1c2aa98e2SPeter Wemm /* 2e92d3f3fSGregory Neil Shapiro * Copyright (c) 1998-2004 Sendmail, Inc. and its suppliers. 306f25ae9SGregory Neil Shapiro * All rights reserved. 4c2aa98e2SPeter Wemm * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5c2aa98e2SPeter Wemm * Copyright (c) 1988, 1993 6c2aa98e2SPeter Wemm * The Regents of the University of California. All rights reserved. 7c2aa98e2SPeter Wemm * 8c2aa98e2SPeter Wemm * By using this file, you agree to the terms and conditions set 9c2aa98e2SPeter Wemm * forth in the LICENSE file which can be found at the top level of 10c2aa98e2SPeter Wemm * the sendmail distribution. 11c2aa98e2SPeter Wemm * 12c2aa98e2SPeter Wemm */ 13c2aa98e2SPeter Wemm 1406f25ae9SGregory Neil Shapiro #include <sendmail.h> 1506f25ae9SGregory Neil Shapiro 16b6bacd31SGregory Neil Shapiro SM_RCSID("@(#)$Id: daemon.c,v 8.653 2004/11/18 23:45:01 ca Exp $") 17c2aa98e2SPeter Wemm 18c2aa98e2SPeter Wemm #if defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) 19c2aa98e2SPeter Wemm # define USE_SOCK_STREAM 1 2006f25ae9SGregory Neil Shapiro #endif /* defined(SOCK_STREAM) || defined(__GNU_LIBRARY__) */ 21c2aa98e2SPeter Wemm 2240266059SGregory Neil Shapiro #if defined(USE_SOCK_STREAM) 2306f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 24c2aa98e2SPeter Wemm # include <arpa/inet.h> 2506f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 26c2aa98e2SPeter Wemm # if NAMED_BIND 27c2aa98e2SPeter Wemm # ifndef NO_DATA 28c2aa98e2SPeter Wemm # define NO_DATA NO_ADDRESS 2906f25ae9SGregory Neil Shapiro # endif /* ! NO_DATA */ 3006f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 3140266059SGregory Neil Shapiro #endif /* defined(USE_SOCK_STREAM) */ 32c2aa98e2SPeter Wemm 3342e5d165SGregory Neil Shapiro #if STARTTLS 3442e5d165SGregory Neil Shapiro # include <openssl/rand.h> 3542e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 3642e5d165SGregory Neil Shapiro 37c2aa98e2SPeter Wemm #include <sys/time.h> 38c2aa98e2SPeter Wemm 3906f25ae9SGregory Neil Shapiro #if IP_SRCROUTE && NETINET 40c2aa98e2SPeter Wemm # include <netinet/in_systm.h> 41c2aa98e2SPeter Wemm # include <netinet/ip.h> 4206f25ae9SGregory Neil Shapiro # if HAS_IN_H 4306f25ae9SGregory Neil Shapiro # include <netinet/in.h> 4406f25ae9SGregory Neil Shapiro # ifndef IPOPTION 4506f25ae9SGregory Neil Shapiro # define IPOPTION ip_opts 4606f25ae9SGregory Neil Shapiro # define IP_LIST ip_opts 4706f25ae9SGregory Neil Shapiro # define IP_DST ip_dst 4806f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 4906f25ae9SGregory Neil Shapiro # else /* HAS_IN_H */ 50c2aa98e2SPeter Wemm # include <netinet/ip_var.h> 5106f25ae9SGregory Neil Shapiro # ifndef IPOPTION 5206f25ae9SGregory Neil Shapiro # define IPOPTION ipoption 5306f25ae9SGregory Neil Shapiro # define IP_LIST ipopt_list 5406f25ae9SGregory Neil Shapiro # define IP_DST ipopt_dst 5506f25ae9SGregory Neil Shapiro # endif /* ! IPOPTION */ 5606f25ae9SGregory Neil Shapiro # endif /* HAS_IN_H */ 5706f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE && NETINET */ 5806f25ae9SGregory Neil Shapiro 5940266059SGregory Neil Shapiro #include <sm/fdset.h> 6040266059SGregory Neil Shapiro 6140266059SGregory Neil Shapiro /* structure to describe a daemon or a client */ 6206f25ae9SGregory Neil Shapiro struct daemon 6306f25ae9SGregory Neil Shapiro { 6406f25ae9SGregory Neil Shapiro int d_socket; /* fd for socket */ 6506f25ae9SGregory Neil Shapiro SOCKADDR d_addr; /* socket for incoming */ 6640266059SGregory Neil Shapiro unsigned short d_port; /* port number */ 6706f25ae9SGregory Neil Shapiro int d_listenqueue; /* size of listen queue */ 6806f25ae9SGregory Neil Shapiro int d_tcprcvbufsize; /* size of TCP receive buffer */ 6906f25ae9SGregory Neil Shapiro int d_tcpsndbufsize; /* size of TCP send buffer */ 7006f25ae9SGregory Neil Shapiro time_t d_refuse_connections_until; 7106f25ae9SGregory Neil Shapiro bool d_firsttime; 7206f25ae9SGregory Neil Shapiro int d_socksize; 7306f25ae9SGregory Neil Shapiro BITMAP256 d_flags; /* flags; see sendmail.h */ 7406f25ae9SGregory Neil Shapiro char *d_mflags; /* flags for use in macro */ 7506f25ae9SGregory Neil Shapiro char *d_name; /* user-supplied name */ 7640266059SGregory Neil Shapiro #if MILTER 7740266059SGregory Neil Shapiro char *d_inputfilterlist; 7840266059SGregory Neil Shapiro struct milter *d_inputfilters[MAXFILTERS]; 7940266059SGregory Neil Shapiro #endif /* MILTER */ 8006f25ae9SGregory Neil Shapiro }; 8106f25ae9SGregory Neil Shapiro 8206f25ae9SGregory Neil Shapiro typedef struct daemon DAEMON_T; 8306f25ae9SGregory Neil Shapiro 84b6bacd31SGregory Neil Shapiro static void connecttimeout __P((int)); 8540266059SGregory Neil Shapiro static int opendaemonsocket __P((DAEMON_T *, bool)); 8640266059SGregory Neil Shapiro static unsigned short setupdaemon __P((SOCKADDR *)); 8740266059SGregory Neil Shapiro static void getrequests_checkdiskspace __P((ENVELOPE *e)); 88b6bacd31SGregory Neil Shapiro static void setsockaddroptions __P((char *, DAEMON_T *)); 89b6bacd31SGregory Neil Shapiro static void printdaemonflags __P((DAEMON_T *)); 90b6bacd31SGregory Neil Shapiro static int addr_family __P((char *)); 91b6bacd31SGregory Neil Shapiro static int addrcmp __P((struct hostent *, char *, SOCKADDR *)); 92b6bacd31SGregory Neil Shapiro static void authtimeout __P((int)); 93c2aa98e2SPeter Wemm 94c2aa98e2SPeter Wemm /* 95c2aa98e2SPeter Wemm ** DAEMON.C -- routines to use when running as a daemon. 96c2aa98e2SPeter Wemm ** 97c2aa98e2SPeter Wemm ** This entire file is highly dependent on the 4.2 BSD 98c2aa98e2SPeter Wemm ** interprocess communication primitives. No attempt has 99c2aa98e2SPeter Wemm ** been made to make this file portable to Version 7, 100c2aa98e2SPeter Wemm ** Version 6, MPX files, etc. If you should try such a 101c2aa98e2SPeter Wemm ** thing yourself, I recommend chucking the entire file 102c2aa98e2SPeter Wemm ** and starting from scratch. Basic semantics are: 103c2aa98e2SPeter Wemm ** 104c2aa98e2SPeter Wemm ** getrequests(e) 105c2aa98e2SPeter Wemm ** Opens a port and initiates a connection. 106c2aa98e2SPeter Wemm ** Returns in a child. Must set InChannel and 107c2aa98e2SPeter Wemm ** OutChannel appropriately. 108c2aa98e2SPeter Wemm ** clrdaemon() 109c2aa98e2SPeter Wemm ** Close any open files associated with getting 110c2aa98e2SPeter Wemm ** the connection; this is used when running the queue, 111c2aa98e2SPeter Wemm ** etc., to avoid having extra file descriptors during 112c2aa98e2SPeter Wemm ** the queue run and to avoid confusing the network 113c2aa98e2SPeter Wemm ** code (if it cares). 11440266059SGregory Neil Shapiro ** makeconnection(host, port, mci, e, enough) 115c2aa98e2SPeter Wemm ** Make a connection to the named host on the given 11640266059SGregory Neil Shapiro ** port. Returns zero on success, else an exit status 11740266059SGregory Neil Shapiro ** describing the error. 118c2aa98e2SPeter Wemm ** host_map_lookup(map, hbuf, avp, pstat) 119c2aa98e2SPeter Wemm ** Convert the entry in hbuf into a canonical form. 120c2aa98e2SPeter Wemm */ 12106f25ae9SGregory Neil Shapiro 12206f25ae9SGregory Neil Shapiro static DAEMON_T Daemons[MAXDAEMONS]; 12340266059SGregory Neil Shapiro static int NDaemons = 0; /* actual number of daemons */ 12406f25ae9SGregory Neil Shapiro 12540266059SGregory Neil Shapiro static time_t NextDiskSpaceCheck = 0; 12606f25ae9SGregory Neil Shapiro 12740266059SGregory Neil Shapiro /* 128c2aa98e2SPeter Wemm ** GETREQUESTS -- open mail IPC port and get requests. 129c2aa98e2SPeter Wemm ** 130c2aa98e2SPeter Wemm ** Parameters: 131c2aa98e2SPeter Wemm ** e -- the current envelope. 132c2aa98e2SPeter Wemm ** 133c2aa98e2SPeter Wemm ** Returns: 13406f25ae9SGregory Neil Shapiro ** pointer to flags. 135c2aa98e2SPeter Wemm ** 136c2aa98e2SPeter Wemm ** Side Effects: 137c2aa98e2SPeter Wemm ** Waits until some interesting activity occurs. When 138c2aa98e2SPeter Wemm ** it does, a child is created to process it, and the 139c2aa98e2SPeter Wemm ** parent waits for completion. Return from this 140c2aa98e2SPeter Wemm ** routine is always in the child. The file pointers 141c2aa98e2SPeter Wemm ** "InChannel" and "OutChannel" should be set to point 142c2aa98e2SPeter Wemm ** to the communication channel. 14340266059SGregory Neil Shapiro ** May restart persistent queue runners if they have ended 14440266059SGregory Neil Shapiro ** for some reason. 145c2aa98e2SPeter Wemm */ 146c2aa98e2SPeter Wemm 14706f25ae9SGregory Neil Shapiro BITMAP256 * 148c2aa98e2SPeter Wemm getrequests(e) 149c2aa98e2SPeter Wemm ENVELOPE *e; 150c2aa98e2SPeter Wemm { 151c2aa98e2SPeter Wemm int t; 15206f25ae9SGregory Neil Shapiro int idx, curdaemon = -1; 15306f25ae9SGregory Neil Shapiro int i, olddaemon = 0; 154c2aa98e2SPeter Wemm #if XDEBUG 155c2aa98e2SPeter Wemm bool j_has_dot; 15606f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 157065a643dSPeter Wemm char status[MAXLINE]; 15806f25ae9SGregory Neil Shapiro SOCKADDR sa; 15906f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len = sizeof sa; 160605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 161605302a5SGregory Neil Shapiro time_t lastrun; 162605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 16306f25ae9SGregory Neil Shapiro # if NETUNIX 164065a643dSPeter Wemm extern int ControlSocket; 16506f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 16606f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 16740266059SGregory Neil Shapiro extern bool refuseconnections __P((char *, ENVELOPE *, int, bool)); 168c2aa98e2SPeter Wemm 16906f25ae9SGregory Neil Shapiro 170323f6dcbSGregory Neil Shapiro /* initialize data for function that generates queue ids */ 171323f6dcbSGregory Neil Shapiro init_qid_alg(); 17240266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 173c2aa98e2SPeter Wemm { 17406f25ae9SGregory Neil Shapiro Daemons[idx].d_port = setupdaemon(&(Daemons[idx].d_addr)); 17540266059SGregory Neil Shapiro Daemons[idx].d_firsttime = true; 17606f25ae9SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = (time_t) 0; 177c2aa98e2SPeter Wemm } 178193538b7SGregory Neil Shapiro 179c2aa98e2SPeter Wemm /* 180c2aa98e2SPeter Wemm ** Try to actually open the connection. 181c2aa98e2SPeter Wemm */ 182c2aa98e2SPeter Wemm 183c2aa98e2SPeter Wemm if (tTd(15, 1)) 18406f25ae9SGregory Neil Shapiro { 18540266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 186193538b7SGregory Neil Shapiro { 18740266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: port %d\n", 18806f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 18906f25ae9SGregory Neil Shapiro ntohs(Daemons[idx].d_port)); 19006f25ae9SGregory Neil Shapiro } 191193538b7SGregory Neil Shapiro } 192c2aa98e2SPeter Wemm 193c2aa98e2SPeter Wemm /* get a socket for the SMTP connection */ 19440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 19540266059SGregory Neil Shapiro Daemons[idx].d_socksize = opendaemonsocket(&Daemons[idx], true); 196c2aa98e2SPeter Wemm 197065a643dSPeter Wemm if (opencontrolsocket() < 0) 198065a643dSPeter Wemm sm_syslog(LOG_WARNING, NOQID, 1992e43090eSPeter Wemm "daemon could not open control socket %s: %s", 20040266059SGregory Neil Shapiro ControlSocketName, sm_errstring(errno)); 201065a643dSPeter Wemm 20240266059SGregory Neil Shapiro /* If there are any queue runners released reapchild() co-ord's */ 20340266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 2048774250cSGregory Neil Shapiro 20540266059SGregory Neil Shapiro /* write the pid to file, command line args to syslog */ 20606f25ae9SGregory Neil Shapiro log_sendmail_pid(e); 207c2aa98e2SPeter Wemm 208c2aa98e2SPeter Wemm #if XDEBUG 209c2aa98e2SPeter Wemm { 210c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 211c2aa98e2SPeter Wemm 212c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 213c2aa98e2SPeter Wemm j_has_dot = strchr(jbuf, '.') != NULL; 214c2aa98e2SPeter Wemm } 21506f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 216c2aa98e2SPeter Wemm 217065a643dSPeter Wemm /* Add parent process as first item */ 218e92d3f3fSGregory Neil Shapiro proc_list_add(CurrentPid, "Sendmail daemon", PROC_DAEMON, 0, -1, NULL); 219065a643dSPeter Wemm 220c2aa98e2SPeter Wemm if (tTd(15, 1)) 22106f25ae9SGregory Neil Shapiro { 22240266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 22340266059SGregory Neil Shapiro sm_dprintf("getrequests: daemon %s: %d\n", 22406f25ae9SGregory Neil Shapiro Daemons[idx].d_name, 22506f25ae9SGregory Neil Shapiro Daemons[idx].d_socket); 22606f25ae9SGregory Neil Shapiro } 227c2aa98e2SPeter Wemm 228c2aa98e2SPeter Wemm for (;;) 229c2aa98e2SPeter Wemm { 230c2aa98e2SPeter Wemm register pid_t pid; 231c2aa98e2SPeter Wemm auto SOCKADDR_LEN_T lotherend; 23240266059SGregory Neil Shapiro bool timedout = false; 23340266059SGregory Neil Shapiro bool control = false; 23406f25ae9SGregory Neil Shapiro int save_errno; 235c2aa98e2SPeter Wemm int pipefd[2]; 23640266059SGregory Neil Shapiro time_t now; 23742e5d165SGregory Neil Shapiro #if STARTTLS 23842e5d165SGregory Neil Shapiro long seed; 23942e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 240c2aa98e2SPeter Wemm 241c2aa98e2SPeter Wemm /* see if we are rejecting connections */ 24240266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 243a7ec597cSGregory Neil Shapiro CHECK_RESTART; 2448774250cSGregory Neil Shapiro 24540266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 24640266059SGregory Neil Shapiro { 247193538b7SGregory Neil Shapiro /* 24840266059SGregory Neil Shapiro ** XXX do this call outside the loop? 24940266059SGregory Neil Shapiro ** no: refuse_connections may sleep(). 250193538b7SGregory Neil Shapiro */ 251193538b7SGregory Neil Shapiro 25240266059SGregory Neil Shapiro now = curtime(); 25340266059SGregory Neil Shapiro if (now < Daemons[idx].d_refuse_connections_until) 25406f25ae9SGregory Neil Shapiro continue; 25540266059SGregory Neil Shapiro if (bitnset(D_DISABLE, Daemons[idx].d_flags)) 25640266059SGregory Neil Shapiro continue; 25740266059SGregory Neil Shapiro if (refuseconnections(Daemons[idx].d_name, e, idx, 25840266059SGregory Neil Shapiro curdaemon == idx)) 259c2aa98e2SPeter Wemm { 26006f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 261c2aa98e2SPeter Wemm { 262065a643dSPeter Wemm /* close socket so peer fails quickly */ 26306f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 26406f25ae9SGregory Neil Shapiro Daemons[idx].d_socket = -1; 265c2aa98e2SPeter Wemm } 266c2aa98e2SPeter Wemm 267065a643dSPeter Wemm /* refuse connections for next 15 seconds */ 26840266059SGregory Neil Shapiro Daemons[idx].d_refuse_connections_until = now + 15; 269065a643dSPeter Wemm } 27006f25ae9SGregory Neil Shapiro else if (Daemons[idx].d_socket < 0 || 27106f25ae9SGregory Neil Shapiro Daemons[idx].d_firsttime) 272c2aa98e2SPeter Wemm { 27340266059SGregory Neil Shapiro if (!Daemons[idx].d_firsttime && LogLevel > 8) 27406f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 27506f25ae9SGregory Neil Shapiro "accepting connections again for daemon %s", 27606f25ae9SGregory Neil Shapiro Daemons[idx].d_name); 27706f25ae9SGregory Neil Shapiro 278065a643dSPeter Wemm /* arrange to (re)open the socket if needed */ 27940266059SGregory Neil Shapiro (void) opendaemonsocket(&Daemons[idx], false); 28040266059SGregory Neil Shapiro Daemons[idx].d_firsttime = false; 281065a643dSPeter Wemm } 282c2aa98e2SPeter Wemm } 283c2aa98e2SPeter Wemm 2848774250cSGregory Neil Shapiro /* May have been sleeping above, check again */ 285a7ec597cSGregory Neil Shapiro CHECK_RESTART; 286e92d3f3fSGregory Neil Shapiro 28740266059SGregory Neil Shapiro getrequests_checkdiskspace(e); 28806f25ae9SGregory Neil Shapiro 289c2aa98e2SPeter Wemm #if XDEBUG 290c2aa98e2SPeter Wemm /* check for disaster */ 291c2aa98e2SPeter Wemm { 292c2aa98e2SPeter Wemm char jbuf[MAXHOSTNAMELEN]; 293c2aa98e2SPeter Wemm 294c2aa98e2SPeter Wemm expand("\201j", jbuf, sizeof jbuf, e); 295c2aa98e2SPeter Wemm if (!wordinclass(jbuf, 'w')) 296c2aa98e2SPeter Wemm { 297c2aa98e2SPeter Wemm dumpstate("daemon lost $j"); 298c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 299c2aa98e2SPeter Wemm "daemon process doesn't have $j in $=w; see syslog"); 300c2aa98e2SPeter Wemm abort(); 301c2aa98e2SPeter Wemm } 302c2aa98e2SPeter Wemm else if (j_has_dot && strchr(jbuf, '.') == NULL) 303c2aa98e2SPeter Wemm { 304c2aa98e2SPeter Wemm dumpstate("daemon $j lost dot"); 305c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 306c2aa98e2SPeter Wemm "daemon process $j lost dot; see syslog"); 307c2aa98e2SPeter Wemm abort(); 308c2aa98e2SPeter Wemm } 309c2aa98e2SPeter Wemm } 31006f25ae9SGregory Neil Shapiro #endif /* XDEBUG */ 311c2aa98e2SPeter Wemm 312c2aa98e2SPeter Wemm #if 0 313c2aa98e2SPeter Wemm /* 314c2aa98e2SPeter Wemm ** Andrew Sun <asun@ieps-sun.ml.com> claims that this will 315c2aa98e2SPeter Wemm ** fix the SVr4 problem. But it seems to have gone away, 316c2aa98e2SPeter Wemm ** so is it worth doing this? 317c2aa98e2SPeter Wemm */ 318c2aa98e2SPeter Wemm 319065a643dSPeter Wemm if (DaemonSocket >= 0 && 32040266059SGregory Neil Shapiro SetNonBlocking(DaemonSocket, false) < 0) 321c2aa98e2SPeter Wemm log an error here; 32206f25ae9SGregory Neil Shapiro #endif /* 0 */ 32340266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 32406f25ae9SGregory Neil Shapiro 325c2aa98e2SPeter Wemm for (;;) 326c2aa98e2SPeter Wemm { 32740266059SGregory Neil Shapiro bool setproc = false; 328065a643dSPeter Wemm int highest = -1; 329c2aa98e2SPeter Wemm fd_set readfds; 330c2aa98e2SPeter Wemm struct timeval timeout; 331c2aa98e2SPeter Wemm 332a7ec597cSGregory Neil Shapiro CHECK_RESTART; 333c2aa98e2SPeter Wemm FD_ZERO(&readfds); 33440266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 335065a643dSPeter Wemm { 33606f25ae9SGregory Neil Shapiro /* wait for a connection */ 33706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 33806f25ae9SGregory Neil Shapiro { 339193538b7SGregory Neil Shapiro if (!setproc && 340193538b7SGregory Neil Shapiro !bitnset(D_ETRNONLY, 341193538b7SGregory Neil Shapiro Daemons[idx].d_flags)) 34206f25ae9SGregory Neil Shapiro { 34340266059SGregory Neil Shapiro sm_setproctitle(true, e, 34406f25ae9SGregory Neil Shapiro "accepting connections"); 34540266059SGregory Neil Shapiro setproc = true; 346065a643dSPeter Wemm } 34706f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket > highest) 34806f25ae9SGregory Neil Shapiro highest = Daemons[idx].d_socket; 34940266059SGregory Neil Shapiro SM_FD_SET(Daemons[idx].d_socket, 35040266059SGregory Neil Shapiro &readfds); 35106f25ae9SGregory Neil Shapiro } 35206f25ae9SGregory Neil Shapiro } 35306f25ae9SGregory Neil Shapiro 35406f25ae9SGregory Neil Shapiro #if NETUNIX 355065a643dSPeter Wemm if (ControlSocket >= 0) 356065a643dSPeter Wemm { 357065a643dSPeter Wemm if (ControlSocket > highest) 358065a643dSPeter Wemm highest = ControlSocket; 35940266059SGregory Neil Shapiro SM_FD_SET(ControlSocket, &readfds); 360065a643dSPeter Wemm } 36106f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 36206f25ae9SGregory Neil Shapiro 363065a643dSPeter Wemm timeout.tv_sec = 5; 364c2aa98e2SPeter Wemm timeout.tv_usec = 0; 365c2aa98e2SPeter Wemm 366065a643dSPeter Wemm t = select(highest + 1, FDSET_CAST &readfds, 367c2aa98e2SPeter Wemm NULL, NULL, &timeout); 368065a643dSPeter Wemm 3698774250cSGregory Neil Shapiro /* Did someone signal while waiting? */ 370a7ec597cSGregory Neil Shapiro CHECK_RESTART; 371193538b7SGregory Neil Shapiro 372193538b7SGregory Neil Shapiro curdaemon = -1; 37340266059SGregory Neil Shapiro if (doqueuerun()) 374605302a5SGregory Neil Shapiro { 37540266059SGregory Neil Shapiro (void) runqueue(true, false, false, false); 376605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 377605302a5SGregory Neil Shapiro lastrun = now; 378605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 379605302a5SGregory Neil Shapiro } 380605302a5SGregory Neil Shapiro #if _FFR_QUEUE_RUN_PARANOIA 381605302a5SGregory Neil Shapiro else if (QueueIntvl > 0 && 382605302a5SGregory Neil Shapiro lastrun + QueueIntvl + 60 < now) 383605302a5SGregory Neil Shapiro { 384605302a5SGregory Neil Shapiro 385605302a5SGregory Neil Shapiro /* 386605302a5SGregory Neil Shapiro ** set lastrun unconditionally to avoid 387605302a5SGregory Neil Shapiro ** calling checkqueuerunner() all the time. 388605302a5SGregory Neil Shapiro ** That's also why we currently ignore the 389605302a5SGregory Neil Shapiro ** result of the function call. 390605302a5SGregory Neil Shapiro */ 391605302a5SGregory Neil Shapiro 392605302a5SGregory Neil Shapiro (void) checkqueuerunner(); 393605302a5SGregory Neil Shapiro lastrun = now; 394605302a5SGregory Neil Shapiro } 395605302a5SGregory Neil Shapiro #endif /* _FFR_QUEUE_RUN_PARANOIA */ 39640266059SGregory Neil Shapiro 397065a643dSPeter Wemm if (t <= 0) 398065a643dSPeter Wemm { 39940266059SGregory Neil Shapiro timedout = true; 400065a643dSPeter Wemm break; 401065a643dSPeter Wemm } 402c2aa98e2SPeter Wemm 40340266059SGregory Neil Shapiro control = false; 404c2aa98e2SPeter Wemm errno = 0; 40506f25ae9SGregory Neil Shapiro 40606f25ae9SGregory Neil Shapiro /* look "round-robin" for an active socket */ 40740266059SGregory Neil Shapiro if ((idx = olddaemon + 1) >= NDaemons) 40806f25ae9SGregory Neil Shapiro idx = 0; 40940266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 410065a643dSPeter Wemm { 41106f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0 && 41240266059SGregory Neil Shapiro SM_FD_ISSET(Daemons[idx].d_socket, 41340266059SGregory Neil Shapiro &readfds)) 41406f25ae9SGregory Neil Shapiro { 41506f25ae9SGregory Neil Shapiro lotherend = Daemons[idx].d_socksize; 416602a2b1bSGregory Neil Shapiro memset(&RealHostAddr, '\0', 417602a2b1bSGregory Neil Shapiro sizeof RealHostAddr); 41806f25ae9SGregory Neil Shapiro t = accept(Daemons[idx].d_socket, 419065a643dSPeter Wemm (struct sockaddr *)&RealHostAddr, 420065a643dSPeter Wemm &lotherend); 421602a2b1bSGregory Neil Shapiro 422602a2b1bSGregory Neil Shapiro /* 423602a2b1bSGregory Neil Shapiro ** If remote side closes before 424602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 425602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 426602a2b1bSGregory Neil Shapiro */ 427602a2b1bSGregory Neil Shapiro 428602a2b1bSGregory Neil Shapiro if (t >= 0 && 429602a2b1bSGregory Neil Shapiro (lotherend == 0 || 430602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 431602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_len == 0 || 432602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 433602a2b1bSGregory Neil Shapiro RealHostAddr.sa.sa_family != Daemons[idx].d_addr.sa.sa_family)) 434602a2b1bSGregory Neil Shapiro { 435602a2b1bSGregory Neil Shapiro (void) close(t); 436602a2b1bSGregory Neil Shapiro t = -1; 437602a2b1bSGregory Neil Shapiro errno = EINVAL; 438602a2b1bSGregory Neil Shapiro } 43906f25ae9SGregory Neil Shapiro olddaemon = curdaemon = idx; 44006f25ae9SGregory Neil Shapiro break; 441065a643dSPeter Wemm } 44240266059SGregory Neil Shapiro if (++idx >= NDaemons) 44306f25ae9SGregory Neil Shapiro idx = 0; 44406f25ae9SGregory Neil Shapiro } 44506f25ae9SGregory Neil Shapiro #if NETUNIX 44606f25ae9SGregory Neil Shapiro if (curdaemon == -1 && ControlSocket >= 0 && 44740266059SGregory Neil Shapiro SM_FD_ISSET(ControlSocket, &readfds)) 448065a643dSPeter Wemm { 449065a643dSPeter Wemm struct sockaddr_un sa_un; 450065a643dSPeter Wemm 451065a643dSPeter Wemm lotherend = sizeof sa_un; 452602a2b1bSGregory Neil Shapiro memset(&sa_un, '\0', sizeof sa_un); 453065a643dSPeter Wemm t = accept(ControlSocket, 454065a643dSPeter Wemm (struct sockaddr *)&sa_un, 455065a643dSPeter Wemm &lotherend); 456602a2b1bSGregory Neil Shapiro 457602a2b1bSGregory Neil Shapiro /* 458602a2b1bSGregory Neil Shapiro ** If remote side closes before 459602a2b1bSGregory Neil Shapiro ** accept() finishes, sockaddr 460602a2b1bSGregory Neil Shapiro ** might not be fully filled in. 461602a2b1bSGregory Neil Shapiro */ 462602a2b1bSGregory Neil Shapiro 463602a2b1bSGregory Neil Shapiro if (t >= 0 && 464602a2b1bSGregory Neil Shapiro (lotherend == 0 || 465602a2b1bSGregory Neil Shapiro # ifdef BSD4_4_SOCKADDR 466602a2b1bSGregory Neil Shapiro sa_un.sun_len == 0 || 467602a2b1bSGregory Neil Shapiro # endif /* BSD4_4_SOCKADDR */ 468602a2b1bSGregory Neil Shapiro sa_un.sun_family != AF_UNIX)) 469602a2b1bSGregory Neil Shapiro { 470602a2b1bSGregory Neil Shapiro (void) close(t); 471602a2b1bSGregory Neil Shapiro t = -1; 472602a2b1bSGregory Neil Shapiro errno = EINVAL; 473602a2b1bSGregory Neil Shapiro } 474602a2b1bSGregory Neil Shapiro if (t >= 0) 47540266059SGregory Neil Shapiro control = true; 476065a643dSPeter Wemm } 477193538b7SGregory Neil Shapiro #else /* NETUNIX */ 478193538b7SGregory Neil Shapiro if (curdaemon == -1) 479193538b7SGregory Neil Shapiro { 480193538b7SGregory Neil Shapiro /* No daemon to service */ 481193538b7SGregory Neil Shapiro continue; 482193538b7SGregory Neil Shapiro } 48306f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 484c2aa98e2SPeter Wemm if (t >= 0 || errno != EINTR) 485c2aa98e2SPeter Wemm break; 486c2aa98e2SPeter Wemm } 487065a643dSPeter Wemm if (timedout) 488065a643dSPeter Wemm { 48940266059SGregory Neil Shapiro timedout = false; 490065a643dSPeter Wemm continue; 491065a643dSPeter Wemm } 49206f25ae9SGregory Neil Shapiro save_errno = errno; 49340266059SGregory Neil Shapiro (void) sm_blocksignal(SIGALRM); 494c2aa98e2SPeter Wemm if (t < 0) 495c2aa98e2SPeter Wemm { 49606f25ae9SGregory Neil Shapiro errno = save_errno; 497e92d3f3fSGregory Neil Shapiro 498e92d3f3fSGregory Neil Shapiro /* let's ignore these temporary errors */ 499e92d3f3fSGregory Neil Shapiro if (save_errno == EINTR 500e92d3f3fSGregory Neil Shapiro #ifdef EAGAIN 501e92d3f3fSGregory Neil Shapiro || save_errno == EAGAIN 502e92d3f3fSGregory Neil Shapiro #endif /* EAGAIN */ 503e92d3f3fSGregory Neil Shapiro #ifdef ECONNABORTED 504e92d3f3fSGregory Neil Shapiro || save_errno == ECONNABORTED 505e92d3f3fSGregory Neil Shapiro #endif /* ECONNABORTED */ 506e92d3f3fSGregory Neil Shapiro #ifdef EWOULDBLOCK 507e92d3f3fSGregory Neil Shapiro || save_errno == EWOULDBLOCK 508e92d3f3fSGregory Neil Shapiro #endif /* EWOULDBLOCK */ 509e92d3f3fSGregory Neil Shapiro ) 510e92d3f3fSGregory Neil Shapiro continue; 511e92d3f3fSGregory Neil Shapiro 512c2aa98e2SPeter Wemm syserr("getrequests: accept"); 513c2aa98e2SPeter Wemm 514c2aa98e2SPeter Wemm /* arrange to re-open the socket next time around */ 51506f25ae9SGregory Neil Shapiro (void) close(Daemons[curdaemon].d_socket); 51606f25ae9SGregory Neil Shapiro Daemons[curdaemon].d_socket = -1; 51706f25ae9SGregory Neil Shapiro #if SO_REUSEADDR_IS_BROKEN 51806f25ae9SGregory Neil Shapiro /* 51906f25ae9SGregory Neil Shapiro ** Give time for bound socket to be released. 52006f25ae9SGregory Neil Shapiro ** This creates a denial-of-service if you can 52106f25ae9SGregory Neil Shapiro ** force accept() to fail on affected systems. 