xref: /freebsd/contrib/sendmail/src/main.c (revision 7aa383846770374466b1dcb2cefd71bde9acf463)
1 /*
2  * Copyright (c) 1998-2006, 2008, 2009 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #define _DEFINE
15 #include <sendmail.h>
16 #include <sm/sendmail.h>
17 #include <sm/xtrap.h>
18 #include <sm/signal.h>
19 
20 #ifndef lint
21 SM_UNUSED(static char copyright[]) =
22 "@(#) Copyright (c) 1998-2003 Sendmail, Inc. and its suppliers.\n\
23 	All rights reserved.\n\
24      Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.\n\
25      Copyright (c) 1988, 1993\n\
26 	The Regents of the University of California.  All rights reserved.\n";
27 #endif /* ! lint */
28 
29 SM_RCSID("@(#)$Id: main.c,v 8.971 2009/12/18 17:08:01 ca Exp $")
30 
31 
32 #if NETINET || NETINET6
33 # include <arpa/inet.h>
34 #endif /* NETINET || NETINET6 */
35 
36 /* for getcfname() */
37 #include <sendmail/pathnames.h>
38 
39 static SM_DEBUG_T
40 DebugNoPRestart = SM_DEBUG_INITIALIZER("no_persistent_restart",
41 	"@(#)$Debug: no_persistent_restart - don't restart, log only $");
42 
43 static void	dump_class __P((STAB *, int));
44 static void	obsolete __P((char **));
45 static void	testmodeline __P((char *, ENVELOPE *));
46 static char	*getextenv __P((const char *));
47 static void	sm_printoptions __P((char **));
48 static SIGFUNC_DECL	intindebug __P((int));
49 static SIGFUNC_DECL	sighup __P((int));
50 static SIGFUNC_DECL	sigpipe __P((int));
51 static SIGFUNC_DECL	sigterm __P((int));
52 #ifdef SIGUSR1
53 static SIGFUNC_DECL	sigusr1 __P((int));
54 #endif /* SIGUSR1 */
55 
56 /*
57 **  SENDMAIL -- Post mail to a set of destinations.
58 **
59 **	This is the basic mail router.  All user mail programs should
60 **	call this routine to actually deliver mail.  Sendmail in
61 **	turn calls a bunch of mail servers that do the real work of
62 **	delivering the mail.
63 **
64 **	Sendmail is driven by settings read in from /etc/mail/sendmail.cf
65 **	(read by readcf.c).
66 **
67 **	Usage:
68 **		/usr/lib/sendmail [flags] addr ...
69 **
70 **		See the associated documentation for details.
71 **
72 **	Authors:
73 **		Eric Allman, UCB/INGRES (until 10/81).
74 **			     Britton-Lee, Inc., purveyors of fine
75 **				database computers (11/81 - 10/88).
76 **			     International Computer Science Institute
77 **				(11/88 - 9/89).
78 **			     UCB/Mammoth Project (10/89 - 7/95).
79 **			     InReference, Inc. (8/95 - 1/97).
80 **			     Sendmail, Inc. (1/98 - present).
81 **		The support of my employers is gratefully acknowledged.
82 **			Few of them (Britton-Lee in particular) have had
83 **			anything to gain from my involvement in this project.
84 **
85 **		Gregory Neil Shapiro,
86 **			Worcester Polytechnic Institute	(until 3/98).
87 **			Sendmail, Inc. (3/98 - present).
88 **
89 **		Claus Assmann,
90 **			Sendmail, Inc. (12/98 - present).
91 */
92 
93 char		*FullName;	/* sender's full name */
94 ENVELOPE	BlankEnvelope;	/* a "blank" envelope */
95 static ENVELOPE	MainEnvelope;	/* the envelope around the basic letter */
96 ADDRESS		NullAddress =	/* a null address */
97 		{ "", "", NULL, "" };
98 char		*CommandLineArgs;	/* command line args for pid file */
99 bool		Warn_Q_option = false;	/* warn about Q option use */
100 static int	MissingFds = 0;	/* bit map of fds missing on startup */
101 char		*Mbdb = "pw";	/* mailbox database defaults to /etc/passwd */
102 
103 #ifdef NGROUPS_MAX
104 GIDSET_T	InitialGidSet[NGROUPS_MAX];
105 #endif /* NGROUPS_MAX */
106 
107 #define MAXCONFIGLEVEL	10	/* highest config version level known */
108 
109 #if SASL
110 static sasl_callback_t srvcallbacks[] =
111 {
112 	{	SASL_CB_VERIFYFILE,	&safesaslfile,	NULL	},
113 	{	SASL_CB_PROXY_POLICY,	&proxy_policy,	NULL	},
114 	{	SASL_CB_LIST_END,	NULL,		NULL	}
115 };
116 #endif /* SASL */
117 
118 unsigned int	SubmitMode;
119 int		SyslogPrefixLen; /* estimated length of syslog prefix */
120 #define PIDLEN		6	/* pid length for computing SyslogPrefixLen */
121 #ifndef SL_FUDGE
122 # define SL_FUDGE	10	/* fudge offset for SyslogPrefixLen */
123 #endif /* ! SL_FUDGE */
124 #define SLDLL		8	/* est. length of default syslog label */
125 
126 
127 /* Some options are dangerous to allow users to use in non-submit mode */
128 #define CHECK_AGAINST_OPMODE(cmd)					\
129 {									\
130 	if (extraprivs &&						\
131 	    OpMode != MD_DELIVER && OpMode != MD_SMTP &&		\
132 	    OpMode != MD_ARPAFTP && OpMode != MD_CHECKCONFIG &&		\
133 	    OpMode != MD_VERIFY && OpMode != MD_TEST)			\
134 	{								\
135 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,		\
136 				     "WARNING: Ignoring submission mode -%c option (not in submission mode)\n", \
137 		       (cmd));						\
138 		break;							\
139 	}								\
140 	if (extraprivs && queuerun)					\
141 	{								\
142 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,		\
143 				     "WARNING: Ignoring submission mode -%c option with -q\n", \
144 		       (cmd));						\
145 		break;							\
146 	}								\
147 }
148 
149 int
150 main(argc, argv, envp)
151 	int argc;
152 	char **argv;
153 	char **envp;
154 {
155 	register char *p;
156 	char **av;
157 	extern char Version[];
158 	char *ep, *from;
159 	STAB *st;
160 	register int i;
161 	int j;
162 	int dp;
163 	int fill_errno;
164 	int qgrp = NOQGRP;		/* queue group to process */
165 	bool safecf = true;
166 	BITMAP256 *p_flags = NULL;	/* daemon flags */
167 	bool warn_C_flag = false;
168 	bool auth = true;		/* whether to set e_auth_param */
169 	char warn_f_flag = '\0';
170 	bool run_in_foreground = false;	/* -bD mode */
171 	bool queuerun = false, debug = false;
172 	struct passwd *pw;
173 	struct hostent *hp;
174 	char *nullserver = NULL;
175 	char *authinfo = NULL;
176 	char *sysloglabel = NULL;	/* label for syslog */
177 	char *conffile = NULL;		/* name of .cf file */
178 	char *queuegroup = NULL;	/* queue group to process */
179 	char *quarantining = NULL;	/* quarantine queue items? */
180 	bool extraprivs;
181 	bool forged, negate;
182 	bool queuepersistent = false;	/* queue runner process runs forever */
183 	bool foregroundqueue = false;	/* queue run in foreground */
184 	bool save_val;			/* to save some bool var. */
185 	int cftype;			/* which cf file to use? */
186 	SM_FILE_T *smdebug;
187 	static time_t starttime = 0;	/* when was process started */
188 	struct stat traf_st;		/* for TrafficLog FIFO check */
189 	char buf[MAXLINE];
190 	char jbuf[MAXHOSTNAMELEN];	/* holds MyHostName */
191 	static char rnamebuf[MAXNAME];	/* holds RealUserName */
192 	char *emptyenviron[1];
193 #if STARTTLS
194 	bool tls_ok;
195 #endif /* STARTTLS */
196 	QUEUE_CHAR *new;
197 	ENVELOPE *e;
198 	extern int DtableSize;
199 	extern int optind;
200 	extern int opterr;
201 	extern char *optarg;
202 	extern char **environ;
203 #if SASL
204 	extern void sm_sasl_init __P((void));
205 #endif /* SASL */
206 
207 #if USE_ENVIRON
208 	envp = environ;
209 #endif /* USE_ENVIRON */
210 
211 	/* turn off profiling */
212 	SM_PROF(0);
213 
214 	/* install default exception handler */
215 	sm_exc_newthread(fatal_error);
216 
217 	/* set the default in/out channel so errors reported to screen */
218 	InChannel = smioin;
219 	OutChannel = smioout;
220 
221 	/*
222 	**  Check to see if we reentered.
223 	**	This would normally happen if e_putheader or e_putbody
224 	**	were NULL when invoked.
225 	*/
226 
227 	if (starttime != 0)
228 	{
229 		syserr("main: reentered!");
230 		abort();
231 	}
232 	starttime = curtime();
233 
234 	/* avoid null pointer dereferences */
235 	TermEscape.te_rv_on = TermEscape.te_under_on = TermEscape.te_normal = "";
236 
237 	RealUid = getuid();
238 	RealGid = getgid();
239 
240 	/* Check if sendmail is running with extra privs */
241 	extraprivs = (RealUid != 0 &&
242 		      (geteuid() != getuid() || getegid() != getgid()));
243 
244 	CurrentPid = getpid();
245 
246 	/* get whatever .cf file is right for the opmode */
247 	cftype = SM_GET_RIGHT_CF;
248 
249 	/* in 4.4BSD, the table can be huge; impose a reasonable limit */
250 	DtableSize = getdtsize();
251 	if (DtableSize > 256)
252 		DtableSize = 256;
253 
254 	/*
255 	**  Be sure we have enough file descriptors.
256 	**	But also be sure that 0, 1, & 2 are open.
257 	*/
258 
259 	/* reset errno and fill_errno; the latter is used way down below */
260 	errno = fill_errno = 0;
261 	fill_fd(STDIN_FILENO, NULL);
262 	if (errno != 0)
263 		fill_errno = errno;
264 	fill_fd(STDOUT_FILENO, NULL);
265 	if (errno != 0)
266 		fill_errno = errno;
267 	fill_fd(STDERR_FILENO, NULL);
268 	if (errno != 0)
269 		fill_errno = errno;
270 
271 	sm_closefrom(STDERR_FILENO + 1, DtableSize);
272 	errno = 0;
273 	smdebug = NULL;
274 
275 #if LOG
276 # ifndef SM_LOG_STR
277 #  define SM_LOG_STR	"sendmail"
278 # endif /* ! SM_LOG_STR */
279 #  ifdef LOG_MAIL
280 	openlog(SM_LOG_STR, LOG_PID, LOG_MAIL);
281 #  else /* LOG_MAIL */
282 	openlog(SM_LOG_STR, LOG_PID);
283 #  endif /* LOG_MAIL */
284 #endif /* LOG */
285 
286 	/*
287 	**  Seed the random number generator.
288 	**  Used for queue file names, picking a queue directory, and
289 	**  MX randomization.
290 	*/
291 
292 	seed_random();
293 
294 	/* do machine-dependent initializations */
295 	init_md(argc, argv);
296 
297 
298 	SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) + SL_FUDGE + SLDLL;
299 
300 	/* reset status from syserr() calls for missing file descriptors */
301 	Errors = 0;
302 	ExitStat = EX_OK;
303 
304 	SubmitMode = SUBMIT_UNKNOWN;
305 #if _FFR_LOCAL_DAEMON
306 	LocalDaemon = false;
307 #endif /* _FFR_LOCAL_DAEMON */
308 #if XDEBUG
309 	checkfd012("after openlog");
310 #endif /* XDEBUG */
311 
312 	tTsetup(tTdvect, sizeof(tTdvect), "0-99.1,*_trace_*.1");
313 
314 #ifdef NGROUPS_MAX
315 	/* save initial group set for future checks */
316 	i = getgroups(NGROUPS_MAX, InitialGidSet);
317 	if (i <= 0)
318 	{
319 		InitialGidSet[0] = (GID_T) -1;
320 		i = 0;
321 	}
322 	while (i < NGROUPS_MAX)
323 		InitialGidSet[i++] = InitialGidSet[0];
324 #endif /* NGROUPS_MAX */
325 
326 	/* drop group id privileges (RunAsUser not yet set) */
327 	dp = drop_privileges(false);
328 	setstat(dp);
329 
330 #ifdef SIGUSR1
331 	/* Only allow root (or non-set-*-ID binaries) to use SIGUSR1 */
332 	if (!extraprivs)
333 	{
334 		/* arrange to dump state on user-1 signal */
335 		(void) sm_signal(SIGUSR1, sigusr1);
336 	}
337 	else
338 	{
339 		/* ignore user-1 signal */
340 		(void) sm_signal(SIGUSR1, SIG_IGN);
341 	}
342 #endif /* SIGUSR1 */
343 
344 	/* initialize for setproctitle */
345 	initsetproctitle(argc, argv, envp);
346 
347 	/* Handle any non-getoptable constructions. */
348 	obsolete(argv);
349 
350 	/*
351 	**  Do a quick prescan of the argument list.
352 	*/
353 
354 
355 	/* find initial opMode */
356 	OpMode = MD_DELIVER;
357 	av = argv;
358 	p = strrchr(*av, '/');
359 	if (p++ == NULL)
360 		p = *av;
361 	if (strcmp(p, "newaliases") == 0)
362 		OpMode = MD_INITALIAS;
363 	else if (strcmp(p, "mailq") == 0)
364 		OpMode = MD_PRINT;
365 	else if (strcmp(p, "smtpd") == 0)
366 		OpMode = MD_DAEMON;
367 	else if (strcmp(p, "hoststat") == 0)
368 		OpMode = MD_HOSTSTAT;
369 	else if (strcmp(p, "purgestat") == 0)
370 		OpMode = MD_PURGESTAT;
371 
372 #if defined(__osf__) || defined(_AIX3)
373 # define OPTIONS	"A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:x"
374 #endif /* defined(__osf__) || defined(_AIX3) */
375 #if defined(sony_news)
376 # define OPTIONS	"A:B:b:C:cD:d:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
377 #endif /* defined(sony_news) */
378 #ifndef OPTIONS
379 # define OPTIONS	"A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
380 #endif /* ! OPTIONS */
381 
382 	/* Set to 0 to allow -b; need to check optarg before using it! */
383 	opterr = 0;
384 	while ((j = getopt(argc, argv, OPTIONS)) != -1)
385 	{
386 		switch (j)
387 		{
388 		  case 'b':	/* operations mode */
389 			j = (optarg == NULL) ? ' ' : *optarg;
390 			switch (j)
391 			{
392 			  case MD_DAEMON:
393 			  case MD_FGDAEMON:
394 			  case MD_SMTP:
395 			  case MD_INITALIAS:
396 			  case MD_DELIVER:
397 			  case MD_VERIFY:
398 			  case MD_TEST:
399 			  case MD_PRINT:
400 			  case MD_PRINTNQE:
401 			  case MD_HOSTSTAT:
402 			  case MD_PURGESTAT:
403 			  case MD_ARPAFTP:
404 #if _FFR_CHECKCONFIG
405 			  case MD_CHECKCONFIG:
406 #endif /* _FFR_CHECKCONFIG */
407 				OpMode = j;
408 				break;
409 
410 #if _FFR_LOCAL_DAEMON
411 			  case MD_LOCAL:
412 				OpMode = MD_DAEMON;
413 				LocalDaemon = true;
414 				break;
415 #endif /* _FFR_LOCAL_DAEMON */
416 
417 			  case MD_FREEZE:
418 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
419 						     "Frozen configurations unsupported\n");
420 				return EX_USAGE;
421 
422 			  default:
423 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
424 						     "Invalid operation mode %c\n",
425 						     j);
426 				return EX_USAGE;
427 			}
428 			break;
429 
430 		  case 'D':
431 			if (debug)
432 			{
433 				errno = 0;
434 				syserr("-D file must be before -d");
435 				ExitStat = EX_USAGE;
436 				break;
437 			}
438 			dp = drop_privileges(true);
439 			setstat(dp);
440 			smdebug = sm_io_open(SmFtStdio, SM_TIME_DEFAULT,
441 					    optarg, SM_IO_APPEND, NULL);
442 			if (smdebug == NULL)
443 			{
444 				syserr("cannot open %s", optarg);
445 				ExitStat = EX_CANTCREAT;
446 				break;
447 			}
448 			sm_debug_setfile(smdebug);
449 			break;
450 
451 		  case 'd':
452 			debug = true;
453 			tTflag(optarg);
454 			(void) sm_io_setvbuf(sm_debug_file(), SM_TIME_DEFAULT,
455 					     (char *) NULL, SM_IO_NBF,
456 					     SM_IO_BUFSIZ);
457 			break;
458 
459 		  case 'G':	/* relay (gateway) submission */
460 			SubmitMode = SUBMIT_MTA;
461 			break;
462 
463 		  case 'L':
464 			if (optarg == NULL)
465 			{
466 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
467 						     "option requires an argument -- '%c'",
468 						     (char) j);
469 				return EX_USAGE;
470 			}
471 			j = SM_MIN(strlen(optarg), 32) + 1;
472 			sysloglabel = xalloc(j);
473 			(void) sm_strlcpy(sysloglabel, optarg, j);
474 			SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) +
475 					  SL_FUDGE + j;
476 			break;
477 
478 		  case 'Q':
479 		  case 'q':
480 			/* just check if it is there */
481 			queuerun = true;
482 			break;
483 		}
484 	}
485 	opterr = 1;
486 
487 	/* Don't leak queue information via debug flags */
488 	if (extraprivs && queuerun && debug)
489 	{
490 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
491 				     "WARNING: Can not use -d with -q.  Disabling debugging.\n");
492 		sm_debug_close();
493 		sm_debug_setfile(NULL);
494 		(void) memset(tTdvect, '\0', sizeof(tTdvect));
495 	}
496 
497 #if LOG
498 	if (sysloglabel != NULL)
499 	{
500 		/* Sanitize the string */
501 		for (p = sysloglabel; *p != '\0'; p++)
502 		{
503 			if (!isascii(*p) || !isprint(*p) || *p == '%')
504 				*p = '*';
505 		}
506 		closelog();
507 #  ifdef LOG_MAIL
508 		openlog(sysloglabel, LOG_PID, LOG_MAIL);
509 #  else /* LOG_MAIL */
510 		openlog(sysloglabel, LOG_PID);
511 #  endif /* LOG_MAIL */
512 	}
513 #endif /* LOG */
514 
515 	/* set up the blank envelope */
516 	BlankEnvelope.e_puthdr = putheader;
517 	BlankEnvelope.e_putbody = putbody;
518 	BlankEnvelope.e_xfp = NULL;
519 	STRUCTCOPY(NullAddress, BlankEnvelope.e_from);
520 	CurEnv = &BlankEnvelope;
521 	STRUCTCOPY(NullAddress, MainEnvelope.e_from);
522 
523 	/*
524 	**  Set default values for variables.
525 	**	These cannot be in initialized data space.
