xref: /freebsd/contrib/sendmail/src/srvrsmtp.c (revision 595e514d0df2bac5b813d35f83e32875dbf16a83)
1 /*
2  * Copyright (c) 1998-2010, 2012, 2013 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #include <sendmail.h>
15 #if MILTER
16 # include <libmilter/mfapi.h>
17 # include <libmilter/mfdef.h>
18 #endif /* MILTER */
19 
20 SM_RCSID("@(#)$Id: srvrsmtp.c,v 8.1015 2013/03/12 15:24:54 ca Exp $")
21 
22 #include <sm/time.h>
23 #include <sm/fdset.h>
24 
25 #if SASL || STARTTLS
26 # include "sfsasl.h"
27 #endif /* SASL || STARTTLS */
28 #if SASL
29 # define ENC64LEN(l)	(((l) + 2) * 4 / 3 + 1)
30 static int saslmechs __P((sasl_conn_t *, char **));
31 #endif /* SASL */
32 #if STARTTLS
33 #  include <openssl/err.h>
34 # include <sysexits.h>
35 
36 static SSL_CTX	*srv_ctx = NULL;	/* TLS server context */
37 static SSL	*srv_ssl = NULL;	/* per connection context */
38 
39 static bool	tls_ok_srv = false;
40 
41 # define TLS_VERIFY_CLIENT() tls_set_verify(srv_ctx, srv_ssl, \
42 				bitset(SRV_VRFY_CLT, features))
43 #endif /* STARTTLS */
44 
45 #if _FFR_DM_ONE
46 static bool	NotFirstDelivery = false;
47 #endif /* _FFR_DM_ONE */
48 
49 /* server features */
50 #define SRV_NONE	0x0000	/* none... */
51 #define SRV_OFFER_TLS	0x0001	/* offer STARTTLS */
52 #define SRV_VRFY_CLT	0x0002	/* request a cert */
53 #define SRV_OFFER_AUTH	0x0004	/* offer AUTH */
54 #define SRV_OFFER_ETRN	0x0008	/* offer ETRN */
55 #define SRV_OFFER_VRFY	0x0010	/* offer VRFY (not yet used) */
56 #define SRV_OFFER_EXPN	0x0020	/* offer EXPN */
57 #define SRV_OFFER_VERB	0x0040	/* offer VERB */
58 #define SRV_OFFER_DSN	0x0080	/* offer DSN */
59 #if PIPELINING
60 # define SRV_OFFER_PIPE	0x0100	/* offer PIPELINING */
61 # if _FFR_NO_PIPE
62 #  define SRV_NO_PIPE	0x0200	/* disable PIPELINING, sleep if used */
63 # endif /* _FFR_NO_PIPE */
64 #endif /* PIPELINING */
65 #define SRV_REQ_AUTH	0x0400	/* require AUTH */
66 #define SRV_REQ_SEC	0x0800	/* require security - equiv to AuthOptions=p */
67 #define SRV_TMP_FAIL	0x1000	/* ruleset caused a temporary failure */
68 
69 static unsigned int	srvfeatures __P((ENVELOPE *, char *, unsigned int));
70 
71 #define	STOP_ATTACK	((time_t) -1)
72 static time_t	checksmtpattack __P((volatile unsigned int *, unsigned int,
73 				     bool, char *, ENVELOPE *));
74 static void	printvrfyaddr __P((ADDRESS *, bool, bool));
75 static char	*skipword __P((char *volatile, char *));
76 static void	setup_smtpd_io __P((void));
77 
78 #if SASL
79 # if SASL >= 20000
80 static int reset_saslconn __P((sasl_conn_t **_conn, char *_hostname,
81 				char *_remoteip, char *_localip,
82 				char *_auth_id, sasl_ssf_t *_ext_ssf));
83 
84 # define RESET_SASLCONN	\
85 	do							\
86 	{							\
87 		result = reset_saslconn(&conn, AuthRealm, remoteip, \
88 					localip, auth_id, &ext_ssf); \
89 		if (result != SASL_OK)				\
90 			sasl_ok = false;			\
91 	} while (0)
92 
93 # else /* SASL >= 20000 */
94 static int reset_saslconn __P((sasl_conn_t **_conn, char *_hostname,
95 				struct sockaddr_in *_saddr_r,
96 				struct sockaddr_in *_saddr_l,
97 				sasl_external_properties_t *_ext_ssf));
98 # define RESET_SASLCONN	\
99 	do							\
100 	{							\
101 		result = reset_saslconn(&conn, AuthRealm, &saddr_r, \
102 					&saddr_l, &ext_ssf);	\
103 		if (result != SASL_OK)				\
104 			sasl_ok = false;			\
105 	} while (0)
106 
107 # endif /* SASL >= 20000 */
108 #endif /* SASL */
109 
110 extern ENVELOPE	BlankEnvelope;
111 
112 #define NBADRCPTS						\
113 	do							\
114 	{							\
115 		char buf[16];					\
116 		(void) sm_snprintf(buf, sizeof(buf), "%d",	\
117 			BadRcptThrottle > 0 && n_badrcpts > BadRcptThrottle \
118 				? n_badrcpts - 1 : n_badrcpts);	\
119 		macdefine(&e->e_macro, A_TEMP, macid("{nbadrcpts}"), buf); \
120 	} while (0)
121 
122 #define SKIP_SPACE(s)	while (isascii(*s) && isspace(*s))	\
123 				(s)++
124 
125 /*
126 **  PARSE_ESMTP_ARGS -- parse EMSTP arguments (for MAIL, RCPT)
127 **
128 **	Parameters:
129 **		e -- the envelope
130 **		addr_st -- address (RCPT only)
131 **		p -- read buffer
132 **		delimptr -- current position in read buffer
133 **		which -- MAIL/RCPT
134 **		args -- arguments (output)
135 **		esmtp_args -- function to process a single ESMTP argument
136 **
137 **	Returns:
138 **		none
139 */
140 
141 void
142 parse_esmtp_args(e, addr_st, p, delimptr, which, args, esmtp_args)
143 	ENVELOPE *e;
144 	ADDRESS *addr_st;
145 	char *p;
146 	char *delimptr;
147 	char *which;
148 	char *args[];
149 	esmtp_args_F esmtp_args;
150 {
151 	int argno;
152 
153 	argno = 0;
154 	if (args != NULL)
155 		args[argno++] = p;
156 	p = delimptr;
157 	while (p != NULL && *p != '\0')
158 	{
159 		char *kp;
160 		char *vp = NULL;
161 		char *equal = NULL;
162 
163 		/* locate the beginning of the keyword */
164 		SKIP_SPACE(p);
165 		if (*p == '\0')
166 			break;
167 		kp = p;
168 
169 		/* skip to the value portion */
170 		while ((isascii(*p) && isalnum(*p)) || *p == '-')
171 			p++;
172 		if (*p == '=')
173 		{
174 			equal = p;
175 			*p++ = '\0';
176 			vp = p;
177 
178 			/* skip to the end of the value */
179 			while (*p != '\0' && *p != ' ' &&
180 			       !(isascii(*p) && iscntrl(*p)) &&
181 			       *p != '=')
182 				p++;
183 		}
184 
185 		if (*p != '\0')
186 			*p++ = '\0';
187 
188 		if (tTd(19, 1))
189 			sm_dprintf("%s: got arg %s=\"%s\"\n", which, kp,
190 				vp == NULL ? "<null>" : vp);
191 
192 		esmtp_args(addr_st, kp, vp, e);
193 		if (equal != NULL)
194 			*equal = '=';
195 		if (args != NULL)
196 			args[argno] = kp;
197 		argno++;
198 		if (argno >= MAXSMTPARGS - 1)
199 			usrerr("501 5.5.4 Too many parameters");
200 		if (Errors > 0)
201 			break;
202 	}
203 	if (args != NULL)
204 		args[argno] = NULL;
205 }
206 
207 /*
208 **  SMTP -- run the SMTP protocol.
209 **
210 **	Parameters:
211 **		nullserver -- if non-NULL, rejection message for
212 **			(almost) all SMTP commands.
213 **		d_flags -- daemon flags
214 **		e -- the envelope.
215 **
216 **	Returns:
217 **		never.
218 **
219 **	Side Effects:
220 **		Reads commands from the input channel and processes them.
221 */
222 
223 /*
224 **  Notice: The smtp server doesn't have a session context like the client
225 **	side has (mci). Therefore some data (session oriented) is allocated
226 **	or assigned to the "wrong" structure (esp. STARTTLS, AUTH).
227 **	This should be fixed in a successor version.
228 */
229 
230 struct cmd
231 {
232 	char	*cmd_name;	/* command name */
233 	int	cmd_code;	/* internal code, see below */
234 };
235 
236 /* values for cmd_code */
237 #define CMDERROR	0	/* bad command */
238 #define CMDMAIL	1	/* mail -- designate sender */
239 #define CMDRCPT	2	/* rcpt -- designate recipient */
240 #define CMDDATA	3	/* data -- send message text */
241 #define CMDRSET	4	/* rset -- reset state */
242 #define CMDVRFY	5	/* vrfy -- verify address */
243 #define CMDEXPN	6	/* expn -- expand address */
244 #define CMDNOOP	7	/* noop -- do nothing */
245 #define CMDQUIT	8	/* quit -- close connection and die */
246 #define CMDHELO	9	/* helo -- be polite */
247 #define CMDHELP	10	/* help -- give usage info */
248 #define CMDEHLO	11	/* ehlo -- extended helo (RFC 1425) */
249 #define CMDETRN	12	/* etrn -- flush queue */
250 #if SASL
251 # define CMDAUTH	13	/* auth -- SASL authenticate */
252 #endif /* SASL */
253 #if STARTTLS
254 # define CMDSTLS	14	/* STARTTLS -- start TLS session */
255 #endif /* STARTTLS */
256 /* non-standard commands */
257 #define CMDVERB	17	/* verb -- go into verbose mode */
258 /* unimplemented commands from RFC 821 */
259 #define CMDUNIMPL	19	/* unimplemented rfc821 commands */
260 /* use this to catch and log "door handle" attempts on your system */
261 #define CMDLOGBOGUS	23	/* bogus command that should be logged */
262 /* debugging-only commands, only enabled if SMTPDEBUG is defined */
263 #define CMDDBGQSHOW	24	/* showq -- show send queue */
264 #define CMDDBGDEBUG	25	/* debug -- set debug mode */
265 
266 /*
267 **  Note: If you change this list, remember to update 'helpfile'
268 */
269 
270 static struct cmd	CmdTab[] =
271 {
272 	{ "mail",	CMDMAIL		},
273 	{ "rcpt",	CMDRCPT		},
274 	{ "data",	CMDDATA		},
275 	{ "rset",	CMDRSET		},
276 	{ "vrfy",	CMDVRFY		},
277 	{ "expn",	CMDEXPN		},
278 	{ "help",	CMDHELP		},
279 	{ "noop",	CMDNOOP		},
280 	{ "quit",	CMDQUIT		},
281 	{ "helo",	CMDHELO		},
282 	{ "ehlo",	CMDEHLO		},
283 	{ "etrn",	CMDETRN		},
284 	{ "verb",	CMDVERB		},
285 	{ "send",	CMDUNIMPL	},
286 	{ "saml",	CMDUNIMPL	},
287 	{ "soml",	CMDUNIMPL	},
288 	{ "turn",	CMDUNIMPL	},
289 #if SASL
290 	{ "auth",	CMDAUTH,	},
291 #endif /* SASL */
292 #if STARTTLS
293 	{ "starttls",	CMDSTLS,	},
294 #endif /* STARTTLS */
295     /* remaining commands are here only to trap and log attempts to use them */
296 	{ "showq",	CMDDBGQSHOW	},
297 	{ "debug",	CMDDBGDEBUG	},
298 	{ "wiz",	CMDLOGBOGUS	},
299 
300 	{ NULL,		CMDERROR	}
301 };
302 
303 static char	*CurSmtpClient;		/* who's at the other end of channel */
304 
305 #ifndef MAXBADCOMMANDS
306 # define MAXBADCOMMANDS 25	/* maximum number of bad commands */
307 #endif /* ! MAXBADCOMMANDS */
308 #ifndef MAXHELOCOMMANDS
309 # define MAXHELOCOMMANDS 3	/* max HELO/EHLO commands before slowdown */
310 #endif /* ! MAXHELOCOMMANDS */
311 #ifndef MAXVRFYCOMMANDS
312 # define MAXVRFYCOMMANDS 6	/* max VRFY/EXPN commands before slowdown */
313 #endif /* ! MAXVRFYCOMMANDS */
314 #ifndef MAXETRNCOMMANDS
315 # define MAXETRNCOMMANDS 8	/* max ETRN commands before slowdown */
316 #endif /* ! MAXETRNCOMMANDS */
317 #ifndef MAXTIMEOUT
318 # define MAXTIMEOUT (4 * 60)	/* max timeout for bad commands */
319 #endif /* ! MAXTIMEOUT */
320 
321 /*
322 **  Maximum shift value to compute timeout for bad commands.
323 **  This introduces an upper limit of 2^MAXSHIFT for the timeout.
324 */
325 
326 #ifndef MAXSHIFT
327 # define MAXSHIFT 8
328 #endif /* ! MAXSHIFT */
329 #if MAXSHIFT > 31
330  ERROR _MAXSHIFT > 31 is invalid
331 #endif /* MAXSHIFT */
332 
333 
334 #if MAXBADCOMMANDS > 0
335 # define STOP_IF_ATTACK(r)	do		\
336 	{					\
337 		if ((r) == STOP_ATTACK)		\
338 			goto stopattack;	\
339 	} while (0)
340 
341 #else /* MAXBADCOMMANDS > 0 */
342 # define STOP_IF_ATTACK(r)	r
343 #endif /* MAXBADCOMMANDS > 0 */
344 
345 
346 #if SM_HEAP_CHECK
347 static SM_DEBUG_T DebugLeakSmtp = SM_DEBUG_INITIALIZER("leak_smtp",
348 	"@(#)$Debug: leak_smtp - trace memory leaks during SMTP processing $");
349 #endif /* SM_HEAP_CHECK */
350 
351 typedef struct
352 {
353 	bool		sm_gotmail;	/* mail command received */
354 	unsigned int	sm_nrcpts;	/* number of successful RCPT commands */
355 	bool		sm_discard;
356 #if MILTER
357 	bool		sm_milterize;
358 	bool		sm_milterlist;	/* any filters in the list? */
359 	milters_T	sm_milters;
360 
361 	/* e_nrcpts from envelope before recipient() call */
362 	unsigned int	sm_e_nrcpts_orig;
363 #endif /* MILTER */
364 	char		*sm_quarmsg;	/* carry quarantining across messages */
365 } SMTP_T;
366 
367 static bool	smtp_data __P((SMTP_T *, ENVELOPE *));
368 
369 #define MSG_TEMPFAIL "451 4.3.2 Please try again later"
370 
371 #if MILTER
372 # define MILTER_ABORT(e)	milter_abort((e))
373 
374 # define MILTER_REPLY(str)						\
375 	{								\
376 		int savelogusrerrs = LogUsrErrs;			\
377 									\
378 		milter_cmd_fail = true;					\
379 		switch (state)						\
380 		{							\
381 		  case SMFIR_SHUTDOWN:					\
382 			if (MilterLogLevel > 3)				\
383 			{						\
384 				sm_syslog(LOG_INFO, e->e_id,		\
385 					  "Milter: %s=%s, reject=421, errormode=4",	\
386 					  str, addr);			\
387 				LogUsrErrs = false;			\
388 			}						\
389 			{						\
390 				bool tsave = QuickAbort;		\
391 									\
392 				QuickAbort = false;			\
393 				usrerr("421 4.3.0 closing connection");	\
394 				QuickAbort = tsave;			\
395 				e->e_sendqueue = NULL;			\
396 				goto doquit;				\
397 			}						\
398 			break;						\
399 		  case SMFIR_REPLYCODE:					\
400 			if (MilterLogLevel > 3)				\
401 			{						\
402 				sm_syslog(LOG_INFO, e->e_id,		\
403 					  "Milter: %s=%s, reject=%s",	\
404 					  str, addr, response);		\
405 				LogUsrErrs = false;			\
406 			}						\
407 			if (strncmp(response, "421 ", 4) == 0		\
408 			    || strncmp(response, "421-", 4) == 0)	\
409 			{						\
410 				bool tsave = QuickAbort;		\
411 									\
412 				QuickAbort = false;			\
413 				usrerr(response);			\
414 				QuickAbort = tsave;			\
415 				e->e_sendqueue = NULL;			\
416 				goto doquit;				\
417 			}						\
418 			else						\
419 				usrerr(response);			\
420 			break;						\
421 									\
422 		  case SMFIR_REJECT:					\
423 			if (MilterLogLevel > 3)				\
424 			{						\
425 				sm_syslog(LOG_INFO, e->e_id,		\
426 					  "Milter: %s=%s, reject=550 5.7.1 Command rejected", \
427 					  str, addr);			\
428 				LogUsrErrs = false;			\
429 			}						\
430 			usrerr("550 5.7.1 Command rejected");		\
431 			break;						\
432 									\
433 		  case SMFIR_DISCARD:					\
434 			if (MilterLogLevel > 3)				\
435 				sm_syslog(LOG_INFO, e->e_id,		\
436 					  "Milter: %s=%s, discard",	\
437 					  str, addr);			\
438 			e->e_flags |= EF_DISCARD;			\
439 			milter_cmd_fail = false;			\
440 			break;						\
441 									\
442 		  case SMFIR_TEMPFAIL:					\
443 			if (MilterLogLevel > 3)				\
444 			{						\
445 				sm_syslog(LOG_INFO, e->e_id,		\
446 					  "Milter: %s=%s, reject=%s",	\
447 					  str, addr, MSG_TEMPFAIL);	\
448 				LogUsrErrs = false;			\
449 			}						\
450 			usrerr(MSG_TEMPFAIL);				\
451 			break;						\
452 		  default:						\
453 			milter_cmd_fail = false;			\
454 			break;						\
455 		}							\
456 		LogUsrErrs = savelogusrerrs;				\
457 		if (response != NULL)					\
458 			sm_free(response); /* XXX */			\
459 	}
460 
461 #else /* MILTER */
462 # define MILTER_ABORT(e)
463 #endif /* MILTER */
464 
465 /* clear all SMTP state (for HELO/EHLO/RSET) */
466 #define CLEAR_STATE(cmd)					\
467 do								\
468 {								\
469 	/* abort milter filters */				\
470 	MILTER_ABORT(e);					\
471 								\
472 	if (smtp.sm_nrcpts > 0)					\
473 	{							\
474 		logundelrcpts(e, cmd, 10, false);		\
475 		smtp.sm_nrcpts = 0;				\
476 		macdefine(&e->e_macro, A_PERM,			\
477 			  macid("{nrcpts}"), "0");		\
478 	}							\
479 								\
480 	e->e_sendqueue = NULL;					\
481 	e->e_flags |= EF_CLRQUEUE;				\
482 								\
483 	if (tTd(92, 2))						\
484 		sm_dprintf("CLEAR_STATE: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",\
485 			e->e_id, bitset(EF_LOGSENDER, e->e_flags), LogLevel);\
486 	if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))	\
487 		logsender(e, NULL);				\
488 	e->e_flags &= ~EF_LOGSENDER;				\
489 								\
490 	/* clean up a bit */					\
491 	smtp.sm_gotmail = false;				\
492 	SuprErrs = true;					\
493 	(void) dropenvelope(e, true, false);			\
494 	sm_rpool_free(e->e_rpool);				\
495 	e = newenvelope(e, CurEnv, sm_rpool_new_x(NULL));	\
496 	CurEnv = e;						\
497 	e->e_features = features;				\
498 								\
499 	/* put back discard bit */				\
500 	if (smtp.sm_discard)					\
501 		e->e_flags |= EF_DISCARD;			\
502 								\
503 	/* restore connection quarantining */			\
504 	if (smtp.sm_quarmsg == NULL)				\
505 	{							\
506 		e->e_quarmsg = NULL;				\
507 		macdefine(&e->e_macro, A_PERM,			\
508 			macid("{quarantine}"), "");		\
509 	}							\
510 	else							\
511 	{							\
512 		e->e_quarmsg = sm_rpool_strdup_x(e->e_rpool,	\
513 						smtp.sm_quarmsg);	\
514 		macdefine(&e->e_macro, A_PERM, macid("{quarantine}"),	\
515 			  e->e_quarmsg);			\
516 	}							\
517 } while (0)
518 
519 /* sleep to flatten out connection load */
520 #define MIN_DELAY_LOG	15	/* wait before logging this again */
521 
522 /* is it worth setting the process title for 1s? */
523 #define DELAY_CONN(cmd)						\
524 	if (DelayLA > 0 && (CurrentLA = getla()) >= DelayLA)	\
525 	{							\
526 		time_t dnow;					\
527 								\
528 		sm_setproctitle(true, e,			\
529 				"%s: %s: delaying %s: load average: %d", \
530 				qid_printname(e), CurSmtpClient,	\
531 				cmd, DelayLA);	\
532 		if (LogLevel > 8 && (dnow = curtime()) > log_delay)	\
533 		{						\
534 			sm_syslog(LOG_INFO, e->e_id,		\
535 				  "delaying=%s, load average=%d >= %d",	\
536 				  cmd, CurrentLA, DelayLA);		\
537 			log_delay = dnow + MIN_DELAY_LOG;	\
538 		}						\
539 		(void) sleep(1);				\
540 		sm_setproctitle(true, e, "%s %s: %.80s",	\
541 				qid_printname(e), CurSmtpClient, inp);	\
542 	}
543 
544 static bool SevenBitInput_Saved;	/* saved version of SevenBitInput */
545 
546 void
547 smtp(nullserver, d_flags, e)
548 	char *volatile nullserver;
549 	BITMAP256 d_flags;
550 	register ENVELOPE *volatile e;
551 {
552 	register char *volatile p;
553 	register struct cmd *volatile c = NULL;
554 	char *cmd;
555 	auto ADDRESS *vrfyqueue;
556 	ADDRESS *a;
557 	volatile bool gothello;		/* helo command received */
558 	bool vrfy;			/* set if this is a vrfy command */
559 	char *volatile protocol;	/* sending protocol */
560 	char *volatile sendinghost;	/* sending hostname */
561 	char *volatile peerhostname;	/* name of SMTP peer or "localhost" */
562 	auto char *delimptr;
563 	char *id;
564 	volatile unsigned int n_badcmds = 0;	/* count of bad commands */
565 	volatile unsigned int n_badrcpts = 0;	/* number of rejected RCPT */
566 	volatile unsigned int n_verifies = 0;	/* count of VRFY/EXPN */
567 	volatile unsigned int n_etrn = 0;	/* count of ETRN */
568 	volatile unsigned int n_noop = 0;	/* count of NOOP/VERB/etc */
569 	volatile unsigned int n_helo = 0;	/* count of HELO/EHLO */
570 	bool ok;
571 	volatile bool first;
572 	volatile bool tempfail = false;
573 	volatile time_t wt;		/* timeout after too many commands */
574 	volatile time_t previous;	/* time after checksmtpattack() */
575 	volatile bool lognullconnection = true;
576 	register char *q;
577 	SMTP_T smtp;
578 	char *addr;
579 	char *greetcode = "220";
580 	char *hostname;			/* my hostname ($j) */
581 	QUEUE_CHAR *new;
582 	char *args[MAXSMTPARGS];
583 	char inp[MAXINPLINE];
584 #if MAXINPLINE < MAXLINE
585  ERROR _MAXINPLINE must NOT be less than _MAXLINE: MAXINPLINE < MAXLINE
586 #endif /* MAXINPLINE < MAXLINE */
