xref: /freebsd/contrib/sendmail/src/deliver.c (revision f0a75d274af375d15b97b830966b99a02b7db911)
1 /*
2  * Copyright (c) 1998-2006 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #include <sendmail.h>
15 #include <sm/time.h>
16 
17 SM_RCSID("@(#)$Id: deliver.c,v 8.1003.2.1 2006/05/23 01:32:08 ca Exp $")
18 
19 #if HASSETUSERCONTEXT
20 # include <login_cap.h>
21 #endif /* HASSETUSERCONTEXT */
22 
23 #if NETINET || NETINET6
24 # include <arpa/inet.h>
25 #endif /* NETINET || NETINET6 */
26 
27 #if STARTTLS || SASL
28 # include "sfsasl.h"
29 #endif /* STARTTLS || SASL */
30 
31 static int	deliver __P((ENVELOPE *, ADDRESS *));
32 static void	dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
33 static void	mailfiletimeout __P((int));
34 static void	endwaittimeout __P((int));
35 static int	parse_hostsignature __P((char *, char **, MAILER *));
36 static void	sendenvelope __P((ENVELOPE *, int));
37 extern MCI	*mci_new __P((SM_RPOOL_T *));
38 static int	coloncmp __P((const char *, const char *));
39 
40 #if STARTTLS
41 static int	starttls __P((MAILER *, MCI *, ENVELOPE *));
42 static int	endtlsclt __P((MCI *));
43 #endif /* STARTTLS */
44 # if STARTTLS || SASL
45 static bool	iscltflgset __P((ENVELOPE *, int));
46 # endif /* STARTTLS || SASL */
47 
48 /*
49 **  SENDALL -- actually send all the messages.
50 **
51 **	Parameters:
52 **		e -- the envelope to send.
53 **		mode -- the delivery mode to use.  If SM_DEFAULT, use
54 **			the current e->e_sendmode.
55 **
56 **	Returns:
57 **		none.
58 **
59 **	Side Effects:
60 **		Scans the send lists and sends everything it finds.
61 **		Delivers any appropriate error messages.
62 **		If we are running in a non-interactive mode, takes the
63 **			appropriate action.
64 */
65 
66 void
67 sendall(e, mode)
68 	ENVELOPE *e;
69 	int mode;
70 {
71 	register ADDRESS *q;
72 	char *owner;
73 	int otherowners;
74 	int save_errno;
75 	register ENVELOPE *ee;
76 	ENVELOPE *splitenv = NULL;
77 	int oldverbose = Verbose;
78 	bool somedeliveries = false, expensive = false;
79 	pid_t pid;
80 
81 	/*
82 	**  If this message is to be discarded, don't bother sending
83 	**  the message at all.
84 	*/
85 
86 	if (bitset(EF_DISCARD, e->e_flags))
87 	{
88 		if (tTd(13, 1))
89 			sm_dprintf("sendall: discarding id %s\n", e->e_id);
90 		e->e_flags |= EF_CLRQUEUE;
91 		if (LogLevel > 9)
92 			logundelrcpts(e, "discarded", 9, true);
93 		else if (LogLevel > 4)
94 			sm_syslog(LOG_INFO, e->e_id, "discarded");
95 		markstats(e, NULL, STATS_REJECT);
96 		return;
97 	}
98 
99 	/*
100 	**  If we have had global, fatal errors, don't bother sending
101 	**  the message at all if we are in SMTP mode.  Local errors
102 	**  (e.g., a single address failing) will still cause the other
103 	**  addresses to be sent.
104 	*/
105 
106 	if (bitset(EF_FATALERRS, e->e_flags) &&
107 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
108 	{
109 		e->e_flags |= EF_CLRQUEUE;
110 		return;
111 	}
112 
113 	/* determine actual delivery mode */
114 	if (mode == SM_DEFAULT)
115 	{
116 		mode = e->e_sendmode;
117 		if (mode != SM_VERIFY && mode != SM_DEFER &&
118 		    shouldqueue(e->e_msgpriority, e->e_ctime))
119 			mode = SM_QUEUE;
120 	}
121 
122 	if (tTd(13, 1))
123 	{
124 		sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
125 			mode, e->e_id);
126 		printaddr(sm_debug_file(), &e->e_from, false);
127 		sm_dprintf("\te_flags = ");
128 		printenvflags(e);
129 		sm_dprintf("sendqueue:\n");
130 		printaddr(sm_debug_file(), e->e_sendqueue, true);
131 	}
132 
133 	/*
134 	**  Do any preprocessing necessary for the mode we are running.
135 	**	Check to make sure the hop count is reasonable.
136 	**	Delete sends to the sender in mailing lists.
137 	*/
138 
139 	CurEnv = e;
140 	if (tTd(62, 1))
141 		checkfds(NULL);
142 
143 	if (e->e_hopcount > MaxHopCount)
144 	{
145 		char *recip;
146 
147 		if (e->e_sendqueue != NULL &&
148 		    e->e_sendqueue->q_paddr != NULL)
149 			recip = e->e_sendqueue->q_paddr;
150 		else
151 			recip = "(nobody)";
152 
153 		errno = 0;
154 		queueup(e, WILL_BE_QUEUED(mode), false);
155 		e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
156 		ExitStat = EX_UNAVAILABLE;
157 		syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
158 		       e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
159 		       RealHostName == NULL ? "localhost" : RealHostName,
160 		       recip);
161 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
162 		{
163 			if (QS_IS_DEAD(q->q_state))
164 				continue;
165 			q->q_state = QS_BADADDR;
166 			q->q_status = "5.4.6";
167 			q->q_rstatus = "554 5.4.6 Too many hops";
168 		}
169 		return;
170 	}
171 
172 	/*
173 	**  Do sender deletion.
174 	**
175 	**	If the sender should be queued up, skip this.
176 	**	This can happen if the name server is hosed when you
177 	**	are trying to send mail.  The result is that the sender
178 	**	is instantiated in the queue as a recipient.
179 	*/
180 
181 	if (!bitset(EF_METOO, e->e_flags) &&
182 	    !QS_IS_QUEUEUP(e->e_from.q_state))
183 	{
184 		if (tTd(13, 5))
185 		{
186 			sm_dprintf("sendall: QS_SENDER ");
187 			printaddr(sm_debug_file(), &e->e_from, false);
188 		}
189 		e->e_from.q_state = QS_SENDER;
190 		(void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
191 	}
192 
193 	/*
194 	**  Handle alias owners.
195 	**
196 	**	We scan up the q_alias chain looking for owners.
197 	**	We discard owners that are the same as the return path.
198 	*/
199 
200 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
201 	{
202 		register struct address *a;
203 
204 		for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
205 			continue;
206 		if (a != NULL)
207 			q->q_owner = a->q_owner;
208 
209 		if (q->q_owner != NULL &&
210 		    !QS_IS_DEAD(q->q_state) &&
211 		    strcmp(q->q_owner, e->e_from.q_paddr) == 0)
212 			q->q_owner = NULL;
213 	}
214 
215 	if (tTd(13, 25))
216 	{
217 		sm_dprintf("\nAfter first owner pass, sendq =\n");
218 		printaddr(sm_debug_file(), e->e_sendqueue, true);
219 	}
220 
221 	owner = "";
222 	otherowners = 1;
223 	while (owner != NULL && otherowners > 0)
224 	{
225 		if (tTd(13, 28))
226 			sm_dprintf("owner = \"%s\", otherowners = %d\n",
227 				   owner, otherowners);
228 		owner = NULL;
229 		otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
230 
231 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
232 		{
233 			if (tTd(13, 30))
234 			{
235 				sm_dprintf("Checking ");
236 				printaddr(sm_debug_file(), q, false);
237 			}
238 			if (QS_IS_DEAD(q->q_state))
239 			{
240 				if (tTd(13, 30))
241 					sm_dprintf("    ... QS_IS_DEAD\n");
242 				continue;
243 			}
244 			if (tTd(13, 29) && !tTd(13, 30))
245 			{
246 				sm_dprintf("Checking ");
247 				printaddr(sm_debug_file(), q, false);
248 			}
249 
250 			if (q->q_owner != NULL)
251 			{
252 				if (owner == NULL)
253 				{
254 					if (tTd(13, 40))
255 						sm_dprintf("    ... First owner = \"%s\"\n",
256 							   q->q_owner);
257 					owner = q->q_owner;
258 				}
259 				else if (owner != q->q_owner)
260 				{
261 					if (strcmp(owner, q->q_owner) == 0)
262 					{
263 						if (tTd(13, 40))
264 							sm_dprintf("    ... Same owner = \"%s\"\n",
265 								   owner);
266 
267 						/* make future comparisons cheap */
268 						q->q_owner = owner;
269 					}
270 					else
271 					{
272 						if (tTd(13, 40))
273 							sm_dprintf("    ... Another owner \"%s\"\n",
274 								   q->q_owner);
275 						otherowners++;
276 					}
277 					owner = q->q_owner;
278 				}
279 				else if (tTd(13, 40))
280 					sm_dprintf("    ... Same owner = \"%s\"\n",
281 						   owner);
282 			}
283 			else
284 			{
285 				if (tTd(13, 40))
286 					sm_dprintf("    ... Null owner\n");
287 				otherowners++;
288 			}
289 
290 			if (QS_IS_BADADDR(q->q_state))
291 			{
292 				if (tTd(13, 30))
293 					sm_dprintf("    ... QS_IS_BADADDR\n");
294 				continue;
295 			}
296 
297 			if (QS_IS_QUEUEUP(q->q_state))
298 			{
299 				MAILER *m = q->q_mailer;
300 
301 				/*
302 				**  If we have temporary address failures
303 				**  (e.g., dns failure) and a fallback MX is
304 				**  set, send directly to the fallback MX host.
305 				*/
306 
307 				if (FallbackMX != NULL &&
308 				    !wordinclass(FallbackMX, 'w') &&
309 				    mode != SM_VERIFY &&
310 				    !bitnset(M_NOMX, m->m_flags) &&
311 				    strcmp(m->m_mailer, "[IPC]") == 0 &&
312 				    m->m_argv[0] != NULL &&
313 				    strcmp(m->m_argv[0], "TCP") == 0)
314 				{
315 					int len;
316 					char *p;
317 
318 					if (tTd(13, 30))
319 						sm_dprintf("    ... FallbackMX\n");
320 
321 					len = strlen(FallbackMX) + 1;
322 					p = sm_rpool_malloc_x(e->e_rpool, len);
323 					(void) sm_strlcpy(p, FallbackMX, len);
324 					q->q_state = QS_OK;
325 					q->q_host = p;
326 				}
327 				else
328 				{
329 					if (tTd(13, 30))
330 						sm_dprintf("    ... QS_IS_QUEUEUP\n");
331 					continue;
332 				}
333 			}
334 
335 			/*
336 			**  If this mailer is expensive, and if we don't
337 			**  want to make connections now, just mark these
338 			**  addresses and return.  This is useful if we
339 			**  want to batch connections to reduce load.  This
340 			**  will cause the messages to be queued up, and a
341 			**  daemon will come along to send the messages later.
342 			*/
343 
344 			if (NoConnect && !Verbose &&
345 			    bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
346 			{
347 				if (tTd(13, 30))
348 					sm_dprintf("    ... expensive\n");
349 				q->q_state = QS_QUEUEUP;
350 				expensive = true;
351 			}
352 			else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
353 				 QueueLimitId == NULL &&
354 				 QueueLimitSender == NULL &&
355 				 QueueLimitRecipient == NULL)
356 			{
357 				if (tTd(13, 30))
358 					sm_dprintf("    ... hold\n");
359 				q->q_state = QS_QUEUEUP;
360 				expensive = true;
361 			}
362 			else if (QueueMode != QM_QUARANTINE &&
363 				 e->e_quarmsg != NULL)
364 			{
365 				if (tTd(13, 30))
366 					sm_dprintf("    ... quarantine: %s\n",
367 						   e->e_quarmsg);
368 				q->q_state = QS_QUEUEUP;
369 				expensive = true;
370 			}
371 			else
372 			{
373 				if (tTd(13, 30))
374 					sm_dprintf("    ... deliverable\n");
375 				somedeliveries = true;
376 			}
377 		}
378 
379 		if (owner != NULL && otherowners > 0)
380 		{
381 			/*
382 			**  Split this envelope into two.
383 			*/
384 
385 			ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
386 							    sizeof *ee);
387 			STRUCTCOPY(*e, *ee);
388 			ee->e_message = NULL;
389 			ee->e_id = NULL;
390 			assign_queueid(ee);
391 
392 			if (tTd(13, 1))
393 				sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
394 					   e->e_id, ee->e_id, owner,
395 					   otherowners);
396 
397 			ee->e_header = copyheader(e->e_header, ee->e_rpool);
398 			ee->e_sendqueue = copyqueue(e->e_sendqueue,
399 						    ee->e_rpool);
400 			ee->e_errorqueue = copyqueue(e->e_errorqueue,
401 						     ee->e_rpool);
402 			ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
403 			ee->e_flags |= EF_NORECEIPT;
404 			setsender(owner, ee, NULL, '\0', true);
405 			if (tTd(13, 5))
406 			{
407 				sm_dprintf("sendall(split): QS_SENDER ");
408 				printaddr(sm_debug_file(), &ee->e_from, false);
409 			}
410 			ee->e_from.q_state = QS_SENDER;
411 			ee->e_dfp = NULL;
412 			ee->e_lockfp = NULL;
413 			ee->e_xfp = NULL;
414 			ee->e_qgrp = e->e_qgrp;
415 			ee->e_qdir = e->e_qdir;
416 			ee->e_errormode = EM_MAIL;
417 			ee->e_sibling = splitenv;
418 			ee->e_statmsg = NULL;
419 			if (e->e_quarmsg != NULL)
420 				ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
421 								  e->e_quarmsg);
422 			splitenv = ee;
423 
424 			for (q = e->e_sendqueue; q != NULL; q = q->q_next)
425 			{
426 				if (q->q_owner == owner)
427 				{
428 					q->q_state = QS_CLONED;
429 					if (tTd(13, 6))
430 						sm_dprintf("\t... stripping %s from original envelope\n",
431 							   q->q_paddr);
432 				}
433 			}
434 			for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
435 			{
436 				if (q->q_owner != owner)
437 				{
438 					q->q_state = QS_CLONED;
439 					if (tTd(13, 6))
440 						sm_dprintf("\t... dropping %s from cloned envelope\n",
441 							   q->q_paddr);
442 				}
443 				else
444 				{
445 					/* clear DSN parameters */
446 					q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
447 					q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
448 					if (tTd(13, 6))
449 						sm_dprintf("\t... moving %s to cloned envelope\n",
450 							   q->q_paddr);
451 				}
452 			}
453 
454 			if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
455 				dup_queue_file(e, ee, DATAFL_LETTER);
456 
457 			/*
458 			**  Give the split envelope access to the parent
459 			**  transcript file for errors obtained while
460 			**  processing the recipients (done before the
461 			**  envelope splitting).
462 			*/
463 
464 			if (e->e_xfp != NULL)
465 				ee->e_xfp = sm_io_dup(e->e_xfp);
466 
467 			/* failed to dup e->e_xfp, start a new transcript */
468 			if (ee->e_xfp == NULL)
469 				openxscript(ee);
470 
471 			if (mode != SM_VERIFY && LogLevel > 4)
472 				sm_syslog(LOG_INFO, e->e_id,
473 					  "%s: clone: owner=%s",
474 					  ee->e_id, owner);
475 		}
476 	}
477 
478 	if (owner != NULL)
479 	{
480 		setsender(owner, e, NULL, '\0', true);
481 		if (tTd(13, 5))
482 		{
483 			sm_dprintf("sendall(owner): QS_SENDER ");
484 			printaddr(sm_debug_file(), &e->e_from, false);
485 		}
486 		e->e_from.q_state = QS_SENDER;
487 		e->e_errormode = EM_MAIL;
488 		e->e_flags |= EF_NORECEIPT;
489 		e->e_flags &= ~EF_FATALERRS;
490 	}
491 
492 	/* if nothing to be delivered, just queue up everything */
493 	if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
494 	    mode != SM_VERIFY)
495 	{
496 		time_t now;
497 
498 		if (tTd(13, 29))
499 			sm_dprintf("No deliveries: auto-queuing\n");
500 		mode = SM_QUEUE;
501 		now = curtime();
502 
503 		/* treat this as a delivery in terms of counting tries */
504 		e->e_dtime = now;
505 		if (!expensive)
506 			e->e_ntries++;
507 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
508 		{
509 			ee->e_dtime = now;
510 			if (!expensive)
511 				ee->e_ntries++;
512 		}
513 	}
514 
515 	if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
516 	     (mode != SM_VERIFY &&
517 	      (SuperSafe == SAFE_REALLY ||
518 	       SuperSafe == SAFE_REALLY_POSTMILTER))) &&
519 	    (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
520 	{
521 		bool msync;
522 
523 		/*
524 		**  Be sure everything is instantiated in the queue.
525 		**  Split envelopes first in case the machine crashes.
526 		**  If the original were done first, we may lose
527 		**  recipients.
528 		*/
529 
530 #if !HASFLOCK
531 		msync = false;
532 #else /* !HASFLOCK */
533 		msync = mode == SM_FORK;
534 #endif /* !HASFLOCK */
535 
536 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
537 			queueup(ee, WILL_BE_QUEUED(mode), msync);
538 		queueup(e, WILL_BE_QUEUED(mode), msync);
539 	}
540 
541 	if (tTd(62, 10))
542 		checkfds("after envelope splitting");
543 
544 	/*
545 	**  If we belong in background, fork now.
546 	*/
547 
548 	if (tTd(13, 20))
549 	{
550 		sm_dprintf("sendall: final mode = %c\n", mode);
551 		if (tTd(13, 21))
552 		{
553 			sm_dprintf("\n================ Final Send Queue(s) =====================\n");
554 			sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
555 				   e->e_id, e->e_from.q_paddr);
556 			printaddr(sm_debug_file(), e->e_sendqueue, true);
557 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
558 			{
559 				sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
560 					   ee->e_id, ee->e_from.q_paddr);
561 				printaddr(sm_debug_file(), ee->e_sendqueue, true);
562 			}
563 			sm_dprintf("==========================================================\n\n");
564 		}
565 	}
566 	switch (mode)
567 	{
568 	  case SM_VERIFY:
569 		Verbose = 2;
570 		break;
571 
572 	  case SM_QUEUE:
573 	  case SM_DEFER:
574 #if HASFLOCK
575   queueonly:
576 #endif /* HASFLOCK */
577 		if (e->e_nrcpts > 0)
578 			e->e_flags |= EF_INQUEUE;
579 		dropenvelope(e, splitenv != NULL, true);
580 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
581 		{
582 			if (ee->e_nrcpts > 0)
583 				ee->e_flags |= EF_INQUEUE;
584 			dropenvelope(ee, false, true);
585 		}
586 		return;
587 
588 	  case SM_FORK:
589 		if (e->e_xfp != NULL)
590 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
591 
592 #if !HASFLOCK
593 		/*
594 		**  Since fcntl locking has the interesting semantic that
595 		**  the lock is owned by a process, not by an open file
596 		**  descriptor, we have to flush this to the queue, and
597 		**  then restart from scratch in the child.
598 		*/
599 
600 		{
601 			/* save id for future use */
602 			char *qid = e->e_id;
603 
604 			/* now drop the envelope in the parent */
605 			e->e_flags |= EF_INQUEUE;
606 			dropenvelope(e, splitenv != NULL, false);
607 
608 			/* arrange to reacquire lock after fork */
609 			e->e_id = qid;
610 		}
611 
612 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
613 		{
614 			/* save id for future use */
615 			char *qid = ee->e_id;
616 
617 			/* drop envelope in parent */
618 			ee->e_flags |= EF_INQUEUE;
619 			dropenvelope(ee, false, false);
620 
621 			/* and save qid for reacquisition */
622 			ee->e_id = qid;
623 		}
624 
625 #endif /* !HASFLOCK */
626 
627 		/*
628 		**  Since the delivery may happen in a child and the parent
629 		**  does not wait, the parent may close the maps thereby
630 		**  removing any shared memory used by the map.  Therefore,
631 		**  close the maps now so the child will dynamically open
632 		**  them if necessary.
633 		*/
634 
635 		closemaps(false);
636 
637 		pid = fork();
638 		if (pid < 0)
639 		{
640 			syserr("deliver: fork 1");
641 #if HASFLOCK
642 			goto queueonly;
643 #else /* HASFLOCK */
644 			e->e_id = NULL;
645 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
646 				ee->e_id = NULL;
647 			return;
648 #endif /* HASFLOCK */
649 		}
650 		else if (pid > 0)
651 		{
652 #if HASFLOCK
653 			/* be sure we leave the temp files to our child */
654 			/* close any random open files in the envelope */
655 			closexscript(e);
656 			if (e->e_dfp != NULL)
657 				(void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
658 			e->e_dfp = NULL;
659 			e->e_flags &= ~EF_HAS_DF;
660 
661 			/* can't call unlockqueue to avoid unlink of xfp */
662 			if (e->e_lockfp != NULL)
663 				(void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
664 			else
665 				syserr("%s: sendall: null lockfp", e->e_id);
666 			e->e_lockfp = NULL;
667 #endif /* HASFLOCK */
668 
669 			/* make sure the parent doesn't own the envelope */
670 			e->e_id = NULL;
671 
672 #if USE_DOUBLE_FORK
673 			/* catch intermediate zombie */
674 			(void) waitfor(pid);
675 #endif /* USE_DOUBLE_FORK */
676 			return;
677 		}
678 
679 		/* Reset global flags */
680 		RestartRequest = NULL;
681 		RestartWorkGroup = false;
682 		ShutdownRequest = NULL;
683 		PendingSignal = 0;
684 
685 		/*
686 		**  Initialize exception stack and default exception
687 		**  handler for child process.
688 		*/
689 
690 		sm_exc_newthread(fatal_error);
691 
692 		/*
693 		**  Since we have accepted responsbility for the message,
694 		**  change the SIGTERM handler.  intsig() (the old handler)
695 		**  would remove the envelope if this was a command line
696 		**  message submission.
697 		*/
698 
699 		(void) sm_signal(SIGTERM, SIG_DFL);
700 
701 #if USE_DOUBLE_FORK
702 		/* double fork to avoid zombies */
703 		pid = fork();
704 		if (pid > 0)
705 			exit(EX_OK);
706 		save_errno = errno;
707 #endif /* USE_DOUBLE_FORK */
708 
709 		CurrentPid = getpid();
710 
711 		/* be sure we are immune from the terminal */
712 		disconnect(2, e);
713 		clearstats();
714 
715 		/* prevent parent from waiting if there was an error */
716 		if (pid < 0)
717 		{
718 			errno = save_errno;
719 			syserr("deliver: fork 2");
720 #if HASFLOCK
721 			e->e_flags |= EF_INQUEUE;
722 #else /* HASFLOCK */
723 			e->e_id = NULL;
724 #endif /* HASFLOCK */
725 			finis(true, true, ExitStat);
726 		}
727 
728 		/* be sure to give error messages in child */
729 		QuickAbort = false;
730 
731 		/*
732 		**  Close any cached connections.
733 		**
734 		**	We don't send the QUIT protocol because the parent
735 		**	still knows about the connection.
736 		**
737 		**	This should only happen when delivering an error
738 		**	message.
739 		*/
740 
741 		mci_flush(false, NULL);
742 
743 #if HASFLOCK
744 		break;
745 #else /* HASFLOCK */
746 
747 		/*
748 		**  Now reacquire and run the various queue files.
749 		*/
750 
751 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
752 		{
753 			ENVELOPE *sibling = ee->e_sibling;
754 
755 			(void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
756 				      false, false, ee);
757 			ee->e_sibling = sibling;
758 		}
759 		(void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
760 			      false, false, e);
761 		finis(true, true, ExitStat);
762 #endif /* HASFLOCK */
763 	}
764 
765 	sendenvelope(e, mode);
766 	dropenvelope(e, true, true);
767 	for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
768 	{
769 		CurEnv = ee;
770 		if (mode != SM_VERIFY)
771 			openxscript(ee);
772 		sendenvelope(ee, mode);
773 		dropenvelope(ee, true, true);
774 	}
775 	CurEnv = e;
776 
777 	Verbose = oldverbose;
778 	if (mode == SM_FORK)
779 		finis(true, true, ExitStat);
780 }
781 
782 static void
783 sendenvelope(e, mode)
784 	register ENVELOPE *e;
785 	int mode;
786 {
787 	register ADDRESS *q;
788 	bool didany;
789 
790 	if (tTd(13, 10))
791 		sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
792 			   e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
793 			   e->e_flags);
794 	if (LogLevel > 80)
795 		sm_syslog(LOG_DEBUG, e->e_id,
796 			  "sendenvelope, flags=0x%lx",
797 			  e->e_flags);
798 
799 	/*
800 	**  If we have had global, fatal errors, don't bother sending
801 	**  the message at all if we are in SMTP mode.  Local errors
802 	**  (e.g., a single address failing) will still cause the other
803 	**  addresses to be sent.
804 	*/
805 
806 	if (bitset(EF_FATALERRS, e->e_flags) &&
807 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
808 	{
809 		e->e_flags |= EF_CLRQUEUE;
810 		return;
811 	}
812 
813 	/*
814 	**  Don't attempt deliveries if we want to bounce now
815 	**  or if deliver-by time is exceeded.
816 	*/
817 
818 	if (!bitset(EF_RESPONSE, e->e_flags) &&
819 	    (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
820 	     (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
821 	      curtime() > e->e_ctime + e->e_deliver_by)))
822 		return;
823 
824 	/*
825 	**  Run through the list and send everything.
826 	**
827 	**	Set EF_GLOBALERRS so that error messages during delivery
828 	**	result in returned mail.
