1c2aa98e2SPeter Wemm /* 2d9986b26SGregory Neil Shapiro * Copyright (c) 1998-2003 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 16a7ec597cSGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.613.2.17 2003/07/30 20:17:04 ca Exp $") 17c2aa98e2SPeter Wemm 18c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 19c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2006f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 21c2aa98e2SPeter Wemm 2240266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 24c2aa98e2SPeter Wemm # include <arpa/inet.h> 2506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 26c2aa98e2SPeter Wemm # if NAMED_BIND 27c2aa98e2SPeter Wemm # ifndef NO_DATA 28c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 2906f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3140266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 32c2aa98e2SPeter Wemm 3342e5d165SGregory Neil Shapiro #if STARTTLS 3442e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3542e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3642e5d165SGregory Neil Shapiro 37c2aa98e2SPeter Wemm #include <sys/time.h> 38c2aa98e2SPeter Wemm 3906f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 40c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 41c2aa98e2SPeter Wemm # include <netinet/ip.h> 4206f25ae9SGregory Neil Shapiro # if HAS_IN_H 4306f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4406f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4506f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4606f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4806f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 4906f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 50c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5106f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5206f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5306f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5406f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5506f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5606f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5806f25ae9SGregory Neil Shapiro 5940266059SGregory Neil Shapiro #include <sm/fdset.h> 6040266059SGregory Neil Shapiro 6140266059SGregory Neil Shapiro /* structure to describe a daemon or a client */ 6206f25ae9SGregory Neil Shapiro struct daemon 6306f25ae9SGregory Neil Shapiro { 6406f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 6506f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 6640266059SGregory Neil Shapiro unsigned short d_port; /* port number */ 6706f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 6806f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 6906f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7006f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7106f25ae9SGregory Neil Shapiro bool d_firsttime; 7206f25ae9SGregory Neil Shapiro int d_socksize; 7306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 7406f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 7506f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 7640266059SGregory Neil Shapiro #if MILTER 7740266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 7840266059SGregory Neil Shapiro char *d_inputfilterlist; 7940266059SGregory Neil Shapiro struct milter *d_inputfilters[MAXFILTERS]; 8040266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 8140266059SGregory Neil Shapiro #endif /* MILTER */ 8206f25ae9SGregory Neil Shapiro }; 8306f25ae9SGregory Neil Shapiro 8406f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8506f25ae9SGregory Neil Shapiro 8606f25ae9SGregory Neil Shapiro static void connecttimeout __P((void)); 8740266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 8840266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 8940266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 90c2aa98e2SPeter Wemm 91c2aa98e2SPeter Wemm /* 92c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 93c2aa98e2SPeter Wemm ** 94c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 95c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 96c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 97c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 98c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 99c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 100c2aa98e2SPeter Wemm ** 101c2aa98e2SPeter Wemm ** getrequests(e) 102c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 103c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 104c2aa98e2SPeter Wemm ** OutChannel appropriately. 105c2aa98e2SPeter Wemm ** clrdaemon() 106c2aa98e2SPeter Wemm ** Close any open files associated with getting 107c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 108c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 109c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 110c2aa98e2SPeter Wemm ** code (if it cares). 11140266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 112c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 11340266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 11440266059SGregory Neil Shapiro ** describing the error. 115c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 116c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 117c2aa98e2SPeter Wemm */ 11806f25ae9SGregory Neil Shapiro 11906f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 12040266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 12106f25ae9SGregory Neil Shapiro 12240266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 12306f25ae9SGregory Neil Shapiro 12440266059SGregory Neil Shapiro /* 125c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 126c2aa98e2SPeter Wemm ** 127c2aa98e2SPeter Wemm ** Parameters: 128c2aa98e2SPeter Wemm ** e -- the current envelope. 129c2aa98e2SPeter Wemm ** 130c2aa98e2SPeter Wemm ** Returns: 13106f25ae9SGregory Neil Shapiro ** pointer to flags. 132c2aa98e2SPeter Wemm ** 133c2aa98e2SPeter Wemm ** Side Effects: 134c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 135c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 136c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 137c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 138c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 139c2aa98e2SPeter Wemm ** to the communication channel. 14040266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 14140266059SGregory Neil Shapiro ** for some reason. 142c2aa98e2SPeter Wemm */ 143c2aa98e2SPeter Wemm 14406f25ae9SGregory Neil Shapiro BITMAP256 * 145c2aa98e2SPeter Wemm getrequests(e) 146c2aa98e2SPeter Wemm ENVELOPE *e; 147c2aa98e2SPeter Wemm { 148c2aa98e2SPeter Wemm int t; 14906f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15006f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 151c2aa98e2SPeter Wemm #if XDEBUG 152c2aa98e2SPeter Wemm bool j_has_dot; 15306f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 154065a643dSPeter Wemm char status[MAXLINE]; 15506f25ae9SGregory Neil Shapiro SOCKADDR sa; 15606f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 157605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 158605302a5SGregory Neil Shapiro time_t lastrun; 159605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 16006f25ae9SGregory Neil Shapiro # if NETUNIX 161065a643dSPeter Wemm extern int ControlSocket; 16206f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 16306f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 16440266059SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int, bool)); 165c2aa98e2SPeter Wemm 16606f25ae9SGregory Neil Shapiro 16740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 168c2aa98e2SPeter Wemm { 16906f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 17040266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 17106f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 172c2aa98e2SPeter Wemm } 173193538b7SGregory Neil Shapiro 174c2aa98e2SPeter Wemm /* 175c2aa98e2SPeter Wemm ** Try to actually open the connection. 176c2aa98e2SPeter Wemm */ 177c2aa98e2SPeter Wemm 178c2aa98e2SPeter Wemm if (tTd(15, 1)) 17906f25ae9SGregory Neil Shapiro { 18040266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 181193538b7SGregory Neil Shapiro { 18240266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 18306f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 18406f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 18506f25ae9SGregory Neil Shapiro } 186193538b7SGregory Neil Shapiro } 187c2aa98e2SPeter Wemm 188c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 18940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 19040266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 191c2aa98e2SPeter Wemm 192065a643dSPeter Wemm if (opencontrolsocket() < 0) 193065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1942e43090eSPeter Wemm "daemon could not open control socket %s: %s", 19540266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 196065a643dSPeter Wemm 19740266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 19840266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 1998774250cSGregory Neil Shapiro 20040266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 20106f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 202c2aa98e2SPeter Wemm 203c2aa98e2SPeter Wemm #if XDEBUG 204c2aa98e2SPeter Wemm { 205c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 206c2aa98e2SPeter Wemm 207c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 208c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 209c2aa98e2SPeter Wemm } 21006f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 211c2aa98e2SPeter Wemm 212065a643dSPeter Wemm /* Add parent process as first item */ 21340266059SGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1); 214065a643dSPeter Wemm 215c2aa98e2SPeter Wemm if (tTd(15, 1)) 21606f25ae9SGregory Neil Shapiro { 21740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 21840266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: %d\n", 21906f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 22006f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 22106f25ae9SGregory Neil Shapiro } 222c2aa98e2SPeter Wemm 223c2aa98e2SPeter Wemm for (;;) 224c2aa98e2SPeter Wemm { 225c2aa98e2SPeter Wemm register pid_t pid; 226c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 22740266059SGregory Neil Shapiro bool timedout = false; 22840266059SGregory Neil Shapiro bool control = false; 22906f25ae9SGregory Neil Shapiro int save_errno; 230c2aa98e2SPeter Wemm int pipefd[2]; 23140266059SGregory Neil Shapiro time_t now; 23242e5d165SGregory Neil Shapiro #if STARTTLS 23342e5d165SGregory Neil Shapiro long seed; 23442e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 235c2aa98e2SPeter Wemm 236c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 23740266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 238a7ec597cSGregory Neil Shapiro CHECK_RESTART; 2398774250cSGregory Neil Shapiro 24040266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 24140266059SGregory Neil Shapiro { 242193538b7SGregory Neil Shapiro /* 24340266059SGregory Neil Shapiro ** XXX do this call outside the loop? 24440266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 245193538b7SGregory Neil Shapiro */ 246193538b7SGregory Neil Shapiro 24740266059SGregory Neil Shapiro now = curtime(); 24840266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 24906f25ae9SGregory Neil Shapiro continue; 25040266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 25140266059SGregory Neil Shapiro continue; 25240266059SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx, 25340266059SGregory Neil Shapiro curdaemon == idx)) 254c2aa98e2SPeter Wemm { 25506f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 256c2aa98e2SPeter Wemm { 257065a643dSPeter Wemm /* close socket so peer fails quickly */ 25806f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 25906f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 260c2aa98e2SPeter Wemm } 261c2aa98e2SPeter Wemm 262065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 26340266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 264065a643dSPeter Wemm } 26506f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 26606f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 267c2aa98e2SPeter Wemm { 26840266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 26906f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 27006f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 27106f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 27206f25ae9SGregory Neil Shapiro 273065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 27440266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 27540266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 276065a643dSPeter Wemm } 277c2aa98e2SPeter Wemm } 278c2aa98e2SPeter Wemm 2798774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 280a7ec597cSGregory Neil Shapiro CHECK_RESTART; 28140266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 28206f25ae9SGregory Neil Shapiro 283c2aa98e2SPeter Wemm #if XDEBUG 284c2aa98e2SPeter Wemm /* check for disaster */ 285c2aa98e2SPeter Wemm { 286c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 287c2aa98e2SPeter Wemm 288c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 289c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 290c2aa98e2SPeter Wemm { 291c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 292c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 293c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 294c2aa98e2SPeter Wemm abort(); 295c2aa98e2SPeter Wemm } 296c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 297c2aa98e2SPeter Wemm { 298c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 299c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 300c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 301c2aa98e2SPeter Wemm abort(); 302c2aa98e2SPeter Wemm } 303c2aa98e2SPeter Wemm } 30406f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 305c2aa98e2SPeter Wemm 306c2aa98e2SPeter Wemm #if 0 307c2aa98e2SPeter Wemm /* 308c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 309c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 310c2aa98e2SPeter Wemm ** so is it worth doing this? 311c2aa98e2SPeter Wemm */ 312c2aa98e2SPeter Wemm 313065a643dSPeter Wemm if (DaemonSocket >= 0 && 31440266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 315c2aa98e2SPeter Wemm log an error here; 31606f25ae9SGregory Neil Shapiro #endif /* 0 */ 31740266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 31806f25ae9SGregory Neil Shapiro 319c2aa98e2SPeter Wemm for (;;) 320c2aa98e2SPeter Wemm { 32140266059SGregory Neil Shapiro bool setproc = false; 322065a643dSPeter Wemm int highest = -1; 323c2aa98e2SPeter Wemm fd_set readfds; 324c2aa98e2SPeter Wemm struct timeval timeout; 325c2aa98e2SPeter Wemm 326a7ec597cSGregory Neil Shapiro CHECK_RESTART; 327c2aa98e2SPeter Wemm FD_ZERO(&readfds); 32840266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 329065a643dSPeter Wemm { 33006f25ae9SGregory Neil Shapiro /* wait for a connection */ 33106f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 33206f25ae9SGregory Neil Shapiro { 333193538b7SGregory Neil Shapiro if (!setproc && 334193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 335193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 33606f25ae9SGregory Neil Shapiro { 33740266059SGregory Neil Shapiro sm_setproctitle(true, e, 33806f25ae9SGregory Neil Shapiro "accepting connections"); 33940266059SGregory Neil Shapiro setproc = true; 340065a643dSPeter Wemm } 34106f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 34206f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 34340266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 34440266059SGregory Neil Shapiro &readfds); 34506f25ae9SGregory Neil Shapiro } 34606f25ae9SGregory Neil Shapiro } 34706f25ae9SGregory Neil Shapiro 34806f25ae9SGregory Neil Shapiro #if NETUNIX 349065a643dSPeter Wemm if (ControlSocket >= 0) 350065a643dSPeter Wemm { 351065a643dSPeter Wemm if (ControlSocket > highest) 352065a643dSPeter Wemm highest = ControlSocket; 35340266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 354065a643dSPeter Wemm } 35506f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 35606f25ae9SGregory Neil Shapiro 357065a643dSPeter Wemm timeout.tv_sec = 5; 358c2aa98e2SPeter Wemm timeout.tv_usec = 0; 359c2aa98e2SPeter Wemm 360065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 361c2aa98e2SPeter Wemm NULL, NULL, &timeout); 362065a643dSPeter Wemm 3638774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 364a7ec597cSGregory Neil Shapiro CHECK_RESTART; 365193538b7SGregory Neil Shapiro 366193538b7SGregory Neil Shapiro 367193538b7SGregory Neil Shapiro curdaemon = -1; 36840266059SGregory Neil Shapiro if (doqueuerun()) 369605302a5SGregory Neil Shapiro { 37040266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 371605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 372605302a5SGregory Neil Shapiro lastrun = now; 373605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 374605302a5SGregory Neil Shapiro } 375605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 376605302a5SGregory Neil Shapiro else if (QueueIntvl > 0 && 377605302a5SGregory Neil Shapiro lastrun + QueueIntvl + 60 < now) 378605302a5SGregory Neil Shapiro { 379605302a5SGregory Neil Shapiro 380605302a5SGregory Neil Shapiro /* 381605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 382605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 383605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 384605302a5SGregory Neil Shapiro ** result of the function call. 385605302a5SGregory Neil Shapiro */ 386605302a5SGregory Neil Shapiro 387605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 388605302a5SGregory Neil Shapiro lastrun = now; 389605302a5SGregory Neil Shapiro } 390605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 39140266059SGregory Neil Shapiro 392065a643dSPeter Wemm if (t <= 0) 393065a643dSPeter Wemm { 39440266059SGregory Neil Shapiro timedout = true; 395065a643dSPeter Wemm break; 396065a643dSPeter Wemm } 397c2aa98e2SPeter Wemm 39840266059SGregory Neil Shapiro control = false; 399c2aa98e2SPeter Wemm errno = 0; 40006f25ae9SGregory Neil Shapiro 40106f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 40240266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 40306f25ae9SGregory Neil Shapiro idx = 0; 40440266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 405065a643dSPeter Wemm { 40606f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 40740266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 40840266059SGregory Neil Shapiro &readfds)) 40906f25ae9SGregory Neil Shapiro { 41006f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 411602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 412602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 41306f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 414065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 415065a643dSPeter Wemm &lotherend); 416602a2b1bSGregory Neil Shapiro 417602a2b1bSGregory Neil Shapiro /* 418602a2b1bSGregory Neil Shapiro ** If remote side closes before 419602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 420602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 421602a2b1bSGregory Neil Shapiro */ 422602a2b1bSGregory Neil Shapiro 423602a2b1bSGregory Neil Shapiro if (t >= 0 && 424602a2b1bSGregory Neil Shapiro (lotherend == 0 || 425602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 426602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 427602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 428602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 429602a2b1bSGregory Neil Shapiro { 430602a2b1bSGregory Neil Shapiro (void) close(t); 431602a2b1bSGregory Neil Shapiro t = -1; 432602a2b1bSGregory Neil Shapiro errno = EINVAL; 433602a2b1bSGregory Neil Shapiro } 43406f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 43506f25ae9SGregory Neil Shapiro break; 436065a643dSPeter Wemm } 43740266059SGregory Neil Shapiro if (++idx >= NDaemons) 43806f25ae9SGregory Neil Shapiro idx = 0; 43906f25ae9SGregory Neil Shapiro } 44006f25ae9SGregory Neil Shapiro #if NETUNIX 44106f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 44240266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 443065a643dSPeter Wemm { 444065a643dSPeter Wemm struct sockaddr_un sa_un; 445065a643dSPeter Wemm 446065a643dSPeter Wemm lotherend = sizeof sa_un; 447602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 448065a643dSPeter Wemm t = accept(ControlSocket, 449065a643dSPeter Wemm (struct sockaddr *)&sa_un, 450065a643dSPeter Wemm &lotherend); 451602a2b1bSGregory Neil Shapiro 452602a2b1bSGregory Neil Shapiro /* 453602a2b1bSGregory Neil Shapiro ** If remote side closes before 454602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 455602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 456602a2b1bSGregory Neil Shapiro */ 457602a2b1bSGregory Neil Shapiro 458602a2b1bSGregory Neil Shapiro if (t >= 0 && 459602a2b1bSGregory Neil Shapiro (lotherend == 0 || 460602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 461602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 462602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 463602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 464602a2b1bSGregory Neil Shapiro { 465602a2b1bSGregory Neil Shapiro (void) close(t); 466602a2b1bSGregory Neil Shapiro t = -1; 467602a2b1bSGregory Neil Shapiro errno = EINVAL; 468602a2b1bSGregory Neil Shapiro } 469602a2b1bSGregory Neil Shapiro if (t >= 0) 47040266059SGregory Neil Shapiro control = true; 471065a643dSPeter Wemm } 472193538b7SGregory Neil Shapiro #else /* NETUNIX */ 473193538b7SGregory Neil Shapiro if (curdaemon == -1) 474193538b7SGregory Neil Shapiro { 475193538b7SGregory Neil Shapiro /* No daemon to service */ 476193538b7SGregory Neil Shapiro continue; 477193538b7SGregory Neil Shapiro } 47806f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 479c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 480c2aa98e2SPeter Wemm break; 481c2aa98e2SPeter Wemm } 482065a643dSPeter Wemm if (timedout) 483065a643dSPeter Wemm { 48440266059SGregory Neil Shapiro timedout = false; 485065a643dSPeter Wemm continue; 486065a643dSPeter Wemm } 48706f25ae9SGregory Neil Shapiro save_errno = errno; 48840266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 489c2aa98e2SPeter Wemm if (t < 0) 490c2aa98e2SPeter Wemm { 49106f25ae9SGregory Neil Shapiro errno = save_errno; 492c2aa98e2SPeter Wemm syserr("getrequests: accept"); 493c2aa98e2SPeter Wemm 494c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 49506f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 49606f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 49706f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 49806f25ae9SGregory Neil Shapiro /* 49906f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 50006f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 50106f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 50206f25ae9SGregory Neil Shapiro */ 50306f25ae9SGregory Neil Shapiro 50440266059SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = curtime() + 15; 50506f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 506c2aa98e2SPeter Wemm continue; 507c2aa98e2SPeter Wemm } 508c2aa98e2SPeter Wemm 50906f25ae9SGregory Neil Shapiro if (!control) 51006f25ae9SGregory Neil Shapiro { 51106f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 51206f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 51306f25ae9SGregory Neil Shapiro { 51406f25ae9SGregory Neil Shapiro case AF_UNSPEC: 51540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 51640266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 51706f25ae9SGregory Neil Shapiro break; 51840266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 51940266059SGregory Neil Shapiro # if NETUNIX 52040266059SGregory Neil Shapiro case AF_UNIX: 52140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 52240266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 52340266059SGregory Neil Shapiro break; 52440266059SGregory Neil Shapiro # endif /* NETUNIX */ 52540266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 52606f25ae9SGregory Neil Shapiro #if NETINET 52706f25ae9SGregory Neil Shapiro case AF_INET: 52840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 52940266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 53006f25ae9SGregory Neil Shapiro break; 53106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 53206f25ae9SGregory Neil Shapiro #if NETINET6 53306f25ae9SGregory Neil Shapiro case AF_INET6: 53440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53540266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 53606f25ae9SGregory Neil Shapiro break; 53706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 53806f25ae9SGregory Neil Shapiro #if NETISO 53906f25ae9SGregory Neil Shapiro case AF_ISO: 54040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54140266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 54206f25ae9SGregory Neil Shapiro break; 54306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 54406f25ae9SGregory Neil Shapiro #if NETNS 54506f25ae9SGregory Neil Shapiro case AF_NS: 54640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54740266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 54806f25ae9SGregory Neil Shapiro break; 54906f25ae9SGregory Neil Shapiro #endif /* NETNS */ 55006f25ae9SGregory Neil Shapiro #if NETX25 55106f25ae9SGregory Neil Shapiro case AF_CCITT: 55240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55340266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 55406f25ae9SGregory Neil Shapiro break; 55506f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 55606f25ae9SGregory Neil Shapiro } 55740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55840266059SGregory Neil Shapiro macid("{daemon_name}"), 55940266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 56006f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 56140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56240266059SGregory Neil Shapiro macid("{daemon_flags}"), 56340266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 56406f25ae9SGregory Neil Shapiro else 56540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56640266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 56706f25ae9SGregory Neil Shapiro } 56806f25ae9SGregory Neil Shapiro 569c2aa98e2SPeter Wemm /* 570c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 571c2aa98e2SPeter Wemm */ 572c2aa98e2SPeter Wemm 573c2aa98e2SPeter Wemm if (tTd(15, 2)) 57440266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 57506f25ae9SGregory Neil Shapiro 57606f25ae9SGregory Neil Shapiro /* 57740266059SGregory Neil Shapiro ** Advance state of PRNG. 57840266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 57906f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 58006f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 58106f25ae9SGregory Neil Shapiro ** are not "really" random. 