xref: /freebsd/contrib/sendmail/src/deliver.c (revision 6990ffd8a95caaba6858ad44ff1b3157d1efba8f)
1 /*
2  * Copyright (c) 1998-2001 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #ifndef lint
15 static char id[] = "@(#)$Id: deliver.c,v 8.600.2.1.2.86 2001/07/20 21:52:55 gshapiro Exp $";
16 #endif /* ! lint */
17 
18 #include <sendmail.h>
19 
20 
21 #if HASSETUSERCONTEXT
22 # include <login_cap.h>
23 #endif /* HASSETUSERCONTEXT */
24 
25 #if STARTTLS || (SASL && SFIO)
26 # include "sfsasl.h"
27 #endif /* STARTTLS || (SASL && SFIO) */
28 
29 static int	deliver __P((ENVELOPE *, ADDRESS *));
30 static void	dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
31 static void	mailfiletimeout __P((void));
32 static void	markfailure __P((ENVELOPE *, ADDRESS *, MCI *, int, bool));
33 static int	parse_hostsignature __P((char *, char **, MAILER *));
34 static void	sendenvelope __P((ENVELOPE *, int));
35 static char	*hostsignature __P((MAILER *, char *));
36 
37 #if SMTP
38 # if STARTTLS
39 static int	starttls __P((MAILER *, MCI *, ENVELOPE *));
40 # endif /* STARTTLS */
41 #endif /* SMTP */
42 
43 /*
44 **  SENDALL -- actually send all the messages.
45 **
46 **	Parameters:
47 **		e -- the envelope to send.
48 **		mode -- the delivery mode to use.  If SM_DEFAULT, use
49 **			the current e->e_sendmode.
50 **
51 **	Returns:
52 **		none.
53 **
54 **	Side Effects:
55 **		Scans the send lists and sends everything it finds.
56 **		Delivers any appropriate error messages.
57 **		If we are running in a non-interactive mode, takes the
58 **			appropriate action.
59 */
60 
61 void
62 sendall(e, mode)
63 	ENVELOPE *e;
64 	int mode;
65 {
66 	register ADDRESS *q;
67 	char *owner;
68 	int otherowners;
69 	int save_errno;
70 	register ENVELOPE *ee;
71 	ENVELOPE *splitenv = NULL;
72 	int oldverbose = Verbose;
73 	bool somedeliveries = FALSE, expensive = FALSE;
74 	pid_t pid;
75 
76 	/*
77 	**  If this message is to be discarded, don't bother sending
78 	**  the message at all.
79 	*/
80 
81 	if (bitset(EF_DISCARD, e->e_flags))
82 	{
83 		if (tTd(13, 1))
84 			dprintf("sendall: discarding id %s\n", e->e_id);
85 		e->e_flags |= EF_CLRQUEUE;
86 		if (LogLevel > 4)
87 			sm_syslog(LOG_INFO, e->e_id, "discarded");
88 		markstats(e, NULL, TRUE);
89 		return;
90 	}
91 
92 	/*
93 	**  If we have had global, fatal errors, don't bother sending
94 	**  the message at all if we are in SMTP mode.  Local errors
95 	**  (e.g., a single address failing) will still cause the other
96 	**  addresses to be sent.
97 	*/
98 
99 	if (bitset(EF_FATALERRS, e->e_flags) &&
100 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
101 	{
102 		e->e_flags |= EF_CLRQUEUE;
103 		return;
104 	}
105 
106 	/* determine actual delivery mode */
107 	if (mode == SM_DEFAULT)
108 	{
109 		mode = e->e_sendmode;
110 		if (mode != SM_VERIFY && mode != SM_DEFER &&
111 		    shouldqueue(e->e_msgpriority, e->e_ctime))
112 			mode = SM_QUEUE;
113 	}
114 
115 	if (tTd(13, 1))
116 	{
117 		dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
118 			mode, e->e_id);
119 		printaddr(&e->e_from, FALSE);
120 		dprintf("\te_flags = ");
121 		printenvflags(e);
122 		dprintf("sendqueue:\n");
123 		printaddr(e->e_sendqueue, TRUE);
124 	}
125 
126 	/*
127 	**  Do any preprocessing necessary for the mode we are running.
128 	**	Check to make sure the hop count is reasonable.
129 	**	Delete sends to the sender in mailing lists.
130 	*/
131 
132 	CurEnv = e;
133 	if (tTd(62, 1))
134 		checkfds(NULL);
135 
136 	if (e->e_hopcount > MaxHopCount)
137 	{
138 		char *recip;
139 
140 		if (e->e_sendqueue != NULL &&
141 		    e->e_sendqueue->q_paddr != NULL)
142 			recip = e->e_sendqueue->q_paddr;
143 		else
144 			recip = "(nobody)";
145 
146 		errno = 0;
147 #if QUEUE
148 		queueup(e, mode == SM_QUEUE || mode == SM_DEFER);
149 #endif /* QUEUE */
150 		e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
151 		ExitStat = EX_UNAVAILABLE;
152 		syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
153 		       e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
154 		       RealHostName == NULL ? "localhost" : RealHostName,
155 		       recip);
156 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
157 		{
158 			if (QS_IS_DEAD(q->q_state))
159 				continue;
160 			q->q_state = QS_BADADDR;
161 			q->q_status = "5.4.6";
162 			q->q_rstatus = "554 5.4.6 Too many hops";
163 		}
164 		return;
165 	}
166 
167 	/*
168 	**  Do sender deletion.
169 	**
170 	**	If the sender should be queued up, skip this.
171 	**	This can happen if the name server is hosed when you
172 	**	are trying to send mail.  The result is that the sender
173 	**	is instantiated in the queue as a recipient.
174 	*/
175 
176 	if (!bitset(EF_METOO, e->e_flags) &&
177 	    !QS_IS_QUEUEUP(e->e_from.q_state))
178 	{
179 		if (tTd(13, 5))
180 		{
181 			dprintf("sendall: QS_SENDER ");
182 			printaddr(&e->e_from, FALSE);
183 		}
184 		e->e_from.q_state = QS_SENDER;
185 		(void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
186 	}
187 
188 	/*
189 	**  Handle alias owners.
190 	**
191 	**	We scan up the q_alias chain looking for owners.
192 	**	We discard owners that are the same as the return path.
193 	*/
194 
195 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
196 	{
197 		register struct address *a;
198 
199 		for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
200 			continue;
201 		if (a != NULL)
202 			q->q_owner = a->q_owner;
203 
204 		if (q->q_owner != NULL &&
205 		    !QS_IS_DEAD(q->q_state) &&
206 		    strcmp(q->q_owner, e->e_from.q_paddr) == 0)
207 			q->q_owner = NULL;
208 	}
209 
210 	if (tTd(13, 25))
211 	{
212 		dprintf("\nAfter first owner pass, sendq =\n");
213 		printaddr(e->e_sendqueue, TRUE);
214 	}
215 
216 	owner = "";
217 	otherowners = 1;
218 	while (owner != NULL && otherowners > 0)
219 	{
220 		if (tTd(13, 28))
221 			dprintf("owner = \"%s\", otherowners = %d\n",
222 				owner, otherowners);
223 		owner = NULL;
224 		otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
225 
226 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
227 		{
228 			if (tTd(13, 30))
229 			{
230 				dprintf("Checking ");
231 				printaddr(q, FALSE);
232 			}
233 			if (QS_IS_DEAD(q->q_state))
234 			{
235 				if (tTd(13, 30))
236 					dprintf("    ... QS_IS_DEAD\n");
237 				continue;
238 			}
239 			if (tTd(13, 29) && !tTd(13, 30))
240 			{
241 				dprintf("Checking ");
242 				printaddr(q, FALSE);
243 			}
244 
245 			if (q->q_owner != NULL)
246 			{
247 				if (owner == NULL)
248 				{
249 					if (tTd(13, 40))
250 						dprintf("    ... First owner = \"%s\"\n",
251 							q->q_owner);
252 					owner = q->q_owner;
253 				}
254 				else if (owner != q->q_owner)
255 				{
256 					if (strcmp(owner, q->q_owner) == 0)
257 					{
258 						if (tTd(13, 40))
259 							dprintf("    ... Same owner = \"%s\"\n",
260 								owner);
261 
262 						/* make future comparisons cheap */
263 						q->q_owner = owner;
264 					}
265 					else
266 					{
267 						if (tTd(13, 40))
268 							dprintf("    ... Another owner \"%s\"\n",
269 								q->q_owner);
270 						otherowners++;
271 					}
272 					owner = q->q_owner;
273 				}
274 				else if (tTd(13, 40))
275 					dprintf("    ... Same owner = \"%s\"\n",
276 						owner);
277 			}
278 			else
279 			{
280 				if (tTd(13, 40))
281 					dprintf("    ... Null owner\n");
282 				otherowners++;
283 			}
284 
285 			if (QS_IS_BADADDR(q->q_state))
286 			{
287 				if (tTd(13, 30))
288 					dprintf("    ... QS_IS_BADADDR\n");
289 				continue;
290 			}
291 
292 			if (QS_IS_QUEUEUP(q->q_state))
293 			{
294 				MAILER *m = q->q_mailer;
295 
296 				/*
297 				**  If we have temporary address failures
298 				**  (e.g., dns failure) and a fallback MX is
299 				**  set, send directly to the fallback MX host.
300 				*/
301 
302 				if (FallBackMX != NULL &&
303 				    !wordinclass(FallBackMX, 'w') &&
304 				    mode != SM_VERIFY &&
305 				    (strcmp(m->m_mailer, "[IPC]") == 0 ||
306 				     strcmp(m->m_mailer, "[TCP]") == 0) &&
307 				    m->m_argv[0] != NULL &&
308 				    (strcmp(m->m_argv[0], "TCP") == 0 ||
309 				     strcmp(m->m_argv[0], "IPC") == 0))
310 				{
311 					int len;
312 					char *p;
313 
314 					if (tTd(13, 30))
315 						dprintf("    ... FallBackMX\n");
316 
317 					len = strlen(FallBackMX) + 3;
318 					p = xalloc(len);
319 					snprintf(p, len, "[%s]", FallBackMX);
320 					q->q_state = QS_OK;
321 					q->q_host = p;
322 				}
323 				else
324 				{
325 					if (tTd(13, 30))
326 						dprintf("    ... QS_IS_QUEUEUP\n");
327 					continue;
328 				}
329 			}
330 
331 			/*
332 			**  If this mailer is expensive, and if we don't
333 			**  want to make connections now, just mark these
334 			**  addresses and return.  This is useful if we
335 			**  want to batch connections to reduce load.  This
336 			**  will cause the messages to be queued up, and a
337 			**  daemon will come along to send the messages later.
338 			*/
339 
340 			if (NoConnect && !Verbose &&
341 			    bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
342 			{
343 				if (tTd(13, 30))
344 					dprintf("    ... expensive\n");
345 				q->q_state = QS_QUEUEUP;
346 				expensive = TRUE;
347 			}
348 			else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
349 				 QueueLimitId == NULL &&
350 				 QueueLimitSender == NULL &&
351 				 QueueLimitRecipient == NULL)
352 			{
353 				if (tTd(13, 30))
354 					dprintf("    ... hold\n");
355 				q->q_state = QS_QUEUEUP;
356 				expensive = TRUE;
357 			}
358 			else
359 			{
360 				if (tTd(13, 30))
361 					dprintf("    ... deliverable\n");
362 				somedeliveries = TRUE;
363 			}
364 		}
365 
366 		if (owner != NULL && otherowners > 0)
367 		{
368 			/*
369 			**  Split this envelope into two.
370 			*/
371 
372 			ee = (ENVELOPE *) xalloc(sizeof *ee);
373 			*ee = *e;
374 			ee->e_message = NULL;
375 			ee->e_id = NULL;
376 			assign_queueid(ee);
377 
378 			if (tTd(13, 1))
379 				dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
380 					e->e_id, ee->e_id, owner, otherowners);
381 
382 			ee->e_header = copyheader(e->e_header);
383 			ee->e_sendqueue = copyqueue(e->e_sendqueue);
384 			ee->e_errorqueue = copyqueue(e->e_errorqueue);
385 			ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
386 			ee->e_flags |= EF_NORECEIPT;
387 			setsender(owner, ee, NULL, '\0', TRUE);
388 			if (tTd(13, 5))
389 			{
390 				dprintf("sendall(split): QS_SENDER ");
391 				printaddr(&ee->e_from, FALSE);
392 			}
393 			ee->e_from.q_state = QS_SENDER;
394 			ee->e_dfp = NULL;
395 			ee->e_lockfp = NULL;
396 			ee->e_xfp = NULL;
397 			ee->e_queuedir = e->e_queuedir;
398 			ee->e_errormode = EM_MAIL;
399 			ee->e_sibling = splitenv;
400 			ee->e_statmsg = NULL;
401 			splitenv = ee;
402 
403 			for (q = e->e_sendqueue; q != NULL; q = q->q_next)
404 			{
405 				if (q->q_owner == owner)
406 				{
407 					q->q_state = QS_CLONED;
408 					if (tTd(13, 6))
409 						dprintf("\t... stripping %s from original envelope\n",
410 							q->q_paddr);
411 				}
412 			}
413 			for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
414 			{
415 				if (q->q_owner != owner)
416 				{
417 					q->q_state = QS_CLONED;
418 					if (tTd(13, 6))
419 						dprintf("\t... dropping %s from cloned envelope\n",
420 							q->q_paddr);
421 				}
422 				else
423 				{
424 					/* clear DSN parameters */
425 					q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
426 					q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
427 					if (tTd(13, 6))
428 						dprintf("\t... moving %s to cloned envelope\n",
429 							q->q_paddr);
430 				}
431 			}
432 
433 			if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
434 				dup_queue_file(e, ee, 'd');
435 
436 			/*
437 			**  Give the split envelope access to the parent
438 			**  transcript file for errors obtained while
439 			**  processing the recipients (done before the
440 			**  envelope splitting).
441 			*/
442 
443 			if (e->e_xfp != NULL)
444 				ee->e_xfp = bfdup(e->e_xfp);
445 
446 			/* failed to dup e->e_xfp, start a new transcript */
447 			if (ee->e_xfp == NULL)
448 				openxscript(ee);
449 
450 			if (mode != SM_VERIFY && LogLevel > 4)
451 				sm_syslog(LOG_INFO, ee->e_id,
452 					  "clone %s, owner=%s",
453 					  e->e_id, owner);
454 		}
455 	}
456 
457 	if (owner != NULL)
458 	{
459 		setsender(owner, e, NULL, '\0', TRUE);
460 		if (tTd(13, 5))
461 		{
462 			dprintf("sendall(owner): QS_SENDER ");
463 			printaddr(&e->e_from, FALSE);
464 		}
465 		e->e_from.q_state = QS_SENDER;
466 		e->e_errormode = EM_MAIL;
467 		e->e_flags |= EF_NORECEIPT;
468 		e->e_flags &= ~EF_FATALERRS;
469 	}
470 
471 	/* if nothing to be delivered, just queue up everything */
472 	if (!somedeliveries && mode != SM_QUEUE && mode != SM_DEFER &&
473 	    mode != SM_VERIFY)
474 	{
475 		time_t now = curtime();
476 
477 		if (tTd(13, 29))
478 			dprintf("No deliveries: auto-queuing\n");
479 		mode = SM_QUEUE;
480 
481 		/* treat this as a delivery in terms of counting tries */
482 		e->e_dtime = now;
483 		if (!expensive)
484 			e->e_ntries++;
485 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
486 		{
487 			ee->e_dtime = now;
488 			if (!expensive)
489 				ee->e_ntries++;
490 		}
491 	}
492 
493 #if QUEUE
494 	if ((mode == SM_QUEUE || mode == SM_DEFER || mode == SM_FORK ||
495 	     (mode != SM_VERIFY && SuperSafe)) &&
496 	    (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
497 	{
498 		/*
499 		**  Be sure everything is instantiated in the queue.
500 		**  Split envelopes first in case the machine crashes.
501 		**  If the original were done first, we may lose
502 		**  recipients.
503 		*/
504 
505 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
506 			queueup(ee, mode == SM_QUEUE || mode == SM_DEFER);
507 		queueup(e, mode == SM_QUEUE || mode == SM_DEFER);
508 	}
509 #endif /* QUEUE */
510 
511 	if (tTd(62, 10))
512 		checkfds("after envelope splitting");
513 
514 	/*
515 	**  If we belong in background, fork now.
516 	*/
517 
518 	if (tTd(13, 20))
519 	{
520 		dprintf("sendall: final mode = %c\n", mode);
521 		if (tTd(13, 21))
522 		{
523 			dprintf("\n================ Final Send Queue(s) =====================\n");
524 			dprintf("\n  *** Envelope %s, e_from=%s ***\n",
525 				e->e_id, e->e_from.q_paddr);
526 			printaddr(e->e_sendqueue, TRUE);
527 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
528 			{
529 				dprintf("\n  *** Envelope %s, e_from=%s ***\n",
530 					ee->e_id, ee->e_from.q_paddr);
531 				printaddr(ee->e_sendqueue, TRUE);
532 			}
533 			dprintf("==========================================================\n\n");
534 		}
535 	}
536 	switch (mode)
537 	{
538 	  case SM_VERIFY:
539 		Verbose = 2;
540 		break;
541 
542 	  case SM_QUEUE:
543 	  case SM_DEFER:
544 #if HASFLOCK
545   queueonly:
546 #endif /* HASFLOCK */
547 		if (e->e_nrcpts > 0)
548 			e->e_flags |= EF_INQUEUE;
549 		dropenvelope(e, splitenv != NULL);
550 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
551 		{
552 			if (ee->e_nrcpts > 0)
553 				ee->e_flags |= EF_INQUEUE;
554 			dropenvelope(ee, FALSE);
555 		}
556 		return;
557 
558 	  case SM_FORK:
559 		if (e->e_xfp != NULL)
560 			(void) fflush(e->e_xfp);
561 
562 #if !HASFLOCK
563 		/*
564 		**  Since fcntl locking has the interesting semantic that
565 		**  the lock is owned by a process, not by an open file
566 		**  descriptor, we have to flush this to the queue, and
567 		**  then restart from scratch in the child.
568 		*/
569 
570 		{
571 			/* save id for future use */
572 			char *qid = e->e_id;
573 
574 			/* now drop the envelope in the parent */
575 			e->e_flags |= EF_INQUEUE;
576 			dropenvelope(e, splitenv != NULL);
577 
578 			/* arrange to reacquire lock after fork */
579 			e->e_id = qid;
580 		}
581 
582 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
583 		{
584 			/* save id for future use */
585 			char *qid = ee->e_id;
586 
587 			/* drop envelope in parent */
588 			ee->e_flags |= EF_INQUEUE;
589 			dropenvelope(ee, FALSE);
590 
591 			/* and save qid for reacquisition */
592 			ee->e_id = qid;
593 		}
594 
595 #endif /* !HASFLOCK */
596 
597 		/*
598 		**  Since the delivery may happen in a child and the parent
599 		**  does not wait, the parent may close the maps thereby
600 		**  removing any shared memory used by the map.  Therefore,
601 		**  close the maps now so the child will dynamically open
602 		**  them if necessary.
603 		*/
604 
605 		closemaps();
606 
607 		pid = fork();
608 		if (pid < 0)
609 		{
610 			syserr("deliver: fork 1");
611 #if HASFLOCK
612 			goto queueonly;
613 #else /* HASFLOCK */
614 			e->e_id = NULL;
615 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
616 				ee->e_id = NULL;
617 			return;
618 #endif /* HASFLOCK */
619 		}
620 		else if (pid > 0)
621 		{
622 #if HASFLOCK
623 			/* be sure we leave the temp files to our child */
624 			/* close any random open files in the envelope */
625 			closexscript(e);
626 			if (e->e_dfp != NULL)
627 				(void) bfclose(e->e_dfp);
628 			e->e_dfp = NULL;
629 			e->e_flags &= ~EF_HAS_DF;
630 
631 			/* can't call unlockqueue to avoid unlink of xfp */
632 			if (e->e_lockfp != NULL)
633 				(void) fclose(e->e_lockfp);
634 			else
635 				syserr("%s: sendall: null lockfp", e->e_id);
636 			e->e_lockfp = NULL;
637 #endif /* HASFLOCK */
638 
639 			/* make sure the parent doesn't own the envelope */
640 			e->e_id = NULL;
641 
642 			/* catch intermediate zombie */
643 			(void) waitfor(pid);
644 			return;
645 		}
646 
647 		/* Reset global flags */
648 		RestartRequest = NULL;
649 		ShutdownRequest = NULL;
650 		PendingSignal = 0;
651 
652 		/*
653 		**  Since we have accepted responsbility for the message,
654 		**  change the SIGTERM handler.  intsig() (the old handler)
655 		**  would remove the envelope if this was a command line
656 		**  message submission.
657 		*/
658 
659 		(void) setsignal(SIGTERM, SIG_DFL);
660 
661 		/* double fork to avoid zombies */
662 		pid = fork();
663 		if (pid > 0)
664 			exit(EX_OK);
665 		save_errno = errno;
666 
667 		/* be sure we are immune from the terminal */
668 		disconnect(2, e);
669 		clearstats();
670 
671 		/* prevent parent from waiting if there was an error */
672 		if (pid < 0)
673 		{
674 			errno = save_errno;
675 			syserr("deliver: fork 2");
676 #if HASFLOCK
677 			e->e_flags |= EF_INQUEUE;
678 #else /* HASFLOCK */
679 			e->e_id = NULL;
680 #endif /* HASFLOCK */
681 			finis(TRUE, ExitStat);
682 		}
683 
684 		/* be sure to give error messages in child */
685 		QuickAbort = FALSE;
686 
687 		/*
688 		**  Close any cached connections.
689 		**
690 		**	We don't send the QUIT protocol because the parent
691 		**	still knows about the connection.
692 		**
693 		**	This should only happen when delivering an error
694 		**	message.
695 		*/
696 
697 		mci_flush(FALSE, NULL);
698 
699 #if HASFLOCK
700 		break;
701 #else /* HASFLOCK */
702 
703 		/*
704 		**  Now reacquire and run the various queue files.