829 	*/
830 
831 	e->e_nsent = 0;
832 	e->e_flags |= EF_GLOBALERRS;
833 
834 	macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
835 	macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
836 	didany = false;
837 
838 	if (!bitset(EF_SPLIT, e->e_flags))
839 	{
840 		ENVELOPE *oldsib;
841 		ENVELOPE *ee;
842 
843 		/*
844 		**  Save old sibling and set it to NULL to avoid
845 		**  queueing up the same envelopes again.
846 		**  This requires that envelopes in that list have
847 		**  been take care of before (or at some other place).
848 		*/
849 
850 		oldsib = e->e_sibling;
851 		e->e_sibling = NULL;
852 		if (!split_by_recipient(e) &&
853 		    bitset(EF_FATALERRS, e->e_flags))
854 		{
855 			if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
856 				e->e_flags |= EF_CLRQUEUE;
857 			return;
858 		}
859 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
860 			queueup(ee, false, true);
861 
862 		/* clean up */
863 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
864 		{
865 			/* now unlock the job */
866 			closexscript(ee);
867 			unlockqueue(ee);
868 
869 			/* this envelope is marked unused */
870 			if (ee->e_dfp != NULL)
871 			{
872 				(void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
873 				ee->e_dfp = NULL;
874 			}
875 			ee->e_id = NULL;
876 			ee->e_flags &= ~EF_HAS_DF;
877 		}
878 		e->e_sibling = oldsib;
879 	}
880 
881 	/* now run through the queue */
882 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
883 	{
884 #if XDEBUG
885 		char wbuf[MAXNAME + 20];
886 
887 		(void) sm_snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
888 				   MAXNAME, q->q_paddr);
889 		checkfd012(wbuf);
890 #endif /* XDEBUG */
891 		if (mode == SM_VERIFY)
892 		{
893 			e->e_to = q->q_paddr;
894 			if (QS_IS_SENDABLE(q->q_state))
895 			{
896 				if (q->q_host != NULL && q->q_host[0] != '\0')
897 					message("deliverable: mailer %s, host %s, user %s",
898 						q->q_mailer->m_name,
899 						q->q_host,
900 						q->q_user);
901 				else
902 					message("deliverable: mailer %s, user %s",
903 						q->q_mailer->m_name,
904 						q->q_user);
905 			}
906 		}
907 		else if (QS_IS_OK(q->q_state))
908 		{
909 			/*
910 			**  Checkpoint the send list every few addresses
911 			*/
912 
913 			if (CheckpointInterval > 0 &&
914 			    e->e_nsent >= CheckpointInterval)
915 			{
916 				queueup(e, false, false);
917 				e->e_nsent = 0;
918 			}
919 			(void) deliver(e, q);
920 			didany = true;
921 		}
922 	}
923 	if (didany)
924 	{
925 		e->e_dtime = curtime();
926 		e->e_ntries++;
927 	}
928 
929 #if XDEBUG
930 	checkfd012("end of sendenvelope");
931 #endif /* XDEBUG */
932 }
933 
934 #if REQUIRES_DIR_FSYNC
935 /*
936 **  SYNC_DIR -- fsync a directory based on a filename
937 **
938 **	Parameters:
939 **		filename -- path of file
940 **		panic -- panic?
941 **
942 **	Returns:
943 **		none
944 */
945 
946 void
947 sync_dir(filename, panic)
948 	char *filename;
949 	bool panic;
950 {
951 	int dirfd;
952 	char *dirp;
953 	char dir[MAXPATHLEN];
954 
955 	if (!RequiresDirfsync)
956 		return;
957 
958 	/* filesystems which require the directory be synced */
959 	dirp = strrchr(filename, '/');
960 	if (dirp != NULL)
961 	{
962 		if (sm_strlcpy(dir, filename, sizeof dir) >= sizeof dir)
963 			return;
964 		dir[dirp - filename] = '\0';
965 		dirp = dir;
966 	}
967 	else
968 		dirp = ".";
969 	dirfd = open(dirp, O_RDONLY, 0700);
970 	if (tTd(40,32))
971 		sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
972 			  dirp, dirfd);
973 	if (dirfd >= 0)
974 	{
975 		if (fsync(dirfd) < 0)
976 		{
977 			if (panic)
978 				syserr("!sync_dir: cannot fsync directory %s",
979 				       dirp);
980 			else if (LogLevel > 1)
981 				sm_syslog(LOG_ERR, NOQID,
982 					  "sync_dir: cannot fsync directory %s: %s",
983 					  dirp, sm_errstring(errno));
984 		}
985 		(void) close(dirfd);
986 	}
987 }
988 #endif /* REQUIRES_DIR_FSYNC */
989 /*
990 **  DUP_QUEUE_FILE -- duplicate a queue file into a split queue
991 **
992 **	Parameters:
993 **		e -- the existing envelope
994 **		ee -- the new envelope
995 **		type -- the queue file type (e.g., DATAFL_LETTER)
996 **
997 **	Returns:
998 **		none
999 */
1000 
1001 static void
1002 dup_queue_file(e, ee, type)
1003 	ENVELOPE *e, *ee;
1004 	int type;
1005 {
1006 	char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1007 
1008 	ee->e_dfp = NULL;
1009 	ee->e_xfp = NULL;
1010 
1011 	/*
1012 	**  Make sure both are in the same directory.
1013 	*/
1014 
1015 	(void) sm_strlcpy(f1buf, queuename(e, type), sizeof f1buf);
1016 	(void) sm_strlcpy(f2buf, queuename(ee, type), sizeof f2buf);
1017 
1018 	/* Force the df to disk if it's not there yet */
1019 	if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1020 	    sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1021 	    errno != EINVAL)
1022 	{
1023 		syserr("!dup_queue_file: can't commit %s", f1buf);
1024 		/* NOTREACHED */
1025 	}
1026 
1027 	if (link(f1buf, f2buf) < 0)
1028 	{
1029 		int save_errno = errno;
1030 
1031 		syserr("sendall: link(%s, %s)", f1buf, f2buf);
1032 		if (save_errno == EEXIST)
1033 		{
1034 			if (unlink(f2buf) < 0)
1035 			{
1036 				syserr("!sendall: unlink(%s): permanent",
1037 				       f2buf);
1038 				/* NOTREACHED */
1039 			}
1040 			if (link(f1buf, f2buf) < 0)
1041 			{
1042 				syserr("!sendall: link(%s, %s): permanent",
1043 				       f1buf, f2buf);
1044 				/* NOTREACHED */
1045 			}
1046 		}
1047 	}
1048 	SYNC_DIR(f2buf, true);
1049 }
1050 /*
1051 **  DOFORK -- do a fork, retrying a couple of times on failure.
1052 **
1053 **	This MUST be a macro, since after a vfork we are running
1054 **	two processes on the same stack!!!
1055 **
1056 **	Parameters:
1057 **		none.
1058 **
1059 **	Returns:
1060 **		From a macro???  You've got to be kidding!
1061 **
1062 **	Side Effects:
1063 **		Modifies the ==> LOCAL <== variable 'pid', leaving:
1064 **			pid of child in parent, zero in child.
1065 **			-1 on unrecoverable error.
1066 **
1067 **	Notes:
1068 **		I'm awfully sorry this looks so awful.  That's
1069 **		vfork for you.....
1070 */
1071 
1072 #define NFORKTRIES	5
1073 
1074 #ifndef FORK
1075 # define FORK	fork
1076 #endif /* ! FORK */
1077 
1078 #define DOFORK(fORKfN) \
1079 {\
1080 	register int i;\
1081 \
1082 	for (i = NFORKTRIES; --i >= 0; )\
1083 	{\
1084 		pid = fORKfN();\
1085 		if (pid >= 0)\
1086 			break;\
1087 		if (i > 0)\
1088 			(void) sleep((unsigned) NFORKTRIES - i);\
1089 	}\
1090 }
1091 /*
1092 **  DOFORK -- simple fork interface to DOFORK.
1093 **
1094 **	Parameters:
1095 **		none.
1096 **
1097 **	Returns:
1098 **		pid of child in parent.
1099 **		zero in child.
1100 **		-1 on error.
1101 **
1102 **	Side Effects:
1103 **		returns twice, once in parent and once in child.
1104 */
1105 
1106 pid_t
1107 dofork()
1108 {
1109 	register pid_t pid = -1;
1110 
1111 	DOFORK(fork);
1112 	return pid;
1113 }
1114 
1115 /*
1116 **  COLONCMP -- compare host-signatures up to first ':' or EOS
1117 **
1118 **	This takes two strings which happen to be host-signatures and
1119 **	compares them. If the lowest preference portions of the MX-RR's
1120 **	match (up to ':' or EOS, whichever is first), then we have
1121 **	match. This is used for coattail-piggybacking messages during
1122 **	message delivery.
1123 **	If the signatures are the same up to the first ':' the remainder of
1124 **	the signatures are then compared with a normal strcmp(). This saves
1125 **	re-examining the first part of the signatures.
1126 **
1127 **	Parameters:
1128 **		a - first host-signature
1129 **		b - second host-signature
1130 **
1131 **	Returns:
1132 **		HS_MATCH_NO -- no "match".
1133 **		HS_MATCH_FIRST -- "match" for the first MX preference
1134 **			(up to the first colon (':')).
1135 **		HS_MATCH_FULL -- match for the entire MX record.
1136 **
1137 **	Side Effects:
1138 **		none.
1139 */
1140 
1141 #define HS_MATCH_NO	0
1142 #define HS_MATCH_FIRST	1
1143 #define HS_MATCH_FULL	2
1144 
1145 static int
1146 coloncmp(a, b)
1147 	register const char *a;
1148 	register const char *b;
1149 {
1150 	int ret = HS_MATCH_NO;
1151 	int braclev = 0;
1152 
1153 	while (*a == *b++)
1154 	{
1155 		/* Need to account for IPv6 bracketed addresses */
1156 		if (*a == '[')
1157 			braclev++;
1158 		else if (*a == ']' && braclev > 0)
1159 			braclev--;
1160 		else if (*a == ':' && braclev <= 0)
1161 		{
1162 			ret = HS_MATCH_FIRST;
1163 			a++;
1164 			break;
1165 		}
1166 		else if (*a == '\0')
1167 			return HS_MATCH_FULL; /* a full match */
1168 		a++;
1169 	}
1170 	if (ret == HS_MATCH_NO &&
1171 	    braclev <= 0 &&
1172 	    ((*a == '\0' && *(b - 1) == ':') ||
1173 	     (*a == ':' && *(b - 1) == '\0')))
1174 		return HS_MATCH_FIRST;
1175 	if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1176 		return HS_MATCH_FULL;
1177 
1178 	return ret;
1179 }
1180 
1181 /*
1182 **  SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1183 **
1184 **	Parameters:
1185 **		e -- envelope
1186 **		tried_fallbacksmarthost -- has been tried already? (in/out)
1187 **		hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1188 **		hbsz -- size of hostbuf
1189 **		status -- current delivery status
1190 **
1191 **	Returns:
1192 **		true iff FallbackSmartHost should be tried.
1193 */
1194 
1195 static bool
1196 should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1197 	ENVELOPE *e;
1198 	bool *tried_fallbacksmarthost;
1199 	char *hostbuf;
1200 	size_t hbsz;
1201 	int status;
1202 {
1203 	/*
1204 	**  If the host was not found or a temporary failure occurred
1205 	**  and a FallbackSmartHost is defined (and we have not yet
1206 	**  tried it), then make one last try with it as the host.
1207 	*/
1208 
1209 	if ((status == EX_NOHOST || status == EX_TEMPFAIL) &&
1210 	    FallbackSmartHost != NULL && !*tried_fallbacksmarthost)
1211 	{
1212 		*tried_fallbacksmarthost = true;
1213 		expand(FallbackSmartHost, hostbuf, hbsz, e);
1214 		if (!wordinclass(hostbuf, 'w'))
1215 		{
1216 			if (tTd(11, 1))
1217 				sm_dprintf("one last try with FallbackSmartHost %s\n",
1218 					   hostbuf);
1219 			return true;
1220 		}
1221 	}
1222 	return false;
1223 }
1224 /*
1225 **  DELIVER -- Deliver a message to a list of addresses.
1226 **
1227 **	This routine delivers to everyone on the same host as the
1228 **	user on the head of the list.  It is clever about mailers
1229 **	that don't handle multiple users.  It is NOT guaranteed
1230 **	that it will deliver to all these addresses however -- so
1231 **	deliver should be called once for each address on the
1232 **	list.
1233 **	Deliver tries to be as opportunistic as possible about piggybacking
1234 **	messages. Some definitions to make understanding easier follow below.
1235 **	Piggybacking occurs when an existing connection to a mail host can
1236 **	be used to send the same message to more than one recipient at the
1237 **	same time. So "no piggybacking" means one message for one recipient
1238 **	per connection. "Intentional piggybacking" happens when the
1239 **	recipients' host address (not the mail host address) is used to
1240 **	attempt piggybacking. Recipients with the same host address
1241 **	have the same mail host. "Coincidental piggybacking" relies on
1242 **	piggybacking based on all the mail host addresses in the MX-RR. This
1243 **	is "coincidental" in the fact it could not be predicted until the
1244 **	MX Resource Records for the hosts were obtained and examined. For
1245 **	example (preference order and equivalence is important, not values):
1246 **		domain1 IN MX 10 mxhost-A
1247 **			IN MX 20 mxhost-B
1248 **		domain2 IN MX  4 mxhost-A
1249 **			IN MX  8 mxhost-B
1250 **	Domain1 and domain2 can piggyback the same message to mxhost-A or
1251 **	mxhost-B (if mxhost-A cannot be reached).
1252 **	"Coattail piggybacking" relaxes the strictness of "coincidental
1253 **	piggybacking" in the hope that most significant (lowest value)
1254 **	MX preference host(s) can create more piggybacking. For example
1255 **	(again, preference order and equivalence is important, not values):
1256 **		domain3 IN MX 100 mxhost-C
1257 **			IN MX 100 mxhost-D
1258 **			IN MX 200 mxhost-E
1259 **		domain4 IN MX  50 mxhost-C
1260 **			IN MX  50 mxhost-D
1261 **			IN MX  80 mxhost-F
1262 **	A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1263 **	is available. Same with mxhost-D because in both RR's the preference
1264 **	value is the same as mxhost-C, respectively.
1265 **	So deliver attempts coattail piggybacking when possible. If the
1266 **	first MX preference level hosts cannot be used then the piggybacking
1267 **	reverts to coincidental piggybacking. Using the above example you
1268 **	cannot deliver to mxhost-F for domain3 regardless of preference value.
1269 **	("Coattail" from "riding on the coattails of your predecessor" meaning
1270 **	gaining benefit from a predecessor effort with no or little addition
1271 **	effort. The predecessor here being the preceding MX RR).
1272 **
1273 **	Parameters:
1274 **		e -- the envelope to deliver.
1275 **		firstto -- head of the address list to deliver to.
1276 **
1277 **	Returns:
1278 **		zero -- successfully delivered.
1279 **		else -- some failure, see ExitStat for more info.
1280 **
1281 **	Side Effects:
1282 **		The standard input is passed off to someone.
1283 */
1284 
1285 static int
1286 deliver(e, firstto)
1287 	register ENVELOPE *e;
1288 	ADDRESS *firstto;
1289 {
1290 	char *host;			/* host being sent to */
1291 	char *user;			/* user being sent to */
1292 	char **pvp;
1293 	register char **mvp;
1294 	register char *p;
1295 	register MAILER *m;		/* mailer for this recipient */
1296 	ADDRESS *volatile ctladdr;
1297 #if HASSETUSERCONTEXT
1298 	ADDRESS *volatile contextaddr = NULL;
1299 #endif /* HASSETUSERCONTEXT */
1300 	register MCI *volatile mci;
1301 	register ADDRESS *SM_NONVOLATILE to = firstto;
1302 	volatile bool clever = false;	/* running user smtp to this mailer */
1303 	ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1304 	int rcode;			/* response code */
1305 	SM_NONVOLATILE int lmtp_rcode = EX_OK;
1306 	SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1307 	SM_NONVOLATILE int hostnum = 0;	/* current MX host index */
1308 	char *firstsig;			/* signature of firstto */
1309 	volatile pid_t pid = -1;
1310 	char *volatile curhost;
1311 	SM_NONVOLATILE unsigned short port = 0;
1312 	SM_NONVOLATILE time_t enough = 0;
1313 #if NETUNIX
1314 	char *SM_NONVOLATILE mux_path = NULL;	/* path to UNIX domain socket */
1315 #endif /* NETUNIX */
1316 	time_t xstart;
1317 	bool suidwarn;
1318 	bool anyok;			/* at least one address was OK */
1319 	SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1320 	bool ovr;
1321 	bool quarantine;
1322 	int strsize;
1323 	int rcptcount;
1324 	int ret;
1325 	static int tobufsize = 0;
1326 	static char *tobuf = NULL;
1327 	char *rpath;	/* translated return path */
1328 	int mpvect[2];
1329 	int rpvect[2];
1330 	char *mxhosts[MAXMXHOSTS + 1];
1331 	char *pv[MAXPV + 1];
1332 	char buf[MAXNAME + 1];
1333 	char cbuf[MAXPATHLEN];
1334 
1335 	errno = 0;
1336 	if (!QS_IS_OK(to->q_state))
1337 		return 0;
1338 
1339 	suidwarn = geteuid() == 0;
1340 
1341 	m = to->q_mailer;
1342 	host = to->q_host;
1343 	CurEnv = e;			/* just in case */
1344 	e->e_statmsg = NULL;
1345 	SmtpError[0] = '\0';
1346 	xstart = curtime();
1347 
1348 	if (tTd(10, 1))
1349 		sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1350 			e->e_id, m->m_name, host, to->q_user);
1351 	if (tTd(10, 100))
1352 		printopenfds(false);
1353 
1354 	/*
1355 	**  Clear {client_*} macros if this is a bounce message to
1356 	**  prevent rejection by check_compat ruleset.
1357 	*/
1358 
1359 	if (bitset(EF_RESPONSE, e->e_flags))
1360 	{
1361 		macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1362 		macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1363 		macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1364 		macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1365 		macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1366 	}
1367 
1368 	SM_TRY
1369 	{
1370 	ADDRESS *skip_back = NULL;
1371 
1372 	/*
1373 	**  Do initial argv setup.
1374 	**	Insert the mailer name.  Notice that $x expansion is
1375 	**	NOT done on the mailer name.  Then, if the mailer has
1376 	**	a picky -f flag, we insert it as appropriate.  This
1377 	**	code does not check for 'pv' overflow; this places a
1378 	**	manifest lower limit of 4 for MAXPV.
1379 	**		The from address rewrite is expected to make
1380 	**		the address relative to the other end.
1381 	*/
1382 
1383 	/* rewrite from address, using rewriting rules */
1384 	rcode = EX_OK;
1385 	if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1386 		p = e->e_sender;
1387 	else
1388 		p = e->e_from.q_paddr;
1389 	rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1390 	if (strlen(rpath) > MAXSHORTSTR)
1391 	{
1392 		rpath = shortenstring(rpath, MAXSHORTSTR);
1393 
1394 		/* avoid bogus errno */
1395 		errno = 0;
1396 		syserr("remotename: huge return path %s", rpath);
1397 	}
1398 	rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1399 	macdefine(&e->e_macro, A_PERM, 'g', rpath);
1400 	macdefine(&e->e_macro, A_PERM, 'h', host);
1401 	Errors = 0;
1402 	pvp = pv;
1403 	*pvp++ = m->m_argv[0];
1404 
1405 	/* ignore long term host status information if mailer flag W is set */
1406 	if (bitnset(M_NOHOSTSTAT, m->m_flags))
1407 		IgnoreHostStatus = true;
1408 
1409 	/* insert -f or -r flag as appropriate */
1410 	if (FromFlag &&
1411 	    (bitnset(M_FOPT, m->m_flags) ||
1412 	     bitnset(M_ROPT, m->m_flags)))
1413 	{
1414 		if (bitnset(M_FOPT, m->m_flags))
1415 			*pvp++ = "-f";
1416 		else
1417 			*pvp++ = "-r";
1418 		*pvp++ = rpath;
1419 	}
1420 
1421 	/*
1422 	**  Append the other fixed parts of the argv.  These run
1423 	**  up to the first entry containing "$u".  There can only
1424 	**  be one of these, and there are only a few more slots
1425 	**  in the pv after it.
1426 	*/
1427 
1428 	for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1429 	{
1430 		/* can't use strchr here because of sign extension problems */
1431 		while (*p != '\0')
1432 		{
1433 			if ((*p++ & 0377) == MACROEXPAND)
1434 			{
1435 				if (*p == 'u')
1436 					break;
1437 			}
1438 		}
1439 
1440 		if (*p != '\0')
1441 			break;
1442 
1443 		/* this entry is safe -- go ahead and process it */
1444 		expand(*mvp, buf, sizeof buf, e);
1445 		*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1446 		if (pvp >= &pv[MAXPV - 3])
1447 		{
1448 			syserr("554 5.3.5 Too many parameters to %s before $u",
1449 			       pv[0]);
1450 			rcode = -1;
1451 			goto cleanup;
1452 		}
1453 	}
1454 
1455 	/*
1456 	**  If we have no substitution for the user name in the argument
1457 	**  list, we know that we must supply the names otherwise -- and
1458 	**  SMTP is the answer!!
1459 	*/
1460 
1461 	if (*mvp == NULL)
1462 	{
1463 		/* running LMTP or SMTP */
1464 		clever = true;
1465 		*pvp = NULL;
1466 	}
1467 	else if (bitnset(M_LMTP, m->m_flags))
1468 	{
1469 		/* not running LMTP */
1470 		sm_syslog(LOG_ERR, NULL,
1471 			  "Warning: mailer %s: LMTP flag (F=z) turned off",
1472 			  m->m_name);
1473 		clrbitn(M_LMTP, m->m_flags);
1474 	}
1475 
1476 	/*
1477 	**  At this point *mvp points to the argument with $u.  We
1478 	**  run through our address list and append all the addresses
1479 	**  we can.  If we run out of space, do not fret!  We can
1480 	**  always send another copy later.
1481 	*/
1482 
1483 	e->e_to = NULL;
1484 	strsize = 2;
1485 	rcptcount = 0;
1486 	ctladdr = NULL;
1487 	if (firstto->q_signature == NULL)
1488 		firstto->q_signature = hostsignature(firstto->q_mailer,
1489 						     firstto->q_host);
1490 	firstsig = firstto->q_signature;
1491 
1492 	for (; to != NULL; to = to->q_next)
1493 	{
1494 		/* avoid sending multiple recipients to dumb mailers */
1495 		if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1496 			break;
1497 
1498 		/* if already sent or not for this host, don't send */
1499 		if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1500 			continue;
1501 
1502 		/*
1503 		**  Must be same mailer to keep grouping rcpts.
1504 		**  If mailers don't match: continue; sendqueue is not
1505 		**  sorted by mailers, so don't break;
1506 		*/
1507 
1508 		if (to->q_mailer != firstto->q_mailer)
1509 			continue;
1510 
1511 		if (to->q_signature == NULL) /* for safety */
1512 			to->q_signature = hostsignature(to->q_mailer,
1513 							to->q_host);
1514 
1515 		/*
1516 		**  This is for coincidental and tailcoat piggybacking messages
1517 		**  to the same mail host. While the signatures are identical
1518 		**  (that's the MX-RR's are identical) we can do coincidental
1519 		**  piggybacking. We try hard for coattail piggybacking
1520 		**  with the same mail host when the next recipient has the
1521 		**  same host at lowest preference. It may be that this
1522 		**  won't work out, so 'skip_back' is maintained if a backup
1523 		**  to coincidental piggybacking or full signature must happen.
1524 		*/
1525 
1526 		ret = firstto == to ? HS_MATCH_FULL :
1527 				      coloncmp(to->q_signature, firstsig);
1528 		if (ret == HS_MATCH_FULL)
1529 			skip_back = to;
1530 		else if (ret == HS_MATCH_NO)
1531 			break;
1532 
1533 		if (!clever)
1534 		{
1535 			/* avoid overflowing tobuf */
1536 			strsize += strlen(to->q_paddr) + 1;
1537 			if (strsize > TOBUFSIZE)
1538 				break;
1539 		}
1540 
1541 		if (++rcptcount > to->q_mailer->m_maxrcpt)
1542 			break;
1543 
1544 		if (tTd(10, 1))
1545 		{
1546 			sm_dprintf("\nsend to ");
1547 			printaddr(sm_debug_file(), to, false);
1548 		}
1549 
1550 		/* compute effective uid/gid when sending */
1551 		if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1552 # if HASSETUSERCONTEXT
1553 			contextaddr = ctladdr = getctladdr(to);
1554 # else /* HASSETUSERCONTEXT */
1555 			ctladdr = getctladdr(to);
1556 # endif /* HASSETUSERCONTEXT */
1557 
1558 		if (tTd(10, 2))
1559 		{
1560 			sm_dprintf("ctladdr=");
1561 			printaddr(sm_debug_file(), ctladdr, false);
1562 		}
1563 
1564 		user = to->q_user;
1565 		e->e_to = to->q_paddr;
1566 
1567 		/*
1568 		**  Check to see that these people are allowed to
1569 		**  talk to each other.
1570 		**  Check also for overflow of e_msgsize.