58206f25ae9SGregory Neil Shapiro */ 58342e5d165SGregory Neil Shapiro #if STARTTLS 58440266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 58542e5d165SGregory Neil Shapiro seed = get_random(); 58640266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 58740266059SGregory Neil Shapiro sizeof NextDiskSpaceCheck); 58840266059SGregory Neil Shapiro RAND_seed((void *) &now, sizeof now); 58942e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 59042e5d165SGregory Neil Shapiro #else /* STARTTLS */ 59106f25ae9SGregory Neil Shapiro (void) get_random(); 59242e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 593c2aa98e2SPeter Wemm 59440266059SGregory Neil Shapiro #if NAMED_BIND 59540266059SGregory Neil Shapiro /* 59640266059SGregory Neil Shapiro ** Update MX records for FallBackMX. 59740266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 59840266059SGregory Neil Shapiro ** response time. 59940266059SGregory Neil Shapiro */ 60040266059SGregory Neil Shapiro 60140266059SGregory Neil Shapiro if (FallBackMX != NULL) 60240266059SGregory Neil Shapiro (void) getfallbackmxrr(FallBackMX); 60340266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 60440266059SGregory Neil Shapiro 60513bd1963SGregory Neil Shapiro if (tTd(93, 100)) 60613bd1963SGregory Neil Shapiro { 60713bd1963SGregory Neil Shapiro /* don't fork, handle connection in this process */ 60813bd1963SGregory Neil Shapiro pid = 0; 60913bd1963SGregory Neil Shapiro pipefd[0] = pipefd[1] = -1; 61013bd1963SGregory Neil Shapiro } 61113bd1963SGregory Neil Shapiro else 61213bd1963SGregory Neil Shapiro { 613c2aa98e2SPeter Wemm /* 61413bd1963SGregory Neil Shapiro ** Create a pipe to keep the child from writing to 61513bd1963SGregory Neil Shapiro ** the socket until after the parent has closed 61613bd1963SGregory Neil Shapiro ** it. Otherwise the parent may hang if the child 61713bd1963SGregory Neil Shapiro ** has closed it first. 618c2aa98e2SPeter Wemm */ 619c2aa98e2SPeter Wemm 620c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 621c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 622c2aa98e2SPeter Wemm 62340266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 624c2aa98e2SPeter Wemm pid = fork(); 625c2aa98e2SPeter Wemm if (pid < 0) 626c2aa98e2SPeter Wemm { 627c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 628c2aa98e2SPeter Wemm if (pipefd[0] != -1) 629c2aa98e2SPeter Wemm { 630c2aa98e2SPeter Wemm (void) close(pipefd[0]); 631c2aa98e2SPeter Wemm (void) close(pipefd[1]); 632c2aa98e2SPeter Wemm } 63340266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 63406f25ae9SGregory Neil Shapiro (void) sleep(10); 635c2aa98e2SPeter Wemm (void) close(t); 636c2aa98e2SPeter Wemm continue; 637c2aa98e2SPeter Wemm } 63813bd1963SGregory Neil Shapiro } 639c2aa98e2SPeter Wemm 640c2aa98e2SPeter Wemm if (pid == 0) 641c2aa98e2SPeter Wemm { 642c2aa98e2SPeter Wemm char *p; 64340266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 644c2aa98e2SPeter Wemm 645c2aa98e2SPeter Wemm /* 646c2aa98e2SPeter Wemm ** CHILD -- return to caller. 647c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 648c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 649c2aa98e2SPeter Wemm */ 650c2aa98e2SPeter Wemm 6518774250cSGregory Neil Shapiro /* Reset global flags */ 6528774250cSGregory Neil Shapiro RestartRequest = NULL; 65340266059SGregory Neil Shapiro RestartWorkGroup = false; 6548774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6558774250cSGregory Neil Shapiro PendingSignal = 0; 65640266059SGregory Neil Shapiro CurrentPid = getpid(); 6578774250cSGregory Neil Shapiro 65840266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 65940266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 66040266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 66140266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 66240266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 66340266059SGregory Neil Shapiro 66440266059SGregory Neil Shapiro /* turn on profiling */ 66540266059SGregory Neil Shapiro /* SM_PROF(0); */ 66640266059SGregory Neil Shapiro 66740266059SGregory Neil Shapiro /* 66840266059SGregory Neil Shapiro ** Initialize exception stack and default exception 66940266059SGregory Neil Shapiro ** handler for child process. 67040266059SGregory Neil Shapiro */ 67140266059SGregory Neil Shapiro 67240266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 6738774250cSGregory Neil Shapiro 67406f25ae9SGregory Neil Shapiro if (!control) 67506f25ae9SGregory Neil Shapiro { 67640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 67740266059SGregory Neil Shapiro macid("{daemon_addr}"), 67840266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 67940266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, "%d", 68006f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 68140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 68240266059SGregory Neil Shapiro macid("{daemon_port}"), status); 68306f25ae9SGregory Neil Shapiro } 68406f25ae9SGregory Neil Shapiro 68540266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 68606f25ae9SGregory Neil Shapiro { 68706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 68806f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 68913058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 69006f25ae9SGregory Neil Shapiro } 691065a643dSPeter Wemm clrcontrol(); 69206f25ae9SGregory Neil Shapiro 69306f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 69406f25ae9SGregory Neil Shapiro if (control) 69506f25ae9SGregory Neil Shapiro { 69606f25ae9SGregory Neil Shapiro /* Add control socket process */ 69740266059SGregory Neil Shapiro proc_list_add(CurrentPid, 69840266059SGregory Neil Shapiro "console socket child", 69940266059SGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1); 70006f25ae9SGregory Neil Shapiro } 70106f25ae9SGregory Neil Shapiro else 70206f25ae9SGregory Neil Shapiro { 703c2aa98e2SPeter Wemm proc_list_clear(); 704c2aa98e2SPeter Wemm 70540266059SGregory Neil Shapiro /* clean up background delivery children */ 70640266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 70740266059SGregory Neil Shapiro 708065a643dSPeter Wemm /* Add parent process as first child item */ 70940266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 71040266059SGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1); 711065a643dSPeter Wemm 71206f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 713c2aa98e2SPeter Wemm QueueIntvl = 0; 714c2aa98e2SPeter Wemm 71540266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 716c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 71706f25ae9SGregory Neil Shapiro } 718c2aa98e2SPeter Wemm 719c2aa98e2SPeter Wemm if (pipefd[0] != -1) 720c2aa98e2SPeter Wemm { 721c2aa98e2SPeter Wemm auto char c; 722c2aa98e2SPeter Wemm 723c2aa98e2SPeter Wemm /* 724c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 725c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 726c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 727c2aa98e2SPeter Wemm ** socket until after the parent has closed 728c2aa98e2SPeter Wemm ** the pipe. 729c2aa98e2SPeter Wemm */ 730c2aa98e2SPeter Wemm 731c2aa98e2SPeter Wemm /* close the write end of the pipe */ 732c2aa98e2SPeter Wemm (void) close(pipefd[1]); 733c2aa98e2SPeter Wemm 734c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 735c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 736c2aa98e2SPeter Wemm errno == EINTR) 737c2aa98e2SPeter Wemm continue; 738c2aa98e2SPeter Wemm (void) close(pipefd[0]); 739c2aa98e2SPeter Wemm } 740c2aa98e2SPeter Wemm 74106f25ae9SGregory Neil Shapiro /* control socket processing */ 74206f25ae9SGregory Neil Shapiro if (control) 74306f25ae9SGregory Neil Shapiro { 74406f25ae9SGregory Neil Shapiro control_command(t, e); 74506f25ae9SGregory Neil Shapiro /* NOTREACHED */ 74606f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 74706f25ae9SGregory Neil Shapiro } 74806f25ae9SGregory Neil Shapiro 749c2aa98e2SPeter Wemm /* determine host name */ 750c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 75140266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 752c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 753c2aa98e2SPeter Wemm RealHostName = newstr(p); 75406f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 75506f25ae9SGregory Neil Shapiro { 75640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 75740266059SGregory Neil Shapiro macid("{client_resolve}"), 75840266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 75906f25ae9SGregory Neil Shapiro } 76006f25ae9SGregory Neil Shapiro else 76140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 76240266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 76340266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 764605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 765c2aa98e2SPeter Wemm 76640266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 76740266059SGregory Neil Shapiro SM_TIME_DEFAULT, 76840266059SGregory Neil Shapiro (void *) &t, 76940266059SGregory Neil Shapiro SM_IO_RDONLY, 77040266059SGregory Neil Shapiro NULL)) == NULL || 771c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 77240266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 77340266059SGregory Neil Shapiro SM_TIME_DEFAULT, 77440266059SGregory Neil Shapiro (void *) &t, 77540266059SGregory Neil Shapiro SM_IO_WRONLY, 77640266059SGregory Neil Shapiro NULL)) == NULL) 777c2aa98e2SPeter Wemm { 77840266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 77940266059SGregory Neil Shapiro t); 78040266059SGregory Neil Shapiro finis(false, true, EX_OK); 781c2aa98e2SPeter Wemm } 78240266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 783c2aa98e2SPeter Wemm 784c2aa98e2SPeter Wemm InChannel = inchannel; 785c2aa98e2SPeter Wemm OutChannel = outchannel; 78640266059SGregory Neil Shapiro DisConnected = false; 787c2aa98e2SPeter Wemm 78840266059SGregory Neil Shapiro #if XLA 789c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 790c2aa98e2SPeter Wemm { 79106f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 79240266059SGregory Neil Shapiro finis(false, true, EX_OK); 793c2aa98e2SPeter Wemm } 79406f25ae9SGregory Neil Shapiro #endif /* XLA */ 79506f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 79640266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 79740266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 79806f25ae9SGregory Neil Shapiro { 79906f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 80006f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 80140266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 80240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 80340266059SGregory Neil Shapiro macid("{if_name}"), p); 80406f25ae9SGregory Neil Shapiro 80540266059SGregory Neil Shapiro /* 80640266059SGregory Neil Shapiro ** Do this only if it is not the loopback 80740266059SGregory Neil Shapiro ** interface. 80840266059SGregory Neil Shapiro */ 80940266059SGregory Neil Shapiro 81006f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 81106f25ae9SGregory Neil Shapiro { 81240266059SGregory Neil Shapiro char *addr; 81340266059SGregory Neil Shapiro char family[5]; 81440266059SGregory Neil Shapiro 81540266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 81640266059SGregory Neil Shapiro (void) sm_snprintf(family, 81740266059SGregory Neil Shapiro sizeof(family), 81840266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 81940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 82040266059SGregory Neil Shapiro A_TEMP, 82140266059SGregory Neil Shapiro macid("{if_addr}"), addr); 82240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 82340266059SGregory Neil Shapiro A_TEMP, 82440266059SGregory Neil Shapiro macid("{if_family}"), family); 82506f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 82640266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 82740266059SGregory Neil Shapiro addr, family); 82806f25ae9SGregory Neil Shapiro } 82906f25ae9SGregory Neil Shapiro else 83006f25ae9SGregory Neil Shapiro { 83140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 83240266059SGregory Neil Shapiro A_PERM, 83340266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 83440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 83540266059SGregory Neil Shapiro A_PERM, 83640266059SGregory Neil Shapiro macid("{if_family}"), NULL); 83706f25ae9SGregory Neil Shapiro } 83806f25ae9SGregory Neil Shapiro } 83906f25ae9SGregory Neil Shapiro else 84006f25ae9SGregory Neil Shapiro { 84106f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 84240266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 84340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84440266059SGregory Neil Shapiro macid("{if_name}"), NULL); 84540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84640266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 84740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 84840266059SGregory Neil Shapiro macid("{if_family}"), NULL); 84906f25ae9SGregory Neil Shapiro } 850c2aa98e2SPeter Wemm break; 851c2aa98e2SPeter Wemm } 852c2aa98e2SPeter Wemm 853c2aa98e2SPeter Wemm /* parent -- keep track of children */ 85406f25ae9SGregory Neil Shapiro if (control) 85506f25ae9SGregory Neil Shapiro { 85640266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 85740266059SGregory Neil Shapiro "control socket server child"); 85840266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1); 85906f25ae9SGregory Neil Shapiro } 86006f25ae9SGregory Neil Shapiro else 86106f25ae9SGregory Neil Shapiro { 86240266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 86306f25ae9SGregory Neil Shapiro "SMTP server child for %s", 864065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 86540266059SGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1); 86606f25ae9SGregory Neil Shapiro } 86740266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 868c2aa98e2SPeter Wemm 869c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 870c2aa98e2SPeter Wemm if (pipefd[0] != -1) 87106f25ae9SGregory Neil Shapiro { 872c2aa98e2SPeter Wemm (void) close(pipefd[0]); 87306f25ae9SGregory Neil Shapiro pipefd[0] = -1; 87406f25ae9SGregory Neil Shapiro } 875c2aa98e2SPeter Wemm 876c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 877c2aa98e2SPeter Wemm (void) close(t); 878c2aa98e2SPeter Wemm 879c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 880c2aa98e2SPeter Wemm if (pipefd[1] != -1) 88106f25ae9SGregory Neil Shapiro { 882c2aa98e2SPeter Wemm (void) close(pipefd[1]); 88306f25ae9SGregory Neil Shapiro pipefd[1] = -1; 884c2aa98e2SPeter Wemm } 88506f25ae9SGregory Neil Shapiro } 886c2aa98e2SPeter Wemm if (tTd(15, 2)) 88740266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 88840266059SGregory Neil Shapiro 88940266059SGregory Neil Shapiro #if MILTER 89040266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 89140266059SGregory Neil Shapiro /* set the filters for this daemon */ 89240266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 89340266059SGregory Neil Shapiro { 89440266059SGregory Neil Shapiro for (i = 0; 89513bd1963SGregory Neil Shapiro (i < MAXFILTERS && 89613bd1963SGregory Neil Shapiro Daemons[curdaemon].d_inputfilters[i] != NULL); 89740266059SGregory Neil Shapiro i++) 89840266059SGregory Neil Shapiro { 89940266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 90040266059SGregory Neil Shapiro } 90140266059SGregory Neil Shapiro if (i < MAXFILTERS) 90240266059SGregory Neil Shapiro InputFilters[i] = NULL; 90340266059SGregory Neil Shapiro } 90440266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 90540266059SGregory Neil Shapiro #endif /* MILTER */ 90606f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 907c2aa98e2SPeter Wemm } 90840266059SGregory Neil Shapiro 90940266059SGregory Neil Shapiro /* 91040266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 91140266059SGregory Neil Shapiro ** 91240266059SGregory Neil Shapiro ** Parameters: 91340266059SGregory Neil Shapiro ** e -- envelope. 91440266059SGregory Neil Shapiro ** 91540266059SGregory Neil Shapiro ** Returns: 91640266059SGregory Neil Shapiro ** none. 91740266059SGregory Neil Shapiro ** 91840266059SGregory Neil Shapiro ** Side Effects: 91940266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 92040266059SGregory Neil Shapiro */ 92140266059SGregory Neil Shapiro 92240266059SGregory Neil Shapiro static void 92340266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 92440266059SGregory Neil Shapiro ENVELOPE *e; 92540266059SGregory Neil Shapiro { 92640266059SGregory Neil Shapiro bool logged = false; 92740266059SGregory Neil Shapiro int idx; 92840266059SGregory Neil Shapiro time_t now; 92940266059SGregory Neil Shapiro 93040266059SGregory Neil Shapiro now = curtime(); 93140266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 93240266059SGregory Neil Shapiro return; 93340266059SGregory Neil Shapiro 93440266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 93540266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 93640266059SGregory Neil Shapiro { 93740266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 93840266059SGregory Neil Shapiro { 93940266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 94040266059SGregory Neil Shapiro continue; 94140266059SGregory Neil Shapiro 94240266059SGregory Neil Shapiro /* log only if not logged before */ 94340266059SGregory Neil Shapiro if (!logged) 94440266059SGregory Neil Shapiro { 94540266059SGregory Neil Shapiro if (LogLevel > 8) 94640266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 94740266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 94840266059SGregory Neil Shapiro MinBlocksFree); 94940266059SGregory Neil Shapiro sm_setproctitle(true, e, 95040266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 95140266059SGregory Neil Shapiro MinBlocksFree); 95240266059SGregory Neil Shapiro logged = true; 95340266059SGregory Neil Shapiro } 95440266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 95540266059SGregory Neil Shapiro } 95640266059SGregory Neil Shapiro } 95740266059SGregory Neil Shapiro else 95840266059SGregory Neil Shapiro { 95940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 96040266059SGregory Neil Shapiro { 96140266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 96240266059SGregory Neil Shapiro continue; 96340266059SGregory Neil Shapiro 96440266059SGregory Neil Shapiro /* log only if not logged before */ 96540266059SGregory Neil Shapiro if (!logged) 96640266059SGregory Neil Shapiro { 96740266059SGregory Neil Shapiro if (LogLevel > 8) 96840266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 96940266059SGregory Neil Shapiro "accepting new messages (again)"); 97040266059SGregory Neil Shapiro logged = true; 97140266059SGregory Neil Shapiro } 97240266059SGregory Neil Shapiro 97340266059SGregory Neil Shapiro /* title will be set later */ 97440266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 97540266059SGregory Neil Shapiro } 97640266059SGregory Neil Shapiro } 97740266059SGregory Neil Shapiro 97840266059SGregory Neil Shapiro /* only check disk space once a minute */ 97940266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 98040266059SGregory Neil Shapiro } 98140266059SGregory Neil Shapiro 98240266059SGregory Neil Shapiro /* 98306f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 984c2aa98e2SPeter Wemm ** 98506f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 986c2aa98e2SPeter Wemm ** 987c2aa98e2SPeter Wemm ** Parameters: 98806f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 989c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 990c2aa98e2SPeter Wemm ** 991c2aa98e2SPeter Wemm ** Returns: 992c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 993c2aa98e2SPeter Wemm ** 994c2aa98e2SPeter Wemm ** Side Effects: 995c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 996c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 997c2aa98e2SPeter Wemm */ 998c2aa98e2SPeter Wemm 999c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1000c2aa98e2SPeter Wemm 100106f25ae9SGregory Neil Shapiro static int 100206f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 100340266059SGregory Neil Shapiro DAEMON_T *d; 1004c2aa98e2SPeter Wemm bool firsttime; 1005c2aa98e2SPeter Wemm { 1006c2aa98e2SPeter Wemm int on = 1; 100706f25ae9SGregory Neil Shapiro int fdflags; 100806f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1009c2aa98e2SPeter Wemm int ntries = 0; 101006f25ae9SGregory Neil Shapiro int save_errno; 1011c2aa98e2SPeter Wemm 1012c2aa98e2SPeter Wemm if (tTd(15, 2)) 101340266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1014c2aa98e2SPeter Wemm 1015c2aa98e2SPeter Wemm do 1016c2aa98e2SPeter Wemm { 1017c2aa98e2SPeter Wemm if (ntries > 0) 101806f25ae9SGregory Neil Shapiro (void) sleep(5); 101906f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1020c2aa98e2SPeter Wemm { 102140266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 102240266059SGregory Neil Shapiro # if NETUNIX 102340266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 102440266059SGregory Neil Shapiro { 102540266059SGregory Neil Shapiro int rval; 102640266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 102740266059SGregory Neil Shapiro 102840266059SGregory Neil Shapiro /* if not safe, don't use it */ 102940266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 103040266059SGregory Neil Shapiro RunAsUid, RunAsGid, 103140266059SGregory Neil Shapiro RunAsUserName, sff, 103240266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 103340266059SGregory Neil Shapiro if (rval != 0) 103440266059SGregory Neil Shapiro { 103540266059SGregory Neil Shapiro save_errno = errno; 103640266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 103740266059SGregory Neil Shapiro d->d_name, 103840266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 103940266059SGregory Neil Shapiro goto fail; 104040266059SGregory Neil Shapiro } 104140266059SGregory Neil Shapiro 104240266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 104340266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 104440266059SGregory Neil Shapiro } 104540266059SGregory Neil Shapiro # endif /* NETUNIX */ 104640266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 104706f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 104806f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 104906f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1050c2aa98e2SPeter Wemm { 105106f25ae9SGregory Neil Shapiro save_errno = errno; 105240266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 105340266059SGregory Neil Shapiro d->d_name); 105440266059SGregory Neil Shapiro fail: 105540266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 105640266059SGregory Neil Shapiro (!transienterror(save_errno) || 105740266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 105840266059SGregory Neil Shapiro { 105940266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 106040266059SGregory Neil Shapiro d->d_name); 106140266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 106240266059SGregory Neil Shapiro d->d_socket = -1; 106340266059SGregory Neil Shapiro return -1; 106440266059SGregory Neil Shapiro } 1065c2aa98e2SPeter Wemm severe: 1066c2aa98e2SPeter Wemm if (LogLevel > 0) 1067c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 106840266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 106940266059SGregory Neil Shapiro d->d_name); 107006f25ae9SGregory Neil Shapiro d->d_socket = -1; 1071c2aa98e2SPeter Wemm continue; 1072c2aa98e2SPeter Wemm } 1073c2aa98e2SPeter Wemm 107413bd1963SGregory Neil Shapiro if (SM_FD_SETSIZE > 0 && d->d_socket >= SM_FD_SETSIZE) 107513bd1963SGregory Neil Shapiro { 107613bd1963SGregory Neil Shapiro save_errno = EINVAL; 107713bd1963SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: server SMTP socket (%d) too large", 107813bd1963SGregory Neil Shapiro d->d_name, d->d_socket); 107913bd1963SGregory Neil Shapiro goto fail; 108013bd1963SGregory Neil Shapiro } 108113bd1963SGregory Neil Shapiro 1082c2aa98e2SPeter Wemm /* turn on network debugging? */ 1083c2aa98e2SPeter Wemm if (tTd(15, 101)) 108406f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1085c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1086c2aa98e2SPeter Wemm sizeof on); 1087c2aa98e2SPeter Wemm 108806f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1089c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 