705 		*/
706 
707 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
708 		{
709 			ENVELOPE *sibling = ee->e_sibling;
710 
711 			(void) dowork(ee->e_queuedir, ee->e_id,
712 				      FALSE, FALSE, ee);
713 			ee->e_sibling = sibling;
714 		}
715 		(void) dowork(e->e_queuedir, e->e_id,
716 			      FALSE, FALSE, e);
717 		finis(TRUE, ExitStat);
718 #endif /* HASFLOCK */
719 	}
720 
721 	sendenvelope(e, mode);
722 	dropenvelope(e, TRUE);
723 	for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
724 	{
725 		CurEnv = ee;
726 		if (mode != SM_VERIFY)
727 			openxscript(ee);
728 		sendenvelope(ee, mode);
729 		dropenvelope(ee, TRUE);
730 	}
731 	CurEnv = e;
732 
733 	Verbose = oldverbose;
734 	if (mode == SM_FORK)
735 		finis(TRUE, ExitStat);
736 }
737 
738 static void
739 sendenvelope(e, mode)
740 	register ENVELOPE *e;
741 	int mode;
742 {
743 	register ADDRESS *q;
744 	bool didany;
745 
746 	if (tTd(13, 10))
747 		dprintf("sendenvelope(%s) e_flags=0x%lx\n",
748 			e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
749 			e->e_flags);
750 	if (LogLevel > 80)
751 		sm_syslog(LOG_DEBUG, e->e_id,
752 			  "sendenvelope, flags=0x%lx",
753 			  e->e_flags);
754 
755 	/*
756 	**  If we have had global, fatal errors, don't bother sending
757 	**  the message at all if we are in SMTP mode.  Local errors
758 	**  (e.g., a single address failing) will still cause the other
759 	**  addresses to be sent.
760 	*/
761 
762 	if (bitset(EF_FATALERRS, e->e_flags) &&
763 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
764 	{
765 		e->e_flags |= EF_CLRQUEUE;
766 		return;
767 	}
768 
769 	/* Don't attempt deliveries if we want to bounce now */
770 	if (!bitset(EF_RESPONSE, e->e_flags) &&
771 	    TimeOuts.to_q_return[e->e_timeoutclass] == NOW)
772 		return;
773 
774 	/*
775 	**  Run through the list and send everything.
776 	**
777 	**	Set EF_GLOBALERRS so that error messages during delivery
778 	**	result in returned mail.
779 	*/
780 
781 	e->e_nsent = 0;
782 	e->e_flags |= EF_GLOBALERRS;
783 
784 	define(macid("{envid}", NULL), e->e_envid, e);
785 	define(macid("{bodytype}", NULL), e->e_bodytype, e);
786 	didany = FALSE;
787 
788 	/* now run through the queue */
789 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
790 	{
791 #if XDEBUG
792 		char wbuf[MAXNAME + 20];
793 
794 		(void) snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
795 			MAXNAME, q->q_paddr);
796 		checkfd012(wbuf);
797 #endif /* XDEBUG */
798 		if (mode == SM_VERIFY)
799 		{
800 			e->e_to = q->q_paddr;
801 			if (QS_IS_SENDABLE(q->q_state))
802 			{
803 				if (q->q_host != NULL && q->q_host[0] != '\0')
804 					message("deliverable: mailer %s, host %s, user %s",
805 						q->q_mailer->m_name,
806 						q->q_host,
807 						q->q_user);
808 				else
809 					message("deliverable: mailer %s, user %s",
810 						q->q_mailer->m_name,
811 						q->q_user);
812 			}
813 		}
814 		else if (QS_IS_OK(q->q_state))
815 		{
816 #if QUEUE
817 			/*
818 			**  Checkpoint the send list every few addresses
819 			*/
820 
821 			if (CheckpointInterval > 0 &&
822 			    e->e_nsent >= CheckpointInterval)
823 			{
824 				queueup(e, FALSE);
825 				e->e_nsent = 0;
826 			}
827 #endif /* QUEUE */
828 			(void) deliver(e, q);
829 			didany = TRUE;
830 		}
831 	}
832 	if (didany)
833 	{
834 		e->e_dtime = curtime();
835 		e->e_ntries++;
836 	}
837 
838 #if XDEBUG
839 	checkfd012("end of sendenvelope");
840 #endif /* XDEBUG */
841 }
842 /*
843 **  DUP_QUEUE_FILE -- duplicate a queue file into a split queue
844 **
845 **	Parameters:
846 **		e -- the existing envelope
847 **		ee -- the new envelope
848 **		type -- the queue file type (e.g., 'd')
849 **
850 **	Returns:
851 **		none
852 */
853 
854 static void
855 dup_queue_file(e, ee, type)
856 	struct envelope *e, *ee;
857 	int type;
858 {
859 	char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
860 
861 	ee->e_dfp = NULL;
862 	ee->e_xfp = NULL;
863 
864 	/*
865 	**  Make sure both are in the same directory.
866 	*/
867 
868 	snprintf(f1buf, sizeof f1buf, "%s", queuename(e, type));
869 	snprintf(f2buf, sizeof f2buf, "%s", queuename(ee, type));
870 	if (link(f1buf, f2buf) < 0)
871 	{
872 		int save_errno = errno;
873 
874 		syserr("sendall: link(%s, %s)", f1buf, f2buf);
875 		if (save_errno == EEXIST)
876 		{
877 			if (unlink(f2buf) < 0)
878 			{
879 				syserr("!sendall: unlink(%s): permanent",
880 					f2buf);
881 				/* NOTREACHED */
882 			}
883 			if (link(f1buf, f2buf) < 0)
884 			{
885 				syserr("!sendall: link(%s, %s): permanent",
886 					f1buf, f2buf);
887 				/* NOTREACHED */
888 			}
889 		}
890 	}
891 }
892 /*
893 **  DOFORK -- do a fork, retrying a couple of times on failure.
894 **
895 **	This MUST be a macro, since after a vfork we are running
896 **	two processes on the same stack!!!
897 **
898 **	Parameters:
899 **		none.
900 **
901 **	Returns:
902 **		From a macro???  You've got to be kidding!
903 **
904 **	Side Effects:
905 **		Modifies the ==> LOCAL <== variable 'pid', leaving:
906 **			pid of child in parent, zero in child.
907 **			-1 on unrecoverable error.
908 **
909 **	Notes:
910 **		I'm awfully sorry this looks so awful.  That's
911 **		vfork for you.....
912 */
913 
914 #define NFORKTRIES	5
915 
916 #ifndef FORK
917 # define FORK	fork
918 #endif /* ! FORK */
919 
920 #define DOFORK(fORKfN) \
921 {\
922 	register int i;\
923 \
924 	for (i = NFORKTRIES; --i >= 0; )\
925 	{\
926 		pid = fORKfN();\
927 		if (pid >= 0)\
928 			break;\
929 		if (i > 0)\
930 			(void) sleep((unsigned) NFORKTRIES - i);\
931 	}\
932 }
933 /*
934 **  DOFORK -- simple fork interface to DOFORK.
935 **
936 **	Parameters:
937 **		none.
938 **
939 **	Returns:
940 **		pid of child in parent.
941 **		zero in child.
942 **		-1 on error.
943 **
944 **	Side Effects:
945 **		returns twice, once in parent and once in child.
946 */
947 
948 pid_t
949 dofork()
950 {
951 	register pid_t pid = -1;
952 
953 	DOFORK(fork);
954 	return pid;
955 }
956 /*
957 **  DELIVER -- Deliver a message to a list of addresses.
958 **
959 **	This routine delivers to everyone on the same host as the
960 **	user on the head of the list.  It is clever about mailers
961 **	that don't handle multiple users.  It is NOT guaranteed
962 **	that it will deliver to all these addresses however -- so
963 **	deliver should be called once for each address on the
964 **	list.
965 **
966 **	Parameters:
967 **		e -- the envelope to deliver.
968 **		firstto -- head of the address list to deliver to.
969 **
970 **	Returns:
971 **		zero -- successfully delivered.
972 **		else -- some failure, see ExitStat for more info.
973 **
974 **	Side Effects:
975 **		The standard input is passed off to someone.
976 */
977 
978 #ifndef NO_UID
979 # define NO_UID		-1
980 #endif /* ! NO_UID */
981 #ifndef NO_GID
982 # define NO_GID		-1
983 #endif /* ! NO_GID */
984 
985 static int
986 deliver(e, firstto)
987 	register ENVELOPE *e;
988 	ADDRESS *firstto;
989 {
990 	char *host;			/* host being sent to */
991 	char *user;			/* user being sent to */
992 	char **pvp;
993 	register char **mvp;
994 	register char *p;
995 	register MAILER *m;		/* mailer for this recipient */
996 	ADDRESS *volatile ctladdr;
997 	ADDRESS *volatile contextaddr = NULL;
998 	register MCI *volatile mci;
999 	register ADDRESS *to = firstto;
1000 	volatile bool clever = FALSE;	/* running user smtp to this mailer */
1001 	ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1002 	int rcode;			/* response code */
1003 	int lmtp_rcode = EX_OK;
1004 	int nummxhosts = 0;		/* number of MX hosts available */
1005 	int hostnum = 0;		/* current MX host index */
1006 	char *firstsig;			/* signature of firstto */
1007 	pid_t pid = -1;
1008 	char *volatile curhost;
1009 	register u_short port = 0;
1010 #if NETUNIX
1011 	char *mux_path = NULL;		/* path to UNIX domain socket */
1012 #endif /* NETUNIX */
1013 	time_t xstart;
1014 	bool suidwarn;
1015 	bool anyok;			/* at least one address was OK */
1016 	bool goodmxfound = FALSE;	/* at least one MX was OK */
1017 	bool ovr;
1018 #if _FFR_DYNAMIC_TOBUF
1019 	int strsize;
1020 	int rcptcount;
1021 	static int tobufsize = 0;
1022 	static char *tobuf = NULL;
1023 #else /* _FFR_DYNAMIC_TOBUF */
1024 	char tobuf[TOBUFSIZE];		/* text line of to people */
1025 #endif /* _FFR_DYNAMIC_TOBUF */
1026 	int mpvect[2];
1027 	int rpvect[2];
1028 	char *mxhosts[MAXMXHOSTS + 1];
1029 	char *pv[MAXPV + 1];
1030 	char buf[MAXNAME + 1];
1031 	char rpathbuf[MAXNAME + 1];	/* translated return path */
1032 
1033 	errno = 0;
1034 	if (!QS_IS_OK(to->q_state))
1035 		return 0;
1036 
1037 	suidwarn = geteuid() == 0;
1038 
1039 	m = to->q_mailer;
1040 	host = to->q_host;
1041 	CurEnv = e;			/* just in case */
1042 	e->e_statmsg = NULL;
1043 #if SMTP
1044 	SmtpError[0] = '\0';
1045 #endif /* SMTP */
1046 	xstart = curtime();
1047 
1048 	if (tTd(10, 1))
1049 		dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1050 			e->e_id, m->m_name, host, to->q_user);
1051 	if (tTd(10, 100))
1052 		printopenfds(FALSE);
1053 
1054 	/*
1055 	**  Clear $&{client_*} macros if this is a bounce message to
1056 	**  prevent rejection by check_compat ruleset.
1057 	*/
1058 
1059 	if (bitset(EF_RESPONSE, e->e_flags))
1060 	{
1061 		define(macid("{client_name}", NULL), "", e);
1062 		define(macid("{client_addr}", NULL), "", e);
1063 		define(macid("{client_port}", NULL), "", e);
1064 	}
1065 
1066 	/*
1067 	**  Do initial argv setup.
1068 	**	Insert the mailer name.  Notice that $x expansion is
1069 	**	NOT done on the mailer name.  Then, if the mailer has
1070 	**	a picky -f flag, we insert it as appropriate.  This
1071 	**	code does not check for 'pv' overflow; this places a
1072 	**	manifest lower limit of 4 for MAXPV.
1073 	**		The from address rewrite is expected to make
1074 	**		the address relative to the other end.
1075 	*/
1076 
1077 	/* rewrite from address, using rewriting rules */
1078 	rcode = EX_OK;
1079 	if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1080 		p = e->e_sender;
1081 	else
1082 		p = e->e_from.q_paddr;
1083 	p = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1084 	if (strlen(p) >= (SIZE_T) sizeof rpathbuf)
1085 	{
1086 		p = shortenstring(p, MAXSHORTSTR);
1087 		syserr("remotename: huge return %s", p);
1088 	}
1089 	snprintf(rpathbuf, sizeof rpathbuf, "%s", p);
1090 	define('g', rpathbuf, e);		/* translated return path */
1091 	define('h', host, e);			/* to host */
1092 	Errors = 0;
1093 	pvp = pv;
1094 	*pvp++ = m->m_argv[0];
1095 
1096 	/* insert -f or -r flag as appropriate */
1097 	if (FromFlag &&
1098 	    (bitnset(M_FOPT, m->m_flags) ||
1099 	     bitnset(M_ROPT, m->m_flags)))
1100 	{
1101 		if (bitnset(M_FOPT, m->m_flags))
1102 			*pvp++ = "-f";
1103 		else
1104 			*pvp++ = "-r";
1105 		*pvp++ = newstr(rpathbuf);
1106 	}
1107 
1108 	/*
1109 	**  Append the other fixed parts of the argv.  These run
1110 	**  up to the first entry containing "$u".  There can only
1111 	**  be one of these, and there are only a few more slots
1112 	**  in the pv after it.
1113 	*/
1114 
1115 	for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1116 	{
1117 		/* can't use strchr here because of sign extension problems */
1118 		while (*p != '\0')
1119 		{
1120 			if ((*p++ & 0377) == MACROEXPAND)
1121 			{
1122 				if (*p == 'u')
1123 					break;
1124 			}
1125 		}
1126 
1127 		if (*p != '\0')
1128 			break;
1129 
1130 		/* this entry is safe -- go ahead and process it */
1131 		expand(*mvp, buf, sizeof buf, e);
1132 		*pvp++ = newstr(buf);
1133 		if (pvp >= &pv[MAXPV - 3])
1134 		{
1135 			syserr("554 5.3.5 Too many parameters to %s before $u",
1136 			       pv[0]);
1137 			return -1;
1138 		}
1139 	}
1140 
1141 	/*
1142 	**  If we have no substitution for the user name in the argument
1143 	**  list, we know that we must supply the names otherwise -- and
1144 	**  SMTP is the answer!!
1145 	*/
1146 
1147 	if (*mvp == NULL)
1148 	{
1149 		/* running LMTP or SMTP */
1150 #if SMTP
1151 		clever = TRUE;
1152 		*pvp = NULL;
1153 #else /* SMTP */
1154 		/* oops!  we don't implement SMTP */
1155 		syserr("554 5.3.5 SMTP style mailer not implemented");
1156 		return EX_SOFTWARE;
1157 #endif /* SMTP */
1158 	}
1159 	else if (bitnset(M_LMTP, m->m_flags))
1160 	{
1161 		/* not running LMTP */
1162 		sm_syslog(LOG_ERR, NULL,
1163 			  "Warning: mailer %s: LMTP flag (F=z) turned off",
1164 			  m->m_name);
1165 		clrbitn(M_LMTP, m->m_flags);
1166 	}
1167 
1168 	/*
1169 	**  At this point *mvp points to the argument with $u.  We
1170 	**  run through our address list and append all the addresses
1171 	**  we can.  If we run out of space, do not fret!  We can
1172 	**  always send another copy later.
1173 	*/
1174 
1175 #if _FFR_DYNAMIC_TOBUF
1176 	e->e_to = NULL;
1177 	strsize = 2;
1178 	rcptcount = 0;
1179 #else /* _FFR_DYNAMIC_TOBUF */
1180 	tobuf[0] = '\0';
1181 	e->e_to = tobuf;
1182 #endif /* _FFR_DYNAMIC_TOBUF */
1183 
1184 	ctladdr = NULL;
1185 	firstsig = hostsignature(firstto->q_mailer, firstto->q_host);
1186 	for (; to != NULL; to = to->q_next)
1187 	{
1188 		/* avoid sending multiple recipients to dumb mailers */
1189 #if _FFR_DYNAMIC_TOBUF
1190 		if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1191 			break;
1192 #else /* _FFR_DYNAMIC_TOBUF */
1193 		if (tobuf[0] != '\0' && !bitnset(M_MUSER, m->m_flags))
1194 			break;
1195 #endif /* _FFR_DYNAMIC_TOBUF */
1196 
1197 		/* if already sent or not for this host, don't send */
1198 		if (!QS_IS_OK(to->q_state) ||
1199 		    to->q_mailer != firstto->q_mailer ||
1200 		    strcmp(hostsignature(to->q_mailer, to->q_host),
1201 			   firstsig) != 0)
1202 			continue;
1203 
1204 		/* avoid overflowing tobuf */
1205 #if _FFR_DYNAMIC_TOBUF
1206 		strsize += strlen(to->q_paddr) + 1;
1207 		if (!clever && strsize > TOBUFSIZE)
1208 			break;
1209 
1210 		if (++rcptcount > to->q_mailer->m_maxrcpt)
1211 			break;
1212 #else /* _FFR_DYNAMIC_TOBUF */
1213 		if (sizeof tobuf < (strlen(to->q_paddr) + strlen(tobuf) + 2))
1214 			break;
1215 #endif /* _FFR_DYNAMIC_TOBUF */
1216 
1217 		if (tTd(10, 1))
1218 		{
1219 			dprintf("\nsend to ");
1220 			printaddr(to, FALSE);
1221 		}
1222 
1223 		/* compute effective uid/gid when sending */
1224 		if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1225 			contextaddr = ctladdr = getctladdr(to);
1226 
1227 		if (tTd(10, 2))
1228 		{
1229 			dprintf("ctladdr=");
1230 			printaddr(ctladdr, FALSE);
1231 		}
1232 
1233 		user = to->q_user;
1234 		e->e_to = to->q_paddr;
1235 
1236 		/*
1237 		**  Check to see that these people are allowed to
1238 		**  talk to each other.
1239 		**  Check also for overflow of e_msgsize.
1240 		*/
1241 
1242 		if (m->m_maxsize != 0 &&
1243 		    (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1244 		{
1245 			e->e_flags |= EF_NO_BODY_RETN;
1246 			if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1247 				to->q_status = "5.2.3";
1248 			else
1249 				to->q_status = "5.3.4";
1250 			/* set to->q_rstatus = NULL; or to the following? */
1251 			usrerrenh(to->q_status,
1252 				  "552 Message is too large; %ld bytes max",
1253 				  m->m_maxsize);
1254 			markfailure(e, to, NULL, EX_UNAVAILABLE, FALSE);
1255 			giveresponse(EX_UNAVAILABLE, to->q_status, m,
1256 				     NULL, ctladdr, xstart, e);
1257 			continue;
1258 		}
1259 #if NAMED_BIND
1260 		SM_SET_H_ERRNO(0);
1261 #endif /* NAMED_BIND */
1262 
1263 		ovr = TRUE;
1264 		/* do config file checking of compatibility */
1265 		rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1266 				e, TRUE, TRUE, 4, NULL);
1267 		if (rcode == EX_OK)
1268 		{
1269 			/* do in-code checking if not discarding */
1270 			if (!bitset(EF_DISCARD, e->e_flags))
1271 			{
1272 				rcode = checkcompat(to, e);
1273 				ovr = FALSE;
1274 			}
1275 		}
1276 		if (rcode != EX_OK)
1277 		{
1278 			markfailure(e, to, NULL, rcode, ovr);
1279 			giveresponse(rcode, to->q_status, m,
1280 				     NULL, ctladdr, xstart, e);
1281 			continue;
1282 		}
1283 		if (bitset(EF_DISCARD, e->e_flags))
1284 		{
1285 			if (tTd(10, 5))
1286 			{
1287 				dprintf("deliver: discarding recipient ");
1288 				printaddr(to, FALSE);
1289 			}
1290 
1291 			/* pretend the message was sent */
1292 			/* XXX should we log something here? */
1293 			to->q_state = QS_DISCARDED;
1294 
1295 			/*
1296 			**  Remove discard bit to prevent discard of
1297 			**  future recipients.  This is safe because the
1298 			**  true "global discard" has been handled before
1299 			**  we get here.
1300 			*/
1301 
1302 			e->e_flags &= ~EF_DISCARD;
1303 			continue;
1304 		}
1305 
1306 		/*
1307 		**  Strip quote bits from names if the mailer is dumb
1308 		**	about them.
1309 		*/
1310 
1311 		if (bitnset(M_STRIPQ, m->m_flags))
1312 		{
1313 			stripquotes(user);
1314 			stripquotes(host);
1315 		}
1316 
1317 		/* hack attack -- delivermail compatibility */
1318 		if (m == ProgMailer && *user == '|')
1319 			user++;
1320 
1321 		/*
1322 		**  If an error message has already been given, don't
1323 		**	bother to send to this address.
1324 		**
1325 		**	>>>>>>>>>> This clause assumes that the local mailer
1326 		**	>> NOTE >> cannot do any further aliasing; that
1327 		**	>>>>>>>>>> function is subsumed by sendmail.
1328 		*/
1329 
1330 		if (!QS_IS_OK(to->q_state))
1331 			continue;
1332 
1333 		/*
1334 		**  See if this user name is "special".
1335 		**	If the user name has a slash in it, assume that this
1336 		**	is a file -- send it off without further ado.  Note
1337 		**	that this type of addresses is not processed along
1338 		**	with the others, so we fudge on the To person.
1339 		*/
1340 
1341 		if (strcmp(m->m_mailer, "[FILE]") == 0)
1342 		{
1343 			define('u', user, e);	/* to user */
1344 			p = to->q_home;
1345 			if (p == NULL && ctladdr != NULL)
1346 				p = ctladdr->q_home;
1347 			define('z', p, e);	/* user's home */
1348 			expand(m->m_argv[1], buf, sizeof buf, e);
1349 			if (strlen(buf) > 0)
1350 				rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1351 			else
1352 			{
1353 				syserr("empty filename specification for mailer %s",
1354 				       m->m_name);
1355 				rcode = EX_CONFIG;
1356 			}
1357 			giveresponse(rcode, to->q_status, m, NULL,
1358 				     ctladdr, xstart, e);
1359 			markfailure(e, to, NULL, rcode, TRUE);
1360 			e->e_nsent++;
1361 			if (rcode == EX_OK)
1362 			{
1363 				to->q_state = QS_SENT;
1364 				if (bitnset(M_LOCALMAILER, m->m_flags) &&
1365 				    bitset(QPINGONSUCCESS, to->q_flags))
1366 				{
1367 					to->q_flags |= QDELIVERED;
1368 					to->q_status = "2.1.5";
1369 					fprintf(e->e_xfp, "%s... Successfully delivered\n",
1370 						to->q_paddr);
1371 				}
1372 			}
1373 			to->q_statdate = curtime();
1374 			markstats(e, to, FALSE);
1375 			continue;
1376 		}
1377 
1378 		/*
1379 		**  Address is verified -- add this user to mailer
1380 		**  argv, and add it to the print list of recipients.
