro break; 208606f25ae9SGregory Neil Shapiro #endif /* NETISO */ 208706f25ae9SGregory Neil Shapiro default: 208806f25ae9SGregory Neil Shapiro break; 208906f25ae9SGregory Neil Shapiro } 209006f25ae9SGregory Neil Shapiro } 2091c2aa98e2SPeter Wemm 2092c2aa98e2SPeter Wemm /* 2093c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2094c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2095c2aa98e2SPeter Wemm */ 2096c2aa98e2SPeter Wemm 2097602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2098c2aa98e2SPeter Wemm errno = 0; 209906f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 210006f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 2101c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2102c2aa98e2SPeter Wemm CurHostName = host; 2103c2aa98e2SPeter Wemm 2104c2aa98e2SPeter Wemm if (host[0] == '[') 2105c2aa98e2SPeter Wemm { 210606f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2107c2aa98e2SPeter Wemm if (p != NULL) 2108c2aa98e2SPeter Wemm { 2109c2aa98e2SPeter Wemm #if NETINET 211006f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 211106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 211206f25ae9SGregory Neil Shapiro #if NETINET6 211306f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 211406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 211506f25ae9SGregory Neil Shapiro 211606f25ae9SGregory Neil Shapiro *p = '\0'; 211706f25ae9SGregory Neil Shapiro #if NETINET6 211806f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 211906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 212006f25ae9SGregory Neil Shapiro #if NETINET 212106f25ae9SGregory Neil Shapiro if (family == AF_INET && 212206f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 212306f25ae9SGregory Neil Shapiro { 212406f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 212506f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 212606f25ae9SGregory Neil Shapiro } 212706f25ae9SGregory Neil Shapiro else 212806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 212906f25ae9SGregory Neil Shapiro #if NETINET6 213006f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 213140266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 213206f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 213306f25ae9SGregory Neil Shapiro { 213406f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 213506f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 213606f25ae9SGregory Neil Shapiro } 213706f25ae9SGregory Neil Shapiro else 213806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2139c2aa98e2SPeter Wemm { 2140c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 214106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2142c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2143c2aa98e2SPeter Wemm { 2144c2aa98e2SPeter Wemm #if NAMED_BIND 2145c2aa98e2SPeter Wemm int oldopts = _res.options; 2146c2aa98e2SPeter Wemm 2147c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 214806f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2149c2aa98e2SPeter Wemm p[-1] = '\0'; 215006f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 215106f25ae9SGregory Neil Shapiro family); 2152c2aa98e2SPeter Wemm p[-1] = '.'; 2153c2aa98e2SPeter Wemm #if NAMED_BIND 2154c2aa98e2SPeter Wemm _res.options = oldopts; 215506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2156c2aa98e2SPeter Wemm } 2157c2aa98e2SPeter Wemm *p = ']'; 2158c2aa98e2SPeter Wemm goto gothostent; 2159c2aa98e2SPeter Wemm } 2160c2aa98e2SPeter Wemm *p = ']'; 2161c2aa98e2SPeter Wemm } 2162c2aa98e2SPeter Wemm if (p == NULL) 2163c2aa98e2SPeter Wemm { 2164c2aa98e2SPeter Wemm extern char MsgBuf[]; 2165c2aa98e2SPeter Wemm 216606f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 216706f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 216806f25ae9SGregory Neil Shapiro host); 2169c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 217006f25ae9SGregory Neil Shapiro errno = EINVAL; 2171c2aa98e2SPeter Wemm return EX_NOHOST; 2172c2aa98e2SPeter Wemm } 2173c2aa98e2SPeter Wemm } 2174c2aa98e2SPeter Wemm else 2175c2aa98e2SPeter Wemm { 2176c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2177c2aa98e2SPeter Wemm { 217806f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 217906f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2180c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2181c2aa98e2SPeter Wemm { 2182c2aa98e2SPeter Wemm #if NAMED_BIND 2183c2aa98e2SPeter Wemm int oldopts = _res.options; 2184c2aa98e2SPeter Wemm 2185c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 218606f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2187c2aa98e2SPeter Wemm *p = '\0'; 218806f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2189c2aa98e2SPeter Wemm *p = '.'; 2190c2aa98e2SPeter Wemm #if NAMED_BIND 2191c2aa98e2SPeter Wemm _res.options = oldopts; 219206f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2193c2aa98e2SPeter Wemm } 2194c2aa98e2SPeter Wemm } 2195c2aa98e2SPeter Wemm gothostent: 2196c2aa98e2SPeter Wemm if (hp == NULL) 2197c2aa98e2SPeter Wemm { 2198c2aa98e2SPeter Wemm #if NAMED_BIND 2199c2aa98e2SPeter Wemm /* check for name server timeouts */ 220040266059SGregory Neil Shapiro # if NETINET6 220140266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 220240266059SGregory Neil Shapiro errno == ETIMEDOUT) 220340266059SGregory Neil Shapiro { 220440266059SGregory Neil Shapiro /* 220540266059SGregory Neil Shapiro ** An attempt with family AF_INET may 220640266059SGregory Neil Shapiro ** succeed By skipping the next section 220740266059SGregory Neil Shapiro ** of code, we will try AF_INET before 220840266059SGregory Neil Shapiro ** failing. 220940266059SGregory Neil Shapiro */ 221040266059SGregory Neil Shapiro 221140266059SGregory Neil Shapiro if (tTd(16, 10)) 221240266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 221340266059SGregory Neil Shapiro } 221440266059SGregory Neil Shapiro else 221540266059SGregory Neil Shapiro # endif /* NETINET6 */ 221640266059SGregory Neil Shapiro { 221740266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 221840266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2219c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2220c2aa98e2SPeter Wemm { 222106f25ae9SGregory Neil Shapiro save_errno = errno; 222240266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 222340266059SGregory Neil Shapiro "4.4.3", NULL); 222406f25ae9SGregory Neil Shapiro errno = save_errno; 2225c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2226c2aa98e2SPeter Wemm } 222740266059SGregory Neil Shapiro } 222806f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 222906f25ae9SGregory Neil Shapiro #if NETINET6 223006f25ae9SGregory Neil Shapiro /* 223106f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 223206f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 223306f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 223406f25ae9SGregory Neil Shapiro */ 223506f25ae9SGregory Neil Shapiro 223606f25ae9SGregory Neil Shapiro if (family == AF_INET6) 223706f25ae9SGregory Neil Shapiro { 223806f25ae9SGregory Neil Shapiro family = AF_INET; 223906f25ae9SGregory Neil Shapiro goto v4retry; 224006f25ae9SGregory Neil Shapiro } 224106f25ae9SGregory Neil Shapiro if (v6found) 224206f25ae9SGregory Neil Shapiro goto v6tempfail; 224306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 224406f25ae9SGregory Neil Shapiro save_errno = errno; 2245c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 224606f25ae9SGregory Neil Shapiro errno = save_errno; 224706f25ae9SGregory Neil Shapiro return EX_NOHOST; 2248c2aa98e2SPeter Wemm } 2249c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2250c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2251c2aa98e2SPeter Wemm { 2252c2aa98e2SPeter Wemm #if NETINET 2253c2aa98e2SPeter Wemm case AF_INET: 225406f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 225506f25ae9SGregory Neil Shapiro hp->h_addr, 2256c2aa98e2SPeter Wemm INADDRSZ); 2257c2aa98e2SPeter Wemm break; 225806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 225906f25ae9SGregory Neil Shapiro 226006f25ae9SGregory Neil Shapiro #if NETINET6 226106f25ae9SGregory Neil Shapiro case AF_INET6: 226206f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 226306f25ae9SGregory Neil Shapiro hp->h_addr, 226406f25ae9SGregory Neil Shapiro IN6ADDRSZ); 226506f25ae9SGregory Neil Shapiro break; 226606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2267c2aa98e2SPeter Wemm 2268c2aa98e2SPeter Wemm default: 2269c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 2270c2aa98e2SPeter Wemm { 2271c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2272c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2273c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 227406f25ae9SGregory Neil Shapiro errno = EINVAL; 2275c2aa98e2SPeter Wemm return EX_NOHOST; 2276c2aa98e2SPeter Wemm } 227740266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2278c2aa98e2SPeter Wemm break; 2279c2aa98e2SPeter Wemm } 2280c2aa98e2SPeter Wemm addrno = 1; 2281c2aa98e2SPeter Wemm } 2282c2aa98e2SPeter Wemm 2283c2aa98e2SPeter Wemm /* 2284c2aa98e2SPeter Wemm ** Determine the port number. 2285c2aa98e2SPeter Wemm */ 2286c2aa98e2SPeter Wemm 2287c2aa98e2SPeter Wemm if (port == 0) 2288c2aa98e2SPeter Wemm { 228906f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 229006f25ae9SGregory Neil Shapiro port = htons(25); 229106f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2292c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2293c2aa98e2SPeter Wemm 2294c2aa98e2SPeter Wemm if (sp == NULL) 2295c2aa98e2SPeter Wemm { 2296c2aa98e2SPeter Wemm if (LogLevel > 2) 2297c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2298c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2299c2aa98e2SPeter Wemm port = htons(25); 2300c2aa98e2SPeter Wemm } 2301c2aa98e2SPeter Wemm else 2302c2aa98e2SPeter Wemm port = sp->s_port; 230306f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2304c2aa98e2SPeter Wemm } 2305c2aa98e2SPeter Wemm 230640266059SGregory Neil Shapiro #if NETINET6 230740266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 230840266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 230940266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 231040266059SGregory Neil Shapiro { 231140266059SGregory Neil Shapiro /* 231240266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 231340266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 231440266059SGregory Neil Shapiro ** for IPv4. 231540266059SGregory Neil Shapiro */ 231640266059SGregory Neil Shapiro 231740266059SGregory Neil Shapiro goto nextaddr; 231840266059SGregory Neil Shapiro } 231940266059SGregory Neil Shapiro #endif /* NETINET6 */ 232040266059SGregory Neil Shapiro 2321c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2322c2aa98e2SPeter Wemm { 2323c2aa98e2SPeter Wemm #if NETINET 2324c2aa98e2SPeter Wemm case AF_INET: 2325c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2326c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 2327c2aa98e2SPeter Wemm break; 232806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 232906f25ae9SGregory Neil Shapiro 233006f25ae9SGregory Neil Shapiro #if NETINET6 233106f25ae9SGregory Neil Shapiro case AF_INET6: 233206f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 233306f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 233406f25ae9SGregory Neil Shapiro break; 233506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2336c2aa98e2SPeter Wemm 2337c2aa98e2SPeter Wemm #if NETISO 2338c2aa98e2SPeter Wemm case AF_ISO: 2339c2aa98e2SPeter Wemm /* assume two byte transport selector */ 234006f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2341c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 2342c2aa98e2SPeter Wemm break; 234306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2344c2aa98e2SPeter Wemm 2345c2aa98e2SPeter Wemm default: 2346c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2347c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 234806f25ae9SGregory Neil Shapiro errno = EINVAL; 234940266059SGregory Neil Shapiro #if NETINET6 2350193538b7SGregory Neil Shapiro if (hp != NULL) 2351193538b7SGregory Neil Shapiro freehostent(hp); 235240266059SGregory Neil Shapiro #endif /* NETINET6 */ 235306f25ae9SGregory Neil Shapiro return EX_NOHOST; 2354c2aa98e2SPeter Wemm } 2355c2aa98e2SPeter Wemm 2356c2aa98e2SPeter Wemm /* 2357c2aa98e2SPeter Wemm ** Try to actually open the connection. 