1 /* 2 * Copyright (c) 1998-2010, 2012 Proofpoint, Inc. and its suppliers. 3 * All rights reserved. 4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5 * Copyright (c) 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * By using this file, you agree to the terms and conditions set 9 * forth in the LICENSE file which can be found at the top level of 10 * the sendmail distribution. 11 * 12 */ 13 14 #include <sendmail.h> 15 #include <sm/time.h> 16 17 SM_RCSID("@(#)$Id: deliver.c,v 8.1030 2013-11-22 20:51:55 ca Exp $") 18 19 #if HASSETUSERCONTEXT 20 # include <login_cap.h> 21 #endif /* HASSETUSERCONTEXT */ 22 23 #if NETINET || NETINET6 24 # include <arpa/inet.h> 25 #endif /* NETINET || NETINET6 */ 26 27 #if STARTTLS || SASL 28 # include "sfsasl.h" 29 #endif /* STARTTLS || SASL */ 30 31 static int deliver __P((ENVELOPE *, ADDRESS *)); 32 static void dup_queue_file __P((ENVELOPE *, ENVELOPE *, int)); 33 static void mailfiletimeout __P((int)); 34 static void endwaittimeout __P((int)); 35 static int parse_hostsignature __P((char *, char **, MAILER *)); 36 static void sendenvelope __P((ENVELOPE *, int)); 37 static int coloncmp __P((const char *, const char *)); 38 39 #if STARTTLS 40 # include <openssl/err.h> 41 static int starttls __P((MAILER *, MCI *, ENVELOPE *)); 42 static int endtlsclt __P((MCI *)); 43 #endif /* STARTTLS */ 44 # if STARTTLS || SASL 45 static bool iscltflgset __P((ENVELOPE *, int)); 46 # endif /* STARTTLS || SASL */ 47 48 /* 49 ** SENDALL -- actually send all the messages. 50 ** 51 ** Parameters: 52 ** e -- the envelope to send. 53 ** mode -- the delivery mode to use. If SM_DEFAULT, use 54 ** the current e->e_sendmode. 55 ** 56 ** Returns: 57 ** none. 58 ** 59 ** Side Effects: 60 ** Scans the send lists and sends everything it finds. 61 ** Delivers any appropriate error messages. 62 ** If we are running in a non-interactive mode, takes the 63 ** appropriate action. 64 */ 65 66 void 67 sendall(e, mode) 68 ENVELOPE *e; 69 int mode; 70 { 71 register ADDRESS *q; 72 char *owner; 73 int otherowners; 74 int save_errno; 75 register ENVELOPE *ee; 76 ENVELOPE *splitenv = NULL; 77 int oldverbose = Verbose; 78 bool somedeliveries = false, expensive = false; 79 pid_t pid; 80 81 /* 82 ** If this message is to be discarded, don't bother sending 83 ** the message at all. 84 */ 85 86 if (bitset(EF_DISCARD, e->e_flags)) 87 { 88 if (tTd(13, 1)) 89 sm_dprintf("sendall: discarding id %s\n", e->e_id); 90 e->e_flags |= EF_CLRQUEUE; 91 if (LogLevel > 9) 92 logundelrcpts(e, "discarded", 9, true); 93 else if (LogLevel > 4) 94 sm_syslog(LOG_INFO, e->e_id, "discarded"); 95 markstats(e, NULL, STATS_REJECT); 96 return; 97 } 98 99 /* 100 ** If we have had global, fatal errors, don't bother sending 101 ** the message at all if we are in SMTP mode. Local errors 102 ** (e.g., a single address failing) will still cause the other 103 ** addresses to be sent. 104 */ 105 106 if (bitset(EF_FATALERRS, e->e_flags) && 107 (OpMode == MD_SMTP || OpMode == MD_DAEMON)) 108 { 109 e->e_flags |= EF_CLRQUEUE; 110 return; 111 } 112 113 /* determine actual delivery mode */ 114 if (mode == SM_DEFAULT) 115 { 116 mode = e->e_sendmode; 117 if (mode != SM_VERIFY && mode != SM_DEFER && 118 shouldqueue(e->e_msgpriority, e->e_ctime)) 119 mode = SM_QUEUE; 120 } 121 122 if (tTd(13, 1)) 123 { 124 sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ", 125 mode, e->e_id); 126 printaddr(sm_debug_file(), &e->e_from, false); 127 sm_dprintf("\te_flags = "); 128 printenvflags(e); 129 sm_dprintf("sendqueue:\n"); 130 printaddr(sm_debug_file(), e->e_sendqueue, true); 131 } 132 133 /* 134 ** Do any preprocessing necessary for the mode we are running. 135 ** Check to make sure the hop count is reasonable. 136 ** Delete sends to the sender in mailing lists. 137 */ 138 139 CurEnv = e; 140 if (tTd(62, 1)) 141 checkfds(NULL); 142 143 if (e->e_hopcount > MaxHopCount) 144 { 145 char *recip; 146 147 if (e->e_sendqueue != NULL && 148 e->e_sendqueue->q_paddr != NULL) 149 recip = e->e_sendqueue->q_paddr; 150 else 151 recip = "(nobody)"; 152 153 errno = 0; 154 queueup(e, WILL_BE_QUEUED(mode), false); 155 e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE; 156 ExitStat = EX_UNAVAILABLE; 157 syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s", 158 e->e_hopcount, MaxHopCount, e->e_from.q_paddr, 159 RealHostName == NULL ? "localhost" : RealHostName, 160 recip); 161 for (q = e->e_sendqueue; q != NULL; q = q->q_next) 162 { 163 if (QS_IS_DEAD(q->q_state)) 164 continue; 165 q->q_state = QS_BADADDR; 166 q->q_status = "5.4.6"; 167 q->q_rstatus = "554 5.4.6 Too many hops"; 168 } 169 return; 170 } 171 172 /* 173 ** Do sender deletion. 174 ** 175 ** If the sender should be queued up, skip this. 176 ** This can happen if the name server is hosed when you 177 ** are trying to send mail. The result is that the sender 178 ** is instantiated in the queue as a recipient. 179 */ 180 181 if (!bitset(EF_METOO, e->e_flags) && 182 !QS_IS_QUEUEUP(e->e_from.q_state)) 183 { 184 if (tTd(13, 5)) 185 { 186 sm_dprintf("sendall: QS_SENDER "); 187 printaddr(sm_debug_file(), &e->e_from, false); 188 } 189 e->e_from.q_state = QS_SENDER; 190 (void) recipient(&e->e_from, &e->e_sendqueue, 0, e); 191 } 192 193 /* 194 ** Handle alias owners. 195 ** 196 ** We scan up the q_alias chain looking for owners. 197 ** We discard owners that are the same as the return path. 198 */ 199 200 for (q = e->e_sendqueue; q != NULL; q = q->q_next) 201 { 202 register struct address *a; 203 204 for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias) 205 continue; 206 if (a != NULL) 207 q->q_owner = a->q_owner; 208 209 if (q->q_owner != NULL && 210 !QS_IS_DEAD(q->q_state) && 211 strcmp(q->q_owner, e->e_from.q_paddr) == 0) 212 q->q_owner = NULL; 213 } 214 215 if (tTd(13, 25)) 216 { 217 sm_dprintf("\nAfter first owner pass, sendq =\n"); 218 printaddr(sm_debug_file(), e->e_sendqueue, true); 219 } 220 221 owner = ""; 222 otherowners = 1; 223 while (owner != NULL && otherowners > 0) 224 { 225 if (tTd(13, 28)) 226 sm_dprintf("owner = \"%s\", otherowners = %d\n", 227 owner, otherowners); 228 owner = NULL; 229 otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0; 230 231 for (q = e->e_sendqueue; q != NULL; q = q->q_next) 232 { 233 if (tTd(13, 30)) 234 { 235 sm_dprintf("Checking "); 236 printaddr(sm_debug_file(), q, false); 237 } 238 if (QS_IS_DEAD(q->q_state)) 239 { 240 if (tTd(13, 30)) 241 sm_dprintf(" ... QS_IS_DEAD\n"); 242 continue; 243 } 244 if (tTd(13, 29) && !tTd(13, 30)) 245 { 246 sm_dprintf("Checking "); 247 printaddr(sm_debug_file(), q, false); 248 } 249 250 if (q->q_owner != NULL) 251 { 252 if (owner == NULL) 253 { 254 if (tTd(13, 40)) 255 sm_dprintf(" ... First owner = \"%s\"\n", 256 q->q_owner); 257 owner = q->q_owner; 258 } 259 else if (owner != q->q_owner) 260 { 261 if (strcmp(owner, q->q_owner) == 0) 262 { 263 if (tTd(13, 40)) 264 sm_dprintf(" ... Same owner = \"%s\"\n", 265 owner); 266 267 /* make future comparisons cheap */ 268 q->q_owner = owner; 269 } 270 else 271 { 272 if (tTd(13, 40)) 273 sm_dprintf(" ... Another owner \"%s\"\n", 274 q->q_owner); 275 otherowners++; 276 } 277 owner = q->q_owner; 278 } 279 else if (tTd(13, 40)) 280 sm_dprintf(" ... Same owner = \"%s\"\n", 281 owner); 282 } 283 else 284 { 285 if (tTd(13, 40)) 286 sm_dprintf(" ... Null owner\n"); 287 otherowners++; 288 } 289 290 if (QS_IS_BADADDR(q->q_state)) 291 { 292 if (tTd(13, 30)) 293 sm_dprintf(" ... QS_IS_BADADDR\n"); 294 continue; 295 } 296 297 if (QS_IS_QUEUEUP(q->q_state)) 298 { 299 MAILER *m = q->q_mailer; 300 301 /* 302 ** If we have temporary address failures 303 ** (e.g., dns failure) and a fallback MX is 304 ** set, send directly to the fallback MX host. 305 */ 306 307 if (FallbackMX != NULL && 308 !wordinclass(FallbackMX, 'w') && 309 mode != SM_VERIFY && 310 !bitnset(M_NOMX, m->m_flags) && 311 strcmp(m->m_mailer, "[IPC]") == 0 && 312 m->m_argv[0] != NULL && 313 strcmp(m->m_argv[0], "TCP") == 0) 314 { 315 int len; 316 char *p; 317 318 if (tTd(13, 30)) 319 sm_dprintf(" ... FallbackMX\n"); 320 321 len = strlen(FallbackMX) + 1; 322 p = sm_rpool_malloc_x(e->e_rpool, len); 323 (void) sm_strlcpy(p, FallbackMX, len); 324 q->q_state = QS_OK; 325 q->q_host = p; 326 } 327 else 328 { 329 if (tTd(13, 30)) 330 sm_dprintf(" ... QS_IS_QUEUEUP\n"); 331 continue; 332 } 333 } 334 335 /* 336 ** If this mailer is expensive, and if we don't 337 ** want to make connections now, just mark these 338 ** addresses and return. This is useful if we 339 ** want to batch connections to reduce load. This 340 ** will cause the messages to be queued up, and a 341 ** daemon will come along to send the messages later. 342 */ 343 344 if (NoConnect && !Verbose && 345 bitnset(M_EXPENSIVE, q->q_mailer->m_flags)) 346 { 347 if (tTd(13, 30)) 348 sm_dprintf(" ... expensive\n"); 349 q->q_state = QS_QUEUEUP; 350 expensive = true; 351 } 352 else if (bitnset(M_HOLD, q->q_mailer->m_flags) && 353 QueueLimitId == NULL && 354 QueueLimitSender == NULL && 355 QueueLimitRecipient == NULL) 356 { 357 if (tTd(13, 30)) 358 sm_dprintf(" ... hold\n"); 359 q->q_state = QS_QUEUEUP; 360 expensive = true; 361 } 362 else if (QueueMode != QM_QUARANTINE && 363 e->e_quarmsg != NULL) 364 { 365 if (tTd(13, 30)) 366 sm_dprintf(" ... quarantine: %s\n", 367 e->e_quarmsg); 368 q->q_state = QS_QUEUEUP; 369 expensive = true; 370 } 371 else 372 { 373 if (tTd(13, 30)) 374 sm_dprintf(" ... deliverable\n"); 375 somedeliveries = true; 376 } 377 } 378 379 if (owner != NULL && otherowners > 0) 380 { 381 /* 382 ** Split this envelope into two. 383 */ 384 385 ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool, 386 sizeof(*ee)); 387 STRUCTCOPY(*e, *ee); 388 ee->e_message = NULL; 389 ee->e_id = NULL; 390 assign_queueid(ee); 391 392 if (tTd(13, 1)) 393 sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n", 394 e->e_id, ee->e_id, owner, 395 otherowners); 396 397 ee->e_header = copyheader(e->e_header, ee->e_rpool); 398 ee->e_sendqueue = copyqueue(e->e_sendqueue, 399 ee->e_rpool); 400 ee->e_errorqueue = copyqueue(e->e_errorqueue, 401 ee->e_rpool); 402 ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM); 403 ee->e_flags |= EF_NORECEIPT; 404 setsender(owner, ee, NULL, '\0', true); 405 if (tTd(13, 5)) 406 { 407 sm_dprintf("sendall(split): QS_SENDER "); 408 printaddr(sm_debug_file(), &ee->e_from, false); 409 } 410 ee->e_from.q_state = QS_SENDER; 411 ee->e_dfp = NULL; 412 ee->e_lockfp = NULL; 413 ee->e_xfp = NULL; 414 ee->e_qgrp = e->e_qgrp; 415 ee->e_qdir = e->e_qdir; 416 ee->e_errormode = EM_MAIL; 417 ee->e_sibling = splitenv; 418 ee->e_statmsg = NULL; 419 if (e->e_quarmsg != NULL) 420 ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool, 421 e->e_quarmsg); 422 splitenv = ee; 423 424 for (q = e->e_sendqueue; q != NULL; q = q->q_next) 425 { 426 if (q->q_owner == owner) 427 { 428 q->q_state = QS_CLONED; 429 if (tTd(13, 6)) 430 sm_dprintf("\t... stripping %s from original envelope\n", 431 q->q_paddr); 432 } 433 } 434 for (q = ee->e_sendqueue; q != NULL; q = q->q_next) 435 { 436 if (q->q_owner != owner) 437 { 438 q->q_state = QS_CLONED; 439 if (tTd(13, 6)) 440 sm_dprintf("\t... dropping %s from cloned envelope\n", 441 q->q_paddr); 442 } 443 else 444 { 445 /* clear DSN parameters */ 446 q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS); 447 q->q_flags |= DefaultNotify & ~QPINGONSUCCESS; 448 if (tTd(13, 6)) 449 sm_dprintf("\t... moving %s to cloned envelope\n", 450 q->q_paddr); 451 } 452 } 453 454 if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags)) 455 dup_queue_file(e, ee, DATAFL_LETTER); 456 457 /* 458 ** Give the split envelope access to the parent 459 ** transcript file for errors obtained while 460 ** processing the recipients (done before the 461 ** envelope splitting). 462 */ 463 464 if (e->e_xfp != NULL) 465 ee->e_xfp = sm_io_dup(e->e_xfp); 466 467 /* failed to dup e->e_xfp, start a new transcript */ 468 if (ee->e_xfp == NULL) 469 openxscript(ee); 470 471 if (mode != SM_VERIFY && LogLevel > 4) 472 sm_syslog(LOG_INFO, e->e_id, 473 "%s: clone: owner=%s", 474 ee->e_id, owner); 475 } 476 } 477 478 if (owner != NULL) 479 { 480 setsender(owner, e, NULL, '\0', true); 481 if (tTd(13, 5)) 482 { 483 sm_dprintf("sendall(owner): QS_SENDER "); 484 printaddr(sm_debug_file(), &e->e_from, false); 485 } 486 e->e_from.q_state = QS_SENDER; 487 e->e_errormode = EM_MAIL; 488 e->e_flags |= EF_NORECEIPT; 489 e->e_flags &= ~EF_FATALERRS; 490 } 491 492 /* if nothing to be delivered, just queue up everything */ 493 if (!somedeliveries && !WILL_BE_QUEUED(mode) && 494 mode != SM_VERIFY) 495 { 496 time_t now; 497 498 if (tTd(13, 29)) 499 sm_dprintf("No deliveries: auto-queueing\n"); 500 mode = SM_QUEUE; 501 now = curtime(); 502 503 /* treat this as a delivery in terms of counting tries */ 504 e->e_dtime = now; 505 if (!expensive) 506 e->e_ntries++; 507 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 508 { 509 ee->e_dtime = now; 510 if (!expensive) 511 ee->e_ntries++; 512 } 513 } 514 515 if ((WILL_BE_QUEUED(mode) || mode == SM_FORK || 516 (mode != SM_VERIFY && 517 (SuperSafe == SAFE_REALLY || 518 SuperSafe == SAFE_REALLY_POSTMILTER))) && 519 (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL)) 520 { 521 bool msync; 522 523 /* 524 ** Be sure everything is instantiated in the queue. 525 ** Split envelopes first in case the machine crashes. 526 ** If the original were done first, we may lose 527 ** recipients. 528 */ 529 530 #if !HASFLOCK 531 msync = false; 532 #else /* !HASFLOCK */ 533 msync = mode == SM_FORK; 534 #endif /* !HASFLOCK */ 535 536 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 537 queueup(ee, WILL_BE_QUEUED(mode), msync); 538 queueup(e, WILL_BE_QUEUED(mode), msync); 539 } 540 541 if (tTd(62, 10)) 542 checkfds("after envelope splitting"); 543 544 /* 545 ** If we belong in background, fork now. 546 */ 547 548 if (tTd(13, 20)) 549 { 550 sm_dprintf("sendall: final mode = %c\n", mode); 551 if (tTd(13, 21)) 552 { 553 sm_dprintf("\n================ Final Send Queue(s) =====================\n"); 554 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n", 555 e->e_id, e->e_from.q_paddr); 556 printaddr(sm_debug_file(), e->e_sendqueue, true); 557 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 558 { 559 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n", 560 ee->e_id, ee->e_from.q_paddr); 561 printaddr(sm_debug_file(), ee->e_sendqueue, true); 562 } 563 sm_dprintf("==========================================================\n\n"); 564 } 565 } 566 switch (mode) 567 { 568 case SM_VERIFY: 569 Verbose = 2; 570 break; 571 572 case SM_QUEUE: 573 case SM_DEFER: 574 #if HASFLOCK 575 queueonly: 576 #endif /* HASFLOCK */ 577 if (e->e_nrcpts > 0) 578 e->e_flags |= EF_INQUEUE; 579 (void) dropenvelope(e, splitenv != NULL, true); 580 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 581 { 582 if (ee->e_nrcpts > 0) 583 ee->e_flags |= EF_INQUEUE; 584 (void) dropenvelope(ee, false, true); 585 } 586 return; 587 588 case SM_FORK: 589 if (e->e_xfp != NULL) 590 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 591 592 #if !HASFLOCK 593 /* 594 ** Since fcntl locking has the interesting semantic that 595 ** the lock is owned by a process, not by an open file 596 ** descriptor, we have to flush this to the queue, and 597 ** then restart from scratch in the child. 598 */ 599 600 { 601 /* save id for future use */ 602 char *qid = e->e_id; 603 604 /* now drop the envelope in the parent */ 605 e->e_flags |= EF_INQUEUE; 606 (void) dropenvelope(e, splitenv != NULL, false); 607 608 /* arrange to reacquire lock after fork */ 609 e->e_id = qid; 610 } 611 612 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 613 { 614 /* save id for future use */ 615 char *qid = ee->e_id; 616 617 /* drop envelope in parent */ 618 ee->e_flags |= EF_INQUEUE; 619 (void) dropenvelope(ee, false, false); 620 621 /* and save qid for reacquisition */ 622 ee->e_id = qid; 623 } 624 625 #endif /* !HASFLOCK */ 626 627 /* 628 ** Since the delivery may happen in a child and the parent 629 ** does not wait, the parent may close the maps thereby 630 ** removing any shared memory used by the map. Therefore, 631 ** close the maps now so the child will dynamically open 632 ** them if necessary. 633 */ 634 635 closemaps(false); 636 637 pid = fork(); 638 if (pid < 0) 639 { 640 syserr("deliver: fork 1"); 641 #if HASFLOCK 642 goto queueonly; 643 #else /* HASFLOCK */ 644 e->e_id = NULL; 645 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 646 ee->e_id = NULL; 647 return; 648 #endif /* HASFLOCK */ 649 } 650 else if (pid > 0) 651 { 652 #if HASFLOCK 653 /* be sure we leave the temp files to our child */ 654 /* close any random open files in the envelope */ 655 closexscript(e); 656 if (e->e_dfp != NULL) 657 (void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT); 658 e->e_dfp = NULL; 659 e->e_flags &= ~EF_HAS_DF; 660 661 /* can't call unlockqueue to avoid unlink of xfp */ 662 if (e->e_lockfp != NULL) 663 (void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT); 664 else 665 syserr("%s: sendall: null lockfp", e->e_id); 666 e->e_lockfp = NULL; 667 #endif /* HASFLOCK */ 668 669 /* make sure the parent doesn't own the envelope */ 670 e->e_id = NULL; 671 672 #if USE_DOUBLE_FORK 673 /* catch intermediate zombie */ 674 (void) waitfor(pid); 675 #endif /* USE_DOUBLE_FORK */ 676 return; 677 } 678 679 /* Reset global flags */ 680 RestartRequest = NULL; 681 RestartWorkGroup = false; 682 ShutdownRequest = NULL; 683 PendingSignal = 0; 684 685 /* 686 ** Initialize exception stack and default exception 687 ** handler for child process. 688 */ 689 690 sm_exc_newthread(fatal_error); 691 692 /* 693 ** Since we have accepted responsbility for the message, 694 ** change the SIGTERM handler. intsig() (the old handler) 695 ** would remove the envelope if this was a command line 696 ** message submission. 697 */ 698 699 (void) sm_signal(SIGTERM, SIG_DFL); 700 701 #if USE_DOUBLE_FORK 702 /* double fork to avoid zombies */ 703 pid = fork(); 704 if (pid > 0) 705 exit(EX_OK); 706 save_errno = errno; 707 #endif /* USE_DOUBLE_FORK */ 708 709 CurrentPid = getpid(); 710 711 /* be sure we are immune from the terminal */ 712 disconnect(2, e); 713 clearstats(); 714 715 /* prevent parent from waiting if there was an error */ 716 if (pid < 0) 717 { 718 errno = save_errno; 719 syserr("deliver: fork 2"); 720 #if HASFLOCK 721 e->e_flags |= EF_INQUEUE; 722 #else /* HASFLOCK */ 723 e->e_id = NULL; 724 #endif /* HASFLOCK */ 725 finis(true, true, ExitStat); 726 } 727 728 /* be sure to give error messages in child */ 729 QuickAbort = false; 730 731 /* 732 ** Close any cached connections. 733 ** 734 ** We don't send the QUIT protocol because the parent 735 ** still knows about the connection. 736 ** 737 ** This should only happen when delivering an error 738 ** message. 739 */ 740 741 mci_flush(false, NULL); 742 743 #if HASFLOCK 744 break; 745 #else /* HASFLOCK */ 746 747 /* 748 ** Now reacquire and run the various queue files. 749 */ 750 751 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 752 { 753 ENVELOPE *sibling = ee->e_sibling; 754 755 (void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id, 756 false, false, ee); 757 ee->e_sibling = sibling; 758 } 759 (void) dowork(e->e_qgrp, e->e_qdir, e->e_id, 760 false, false, e); 761 finis(true, true, ExitStat); 762 #endif /* HASFLOCK */ 763 } 764 765 sendenvelope(e, mode); 766 (void) dropenvelope(e, true, true); 767 for (ee = splitenv; ee != NULL; ee = ee->e_sibling) 768 { 769 CurEnv = ee; 770 if (mode != SM_VERIFY) 771 openxscript(ee); 772 sendenvelope(ee, mode); 773 (void) dropenvelope(ee, true, true); 774 } 775 CurEnv = e; 776 777 Verbose = oldverbose; 778 if (mode == SM_FORK) 779 finis(true, true, ExitStat); 780 } 781 782 static void 783 sendenvelope(e, mode) 784 register ENVELOPE *e; 785 int mode; 786 { 787 register ADDRESS *q; 788 bool didany; 789 790 if (tTd(13, 10)) 791 sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n", 792 e->e_id == NULL ? "[NOQUEUE]" : e->e_id, 793 e->e_flags); 794 if (LogLevel > 80) 795 sm_syslog(LOG_DEBUG, e->e_id, 796 "sendenvelope, flags=0x%lx", 797 e->e_flags); 798 799 /* 800 ** If we have had global, fatal errors, don't bother sending 801 ** the message at all if we are in SMTP mode. Local errors 802 ** (e.g., a single address failing) will still cause the other 803 ** addresses to be sent. 804 */ 805 806 if (bitset(EF_FATALERRS, e->e_flags) && 807 (OpMode == MD_SMTP || OpMode == MD_DAEMON)) 808 { 809 e->e_flags |= EF_CLRQUEUE; 810 return; 811 } 812 813 /* 814 ** Don't attempt deliveries if we want to bounce now 815 ** or if deliver-by time is exceeded. 