1571 		*/
1572 
1573 		if (m->m_maxsize != 0 &&
1574 		    (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1575 		{
1576 			e->e_flags |= EF_NO_BODY_RETN;
1577 			if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1578 				to->q_status = "5.2.3";
1579 			else
1580 				to->q_status = "5.3.4";
1581 
1582 			/* set to->q_rstatus = NULL; or to the following? */
1583 			usrerrenh(to->q_status,
1584 				  "552 Message is too large; %ld bytes max",
1585 				  m->m_maxsize);
1586 			markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1587 			giveresponse(EX_UNAVAILABLE, to->q_status, m,
1588 				     NULL, ctladdr, xstart, e, to);
1589 			continue;
1590 		}
1591 		SM_SET_H_ERRNO(0);
1592 		ovr = true;
1593 
1594 		/* do config file checking of compatibility */
1595 		quarantine = (e->e_quarmsg != NULL);
1596 		rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1597 				e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1598 				e->e_id);
1599 		if (rcode == EX_OK)
1600 		{
1601 			/* do in-code checking if not discarding */
1602 			if (!bitset(EF_DISCARD, e->e_flags))
1603 			{
1604 				rcode = checkcompat(to, e);
1605 				ovr = false;
1606 			}
1607 		}
1608 		if (rcode != EX_OK)
1609 		{
1610 			markfailure(e, to, NULL, rcode, ovr);
1611 			giveresponse(rcode, to->q_status, m,
1612 				     NULL, ctladdr, xstart, e, to);
1613 			continue;
1614 		}
1615 		if (!quarantine && e->e_quarmsg != NULL)
1616 		{
1617 			/*
1618 			**  check_compat or checkcompat() has tried
1619 			**  to quarantine but that isn't supported.
1620 			**  Revert the attempt.
1621 			*/
1622 
1623 			e->e_quarmsg = NULL;
1624 			macdefine(&e->e_macro, A_PERM,
1625 				  macid("{quarantine}"), "");
1626 		}
1627 		if (bitset(EF_DISCARD, e->e_flags))
1628 		{
1629 			if (tTd(10, 5))
1630 			{
1631 				sm_dprintf("deliver: discarding recipient ");
1632 				printaddr(sm_debug_file(), to, false);
1633 			}
1634 
1635 			/* pretend the message was sent */
1636 			/* XXX should we log something here? */
1637 			to->q_state = QS_DISCARDED;
1638 
1639 			/*
1640 			**  Remove discard bit to prevent discard of
1641 			**  future recipients.  This is safe because the
1642 			**  true "global discard" has been handled before
1643 			**  we get here.
1644 			*/
1645 
1646 			e->e_flags &= ~EF_DISCARD;
1647 			continue;
1648 		}
1649 
1650 		/*
1651 		**  Strip quote bits from names if the mailer is dumb
1652 		**	about them.
1653 		*/
1654 
1655 		if (bitnset(M_STRIPQ, m->m_flags))
1656 		{
1657 			stripquotes(user);
1658 			stripquotes(host);
1659 		}
1660 
1661 		/*
1662 		**  Strip all leading backslashes if requested and the
1663 		**  next character is alphanumerical (the latter can
1664 		**  probably relaxed a bit, see RFC2821).
1665 		*/
1666 
1667 		if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1668 			stripbackslash(user);
1669 
1670 		/* hack attack -- delivermail compatibility */
1671 		if (m == ProgMailer && *user == '|')
1672 			user++;
1673 
1674 		/*
1675 		**  If an error message has already been given, don't
1676 		**	bother to send to this address.
1677 		**
1678 		**	>>>>>>>>>> This clause assumes that the local mailer
1679 		**	>> NOTE >> cannot do any further aliasing; that
1680 		**	>>>>>>>>>> function is subsumed by sendmail.
1681 		*/
1682 
1683 		if (!QS_IS_OK(to->q_state))
1684 			continue;
1685 
1686 		/*
1687 		**  See if this user name is "special".
1688 		**	If the user name has a slash in it, assume that this
1689 		**	is a file -- send it off without further ado.  Note
1690 		**	that this type of addresses is not processed along
1691 		**	with the others, so we fudge on the To person.
1692 		*/
1693 
1694 		if (strcmp(m->m_mailer, "[FILE]") == 0)
1695 		{
1696 			macdefine(&e->e_macro, A_PERM, 'u', user);
1697 			p = to->q_home;
1698 			if (p == NULL && ctladdr != NULL)
1699 				p = ctladdr->q_home;
1700 			macdefine(&e->e_macro, A_PERM, 'z', p);
1701 			expand(m->m_argv[1], buf, sizeof buf, e);
1702 			if (strlen(buf) > 0)
1703 				rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1704 			else
1705 			{
1706 				syserr("empty filename specification for mailer %s",
1707 				       m->m_name);
1708 				rcode = EX_CONFIG;
1709 			}
1710 			giveresponse(rcode, to->q_status, m, NULL,
1711 				     ctladdr, xstart, e, to);
1712 			markfailure(e, to, NULL, rcode, true);
1713 			e->e_nsent++;
1714 			if (rcode == EX_OK)
1715 			{
1716 				to->q_state = QS_SENT;
1717 				if (bitnset(M_LOCALMAILER, m->m_flags) &&
1718 				    bitset(QPINGONSUCCESS, to->q_flags))
1719 				{
1720 					to->q_flags |= QDELIVERED;
1721 					to->q_status = "2.1.5";
1722 					(void) sm_io_fprintf(e->e_xfp,
1723 							     SM_TIME_DEFAULT,
1724 							     "%s... Successfully delivered\n",
1725 							     to->q_paddr);
1726 				}
1727 			}
1728 			to->q_statdate = curtime();
1729 			markstats(e, to, STATS_NORMAL);
1730 			continue;
1731 		}
1732 
1733 		/*
1734 		**  Address is verified -- add this user to mailer
1735 		**  argv, and add it to the print list of recipients.
1736 		*/
1737 
1738 		/* link together the chain of recipients */
1739 		to->q_tchain = tochain;
1740 		tochain = to;
1741 		e->e_to = "[CHAIN]";
1742 
1743 		macdefine(&e->e_macro, A_PERM, 'u', user);  /* to user */
1744 		p = to->q_home;
1745 		if (p == NULL && ctladdr != NULL)
1746 			p = ctladdr->q_home;
1747 		macdefine(&e->e_macro, A_PERM, 'z', p);  /* user's home */
1748 
1749 		/* set the ${dsn_notify} macro if applicable */
1750 		if (bitset(QHASNOTIFY, to->q_flags))
1751 		{
1752 			char notify[MAXLINE];
1753 
1754 			notify[0] = '\0';
1755 			if (bitset(QPINGONSUCCESS, to->q_flags))
1756 				(void) sm_strlcat(notify, "SUCCESS,",
1757 						  sizeof notify);
1758 			if (bitset(QPINGONFAILURE, to->q_flags))
1759 				(void) sm_strlcat(notify, "FAILURE,",
1760 						  sizeof notify);
1761 			if (bitset(QPINGONDELAY, to->q_flags))
1762 				(void) sm_strlcat(notify, "DELAY,",
1763 						  sizeof notify);
1764 
1765 			/* Set to NEVER or drop trailing comma */
1766 			if (notify[0] == '\0')
1767 				(void) sm_strlcat(notify, "NEVER",
1768 						  sizeof notify);
1769 			else
1770 				notify[strlen(notify) - 1] = '\0';
1771 
1772 			macdefine(&e->e_macro, A_TEMP,
1773 				macid("{dsn_notify}"), notify);
1774 		}
1775 		else
1776 			macdefine(&e->e_macro, A_PERM,
1777 				macid("{dsn_notify}"), NULL);
1778 
1779 		/*
1780 		**  Expand out this user into argument list.
1781 		*/
1782 
1783 		if (!clever)
1784 		{
1785 			expand(*mvp, buf, sizeof buf, e);
1786 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1787 			if (pvp >= &pv[MAXPV - 2])
1788 			{
1789 				/* allow some space for trailing parms */
1790 				break;
1791 			}
1792 		}
1793 	}
1794 
1795 	/* see if any addresses still exist */
1796 	if (tochain == NULL)
1797 	{
1798 		rcode = 0;
1799 		goto cleanup;
1800 	}
1801 
1802 	/* print out messages as full list */
1803 	strsize = 1;
1804 	for (to = tochain; to != NULL; to = to->q_tchain)
1805 		strsize += strlen(to->q_paddr) + 1;
1806 	if (strsize < TOBUFSIZE)
1807 		strsize = TOBUFSIZE;
1808 	if (strsize > tobufsize)
1809 	{
1810 		SM_FREE_CLR(tobuf);
1811 		tobuf = sm_pmalloc_x(strsize);
1812 		tobufsize = strsize;
1813 	}
1814 	p = tobuf;
1815 	*p = '\0';
1816 	for (to = tochain; to != NULL; to = to->q_tchain)
1817 	{
1818 		(void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1819 				   ",", to->q_paddr);
1820 		p += strlen(p);
1821 	}
1822 	e->e_to = tobuf + 1;
1823 
1824 	/*
1825 	**  Fill out any parameters after the $u parameter.
1826 	*/
1827 
1828 	if (!clever)
1829 	{
1830 		while (*++mvp != NULL)
1831 		{
1832 			expand(*mvp, buf, sizeof buf, e);
1833 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1834 			if (pvp >= &pv[MAXPV])
1835 				syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1836 				       pv[0]);
1837 		}
1838 	}
1839 	*pvp++ = NULL;
1840 
1841 	/*
1842 	**  Call the mailer.
1843 	**	The argument vector gets built, pipes
1844 	**	are created as necessary, and we fork & exec as
1845 	**	appropriate.
1846 	**	If we are running SMTP, we just need to clean up.
1847 	*/
1848 
1849 	/* XXX this seems a bit wierd */
1850 	if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1851 	    bitset(QGOODUID, e->e_from.q_flags))
1852 		ctladdr = &e->e_from;
1853 
1854 #if NAMED_BIND
1855 	if (ConfigLevel < 2)
1856 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
1857 #endif /* NAMED_BIND */
1858 
1859 	if (tTd(11, 1))
1860 	{
1861 		sm_dprintf("openmailer:");
1862 		printav(sm_debug_file(), pv);
1863 	}
1864 	errno = 0;
1865 	SM_SET_H_ERRNO(0);
1866 	CurHostName = NULL;
1867 
1868 	/*
1869 	**  Deal with the special case of mail handled through an IPC
1870 	**  connection.
1871 	**	In this case we don't actually fork.  We must be
1872 	**	running SMTP for this to work.  We will return a
1873 	**	zero pid to indicate that we are running IPC.
1874 	**  We also handle a debug version that just talks to stdin/out.
1875 	*/
1876 
1877 	curhost = NULL;
1878 	SmtpPhase = NULL;
1879 	mci = NULL;
1880 
1881 #if XDEBUG
1882 	{
1883 		char wbuf[MAXLINE];
1884 
1885 		/* make absolutely certain 0, 1, and 2 are in use */
1886 		(void) sm_snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1887 				   shortenstring(e->e_to, MAXSHORTSTR),
1888 				   m->m_name);
1889 		checkfd012(wbuf);
1890 	}
1891 #endif /* XDEBUG */
1892 
1893 	/* check for 8-bit available */
1894 	if (bitset(EF_HAS8BIT, e->e_flags) &&
1895 	    bitnset(M_7BITS, m->m_flags) &&
1896 	    (bitset(EF_DONT_MIME, e->e_flags) ||
1897 	     !(bitset(MM_MIME8BIT, MimeMode) ||
1898 	       (bitset(EF_IS_MIME, e->e_flags) &&
1899 		bitset(MM_CVTMIME, MimeMode)))))
1900 	{
1901 		e->e_status = "5.6.3";
1902 		usrerrenh(e->e_status,
1903 			  "554 Cannot send 8-bit data to 7-bit destination");
1904 		rcode = EX_DATAERR;
1905 		goto give_up;
1906 	}
1907 
1908 	if (tTd(62, 8))
1909 		checkfds("before delivery");
1910 
1911 	/* check for Local Person Communication -- not for mortals!!! */
1912 	if (strcmp(m->m_mailer, "[LPC]") == 0)
1913 	{
1914 		if (clever)
1915 		{
1916 			/* flush any expired connections */
1917 			(void) mci_scan(NULL);
1918 
1919 			/* try to get a cached connection or just a slot */
1920 			mci = mci_get(m->m_name, m);
1921 			if (mci->mci_host == NULL)
1922 				mci->mci_host = m->m_name;
1923 			CurHostName = mci->mci_host;
1924 			if (mci->mci_state != MCIS_CLOSED)
1925 			{
1926 				message("Using cached SMTP/LPC connection for %s...",
1927 					m->m_name);
1928 				mci->mci_deliveries++;
1929 				goto do_transfer;
1930 			}
1931 		}
1932 		else
1933 		{
1934 			mci = mci_new(e->e_rpool);
1935 		}
1936 		mci->mci_in = smioin;
1937 		mci->mci_out = smioout;
1938 		mci->mci_mailer = m;
1939 		mci->mci_host = m->m_name;
1940 		if (clever)
1941 		{
1942 			mci->mci_state = MCIS_OPENING;
1943 			mci_cache(mci);
1944 		}
1945 		else
1946 			mci->mci_state = MCIS_OPEN;
1947 	}
1948 	else if (strcmp(m->m_mailer, "[IPC]") == 0)
1949 	{
1950 		register int i;
1951 
1952 		if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1953 		{
1954 			syserr("null destination for %s mailer", m->m_mailer);
1955 			rcode = EX_CONFIG;
1956 			goto give_up;
1957 		}
1958 
1959 # if NETUNIX
1960 		if (strcmp(pv[0], "FILE") == 0)
1961 		{
1962 			curhost = CurHostName = "localhost";
1963 			mux_path = pv[1];
1964 		}
1965 		else
1966 # endif /* NETUNIX */
1967 		{
1968 			CurHostName = pv[1];
1969 			curhost = hostsignature(m, pv[1]);
1970 		}
1971 
1972 		if (curhost == NULL || curhost[0] == '\0')
1973 		{
1974 			syserr("null host signature for %s", pv[1]);
1975 			rcode = EX_CONFIG;
1976 			goto give_up;
1977 		}
1978 
1979 		if (!clever)
1980 		{
1981 			syserr("554 5.3.5 non-clever IPC");
1982 			rcode = EX_CONFIG;
1983 			goto give_up;
1984 		}
1985 		if (pv[2] != NULL
1986 # if NETUNIX
1987 		    && mux_path == NULL
1988 # endif /* NETUNIX */
1989 		    )
1990 		{
1991 			port = htons((unsigned short) atoi(pv[2]));
1992 			if (port == 0)
1993 			{
1994 # ifdef NO_GETSERVBYNAME
1995 				syserr("Invalid port number: %s", pv[2]);
1996 # else /* NO_GETSERVBYNAME */
1997 				struct servent *sp = getservbyname(pv[2], "tcp");
1998 
1999 				if (sp == NULL)
2000 					syserr("Service %s unknown", pv[2]);
2001 				else
2002 					port = sp->s_port;
2003 # endif /* NO_GETSERVBYNAME */
2004 			}
2005 		}
2006 
2007 		nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2008 		if (TimeOuts.to_aconnect > 0)
2009 			enough = curtime() + TimeOuts.to_aconnect;
2010 tryhost:
2011 		while (hostnum < nummxhosts)
2012 		{
2013 			char sep = ':';
2014 			char *endp;
2015 			static char hostbuf[MAXNAME + 1];
2016 			bool tried_fallbacksmarthost = false;
2017 
2018 # if NETINET6
2019 			if (*mxhosts[hostnum] == '[')
2020 			{
2021 				endp = strchr(mxhosts[hostnum] + 1, ']');
2022 				if (endp != NULL)
2023 					endp = strpbrk(endp + 1, ":,");
2024 			}
2025 			else
2026 				endp = strpbrk(mxhosts[hostnum], ":,");
2027 # else /* NETINET6 */
2028 			endp = strpbrk(mxhosts[hostnum], ":,");
2029 # endif /* NETINET6 */
2030 			if (endp != NULL)
2031 			{
2032 				sep = *endp;
2033 				*endp = '\0';
2034 			}
2035 
2036 			if (hostnum == 1 && skip_back != NULL)
2037 			{
2038 				/*
2039 				**  Coattail piggybacking is no longer an
2040 				**  option with the mail host next to be tried
2041 				**  no longer the lowest MX preference
2042 				**  (hostnum == 1 meaning we're on the second
2043 				**  preference). We do not try to coattail
2044 				**  piggyback more than the first MX preference.
2045 				**  Revert 'tochain' to last location for
2046 				**  coincidental piggybacking. This works this
2047 				**  easily because the q_tchain kept getting
2048 				**  added to the top of the linked list.
2049 				*/
2050 
2051 				tochain = skip_back;
2052 			}
2053 
2054 			if (*mxhosts[hostnum] == '\0')
2055 			{
2056 				syserr("deliver: null host name in signature");
2057 				hostnum++;
2058 				if (endp != NULL)
2059 					*endp = sep;
2060 				continue;
2061 			}
2062 			(void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2063 					  sizeof hostbuf);
2064 			hostnum++;
2065 			if (endp != NULL)
2066 				*endp = sep;
2067 
2068   one_last_try:
2069 			/* see if we already know that this host is fried */
2070 			CurHostName = hostbuf;
2071 			mci = mci_get(hostbuf, m);
2072 			if (mci->mci_state != MCIS_CLOSED)
2073 			{
2074 				char *type;
2075 
2076 				if (tTd(11, 1))
2077 				{
2078 					sm_dprintf("openmailer: ");
2079 					mci_dump(sm_debug_file(), mci, false);
2080 				}
2081 				CurHostName = mci->mci_host;
2082 				if (bitnset(M_LMTP, m->m_flags))
2083 					type = "L";
2084 				else if (bitset(MCIF_ESMTP, mci->mci_flags))
2085 					type = "ES";
2086 				else
2087 					type = "S";
2088 				message("Using cached %sMTP connection to %s via %s...",
2089 					type, hostbuf, m->m_name);
2090 				mci->mci_deliveries++;
2091 				break;
2092 			}
2093 			mci->mci_mailer = m;
2094 			if (mci->mci_exitstat != EX_OK)
2095 			{
2096 				if (mci->mci_exitstat == EX_TEMPFAIL)
2097 					goodmxfound = true;
2098 
2099 				/* Try FallbackSmartHost? */
2100 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2101 						    hostbuf, sizeof hostbuf,
2102 						    mci->mci_exitstat))
2103 					goto one_last_try;
2104 
2105 				continue;
2106 			}
2107 
2108 			if (mci_lock_host(mci) != EX_OK)
2109 			{
2110 				mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2111 				goodmxfound = true;
2112 				continue;
2113 			}
2114 
2115 			/* try the connection */
2116 			sm_setproctitle(true, e, "%s %s: %s",
2117 					qid_printname(e),
2118 					hostbuf, "user open");
2119 # if NETUNIX
2120 			if (mux_path != NULL)
2121 			{
2122 				message("Connecting to %s via %s...",
2123 					mux_path, m->m_name);
2124 				i = makeconnection_ds((char *) mux_path, mci);
2125 			}
2126 			else
2127 # endif /* NETUNIX */
2128 			{
2129 				if (port == 0)
2130 					message("Connecting to %s via %s...",
2131 						hostbuf, m->m_name);
2132 				else
2133 					message("Connecting to %s port %d via %s...",
2134 						hostbuf, ntohs(port),
2135 						m->m_name);
2136 				i = makeconnection(hostbuf, port, mci, e,
2137 						   enough);
2138 			}
2139 			mci->mci_errno = errno;
2140 			mci->mci_lastuse = curtime();
2141 			mci->mci_deliveries = 0;
2142 			mci->mci_exitstat = i;
2143 # if NAMED_BIND
2144 			mci->mci_herrno = h_errno;
2145 # endif /* NAMED_BIND */
2146 
2147 			/*
2148 			**  Have we tried long enough to get a connection?
2149 			**	If yes, skip to the fallback MX hosts
2150 			**	(if existent).
2151 			*/
2152 
2153 			if (enough > 0 && mci->mci_lastuse >= enough)
2154 			{
2155 				int h;
2156 # if NAMED_BIND
2157 				extern int NumFallbackMXHosts;
2158 # else /* NAMED_BIND */
2159 				const int NumFallbackMXHosts = 0;
2160 # endif /* NAMED_BIND */
2161 
2162 				if (hostnum < nummxhosts && LogLevel > 9)
2163 					sm_syslog(LOG_INFO, e->e_id,
2164 						  "Timeout.to_aconnect occurred before exhausting all addresses");
2165 
2166 				/* turn off timeout if fallback available */
2167 				if (NumFallbackMXHosts > 0)
2168 					enough = 0;
2169 
2170 				/* skip to a fallback MX host */
2171 				h = nummxhosts - NumFallbackMXHosts;
2172 				if (hostnum < h)
2173 					hostnum = h;
2174 			}
2175 			if (i == EX_OK)
2176 			{
2177 				goodmxfound = true;
2178 				markstats(e, firstto, STATS_CONNECT);
2179 				mci->mci_state = MCIS_OPENING;
2180 				mci_cache(mci);
2181 				if (TrafficLogFile != NULL)
2182 					(void) sm_io_fprintf(TrafficLogFile,
2183 							     SM_TIME_DEFAULT,
2184 							     "%05d === CONNECT %s\n",
2185 							     (int) CurrentPid,
2186 							     hostbuf);
2187 				break;
2188 			}
2189 			else
2190 			{
2191 				/* Try FallbackSmartHost? */
2192 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2193 						    hostbuf, sizeof hostbuf, i))
2194 					goto one_last_try;
2195 
2196 				if (tTd(11, 1))
2197 					sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2198 						   i, errno);
2199 				if (i == EX_TEMPFAIL)
2200 					goodmxfound = true;
2201 				mci_unlock_host(mci);
2202 			}
2203 
2204 			/* enter status of this host */
2205 			setstat(i);
2206 
2207 			/* should print some message here for -v mode */
2208 		}
2209 		if (mci == NULL)
2210 		{
2211 			syserr("deliver: no host name");
2212 			rcode = EX_SOFTWARE;
2213 			goto give_up;
2214 		}
2215 		mci->mci_pid = 0;
2216 	}
2217 	else
2218 	{
2219 		/* flush any expired connections */
2220 		(void) mci_scan(NULL);
2221 		mci = NULL;
2222 
2223 		if (bitnset(M_LMTP, m->m_flags))
2224 		{
2225 			/* try to get a cached connection */
2226 			mci = mci_get(m->m_name, m);
2227 			if (mci->mci_host == NULL)
2228 				mci->mci_host = m->m_name;
2229 			CurHostName = mci->mci_host;
2230 			if (mci->mci_state != MCIS_CLOSED)
2231 			{
2232 				message("Using cached LMTP connection for %s...",
2233 					m->m_name);
2234 				mci->mci_deliveries++;
2235 				goto do_transfer;
2236 			}
2237 		}
2238 
2239 		/* announce the connection to verbose listeners */
2240 		if (host == NULL || host[0] == '\0')
2241 			message("Connecting to %s...", m->m_name);
2242 		else
2243 			message("Connecting to %s via %s...", host, m->m_name);
2244 		if (TrafficLogFile != NULL)
2245 		{
2246 			char **av;
2247 
2248 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2249 					     "%05d === EXEC", (int) CurrentPid);
2250 			for (av = pv; *av != NULL; av++)
2251 				(void) sm_io_fprintf(TrafficLogFile,
2252 						     SM_TIME_DEFAULT, " %s",
2253 						     *av);
2254 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2255 					     "\n");
2256 		}
2257 
2258 #if XDEBUG
2259 		checkfd012("before creating mail pipe");
2260 #endif /* XDEBUG */
2261 
2262 		/* create a pipe to shove the mail through */
2263 		if (pipe(mpvect) < 0)
2264 		{
2265 			syserr("%s... openmailer(%s): pipe (to mailer)",
2266 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2267 			if (tTd(11, 1))
2268 				sm_dprintf("openmailer: NULL\n");
2269 			rcode = EX_OSERR;
2270 			goto give_up;
2271 		}
2272 
2273 #if XDEBUG
2274 		/* make sure we didn't get one of the standard I/O files */
2275 		if (mpvect[0] < 3 || mpvect[1] < 3)
2276 		{
2277 			syserr("%s... openmailer(%s): bogus mpvect %d %d",
2278 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2279 			       mpvect[0], mpvect[1]);
2280 			printopenfds(true);
2281 			if (tTd(11, 1))
2282 				sm_dprintf("openmailer: NULL\n");
2283 			rcode = EX_OSERR;
2284 			goto give_up;
2285 		}
2286 
2287 		/* make sure system call isn't dead meat */
2288 		checkfdopen(mpvect[0], "mpvect[0]");
2289 		checkfdopen(mpvect[1], "mpvect[1]");
2290 		if (mpvect[0] == mpvect[1] ||
2291 		    (e->e_lockfp != NULL &&
2292 		     (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2293 						 NULL) ||
2294 		      mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2295 						 NULL))))
2296 		{
2297 			if (e->e_lockfp == NULL)
2298 				syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2299 				       shortenstring(e->e_to, MAXSHORTSTR),
2300 				       m->m_name, mpvect[0], mpvect[1]);
2301 			else
2302 				syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2303 				       shortenstring(e->e_to, MAXSHORTSTR),
2304 				       m->m_name, mpvect[0], mpvect[1],
2305 				       sm_io_getinfo(e->e_lockfp,
2306 						     SM_IO_WHAT_FD, NULL));
2307 		}
2308 #endif /* XDEBUG */
2309 
2310 		/* create a return pipe */
2311 		if (pipe(rpvect) < 0)
2312 		{
2313 			syserr("%s... openmailer(%s): pipe (from mailer)",
2314 			       shortenstring(e->e_to, MAXSHORTSTR),
2315 			       m->m_name);
2316 			(void) close(mpvect[0]);
2317 			(void) close(mpvect[1]);
2318 			if (tTd(11, 1))
2319 				sm_dprintf("openmailer: NULL\n");
2320 			rcode = EX_OSERR;
2321 			goto give_up;
2322 		}
2323 #if XDEBUG
2324 		checkfdopen(rpvect[0], "rpvect[0]");
2325 		checkfdopen(rpvect[1], "rpvect[1]");
2326 #endif /* XDEBUG */
2327 
2328 		/*
2329 		**  Actually fork the mailer process.