587 	char cmdbuf[MAXLINE];
588 #if SASL
589 	sasl_conn_t *conn;
590 	volatile bool sasl_ok;
591 	volatile unsigned int n_auth = 0;	/* count of AUTH commands */
592 	bool ismore;
593 	int result;
594 	volatile int authenticating;
595 	char *user;
596 	char *in, *out2;
597 # if SASL >= 20000
598 	char *auth_id = NULL;
599 	const char *out;
600 	sasl_ssf_t ext_ssf;
601 	char localip[60], remoteip[60];
602 # else /* SASL >= 20000 */
603 	char *out;
604 	const char *errstr;
605 	sasl_external_properties_t ext_ssf;
606 	struct sockaddr_in saddr_l;
607 	struct sockaddr_in saddr_r;
608 # endif /* SASL >= 20000 */
609 	sasl_security_properties_t ssp;
610 	sasl_ssf_t *ssf;
611 	unsigned int inlen, out2len;
612 	unsigned int outlen;
613 	char *volatile auth_type;
614 	char *mechlist;
615 	volatile unsigned int n_mechs;
616 	unsigned int len;
617 #else /* SASL */
618 #endif /* SASL */
619 	int r;
620 #if STARTTLS
621 	int rfd, wfd;
622 	volatile bool tls_active = false;
623 	volatile bool smtps = bitnset(D_SMTPS, d_flags);
624 	bool saveQuickAbort;
625 	bool saveSuprErrs;
626 	time_t tlsstart;
627 #endif /* STARTTLS */
628 	volatile unsigned int features;
629 #if PIPELINING
630 # if _FFR_NO_PIPE
631 	int np_log = 0;
632 # endif /* _FFR_NO_PIPE */
633 #endif /* PIPELINING */
634 	volatile time_t log_delay = (time_t) 0;
635 #if MILTER
636 	volatile bool milter_cmd_done, milter_cmd_safe;
637 	volatile bool milter_rcpt_added, milter_cmd_fail;
638 	ADDRESS addr_st;
639 # define p_addr_st	&addr_st
640 #else /* MILTER */
641 # define p_addr_st	NULL
642 #endif /* MILTER */
643 	size_t inplen;
644 #if _FFR_BADRCPT_SHUTDOWN
645 	int n_badrcpts_adj;
646 #endif /* _FFR_BADRCPT_SHUTDOWN */
647 
648 	SevenBitInput_Saved = SevenBitInput;
649 	smtp.sm_nrcpts = 0;
650 #if MILTER
651 	smtp.sm_milterize = (nullserver == NULL);
652 	smtp.sm_milterlist = false;
653 	addr = NULL;
654 #endif /* MILTER */
655 
656 	/* setup I/O fd correctly for the SMTP server */
657 	setup_smtpd_io();
658 
659 #if SM_HEAP_CHECK
660 	if (sm_debug_active(&DebugLeakSmtp, 1))
661 	{
662 		sm_heap_newgroup();
663 		sm_dprintf("smtp() heap group #%d\n", sm_heap_group());
664 	}
665 #endif /* SM_HEAP_CHECK */
666 
667 	/* XXX the rpool should be set when e is initialized in main() */
668 	e->e_rpool = sm_rpool_new_x(NULL);
669 	e->e_macro.mac_rpool = e->e_rpool;
670 
671 	settime(e);
672 	sm_getla();
673 	peerhostname = RealHostName;
674 	if (peerhostname == NULL)
675 		peerhostname = "localhost";
676 	CurHostName = peerhostname;
677 	CurSmtpClient = macvalue('_', e);
678 	if (CurSmtpClient == NULL)
679 		CurSmtpClient = CurHostName;
680 
681 	/* check_relay may have set discard bit, save for later */
682 	smtp.sm_discard = bitset(EF_DISCARD, e->e_flags);
683 
684 #if PIPELINING
685 	/* auto-flush output when reading input */
686 	(void) sm_io_autoflush(InChannel, OutChannel);
687 #endif /* PIPELINING */
688 
689 	sm_setproctitle(true, e, "server %s startup", CurSmtpClient);
690 
691 	/* Set default features for server. */
692 	features = ((bitset(PRIV_NOETRN, PrivacyFlags) ||
693 		     bitnset(D_NOETRN, d_flags)) ? SRV_NONE : SRV_OFFER_ETRN)
694 		| (bitnset(D_AUTHREQ, d_flags) ? SRV_REQ_AUTH : SRV_NONE)
695 		| (bitset(PRIV_NOEXPN, PrivacyFlags) ? SRV_NONE
696 			: (SRV_OFFER_EXPN
697 			  | (bitset(PRIV_NOVERB, PrivacyFlags)
698 			     ? SRV_NONE : SRV_OFFER_VERB)))
699 		| ((bitset(PRIV_NORECEIPTS, PrivacyFlags) || !SendMIMEErrors)
700 			 ? SRV_NONE : SRV_OFFER_DSN)
701 #if SASL
702 		| (bitnset(D_NOAUTH, d_flags) ? SRV_NONE : SRV_OFFER_AUTH)
703 		| (bitset(SASL_SEC_NOPLAINTEXT, SASLOpts) ? SRV_REQ_SEC
704 							  : SRV_NONE)
705 #endif /* SASL */
706 #if PIPELINING
707 		| SRV_OFFER_PIPE
708 #endif /* PIPELINING */
709 #if STARTTLS
710 		| (bitnset(D_NOTLS, d_flags) ? SRV_NONE : SRV_OFFER_TLS)
711 		| (bitset(TLS_I_NO_VRFY, TLS_Srv_Opts) ? SRV_NONE
712 						       : SRV_VRFY_CLT)
713 #endif /* STARTTLS */
714 		;
715 	if (nullserver == NULL)
716 	{
717 		features = srvfeatures(e, CurSmtpClient, features);
718 		if (bitset(SRV_TMP_FAIL, features))
719 		{
720 			if (LogLevel > 4)
721 				sm_syslog(LOG_ERR, NOQID,
722 					  "ERROR: srv_features=tempfail, relay=%.100s, access temporarily disabled",
723 					  CurSmtpClient);
724 			nullserver = "450 4.3.0 Please try again later.";
725 		}
726 		else
727 		{
728 #if PIPELINING
729 # if _FFR_NO_PIPE
730 			if (bitset(SRV_NO_PIPE, features))
731 			{
732 				/* for consistency */
733 				features &= ~SRV_OFFER_PIPE;
734 			}
735 # endif /* _FFR_NO_PIPE */
736 #endif /* PIPELINING */
737 #if SASL
738 			if (bitset(SRV_REQ_SEC, features))
739 				SASLOpts |= SASL_SEC_NOPLAINTEXT;
740 			else
741 				SASLOpts &= ~SASL_SEC_NOPLAINTEXT;
742 #endif /* SASL */
743 		}
744 	}
745 	else if (strncmp(nullserver, "421 ", 4) == 0)
746 	{
747 		message(nullserver);
748 		goto doquit;
749 	}
750 
751 	e->e_features = features;
752 	hostname = macvalue('j', e);
753 #if SASL
754 	if (AuthRealm == NULL)
755 		AuthRealm = hostname;
756 	sasl_ok = bitset(SRV_OFFER_AUTH, features);
757 	n_mechs = 0;
758 	authenticating = SASL_NOT_AUTH;
759 
760 	/* SASL server new connection */
761 	if (sasl_ok)
762 	{
763 # if SASL >= 20000
764 		result = sasl_server_new("smtp", AuthRealm, NULL, NULL, NULL,
765 					 NULL, 0, &conn);
766 # elif SASL > 10505
767 		/* use empty realm: only works in SASL > 1.5.5 */
768 		result = sasl_server_new("smtp", AuthRealm, "", NULL, 0, &conn);
769 # else /* SASL >= 20000 */
770 		/* use no realm -> realm is set to hostname by SASL lib */
771 		result = sasl_server_new("smtp", AuthRealm, NULL, NULL, 0,
772 					 &conn);
773 # endif /* SASL >= 20000 */
774 		sasl_ok = result == SASL_OK;
775 		if (!sasl_ok)
776 		{
777 			if (LogLevel > 9)
778 				sm_syslog(LOG_WARNING, NOQID,
779 					  "AUTH error: sasl_server_new failed=%d",
780 					  result);
781 		}
782 	}
783 	if (sasl_ok)
784 	{
785 		/*
786 		**  SASL set properties for sasl
787 		**  set local/remote IP
788 		**  XXX Cyrus SASL v1 only supports IPv4
789 		**
790 		**  XXX where exactly are these used/required?
791 		**  Kerberos_v4
792 		*/
793 
794 # if SASL >= 20000
795 		localip[0] = remoteip[0] = '\0';
796 #  if NETINET || NETINET6
797 		in = macvalue(macid("{daemon_family}"), e);
798 		if (in != NULL && (
799 #   if NETINET6
800 		    strcmp(in, "inet6") == 0 ||
801 #   endif /* NETINET6 */
802 		    strcmp(in, "inet") == 0))
803 		{
804 			SOCKADDR_LEN_T addrsize;
805 			SOCKADDR saddr_l;
806 			SOCKADDR saddr_r;
807 
808 			addrsize = sizeof(saddr_r);
809 			if (getpeername(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
810 						      NULL),
811 					(struct sockaddr *) &saddr_r,
812 					&addrsize) == 0)
813 			{
814 				if (iptostring(&saddr_r, addrsize,
815 					       remoteip, sizeof(remoteip)))
816 				{
817 					sasl_setprop(conn, SASL_IPREMOTEPORT,
818 						     remoteip);
819 				}
820 				addrsize = sizeof(saddr_l);
821 				if (getsockname(sm_io_getinfo(InChannel,
822 							      SM_IO_WHAT_FD,
823 							      NULL),
824 						(struct sockaddr *) &saddr_l,
825 						&addrsize) == 0)
826 				{
827 					if (iptostring(&saddr_l, addrsize,
828 						       localip,
829 						       sizeof(localip)))
830 					{
831 						sasl_setprop(conn,
832 							     SASL_IPLOCALPORT,
833 							     localip);
834 					}
835 				}
836 			}
837 		}
838 #  endif /* NETINET || NETINET6 */
839 # else /* SASL >= 20000 */
840 #  if NETINET
841 		in = macvalue(macid("{daemon_family}"), e);
842 		if (in != NULL && strcmp(in, "inet") == 0)
843 		{
844 			SOCKADDR_LEN_T addrsize;
845 
846 			addrsize = sizeof(struct sockaddr_in);
847 			if (getpeername(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
848 						      NULL),
849 					(struct sockaddr *)&saddr_r,
850 					&addrsize) == 0)
851 			{
852 				sasl_setprop(conn, SASL_IP_REMOTE, &saddr_r);
853 				addrsize = sizeof(struct sockaddr_in);
854 				if (getsockname(sm_io_getinfo(InChannel,
855 							      SM_IO_WHAT_FD,
856 							      NULL),
857 						(struct sockaddr *)&saddr_l,
858 						&addrsize) == 0)
859 					sasl_setprop(conn, SASL_IP_LOCAL,
860 						     &saddr_l);
861 			}
862 		}
863 #  endif /* NETINET */
864 # endif /* SASL >= 20000 */
865 
866 		auth_type = NULL;
867 		mechlist = NULL;
868 		user = NULL;
869 # if 0
870 		macdefine(&BlankEnvelope.e_macro, A_PERM,
871 			macid("{auth_author}"), NULL);
872 # endif /* 0 */
873 
874 		/* set properties */
875 		(void) memset(&ssp, '\0', sizeof(ssp));
876 
877 		/* XXX should these be options settable via .cf ? */
878 		/* ssp.min_ssf = 0; is default due to memset() */
879 		ssp.max_ssf = MaxSLBits;
880 		ssp.maxbufsize = MAXOUTLEN;
881 		ssp.security_flags = SASLOpts & SASL_SEC_MASK;
882 		sasl_ok = sasl_setprop(conn, SASL_SEC_PROPS, &ssp) == SASL_OK;
883 
884 		if (sasl_ok)
885 		{
886 			/*
887 			**  external security strength factor;
888 			**	currently we have none so zero
889 			*/
890 
891 # if SASL >= 20000
892 			ext_ssf = 0;
893 			auth_id = NULL;
894 			sasl_ok = ((sasl_setprop(conn, SASL_SSF_EXTERNAL,
895 						 &ext_ssf) == SASL_OK) &&
896 				   (sasl_setprop(conn, SASL_AUTH_EXTERNAL,
897 						 auth_id) == SASL_OK));
898 # else /* SASL >= 20000 */
899 			ext_ssf.ssf = 0;
900 			ext_ssf.auth_id = NULL;
901 			sasl_ok = sasl_setprop(conn, SASL_SSF_EXTERNAL,
902 					       &ext_ssf) == SASL_OK;
903 # endif /* SASL >= 20000 */
904 		}
905 		if (sasl_ok)
906 			n_mechs = saslmechs(conn, &mechlist);
907 	}
908 #endif /* SASL */
909 
910 #if STARTTLS
911 
912 
913 	set_tls_rd_tmo(TimeOuts.to_nextcommand);
914 #endif /* STARTTLS */
915 
916 #if MILTER
917 	if (smtp.sm_milterize)
918 	{
919 		char state;
920 
921 		/* initialize mail filter connection */
922 		smtp.sm_milterlist = milter_init(e, &state, &smtp.sm_milters);
923 		switch (state)
924 		{
925 		  case SMFIR_REJECT:
926 			if (MilterLogLevel > 3)
927 				sm_syslog(LOG_INFO, e->e_id,
928 					  "Milter: initialization failed, rejecting commands");
929 			greetcode = "554";
930 			nullserver = "Command rejected";
931 			smtp.sm_milterize = false;
932 			break;
933 
934 		  case SMFIR_TEMPFAIL:
935 			if (MilterLogLevel > 3)
936 				sm_syslog(LOG_INFO, e->e_id,
937 					  "Milter: initialization failed, temp failing commands");
938 			tempfail = true;
939 			smtp.sm_milterize = false;
940 			break;
941 
942 		  case SMFIR_SHUTDOWN:
943 			if (MilterLogLevel > 3)
944 				sm_syslog(LOG_INFO, e->e_id,
945 					  "Milter: initialization failed, closing connection");
946 			tempfail = true;
947 			smtp.sm_milterize = false;
948 			message("421 4.7.0 %s closing connection",
949 					MyHostName);
950 
951 			/* arrange to ignore send list */
952 			e->e_sendqueue = NULL;
953 			lognullconnection = false;
954 			goto doquit;
955 		}
956 	}
957 
958 	if (smtp.sm_milterlist && smtp.sm_milterize &&
959 	    !bitset(EF_DISCARD, e->e_flags))
960 	{
961 		char state;
962 		char *response;
963 
964 		q = macvalue(macid("{client_name}"), e);
965 		SM_ASSERT(q != NULL || OpMode == MD_SMTP);
966 		if (q == NULL)
967 			q = "localhost";
968 		response = milter_connect(q, RealHostAddr, e, &state);
969 		switch (state)
970 		{
971 		  case SMFIR_REPLYCODE:	/* REPLYCODE shouldn't happen */
972 		  case SMFIR_REJECT:
973 			if (MilterLogLevel > 3)
974 				sm_syslog(LOG_INFO, e->e_id,
975 					  "Milter: connect: host=%s, addr=%s, rejecting commands",
976 					  peerhostname,
977 					  anynet_ntoa(&RealHostAddr));
978 			greetcode = "554";
979 			nullserver = "Command rejected";
980 			smtp.sm_milterize = false;
981 			break;
982 
983 		  case SMFIR_TEMPFAIL:
984 			if (MilterLogLevel > 3)
985 				sm_syslog(LOG_INFO, e->e_id,
986 					  "Milter: connect: host=%s, addr=%s, temp failing commands",
987 					  peerhostname,
988 					  anynet_ntoa(&RealHostAddr));
989 			tempfail = true;
990 			smtp.sm_milterize = false;
991 			break;
992 
993 		  case SMFIR_SHUTDOWN:
994 			if (MilterLogLevel > 3)
995 				sm_syslog(LOG_INFO, e->e_id,
996 					  "Milter: connect: host=%s, addr=%s, shutdown",
997 					  peerhostname,
998 					  anynet_ntoa(&RealHostAddr));
999 			tempfail = true;
1000 			smtp.sm_milterize = false;
1001 			message("421 4.7.0 %s closing connection",
1002 					MyHostName);
1003 
1004 			/* arrange to ignore send list */
1005 			e->e_sendqueue = NULL;
1006 			goto doquit;
1007 		}
1008 		if (response != NULL)
1009 			sm_free(response); /* XXX */
1010 	}
1011 #endif /* MILTER */
1012 
1013 	/*
1014 	**  Broken proxies and SMTP slammers
1015 	**  push data without waiting, catch them
1016 	*/
1017 
1018 	if (
1019 #if STARTTLS
1020 	    !smtps &&
1021 #endif /* STARTTLS */
1022 	    *greetcode == '2' && nullserver == NULL)
1023 	{
1024 		time_t msecs = 0;
1025 		char **pvp;
1026 		char pvpbuf[PSBUFSIZE];
1027 
1028 		/* Ask the rulesets how long to pause */
1029 		pvp = NULL;
1030 		r = rscap("greet_pause", peerhostname,
1031 			  anynet_ntoa(&RealHostAddr), e,
1032 			  &pvp, pvpbuf, sizeof(pvpbuf));
1033 		if (r == EX_OK && pvp != NULL && pvp[0] != NULL &&
1034 		    (pvp[0][0] & 0377) == CANONNET && pvp[1] != NULL)
1035 		{
1036 			msecs = strtol(pvp[1], NULL, 10);
1037 		}
1038 
1039 		if (msecs > 0)
1040 		{
1041 			int fd;
1042 			fd_set readfds;
1043 			struct timeval timeout;
1044 			struct timeval bp, ep, tp; /* {begin,end,total}pause */
1045 			int eoftest;
1046 
1047 			/* pause for a moment */
1048 			timeout.tv_sec = msecs / 1000;
1049 			timeout.tv_usec = (msecs % 1000) * 1000;
1050 
1051 			/* Obey RFC 2821: 4.3.5.2: 220 timeout of 5 minutes */
1052 			if (timeout.tv_sec >= 300)
1053 			{
1054 				timeout.tv_sec = 300;
1055 				timeout.tv_usec = 0;
1056 			}
1057 
1058 			/* check if data is on the socket during the pause */
1059 			fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
1060 			FD_ZERO(&readfds);
1061 			SM_FD_SET(fd, &readfds);
1062 			gettimeofday(&bp, NULL);
1063 			if (select(fd + 1, FDSET_CAST &readfds,
1064 			    NULL, NULL, &timeout) > 0 &&
1065 			    FD_ISSET(fd, &readfds) &&
1066 			    (eoftest = sm_io_getc(InChannel, SM_TIME_DEFAULT))
1067 			    != SM_IO_EOF)
1068 			{
1069 				sm_io_ungetc(InChannel, SM_TIME_DEFAULT,
1070 					     eoftest);
1071 				gettimeofday(&ep, NULL);
1072 				timersub(&ep, &bp, &tp);
1073 				greetcode = "554";
1074 				nullserver = "Command rejected";
1075 				sm_syslog(LOG_INFO, e->e_id,
1076 					  "rejecting commands from %s [%s] due to pre-greeting traffic after %d seconds",
1077 					  peerhostname,
1078 					  anynet_ntoa(&RealHostAddr),
1079 					  (int) tp.tv_sec +
1080 						(tp.tv_usec >= 500000 ? 1 : 0)
1081 					 );
1082 			}
1083 		}
1084 	}
1085 
1086 #if STARTTLS
1087 	/* If this an smtps connection, start TLS now */
1088 	if (smtps)
1089 	{
1090 		Errors = 0;
1091 		goto starttls;
1092 	}
1093 
1094   greeting:
1095 
1096 #endif /* STARTTLS */
1097 
1098 	/* output the first line, inserting "ESMTP" as second word */
1099 	if (*greetcode == '5')
1100 		(void) sm_snprintf(inp, sizeof(inp),
1101 				"%s not accepting messages", hostname);
1102 	else
1103 		expand(SmtpGreeting, inp, sizeof(inp), e);
1104 
1105 	p = strchr(inp, '\n');
1106 	if (p != NULL)
1107 		*p++ = '\0';
1108 	id = strchr(inp, ' ');
1109 	if (id == NULL)
1110 		id = &inp[strlen(inp)];
1111 	if (p == NULL)
1112 		(void) sm_snprintf(cmdbuf, sizeof(cmdbuf),
1113 			 "%s %%.*s ESMTP%%s", greetcode);
1114 	else
1115 		(void) sm_snprintf(cmdbuf, sizeof(cmdbuf),
1116 			 "%s-%%.*s ESMTP%%s", greetcode);
1117 	message(cmdbuf, (int) (id - inp), inp, id);
1118 
1119 	/* output remaining lines */
1120 	while ((id = p) != NULL && (p = strchr(id, '\n')) != NULL)
1121 	{
1122 		*p++ = '\0';
1123 		if (isascii(*id) && isspace(*id))
1124 			id++;
1125 		(void) sm_strlcpyn(cmdbuf, sizeof(cmdbuf), 2, greetcode, "-%s");
1126 		message(cmdbuf, id);
1127 	}
1128 	if (id != NULL)
1129 	{
1130 		if (isascii(*id) && isspace(*id))
1131 			id++;
1132 		(void) sm_strlcpyn(cmdbuf, sizeof(cmdbuf), 2, greetcode, " %s");
1133 		message(cmdbuf, id);
1134 	}
1135 
1136 	protocol = NULL;
1137 	sendinghost = macvalue('s', e);
1138 
1139 	/* If quarantining by a connect/ehlo action, save between messages */
1140 	if (e->e_quarmsg == NULL)
1141 		smtp.sm_quarmsg = NULL;
1142 	else
1143 		smtp.sm_quarmsg = newstr(e->e_quarmsg);
1144 
1145 	/* sendinghost's storage must outlive the current envelope */
1146 	if (sendinghost != NULL)
1147 		sendinghost = sm_strdup_x(sendinghost);
1148 	first = true;
1149 	gothello = false;
1150 	smtp.sm_gotmail = false;
1151 	for (;;)
1152 	{
1153 	    SM_TRY
1154 	    {
1155 		QuickAbort = false;
1156 		HoldErrs = false;
1157 		SuprErrs = false;
1158 		LogUsrErrs = false;
1159 		OnlyOneError = true;
1160 		e->e_flags &= ~(EF_VRFYONLY|EF_GLOBALERRS);
1161 #if MILTER
1162 		milter_cmd_fail = false;
1163 #endif /* MILTER */
1164 
1165 		/* setup for the read */
1166 		e->e_to = NULL;
1167 		Errors = 0;
1168 		FileName = NULL;
1169 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
1170 
1171 		/* read the input line */
1172 		SmtpPhase = "server cmd read";
1173 		sm_setproctitle(true, e, "server %s cmd read", CurSmtpClient);
1174 
1175 		/* handle errors */
1176 		if (sm_io_error(OutChannel) ||
1177 		    (p = sfgets(inp, sizeof(inp), InChannel,
1178 				TimeOuts.to_nextcommand, SmtpPhase)) == NULL)
1179 		{
1180 			char *d;
1181 
1182 			d = macvalue(macid("{daemon_name}"), e);
1183 			if (d == NULL)
1184 				d = "stdin";
1185 			/* end of file, just die */
1186 			disconnect(1, e);
1187 
1188 #if MILTER
1189 			/* close out milter filters */
1190 			milter_quit(e);
1191 #endif /* MILTER */
1192 
1193 			message("421 4.4.1 %s Lost input channel from %s",
1194 				MyHostName, CurSmtpClient);
1195 			if (LogLevel > (smtp.sm_gotmail ? 1 : 19))
1196 				sm_syslog(LOG_NOTICE, e->e_id,
1197 					  "lost input channel from %s to %s after %s",
1198 					  CurSmtpClient, d,
1199 					  (c == NULL || c->cmd_name == NULL) ? "startup" : c->cmd_name);
1200 			/*
1201 			**  If have not accepted mail (DATA), do not bounce
1202 			**  bad addresses back to sender.