526 	*/
527 
528 	setdefaults(&BlankEnvelope);
529 	initmacros(&BlankEnvelope);
530 
531 	/* reset macro */
532 	set_op_mode(OpMode);
533 	if (OpMode == MD_DAEMON)
534 		DaemonPid = CurrentPid;	/* needed for finis() to work */
535 
536 	pw = sm_getpwuid(RealUid);
537 	if (pw != NULL)
538 		(void) sm_strlcpy(rnamebuf, pw->pw_name, sizeof(rnamebuf));
539 	else
540 		(void) sm_snprintf(rnamebuf, sizeof(rnamebuf), "Unknown UID %d",
541 				   (int) RealUid);
542 
543 	RealUserName = rnamebuf;
544 
545 	if (tTd(0, 101))
546 	{
547 		sm_dprintf("Version %s\n", Version);
548 		finis(false, true, EX_OK);
549 		/* NOTREACHED */
550 	}
551 
552 	/*
553 	**  if running non-set-user-ID binary as non-root, pretend
554 	**  we are the RunAsUid
555 	*/
556 
557 	if (RealUid != 0 && geteuid() == RealUid)
558 	{
559 		if (tTd(47, 1))
560 			sm_dprintf("Non-set-user-ID binary: RunAsUid = RealUid = %d\n",
561 				   (int) RealUid);
562 		RunAsUid = RealUid;
563 	}
564 	else if (geteuid() != 0)
565 		RunAsUid = geteuid();
566 
567 	EffGid = getegid();
568 	if (RealUid != 0 && EffGid == RealGid)
569 		RunAsGid = RealGid;
570 
571 	if (tTd(47, 5))
572 	{
573 		sm_dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n",
574 			   (int) geteuid(), (int) getuid(),
575 			   (int) getegid(), (int) getgid());
576 		sm_dprintf("main: RunAsUser = %d:%d\n",
577 			   (int) RunAsUid, (int) RunAsGid);
578 	}
579 
580 	/* save command line arguments */
581 	j = 0;
582 	for (av = argv; *av != NULL; )
583 		j += strlen(*av++) + 1;
584 	SaveArgv = (char **) xalloc(sizeof(char *) * (argc + 1));
585 	CommandLineArgs = xalloc(j);
586 	p = CommandLineArgs;
587 	for (av = argv, i = 0; *av != NULL; )
588 	{
589 		int h;
590 
591 		SaveArgv[i++] = newstr(*av);
592 		if (av != argv)
593 			*p++ = ' ';
594 		(void) sm_strlcpy(p, *av++, j);
595 		h = strlen(p);
596 		p += h;
597 		j -= h + 1;
598 	}
599 	SaveArgv[i] = NULL;
600 
601 	if (tTd(0, 1))
602 	{
603 		extern char *CompileOptions[];
604 
605 		sm_dprintf("Version %s\n Compiled with:", Version);
606 		sm_printoptions(CompileOptions);
607 	}
608 	if (tTd(0, 10))
609 	{
610 		extern char *OsCompileOptions[];
611 
612 		sm_dprintf("    OS Defines:");
613 		sm_printoptions(OsCompileOptions);
614 #ifdef _PATH_UNIX
615 		sm_dprintf("Kernel symbols:\t%s\n", _PATH_UNIX);
616 #endif /* _PATH_UNIX */
617 
618 		sm_dprintf("     Conf file:\t%s (default for MSP)\n",
619 			   getcfname(OpMode, SubmitMode, SM_GET_SUBMIT_CF,
620 				     conffile));
621 		sm_dprintf("     Conf file:\t%s (default for MTA)\n",
622 			   getcfname(OpMode, SubmitMode, SM_GET_SENDMAIL_CF,
623 				     conffile));
624 		sm_dprintf("      Pid file:\t%s (default)\n", PidFile);
625 	}
626 
627 	if (tTd(0, 12))
628 	{
629 		extern char *SmCompileOptions[];
630 
631 		sm_dprintf(" libsm Defines:");
632 		sm_printoptions(SmCompileOptions);
633 	}
634 
635 	if (tTd(0, 13))
636 	{
637 		extern char *FFRCompileOptions[];
638 
639 		sm_dprintf("   FFR Defines:");
640 		sm_printoptions(FFRCompileOptions);
641 	}
642 
643 	/* clear sendmail's environment */
644 	ExternalEnviron = environ;
645 	emptyenviron[0] = NULL;
646 	environ = emptyenviron;
647 
648 	/*
649 	**  restore any original TZ setting until TimeZoneSpec has been
650 	**  determined - or early log messages may get bogus time stamps
651 	*/
652 
653 	if ((p = getextenv("TZ")) != NULL)
654 	{
655 		char *tz;
656 		int tzlen;
657 
658 		/* XXX check for reasonable length? */
659 		tzlen = strlen(p) + 4;
660 		tz = xalloc(tzlen);
661 		(void) sm_strlcpyn(tz, tzlen, 2, "TZ=", p);
662 
663 		/* XXX check return code? */
664 		(void) putenv(tz);
665 	}
666 
667 	/* prime the child environment */
668 	sm_setuserenv("AGENT", "sendmail");
669 
670 	(void) sm_signal(SIGPIPE, SIG_IGN);
671 	OldUmask = umask(022);
672 	FullName = getextenv("NAME");
673 	if (FullName != NULL)
674 		FullName = newstr(FullName);
675 
676 	/*
677 	**  Initialize name server if it is going to be used.
678 	*/
679 
680 #if NAMED_BIND
681 	if (!bitset(RES_INIT, _res.options))
682 		(void) res_init();
683 	if (tTd(8, 8))
684 		_res.options |= RES_DEBUG;
685 	else
686 		_res.options &= ~RES_DEBUG;
687 # ifdef RES_NOALIASES
688 	_res.options |= RES_NOALIASES;
689 # endif /* RES_NOALIASES */
690 	TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry;
691 	TimeOuts.res_retry[RES_TO_FIRST] = _res.retry;
692 	TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry;
693 	TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans;
694 	TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans;
695 	TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans;
696 #endif /* NAMED_BIND */
697 
698 	errno = 0;
699 	from = NULL;
700 
701 	/* initialize some macros, etc. */
702 	init_vendor_macros(&BlankEnvelope);
703 
704 	/* version */
705 	macdefine(&BlankEnvelope.e_macro, A_PERM, 'v', Version);
706 
707 	/* hostname */
708 	hp = myhostname(jbuf, sizeof(jbuf));
709 	if (jbuf[0] != '\0')
710 	{
711 		struct utsname utsname;
712 
713 		if (tTd(0, 4))
714 			sm_dprintf("Canonical name: %s\n", jbuf);
715 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'w', jbuf);
716 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'j', jbuf);
717 		setclass('w', jbuf);
718 
719 		p = strchr(jbuf, '.');
720 		if (p != NULL && p[1] != '\0')
721 			macdefine(&BlankEnvelope.e_macro, A_TEMP, 'm', &p[1]);
722 
723 		if (uname(&utsname) >= 0)
724 			p = utsname.nodename;
725 		else
726 		{
727 			if (tTd(0, 22))
728 				sm_dprintf("uname failed (%s)\n",
729 					   sm_errstring(errno));
730 			makelower(jbuf);
731 			p = jbuf;
732 		}
733 		if (tTd(0, 4))
734 			sm_dprintf(" UUCP nodename: %s\n", p);
735 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'k', p);
736 		setclass('k', p);
737 		setclass('w', p);
738 	}
739 	if (hp != NULL)
740 	{
741 		for (av = hp->h_aliases; av != NULL && *av != NULL; av++)
742 		{
743 			if (tTd(0, 4))
744 				sm_dprintf("\ta.k.a.: %s\n", *av);
745 			setclass('w', *av);
746 		}
747 #if NETINET || NETINET6
748 		for (i = 0; i >= 0 && hp->h_addr_list[i] != NULL; i++)
749 		{
750 # if NETINET6
751 			char *addr;
752 			char buf6[INET6_ADDRSTRLEN];
753 			struct in6_addr ia6;
754 # endif /* NETINET6 */
755 # if NETINET
756 			struct in_addr ia;
757 # endif /* NETINET */
758 			char ipbuf[103];
759 
760 			ipbuf[0] = '\0';
761 			switch (hp->h_addrtype)
762 			{
763 # if NETINET
764 			  case AF_INET:
765 				if (hp->h_length != INADDRSZ)
766 					break;
767 
768 				memmove(&ia, hp->h_addr_list[i], INADDRSZ);
769 				(void) sm_snprintf(ipbuf, sizeof(ipbuf),
770 						   "[%.100s]", inet_ntoa(ia));
771 				break;
772 # endif /* NETINET */
773 
774 # if NETINET6
775 			  case AF_INET6:
776 				if (hp->h_length != IN6ADDRSZ)
777 					break;
778 
779 				memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ);
780 				addr = anynet_ntop(&ia6, buf6, sizeof(buf6));
781 				if (addr != NULL)
782 					(void) sm_snprintf(ipbuf, sizeof(ipbuf),
783 							   "[%.100s]", addr);
784 				break;
785 # endif /* NETINET6 */
786 			}
787 			if (ipbuf[0] == '\0')
788 				break;
789 
790 			if (tTd(0, 4))
791 				sm_dprintf("\ta.k.a.: %s\n", ipbuf);
792 			setclass('w', ipbuf);
793 		}
794 #endif /* NETINET || NETINET6 */
795 #if NETINET6
796 		freehostent(hp);
797 		hp = NULL;
798 #endif /* NETINET6 */
799 	}
800 
801 	/* current time */
802 	macdefine(&BlankEnvelope.e_macro, A_TEMP, 'b', arpadate((char *) NULL));
803 
804 	/* current load average */
805 	sm_getla();
806 
807 	QueueLimitRecipient = (QUEUE_CHAR *) NULL;
808 	QueueLimitSender = (QUEUE_CHAR *) NULL;
809 	QueueLimitId = (QUEUE_CHAR *) NULL;
810 	QueueLimitQuarantine = (QUEUE_CHAR *) NULL;
811 
812 	/*
813 	**  Crack argv.
814 	*/
815 
816 	optind = 1;
817 	while ((j = getopt(argc, argv, OPTIONS)) != -1)
818 	{
819 		switch (j)
820 		{
821 		  case 'b':	/* operations mode */
822 			/* already done */
823 			break;
824 
825 		  case 'A':	/* use Alternate sendmail/submit.cf */
826 			cftype = optarg[0] == 'c' ? SM_GET_SUBMIT_CF
827 						  : SM_GET_SENDMAIL_CF;
828 			break;
829 
830 		  case 'B':	/* body type */
831 			CHECK_AGAINST_OPMODE(j);
832 			BlankEnvelope.e_bodytype = newstr(optarg);
833 			break;
834 
835 		  case 'C':	/* select configuration file (already done) */
836 			if (RealUid != 0)
837 				warn_C_flag = true;
838 			conffile = newstr(optarg);
839 			dp = drop_privileges(true);
840 			setstat(dp);
841 			safecf = false;
842 			break;
843 
844 		  case 'D':
845 		  case 'd':	/* debugging */
846 			/* already done */
847 			break;
848 
849 		  case 'f':	/* from address */
850 		  case 'r':	/* obsolete -f flag */
851 			CHECK_AGAINST_OPMODE(j);
852 			if (from != NULL)
853 			{
854 				usrerr("More than one \"from\" person");
855 				ExitStat = EX_USAGE;
856 				break;
857 			}
858 			if (optarg[0] == '\0')
859 				from = newstr("<>");
860 			else
861 				from = newstr(denlstring(optarg, true, true));
862 			if (strcmp(RealUserName, from) != 0)
863 				warn_f_flag = j;
864 			break;
865 
866 		  case 'F':	/* set full name */
867 			CHECK_AGAINST_OPMODE(j);
868 			FullName = newstr(optarg);
869 			break;
870 
871 		  case 'G':	/* relay (gateway) submission */
872 			/* already set */
873 			CHECK_AGAINST_OPMODE(j);
874 			break;
875 
876 		  case 'h':	/* hop count */
877 			CHECK_AGAINST_OPMODE(j);
878 			BlankEnvelope.e_hopcount = (short) strtol(optarg, &ep,
879 								  10);
880 			(void) sm_snprintf(buf, sizeof(buf), "%d",
881 					   BlankEnvelope.e_hopcount);
882 			macdefine(&BlankEnvelope.e_macro, A_TEMP, 'c', buf);
883 
884 			if (*ep)
885 			{
886 				usrerr("Bad hop count (%s)", optarg);
887 				ExitStat = EX_USAGE;
888 			}
889 			break;
890 
891 		  case 'L':	/* program label */
892 			/* already set */
893 			break;
894 
895 		  case 'n':	/* don't alias */
896 			CHECK_AGAINST_OPMODE(j);
897 			NoAlias = true;
898 			break;
899 
900 		  case 'N':	/* delivery status notifications */
901 			CHECK_AGAINST_OPMODE(j);
902 			DefaultNotify |= QHASNOTIFY;
903 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
904 				macid("{dsn_notify}"), optarg);
905 			if (sm_strcasecmp(optarg, "never") == 0)
906 				break;
907 			for (p = optarg; p != NULL; optarg = p)
908 			{
909 				p = strchr(p, ',');
910 				if (p != NULL)
911 					*p++ = '\0';
912 				if (sm_strcasecmp(optarg, "success") == 0)
913 					DefaultNotify |= QPINGONSUCCESS;
914 				else if (sm_strcasecmp(optarg, "failure") == 0)
915 					DefaultNotify |= QPINGONFAILURE;
916 				else if (sm_strcasecmp(optarg, "delay") == 0)
917 					DefaultNotify |= QPINGONDELAY;
918 				else
919 				{
920 					usrerr("Invalid -N argument");
921 					ExitStat = EX_USAGE;
922 				}
923 			}
924 			break;
925 
926 		  case 'o':	/* set option */
927 			setoption(*optarg, optarg + 1, false, true,
928 				  &BlankEnvelope);
929 			break;
930 
931 		  case 'O':	/* set option (long form) */
932 			setoption(' ', optarg, false, true, &BlankEnvelope);
933 			break;
934 
935 		  case 'p':	/* set protocol */
936 			CHECK_AGAINST_OPMODE(j);
937 			p = strchr(optarg, ':');
938 			if (p != NULL)
939 			{
940 				*p++ = '\0';
941 				if (*p != '\0')
942 				{
943 					i = strlen(p) + 1;
944 					ep = sm_malloc_x(i);
945 					cleanstrcpy(ep, p, i);
946 					macdefine(&BlankEnvelope.e_macro,
947 						  A_HEAP, 's', ep);
948 				}
949 			}
950 			if (*optarg != '\0')
951 			{
952 				i = strlen(optarg) + 1;
953 				ep = sm_malloc_x(i);
954 				cleanstrcpy(ep, optarg, i);
955 				macdefine(&BlankEnvelope.e_macro, A_HEAP,
956 					  'r', ep);
957 			}
958 			break;
959 
960 		  case 'Q':	/* change quarantining on queued items */
961 			/* sanity check */
962 			if (OpMode != MD_DELIVER &&
963 			    OpMode != MD_QUEUERUN)
964 			{
965 				usrerr("Can not use -Q with -b%c", OpMode);
966 				ExitStat = EX_USAGE;
967 				break;
968 			}
969 
970 			if (OpMode == MD_DELIVER)
971 				set_op_mode(MD_QUEUERUN);
972 
973 			FullName = NULL;
974 
975 			quarantining = newstr(optarg);
976 			break;
977 
978 		  case 'q':	/* run queue files at intervals */
979 			/* sanity check */
980 			if (OpMode != MD_DELIVER &&
981 			    OpMode != MD_DAEMON &&
982 			    OpMode != MD_FGDAEMON &&
983 			    OpMode != MD_PRINT &&
984 			    OpMode != MD_PRINTNQE &&
985 			    OpMode != MD_QUEUERUN)
986 			{
987 				usrerr("Can not use -q with -b%c", OpMode);
988 				ExitStat = EX_USAGE;
989 				break;
990 			}
991 
992 			/* don't override -bd, -bD or -bp */
993 			if (OpMode == MD_DELIVER)
994 				set_op_mode(MD_QUEUERUN);
995 
996 			FullName = NULL;
997 			negate = optarg[0] == '!';
998 			if (negate)
999 			{
1000 				/* negate meaning of pattern match */
1001 				optarg++; /* skip '!' for next switch */
1002 			}
1003 
1004 			switch (optarg[0])
1005 			{
1006 			  case 'G': /* Limit by queue group name */
1007 				if (negate)
1008 				{
1009 					usrerr("Can not use -q!G");
1010 					ExitStat = EX_USAGE;
1011 					break;
1012 				}
1013 				if (queuegroup != NULL)
1014 				{
1015 					usrerr("Can not use multiple -qG options");
1016 					ExitStat = EX_USAGE;
1017 					break;
1018 				}
1019 				queuegroup = newstr(&optarg[1]);
1020 				break;
1021 
1022 			  case 'I': /* Limit by ID */
1023 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1024 				new->queue_match = newstr(&optarg[1]);
1025 				new->queue_negate = negate;
1026 				new->queue_next = QueueLimitId;
1027 				QueueLimitId = new;
1028 				break;
1029 
1030 			  case 'R': /* Limit by recipient */
1031 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1032 				new->queue_match = newstr(&optarg[1]);
1033 				new->queue_negate = negate;
1034 				new->queue_next = QueueLimitRecipient;
1035 				QueueLimitRecipient = new;
1036 				break;
1037 
1038 			  case 'S': /* Limit by sender */
1039 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1040 				new->queue_match = newstr(&optarg[1]);
1041 				new->queue_negate = negate;
1042 				new->queue_next = QueueLimitSender;
1043 				QueueLimitSender = new;
1044 				break;
1045 
1046 			  case 'f': /* foreground queue run */
1047 				foregroundqueue  = true;
1048 				break;
1049 
1050 			  case 'Q': /* Limit by quarantine message */
1051 				if (optarg[1] != '\0')
1052 				{
1053 					new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1054 					new->queue_match = newstr(&optarg[1]);
1055 					new->queue_negate = negate;
1056 					new->queue_next = QueueLimitQuarantine;
1057 					QueueLimitQuarantine = new;
1058 				}
1059 				QueueMode = QM_QUARANTINE;
1060 				break;
1061 
1062 			  case 'L': /* act on lost items */
1063 				QueueMode = QM_LOST;
1064 				break;
1065 
1066 			  case 'p': /* Persistent queue */
1067 				queuepersistent = true;
1068 				if (QueueIntvl == 0)
1069 					QueueIntvl = 1;
1070 				if (optarg[1] == '\0')
1071 					break;
1072 				++optarg;
1073 				/* FALLTHROUGH */
1074 
1075 			  default:
1076 				i = Errors;
1077 				QueueIntvl = convtime(optarg, 'm');
1078 				if (QueueIntvl < 0)
1079 				{
1080 					usrerr("Invalid -q value");
1081 					ExitStat = EX_USAGE;
1082 				}
1083 
1084 				/* check for bad conversion */
1085 				if (i < Errors)
1086 					ExitStat = EX_USAGE;
1087 				break;
1088 			}
1089 			break;
1090 
1091 		  case 'R':	/* DSN RET: what to return */
1092 			CHECK_AGAINST_OPMODE(j);
1093 			if (bitset(EF_RET_PARAM, BlankEnvelope.e_flags))
1094 			{
1095 				usrerr("Duplicate -R flag");
1096 				ExitStat = EX_USAGE;
1097 				break;
1098 			}
1099 			BlankEnvelope.e_flags |= EF_RET_PARAM;
1100 			if (sm_strcasecmp(optarg, "hdrs") == 0)
1101 				BlankEnvelope.e_flags |= EF_NO_BODY_RETN;
1102 			else if (sm_strcasecmp(optarg, "full") != 0)
1103 			{
1104 				usrerr("Invalid -R value");
1105 				ExitStat = EX_USAGE;
1106 			}
1107 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
1108 				  macid("{dsn_ret}"), optarg);
1109 			break;
1110 
1111 		  case 't':	/* read recipients from message */
1112 			CHECK_AGAINST_OPMODE(j);
1113 			GrabTo = true;
1114 			break;
1115 
1116 		  case 'V':	/* DSN ENVID: set "original" envelope id */
1117 			CHECK_AGAINST_OPMODE(j);
1118 			if (!xtextok(optarg))
1119 			{
1120 				usrerr("Invalid syntax in -V flag");
1121 				ExitStat = EX_USAGE;
1122 			}
1123 			else
1124 			{
1125 				BlankEnvelope.e_envid = newstr(optarg);
1126 				macdefine(&BlankEnvelope.e_macro, A_TEMP,
1127 					  macid("{dsn_envid}"), optarg);
1128 			}
1129 			break;
1130 
1131 		  case 'X':	/* traffic log file */
1132 			dp = drop_privileges(true);
1133 			setstat(dp);
1134 			if (stat(optarg, &traf_st) == 0 &&
1135 			    S_ISFIFO(traf_st.st_mode))
1136 				TrafficLogFile = sm_io_open(SmFtStdio,
1137 							    SM_TIME_DEFAULT,
1138 							    optarg,
1139 							    SM_IO_WRONLY, NULL);
1140 			else
1141 				TrafficLogFile = sm_io_open(SmFtStdio,
1142 							    SM_TIME_DEFAULT,
1143 							    optarg,
1144 							    SM_IO_APPEND, NULL);
1145 			if (TrafficLogFile == NULL)
1146 			{
1147 				syserr("cannot open %s", optarg);
1148 				ExitStat = EX_CANTCREAT;
1149 				break;
1150 			}
1151 			(void) sm_io_setvbuf(TrafficLogFile, SM_TIME_DEFAULT,
1152 					     NULL, SM_IO_LBF, 0);
1153 			break;
1154 
1155 			/* compatibility flags */
1156 		  case 'c':	/* connect to non-local mailers */
1157 		  case 'i':	/* don't let dot stop me */
1158 		  case 'm':	/* send to me too */
1159 		  case 'T':	/* set timeout interval */
1160 		  case 'v':	/* give blow-by-blow description */
1161 			setoption(j, "T", false, true, &BlankEnvelope);
1162 			break;
1163 
1164 		  case 'e':	/* error message disposition */
1165 		  case 'M':	/* define macro */
1166 			setoption(j, optarg, false, true, &BlankEnvelope);
1167 			break;
1168 
1169 		  case 's':	/* save From lines in headers */
1170 			setoption('f', "T", false, true, &BlankEnvelope);
1171 			break;
1172 
1173 #ifdef DBM
1174 		  case 'I':	/* initialize alias DBM file */
1175 			set_op_mode(MD_INITALIAS);
1176 			break;
1177 #endif /* DBM */
1178 
1179 #if defined(__osf__) || defined(_AIX3)
1180 		  case 'x':	/* random flag that OSF/1 & AIX mailx passes */
1181 			break;
1182 #endif /* defined(__osf__) || defined(_AIX3) */
1183 #if defined(sony_news)
1184 		  case 'E':
1185 		  case 'J':	/* ignore flags for Japanese code conversion
1186 				   implemented on Sony NEWS */
1187 			break;
1188 #endif /* defined(sony_news) */
1189 
1190 		  default:
1191 			finis(true, true, EX_USAGE);
1192 			/* NOTREACHED */
1193 			break;
1194 		}
1195 	}
1196 
1197 	/* if we've had errors so far, exit now */
1198 	if ((ExitStat != EX_OK && OpMode != MD_TEST && OpMode != MD_CHECKCONFIG) ||
1199 	    ExitStat == EX_OSERR)
1200 	{
1201 		finis(false, true, ExitStat);
1202 		/* NOTREACHED */
1203 	}
1204 
1205 	if (bitset(SUBMIT_MTA, SubmitMode))
1206 	{
1207 		/* If set daemon_flags on command line, don't reset it */
1208 		if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1209 			macdefine(&BlankEnvelope.e_macro, A_PERM,
1210 				  macid("{daemon_flags}"), "CC f");
1211 	}
1212 	else if (OpMode == MD_DELIVER || OpMode == MD_SMTP)
1213 	{
1214 		SubmitMode = SUBMIT_MSA;
1215 
1216 		/* If set daemon_flags on command line, don't reset it */
1217 		if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1218 			macdefine(&BlankEnvelope.e_macro, A_PERM,
1219 				  macid("{daemon_flags}"), "c u");
1220 	}
1221 
1222 	/*
1223 	**  Do basic initialization.