2330 		**	DOFORK is clever about retrying.
2331 		**
2332 		**	Dispose of SIGCHLD signal catchers that may be laying
2333 		**	around so that endmailer will get it.
2334 		*/
2335 
2336 		if (e->e_xfp != NULL)	/* for debugging */
2337 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2338 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2339 		(void) sm_signal(SIGCHLD, SIG_DFL);
2340 
2341 
2342 		DOFORK(FORK);
2343 		/* pid is set by DOFORK */
2344 
2345 		if (pid < 0)
2346 		{
2347 			/* failure */
2348 			syserr("%s... openmailer(%s): cannot fork",
2349 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2350 			(void) close(mpvect[0]);
2351 			(void) close(mpvect[1]);
2352 			(void) close(rpvect[0]);
2353 			(void) close(rpvect[1]);
2354 			if (tTd(11, 1))
2355 				sm_dprintf("openmailer: NULL\n");
2356 			rcode = EX_OSERR;
2357 			goto give_up;
2358 		}
2359 		else if (pid == 0)
2360 		{
2361 			int save_errno;
2362 			int sff;
2363 			int new_euid = NO_UID;
2364 			int new_ruid = NO_UID;
2365 			int new_gid = NO_GID;
2366 			char *user = NULL;
2367 			struct stat stb;
2368 			extern int DtableSize;
2369 
2370 			CurrentPid = getpid();
2371 
2372 			/* clear the events to turn off SIGALRMs */
2373 			sm_clear_events();
2374 
2375 			/* Reset global flags */
2376 			RestartRequest = NULL;
2377 			RestartWorkGroup = false;
2378 			ShutdownRequest = NULL;
2379 			PendingSignal = 0;
2380 
2381 			if (e->e_lockfp != NULL)
2382 				(void) close(sm_io_getinfo(e->e_lockfp,
2383 							   SM_IO_WHAT_FD,
2384 							   NULL));
2385 
2386 			/* child -- set up input & exec mailer */
2387 			(void) sm_signal(SIGALRM, sm_signal_noop);
2388 			(void) sm_signal(SIGCHLD, SIG_DFL);
2389 			(void) sm_signal(SIGHUP, SIG_IGN);
2390 			(void) sm_signal(SIGINT, SIG_IGN);
2391 			(void) sm_signal(SIGTERM, SIG_DFL);
2392 # ifdef SIGUSR1
2393 			(void) sm_signal(SIGUSR1, sm_signal_noop);
2394 # endif /* SIGUSR1 */
2395 
2396 			if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2397 				stb.st_mode = 0;
2398 
2399 # if HASSETUSERCONTEXT
2400 			/*
2401 			**  Set user resources.
2402 			*/
2403 
2404 			if (contextaddr != NULL)
2405 			{
2406 				int sucflags;
2407 				struct passwd *pwd;
2408 
2409 				if (contextaddr->q_ruser != NULL)
2410 					pwd = sm_getpwnam(contextaddr->q_ruser);
2411 				else
2412 					pwd = sm_getpwnam(contextaddr->q_user);
2413 				sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2414 #ifdef LOGIN_SETMAC
2415 				sucflags |= LOGIN_SETMAC;
2416 #endif /* LOGIN_SETMAC */
2417 				if (pwd != NULL &&
2418 				    setusercontext(NULL, pwd, pwd->pw_uid,
2419 						   sucflags) == -1 &&
2420 				    suidwarn)
2421 				{
2422 					syserr("openmailer: setusercontext() failed");
2423 					exit(EX_TEMPFAIL);
2424 				}
2425 			}
2426 # endif /* HASSETUSERCONTEXT */
2427 
2428 #if HASNICE
2429 			/* tweak niceness */
2430 			if (m->m_nice != 0)
2431 				(void) nice(m->m_nice);
2432 #endif /* HASNICE */
2433 
2434 			/* reset group id */
2435 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2436 			{
2437 				if (m->m_gid == NO_GID)
2438 					new_gid = RunAsGid;
2439 				else
2440 					new_gid = m->m_gid;
2441 			}
2442 			else if (bitset(S_ISGID, stb.st_mode))
2443 				new_gid = stb.st_gid;
2444 			else if (ctladdr != NULL && ctladdr->q_gid != 0)
2445 			{
2446 				if (!DontInitGroups)
2447 				{
2448 					user = ctladdr->q_ruser;
2449 					if (user == NULL)
2450 						user = ctladdr->q_user;
2451 
2452 					if (initgroups(user,
2453 						       ctladdr->q_gid) == -1
2454 					    && suidwarn)
2455 					{
2456 						syserr("openmailer: initgroups(%s, %d) failed",
2457 							user, ctladdr->q_gid);
2458 						exit(EX_TEMPFAIL);
2459 					}
2460 				}
2461 				else
2462 				{
2463 					GIDSET_T gidset[1];
2464 
2465 					gidset[0] = ctladdr->q_gid;
2466 					if (setgroups(1, gidset) == -1
2467 					    && suidwarn)
2468 					{
2469 						syserr("openmailer: setgroups() failed");
2470 						exit(EX_TEMPFAIL);
2471 					}
2472 				}
2473 				new_gid = ctladdr->q_gid;
2474 			}
2475 			else
2476 			{
2477 				if (!DontInitGroups)
2478 				{
2479 					user = DefUser;
2480 					if (initgroups(DefUser, DefGid) == -1 &&
2481 					    suidwarn)
2482 					{
2483 						syserr("openmailer: initgroups(%s, %d) failed",
2484 						       DefUser, DefGid);
2485 						exit(EX_TEMPFAIL);
2486 					}
2487 				}
2488 				else
2489 				{
2490 					GIDSET_T gidset[1];
2491 
2492 					gidset[0] = DefGid;
2493 					if (setgroups(1, gidset) == -1
2494 					    && suidwarn)
2495 					{
2496 						syserr("openmailer: setgroups() failed");
2497 						exit(EX_TEMPFAIL);
2498 					}
2499 				}
2500 				if (m->m_gid == NO_GID)
2501 					new_gid = DefGid;
2502 				else
2503 					new_gid = m->m_gid;
2504 			}
2505 			if (new_gid != NO_GID)
2506 			{
2507 				if (RunAsUid != 0 &&
2508 				    bitnset(M_SPECIFIC_UID, m->m_flags) &&
2509 				    new_gid != getgid() &&
2510 				    new_gid != getegid())
2511 				{
2512 					/* Only root can change the gid */
2513 					syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2514 					       (int) RunAsUid, (int) new_gid,
2515 					       (int) getgid(), (int) getegid());
2516 					exit(EX_TEMPFAIL);
2517 				}
2518 
2519 				if (setgid(new_gid) < 0 && suidwarn)
2520 				{
2521 					syserr("openmailer: setgid(%ld) failed",
2522 					       (long) new_gid);
2523 					exit(EX_TEMPFAIL);
2524 				}
2525 			}
2526 
2527 			/* change root to some "safe" directory */
2528 			if (m->m_rootdir != NULL)
2529 			{
2530 				expand(m->m_rootdir, cbuf, sizeof cbuf, e);
2531 				if (tTd(11, 20))
2532 					sm_dprintf("openmailer: chroot %s\n",
2533 						   cbuf);
2534 				if (chroot(cbuf) < 0)
2535 				{
2536 					syserr("openmailer: Cannot chroot(%s)",
2537 					       cbuf);
2538 					exit(EX_TEMPFAIL);
2539 				}
2540 				if (chdir("/") < 0)
2541 				{
2542 					syserr("openmailer: cannot chdir(/)");
2543 					exit(EX_TEMPFAIL);
2544 				}
2545 			}
2546 
2547 			/* reset user id */
2548 			endpwent();
2549 			sm_mbdb_terminate();
2550 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2551 			{
2552 				if (m->m_uid == NO_UID)
2553 					new_euid = RunAsUid;
2554 				else
2555 					new_euid = m->m_uid;
2556 
2557 				/*
2558 				**  Undo the effects of the uid change in main
2559 				**  for signal handling.  The real uid may
2560 				**  be used by mailer in adding a "From "
2561 				**  line.
2562 				*/
2563 
2564 				if (RealUid != 0 && RealUid != getuid())
2565 				{
2566 # if MAILER_SETUID_METHOD == USE_SETEUID
2567 #  if HASSETREUID
2568 					if (setreuid(RealUid, geteuid()) < 0)
2569 					{
2570 						syserr("openmailer: setreuid(%d, %d) failed",
2571 						       (int) RealUid, (int) geteuid());
2572 						exit(EX_OSERR);
2573 					}
2574 #  endif /* HASSETREUID */
2575 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2576 # if MAILER_SETUID_METHOD == USE_SETREUID
2577 					new_ruid = RealUid;
2578 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2579 				}
2580 			}
2581 			else if (bitset(S_ISUID, stb.st_mode))
2582 				new_ruid = stb.st_uid;
2583 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
2584 				new_ruid = ctladdr->q_uid;
2585 			else if (m->m_uid != NO_UID)
2586 				new_ruid = m->m_uid;
2587 			else
2588 				new_ruid = DefUid;
2589 
2590 # if _FFR_USE_SETLOGIN
2591 			/* run disconnected from terminal and set login name */
2592 			if (setsid() >= 0 &&
2593 			    ctladdr != NULL && ctladdr->q_uid != 0 &&
2594 			    new_euid == ctladdr->q_uid)
2595 			{
2596 				struct passwd *pwd;
2597 
2598 				pwd = sm_getpwuid(ctladdr->q_uid);
2599 				if (pwd != NULL && suidwarn)
2600 					(void) setlogin(pwd->pw_name);
2601 				endpwent();
2602 			}
2603 # endif /* _FFR_USE_SETLOGIN */
2604 
2605 			if (new_euid != NO_UID)
2606 			{
2607 				if (RunAsUid != 0 && new_euid != RunAsUid)
2608 				{
2609 					/* Only root can change the uid */
2610 					syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2611 					       (int) new_euid, (int) RunAsUid);
2612 					exit(EX_TEMPFAIL);
2613 				}
2614 
2615 				vendor_set_uid(new_euid);
2616 # if MAILER_SETUID_METHOD == USE_SETEUID
2617 				if (seteuid(new_euid) < 0 && suidwarn)
2618 				{
2619 					syserr("openmailer: seteuid(%ld) failed",
2620 					       (long) new_euid);
2621 					exit(EX_TEMPFAIL);
2622 				}
2623 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2624 # if MAILER_SETUID_METHOD == USE_SETREUID
2625 				if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2626 				{
2627 					syserr("openmailer: setreuid(%ld, %ld) failed",
2628 					       (long) new_ruid, (long) new_euid);
2629 					exit(EX_TEMPFAIL);
2630 				}
2631 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2632 # if MAILER_SETUID_METHOD == USE_SETUID
2633 				if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2634 				{
2635 					syserr("openmailer: setuid(%ld) failed",
2636 					       (long) new_euid);
2637 					exit(EX_TEMPFAIL);
2638 				}
2639 # endif /* MAILER_SETUID_METHOD == USE_SETUID */
2640 			}
2641 			else if (new_ruid != NO_UID)
2642 			{
2643 				vendor_set_uid(new_ruid);
2644 				if (setuid(new_ruid) < 0 && suidwarn)
2645 				{
2646 					syserr("openmailer: setuid(%ld) failed",
2647 					       (long) new_ruid);
2648 					exit(EX_TEMPFAIL);
2649 				}
2650 			}
2651 
2652 			if (tTd(11, 2))
2653 				sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2654 					   (int) getuid(), (int) geteuid(),
2655 					   (int) getgid(), (int) getegid());
2656 
2657 			/* move into some "safe" directory */
2658 			if (m->m_execdir != NULL)
2659 			{
2660 				char *q;
2661 
2662 				for (p = m->m_execdir; p != NULL; p = q)
2663 				{
2664 					q = strchr(p, ':');
2665 					if (q != NULL)
2666 						*q = '\0';
2667 					expand(p, cbuf, sizeof cbuf, e);
2668 					if (q != NULL)
2669 						*q++ = ':';
2670 					if (tTd(11, 20))
2671 						sm_dprintf("openmailer: trydir %s\n",
2672 							   cbuf);
2673 					if (cbuf[0] != '\0' &&
2674 					    chdir(cbuf) >= 0)
2675 						break;
2676 				}
2677 			}
2678 
2679 			/* Check safety of program to be run */
2680 			sff = SFF_ROOTOK|SFF_EXECOK;
2681 			if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2682 				     DontBlameSendmail))
2683 				sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2684 			if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2685 				    DontBlameSendmail))
2686 				sff |= SFF_NOPATHCHECK;
2687 			else
2688 				sff |= SFF_SAFEDIRPATH;
2689 			ret = safefile(m->m_mailer, getuid(), getgid(),
2690 				       user, sff, 0, NULL);
2691 			if (ret != 0)
2692 				sm_syslog(LOG_INFO, e->e_id,
2693 					  "Warning: program %s unsafe: %s",
2694 					  m->m_mailer, sm_errstring(ret));
2695 
2696 			/* arrange to filter std & diag output of command */
2697 			(void) close(rpvect[0]);
2698 			if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2699 			{
2700 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2701 				       shortenstring(e->e_to, MAXSHORTSTR),
2702 				       m->m_name, rpvect[1]);
2703 				_exit(EX_OSERR);
2704 			}
2705 			(void) close(rpvect[1]);
2706 
2707 			if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2708 			{
2709 				syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2710 				       shortenstring(e->e_to, MAXSHORTSTR),
2711 				       m->m_name);
2712 				_exit(EX_OSERR);
2713 			}
2714 
2715 			/* arrange to get standard input */
2716 			(void) close(mpvect[1]);
2717 			if (dup2(mpvect[0], STDIN_FILENO) < 0)
2718 			{
2719 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2720 				       shortenstring(e->e_to, MAXSHORTSTR),
2721 				       m->m_name, mpvect[0]);
2722 				_exit(EX_OSERR);
2723 			}
2724 			(void) close(mpvect[0]);
2725 
2726 			/* arrange for all the files to be closed */
2727 			sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2728 
2729 # if !_FFR_USE_SETLOGIN
2730 			/* run disconnected from terminal */
2731 			(void) setsid();
2732 # endif /* !_FFR_USE_SETLOGIN */
2733 
2734 			/* try to execute the mailer */
2735 			(void) execve(m->m_mailer, (ARGV_T) pv,
2736 				      (ARGV_T) UserEnviron);
2737 			save_errno = errno;
2738 			syserr("Cannot exec %s", m->m_mailer);
2739 			if (bitnset(M_LOCALMAILER, m->m_flags) ||
2740 			    transienterror(save_errno))
2741 				_exit(EX_OSERR);
2742 			_exit(EX_UNAVAILABLE);
2743 		}
2744 
2745 		/*
2746 		**  Set up return value.
2747 		*/
2748 
2749 		if (mci == NULL)
2750 		{
2751 			if (clever)
2752 			{
2753 				/*
2754 				**  Allocate from general heap, not
2755 				**  envelope rpool, because this mci
2756 				**  is going to be cached.
2757 				*/
2758 
2759 				mci = mci_new(NULL);
2760 			}
2761 			else
2762 			{
2763 				/*
2764 				**  Prevent a storage leak by allocating
2765 				**  this from the envelope rpool.
2766 				*/
2767 
2768 				mci = mci_new(e->e_rpool);
2769 			}
2770 		}
2771 		mci->mci_mailer = m;
2772 		if (clever)
2773 		{
2774 			mci->mci_state = MCIS_OPENING;
2775 			mci_cache(mci);
2776 		}
2777 		else
2778 		{
2779 			mci->mci_state = MCIS_OPEN;
2780 		}
2781 		mci->mci_pid = pid;
2782 		(void) close(mpvect[0]);
2783 		mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2784 					  (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2785 					  NULL);
2786 		if (mci->mci_out == NULL)
2787 		{
2788 			syserr("deliver: cannot create mailer output channel, fd=%d",
2789 			       mpvect[1]);
2790 			(void) close(mpvect[1]);
2791 			(void) close(rpvect[0]);
2792 			(void) close(rpvect[1]);
2793 			rcode = EX_OSERR;
2794 			goto give_up;
2795 		}
2796 
2797 		(void) close(rpvect[1]);
2798 		mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2799 					 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2800 					 NULL);
2801 		if (mci->mci_in == NULL)
2802 		{
2803 			syserr("deliver: cannot create mailer input channel, fd=%d",
2804 			       mpvect[1]);
2805 			(void) close(rpvect[0]);
2806 			(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2807 			mci->mci_out = NULL;
2808 			rcode = EX_OSERR;
2809 			goto give_up;
2810 		}
2811 	}
2812 
2813 	/*
2814 	**  If we are in SMTP opening state, send initial protocol.
2815 	*/
2816 
2817 	if (bitnset(M_7BITS, m->m_flags) &&
2818 	    (!clever || mci->mci_state == MCIS_OPENING))
2819 		mci->mci_flags |= MCIF_7BIT;
2820 	if (clever && mci->mci_state != MCIS_CLOSED)
2821 	{
2822 # if STARTTLS || SASL
2823 		int dotpos;
2824 		char *srvname;
2825 		extern SOCKADDR CurHostAddr;
2826 # endif /* STARTTLS || SASL */
2827 
2828 # if SASL
2829 #  define DONE_AUTH(f)		bitset(MCIF_AUTHACT, f)
2830 # endif /* SASL */
2831 # if STARTTLS
2832 #  define DONE_STARTTLS(f)	bitset(MCIF_TLSACT, f)
2833 # endif /* STARTTLS */
2834 # define ONLY_HELO(f)		bitset(MCIF_ONLY_EHLO, f)
2835 # define SET_HELO(f)		f |= MCIF_ONLY_EHLO
2836 # define CLR_HELO(f)		f &= ~MCIF_ONLY_EHLO
2837 
2838 # if STARTTLS || SASL
2839 		/* don't use CurHostName, it is changed in many places */
2840 		if (mci->mci_host != NULL)
2841 		{
2842 			srvname = mci->mci_host;
2843 			dotpos = strlen(srvname) - 1;
2844 			if (dotpos >= 0)
2845 			{
2846 				if (srvname[dotpos] == '.')
2847 					srvname[dotpos] = '\0';
2848 				else
2849 					dotpos = -1;
2850 			}
2851 		}
2852 		else if (mci->mci_mailer != NULL)
2853 		{
2854 			srvname = mci->mci_mailer->m_name;
2855 			dotpos = -1;
2856 		}
2857 		else
2858 		{
2859 			srvname = "local";
2860 			dotpos = -1;
2861 		}
2862 
2863 		/* don't set {server_name} to NULL or "": see getauth() */
2864 		macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2865 			  srvname);
2866 
2867 		/* CurHostAddr is set by makeconnection() and mci_get() */
2868 		if (CurHostAddr.sa.sa_family != 0)
2869 		{
2870 			macdefine(&mci->mci_macro, A_TEMP,
2871 				  macid("{server_addr}"),
2872 				  anynet_ntoa(&CurHostAddr));
2873 		}
2874 		else if (mci->mci_mailer != NULL)
2875 		{
2876 			/* mailer name is unique, use it as address */
2877 			macdefine(&mci->mci_macro, A_PERM,
2878 				  macid("{server_addr}"),
2879 				  mci->mci_mailer->m_name);
2880 		}
2881 		else
2882 		{
2883 			/* don't set it to NULL or "": see getauth() */
2884 			macdefine(&mci->mci_macro, A_PERM,
2885 				  macid("{server_addr}"), "0");
2886 		}
2887 
2888 		/* undo change of srvname (mci->mci_host) */
2889 		if (dotpos >= 0)
2890 			srvname[dotpos] = '.';
2891 
2892 reconnect:	/* after switching to an encrypted connection */
2893 # endif /* STARTTLS || SASL */
2894 
2895 		/* set the current connection information */
2896 		e->e_mci = mci;
2897 # if SASL
2898 		mci->mci_saslcap = NULL;
2899 # endif /* SASL */
2900 		smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2901 		CLR_HELO(mci->mci_flags);
2902 
2903 		if (IS_DLVR_RETURN(e))
2904 		{
2905 			/*
2906 			**  Check whether other side can deliver e-mail
2907 			**  fast enough
2908 			*/
2909 
2910 			if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2911 			{
2912 				e->e_status = "5.4.7";
2913 				usrerrenh(e->e_status,
2914 					  "554 Server does not support Deliver By");
2915 				rcode = EX_UNAVAILABLE;
2916 				goto give_up;
2917 			}
2918 			if (e->e_deliver_by > 0 &&
2919 			    e->e_deliver_by - (curtime() - e->e_ctime) <
2920 			    mci->mci_min_by)
2921 			{
2922 				e->e_status = "5.4.7";
2923 				usrerrenh(e->e_status,
2924 					  "554 Message can't be delivered in time; %ld < %ld",
2925 					  e->e_deliver_by - (curtime() - e->e_ctime),
2926 					  mci->mci_min_by);
2927 				rcode = EX_UNAVAILABLE;
2928 				goto give_up;
2929 			}
2930 		}
2931 
2932 # if STARTTLS
2933 		/* first TLS then AUTH to provide a security layer */
2934 		if (mci->mci_state != MCIS_CLOSED &&
2935 		    !DONE_STARTTLS(mci->mci_flags))
2936 		{
2937 			int olderrors;
2938 			bool usetls;
2939 			bool saveQuickAbort = QuickAbort;
2940 			bool saveSuprErrs = SuprErrs;
2941 			char *host = NULL;
2942 
2943 			rcode = EX_OK;
2944 			usetls = bitset(MCIF_TLS, mci->mci_flags);
2945 			if (usetls)
2946 				usetls = !iscltflgset(e, D_NOTLS);
2947 
2948 			if (usetls)
2949 			{
2950 				host = macvalue(macid("{server_name}"), e);
2951 				olderrors = Errors;
2952 				QuickAbort = false;
2953 				SuprErrs = true;
2954 				if (rscheck("try_tls", host, NULL, e,
2955 					    RSF_RMCOMM, 7, host, NOQID) != EX_OK
2956 				    || Errors > olderrors)
2957 					usetls = false;
2958 				SuprErrs = saveSuprErrs;
2959 				QuickAbort = saveQuickAbort;
2960 			}
2961 
2962 			if (usetls)
2963 			{
2964 				if ((rcode = starttls(m, mci, e)) == EX_OK)
2965 				{
2966 					/* start again without STARTTLS */
2967 					mci->mci_flags |= MCIF_TLSACT;
2968 				}
2969 				else
2970 				{
2971 					char *s;
2972 
2973 					/*
2974 					**  TLS negotation failed, what to do?
2975 					**  fall back to unencrypted connection
2976 					**  or abort? How to decide?
2977 					**  set a macro and call a ruleset.
2978 					*/
2979 
2980 					mci->mci_flags &= ~MCIF_TLS;
2981 					switch (rcode)
2982 					{
2983 					  case EX_TEMPFAIL:
2984 						s = "TEMP";
2985 						break;
2986 					  case EX_USAGE:
2987 						s = "USAGE";
2988 						break;
2989 					  case EX_PROTOCOL:
2990 						s = "PROTOCOL";
2991 						break;
2992 					  case EX_SOFTWARE:
2993 						s = "SOFTWARE";
2994 						break;
2995 					  case EX_UNAVAILABLE:
2996 						s = "NONE";
2997 						break;
2998 
2999 					  /* everything else is a failure */
3000 					  default:
3001 						s = "FAILURE";
3002 						rcode = EX_TEMPFAIL;
3003 					}
3004 					macdefine(&e->e_macro, A_PERM,
3005 						  macid("{verify}"), s);
3006 				}
3007 			}
3008 			else
3009 				macdefine(&e->e_macro, A_PERM,
3010 					  macid("{verify}"), "NONE");
3011 			olderrors = Errors;
3012 			QuickAbort = false;
3013 			SuprErrs = true;
3014 
3015 			/*
3016 			**  rcode == EX_SOFTWARE is special:
3017 			**  the TLS negotation failed
3018 			**  we have to drop the connection no matter what
3019 			**  However, we call tls_server to give it the chance
3020 			**  to log the problem and return an appropriate
3021 			**  error code.