1381 		*/
1382 
1383 		/* link together the chain of recipients */
1384 		to->q_tchain = tochain;
1385 		tochain = to;
1386 
1387 #if _FFR_DYNAMIC_TOBUF
1388 		e->e_to = "[CHAIN]";
1389 #else /* _FFR_DYNAMIC_TOBUF */
1390 		/* create list of users for error messages */
1391 		(void) strlcat(tobuf, ",", sizeof tobuf);
1392 		(void) strlcat(tobuf, to->q_paddr, sizeof tobuf);
1393 #endif /* _FFR_DYNAMIC_TOBUF */
1394 
1395 		define('u', user, e);		/* to user */
1396 		p = to->q_home;
1397 		if (p == NULL && ctladdr != NULL)
1398 			p = ctladdr->q_home;
1399 		define('z', p, e);	/* user's home */
1400 
1401 		/* set the ${dsn_notify} macro if applicable */
1402 		if (bitset(QHASNOTIFY, to->q_flags))
1403 		{
1404 			char notify[MAXLINE];
1405 
1406 			notify[0] = '\0';
1407 			if (bitset(QPINGONSUCCESS, to->q_flags))
1408 				(void) strlcat(notify, "SUCCESS,",
1409 					       sizeof notify);
1410 			if (bitset(QPINGONFAILURE, to->q_flags))
1411 				(void) strlcat(notify, "FAILURE,",
1412 					       sizeof notify);
1413 			if (bitset(QPINGONDELAY, to->q_flags))
1414 				(void) strlcat(notify, "DELAY,", sizeof notify);
1415 
1416 			/* Set to NEVER or drop trailing comma */
1417 			if (notify[0] == '\0')
1418 				(void) strlcat(notify, "NEVER", sizeof notify);
1419 			else
1420 				notify[strlen(notify) - 1] = '\0';
1421 
1422 			define(macid("{dsn_notify}", NULL), newstr(notify), e);
1423 		}
1424 		else
1425 			define(macid("{dsn_notify}", NULL), NULL, e);
1426 
1427 		/*
1428 		**  Expand out this user into argument list.
1429 		*/
1430 
1431 		if (!clever)
1432 		{
1433 			expand(*mvp, buf, sizeof buf, e);
1434 			*pvp++ = newstr(buf);
1435 			if (pvp >= &pv[MAXPV - 2])
1436 			{
1437 				/* allow some space for trailing parms */
1438 				break;
1439 			}
1440 		}
1441 	}
1442 
1443 	/* see if any addresses still exist */
1444 #if _FFR_DYNAMIC_TOBUF
1445 	if (tochain == NULL)
1446 #else /* _FFR_DYNAMIC_TOBUF */
1447 	if (tobuf[0] == '\0')
1448 #endif /* _FFR_DYNAMIC_TOBUF */
1449 	{
1450 		define('g', (char *) NULL, e);
1451 		e->e_to = NULL;
1452 		return 0;
1453 	}
1454 
1455 	/* print out messages as full list */
1456 #if _FFR_DYNAMIC_TOBUF
1457 	{
1458 		int l = 1;
1459 		char *tobufptr;
1460 
1461 		for (to = tochain; to != NULL; to = to->q_tchain)
1462 			l += strlen(to->q_paddr) + 1;
1463 		if (l < TOBUFSIZE)
1464 			l = TOBUFSIZE;
1465 		if (l > tobufsize)
1466 		{
1467 			if (tobuf != NULL)
1468 				sm_free(tobuf);
1469 			tobufsize = l;
1470 			tobuf = xalloc(tobufsize);
1471 		}
1472 		tobufptr = tobuf;
1473 		*tobufptr = '\0';
1474 		for (to = tochain; to != NULL; to = to->q_tchain)
1475 		{
1476 			snprintf(tobufptr, tobufsize - (tobufptr - tobuf),
1477 				 ",%s", to->q_paddr);
1478 			tobufptr += strlen(tobufptr);
1479 		}
1480 	}
1481 #endif /* _FFR_DYNAMIC_TOBUF */
1482 	e->e_to = tobuf + 1;
1483 
1484 	/*
1485 	**  Fill out any parameters after the $u parameter.
1486 	*/
1487 
1488 	while (!clever && *++mvp != NULL)
1489 	{
1490 		expand(*mvp, buf, sizeof buf, e);
1491 		*pvp++ = newstr(buf);
1492 		if (pvp >= &pv[MAXPV])
1493 			syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1494 			       pv[0]);
1495 	}
1496 	*pvp++ = NULL;
1497 
1498 	/*
1499 	**  Call the mailer.
1500 	**	The argument vector gets built, pipes
1501 	**	are created as necessary, and we fork & exec as
1502 	**	appropriate.
1503 	**	If we are running SMTP, we just need to clean up.
1504 	*/
1505 
1506 	/* XXX this seems a bit wierd */
1507 	if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1508 	    bitset(QGOODUID, e->e_from.q_flags))
1509 		ctladdr = &e->e_from;
1510 
1511 #if NAMED_BIND
1512 	if (ConfigLevel < 2)
1513 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
1514 #endif /* NAMED_BIND */
1515 
1516 	if (tTd(11, 1))
1517 	{
1518 		dprintf("openmailer:");
1519 		printav(pv);
1520 	}
1521 	errno = 0;
1522 #if NAMED_BIND
1523 	SM_SET_H_ERRNO(0);
1524 #endif /* NAMED_BIND */
1525 
1526 	CurHostName = NULL;
1527 
1528 	/*
1529 	**  Deal with the special case of mail handled through an IPC
1530 	**  connection.
1531 	**	In this case we don't actually fork.  We must be
1532 	**	running SMTP for this to work.  We will return a
1533 	**	zero pid to indicate that we are running IPC.
1534 	**  We also handle a debug version that just talks to stdin/out.
1535 	*/
1536 
1537 	curhost = NULL;
1538 	SmtpPhase = NULL;
1539 	mci = NULL;
1540 
1541 #if XDEBUG
1542 	{
1543 		char wbuf[MAXLINE];
1544 
1545 		/* make absolutely certain 0, 1, and 2 are in use */
1546 		snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1547 			shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
1548 		checkfd012(wbuf);
1549 	}
1550 #endif /* XDEBUG */
1551 
1552 	/* check for 8-bit available */
1553 	if (bitset(EF_HAS8BIT, e->e_flags) &&
1554 	    bitnset(M_7BITS, m->m_flags) &&
1555 	    (bitset(EF_DONT_MIME, e->e_flags) ||
1556 	     !(bitset(MM_MIME8BIT, MimeMode) ||
1557 	       (bitset(EF_IS_MIME, e->e_flags) &&
1558 		bitset(MM_CVTMIME, MimeMode)))))
1559 	{
1560 		e->e_status = "5.6.3";
1561 		usrerrenh(e->e_status,
1562 		       "554 Cannot send 8-bit data to 7-bit destination");
1563 		rcode = EX_DATAERR;
1564 		goto give_up;
1565 	}
1566 
1567 	if (tTd(62, 8))
1568 		checkfds("before delivery");
1569 
1570 	/* check for Local Person Communication -- not for mortals!!! */
1571 	if (strcmp(m->m_mailer, "[LPC]") == 0)
1572 	{
1573 		mci = (MCI *) xalloc(sizeof *mci);
1574 		memset((char *) mci, '\0', sizeof *mci);
1575 		mci->mci_in = stdin;
1576 		mci->mci_out = stdout;
1577 		mci->mci_state = clever ? MCIS_OPENING : MCIS_OPEN;
1578 		mci->mci_mailer = m;
1579 	}
1580 	else if (strcmp(m->m_mailer, "[IPC]") == 0 ||
1581 		 strcmp(m->m_mailer, "[TCP]") == 0)
1582 	{
1583 #if DAEMON
1584 		register int i;
1585 
1586 		if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1587 		{
1588 			syserr("null destination for %s mailer", m->m_mailer);
1589 			rcode = EX_CONFIG;
1590 			goto give_up;
1591 		}
1592 
1593 # if NETUNIX
1594 		if (strcmp(pv[0], "FILE") == 0)
1595 		{
1596 			curhost = CurHostName = "localhost";
1597 			mux_path = pv[1];
1598 		}
1599 		else
1600 # endif /* NETUNIX */
1601 		{
1602 			CurHostName = pv[1];
1603 			curhost = hostsignature(m, pv[1]);
1604 		}
1605 
1606 		if (curhost == NULL || curhost[0] == '\0')
1607 		{
1608 			syserr("null host signature for %s", pv[1]);
1609 			rcode = EX_CONFIG;
1610 			goto give_up;
1611 		}
1612 
1613 		if (!clever)
1614 		{
1615 			syserr("554 5.3.5 non-clever IPC");
1616 			rcode = EX_CONFIG;
1617 			goto give_up;
1618 		}
1619 		if (pv[2] != NULL
1620 # if NETUNIX
1621 		    && mux_path == NULL
1622 # endif /* NETUNIX */
1623 		    )
1624 		{
1625 			port = htons((u_short)atoi(pv[2]));
1626 			if (port == 0)
1627 			{
1628 # ifdef NO_GETSERVBYNAME
1629 				syserr("Invalid port number: %s", pv[2]);
1630 # else /* NO_GETSERVBYNAME */
1631 				struct servent *sp = getservbyname(pv[2], "tcp");
1632 
1633 				if (sp == NULL)
1634 					syserr("Service %s unknown", pv[2]);
1635 				else
1636 					port = sp->s_port;
1637 # endif /* NO_GETSERVBYNAME */
1638 			}
1639 		}
1640 
1641 		nummxhosts = parse_hostsignature(curhost, mxhosts, m);
1642 tryhost:
1643 		while (hostnum < nummxhosts)
1644 		{
1645 			char sep = ':';
1646 			char *endp;
1647 			static char hostbuf[MAXNAME + 1];
1648 
1649 # if NETINET6
1650 			if (*mxhosts[hostnum] == '[')
1651 			{
1652 				endp = strchr(mxhosts[hostnum] + 1, ']');
1653 				if (endp != NULL)
1654 					endp = strpbrk(endp + 1, ":,");
1655 			}
1656 			else
1657 				endp = strpbrk(mxhosts[hostnum], ":,");
1658 # else /* NETINET6 */
1659 			endp = strpbrk(mxhosts[hostnum], ":,");
1660 # endif /* NETINET6 */
1661 			if (endp != NULL)
1662 			{
1663 				sep = *endp;
1664 				*endp = '\0';
1665 			}
1666 
1667 			if (*mxhosts[hostnum] == '\0')
1668 			{
1669 				syserr("deliver: null host name in signature");
1670 				hostnum++;
1671 				if (endp != NULL)
1672 					*endp = sep;
1673 				continue;
1674 			}
1675 			(void) strlcpy(hostbuf, mxhosts[hostnum],
1676 				       sizeof hostbuf);
1677 			hostnum++;
1678 			if (endp != NULL)
1679 				*endp = sep;
1680 
1681 			/* see if we already know that this host is fried */
1682 			CurHostName = hostbuf;
1683 			mci = mci_get(hostbuf, m);
1684 			if (mci->mci_state != MCIS_CLOSED)
1685 			{
1686 				if (tTd(11, 1))
1687 				{
1688 					dprintf("openmailer: ");
1689 					mci_dump(mci, FALSE);
1690 				}
1691 				CurHostName = mci->mci_host;
1692 				message("Using cached %sSMTP connection to %s via %s...",
1693 					bitset(MCIF_ESMTP, mci->mci_flags) ? "E" : "",
1694 					hostbuf, m->m_name);
1695 				mci->mci_deliveries++;
1696 				break;
1697 			}
1698 			mci->mci_mailer = m;
1699 			if (mci->mci_exitstat != EX_OK)
1700 			{
1701 				if (mci->mci_exitstat == EX_TEMPFAIL)
1702 					goodmxfound = TRUE;
1703 				continue;
1704 			}
1705 
1706 			if (mci_lock_host(mci) != EX_OK)
1707 			{
1708 				mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
1709 				goodmxfound = TRUE;
1710 				continue;
1711 			}
1712 
1713 			/* try the connection */
1714 			sm_setproctitle(TRUE, e, "%s %s: %s",
1715 					qid_printname(e),
1716 					hostbuf, "user open");
1717 # if NETUNIX
1718 			if (mux_path != NULL)
1719 			{
1720 				message("Connecting to %s via %s...",
1721 					mux_path, m->m_name);
1722 				i = makeconnection_ds(mux_path, mci);
1723 			}
1724 			else
1725 # endif /* NETUNIX */
1726 			{
1727 				if (port == 0)
1728 					message("Connecting to %s via %s...",
1729 						hostbuf, m->m_name);
1730 				else
1731 					message("Connecting to %s port %d via %s...",
1732 						hostbuf, ntohs(port),
1733 						m->m_name);
1734 				i = makeconnection(hostbuf, port, mci, e);
1735 			}
1736 			mci->mci_errno = errno;
1737 			mci->mci_lastuse = curtime();
1738 			mci->mci_deliveries = 0;
1739 			mci->mci_exitstat = i;
1740 # if NAMED_BIND
1741 			mci->mci_herrno = h_errno;
1742 # endif /* NAMED_BIND */
1743 			if (i == EX_OK)
1744 			{
1745 				goodmxfound = TRUE;
1746 				mci->mci_state = MCIS_OPENING;
1747 				mci_cache(mci);
1748 				if (TrafficLogFile != NULL)
1749 					fprintf(TrafficLogFile, "%05d === CONNECT %s\n",
1750 						(int) getpid(), hostbuf);
1751 				break;
1752 			}
1753 			else
1754 			{
1755 				if (tTd(11, 1))
1756 					dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
1757 						i, errno);
1758 				if (i == EX_TEMPFAIL)
1759 					goodmxfound = TRUE;
1760 				mci_unlock_host(mci);
1761 			}
1762 
1763 			/* enter status of this host */
1764 			setstat(i);
1765 
1766 			/* should print some message here for -v mode */
1767 		}
1768 		if (mci == NULL)
1769 		{
1770 			syserr("deliver: no host name");
1771 			rcode = EX_SOFTWARE;
1772 			goto give_up;
1773 		}
1774 		mci->mci_pid = 0;
1775 #else /* DAEMON */
1776 		syserr("554 5.3.5 openmailer: no IPC");
1777 		if (tTd(11, 1))
1778 			dprintf("openmailer: NULL\n");
1779 		rcode = EX_UNAVAILABLE;
1780 		goto give_up;
1781 #endif /* DAEMON */
1782 	}
1783 	else
1784 	{
1785 		/* flush any expired connections */
1786 		(void) mci_scan(NULL);
1787 		mci = NULL;
1788 
1789 #if SMTP
1790 		if (bitnset(M_LMTP, m->m_flags))
1791 		{
1792 			/* try to get a cached connection */
1793 			mci = mci_get(m->m_name, m);
1794 			if (mci->mci_host == NULL)
1795 				mci->mci_host = m->m_name;
1796 			CurHostName = mci->mci_host;
1797 			if (mci->mci_state != MCIS_CLOSED)
1798 			{
1799 				message("Using cached LMTP connection for %s...",
1800 					m->m_name);
1801 				mci->mci_deliveries++;
1802 				goto do_transfer;
1803 			}
1804 		}
1805 #endif /* SMTP */
1806 
1807 		/* announce the connection to verbose listeners */
1808 		if (host == NULL || host[0] == '\0')
1809 			message("Connecting to %s...", m->m_name);
1810 		else
1811 			message("Connecting to %s via %s...", host, m->m_name);
1812 		if (TrafficLogFile != NULL)
1813 		{
1814 			char **av;
1815 
1816 			fprintf(TrafficLogFile, "%05d === EXEC", (int) getpid());
1817 			for (av = pv; *av != NULL; av++)
1818 				fprintf(TrafficLogFile, " %s", *av);
1819 			fprintf(TrafficLogFile, "\n");
1820 		}
1821 
1822 #if XDEBUG
1823 		checkfd012("before creating mail pipe");
1824 #endif /* XDEBUG */
1825 
1826 		/* create a pipe to shove the mail through */
1827 		if (pipe(mpvect) < 0)
1828 		{
1829 			syserr("%s... openmailer(%s): pipe (to mailer)",
1830 				shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
1831 			if (tTd(11, 1))
1832 				dprintf("openmailer: NULL\n");
1833 			rcode = EX_OSERR;
1834 			goto give_up;
1835 		}
1836 
1837 #if XDEBUG
1838 		/* make sure we didn't get one of the standard I/O files */
1839 		if (mpvect[0] < 3 || mpvect[1] < 3)
1840 		{
1841 			syserr("%s... openmailer(%s): bogus mpvect %d %d",
1842 				shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
1843 				mpvect[0], mpvect[1]);
1844 			printopenfds(TRUE);
1845 			if (tTd(11, 1))
1846 				dprintf("openmailer: NULL\n");
1847 			rcode = EX_OSERR;
1848 			goto give_up;
1849 		}
1850 
1851 		/* make sure system call isn't dead meat */
1852 		checkfdopen(mpvect[0], "mpvect[0]");
1853 		checkfdopen(mpvect[1], "mpvect[1]");
1854 		if (mpvect[0] == mpvect[1] ||
1855 		    (e->e_lockfp != NULL &&
1856 		     (mpvect[0] == fileno(e->e_lockfp) ||
1857 		      mpvect[1] == fileno(e->e_lockfp))))
1858 		{
1859 			if (e->e_lockfp == NULL)
1860 				syserr("%s... openmailer(%s): overlapping mpvect %d %d",
1861 					shortenstring(e->e_to, MAXSHORTSTR),
1862 					m->m_name, mpvect[0], mpvect[1]);
1863 			else
1864 				syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
1865 					shortenstring(e->e_to, MAXSHORTSTR),
1866 					m->m_name, mpvect[0], mpvect[1],
1867 					fileno(e->e_lockfp));
1868 		}
1869 #endif /* XDEBUG */
1870 
1871 		/* create a return pipe */
1872 		if (pipe(rpvect) < 0)
1873 		{
1874 			syserr("%s... openmailer(%s): pipe (from mailer)",
1875 				shortenstring(e->e_to, MAXSHORTSTR),
1876 				m->m_name);
1877 			(void) close(mpvect[0]);
1878 			(void) close(mpvect[1]);
1879 			if (tTd(11, 1))
1880 				dprintf("openmailer: NULL\n");
1881 			rcode = EX_OSERR;
1882 			goto give_up;
1883 		}
1884 #if XDEBUG
1885 		checkfdopen(rpvect[0], "rpvect[0]");
1886 		checkfdopen(rpvect[1], "rpvect[1]");
1887 #endif /* XDEBUG */
1888 
1889 		/*
1890 		**  Actually fork the mailer process.
1891 		**	DOFORK is clever about retrying.
1892 		**
1893 		**	Dispose of SIGCHLD signal catchers that may be laying
1894 		**	around so that endmailer will get it.
1895 		*/
1896 
1897 		if (e->e_xfp != NULL)
1898 			(void) fflush(e->e_xfp);	/* for debugging */
1899 		(void) fflush(stdout);
1900 		(void) setsignal(SIGCHLD, SIG_DFL);
1901 
1902 
1903 		DOFORK(FORK);
1904 		/* pid is set by DOFORK */
1905 
1906 		if (pid < 0)
1907 		{
1908 			/* failure */
1909 			syserr("%s... openmailer(%s): cannot fork",
1910 				shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
1911 			(void) close(mpvect[0]);
1912 			(void) close(mpvect[1]);
1913 			(void) close(rpvect[0]);
1914 			(void) close(rpvect[1]);
1915 			if (tTd(11, 1))
1916 				dprintf("openmailer: NULL\n");
1917 			rcode = EX_OSERR;
1918 			goto give_up;
1919 		}
1920 		else if (pid == 0)
1921 		{
1922 			int i;
1923 			int save_errno;
1924 			int new_euid = NO_UID;
1925 			int new_ruid = NO_UID;
1926 			int new_gid = NO_GID;
1927 			struct stat stb;
1928 			extern int DtableSize;
1929 
1930 			/* clear the events to turn off SIGALRMs */
1931 			clear_events();
1932 
1933 			/* Reset global flags */
1934 			RestartRequest = NULL;
1935 			ShutdownRequest = NULL;
1936 			PendingSignal = 0;
1937 
1938 			if (e->e_lockfp != NULL)
1939 				(void) close(fileno(e->e_lockfp));
1940 
1941 			/* child -- set up input & exec mailer */
1942 			(void) setsignal(SIGALRM, sm_signal_noop);
1943 			(void) setsignal(SIGCHLD, SIG_DFL);
1944 			(void) setsignal(SIGHUP, SIG_IGN);
1945 			(void) setsignal(SIGINT, SIG_IGN);
1946 			(void) setsignal(SIGTERM, SIG_DFL);
1947 # ifdef SIGUSR1
1948 			(void) setsignal(SIGUSR1, sm_signal_noop);
1949 # endif /* SIGUSR1 */
1950 
1951 			if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
1952 				stb.st_mode = 0;
1953 
1954 # if HASSETUSERCONTEXT
1955 			/*
1956 			**  Set user resources.
1957 			*/
1958 
1959 			if (contextaddr != NULL)
1960 			{
1961 				struct passwd *pwd;
1962 
1963 				if (contextaddr->q_ruser != NULL)
1964 					pwd = sm_getpwnam(contextaddr->q_ruser);
1965 				else
1966 					pwd = sm_getpwnam(contextaddr->q_user);
1967 				if (pwd != NULL)
1968 					(void) setusercontext(NULL,
1969 						pwd, pwd->pw_uid,
1970 						LOGIN_SETRESOURCES|LOGIN_SETPRIORITY);
1971 			}
1972 # endif /* HASSETUSERCONTEXT */
1973 
1974 			/* tweak niceness */
1975 			if (m->m_nice != 0)
1976 				(void) nice(m->m_nice);
1977 
1978 			/* reset group id */
1979 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
1980 				new_gid = m->m_gid;
1981 			else if (bitset(S_ISGID, stb.st_mode))
1982 				new_gid = stb.st_gid;
1983 			else if (ctladdr != NULL && ctladdr->q_gid != 0)
1984 			{
1985 				if (!DontInitGroups)
1986 				{
1987 					char *u = ctladdr->q_ruser;
1988 
1989 					if (u == NULL)
1990 						u = ctladdr->q_user;
1991 
1992 					if (initgroups(u, ctladdr->q_gid) == -1 && suidwarn)
1993 					{
1994 						syserr("openmailer: initgroups(%s, %d) failed",
1995 							u, ctladdr->q_gid);
1996 						exit(EX_TEMPFAIL);
1997 					}
1998 				}
1999 				else
2000 				{
2001 					GIDSET_T gidset[1];
2002 
2003 					gidset[0] = ctladdr->q_gid;
2004 					if (setgroups(1, gidset) == -1 && suidwarn)
2005 					{
2006 						syserr("openmailer: setgroups() failed");
2007 						exit(EX_TEMPFAIL);
2008 					}
2009 				}
2010 				new_gid = ctladdr->q_gid;
2011 			}
2012 			else
2013 			{
2014 				if (!DontInitGroups)
2015 				{
2016 					if (initgroups(DefUser, DefGid) == -1 && suidwarn)
2017 					{
2018 						syserr("openmailer: initgroups(%s, %d) failed",
2019 							DefUser, DefGid);
2020 						exit(EX_TEMPFAIL);
2021 					}
2022 				}
2023 				else
2024 				{
2025 					GIDSET_T gidset[1];
2026 
2027 					gidset[0] = DefGid;
2028 					if (setgroups(1, gidset) == -1 && suidwarn)
2029 					{
2030 						syserr("openmailer: setgroups() failed");
2031 						exit(EX_TEMPFAIL);
2032 					}
2033 				}
2034 				if (m->m_gid == 0)
2035 					new_gid = DefGid;
2036 				else
2037 					new_gid = m->m_gid;
2038 			}
2039 			if (new_gid != NO_GID)
2040 			{
2041 				if (RunAsUid != 0 &&
2042 				    bitnset(M_SPECIFIC_UID, m->m_flags) &&
2043 				    new_gid != getgid() &&
2044 				    new_gid != getegid())
2045 				{
2046 					/* Only root can change the gid */
2047 					syserr("openmailer: insufficient privileges to change gid");
2048 					exit(EX_TEMPFAIL);
2049 				}
2050 
2051 				if (setgid(new_gid) < 0 && suidwarn)
2052 				{
2053 					syserr("openmailer: setgid(%ld) failed",
2054 					       (long) new_gid);
2055 					exit(EX_TEMPFAIL);
2056 				}
2057 			}
2058 
2059 			/* change root to some "safe" directory */
2060 			if (m->m_rootdir != NULL)
2061 			{
2062 				expand(m->m_rootdir, buf, sizeof buf, e);
2063 				if (tTd(11, 20))
2064 					dprintf("openmailer: chroot %s\n",
2065 						buf);
2066 				if (chroot(buf) < 0)
2067 				{
2068 					syserr("openmailer: Cannot chroot(%s)",
2069 					       buf);
2070 					exit(EX_TEMPFAIL);
2071 				}
2072 				if (chdir("/") < 0)
2073 				{
2074 					syserr("openmailer: cannot chdir(/)");
2075 					exit(EX_TEMPFAIL);
2076 				}
2077 			}
2078 
2079 			/* reset user id */
2080 			endpwent();
2081 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2082 			{
2083 				new_euid = m->m_uid;
2084 
2085 				/*
2086 				**  Undo the effects of the uid change in main
2087 				**  for signal handling.  The real uid may
2088 				**  be used by mailer in adding a "From "
2089 				**  line.