816 */ 817 818 if (!bitset(EF_RESPONSE, e->e_flags) && 819 (TimeOuts.to_q_return[e->e_timeoutclass] == NOW || 820 (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 && 821 curtime() > e->e_ctime + e->e_deliver_by))) 822 return; 823 824 /* 825 ** Run through the list and send everything. 826 ** 827 ** Set EF_GLOBALERRS so that error messages during delivery 828 ** result in returned mail. 829 */ 830 831 e->e_nsent = 0; 832 e->e_flags |= EF_GLOBALERRS; 833 834 macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid); 835 macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype); 836 didany = false; 837 838 if (!bitset(EF_SPLIT, e->e_flags)) 839 { 840 ENVELOPE *oldsib; 841 ENVELOPE *ee; 842 843 /* 844 ** Save old sibling and set it to NULL to avoid 845 ** queueing up the same envelopes again. 846 ** This requires that envelopes in that list have 847 ** been take care of before (or at some other place). 848 */ 849 850 oldsib = e->e_sibling; 851 e->e_sibling = NULL; 852 if (!split_by_recipient(e) && 853 bitset(EF_FATALERRS, e->e_flags)) 854 { 855 if (OpMode == MD_SMTP || OpMode == MD_DAEMON) 856 e->e_flags |= EF_CLRQUEUE; 857 return; 858 } 859 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling) 860 queueup(ee, false, true); 861 862 /* clean up */ 863 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling) 864 { 865 /* now unlock the job */ 866 closexscript(ee); 867 unlockqueue(ee); 868 869 /* this envelope is marked unused */ 870 if (ee->e_dfp != NULL) 871 { 872 (void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT); 873 ee->e_dfp = NULL; 874 } 875 ee->e_id = NULL; 876 ee->e_flags &= ~EF_HAS_DF; 877 } 878 e->e_sibling = oldsib; 879 } 880 881 /* now run through the queue */ 882 for (q = e->e_sendqueue; q != NULL; q = q->q_next) 883 { 884 #if XDEBUG 885 char wbuf[MAXNAME + 20]; 886 887 (void) sm_snprintf(wbuf, sizeof(wbuf), "sendall(%.*s)", 888 MAXNAME, q->q_paddr); 889 checkfd012(wbuf); 890 #endif /* XDEBUG */ 891 if (mode == SM_VERIFY) 892 { 893 e->e_to = q->q_paddr; 894 if (QS_IS_SENDABLE(q->q_state)) 895 { 896 if (q->q_host != NULL && q->q_host[0] != '\0') 897 message("deliverable: mailer %s, host %s, user %s", 898 q->q_mailer->m_name, 899 q->q_host, 900 q->q_user); 901 else 902 message("deliverable: mailer %s, user %s", 903 q->q_mailer->m_name, 904 q->q_user); 905 } 906 } 907 else if (QS_IS_OK(q->q_state)) 908 { 909 /* 910 ** Checkpoint the send list every few addresses 911 */ 912 913 if (CheckpointInterval > 0 && 914 e->e_nsent >= CheckpointInterval) 915 { 916 queueup(e, false, false); 917 e->e_nsent = 0; 918 } 919 (void) deliver(e, q); 920 didany = true; 921 } 922 } 923 if (didany) 924 { 925 e->e_dtime = curtime(); 926 e->e_ntries++; 927 } 928 929 #if XDEBUG 930 checkfd012("end of sendenvelope"); 931 #endif /* XDEBUG */ 932 } 933 934 #if REQUIRES_DIR_FSYNC 935 /* 936 ** SYNC_DIR -- fsync a directory based on a filename 937 ** 938 ** Parameters: 939 ** filename -- path of file 940 ** panic -- panic? 941 ** 942 ** Returns: 943 ** none 944 */ 945 946 void 947 sync_dir(filename, panic) 948 char *filename; 949 bool panic; 950 { 951 int dirfd; 952 char *dirp; 953 char dir[MAXPATHLEN]; 954 955 if (!RequiresDirfsync) 956 return; 957 958 /* filesystems which require the directory be synced */ 959 dirp = strrchr(filename, '/'); 960 if (dirp != NULL) 961 { 962 if (sm_strlcpy(dir, filename, sizeof(dir)) >= sizeof(dir)) 963 return; 964 dir[dirp - filename] = '\0'; 965 dirp = dir; 966 } 967 else 968 dirp = "."; 969 dirfd = open(dirp, O_RDONLY, 0700); 970 if (tTd(40,32)) 971 sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)", 972 dirp, dirfd); 973 if (dirfd >= 0) 974 { 975 if (fsync(dirfd) < 0) 976 { 977 if (panic) 978 syserr("!sync_dir: cannot fsync directory %s", 979 dirp); 980 else if (LogLevel > 1) 981 sm_syslog(LOG_ERR, NOQID, 982 "sync_dir: cannot fsync directory %s: %s", 983 dirp, sm_errstring(errno)); 984 } 985 (void) close(dirfd); 986 } 987 } 988 #endif /* REQUIRES_DIR_FSYNC */ 989 /* 990 ** DUP_QUEUE_FILE -- duplicate a queue file into a split queue 991 ** 992 ** Parameters: 993 ** e -- the existing envelope 994 ** ee -- the new envelope 995 ** type -- the queue file type (e.g., DATAFL_LETTER) 996 ** 997 ** Returns: 998 ** none 999 */ 1000 1001 static void 1002 dup_queue_file(e, ee, type) 1003 ENVELOPE *e, *ee; 1004 int type; 1005 { 1006 char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN]; 1007 1008 ee->e_dfp = NULL; 1009 ee->e_xfp = NULL; 1010 1011 /* 1012 ** Make sure both are in the same directory. 1013 */ 1014 1015 (void) sm_strlcpy(f1buf, queuename(e, type), sizeof(f1buf)); 1016 (void) sm_strlcpy(f2buf, queuename(ee, type), sizeof(f2buf)); 1017 1018 /* Force the df to disk if it's not there yet */ 1019 if (type == DATAFL_LETTER && e->e_dfp != NULL && 1020 sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 && 1021 errno != EINVAL) 1022 { 1023 syserr("!dup_queue_file: can't commit %s", f1buf); 1024 /* NOTREACHED */ 1025 } 1026 1027 if (link(f1buf, f2buf) < 0) 1028 { 1029 int save_errno = errno; 1030 1031 syserr("sendall: link(%s, %s)", f1buf, f2buf); 1032 if (save_errno == EEXIST) 1033 { 1034 if (unlink(f2buf) < 0) 1035 { 1036 syserr("!sendall: unlink(%s): permanent", 1037 f2buf); 1038 /* NOTREACHED */ 1039 } 1040 if (link(f1buf, f2buf) < 0) 1041 { 1042 syserr("!sendall: link(%s, %s): permanent", 1043 f1buf, f2buf); 1044 /* NOTREACHED */ 1045 } 1046 } 1047 } 1048 SYNC_DIR(f2buf, true); 1049 } 1050 /* 1051 ** DOFORK -- do a fork, retrying a couple of times on failure. 1052 ** 1053 ** This MUST be a macro, since after a vfork we are running 1054 ** two processes on the same stack!!! 1055 ** 1056 ** Parameters: 1057 ** none. 1058 ** 1059 ** Returns: 1060 ** From a macro??? You've got to be kidding! 1061 ** 1062 ** Side Effects: 1063 ** Modifies the ==> LOCAL <== variable 'pid', leaving: 1064 ** pid of child in parent, zero in child. 1065 ** -1 on unrecoverable error. 1066 ** 1067 ** Notes: 1068 ** I'm awfully sorry this looks so awful. That's 1069 ** vfork for you..... 1070 */ 1071 1072 #define NFORKTRIES 5 1073 1074 #ifndef FORK 1075 # define FORK fork 1076 #endif /* ! FORK */ 1077 1078 #define DOFORK(fORKfN) \ 1079 {\ 1080 register int i;\ 1081 \ 1082 for (i = NFORKTRIES; --i >= 0; )\ 1083 {\ 1084 pid = fORKfN();\ 1085 if (pid >= 0)\ 1086 break;\ 1087 if (i > 0)\ 1088 (void) sleep((unsigned) NFORKTRIES - i);\ 1089 }\ 1090 } 1091 /* 1092 ** DOFORK -- simple fork interface to DOFORK. 1093 ** 1094 ** Parameters: 1095 ** none. 1096 ** 1097 ** Returns: 1098 ** pid of child in parent. 1099 ** zero in child. 1100 ** -1 on error. 1101 ** 1102 ** Side Effects: 1103 ** returns twice, once in parent and once in child. 1104 */ 1105 1106 pid_t 1107 dofork() 1108 { 1109 register pid_t pid = -1; 1110 1111 DOFORK(fork); 1112 return pid; 1113 } 1114 1115 /* 1116 ** COLONCMP -- compare host-signatures up to first ':' or EOS 1117 ** 1118 ** This takes two strings which happen to be host-signatures and 1119 ** compares them. If the lowest preference portions of the MX-RR's 1120 ** match (up to ':' or EOS, whichever is first), then we have 1121 ** match. This is used for coattail-piggybacking messages during 1122 ** message delivery. 1123 ** If the signatures are the same up to the first ':' the remainder of 1124 ** the signatures are then compared with a normal strcmp(). This saves 1125 ** re-examining the first part of the signatures. 1126 ** 1127 ** Parameters: 1128 ** a - first host-signature 1129 ** b - second host-signature 1130 ** 1131 ** Returns: 1132 ** HS_MATCH_NO -- no "match". 1133 ** HS_MATCH_FIRST -- "match" for the first MX preference 1134 ** (up to the first colon (':')). 1135 ** HS_MATCH_FULL -- match for the entire MX record. 1136 ** 1137 ** Side Effects: 1138 ** none. 1139 */ 1140 1141 #define HS_MATCH_NO 0 1142 #define HS_MATCH_FIRST 1 1143 #define HS_MATCH_FULL 2 1144 1145 static int 1146 coloncmp(a, b) 1147 register const char *a; 1148 register const char *b; 1149 { 1150 int ret = HS_MATCH_NO; 1151 int braclev = 0; 1152 1153 while (*a == *b++) 1154 { 1155 /* Need to account for IPv6 bracketed addresses */ 1156 if (*a == '[') 1157 braclev++; 1158 else if (*a == ']' && braclev > 0) 1159 braclev--; 1160 else if (*a == ':' && braclev <= 0) 1161 { 1162 ret = HS_MATCH_FIRST; 1163 a++; 1164 break; 1165 } 1166 else if (*a == '\0') 1167 return HS_MATCH_FULL; /* a full match */ 1168 a++; 1169 } 1170 if (ret == HS_MATCH_NO && 1171 braclev <= 0 && 1172 ((*a == '\0' && *(b - 1) == ':') || 1173 (*a == ':' && *(b - 1) == '\0'))) 1174 return HS_MATCH_FIRST; 1175 if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0) 1176 return HS_MATCH_FULL; 1177 1178 return ret; 1179 } 1180 1181 /* 1182 ** SHOULD_TRY_FBSH -- Should try FallbackSmartHost? 1183 ** 1184 ** Parameters: 1185 ** e -- envelope 1186 ** tried_fallbacksmarthost -- has been tried already? (in/out) 1187 ** hostbuf -- buffer for hostname (expand FallbackSmartHost) (out) 1188 ** hbsz -- size of hostbuf 1189 ** status -- current delivery status 1190 ** 1191 ** Returns: 1192 ** true iff FallbackSmartHost should be tried. 1193 */ 1194 1195 static bool should_try_fbsh __P((ENVELOPE *, bool *, char *, size_t, int)); 1196 1197 static bool 1198 should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status) 1199 ENVELOPE *e; 1200 bool *tried_fallbacksmarthost; 1201 char *hostbuf; 1202 size_t hbsz; 1203 int status; 1204 { 1205 /* 1206 ** If the host was not found or a temporary failure occurred 1207 ** and a FallbackSmartHost is defined (and we have not yet 1208 ** tried it), then make one last try with it as the host. 1209 */ 1210 1211 if ((status == EX_NOHOST || status == EX_TEMPFAIL) && 1212 FallbackSmartHost != NULL && !*tried_fallbacksmarthost) 1213 { 1214 *tried_fallbacksmarthost = true; 1215 expand(FallbackSmartHost, hostbuf, hbsz, e); 1216 if (!wordinclass(hostbuf, 'w')) 1217 { 1218 if (tTd(11, 1)) 1219 sm_dprintf("one last try with FallbackSmartHost %s\n", 1220 hostbuf); 1221 return true; 1222 } 1223 } 1224 return false; 1225 } 1226 1227 /* 1228 ** DELIVER -- Deliver a message to a list of addresses. 1229 ** 1230 ** This routine delivers to everyone on the same host as the 1231 ** user on the head of the list. It is clever about mailers 1232 ** that don't handle multiple users. It is NOT guaranteed 1233 ** that it will deliver to all these addresses however -- so 1234 ** deliver should be called once for each address on the 1235 ** list. 1236 ** Deliver tries to be as opportunistic as possible about piggybacking 1237 ** messages. Some definitions to make understanding easier follow below. 1238 ** Piggybacking occurs when an existing connection to a mail host can 1239 ** be used to send the same message to more than one recipient at the 1240 ** same time. So "no piggybacking" means one message for one recipient 1241 ** per connection. "Intentional piggybacking" happens when the 1242 ** recipients' host address (not the mail host address) is used to 1243 ** attempt piggybacking. Recipients with the same host address 1244 ** have the same mail host. "Coincidental piggybacking" relies on 1245 ** piggybacking based on all the mail host addresses in the MX-RR. This 1246 ** is "coincidental" in the fact it could not be predicted until the 1247 ** MX Resource Records for the hosts were obtained and examined. For 1248 ** example (preference order and equivalence is important, not values): 1249 ** domain1 IN MX 10 mxhost-A 1250 ** IN MX 20 mxhost-B 1251 ** domain2 IN MX 4 mxhost-A 1252 ** IN MX 8 mxhost-B 1253 ** Domain1 and domain2 can piggyback the same message to mxhost-A or 1254 ** mxhost-B (if mxhost-A cannot be reached). 1255 ** "Coattail piggybacking" relaxes the strictness of "coincidental 1256 ** piggybacking" in the hope that most significant (lowest value) 1257 ** MX preference host(s) can create more piggybacking. For example 1258 ** (again, preference order and equivalence is important, not values): 1259 ** domain3 IN MX 100 mxhost-C 1260 ** IN MX 100 mxhost-D 1261 ** IN MX 200 mxhost-E 1262 ** domain4 IN MX 50 mxhost-C 1263 ** IN MX 50 mxhost-D 1264 ** IN MX 80 mxhost-F 1265 ** A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C 1266 ** is available. Same with mxhost-D because in both RR's the preference 1267 ** value is the same as mxhost-C, respectively. 1268 ** So deliver attempts coattail piggybacking when possible. If the 1269 ** first MX preference level hosts cannot be used then the piggybacking 1270 ** reverts to coincidental piggybacking. Using the above example you 1271 ** cannot deliver to mxhost-F for domain3 regardless of preference value. 1272 ** ("Coattail" from "riding on the coattails of your predecessor" meaning 1273 ** gaining benefit from a predecessor effort with no or little addition 1274 ** effort. The predecessor here being the preceding MX RR). 1275 ** 1276 ** Parameters: 1277 ** e -- the envelope to deliver. 1278 ** firstto -- head of the address list to deliver to. 1279 ** 1280 ** Returns: 1281 ** zero -- successfully delivered. 1282 ** else -- some failure, see ExitStat for more info. 1283 ** 1284 ** Side Effects: 1285 ** The standard input is passed off to someone. 1286 */ 1287 1288 static int 1289 deliver(e, firstto) 1290 register ENVELOPE *e; 1291 ADDRESS *firstto; 1292 { 1293 char *host; /* host being sent to */ 1294 char *user; /* user being sent to */ 1295 char **pvp; 1296 register char **mvp; 1297 register char *p; 1298 register MAILER *m; /* mailer for this recipient */ 1299 ADDRESS *volatile ctladdr; 1300 #if HASSETUSERCONTEXT 1301 ADDRESS *volatile contextaddr = NULL; 1302 #endif /* HASSETUSERCONTEXT */ 1303 register MCI *volatile mci; 1304 register ADDRESS *SM_NONVOLATILE to = firstto; 1305 volatile bool clever = false; /* running user smtp to this mailer */ 1306 ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */ 1307 int rcode; /* response code */ 1308 SM_NONVOLATILE int lmtp_rcode = EX_OK; 1309 SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */ 1310 SM_NONVOLATILE int hostnum = 0; /* current MX host index */ 1311 char *firstsig; /* signature of firstto */ 1312 volatile pid_t pid = -1; 1313 char *volatile curhost; 1314 SM_NONVOLATILE unsigned short port = 0; 1315 SM_NONVOLATILE time_t enough = 0; 1316 #if NETUNIX 1317 char *SM_NONVOLATILE mux_path = NULL; /* path to UNIX domain socket */ 1318 #endif /* NETUNIX */ 1319 time_t xstart; 1320 bool suidwarn; 1321 bool anyok; /* at least one address was OK */ 1322 SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */ 1323 bool ovr; 1324 bool quarantine; 1325 int strsize; 1326 int rcptcount; 1327 int ret; 1328 static int tobufsize = 0; 1329 static char *tobuf = NULL; 1330 char *rpath; /* translated return path */ 1331 int mpvect[2]; 1332 int rpvect[2]; 1333 char *mxhosts[MAXMXHOSTS + 1]; 1334 char *pv[MAXPV + 1]; 1335 char buf[MAXNAME + 1]; 1336 char cbuf[MAXPATHLEN]; 1337 1338 errno = 0; 1339 SM_REQUIRE(firstto != NULL); /* same as to */ 1340 if (!QS_IS_OK(to->q_state)) 1341 return 0; 1342 1343 suidwarn = geteuid() == 0; 1344 1345 SM_REQUIRE(e != NULL); 1346 m = to->q_mailer; 1347 host = to->q_host; 1348 CurEnv = e; /* just in case */ 1349 e->e_statmsg = NULL; 1350 SmtpError[0] = '\0'; 1351 xstart = curtime(); 1352 1353 if (tTd(10, 1)) 1354 sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n", 1355 e->e_id, m->m_name, host, to->q_user); 1356 if (tTd(10, 100)) 1357 printopenfds(false); 1358 1359 /* 1360 ** Clear {client_*} macros if this is a bounce message to 1361 ** prevent rejection by check_compat ruleset. 1362 */ 1363 1364 if (bitset(EF_RESPONSE, e->e_flags)) 1365 { 1366 macdefine(&e->e_macro, A_PERM, macid("{client_name}"), ""); 1367 macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), ""); 1368 macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), ""); 1369 macdefine(&e->e_macro, A_PERM, macid("{client_port}"), ""); 1370 macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), ""); 1371 } 1372 1373 SM_TRY 1374 { 1375 ADDRESS *skip_back = NULL; 1376 1377 /* 1378 ** Do initial argv setup. 1379 ** Insert the mailer name. Notice that $x expansion is 1380 ** NOT done on the mailer name. Then, if the mailer has 1381 ** a picky -f flag, we insert it as appropriate. This 1382 ** code does not check for 'pv' overflow; this places a 1383 ** manifest lower limit of 4 for MAXPV. 1384 ** The from address rewrite is expected to make 1385 ** the address relative to the other end. 1386 */ 1387 1388 /* rewrite from address, using rewriting rules */ 1389 rcode = EX_OK; 1390 SM_ASSERT(e->e_from.q_mailer != NULL); 1391 if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags)) 1392 p = e->e_sender; 1393 else 1394 p = e->e_from.q_paddr; 1395 rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e); 1396 if (rcode != EX_OK && bitnset(M_xSMTP, m->m_flags)) 1397 goto cleanup; 1398 if (strlen(rpath) > MAXNAME) 1399 { 1400 rpath = shortenstring(rpath, MAXSHORTSTR); 1401 1402 /* avoid bogus errno */ 1403 errno = 0; 1404 syserr("remotename: huge return path %s", rpath); 1405 } 1406 rpath = sm_rpool_strdup_x(e->e_rpool, rpath); 1407 macdefine(&e->e_macro, A_PERM, 'g', rpath); 1408 macdefine(&e->e_macro, A_PERM, 'h', host); 1409 Errors = 0; 1410 pvp = pv; 1411 *pvp++ = m->m_argv[0]; 1412 1413 /* ignore long term host status information if mailer flag W is set */ 1414 if (bitnset(M_NOHOSTSTAT, m->m_flags)) 1415 IgnoreHostStatus = true; 1416 1417 /* insert -f or -r flag as appropriate */ 1418 if (FromFlag && 1419 (bitnset(M_FOPT, m->m_flags) || 1420 bitnset(M_ROPT, m->m_flags))) 1421 { 1422 if (bitnset(M_FOPT, m->m_flags)) 1423 *pvp++ = "-f"; 1424 else 1425 *pvp++ = "-r"; 1426 *pvp++ = rpath; 1427 } 1428 1429 /* 1430 ** Append the other fixed parts of the argv. These run 1431 ** up to the first entry containing "$u". There can only 1432 ** be one of these, and there are only a few more slots 1433 ** in the pv after it. 1434 */ 1435 1436 for (mvp = m->m_argv; (p = *++mvp) != NULL; ) 1437 { 1438 /* can't use strchr here because of sign extension problems */ 1439 while (*p != '\0') 1440 { 1441 if ((*p++ & 0377) == MACROEXPAND) 1442 { 1443 if (*p == 'u') 1444 break; 1445 } 1446 } 1447 1448 if (*p != '\0') 1449 break; 1450 1451 /* this entry is safe -- go ahead and process it */ 1452 expand(*mvp, buf, sizeof(buf), e); 1453 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf); 1454 if (pvp >= &pv[MAXPV - 3]) 1455 { 1456 syserr("554 5.3.5 Too many parameters to %s before $u", 1457 pv[0]); 1458 rcode = -1; 1459 goto cleanup; 1460 } 1461 } 1462 1463 /* 1464 ** If we have no substitution for the user name in the argument 1465 ** list, we know that we must supply the names otherwise -- and 1466 ** SMTP is the answer!! 1467 */ 1468 1469 if (*mvp == NULL) 1470 { 1471 /* running LMTP or SMTP */ 1472 clever = true; 1473 *pvp = NULL; 1474 setbitn(M_xSMTP, m->m_flags); 1475 } 1476 else if (bitnset(M_LMTP, m->m_flags)) 1477 { 1478 /* not running LMTP */ 1479 sm_syslog(LOG_ERR, NULL, 1480 "Warning: mailer %s: LMTP flag (F=z) turned off", 1481 m->m_name); 1482 clrbitn(M_LMTP, m->m_flags); 1483 } 1484 1485 /* 1486 ** At this point *mvp points to the argument with $u. We 1487 ** run through our address list and append all the addresses 1488 ** we can. If we run out of space, do not fret! We can 1489 ** always send another copy later. 1490 */ 1491 1492 e->e_to = NULL; 1493 strsize = 2; 1494 rcptcount = 0; 1495 ctladdr = NULL; 1496 if (firstto->q_signature == NULL) 1497 firstto->q_signature = hostsignature(firstto->q_mailer, 1498 firstto->q_host); 1499 firstsig = firstto->q_signature; 1500 1501 for (; to != NULL; to = to->q_next) 1502 { 1503 /* avoid sending multiple recipients to dumb mailers */ 1504 if (tochain != NULL && !bitnset(M_MUSER, m->m_flags)) 1505 break; 1506 1507 /* if already sent or not for this host, don't send */ 1508 if (!QS_IS_OK(to->q_state)) /* already sent; look at next */ 1509 continue; 1510 1511 /* 1512 ** Must be same mailer to keep grouping rcpts. 