3022 			*/
3023 
3024 			if (rscheck("tls_server",
3025 				    macvalue(macid("{verify}"), e),
3026 				    NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3027 				    host, NOQID) != EX_OK ||
3028 			    Errors > olderrors ||
3029 			    rcode == EX_SOFTWARE)
3030 			{
3031 				char enhsc[ENHSCLEN];
3032 				extern char MsgBuf[];
3033 
3034 				if (ISSMTPCODE(MsgBuf) &&
3035 				    extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3036 				{
3037 					p = sm_rpool_strdup_x(e->e_rpool,
3038 							      MsgBuf);
3039 				}
3040 				else
3041 				{
3042 					p = "403 4.7.0 server not authenticated.";
3043 					(void) sm_strlcpy(enhsc, "4.7.0",
3044 							  sizeof enhsc);
3045 				}
3046 				SuprErrs = saveSuprErrs;
3047 				QuickAbort = saveQuickAbort;
3048 
3049 				if (rcode == EX_SOFTWARE)
3050 				{
3051 					/* drop the connection */
3052 					mci->mci_state = MCIS_QUITING;
3053 					if (mci->mci_in != NULL)
3054 					{
3055 						(void) sm_io_close(mci->mci_in,
3056 								   SM_TIME_DEFAULT);
3057 						mci->mci_in = NULL;
3058 					}
3059 					mci->mci_flags &= ~MCIF_TLSACT;
3060 					(void) endmailer(mci, e, pv);
3061 				}
3062 				else
3063 				{
3064 					/* abort transfer */
3065 					smtpquit(m, mci, e);
3066 				}
3067 
3068 				/* avoid bogus error msg */
3069 				mci->mci_errno = 0;
3070 
3071 				/* temp or permanent failure? */
3072 				rcode = (*p == '4') ? EX_TEMPFAIL
3073 						    : EX_UNAVAILABLE;
3074 				mci_setstat(mci, rcode, enhsc, p);
3075 
3076 				/*
3077 				**  hack to get the error message into
3078 				**  the envelope (done in giveresponse())
3079 				*/
3080 
3081 				(void) sm_strlcpy(SmtpError, p,
3082 						  sizeof SmtpError);
3083 			}
3084 			QuickAbort = saveQuickAbort;
3085 			SuprErrs = saveSuprErrs;
3086 			if (DONE_STARTTLS(mci->mci_flags) &&
3087 			    mci->mci_state != MCIS_CLOSED)
3088 			{
3089 				SET_HELO(mci->mci_flags);
3090 				mci->mci_flags &= ~MCIF_EXTENS;
3091 				goto reconnect;
3092 			}
3093 		}
3094 # endif /* STARTTLS */
3095 # if SASL
3096 		/* if other server supports authentication let's authenticate */
3097 		if (mci->mci_state != MCIS_CLOSED &&
3098 		    mci->mci_saslcap != NULL &&
3099 		    !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3100 		{
3101 			/* Should we require some minimum authentication? */
3102 			if ((ret = smtpauth(m, mci, e)) == EX_OK)
3103 			{
3104 				int result;
3105 				sasl_ssf_t *ssf = NULL;
3106 
3107 				/* Get security strength (features) */
3108 				result = sasl_getprop(mci->mci_conn, SASL_SSF,
3109 # if SASL >= 20000
3110 						      (const void **) &ssf);
3111 # else /* SASL >= 20000 */
3112 						      (void **) &ssf);
3113 # endif /* SASL >= 20000 */
3114 
3115 				/* XXX authid? */
3116 				if (LogLevel > 9)
3117 					sm_syslog(LOG_INFO, NOQID,
3118 						  "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3119 						  mci->mci_host,
3120 						  macvalue(macid("{auth_type}"), e),
3121 						  result == SASL_OK ? *ssf : 0);
3122 
3123 				/*
3124 				**  Only switch to encrypted connection
3125 				**  if a security layer has been negotiated
3126 				*/
3127 
3128 				if (result == SASL_OK && *ssf > 0)
3129 				{
3130 					int tmo;
3131 
3132 					/*
3133 					**  Convert I/O layer to use SASL.
3134 					**  If the call fails, the connection
3135 					**  is aborted.
3136 					*/
3137 
3138 					tmo = DATA_PROGRESS_TIMEOUT * 1000;
3139 					if (sfdcsasl(&mci->mci_in,
3140 						     &mci->mci_out,
3141 						     mci->mci_conn, tmo) == 0)
3142 					{
3143 						mci->mci_flags &= ~MCIF_EXTENS;
3144 						mci->mci_flags |= MCIF_AUTHACT|
3145 								  MCIF_ONLY_EHLO;
3146 						goto reconnect;
3147 					}
3148 					syserr("AUTH TLS switch failed in client");
3149 				}
3150 				/* else? XXX */
3151 				mci->mci_flags |= MCIF_AUTHACT;
3152 
3153 			}
3154 			else if (ret == EX_TEMPFAIL)
3155 			{
3156 				if (LogLevel > 8)
3157 					sm_syslog(LOG_ERR, NOQID,
3158 						  "AUTH=client, relay=%.100s, temporary failure, connection abort",
3159 						  mci->mci_host);
3160 				smtpquit(m, mci, e);
3161 
3162 				/* avoid bogus error msg */
3163 				mci->mci_errno = 0;
3164 				rcode = EX_TEMPFAIL;
3165 				mci_setstat(mci, rcode, "4.3.0", p);
3166 
3167 				/*
3168 				**  hack to get the error message into
3169 				**  the envelope (done in giveresponse())
3170 				*/
3171 
3172 				(void) sm_strlcpy(SmtpError,
3173 						  "Temporary AUTH failure",
3174 						  sizeof SmtpError);
3175 			}
3176 		}
3177 # endif /* SASL */
3178 	}
3179 
3180 
3181 do_transfer:
3182 	/* clear out per-message flags from connection structure */
3183 	mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3184 
3185 	if (bitset(EF_HAS8BIT, e->e_flags) &&
3186 	    !bitset(EF_DONT_MIME, e->e_flags) &&
3187 	    bitnset(M_7BITS, m->m_flags))
3188 		mci->mci_flags |= MCIF_CVT8TO7;
3189 
3190 #if MIME7TO8
3191 	if (bitnset(M_MAKE8BIT, m->m_flags) &&
3192 	    !bitset(MCIF_7BIT, mci->mci_flags) &&
3193 	    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3194 	     (sm_strcasecmp(p, "quoted-printable") == 0 ||
3195 	      sm_strcasecmp(p, "base64") == 0) &&
3196 	    (p = hvalue("Content-Type", e->e_header)) != NULL)
3197 	{
3198 		/* may want to convert 7 -> 8 */
3199 		/* XXX should really parse it here -- and use a class XXX */
3200 		if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3201 		    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3202 			mci->mci_flags |= MCIF_CVT7TO8;
3203 	}
3204 #endif /* MIME7TO8 */
3205 
3206 	if (tTd(11, 1))
3207 	{
3208 		sm_dprintf("openmailer: ");
3209 		mci_dump(sm_debug_file(), mci, false);
3210 	}
3211 
3212 #if _FFR_CLIENT_SIZE
3213 	/*
3214 	**  See if we know the maximum size and
3215 	**  abort if the message is too big.
3216 	**
3217 	**  NOTE: _FFR_CLIENT_SIZE is untested.
3218 	*/
3219 
3220 	if (bitset(MCIF_SIZE, mci->mci_flags) &&
3221 	    mci->mci_maxsize > 0 &&
3222 	    e->e_msgsize > mci->mci_maxsize)
3223 	{
3224 		e->e_flags |= EF_NO_BODY_RETN;
3225 		if (bitnset(M_LOCALMAILER, m->m_flags))
3226 			e->e_status = "5.2.3";
3227 		else
3228 			e->e_status = "5.3.4";
3229 
3230 		usrerrenh(e->e_status,
3231 			  "552 Message is too large; %ld bytes max",
3232 			  mci->mci_maxsize);
3233 		rcode = EX_DATAERR;
3234 
3235 		/* Need an e_message for error */
3236 		(void) sm_snprintf(SmtpError, sizeof SmtpError,
3237 				   "Message is too large; %ld bytes max",
3238 				   mci->mci_maxsize);
3239 		goto give_up;
3240 	}
3241 #endif /* _FFR_CLIENT_SIZE */
3242 
3243 	if (mci->mci_state != MCIS_OPEN)
3244 	{
3245 		/* couldn't open the mailer */
3246 		rcode = mci->mci_exitstat;
3247 		errno = mci->mci_errno;
3248 		SM_SET_H_ERRNO(mci->mci_herrno);
3249 		if (rcode == EX_OK)
3250 		{
3251 			/* shouldn't happen */
3252 			syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3253 			       (unsigned long) mci, rcode, errno,
3254 			       mci->mci_state, firstsig);
3255 			mci_dump_all(smioout, true);
3256 			rcode = EX_SOFTWARE;
3257 		}
3258 		else if (nummxhosts > hostnum)
3259 		{
3260 			/* try next MX site */
3261 			goto tryhost;
3262 		}
3263 	}
3264 	else if (!clever)
3265 	{
3266 		bool ok;
3267 
3268 		/*
3269 		**  Format and send message.
3270 		*/
3271 
3272 		rcode = EX_OK;
3273 		errno = 0;
3274 		ok = putfromline(mci, e);
3275 		if (ok)
3276 			ok = (*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3277 		if (ok)
3278 			ok = (*e->e_putbody)(mci, e, NULL);
3279 
3280 		/*
3281 		**  Ignore an I/O error that was caused by EPIPE.
3282 		**  Some broken mailers don't read the entire body
3283 		**  but just exit() thus causing an I/O error.
3284 		*/
3285 
3286 		if (!ok && (sm_io_error(mci->mci_out) && errno == EPIPE))
3287 			ok = true;
3288 
3289 		/* (always) get the exit status */
3290 		rcode = endmailer(mci, e, pv);
3291 		if (!ok)
3292 			rcode = EX_TEMPFAIL;
3293 		if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3294 		{
3295 			/*
3296 			**  Need an e_message for mailq display.
3297 			**  We set SmtpError as
3298 			*/
3299 
3300 			(void) sm_snprintf(SmtpError, sizeof SmtpError,
3301 					   "%s mailer (%s) exited with EX_TEMPFAIL",
3302 					   m->m_name, m->m_mailer);
3303 		}
3304 	}
3305 	else
3306 	{
3307 		/*
3308 		**  Send the MAIL FROM: protocol
3309 		*/
3310 
3311 		/* XXX this isn't pipelined... */
3312 		rcode = smtpmailfrom(m, mci, e);
3313 		if (rcode == EX_OK)
3314 		{
3315 			register int i;
3316 # if PIPELINING
3317 			ADDRESS *volatile pchain;
3318 # endif /* PIPELINING */
3319 
3320 			/* send the recipient list */
3321 			tobuf[0] = '\0';
3322 			mci->mci_retryrcpt = false;
3323 			mci->mci_tolist = tobuf;
3324 # if PIPELINING
3325 			pchain = NULL;
3326 			mci->mci_nextaddr = NULL;
3327 # endif /* PIPELINING */
3328 
3329 			for (to = tochain; to != NULL; to = to->q_tchain)
3330 			{
3331 				if (!QS_IS_UNMARKED(to->q_state))
3332 					continue;
3333 
3334 				/* mark recipient state as "ok so far" */
3335 				to->q_state = QS_OK;
3336 				e->e_to = to->q_paddr;
3337 # if STARTTLS
3338 				i = rscheck("tls_rcpt", to->q_user, NULL, e,
3339 					    RSF_RMCOMM|RSF_COUNT, 3,
3340 					    mci->mci_host, e->e_id);
3341 				if (i != EX_OK)
3342 				{
3343 					markfailure(e, to, mci, i, false);
3344 					giveresponse(i, to->q_status,  m, mci,
3345 						     ctladdr, xstart, e, to);
3346 					if (i == EX_TEMPFAIL)
3347 					{
3348 						mci->mci_retryrcpt = true;
3349 						to->q_state = QS_RETRY;
3350 					}
3351 					continue;
3352 				}
3353 # endif /* STARTTLS */
3354 
3355 				i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3356 # if PIPELINING
3357 				if (i == EX_OK &&
3358 				    bitset(MCIF_PIPELINED, mci->mci_flags))
3359 				{
3360 					/*
3361 					**  Add new element to list of
3362 					**  recipients for pipelining.
3363 					*/
3364 
3365 					to->q_pchain = NULL;
3366 					if (mci->mci_nextaddr == NULL)
3367 						mci->mci_nextaddr = to;
3368 					if (pchain == NULL)
3369 						pchain = to;
3370 					else
3371 					{
3372 						pchain->q_pchain = to;
3373 						pchain = pchain->q_pchain;
3374 					}
3375 				}
3376 # endif /* PIPELINING */
3377 				if (i != EX_OK)
3378 				{
3379 					markfailure(e, to, mci, i, false);
3380 					giveresponse(i, to->q_status, m, mci,
3381 						     ctladdr, xstart, e, to);
3382 					if (i == EX_TEMPFAIL)
3383 						to->q_state = QS_RETRY;
3384 				}
3385 			}
3386 
3387 			/* No recipients in list and no missing responses? */
3388 			if (tobuf[0] == '\0'
3389 # if PIPELINING
3390 			    && mci->mci_nextaddr == NULL
3391 # endif /* PIPELINING */
3392 			   )
3393 			{
3394 				rcode = EX_OK;
3395 				e->e_to = NULL;
3396 				if (bitset(MCIF_CACHED, mci->mci_flags))
3397 					smtprset(m, mci, e);
3398 			}
3399 			else
3400 			{
3401 				e->e_to = tobuf + 1;
3402 				rcode = smtpdata(m, mci, e, ctladdr, xstart);
3403 			}
3404 		}
3405 		if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3406 		{
3407 			/* try next MX site */
3408 			goto tryhost;
3409 		}
3410 	}
3411 #if NAMED_BIND
3412 	if (ConfigLevel < 2)
3413 		_res.options |= RES_DEFNAMES | RES_DNSRCH;	/* XXX */
3414 #endif /* NAMED_BIND */
3415 
3416 	if (tTd(62, 1))
3417 		checkfds("after delivery");
3418 
3419 	/*
3420 	**  Do final status disposal.
3421 	**	We check for something in tobuf for the SMTP case.
3422 	**	If we got a temporary failure, arrange to queue the
3423 	**		addressees.
3424 	*/
3425 
3426   give_up:
3427 	if (bitnset(M_LMTP, m->m_flags))
3428 	{
3429 		lmtp_rcode = rcode;
3430 		tobuf[0] = '\0';
3431 		anyok = false;
3432 		strsize = 0;
3433 	}
3434 	else
3435 		anyok = rcode == EX_OK;
3436 
3437 	for (to = tochain; to != NULL; to = to->q_tchain)
3438 	{
3439 		/* see if address already marked */
3440 		if (!QS_IS_OK(to->q_state))
3441 			continue;
3442 
3443 		/* if running LMTP, get the status for each address */
3444 		if (bitnset(M_LMTP, m->m_flags))
3445 		{
3446 			if (lmtp_rcode == EX_OK)
3447 				rcode = smtpgetstat(m, mci, e);
3448 			if (rcode == EX_OK)
3449 			{
3450 				strsize += sm_strlcat2(tobuf + strsize, ",",
3451 						to->q_paddr,
3452 						tobufsize - strsize);
3453 				SM_ASSERT(strsize < tobufsize);
3454 				anyok = true;
3455 			}
3456 			else
3457 			{
3458 				e->e_to = to->q_paddr;
3459 				markfailure(e, to, mci, rcode, true);
3460 				giveresponse(rcode, to->q_status, m, mci,
3461 					     ctladdr, xstart, e, to);
3462 				e->e_to = tobuf + 1;
3463 				continue;
3464 			}
3465 		}
3466 		else
3467 		{
3468 			/* mark bad addresses */
3469 			if (rcode != EX_OK)
3470 			{
3471 				if (goodmxfound && rcode == EX_NOHOST)
3472 					rcode = EX_TEMPFAIL;
3473 				markfailure(e, to, mci, rcode, true);
3474 				continue;
3475 			}
3476 		}
3477 
3478 		/* successful delivery */
3479 		to->q_state = QS_SENT;
3480 		to->q_statdate = curtime();
3481 		e->e_nsent++;
3482 
3483 		/*
3484 		**  Checkpoint the send list every few addresses
3485 		*/
3486 
3487 		if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3488 		{
3489 			queueup(e, false, false);
3490 			e->e_nsent = 0;
3491 		}
3492 
3493 		if (bitnset(M_LOCALMAILER, m->m_flags) &&
3494 		    bitset(QPINGONSUCCESS, to->q_flags))
3495 		{
3496 			to->q_flags |= QDELIVERED;
3497 			to->q_status = "2.1.5";
3498 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3499 					     "%s... Successfully delivered\n",
3500 					     to->q_paddr);
3501 		}
3502 		else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3503 			 bitset(QPRIMARY, to->q_flags) &&
3504 			 !bitset(MCIF_DSN, mci->mci_flags))
3505 		{
3506 			to->q_flags |= QRELAYED;
3507 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3508 					     "%s... relayed; expect no further notifications\n",
3509 					     to->q_paddr);
3510 		}
3511 		else if (IS_DLVR_NOTIFY(e) &&
3512 			 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3513 			 bitset(QPRIMARY, to->q_flags) &&
3514 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3515 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3516 			  bitset(QPINGONFAILURE, to->q_flags) ||
3517 			  bitset(QPINGONDELAY, to->q_flags)))
3518 		{
3519 			/* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3520 			to->q_flags |= QBYNRELAY;
3521 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3522 					     "%s... Deliver-by notify: relayed\n",
3523 					     to->q_paddr);
3524 		}
3525 		else if (IS_DLVR_TRACE(e) &&
3526 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3527 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3528 			  bitset(QPINGONFAILURE, to->q_flags) ||
3529 			  bitset(QPINGONDELAY, to->q_flags)) &&
3530 			 bitset(QPRIMARY, to->q_flags))
3531 		{
3532 			/* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3533 			to->q_flags |= QBYTRACE;
3534 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3535 					     "%s... Deliver-By trace: relayed\n",
3536 					     to->q_paddr);
3537 		}
3538 	}
3539 
3540 	if (bitnset(M_LMTP, m->m_flags))
3541 	{
3542 		/*
3543 		**  Global information applies to the last recipient only;
3544 		**  clear it out to avoid bogus errors.
3545 		*/
3546 
3547 		rcode = EX_OK;
3548 		e->e_statmsg = NULL;
3549 
3550 		/* reset the mci state for the next transaction */
3551 		if (mci != NULL &&
3552 		    (mci->mci_state == MCIS_MAIL ||
3553 		     mci->mci_state == MCIS_RCPT ||
3554 		     mci->mci_state == MCIS_DATA))
3555 		{
3556 			mci->mci_state = MCIS_OPEN;
3557 			SmtpPhase = mci->mci_phase = "idle";
3558 			sm_setproctitle(true, e, "%s: %s", CurHostName,
3559 					mci->mci_phase);
3560 		}
3561 	}
3562 
3563 	if (tobuf[0] != '\0')
3564 	{
3565 		giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3566 #if 0
3567 		/*
3568 		**  This code is disabled for now because I am not
3569 		**  sure that copying status from the first recipient
3570 		**  to all non-status'ed recipients is a good idea.
3571 		*/
3572 
3573 		if (tochain->q_message != NULL &&
3574 		    !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3575 		{
3576 			for (to = tochain->q_tchain; to != NULL;
3577 			     to = to->q_tchain)
3578 			{
3579 				/* see if address already marked */
3580 				if (QS_IS_QUEUEUP(to->q_state) &&
3581 				    to->q_message == NULL)
3582 					to->q_message = sm_rpool_strdup_x(e->e_rpool,
3583 							tochain->q_message);
3584 			}
3585 		}
3586 #endif /* 0 */
3587 	}
3588 	if (anyok)
3589 		markstats(e, tochain, STATS_NORMAL);
3590 	mci_store_persistent(mci);
3591 
3592 	/* Some recipients were tempfailed, try them on the next host */
3593 	if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3594 	{
3595 		/* try next MX site */
3596 		goto tryhost;
3597 	}
3598 
3599 	/* now close the connection */
3600 	if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3601 	    !bitset(MCIF_CACHED, mci->mci_flags))
3602 		smtpquit(m, mci, e);
3603 
3604 cleanup: ;
3605 	}
3606 	SM_FINALLY
3607 	{
3608 		/*
3609 		**  Restore state and return.
3610 		*/
3611 #if XDEBUG
3612 		char wbuf[MAXLINE];
3613 
3614 		/* make absolutely certain 0, 1, and 2 are in use */
3615 		(void) sm_snprintf(wbuf, sizeof wbuf,
3616 				   "%s... end of deliver(%s)",
3617 				   e->e_to == NULL ? "NO-TO-LIST"
3618 						   : shortenstring(e->e_to,
3619 								   MAXSHORTSTR),
3620 				  m->m_name);
3621 		checkfd012(wbuf);
3622 #endif /* XDEBUG */
3623 
3624 		errno = 0;
3625 
3626 		/*
3627 		**  It was originally necessary to set macro 'g' to NULL
3628 		**  because it previously pointed to an auto buffer.
3629 		**  We don't do this any more, so this may be unnecessary.
3630 		*/
3631 
3632 		macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3633 		e->e_to = NULL;
3634 	}
3635 	SM_END_TRY
3636 	return rcode;
3637 }
3638 
3639 /*
3640 **  MARKFAILURE -- mark a failure on a specific address.
3641 **
3642 **	Parameters:
3643 **		e -- the envelope we are sending.
3644 **		q -- the address to mark.
3645 **		mci -- mailer connection information.
3646 **		rcode -- the code signifying the particular failure.
3647 **		ovr -- override an existing code?
3648 **
3649 **	Returns:
3650 **		none.
3651 **
3652 **	Side Effects:
3653 **		marks the address (and possibly the envelope) with the
3654 **			failure so that an error will be returned or
3655 **			the message will be queued, as appropriate.
3656 */
3657 
3658 void
3659 markfailure(e, q, mci, rcode, ovr)
3660 	register ENVELOPE *e;
3661 	register ADDRESS *q;
3662 	register MCI *mci;
3663 	int rcode;
3664 	bool ovr;
3665 {
3666 	int save_errno = errno;
3667 	char *status = NULL;
3668 	char *rstatus = NULL;
3669 
3670 	switch (rcode)
3671 	{
3672 	  case EX_OK:
3673 		break;
3674 
3675 	  case EX_TEMPFAIL:
3676 	  case EX_IOERR:
3677 	  case EX_OSERR:
3678 		q->q_state = QS_QUEUEUP;
3679 		break;
3680 
3681 	  default:
3682 		q->q_state = QS_BADADDR;
3683 		break;
3684 	}
3685 
3686 	/* find most specific error code possible */
3687 	if (mci != NULL && mci->mci_status != NULL)
3688 	{
3689 		status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3690 		if (mci->mci_rstatus != NULL)
3691 			rstatus = sm_rpool_strdup_x(e->e_rpool,
3692 						    mci->mci_rstatus);
3693 		else
3694 			rstatus = NULL;
3695 	}
3696 	else if (e->e_status != NULL)
3697 	{
3698 		status = e->e_status;
3699 		rstatus = NULL;
3700 	}
3701 	else
3702 	{
3703 		switch (rcode)
3704 		{
3705 		  case EX_USAGE:
3706 			status = "5.5.4";
3707 			break;
3708 
3709 		  case EX_DATAERR:
3710 			status = "5.5.2";
3711 			break;
3712 
3713 		  case EX_NOUSER:
3714 			status = "5.1.1";
3715 			break;
3716 
3717 		  case EX_NOHOST:
3718 			status = "5.1.2";
3719 			break;
3720 
3721 		  case EX_NOINPUT:
3722 		  case EX_CANTCREAT:
3723 		  case EX_NOPERM:
3724 			status = "5.3.0";
3725 			break;
3726 
3727 		  case EX_UNAVAILABLE:
3728 		  case EX_SOFTWARE:
3729 		  case EX_OSFILE:
3730 		  case EX_PROTOCOL:
3731 		  case EX_CONFIG:
3732 			status = "5.5.0";
3733 			break;
3734 
3735 		  case EX_OSERR:
3736 		  case EX_IOERR:
3737 			status = "4.5.0";
3738 			break;
3739 
3740 		  case EX_TEMPFAIL:
3741 			status = "4.2.0";
3742 			break;
3743 		}
3744 	}
3745 
3746 	/* new status? */
3747 	if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3748 	    *q->q_status == '\0' || *q->q_status < *status))
3749 	{
3750 		q->q_status = status;
3751 		q->q_rstatus = rstatus;
3752 	}
3753 	if (rcode != EX_OK && q->q_rstatus == NULL &&
3754 	    q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3755 	    sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3756 	{
3757 		char buf[16];
3758 
3759 		(void) sm_snprintf(buf, sizeof buf, "%d", rcode);
3760 		q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3761 	}
3762 
3763 	q->q_statdate = curtime();
3764 	if (CurHostName != NULL && CurHostName[0] != '\0' &&
3765 	    mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3766 		q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3767 
3768 	/* restore errno */
3769 	errno = save_errno;
3770 }
3771 /*
3772 **  ENDMAILER -- Wait for mailer to terminate.
3773 **
3774 **	We should never get fatal errors (e.g., segmentation
3775 **	violation), so we report those specially.  For other
3776 **	errors, we choose a status message (into statmsg),
3777 **	and if it represents an error, we print it.
3778 **
3779 **	Parameters:
3780 **		mci -- the mailer connection info.
3781 **		e -- the current envelope.
3782 **		pv -- the parameter vector that invoked the mailer
3783 **			(for error messages).
3784 **
3785 **	Returns:
3786 **		exit code of mailer.
3787 **
3788 **	Side Effects:
3789 **		none.
3790 */
3791 
3792 static jmp_buf	EndWaitTimeout;
3793 
3794 static void
3795 endwaittimeout(ignore)
3796 	int ignore;
3797 {
3798 	/*
3799 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3800 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3801 	**	DOING.