1224 	**	Read system control file.
1225 	**	Extract special fields for local use.
1226 	*/
1227 
1228 #if XDEBUG
1229 	checkfd012("before readcf");
1230 #endif /* XDEBUG */
1231 	vendor_pre_defaults(&BlankEnvelope);
1232 
1233 	readcf(getcfname(OpMode, SubmitMode, cftype, conffile),
1234 			 safecf, &BlankEnvelope);
1235 #if !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_)
1236 	ConfigFileRead = true;
1237 #endif /* !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_) */
1238 	vendor_post_defaults(&BlankEnvelope);
1239 
1240 	/* now we can complain about missing fds */
1241 	if (MissingFds != 0 && LogLevel > 8)
1242 	{
1243 		char mbuf[MAXLINE];
1244 
1245 		mbuf[0] = '\0';
1246 		if (bitset(1 << STDIN_FILENO, MissingFds))
1247 			(void) sm_strlcat(mbuf, ", stdin", sizeof(mbuf));
1248 		if (bitset(1 << STDOUT_FILENO, MissingFds))
1249 			(void) sm_strlcat(mbuf, ", stdout", sizeof(mbuf));
1250 		if (bitset(1 << STDERR_FILENO, MissingFds))
1251 			(void) sm_strlcat(mbuf, ", stderr", sizeof(mbuf));
1252 
1253 		/* Notice: fill_errno is from high above: fill_fd() */
1254 		sm_syslog(LOG_WARNING, NOQID,
1255 			  "File descriptors missing on startup: %s; %s",
1256 			  &mbuf[2], sm_errstring(fill_errno));
1257 	}
1258 
1259 	/* Remove the ability for a normal user to send signals */
1260 	if (RealUid != 0 && RealUid != geteuid())
1261 	{
1262 		uid_t new_uid = geteuid();
1263 
1264 #if HASSETREUID
1265 		/*
1266 		**  Since we can differentiate between uid and euid,
1267 		**  make the uid a different user so the real user
1268 		**  can't send signals.  However, it doesn't need to be
1269 		**  root (euid has root).
1270 		*/
1271 
1272 		if (new_uid == 0)
1273 			new_uid = DefUid;
1274 		if (tTd(47, 5))
1275 			sm_dprintf("Changing real uid to %d\n", (int) new_uid);
1276 		if (setreuid(new_uid, geteuid()) < 0)
1277 		{
1278 			syserr("main: setreuid(%d, %d) failed",
1279 			       (int) new_uid, (int) geteuid());
1280 			finis(false, true, EX_OSERR);
1281 			/* NOTREACHED */
1282 		}
1283 		if (tTd(47, 10))
1284 			sm_dprintf("Now running as e/ruid %d:%d\n",
1285 				   (int) geteuid(), (int) getuid());
1286 #else /* HASSETREUID */
1287 		/*
1288 		**  Have to change both effective and real so need to
1289 		**  change them both to effective to keep privs.
1290 		*/
1291 
1292 		if (tTd(47, 5))
1293 			sm_dprintf("Changing uid to %d\n", (int) new_uid);
1294 		if (setuid(new_uid) < 0)
1295 		{
1296 			syserr("main: setuid(%d) failed", (int) new_uid);
1297 			finis(false, true, EX_OSERR);
1298 			/* NOTREACHED */
1299 		}
1300 		if (tTd(47, 10))
1301 			sm_dprintf("Now running as e/ruid %d:%d\n",
1302 				   (int) geteuid(), (int) getuid());
1303 #endif /* HASSETREUID */
1304 	}
1305 
1306 #if NAMED_BIND
1307 	if (FallbackMX != NULL)
1308 		(void) getfallbackmxrr(FallbackMX);
1309 #endif /* NAMED_BIND */
1310 
1311 	if (SuperSafe == SAFE_INTERACTIVE && CurEnv->e_sendmode != SM_DELIVER)
1312 	{
1313 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1314 				     "WARNING: SuperSafe=interactive should only be used with\n         DeliveryMode=interactive\n");
1315 	}
1316 
1317 	if (UseMSP && (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON))
1318 	{
1319 		usrerr("Mail submission program cannot be used as daemon");
1320 		finis(false, true, EX_USAGE);
1321 	}
1322 
1323 	if (OpMode == MD_DELIVER || OpMode == MD_SMTP ||
1324 	    OpMode == MD_QUEUERUN || OpMode == MD_ARPAFTP ||
1325 	    OpMode == MD_DAEMON || OpMode == MD_FGDAEMON)
1326 		makeworkgroups();
1327 
1328 	/* set up the basic signal handlers */
1329 	if (sm_signal(SIGINT, SIG_IGN) != SIG_IGN)
1330 		(void) sm_signal(SIGINT, intsig);
1331 	(void) sm_signal(SIGTERM, intsig);
1332 
1333 	/* Enforce use of local time (null string overrides this) */
1334 	if (TimeZoneSpec == NULL)
1335 		unsetenv("TZ");
1336 	else if (TimeZoneSpec[0] != '\0')
1337 		sm_setuserenv("TZ", TimeZoneSpec);
1338 	else
1339 		sm_setuserenv("TZ", NULL);
1340 	tzset();
1341 
1342 	/* initialize mailbox database */
1343 	i = sm_mbdb_initialize(Mbdb);
1344 	if (i != EX_OK)
1345 	{
1346 		usrerr("Can't initialize mailbox database \"%s\": %s",
1347 		       Mbdb, sm_strexit(i));
1348 		ExitStat = i;
1349 	}
1350 
1351 	/* avoid denial-of-service attacks */
1352 	resetlimits();
1353 
1354 	if (OpMode == MD_TEST)
1355 	{
1356 		/* can't be done after readcf if RunAs* is used */
1357 		dp = drop_privileges(true);
1358 		if (dp != EX_OK)
1359 		{
1360 			finis(false, true, dp);
1361 			/* NOTREACHED */
1362 		}
1363 	}
1364 	else if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON)
1365 	{
1366 		/* drop privileges -- daemon mode done after socket/bind */
1367 		dp = drop_privileges(false);
1368 		setstat(dp);
1369 		if (dp == EX_OK && UseMSP && (geteuid() == 0 || getuid() == 0))
1370 		{
1371 			usrerr("Mail submission program must have RunAsUser set to non root user");
1372 			finis(false, true, EX_CONFIG);
1373 			/* NOTREACHED */
1374 		}
1375 	}
1376 
1377 #if NAMED_BIND
1378 	_res.retry = TimeOuts.res_retry[RES_TO_DEFAULT];
1379 	_res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT];
1380 #endif /* NAMED_BIND */
1381 
1382 	/*
1383 	**  Find our real host name for future logging.
1384 	*/
1385 
1386 	authinfo = getauthinfo(STDIN_FILENO, &forged);
1387 	macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
1388 
1389 	/* suppress error printing if errors mailed back or whatever */
1390 	if (BlankEnvelope.e_errormode != EM_PRINT)
1391 		HoldErrs = true;
1392 
1393 	/* set up the $=m class now, after .cf has a chance to redefine $m */
1394 	expand("\201m", jbuf, sizeof(jbuf), &BlankEnvelope);
1395 	if (jbuf[0] != '\0')
1396 		setclass('m', jbuf);
1397 
1398 	/* probe interfaces and locate any additional names */
1399 	if (DontProbeInterfaces != DPI_PROBENONE)
1400 		load_if_names();
1401 
1402 	if (tTd(0, 10))
1403 	{
1404 		char pidpath[MAXPATHLEN];
1405 
1406 		/* Now we know which .cf file we use */
1407 		sm_dprintf("     Conf file:\t%s (selected)\n",
1408 			   getcfname(OpMode, SubmitMode, cftype, conffile));
1409 		expand(PidFile, pidpath, sizeof(pidpath), &BlankEnvelope);
1410 		sm_dprintf("      Pid file:\t%s (selected)\n", pidpath);
1411 	}
1412 
1413 	if (tTd(0, 1))
1414 	{
1415 		sm_dprintf("\n============ SYSTEM IDENTITY (after readcf) ============");
1416 		sm_dprintf("\n      (short domain name) $w = ");
1417 		xputs(sm_debug_file(), macvalue('w', &BlankEnvelope));
1418 		sm_dprintf("\n  (canonical domain name) $j = ");
1419 		xputs(sm_debug_file(), macvalue('j', &BlankEnvelope));
1420 		sm_dprintf("\n         (subdomain name) $m = ");
1421 		xputs(sm_debug_file(), macvalue('m', &BlankEnvelope));
1422 		sm_dprintf("\n              (node name) $k = ");
1423 		xputs(sm_debug_file(), macvalue('k', &BlankEnvelope));
1424 		sm_dprintf("\n========================================================\n\n");
1425 	}
1426 
1427 	/*
1428 	**  Do more command line checking -- these are things that
1429 	**  have to modify the results of reading the config file.
1430 	*/
1431 
1432 	/* process authorization warnings from command line */
1433 	if (warn_C_flag)
1434 		auth_warning(&BlankEnvelope, "Processed by %s with -C %s",
1435 			     RealUserName, conffile);
1436 	if (Warn_Q_option && !wordinclass(RealUserName, 't'))
1437 		auth_warning(&BlankEnvelope, "Processed from queue %s",
1438 			     QueueDir);
1439 	if (sysloglabel != NULL && !wordinclass(RealUserName, 't') &&
1440 	    RealUid != 0 && RealUid != TrustedUid && LogLevel > 1)
1441 		sm_syslog(LOG_WARNING, NOQID, "user %d changed syslog label",
1442 			  (int) RealUid);
1443 
1444 	/* check body type for legality */
1445 	i = check_bodytype(BlankEnvelope.e_bodytype);
1446 	if (i == BODYTYPE_ILLEGAL)
1447 	{
1448 		usrerr("Illegal body type %s", BlankEnvelope.e_bodytype);
1449 		BlankEnvelope.e_bodytype = NULL;
1450 	}
1451 	else if (i != BODYTYPE_NONE)
1452 		SevenBitInput = (i == BODYTYPE_7BIT);
1453 
1454 	/* tweak default DSN notifications */
1455 	if (DefaultNotify == 0)
1456 		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
1457 
1458 	/* check for sane configuration level */
1459 	if (ConfigLevel > MAXCONFIGLEVEL)
1460 	{
1461 		syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)",
1462 		       ConfigLevel, Version, MAXCONFIGLEVEL);
1463 	}
1464 
1465 	/* need MCI cache to have persistence */
1466 	if (HostStatDir != NULL && MaxMciCache == 0)
1467 	{
1468 		HostStatDir = NULL;
1469 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1470 				     "Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n");
1471 	}
1472 
1473 	/* need HostStatusDir in order to have SingleThreadDelivery */
1474 	if (SingleThreadDelivery && HostStatDir == NULL)
1475 	{
1476 		SingleThreadDelivery = false;
1477 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1478 				     "Warning: HostStatusDirectory required for SingleThreadDelivery\n");
1479 	}
1480 
1481 #if _FFR_MEMSTAT
1482 	j = sm_memstat_open();
1483 	if (j < 0 && (RefuseLowMem > 0 || QueueLowMem > 0) && LogLevel > 4)
1484 	{
1485 		sm_syslog(LOG_WARNING, NOQID,
1486 			  "cannot get memory statistics, settings ignored, error=%d"
1487 			  , j);
1488 	}
1489 #endif /* _FFR_MEMSTAT */
1490 
1491 	/* check for permissions */
1492 	if (RealUid != 0 &&
1493 	    RealUid != TrustedUid)
1494 	{
1495 		char *action = NULL;
1496 
1497 		switch (OpMode)
1498 		{
1499 		  case MD_QUEUERUN:
1500 			if (quarantining != NULL)
1501 				action = "quarantine jobs";
1502 			else
1503 			{
1504 				/* Normal users can do a single queue run */
1505 				if (QueueIntvl == 0)
1506 					break;
1507 			}
1508 
1509 			/* but not persistent queue runners */
1510 			if (action == NULL)
1511 				action = "start a queue runner daemon";
1512 			/* FALLTHROUGH */
1513 
1514 		  case MD_PURGESTAT:
1515 			if (action == NULL)
1516 				action = "purge host status";
1517 			/* FALLTHROUGH */
1518 
1519 		  case MD_DAEMON:
1520 		  case MD_FGDAEMON:
1521 			if (action == NULL)
1522 				action = "run daemon";
1523 
1524 			if (tTd(65, 1))
1525 				sm_dprintf("Deny user %d attempt to %s\n",
1526 					   (int) RealUid, action);
1527 
1528 			if (LogLevel > 1)
1529 				sm_syslog(LOG_ALERT, NOQID,
1530 					  "user %d attempted to %s",
1531 					  (int) RealUid, action);
1532 			HoldErrs = false;
1533 			usrerr("Permission denied (real uid not trusted)");
1534 			finis(false, true, EX_USAGE);
1535 			/* NOTREACHED */
1536 			break;
1537 
1538 		  case MD_VERIFY:
1539 			if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags))
1540 			{
1541 				/*
1542 				**  If -bv and RestrictExpand,
1543 				**  drop privs to prevent normal
1544 				**  users from reading private
1545 				**  aliases/forwards/:include:s
1546 				*/
1547 
1548 				if (tTd(65, 1))
1549 					sm_dprintf("Drop privs for user %d attempt to expand (RestrictExpand)\n",
1550 						   (int) RealUid);
1551 
1552 				dp = drop_privileges(true);
1553 
1554 				/* Fake address safety */
1555 				if (tTd(65, 1))
1556 					sm_dprintf("Faking DontBlameSendmail=NonRootSafeAddr\n");
1557 				setbitn(DBS_NONROOTSAFEADDR, DontBlameSendmail);
1558 
1559 				if (dp != EX_OK)
1560 				{
1561 					if (tTd(65, 1))
1562 						sm_dprintf("Failed to drop privs for user %d attempt to expand, exiting\n",
1563 							   (int) RealUid);
1564 					CurEnv->e_id = NULL;
1565 					finis(true, true, dp);
1566 					/* NOTREACHED */
1567 				}
1568 			}
1569 			break;
1570 
1571 		  case MD_TEST:
1572 		  case MD_CHECKCONFIG:
1573 		  case MD_PRINT:
1574 		  case MD_PRINTNQE:
1575 		  case MD_FREEZE:
1576 		  case MD_HOSTSTAT:
1577 			/* Nothing special to check */
1578 			break;
1579 
1580 		  case MD_INITALIAS:
1581 			if (!wordinclass(RealUserName, 't'))
1582 			{
1583 				if (tTd(65, 1))
1584 					sm_dprintf("Deny user %d attempt to rebuild the alias map\n",
1585 						   (int) RealUid);
1586 				if (LogLevel > 1)
1587 					sm_syslog(LOG_ALERT, NOQID,
1588 						  "user %d attempted to rebuild the alias map",
1589 						  (int) RealUid);
1590 				HoldErrs = false;
1591 				usrerr("Permission denied (real uid not trusted)");
1592 				finis(false, true, EX_USAGE);
1593 				/* NOTREACHED */
1594 			}
1595 			if (UseMSP)
1596 			{
1597 				HoldErrs = false;
1598 				usrerr("User %d cannot rebuild aliases in mail submission program",
1599 				       (int) RealUid);
1600 				finis(false, true, EX_USAGE);
1601 				/* NOTREACHED */
1602 			}
1603 			/* FALLTHROUGH */
1604 
1605 		  default:
1606 			if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags) &&
1607 			    Verbose != 0)
1608 			{
1609 				/*
1610 				**  If -v and RestrictExpand, reset
1611 				**  Verbose to prevent normal users
1612 				**  from seeing the expansion of
1613 				**  aliases/forwards/:include:s
1614 				*/
1615 
1616 				if (tTd(65, 1))
1617 					sm_dprintf("Dropping verbosity for user %d (RestrictExpand)\n",
1618 						   (int) RealUid);
1619 				Verbose = 0;
1620 			}
1621 			break;
1622 		}
1623 	}
1624 
1625 	if (MeToo)
1626 		BlankEnvelope.e_flags |= EF_METOO;
1627 
1628 	switch (OpMode)
1629 	{
1630 	  case MD_TEST:
1631 		/* don't have persistent host status in test mode */
1632 		HostStatDir = NULL;
1633 		/* FALLTHROUGH */
1634 
1635 	  case MD_CHECKCONFIG:
1636 		if (Verbose == 0)
1637 			Verbose = 2;
1638 		BlankEnvelope.e_errormode = EM_PRINT;
1639 		HoldErrs = false;
1640 		break;
1641 
1642 	  case MD_VERIFY:
1643 		BlankEnvelope.e_errormode = EM_PRINT;
1644 		HoldErrs = false;
1645 		/* arrange to exit cleanly on hangup signal */
1646 		if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1647 			(void) sm_signal(SIGHUP, intsig);
1648 		if (geteuid() != 0)
1649 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1650 					     "Notice: -bv may give misleading output for non-privileged user\n");
1651 		break;
1652 
1653 	  case MD_FGDAEMON:
1654 		run_in_foreground = true;
1655 		set_op_mode(MD_DAEMON);
1656 		/* FALLTHROUGH */
1657 
1658 	  case MD_DAEMON:
1659 		vendor_daemon_setup(&BlankEnvelope);
1660 
1661 		/* remove things that don't make sense in daemon mode */
1662 		FullName = NULL;
1663 		GrabTo = false;
1664 
1665 		/* arrange to restart on hangup signal */
1666 		if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/')
1667 			sm_syslog(LOG_WARNING, NOQID,
1668 				  "daemon invoked without full pathname; kill -1 won't work");
1669 		break;
1670 
1671 	  case MD_INITALIAS:
1672 		Verbose = 2;
1673 		BlankEnvelope.e_errormode = EM_PRINT;
1674 		HoldErrs = false;
1675 		/* FALLTHROUGH */
1676 
1677 	  default:
1678 		/* arrange to exit cleanly on hangup signal */
1679 		if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1680 			(void) sm_signal(SIGHUP, intsig);
1681 		break;
1682 	}
1683 
1684 	/* special considerations for FullName */
1685 	if (FullName != NULL)
1686 	{
1687 		char *full = NULL;
1688 
1689 		/* full names can't have newlines */
1690 		if (strchr(FullName, '\n') != NULL)
1691 		{
1692 			full = newstr(denlstring(FullName, true, true));
1693 			FullName = full;
1694 		}
1695 
1696 		/* check for characters that may have to be quoted */
1697 		if (!rfc822_string(FullName))
1698 		{
1699 			/*
1700 			**  Quote a full name with special characters
1701 			**  as a comment so crackaddr() doesn't destroy
1702 			**  the name portion of the address.