1513 ** If mailers don't match: continue; sendqueue is not 1514 ** sorted by mailers, so don't break; 1515 */ 1516 1517 if (to->q_mailer != firstto->q_mailer) 1518 continue; 1519 1520 if (to->q_signature == NULL) /* for safety */ 1521 to->q_signature = hostsignature(to->q_mailer, 1522 to->q_host); 1523 1524 /* 1525 ** This is for coincidental and tailcoat piggybacking messages 1526 ** to the same mail host. While the signatures are identical 1527 ** (that's the MX-RR's are identical) we can do coincidental 1528 ** piggybacking. We try hard for coattail piggybacking 1529 ** with the same mail host when the next recipient has the 1530 ** same host at lowest preference. It may be that this 1531 ** won't work out, so 'skip_back' is maintained if a backup 1532 ** to coincidental piggybacking or full signature must happen. 1533 */ 1534 1535 ret = firstto == to ? HS_MATCH_FULL : 1536 coloncmp(to->q_signature, firstsig); 1537 if (ret == HS_MATCH_FULL) 1538 skip_back = to; 1539 else if (ret == HS_MATCH_NO) 1540 break; 1541 1542 if (!clever) 1543 { 1544 /* avoid overflowing tobuf */ 1545 strsize += strlen(to->q_paddr) + 1; 1546 if (strsize > TOBUFSIZE) 1547 break; 1548 } 1549 1550 if (++rcptcount > to->q_mailer->m_maxrcpt) 1551 break; 1552 1553 if (tTd(10, 1)) 1554 { 1555 sm_dprintf("\nsend to "); 1556 printaddr(sm_debug_file(), to, false); 1557 } 1558 1559 /* compute effective uid/gid when sending */ 1560 if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags)) 1561 # if HASSETUSERCONTEXT 1562 contextaddr = ctladdr = getctladdr(to); 1563 # else /* HASSETUSERCONTEXT */ 1564 ctladdr = getctladdr(to); 1565 # endif /* HASSETUSERCONTEXT */ 1566 1567 if (tTd(10, 2)) 1568 { 1569 sm_dprintf("ctladdr="); 1570 printaddr(sm_debug_file(), ctladdr, false); 1571 } 1572 1573 user = to->q_user; 1574 e->e_to = to->q_paddr; 1575 1576 /* 1577 ** Check to see that these people are allowed to 1578 ** talk to each other. 1579 ** Check also for overflow of e_msgsize. 1580 */ 1581 1582 if (m->m_maxsize != 0 && 1583 (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0)) 1584 { 1585 e->e_flags |= EF_NO_BODY_RETN; 1586 if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags)) 1587 to->q_status = "5.2.3"; 1588 else 1589 to->q_status = "5.3.4"; 1590 1591 /* set to->q_rstatus = NULL; or to the following? */ 1592 usrerrenh(to->q_status, 1593 "552 Message is too large; %ld bytes max", 1594 m->m_maxsize); 1595 markfailure(e, to, NULL, EX_UNAVAILABLE, false); 1596 giveresponse(EX_UNAVAILABLE, to->q_status, m, 1597 NULL, ctladdr, xstart, e, to); 1598 continue; 1599 } 1600 SM_SET_H_ERRNO(0); 1601 ovr = true; 1602 1603 /* do config file checking of compatibility */ 1604 quarantine = (e->e_quarmsg != NULL); 1605 rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr, 1606 e, RSF_RMCOMM|RSF_COUNT, 3, NULL, 1607 e->e_id, NULL, NULL); 1608 if (rcode == EX_OK) 1609 { 1610 /* do in-code checking if not discarding */ 1611 if (!bitset(EF_DISCARD, e->e_flags)) 1612 { 1613 rcode = checkcompat(to, e); 1614 ovr = false; 1615 } 1616 } 1617 if (rcode != EX_OK) 1618 { 1619 markfailure(e, to, NULL, rcode, ovr); 1620 giveresponse(rcode, to->q_status, m, 1621 NULL, ctladdr, xstart, e, to); 1622 continue; 1623 } 1624 if (!quarantine && e->e_quarmsg != NULL) 1625 { 1626 /* 1627 ** check_compat or checkcompat() has tried 1628 ** to quarantine but that isn't supported. 1629 ** Revert the attempt. 1630 */ 1631 1632 e->e_quarmsg = NULL; 1633 macdefine(&e->e_macro, A_PERM, 1634 macid("{quarantine}"), ""); 1635 } 1636 if (bitset(EF_DISCARD, e->e_flags)) 1637 { 1638 if (tTd(10, 5)) 1639 { 1640 sm_dprintf("deliver: discarding recipient "); 1641 printaddr(sm_debug_file(), to, false); 1642 } 1643 1644 /* pretend the message was sent */ 1645 /* XXX should we log something here? */ 1646 to->q_state = QS_DISCARDED; 1647 1648 /* 1649 ** Remove discard bit to prevent discard of 1650 ** future recipients. This is safe because the 1651 ** true "global discard" has been handled before 1652 ** we get here. 1653 */ 1654 1655 e->e_flags &= ~EF_DISCARD; 1656 continue; 1657 } 1658 1659 /* 1660 ** Strip quote bits from names if the mailer is dumb 1661 ** about them. 1662 */ 1663 1664 if (bitnset(M_STRIPQ, m->m_flags)) 1665 { 1666 stripquotes(user); 1667 stripquotes(host); 1668 } 1669 1670 /* 1671 ** Strip all leading backslashes if requested and the 1672 ** next character is alphanumerical (the latter can 1673 ** probably relaxed a bit, see RFC2821). 1674 */ 1675 1676 if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\') 1677 stripbackslash(user); 1678 1679 /* hack attack -- delivermail compatibility */ 1680 if (m == ProgMailer && *user == '|') 1681 user++; 1682 1683 /* 1684 ** If an error message has already been given, don't 1685 ** bother to send to this address. 1686 ** 1687 ** >>>>>>>>>> This clause assumes that the local mailer 1688 ** >> NOTE >> cannot do any further aliasing; that 1689 ** >>>>>>>>>> function is subsumed by sendmail. 1690 */ 1691 1692 if (!QS_IS_OK(to->q_state)) 1693 continue; 1694 1695 /* 1696 ** See if this user name is "special". 1697 ** If the user name has a slash in it, assume that this 1698 ** is a file -- send it off without further ado. Note 1699 ** that this type of addresses is not processed along 1700 ** with the others, so we fudge on the To person. 1701 */ 1702 1703 if (strcmp(m->m_mailer, "[FILE]") == 0) 1704 { 1705 macdefine(&e->e_macro, A_PERM, 'u', user); 1706 p = to->q_home; 1707 if (p == NULL && ctladdr != NULL) 1708 p = ctladdr->q_home; 1709 macdefine(&e->e_macro, A_PERM, 'z', p); 1710 expand(m->m_argv[1], buf, sizeof(buf), e); 1711 if (strlen(buf) > 0) 1712 rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e); 1713 else 1714 { 1715 syserr("empty filename specification for mailer %s", 1716 m->m_name); 1717 rcode = EX_CONFIG; 1718 } 1719 giveresponse(rcode, to->q_status, m, NULL, 1720 ctladdr, xstart, e, to); 1721 markfailure(e, to, NULL, rcode, true); 1722 e->e_nsent++; 1723 if (rcode == EX_OK) 1724 { 1725 to->q_state = QS_SENT; 1726 if (bitnset(M_LOCALMAILER, m->m_flags) && 1727 bitset(QPINGONSUCCESS, to->q_flags)) 1728 { 1729 to->q_flags |= QDELIVERED; 1730 to->q_status = "2.1.5"; 1731 (void) sm_io_fprintf(e->e_xfp, 1732 SM_TIME_DEFAULT, 1733 "%s... Successfully delivered\n", 1734 to->q_paddr); 1735 } 1736 } 1737 to->q_statdate = curtime(); 1738 markstats(e, to, STATS_NORMAL); 1739 continue; 1740 } 1741 1742 /* 1743 ** Address is verified -- add this user to mailer 1744 ** argv, and add it to the print list of recipients. 1745 */ 1746 1747 /* link together the chain of recipients */ 1748 to->q_tchain = tochain; 1749 tochain = to; 1750 e->e_to = "[CHAIN]"; 1751 1752 macdefine(&e->e_macro, A_PERM, 'u', user); /* to user */ 1753 p = to->q_home; 1754 if (p == NULL && ctladdr != NULL) 1755 p = ctladdr->q_home; 1756 macdefine(&e->e_macro, A_PERM, 'z', p); /* user's home */ 1757 1758 /* set the ${dsn_notify} macro if applicable */ 1759 if (bitset(QHASNOTIFY, to->q_flags)) 1760 { 1761 char notify[MAXLINE]; 1762 1763 notify[0] = '\0'; 1764 if (bitset(QPINGONSUCCESS, to->q_flags)) 1765 (void) sm_strlcat(notify, "SUCCESS,", 1766 sizeof(notify)); 1767 if (bitset(QPINGONFAILURE, to->q_flags)) 1768 (void) sm_strlcat(notify, "FAILURE,", 1769 sizeof(notify)); 1770 if (bitset(QPINGONDELAY, to->q_flags)) 1771 (void) sm_strlcat(notify, "DELAY,", 1772 sizeof(notify)); 1773 1774 /* Set to NEVER or drop trailing comma */ 1775 if (notify[0] == '\0') 1776 (void) sm_strlcat(notify, "NEVER", 1777 sizeof(notify)); 1778 else 1779 notify[strlen(notify) - 1] = '\0'; 1780 1781 macdefine(&e->e_macro, A_TEMP, 1782 macid("{dsn_notify}"), notify); 1783 } 1784 else 1785 macdefine(&e->e_macro, A_PERM, 1786 macid("{dsn_notify}"), NULL); 1787 1788 /* 1789 ** Expand out this user into argument list. 1790 */ 1791 1792 if (!clever) 1793 { 1794 expand(*mvp, buf, sizeof(buf), e); 1795 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf); 1796 if (pvp >= &pv[MAXPV - 2]) 1797 { 1798 /* allow some space for trailing parms */ 1799 break; 1800 } 1801 } 1802 } 1803 1804 /* see if any addresses still exist */ 1805 if (tochain == NULL) 1806 { 1807 rcode = 0; 1808 goto cleanup; 1809 } 1810 1811 /* print out messages as full list */ 1812 strsize = 1; 1813 for (to = tochain; to != NULL; to = to->q_tchain) 1814 strsize += strlen(to->q_paddr) + 1; 1815 if (strsize < TOBUFSIZE) 1816 strsize = TOBUFSIZE; 1817 if (strsize > tobufsize) 1818 { 1819 SM_FREE_CLR(tobuf); 1820 tobuf = sm_pmalloc_x(strsize); 1821 tobufsize = strsize; 1822 } 1823 p = tobuf; 1824 *p = '\0'; 1825 for (to = tochain; to != NULL; to = to->q_tchain) 1826 { 1827 (void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2, 1828 ",", to->q_paddr); 1829 p += strlen(p); 1830 } 1831 e->e_to = tobuf + 1; 1832 1833 /* 1834 ** Fill out any parameters after the $u parameter. 1835 */ 1836 1837 if (!clever) 1838 { 1839 while (*++mvp != NULL) 1840 { 1841 expand(*mvp, buf, sizeof(buf), e); 1842 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf); 1843 if (pvp >= &pv[MAXPV]) 1844 syserr("554 5.3.0 deliver: pv overflow after $u for %s", 1845 pv[0]); 1846 } 1847 } 1848 *pvp++ = NULL; 1849 1850 /* 1851 ** Call the mailer. 1852 ** The argument vector gets built, pipes 1853 ** are created as necessary, and we fork & exec as 1854 ** appropriate. 1855 ** If we are running SMTP, we just need to clean up. 1856 */ 1857 1858 /* XXX this seems a bit weird */ 1859 if (ctladdr == NULL && m != ProgMailer && m != FileMailer && 1860 bitset(QGOODUID, e->e_from.q_flags)) 1861 ctladdr = &e->e_from; 1862 1863 #if NAMED_BIND 1864 if (ConfigLevel < 2) 1865 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */ 1866 #endif /* NAMED_BIND */ 1867 1868 if (tTd(11, 1)) 1869 { 1870 sm_dprintf("openmailer:"); 1871 printav(sm_debug_file(), pv); 1872 } 1873 errno = 0; 1874 SM_SET_H_ERRNO(0); 1875 CurHostName = NULL; 1876 1877 /* 1878 ** Deal with the special case of mail handled through an IPC 1879 ** connection. 1880 ** In this case we don't actually fork. We must be 1881 ** running SMTP for this to work. We will return a 1882 ** zero pid to indicate that we are running IPC. 1883 ** We also handle a debug version that just talks to stdin/out. 1884 */ 1885 1886 curhost = NULL; 1887 SmtpPhase = NULL; 1888 mci = NULL; 1889 1890 #if XDEBUG 1891 { 1892 char wbuf[MAXLINE]; 1893 1894 /* make absolutely certain 0, 1, and 2 are in use */ 1895 (void) sm_snprintf(wbuf, sizeof(wbuf), "%s... openmailer(%s)", 1896 shortenstring(e->e_to, MAXSHORTSTR), 1897 m->m_name); 1898 checkfd012(wbuf); 1899 } 1900 #endif /* XDEBUG */ 1901 1902 /* check for 8-bit available */ 1903 if (bitset(EF_HAS8BIT, e->e_flags) && 1904 bitnset(M_7BITS, m->m_flags) && 1905 (bitset(EF_DONT_MIME, e->e_flags) || 1906 !(bitset(MM_MIME8BIT, MimeMode) || 1907 (bitset(EF_IS_MIME, e->e_flags) && 1908 bitset(MM_CVTMIME, MimeMode))))) 1909 { 1910 e->e_status = "5.6.3"; 1911 usrerrenh(e->e_status, 1912 "554 Cannot send 8-bit data to 7-bit destination"); 1913 rcode = EX_DATAERR; 1914 goto give_up; 1915 } 1916 1917 if (tTd(62, 8)) 1918 checkfds("before delivery"); 1919 1920 /* check for Local Person Communication -- not for mortals!!! */ 1921 if (strcmp(m->m_mailer, "[LPC]") == 0) 1922 { 1923 if (clever) 1924 { 1925 /* flush any expired connections */ 1926 (void) mci_scan(NULL); 1927 1928 /* try to get a cached connection or just a slot */ 1929 mci = mci_get(m->m_name, m); 1930 if (mci->mci_host == NULL) 1931 mci->mci_host = m->m_name; 1932 CurHostName = mci->mci_host; 1933 if (mci->mci_state != MCIS_CLOSED) 1934 { 1935 message("Using cached SMTP/LPC connection for %s...", 1936 m->m_name); 1937 mci->mci_deliveries++; 1938 goto do_transfer; 1939 } 1940 } 1941 else 1942 { 1943 mci = mci_new(e->e_rpool); 1944 } 1945 mci->mci_in = smioin; 1946 mci->mci_out = smioout; 1947 mci->mci_mailer = m; 1948 mci->mci_host = m->m_name; 1949 if (clever) 1950 { 1951 mci->mci_state = MCIS_OPENING; 1952 mci_cache(mci); 1953 } 1954 else 1955 mci->mci_state = MCIS_OPEN; 1956 } 1957 else if (strcmp(m->m_mailer, "[IPC]") == 0) 1958 { 1959 register int i; 1960 1961 if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0') 1962 { 1963 syserr("null destination for %s mailer", m->m_mailer); 1964 rcode = EX_CONFIG; 1965 goto give_up; 1966 } 1967 1968 # if NETUNIX 1969 if (strcmp(pv[0], "FILE") == 0) 1970 { 1971 curhost = CurHostName = "localhost"; 1972 mux_path = pv[1]; 1973 } 1974 else 1975 # endif /* NETUNIX */ 1976 { 1977 CurHostName = pv[1]; 1978 curhost = hostsignature(m, pv[1]); 1979 } 1980 1981 if (curhost == NULL || curhost[0] == '\0') 1982 { 1983 syserr("null host signature for %s", pv[1]); 1984 rcode = EX_CONFIG; 1985 goto give_up; 1986 } 1987 1988 if (!clever) 1989 { 1990 syserr("554 5.3.5 non-clever IPC"); 1991 rcode = EX_CONFIG; 1992 goto give_up; 1993 } 1994 if (pv[2] != NULL 1995 # if NETUNIX 1996 && mux_path == NULL 1997 # endif /* NETUNIX */ 1998 ) 1999 { 2000 port = htons((unsigned short) atoi(pv[2])); 2001 if (port == 0) 2002 { 2003 # ifdef NO_GETSERVBYNAME 2004 syserr("Invalid port number: %s", pv[2]); 2005 # else /* NO_GETSERVBYNAME */ 2006 struct servent *sp = getservbyname(pv[2], "tcp"); 2007 2008 if (sp == NULL) 2009 syserr("Service %s unknown", pv[2]); 2010 else 2011 port = sp->s_port; 2012 # endif /* NO_GETSERVBYNAME */ 2013 } 2014 } 2015 2016 nummxhosts = parse_hostsignature(curhost, mxhosts, m); 2017 if (TimeOuts.to_aconnect > 0) 2018 enough = curtime() + TimeOuts.to_aconnect; 2019 tryhost: 2020 while (hostnum < nummxhosts) 2021 { 2022 char sep = ':'; 2023 char *endp; 2024 static char hostbuf[MAXNAME + 1]; 2025 bool tried_fallbacksmarthost = false; 2026 2027 # if NETINET6 2028 if (*mxhosts[hostnum] == '[') 2029 { 2030 endp = strchr(mxhosts[hostnum] + 1, ']'); 2031 if (endp != NULL) 2032 endp = strpbrk(endp + 1, ":,"); 2033 } 2034 else 2035 endp = strpbrk(mxhosts[hostnum], ":,"); 2036 # else /* NETINET6 */ 2037 endp = strpbrk(mxhosts[hostnum], ":,"); 2038 # endif /* NETINET6 */ 2039 if (endp != NULL) 2040 { 2041 sep = *endp; 2042 *endp = '\0'; 2043 } 2044 2045 if (hostnum == 1 && skip_back != NULL) 2046 { 2047 /* 2048 ** Coattail piggybacking is no longer an 2049 ** option with the mail host next to be tried 2050 ** no longer the lowest MX preference 2051 ** (hostnum == 1 meaning we're on the second 2052 ** preference). We do not try to coattail 2053 ** piggyback more than the first MX preference. 2054 ** Revert 'tochain' to last location for 2055 ** coincidental piggybacking. This works this 2056 ** easily because the q_tchain kept getting 2057 ** added to the top of the linked list. 2058 */ 2059 2060 tochain = skip_back; 2061 } 2062 2063 if (*mxhosts[hostnum] == '\0') 2064 { 2065 syserr("deliver: null host name in signature"); 2066 hostnum++; 2067 if (endp != NULL) 2068 *endp = sep; 2069 continue; 2070 } 2071 (void) sm_strlcpy(hostbuf, mxhosts[hostnum], 2072 sizeof(hostbuf)); 2073 hostnum++; 2074 if (endp != NULL) 2075 *endp = sep; 2076 2077 one_last_try: 2078 /* see if we already know that this host is fried */ 2079 CurHostName = hostbuf; 2080 mci = mci_get(hostbuf, m); 2081 if (mci->mci_state != MCIS_CLOSED) 2082 { 2083 char *type; 2084 2085 if (tTd(11, 1)) 2086 { 2087 sm_dprintf("openmailer: "); 2088 mci_dump(sm_debug_file(), mci, false); 2089 } 2090 CurHostName = mci->mci_host; 2091 if (bitnset(M_LMTP, m->m_flags)) 2092 type = "L"; 2093 else if (bitset(MCIF_ESMTP, mci->mci_flags)) 2094 type = "ES"; 2095 else 2096 type = "S"; 2097 message("Using cached %sMTP connection to %s via %s...", 2098 type, hostbuf, m->m_name); 2099 mci->mci_deliveries++; 2100 break; 2101 } 2102 mci->mci_mailer = m; 2103 if (mci->mci_exitstat != EX_OK) 2104 { 2105 if (mci->mci_exitstat == EX_TEMPFAIL) 2106 goodmxfound = true; 2107 2108 /* Try FallbackSmartHost? */ 2109 if (should_try_fbsh(e, &tried_fallbacksmarthost, 2110 hostbuf, sizeof(hostbuf), 2111 mci->mci_exitstat)) 2112 goto one_last_try; 2113 2114 continue; 2115 } 2116 2117 if (mci_lock_host(mci) != EX_OK) 2118 { 2119 mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL); 2120 goodmxfound = true; 2121 continue; 2122 } 2123 2124 /* try the connection */ 2125 sm_setproctitle(true, e, "%s %s: %s", 2126 qid_printname(e), 2127 hostbuf, "user open"); 2128 # if NETUNIX 2129 if (mux_path != NULL) 2130 { 2131 message("Connecting to %s via %s...", 2132 mux_path, m->m_name); 2133 i = makeconnection_ds((char *) mux_path, mci); 2134 } 2135 else 2136 # endif /* NETUNIX */ 2137 { 2138 if (port == 0) 2139 message("Connecting to %s via %s...", 2140 hostbuf, m->m_name); 2141 else 2142 message("Connecting to %s port %d via %s...", 2143 hostbuf, ntohs(port), 2144 m->m_name); 2145 i = makeconnection(hostbuf, port, mci, e, 2146 enough); 2147 } 2148 mci->mci_errno = errno; 2149 mci->mci_lastuse = curtime(); 2150 mci->mci_deliveries = 0; 2151 mci->mci_exitstat = i; 2152 mci_clr_extensions(mci); 2153 # if NAMED_BIND 2154 mci->mci_herrno = h_errno; 2155 # endif /* NAMED_BIND */ 2156 2157 /* 2158 ** Have we tried long enough to get a connection? 2159 ** If yes, skip to the fallback MX hosts 2160 ** (if existent). 2161 */ 2162 2163 if (enough > 0 && mci->mci_lastuse >= enough) 2164 { 2165 int h; 2166 # if NAMED_BIND 2167 extern int NumFallbackMXHosts; 2168 # else /* NAMED_BIND */ 2169 const int NumFallbackMXHosts = 0; 2170 # endif /* NAMED_BIND */ 2171 2172 if (hostnum < nummxhosts && LogLevel > 9) 2173 sm_syslog(LOG_INFO, e->e_id, 2174 "Timeout.to_aconnect occurred before exhausting all addresses"); 2175 2176 /* turn off timeout if fallback available */ 2177 if (NumFallbackMXHosts > 0) 2178 enough = 0; 2179 2180 /* skip to a fallback MX host */ 2181 h = nummxhosts - NumFallbackMXHosts; 2182 if (hostnum < h) 2183 hostnum = h; 2184 } 2185 if (i == EX_OK) 2186 { 2187 goodmxfound = true; 2188 markstats(e, firstto, STATS_CONNECT); 2189 mci->mci_state = MCIS_OPENING; 2190 mci_cache(mci); 2191 if (TrafficLogFile != NULL) 2192 (void) sm_io_fprintf(TrafficLogFile, 2193 SM_TIME_DEFAULT, 2194 "%05d === CONNECT %s\n", 2195 (int) CurrentPid, 2196 hostbuf); 2197 break; 2198 } 2199 else 2200 { 2201 /* Try FallbackSmartHost? */ 2202 if (should_try_fbsh(e, &tried_fallbacksmarthost, 2203 hostbuf, sizeof(hostbuf), i)) 2204 goto one_last_try; 2205 2206 if (tTd(11, 1)) 2207 sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n", 2208 i, errno); 2209 if (i == EX_TEMPFAIL) 2210 goodmxfound = true; 2211 mci_unlock_host(mci); 2212 } 2213 2214 /* enter status of this host */ 2215 setstat(i); 2216 2217 /* should print some message here for -v mode */ 2218 } 2219 if (mci == NULL) 2220 { 2221 syserr("deliver: no host name"); 2222 rcode = EX_SOFTWARE; 2223 goto give_up; 2224 } 2225 mci->mci_pid = 0; 2226 } 2227 else 2228 { 2229 /* flush any expired connections */ 2230 (void) mci_scan(NULL); 2231 mci = NULL; 2232 2233 if (bitnset(M_LMTP, m->m_flags)) 2234 { 2235 /* try to get a cached connection */ 2236 mci = mci_get(m->m_name, m); 2237 if (mci->mci_host == NULL) 2238 mci->mci_host = m->m_name; 2239 CurHostName = mci->mci_host; 2240 if (mci->mci_state != MCIS_CLOSED) 2241 { 2242 message("Using cached LMTP connection for %s...", 2243 m->m_name); 2244 mci->mci_deliveries++; 2245 goto do_transfer; 2246 } 2247 } 2248 2249 /* announce the connection to verbose listeners */ 2250 if (host == NULL || host[0] == '\0') 2251 message("Connecting to %s...", m->m_name); 2252 else 2253 message("Connecting to %s via %s...", host, m->m_name); 2254 if (TrafficLogFile != NULL) 2255 { 2256 char **av; 2257 2258 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT, 2259 "%05d === EXEC", (int) CurrentPid); 2260 for (av = pv; *av != NULL; av++) 2261 (void) sm_io_fprintf(TrafficLogFile, 2262 SM_TIME_DEFAULT, " %s", 2263 *av); 2264 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT, 2265 "\n"); 2266 } 2267 2268 #if XDEBUG 2269 checkfd012("before creating mail pipe"); 2270 #endif /* XDEBUG */ 2271 2272 /* create a pipe to shove the mail through */ 2273 if (pipe(mpvect) < 0) 2274 { 2275 syserr("%s... openmailer(%s): pipe (to mailer)", 2276 shortenstring(e->e_to, MAXSHORTSTR), m->m_name); 2277 if (tTd(11, 1)) 2278 sm_dprintf("openmailer: NULL\n"); 2279 rcode = EX_OSERR; 2280 goto give_up; 2281 } 2282 2283 #if XDEBUG 2284 /* make sure we didn't get one of the standard I/O files */ 2285 if (mpvect[0] < 3 || mpvect[1] < 3) 2286 { 2287 syserr("%s... openmailer(%s): bogus mpvect %d %d", 2288 shortenstring(e->e_to, MAXSHORTSTR), m->m_name, 2289 mpvect[0], mpvect[1]); 2290 printopenfds(true); 2291 if (tTd(11, 1)) 2292 sm_dprintf("openmailer: NULL\n"); 2293 rcode = EX_OSERR; 2294 goto give_up; 2295 } 2296 2297 /* make sure system call isn't dead meat */ 2298 checkfdopen(mpvect[0], "mpvect[0]"); 2299 checkfdopen(mpvect[1], "mpvect[1]"); 2300 if (mpvect[0] == mpvect[1] || 2301 (e->e_lockfp != NULL && 2302 (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, 2303 NULL) || 2304 mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, 2305 NULL)))) 2306 { 2307 if (e->e_lockfp == NULL) 2308 syserr("%s... openmailer(%s): overlapping mpvect %d %d", 2309 shortenstring(e->e_to, MAXSHORTSTR), 2310 m->m_name, mpvect[0], mpvect[1]); 2311 else 2312 syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d", 2313 shortenstring(e->e_to, MAXSHORTSTR), 2314 m->m_name, mpvect[0], mpvect[1], 2315 sm_io_getinfo(e->e_lockfp, 2316 SM_IO_WHAT_FD, NULL)); 2317 } 2318 #endif /* XDEBUG */ 2319 2320 /* create a return pipe */ 2321 if (pipe(rpvect) < 0) 2322 { 2323 syserr("%s... openmailer(%s): pipe (from mailer)", 2324 shortenstring(e->e_to, MAXSHORTSTR), 2325 m->m_name); 2326 (void) close(mpvect[0]); 2327 (void) close(mpvect[1]); 2328 if (tTd(11, 1)) 2329 sm_dprintf("openmailer: NULL\n"); 2330 rcode = EX_OSERR; 2331 goto give_up; 2332 } 2333 #if XDEBUG 2334 checkfdopen(rpvect[0], "rpvect[0]"); 2335 checkfdopen(rpvect[1], "rpvect[1]"); 2336 #endif /* XDEBUG */ 2337 2338 /* 2339 ** Actually fork the mailer process. 