2090 				*/
2091 
2092 				if (RealUid != 0 && RealUid != getuid())
2093 					new_ruid = RealUid;
2094 			}
2095 			else if (bitset(S_ISUID, stb.st_mode))
2096 				new_ruid = stb.st_uid;
2097 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
2098 				new_ruid = ctladdr->q_uid;
2099 			else if (m->m_uid != 0)
2100 				new_ruid = m->m_uid;
2101 			else
2102 				new_ruid = DefUid;
2103 			if (new_euid != NO_UID)
2104 			{
2105 				if (RunAsUid != 0 && new_euid != RunAsUid)
2106 				{
2107 					/* Only root can change the uid */
2108 					syserr("openmailer: insufficient privileges to change uid");
2109 					exit(EX_TEMPFAIL);
2110 				}
2111 
2112 				vendor_set_uid(new_euid);
2113 # if MAILER_SETUID_METHOD == USE_SETEUID
2114 #  if HASSETREUID
2115 				/*
2116 				**  Undo the effects of the uid change in main
2117 				**  for signal handling.  The real uid may
2118 				**  be used by mailer in adding a "From "
2119 				**  line.
2120 				*/
2121 
2122 				if (new_ruid != NO_UID &&
2123 				    setreuid(RealUid, geteuid()) < 0)
2124 				{
2125 					syserr("openmailer: setreuid(%d, %d) failed",
2126 					       (int) new_ruid, (int) geteuid());
2127 					exit(EX_OSERR);
2128 				}
2129 #  endif /* HASSETREUID */
2130 				if (seteuid(new_euid) < 0 && suidwarn)
2131 				{
2132 					syserr("openmailer: seteuid(%ld) failed",
2133 						(long) new_euid);
2134 					exit(EX_TEMPFAIL);
2135 				}
2136 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2137 # if MAILER_SETUID_METHOD == USE_SETREUID
2138 				if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2139 				{
2140 					syserr("openmailer: setreuid(%ld, %ld) failed",
2141 						(long) new_ruid, (long) new_euid);
2142 					exit(EX_TEMPFAIL);
2143 				}
2144 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2145 # if MAILER_SETUID_METHOD == USE_SETUID
2146 				if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2147 				{
2148 					syserr("openmailer: setuid(%ld) failed",
2149 						(long) new_euid);
2150 					exit(EX_TEMPFAIL);
2151 				}
2152 # endif /* MAILER_SETUID_METHOD == USE_SETUID */
2153 			}
2154 			else if (new_ruid != NO_UID)
2155 			{
2156 				vendor_set_uid(new_ruid);
2157 				if (setuid(new_ruid) < 0 && suidwarn)
2158 				{
2159 					syserr("openmailer: setuid(%ld) failed",
2160 						(long) new_ruid);
2161 					exit(EX_TEMPFAIL);
2162 				}
2163 			}
2164 
2165 			if (tTd(11, 2))
2166 				dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2167 					(int) getuid(), (int) geteuid(),
2168 					(int) getgid(), (int) getegid());
2169 
2170 			/* move into some "safe" directory */
2171 			if (m->m_execdir != NULL)
2172 			{
2173 				char *q;
2174 
2175 				for (p = m->m_execdir; p != NULL; p = q)
2176 				{
2177 					q = strchr(p, ':');
2178 					if (q != NULL)
2179 						*q = '\0';
2180 					expand(p, buf, sizeof buf, e);
2181 					if (q != NULL)
2182 						*q++ = ':';
2183 					if (tTd(11, 20))
2184 						dprintf("openmailer: trydir %s\n",
2185 							buf);
2186 					if (buf[0] != '\0' && chdir(buf) >= 0)
2187 						break;
2188 				}
2189 			}
2190 
2191 			/* arrange to filter std & diag output of command */
2192 			(void) close(rpvect[0]);
2193 			if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2194 			{
2195 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2196 				       shortenstring(e->e_to, MAXSHORTSTR),
2197 				       m->m_name, rpvect[1]);
2198 				_exit(EX_OSERR);
2199 			}
2200 			(void) close(rpvect[1]);
2201 
2202 			if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2203 			{
2204 				syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2205 					shortenstring(e->e_to, MAXSHORTSTR),
2206 					m->m_name);
2207 				_exit(EX_OSERR);
2208 			}
2209 
2210 			/* arrange to get standard input */
2211 			(void) close(mpvect[1]);
2212 			if (dup2(mpvect[0], STDIN_FILENO) < 0)
2213 			{
2214 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2215 					shortenstring(e->e_to, MAXSHORTSTR),
2216 					m->m_name, mpvect[0]);
2217 				_exit(EX_OSERR);
2218 			}
2219 			(void) close(mpvect[0]);
2220 
2221 			/* arrange for all the files to be closed */
2222 			for (i = 3; i < DtableSize; i++)
2223 			{
2224 				register int j;
2225 
2226 				if ((j = fcntl(i, F_GETFD, 0)) != -1)
2227 					(void) fcntl(i, F_SETFD,
2228 						     j | FD_CLOEXEC);
2229 			}
2230 
2231 			/* run disconnected from terminal */
2232 			(void) setsid();
2233 
2234 			/* try to execute the mailer */
2235 			(void) execve(m->m_mailer, (ARGV_T) pv,
2236 				      (ARGV_T) UserEnviron);
2237 			save_errno = errno;
2238 			syserr("Cannot exec %s", m->m_mailer);
2239 			if (bitnset(M_LOCALMAILER, m->m_flags) ||
2240 			    transienterror(save_errno))
2241 				_exit(EX_OSERR);
2242 			_exit(EX_UNAVAILABLE);
2243 		}
2244 
2245 		/*
2246 		**  Set up return value.
2247 		*/
2248 
2249 		if (mci == NULL)
2250 		{
2251 			mci = (MCI *) xalloc(sizeof *mci);
2252 			memset((char *) mci, '\0', sizeof *mci);
2253 		}
2254 		mci->mci_mailer = m;
2255 		if (clever)
2256 		{
2257 			mci->mci_state = MCIS_OPENING;
2258 			mci_cache(mci);
2259 		}
2260 		else
2261 		{
2262 			mci->mci_state = MCIS_OPEN;
2263 		}
2264 		mci->mci_pid = pid;
2265 		(void) close(mpvect[0]);
2266 		mci->mci_out = fdopen(mpvect[1], "w");
2267 		if (mci->mci_out == NULL)
2268 		{
2269 			syserr("deliver: cannot create mailer output channel, fd=%d",
2270 				mpvect[1]);
2271 			(void) close(mpvect[1]);
2272 			(void) close(rpvect[0]);
2273 			(void) close(rpvect[1]);
2274 			rcode = EX_OSERR;
2275 			goto give_up;
2276 		}
2277 
2278 		(void) close(rpvect[1]);
2279 		mci->mci_in = fdopen(rpvect[0], "r");
2280 		if (mci->mci_in == NULL)
2281 		{
2282 			syserr("deliver: cannot create mailer input channel, fd=%d",
2283 			       mpvect[1]);
2284 			(void) close(rpvect[0]);
2285 			(void) fclose(mci->mci_out);
2286 			mci->mci_out = NULL;
2287 			rcode = EX_OSERR;
2288 			goto give_up;
2289 		}
2290 
2291 		/* Don't cache non-clever connections */
2292 		if (!clever)
2293 			mci->mci_flags |= MCIF_TEMP;
2294 	}
2295 
2296 	/*
2297 	**  If we are in SMTP opening state, send initial protocol.
2298 	*/
2299 
2300 	if (bitnset(M_7BITS, m->m_flags) &&
2301 	    (!clever || mci->mci_state == MCIS_OPENING))
2302 		mci->mci_flags |= MCIF_7BIT;
2303 #if SMTP
2304 	if (clever && mci->mci_state != MCIS_CLOSED)
2305 	{
2306 # if SASL && SFIO
2307 #  define DONE_AUTH(f)		bitset(MCIF_AUTHACT, f)
2308 # endif /* SASL && SFIO */
2309 # if STARTTLS
2310 #  define DONE_STARTTLS(f)	bitset(MCIF_TLSACT, f)
2311 # endif /* STARTTLS */
2312 # define ONLY_HELO(f)		bitset(MCIF_ONLY_EHLO, f)
2313 # define SET_HELO(f)		f |= MCIF_ONLY_EHLO
2314 # define CLR_HELO(f)		f &= ~MCIF_ONLY_EHLO
2315 
2316 
2317 # if STARTTLS || (SASL && SFIO)
2318 reconnect:	/* after switching to an authenticated connection */
2319 # endif /* STARTTLS || (SASL && SFIO) */
2320 
2321 # if SASL
2322 		mci->mci_saslcap = NULL;
2323 # endif /* SASL */
2324 		smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2325 		CLR_HELO(mci->mci_flags);
2326 
2327 # if STARTTLS
2328 		/* first TLS then AUTH to provide a security layer */
2329 		if (mci->mci_state != MCIS_CLOSED &&
2330 		    !DONE_STARTTLS(mci->mci_flags))
2331 		{
2332 			int olderrors;
2333 			int dotpos;
2334 			bool usetls;
2335 			bool saveQuickAbort = QuickAbort;
2336 			bool saveSuprErrs = SuprErrs;
2337 			char *host = NULL;
2338 #  if _FFR_TLS_CLT1
2339 			char *p;
2340 #  endif /* _FFR_TLS_CLT1 */
2341 			char *srvname;
2342 			extern SOCKADDR CurHostAddr;
2343 
2344 			rcode = EX_OK;
2345 			usetls = bitset(MCIF_TLS, mci->mci_flags);
2346 #  if _FFR_TLS_CLT1
2347 			if (usetls &&
2348 			    (p = macvalue(macid("{client_flags}", NULL), e))
2349 			    != NULL)
2350 			{
2351 				for (; *p != '\0'; p++)
2352 				{
2353 					/* look for just this one flag */
2354 					if (*p == D_CLTNOTLS)
2355 					{
2356 						usetls = FALSE;
2357 						break;
2358 					}
2359 				}
2360 			}
2361 #  endif /* _FFR_TLS_CLT1 */
2362 
2363 			if (mci->mci_host != NULL)
2364 			{
2365 				srvname = mci->mci_host;
2366 				dotpos = strlen(srvname) - 1;
2367 				if (dotpos >= 0)
2368 				{
2369 					if (srvname[dotpos] == '.')
2370 						srvname[dotpos] = '\0';
2371 					else
2372 						dotpos = -1;
2373 				}
2374 			}
2375 			else
2376 			{
2377 				srvname = "";
2378 				dotpos = -1;
2379 			}
2380 			define(macid("{server_name}", NULL),
2381 			       newstr(srvname), e);
2382 			if (CurHostAddr.sa.sa_family != 0)
2383 				define(macid("{server_addr}", NULL),
2384 				       newstr(anynet_ntoa(&CurHostAddr)), e);
2385 			else
2386 				define(macid("{server_addr}", NULL), NULL, e);
2387 			if (usetls)
2388 			{
2389 				host = macvalue(macid("{server_name}", NULL),
2390 						e);
2391 #  if _FFR_TLS_O_T
2392 				olderrors = Errors;
2393 				QuickAbort = FALSE;
2394 				SuprErrs = TRUE;
2395 				if (rscheck("try_tls", srvname, NULL,
2396 					    e, TRUE, FALSE, 8, host) != EX_OK
2397 				    || Errors > olderrors)
2398 					usetls = FALSE;
2399 				SuprErrs = saveSuprErrs;
2400 				QuickAbort = saveQuickAbort;
2401 #  endif /* _FFR_TLS_O_T */
2402 			}
2403 
2404 			/* undo change of srvname */
2405 			if (dotpos >= 0)
2406 				srvname[dotpos] = '.';
2407 			if (usetls)
2408 			{
2409 				if ((rcode = starttls(m, mci, e)) == EX_OK)
2410 				{
2411 					/* start again without STARTTLS */
2412 					mci->mci_flags |= MCIF_TLSACT;
2413 				}
2414 				else
2415 				{
2416 					char *s;
2417 
2418 					/*
2419 					**  TLS negotation failed, what to do?
2420 					**  fall back to unencrypted connection
2421 					**  or abort? How to decide?
2422 					**  set a macro and call a ruleset.
2423 					*/
2424 					mci->mci_flags &= ~MCIF_TLS;
2425 					switch (rcode)
2426 					{
2427 					  case EX_TEMPFAIL:
2428 						s = "TEMP";
2429 						break;
2430 					  case EX_USAGE:
2431 						s = "USAGE";
2432 						break;
2433 					  case EX_PROTOCOL:
2434 						s = "PROTOCOL";
2435 						break;
2436 					  case EX_SOFTWARE:
2437 						s = "SOFTWARE";
2438 						break;
2439 
2440 					  /* everything else is a failure */
2441 					  default:
2442 						s = "FAILURE";
2443 						rcode = EX_TEMPFAIL;
2444 					}
2445 					define(macid("{verify}", NULL),
2446 					       newstr(s), e);
2447 				}
2448 			}
2449 			else if (mci->mci_ssl != NULL)
2450 			{
2451 				/* active TLS connection, use that data */
2452 				(void) tls_get_info(mci->mci_ssl, e, FALSE,
2453 						    mci->mci_host, FALSE);
2454 			}
2455 			else
2456 				define(macid("{verify}", NULL), "NONE", e);
2457 			olderrors = Errors;
2458 			QuickAbort = FALSE;
2459 			SuprErrs = TRUE;
2460 
2461 			/*
2462 			**  rcode == EX_SOFTWARE is special:
2463 			**  the TLS negotation failed
2464 			**  we have to drop the connection no matter what
2465 			**  However, we call tls_server to give it the chance
2466 			**  to log the problem and return an appropriate
2467 			**  error code.
2468 			*/
2469 			if (rscheck("tls_server",
2470 				     macvalue(macid("{verify}", NULL), e),
2471 				     NULL, e, TRUE, TRUE, 6, host) != EX_OK ||
2472 			    Errors > olderrors ||
2473 			    rcode == EX_SOFTWARE)
2474 			{
2475 				char enhsc[ENHSCLEN];
2476 				extern char MsgBuf[];
2477 
2478 				if (ISSMTPCODE(MsgBuf) &&
2479 				    extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
2480 				{
2481 					p = newstr(MsgBuf);
2482 				}
2483 				else
2484 				{
2485 					p = "403 4.7.0 server not authenticated.";
2486 					(void) strlcpy(enhsc, "4.7.0",
2487 						       sizeof enhsc);
2488 				}
2489 				SuprErrs = saveSuprErrs;
2490 				QuickAbort = saveQuickAbort;
2491 
2492 				if (rcode == EX_SOFTWARE)
2493 				{
2494 					/* drop the connection */
2495 					mci->mci_state = MCIS_QUITING;
2496 					if (mci->mci_in != NULL)
2497 					{
2498 						(void) fclose(mci->mci_in);
2499 						mci->mci_in = NULL;
2500 					}
2501 					mci->mci_flags &= ~MCIF_TLSACT;
2502 					(void) endmailer(mci, e, pv);
2503 				}
2504 				else
2505 				{
2506 					/* abort transfer */
2507 					smtpquit(m, mci, e);
2508 				}
2509 
2510 				/* avoid bogus error msg */
2511 				mci->mci_errno = 0;
2512 
2513 				/* temp or permanent failure? */
2514 				rcode = (*p == '4') ? EX_TEMPFAIL
2515 						    : EX_UNAVAILABLE;
2516 				mci_setstat(mci, rcode, newstr(enhsc), p);
2517 
2518 				/*
2519 				**  hack to get the error message into
2520 				**  the envelope (done in giveresponse())
2521 				*/
2522 				(void) strlcpy(SmtpError, p, sizeof SmtpError);
2523 			}
2524 			QuickAbort = saveQuickAbort;
2525 			SuprErrs = saveSuprErrs;
2526 			if (DONE_STARTTLS(mci->mci_flags) &&
2527 			    mci->mci_state != MCIS_CLOSED)
2528 			{
2529 				SET_HELO(mci->mci_flags);
2530 				mci->mci_flags &= ~MCIF_EXTENS;
2531 				goto reconnect;
2532 			}
2533 		}
2534 		else if (mci->mci_ssl != NULL)
2535 		{
2536 			/* active TLS connection, use that data */
2537 			(void) tls_get_info(mci->mci_ssl, e, FALSE,
2538 					    mci->mci_host, FALSE);
2539 		}
2540 # endif /* STARTTLS */
2541 # if SASL
2542 		/* if other server supports authentication let's authenticate */
2543 		if (mci->mci_state != MCIS_CLOSED &&
2544 		    mci->mci_saslcap != NULL &&
2545 #  if SFIO
2546 		    !DONE_AUTH(mci->mci_flags) &&
2547 #  endif /* SFIO */
2548 		    SASLInfo != NULL)
2549 		{
2550 			/*
2551 			**  should we require some minimum authentication?
2552 			**  XXX ignore result?
2553 			*/
2554 			if (smtpauth(m, mci, e) == EX_OK)
2555 			{
2556 #  if SFIO
2557 				int result;
2558 				sasl_ssf_t *ssf;
2559 
2560 				/* get security strength (features) */
2561 				result = sasl_getprop(mci->mci_conn, SASL_SSF,
2562 						      (void **) &ssf);
2563 				if (LogLevel > 9)
2564 					sm_syslog(LOG_INFO, NOQID,
2565 						  "SASL: outgoing connection to %.64s: mech=%.16s, bits=%d",
2566 						  mci->mci_host,
2567 						  macvalue(macid("{auth_type}",
2568 								 NULL), e),
2569 						  result == SASL_OK ? *ssf
2570 						  		    : 0);
2571 
2572 				/*
2573 				**  only switch to encrypted connection
2574 				**  if a security layer has been negotiated
2575 				*/
2576 				if (result == SASL_OK && *ssf > 0)
2577 				{
2578 					/*
2579 					**  convert sfio stuff to use SASL
2580 					**  check return values
2581 					**  if the call fails,
2582 					**  fall back to unencrypted version
2583 					**  unless some cf option requires
2584 					**  encryption then the connection must
2585 					**  be aborted
2586 					*/
2587 					if (sfdcsasl(mci->mci_in, mci->mci_out,
2588 						     mci->mci_conn) == 0)
2589 					{
2590 						SET_HELO(mci->mci_flags);
2591 						mci->mci_flags &= ~MCIF_EXTENS;
2592 						mci->mci_flags |= MCIF_AUTHACT;
2593 						goto reconnect;
2594 					}
2595 					syserr("SASL TLS switch failed in client");
2596 				}
2597 				/* else? XXX */
2598 #  endif /* SFIO */
2599 				mci->mci_flags |= MCIF_AUTHACT;
2600 
2601 			}
2602 		}
2603 # endif /* SASL */
2604 	}
2605 
2606 #endif /* SMTP */
2607 
2608 do_transfer:
2609 	/* clear out per-message flags from connection structure */
2610 	mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
2611 
2612 	if (bitset(EF_HAS8BIT, e->e_flags) &&
2613 	    !bitset(EF_DONT_MIME, e->e_flags) &&
2614 	    bitnset(M_7BITS, m->m_flags))
2615 		mci->mci_flags |= MCIF_CVT8TO7;
2616 
2617 #if MIME7TO8
2618 	if (bitnset(M_MAKE8BIT, m->m_flags) &&
2619 	    !bitset(MCIF_7BIT, mci->mci_flags) &&
2620 	    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
2621 	     (strcasecmp(p, "quoted-printable") == 0 ||
2622 	      strcasecmp(p, "base64") == 0) &&
2623 	    (p = hvalue("Content-Type", e->e_header)) != NULL)
2624 	{
2625 		/* may want to convert 7 -> 8 */
2626 		/* XXX should really parse it here -- and use a class XXX */
2627 		if (strncasecmp(p, "text/plain", 10) == 0 &&
2628 		    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
2629 			mci->mci_flags |= MCIF_CVT7TO8;
2630 	}
2631 #endif /* MIME7TO8 */
2632 
2633 	if (tTd(11, 1))
2634 	{
2635 		dprintf("openmailer: ");
2636 		mci_dump(mci, FALSE);
2637 	}
2638 
2639 	if (mci->mci_state != MCIS_OPEN)
2640 	{
2641 		/* couldn't open the mailer */
2642 		rcode = mci->mci_exitstat;
2643 		errno = mci->mci_errno;
2644 #if NAMED_BIND
2645 		SM_SET_H_ERRNO(mci->mci_herrno);
2646 #endif /* NAMED_BIND */
2647 		if (rcode == EX_OK)
2648 		{
2649 			/* shouldn't happen */
2650 			syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
2651 				(u_long) mci, rcode, errno, mci->mci_state,
2652 				firstsig);
2653 			mci_dump_all(TRUE);
2654 			rcode = EX_SOFTWARE;
2655 		}
2656 #if DAEMON
2657 		else if (nummxhosts > hostnum)
2658 		{
2659 			/* try next MX site */
2660 			goto tryhost;
2661 		}
2662 #endif /* DAEMON */
2663 	}
2664 	else if (!clever)
2665 	{
2666 		/*
2667 		**  Format and send message.