1703 			*/
1704 
1705 			FullName = addquotes(FullName, NULL);
1706 			if (full != NULL)
1707 				sm_free(full);  /* XXX */
1708 		}
1709 	}
1710 
1711 	/* do heuristic mode adjustment */
1712 	if (Verbose)
1713 	{
1714 		/* turn off noconnect option */
1715 		setoption('c', "F", true, false, &BlankEnvelope);
1716 
1717 		/* turn on interactive delivery */
1718 		setoption('d', "", true, false, &BlankEnvelope);
1719 	}
1720 
1721 #ifdef VENDOR_CODE
1722 	/* check for vendor mismatch */
1723 	if (VendorCode != VENDOR_CODE)
1724 	{
1725 		message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s",
1726 			getvendor(VENDOR_CODE), getvendor(VendorCode));
1727 	}
1728 #endif /* VENDOR_CODE */
1729 
1730 	/* check for out of date configuration level */
1731 	if (ConfigLevel < MAXCONFIGLEVEL)
1732 	{
1733 		message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d",
1734 			Version, MAXCONFIGLEVEL, ConfigLevel);
1735 	}
1736 
1737 	if (ConfigLevel < 3)
1738 		UseErrorsTo = true;
1739 
1740 	/* set options that were previous macros */
1741 	if (SmtpGreeting == NULL)
1742 	{
1743 		if (ConfigLevel < 7 &&
1744 		    (p = macvalue('e', &BlankEnvelope)) != NULL)
1745 			SmtpGreeting = newstr(p);
1746 		else
1747 			SmtpGreeting = "\201j Sendmail \201v ready at \201b";
1748 	}
1749 	if (UnixFromLine == NULL)
1750 	{
1751 		if (ConfigLevel < 7 &&
1752 		    (p = macvalue('l', &BlankEnvelope)) != NULL)
1753 			UnixFromLine = newstr(p);
1754 		else
1755 			UnixFromLine = "From \201g  \201d";
1756 	}
1757 	SmtpError[0] = '\0';
1758 
1759 	/* our name for SMTP codes */
1760 	expand("\201j", jbuf, sizeof(jbuf), &BlankEnvelope);
1761 	if (jbuf[0] == '\0')
1762 		PSTRSET(MyHostName, "localhost");
1763 	else
1764 		PSTRSET(MyHostName, jbuf);
1765 	if (strchr(MyHostName, '.') == NULL)
1766 		message("WARNING: local host name (%s) is not qualified; see cf/README: WHO AM I?",
1767 			MyHostName);
1768 
1769 	/* make certain that this name is part of the $=w class */
1770 	setclass('w', MyHostName);
1771 
1772 	/* fill in the structure of the *default* queue */
1773 	st = stab("mqueue", ST_QUEUE, ST_FIND);
1774 	if (st == NULL)
1775 		syserr("No default queue (mqueue) defined");
1776 	else
1777 		set_def_queueval(st->s_quegrp, true);
1778 
1779 	/* the indices of built-in mailers */
1780 	st = stab("local", ST_MAILER, ST_FIND);
1781 	if (st != NULL)
1782 		LocalMailer = st->s_mailer;
1783 	else if (OpMode != MD_TEST || !warn_C_flag)
1784 		syserr("No local mailer defined");
1785 
1786 	st = stab("prog", ST_MAILER, ST_FIND);
1787 	if (st == NULL)
1788 		syserr("No prog mailer defined");
1789 	else
1790 	{
1791 		ProgMailer = st->s_mailer;
1792 		clrbitn(M_MUSER, ProgMailer->m_flags);
1793 	}
1794 
1795 	st = stab("*file*", ST_MAILER, ST_FIND);
1796 	if (st == NULL)
1797 		syserr("No *file* mailer defined");
1798 	else
1799 	{
1800 		FileMailer = st->s_mailer;
1801 		clrbitn(M_MUSER, FileMailer->m_flags);
1802 	}
1803 
1804 	st = stab("*include*", ST_MAILER, ST_FIND);
1805 	if (st == NULL)
1806 		syserr("No *include* mailer defined");
1807 	else
1808 		InclMailer = st->s_mailer;
1809 
1810 	if (ConfigLevel < 6)
1811 	{
1812 		/* heuristic tweaking of local mailer for back compat */
1813 		if (LocalMailer != NULL)
1814 		{
1815 			setbitn(M_ALIASABLE, LocalMailer->m_flags);
1816 			setbitn(M_HASPWENT, LocalMailer->m_flags);
1817 			setbitn(M_TRYRULESET5, LocalMailer->m_flags);
1818 			setbitn(M_CHECKINCLUDE, LocalMailer->m_flags);
1819 			setbitn(M_CHECKPROG, LocalMailer->m_flags);
1820 			setbitn(M_CHECKFILE, LocalMailer->m_flags);
1821 			setbitn(M_CHECKUDB, LocalMailer->m_flags);
1822 		}
1823 		if (ProgMailer != NULL)
1824 			setbitn(M_RUNASRCPT, ProgMailer->m_flags);
1825 		if (FileMailer != NULL)
1826 			setbitn(M_RUNASRCPT, FileMailer->m_flags);
1827 	}
1828 	if (ConfigLevel < 7)
1829 	{
1830 		if (LocalMailer != NULL)
1831 			setbitn(M_VRFY250, LocalMailer->m_flags);
1832 		if (ProgMailer != NULL)
1833 			setbitn(M_VRFY250, ProgMailer->m_flags);
1834 		if (FileMailer != NULL)
1835 			setbitn(M_VRFY250, FileMailer->m_flags);
1836 	}
1837 
1838 	/* MIME Content-Types that cannot be transfer encoded */
1839 	setclass('n', "multipart/signed");
1840 
1841 	/* MIME message/xxx subtypes that can be treated as messages */
1842 	setclass('s', "rfc822");
1843 
1844 	/* MIME Content-Transfer-Encodings that can be encoded */
1845 	setclass('e', "7bit");
1846 	setclass('e', "8bit");
1847 	setclass('e', "binary");
1848 
1849 #ifdef USE_B_CLASS
1850 	/* MIME Content-Types that should be treated as binary */
1851 	setclass('b', "image");
1852 	setclass('b', "audio");
1853 	setclass('b', "video");
1854 	setclass('b', "application/octet-stream");
1855 #endif /* USE_B_CLASS */
1856 
1857 	/* MIME headers which have fields to check for overflow */
1858 	setclass(macid("{checkMIMEFieldHeaders}"), "content-disposition");
1859 	setclass(macid("{checkMIMEFieldHeaders}"), "content-type");
1860 
1861 	/* MIME headers to check for length overflow */
1862 	setclass(macid("{checkMIMETextHeaders}"), "content-description");
1863 
1864 	/* MIME headers to check for overflow and rebalance */
1865 	setclass(macid("{checkMIMEHeaders}"), "content-disposition");
1866 	setclass(macid("{checkMIMEHeaders}"), "content-id");
1867 	setclass(macid("{checkMIMEHeaders}"), "content-transfer-encoding");
1868 	setclass(macid("{checkMIMEHeaders}"), "content-type");
1869 	setclass(macid("{checkMIMEHeaders}"), "mime-version");
1870 
1871 	/* Macros to save in the queue file -- don't remove any */
1872 	setclass(macid("{persistentMacros}"), "r");
1873 	setclass(macid("{persistentMacros}"), "s");
1874 	setclass(macid("{persistentMacros}"), "_");
1875 	setclass(macid("{persistentMacros}"), "{if_addr}");
1876 	setclass(macid("{persistentMacros}"), "{daemon_flags}");
1877 
1878 	/* operate in queue directory */
1879 	if (QueueDir == NULL || *QueueDir == '\0')
1880 	{
1881 		if (OpMode != MD_TEST)
1882 		{
1883 			syserr("QueueDirectory (Q) option must be set");
1884 			ExitStat = EX_CONFIG;
1885 		}
1886 	}
1887 	else
1888 	{
1889 		if (OpMode != MD_TEST)
1890 			setup_queues(OpMode == MD_DAEMON);
1891 	}
1892 
1893 	/* check host status directory for validity */
1894 	if (HostStatDir != NULL && !path_is_dir(HostStatDir, false))
1895 	{
1896 		/* cannot use this value */
1897 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1898 				     "Warning: Cannot use HostStatusDirectory = %s: %s\n",
1899 				     HostStatDir, sm_errstring(errno));
1900 		HostStatDir = NULL;
1901 	}
1902 
1903 	if (OpMode == MD_QUEUERUN &&
1904 	    RealUid != 0 && bitset(PRIV_RESTRICTQRUN, PrivacyFlags))
1905 	{
1906 		struct stat stbuf;
1907 
1908 		/* check to see if we own the queue directory */
1909 		if (stat(".", &stbuf) < 0)
1910 			syserr("main: cannot stat %s", QueueDir);
1911 		if (stbuf.st_uid != RealUid)
1912 		{
1913 			/* nope, really a botch */
1914 			HoldErrs = false;
1915 			usrerr("You do not have permission to process the queue");
1916 			finis(false, true, EX_NOPERM);
1917 			/* NOTREACHED */
1918 		}
1919 	}
1920 
1921 #if MILTER
1922 	/* sanity checks on milter filters */
1923 	if (OpMode == MD_DAEMON || OpMode == MD_SMTP)
1924 	{
1925 		milter_config(InputFilterList, InputFilters, MAXFILTERS);
1926 		setup_daemon_milters();
1927 	}
1928 #endif /* MILTER */
1929 
1930 	/* Convert queuegroup string to qgrp number */
1931 	if (queuegroup != NULL)
1932 	{
1933 		qgrp = name2qid(queuegroup);
1934 		if (qgrp == NOQGRP)
1935 		{
1936 			HoldErrs = false;
1937 			usrerr("Queue group %s unknown", queuegroup);
1938 			finis(false, true, ExitStat);
1939 			/* NOTREACHED */
1940 		}
1941 	}
1942 
1943 	/* if checking config or have had errors so far, exit now */
1944 	if (OpMode == MD_CHECKCONFIG || (ExitStat != EX_OK && OpMode != MD_TEST))
1945 	{
1946 		finis(false, true, ExitStat);
1947 		/* NOTREACHED */
1948 	}
1949 
1950 #if SASL
1951 	/* sendmail specific SASL initialization */
1952 	sm_sasl_init();
1953 #endif /* SASL */
1954 
1955 #if XDEBUG
1956 	checkfd012("before main() initmaps");
1957 #endif /* XDEBUG */
1958 
1959 	/*
1960 	**  Do operation-mode-dependent initialization.
1961 	*/
1962 
1963 	switch (OpMode)
1964 	{
1965 	  case MD_PRINT:
1966 		/* print the queue */
1967 		HoldErrs = false;
1968 		(void) dropenvelope(&BlankEnvelope, true, false);
1969 		(void) sm_signal(SIGPIPE, sigpipe);
1970 		if (qgrp != NOQGRP)
1971 		{
1972 			int j;
1973 
1974 			/* Selecting a particular queue group to run */
1975 			for (j = 0; j < Queue[qgrp]->qg_numqueues; j++)
1976 			{
1977 				if (StopRequest)
1978 					stop_sendmail();
1979 				(void) print_single_queue(qgrp, j);
1980 			}
1981 			finis(false, true, EX_OK);
1982 			/* NOTREACHED */
1983 		}
1984 		printqueue();
1985 		finis(false, true, EX_OK);
1986 		/* NOTREACHED */
1987 		break;
1988 
1989 	  case MD_PRINTNQE:
1990 		/* print number of entries in queue */
1991 		(void) dropenvelope(&BlankEnvelope, true, false);
1992 		(void) sm_signal(SIGPIPE, sigpipe);
1993 		printnqe(smioout, NULL);
1994 		finis(false, true, EX_OK);
1995 		/* NOTREACHED */
1996 		break;
1997 
1998 	  case MD_QUEUERUN:
1999 		/* only handle quarantining here */
2000 		if (quarantining == NULL)
2001 			break;
2002 
2003 		if (QueueMode != QM_QUARANTINE &&
2004 		    QueueMode != QM_NORMAL)
2005 		{
2006 			HoldErrs = false;
2007 			usrerr("Can not use -Q with -q%c", QueueMode);
2008 			ExitStat = EX_USAGE;
2009 			finis(false, true, ExitStat);
2010 			/* NOTREACHED */
2011 		}
2012 		quarantine_queue(quarantining, qgrp);
2013 		finis(false, true, EX_OK);
2014 		break;
2015 
2016 	  case MD_HOSTSTAT:
2017 		(void) sm_signal(SIGPIPE, sigpipe);
2018 		(void) mci_traverse_persistent(mci_print_persistent, NULL);
2019 		finis(false, true, EX_OK);
2020 		/* NOTREACHED */
2021 		break;
2022 
2023 	  case MD_PURGESTAT:
2024 		(void) mci_traverse_persistent(mci_purge_persistent, NULL);
2025 		finis(false, true, EX_OK);
2026 		/* NOTREACHED */
2027 		break;
2028 
2029 	  case MD_INITALIAS:
2030 		/* initialize maps */
2031 		initmaps();
2032 		finis(false, true, ExitStat);
2033 		/* NOTREACHED */
2034 		break;
2035 
2036 	  case MD_SMTP:
2037 	  case MD_DAEMON:
2038 		/* reset DSN parameters */
2039 		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
2040 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2041 			  macid("{dsn_notify}"), NULL);
2042 		BlankEnvelope.e_envid = NULL;
2043 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2044 			  macid("{dsn_envid}"), NULL);
2045 		BlankEnvelope.e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
2046 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2047 			  macid("{dsn_ret}"), NULL);
2048 
2049 		/* don't open maps for daemon -- done below in child */
2050 		break;
2051 	}
2052 
2053 	if (tTd(0, 15))
2054 	{
2055 		/* print configuration table (or at least part of it) */
2056 		if (tTd(0, 90))
2057 			printrules();
2058 		for (i = 0; i < MAXMAILERS; i++)
2059 		{
2060 			if (Mailer[i] != NULL)
2061 				printmailer(sm_debug_file(), Mailer[i]);
2062 		}
2063 	}
2064 
2065 	/*
2066 	**  Switch to the main envelope.
2067 	*/
2068 
2069 	CurEnv = newenvelope(&MainEnvelope, &BlankEnvelope,
2070 			     sm_rpool_new_x(NULL));
2071 	MainEnvelope.e_flags = BlankEnvelope.e_flags;
2072 
2073 	/*
2074 	**  If test mode, read addresses from stdin and process.
2075 	*/
2076 
2077 	if (OpMode == MD_TEST)
2078 	{
2079 		if (isatty(sm_io_getinfo(smioin, SM_IO_WHAT_FD, NULL)))
2080 			Verbose = 2;
2081 
2082 		if (Verbose)
2083 		{
2084 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2085 				     "ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n");
2086 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2087 				     "Enter <ruleset> <address>\n");
2088 		}
2089 		macdefine(&(MainEnvelope.e_macro), A_PERM,
2090 			  macid("{addr_type}"), "e r");
2091 		for (;;)
2092 		{
2093 			SM_TRY
2094 			{
2095 				(void) sm_signal(SIGINT, intindebug);
2096 				(void) sm_releasesignal(SIGINT);
2097 				if (Verbose == 2)
2098 					(void) sm_io_fprintf(smioout,
2099 							     SM_TIME_DEFAULT,
2100 							     "> ");
2101 				(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2102 				if (sm_io_fgets(smioin, SM_TIME_DEFAULT, buf,
2103 						sizeof(buf)) == NULL)
2104 					testmodeline("/quit", &MainEnvelope);
2105 				p = strchr(buf, '\n');
2106 				if (p != NULL)
2107 					*p = '\0';
2108 				if (Verbose < 2)
2109 					(void) sm_io_fprintf(smioout,
2110 							     SM_TIME_DEFAULT,
2111 							     "> %s\n", buf);
2112 				testmodeline(buf, &MainEnvelope);
2113 			}
2114 			SM_EXCEPT(exc, "[!F]*")
2115 			{
2116 				/*
2117 				**  8.10 just prints \n on interrupt.
2118 				**  I'm printing the exception here in case
2119 				**  sendmail is extended to raise additional
2120 				**  exceptions in this context.
2121 				*/
2122 
2123 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2124 						     "\n");
2125 				sm_exc_print(exc, smioout);
2126 			}
2127 			SM_END_TRY
2128 		}
2129 	}
2130 
2131 #if STARTTLS
2132 	tls_ok = true;
2133 	if (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER ||
2134 	    OpMode == MD_ARPAFTP)
2135 	{
2136 		/* check whether STARTTLS is turned off for the client */
2137 		if (chkclientmodifiers(D_NOTLS))
2138 			tls_ok = false;
2139 	}
2140 	else if (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON ||
2141 		 OpMode == MD_SMTP)
2142 	{
2143 		/* check whether STARTTLS is turned off */
2144 		if (chkdaemonmodifiers(D_NOTLS) && chkclientmodifiers(D_NOTLS))
2145 			tls_ok = false;
2146 	}
2147 	else	/* other modes don't need STARTTLS */
2148 		tls_ok = false;
2149 
2150 	if (tls_ok)
2151 	{
2152 		/* basic TLS initialization */
2153 		tls_ok = init_tls_library();
2154 	}
2155 
2156 	if (!tls_ok && (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER))
2157 	{
2158 		/* disable TLS for client */
2159 		setclttls(false);
2160 	}
2161 #endif /* STARTTLS */
2162 
2163 	/*
2164 	**  If collecting stuff from the queue, go start doing that.