2340 ** DOFORK is clever about retrying. 2341 ** 2342 ** Dispose of SIGCHLD signal catchers that may be laying 2343 ** around so that endmailer will get it. 2344 */ 2345 2346 if (e->e_xfp != NULL) /* for debugging */ 2347 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 2348 (void) sm_io_flush(smioout, SM_TIME_DEFAULT); 2349 (void) sm_signal(SIGCHLD, SIG_DFL); 2350 2351 2352 DOFORK(FORK); 2353 /* pid is set by DOFORK */ 2354 2355 if (pid < 0) 2356 { 2357 /* failure */ 2358 syserr("%s... openmailer(%s): cannot fork", 2359 shortenstring(e->e_to, MAXSHORTSTR), m->m_name); 2360 (void) close(mpvect[0]); 2361 (void) close(mpvect[1]); 2362 (void) close(rpvect[0]); 2363 (void) close(rpvect[1]); 2364 if (tTd(11, 1)) 2365 sm_dprintf("openmailer: NULL\n"); 2366 rcode = EX_OSERR; 2367 goto give_up; 2368 } 2369 else if (pid == 0) 2370 { 2371 int save_errno; 2372 int sff; 2373 int new_euid = NO_UID; 2374 int new_ruid = NO_UID; 2375 int new_gid = NO_GID; 2376 char *user = NULL; 2377 struct stat stb; 2378 extern int DtableSize; 2379 2380 CurrentPid = getpid(); 2381 2382 /* clear the events to turn off SIGALRMs */ 2383 sm_clear_events(); 2384 2385 /* Reset global flags */ 2386 RestartRequest = NULL; 2387 RestartWorkGroup = false; 2388 ShutdownRequest = NULL; 2389 PendingSignal = 0; 2390 2391 if (e->e_lockfp != NULL) 2392 (void) close(sm_io_getinfo(e->e_lockfp, 2393 SM_IO_WHAT_FD, 2394 NULL)); 2395 2396 /* child -- set up input & exec mailer */ 2397 (void) sm_signal(SIGALRM, sm_signal_noop); 2398 (void) sm_signal(SIGCHLD, SIG_DFL); 2399 (void) sm_signal(SIGHUP, SIG_IGN); 2400 (void) sm_signal(SIGINT, SIG_IGN); 2401 (void) sm_signal(SIGTERM, SIG_DFL); 2402 # ifdef SIGUSR1 2403 (void) sm_signal(SIGUSR1, sm_signal_noop); 2404 # endif /* SIGUSR1 */ 2405 2406 if (m != FileMailer || stat(tochain->q_user, &stb) < 0) 2407 stb.st_mode = 0; 2408 2409 # if HASSETUSERCONTEXT 2410 /* 2411 ** Set user resources. 2412 */ 2413 2414 if (contextaddr != NULL) 2415 { 2416 int sucflags; 2417 struct passwd *pwd; 2418 2419 if (contextaddr->q_ruser != NULL) 2420 pwd = sm_getpwnam(contextaddr->q_ruser); 2421 else 2422 pwd = sm_getpwnam(contextaddr->q_user); 2423 sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY; 2424 #ifdef LOGIN_SETCPUMASK 2425 sucflags |= LOGIN_SETCPUMASK; 2426 #endif /* LOGIN_SETCPUMASK */ 2427 #ifdef LOGIN_SETLOGINCLASS 2428 sucflags |= LOGIN_SETLOGINCLASS; 2429 #endif /* LOGIN_SETLOGINCLASS */ 2430 #ifdef LOGIN_SETMAC 2431 sucflags |= LOGIN_SETMAC; 2432 #endif /* LOGIN_SETMAC */ 2433 if (pwd != NULL && 2434 setusercontext(NULL, pwd, pwd->pw_uid, 2435 sucflags) == -1 && 2436 suidwarn) 2437 { 2438 syserr("openmailer: setusercontext() failed"); 2439 exit(EX_TEMPFAIL); 2440 } 2441 } 2442 # endif /* HASSETUSERCONTEXT */ 2443 2444 #if HASNICE 2445 /* tweak niceness */ 2446 if (m->m_nice != 0) 2447 (void) nice(m->m_nice); 2448 #endif /* HASNICE */ 2449 2450 /* reset group id */ 2451 if (bitnset(M_SPECIFIC_UID, m->m_flags)) 2452 { 2453 if (m->m_gid == NO_GID) 2454 new_gid = RunAsGid; 2455 else 2456 new_gid = m->m_gid; 2457 } 2458 else if (bitset(S_ISGID, stb.st_mode)) 2459 new_gid = stb.st_gid; 2460 else if (ctladdr != NULL && ctladdr->q_gid != 0) 2461 { 2462 if (!DontInitGroups) 2463 { 2464 user = ctladdr->q_ruser; 2465 if (user == NULL) 2466 user = ctladdr->q_user; 2467 2468 if (initgroups(user, 2469 ctladdr->q_gid) == -1 2470 && suidwarn) 2471 { 2472 syserr("openmailer: initgroups(%s, %ld) failed", 2473 user, (long) ctladdr->q_gid); 2474 exit(EX_TEMPFAIL); 2475 } 2476 } 2477 else 2478 { 2479 GIDSET_T gidset[1]; 2480 2481 gidset[0] = ctladdr->q_gid; 2482 if (setgroups(1, gidset) == -1 2483 && suidwarn) 2484 { 2485 syserr("openmailer: setgroups() failed"); 2486 exit(EX_TEMPFAIL); 2487 } 2488 } 2489 new_gid = ctladdr->q_gid; 2490 } 2491 else 2492 { 2493 if (!DontInitGroups) 2494 { 2495 user = DefUser; 2496 if (initgroups(DefUser, DefGid) == -1 && 2497 suidwarn) 2498 { 2499 syserr("openmailer: initgroups(%s, %ld) failed", 2500 DefUser, (long) DefGid); 2501 exit(EX_TEMPFAIL); 2502 } 2503 } 2504 else 2505 { 2506 GIDSET_T gidset[1]; 2507 2508 gidset[0] = DefGid; 2509 if (setgroups(1, gidset) == -1 2510 && suidwarn) 2511 { 2512 syserr("openmailer: setgroups() failed"); 2513 exit(EX_TEMPFAIL); 2514 } 2515 } 2516 if (m->m_gid == NO_GID) 2517 new_gid = DefGid; 2518 else 2519 new_gid = m->m_gid; 2520 } 2521 if (new_gid != NO_GID) 2522 { 2523 if (RunAsUid != 0 && 2524 bitnset(M_SPECIFIC_UID, m->m_flags) && 2525 new_gid != getgid() && 2526 new_gid != getegid()) 2527 { 2528 /* Only root can change the gid */ 2529 syserr("openmailer: insufficient privileges to change gid, RunAsUid=%ld, new_gid=%ld, gid=%ld, egid=%ld", 2530 (long) RunAsUid, (long) new_gid, 2531 (long) getgid(), (long) getegid()); 2532 exit(EX_TEMPFAIL); 2533 } 2534 2535 if (setgid(new_gid) < 0 && suidwarn) 2536 { 2537 syserr("openmailer: setgid(%ld) failed", 2538 (long) new_gid); 2539 exit(EX_TEMPFAIL); 2540 } 2541 } 2542 2543 /* change root to some "safe" directory */ 2544 if (m->m_rootdir != NULL) 2545 { 2546 expand(m->m_rootdir, cbuf, sizeof(cbuf), e); 2547 if (tTd(11, 20)) 2548 sm_dprintf("openmailer: chroot %s\n", 2549 cbuf); 2550 if (chroot(cbuf) < 0) 2551 { 2552 syserr("openmailer: Cannot chroot(%s)", 2553 cbuf); 2554 exit(EX_TEMPFAIL); 2555 } 2556 if (chdir("/") < 0) 2557 { 2558 syserr("openmailer: cannot chdir(/)"); 2559 exit(EX_TEMPFAIL); 2560 } 2561 } 2562 2563 /* reset user id */ 2564 endpwent(); 2565 sm_mbdb_terminate(); 2566 if (bitnset(M_SPECIFIC_UID, m->m_flags)) 2567 { 2568 if (m->m_uid == NO_UID) 2569 new_euid = RunAsUid; 2570 else 2571 new_euid = m->m_uid; 2572 2573 /* 2574 ** Undo the effects of the uid change in main 2575 ** for signal handling. The real uid may 2576 ** be used by mailer in adding a "From " 2577 ** line. 2578 */ 2579 2580 if (RealUid != 0 && RealUid != getuid()) 2581 { 2582 # if MAILER_SETUID_METHOD == USE_SETEUID 2583 # if HASSETREUID 2584 if (setreuid(RealUid, geteuid()) < 0) 2585 { 2586 syserr("openmailer: setreuid(%d, %d) failed", 2587 (int) RealUid, (int) geteuid()); 2588 exit(EX_OSERR); 2589 } 2590 # endif /* HASSETREUID */ 2591 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */ 2592 # if MAILER_SETUID_METHOD == USE_SETREUID 2593 new_ruid = RealUid; 2594 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */ 2595 } 2596 } 2597 else if (bitset(S_ISUID, stb.st_mode)) 2598 new_ruid = stb.st_uid; 2599 else if (ctladdr != NULL && ctladdr->q_uid != 0) 2600 new_ruid = ctladdr->q_uid; 2601 else if (m->m_uid != NO_UID) 2602 new_ruid = m->m_uid; 2603 else 2604 new_ruid = DefUid; 2605 2606 # if _FFR_USE_SETLOGIN 2607 /* run disconnected from terminal and set login name */ 2608 if (setsid() >= 0 && 2609 ctladdr != NULL && ctladdr->q_uid != 0 && 2610 new_euid == ctladdr->q_uid) 2611 { 2612 struct passwd *pwd; 2613 2614 pwd = sm_getpwuid(ctladdr->q_uid); 2615 if (pwd != NULL && suidwarn) 2616 (void) setlogin(pwd->pw_name); 2617 endpwent(); 2618 } 2619 # endif /* _FFR_USE_SETLOGIN */ 2620 2621 if (new_euid != NO_UID) 2622 { 2623 if (RunAsUid != 0 && new_euid != RunAsUid) 2624 { 2625 /* Only root can change the uid */ 2626 syserr("openmailer: insufficient privileges to change uid, new_euid=%ld, RunAsUid=%ld", 2627 (long) new_euid, (long) RunAsUid); 2628 exit(EX_TEMPFAIL); 2629 } 2630 2631 vendor_set_uid(new_euid); 2632 # if MAILER_SETUID_METHOD == USE_SETEUID 2633 if (seteuid(new_euid) < 0 && suidwarn) 2634 { 2635 syserr("openmailer: seteuid(%ld) failed", 2636 (long) new_euid); 2637 exit(EX_TEMPFAIL); 2638 } 2639 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */ 2640 # if MAILER_SETUID_METHOD == USE_SETREUID 2641 if (setreuid(new_ruid, new_euid) < 0 && suidwarn) 2642 { 2643 syserr("openmailer: setreuid(%ld, %ld) failed", 2644 (long) new_ruid, (long) new_euid); 2645 exit(EX_TEMPFAIL); 2646 } 2647 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */ 2648 # if MAILER_SETUID_METHOD == USE_SETUID 2649 if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn) 2650 { 2651 syserr("openmailer: setuid(%ld) failed", 2652 (long) new_euid); 2653 exit(EX_TEMPFAIL); 2654 } 2655 # endif /* MAILER_SETUID_METHOD == USE_SETUID */ 2656 } 2657 else if (new_ruid != NO_UID) 2658 { 2659 vendor_set_uid(new_ruid); 2660 if (setuid(new_ruid) < 0 && suidwarn) 2661 { 2662 syserr("openmailer: setuid(%ld) failed", 2663 (long) new_ruid); 2664 exit(EX_TEMPFAIL); 2665 } 2666 } 2667 2668 if (tTd(11, 2)) 2669 sm_dprintf("openmailer: running as r/euid=%ld/%ld, r/egid=%ld/%ld\n", 2670 (long) getuid(), (long) geteuid(), 2671 (long) getgid(), (long) getegid()); 2672 2673 /* move into some "safe" directory */ 2674 if (m->m_execdir != NULL) 2675 { 2676 char *q; 2677 2678 for (p = m->m_execdir; p != NULL; p = q) 2679 { 2680 q = strchr(p, ':'); 2681 if (q != NULL) 2682 *q = '\0'; 2683 expand(p, cbuf, sizeof(cbuf), e); 2684 if (q != NULL) 2685 *q++ = ':'; 2686 if (tTd(11, 20)) 2687 sm_dprintf("openmailer: trydir %s\n", 2688 cbuf); 2689 if (cbuf[0] != '\0' && 2690 chdir(cbuf) >= 0) 2691 break; 2692 } 2693 } 2694 2695 /* Check safety of program to be run */ 2696 sff = SFF_ROOTOK|SFF_EXECOK; 2697 if (!bitnset(DBS_RUNWRITABLEPROGRAM, 2698 DontBlameSendmail)) 2699 sff |= SFF_NOGWFILES|SFF_NOWWFILES; 2700 if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH, 2701 DontBlameSendmail)) 2702 sff |= SFF_NOPATHCHECK; 2703 else 2704 sff |= SFF_SAFEDIRPATH; 2705 ret = safefile(m->m_mailer, getuid(), getgid(), 2706 user, sff, 0, NULL); 2707 if (ret != 0) 2708 sm_syslog(LOG_INFO, e->e_id, 2709 "Warning: program %s unsafe: %s", 2710 m->m_mailer, sm_errstring(ret)); 2711 2712 /* arrange to filter std & diag output of command */ 2713 (void) close(rpvect[0]); 2714 if (dup2(rpvect[1], STDOUT_FILENO) < 0) 2715 { 2716 syserr("%s... openmailer(%s): cannot dup pipe %d for stdout", 2717 shortenstring(e->e_to, MAXSHORTSTR), 2718 m->m_name, rpvect[1]); 2719 _exit(EX_OSERR); 2720 } 2721 (void) close(rpvect[1]); 2722 2723 if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0) 2724 { 2725 syserr("%s... openmailer(%s): cannot dup stdout for stderr", 2726 shortenstring(e->e_to, MAXSHORTSTR), 2727 m->m_name); 2728 _exit(EX_OSERR); 2729 } 2730 2731 /* arrange to get standard input */ 2732 (void) close(mpvect[1]); 2733 if (dup2(mpvect[0], STDIN_FILENO) < 0) 2734 { 2735 syserr("%s... openmailer(%s): cannot dup pipe %d for stdin", 2736 shortenstring(e->e_to, MAXSHORTSTR), 2737 m->m_name, mpvect[0]); 2738 _exit(EX_OSERR); 2739 } 2740 (void) close(mpvect[0]); 2741 2742 /* arrange for all the files to be closed */ 2743 sm_close_on_exec(STDERR_FILENO + 1, DtableSize); 2744 2745 # if !_FFR_USE_SETLOGIN 2746 /* run disconnected from terminal */ 2747 (void) setsid(); 2748 # endif /* !_FFR_USE_SETLOGIN */ 2749 2750 /* try to execute the mailer */ 2751 (void) execve(m->m_mailer, (ARGV_T) pv, 2752 (ARGV_T) UserEnviron); 2753 save_errno = errno; 2754 syserr("Cannot exec %s", m->m_mailer); 2755 if (bitnset(M_LOCALMAILER, m->m_flags) || 2756 transienterror(save_errno)) 2757 _exit(EX_OSERR); 2758 _exit(EX_UNAVAILABLE); 2759 } 2760 2761 /* 2762 ** Set up return value. 2763 */ 2764 2765 if (mci == NULL) 2766 { 2767 if (clever) 2768 { 2769 /* 2770 ** Allocate from general heap, not 2771 ** envelope rpool, because this mci 2772 ** is going to be cached. 2773 */ 2774 2775 mci = mci_new(NULL); 2776 } 2777 else 2778 { 2779 /* 2780 ** Prevent a storage leak by allocating 2781 ** this from the envelope rpool. 2782 */ 2783 2784 mci = mci_new(e->e_rpool); 2785 } 2786 } 2787 mci->mci_mailer = m; 2788 if (clever) 2789 { 2790 mci->mci_state = MCIS_OPENING; 2791 mci_cache(mci); 2792 } 2793 else 2794 { 2795 mci->mci_state = MCIS_OPEN; 2796 } 2797 mci->mci_pid = pid; 2798 (void) close(mpvect[0]); 2799 mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2800 (void *) &(mpvect[1]), SM_IO_WRONLY_B, 2801 NULL); 2802 if (mci->mci_out == NULL) 2803 { 2804 syserr("deliver: cannot create mailer output channel, fd=%d", 2805 mpvect[1]); 2806 (void) close(mpvect[1]); 2807 (void) close(rpvect[0]); 2808 (void) close(rpvect[1]); 2809 rcode = EX_OSERR; 2810 goto give_up; 2811 } 2812 2813 (void) close(rpvect[1]); 2814 mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT, 2815 (void *) &(rpvect[0]), SM_IO_RDONLY_B, 2816 NULL); 2817 if (mci->mci_in == NULL) 2818 { 2819 syserr("deliver: cannot create mailer input channel, fd=%d", 2820 mpvect[1]); 2821 (void) close(rpvect[0]); 2822 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 2823 mci->mci_out = NULL; 2824 rcode = EX_OSERR; 2825 goto give_up; 2826 } 2827 } 2828 2829 /* 2830 ** If we are in SMTP opening state, send initial protocol. 2831 */ 2832 2833 if (bitnset(M_7BITS, m->m_flags) && 2834 (!clever || mci->mci_state == MCIS_OPENING)) 2835 mci->mci_flags |= MCIF_7BIT; 2836 if (clever && mci->mci_state != MCIS_CLOSED) 2837 { 2838 # if STARTTLS || SASL 2839 int dotpos; 2840 char *srvname; 2841 extern SOCKADDR CurHostAddr; 2842 # endif /* STARTTLS || SASL */ 2843 2844 # if SASL 2845 # define DONE_AUTH(f) bitset(MCIF_AUTHACT, f) 2846 # endif /* SASL */ 2847 # if STARTTLS 2848 # define DONE_STARTTLS(f) bitset(MCIF_TLSACT, f) 2849 # endif /* STARTTLS */ 2850 # define ONLY_HELO(f) bitset(MCIF_ONLY_EHLO, f) 2851 # define SET_HELO(f) f |= MCIF_ONLY_EHLO 2852 # define CLR_HELO(f) f &= ~MCIF_ONLY_EHLO 2853 2854 # if STARTTLS || SASL 2855 /* don't use CurHostName, it is changed in many places */ 2856 if (mci->mci_host != NULL) 2857 { 2858 srvname = mci->mci_host; 2859 dotpos = strlen(srvname) - 1; 2860 if (dotpos >= 0) 2861 { 2862 if (srvname[dotpos] == '.') 2863 srvname[dotpos] = '\0'; 2864 else 2865 dotpos = -1; 2866 } 2867 } 2868 else if (mci->mci_mailer != NULL) 2869 { 2870 srvname = mci->mci_mailer->m_name; 2871 dotpos = -1; 2872 } 2873 else 2874 { 2875 srvname = "local"; 2876 dotpos = -1; 2877 } 2878 2879 /* don't set {server_name} to NULL or "": see getauth() */ 2880 macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"), 2881 srvname); 2882 2883 /* CurHostAddr is set by makeconnection() and mci_get() */ 2884 if (CurHostAddr.sa.sa_family != 0) 2885 { 2886 macdefine(&mci->mci_macro, A_TEMP, 2887 macid("{server_addr}"), 2888 anynet_ntoa(&CurHostAddr)); 2889 } 2890 else if (mci->mci_mailer != NULL) 2891 { 2892 /* mailer name is unique, use it as address */ 2893 macdefine(&mci->mci_macro, A_PERM, 2894 macid("{server_addr}"), 2895 mci->mci_mailer->m_name); 2896 } 2897 else 2898 { 2899 /* don't set it to NULL or "": see getauth() */ 2900 macdefine(&mci->mci_macro, A_PERM, 2901 macid("{server_addr}"), "0"); 2902 } 2903 2904 /* undo change of srvname (mci->mci_host) */ 2905 if (dotpos >= 0) 2906 srvname[dotpos] = '.'; 2907 2908 reconnect: /* after switching to an encrypted connection */ 2909 # endif /* STARTTLS || SASL */ 2910 2911 /* set the current connection information */ 2912 e->e_mci = mci; 2913 # if SASL 2914 mci->mci_saslcap = NULL; 2915 # endif /* SASL */ 2916 smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags)); 2917 CLR_HELO(mci->mci_flags); 2918 2919 if (IS_DLVR_RETURN(e)) 2920 { 2921 /* 2922 ** Check whether other side can deliver e-mail 2923 ** fast enough 2924 */ 2925 2926 if (!bitset(MCIF_DLVR_BY, mci->mci_flags)) 2927 { 2928 e->e_status = "5.4.7"; 2929 usrerrenh(e->e_status, 2930 "554 Server does not support Deliver By"); 2931 rcode = EX_UNAVAILABLE; 2932 goto give_up; 2933 } 2934 if (e->e_deliver_by > 0 && 2935 e->e_deliver_by - (curtime() - e->e_ctime) < 2936 mci->mci_min_by) 2937 { 2938 e->e_status = "5.4.7"; 2939 usrerrenh(e->e_status, 2940 "554 Message can't be delivered in time; %ld < %ld", 2941 e->e_deliver_by - (curtime() - e->e_ctime), 2942 mci->mci_min_by); 2943 rcode = EX_UNAVAILABLE; 2944 goto give_up; 2945 } 2946 } 2947 2948 # if STARTTLS 2949 /* first TLS then AUTH to provide a security layer */ 2950 if (mci->mci_state != MCIS_CLOSED && 2951 !DONE_STARTTLS(mci->mci_flags)) 2952 { 2953 int olderrors; 2954 bool usetls; 2955 bool saveQuickAbort = QuickAbort; 2956 bool saveSuprErrs = SuprErrs; 2957 char *host = NULL; 2958 2959 rcode = EX_OK; 2960 usetls = bitset(MCIF_TLS, mci->mci_flags); 2961 if (usetls) 2962 usetls = !iscltflgset(e, D_NOTLS); 2963 2964 host = macvalue(macid("{server_name}"), e); 2965 if (usetls) 2966 { 2967 olderrors = Errors; 2968 QuickAbort = false; 2969 SuprErrs = true; 2970 if (rscheck("try_tls", host, NULL, e, 2971 RSF_RMCOMM, 7, host, NOQID, NULL, 2972 NULL) != EX_OK 2973 || Errors > olderrors) 2974 { 2975 usetls = false; 2976 } 2977 SuprErrs = saveSuprErrs; 2978 QuickAbort = saveQuickAbort; 2979 } 2980 2981 if (usetls) 2982 { 2983 if ((rcode = starttls(m, mci, e)) == EX_OK) 2984 { 2985 /* start again without STARTTLS */ 2986 mci->mci_flags |= MCIF_TLSACT; 2987 } 2988 else 2989 { 2990 char *s; 2991 2992 /* 2993 ** TLS negotiation failed, what to do? 2994 ** fall back to unencrypted connection 2995 ** or abort? How to decide? 2996 ** set a macro and call a ruleset. 2997 */ 2998 2999 mci->mci_flags &= ~MCIF_TLS; 3000 switch (rcode) 3001 { 3002 case EX_TEMPFAIL: 3003 s = "TEMP"; 3004 break; 3005 case EX_USAGE: 3006 s = "USAGE"; 3007 break; 3008 case EX_PROTOCOL: 3009 s = "PROTOCOL"; 3010 break; 3011 case EX_SOFTWARE: 3012 s = "SOFTWARE"; 3013 break; 3014 case EX_UNAVAILABLE: 3015 s = "NONE"; 3016 break; 3017 3018 /* everything else is a failure */ 3019 default: 3020 s = "FAILURE"; 3021 rcode = EX_TEMPFAIL; 3022 } 3023 macdefine(&e->e_macro, A_PERM, 3024 macid("{verify}"), s); 3025 } 3026 } 3027 else 3028 macdefine(&e->e_macro, A_PERM, 3029 macid("{verify}"), "NONE"); 3030 olderrors = Errors; 3031 QuickAbort = false; 3032 SuprErrs = true; 3033 3034 /* 3035 ** rcode == EX_SOFTWARE is special: 3036 ** the TLS negotiation failed 3037 ** we have to drop the connection no matter what 3038 ** However, we call tls_server to give it the chance 3039 ** to log the problem and return an appropriate 3040 ** error code. 3041 */ 3042 3043 if (rscheck("tls_server", 3044 macvalue(macid("{verify}"), e), 3045 NULL, e, RSF_RMCOMM|RSF_COUNT, 5, 3046 host, NOQID, NULL, NULL) != EX_OK || 3047 Errors > olderrors || 3048 rcode == EX_SOFTWARE) 3049 { 3050 char enhsc[ENHSCLEN]; 3051 extern char MsgBuf[]; 3052 3053 if (ISSMTPCODE(MsgBuf) && 3054 extenhsc(MsgBuf + 4, ' ', enhsc) > 0) 3055 { 3056 p = sm_rpool_strdup_x(e->e_rpool, 3057 MsgBuf); 3058 } 3059 else 3060 { 3061 p = "403 4.7.0 server not authenticated."; 3062 (void) sm_strlcpy(enhsc, "4.7.0", 3063 sizeof(enhsc)); 3064 } 3065 SuprErrs = saveSuprErrs; 3066 QuickAbort = saveQuickAbort; 3067 3068 if (rcode == EX_SOFTWARE) 3069 { 3070 /* drop the connection */ 3071 mci->mci_state = MCIS_QUITING; 3072 if (mci->mci_in != NULL) 3073 { 3074 (void) sm_io_close(mci->mci_in, 3075 SM_TIME_DEFAULT); 3076 mci->mci_in = NULL; 3077 } 3078 mci->mci_flags &= ~MCIF_TLSACT; 3079 (void) endmailer(mci, e, pv); 3080 } 3081 else 3082 { 3083 /* abort transfer */ 3084 smtpquit(m, mci, e); 3085 } 3086 3087 /* avoid bogus error msg */ 3088 mci->mci_errno = 0; 3089 3090 /* temp or permanent failure? */ 3091 rcode = (*p == '4') ? EX_TEMPFAIL 3092 : EX_UNAVAILABLE; 3093 mci_setstat(mci, rcode, enhsc, p); 3094 3095 /* 3096 ** hack to get the error message into 3097 ** the envelope (done in giveresponse()) 3098 */ 3099 3100 (void) sm_strlcpy(SmtpError, p, 3101 sizeof(SmtpError)); 3102 } 3103 else if (mci->mci_state == MCIS_CLOSED) 3104 { 3105 /* connection close caused by 421 */ 3106 mci->mci_errno = 0; 3107 rcode = EX_TEMPFAIL; 3108 mci_setstat(mci, rcode, NULL, "421"); 3109 } 3110 else 3111 rcode = 0; 3112 3113 QuickAbort = saveQuickAbort; 3114 SuprErrs = saveSuprErrs; 3115 if (DONE_STARTTLS(mci->mci_flags) && 3116 mci->mci_state != MCIS_CLOSED) 3117 { 3118 SET_HELO(mci->mci_flags); 3119 mci_clr_extensions(mci); 3120 goto reconnect; 3121 } 3122 } 3123 # endif /* STARTTLS */ 3124 # if SASL 3125 /* if other server supports authentication let's authenticate */ 3126 if (mci->mci_state != MCIS_CLOSED && 3127 mci->mci_saslcap != NULL && 3128 !