52206f25ae9SGregory Neil Shapiro */ 52306f25ae9SGregory Neil Shapiro 52440266059SGregory Neil Shapiro Daemons[curdaemon].d_refuse_connections_until = curtime() + 15; 52506f25ae9SGregory Neil Shapiro #endif /* SO_REUSEADDR_IS_BROKEN */ 526c2aa98e2SPeter Wemm continue; 527c2aa98e2SPeter Wemm } 528c2aa98e2SPeter Wemm 52906f25ae9SGregory Neil Shapiro if (!control) 53006f25ae9SGregory Neil Shapiro { 53106f25ae9SGregory Neil Shapiro /* set some daemon related macros */ 53206f25ae9SGregory Neil Shapiro switch (Daemons[curdaemon].d_addr.sa.sa_family) 53306f25ae9SGregory Neil Shapiro { 53406f25ae9SGregory Neil Shapiro case AF_UNSPEC: 53540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 53640266059SGregory Neil Shapiro macid("{daemon_family}"), "unspec"); 53706f25ae9SGregory Neil Shapiro break; 53840266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 53940266059SGregory Neil Shapiro # if NETUNIX 54040266059SGregory Neil Shapiro case AF_UNIX: 54140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54240266059SGregory Neil Shapiro macid("{daemon_family}"), "local"); 54340266059SGregory Neil Shapiro break; 54440266059SGregory Neil Shapiro # endif /* NETUNIX */ 54540266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 54606f25ae9SGregory Neil Shapiro #if NETINET 54706f25ae9SGregory Neil Shapiro case AF_INET: 54840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 54940266059SGregory Neil Shapiro macid("{daemon_family}"), "inet"); 55006f25ae9SGregory Neil Shapiro break; 55106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 55206f25ae9SGregory Neil Shapiro #if NETINET6 55306f25ae9SGregory Neil Shapiro case AF_INET6: 55440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 55540266059SGregory Neil Shapiro macid("{daemon_family}"), "inet6"); 55606f25ae9SGregory Neil Shapiro break; 55706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 55806f25ae9SGregory Neil Shapiro #if NETISO 55906f25ae9SGregory Neil Shapiro case AF_ISO: 56040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56140266059SGregory Neil Shapiro macid("{daemon_family}"), "iso"); 56206f25ae9SGregory Neil Shapiro break; 56306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 56406f25ae9SGregory Neil Shapiro #if NETNS 56506f25ae9SGregory Neil Shapiro case AF_NS: 56640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 56740266059SGregory Neil Shapiro macid("{daemon_family}"), "ns"); 56806f25ae9SGregory Neil Shapiro break; 56906f25ae9SGregory Neil Shapiro #endif /* NETNS */ 57006f25ae9SGregory Neil Shapiro #if NETX25 57106f25ae9SGregory Neil Shapiro case AF_CCITT: 57240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57340266059SGregory Neil Shapiro macid("{daemon_family}"), "x.25"); 57406f25ae9SGregory Neil Shapiro break; 57506f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 57606f25ae9SGregory Neil Shapiro } 57740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 57840266059SGregory Neil Shapiro macid("{daemon_name}"), 57940266059SGregory Neil Shapiro Daemons[curdaemon].d_name); 58006f25ae9SGregory Neil Shapiro if (Daemons[curdaemon].d_mflags != NULL) 58140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58240266059SGregory Neil Shapiro macid("{daemon_flags}"), 58340266059SGregory Neil Shapiro Daemons[curdaemon].d_mflags); 58406f25ae9SGregory Neil Shapiro else 58540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 58640266059SGregory Neil Shapiro macid("{daemon_flags}"), ""); 58706f25ae9SGregory Neil Shapiro } 58806f25ae9SGregory Neil Shapiro 589c2aa98e2SPeter Wemm /* 590e92d3f3fSGregory Neil Shapiro ** If connection rate is exceeded here, connection shall be 591e92d3f3fSGregory Neil Shapiro ** refused later by a new call after fork() by the 592e92d3f3fSGregory Neil Shapiro ** validate_connection() function. Closing the connection 593e92d3f3fSGregory Neil Shapiro ** at this point violates RFC 2821. 594e92d3f3fSGregory Neil Shapiro ** Do NOT remove this call, its side effects are needed. 595e92d3f3fSGregory Neil Shapiro */ 596e92d3f3fSGregory Neil Shapiro 597e92d3f3fSGregory Neil Shapiro connection_rate_check(&RealHostAddr, NULL); 598e92d3f3fSGregory Neil Shapiro 599e92d3f3fSGregory Neil Shapiro /* 600c2aa98e2SPeter Wemm ** Create a subprocess to process the mail. 601c2aa98e2SPeter Wemm */ 602c2aa98e2SPeter Wemm 603c2aa98e2SPeter Wemm if (tTd(15, 2)) 60440266059SGregory Neil Shapiro sm_dprintf("getrequests: forking (fd = %d)\n", t); 60506f25ae9SGregory Neil Shapiro 60606f25ae9SGregory Neil Shapiro /* 60740266059SGregory Neil Shapiro ** Advance state of PRNG. 60840266059SGregory Neil Shapiro ** This is necessary because otherwise all child processes 60906f25ae9SGregory Neil Shapiro ** will produce the same PRN sequence and hence the selection 61006f25ae9SGregory Neil Shapiro ** of a queue directory (and other things, e.g., MX selection) 61106f25ae9SGregory Neil Shapiro ** are not "really" random. 61206f25ae9SGregory Neil Shapiro */ 61342e5d165SGregory Neil Shapiro #if STARTTLS 61440266059SGregory Neil Shapiro /* XXX get some better "random" data? */ 61542e5d165SGregory Neil Shapiro seed = get_random(); 61640266059SGregory Neil Shapiro RAND_seed((void *) &NextDiskSpaceCheck, 61740266059SGregory Neil Shapiro sizeof NextDiskSpaceCheck); 61840266059SGregory Neil Shapiro RAND_seed((void *) &now, sizeof now); 61942e5d165SGregory Neil Shapiro RAND_seed((void *) &seed, sizeof seed); 62042e5d165SGregory Neil Shapiro #else /* STARTTLS */ 62106f25ae9SGregory Neil Shapiro (void) get_random(); 62242e5d165SGregory Neil Shapiro #endif /* STARTTLS */ 623c2aa98e2SPeter Wemm 62440266059SGregory Neil Shapiro #if NAMED_BIND 62540266059SGregory Neil Shapiro /* 626e92d3f3fSGregory Neil Shapiro ** Update MX records for FallbackMX. 62740266059SGregory Neil Shapiro ** Let's hope this is fast otherwise we screw up the 62840266059SGregory Neil Shapiro ** response time. 62940266059SGregory Neil Shapiro */ 63040266059SGregory Neil Shapiro 631e92d3f3fSGregory Neil Shapiro if (FallbackMX != NULL) 632e92d3f3fSGregory Neil Shapiro (void) getfallbackmxrr(FallbackMX); 63340266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 63440266059SGregory Neil Shapiro 63513bd1963SGregory Neil Shapiro if (tTd(93, 100)) 63613bd1963SGregory Neil Shapiro { 63713bd1963SGregory Neil Shapiro /* don't fork, handle connection in this process */ 63813bd1963SGregory Neil Shapiro pid = 0; 63913bd1963SGregory Neil Shapiro pipefd[0] = pipefd[1] = -1; 64013bd1963SGregory Neil Shapiro } 64113bd1963SGregory Neil Shapiro else 64213bd1963SGregory Neil Shapiro { 643c2aa98e2SPeter Wemm /* 64413bd1963SGregory Neil Shapiro ** Create a pipe to keep the child from writing to 64513bd1963SGregory Neil Shapiro ** the socket until after the parent has closed 64613bd1963SGregory Neil Shapiro ** it. Otherwise the parent may hang if the child 64713bd1963SGregory Neil Shapiro ** has closed it first. 648c2aa98e2SPeter Wemm */ 649c2aa98e2SPeter Wemm 650c2aa98e2SPeter Wemm if (pipe(pipefd) < 0) 651c2aa98e2SPeter Wemm pipefd[0] = pipefd[1] = -1; 652c2aa98e2SPeter Wemm 65340266059SGregory Neil Shapiro (void) sm_blocksignal(SIGCHLD); 654c2aa98e2SPeter Wemm pid = fork(); 655c2aa98e2SPeter Wemm if (pid < 0) 656c2aa98e2SPeter Wemm { 657c2aa98e2SPeter Wemm syserr("daemon: cannot fork"); 658c2aa98e2SPeter Wemm if (pipefd[0] != -1) 659c2aa98e2SPeter Wemm { 660c2aa98e2SPeter Wemm (void) close(pipefd[0]); 661c2aa98e2SPeter Wemm (void) close(pipefd[1]); 662c2aa98e2SPeter Wemm } 66340266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 66406f25ae9SGregory Neil Shapiro (void) sleep(10); 665c2aa98e2SPeter Wemm (void) close(t); 666c2aa98e2SPeter Wemm continue; 667c2aa98e2SPeter Wemm } 66813bd1963SGregory Neil Shapiro } 669c2aa98e2SPeter Wemm 670c2aa98e2SPeter Wemm if (pid == 0) 671c2aa98e2SPeter Wemm { 672c2aa98e2SPeter Wemm char *p; 67340266059SGregory Neil Shapiro SM_FILE_T *inchannel, *outchannel = NULL; 674c2aa98e2SPeter Wemm 675c2aa98e2SPeter Wemm /* 676c2aa98e2SPeter Wemm ** CHILD -- return to caller. 677c2aa98e2SPeter Wemm ** Collect verified idea of sending host. 678c2aa98e2SPeter Wemm ** Verify calling user id if possible here. 679c2aa98e2SPeter Wemm */ 680c2aa98e2SPeter Wemm 6818774250cSGregory Neil Shapiro /* Reset global flags */ 6828774250cSGregory Neil Shapiro RestartRequest = NULL; 68340266059SGregory Neil Shapiro RestartWorkGroup = false; 6848774250cSGregory Neil Shapiro ShutdownRequest = NULL; 6858774250cSGregory Neil Shapiro PendingSignal = 0; 68640266059SGregory Neil Shapiro CurrentPid = getpid(); 687e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 6888774250cSGregory Neil Shapiro 68940266059SGregory Neil Shapiro (void) sm_releasesignal(SIGALRM); 69040266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 69140266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, SIG_DFL); 69240266059SGregory Neil Shapiro (void) sm_signal(SIGHUP, SIG_DFL); 69340266059SGregory Neil Shapiro (void) sm_signal(SIGTERM, intsig); 69440266059SGregory Neil Shapiro 69540266059SGregory Neil Shapiro /* turn on profiling */ 69640266059SGregory Neil Shapiro /* SM_PROF(0); */ 69740266059SGregory Neil Shapiro 69840266059SGregory Neil Shapiro /* 69940266059SGregory Neil Shapiro ** Initialize exception stack and default exception 70040266059SGregory Neil Shapiro ** handler for child process. 70140266059SGregory Neil Shapiro */ 70240266059SGregory Neil Shapiro 70340266059SGregory Neil Shapiro sm_exc_newthread(fatal_error); 7048774250cSGregory Neil Shapiro 70506f25ae9SGregory Neil Shapiro if (!control) 70606f25ae9SGregory Neil Shapiro { 70740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 70840266059SGregory Neil Shapiro macid("{daemon_addr}"), 70940266059SGregory Neil Shapiro anynet_ntoa(&Daemons[curdaemon].d_addr)); 71040266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, "%d", 71106f25ae9SGregory Neil Shapiro ntohs(Daemons[curdaemon].d_port)); 71240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 71340266059SGregory Neil Shapiro macid("{daemon_port}"), status); 71406f25ae9SGregory Neil Shapiro } 71506f25ae9SGregory Neil Shapiro 71640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 71706f25ae9SGregory Neil Shapiro { 71806f25ae9SGregory Neil Shapiro if (Daemons[idx].d_socket >= 0) 71906f25ae9SGregory Neil Shapiro (void) close(Daemons[idx].d_socket); 72013058a91SGregory Neil Shapiro Daemons[idx].d_socket = -1; 72106f25ae9SGregory Neil Shapiro } 722065a643dSPeter Wemm clrcontrol(); 72306f25ae9SGregory Neil Shapiro 72406f25ae9SGregory Neil Shapiro /* Avoid SMTP daemon actions if control command */ 72506f25ae9SGregory Neil Shapiro if (control) 72606f25ae9SGregory Neil Shapiro { 72706f25ae9SGregory Neil Shapiro /* Add control socket process */ 72840266059SGregory Neil Shapiro proc_list_add(CurrentPid, 72940266059SGregory Neil Shapiro "console socket child", 730e92d3f3fSGregory Neil Shapiro PROC_CONTROL_CHILD, 0, -1, NULL); 73106f25ae9SGregory Neil Shapiro } 73206f25ae9SGregory Neil Shapiro else 73306f25ae9SGregory Neil Shapiro { 734c2aa98e2SPeter Wemm proc_list_clear(); 735c2aa98e2SPeter Wemm 73640266059SGregory Neil Shapiro /* clean up background delivery children */ 73740266059SGregory Neil Shapiro (void) sm_signal(SIGCHLD, reapchild); 73840266059SGregory Neil Shapiro 739065a643dSPeter Wemm /* Add parent process as first child item */ 74040266059SGregory Neil Shapiro proc_list_add(CurrentPid, "daemon child", 741e92d3f3fSGregory Neil Shapiro PROC_DAEMON_CHILD, 0, -1, NULL); 742065a643dSPeter Wemm 74306f25ae9SGregory Neil Shapiro /* don't schedule queue runs if ETRN */ 744c2aa98e2SPeter Wemm QueueIntvl = 0; 745c2aa98e2SPeter Wemm 74640266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", 747c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 74806f25ae9SGregory Neil Shapiro } 749c2aa98e2SPeter Wemm 750c2aa98e2SPeter Wemm if (pipefd[0] != -1) 751c2aa98e2SPeter Wemm { 752c2aa98e2SPeter Wemm auto char c; 753c2aa98e2SPeter Wemm 754c2aa98e2SPeter Wemm /* 755c2aa98e2SPeter Wemm ** Wait for the parent to close the write end 756c2aa98e2SPeter Wemm ** of the pipe, which we will see as an EOF. 757c2aa98e2SPeter Wemm ** This guarantees that we won't write to the 758c2aa98e2SPeter Wemm ** socket until after the parent has closed 759c2aa98e2SPeter Wemm ** the pipe. 760c2aa98e2SPeter Wemm */ 761c2aa98e2SPeter Wemm 762c2aa98e2SPeter Wemm /* close the write end of the pipe */ 763c2aa98e2SPeter Wemm (void) close(pipefd[1]); 764c2aa98e2SPeter Wemm 765c2aa98e2SPeter Wemm /* we shouldn't be interrupted, but ... */ 766c2aa98e2SPeter Wemm while (read(pipefd[0], &c, 1) < 0 && 767c2aa98e2SPeter Wemm errno == EINTR) 768c2aa98e2SPeter Wemm continue; 769c2aa98e2SPeter Wemm (void) close(pipefd[0]); 770c2aa98e2SPeter Wemm } 771c2aa98e2SPeter Wemm 77206f25ae9SGregory Neil Shapiro /* control socket processing */ 77306f25ae9SGregory Neil Shapiro if (control) 77406f25ae9SGregory Neil Shapiro { 77506f25ae9SGregory Neil Shapiro control_command(t, e); 77606f25ae9SGregory Neil Shapiro /* NOTREACHED */ 77706f25ae9SGregory Neil Shapiro exit(EX_SOFTWARE); 77806f25ae9SGregory Neil Shapiro } 77906f25ae9SGregory Neil Shapiro 780c2aa98e2SPeter Wemm /* determine host name */ 781c2aa98e2SPeter Wemm p = hostnamebyanyaddr(&RealHostAddr); 78240266059SGregory Neil Shapiro if (strlen(p) > MAXNAME) /* XXX - 1 ? */ 783c2aa98e2SPeter Wemm p[MAXNAME] = '\0'; 784c2aa98e2SPeter Wemm RealHostName = newstr(p); 78506f25ae9SGregory Neil Shapiro if (RealHostName[0] == '[') 78606f25ae9SGregory Neil Shapiro { 78740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 78840266059SGregory Neil Shapiro macid("{client_resolve}"), 78940266059SGregory Neil Shapiro h_errno == TRY_AGAIN ? "TEMP" : "FAIL"); 79006f25ae9SGregory Neil Shapiro } 79106f25ae9SGregory Neil Shapiro else 792e92d3f3fSGregory Neil Shapiro { 79340266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 79440266059SGregory Neil Shapiro macid("{client_resolve}"), "OK"); 795e92d3f3fSGregory Neil Shapiro } 79640266059SGregory Neil Shapiro sm_setproctitle(true, e, "startup with %s", p); 797605302a5SGregory Neil Shapiro markstats(e, NULL, STATS_CONNECT); 798c2aa98e2SPeter Wemm 79940266059SGregory Neil Shapiro if ((inchannel = sm_io_open(SmFtStdiofd, 80040266059SGregory Neil Shapiro SM_TIME_DEFAULT, 80140266059SGregory Neil Shapiro (void *) &t, 802e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, 80340266059SGregory Neil Shapiro NULL)) == NULL || 804c2aa98e2SPeter Wemm (t = dup(t)) < 0 || 80540266059SGregory Neil Shapiro (outchannel = sm_io_open(SmFtStdiofd, 80640266059SGregory Neil Shapiro SM_TIME_DEFAULT, 80740266059SGregory Neil Shapiro (void *) &t, 808e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, 80940266059SGregory Neil Shapiro NULL)) == NULL) 810c2aa98e2SPeter Wemm { 81140266059SGregory Neil Shapiro syserr("cannot open SMTP server channel, fd=%d", 81240266059SGregory Neil Shapiro t); 81340266059SGregory Neil Shapiro finis(false, true, EX_OK); 814c2aa98e2SPeter Wemm } 81540266059SGregory Neil Shapiro sm_io_automode(inchannel, outchannel); 816c2aa98e2SPeter Wemm 817c2aa98e2SPeter Wemm InChannel = inchannel; 818c2aa98e2SPeter Wemm OutChannel = outchannel; 81940266059SGregory Neil Shapiro DisConnected = false; 820c2aa98e2SPeter Wemm 82140266059SGregory Neil Shapiro #if XLA 822c2aa98e2SPeter Wemm if (!xla_host_ok(RealHostName)) 823c2aa98e2SPeter Wemm { 82406f25ae9SGregory Neil Shapiro message("421 4.4.5 Too many SMTP sessions for this host"); 82540266059SGregory Neil Shapiro finis(false, true, EX_OK); 826c2aa98e2SPeter Wemm } 82706f25ae9SGregory Neil Shapiro #endif /* XLA */ 82806f25ae9SGregory Neil Shapiro /* find out name for interface of connection */ 82940266059SGregory Neil Shapiro if (getsockname(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 83040266059SGregory Neil Shapiro NULL), &sa.sa, &len) == 0) 83106f25ae9SGregory Neil Shapiro { 83206f25ae9SGregory Neil Shapiro p = hostnamebyanyaddr(&sa); 83306f25ae9SGregory Neil Shapiro if (tTd(15, 9)) 83440266059SGregory Neil Shapiro sm_dprintf("getreq: got name %s\n", p); 83540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 83640266059SGregory Neil Shapiro macid("{if_name}"), p); 83706f25ae9SGregory Neil Shapiro 83840266059SGregory Neil Shapiro /* 83940266059SGregory Neil Shapiro ** Do this only if it is not the loopback 84040266059SGregory Neil Shapiro ** interface. 84140266059SGregory Neil Shapiro */ 84240266059SGregory Neil Shapiro 84306f25ae9SGregory Neil Shapiro if (!isloopback(sa)) 84406f25ae9SGregory Neil Shapiro { 84540266059SGregory Neil Shapiro char *addr; 84640266059SGregory Neil Shapiro char family[5]; 84740266059SGregory Neil Shapiro 84840266059SGregory Neil Shapiro addr = anynet_ntoa(&sa); 84940266059SGregory Neil Shapiro (void) sm_snprintf(family, 85040266059SGregory Neil Shapiro sizeof(family), 85140266059SGregory Neil Shapiro "%d", sa.sa.sa_family); 85240266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 85340266059SGregory Neil Shapiro A_TEMP, 85440266059SGregory Neil Shapiro macid("{if_addr}"), addr); 85540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 85640266059SGregory Neil Shapiro A_TEMP, 85740266059SGregory Neil Shapiro macid("{if_family}"), family); 85806f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 85940266059SGregory Neil Shapiro sm_dprintf("getreq: got addr %s and family %s\n", 86040266059SGregory Neil Shapiro addr, family); 86106f25ae9SGregory Neil Shapiro } 86206f25ae9SGregory Neil Shapiro else 86306f25ae9SGregory Neil Shapiro { 86440266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 86540266059SGregory Neil Shapiro A_PERM, 86640266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 86740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, 86840266059SGregory Neil Shapiro A_PERM, 86940266059SGregory Neil Shapiro macid("{if_family}"), NULL); 87006f25ae9SGregory Neil Shapiro } 87106f25ae9SGregory Neil Shapiro } 87206f25ae9SGregory Neil Shapiro else 87306f25ae9SGregory Neil Shapiro { 87406f25ae9SGregory Neil Shapiro if (tTd(15, 7)) 87540266059SGregory Neil Shapiro sm_dprintf("getreq: getsockname failed\n"); 87640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 87740266059SGregory Neil Shapiro macid("{if_name}"), NULL); 87840266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 87940266059SGregory Neil Shapiro macid("{if_addr}"), NULL); 88040266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 88140266059SGregory Neil Shapiro macid("{if_family}"), NULL); 88206f25ae9SGregory Neil Shapiro } 883c2aa98e2SPeter Wemm break; 884c2aa98e2SPeter Wemm } 885c2aa98e2SPeter Wemm 886c2aa98e2SPeter Wemm /* parent -- keep track of children */ 88706f25ae9SGregory Neil Shapiro if (control) 88806f25ae9SGregory Neil Shapiro { 88940266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 89040266059SGregory Neil Shapiro "control socket server child"); 891e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_CONTROL, 0, -1, NULL); 89206f25ae9SGregory Neil Shapiro } 89306f25ae9SGregory Neil Shapiro else 89406f25ae9SGregory Neil Shapiro { 89540266059SGregory Neil Shapiro (void) sm_snprintf(status, sizeof status, 89606f25ae9SGregory Neil Shapiro "SMTP server child for %s", 897065a643dSPeter Wemm anynet_ntoa(&RealHostAddr)); 898e92d3f3fSGregory Neil Shapiro proc_list_add(pid, status, PROC_DAEMON, 0, -1, 899e92d3f3fSGregory Neil Shapiro &RealHostAddr); 90006f25ae9SGregory Neil Shapiro } 90140266059SGregory Neil Shapiro (void) sm_releasesignal(SIGCHLD); 902c2aa98e2SPeter Wemm 903c2aa98e2SPeter Wemm /* close the read end of the synchronization pipe */ 904c2aa98e2SPeter Wemm if (pipefd[0] != -1) 90506f25ae9SGregory Neil Shapiro { 906c2aa98e2SPeter Wemm (void) close(pipefd[0]); 90706f25ae9SGregory Neil Shapiro pipefd[0] = -1; 90806f25ae9SGregory Neil Shapiro } 909c2aa98e2SPeter Wemm 910c2aa98e2SPeter Wemm /* close the port so that others will hang (for a while) */ 911c2aa98e2SPeter Wemm (void) close(t); 912c2aa98e2SPeter Wemm 913c2aa98e2SPeter Wemm /* release the child by closing the read end of the sync pipe */ 914c2aa98e2SPeter Wemm if (pipefd[1] != -1) 91506f25ae9SGregory Neil Shapiro { 916c2aa98e2SPeter Wemm (void) close(pipefd[1]); 91706f25ae9SGregory Neil Shapiro pipefd[1] = -1; 918c2aa98e2SPeter Wemm } 91906f25ae9SGregory Neil Shapiro } 920c2aa98e2SPeter Wemm if (tTd(15, 2)) 92140266059SGregory Neil Shapiro sm_dprintf("getreq: returning\n"); 92240266059SGregory Neil Shapiro 92340266059SGregory Neil Shapiro #if MILTER 92440266059SGregory Neil Shapiro /* set the filters for this daemon */ 92540266059SGregory Neil Shapiro if (Daemons[curdaemon].d_inputfilterlist != NULL) 92640266059SGregory Neil Shapiro { 92740266059SGregory Neil Shapiro for (i = 0; 92813bd1963SGregory Neil Shapiro (i < MAXFILTERS && 92913bd1963SGregory Neil Shapiro Daemons[curdaemon].d_inputfilters[i] != NULL); 93040266059SGregory Neil Shapiro i++) 93140266059SGregory Neil Shapiro { 93240266059SGregory Neil Shapiro InputFilters[i] = Daemons[curdaemon].d_inputfilters[i]; 93340266059SGregory Neil Shapiro } 93440266059SGregory Neil Shapiro if (i < MAXFILTERS) 93540266059SGregory Neil Shapiro InputFilters[i] = NULL; 93640266059SGregory Neil Shapiro } 93740266059SGregory Neil Shapiro #endif /* MILTER */ 93806f25ae9SGregory Neil Shapiro return &Daemons[curdaemon].d_flags; 939c2aa98e2SPeter Wemm } 94040266059SGregory Neil Shapiro 94140266059SGregory Neil Shapiro /* 94240266059SGregory Neil Shapiro ** GETREQUESTS_CHECKDISKSPACE -- check available diskspace. 94340266059SGregory Neil Shapiro ** 94440266059SGregory Neil Shapiro ** Parameters: 94540266059SGregory Neil Shapiro ** e -- envelope. 94640266059SGregory Neil Shapiro ** 94740266059SGregory Neil Shapiro ** Returns: 94840266059SGregory Neil Shapiro ** none. 94940266059SGregory Neil Shapiro ** 95040266059SGregory Neil Shapiro ** Side Effects: 95140266059SGregory Neil Shapiro ** Modifies Daemon flags (D_ETRNONLY) if not enough disk space. 95240266059SGregory Neil Shapiro */ 95340266059SGregory Neil Shapiro 95440266059SGregory Neil Shapiro static void 95540266059SGregory Neil Shapiro getrequests_checkdiskspace(e) 95640266059SGregory Neil Shapiro ENVELOPE *e; 95740266059SGregory Neil Shapiro { 95840266059SGregory Neil Shapiro bool logged = false; 95940266059SGregory Neil Shapiro int idx; 96040266059SGregory Neil Shapiro time_t now; 96140266059SGregory Neil Shapiro 96240266059SGregory Neil Shapiro now = curtime(); 96340266059SGregory Neil Shapiro if (now < NextDiskSpaceCheck) 96440266059SGregory Neil Shapiro return; 96540266059SGregory Neil Shapiro 96640266059SGregory Neil Shapiro /* Check if there is available disk space in all queue groups. */ 96740266059SGregory Neil Shapiro if (!enoughdiskspace(0, NULL)) 96840266059SGregory Neil Shapiro { 96940266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 97040266059SGregory Neil Shapiro { 97140266059SGregory Neil Shapiro if (bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 97240266059SGregory Neil Shapiro continue; 97340266059SGregory Neil Shapiro 97440266059SGregory Neil Shapiro /* log only if not logged before */ 97540266059SGregory Neil Shapiro if (!logged) 97640266059SGregory Neil Shapiro { 97740266059SGregory Neil Shapiro if (LogLevel > 8) 97840266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 97940266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 98040266059SGregory Neil Shapiro MinBlocksFree); 98140266059SGregory Neil Shapiro sm_setproctitle(true, e, 98240266059SGregory Neil Shapiro "rejecting new messages: min free: %ld", 98340266059SGregory Neil Shapiro MinBlocksFree); 98440266059SGregory Neil Shapiro logged = true; 98540266059SGregory Neil Shapiro } 98640266059SGregory Neil Shapiro setbitn(D_ETRNONLY, Daemons[idx].d_flags); 98740266059SGregory Neil Shapiro } 98840266059SGregory Neil Shapiro } 98940266059SGregory Neil Shapiro else 99040266059SGregory Neil Shapiro { 99140266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; ++idx) 99240266059SGregory Neil Shapiro { 99340266059SGregory Neil Shapiro if (!bitnset(D_ETRNONLY, Daemons[idx].d_flags)) 99440266059SGregory Neil Shapiro continue; 99540266059SGregory Neil Shapiro 99640266059SGregory Neil Shapiro /* log only if not logged before */ 99740266059SGregory Neil Shapiro if (!logged) 99840266059SGregory Neil Shapiro { 99940266059SGregory Neil Shapiro if (LogLevel > 8) 100040266059SGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 100140266059SGregory Neil Shapiro "accepting new messages (again)"); 100240266059SGregory Neil Shapiro logged = true; 100340266059SGregory Neil Shapiro } 100440266059SGregory Neil Shapiro 100540266059SGregory Neil Shapiro /* title will be set later */ 100640266059SGregory Neil Shapiro clrbitn(D_ETRNONLY, Daemons[idx].d_flags); 100740266059SGregory Neil Shapiro } 100840266059SGregory Neil Shapiro } 100940266059SGregory Neil Shapiro 101040266059SGregory Neil Shapiro /* only check disk space once a minute */ 101140266059SGregory Neil Shapiro NextDiskSpaceCheck = now + 60; 101240266059SGregory Neil Shapiro } 101340266059SGregory Neil Shapiro 101440266059SGregory Neil Shapiro /* 101506f25ae9SGregory Neil Shapiro ** OPENDAEMONSOCKET -- open SMTP socket 1016c2aa98e2SPeter Wemm ** 101706f25ae9SGregory Neil Shapiro ** Deals with setting all appropriate options. 1018c2aa98e2SPeter Wemm ** 1019c2aa98e2SPeter Wemm ** Parameters: 102006f25ae9SGregory Neil Shapiro ** d -- the structure for the daemon to open. 1021c2aa98e2SPeter Wemm ** firsttime -- set if this is the initial open. 1022c2aa98e2SPeter Wemm ** 1023c2aa98e2SPeter Wemm ** Returns: 1024c2aa98e2SPeter Wemm ** Size in bytes of the daemon socket addr. 1025c2aa98e2SPeter Wemm ** 1026c2aa98e2SPeter Wemm ** Side Effects: 1027c2aa98e2SPeter Wemm ** Leaves DaemonSocket set to the open socket. 1028c2aa98e2SPeter Wemm ** Exits if the socket cannot be created. 