2668 		*/
2669 
2670 		putfromline(mci, e);
2671 		(*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
2672 		(*e->e_putbody)(mci, e, NULL);
2673 
2674 		/* get the exit status */
2675 		rcode = endmailer(mci, e, pv);
2676 		if (rcode == EX_TEMPFAIL &&
2677 		    SmtpError[0] == '\0')
2678 		{
2679 			/*
2680 			**  Need an e_message for mailq display.
2681 			**  We set SmtpError as
2682 			*/
2683 
2684 			snprintf(SmtpError, sizeof SmtpError,
2685 				 "%s mailer (%s) exited with EX_TEMPFAIL",
2686 				 m->m_name, m->m_mailer);
2687 		}
2688 	}
2689 	else
2690 #if SMTP
2691 	{
2692 		/*
2693 		**  Send the MAIL FROM: protocol
2694 		*/
2695 
2696 		rcode = smtpmailfrom(m, mci, e);
2697 		if (rcode == EX_OK)
2698 		{
2699 			register char *t = tobuf;
2700 			register int i;
2701 
2702 			/* send the recipient list */
2703 			tobuf[0] = '\0';
2704 
2705 			for (to = tochain; to != NULL; to = to->q_tchain)
2706 			{
2707 				e->e_to = to->q_paddr;
2708 #if !_FFR_DYNAMIC_TOBUF
2709 				if (strlen(to->q_paddr) +
2710 				    (t - tobuf) + 2 > sizeof tobuf)
2711 				{
2712 					/* not enough room */
2713 					continue;
2714 				}
2715 #endif /* !_FFR_DYNAMIC_TOBUF */
2716 
2717 # if STARTTLS
2718 #  if _FFR_TLS_RCPT
2719 				i = rscheck("tls_rcpt", to->q_user, NULL, e,
2720 					    TRUE, TRUE, 4, mci->mci_host);
2721 				if (i != EX_OK)
2722 				{
2723 					/* avoid bogus error msg */
2724 					errno = 0;
2725 					markfailure(e, to, mci, i, FALSE);
2726 					giveresponse(i, to->q_status,  m,
2727 						     mci, ctladdr, xstart, e);
2728 					continue;
2729 				}
2730 #  endif /* _FFR_TLS_RCPT */
2731 # endif /* STARTTLS */
2732 
2733 				if ((i = smtprcpt(to, m, mci, e)) != EX_OK)
2734 				{
2735 					markfailure(e, to, mci, i, FALSE);
2736 					giveresponse(i, to->q_status,  m,
2737 						     mci, ctladdr, xstart, e);
2738 				}
2739 				else
2740 				{
2741 					*t++ = ',';
2742 					for (p = to->q_paddr; *p; *t++ = *p++)
2743 						continue;
2744 					*t = '\0';
2745 				}
2746 			}
2747 
2748 			/* now send the data */
2749 			if (tobuf[0] == '\0')
2750 			{
2751 				rcode = EX_OK;
2752 				e->e_to = NULL;
2753 				if (bitset(MCIF_CACHED, mci->mci_flags))
2754 					smtprset(m, mci, e);
2755 			}
2756 			else
2757 			{
2758 				e->e_to = tobuf + 1;
2759 				rcode = smtpdata(m, mci, e);
2760 			}
2761 		}
2762 # if DAEMON
2763 		if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
2764 		{
2765 			/* try next MX site */
2766 			goto tryhost;
2767 		}
2768 # endif /* DAEMON */
2769 	}
2770 #else /* SMTP */
2771 	{
2772 		syserr("554 5.3.5 deliver: need SMTP compiled to use clever mailer");
2773 		rcode = EX_CONFIG;
2774 		goto give_up;
2775 	}
2776 #endif /* SMTP */
2777 #if NAMED_BIND
2778 	if (ConfigLevel < 2)
2779 		_res.options |= RES_DEFNAMES | RES_DNSRCH;	/* XXX */
2780 #endif /* NAMED_BIND */
2781 
2782 	if (tTd(62, 1))
2783 		checkfds("after delivery");
2784 
2785 	/*
2786 	**  Do final status disposal.
2787 	**	We check for something in tobuf for the SMTP case.
2788 	**	If we got a temporary failure, arrange to queue the
2789 	**		addressees.
2790 	*/
2791 
2792   give_up:
2793 #if SMTP
2794 	if (bitnset(M_LMTP, m->m_flags))
2795 	{
2796 		lmtp_rcode = rcode;
2797 		tobuf[0] = '\0';
2798 		anyok = FALSE;
2799 	}
2800 	else
2801 #endif /* SMTP */
2802 		anyok = rcode == EX_OK;
2803 
2804 	for (to = tochain; to != NULL; to = to->q_tchain)
2805 	{
2806 		/* see if address already marked */
2807 		if (!QS_IS_OK(to->q_state))
2808 			continue;
2809 
2810 #if SMTP
2811 		/* if running LMTP, get the status for each address */
2812 		if (bitnset(M_LMTP, m->m_flags))
2813 		{
2814 			if (lmtp_rcode == EX_OK)
2815 				rcode = smtpgetstat(m, mci, e);
2816 			if (rcode == EX_OK)
2817 			{
2818 #if _FFR_DYNAMIC_TOBUF
2819 				(void) strlcat(tobuf, ",", tobufsize);
2820 				(void) strlcat(tobuf, to->q_paddr, tobufsize);
2821 #else /* _FFR_DYNAMIC_TOBUF */
2822 				if (strlen(to->q_paddr) +
2823 				    strlen(tobuf) + 2 > sizeof tobuf)
2824 				{
2825 					syserr("LMTP tobuf overflow");
2826 				}
2827 				else
2828 				{
2829 					(void) strlcat(tobuf, ",",
2830 						       sizeof tobuf);
2831 					(void) strlcat(tobuf, to->q_paddr,
2832 						       sizeof tobuf);
2833 				}
2834 #endif /* _FFR_DYNAMIC_TOBUF */
2835 				anyok = TRUE;
2836 			}
2837 			else
2838 			{
2839 				e->e_to = to->q_paddr;
2840 				markfailure(e, to, mci, rcode, TRUE);
2841 				giveresponse(rcode, to->q_status, m, mci,
2842 					     ctladdr, xstart, e);
2843 				e->e_to = tobuf + 1;
2844 				continue;
2845 			}
2846 		}
2847 		else
2848 #endif /* SMTP */
2849 		{
2850 			/* mark bad addresses */
2851 			if (rcode != EX_OK)
2852 			{
2853 				if (goodmxfound && rcode == EX_NOHOST)
2854 					rcode = EX_TEMPFAIL;
2855 				markfailure(e, to, mci, rcode, TRUE);
2856 				continue;
2857 			}
2858 		}
2859 
2860 		/* successful delivery */
2861 		to->q_state = QS_SENT;
2862 		to->q_statdate = curtime();
2863 		e->e_nsent++;
2864 
2865 #if QUEUE
2866 		/*
2867 		**  Checkpoint the send list every few addresses
2868 		*/
2869 
2870 		if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
2871 		{
2872 			queueup(e, FALSE);
2873 			e->e_nsent = 0;
2874 		}
2875 #endif /* QUEUE */
2876 
2877 		if (bitnset(M_LOCALMAILER, m->m_flags) &&
2878 		    bitset(QPINGONSUCCESS, to->q_flags))
2879 		{
2880 			to->q_flags |= QDELIVERED;
2881 			to->q_status = "2.1.5";
2882 			fprintf(e->e_xfp, "%s... Successfully delivered\n",
2883 				to->q_paddr);
2884 		}
2885 		else if (bitset(QPINGONSUCCESS, to->q_flags) &&
2886 			 bitset(QPRIMARY, to->q_flags) &&
2887 			 !bitset(MCIF_DSN, mci->mci_flags))
2888 		{
2889 			to->q_flags |= QRELAYED;
2890 			fprintf(e->e_xfp, "%s... relayed; expect no further notifications\n",
2891 				to->q_paddr);
2892 		}
2893 	}
2894 
2895 #if SMTP
2896 	if (bitnset(M_LMTP, m->m_flags))
2897 	{
2898 		/*
2899 		**  Global information applies to the last recipient only;
2900 		**  clear it out to avoid bogus errors.
2901 		*/
2902 
2903 		rcode = EX_OK;
2904 		e->e_statmsg = NULL;
2905 
2906 		/* reset the mci state for the next transaction */
2907 		if (mci != NULL && mci->mci_state == MCIS_ACTIVE)
2908 			mci->mci_state = MCIS_OPEN;
2909 	}
2910 #endif /* SMTP */
2911 
2912 	if (tobuf[0] != '\0')
2913 		giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e);
2914 	if (anyok)
2915 		markstats(e, tochain, FALSE);
2916 	mci_store_persistent(mci);
2917 
2918 #if SMTP
2919 	/* now close the connection */
2920 	if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
2921 	    !bitset(MCIF_CACHED, mci->mci_flags))
2922 		smtpquit(m, mci, e);
2923 #endif /* SMTP */
2924 
2925 	/*
2926 	**  Restore state and return.
2927 	*/
2928 
2929 #if XDEBUG
2930 	{
2931 		char wbuf[MAXLINE];
2932 
2933 		/* make absolutely certain 0, 1, and 2 are in use */
2934 		snprintf(wbuf, sizeof wbuf, "%s... end of deliver(%s)",
2935 			e->e_to == NULL ? "NO-TO-LIST"
2936 					: shortenstring(e->e_to, MAXSHORTSTR),
2937 			m->m_name);
2938 		checkfd012(wbuf);
2939 	}
2940 #endif /* XDEBUG */
2941 
2942 	errno = 0;
2943 	define('g', (char *) NULL, e);
2944 	e->e_to = NULL;
2945 	return rcode;
2946 }
2947 
2948 /*
2949 **  MARKFAILURE -- mark a failure on a specific address.
2950 **
2951 **	Parameters:
2952 **		e -- the envelope we are sending.
2953 **		q -- the address to mark.
2954 **		mci -- mailer connection information.
2955 **		rcode -- the code signifying the particular failure.
2956 **		ovr -- override an existing code?
2957 **
2958 **	Returns:
2959 **		none.
2960 **
2961 **	Side Effects:
2962 **		marks the address (and possibly the envelope) with the
2963 **			failure so that an error will be returned or
2964 **			the message will be queued, as appropriate.
2965 */
2966 
2967 static void
2968 markfailure(e, q, mci, rcode, ovr)
2969 	register ENVELOPE *e;
2970 	register ADDRESS *q;
2971 	register MCI *mci;
2972 	int rcode;
2973 	bool ovr;
2974 {
2975 	char *status = NULL;
2976 	char *rstatus = NULL;
2977 
2978 	switch (rcode)
2979 	{
2980 	  case EX_OK:
2981 		break;
2982 
2983 	  case EX_TEMPFAIL:
2984 	  case EX_IOERR:
2985 	  case EX_OSERR:
2986 		q->q_state = QS_QUEUEUP;
2987 		break;
2988 
2989 	  default:
2990 		q->q_state = QS_BADADDR;
2991 		break;
2992 	}
2993 
2994 	/* find most specific error code possible */
2995 	if (mci != NULL && mci->mci_status != NULL)
2996 	{
2997 		status = mci->mci_status;
2998 		if (mci->mci_rstatus != NULL)
2999 			rstatus = newstr(mci->mci_rstatus);
3000 		else
3001 			rstatus = NULL;
3002 	}
3003 	else if (e->e_status != NULL)
3004 	{
3005 		status = e->e_status;
3006 		rstatus = NULL;
3007 	}
3008 	else
3009 	{
3010 		switch (rcode)
3011 		{
3012 		  case EX_USAGE:
3013 			status = "5.5.4";
3014 			break;
3015 
3016 		  case EX_DATAERR:
3017 			status = "5.5.2";
3018 			break;
3019 
3020 		  case EX_NOUSER:
3021 			status = "5.1.1";
3022 			break;
3023 
3024 		  case EX_NOHOST:
3025 			status = "5.1.2";
3026 			break;
3027 
3028 		  case EX_NOINPUT:
3029 		  case EX_CANTCREAT:
3030 		  case EX_NOPERM:
3031 			status = "5.3.0";
3032 			break;
3033 
3034 		  case EX_UNAVAILABLE:
3035 		  case EX_SOFTWARE:
3036 		  case EX_OSFILE:
3037 		  case EX_PROTOCOL:
3038 		  case EX_CONFIG:
3039 			status = "5.5.0";
3040 			break;
3041 
3042 		  case EX_OSERR:
3043 		  case EX_IOERR:
3044 			status = "4.5.0";
3045 			break;
3046 
3047 		  case EX_TEMPFAIL:
3048 			status = "4.2.0";
3049 			break;
3050 		}
3051 	}
3052 
3053 	/* new status? */
3054 	if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3055 	    *q->q_status == '\0' || *q->q_status < *status))
3056 	{
3057 		q->q_status = status;
3058 		q->q_rstatus = rstatus;
3059 	}
3060 	if (rcode != EX_OK && q->q_rstatus == NULL &&
3061 	    q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3062 	    strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3063 	{
3064 		char buf[16];
3065 
3066 		(void) snprintf(buf, sizeof buf, "%d", rcode);
3067 		q->q_rstatus = newstr(buf);
3068 	}
3069 
3070 	q->q_statdate = curtime();
3071 	if (CurHostName != NULL && CurHostName[0] != '\0' &&
3072 	    mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3073 		q->q_statmta = newstr(CurHostName);
3074 }
3075 /*
3076 **  ENDMAILER -- Wait for mailer to terminate.
3077 **
3078 **	We should never get fatal errors (e.g., segmentation
3079 **	violation), so we report those specially.  For other
3080 **	errors, we choose a status message (into statmsg),
3081 **	and if it represents an error, we print it.
3082 **
3083 **	Parameters:
3084 **		mci -- the mailer connection info.
3085 **		e -- the current envelope.
3086 **		pv -- the parameter vector that invoked the mailer
3087 **			(for error messages).
3088 **
3089 **	Returns:
3090 **		exit code of mailer.
3091 **
3092 **	Side Effects:
3093 **		none.
3094 */
3095 
3096 static jmp_buf	EndWaitTimeout;
3097 
3098 static void
3099 endwaittimeout()
3100 {
3101 	/*
3102 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3103 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3104 	**	DOING.
3105 	*/
3106 
3107 	errno = ETIMEDOUT;
3108 	longjmp(EndWaitTimeout, 1);
3109 }
3110 
3111 int
3112 endmailer(mci, e, pv)
3113 	register MCI *mci;
3114 	register ENVELOPE *e;
3115 	char **pv;
3116 {
3117 	int st;
3118 	int save_errno = errno;
3119 	char buf[MAXLINE];
3120 	EVENT *ev = NULL;
3121 
3122 
3123 	mci_unlock_host(mci);
3124 
3125 	/* close output to mailer */
3126 	if (mci->mci_out != NULL)
3127 		(void) fclose(mci->mci_out);
3128 
3129 	/* copy any remaining input to transcript */
3130 	if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3131 	    e->e_xfp != NULL)
3132 	{
3133 		while (sfgets(buf, sizeof buf, mci->mci_in,
3134 		       TimeOuts.to_quit, "Draining Input") != NULL)
3135 			(void) fputs(buf, e->e_xfp);
3136 	}
3137 
3138 #if SASL
3139 	/* shutdown SASL */
3140 	if (bitset(MCIF_AUTHACT, mci->mci_flags))
3141 	{
3142 		sasl_dispose(&mci->mci_conn);
3143 		mci->mci_flags &= ~MCIF_AUTHACT;
3144 	}
3145 #endif /* SASL */
3146 
3147 #if STARTTLS
3148 	/* shutdown TLS */
3149 	(void) endtlsclt(mci);
3150 #endif /* STARTTLS */
3151 
3152 	/* now close the input */
3153 	if (mci->mci_in != NULL)
3154 		(void) fclose(mci->mci_in);
3155 	mci->mci_in = mci->mci_out = NULL;
3156 	mci->mci_state = MCIS_CLOSED;
3157 
3158 	errno = save_errno;
3159 
3160 	/* in the IPC case there is nothing to wait for */
3161 	if (mci->mci_pid == 0)
3162 		return EX_OK;
3163 
3164 	/* put a timeout around the wait */
3165 	if (mci->mci_mailer->m_wait > 0)
3166 	{
3167 		if (setjmp(EndWaitTimeout) == 0)
3168 			ev = setevent(mci->mci_mailer->m_wait,
3169 				      endwaittimeout, 0);
3170 		else
3171 		{
3172 			syserr("endmailer %s: wait timeout (%ld)",
3173 			       mci->mci_mailer->m_name,
3174 			       (long) mci->mci_mailer->m_wait);
3175 			return EX_TEMPFAIL;
3176 		}
3177 	}
3178 
3179 	/* wait for the mailer process, collect status */
3180 	st = waitfor(mci->mci_pid);
3181 	save_errno = errno;
3182 	if (ev != NULL)
3183 		clrevent(ev);
3184 	errno = save_errno;
3185 
3186 	if (st == -1)
3187 	{
3188 		syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3189 		return EX_SOFTWARE;
3190 	}
3191 
3192 	if (WIFEXITED(st))
3193 	{
3194 		/* normal death -- return status */
3195 		return (WEXITSTATUS(st));
3196 	}
3197 
3198 	/* it died a horrid death */
3199 	syserr("451 4.3.0 mailer %s died with signal %d%s",
3200 		mci->mci_mailer->m_name, WTERMSIG(st),
3201 		WCOREDUMP(st) ? " (core dumped)" :
3202 		(WIFSTOPPED(st) ? " (stopped)" : ""));
3203 
3204 	/* log the arguments */
3205 	if (pv != NULL && e->e_xfp != NULL)
3206 	{
3207 		register char **av;
3208 
3209 		fprintf(e->e_xfp, "Arguments:");
3210 		for (av = pv; *av != NULL; av++)
3211 			fprintf(e->e_xfp, " %s", *av);
3212 		fprintf(e->e_xfp, "\n");
3213 	}
3214 
3215 	ExitStat = EX_TEMPFAIL;
3216 	return EX_TEMPFAIL;
3217 }
3218 /*
3219 **  GIVERESPONSE -- Interpret an error response from a mailer
3220 **
3221 **	Parameters:
3222 **		status -- the status code from the mailer (high byte
3223 **			only; core dumps must have been taken care of
3224 **			already).
3225 **		dsn -- the DSN associated with the address, if any.
3226 **		m -- the mailer info for this mailer.
3227 **		mci -- the mailer connection info -- can be NULL if the
3228 **			response is given before the connection is made.
3229 **		ctladdr -- the controlling address for the recipient
3230 **			address(es).
3231 **		xstart -- the transaction start time, for computing
3232 **			transaction delays.
3233 **		e -- the current envelope.
3234 **
3235 **	Returns:
3236 **		none.
3237 **
3238 **	Side Effects:
3239 **		Errors may be incremented.
3240 **		ExitStat may be set.
3241 */
3242 
3243 void
3244 giveresponse(status, dsn, m, mci, ctladdr, xstart, e)
3245 	int status;
3246 	char *dsn;
3247 	register MAILER *m;
3248 	register MCI *mci;
3249 	ADDRESS *ctladdr;
3250 	time_t xstart;
3251 	ENVELOPE *e;
3252 {
3253 	register const char *statmsg;
3254 	extern char *SysExMsg[];
3255 	register int i;
3256 	int errnum = errno;
3257 	int off = 4;
3258 	extern int N_SysEx;
3259 	char dsnbuf[ENHSCLEN];
3260 	char buf[MAXLINE];
3261 
3262 	if (e == NULL)
3263 		syserr("giveresponse: null envelope");
3264 
3265 	/*
3266 	**  Compute status message from code.
3267 	*/
3268 
3269 	i = status - EX__BASE;
3270 	if (status == 0)
3271 	{
3272 		statmsg = "250 2.0.0 Sent";
3273 		if (e->e_statmsg != NULL)
3274 		{
3275 			(void) snprintf(buf, sizeof buf, "%s (%s)",
3276 					statmsg,
3277 					shortenstring(e->e_statmsg, 403));
3278 			statmsg = buf;
3279 		}
3280 	}
3281 	else if (i < 0 || i >= N_SysEx)
3282 	{
3283 		(void) snprintf(buf, sizeof buf,
3284 				"554 5.3.0 unknown mailer error %d",
3285 				status);
3286 		status = EX_UNAVAILABLE;
3287 		statmsg = buf;
3288 	}
3289 	else if (status == EX_TEMPFAIL)
3290 	{
3291 		char *bp = buf;
3292 
3293 		snprintf(bp, SPACELEFT(buf, bp), "%s", SysExMsg[i] + 1);
3294 		bp += strlen(bp);
3295 #if NAMED_BIND
3296 		if (h_errno == TRY_AGAIN)
3297 			statmsg = errstring(h_errno+E_DNSBASE);
3298 		else
3299 #endif /* NAMED_BIND */
3300 		{
3301 			if (errnum != 0)
3302 				statmsg = errstring(errnum);
3303 			else
3304 			{
3305 #if SMTP
3306 				statmsg = SmtpError;
3307 #else /* SMTP */
3308 				statmsg = NULL;
3309 #endif /* SMTP */
3310 			}
3311 		}
3312 		if (statmsg != NULL && statmsg[0] != '\0')
3313 		{
3314 			switch (errnum)
3315 			{
3316 #ifdef ENETDOWN
3317 			  case ENETDOWN:	/* Network is down */
3318 #endif /* ENETDOWN */
3319 #ifdef ENETUNREACH
3320 			  case ENETUNREACH:	/* Network is unreachable */
3321 #endif /* ENETUNREACH */
3322 #ifdef ENETRESET
3323 			  case ENETRESET:	/* Network dropped connection on reset */
3324 #endif /* ENETRESET */
3325 #ifdef ECONNABORTED
3326 			  case ECONNABORTED:	/* Software caused connection abort */
3327 #endif /* ECONNABORTED */
3328 #ifdef EHOSTDOWN
3329 			  case EHOSTDOWN:	/* Host is down */
3330 #endif /* EHOSTDOWN */
3331 #ifdef EHOSTUNREACH
3332 			  case EHOSTUNREACH:	/* No route to host */
3333 #endif /* EHOSTUNREACH */
3334 				if (mci->mci_host != NULL)
3335 				{
3336 					snprintf(bp, SPACELEFT(buf, bp),
3337 						 ": %s", mci->mci_host);
3338 					bp += strlen(bp);
3339 				}
3340 				break;
3341 			}
3342 			snprintf(bp, SPACELEFT(buf, bp), ": %s", statmsg);
3343 		}
3344 		statmsg = buf;
3345 	}
3346 #if NAMED_BIND
3347 	else if (status == EX_NOHOST && h_errno != 0)
3348 	{
3349 		statmsg = errstring(h_errno + E_DNSBASE);
3350 		(void) snprintf(buf, sizeof buf, "%s (%s)",
3351 			SysExMsg[i] + 1, statmsg);
3352 		statmsg = buf;
3353 	}
3354 #endif /* NAMED_BIND */
3355 	else
3356 	{
3357 		statmsg = SysExMsg[i];
3358 		if (*statmsg++ == ':' && errnum != 0)
3359 		{
3360 			(void) snprintf(buf, sizeof buf, "%s: %s",
3361 				statmsg, errstring(errnum));
3362 			statmsg = buf;
3363 		}
3364 	}
3365 
3366 	/*
3367 	**  Print the message as appropriate
3368 	*/
3369 
3370 	if (status == EX_OK || status == EX_TEMPFAIL)
3371 	{
3372 		extern char MsgBuf[];
3373 
3374 		if ((off = isenhsc(statmsg + 4, ' ')) > 0)
3375 		{
3376 			if (dsn == NULL)
3377 			{
3378 				snprintf(dsnbuf, sizeof dsnbuf,
3379 					 "%.*s", off, statmsg + 4);
3380 				dsn = dsnbuf;
3381 			}
3382 			off += 5;
3383 		}
3384 		else
3385 		{
3386 			off = 4;
3387 		}
3388 		message("%s", statmsg + off);
3389 		if (status == EX_TEMPFAIL && e->e_xfp != NULL)
3390 			fprintf(e->e_xfp, "%s\n", &MsgBuf[4]);
3391 	}
3392 	else
3393 	{
3394 		char mbuf[ENHSCLEN + 4];
3395 
3396 		Errors++;
3397 		if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
3398 		    off < sizeof mbuf - 4)
3399 		{
3400 			if (dsn == NULL)
3401 			{
3402 				snprintf(dsnbuf, sizeof dsnbuf,
3403 					 "%.*s", off, statmsg + 4);
3404 				dsn = dsnbuf;
3405 			}
3406 			off += 5;
3407 			(void) strlcpy(mbuf, statmsg, off);
3408 			(void) strlcat(mbuf, " %s", sizeof mbuf);
3409 		}
3410 		else
3411 		{
3412 			dsnbuf[0] = '\0';
3413 			(void) snprintf(mbuf, sizeof mbuf, "%.3s %%s", statmsg);
3414 			off = 4;
3415 		}
3416 		usrerr(mbuf, &statmsg[off]);
3417 	}
3418 
3419 	/*
3420 	**  Final cleanup.