2358c2aa98e2SPeter Wemm */ 2359c2aa98e2SPeter Wemm 236040266059SGregory Neil Shapiro #if XLA 2361c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2362c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2363193538b7SGregory Neil Shapiro { 236440266059SGregory Neil Shapiro # if NETINET6 2365193538b7SGregory Neil Shapiro if (hp != NULL) 2366193538b7SGregory Neil Shapiro freehostent(hp); 236740266059SGregory Neil Shapiro # endif /* NETINET6 */ 2368c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2369193538b7SGregory Neil Shapiro } 237006f25ae9SGregory Neil Shapiro #endif /* XLA */ 2371c2aa98e2SPeter Wemm 237240266059SGregory Neil Shapiro firstconnect = true; 2373c2aa98e2SPeter Wemm for (;;) 2374c2aa98e2SPeter Wemm { 2375c2aa98e2SPeter Wemm if (tTd(16, 1)) 237640266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 23778774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 237840266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2379c2aa98e2SPeter Wemm 2380c2aa98e2SPeter Wemm /* save for logging */ 2381c2aa98e2SPeter Wemm CurHostAddr = addr; 2382c2aa98e2SPeter Wemm 238340266059SGregory Neil Shapiro #if HASRRESVPORT 2384c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2385c2aa98e2SPeter Wemm { 2386c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2387c2aa98e2SPeter Wemm 2388c2aa98e2SPeter Wemm s = rresvport(&rport); 2389c2aa98e2SPeter Wemm } 2390c2aa98e2SPeter Wemm else 239140266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2392c2aa98e2SPeter Wemm { 239340266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2394c2aa98e2SPeter Wemm } 2395c2aa98e2SPeter Wemm if (s < 0) 2396c2aa98e2SPeter Wemm { 239706f25ae9SGregory Neil Shapiro save_errno = errno; 2398c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 239940266059SGregory Neil Shapiro #if XLA 2400c2aa98e2SPeter Wemm xla_host_end(host); 240106f25ae9SGregory Neil Shapiro #endif /* XLA */ 2402c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 240340266059SGregory Neil Shapiro #if NETINET6 2404193538b7SGregory Neil Shapiro if (hp != NULL) 2405193538b7SGregory Neil Shapiro freehostent(hp); 240640266059SGregory Neil Shapiro #endif /* NETINET6 */ 240706f25ae9SGregory Neil Shapiro errno = save_errno; 2408c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2409c2aa98e2SPeter Wemm } 2410c2aa98e2SPeter Wemm 2411c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 241240266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2413c2aa98e2SPeter Wemm { 2414c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 241540266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 241640266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2417c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2418c2aa98e2SPeter Wemm } 241906f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 242006f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 242140266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 242206f25ae9SGregory Neil Shapiro { 242306f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 242440266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 242540266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 242606f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 242706f25ae9SGregory Neil Shapiro } 242806f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 242906f25ae9SGregory Neil Shapiro 2430c2aa98e2SPeter Wemm if (tTd(16, 1)) 243140266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2432c2aa98e2SPeter Wemm 2433c2aa98e2SPeter Wemm /* turn on network debugging? */ 2434c2aa98e2SPeter Wemm if (tTd(16, 101)) 2435c2aa98e2SPeter Wemm { 2436c2aa98e2SPeter Wemm int on = 1; 243706f25ae9SGregory Neil Shapiro 2438c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2439c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2440c2aa98e2SPeter Wemm } 244140266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 244240266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2443c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2444c2aa98e2SPeter Wemm 244506f25ae9SGregory Neil Shapiro if (clt_bind) 244606f25ae9SGregory Neil Shapiro { 244706f25ae9SGregory Neil Shapiro int on = 1; 244806f25ae9SGregory Neil Shapiro 244906f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 245006f25ae9SGregory Neil Shapiro { 245106f25ae9SGregory Neil Shapiro #if NETINET 245206f25ae9SGregory Neil Shapiro case AF_INET: 245306f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 245406f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 245506f25ae9SGregory Neil Shapiro SO_REUSEADDR, 245606f25ae9SGregory Neil Shapiro (char *) &on, 245706f25ae9SGregory Neil Shapiro sizeof on); 245806f25ae9SGregory Neil Shapiro break; 245906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 246006f25ae9SGregory Neil Shapiro 246106f25ae9SGregory Neil Shapiro #if NETINET6 246206f25ae9SGregory Neil Shapiro case AF_INET6: 246306f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 246406f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 246506f25ae9SGregory Neil Shapiro SO_REUSEADDR, 246606f25ae9SGregory Neil Shapiro (char *) &on, 246706f25ae9SGregory Neil Shapiro sizeof on); 246806f25ae9SGregory Neil Shapiro break; 246906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 247006f25ae9SGregory Neil Shapiro } 247106f25ae9SGregory Neil Shapiro 247206f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 247306f25ae9SGregory Neil Shapiro { 247406f25ae9SGregory Neil Shapiro save_errno = errno; 247506f25ae9SGregory Neil Shapiro (void) close(s); 247606f25ae9SGregory Neil Shapiro errno = save_errno; 247706f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 247806f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 247940266059SGregory Neil Shapiro #if NETINET6 2480193538b7SGregory Neil Shapiro if (hp != NULL) 2481193538b7SGregory Neil Shapiro freehostent(hp); 248240266059SGregory Neil Shapiro #endif /* NETINET6 */ 248306f25ae9SGregory Neil Shapiro errno = save_errno; 248406f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 248506f25ae9SGregory Neil Shapiro } 248606f25ae9SGregory Neil Shapiro } 248706f25ae9SGregory Neil Shapiro 2488c2aa98e2SPeter Wemm /* 2489c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2490c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2491c2aa98e2SPeter Wemm */ 2492c2aa98e2SPeter Wemm 2493c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2494c2aa98e2SPeter Wemm { 2495c2aa98e2SPeter Wemm int i; 2496c2aa98e2SPeter Wemm 2497c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 249840266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 24998774250cSGregory Neil Shapiro connecttimeout, 0); 2500c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 250140266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 25028774250cSGregory Neil Shapiro connecttimeout, 0); 2503c2aa98e2SPeter Wemm else 2504c2aa98e2SPeter Wemm ev = NULL; 2505c2aa98e2SPeter Wemm 250606f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 250706f25ae9SGregory Neil Shapiro { 250806f25ae9SGregory Neil Shapiro #if NETINET 250906f25ae9SGregory Neil Shapiro case AF_INET: 251006f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 251106f25ae9SGregory Neil Shapiro break; 251206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 251306f25ae9SGregory Neil Shapiro 251406f25ae9SGregory Neil Shapiro #if NETINET6 251506f25ae9SGregory Neil Shapiro case AF_INET6: 251606f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 251706f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 251806f25ae9SGregory Neil Shapiro IN6ADDRSZ); 251906f25ae9SGregory Neil Shapiro break; 252006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 252106f25ae9SGregory Neil Shapiro } 2522c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 252306f25ae9SGregory Neil Shapiro save_errno = errno; 2524c2aa98e2SPeter Wemm if (ev != NULL) 252540266059SGregory Neil Shapiro sm_clrevent(ev); 2526c2aa98e2SPeter Wemm if (i >= 0) 2527c2aa98e2SPeter Wemm break; 2528c2aa98e2SPeter Wemm } 2529c2aa98e2SPeter Wemm else 253006f25ae9SGregory Neil Shapiro save_errno = errno; 2531c2aa98e2SPeter Wemm 2532605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2533605302a5SGregory Neil Shapiro (void) close(s); 2534605302a5SGregory Neil Shapiro 2535c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 253640266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 253740266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2538c2aa98e2SPeter Wemm { 2539c2aa98e2SPeter Wemm if (tTd(16, 1)) 254040266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 254140266059SGregory Neil Shapiro sm_errstring(save_errno)); 254240266059SGregory Neil Shapiro firstconnect = false; 254306f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2544c2aa98e2SPeter Wemm continue; 2545c2aa98e2SPeter Wemm } 2546c2aa98e2SPeter Wemm 254740266059SGregory Neil Shapiro if (LogLevel > 13) 2548c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2549c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2550c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 255140266059SGregory Neil Shapiro sm_errstring(save_errno)); 2552c2aa98e2SPeter Wemm 255340266059SGregory Neil Shapiro #if NETINET6 255440266059SGregory Neil Shapiro nextaddr: 255540266059SGregory Neil Shapiro #endif /* NETINET6 */ 255640266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 255740266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2558c2aa98e2SPeter Wemm { 2559c2aa98e2SPeter Wemm if (tTd(16, 1)) 256040266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 256140266059SGregory Neil Shapiro sm_errstring(save_errno)); 2562c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2563c2aa98e2SPeter Wemm { 2564c2aa98e2SPeter Wemm #if NETINET 2565c2aa98e2SPeter Wemm case AF_INET: 256606f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 256706f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2568c2aa98e2SPeter Wemm INADDRSZ); 2569c2aa98e2SPeter Wemm break; 257006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 257106f25ae9SGregory Neil Shapiro 257206f25ae9SGregory Neil Shapiro #if NETINET6 257306f25ae9SGregory Neil Shapiro case AF_INET6: 257406f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 257506f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 257606f25ae9SGregory Neil Shapiro IN6ADDRSZ); 257706f25ae9SGregory Neil Shapiro break; 257806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2579c2aa98e2SPeter Wemm 2580c2aa98e2SPeter Wemm default: 258106f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 258206f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2583c2aa98e2SPeter Wemm hp->h_length); 2584c2aa98e2SPeter Wemm break; 2585c2aa98e2SPeter Wemm } 2586c2aa98e2SPeter Wemm continue; 2587c2aa98e2SPeter Wemm } 258806f25ae9SGregory Neil Shapiro errno = save_errno; 2589c2aa98e2SPeter Wemm 259006f25ae9SGregory Neil Shapiro #if NETINET6 259106f25ae9SGregory Neil Shapiro if (family == AF_INET6) 259206f25ae9SGregory Neil Shapiro { 259306f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 259440266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 259540266059SGregory Neil Shapiro sm_errstring(save_errno)); 259640266059SGregory Neil Shapiro v6found = true; 259706f25ae9SGregory Neil Shapiro family = AF_INET; 2598193538b7SGregory Neil Shapiro if (hp != NULL) 2599193538b7SGregory Neil Shapiro { 2600193538b7SGregory Neil Shapiro freehostent(hp); 2601193538b7SGregory Neil Shapiro hp = NULL; 2602193538b7SGregory Neil Shapiro } 260306f25ae9SGregory Neil Shapiro goto v4retry; 260406f25ae9SGregory Neil Shapiro } 260506f25ae9SGregory Neil Shapiro v6tempfail: 260606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2607c2aa98e2SPeter Wemm /* couldn't open connection */ 260806f25ae9SGregory Neil Shapiro #if NETINET6 260906f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 261006f25ae9SGregory Neil Shapiro if (errno > 0) 261106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 261206f25ae9SGregory Neil Shapiro save_errno = errno; 261306f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 261440266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 261540266059SGregory Neil Shapiro sm_errstring(save_errno)); 261640266059SGregory Neil Shapiro #if XLA 2617c2aa98e2SPeter Wemm xla_host_end(host); 261806f25ae9SGregory Neil Shapiro #endif /* XLA */ 2619c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 262040266059SGregory Neil Shapiro #if NETINET6 2621193538b7SGregory Neil Shapiro if (hp != NULL) 2622193538b7SGregory Neil Shapiro freehostent(hp); 262340266059SGregory Neil Shapiro #endif /* NETINET6 */ 262406f25ae9SGregory Neil Shapiro errno = save_errno; 2625c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2626c2aa98e2SPeter Wemm } 2627c2aa98e2SPeter Wemm 262840266059SGregory Neil Shapiro #if NETINET6 2629193538b7SGregory Neil Shapiro if (hp != NULL) 2630193538b7SGregory Neil Shapiro { 2631193538b7SGregory Neil Shapiro freehostent(hp); 2632193538b7SGregory Neil Shapiro hp = NULL; 2633193538b7SGregory Neil Shapiro } 263440266059SGregory Neil Shapiro #endif /* NETINET6 */ 2635193538b7SGregory Neil Shapiro 2636c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 263706f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 263840266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 263940266059SGregory Neil Shapiro (void *) &s, 264040266059SGregory Neil Shapiro SM_IO_WRONLY, NULL)) == NULL || 2641c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 264240266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 264340266059SGregory Neil Shapiro (void *) &s, 264440266059SGregory Neil Shapiro SM_IO_RDONLY, NULL)) == NULL) 2645c2aa98e2SPeter Wemm { 264606f25ae9SGregory Neil Shapiro save_errno = errno; 