1029c2aa98e2SPeter Wemm */ 1030c2aa98e2SPeter Wemm 1031c2aa98e2SPeter Wemm #define MAXOPENTRIES 10 /* maximum number of tries to open connection */ 1032c2aa98e2SPeter Wemm 103306f25ae9SGregory Neil Shapiro static int 103406f25ae9SGregory Neil Shapiro opendaemonsocket(d, firsttime) 103540266059SGregory Neil Shapiro DAEMON_T *d; 1036c2aa98e2SPeter Wemm bool firsttime; 1037c2aa98e2SPeter Wemm { 1038c2aa98e2SPeter Wemm int on = 1; 103906f25ae9SGregory Neil Shapiro int fdflags; 104006f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T socksize = 0; 1041c2aa98e2SPeter Wemm int ntries = 0; 104206f25ae9SGregory Neil Shapiro int save_errno; 1043c2aa98e2SPeter Wemm 1044c2aa98e2SPeter Wemm if (tTd(15, 2)) 104540266059SGregory Neil Shapiro sm_dprintf("opendaemonsocket(%s)\n", d->d_name); 1046c2aa98e2SPeter Wemm 1047c2aa98e2SPeter Wemm do 1048c2aa98e2SPeter Wemm { 1049c2aa98e2SPeter Wemm if (ntries > 0) 105006f25ae9SGregory Neil Shapiro (void) sleep(5); 105106f25ae9SGregory Neil Shapiro if (firsttime || d->d_socket < 0) 1052c2aa98e2SPeter Wemm { 105340266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 105440266059SGregory Neil Shapiro # if NETUNIX 105540266059SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNIX) 105640266059SGregory Neil Shapiro { 105740266059SGregory Neil Shapiro int rval; 105840266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK|SFF_CREAT; 105940266059SGregory Neil Shapiro 106040266059SGregory Neil Shapiro /* if not safe, don't use it */ 106140266059SGregory Neil Shapiro rval = safefile(d->d_addr.sunix.sun_path, 106240266059SGregory Neil Shapiro RunAsUid, RunAsGid, 106340266059SGregory Neil Shapiro RunAsUserName, sff, 106440266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 106540266059SGregory Neil Shapiro if (rval != 0) 106640266059SGregory Neil Shapiro { 106740266059SGregory Neil Shapiro save_errno = errno; 106840266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: unsafe domain socket %s", 106940266059SGregory Neil Shapiro d->d_name, 107040266059SGregory Neil Shapiro d->d_addr.sunix.sun_path); 107140266059SGregory Neil Shapiro goto fail; 107240266059SGregory Neil Shapiro } 107340266059SGregory Neil Shapiro 107440266059SGregory Neil Shapiro /* Don't try to overtake an existing socket */ 107540266059SGregory Neil Shapiro (void) unlink(d->d_addr.sunix.sun_path); 107640266059SGregory Neil Shapiro } 107740266059SGregory Neil Shapiro # endif /* NETUNIX */ 107840266059SGregory Neil Shapiro #endif /* _FFR_DOMAIN_NETUNIX */ 107906f25ae9SGregory Neil Shapiro d->d_socket = socket(d->d_addr.sa.sa_family, 108006f25ae9SGregory Neil Shapiro SOCK_STREAM, 0); 108106f25ae9SGregory Neil Shapiro if (d->d_socket < 0) 1082c2aa98e2SPeter Wemm { 108306f25ae9SGregory Neil Shapiro save_errno = errno; 108440266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: can't create server SMTP socket", 108540266059SGregory Neil Shapiro d->d_name); 108640266059SGregory Neil Shapiro fail: 108740266059SGregory Neil Shapiro if (bitnset(D_OPTIONAL, d->d_flags) && 108840266059SGregory Neil Shapiro (!transienterror(save_errno) || 108940266059SGregory Neil Shapiro ntries >= MAXOPENTRIES - 1)) 109040266059SGregory Neil Shapiro { 109140266059SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: optional socket disabled", 109240266059SGregory Neil Shapiro d->d_name); 109340266059SGregory Neil Shapiro setbitn(D_DISABLE, d->d_flags); 109440266059SGregory Neil Shapiro d->d_socket = -1; 109540266059SGregory Neil Shapiro return -1; 109640266059SGregory Neil Shapiro } 1097c2aa98e2SPeter Wemm severe: 1098c2aa98e2SPeter Wemm if (LogLevel > 0) 1099c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 110040266059SGregory Neil Shapiro "daemon %s: problem creating SMTP socket", 110140266059SGregory Neil Shapiro d->d_name); 110206f25ae9SGregory Neil Shapiro d->d_socket = -1; 1103c2aa98e2SPeter Wemm continue; 1104c2aa98e2SPeter Wemm } 1105c2aa98e2SPeter Wemm 110613bd1963SGregory Neil Shapiro if (SM_FD_SETSIZE > 0 && d->d_socket >= SM_FD_SETSIZE) 110713bd1963SGregory Neil Shapiro { 110813bd1963SGregory Neil Shapiro save_errno = EINVAL; 110913bd1963SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: server SMTP socket (%d) too large", 111013bd1963SGregory Neil Shapiro d->d_name, d->d_socket); 111113bd1963SGregory Neil Shapiro goto fail; 111213bd1963SGregory Neil Shapiro } 111313bd1963SGregory Neil Shapiro 1114c2aa98e2SPeter Wemm /* turn on network debugging? */ 1115c2aa98e2SPeter Wemm if (tTd(15, 101)) 111606f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1117c2aa98e2SPeter Wemm SO_DEBUG, (char *)&on, 1118c2aa98e2SPeter Wemm sizeof on); 1119c2aa98e2SPeter Wemm 112006f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1121c2aa98e2SPeter Wemm SO_REUSEADDR, (char *)&on, sizeof on); 112206f25ae9SGregory Neil Shapiro (void) setsockopt(d->d_socket, SOL_SOCKET, 1123c2aa98e2SPeter Wemm SO_KEEPALIVE, (char *)&on, sizeof on); 1124c2aa98e2SPeter Wemm 1125c2aa98e2SPeter Wemm #ifdef SO_RCVBUF 112606f25ae9SGregory Neil Shapiro if (d->d_tcprcvbufsize > 0) 1127c2aa98e2SPeter Wemm { 112806f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 1129c2aa98e2SPeter Wemm SO_RCVBUF, 113006f25ae9SGregory Neil Shapiro (char *) &d->d_tcprcvbufsize, 113106f25ae9SGregory Neil Shapiro sizeof(d->d_tcprcvbufsize)) < 0) 113206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_RCVBUF)", d->d_name); 1133c2aa98e2SPeter Wemm } 113406f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 113506f25ae9SGregory Neil Shapiro #ifdef SO_SNDBUF 113606f25ae9SGregory Neil Shapiro if (d->d_tcpsndbufsize > 0) 113706f25ae9SGregory Neil Shapiro { 113806f25ae9SGregory Neil Shapiro if (setsockopt(d->d_socket, SOL_SOCKET, 113906f25ae9SGregory Neil Shapiro SO_SNDBUF, 114006f25ae9SGregory Neil Shapiro (char *) &d->d_tcpsndbufsize, 114106f25ae9SGregory Neil Shapiro sizeof(d->d_tcpsndbufsize)) < 0) 114206f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: setsockopt(SO_SNDBUF)", d->d_name); 114306f25ae9SGregory Neil Shapiro } 114406f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 1145c2aa98e2SPeter Wemm 114606f25ae9SGregory Neil Shapiro if ((fdflags = fcntl(d->d_socket, F_GETFD, 0)) == -1 || 114706f25ae9SGregory Neil Shapiro fcntl(d->d_socket, F_SETFD, 114806f25ae9SGregory Neil Shapiro fdflags | FD_CLOEXEC) == -1) 114906f25ae9SGregory Neil Shapiro { 115006f25ae9SGregory Neil Shapiro save_errno = errno; 115106f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: failed to %s close-on-exec flag: %s", 115206f25ae9SGregory Neil Shapiro d->d_name, 115306f25ae9SGregory Neil Shapiro fdflags == -1 ? "get" : "set", 115440266059SGregory Neil Shapiro sm_errstring(save_errno)); 115506f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 115606f25ae9SGregory Neil Shapiro goto severe; 115706f25ae9SGregory Neil Shapiro } 115806f25ae9SGregory Neil Shapiro 115906f25ae9SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1160c2aa98e2SPeter Wemm { 116140266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 116240266059SGregory Neil Shapiro # ifdef NETUNIX 116340266059SGregory Neil Shapiro case AF_UNIX: 116440266059SGregory Neil Shapiro socksize = sizeof d->d_addr.sunix; 116540266059SGregory Neil Shapiro break; 116640266059SGregory Neil Shapiro # endif /* NETUNIX */ 116740266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1168c2aa98e2SPeter Wemm #if NETINET 1169c2aa98e2SPeter Wemm case AF_INET: 117006f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin; 1171c2aa98e2SPeter Wemm break; 117206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 117306f25ae9SGregory Neil Shapiro 117406f25ae9SGregory Neil Shapiro #if NETINET6 117506f25ae9SGregory Neil Shapiro case AF_INET6: 117606f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.sin6; 117706f25ae9SGregory Neil Shapiro break; 117806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1179c2aa98e2SPeter Wemm 1180c2aa98e2SPeter Wemm #if NETISO 1181c2aa98e2SPeter Wemm case AF_ISO: 118206f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr.siso; 1183c2aa98e2SPeter Wemm break; 118406f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1185c2aa98e2SPeter Wemm 1186c2aa98e2SPeter Wemm default: 118706f25ae9SGregory Neil Shapiro socksize = sizeof d->d_addr; 1188c2aa98e2SPeter Wemm break; 1189c2aa98e2SPeter Wemm } 1190c2aa98e2SPeter Wemm 119106f25ae9SGregory Neil Shapiro if (bind(d->d_socket, &d->d_addr.sa, socksize) < 0) 1192c2aa98e2SPeter Wemm { 1193c2aa98e2SPeter Wemm /* probably another daemon already */ 119406f25ae9SGregory Neil Shapiro save_errno = errno; 119506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot bind", 119606f25ae9SGregory Neil Shapiro d->d_name); 119706f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 119840266059SGregory Neil Shapiro goto fail; 1199c2aa98e2SPeter Wemm } 1200c2aa98e2SPeter Wemm } 120106f25ae9SGregory Neil Shapiro if (!firsttime && 120206f25ae9SGregory Neil Shapiro listen(d->d_socket, d->d_listenqueue) < 0) 1203c2aa98e2SPeter Wemm { 120406f25ae9SGregory Neil Shapiro save_errno = errno; 120506f25ae9SGregory Neil Shapiro syserr("opendaemonsocket: daemon %s: cannot listen", 120606f25ae9SGregory Neil Shapiro d->d_name); 120706f25ae9SGregory Neil Shapiro (void) close(d->d_socket); 1208c2aa98e2SPeter Wemm goto severe; 1209c2aa98e2SPeter Wemm } 1210c2aa98e2SPeter Wemm return socksize; 121106f25ae9SGregory Neil Shapiro } while (ntries++ < MAXOPENTRIES && transienterror(save_errno)); 121206f25ae9SGregory Neil Shapiro syserr("!opendaemonsocket: daemon %s: server SMTP socket wedged: exiting", 121306f25ae9SGregory Neil Shapiro d->d_name); 1214065a643dSPeter Wemm /* NOTREACHED */ 1215c2aa98e2SPeter Wemm return -1; /* avoid compiler warning on IRIX */ 1216c2aa98e2SPeter Wemm } 121740266059SGregory Neil Shapiro /* 121806f25ae9SGregory Neil Shapiro ** SETUPDAEMON -- setup socket for daemon 121906f25ae9SGregory Neil Shapiro ** 122006f25ae9SGregory Neil Shapiro ** Parameters: 122106f25ae9SGregory Neil Shapiro ** daemonaddr -- socket for daemon 122206f25ae9SGregory Neil Shapiro ** 122306f25ae9SGregory Neil Shapiro ** Returns: 122406f25ae9SGregory Neil Shapiro ** port number on which daemon should run 122506f25ae9SGregory Neil Shapiro ** 122606f25ae9SGregory Neil Shapiro */ 122740266059SGregory Neil Shapiro 122840266059SGregory Neil Shapiro static unsigned short 122906f25ae9SGregory Neil Shapiro setupdaemon(daemonaddr) 123006f25ae9SGregory Neil Shapiro SOCKADDR *daemonaddr; 123106f25ae9SGregory Neil Shapiro { 123240266059SGregory Neil Shapiro unsigned short port; 123306f25ae9SGregory Neil Shapiro 123406f25ae9SGregory Neil Shapiro /* 123506f25ae9SGregory Neil Shapiro ** Set up the address for the mailer. 123606f25ae9SGregory Neil Shapiro */ 123706f25ae9SGregory Neil Shapiro 123806f25ae9SGregory Neil Shapiro if (daemonaddr->sa.sa_family == AF_UNSPEC) 123906f25ae9SGregory Neil Shapiro { 124006f25ae9SGregory Neil Shapiro memset(daemonaddr, '\0', sizeof *daemonaddr); 124106f25ae9SGregory Neil Shapiro #if NETINET 124206f25ae9SGregory Neil Shapiro daemonaddr->sa.sa_family = AF_INET; 124306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 124406f25ae9SGregory Neil Shapiro } 124506f25ae9SGregory Neil Shapiro 124606f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 124706f25ae9SGregory Neil Shapiro { 124806f25ae9SGregory Neil Shapiro #if NETINET 124906f25ae9SGregory Neil Shapiro case AF_INET: 125006f25ae9SGregory Neil Shapiro if (daemonaddr->sin.sin_addr.s_addr == 0) 125106f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_addr.s_addr = INADDR_ANY; 125206f25ae9SGregory Neil Shapiro port = daemonaddr->sin.sin_port; 125306f25ae9SGregory Neil Shapiro break; 125406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 125506f25ae9SGregory Neil Shapiro 125606f25ae9SGregory Neil Shapiro #if NETINET6 125706f25ae9SGregory Neil Shapiro case AF_INET6: 125806f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&daemonaddr->sin6.sin6_addr)) 125906f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_addr = in6addr_any; 126006f25ae9SGregory Neil Shapiro port = daemonaddr->sin6.sin6_port; 126106f25ae9SGregory Neil Shapiro break; 126206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 126306f25ae9SGregory Neil Shapiro 126406f25ae9SGregory Neil Shapiro default: 126506f25ae9SGregory Neil Shapiro /* unknown protocol */ 126606f25ae9SGregory Neil Shapiro port = 0; 126706f25ae9SGregory Neil Shapiro break; 126806f25ae9SGregory Neil Shapiro } 126906f25ae9SGregory Neil Shapiro if (port == 0) 127006f25ae9SGregory Neil Shapiro { 127106f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 127206f25ae9SGregory Neil Shapiro port = htons(25); 127306f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 127406f25ae9SGregory Neil Shapiro { 127506f25ae9SGregory Neil Shapiro register struct servent *sp; 127606f25ae9SGregory Neil Shapiro 127706f25ae9SGregory Neil Shapiro sp = getservbyname("smtp", "tcp"); 127806f25ae9SGregory Neil Shapiro if (sp == NULL) 127906f25ae9SGregory Neil Shapiro { 128006f25ae9SGregory Neil Shapiro syserr("554 5.3.5 service \"smtp\" unknown"); 128106f25ae9SGregory Neil Shapiro port = htons(25); 128206f25ae9SGregory Neil Shapiro } 128306f25ae9SGregory Neil Shapiro else 128406f25ae9SGregory Neil Shapiro port = sp->s_port; 128506f25ae9SGregory Neil Shapiro } 128606f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 128706f25ae9SGregory Neil Shapiro } 128806f25ae9SGregory Neil Shapiro 128906f25ae9SGregory Neil Shapiro switch (daemonaddr->sa.sa_family) 129006f25ae9SGregory Neil Shapiro { 129106f25ae9SGregory Neil Shapiro #if NETINET 129206f25ae9SGregory Neil Shapiro case AF_INET: 129306f25ae9SGregory Neil Shapiro daemonaddr->sin.sin_port = port; 129406f25ae9SGregory Neil Shapiro break; 129506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 129606f25ae9SGregory Neil Shapiro 129706f25ae9SGregory Neil Shapiro #if NETINET6 129806f25ae9SGregory Neil Shapiro case AF_INET6: 129906f25ae9SGregory Neil Shapiro daemonaddr->sin6.sin6_port = port; 130006f25ae9SGregory Neil Shapiro break; 130106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 130206f25ae9SGregory Neil Shapiro 130306f25ae9SGregory Neil Shapiro default: 130406f25ae9SGregory Neil Shapiro /* unknown protocol */ 130506f25ae9SGregory Neil Shapiro break; 130606f25ae9SGregory Neil Shapiro } 130740266059SGregory Neil Shapiro return port; 130806f25ae9SGregory Neil Shapiro } 130940266059SGregory Neil Shapiro /* 1310c2aa98e2SPeter Wemm ** CLRDAEMON -- reset the daemon connection 1311c2aa98e2SPeter Wemm ** 1312c2aa98e2SPeter Wemm ** Parameters: 1313c2aa98e2SPeter Wemm ** none. 1314c2aa98e2SPeter Wemm ** 1315c2aa98e2SPeter Wemm ** Returns: 1316c2aa98e2SPeter Wemm ** none. 1317c2aa98e2SPeter Wemm ** 1318c2aa98e2SPeter Wemm ** Side Effects: 1319c2aa98e2SPeter Wemm ** releases any resources used by the passive daemon. 1320c2aa98e2SPeter Wemm */ 1321c2aa98e2SPeter Wemm 1322c2aa98e2SPeter Wemm void 1323c2aa98e2SPeter Wemm clrdaemon() 1324c2aa98e2SPeter Wemm { 132506f25ae9SGregory Neil Shapiro int i; 132606f25ae9SGregory Neil Shapiro 132740266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 132806f25ae9SGregory Neil Shapiro { 132906f25ae9SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 133006f25ae9SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 133106f25ae9SGregory Neil Shapiro Daemons[i].d_socket = -1; 133206f25ae9SGregory Neil Shapiro } 1333c2aa98e2SPeter Wemm } 133440266059SGregory Neil Shapiro 133540266059SGregory Neil Shapiro /* 133640266059SGregory Neil Shapiro ** GETMODIFIERS -- get modifier flags 133740266059SGregory Neil Shapiro ** 133840266059SGregory Neil Shapiro ** Parameters: 133940266059SGregory Neil Shapiro ** v -- the modifiers (input text line). 134040266059SGregory Neil Shapiro ** modifiers -- pointer to flag field to represent modifiers. 134140266059SGregory Neil Shapiro ** 134240266059SGregory Neil Shapiro ** Returns: 134340266059SGregory Neil Shapiro ** (xallocat()ed) string representation of modifiers. 134440266059SGregory Neil Shapiro ** 134540266059SGregory Neil Shapiro ** Side Effects: 134640266059SGregory Neil Shapiro ** fills in modifiers. 134740266059SGregory Neil Shapiro */ 134840266059SGregory Neil Shapiro 134940266059SGregory Neil Shapiro char * 135040266059SGregory Neil Shapiro getmodifiers(v, modifiers) 135140266059SGregory Neil Shapiro char *v; 135240266059SGregory Neil Shapiro BITMAP256 modifiers; 135340266059SGregory Neil Shapiro { 135440266059SGregory Neil Shapiro int l; 135540266059SGregory Neil Shapiro char *h, *f, *flags; 135640266059SGregory Neil Shapiro 135740266059SGregory Neil Shapiro /* maximum length of flags: upper case Option -> "OO " */ 135840266059SGregory Neil Shapiro l = 3 * strlen(v) + 3; 135940266059SGregory Neil Shapiro 136040266059SGregory Neil Shapiro /* is someone joking? */ 136140266059SGregory Neil Shapiro if (l < 0 || l > 256) 136240266059SGregory Neil Shapiro { 136340266059SGregory Neil Shapiro if (LogLevel > 2) 136440266059SGregory Neil Shapiro sm_syslog(LOG_ERR, NOQID, 136540266059SGregory Neil Shapiro "getmodifiers too long, ignored"); 136640266059SGregory Neil Shapiro return NULL; 136740266059SGregory Neil Shapiro } 136840266059SGregory Neil Shapiro flags = xalloc(l); 136940266059SGregory Neil Shapiro f = flags; 137040266059SGregory Neil Shapiro clrbitmap(modifiers); 137140266059SGregory Neil Shapiro for (h = v; *h != '\0'; h++) 137240266059SGregory Neil Shapiro { 137340266059SGregory Neil Shapiro if (isascii(*h) && !isspace(*h) && isprint(*h)) 137440266059SGregory Neil Shapiro { 137540266059SGregory Neil Shapiro setbitn(*h, modifiers); 137640266059SGregory Neil Shapiro if (flags != f) 137740266059SGregory Neil Shapiro *flags++ = ' '; 137840266059SGregory Neil Shapiro *flags++ = *h; 137940266059SGregory Neil Shapiro if (isupper(*h)) 138040266059SGregory Neil Shapiro *flags++ = *h; 138140266059SGregory Neil Shapiro } 138240266059SGregory Neil Shapiro } 138340266059SGregory Neil Shapiro *flags++ = '\0'; 138440266059SGregory Neil Shapiro return f; 138540266059SGregory Neil Shapiro } 138640266059SGregory Neil Shapiro 138740266059SGregory Neil Shapiro /* 138840266059SGregory Neil Shapiro ** CHKDAEMONMODIFIERS -- check whether all daemons have set a flag. 138940266059SGregory Neil Shapiro ** 139040266059SGregory Neil Shapiro ** Parameters: 139140266059SGregory Neil Shapiro ** flag -- the flag to test. 139240266059SGregory Neil Shapiro ** 139340266059SGregory Neil Shapiro ** Returns: 139440266059SGregory Neil Shapiro ** true iff all daemons have set flag. 139540266059SGregory Neil Shapiro */ 139640266059SGregory Neil Shapiro 139740266059SGregory Neil Shapiro bool 139840266059SGregory Neil Shapiro chkdaemonmodifiers(flag) 139940266059SGregory Neil Shapiro int flag; 140040266059SGregory Neil Shapiro { 140140266059SGregory Neil Shapiro int i; 140240266059SGregory Neil Shapiro 140340266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 140440266059SGregory Neil Shapiro if (!bitnset((char) flag, Daemons[i].d_flags)) 140540266059SGregory Neil Shapiro return false; 140640266059SGregory Neil Shapiro return true; 140740266059SGregory Neil Shapiro } 140840266059SGregory Neil Shapiro 140940266059SGregory Neil Shapiro /* 141006f25ae9SGregory Neil Shapiro ** SETSOCKADDROPTIONS -- set options for SOCKADDR (daemon or client) 1411c2aa98e2SPeter Wemm ** 1412c2aa98e2SPeter Wemm ** Parameters: 1413c2aa98e2SPeter Wemm ** p -- the options line. 141406f25ae9SGregory Neil Shapiro ** d -- the daemon structure to fill in. 1415c2aa98e2SPeter Wemm ** 1416c2aa98e2SPeter Wemm ** Returns: 1417c2aa98e2SPeter Wemm ** none. 1418c2aa98e2SPeter Wemm */ 1419c2aa98e2SPeter Wemm 142006f25ae9SGregory Neil Shapiro static void 142106f25ae9SGregory Neil Shapiro setsockaddroptions(p, d) 1422b6bacd31SGregory Neil Shapiro char *p; 142340266059SGregory Neil Shapiro DAEMON_T *d; 1424c2aa98e2SPeter Wemm { 142506f25ae9SGregory Neil Shapiro #if NETISO 1426193538b7SGregory Neil Shapiro short portno; 142706f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1428193538b7SGregory Neil Shapiro char *port = NULL; 1429193538b7SGregory Neil Shapiro char *addr = NULL; 143006f25ae9SGregory Neil Shapiro 143106f25ae9SGregory Neil Shapiro #if NETINET 143206f25ae9SGregory Neil Shapiro if (d->d_addr.sa.sa_family == AF_UNSPEC) 143306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 143406f25ae9SGregory Neil Shapiro #endif /* NETINET */ 1435c2aa98e2SPeter Wemm 1436c2aa98e2SPeter Wemm while (p != NULL) 1437c2aa98e2SPeter Wemm { 1438c2aa98e2SPeter Wemm register char *f; 1439c2aa98e2SPeter Wemm register char *v; 1440c2aa98e2SPeter Wemm 1441c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 1442c2aa98e2SPeter Wemm p++; 1443c2aa98e2SPeter Wemm if (*p == '\0') 1444c2aa98e2SPeter Wemm break; 1445c2aa98e2SPeter Wemm f = p; 1446c2aa98e2SPeter Wemm p = strchr(p, ','); 1447c2aa98e2SPeter Wemm if (p != NULL) 1448c2aa98e2SPeter Wemm *p++ = '\0'; 1449c2aa98e2SPeter Wemm v = strchr(f, '='); 1450c2aa98e2SPeter Wemm if (v == NULL) 1451c2aa98e2SPeter Wemm continue; 1452c2aa98e2SPeter Wemm while (isascii(*++v) && isspace(*v)) 1453c2aa98e2SPeter Wemm continue; 1454c2aa98e2SPeter Wemm if (isascii(*f) && islower(*f)) 1455c2aa98e2SPeter Wemm *f = toupper(*f); 1456c2aa98e2SPeter Wemm 1457c2aa98e2SPeter Wemm switch (*f) 1458c2aa98e2SPeter Wemm { 1459c2aa98e2SPeter Wemm case 'F': /* address family */ 1460c2aa98e2SPeter Wemm if (isascii(*v) && isdigit(*v)) 146106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = atoi(v); 146240266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 146340266059SGregory Neil Shapiro # ifdef NETUNIX 146440266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "unix") == 0 || 146540266059SGregory Neil Shapiro sm_strcasecmp(v, "local") == 0) 146640266059SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_UNIX; 146740266059SGregory Neil Shapiro # endif /* NETUNIX */ 146840266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1469c2aa98e2SPeter Wemm #if NETINET 147040266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet") == 0) 147106f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET; 147206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 147306f25ae9SGregory Neil Shapiro #if NETINET6 147440266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "inet6") == 0) 147506f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_INET6; 147606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 1477c2aa98e2SPeter Wemm #if NETISO 147840266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "iso") == 0) 147906f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_ISO; 148006f25ae9SGregory Neil Shapiro #endif /* NETISO */ 1481c2aa98e2SPeter Wemm #if NETNS 148240266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "ns") == 0) 148306f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_NS; 148406f25ae9SGregory Neil Shapiro #endif /* NETNS */ 1485c2aa98e2SPeter Wemm #if NETX25 148640266059SGregory Neil Shapiro else if (sm_strcasecmp(v, "x.25") == 0) 148706f25ae9SGregory Neil Shapiro d->d_addr.sa.sa_family = AF_CCITT; 148806f25ae9SGregory Neil Shapiro #endif /* NETX25 */ 1489c2aa98e2SPeter Wemm else 149006f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Unknown address family %s in Family=option", 149106f25ae9SGregory Neil Shapiro v); 1492c2aa98e2SPeter Wemm break; 1493c2aa98e2SPeter Wemm 1494c2aa98e2SPeter Wemm case 'A': /* address */ 1495193538b7SGregory Neil Shapiro addr = v; 1496c2aa98e2SPeter Wemm break; 1497c2aa98e2SPeter Wemm 149840266059SGregory Neil Shapiro #if MILTER 149940266059SGregory Neil Shapiro case 'I': 150040266059SGregory Neil Shapiro d->d_inputfilterlist = v; 150140266059SGregory Neil Shapiro break; 150240266059SGregory Neil Shapiro #endif /* MILTER */ 150340266059SGregory Neil Shapiro 1504c2aa98e2SPeter Wemm case 'P': /* port */ 1505193538b7SGregory Neil Shapiro port = v; 1506c2aa98e2SPeter Wemm break; 1507c2aa98e2SPeter Wemm 1508c2aa98e2SPeter Wemm case 'L': /* listen queue size */ 150906f25ae9SGregory Neil Shapiro d->d_listenqueue = atoi(v); 151006f25ae9SGregory Neil Shapiro break; 151106f25ae9SGregory Neil Shapiro 151206f25ae9SGregory Neil Shapiro case 'M': /* modifiers (flags) */ 151340266059SGregory Neil Shapiro d->d_mflags = getmodifiers(v, d->d_flags); 1514c2aa98e2SPeter Wemm break; 1515c2aa98e2SPeter Wemm 1516c2aa98e2SPeter Wemm case 'S': /* send buffer size */ 151706f25ae9SGregory Neil Shapiro d->d_tcpsndbufsize = atoi(v); 1518c2aa98e2SPeter Wemm break; 1519c2aa98e2SPeter Wemm 1520c2aa98e2SPeter Wemm case 'R': /* receive buffer size */ 152106f25ae9SGregory Neil Shapiro d->d_tcprcvbufsize = atoi(v); 152206f25ae9SGregory Neil Shapiro break; 152306f25ae9SGregory Neil Shapiro 152406f25ae9SGregory Neil Shapiro case 'N': /* name */ 152506f25ae9SGregory Neil Shapiro d->d_name = v; 1526c2aa98e2SPeter Wemm break; 1527c2aa98e2SPeter Wemm 1528c2aa98e2SPeter Wemm default: 152906f25ae9SGregory Neil Shapiro syserr("554 5.3.5 PortOptions parameter \"%s\" unknown", 153006f25ae9SGregory Neil Shapiro f); 1531c2aa98e2SPeter Wemm } 1532c2aa98e2SPeter Wemm } 1533193538b7SGregory Neil Shapiro 1534193538b7SGregory Neil Shapiro /* Check addr and port after finding family */ 1535193538b7SGregory Neil Shapiro if (addr != NULL) 1536193538b7SGregory Neil Shapiro { 1537193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1538193538b7SGregory Neil Shapiro { 153940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 154040266059SGregory Neil Shapiro # if NETUNIX 154140266059SGregory Neil Shapiro case AF_UNIX: 154240266059SGregory Neil Shapiro if (strlen(addr) >= sizeof(d->d_addr.sunix.sun_path)) 154340266059SGregory Neil Shapiro { 154440266059SGregory Neil Shapiro errno = ENAMETOOLONG; 154540266059SGregory Neil Shapiro syserr("setsockaddroptions: domain socket name too long: %s > %d", 154640266059SGregory Neil Shapiro addr, sizeof(d->d_addr.sunix.sun_path)); 154740266059SGregory Neil Shapiro break; 154840266059SGregory Neil Shapiro } 154940266059SGregory Neil Shapiro 155040266059SGregory Neil Shapiro /* file safety check done in opendaemonsocket() */ 155140266059SGregory Neil Shapiro (void) memset(&d->d_addr.sunix.sun_path, '\0', 155240266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 155340266059SGregory Neil Shapiro (void) sm_strlcpy((char *)&d->d_addr.sunix.sun_path, 155440266059SGregory Neil Shapiro addr, 155540266059SGregory Neil Shapiro sizeof(d->d_addr.sunix.sun_path)); 155640266059SGregory Neil Shapiro break; 155740266059SGregory Neil Shapiro # endif /* NETUNIX */ 155840266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 1559193538b7SGregory Neil Shapiro #if NETINET 1560193538b7SGregory Neil Shapiro case AF_INET: 1561193538b7SGregory Neil Shapiro if (!isascii(*addr) || !isdigit(*addr) || 156240266059SGregory Neil Shapiro ((d->d_addr.sin.sin_addr.s_addr = inet_addr(addr)) 156340266059SGregory Neil Shapiro == INADDR_NONE)) 1564193538b7SGregory Neil Shapiro { 1565193538b7SGregory Neil Shapiro register struct hostent *hp; 1566193538b7SGregory Neil Shapiro 1567193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET); 1568193538b7SGregory Neil Shapiro if (hp == NULL) 1569193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1570193538b7SGregory Neil Shapiro addr); 1571193538b7SGregory Neil Shapiro else 1572193538b7SGregory Neil Shapiro { 1573193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1574193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET) 1575193538b7SGregory Neil Shapiro hp->h_addr_list++; 1576193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1577193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1578193538b7SGregory Neil Shapiro addr); 1579193538b7SGregory Neil Shapiro else 1580193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin.sin_addr, 1581193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1582193538b7SGregory Neil Shapiro INADDRSZ); 158340266059SGregory Neil Shapiro # if NETINET6 1584193538b7SGregory Neil Shapiro freehostent(hp); 1585193538b7SGregory Neil Shapiro hp = NULL; 158640266059SGregory Neil Shapiro # endif /* NETINET6 */ 1587193538b7SGregory Neil Shapiro } 1588193538b7SGregory Neil Shapiro } 1589193538b7SGregory Neil Shapiro break; 1590193538b7SGregory Neil Shapiro #endif /* NETINET */ 1591193538b7SGregory Neil Shapiro 1592193538b7SGregory Neil Shapiro #if NETINET6 1593193538b7SGregory Neil Shapiro case AF_INET6: 159440266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, 1595193538b7SGregory Neil Shapiro &d->d_addr.sin6.sin6_addr) != 1) 1596193538b7SGregory Neil Shapiro { 1597193538b7SGregory Neil Shapiro register struct hostent *hp; 1598193538b7SGregory Neil Shapiro 1599193538b7SGregory Neil Shapiro hp = sm_gethostbyname(addr, AF_INET6); 1600193538b7SGregory Neil Shapiro if (hp == NULL) 1601193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1602193538b7SGregory Neil Shapiro addr); 1603193538b7SGregory Neil Shapiro else 1604193538b7SGregory Neil Shapiro { 1605193538b7SGregory Neil Shapiro while (*(hp->h_addr_list) != NULL && 1606193538b7SGregory Neil Shapiro hp->h_addrtype != AF_INET6) 1607193538b7SGregory Neil Shapiro hp->h_addr_list++; 1608193538b7SGregory Neil Shapiro if (*(hp->h_addr_list) == NULL) 1609193538b7SGregory Neil Shapiro syserr("554 5.3.0 host \"%s\" unknown", 1610193538b7SGregory Neil Shapiro addr); 1611193538b7SGregory Neil Shapiro else 1612193538b7SGregory Neil Shapiro memmove(&d->d_addr.sin6.sin6_addr, 1613193538b7SGregory Neil Shapiro *(hp->h_addr_list), 1614193538b7SGregory Neil Shapiro IN6ADDRSZ); 1615193538b7SGregory Neil Shapiro freehostent(hp); 1616193538b7SGregory Neil Shapiro hp = NULL; 1617193538b7SGregory Neil Shapiro } 1618193538b7SGregory Neil Shapiro } 1619193538b7SGregory Neil Shapiro break; 1620193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1621193538b7SGregory Neil Shapiro 1622193538b7SGregory Neil Shapiro default: 1623193538b7SGregory Neil Shapiro syserr("554 5.3.5 address= option unsupported for family %d", 1624193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1625193538b7SGregory Neil Shapiro break; 1626193538b7SGregory Neil Shapiro } 1627193538b7SGregory Neil Shapiro } 1628193538b7SGregory Neil Shapiro 1629193538b7SGregory Neil Shapiro if (port != NULL) 1630193538b7SGregory Neil Shapiro { 1631193538b7SGregory Neil Shapiro switch (d->d_addr.sa.sa_family) 1632193538b7SGregory Neil Shapiro { 1633193538b7SGregory Neil Shapiro #if NETINET 1634193538b7SGregory Neil Shapiro case AF_INET: 1635193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 163640266059SGregory Neil Shapiro d->d_addr.sin.sin_port = htons((unsigned short) 