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH)) 3129 { 3130 /* Should we require some minimum authentication? */ 3131 if ((ret = smtpauth(m, mci, e)) == EX_OK) 3132 { 3133 int result; 3134 sasl_ssf_t *ssf = NULL; 3135 3136 /* Get security strength (features) */ 3137 result = sasl_getprop(mci->mci_conn, SASL_SSF, 3138 # if SASL >= 20000 3139 (const void **) &ssf); 3140 # else /* SASL >= 20000 */ 3141 (void **) &ssf); 3142 # endif /* SASL >= 20000 */ 3143 3144 /* XXX authid? */ 3145 if (LogLevel > 9) 3146 sm_syslog(LOG_INFO, NOQID, 3147 "AUTH=client, relay=%.100s, mech=%.16s, bits=%d", 3148 mci->mci_host, 3149 macvalue(macid("{auth_type}"), e), 3150 result == SASL_OK ? *ssf : 0); 3151 3152 /* 3153 ** Only switch to encrypted connection 3154 ** if a security layer has been negotiated 3155 */ 3156 3157 if (result == SASL_OK && *ssf > 0) 3158 { 3159 int tmo; 3160 3161 /* 3162 ** Convert I/O layer to use SASL. 3163 ** If the call fails, the connection 3164 ** is aborted. 3165 */ 3166 3167 tmo = DATA_PROGRESS_TIMEOUT * 1000; 3168 if (sfdcsasl(&mci->mci_in, 3169 &mci->mci_out, 3170 mci->mci_conn, tmo) == 0) 3171 { 3172 mci_clr_extensions(mci); 3173 mci->mci_flags |= MCIF_AUTHACT| 3174 MCIF_ONLY_EHLO; 3175 goto reconnect; 3176 } 3177 syserr("AUTH TLS switch failed in client"); 3178 } 3179 /* else? XXX */ 3180 mci->mci_flags |= MCIF_AUTHACT; 3181 3182 } 3183 else if (ret == EX_TEMPFAIL) 3184 { 3185 if (LogLevel > 8) 3186 sm_syslog(LOG_ERR, NOQID, 3187 "AUTH=client, relay=%.100s, temporary failure, connection abort", 3188 mci->mci_host); 3189 smtpquit(m, mci, e); 3190 3191 /* avoid bogus error msg */ 3192 mci->mci_errno = 0; 3193 rcode = EX_TEMPFAIL; 3194 mci_setstat(mci, rcode, "4.3.0", p); 3195 3196 /* 3197 ** hack to get the error message into 3198 ** the envelope (done in giveresponse()) 3199 */ 3200 3201 (void) sm_strlcpy(SmtpError, 3202 "Temporary AUTH failure", 3203 sizeof(SmtpError)); 3204 } 3205 } 3206 # endif /* SASL */ 3207 } 3208 3209 3210 do_transfer: 3211 /* clear out per-message flags from connection structure */ 3212 mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7); 3213 3214 if (bitset(EF_HAS8BIT, e->e_flags) && 3215 !bitset(EF_DONT_MIME, e->e_flags) && 3216 bitnset(M_7BITS, m->m_flags)) 3217 mci->mci_flags |= MCIF_CVT8TO7; 3218 3219 #if MIME7TO8 3220 if (bitnset(M_MAKE8BIT, m->m_flags) && 3221 !bitset(MCIF_7BIT, mci->mci_flags) && 3222 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL && 3223 (sm_strcasecmp(p, "quoted-printable") == 0 || 3224 sm_strcasecmp(p, "base64") == 0) && 3225 (p = hvalue("Content-Type", e->e_header)) != NULL) 3226 { 3227 /* may want to convert 7 -> 8 */ 3228 /* XXX should really parse it here -- and use a class XXX */ 3229 if (sm_strncasecmp(p, "text/plain", 10) == 0 && 3230 (p[10] == '\0' || p[10] == ' ' || p[10] == ';')) 3231 mci->mci_flags |= MCIF_CVT7TO8; 3232 } 3233 #endif /* MIME7TO8 */ 3234 3235 if (tTd(11, 1)) 3236 { 3237 sm_dprintf("openmailer: "); 3238 mci_dump(sm_debug_file(), mci, false); 3239 } 3240 3241 #if _FFR_CLIENT_SIZE 3242 /* 3243 ** See if we know the maximum size and 3244 ** abort if the message is too big. 3245 ** 3246 ** NOTE: _FFR_CLIENT_SIZE is untested. 3247 */ 3248 3249 if (bitset(MCIF_SIZE, mci->mci_flags) && 3250 mci->mci_maxsize > 0 && 3251 e->e_msgsize > mci->mci_maxsize) 3252 { 3253 e->e_flags |= EF_NO_BODY_RETN; 3254 if (bitnset(M_LOCALMAILER, m->m_flags)) 3255 e->e_status = "5.2.3"; 3256 else 3257 e->e_status = "5.3.4"; 3258 3259 usrerrenh(e->e_status, 3260 "552 Message is too large; %ld bytes max", 3261 mci->mci_maxsize); 3262 rcode = EX_DATAERR; 3263 3264 /* Need an e_message for error */ 3265 (void) sm_snprintf(SmtpError, sizeof(SmtpError), 3266 "Message is too large; %ld bytes max", 3267 mci->mci_maxsize); 3268 goto give_up; 3269 } 3270 #endif /* _FFR_CLIENT_SIZE */ 3271 3272 if (mci->mci_state != MCIS_OPEN) 3273 { 3274 /* couldn't open the mailer */ 3275 rcode = mci->mci_exitstat; 3276 errno = mci->mci_errno; 3277 SM_SET_H_ERRNO(mci->mci_herrno); 3278 if (rcode == EX_OK) 3279 { 3280 /* shouldn't happen */ 3281 syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s", 3282 (unsigned long) mci, rcode, errno, 3283 mci->mci_state, firstsig); 3284 mci_dump_all(smioout, true); 3285 rcode = EX_SOFTWARE; 3286 } 3287 else if (nummxhosts > hostnum) 3288 { 3289 /* try next MX site */ 3290 goto tryhost; 3291 } 3292 } 3293 else if (!clever) 3294 { 3295 bool ok; 3296 3297 /* 3298 ** Format and send message. 3299 */ 3300 3301 rcode = EX_OK; 3302 errno = 0; 3303 ok = putfromline(mci, e); 3304 if (ok) 3305 ok = (*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER); 3306 if (ok) 3307 ok = (*e->e_putbody)(mci, e, NULL); 3308 if (ok && bitset(MCIF_INLONGLINE, mci->mci_flags)) 3309 ok = putline("", mci); 3310 3311 /* 3312 ** Ignore an I/O error that was caused by EPIPE. 3313 ** Some broken mailers don't read the entire body 3314 ** but just exit() thus causing an I/O error. 3315 */ 3316 3317 if (!ok && (sm_io_error(mci->mci_out) && errno == EPIPE)) 3318 ok = true; 3319 3320 /* (always) get the exit status */ 3321 rcode = endmailer(mci, e, pv); 3322 if (!ok) 3323 rcode = EX_TEMPFAIL; 3324 if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0') 3325 { 3326 /* 3327 ** Need an e_message for mailq display. 3328 ** We set SmtpError as 3329 */ 3330 3331 (void) sm_snprintf(SmtpError, sizeof(SmtpError), 3332 "%s mailer (%s) exited with EX_TEMPFAIL", 3333 m->m_name, m->m_mailer); 3334 } 3335 } 3336 else 3337 { 3338 /* 3339 ** Send the MAIL FROM: protocol 3340 */ 3341 3342 /* XXX this isn't pipelined... */ 3343 rcode = smtpmailfrom(m, mci, e); 3344 if (rcode == EX_OK) 3345 { 3346 register int i; 3347 # if PIPELINING 3348 ADDRESS *volatile pchain; 3349 # endif /* PIPELINING */ 3350 3351 /* send the recipient list */ 3352 tobuf[0] = '\0'; 3353 mci->mci_retryrcpt = false; 3354 mci->mci_tolist = tobuf; 3355 # if PIPELINING 3356 pchain = NULL; 3357 mci->mci_nextaddr = NULL; 3358 # endif /* PIPELINING */ 3359 3360 for (to = tochain; to != NULL; to = to->q_tchain) 3361 { 3362 if (!QS_IS_UNMARKED(to->q_state)) 3363 continue; 3364 3365 /* mark recipient state as "ok so far" */ 3366 to->q_state = QS_OK; 3367 e->e_to = to->q_paddr; 3368 # if STARTTLS 3369 i = rscheck("tls_rcpt", to->q_user, NULL, e, 3370 RSF_RMCOMM|RSF_COUNT, 3, 3371 mci->mci_host, e->e_id, NULL, NULL); 3372 if (i != EX_OK) 3373 { 3374 markfailure(e, to, mci, i, false); 3375 giveresponse(i, to->q_status, m, mci, 3376 ctladdr, xstart, e, to); 3377 if (i == EX_TEMPFAIL) 3378 { 3379 mci->mci_retryrcpt = true; 3380 to->q_state = QS_RETRY; 3381 } 3382 continue; 3383 } 3384 # endif /* STARTTLS */ 3385 3386 i = smtprcpt(to, m, mci, e, ctladdr, xstart); 3387 # if PIPELINING 3388 if (i == EX_OK && 3389 bitset(MCIF_PIPELINED, mci->mci_flags)) 3390 { 3391 /* 3392 ** Add new element to list of 3393 ** recipients for pipelining. 3394 */ 3395 3396 to->q_pchain = NULL; 3397 if (mci->mci_nextaddr == NULL) 3398 mci->mci_nextaddr = to; 3399 if (pchain == NULL) 3400 pchain = to; 3401 else 3402 { 3403 pchain->q_pchain = to; 3404 pchain = pchain->q_pchain; 3405 } 3406 } 3407 # endif /* PIPELINING */ 3408 if (i != EX_OK) 3409 { 3410 markfailure(e, to, mci, i, false); 3411 giveresponse(i, to->q_status, m, mci, 3412 ctladdr, xstart, e, to); 3413 if (i == EX_TEMPFAIL) 3414 to->q_state = QS_RETRY; 3415 } 3416 } 3417 3418 /* No recipients in list and no missing responses? */ 3419 if (tobuf[0] == '\0' 3420 # if PIPELINING 3421 && bitset(MCIF_PIPELINED, mci->mci_flags) 3422 && mci->mci_nextaddr == NULL 3423 # endif /* PIPELINING */ 3424 ) 3425 { 3426 rcode = EX_OK; 3427 e->e_to = NULL; 3428 if (bitset(MCIF_CACHED, mci->mci_flags)) 3429 smtprset(m, mci, e); 3430 } 3431 else 3432 { 3433 e->e_to = tobuf + 1; 3434 rcode = smtpdata(m, mci, e, ctladdr, xstart); 3435 } 3436 } 3437 if (rcode == EX_TEMPFAIL && nummxhosts > hostnum) 3438 { 3439 /* try next MX site */ 3440 goto tryhost; 3441 } 3442 } 3443 #if NAMED_BIND 3444 if (ConfigLevel < 2) 3445 _res.options |= RES_DEFNAMES | RES_DNSRCH; /* XXX */ 3446 #endif /* NAMED_BIND */ 3447 3448 if (tTd(62, 1)) 3449 checkfds("after delivery"); 3450 3451 /* 3452 ** Do final status disposal. 3453 ** We check for something in tobuf for the SMTP case. 3454 ** If we got a temporary failure, arrange to queue the 3455 ** addressees. 3456 */ 3457 3458 give_up: 3459 if (bitnset(M_LMTP, m->m_flags)) 3460 { 3461 lmtp_rcode = rcode; 3462 tobuf[0] = '\0'; 3463 anyok = false; 3464 strsize = 0; 3465 } 3466 else 3467 anyok = rcode == EX_OK; 3468 3469 for (to = tochain; to != NULL; to = to->q_tchain) 3470 { 3471 /* see if address already marked */ 3472 if (!QS_IS_OK(to->q_state)) 3473 continue; 3474 3475 /* if running LMTP, get the status for each address */ 3476 if (bitnset(M_LMTP, m->m_flags)) 3477 { 3478 if (lmtp_rcode == EX_OK) 3479 rcode = smtpgetstat(m, mci, e); 3480 if (rcode == EX_OK) 3481 { 3482 strsize += sm_strlcat2(tobuf + strsize, ",", 3483 to->q_paddr, 3484 tobufsize - strsize); 3485 SM_ASSERT(strsize < tobufsize); 3486 anyok = true; 3487 } 3488 else 3489 { 3490 e->e_to = to->q_paddr; 3491 markfailure(e, to, mci, rcode, true); 3492 giveresponse(rcode, to->q_status, m, mci, 3493 ctladdr, xstart, e, to); 3494 e->e_to = tobuf + 1; 3495 continue; 3496 } 3497 } 3498 else 3499 { 3500 /* mark bad addresses */ 3501 if (rcode != EX_OK) 3502 { 3503 if (goodmxfound && rcode == EX_NOHOST) 3504 rcode = EX_TEMPFAIL; 3505 markfailure(e, to, mci, rcode, true); 3506 continue; 3507 } 3508 } 3509 3510 /* successful delivery */ 3511 to->q_state = QS_SENT; 3512 to->q_statdate = curtime(); 3513 e->e_nsent++; 3514 3515 /* 3516 ** Checkpoint the send list every few addresses 3517 */ 3518 3519 if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval) 3520 { 3521 queueup(e, false, false); 3522 e->e_nsent = 0; 3523 } 3524 3525 if (bitnset(M_LOCALMAILER, m->m_flags) && 3526 bitset(QPINGONSUCCESS, to->q_flags)) 3527 { 3528 to->q_flags |= QDELIVERED; 3529 to->q_status = "2.1.5"; 3530 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, 3531 "%s... Successfully delivered\n", 3532 to->q_paddr); 3533 } 3534 else if (bitset(QPINGONSUCCESS, to->q_flags) && 3535 bitset(QPRIMARY, to->q_flags) && 3536 !bitset(MCIF_DSN, mci->mci_flags)) 3537 { 3538 to->q_flags |= QRELAYED; 3539 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, 3540 "%s... relayed; expect no further notifications\n", 3541 to->q_paddr); 3542 } 3543 else if (IS_DLVR_NOTIFY(e) && 3544 !bitset(MCIF_DLVR_BY, mci->mci_flags) && 3545 bitset(QPRIMARY, to->q_flags) && 3546 (!bitset(QHASNOTIFY, to->q_flags) || 3547 bitset(QPINGONSUCCESS, to->q_flags) || 3548 bitset(QPINGONFAILURE, to->q_flags) || 3549 bitset(QPINGONDELAY, to->q_flags))) 3550 { 3551 /* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */ 3552 to->q_flags |= QBYNRELAY; 3553 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, 3554 "%s... Deliver-by notify: relayed\n", 3555 to->q_paddr); 3556 } 3557 else if (IS_DLVR_TRACE(e) && 3558 (!bitset(QHASNOTIFY, to->q_flags) || 3559 bitset(QPINGONSUCCESS, to->q_flags) || 3560 bitset(QPINGONFAILURE, to->q_flags) || 3561 bitset(QPINGONDELAY, to->q_flags)) && 3562 bitset(QPRIMARY, to->q_flags)) 3563 { 3564 /* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */ 3565 to->q_flags |= QBYTRACE; 3566 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, 3567 "%s... Deliver-By trace: relayed\n", 3568 to->q_paddr); 3569 } 3570 } 3571 3572 if (bitnset(M_LMTP, m->m_flags)) 3573 { 3574 /* 3575 ** Global information applies to the last recipient only; 3576 ** clear it out to avoid bogus errors. 3577 */ 3578 3579 rcode = EX_OK; 3580 e->e_statmsg = NULL; 3581 3582 /* reset the mci state for the next transaction */ 3583 if (mci != NULL && 3584 (mci->mci_state == MCIS_MAIL || 3585 mci->mci_state == MCIS_RCPT || 3586 mci->mci_state == MCIS_DATA)) 3587 { 3588 mci->mci_state = MCIS_OPEN; 3589 SmtpPhase = mci->mci_phase = "idle"; 3590 sm_setproctitle(true, e, "%s: %s", CurHostName, 3591 mci->mci_phase); 3592 } 3593 } 3594 3595 if (tobuf[0] != '\0') 3596 { 3597 giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, NULL); 3598 #if 0 3599 /* 3600 ** This code is disabled for now because I am not 3601 ** sure that copying status from the first recipient 3602 ** to all non-status'ed recipients is a good idea. 3603 */ 3604 3605 if (tochain->q_message != NULL && 3606 !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK) 3607 { 3608 for (to = tochain->q_tchain; to != NULL; 3609 to = to->q_tchain) 3610 { 3611 /* see if address already marked */ 3612 if (QS_IS_QUEUEUP(to->q_state) && 3613 to->q_message == NULL) 3614 to->q_message = sm_rpool_strdup_x(e->e_rpool, 3615 tochain->q_message); 3616 } 3617 } 3618 #endif /* 0 */ 3619 } 3620 if (anyok) 3621 markstats(e, tochain, STATS_NORMAL); 3622 mci_store_persistent(mci); 3623 3624 /* Some recipients were tempfailed, try them on the next host */ 3625 if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum) 3626 { 3627 /* try next MX site */ 3628 goto tryhost; 3629 } 3630 3631 /* now close the connection */ 3632 if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED && 3633 !bitset(MCIF_CACHED, mci->mci_flags)) 3634 smtpquit(m, mci, e); 3635 3636 cleanup: ; 3637 } 3638 SM_FINALLY 3639 { 3640 /* 3641 ** Restore state and return. 3642 */ 3643 #if XDEBUG 3644 char wbuf[MAXLINE]; 3645 3646 /* make absolutely certain 0, 1, and 2 are in use */ 3647 (void) sm_snprintf(wbuf, sizeof(wbuf), 3648 "%s... end of deliver(%s)", 3649 e->e_to == NULL ? "NO-TO-LIST" 3650 : shortenstring(e->e_to, 3651 MAXSHORTSTR), 3652 m->m_name); 3653 checkfd012(wbuf); 3654 #endif /* XDEBUG */ 3655 3656 errno = 0; 3657 3658 /* 3659 ** It was originally necessary to set macro 'g' to NULL 3660 ** because it previously pointed to an auto buffer. 3661 ** We don't do this any more, so this may be unnecessary. 3662 */ 3663 3664 macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL); 3665 e->e_to = NULL; 3666 } 3667 SM_END_TRY 3668 return rcode; 3669 } 3670 3671 /* 3672 ** MARKFAILURE -- mark a failure on a specific address. 3673 ** 3674 ** Parameters: 3675 ** e -- the envelope we are sending. 3676 ** q -- the address to mark. 3677 ** mci -- mailer connection information. 3678 ** rcode -- the code signifying the particular failure. 3679 ** ovr -- override an existing code? 3680 ** 3681 ** Returns: 3682 ** none. 3683 ** 3684 ** Side Effects: 3685 ** marks the address (and possibly the envelope) with the 3686 ** failure so that an error will be returned or 3687 ** the message will be queued, as appropriate. 3688 */ 3689 3690 void 3691 markfailure(e, q, mci, rcode, ovr) 3692 register ENVELOPE *e; 3693 register ADDRESS *q; 3694 register MCI *mci; 3695 int rcode; 3696 bool ovr; 3697 { 3698 int save_errno = errno; 3699 char *status = NULL; 3700 char *rstatus = NULL; 3701 3702 switch (rcode) 3703 { 3704 case EX_OK: 3705 break; 3706 3707 case EX_TEMPFAIL: 3708 case EX_IOERR: 3709 case EX_OSERR: 3710 q->q_state = QS_QUEUEUP; 3711 break; 3712 3713 default: 3714 q->q_state = QS_BADADDR; 3715 break; 3716 } 3717 3718 /* find most specific error code possible */ 3719 if (mci != NULL && mci->mci_status != NULL) 3720 { 3721 status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status); 3722 if (mci->mci_rstatus != NULL) 3723 rstatus = sm_rpool_strdup_x(e->e_rpool, 3724 mci->mci_rstatus); 3725 else 3726 rstatus = NULL; 3727 } 3728 else if (e->e_status != NULL) 3729 { 3730 status = e->e_status; 3731 rstatus = NULL; 3732 } 3733 else 3734 { 3735 switch (rcode) 3736 { 3737 case EX_USAGE: 3738 status = "5.5.4"; 3739 break; 3740 3741 case EX_DATAERR: 3742 status = "5.5.2"; 3743 break; 3744 3745 case EX_NOUSER: 3746 status = "5.1.1"; 3747 break; 3748 3749 case EX_NOHOST: 3750 status = "5.1.2"; 3751 break; 3752 3753 case EX_NOINPUT: 3754 case EX_CANTCREAT: 3755 case EX_NOPERM: 3756 status = "5.3.0"; 3757 break; 3758 3759 case EX_UNAVAILABLE: 3760 case EX_SOFTWARE: 3761 case EX_OSFILE: 3762 case EX_PROTOCOL: 3763 case EX_CONFIG: 3764 status = "5.5.0"; 3765 break; 3766 3767 case EX_OSERR: 3768 case EX_IOERR: 3769 status = "4.5.0"; 3770 break; 3771 3772 case EX_TEMPFAIL: 3773 status = "4.2.0"; 3774 break; 3775 } 3776 } 3777 3778 /* new status? */ 3779 if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL || 3780 *q->q_status == '\0' || *q->q_status < *status)) 3781 { 3782 q->q_status = status; 3783 q->q_rstatus = rstatus; 3784 } 3785 if (rcode != EX_OK && q->q_rstatus == NULL && 3786 q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL && 3787 sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0) 3788 { 3789 char buf[16]; 3790 3791 (void) sm_snprintf(buf, sizeof(buf), "%d", rcode); 3792 q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf); 3793 } 3794 3795 q->q_statdate = curtime(); 3796 if (CurHostName != NULL && CurHostName[0] != '\0' && 3797 mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags)) 3798 q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName); 3799 3800 /* restore errno */ 3801 errno = save_errno; 3802 } 3803 /* 3804 ** ENDMAILER -- Wait for mailer to terminate. 3805 ** 3806 ** We should never get fatal errors (e.g., segmentation 3807 ** violation), so we report those specially. For other 3808 ** errors, we choose a status message (into statmsg), 3809 ** and if it represents an error, we print it. 3810 ** 3811 ** Parameters: 3812 ** mci -- the mailer connection info. 3813 ** e -- the current envelope. 3814 ** pv -- the parameter vector that invoked the mailer 3815 ** (for error messages). 3816 ** 3817 ** Returns: 3818 ** exit code of mailer. 3819 ** 3820 ** Side Effects: 3821 ** none. 3822 */ 3823 3824 static jmp_buf EndWaitTimeout; 3825 3826 static void 3827 endwaittimeout(ignore) 3828 int ignore; 3829 { 3830 /* 3831 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3832 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3833 ** DOING. 3834 */ 3835 3836 errno = ETIMEDOUT; 3837 longjmp(EndWaitTimeout, 1); 3838 } 3839 3840 int 3841 endmailer(mci, e, pv) 3842 register MCI *mci; 3843 register ENVELOPE *e; 3844 char **pv; 3845 { 3846 int st; 3847 int save_errno = errno; 3848 char buf[MAXLINE]; 3849 SM_EVENT *ev = NULL; 3850 3851 3852 mci_unlock_host(mci); 3853 3854 /* close output to mailer */ 3855 if (mci->mci_out != NULL) 3856 { 3857 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT); 3858 mci->mci_out = NULL; 3859 } 3860 3861 /* copy any remaining input to transcript */ 3862 if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR && 3863 e->e_xfp != NULL) 3864 { 3865 while (sfgets(buf, sizeof(buf), mci->mci_in, 3866 TimeOuts.to_quit, "Draining Input") != NULL) 3867 (void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf); 3868 } 3869 3870 #if SASL 3871 /* close SASL connection */ 3872 if (bitset(MCIF_AUTHACT, mci->mci_flags)) 3873 { 3874 sasl_dispose(&mci->mci_conn); 3875 mci->mci_flags &= ~MCIF_AUTHACT; 3876 } 3877 #endif /* SASL */ 3878 3879 #if STARTTLS 3880 /* shutdown TLS */ 3881 (void) endtlsclt(mci); 3882 #endif /* STARTTLS */ 3883 3884 /* now close the input */ 3885 if (mci->mci_in != NULL) 3886 { 3887 (void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT); 3888 mci->mci_in = NULL; 3889 } 3890 mci->mci_state = MCIS_CLOSED; 3891 3892 errno = save_errno; 3893 3894 /* in the IPC case there is nothing to wait for */ 3895 if (mci->mci_pid == 0) 3896 return EX_OK; 3897 3898 /* put a timeout around the wait */ 3899 if (mci->mci_mailer->m_wait > 0) 3900 { 3901 if (setjmp(EndWaitTimeout) == 0) 3902 ev = sm_setevent(mci->mci_mailer->m_wait, 3903 endwaittimeout, 0); 3904 else 3905 { 3906 syserr("endmailer %s: wait timeout (%ld)", 3907 mci->mci_mailer->m_name, 3908 (long) mci->mci_mailer->m_wait); 3909 return EX_TEMPFAIL; 3910 } 3911 } 3912 3913 /* wait for the mailer process, collect status */ 3914 st = waitfor(mci->mci_pid); 3915 save_errno = errno; 3916 if (ev != NULL) 3917 sm_clrevent(ev); 3918 errno = save_errno; 3919 3920 if (st == -1) 3921 { 3922 syserr("endmailer %s: wait", mci->mci_mailer->m_name); 3923 return EX_SOFTWARE; 3924 } 3925 3926 if (WIFEXITED(st)) 3927 { 3928 /* normal death -- return status */ 3929 return (WEXITSTATUS(st)); 3930 } 3931 3932 /* it died a horrid death */ 3933 syserr("451 4.3.0 mailer %s died with signal %d%s", 3934 mci->mci_mailer->m_name, WTERMSIG(st), 3935 WCOREDUMP(st) ? " (core dumped)" : 3936 (WIFSTOPPED(st) ? " (stopped)" : "")); 3937 3938 /* log the arguments */ 3939 if (pv != NULL && e->e_xfp != NULL) 3940 { 3941 register char **av; 3942 3943 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:"); 3944 for (av = pv; *av != NULL; av++) 3945 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s", 3946 *av); 3947 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n"); 3948 } 3949 3950 ExitStat = EX_TEMPFAIL; 3951 return EX_TEMPFAIL; 3952 } 3953 /* 3954 ** GIVERESPONSE -- Interpret an error response from a mailer 3955 ** 3956 ** Parameters: 3957 ** status -- the status code from the mailer (high byte 3958 ** only; core dumps must have been taken care of 3959 ** already). 