2647c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2648c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 264906f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 265040266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 265106f25ae9SGregory Neil Shapiro (void) close(s); 265206f25ae9SGregory Neil Shapiro errno = save_errno; 265306f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 265406f25ae9SGregory Neil Shapiro } 265540266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 265640266059SGregory Neil Shapiro 265740266059SGregory Neil Shapiro /* set {client_flags} */ 265840266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 265940266059SGregory Neil Shapiro { 266040266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 266140266059SGregory Neil Shapiro macid("{client_flags}"), 266240266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 266340266059SGregory Neil Shapiro } 266440266059SGregory Neil Shapiro else 266540266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 266640266059SGregory Neil Shapiro macid("{client_flags}"), ""); 266740266059SGregory Neil Shapiro 266840266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 266940266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 267040266059SGregory Neil Shapiro { 267140266059SGregory Neil Shapiro /* look for just this one flag */ 267240266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 267340266059SGregory Neil Shapiro } 267406f25ae9SGregory Neil Shapiro 267506f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 267606f25ae9SGregory Neil Shapiro len = sizeof addr; 267706f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 267806f25ae9SGregory Neil Shapiro { 267906f25ae9SGregory Neil Shapiro char *name; 268040266059SGregory Neil Shapiro char family[5]; 268106f25ae9SGregory Neil Shapiro 268240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 268340266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 268440266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 268540266059SGregory Neil Shapiro addr.sa.sa_family); 268640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 268740266059SGregory Neil Shapiro macid("{if_family_out}"), family); 268806f25ae9SGregory Neil Shapiro 268906f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 269040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 269140266059SGregory Neil Shapiro macid("{if_name_out}"), name); 269206f25ae9SGregory Neil Shapiro if (LogLevel > 11) 269306f25ae9SGregory Neil Shapiro { 269406f25ae9SGregory Neil Shapiro /* log connection information */ 269506f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 269606f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 269706f25ae9SGregory Neil Shapiro } 269806f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 269906f25ae9SGregory Neil Shapiro { 270006f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 270106f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 270206f25ae9SGregory Neil Shapiro } 270306f25ae9SGregory Neil Shapiro } 270406f25ae9SGregory Neil Shapiro else 270506f25ae9SGregory Neil Shapiro { 270640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 270740266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 270840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 270940266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 271040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 271140266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 271206f25ae9SGregory Neil Shapiro } 271306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 271406f25ae9SGregory Neil Shapiro return EX_OK; 271506f25ae9SGregory Neil Shapiro } 271606f25ae9SGregory Neil Shapiro 271706f25ae9SGregory Neil Shapiro static void 271806f25ae9SGregory Neil Shapiro connecttimeout() 271906f25ae9SGregory Neil Shapiro { 27208774250cSGregory Neil Shapiro /* 27218774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 27228774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 27238774250cSGregory Neil Shapiro ** DOING. 27248774250cSGregory Neil Shapiro */ 27258774250cSGregory Neil Shapiro 272606f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 272706f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 272806f25ae9SGregory Neil Shapiro } 272940266059SGregory Neil Shapiro /* 273006f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 273106f25ae9SGregory Neil Shapiro ** 273206f25ae9SGregory Neil Shapiro ** Parameters: 273306f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 273406f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 273506f25ae9SGregory Neil Shapiro ** structure to be filled in. 273606f25ae9SGregory Neil Shapiro ** 273706f25ae9SGregory Neil Shapiro ** Returns: 273806f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 273906f25ae9SGregory Neil Shapiro ** made and if not why not. 274006f25ae9SGregory Neil Shapiro ** 274106f25ae9SGregory Neil Shapiro ** Side Effects: 274206f25ae9SGregory Neil Shapiro ** none. 274306f25ae9SGregory Neil Shapiro */ 274406f25ae9SGregory Neil Shapiro 274506f25ae9SGregory Neil Shapiro #if NETUNIX 274640266059SGregory Neil Shapiro int 274740266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 274806f25ae9SGregory Neil Shapiro char *mux_path; 274906f25ae9SGregory Neil Shapiro register MCI *mci; 275006f25ae9SGregory Neil Shapiro { 275106f25ae9SGregory Neil Shapiro int sock; 275206f25ae9SGregory Neil Shapiro int rval, save_errno; 275306f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 275406f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 275506f25ae9SGregory Neil Shapiro 275606f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 275706f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 275806f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 275906f25ae9SGregory Neil Shapiro 276006f25ae9SGregory Neil Shapiro if (rval != 0) 276106f25ae9SGregory Neil Shapiro { 276206f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket"); 276306f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 276406f25ae9SGregory Neil Shapiro errno = rval; 276506f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 276606f25ae9SGregory Neil Shapiro } 276706f25ae9SGregory Neil Shapiro 276806f25ae9SGregory Neil Shapiro /* prepare address structure */ 276906f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 277006f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 277106f25ae9SGregory Neil Shapiro 277206f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 277306f25ae9SGregory Neil Shapiro { 277406f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: domain socket name too long"); 277540266059SGregory Neil Shapiro 277640266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 277706f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 277806f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 277906f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 278006f25ae9SGregory Neil Shapiro } 278140266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 278240266059SGregory Neil Shapiro sizeof unix_addr.sun_path); 278306f25ae9SGregory Neil Shapiro 278406f25ae9SGregory Neil Shapiro /* initialize domain socket */ 278506f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 278606f25ae9SGregory Neil Shapiro if (sock == -1) 278706f25ae9SGregory Neil Shapiro { 278806f25ae9SGregory Neil Shapiro save_errno = errno; 278906f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket"); 279006f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 279106f25ae9SGregory Neil Shapiro errno = save_errno; 279206f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 279306f25ae9SGregory Neil Shapiro } 279406f25ae9SGregory Neil Shapiro 279506f25ae9SGregory Neil Shapiro /* connect to server */ 279606f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 279706f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 279806f25ae9SGregory Neil Shapiro { 279906f25ae9SGregory Neil Shapiro save_errno = errno; 280006f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 280106f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 280206f25ae9SGregory Neil Shapiro (void) close(sock); 280306f25ae9SGregory Neil Shapiro errno = save_errno; 280406f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 280506f25ae9SGregory Neil Shapiro } 280606f25ae9SGregory Neil Shapiro 280706f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 280806f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 280940266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 281040266059SGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY, NULL)) 281140266059SGregory Neil Shapiro == NULL 281240266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 281340266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 281440266059SGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY, NULL)) 281540266059SGregory Neil Shapiro == NULL) 281606f25ae9SGregory Neil Shapiro { 281706f25ae9SGregory Neil Shapiro save_errno = errno; 281806f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 281906f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 282006f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 282140266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 282206f25ae9SGregory Neil Shapiro (void) close(sock); 282306f25ae9SGregory Neil Shapiro errno = save_errno; 2824c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2825c2aa98e2SPeter Wemm } 282640266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 2827c2aa98e2SPeter Wemm 2828c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 282906f25ae9SGregory Neil Shapiro errno = 0; 283006f25ae9SGregory Neil Shapiro return EX_OK; 2831c2aa98e2SPeter Wemm } 283206f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 283340266059SGregory Neil Shapiro /* 283440266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 28358774250cSGregory Neil Shapiro ** 28368774250cSGregory Neil Shapiro ** Parameters: 283740266059SGregory Neil Shapiro ** none. 28388774250cSGregory Neil Shapiro ** 28398774250cSGregory Neil Shapiro ** Returns: 28408774250cSGregory Neil Shapiro ** none. 28418774250cSGregory Neil Shapiro ** 28428774250cSGregory Neil Shapiro ** Side Effects: 284340266059SGregory Neil Shapiro ** closes control socket, exits. 28448774250cSGregory Neil Shapiro */ 28458774250cSGregory Neil Shapiro 284640266059SGregory Neil Shapiro void 284740266059SGregory Neil Shapiro shutdown_daemon() 28488774250cSGregory Neil Shapiro { 284940266059SGregory Neil Shapiro int i; 285040266059SGregory Neil Shapiro char *reason; 28518774250cSGregory Neil Shapiro 285240266059SGregory Neil Shapiro sm_allsignals(true); 285340266059SGregory Neil Shapiro 285440266059SGregory Neil Shapiro reason = ShutdownRequest; 285540266059SGregory Neil Shapiro ShutdownRequest = NULL; 285640266059SGregory Neil Shapiro PendingSignal = 0; 285740266059SGregory Neil Shapiro 285840266059SGregory Neil Shapiro if (LogLevel > 79) 285940266059SGregory Neil Shapiro sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt (%s)", 286040266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 286140266059SGregory Neil Shapiro 286240266059SGregory Neil Shapiro FileName = NULL; 286340266059SGregory Neil Shapiro closecontrolsocket(true); 286440266059SGregory Neil Shapiro #if XLA 286540266059SGregory Neil Shapiro xla_all_end(); 286640266059SGregory Neil Shapiro #endif /* XLA */ 286740266059SGregory Neil Shapiro 286840266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 286940266059SGregory Neil Shapiro { 287040266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 287140266059SGregory Neil Shapiro { 287240266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 287340266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 287440266059SGregory Neil Shapiro 287540266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 287640266059SGregory Neil Shapiro # if NETUNIX 287740266059SGregory Neil Shapiro /* Remove named sockets */ 287840266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 287940266059SGregory Neil Shapiro { 288040266059SGregory Neil Shapiro int rval; 288140266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 288240266059SGregory Neil Shapiro 288340266059SGregory Neil Shapiro /* if not safe, don't use it */ 288440266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 288540266059SGregory Neil Shapiro RunAsUid, RunAsGid, 288640266059SGregory Neil Shapiro RunAsUserName, sff, 288740266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 288840266059SGregory Neil Shapiro if (rval == 0 && 288940266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 289040266059SGregory Neil Shapiro { 289140266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 289240266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 289340266059SGregory Neil Shapiro Daemons[i].d_name, 289440266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 289540266059SGregory Neil Shapiro sm_errstring(errno)); 28968774250cSGregory Neil Shapiro } 289740266059SGregory Neil Shapiro } 289840266059SGregory Neil Shapiro # endif /* NETUNIX */ 289940266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 