163740266059SGregory Neil Shapiro atoi((const char *) port)); 1638193538b7SGregory Neil Shapiro else 1639193538b7SGregory Neil Shapiro { 1640193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1641193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1642193538b7SGregory Neil Shapiro port); 1643193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1644193538b7SGregory Neil Shapiro register struct servent *sp; 1645193538b7SGregory Neil Shapiro 1646193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1647193538b7SGregory Neil Shapiro if (sp == NULL) 1648193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1649193538b7SGregory Neil Shapiro port); 1650193538b7SGregory Neil Shapiro else 1651193538b7SGregory Neil Shapiro d->d_addr.sin.sin_port = sp->s_port; 1652193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1653193538b7SGregory Neil Shapiro } 1654193538b7SGregory Neil Shapiro break; 1655193538b7SGregory Neil Shapiro #endif /* NETINET */ 1656193538b7SGregory Neil Shapiro 1657193538b7SGregory Neil Shapiro #if NETINET6 1658193538b7SGregory Neil Shapiro case AF_INET6: 1659193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 166040266059SGregory Neil Shapiro d->d_addr.sin6.sin6_port = htons((unsigned short) 166140266059SGregory Neil Shapiro atoi(port)); 1662193538b7SGregory Neil Shapiro else 1663193538b7SGregory Neil Shapiro { 1664193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1665193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1666193538b7SGregory Neil Shapiro port); 1667193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1668193538b7SGregory Neil Shapiro register struct servent *sp; 1669193538b7SGregory Neil Shapiro 1670193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1671193538b7SGregory Neil Shapiro if (sp == NULL) 1672193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1673193538b7SGregory Neil Shapiro port); 1674193538b7SGregory Neil Shapiro else 1675193538b7SGregory Neil Shapiro d->d_addr.sin6.sin6_port = sp->s_port; 1676193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1677193538b7SGregory Neil Shapiro } 1678193538b7SGregory Neil Shapiro break; 1679193538b7SGregory Neil Shapiro #endif /* NETINET6 */ 1680193538b7SGregory Neil Shapiro 1681193538b7SGregory Neil Shapiro #if NETISO 1682193538b7SGregory Neil Shapiro case AF_ISO: 1683193538b7SGregory Neil Shapiro /* assume two byte transport selector */ 1684193538b7SGregory Neil Shapiro if (isascii(*port) && isdigit(*port)) 168540266059SGregory Neil Shapiro portno = htons((unsigned short) atoi(port)); 1686193538b7SGregory Neil Shapiro else 1687193538b7SGregory Neil Shapiro { 1688193538b7SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 1689193538b7SGregory Neil Shapiro syserr("554 5.3.5 invalid port number: %s", 1690193538b7SGregory Neil Shapiro port); 1691193538b7SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 1692193538b7SGregory Neil Shapiro register struct servent *sp; 1693193538b7SGregory Neil Shapiro 1694193538b7SGregory Neil Shapiro sp = getservbyname(port, "tcp"); 1695193538b7SGregory Neil Shapiro if (sp == NULL) 1696193538b7SGregory Neil Shapiro syserr("554 5.3.5 service \"%s\" unknown", 1697193538b7SGregory Neil Shapiro port); 1698193538b7SGregory Neil Shapiro else 1699193538b7SGregory Neil Shapiro portno = sp->s_port; 1700193538b7SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 1701193538b7SGregory Neil Shapiro } 1702193538b7SGregory Neil Shapiro memmove(TSEL(&d->d_addr.siso), 1703193538b7SGregory Neil Shapiro (char *) &portno, 2); 1704193538b7SGregory Neil Shapiro break; 1705193538b7SGregory Neil Shapiro #endif /* NETISO */ 1706193538b7SGregory Neil Shapiro 1707193538b7SGregory Neil Shapiro default: 1708193538b7SGregory Neil Shapiro syserr("554 5.3.5 Port= option unsupported for family %d", 1709193538b7SGregory Neil Shapiro d->d_addr.sa.sa_family); 1710193538b7SGregory Neil Shapiro break; 1711193538b7SGregory Neil Shapiro } 1712193538b7SGregory Neil Shapiro } 1713c2aa98e2SPeter Wemm } 171440266059SGregory Neil Shapiro /* 171506f25ae9SGregory Neil Shapiro ** SETDAEMONOPTIONS -- set options for running the MTA daemon 171606f25ae9SGregory Neil Shapiro ** 171706f25ae9SGregory Neil Shapiro ** Parameters: 171806f25ae9SGregory Neil Shapiro ** p -- the options line. 171906f25ae9SGregory Neil Shapiro ** 172006f25ae9SGregory Neil Shapiro ** Returns: 172140266059SGregory Neil Shapiro ** true if successful, false otherwise. 172240266059SGregory Neil Shapiro ** 172340266059SGregory Neil Shapiro ** Side Effects: 172440266059SGregory Neil Shapiro ** increments number of daemons. 172506f25ae9SGregory Neil Shapiro */ 172606f25ae9SGregory Neil Shapiro 172740266059SGregory Neil Shapiro #define DEF_LISTENQUEUE 10 172840266059SGregory Neil Shapiro 1729739ac4d4SGregory Neil Shapiro struct dflags 1730739ac4d4SGregory Neil Shapiro { 1731739ac4d4SGregory Neil Shapiro char *d_name; 1732739ac4d4SGregory Neil Shapiro int d_flag; 1733739ac4d4SGregory Neil Shapiro }; 1734739ac4d4SGregory Neil Shapiro 1735739ac4d4SGregory Neil Shapiro static struct dflags DaemonFlags[] = 1736739ac4d4SGregory Neil Shapiro { 1737739ac4d4SGregory Neil Shapiro { "AUTHREQ", D_AUTHREQ }, 1738739ac4d4SGregory Neil Shapiro { "BINDIF", D_BINDIF }, 1739739ac4d4SGregory Neil Shapiro { "CANONREQ", D_CANONREQ }, 1740739ac4d4SGregory Neil Shapiro { "IFNHELO", D_IFNHELO }, 1741739ac4d4SGregory Neil Shapiro { "FQMAIL", D_FQMAIL }, 1742739ac4d4SGregory Neil Shapiro { "FQRCPT", D_FQRCPT }, 1743739ac4d4SGregory Neil Shapiro { "SMTPS", D_SMTPS }, 1744739ac4d4SGregory Neil Shapiro { "UNQUALOK", D_UNQUALOK }, 1745739ac4d4SGregory Neil Shapiro { "NOAUTH", D_NOAUTH }, 1746739ac4d4SGregory Neil Shapiro { "NOCANON", D_NOCANON }, 1747739ac4d4SGregory Neil Shapiro { "NOETRN", D_NOETRN }, 1748739ac4d4SGregory Neil Shapiro { "NOTLS", D_NOTLS }, 1749739ac4d4SGregory Neil Shapiro { "ETRNONLY", D_ETRNONLY }, 1750739ac4d4SGregory Neil Shapiro { "OPTIONAL", D_OPTIONAL }, 1751739ac4d4SGregory Neil Shapiro { "DISABLE", D_DISABLE }, 1752739ac4d4SGregory Neil Shapiro { "ISSET", D_ISSET }, 1753739ac4d4SGregory Neil Shapiro { NULL, 0 } 1754739ac4d4SGregory Neil Shapiro }; 1755739ac4d4SGregory Neil Shapiro 1756739ac4d4SGregory Neil Shapiro static void 1757739ac4d4SGregory Neil Shapiro printdaemonflags(d) 1758739ac4d4SGregory Neil Shapiro DAEMON_T *d; 1759739ac4d4SGregory Neil Shapiro { 1760739ac4d4SGregory Neil Shapiro register struct dflags *df; 1761739ac4d4SGregory Neil Shapiro bool first = true; 1762739ac4d4SGregory Neil Shapiro 1763739ac4d4SGregory Neil Shapiro for (df = DaemonFlags; df->d_name != NULL; df++) 1764739ac4d4SGregory Neil Shapiro { 1765739ac4d4SGregory Neil Shapiro if (!bitnset(df->d_flag, d->d_flags)) 1766739ac4d4SGregory Neil Shapiro continue; 1767739ac4d4SGregory Neil Shapiro if (first) 1768e92d3f3fSGregory Neil Shapiro sm_dprintf("<%s", df->d_name); 1769739ac4d4SGregory Neil Shapiro else 1770e92d3f3fSGregory Neil Shapiro sm_dprintf(",%s", df->d_name); 1771739ac4d4SGregory Neil Shapiro first = false; 1772739ac4d4SGregory Neil Shapiro } 1773739ac4d4SGregory Neil Shapiro if (!first) 1774e92d3f3fSGregory Neil Shapiro sm_dprintf(">"); 1775739ac4d4SGregory Neil Shapiro } 1776739ac4d4SGregory Neil Shapiro 177706f25ae9SGregory Neil Shapiro bool 177806f25ae9SGregory Neil Shapiro setdaemonoptions(p) 177906f25ae9SGregory Neil Shapiro register char *p; 178006f25ae9SGregory Neil Shapiro { 178140266059SGregory Neil Shapiro if (NDaemons >= MAXDAEMONS) 178240266059SGregory Neil Shapiro return false; 178340266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 178440266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 178540266059SGregory Neil Shapiro clrbitmap(Daemons[NDaemons].d_flags); 178640266059SGregory Neil Shapiro setsockaddroptions(p, &Daemons[NDaemons]); 178706f25ae9SGregory Neil Shapiro 178840266059SGregory Neil Shapiro #if MILTER 178940266059SGregory Neil Shapiro if (Daemons[NDaemons].d_inputfilterlist != NULL) 179040266059SGregory Neil Shapiro Daemons[NDaemons].d_inputfilterlist = newstr(Daemons[NDaemons].d_inputfilterlist); 179140266059SGregory Neil Shapiro #endif /* MILTER */ 179240266059SGregory Neil Shapiro 179340266059SGregory Neil Shapiro if (Daemons[NDaemons].d_name != NULL) 179440266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(Daemons[NDaemons].d_name); 179506f25ae9SGregory Neil Shapiro else 179606f25ae9SGregory Neil Shapiro { 179706f25ae9SGregory Neil Shapiro char num[30]; 179806f25ae9SGregory Neil Shapiro 179940266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Daemon%d", NDaemons); 180040266059SGregory Neil Shapiro Daemons[NDaemons].d_name = newstr(num); 180106f25ae9SGregory Neil Shapiro } 180206f25ae9SGregory Neil Shapiro 180306f25ae9SGregory Neil Shapiro if (tTd(37, 1)) 180406f25ae9SGregory Neil Shapiro { 180540266059SGregory Neil Shapiro sm_dprintf("Daemon %s flags: ", Daemons[NDaemons].d_name); 1806739ac4d4SGregory Neil Shapiro printdaemonflags(&Daemons[NDaemons]); 180740266059SGregory Neil Shapiro sm_dprintf("\n"); 180806f25ae9SGregory Neil Shapiro } 180940266059SGregory Neil Shapiro ++NDaemons; 181040266059SGregory Neil Shapiro return true; 181106f25ae9SGregory Neil Shapiro } 181240266059SGregory Neil Shapiro /* 181306f25ae9SGregory Neil Shapiro ** INITDAEMON -- initialize daemon if not yet done. 181406f25ae9SGregory Neil Shapiro ** 181506f25ae9SGregory Neil Shapiro ** Parameters: 181606f25ae9SGregory Neil Shapiro ** none 181706f25ae9SGregory Neil Shapiro ** 181806f25ae9SGregory Neil Shapiro ** Returns: 181906f25ae9SGregory Neil Shapiro ** none 182006f25ae9SGregory Neil Shapiro ** 182106f25ae9SGregory Neil Shapiro ** Side Effects: 182206f25ae9SGregory Neil Shapiro ** initializes structure for one daemon. 182306f25ae9SGregory Neil Shapiro */ 182440266059SGregory Neil Shapiro 182506f25ae9SGregory Neil Shapiro void 182606f25ae9SGregory Neil Shapiro initdaemon() 182706f25ae9SGregory Neil Shapiro { 182840266059SGregory Neil Shapiro if (NDaemons == 0) 182906f25ae9SGregory Neil Shapiro { 183040266059SGregory Neil Shapiro Daemons[NDaemons].d_socket = -1; 183140266059SGregory Neil Shapiro Daemons[NDaemons].d_listenqueue = DEF_LISTENQUEUE; 183240266059SGregory Neil Shapiro Daemons[NDaemons].d_name = "Daemon0"; 183340266059SGregory Neil Shapiro NDaemons = 1; 183406f25ae9SGregory Neil Shapiro } 183506f25ae9SGregory Neil Shapiro } 183640266059SGregory Neil Shapiro /* 183706f25ae9SGregory Neil Shapiro ** SETCLIENTOPTIONS -- set options for running the client 183806f25ae9SGregory Neil Shapiro ** 183906f25ae9SGregory Neil Shapiro ** Parameters: 184006f25ae9SGregory Neil Shapiro ** p -- the options line. 184106f25ae9SGregory Neil Shapiro ** 184206f25ae9SGregory Neil Shapiro ** Returns: 184306f25ae9SGregory Neil Shapiro ** none. 184406f25ae9SGregory Neil Shapiro */ 184506f25ae9SGregory Neil Shapiro 184640266059SGregory Neil Shapiro static DAEMON_T ClientSettings[AF_MAX + 1]; 184706f25ae9SGregory Neil Shapiro 184806f25ae9SGregory Neil Shapiro void 184906f25ae9SGregory Neil Shapiro setclientoptions(p) 185006f25ae9SGregory Neil Shapiro register char *p; 185106f25ae9SGregory Neil Shapiro { 185240266059SGregory Neil Shapiro int family; 185340266059SGregory Neil Shapiro DAEMON_T d; 185406f25ae9SGregory Neil Shapiro 185506f25ae9SGregory Neil Shapiro memset(&d, '\0', sizeof d); 185606f25ae9SGregory Neil Shapiro setsockaddroptions(p, &d); 185706f25ae9SGregory Neil Shapiro 185806f25ae9SGregory Neil Shapiro /* grab what we need */ 185940266059SGregory Neil Shapiro family = d.d_addr.sa.sa_family; 186040266059SGregory Neil Shapiro STRUCTCOPY(d, ClientSettings[family]); 186140266059SGregory Neil Shapiro setbitn(D_ISSET, ClientSettings[family].d_flags); /* mark as set */ 186240266059SGregory Neil Shapiro if (d.d_name != NULL) 186340266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(d.d_name); 186406f25ae9SGregory Neil Shapiro else 186540266059SGregory Neil Shapiro { 186640266059SGregory Neil Shapiro char num[30]; 186740266059SGregory Neil Shapiro 186840266059SGregory Neil Shapiro (void) sm_snprintf(num, sizeof num, "Client%d", family); 186940266059SGregory Neil Shapiro ClientSettings[family].d_name = newstr(num); 187006f25ae9SGregory Neil Shapiro } 187140266059SGregory Neil Shapiro } 187240266059SGregory Neil Shapiro /* 187306f25ae9SGregory Neil Shapiro ** ADDR_FAMILY -- determine address family from address 187406f25ae9SGregory Neil Shapiro ** 187506f25ae9SGregory Neil Shapiro ** Parameters: 187606f25ae9SGregory Neil Shapiro ** addr -- the string representation of the address 187706f25ae9SGregory Neil Shapiro ** 187806f25ae9SGregory Neil Shapiro ** Returns: 187906f25ae9SGregory Neil Shapiro ** AF_INET, AF_INET6 or AF_UNSPEC 188006f25ae9SGregory Neil Shapiro ** 188106f25ae9SGregory Neil Shapiro ** Side Effects: 188206f25ae9SGregory Neil Shapiro ** none. 188306f25ae9SGregory Neil Shapiro */ 188406f25ae9SGregory Neil Shapiro 188506f25ae9SGregory Neil Shapiro static int 188606f25ae9SGregory Neil Shapiro addr_family(addr) 188706f25ae9SGregory Neil Shapiro char *addr; 188806f25ae9SGregory Neil Shapiro { 188906f25ae9SGregory Neil Shapiro #if NETINET6 189006f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 189106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 189206f25ae9SGregory Neil Shapiro 189306f25ae9SGregory Neil Shapiro #if NETINET 189406f25ae9SGregory Neil Shapiro if (inet_addr(addr) != INADDR_NONE) 189506f25ae9SGregory Neil Shapiro { 189606f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 189740266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET\n", addr); 189806f25ae9SGregory Neil Shapiro return AF_INET; 189906f25ae9SGregory Neil Shapiro } 190006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 190106f25ae9SGregory Neil Shapiro #if NETINET6 190240266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, addr, &clt_addr.sin6.sin6_addr) == 1) 190306f25ae9SGregory Neil Shapiro { 190406f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 190540266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): INET6\n", addr); 190606f25ae9SGregory Neil Shapiro return AF_INET6; 190706f25ae9SGregory Neil Shapiro } 190806f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 190940266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 191040266059SGregory Neil Shapiro # if NETUNIX 191140266059SGregory Neil Shapiro if (*addr == '/') 191240266059SGregory Neil Shapiro { 191306f25ae9SGregory Neil Shapiro if (tTd(16, 9)) 191440266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): LOCAL\n", addr); 191540266059SGregory Neil Shapiro return AF_UNIX; 191640266059SGregory Neil Shapiro } 191740266059SGregory Neil Shapiro # endif /* NETUNIX */ 191840266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 191940266059SGregory Neil Shapiro if (tTd(16, 9)) 192040266059SGregory Neil Shapiro sm_dprintf("addr_family(%s): UNSPEC\n", addr); 192106f25ae9SGregory Neil Shapiro return AF_UNSPEC; 192206f25ae9SGregory Neil Shapiro } 192340266059SGregory Neil Shapiro 192440266059SGregory Neil Shapiro /* 192540266059SGregory Neil Shapiro ** CHKCLIENTMODIFIERS -- check whether all clients have set a flag. 192640266059SGregory Neil Shapiro ** 192740266059SGregory Neil Shapiro ** Parameters: 192840266059SGregory Neil Shapiro ** flag -- the flag to test. 192940266059SGregory Neil Shapiro ** 193040266059SGregory Neil Shapiro ** Returns: 193140266059SGregory Neil Shapiro ** true iff all configured clients have set the flag. 193240266059SGregory Neil Shapiro */ 193340266059SGregory Neil Shapiro 193440266059SGregory Neil Shapiro bool 193540266059SGregory Neil Shapiro chkclientmodifiers(flag) 193640266059SGregory Neil Shapiro int flag; 193740266059SGregory Neil Shapiro { 193840266059SGregory Neil Shapiro int i; 193940266059SGregory Neil Shapiro bool flagisset; 194040266059SGregory Neil Shapiro 194140266059SGregory Neil Shapiro flagisset = false; 194240266059SGregory Neil Shapiro for (i = 0; i < AF_MAX; i++) 194340266059SGregory Neil Shapiro { 194440266059SGregory Neil Shapiro if (bitnset(D_ISSET, ClientSettings[i].d_flags)) 194540266059SGregory Neil Shapiro { 194640266059SGregory Neil Shapiro if (!bitnset((char) flag, ClientSettings[i].d_flags)) 194740266059SGregory Neil Shapiro return false; 194840266059SGregory Neil Shapiro flagisset = true; 194940266059SGregory Neil Shapiro } 195040266059SGregory Neil Shapiro } 195140266059SGregory Neil Shapiro return flagisset; 195240266059SGregory Neil Shapiro } 195340266059SGregory Neil Shapiro 195440266059SGregory Neil Shapiro #if MILTER 195540266059SGregory Neil Shapiro /* 195640266059SGregory Neil Shapiro ** SETUP_DAEMON_FILTERS -- Parse per-socket filters 195740266059SGregory Neil Shapiro ** 195840266059SGregory Neil Shapiro ** Parameters: 195940266059SGregory Neil Shapiro ** none 196040266059SGregory Neil Shapiro ** 196140266059SGregory Neil Shapiro ** Returns: 196240266059SGregory Neil Shapiro ** none 196340266059SGregory Neil Shapiro */ 196440266059SGregory Neil Shapiro 196540266059SGregory Neil Shapiro void 196640266059SGregory Neil Shapiro setup_daemon_milters() 196740266059SGregory Neil Shapiro { 196840266059SGregory Neil Shapiro int idx; 196940266059SGregory Neil Shapiro 197040266059SGregory Neil Shapiro if (OpMode == MD_SMTP) 197140266059SGregory Neil Shapiro { 197240266059SGregory Neil Shapiro /* no need to configure the daemons */ 197340266059SGregory Neil Shapiro return; 197440266059SGregory Neil Shapiro } 197540266059SGregory Neil Shapiro 197640266059SGregory Neil Shapiro for (idx = 0; idx < NDaemons; idx++) 197740266059SGregory Neil Shapiro { 197840266059SGregory Neil Shapiro if (Daemons[idx].d_inputfilterlist != NULL) 197940266059SGregory Neil Shapiro { 198040266059SGregory Neil Shapiro milter_config(Daemons[idx].d_inputfilterlist, 198140266059SGregory Neil Shapiro Daemons[idx].d_inputfilters, 198240266059SGregory Neil Shapiro MAXFILTERS); 198340266059SGregory Neil Shapiro } 198440266059SGregory Neil Shapiro } 198540266059SGregory Neil Shapiro } 198640266059SGregory Neil Shapiro #endif /* MILTER */ 198740266059SGregory Neil Shapiro /* 198806f25ae9SGregory Neil Shapiro ** MAKECONNECTION -- make a connection to an SMTP socket on a machine. 1989c2aa98e2SPeter Wemm ** 1990c2aa98e2SPeter Wemm ** Parameters: 1991c2aa98e2SPeter Wemm ** host -- the name of the host. 1992c2aa98e2SPeter Wemm ** port -- the port number to connect to. 1993c2aa98e2SPeter Wemm ** mci -- a pointer to the mail connection information 1994c2aa98e2SPeter Wemm ** structure to be filled in. 1995c2aa98e2SPeter Wemm ** e -- the current envelope. 199640266059SGregory Neil Shapiro ** enough -- time at which to stop further connection attempts. 199740266059SGregory Neil Shapiro ** (0 means no limit) 1998c2aa98e2SPeter Wemm ** 1999c2aa98e2SPeter Wemm ** Returns: 2000c2aa98e2SPeter Wemm ** An exit code telling whether the connection could be 2001c2aa98e2SPeter Wemm ** made and if not why not. 2002c2aa98e2SPeter Wemm ** 2003c2aa98e2SPeter Wemm ** Side Effects: 2004c2aa98e2SPeter Wemm ** none. 2005c2aa98e2SPeter Wemm */ 2006c2aa98e2SPeter Wemm 2007c2aa98e2SPeter Wemm static jmp_buf CtxConnectTimeout; 2008c2aa98e2SPeter Wemm 2009c2aa98e2SPeter Wemm SOCKADDR CurHostAddr; /* address of current host */ 2010c2aa98e2SPeter Wemm 2011c2aa98e2SPeter Wemm int 201240266059SGregory Neil Shapiro makeconnection(host, port, mci, e, enough) 2013c2aa98e2SPeter Wemm char *host; 201440266059SGregory Neil Shapiro volatile unsigned int port; 2015c2aa98e2SPeter Wemm register MCI *mci; 2016c2aa98e2SPeter Wemm ENVELOPE *e; 201740266059SGregory Neil Shapiro time_t enough; 2018c2aa98e2SPeter Wemm { 2019c2aa98e2SPeter Wemm register volatile int addrno = 0; 202040266059SGregory Neil Shapiro volatile int s; 2021c2aa98e2SPeter Wemm register struct hostent *volatile hp = (struct hostent *) NULL; 2022c2aa98e2SPeter Wemm SOCKADDR addr; 202306f25ae9SGregory Neil Shapiro SOCKADDR clt_addr; 202406f25ae9SGregory Neil Shapiro int save_errno = 0; 202506f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T addrlen; 2026c2aa98e2SPeter Wemm volatile bool firstconnect; 202740266059SGregory Neil Shapiro SM_EVENT *volatile ev = NULL; 202806f25ae9SGregory Neil Shapiro #if NETINET6 202940266059SGregory Neil Shapiro volatile bool v6found = false; 203006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 203106f25ae9SGregory Neil Shapiro volatile int family = InetMode; 203206f25ae9SGregory Neil Shapiro SOCKADDR_LEN_T len; 203306f25ae9SGregory Neil Shapiro volatile SOCKADDR_LEN_T socksize = 0; 203406f25ae9SGregory Neil Shapiro volatile bool clt_bind; 203506f25ae9SGregory Neil Shapiro BITMAP256 d_flags; 203606f25ae9SGregory Neil Shapiro char *p; 203706f25ae9SGregory Neil Shapiro extern ENVELOPE BlankEnvelope; 203806f25ae9SGregory Neil Shapiro 203940266059SGregory Neil Shapiro /* retranslate {daemon_flags} into bitmap */ 204006f25ae9SGregory Neil Shapiro clrbitmap(d_flags); 204140266059SGregory Neil Shapiro if ((p = macvalue(macid("{daemon_flags}"), e)) != NULL) 204206f25ae9SGregory Neil Shapiro { 204306f25ae9SGregory Neil Shapiro for (; *p != '\0'; p++) 204406f25ae9SGregory Neil Shapiro { 204506f25ae9SGregory Neil Shapiro if (!(isascii(*p) && isspace(*p))) 2046193538b7SGregory Neil Shapiro setbitn(bitidx(*p), d_flags); 204706f25ae9SGregory Neil Shapiro } 204806f25ae9SGregory Neil Shapiro } 204906f25ae9SGregory Neil Shapiro 205006f25ae9SGregory Neil Shapiro #if NETINET6 205106f25ae9SGregory Neil Shapiro v4retry: 205206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 205340266059SGregory Neil Shapiro clt_bind = false; 205406f25ae9SGregory Neil Shapiro 205506f25ae9SGregory Neil Shapiro /* Set up the address for outgoing connection. */ 205606f25ae9SGregory Neil Shapiro if (bitnset(D_BINDIF, d_flags) && 205740266059SGregory Neil Shapiro (p = macvalue(macid("{if_addr}"), e)) != NULL && 2058602a2b1bSGregory Neil Shapiro *p != '\0') 205906f25ae9SGregory Neil Shapiro { 206006f25ae9SGregory Neil Shapiro #if NETINET6 206106f25ae9SGregory Neil Shapiro char p6[INET6_ADDRSTRLEN]; 206206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 206306f25ae9SGregory Neil Shapiro 206406f25ae9SGregory Neil Shapiro memset(&clt_addr, '\0', sizeof clt_addr); 206506f25ae9SGregory Neil Shapiro 206606f25ae9SGregory Neil Shapiro /* infer the address family from the address itself */ 206706f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family = addr_family(p); 206806f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 206906f25ae9SGregory Neil Shapiro { 207006f25ae9SGregory Neil Shapiro #if NETINET 207106f25ae9SGregory Neil Shapiro case AF_INET: 2072602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = inet_addr(p); 2073602a2b1bSGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr != INADDR_NONE && 2074602a2b1bSGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr != INADDR_LOOPBACK) 207506f25ae9SGregory Neil Shapiro { 207640266059SGregory Neil Shapiro clt_bind = true; 207706f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 207806f25ae9SGregory Neil Shapiro } 207906f25ae9SGregory Neil Shapiro break; 208006f25ae9SGregory Neil Shapiro #endif /* NETINET */ 208106f25ae9SGregory Neil Shapiro 208206f25ae9SGregory Neil Shapiro #if NETINET6 208306f25ae9SGregory Neil Shapiro case AF_INET6: 208406f25ae9SGregory Neil Shapiro if (inet_addr(p) != INADDR_NONE) 208540266059SGregory Neil Shapiro (void) sm_snprintf(p6, sizeof p6, 208640266059SGregory Neil Shapiro "IPv6:::ffff:%s", p); 208706f25ae9SGregory Neil Shapiro else 208840266059SGregory Neil Shapiro (void) sm_strlcpy(p6, p, sizeof p6); 208940266059SGregory Neil Shapiro if (anynet_pton(AF_INET6, p6, 2090602a2b1bSGregory Neil Shapiro &clt_addr.sin6.sin6_addr) == 1 && 2091602a2b1bSGregory Neil Shapiro !IN6_IS_ADDR_LOOPBACK(&clt_addr.sin6.sin6_addr)) 209206f25ae9SGregory Neil Shapiro { 209340266059SGregory Neil Shapiro clt_bind = true; 209406f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 209506f25ae9SGregory Neil Shapiro } 209606f25ae9SGregory Neil Shapiro break; 209706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 209806f25ae9SGregory Neil Shapiro 209906f25ae9SGregory Neil Shapiro #if 0 210006f25ae9SGregory Neil Shapiro default: 210106f25ae9SGregory Neil Shapiro syserr("554 5.3.5 Address= option unsupported for family %d", 210206f25ae9SGregory Neil Shapiro clt_addr.sa.sa_family); 210306f25ae9SGregory Neil Shapiro break; 210406f25ae9SGregory Neil Shapiro #endif /* 0 */ 210506f25ae9SGregory Neil Shapiro } 210606f25ae9SGregory Neil Shapiro if (clt_bind) 210706f25ae9SGregory Neil Shapiro family = clt_addr.sa.sa_family; 210806f25ae9SGregory Neil Shapiro } 210940266059SGregory Neil Shapiro 211040266059SGregory Neil Shapiro /* D_BINDIF not set or not available, fallback to ClientPortOptions */ 211140266059SGregory Neil Shapiro if (!clt_bind) 211206f25ae9SGregory Neil Shapiro { 211340266059SGregory Neil Shapiro STRUCTCOPY(ClientSettings[family].d_addr, clt_addr); 211406f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 211506f25ae9SGregory Neil Shapiro { 211606f25ae9SGregory Neil Shapiro #if NETINET 211706f25ae9SGregory Neil Shapiro case AF_INET: 211806f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_addr.s_addr == 0) 211906f25ae9SGregory Neil Shapiro clt_addr.sin.sin_addr.s_addr = INADDR_ANY; 212006f25ae9SGregory Neil Shapiro else 212140266059SGregory Neil Shapiro clt_bind = true; 212206f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 212340266059SGregory Neil Shapiro clt_bind = true; 212406f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in); 212506f25ae9SGregory Neil Shapiro break; 212606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 212706f25ae9SGregory Neil Shapiro #if NETINET6 212806f25ae9SGregory Neil Shapiro case AF_INET6: 212906f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_UNSPECIFIED(&clt_addr.sin6.sin6_addr)) 213006f25ae9SGregory Neil Shapiro clt_addr.sin6.sin6_addr = in6addr_any; 213106f25ae9SGregory Neil Shapiro else 213240266059SGregory Neil Shapiro clt_bind = true; 213306f25ae9SGregory Neil Shapiro socksize = sizeof (struct sockaddr_in6); 213406f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 213540266059SGregory Neil Shapiro clt_bind = true; 213606f25ae9SGregory Neil Shapiro break; 213706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 213806f25ae9SGregory Neil Shapiro #if NETISO 213906f25ae9SGregory Neil Shapiro case AF_ISO: 214006f25ae9SGregory Neil Shapiro socksize = sizeof clt_addr.siso; 214140266059SGregory Neil Shapiro clt_bind = true; 214206f25ae9SGregory Neil Shapiro break; 214306f25ae9SGregory Neil Shapiro #endif /* NETISO */ 214406f25ae9SGregory Neil Shapiro default: 214506f25ae9SGregory Neil Shapiro break; 214606f25ae9SGregory Neil Shapiro } 214706f25ae9SGregory Neil Shapiro } 2148c2aa98e2SPeter Wemm 2149c2aa98e2SPeter Wemm /* 2150c2aa98e2SPeter Wemm ** Set up the address for the mailer. 