3421 	**	Log a record of the transaction.  Compute the new
3422 	**	ExitStat -- if we already had an error, stick with
3423 	**	that.
3424 	*/
3425 
3426 	if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
3427 	    LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
3428 		logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
3429 
3430 	if (tTd(11, 2))
3431 		dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s\n",
3432 			status,
3433 			dsn == NULL ? "<NULL>" : dsn,
3434 			e->e_message == NULL ? "<NULL>" : e->e_message);
3435 
3436 	if (status != EX_TEMPFAIL)
3437 		setstat(status);
3438 	if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
3439 	{
3440 		if (e->e_message != NULL)
3441 			sm_free(e->e_message);
3442 		e->e_message = newstr(statmsg + off);
3443 	}
3444 	errno = 0;
3445 #if NAMED_BIND
3446 	SM_SET_H_ERRNO(0);
3447 #endif /* NAMED_BIND */
3448 }
3449 /*
3450 **  LOGDELIVERY -- log the delivery in the system log
3451 **
3452 **	Care is taken to avoid logging lines that are too long, because
3453 **	some versions of syslog have an unfortunate proclivity for core
3454 **	dumping.  This is a hack, to be sure, that is at best empirical.
3455 **
3456 **	Parameters:
3457 **		m -- the mailer info.  Can be NULL for initial queue.
3458 **		mci -- the mailer connection info -- can be NULL if the
3459 **			log is occurring when no connection is active.
3460 **		dsn -- the DSN attached to the status.
3461 **		status -- the message to print for the status.
3462 **		ctladdr -- the controlling address for the to list.
3463 **		xstart -- the transaction start time, used for
3464 **			computing transaction delay.
3465 **		e -- the current envelope.
3466 **
3467 **	Returns:
3468 **		none
3469 **
3470 **	Side Effects:
3471 **		none
3472 */
3473 
3474 void
3475 logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
3476 	MAILER *m;
3477 	register MCI *mci;
3478 	char *dsn;
3479 	const char *status;
3480 	ADDRESS *ctladdr;
3481 	time_t xstart;
3482 	register ENVELOPE *e;
3483 {
3484 	register char *bp;
3485 	register char *p;
3486 	int l;
3487 	time_t now;
3488 	char buf[1024];
3489 
3490 #if (SYSLOG_BUFSIZE) >= 256
3491 	/* ctladdr: max 106 bytes */
3492 	bp = buf;
3493 	if (ctladdr != NULL)
3494 	{
3495 		snprintf(bp, SPACELEFT(buf, bp), ", ctladdr=%s",
3496 			 shortenstring(ctladdr->q_paddr, 83));
3497 		bp += strlen(bp);
3498 		if (bitset(QGOODUID, ctladdr->q_flags))
3499 		{
3500 			(void) snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
3501 					(int) ctladdr->q_uid,
3502 					(int) ctladdr->q_gid);
3503 			bp += strlen(bp);
3504 		}
3505 	}
3506 
3507 	/* delay & xdelay: max 41 bytes */
3508 	now = curtime();
3509 	snprintf(bp, SPACELEFT(buf, bp), ", delay=%s",
3510 		 pintvl(now - e->e_ctime, TRUE));
3511 	bp += strlen(bp);
3512 
3513 	if (xstart != (time_t) 0)
3514 	{
3515 		snprintf(bp, SPACELEFT(buf, bp), ", xdelay=%s",
3516 			 pintvl(now - xstart, TRUE));
3517 		bp += strlen(bp);
3518 	}
3519 
3520 	/* mailer: assume about 19 bytes (max 10 byte mailer name) */
3521 	if (m != NULL)
3522 	{
3523 		snprintf(bp, SPACELEFT(buf, bp), ", mailer=%s", m->m_name);
3524 		bp += strlen(bp);
3525 	}
3526 
3527 	/* pri: changes with each delivery attempt */
3528 	snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld", e->e_msgpriority);
3529 	bp += strlen(bp);
3530 
3531 	/* relay: max 66 bytes for IPv4 addresses */
3532 	if (mci != NULL && mci->mci_host != NULL)
3533 	{
3534 # if DAEMON
3535 		extern SOCKADDR CurHostAddr;
3536 # endif /* DAEMON */
3537 
3538 		snprintf(bp, SPACELEFT(buf, bp), ", relay=%s",
3539 			 shortenstring(mci->mci_host, 40));
3540 		bp += strlen(bp);
3541 
3542 # if DAEMON
3543 		if (CurHostAddr.sa.sa_family != 0)
3544 		{
3545 			snprintf(bp, SPACELEFT(buf, bp), " [%s]",
3546 				 anynet_ntoa(&CurHostAddr));
3547 		}
3548 # endif /* DAEMON */
3549 	}
3550 	else if (strcmp(status, "queued") != 0)
3551 	{
3552 		p = macvalue('h', e);
3553 		if (p != NULL && p[0] != '\0')
3554 		{
3555 			snprintf(bp, SPACELEFT(buf, bp), ", relay=%s",
3556 				 shortenstring(p, 40));
3557 		}
3558 	}
3559 	bp += strlen(bp);
3560 
3561 	/* dsn */
3562 	if (dsn != NULL && *dsn != '\0')
3563 	{
3564 		snprintf(bp, SPACELEFT(buf, bp), ", dsn=%s",
3565 			 shortenstring(dsn, ENHSCLEN));
3566 		bp += strlen(bp);
3567 	}
3568 
3569 # define STATLEN		(((SYSLOG_BUFSIZE) - 100) / 4)
3570 # if (STATLEN) < 63
3571 #  undef STATLEN
3572 #  define STATLEN	63
3573 # endif /* (STATLEN) < 63 */
3574 # if (STATLEN) > 203
3575 #  undef STATLEN
3576 #  define STATLEN	203
3577 # endif /* (STATLEN) > 203 */
3578 
3579 	/* stat: max 210 bytes */
3580 	if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
3581 	{
3582 		/* desperation move -- truncate data */
3583 		bp = buf + sizeof buf - ((STATLEN) + 17);
3584 		(void) strlcpy(bp, "...", SPACELEFT(buf, bp));
3585 		bp += 3;
3586 	}
3587 
3588 	(void) strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
3589 	bp += strlen(bp);
3590 
3591 	(void) strlcpy(bp, shortenstring(status, STATLEN), SPACELEFT(buf, bp));
3592 
3593 	/* id, to: max 13 + TOBUFSIZE bytes */
3594 	l = SYSLOG_BUFSIZE - 100 - strlen(buf);
3595 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
3596 	while (strlen(p) >= (SIZE_T) l)
3597 	{
3598 		register char *q;
3599 
3600 #if _FFR_DYNAMIC_TOBUF
3601 		for (q = p + l; q > p; q--)
3602 		{
3603 			if (*q == ',')
3604 				break;
3605 		}
3606 		if (p == q)
3607 			break;
3608 #else /* _FFR_DYNAMIC_TOBUF */
3609 		q = strchr(p + l, ',');
3610 		if (q == NULL)
3611 			break;
3612 #endif /* _FFR_DYNAMIC_TOBUF */
3613 
3614 		sm_syslog(LOG_INFO, e->e_id,
3615 			  "to=%.*s [more]%s",
3616 			  (int) (++q - p), p, buf);
3617 		p = q;
3618 	}
3619 #if _FFR_DYNAMIC_TOBUF
3620 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
3621 #else /* _FFR_DYNAMIC_TOBUF */
3622 	sm_syslog(LOG_INFO, e->e_id, "to=%s%s", p, buf);
3623 #endif /* _FFR_DYNAMIC_TOBUF */
3624 
3625 #else /* (SYSLOG_BUFSIZE) >= 256 */
3626 
3627 	l = SYSLOG_BUFSIZE - 85;
3628 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
3629 	while (strlen(p) >= (SIZE_T) l)
3630 	{
3631 		register char *q;
3632 
3633 #if _FFR_DYNAMIC_TOBUF
3634 		for (q = p + l; q > p; q--)
3635 		{
3636 			if (*q == ',')
3637 				break;
3638 		}
3639 		if (p == q)
3640 			break;
3641 #else /* _FFR_DYNAMIC_TOBUF */
3642 		q = strchr(p + l, ',');
3643 		if (q == NULL)
3644 			break;
3645 #endif /* _FFR_DYNAMIC_TOBUF */
3646 
3647 		sm_syslog(LOG_INFO, e->e_id,
3648 			  "to=%.*s [more]",
3649 			  (int) (++q - p), p);
3650 		p = q;
3651 	}
3652 #if _FFR_DYNAMIC_TOBUF
3653 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
3654 #else /* _FFR_DYNAMIC_TOBUF */
3655 	sm_syslog(LOG_INFO, e->e_id, "to=%s", p);
3656 #endif /* _FFR_DYNAMIC_TOBUF */
3657 
3658 	if (ctladdr != NULL)
3659 	{
3660 		bp = buf;
3661 		snprintf(bp, SPACELEFT(buf, bp), "ctladdr=%s",
3662 			 shortenstring(ctladdr->q_paddr, 83));
3663 		bp += strlen(bp);
3664 		if (bitset(QGOODUID, ctladdr->q_flags))
3665 		{
3666 			(void) snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
3667 					ctladdr->q_uid, ctladdr->q_gid);
3668 			bp += strlen(bp);
3669 		}
3670 		sm_syslog(LOG_INFO, e->e_id, "%s", buf);
3671 	}
3672 	bp = buf;
3673 	snprintf(bp, SPACELEFT(buf, bp), "delay=%s",
3674 		 pintvl(now - e->e_ctime, TRUE));
3675 	bp += strlen(bp);
3676 	if (xstart != (time_t) 0)
3677 	{
3678 		snprintf(bp, SPACELEFT(buf, bp), ", xdelay=%s",
3679 			 pintvl(now - xstart, TRUE));
3680 		bp += strlen(bp);
3681 	}
3682 
3683 	if (m != NULL)
3684 	{
3685 		snprintf(bp, SPACELEFT(buf, bp), ", mailer=%s", m->m_name);
3686 		bp += strlen(bp);
3687 	}
3688 	sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
3689 
3690 	buf[0] = '\0';
3691 	bp = buf;
3692 	if (mci != NULL && mci->mci_host != NULL)
3693 	{
3694 # if DAEMON
3695 		extern SOCKADDR CurHostAddr;
3696 # endif /* DAEMON */
3697 
3698 		snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s", mci->mci_host);
3699 		bp += strlen(bp);
3700 
3701 # if DAEMON
3702 		if (CurHostAddr.sa.sa_family != 0)
3703 			snprintf(bp, SPACELEFT(buf, bp), " [%.100s]",
3704 				anynet_ntoa(&CurHostAddr));
3705 # endif /* DAEMON */
3706 	}
3707 	else if (strcmp(status, "queued") != 0)
3708 	{
3709 		p = macvalue('h', e);
3710 		if (p != NULL && p[0] != '\0')
3711 			snprintf(buf, sizeof buf, "relay=%.100s", p);
3712 	}
3713 	if (buf[0] != '\0')
3714 		sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
3715 
3716 	sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
3717 #endif /* (SYSLOG_BUFSIZE) >= 256 */
3718 }
3719 /*
3720 **  PUTFROMLINE -- output a UNIX-style from line (or whatever)
3721 **
3722 **	This can be made an arbitrary message separator by changing $l
3723 **
3724 **	One of the ugliest hacks seen by human eyes is contained herein:
3725 **	UUCP wants those stupid "remote from <host>" lines.  Why oh why
3726 **	does a well-meaning programmer such as myself have to deal with
3727 **	this kind of antique garbage????
3728 **
3729 **	Parameters:
3730 **		mci -- the connection information.
3731 **		e -- the envelope.
3732 **
3733 **	Returns:
3734 **		none
3735 **
3736 **	Side Effects:
3737 **		outputs some text to fp.
3738 */
3739 
3740 void
3741 putfromline(mci, e)
3742 	register MCI *mci;
3743 	ENVELOPE *e;
3744 {
3745 	char *template = UnixFromLine;
3746 	char buf[MAXLINE];
3747 	char xbuf[MAXLINE];
3748 
3749 	if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
3750 		return;
3751 
3752 	mci->mci_flags |= MCIF_INHEADER;
3753 
3754 	if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
3755 	{
3756 		char *bang;
3757 
3758 		expand("\201g", buf, sizeof buf, e);
3759 		bang = strchr(buf, '!');
3760 		if (bang == NULL)
3761 		{
3762 			char *at;
3763 			char hname[MAXNAME];
3764 
3765 			/*
3766 			**  If we can construct a UUCP path, do so
3767 			*/
3768 
3769 			at = strrchr(buf, '@');
3770 			if (at == NULL)
3771 			{
3772 				expand("\201k", hname, sizeof hname, e);
3773 				at = hname;
3774 			}
3775 			else
3776 				*at++ = '\0';
3777 			(void) snprintf(xbuf, sizeof xbuf,
3778 				"From %.800s  \201d remote from %.100s\n",
3779 				buf, at);
3780 		}
3781 		else
3782 		{
3783 			*bang++ = '\0';
3784 			(void) snprintf(xbuf, sizeof xbuf,
3785 				"From %.800s  \201d remote from %.100s\n",
3786 				bang, buf);
3787 			template = xbuf;
3788 		}
3789 	}
3790 	expand(template, buf, sizeof buf, e);
3791 	putxline(buf, strlen(buf), mci, PXLF_HEADER);
3792 }
3793 /*
3794 **  PUTBODY -- put the body of a message.
3795 **
3796 **	Parameters:
3797 **		mci -- the connection information.
3798 **		e -- the envelope to put out.
3799 **		separator -- if non-NULL, a message separator that must
3800 **			not be permitted in the resulting message.
3801 **
3802 **	Returns:
3803 **		none.
3804 **
3805 **	Side Effects:
3806 **		The message is written onto fp.
3807 */
3808 
3809 /* values for output state variable */
3810 #define OS_HEAD		0	/* at beginning of line */
3811 #define OS_CR		1	/* read a carriage return */
3812 #define OS_INLINE	2	/* putting rest of line */
3813 
3814 void
3815 putbody(mci, e, separator)
3816 	register MCI *mci;
3817 	register ENVELOPE *e;
3818 	char *separator;
3819 {
3820 	bool dead = FALSE;
3821 	char buf[MAXLINE];
3822 	char *boundaries[MAXMIMENESTING + 1];
3823 
3824 	/*
3825 	**  Output the body of the message
3826 	*/
3827 
3828 	if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
3829 	{
3830 		char *df = queuename(e, 'd');
3831 
3832 		e->e_dfp = fopen(df, "r");
3833 		if (e->e_dfp == NULL)
3834 		{
3835 			char *msg = "!putbody: Cannot open %s for %s from %s";
3836 
3837 			if (errno == ENOENT)
3838 				msg++;
3839 			syserr(msg, df, e->e_to, e->e_from.q_paddr);
3840 		}
3841 	}
3842 	if (e->e_dfp == NULL)
3843 	{
3844 		if (bitset(MCIF_INHEADER, mci->mci_flags))
3845 		{
3846 			putline("", mci);
3847 			mci->mci_flags &= ~MCIF_INHEADER;
3848 		}
3849 		putline("<<< No Message Collected >>>", mci);
3850 		goto endofmessage;
3851 	}
3852 
3853 	if (e->e_dfino == (ino_t) 0)
3854 	{
3855 		struct stat stbuf;
3856 
3857 		if (fstat(fileno(e->e_dfp), &stbuf) < 0)
3858 			e->e_dfino = -1;
3859 		else
3860 		{
3861 			e->e_dfdev = stbuf.st_dev;
3862 			e->e_dfino = stbuf.st_ino;
3863 		}
3864 	}
3865 
3866 	/* paranoia: the df file should always be in a rewound state */
3867 	(void) bfrewind(e->e_dfp);
3868 
3869 #if MIME8TO7
3870 	if (bitset(MCIF_CVT8TO7, mci->mci_flags))
3871 	{
3872 		/*
3873 		**  Do 8 to 7 bit MIME conversion.
3874 		*/
3875 
3876 		/* make sure it looks like a MIME message */
3877 		if (hvalue("MIME-Version", e->e_header) == NULL)
3878 			putline("MIME-Version: 1.0", mci);
3879 
3880 		if (hvalue("Content-Type", e->e_header) == NULL)
3881 		{
3882 			snprintf(buf, sizeof buf,
3883 				"Content-Type: text/plain; charset=%s",
3884 				defcharset(e));
3885 			putline(buf, mci);
3886 		}
3887 
3888 		/* now do the hard work */
3889 		boundaries[0] = NULL;
3890 		mci->mci_flags |= MCIF_INHEADER;
3891 		(void) mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER);
3892 	}
3893 # if MIME7TO8
3894 	else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
3895 	{
3896 		(void) mime7to8(mci, e->e_header, e);
3897 	}
3898 # endif /* MIME7TO8 */
3899 	else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
3900 	{
3901 		bool oldsuprerrs = SuprErrs;
3902 
3903 		/* Use mime8to7 to check multipart for MIME header overflows */
3904 		boundaries[0] = NULL;
3905 		mci->mci_flags |= MCIF_INHEADER;
3906 
3907 		/*
3908 		**  If EF_DONT_MIME is set, we have a broken MIME message
3909 		**  and don't want to generate a new bounce message whose
3910 		**  body propagates the broken MIME.  We can't just not call
3911 		**  mime8to7() as is done above since we need the security
3912 		**  checks.  The best we can do is suppress the errors.