3802 	*/
3803 
3804 	errno = ETIMEDOUT;
3805 	longjmp(EndWaitTimeout, 1);
3806 }
3807 
3808 int
3809 endmailer(mci, e, pv)
3810 	register MCI *mci;
3811 	register ENVELOPE *e;
3812 	char **pv;
3813 {
3814 	int st;
3815 	int save_errno = errno;
3816 	char buf[MAXLINE];
3817 	SM_EVENT *ev = NULL;
3818 
3819 
3820 	mci_unlock_host(mci);
3821 
3822 	/* close output to mailer */
3823 	if (mci->mci_out != NULL)
3824 	{
3825 		(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3826 		mci->mci_out = NULL;
3827 	}
3828 
3829 	/* copy any remaining input to transcript */
3830 	if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3831 	    e->e_xfp != NULL)
3832 	{
3833 		while (sfgets(buf, sizeof buf, mci->mci_in,
3834 			      TimeOuts.to_quit, "Draining Input") != NULL)
3835 			(void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3836 	}
3837 
3838 #if SASL
3839 	/* close SASL connection */
3840 	if (bitset(MCIF_AUTHACT, mci->mci_flags))
3841 	{
3842 		sasl_dispose(&mci->mci_conn);
3843 		mci->mci_flags &= ~MCIF_AUTHACT;
3844 	}
3845 #endif /* SASL */
3846 
3847 #if STARTTLS
3848 	/* shutdown TLS */
3849 	(void) endtlsclt(mci);
3850 #endif /* STARTTLS */
3851 
3852 	/* now close the input */
3853 	if (mci->mci_in != NULL)
3854 	{
3855 		(void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3856 		mci->mci_in = NULL;
3857 	}
3858 	mci->mci_state = MCIS_CLOSED;
3859 
3860 	errno = save_errno;
3861 
3862 	/* in the IPC case there is nothing to wait for */
3863 	if (mci->mci_pid == 0)
3864 		return EX_OK;
3865 
3866 	/* put a timeout around the wait */
3867 	if (mci->mci_mailer->m_wait > 0)
3868 	{
3869 		if (setjmp(EndWaitTimeout) == 0)
3870 			ev = sm_setevent(mci->mci_mailer->m_wait,
3871 					 endwaittimeout, 0);
3872 		else
3873 		{
3874 			syserr("endmailer %s: wait timeout (%ld)",
3875 			       mci->mci_mailer->m_name,
3876 			       (long) mci->mci_mailer->m_wait);
3877 			return EX_TEMPFAIL;
3878 		}
3879 	}
3880 
3881 	/* wait for the mailer process, collect status */
3882 	st = waitfor(mci->mci_pid);
3883 	save_errno = errno;
3884 	if (ev != NULL)
3885 		sm_clrevent(ev);
3886 	errno = save_errno;
3887 
3888 	if (st == -1)
3889 	{
3890 		syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3891 		return EX_SOFTWARE;
3892 	}
3893 
3894 	if (WIFEXITED(st))
3895 	{
3896 		/* normal death -- return status */
3897 		return (WEXITSTATUS(st));
3898 	}
3899 
3900 	/* it died a horrid death */
3901 	syserr("451 4.3.0 mailer %s died with signal %d%s",
3902 		mci->mci_mailer->m_name, WTERMSIG(st),
3903 		WCOREDUMP(st) ? " (core dumped)" :
3904 		(WIFSTOPPED(st) ? " (stopped)" : ""));
3905 
3906 	/* log the arguments */
3907 	if (pv != NULL && e->e_xfp != NULL)
3908 	{
3909 		register char **av;
3910 
3911 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3912 		for (av = pv; *av != NULL; av++)
3913 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3914 					     *av);
3915 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3916 	}
3917 
3918 	ExitStat = EX_TEMPFAIL;
3919 	return EX_TEMPFAIL;
3920 }
3921 /*
3922 **  GIVERESPONSE -- Interpret an error response from a mailer
3923 **
3924 **	Parameters:
3925 **		status -- the status code from the mailer (high byte
3926 **			only; core dumps must have been taken care of
3927 **			already).
3928 **		dsn -- the DSN associated with the address, if any.
3929 **		m -- the mailer info for this mailer.
3930 **		mci -- the mailer connection info -- can be NULL if the
3931 **			response is given before the connection is made.
3932 **		ctladdr -- the controlling address for the recipient
3933 **			address(es).
3934 **		xstart -- the transaction start time, for computing
3935 **			transaction delays.
3936 **		e -- the current envelope.
3937 **		to -- the current recipient (NULL if none).
3938 **
3939 **	Returns:
3940 **		none.
3941 **
3942 **	Side Effects:
3943 **		Errors may be incremented.
3944 **		ExitStat may be set.
3945 */
3946 
3947 void
3948 giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3949 	int status;
3950 	char *dsn;
3951 	register MAILER *m;
3952 	register MCI *mci;
3953 	ADDRESS *ctladdr;
3954 	time_t xstart;
3955 	ENVELOPE *e;
3956 	ADDRESS *to;
3957 {
3958 	register const char *statmsg;
3959 	int errnum = errno;
3960 	int off = 4;
3961 	bool usestat = false;
3962 	char dsnbuf[ENHSCLEN];
3963 	char buf[MAXLINE];
3964 	char *exmsg;
3965 
3966 	if (e == NULL)
3967 	{
3968 		syserr("giveresponse: null envelope");
3969 		/* NOTREACHED */
3970 		SM_ASSERT(0);
3971 	}
3972 
3973 	/*
3974 	**  Compute status message from code.
3975 	*/
3976 
3977 	exmsg = sm_sysexmsg(status);
3978 	if (status == 0)
3979 	{
3980 		statmsg = "250 2.0.0 Sent";
3981 		if (e->e_statmsg != NULL)
3982 		{
3983 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)",
3984 					   statmsg,
3985 					   shortenstring(e->e_statmsg, 403));
3986 			statmsg = buf;
3987 		}
3988 	}
3989 	else if (exmsg == NULL)
3990 	{
3991 		(void) sm_snprintf(buf, sizeof buf,
3992 				   "554 5.3.0 unknown mailer error %d",
3993 				   status);
3994 		status = EX_UNAVAILABLE;
3995 		statmsg = buf;
3996 		usestat = true;
3997 	}
3998 	else if (status == EX_TEMPFAIL)
3999 	{
4000 		char *bp = buf;
4001 
4002 		(void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
4003 		bp += strlen(bp);
4004 #if NAMED_BIND
4005 		if (h_errno == TRY_AGAIN)
4006 			statmsg = sm_errstring(h_errno + E_DNSBASE);
4007 		else
4008 #endif /* NAMED_BIND */
4009 		{
4010 			if (errnum != 0)
4011 				statmsg = sm_errstring(errnum);
4012 			else
4013 				statmsg = SmtpError;
4014 		}
4015 		if (statmsg != NULL && statmsg[0] != '\0')
4016 		{
4017 			switch (errnum)
4018 			{
4019 #ifdef ENETDOWN
4020 			  case ENETDOWN:	/* Network is down */
4021 #endif /* ENETDOWN */
4022 #ifdef ENETUNREACH
4023 			  case ENETUNREACH:	/* Network is unreachable */
4024 #endif /* ENETUNREACH */
4025 #ifdef ENETRESET
4026 			  case ENETRESET:	/* Network dropped connection on reset */
4027 #endif /* ENETRESET */
4028 #ifdef ECONNABORTED
4029 			  case ECONNABORTED:	/* Software caused connection abort */
4030 #endif /* ECONNABORTED */
4031 #ifdef EHOSTDOWN
4032 			  case EHOSTDOWN:	/* Host is down */
4033 #endif /* EHOSTDOWN */
4034 #ifdef EHOSTUNREACH
4035 			  case EHOSTUNREACH:	/* No route to host */
4036 #endif /* EHOSTUNREACH */
4037 				if (mci != NULL && mci->mci_host != NULL)
4038 				{
4039 					(void) sm_strlcpyn(bp,
4040 							   SPACELEFT(buf, bp),
4041 							   2, ": ",
4042 							   mci->mci_host);
4043 					bp += strlen(bp);
4044 				}
4045 				break;
4046 			}
4047 			(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4048 					   statmsg);
4049 			usestat = true;
4050 		}
4051 		statmsg = buf;
4052 	}
4053 #if NAMED_BIND
4054 	else if (status == EX_NOHOST && h_errno != 0)
4055 	{
4056 		statmsg = sm_errstring(h_errno + E_DNSBASE);
4057 		(void) sm_snprintf(buf, sizeof buf, "%s (%s)", exmsg + 1,
4058 				   statmsg);
4059 		statmsg = buf;
4060 		usestat = true;
4061 	}
4062 #endif /* NAMED_BIND */
4063 	else
4064 	{
4065 		statmsg = exmsg;
4066 		if (*statmsg++ == ':' && errnum != 0)
4067 		{
4068 			(void) sm_snprintf(buf, sizeof buf, "%s: %s", statmsg,
4069 					   sm_errstring(errnum));
4070 			statmsg = buf;
4071 			usestat = true;
4072 		}
4073 		else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4074 		{
4075 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)", statmsg,
4076 					   shortenstring(e->e_statmsg, 403));
4077 			statmsg = buf;
4078 			usestat = true;
4079 		}
4080 	}
4081 
4082 	/*
4083 	**  Print the message as appropriate
4084 	*/
4085 
4086 	if (status == EX_OK || status == EX_TEMPFAIL)
4087 	{
4088 		extern char MsgBuf[];
4089 
4090 		if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4091 		{
4092 			if (dsn == NULL)
4093 			{
4094 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4095 						   "%.*s", off, statmsg + 4);
4096 				dsn = dsnbuf;
4097 			}
4098 			off += 5;
4099 		}
4100 		else
4101 		{
4102 			off = 4;
4103 		}
4104 		message("%s", statmsg + off);
4105 		if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4106 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4107 					     &MsgBuf[4]);
4108 	}
4109 	else
4110 	{
4111 		char mbuf[ENHSCLEN + 4];
4112 
4113 		Errors++;
4114 		if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4115 		    off < sizeof mbuf - 4)
4116 		{
4117 			if (dsn == NULL)
4118 			{
4119 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4120 						   "%.*s", off, statmsg + 4);
4121 				dsn = dsnbuf;
4122 			}
4123 			off += 5;
4124 
4125 			/* copy only part of statmsg to mbuf */
4126 			(void) sm_strlcpy(mbuf, statmsg, off);
4127 			(void) sm_strlcat(mbuf, " %s", sizeof mbuf);
4128 		}
4129 		else
4130 		{
4131 			dsnbuf[0] = '\0';
4132 			(void) sm_snprintf(mbuf, sizeof mbuf, "%.3s %%s",
4133 					   statmsg);
4134 			off = 4;
4135 		}
4136 		usrerr(mbuf, &statmsg[off]);
4137 	}
4138 
4139 	/*
4140 	**  Final cleanup.
4141 	**	Log a record of the transaction.  Compute the new
4142 	**	ExitStat -- if we already had an error, stick with
4143 	**	that.
4144 	*/
4145 
4146 	if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4147 	    LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4148 		logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4149 
4150 	if (tTd(11, 2))
4151 		sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4152 			   status,
4153 			   dsn == NULL ? "<NULL>" : dsn,
4154 			   e->e_message == NULL ? "<NULL>" : e->e_message,
4155 			   errnum);
4156 
4157 	if (status != EX_TEMPFAIL)
4158 		setstat(status);
4159 	if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4160 		e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4161 	if (status != EX_OK && to != NULL && to->q_message == NULL)
4162 	{
4163 		if (!usestat && e->e_message != NULL)
4164 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4165 							  e->e_message);
4166 		else
4167 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4168 							  statmsg + off);
4169 	}
4170 	errno = 0;
4171 	SM_SET_H_ERRNO(0);
4172 }
4173 /*
4174 **  LOGDELIVERY -- log the delivery in the system log
4175 **
4176 **	Care is taken to avoid logging lines that are too long, because
4177 **	some versions of syslog have an unfortunate proclivity for core
4178 **	dumping.  This is a hack, to be sure, that is at best empirical.
4179 **
4180 **	Parameters:
4181 **		m -- the mailer info.  Can be NULL for initial queue.
4182 **		mci -- the mailer connection info -- can be NULL if the
4183 **			log is occurring when no connection is active.
4184 **		dsn -- the DSN attached to the status.
4185 **		status -- the message to print for the status.
4186 **		ctladdr -- the controlling address for the to list.
4187 **		xstart -- the transaction start time, used for
4188 **			computing transaction delay.
4189 **		e -- the current envelope.
4190 **
4191 **	Returns:
4192 **		none
4193 **
4194 **	Side Effects:
4195 **		none
4196 */
4197 
4198 void
4199 logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4200 	MAILER *m;
4201 	register MCI *mci;
4202 	char *dsn;
4203 	const char *status;
4204 	ADDRESS *ctladdr;
4205 	time_t xstart;
4206 	register ENVELOPE *e;
4207 {
4208 	register char *bp;
4209 	register char *p;
4210 	int l;
4211 	time_t now = curtime();
4212 	char buf[1024];
4213 
4214 #if (SYSLOG_BUFSIZE) >= 256
4215 	/* ctladdr: max 106 bytes */
4216 	bp = buf;
4217 	if (ctladdr != NULL)
4218 	{
4219 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4220 				   shortenstring(ctladdr->q_paddr, 83));
4221 		bp += strlen(bp);
4222 		if (bitset(QGOODUID, ctladdr->q_flags))
4223 		{
4224 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4225 					   (int) ctladdr->q_uid,
4226 					   (int) ctladdr->q_gid);
4227 			bp += strlen(bp);
4228 		}
4229 	}
4230 
4231 	/* delay & xdelay: max 41 bytes */
4232 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4233 			   pintvl(now - e->e_ctime, true));
4234 	bp += strlen(bp);
4235 
4236 	if (xstart != (time_t) 0)
4237 	{
4238 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4239 				   pintvl(now - xstart, true));
4240 		bp += strlen(bp);
4241 	}
4242 
4243 	/* mailer: assume about 19 bytes (max 10 byte mailer name) */
4244 	if (m != NULL)
4245 	{
4246 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4247 				   m->m_name);
4248 		bp += strlen(bp);
4249 	}
4250 
4251 	/* pri: changes with each delivery attempt */
4252 	(void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4253 		e->e_msgpriority);
4254 	bp += strlen(bp);
4255 
4256 	/* relay: max 66 bytes for IPv4 addresses */
4257 	if (mci != NULL && mci->mci_host != NULL)
4258 	{
4259 		extern SOCKADDR CurHostAddr;
4260 
4261 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4262 				   shortenstring(mci->mci_host, 40));
4263 		bp += strlen(bp);
4264 
4265 		if (CurHostAddr.sa.sa_family != 0)
4266 		{
4267 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4268 					   anynet_ntoa(&CurHostAddr));
4269 		}
4270 	}
4271 	else if (strcmp(status, "quarantined") == 0)
4272 	{
4273 		if (e->e_quarmsg != NULL)
4274 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4275 					   ", quarantine=%s",
4276 					   shortenstring(e->e_quarmsg, 40));
4277 	}
4278 	else if (strcmp(status, "queued") != 0)
4279 	{
4280 		p = macvalue('h', e);
4281 		if (p != NULL && p[0] != '\0')
4282 		{
4283 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4284 					   ", relay=%s", shortenstring(p, 40));
4285 		}
4286 	}
4287 	bp += strlen(bp);
4288 
4289 	/* dsn */
4290 	if (dsn != NULL && *dsn != '\0')
4291 	{
4292 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4293 				   shortenstring(dsn, ENHSCLEN));
4294 		bp += strlen(bp);
4295 	}
4296 
4297 #if _FFR_LOG_NTRIES
4298 	/* ntries */
4299 	if (e->e_ntries >= 0)
4300 	{
4301 		(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4302 				   ", ntries=%d", e->e_ntries + 1);
4303 		bp += strlen(bp);
4304 	}
4305 #endif /* _FFR_LOG_NTRIES */
4306 
4307 # define STATLEN		(((SYSLOG_BUFSIZE) - 100) / 4)
4308 # if (STATLEN) < 63
4309 #  undef STATLEN
4310 #  define STATLEN	63
4311 # endif /* (STATLEN) < 63 */
4312 # if (STATLEN) > 203
4313 #  undef STATLEN
4314 #  define STATLEN	203
4315 # endif /* (STATLEN) > 203 */
4316 
4317 	/* stat: max 210 bytes */
4318 	if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
4319 	{
4320 		/* desperation move -- truncate data */
4321 		bp = buf + sizeof buf - ((STATLEN) + 17);
4322 		(void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4323 		bp += 3;
4324 	}
4325 
4326 	(void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4327 	bp += strlen(bp);
4328 
4329 	(void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4330 			  SPACELEFT(buf, bp));
4331 
4332 	/* id, to: max 13 + TOBUFSIZE bytes */
4333 	l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4334 	if (l < 0)
4335 		l = 0;
4336 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4337 	while (strlen(p) >= l)
4338 	{
4339 		register char *q;
4340 
4341 		for (q = p + l; q > p; q--)
4342 		{
4343 			if (*q == ',')
4344 				break;
4345 		}
4346 		if (p == q)
4347 			break;
4348 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4349 			  (int) (++q - p), p, buf);
4350 		p = q;
4351 	}
4352 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4353 
4354 #else /* (SYSLOG_BUFSIZE) >= 256 */
4355 
4356 	l = SYSLOG_BUFSIZE - 85;
4357 	if (l < 0)
4358 		l = 0;
4359 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4360 	while (strlen(p) >= l)
4361 	{
4362 		register char *q;
4363 
4364 		for (q = p + l; q > p; q--)
4365 		{
4366 			if (*q == ',')
4367 				break;
4368 		}
4369 		if (p == q)
4370 			break;
4371 
4372 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4373 			  (int) (++q - p), p);
4374 		p = q;
4375 	}
4376 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4377 
4378 	if (ctladdr != NULL)
4379 	{
4380 		bp = buf;
4381 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4382 				   shortenstring(ctladdr->q_paddr, 83));
4383 		bp += strlen(bp);
4384 		if (bitset(QGOODUID, ctladdr->q_flags))
4385 		{
4386 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4387 					   ctladdr->q_uid, ctladdr->q_gid);
4388 			bp += strlen(bp);
4389 		}
4390 		sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4391 	}
4392 	bp = buf;
4393 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4394 			   pintvl(now - e->e_ctime, true));
4395 	bp += strlen(bp);
4396 	if (xstart != (time_t) 0)
4397 	{
4398 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4399 				   pintvl(now - xstart, true));
4400 		bp += strlen(bp);
4401 	}
4402 
4403 	if (m != NULL)
4404 	{
4405 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4406 				   m->m_name);
4407 		bp += strlen(bp);
4408 	}
4409 	sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4410 
4411 	buf[0] = '\0';
4412 	bp = buf;
4413 	if (mci != NULL && mci->mci_host != NULL)
4414 	{
4415 		extern SOCKADDR CurHostAddr;
4416 
4417 		(void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4418 				   mci->mci_host);
4419 		bp += strlen(bp);
4420 
4421 		if (CurHostAddr.sa.sa_family != 0)
4422 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4423 					   " [%.100s]",
4424 					   anynet_ntoa(&CurHostAddr));
4425 	}
4426 	else if (strcmp(status, "quarantined") == 0)
4427 	{
4428 		if (e->e_quarmsg != NULL)
4429 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4430 					   ", quarantine=%.100s",
4431 					   e->e_quarmsg);
4432 	}
4433 	else if (strcmp(status, "queued") != 0)
4434 	{
4435 		p = macvalue('h', e);
4436 		if (p != NULL && p[0] != '\0')
4437 			(void) sm_snprintf(buf, sizeof buf, "relay=%.100s", p);
4438 	}
4439 	if (buf[0] != '\0')
4440 		sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4441 
4442 	sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4443 #endif /* (SYSLOG_BUFSIZE) >= 256 */
4444 }
4445 /*
4446 **  PUTFROMLINE -- output a UNIX-style from line (or whatever)
4447 **
4448 **	This can be made an arbitrary message separator by changing $l
4449 **
4450 **	One of the ugliest hacks seen by human eyes is contained herein:
4451 **	UUCP wants those stupid "remote from <host>" lines.  Why oh why
4452 **	does a well-meaning programmer such as myself have to deal with
4453 **	this kind of antique garbage????
4454 **
4455 **	Parameters:
4456 **		mci -- the connection information.
4457 **		e -- the envelope.
4458 **
4459 **	Returns:
4460 **		true iff line was written successfully
4461 **
4462 **	Side Effects:
4463 **		outputs some text to fp.
4464 */
4465 
4466 bool
4467 putfromline(mci, e)
4468 	register MCI *mci;
4469 	ENVELOPE *e;
4470 {
4471 	char *template = UnixFromLine;
4472 	char buf[MAXLINE];
4473 	char xbuf[MAXLINE];
4474 
4475 	if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4476 		return true;
4477 
4478 	mci->mci_flags |= MCIF_INHEADER;
4479 
4480 	if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4481 	{
4482 		char *bang;
4483 
4484 		expand("\201g", buf, sizeof buf, e);
4485 		bang = strchr(buf, '!');
4486 		if (bang == NULL)
4487 		{
4488 			char *at;
4489 			char hname[MAXNAME];
4490 
4491 			/*
4492 			**  If we can construct a UUCP path, do so
4493 			*/
4494 
4495 			at = strrchr(buf, '@');
4496 			if (at == NULL)
4497 			{
4498 				expand("\201k", hname, sizeof hname, e);
4499 				at = hname;
4500 			}
4501 			else
4502 				*at++ = '\0';
4503 			(void) sm_snprintf(xbuf, sizeof xbuf,
4504 					   "From %.800s  \201d remote from %.100s\n",
4505 					   buf, at);
4506 		}
4507 		else
4508 		{
4509 			*bang++ = '\0';
4510 			(void) sm_snprintf(xbuf, sizeof xbuf,
4511 					   "From %.800s  \201d remote from %.100s\n",
4512 					   bang, buf);
4513 			template = xbuf;
4514 		}
4515 	}
4516 	expand(template, buf, sizeof buf, e);
4517 	return putxline(buf, strlen(buf), mci, PXLF_HEADER);
4518 }
4519 
4520 /*
4521 **  PUTBODY -- put the body of a message.
4522 **
4523 **	Parameters:
4524 **		mci -- the connection information.
4525 **		e -- the envelope to put out.
4526 **		separator -- if non-NULL, a message separator that must
4527 **			not be permitted in the resulting message.
4528 **
4529 **	Returns:
4530 **		true iff message was written successfully
4531 **
4532 **	Side Effects:
4533 **		The message is written onto fp.
4534 */
4535 
4536 /* values for output state variable */
4537 #define OSTATE_HEAD	0	/* at beginning of line */
4538 #define OSTATE_CR	1	/* read a carriage return */
4539 #define OSTATE_INLINE	2	/* putting rest of line */
4540 
4541 bool
4542 putbody(mci, e, separator)
4543 	register MCI *mci;
4544 	register ENVELOPE *e;
4545 	char *separator;
4546 {
4547 	bool dead = false;
4548 	bool ioerr = false;
4549 	int save_errno;
4550 	char buf[MAXLINE];
4551 #if MIME8TO7
4552 	char *boundaries[MAXMIMENESTING + 1];
4553 #endif /* MIME8TO7 */
4554 
4555 	/*
4556 	**  Output the body of the message
4557 	*/
4558 
4559 	if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4560 	{
4561 		char *df = queuename(e, DATAFL_LETTER);
4562 
4563 		e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4564 				      SM_IO_RDONLY_B, NULL);
4565 		if (e->e_dfp == NULL)
4566 		{
4567 			char *msg = "!putbody: Cannot open %s for %s from %s";
4568 
4569 			if (errno == ENOENT)
4570 				msg++;
4571 			syserr(msg, df, e->e_to, e->e_from.q_paddr);
4572 		}
4573 
4574 	}
4575 	if (e->e_dfp == NULL)
4576 	{
4577 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4578 		{
4579 			if (!putline("", mci))
4580 				goto writeerr;
4581 			mci->mci_flags &= ~MCIF_INHEADER;
4582 		}
4583 		if (!putline("<<< No Message Collected >>>", mci))
4584 			goto writeerr;
4585 		goto endofmessage;
4586 	}
4587 
4588 	if (e->e_dfino == (ino_t) 0)
4589 	{
4590 		struct stat stbuf;
4591 
4592 		if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4593 		    < 0)
4594 			e->e_dfino = -1;
4595 		else
4596 		{
4597 			e->e_dfdev = stbuf.st_dev;
4598 			e->e_dfino = stbuf.st_ino;
4599 		}
4600 	}
4601 
4602 	/* paranoia: the data file should always be in a rewound state */
4603 	(void) bfrewind(e->e_dfp);
4604 
4605 	/* simulate an I/O timeout when used as source */
4606 	if (tTd(84, 101))
4607 		sleep(319);
4608 
4609 #if MIME8TO7
4610 	if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4611 	{
4612 		/*
4613 		**  Do 8 to 7 bit MIME conversion.
4614 		*/
4615 
4616 		/* make sure it looks like a MIME message */
4617 		if (hvalue("MIME-Version", e->e_header) == NULL &&
4618 		    !putline("MIME-Version: 1.0", mci))
4619 			goto writeerr;
4620 
4621 		if (hvalue("Content-Type", e->e_header) == NULL)
4622 		{
4623 			(void) sm_snprintf(buf, sizeof buf,
4624 					   "Content-Type: text/plain; charset=%s",
4625 					   defcharset(e));
4626 			if (!putline(buf, mci))
4627 				goto writeerr;
4628 		}
4629 
4630 		/* now do the hard work */
4631 		boundaries[0] = NULL;
4632 		mci->mci_flags |= MCIF_INHEADER;
4633 		if (mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER, 0) ==
4634 								SM_IO_EOF)
4635 			goto writeerr;
4636 	}
4637 # if MIME7TO8
4638 	else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4639 	{
4640 		if (!mime7to8(mci, e->e_header, e))
4641 			goto writeerr;
4642 	}
4643 # endif /* MIME7TO8 */
4644 	else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4645 	{
4646 		bool oldsuprerrs = SuprErrs;
4647 
4648 		/* Use mime8to7 to check multipart for MIME header overflows */
4649 		boundaries[0] = NULL;
4650 		mci->mci_flags |= MCIF_INHEADER;
4651 
4652 		/*
4653 		**  If EF_DONT_MIME is set, we have a broken MIME message
4654 		**  and don't want to generate a new bounce message whose
4655 		**  body propagates the broken MIME.  We can't just not call
4656 		**  mime8to7() as is done above since we need the security
4657 		**  checks.  The best we can do is suppress the errors.