2151c2aa98e2SPeter Wemm ** Accept "[a.b.c.d]" syntax for host name. 2152c2aa98e2SPeter Wemm */ 2153c2aa98e2SPeter Wemm 2154602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(0); 2155c2aa98e2SPeter Wemm errno = 0; 215606f25ae9SGregory Neil Shapiro memset(&CurHostAddr, '\0', sizeof CurHostAddr); 215706f25ae9SGregory Neil Shapiro memset(&addr, '\0', sizeof addr); 2158c2aa98e2SPeter Wemm SmtpPhase = mci->mci_phase = "initial connection"; 2159c2aa98e2SPeter Wemm CurHostName = host; 2160c2aa98e2SPeter Wemm 2161c2aa98e2SPeter Wemm if (host[0] == '[') 2162c2aa98e2SPeter Wemm { 216306f25ae9SGregory Neil Shapiro p = strchr(host, ']'); 2164c2aa98e2SPeter Wemm if (p != NULL) 2165c2aa98e2SPeter Wemm { 2166c2aa98e2SPeter Wemm #if NETINET 216706f25ae9SGregory Neil Shapiro unsigned long hid = INADDR_NONE; 216806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 216906f25ae9SGregory Neil Shapiro #if NETINET6 217006f25ae9SGregory Neil Shapiro struct sockaddr_in6 hid6; 217106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 217206f25ae9SGregory Neil Shapiro 217306f25ae9SGregory Neil Shapiro *p = '\0'; 217406f25ae9SGregory Neil Shapiro #if NETINET6 217506f25ae9SGregory Neil Shapiro memset(&hid6, '\0', sizeof hid6); 217606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 217706f25ae9SGregory Neil Shapiro #if NETINET 217806f25ae9SGregory Neil Shapiro if (family == AF_INET && 217906f25ae9SGregory Neil Shapiro (hid = inet_addr(&host[1])) != INADDR_NONE) 218006f25ae9SGregory Neil Shapiro { 218106f25ae9SGregory Neil Shapiro addr.sin.sin_family = AF_INET; 218206f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = hid; 218306f25ae9SGregory Neil Shapiro } 218406f25ae9SGregory Neil Shapiro else 218506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 218606f25ae9SGregory Neil Shapiro #if NETINET6 218706f25ae9SGregory Neil Shapiro if (family == AF_INET6 && 218840266059SGregory Neil Shapiro anynet_pton(AF_INET6, &host[1], 218906f25ae9SGregory Neil Shapiro &hid6.sin6_addr) == 1) 219006f25ae9SGregory Neil Shapiro { 219106f25ae9SGregory Neil Shapiro addr.sin6.sin6_family = AF_INET6; 219206f25ae9SGregory Neil Shapiro addr.sin6.sin6_addr = hid6.sin6_addr; 219306f25ae9SGregory Neil Shapiro } 219406f25ae9SGregory Neil Shapiro else 219506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2196c2aa98e2SPeter Wemm { 2197c2aa98e2SPeter Wemm /* try it as a host name (avoid MX lookup) */ 219806f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], family); 2199c2aa98e2SPeter Wemm if (hp == NULL && p[-1] == '.') 2200c2aa98e2SPeter Wemm { 2201c2aa98e2SPeter Wemm #if NAMED_BIND 2202c2aa98e2SPeter Wemm int oldopts = _res.options; 2203c2aa98e2SPeter Wemm 2204c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 220506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2206c2aa98e2SPeter Wemm p[-1] = '\0'; 220706f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(&host[1], 220806f25ae9SGregory Neil Shapiro family); 2209c2aa98e2SPeter Wemm p[-1] = '.'; 2210c2aa98e2SPeter Wemm #if NAMED_BIND 2211c2aa98e2SPeter Wemm _res.options = oldopts; 221206f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2213c2aa98e2SPeter Wemm } 2214c2aa98e2SPeter Wemm *p = ']'; 2215c2aa98e2SPeter Wemm goto gothostent; 2216c2aa98e2SPeter Wemm } 2217c2aa98e2SPeter Wemm *p = ']'; 2218c2aa98e2SPeter Wemm } 2219c2aa98e2SPeter Wemm if (p == NULL) 2220c2aa98e2SPeter Wemm { 2221c2aa98e2SPeter Wemm extern char MsgBuf[]; 2222c2aa98e2SPeter Wemm 222306f25ae9SGregory Neil Shapiro usrerrenh("5.1.2", 222406f25ae9SGregory Neil Shapiro "553 Invalid numeric domain spec \"%s\"", 222506f25ae9SGregory Neil Shapiro host); 2226c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", MsgBuf); 222706f25ae9SGregory Neil Shapiro errno = EINVAL; 2228c2aa98e2SPeter Wemm return EX_NOHOST; 2229c2aa98e2SPeter Wemm } 2230c2aa98e2SPeter Wemm } 2231c2aa98e2SPeter Wemm else 2232c2aa98e2SPeter Wemm { 2233c2aa98e2SPeter Wemm /* contortion to get around SGI cc complaints */ 2234c2aa98e2SPeter Wemm { 223506f25ae9SGregory Neil Shapiro p = &host[strlen(host) - 1]; 223606f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2237c2aa98e2SPeter Wemm if (hp == NULL && *p == '.') 2238c2aa98e2SPeter Wemm { 2239c2aa98e2SPeter Wemm #if NAMED_BIND 2240c2aa98e2SPeter Wemm int oldopts = _res.options; 2241c2aa98e2SPeter Wemm 2242c2aa98e2SPeter Wemm _res.options &= ~(RES_DEFNAMES|RES_DNSRCH); 224306f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2244c2aa98e2SPeter Wemm *p = '\0'; 224506f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(host, family); 2246c2aa98e2SPeter Wemm *p = '.'; 2247c2aa98e2SPeter Wemm #if NAMED_BIND 2248c2aa98e2SPeter Wemm _res.options = oldopts; 224906f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 2250c2aa98e2SPeter Wemm } 2251c2aa98e2SPeter Wemm } 2252c2aa98e2SPeter Wemm gothostent: 2253c2aa98e2SPeter Wemm if (hp == NULL) 2254c2aa98e2SPeter Wemm { 2255c2aa98e2SPeter Wemm #if NAMED_BIND 2256c2aa98e2SPeter Wemm /* check for name server timeouts */ 225740266059SGregory Neil Shapiro # if NETINET6 225840266059SGregory Neil Shapiro if (WorkAroundBrokenAAAA && family == AF_INET6 && 225940266059SGregory Neil Shapiro errno == ETIMEDOUT) 226040266059SGregory Neil Shapiro { 226140266059SGregory Neil Shapiro /* 226240266059SGregory Neil Shapiro ** An attempt with family AF_INET may 226340266059SGregory Neil Shapiro ** succeed By skipping the next section 226440266059SGregory Neil Shapiro ** of code, we will try AF_INET before 226540266059SGregory Neil Shapiro ** failing. 226640266059SGregory Neil Shapiro */ 226740266059SGregory Neil Shapiro 226840266059SGregory Neil Shapiro if (tTd(16, 10)) 226940266059SGregory Neil Shapiro sm_dprintf("makeconnection: WorkAroundBrokenAAAA: Trying AF_INET lookup (AF_INET6 failed)\n"); 227040266059SGregory Neil Shapiro } 227140266059SGregory Neil Shapiro else 227240266059SGregory Neil Shapiro # endif /* NETINET6 */ 227340266059SGregory Neil Shapiro { 227440266059SGregory Neil Shapiro if (errno == ETIMEDOUT || 227540266059SGregory Neil Shapiro h_errno == TRY_AGAIN || 2276c2aa98e2SPeter Wemm (errno == ECONNREFUSED && UseNameServer)) 2277c2aa98e2SPeter Wemm { 227806f25ae9SGregory Neil Shapiro save_errno = errno; 227940266059SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, 228040266059SGregory Neil Shapiro "4.4.3", NULL); 228106f25ae9SGregory Neil Shapiro errno = save_errno; 2282c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2283c2aa98e2SPeter Wemm } 228440266059SGregory Neil Shapiro } 228506f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 228606f25ae9SGregory Neil Shapiro #if NETINET6 228706f25ae9SGregory Neil Shapiro /* 228806f25ae9SGregory Neil Shapiro ** Try v6 first, then fall back to v4. 228906f25ae9SGregory Neil Shapiro ** If we found a v6 address, but no v4 229006f25ae9SGregory Neil Shapiro ** addresses, then TEMPFAIL. 229106f25ae9SGregory Neil Shapiro */ 229206f25ae9SGregory Neil Shapiro 229306f25ae9SGregory Neil Shapiro if (family == AF_INET6) 229406f25ae9SGregory Neil Shapiro { 229506f25ae9SGregory Neil Shapiro family = AF_INET; 229606f25ae9SGregory Neil Shapiro goto v4retry; 229706f25ae9SGregory Neil Shapiro } 229806f25ae9SGregory Neil Shapiro if (v6found) 229906f25ae9SGregory Neil Shapiro goto v6tempfail; 230006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 230106f25ae9SGregory Neil Shapiro save_errno = errno; 2302c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 230306f25ae9SGregory Neil Shapiro errno = save_errno; 230406f25ae9SGregory Neil Shapiro return EX_NOHOST; 2305c2aa98e2SPeter Wemm } 2306c2aa98e2SPeter Wemm addr.sa.sa_family = hp->h_addrtype; 2307c2aa98e2SPeter Wemm switch (hp->h_addrtype) 2308c2aa98e2SPeter Wemm { 2309c2aa98e2SPeter Wemm #if NETINET 2310c2aa98e2SPeter Wemm case AF_INET: 231106f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 231206f25ae9SGregory Neil Shapiro hp->h_addr, 2313c2aa98e2SPeter Wemm INADDRSZ); 2314c2aa98e2SPeter Wemm break; 231506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 231606f25ae9SGregory Neil Shapiro 231706f25ae9SGregory Neil Shapiro #if NETINET6 231806f25ae9SGregory Neil Shapiro case AF_INET6: 231906f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 232006f25ae9SGregory Neil Shapiro hp->h_addr, 232106f25ae9SGregory Neil Shapiro IN6ADDRSZ); 232206f25ae9SGregory Neil Shapiro break; 232306f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2324c2aa98e2SPeter Wemm 2325c2aa98e2SPeter Wemm default: 2326c2aa98e2SPeter Wemm if (hp->h_length > sizeof addr.sa.sa_data) 2327c2aa98e2SPeter Wemm { 2328c2aa98e2SPeter Wemm syserr("makeconnection: long sa_data: family %d len %d", 2329c2aa98e2SPeter Wemm hp->h_addrtype, hp->h_length); 2330c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 233106f25ae9SGregory Neil Shapiro errno = EINVAL; 2332c2aa98e2SPeter Wemm return EX_NOHOST; 2333c2aa98e2SPeter Wemm } 233440266059SGregory Neil Shapiro memmove(addr.sa.sa_data, hp->h_addr, hp->h_length); 2335c2aa98e2SPeter Wemm break; 2336c2aa98e2SPeter Wemm } 2337c2aa98e2SPeter Wemm addrno = 1; 2338c2aa98e2SPeter Wemm } 2339c2aa98e2SPeter Wemm 2340c2aa98e2SPeter Wemm /* 2341c2aa98e2SPeter Wemm ** Determine the port number. 2342c2aa98e2SPeter Wemm */ 2343c2aa98e2SPeter Wemm 2344c2aa98e2SPeter Wemm if (port == 0) 2345c2aa98e2SPeter Wemm { 234606f25ae9SGregory Neil Shapiro #ifdef NO_GETSERVBYNAME 234706f25ae9SGregory Neil Shapiro port = htons(25); 234806f25ae9SGregory Neil Shapiro #else /* NO_GETSERVBYNAME */ 2349c2aa98e2SPeter Wemm register struct servent *sp = getservbyname("smtp", "tcp"); 2350c2aa98e2SPeter Wemm 2351c2aa98e2SPeter Wemm if (sp == NULL) 2352c2aa98e2SPeter Wemm { 2353c2aa98e2SPeter Wemm if (LogLevel > 2) 2354c2aa98e2SPeter Wemm sm_syslog(LOG_ERR, NOQID, 2355c2aa98e2SPeter Wemm "makeconnection: service \"smtp\" unknown"); 2356c2aa98e2SPeter Wemm port = htons(25); 2357c2aa98e2SPeter Wemm } 2358c2aa98e2SPeter Wemm else 2359c2aa98e2SPeter Wemm port = sp->s_port; 236006f25ae9SGregory Neil Shapiro #endif /* NO_GETSERVBYNAME */ 2361c2aa98e2SPeter Wemm } 2362c2aa98e2SPeter Wemm 236340266059SGregory Neil Shapiro #if NETINET6 236440266059SGregory Neil Shapiro if (addr.sa.sa_family == AF_INET6 && 236540266059SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&addr.sin6.sin6_addr) && 236640266059SGregory Neil Shapiro ClientSettings[AF_INET].d_addr.sa.sa_family != 0) 236740266059SGregory Neil Shapiro { 236840266059SGregory Neil Shapiro /* 236940266059SGregory Neil Shapiro ** Ignore mapped IPv4 address since 237040266059SGregory Neil Shapiro ** there is a ClientPortOptions setting 237140266059SGregory Neil Shapiro ** for IPv4. 237240266059SGregory Neil Shapiro */ 237340266059SGregory Neil Shapiro 237440266059SGregory Neil Shapiro goto nextaddr; 237540266059SGregory Neil Shapiro } 237640266059SGregory Neil Shapiro #endif /* NETINET6 */ 237740266059SGregory Neil Shapiro 2378c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2379c2aa98e2SPeter Wemm { 2380c2aa98e2SPeter Wemm #if NETINET 2381c2aa98e2SPeter Wemm case AF_INET: 2382c2aa98e2SPeter Wemm addr.sin.sin_port = port; 2383c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_in); 2384c2aa98e2SPeter Wemm break; 238506f25ae9SGregory Neil Shapiro #endif /* NETINET */ 238606f25ae9SGregory Neil Shapiro 238706f25ae9SGregory Neil Shapiro #if NETINET6 238806f25ae9SGregory Neil Shapiro case AF_INET6: 238906f25ae9SGregory Neil Shapiro addr.sin6.sin6_port = port; 239006f25ae9SGregory Neil Shapiro addrlen = sizeof (struct sockaddr_in6); 239106f25ae9SGregory Neil Shapiro break; 239206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2393c2aa98e2SPeter Wemm 2394c2aa98e2SPeter Wemm #if NETISO 2395c2aa98e2SPeter Wemm case AF_ISO: 2396c2aa98e2SPeter Wemm /* assume two byte transport selector */ 239706f25ae9SGregory Neil Shapiro memmove(TSEL((struct sockaddr_iso *) &addr), (char *) &port, 2); 2398c2aa98e2SPeter Wemm addrlen = sizeof (struct sockaddr_iso); 2399c2aa98e2SPeter Wemm break; 240006f25ae9SGregory Neil Shapiro #endif /* NETISO */ 2401c2aa98e2SPeter Wemm 2402c2aa98e2SPeter Wemm default: 2403c2aa98e2SPeter Wemm syserr("Can't connect to address family %d", addr.sa.sa_family); 2404c2aa98e2SPeter Wemm mci_setstat(mci, EX_NOHOST, "5.1.2", NULL); 240506f25ae9SGregory Neil Shapiro errno = EINVAL; 240640266059SGregory Neil Shapiro #if NETINET6 2407193538b7SGregory Neil Shapiro if (hp != NULL) 2408193538b7SGregory Neil Shapiro freehostent(hp); 240940266059SGregory Neil Shapiro #endif /* NETINET6 */ 241006f25ae9SGregory Neil Shapiro return EX_NOHOST; 2411c2aa98e2SPeter Wemm } 2412c2aa98e2SPeter Wemm 2413c2aa98e2SPeter Wemm /* 2414c2aa98e2SPeter Wemm ** Try to actually open the connection. 2415c2aa98e2SPeter Wemm */ 2416c2aa98e2SPeter Wemm 241740266059SGregory Neil Shapiro #if XLA 2418c2aa98e2SPeter Wemm /* if too many connections, don't bother trying */ 2419c2aa98e2SPeter Wemm if (!xla_noqueue_ok(host)) 2420193538b7SGregory Neil Shapiro { 242140266059SGregory Neil Shapiro # if NETINET6 2422193538b7SGregory Neil Shapiro if (hp != NULL) 2423193538b7SGregory Neil Shapiro freehostent(hp); 242440266059SGregory Neil Shapiro # endif /* NETINET6 */ 2425c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2426193538b7SGregory Neil Shapiro } 242706f25ae9SGregory Neil Shapiro #endif /* XLA */ 2428c2aa98e2SPeter Wemm 242940266059SGregory Neil Shapiro firstconnect = true; 2430c2aa98e2SPeter Wemm for (;;) 2431c2aa98e2SPeter Wemm { 2432c2aa98e2SPeter Wemm if (tTd(16, 1)) 243340266059SGregory Neil Shapiro sm_dprintf("makeconnection (%s [%s].%d (%d))\n", 24348774250cSGregory Neil Shapiro host, anynet_ntoa(&addr), ntohs(port), 243540266059SGregory Neil Shapiro (int) addr.sa.sa_family); 2436c2aa98e2SPeter Wemm 2437c2aa98e2SPeter Wemm /* save for logging */ 2438c2aa98e2SPeter Wemm CurHostAddr = addr; 2439c2aa98e2SPeter Wemm 244040266059SGregory Neil Shapiro #if HASRRESVPORT 2441c2aa98e2SPeter Wemm if (bitnset(M_SECURE_PORT, mci->mci_mailer->m_flags)) 2442c2aa98e2SPeter Wemm { 2443c2aa98e2SPeter Wemm int rport = IPPORT_RESERVED - 1; 2444c2aa98e2SPeter Wemm 2445c2aa98e2SPeter Wemm s = rresvport(&rport); 2446c2aa98e2SPeter Wemm } 2447c2aa98e2SPeter Wemm else 244840266059SGregory Neil Shapiro #endif /* HASRRESVPORT */ 2449c2aa98e2SPeter Wemm { 245040266059SGregory Neil Shapiro s = socket(addr.sa.sa_family, SOCK_STREAM, 0); 2451c2aa98e2SPeter Wemm } 2452c2aa98e2SPeter Wemm if (s < 0) 2453c2aa98e2SPeter Wemm { 245406f25ae9SGregory Neil Shapiro save_errno = errno; 2455c2aa98e2SPeter Wemm syserr("makeconnection: cannot create socket"); 245640266059SGregory Neil Shapiro #if XLA 2457c2aa98e2SPeter Wemm xla_host_end(host); 245806f25ae9SGregory Neil Shapiro #endif /* XLA */ 2459c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 246040266059SGregory Neil Shapiro #if NETINET6 2461193538b7SGregory Neil Shapiro if (hp != NULL) 2462193538b7SGregory Neil Shapiro freehostent(hp); 246340266059SGregory Neil Shapiro #endif /* NETINET6 */ 246406f25ae9SGregory Neil Shapiro errno = save_errno; 2465c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2466c2aa98e2SPeter Wemm } 2467c2aa98e2SPeter Wemm 2468c2aa98e2SPeter Wemm #ifdef SO_SNDBUF 246940266059SGregory Neil Shapiro if (ClientSettings[family].d_tcpsndbufsize > 0) 2470c2aa98e2SPeter Wemm { 2471c2aa98e2SPeter Wemm if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, 247240266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcpsndbufsize, 247340266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcpsndbufsize)) < 0) 2474c2aa98e2SPeter Wemm syserr("makeconnection: setsockopt(SO_SNDBUF)"); 2475c2aa98e2SPeter Wemm } 247606f25ae9SGregory Neil Shapiro #endif /* SO_SNDBUF */ 247706f25ae9SGregory Neil Shapiro #ifdef SO_RCVBUF 247840266059SGregory Neil Shapiro if (ClientSettings[family].d_tcprcvbufsize > 0) 247906f25ae9SGregory Neil Shapiro { 248006f25ae9SGregory Neil Shapiro if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 248140266059SGregory Neil Shapiro (char *) &ClientSettings[family].d_tcprcvbufsize, 248240266059SGregory Neil Shapiro sizeof(ClientSettings[family].d_tcprcvbufsize)) < 0) 248306f25ae9SGregory Neil Shapiro syserr("makeconnection: setsockopt(SO_RCVBUF)"); 248406f25ae9SGregory Neil Shapiro } 248506f25ae9SGregory Neil Shapiro #endif /* SO_RCVBUF */ 248606f25ae9SGregory Neil Shapiro 2487c2aa98e2SPeter Wemm if (tTd(16, 1)) 248840266059SGregory Neil Shapiro sm_dprintf("makeconnection: fd=%d\n", s); 2489c2aa98e2SPeter Wemm 2490c2aa98e2SPeter Wemm /* turn on network debugging? */ 2491c2aa98e2SPeter Wemm if (tTd(16, 101)) 2492c2aa98e2SPeter Wemm { 2493c2aa98e2SPeter Wemm int on = 1; 249406f25ae9SGregory Neil Shapiro 2495c2aa98e2SPeter Wemm (void) setsockopt(s, SOL_SOCKET, SO_DEBUG, 2496c2aa98e2SPeter Wemm (char *)&on, sizeof on); 2497c2aa98e2SPeter Wemm } 249840266059SGregory Neil Shapiro if (e->e_xfp != NULL) /* for debugging */ 249940266059SGregory Neil Shapiro (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2500c2aa98e2SPeter Wemm errno = 0; /* for debugging */ 2501c2aa98e2SPeter Wemm 250206f25ae9SGregory Neil Shapiro if (clt_bind) 250306f25ae9SGregory Neil Shapiro { 250406f25ae9SGregory Neil Shapiro int on = 1; 250506f25ae9SGregory Neil Shapiro 250606f25ae9SGregory Neil Shapiro switch (clt_addr.sa.sa_family) 250706f25ae9SGregory Neil Shapiro { 250806f25ae9SGregory Neil Shapiro #if NETINET 250906f25ae9SGregory Neil Shapiro case AF_INET: 251006f25ae9SGregory Neil Shapiro if (clt_addr.sin.sin_port != 0) 251106f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 251206f25ae9SGregory Neil Shapiro SO_REUSEADDR, 251306f25ae9SGregory Neil Shapiro (char *) &on, 251406f25ae9SGregory Neil Shapiro sizeof on); 251506f25ae9SGregory Neil Shapiro break; 251606f25ae9SGregory Neil Shapiro #endif /* NETINET */ 251706f25ae9SGregory Neil Shapiro 251806f25ae9SGregory Neil Shapiro #if NETINET6 251906f25ae9SGregory Neil Shapiro case AF_INET6: 252006f25ae9SGregory Neil Shapiro if (clt_addr.sin6.sin6_port != 0) 252106f25ae9SGregory Neil Shapiro (void) setsockopt(s, SOL_SOCKET, 252206f25ae9SGregory Neil Shapiro SO_REUSEADDR, 252306f25ae9SGregory Neil Shapiro (char *) &on, 252406f25ae9SGregory Neil Shapiro sizeof on); 252506f25ae9SGregory Neil Shapiro break; 252606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 252706f25ae9SGregory Neil Shapiro } 252806f25ae9SGregory Neil Shapiro 252906f25ae9SGregory Neil Shapiro if (bind(s, &clt_addr.sa, socksize) < 0) 253006f25ae9SGregory Neil Shapiro { 253106f25ae9SGregory Neil Shapiro save_errno = errno; 253206f25ae9SGregory Neil Shapiro (void) close(s); 253306f25ae9SGregory Neil Shapiro errno = save_errno; 253406f25ae9SGregory Neil Shapiro syserr("makeconnection: cannot bind socket [%s]", 253506f25ae9SGregory Neil Shapiro anynet_ntoa(&clt_addr)); 253640266059SGregory Neil Shapiro #if NETINET6 2537193538b7SGregory Neil Shapiro if (hp != NULL) 2538193538b7SGregory Neil Shapiro freehostent(hp); 253940266059SGregory Neil Shapiro #endif /* NETINET6 */ 254006f25ae9SGregory Neil Shapiro errno = save_errno; 254106f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 254206f25ae9SGregory Neil Shapiro } 254306f25ae9SGregory Neil Shapiro } 254406f25ae9SGregory Neil Shapiro 2545c2aa98e2SPeter Wemm /* 2546c2aa98e2SPeter Wemm ** Linux seems to hang in connect for 90 minutes (!!!). 2547c2aa98e2SPeter Wemm ** Time out the connect to avoid this problem. 2548c2aa98e2SPeter Wemm */ 2549c2aa98e2SPeter Wemm 2550c2aa98e2SPeter Wemm if (setjmp(CtxConnectTimeout) == 0) 2551c2aa98e2SPeter Wemm { 2552c2aa98e2SPeter Wemm int i; 2553c2aa98e2SPeter Wemm 2554c2aa98e2SPeter Wemm if (e->e_ntries <= 0 && TimeOuts.to_iconnect != 0) 255540266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_iconnect, 25568774250cSGregory Neil Shapiro connecttimeout, 0); 2557c2aa98e2SPeter Wemm else if (TimeOuts.to_connect != 0) 255840266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_connect, 25598774250cSGregory Neil Shapiro connecttimeout, 0); 2560c2aa98e2SPeter Wemm else 2561c2aa98e2SPeter Wemm ev = NULL; 2562c2aa98e2SPeter Wemm 256306f25ae9SGregory Neil Shapiro switch (ConnectOnlyTo.sa.sa_family) 256406f25ae9SGregory Neil Shapiro { 256506f25ae9SGregory Neil Shapiro #if NETINET 256606f25ae9SGregory Neil Shapiro case AF_INET: 256706f25ae9SGregory Neil Shapiro addr.sin.sin_addr.s_addr = ConnectOnlyTo.sin.sin_addr.s_addr; 256806f25ae9SGregory Neil Shapiro break; 256906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 257006f25ae9SGregory Neil Shapiro 257106f25ae9SGregory Neil Shapiro #if NETINET6 257206f25ae9SGregory Neil Shapiro case AF_INET6: 257306f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 257406f25ae9SGregory Neil Shapiro &ConnectOnlyTo.sin6.sin6_addr, 257506f25ae9SGregory Neil Shapiro IN6ADDRSZ); 257606f25ae9SGregory Neil Shapiro break; 257706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 257806f25ae9SGregory Neil Shapiro } 2579b6bacd31SGregory Neil Shapiro if (tTd(16, 1)) 2580b6bacd31SGregory Neil Shapiro sm_dprintf("Connecting to [%s]...\n", anynet_ntoa(&addr)); 2581c2aa98e2SPeter Wemm i = connect(s, (struct sockaddr *) &addr, addrlen); 258206f25ae9SGregory Neil Shapiro save_errno = errno; 2583c2aa98e2SPeter Wemm if (ev != NULL) 258440266059SGregory Neil Shapiro sm_clrevent(ev); 2585c2aa98e2SPeter Wemm if (i >= 0) 2586c2aa98e2SPeter Wemm break; 2587c2aa98e2SPeter Wemm } 2588c2aa98e2SPeter Wemm else 258906f25ae9SGregory Neil Shapiro save_errno = errno; 2590c2aa98e2SPeter Wemm 2591605302a5SGregory Neil Shapiro /* couldn't connect.... figure out why */ 2592605302a5SGregory Neil Shapiro (void) close(s); 2593605302a5SGregory Neil Shapiro 2594c2aa98e2SPeter Wemm /* if running demand-dialed connection, try again */ 259540266059SGregory Neil Shapiro if (DialDelay > 0 && firstconnect && 259640266059SGregory Neil Shapiro bitnset(M_DIALDELAY, mci->mci_mailer->m_flags)) 2597c2aa98e2SPeter Wemm { 2598c2aa98e2SPeter Wemm if (tTd(16, 1)) 259940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying again...\n", 260040266059SGregory Neil Shapiro sm_errstring(save_errno)); 260140266059SGregory Neil Shapiro firstconnect = false; 260206f25ae9SGregory Neil Shapiro (void) sleep(DialDelay); 2603c2aa98e2SPeter Wemm continue; 2604c2aa98e2SPeter Wemm } 2605c2aa98e2SPeter Wemm 260640266059SGregory Neil Shapiro if (LogLevel > 13) 2607c2aa98e2SPeter Wemm sm_syslog(LOG_INFO, e->e_id, 2608c2aa98e2SPeter Wemm "makeconnection (%s [%s]) failed: %s", 2609c2aa98e2SPeter Wemm host, anynet_ntoa(&addr), 261040266059SGregory Neil Shapiro sm_errstring(save_errno)); 2611c2aa98e2SPeter Wemm 261240266059SGregory Neil Shapiro #if NETINET6 261340266059SGregory Neil Shapiro nextaddr: 261440266059SGregory Neil Shapiro #endif /* NETINET6 */ 261540266059SGregory Neil Shapiro if (hp != NULL && hp->h_addr_list[addrno] != NULL && 261640266059SGregory Neil Shapiro (enough == 0 || curtime() < enough)) 2617c2aa98e2SPeter Wemm { 2618c2aa98e2SPeter Wemm if (tTd(16, 1)) 261940266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); trying new address....\n", 262040266059SGregory Neil Shapiro sm_errstring(save_errno)); 2621c2aa98e2SPeter Wemm switch (addr.sa.sa_family) 2622c2aa98e2SPeter Wemm { 2623c2aa98e2SPeter Wemm #if NETINET 2624c2aa98e2SPeter Wemm case AF_INET: 262506f25ae9SGregory Neil Shapiro memmove(&addr.sin.sin_addr, 262606f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2627c2aa98e2SPeter Wemm INADDRSZ); 2628c2aa98e2SPeter Wemm break; 262906f25ae9SGregory Neil Shapiro #endif /* NETINET */ 263006f25ae9SGregory Neil Shapiro 263106f25ae9SGregory Neil Shapiro #if NETINET6 263206f25ae9SGregory Neil Shapiro case AF_INET6: 263306f25ae9SGregory Neil Shapiro memmove(&addr.sin6.sin6_addr, 263406f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 263506f25ae9SGregory Neil Shapiro IN6ADDRSZ); 263606f25ae9SGregory Neil Shapiro break; 263706f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2638c2aa98e2SPeter Wemm 2639c2aa98e2SPeter Wemm default: 264006f25ae9SGregory Neil Shapiro memmove(addr.sa.sa_data, 264106f25ae9SGregory Neil Shapiro hp->h_addr_list[addrno++], 2642c2aa98e2SPeter Wemm hp->h_length); 2643c2aa98e2SPeter Wemm break; 2644c2aa98e2SPeter Wemm } 2645c2aa98e2SPeter Wemm continue; 2646c2aa98e2SPeter Wemm } 264706f25ae9SGregory Neil Shapiro errno = save_errno; 2648c2aa98e2SPeter Wemm 264906f25ae9SGregory Neil Shapiro #if NETINET6 265006f25ae9SGregory Neil Shapiro if (family == AF_INET6) 265106f25ae9SGregory Neil Shapiro { 265206f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 265340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s); retrying with AF_INET....\n", 265440266059SGregory Neil Shapiro sm_errstring(save_errno)); 265540266059SGregory Neil Shapiro v6found = true; 265606f25ae9SGregory Neil Shapiro family = AF_INET; 2657193538b7SGregory Neil Shapiro if (hp != NULL) 2658193538b7SGregory Neil Shapiro { 2659193538b7SGregory Neil Shapiro freehostent(hp); 2660193538b7SGregory Neil Shapiro hp = NULL; 2661193538b7SGregory Neil Shapiro } 266206f25ae9SGregory Neil Shapiro goto v4retry; 266306f25ae9SGregory Neil Shapiro } 266406f25ae9SGregory Neil Shapiro v6tempfail: 266506f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 2666c2aa98e2SPeter Wemm /* couldn't open connection */ 266706f25ae9SGregory Neil Shapiro #if NETINET6 266806f25ae9SGregory Neil Shapiro /* Don't clobber an already saved errno from v4retry */ 266906f25ae9SGregory Neil Shapiro if (errno > 0) 267006f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 267106f25ae9SGregory Neil Shapiro save_errno = errno; 267206f25ae9SGregory Neil Shapiro if (tTd(16, 1)) 267340266059SGregory Neil Shapiro sm_dprintf("Connect failed (%s)\n", 267440266059SGregory Neil Shapiro sm_errstring(save_errno)); 267540266059SGregory Neil Shapiro #if XLA 2676c2aa98e2SPeter Wemm xla_host_end(host); 267706f25ae9SGregory Neil Shapiro #endif /* XLA */ 2678c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 267940266059SGregory Neil Shapiro #if NETINET6 2680193538b7SGregory Neil Shapiro if (hp != NULL) 2681193538b7SGregory Neil Shapiro freehostent(hp); 268240266059SGregory Neil Shapiro #endif /* NETINET6 */ 268306f25ae9SGregory Neil Shapiro errno = save_errno; 2684c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2685c2aa98e2SPeter Wemm } 2686c2aa98e2SPeter Wemm 268740266059SGregory Neil Shapiro #if NETINET6 2688193538b7SGregory Neil Shapiro if (hp != NULL) 2689193538b7SGregory Neil Shapiro { 2690193538b7SGregory Neil Shapiro freehostent(hp); 2691193538b7SGregory Neil Shapiro hp = NULL; 2692193538b7SGregory Neil Shapiro } 269340266059SGregory Neil Shapiro #endif /* NETINET6 */ 2694193538b7SGregory Neil Shapiro 2695c2aa98e2SPeter Wemm /* connection ok, put it into canonical form */ 269606f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 269740266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 269840266059SGregory Neil Shapiro (void *) &s, 2699e92d3f3fSGregory Neil Shapiro SM_IO_WRONLY_B, NULL)) == NULL || 2700c2aa98e2SPeter Wemm (s = dup(s)) < 0 || 270140266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 270240266059SGregory Neil Shapiro (void *) &s, 2703e92d3f3fSGregory Neil Shapiro SM_IO_RDONLY_B, NULL)) == NULL) 2704c2aa98e2SPeter Wemm { 270506f25ae9SGregory Neil Shapiro save_errno = errno; 2706c2aa98e2SPeter Wemm syserr("cannot open SMTP client channel, fd=%d", s); 2707c2aa98e2SPeter Wemm mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 270806f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 270940266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 271006f25ae9SGregory Neil Shapiro (void) close(s); 271106f25ae9SGregory Neil Shapiro errno = save_errno; 271206f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 271306f25ae9SGregory Neil Shapiro } 271440266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 271540266059SGregory Neil Shapiro 271640266059SGregory Neil Shapiro /* set {client_flags} */ 271740266059SGregory Neil Shapiro if (ClientSettings[addr.sa.sa_family].d_mflags != NULL) 271840266059SGregory Neil Shapiro { 271940266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 272040266059SGregory Neil Shapiro macid("{client_flags}"), 272140266059SGregory Neil Shapiro ClientSettings[addr.sa.sa_family].d_mflags); 272240266059SGregory Neil Shapiro } 272340266059SGregory Neil Shapiro else 272440266059SGregory Neil Shapiro macdefine(&mci->mci_macro, A_PERM, 272540266059SGregory Neil Shapiro macid("{client_flags}"), ""); 272640266059SGregory Neil Shapiro 272740266059SGregory Neil Shapiro /* "add" {client_flags} to bitmap */ 272840266059SGregory Neil Shapiro if (bitnset(D_IFNHELO, ClientSettings[addr.sa.sa_family].d_flags)) 272940266059SGregory Neil Shapiro { 273040266059SGregory Neil Shapiro /* look for just this one flag */ 273140266059SGregory Neil Shapiro setbitn(D_IFNHELO, d_flags); 273240266059SGregory Neil Shapiro } 273306f25ae9SGregory Neil Shapiro 273406f25ae9SGregory Neil Shapiro /* find out name for Interface through which we connect */ 273506f25ae9SGregory Neil Shapiro len = sizeof addr; 273606f25ae9SGregory Neil Shapiro if (getsockname(s, &addr.sa, &len) == 0) 273706f25ae9SGregory Neil Shapiro { 273806f25ae9SGregory Neil Shapiro char *name; 273940266059SGregory Neil Shapiro char family[5]; 274006f25ae9SGregory Neil Shapiro 274140266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 274240266059SGregory Neil Shapiro macid("{if_addr_out}"), anynet_ntoa(&addr)); 274340266059SGregory Neil Shapiro (void) sm_snprintf(family, sizeof(family), "%d", 274440266059SGregory Neil Shapiro addr.sa.sa_family); 274540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 274640266059SGregory Neil Shapiro macid("{if_family_out}"), family); 274706f25ae9SGregory Neil Shapiro 274806f25ae9SGregory Neil Shapiro name = hostnamebyanyaddr(&addr); 274940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_TEMP, 275040266059SGregory Neil Shapiro macid("{if_name_out}"), name); 275106f25ae9SGregory Neil Shapiro if (LogLevel > 11) 275206f25ae9SGregory Neil Shapiro { 275306f25ae9SGregory Neil Shapiro /* log connection information */ 275406f25ae9SGregory Neil Shapiro sm_syslog(LOG_INFO, e->e_id, 275506f25ae9SGregory Neil Shapiro "SMTP outgoing connect on %.40s", name); 275606f25ae9SGregory Neil Shapiro } 275706f25ae9SGregory Neil Shapiro if (bitnset(D_IFNHELO, d_flags)) 275806f25ae9SGregory Neil Shapiro { 275906f25ae9SGregory Neil Shapiro if (name[0] != '[' && strchr(name, '.') != NULL) 276006f25ae9SGregory Neil Shapiro mci->mci_heloname = newstr(name); 276106f25ae9SGregory Neil Shapiro } 276206f25ae9SGregory Neil Shapiro } 276306f25ae9SGregory Neil Shapiro else 276406f25ae9SGregory Neil Shapiro { 276540266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 276640266059SGregory Neil Shapiro macid("{if_name_out}"), NULL); 276740266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 276840266059SGregory Neil Shapiro macid("{if_addr_out}"), NULL); 276940266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 277040266059SGregory Neil Shapiro macid("{if_family_out}"), NULL); 277106f25ae9SGregory Neil Shapiro } 2772e92d3f3fSGregory Neil Shapiro 2773e92d3f3fSGregory Neil Shapiro #if _FFR_HELONAME 2774e92d3f3fSGregory Neil Shapiro /* Use the configured HeloName as appropriate */ 2775e92d3f3fSGregory Neil Shapiro if (HeloName != NULL && HeloName[0] != '\0') 2776e92d3f3fSGregory Neil Shapiro mci->mci_heloname = newstr(HeloName); 2777e92d3f3fSGregory Neil Shapiro #endif /* _FFR_HELONAME */ 2778e92d3f3fSGregory Neil Shapiro 277906f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_OK, NULL, NULL); 278006f25ae9SGregory Neil Shapiro return EX_OK; 278106f25ae9SGregory Neil Shapiro } 278206f25ae9SGregory Neil Shapiro 278306f25ae9SGregory Neil Shapiro static void 2784b6bacd31SGregory Neil Shapiro connecttimeout(ignore) 2785b6bacd31SGregory Neil Shapiro int ignore; 278606f25ae9SGregory Neil Shapiro { 27878774250cSGregory Neil Shapiro /* 27888774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 27898774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 27908774250cSGregory Neil Shapiro ** DOING. 