1203 			*/
1204 
1205 			if (bitset(EF_CLRQUEUE, e->e_flags))
1206 				e->e_sendqueue = NULL;
1207 			goto doquit;
1208 		}
1209 
1210 		/* also used by "proxy" check below */
1211 		inplen = strlen(inp);
1212 #if SASL
1213 		/*
1214 		**  SMTP AUTH requires accepting any length,
1215 		**  at least for challenge/response. However, not imposing
1216 		**  a limit is a bad idea (denial of service).
1217 		*/
1218 
1219 		if (authenticating != SASL_PROC_AUTH
1220 		    && sm_strncasecmp(inp, "AUTH ", 5) != 0
1221 		    && inplen > MAXLINE)
1222 		{
1223 			message("421 4.7.0 %s Command too long, possible attack %s",
1224 				MyHostName, CurSmtpClient);
1225 			sm_syslog(LOG_INFO, e->e_id,
1226 				  "%s: SMTP violation, input too long: %lu",
1227 				  CurSmtpClient, (unsigned long) inplen);
1228 			goto doquit;
1229 		}
1230 #endif /* SASL */
1231 
1232 		if (first)
1233 		{
1234 			size_t cmdlen;
1235 			int idx;
1236 			char *http_cmd;
1237 			static char *http_cmds[] = { "GET", "POST",
1238 						     "CONNECT", "USER", NULL };
1239 
1240 			for (idx = 0; (http_cmd = http_cmds[idx]) != NULL;
1241 			     idx++)
1242 			{
1243 				cmdlen = strlen(http_cmd);
1244 				if (cmdlen < inplen &&
1245 				    sm_strncasecmp(inp, http_cmd, cmdlen) == 0 &&
1246 				    isascii(inp[cmdlen]) && isspace(inp[cmdlen]))
1247 				{
1248 					/* Open proxy, drop it */
1249 					message("421 4.7.0 %s Rejecting open proxy %s",
1250 						MyHostName, CurSmtpClient);
1251 					sm_syslog(LOG_INFO, e->e_id,
1252 						  "%s: probable open proxy: command=%.40s",
1253 						  CurSmtpClient, inp);
1254 					goto doquit;
1255 				}
1256 			}
1257 			first = false;
1258 		}
1259 
1260 		/* clean up end of line */
1261 		fixcrlf(inp, true);
1262 
1263 #if PIPELINING
1264 # if _FFR_NO_PIPE
1265 		/*
1266 		**  if there is more input and pipelining is disabled:
1267 		**	delay ... (and maybe discard the input?)
1268 		**  XXX this doesn't really work, at least in tests using
1269 		**  telnet SM_IO_IS_READABLE only returns 1 if there were
1270 		**  more than 2 input lines available.
1271 		*/
1272 
1273 		if (bitset(SRV_NO_PIPE, features) &&
1274 		    sm_io_getinfo(InChannel, SM_IO_IS_READABLE, NULL) > 0)
1275 		{
1276 			if (++np_log < 3)
1277 				sm_syslog(LOG_INFO, NOQID,
1278 					  "unauthorized PIPELINING, sleeping, relay=%.100s",
1279 					   CurSmtpClient);
1280 			sleep(1);
1281 		}
1282 
1283 # endif /* _FFR_NO_PIPE */
1284 #endif /* PIPELINING */
1285 
1286 #if SASL
1287 		if (authenticating == SASL_PROC_AUTH)
1288 		{
1289 # if 0
1290 			if (*inp == '\0')
1291 			{
1292 				authenticating = SASL_NOT_AUTH;
1293 				message("501 5.5.2 missing input");
1294 				RESET_SASLCONN;
1295 				continue;
1296 			}
1297 # endif /* 0 */
1298 			if (*inp == '*' && *(inp + 1) == '\0')
1299 			{
1300 				authenticating = SASL_NOT_AUTH;
1301 
1302 				/* RFC 2554 4. */
1303 				message("501 5.0.0 AUTH aborted");
1304 				RESET_SASLCONN;
1305 				continue;
1306 			}
1307 
1308 			/* could this be shorter? XXX */
1309 # if SASL >= 20000
1310 			in = xalloc(strlen(inp) + 1);
1311 			result = sasl_decode64(inp, strlen(inp), in,
1312 					       strlen(inp), &inlen);
1313 # else /* SASL >= 20000 */
1314 			out = xalloc(strlen(inp));
1315 			result = sasl_decode64(inp, strlen(inp), out, &outlen);
1316 # endif /* SASL >= 20000 */
1317 			if (result != SASL_OK)
1318 			{
1319 				authenticating = SASL_NOT_AUTH;
1320 
1321 				/* RFC 2554 4. */
1322 				message("501 5.5.4 cannot decode AUTH parameter %s",
1323 					inp);
1324 # if SASL >= 20000
1325 				sm_free(in);
1326 # endif /* SASL >= 20000 */
1327 				RESET_SASLCONN;
1328 				continue;
1329 			}
1330 
1331 # if SASL >= 20000
1332 			result = sasl_server_step(conn,	in, inlen,
1333 						  &out, &outlen);
1334 			sm_free(in);
1335 # else /* SASL >= 20000 */
1336 			result = sasl_server_step(conn,	out, outlen,
1337 						  &out, &outlen, &errstr);
1338 # endif /* SASL >= 20000 */
1339 
1340 			/* get an OK if we're done */
1341 			if (result == SASL_OK)
1342 			{
1343   authenticated:
1344 				message("235 2.0.0 OK Authenticated");
1345 				authenticating = SASL_IS_AUTH;
1346 				macdefine(&BlankEnvelope.e_macro, A_TEMP,
1347 					macid("{auth_type}"), auth_type);
1348 
1349 # if SASL >= 20000
1350 				user = macvalue(macid("{auth_authen}"), e);
1351 
1352 				/* get security strength (features) */
1353 				result = sasl_getprop(conn, SASL_SSF,
1354 						      (const void **) &ssf);
1355 # else /* SASL >= 20000 */
1356 				result = sasl_getprop(conn, SASL_USERNAME,
1357 						      (void **)&user);
1358 				if (result != SASL_OK)
1359 				{
1360 					user = "";
1361 					macdefine(&BlankEnvelope.e_macro,
1362 						  A_PERM,
1363 						  macid("{auth_authen}"), NULL);
1364 				}
1365 				else
1366 				{
1367 					macdefine(&BlankEnvelope.e_macro,
1368 						  A_TEMP,
1369 						  macid("{auth_authen}"),
1370 						  xtextify(user, "<>\")"));
1371 				}
1372 
1373 # if 0
1374 				/* get realm? */
1375 				sasl_getprop(conn, SASL_REALM, (void **) &data);
1376 # endif /* 0 */
1377 
1378 				/* get security strength (features) */
1379 				result = sasl_getprop(conn, SASL_SSF,
1380 						      (void **) &ssf);
1381 # endif /* SASL >= 20000 */
1382 				if (result != SASL_OK)
1383 				{
1384 					macdefine(&BlankEnvelope.e_macro,
1385 						  A_PERM,
1386 						  macid("{auth_ssf}"), "0");
1387 					ssf = NULL;
1388 				}
1389 				else
1390 				{
1391 					char pbuf[8];
1392 
1393 					(void) sm_snprintf(pbuf, sizeof(pbuf),
1394 							   "%u", *ssf);
1395 					macdefine(&BlankEnvelope.e_macro,
1396 						  A_TEMP,
1397 						  macid("{auth_ssf}"), pbuf);
1398 					if (tTd(95, 8))
1399 						sm_dprintf("AUTH auth_ssf: %u\n",
1400 							   *ssf);
1401 				}
1402 
1403 				/*
1404 				**  Only switch to encrypted connection
1405 				**  if a security layer has been negotiated
1406 				*/
1407 
1408 				if (ssf != NULL && *ssf > 0)
1409 				{
1410 					int tmo;
1411 
1412 					/*
1413 					**  Convert I/O layer to use SASL.
1414 					**  If the call fails, the connection
1415 					**  is aborted.
1416 					*/
1417 
1418 					tmo = TimeOuts.to_datablock * 1000;
1419 					if (sfdcsasl(&InChannel, &OutChannel,
1420 						     conn, tmo) == 0)
1421 					{
1422 						/* restart dialogue */
1423 						n_helo = 0;
1424 # if PIPELINING
1425 						(void) sm_io_autoflush(InChannel,
1426 								       OutChannel);
1427 # endif /* PIPELINING */
1428 					}
1429 					else
1430 						syserr("503 5.3.3 SASL TLS failed");
1431 				}
1432 
1433 				/* NULL pointer ok since it's our function */
1434 				if (LogLevel > 8)
1435 					sm_syslog(LOG_INFO, NOQID,
1436 						  "AUTH=server, relay=%s, authid=%.128s, mech=%.16s, bits=%d",
1437 						  CurSmtpClient,
1438 						  shortenstring(user, 128),
1439 						  auth_type, *ssf);
1440 			}
1441 			else if (result == SASL_CONTINUE)
1442 			{
1443 				len = ENC64LEN(outlen);
1444 				out2 = xalloc(len);
1445 				result = sasl_encode64(out, outlen, out2, len,
1446 						       &out2len);
1447 				if (result != SASL_OK)
1448 				{
1449 					/* correct code? XXX */
1450 					/* 454 Temp. authentication failure */
1451 					message("454 4.5.4 Internal error: unable to encode64");
1452 					if (LogLevel > 5)
1453 						sm_syslog(LOG_WARNING, e->e_id,
1454 							  "AUTH encode64 error [%d for \"%s\"], relay=%.100s",
1455 							  result, out,
1456 							  CurSmtpClient);
1457 					/* start over? */
1458 					authenticating = SASL_NOT_AUTH;
1459 				}
1460 				else
1461 				{
1462 					message("334 %s", out2);
1463 					if (tTd(95, 2))
1464 						sm_dprintf("AUTH continue: msg='%s' len=%u\n",
1465 							   out2, out2len);
1466 				}
1467 # if SASL >= 20000
1468 				sm_free(out2);
1469 # endif /* SASL >= 20000 */
1470 			}
1471 			else
1472 			{
1473 				/* not SASL_OK or SASL_CONT */
1474 				message("535 5.7.0 authentication failed");
1475 				if (LogLevel > 9)
1476 					sm_syslog(LOG_WARNING, e->e_id,
1477 						  "AUTH failure (%s): %s (%d) %s, relay=%.100s",
1478 						  auth_type,
1479 						  sasl_errstring(result, NULL,
1480 								 NULL),
1481 						  result,
1482 # if SASL >= 20000
1483 						  sasl_errdetail(conn),
1484 # else /* SASL >= 20000 */
1485 						  errstr == NULL ? "" : errstr,
1486 # endif /* SASL >= 20000 */
1487 						  CurSmtpClient);
1488 				RESET_SASLCONN;
1489 				authenticating = SASL_NOT_AUTH;
1490 			}
1491 		}
1492 		else
1493 		{
1494 			/* don't want to do any of this if authenticating */
1495 #endif /* SASL */
1496 
1497 		/* echo command to transcript */
1498 		if (e->e_xfp != NULL)
1499 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
1500 					     "<<< %s\n", inp);
1501 
1502 		if (LogLevel > 14)
1503 			sm_syslog(LOG_INFO, e->e_id, "<-- %s", inp);
1504 
1505 		/* break off command */
1506 		for (p = inp; isascii(*p) && isspace(*p); p++)
1507 			continue;
1508 		cmd = cmdbuf;
1509 		while (*p != '\0' &&
1510 		       !(isascii(*p) && isspace(*p)) &&
1511 		       cmd < &cmdbuf[sizeof(cmdbuf) - 2])
1512 			*cmd++ = *p++;
1513 		*cmd = '\0';
1514 
1515 		/* throw away leading whitespace */
1516 		SKIP_SPACE(p);
1517 
1518 		/* decode command */
1519 		for (c = CmdTab; c->cmd_name != NULL; c++)
1520 		{
1521 			if (sm_strcasecmp(c->cmd_name, cmdbuf) == 0)
1522 				break;
1523 		}
1524 
1525 		/* reset errors */
1526 		errno = 0;
1527 
1528 		/* check whether a "non-null" command has been used */
1529 		switch (c->cmd_code)
1530 		{
1531 #if SASL
1532 		  case CMDAUTH:
1533 			/* avoid information leak; take first two words? */
1534 			q = "AUTH";
1535 			break;
1536 #endif /* SASL */
1537 
1538 		  case CMDMAIL:
1539 		  case CMDEXPN:
1540 		  case CMDVRFY:
1541 		  case CMDETRN:
1542 			lognullconnection = false;
1543 			/* FALLTHROUGH */
1544 		  default:
1545 			q = inp;
1546 			break;
1547 		}
1548 
1549 		if (e->e_id == NULL)
1550 			sm_setproctitle(true, e, "%s: %.80s",
1551 					CurSmtpClient, q);
1552 		else
1553 			sm_setproctitle(true, e, "%s %s: %.80s",
1554 					qid_printname(e),
1555 					CurSmtpClient, q);
1556 
1557 		/*
1558 		**  Process command.
1559 		**
1560 		**	If we are running as a null server, return 550
1561 		**	to almost everything.
1562 		*/
1563 
1564 		if (nullserver != NULL || bitnset(D_ETRNONLY, d_flags))
1565 		{
1566 			switch (c->cmd_code)
1567 			{
1568 			  case CMDQUIT:
1569 			  case CMDHELO:
1570 			  case CMDEHLO:
1571 			  case CMDNOOP:
1572 			  case CMDRSET:
1573 			  case CMDERROR:
1574 				/* process normally */
1575 				break;
1576 
1577 			  case CMDETRN:
1578 				if (bitnset(D_ETRNONLY, d_flags) &&
1579 				    nullserver == NULL)
1580 					break;
1581 				DELAY_CONN("ETRN");
1582 				/* FALLTHROUGH */
1583 
1584 			  default:
1585 #if MAXBADCOMMANDS > 0
1586 				/* theoretically this could overflow */
1587 				if (nullserver != NULL &&
1588 				    ++n_badcmds > MAXBADCOMMANDS)
1589 				{
1590 					message("421 4.7.0 %s Too many bad commands; closing connection",
1591 						MyHostName);
1592 
1593 					/* arrange to ignore send list */
1594 					e->e_sendqueue = NULL;
1595 					goto doquit;
1596 				}
1597 #endif /* MAXBADCOMMANDS > 0 */
1598 				if (nullserver != NULL)
1599 				{
1600 					if (ISSMTPREPLY(nullserver))
1601 						usrerr(nullserver);
1602 					else
1603 						usrerr("550 5.0.0 %s",
1604 						       nullserver);
1605 				}
1606 				else
1607 					usrerr("452 4.4.5 Insufficient disk space; try again later");
1608 				continue;
1609 			}
1610 		}
1611 
1612 		switch (c->cmd_code)
1613 		{
1614 #if SASL
1615 		  case CMDAUTH: /* sasl */
1616 			DELAY_CONN("AUTH");
1617 			if (!sasl_ok || n_mechs <= 0)
1618 			{
1619 				message("503 5.3.3 AUTH not available");
1620 				break;
1621 			}
1622 			if (authenticating == SASL_IS_AUTH)
1623 			{
1624 				message("503 5.5.0 Already Authenticated");
1625 				break;
1626 			}
1627 			if (smtp.sm_gotmail)
1628 			{
1629 				message("503 5.5.0 AUTH not permitted during a mail transaction");
1630 				break;
1631 			}
1632 			if (tempfail)
1633 			{
1634 				if (LogLevel > 9)
1635 					sm_syslog(LOG_INFO, e->e_id,
1636 						  "SMTP AUTH command (%.100s) from %s tempfailed (due to previous checks)",
1637 						  p, CurSmtpClient);
1638 				usrerr("454 4.3.0 Please try again later");
1639 				break;
1640 			}
1641 
1642 			ismore = false;
1643 
1644 			/* crude way to avoid crack attempts */
1645 			STOP_IF_ATTACK(checksmtpattack(&n_auth, n_mechs + 1,
1646 							true, "AUTH", e));
1647 
1648 			/* make sure mechanism (p) is a valid string */
1649 			for (q = p; *q != '\0' && isascii(*q); q++)
1650 			{
1651 				if (isspace(*q))
1652 				{
1653 					*q = '\0';
1654 					while (*++q != '\0' &&
1655 					       isascii(*q) && isspace(*q))
1656 						continue;
1657 					*(q - 1) = '\0';
1658 					ismore = (*q != '\0');
1659 					break;
1660 				}
1661 			}
1662 
1663 			if (*p == '\0')
1664 			{
1665 				message("501 5.5.2 AUTH mechanism must be specified");
1666 				break;
1667 			}
1668 
1669 			/* check whether mechanism is available */
1670 			if (iteminlist(p, mechlist, " ") == NULL)
1671 			{
1672 				message("504 5.3.3 AUTH mechanism %.32s not available",
1673 					p);
1674 				break;
1675 			}
1676 
1677 			/*
1678 			**  RFC 2554 4.
1679 			**  Unlike a zero-length client answer to a
1680 			**  334 reply, a zero- length initial response
1681 			**  is sent as a single equals sign ("=").