109006f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1091c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 1092c2aa98e2SPeter Wemm 1093c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 109406f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1095c2aa98e2SPeter Wemm { 109606f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1097c2aa98e2SPeter Wemm SO_RCVBUF, 109806f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 109906f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 110006f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1101c2aa98e2SPeter Wemm } 110206f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 110306f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 110406f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 110506f25ae9SGregory Neil Shapiro { 110606f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 110706f25ae9SGregory Neil Shapiro SO_SNDBUF, 110806f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 110906f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 111006f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 111106f25ae9SGregory Neil Shapiro } 111206f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1113c2aa98e2SPeter Wemm 111406f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 111506f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 111606f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 111706f25ae9SGregory Neil Shapiro { 111806f25ae9SGregory Neil Shapiro save_errno = errno; 111906f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 112006f25ae9SGregory Neil Shapiro d->d_name, 112106f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 112240266059SGregory Neil Shapiro sm_errstring(save_errno)); 112306f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 112406f25ae9SGregory Neil Shapiro goto severe; 112506f25ae9SGregory Neil Shapiro } 112606f25ae9SGregory Neil Shapiro 112706f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1128c2aa98e2SPeter Wemm { 112940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 113040266059SGregory Neil Shapiro # ifdef NETUNIX 113140266059SGregory Neil Shapiro case AF_UNIX: 113240266059SGregory Neil Shapiro socksize = sizeof d->d_addr.sunix; 113340266059SGregory Neil Shapiro break; 113440266059SGregory Neil Shapiro # endif /* NETUNIX */ 113540266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1136c2aa98e2SPeter Wemm #if NETINET 1137c2aa98e2SPeter Wemm case AF_INET: 113806f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1139c2aa98e2SPeter Wemm break; 114006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 114106f25ae9SGregory Neil Shapiro 114206f25ae9SGregory Neil Shapiro #if NETINET6 114306f25ae9SGregory Neil Shapiro case AF_INET6: 114406f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 114506f25ae9SGregory Neil Shapiro break; 114606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1147c2aa98e2SPeter Wemm 1148c2aa98e2SPeter Wemm #if NETISO 1149c2aa98e2SPeter Wemm case AF_ISO: 115006f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1151c2aa98e2SPeter Wemm break; 115206f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1153c2aa98e2SPeter Wemm 1154c2aa98e2SPeter Wemm default: 115506f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1156c2aa98e2SPeter Wemm break; 1157c2aa98e2SPeter Wemm } 1158c2aa98e2SPeter Wemm 115906f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1160c2aa98e2SPeter Wemm { 1161c2aa98e2SPeter Wemm /* probably another daemon already */ 116206f25ae9SGregory Neil Shapiro save_errno = errno; 116306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 116406f25ae9SGregory Neil Shapiro d->d_name); 116506f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 116640266059SGregory Neil Shapiro goto fail; 1167c2aa98e2SPeter Wemm } 1168c2aa98e2SPeter Wemm } 116906f25ae9SGregory Neil Shapiro if (!firsttime && 117006f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1171c2aa98e2SPeter Wemm { 117206f25ae9SGregory Neil Shapiro save_errno = errno; 117306f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 117406f25ae9SGregory Neil Shapiro d->d_name); 117506f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1176c2aa98e2SPeter Wemm goto severe; 1177c2aa98e2SPeter Wemm } 1178c2aa98e2SPeter Wemm return socksize; 117906f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 118006f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 118106f25ae9SGregory Neil Shapiro d->d_name); 1182065a643dSPeter Wemm /* NOTREACHED */ 1183c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1184c2aa98e2SPeter Wemm } 118540266059SGregory Neil Shapiro /* 118606f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 118706f25ae9SGregory Neil Shapiro ** 118806f25ae9SGregory Neil Shapiro ** Parameters: 118906f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 119006f25ae9SGregory Neil Shapiro ** 119106f25ae9SGregory Neil Shapiro ** Returns: 119206f25ae9SGregory Neil Shapiro ** port number on which daemon should run 119306f25ae9SGregory Neil Shapiro ** 119406f25ae9SGregory Neil Shapiro */ 119540266059SGregory Neil Shapiro 119640266059SGregory Neil Shapiro static unsigned short 119706f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 119806f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 119906f25ae9SGregory Neil Shapiro { 120040266059SGregory Neil Shapiro unsigned short port; 120106f25ae9SGregory Neil Shapiro 120206f25ae9SGregory Neil Shapiro /* 120306f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 120406f25ae9SGregory Neil Shapiro */ 120506f25ae9SGregory Neil Shapiro 120606f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 120706f25ae9SGregory Neil Shapiro { 120806f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 120906f25ae9SGregory Neil Shapiro #if NETINET 121006f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 121106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 121206f25ae9SGregory Neil Shapiro } 121306f25ae9SGregory Neil Shapiro 121406f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 121506f25ae9SGregory Neil Shapiro { 121606f25ae9SGregory Neil Shapiro #if NETINET 121706f25ae9SGregory Neil Shapiro case AF_INET: 121806f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 121906f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 122006f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 122106f25ae9SGregory Neil Shapiro break; 122206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 122306f25ae9SGregory Neil Shapiro 122406f25ae9SGregory Neil Shapiro #if NETINET6 122506f25ae9SGregory Neil Shapiro case AF_INET6: 122606f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 122706f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 122806f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 122906f25ae9SGregory Neil Shapiro break; 123006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 123106f25ae9SGregory Neil Shapiro 123206f25ae9SGregory Neil Shapiro default: 123306f25ae9SGregory Neil Shapiro /* unknown protocol */ 123406f25ae9SGregory Neil Shapiro port = 0; 123506f25ae9SGregory Neil Shapiro break; 123606f25ae9SGregory Neil Shapiro } 123706f25ae9SGregory Neil Shapiro if (port == 0) 123806f25ae9SGregory Neil Shapiro { 123906f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 124006f25ae9SGregory Neil Shapiro port = htons(25); 124106f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 124206f25ae9SGregory Neil Shapiro { 124306f25ae9SGregory Neil Shapiro register struct servent *sp; 124406f25ae9SGregory Neil Shapiro 124506f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 124606f25ae9SGregory Neil Shapiro if (sp == NULL) 124706f25ae9SGregory Neil Shapiro { 124806f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 124906f25ae9SGregory Neil Shapiro port = htons(25); 125006f25ae9SGregory Neil Shapiro } 125106f25ae9SGregory Neil Shapiro else 125206f25ae9SGregory Neil Shapiro port = sp->s_port; 125306f25ae9SGregory Neil Shapiro } 125406f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 125506f25ae9SGregory Neil Shapiro } 125606f25ae9SGregory Neil Shapiro 125706f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 125806f25ae9SGregory Neil Shapiro { 125906f25ae9SGregory Neil Shapiro #if NETINET 126006f25ae9SGregory Neil Shapiro case AF_INET: 126106f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 126206f25ae9SGregory Neil Shapiro break; 126306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 126406f25ae9SGregory Neil Shapiro 126506f25ae9SGregory Neil Shapiro #if NETINET6 126606f25ae9SGregory Neil Shapiro case AF_INET6: 126706f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 126806f25ae9SGregory Neil Shapiro break; 126906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 127006f25ae9SGregory Neil Shapiro 127106f25ae9SGregory Neil Shapiro default: 127206f25ae9SGregory Neil Shapiro /* unknown protocol */ 127306f25ae9SGregory Neil Shapiro break; 127406f25ae9SGregory Neil Shapiro } 127540266059SGregory Neil Shapiro return port; 127606f25ae9SGregory Neil Shapiro } 127740266059SGregory Neil Shapiro /* 1278c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1279c2aa98e2SPeter Wemm ** 1280c2aa98e2SPeter Wemm ** Parameters: 1281c2aa98e2SPeter Wemm ** none. 1282c2aa98e2SPeter Wemm ** 1283c2aa98e2SPeter Wemm ** Returns: 1284c2aa98e2SPeter Wemm ** none. 1285c2aa98e2SPeter Wemm ** 1286c2aa98e2SPeter Wemm ** Side Effects: 1287c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1288c2aa98e2SPeter Wemm */ 1289c2aa98e2SPeter Wemm 1290c2aa98e2SPeter Wemm void 1291c2aa98e2SPeter Wemm clrdaemon() 1292c2aa98e2SPeter Wemm { 129306f25ae9SGregory Neil Shapiro int i; 129406f25ae9SGregory Neil Shapiro 129540266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 129606f25ae9SGregory Neil Shapiro { 129706f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 129806f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 129906f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 130006f25ae9SGregory Neil Shapiro } 1301c2aa98e2SPeter Wemm } 130240266059SGregory Neil Shapiro 130340266059SGregory Neil Shapiro /* 130440266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 130540266059SGregory Neil Shapiro ** 130640266059SGregory Neil Shapiro ** Parameters: 130740266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 130840266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 130940266059SGregory Neil Shapiro ** 131040266059SGregory Neil Shapiro ** Returns: 131140266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 131240266059SGregory Neil Shapiro ** 131340266059SGregory Neil Shapiro ** Side Effects: 131440266059SGregory Neil Shapiro ** fills in modifiers. 131540266059SGregory Neil Shapiro */ 131640266059SGregory Neil Shapiro 131740266059SGregory Neil Shapiro char * 131840266059SGregory Neil Shapiro getmodifiers(v, modifiers) 131940266059SGregory Neil Shapiro char *v; 132040266059SGregory Neil Shapiro BITMAP256 modifiers; 132140266059SGregory Neil Shapiro { 132240266059SGregory Neil Shapiro int l; 132340266059SGregory Neil Shapiro char *h, *f, *flags; 132440266059SGregory Neil Shapiro 132540266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 132640266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 132740266059SGregory Neil Shapiro 132840266059SGregory Neil Shapiro /* is someone joking? */ 132940266059SGregory Neil Shapiro if (l < 0 || l > 256) 133040266059SGregory Neil Shapiro { 133140266059SGregory Neil Shapiro if (LogLevel > 2) 133240266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 133340266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 133440266059SGregory Neil Shapiro return NULL; 133540266059SGregory Neil Shapiro } 133640266059SGregory Neil Shapiro flags = xalloc(l); 133740266059SGregory Neil Shapiro f = flags; 133840266059SGregory Neil Shapiro clrbitmap(modifiers); 133940266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 134040266059SGregory Neil Shapiro { 134140266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 134240266059SGregory Neil Shapiro { 134340266059SGregory Neil Shapiro setbitn(*h, modifiers); 134440266059SGregory Neil Shapiro if (flags != f) 134540266059SGregory Neil Shapiro *flags++ = ' '; 134640266059SGregory Neil Shapiro *flags++ = *h; 134740266059SGregory Neil Shapiro if (isupper(*h)) 134840266059SGregory Neil Shapiro *flags++ = *h; 134940266059SGregory Neil Shapiro } 135040266059SGregory Neil Shapiro } 135140266059SGregory Neil Shapiro *flags++ = '\0'; 135240266059SGregory Neil Shapiro return f; 135340266059SGregory Neil Shapiro } 135440266059SGregory Neil Shapiro 135540266059SGregory Neil Shapiro /* 135640266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 135740266059SGregory Neil Shapiro ** 135840266059SGregory Neil Shapiro ** Parameters: 135940266059SGregory Neil Shapiro ** flag -- the flag to test. 136040266059SGregory Neil Shapiro ** 136140266059SGregory Neil Shapiro ** Returns: 136240266059SGregory Neil Shapiro ** true iff all daemons have set flag. 136340266059SGregory Neil Shapiro */ 136440266059SGregory Neil Shapiro 136540266059SGregory Neil Shapiro bool 136640266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 136740266059SGregory Neil Shapiro int flag; 136840266059SGregory Neil Shapiro { 136940266059SGregory Neil Shapiro int i; 137040266059SGregory Neil Shapiro 137140266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 137240266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 137340266059SGregory Neil Shapiro return false; 137440266059SGregory Neil Shapiro return true; 137540266059SGregory Neil Shapiro } 137640266059SGregory Neil Shapiro 137740266059SGregory Neil Shapiro /* 137806f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1379c2aa98e2SPeter Wemm ** 1380c2aa98e2SPeter Wemm ** Parameters: 1381c2aa98e2SPeter Wemm ** p -- the options line. 138206f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1383c2aa98e2SPeter Wemm ** 1384c2aa98e2SPeter Wemm ** Returns: 1385c2aa98e2SPeter Wemm ** none. 1386c2aa98e2SPeter Wemm */ 1387c2aa98e2SPeter Wemm 138806f25ae9SGregory Neil Shapiro static void 138906f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1390c2aa98e2SPeter Wemm register char *p; 139140266059SGregory Neil Shapiro DAEMON_T *d; 1392c2aa98e2SPeter Wemm { 139306f25ae9SGregory Neil Shapiro #if NETISO 1394193538b7SGregory Neil Shapiro short portno; 139506f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1396193538b7SGregory Neil Shapiro char *port = NULL; 1397193538b7SGregory Neil Shapiro char *addr = NULL; 139806f25ae9SGregory Neil Shapiro 139906f25ae9SGregory Neil Shapiro #if NETINET 140006f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 140106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 140206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 1403c2aa98e2SPeter Wemm 1404c2aa98e2SPeter Wemm while (p != NULL) 1405c2aa98e2SPeter Wemm { 1406c2aa98e2SPeter Wemm register char *f; 1407c2aa98e2SPeter Wemm register char *v; 1408c2aa98e2SPeter Wemm 1409c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1410c2aa98e2SPeter Wemm p++; 1411c2aa98e2SPeter Wemm if (*p == '\0') 1412c2aa98e2SPeter Wemm break; 1413c2aa98e2SPeter Wemm f = p; 1414c2aa98e2SPeter Wemm p = strchr(p, ','); 1415c2aa98e2SPeter Wemm if (p != NULL) 1416c2aa98e2SPeter Wemm *p++ = '\0'; 1417c2aa98e2SPeter Wemm v = strchr(f, '='); 1418c2aa98e2SPeter Wemm if (v == NULL) 1419c2aa98e2SPeter Wemm continue; 1420c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1421c2aa98e2SPeter Wemm continue; 1422c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1423c2aa98e2SPeter Wemm *f = toupper(*f); 1424c2aa98e2SPeter Wemm 1425c2aa98e2SPeter Wemm switch (*f) 1426c2aa98e2SPeter Wemm { 1427c2aa98e2SPeter Wemm case 'F': /* address family */ 1428c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 142906f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 143040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 143140266059SGregory Neil Shapiro # ifdef NETUNIX 143240266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 143340266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 143440266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 143540266059SGregory Neil Shapiro # endif /* NETUNIX */ 143640266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1437c2aa98e2SPeter Wemm #if NETINET 143840266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 143906f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 144006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 144106f25ae9SGregory Neil Shapiro #if NETINET6 144240266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 144306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 144406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1445c2aa98e2SPeter Wemm #if NETISO 144640266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 144706f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 144806f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1449c2aa98e2SPeter Wemm #if NETNS 145040266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 145106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 145206f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1453c2aa98e2SPeter Wemm #if NETX25 145440266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 145506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 145606f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1457c2aa98e2SPeter Wemm else 145806f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 145906f25ae9SGregory Neil Shapiro v); 1460c2aa98e2SPeter Wemm break; 1461c2aa98e2SPeter Wemm 1462c2aa98e2SPeter Wemm case 'A': /* address */ 1463193538b7SGregory Neil Shapiro addr = v; 1464c2aa98e2SPeter Wemm break; 1465c2aa98e2SPeter Wemm 146640266059SGregory Neil Shapiro #if MILTER 146740266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 146840266059SGregory Neil Shapiro case 'I': 146940266059SGregory Neil Shapiro d->d_inputfilterlist = v; 147040266059SGregory Neil Shapiro break; 147140266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 147240266059SGregory Neil Shapiro #endif /* MILTER */ 147340266059SGregory Neil Shapiro 1474c2aa98e2SPeter Wemm case 'P': /* port */ 1475193538b7SGregory Neil Shapiro port = v; 1476c2aa98e2SPeter Wemm break; 1477c2aa98e2SPeter Wemm 1478c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 147906f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 148006f25ae9SGregory Neil Shapiro break; 148106f25ae9SGregory Neil Shapiro 148206f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 148340266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1484c2aa98e2SPeter Wemm break; 1485c2aa98e2SPeter Wemm 1486c2aa98e2SPeter Wemm case 'S': /* send buffer size */ 148706f25ae9SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1488c2aa98e2SPeter Wemm break; 1489c2aa98e2SPeter Wemm 1490c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 149106f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 149206f25ae9SGregory Neil Shapiro break; 149306f25ae9SGregory Neil Shapiro 149406f25ae9SGregory Neil Shapiro case 'N': /* name */ 149506f25ae9SGregory Neil Shapiro d->d_name = v; 1496c2aa98e2SPeter Wemm break; 1497c2aa98e2SPeter Wemm 1498c2aa98e2SPeter Wemm default: 149906f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 150006f25ae9SGregory Neil Shapiro f); 1501c2aa98e2SPeter Wemm } 1502c2aa98e2SPeter Wemm } 1503193538b7SGregory Neil Shapiro 1504193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1505193538b7SGregory Neil Shapiro if (addr != NULL) 1506193538b7SGregory Neil Shapiro { 1507193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1508193538b7SGregory Neil Shapiro { 150940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 151040266059SGregory Neil Shapiro # if NETUNIX 151140266059SGregory Neil Shapiro case AF_UNIX: 151240266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 151340266059SGregory Neil Shapiro { 151440266059SGregory Neil Shapiro errno = ENAMETOOLONG; 151540266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 151640266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 151740266059SGregory Neil Shapiro break; 151840266059SGregory Neil Shapiro } 151940266059SGregory Neil Shapiro 152040266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 152140266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 152240266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 152340266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 152440266059SGregory Neil Shapiro addr, 152540266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 152640266059SGregory Neil Shapiro break; 152740266059SGregory Neil Shapiro # endif /* NETUNIX */ 152840266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1529193538b7SGregory Neil Shapiro #if NETINET 1530193538b7SGregory Neil Shapiro case AF_INET: 1531193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 153240266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 153340266059SGregory Neil Shapiro == INADDR_NONE)) 1534193538b7SGregory Neil Shapiro { 1535193538b7SGregory Neil Shapiro register struct hostent *hp; 1536193538b7SGregory Neil Shapiro 1537193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1538193538b7SGregory Neil Shapiro if (hp == NULL) 1539193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1540193538b7SGregory Neil Shapiro addr); 1541193538b7SGregory Neil Shapiro else 1542193538b7SGregory Neil Shapiro { 1543193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1544193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1545193538b7SGregory Neil Shapiro hp->h_addr_list++; 1546193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1547193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1548193538b7SGregory Neil Shapiro addr); 1549193538b7SGregory Neil Shapiro else 1550193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1551193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1552193538b7SGregory Neil Shapiro INADDRSZ); 155340266059SGregory Neil Shapiro # if NETINET6 1554193538b7SGregory Neil Shapiro freehostent(hp); 1555193538b7SGregory Neil Shapiro hp = NULL; 155640266059SGregory Neil Shapiro # endif /* NETINET6 */ 1557193538b7SGregory Neil Shapiro } 1558193538b7SGregory Neil Shapiro } 1559193538b7SGregory Neil Shapiro break; 1560193538b7SGregory Neil Shapiro #endif /* NETINET */ 1561193538b7SGregory Neil Shapiro 1562193538b7SGregory Neil Shapiro #if NETINET6 1563193538b7SGregory Neil Shapiro case AF_INET6: 156440266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1565193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1566193538b7SGregory Neil Shapiro { 1567193538b7SGregory Neil Shapiro register struct hostent *hp; 1568193538b7SGregory Neil Shapiro 1569193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1570193538b7SGregory Neil Shapiro if (hp == NULL) 1571193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1572193538b7SGregory Neil Shapiro addr); 1573193538b7SGregory Neil Shapiro else 1574193538b7SGregory Neil Shapiro { 1575193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1576193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1577193538b7SGregory Neil Shapiro hp->h_addr_list++; 1578193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1579193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1580193538b7SGregory Neil Shapiro addr); 1581193538b7SGregory Neil Shapiro else 1582193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1583193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1584193538b7SGregory Neil Shapiro IN6ADDRSZ); 1585193538b7SGregory Neil Shapiro freehostent(hp); 1586193538b7SGregory Neil Shapiro hp = NULL; 1587193538b7SGregory Neil Shapiro } 1588193538b7SGregory Neil Shapiro } 1589193538b7SGregory Neil Shapiro break; 1590193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1591193538b7SGregory Neil Shapiro 1592193538b7SGregory Neil Shapiro default: 1593193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1594193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1595193538b7SGregory Neil Shapiro break; 1596193538b7SGregory Neil Shapiro } 1597193538b7SGregory Neil Shapiro } 1598193538b7SGregory Neil Shapiro 1599193538b7SGregory Neil Shapiro if (port != NULL) 1600193538b7SGregory Neil Shapiro { 1601193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1602193538b7SGregory Neil Shapiro { 1603193538b7SGregory Neil Shapiro #if NETINET 1604193538b7SGregory Neil Shapiro case AF_INET: 1605193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 160640266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 160740266059SGregory Neil Shapiro atoi((const char *) port)); 1608193538b7SGregory Neil Shapiro else 1609193538b7SGregory Neil Shapiro { 1610193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1611193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1612193538b7SGregory Neil Shapiro port); 1613193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1614193538b7SGregory Neil Shapiro register struct servent *sp; 1615193538b7SGregory Neil Shapiro 1616193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1617193538b7SGregory Neil Shapiro if (sp == NULL) 1618193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1619193538b7SGregory Neil Shapiro port); 1620193538b7SGregory Neil Shapiro else 1621193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1622193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1623193538b7SGregory Neil Shapiro } 1624193538b7SGregory Neil Shapiro break; 1625193538b7SGregory Neil Shapiro #endif /* NETINET */ 1626193538b7SGregory Neil Shapiro 1627193538b7SGregory Neil Shapiro #if NETINET6 1628193538b7SGregory Neil Shapiro case AF_INET6: 1629193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 163040266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 163140266059SGregory Neil Shapiro atoi(port)); 1632193538b7SGregory Neil Shapiro else 1633193538b7SGregory Neil Shapiro { 1634193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1635193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1636193538b7SGregory Neil Shapiro port); 1637193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1638193538b7SGregory Neil Shapiro register struct servent *sp; 1639193538b7SGregory Neil Shapiro 1640193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1641193538b7SGregory Neil Shapiro if (sp == NULL) 1642193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1643193538b7SGregory Neil Shapiro port); 1644193538b7SGregory Neil Shapiro else 1645193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1646193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1647193538b7SGregory Neil Shapiro } 1648193538b7SGregory Neil Shapiro break; 1649193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1650193538b7SGregory Neil Shapiro 1651193538b7SGregory Neil Shapiro #if NETISO 1652193538b7SGregory Neil Shapiro case AF_ISO: 1653193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1654193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 165540266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1656193538b7SGregory Neil Shapiro else 1657193538b7SGregory Neil Shapiro { 1658193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1659193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1660193538b7SGregory Neil Shapiro port); 1661193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1662193538b7SGregory Neil Shapiro register struct servent *sp; 1663193538b7SGregory Neil Shapiro 1664193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1665193538b7SGregory Neil Shapiro if (sp == NULL) 1666193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1667193538b7SGregory Neil Shapiro port); 1668193538b7SGregory Neil Shapiro else 1669193538b7SGregory Neil Shapiro portno = sp->s_port; 1670193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1671193538b7SGregory Neil Shapiro } 1672193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1673193538b7SGregory Neil Shapiro (char *) &portno, 2); 1674193538b7SGregory Neil Shapiro break; 1675193538b7SGregory Neil Shapiro #endif /* NETISO */ 1676193538b7SGregory Neil Shapiro 1677193538b7SGregory Neil Shapiro default: 1678193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1679193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1680193538b7SGregory Neil Shapiro break; 1681193538b7SGregory Neil Shapiro } 1682193538b7SGregory Neil Shapiro } 1683c2aa98e2SPeter Wemm } 168440266059SGregory Neil Shapiro /* 168506f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 168606f25ae9SGregory Neil Shapiro ** 168706f25ae9SGregory Neil Shapiro ** Parameters: 168806f25ae9SGregory Neil Shapiro ** p -- the options line. 168906f25ae9SGregory Neil Shapiro ** 169006f25ae9SGregory Neil Shapiro ** Returns: 169140266059SGregory Neil Shapiro ** true if successful, false otherwise. 