290040266059SGregory Neil Shapiro } 290140266059SGregory Neil Shapiro } 290240266059SGregory Neil Shapiro 290340266059SGregory Neil Shapiro finis(false, true, EX_OK); 290440266059SGregory Neil Shapiro } 290540266059SGregory Neil Shapiro /* 29068774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 29078774250cSGregory Neil Shapiro ** 29088774250cSGregory Neil Shapiro ** Parameters: 29098774250cSGregory Neil Shapiro ** none. 29108774250cSGregory Neil Shapiro ** 29118774250cSGregory Neil Shapiro ** Returns: 29128774250cSGregory Neil Shapiro ** none. 29138774250cSGregory Neil Shapiro ** 29148774250cSGregory Neil Shapiro ** Side Effects: 29158774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 29168774250cSGregory Neil Shapiro */ 29178774250cSGregory Neil Shapiro 291813058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 291913058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 292013058a91SGregory Neil Shapiro do \ 292113058a91SGregory Neil Shapiro { \ 292240266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 292313058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 292440266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 292513058a91SGregory Neil Shapiro } while (0) 292613058a91SGregory Neil Shapiro 292740266059SGregory Neil Shapiro void 29288774250cSGregory Neil Shapiro restart_daemon() 29298774250cSGregory Neil Shapiro { 293040266059SGregory Neil Shapiro bool drop; 29318774250cSGregory Neil Shapiro int i; 29328774250cSGregory Neil Shapiro int save_errno; 29338774250cSGregory Neil Shapiro char *reason; 293413058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 29358774250cSGregory Neil Shapiro extern int DtableSize; 29368774250cSGregory Neil Shapiro 293713058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 293840266059SGregory Neil Shapiro sm_clear_events(); 293940266059SGregory Neil Shapiro sm_allsignals(true); 29408774250cSGregory Neil Shapiro 29418774250cSGregory Neil Shapiro reason = RestartRequest; 29428774250cSGregory Neil Shapiro RestartRequest = NULL; 29438774250cSGregory Neil Shapiro PendingSignal = 0; 29448774250cSGregory Neil Shapiro 29458774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 29468774250cSGregory Neil Shapiro { 29478774250cSGregory Neil Shapiro if (LogLevel > 3) 29488774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 29498774250cSGregory Neil Shapiro "could not restart: need full path"); 295040266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 295140266059SGregory Neil Shapiro /* NOTREACHED */ 29528774250cSGregory Neil Shapiro } 29538774250cSGregory Neil Shapiro if (LogLevel > 3) 29548774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 29558774250cSGregory Neil Shapiro SaveArgv[0], 29568774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 29578774250cSGregory Neil Shapiro 295840266059SGregory Neil Shapiro closecontrolsocket(true); 295994c01205SGregory Neil Shapiro #if SM_CONF_SHM 296094c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 296194c01205SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 296240266059SGregory Neil Shapiro 296340266059SGregory Neil Shapiro /* 296440266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 296540266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 296640266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 296740266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 296840266059SGregory Neil Shapiro */ 296940266059SGregory Neil Shapiro 297040266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 297140266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 297240266059SGregory Neil Shapiro 297340266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 29748774250cSGregory Neil Shapiro { 29758774250cSGregory Neil Shapiro if (LogLevel > 0) 29768774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 297740266059SGregory Neil Shapiro "could not drop privileges: %s", 297840266059SGregory Neil Shapiro sm_errstring(errno)); 297940266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 298040266059SGregory Neil Shapiro /* NOTREACHED */ 29818774250cSGregory Neil Shapiro } 29828774250cSGregory Neil Shapiro 29838774250cSGregory Neil Shapiro /* arrange for all the files to be closed */ 29848774250cSGregory Neil Shapiro for (i = 3; i < DtableSize; i++) 29858774250cSGregory Neil Shapiro { 29868774250cSGregory Neil Shapiro register int j; 29878774250cSGregory Neil Shapiro 29888774250cSGregory Neil Shapiro if ((j = fcntl(i, F_GETFD, 0)) != -1) 29898774250cSGregory Neil Shapiro (void) fcntl(i, F_SETFD, j | FD_CLOEXEC); 29908774250cSGregory Neil Shapiro } 29918774250cSGregory Neil Shapiro 299213058a91SGregory Neil Shapiro /* 299313058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 299413058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 299513058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 299613058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 299713058a91SGregory Neil Shapiro */ 299813058a91SGregory Neil Shapiro 299913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 300013058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 300113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 300213058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 300313058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 300413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 300513058a91SGregory Neil Shapiro #ifdef SIGUSR1 300613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 300713058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 3008605302a5SGregory Neil Shapiro 3009605302a5SGregory Neil Shapiro /* Turn back on signals */ 301040266059SGregory Neil Shapiro sm_allsignals(false); 30118774250cSGregory Neil Shapiro 30128774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 30138774250cSGregory Neil Shapiro save_errno = errno; 30148774250cSGregory Neil Shapiro 301513058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 301640266059SGregory Neil Shapiro sm_allsignals(true); 301713058a91SGregory Neil Shapiro 301813058a91SGregory Neil Shapiro /* For finis() events */ 301940266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 302013058a91SGregory Neil Shapiro 302113058a91SGregory Neil Shapiro #ifdef SIGUSR1 302213058a91SGregory Neil Shapiro /* For debugging finis() */ 302340266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 302413058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 30258774250cSGregory Neil Shapiro 30268774250cSGregory Neil Shapiro errno = save_errno; 30278774250cSGregory Neil Shapiro if (LogLevel > 0) 302840266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 302940266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 303040266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 303140266059SGregory Neil Shapiro /* NOTREACHED */ 30328774250cSGregory Neil Shapiro } 303340266059SGregory Neil Shapiro /* 3034c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3035c2aa98e2SPeter Wemm ** 3036c2aa98e2SPeter Wemm ** Parameters: 3037c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3038c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3039c2aa98e2SPeter Wemm ** 3040c2aa98e2SPeter Wemm ** Returns: 3041c2aa98e2SPeter Wemm ** A list of aliases for this host. 3042c2aa98e2SPeter Wemm ** 3043c2aa98e2SPeter Wemm ** Side Effects: 3044c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3045c2aa98e2SPeter Wemm */ 3046c2aa98e2SPeter Wemm 3047c2aa98e2SPeter Wemm struct hostent * 3048c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3049c2aa98e2SPeter Wemm char hostbuf[]; 3050c2aa98e2SPeter Wemm int size; 3051c2aa98e2SPeter Wemm { 3052c2aa98e2SPeter Wemm register struct hostent *hp; 3053c2aa98e2SPeter Wemm 3054602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 305540266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 305606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 305713058a91SGregory Neil Shapiro #if NETINET && NETINET6 305813058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 305913058a91SGregory Neil Shapiro { 306013058a91SGregory Neil Shapiro /* 306113058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 306213058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 306313058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 306413058a91SGregory Neil Shapiro */ 306513058a91SGregory Neil Shapiro 306613058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 306713058a91SGregory Neil Shapiro } 306813058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3069c2aa98e2SPeter Wemm if (hp == NULL) 3070c2aa98e2SPeter Wemm return NULL; 3071c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 307206f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 307306f25ae9SGregory Neil Shapiro 307406f25ae9SGregory Neil Shapiro #if NETINFO 307506f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3076c2aa98e2SPeter Wemm { 307706f25ae9SGregory Neil Shapiro char *domainname; 307806f25ae9SGregory Neil Shapiro 307906f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 308006f25ae9SGregory Neil Shapiro "domain", '\0'); 308106f25ae9SGregory Neil Shapiro if (domainname != NULL && 308206f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 308340266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 308406f25ae9SGregory Neil Shapiro } 308506f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3086c2aa98e2SPeter Wemm 3087c2aa98e2SPeter Wemm /* 3088c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3089c2aa98e2SPeter Wemm ** dotted alias. 3090c2aa98e2SPeter Wemm */ 3091c2aa98e2SPeter Wemm 3092c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3093c2aa98e2SPeter Wemm { 3094c2aa98e2SPeter Wemm char **ha; 3095c2aa98e2SPeter Wemm 309606f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3097c2aa98e2SPeter Wemm { 3098c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3099c2aa98e2SPeter Wemm { 310006f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3101c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3102c2aa98e2SPeter Wemm break; 3103c2aa98e2SPeter Wemm } 3104c2aa98e2SPeter Wemm } 3105c2aa98e2SPeter Wemm } 3106c2aa98e2SPeter Wemm 3107c2aa98e2SPeter Wemm /* 3108c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3109c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3110c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3111c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3112c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3113c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3114c2aa98e2SPeter Wemm */ 3115c2aa98e2SPeter Wemm 3116c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 311740266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3118c2aa98e2SPeter Wemm { 3119c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 3120c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3121c2aa98e2SPeter Wemm hostbuf); 3122c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3123c2aa98e2SPeter Wemm hostbuf); 312406f25ae9SGregory Neil Shapiro (void) sleep(60); 312540266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3126c2aa98e2SPeter Wemm { 3127c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 3128c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3129c2aa98e2SPeter Wemm hostbuf); 3130c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3131c2aa98e2SPeter Wemm hostbuf); 3132c2aa98e2SPeter Wemm } 3133c2aa98e2SPeter Wemm } 313406f25ae9SGregory Neil Shapiro return hp; 3135c2aa98e2SPeter Wemm } 313640266059SGregory Neil Shapiro /* 3137c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3138c2aa98e2SPeter Wemm ** 3139c2aa98e2SPeter Wemm ** Parameters: 3140c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3141c2aa98e2SPeter Wemm ** ha -- actual first address 3142c2aa98e2SPeter Wemm ** sa -- second address 3143c2aa98e2SPeter Wemm ** 3144c2aa98e2SPeter Wemm ** Returns: 3145c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3146c2aa98e2SPeter Wemm ** else -- they don't match 3147c2aa98e2SPeter Wemm */ 3148c2aa98e2SPeter Wemm 314906f25ae9SGregory Neil Shapiro static int 3150c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3151c2aa98e2SPeter Wemm struct hostent *hp; 3152c2aa98e2SPeter Wemm char *ha; 3153c2aa98e2SPeter Wemm SOCKADDR *sa; 3154c2aa98e2SPeter Wemm { 315506f25ae9SGregory Neil Shapiro #if NETINET6 315640266059SGregory Neil Shapiro unsigned char *a; 315706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 315806f25ae9SGregory Neil Shapiro 3159c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3160c2aa98e2SPeter Wemm { 316106f25ae9SGregory Neil Shapiro #if NETINET 3162c2aa98e2SPeter Wemm case AF_INET: 3163c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 316406f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3165c2aa98e2SPeter Wemm break; 316606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3167c2aa98e2SPeter Wemm 316806f25ae9SGregory Neil Shapiro #if NETINET6 316906f25ae9SGregory Neil Shapiro case AF_INET6: 317040266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 317106f25ae9SGregory Neil Shapiro 317206f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 317306f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 317406f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 317506f25ae9SGregory Neil Shapiro 317606f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 317706f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 317806f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 317906f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 318006f25ae9SGregory Neil Shapiro break; 318106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3182c2aa98e2SPeter Wemm } 3183c2aa98e2SPeter Wemm return -1; 3184c2aa98e2SPeter Wemm } 318540266059SGregory Neil Shapiro /* 318606f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3187c2aa98e2SPeter Wemm ** 3188c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3189c2aa98e2SPeter Wemm ** 3190c2aa98e2SPeter Wemm ** Parameters: 3191c2aa98e2SPeter Wemm ** fd -- the descriptor 319240266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3193c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 319440266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3195c2aa98e2SPeter Wemm ** 3196c2aa98e2SPeter Wemm ** Returns: 3197c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3198c2aa98e2SPeter Wemm */ 3199c2aa98e2SPeter Wemm 3200c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3201c2aa98e2SPeter Wemm 3202c2aa98e2SPeter Wemm static void 3203c2aa98e2SPeter Wemm authtimeout() 3204c2aa98e2SPeter Wemm { 32058774250cSGregory Neil Shapiro /* 32068774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 32078774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 32088774250cSGregory Neil Shapiro ** DOING. 