1682 			*/
1683 
1684 			if (ismore && *q == '=' && *(q + 1) == '\0')
1685 			{
1686 				/* will be free()d, don't use in=""; */
1687 				in = xalloc(1);
1688 				*in = '\0';
1689 				inlen = 0;
1690 			}
1691 			else if (ismore)
1692 			{
1693 				/* could this be shorter? XXX */
1694 # if SASL >= 20000
1695 				in = xalloc(strlen(q) + 1);
1696 				result = sasl_decode64(q, strlen(q), in,
1697 						       strlen(q), &inlen);
1698 # else /* SASL >= 20000 */
1699 				in = sm_rpool_malloc(e->e_rpool, strlen(q));
1700 				result = sasl_decode64(q, strlen(q), in,
1701 						       &inlen);
1702 # endif /* SASL >= 20000 */
1703 				if (result != SASL_OK)
1704 				{
1705 					message("501 5.5.4 cannot BASE64 decode '%s'",
1706 						q);
1707 					if (LogLevel > 5)
1708 						sm_syslog(LOG_WARNING, e->e_id,
1709 							  "AUTH decode64 error [%d for \"%s\"], relay=%.100s",
1710 							  result, q,
1711 							  CurSmtpClient);
1712 					/* start over? */
1713 					authenticating = SASL_NOT_AUTH;
1714 # if SASL >= 20000
1715 					sm_free(in);
1716 # endif /* SASL >= 20000 */
1717 					in = NULL;
1718 					inlen = 0;
1719 					break;
1720 				}
1721 			}
1722 			else
1723 			{
1724 				in = NULL;
1725 				inlen = 0;
1726 			}
1727 
1728 			/* see if that auth type exists */
1729 # if SASL >= 20000
1730 			result = sasl_server_start(conn, p, in, inlen,
1731 						   &out, &outlen);
1732 			if (in != NULL)
1733 				sm_free(in);
1734 # else /* SASL >= 20000 */
1735 			result = sasl_server_start(conn, p, in, inlen,
1736 						   &out, &outlen, &errstr);
1737 # endif /* SASL >= 20000 */
1738 
1739 			if (result != SASL_OK && result != SASL_CONTINUE)
1740 			{
1741 				message("535 5.7.0 authentication failed");
1742 				if (LogLevel > 9)
1743 					sm_syslog(LOG_ERR, e->e_id,
1744 						  "AUTH failure (%s): %s (%d) %s, relay=%.100s",
1745 						  p,
1746 						  sasl_errstring(result, NULL,
1747 								 NULL),
1748 						  result,
1749 # if SASL >= 20000
1750 						  sasl_errdetail(conn),
1751 # else /* SASL >= 20000 */
1752 						  errstr,
1753 # endif /* SASL >= 20000 */
1754 						  CurSmtpClient);
1755 				RESET_SASLCONN;
1756 				break;
1757 			}
1758 			auth_type = newstr(p);
1759 
1760 			if (result == SASL_OK)
1761 			{
1762 				/* ugly, but same code */
1763 				goto authenticated;
1764 				/* authenticated by the initial response */
1765 			}
1766 
1767 			/* len is at least 2 */
1768 			len = ENC64LEN(outlen);
1769 			out2 = xalloc(len);
1770 			result = sasl_encode64(out, outlen, out2, len,
1771 					       &out2len);
1772 
1773 			if (result != SASL_OK)
1774 			{
1775 				message("454 4.5.4 Temporary authentication failure");
1776 				if (LogLevel > 5)
1777 					sm_syslog(LOG_WARNING, e->e_id,
1778 						  "AUTH encode64 error [%d for \"%s\"]",
1779 						  result, out);
1780 
1781 				/* start over? */
1782 				authenticating = SASL_NOT_AUTH;
1783 				RESET_SASLCONN;
1784 			}
1785 			else
1786 			{
1787 				message("334 %s", out2);
1788 				authenticating = SASL_PROC_AUTH;
1789 			}
1790 # if SASL >= 20000
1791 			sm_free(out2);
1792 # endif /* SASL >= 20000 */
1793 			break;
1794 #endif /* SASL */
1795 
1796 #if STARTTLS
1797 		  case CMDSTLS: /* starttls */
1798 			DELAY_CONN("STARTTLS");
1799 			if (*p != '\0')
1800 			{
1801 				message("501 5.5.2 Syntax error (no parameters allowed)");
1802 				break;
1803 			}
1804 			if (!bitset(SRV_OFFER_TLS, features))
1805 			{
1806 				message("503 5.5.0 TLS not available");
1807 				break;
1808 			}
1809 			if (!tls_ok_srv)
1810 			{
1811 				message("454 4.3.3 TLS not available after start");
1812 				break;
1813 			}
1814 			if (smtp.sm_gotmail)
1815 			{
1816 				message("503 5.5.0 TLS not permitted during a mail transaction");
1817 				break;
1818 			}
1819 			if (tempfail)
1820 			{
1821 				if (LogLevel > 9)
1822 					sm_syslog(LOG_INFO, e->e_id,
1823 						  "SMTP STARTTLS command (%.100s) from %s tempfailed (due to previous checks)",
1824 						  p, CurSmtpClient);
1825 				usrerr("454 4.7.0 Please try again later");
1826 				break;
1827 			}
1828   starttls:
1829 # if USE_OPENSSL_ENGINE
1830 			if (!SSLEngineInitialized)
1831 			{
1832 				if (!SSL_set_engine(NULL))
1833 				{
1834 					sm_syslog(LOG_ERR, NOQID,
1835 						  "STARTTLS=server, SSL_set_engine=failed");
1836 					tls_ok_srv = false;
1837 					message("454 4.3.3 TLS not available right now");
1838 					break;
1839 				}
1840 				else
1841 					SSLEngineInitialized = true;
1842 			}
1843 # endif /* USE_OPENSSL_ENGINE */
1844 # if TLS_NO_RSA
1845 			/*
1846 			**  XXX do we need a temp key ?
1847 			*/
1848 # else /* TLS_NO_RSA */
1849 # endif /* TLS_NO_RSA */
1850 
1851 # if TLS_VRFY_PER_CTX
1852 			/*
1853 			**  Note: this sets the verification globally
1854 			**  (per SSL_CTX)
1855 			**  it's ok since it applies only to one transaction
1856 			*/
1857 
1858 			TLS_VERIFY_CLIENT();
1859 # endif /* TLS_VRFY_PER_CTX */
1860 
1861 			if (srv_ssl != NULL)
1862 				SSL_clear(srv_ssl);
1863 			else if ((srv_ssl = SSL_new(srv_ctx)) == NULL)
1864 			{
1865 				message("454 4.3.3 TLS not available: error generating SSL handle");
1866 				if (LogLevel > 8)
1867 					tlslogerr(LOG_WARNING, "server");
1868 				goto tls_done;
1869 			}
1870 
1871 # if !TLS_VRFY_PER_CTX
1872 			/*
1873 			**  this could be used if it were possible to set
1874 			**  verification per SSL (connection)
1875 			**  not just per SSL_CTX (global)
1876 			*/
1877 
1878 			TLS_VERIFY_CLIENT();
1879 # endif /* !TLS_VRFY_PER_CTX */
1880 
1881 			rfd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
1882 			wfd = sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL);
1883 
1884 			if (rfd < 0 || wfd < 0 ||
1885 			    SSL_set_rfd(srv_ssl, rfd) <= 0 ||
1886 			    SSL_set_wfd(srv_ssl, wfd) <= 0)
1887 			{
1888 				message("454 4.3.3 TLS not available: error set fd");
1889 				SSL_free(srv_ssl);
1890 				srv_ssl = NULL;
1891 				goto tls_done;
1892 			}
1893 			if (!smtps)
1894 				message("220 2.0.0 Ready to start TLS");
1895 # if PIPELINING
1896 			(void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
1897 # endif /* PIPELINING */
1898 
1899 			SSL_set_accept_state(srv_ssl);
1900 
1901 #  define SSL_ACC(s)	SSL_accept(s)
1902 
1903 			tlsstart = curtime();
1904   ssl_retry:
1905 			if ((r = SSL_ACC(srv_ssl)) <= 0)
1906 			{
1907 				int i, ssl_err;
1908 
1909 				ssl_err = SSL_get_error(srv_ssl, r);
1910 				i = tls_retry(srv_ssl, rfd, wfd, tlsstart,
1911 						TimeOuts.to_starttls, ssl_err,
1912 						"server");
1913 				if (i > 0)
1914 					goto ssl_retry;
1915 
1916 				if (LogLevel > 5)
1917 				{
1918 					unsigned long l;
1919 					const char *sr;
1920 
1921 					l = ERR_peek_error();
1922 					sr = ERR_reason_error_string(l);
1923 					sm_syslog(LOG_WARNING, NOQID,
1924 						  "STARTTLS=server, error: accept failed=%d, reason=%s, SSL_error=%d, errno=%d, retry=%d, relay=%.100s",
1925 						  r, sr == NULL ? "unknown"
1926 								: sr,
1927 						  ssl_err, errno, i,
1928 						  CurSmtpClient);
1929 					if (LogLevel > 9)
1930 						tlslogerr(LOG_WARNING, "server");
1931 				}
1932 				tls_ok_srv = false;
1933 				SSL_free(srv_ssl);
1934 				srv_ssl = NULL;
1935 
1936 				/*
1937 				**  according to the next draft of
1938 				**  RFC 2487 the connection should be dropped
1939 				*/
1940 
1941 				/* arrange to ignore any current send list */
1942 				e->e_sendqueue = NULL;
1943 				goto doquit;
1944 			}
1945 
1946 			/* ignore return code for now, it's in {verify} */
1947 			(void) tls_get_info(srv_ssl, true,
1948 					    CurSmtpClient,
1949 					    &BlankEnvelope.e_macro,
1950 					    bitset(SRV_VRFY_CLT, features));
1951 
1952 			/*
1953 			**  call Stls_client to find out whether
1954 			**  to accept the connection from the client
1955 			*/
1956 
1957 			saveQuickAbort = QuickAbort;
1958 			saveSuprErrs = SuprErrs;
1959 			SuprErrs = true;
1960 			QuickAbort = false;
1961 			if (rscheck("tls_client",
1962 				     macvalue(macid("{verify}"), e),
1963 				     "STARTTLS", e,
1964 				     RSF_RMCOMM|RSF_COUNT,
1965 				     5, NULL, NOQID, NULL) != EX_OK ||
1966 			    Errors > 0)
1967 			{
1968 				extern char MsgBuf[];
1969 
1970 				if (MsgBuf[0] != '\0' && ISSMTPREPLY(MsgBuf))
1971 					nullserver = newstr(MsgBuf);
1972 				else
1973 					nullserver = "503 5.7.0 Authentication required.";
1974 			}
1975 			QuickAbort = saveQuickAbort;
1976 			SuprErrs = saveSuprErrs;
1977 
1978 			tls_ok_srv = false;	/* don't offer STARTTLS again */
1979 			n_helo = 0;
1980 # if SASL
1981 			if (sasl_ok)
1982 			{
1983 				int cipher_bits;
1984 				bool verified;
1985 				char *s, *v, *c;
1986 
1987 				s = macvalue(macid("{cipher_bits}"), e);
1988 				v = macvalue(macid("{verify}"), e);
1989 				c = macvalue(macid("{cert_subject}"), e);
1990 				verified = (v != NULL && strcmp(v, "OK") == 0);
1991 				if (s != NULL && (cipher_bits = atoi(s)) > 0)
1992 				{
1993 #  if SASL >= 20000
1994 					ext_ssf = cipher_bits;
1995 					auth_id = verified ? c : NULL;
1996 					sasl_ok = ((sasl_setprop(conn,
1997 							SASL_SSF_EXTERNAL,
1998 							&ext_ssf) == SASL_OK) &&
1999 						   (sasl_setprop(conn,
2000 							SASL_AUTH_EXTERNAL,
2001 							auth_id) == SASL_OK));
2002 #  else /* SASL >= 20000 */
2003 					ext_ssf.ssf = cipher_bits;
2004 					ext_ssf.auth_id = verified ? c : NULL;
2005 					sasl_ok = sasl_setprop(conn,
2006 							SASL_SSF_EXTERNAL,
2007 							&ext_ssf) == SASL_OK;
2008 #  endif /* SASL >= 20000 */
2009 					mechlist = NULL;
2010 					if (sasl_ok)
2011 						n_mechs = saslmechs(conn,
2012 								    &mechlist);
2013 				}
2014 			}
2015 # endif /* SASL */
2016 
2017 			/* switch to secure connection */
2018 			if (sfdctls(&InChannel, &OutChannel, srv_ssl) == 0)
2019 			{
2020 				tls_active = true;
2021 # if PIPELINING
2022 				(void) sm_io_autoflush(InChannel, OutChannel);
2023 # endif /* PIPELINING */
2024 			}
2025 			else
2026 			{
2027 				/*
2028 				**  XXX this is an internal error
2029 				**  how to deal with it?
2030 				**  we can't generate an error message
2031 				**  since the other side switched to an
2032 				**  encrypted layer, but we could not...
2033 				**  just "hang up"?
2034 				*/
2035 
2036 				nullserver = "454 4.3.3 TLS not available: can't switch to encrypted layer";
2037 				syserr("STARTTLS: can't switch to encrypted layer");
2038 			}
2039 		  tls_done:
2040 			if (smtps)
2041 			{
2042 				if (tls_active)
2043 					goto greeting;
2044 				else
2045 					goto doquit;
2046 			}
2047 			break;
2048 #endif /* STARTTLS */
2049 
2050 		  case CMDHELO:		/* hello -- introduce yourself */
2051 		  case CMDEHLO:		/* extended hello */
2052 			DELAY_CONN("EHLO");
2053 			if (c->cmd_code == CMDEHLO)
2054 			{
2055 				protocol = "ESMTP";
2056 				SmtpPhase = "server EHLO";
2057 			}
2058 			else
2059 			{
2060 				protocol = "SMTP";
2061 				SmtpPhase = "server HELO";
2062 			}
2063 
2064 			/* avoid denial-of-service */
2065 			STOP_IF_ATTACK(checksmtpattack(&n_helo, MAXHELOCOMMANDS,
2066 							true, "HELO/EHLO", e));
2067 
2068 #if 0
2069 			/* RFC2821 4.1.4 allows duplicate HELO/EHLO */
2070 			/* check for duplicate HELO/EHLO per RFC 1651 4.2 */
2071 			if (gothello)
2072 			{
2073 				usrerr("503 %s Duplicate HELO/EHLO",
2074 				       MyHostName);
2075 				break;
2076 			}
2077 #endif /* 0 */
2078 
2079 			/* check for valid domain name (re 1123 5.2.5) */
2080 			if (*p == '\0' && !AllowBogusHELO)
2081 			{
2082 				usrerr("501 %s requires domain address",
2083 					cmdbuf);
2084 				break;
2085 			}
2086 
2087 			/* check for long domain name (hides Received: info) */
2088 			if (strlen(p) > MAXNAME)
2089 			{
2090 				usrerr("501 Invalid domain name");
2091 				if (LogLevel > 9)
2092 					sm_syslog(LOG_INFO, CurEnv->e_id,
2093 						  "invalid domain name (too long) from %s",
2094 						  CurSmtpClient);
2095 				break;
2096 			}
2097 
2098 			ok = true;
2099 			for (q = p; *q != '\0'; q++)
2100 			{
2101 				if (!isascii(*q))
2102 					break;
2103 				if (isalnum(*q))
2104 					continue;
2105 				if (isspace(*q))
2106 				{
2107 					*q = '\0';
2108 
2109 					/* only complain if strict check */
2110 					ok = AllowBogusHELO;
2111 
2112 					/* allow trailing whitespace */
2113 					while (!ok && *++q != '\0' &&
2114 					       isspace(*q))
2115 						;
2116 					if (*q == '\0')
2117 						ok = true;
2118 					break;
2119 				}
2120 				if (strchr("[].-_#:", *q) == NULL)
2121 					break;
2122 			}
2123 
2124 			if (*q == '\0' && ok)
2125 			{
2126 				q = "pleased to meet you";
2127 				sendinghost = sm_strdup_x(p);
2128 			}
2129 			else if (!AllowBogusHELO)
2130 			{
2131 				usrerr("501 Invalid domain name");
2132 				if (LogLevel > 9)
2133 					sm_syslog(LOG_INFO, CurEnv->e_id,
2134 						  "invalid domain name (%s) from %.100s",
2135 						  p, CurSmtpClient);
2136 				break;
2137 			}
2138 			else
2139 			{
2140 				q = "accepting invalid domain name";
2141 			}
2142 
2143 			if (gothello || smtp.sm_gotmail)
2144 				CLEAR_STATE(cmdbuf);
2145 
2146 #if MILTER
2147 			if (smtp.sm_milterlist && smtp.sm_milterize &&
2148 			    !bitset(EF_DISCARD, e->e_flags))
2149 			{
2150 				char state;
2151 				char *response;
2152 
2153 				response = milter_helo(p, e, &state);
2154 				switch (state)
2155 				{
2156 				  case SMFIR_REJECT:
2157 					if (MilterLogLevel > 3)
2158 						sm_syslog(LOG_INFO, e->e_id,
2159 							  "Milter: helo=%s, reject=Command rejected",
2160 							  p);
2161 					nullserver = "Command rejected";
2162 					smtp.sm_milterize = false;
2163 					break;
2164 
2165 				  case SMFIR_TEMPFAIL:
2166 					if (MilterLogLevel > 3)
2167 						sm_syslog(LOG_INFO, e->e_id,
2168 							  "Milter: helo=%s, reject=%s",
2169 							  p, MSG_TEMPFAIL);
2170 					tempfail = true;
2171 					smtp.sm_milterize = false;
2172 					break;
2173 
2174 				  case SMFIR_REPLYCODE:
2175 					if (MilterLogLevel > 3)
2176 						sm_syslog(LOG_INFO, e->e_id,
2177 							  "Milter: helo=%s, reject=%s",
2178 							  p, response);
2179 					if (strncmp(response, "421 ", 4) != 0
2180 					    && strncmp(response, "421-", 4) != 0)
2181 					{
2182 						nullserver = newstr(response);
2183 						smtp.sm_milterize = false;
2184 						break;
2185 					}
2186 					/* FALLTHROUGH */
2187 
2188 				  case SMFIR_SHUTDOWN:
2189 					if (MilterLogLevel > 3 &&
2190 					    response == NULL)
2191 						sm_syslog(LOG_INFO, e->e_id,
2192 							  "Milter: helo=%s, reject=421 4.7.0 %s closing connection",
2193 							  p, MyHostName);
2194 					tempfail = true;
2195 					smtp.sm_milterize = false;
2196 					if (response != NULL)
2197 						usrerr(response);
2198 					else
2199 						message("421 4.7.0 %s closing connection",
2200 							MyHostName);
2201 					/* arrange to ignore send list */
2202 					e->e_sendqueue = NULL;
2203 					lognullconnection = false;
2204 					goto doquit;
2205 				}
2206 				if (response != NULL)
2207 					sm_free(response);
2208 
2209 				/*
2210 				**  If quarantining by a connect/ehlo action,
2211 				**  save between messages
2212 				*/
2213 
2214 				if (smtp.sm_quarmsg == NULL &&
2215 				    e->e_quarmsg != NULL)
2216 					smtp.sm_quarmsg = newstr(e->e_quarmsg);
2217 			}
2218 #endif /* MILTER */
2219 			gothello = true;
2220 
2221 			/* print HELO response message */
2222 			if (c->cmd_code != CMDEHLO)
2223 			{
2224 				message("250 %s Hello %s, %s",
2225 					MyHostName, CurSmtpClient, q);
2226 				break;
2227 			}
2228 
2229 			message("250-%s Hello %s, %s",
2230 				MyHostName, CurSmtpClient, q);
2231 
2232 			/* offer ENHSC even for nullserver */
2233 			if (nullserver != NULL)
2234 			{
2235 				message("250 ENHANCEDSTATUSCODES");
2236 				break;
2237 			}
2238 
2239 			/*
2240 			**  print EHLO features list
2241 			**
2242 			**  Note: If you change this list,
2243 			**	  remember to update 'helpfile'
2244 			*/
2245 
2246 			message("250-ENHANCEDSTATUSCODES");
2247 #if PIPELINING
2248 			if (bitset(SRV_OFFER_PIPE, features))
2249 				message("250-PIPELINING");
2250 #endif /* PIPELINING */
2251 			if (bitset(SRV_OFFER_EXPN, features))
2252 			{
2253 				message("250-EXPN");
2254 				if (bitset(SRV_OFFER_VERB, features))
2255 					message("250-VERB");
2256 			}
2257 #if MIME8TO7
2258 			message("250-8BITMIME");
2259 #endif /* MIME8TO7 */
2260 			if (MaxMessageSize > 0)
2261 				message("250-SIZE %ld", MaxMessageSize);
2262 			else
2263 				message("250-SIZE");
2264 #if DSN
2265 			if (SendMIMEErrors && bitset(SRV_OFFER_DSN, features))
2266 				message("250-DSN");
2267 #endif /* DSN */
2268 			if (bitset(SRV_OFFER_ETRN, features))
2269 				message("250-ETRN");
2270 #if SASL
2271 			if (sasl_ok && mechlist != NULL && *mechlist != '\0')
2272 				message("250-AUTH %s", mechlist);
2273 #endif /* SASL */
2274 #if STARTTLS
2275 			if (tls_ok_srv && bitset(SRV_OFFER_TLS, features))
2276 				message("250-STARTTLS");
2277 #endif /* STARTTLS */
2278 			if (DeliverByMin > 0)
2279 				message("250-DELIVERBY %ld",
2280 					(long) DeliverByMin);
2281 			else if (DeliverByMin == 0)
2282 				message("250-DELIVERBY");
2283 
2284 			/* < 0: no deliver-by */
2285 
2286 			message("250 HELP");
2287 			break;
2288 
2289 		  case CMDMAIL:		/* mail -- designate sender */
2290 			SmtpPhase = "server MAIL";
2291 			DELAY_CONN("MAIL");
2292 
2293 			/* check for validity of this command */
2294 			if (!gothello && bitset(PRIV_NEEDMAILHELO, PrivacyFlags))
2295 			{
2296 				usrerr("503 5.0.0 Polite people say HELO first");
2297 				break;
2298 			}
2299 			if (smtp.sm_gotmail)
2300 			{
2301 				usrerr("503 5.5.0 Sender already specified");
2302 				break;
2303 			}
2304 #if SASL
2305 			if (bitset(SRV_REQ_AUTH, features) &&
2306 			    authenticating != SASL_IS_AUTH)
2307 			{
2308 				usrerr("530 5.7.0 Authentication required");
2309 				break;
2310 			}
2311 #endif /* SASL */
2312 
2313 			p = skipword(p, "from");
2314 			if (p == NULL)
2315 				break;
2316 			if (tempfail)
2317 			{
2318 				if (LogLevel > 9)
2319 					sm_syslog(LOG_INFO, e->e_id,
2320 						  "SMTP MAIL command (%.100s) from %s tempfailed (due to previous checks)",
2321 						  p, CurSmtpClient);
2322 				usrerr(MSG_TEMPFAIL);
2323 				break;
2324 			}
2325 
2326 			/* make sure we know who the sending host is */
2327 			if (sendinghost == NULL)
2328 				sendinghost = peerhostname;
2329 
2330 
2331 #if SM_HEAP_CHECK
2332 			if (sm_debug_active(&DebugLeakSmtp, 1))
2333 			{
2334 				sm_heap_newgroup();
2335 				sm_dprintf("smtp() heap group #%d\n",
2336 					sm_heap_group());
2337 			}
2338 #endif /* SM_HEAP_CHECK */
2339 
2340 			if (Errors > 0)
2341 				goto undo_no_pm;
2342 			if (!gothello)
2343 			{
2344 				auth_warning(e, "%s didn't use HELO protocol",
2345 					     CurSmtpClient);
2346 			}
2347 #ifdef PICKY_HELO_CHECK
2348 			if (sm_strcasecmp(sendinghost, peerhostname) != 0 &&
2349 			    (sm_strcasecmp(peerhostname, "localhost") != 0 ||
2350 			     sm_strcasecmp(sendinghost, MyHostName) != 0))
2351 			{
2352 				auth_warning(e, "Host %s claimed to be %s",
2353 					     CurSmtpClient, sendinghost);
2354 			}
2355 #endif /* PICKY_HELO_CHECK */
2356 
2357 			if (protocol == NULL)
2358 				protocol = "SMTP";
2359 			macdefine(&e->e_macro, A_PERM, 'r', protocol);
2360 			macdefine(&e->e_macro, A_PERM, 's', sendinghost);
2361 
2362 			if (Errors > 0)
2363 				goto undo_no_pm;
2364 			smtp.sm_nrcpts = 0;
2365 			n_badrcpts = 0;
2366 			macdefine(&e->e_macro, A_PERM, macid("{ntries}"), "0");
2367 			macdefine(&e->e_macro, A_PERM, macid("{nrcpts}"), "0");
2368 			macdefine(&e->e_macro, A_PERM, macid("{nbadrcpts}"),
2369 				"0");
2370 			e->e_flags |= EF_CLRQUEUE;
2371 			sm_setproctitle(true, e, "%s %s: %.80s",
2372 					qid_printname(e),
2373 					CurSmtpClient, inp);
2374 
2375 			/* do the processing */
2376 		    SM_TRY
2377 		    {
2378 			extern char *FullName;
2379 
2380 			QuickAbort = true;
2381 			SM_FREE_CLR(FullName);
2382 
2383 			/* must parse sender first */
2384 			delimptr = NULL;
2385 			setsender(p, e, &delimptr, ' ', false);
2386 			if (delimptr != NULL && *delimptr != '\0')
2387 				*delimptr++ = '\0';
2388 			if (Errors > 0)
2389 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2390 
2391 			/* Successfully set e_from, allow logging */
2392 			e->e_flags |= EF_LOGSENDER;
2393 
2394 			/* put resulting triple from parseaddr() into macros */
2395 			if (e->e_from.q_mailer != NULL)
2396 				 macdefine(&e->e_macro, A_PERM,
2397 					macid("{mail_mailer}"),
2398 					e->e_from.q_mailer->m_name);
2399 			else
2400 				 macdefine(&e->e_macro, A_PERM,
2401 					macid("{mail_mailer}"), NULL);
2402 			if (e->e_from.q_host != NULL)
2403 				macdefine(&e->e_macro, A_PERM,
2404 					macid("{mail_host}"),
2405 					e->e_from.q_host);
2406 			else
2407 				macdefine(&e->e_macro, A_PERM,
2408 					macid("{mail_host}"), "localhost");
2409 			if (e->e_from.q_user != NULL)
2410 				macdefine(&e->e_macro, A_PERM,
2411 					macid("{mail_addr}"),
2412 					e->e_from.q_user);
2413 			else
2414 				macdefine(&e->e_macro, A_PERM,
2415 					macid("{mail_addr}"), NULL);
2416 			if (Errors > 0)
2417 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2418 
2419 			/* check for possible spoofing */
2420 			if (RealUid != 0 && OpMode == MD_SMTP &&
2421 			    !wordinclass(RealUserName, 't') &&
2422 			    (!bitnset(M_LOCALMAILER,
2423 				      e->e_from.q_mailer->m_flags) ||
2424 			     strcmp(e->e_from.q_user, RealUserName) != 0))
2425 			{
2426 				auth_warning(e, "%s owned process doing -bs",
2427 					RealUserName);
2428 			}
2429 
2430 			/* reset to default value */
2431 			SevenBitInput = SevenBitInput_Saved;
2432 
2433 			/* now parse ESMTP arguments */
2434 			e->e_msgsize = 0;
2435 			addr = p;
2436 			parse_esmtp_args(e, NULL, p, delimptr, "MAIL", args,
2437 					mail_esmtp_args);
2438 			if (Errors > 0)
2439 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2440 
2441 #if SASL
2442 # if _FFR_AUTH_PASSING
2443 			/* set the default AUTH= if the sender didn't */
2444 			if (e->e_auth_param == NULL)
2445 			{
2446 				/* XXX only do this for an MSA? */
2447 				e->e_auth_param = macvalue(macid("{auth_authen}"),
2448 							   e);
2449 				if (e->e_auth_param == NULL)
2450 					e->e_auth_param = "<>";
2451 
2452 				/*
2453 				**  XXX should we invoke Strust_auth now?