169240266059SGregory Neil Shapiro ** 169340266059SGregory Neil Shapiro ** Side Effects: 169440266059SGregory Neil Shapiro ** increments number of daemons. 169506f25ae9SGregory Neil Shapiro */ 169606f25ae9SGregory Neil Shapiro 169740266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 169840266059SGregory Neil Shapiro 1699739ac4d4SGregory Neil Shapiro struct dflags 1700739ac4d4SGregory Neil Shapiro { 1701739ac4d4SGregory Neil Shapiro char *d_name; 1702739ac4d4SGregory Neil Shapiro int d_flag; 1703739ac4d4SGregory Neil Shapiro }; 1704739ac4d4SGregory Neil Shapiro 1705739ac4d4SGregory Neil Shapiro static struct dflags DaemonFlags[] = 1706739ac4d4SGregory Neil Shapiro { 1707739ac4d4SGregory Neil Shapiro { "AUTHREQ", D_AUTHREQ }, 1708739ac4d4SGregory Neil Shapiro { "BINDIF", D_BINDIF }, 1709739ac4d4SGregory Neil Shapiro { "CANONREQ", D_CANONREQ }, 1710739ac4d4SGregory Neil Shapiro { "IFNHELO", D_IFNHELO }, 1711739ac4d4SGregory Neil Shapiro { "FQMAIL", D_FQMAIL }, 1712739ac4d4SGregory Neil Shapiro { "FQRCPT", D_FQRCPT }, 1713739ac4d4SGregory Neil Shapiro #if _FFR_SMTP_SSL 1714739ac4d4SGregory Neil Shapiro { "SMTPS", D_SMTPS }, 1715739ac4d4SGregory Neil Shapiro #endif /* _FFR_SMTP_SSL */ 1716739ac4d4SGregory Neil Shapiro { "UNQUALOK", D_UNQUALOK }, 1717739ac4d4SGregory Neil Shapiro { "NOAUTH", D_NOAUTH }, 1718739ac4d4SGregory Neil Shapiro { "NOCANON", D_NOCANON }, 1719739ac4d4SGregory Neil Shapiro { "NOETRN", D_NOETRN }, 1720739ac4d4SGregory Neil Shapiro { "NOTLS", D_NOTLS }, 1721739ac4d4SGregory Neil Shapiro { "ETRNONLY", D_ETRNONLY }, 1722739ac4d4SGregory Neil Shapiro { "OPTIONAL", D_OPTIONAL }, 1723739ac4d4SGregory Neil Shapiro { "DISABLE", D_DISABLE }, 1724739ac4d4SGregory Neil Shapiro { "ISSET", D_ISSET }, 1725739ac4d4SGregory Neil Shapiro { NULL, 0 } 1726739ac4d4SGregory Neil Shapiro }; 1727739ac4d4SGregory Neil Shapiro 1728739ac4d4SGregory Neil Shapiro static void 1729739ac4d4SGregory Neil Shapiro printdaemonflags(d) 1730739ac4d4SGregory Neil Shapiro DAEMON_T *d; 1731739ac4d4SGregory Neil Shapiro { 1732739ac4d4SGregory Neil Shapiro register struct dflags *df; 1733739ac4d4SGregory Neil Shapiro bool first = true; 1734739ac4d4SGregory Neil Shapiro 1735739ac4d4SGregory Neil Shapiro for (df = DaemonFlags; df->d_name != NULL; df++) 1736739ac4d4SGregory Neil Shapiro { 1737739ac4d4SGregory Neil Shapiro if (!bitnset(df->d_flag, d->d_flags)) 1738739ac4d4SGregory Neil Shapiro continue; 1739739ac4d4SGregory Neil Shapiro if (first) 1740739ac4d4SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, "<%s", 1741739ac4d4SGregory Neil Shapiro df->d_name); 1742739ac4d4SGregory Neil Shapiro else 1743739ac4d4SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, ",%s", 1744739ac4d4SGregory Neil Shapiro df->d_name); 1745739ac4d4SGregory Neil Shapiro first = false; 1746739ac4d4SGregory Neil Shapiro } 1747739ac4d4SGregory Neil Shapiro if (!first) 1748739ac4d4SGregory Neil Shapiro (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, ">"); 1749739ac4d4SGregory Neil Shapiro } 1750739ac4d4SGregory Neil Shapiro 175106f25ae9SGregory Neil Shapiro bool 175206f25ae9SGregory Neil Shapiro setdaemonoptions(p) 175306f25ae9SGregory Neil Shapiro register char *p; 175406f25ae9SGregory Neil Shapiro { 175540266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 175640266059SGregory Neil Shapiro return false; 175740266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 175840266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 175940266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 176040266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 176106f25ae9SGregory Neil Shapiro 176240266059SGregory Neil Shapiro #if MILTER 176340266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 176440266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 176540266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 176640266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 176740266059SGregory Neil Shapiro #endif /* MILTER */ 176840266059SGregory Neil Shapiro 176940266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 177040266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 177106f25ae9SGregory Neil Shapiro else 177206f25ae9SGregory Neil Shapiro { 177306f25ae9SGregory Neil Shapiro char num[30]; 177406f25ae9SGregory Neil Shapiro 177540266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Daemon%d", NDaemons); 177640266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 177706f25ae9SGregory Neil Shapiro } 177806f25ae9SGregory Neil Shapiro 177906f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 178006f25ae9SGregory Neil Shapiro { 178140266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 1782739ac4d4SGregory Neil Shapiro printdaemonflags(&Daemons[NDaemons]); 178340266059SGregory Neil Shapiro sm_dprintf("\n"); 178406f25ae9SGregory Neil Shapiro } 178540266059SGregory Neil Shapiro ++NDaemons; 178640266059SGregory Neil Shapiro return true; 178706f25ae9SGregory Neil Shapiro } 178840266059SGregory Neil Shapiro /* 178906f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 179006f25ae9SGregory Neil Shapiro ** 179106f25ae9SGregory Neil Shapiro ** Parameters: 179206f25ae9SGregory Neil Shapiro ** none 179306f25ae9SGregory Neil Shapiro ** 179406f25ae9SGregory Neil Shapiro ** Returns: 179506f25ae9SGregory Neil Shapiro ** none 179606f25ae9SGregory Neil Shapiro ** 179706f25ae9SGregory Neil Shapiro ** Side Effects: 179806f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 179906f25ae9SGregory Neil Shapiro */ 180040266059SGregory Neil Shapiro 180106f25ae9SGregory Neil Shapiro void 180206f25ae9SGregory Neil Shapiro initdaemon() 180306f25ae9SGregory Neil Shapiro { 180440266059SGregory Neil Shapiro if (NDaemons == 0) 180506f25ae9SGregory Neil Shapiro { 180640266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 180740266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 180840266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 180940266059SGregory Neil Shapiro NDaemons = 1; 181006f25ae9SGregory Neil Shapiro } 181106f25ae9SGregory Neil Shapiro } 181240266059SGregory Neil Shapiro /* 181306f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 181406f25ae9SGregory Neil Shapiro ** 181506f25ae9SGregory Neil Shapiro ** Parameters: 181606f25ae9SGregory Neil Shapiro ** p -- the options line. 181706f25ae9SGregory Neil Shapiro ** 181806f25ae9SGregory Neil Shapiro ** Returns: 181906f25ae9SGregory Neil Shapiro ** none. 182006f25ae9SGregory Neil Shapiro */ 182106f25ae9SGregory Neil Shapiro 182240266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 182306f25ae9SGregory Neil Shapiro 182406f25ae9SGregory Neil Shapiro void 182506f25ae9SGregory Neil Shapiro setclientoptions(p) 182606f25ae9SGregory Neil Shapiro register char *p; 182706f25ae9SGregory Neil Shapiro { 182840266059SGregory Neil Shapiro int family; 182940266059SGregory Neil Shapiro DAEMON_T d; 183006f25ae9SGregory Neil Shapiro 183106f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 183206f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 183306f25ae9SGregory Neil Shapiro 183406f25ae9SGregory Neil Shapiro /* grab what we need */ 183540266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 183640266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 183740266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 183840266059SGregory Neil Shapiro if (d.d_name != NULL) 183940266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 184006f25ae9SGregory Neil Shapiro else 184140266059SGregory Neil Shapiro { 184240266059SGregory Neil Shapiro char num[30]; 184340266059SGregory Neil Shapiro 184440266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Client%d", family); 184540266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 184606f25ae9SGregory Neil Shapiro } 184740266059SGregory Neil Shapiro } 184840266059SGregory Neil Shapiro /* 184906f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 185006f25ae9SGregory Neil Shapiro ** 185106f25ae9SGregory Neil Shapiro ** Parameters: 185206f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 185306f25ae9SGregory Neil Shapiro ** 185406f25ae9SGregory Neil Shapiro ** Returns: 185506f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 185606f25ae9SGregory Neil Shapiro ** 185706f25ae9SGregory Neil Shapiro ** Side Effects: 185806f25ae9SGregory Neil Shapiro ** none. 185906f25ae9SGregory Neil Shapiro */ 186006f25ae9SGregory Neil Shapiro 186106f25ae9SGregory Neil Shapiro static int 186206f25ae9SGregory Neil Shapiro addr_family(addr) 186306f25ae9SGregory Neil Shapiro char *addr; 186406f25ae9SGregory Neil Shapiro { 186506f25ae9SGregory Neil Shapiro #if NETINET6 186606f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 186706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 186806f25ae9SGregory Neil Shapiro 186906f25ae9SGregory Neil Shapiro #if NETINET 187006f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 187106f25ae9SGregory Neil Shapiro { 187206f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 187340266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 187406f25ae9SGregory Neil Shapiro return AF_INET; 187506f25ae9SGregory Neil Shapiro } 187606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 187706f25ae9SGregory Neil Shapiro #if NETINET6 187840266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 187906f25ae9SGregory Neil Shapiro { 188006f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 188140266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 188206f25ae9SGregory Neil Shapiro return AF_INET6; 188306f25ae9SGregory Neil Shapiro } 188406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 188540266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 188640266059SGregory Neil Shapiro # if NETUNIX 188740266059SGregory Neil Shapiro if (*addr == '/') 188840266059SGregory Neil Shapiro { 188906f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 189040266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 189140266059SGregory Neil Shapiro return AF_UNIX; 189240266059SGregory Neil Shapiro } 189340266059SGregory Neil Shapiro # endif /* NETUNIX */ 189440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 189540266059SGregory Neil Shapiro if (tTd(16, 9)) 189640266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 189706f25ae9SGregory Neil Shapiro return AF_UNSPEC; 189806f25ae9SGregory Neil Shapiro } 189940266059SGregory Neil Shapiro 190040266059SGregory Neil Shapiro /* 190140266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 190240266059SGregory Neil Shapiro ** 190340266059SGregory Neil Shapiro ** Parameters: 190440266059SGregory Neil Shapiro ** flag -- the flag to test. 190540266059SGregory Neil Shapiro ** 190640266059SGregory Neil Shapiro ** Returns: 190740266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 190840266059SGregory Neil Shapiro */ 190940266059SGregory Neil Shapiro 191040266059SGregory Neil Shapiro bool 191140266059SGregory Neil Shapiro chkclientmodifiers(flag) 191240266059SGregory Neil Shapiro int flag; 191340266059SGregory Neil Shapiro { 191440266059SGregory Neil Shapiro int i; 191540266059SGregory Neil Shapiro bool flagisset; 191640266059SGregory Neil Shapiro 191740266059SGregory Neil Shapiro flagisset = false; 191840266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 191940266059SGregory Neil Shapiro { 192040266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 192140266059SGregory Neil Shapiro { 192240266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 192340266059SGregory Neil Shapiro return false; 192440266059SGregory Neil Shapiro flagisset = true; 192540266059SGregory Neil Shapiro } 192640266059SGregory Neil Shapiro } 192740266059SGregory Neil Shapiro return flagisset; 192840266059SGregory Neil Shapiro } 192940266059SGregory Neil Shapiro 193040266059SGregory Neil Shapiro #if MILTER 193140266059SGregory Neil Shapiro # if _FFR_MILTER_PERDAEMON 193240266059SGregory Neil Shapiro /* 193340266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 193440266059SGregory Neil Shapiro ** 193540266059SGregory Neil Shapiro ** Parameters: 193640266059SGregory Neil Shapiro ** none 193740266059SGregory Neil Shapiro ** 193840266059SGregory Neil Shapiro ** Returns: 193940266059SGregory Neil Shapiro ** none 194040266059SGregory Neil Shapiro */ 194140266059SGregory Neil Shapiro 194240266059SGregory Neil Shapiro void 194340266059SGregory Neil Shapiro setup_daemon_milters() 194440266059SGregory Neil Shapiro { 194540266059SGregory Neil Shapiro int idx; 194640266059SGregory Neil Shapiro 194740266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 194840266059SGregory Neil Shapiro { 194940266059SGregory Neil Shapiro /* no need to configure the daemons */ 195040266059SGregory Neil Shapiro return; 195140266059SGregory Neil Shapiro } 195240266059SGregory Neil Shapiro 195340266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 195440266059SGregory Neil Shapiro { 195540266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 195640266059SGregory Neil Shapiro { 195740266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 195840266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 195940266059SGregory Neil Shapiro MAXFILTERS); 196040266059SGregory Neil Shapiro } 196140266059SGregory Neil Shapiro } 196240266059SGregory Neil Shapiro } 196340266059SGregory Neil Shapiro # endif /* _FFR_MILTER_PERDAEMON */ 196440266059SGregory Neil Shapiro #endif /* MILTER */ 196540266059SGregory Neil Shapiro /* 196606f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 1967c2aa98e2SPeter Wemm ** 1968c2aa98e2SPeter Wemm ** Parameters: 1969c2aa98e2SPeter Wemm ** host -- the name of the host. 1970c2aa98e2SPeter Wemm ** port -- the port number to connect to. 1971c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 1972c2aa98e2SPeter Wemm ** structure to be filled in. 1973c2aa98e2SPeter Wemm ** e -- the current envelope. 197440266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 197540266059SGregory Neil Shapiro ** (0 means no limit) 1976c2aa98e2SPeter Wemm ** 1977c2aa98e2SPeter Wemm ** Returns: 1978c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 1979c2aa98e2SPeter Wemm ** made and if not why not. 1980c2aa98e2SPeter Wemm ** 1981c2aa98e2SPeter Wemm ** Side Effects: 1982c2aa98e2SPeter Wemm ** none. 1983c2aa98e2SPeter Wemm */ 1984c2aa98e2SPeter Wemm 1985c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 1986c2aa98e2SPeter Wemm 1987c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 1988c2aa98e2SPeter Wemm 1989c2aa98e2SPeter Wemm int 199040266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 1991c2aa98e2SPeter Wemm char *host; 199240266059SGregory Neil Shapiro volatile unsigned int port; 1993c2aa98e2SPeter Wemm register MCI *mci; 1994c2aa98e2SPeter Wemm ENVELOPE *e; 199540266059SGregory Neil Shapiro time_t enough; 1996c2aa98e2SPeter Wemm { 1997c2aa98e2SPeter Wemm register volatile int addrno = 0; 199840266059SGregory Neil Shapiro volatile int s; 1999c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 2000c2aa98e2SPeter Wemm SOCKADDR addr; 200106f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 200206f25ae9SGregory Neil Shapiro int save_errno = 0; 200306f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 2004c2aa98e2SPeter Wemm volatile bool firstconnect; 200540266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 200606f25ae9SGregory Neil Shapiro #if NETINET6 200740266059SGregory Neil Shapiro volatile bool v6found = false; 200806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 200906f25ae9SGregory Neil Shapiro volatile int family = InetMode; 201006f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 201106f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 201206f25ae9SGregory Neil Shapiro volatile bool clt_bind; 201306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 201406f25ae9SGregory Neil Shapiro char *p; 201506f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 201606f25ae9SGregory Neil Shapiro 201740266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 201806f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 201940266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 202006f25ae9SGregory Neil Shapiro { 202106f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 202206f25ae9SGregory Neil Shapiro { 202306f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 2024193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 202506f25ae9SGregory Neil Shapiro } 202606f25ae9SGregory Neil Shapiro } 202706f25ae9SGregory Neil Shapiro 202806f25ae9SGregory Neil Shapiro #if NETINET6 202906f25ae9SGregory Neil Shapiro v4retry: 203006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 203140266059SGregory Neil Shapiro clt_bind = false; 203206f25ae9SGregory Neil Shapiro 203306f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 203406f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 203540266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2036602a2b1bSGregory Neil Shapiro *p != '\0') 203706f25ae9SGregory Neil Shapiro { 203806f25ae9SGregory Neil Shapiro #if NETINET6 203906f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 204006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 204106f25ae9SGregory Neil Shapiro 204206f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 204306f25ae9SGregory Neil Shapiro 204406f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 204506f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 204606f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 204706f25ae9SGregory Neil Shapiro { 204806f25ae9SGregory Neil Shapiro #if NETINET 204906f25ae9SGregory Neil Shapiro case AF_INET: 2050602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2051602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 2052602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 205306f25ae9SGregory Neil Shapiro { 205440266059SGregory Neil Shapiro clt_bind = true; 205506f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 205606f25ae9SGregory Neil Shapiro } 205706f25ae9SGregory Neil Shapiro break; 205806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 205906f25ae9SGregory Neil Shapiro 206006f25ae9SGregory Neil Shapiro #if NETINET6 206106f25ae9SGregory Neil Shapiro case AF_INET6: 206206f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 206340266059SGregory Neil Shapiro (void) sm_snprintf(p6, sizeof p6, 206440266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 206506f25ae9SGregory Neil Shapiro else 206640266059SGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof p6); 206740266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2068602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2069602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 207006f25ae9SGregory Neil Shapiro { 207140266059SGregory Neil Shapiro clt_bind = true; 207206f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 207306f25ae9SGregory Neil Shapiro } 207406f25ae9SGregory Neil Shapiro break; 207506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 207606f25ae9SGregory Neil Shapiro 207706f25ae9SGregory Neil Shapiro #if 0 207806f25ae9SGregory Neil Shapiro default: 207906f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 208006f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 208106f25ae9SGregory Neil Shapiro break; 208206f25ae9SGregory Neil Shapiro #endif /* 0 */ 208306f25ae9SGregory Neil Shapiro } 208406f25ae9SGregory Neil Shapiro if (clt_bind) 208506f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 208606f25ae9SGregory Neil Shapiro } 208740266059SGregory Neil Shapiro 208840266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 208940266059SGregory Neil Shapiro if (!clt_bind) 209006f25ae9SGregory Neil Shapiro { 209140266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 209206f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 209306f25ae9SGregory Neil Shapiro { 209406f25ae9SGregory Neil Shapiro #if NETINET 209506f25ae9SGregory Neil Shapiro case AF_INET: 209606f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 209706f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 209806f25ae9SGregory Neil Shapiro else 209940266059SGregory Neil Shapiro clt_bind = true; 210006f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 210140266059SGregory Neil Shapiro clt_bind = true; 210206f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 210306f25ae9SGregory Neil Shapiro break; 210406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 210506f25ae9SGregory Neil Shapiro #if NETINET6 210606f25ae9SGregory Neil Shapiro case AF_INET6: 210706f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 210806f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 210906f25ae9SGregory Neil Shapiro else 211040266059SGregory Neil Shapiro clt_bind = true; 211106f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 211206f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 211340266059SGregory Neil Shapiro clt_bind = true; 211406f25ae9SGregory Neil Shapiro break; 211506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 211606f25ae9SGregory Neil Shapiro #if NETISO 211706f25ae9SGregory Neil Shapiro case AF_ISO: 211806f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 211940266059SGregory Neil Shapiro clt_bind = true; 212006f25ae9SGregory Neil Shapiro break; 212106f25ae9SGregory Neil Shapiro #endif /* NETISO */ 212206f25ae9SGregory Neil Shapiro default: 212306f25ae9SGregory Neil Shapiro break; 212406f25ae9SGregory Neil Shapiro } 212506f25ae9SGregory Neil Shapiro } 2126c2aa98e2SPeter Wemm 2127c2aa98e2SPeter Wemm /* 2128c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2129c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2130c2aa98e2SPeter Wemm */ 2131c2aa98e2SPeter Wemm 2132602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2133c2aa98e2SPeter Wemm errno = 0; 213406f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 213506f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 2136c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2137c2aa98e2SPeter Wemm CurHostName = host; 2138c2aa98e2SPeter Wemm 2139c2aa98e2SPeter Wemm if (host[0] == '[') 2140c2aa98e2SPeter Wemm { 214106f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2142c2aa98e2SPeter Wemm if (p != NULL) 2143c2aa98e2SPeter Wemm { 2144c2aa98e2SPeter Wemm #if NETINET 214506f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 214606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 214706f25ae9SGregory Neil Shapiro #if NETINET6 214806f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 214906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 215006f25ae9SGregory Neil Shapiro 215106f25ae9SGregory Neil Shapiro *p = '\0'; 215206f25ae9SGregory Neil Shapiro #if NETINET6 215306f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 215406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 215506f25ae9SGregory