4658 		*/
4659 
4660 		if (bitset(EF_DONT_MIME, e->e_flags))
4661 			SuprErrs = true;
4662 
4663 		if (mime8to7(mci, e->e_header, e, boundaries,
4664 				M87F_OUTER|M87F_NO8TO7, 0) == SM_IO_EOF)
4665 			goto writeerr;
4666 
4667 		/* restore SuprErrs */
4668 		SuprErrs = oldsuprerrs;
4669 	}
4670 	else
4671 #endif /* MIME8TO7 */
4672 	{
4673 		int ostate;
4674 		register char *bp;
4675 		register char *pbp;
4676 		register int c;
4677 		register char *xp;
4678 		int padc;
4679 		char *buflim;
4680 		int pos = 0;
4681 		char peekbuf[12];
4682 
4683 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4684 		{
4685 			if (!putline("", mci))
4686 				goto writeerr;
4687 			mci->mci_flags &= ~MCIF_INHEADER;
4688 		}
4689 
4690 		/* determine end of buffer; allow for short mailer lines */
4691 		buflim = &buf[sizeof buf - 1];
4692 		if (mci->mci_mailer->m_linelimit > 0 &&
4693 		    mci->mci_mailer->m_linelimit < sizeof buf - 1)
4694 			buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4695 
4696 		/* copy temp file to output with mapping */
4697 		ostate = OSTATE_HEAD;
4698 		bp = buf;
4699 		pbp = peekbuf;
4700 		while (!sm_io_error(mci->mci_out) && !dead)
4701 		{
4702 			if (pbp > peekbuf)
4703 				c = *--pbp;
4704 			else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4705 				 == SM_IO_EOF)
4706 				break;
4707 			if (bitset(MCIF_7BIT, mci->mci_flags))
4708 				c &= 0x7f;
4709 			switch (ostate)
4710 			{
4711 			  case OSTATE_HEAD:
4712 				if (c == '\0' &&
4713 				    bitnset(M_NONULLS,
4714 					    mci->mci_mailer->m_flags))
4715 					break;
4716 				if (c != '\r' && c != '\n' && bp < buflim)
4717 				{
4718 					*bp++ = c;
4719 					break;
4720 				}
4721 
4722 				/* check beginning of line for special cases */
4723 				*bp = '\0';
4724 				pos = 0;
4725 				padc = SM_IO_EOF;
4726 				if (buf[0] == 'F' &&
4727 				    bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4728 				    && strncmp(buf, "From ", 5) == 0)
4729 				{
4730 					padc = '>';
4731 				}
4732 				if (buf[0] == '-' && buf[1] == '-' &&
4733 				    separator != NULL)
4734 				{
4735 					/* possible separator */
4736 					int sl = strlen(separator);
4737 
4738 					if (strncmp(&buf[2], separator, sl)
4739 					    == 0)
4740 						padc = ' ';
4741 				}
4742 				if (buf[0] == '.' &&
4743 				    bitnset(M_XDOT, mci->mci_mailer->m_flags))
4744 				{
4745 					padc = '.';
4746 				}
4747 
4748 				/* now copy out saved line */
4749 				if (TrafficLogFile != NULL)
4750 				{
4751 					(void) sm_io_fprintf(TrafficLogFile,
4752 							     SM_TIME_DEFAULT,
4753 							     "%05d >>> ",
4754 							     (int) CurrentPid);
4755 					if (padc != SM_IO_EOF)
4756 						(void) sm_io_putc(TrafficLogFile,
4757 								  SM_TIME_DEFAULT,
4758 								  padc);
4759 					for (xp = buf; xp < bp; xp++)
4760 						(void) sm_io_putc(TrafficLogFile,
4761 								  SM_TIME_DEFAULT,
4762 								  (unsigned char) *xp);
4763 					if (c == '\n')
4764 						(void) sm_io_fputs(TrafficLogFile,
4765 								   SM_TIME_DEFAULT,
4766 								   mci->mci_mailer->m_eol);
4767 				}
4768 				if (padc != SM_IO_EOF)
4769 				{
4770 					if (sm_io_putc(mci->mci_out,
4771 						       SM_TIME_DEFAULT, padc)
4772 					    == SM_IO_EOF)
4773 					{
4774 						dead = true;
4775 						continue;
4776 					}
4777 					pos++;
4778 				}
4779 				for (xp = buf; xp < bp; xp++)
4780 				{
4781 					if (sm_io_putc(mci->mci_out,
4782 						       SM_TIME_DEFAULT,
4783 						       (unsigned char) *xp)
4784 					    == SM_IO_EOF)
4785 					{
4786 						dead = true;
4787 						break;
4788 					}
4789 				}
4790 				if (dead)
4791 					continue;
4792 				if (c == '\n')
4793 				{
4794 					if (sm_io_fputs(mci->mci_out,
4795 							SM_TIME_DEFAULT,
4796 							mci->mci_mailer->m_eol)
4797 							== SM_IO_EOF)
4798 						break;
4799 					pos = 0;
4800 				}
4801 				else
4802 				{
4803 					pos += bp - buf;
4804 					if (c != '\r')
4805 					{
4806 						SM_ASSERT(pbp < peekbuf +
4807 								sizeof(peekbuf));
4808 						*pbp++ = c;
4809 					}
4810 				}
4811 
4812 				bp = buf;
4813 
4814 				/* determine next state */
4815 				if (c == '\n')
4816 					ostate = OSTATE_HEAD;
4817 				else if (c == '\r')
4818 					ostate = OSTATE_CR;
4819 				else
4820 					ostate = OSTATE_INLINE;
4821 				continue;
4822 
4823 			  case OSTATE_CR:
4824 				if (c == '\n')
4825 				{
4826 					/* got CRLF */
4827 					if (sm_io_fputs(mci->mci_out,
4828 							SM_TIME_DEFAULT,
4829 							mci->mci_mailer->m_eol)
4830 							== SM_IO_EOF)
4831 						continue;
4832 
4833 					if (TrafficLogFile != NULL)
4834 					{
4835 						(void) sm_io_fputs(TrafficLogFile,
4836 								   SM_TIME_DEFAULT,
4837 								   mci->mci_mailer->m_eol);
4838 					}
4839 					ostate = OSTATE_HEAD;
4840 					continue;
4841 				}
4842 
4843 				/* had a naked carriage return */
4844 				SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4845 				*pbp++ = c;
4846 				c = '\r';
4847 				ostate = OSTATE_INLINE;
4848 				goto putch;
4849 
4850 			  case OSTATE_INLINE:
4851 				if (c == '\r')
4852 				{
4853 					ostate = OSTATE_CR;
4854 					continue;
4855 				}
4856 				if (c == '\0' &&
4857 				    bitnset(M_NONULLS,
4858 					    mci->mci_mailer->m_flags))
4859 					break;
4860 putch:
4861 				if (mci->mci_mailer->m_linelimit > 0 &&
4862 				    pos >= mci->mci_mailer->m_linelimit - 1 &&
4863 				    c != '\n')
4864 				{
4865 					int d;
4866 
4867 					/* check next character for EOL */
4868 					if (pbp > peekbuf)
4869 						d = *(pbp - 1);
4870 					else if ((d = sm_io_getc(e->e_dfp,
4871 								 SM_TIME_DEFAULT))
4872 						 != SM_IO_EOF)
4873 					{
4874 						SM_ASSERT(pbp < peekbuf +
4875 								sizeof(peekbuf));
4876 						*pbp++ = d;
4877 					}
4878 
4879 					if (d == '\n' || d == SM_IO_EOF)
4880 					{
4881 						if (TrafficLogFile != NULL)
4882 							(void) sm_io_putc(TrafficLogFile,
4883 									  SM_TIME_DEFAULT,
4884 									  (unsigned char) c);
4885 						if (sm_io_putc(mci->mci_out,
4886 							       SM_TIME_DEFAULT,
4887 							       (unsigned char) c)
4888 							       == SM_IO_EOF)
4889 						{
4890 							dead = true;
4891 							continue;
4892 						}
4893 						pos++;
4894 						continue;
4895 					}
4896 
4897 					if (sm_io_putc(mci->mci_out,
4898 						       SM_TIME_DEFAULT, '!')
4899 					    == SM_IO_EOF ||
4900 					    sm_io_fputs(mci->mci_out,
4901 							SM_TIME_DEFAULT,
4902 							mci->mci_mailer->m_eol)
4903 					    == SM_IO_EOF)
4904 					{
4905 						dead = true;
4906 						continue;
4907 					}
4908 
4909 					if (TrafficLogFile != NULL)
4910 					{
4911 						(void) sm_io_fprintf(TrafficLogFile,
4912 								     SM_TIME_DEFAULT,
4913 								     "!%s",
4914 								     mci->mci_mailer->m_eol);
4915 					}
4916 					ostate = OSTATE_HEAD;
4917 					SM_ASSERT(pbp < peekbuf +
4918 							sizeof(peekbuf));
4919 					*pbp++ = c;
4920 					continue;
4921 				}
4922 				if (c == '\n')
4923 				{
4924 					if (TrafficLogFile != NULL)
4925 						(void) sm_io_fputs(TrafficLogFile,
4926 								   SM_TIME_DEFAULT,
4927 								   mci->mci_mailer->m_eol);
4928 					if (sm_io_fputs(mci->mci_out,
4929 							SM_TIME_DEFAULT,
4930 							mci->mci_mailer->m_eol)
4931 							== SM_IO_EOF)
4932 						continue;
4933 					pos = 0;
4934 					ostate = OSTATE_HEAD;
4935 				}
4936 				else
4937 				{
4938 					if (TrafficLogFile != NULL)
4939 						(void) sm_io_putc(TrafficLogFile,
4940 								  SM_TIME_DEFAULT,
4941 								  (unsigned char) c);
4942 					if (sm_io_putc(mci->mci_out,
4943 						       SM_TIME_DEFAULT,
4944 						       (unsigned char) c)
4945 					    == SM_IO_EOF)
4946 					{
4947 						dead = true;
4948 						continue;
4949 					}
4950 					pos++;
4951 					ostate = OSTATE_INLINE;
4952 				}
4953 				break;
4954 			}
4955 		}
4956 
4957 		/* make sure we are at the beginning of a line */
4958 		if (bp > buf)
4959 		{
4960 			if (TrafficLogFile != NULL)
4961 			{
4962 				for (xp = buf; xp < bp; xp++)
4963 					(void) sm_io_putc(TrafficLogFile,
4964 							  SM_TIME_DEFAULT,
4965 							  (unsigned char) *xp);
4966 			}
4967 			for (xp = buf; xp < bp; xp++)
4968 			{
4969 				if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4970 					       (unsigned char) *xp)
4971 				    == SM_IO_EOF)
4972 				{
4973 					dead = true;
4974 					break;
4975 				}
4976 			}
4977 			pos += bp - buf;
4978 		}
4979 		if (!dead && pos > 0)
4980 		{
4981 			if (TrafficLogFile != NULL)
4982 				(void) sm_io_fputs(TrafficLogFile,
4983 						   SM_TIME_DEFAULT,
4984 						   mci->mci_mailer->m_eol);
4985 			if (sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
4986 					   mci->mci_mailer->m_eol) == SM_IO_EOF)
4987 				goto writeerr;
4988 		}
4989 	}
4990 
4991 	if (sm_io_error(e->e_dfp))
4992 	{
4993 		syserr("putbody: %s/%cf%s: read error",
4994 		       qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
4995 		       DATAFL_LETTER, e->e_id);
4996 		ExitStat = EX_IOERR;
4997 		ioerr = true;
4998 	}
4999 
5000 endofmessage:
5001 	/*
5002 	**  Since mailfile() uses e_dfp in a child process,
5003 	**  the file offset in the stdio library for the
5004 	**  parent process will not agree with the in-kernel
5005 	**  file offset since the file descriptor is shared
5006 	**  between the processes.  Therefore, it is vital
5007 	**  that the file always be rewound.  This forces the
5008 	**  kernel offset (lseek) and stdio library (ftell)
5009 	**  offset to match.
5010 	*/
5011 
5012 	save_errno = errno;
5013 	if (e->e_dfp != NULL)
5014 		(void) bfrewind(e->e_dfp);
5015 
5016 	/* some mailers want extra blank line at end of message */
5017 	if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5018 	    buf[0] != '\0' && buf[0] != '\n')
5019 	{
5020 		if (!putline("", mci))
5021 			goto writeerr;
5022 	}
5023 
5024 	if (!dead &&
5025 	    (sm_io_flush(mci->mci_out, SM_TIME_DEFAULT) == SM_IO_EOF ||
5026 	     (sm_io_error(mci->mci_out) && errno != EPIPE)))
5027 	{
5028 		save_errno = errno;
5029 		syserr("putbody: write error");
5030 		ExitStat = EX_IOERR;
5031 		ioerr = true;
5032 	}
5033 
5034 	errno = save_errno;
5035 	return !dead && !ioerr;
5036 
5037   writeerr:
5038 	return false;
5039 }
5040 
5041 /*
5042 **  MAILFILE -- Send a message to a file.
5043 **
5044 **	If the file has the set-user-ID/set-group-ID bits set, but NO
5045 **	execute bits, sendmail will try to become the owner of that file
5046 **	rather than the real user.  Obviously, this only works if
5047 **	sendmail runs as root.
5048 **
5049 **	This could be done as a subordinate mailer, except that it
5050 **	is used implicitly to save messages in ~/dead.letter.  We
5051 **	view this as being sufficiently important as to include it
5052 **	here.  For example, if the system is dying, we shouldn't have
5053 **	to create another process plus some pipes to save the message.
5054 **
5055 **	Parameters:
5056 **		filename -- the name of the file to send to.
5057 **		mailer -- mailer definition for recipient -- if NULL,
5058 **			use FileMailer.
5059 **		ctladdr -- the controlling address header -- includes
5060 **			the userid/groupid to be when sending.
5061 **		sfflags -- flags for opening.
5062 **		e -- the current envelope.
5063 **
5064 **	Returns:
5065 **		The exit code associated with the operation.
5066 **
5067 **	Side Effects:
5068 **		none.
5069 */
5070 
5071 # define RETURN(st)			exit(st);
5072 
5073 static jmp_buf	CtxMailfileTimeout;
5074 
5075 int
5076 mailfile(filename, mailer, ctladdr, sfflags, e)
5077 	char *volatile filename;
5078 	MAILER *volatile mailer;
5079 	ADDRESS *ctladdr;
5080 	volatile long sfflags;
5081 	register ENVELOPE *e;
5082 {
5083 	register SM_FILE_T *f;
5084 	register pid_t pid = -1;
5085 	volatile int mode;
5086 	int len;
5087 	off_t curoff;
5088 	bool suidwarn = geteuid() == 0;
5089 	char *p;
5090 	char *volatile realfile;
5091 	SM_EVENT *ev;
5092 	char buf[MAXPATHLEN];
5093 	char targetfile[MAXPATHLEN];
5094 
5095 	if (tTd(11, 1))
5096 	{
5097 		sm_dprintf("mailfile %s\n  ctladdr=", filename);
5098 		printaddr(sm_debug_file(), ctladdr, false);
5099 	}
5100 
5101 	if (mailer == NULL)
5102 		mailer = FileMailer;
5103 
5104 	if (e->e_xfp != NULL)
5105 		(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5106 
5107 	/*
5108 	**  Special case /dev/null.  This allows us to restrict file
5109 	**  delivery to regular files only.
5110 	*/
5111 
5112 	if (sm_path_isdevnull(filename))
5113 		return EX_OK;
5114 
5115 	/* check for 8-bit available */
5116 	if (bitset(EF_HAS8BIT, e->e_flags) &&
5117 	    bitnset(M_7BITS, mailer->m_flags) &&
5118 	    (bitset(EF_DONT_MIME, e->e_flags) ||
5119 	     !(bitset(MM_MIME8BIT, MimeMode) ||
5120 	       (bitset(EF_IS_MIME, e->e_flags) &&
5121 		bitset(MM_CVTMIME, MimeMode)))))
5122 	{
5123 		e->e_status = "5.6.3";
5124 		usrerrenh(e->e_status,
5125 			  "554 Cannot send 8-bit data to 7-bit destination");
5126 		errno = 0;
5127 		return EX_DATAERR;
5128 	}
5129 
5130 	/* Find the actual file */
5131 	if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5132 	{
5133 		len = strlen(SafeFileEnv);
5134 
5135 		if (strncmp(SafeFileEnv, filename, len) == 0)
5136 			filename += len;
5137 
5138 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5139 		{
5140 			syserr("mailfile: filename too long (%s/%s)",
5141 			       SafeFileEnv, filename);
5142 			return EX_CANTCREAT;
5143 		}
5144 		(void) sm_strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
5145 		realfile = targetfile + len;
5146 		if (*filename == '/')
5147 			filename++;
5148 		if (*filename != '\0')
5149 		{
5150 			/* paranoia: trailing / should be removed in readcf */
5151 			if (targetfile[len - 1] != '/')
5152 				(void) sm_strlcat(targetfile,
5153 						  "/", sizeof targetfile);
5154 			(void) sm_strlcat(targetfile, filename,
5155 					  sizeof targetfile);
5156 		}
5157 	}
5158 	else if (mailer->m_rootdir != NULL)
5159 	{
5160 		expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
5161 		len = strlen(targetfile);
5162 
5163 		if (strncmp(targetfile, filename, len) == 0)
5164 			filename += len;
5165 
5166 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5167 		{
5168 			syserr("mailfile: filename too long (%s/%s)",
5169 			       targetfile, filename);
5170 			return EX_CANTCREAT;
5171 		}
5172 		realfile = targetfile + len;
5173 		if (targetfile[len - 1] != '/')
5174 			(void) sm_strlcat(targetfile, "/", sizeof targetfile);
5175 		if (*filename == '/')
5176 			(void) sm_strlcat(targetfile, filename + 1,
5177 					  sizeof targetfile);
5178 		else
5179 			(void) sm_strlcat(targetfile, filename,
5180 					  sizeof targetfile);
5181 	}
5182 	else
5183 	{
5184 		if (sm_strlcpy(targetfile, filename, sizeof targetfile) >=
5185 		    sizeof targetfile)
5186 		{
5187 			syserr("mailfile: filename too long (%s)", filename);
5188 			return EX_CANTCREAT;
5189 		}
5190 		realfile = targetfile;
5191 	}
5192 
5193 	/*
5194 	**  Fork so we can change permissions here.
5195 	**	Note that we MUST use fork, not vfork, because of
5196 	**	the complications of calling subroutines, etc.
5197 	*/
5198 
5199 
5200 	/*
5201 	**  Dispose of SIGCHLD signal catchers that may be laying
5202 	**  around so that the waitfor() below will get it.
5203 	*/
5204 
5205 	(void) sm_signal(SIGCHLD, SIG_DFL);
5206 
5207 	DOFORK(fork);
5208 
5209 	if (pid < 0)
5210 		return EX_OSERR;
5211 	else if (pid == 0)
5212 	{
5213 		/* child -- actually write to file */
5214 		struct stat stb;
5215 		MCI mcibuf;
5216 		int err;
5217 		volatile int oflags = O_WRONLY|O_APPEND;
5218 
5219 		/* Reset global flags */
5220 		RestartRequest = NULL;
5221 		RestartWorkGroup = false;
5222 		ShutdownRequest = NULL;
5223 		PendingSignal = 0;
5224 		CurrentPid = getpid();
5225 
5226 		if (e->e_lockfp != NULL)
5227 		{
5228 			int fd;
5229 
5230 			fd = sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, NULL);
5231 			/* SM_ASSERT(fd >= 0); */
5232 			if (fd >= 0)
5233 				(void) close(fd);
5234 		}
5235 
5236 		(void) sm_signal(SIGINT, SIG_DFL);
5237 		(void) sm_signal(SIGHUP, SIG_DFL);
5238 		(void) sm_signal(SIGTERM, SIG_DFL);
5239 		(void) umask(OldUmask);
5240 		e->e_to = filename;
5241 		ExitStat = EX_OK;
5242 
5243 		if (setjmp(CtxMailfileTimeout) != 0)
5244 		{
5245 			RETURN(EX_TEMPFAIL);
5246 		}
5247 
5248 		if (TimeOuts.to_fileopen > 0)
5249 			ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5250 					 0);
5251 		else
5252 			ev = NULL;
5253 
5254 		/* check file mode to see if set-user-ID */
5255 		if (stat(targetfile, &stb) < 0)
5256 			mode = FileMode;
5257 		else
5258 			mode = stb.st_mode;
5259 
5260 		/* limit the errors to those actually caused in the child */
5261 		errno = 0;
5262 		ExitStat = EX_OK;
5263 
5264 		/* Allow alias expansions to use the S_IS{U,G}ID bits */
5265 		if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5266 		    bitset(SFF_RUNASREALUID, sfflags))
5267 		{
5268 			/* ignore set-user-ID and set-group-ID bits */
5269 			mode &= ~(S_ISGID|S_ISUID);
5270 			if (tTd(11, 20))
5271 				sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5272 		}
5273 
5274 		/* we have to open the data file BEFORE setuid() */
5275 		if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5276 		{
5277 			char *df = queuename(e, DATAFL_LETTER);
5278 
5279 			e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5280 					      SM_IO_RDONLY_B, NULL);
5281 			if (e->e_dfp == NULL)
5282 			{
5283 				syserr("mailfile: Cannot open %s for %s from %s",
5284 					df, e->e_to, e->e_from.q_paddr);
5285 			}
5286 		}
5287 
5288 		/* select a new user to run as */
5289 		if (!bitset(SFF_RUNASREALUID, sfflags))
5290 		{
5291 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5292 			{
5293 				RealUserName = NULL;
5294 				if (mailer->m_uid == NO_UID)
5295 					RealUid = RunAsUid;
5296 				else
5297 					RealUid = mailer->m_uid;
5298 				if (RunAsUid != 0 && RealUid != RunAsUid)
5299 				{
5300 					/* Only root can change the uid */
5301 					syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5302 						(int) RunAsUid, (int) RealUid);
5303 					RETURN(EX_TEMPFAIL);
5304 				}
5305 			}
5306 			else if (bitset(S_ISUID, mode))
5307 			{
5308 				RealUserName = NULL;
5309 				RealUid = stb.st_uid;
5310 			}
5311 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5312 			{
5313 				if (ctladdr->q_ruser != NULL)
5314 					RealUserName = ctladdr->q_ruser;
5315 				else
5316 					RealUserName = ctladdr->q_user;
5317 				RealUid = ctladdr->q_uid;
5318 			}
5319 			else if (mailer != NULL && mailer->m_uid != NO_UID)
5320 			{
5321 				RealUserName = DefUser;
5322 				RealUid = mailer->m_uid;
5323 			}
5324 			else
5325 			{
5326 				RealUserName = DefUser;
5327 				RealUid = DefUid;
5328 			}
5329 
5330 			/* select a new group to run as */
5331 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5332 			{
5333 				if (mailer->m_gid == NO_GID)
5334 					RealGid = RunAsGid;
5335 				else
5336 					RealGid = mailer->m_gid;
5337 				if (RunAsUid != 0 &&
5338 				    (RealGid != getgid() ||
5339 				     RealGid != getegid()))
5340 				{
5341 					/* Only root can change the gid */
5342 					syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5343 					       (int) RealGid, (int) RunAsUid,
5344 					       (int) getgid(), (int) getegid());
5345 					RETURN(EX_TEMPFAIL);
5346 				}
5347 			}
5348 			else if (bitset(S_ISGID, mode))
5349 				RealGid = stb.st_gid;
5350 			else if (ctladdr != NULL &&
5351 				 ctladdr->q_uid == DefUid &&
5352 				 ctladdr->q_gid == 0)
5353 			{
5354 				/*
5355 				**  Special case:  This means it is an
5356 				**  alias and we should act as DefaultUser.
5357 				**  See alias()'s comments.
5358 				*/
5359 
5360 				RealGid = DefGid;
5361 				RealUserName = DefUser;
5362 			}
5363 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5364 				RealGid = ctladdr->q_gid;
5365 			else if (mailer != NULL && mailer->m_gid != NO_GID)
5366 				RealGid = mailer->m_gid;
5367 			else
5368 				RealGid = DefGid;
5369 		}
5370 
5371 		/* last ditch */
5372 		if (!bitset(SFF_ROOTOK, sfflags))
5373 		{
5374 			if (RealUid == 0)
5375 				RealUid = DefUid;
5376 			if (RealGid == 0)
5377 				RealGid = DefGid;
5378 		}
5379 
5380 		/* set group id list (needs /etc/group access) */
5381 		if (RealUserName != NULL && !DontInitGroups)
5382 		{
5383 			if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5384 			{
5385 				syserr("mailfile: initgroups(%s, %d) failed",
5386 					RealUserName, RealGid);
5387 				RETURN(EX_TEMPFAIL);
5388 			}
5389 		}
5390 		else
5391 		{
5392 			GIDSET_T gidset[1];
5393 
5394 			gidset[0] = RealGid;
5395 			if (setgroups(1, gidset) == -1 && suidwarn)
5396 			{
5397 				syserr("mailfile: setgroups() failed");
5398 				RETURN(EX_TEMPFAIL);
5399 			}
5400 		}
5401 
5402 		/*
5403 		**  If you have a safe environment, go into it.