2454 				**  authorizing as the client that just
2455 				**  authenticated, so we'll trust implicitly
2456 				*/
2457 			}
2458 # endif /* _FFR_AUTH_PASSING */
2459 #endif /* SASL */
2460 
2461 			/* do config file checking of the sender */
2462 			macdefine(&e->e_macro, A_PERM,
2463 				macid("{addr_type}"), "e s");
2464 #if _FFR_MAIL_MACRO
2465 			/* make the "real" sender address available */
2466 			macdefine(&e->e_macro, A_TEMP, macid("{mail_from}"),
2467 				  e->e_from.q_paddr);
2468 #endif /* _FFR_MAIL_MACRO */
2469 			if (rscheck("check_mail", addr,
2470 				    NULL, e, RSF_RMCOMM|RSF_COUNT, 3,
2471 				    NULL, e->e_id, NULL) != EX_OK ||
2472 			    Errors > 0)
2473 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2474 			macdefine(&e->e_macro, A_PERM,
2475 				  macid("{addr_type}"), NULL);
2476 
2477 			if (MaxMessageSize > 0 &&
2478 			    (e->e_msgsize > MaxMessageSize ||
2479 			     e->e_msgsize < 0))
2480 			{
2481 				usrerr("552 5.2.3 Message size exceeds fixed maximum message size (%ld)",
2482 					MaxMessageSize);
2483 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2484 			}
2485 
2486 			/*
2487 			**  XXX always check whether there is at least one fs
2488 			**  with enough space?
2489 			**  However, this may not help much: the queue group
2490 			**  selection may later on select a FS that hasn't
2491 			**  enough space.
2492 			*/
2493 
2494 			if ((NumFileSys == 1 || NumQueue == 1) &&
2495 			    !enoughdiskspace(e->e_msgsize, e)
2496 #if _FFR_ANY_FREE_FS
2497 			    && !filesys_free(e->e_msgsize)
2498 #endif /* _FFR_ANY_FREE_FS */
2499 			   )
2500 			{
2501 				/*
2502 				**  We perform this test again when the
2503 				**  queue directory is selected, in collect.
2504 				*/
2505 
2506 				usrerr("452 4.4.5 Insufficient disk space; try again later");
2507 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2508 			}
2509 			if (Errors > 0)
2510 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2511 
2512 			LogUsrErrs = true;
2513 #if MILTER
2514 			if (smtp.sm_milterlist && smtp.sm_milterize &&
2515 			    !bitset(EF_DISCARD, e->e_flags))
2516 			{
2517 				char state;
2518 				char *response;
2519 
2520 				response = milter_envfrom(args, e, &state);
2521 				MILTER_REPLY("from");
2522 			}
2523 #endif /* MILTER */
2524 			if (Errors > 0)
2525 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2526 
2527 			message("250 2.1.0 Sender ok");
2528 			smtp.sm_gotmail = true;
2529 		    }
2530 		    SM_EXCEPT(exc, "[!F]*")
2531 		    {
2532 			/*
2533 			**  An error occurred while processing a MAIL command.
2534 			**  Jump to the common error handling code.
2535 			*/
2536 
2537 			sm_exc_free(exc);
2538 			goto undo_no_pm;
2539 		    }
2540 		    SM_END_TRY
2541 			break;
2542 
2543 		  undo_no_pm:
2544 			e->e_flags &= ~EF_PM_NOTIFY;
2545 		  undo:
2546 			break;
2547 
2548 		  case CMDRCPT:		/* rcpt -- designate recipient */
2549 			DELAY_CONN("RCPT");
2550 			macdefine(&e->e_macro, A_PERM,
2551 				macid("{rcpt_mailer}"), NULL);
2552 			macdefine(&e->e_macro, A_PERM,
2553 				macid("{rcpt_host}"), NULL);
2554 			macdefine(&e->e_macro, A_PERM,
2555 				macid("{rcpt_addr}"), NULL);
2556 #if MILTER
2557 			(void) memset(&addr_st, '\0', sizeof(addr_st));
2558 			a = NULL;
2559 			milter_rcpt_added = false;
2560 			smtp.sm_e_nrcpts_orig = e->e_nrcpts;
2561 #endif
2562 #if _FFR_BADRCPT_SHUTDOWN
2563 			/*
2564 			**  hack to deal with hack, see below:
2565 			**  n_badrcpts is increased if limit is reached.
2566 			*/
2567 
2568 			n_badrcpts_adj = (BadRcptThrottle > 0 &&
2569 					  n_badrcpts > BadRcptThrottle &&
2570 					  LogLevel > 5)
2571 					  ? n_badrcpts - 1 : n_badrcpts;
2572 			if (BadRcptShutdown > 0 &&
2573 			    n_badrcpts_adj >= BadRcptShutdown &&
2574 			    (BadRcptShutdownGood == 0 ||
2575 			     smtp.sm_nrcpts == 0 ||
2576 			     (n_badrcpts_adj * 100 /
2577 			      (smtp.sm_nrcpts + n_badrcpts) >=
2578 			      BadRcptShutdownGood)))
2579 			{
2580 				if (LogLevel > 5)
2581 					sm_syslog(LOG_INFO, e->e_id,
2582 						  "%s: Possible SMTP RCPT flood, shutting down connection.",
2583 						  CurSmtpClient);
2584 				message("421 4.7.0 %s Too many bad recipients; closing connection",
2585 				MyHostName);
2586 
2587 				/* arrange to ignore any current send list */
2588 				e->e_sendqueue = NULL;
2589 				goto doquit;
2590 			}
2591 #endif /* _FFR_BADRCPT_SHUTDOWN */
2592 			if (BadRcptThrottle > 0 &&
2593 			    n_badrcpts >= BadRcptThrottle)
2594 			{
2595 				if (LogLevel > 5 &&
2596 				    n_badrcpts == BadRcptThrottle)
2597 				{
2598 					sm_syslog(LOG_INFO, e->e_id,
2599 						  "%s: Possible SMTP RCPT flood, throttling.",
2600 						  CurSmtpClient);
2601 
2602 					/* To avoid duplicated message */
2603 					n_badrcpts++;
2604 				}
2605 				NBADRCPTS;
2606 
2607 				/*
2608 				**  Don't use exponential backoff for now.
2609 				**  Some systems will open more connections
2610 				**  and actually overload the receiver even
2611 				**  more.
2612 				*/
2613 
2614 				(void) sleep(BadRcptThrottleDelay);
2615 			}
2616 			if (!smtp.sm_gotmail)
2617 			{
2618 				usrerr("503 5.0.0 Need MAIL before RCPT");
2619 				break;
2620 			}
2621 			SmtpPhase = "server RCPT";
2622 		    SM_TRY
2623 		    {
2624 			QuickAbort = true;
2625 			LogUsrErrs = true;
2626 
2627 			/* limit flooding of our machine */
2628 			if (MaxRcptPerMsg > 0 &&
2629 			    smtp.sm_nrcpts >= MaxRcptPerMsg)
2630 			{
2631 				/* sleep(1); / * slow down? */
2632 				usrerr("452 4.5.3 Too many recipients");
2633 				goto rcpt_done;
2634 			}
2635 
2636 			if (!SM_IS_INTERACTIVE(e->e_sendmode)
2637 #if _FFR_DM_ONE
2638 			    && (NotFirstDelivery || SM_DM_ONE != e->e_sendmode)
2639 #endif /* _FFR_DM_ONE */
2640 			   )
2641 				e->e_flags |= EF_VRFYONLY;
2642 
2643 #if MILTER
2644 			/*
2645 			**  Do not expand recipients at RCPT time (in the call
2646 			**  to recipient()) if a milter can delete or reject
2647 			**  a RCPT.  If they are expanded, it is impossible
2648 			**  for removefromlist() to figure out the expanded
2649 			**  members of the original recipient and mark them
2650 			**  as QS_DONTSEND.
2651 			*/
2652 
2653 			if (!(smtp.sm_milterlist && smtp.sm_milterize &&
2654 			      !bitset(EF_DISCARD, e->e_flags)) &&
2655 			    (smtp.sm_milters.mis_flags &
2656 			     (MIS_FL_DEL_RCPT|MIS_FL_REJ_RCPT)) != 0)
2657 				e->e_flags |= EF_VRFYONLY;
2658 			milter_cmd_done = false;
2659 			milter_cmd_safe = false;
2660 #endif /* MILTER */
2661 
2662 			p = skipword(p, "to");
2663 			if (p == NULL)
2664 				goto rcpt_done;
2665 			macdefine(&e->e_macro, A_PERM,
2666 				macid("{addr_type}"), "e r");
2667 			a = parseaddr(p, NULLADDR, RF_COPYALL, ' ', &delimptr,
2668 				      e, true);
2669 			macdefine(&e->e_macro, A_PERM,
2670 				macid("{addr_type}"), NULL);
2671 			if (Errors > 0)
2672 				goto rcpt_done;
2673 			if (a == NULL)
2674 			{
2675 				usrerr("501 5.0.0 Missing recipient");
2676 				goto rcpt_done;
2677 			}
2678 
2679 			if (delimptr != NULL && *delimptr != '\0')
2680 				*delimptr++ = '\0';
2681 
2682 			/* put resulting triple from parseaddr() into macros */
2683 			if (a->q_mailer != NULL)
2684 				macdefine(&e->e_macro, A_PERM,
2685 					macid("{rcpt_mailer}"),
2686 					a->q_mailer->m_name);
2687 			else
2688 				macdefine(&e->e_macro, A_PERM,
2689 					macid("{rcpt_mailer}"), NULL);
2690 			if (a->q_host != NULL)
2691 				macdefine(&e->e_macro, A_PERM,
2692 					macid("{rcpt_host}"), a->q_host);
2693 			else
2694 				macdefine(&e->e_macro, A_PERM,
2695 					macid("{rcpt_host}"), "localhost");
2696 			if (a->q_user != NULL)
2697 				macdefine(&e->e_macro, A_PERM,
2698 					macid("{rcpt_addr}"), a->q_user);
2699 			else
2700 				macdefine(&e->e_macro, A_PERM,
2701 					macid("{rcpt_addr}"), NULL);
2702 			if (Errors > 0)
2703 				goto rcpt_done;
2704 
2705 			/* now parse ESMTP arguments */
2706 			addr = p;
2707 			parse_esmtp_args(e, a, p, delimptr, "RCPT", args,
2708 					rcpt_esmtp_args);
2709 			if (Errors > 0)
2710 				goto rcpt_done;
2711 
2712 #if MILTER
2713 			/*
2714 			**  rscheck() can trigger an "exception"
2715 			**  in which case the execution continues at
2716 			**  SM_EXCEPT(exc, "[!F]*")
2717 			**  This means milter_cmd_safe is not set
2718 			**  and hence milter is not invoked.
2719 			**  Would it be "safe" to change that, i.e., use
2720 			**  milter_cmd_safe = true;
2721 			**  here so a milter is informed (if requested)
2722 			**  about RCPTs that are rejected by check_rcpt?
2723 			*/
2724 # if _FFR_MILTER_CHECK_REJECTIONS_TOO
2725 			milter_cmd_safe = true;
2726 # endif
2727 #endif
2728 
2729 			/* do config file checking of the recipient */
2730 			macdefine(&e->e_macro, A_PERM,
2731 				macid("{addr_type}"), "e r");
2732 			if (rscheck("check_rcpt", addr,
2733 				    NULL, e, RSF_RMCOMM|RSF_COUNT, 3,
2734 				    NULL, e->e_id, p_addr_st) != EX_OK ||
2735 			    Errors > 0)
2736 				goto rcpt_done;
2737 			macdefine(&e->e_macro, A_PERM,
2738 				macid("{addr_type}"), NULL);
2739 
2740 			/* If discarding, don't bother to verify user */
2741 			if (bitset(EF_DISCARD, e->e_flags))
2742 				a->q_state = QS_VERIFIED;
2743 #if MILTER
2744 			milter_cmd_safe = true;
2745 #endif
2746 
2747 			/* save in recipient list after ESMTP mods */
2748 			a = recipient(a, &e->e_sendqueue, 0, e);
2749 			/* may trigger exception... */
2750 
2751 #if MILTER
2752 			milter_rcpt_added = true;
2753 #endif
2754 
2755 			if(!(Errors > 0) && QS_IS_BADADDR(a->q_state))
2756 			{
2757 				/* punt -- should keep message in ADDRESS.... */
2758 				usrerr("550 5.1.1 Addressee unknown");
2759 			}
2760 
2761 #if MILTER
2762 		rcpt_done:
2763 			if (smtp.sm_milterlist && smtp.sm_milterize &&
2764 			    !bitset(EF_DISCARD, e->e_flags))
2765 			{
2766 				char state;
2767 				char *response;
2768 
2769 				/* how to get the error codes? */
2770 				if (Errors > 0)
2771 				{
2772 					macdefine(&e->e_macro, A_PERM,
2773 						macid("{rcpt_mailer}"),
2774 						"error");
2775 					if (a != NULL &&
2776 					    a->q_status != NULL &&
2777 					    a->q_rstatus != NULL)
2778 					{
2779 						macdefine(&e->e_macro, A_PERM,
2780 							macid("{rcpt_host}"),
2781 							a->q_status);
2782 						macdefine(&e->e_macro, A_PERM,
2783 							macid("{rcpt_addr}"),
2784 							a->q_rstatus);
2785 					}
2786 					else
2787 					{
2788 						if (addr_st.q_host != NULL)
2789 							macdefine(&e->e_macro,
2790 								A_PERM,
2791 								macid("{rcpt_host}"),
2792 								addr_st.q_host);
2793 						if (addr_st.q_user != NULL)
2794 							macdefine(&e->e_macro,
2795 								A_PERM,
2796 								macid("{rcpt_addr}"),
2797 								addr_st.q_user);
2798 					}
2799 				}
2800 
2801 				response = milter_envrcpt(args, e, &state,
2802 							Errors > 0);
2803 				milter_cmd_done = true;
2804 				MILTER_REPLY("to");
2805 			}
2806 #endif /* MILTER */
2807 
2808 			/* no errors during parsing, but might be a duplicate */
2809 			e->e_to = a->q_paddr;
2810 			if (!(Errors > 0) && !QS_IS_BADADDR(a->q_state))
2811 			{
2812 				if (smtp.sm_nrcpts == 0)
2813 					initsys(e);