Neil Shapiro #if NETINET 215606f25ae9SGregory Neil Shapiro if (family == AF_INET && 215706f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 215806f25ae9SGregory Neil Shapiro { 215906f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 216006f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 216106f25ae9SGregory Neil Shapiro } 216206f25ae9SGregory Neil Shapiro else 216306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 216406f25ae9SGregory Neil Shapiro #if NETINET6 216506f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 216640266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 216706f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 216806f25ae9SGregory Neil Shapiro { 216906f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 217006f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 217106f25ae9SGregory Neil Shapiro } 217206f25ae9SGregory Neil Shapiro else 217306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2174c2aa98e2SPeter Wemm { 2175c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 217606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2177c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2178c2aa98e2SPeter Wemm { 2179c2aa98e2SPeter Wemm #if NAMED_BIND 2180c2aa98e2SPeter Wemm int oldopts = _res.options; 2181c2aa98e2SPeter Wemm 2182c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 218306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2184c2aa98e2SPeter Wemm p[-1] = '\0'; 218506f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 218606f25ae9SGregory Neil Shapiro family); 2187c2aa98e2SPeter Wemm p[-1] = '.'; 2188c2aa98e2SPeter Wemm #if NAMED_BIND 2189c2aa98e2SPeter Wemm _res.options = oldopts; 219006f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2191c2aa98e2SPeter Wemm } 2192c2aa98e2SPeter Wemm *p = ']'; 2193c2aa98e2SPeter Wemm goto gothostent; 2194c2aa98e2SPeter Wemm } 2195c2aa98e2SPeter Wemm *p = ']'; 2196c2aa98e2SPeter Wemm } 2197c2aa98e2SPeter Wemm if (p == NULL) 2198c2aa98e2SPeter Wemm { 2199c2aa98e2SPeter Wemm extern char MsgBuf[]; 2200c2aa98e2SPeter Wemm 220106f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 220206f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 220306f25ae9SGregory Neil Shapiro host); 2204c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 220506f25ae9SGregory Neil Shapiro errno = EINVAL; 2206c2aa98e2SPeter Wemm return EX_NOHOST; 2207c2aa98e2SPeter Wemm } 2208c2aa98e2SPeter Wemm } 2209c2aa98e2SPeter Wemm else 2210c2aa98e2SPeter Wemm { 2211c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2212c2aa98e2SPeter Wemm { 221306f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 221406f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2215c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2216c2aa98e2SPeter Wemm { 2217c2aa98e2SPeter Wemm #if NAMED_BIND 2218c2aa98e2SPeter Wemm int oldopts = _res.options; 2219c2aa98e2SPeter Wemm 2220c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 222106f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2222c2aa98e2SPeter Wemm *p = '\0'; 222306f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2224c2aa98e2SPeter Wemm *p = '.'; 2225c2aa98e2SPeter Wemm #if NAMED_BIND 2226c2aa98e2SPeter Wemm _res.options = oldopts; 222706f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2228c2aa98e2SPeter Wemm } 2229c2aa98e2SPeter Wemm } 2230c2aa98e2SPeter Wemm gothostent: 2231c2aa98e2SPeter Wemm if (hp == NULL) 2232c2aa98e2SPeter Wemm { 2233c2aa98e2SPeter Wemm #if NAMED_BIND 2234c2aa98e2SPeter Wemm /* check for name server timeouts */ 223540266059SGregory Neil Shapiro # if NETINET6 223640266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 223740266059SGregory Neil Shapiro errno == ETIMEDOUT) 223840266059SGregory Neil Shapiro { 223940266059SGregory Neil Shapiro /* 224040266059SGregory Neil Shapiro ** An attempt with family AF_INET may 224140266059SGregory Neil Shapiro ** succeed By skipping the next section 224240266059SGregory Neil Shapiro ** of code, we will try AF_INET before 224340266059SGregory Neil Shapiro ** failing. 224440266059SGregory Neil Shapiro */ 224540266059SGregory Neil Shapiro 224640266059SGregory Neil Shapiro if (tTd(16, 10)) 224740266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 224840266059SGregory Neil Shapiro } 224940266059SGregory Neil Shapiro else 225040266059SGregory Neil Shapiro # endif /* NETINET6 */ 225140266059SGregory Neil Shapiro { 225240266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 225340266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2254c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2255c2aa98e2SPeter Wemm { 225606f25ae9SGregory Neil Shapiro save_errno = errno; 225740266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 225840266059SGregory Neil Shapiro "4.4.3", NULL); 225906f25ae9SGregory Neil Shapiro errno = save_errno; 2260c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2261c2aa98e2SPeter Wemm } 226240266059SGregory Neil Shapiro } 226306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 226406f25ae9SGregory Neil Shapiro #if NETINET6 226506f25ae9SGregory Neil Shapiro /* 226606f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 226706f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 226806f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 226906f25ae9SGregory Neil Shapiro */ 227006f25ae9SGregory Neil Shapiro 227106f25ae9SGregory Neil Shapiro if (family == AF_INET6) 227206f25ae9SGregory Neil Shapiro { 227306f25ae9SGregory Neil Shapiro family = AF_INET; 227406f25ae9SGregory Neil Shapiro goto v4retry; 227506f25ae9SGregory Neil Shapiro } 227606f25ae9SGregory Neil Shapiro if (v6found) 227706f25ae9SGregory Neil Shapiro goto v6tempfail; 227806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 227906f25ae9SGregory Neil Shapiro save_errno = errno; 2280c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 228106f25ae9SGregory Neil Shapiro errno = save_errno; 228206f25ae9SGregory Neil Shapiro return EX_NOHOST; 2283c2aa98e2SPeter Wemm } 2284c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2285c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2286c2aa98e2SPeter Wemm { 2287c2aa98e2SPeter Wemm #if NETINET 2288c2aa98e2SPeter Wemm case AF_INET: 228906f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 229006f25ae9SGregory Neil Shapiro hp->h_addr, 2291c2aa98e2SPeter Wemm INADDRSZ); 2292c2aa98e2SPeter Wemm break; 229306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 229406f25ae9SGregory Neil Shapiro 229506f25ae9SGregory Neil Shapiro #if NETINET6 229606f25ae9SGregory Neil Shapiro case AF_INET6: 229706f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 229806f25ae9SGregory Neil Shapiro hp->h_addr, 229906f25ae9SGregory Neil Shapiro IN6ADDRSZ); 230006f25ae9SGregory Neil Shapiro break; 230106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2302c2aa98e2SPeter Wemm 2303c2aa98e2SPeter Wemm default: 2304c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 2305c2aa98e2SPeter Wemm { 2306c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2307c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2308c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 230906f25ae9SGregory Neil Shapiro errno = EINVAL; 2310c2aa98e2SPeter Wemm return EX_NOHOST; 2311c2aa98e2SPeter Wemm } 231240266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2313c2aa98e2SPeter Wemm break; 2314c2aa98e2SPeter Wemm } 2315c2aa98e2SPeter Wemm addrno = 1; 2316c2aa98e2SPeter Wemm } 2317c2aa98e2SPeter Wemm 2318c2aa98e2SPeter Wemm /* 2319c2aa98e2SPeter Wemm ** Determine the port number. 2320c2aa98e2SPeter Wemm */ 2321c2aa98e2SPeter Wemm 2322c2aa98e2SPeter Wemm if (port == 0) 2323c2aa98e2SPeter Wemm { 232406f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 232506f25ae9SGregory Neil Shapiro port = htons(25); 232606f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2327c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2328c2aa98e2SPeter Wemm 2329c2aa98e2SPeter Wemm if (sp == NULL) 2330c2aa98e2SPeter Wemm { 2331c2aa98e2SPeter Wemm if (LogLevel > 2) 2332c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2333c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2334c2aa98e2SPeter Wemm port = htons(25); 2335c2aa98e2SPeter Wemm } 2336c2aa98e2SPeter Wemm else 2337c2aa98e2SPeter Wemm port = sp->s_port; 233806f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2339c2aa98e2SPeter Wemm } 2340c2aa98e2SPeter Wemm 234140266059SGregory Neil Shapiro #if NETINET6 234240266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 234340266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 234440266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 234540266059SGregory Neil Shapiro { 234640266059SGregory Neil Shapiro /* 234740266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 234840266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 234940266059SGregory Neil Shapiro ** for IPv4. 235040266059SGregory Neil Shapiro */ 235140266059SGregory Neil Shapiro 235240266059SGregory Neil Shapiro goto nextaddr; 235340266059SGregory Neil Shapiro } 235440266059SGregory Neil Shapiro #endif /* NETINET6 */ 235540266059SGregory Neil Shapiro 2356c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2357c2aa98e2SPeter Wemm { 2358c2aa98e2SPeter Wemm #if NETINET 2359c2aa98e2SPeter Wemm case AF_INET: 2360c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2361c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 2362c2aa98e2SPeter Wemm break; 236306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 236406f25ae9SGregory Neil Shapiro 236506f25ae9SGregory Neil Shapiro #if NETINET6 236606f25ae9SGregory Neil Shapiro case AF_INET6: 236706f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 236806f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 236906f25ae9SGregory Neil Shapiro break; 237006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2371c2aa98e2SPeter Wemm 2372c2aa98e2SPeter Wemm #if NETISO 2373c2aa98e2SPeter Wemm case AF_ISO: 2374c2aa98e2SPeter Wemm /* assume two byte transport selector */ 237506f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2376c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 2377c2aa98e2SPeter Wemm break; 237806f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2379c2aa98e2SPeter Wemm 2380c2aa98e2SPeter Wemm default: 2381c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2382c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 238306f25ae9SGregory Neil Shapiro errno = EINVAL; 238440266059SGregory Neil Shapiro #if NETINET6 2385193538b7SGregory Neil Shapiro if (hp != NULL) 2386193538b7SGregory Neil Shapiro freehostent(hp); 238740266059SGregory Neil Shapiro #endif /* NETINET6 */ 238806f25ae9SGregory Neil Shapiro return EX_NOHOST; 2389c2aa98e2SPeter Wemm } 2390c2aa98e2SPeter Wemm 2391c2aa98e2SPeter Wemm /* 2392c2aa98e2SPeter Wemm ** Try to actually open the connection. 2393c2aa98e2SPeter Wemm */ 2394c2aa98e2SPeter Wemm 239540266059SGregory Neil Shapiro #if XLA 2396c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2397c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2398193538b7SGregory Neil Shapiro { 239940266059SGregory Neil Shapiro # if NETINET6 2400193538b7SGregory Neil Shapiro if (hp != NULL) 2401193538b7SGregory Neil Shapiro freehostent(hp); 240240266059SGregory Neil Shapiro # endif /* NETINET6 */ 2403c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2404193538b7SGregory Neil Shapiro } 240506f25ae9SGregory Neil Shapiro #endif /* XLA */ 2406c2aa98e2SPeter Wemm 240740266059SGregory Neil Shapiro firstconnect = true; 2408c2aa98e2SPeter Wemm for (;;) 2409c2aa98e2SPeter Wemm { 2410c2aa98e2SPeter Wemm if (tTd(16, 1)) 241140266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 24128774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 241340266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2414c2aa98e2SPeter Wemm 2415c2aa98e2SPeter Wemm /* save for logging */ 2416c2aa98e2SPeter Wemm CurHostAddr = addr; 2417c2aa98e2SPeter Wemm 241840266059SGregory Neil Shapiro #if HASRRESVPORT 2419c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2420c2aa98e2SPeter Wemm { 2421c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2422c2aa98e2SPeter Wemm 2423c2aa98e2SPeter Wemm s = rresvport(&rport); 2424c2aa98e2SPeter Wemm } 2425c2aa98e2SPeter Wemm else 242640266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2427c2aa98e2SPeter Wemm { 242840266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2429c2aa98e2SPeter Wemm } 2430c2aa98e2SPeter Wemm if (s < 0) 2431c2aa98e2SPeter Wemm { 243206f25ae9SGregory Neil Shapiro save_errno = errno; 2433c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 243440266059SGregory Neil Shapiro #if XLA 2435c2aa98e2SPeter Wemm xla_host_end(host); 243606f25ae9SGregory Neil Shapiro #endif /* XLA */ 2437c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 243840266059SGregory Neil Shapiro #if NETINET6 2439193538b7SGregory Neil Shapiro if (hp != NULL) 2440193538b7SGregory Neil Shapiro freehostent(hp); 244140266059SGregory Neil Shapiro #endif /* NETINET6 */ 244206f25ae9SGregory Neil Shapiro errno = save_errno; 2443c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2444c2aa98e2SPeter Wemm } 2445c2aa98e2SPeter Wemm 2446c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 244740266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2448c2aa98e2SPeter Wemm { 2449c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 245040266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 245140266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2452c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2453c2aa98e2SPeter Wemm } 245406f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 245506f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 245640266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 245706f25ae9SGregory Neil Shapiro { 245806f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 245940266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 246040266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 246106f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 246206f25ae9SGregory Neil Shapiro } 246306f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 246406f25ae9SGregory Neil Shapiro 2465c2aa98e2SPeter Wemm if (tTd(16, 1)) 246640266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2467c2aa98e2SPeter Wemm 2468c2aa98e2SPeter Wemm /* turn on network debugging? */ 2469c2aa98e2SPeter Wemm if (tTd(16, 101)) 2470c2aa98e2SPeter Wemm { 2471c2aa98e2SPeter Wemm int on = 1; 247206f25ae9SGregory Neil Shapiro 2473c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2474c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2475c2aa98e2SPeter Wemm } 247640266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 247740266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2478c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2479c2aa98e2SPeter Wemm 248006f25ae9SGregory Neil Shapiro if (clt_bind) 248106f25ae9SGregory Neil Shapiro { 248206f25ae9SGregory Neil Shapiro int on = 1; 248306f25ae9SGregory Neil Shapiro 248406f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 248506f25ae9SGregory Neil Shapiro { 248606f25ae9SGregory Neil Shapiro #if NETINET 248706f25ae9SGregory Neil Shapiro case AF_INET: 248806f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 248906f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 249006f25ae9SGregory Neil Shapiro SO_REUSEADDR, 249106f25ae9SGregory Neil Shapiro (char *) &on, 249206f25ae9SGregory Neil Shapiro sizeof on); 249306f25ae9SGregory Neil Shapiro break; 249406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 249506f25ae9SGregory Neil Shapiro 249606f25ae9SGregory Neil Shapiro #if NETINET6 249706f25ae9SGregory Neil Shapiro case AF_INET6: 249806f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 249906f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 250006f25ae9SGregory Neil Shapiro SO_REUSEADDR, 250106f25ae9SGregory Neil Shapiro (char *) &on, 250206f25ae9SGregory Neil Shapiro sizeof on); 250306f25ae9SGregory Neil Shapiro break; 250406f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 250506f25ae9SGregory Neil Shapiro } 250606f25ae9SGregory Neil Shapiro 250706f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 250806f25ae9SGregory Neil Shapiro { 250906f25ae9SGregory Neil Shapiro save_errno = errno; 251006f25ae9SGregory Neil Shapiro (void) close(s); 251106f25ae9SGregory Neil Shapiro errno = save_errno; 251206f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 251306f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 251440266059SGregory Neil Shapiro #if NETINET6 2515193538b7SGregory Neil Shapiro if (hp != NULL) 2516193538b7SGregory Neil Shapiro freehostent(hp); 251740266059SGregory Neil Shapiro #endif /* NETINET6 */ 251806f25ae9SGregory Neil Shapiro errno = save_errno; 251906f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 252006f25ae9SGregory Neil Shapiro } 252106f25ae9SGregory Neil Shapiro } 252206f25ae9SGregory Neil Shapiro 2523c2aa98e2SPeter Wemm /* 2524c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2525c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2526c2aa98e2SPeter Wemm */ 2527c2aa98e2SPeter Wemm 2528c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2529c2aa98e2SPeter Wemm { 2530c2aa98e2SPeter Wemm int i; 2531c2aa98e2SPeter Wemm 2532c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 253340266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 25348774250cSGregory Neil Shapiro connecttimeout, 0); 2535c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 253640266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 25378774250cSGregory Neil Shapiro connecttimeout, 0); 2538c2aa98e2SPeter Wemm else 2539c2aa98e2SPeter Wemm ev = NULL; 2540c2aa98e2SPeter Wemm 254106f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 254206f25ae9SGregory Neil Shapiro { 254306f25ae9SGregory Neil Shapiro #if NETINET 254406f25ae9SGregory Neil Shapiro case AF_INET: 254506f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 254606f25ae9SGregory Neil Shapiro break; 254706f25ae9SGregory Neil Shapiro #endif /* NETINET */ 254806f25ae9SGregory Neil Shapiro 254906f25ae9SGregory Neil Shapiro #if NETINET6 255006f25ae9SGregory Neil Shapiro case AF_INET6: 255106f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 255206f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 255306f25ae9SGregory Neil Shapiro IN6ADDRSZ); 255406f25ae9SGregory Neil Shapiro break; 255506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 255606f25ae9SGregory Neil Shapiro } 2557c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 255806f25ae9SGregory Neil Shapiro save_errno = errno; 2559c2aa98e2SPeter Wemm if (ev != NULL) 256040266059SGregory Neil Shapiro sm_clrevent(ev); 2561c2aa98e2SPeter Wemm if (i >= 0) 2562c2aa98e2SPeter Wemm break; 2563c2aa98e2SPeter Wemm } 2564c2aa98e2SPeter Wemm else 256506f25ae9SGregory Neil Shapiro save_errno = errno; 2566c2aa98e2SPeter Wemm 2567605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2568605302a5SGregory Neil Shapiro (void) close(s); 2569605302a5SGregory Neil Shapiro 2570c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 257140266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 257240266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2573c2aa98e2SPeter Wemm { 2574c2aa98e2SPeter Wemm if (tTd(16, 1)) 257540266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 257640266059SGregory Neil Shapiro sm_errstring(save_errno)); 257740266059SGregory Neil Shapiro firstconnect = false; 257806f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2579c2aa98e2SPeter Wemm continue; 2580c2aa98e2SPeter Wemm } 2581c2aa98e2SPeter Wemm 258240266059SGregory Neil Shapiro if (LogLevel > 13) 2583c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2584c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2585c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 258640266059SGregory Neil Shapiro sm_errstring(save_errno)); 2587c2aa98e2SPeter Wemm 258840266059SGregory Neil Shapiro #if NETINET6 258940266059SGregory Neil Shapiro nextaddr: 259040266059SGregory Neil Shapiro #endif /* NETINET6 */ 259140266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 259240266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2593c2aa98e2SPeter Wemm { 2594c2aa98e2SPeter Wemm if (tTd(16, 1)) 259540266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 259640266059SGregory Neil Shapiro sm_errstring(save_errno)); 2597c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2598c2aa98e2SPeter Wemm { 2599c2aa98e2SPeter Wemm #if NETINET 2600c2aa98e2SPeter Wemm case AF_INET: 260106f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 260206f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2603c2aa98e2SPeter Wemm INADDRSZ); 2604c2aa98e2SPeter Wemm break; 260506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 260606f25ae9SGregory Neil Shapiro 260706f25ae9SGregory Neil Shapiro #if NETINET6 260806f25ae9SGregory Neil Shapiro case AF_INET6: 260906f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 261006f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 261106f25ae9SGregory Neil Shapiro IN6ADDRSZ); 261206f25ae9SGregory Neil Shapiro break; 261306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2614c2aa98e2SPeter Wemm 2615c2aa98e2SPeter Wemm default: 261606f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 261706f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2618c2aa98e2SPeter Wemm hp->h_length); 2619c2aa98e2SPeter Wemm break; 2620c2aa98e2SPeter Wemm } 2621c2aa98e2SPeter Wemm continue; 2622c2aa98e2SPeter Wemm } 262306f25ae9SGregory Neil Shapiro errno = save_errno; 2624c2aa98e2SPeter Wemm 262506f25ae9SGregory Neil Shapiro #if NETINET6 262606f25ae9SGregory Neil Shapiro if (family == AF_INET6) 262706f25ae9SGregory Neil Shapiro { 262806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 262940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 263040266059SGregory Neil Shapiro sm_errstring(save_errno)); 263140266059SGregory Neil Shapiro v6found = true; 263206f25ae9SGregory Neil Shapiro family = AF_INET; 2633193538b7SGregory Neil Shapiro if (hp != NULL) 2634193538b7SGregory Neil Shapiro { 2635193538b7SGregory Neil Shapiro freehostent(hp); 2636193538b7SGregory Neil Shapiro hp = NULL; 2637193538b7SGregory Neil Shapiro } 263806f25ae9SGregory Neil Shapiro goto v4retry; 263906f25ae9SGregory Neil Shapiro } 264006f25ae9SGregory Neil Shapiro v6tempfail: 264106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2642c2aa98e2SPeter Wemm /* couldn't open connection */ 264306f25ae9SGregory Neil Shapiro #if NETINET6 264406f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 264506f25ae9SGregory Neil Shapiro if (errno > 0) 264606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 264706f25ae9SGregory Neil Shapiro save_errno = errno; 264806f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 264940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 265040266059SGregory Neil Shapiro sm_errstring(save_errno)); 265140266059SGregory Neil Shapiro #if XLA 2652c2aa98e2SPeter Wemm xla_host_end(host); 265306f25ae9SGregory Neil Shapiro #endif /* XLA */ 2654c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 265540266059SGregory Neil Shapiro #if NETINET6 2656193538b7SGregory Neil Shapiro if (hp != NULL) 2657193538b7SGregory Neil Shapiro freehostent(hp); 265840266059SGregory Neil Shapiro #endif /* NETINET6 */ 265906f25ae9SGregory Neil Shapiro errno = save_errno; 2660c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2661c2aa98e2SPeter Wemm } 2662c2aa98e2SPeter Wemm 266340266059SGregory Neil Shapiro #if NETINET6 2664193538b7SGregory Neil Shapiro if (hp != NULL) 2665193538b7SGregory Neil Shapiro { 2666193538b7SGregory Neil Shapiro freehostent(hp); 2667193538b7SGregory Neil Shapiro hp = NULL; 2668193538b7SGregory Neil Shapiro } 266940266059SGregory Neil Shapiro #endif /* NETINET6 */ 2670193538b7SGregory Neil Shapiro 2671c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 267206f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 267340266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 267440266059SGregory Neil Shapiro (void *) &s, 267540266059SGregory Neil Shapiro SM_IO_WRONLY, NULL)) == NULL || 2676c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 267740266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 267840266059SGregory Neil Shapiro (void *) &s, 267940266059SGregory Neil Shapiro SM_IO_RDONLY, NULL)) == NULL) 2680c2aa98e2SPeter Wemm { 268106f25ae9SGregory Neil Shapiro save_errno = errno; 2682c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2683c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 268406f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 268540266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 268606f25ae9SGregory Neil Shapiro (void) close(s); 268706f25ae9SGregory Neil Shapiro errno = save_errno; 268806f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 268906f25ae9SGregory Neil Shapiro } 269040266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 269140266059SGregory Neil Shapiro 269240266059SGregory Neil Shapiro /* set {client_flags} */ 269340266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 269440266059SGregory Neil Shapiro { 269540266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 269640266059SGregory Neil Shapiro macid("{client_flags}"), 269740266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 269840266059SGregory Neil Shapiro } 269940266059SGregory Neil Shapiro else 270040266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 270140266059SGregory Neil Shapiro macid("{client_flags}"), ""); 270240266059SGregory Neil Shapiro 270340266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 270440266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 270540266059SGregory Neil Shapiro { 270640266059SGregory Neil Shapiro /* look for just this one flag */ 270740266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 270840266059SGregory Neil Shapiro } 270906f25ae9SGregory Neil Shapiro 271006f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 271106f25ae9SGregory Neil Shapiro len = sizeof addr; 271206f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 271306f25ae9SGregory Neil Shapiro { 271406f25ae9SGregory Neil Shapiro char *name; 271540266059SGregory Neil Shapiro char family[5]; 271606f25ae9SGregory Neil Shapiro 271740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 271840266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 271940266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 272040266059SGregory Neil Shapiro addr.sa.sa_family); 272140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 272240266059SGregory Neil Shapiro macid("{if_family_out}"), family); 272306f25ae9SGregory Neil Shapiro 272406f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 272540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 272640266059SGregory Neil Shapiro macid("{if_name_out}"), name); 272706f25ae9SGregory Neil Shapiro if (LogLevel > 11) 272806f25ae9SGregory Neil Shapiro { 272906f25ae9SGregory Neil Shapiro /* log connection information */ 273006f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 273106f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 273206f25ae9SGregory Neil Shapiro } 273306f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 273406f25ae9SGregory Neil Shapiro { 273506f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 273606f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 273706f25ae9SGregory Neil Shapiro } 273806f25ae9SGregory Neil Shapiro } 273906f25ae9SGregory Neil Shapiro else 274006f25ae9SGregory Neil Shapiro { 274140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 274240266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 274340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 274440266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 274540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 274640266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 274706f25ae9SGregory Neil Shapiro } 274806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 274906f25ae9SGregory Neil Shapiro return EX_OK; 275006f25ae9SGregory Neil Shapiro } 275106f25ae9SGregory Neil Shapiro 275206f25ae9SGregory Neil Shapiro static void 275306f25ae9SGregory Neil Shapiro connecttimeout() 275406f25ae9SGregory Neil Shapiro { 27558774250cSGregory Neil Shapiro /* 27568774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 27578774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 27588774250cSGregory Neil Shapiro ** DOING. 