32098774250cSGregory Neil Shapiro */ 32108774250cSGregory Neil Shapiro 32118774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3212c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3213c2aa98e2SPeter Wemm } 3214c2aa98e2SPeter Wemm 3215c2aa98e2SPeter Wemm char * 3216c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3217c2aa98e2SPeter Wemm int fd; 3218c2aa98e2SPeter Wemm bool *may_be_forged; 3219c2aa98e2SPeter Wemm { 322040266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3221c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3222c2aa98e2SPeter Wemm register char *volatile p = NULL; 3223c2aa98e2SPeter Wemm SOCKADDR la; 3224c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 322540266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3226c2aa98e2SPeter Wemm register struct servent *sp; 322740266059SGregory Neil Shapiro # if NETINET 322840266059SGregory Neil Shapiro static unsigned short port4 = 0; 322940266059SGregory Neil Shapiro # endif /* NETINET */ 323040266059SGregory Neil Shapiro # if NETINET6 323140266059SGregory Neil Shapiro static unsigned short port6 = 0; 323240266059SGregory Neil Shapiro # endif /* NETINET6 */ 323340266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3234c2aa98e2SPeter Wemm volatile int s; 3235c2aa98e2SPeter Wemm int i = 0; 323640266059SGregory Neil Shapiro size_t len; 323740266059SGregory Neil Shapiro SM_EVENT *ev; 3238c2aa98e2SPeter Wemm int nleft; 3239c2aa98e2SPeter Wemm struct hostent *hp; 3240c2aa98e2SPeter Wemm char *ostype = NULL; 3241c2aa98e2SPeter Wemm char **ha; 3242c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 3243c2aa98e2SPeter Wemm static char hbuf[MAXNAME * 2 + 11]; 3244c2aa98e2SPeter Wemm 324540266059SGregory Neil Shapiro *may_be_forged = false; 3246c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 3247c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3248c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3249c2aa98e2SPeter Wemm { 325006f25ae9SGregory Neil Shapiro if (i < 0) 325106f25ae9SGregory Neil Shapiro { 325206f25ae9SGregory Neil Shapiro /* 325306f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 325406f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 325506f25ae9SGregory Neil Shapiro ** happen later. 325606f25ae9SGregory Neil Shapiro */ 325740266059SGregory Neil Shapiro 325806f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3259c2aa98e2SPeter Wemm return NULL; 326006f25ae9SGregory Neil Shapiro errno = 0; 326106f25ae9SGregory Neil Shapiro } 326240266059SGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof hbuf, 2, RealUserName, 326340266059SGregory Neil Shapiro "@localhost"); 3264c2aa98e2SPeter Wemm if (tTd(9, 1)) 326540266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3266c2aa98e2SPeter Wemm return hbuf; 3267c2aa98e2SPeter Wemm } 3268c2aa98e2SPeter Wemm 3269c2aa98e2SPeter Wemm if (RealHostName == NULL) 3270c2aa98e2SPeter Wemm { 3271c2aa98e2SPeter Wemm /* translate that to a host name */ 3272c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3273c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 327440266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3275c2aa98e2SPeter Wemm } 3276c2aa98e2SPeter Wemm 3277c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 327840266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 327940266059SGregory Neil Shapiro RealHostName[0] != '[') 3280c2aa98e2SPeter Wemm { 328113058a91SGregory Neil Shapiro int family; 3282c2aa98e2SPeter Wemm 328313058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 328413058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 328513058a91SGregory Neil Shapiro /* 328613058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 328713058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 328813058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 328913058a91SGregory Neil Shapiro ** RealHostAddr. 329013058a91SGregory Neil Shapiro ** 329113058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 329213058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 329313058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 329413058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 329513058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 329613058a91SGregory Neil Shapiro */ 329713058a91SGregory Neil Shapiro 329813058a91SGregory Neil Shapiro if (family == AF_INET6 && 329913058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 330013058a91SGregory Neil Shapiro family = AF_INET; 330113058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 330213058a91SGregory Neil Shapiro 330313058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 330413058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3305c2aa98e2SPeter Wemm if (hp == NULL) 330640266059SGregory Neil Shapiro *may_be_forged = true; 3307c2aa98e2SPeter Wemm else 3308c2aa98e2SPeter Wemm { 3309c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 331040266059SGregory Neil Shapiro { 3311c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3312c2aa98e2SPeter Wemm break; 331340266059SGregory Neil Shapiro } 3314c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 331540266059SGregory Neil Shapiro #if NETINET6 3316193538b7SGregory Neil Shapiro freehostent(hp); 3317193538b7SGregory Neil Shapiro hp = NULL; 331840266059SGregory Neil Shapiro #endif /* NETINET6 */ 3319c2aa98e2SPeter Wemm } 3320c2aa98e2SPeter Wemm } 3321c2aa98e2SPeter Wemm 3322c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3323c2aa98e2SPeter Wemm goto noident; 3324c2aa98e2SPeter Wemm 3325c2aa98e2SPeter Wemm lalen = sizeof la; 332606f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 332706f25ae9SGregory Neil Shapiro { 332806f25ae9SGregory Neil Shapiro #if NETINET 332906f25ae9SGregory Neil Shapiro case AF_INET: 333006f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 333106f25ae9SGregory Neil Shapiro lalen <= 0 || 3332c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3333c2aa98e2SPeter Wemm { 3334c2aa98e2SPeter Wemm /* no ident info */ 3335c2aa98e2SPeter Wemm goto noident; 3336c2aa98e2SPeter Wemm } 333706f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3338c2aa98e2SPeter Wemm 3339c2aa98e2SPeter Wemm /* create ident query */ 334040266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 334106f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 334206f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3343c2aa98e2SPeter Wemm 3344c2aa98e2SPeter Wemm /* create local address */ 3345c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3346c2aa98e2SPeter Wemm 3347c2aa98e2SPeter Wemm /* create foreign address */ 334806f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 334906f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 335006f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 335140266059SGregory Neil Shapiro 335240266059SGregory Neil Shapiro /* 335340266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 335440266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 335540266059SGregory Neil Shapiro ** spent in this routine). 335640266059SGregory Neil Shapiro ** Hence we store the port in a static variable 335740266059SGregory Neil Shapiro ** to save this time. 335840266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 335940266059SGregory Neil Shapiro ** This code makes the assumption that the port number 336040266059SGregory Neil Shapiro ** is not 0. 336140266059SGregory Neil Shapiro */ 336240266059SGregory Neil Shapiro 336340266059SGregory Neil Shapiro if (port4 == 0) 336440266059SGregory Neil Shapiro { 3365c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3366c2aa98e2SPeter Wemm if (sp != NULL) 336740266059SGregory Neil Shapiro port4 = sp->s_port; 3368c2aa98e2SPeter Wemm else 336940266059SGregory Neil Shapiro port4 = htons(113); 337040266059SGregory Neil Shapiro } 337140266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 337206f25ae9SGregory Neil Shapiro break; 337306f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 337406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 337506f25ae9SGregory Neil Shapiro 337606f25ae9SGregory Neil Shapiro #if NETINET6 337706f25ae9SGregory Neil Shapiro case AF_INET6: 337806f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 337906f25ae9SGregory Neil Shapiro lalen <= 0 || 338006f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 338106f25ae9SGregory Neil Shapiro { 338206f25ae9SGregory Neil Shapiro /* no ident info */ 338306f25ae9SGregory Neil Shapiro goto noident; 338406f25ae9SGregory Neil Shapiro } 338506f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 338606f25ae9SGregory Neil Shapiro 338706f25ae9SGregory Neil Shapiro /* create ident query */ 338840266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 338906f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 339006f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 339106f25ae9SGregory Neil Shapiro 339206f25ae9SGregory Neil Shapiro /* create local address */ 339306f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 339406f25ae9SGregory Neil Shapiro 339506f25ae9SGregory Neil Shapiro /* create foreign address */ 339606f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 339706f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 339806f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 339940266059SGregory Neil Shapiro if (port6 == 0) 340040266059SGregory Neil Shapiro { 340106f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 340206f25ae9SGregory Neil Shapiro if (sp != NULL) 340340266059SGregory Neil Shapiro port6 = sp->s_port; 340406f25ae9SGregory Neil Shapiro else 340540266059SGregory Neil Shapiro port6 = htons(113); 340640266059SGregory Neil Shapiro } 340740266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 340806f25ae9SGregory Neil Shapiro break; 340906f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 341006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 341106f25ae9SGregory Neil Shapiro default: 341206f25ae9SGregory Neil Shapiro /* no ident info */ 341306f25ae9SGregory Neil Shapiro goto noident; 341406f25ae9SGregory Neil Shapiro } 3415c2aa98e2SPeter Wemm 3416c2aa98e2SPeter Wemm s = -1; 3417c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3418c2aa98e2SPeter Wemm { 3419c2aa98e2SPeter Wemm if (s >= 0) 3420c2aa98e2SPeter Wemm (void) close(s); 3421c2aa98e2SPeter Wemm goto noident; 3422c2aa98e2SPeter Wemm } 3423c2aa98e2SPeter Wemm 3424c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 342540266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3426c2aa98e2SPeter Wemm 342706f25ae9SGregory Neil Shapiro 3428c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 342906f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3430c2aa98e2SPeter Wemm if (s < 0) 3431c2aa98e2SPeter Wemm { 343240266059SGregory Neil Shapiro sm_clrevent(ev); 3433c2aa98e2SPeter Wemm goto noident; 3434c2aa98e2SPeter Wemm } 343506f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 343606f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3437c2aa98e2SPeter Wemm goto closeident; 3438c2aa98e2SPeter Wemm 3439c2aa98e2SPeter Wemm if (tTd(9, 10)) 344040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3441c2aa98e2SPeter Wemm 3442c2aa98e2SPeter Wemm /* send query */ 3443c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3444c2aa98e2SPeter Wemm goto closeident; 3445c2aa98e2SPeter Wemm 3446c2aa98e2SPeter Wemm /* get result */ 3447c2aa98e2SPeter Wemm