2814 				message("250 2.1.5 Recipient ok%s",
2815 					QS_IS_QUEUEUP(a->q_state) ?
2816 						" (will queue)" : "");
2817 				smtp.sm_nrcpts++;
2818 			}
2819 
2820 			/* Is this needed? */
2821 #if !MILTER
2822 		rcpt_done:
2823 #endif /* !MILTER */
2824 			macdefine(&e->e_macro, A_PERM,
2825 				macid("{rcpt_mailer}"), NULL);
2826 			macdefine(&e->e_macro, A_PERM,
2827 				macid("{rcpt_host}"), NULL);
2828 			macdefine(&e->e_macro, A_PERM,
2829 				macid("{rcpt_addr}"), NULL);
2830 			macdefine(&e->e_macro, A_PERM,
2831 				macid("{dsn_notify}"), NULL);
2832 
2833 			if (Errors > 0)
2834 			{
2835 				++n_badrcpts;
2836 				NBADRCPTS;
2837 			}
2838 		    }
2839 		    SM_EXCEPT(exc, "[!F]*")
2840 		    {
2841 			/* An exception occurred while processing RCPT */
2842 			e->e_flags &= ~(EF_FATALERRS|EF_PM_NOTIFY);
2843 			++n_badrcpts;
2844 			NBADRCPTS;
2845 #if MILTER
2846 			if (smtp.sm_milterlist && smtp.sm_milterize &&
2847 			    !bitset(EF_DISCARD, e->e_flags) &&
2848 			    !milter_cmd_done && milter_cmd_safe)
2849 			{
2850 				char state;
2851 				char *response;
2852 
2853 				macdefine(&e->e_macro, A_PERM,
2854 					macid("{rcpt_mailer}"), "error");
2855 
2856 				/* how to get the error codes? */
2857 				if (addr_st.q_host != NULL)
2858 					macdefine(&e->e_macro, A_PERM,
2859 						macid("{rcpt_host}"),
2860 						addr_st.q_host);
2861 				else if (a != NULL && a->q_status != NULL)
2862 					macdefine(&e->e_macro, A_PERM,
2863 						macid("{rcpt_host}"),
2864 						a->q_status);
2865 
2866 				if (addr_st.q_user != NULL)
2867 					macdefine(&e->e_macro, A_PERM,
2868 						macid("{rcpt_addr}"),
2869 						addr_st.q_user);
2870 				else if (a != NULL && a->q_rstatus != NULL)
2871 					macdefine(&e->e_macro, A_PERM,
2872 						macid("{rcpt_addr}"),
2873 						a->q_rstatus);
2874 
2875 				response = milter_envrcpt(args, e, &state,
2876 							true);
2877 				milter_cmd_done = true;
2878 				MILTER_REPLY("to");
2879 				macdefine(&e->e_macro, A_PERM,
2880 					macid("{rcpt_mailer}"), NULL);
2881 				macdefine(&e->e_macro, A_PERM,
2882 					macid("{rcpt_host}"), NULL);
2883 				macdefine(&e->e_macro, A_PERM,
2884 					macid("{rcpt_addr}"), NULL);
2885 			}
2886 			if (smtp.sm_milterlist && smtp.sm_milterize &&
2887 			    milter_rcpt_added && milter_cmd_done &&
2888 			    milter_cmd_fail)
2889 			{
2890 				(void) removefromlist(addr, &e->e_sendqueue, e);
2891 				milter_cmd_fail = false;
2892 				if (smtp.sm_e_nrcpts_orig < e->e_nrcpts)
2893 					e->e_nrcpts = smtp.sm_e_nrcpts_orig;
2894 			}
2895 #endif /* MILTER */
2896 		    }
2897 		    SM_END_TRY
2898 			break;
2899 
2900 		  case CMDDATA:		/* data -- text of mail */
2901 			DELAY_CONN("DATA");
2902 			if (!smtp_data(&smtp, e))
2903 				goto doquit;
2904 			break;
2905 
2906 		  case CMDRSET:		/* rset -- reset state */
2907 			if (tTd(94, 100))
2908 				message("451 4.0.0 Test failure");
2909 			else
2910 				message("250 2.0.0 Reset state");
2911 			CLEAR_STATE(cmdbuf);
2912 			break;
2913 
2914 		  case CMDVRFY:		/* vrfy -- verify address */
2915 		  case CMDEXPN:		/* expn -- expand address */
2916 			vrfy = c->cmd_code == CMDVRFY;
2917 			DELAY_CONN(vrfy ? "VRFY" : "EXPN");
2918 			if (tempfail)
2919 			{
2920 				if (LogLevel > 9)
2921 					sm_syslog(LOG_INFO, e->e_id,
2922 						  "SMTP %s command (%.100s) from %s tempfailed (due to previous checks)",
2923 						  vrfy ? "VRFY" : "EXPN",
2924 						  p, CurSmtpClient);
2925 
2926 				/* RFC 821 doesn't allow 4xy reply code */
2927 				usrerr("550 5.7.1 Please try again later");
2928 				break;
2929 			}
2930 			wt = checksmtpattack(&n_verifies, MAXVRFYCOMMANDS,
2931 					     false, vrfy ? "VRFY" : "EXPN", e);
2932 			STOP_IF_ATTACK(wt);
2933 			previous = curtime();
2934 			if ((vrfy && bitset(PRIV_NOVRFY, PrivacyFlags)) ||
2935 			    (!vrfy && !bitset(SRV_OFFER_EXPN, features)))
2936 			{
2937 				if (vrfy)
2938 					message("252 2.5.2 Cannot VRFY user; try RCPT to attempt delivery (or try finger)");
2939 				else
2940 					message("502 5.7.0 Sorry, we do not allow this operation");
2941 				if (LogLevel > 5)
2942 					sm_syslog(LOG_INFO, e->e_id,
2943 						  "%s: %s [rejected]",
2944 						  CurSmtpClient,
2945 						  shortenstring(inp, MAXSHORTSTR));
2946 				break;
2947 			}
2948 			else if (!gothello &&
2949 				 bitset(vrfy ? PRIV_NEEDVRFYHELO : PRIV_NEEDEXPNHELO,
2950 						PrivacyFlags))
2951 			{
2952 				usrerr("503 5.0.0 I demand that you introduce yourself first");
2953 				break;
2954 			}
2955 			if (Errors > 0)
2956 				break;
2957 			if (LogLevel > 5)
2958 				sm_syslog(LOG_INFO, e->e_id, "%s: %s",
2959 					  CurSmtpClient,
2960 					  shortenstring(inp, MAXSHORTSTR));
2961 		    SM_TRY
2962 		    {
2963 			QuickAbort = true;
2964 			vrfyqueue = NULL;
2965 			if (vrfy)
2966 				e->e_flags |= EF_VRFYONLY;
2967 			while (*p != '\0' && isascii(*p) && isspace(*p))
2968 				p++;
2969 			if (*p == '\0')
2970 			{
2971 				usrerr("501 5.5.2 Argument required");
2972 			}
2973 			else
2974 			{
2975 				/* do config file checking of the address */
2976 				if (rscheck(vrfy ? "check_vrfy" : "check_expn",
2977 					    p, NULL, e, RSF_RMCOMM,
2978 					    3, NULL, NOQID, NULL) != EX_OK ||
2979 				    Errors > 0)
2980 					sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2981 				(void) sendtolist(p, NULLADDR, &vrfyqueue, 0, e);
2982 			}
2983 			if (wt > 0)
2984 			{
2985 				time_t t;
2986 
2987 				t = wt - (curtime() - previous);
2988 				if (t > 0)
2989 					(void) sleep(t);
2990 			}
2991 			if (Errors > 0)
2992 				sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2993 			if (vrfyqueue == NULL)
2994 			{
2995 				usrerr("554 5.5.2 Nothing to %s", vrfy ? "VRFY" : "EXPN");
2996 			}
2997 			while (vrfyqueue != NULL)
2998 			{
2999 				if (!QS_IS_UNDELIVERED(vrfyqueue->q_state))
3000 				{
3001 					vrfyqueue = vrfyqueue->q_next;
3002 					continue;
3003 				}
3004 
3005 				/* see if there is more in the vrfy list */
3006 				a = vrfyqueue;
3007 				while ((a = a->q_next) != NULL &&
3008 				       (!QS_IS_UNDELIVERED(a->q_state)))
3009 					continue;
3010 				printvrfyaddr(vrfyqueue, a == NULL, vrfy);
3011 				vrfyqueue = a;
3012 			}
3013 		    }
3014 		    SM_EXCEPT(exc, "[!F]*")
3015 		    {
3016 			/*
3017 			**  An exception occurred while processing VRFY/EXPN
3018 			*/
3019 
3020 			sm_exc_free(exc);
3021 			goto undo;
3022 		    }
3023 		    SM_END_TRY
3024 			break;
3025 
3026 		  case CMDETRN:		/* etrn -- force queue flush */
3027 			DELAY_CONN("ETRN");
3028 
3029 			/* Don't leak queue information via debug flags */
3030 			if (!bitset(SRV_OFFER_ETRN, features) || UseMSP ||
3031 			    (RealUid != 0 && RealUid != TrustedUid &&
3032 			     OpMode == MD_SMTP))
3033 			{
3034 				/* different message for MSA ? */
3035 				message("502 5.7.0 Sorry, we do not allow this operation");
3036 				if (LogLevel > 5)
3037 					sm_syslog(LOG_INFO, e->e_id,
3038 						  "%s: %s [rejected]",
3039 						  CurSmtpClient,
3040 						  shortenstring(inp, MAXSHORTSTR));
3041 				break;
3042 			}
3043 			if (tempfail)
3044 			{
3045 				if (LogLevel > 9)
3046 					sm_syslog(LOG_INFO, e->e_id,
3047 						  "SMTP ETRN command (%.100s) from %s tempfailed (due to previous checks)",
3048 						  p, CurSmtpClient);
3049 				usrerr(MSG_TEMPFAIL);
3050 				break;
3051 			}
3052 
3053 			if (strlen(p) <= 0)
3054 			{
3055 				usrerr("500 5.5.2 Parameter required");
3056 				break;
3057 			}
3058 
3059 			/* crude way to avoid denial-of-service attacks */
3060 			STOP_IF_ATTACK(checksmtpattack(&n_etrn, MAXETRNCOMMANDS,
3061 							true, "ETRN", e));
3062 
3063 			/*
3064 			**  Do config file checking of the parameter.
3065 			**  Even though we have srv_features now, we still
3066 			**  need this ruleset because the former is called
3067 			**  when the connection has been established, while
3068 			**  this ruleset is called when the command is
3069 			**  actually issued and therefore has all information
3070 			**  available to make a decision.
3071 			*/
3072 
3073 			if (rscheck("check_etrn", p, NULL, e,
3074 				    RSF_RMCOMM, 3, NULL, NOQID, NULL)
3075 								!= EX_OK ||
3076 			    Errors > 0)
3077 				break;
3078 
3079 			if (LogLevel > 5)
3080 				sm_syslog(LOG_INFO, e->e_id,
3081 					  "%s: ETRN %s", CurSmtpClient,
3082 					  shortenstring(p, MAXSHORTSTR));
3083 
3084 			id = p;
3085 			if (*id == '#')
3086 			{
3087 				int i, qgrp;
3088 
3089 				id++;
3090 				qgrp = name2qid(id);
3091 				if (!ISVALIDQGRP(qgrp))
3092 				{
3093 					usrerr("459 4.5.4 Queue %s unknown",
3094 					       id);
3095 					break;
3096 				}
3097 				for (i = 0; i < NumQueue && Queue[i] != NULL;
3098 				     i++)
3099 					Queue[i]->qg_nextrun = (time_t) -1;
3100 				Queue[qgrp]->qg_nextrun = 0;
3101 				ok = run_work_group(Queue[qgrp]->qg_wgrp,
3102 						    RWG_FORK|RWG_FORCE);
3103 				if (ok && Errors == 0)
3104 					message("250 2.0.0 Queuing for queue group %s started", id);
3105 				break;
3106 			}
3107 
3108 			if (*id == '@')
3109 				id++;
3110 			else
3111 				*--id = '@';
3112 
3113 			new = (QUEUE_CHAR *) sm_malloc(sizeof(QUEUE_CHAR));
3114 			if (new == NULL)
3115 			{
3116 				syserr("500 5.5.0 ETRN out of memory");
3117 				break;
3118 			}
3119 			new->queue_match = id;
3120 			new->queue_negate = false;
3121 			new->queue_next = NULL;
3122 			QueueLimitRecipient = new;
3123 			ok = runqueue(true, false, false, true);
3124 			sm_free(QueueLimitRecipient); /* XXX */
3125 			QueueLimitRecipient = NULL;
3126 			if (ok && Errors == 0)
3127 				message("250 2.0.0 Queuing for node %s started", p);
3128 			break;
3129 
3130 		  case CMDHELP:		/* help -- give user info */
3131 			DELAY_CONN("HELP");
3132 			help(p, e);
3133 			break;
3134 
3135 		  case CMDNOOP:		/* noop -- do nothing */
3136 			DELAY_CONN("NOOP");
3137 			STOP_IF_ATTACK(checksmtpattack(&n_noop, MaxNOOPCommands,
3138 							true, "NOOP", e));
3139 			message("250 2.0.0 OK");
3140 			break;
3141 
3142 		  case CMDQUIT:		/* quit -- leave mail */
3143 			message("221 2.0.0 %s closing connection", MyHostName);
3144 #if PIPELINING
3145 			(void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
3146 #endif /* PIPELINING */
3147 
3148 			if (smtp.sm_nrcpts > 0)
3149 				logundelrcpts(e, "aborted by sender", 9, false);
3150 
3151 			/* arrange to ignore any current send list */
3152 			e->e_sendqueue = NULL;
3153 
3154 #if STARTTLS
3155 			/* shutdown TLS connection */
3156 			if (tls_active)
3157 			{
3158 				(void) endtls(srv_ssl, "server");
3159 				tls_active = false;
3160 			}
3161 #endif /* STARTTLS */
3162 #if SASL
3163 			if (authenticating == SASL_IS_AUTH)
3164 			{
3165 				sasl_dispose(&conn);
3166 				authenticating = SASL_NOT_AUTH;
3167 				/* XXX sasl_done(); this is a child */
3168 			}
3169 #endif /* SASL */
3170 
3171 doquit:
3172 			/* avoid future 050 messages */
3173 			disconnect(1, e);
3174 
3175 #if MILTER
3176 			/* close out milter filters */
3177 			milter_quit(e);
3178 #endif /* MILTER */
3179 
3180 			if (tTd(92, 2))
3181 				sm_dprintf("QUIT: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",
3182 					e->e_id,
3183 					bitset(EF_LOGSENDER, e->e_flags),
3184 					LogLevel);
3185 			if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))
3186 				logsender(e, NULL);
3187 			e->e_flags &= ~EF_LOGSENDER;
3188 
3189 			if (lognullconnection && LogLevel > 5 &&
3190 			    nullserver == NULL)
3191 			{
3192 				char *d;
3193 
3194 				d = macvalue(macid("{daemon_name}"), e);
3195 				if (d == NULL)
3196 					d = "stdin";
3197 
3198 				/*
3199 				**  even though this id is "bogus", it makes
3200 				**  it simpler to "grep" related events, e.g.,
3201 				**  timeouts for the same connection.
3202 				*/
3203 
3204 				sm_syslog(LOG_INFO, e->e_id,
3205 					  "%s did not issue MAIL/EXPN/VRFY/ETRN during connection to %s",
3206 					  CurSmtpClient, d);
3207 			}
3208 			if (tTd(93, 100))
3209 			{
3210 				/* return to handle next connection */
3211 				return;
3212 			}
3213 			finis(true, true, ExitStat);
3214 			/* NOTREACHED */
3215 
3216 			/* just to avoid bogus warning from some compilers */
3217 			exit(EX_OSERR);
3218 
3219 		  case CMDVERB:		/* set verbose mode */
3220 			DELAY_CONN("VERB");
3221 			if (!bitset(SRV_OFFER_EXPN, features) ||
3222 			    !bitset(SRV_OFFER_VERB, features))
3223 			{
3224 				/* this would give out the same info */
3225 				message("502 5.7.0 Verbose unavailable");
3226 				break;
3227 			}
3228 			STOP_IF_ATTACK(checksmtpattack(&n_noop, MaxNOOPCommands,
3229 							true, "VERB", e));
3230 			Verbose = 1;
3231 			set_delivery_mode(SM_DELIVER, e);
3232 			message("250 2.0.0 Verbose mode");
3233 			break;
3234 
3235 #if SMTPDEBUG
3236 		  case CMDDBGQSHOW:	/* show queues */
3237 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
3238 					     "Send Queue=");
3239 			printaddr(smioout, e->e_sendqueue, true);
3240 			break;
3241 
3242 		  case CMDDBGDEBUG:	/* set debug mode */
3243 			tTsetup(tTdvect, sizeof(tTdvect), "0-99.1");
3244 			tTflag(p);
3245 			message("200 2.0.0 Debug set");
3246 			break;
3247 
3248 #else /* SMTPDEBUG */
3249 		  case CMDDBGQSHOW:	/* show queues */
3250 		  case CMDDBGDEBUG:	/* set debug mode */
3251 #endif /* SMTPDEBUG */
3252 		  case CMDLOGBOGUS:	/* bogus command */
3253 			DELAY_CONN("Bogus");
3254 			if (LogLevel > 0)
3255 				sm_syslog(LOG_CRIT, e->e_id,
3256 					  "\"%s\" command from %s (%.100s)",
3257 					  c->cmd_name, CurSmtpClient,
3258 					  anynet_ntoa(&RealHostAddr));
3259 			/* FALLTHROUGH */
3260 
3261 		  case CMDERROR:	/* unknown command */
3262 #if MAXBADCOMMANDS > 0
3263 			if (++n_badcmds > MAXBADCOMMANDS)
3264 			{
3265   stopattack:
3266 				message("421 4.7.0 %s Too many bad commands; closing connection",
3267 					MyHostName);
3268 
3269 				/* arrange to ignore any current send list */
3270 				e->e_sendqueue = NULL;
3271 				goto doquit;
3272 			}
3273 #endif /* MAXBADCOMMANDS > 0 */
3274 
3275 #if MILTER && SMFI_VERSION > 2
3276 			if (smtp.sm_milterlist && smtp.sm_milterize &&
3277 			    !bitset(EF_DISCARD, e->e_flags))
3278 			{
3279 				char state;
3280 				char *response;
3281 
3282 				if (MilterLogLevel > 9)
3283 					sm_syslog(LOG_INFO, e->e_id,
3284 						"Sending \"%s\" to Milter", inp);
3285 				response = milter_unknown(inp, e, &state);
3286 				MILTER_REPLY("unknown");
3287 				if (state == SMFIR_REPLYCODE ||
3288 				    state == SMFIR_REJECT ||
3289 				    state == SMFIR_TEMPFAIL ||
3290 				    state == SMFIR_SHUTDOWN)
3291 				{
3292 					/* MILTER_REPLY already gave an error */
3293 					break;
3294 				}
3295 			}
3296 #endif /* MILTER && SMFI_VERSION > 2 */
3297 
3298 			usrerr("500 5.5.1 Command unrecognized: \"%s\"",
3299 			       shortenstring(inp, MAXSHORTSTR));
3300 			break;
3301 
3302 		  case CMDUNIMPL:
3303 			DELAY_CONN("Unimpl");
3304 			usrerr("502 5.5.1 Command not implemented: \"%s\"",
3305 			       shortenstring(inp, MAXSHORTSTR));
3306 			break;
3307 
3308 		  default:
3309 			DELAY_CONN("default");
3310 			errno = 0;
3311 			syserr("500 5.5.0 smtp: unknown code %d", c->cmd_code);
3312 			break;
3313 		}
3314 #if SASL
3315 		}
3316 #endif /* SASL */
3317 	    }
3318 	    SM_EXCEPT(exc, "[!F]*")
3319 	    {
3320 		/*
3321 		**  The only possible exception is "E:mta.quickabort".
3322 		**  There is nothing to do except fall through and loop.
3323 		*/
3324 	    }
3325 	    SM_END_TRY
3326 	}
3327 }
3328 /*
3329 **  SMTP_DATA -- implement the SMTP DATA command.
3330 **
3331 **	Parameters:
3332 **		smtp -- status of SMTP connection.
3333 **		e -- envelope.
3334 **
3335 **	Returns:
3336 **		true iff SMTP session can continue.
3337 **
3338 **	Side Effects:
3339 **		possibly sends message.
3340 */
3341 
3342 static bool
3343 smtp_data(smtp, e)
3344 	SMTP_T *smtp;
3345 	ENVELOPE *e;
3346 {
3347 #if MILTER
3348 	bool milteraccept;
3349 #endif /* MILTER */
3350 	bool aborting;
3351 	bool doublequeue;
3352 	bool rv = true;
3353 	ADDRESS *a;
3354 	ENVELOPE *ee;
3355 	char *id;
3356 	char *oldid;
3357 	unsigned int features;
3358 	char buf[32];
3359 
3360 	SmtpPhase = "server DATA";
3361 	if (!smtp->sm_gotmail)
3362 	{
3363 		usrerr("503 5.0.0 Need MAIL command");
3364 		return true;
3365 	}
3366 	else if (smtp->sm_nrcpts <= 0)
3367 	{
3368 		usrerr("503 5.0.0 Need RCPT (recipient)");
3369 		return true;
3370 	}
3371 	(void) sm_snprintf(buf, sizeof(buf), "%u", smtp->sm_nrcpts);
3372 	if (rscheck("check_data", buf, NULL, e,
3373 		    RSF_RMCOMM|RSF_UNSTRUCTURED|RSF_COUNT, 3, NULL,
3374 		    e->e_id, NULL) != EX_OK)
3375 		return true;
3376 
3377 #if MILTER && SMFI_VERSION > 3
3378 	if (smtp->sm_milterlist && smtp->sm_milterize &&
3379 	    !bitset(EF_DISCARD, e->e_flags))
3380 	{
3381 		char state;
3382 		char *response;
3383 		int savelogusrerrs = LogUsrErrs;
3384 
3385 		response = milter_data_cmd(e, &state);
3386 		switch (state)
3387 		{
3388 		  case SMFIR_REPLYCODE:
3389 			if (MilterLogLevel > 3)
3390 			{
3391 				sm_syslog(LOG_INFO, e->e_id,
3392 					  "Milter: cmd=data, reject=%s",
3393 					  response);
3394 				LogUsrErrs = false;
3395 			}
3396 #if _FFR_MILTER_ENHSC
3397 			if (ISSMTPCODE(response))
3398 				(void) extenhsc(response + 4, ' ', e->e_enhsc);
3399 #endif /* _FFR_MILTER_ENHSC */
3400 
3401 			usrerr(response);
3402 			if (strncmp(response, "421 ", 4) == 0
3403 			    || strncmp(response, "421-", 4) == 0)
3404 			{
3405 				e->e_sendqueue = NULL;
3406 				return false;
3407 			}
3408 			return true;
3409 
3410 		  case SMFIR_REJECT:
3411 			if (MilterLogLevel > 3)
3412 			{
3413 				sm_syslog(LOG_INFO, e->e_id,
3414 					  "Milter: cmd=data, reject=550 5.7.1 Command rejected");
3415 				LogUsrErrs = false;
3416 			}
3417 #if _FFR_MILTER_ENHSC
3418 			(void) sm_strlcpy(e->e_enhsc, "5.7.1",
3419 					 sizeof(e->e_enhsc));
3420 #endif /* _FFR_MILTER_ENHSC */
3421 			usrerr("550 5.7.1 Command rejected");
3422 			return true;
3423 
3424 		  case SMFIR_DISCARD:
3425 			if (MilterLogLevel > 3)
3426 				sm_syslog(LOG_INFO, e->e_id,
3427 					  "Milter: cmd=data, discard");
3428 			e->e_flags |= EF_DISCARD;
3429 			break;
3430 
3431 		  case SMFIR_TEMPFAIL:
3432 			if (MilterLogLevel > 3)
3433 			{
3434 				sm_syslog(LOG_INFO, e->e_id,
3435 					  "Milter: cmd=data, reject=%s",
3436 					  MSG_TEMPFAIL);
3437 				LogUsrErrs = false;
3438 			}
3439 #if _FFR_MILTER_ENHSC
3440 			(void) extenhsc(MSG_TEMPFAIL + 4, ' ', e->e_enhsc);
3441 #endif /* _FFR_MILTER_ENHSC */
3442 			usrerr(MSG_TEMPFAIL);
3443 			return true;
3444 
3445 		  case SMFIR_SHUTDOWN:
3446 			if (MilterLogLevel > 3)
3447 			{
3448 				sm_syslog(LOG_INFO, e->e_id,
3449 					  "Milter: cmd=data, reject=421 4.7.0 %s closing connection",
3450 					  MyHostName);
3451 				LogUsrErrs = false;
3452 			}
3453 			usrerr("421 4.7.0 %s closing connection", MyHostName);
3454 			e->e_sendqueue = NULL;
3455 			return false;
3456 		}
3457 		LogUsrErrs = savelogusrerrs;
3458 		if (response != NULL)
3459 			sm_free(response); /* XXX */
3460 	}
3461 #endif /* MILTER && SMFI_VERSION > 3 */
3462 
3463 	/* put back discard bit */
3464 	if (smtp->sm_discard)
3465 		e->e_flags |= EF_DISCARD;
3466 
3467 	/* check to see if we need to re-expand aliases */
3468 	/* also reset QS_BADADDR on already-diagnosted addrs */
3469 	doublequeue = false;
3470 	for (a = e->e_sendqueue; a != NULL; a = a->q_next)
3471 	{
3472 		if (QS_IS_VERIFIED(a->q_state) &&
3473 		    !bitset(EF_DISCARD, e->e_flags))
3474 		{
3475 			/* need to re-expand aliases */
3476 			doublequeue = true;
3477 		}
3478 		if (QS_IS_BADADDR(a->q_state))
3479 		{
3480 			/* make this "go away" */
3481 			a->q_state = QS_DONTSEND;
3482 		}
3483 	}
3484 
3485 	/* collect the text of the message */
3486 	SmtpPhase = "collect";
3487 	buffer_errors();
3488 
3489 	collect(InChannel, true, NULL, e, true);
3490 
3491 	/* redefine message size */
3492 	(void) sm_snprintf(buf, sizeof(buf), "%ld", PRT_NONNEGL(e->e_msgsize));
3493 	macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), buf);
3494 
3495 	/* rscheck() will set Errors or EF_DISCARD if it trips */
3496 	(void) rscheck("check_eom", buf, NULL, e, RSF_UNSTRUCTURED|RSF_COUNT,
3497 		       3, NULL, e->e_id, NULL);
3498 
3499 #if MILTER
3500 	milteraccept = true;
3501 	if (smtp->sm_milterlist && smtp->sm_milterize &&
3502 	    Errors <= 0 &&
3503 	    !bitset(EF_DISCARD, e->e_flags))
3504 	{
3505 		char state;
3506 		char *response;
3507 
3508 		response = milter_data(e, &state);
3509 		switch (state)
3510 		{
3511 		  case SMFIR_REPLYCODE:
3512 			if (MilterLogLevel > 3)
3513 				sm_syslog(LOG_INFO, e->e_id,
3514 					  "Milter: data, reject=%s",
3515 					  response);
3516 			milteraccept = false;
3517 #if _FFR_MILTER_ENHSC
3518 			if (ISSMTPCODE(response))
3519 				(void) extenhsc(response + 4, ' ', e->e_enhsc);
3520 #endif /* _FFR_MILTER_ENHSC */
3521 			usrerr(response);
3522 			if (strncmp(response, "421 ", 4) == 0
3523 			    || strncmp(response, "421-", 4) == 0)
3524 				rv = false;
3525 			break;
3526 
3527 		  case SMFIR_REJECT:
3528 			milteraccept = false;
3529 			if (MilterLogLevel > 3)
3530 				sm_syslog(LOG_INFO, e->e_id,
3531 					  "Milter: data, reject=554 5.7.1 Command rejected");
3532 			usrerr("554 5.7.1 Command rejected");
3533 			break;
3534 
3535 		  case SMFIR_DISCARD:
3536 			if (MilterLogLevel > 3)
3537 				sm_syslog(LOG_INFO, e->e_id,
3538 					  "Milter: data, discard");
3539 			milteraccept = false;
3540 			e->e_flags |= EF_DISCARD;
3541 			break;
3542 
3543 		  case SMFIR_TEMPFAIL:
3544 			if (MilterLogLevel > 3)
3545 				sm_syslog(LOG_INFO, e->e_id,
3546 					  "Milter: data, reject=%s",
3547 					  MSG_TEMPFAIL);
3548 			milteraccept = false;
3549 #if _FFR_MILTER_ENHSC
3550 			(void) extenhsc(MSG_TEMPFAIL + 4, ' ', e->e_enhsc);
3551 #endif /* _FFR_MILTER_ENHSC */
3552 			usrerr(MSG_TEMPFAIL);
3553 			break;
3554 
3555 		  case SMFIR_SHUTDOWN:
3556 			if (MilterLogLevel > 3)
3557 				sm_syslog(LOG_INFO, e->e_id,
3558 					  "Milter: data, reject=421 4.7.0 %s closing connection",
3559 					  MyHostName);
3560 			milteraccept = false;
3561 			usrerr("421 4.7.0 %s closing connection", MyHostName);
3562 			rv = false;
3563 			break;
3564 		}
3565 		if (response != NULL)
3566 			sm_free(response);
3567 	}
3568 
3569 	/* Milter may have changed message size */
3570 	(void) sm_snprintf(buf, sizeof(buf), "%ld", PRT_NONNEGL(e->e_msgsize));
3571 	macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), buf);
3572 
3573 	/* abort message filters that didn't get the body & log msg is OK */
3574 	if (smtp->sm_milterlist && smtp->sm_milterize)
3575 	{
3576 		milter_abort(e);
3577 		if (milteraccept && MilterLogLevel > 9)
3578 			sm_syslog(LOG_INFO, e->e_id, "Milter accept: message");
3579 	}
3580 
3581 	/*
3582 	**  If SuperSafe is SAFE_REALLY_POSTMILTER, and we don't have milter or
3583 	**  milter accepted message, sync it now
3584 	**
3585 	**  XXX This is almost a copy of the code in collect(): put it into
3586 	**	a function that is called from both places?