27598774250cSGregory Neil Shapiro */ 27608774250cSGregory Neil Shapiro 276106f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 276206f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 276306f25ae9SGregory Neil Shapiro } 276440266059SGregory Neil Shapiro /* 276506f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 276606f25ae9SGregory Neil Shapiro ** 276706f25ae9SGregory Neil Shapiro ** Parameters: 276806f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 276906f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 277006f25ae9SGregory Neil Shapiro ** structure to be filled in. 277106f25ae9SGregory Neil Shapiro ** 277206f25ae9SGregory Neil Shapiro ** Returns: 277306f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 277406f25ae9SGregory Neil Shapiro ** made and if not why not. 277506f25ae9SGregory Neil Shapiro ** 277606f25ae9SGregory Neil Shapiro ** Side Effects: 277706f25ae9SGregory Neil Shapiro ** none. 277806f25ae9SGregory Neil Shapiro */ 277906f25ae9SGregory Neil Shapiro 278006f25ae9SGregory Neil Shapiro #if NETUNIX 278140266059SGregory Neil Shapiro int 278240266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 278306f25ae9SGregory Neil Shapiro char *mux_path; 278406f25ae9SGregory Neil Shapiro register MCI *mci; 278506f25ae9SGregory Neil Shapiro { 278606f25ae9SGregory Neil Shapiro int sock; 278706f25ae9SGregory Neil Shapiro int rval, save_errno; 278806f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 278906f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 279006f25ae9SGregory Neil Shapiro 279106f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 279206f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 279306f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 279406f25ae9SGregory Neil Shapiro 279506f25ae9SGregory Neil Shapiro if (rval != 0) 279606f25ae9SGregory Neil Shapiro { 279706f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket"); 279806f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 279906f25ae9SGregory Neil Shapiro errno = rval; 280006f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 280106f25ae9SGregory Neil Shapiro } 280206f25ae9SGregory Neil Shapiro 280306f25ae9SGregory Neil Shapiro /* prepare address structure */ 280406f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 280506f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 280606f25ae9SGregory Neil Shapiro 280706f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 280806f25ae9SGregory Neil Shapiro { 280906f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: domain socket name too long"); 281040266059SGregory Neil Shapiro 281140266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 281206f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 281306f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 281406f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 281506f25ae9SGregory Neil Shapiro } 281640266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 281740266059SGregory Neil Shapiro sizeof unix_addr.sun_path); 281806f25ae9SGregory Neil Shapiro 281906f25ae9SGregory Neil Shapiro /* initialize domain socket */ 282006f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 282106f25ae9SGregory Neil Shapiro if (sock == -1) 282206f25ae9SGregory Neil Shapiro { 282306f25ae9SGregory Neil Shapiro save_errno = errno; 282406f25ae9SGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket"); 282506f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 282606f25ae9SGregory Neil Shapiro errno = save_errno; 282706f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 282806f25ae9SGregory Neil Shapiro } 282906f25ae9SGregory Neil Shapiro 283006f25ae9SGregory Neil Shapiro /* connect to server */ 283106f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 283206f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 283306f25ae9SGregory Neil Shapiro { 283406f25ae9SGregory Neil Shapiro save_errno = errno; 283506f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 283606f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 283706f25ae9SGregory Neil Shapiro (void) close(sock); 283806f25ae9SGregory Neil Shapiro errno = save_errno; 283906f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 284006f25ae9SGregory Neil Shapiro } 284106f25ae9SGregory Neil Shapiro 284206f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 284306f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 284440266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 284540266059SGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY, NULL)) 284640266059SGregory Neil Shapiro == NULL 284740266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 284840266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 284940266059SGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY, NULL)) 285040266059SGregory Neil Shapiro == NULL) 285106f25ae9SGregory Neil Shapiro { 285206f25ae9SGregory Neil Shapiro save_errno = errno; 285306f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 285406f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 285506f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 285640266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 285706f25ae9SGregory Neil Shapiro (void) close(sock); 285806f25ae9SGregory Neil Shapiro errno = save_errno; 2859c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2860c2aa98e2SPeter Wemm } 286140266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 2862c2aa98e2SPeter Wemm 2863c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 286406f25ae9SGregory Neil Shapiro errno = 0; 286506f25ae9SGregory Neil Shapiro return EX_OK; 2866c2aa98e2SPeter Wemm } 286706f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 286840266059SGregory Neil Shapiro /* 286940266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 28708774250cSGregory Neil Shapiro ** 28718774250cSGregory Neil Shapiro ** Parameters: 287240266059SGregory Neil Shapiro ** none. 28738774250cSGregory Neil Shapiro ** 28748774250cSGregory Neil Shapiro ** Returns: 28758774250cSGregory Neil Shapiro ** none. 28768774250cSGregory Neil Shapiro ** 28778774250cSGregory Neil Shapiro ** Side Effects: 287840266059SGregory Neil Shapiro ** closes control socket, exits. 28798774250cSGregory Neil Shapiro */ 28808774250cSGregory Neil Shapiro 288140266059SGregory Neil Shapiro void 288240266059SGregory Neil Shapiro shutdown_daemon() 28838774250cSGregory Neil Shapiro { 288440266059SGregory Neil Shapiro int i; 288540266059SGregory Neil Shapiro char *reason; 28868774250cSGregory Neil Shapiro 288740266059SGregory Neil Shapiro sm_allsignals(true); 288840266059SGregory Neil Shapiro 288940266059SGregory Neil Shapiro reason = ShutdownRequest; 289040266059SGregory Neil Shapiro ShutdownRequest = NULL; 289140266059SGregory Neil Shapiro PendingSignal = 0; 289240266059SGregory Neil Shapiro 289340266059SGregory Neil Shapiro if (LogLevel > 79) 289440266059SGregory Neil Shapiro sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt (%s)", 289540266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 289640266059SGregory Neil Shapiro 289740266059SGregory Neil Shapiro FileName = NULL; 289840266059SGregory Neil Shapiro closecontrolsocket(true); 289940266059SGregory Neil Shapiro #if XLA 290040266059SGregory Neil Shapiro xla_all_end(); 290140266059SGregory Neil Shapiro #endif /* XLA */ 290240266059SGregory Neil Shapiro 290340266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 290440266059SGregory Neil Shapiro { 290540266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 290640266059SGregory Neil Shapiro { 290740266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 290840266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 290940266059SGregory Neil Shapiro 291040266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 291140266059SGregory Neil Shapiro # if NETUNIX 291240266059SGregory Neil Shapiro /* Remove named sockets */ 291340266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 291440266059SGregory Neil Shapiro { 291540266059SGregory Neil Shapiro int rval; 291640266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 291740266059SGregory Neil Shapiro 291840266059SGregory Neil Shapiro /* if not safe, don't use it */ 291940266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 292040266059SGregory Neil Shapiro RunAsUid, RunAsGid, 292140266059SGregory Neil Shapiro RunAsUserName, sff, 292240266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 292340266059SGregory Neil Shapiro if (rval == 0 && 292440266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 292540266059SGregory Neil Shapiro { 292640266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 292740266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 292840266059SGregory Neil Shapiro Daemons[i].d_name, 292940266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 293040266059SGregory Neil Shapiro sm_errstring(errno)); 29318774250cSGregory Neil Shapiro } 293240266059SGregory Neil Shapiro } 293340266059SGregory Neil Shapiro # endif /* NETUNIX */ 293440266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 293540266059SGregory Neil Shapiro } 293640266059SGregory Neil Shapiro } 293740266059SGregory Neil Shapiro 293840266059SGregory Neil Shapiro finis(false, true, EX_OK); 293940266059SGregory Neil Shapiro } 294040266059SGregory Neil Shapiro /* 29418774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 29428774250cSGregory Neil Shapiro ** 29438774250cSGregory Neil Shapiro ** Parameters: 29448774250cSGregory Neil Shapiro ** none. 29458774250cSGregory Neil Shapiro ** 29468774250cSGregory Neil Shapiro ** Returns: 29478774250cSGregory Neil Shapiro ** none. 29488774250cSGregory Neil Shapiro ** 29498774250cSGregory Neil Shapiro ** Side Effects: 29508774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 29518774250cSGregory Neil Shapiro */ 29528774250cSGregory Neil Shapiro 295313058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 295413058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 295513058a91SGregory Neil Shapiro do \ 295613058a91SGregory Neil Shapiro { \ 295740266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 295813058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 295940266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 296013058a91SGregory Neil Shapiro } while (0) 296113058a91SGregory Neil Shapiro 296240266059SGregory Neil Shapiro void 29638774250cSGregory Neil Shapiro restart_daemon() 29648774250cSGregory Neil Shapiro { 296540266059SGregory Neil Shapiro bool drop; 29668774250cSGregory Neil Shapiro int i; 29678774250cSGregory Neil Shapiro int save_errno; 29688774250cSGregory Neil Shapiro char *reason; 296913058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 29708774250cSGregory Neil Shapiro extern int DtableSize; 29718774250cSGregory Neil Shapiro 297213058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 297340266059SGregory Neil Shapiro sm_clear_events(); 297440266059SGregory Neil Shapiro sm_allsignals(true); 29758774250cSGregory Neil Shapiro 29768774250cSGregory Neil Shapiro reason = RestartRequest; 29778774250cSGregory Neil Shapiro RestartRequest = NULL; 29788774250cSGregory Neil Shapiro PendingSignal = 0; 29798774250cSGregory Neil Shapiro 29808774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 29818774250cSGregory Neil Shapiro { 29828774250cSGregory Neil Shapiro if (LogLevel > 3) 29838774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 29848774250cSGregory Neil Shapiro "could not restart: need full path"); 298540266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 298640266059SGregory Neil Shapiro /* NOTREACHED */ 29878774250cSGregory Neil Shapiro } 29888774250cSGregory Neil Shapiro if (LogLevel > 3) 29898774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 29908774250cSGregory Neil Shapiro SaveArgv[0], 29918774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 29928774250cSGregory Neil Shapiro 299340266059SGregory Neil Shapiro closecontrolsocket(true); 299494c01205SGregory Neil Shapiro #if SM_CONF_SHM 299594c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 299694c01205SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 299740266059SGregory Neil Shapiro 299840266059SGregory Neil Shapiro /* 299940266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 300040266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 300140266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 300240266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 300340266059SGregory Neil Shapiro */ 300440266059SGregory Neil Shapiro 300540266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 300640266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 300740266059SGregory Neil Shapiro 300840266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 30098774250cSGregory Neil Shapiro { 30108774250cSGregory Neil Shapiro if (LogLevel > 0) 30118774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 301240266059SGregory Neil Shapiro "could not drop privileges: %s", 301340266059SGregory Neil Shapiro sm_errstring(errno)); 301440266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 301540266059SGregory Neil Shapiro /* NOTREACHED */ 30168774250cSGregory Neil Shapiro } 30178774250cSGregory Neil Shapiro 30188774250cSGregory Neil Shapiro /* arrange for all the files to be closed */ 30198774250cSGregory Neil Shapiro for (i = 3; i < DtableSize; i++) 30208774250cSGregory Neil Shapiro { 30218774250cSGregory Neil Shapiro register int j; 30228774250cSGregory Neil Shapiro 30238774250cSGregory Neil Shapiro if ((j = fcntl(i, F_GETFD, 0)) != -1) 30248774250cSGregory Neil Shapiro (void) fcntl(i, F_SETFD, j | FD_CLOEXEC); 30258774250cSGregory Neil Shapiro } 30268774250cSGregory Neil Shapiro 302713058a91SGregory Neil Shapiro /* 302813058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 302913058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 303013058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 303113058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 303213058a91SGregory Neil Shapiro */ 303313058a91SGregory Neil Shapiro 303413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 303513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 303613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 303713058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 303813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 303913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 304013058a91SGregory Neil Shapiro #ifdef SIGUSR1 304113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 304213058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 3043605302a5SGregory Neil Shapiro 3044605302a5SGregory Neil Shapiro /* Turn back on signals */ 304540266059SGregory Neil Shapiro sm_allsignals(false); 30468774250cSGregory Neil Shapiro 30478774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 30488774250cSGregory Neil Shapiro save_errno = errno; 30498774250cSGregory Neil Shapiro 305013058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 305140266059SGregory Neil Shapiro sm_allsignals(true); 305213058a91SGregory Neil Shapiro 305313058a91SGregory Neil Shapiro /* For finis() events */ 305440266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 305513058a91SGregory Neil Shapiro 305613058a91SGregory Neil Shapiro #ifdef SIGUSR1 305713058a91SGregory Neil Shapiro /* For debugging finis() */ 305840266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 305913058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 30608774250cSGregory Neil Shapiro 30618774250cSGregory Neil Shapiro errno = save_errno; 30628774250cSGregory Neil Shapiro if (LogLevel > 0) 306340266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 306440266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 306540266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 306640266059SGregory Neil Shapiro /* NOTREACHED */ 30678774250cSGregory Neil Shapiro } 306840266059SGregory Neil Shapiro /* 3069c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3070c2aa98e2SPeter Wemm ** 3071c2aa98e2SPeter Wemm ** Parameters: 3072c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3073c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3074c2aa98e2SPeter Wemm ** 3075c2aa98e2SPeter Wemm ** Returns: 3076c2aa98e2SPeter Wemm ** A list of aliases for this host. 3077c2aa98e2SPeter Wemm ** 3078c2aa98e2SPeter Wemm ** Side Effects: 3079c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3080c2aa98e2SPeter Wemm */ 3081c2aa98e2SPeter Wemm 3082c2aa98e2SPeter Wemm struct hostent * 3083c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3084c2aa98e2SPeter Wemm char hostbuf[]; 3085c2aa98e2SPeter Wemm int size; 3086c2aa98e2SPeter Wemm { 3087c2aa98e2SPeter Wemm register struct hostent *hp; 3088c2aa98e2SPeter Wemm 3089602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 309040266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 309106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 309213058a91SGregory Neil Shapiro #if NETINET && NETINET6 309313058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 309413058a91SGregory Neil Shapiro { 309513058a91SGregory Neil Shapiro /* 309613058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 309713058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 309813058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 309913058a91SGregory Neil Shapiro */ 310013058a91SGregory Neil Shapiro 310113058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 310213058a91SGregory Neil Shapiro } 310313058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3104c2aa98e2SPeter Wemm if (hp == NULL) 3105c2aa98e2SPeter Wemm return NULL; 3106c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 310706f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 310806f25ae9SGregory Neil Shapiro 310906f25ae9SGregory Neil Shapiro #if NETINFO 311006f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3111c2aa98e2SPeter Wemm { 311206f25ae9SGregory Neil Shapiro char *domainname; 311306f25ae9SGregory Neil Shapiro 311406f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 311506f25ae9SGregory Neil Shapiro "domain", '\0'); 311606f25ae9SGregory Neil Shapiro if (domainname != NULL && 311706f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 311840266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 311906f25ae9SGregory Neil Shapiro } 312006f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3121c2aa98e2SPeter Wemm 3122c2aa98e2SPeter Wemm /* 3123c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3124c2aa98e2SPeter Wemm ** dotted alias. 3125c2aa98e2SPeter Wemm */ 3126c2aa98e2SPeter Wemm 3127c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3128c2aa98e2SPeter Wemm { 3129c2aa98e2SPeter Wemm char **ha; 3130c2aa98e2SPeter Wemm 313106f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3132c2aa98e2SPeter Wemm { 3133c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3134c2aa98e2SPeter Wemm { 313506f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3136c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3137c2aa98e2SPeter Wemm break; 3138c2aa98e2SPeter Wemm } 3139c2aa98e2SPeter Wemm } 3140c2aa98e2SPeter Wemm } 3141c2aa98e2SPeter Wemm 3142c2aa98e2SPeter Wemm /* 3143c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3144c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3145c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3146c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3147c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3148c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3149c2aa98e2SPeter Wemm */ 3150c2aa98e2SPeter Wemm 3151c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 315240266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3153c2aa98e2SPeter Wemm { 3154c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 3155c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3156c2aa98e2SPeter Wemm hostbuf); 3157c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3158c2aa98e2SPeter Wemm hostbuf); 315906f25ae9SGregory Neil Shapiro (void) sleep(60); 316040266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3161c2aa98e2SPeter Wemm { 3162c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 3163c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3164c2aa98e2SPeter Wemm hostbuf); 3165c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3166c2aa98e2SPeter Wemm hostbuf); 3167c2aa98e2SPeter Wemm } 3168c2aa98e2SPeter Wemm } 316906f25ae9SGregory Neil Shapiro return hp; 3170c2aa98e2SPeter Wemm } 317140266059SGregory Neil Shapiro /* 3172c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3173c2aa98e2SPeter Wemm ** 3174c2aa98e2SPeter Wemm ** Parameters: 3175c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3176c2aa98e2SPeter Wemm ** ha -- actual first address 3177c2aa98e2SPeter Wemm ** sa -- second address 3178c2aa98e2SPeter Wemm ** 3179c2aa98e2SPeter Wemm ** Returns: 3180c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3181c2aa98e2SPeter Wemm ** else -- they don't match 3182c2aa98e2SPeter Wemm */ 3183c2aa98e2SPeter Wemm 318406f25ae9SGregory Neil Shapiro static int 3185c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3186c2aa98e2SPeter Wemm struct hostent *hp; 3187c2aa98e2SPeter Wemm char *ha; 3188c2aa98e2SPeter Wemm SOCKADDR *sa; 3189c2aa98e2SPeter Wemm { 319006f25ae9SGregory Neil Shapiro #if NETINET6 319140266059SGregory Neil Shapiro unsigned char *a; 319206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 319306f25ae9SGregory Neil Shapiro 3194c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3195c2aa98e2SPeter Wemm { 319606f25ae9SGregory Neil Shapiro #if NETINET 3197c2aa98e2SPeter Wemm case AF_INET: 3198c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 319906f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3200c2aa98e2SPeter Wemm break; 320106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3202c2aa98e2SPeter Wemm 320306f25ae9SGregory Neil Shapiro #if NETINET6 320406f25ae9SGregory Neil Shapiro case AF_INET6: 320540266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 320606f25ae9SGregory Neil Shapiro 320706f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 320806f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 320906f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 321006f25ae9SGregory Neil Shapiro 321106f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 321206f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 321306f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 321406f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 321506f25ae9SGregory Neil Shapiro break; 321606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3217c2aa98e2SPeter Wemm } 3218c2aa98e2SPeter Wemm return -1; 3219c2aa98e2SPeter Wemm } 322040266059SGregory Neil Shapiro /* 322106f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3222c2aa98e2SPeter Wemm ** 3223c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3224c2aa98e2SPeter Wemm ** 3225c2aa98e2SPeter Wemm ** Parameters: 3226c2aa98e2SPeter Wemm ** fd -- the descriptor 322740266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3228c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 322940266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3230c2aa98e2SPeter Wemm ** 3231c2aa98e2SPeter Wemm ** Returns: 3232c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3233c2aa98e2SPeter Wemm */ 3234c2aa98e2SPeter Wemm 3235c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3236c2aa98e2SPeter Wemm 3237c2aa98e2SPeter Wemm static void 3238c2aa98e2SPeter Wemm authtimeout() 3239c2aa98e2SPeter Wemm { 32408774250cSGregory Neil Shapiro /* 32418774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 32428774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 32438774250cSGregory Neil Shapiro ** DOING. 