2165 	*/
2166 
2167 	if (OpMode == MD_QUEUERUN && QueueIntvl == 0)
2168 	{
2169 		pid_t pid = -1;
2170 
2171 #if STARTTLS
2172 		/* init TLS for client, ignore result for now */
2173 		(void) initclttls(tls_ok);
2174 #endif /* STARTTLS */
2175 
2176 		/*
2177 		**  The parent process of the caller of runqueue() needs
2178 		**  to stay around for a possible SIGTERM. The SIGTERM will
2179 		**  tell this process that all of the queue runners children
2180 		**  need to be sent SIGTERM as well. At the same time, we
2181 		**  want to return control to the command line. So we do an
2182 		**  extra fork().
2183 		*/
2184 
2185 		if (Verbose || foregroundqueue || (pid = fork()) <= 0)
2186 		{
2187 			/*
2188 			**  If the fork() failed we should still try to do
2189 			**  the queue run. If it succeeded then the child
2190 			**  is going to start the run and wait for all
2191 			**  of the children to finish.
2192 			*/
2193 
2194 			if (pid == 0)
2195 			{
2196 				/* Reset global flags */
2197 				RestartRequest = NULL;
2198 				ShutdownRequest = NULL;
2199 				PendingSignal = 0;
2200 
2201 				/* disconnect from terminal */
2202 				disconnect(2, CurEnv);
2203 			}
2204 
2205 			CurrentPid = getpid();
2206 			if (qgrp != NOQGRP)
2207 			{
2208 				int rwgflags = RWG_NONE;
2209 
2210 				/*
2211 				**  To run a specific queue group mark it to
2212 				**  be run, select the work group it's in and
2213 				**  increment the work counter.
2214 				*/
2215 
2216 				for (i = 0; i < NumQueue && Queue[i] != NULL;
2217 				     i++)
2218 					Queue[i]->qg_nextrun = (time_t) -1;
2219 				Queue[qgrp]->qg_nextrun = 0;
2220 				if (Verbose)
2221 					rwgflags |= RWG_VERBOSE;
2222 				if (queuepersistent)
2223 					rwgflags |= RWG_PERSISTENT;
2224 				rwgflags |= RWG_FORCE;
2225 				(void) run_work_group(Queue[qgrp]->qg_wgrp,
2226 						      rwgflags);
2227 			}
2228 			else
2229 				(void) runqueue(false, Verbose,
2230 						queuepersistent, true);
2231 
2232 			/* set the title to make it easier to find */
2233 			sm_setproctitle(true, CurEnv, "Queue control");
2234 			(void) sm_signal(SIGCHLD, SIG_DFL);
2235 			while (CurChildren > 0)
2236 			{
2237 				int status;
2238 				pid_t ret;
2239 
2240 				errno = 0;
2241 				while ((ret = sm_wait(&status)) <= 0)
2242 				{
2243 					if (errno == ECHILD)
2244 					{
2245 						/*
2246 						**  Oops... something got messed
2247 						**  up really bad. Waiting for
2248 						**  non-existent children
2249 						**  shouldn't happen. Let's get
2250 						**  out of here.
2251 						*/
2252 
2253 						CurChildren = 0;
2254 						break;
2255 					}
2256 					continue;
2257 				}
2258 
2259 				/* something is really really wrong */
2260 				if (errno == ECHILD)
2261 				{
2262 					sm_syslog(LOG_ERR, NOQID,
2263 						  "queue control process: lost all children: wait returned ECHILD");
2264 					break;
2265 				}
2266 
2267 				/* Only drop when a child gives status */
2268 				if (WIFSTOPPED(status))
2269 					continue;
2270 
2271 				proc_list_drop(ret, status, NULL);
2272 			}
2273 		}
2274 		finis(true, true, ExitStat);
2275 		/* NOTREACHED */
2276 	}
2277 
2278 # if SASL
2279 	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2280 	{
2281 		/* check whether AUTH is turned off for the server */
2282 		if (!chkdaemonmodifiers(D_NOAUTH) &&
2283 		    (i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK)
2284 			syserr("!sasl_server_init failed! [%s]",
2285 				sasl_errstring(i, NULL, NULL));
2286 	}
2287 # endif /* SASL */
2288 
2289 	if (OpMode == MD_SMTP)
2290 	{
2291 		proc_list_add(CurrentPid, "Sendmail SMTP Agent",
2292 			      PROC_DAEMON, 0, -1, NULL);
2293 
2294 		/* clean up background delivery children */
2295 		(void) sm_signal(SIGCHLD, reapchild);
2296 	}
2297 
2298 	/*
2299 	**  If a daemon, wait for a request.
2300 	**	getrequests will always return in a child.
2301 	**	If we should also be processing the queue, start
2302 	**		doing it in background.
2303 	**	We check for any errors that might have happened
2304 	**		during startup.
2305 	*/
2306 
2307 	if (OpMode == MD_DAEMON || QueueIntvl > 0)
2308 	{
2309 		char dtype[200];
2310 
2311 		/* avoid cleanup in finis(), DaemonPid will be set below */
2312 		DaemonPid = 0;
2313 		if (!run_in_foreground && !tTd(99, 100))
2314 		{
2315 			/* put us in background */
2316 			i = fork();
2317 			if (i < 0)
2318 				syserr("daemon: cannot fork");
2319 			if (i != 0)
2320 			{
2321 				finis(false, true, EX_OK);
2322 				/* NOTREACHED */
2323 			}
2324 
2325 			/*
2326 			**  Initialize exception stack and default exception
2327 			**  handler for child process.
2328 			*/
2329 
2330 			/* Reset global flags */
2331 			RestartRequest = NULL;
2332 			RestartWorkGroup = false;
2333 			ShutdownRequest = NULL;
2334 			PendingSignal = 0;
2335 			CurrentPid = getpid();
2336 
2337 			sm_exc_newthread(fatal_error);
2338 
2339 			/* disconnect from our controlling tty */
2340 			disconnect(2, &MainEnvelope);
2341 		}
2342 
2343 		dtype[0] = '\0';
2344 		if (OpMode == MD_DAEMON)
2345 		{
2346 			(void) sm_strlcat(dtype, "+SMTP", sizeof(dtype));
2347 			DaemonPid = CurrentPid;
2348 		}
2349 		if (QueueIntvl > 0)
2350 		{
2351 			(void) sm_strlcat2(dtype,
2352 					   queuepersistent
2353 					   ? "+persistent-queueing@"
2354 					   : "+queueing@",
2355 					   pintvl(QueueIntvl, true),
2356 					   sizeof(dtype));
2357 		}
2358 		if (tTd(0, 1))
2359 			(void) sm_strlcat(dtype, "+debugging", sizeof(dtype));
2360 
2361 		sm_syslog(LOG_INFO, NOQID,
2362 			  "starting daemon (%s): %s", Version, dtype + 1);
2363 #if XLA
2364 		xla_create_file();
2365 #endif /* XLA */
2366 
2367 		/* save daemon type in a macro for possible PidFile use */
2368 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2369 			macid("{daemon_info}"), dtype + 1);
2370 
2371 		/* save queue interval in a macro for possible PidFile use */
2372 		macdefine(&MainEnvelope.e_macro, A_TEMP,
2373 			macid("{queue_interval}"), pintvl(QueueIntvl, true));
2374 
2375 		/* workaround: can't seem to release the signal in the parent */
2376 		(void) sm_signal(SIGHUP, sighup);
2377 		(void) sm_releasesignal(SIGHUP);
2378 		(void) sm_signal(SIGTERM, sigterm);
2379 
2380 		if (QueueIntvl > 0)
2381 		{
2382 #if _FFR_RUNPQG
2383 			if (qgrp != NOQGRP)
2384 			{
2385 				int rwgflags = RWG_NONE;
2386 
2387 				/*
2388 				**  To run a specific queue group mark it to
2389 				**  be run, select the work group it's in and
2390 				**  increment the work counter.
2391 				*/
2392 
2393 				for (i = 0; i < NumQueue && Queue[i] != NULL;
2394 				     i++)
2395 					Queue[i]->qg_nextrun = (time_t) -1;
2396 				Queue[qgrp]->qg_nextrun = 0;
2397 				if (Verbose)
2398 					rwgflags |= RWG_VERBOSE;
2399 				if (queuepersistent)
2400 					rwgflags |= RWG_PERSISTENT;
2401 				rwgflags |= RWG_FORCE;
2402 				(void) run_work_group(Queue[qgrp]->qg_wgrp,
2403 						      rwgflags);
2404 			}
2405 			else
2406 #endif /* _FFR_RUNPQG */
2407 				(void) runqueue(true, false, queuepersistent,
2408 						true);
2409 
2410 			/*
2411 			**  If queuepersistent but not in daemon mode then
2412 			**  we're going to do the queue runner monitoring here.
2413 			**  If in daemon mode then the monitoring will happen
2414 			**  elsewhere.
2415 			*/
2416 
2417 			if (OpMode != MD_DAEMON && queuepersistent)
2418 			{
2419 				/*
2420 				**  Write the pid to file
2421 				**  XXX Overwrites sendmail.pid
2422 				*/
2423 
2424 				log_sendmail_pid(&MainEnvelope);
2425 
2426 				/* set the title to make it easier to find */
2427 				sm_setproctitle(true, CurEnv, "Queue control");
2428 				(void) sm_signal(SIGCHLD, SIG_DFL);
2429 				while (CurChildren > 0)
2430 				{
2431 					int status;
2432 					pid_t ret;
2433 					int group;
2434 
2435 					CHECK_RESTART;
2436 					errno = 0;
2437 					while ((ret = sm_wait(&status)) <= 0)
2438 					{
2439 						/*
2440 						**  Waiting for non-existent
2441 						**  children shouldn't happen.
2442 						**  Let's get out of here if
2443 						**  it occurs.
2444 						*/
2445 
2446 						if (errno == ECHILD)
2447 						{
2448 							CurChildren = 0;
2449 							break;
2450 						}
2451 						continue;
2452 					}
2453 
2454 					/* something is really really wrong */
2455 					if (errno == ECHILD)
2456 					{
2457 						sm_syslog(LOG_ERR, NOQID,
2458 							  "persistent queue runner control process: lost all children: wait returned ECHILD");
2459 						break;
2460 					}
2461 
2462 					if (WIFSTOPPED(status))
2463 						continue;
2464 
2465 					/* Probe only on a child status */
2466 					proc_list_drop(ret, status, &group);
2467 
2468 					if (WIFSIGNALED(status))
2469 					{
2470 						if (WCOREDUMP(status))
2471 						{
2472 							sm_syslog(LOG_ERR, NOQID,
2473 								  "persistent queue runner=%d core dumped, signal=%d",
2474 								  group, WTERMSIG(status));
2475 
2476 							/* don't restart this */
2477 							mark_work_group_restart(
2478 								group, -1);
2479 							continue;
2480 						}
2481 
2482 						sm_syslog(LOG_ERR, NOQID,
2483 							  "persistent queue runner=%d died, pid=%ld, signal=%d",
2484 							  group, (long) ret,
2485 							  WTERMSIG(status));
2486 					}
2487 
2488 					/*
2489 					**  When debugging active, don't
2490 					**  restart the persistent queues.
2491 					**  But do log this as info.
2492 					*/
2493 
2494 					if (sm_debug_active(&DebugNoPRestart,
2495 							    1))
2496 					{
2497 						sm_syslog(LOG_DEBUG, NOQID,
2498 							  "persistent queue runner=%d, exited",
2499 							  group);
2500 						mark_work_group_restart(group,
2501 									-1);
2502 					}
2503 					CHECK_RESTART;
2504 				}
2505 				finis(true, true, ExitStat);
2506 				/* NOTREACHED */
2507 			}
2508 
2509 			if (OpMode != MD_DAEMON)
2510 			{
2511 				char qtype[200];
2512 
2513 				/*
2514 				**  Write the pid to file
2515 				**  XXX Overwrites sendmail.pid
2516 				*/
2517 
2518 				log_sendmail_pid(&MainEnvelope);
2519 
2520 				/* set the title to make it easier to find */
2521 				qtype[0] = '\0';
2522 				(void) sm_strlcpyn(qtype, sizeof(qtype), 4,
2523 						   "Queue runner@",
2524 						   pintvl(QueueIntvl, true),
2525 						   " for ",
2526 						   QueueDir);
2527 				sm_setproctitle(true, CurEnv, qtype);
2528 				for (;;)
2529 				{
2530 					(void) pause();
2531 
2532 					CHECK_RESTART;
2533 
2534 					if (doqueuerun())
2535 						(void) runqueue(true, false,
2536 								false, false);
2537 				}
2538 			}
2539 		}
2540 		(void) dropenvelope(&MainEnvelope, true, false);
2541 
2542 #if STARTTLS
2543 		/* init TLS for server, ignore result for now */
2544 		(void) initsrvtls(tls_ok);
2545 #endif /* STARTTLS */
2546 
2547 	nextreq:
2548 		p_flags = getrequests(&MainEnvelope);
2549 
2550 		/* drop privileges */
2551 		(void) drop_privileges(false);
2552 
2553 		/*
2554 		**  Get authentication data
2555 		**  Set _ macro in BlankEnvelope before calling newenvelope().
2556 		*/
2557 
2558 		authinfo = getauthinfo(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
2559 						     NULL), &forged);
2560 		macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
2561 
2562 		/* at this point we are in a child: reset state */
2563 		sm_rpool_free(MainEnvelope.e_rpool);
2564 		(void) newenvelope(&MainEnvelope, &MainEnvelope,
2565 				   sm_rpool_new_x(NULL));
2566 	}
2567 
2568 	if (LogLevel > 9)
2569 	{
2570 		/* log connection information */
2571 		sm_syslog(LOG_INFO, NULL, "connect from %s", authinfo);
2572 	}
2573 
2574 	/*
2575 	**  If running SMTP protocol, start collecting and executing
2576 	**  commands.  This will never return.
2577 	*/
2578 
2579 	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2580 	{
2581 		char pbuf[20];
2582 
2583 		/*
2584 		**  Save some macros for check_* rulesets.
2585 		*/
2586 
2587 		if (forged)
2588 		{
2589 			char ipbuf[103];
2590 
2591 			(void) sm_snprintf(ipbuf, sizeof(ipbuf), "[%.100s]",
2592 					   anynet_ntoa(&RealHostAddr));
2593 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
2594 				  macid("{client_name}"), ipbuf);
2595 		}
2596 		else
2597 			macdefine(&BlankEnvelope.e_macro, A_PERM,
2598 				  macid("{client_name}"), RealHostName);
2599 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2600 			  macid("{client_ptr}"), RealHostName);
2601 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2602 			  macid("{client_addr}"), anynet_ntoa(&RealHostAddr));
2603 		sm_getla();
2604 
2605 		switch (RealHostAddr.sa.sa_family)
2606 		{
2607 #if NETINET
2608 		  case AF_INET:
2609 			(void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2610 					   RealHostAddr.sin.sin_port);
2611 			break;
2612 #endif /* NETINET */
2613 #if NETINET6
2614 		  case AF_INET6:
2615 			(void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2616 					   RealHostAddr.sin6.sin6_port);
2617 			break;
2618 #endif /* NETINET6 */
2619 		  default:
2620 			(void) sm_snprintf(pbuf, sizeof(pbuf), "0");
2621 			break;
2622 		}
2623 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2624 			macid("{client_port}"), pbuf);
2625 
2626 		if (OpMode == MD_DAEMON)
2627 		{
2628 			ENVELOPE *saved_env;
2629 
2630 			/* validate the connection */
2631 			HoldErrs = true;
2632 			saved_env = CurEnv;
2633 			CurEnv = &BlankEnvelope;
2634 			nullserver = validate_connection(&RealHostAddr,
2635 						macvalue(macid("{client_name}"),
2636 							&BlankEnvelope),
2637 						&BlankEnvelope);
2638 			if (bitset(EF_DISCARD, BlankEnvelope.e_flags))
2639 				MainEnvelope.e_flags |= EF_DISCARD;
2640 			CurEnv = saved_env;
2641 			HoldErrs = false;
2642 		}
2643 		else if (p_flags == NULL)
2644 		{
2645 			p_flags = (BITMAP256 *) xalloc(sizeof(*p_flags));
2646 			clrbitmap(p_flags);
2647 		}
2648 #if STARTTLS
2649 		if (OpMode == MD_SMTP)
2650 			(void) initsrvtls(tls_ok);
2651 #endif /* STARTTLS */
2652 
2653 		/* turn off profiling */
2654 		SM_PROF(1);
2655 		smtp(nullserver, *p_flags, &MainEnvelope);
2656 
2657 		if (tTd(93, 100))
2658 		{
2659 			/* turn off profiling */
2660 			SM_PROF(0);
2661 			if (OpMode == MD_DAEMON)
2662 				goto nextreq;
2663 		}
2664 	}
2665 
2666 	sm_rpool_free(MainEnvelope.e_rpool);
2667 	clearenvelope(&MainEnvelope, false, sm_rpool_new_x(NULL));
2668 	if (OpMode == MD_VERIFY)
2669 	{
2670 		set_delivery_mode(SM_VERIFY, &MainEnvelope);
2671 		PostMasterCopy = NULL;
2672 	}
2673 	else
2674 	{
2675 		/* interactive -- all errors are global */
2676 		MainEnvelope.e_flags |= EF_GLOBALERRS|EF_LOGSENDER;
2677 	}
2678 
2679 	/*
2680 	**  Do basic system initialization and set the sender
2681 	*/
2682 
2683 	initsys(&MainEnvelope);
2684 	macdefine(&MainEnvelope.e_macro, A_PERM, macid("{ntries}"), "0");
2685 	macdefine(&MainEnvelope.e_macro, A_PERM, macid("{nrcpts}"), "0");
2686 	setsender(from, &MainEnvelope, NULL, '\0', false);
2687 	if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') &&
2688 	    (!bitnset(M_LOCALMAILER, MainEnvelope.e_from.q_mailer->m_flags) ||
2689 	     strcmp(MainEnvelope.e_from.q_user, RealUserName) != 0))
2690 	{
2691 		auth_warning(&MainEnvelope, "%s set sender to %s using -%c",
2692 			     RealUserName, from, warn_f_flag);
2693 #if SASL
2694 		auth = false;
2695 #endif /* SASL */
2696 	}
2697 	if (auth)
2698 	{
2699 		char *fv;
2700 
2701 		/* set the initial sender for AUTH= to $f@$j */
2702 		fv = macvalue('f', &MainEnvelope);
2703 		if (fv == NULL || *fv == '\0')
2704 			MainEnvelope.e_auth_param = NULL;
2705 		else
2706 		{
2707 			if (strchr(fv, '@') == NULL)
2708 			{
2709 				i = strlen(fv) + strlen(macvalue('j',
2710 							&MainEnvelope)) + 2;
2711 				p = sm_malloc_x(i);
2712 				(void) sm_strlcpyn(p, i, 3, fv, "@",
2713 						   macvalue('j',
2714 							    &MainEnvelope));
2715 			}
2716 			else
2717 				p = sm_strdup_x(fv);
2718 			MainEnvelope.e_auth_param = sm_rpool_strdup_x(MainEnvelope.e_rpool,
2719 								      xtextify(p, "="));
2720 			sm_free(p);  /* XXX */
2721 		}
2722 	}
2723 	if (macvalue('s', &MainEnvelope) == NULL)
2724 		macdefine(&MainEnvelope.e_macro, A_PERM, 's', RealHostName);
2725 
2726 	av = argv + optind;
2727 	if (*av == NULL && !GrabTo)
2728 	{
2729 		MainEnvelope.e_to = NULL;
2730 		MainEnvelope.e_flags |= EF_GLOBALERRS;
2731 		HoldErrs = false;
2732 		SuperSafe = SAFE_NO;
2733 		usrerr("Recipient names must be specified");
2734 
2735 		/* collect body for UUCP return */
2736 		if (OpMode != MD_VERIFY)
2737 			collect(InChannel, false, NULL, &MainEnvelope, true);
2738 		finis(true, true, EX_USAGE);
2739 		/* NOTREACHED */
2740 	}
2741 
2742 	/*
2743 	**  Scan argv and deliver the message to everyone.