27918774250cSGregory Neil Shapiro */ 27928774250cSGregory Neil Shapiro 279306f25ae9SGregory Neil Shapiro errno = ETIMEDOUT; 279406f25ae9SGregory Neil Shapiro longjmp(CtxConnectTimeout, 1); 279506f25ae9SGregory Neil Shapiro } 279640266059SGregory Neil Shapiro /* 279706f25ae9SGregory Neil Shapiro ** MAKECONNECTION_DS -- make a connection to a domain socket. 279806f25ae9SGregory Neil Shapiro ** 279906f25ae9SGregory Neil Shapiro ** Parameters: 280006f25ae9SGregory Neil Shapiro ** mux_path -- the path of the socket to connect to. 280106f25ae9SGregory Neil Shapiro ** mci -- a pointer to the mail connection information 280206f25ae9SGregory Neil Shapiro ** structure to be filled in. 280306f25ae9SGregory Neil Shapiro ** 280406f25ae9SGregory Neil Shapiro ** Returns: 280506f25ae9SGregory Neil Shapiro ** An exit code telling whether the connection could be 280606f25ae9SGregory Neil Shapiro ** made and if not why not. 280706f25ae9SGregory Neil Shapiro ** 280806f25ae9SGregory Neil Shapiro ** Side Effects: 280906f25ae9SGregory Neil Shapiro ** none. 281006f25ae9SGregory Neil Shapiro */ 281106f25ae9SGregory Neil Shapiro 281206f25ae9SGregory Neil Shapiro #if NETUNIX 281340266059SGregory Neil Shapiro int 281440266059SGregory Neil Shapiro makeconnection_ds(mux_path, mci) 281506f25ae9SGregory Neil Shapiro char *mux_path; 281606f25ae9SGregory Neil Shapiro register MCI *mci; 281706f25ae9SGregory Neil Shapiro { 281806f25ae9SGregory Neil Shapiro int sock; 281906f25ae9SGregory Neil Shapiro int rval, save_errno; 282006f25ae9SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_ROOTOK|SFF_EXECOK; 282106f25ae9SGregory Neil Shapiro struct sockaddr_un unix_addr; 282206f25ae9SGregory Neil Shapiro 282306f25ae9SGregory Neil Shapiro /* if not safe, don't connect */ 282406f25ae9SGregory Neil Shapiro rval = safefile(mux_path, RunAsUid, RunAsGid, RunAsUserName, 282506f25ae9SGregory Neil Shapiro sff, S_IRUSR|S_IWUSR, NULL); 282606f25ae9SGregory Neil Shapiro 282706f25ae9SGregory Neil Shapiro if (rval != 0) 282806f25ae9SGregory Neil Shapiro { 2829e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: unsafe domain socket %s", 2830e92d3f3fSGregory Neil Shapiro mux_path); 283106f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.3.5", NULL); 283206f25ae9SGregory Neil Shapiro errno = rval; 283306f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 283406f25ae9SGregory Neil Shapiro } 283506f25ae9SGregory Neil Shapiro 283606f25ae9SGregory Neil Shapiro /* prepare address structure */ 283706f25ae9SGregory Neil Shapiro memset(&unix_addr, '\0', sizeof unix_addr); 283806f25ae9SGregory Neil Shapiro unix_addr.sun_family = AF_UNIX; 283906f25ae9SGregory Neil Shapiro 284006f25ae9SGregory Neil Shapiro if (strlen(mux_path) >= sizeof unix_addr.sun_path) 284106f25ae9SGregory Neil Shapiro { 2842e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: domain socket name %s too long", 2843e92d3f3fSGregory Neil Shapiro mux_path); 284440266059SGregory Neil Shapiro 284540266059SGregory Neil Shapiro /* XXX why TEMPFAIL but 5.x.y ? */ 284606f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "5.3.5", NULL); 284706f25ae9SGregory Neil Shapiro errno = ENAMETOOLONG; 284806f25ae9SGregory Neil Shapiro return EX_UNAVAILABLE; 284906f25ae9SGregory Neil Shapiro } 285040266059SGregory Neil Shapiro (void) sm_strlcpy(unix_addr.sun_path, mux_path, 285140266059SGregory Neil Shapiro sizeof unix_addr.sun_path); 285206f25ae9SGregory Neil Shapiro 285306f25ae9SGregory Neil Shapiro /* initialize domain socket */ 285406f25ae9SGregory Neil Shapiro sock = socket(AF_UNIX, SOCK_STREAM, 0); 285506f25ae9SGregory Neil Shapiro if (sock == -1) 285606f25ae9SGregory Neil Shapiro { 285706f25ae9SGregory Neil Shapiro save_errno = errno; 2858e92d3f3fSGregory Neil Shapiro syserr("makeconnection_ds: could not create domain socket %s", 2859e92d3f3fSGregory Neil Shapiro mux_path); 286006f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 286106f25ae9SGregory Neil Shapiro errno = save_errno; 286206f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 286306f25ae9SGregory Neil Shapiro } 286406f25ae9SGregory Neil Shapiro 286506f25ae9SGregory Neil Shapiro /* connect to server */ 286606f25ae9SGregory Neil Shapiro if (connect(sock, (struct sockaddr *) &unix_addr, 286706f25ae9SGregory Neil Shapiro sizeof(unix_addr)) == -1) 286806f25ae9SGregory Neil Shapiro { 286906f25ae9SGregory Neil Shapiro save_errno = errno; 287006f25ae9SGregory Neil Shapiro syserr("Could not connect to socket %s", mux_path); 287106f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.1", NULL); 287206f25ae9SGregory Neil Shapiro (void) close(sock); 287306f25ae9SGregory Neil Shapiro errno = save_errno; 287406f25ae9SGregory Neil Shapiro return EX_TEMPFAIL; 287506f25ae9SGregory Neil Shapiro } 287606f25ae9SGregory Neil Shapiro 287706f25ae9SGregory Neil Shapiro /* connection ok, put it into canonical form */ 287806f25ae9SGregory Neil Shapiro mci->mci_out = NULL; 287940266059SGregory Neil Shapiro if ((mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2880e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_WRONLY_B, NULL)) 288140266059SGregory Neil Shapiro == NULL 288240266059SGregory Neil Shapiro || (sock = dup(sock)) < 0 || 288340266059SGregory Neil Shapiro (mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2884e92d3f3fSGregory Neil Shapiro (void *) &sock, SM_IO_RDONLY_B, NULL)) 288540266059SGregory Neil Shapiro == NULL) 288606f25ae9SGregory Neil Shapiro { 288706f25ae9SGregory Neil Shapiro save_errno = errno; 288806f25ae9SGregory Neil Shapiro syserr("cannot open SMTP client channel, fd=%d", sock); 288906f25ae9SGregory Neil Shapiro mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 289006f25ae9SGregory Neil Shapiro if (mci->mci_out != NULL) 289140266059SGregory Neil Shapiro (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 289206f25ae9SGregory Neil Shapiro (void) close(sock); 289306f25ae9SGregory Neil Shapiro errno = save_errno; 2894c2aa98e2SPeter Wemm return EX_TEMPFAIL; 2895c2aa98e2SPeter Wemm } 289640266059SGregory Neil Shapiro sm_io_automode(mci->mci_out, mci->mci_in); 2897c2aa98e2SPeter Wemm 2898c2aa98e2SPeter Wemm mci_setstat(mci, EX_OK, NULL, NULL); 289906f25ae9SGregory Neil Shapiro errno = 0; 290006f25ae9SGregory Neil Shapiro return EX_OK; 2901c2aa98e2SPeter Wemm } 290206f25ae9SGregory Neil Shapiro #endif /* NETUNIX */ 290340266059SGregory Neil Shapiro /* 290440266059SGregory Neil Shapiro ** SHUTDOWN_DAEMON -- Performs a clean shutdown of the daemon 29058774250cSGregory Neil Shapiro ** 29068774250cSGregory Neil Shapiro ** Parameters: 290740266059SGregory Neil Shapiro ** none. 29088774250cSGregory Neil Shapiro ** 29098774250cSGregory Neil Shapiro ** Returns: 29108774250cSGregory Neil Shapiro ** none. 29118774250cSGregory Neil Shapiro ** 29128774250cSGregory Neil Shapiro ** Side Effects: 291340266059SGregory Neil Shapiro ** closes control socket, exits. 29148774250cSGregory Neil Shapiro */ 29158774250cSGregory Neil Shapiro 291640266059SGregory Neil Shapiro void 291740266059SGregory Neil Shapiro shutdown_daemon() 29188774250cSGregory Neil Shapiro { 291940266059SGregory Neil Shapiro int i; 292040266059SGregory Neil Shapiro char *reason; 29218774250cSGregory Neil Shapiro 292240266059SGregory Neil Shapiro sm_allsignals(true); 292340266059SGregory Neil Shapiro 292440266059SGregory Neil Shapiro reason = ShutdownRequest; 292540266059SGregory Neil Shapiro ShutdownRequest = NULL; 292640266059SGregory Neil Shapiro PendingSignal = 0; 292740266059SGregory Neil Shapiro 2928e92d3f3fSGregory Neil Shapiro if (LogLevel > 9) 2929e92d3f3fSGregory Neil Shapiro sm_syslog(LOG_INFO, CurEnv->e_id, "stopping daemon, reason=%s", 293040266059SGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 293140266059SGregory Neil Shapiro 293240266059SGregory Neil Shapiro FileName = NULL; 293340266059SGregory Neil Shapiro closecontrolsocket(true); 293440266059SGregory Neil Shapiro #if XLA 293540266059SGregory Neil Shapiro xla_all_end(); 293640266059SGregory Neil Shapiro #endif /* XLA */ 293740266059SGregory Neil Shapiro 293840266059SGregory Neil Shapiro for (i = 0; i < NDaemons; i++) 293940266059SGregory Neil Shapiro { 294040266059SGregory Neil Shapiro if (Daemons[i].d_socket >= 0) 294140266059SGregory Neil Shapiro { 294240266059SGregory Neil Shapiro (void) close(Daemons[i].d_socket); 294340266059SGregory Neil Shapiro Daemons[i].d_socket = -1; 294440266059SGregory Neil Shapiro 294540266059SGregory Neil Shapiro #if _FFR_DAEMON_NETUNIX 294640266059SGregory Neil Shapiro # if NETUNIX 294740266059SGregory Neil Shapiro /* Remove named sockets */ 294840266059SGregory Neil Shapiro if (Daemons[i].d_addr.sa.sa_family == AF_UNIX) 294940266059SGregory Neil Shapiro { 295040266059SGregory Neil Shapiro int rval; 295140266059SGregory Neil Shapiro long sff = SFF_SAFEDIRPATH|SFF_OPENASROOT|SFF_NOLINK|SFF_MUSTOWN|SFF_EXECOK|SFF_CREAT; 295240266059SGregory Neil Shapiro 295340266059SGregory Neil Shapiro /* if not safe, don't use it */ 295440266059SGregory Neil Shapiro rval = safefile(Daemons[i].d_addr.sunix.sun_path, 295540266059SGregory Neil Shapiro RunAsUid, RunAsGid, 295640266059SGregory Neil Shapiro RunAsUserName, sff, 295740266059SGregory Neil Shapiro S_IRUSR|S_IWUSR, NULL); 295840266059SGregory Neil Shapiro if (rval == 0 && 295940266059SGregory Neil Shapiro unlink(Daemons[i].d_addr.sunix.sun_path) < 0) 296040266059SGregory Neil Shapiro { 296140266059SGregory Neil Shapiro sm_syslog(LOG_WARNING, NOQID, 296240266059SGregory Neil Shapiro "Could not remove daemon %s socket: %s: %s", 296340266059SGregory Neil Shapiro Daemons[i].d_name, 296440266059SGregory Neil Shapiro Daemons[i].d_addr.sunix.sun_path, 296540266059SGregory Neil Shapiro sm_errstring(errno)); 29668774250cSGregory Neil Shapiro } 296740266059SGregory Neil Shapiro } 296840266059SGregory Neil Shapiro # endif /* NETUNIX */ 296940266059SGregory Neil Shapiro #endif /* _FFR_DAEMON_NETUNIX */ 297040266059SGregory Neil Shapiro } 297140266059SGregory Neil Shapiro } 297240266059SGregory Neil Shapiro 297340266059SGregory Neil Shapiro finis(false, true, EX_OK); 297440266059SGregory Neil Shapiro } 297540266059SGregory Neil Shapiro /* 29768774250cSGregory Neil Shapiro ** RESTART_DAEMON -- Performs a clean restart of the daemon 29778774250cSGregory Neil Shapiro ** 29788774250cSGregory Neil Shapiro ** Parameters: 29798774250cSGregory Neil Shapiro ** none. 29808774250cSGregory Neil Shapiro ** 29818774250cSGregory Neil Shapiro ** Returns: 29828774250cSGregory Neil Shapiro ** none. 29838774250cSGregory Neil Shapiro ** 29848774250cSGregory Neil Shapiro ** Side Effects: 29858774250cSGregory Neil Shapiro ** restarts the daemon or exits if restart fails. 29868774250cSGregory Neil Shapiro */ 29878774250cSGregory Neil Shapiro 298813058a91SGregory Neil Shapiro /* Make a non-DFL/IGN signal a noop */ 298913058a91SGregory Neil Shapiro #define SM_NOOP_SIGNAL(sig, old) \ 299013058a91SGregory Neil Shapiro do \ 299113058a91SGregory Neil Shapiro { \ 299240266059SGregory Neil Shapiro (old) = sm_signal((sig), sm_signal_noop); \ 299313058a91SGregory Neil Shapiro if ((old) == SIG_IGN || (old) == SIG_DFL) \ 299440266059SGregory Neil Shapiro (void) sm_signal((sig), (old)); \ 299513058a91SGregory Neil Shapiro } while (0) 299613058a91SGregory Neil Shapiro 299740266059SGregory Neil Shapiro void 29988774250cSGregory Neil Shapiro restart_daemon() 29998774250cSGregory Neil Shapiro { 300040266059SGregory Neil Shapiro bool drop; 30018774250cSGregory Neil Shapiro int save_errno; 30028774250cSGregory Neil Shapiro char *reason; 300313058a91SGregory Neil Shapiro sigfunc_t ignore, oalrm, ousr1; 30048774250cSGregory Neil Shapiro extern int DtableSize; 30058774250cSGregory Neil Shapiro 300613058a91SGregory Neil Shapiro /* clear the events to turn off SIGALRMs */ 300740266059SGregory Neil Shapiro sm_clear_events(); 300840266059SGregory Neil Shapiro sm_allsignals(true); 30098774250cSGregory Neil Shapiro 30108774250cSGregory Neil Shapiro reason = RestartRequest; 30118774250cSGregory Neil Shapiro RestartRequest = NULL; 30128774250cSGregory Neil Shapiro PendingSignal = 0; 30138774250cSGregory Neil Shapiro 30148774250cSGregory Neil Shapiro if (SaveArgv[0][0] != '/') 30158774250cSGregory Neil Shapiro { 30168774250cSGregory Neil Shapiro if (LogLevel > 3) 30178774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, 30188774250cSGregory Neil Shapiro "could not restart: need full path"); 301940266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 302040266059SGregory Neil Shapiro /* NOTREACHED */ 30218774250cSGregory Neil Shapiro } 30228774250cSGregory Neil Shapiro if (LogLevel > 3) 30238774250cSGregory Neil Shapiro sm_syslog(LOG_INFO, NOQID, "restarting %s due to %s", 30248774250cSGregory Neil Shapiro SaveArgv[0], 30258774250cSGregory Neil Shapiro reason == NULL ? "implicit call" : reason); 30268774250cSGregory Neil Shapiro 302740266059SGregory Neil Shapiro closecontrolsocket(true); 302894c01205SGregory Neil Shapiro #if SM_CONF_SHM 302994c01205SGregory Neil Shapiro cleanup_shm(DaemonPid == getpid()); 303094c01205SGregory Neil Shapiro #endif /* SM_CONF_SHM */ 303140266059SGregory Neil Shapiro 3032e92d3f3fSGregory Neil Shapiro /* close locked pid file */ 3033e92d3f3fSGregory Neil Shapiro close_sendmail_pid(); 3034e92d3f3fSGregory Neil Shapiro 303540266059SGregory Neil Shapiro /* 303640266059SGregory Neil Shapiro ** Want to drop to the user who started the process in all cases 303740266059SGregory Neil Shapiro ** *but* when running as "smmsp" for the clientmqueue queue run 303840266059SGregory Neil Shapiro ** daemon. In that case, UseMSP will be true, RunAsUid should not 303940266059SGregory Neil Shapiro ** be root, and RealUid should be either 0 or RunAsUid. 304040266059SGregory Neil Shapiro */ 304140266059SGregory Neil Shapiro 304240266059SGregory Neil Shapiro drop = !(UseMSP && RunAsUid != 0 && 304340266059SGregory Neil Shapiro (RealUid == 0 || RealUid == RunAsUid)); 304440266059SGregory Neil Shapiro 304540266059SGregory Neil Shapiro if (drop_privileges(drop) != EX_OK) 30468774250cSGregory Neil Shapiro { 30478774250cSGregory Neil Shapiro if (LogLevel > 0) 30488774250cSGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, 304940266059SGregory Neil Shapiro "could not drop privileges: %s", 305040266059SGregory Neil Shapiro sm_errstring(errno)); 305140266059SGregory Neil Shapiro finis(false, true, EX_OSERR); 305240266059SGregory Neil Shapiro /* NOTREACHED */ 30538774250cSGregory Neil Shapiro } 30548774250cSGregory Neil Shapiro 3055e92d3f3fSGregory Neil Shapiro sm_close_on_exec(STDERR_FILENO + 1, DtableSize); 30568774250cSGregory Neil Shapiro 305713058a91SGregory Neil Shapiro /* 305813058a91SGregory Neil Shapiro ** Need to allow signals before execve() to make them "harmless". 305913058a91SGregory Neil Shapiro ** However, the default action can be "terminate", so it isn't 306013058a91SGregory Neil Shapiro ** really harmless. Setting signals to IGN will cause them to be 306113058a91SGregory Neil Shapiro ** ignored in the new process to, so that isn't a good alternative. 306213058a91SGregory Neil Shapiro */ 306313058a91SGregory Neil Shapiro 306413058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGALRM, oalrm); 306513058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGCHLD, ignore); 306613058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGHUP, ignore); 306713058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGINT, ignore); 306813058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGPIPE, ignore); 306913058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGTERM, ignore); 307013058a91SGregory Neil Shapiro #ifdef SIGUSR1 307113058a91SGregory Neil Shapiro SM_NOOP_SIGNAL(SIGUSR1, ousr1); 307213058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 3073605302a5SGregory Neil Shapiro 3074605302a5SGregory Neil Shapiro /* Turn back on signals */ 307540266059SGregory Neil Shapiro sm_allsignals(false); 30768774250cSGregory Neil Shapiro 30778774250cSGregory Neil Shapiro (void) execve(SaveArgv[0], (ARGV_T) SaveArgv, (ARGV_T) ExternalEnviron); 30788774250cSGregory Neil Shapiro save_errno = errno; 30798774250cSGregory Neil Shapiro 308013058a91SGregory Neil Shapiro /* block signals again and restore needed signals */ 308140266059SGregory Neil Shapiro sm_allsignals(true); 308213058a91SGregory Neil Shapiro 308313058a91SGregory Neil Shapiro /* For finis() events */ 308440266059SGregory Neil Shapiro (void) sm_signal(SIGALRM, oalrm); 308513058a91SGregory Neil Shapiro 308613058a91SGregory Neil Shapiro #ifdef SIGUSR1 308713058a91SGregory Neil Shapiro /* For debugging finis() */ 308840266059SGregory Neil Shapiro (void) sm_signal(SIGUSR1, ousr1); 308913058a91SGregory Neil Shapiro #endif /* SIGUSR1 */ 30908774250cSGregory Neil Shapiro 30918774250cSGregory Neil Shapiro errno = save_errno; 30928774250cSGregory Neil Shapiro if (LogLevel > 0) 309340266059SGregory Neil Shapiro sm_syslog(LOG_ALERT, NOQID, "could not exec %s: %s", 309440266059SGregory Neil Shapiro SaveArgv[0], sm_errstring(errno)); 309540266059SGregory Neil Shapiro finis(false, true, EX_OSFILE); 309640266059SGregory Neil Shapiro /* NOTREACHED */ 30978774250cSGregory Neil Shapiro } 309840266059SGregory Neil Shapiro /* 3099c2aa98e2SPeter Wemm ** MYHOSTNAME -- return the name of this host. 3100c2aa98e2SPeter Wemm ** 3101c2aa98e2SPeter Wemm ** Parameters: 3102c2aa98e2SPeter Wemm ** hostbuf -- a place to return the name of this host. 3103c2aa98e2SPeter Wemm ** size -- the size of hostbuf. 3104c2aa98e2SPeter Wemm ** 3105c2aa98e2SPeter Wemm ** Returns: 3106c2aa98e2SPeter Wemm ** A list of aliases for this host. 3107c2aa98e2SPeter Wemm ** 3108c2aa98e2SPeter Wemm ** Side Effects: 3109c2aa98e2SPeter Wemm ** Adds numeric codes to $=w. 3110c2aa98e2SPeter Wemm */ 3111c2aa98e2SPeter Wemm 3112c2aa98e2SPeter Wemm struct hostent * 3113c2aa98e2SPeter Wemm myhostname(hostbuf, size) 3114c2aa98e2SPeter Wemm char hostbuf[]; 3115c2aa98e2SPeter Wemm int size; 3116c2aa98e2SPeter Wemm { 3117c2aa98e2SPeter Wemm register struct hostent *hp; 3118c2aa98e2SPeter Wemm 3119602a2b1bSGregory Neil Shapiro if (gethostname(hostbuf, size) < 0 || hostbuf[0] == '\0') 312040266059SGregory Neil Shapiro (void) sm_strlcpy(hostbuf, "localhost", size); 312106f25ae9SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, InetMode); 312213058a91SGregory Neil Shapiro #if NETINET && NETINET6 312313058a91SGregory Neil Shapiro if (hp == NULL && InetMode == AF_INET6) 312413058a91SGregory Neil Shapiro { 312513058a91SGregory Neil Shapiro /* 312613058a91SGregory Neil Shapiro ** It's possible that this IPv6 enabled machine doesn't 312713058a91SGregory Neil Shapiro ** actually have any IPv6 interfaces and, therefore, no 312813058a91SGregory Neil Shapiro ** IPv6 addresses. Fall back to AF_INET. 312913058a91SGregory Neil Shapiro */ 313013058a91SGregory Neil Shapiro 313113058a91SGregory Neil Shapiro hp = sm_gethostbyname(hostbuf, AF_INET); 313213058a91SGregory Neil Shapiro } 313313058a91SGregory Neil Shapiro #endif /* NETINET && NETINET6 */ 3134c2aa98e2SPeter Wemm if (hp == NULL) 3135c2aa98e2SPeter Wemm return NULL; 3136c2aa98e2SPeter Wemm if (strchr(hp->h_name, '.') != NULL || strchr(hostbuf, '.') == NULL) 313706f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, hp->h_name, size); 313806f25ae9SGregory Neil Shapiro 313906f25ae9SGregory Neil Shapiro #if NETINFO 314006f25ae9SGregory Neil Shapiro if (strchr(hostbuf, '.') == NULL) 3141c2aa98e2SPeter Wemm { 314206f25ae9SGregory Neil Shapiro char *domainname; 314306f25ae9SGregory Neil Shapiro 314406f25ae9SGregory Neil Shapiro domainname = ni_propval("/locations", NULL, "resolver", 314506f25ae9SGregory Neil Shapiro "domain", '\0'); 314606f25ae9SGregory Neil Shapiro if (domainname != NULL && 314706f25ae9SGregory Neil Shapiro strlen(domainname) + strlen(hostbuf) + 1 < size) 314840266059SGregory Neil Shapiro (void) sm_strlcat2(hostbuf, ".", domainname, size); 314906f25ae9SGregory Neil Shapiro } 315006f25ae9SGregory Neil Shapiro #endif /* NETINFO */ 3151c2aa98e2SPeter Wemm 3152c2aa98e2SPeter Wemm /* 3153c2aa98e2SPeter Wemm ** If there is still no dot in the name, try looking for a 3154c2aa98e2SPeter Wemm ** dotted alias. 3155c2aa98e2SPeter Wemm */ 3156c2aa98e2SPeter Wemm 3157c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL) 3158c2aa98e2SPeter Wemm { 3159c2aa98e2SPeter Wemm char **ha; 3160c2aa98e2SPeter Wemm 316106f25ae9SGregory Neil Shapiro for (ha = hp->h_aliases; ha != NULL && *ha != NULL; ha++) 3162c2aa98e2SPeter Wemm { 3163c2aa98e2SPeter Wemm if (strchr(*ha, '.') != NULL) 3164c2aa98e2SPeter Wemm { 316506f25ae9SGregory Neil Shapiro (void) cleanstrcpy(hostbuf, *ha, size - 1); 3166c2aa98e2SPeter Wemm hostbuf[size - 1] = '\0'; 3167c2aa98e2SPeter Wemm break; 3168c2aa98e2SPeter Wemm } 3169c2aa98e2SPeter Wemm } 3170c2aa98e2SPeter Wemm } 3171c2aa98e2SPeter Wemm 3172c2aa98e2SPeter Wemm /* 3173c2aa98e2SPeter Wemm ** If _still_ no dot, wait for a while and try again -- it is 3174c2aa98e2SPeter Wemm ** possible that some service is starting up. This can result 3175c2aa98e2SPeter Wemm ** in excessive delays if the system is badly configured, but 3176c2aa98e2SPeter Wemm ** there really isn't a way around that, particularly given that 3177c2aa98e2SPeter Wemm ** the config file hasn't been read at this point. 3178c2aa98e2SPeter Wemm ** All in all, a bit of a mess. 3179c2aa98e2SPeter Wemm */ 3180c2aa98e2SPeter Wemm 3181c2aa98e2SPeter Wemm if (strchr(hostbuf, '.') == NULL && 318240266059SGregory Neil Shapiro !getcanonname(hostbuf, size, true, NULL)) 3183c2aa98e2SPeter Wemm { 3184c2aa98e2SPeter Wemm sm_syslog(LOG_CRIT, NOQID, 3185c2aa98e2SPeter Wemm "My unqualified host name (%s) unknown; sleeping for retry", 3186c2aa98e2SPeter Wemm hostbuf); 3187c2aa98e2SPeter Wemm message("My unqualified host name (%s) unknown; sleeping for retry", 3188c2aa98e2SPeter Wemm hostbuf); 318906f25ae9SGregory Neil Shapiro (void) sleep(60); 319040266059SGregory Neil Shapiro if (!getcanonname(hostbuf, size, true, NULL)) 3191c2aa98e2SPeter Wemm { 3192c2aa98e2SPeter Wemm sm_syslog(LOG_ALERT, NOQID, 3193c2aa98e2SPeter Wemm "unable to qualify my own domain name (%s) -- using short name", 3194c2aa98e2SPeter Wemm hostbuf); 3195c2aa98e2SPeter Wemm message("WARNING: unable to qualify my own domain name (%s) -- using short name", 3196c2aa98e2SPeter Wemm hostbuf); 3197c2aa98e2SPeter Wemm } 3198c2aa98e2SPeter Wemm } 319906f25ae9SGregory Neil Shapiro return hp; 3200c2aa98e2SPeter Wemm } 320140266059SGregory Neil Shapiro /* 3202c2aa98e2SPeter Wemm ** ADDRCMP -- compare two host addresses 3203c2aa98e2SPeter Wemm ** 3204c2aa98e2SPeter Wemm ** Parameters: 3205c2aa98e2SPeter Wemm ** hp -- hostent structure for the first address 3206c2aa98e2SPeter Wemm ** ha -- actual first address 3207c2aa98e2SPeter Wemm ** sa -- second address 3208c2aa98e2SPeter Wemm ** 3209c2aa98e2SPeter Wemm ** Returns: 3210c2aa98e2SPeter Wemm ** 0 -- if ha and sa match 3211c2aa98e2SPeter Wemm ** else -- they don't match 3212c2aa98e2SPeter Wemm */ 3213c2aa98e2SPeter Wemm 321406f25ae9SGregory Neil Shapiro static int 3215c2aa98e2SPeter Wemm addrcmp(hp, ha, sa) 3216c2aa98e2SPeter Wemm struct hostent *hp; 3217c2aa98e2SPeter Wemm char *ha; 3218c2aa98e2SPeter Wemm SOCKADDR *sa; 3219c2aa98e2SPeter Wemm { 322006f25ae9SGregory Neil Shapiro #if NETINET6 322140266059SGregory Neil Shapiro unsigned char *a; 322206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 322306f25ae9SGregory Neil Shapiro 3224c2aa98e2SPeter Wemm switch (sa->sa.sa_family) 3225c2aa98e2SPeter Wemm { 322606f25ae9SGregory Neil Shapiro #if NETINET 3227c2aa98e2SPeter Wemm case AF_INET: 3228c2aa98e2SPeter Wemm if (hp->h_addrtype == AF_INET) 322906f25ae9SGregory Neil Shapiro return memcmp(ha, (char *) &sa->sin.sin_addr, INADDRSZ); 3230c2aa98e2SPeter Wemm break; 323106f25ae9SGregory Neil Shapiro #endif /* NETINET */ 3232c2aa98e2SPeter Wemm 323306f25ae9SGregory Neil Shapiro #if NETINET6 323406f25ae9SGregory Neil Shapiro case AF_INET6: 323540266059SGregory Neil Shapiro a = (unsigned char *) &sa->sin6.sin6_addr; 323606f25ae9SGregory Neil Shapiro 323706f25ae9SGregory Neil Shapiro /* Straight binary comparison */ 323806f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET6) 323906f25ae9SGregory Neil Shapiro return memcmp(ha, a, IN6ADDRSZ); 324006f25ae9SGregory Neil Shapiro 324106f25ae9SGregory Neil Shapiro /* If IPv4-mapped IPv6 address, compare the IPv4 section */ 324206f25ae9SGregory Neil Shapiro if (hp->h_addrtype == AF_INET && 324306f25ae9SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&sa->sin6.sin6_addr)) 324406f25ae9SGregory Neil Shapiro return memcmp(a + IN6ADDRSZ - INADDRSZ, ha, INADDRSZ); 324506f25ae9SGregory Neil Shapiro break; 324606f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 3247c2aa98e2SPeter Wemm } 3248c2aa98e2SPeter Wemm return -1; 3249c2aa98e2SPeter Wemm } 325040266059SGregory Neil Shapiro /* 325106f25ae9SGregory Neil Shapiro ** GETAUTHINFO -- get the real host name associated with a file descriptor 3252c2aa98e2SPeter Wemm ** 3253c2aa98e2SPeter Wemm ** Uses RFC1413 protocol to try to get info from the other end. 3254c2aa98e2SPeter Wemm ** 3255c2aa98e2SPeter Wemm ** Parameters: 3256c2aa98e2SPeter Wemm ** fd -- the descriptor 325740266059SGregory Neil Shapiro ** may_be_forged -- an outage that is set to true if the 3258c2aa98e2SPeter Wemm ** forward lookup of RealHostName does not match 325940266059SGregory Neil Shapiro ** RealHostAddr; set to false if they do match. 