3913 		*/
3914 
3915 		if (bitset(EF_DONT_MIME, e->e_flags))
3916 			SuprErrs = TRUE;
3917 
3918 		(void) mime8to7(mci, e->e_header, e, boundaries,
3919 				M87F_OUTER|M87F_NO8TO7);
3920 
3921 		/* restore SuprErrs */
3922 		SuprErrs = oldsuprerrs;
3923 	}
3924 	else
3925 #endif /* MIME8TO7 */
3926 	{
3927 		int ostate;
3928 		register char *bp;
3929 		register char *pbp;
3930 		register int c;
3931 		register char *xp;
3932 		int padc;
3933 		char *buflim;
3934 		int pos = 0;
3935 		char peekbuf[12];
3936 
3937 		if (bitset(MCIF_INHEADER, mci->mci_flags))
3938 		{
3939 			putline("", mci);
3940 			mci->mci_flags &= ~MCIF_INHEADER;
3941 		}
3942 
3943 		/* determine end of buffer; allow for short mailer lines */
3944 		buflim = &buf[sizeof buf - 1];
3945 		if (mci->mci_mailer->m_linelimit > 0 &&
3946 		    mci->mci_mailer->m_linelimit < sizeof buf - 1)
3947 			buflim = &buf[mci->mci_mailer->m_linelimit - 1];
3948 
3949 		/* copy temp file to output with mapping */
3950 		ostate = OS_HEAD;
3951 		bp = buf;
3952 		pbp = peekbuf;
3953 		while (!ferror(mci->mci_out) && !dead)
3954 		{
3955 			if (pbp > peekbuf)
3956 				c = *--pbp;
3957 			else if ((c = getc(e->e_dfp)) == EOF)
3958 				break;
3959 			if (bitset(MCIF_7BIT, mci->mci_flags))
3960 				c &= 0x7f;
3961 			switch (ostate)
3962 			{
3963 			  case OS_HEAD:
3964 #if _FFR_NONULLS
3965 				if (c == '\0' &&
3966 				    bitnset(M_NONULLS, mci->mci_mailer->m_flags))
3967 					break;
3968 #endif /* _FFR_NONULLS */
3969 				if (c != '\r' && c != '\n' && bp < buflim)
3970 				{
3971 					*bp++ = c;
3972 					break;
3973 				}
3974 
3975 				/* check beginning of line for special cases */
3976 				*bp = '\0';
3977 				pos = 0;
3978 				padc = EOF;
3979 				if (buf[0] == 'F' &&
3980 				    bitnset(M_ESCFROM, mci->mci_mailer->m_flags) &&
3981 				    strncmp(buf, "From ", 5) == 0)
3982 				{
3983 					padc = '>';
3984 				}
3985 				if (buf[0] == '-' && buf[1] == '-' &&
3986 				    separator != NULL)
3987 				{
3988 					/* possible separator */
3989 					int sl = strlen(separator);
3990 
3991 					if (strncmp(&buf[2], separator, sl) == 0)
3992 						padc = ' ';
3993 				}
3994 				if (buf[0] == '.' &&
3995 				    bitnset(M_XDOT, mci->mci_mailer->m_flags))
3996 				{
3997 					padc = '.';
3998 				}
3999 
4000 				/* now copy out saved line */
4001 				if (TrafficLogFile != NULL)
4002 				{
4003 					fprintf(TrafficLogFile, "%05d >>> ",
4004 						(int) getpid());
4005 					if (padc != EOF)
4006 						(void) putc(padc,
4007 							    TrafficLogFile);
4008 					for (xp = buf; xp < bp; xp++)
4009 						(void) putc((unsigned char) *xp,
4010 							    TrafficLogFile);
4011 					if (c == '\n')
4012 						(void) fputs(mci->mci_mailer->m_eol,
4013 							     TrafficLogFile);
4014 				}
4015 				if (padc != EOF)
4016 				{
4017 					if (putc(padc, mci->mci_out) == EOF)
4018 					{
4019 						dead = TRUE;
4020 						continue;
4021 					}
4022 					else
4023 					{
4024 						/* record progress for DATA timeout */
4025 						DataProgress = TRUE;
4026 					}
4027 					pos++;
4028 				}
4029 				for (xp = buf; xp < bp; xp++)
4030 				{
4031 					if (putc((unsigned char) *xp,
4032 						 mci->mci_out) == EOF)
4033 					{
4034 						dead = TRUE;
4035 						break;
4036 					}
4037 					else
4038 					{
4039 						/* record progress for DATA timeout */
4040 						DataProgress = TRUE;
4041 					}
4042 				}
4043 				if (dead)
4044 					continue;
4045 				if (c == '\n')
4046 				{
4047 					if (fputs(mci->mci_mailer->m_eol,
4048 						  mci->mci_out) == EOF)
4049 						break;
4050 					else
4051 					{
4052 						/* record progress for DATA timeout */
4053 						DataProgress = TRUE;
4054 					}
4055 					pos = 0;
4056 				}
4057 				else
4058 				{
4059 					pos += bp - buf;
4060 					if (c != '\r')
4061 						*pbp++ = c;
4062 				}
4063 
4064 				bp = buf;
4065 
4066 				/* determine next state */
4067 				if (c == '\n')
4068 					ostate = OS_HEAD;
4069 				else if (c == '\r')
4070 					ostate = OS_CR;
4071 				else
4072 					ostate = OS_INLINE;
4073 				continue;
4074 
4075 			  case OS_CR:
4076 				if (c == '\n')
4077 				{
4078 					/* got CRLF */
4079 					if (fputs(mci->mci_mailer->m_eol,
4080 						  mci->mci_out) == EOF)
4081 						continue;
4082 					else
4083 					{
4084 						/* record progress for DATA timeout */
4085 						DataProgress = TRUE;
4086 					}
4087 
4088 					if (TrafficLogFile != NULL)
4089 					{
4090 						(void) fputs(mci->mci_mailer->m_eol,
4091 							     TrafficLogFile);
4092 					}
4093 					ostate = OS_HEAD;
4094 					continue;
4095 				}
4096 
4097 				/* had a naked carriage return */
4098 				*pbp++ = c;
4099 				c = '\r';
4100 				ostate = OS_INLINE;
4101 				goto putch;
4102 
4103 			  case OS_INLINE:
4104 				if (c == '\r')
4105 				{
4106 					ostate = OS_CR;
4107 					continue;
4108 				}
4109 #if _FFR_NONULLS
4110 				if (c == '\0' &&
4111 				    bitnset(M_NONULLS, mci->mci_mailer->m_flags))
4112 					break;
4113 #endif /* _FFR_NONULLS */
4114 putch:
4115 				if (mci->mci_mailer->m_linelimit > 0 &&
4116 				    pos >= mci->mci_mailer->m_linelimit - 1 &&
4117 				    c != '\n')
4118 				{
4119 					int d;
4120 
4121 					/* check next character for EOL */
4122 					if (pbp > peekbuf)
4123 						d = *(pbp - 1);
4124 					else if ((d = getc(e->e_dfp)) != EOF)
4125 						*pbp++ = d;
4126 
4127 					if (d == '\n' || d == EOF)
4128 					{
4129 						if (TrafficLogFile != NULL)
4130 							(void) putc((unsigned char) c,
4131 							    TrafficLogFile);
4132 						if (putc((unsigned char) c,
4133 							 mci->mci_out) == EOF)
4134 						{
4135 							dead = TRUE;
4136 							continue;
4137 						}
4138 						else
4139 						{
4140 							/* record progress for DATA timeout */
4141 							DataProgress = TRUE;
4142 						}
4143 						pos++;
4144 						continue;
4145 					}
4146 
4147 					if (putc('!', mci->mci_out) == EOF ||
4148 					    fputs(mci->mci_mailer->m_eol,
4149 						  mci->mci_out) == EOF)
4150 					{
4151 						dead = TRUE;
4152 						continue;
4153 					}
4154 					else
4155 					{
4156 						/* record progress for DATA timeout */
4157 						DataProgress = TRUE;
4158 					}
4159 
4160 					if (TrafficLogFile != NULL)
4161 					{
4162 						fprintf(TrafficLogFile, "!%s",
4163 							mci->mci_mailer->m_eol);
4164 					}
4165 					ostate = OS_HEAD;
4166 					*pbp++ = c;
4167 					continue;
4168 				}
4169 				if (c == '\n')
4170 				{
4171 					if (TrafficLogFile != NULL)
4172 						(void) fputs(mci->mci_mailer->m_eol,
4173 						      TrafficLogFile);
4174 					if (fputs(mci->mci_mailer->m_eol,
4175 						  mci->mci_out) == EOF)
4176 						continue;
4177 					else
4178 					{
4179 						/* record progress for DATA timeout */
4180 						DataProgress = TRUE;
4181 					}
4182 					pos = 0;
4183 					ostate = OS_HEAD;
4184 				}
4185 				else
4186 				{
4187 					if (TrafficLogFile != NULL)
4188 						(void) putc((unsigned char) c,
4189 							    TrafficLogFile);
4190 					if (putc((unsigned char) c,
4191 						 mci->mci_out) == EOF)
4192 					{
4193 						dead = TRUE;
4194 						continue;
4195 					}
4196 					else
4197 					{
4198 						/* record progress for DATA timeout */
4199 						DataProgress = TRUE;
4200 					}
4201 					pos++;
4202 					ostate = OS_INLINE;
4203 				}
4204 				break;
4205 			}
4206 		}
4207 
4208 		/* make sure we are at the beginning of a line */
4209 		if (bp > buf)
4210 		{
4211 			if (TrafficLogFile != NULL)
4212 			{
4213 				for (xp = buf; xp < bp; xp++)
4214 					(void) putc((unsigned char) *xp,
4215 						    TrafficLogFile);
4216 			}
4217 			for (xp = buf; xp < bp; xp++)
4218 			{
4219 				if (putc((unsigned char) *xp, mci->mci_out) ==
4220 				    EOF)
4221 				{
4222 					dead = TRUE;
4223 					break;
4224 				}
4225 				else
4226 				{
4227 					/* record progress for DATA timeout */
4228 					DataProgress = TRUE;
4229 				}
4230 			}
4231 			pos += bp - buf;
4232 		}
4233 		if (!dead && pos > 0)
4234 		{
4235 			if (TrafficLogFile != NULL)
4236 				(void) fputs(mci->mci_mailer->m_eol,
4237 					     TrafficLogFile);
4238 			(void) fputs(mci->mci_mailer->m_eol, mci->mci_out);
4239 
4240 			/* record progress for DATA timeout */
4241 			DataProgress = TRUE;
4242 		}
4243 	}
4244 
4245 	if (ferror(e->e_dfp))
4246 	{
4247 		syserr("putbody: %s/df%s: read error",
4248 		       qid_printqueue(e->e_queuedir), e->e_id);
4249 		ExitStat = EX_IOERR;
4250 	}
4251 
4252 endofmessage:
4253 	/*
4254 	**  Since mailfile() uses e_dfp in a child process,
4255 	**  the file offset in the stdio library for the
4256 	**  parent process will not agree with the in-kernel
4257 	**  file offset since the file descriptor is shared
4258 	**  between the processes.  Therefore, it is vital
4259 	**  that the file always be rewound.  This forces the
4260 	**  kernel offset (lseek) and stdio library (ftell)
4261 	**  offset to match.
4262 	*/
4263 
4264 	if (e->e_dfp != NULL)
4265 		(void) bfrewind(e->e_dfp);
4266 
4267 	/* some mailers want extra blank line at end of message */
4268 	if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
4269 	    buf[0] != '\0' && buf[0] != '\n')
4270 		putline("", mci);
4271 
4272 	(void) fflush(mci->mci_out);
4273 	if (ferror(mci->mci_out) && errno != EPIPE)
4274 	{
4275 		syserr("putbody: write error");
4276 		ExitStat = EX_IOERR;
4277 	}
4278 
4279 	errno = 0;
4280 }
4281 /*
4282 **  MAILFILE -- Send a message to a file.
4283 **
4284 **	If the file has the setuid/setgid bits set, but NO execute
4285 **	bits, sendmail will try to become the owner of that file
4286 **	rather than the real user.  Obviously, this only works if
4287 **	sendmail runs as root.
4288 **
4289 **	This could be done as a subordinate mailer, except that it
4290 **	is used implicitly to save messages in ~/dead.letter.  We
4291 **	view this as being sufficiently important as to include it
4292 **	here.  For example, if the system is dying, we shouldn't have
4293 **	to create another process plus some pipes to save the message.
4294 **
4295 **	Parameters:
4296 **		filename -- the name of the file to send to.
4297 **		mailer -- mailer definition for recipient -- if NULL,
4298 **			use FileMailer.
4299 **		ctladdr -- the controlling address header -- includes
4300 **			the userid/groupid to be when sending.
4301 **		sfflags -- flags for opening.
4302 **		e -- the current envelope.
4303 **
4304 **	Returns:
4305 **		The exit code associated with the operation.
4306 **
4307 **	Side Effects:
4308 **		none.
4309 */
4310 
4311 static jmp_buf	CtxMailfileTimeout;
4312 
4313 int
4314 mailfile(filename, mailer, ctladdr, sfflags, e)
4315 	char *volatile filename;
4316 	MAILER *volatile mailer;
4317 	ADDRESS *ctladdr;
4318 	volatile long sfflags;
4319 	register ENVELOPE *e;
4320 {
4321 	register FILE *f;
4322 	register pid_t pid = -1;
4323 	volatile int mode;
4324 	int len;
4325 	off_t curoff;
4326 	bool suidwarn = geteuid() == 0;
4327 	char *p;
4328 	char *volatile realfile;
4329 	EVENT *ev;
4330 	char buf[MAXLINE + 1];
4331 	char targetfile[MAXPATHLEN + 1];
4332 
4333 	if (tTd(11, 1))
4334 	{
4335 		dprintf("mailfile %s\n  ctladdr=", filename);
4336 		printaddr(ctladdr, FALSE);
4337 	}
4338 
4339 	if (mailer == NULL)
4340 		mailer = FileMailer;
4341 
4342 	if (e->e_xfp != NULL)
4343 		(void) fflush(e->e_xfp);
4344 
4345 	/*
4346 	**  Special case /dev/null.  This allows us to restrict file
4347 	**  delivery to regular files only.
4348 	*/
4349 
4350 	if (strcmp(filename, "/dev/null") == 0)
4351 		return EX_OK;
4352 
4353 	/* check for 8-bit available */
4354 	if (bitset(EF_HAS8BIT, e->e_flags) &&
4355 	    bitnset(M_7BITS, mailer->m_flags) &&
4356 	    (bitset(EF_DONT_MIME, e->e_flags) ||
4357 	     !(bitset(MM_MIME8BIT, MimeMode) ||
4358 	       (bitset(EF_IS_MIME, e->e_flags) &&
4359 		bitset(MM_CVTMIME, MimeMode)))))
4360 	{
4361 		e->e_status = "5.6.3";
4362 		usrerrenh(e->e_status,
4363 		       "554 Cannot send 8-bit data to 7-bit destination");
4364 		return EX_DATAERR;
4365 	}
4366 
4367 	/* Find the actual file */
4368 	if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
4369 	{
4370 		len = strlen(SafeFileEnv);
4371 
4372 		if (strncmp(SafeFileEnv, filename, len) == 0)
4373 			filename += len;
4374 
4375 		if (len + strlen(filename) + 1 > MAXPATHLEN)
4376 		{
4377 			syserr("mailfile: filename too long (%s/%s)",
4378 			       SafeFileEnv, filename);
4379 			return EX_CANTCREAT;
4380 		}
4381 		(void) strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
4382 		realfile = targetfile + len;
4383 		if (targetfile[len - 1] != '/')
4384 			(void) strlcat(targetfile, "/", sizeof targetfile);
4385 		if (*filename == '/')
4386 			filename++;
4387 		(void) strlcat(targetfile, filename, sizeof targetfile);
4388 	}
4389 	else if (mailer->m_rootdir != NULL)
4390 	{
4391 		expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
4392 		len = strlen(targetfile);
4393 
4394 		if (strncmp(targetfile, filename, len) == 0)
4395 			filename += len;
4396 
4397 		if (len + strlen(filename) + 1 > MAXPATHLEN)
4398 		{
4399 			syserr("mailfile: filename too long (%s/%s)",
4400 			       targetfile, filename);
4401 			return EX_CANTCREAT;
4402 		}
4403 		realfile = targetfile + len;
4404 		if (targetfile[len - 1] != '/')
4405 			(void) strlcat(targetfile, "/", sizeof targetfile);
4406 		if (*filename == '/')
4407 			(void) strlcat(targetfile, filename + 1,
4408 				       sizeof targetfile);
4409 		else
4410 			(void) strlcat(targetfile, filename, sizeof targetfile);
4411 	}
4412 	else
4413 	{
4414 		if (strlen(filename) > MAXPATHLEN)
4415 		{
4416 			syserr("mailfile: filename too long (%s)", filename);
4417 			return EX_CANTCREAT;
4418 		}
4419 		(void) strlcpy(targetfile, filename, sizeof targetfile);
4420 		realfile = targetfile;
4421 	}
4422 
4423 	/*
4424 	**  Fork so we can change permissions here.
4425 	**	Note that we MUST use fork, not vfork, because of
4426 	**	the complications of calling subroutines, etc.
4427 	*/
4428 
4429 	DOFORK(fork);
4430 
4431 	if (pid < 0)
4432 		return EX_OSERR;
4433 	else if (pid == 0)
4434 	{
4435 		/* child -- actually write to file */
4436 		struct stat stb;
4437 		MCI mcibuf;
4438 		int err;
4439 		volatile int oflags = O_WRONLY|O_APPEND;
4440 
4441 		/* Reset global flags */
4442 		RestartRequest = NULL;
4443 		ShutdownRequest = NULL;
4444 		PendingSignal = 0;
4445 
4446 		if (e->e_lockfp != NULL)
4447 			(void) close(fileno(e->e_lockfp));
4448 
4449 		(void) setsignal(SIGINT, SIG_DFL);
4450 		(void) setsignal(SIGHUP, SIG_DFL);
4451 		(void) setsignal(SIGTERM, SIG_DFL);
4452 		(void) umask(OldUmask);
4453 		e->e_to = filename;
4454 		ExitStat = EX_OK;
4455 
4456 		if (setjmp(CtxMailfileTimeout) != 0)
4457 		{
4458 			exit(EX_TEMPFAIL);
4459 		}
4460 
4461 		if (TimeOuts.to_fileopen > 0)
4462 			ev = setevent(TimeOuts.to_fileopen,
4463 				      mailfiletimeout, 0);
4464 		else
4465 			ev = NULL;
4466 
4467 		/* check file mode to see if setuid */
4468 		if (stat(targetfile, &stb) < 0)
4469 			mode = FileMode;
4470 		else
4471 			mode = stb.st_mode;
4472 
4473 		/* limit the errors to those actually caused in the child */
4474 		errno = 0;
4475 		ExitStat = EX_OK;
4476 
4477 		/* Allow alias expansions to use the S_IS{U,G}ID bits */
4478 		if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
4479 		    bitset(SFF_RUNASREALUID, sfflags))
4480 		{
4481 			/* ignore setuid and setgid bits */
4482 			mode &= ~(S_ISGID|S_ISUID);
4483 			if (tTd(11, 20))
4484 				dprintf("mailfile: ignoring setuid/setgid bits\n");
4485 		}
4486 
4487 		/* we have to open the dfile BEFORE setuid */
4488 		if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4489 		{
4490 			char *df = queuename(e, 'd');
4491 
4492 			e->e_dfp = fopen(df, "r");
4493 			if (e->e_dfp == NULL)
4494 			{
4495 				syserr("mailfile: Cannot open %s for %s from %s",
4496 					df, e->e_to, e->e_from.q_paddr);
4497 			}
4498 		}
4499 
4500 		/* select a new user to run as */
4501 		if (!bitset(SFF_RUNASREALUID, sfflags))
4502 		{
4503 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
4504 			{
4505 				RealUserName = NULL;
4506 				RealUid = mailer->m_uid;
4507 				if (RunAsUid != 0 && RealUid != RunAsUid)
4508 				{
4509 					/* Only root can change the uid */
4510 					syserr("mailfile: insufficient privileges to change uid");
4511 					exit(EX_TEMPFAIL);
4512 				}
4513 			}
4514 			else if (bitset(S_ISUID, mode))
4515 			{
4516 				RealUserName = NULL;
4517 				RealUid = stb.st_uid;
4518 			}
4519 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
4520 			{
4521 				if (ctladdr->q_ruser != NULL)
4522 					RealUserName = ctladdr->q_ruser;
4523 				else
4524 					RealUserName = ctladdr->q_user;
4525 				RealUid = ctladdr->q_uid;
4526 			}
4527 			else if (mailer != NULL && mailer->m_uid != 0)
4528 			{
4529 				RealUserName = DefUser;
4530 				RealUid = mailer->m_uid;
4531 			}
4532 			else
4533 			{
4534 				RealUserName = DefUser;
4535 				RealUid = DefUid;
4536 			}
4537 
4538 			/* select a new group to run as */
4539 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
4540 			{
4541 				RealGid = mailer->m_gid;
4542 				if (RunAsUid != 0 &&
4543 				    (RealGid != getgid() ||
4544 				     RealGid != getegid()))
4545 				{
4546 					/* Only root can change the gid */
4547 					syserr("mailfile: insufficient privileges to change gid");
4548 					exit(EX_TEMPFAIL);
4549 				}
4550 			}
4551 			else if (bitset(S_ISGID, mode))
4552 				RealGid = stb.st_gid;
4553 			else if (ctladdr != NULL &&
4554 				 ctladdr->q_uid == DefUid &&
4555 				 ctladdr->q_gid == 0)
4556 			{
4557 				/*
4558 				**  Special case:  This means it is an
4559 				**  alias and we should act as DefaultUser.
4560 				**  See alias()'s comments.
4561 				*/
4562 
4563 				RealGid = DefGid;
4564 				RealUserName = DefUser;
4565 			}
4566 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
4567 				RealGid = ctladdr->q_gid;
4568 			else if (mailer != NULL && mailer->m_gid != 0)
4569 				RealGid = mailer->m_gid;
4570 			else
4571 				RealGid = DefGid;
4572 		}
4573 
4574 		/* last ditch */
4575 		if (!bitset(SFF_ROOTOK, sfflags))
4576 		{
4577 			if (RealUid == 0)
4578 				RealUid = DefUid;
4579 			if (RealGid == 0)
4580 				RealGid = DefGid;
4581 		}
4582 
4583 		/* set group id list (needs /etc/group access) */
4584 		if (RealUserName != NULL && !DontInitGroups)
4585 		{
4586 			if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
4587 			{
4588 				syserr("mailfile: initgroups(%s, %d) failed",
4589 					RealUserName, RealGid);
4590 				exit(EX_TEMPFAIL);
4591 			}
4592 		}
4593 		else
4594 		{
4595 			GIDSET_T gidset[1];
4596 
4597 			gidset[0] = RealGid;
4598 			if (setgroups(1, gidset) == -1 && suidwarn)
4599 			{
4600 				syserr("mailfile: setgroups() failed");
4601 				exit(EX_TEMPFAIL);
4602 			}
4603 		}
4604 
4605 		/*
4606 		**  If you have a safe environment, go into it.
4607 		*/
4608 
4609 		if (realfile != targetfile)
4610 		{
4611 			*realfile = '\0';
4612 			if (tTd(11, 20))
4613 				dprintf("mailfile: chroot %s\n", targetfile);
4614 			if (chroot(targetfile) < 0)
4615 			{
4616 				syserr("mailfile: Cannot chroot(%s)",
4617 				       targetfile);
4618 				exit(EX_CANTCREAT);
4619 			}
4620 			*realfile = '/';
4621 		}
4622 
4623 		if (tTd(11, 40))
4624 			dprintf("mailfile: deliver to %s\n", realfile);
4625 
4626 		if (chdir("/") < 0)
4627 		{
4628 			syserr("mailfile: cannot chdir(/)");
4629 			exit(EX_CANTCREAT);
4630 		}
4631 
4632 		/* now reset the group and user ids */
4633 		endpwent();
4634 		if (setgid(RealGid) < 0 && suidwarn)
4635 		{
4636 			syserr("mailfile: setgid(%ld) failed", (long) RealGid);
4637 			exit(EX_TEMPFAIL);
4638 		}
4639 		vendor_set_uid(RealUid);
4640 		if (setuid(RealUid) < 0 && suidwarn)
4641 		{
4642 			syserr("mailfile: setuid(%ld) failed", (long) RealUid);
4643 			exit(EX_TEMPFAIL);
4644 		}
4645 
4646 		if (tTd(11, 2))
4647 			dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
4648 				(int) getuid(), (int) geteuid(),
4649 				(int) getgid(), (int) getegid());
4650 
4651 
4652 		/* move into some "safe" directory */
4653 		if (mailer->m_execdir != NULL)
4654 		{
4655 			char *q;
4656 
4657 			for (p = mailer->m_execdir; p != NULL; p = q)
4658 			{
4659 				q = strchr(p, ':');
4660 				if (q != NULL)
4661 					*q = '\0';
4662 				expand(p, buf, sizeof buf, e);
4663 				if (q != NULL)
4664 					*q++ = ':';
4665 				if (tTd(11, 20))
4666 					dprintf("mailfile: trydir %s\n", buf);
4667 				if (buf[0] != '\0' && chdir(buf) >= 0)
4668 					break;
4669 			}
4670 		}
4671 
4672 		/*
4673 		**  Recheck the file after we have assumed the ID of the
4674 		**  delivery user to make sure we can deliver to it as
4675 		**  that user.  This is necessary if sendmail is running
4676 		**  as root and the file is on an NFS mount which treats
4677 		**  root as nobody.