2744 	*/
2745 
2746 	save_val = LogUsrErrs;
2747 	LogUsrErrs = true;
2748 	sendtoargv(av, &MainEnvelope);
2749 	LogUsrErrs = save_val;
2750 
2751 	/* if we have had errors sofar, arrange a meaningful exit stat */
2752 	if (Errors > 0 && ExitStat == EX_OK)
2753 		ExitStat = EX_USAGE;
2754 
2755 #if _FFR_FIX_DASHT
2756 	/*
2757 	**  If using -t, force not sending to argv recipients, even
2758 	**  if they are mentioned in the headers.
2759 	*/
2760 
2761 	if (GrabTo)
2762 	{
2763 		ADDRESS *q;
2764 
2765 		for (q = MainEnvelope.e_sendqueue; q != NULL; q = q->q_next)
2766 			q->q_state = QS_REMOVED;
2767 	}
2768 #endif /* _FFR_FIX_DASHT */
2769 
2770 	/*
2771 	**  Read the input mail.
2772 	*/
2773 
2774 	MainEnvelope.e_to = NULL;
2775 	if (OpMode != MD_VERIFY || GrabTo)
2776 	{
2777 		int savederrors;
2778 		unsigned long savedflags;
2779 
2780 		/*
2781 		**  workaround for compiler warning on Irix:
2782 		**  do not initialize variable in the definition, but
2783 		**  later on:
2784 		**  warning(1548): transfer of control bypasses
2785 		**  initialization of:
2786 		**  variable "savederrors" (declared at line 2570)
2787 		**  variable "savedflags" (declared at line 2571)
2788 		**  goto giveup;
2789 		*/
2790 
2791 		savederrors = Errors;
2792 		savedflags = MainEnvelope.e_flags & EF_FATALERRS;
2793 		MainEnvelope.e_flags |= EF_GLOBALERRS;
2794 		MainEnvelope.e_flags &= ~EF_FATALERRS;
2795 		Errors = 0;
2796 		buffer_errors();
2797 		collect(InChannel, false, NULL, &MainEnvelope, true);
2798 
2799 		/* header checks failed */
2800 		if (Errors > 0)
2801 		{
2802   giveup:
2803 			if (!GrabTo)
2804 			{
2805 				/* Log who the mail would have gone to */
2806 				logundelrcpts(&MainEnvelope,
2807 					      MainEnvelope.e_message,
2808 					      8, false);
2809 			}
2810 			flush_errors(true);
2811 			finis(true, true, ExitStat);
2812 			/* NOTREACHED */
2813 			return -1;
2814 		}
2815 
2816 		/* bail out if message too large */
2817 		if (bitset(EF_CLRQUEUE, MainEnvelope.e_flags))
2818 		{
2819 			finis(true, true, ExitStat != EX_OK ? ExitStat
2820 							    : EX_DATAERR);
2821 			/* NOTREACHED */
2822 			return -1;
2823 		}
2824 
2825 		/* set message size */
2826 		(void) sm_snprintf(buf, sizeof(buf), "%ld",
2827 				   MainEnvelope.e_msgsize);
2828 		macdefine(&MainEnvelope.e_macro, A_TEMP,
2829 			  macid("{msg_size}"), buf);
2830 
2831 		Errors = savederrors;
2832 		MainEnvelope.e_flags |= savedflags;
2833 	}
2834 	errno = 0;
2835 
2836 	if (tTd(1, 1))
2837 		sm_dprintf("From person = \"%s\"\n",
2838 			   MainEnvelope.e_from.q_paddr);
2839 
2840 	/* Check if quarantining stats should be updated */
2841 	if (MainEnvelope.e_quarmsg != NULL)
2842 		markstats(&MainEnvelope, NULL, STATS_QUARANTINE);
2843 
2844 	/*
2845 	**  Actually send everything.
2846 	**	If verifying, just ack.
2847 	*/
2848 
2849 	if (Errors == 0)
2850 	{
2851 		if (!split_by_recipient(&MainEnvelope) &&
2852 		    bitset(EF_FATALERRS, MainEnvelope.e_flags))
2853 			goto giveup;
2854 	}
2855 
2856 	/* make sure we deliver at least the first envelope */
2857 	i = FastSplit > 0 ? 0 : -1;
2858 	for (e = &MainEnvelope; e != NULL; e = e->e_sibling, i++)
2859 	{
2860 		ENVELOPE *next;
2861 
2862 		e->e_from.q_state = QS_SENDER;
2863 		if (tTd(1, 5))
2864 		{
2865 			sm_dprintf("main[%d]: QS_SENDER ", i);
2866 			printaddr(sm_debug_file(), &e->e_from, false);
2867 		}
2868 		e->e_to = NULL;
2869 		sm_getla();
2870 		GrabTo = false;
2871 #if NAMED_BIND
2872 		_res.retry = TimeOuts.res_retry[RES_TO_FIRST];
2873 		_res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
2874 #endif /* NAMED_BIND */
2875 		next = e->e_sibling;
2876 		e->e_sibling = NULL;
2877 
2878 		/* after FastSplit envelopes: queue up */
2879 		sendall(e, i >= FastSplit ? SM_QUEUE : SM_DEFAULT);
2880 		e->e_sibling = next;
2881 	}
2882 
2883 	/*
2884 	**  All done.
2885 	**	Don't send return error message if in VERIFY mode.
2886 	*/
2887 
2888 	finis(true, true, ExitStat);
2889 	/* NOTREACHED */
2890 	return ExitStat;
2891 }
2892 /*
2893 **  STOP_SENDMAIL -- Stop the running program
2894 **
2895 **	Parameters:
2896 **		none.
2897 **
2898 **	Returns:
2899 **		none.
2900 **
2901 **	Side Effects:
2902 **		exits.
2903 */
2904 
2905 void
2906 stop_sendmail()
2907 {
2908 	/* reset uid for process accounting */
2909 	endpwent();
2910 	(void) setuid(RealUid);
2911 	exit(EX_OK);
2912 }
2913 /*
2914 **  FINIS -- Clean up and exit.
2915 **
2916 **	Parameters:
2917 **		drop -- whether or not to drop CurEnv envelope
2918 **		cleanup -- call exit() or _exit()?
2919 **		exitstat -- exit status to use for exit() call
2920 **
2921 **	Returns:
2922 **		never
2923 **
2924 **	Side Effects:
2925 **		exits sendmail
2926 */
2927 
2928 void
2929 finis(drop, cleanup, exitstat)
2930 	bool drop;
2931 	bool cleanup;
2932 	volatile int exitstat;
2933 {
2934 	char pidpath[MAXPATHLEN];
2935 	pid_t pid;
2936 
2937 	/* Still want to process new timeouts added below */
2938 	sm_clear_events();
2939 	(void) sm_releasesignal(SIGALRM);
2940 
2941 	if (tTd(2, 1))
2942 	{
2943 		sm_dprintf("\n====finis: stat %d e_id=%s e_flags=",
2944 			   exitstat,
2945 			   CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id);
2946 		printenvflags(CurEnv);
2947 	}
2948 	if (tTd(2, 9))
2949 		printopenfds(false);
2950 
2951 	SM_TRY
2952 		/*
2953 		**  Clean up.  This might raise E:mta.quickabort
2954 		*/
2955 
2956 		/* clean up temp files */
2957 		CurEnv->e_to = NULL;
2958 		if (drop)
2959 		{
2960 			if (CurEnv->e_id != NULL)
2961 			{
2962 				int r;
2963 
2964 				r = dropenvelope(CurEnv, true, false);
2965 				if (exitstat == EX_OK)
2966 					exitstat = r;
2967 				sm_rpool_free(CurEnv->e_rpool);
2968 				CurEnv->e_rpool = NULL;
2969 
2970 				/* these may have pointed to the rpool */
2971 				CurEnv->e_to = NULL;
2972 				CurEnv->e_message = NULL;
2973 				CurEnv->e_statmsg = NULL;
2974 				CurEnv->e_quarmsg = NULL;
2975 				CurEnv->e_bodytype = NULL;
2976 				CurEnv->e_id = NULL;
2977 				CurEnv->e_envid = NULL;
2978 				CurEnv->e_auth_param = NULL;
2979 			}
2980 			else
2981 				poststats(StatFile);
2982 		}
2983 
2984 		/* flush any cached connections */
2985 		mci_flush(true, NULL);
2986 
2987 		/* close maps belonging to this pid */
2988 		closemaps(false);
2989 
2990 #if USERDB
2991 		/* close UserDatabase */
2992 		_udbx_close();
2993 #endif /* USERDB */
2994 
2995 #if SASL
2996 		stop_sasl_client();
2997 #endif /* SASL */
2998 
2999 #if XLA
3000 		/* clean up extended load average stuff */
3001 		xla_all_end();
3002 #endif /* XLA */
3003 
3004 	SM_FINALLY
3005 		/*
3006 		**  And exit.
3007 		*/
3008 
3009 		if (LogLevel > 78)
3010 			sm_syslog(LOG_DEBUG, CurEnv->e_id, "finis, pid=%d",
3011 				  (int) CurrentPid);
3012 		if (exitstat == EX_TEMPFAIL ||
3013 		    CurEnv->e_errormode == EM_BERKNET)
3014 			exitstat = EX_OK;
3015 
3016 		/* XXX clean up queues and related data structures */
3017 		cleanup_queues();
3018 		pid = getpid();
3019 #if SM_CONF_SHM
3020 		cleanup_shm(DaemonPid == pid);
3021 #endif /* SM_CONF_SHM */
3022 
3023 		/* close locked pid file */
3024 		close_sendmail_pid();
3025 
3026 		if (DaemonPid == pid || PidFilePid == pid)
3027 		{
3028 			/* blow away the pid file */
3029 			expand(PidFile, pidpath, sizeof(pidpath), CurEnv);
3030 			(void) unlink(pidpath);
3031 		}
3032 
3033 		/* reset uid for process accounting */
3034 		endpwent();
3035 		sm_mbdb_terminate();
3036 #if _FFR_MEMSTAT
3037 		(void) sm_memstat_close();
3038 #endif /* _FFR_MEMSTAT */
3039 		(void) setuid(RealUid);
3040 #if SM_HEAP_CHECK
3041 		/* dump the heap, if we are checking for memory leaks */
3042 		if (sm_debug_active(&SmHeapCheck, 2))
3043 			sm_heap_report(smioout,
3044 				       sm_debug_level(&SmHeapCheck) - 1);
3045 #endif /* SM_HEAP_CHECK */
3046 		if (sm_debug_active(&SmXtrapReport, 1))
3047 			sm_dprintf("xtrap count = %d\n", SmXtrapCount);
3048 		if (cleanup)
3049 			exit(exitstat);
3050 		else
3051 			_exit(exitstat);
3052 	SM_END_TRY
3053 }
3054 /*
3055 **  INTINDEBUG -- signal handler for SIGINT in -bt mode
3056 **
3057 **	Parameters:
3058 **		sig -- incoming signal.
3059 **
3060 **	Returns:
3061 **		none.
3062 **
3063 **	Side Effects:
3064 **		longjmps back to test mode loop.
3065 **
3066 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3067 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3068 **		DOING.
3069 */
3070 
3071 /* Type of an exception generated on SIGINT during address test mode.  */
3072 static const SM_EXC_TYPE_T EtypeInterrupt =
3073 {
3074 	SmExcTypeMagic,
3075 	"S:mta.interrupt",
3076 	"",
3077 	sm_etype_printf,
3078 	"interrupt",
3079 };
3080 
3081 /* ARGSUSED */
3082 static SIGFUNC_DECL
3083 intindebug(sig)
3084 	int sig;
3085 {
3086 	int save_errno = errno;
3087 
3088 	FIX_SYSV_SIGNAL(sig, intindebug);
3089 	errno = save_errno;
3090 	CHECK_CRITICAL(sig);
3091 	errno = save_errno;
3092 	sm_exc_raisenew_x(&EtypeInterrupt);
3093 	errno = save_errno;
3094 	return SIGFUNC_RETURN;
3095 }
3096 /*
3097 **  SIGTERM -- SIGTERM handler for the daemon
3098 **
3099 **	Parameters:
3100 **		sig -- signal number.
3101 **
3102 **	Returns:
3103 **		none.
3104 **
3105 **	Side Effects:
3106 **		Sets ShutdownRequest which will hopefully trigger
3107 **		the daemon to exit.
3108 **
3109 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3110 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3111 **		DOING.
3112 */
3113 
3114 /* ARGSUSED */
3115 static SIGFUNC_DECL
3116 sigterm(sig)
3117 	int sig;
3118 {
3119 	int save_errno = errno;
3120 
3121 	FIX_SYSV_SIGNAL(sig, sigterm);
3122 	ShutdownRequest = "signal";
3123 	errno = save_errno;
3124 	return SIGFUNC_RETURN;
3125 }
3126 /*
3127 **  SIGHUP -- handle a SIGHUP signal
3128 **
3129 **	Parameters:
3130 **		sig -- incoming signal.
3131 **
3132 **	Returns:
3133 **		none.
3134 **
3135 **	Side Effects:
3136 **		Sets RestartRequest which should cause the daemon
3137 **		to restart.
3138 **
3139 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3140 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3141 **		DOING.
3142 */
3143 
3144 /* ARGSUSED */
3145 static SIGFUNC_DECL
3146 sighup(sig)
3147 	int sig;
3148 {
3149 	int save_errno = errno;
3150 
3151 	FIX_SYSV_SIGNAL(sig, sighup);
3152 	RestartRequest = "signal";
3153 	errno = save_errno;
3154 	return SIGFUNC_RETURN;
3155 }
3156 /*
3157 **  SIGPIPE -- signal handler for SIGPIPE
3158 **
3159 **	Parameters:
3160 **		sig -- incoming signal.
3161 **
3162 **	Returns:
3163 **		none.
3164 **
3165 **	Side Effects:
3166 **		Sets StopRequest which should cause the mailq/hoststatus
3167 **		display to stop.
3168 **
3169 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3170 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3171 **		DOING.
3172 */
3173 
3174 /* ARGSUSED */
3175 static SIGFUNC_DECL
3176 sigpipe(sig)
3177 	int sig;
3178 {
3179 	int save_errno = errno;
3180 
3181 	FIX_SYSV_SIGNAL(sig, sigpipe);
3182 	StopRequest = true;
3183 	errno = save_errno;
3184 	return SIGFUNC_RETURN;
3185 }
3186 /*
3187 **  INTSIG -- clean up on interrupt
3188 **
3189 **	This just arranges to exit.  It pessimizes in that it
3190 **	may resend a message.
3191 **
3192 **	Parameters:
3193 **		none.
3194 **
3195 **	Returns:
3196 **		none.
3197 **
3198 **	Side Effects:
3199 **		Unlocks the current job.
3200 **
3201 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3202 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3203 **		DOING.
3204 **
3205 **		XXX: More work is needed for this signal handler.
3206 */
3207 
3208 /* ARGSUSED */
3209 SIGFUNC_DECL
3210 intsig(sig)
3211 	int sig;
3212 {
3213 	bool drop = false;
3214 	int save_errno = errno;
3215 
3216 	FIX_SYSV_SIGNAL(sig, intsig);
3217 	errno = save_errno;
3218 	CHECK_CRITICAL(sig);
3219 	sm_allsignals(true);
3220 
3221 	if (sig != 0 && LogLevel > 79)
3222 		sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt");
3223 	FileName = NULL;
3224 
3225 	/* Clean-up on aborted stdin message submission */
3226 	if (CurEnv->e_id != NULL &&
3227 	    (OpMode == MD_SMTP ||
3228 	     OpMode == MD_DELIVER ||
3229 	     OpMode == MD_ARPAFTP))
3230 	{
3231 		register ADDRESS *q;
3232 
3233 		/* don't return an error indication */
3234 		CurEnv->e_to = NULL;
3235 		CurEnv->e_flags &= ~EF_FATALERRS;
3236 		CurEnv->e_flags |= EF_CLRQUEUE;
3237 
3238 		/*
3239 		**  Spin through the addresses and
3240 		**  mark them dead to prevent bounces
3241 		*/
3242 
3243 		for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next)
3244 			q->q_state = QS_DONTSEND;
3245 
3246 		drop = true;
3247 	}
3248 	else if (OpMode != MD_TEST)
3249 	{
3250 		unlockqueue(CurEnv);
3251 	}
3252 
3253 	finis(drop, false, EX_OK);
3254 	/* NOTREACHED */
3255 }
3256 /*
3257 **  DISCONNECT -- remove our connection with any foreground process
3258 **
3259 **	Parameters:
3260 **		droplev -- how "deeply" we should drop the line.
3261 **			0 -- ignore signals, mail back errors, make sure
3262 **			     output goes to stdout.
3263 **			1 -- also, make stdout go to /dev/null.
3264 **			2 -- also, disconnect from controlling terminal
3265 **			     (only for daemon mode).
3266 **		e -- the current envelope.
3267 **
3268 **	Returns:
3269 **		none
3270 **
3271 **	Side Effects:
3272 **		Trys to insure that we are immune to vagaries of
3273 **		the controlling tty.
3274 */
3275 
3276 void
3277 disconnect(droplev, e)
3278 	int droplev;
3279 	register ENVELOPE *e;
3280 {
3281 	int fd;
3282 
3283 	if (tTd(52, 1))
3284 		sm_dprintf("disconnect: In %d Out %d, e=%p\n",
3285 			   sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL),
3286 			   sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL), e);
3287 	if (tTd(52, 100))
3288 	{
3289 		sm_dprintf("don't\n");
3290 		return;
3291 	}
3292 	if (LogLevel > 93)
3293 		sm_syslog(LOG_DEBUG, e->e_id,
3294 			  "disconnect level %d",
3295 			  droplev);
3296 
3297 	/* be sure we don't get nasty signals */
3298 	(void) sm_signal(SIGINT, SIG_IGN);
3299 	(void) sm_signal(SIGQUIT, SIG_IGN);
3300 
3301 	/* we can't communicate with our caller, so.... */
3302 	HoldErrs = true;
3303 	CurEnv->e_errormode = EM_MAIL;
3304 	Verbose = 0;
3305 	DisConnected = true;
3306 
3307 	/* all input from /dev/null */
3308 	if (InChannel != smioin)
3309 	{
3310 		(void) sm_io_close(InChannel, SM_TIME_DEFAULT);
3311 		InChannel = smioin;
3312 	}
3313 	if (sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3314 			 SM_IO_RDONLY, NULL, smioin) == NULL)
3315 		sm_syslog(LOG_ERR, e->e_id,
3316 			  "disconnect: sm_io_reopen(\"%s\") failed: %s",
3317 			  SM_PATH_DEVNULL, sm_errstring(errno));
3318 
3319 	/*
3320 	**  output to the transcript
3321 	**	We also compare the fd numbers here since OutChannel
3322 	**	might be a layer on top of smioout due to encryption
3323 	**	(see sfsasl.c).
3324 	*/
3325 
3326 	if (OutChannel != smioout &&
3327 	    sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL) !=
3328 	    sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL))
3329 	{
3330 		(void) sm_io_close(OutChannel, SM_TIME_DEFAULT);
3331 		OutChannel = smioout;
3332 
3333 #if 0
3334 		/*
3335 		**  Has smioout been closed? Reopen it.
3336 		**	This shouldn't happen anymore, the code is here
3337 		**	just as a reminder.