3260c2aa98e2SPeter Wemm ** 3261c2aa98e2SPeter Wemm ** Returns: 3262c2aa98e2SPeter Wemm ** The user@host information associated with this descriptor. 3263c2aa98e2SPeter Wemm */ 3264c2aa98e2SPeter Wemm 3265c2aa98e2SPeter Wemm static jmp_buf CtxAuthTimeout; 3266c2aa98e2SPeter Wemm 3267c2aa98e2SPeter Wemm static void 3268b6bacd31SGregory Neil Shapiro authtimeout(ignore) 3269b6bacd31SGregory Neil Shapiro int ignore; 3270c2aa98e2SPeter Wemm { 32718774250cSGregory Neil Shapiro /* 32728774250cSGregory Neil Shapiro ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 32738774250cSGregory Neil Shapiro ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 32748774250cSGregory Neil Shapiro ** DOING. 32758774250cSGregory Neil Shapiro */ 32768774250cSGregory Neil Shapiro 32778774250cSGregory Neil Shapiro errno = ETIMEDOUT; 3278c2aa98e2SPeter Wemm longjmp(CtxAuthTimeout, 1); 3279c2aa98e2SPeter Wemm } 3280c2aa98e2SPeter Wemm 3281c2aa98e2SPeter Wemm char * 3282c2aa98e2SPeter Wemm getauthinfo(fd, may_be_forged) 3283c2aa98e2SPeter Wemm int fd; 3284c2aa98e2SPeter Wemm bool *may_be_forged; 3285c2aa98e2SPeter Wemm { 328640266059SGregory Neil Shapiro unsigned short SM_NONVOLATILE port = 0; 3287c2aa98e2SPeter Wemm SOCKADDR_LEN_T falen; 3288c2aa98e2SPeter Wemm register char *volatile p = NULL; 3289c2aa98e2SPeter Wemm SOCKADDR la; 3290c2aa98e2SPeter Wemm SOCKADDR_LEN_T lalen; 329140266059SGregory Neil Shapiro #ifndef NO_GETSERVBYNAME 3292c2aa98e2SPeter Wemm register struct servent *sp; 329340266059SGregory Neil Shapiro # if NETINET 329440266059SGregory Neil Shapiro static unsigned short port4 = 0; 329540266059SGregory Neil Shapiro # endif /* NETINET */ 329640266059SGregory Neil Shapiro # if NETINET6 329740266059SGregory Neil Shapiro static unsigned short port6 = 0; 329840266059SGregory Neil Shapiro # endif /* NETINET6 */ 329940266059SGregory Neil Shapiro #endif /* ! NO_GETSERVBYNAME */ 3300c2aa98e2SPeter Wemm volatile int s; 3301c2aa98e2SPeter Wemm int i = 0; 330240266059SGregory Neil Shapiro size_t len; 330340266059SGregory Neil Shapiro SM_EVENT *ev; 3304c2aa98e2SPeter Wemm int nleft; 3305c2aa98e2SPeter Wemm struct hostent *hp; 3306c2aa98e2SPeter Wemm char *ostype = NULL; 3307c2aa98e2SPeter Wemm char **ha; 3308c2aa98e2SPeter Wemm char ibuf[MAXNAME + 1]; 330913bd1963SGregory Neil Shapiro static char hbuf[MAXNAME + MAXAUTHINFO + 11]; 3310c2aa98e2SPeter Wemm 331140266059SGregory Neil Shapiro *may_be_forged = false; 3312c2aa98e2SPeter Wemm falen = sizeof RealHostAddr; 3313c2aa98e2SPeter Wemm if (isatty(fd) || (i = getpeername(fd, &RealHostAddr.sa, &falen)) < 0 || 3314c2aa98e2SPeter Wemm falen <= 0 || RealHostAddr.sa.sa_family == 0) 3315c2aa98e2SPeter Wemm { 331606f25ae9SGregory Neil Shapiro if (i < 0) 331706f25ae9SGregory Neil Shapiro { 331806f25ae9SGregory Neil Shapiro /* 331906f25ae9SGregory Neil Shapiro ** ENOTSOCK is OK: bail on anything else, but reset 332006f25ae9SGregory Neil Shapiro ** errno in this case, so a mis-report doesn't 332106f25ae9SGregory Neil Shapiro ** happen later. 332206f25ae9SGregory Neil Shapiro */ 332340266059SGregory Neil Shapiro 332406f25ae9SGregory Neil Shapiro if (errno != ENOTSOCK) 3325c2aa98e2SPeter Wemm return NULL; 332606f25ae9SGregory Neil Shapiro errno = 0; 332706f25ae9SGregory Neil Shapiro } 332840266059SGregory Neil Shapiro (void) sm_strlcpyn(hbuf, sizeof hbuf, 2, RealUserName, 332940266059SGregory Neil Shapiro "@localhost"); 3330c2aa98e2SPeter Wemm if (tTd(9, 1)) 333140266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3332c2aa98e2SPeter Wemm return hbuf; 3333c2aa98e2SPeter Wemm } 3334c2aa98e2SPeter Wemm 3335c2aa98e2SPeter Wemm if (RealHostName == NULL) 3336c2aa98e2SPeter Wemm { 3337c2aa98e2SPeter Wemm /* translate that to a host name */ 3338c2aa98e2SPeter Wemm RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr)); 3339c2aa98e2SPeter Wemm if (strlen(RealHostName) > MAXNAME) 334040266059SGregory Neil Shapiro RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */ 3341c2aa98e2SPeter Wemm } 3342c2aa98e2SPeter Wemm 3343c2aa98e2SPeter Wemm /* cross check RealHostName with forward DNS lookup */ 334440266059SGregory Neil Shapiro if (anynet_ntoa(&RealHostAddr)[0] != '[' && 334540266059SGregory Neil Shapiro RealHostName[0] != '[') 3346c2aa98e2SPeter Wemm { 334713058a91SGregory Neil Shapiro int family; 3348c2aa98e2SPeter Wemm 334913058a91SGregory Neil Shapiro family = RealHostAddr.sa.sa_family; 335013058a91SGregory Neil Shapiro #if NETINET6 && NEEDSGETIPNODE 335113058a91SGregory Neil Shapiro /* 335213058a91SGregory Neil Shapiro ** If RealHostAddr is an IPv6 connection with an 335313058a91SGregory Neil Shapiro ** IPv4-mapped address, we need RealHostName's IPv4 335413058a91SGregory Neil Shapiro ** address(es) for addrcmp() to compare against 335513058a91SGregory Neil Shapiro ** RealHostAddr. 335613058a91SGregory Neil Shapiro ** 335713058a91SGregory Neil Shapiro ** Actually, we only need to do this for systems 335813058a91SGregory Neil Shapiro ** which NEEDSGETIPNODE since the real getipnodebyname() 335913058a91SGregory Neil Shapiro ** already does V4MAPPED address via the AI_V4MAPPEDCFG 336013058a91SGregory Neil Shapiro ** flag. A better fix to this problem is to add this 336113058a91SGregory Neil Shapiro ** functionality to our stub getipnodebyname(). 336213058a91SGregory Neil Shapiro */ 336313058a91SGregory Neil Shapiro 336413058a91SGregory Neil Shapiro if (family == AF_INET6 && 336513058a91SGregory Neil Shapiro IN6_IS_ADDR_V4MAPPED(&RealHostAddr.sin6.sin6_addr)) 336613058a91SGregory Neil Shapiro family = AF_INET; 336713058a91SGregory Neil Shapiro #endif /* NETINET6 && NEEDSGETIPNODE */ 336813058a91SGregory Neil Shapiro 336913058a91SGregory Neil Shapiro /* try to match the reverse against the forward lookup */ 337013058a91SGregory Neil Shapiro hp = sm_gethostbyname(RealHostName, family); 3371c2aa98e2SPeter Wemm if (hp == NULL) 3372a7ec597cSGregory Neil Shapiro { 3373e92d3f3fSGregory Neil Shapiro /* XXX: Could be a temporary error on forward lookup */ 337440266059SGregory Neil Shapiro *may_be_forged = true; 3375a7ec597cSGregory Neil Shapiro } 3376c2aa98e2SPeter Wemm else 3377c2aa98e2SPeter Wemm { 3378c2aa98e2SPeter Wemm for (ha = hp->h_addr_list; *ha != NULL; ha++) 337940266059SGregory Neil Shapiro { 3380c2aa98e2SPeter Wemm if (addrcmp(hp, *ha, &RealHostAddr) == 0) 3381c2aa98e2SPeter Wemm break; 338240266059SGregory Neil Shapiro } 3383c2aa98e2SPeter Wemm *may_be_forged = *ha == NULL; 338440266059SGregory Neil Shapiro #if NETINET6 3385193538b7SGregory Neil Shapiro freehostent(hp); 3386193538b7SGregory Neil Shapiro hp = NULL; 338740266059SGregory Neil Shapiro #endif /* NETINET6 */ 3388c2aa98e2SPeter Wemm } 3389c2aa98e2SPeter Wemm } 3390c2aa98e2SPeter Wemm 3391c2aa98e2SPeter Wemm if (TimeOuts.to_ident == 0) 3392c2aa98e2SPeter Wemm goto noident; 3393c2aa98e2SPeter Wemm 3394c2aa98e2SPeter Wemm lalen = sizeof la; 339506f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 339606f25ae9SGregory Neil Shapiro { 339706f25ae9SGregory Neil Shapiro #if NETINET 339806f25ae9SGregory Neil Shapiro case AF_INET: 339906f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 340006f25ae9SGregory Neil Shapiro lalen <= 0 || 3401c2aa98e2SPeter Wemm la.sa.sa_family != AF_INET) 3402c2aa98e2SPeter Wemm { 3403c2aa98e2SPeter Wemm /* no ident info */ 3404c2aa98e2SPeter Wemm goto noident; 3405c2aa98e2SPeter Wemm } 340606f25ae9SGregory Neil Shapiro port = RealHostAddr.sin.sin_port; 3407c2aa98e2SPeter Wemm 3408c2aa98e2SPeter Wemm /* create ident query */ 340940266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 341006f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin.sin_port), 341106f25ae9SGregory Neil Shapiro ntohs(la.sin.sin_port)); 3412c2aa98e2SPeter Wemm 3413c2aa98e2SPeter Wemm /* create local address */ 3414c2aa98e2SPeter Wemm la.sin.sin_port = 0; 3415c2aa98e2SPeter Wemm 3416c2aa98e2SPeter Wemm /* create foreign address */ 341706f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 341806f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = htons(113); 341906f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 342040266059SGregory Neil Shapiro 342140266059SGregory Neil Shapiro /* 342240266059SGregory Neil Shapiro ** getservbyname() consumes about 5% of the time 342340266059SGregory Neil Shapiro ** when receiving a small message (almost all of the time 342440266059SGregory Neil Shapiro ** spent in this routine). 342540266059SGregory Neil Shapiro ** Hence we store the port in a static variable 342640266059SGregory Neil Shapiro ** to save this time. 342740266059SGregory Neil Shapiro ** The portnumber shouldn't change very often... 342840266059SGregory Neil Shapiro ** This code makes the assumption that the port number 342940266059SGregory Neil Shapiro ** is not 0. 343040266059SGregory Neil Shapiro */ 343140266059SGregory Neil Shapiro 343240266059SGregory Neil Shapiro if (port4 == 0) 343340266059SGregory Neil Shapiro { 3434c2aa98e2SPeter Wemm sp = getservbyname("auth", "tcp"); 3435c2aa98e2SPeter Wemm if (sp != NULL) 343640266059SGregory Neil Shapiro port4 = sp->s_port; 3437c2aa98e2SPeter Wemm else 343840266059SGregory Neil Shapiro port4 = htons(113); 343940266059SGregory Neil Shapiro } 344040266059SGregory Neil Shapiro RealHostAddr.sin.sin_port = port4; 344106f25ae9SGregory Neil Shapiro break; 344206f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 344306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 344406f25ae9SGregory Neil Shapiro 344506f25ae9SGregory Neil Shapiro #if NETINET6 344606f25ae9SGregory Neil Shapiro case AF_INET6: 344706f25ae9SGregory Neil Shapiro if (getsockname(fd, &la.sa, &lalen) < 0 || 344806f25ae9SGregory Neil Shapiro lalen <= 0 || 344906f25ae9SGregory Neil Shapiro la.sa.sa_family != AF_INET6) 345006f25ae9SGregory Neil Shapiro { 345106f25ae9SGregory Neil Shapiro /* no ident info */ 345206f25ae9SGregory Neil Shapiro goto noident; 345306f25ae9SGregory Neil Shapiro } 345406f25ae9SGregory Neil Shapiro port = RealHostAddr.sin6.sin6_port; 345506f25ae9SGregory Neil Shapiro 345606f25ae9SGregory Neil Shapiro /* create ident query */ 345740266059SGregory Neil Shapiro (void) sm_snprintf(ibuf, sizeof ibuf, "%d,%d\r\n", 345806f25ae9SGregory Neil Shapiro ntohs(RealHostAddr.sin6.sin6_port), 345906f25ae9SGregory Neil Shapiro ntohs(la.sin6.sin6_port)); 346006f25ae9SGregory Neil Shapiro 346106f25ae9SGregory Neil Shapiro /* create local address */ 346206f25ae9SGregory Neil Shapiro la.sin6.sin6_port = 0; 346306f25ae9SGregory Neil Shapiro 346406f25ae9SGregory Neil Shapiro /* create foreign address */ 346506f25ae9SGregory Neil Shapiro # ifdef NO_GETSERVBYNAME 346606f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = htons(113); 346706f25ae9SGregory Neil Shapiro # else /* NO_GETSERVBYNAME */ 346840266059SGregory Neil Shapiro if (port6 == 0) 346940266059SGregory Neil Shapiro { 347006f25ae9SGregory Neil Shapiro sp = getservbyname("auth", "tcp"); 347106f25ae9SGregory Neil Shapiro if (sp != NULL) 347240266059SGregory Neil Shapiro port6 = sp->s_port; 347306f25ae9SGregory Neil Shapiro else 347440266059SGregory Neil Shapiro port6 = htons(113); 347540266059SGregory Neil Shapiro } 347640266059SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port6; 347706f25ae9SGregory Neil Shapiro break; 347806f25ae9SGregory Neil Shapiro # endif /* NO_GETSERVBYNAME */ 347906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 348006f25ae9SGregory Neil Shapiro default: 348106f25ae9SGregory Neil Shapiro /* no ident info */ 348206f25ae9SGregory Neil Shapiro goto noident; 348306f25ae9SGregory Neil Shapiro } 3484c2aa98e2SPeter Wemm 3485c2aa98e2SPeter Wemm s = -1; 3486c2aa98e2SPeter Wemm if (setjmp(CtxAuthTimeout) != 0) 3487c2aa98e2SPeter Wemm { 3488c2aa98e2SPeter Wemm if (s >= 0) 3489c2aa98e2SPeter Wemm (void) close(s); 3490c2aa98e2SPeter Wemm goto noident; 3491c2aa98e2SPeter Wemm } 3492c2aa98e2SPeter Wemm 3493c2aa98e2SPeter Wemm /* put a timeout around the whole thing */ 349440266059SGregory Neil Shapiro ev = sm_setevent(TimeOuts.to_ident, authtimeout, 0); 3495c2aa98e2SPeter Wemm 3496c2aa98e2SPeter Wemm /* connect to foreign IDENT server using same address as SMTP socket */ 349706f25ae9SGregory Neil Shapiro s = socket(la.sa.sa_family, SOCK_STREAM, 0); 3498c2aa98e2SPeter Wemm if (s < 0) 3499c2aa98e2SPeter Wemm { 350040266059SGregory Neil Shapiro sm_clrevent(ev); 3501c2aa98e2SPeter Wemm goto noident; 3502c2aa98e2SPeter Wemm } 350306f25ae9SGregory Neil Shapiro if (bind(s, &la.sa, lalen) < 0 || 350406f25ae9SGregory Neil Shapiro connect(s, &RealHostAddr.sa, lalen) < 0) 3505c2aa98e2SPeter Wemm goto closeident; 3506c2aa98e2SPeter Wemm 3507c2aa98e2SPeter Wemm if (tTd(9, 10)) 350840266059SGregory Neil Shapiro sm_dprintf("getauthinfo: sent %s", ibuf); 3509c2aa98e2SPeter Wemm 3510c2aa98e2SPeter Wemm /* send query */ 3511c2aa98e2SPeter Wemm if (write(s, ibuf, strlen(ibuf)) < 0) 3512c2aa98e2SPeter Wemm goto closeident; 3513c2aa98e2SPeter Wemm 3514c2aa98e2SPeter Wemm /* get result */ 3515c2aa98e2SPeter Wemm p = &ibuf[0]; 3516c2aa98e2SPeter Wemm nleft = sizeof ibuf - 1; 3517c2aa98e2SPeter Wemm while ((i = read(s, p, nleft)) > 0) 3518c2aa98e2SPeter Wemm { 3519323f6dcbSGregory Neil Shapiro char *s; 3520323f6dcbSGregory Neil Shapiro 3521c2aa98e2SPeter Wemm p += i; 3522c2aa98e2SPeter Wemm nleft -= i; 3523c2aa98e2SPeter Wemm *p = '\0'; 3524323f6dcbSGregory Neil Shapiro if ((s = strchr(ibuf, '\n')) != NULL) 3525323f6dcbSGregory Neil Shapiro { 3526323f6dcbSGregory Neil Shapiro if (p > s + 1) 3527323f6dcbSGregory Neil Shapiro { 3528323f6dcbSGregory Neil Shapiro p = s + 1; 3529323f6dcbSGregory Neil Shapiro *p = '\0'; 3530323f6dcbSGregory Neil Shapiro } 3531323f6dcbSGregory Neil Shapiro break; 3532323f6dcbSGregory Neil Shapiro } 3533323f6dcbSGregory Neil Shapiro if (nleft <= 0) 3534c2aa98e2SPeter Wemm break; 3535c2aa98e2SPeter Wemm } 3536c2aa98e2SPeter Wemm (void) close(s); 353740266059SGregory Neil Shapiro sm_clrevent(ev); 3538c2aa98e2SPeter Wemm if (i < 0 || p == &ibuf[0]) 3539c2aa98e2SPeter Wemm goto noident; 3540c2aa98e2SPeter Wemm 3541d9986b26SGregory Neil Shapiro if (p >= &ibuf[2] && *--p == '\n' && *--p == '\r') 3542c2aa98e2SPeter Wemm p--; 3543c2aa98e2SPeter Wemm *++p = '\0'; 3544c2aa98e2SPeter Wemm 3545c2aa98e2SPeter Wemm if (tTd(9, 3)) 354640266059SGregory Neil Shapiro sm_dprintf("getauthinfo: got %s\n", ibuf); 3547c2aa98e2SPeter Wemm 3548c2aa98e2SPeter Wemm /* parse result */ 3549c2aa98e2SPeter Wemm p = strchr(ibuf, ':'); 3550c2aa98e2SPeter Wemm if (p == NULL) 3551c2aa98e2SPeter Wemm { 3552c2aa98e2SPeter Wemm /* malformed response */ 3553c2aa98e2SPeter Wemm goto noident; 3554c2aa98e2SPeter Wemm } 3555c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3556c2aa98e2SPeter Wemm continue; 355740266059SGregory Neil Shapiro if (sm_strncasecmp(p, "userid", 6) != 0) 3558c2aa98e2SPeter Wemm { 3559c2aa98e2SPeter Wemm /* presumably an error string */ 3560c2aa98e2SPeter Wemm goto noident; 3561c2aa98e2SPeter Wemm } 3562c2aa98e2SPeter Wemm p += 6; 3563c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3564c2aa98e2SPeter Wemm p++; 3565c2aa98e2SPeter Wemm if (*p++ != ':') 3566c2aa98e2SPeter Wemm { 3567c2aa98e2SPeter Wemm /* either useridxx or malformed response */ 3568c2aa98e2SPeter Wemm goto noident; 3569c2aa98e2SPeter Wemm } 3570c2aa98e2SPeter Wemm 3571c2aa98e2SPeter Wemm /* p now points to the OSTYPE field */ 3572c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 3573c2aa98e2SPeter Wemm p++; 3574c2aa98e2SPeter Wemm ostype = p; 3575c2aa98e2SPeter Wemm p = strchr(p, ':'); 3576c2aa98e2SPeter Wemm if (p == NULL) 3577c2aa98e2SPeter Wemm { 3578c2aa98e2SPeter Wemm /* malformed response */ 3579c2aa98e2SPeter Wemm goto noident; 3580c2aa98e2SPeter Wemm } 3581c2aa98e2SPeter Wemm else 3582c2aa98e2SPeter Wemm { 3583c2aa98e2SPeter Wemm char *charset; 3584c2aa98e2SPeter Wemm 3585c2aa98e2SPeter Wemm *p = '\0'; 3586c2aa98e2SPeter Wemm charset = strchr(ostype, ','); 3587c2aa98e2SPeter Wemm if (charset != NULL) 3588c2aa98e2SPeter Wemm *charset = '\0'; 3589c2aa98e2SPeter Wemm } 3590c2aa98e2SPeter Wemm 3591c2aa98e2SPeter Wemm /* 1413 says don't do this -- but it's broken otherwise */ 3592c2aa98e2SPeter Wemm while (isascii(*++p) && isspace(*p)) 3593c2aa98e2SPeter Wemm continue; 3594c2aa98e2SPeter Wemm 3595c2aa98e2SPeter Wemm /* p now points to the authenticated name -- copy carefully */ 359640266059SGregory Neil Shapiro if (sm_strncasecmp(ostype, "other", 5) == 0 && 3597c2aa98e2SPeter Wemm (ostype[5] == ' ' || ostype[5] == '\0')) 3598c2aa98e2SPeter Wemm { 359940266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, "IDENT:", sizeof hbuf); 360013bd1963SGregory Neil Shapiro cleanstrcpy(&hbuf[6], p, MAXAUTHINFO); 3601c2aa98e2SPeter Wemm } 3602c2aa98e2SPeter Wemm else 360313bd1963SGregory Neil Shapiro cleanstrcpy(hbuf, p, MAXAUTHINFO); 360440266059SGregory Neil Shapiro len = strlen(hbuf); 360540266059SGregory Neil Shapiro (void) sm_strlcpyn(&hbuf[len], sizeof hbuf - len, 2, "@", 3606c2aa98e2SPeter Wemm RealHostName == NULL ? "localhost" : RealHostName); 3607c2aa98e2SPeter Wemm goto postident; 3608c2aa98e2SPeter Wemm 3609c2aa98e2SPeter Wemm closeident: 3610c2aa98e2SPeter Wemm (void) close(s); 361140266059SGregory Neil Shapiro sm_clrevent(ev); 3612c2aa98e2SPeter Wemm 3613c2aa98e2SPeter Wemm noident: 361406f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 361506f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 361606f25ae9SGregory Neil Shapiro { 361706f25ae9SGregory Neil Shapiro #if NETINET 361806f25ae9SGregory Neil Shapiro case AF_INET: 361906f25ae9SGregory Neil Shapiro if (port > 0) 362006f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 362106f25ae9SGregory Neil Shapiro break; 362206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 362306f25ae9SGregory Neil Shapiro 362406f25ae9SGregory Neil Shapiro #if NETINET6 362506f25ae9SGregory Neil Shapiro case AF_INET6: 362606f25ae9SGregory Neil Shapiro if (port > 0) 362706f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 362806f25ae9SGregory Neil Shapiro break; 362906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 363006f25ae9SGregory Neil Shapiro } 363106f25ae9SGregory Neil Shapiro 3632c2aa98e2SPeter Wemm if (RealHostName == NULL) 3633c2aa98e2SPeter Wemm { 3634c2aa98e2SPeter Wemm if (tTd(9, 1)) 363540266059SGregory Neil Shapiro sm_dprintf("getauthinfo: NULL\n"); 3636c2aa98e2SPeter Wemm return NULL; 3637c2aa98e2SPeter Wemm } 363840266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, RealHostName, sizeof hbuf); 3639c2aa98e2SPeter Wemm 3640c2aa98e2SPeter Wemm postident: 3641c2aa98e2SPeter Wemm #if IP_SRCROUTE 3642c2aa98e2SPeter Wemm # ifndef GET_IPOPT_DST 3643c2aa98e2SPeter Wemm # define GET_IPOPT_DST(dst) (dst) 364406f25ae9SGregory Neil Shapiro # endif /* ! GET_IPOPT_DST */ 3645c2aa98e2SPeter Wemm /* 3646c2aa98e2SPeter Wemm ** Extract IP source routing information. 3647c2aa98e2SPeter Wemm ** 3648c2aa98e2SPeter Wemm ** Format of output for a connection from site a through b 3649c2aa98e2SPeter Wemm ** through c to d: 3650c2aa98e2SPeter Wemm ** loose: @site-c@site-b:site-a 3651c2aa98e2SPeter Wemm ** strict: !@site-c@site-b:site-a 3652c2aa98e2SPeter Wemm ** 3653c2aa98e2SPeter Wemm ** o - pointer within ipopt_list structure. 3654c2aa98e2SPeter Wemm ** q - pointer within ls/ss rr route data 3655c2aa98e2SPeter Wemm ** p - pointer to hbuf 3656c2aa98e2SPeter Wemm */ 3657c2aa98e2SPeter Wemm 3658c2aa98e2SPeter Wemm if (RealHostAddr.sa.sa_family == AF_INET) 3659c2aa98e2SPeter Wemm { 3660c2aa98e2SPeter Wemm SOCKOPT_LEN_T ipoptlen; 3661c2aa98e2SPeter Wemm int j; 366240266059SGregory Neil Shapiro unsigned char *q; 366340266059SGregory Neil Shapiro unsigned char *o; 3664c2aa98e2SPeter Wemm int l; 366506f25ae9SGregory Neil Shapiro struct IPOPTION ipopt; 3666c2aa98e2SPeter Wemm 3667c2aa98e2SPeter Wemm ipoptlen = sizeof ipopt; 3668c2aa98e2SPeter Wemm if (getsockopt(fd, IPPROTO_IP, IP_OPTIONS, 3669c2aa98e2SPeter Wemm (char *) &ipopt, &ipoptlen) < 0) 3670c2aa98e2SPeter Wemm goto noipsr; 3671c2aa98e2SPeter Wemm if (ipoptlen == 0) 3672c2aa98e2SPeter Wemm goto noipsr; 367340266059SGregory Neil Shapiro o = (unsigned char *) ipopt.IP_LIST; 367440266059SGregory Neil Shapiro while (o != NULL && o < (unsigned char *) &ipopt + ipoptlen) 3675c2aa98e2SPeter Wemm { 3676c2aa98e2SPeter Wemm switch (*o) 3677c2aa98e2SPeter Wemm { 3678c2aa98e2SPeter Wemm case IPOPT_EOL: 3679c2aa98e2SPeter Wemm o = NULL; 3680c2aa98e2SPeter Wemm break; 3681c2aa98e2SPeter Wemm 3682c2aa98e2SPeter Wemm case IPOPT_NOP: 3683c2aa98e2SPeter Wemm o++; 3684c2aa98e2SPeter Wemm break; 3685c2aa98e2SPeter Wemm 3686c2aa98e2SPeter Wemm case IPOPT_SSRR: 3687c2aa98e2SPeter Wemm case IPOPT_LSRR: 3688c2aa98e2SPeter Wemm /* 3689c2aa98e2SPeter Wemm ** Source routing. 3690c2aa98e2SPeter Wemm ** o[0] is the option type (loose/strict). 3691c2aa98e2SPeter Wemm ** o[1] is the length of this option, 3692c2aa98e2SPeter Wemm ** including option type and 3693c2aa98e2SPeter Wemm ** length. 3694c2aa98e2SPeter Wemm ** o[2] is the pointer into the route 3695c2aa98e2SPeter Wemm ** data. 3696c2aa98e2SPeter Wemm ** o[3] begins the route data. 3697c2aa98e2SPeter Wemm */ 3698c2aa98e2SPeter Wemm 3699c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 3700c2aa98e2SPeter Wemm l = sizeof hbuf - (hbuf - p) - 6; 370140266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), 370240266059SGregory Neil Shapiro " [%s@%.*s", 3703c2aa98e2SPeter Wemm *o == IPOPT_SSRR ? "!" : "", 3704c2aa98e2SPeter Wemm l > 240 ? 120 : l / 2, 370506f25ae9SGregory Neil Shapiro inet_ntoa(GET_IPOPT_DST(ipopt.IP_DST))); 3706c2aa98e2SPeter Wemm i = strlen(p); 3707c2aa98e2SPeter Wemm p += i; 3708c2aa98e2SPeter Wemm l -= strlen(p); 3709c2aa98e2SPeter Wemm 3710c2aa98e2SPeter Wemm j = o[1] / sizeof(struct in_addr) - 1; 3711c2aa98e2SPeter Wemm 3712c2aa98e2SPeter Wemm /* q skips length and router pointer to data */ 3713c2aa98e2SPeter Wemm q = &o[3]; 3714c2aa98e2SPeter Wemm for ( ; j >= 0; j--) 3715c2aa98e2SPeter Wemm { 371606f25ae9SGregory Neil Shapiro struct in_addr addr; 371706f25ae9SGregory Neil Shapiro 3718c2aa98e2SPeter Wemm memcpy(&addr, q, sizeof(addr)); 371940266059SGregory Neil Shapiro (void) sm_snprintf(p, 372040266059SGregory Neil Shapiro SPACELEFT(hbuf, p), 3721c2aa98e2SPeter Wemm "%c%.*s", 3722c2aa98e2SPeter Wemm j != 0 ? '@' : ':', 3723c2aa98e2SPeter Wemm l > 240 ? 120 : 3724c2aa98e2SPeter Wemm j == 0 ? l : l / 2, 3725c2aa98e2SPeter Wemm inet_ntoa(addr)); 3726c2aa98e2SPeter Wemm i = strlen(p); 3727c2aa98e2SPeter Wemm p += i; 3728c2aa98e2SPeter Wemm l -= i + 1; 3729c2aa98e2SPeter Wemm q += sizeof(struct in_addr); 3730c2aa98e2SPeter Wemm } 3731c2aa98e2SPeter Wemm o += o[1]; 3732c2aa98e2SPeter Wemm break; 3733c2aa98e2SPeter Wemm 3734c2aa98e2SPeter Wemm default: 3735c2aa98e2SPeter Wemm /* Skip over option */ 3736c2aa98e2SPeter Wemm o += o[1]; 3737c2aa98e2SPeter Wemm break; 3738c2aa98e2SPeter Wemm } 3739c2aa98e2SPeter Wemm } 374040266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), "]"); 3741c2aa98e2SPeter Wemm goto postipsr; 3742c2aa98e2SPeter Wemm } 3743c2aa98e2SPeter Wemm 3744c2aa98e2SPeter Wemm noipsr: 374506f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 3746c2aa98e2SPeter Wemm if (RealHostName != NULL && RealHostName[0] != '[') 3747c2aa98e2SPeter Wemm { 3748c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 374940266059SGregory Neil Shapiro (void) sm_snprintf(p, SPACELEFT(hbuf, p), " [%.100s]", 3750c2aa98e2SPeter Wemm anynet_ntoa(&RealHostAddr)); 3751c2aa98e2SPeter Wemm } 3752c2aa98e2SPeter Wemm if (*may_be_forged) 3753c2aa98e2SPeter Wemm { 3754c2aa98e2SPeter Wemm p = &hbuf[strlen(hbuf)]; 375540266059SGregory Neil Shapiro (void) sm_strlcpy(p, " (may be forged)", SPACELEFT(hbuf, p)); 375640266059SGregory Neil Shapiro macdefine(&BlankEnvelope.e_macro, A_PERM, 375740266059SGregory Neil Shapiro macid("{client_resolve}"), "FORGED"); 3758c2aa98e2SPeter Wemm } 3759c2aa98e2SPeter Wemm 3760c2aa98e2SPeter Wemm #if IP_SRCROUTE 3761c2aa98e2SPeter Wemm postipsr: 376206f25ae9SGregory Neil Shapiro #endif /* IP_SRCROUTE */ 376306f25ae9SGregory Neil Shapiro 376406f25ae9SGregory Neil Shapiro /* put back the original incoming port */ 376506f25ae9SGregory Neil Shapiro switch (RealHostAddr.sa.sa_family) 376606f25ae9SGregory Neil Shapiro { 376706f25ae9SGregory Neil Shapiro #if NETINET 376806f25ae9SGregory Neil Shapiro case AF_INET: 376906f25ae9SGregory Neil Shapiro if (port > 0) 377006f25ae9SGregory Neil Shapiro RealHostAddr.sin.sin_port = port; 377106f25ae9SGregory Neil Shapiro break; 377206f25ae9SGregory Neil Shapiro #endif /* NETINET */ 377306f25ae9SGregory Neil Shapiro 377406f25ae9SGregory Neil Shapiro #if NETINET6 377506f25ae9SGregory Neil Shapiro case AF_INET6: 377606f25ae9SGregory Neil Shapiro if (port > 0) 377706f25ae9SGregory Neil Shapiro RealHostAddr.sin6.sin6_port = port; 377806f25ae9SGregory Neil Shapiro break; 377906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 378006f25ae9SGregory Neil Shapiro } 378106f25ae9SGregory Neil Shapiro 378240266059SGregory Neil Shapiro if (tTd(9, 1)) 378340266059SGregory Neil Shapiro sm_dprintf("getauthinfo: %s\n", hbuf); 3784c2aa98e2SPeter Wemm return hbuf; 3785c2aa98e2SPeter Wemm } 378640266059SGregory Neil Shapiro /* 3787c2aa98e2SPeter Wemm ** HOST_MAP_LOOKUP -- turn a hostname into canonical form 3788c2aa98e2SPeter Wemm ** 3789c2aa98e2SPeter Wemm ** Parameters: 3790c2aa98e2SPeter Wemm ** map -- a pointer to this map. 3791c2aa98e2SPeter Wemm ** name -- the (presumably unqualified) hostname. 3792c2aa98e2SPeter Wemm ** av -- unused -- for compatibility with other mapping 3793c2aa98e2SPeter Wemm ** functions. 3794c2aa98e2SPeter Wemm ** statp -- an exit status (out parameter) -- set to 3795c2aa98e2SPeter Wemm ** EX_TEMPFAIL if the name server is unavailable. 3796c2aa98e2SPeter Wemm ** 3797c2aa98e2SPeter Wemm ** Returns: 3798c2aa98e2SPeter Wemm ** The mapping, if found. 3799c2aa98e2SPeter Wemm ** NULL if no mapping found. 3800c2aa98e2SPeter Wemm ** 3801c2aa98e2SPeter Wemm ** Side Effects: 3802c2aa98e2SPeter Wemm ** Looks up the host specified in hbuf. If it is not 3803c2aa98e2SPeter Wemm ** the canonical name for that host, return the canonical 3804c2aa98e2SPeter Wemm ** name (unless MF_MATCHONLY is set, which will cause the 3805c2aa98e2SPeter Wemm ** status only to be returned). 