3587 	*/
3588 
3589 	if (milteraccept && SuperSafe == SAFE_REALLY_POSTMILTER)
3590 	{
3591 		int afd;
3592 		SM_FILE_T *volatile df;
3593 		char *dfname;
3594 
3595 		df = e->e_dfp;
3596 		dfname = queuename(e, DATAFL_LETTER);
3597 		if (sm_io_setinfo(df, SM_BF_COMMIT, NULL) < 0
3598 		    && errno != EINVAL)
3599 		{
3600 			int save_errno;
3601 
3602 			save_errno = errno;
3603 			if (save_errno == EEXIST)
3604 			{
3605 				struct stat st;
3606 				int dfd;
3607 
3608 				if (stat(dfname, &st) < 0)
3609 					st.st_size = -1;
3610 				errno = EEXIST;
3611 				syserr("@collect: bfcommit(%s): already on disk, size=%ld",
3612 				       dfname, (long) st.st_size);
3613 				dfd = sm_io_getinfo(df, SM_IO_WHAT_FD, NULL);
3614 				if (dfd >= 0)
3615 					dumpfd(dfd, true, true);
3616 			}
3617 			errno = save_errno;
3618 			dferror(df, "bfcommit", e);
3619 			flush_errors(true);
3620 			finis(save_errno != EEXIST, true, ExitStat);
3621 		}
3622 		else if ((afd = sm_io_getinfo(df, SM_IO_WHAT_FD, NULL)) < 0)
3623 		{
3624 			dferror(df, "sm_io_getinfo", e);
3625 			flush_errors(true);
3626 			finis(true, true, ExitStat);
3627 			/* NOTREACHED */
3628 		}
3629 		else if (fsync(afd) < 0)
3630 		{
3631 			dferror(df, "fsync", e);
3632 			flush_errors(true);
3633 			finis(true, true, ExitStat);
3634 			/* NOTREACHED */
3635 		}
3636 		else if (sm_io_close(df, SM_TIME_DEFAULT) < 0)
3637 		{
3638 			dferror(df, "sm_io_close", e);
3639 			flush_errors(true);
3640 			finis(true, true, ExitStat);
3641 			/* NOTREACHED */
3642 		}
3643 
3644 		/* Now reopen the df file */
3645 		e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, dfname,
3646 					SM_IO_RDONLY, NULL);
3647 		if (e->e_dfp == NULL)
3648 		{
3649 			/* we haven't acked receipt yet, so just chuck this */
3650 			syserr("@Cannot reopen %s", dfname);
3651 			finis(true, true, ExitStat);
3652 			/* NOTREACHED */
3653 		}
3654 	}
3655 #endif /* MILTER */
3656 
3657 	/* Check if quarantining stats should be updated */
3658 	if (e->e_quarmsg != NULL)
3659 		markstats(e, NULL, STATS_QUARANTINE);
3660 
3661 	/*
3662 	**  If a header/body check (header checks or milter)
3663 	**  set EF_DISCARD, don't queueup the message --
3664 	**  that would lose the EF_DISCARD bit and deliver
3665 	**  the message.
3666 	*/
3667 
3668 	if (bitset(EF_DISCARD, e->e_flags))
3669 		doublequeue = false;
3670 
3671 	aborting = Errors > 0;
3672 	if (!(aborting || bitset(EF_DISCARD, e->e_flags)) &&
3673 	    (QueueMode == QM_QUARANTINE || e->e_quarmsg == NULL) &&
3674 	    !split_by_recipient(e))
3675 		aborting = bitset(EF_FATALERRS, e->e_flags);
3676 
3677 	if (aborting)
3678 	{
3679 		ADDRESS *q;
3680 
3681 		/* Log who the mail would have gone to */
3682 		logundelrcpts(e, e->e_message, 8, false);
3683 
3684 		/*
3685 		**  If something above refused the message, we still haven't
3686 		**  accepted responsibility for it.  Don't send DSNs.
3687 		*/
3688 
3689 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
3690 			q->q_flags &= ~Q_PINGFLAGS;
3691 
3692 		flush_errors(true);
3693 		buffer_errors();
3694 		goto abortmessage;
3695 	}
3696 
3697 	/* from now on, we have to operate silently */
3698 	buffer_errors();
3699 
3700 #if 0
3701 	/*
3702 	**  Clear message, it may contain an error from the SMTP dialogue.
3703 	**  This error must not show up in the queue.
3704 	**	Some error message should show up, e.g., alias database
3705 	**	not available, but others shouldn't, e.g., from check_rcpt.
3706 	*/
3707 
3708 	e->e_message = NULL;
3709 #endif /* 0 */
3710 
3711 	/*
3712 	**  Arrange to send to everyone.
3713 	**	If sending to multiple people, mail back
3714 	**		errors rather than reporting directly.
3715 	**	In any case, don't mail back errors for
3716 	**		anything that has happened up to
3717 	**		now (the other end will do this).
3718 	**	Truncate our transcript -- the mail has gotten
3719 	**		to us successfully, and if we have
3720 	**		to mail this back, it will be easier
3721 	**		on the reader.
3722 	**	Then send to everyone.
3723 	**	Finally give a reply code.  If an error has
3724 	**		already been given, don't mail a
3725 	**		message back.
3726 	**	We goose error returns by clearing error bit.
3727 	*/
3728 
3729 	SmtpPhase = "delivery";
3730 	(void) sm_io_setinfo(e->e_xfp, SM_BF_TRUNCATE, NULL);
3731 	id = e->e_id;
3732 
3733 #if NAMED_BIND
3734 	_res.retry = TimeOuts.res_retry[RES_TO_FIRST];
3735 	_res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
3736 #endif /* NAMED_BIND */
3737 
3738 
3739 	for (ee = e; ee != NULL; ee = ee->e_sibling)
3740 	{
3741 		/* make sure we actually do delivery */
3742 		ee->e_flags &= ~EF_CLRQUEUE;
3743 
3744 		/* from now on, operate silently */
3745 		ee->e_errormode = EM_MAIL;
3746 
3747 		if (doublequeue)
3748 		{
3749 			/* make sure it is in the queue */
3750 			queueup(ee, false, true);
3751 		}
3752 		else
3753 		{
3754 			int mode;
3755 
3756 			/* send to all recipients */
3757 			mode = SM_DEFAULT;
3758 #if _FFR_DM_ONE
3759 			if (SM_DM_ONE == e->e_sendmode)
3760 			{
3761 				if (NotFirstDelivery)
3762 				{
3763 					mode = SM_QUEUE;
3764 					e->e_sendmode = SM_QUEUE;
3765 				}
3766 				else
3767 				{
3768 					mode = SM_FORK;
3769 					NotFirstDelivery = true;
3770 				}
3771 			}
3772 #endif /* _FFR_DM_ONE */
3773 			sendall(ee, mode);
3774 		}
3775 		ee->e_to = NULL;
3776 	}
3777 
3778 	/* put back id for SMTP logging in putoutmsg() */
3779 	oldid = CurEnv->e_id;
3780 	CurEnv->e_id = id;
3781 
3782 		/* issue success message */
3783 #if _FFR_MSG_ACCEPT
3784 		if (MessageAccept != NULL && *MessageAccept != '\0')
3785 		{
3786 			char msg[MAXLINE];
3787 
3788 			expand(MessageAccept, msg, sizeof(msg), e);
3789 			message("250 2.0.0 %s", msg);
3790 		}
3791 		else
3792 #endif /* _FFR_MSG_ACCEPT */
3793 		message("250 2.0.0 %s Message accepted for delivery", id);
3794 	CurEnv->e_id = oldid;
3795 
3796 	/* if we just queued, poke it */
3797 	if (doublequeue)
3798 	{
3799 		bool anything_to_send = false;
3800 
3801 		sm_getla();
3802 		for (ee = e; ee != NULL; ee = ee->e_sibling)
3803 		{
3804 			if (WILL_BE_QUEUED(ee->e_sendmode))
3805 				continue;
3806 			if (shouldqueue(ee->e_msgpriority, ee->e_ctime))
3807 			{
3808 				ee->e_sendmode = SM_QUEUE;
3809 				continue;
3810 			}
3811 			else if (QueueMode != QM_QUARANTINE &&
3812 				 ee->e_quarmsg != NULL)
3813 			{
3814 				ee->e_sendmode = SM_QUEUE;
3815 				continue;
3816 			}
3817 			anything_to_send = true;
3818 
3819 			/* close all the queue files */
3820 			closexscript(ee);
3821 			if (ee->e_dfp != NULL)
3822 			{
3823 				(void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
3824 				ee->e_dfp = NULL;
3825 			}
3826 			unlockqueue(ee);
3827 		}
3828 		if (anything_to_send)
3829 		{
3830 #if PIPELINING
3831 			/*
3832 			**  XXX if we don't do this, we get 250 twice
3833 			**	because it is also flushed in the child.
3834 			*/
3835 
3836 			(void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
3837 #endif /* PIPELINING */
3838 			(void) doworklist(e, true, true);
3839 		}
3840 	}
3841 
3842   abortmessage:
3843 	if (tTd(92, 2))
3844 		sm_dprintf("abortmessage: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",
3845 			e->e_id, bitset(EF_LOGSENDER, e->e_flags), LogLevel);
3846 	if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))
3847 		logsender(e, NULL);
3848 	e->e_flags &= ~EF_LOGSENDER;
3849 
3850 	/* clean up a bit */
3851 	smtp->sm_gotmail = false;
3852 
3853 	/*
3854 	**  Call dropenvelope if and only if the envelope is *not*
3855 	**  being processed by the child process forked by doworklist().
3856 	*/
3857 
3858 	if (aborting || bitset(EF_DISCARD, e->e_flags))
3859 		(void) dropenvelope(e, true, false);
3860 	else
3861 	{
3862 		for (ee = e; ee != NULL; ee = ee->e_sibling)
3863 		{
3864 			if (!doublequeue &&
3865 			    QueueMode != QM_QUARANTINE &&
3866 			    ee->e_quarmsg != NULL)
3867 			{
3868 				(void) dropenvelope(ee, true, false);
3869 				continue;
3870 			}
3871 			if (WILL_BE_QUEUED(ee->e_sendmode))
3872 				(void) dropenvelope(ee, true, false);
3873 		}
3874 	}
3875 
3876 	CurEnv = e;
3877 	features = e->e_features;
3878 	sm_rpool_free(e->e_rpool);
3879 	newenvelope(e, e, sm_rpool_new_x(NULL));
3880 	e->e_flags = BlankEnvelope.e_flags;
3881 	e->e_features = features;
3882 
3883 	/* restore connection quarantining */
3884 	if (smtp->sm_quarmsg == NULL)
3885 	{
3886 		e->e_quarmsg = NULL;
3887 		macdefine(&e->e_macro, A_PERM, macid("{quarantine}"), "");
3888 	}
3889 	else
3890 	{
3891 		e->e_quarmsg = sm_rpool_strdup_x(e->e_rpool, smtp->sm_quarmsg);
3892 		macdefine(&e->e_macro, A_PERM,
3893 			  macid("{quarantine}"), e->e_quarmsg);
3894 	}
3895 	return rv;
3896 }
3897 /*
3898 **  LOGUNDELRCPTS -- log undelivered (or all) recipients.
3899 **
3900 **	Parameters:
3901 **		e -- envelope.
3902 **		msg -- message for Stat=
3903 **		level -- log level.
3904 **		all -- log all recipients.
3905 **
3906 **	Returns:
3907 **		none.
3908 **
3909 **	Side Effects:
3910 **		logs undelivered (or all) recipients
3911 */
3912 
3913 void
3914 logundelrcpts(e, msg, level, all)
3915 	ENVELOPE *e;
3916 	char *msg;
3917 	int level;
3918 	bool all;
3919 {
3920 	ADDRESS *a;
3921 
3922 	if (LogLevel <= level || msg == NULL || *msg == '\0')
3923 		return;
3924 
3925 	/* Clear $h so relay= doesn't get mislogged by logdelivery() */
3926 	macdefine(&e->e_macro, A_PERM, 'h', NULL);
3927 
3928 	/* Log who the mail would have gone to */
3929 	for (a = e->e_sendqueue; a != NULL; a = a->q_next)
3930 	{
3931 		if (!QS_IS_UNDELIVERED(a->q_state) && !all)
3932 			continue;
3933 		e->e_to = a->q_paddr;
3934 		logdelivery(NULL, NULL,
3935 #if _FFR_MILTER_ENHSC
3936 			    (a->q_status == NULL && e->e_enhsc[0] != '\0')
3937 			    ? e->e_enhsc :
3938 #endif /* _FFR_MILTER_ENHSC */
3939 			    a->q_status,
3940 			    msg, NULL, (time_t) 0, e);
3941 	}
3942 	e->e_to = NULL;
3943 }
3944 /*
3945 **  CHECKSMTPATTACK -- check for denial-of-service attack by repetition
3946 **
3947 **	Parameters:
3948 **		pcounter -- pointer to a counter for this command.
3949 **		maxcount -- maximum value for this counter before we
3950 **			slow down.
3951 **		waitnow -- sleep now (in this routine)?
3952 **		cname -- command name for logging.
3953 **		e -- the current envelope.
3954 **
3955 **	Returns:
3956 **		time to wait,
3957 **		STOP_ATTACK if twice as many commands as allowed and
3958 **			MaxChildren > 0.
3959 **
3960 **	Side Effects:
3961 **		Slows down if we seem to be under attack.
3962 */
3963 
3964 static time_t
3965 checksmtpattack(pcounter, maxcount, waitnow, cname, e)
3966 	volatile unsigned int *pcounter;
3967 	unsigned int maxcount;
3968 	bool waitnow;
3969 	char *cname;
3970 	ENVELOPE *e;
3971 {
3972 	if (maxcount <= 0)	/* no limit */
3973 		return (time_t) 0;
3974 
3975 	if (++(*pcounter) >= maxcount)
3976 	{
3977 		unsigned int shift;
3978 		time_t s;
3979 
3980 		if (*pcounter == maxcount && LogLevel > 5)
3981 		{
3982 			sm_syslog(LOG_INFO, e->e_id,
3983 				  "%s: possible SMTP attack: command=%.40s, count=%u",
3984 				  CurSmtpClient, cname, *pcounter);
3985 		}
3986 		shift = *pcounter - maxcount;
3987 		s = 1 << shift;
3988 		if (shift > MAXSHIFT || s >= MAXTIMEOUT || s <= 0)
3989 			s = MAXTIMEOUT;
3990 
3991 #define IS_ATTACK(s)	((MaxChildren > 0 && *pcounter >= maxcount * 2)	\
3992 				? STOP_ATTACK : (time_t) s)
3993 
3994 		/* sleep at least 1 second before returning */
3995 		(void) sleep(*pcounter / maxcount);
3996 		s -= *pcounter / maxcount;
3997 		if (s >= MAXTIMEOUT || s < 0)
3998 			s = MAXTIMEOUT;
3999 		if (waitnow && s > 0)
4000 		{
4001 			(void) sleep(s);
4002 			return IS_ATTACK(0);
4003 		}
4004 		return IS_ATTACK(s);
4005 	}
4006 	return (time_t) 0;
4007 }
4008 /*
4009 **  SETUP_SMTPD_IO -- setup I/O fd correctly for the SMTP server
4010 **
4011 **	Parameters:
4012 **		none.
4013 **
4014 **	Returns:
4015 **		nothing.
4016 **
4017 **	Side Effects:
4018 **		may change I/O fd.
4019 */
4020 
4021 static void
4022 setup_smtpd_io()
4023 {
4024 	int inchfd, outchfd, outfd;
4025 
4026 	inchfd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
4027 	outchfd  = sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL);
4028 	outfd = sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL);
4029 	if (outchfd != outfd)
4030 	{
4031 		/* arrange for debugging output to go to remote host */
4032 		(void) dup2(outchfd, outfd);
4033 	}
4034 
4035 	/*
4036 	**  if InChannel and OutChannel are stdin/stdout
4037 	**  and connected to ttys
4038 	**  and fcntl(STDIN, F_SETFL, O_NONBLOCKING) also changes STDOUT,
4039 	**  then "chain" them together.
4040 	*/
4041 
4042 	if (inchfd == STDIN_FILENO && outchfd == STDOUT_FILENO &&
4043 	    isatty(inchfd) && isatty(outchfd))
4044 	{
4045 		int inmode, outmode;
4046 
4047 		inmode = fcntl(inchfd, F_GETFL, 0);
4048 		if (inmode == -1)
4049 		{
4050 			if (LogLevel > 11)
4051 				sm_syslog(LOG_INFO, NOQID,
4052 					"fcntl(inchfd, F_GETFL) failed: %s",
4053 					sm_errstring(errno));
4054 			return;
4055 		}
4056 		outmode = fcntl(outchfd, F_GETFL, 0);
4057 		if (outmode == -1)
4058 		{
4059 			if (LogLevel > 11)
4060 				sm_syslog(LOG_INFO, NOQID,
4061 					"fcntl(outchfd, F_GETFL) failed: %s",
4062 					sm_errstring(errno));
4063 			return;
4064 		}
4065 		if (bitset(O_NONBLOCK, inmode) ||
4066 		    bitset(O_NONBLOCK, outmode) ||
4067 		    fcntl(inchfd, F_SETFL, inmode | O_NONBLOCK) == -1)
4068 			return;
4069 		outmode = fcntl(outchfd, F_GETFL, 0);
4070 		if (outmode != -1 && bitset(O_NONBLOCK, outmode))
4071 		{
4072 			/* changing InChannel also changes OutChannel */
4073 			sm_io_automode(OutChannel, InChannel);
4074 			if (tTd(97, 4) && LogLevel > 9)
4075 				sm_syslog(LOG_INFO, NOQID,
4076 					  "set automode for I (%d)/O (%d) in SMTP server",
4077 					  inchfd, outchfd);
4078 		}
4079 
4080 		/* undo change of inchfd */
4081 		(void) fcntl(inchfd, F_SETFL, inmode);
4082 	}
4083 }
4084 /*
4085 **  SKIPWORD -- skip a fixed word.
4086 **
4087 **	Parameters:
4088 **		p -- place to start looking.
4089 **		w -- word to skip.
4090 **
4091 **	Returns:
4092 **		p following w.
4093 **		NULL on error.
4094 **
4095 **	Side Effects:
4096 **		clobbers the p data area.