3960 ** dsn -- the DSN associated with the address, if any. 3961 ** m -- the mailer info for this mailer. 3962 ** mci -- the mailer connection info -- can be NULL if the 3963 ** response is given before the connection is made. 3964 ** ctladdr -- the controlling address for the recipient 3965 ** address(es). 3966 ** xstart -- the transaction start time, for computing 3967 ** transaction delays. 3968 ** e -- the current envelope. 3969 ** to -- the current recipient (NULL if none). 3970 ** 3971 ** Returns: 3972 ** none. 3973 ** 3974 ** Side Effects: 3975 ** Errors may be incremented. 3976 ** ExitStat may be set. 3977 */ 3978 3979 void 3980 giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to) 3981 int status; 3982 char *dsn; 3983 register MAILER *m; 3984 register MCI *mci; 3985 ADDRESS *ctladdr; 3986 time_t xstart; 3987 ENVELOPE *e; 3988 ADDRESS *to; 3989 { 3990 register const char *statmsg; 3991 int errnum = errno; 3992 int off = 4; 3993 bool usestat = false; 3994 char dsnbuf[ENHSCLEN]; 3995 char buf[MAXLINE]; 3996 char *exmsg; 3997 3998 if (e == NULL) 3999 { 4000 syserr("giveresponse: null envelope"); 4001 /* NOTREACHED */ 4002 SM_ASSERT(0); 4003 } 4004 4005 /* 4006 ** Compute status message from code. 4007 */ 4008 4009 exmsg = sm_sysexmsg(status); 4010 if (status == 0) 4011 { 4012 statmsg = "250 2.0.0 Sent"; 4013 if (e->e_statmsg != NULL) 4014 { 4015 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)", 4016 statmsg, 4017 shortenstring(e->e_statmsg, 403)); 4018 statmsg = buf; 4019 } 4020 } 4021 else if (exmsg == NULL) 4022 { 4023 (void) sm_snprintf(buf, sizeof(buf), 4024 "554 5.3.0 unknown mailer error %d", 4025 status); 4026 status = EX_UNAVAILABLE; 4027 statmsg = buf; 4028 usestat = true; 4029 } 4030 else if (status == EX_TEMPFAIL) 4031 { 4032 char *bp = buf; 4033 4034 (void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp)); 4035 bp += strlen(bp); 4036 #if NAMED_BIND 4037 if (h_errno == TRY_AGAIN) 4038 statmsg = sm_errstring(h_errno + E_DNSBASE); 4039 else 4040 #endif /* NAMED_BIND */ 4041 { 4042 if (errnum != 0) 4043 statmsg = sm_errstring(errnum); 4044 else 4045 statmsg = SmtpError; 4046 } 4047 if (statmsg != NULL && statmsg[0] != '\0') 4048 { 4049 switch (errnum) 4050 { 4051 #ifdef ENETDOWN 4052 case ENETDOWN: /* Network is down */ 4053 #endif /* ENETDOWN */ 4054 #ifdef ENETUNREACH 4055 case ENETUNREACH: /* Network is unreachable */ 4056 #endif /* ENETUNREACH */ 4057 #ifdef ENETRESET 4058 case ENETRESET: /* Network dropped connection on reset */ 4059 #endif /* ENETRESET */ 4060 #ifdef ECONNABORTED 4061 case ECONNABORTED: /* Software caused connection abort */ 4062 #endif /* ECONNABORTED */ 4063 #ifdef EHOSTDOWN 4064 case EHOSTDOWN: /* Host is down */ 4065 #endif /* EHOSTDOWN */ 4066 #ifdef EHOSTUNREACH 4067 case EHOSTUNREACH: /* No route to host */ 4068 #endif /* EHOSTUNREACH */ 4069 if (mci != NULL && mci->mci_host != NULL) 4070 { 4071 (void) sm_strlcpyn(bp, 4072 SPACELEFT(buf, bp), 4073 2, ": ", 4074 mci->mci_host); 4075 bp += strlen(bp); 4076 } 4077 break; 4078 } 4079 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ", 4080 statmsg); 4081 usestat = true; 4082 } 4083 statmsg = buf; 4084 } 4085 #if NAMED_BIND 4086 else if (status == EX_NOHOST && h_errno != 0) 4087 { 4088 statmsg = sm_errstring(h_errno + E_DNSBASE); 4089 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)", exmsg + 1, 4090 statmsg); 4091 statmsg = buf; 4092 usestat = true; 4093 } 4094 #endif /* NAMED_BIND */ 4095 else 4096 { 4097 statmsg = exmsg; 4098 if (*statmsg++ == ':' && errnum != 0) 4099 { 4100 (void) sm_snprintf(buf, sizeof(buf), "%s: %s", statmsg, 4101 sm_errstring(errnum)); 4102 statmsg = buf; 4103 usestat = true; 4104 } 4105 else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL) 4106 { 4107 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)", statmsg, 4108 shortenstring(e->e_statmsg, 403)); 4109 statmsg = buf; 4110 usestat = true; 4111 } 4112 } 4113 4114 /* 4115 ** Print the message as appropriate 4116 */ 4117 4118 if (status == EX_OK || status == EX_TEMPFAIL) 4119 { 4120 extern char MsgBuf[]; 4121 4122 if ((off = isenhsc(statmsg + 4, ' ')) > 0) 4123 { 4124 if (dsn == NULL) 4125 { 4126 (void) sm_snprintf(dsnbuf, sizeof(dsnbuf), 4127 "%.*s", off, statmsg + 4); 4128 dsn = dsnbuf; 4129 } 4130 off += 5; 4131 } 4132 else 4133 { 4134 off = 4; 4135 } 4136 message("%s", statmsg + off); 4137 if (status == EX_TEMPFAIL && e->e_xfp != NULL) 4138 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n", 4139 &MsgBuf[4]); 4140 } 4141 else 4142 { 4143 char mbuf[ENHSCLEN + 4]; 4144 4145 Errors++; 4146 if ((off = isenhsc(statmsg + 4, ' ')) > 0 && 4147 off < sizeof(mbuf) - 4) 4148 { 4149 if (dsn == NULL) 4150 { 4151 (void) sm_snprintf(dsnbuf, sizeof(dsnbuf), 4152 "%.*s", off, statmsg + 4); 4153 dsn = dsnbuf; 4154 } 4155 off += 5; 4156 4157 /* copy only part of statmsg to mbuf */ 4158 (void) sm_strlcpy(mbuf, statmsg, off); 4159 (void) sm_strlcat(mbuf, " %s", sizeof(mbuf)); 4160 } 4161 else 4162 { 4163 dsnbuf[0] = '\0'; 4164 (void) sm_snprintf(mbuf, sizeof(mbuf), "%.3s %%s", 4165 statmsg); 4166 off = 4; 4167 } 4168 usrerr(mbuf, &statmsg[off]); 4169 } 4170 4171 /* 4172 ** Final cleanup. 4173 ** Log a record of the transaction. Compute the new ExitStat 4174 ** -- if we already had an error, stick with that. 4175 */ 4176 4177 if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) && 4178 LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6)) 4179 logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e, to, status); 4180 4181 if (tTd(11, 2)) 4182 sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n", 4183 status, 4184 dsn == NULL ? "<NULL>" : dsn, 4185 e->e_message == NULL ? "<NULL>" : e->e_message, 4186 errnum); 4187 4188 if (status != EX_TEMPFAIL) 4189 setstat(status); 4190 if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL)) 4191 e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off); 4192 if (status != EX_OK && to != NULL && to->q_message == NULL) 4193 { 4194 if (!usestat && e->e_message != NULL) 4195 to->q_message = sm_rpool_strdup_x(e->e_rpool, 4196 e->e_message); 4197 else 4198 to->q_message = sm_rpool_strdup_x(e->e_rpool, 4199 statmsg + off); 4200 } 4201 errno = 0; 4202 SM_SET_H_ERRNO(0); 4203 } 4204 /* 4205 ** LOGDELIVERY -- log the delivery in the system log 4206 ** 4207 ** Care is taken to avoid logging lines that are too long, because 4208 ** some versions of syslog have an unfortunate proclivity for core 4209 ** dumping. This is a hack, to be sure, that is at best empirical. 4210 ** 4211 ** Parameters: 4212 ** m -- the mailer info. Can be NULL for initial queue. 4213 ** mci -- the mailer connection info -- can be NULL if the 4214 ** log is occurring when no connection is active. 4215 ** dsn -- the DSN attached to the status. 4216 ** status -- the message to print for the status. 4217 ** ctladdr -- the controlling address for the to list. 4218 ** xstart -- the transaction start time, used for 4219 ** computing transaction delay. 4220 ** e -- the current envelope. 4221 ** to -- the current recipient (NULL if none). 4222 ** rcode -- status code 4223 ** 4224 ** Returns: 4225 ** none 4226 ** 4227 ** Side Effects: 4228 ** none 4229 */ 4230 4231 void 4232 logdelivery(m, mci, dsn, status, ctladdr, xstart, e, to, rcode) 4233 MAILER *m; 4234 register MCI *mci; 4235 char *dsn; 4236 const char *status; 4237 ADDRESS *ctladdr; 4238 time_t xstart; 4239 register ENVELOPE *e; 4240 ADDRESS *to; 4241 int rcode; 4242 { 4243 register char *bp; 4244 register char *p; 4245 int l; 4246 time_t now = curtime(); 4247 char buf[1024]; 4248 4249 #if (SYSLOG_BUFSIZE) >= 256 4250 /* ctladdr: max 106 bytes */ 4251 bp = buf; 4252 if (ctladdr != NULL) 4253 { 4254 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=", 4255 shortenstring(ctladdr->q_paddr, 83)); 4256 bp += strlen(bp); 4257 if (bitset(QGOODUID, ctladdr->q_flags)) 4258 { 4259 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)", 4260 (int) ctladdr->q_uid, 4261 (int) ctladdr->q_gid); 4262 bp += strlen(bp); 4263 } 4264 } 4265 4266 /* delay & xdelay: max 41 bytes */ 4267 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=", 4268 pintvl(now - e->e_ctime, true)); 4269 bp += strlen(bp); 4270 4271 if (xstart != (time_t) 0) 4272 { 4273 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=", 4274 pintvl(now - xstart, true)); 4275 bp += strlen(bp); 4276 } 4277 4278 /* mailer: assume about 19 bytes (max 10 byte mailer name) */ 4279 if (m != NULL) 4280 { 4281 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=", 4282 m->m_name); 4283 bp += strlen(bp); 4284 } 4285 4286 # if _FFR_LOG_MORE2 4287 # if STARTTLS 4288 p = macvalue(macid("{verify}"), e); 4289 if (p == NULL || *p == '\0') 4290 p = "NONE"; 4291 (void) sm_snprintf(bp, SPACELEFT(buf, bp), ", tls_verify=%.20s", p); 4292 bp += strlen(bp); 4293 # endif /* STARTTLS */ 4294 # endif /* _FFR_LOG_MORE2 */ 4295 4296 /* pri: changes with each delivery attempt */ 4297 (void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld", 4298 PRT_NONNEGL(e->e_msgpriority)); 4299 bp += strlen(bp); 4300 4301 /* relay: max 66 bytes for IPv4 addresses */ 4302 if (mci != NULL && mci->mci_host != NULL) 4303 { 4304 extern SOCKADDR CurHostAddr; 4305 4306 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=", 4307 shortenstring(mci->mci_host, 40)); 4308 bp += strlen(bp); 4309 4310 if (CurHostAddr.sa.sa_family != 0) 4311 { 4312 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]", 4313 anynet_ntoa(&CurHostAddr)); 4314 } 4315 } 4316 else if (strcmp(status, "quarantined") == 0) 4317 { 4318 if (e->e_quarmsg != NULL) 4319 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4320 ", quarantine=%s", 4321 shortenstring(e->e_quarmsg, 40)); 4322 } 4323 else if (strcmp(status, "queued") != 0) 4324 { 4325 p = macvalue('h', e); 4326 if (p != NULL && p[0] != '\0') 4327 { 4328 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4329 ", relay=%s", shortenstring(p, 40)); 4330 } 4331 } 4332 bp += strlen(bp); 4333 4334 /* dsn */ 4335 if (dsn != NULL && *dsn != '\0') 4336 { 4337 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=", 4338 shortenstring(dsn, ENHSCLEN)); 4339 bp += strlen(bp); 4340 } 4341 4342 #if _FFR_LOG_NTRIES 4343 /* ntries */ 4344 if (e->e_ntries >= 0) 4345 { 4346 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4347 ", ntries=%d", e->e_ntries + 1); 4348 bp += strlen(bp); 4349 } 4350 #endif /* _FFR_LOG_NTRIES */ 4351 4352 # define STATLEN (((SYSLOG_BUFSIZE) - 100) / 4) 4353 # if (STATLEN) < 63 4354 # undef STATLEN 4355 # define STATLEN 63 4356 # endif /* (STATLEN) < 63 */ 4357 # if (STATLEN) > 203 4358 # undef STATLEN 4359 # define STATLEN 203 4360 # endif /* (STATLEN) > 203 */ 4361 4362 #if _FFR_LOGREPLY 4363 /* 4364 ** Notes: 4365 ** per-rcpt status: to->q_rstatus 4366 ** global status: e->e_text 4367 ** 4368 ** We (re)use STATLEN here, is that a good choice? 4369 ** 4370 ** stat=Deferred: ... 4371 ** has sometimes the same text? 4372 ** 4373 ** Note: this doesn't show the stage at which the error happened. 4374 ** can/should we log that? 4375 ** XS_* in reply() basically encodes the state. 4376 */ 4377 4378 /* only show errors */ 4379 if (rcode != EX_OK && to != NULL && to->q_rstatus != NULL && 4380 *to->q_rstatus != '\0') 4381 { 4382 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4383 ", reply=%s", 4384 shortenstring(to->q_rstatus, STATLEN)); 4385 bp += strlen(bp); 4386 } 4387 else if (rcode != EX_OK && e->e_text != NULL) 4388 { 4389 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4390 ", reply=%d %s%s%s", 4391 e->e_rcode, 4392 e->e_renhsc, 4393 (e->e_renhsc[0] != '\0') ? " " : "", 4394 shortenstring(e->e_text, STATLEN)); 4395 bp += strlen(bp); 4396 } 4397 #endif 4398 4399 /* stat: max 210 bytes */ 4400 if ((bp - buf) > (sizeof(buf) - ((STATLEN) + 20))) 4401 { 4402 /* desperation move -- truncate data */ 4403 bp = buf + sizeof(buf) - ((STATLEN) + 17); 4404 (void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp)); 4405 bp += 3; 4406 } 4407 4408 (void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp)); 4409 bp += strlen(bp); 4410 4411 (void) sm_strlcpy(bp, shortenstring(status, STATLEN), 4412 SPACELEFT(buf, bp)); 4413 4414 /* id, to: max 13 + TOBUFSIZE bytes */ 4415 l = SYSLOG_BUFSIZE - 100 - strlen(buf); 4416 if (l < 0) 4417 l = 0; 4418 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to; 4419 while (strlen(p) >= l) 4420 { 4421 register char *q; 4422 4423 for (q = p + l; q > p; q--) 4424 { 4425 /* XXX a comma in an address will break this! */ 4426 if (*q == ',') 4427 break; 4428 } 4429 if (p == q) 4430 break; 4431 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s", 4432 (int) (++q - p), p, buf); 4433 p = q; 4434 } 4435 sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf); 4436 4437 #else /* (SYSLOG_BUFSIZE) >= 256 */ 4438 4439 l = SYSLOG_BUFSIZE - 85; 4440 if (l < 0) 4441 l = 0; 4442 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to; 4443 while (strlen(p) >= l) 4444 { 4445 register char *q; 4446 4447 for (q = p + l; q > p; q--) 4448 { 4449 if (*q == ',') 4450 break; 4451 } 4452 if (p == q) 4453 break; 4454 4455 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]", 4456 (int) (++q - p), p); 4457 p = q; 4458 } 4459 sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p); 4460 4461 if (ctladdr != NULL) 4462 { 4463 bp = buf; 4464 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=", 4465 shortenstring(ctladdr->q_paddr, 83)); 4466 bp += strlen(bp); 4467 if (bitset(QGOODUID, ctladdr->q_flags)) 4468 { 4469 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)", 4470 ctladdr->q_uid, ctladdr->q_gid); 4471 bp += strlen(bp); 4472 } 4473 sm_syslog(LOG_INFO, e->e_id, "%s", buf); 4474 } 4475 bp = buf; 4476 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=", 4477 pintvl(now - e->e_ctime, true)); 4478 bp += strlen(bp); 4479 if (xstart != (time_t) 0) 4480 { 4481 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=", 4482 pintvl(now - xstart, true)); 4483 bp += strlen(bp); 4484 } 4485 4486 if (m != NULL) 4487 { 4488 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=", 4489 m->m_name); 4490 bp += strlen(bp); 4491 } 4492 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf); 4493 4494 buf[0] = '\0'; 4495 bp = buf; 4496 if (mci != NULL && mci->mci_host != NULL) 4497 { 4498 extern SOCKADDR CurHostAddr; 4499 4500 (void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s", 4501 mci->mci_host); 4502 bp += strlen(bp); 4503 4504 if (CurHostAddr.sa.sa_family != 0) 4505 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4506 " [%.100s]", 4507 anynet_ntoa(&CurHostAddr)); 4508 } 4509 else if (strcmp(status, "quarantined") == 0) 4510 { 4511 if (e->e_quarmsg != NULL) 4512 (void) sm_snprintf(bp, SPACELEFT(buf, bp), 4513 ", quarantine=%.100s", 4514 e->e_quarmsg); 4515 } 4516 else if (strcmp(status, "queued") != 0) 4517 { 4518 p = macvalue('h', e); 4519 if (p != NULL && p[0] != '\0') 4520 (void) sm_snprintf(buf, sizeof(buf), "relay=%.100s", p); 4521 } 4522 if (buf[0] != '\0') 4523 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf); 4524 4525 sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63)); 4526 #endif /* (SYSLOG_BUFSIZE) >= 256 */ 4527 } 4528 /* 4529 ** PUTFROMLINE -- output a UNIX-style from line (or whatever) 4530 ** 4531 ** This can be made an arbitrary message separator by changing $l 4532 ** 4533 ** One of the ugliest hacks seen by human eyes is contained herein: 4534 ** UUCP wants those stupid "remote from <host>" lines. Why oh why 4535 ** does a well-meaning programmer such as myself have to deal with 4536 ** this kind of antique garbage???? 4537 ** 4538 ** Parameters: 4539 ** mci -- the connection information. 4540 ** e -- the envelope. 4541 ** 4542 ** Returns: 4543 ** true iff line was written successfully 4544 ** 4545 ** Side Effects: 4546 ** outputs some text to fp. 4547 */ 4548 4549 bool 4550 putfromline(mci, e) 4551 register MCI *mci; 4552 ENVELOPE *e; 4553 { 4554 char *template = UnixFromLine; 4555 char buf[MAXLINE]; 4556 char xbuf[MAXLINE]; 4557 4558 if (bitnset(M_NHDR, mci->mci_mailer->m_flags)) 4559 return true; 4560 4561 mci->mci_flags |= MCIF_INHEADER; 4562 4563 if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags)) 4564 { 4565 char *bang; 4566 4567 expand("\201g", buf, sizeof(buf), e); 4568 bang = strchr(buf, '!'); 4569 if (bang == NULL) 4570 { 4571 char *at; 4572 char hname[MAXNAME]; 4573 4574 /* 4575 ** If we can construct a UUCP path, do so 4576 */ 4577 4578 at = strrchr(buf, '@'); 4579 if (at == NULL) 4580 { 4581 expand("\201k", hname, sizeof(hname), e); 4582 at = hname; 4583 } 4584 else 4585 *at++ = '\0'; 4586 (void) sm_snprintf(xbuf, sizeof(xbuf), 4587 "From %.800s \201d remote from %.100s\n", 4588 buf, at); 4589 } 4590 else 4591 { 4592 *bang++ = '\0'; 4593 (void) sm_snprintf(xbuf, sizeof(xbuf), 4594 "From %.800s \201d remote from %.100s\n", 4595 bang, buf); 4596 template = xbuf; 4597 } 4598 } 4599 expand(template, buf, sizeof(buf), e); 4600 return putxline(buf, strlen(buf), mci, PXLF_HEADER); 4601 } 4602 4603 /* 4604 ** PUTBODY -- put the body of a message. 4605 ** 4606 ** Parameters: 4607 ** mci -- the connection information. 4608 ** e -- the envelope to put out. 4609 ** separator -- if non-NULL, a message separator that must 4610 ** not be permitted in the resulting message. 4611 ** 4612 ** Returns: 4613 ** true iff message was written successfully 4614 ** 4615 ** Side Effects: 4616 ** The message is written onto fp. 4617 */ 4618 4619 /* values for output state variable */ 4620 #define OSTATE_HEAD 0 /* at beginning of line */ 4621 #define OSTATE_CR 1 /* read a carriage return */ 4622 #define OSTATE_INLINE 2 /* putting rest of line */ 4623 4624 bool 4625 putbody(mci, e, separator) 4626 register MCI *mci; 4627 register ENVELOPE *e; 4628 char *separator; 4629 { 4630 bool dead = false; 4631 bool ioerr = false; 4632 int save_errno; 4633 char buf[MAXLINE]; 4634 #if MIME8TO7 4635 char *boundaries[MAXMIMENESTING + 1]; 4636 #endif /* MIME8TO7 */ 4637 4638 /* 4639 ** Output the body of the message 4640 */ 4641 4642 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags)) 4643 { 4644 char *df = queuename(e, DATAFL_LETTER); 4645 4646 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df, 4647 SM_IO_RDONLY_B, NULL); 4648 if (e->e_dfp == NULL) 4649 { 4650 char *msg = "!putbody: Cannot open %s for %s from %s"; 4651 4652 if (errno == ENOENT) 4653 msg++; 4654 syserr(msg, df, e->e_to, e->e_from.q_paddr); 4655 } 4656 4657 } 4658 if (e->e_dfp == NULL) 4659 { 4660 if (bitset(MCIF_INHEADER, mci->mci_flags)) 4661 { 4662 if (!putline("", mci)) 4663 goto writeerr; 4664 mci->mci_flags &= ~MCIF_INHEADER; 4665 } 4666 if (!putline("<<< No Message Collected >>>", mci)) 4667 goto writeerr; 4668 goto endofmessage; 4669 } 4670 4671 if (e->e_dfino == (ino_t) 0) 4672 { 4673 struct stat stbuf; 4674 4675 if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf) 4676 < 0) 4677 e->e_dfino = -1; 4678 else 4679 { 4680 e->e_dfdev = stbuf.st_dev; 4681 e->e_dfino = stbuf.st_ino; 4682 } 4683 } 4684 4685 /* paranoia: the data file should always be in a rewound state */ 4686 (void) bfrewind(e->e_dfp); 4687 4688 /* simulate an I/O timeout when used as source */ 4689 if (tTd(84, 101)) 4690 sleep(319); 4691 4692 #if MIME8TO7 4693 if (bitset(MCIF_CVT8TO7, mci->mci_flags)) 4694 { 4695 /* 4696 ** Do 8 to 7 bit MIME conversion. 