32448774250cSGregory Neil Shapiro */ 32458774250cSGregory Neil Shapiro 32468774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3247c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3248c2aa98e2SPeter Wemm } 3249c2aa98e2SPeter Wemm 3250c2aa98e2SPeter Wemm char * 3251c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3252c2aa98e2SPeter Wemm int fd; 3253c2aa98e2SPeter Wemm bool *may_be_forged; 3254c2aa98e2SPeter Wemm { 325540266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3256c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3257c2aa98e2SPeter Wemm register char *volatile p = NULL; 3258c2aa98e2SPeter Wemm SOCKADDR la; 3259c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 326040266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3261c2aa98e2SPeter Wemm register struct servent *sp; 326240266059SGregory Neil Shapiro # if NETINET 326340266059SGregory Neil Shapiro static unsigned short port4 = 0; 326440266059SGregory Neil Shapiro # endif /* NETINET */ 326540266059SGregory Neil Shapiro # if NETINET6 326640266059SGregory Neil Shapiro static unsigned short port6 = 0; 326740266059SGregory Neil Shapiro # endif /* NETINET6 */ 326840266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3269c2aa98e2SPeter Wemm volatile int s; 3270c2aa98e2SPeter Wemm int i = 0; 327140266059SGregory Neil Shapiro size_t len; 327240266059SGregory Neil Shapiro SM_EVENT *ev; 3273c2aa98e2SPeter Wemm int nleft; 3274c2aa98e2SPeter Wemm struct hostent *hp; 3275c2aa98e2SPeter Wemm char *ostype = NULL; 3276c2aa98e2SPeter Wemm char **ha; 3277c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 327813bd1963SGregory Neil Shapiro static char hbuf[MAXNAME + MAXAUTHINFO + 11]; 3279c2aa98e2SPeter Wemm 328040266059SGregory Neil Shapiro *may_be_forged = false; 3281c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 3282c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3283c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3284c2aa98e2SPeter Wemm { 328506f25ae9SGregory Neil Shapiro if (i < 0) 328606f25ae9SGregory Neil Shapiro { 328706f25ae9SGregory Neil Shapiro /* 328806f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 328906f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 329006f25ae9SGregory Neil Shapiro ** happen later. 329106f25ae9SGregory Neil Shapiro */ 329240266059SGregory Neil Shapiro 329306f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3294c2aa98e2SPeter Wemm return NULL; 329506f25ae9SGregory Neil Shapiro errno = 0; 329606f25ae9SGregory Neil Shapiro } 329740266059SGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof hbuf, 2, RealUserName, 329840266059SGregory Neil Shapiro "@localhost"); 3299c2aa98e2SPeter Wemm if (tTd(9, 1)) 330040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3301c2aa98e2SPeter Wemm return hbuf; 3302c2aa98e2SPeter Wemm } 3303c2aa98e2SPeter Wemm 3304c2aa98e2SPeter Wemm if (RealHostName == NULL) 3305c2aa98e2SPeter Wemm { 3306c2aa98e2SPeter Wemm /* translate that to a host name */ 3307c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3308c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 330940266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3310c2aa98e2SPeter Wemm } 3311c2aa98e2SPeter Wemm 3312c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 331340266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 331440266059SGregory Neil Shapiro RealHostName[0] != '[') 3315c2aa98e2SPeter Wemm { 331613058a91SGregory Neil Shapiro int family; 3317c2aa98e2SPeter Wemm 331813058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 331913058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 332013058a91SGregory Neil Shapiro /* 332113058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 332213058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 332313058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 332413058a91SGregory Neil Shapiro ** RealHostAddr. 332513058a91SGregory Neil Shapiro ** 332613058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 332713058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 332813058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 332913058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 333013058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 333113058a91SGregory Neil Shapiro */ 333213058a91SGregory Neil Shapiro 333313058a91SGregory Neil Shapiro if (family == AF_INET6 && 333413058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 333513058a91SGregory Neil Shapiro family = AF_INET; 333613058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 333713058a91SGregory Neil Shapiro 333813058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 333913058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3340c2aa98e2SPeter Wemm if (hp == NULL) 3341a7ec597cSGregory Neil Shapiro { 334240266059SGregory Neil Shapiro *may_be_forged = true; 3343a7ec597cSGregory Neil Shapiro } 3344c2aa98e2SPeter Wemm else 3345c2aa98e2SPeter Wemm { 3346c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 334740266059SGregory Neil Shapiro { 3348c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3349c2aa98e2SPeter Wemm break; 335040266059SGregory Neil Shapiro } 3351c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 335240266059SGregory Neil Shapiro #if NETINET6 3353193538b7SGregory Neil Shapiro freehostent(hp); 3354193538b7SGregory Neil Shapiro hp = NULL; 335540266059SGregory Neil Shapiro #endif /* NETINET6 */ 3356c2aa98e2SPeter Wemm } 3357c2aa98e2SPeter Wemm } 3358c2aa98e2SPeter Wemm 3359c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3360c2aa98e2SPeter Wemm goto noident; 3361c2aa98e2SPeter Wemm 3362c2aa98e2SPeter Wemm lalen = sizeof la; 336306f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 336406f25ae9SGregory Neil Shapiro { 336506f25ae9SGregory Neil Shapiro #if NETINET 336606f25ae9SGregory Neil Shapiro case AF_INET: 336706f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 336806f25ae9SGregory Neil Shapiro lalen <= 0 || 3369c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3370c2aa98e2SPeter Wemm { 3371c2aa98e2SPeter Wemm /* no ident info */ 3372c2aa98e2SPeter Wemm goto noident; 3373c2aa98e2SPeter Wemm } 337406f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3375c2aa98e2SPeter Wemm 3376c2aa98e2SPeter Wemm /* create ident query */ 337740266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 337806f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 337906f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3380c2aa98e2SPeter Wemm 3381c2aa98e2SPeter Wemm /* create local address */ 3382c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3383c2aa98e2SPeter Wemm 3384c2aa98e2SPeter Wemm /* create foreign address */ 338506f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 338606f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 338706f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 338840266059SGregory Neil Shapiro 338940266059SGregory Neil Shapiro /* 339040266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 339140266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 339240266059SGregory Neil Shapiro ** spent in this routine). 339340266059SGregory Neil Shapiro ** Hence we store the port in a static variable 339440266059SGregory Neil Shapiro ** to save this time. 339540266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 339640266059SGregory Neil Shapiro ** This code makes the assumption that the port number 339740266059SGregory Neil Shapiro ** is not 0. 339840266059SGregory Neil Shapiro */ 339940266059SGregory Neil Shapiro 340040266059SGregory Neil Shapiro if (port4 == 0) 340140266059SGregory Neil Shapiro { 3402c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3403c2aa98e2SPeter Wemm if (sp != NULL) 340440266059SGregory Neil Shapiro port4 = sp->s_port; 3405c2aa98e2SPeter Wemm else 340640266059SGregory Neil Shapiro port4 = htons(113); 340740266059SGregory Neil Shapiro } 340840266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 340906f25ae9SGregory Neil Shapiro break; 341006f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 341106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 341206f25ae9SGregory Neil Shapiro 341306f25ae9SGregory Neil Shapiro #if NETINET6 341406f25ae9SGregory Neil Shapiro case AF_INET6: 341506f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 341606f25ae9SGregory Neil Shapiro lalen <= 0 || 341706f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 341806f25ae9SGregory Neil Shapiro { 341906f25ae9SGregory Neil Shapiro /* no ident info */ 342006f25ae9SGregory Neil Shapiro goto noident; 342106f25ae9SGregory Neil Shapiro } 342206f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 342306f25ae9SGregory Neil Shapiro 342406f25ae9SGregory Neil Shapiro /* create ident query */ 342540266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 342606f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 342706f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 342806f25ae9SGregory Neil Shapiro 342906f25ae9SGregory Neil Shapiro /* create local address */ 343006f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 343106f25ae9SGregory Neil Shapiro 343206f25ae9SGregory Neil Shapiro /* create foreign address */ 343306f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 343406f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 343506f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 343640266059SGregory Neil Shapiro if (port6 == 0) 343740266059SGregory Neil Shapiro { 343806f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 343906f25ae9SGregory Neil Shapiro if (sp != NULL) 344040266059SGregory Neil Shapiro port6 = sp->s_port; 344106f25ae9SGregory Neil Shapiro else 344240266059SGregory Neil Shapiro port6 = htons(113); 344340266059SGregory Neil Shapiro } 344440266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 344506f25ae9SGregory Neil Shapiro break; 344606f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 344706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 344806f25ae9SGregory Neil Shapiro default: 344906f25ae9SGregory Neil Shapiro /* no ident info */ 345006f25ae9SGregory Neil Shapiro goto noident; 345106f25ae9SGregory Neil Shapiro } 3452c2aa98e2SPeter Wemm 3453c2aa98e2SPeter Wemm s = -1; 3454c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3455c2aa98e2SPeter Wemm { 3456c2aa98e2SPeter Wemm if (s >= 0) 3457c2aa98e2SPeter Wemm (void) close(s); 3458c2aa98e2SPeter Wemm goto noident; 3459c2aa98e2SPeter Wemm } 3460c2aa98e2SPeter Wemm 3461c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 346240266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3463c2aa98e2SPeter Wemm 3464c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 346506f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3466c2aa98e2SPeter Wemm if (s < 0) 3467c2aa98e2SPeter Wemm { 346840266059SGregory Neil Shapiro sm_clrevent(ev); 3469c2aa98e2SPeter Wemm goto noident; 3470c2aa98e2SPeter Wemm } 347106f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 347206f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3473c2aa98e2SPeter Wemm goto closeident; 3474c2aa98e2SPeter Wemm 3475c2aa98e2SPeter Wemm if (tTd(9, 10)) 347640266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3477c2aa98e2SPeter Wemm 3478c2aa98e2SPeter Wemm /* send query */ 3479c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3480c2aa98e2SPeter Wemm goto closeident; 3481c2aa98e2SPeter Wemm 3482c2aa98e2SPeter Wemm /* get result */ 3483c2aa98e2SPeter Wemm p = &ibuf[0]; 3484c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 3485c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3486c2aa98e2SPeter Wemm { 3487c2aa98e2SPeter Wemm p += i; 3488c2aa98e2SPeter Wemm nleft -= i; 3489c2aa98e2SPeter Wemm *p = '\0'; 349040266059SGregory Neil Shapiro if (strchr(ibuf, '\n') != NULL || nleft <= 0) 3491c2aa98e2SPeter Wemm break; 3492c2aa98e2SPeter Wemm } 3493c2aa98e2SPeter Wemm (void) close(s); 349440266059SGregory Neil Shapiro sm_clrevent(ev); 3495c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3496c2aa98e2SPeter Wemm goto noident; 3497c2aa98e2SPeter Wemm 3498d9986b26SGregory Neil Shapiro if (p >= &ibuf[2] && *--p == '\n' && *--p == '\r') 3499c2aa98e2SPeter Wemm p--; 3500c2aa98e2SPeter Wemm *++p = '\0'; 3501c2aa98e2SPeter Wemm 3502c2aa98e2SPeter Wemm if (tTd(9, 3)) 350340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3504c2aa98e2SPeter Wemm 3505c2aa98e2SPeter Wemm /* parse result */ 3506c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3507c2aa98e2SPeter Wemm if (p == NULL) 3508c2aa98e2SPeter Wemm { 3509c2aa98e2SPeter Wemm /* malformed response */ 3510c2aa98e2SPeter Wemm goto noident; 3511c2aa98e2SPeter Wemm } 3512c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3513c2aa98e2SPeter Wemm continue; 351440266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3515c2aa98e2SPeter Wemm { 3516c2aa98e2SPeter Wemm /* presumably an error string */ 3517c2aa98e2SPeter Wemm goto noident; 3518c2aa98e2SPeter Wemm } 3519c2aa98e2SPeter Wemm p += 6; 3520c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3521c2aa98e2SPeter Wemm p++; 3522c2aa98e2SPeter Wemm if (*p++ != ':') 3523c2aa98e2SPeter Wemm { 3524c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3525c2aa98e2SPeter Wemm goto noident; 3526c2aa98e2SPeter Wemm } 3527c2aa98e2SPeter Wemm 3528c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3529c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3530c2aa98e2SPeter Wemm p++; 3531c2aa98e2SPeter Wemm ostype = p; 3532c2aa98e2SPeter Wemm p = strchr(p, ':'); 3533c2aa98e2SPeter Wemm if (p == NULL) 3534c2aa98e2SPeter Wemm { 3535c2aa98e2SPeter Wemm /* malformed response */ 3536c2aa98e2SPeter Wemm goto noident; 3537c2aa98e2SPeter Wemm } 3538c2aa98e2SPeter Wemm else 3539c2aa98e2SPeter Wemm { 3540c2aa98e2SPeter Wemm char *charset; 3541c2aa98e2SPeter Wemm 3542c2aa98e2SPeter Wemm *p = '\0'; 3543c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3544c2aa98e2SPeter Wemm if (charset != NULL) 3545c2aa98e2SPeter Wemm *charset = '\0'; 3546c2aa98e2SPeter Wemm } 3547c2aa98e2SPeter Wemm 3548c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3549c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3550c2aa98e2SPeter Wemm continue; 3551c2aa98e2SPeter Wemm 3552c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 355340266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3554c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3555c2aa98e2SPeter Wemm { 355640266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof hbuf); 355713bd1963SGregory Neil Shapiro cleanstrcpy(&hbuf[6], p, MAXAUTHINFO); 3558c2aa98e2SPeter Wemm } 3559c2aa98e2SPeter Wemm else 356013bd1963SGregory Neil Shapiro cleanstrcpy(hbuf, p, MAXAUTHINFO); 356140266059SGregory Neil Shapiro len = strlen(hbuf); 356240266059SGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof hbuf - len, 2, "@", 3563c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3564c2aa98e2SPeter Wemm goto postident; 3565c2aa98e2SPeter Wemm 3566c2aa98e2SPeter Wemm closeident: 3567c2aa98e2SPeter Wemm (void) close(s); 356840266059SGregory Neil Shapiro sm_clrevent(ev); 3569c2aa98e2SPeter Wemm 3570c2aa98e2SPeter Wemm noident: 357106f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 357206f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 357306f25ae9SGregory Neil Shapiro { 357406f25ae9SGregory Neil Shapiro #if NETINET 357506f25ae9SGregory Neil Shapiro case AF_INET: 357606f25ae9SGregory Neil Shapiro if (port > 0) 357706f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 357806f25ae9SGregory Neil Shapiro break; 357906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 358006f25ae9SGregory Neil Shapiro 358106f25ae9SGregory Neil Shapiro #if NETINET6 358206f25ae9SGregory Neil Shapiro case AF_INET6: 358306f25ae9SGregory Neil Shapiro if (port > 0) 358406f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 358506f25ae9SGregory Neil Shapiro break; 358606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 358706f25ae9SGregory Neil Shapiro } 358806f25ae9SGregory Neil Shapiro 3589c2aa98e2SPeter Wemm if (RealHostName == NULL) 3590c2aa98e2SPeter Wemm { 3591c2aa98e2SPeter Wemm if (tTd(9, 1)) 359240266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3593c2aa98e2SPeter Wemm return NULL; 3594c2aa98e2SPeter Wemm } 359540266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof hbuf); 3596c2aa98e2SPeter Wemm 3597c2aa98e2SPeter Wemm postident: 3598c2aa98e2SPeter Wemm #if IP_SRCROUTE 3599c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3600c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 360106f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3602c2aa98e2SPeter Wemm /* 3603c2aa98e2SPeter Wemm ** Extract IP source routing information. 3604c2aa98e2SPeter Wemm ** 3605c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3606c2aa98e2SPeter Wemm ** through c to d: 3607c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3608c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3609c2aa98e2SPeter Wemm ** 3610c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3611c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3612c2aa98e2SPeter Wemm ** p - pointer to hbuf 3613c2aa98e2SPeter Wemm */ 3614c2aa98e2SPeter Wemm 3615c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3616c2aa98e2SPeter Wemm { 3617c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3618c2aa98e2SPeter Wemm int j; 361940266059SGregory Neil Shapiro unsigned char *q; 362040266059SGregory Neil Shapiro unsigned char *o; 3621c2aa98e2SPeter Wemm int l; 362206f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3623c2aa98e2SPeter Wemm 3624c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3625c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3626c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3627c2aa98e2SPeter Wemm goto noipsr; 3628c2aa98e2SPeter Wemm if (ipoptlen == 0) 3629c2aa98e2SPeter Wemm goto noipsr; 363040266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 363140266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3632c2aa98e2SPeter Wemm { 3633c2aa98e2SPeter Wemm switch (*o) 3634c2aa98e2SPeter Wemm { 3635c2aa98e2SPeter Wemm case IPOPT_EOL: 3636c2aa98e2SPeter Wemm o = NULL; 3637c2aa98e2SPeter Wemm break; 3638c2aa98e2SPeter Wemm 3639c2aa98e2SPeter Wemm case IPOPT_NOP: 3640c2aa98e2SPeter Wemm o++; 3641c2aa98e2SPeter Wemm break; 3642c2aa98e2SPeter Wemm 3643c2aa98e2SPeter Wemm case IPOPT_SSRR: 3644c2aa98e2SPeter Wemm case IPOPT_LSRR: 3645c2aa98e2SPeter Wemm /* 3646c2aa98e2SPeter Wemm ** Source routing. 3647c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3648c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3649c2aa98e2SPeter Wemm ** including option type and 3650c2aa98e2SPeter Wemm ** length. 3651c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3652c2aa98e2SPeter Wemm ** data. 3653c2aa98e2SPeter Wemm ** o[3] begins the route data. 3654c2aa98e2SPeter Wemm */ 3655c2aa98e2SPeter Wemm 3656c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3657c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 365840266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 365940266059SGregory Neil Shapiro " [%s@%.*s", 3660c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3661c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 366206f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3663c2aa98e2SPeter Wemm i = strlen(p); 3664c2aa98e2SPeter Wemm p += i; 3665c2aa98e2SPeter Wemm l -= strlen(p); 3666c2aa98e2SPeter Wemm 3667c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3668c2aa98e2SPeter Wemm 3669c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3670c2aa98e2SPeter Wemm q = &o[3]; 3671c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3672c2aa98e2SPeter Wemm { 367306f25ae9SGregory Neil Shapiro struct in_addr addr; 367406f25ae9SGregory Neil Shapiro 3675c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 367640266059SGregory Neil Shapiro (void) sm_snprintf(p, 367740266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3678c2aa98e2SPeter Wemm "%c%.*s", 3679c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3680c2aa98e2SPeter Wemm l > 240 ? 120 : 3681c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3682c2aa98e2SPeter Wemm inet_ntoa(addr)); 3683c2aa98e2SPeter Wemm i = strlen(p); 3684c2aa98e2SPeter Wemm p += i; 3685c2aa98e2SPeter Wemm l -= i + 1; 3686c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3687c2aa98e2SPeter Wemm } 3688c2aa98e2SPeter Wemm o += o[1]; 3689c2aa98e2SPeter Wemm break; 3690c2aa98e2SPeter Wemm 3691c2aa98e2SPeter Wemm default: 3692c2aa98e2SPeter Wemm /* Skip over option */ 3693c2aa98e2SPeter Wemm o += o[1]; 3694c2aa98e2SPeter Wemm break; 3695c2aa98e2SPeter Wemm } 3696c2aa98e2SPeter Wemm } 369740266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3698c2aa98e2SPeter Wemm goto postipsr; 3699c2aa98e2SPeter Wemm } 3700c2aa98e2SPeter Wemm 3701c2aa98e2SPeter Wemm noipsr: 370206f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3703c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3704c2aa98e2SPeter Wemm { 3705c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 370640266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3707c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3708c2aa98e2SPeter Wemm } 3709c2aa98e2SPeter Wemm if (*may_be_forged) 3710c2aa98e2SPeter Wemm { 3711c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 371240266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 371340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 371440266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3715c2aa98e2SPeter Wemm } 3716c2aa98e2SPeter Wemm 3717c2aa98e2SPeter Wemm #if IP_SRCROUTE 3718c2aa98e2SPeter Wemm postipsr: 371906f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 372006f25ae9SGregory Neil Shapiro 372106f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 372206f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 372306f25ae9SGregory Neil Shapiro { 372406f25ae9SGregory Neil Shapiro #if NETINET 372506f25ae9SGregory Neil Shapiro case AF_INET: 372606f25ae9SGregory Neil Shapiro if (port > 0) 372706f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 372806f25ae9SGregory Neil Shapiro break; 372906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 373006f25ae9SGregory Neil Shapiro 373106f25ae9SGregory Neil Shapiro #if NETINET6 373206f25ae9SGregory Neil Shapiro case AF_INET6: 373306f25ae9SGregory Neil Shapiro if (port > 0) 373406f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 373506f25ae9SGregory Neil Shapiro break; 373606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 373706f25ae9SGregory Neil Shapiro } 373806f25ae9SGregory Neil Shapiro 373940266059SGregory Neil Shapiro if (tTd(9, 1)) 374040266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3741c2aa98e2SPeter Wemm return hbuf; 3742c2aa98e2SPeter Wemm } 374340266059SGregory Neil Shapiro /* 3744c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3745c2aa98e2SPeter Wemm ** 3746c2aa98e2SPeter Wemm ** Parameters: 3747c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3748c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3749c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3750c2aa98e2SPeter Wemm ** functions. 3751c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3752c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3753c2aa98e2SPeter Wemm ** 3754c2aa98e2SPeter Wemm ** Returns: 3755c2aa98e2SPeter Wemm ** The mapping, if found. 3756c2aa98e2SPeter Wemm ** NULL if no mapping found. 3757c2aa98e2SPeter Wemm ** 3758c2aa98e2SPeter Wemm ** Side Effects: 3759c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3760c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3761c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3762c2aa98e2SPeter Wemm ** status only to be returned). 3763c2aa98e2SPeter Wemm */ 3764c2aa98e2SPeter Wemm 3765c2aa98e2SPeter Wemm char * 3766c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3767c2aa98e2SPeter Wemm MAP *map; 3768c2aa98e2SPeter Wemm char *name; 3769c2aa98e2SPeter Wemm char **av; 3770c2aa98e2SPeter Wemm int *statp; 3771c2aa98e2SPeter Wemm { 3772c2aa98e2SPeter Wemm register struct hostent *hp; 377306f25ae9SGregory Neil Shapiro #if NETINET 3774c2aa98e2SPeter Wemm struct in_addr in_addr; 377506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 377606f25ae9SGregory Neil Shapiro #if NETINET6 377706f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 377806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 377906f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3780c2aa98e2SPeter Wemm register STAB *s; 378140266059SGregory Neil Shapiro time_t now; 378240266059SGregory Neil Shapiro #if NAMED_BIND 378340266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 378440266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 378540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3786c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3787c2aa98e2SPeter Wemm 3788c2aa98e2SPeter Wemm /* 3789c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 379040266059SGregory Neil Shapiro ** return it (unless expired). 