3806c2aa98e2SPeter Wemm */ 3807c2aa98e2SPeter Wemm 3808c2aa98e2SPeter Wemm char * 3809c2aa98e2SPeter Wemm host_map_lookup(map, name, av, statp) 3810c2aa98e2SPeter Wemm MAP *map; 3811c2aa98e2SPeter Wemm char *name; 3812c2aa98e2SPeter Wemm char **av; 3813c2aa98e2SPeter Wemm int *statp; 3814c2aa98e2SPeter Wemm { 3815c2aa98e2SPeter Wemm register struct hostent *hp; 381606f25ae9SGregory Neil Shapiro #if NETINET 3817c2aa98e2SPeter Wemm struct in_addr in_addr; 381806f25ae9SGregory Neil Shapiro #endif /* NETINET */ 381906f25ae9SGregory Neil Shapiro #if NETINET6 382006f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 382106f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 382206f25ae9SGregory Neil Shapiro char *cp, *ans = NULL; 3823c2aa98e2SPeter Wemm register STAB *s; 382440266059SGregory Neil Shapiro time_t now; 382540266059SGregory Neil Shapiro #if NAMED_BIND 382640266059SGregory Neil Shapiro time_t SM_NONVOLATILE retrans = 0; 382740266059SGregory Neil Shapiro int SM_NONVOLATILE retry = 0; 382840266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 3829c2aa98e2SPeter Wemm char hbuf[MAXNAME + 1]; 3830c2aa98e2SPeter Wemm 3831c2aa98e2SPeter Wemm /* 3832c2aa98e2SPeter Wemm ** See if we have already looked up this name. If so, just 383340266059SGregory Neil Shapiro ** return it (unless expired). 3834c2aa98e2SPeter Wemm */ 3835c2aa98e2SPeter Wemm 383640266059SGregory Neil Shapiro now = curtime(); 3837c2aa98e2SPeter Wemm s = stab(name, ST_NAMECANON, ST_ENTER); 383840266059SGregory Neil Shapiro if (bitset(NCF_VALID, s->s_namecanon.nc_flags) && 383940266059SGregory Neil Shapiro s->s_namecanon.nc_exp >= now) 3840c2aa98e2SPeter Wemm { 3841c2aa98e2SPeter Wemm if (tTd(9, 1)) 384240266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => CACHE %s\n", 3843c2aa98e2SPeter Wemm name, 3844c2aa98e2SPeter Wemm s->s_namecanon.nc_cname == NULL 3845c2aa98e2SPeter Wemm ? "NULL" 3846c2aa98e2SPeter Wemm : s->s_namecanon.nc_cname); 3847c2aa98e2SPeter Wemm errno = s->s_namecanon.nc_errno; 3848602a2b1bSGregory Neil Shapiro SM_SET_H_ERRNO(s->s_namecanon.nc_herrno); 3849c2aa98e2SPeter Wemm *statp = s->s_namecanon.nc_stat; 3850c2aa98e2SPeter Wemm if (*statp == EX_TEMPFAIL) 3851c2aa98e2SPeter Wemm { 3852c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 3853c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 3854c2aa98e2SPeter Wemm shortenstring(name, 33)); 3855c2aa98e2SPeter Wemm } 3856c2aa98e2SPeter Wemm if (*statp != EX_OK) 3857c2aa98e2SPeter Wemm return NULL; 3858c2aa98e2SPeter Wemm if (s->s_namecanon.nc_cname == NULL) 3859c2aa98e2SPeter Wemm { 3860c2aa98e2SPeter Wemm syserr("host_map_lookup(%s): bogus NULL cache entry, errno=%d, h_errno=%d", 3861c2aa98e2SPeter Wemm name, 3862c2aa98e2SPeter Wemm s->s_namecanon.nc_errno, 3863c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno); 3864c2aa98e2SPeter Wemm return NULL; 3865c2aa98e2SPeter Wemm } 3866c2aa98e2SPeter Wemm if (bitset(MF_MATCHONLY, map->map_mflags)) 3867c2aa98e2SPeter Wemm cp = map_rewrite(map, name, strlen(name), NULL); 3868c2aa98e2SPeter Wemm else 3869c2aa98e2SPeter Wemm cp = map_rewrite(map, 3870c2aa98e2SPeter Wemm s->s_namecanon.nc_cname, 3871c2aa98e2SPeter Wemm strlen(s->s_namecanon.nc_cname), 3872c2aa98e2SPeter Wemm av); 3873c2aa98e2SPeter Wemm return cp; 3874c2aa98e2SPeter Wemm } 3875c2aa98e2SPeter Wemm 3876c2aa98e2SPeter Wemm /* 3877c2aa98e2SPeter Wemm ** If we are running without a regular network connection (usually 3878c2aa98e2SPeter Wemm ** dial-on-demand) and we are just queueing, we want to avoid DNS 3879c2aa98e2SPeter Wemm ** lookups because those could try to connect to a server. 3880c2aa98e2SPeter Wemm */ 3881c2aa98e2SPeter Wemm 388206f25ae9SGregory Neil Shapiro if (CurEnv->e_sendmode == SM_DEFER && 388306f25ae9SGregory Neil Shapiro bitset(MF_DEFER, map->map_mflags)) 3884c2aa98e2SPeter Wemm { 3885c2aa98e2SPeter Wemm if (tTd(9, 1)) 388640266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => DEFERRED\n", name); 3887c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 3888c2aa98e2SPeter Wemm return NULL; 3889c2aa98e2SPeter Wemm } 3890c2aa98e2SPeter Wemm 3891c2aa98e2SPeter Wemm /* 3892c2aa98e2SPeter Wemm ** If first character is a bracket, then it is an address 3893c2aa98e2SPeter Wemm ** lookup. Address is copied into a temporary buffer to 3894c2aa98e2SPeter Wemm ** strip the brackets and to preserve name if address is 3895c2aa98e2SPeter Wemm ** unknown. 3896c2aa98e2SPeter Wemm */ 3897c2aa98e2SPeter Wemm 389806f25ae9SGregory Neil Shapiro if (tTd(9, 1)) 389940266059SGregory Neil Shapiro sm_dprintf("host_map_lookup(%s) => ", name); 390040266059SGregory Neil Shapiro #if NAMED_BIND 390140266059SGregory Neil Shapiro if (map->map_timeout > 0) 390240266059SGregory Neil Shapiro { 390340266059SGregory Neil Shapiro retrans = _res.retrans; 390440266059SGregory Neil Shapiro _res.retrans = map->map_timeout; 390540266059SGregory Neil Shapiro } 390640266059SGregory Neil Shapiro if (map->map_retry > 0) 390740266059SGregory Neil Shapiro { 390840266059SGregory Neil Shapiro retry = _res.retry; 390940266059SGregory Neil Shapiro _res.retry = map->map_retry; 391040266059SGregory Neil Shapiro } 391140266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 391240266059SGregory Neil Shapiro 391340266059SGregory Neil Shapiro /* set default TTL */ 391440266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_DEFAULT_TTL; 3915c2aa98e2SPeter Wemm if (*name != '[') 3916c2aa98e2SPeter Wemm { 391740266059SGregory Neil Shapiro int ttl; 391840266059SGregory Neil Shapiro 391940266059SGregory Neil Shapiro (void) sm_strlcpy(hbuf, name, sizeof hbuf); 392040266059SGregory Neil Shapiro if (getcanonname(hbuf, sizeof hbuf - 1, !HasWildcardMX, &ttl)) 392140266059SGregory Neil Shapiro { 392206f25ae9SGregory Neil Shapiro ans = hbuf; 392340266059SGregory Neil Shapiro if (ttl > 0) 392440266059SGregory Neil Shapiro s->s_namecanon.nc_exp = now + SM_MIN(ttl, 392540266059SGregory Neil Shapiro SM_DEFAULT_TTL); 392640266059SGregory Neil Shapiro } 3927c2aa98e2SPeter Wemm } 3928c2aa98e2SPeter Wemm else 3929c2aa98e2SPeter Wemm { 393006f25ae9SGregory Neil Shapiro if ((cp = strchr(name, ']')) == NULL) 3931193538b7SGregory Neil Shapiro { 3932193538b7SGregory Neil Shapiro if (tTd(9, 1)) 393340266059SGregory Neil Shapiro sm_dprintf("FAILED\n"); 393406f25ae9SGregory Neil Shapiro return NULL; 3935193538b7SGregory Neil Shapiro } 393606f25ae9SGregory Neil Shapiro *cp = '\0'; 393706f25ae9SGregory Neil Shapiro 393806f25ae9SGregory Neil Shapiro hp = NULL; 393906f25ae9SGregory Neil Shapiro #if NETINET 394006f25ae9SGregory Neil Shapiro if ((in_addr.s_addr = inet_addr(&name[1])) != INADDR_NONE) 394106f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in_addr, 394206f25ae9SGregory Neil Shapiro INADDRSZ, AF_INET); 394306f25ae9SGregory Neil Shapiro #endif /* NETINET */ 394406f25ae9SGregory Neil Shapiro #if NETINET6 394506f25ae9SGregory Neil Shapiro if (hp == NULL && 394640266059SGregory Neil Shapiro anynet_pton(AF_INET6, &name[1], &in6_addr) == 1) 394706f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *)&in6_addr, 394806f25ae9SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 394906f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 395006f25ae9SGregory Neil Shapiro *cp = ']'; 395106f25ae9SGregory Neil Shapiro 395206f25ae9SGregory Neil Shapiro if (hp != NULL) 395306f25ae9SGregory Neil Shapiro { 395406f25ae9SGregory Neil Shapiro /* found a match -- copy out */ 395540266059SGregory Neil Shapiro ans = denlstring((char *) hp->h_name, true, true); 395640266059SGregory Neil Shapiro #if NETINET6 395740266059SGregory Neil Shapiro if (ans == hp->h_name) 395840266059SGregory Neil Shapiro { 395940266059SGregory Neil Shapiro static char n[MAXNAME + 1]; 396040266059SGregory Neil Shapiro 396140266059SGregory Neil Shapiro /* hp->h_name is about to disappear */ 396240266059SGregory Neil Shapiro (void) sm_strlcpy(n, ans, sizeof n); 396340266059SGregory Neil Shapiro ans = n; 396440266059SGregory Neil Shapiro } 3965193538b7SGregory Neil Shapiro freehostent(hp); 3966193538b7SGregory Neil Shapiro hp = NULL; 396740266059SGregory Neil Shapiro #endif /* NETINET6 */ 396806f25ae9SGregory Neil Shapiro } 396906f25ae9SGregory Neil Shapiro } 397040266059SGregory Neil Shapiro #if NAMED_BIND 397140266059SGregory Neil Shapiro if (map->map_timeout > 0) 397240266059SGregory Neil Shapiro _res.retrans = retrans; 397340266059SGregory Neil Shapiro if (map->map_retry > 0) 397440266059SGregory Neil Shapiro _res.retry = retry; 397540266059SGregory Neil Shapiro #endif /* NAMED_BIND */ 397606f25ae9SGregory Neil Shapiro 397706f25ae9SGregory Neil Shapiro s->s_namecanon.nc_flags |= NCF_VALID; /* will be soon */ 397806f25ae9SGregory Neil Shapiro 397906f25ae9SGregory Neil Shapiro /* Found an answer */ 398006f25ae9SGregory Neil Shapiro if (ans != NULL) 398106f25ae9SGregory Neil Shapiro { 398206f25ae9SGregory Neil Shapiro s->s_namecanon.nc_stat = *statp = EX_OK; 398340266059SGregory Neil Shapiro if (s->s_namecanon.nc_cname != NULL) 398440266059SGregory Neil Shapiro sm_free(s->s_namecanon.nc_cname); 398540266059SGregory Neil Shapiro s->s_namecanon.nc_cname = sm_strdup_x(ans); 398606f25ae9SGregory Neil Shapiro if (bitset(MF_MATCHONLY, map->map_mflags)) 398706f25ae9SGregory Neil Shapiro cp = map_rewrite(map, name, strlen(name), NULL); 398806f25ae9SGregory Neil Shapiro else 398906f25ae9SGregory Neil Shapiro cp = map_rewrite(map, ans, strlen(ans), av); 3990193538b7SGregory Neil Shapiro if (tTd(9, 1)) 399140266059SGregory Neil Shapiro sm_dprintf("FOUND %s\n", ans); 399206f25ae9SGregory Neil Shapiro return cp; 399306f25ae9SGregory Neil Shapiro } 399406f25ae9SGregory Neil Shapiro 399506f25ae9SGregory Neil Shapiro 399606f25ae9SGregory Neil Shapiro /* No match found */ 3997c2aa98e2SPeter Wemm s->s_namecanon.nc_errno = errno; 3998c2aa98e2SPeter Wemm #if NAMED_BIND 3999c2aa98e2SPeter Wemm s->s_namecanon.nc_herrno = h_errno; 4000c2aa98e2SPeter Wemm if (tTd(9, 1)) 400140266059SGregory Neil Shapiro sm_dprintf("FAIL (%d)\n", h_errno); 4002c2aa98e2SPeter Wemm switch (h_errno) 4003c2aa98e2SPeter Wemm { 4004c2aa98e2SPeter Wemm case TRY_AGAIN: 4005c2aa98e2SPeter Wemm if (UseNameServer) 4006c2aa98e2SPeter Wemm { 4007c2aa98e2SPeter Wemm CurEnv->e_status = "4.4.3"; 4008c2aa98e2SPeter Wemm message("851 %s: Name server timeout", 4009c2aa98e2SPeter Wemm shortenstring(name, 33)); 4010c2aa98e2SPeter Wemm } 4011c2aa98e2SPeter Wemm *statp = EX_TEMPFAIL; 4012c2aa98e2SPeter Wemm break; 4013c2aa98e2SPeter Wemm 4014c2aa98e2SPeter Wemm case HOST_NOT_FOUND: 4015c2aa98e2SPeter Wemm case NO_DATA: 4016c2aa98e2SPeter Wemm *statp = EX_NOHOST; 4017c2aa98e2SPeter Wemm break; 4018c2aa98e2SPeter Wemm 4019c2aa98e2SPeter Wemm case NO_RECOVERY: 4020c2aa98e2SPeter Wemm *statp = EX_SOFTWARE; 4021c2aa98e2SPeter Wemm break; 4022c2aa98e2SPeter Wemm 4023c2aa98e2SPeter Wemm default: 4024c2aa98e2SPeter Wemm *statp = EX_UNAVAILABLE; 4025c2aa98e2SPeter Wemm break; 4026c2aa98e2SPeter Wemm } 402706f25ae9SGregory Neil Shapiro #else /* NAMED_BIND */ 4028c2aa98e2SPeter Wemm if (tTd(9, 1)) 402940266059SGregory Neil Shapiro sm_dprintf("FAIL\n"); 4030c2aa98e2SPeter Wemm *statp = EX_NOHOST; 403106f25ae9SGregory Neil Shapiro #endif /* NAMED_BIND */ 4032c2aa98e2SPeter Wemm s->s_namecanon.nc_stat = *statp; 4033c2aa98e2SPeter Wemm return NULL; 4034c2aa98e2SPeter Wemm } 4035c2aa98e2SPeter Wemm /* 4036c2aa98e2SPeter Wemm ** HOST_MAP_INIT -- initialize host class structures 403740266059SGregory Neil Shapiro ** 403840266059SGregory Neil Shapiro ** Parameters: 403940266059SGregory Neil Shapiro ** map -- a pointer to this map. 404040266059SGregory Neil Shapiro ** args -- argument string. 404140266059SGregory Neil Shapiro ** 404240266059SGregory Neil Shapiro ** Returns: 404340266059SGregory Neil Shapiro ** true. 4044c2aa98e2SPeter Wemm */ 4045c2aa98e2SPeter Wemm 4046c2aa98e2SPeter Wemm bool 4047c2aa98e2SPeter Wemm host_map_init(map, args) 4048c2aa98e2SPeter Wemm MAP *map; 4049c2aa98e2SPeter Wemm char *args; 4050c2aa98e2SPeter Wemm { 4051c2aa98e2SPeter Wemm register char *p = args; 4052c2aa98e2SPeter Wemm 4053c2aa98e2SPeter Wemm for (;;) 4054c2aa98e2SPeter Wemm { 4055c2aa98e2SPeter Wemm while (isascii(*p) && isspace(*p)) 4056c2aa98e2SPeter Wemm p++; 4057c2aa98e2SPeter Wemm if (*p != '-') 4058c2aa98e2SPeter Wemm break; 4059c2aa98e2SPeter Wemm switch (*++p) 4060c2aa98e2SPeter Wemm { 4061c2aa98e2SPeter Wemm case 'a': 4062c2aa98e2SPeter Wemm map->map_app = ++p; 4063c2aa98e2SPeter Wemm break; 4064c2aa98e2SPeter Wemm 4065c2aa98e2SPeter Wemm case 'T': 4066c2aa98e2SPeter Wemm map->map_tapp = ++p; 4067c2aa98e2SPeter Wemm break; 4068c2aa98e2SPeter Wemm 4069c2aa98e2SPeter Wemm case 'm': 4070c2aa98e2SPeter Wemm map->map_mflags |= MF_MATCHONLY; 4071c2aa98e2SPeter Wemm break; 4072c2aa98e2SPeter Wemm 4073c2aa98e2SPeter Wemm case 't': 4074c2aa98e2SPeter Wemm map->map_mflags |= MF_NODEFER; 4075c2aa98e2SPeter Wemm break; 407606f25ae9SGregory Neil Shapiro 407706f25ae9SGregory Neil Shapiro case 'S': /* only for consistency */ 407806f25ae9SGregory Neil Shapiro map->map_spacesub = *++p; 407906f25ae9SGregory Neil Shapiro break; 408006f25ae9SGregory Neil Shapiro 408106f25ae9SGregory Neil Shapiro case 'D': 408206f25ae9SGregory Neil Shapiro map->map_mflags |= MF_DEFER; 408306f25ae9SGregory Neil Shapiro break; 408440266059SGregory Neil Shapiro 408540266059SGregory Neil Shapiro case 'd': 408640266059SGregory Neil Shapiro { 408740266059SGregory Neil Shapiro char *h; 408840266059SGregory Neil Shapiro 408940266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 409040266059SGregory Neil Shapiro continue; 409140266059SGregory Neil Shapiro h = strchr(p, ' '); 409240266059SGregory Neil Shapiro if (h != NULL) 409340266059SGregory Neil Shapiro *h = '\0'; 409440266059SGregory Neil Shapiro map->map_timeout = convtime(p, 's'); 409540266059SGregory Neil Shapiro if (h != NULL) 409640266059SGregory Neil Shapiro *h = ' '; 409740266059SGregory Neil Shapiro } 409840266059SGregory Neil Shapiro break; 409940266059SGregory Neil Shapiro 410040266059SGregory Neil Shapiro case 'r': 410140266059SGregory Neil Shapiro while (isascii(*++p) && isspace(*p)) 410240266059SGregory Neil Shapiro continue; 410340266059SGregory Neil Shapiro map->map_retry = atoi(p); 410440266059SGregory Neil Shapiro break; 4105c2aa98e2SPeter Wemm } 4106c2aa98e2SPeter Wemm while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4107c2aa98e2SPeter Wemm p++; 4108c2aa98e2SPeter Wemm if (*p != '\0') 4109c2aa98e2SPeter Wemm *p++ = '\0'; 4110c2aa98e2SPeter Wemm } 4111c2aa98e2SPeter Wemm if (map->map_app != NULL) 4112c2aa98e2SPeter Wemm map->map_app = newstr(map->map_app); 4113c2aa98e2SPeter Wemm if (map->map_tapp != NULL) 4114c2aa98e2SPeter Wemm map->map_tapp = newstr(map->map_tapp); 411540266059SGregory Neil Shapiro return true; 4116c2aa98e2SPeter Wemm } 411740266059SGregory Neil Shapiro 411806f25ae9SGregory Neil Shapiro #if NETINET6 411906f25ae9SGregory Neil Shapiro /* 412006f25ae9SGregory Neil Shapiro ** ANYNET_NTOP -- convert an IPv6 network address to printable form. 412106f25ae9SGregory Neil Shapiro ** 412206f25ae9SGregory Neil Shapiro ** Parameters: 412306f25ae9SGregory Neil Shapiro ** s6a -- a pointer to an in6_addr structure. 412406f25ae9SGregory Neil Shapiro ** dst -- buffer to store result in 412506f25ae9SGregory Neil Shapiro ** dst_len -- size of dst buffer 412606f25ae9SGregory Neil Shapiro ** 412706f25ae9SGregory Neil Shapiro ** Returns: 412806f25ae9SGregory Neil Shapiro ** A printable version of that structure. 412906f25ae9SGregory Neil Shapiro */ 413040266059SGregory Neil Shapiro 413106f25ae9SGregory Neil Shapiro char * 413206f25ae9SGregory Neil Shapiro anynet_ntop(s6a, dst, dst_len) 413306f25ae9SGregory Neil Shapiro struct in6_addr *s6a; 413406f25ae9SGregory Neil Shapiro char *dst; 413506f25ae9SGregory Neil Shapiro size_t dst_len; 413606f25ae9SGregory Neil Shapiro { 413706f25ae9SGregory Neil Shapiro register char *ap; 413806f25ae9SGregory Neil Shapiro 413906f25ae9SGregory Neil Shapiro if (IN6_IS_ADDR_V4MAPPED(s6a)) 414006f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET, 414106f25ae9SGregory Neil Shapiro &s6a->s6_addr[IN6ADDRSZ - INADDRSZ], 414206f25ae9SGregory Neil Shapiro dst, dst_len); 414306f25ae9SGregory Neil Shapiro else 414440266059SGregory Neil Shapiro { 414540266059SGregory Neil Shapiro char *d; 414640266059SGregory Neil Shapiro size_t sz; 414740266059SGregory Neil Shapiro 414840266059SGregory Neil Shapiro /* Save pointer to beginning of string */ 414940266059SGregory Neil Shapiro d = dst; 415040266059SGregory Neil Shapiro 415140266059SGregory Neil Shapiro /* Add IPv6: protocol tag */ 415240266059SGregory Neil Shapiro sz = sm_strlcpy(dst, "IPv6:", dst_len); 415340266059SGregory Neil Shapiro if (sz >= dst_len) 415440266059SGregory Neil Shapiro return NULL; 415540266059SGregory Neil Shapiro dst += sz; 415640266059SGregory Neil Shapiro dst_len -= sz; 415706f25ae9SGregory Neil Shapiro ap = (char *) inet_ntop(AF_INET6, s6a, dst, dst_len); 415840266059SGregory Neil Shapiro 415940266059SGregory Neil Shapiro /* Restore pointer to beginning of string */ 416040266059SGregory Neil Shapiro if (ap != NULL) 416140266059SGregory Neil Shapiro ap = d; 416240266059SGregory Neil Shapiro } 416306f25ae9SGregory Neil Shapiro return ap; 416406f25ae9SGregory Neil Shapiro } 416540266059SGregory Neil Shapiro 416640266059SGregory Neil Shapiro /* 416740266059SGregory Neil Shapiro ** ANYNET_PTON -- convert printed form to network address. 416840266059SGregory Neil Shapiro ** 416940266059SGregory Neil Shapiro ** Wrapper for inet_pton() which handles IPv6: labels. 417040266059SGregory Neil Shapiro ** 417140266059SGregory Neil Shapiro ** Parameters: 417240266059SGregory Neil Shapiro ** family -- address family 417340266059SGregory Neil Shapiro ** src -- string 417440266059SGregory Neil Shapiro ** dst -- destination address structure 417540266059SGregory Neil Shapiro ** 417640266059SGregory Neil Shapiro ** Returns: 417740266059SGregory Neil Shapiro ** 1 if the address was valid 417840266059SGregory Neil Shapiro ** 0 if the address wasn't parseable 417940266059SGregory Neil Shapiro ** -1 if error 418040266059SGregory Neil Shapiro */ 418140266059SGregory Neil Shapiro 418240266059SGregory Neil Shapiro int 418340266059SGregory Neil Shapiro anynet_pton(family, src, dst) 418440266059SGregory Neil Shapiro int family; 418540266059SGregory Neil Shapiro const char *src; 418640266059SGregory Neil Shapiro void *dst; 418740266059SGregory Neil Shapiro { 418840266059SGregory Neil Shapiro if (family == AF_INET6 && sm_strncasecmp(src, "IPv6:", 5) == 0) 418940266059SGregory Neil Shapiro src += 5; 419040266059SGregory Neil Shapiro return inet_pton(family, src, dst); 419140266059SGregory Neil Shapiro } 419206f25ae9SGregory Neil Shapiro #endif /* NETINET6 */ 419340266059SGregory Neil Shapiro /* 4194c2aa98e2SPeter Wemm ** ANYNET_NTOA -- convert a network address to printable form. 4195c2aa98e2SPeter Wemm ** 4196c2aa98e2SPeter Wemm ** Parameters: 4197c2aa98e2SPeter Wemm ** sap -- a pointer to a sockaddr structure. 4198c2aa98e2SPeter Wemm ** 4199c2aa98e2SPeter Wemm ** Returns: 4200c2aa98e2SPeter Wemm ** A printable version of that sockaddr. 4201c2aa98e2SPeter Wemm */ 4202c2aa98e2SPeter Wemm 4203c2aa98e2SPeter Wemm #ifdef USE_SOCK_STREAM 4204c2aa98e2SPeter Wemm 4205c2aa98e2SPeter Wemm # if NETLINK 4206c2aa98e2SPeter Wemm # include <net/if_dl.h> 420706f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4208c2aa98e2SPeter Wemm 4209c2aa98e2SPeter Wemm char * 4210c2aa98e2SPeter Wemm anynet_ntoa(sap) 4211c2aa98e2SPeter Wemm register SOCKADDR *sap; 4212c2aa98e2SPeter Wemm { 4213c2aa98e2SPeter Wemm register char *bp; 4214c2aa98e2SPeter Wemm register char *ap; 4215c2aa98e2SPeter Wemm int l; 4216c2aa98e2SPeter Wemm static char buf[100]; 4217c2aa98e2SPeter Wemm 4218c2aa98e2SPeter Wemm /* check for null/zero family */ 4219c2aa98e2SPeter Wemm if (sap == NULL) 4220c2aa98e2SPeter Wemm return "NULLADDR"; 4221c2aa98e2SPeter Wemm if (sap->sa.sa_family == 0) 4222c2aa98e2SPeter Wemm return "0"; 4223c2aa98e2SPeter Wemm 4224c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4225c2aa98e2SPeter Wemm { 4226c2aa98e2SPeter Wemm # if NETUNIX 4227c2aa98e2SPeter Wemm case AF_UNIX: 4228c2aa98e2SPeter Wemm if (sap->sunix.sun_path[0] != '\0') 422940266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[UNIX: %.64s]", 4230c2aa98e2SPeter Wemm sap->sunix.sun_path); 4231c2aa98e2SPeter Wemm else 423240266059SGregory Neil Shapiro (void) sm_strlcpy(buf, "[UNIX: localhost]", sizeof buf); 4233c2aa98e2SPeter Wemm return buf; 423406f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4235c2aa98e2SPeter Wemm 4236c2aa98e2SPeter Wemm # if NETINET 4237c2aa98e2SPeter Wemm case AF_INET: 423806f25ae9SGregory Neil Shapiro return (char *) inet_ntoa(sap->sin.sin_addr); 423906f25ae9SGregory Neil Shapiro # endif /* NETINET */ 424006f25ae9SGregory Neil Shapiro 424106f25ae9SGregory Neil Shapiro # if NETINET6 424206f25ae9SGregory Neil Shapiro case AF_INET6: 424306f25ae9SGregory Neil Shapiro ap = anynet_ntop(&sap->sin6.sin6_addr, buf, sizeof buf); 424406f25ae9SGregory Neil Shapiro if (ap != NULL) 424506f25ae9SGregory Neil Shapiro return ap; 424606f25ae9SGregory Neil Shapiro break; 424706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4248c2aa98e2SPeter Wemm 4249c2aa98e2SPeter Wemm # if NETLINK 4250c2aa98e2SPeter Wemm case AF_LINK: 425140266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[LINK: %s]", 4252c2aa98e2SPeter Wemm link_ntoa((struct sockaddr_dl *) &sap->sa)); 4253c2aa98e2SPeter Wemm return buf; 425406f25ae9SGregory Neil Shapiro # endif /* NETLINK */ 4255c2aa98e2SPeter Wemm default: 4256c2aa98e2SPeter Wemm /* this case is needed when nothing is #defined */ 4257c2aa98e2SPeter Wemm /* in order to keep the switch syntactically correct */ 4258c2aa98e2SPeter Wemm break; 4259c2aa98e2SPeter Wemm } 4260c2aa98e2SPeter Wemm 4261c2aa98e2SPeter Wemm /* unknown family -- just dump bytes */ 426240266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "Family %d: ", sap->sa.sa_family); 4263c2aa98e2SPeter Wemm bp = &buf[strlen(buf)]; 4264c2aa98e2SPeter Wemm ap = sap->sa.sa_data; 4265c2aa98e2SPeter Wemm for (l = sizeof sap->sa.sa_data; --l >= 0; ) 4266c2aa98e2SPeter Wemm { 426740266059SGregory Neil Shapiro (void) sm_snprintf(bp, SPACELEFT(buf, bp), "%02x:", 426840266059SGregory Neil Shapiro *ap++ & 0377); 4269c2aa98e2SPeter Wemm bp += 3; 4270c2aa98e2SPeter Wemm } 4271c2aa98e2SPeter Wemm *--bp = '\0'; 4272c2aa98e2SPeter Wemm return buf; 4273c2aa98e2SPeter Wemm } 427440266059SGregory Neil Shapiro /* 4275c2aa98e2SPeter Wemm ** HOSTNAMEBYANYADDR -- return name of host based on address 4276c2aa98e2SPeter Wemm ** 4277c2aa98e2SPeter Wemm ** Parameters: 4278c2aa98e2SPeter Wemm ** sap -- SOCKADDR pointer 4279c2aa98e2SPeter Wemm ** 4280c2aa98e2SPeter Wemm ** Returns: 4281c2aa98e2SPeter Wemm ** text representation of host name. 4282c2aa98e2SPeter Wemm ** 4283c2aa98e2SPeter Wemm ** Side Effects: 4284c2aa98e2SPeter Wemm ** none. 4285c2aa98e2SPeter Wemm */ 4286c2aa98e2SPeter Wemm 4287c2aa98e2SPeter Wemm char * 4288c2aa98e2SPeter Wemm hostnamebyanyaddr(sap) 4289c2aa98e2SPeter Wemm register SOCKADDR *sap; 4290c2aa98e2SPeter Wemm { 4291c2aa98e2SPeter Wemm register struct hostent *hp; 429206f25ae9SGregory Neil Shapiro # if NAMED_BIND 4293c2aa98e2SPeter Wemm int saveretry; 429406f25ae9SGregory Neil Shapiro # endif /* NAMED_BIND */ 429506f25ae9SGregory Neil Shapiro # if NETINET6 429606f25ae9SGregory Neil Shapiro struct in6_addr in6_addr; 429706f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4298c2aa98e2SPeter Wemm 4299c2aa98e2SPeter Wemm # if NAMED_BIND 4300c2aa98e2SPeter Wemm /* shorten name server timeout to avoid higher level timeouts */ 4301c2aa98e2SPeter Wemm saveretry = _res.retry; 430206f25ae9SGregory Neil Shapiro if (_res.retry * _res.retrans > 20) 430306f25ae9SGregory Neil Shapiro _res.retry = 20 / _res.retrans; 4304c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4305c2aa98e2SPeter Wemm 4306c2aa98e2SPeter Wemm switch (sap->sa.sa_family) 4307c2aa98e2SPeter Wemm { 4308c2aa98e2SPeter Wemm # if NETINET 4309c2aa98e2SPeter Wemm case AF_INET: 4310c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->sin.sin_addr, 431140266059SGregory Neil Shapiro INADDRSZ, AF_INET); 4312c2aa98e2SPeter Wemm break; 431306f25ae9SGregory Neil Shapiro # endif /* NETINET */ 431406f25ae9SGregory Neil Shapiro 431506f25ae9SGregory Neil Shapiro # if NETINET6 431606f25ae9SGregory Neil Shapiro case AF_INET6: 431706f25ae9SGregory Neil Shapiro hp = sm_gethostbyaddr((char *) &sap->sin6.sin6_addr, 431840266059SGregory Neil Shapiro IN6ADDRSZ, AF_INET6); 431906f25ae9SGregory Neil Shapiro break; 432006f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 4321c2aa98e2SPeter Wemm 4322c2aa98e2SPeter Wemm # if NETISO 4323c2aa98e2SPeter Wemm case AF_ISO: 4324c2aa98e2SPeter Wemm hp = sm_gethostbyaddr((char *) &sap->siso.siso_addr, 432540266059SGregory Neil Shapiro sizeof sap->siso.siso_addr, AF_ISO); 4326c2aa98e2SPeter Wemm break; 432706f25ae9SGregory Neil Shapiro # endif /* NETISO */ 4328c2aa98e2SPeter Wemm 4329c2aa98e2SPeter Wemm # if NETUNIX 4330c2aa98e2SPeter Wemm case AF_UNIX: 4331c2aa98e2SPeter Wemm hp = NULL; 4332c2aa98e2SPeter Wemm break; 433306f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4334c2aa98e2SPeter Wemm 4335c2aa98e2SPeter Wemm default: 433640266059SGregory Neil Shapiro hp = sm_gethostbyaddr(sap->sa.sa_data, sizeof sap->sa.sa_data, 4337c2aa98e2SPeter Wemm sap->sa.sa_family); 4338c2aa98e2SPeter Wemm break; 4339c2aa98e2SPeter Wemm } 4340c2aa98e2SPeter Wemm 4341c2aa98e2SPeter Wemm # if NAMED_BIND 4342c2aa98e2SPeter Wemm _res.retry = saveretry; 4343c2aa98e2SPeter Wemm # endif /* NAMED_BIND */ 4344c2aa98e2SPeter Wemm 434506f25ae9SGregory Neil Shapiro # if NETINET || NETINET6 434606f25ae9SGregory Neil Shapiro if (hp != NULL && hp->h_name[0] != '[' 434706f25ae9SGregory Neil Shapiro # if NETINET6 434806f25ae9SGregory Neil Shapiro && inet_pton(AF_INET6, hp->h_name, &in6_addr) != 1 434906f25ae9SGregory Neil Shapiro # endif /* NETINET6 */ 435006f25ae9SGregory Neil Shapiro # if NETINET 435106f25ae9SGregory Neil Shapiro && inet_addr(hp->h_name) == INADDR_NONE 435206f25ae9SGregory Neil Shapiro # endif /* NETINET */ 435306f25ae9SGregory Neil Shapiro ) 4354193538b7SGregory Neil Shapiro { 4355193538b7SGregory Neil Shapiro char *name; 4356193538b7SGregory Neil Shapiro 435740266059SGregory Neil Shapiro name = denlstring((char *) hp->h_name, true, true); 435840266059SGregory Neil Shapiro # if NETINET6 4359193538b7SGregory Neil Shapiro if (name == hp->h_name) 4360193538b7SGregory Neil Shapiro { 4361193538b7SGregory Neil Shapiro static char n[MAXNAME + 1]; 4362193538b7SGregory Neil Shapiro 4363193538b7SGregory Neil Shapiro /* Copy the string, hp->h_name is about to disappear */ 436440266059SGregory Neil Shapiro (void) sm_strlcpy(n, name, sizeof n); 4365193538b7SGregory Neil Shapiro name = n; 4366193538b7SGregory Neil Shapiro } 4367193538b7SGregory Neil Shapiro freehostent(hp); 436840266059SGregory Neil Shapiro # endif /* NETINET6 */ 4369193538b7SGregory Neil Shapiro return name; 4370193538b7SGregory Neil Shapiro } 437106f25ae9SGregory Neil Shapiro # endif /* NETINET || NETINET6 */ 4372193538b7SGregory Neil Shapiro 437340266059SGregory Neil Shapiro # if NETINET6 4374193538b7SGregory Neil Shapiro if (hp != NULL) 4375193538b7SGregory Neil Shapiro { 4376193538b7SGregory Neil Shapiro freehostent(hp); 4377193538b7SGregory Neil Shapiro hp = NULL; 4378193538b7SGregory Neil Shapiro } 437940266059SGregory Neil Shapiro # endif /* NETINET6 */ 4380193538b7SGregory Neil Shapiro 4381c2aa98e2SPeter Wemm # if NETUNIX 438206f25ae9SGregory Neil Shapiro if (sap->sa.sa_family == AF_UNIX && sap->sunix.sun_path[0] == '\0') 4383c2aa98e2SPeter Wemm return "localhost"; 438406f25ae9SGregory Neil Shapiro # endif /* NETUNIX */ 4385c2aa98e2SPeter Wemm { 4386c2aa98e2SPeter Wemm static char buf[203]; 4387c2aa98e2SPeter Wemm 438840266059SGregory Neil Shapiro (void) sm_snprintf(buf, sizeof buf, "[%.200s]", 438940266059SGregory Neil Shapiro anynet_ntoa(sap)); 4390c2aa98e2SPeter Wemm return buf; 4391c2aa98e2SPeter Wemm } 4392c2aa98e2SPeter Wemm } 439306f25ae9SGregory Neil Shapiro #endif /* USE_SOCK_STREAM */ 4394