5404 		*/
5405 
5406 		if (realfile != targetfile)
5407 		{
5408 			char save;
5409 
5410 			save = *realfile;
5411 			*realfile = '\0';
5412 			if (tTd(11, 20))
5413 				sm_dprintf("mailfile: chroot %s\n", targetfile);
5414 			if (chroot(targetfile) < 0)
5415 			{
5416 				syserr("mailfile: Cannot chroot(%s)",
5417 				       targetfile);
5418 				RETURN(EX_CANTCREAT);
5419 			}
5420 			*realfile = save;
5421 		}
5422 
5423 		if (tTd(11, 40))
5424 			sm_dprintf("mailfile: deliver to %s\n", realfile);
5425 
5426 		if (chdir("/") < 0)
5427 		{
5428 			syserr("mailfile: cannot chdir(/)");
5429 			RETURN(EX_CANTCREAT);
5430 		}
5431 
5432 		/* now reset the group and user ids */
5433 		endpwent();
5434 		sm_mbdb_terminate();
5435 		if (setgid(RealGid) < 0 && suidwarn)
5436 		{
5437 			syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5438 			RETURN(EX_TEMPFAIL);
5439 		}
5440 		vendor_set_uid(RealUid);
5441 		if (setuid(RealUid) < 0 && suidwarn)
5442 		{
5443 			syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5444 			RETURN(EX_TEMPFAIL);
5445 		}
5446 
5447 		if (tTd(11, 2))
5448 			sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5449 				(int) getuid(), (int) geteuid(),
5450 				(int) getgid(), (int) getegid());
5451 
5452 
5453 		/* move into some "safe" directory */
5454 		if (mailer->m_execdir != NULL)
5455 		{
5456 			char *q;
5457 
5458 			for (p = mailer->m_execdir; p != NULL; p = q)
5459 			{
5460 				q = strchr(p, ':');
5461 				if (q != NULL)
5462 					*q = '\0';
5463 				expand(p, buf, sizeof buf, e);
5464 				if (q != NULL)
5465 					*q++ = ':';
5466 				if (tTd(11, 20))
5467 					sm_dprintf("mailfile: trydir %s\n",
5468 						   buf);
5469 				if (buf[0] != '\0' && chdir(buf) >= 0)
5470 					break;
5471 			}
5472 		}
5473 
5474 		/*
5475 		**  Recheck the file after we have assumed the ID of the
5476 		**  delivery user to make sure we can deliver to it as
5477 		**  that user.  This is necessary if sendmail is running
5478 		**  as root and the file is on an NFS mount which treats
5479 		**  root as nobody.
5480 		*/
5481 
5482 #if HASLSTAT
5483 		if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5484 			err = stat(realfile, &stb);
5485 		else
5486 			err = lstat(realfile, &stb);
5487 #else /* HASLSTAT */
5488 		err = stat(realfile, &stb);
5489 #endif /* HASLSTAT */
5490 
5491 		if (err < 0)
5492 		{
5493 			stb.st_mode = ST_MODE_NOFILE;
5494 			mode = FileMode;
5495 			oflags |= O_CREAT|O_EXCL;
5496 		}
5497 		else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5498 			 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5499 				   DontBlameSendmail) &&
5500 			  stb.st_nlink != 1) ||
5501 			 (realfile != targetfile && !S_ISREG(mode)))
5502 			exit(EX_CANTCREAT);
5503 		else
5504 			mode = stb.st_mode;
5505 
5506 		if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5507 			sfflags |= SFF_NOSLINK;
5508 		if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5509 			sfflags |= SFF_NOHLINK;
5510 		sfflags &= ~SFF_OPENASROOT;
5511 		f = safefopen(realfile, oflags, mode, sfflags);
5512 		if (f == NULL)
5513 		{
5514 			if (transienterror(errno))
5515 			{
5516 				usrerr("454 4.3.0 cannot open %s: %s",
5517 				       shortenstring(realfile, MAXSHORTSTR),
5518 				       sm_errstring(errno));
5519 				RETURN(EX_TEMPFAIL);
5520 			}
5521 			else
5522 			{
5523 				usrerr("554 5.3.0 cannot open %s: %s",
5524 				       shortenstring(realfile, MAXSHORTSTR),
5525 				       sm_errstring(errno));
5526 				RETURN(EX_CANTCREAT);
5527 			}
5528 		}
5529 		if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5530 		    &stb))
5531 		{
5532 			syserr("554 5.3.0 file changed after open");
5533 			RETURN(EX_CANTCREAT);
5534 		}
5535 		if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5536 		{
5537 			syserr("554 5.3.0 cannot fstat %s",
5538 				sm_errstring(errno));
5539 			RETURN(EX_CANTCREAT);
5540 		}
5541 
5542 		curoff = stb.st_size;
5543 
5544 		if (ev != NULL)
5545 			sm_clrevent(ev);
5546 
5547 		memset(&mcibuf, '\0', sizeof mcibuf);
5548 		mcibuf.mci_mailer = mailer;
5549 		mcibuf.mci_out = f;
5550 		if (bitnset(M_7BITS, mailer->m_flags))
5551 			mcibuf.mci_flags |= MCIF_7BIT;
5552 
5553 		/* clear out per-message flags from connection structure */
5554 		mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5555 
5556 		if (bitset(EF_HAS8BIT, e->e_flags) &&
5557 		    !bitset(EF_DONT_MIME, e->e_flags) &&
5558 		    bitnset(M_7BITS, mailer->m_flags))
5559 			mcibuf.mci_flags |= MCIF_CVT8TO7;
5560 
5561 #if MIME7TO8
5562 		if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5563 		    !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5564 		    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5565 		    (sm_strcasecmp(p, "quoted-printable") == 0 ||
5566 		     sm_strcasecmp(p, "base64") == 0) &&
5567 		    (p = hvalue("Content-Type", e->e_header)) != NULL)
5568 		{
5569 			/* may want to convert 7 -> 8 */
5570 			/* XXX should really parse it here -- and use a class XXX */
5571 			if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5572 			    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5573 				mcibuf.mci_flags |= MCIF_CVT7TO8;
5574 		}
5575 #endif /* MIME7TO8 */
5576 
5577 		if (!putfromline(&mcibuf, e) ||
5578 		    !(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER) ||
5579 		    !(*e->e_putbody)(&mcibuf, e, NULL) ||
5580 		    !putline("\n", &mcibuf) ||
5581 		    (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5582 		    (SuperSafe != SAFE_NO &&
5583 		     fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5584 		    sm_io_error(f)))
5585 		{
5586 			setstat(EX_IOERR);
5587 #if !NOFTRUNCATE
5588 			(void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5589 					 curoff);
5590 #endif /* !NOFTRUNCATE */
5591 		}
5592 
5593 		/* reset ISUID & ISGID bits for paranoid systems */
5594 #if HASFCHMOD
5595 		(void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5596 			      (MODE_T) mode);
5597 #else /* HASFCHMOD */
5598 		(void) chmod(filename, (MODE_T) mode);
5599 #endif /* HASFCHMOD */
5600 		if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5601 			setstat(EX_IOERR);
5602 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5603 		(void) setuid(RealUid);
5604 		exit(ExitStat);
5605 		/* NOTREACHED */
5606 	}
5607 	else
5608 	{
5609 		/* parent -- wait for exit status */
5610 		int st;
5611 
5612 		st = waitfor(pid);
5613 		if (st == -1)
5614 		{
5615 			syserr("mailfile: %s: wait", mailer->m_name);
5616 			return EX_SOFTWARE;
5617 		}
5618 		if (WIFEXITED(st))
5619 		{
5620 			errno = 0;
5621 			return (WEXITSTATUS(st));
5622 		}
5623 		else
5624 		{
5625 			syserr("mailfile: %s: child died on signal %d",
5626 			       mailer->m_name, st);
5627 			return EX_UNAVAILABLE;
5628 		}
5629 		/* NOTREACHED */
5630 	}
5631 	return EX_UNAVAILABLE;	/* avoid compiler warning on IRIX */
5632 }
5633 
5634 static void
5635 mailfiletimeout(ignore)
5636 	int ignore;
5637 {
5638 	/*
5639 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
5640 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5641 	**	DOING.
5642 	*/
5643 
5644 	errno = ETIMEDOUT;
5645 	longjmp(CtxMailfileTimeout, 1);
5646 }
5647 /*
5648 **  HOSTSIGNATURE -- return the "signature" for a host.
5649 **
5650 **	The signature describes how we are going to send this -- it
5651 **	can be just the hostname (for non-Internet hosts) or can be
5652 **	an ordered list of MX hosts.
5653 **
5654 **	Parameters:
5655 **		m -- the mailer describing this host.
5656 **		host -- the host name.
5657 **
5658 **	Returns:
5659 **		The signature for this host.
5660 **
5661 **	Side Effects:
5662 **		Can tweak the symbol table.
5663 */
5664 
5665 #define MAXHOSTSIGNATURE	8192	/* max len of hostsignature */
5666 
5667 char *
5668 hostsignature(m, host)
5669 	register MAILER *m;
5670 	char *host;
5671 {
5672 	register char *p;
5673 	register STAB *s;
5674 	time_t now;
5675 #if NAMED_BIND
5676 	char sep = ':';
5677 	char prevsep = ':';
5678 	int i;
5679 	int len;
5680 	int nmx;
5681 	int hl;
5682 	char *hp;
5683 	char *endp;
5684 	int oldoptions = _res.options;
5685 	char *mxhosts[MAXMXHOSTS + 1];
5686 	unsigned short mxprefs[MAXMXHOSTS + 1];
5687 #endif /* NAMED_BIND */
5688 
5689 	if (tTd(17, 3))
5690 		sm_dprintf("hostsignature(%s)\n", host);
5691 
5692 	/*
5693 	**  If local delivery (and not remote), just return a constant.
5694 	*/
5695 
5696 	if (bitnset(M_LOCALMAILER, m->m_flags) &&
5697 	    strcmp(m->m_mailer, "[IPC]") != 0 &&
5698 	    !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5699 		return "localhost";
5700 
5701 	/* an empty host does not have MX records */
5702 	if (*host == '\0')
5703 		return "_empty_";
5704 
5705 	/*
5706 	**  Check to see if this uses IPC -- if not, it can't have MX records.
5707 	*/
5708 
5709 	if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5710 	    CurEnv->e_sendmode == SM_DEFER)
5711 	{
5712 		/* just an ordinary mailer or deferred mode */
5713 		return host;
5714 	}
5715 #if NETUNIX
5716 	else if (m->m_argv[0] != NULL &&
5717 		 strcmp(m->m_argv[0], "FILE") == 0)
5718 	{
5719 		/* rendezvous in the file system, no MX records */
5720 		return host;
5721 	}
5722 #endif /* NETUNIX */
5723 
5724 	/*
5725 	**  Look it up in the symbol table.
5726 	*/
5727 
5728 	now = curtime();
5729 	s = stab(host, ST_HOSTSIG, ST_ENTER);
5730 	if (s->s_hostsig.hs_sig != NULL)
5731 	{
5732 		if (s->s_hostsig.hs_exp >= now)
5733 		{
5734 			if (tTd(17, 3))
5735 				sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5736 					   s->s_hostsig.hs_sig);
5737 			return s->s_hostsig.hs_sig;
5738 		}
5739 
5740 		/* signature is expired: clear it */
5741 		sm_free(s->s_hostsig.hs_sig);
5742 		s->s_hostsig.hs_sig = NULL;
5743 	}
5744 
5745 	/* set default TTL */
5746 	s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5747 
5748 	/*
5749 	**  Not already there or expired -- create a signature.
5750 	*/
5751 
5752 #if NAMED_BIND
5753 	if (ConfigLevel < 2)
5754 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
5755 
5756 	for (hp = host; hp != NULL; hp = endp)
5757 	{
5758 #if NETINET6
5759 		if (*hp == '[')
5760 		{
5761 			endp = strchr(hp + 1, ']');
5762 			if (endp != NULL)
5763 				endp = strpbrk(endp + 1, ":,");
5764 		}
5765 		else
5766 			endp = strpbrk(hp, ":,");
5767 #else /* NETINET6 */
5768 		endp = strpbrk(hp, ":,");
5769 #endif /* NETINET6 */
5770 		if (endp != NULL)
5771 		{
5772 			sep = *endp;
5773 			*endp = '\0';
5774 		}
5775 
5776 		if (bitnset(M_NOMX, m->m_flags))
5777 		{
5778 			/* skip MX lookups */
5779 			nmx = 1;
5780 			mxhosts[0] = hp;
5781 		}
5782 		else
5783 		{
5784 			auto int rcode;
5785 			int ttl;
5786 
5787 			nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5788 				      &ttl);
5789 			if (nmx <= 0)
5790 			{
5791 				int save_errno;
5792 				register MCI *mci;
5793 
5794 				/* update the connection info for this host */
5795 				save_errno = errno;
5796 				mci = mci_get(hp, m);
5797 				mci->mci_errno = save_errno;
5798 				mci->mci_herrno = h_errno;
5799 				mci->mci_lastuse = now;
5800 				if (rcode == EX_NOHOST)
5801 					mci_setstat(mci, rcode, "5.1.2",
5802 						    "550 Host unknown");
5803 				else
5804 					mci_setstat(mci, rcode, NULL, NULL);
5805 
5806 				/* use the original host name as signature */
5807 				nmx = 1;
5808 				mxhosts[0] = hp;
5809 			}
5810 			if (tTd(17, 3))
5811 				sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5812 					   nmx, mxhosts[0]);
5813 
5814 			/*
5815 			**  Set new TTL: we use only one!
5816 			**	We could try to use the minimum instead.
5817 			*/
5818 
5819 			s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5820 		}
5821 
5822 		len = 0;
5823 		for (i = 0; i < nmx; i++)
5824 			len += strlen(mxhosts[i]) + 1;
5825 		if (s->s_hostsig.hs_sig != NULL)
5826 			len += strlen(s->s_hostsig.hs_sig) + 1;
5827 		if (len < 0 || len >= MAXHOSTSIGNATURE)
5828 		{
5829 			sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5830 				  host, MAXHOSTSIGNATURE, len);
5831 			len = MAXHOSTSIGNATURE;
5832 		}
5833 		p = sm_pmalloc_x(len);
5834 		if (s->s_hostsig.hs_sig != NULL)
5835 		{
5836 			(void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5837 			sm_free(s->s_hostsig.hs_sig); /* XXX */
5838 			s->s_hostsig.hs_sig = p;
5839 			hl = strlen(p);
5840 			p += hl;
5841 			*p++ = prevsep;
5842 			len -= hl + 1;
5843 		}
5844 		else
5845 			s->s_hostsig.hs_sig = p;
5846 		for (i = 0; i < nmx; i++)
5847 		{
5848 			hl = strlen(mxhosts[i]);
5849 			if (len - 1 < hl || len <= 1)
5850 			{
5851 				/* force to drop out of outer loop */
5852 				len = -1;
5853 				break;
5854 			}
5855 			if (i != 0)
5856 			{
5857 				if (mxprefs[i] == mxprefs[i - 1])
5858 					*p++ = ',';
5859 				else
5860 					*p++ = ':';
5861 				len--;
5862 			}
5863 			(void) sm_strlcpy(p, mxhosts[i], len);
5864 			p += hl;
5865 			len -= hl;
5866 		}
5867 
5868 		/*
5869 		**  break out of loop if len exceeded MAXHOSTSIGNATURE
5870 		**  because we won't have more space for further hosts
5871 		**  anyway (separated by : in the .cf file).
5872 		*/
5873 
5874 		if (len < 0)
5875 			break;
5876 		if (endp != NULL)
5877 			*endp++ = sep;
5878 		prevsep = sep;
5879 	}
5880 	makelower(s->s_hostsig.hs_sig);
5881 	if (ConfigLevel < 2)
5882 		_res.options = oldoptions;
5883 #else /* NAMED_BIND */
5884 	/* not using BIND -- the signature is just the host name */
5885 	/*
5886 	**  'host' points to storage that will be freed after we are
5887 	**  done processing the current envelope, so we copy it.
5888 	*/
5889 	s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5890 #endif /* NAMED_BIND */
5891 	if (tTd(17, 1))
5892 		sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5893 	return s->s_hostsig.hs_sig;
5894 }
5895 /*
5896 **  PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5897 **
5898 **	The signature describes how we are going to send this -- it
5899 **	can be just the hostname (for non-Internet hosts) or can be
5900 **	an ordered list of MX hosts which must be randomized for equal
5901 **	MX preference values.
5902 **
5903 **	Parameters:
5904 **		sig -- the host signature.
5905 **		mxhosts -- array to populate.
5906 **		mailer -- mailer.
5907 **
5908 **	Returns:
5909 **		The number of hosts inserted into mxhosts array.
5910 **
5911 **	Side Effects:
5912 **		Randomizes equal MX preference hosts in mxhosts.
5913 */
5914 
5915 static int
5916 parse_hostsignature(sig, mxhosts, mailer)
5917 	char *sig;
5918 	char **mxhosts;
5919 	MAILER *mailer;
5920 {
5921 	unsigned short curpref = 0;
5922 	int nmx = 0, i, j;	/* NOTE: i, j, and nmx must have same type */
5923 	char *hp, *endp;
5924 	unsigned short prefer[MAXMXHOSTS];
5925 	long rndm[MAXMXHOSTS];
5926 
5927 	for (hp = sig; hp != NULL; hp = endp)
5928 	{
5929 		char sep = ':';
5930 
5931 #if NETINET6
5932 		if (*hp == '[')
5933 		{
5934 			endp = strchr(hp + 1, ']');
5935 			if (endp != NULL)
5936 				endp = strpbrk(endp + 1, ":,");
5937 		}
5938 		else
5939 			endp = strpbrk(hp, ":,");
5940 #else /* NETINET6 */
5941 		endp = strpbrk(hp, ":,");
5942 #endif /* NETINET6 */
5943 		if (endp != NULL)
5944 		{
5945 			sep = *endp;
5946 			*endp = '\0';
5947 		}
5948 
5949 		mxhosts[nmx] = hp;
5950 		prefer[nmx] = curpref;
5951 		if (mci_match(hp, mailer))
5952 			rndm[nmx] = 0;
5953 		else
5954 			rndm[nmx] = get_random();
5955 
5956 		if (endp != NULL)
5957 		{
5958 			/*
5959 			**  Since we don't have the original MX prefs,
5960 			**  make our own.  If the separator is a ':', that
5961 			**  means the preference for the next host will be
5962 			**  higher than this one, so simply increment curpref.
5963 			*/
5964 
5965 			if (sep == ':')
5966 				curpref++;
5967 
5968 			*endp++ = sep;
5969 		}
5970 		if (++nmx >= MAXMXHOSTS)
5971 			break;
5972 	}
5973 
5974 	/* sort the records using the random factor for equal preferences */
5975 	for (i = 0; i < nmx; i++)
5976 	{
5977 		for (j = i + 1; j < nmx; j++)
5978 		{
5979 			/*
5980 			**  List is already sorted by MX preference, only
5981 			**  need to look for equal preference MX records
5982 			*/
5983 
5984 			if (prefer[i] < prefer[j])
5985 				break;
5986 
5987 			if (prefer[i] > prefer[j] ||
5988 			    (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5989 			{
5990 				register unsigned short tempp;
5991 				register long tempr;
5992 				register char *temp1;
5993 
5994 				tempp = prefer[i];
5995 				prefer[i] = prefer[j];
5996 				prefer[j] = tempp;
5997 				temp1 = mxhosts[i];
5998 				mxhosts[i] = mxhosts[j];
5999 				mxhosts[j] = temp1;
6000 				tempr = rndm[i];
6001 				rndm[i] = rndm[j];
6002 				rndm[j] = tempr;
6003 			}
6004 		}
6005 	}
6006 	return nmx;
6007 }
6008 
6009 # if STARTTLS
6010 static SSL_CTX	*clt_ctx = NULL;
6011 static bool	tls_ok_clt = true;
6012 
6013 /*
6014 **  SETCLTTLS -- client side TLS: allow/disallow.
6015 **
6016 **	Parameters:
6017 **		tls_ok -- should tls be done?
6018 **
6019 **	Returns:
6020 **		none.
6021 **
6022 **	Side Effects:
6023 **		sets tls_ok_clt (static variable in this module)
6024 */
6025 
6026 void
6027 setclttls(tls_ok)
6028 	bool tls_ok;
6029 {
6030 	tls_ok_clt = tls_ok;
6031 	return;
6032 }
6033 /*
6034 **  INITCLTTLS -- initialize client side TLS
6035 **
6036 **	Parameters:
6037 **		tls_ok -- should tls initialization be done?
6038 **
6039 **	Returns:
6040 **		succeeded?
6041 **
6042 **	Side Effects:
6043 **		sets tls_ok_clt (static variable in this module)
6044 */
6045 
6046 bool
6047 initclttls(tls_ok)
6048 	bool tls_ok;
6049 {
6050 	if (!tls_ok_clt)
6051 		return false;
6052 	tls_ok_clt = tls_ok;
6053 	if (!tls_ok_clt)
6054 		return false;
6055 	if (clt_ctx != NULL)
6056 		return true;	/* already done */
6057 	tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, false, CltCertFile,
6058 			     CltKeyFile, CACertPath, CACertFile, DHParams);
6059 	return tls_ok_clt;
6060 }
6061 
6062 /*
6063 **  STARTTLS -- try to start secure connection (client side)
6064 **
6065 **	Parameters:
6066 **		m -- the mailer.
6067 **		mci -- the mailer connection info.
6068 **		e -- the envelope.
6069 **
6070 **	Returns:
6071 **		success?
6072 **		(maybe this should be some other code than EX_
6073 **		that denotes which stage failed.)
6074 */
6075 
6076 static int
6077 starttls(m, mci, e)
6078 	MAILER *m;
6079 	MCI *mci;
6080 	ENVELOPE *e;
6081 {
6082 	int smtpresult;
6083 	int result = 0;
6084 	int rfd, wfd;
6085 	SSL *clt_ssl = NULL;
6086 	time_t tlsstart;
6087 
6088 	if (clt_ctx == NULL && !initclttls(true))
6089 		return EX_TEMPFAIL;
6090 	smtpmessage("STARTTLS", m, mci);
6091 
6092 	/* get the reply */
6093 	smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6094 			XS_STARTTLS);
6095 
6096 	/* check return code from server */
6097 	if (REPLYTYPE(smtpresult) == 4)
6098 		return EX_TEMPFAIL;
6099 	if (smtpresult == 501)
6100 		return EX_USAGE;
6101 	if (smtpresult == -1)
6102 		return smtpresult;
6103 
6104 	/* not an expected reply but we have to deal with it */
6105 	if (REPLYTYPE(smtpresult) == 5)
6106 		return EX_UNAVAILABLE;
6107 	if (smtpresult != 220)
6108 		return EX_PROTOCOL;
6109 
6110 	if (LogLevel > 13)
6111 		sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6112 
6113 	/* start connection */
6114 	if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6115 	{
6116 		if (LogLevel > 5)
6117 		{
6118 			sm_syslog(LOG_ERR, NOQID,
6119 				  "STARTTLS=client, error: SSL_new failed");
6120 			if (LogLevel > 9)
6121 				tlslogerr("client");
6122 		}
6123 		return EX_SOFTWARE;
6124 	}
6125 
6126 	rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6127 	wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6128 
6129 	/* SSL_clear(clt_ssl); ? */
6130 	if (rfd < 0 || wfd < 0 ||
6131 	    (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6132 	    (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6133 	{
6134 		if (LogLevel > 5)
6135 		{
6136 			sm_syslog(LOG_ERR, NOQID,
6137 				  "STARTTLS=client, error: SSL_set_xfd failed=%d",
6138 				  result);
6139 			if (LogLevel > 9)
6140 				tlslogerr("client");
6141 		}
6142 		return EX_SOFTWARE;
6143 	}
6144 	SSL_set_connect_state(clt_ssl);
6145 	tlsstart = curtime();
6146 
6147 ssl_retry:
6148 	if ((result = SSL_connect(clt_ssl)) <= 0)
6149 	{
6150 		int i, ssl_err;
6151 
6152 		ssl_err = SSL_get_error(clt_ssl, result);
6153 		i = tls_retry(clt_ssl, rfd, wfd, tlsstart,
6154 			TimeOuts.to_starttls, ssl_err, "client");
6155 		if (i > 0)
6156 			goto ssl_retry;
6157 
6158 		if (LogLevel > 5)
6159 		{
6160 			sm_syslog(LOG_WARNING, NOQID,
6161 				  "STARTTLS=client, error: connect failed=%d, SSL_error=%d, errno=%d, retry=%d",
6162 				  result, ssl_err, errno, i);
6163 			if (LogLevel > 8)
6164 				tlslogerr("client");
6165 		}
6166 
6167 		SSL_free(clt_ssl);
6168 		clt_ssl = NULL;
6169 		return EX_SOFTWARE;
6170 	}
6171 	mci->mci_ssl = clt_ssl;
6172 	result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6173 			      &mci->mci_macro, true);
6174 
6175 	/* switch to use TLS... */
6176 	if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6177 		return EX_OK;
6178 
6179 	/* failure */
6180 	SSL_free(clt_ssl);
6181 	clt_ssl = NULL;
6182 	return EX_SOFTWARE;
6183 }
6184 /*
6185 **  ENDTLSCLT -- shutdown secure connection (client side)
6186 **
6187 **	Parameters:
6188 **		mci -- the mailer connection info.
6189 **
6190 **	Returns:
6191 **		success?
6192 */
6193 
6194 static int
6195 endtlsclt(mci)
6196 	MCI *mci;
6197 {
6198 	int r;
6199 
6200 	if (!bitset(MCIF_TLSACT, mci->mci_flags))
6201 		return EX_OK;
6202 	r = endtls(mci->mci_ssl, "client");
6203 	mci->mci_flags &= ~MCIF_TLSACT;
6204 	return r;
6205 }
6206 # endif /* STARTTLS */
6207 # if STARTTLS || SASL
6208 /*
6209 **  ISCLTFLGSET -- check whether client flag is set.
6210 **
6211 **	Parameters:
6212 **		e -- envelope.
6213 **		flag -- flag to check in {client_flags}
6214 **
6215 **	Returns:
6216 **		true iff flag is set.
6217 */
6218 
6219 static bool
6220 iscltflgset(e, flag)
6221 	ENVELOPE *e;
6222 	int flag;
6223 {
6224 	char *p;
6225 
6226 	p = macvalue(macid("{client_flags}"), e);
6227 	if (p == NULL)
6228 		return false;
6229 	for (; *p != '\0'; p++)
6230 	{
6231 		/* look for just this one flag */
6232 		if (*p == (char) flag)
6233 			return true;
6234 	}
6235 	return false;
6236 }
6237 # endif /* STARTTLS || SASL */
6238