p = &ibuf[0]; 3448c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 3449c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3450c2aa98e2SPeter Wemm { 3451c2aa98e2SPeter Wemm p += i; 3452c2aa98e2SPeter Wemm nleft -= i; 3453c2aa98e2SPeter Wemm *p = '\0'; 345440266059SGregory Neil Shapiro if (strchr(ibuf, '\n') != NULL || nleft <= 0) 3455c2aa98e2SPeter Wemm break; 3456c2aa98e2SPeter Wemm } 3457c2aa98e2SPeter Wemm (void) close(s); 345840266059SGregory Neil Shapiro sm_clrevent(ev); 3459c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3460c2aa98e2SPeter Wemm goto noident; 3461c2aa98e2SPeter Wemm 3462c2aa98e2SPeter Wemm if (*--p == '\n' && *--p == '\r') 3463c2aa98e2SPeter Wemm p--; 3464c2aa98e2SPeter Wemm *++p = '\0'; 3465c2aa98e2SPeter Wemm 3466c2aa98e2SPeter Wemm if (tTd(9, 3)) 346740266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3468c2aa98e2SPeter Wemm 3469c2aa98e2SPeter Wemm /* parse result */ 3470c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3471c2aa98e2SPeter Wemm if (p == NULL) 3472c2aa98e2SPeter Wemm { 3473c2aa98e2SPeter Wemm /* malformed response */ 3474c2aa98e2SPeter Wemm goto noident; 3475c2aa98e2SPeter Wemm } 3476c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3477c2aa98e2SPeter Wemm continue; 347840266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3479c2aa98e2SPeter Wemm { 3480c2aa98e2SPeter Wemm /* presumably an error string */ 3481c2aa98e2SPeter Wemm goto noident; 3482c2aa98e2SPeter Wemm } 3483c2aa98e2SPeter Wemm p += 6; 3484c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3485c2aa98e2SPeter Wemm p++; 3486c2aa98e2SPeter Wemm if (*p++ != ':') 3487c2aa98e2SPeter Wemm { 3488c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3489c2aa98e2SPeter Wemm goto noident; 3490c2aa98e2SPeter Wemm } 3491c2aa98e2SPeter Wemm 3492c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3493c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3494c2aa98e2SPeter Wemm p++; 3495c2aa98e2SPeter Wemm ostype = p; 3496c2aa98e2SPeter Wemm p = strchr(p, ':'); 3497c2aa98e2SPeter Wemm if (p == NULL) 3498c2aa98e2SPeter Wemm { 3499c2aa98e2SPeter Wemm /* malformed response */ 3500c2aa98e2SPeter Wemm goto noident; 3501c2aa98e2SPeter Wemm } 3502c2aa98e2SPeter Wemm else 3503c2aa98e2SPeter Wemm { 3504c2aa98e2SPeter Wemm char *charset; 3505c2aa98e2SPeter Wemm 3506c2aa98e2SPeter Wemm *p = '\0'; 3507c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3508c2aa98e2SPeter Wemm if (charset != NULL) 3509c2aa98e2SPeter Wemm *charset = '\0'; 3510c2aa98e2SPeter Wemm } 3511c2aa98e2SPeter Wemm 3512c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3513c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3514c2aa98e2SPeter Wemm continue; 3515c2aa98e2SPeter Wemm 3516c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 351740266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3518c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3519c2aa98e2SPeter Wemm { 352040266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof hbuf); 3521c2aa98e2SPeter Wemm cleanstrcpy(&hbuf[6], p, MAXNAME); 3522c2aa98e2SPeter Wemm } 3523c2aa98e2SPeter Wemm else 3524c2aa98e2SPeter Wemm cleanstrcpy(hbuf, p, MAXNAME); 352540266059SGregory Neil Shapiro len = strlen(hbuf); 352640266059SGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof hbuf - len, 2, "@", 3527c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3528c2aa98e2SPeter Wemm goto postident; 3529c2aa98e2SPeter Wemm 3530c2aa98e2SPeter Wemm closeident: 3531c2aa98e2SPeter Wemm (void) close(s); 353240266059SGregory Neil Shapiro sm_clrevent(ev); 3533c2aa98e2SPeter Wemm 3534c2aa98e2SPeter Wemm noident: 353506f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 353606f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 353706f25ae9SGregory Neil Shapiro { 353806f25ae9SGregory Neil Shapiro #if NETINET 353906f25ae9SGregory Neil Shapiro case AF_INET: 354006f25ae9SGregory Neil Shapiro if (port > 0) 354106f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 354206f25ae9SGregory Neil Shapiro break; 354306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 354406f25ae9SGregory Neil Shapiro 354506f25ae9SGregory Neil Shapiro #if NETINET6 354606f25ae9SGregory Neil Shapiro case AF_INET6: 354706f25ae9SGregory Neil Shapiro if (port > 0) 354806f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 354906f25ae9SGregory Neil Shapiro break; 355006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 355106f25ae9SGregory Neil Shapiro } 355206f25ae9SGregory Neil Shapiro 3553c2aa98e2SPeter Wemm if (RealHostName == NULL) 3554c2aa98e2SPeter Wemm { 3555c2aa98e2SPeter Wemm if (tTd(9, 1)) 355640266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3557c2aa98e2SPeter Wemm return NULL; 3558c2aa98e2SPeter Wemm } 355940266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof hbuf); 3560c2aa98e2SPeter Wemm 3561c2aa98e2SPeter Wemm postident: 3562c2aa98e2SPeter Wemm #if IP_SRCROUTE 3563c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3564c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 356506f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3566c2aa98e2SPeter Wemm /* 3567c2aa98e2SPeter Wemm ** Extract IP source routing information. 3568c2aa98e2SPeter Wemm ** 3569c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3570c2aa98e2SPeter Wemm ** through c to d: 3571c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3572c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3573c2aa98e2SPeter Wemm ** 3574c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3575c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3576c2aa98e2SPeter Wemm ** p - pointer to hbuf 3577c2aa98e2SPeter Wemm */ 3578c2aa98e2SPeter Wemm 3579c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3580c2aa98e2SPeter Wemm { 3581c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3582c2aa98e2SPeter Wemm int j; 358340266059SGregory Neil Shapiro unsigned char *q; 358440266059SGregory Neil Shapiro unsigned char *o; 3585c2aa98e2SPeter Wemm int l; 358606f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3587c2aa98e2SPeter Wemm 3588c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3589c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3590c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3591c2aa98e2SPeter Wemm goto noipsr; 3592c2aa98e2SPeter Wemm if (ipoptlen == 0) 3593c2aa98e2SPeter Wemm goto noipsr; 359440266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 359540266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3596c2aa98e2SPeter Wemm { 3597c2aa98e2SPeter Wemm switch (*o) 3598c2aa98e2SPeter Wemm { 3599c2aa98e2SPeter Wemm case IPOPT_EOL: 3600c2aa98e2SPeter Wemm o = NULL; 3601c2aa98e2SPeter Wemm break; 3602c2aa98e2SPeter Wemm 3603c2aa98e2SPeter Wemm case IPOPT_NOP: 3604c2aa98e2SPeter Wemm o++; 3605c2aa98e2SPeter Wemm break; 3606c2aa98e2SPeter Wemm 3607c2aa98e2SPeter Wemm case IPOPT_SSRR: 3608c2aa98e2SPeter Wemm case IPOPT_LSRR: 3609c2aa98e2SPeter Wemm /* 3610c2aa98e2SPeter Wemm ** Source routing. 3611c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3612c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3613c2aa98e2SPeter Wemm ** including option type and 3614c2aa98e2SPeter Wemm ** length. 3615c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3616c2aa98e2SPeter Wemm ** data. 3617c2aa98e2SPeter Wemm ** o[3] begins the route data. 3618c2aa98e2SPeter Wemm */ 3619c2aa98e2SPeter Wemm 3620c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3621c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 362240266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 362340266059SGregory Neil Shapiro " [%s@%.*s", 3624c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3625c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 362606f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3627c2aa98e2SPeter Wemm i = strlen(p); 3628c2aa98e2SPeter Wemm p += i; 3629c2aa98e2SPeter Wemm l -= strlen(p); 3630c2aa98e2SPeter Wemm 3631c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3632c2aa98e2SPeter Wemm 3633c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3634c2aa98e2SPeter Wemm q = &o[3]; 3635c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3636c2aa98e2SPeter Wemm { 363706f25ae9SGregory Neil Shapiro struct in_addr addr; 363806f25ae9SGregory Neil Shapiro 3639c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 364040266059SGregory Neil Shapiro (void) sm_snprintf(p, 364140266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3642c2aa98e2SPeter Wemm "%c%.*s", 3643c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3644c2aa98e2SPeter Wemm l > 240 ? 120 : 3645c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3646c2aa98e2SPeter Wemm inet_ntoa(addr)); 3647c2aa98e2SPeter Wemm i = strlen(p); 3648c2aa98e2SPeter Wemm p += i; 3649c2aa98e2SPeter Wemm l -= i + 1; 3650c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3651c2aa98e2SPeter Wemm } 3652c2aa98e2SPeter Wemm o += o[1]; 3653c2aa98e2SPeter Wemm break; 3654c2aa98e2SPeter Wemm 3655c2aa98e2SPeter Wemm default: 3656c2aa98e2SPeter Wemm /* Skip over option */ 3657c2aa98e2SPeter Wemm o += o[1]; 3658c2aa98e2SPeter Wemm break; 3659c2aa98e2SPeter Wemm } 3660c2aa98e2SPeter Wemm } 366140266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3662c2aa98e2SPeter Wemm goto postipsr; 3663c2aa98e2SPeter Wemm } 3664c2aa98e2SPeter Wemm 3665c2aa98e2SPeter Wemm noipsr: 366606f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3667c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3668c2aa98e2SPeter Wemm { 3669c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 367040266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3671c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3672c2aa98e2SPeter Wemm } 3673c2aa98e2SPeter Wemm if (*may_be_forged) 3674c2aa98e2SPeter Wemm { 3675c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 367640266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 367740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 367840266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3679c2aa98e2SPeter Wemm } 3680c2aa98e2SPeter Wemm 3681c2aa98e2SPeter Wemm #if IP_SRCROUTE 3682c2aa98e2SPeter Wemm postipsr: 368306f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 368406f25ae9SGregory Neil Shapiro 368506f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 368606f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 368706f25ae9SGregory Neil Shapiro { 368806f25ae9SGregory Neil Shapiro #if NETINET 368906f25ae9SGregory Neil Shapiro case AF_INET: 369006f25ae9SGregory Neil Shapiro if (port > 0) 369106f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 369206f25ae9SGregory Neil Shapiro break; 369306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 369406f25ae9SGregory Neil Shapiro 369506f25ae9SGregory Neil Shapiro #if NETINET6 369606f25ae9SGregory Neil Shapiro case AF_INET6: 369706f25ae9SGregory Neil Shapiro if (port > 0) 369806f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 369906f25ae9SGregory Neil Shapiro break; 370006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 370106f25ae9SGregory Neil Shapiro } 370206f25ae9SGregory Neil Shapiro 370340266059SGregory Neil Shapiro if (tTd(9, 1)) 370440266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3705c2aa98e2SPeter Wemm return hbuf; 3706c2aa98e2SPeter Wemm } 370740266059SGregory Neil Shapiro /* 3708c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3709c2aa98e2SPeter Wemm ** 3710c2aa98e2SPeter Wemm ** Parameters: 3711c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3712c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3713c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3714c2aa98e2SPeter Wemm ** functions. 3715c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3716c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3717c2aa98e2SPeter Wemm ** 3718c2aa98e2SPeter Wemm ** Returns: 3719c2aa98e2SPeter Wemm ** The mapping, if found. 3720c2aa98e2SPeter Wemm ** NULL if no mapping found. 3721c2aa98e2SPeter Wemm ** 3722c2aa98e2SPeter Wemm ** Side Effects: 3723c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3724c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3725c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3726c2aa98e2SPeter Wemm ** status only to be returned). 3727c2aa98e2SPeter Wemm */ 3728c2aa98e2SPeter Wemm 3729c2aa98e2SPeter Wemm char * 3730c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3731c2aa98e2SPeter Wemm MAP *map; 3732c2aa98e2SPeter Wemm char *name; 3733c2aa98e2SPeter Wemm char **av; 3734c2aa98e2SPeter Wemm int *statp; 3735c2aa98e2SPeter Wemm { 3736c2aa98e2SPeter Wemm register struct hostent *hp; 373706f25ae9SGregory Neil Shapiro #if NETINET 3738c2aa98e2SPeter Wemm struct in_addr in_addr; 373906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 374006f25ae9SGregory Neil Shapiro #if NETINET6 374106f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 374206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 374306f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3744c2aa98e2SPeter Wemm register STAB *s; 374540266059SGregory Neil Shapiro time_t now; 374640266059SGregory Neil Shapiro #if NAMED_BIND 374740266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 374840266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 374940266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3750c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3751c2aa98e2SPeter Wemm 3752c2aa98e2SPeter Wemm /* 3753c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 375440266059SGregory Neil Shapiro ** return it (unless expired). 