3338 		*/
3339 
3340 		if (smioout->sm_magic == NULL &&
3341 		    sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3342 				 SM_IO_WRONLY, NULL, smioout) == NULL)
3343 			sm_syslog(LOG_ERR, e->e_id,
3344 				  "disconnect: sm_io_reopen(\"%s\") failed: %s",
3345 				  SM_PATH_DEVNULL, sm_errstring(errno));
3346 #endif /* 0 */
3347 	}
3348 	if (droplev > 0)
3349 	{
3350 		fd = open(SM_PATH_DEVNULL, O_WRONLY, 0666);
3351 		if (fd == -1)
3352 		{
3353 			sm_syslog(LOG_ERR, e->e_id,
3354 				  "disconnect: open(\"%s\") failed: %s",
3355 				  SM_PATH_DEVNULL, sm_errstring(errno));
3356 		}
3357 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
3358 		if (fd >= 0)
3359 		{
3360 			(void) dup2(fd, STDOUT_FILENO);
3361 			(void) dup2(fd, STDERR_FILENO);
3362 			(void) close(fd);
3363 		}
3364 	}
3365 
3366 	/* drop our controlling TTY completely if possible */
3367 	if (droplev > 1)
3368 	{
3369 		(void) setsid();
3370 		errno = 0;
3371 	}
3372 
3373 #if XDEBUG
3374 	checkfd012("disconnect");
3375 #endif /* XDEBUG */
3376 
3377 	if (LogLevel > 71)
3378 		sm_syslog(LOG_DEBUG, e->e_id, "in background, pid=%d",
3379 			  (int) CurrentPid);
3380 
3381 	errno = 0;
3382 }
3383 
3384 static void
3385 obsolete(argv)
3386 	char *argv[];
3387 {
3388 	register char *ap;
3389 	register char *op;
3390 
3391 	while ((ap = *++argv) != NULL)
3392 	{
3393 		/* Return if "--" or not an option of any form. */
3394 		if (ap[0] != '-' || ap[1] == '-')
3395 			return;
3396 
3397 		/* Don't allow users to use "-Q." or "-Q ." */
3398 		if ((ap[1] == 'Q' && ap[2] == '.') ||
3399 		    (ap[1] == 'Q' && argv[1] != NULL &&
3400 		     argv[1][0] == '.' && argv[1][1] == '\0'))
3401 		{
3402 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
3403 					     "Can not use -Q.\n");
3404 			exit(EX_USAGE);
3405 		}
3406 
3407 		/* skip over options that do have a value */
3408 		op = strchr(OPTIONS, ap[1]);
3409 		if (op != NULL && *++op == ':' && ap[2] == '\0' &&
3410 		    ap[1] != 'd' &&
3411 #if defined(sony_news)
3412 		    ap[1] != 'E' && ap[1] != 'J' &&
3413 #endif /* defined(sony_news) */
3414 		    argv[1] != NULL && argv[1][0] != '-')
3415 		{
3416 			argv++;
3417 			continue;
3418 		}
3419 
3420 		/* If -C doesn't have an argument, use sendmail.cf. */
3421 #define __DEFPATH	"sendmail.cf"
3422 		if (ap[1] == 'C' && ap[2] == '\0')
3423 		{
3424 			*argv = xalloc(sizeof(__DEFPATH) + 2);
3425 			(void) sm_strlcpyn(argv[0], sizeof(__DEFPATH) + 2, 2,
3426 					   "-C", __DEFPATH);
3427 		}
3428 
3429 		/* If -q doesn't have an argument, run it once. */
3430 		if (ap[1] == 'q' && ap[2] == '\0')
3431 			*argv = "-q0";
3432 
3433 		/* If -Q doesn't have an argument, disable quarantining */
3434 		if (ap[1] == 'Q' && ap[2] == '\0')
3435 			*argv = "-Q.";
3436 
3437 		/* if -d doesn't have an argument, use 0-99.1 */
3438 		if (ap[1] == 'd' && ap[2] == '\0')
3439 			*argv = "-d0-99.1";
3440 
3441 #if defined(sony_news)
3442 		/* if -E doesn't have an argument, use -EC */
3443 		if (ap[1] == 'E' && ap[2] == '\0')
3444 			*argv = "-EC";
3445 
3446 		/* if -J doesn't have an argument, use -JJ */
3447 		if (ap[1] == 'J' && ap[2] == '\0')
3448 			*argv = "-JJ";
3449 #endif /* defined(sony_news) */
3450 	}
3451 }
3452 /*
3453 **  AUTH_WARNING -- specify authorization warning
3454 **
3455 **	Parameters:
3456 **		e -- the current envelope.
3457 **		msg -- the text of the message.
3458 **		args -- arguments to the message.
3459 **
3460 **	Returns:
3461 **		none.
3462 */
3463 
3464 void
3465 #ifdef __STDC__
3466 auth_warning(register ENVELOPE *e, const char *msg, ...)
3467 #else /* __STDC__ */
3468 auth_warning(e, msg, va_alist)
3469 	register ENVELOPE *e;
3470 	const char *msg;
3471 	va_dcl
3472 #endif /* __STDC__ */
3473 {
3474 	char buf[MAXLINE];
3475 	SM_VA_LOCAL_DECL
3476 
3477 	if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags))
3478 	{
3479 		register char *p;
3480 		static char hostbuf[48];
3481 
3482 		if (hostbuf[0] == '\0')
3483 		{
3484 			struct hostent *hp;
3485 
3486 			hp = myhostname(hostbuf, sizeof(hostbuf));
3487 #if NETINET6
3488 			if (hp != NULL)
3489 			{
3490 				freehostent(hp);
3491 				hp = NULL;
3492 			}
3493 #endif /* NETINET6 */
3494 		}
3495 
3496 		(void) sm_strlcpyn(buf, sizeof(buf), 2, hostbuf, ": ");
3497 		p = &buf[strlen(buf)];
3498 		SM_VA_START(ap, msg);
3499 		(void) sm_vsnprintf(p, SPACELEFT(buf, p), msg, ap);
3500 		SM_VA_END(ap);
3501 		addheader("X-Authentication-Warning", buf, 0, e, true);
3502 		if (LogLevel > 3)
3503 			sm_syslog(LOG_INFO, e->e_id,
3504 				  "Authentication-Warning: %.400s",
3505 				  buf);
3506 	}
3507 }
3508 /*
3509 **  GETEXTENV -- get from external environment
3510 **
3511 **	Parameters:
3512 **		envar -- the name of the variable to retrieve
3513 **
3514 **	Returns:
3515 **		The value, if any.
3516 */
3517 
3518 static char *
3519 getextenv(envar)
3520 	const char *envar;
3521 {
3522 	char **envp;
3523 	int l;
3524 
3525 	l = strlen(envar);
3526 	for (envp = ExternalEnviron; envp != NULL && *envp != NULL; envp++)
3527 	{
3528 		if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=')
3529 			return &(*envp)[l + 1];
3530 	}
3531 	return NULL;
3532 }
3533 /*
3534 **  SM_SETUSERENV -- set an environment variable in the propagated environment
3535 **
3536 **	Parameters:
3537 **		envar -- the name of the environment variable.
3538 **		value -- the value to which it should be set.  If
3539 **			null, this is extracted from the incoming
3540 **			environment.  If that is not set, the call
3541 **			to sm_setuserenv is ignored.
3542 **
3543 **	Returns:
3544 **		none.
3545 */
3546 
3547 void
3548 sm_setuserenv(envar, value)
3549 	const char *envar;
3550 	const char *value;
3551 {
3552 	int i, l;
3553 	char **evp = UserEnviron;
3554 	char *p;
3555 
3556 	if (value == NULL)
3557 	{
3558 		value = getextenv(envar);
3559 		if (value == NULL)
3560 			return;
3561 	}
3562 
3563 	/* XXX enforce reasonable size? */
3564 	i = strlen(envar) + 1;
3565 	l = strlen(value) + i + 1;
3566 	p = (char *) xalloc(l);
3567 	(void) sm_strlcpyn(p, l, 3, envar, "=", value);
3568 
3569 	while (*evp != NULL && strncmp(*evp, p, i) != 0)
3570 		evp++;
3571 	if (*evp != NULL)
3572 	{
3573 		*evp++ = p;
3574 	}
3575 	else if (evp < &UserEnviron[MAXUSERENVIRON])
3576 	{
3577 		*evp++ = p;
3578 		*evp = NULL;
3579 	}
3580 
3581 	/* make sure it is in our environment as well */
3582 	if (putenv(p) < 0)
3583 		syserr("sm_setuserenv: putenv(%s) failed", p);
3584 }
3585 /*
3586 **  DUMPSTATE -- dump state
3587 **
3588 **	For debugging.
3589 */
3590 
3591 void
3592 dumpstate(when)
3593 	char *when;
3594 {
3595 	register char *j = macvalue('j', CurEnv);
3596 	int rs;
3597 	extern int NextMacroId;
3598 
3599 	sm_syslog(LOG_DEBUG, CurEnv->e_id,
3600 		  "--- dumping state on %s: $j = %s ---",
3601 		  when,
3602 		  j == NULL ? "<NULL>" : j);
3603 	if (j != NULL)
3604 	{
3605 		if (!wordinclass(j, 'w'))
3606 			sm_syslog(LOG_DEBUG, CurEnv->e_id,
3607 				  "*** $j not in $=w ***");
3608 	}
3609 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren);
3610 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)",
3611 		  NextMacroId, MAXMACROID);
3612 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---");
3613 	printopenfds(true);
3614 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---");
3615 	mci_dump_all(smioout, true);
3616 	rs = strtorwset("debug_dumpstate", NULL, ST_FIND);
3617 	if (rs > 0)
3618 	{
3619 		int status;
3620 		register char **pvp;
3621 		char *pv[MAXATOM + 1];
3622 
3623 		pv[0] = NULL;
3624 		status = REWRITE(pv, rs, CurEnv);
3625 		sm_syslog(LOG_DEBUG, CurEnv->e_id,
3626 			  "--- ruleset debug_dumpstate returns stat %d, pv: ---",
3627 			  status);
3628 		for (pvp = pv; *pvp != NULL; pvp++)
3629 			sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp);
3630 	}
3631 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---");
3632 }
3633 
3634 #ifdef SIGUSR1
3635 /*
3636 **  SIGUSR1 -- Signal a request to dump state.
3637 **
3638 **	Parameters:
3639 **		sig -- calling signal.
3640 **
3641 **	Returns:
3642 **		none.
3643 **
3644 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3645 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3646 **		DOING.
3647 **
3648 **		XXX: More work is needed for this signal handler.
3649 */
3650 
3651 /* ARGSUSED */
3652 static SIGFUNC_DECL
3653 sigusr1(sig)
3654 	int sig;
3655 {
3656 	int save_errno = errno;
3657 
3658 	FIX_SYSV_SIGNAL(sig, sigusr1);
3659 	errno = save_errno;
3660 	CHECK_CRITICAL(sig);
3661 	dumpstate("user signal");
3662 # if SM_HEAP_CHECK
3663 	dumpstab();
3664 # endif /* SM_HEAP_CHECK */
3665 	errno = save_errno;
3666 	return SIGFUNC_RETURN;
3667 }
3668 #endif /* SIGUSR1 */
3669 
3670 /*
3671 **  DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option
3672 **
3673 **	Parameters:
3674 **		to_real_uid -- if set, drop to the real uid instead
3675 **			of the RunAsUser.
3676 **
3677 **	Returns:
3678 **		EX_OSERR if the setuid failed.
3679 **		EX_OK otherwise.
3680 */
3681 
3682 int
3683 drop_privileges(to_real_uid)
3684 	bool to_real_uid;
3685 {
3686 	int rval = EX_OK;
3687 	GIDSET_T emptygidset[1];
3688 
3689 	if (tTd(47, 1))
3690 		sm_dprintf("drop_privileges(%d): Real[UG]id=%d:%d, get[ug]id=%d:%d, gete[ug]id=%d:%d, RunAs[UG]id=%d:%d\n",
3691 			   (int) to_real_uid,
3692 			   (int) RealUid, (int) RealGid,
3693 			   (int) getuid(), (int) getgid(),
3694 			   (int) geteuid(), (int) getegid(),
3695 			   (int) RunAsUid, (int) RunAsGid);
3696 
3697 	if (to_real_uid)
3698 	{
3699 		RunAsUserName = RealUserName;
3700 		RunAsUid = RealUid;
3701 		RunAsGid = RealGid;
3702 		EffGid = RunAsGid;
3703 	}
3704 
3705 	/* make sure no one can grab open descriptors for secret files */
3706 	endpwent();
3707 	sm_mbdb_terminate();
3708 
3709 	/* reset group permissions; these can be set later */
3710 	emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid();
3711 
3712 	/*
3713 	**  Notice:  on some OS (Linux...) the setgroups() call causes
3714 	**	a logfile entry if sendmail is not run by root.
3715 	**	However, it is unclear (no POSIX standard) whether
3716 	**	setgroups() can only succeed if executed by root.
3717 	**	So for now we keep it as it is; if you want to change it, use
3718 	**  if (geteuid() == 0 && setgroups(1, emptygidset) == -1)
3719 	*/
3720 
3721 	if (setgroups(1, emptygidset) == -1 && geteuid() == 0)
3722 	{
3723 		syserr("drop_privileges: setgroups(1, %d) failed",
3724 		       (int) emptygidset[0]);
3725 		rval = EX_OSERR;
3726 	}
3727 
3728 	/* reset primary group id */
3729 	if (to_real_uid)
3730 	{
3731 		/*
3732 		**  Drop gid to real gid.
3733 		**  On some OS we must reset the effective[/real[/saved]] gid,
3734 		**  and then use setgid() to finally drop all group privileges.
3735 		**  Later on we check whether we can get back the
3736 		**  effective gid.
3737 		*/
3738 
3739 #if HASSETEGID
3740 		if (setegid(RunAsGid) < 0)
3741 		{
3742 			syserr("drop_privileges: setegid(%d) failed",
3743 			       (int) RunAsGid);
3744 			rval = EX_OSERR;
3745 		}
3746 #else /* HASSETEGID */
3747 # if HASSETREGID
3748 		if (setregid(RunAsGid, RunAsGid) < 0)
3749 		{
3750 			syserr("drop_privileges: setregid(%d, %d) failed",
3751 			       (int) RunAsGid, (int) RunAsGid);
3752 			rval = EX_OSERR;
3753 		}
3754 # else /* HASSETREGID */
3755 #  if HASSETRESGID
3756 		if (setresgid(RunAsGid, RunAsGid, RunAsGid) < 0)
3757 		{
3758 			syserr("drop_privileges: setresgid(%d, %d, %d) failed",
3759 			       (int) RunAsGid, (int) RunAsGid, (int) RunAsGid);
3760 			rval = EX_OSERR;
3761 		}
3762 #  endif /* HASSETRESGID */
3763 # endif /* HASSETREGID */
3764 #endif /* HASSETEGID */
3765 	}
3766 	if (rval == EX_OK && (to_real_uid || RunAsGid != 0))
3767 	{
3768 		if (setgid(RunAsGid) < 0 && (!UseMSP || getegid() != RunAsGid))
3769 		{
3770 			syserr("drop_privileges: setgid(%d) failed",
3771 			       (int) RunAsGid);
3772 			rval = EX_OSERR;
3773 		}
3774 		errno = 0;
3775 		if (rval == EX_OK && getegid() != RunAsGid)
3776 		{
3777 			syserr("drop_privileges: Unable to set effective gid=%d to RunAsGid=%d",
3778 			       (int) getegid(), (int) RunAsGid);
3779 			rval = EX_OSERR;
3780 		}
3781 	}
3782 
3783 	/* fiddle with uid */
3784 	if (to_real_uid || RunAsUid != 0)
3785 	{
3786 		uid_t euid;
3787 
3788 		/*
3789 		**  Try to setuid(RunAsUid).
3790 		**  euid must be RunAsUid,
3791 		**  ruid must be RunAsUid unless (e|r)uid wasn't 0
3792 		**	and we didn't have to drop privileges to the real uid.
3793 		*/
3794 
3795 		if (setuid(RunAsUid) < 0 ||
3796 		    geteuid() != RunAsUid ||
3797 		    (getuid() != RunAsUid &&
3798 		     (to_real_uid || geteuid() == 0 || getuid() == 0)))
3799 		{
3800 #if HASSETREUID
3801 			/*
3802 			**  if ruid != RunAsUid, euid == RunAsUid, then
3803 			**  try resetting just the real uid, then using
3804 			**  setuid() to drop the saved-uid as well.
3805 			*/
3806 
3807 			if (geteuid() == RunAsUid)
3808 			{
3809 				if (setreuid(RunAsUid, -1) < 0)
3810 				{
3811 					syserr("drop_privileges: setreuid(%d, -1) failed",
3812 					       (int) RunAsUid);
3813 					rval = EX_OSERR;
3814 				}
3815 				if (setuid(RunAsUid) < 0)
3816 				{
3817 					syserr("drop_privileges: second setuid(%d) attempt failed",
3818 					       (int) RunAsUid);
3819 					rval = EX_OSERR;
3820 				}
3821 			}
3822 			else
3823 #endif /* HASSETREUID */
3824 			{
3825 				syserr("drop_privileges: setuid(%d) failed",
3826 				       (int) RunAsUid);
3827 				rval = EX_OSERR;
3828 			}
3829 		}
3830 		euid = geteuid();
3831 		if (RunAsUid != 0 && setuid(0) == 0)
3832 		{
3833 			/*
3834 			**  Believe it or not, the Linux capability model
3835 			**  allows a non-root process to override setuid()
3836 			**  on a process running as root and prevent that
3837 			**  process from dropping privileges.
3838 			*/
3839 
3840 			syserr("drop_privileges: setuid(0) succeeded (when it should not)");
3841 			rval = EX_OSERR;
3842 		}
3843 		else if (RunAsUid != euid && setuid(euid) == 0)
3844 		{
3845 			/*
3846 			**  Some operating systems will keep the saved-uid
3847 			**  if a non-root effective-uid calls setuid(real-uid)
3848 			**  making it possible to set it back again later.
3849 			*/
3850 
3851 			syserr("drop_privileges: Unable to drop non-root set-user-ID privileges");
3852 			rval = EX_OSERR;
3853 		}
3854 	}
3855 
3856 	if ((to_real_uid || RunAsGid != 0) &&
3857 	    rval == EX_OK && RunAsGid != EffGid &&
3858 	    getuid() != 0 && geteuid() != 0)
3859 	{
3860 		errno = 0;
3861 		if (setgid(EffGid) == 0)
3862 		{
3863 			syserr("drop_privileges: setgid(%d) succeeded (when it should not)",
3864 			       (int) EffGid);
3865 			rval = EX_OSERR;
3866 		}
3867 	}
3868 
3869 	if (tTd(47, 5))
3870 	{
3871 		sm_dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n",
3872 			   (int) geteuid(), (int) getuid(),
3873 			   (int) getegid(), (int) getgid());
3874 		sm_dprintf("drop_privileges: RunAsUser = %d:%d\n",
3875 			   (int) RunAsUid, (int) RunAsGid);
3876 		if (tTd(47, 10))
3877 			sm_dprintf("drop_privileges: rval = %d\n", rval);
3878 	}
3879 	return rval;
3880 }
3881 /*
3882 **  FILL_FD -- make sure a file descriptor has been properly allocated
3883 **
3884 **	Used to make sure that stdin/out/err are allocated on startup
3885 **
3886 **	Parameters:
3887 **		fd -- the file descriptor to be filled.
3888 **		where -- a string used for logging.  If NULL, this is
3889 **			being called on startup, and logging should
3890 **			not be done.
3891 **
3892 **	Returns:
3893 **		none
3894 **
3895 **	Side Effects:
3896 **		possibly changes MissingFds
3897 */
3898 
3899 void
3900 fill_fd(fd, where)
3901 	int fd;
3902 	char *where;
3903 {
3904 	int i;
3905 	struct stat stbuf;
3906 
3907 	if (fstat(fd, &stbuf) >= 0 || errno != EBADF)
3908 		return;
3909 
3910 	if (where != NULL)
3911 		syserr("fill_fd: %s: fd %d not open", where, fd);
3912 	else
3913 		MissingFds |= 1 << fd;
3914 	i = open(SM_PATH_DEVNULL, fd == 0 ? O_RDONLY : O_WRONLY, 0666);
3915 	if (i < 0)
3916 	{
3917 		syserr("!fill_fd: %s: cannot open %s",
3918 		       where == NULL ? "startup" : where, SM_PATH_DEVNULL);
3919 	}
3920 	if (fd != i)
3921 	{
3922 		(void) dup2(i, fd);
3923 		(void) close(i);
3924 	}
3925 }
3926 /*
3927 **  SM_PRINTOPTIONS -- print options
3928 **
3929 **	Parameters:
3930 **		options -- array of options.