4697 */ 4698 4699 /* make sure it looks like a MIME message */ 4700 if (hvalue("MIME-Version", e->e_header) == NULL && 4701 !putline("MIME-Version: 1.0", mci)) 4702 goto writeerr; 4703 4704 if (hvalue("Content-Type", e->e_header) == NULL) 4705 { 4706 (void) sm_snprintf(buf, sizeof(buf), 4707 "Content-Type: text/plain; charset=%s", 4708 defcharset(e)); 4709 if (!putline(buf, mci)) 4710 goto writeerr; 4711 } 4712 4713 /* now do the hard work */ 4714 boundaries[0] = NULL; 4715 mci->mci_flags |= MCIF_INHEADER; 4716 if (mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER, 0) == 4717 SM_IO_EOF) 4718 goto writeerr; 4719 } 4720 # if MIME7TO8 4721 else if (bitset(MCIF_CVT7TO8, mci->mci_flags)) 4722 { 4723 if (!mime7to8(mci, e->e_header, e)) 4724 goto writeerr; 4725 } 4726 # endif /* MIME7TO8 */ 4727 else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0) 4728 { 4729 bool oldsuprerrs = SuprErrs; 4730 4731 /* Use mime8to7 to check multipart for MIME header overflows */ 4732 boundaries[0] = NULL; 4733 mci->mci_flags |= MCIF_INHEADER; 4734 4735 /* 4736 ** If EF_DONT_MIME is set, we have a broken MIME message 4737 ** and don't want to generate a new bounce message whose 4738 ** body propagates the broken MIME. We can't just not call 4739 ** mime8to7() as is done above since we need the security 4740 ** checks. The best we can do is suppress the errors. 4741 */ 4742 4743 if (bitset(EF_DONT_MIME, e->e_flags)) 4744 SuprErrs = true; 4745 4746 if (mime8to7(mci, e->e_header, e, boundaries, 4747 M87F_OUTER|M87F_NO8TO7, 0) == SM_IO_EOF) 4748 goto writeerr; 4749 4750 /* restore SuprErrs */ 4751 SuprErrs = oldsuprerrs; 4752 } 4753 else 4754 #endif /* MIME8TO7 */ 4755 { 4756 int ostate; 4757 register char *bp; 4758 register char *pbp; 4759 register int c; 4760 register char *xp; 4761 int padc; 4762 char *buflim; 4763 int pos = 0; 4764 char peekbuf[12]; 4765 4766 if (bitset(MCIF_INHEADER, mci->mci_flags)) 4767 { 4768 if (!putline("", mci)) 4769 goto writeerr; 4770 mci->mci_flags &= ~MCIF_INHEADER; 4771 } 4772 4773 /* determine end of buffer; allow for short mailer lines */ 4774 buflim = &buf[sizeof(buf) - 1]; 4775 if (mci->mci_mailer->m_linelimit > 0 && 4776 mci->mci_mailer->m_linelimit < sizeof(buf) - 1) 4777 buflim = &buf[mci->mci_mailer->m_linelimit - 1]; 4778 4779 /* copy temp file to output with mapping */ 4780 ostate = OSTATE_HEAD; 4781 bp = buf; 4782 pbp = peekbuf; 4783 while (!sm_io_error(mci->mci_out) && !dead) 4784 { 4785 if (pbp > peekbuf) 4786 c = *--pbp; 4787 else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT)) 4788 == SM_IO_EOF) 4789 break; 4790 if (bitset(MCIF_7BIT, mci->mci_flags)) 4791 c &= 0x7f; 4792 switch (ostate) 4793 { 4794 case OSTATE_HEAD: 4795 if (c == '\0' && 4796 bitnset(M_NONULLS, 4797 mci->mci_mailer->m_flags)) 4798 break; 4799 if (c != '\r' && c != '\n' && bp < buflim) 4800 { 4801 *bp++ = c; 4802 break; 4803 } 4804 4805 /* check beginning of line for special cases */ 4806 *bp = '\0'; 4807 pos = 0; 4808 padc = SM_IO_EOF; 4809 if (buf[0] == 'F' && 4810 bitnset(M_ESCFROM, mci->mci_mailer->m_flags) 4811 && strncmp(buf, "From ", 5) == 0) 4812 { 4813 padc = '>'; 4814 } 4815 if (buf[0] == '-' && buf[1] == '-' && 4816 separator != NULL) 4817 { 4818 /* possible separator */ 4819 int sl = strlen(separator); 4820 4821 if (strncmp(&buf[2], separator, sl) 4822 == 0) 4823 padc = ' '; 4824 } 4825 if (buf[0] == '.' && 4826 bitnset(M_XDOT, mci->mci_mailer->m_flags)) 4827 { 4828 padc = '.'; 4829 } 4830 4831 /* now copy out saved line */ 4832 if (TrafficLogFile != NULL) 4833 { 4834 (void) sm_io_fprintf(TrafficLogFile, 4835 SM_TIME_DEFAULT, 4836 "%05d >>> ", 4837 (int) CurrentPid); 4838 if (padc != SM_IO_EOF) 4839 (void) sm_io_putc(TrafficLogFile, 4840 SM_TIME_DEFAULT, 4841 padc); 4842 for (xp = buf; xp < bp; xp++) 4843 (void) sm_io_putc(TrafficLogFile, 4844 SM_TIME_DEFAULT, 4845 (unsigned char) *xp); 4846 if (c == '\n') 4847 (void) sm_io_fputs(TrafficLogFile, 4848 SM_TIME_DEFAULT, 4849 mci->mci_mailer->m_eol); 4850 } 4851 if (padc != SM_IO_EOF) 4852 { 4853 if (sm_io_putc(mci->mci_out, 4854 SM_TIME_DEFAULT, padc) 4855 == SM_IO_EOF) 4856 { 4857 dead = true; 4858 continue; 4859 } 4860 pos++; 4861 } 4862 for (xp = buf; xp < bp; xp++) 4863 { 4864 if (sm_io_putc(mci->mci_out, 4865 SM_TIME_DEFAULT, 4866 (unsigned char) *xp) 4867 == SM_IO_EOF) 4868 { 4869 dead = true; 4870 break; 4871 } 4872 } 4873 if (dead) 4874 continue; 4875 if (c == '\n') 4876 { 4877 if (sm_io_fputs(mci->mci_out, 4878 SM_TIME_DEFAULT, 4879 mci->mci_mailer->m_eol) 4880 == SM_IO_EOF) 4881 break; 4882 pos = 0; 4883 } 4884 else 4885 { 4886 pos += bp - buf; 4887 if (c != '\r') 4888 { 4889 SM_ASSERT(pbp < peekbuf + 4890 sizeof(peekbuf)); 4891 *pbp++ = c; 4892 } 4893 } 4894 4895 bp = buf; 4896 4897 /* determine next state */ 4898 if (c == '\n') 4899 ostate = OSTATE_HEAD; 4900 else if (c == '\r') 4901 ostate = OSTATE_CR; 4902 else 4903 ostate = OSTATE_INLINE; 4904 continue; 4905 4906 case OSTATE_CR: 4907 if (c == '\n') 4908 { 4909 /* got CRLF */ 4910 if (sm_io_fputs(mci->mci_out, 4911 SM_TIME_DEFAULT, 4912 mci->mci_mailer->m_eol) 4913 == SM_IO_EOF) 4914 continue; 4915 4916 if (TrafficLogFile != NULL) 4917 { 4918 (void) sm_io_fputs(TrafficLogFile, 4919 SM_TIME_DEFAULT, 4920 mci->mci_mailer->m_eol); 4921 } 4922 pos = 0; 4923 ostate = OSTATE_HEAD; 4924 continue; 4925 } 4926 4927 /* had a naked carriage return */ 4928 SM_ASSERT(pbp < peekbuf + sizeof(peekbuf)); 4929 *pbp++ = c; 4930 c = '\r'; 4931 ostate = OSTATE_INLINE; 4932 goto putch; 4933 4934 case OSTATE_INLINE: 4935 if (c == '\r') 4936 { 4937 ostate = OSTATE_CR; 4938 continue; 4939 } 4940 if (c == '\0' && 4941 bitnset(M_NONULLS, 4942 mci->mci_mailer->m_flags)) 4943 break; 4944 putch: 4945 if (mci->mci_mailer->m_linelimit > 0 && 4946 pos >= mci->mci_mailer->m_linelimit - 1 && 4947 c != '\n') 4948 { 4949 int d; 4950 4951 /* check next character for EOL */ 4952 if (pbp > peekbuf) 4953 d = *(pbp - 1); 4954 else if ((d = sm_io_getc(e->e_dfp, 4955 SM_TIME_DEFAULT)) 4956 != SM_IO_EOF) 4957 { 4958 SM_ASSERT(pbp < peekbuf + 4959 sizeof(peekbuf)); 4960 *pbp++ = d; 4961 } 4962 4963 if (d == '\n' || d == SM_IO_EOF) 4964 { 4965 if (TrafficLogFile != NULL) 4966 (void) sm_io_putc(TrafficLogFile, 4967 SM_TIME_DEFAULT, 4968 (unsigned char) c); 4969 if (sm_io_putc(mci->mci_out, 4970 SM_TIME_DEFAULT, 4971 (unsigned char) c) 4972 == SM_IO_EOF) 4973 { 4974 dead = true; 4975 continue; 4976 } 4977 pos++; 4978 continue; 4979 } 4980 4981 if (sm_io_putc(mci->mci_out, 4982 SM_TIME_DEFAULT, '!') 4983 == SM_IO_EOF || 4984 sm_io_fputs(mci->mci_out, 4985 SM_TIME_DEFAULT, 4986 mci->mci_mailer->m_eol) 4987 == SM_IO_EOF) 4988 { 4989 dead = true; 4990 continue; 4991 } 4992 4993 if (TrafficLogFile != NULL) 4994 { 4995 (void) sm_io_fprintf(TrafficLogFile, 4996 SM_TIME_DEFAULT, 4997 "!%s", 4998 mci->mci_mailer->m_eol); 4999 } 5000 ostate = OSTATE_HEAD; 5001 SM_ASSERT(pbp < peekbuf + 5002 sizeof(peekbuf)); 5003 *pbp++ = c; 5004 continue; 5005 } 5006 if (c == '\n') 5007 { 5008 if (TrafficLogFile != NULL) 5009 (void) sm_io_fputs(TrafficLogFile, 5010 SM_TIME_DEFAULT, 5011 mci->mci_mailer->m_eol); 5012 if (sm_io_fputs(mci->mci_out, 5013 SM_TIME_DEFAULT, 5014 mci->mci_mailer->m_eol) 5015 == SM_IO_EOF) 5016 continue; 5017 pos = 0; 5018 ostate = OSTATE_HEAD; 5019 } 5020 else 5021 { 5022 if (TrafficLogFile != NULL) 5023 (void) sm_io_putc(TrafficLogFile, 5024 SM_TIME_DEFAULT, 5025 (unsigned char) c); 5026 if (sm_io_putc(mci->mci_out, 5027 SM_TIME_DEFAULT, 5028 (unsigned char) c) 5029 == SM_IO_EOF) 5030 { 5031 dead = true; 5032 continue; 5033 } 5034 pos++; 5035 ostate = OSTATE_INLINE; 5036 } 5037 break; 5038 } 5039 } 5040 5041 /* make sure we are at the beginning of a line */ 5042 if (bp > buf) 5043 { 5044 if (TrafficLogFile != NULL) 5045 { 5046 for (xp = buf; xp < bp; xp++) 5047 (void) sm_io_putc(TrafficLogFile, 5048 SM_TIME_DEFAULT, 5049 (unsigned char) *xp); 5050 } 5051 for (xp = buf; xp < bp; xp++) 5052 { 5053 if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT, 5054 (unsigned char) *xp) 5055 == SM_IO_EOF) 5056 { 5057 dead = true; 5058 break; 5059 } 5060 } 5061 pos += bp - buf; 5062 } 5063 if (!dead && pos > 0) 5064 { 5065 if (TrafficLogFile != NULL) 5066 (void) sm_io_fputs(TrafficLogFile, 5067 SM_TIME_DEFAULT, 5068 mci->mci_mailer->m_eol); 5069 if (sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT, 5070 mci->mci_mailer->m_eol) == SM_IO_EOF) 5071 goto writeerr; 5072 } 5073 } 5074 5075 if (sm_io_error(e->e_dfp)) 5076 { 5077 syserr("putbody: %s/%cf%s: read error", 5078 qid_printqueue(e->e_dfqgrp, e->e_dfqdir), 5079 DATAFL_LETTER, e->e_id); 5080 ExitStat = EX_IOERR; 5081 ioerr = true; 5082 } 5083 5084 endofmessage: 5085 /* 5086 ** Since mailfile() uses e_dfp in a child process, 5087 ** the file offset in the stdio library for the 5088 ** parent process will not agree with the in-kernel 5089 ** file offset since the file descriptor is shared 5090 ** between the processes. Therefore, it is vital 5091 ** that the file always be rewound. This forces the 5092 ** kernel offset (lseek) and stdio library (ftell) 5093 ** offset to match. 5094 */ 5095 5096 save_errno = errno; 5097 if (e->e_dfp != NULL) 5098 (void) bfrewind(e->e_dfp); 5099 5100 /* some mailers want extra blank line at end of message */ 5101 if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) && 5102 buf[0] != '\0' && buf[0] != '\n') 5103 { 5104 if (!putline("", mci)) 5105 goto writeerr; 5106 } 5107 5108 if (!dead && 5109 (sm_io_flush(mci->mci_out, SM_TIME_DEFAULT) == SM_IO_EOF || 5110 (sm_io_error(mci->mci_out) && errno != EPIPE))) 5111 { 5112 save_errno = errno; 5113 syserr("putbody: write error"); 5114 ExitStat = EX_IOERR; 5115 ioerr = true; 5116 } 5117 5118 errno = save_errno; 5119 return !dead && !ioerr; 5120 5121 writeerr: 5122 return false; 5123 } 5124 5125 /* 5126 ** MAILFILE -- Send a message to a file. 5127 ** 5128 ** If the file has the set-user-ID/set-group-ID bits set, but NO 5129 ** execute bits, sendmail will try to become the owner of that file 5130 ** rather than the real user. Obviously, this only works if 5131 ** sendmail runs as root. 5132 ** 5133 ** This could be done as a subordinate mailer, except that it 5134 ** is used implicitly to save messages in ~/dead.letter. We 5135 ** view this as being sufficiently important as to include it 5136 ** here. For example, if the system is dying, we shouldn't have 5137 ** to create another process plus some pipes to save the message. 5138 ** 5139 ** Parameters: 5140 ** filename -- the name of the file to send to. 5141 ** mailer -- mailer definition for recipient -- if NULL, 5142 ** use FileMailer. 5143 ** ctladdr -- the controlling address header -- includes 5144 ** the userid/groupid to be when sending. 5145 ** sfflags -- flags for opening. 5146 ** e -- the current envelope. 5147 ** 5148 ** Returns: 5149 ** The exit code associated with the operation. 5150 ** 5151 ** Side Effects: 5152 ** none. 5153 */ 5154 5155 # define RETURN(st) exit(st); 5156 5157 static jmp_buf CtxMailfileTimeout; 5158 5159 int 5160 mailfile(filename, mailer, ctladdr, sfflags, e) 5161 char *volatile filename; 5162 MAILER *volatile mailer; 5163 ADDRESS *ctladdr; 5164 volatile long sfflags; 5165 register ENVELOPE *e; 5166 { 5167 register SM_FILE_T *f; 5168 register pid_t pid = -1; 5169 volatile int mode; 5170 int len; 5171 off_t curoff; 5172 bool suidwarn = geteuid() == 0; 5173 char *p; 5174 char *volatile realfile; 5175 SM_EVENT *ev; 5176 char buf[MAXPATHLEN]; 5177 char targetfile[MAXPATHLEN]; 5178 5179 if (tTd(11, 1)) 5180 { 5181 sm_dprintf("mailfile %s\n ctladdr=", filename); 5182 printaddr(sm_debug_file(), ctladdr, false); 5183 } 5184 5185 if (mailer == NULL) 5186 mailer = FileMailer; 5187 5188 if (e->e_xfp != NULL) 5189 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT); 5190 5191 /* 5192 ** Special case /dev/null. This allows us to restrict file 5193 ** delivery to regular files only. 5194 */ 5195 5196 if (sm_path_isdevnull(filename)) 5197 return EX_OK; 5198 5199 /* check for 8-bit available */ 5200 if (bitset(EF_HAS8BIT, e->e_flags) && 5201 bitnset(M_7BITS, mailer->m_flags) && 5202 (bitset(EF_DONT_MIME, e->e_flags) || 5203 !(bitset(MM_MIME8BIT, MimeMode) || 5204 (bitset(EF_IS_MIME, e->e_flags) && 5205 bitset(MM_CVTMIME, MimeMode))))) 5206 { 5207 e->e_status = "5.6.3"; 5208 usrerrenh(e->e_status, 5209 "554 Cannot send 8-bit data to 7-bit destination"); 5210 errno = 0; 5211 return EX_DATAERR; 5212 } 5213 5214 /* Find the actual file */ 5215 if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0') 5216 { 5217 len = strlen(SafeFileEnv); 5218 5219 if (strncmp(SafeFileEnv, filename, len) == 0) 5220 filename += len; 5221 5222 if (len + strlen(filename) + 1 >= sizeof(targetfile)) 5223 { 5224 syserr("mailfile: filename too long (%s/%s)", 5225 SafeFileEnv, filename); 5226 return EX_CANTCREAT; 5227 } 5228 (void) sm_strlcpy(targetfile, SafeFileEnv, sizeof(targetfile)); 5229 realfile = targetfile + len; 5230 if (*filename == '/') 5231 filename++; 5232 if (*filename != '\0') 5233 { 5234 /* paranoia: trailing / should be removed in readcf */ 5235 if (targetfile[len - 1] != '/') 5236 (void) sm_strlcat(targetfile, 5237 "/", sizeof(targetfile)); 5238 (void) sm_strlcat(targetfile, filename, 5239 sizeof(targetfile)); 5240 } 5241 } 5242 else if (mailer->m_rootdir != NULL) 5243 { 5244 expand(mailer->m_rootdir, targetfile, sizeof(targetfile), e); 5245 len = strlen(targetfile); 5246 5247 if (strncmp(targetfile, filename, len) == 0) 5248 filename += len; 5249 5250 if (len + strlen(filename) + 1 >= sizeof(targetfile)) 5251 { 5252 syserr("mailfile: filename too long (%s/%s)", 5253 targetfile, filename); 5254 return EX_CANTCREAT; 5255 } 5256 realfile = targetfile + len; 5257 if (targetfile[len - 1] != '/') 5258 (void) sm_strlcat(targetfile, "/", sizeof(targetfile)); 5259 if (*filename == '/') 5260 (void) sm_strlcat(targetfile, filename + 1, 5261 sizeof(targetfile)); 5262 else 5263 (void) sm_strlcat(targetfile, filename, 5264 sizeof(targetfile)); 5265 } 5266 else 5267 { 5268 if (sm_strlcpy(targetfile, filename, sizeof(targetfile)) >= 5269 sizeof(targetfile)) 5270 { 5271 syserr("mailfile: filename too long (%s)", filename); 5272 return EX_CANTCREAT; 5273 } 5274 realfile = targetfile; 5275 } 5276 5277 /* 5278 ** Fork so we can change permissions here. 5279 ** Note that we MUST use fork, not vfork, because of 5280 ** the complications of calling subroutines, etc. 5281 */ 5282 5283 5284 /* 5285 ** Dispose of SIGCHLD signal catchers that may be laying 5286 ** around so that the waitfor() below will get it. 5287 */ 5288 5289 (void) sm_signal(SIGCHLD, SIG_DFL); 5290 5291 DOFORK(fork); 5292 5293 if (pid < 0) 5294 return EX_OSERR; 5295 else if (pid == 0) 5296 { 5297 /* child -- actually write to file */ 5298 struct stat stb; 5299 MCI mcibuf; 5300 int err; 5301 volatile int oflags = O_WRONLY|O_APPEND; 5302 5303 /* Reset global flags */ 5304 RestartRequest = NULL; 5305 RestartWorkGroup = false; 5306 ShutdownRequest = NULL; 5307 PendingSignal = 0; 5308 CurrentPid = getpid(); 5309 5310 if (e->e_lockfp != NULL) 5311 { 5312 int fd; 5313 5314 fd = sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, NULL); 5315 /* SM_ASSERT(fd >= 0); */ 5316 if (fd >= 0) 5317 (void) close(fd); 5318 } 5319 5320 (void) sm_signal(SIGINT, SIG_DFL); 5321 (void) sm_signal(SIGHUP, SIG_DFL); 5322 (void) sm_signal(SIGTERM, SIG_DFL); 5323 (void) umask(OldUmask); 5324 e->e_to = filename; 5325 ExitStat = EX_OK; 5326 5327 if (setjmp(CtxMailfileTimeout) != 0) 5328 { 5329 RETURN(EX_TEMPFAIL); 5330 } 5331 5332 if (TimeOuts.to_fileopen > 0) 5333 ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout, 5334 0); 5335 else 5336 ev = NULL; 5337 5338 /* check file mode to see if set-user-ID */ 5339 if (stat(targetfile, &stb) < 0) 5340 mode = FileMode; 5341 else 5342 mode = stb.st_mode; 5343 5344 /* limit the errors to those actually caused in the child */ 5345 errno = 0; 5346 ExitStat = EX_OK; 5347 5348 /* Allow alias expansions to use the S_IS{U,G}ID bits */ 5349 if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) || 5350 bitset(SFF_RUNASREALUID, sfflags)) 5351 { 5352 /* ignore set-user-ID and set-group-ID bits */ 5353 mode &= ~(S_ISGID|S_ISUID); 5354 if (tTd(11, 20)) 5355 sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n"); 5356 } 5357 5358 /* we have to open the data file BEFORE setuid() */ 5359 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags)) 5360 { 5361 char *df = queuename(e, DATAFL_LETTER); 5362 5363 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df, 5364 SM_IO_RDONLY_B, NULL); 5365 if (e->e_dfp == NULL) 5366 { 5367 syserr("mailfile: Cannot open %s for %s from %s", 5368 df, e->e_to, e->e_from.q_paddr); 5369 } 5370 } 5371 5372 /* select a new user to run as */ 5373 if (!bitset(SFF_RUNASREALUID, sfflags)) 5374 { 5375 if (bitnset(M_SPECIFIC_UID, mailer->m_flags)) 5376 { 5377 RealUserName = NULL; 5378 if (mailer->m_uid == NO_UID) 5379 RealUid = RunAsUid; 5380 else 5381 RealUid = mailer->m_uid; 5382 if (RunAsUid != 0 && RealUid != RunAsUid) 5383 { 5384 /* Only root can change the uid */ 5385 syserr("mailfile: insufficient privileges to change uid, RunAsUid=%ld, RealUid=%ld", 5386 (long) RunAsUid, (long) RealUid); 5387 RETURN(EX_TEMPFAIL); 5388 } 5389 } 5390 else if (bitset(S_ISUID, mode)) 5391 { 5392 RealUserName = NULL; 5393 RealUid = stb.st_uid; 5394 } 5395 else if (ctladdr != NULL && ctladdr->q_uid != 0) 5396 { 5397 if (ctladdr->q_ruser != NULL) 5398 RealUserName = ctladdr->q_ruser; 5399 else 5400 RealUserName = ctladdr->q_user; 5401 RealUid = ctladdr->q_uid; 5402 } 5403 else if (mailer != NULL && mailer->m_uid != NO_UID) 5404 { 5405 RealUserName = DefUser; 5406 RealUid = mailer->m_uid; 5407 } 5408 else 5409 { 5410 RealUserName = DefUser; 5411 RealUid = DefUid; 5412 } 5413 5414 /* select a new group to run as */ 5415 if (bitnset(M_SPECIFIC_UID, mailer->m_flags)) 5416 { 5417 if (mailer->m_gid == NO_GID) 5418 RealGid = RunAsGid; 5419 else 5420 RealGid = mailer->m_gid; 5421 if (RunAsUid != 0 && 5422 (RealGid != getgid() || 5423 RealGid != getegid())) 5424 { 5425 /* Only root can change the gid */ 5426 syserr("mailfile: insufficient privileges to change gid, RealGid=%ld, RunAsUid=%ld, gid=%ld, egid=%ld", 5427 (long) RealGid, (long) RunAsUid, 5428 (long) getgid(), (long) getegid()); 5429 RETURN(EX_TEMPFAIL); 5430 } 5431 } 5432 else if (bitset(S_ISGID, mode)) 5433 RealGid = stb.st_gid; 5434 else if (ctladdr != NULL && 5435 ctladdr->q_uid == DefUid && 5436 ctladdr->q_gid == 0) 5437 { 5438 /* 5439 ** Special case: This means it is an 5440 ** alias and we should act as DefaultUser. 5441 ** See alias()'s comments. 5442 */ 5443 5444 RealGid = DefGid; 5445 RealUserName = DefUser; 5446 } 5447 else if (ctladdr != NULL && ctladdr->q_uid != 0) 5448 RealGid = ctladdr->q_gid; 5449 else if (mailer != NULL && mailer->m_gid != NO_GID) 5450 RealGid = mailer->m_gid; 5451 else 5452 RealGid = DefGid; 5453 } 5454 5455 /* last ditch */ 5456 if (!bitset(SFF_ROOTOK, sfflags)) 5457 { 5458 if (RealUid == 0) 5459 RealUid = DefUid; 5460 if (RealGid == 0) 5461 RealGid = DefGid; 5462 } 5463 5464 /* set group id list (needs /etc/group access) */ 5465 if (RealUserName != NULL && !DontInitGroups) 5466 { 5467 if (initgroups(RealUserName, RealGid) == -1 && suidwarn) 5468 { 5469 syserr("mailfile: initgroups(%s, %ld) failed", 5470 RealUserName, (long) RealGid); 5471 RETURN(EX_TEMPFAIL); 5472 } 5473 } 5474 else 5475 { 5476 GIDSET_T gidset[1]; 5477 5478 gidset[0] = RealGid; 5479 if (setgroups(1, gidset) == -1 && suidwarn) 5480 { 5481 syserr("mailfile: setgroups() failed"); 5482 RETURN(EX_TEMPFAIL); 5483 } 5484 } 5485 5486 /* 5487 ** If you have a safe environment, go into it. 5488 */ 5489 5490 if (realfile != targetfile) 5491 { 5492 char save; 5493 5494 save = *realfile; 5495 *realfile = '\0'; 5496 if (tTd(11, 20)) 5497 sm_dprintf("mailfile: chroot %s\n", targetfile); 5498 if (chroot(targetfile) < 0) 5499 { 5500 syserr("mailfile: Cannot chroot(%s)", 5501 targetfile); 5502 RETURN(EX_CANTCREAT); 5503 } 5504 *realfile = save; 5505 } 5506 5507 if (tTd(11, 40)) 5508 sm_dprintf("mailfile: deliver to %s\n", realfile); 5509 5510 if (chdir("/") < 0) 5511 { 5512 syserr("mailfile: cannot chdir(/)"); 5513 RETURN(EX_CANTCREAT); 5514 } 5515 5516 /* now reset the group and user ids */ 5517 endpwent(); 5518 sm_mbdb_terminate(); 5519 if (setgid(RealGid) < 0 && suidwarn) 5520 { 5521 syserr("mailfile: setgid(%ld) failed", (long) RealGid); 5522 RETURN(EX_TEMPFAIL); 5523 } 5524 vendor_set_uid(RealUid); 5525 if (setuid(RealUid) < 0 && suidwarn) 5526 { 5527 syserr("mailfile: setuid(%ld) failed", (long) RealUid); 5528 RETURN(EX_TEMPFAIL); 5529 } 5530 5531 if (tTd(11, 2)) 5532 sm_dprintf("mailfile: running as r/euid=%ld/%ld, r/egid=%ld/%ld\n", 5533 (long) getuid(), (long) geteuid(), 5534 (long) getgid(), (long) getegid()); 5535 5536 5537 /* move into some "safe" directory */ 5538 if (mailer->m_execdir != NULL) 5539 { 5540 char *q; 5541 5542 for (p = mailer->m_execdir; p != NULL; p = q) 5543 { 5544 q = strchr(p, ':'); 5545 if (q != NULL) 5546 *q = '\0'; 5547 expand(p, buf, sizeof(buf), e); 5548 if (q != NULL) 5549 *q++ = ':'; 5550 if (tTd(11, 20)) 5551 sm_dprintf("mailfile: trydir %s\n", 5552 buf); 5553 if (buf[0] != '\0' && chdir(buf) >= 0) 5554 break; 5555 } 5556 } 5557 5558 /* 5559 ** Recheck the file after we have assumed the ID of the 5560 ** delivery user to make sure we can deliver to it as 5561 ** that user. This is necessary if sendmail is running 5562 ** as root and the file is on an NFS mount which treats 5563 ** root as nobody. 