4678 		*/
4679 
4680 #if HASLSTAT
4681 		if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
4682 			err = stat(realfile, &stb);
4683 		else
4684 			err = lstat(realfile, &stb);
4685 #else /* HASLSTAT */
4686 		err = stat(realfile, &stb);
4687 #endif /* HASLSTAT */
4688 
4689 		if (err < 0)
4690 		{
4691 			stb.st_mode = ST_MODE_NOFILE;
4692 			mode = FileMode;
4693 			oflags |= O_CREAT|O_EXCL;
4694 		}
4695 		else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
4696 			 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
4697 				   DontBlameSendmail) &&
4698 			  stb.st_nlink != 1) ||
4699 			 (realfile != targetfile && !S_ISREG(mode)))
4700 			exit(EX_CANTCREAT);
4701 		else
4702 			mode = stb.st_mode;
4703 
4704 		if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
4705 			sfflags |= SFF_NOSLINK;
4706 		if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
4707 			sfflags |= SFF_NOHLINK;
4708 		sfflags &= ~SFF_OPENASROOT;
4709 		f = safefopen(realfile, oflags, mode, sfflags);
4710 		if (f == NULL)
4711 		{
4712 			if (transienterror(errno))
4713 			{
4714 				usrerr("454 4.3.0 cannot open %s: %s",
4715 				       shortenstring(realfile, MAXSHORTSTR),
4716 				       errstring(errno));
4717 				exit(EX_TEMPFAIL);
4718 			}
4719 			else
4720 			{
4721 				usrerr("554 5.3.0 cannot open %s: %s",
4722 				       shortenstring(realfile, MAXSHORTSTR),
4723 				       errstring(errno));
4724 				exit(EX_CANTCREAT);
4725 			}
4726 		}
4727 		if (filechanged(realfile, fileno(f), &stb))
4728 		{
4729 			syserr("554 5.3.0 file changed after open");
4730 			exit(EX_CANTCREAT);
4731 		}
4732 		if (fstat(fileno(f), &stb) < 0)
4733 		{
4734 			syserr("554 5.3.0 cannot fstat %s", errstring(errno));
4735 			exit(EX_CANTCREAT);
4736 		}
4737 
4738 		curoff = stb.st_size;
4739 
4740 		if (ev != NULL)
4741 			clrevent(ev);
4742 
4743 		memset(&mcibuf, '\0', sizeof mcibuf);
4744 		mcibuf.mci_mailer = mailer;
4745 		mcibuf.mci_out = f;
4746 		if (bitnset(M_7BITS, mailer->m_flags))
4747 			mcibuf.mci_flags |= MCIF_7BIT;
4748 
4749 		/* clear out per-message flags from connection structure */
4750 		mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
4751 
4752 		if (bitset(EF_HAS8BIT, e->e_flags) &&
4753 		    !bitset(EF_DONT_MIME, e->e_flags) &&
4754 		    bitnset(M_7BITS, mailer->m_flags))
4755 			mcibuf.mci_flags |= MCIF_CVT8TO7;
4756 
4757 #if MIME7TO8
4758 		if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
4759 		    !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
4760 		    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
4761 		    (strcasecmp(p, "quoted-printable") == 0 ||
4762 		     strcasecmp(p, "base64") == 0) &&
4763 		    (p = hvalue("Content-Type", e->e_header)) != NULL)
4764 		{
4765 			/* may want to convert 7 -> 8 */
4766 			/* XXX should really parse it here -- and use a class XXX */
4767 			if (strncasecmp(p, "text/plain", 10) == 0 &&
4768 			    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
4769 				mcibuf.mci_flags |= MCIF_CVT7TO8;
4770 		}
4771 #endif /* MIME7TO8 */
4772 
4773 		putfromline(&mcibuf, e);
4774 		(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER);
4775 		(*e->e_putbody)(&mcibuf, e, NULL);
4776 		putline("\n", &mcibuf);
4777 		if (fflush(f) != 0 ||
4778 		    (SuperSafe && fsync(fileno(f)) < 0) ||
4779 		    ferror(f))
4780 		{
4781 			setstat(EX_IOERR);
4782 #if !NOFTRUNCATE
4783 			(void) ftruncate(fileno(f), curoff);
4784 #endif /* !NOFTRUNCATE */
4785 		}
4786 
4787 		/* reset ISUID & ISGID bits for paranoid systems */
4788 #if HASFCHMOD
4789 		(void) fchmod(fileno(f), (MODE_T) mode);
4790 #else /* HASFCHMOD */
4791 		(void) chmod(filename, (MODE_T) mode);
4792 #endif /* HASFCHMOD */
4793 		if (fclose(f) < 0)
4794 			setstat(EX_IOERR);
4795 		(void) fflush(stdout);
4796 		(void) setuid(RealUid);
4797 		exit(ExitStat);
4798 		/* NOTREACHED */
4799 	}
4800 	else
4801 	{
4802 		/* parent -- wait for exit status */
4803 		int st;
4804 
4805 		st = waitfor(pid);
4806 		if (st == -1)
4807 		{
4808 			syserr("mailfile: %s: wait", mailer->m_name);
4809 			return EX_SOFTWARE;
4810 		}
4811 		if (WIFEXITED(st))
4812 			return (WEXITSTATUS(st));
4813 		else
4814 		{
4815 			syserr("mailfile: %s: child died on signal %d",
4816 			       mailer->m_name, st);
4817 			return EX_UNAVAILABLE;
4818 		}
4819 		/* NOTREACHED */
4820 	}
4821 	return EX_UNAVAILABLE;	/* avoid compiler warning on IRIX */
4822 }
4823 
4824 static void
4825 mailfiletimeout()
4826 {
4827 	/*
4828 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
4829 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
4830 	**	DOING.
4831 	*/
4832 
4833 	errno = ETIMEDOUT;
4834 	longjmp(CtxMailfileTimeout, 1);
4835 }
4836 /*
4837 **  HOSTSIGNATURE -- return the "signature" for a host.
4838 **
4839 **	The signature describes how we are going to send this -- it
4840 **	can be just the hostname (for non-Internet hosts) or can be
4841 **	an ordered list of MX hosts.
4842 **
4843 **	Parameters:
4844 **		m -- the mailer describing this host.
4845 **		host -- the host name.
4846 **
4847 **	Returns:
4848 **		The signature for this host.
4849 **
4850 **	Side Effects:
4851 **		Can tweak the symbol table.
4852 */
4853 #define MAXHOSTSIGNATURE	8192	/* max len of hostsignature */
4854 
4855 static char *
4856 hostsignature(m, host)
4857 	register MAILER *m;
4858 	char *host;
4859 {
4860 	register char *p;
4861 	register STAB *s;
4862 #if NAMED_BIND
4863 	char sep = ':';
4864 	char prevsep = ':';
4865 	int i;
4866 	int len;
4867 	int nmx;
4868 	int hl;
4869 	time_t now;
4870 	char *hp;
4871 	char *endp;
4872 	int oldoptions = _res.options;
4873 	char *mxhosts[MAXMXHOSTS + 1];
4874 	u_short mxprefs[MAXMXHOSTS + 1];
4875 #endif /* NAMED_BIND */
4876 
4877 	if (tTd(17, 3))
4878 		dprintf("hostsignature(%s)\n", host);
4879 
4880 	/*
4881 	**  If local delivery (and not remote), just return a constant.
4882 	*/
4883 
4884 	p = m->m_mailer;
4885 	if (bitnset(M_LOCALMAILER, m->m_flags) &&
4886 	    strcmp(p, "[IPC]") != 0 &&
4887 	    strcmp(p, "[TCP]") != 0)
4888 		return "localhost";
4889 
4890 	/*
4891 	**  Check to see if this uses IPC -- if not, it can't have MX records.
4892 	*/
4893 
4894 	if (strcmp(p, "[IPC]") != 0 &&
4895 	    strcmp(p, "[TCP]") != 0)
4896 	{
4897 		/* just an ordinary mailer */
4898 		return host;
4899 	}
4900 #if NETUNIX
4901 	else if (m->m_argv[0] != NULL &&
4902 		 strcmp(m->m_argv[0], "FILE") == 0)
4903 	{
4904 		/* rendezvous in the file system, no MX records */
4905 		return host;
4906 	}
4907 #endif /* NETUNIX */
4908 
4909 	/*
4910 	**  Look it up in the symbol table.
4911 	*/
4912 
4913 	s = stab(host, ST_HOSTSIG, ST_ENTER);
4914 	if (s->s_hostsig != NULL)
4915 	{
4916 		if (tTd(17, 3))
4917 			dprintf("hostsignature(): stab(%s) found %s\n", host,
4918 				s->s_hostsig);
4919 		return s->s_hostsig;
4920 	}
4921 
4922 	/*
4923 	**  Not already there -- create a signature.
4924 	*/
4925 
4926 #if NAMED_BIND
4927 	if (ConfigLevel < 2)
4928 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
4929 
4930 	now = curtime();
4931 	for (hp = host; hp != NULL; hp = endp)
4932 	{
4933 #if NETINET6
4934 		if (*hp == '[')
4935 		{
4936 			endp = strchr(hp + 1, ']');
4937 			if (endp != NULL)
4938 				endp = strpbrk(endp + 1, ":,");
4939 		}
4940 		else
4941 			endp = strpbrk(hp, ":,");
4942 #else /* NETINET6 */
4943 		endp = strpbrk(hp, ":,");
4944 #endif /* NETINET6 */
4945 		if (endp != NULL)
4946 		{
4947 			sep = *endp;
4948 			*endp = '\0';
4949 		}
4950 
4951 		if (bitnset(M_NOMX, m->m_flags))
4952 		{
4953 			/* skip MX lookups */
4954 			nmx = 1;
4955 			mxhosts[0] = hp;
4956 		}
4957 		else
4958 		{
4959 			auto int rcode;
4960 
4961 			nmx = getmxrr(hp, mxhosts, mxprefs, TRUE, &rcode);
4962 			if (nmx <= 0)
4963 			{
4964 				int save_errno;
4965 				register MCI *mci;
4966 
4967 				/* update the connection info for this host */
4968 				save_errno = errno;
4969 				mci = mci_get(hp, m);
4970 				mci->mci_errno = save_errno;
4971 				mci->mci_herrno = h_errno;
4972 				mci->mci_lastuse = now;
4973 				if (rcode == EX_NOHOST)
4974 					mci_setstat(mci, rcode, "5.1.2",
4975 						"550 Host unknown");
4976 				else
4977 					mci_setstat(mci, rcode, NULL, NULL);
4978 
4979 				/* use the original host name as signature */
4980 				nmx = 1;
4981 				mxhosts[0] = hp;
4982 			}
4983 			if (tTd(17, 3))
4984 				dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
4985 					nmx, mxhosts[0]);
4986 		}
4987 
4988 		len = 0;
4989 		for (i = 0; i < nmx; i++)
4990 			len += strlen(mxhosts[i]) + 1;
4991 		if (s->s_hostsig != NULL)
4992 			len += strlen(s->s_hostsig) + 1;
4993 		if (len >= MAXHOSTSIGNATURE)
4994 		{
4995 			sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
4996 				  host, MAXHOSTSIGNATURE, len);
4997 			len = MAXHOSTSIGNATURE;
4998 		}
4999 		p = xalloc(len);
5000 		if (s->s_hostsig != NULL)
5001 		{
5002 			(void) strlcpy(p, s->s_hostsig, len);
5003 			sm_free(s->s_hostsig);
5004 			s->s_hostsig = p;
5005 			hl = strlen(p);
5006 			p += hl;
5007 			*p++ = prevsep;
5008 			len -= hl + 1;
5009 		}
5010 		else
5011 			s->s_hostsig = p;
5012 		for (i = 0; i < nmx; i++)
5013 		{
5014 			hl = strlen(mxhosts[i]);
5015 			if (len - 1 < hl || len <= 1)
5016 			{
5017 				/* force to drop out of outer loop */
5018 				len = -1;
5019 				break;
5020 			}
5021 			if (i != 0)
5022 			{
5023 				if (mxprefs[i] == mxprefs[i - 1])
5024 					*p++ = ',';
5025 				else
5026 					*p++ = ':';
5027 				len--;
5028 			}
5029 			(void) strlcpy(p, mxhosts[i], len);
5030 			p += hl;
5031 			len -= hl;
5032 		}
5033 
5034 		/*
5035 		**  break out of loop if len exceeded MAXHOSTSIGNATURE
5036 		**  because we won't have more space for further hosts
5037 		**  anyway (separated by : in the .cf file).
5038 		*/
5039 
5040 		if (len < 0)
5041 			break;
5042 		if (endp != NULL)
5043 			*endp++ = sep;
5044 		prevsep = sep;
5045 	}
5046 	makelower(s->s_hostsig);
5047 	if (ConfigLevel < 2)
5048 		_res.options = oldoptions;
5049 #else /* NAMED_BIND */
5050 	/* not using BIND -- the signature is just the host name */
5051 	s->s_hostsig = host;
5052 #endif /* NAMED_BIND */
5053 	if (tTd(17, 1))
5054 		dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig);
5055 	return s->s_hostsig;
5056 }
5057 /*
5058 **  PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5059 **
5060 **	The signature describes how we are going to send this -- it
5061 **	can be just the hostname (for non-Internet hosts) or can be
5062 **	an ordered list of MX hosts which must be randomized for equal
5063 **	MX preference values.
5064 **
5065 **	Parameters:
5066 **		sig -- the host signature.
5067 **		mxhosts -- array to populate.
5068 **
5069 **	Returns:
5070 **		The number of hosts inserted into mxhosts array.
5071 **
5072 **	Side Effects:
5073 **		Randomizes equal MX preference hosts in mxhosts.
5074 */
5075 
5076 static int
5077 parse_hostsignature(sig, mxhosts, mailer)
5078 	char *sig;
5079 	char **mxhosts;
5080 	MAILER *mailer;
5081 {
5082 	int nmx = 0;
5083 	int curpref = 0;
5084 	int i, j;
5085 	char *hp, *endp;
5086 	u_short prefer[MAXMXHOSTS];
5087 	long rndm[MAXMXHOSTS];
5088 
5089 	for (hp = sig; hp != NULL; hp = endp)
5090 	{
5091 		char sep = ':';
5092 
5093 #if NETINET6
5094 		if (*hp == '[')
5095 		{
5096 			endp = strchr(hp + 1, ']');
5097 			if (endp != NULL)
5098 				endp = strpbrk(endp + 1, ":,");
5099 		}
5100 		else
5101 			endp = strpbrk(hp, ":,");
5102 #else /* NETINET6 */
5103 		endp = strpbrk(hp, ":,");
5104 #endif /* NETINET6 */
5105 		if (endp != NULL)
5106 		{
5107 			sep = *endp;
5108 			*endp = '\0';
5109 		}
5110 
5111 		mxhosts[nmx] = hp;
5112 		prefer[nmx] = curpref;
5113 		if (mci_match(hp, mailer))
5114 			rndm[nmx] = 0;
5115 		else
5116 			rndm[nmx] = get_random();
5117 
5118 		if (endp != NULL)
5119 		{
5120 			/*
5121 			**  Since we don't have the original MX prefs,
5122 			**  make our own.  If the separator is a ':', that
5123 			**  means the preference for the next host will be
5124 			**  higher than this one, so simply increment curpref.
5125 			*/
5126 
5127 			if (sep == ':')
5128 				curpref++;
5129 
5130 			*endp++ = sep;
5131 		}
5132 		if (++nmx >= MAXMXHOSTS)
5133 			break;
5134 	}
5135 
5136 	/* sort the records using the random factor for equal preferences */
5137 	for (i = 0; i < nmx; i++)
5138 	{
5139 		for (j = i + 1; j < nmx; j++)
5140 		{
5141 			/*
5142 			**  List is already sorted by MX preference, only
5143 			**  need to look for equal preference MX records
5144 			*/
5145 
5146 			if (prefer[i] < prefer[j])
5147 				break;
5148 
5149 			if (prefer[i] > prefer[j] ||
5150 			    (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5151 			{
5152 				register u_short tempp;
5153 				register long tempr;
5154 				register char *temp1;
5155 
5156 				tempp = prefer[i];
5157 				prefer[i] = prefer[j];
5158 				prefer[j] = tempp;
5159 				temp1 = mxhosts[i];
5160 				mxhosts[i] = mxhosts[j];
5161 				mxhosts[j] = temp1;
5162 				tempr = rndm[i];
5163 				rndm[i] = rndm[j];
5164 				rndm[j] = tempr;
5165 			}
5166 		}
5167 	}
5168 	return nmx;
5169 }
5170 
5171 #if SMTP
5172 # if STARTTLS
5173 static SSL_CTX	*clt_ctx = NULL;
5174 
5175 /*
5176 **  INITCLTTLS -- initialize client side TLS
5177 **
5178 **	Parameters:
5179 **		none.
5180 **
5181 **	Returns:
5182 **		succeeded?
5183 */
5184 
5185 bool
5186 initclttls()
5187 {
5188 	if (clt_ctx != NULL)
5189 		return TRUE;	/* already done */
5190 	return inittls(&clt_ctx, TLS_I_CLT, FALSE, CltCERTfile, Cltkeyfile,
5191 		       CACERTpath, CACERTfile, DHParams);
5192 }
5193 
5194 /*
5195 **  STARTTLS -- try to start secure connection (client side)
5196 **
5197 **	Parameters:
5198 **		m -- the mailer.
5199 **		mci -- the mailer connection info.
5200 **		e -- the envelope.
5201 **
5202 **	Returns:
5203 **		success?
5204 **		(maybe this should be some other code than EX_
5205 **		that denotes which stage failed.)
5206 */
5207 
5208 static int
5209 starttls(m, mci, e)
5210 	MAILER *m;
5211 	MCI *mci;
5212 	ENVELOPE *e;
5213 {
5214 	int smtpresult;
5215 	int result = 0;
5216 	int rfd, wfd;
5217 	SSL *clt_ssl = NULL;
5218 
5219 	if (clt_ctx == NULL && !initclttls())
5220 		return EX_TEMPFAIL;
5221 	smtpmessage("STARTTLS", m, mci);
5222 
5223 	/* get the reply */
5224 	smtpresult = reply(m, mci, e, TimeOuts.to_datafinal, NULL, NULL);
5225 	/* which timeout? XXX */
5226 
5227 	/* check return code from server */
5228 	if (smtpresult == 454)
5229 		return EX_TEMPFAIL;
5230 	if (smtpresult == 501)
5231 		return EX_USAGE;
5232 	if (smtpresult == -1)
5233 		return smtpresult;
5234 	if (smtpresult != 220)
5235 		return EX_PROTOCOL;
5236 
5237 	if (LogLevel > 13)
5238 		sm_syslog(LOG_INFO, e->e_id, "TLS: start client");
5239 
5240 	/* start connection */
5241 	if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
5242 	{
5243 		if (LogLevel > 5)
5244 		{
5245 			sm_syslog(LOG_ERR, e->e_id,
5246 				  "TLS: error: client: SSL_new failed");
5247 			if (LogLevel > 9)
5248 				tlslogerr();
5249 		}
5250 		return EX_SOFTWARE;
5251 	}
5252 
5253 	rfd = fileno(mci->mci_in);
5254 	wfd = fileno(mci->mci_out);
5255 
5256 	/* SSL_clear(clt_ssl); ? */
5257 	if (rfd < 0 || wfd < 0 ||
5258 	    (result = SSL_set_rfd(clt_ssl, rfd)) <= 0 ||
5259 	    (result = SSL_set_wfd(clt_ssl, wfd)) <= 0)
5260 	{
5261 		if (LogLevel > 5)
5262 		{
5263 			sm_syslog(LOG_ERR, e->e_id,
5264 				  "TLS: error: SSL_set_xfd failed=%d", result);
5265 			if (LogLevel > 9)
5266 				tlslogerr();
5267 		}
5268 		return EX_SOFTWARE;
5269 	}
5270 	SSL_set_connect_state(clt_ssl);
5271 	if ((result = SSL_connect(clt_ssl)) <= 0)
5272 	{
5273 		int i;
5274 
5275 		/* what to do in this case? */
5276 		i = SSL_get_error(clt_ssl, result);
5277 		if (LogLevel > 5)
5278 		{
5279 			sm_syslog(LOG_ERR, e->e_id,
5280 				  "TLS: error: SSL_connect failed=%d (%d)",
5281 				  result, i);
5282 			if (LogLevel > 9)
5283 				tlslogerr();
5284 		}
5285 		SSL_free(clt_ssl);
5286 		clt_ssl = NULL;
5287 		return EX_SOFTWARE;
5288 	}
5289 	mci->mci_ssl = clt_ssl;
5290 	result = tls_get_info(clt_ssl, e, FALSE, mci->mci_host, TRUE);
5291 
5292 	/* switch to use SSL... */
5293 #if SFIO
5294 	if (sfdctls(mci->mci_in, mci->mci_out, mci->mci_ssl) == 0)
5295 		return EX_OK;
5296 #else /* SFIO */
5297 # if _FFR_TLS_TOREK
5298 	if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
5299 		return EX_OK;
5300 # endif /* _FFR_TLS_TOREK */
5301 #endif /* SFIO */
5302 
5303 	/* failure */
5304 	SSL_free(clt_ssl);
5305 	clt_ssl = NULL;
5306 	return EX_SOFTWARE;
5307 }
5308 
5309 /*
5310 **  ENDTLSCLT -- shutdown secure connection (client side)
5311 **
5312 **	Parameters:
5313 **		mci -- the mailer connection info.
5314 **
5315 **	Returns:
5316 **		success?
5317 */
5318 int
5319 endtlsclt(mci)
5320 	MCI *mci;
5321 {
5322 	int r;
5323 
5324 	if (!bitset(MCIF_TLSACT, mci->mci_flags))
5325 		return EX_OK;
5326 	r = endtls(mci->mci_ssl, "client");
5327 	mci->mci_flags &= ~MCIF_TLSACT;
5328 	return r;
5329 }
5330 /*
5331 **  ENDTLS -- shutdown secure connection
5332 **
5333 **	Parameters:
5334 **		ssl -- SSL connection information.
5335 **		side -- srv/clt (for logging).
5336 **
5337 **	Returns:
5338 **		success?
5339 */
5340 
5341 int
5342 endtls(ssl, side)
5343 	SSL *ssl;
5344 	char *side;
5345 {
5346 	int ret = EX_OK;
5347 
5348 	if (ssl != NULL)
5349 	{
5350 		int r;
5351 
5352 		if ((r = SSL_shutdown(ssl)) < 0)
5353 		{
5354 			if (LogLevel > 11)
5355 				sm_syslog(LOG_WARNING, NOQID,
5356 					  "SSL_shutdown %s failed: %d",
5357 					  side, r);
5358 			ret = EX_SOFTWARE;
5359 		}
5360 		else if (r == 0)
5361 		{
5362 			if (LogLevel > 13)
5363 				sm_syslog(LOG_WARNING, NOQID,
5364 					  "SSL_shutdown %s not done",
5365 					  side);
5366 			ret = EX_SOFTWARE;
5367 		}
5368 		SSL_free(ssl);
5369 		ssl = NULL;
5370 	}
5371 	return ret;
5372 }
5373 # endif /* STARTTLS */
5374 #endif /* SMTP */
5375