3931 **
3932 **	Returns:
3933 **		none.
3934 */
3935 
3936 static void
3937 sm_printoptions(options)
3938 	char **options;
3939 {
3940 	int ll;
3941 	char **av;
3942 
3943 	av = options;
3944 	ll = 7;
3945 	while (*av != NULL)
3946 	{
3947 		if (ll + strlen(*av) > 63)
3948 		{
3949 			sm_dprintf("\n");
3950 			ll = 0;
3951 		}
3952 		if (ll == 0)
3953 			sm_dprintf("\t\t");
3954 		else
3955 			sm_dprintf(" ");
3956 		sm_dprintf("%s", *av);
3957 		ll += strlen(*av++) + 1;
3958 	}
3959 	sm_dprintf("\n");
3960 }
3961 
3962 /*
3963 **  TO8BIT -- convert \octal sequences in a test mode input line
3964 **
3965 **	Parameters:
3966 **		str -- the input line.
3967 **
3968 **	Returns:
3969 **		none.
3970 **
3971 **	Side Effects:
3972 **		replaces \0octal in str with octal value.
3973 */
3974 
3975 static bool to8bit __P((char *));
3976 
3977 static bool
3978 to8bit(str)
3979 	char *str;
3980 {
3981 	int c, len;
3982 	char *out, *in;
3983 	bool changed;
3984 
3985 	if (str == NULL)
3986 		return false;
3987 	in = out = str;
3988 	changed = false;
3989 	len = 0;
3990 	while ((c = (*str++ & 0377)) != '\0')
3991 	{
3992 		int oct, nxtc;
3993 
3994 		++len;
3995 		if (c == '\\' &&
3996 		    (nxtc = (*str & 0377)) == '0')
3997 		{
3998 			oct = 0;
3999 			while ((nxtc = (*str & 0377)) != '\0' &&
4000 				isascii(nxtc) && isdigit(nxtc))
4001 			{
4002 				oct <<= 3;
4003 				oct += nxtc - '0';
4004 				++str;
4005 				++len;
4006 			}
4007 			changed = true;
4008 			c = oct;
4009 		}
4010 		*out++ = c;
4011 	}
4012 	*out++ = c;
4013 	if (changed)
4014 	{
4015 		char *q;
4016 
4017 		q = quote_internal_chars(in, in, &len);
4018 		if (q != in)
4019 			sm_strlcpy(in, q, len);
4020 	}
4021 	return changed;
4022 }
4023 
4024 /*
4025 **  TESTMODELINE -- process a test mode input line
4026 **
4027 **	Parameters:
4028 **		line -- the input line.
4029 **		e -- the current environment.
4030 **	Syntax:
4031 **		#  a comment
4032 **		.X process X as a configuration line
4033 **		=X dump a configuration item (such as mailers)
4034 **		$X dump a macro or class
4035 **		/X try an activity
4036 **		X  normal process through rule set X
4037 */
4038 
4039 static void
4040 testmodeline(line, e)
4041 	char *line;
4042 	ENVELOPE *e;
4043 {
4044 	register char *p;
4045 	char *q;
4046 	auto char *delimptr;
4047 	int mid;
4048 	int i, rs;
4049 	STAB *map;
4050 	char **s;
4051 	struct rewrite *rw;
4052 	ADDRESS a;
4053 	char *lbp;
4054 	auto int lbs;
4055 	static int tryflags = RF_COPYNONE;
4056 	char exbuf[MAXLINE];
4057 	char lbuf[MAXLINE];
4058 	extern unsigned char TokTypeNoC[];
4059 	bool eightbit;
4060 
4061 	/* skip leading spaces */
4062 	while (*line == ' ')
4063 		line++;
4064 
4065 	lbp = NULL;
4066 	eightbit = false;
4067 	switch (line[0])
4068 	{
4069 	  case '#':
4070 	  case '\0':
4071 		return;
4072 
4073 	  case '?':
4074 		help("-bt", e);
4075 		return;
4076 
4077 	  case '.':		/* config-style settings */
4078 		switch (line[1])
4079 		{
4080 		  case 'D':
4081 			mid = macid_parse(&line[2], &delimptr);
4082 			if (mid == 0)
4083 				return;
4084 			lbs = sizeof(lbuf);
4085 			lbp = translate_dollars(delimptr, lbuf, &lbs);
4086 			macdefine(&e->e_macro, A_TEMP, mid, lbp);
4087 			if (lbp != lbuf)
4088 				SM_FREE(lbp);
4089 			break;
4090 
4091 		  case 'C':
4092 			if (line[2] == '\0')	/* not to call syserr() */
4093 				return;
4094 
4095 			mid = macid_parse(&line[2], &delimptr);
4096 			if (mid == 0)
4097 				return;
4098 			lbs = sizeof(lbuf);
4099 			lbp = translate_dollars(delimptr, lbuf, &lbs);
4100 			expand(lbp, exbuf, sizeof(exbuf), e);
4101 			if (lbp != lbuf)
4102 				SM_FREE(lbp);
4103 			p = exbuf;
4104 			while (*p != '\0')
4105 			{
4106 				register char *wd;
4107 				char delim;
4108 
4109 				while (*p != '\0' && isascii(*p) && isspace(*p))
4110 					p++;
4111 				wd = p;
4112 				while (*p != '\0' && !(isascii(*p) && isspace(*p)))
4113 					p++;
4114 				delim = *p;
4115 				*p = '\0';
4116 				if (wd[0] != '\0')
4117 					setclass(mid, wd);
4118 				*p = delim;
4119 			}
4120 			break;
4121 
4122 		  case '\0':
4123 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4124 					     "Usage: .[DC]macro value(s)\n");
4125 			break;
4126 
4127 		  default:
4128 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4129 					     "Unknown \".\" command %s\n", line);
4130 			break;
4131 		}
4132 		return;
4133 
4134 	  case '=':		/* config-style settings */
4135 		switch (line[1])
4136 		{
4137 		  case 'S':		/* dump rule set */
4138 			rs = strtorwset(&line[2], NULL, ST_FIND);
4139 			if (rs < 0)
4140 			{
4141 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4142 						     "Undefined ruleset %s\n", &line[2]);
4143 				return;
4144 			}
4145 			rw = RewriteRules[rs];
4146 			if (rw == NULL)
4147 				return;
4148 			do
4149 			{
4150 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4151 						  'R');
4152 				s = rw->r_lhs;
4153 				while (*s != NULL)
4154 				{
4155 					xputs(smioout, *s++);
4156 					(void) sm_io_putc(smioout,
4157 							  SM_TIME_DEFAULT, ' ');
4158 				}
4159 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4160 						  '\t');
4161 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4162 						  '\t');
4163 				s = rw->r_rhs;
4164 				while (*s != NULL)
4165 				{
4166 					xputs(smioout, *s++);
4167 					(void) sm_io_putc(smioout,
4168 							  SM_TIME_DEFAULT, ' ');
4169 				}
4170 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4171 						  '\n');
4172 			} while ((rw = rw->r_next) != NULL);
4173 			break;
4174 
4175 		  case 'M':
4176 			for (i = 0; i < MAXMAILERS; i++)
4177 			{
4178 				if (Mailer[i] != NULL)
4179 					printmailer(smioout, Mailer[i]);
4180 			}
4181 			break;
4182 
4183 		  case '\0':
4184 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4185 					     "Usage: =Sruleset or =M\n");
4186 			break;
4187 
4188 		  default:
4189 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4190 					     "Unknown \"=\" command %s\n", line);
4191 			break;
4192 		}
4193 		return;
4194 
4195 	  case '-':		/* set command-line-like opts */
4196 		switch (line[1])
4197 		{
4198 		  case 'd':
4199 			tTflag(&line[2]);
4200 			break;
4201 
4202 		  case '\0':
4203 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4204 					     "Usage: -d{debug arguments}\n");
4205 			break;
4206 
4207 		  default:
4208 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4209 					     "Unknown \"-\" command %s\n", line);
4210 			break;
4211 		}
4212 		return;
4213 
4214 	  case '$':
4215 		if (line[1] == '=')
4216 		{
4217 			mid = macid(&line[2]);
4218 			if (mid != 0)
4219 				stabapply(dump_class, mid);
4220 			return;
4221 		}
4222 		mid = macid(&line[1]);
4223 		if (mid == 0)
4224 			return;
4225 		p = macvalue(mid, e);
4226 		if (p == NULL)
4227 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4228 					     "Undefined\n");
4229 		else
4230 		{
4231 			xputs(smioout, p);
4232 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4233 					     "\n");
4234 		}
4235 		return;
4236 
4237 	  case '/':		/* miscellaneous commands */
4238 		p = &line[strlen(line)];
4239 		while (--p >= line && isascii(*p) && isspace(*p))
4240 			*p = '\0';
4241 		p = strpbrk(line, " \t");
4242 		if (p != NULL)
4243 		{
4244 			while (isascii(*p) && isspace(*p))
4245 				*p++ = '\0';
4246 		}
4247 		else
4248 			p = "";
4249 		if (line[1] == '\0')
4250 		{
4251 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4252 					     "Usage: /[canon|map|mx|parse|try|tryflags]\n");
4253 			return;
4254 		}
4255 		if (sm_strcasecmp(&line[1], "quit") == 0)
4256 		{
4257 			CurEnv->e_id = NULL;
4258 			finis(true, true, ExitStat);
4259 			/* NOTREACHED */
4260 		}
4261 		if (sm_strcasecmp(&line[1], "mx") == 0)
4262 		{
4263 #if NAMED_BIND
4264 			/* look up MX records */
4265 			int nmx;
4266 			auto int rcode;
4267 			char *mxhosts[MAXMXHOSTS + 1];
4268 
4269 			if (*p == '\0')
4270 			{
4271 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4272 						     "Usage: /mx address\n");
4273 				return;
4274 			}
4275 			nmx = getmxrr(p, mxhosts, NULL, false, &rcode, true,
4276 				      NULL);
4277 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4278 					     "getmxrr(%s) returns %d value(s):\n",
4279 				p, nmx);
4280 			for (i = 0; i < nmx; i++)
4281 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4282 						     "\t%s\n", mxhosts[i]);
4283 #else /* NAMED_BIND */
4284 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4285 					     "No MX code compiled in\n");
4286 #endif /* NAMED_BIND */
4287 		}
4288 		else if (sm_strcasecmp(&line[1], "canon") == 0)
4289 		{
4290 			char host[MAXHOSTNAMELEN];
4291 
4292 			if (*p == '\0')
4293 			{
4294 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4295 						     "Usage: /canon address\n");
4296 				return;
4297 			}
4298 			else if (sm_strlcpy(host, p, sizeof(host)) >= sizeof(host))
4299 			{
4300 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4301 						     "Name too long\n");
4302 				return;
4303 			}
4304 			(void) getcanonname(host, sizeof(host), !HasWildcardMX,
4305 					    NULL);
4306 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4307 					     "getcanonname(%s) returns %s\n",
4308 					     p, host);
4309 		}
4310 		else if (sm_strcasecmp(&line[1], "map") == 0)
4311 		{
4312 			auto int rcode = EX_OK;
4313 			char *av[2];
4314 
4315 			if (*p == '\0')
4316 			{
4317 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4318 						     "Usage: /map mapname key\n");
4319 				return;
4320 			}
4321 			for (q = p; *q != '\0' && !(isascii(*q) && isspace(*q));			     q++)
4322 				continue;
4323 			if (*q == '\0')
4324 			{
4325 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4326 						     "No key specified\n");
4327 				return;
4328 			}
4329 			*q++ = '\0';
4330 			map = stab(p, ST_MAP, ST_FIND);
4331 			if (map == NULL)
4332 			{
4333 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4334 						     "Map named \"%s\" not found\n", p);
4335 				return;
4336 			}
4337 			if (!bitset(MF_OPEN, map->s_map.map_mflags) &&
4338 			    !openmap(&(map->s_map)))
4339 			{
4340 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4341 						     "Map named \"%s\" not open\n", p);
4342 				return;
4343 			}
4344 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4345 					     "map_lookup: %s (%s) ", p, q);
4346 			av[0] = q;
4347 			av[1] = NULL;
4348 			p = (*map->s_map.map_class->map_lookup)
4349 					(&map->s_map, q, av, &rcode);
4350 			if (p == NULL)
4351 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4352 						     "no match (%d)\n",
4353 						     rcode);
4354 			else
4355 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4356 						     "returns %s (%d)\n", p,
4357 						     rcode);
4358 		}
4359 		else if (sm_strcasecmp(&line[1], "try") == 0)
4360 		{
4361 			MAILER *m;
4362 			STAB *st;
4363 			auto int rcode = EX_OK;
4364 
4365 			q = strpbrk(p, " \t");
4366 			if (q != NULL)
4367 			{
4368 				while (isascii(*q) && isspace(*q))
4369 					*q++ = '\0';
4370 			}
4371 			if (q == NULL || *q == '\0')
4372 			{
4373 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4374 						     "Usage: /try mailer address\n");
4375 				return;
4376 			}
4377 			st = stab(p, ST_MAILER, ST_FIND);
4378 			if (st == NULL)
4379 			{
4380 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4381 						     "Unknown mailer %s\n", p);
4382 				return;
4383 			}
4384 			m = st->s_mailer;
4385 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4386 					     "Trying %s %s address %s for mailer %s\n",
4387 				     bitset(RF_HEADERADDR, tryflags) ? "header"
4388 							: "envelope",
4389 				     bitset(RF_SENDERADDR, tryflags) ? "sender"
4390 							: "recipient", q, p);
4391 			p = remotename(q, m, tryflags, &rcode, CurEnv);
4392 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4393 					     "Rcode = %d, addr = %s\n",
4394 					     rcode, p == NULL ? "<NULL>" : p);
4395 			e->e_to = NULL;
4396 		}
4397 		else if (sm_strcasecmp(&line[1], "tryflags") == 0)
4398 		{
4399 			if (*p == '\0')
4400 			{
4401 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4402 						     "Usage: /tryflags [Hh|Ee][Ss|Rr]\n");
4403 				return;
4404 			}
4405 			for (; *p != '\0'; p++)
4406 			{
4407 				switch (*p)
4408 				{
4409 				  case 'H':
4410 				  case 'h':
4411 					tryflags |= RF_HEADERADDR;
4412 					break;
4413 
4414 				  case 'E':
4415 				  case 'e':
4416 					tryflags &= ~RF_HEADERADDR;
4417 					break;
4418 
4419 				  case 'S':
4420 				  case 's':
4421 					tryflags |= RF_SENDERADDR;
4422 					break;
4423 
4424 				  case 'R':
4425 				  case 'r':
4426 					tryflags &= ~RF_SENDERADDR;
4427 					break;
4428 				}
4429 			}
4430 			exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e';
4431 			exbuf[1] = ' ';
4432 			exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r';
4433 			exbuf[3] = '\0';
4434 			macdefine(&e->e_macro, A_TEMP,
4435 				macid("{addr_type}"), exbuf);
4436 		}
4437 		else if (sm_strcasecmp(&line[1], "parse") == 0)
4438 		{
4439 			if (*p == '\0')
4440 			{
4441 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4442 						     "Usage: /parse address\n");
4443 				return;
4444 			}
4445 			q = crackaddr(p, e);
4446 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4447 					     "Cracked address = ");
4448 			xputs(smioout, q);
4449 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4450 					     "\nParsing %s %s address\n",
4451 					     bitset(RF_HEADERADDR, tryflags) ?
4452 							"header" : "envelope",
4453 					     bitset(RF_SENDERADDR, tryflags) ?
4454 							"sender" : "recipient");
4455 			if (parseaddr(p, &a, tryflags, '\0', NULL, e, true)
4456 			    == NULL)
4457 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4458 						     "Cannot parse\n");
4459 			else if (a.q_host != NULL && a.q_host[0] != '\0')
4460 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4461 						     "mailer %s, host %s, user %s\n",
4462 						     a.q_mailer->m_name,
4463 						     a.q_host,
4464 						     a.q_user);
4465 			else
4466 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4467 						     "mailer %s, user %s\n",
4468 						     a.q_mailer->m_name,
4469 						     a.q_user);
4470 			e->e_to = NULL;
4471 		}
4472 		else if (sm_strcasecmp(&line[1], "header") == 0)
4473 		{
4474 			unsigned long ul;
4475 
4476 			ul = chompheader(p, CHHDR_CHECK|CHHDR_USER, NULL, e);
4477 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4478 					     "ul = %lu\n", ul);
4479 		}
4480 		else
4481 		{
4482 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4483 					     "Unknown \"/\" command %s\n",
4484 					     line);
4485 		}
4486 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4487 		return;
4488 	}
4489 
4490 	for (p = line; isascii(*p) && isspace(*p); p++)
4491 		continue;
4492 	q = p;
4493 	while (*p != '\0' && !(isascii(*p) && isspace(*p)))
4494 		p++;
4495 	if (*p == '\0')
4496 	{
4497 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4498 				     "No address!\n");
4499 		return;
4500 	}
4501 	*p = '\0';
4502 	if (tTd(23, 101))
4503 		eightbit = to8bit(p + 1);
4504 	if (invalidaddr(p + 1, NULL, true))
4505 		return;
4506 	do
4507 	{
4508 		register char **pvp;
4509 		char pvpbuf[PSBUFSIZE];
4510 
4511 		pvp = prescan(++p, ',', pvpbuf, sizeof(pvpbuf), &delimptr,
4512 			      ConfigLevel >= 9 ? TokTypeNoC : ExtTokenTab, false);
4513 		if (pvp == NULL)
4514 			continue;
4515 		p = q;
4516 		while (*p != '\0')
4517 		{
4518 			int status;
4519 
4520 			rs = strtorwset(p, NULL, ST_FIND);
4521 			if (rs < 0)
4522 			{
4523 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4524 						     "Undefined ruleset %s\n",
4525 						     p);
4526 				break;
4527 			}
4528 			status = REWRITE(pvp, rs, e);
4529 			if (status != EX_OK)
4530 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4531 						     "== Ruleset %s (%d) status %d\n",
4532 						     p, rs, status);
4533 			else if (eightbit)
4534 			{
4535 				cataddr(pvp, NULL, exbuf, sizeof(exbuf), '\0',
4536 					true);
4537 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4538 						     "cataddr: %s\n",
4539 						     str2prt(exbuf));
4540 			}
4541 			while (*p != '\0' && *p++ != ',')
4542 				continue;
4543 		}
4544 	} while (*(p = delimptr) != '\0');
4545 	(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4546 }
4547 
4548 static void
4549 dump_class(s, id)
4550 	register STAB *s;
4551 	int id;
4552 {
4553 	if (s->s_symtype != ST_CLASS)
4554 		return;
4555 	if (bitnset(bitidx(id), s->s_class))
4556 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4557 				     "%s\n", s->s_name);
4558 }
4559 
4560 /*
4561 **  An exception type used to create QuickAbort exceptions.
4562 **  This is my first cut at converting QuickAbort from longjmp to exceptions.
4563 **  These exceptions have a single integer argument, which is the argument
4564 **  to longjmp in the original code (either 1 or 2).  I don't know the
4565 **  significance of 1 vs 2: the calls to setjmp don't care.
4566 */
4567 
4568 const SM_EXC_TYPE_T EtypeQuickAbort =
4569 {
4570 	SmExcTypeMagic,
4571 	"E:mta.quickabort",
4572 	"i",
4573 	sm_etype_printf,
4574 	"quick abort %0",
4575 };
4576