5564 */ 5565 5566 #if HASLSTAT 5567 if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail)) 5568 err = stat(realfile, &stb); 5569 else 5570 err = lstat(realfile, &stb); 5571 #else /* HASLSTAT */ 5572 err = stat(realfile, &stb); 5573 #endif /* HASLSTAT */ 5574 5575 if (err < 0) 5576 { 5577 stb.st_mode = ST_MODE_NOFILE; 5578 mode = FileMode; 5579 oflags |= O_CREAT|O_EXCL; 5580 } 5581 else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) || 5582 (!bitnset(DBS_FILEDELIVERYTOHARDLINK, 5583 DontBlameSendmail) && 5584 stb.st_nlink != 1) || 5585 (realfile != targetfile && !S_ISREG(mode))) 5586 exit(EX_CANTCREAT); 5587 else 5588 mode = stb.st_mode; 5589 5590 if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail)) 5591 sfflags |= SFF_NOSLINK; 5592 if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail)) 5593 sfflags |= SFF_NOHLINK; 5594 sfflags &= ~SFF_OPENASROOT; 5595 f = safefopen(realfile, oflags, mode, sfflags); 5596 if (f == NULL) 5597 { 5598 if (transienterror(errno)) 5599 { 5600 usrerr("454 4.3.0 cannot open %s: %s", 5601 shortenstring(realfile, MAXSHORTSTR), 5602 sm_errstring(errno)); 5603 RETURN(EX_TEMPFAIL); 5604 } 5605 else 5606 { 5607 usrerr("554 5.3.0 cannot open %s: %s", 5608 shortenstring(realfile, MAXSHORTSTR), 5609 sm_errstring(errno)); 5610 RETURN(EX_CANTCREAT); 5611 } 5612 } 5613 if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), 5614 &stb)) 5615 { 5616 syserr("554 5.3.0 file changed after open"); 5617 RETURN(EX_CANTCREAT); 5618 } 5619 if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0) 5620 { 5621 syserr("554 5.3.0 cannot fstat %s", 5622 sm_errstring(errno)); 5623 RETURN(EX_CANTCREAT); 5624 } 5625 5626 curoff = stb.st_size; 5627 5628 if (ev != NULL) 5629 sm_clrevent(ev); 5630 5631 memset(&mcibuf, '\0', sizeof(mcibuf)); 5632 mcibuf.mci_mailer = mailer; 5633 mcibuf.mci_out = f; 5634 if (bitnset(M_7BITS, mailer->m_flags)) 5635 mcibuf.mci_flags |= MCIF_7BIT; 5636 5637 /* clear out per-message flags from connection structure */ 5638 mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7); 5639 5640 if (bitset(EF_HAS8BIT, e->e_flags) && 5641 !bitset(EF_DONT_MIME, e->e_flags) && 5642 bitnset(M_7BITS, mailer->m_flags)) 5643 mcibuf.mci_flags |= MCIF_CVT8TO7; 5644 5645 #if MIME7TO8 5646 if (bitnset(M_MAKE8BIT, mailer->m_flags) && 5647 !bitset(MCIF_7BIT, mcibuf.mci_flags) && 5648 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL && 5649 (sm_strcasecmp(p, "quoted-printable") == 0 || 5650 sm_strcasecmp(p, "base64") == 0) && 5651 (p = hvalue("Content-Type", e->e_header)) != NULL) 5652 { 5653 /* may want to convert 7 -> 8 */ 5654 /* XXX should really parse it here -- and use a class XXX */ 5655 if (sm_strncasecmp(p, "text/plain", 10) == 0 && 5656 (p[10] == '\0' || p[10] == ' ' || p[10] == ';')) 5657 mcibuf.mci_flags |= MCIF_CVT7TO8; 5658 } 5659 #endif /* MIME7TO8 */ 5660 5661 if (!putfromline(&mcibuf, e) || 5662 !(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER) || 5663 !(*e->e_putbody)(&mcibuf, e, NULL) || 5664 !putline("\n", &mcibuf) || 5665 (sm_io_flush(f, SM_TIME_DEFAULT) != 0 || 5666 (SuperSafe != SAFE_NO && 5667 fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) || 5668 sm_io_error(f))) 5669 { 5670 setstat(EX_IOERR); 5671 #if !NOFTRUNCATE 5672 (void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), 5673 curoff); 5674 #endif /* !NOFTRUNCATE */ 5675 } 5676 5677 /* reset ISUID & ISGID bits for paranoid systems */ 5678 #if HASFCHMOD 5679 (void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), 5680 (MODE_T) mode); 5681 #else /* HASFCHMOD */ 5682 (void) chmod(filename, (MODE_T) mode); 5683 #endif /* HASFCHMOD */ 5684 if (sm_io_close(f, SM_TIME_DEFAULT) < 0) 5685 setstat(EX_IOERR); 5686 (void) sm_io_flush(smioout, SM_TIME_DEFAULT); 5687 (void) setuid(RealUid); 5688 exit(ExitStat); 5689 /* NOTREACHED */ 5690 } 5691 else 5692 { 5693 /* parent -- wait for exit status */ 5694 int st; 5695 5696 st = waitfor(pid); 5697 if (st == -1) 5698 { 5699 syserr("mailfile: %s: wait", mailer->m_name); 5700 return EX_SOFTWARE; 5701 } 5702 if (WIFEXITED(st)) 5703 { 5704 errno = 0; 5705 return (WEXITSTATUS(st)); 5706 } 5707 else 5708 { 5709 syserr("mailfile: %s: child died on signal %d", 5710 mailer->m_name, st); 5711 return EX_UNAVAILABLE; 5712 } 5713 /* NOTREACHED */ 5714 } 5715 return EX_UNAVAILABLE; /* avoid compiler warning on IRIX */ 5716 } 5717 5718 static void 5719 mailfiletimeout(ignore) 5720 int ignore; 5721 { 5722 /* 5723 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 5724 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 5725 ** DOING. 5726 */ 5727 5728 errno = ETIMEDOUT; 5729 longjmp(CtxMailfileTimeout, 1); 5730 } 5731 /* 5732 ** HOSTSIGNATURE -- return the "signature" for a host. 5733 ** 5734 ** The signature describes how we are going to send this -- it 5735 ** can be just the hostname (for non-Internet hosts) or can be 5736 ** an ordered list of MX hosts. 5737 ** 5738 ** Parameters: 5739 ** m -- the mailer describing this host. 5740 ** host -- the host name. 5741 ** 5742 ** Returns: 5743 ** The signature for this host. 5744 ** 5745 ** Side Effects: 5746 ** Can tweak the symbol table. 5747 */ 5748 5749 #define MAXHOSTSIGNATURE 8192 /* max len of hostsignature */ 5750 5751 char * 5752 hostsignature(m, host) 5753 register MAILER *m; 5754 char *host; 5755 { 5756 register char *p; 5757 register STAB *s; 5758 time_t now; 5759 #if NAMED_BIND 5760 char sep = ':'; 5761 char prevsep = ':'; 5762 int i; 5763 int len; 5764 int nmx; 5765 int hl; 5766 char *hp; 5767 char *endp; 5768 int oldoptions = _res.options; 5769 char *mxhosts[MAXMXHOSTS + 1]; 5770 unsigned short mxprefs[MAXMXHOSTS + 1]; 5771 #endif /* NAMED_BIND */ 5772 5773 if (tTd(17, 3)) 5774 sm_dprintf("hostsignature(%s)\n", host); 5775 5776 /* 5777 ** If local delivery (and not remote), just return a constant. 5778 */ 5779 5780 if (bitnset(M_LOCALMAILER, m->m_flags) && 5781 strcmp(m->m_mailer, "[IPC]") != 0 && 5782 !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0)) 5783 return "localhost"; 5784 5785 /* an empty host does not have MX records */ 5786 if (*host == '\0') 5787 return "_empty_"; 5788 5789 /* 5790 ** Check to see if this uses IPC -- if not, it can't have MX records. 5791 */ 5792 5793 if (strcmp(m->m_mailer, "[IPC]") != 0 || 5794 CurEnv->e_sendmode == SM_DEFER) 5795 { 5796 /* just an ordinary mailer or deferred mode */ 5797 return host; 5798 } 5799 #if NETUNIX 5800 else if (m->m_argv[0] != NULL && 5801 strcmp(m->m_argv[0], "FILE") == 0) 5802 { 5803 /* rendezvous in the file system, no MX records */ 5804 return host; 5805 } 5806 #endif /* NETUNIX */ 5807 5808 /* 5809 ** Look it up in the symbol table. 5810 */ 5811 5812 now = curtime(); 5813 s = stab(host, ST_HOSTSIG, ST_ENTER); 5814 if (s->s_hostsig.hs_sig != NULL) 5815 { 5816 if (s->s_hostsig.hs_exp >= now) 5817 { 5818 if (tTd(17, 3)) 5819 sm_dprintf("hostsignature(): stab(%s) found %s\n", host, 5820 s->s_hostsig.hs_sig); 5821 return s->s_hostsig.hs_sig; 5822 } 5823 5824 /* signature is expired: clear it */ 5825 sm_free(s->s_hostsig.hs_sig); 5826 s->s_hostsig.hs_sig = NULL; 5827 } 5828 5829 /* set default TTL */ 5830 s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL; 5831 5832 /* 5833 ** Not already there or expired -- create a signature. 5834 */ 5835 5836 #if NAMED_BIND 5837 if (ConfigLevel < 2) 5838 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */ 5839 5840 for (hp = host; hp != NULL; hp = endp) 5841 { 5842 #if NETINET6 5843 if (*hp == '[') 5844 { 5845 endp = strchr(hp + 1, ']'); 5846 if (endp != NULL) 5847 endp = strpbrk(endp + 1, ":,"); 5848 } 5849 else 5850 endp = strpbrk(hp, ":,"); 5851 #else /* NETINET6 */ 5852 endp = strpbrk(hp, ":,"); 5853 #endif /* NETINET6 */ 5854 if (endp != NULL) 5855 { 5856 sep = *endp; 5857 *endp = '\0'; 5858 } 5859 5860 if (bitnset(M_NOMX, m->m_flags)) 5861 { 5862 /* skip MX lookups */ 5863 nmx = 1; 5864 mxhosts[0] = hp; 5865 } 5866 else 5867 { 5868 auto int rcode; 5869 int ttl; 5870 5871 nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true, 5872 &ttl); 5873 if (nmx <= 0) 5874 { 5875 int save_errno; 5876 register MCI *mci; 5877 5878 /* update the connection info for this host */ 5879 save_errno = errno; 5880 mci = mci_get(hp, m); 5881 mci->mci_errno = save_errno; 5882 mci->mci_herrno = h_errno; 5883 mci->mci_lastuse = now; 5884 if (rcode == EX_NOHOST) 5885 mci_setstat(mci, rcode, "5.1.2", 5886 "550 Host unknown"); 5887 else 5888 mci_setstat(mci, rcode, NULL, NULL); 5889 5890 /* use the original host name as signature */ 5891 nmx = 1; 5892 mxhosts[0] = hp; 5893 } 5894 if (tTd(17, 3)) 5895 sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n", 5896 nmx, mxhosts[0]); 5897 5898 /* 5899 ** Set new TTL: we use only one! 5900 ** We could try to use the minimum instead. 5901 */ 5902 5903 s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL); 5904 } 5905 5906 len = 0; 5907 for (i = 0; i < nmx; i++) 5908 len += strlen(mxhosts[i]) + 1; 5909 if (s->s_hostsig.hs_sig != NULL) 5910 len += strlen(s->s_hostsig.hs_sig) + 1; 5911 if (len < 0 || len >= MAXHOSTSIGNATURE) 5912 { 5913 sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d", 5914 host, MAXHOSTSIGNATURE, len); 5915 len = MAXHOSTSIGNATURE; 5916 } 5917 p = sm_pmalloc_x(len); 5918 if (s->s_hostsig.hs_sig != NULL) 5919 { 5920 (void) sm_strlcpy(p, s->s_hostsig.hs_sig, len); 5921 sm_free(s->s_hostsig.hs_sig); /* XXX */ 5922 s->s_hostsig.hs_sig = p; 5923 hl = strlen(p); 5924 p += hl; 5925 *p++ = prevsep; 5926 len -= hl + 1; 5927 } 5928 else 5929 s->s_hostsig.hs_sig = p; 5930 for (i = 0; i < nmx; i++) 5931 { 5932 hl = strlen(mxhosts[i]); 5933 if (len - 1 < hl || len <= 1) 5934 { 5935 /* force to drop out of outer loop */ 5936 len = -1; 5937 break; 5938 } 5939 if (i != 0) 5940 { 5941 if (mxprefs[i] == mxprefs[i - 1]) 5942 *p++ = ','; 5943 else 5944 *p++ = ':'; 5945 len--; 5946 } 5947 (void) sm_strlcpy(p, mxhosts[i], len); 5948 p += hl; 5949 len -= hl; 5950 } 5951 5952 /* 5953 ** break out of loop if len exceeded MAXHOSTSIGNATURE 5954 ** because we won't have more space for further hosts 5955 ** anyway (separated by : in the .cf file). 5956 */ 5957 5958 if (len < 0) 5959 break; 5960 if (endp != NULL) 5961 *endp++ = sep; 5962 prevsep = sep; 5963 } 5964 makelower(s->s_hostsig.hs_sig); 5965 if (ConfigLevel < 2) 5966 _res.options = oldoptions; 5967 #else /* NAMED_BIND */ 5968 /* not using BIND -- the signature is just the host name */ 5969 /* 5970 ** 'host' points to storage that will be freed after we are 5971 ** done processing the current envelope, so we copy it. 5972 */ 5973 s->s_hostsig.hs_sig = sm_pstrdup_x(host); 5974 #endif /* NAMED_BIND */ 5975 if (tTd(17, 1)) 5976 sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig); 5977 return s->s_hostsig.hs_sig; 5978 } 5979 /* 5980 ** PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array. 5981 ** 5982 ** The signature describes how we are going to send this -- it 5983 ** can be just the hostname (for non-Internet hosts) or can be 5984 ** an ordered list of MX hosts which must be randomized for equal 5985 ** MX preference values. 5986 ** 5987 ** Parameters: 5988 ** sig -- the host signature. 5989 ** mxhosts -- array to populate. 5990 ** mailer -- mailer. 5991 ** 5992 ** Returns: 5993 ** The number of hosts inserted into mxhosts array. 5994 ** 5995 ** Side Effects: 5996 ** Randomizes equal MX preference hosts in mxhosts. 5997 */ 5998 5999 static int 6000 parse_hostsignature(sig, mxhosts, mailer) 6001 char *sig; 6002 char **mxhosts; 6003 MAILER *mailer; 6004 { 6005 unsigned short curpref = 0; 6006 int nmx = 0, i, j; /* NOTE: i, j, and nmx must have same type */ 6007 char *hp, *endp; 6008 unsigned short prefer[MAXMXHOSTS]; 6009 long rndm[MAXMXHOSTS]; 6010 6011 for (hp = sig; hp != NULL; hp = endp) 6012 { 6013 char sep = ':'; 6014 6015 #if NETINET6 6016 if (*hp == '[') 6017 { 6018 endp = strchr(hp + 1, ']'); 6019 if (endp != NULL) 6020 endp = strpbrk(endp + 1, ":,"); 6021 } 6022 else 6023 endp = strpbrk(hp, ":,"); 6024 #else /* NETINET6 */ 6025 endp = strpbrk(hp, ":,"); 6026 #endif /* NETINET6 */ 6027 if (endp != NULL) 6028 { 6029 sep = *endp; 6030 *endp = '\0'; 6031 } 6032 6033 mxhosts[nmx] = hp; 6034 prefer[nmx] = curpref; 6035 if (mci_match(hp, mailer)) 6036 rndm[nmx] = 0; 6037 else 6038 rndm[nmx] = get_random(); 6039 6040 if (endp != NULL) 6041 { 6042 /* 6043 ** Since we don't have the original MX prefs, 6044 ** make our own. If the separator is a ':', that 6045 ** means the preference for the next host will be 6046 ** higher than this one, so simply increment curpref. 6047 */ 6048 6049 if (sep == ':') 6050 curpref++; 6051 6052 *endp++ = sep; 6053 } 6054 if (++nmx >= MAXMXHOSTS) 6055 break; 6056 } 6057 6058 /* sort the records using the random factor for equal preferences */ 6059 for (i = 0; i < nmx; i++) 6060 { 6061 for (j = i + 1; j < nmx; j++) 6062 { 6063 /* 6064 ** List is already sorted by MX preference, only 6065 ** need to look for equal preference MX records 6066 */ 6067 6068 if (prefer[i] < prefer[j]) 6069 break; 6070 6071 if (prefer[i] > prefer[j] || 6072 (prefer[i] == prefer[j] && rndm[i] > rndm[j])) 6073 { 6074 register unsigned short tempp; 6075 register long tempr; 6076 register char *temp1; 6077 6078 tempp = prefer[i]; 6079 prefer[i] = prefer[j]; 6080 prefer[j] = tempp; 6081 temp1 = mxhosts[i]; 6082 mxhosts[i] = mxhosts[j]; 6083 mxhosts[j] = temp1; 6084 tempr = rndm[i]; 6085 rndm[i] = rndm[j]; 6086 rndm[j] = tempr; 6087 } 6088 } 6089 } 6090 return nmx; 6091 } 6092 6093 # if STARTTLS 6094 static SSL_CTX *clt_ctx = NULL; 6095 static bool tls_ok_clt = true; 6096 6097 /* 6098 ** SETCLTTLS -- client side TLS: allow/disallow. 6099 ** 6100 ** Parameters: 6101 ** tls_ok -- should tls be done? 6102 ** 6103 ** Returns: 6104 ** none. 6105 ** 6106 ** Side Effects: 6107 ** sets tls_ok_clt (static variable in this module) 6108 */ 6109 6110 void 6111 setclttls(tls_ok) 6112 bool tls_ok; 6113 { 6114 tls_ok_clt = tls_ok; 6115 return; 6116 } 6117 /* 6118 ** INITCLTTLS -- initialize client side TLS 6119 ** 6120 ** Parameters: 6121 ** tls_ok -- should tls initialization be done? 6122 ** 6123 ** Returns: 6124 ** succeeded? 6125 ** 6126 ** Side Effects: 6127 ** sets tls_ok_clt (static variable in this module) 6128 */ 6129 6130 bool 6131 initclttls(tls_ok) 6132 bool tls_ok; 6133 { 6134 if (!tls_ok_clt) 6135 return false; 6136 tls_ok_clt = tls_ok; 6137 if (!tls_ok_clt) 6138 return false; 6139 if (clt_ctx != NULL) 6140 return true; /* already done */ 6141 tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, Clt_SSL_Options, false, 6142 CltCertFile, CltKeyFile, 6143 CACertPath, CACertFile, DHParams); 6144 return tls_ok_clt; 6145 } 6146 6147 /* 6148 ** STARTTLS -- try to start secure connection (client side) 6149 ** 6150 ** Parameters: 6151 ** m -- the mailer. 6152 ** mci -- the mailer connection info. 6153 ** e -- the envelope. 6154 ** 6155 ** Returns: 6156 ** success? 6157 ** (maybe this should be some other code than EX_ 6158 ** that denotes which stage failed.) 6159 */ 6160 6161 static int 6162 starttls(m, mci, e) 6163 MAILER *m; 6164 MCI *mci; 6165 ENVELOPE *e; 6166 { 6167 int smtpresult; 6168 int result = 0; 6169 int rfd, wfd; 6170 SSL *clt_ssl = NULL; 6171 time_t tlsstart; 6172 6173 if (clt_ctx == NULL && !initclttls(true)) 6174 return EX_TEMPFAIL; 6175 6176 # if USE_OPENSSL_ENGINE 6177 if (!SSLEngineInitialized && !SSL_set_engine(NULL)) 6178 { 6179 sm_syslog(LOG_ERR, NOQID, 6180 "STARTTLS=client, SSL_set_engine=failed"); 6181 return EX_TEMPFAIL; 6182 } 6183 SSLEngineInitialized = true; 6184 # endif /* USE_OPENSSL_ENGINE */ 6185 6186 smtpmessage("STARTTLS", m, mci); 6187 6188 /* get the reply */ 6189 smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL, 6190 XS_STARTTLS); 6191 6192 /* check return code from server */ 6193 if (REPLYTYPE(smtpresult) == 4) 6194 return EX_TEMPFAIL; 6195 if (smtpresult == 501) 6196 return EX_USAGE; 6197 if (smtpresult == -1) 6198 return smtpresult; 6199 6200 /* not an expected reply but we have to deal with it */ 6201 if (REPLYTYPE(smtpresult) == 5) 6202 return EX_UNAVAILABLE; 6203 if (smtpresult != 220) 6204 return EX_PROTOCOL; 6205 6206 if (LogLevel > 13) 6207 sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok"); 6208 6209 /* start connection */ 6210 if ((clt_ssl = SSL_new(clt_ctx)) == NULL) 6211 { 6212 if (LogLevel > 5) 6213 { 6214 sm_syslog(LOG_ERR, NOQID, 6215 "STARTTLS=client, error: SSL_new failed"); 6216 if (LogLevel > 9) 6217 tlslogerr(LOG_WARNING, "client"); 6218 } 6219 return EX_SOFTWARE; 6220 } 6221 /* SSL_clear(clt_ssl); ? */ 6222 6223 if (get_tls_se_options(e, clt_ssl, false) != 0) 6224 { 6225 sm_syslog(LOG_ERR, NOQID, 6226 "STARTTLS=client, get_tls_se_options=fail"); 6227 return EX_SOFTWARE; 6228 } 6229 6230 rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL); 6231 wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL); 6232 6233 if (rfd < 0 || wfd < 0 || 6234 (result = SSL_set_rfd(clt_ssl, rfd)) != 1 || 6235 (result = SSL_set_wfd(clt_ssl, wfd)) != 1) 6236 { 6237 if (LogLevel > 5) 6238 { 6239 sm_syslog(LOG_ERR, NOQID, 6240 "STARTTLS=client, error: SSL_set_xfd failed=%d", 6241 result); 6242 if (LogLevel > 9) 6243 tlslogerr(LOG_WARNING, "client"); 6244 } 6245 return EX_SOFTWARE; 6246 } 6247 SSL_set_connect_state(clt_ssl); 6248 tlsstart = curtime(); 6249 6250 ssl_retry: 6251 if ((result = SSL_connect(clt_ssl)) <= 0) 6252 { 6253 int i, ssl_err; 6254 int save_errno = errno; 6255 6256 ssl_err = SSL_get_error(clt_ssl, result); 6257 i = tls_retry(clt_ssl, rfd, wfd, tlsstart, 6258 TimeOuts.to_starttls, ssl_err, "client"); 6259 if (i > 0) 6260 goto ssl_retry; 6261 6262 if (LogLevel > 5) 6263 { 6264 unsigned long l; 6265 const char *sr; 6266 6267 l = ERR_peek_error(); 6268 sr = ERR_reason_error_string(l); 6269 sm_syslog(LOG_WARNING, NOQID, 6270 "STARTTLS=client, error: connect failed=%d, reason=%s, SSL_error=%d, errno=%d, retry=%d", 6271 result, sr == NULL ? "unknown" : sr, ssl_err, 6272 save_errno, i); 6273 if (LogLevel > 9) 6274 tlslogerr(LOG_WARNING, "client"); 6275 } 6276 6277 SSL_free(clt_ssl); 6278 clt_ssl = NULL; 6279 return EX_SOFTWARE; 6280 } 6281 mci->mci_ssl = clt_ssl; 6282 result = tls_get_info(mci->mci_ssl, false, mci->mci_host, 6283 &mci->mci_macro, true); 6284 6285 /* switch to use TLS... */ 6286 if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0) 6287 return EX_OK; 6288 6289 /* failure */ 6290 SSL_free(clt_ssl); 6291 clt_ssl = NULL; 6292 return EX_SOFTWARE; 6293 } 6294 /* 6295 ** ENDTLSCLT -- shutdown secure connection (client side) 6296 ** 6297 ** Parameters: 6298 ** mci -- the mailer connection info. 6299 ** 6300 ** Returns: 6301 ** success? 6302 */ 6303 6304 static int 6305 endtlsclt(mci) 6306 MCI *mci; 6307 { 6308 int r; 6309 6310 if (!bitset(MCIF_TLSACT, mci->mci_flags)) 6311 return EX_OK; 6312 r = endtls(mci->mci_ssl, "client"); 6313 mci->mci_flags &= ~MCIF_TLSACT; 6314 return r; 6315 } 6316 # endif /* STARTTLS */ 6317 # if STARTTLS || SASL 6318 /* 6319 ** ISCLTFLGSET -- check whether client flag is set. 6320 ** 6321 ** Parameters: 6322 ** e -- envelope. 6323 ** flag -- flag to check in {client_flags} 6324 ** 6325 ** Returns: 6326 ** true iff flag is set. 6327 */ 6328 6329 static bool 6330 iscltflgset(e, flag) 6331 ENVELOPE *e; 6332 int flag; 6333 { 6334 char *p; 6335 6336 p = macvalue(macid("{client_flags}"), e); 6337 if (p == NULL) 6338 return false; 6339 for (; *p != '\0'; p++) 6340 { 6341 /* look for just this one flag */ 6342 if (*p == (char) flag) 6343 return true; 6344 } 6345 return false; 6346 } 6347 # endif /* STARTTLS || SASL */ 6348