3791c2aa98e2SPeter Wemm */ 3792c2aa98e2SPeter Wemm 379340266059SGregory Neil Shapiro now = curtime(); 3794c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 379540266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 379640266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3797c2aa98e2SPeter Wemm { 3798c2aa98e2SPeter Wemm if (tTd(9, 1)) 379940266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3800c2aa98e2SPeter Wemm name, 3801c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3802c2aa98e2SPeter Wemm ? "NULL" 3803c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3804c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3805602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3806c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3807c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3808c2aa98e2SPeter Wemm { 3809c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3810c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3811c2aa98e2SPeter Wemm shortenstring(name, 33)); 3812c2aa98e2SPeter Wemm } 3813c2aa98e2SPeter Wemm if (*statp != EX_OK) 3814c2aa98e2SPeter Wemm return NULL; 3815c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3816c2aa98e2SPeter Wemm { 3817c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno = %d, h_errno = %d", 3818c2aa98e2SPeter Wemm name, 3819c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3820c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3821c2aa98e2SPeter Wemm return NULL; 3822c2aa98e2SPeter Wemm } 3823c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3824c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3825c2aa98e2SPeter Wemm else 3826c2aa98e2SPeter Wemm cp = map_rewrite(map, 3827c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3828c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3829c2aa98e2SPeter Wemm av); 3830c2aa98e2SPeter Wemm return cp; 3831c2aa98e2SPeter Wemm } 3832c2aa98e2SPeter Wemm 3833c2aa98e2SPeter Wemm /* 3834c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3835c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3836c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3837c2aa98e2SPeter Wemm */ 3838c2aa98e2SPeter Wemm 383906f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 384006f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3841c2aa98e2SPeter Wemm { 3842c2aa98e2SPeter Wemm if (tTd(9, 1)) 384340266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3844c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3845c2aa98e2SPeter Wemm return NULL; 3846c2aa98e2SPeter Wemm } 3847c2aa98e2SPeter Wemm 3848c2aa98e2SPeter Wemm /* 3849c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3850c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3851c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3852c2aa98e2SPeter Wemm ** unknown. 3853c2aa98e2SPeter Wemm */ 3854c2aa98e2SPeter Wemm 385506f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 385640266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 385740266059SGregory Neil Shapiro #if NAMED_BIND 385840266059SGregory Neil Shapiro if (map->map_timeout > 0) 385940266059SGregory Neil Shapiro { 386040266059SGregory Neil Shapiro retrans = _res.retrans; 386140266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 386240266059SGregory Neil Shapiro } 386340266059SGregory Neil Shapiro if (map->map_retry > 0) 386440266059SGregory Neil Shapiro { 386540266059SGregory Neil Shapiro retry = _res.retry; 386640266059SGregory Neil Shapiro _res.retry = map->map_retry; 386740266059SGregory Neil Shapiro } 386840266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 386940266059SGregory Neil Shapiro 387040266059SGregory Neil Shapiro /* set default TTL */ 387140266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 3872c2aa98e2SPeter Wemm if (*name != '[') 3873c2aa98e2SPeter Wemm { 387440266059SGregory Neil Shapiro int ttl; 387540266059SGregory Neil Shapiro 387640266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof hbuf); 387740266059SGregory Neil Shapiro if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX, &ttl)) 387840266059SGregory Neil Shapiro { 387906f25ae9SGregory Neil Shapiro ans = hbuf; 388040266059SGregory Neil Shapiro if (ttl > 0) 388140266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 388240266059SGregory Neil Shapiro SM_DEFAULT_TTL); 388340266059SGregory Neil Shapiro } 3884c2aa98e2SPeter Wemm } 3885c2aa98e2SPeter Wemm else 3886c2aa98e2SPeter Wemm { 388706f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3888193538b7SGregory Neil Shapiro { 3889193538b7SGregory Neil Shapiro if (tTd(9, 1)) 389040266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 389106f25ae9SGregory Neil Shapiro return NULL; 3892193538b7SGregory Neil Shapiro } 389306f25ae9SGregory Neil Shapiro *cp = '\0'; 389406f25ae9SGregory Neil Shapiro 389506f25ae9SGregory Neil Shapiro hp = NULL; 389606f25ae9SGregory Neil Shapiro #if NETINET 389706f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 389806f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 389906f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 390006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 390106f25ae9SGregory Neil Shapiro #if NETINET6 390206f25ae9SGregory Neil Shapiro if (hp == NULL && 390340266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 390406f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 390506f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 390606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 390706f25ae9SGregory Neil Shapiro *cp = ']'; 390806f25ae9SGregory Neil Shapiro 390906f25ae9SGregory Neil Shapiro if (hp != NULL) 391006f25ae9SGregory Neil Shapiro { 391106f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 391240266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 391340266059SGregory Neil Shapiro #if NETINET6 391440266059SGregory Neil Shapiro if (ans == hp->h_name) 391540266059SGregory Neil Shapiro { 391640266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 391740266059SGregory Neil Shapiro 391840266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 391940266059SGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof n); 392040266059SGregory Neil Shapiro ans = n; 392140266059SGregory Neil Shapiro } 3922193538b7SGregory Neil Shapiro freehostent(hp); 3923193538b7SGregory Neil Shapiro hp = NULL; 392440266059SGregory Neil Shapiro #endif /* NETINET6 */ 392506f25ae9SGregory Neil Shapiro } 392606f25ae9SGregory Neil Shapiro } 392740266059SGregory Neil Shapiro #if NAMED_BIND 392840266059SGregory Neil Shapiro if (map->map_timeout > 0) 392940266059SGregory Neil Shapiro _res.retrans = retrans; 393040266059SGregory Neil Shapiro if (map->map_retry > 0) 393140266059SGregory Neil Shapiro _res.retry = retry; 393240266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 393306f25ae9SGregory Neil Shapiro 393406f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 393506f25ae9SGregory Neil Shapiro 393606f25ae9SGregory Neil Shapiro /* Found an answer */ 393706f25ae9SGregory Neil Shapiro if (ans != NULL) 393806f25ae9SGregory Neil Shapiro { 393906f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 394040266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 394140266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 394240266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 394306f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 394406f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 394506f25ae9SGregory Neil Shapiro else 394606f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 3947193538b7SGregory Neil Shapiro if (tTd(9, 1)) 394840266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 394906f25ae9SGregory Neil Shapiro return cp; 395006f25ae9SGregory Neil Shapiro } 395106f25ae9SGregory Neil Shapiro 395206f25ae9SGregory Neil Shapiro 395306f25ae9SGregory Neil Shapiro /* No match found */ 3954c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 3955c2aa98e2SPeter Wemm #if NAMED_BIND 3956c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 3957c2aa98e2SPeter Wemm if (tTd(9, 1)) 395840266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 3959c2aa98e2SPeter Wemm switch (h_errno) 3960c2aa98e2SPeter Wemm { 3961c2aa98e2SPeter Wemm case TRY_AGAIN: 3962c2aa98e2SPeter Wemm if (UseNameServer) 3963c2aa98e2SPeter Wemm { 3964c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3965c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3966c2aa98e2SPeter Wemm shortenstring(name, 33)); 3967c2aa98e2SPeter Wemm } 3968c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3969c2aa98e2SPeter Wemm break; 3970c2aa98e2SPeter Wemm 3971c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 3972c2aa98e2SPeter Wemm case NO_DATA: 3973c2aa98e2SPeter Wemm *statp = EX_NOHOST; 3974c2aa98e2SPeter Wemm break; 3975c2aa98e2SPeter Wemm 3976c2aa98e2SPeter Wemm case NO_RECOVERY: 3977c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 3978c2aa98e2SPeter Wemm break; 3979c2aa98e2SPeter Wemm 3980c2aa98e2SPeter Wemm default: 3981c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 3982c2aa98e2SPeter Wemm break; 3983c2aa98e2SPeter Wemm } 398406f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 3985c2aa98e2SPeter Wemm if (tTd(9, 1)) 398640266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 3987c2aa98e2SPeter Wemm *statp = EX_NOHOST; 398806f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 3989c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 3990c2aa98e2SPeter Wemm return NULL; 3991c2aa98e2SPeter Wemm } 3992c2aa98e2SPeter Wemm /* 3993c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 399440266059SGregory Neil Shapiro ** 399540266059SGregory Neil Shapiro ** Parameters: 399640266059SGregory Neil Shapiro ** map -- a pointer to this map. 399740266059SGregory Neil Shapiro ** args -- argument string. 399840266059SGregory Neil Shapiro ** 399940266059SGregory Neil Shapiro ** Returns: 400040266059SGregory Neil Shapiro ** true. 4001c2aa98e2SPeter Wemm */ 4002c2aa98e2SPeter Wemm 4003c2aa98e2SPeter Wemm bool 4004c2aa98e2SPeter Wemm host_map_init(map, args) 4005c2aa98e2SPeter Wemm MAP *map; 4006c2aa98e2SPeter Wemm char *args; 4007c2aa98e2SPeter Wemm { 4008c2aa98e2SPeter Wemm register char *p = args; 4009c2aa98e2SPeter Wemm 4010c2aa98e2SPeter Wemm for (;;) 4011c2aa98e2SPeter Wemm { 4012c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 4013c2aa98e2SPeter Wemm p++; 4014c2aa98e2SPeter Wemm if (*p != '-') 4015c2aa98e2SPeter Wemm break; 4016c2aa98e2SPeter Wemm switch (*++p) 4017c2aa98e2SPeter Wemm { 4018c2aa98e2SPeter Wemm case 'a': 4019c2aa98e2SPeter Wemm map->map_app = ++p; 4020c2aa98e2SPeter Wemm break; 4021c2aa98e2SPeter Wemm 4022c2aa98e2SPeter Wemm case 'T': 4023c2aa98e2SPeter Wemm map->map_tapp = ++p; 4024c2aa98e2SPeter Wemm break; 4025c2aa98e2SPeter Wemm 4026c2aa98e2SPeter Wemm case 'm': 4027c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 4028c2aa98e2SPeter Wemm break; 4029c2aa98e2SPeter Wemm 4030c2aa98e2SPeter Wemm case 't': 4031c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 4032c2aa98e2SPeter Wemm break; 403306f25ae9SGregory Neil Shapiro 403406f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 403506f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 403606f25ae9SGregory Neil Shapiro break; 403706f25ae9SGregory Neil Shapiro 403806f25ae9SGregory Neil Shapiro case 'D': 403906f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 404006f25ae9SGregory Neil Shapiro break; 404140266059SGregory Neil Shapiro 404240266059SGregory Neil Shapiro case 'd': 404340266059SGregory Neil Shapiro { 404440266059SGregory Neil Shapiro char *h; 404540266059SGregory Neil Shapiro 404640266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 404740266059SGregory Neil Shapiro continue; 404840266059SGregory Neil Shapiro h = strchr(p, ' '); 404940266059SGregory Neil Shapiro if (h != NULL) 405040266059SGregory Neil Shapiro *h = '\0'; 405140266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 405240266059SGregory Neil Shapiro if (h != NULL) 405340266059SGregory Neil Shapiro *h = ' '; 405440266059SGregory Neil Shapiro } 405540266059SGregory Neil Shapiro break; 405640266059SGregory Neil Shapiro 405740266059SGregory Neil Shapiro case 'r': 405840266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 405940266059SGregory Neil Shapiro continue; 406040266059SGregory Neil Shapiro map->map_retry = atoi(p); 406140266059SGregory Neil Shapiro break; 4062c2aa98e2SPeter Wemm } 4063c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4064c2aa98e2SPeter Wemm p++; 4065c2aa98e2SPeter Wemm if (*p != '\0') 4066c2aa98e2SPeter Wemm *p++ = '\0'; 4067c2aa98e2SPeter Wemm } 4068c2aa98e2SPeter Wemm if (map->map_app != NULL) 4069c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4070c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4071c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 407240266059SGregory Neil Shapiro return true; 4073c2aa98e2SPeter Wemm } 407440266059SGregory Neil Shapiro 407506f25ae9SGregory Neil Shapiro #if NETINET6 407606f25ae9SGregory Neil Shapiro /* 407706f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 407806f25ae9SGregory Neil Shapiro ** 407906f25ae9SGregory Neil Shapiro ** Parameters: 408006f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 408106f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 408206f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 408306f25ae9SGregory Neil Shapiro ** 408406f25ae9SGregory Neil Shapiro ** Returns: 408506f25ae9SGregory Neil Shapiro ** A printable version of that structure. 408606f25ae9SGregory Neil Shapiro */ 408740266059SGregory Neil Shapiro 408806f25ae9SGregory Neil Shapiro char * 408906f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 409006f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 409106f25ae9SGregory Neil Shapiro char *dst; 409206f25ae9SGregory Neil Shapiro size_t dst_len; 409306f25ae9SGregory Neil Shapiro { 409406f25ae9SGregory Neil Shapiro register char *ap; 409506f25ae9SGregory Neil Shapiro 409606f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 409706f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 409806f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 409906f25ae9SGregory Neil Shapiro dst, dst_len); 410006f25ae9SGregory Neil Shapiro else 410140266059SGregory Neil Shapiro { 410240266059SGregory Neil Shapiro char *d; 410340266059SGregory Neil Shapiro size_t sz; 410440266059SGregory Neil Shapiro 410540266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 410640266059SGregory Neil Shapiro d = dst; 410740266059SGregory Neil Shapiro 410840266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 410940266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 411040266059SGregory Neil Shapiro if (sz >= dst_len) 411140266059SGregory Neil Shapiro return NULL; 411240266059SGregory Neil Shapiro dst += sz; 411340266059SGregory Neil Shapiro dst_len -= sz; 411406f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 411540266059SGregory Neil Shapiro 411640266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 411740266059SGregory Neil Shapiro if (ap != NULL) 411840266059SGregory Neil Shapiro ap = d; 411940266059SGregory Neil Shapiro } 412006f25ae9SGregory Neil Shapiro return ap; 412106f25ae9SGregory Neil Shapiro } 412240266059SGregory Neil Shapiro 412340266059SGregory Neil Shapiro /* 412440266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 412540266059SGregory Neil Shapiro ** 412640266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 412740266059SGregory Neil Shapiro ** 412840266059SGregory Neil Shapiro ** Parameters: 412940266059SGregory Neil Shapiro ** family -- address family 413040266059SGregory Neil Shapiro ** src -- string 413140266059SGregory Neil Shapiro ** dst -- destination address structure 413240266059SGregory Neil Shapiro ** 413340266059SGregory Neil Shapiro ** Returns: 413440266059SGregory Neil Shapiro ** 1 if the address was valid 413540266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 413640266059SGregory Neil Shapiro ** -1 if error 413740266059SGregory Neil Shapiro */ 413840266059SGregory Neil Shapiro 413940266059SGregory Neil Shapiro int 414040266059SGregory Neil Shapiro anynet_pton(family, src, dst) 414140266059SGregory Neil Shapiro int family; 414240266059SGregory Neil Shapiro const char *src; 414340266059SGregory Neil Shapiro void *dst; 414440266059SGregory Neil Shapiro { 414540266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 414640266059SGregory Neil Shapiro src += 5; 414740266059SGregory Neil Shapiro return inet_pton(family, src, dst); 414840266059SGregory Neil Shapiro } 414906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 415040266059SGregory Neil Shapiro /* 4151c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4152c2aa98e2SPeter Wemm ** 4153c2aa98e2SPeter Wemm ** Parameters: 4154c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4155c2aa98e2SPeter Wemm ** 4156c2aa98e2SPeter Wemm ** Returns: 4157c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4158c2aa98e2SPeter Wemm */ 4159c2aa98e2SPeter Wemm 4160c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4161c2aa98e2SPeter Wemm 4162c2aa98e2SPeter Wemm # if NETLINK 4163c2aa98e2SPeter Wemm # include <net/if_dl.h> 416406f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4165c2aa98e2SPeter Wemm 4166c2aa98e2SPeter Wemm char * 4167c2aa98e2SPeter Wemm anynet_ntoa(sap) 4168c2aa98e2SPeter Wemm register SOCKADDR *sap; 4169c2aa98e2SPeter Wemm { 4170c2aa98e2SPeter Wemm register char *bp; 4171c2aa98e2SPeter Wemm register char *ap; 4172c2aa98e2SPeter Wemm int l; 4173c2aa98e2SPeter Wemm static char buf[100]; 4174c2aa98e2SPeter Wemm 4175c2aa98e2SPeter Wemm /* check for null/zero family */ 4176c2aa98e2SPeter Wemm if (sap == NULL) 4177c2aa98e2SPeter Wemm return "NULLADDR"; 4178c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4179c2aa98e2SPeter Wemm return "0"; 4180c2aa98e2SPeter Wemm 4181c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4182c2aa98e2SPeter Wemm { 4183c2aa98e2SPeter Wemm # if NETUNIX 4184c2aa98e2SPeter Wemm case AF_UNIX: 4185c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 418640266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[UNIX: %.64s]", 4187c2aa98e2SPeter Wemm sap->sunix.sun_path); 4188c2aa98e2SPeter Wemm else 418940266059SGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof buf); 4190c2aa98e2SPeter Wemm return buf; 419106f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4192c2aa98e2SPeter Wemm 4193c2aa98e2SPeter Wemm # if NETINET 4194c2aa98e2SPeter Wemm case AF_INET: 419506f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 419606f25ae9SGregory Neil Shapiro # endif /* NETINET */ 419706f25ae9SGregory Neil Shapiro 419806f25ae9SGregory Neil Shapiro # if NETINET6 419906f25ae9SGregory Neil Shapiro case AF_INET6: 420006f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 420106f25ae9SGregory Neil Shapiro if (ap != NULL) 420206f25ae9SGregory Neil Shapiro return ap; 420306f25ae9SGregory Neil Shapiro break; 420406f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4205c2aa98e2SPeter Wemm 4206c2aa98e2SPeter Wemm # if NETLINK 4207c2aa98e2SPeter Wemm case AF_LINK: 420840266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[LINK: %s]", 4209c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4210c2aa98e2SPeter Wemm return buf; 421106f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4212c2aa98e2SPeter Wemm default: 4213c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4214c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4215c2aa98e2SPeter Wemm break; 4216c2aa98e2SPeter Wemm } 4217c2aa98e2SPeter Wemm 4218c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 421940266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 4220c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4221c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4222c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 4223c2aa98e2SPeter Wemm { 422440266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 422540266059SGregory Neil Shapiro *ap++ & 0377); 4226c2aa98e2SPeter Wemm bp += 3; 4227c2aa98e2SPeter Wemm } 4228c2aa98e2SPeter Wemm *--bp = '\0'; 4229c2aa98e2SPeter Wemm return buf; 4230c2aa98e2SPeter Wemm } 423140266059SGregory Neil Shapiro /* 4232c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4233c2aa98e2SPeter Wemm ** 4234c2aa98e2SPeter Wemm ** Parameters: 4235c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4236c2aa98e2SPeter Wemm ** 4237c2aa98e2SPeter Wemm ** Returns: 4238c2aa98e2SPeter Wemm ** text representation of host name. 4239c2aa98e2SPeter Wemm ** 4240c2aa98e2SPeter Wemm ** Side Effects: 4241c2aa98e2SPeter Wemm ** none. 4242c2aa98e2SPeter Wemm */ 4243c2aa98e2SPeter Wemm 4244c2aa98e2SPeter Wemm char * 4245c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4246c2aa98e2SPeter Wemm register SOCKADDR *sap; 4247c2aa98e2SPeter Wemm { 4248c2aa98e2SPeter Wemm register struct hostent *hp; 424906f25ae9SGregory Neil Shapiro # if NAMED_BIND 4250c2aa98e2SPeter Wemm int saveretry; 425106f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 425206f25ae9SGregory Neil Shapiro # if NETINET6 425306f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 425406f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4255c2aa98e2SPeter Wemm 4256c2aa98e2SPeter Wemm # if NAMED_BIND 4257c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4258c2aa98e2SPeter Wemm saveretry = _res.retry; 425906f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 426006f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4261c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4262c2aa98e2SPeter Wemm 4263c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4264c2aa98e2SPeter Wemm { 4265c2aa98e2SPeter Wemm # if NETINET 4266c2aa98e2SPeter Wemm case AF_INET: 4267c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 426840266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4269c2aa98e2SPeter Wemm break; 427006f25ae9SGregory Neil Shapiro # endif /* NETINET */ 427106f25ae9SGregory Neil Shapiro 427206f25ae9SGregory Neil Shapiro # if NETINET6 427306f25ae9SGregory Neil Shapiro case AF_INET6: 427406f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 427540266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 427606f25ae9SGregory Neil Shapiro break; 427706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4278c2aa98e2SPeter Wemm 4279c2aa98e2SPeter Wemm # if NETISO 4280c2aa98e2SPeter Wemm case AF_ISO: 4281c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 428240266059SGregory Neil Shapiro sizeof sap->siso.siso_addr, AF_ISO); 4283c2aa98e2SPeter Wemm break; 428406f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4285c2aa98e2SPeter Wemm 4286c2aa98e2SPeter Wemm # if NETUNIX 4287c2aa98e2SPeter Wemm case AF_UNIX: 4288c2aa98e2SPeter Wemm hp = NULL; 4289c2aa98e2SPeter Wemm break; 429006f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4291c2aa98e2SPeter Wemm 4292c2aa98e2SPeter Wemm default: 429340266059SGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof sap->sa.sa_data, 4294c2aa98e2SPeter Wemm sap->sa.sa_family); 4295c2aa98e2SPeter Wemm break; 4296c2aa98e2SPeter Wemm } 4297c2aa98e2SPeter Wemm 4298c2aa98e2SPeter Wemm # if NAMED_BIND 4299c2aa98e2SPeter Wemm _res.retry = saveretry; 4300c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4301c2aa98e2SPeter Wemm 430206f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 430306f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 430406f25ae9SGregory Neil Shapiro # if NETINET6 430506f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 430606f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 430706f25ae9SGregory Neil Shapiro # if NETINET 430806f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 430906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 431006f25ae9SGregory Neil Shapiro ) 4311193538b7SGregory Neil Shapiro { 4312193538b7SGregory Neil Shapiro char *name; 4313193538b7SGregory Neil Shapiro 431440266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 431540266059SGregory Neil Shapiro # if NETINET6 4316193538b7SGregory Neil Shapiro if (name == hp->h_name) 4317193538b7SGregory Neil Shapiro { 4318193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4319193538b7SGregory Neil Shapiro 4320193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 432140266059SGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof n); 4322193538b7SGregory Neil Shapiro name = n; 4323193538b7SGregory Neil Shapiro } 4324193538b7SGregory Neil Shapiro freehostent(hp); 432540266059SGregory Neil Shapiro # endif /* NETINET6 */ 4326193538b7SGregory Neil Shapiro return name; 4327193538b7SGregory Neil Shapiro } 432806f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4329193538b7SGregory Neil Shapiro 433040266059SGregory Neil Shapiro # if NETINET6 4331193538b7SGregory Neil Shapiro if (hp != NULL) 4332193538b7SGregory Neil Shapiro { 4333193538b7SGregory Neil Shapiro freehostent(hp); 4334193538b7SGregory Neil Shapiro hp = NULL; 4335193538b7SGregory Neil Shapiro } 433640266059SGregory Neil Shapiro # endif /* NETINET6 */ 4337193538b7SGregory Neil Shapiro 4338c2aa98e2SPeter Wemm # if NETUNIX 433906f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4340c2aa98e2SPeter Wemm return "localhost"; 434106f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4342c2aa98e2SPeter Wemm { 4343c2aa98e2SPeter Wemm static char buf[203]; 4344c2aa98e2SPeter Wemm 434540266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[%.200s]", 434640266059SGregory Neil Shapiro anynet_ntoa(sap)); 4347c2aa98e2SPeter Wemm return buf; 4348c2aa98e2SPeter Wemm } 4349c2aa98e2SPeter Wemm } 435006f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4351