3755c2aa98e2SPeter Wemm */ 3756c2aa98e2SPeter Wemm 375740266059SGregory Neil Shapiro now = curtime(); 3758c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 375940266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 376040266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3761c2aa98e2SPeter Wemm { 3762c2aa98e2SPeter Wemm if (tTd(9, 1)) 376340266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3764c2aa98e2SPeter Wemm name, 3765c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3766c2aa98e2SPeter Wemm ? "NULL" 3767c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3768c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3769602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3770c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3771c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3772c2aa98e2SPeter Wemm { 3773c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3774c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3775c2aa98e2SPeter Wemm shortenstring(name, 33)); 3776c2aa98e2SPeter Wemm } 3777c2aa98e2SPeter Wemm if (*statp != EX_OK) 3778c2aa98e2SPeter Wemm return NULL; 3779c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3780c2aa98e2SPeter Wemm { 3781c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno = %d, h_errno = %d", 3782c2aa98e2SPeter Wemm name, 3783c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3784c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3785c2aa98e2SPeter Wemm return NULL; 3786c2aa98e2SPeter Wemm } 3787c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3788c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3789c2aa98e2SPeter Wemm else 3790c2aa98e2SPeter Wemm cp = map_rewrite(map, 3791c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3792c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3793c2aa98e2SPeter Wemm av); 3794c2aa98e2SPeter Wemm return cp; 3795c2aa98e2SPeter Wemm } 3796c2aa98e2SPeter Wemm 3797c2aa98e2SPeter Wemm /* 3798c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3799c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3800c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3801c2aa98e2SPeter Wemm */ 3802c2aa98e2SPeter Wemm 380306f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 380406f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3805c2aa98e2SPeter Wemm { 3806c2aa98e2SPeter Wemm if (tTd(9, 1)) 380740266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3808c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3809c2aa98e2SPeter Wemm return NULL; 3810c2aa98e2SPeter Wemm } 3811c2aa98e2SPeter Wemm 3812c2aa98e2SPeter Wemm /* 3813c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3814c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3815c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3816c2aa98e2SPeter Wemm ** unknown. 3817c2aa98e2SPeter Wemm */ 3818c2aa98e2SPeter Wemm 381906f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 382040266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 382140266059SGregory Neil Shapiro #if NAMED_BIND 382240266059SGregory Neil Shapiro if (map->map_timeout > 0) 382340266059SGregory Neil Shapiro { 382440266059SGregory Neil Shapiro retrans = _res.retrans; 382540266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 382640266059SGregory Neil Shapiro } 382740266059SGregory Neil Shapiro if (map->map_retry > 0) 382840266059SGregory Neil Shapiro { 382940266059SGregory Neil Shapiro retry = _res.retry; 383040266059SGregory Neil Shapiro _res.retry = map->map_retry; 383140266059SGregory Neil Shapiro } 383240266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 383340266059SGregory Neil Shapiro 383440266059SGregory Neil Shapiro /* set default TTL */ 383540266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 3836c2aa98e2SPeter Wemm if (*name != '[') 3837c2aa98e2SPeter Wemm { 383840266059SGregory Neil Shapiro int ttl; 383940266059SGregory Neil Shapiro 384040266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof hbuf); 384140266059SGregory Neil Shapiro if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX, &ttl)) 384240266059SGregory Neil Shapiro { 384306f25ae9SGregory Neil Shapiro ans = hbuf; 384440266059SGregory Neil Shapiro if (ttl > 0) 384540266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 384640266059SGregory Neil Shapiro SM_DEFAULT_TTL); 384740266059SGregory Neil Shapiro } 3848c2aa98e2SPeter Wemm } 3849c2aa98e2SPeter Wemm else 3850c2aa98e2SPeter Wemm { 385106f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3852193538b7SGregory Neil Shapiro { 3853193538b7SGregory Neil Shapiro if (tTd(9, 1)) 385440266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 385506f25ae9SGregory Neil Shapiro return NULL; 3856193538b7SGregory Neil Shapiro } 385706f25ae9SGregory Neil Shapiro *cp = '\0'; 385806f25ae9SGregory Neil Shapiro 385906f25ae9SGregory Neil Shapiro hp = NULL; 386006f25ae9SGregory Neil Shapiro #if NETINET 386106f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 386206f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 386306f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 386406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 386506f25ae9SGregory Neil Shapiro #if NETINET6 386606f25ae9SGregory Neil Shapiro if (hp == NULL && 386740266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 386806f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 386906f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 387006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 387106f25ae9SGregory Neil Shapiro *cp = ']'; 387206f25ae9SGregory Neil Shapiro 387306f25ae9SGregory Neil Shapiro if (hp != NULL) 387406f25ae9SGregory Neil Shapiro { 387506f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 387640266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 387740266059SGregory Neil Shapiro #if NETINET6 387840266059SGregory Neil Shapiro if (ans == hp->h_name) 387940266059SGregory Neil Shapiro { 388040266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 388140266059SGregory Neil Shapiro 388240266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 388340266059SGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof n); 388440266059SGregory Neil Shapiro ans = n; 388540266059SGregory Neil Shapiro } 3886193538b7SGregory Neil Shapiro freehostent(hp); 3887193538b7SGregory Neil Shapiro hp = NULL; 388840266059SGregory Neil Shapiro #endif /* NETINET6 */ 388906f25ae9SGregory Neil Shapiro } 389006f25ae9SGregory Neil Shapiro } 389140266059SGregory Neil Shapiro #if NAMED_BIND 389240266059SGregory Neil Shapiro if (map->map_timeout > 0) 389340266059SGregory Neil Shapiro _res.retrans = retrans; 389440266059SGregory Neil Shapiro if (map->map_retry > 0) 389540266059SGregory Neil Shapiro _res.retry = retry; 389640266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 389706f25ae9SGregory Neil Shapiro 389806f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 389906f25ae9SGregory Neil Shapiro 390006f25ae9SGregory Neil Shapiro /* Found an answer */ 390106f25ae9SGregory Neil Shapiro if (ans != NULL) 390206f25ae9SGregory Neil Shapiro { 390306f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 390440266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 390540266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 390640266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 390706f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 390806f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 390906f25ae9SGregory Neil Shapiro else 391006f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 3911193538b7SGregory Neil Shapiro if (tTd(9, 1)) 391240266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 391306f25ae9SGregory Neil Shapiro return cp; 391406f25ae9SGregory Neil Shapiro } 391506f25ae9SGregory Neil Shapiro 391606f25ae9SGregory Neil Shapiro 391706f25ae9SGregory Neil Shapiro /* No match found */ 3918c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 3919c2aa98e2SPeter Wemm #if NAMED_BIND 3920c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 3921c2aa98e2SPeter Wemm if (tTd(9, 1)) 392240266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 3923c2aa98e2SPeter Wemm switch (h_errno) 3924c2aa98e2SPeter Wemm { 3925c2aa98e2SPeter Wemm case TRY_AGAIN: 3926c2aa98e2SPeter Wemm if (UseNameServer) 3927c2aa98e2SPeter Wemm { 3928c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3929c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3930c2aa98e2SPeter Wemm shortenstring(name, 33)); 3931c2aa98e2SPeter Wemm } 3932c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3933c2aa98e2SPeter Wemm break; 3934c2aa98e2SPeter Wemm 3935c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 3936c2aa98e2SPeter Wemm case NO_DATA: 3937c2aa98e2SPeter Wemm *statp = EX_NOHOST; 3938c2aa98e2SPeter Wemm break; 3939c2aa98e2SPeter Wemm 3940c2aa98e2SPeter Wemm case NO_RECOVERY: 3941c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 3942c2aa98e2SPeter Wemm break; 3943c2aa98e2SPeter Wemm 3944c2aa98e2SPeter Wemm default: 3945c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 3946c2aa98e2SPeter Wemm break; 3947c2aa98e2SPeter Wemm } 394806f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 3949c2aa98e2SPeter Wemm if (tTd(9, 1)) 395040266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 3951c2aa98e2SPeter Wemm *statp = EX_NOHOST; 395206f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 3953c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 3954c2aa98e2SPeter Wemm return NULL; 3955c2aa98e2SPeter Wemm } 3956c2aa98e2SPeter Wemm /* 3957c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 395840266059SGregory Neil Shapiro ** 395940266059SGregory Neil Shapiro ** Parameters: 396040266059SGregory Neil Shapiro ** map -- a pointer to this map. 396140266059SGregory Neil Shapiro ** args -- argument string. 396240266059SGregory Neil Shapiro ** 396340266059SGregory Neil Shapiro ** Returns: 396440266059SGregory Neil Shapiro ** true. 3965c2aa98e2SPeter Wemm */ 3966c2aa98e2SPeter Wemm 3967c2aa98e2SPeter Wemm bool 3968c2aa98e2SPeter Wemm host_map_init(map, args) 3969c2aa98e2SPeter Wemm MAP *map; 3970c2aa98e2SPeter Wemm char *args; 3971c2aa98e2SPeter Wemm { 3972c2aa98e2SPeter Wemm register char *p = args; 3973c2aa98e2SPeter Wemm 3974c2aa98e2SPeter Wemm for (;;) 3975c2aa98e2SPeter Wemm { 3976c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3977c2aa98e2SPeter Wemm p++; 3978c2aa98e2SPeter Wemm if (*p != '-') 3979c2aa98e2SPeter Wemm break; 3980c2aa98e2SPeter Wemm switch (*++p) 3981c2aa98e2SPeter Wemm { 3982c2aa98e2SPeter Wemm case 'a': 3983c2aa98e2SPeter Wemm map->map_app = ++p; 3984c2aa98e2SPeter Wemm break; 3985c2aa98e2SPeter Wemm 3986c2aa98e2SPeter Wemm case 'T': 3987c2aa98e2SPeter Wemm map->map_tapp = ++p; 3988c2aa98e2SPeter Wemm break; 3989c2aa98e2SPeter Wemm 3990c2aa98e2SPeter Wemm case 'm': 3991c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 3992c2aa98e2SPeter Wemm break; 3993c2aa98e2SPeter Wemm 3994c2aa98e2SPeter Wemm case 't': 3995c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 3996c2aa98e2SPeter Wemm break; 399706f25ae9SGregory Neil Shapiro 399806f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 399906f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 400006f25ae9SGregory Neil Shapiro break; 400106f25ae9SGregory Neil Shapiro 400206f25ae9SGregory Neil Shapiro case 'D': 400306f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 400406f25ae9SGregory Neil Shapiro break; 400540266059SGregory Neil Shapiro 400640266059SGregory Neil Shapiro case 'd': 400740266059SGregory Neil Shapiro { 400840266059SGregory Neil Shapiro char *h; 400940266059SGregory Neil Shapiro 401040266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 401140266059SGregory Neil Shapiro continue; 401240266059SGregory Neil Shapiro h = strchr(p, ' '); 401340266059SGregory Neil Shapiro if (h != NULL) 401440266059SGregory Neil Shapiro *h = '\0'; 401540266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 401640266059SGregory Neil Shapiro if (h != NULL) 401740266059SGregory Neil Shapiro *h = ' '; 401840266059SGregory Neil Shapiro } 401940266059SGregory Neil Shapiro break; 402040266059SGregory Neil Shapiro 402140266059SGregory Neil Shapiro case 'r': 402240266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 402340266059SGregory Neil Shapiro continue; 402440266059SGregory Neil Shapiro map->map_retry = atoi(p); 402540266059SGregory Neil Shapiro break; 4026c2aa98e2SPeter Wemm } 4027c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4028c2aa98e2SPeter Wemm p++; 4029c2aa98e2SPeter Wemm if (*p != '\0') 4030c2aa98e2SPeter Wemm *p++ = '\0'; 4031c2aa98e2SPeter Wemm } 4032c2aa98e2SPeter Wemm if (map->map_app != NULL) 4033c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4034c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4035c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 403640266059SGregory Neil Shapiro return true; 4037c2aa98e2SPeter Wemm } 403840266059SGregory Neil Shapiro 403906f25ae9SGregory Neil Shapiro #if NETINET6 404006f25ae9SGregory Neil Shapiro /* 404106f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 404206f25ae9SGregory Neil Shapiro ** 404306f25ae9SGregory Neil Shapiro ** Parameters: 404406f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 404506f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 404606f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 404706f25ae9SGregory Neil Shapiro ** 404806f25ae9SGregory Neil Shapiro ** Returns: 404906f25ae9SGregory Neil Shapiro ** A printable version of that structure. 405006f25ae9SGregory Neil Shapiro */ 405140266059SGregory Neil Shapiro 405206f25ae9SGregory Neil Shapiro char * 405306f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 405406f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 405506f25ae9SGregory Neil Shapiro char *dst; 405606f25ae9SGregory Neil Shapiro size_t dst_len; 405706f25ae9SGregory Neil Shapiro { 405806f25ae9SGregory Neil Shapiro register char *ap; 405906f25ae9SGregory Neil Shapiro 406006f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 406106f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 406206f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 406306f25ae9SGregory Neil Shapiro dst, dst_len); 406406f25ae9SGregory Neil Shapiro else 406540266059SGregory Neil Shapiro { 406640266059SGregory Neil Shapiro char *d; 406740266059SGregory Neil Shapiro size_t sz; 406840266059SGregory Neil Shapiro 406940266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 407040266059SGregory Neil Shapiro d = dst; 407140266059SGregory Neil Shapiro 407240266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 407340266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 407440266059SGregory Neil Shapiro if (sz >= dst_len) 407540266059SGregory Neil Shapiro return NULL; 407640266059SGregory Neil Shapiro dst += sz; 407740266059SGregory Neil Shapiro dst_len -= sz; 407806f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 407940266059SGregory Neil Shapiro 408040266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 408140266059SGregory Neil Shapiro if (ap != NULL) 408240266059SGregory Neil Shapiro ap = d; 408340266059SGregory Neil Shapiro } 408406f25ae9SGregory Neil Shapiro return ap; 408506f25ae9SGregory Neil Shapiro } 408640266059SGregory Neil Shapiro 408740266059SGregory Neil Shapiro /* 408840266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 408940266059SGregory Neil Shapiro ** 409040266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 409140266059SGregory Neil Shapiro ** 409240266059SGregory Neil Shapiro ** Parameters: 409340266059SGregory Neil Shapiro ** family -- address family 409440266059SGregory Neil Shapiro ** src -- string 409540266059SGregory Neil Shapiro ** dst -- destination address structure 409640266059SGregory Neil Shapiro ** 409740266059SGregory Neil Shapiro ** Returns: 409840266059SGregory Neil Shapiro ** 1 if the address was valid 409940266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 410040266059SGregory Neil Shapiro ** -1 if error 410140266059SGregory Neil Shapiro */ 410240266059SGregory Neil Shapiro 410340266059SGregory Neil Shapiro int 410440266059SGregory Neil Shapiro anynet_pton(family, src, dst) 410540266059SGregory Neil Shapiro int family; 410640266059SGregory Neil Shapiro const char *src; 410740266059SGregory Neil Shapiro void *dst; 410840266059SGregory Neil Shapiro { 410940266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 411040266059SGregory Neil Shapiro src += 5; 411140266059SGregory Neil Shapiro return inet_pton(family, src, dst); 411240266059SGregory Neil Shapiro } 411306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 411440266059SGregory Neil Shapiro /* 4115c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4116c2aa98e2SPeter Wemm ** 4117c2aa98e2SPeter Wemm ** Parameters: 4118c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4119c2aa98e2SPeter Wemm ** 4120c2aa98e2SPeter Wemm ** Returns: 4121c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4122c2aa98e2SPeter Wemm */ 4123c2aa98e2SPeter Wemm 4124c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4125c2aa98e2SPeter Wemm 4126c2aa98e2SPeter Wemm # if NETLINK 4127c2aa98e2SPeter Wemm # include <net/if_dl.h> 412806f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4129c2aa98e2SPeter Wemm 4130c2aa98e2SPeter Wemm char * 4131c2aa98e2SPeter Wemm anynet_ntoa(sap) 4132c2aa98e2SPeter Wemm register SOCKADDR *sap; 4133c2aa98e2SPeter Wemm { 4134c2aa98e2SPeter Wemm register char *bp; 4135c2aa98e2SPeter Wemm register char *ap; 4136c2aa98e2SPeter Wemm int l; 4137c2aa98e2SPeter Wemm static char buf[100]; 4138c2aa98e2SPeter Wemm 4139c2aa98e2SPeter Wemm /* check for null/zero family */ 4140c2aa98e2SPeter Wemm if (sap == NULL) 4141c2aa98e2SPeter Wemm return "NULLADDR"; 4142c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4143c2aa98e2SPeter Wemm return "0"; 4144c2aa98e2SPeter Wemm 4145c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4146c2aa98e2SPeter Wemm { 4147c2aa98e2SPeter Wemm # if NETUNIX 4148c2aa98e2SPeter Wemm case AF_UNIX: 4149c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 415040266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[UNIX: %.64s]", 4151c2aa98e2SPeter Wemm sap->sunix.sun_path); 4152c2aa98e2SPeter Wemm else 415340266059SGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof buf); 4154c2aa98e2SPeter Wemm return buf; 415506f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4156c2aa98e2SPeter Wemm 4157c2aa98e2SPeter Wemm # if NETINET 4158c2aa98e2SPeter Wemm case AF_INET: 415906f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 416006f25ae9SGregory Neil Shapiro # endif /* NETINET */ 416106f25ae9SGregory Neil Shapiro 416206f25ae9SGregory Neil Shapiro # if NETINET6 416306f25ae9SGregory Neil Shapiro case AF_INET6: 416406f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 416506f25ae9SGregory Neil Shapiro if (ap != NULL) 416606f25ae9SGregory Neil Shapiro return ap; 416706f25ae9SGregory Neil Shapiro break; 416806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4169c2aa98e2SPeter Wemm 4170c2aa98e2SPeter Wemm # if NETLINK 4171c2aa98e2SPeter Wemm case AF_LINK: 417240266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[LINK: %s]", 4173c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4174c2aa98e2SPeter Wemm return buf; 417506f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4176c2aa98e2SPeter Wemm default: 4177c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4178c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4179c2aa98e2SPeter Wemm break; 4180c2aa98e2SPeter Wemm } 4181c2aa98e2SPeter Wemm 4182c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 418340266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 4184c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4185c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4186c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 4187c2aa98e2SPeter Wemm { 418840266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 418940266059SGregory Neil Shapiro *ap++ & 0377); 4190c2aa98e2SPeter Wemm bp += 3; 4191c2aa98e2SPeter Wemm } 4192c2aa98e2SPeter Wemm *--bp = '\0'; 4193c2aa98e2SPeter Wemm return buf; 4194c2aa98e2SPeter Wemm } 419540266059SGregory Neil Shapiro /* 4196c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4197c2aa98e2SPeter Wemm ** 4198c2aa98e2SPeter Wemm ** Parameters: 4199c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4200c2aa98e2SPeter Wemm ** 4201c2aa98e2SPeter Wemm ** Returns: 4202c2aa98e2SPeter Wemm ** text representation of host name. 4203c2aa98e2SPeter Wemm ** 4204c2aa98e2SPeter Wemm ** Side Effects: 4205c2aa98e2SPeter Wemm ** none. 4206c2aa98e2SPeter Wemm */ 4207c2aa98e2SPeter Wemm 4208c2aa98e2SPeter Wemm char * 4209c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4210c2aa98e2SPeter Wemm register SOCKADDR *sap; 4211c2aa98e2SPeter Wemm { 4212c2aa98e2SPeter Wemm register struct hostent *hp; 421306f25ae9SGregory Neil Shapiro # if NAMED_BIND 4214c2aa98e2SPeter Wemm int saveretry; 421506f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 421606f25ae9SGregory Neil Shapiro # if NETINET6 421706f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 421806f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4219c2aa98e2SPeter Wemm 4220c2aa98e2SPeter Wemm # if NAMED_BIND 4221c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4222c2aa98e2SPeter Wemm saveretry = _res.retry; 422306f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 422406f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4225c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4226c2aa98e2SPeter Wemm 4227c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4228c2aa98e2SPeter Wemm { 4229c2aa98e2SPeter Wemm # if NETINET 4230c2aa98e2SPeter Wemm case AF_INET: 4231c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 423240266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4233c2aa98e2SPeter Wemm break; 423406f25ae9SGregory Neil Shapiro # endif /* NETINET */ 423506f25ae9SGregory Neil Shapiro 423606f25ae9SGregory Neil Shapiro # if NETINET6 423706f25ae9SGregory Neil Shapiro case AF_INET6: 423806f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 423940266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 424006f25ae9SGregory Neil Shapiro break; 424106f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4242c2aa98e2SPeter Wemm 4243c2aa98e2SPeter Wemm # if NETISO 4244c2aa98e2SPeter Wemm case AF_ISO: 4245c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 424640266059SGregory Neil Shapiro sizeof sap->siso.siso_addr, AF_ISO); 4247c2aa98e2SPeter Wemm break; 424806f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4249c2aa98e2SPeter Wemm 4250c2aa98e2SPeter Wemm # if NETUNIX 4251c2aa98e2SPeter Wemm case AF_UNIX: 4252c2aa98e2SPeter Wemm hp = NULL; 4253c2aa98e2SPeter Wemm break; 425406f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4255c2aa98e2SPeter Wemm 4256c2aa98e2SPeter Wemm default: 425740266059SGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof sap->sa.sa_data, 4258c2aa98e2SPeter Wemm sap->sa.sa_family); 4259c2aa98e2SPeter Wemm break; 4260c2aa98e2SPeter Wemm } 4261c2aa98e2SPeter Wemm 4262c2aa98e2SPeter Wemm # if NAMED_BIND 4263c2aa98e2SPeter Wemm _res.retry = saveretry; 4264c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4265c2aa98e2SPeter Wemm 426606f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 426706f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 426806f25ae9SGregory Neil Shapiro # if NETINET6 426906f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 427006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 427106f25ae9SGregory Neil Shapiro # if NETINET 427206f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 427306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 427406f25ae9SGregory Neil Shapiro ) 4275193538b7SGregory Neil Shapiro { 4276193538b7SGregory Neil Shapiro char *name; 4277193538b7SGregory Neil Shapiro 427840266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 427940266059SGregory Neil Shapiro # if NETINET6 4280193538b7SGregory Neil Shapiro if (name == hp->h_name) 4281193538b7SGregory Neil Shapiro { 4282193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4283193538b7SGregory Neil Shapiro 4284193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 428540266059SGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof n); 4286193538b7SGregory Neil Shapiro name = n; 4287193538b7SGregory Neil Shapiro } 4288193538b7SGregory Neil Shapiro freehostent(hp); 428940266059SGregory Neil Shapiro # endif /* NETINET6 */ 4290193538b7SGregory Neil Shapiro return name; 4291193538b7SGregory Neil Shapiro } 429206f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4293193538b7SGregory Neil Shapiro 429440266059SGregory Neil Shapiro # if NETINET6 4295193538b7SGregory Neil Shapiro if (hp != NULL) 4296193538b7SGregory Neil Shapiro { 4297193538b7SGregory Neil Shapiro freehostent(hp); 4298193538b7SGregory Neil Shapiro hp = NULL; 4299193538b7SGregory Neil Shapiro } 430040266059SGregory Neil Shapiro # endif /* NETINET6 */ 4301193538b7SGregory Neil Shapiro 4302c2aa98e2SPeter Wemm # if NETUNIX 430306f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4304c2aa98e2SPeter Wemm return "localhost"; 430506f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4306c2aa98e2SPeter Wemm { 4307c2aa98e2SPeter Wemm static char buf[203]; 4308c2aa98e2SPeter Wemm 430940266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[%.200s]", 431040266059SGregory Neil Shapiro anynet_ntoa(sap)); 4311c2aa98e2SPeter Wemm return buf; 4312c2aa98e2SPeter Wemm } 4313c2aa98e2SPeter Wemm } 431406f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4315