4097 */
4098 
4099 static char *
4100 skipword(p, w)
4101 	register char *volatile p;
4102 	char *w;
4103 {
4104 	register char *q;
4105 	char *firstp = p;
4106 
4107 	/* find beginning of word */
4108 	SKIP_SPACE(p);
4109 	q = p;
4110 
4111 	/* find end of word */
4112 	while (*p != '\0' && *p != ':' && !(isascii(*p) && isspace(*p)))
4113 		p++;
4114 	while (isascii(*p) && isspace(*p))
4115 		*p++ = '\0';
4116 	if (*p != ':')
4117 	{
4118 	  syntax:
4119 		usrerr("501 5.5.2 Syntax error in parameters scanning \"%s\"",
4120 			shortenstring(firstp, MAXSHORTSTR));
4121 		return NULL;
4122 	}
4123 	*p++ = '\0';
4124 	SKIP_SPACE(p);
4125 
4126 	if (*p == '\0')
4127 		goto syntax;
4128 
4129 	/* see if the input word matches desired word */
4130 	if (sm_strcasecmp(q, w))
4131 		goto syntax;
4132 
4133 	return p;
4134 }
4135 
4136 /*
4137 **  RESET_MAIL_ESMTP_ARGS -- process ESMTP arguments from MAIL line
4138 **
4139 **	Parameters:
4140 **		e -- the envelope.
4141 **
4142 **	Returns:
4143 **		none.
4144 */
4145 
4146 void
4147 reset_mail_esmtp_args(e)
4148 	ENVELOPE *e;
4149 {
4150 	/* "size": no reset */
4151 
4152 	/* "body" */
4153 	SevenBitInput = SevenBitInput_Saved;
4154 	e->e_bodytype = NULL;
4155 
4156 	/* "envid" */
4157 	e->e_envid = NULL;
4158 	macdefine(&e->e_macro, A_PERM, macid("{dsn_envid}"), NULL);
4159 
4160 	/* "ret" */
4161 	e->e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
4162 	macdefine(&e->e_macro, A_TEMP, macid("{dsn_ret}"), NULL);
4163 
4164 #if SASL
4165 	/* "auth" */
4166 	macdefine(&e->e_macro, A_TEMP, macid("{auth_author}"), NULL);
4167 	e->e_auth_param = "";
4168 # if _FFR_AUTH_PASSING
4169 	macdefine(&BlankEnvelope.e_macro, A_PERM,
4170 				  macid("{auth_author}"), NULL);
4171 # endif /* _FFR_AUTH_PASSING */
4172 #endif /* SASL */
4173 
4174 	/* "by" */
4175 	e->e_deliver_by = 0;
4176 	e->e_dlvr_flag = 0;
4177 }
4178 
4179 /*
4180 **  MAIL_ESMTP_ARGS -- process ESMTP arguments from MAIL line
4181 **
4182 **	Parameters:
4183 **		a -- address (unused, for compatibility with rcpt_esmtp_args)
4184 **		kp -- the parameter key.
4185 **		vp -- the value of that parameter.
4186 **		e -- the envelope.
4187 **
4188 **	Returns:
4189 **		none.
4190 */
4191 
4192 void
4193 mail_esmtp_args(a, kp, vp, e)
4194 	ADDRESS *a;
4195 	char *kp;
4196 	char *vp;
4197 	ENVELOPE *e;
4198 {
4199 	if (sm_strcasecmp(kp, "size") == 0)
4200 	{
4201 		if (vp == NULL)
4202 		{
4203 			usrerr("501 5.5.2 SIZE requires a value");
4204 			/* NOTREACHED */
4205 		}
4206 		macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), vp);
4207 		errno = 0;
4208 		e->e_msgsize = strtol(vp, (char **) NULL, 10);
4209 		if (e->e_msgsize == LONG_MAX && errno == ERANGE)
4210 		{
4211 			usrerr("552 5.2.3 Message size exceeds maximum value");
4212 			/* NOTREACHED */
4213 		}
4214 		if (e->e_msgsize < 0)
4215 		{
4216 			usrerr("552 5.2.3 Message size invalid");
4217 			/* NOTREACHED */
4218 		}
4219 	}
4220 	else if (sm_strcasecmp(kp, "body") == 0)
4221 	{
4222 		if (vp == NULL)
4223 		{
4224 			usrerr("501 5.5.2 BODY requires a value");
4225 			/* NOTREACHED */
4226 		}
4227 		else if (sm_strcasecmp(vp, "8bitmime") == 0)
4228 		{
4229 			SevenBitInput = false;
4230 		}
4231 		else if (sm_strcasecmp(vp, "7bit") == 0)
4232 		{
4233 			SevenBitInput = true;
4234 		}
4235 		else
4236 		{
4237 			usrerr("501 5.5.4 Unknown BODY type %s", vp);
4238 			/* NOTREACHED */
4239 		}
4240 		e->e_bodytype = sm_rpool_strdup_x(e->e_rpool, vp);
4241 	}
4242 	else if (sm_strcasecmp(kp, "envid") == 0)
4243 	{
4244 		if (!bitset(SRV_OFFER_DSN, e->e_features))
4245 		{
4246 			usrerr("504 5.7.0 Sorry, ENVID not supported, we do not allow DSN");
4247 			/* NOTREACHED */
4248 		}
4249 		if (vp == NULL)
4250 		{
4251 			usrerr("501 5.5.2 ENVID requires a value");
4252 			/* NOTREACHED */
4253 		}
4254 		if (!xtextok(vp))
4255 		{
4256 			usrerr("501 5.5.4 Syntax error in ENVID parameter value");
4257 			/* NOTREACHED */
4258 		}
4259 		if (e->e_envid != NULL)
4260 		{
4261 			usrerr("501 5.5.0 Duplicate ENVID parameter");
4262 			/* NOTREACHED */
4263 		}
4264 		e->e_envid = sm_rpool_strdup_x(e->e_rpool, vp);
4265 		macdefine(&e->e_macro, A_PERM,
4266 			macid("{dsn_envid}"), e->e_envid);
4267 	}
4268 	else if (sm_strcasecmp(kp, "ret") == 0)
4269 	{
4270 		if (!bitset(SRV_OFFER_DSN, e->e_features))
4271 		{
4272 			usrerr("504 5.7.0 Sorry, RET not supported, we do not allow DSN");
4273 			/* NOTREACHED */
4274 		}
4275 		if (vp == NULL)
4276 		{
4277 			usrerr("501 5.5.2 RET requires a value");
4278 			/* NOTREACHED */
4279 		}
4280 		if (bitset(EF_RET_PARAM, e->e_flags))
4281 		{
4282 			usrerr("501 5.5.0 Duplicate RET parameter");
4283 			/* NOTREACHED */
4284 		}
4285 		e->e_flags |= EF_RET_PARAM;
4286 		if (sm_strcasecmp(vp, "hdrs") == 0)
4287 			e->e_flags |= EF_NO_BODY_RETN;
4288 		else if (sm_strcasecmp(vp, "full") != 0)
4289 		{
4290 			usrerr("501 5.5.2 Bad argument \"%s\" to RET", vp);
4291 			/* NOTREACHED */
4292 		}
4293 		macdefine(&e->e_macro, A_TEMP, macid("{dsn_ret}"), vp);
4294 	}
4295 #if SASL
4296 	else if (sm_strcasecmp(kp, "auth") == 0)
4297 	{
4298 		int len;
4299 		char *q;
4300 		char *auth_param;	/* the value of the AUTH=x */
4301 		bool saveQuickAbort = QuickAbort;
4302 		bool saveSuprErrs = SuprErrs;
4303 		bool saveExitStat = ExitStat;
4304 
4305 		if (vp == NULL)
4306 		{
4307 			usrerr("501 5.5.2 AUTH= requires a value");
4308 			/* NOTREACHED */
4309 		}
4310 		if (e->e_auth_param != NULL)
4311 		{
4312 			usrerr("501 5.5.0 Duplicate AUTH parameter");
4313 			/* NOTREACHED */
4314 		}
4315 		if ((q = strchr(vp, ' ')) != NULL)
4316 			len = q - vp + 1;
4317 		else
4318 			len = strlen(vp) + 1;
4319 		auth_param = xalloc(len);
4320 		(void) sm_strlcpy(auth_param, vp, len);
4321 		if (!xtextok(auth_param))
4322 		{
4323 			usrerr("501 5.5.4 Syntax error in AUTH parameter value");
4324 			/* just a warning? */
4325 			/* NOTREACHED */
4326 		}
4327 
4328 		/* XXX define this always or only if trusted? */
4329 		macdefine(&e->e_macro, A_TEMP, macid("{auth_author}"),
4330 			  auth_param);
4331 
4332 		/*
4333 		**  call Strust_auth to find out whether
4334 		**  auth_param is acceptable (trusted)
4335 		**  we shouldn't trust it if not authenticated
4336 		**  (required by RFC, leave it to ruleset?)
4337 		*/
4338 
4339 		SuprErrs = true;
4340 		QuickAbort = false;
4341 		if (strcmp(auth_param, "<>") != 0 &&
4342 		     (rscheck("trust_auth", auth_param, NULL, e, RSF_RMCOMM,
4343 			      9, NULL, NOQID, NULL) != EX_OK || Errors > 0))
4344 		{
4345 			if (tTd(95, 8))
4346 			{
4347 				q = e->e_auth_param;
4348 				sm_dprintf("auth=\"%.100s\" not trusted user=\"%.100s\"\n",
4349 					auth_param, (q == NULL) ? "" : q);
4350 			}
4351 
4352 			/* not trusted */
4353 			e->e_auth_param = "<>";
4354 # if _FFR_AUTH_PASSING
4355 			macdefine(&BlankEnvelope.e_macro, A_PERM,
4356 				  macid("{auth_author}"), NULL);
4357 # endif /* _FFR_AUTH_PASSING */
4358 		}
4359 		else
4360 		{
4361 			if (tTd(95, 8))
4362 				sm_dprintf("auth=\"%.100s\" trusted\n", auth_param);
4363 			e->e_auth_param = sm_rpool_strdup_x(e->e_rpool,
4364 							    auth_param);
4365 		}
4366 		sm_free(auth_param); /* XXX */
4367 
4368 		/* reset values */
4369 		Errors = 0;
4370 		QuickAbort = saveQuickAbort;
4371 		SuprErrs = saveSuprErrs;
4372 		ExitStat = saveExitStat;
4373 	}
4374 #endif /* SASL */
4375 #define PRTCHAR(c)	((isascii(c) && isprint(c)) ? (c) : '?')
4376 
4377 	/*
4378 	**  "by" is only accepted if DeliverByMin >= 0.
4379 	**  We maybe could add this to the list of server_features.
4380 	*/
4381 
4382 	else if (sm_strcasecmp(kp, "by") == 0 && DeliverByMin >= 0)
4383 	{
4384 		char *s;
4385 
4386 		if (vp == NULL)
4387 		{
4388 			usrerr("501 5.5.2 BY= requires a value");
4389 			/* NOTREACHED */
4390 		}
4391 		errno = 0;
4392 		e->e_deliver_by = strtol(vp, &s, 10);
4393 		if (e->e_deliver_by == LONG_MIN ||
4394 		    e->e_deliver_by == LONG_MAX ||
4395 		    e->e_deliver_by > 999999999l ||
4396 		    e->e_deliver_by < -999999999l)
4397 		{
4398 			usrerr("501 5.5.2 BY=%s out of range", vp);
4399 			/* NOTREACHED */
4400 		}
4401 		if (s == NULL || *s != ';')
4402 		{
4403 			usrerr("501 5.5.2 BY= missing ';'");
4404 			/* NOTREACHED */
4405 		}
4406 		e->e_dlvr_flag = 0;
4407 		++s;	/* XXX: spaces allowed? */
4408 		SKIP_SPACE(s);
4409 		switch (tolower(*s))
4410 		{
4411 		  case 'n':
4412 			e->e_dlvr_flag = DLVR_NOTIFY;
4413 			break;
4414 		  case 'r':
4415 			e->e_dlvr_flag = DLVR_RETURN;
4416 			if (e->e_deliver_by <= 0)
4417 			{
4418 				usrerr("501 5.5.4 mode R requires BY time > 0");
4419 				/* NOTREACHED */
4420 			}
4421 			if (DeliverByMin > 0 && e->e_deliver_by > 0 &&
4422 			    e->e_deliver_by < DeliverByMin)
4423 			{
4424 				usrerr("555 5.5.2 time %ld less than %ld",
4425 					e->e_deliver_by, (long) DeliverByMin);
4426 				/* NOTREACHED */
4427 			}
4428 			break;
4429 		  default:
4430 			usrerr("501 5.5.2 illegal by-mode '%c'", PRTCHAR(*s));
4431 			/* NOTREACHED */
4432 		}
4433 		++s;	/* XXX: spaces allowed? */
4434 		SKIP_SPACE(s);
4435 		switch (tolower(*s))
4436 		{
4437 		  case 't':
4438 			e->e_dlvr_flag |= DLVR_TRACE;
4439 			break;
4440 		  case '\0':
4441 			break;
4442 		  default:
4443 			usrerr("501 5.5.2 illegal by-trace '%c'", PRTCHAR(*s));
4444 			/* NOTREACHED */
4445 		}
4446 
4447 		/* XXX: check whether more characters follow? */
4448 	}
4449 	else
4450 	{
4451 		usrerr("555 5.5.4 %s parameter unrecognized", kp);
4452 		/* NOTREACHED */
4453 	}
4454 }
4455 
4456 /*
4457 **  RCPT_ESMTP_ARGS -- process ESMTP arguments from RCPT line
4458 **
4459 **	Parameters:
4460 **		a -- the address corresponding to the To: parameter.
4461 **		kp -- the parameter key.
4462 **		vp -- the value of that parameter.
4463 **		e -- the envelope.
4464 **
4465 **	Returns:
4466 **		none.
4467 */
4468 
4469 void
4470 rcpt_esmtp_args(a, kp, vp, e)
4471 	ADDRESS *a;
4472 	char *kp;
4473 	char *vp;
4474 	ENVELOPE *e;
4475 {
4476 	if (sm_strcasecmp(kp, "notify") == 0)
4477 	{
4478 		char *p;
4479 
4480 		if (!bitset(SRV_OFFER_DSN, e->e_features))
4481 		{
4482 			usrerr("504 5.7.0 Sorry, NOTIFY not supported, we do not allow DSN");
4483 			/* NOTREACHED */
4484 		}
4485 		if (vp == NULL)
4486 		{
4487 			usrerr("501 5.5.2 NOTIFY requires a value");
4488 			/* NOTREACHED */
4489 		}
4490 		a->q_flags &= ~(QPINGONSUCCESS|QPINGONFAILURE|QPINGONDELAY);
4491 		a->q_flags |= QHASNOTIFY;
4492 		macdefine(&e->e_macro, A_TEMP, macid("{dsn_notify}"), vp);
4493 
4494 		if (sm_strcasecmp(vp, "never") == 0)
4495 			return;
4496 		for (p = vp; p != NULL; vp = p)
4497 		{
4498 			char *s;
4499 
4500 			s = p = strchr(p, ',');
4501 			if (p != NULL)
4502 				*p++ = '\0';
4503 			if (sm_strcasecmp(vp, "success") == 0)
4504 				a->q_flags |= QPINGONSUCCESS;
4505 			else if (sm_strcasecmp(vp, "failure") == 0)
4506 				a->q_flags |= QPINGONFAILURE;
4507 			else if (sm_strcasecmp(vp, "delay") == 0)
4508 				a->q_flags |= QPINGONDELAY;
4509 			else
4510 			{
4511 				usrerr("501 5.5.4 Bad argument \"%s\"  to NOTIFY",
4512 					vp);
4513 				/* NOTREACHED */
4514 			}
4515 			if (s != NULL)
4516 				*s = ',';
4517 		}
4518 	}
4519 	else if (sm_strcasecmp(kp, "orcpt") == 0)
4520 	{
4521 		char *p;
4522 
4523 		if (!bitset(SRV_OFFER_DSN, e->e_features))
4524 		{
4525 			usrerr("504 5.7.0 Sorry, ORCPT not supported, we do not allow DSN");
4526 			/* NOTREACHED */
4527 		}
4528 		if (vp == NULL)
4529 		{
4530 			usrerr("501 5.5.2 ORCPT requires a value");
4531 			/* NOTREACHED */
4532 		}
4533 		if (a->q_orcpt != NULL)
4534 		{
4535 			usrerr("501 5.5.0 Duplicate ORCPT parameter");
4536 			/* NOTREACHED */
4537 		}
4538 		p = strchr(vp, ';');
4539 		if (p == NULL)
4540 		{
4541 			usrerr("501 5.5.4 Syntax error in ORCPT parameter value");
4542 			/* NOTREACHED */
4543 		}
4544 		*p = '\0';
4545 		if (!isatom(vp) || !xtextok(p + 1))
4546 		{
4547 			*p = ';';
4548 			usrerr("501 5.5.4 Syntax error in ORCPT parameter value");
4549 			/* NOTREACHED */
4550 		}
4551 		*p = ';';
4552 		a->q_orcpt = sm_rpool_strdup_x(e->e_rpool, vp);
4553 	}
4554 	else
4555 	{
4556 		usrerr("555 5.5.4 %s parameter unrecognized", kp);
4557 		/* NOTREACHED */
4558 	}
4559 }
4560 /*
4561 **  PRINTVRFYADDR -- print an entry in the verify queue
4562 **
4563 **	Parameters:
4564 **		a -- the address to print.
4565 **		last -- set if this is the last one.
4566 **		vrfy -- set if this is a VRFY command.
4567 **
4568 **	Returns:
4569 **		none.
4570 **
4571 **	Side Effects:
4572 **		Prints the appropriate 250 codes.
4573 */
4574 #define OFFF	(3 + 1 + 5 + 1)	/* offset in fmt: SMTP reply + enh. code */
4575 
4576 static void
4577 printvrfyaddr(a, last, vrfy)
4578 	register ADDRESS *a;
4579 	bool last;
4580 	bool vrfy;
4581 {
4582 	char fmtbuf[30];
4583 
4584 	if (vrfy && a->q_mailer != NULL &&
4585 	    !bitnset(M_VRFY250, a->q_mailer->m_flags))
4586 		(void) sm_strlcpy(fmtbuf, "252", sizeof(fmtbuf));
4587 	else
4588 		(void) sm_strlcpy(fmtbuf, "250", sizeof(fmtbuf));
4589 	fmtbuf[3] = last ? ' ' : '-';
4590 	(void) sm_strlcpy(&fmtbuf[4], "2.1.5 ", sizeof(fmtbuf) - 4);
4591 	if (a->q_fullname == NULL)
4592 	{
4593 		if ((a->q_mailer == NULL ||
4594 		     a->q_mailer->m_addrtype == NULL ||
4595 		     sm_strcasecmp(a->q_mailer->m_addrtype, "rfc822") == 0) &&
4596 		    strchr(a->q_user, '@') == NULL)
4597 			(void) sm_strlcpy(&fmtbuf[OFFF], "<%s@%s>",
4598 				       sizeof(fmtbuf) - OFFF);
4599 		else
4600 			(void) sm_strlcpy(&fmtbuf[OFFF], "<%s>",
4601 				       sizeof(fmtbuf) - OFFF);
4602 		message(fmtbuf, a->q_user, MyHostName);
4603 	}
4604 	else
4605 	{
4606 		if ((a->q_mailer == NULL ||
4607 		     a->q_mailer->m_addrtype == NULL ||
4608 		     sm_strcasecmp(a->q_mailer->m_addrtype, "rfc822") == 0) &&
4609 		    strchr(a->q_user, '@') == NULL)
4610 			(void) sm_strlcpy(&fmtbuf[OFFF], "%s <%s@%s>",
4611 				       sizeof(fmtbuf) - OFFF);
4612 		else
4613 			(void) sm_strlcpy(&fmtbuf[OFFF], "%s <%s>",
4614 				       sizeof(fmtbuf) - OFFF);
4615 		message(fmtbuf, a->q_fullname, a->q_user, MyHostName);
4616 	}
4617 }
4618 
4619 #if SASL
4620 /*
4621 **  SASLMECHS -- get list of possible AUTH mechanisms
4622 **
4623 **	Parameters:
4624 **		conn -- SASL connection info.
4625 **		mechlist -- output parameter for list of mechanisms.
4626 **
4627 **	Returns:
4628 **		number of mechs.
4629 */
4630 
4631 static int
4632 saslmechs(conn, mechlist)
4633 	sasl_conn_t *conn;
4634 	char **mechlist;
4635 {
4636 	int len, num, result;
4637 
4638 	/* "user" is currently unused */
4639 # if SASL >= 20000
4640 	result = sasl_listmech(conn, NULL,
4641 			       "", " ", "", (const char **) mechlist,
4642 			       (unsigned int *)&len, &num);
4643 # else /* SASL >= 20000 */
4644 	result = sasl_listmech(conn, "user", /* XXX */
4645 			       "", " ", "", mechlist,
4646 			       (unsigned int *)&len, (unsigned int *)&num);
4647 # endif /* SASL >= 20000 */
4648 	if (result != SASL_OK)
4649 	{
4650 		if (LogLevel > 9)
4651 			sm_syslog(LOG_WARNING, NOQID,
4652 				  "AUTH error: listmech=%d, num=%d",
4653 				  result, num);
4654 		num = 0;
4655 	}
4656 	if (num > 0)
4657 	{
4658 		if (LogLevel > 11)
4659 			sm_syslog(LOG_INFO, NOQID,
4660 				  "AUTH: available mech=%s, allowed mech=%s",
4661 				  *mechlist, AuthMechanisms);
4662 		*mechlist = intersect(AuthMechanisms, *mechlist, NULL);
4663 	}
4664 	else
4665 	{
4666 		*mechlist = NULL;	/* be paranoid... */
4667 		if (result == SASL_OK && LogLevel > 9)
4668 			sm_syslog(LOG_WARNING, NOQID,
4669 				  "AUTH warning: no mechanisms");
4670 	}
4671 	return num;
4672 }
4673 
4674 # if SASL >= 20000
4675 /*
4676 **  PROXY_POLICY -- define proxy policy for AUTH
4677 **
4678 **	Parameters:
4679 **		conn -- unused.
4680 **		context -- unused.
4681 **		requested_user -- authorization identity.
4682 **		rlen -- authorization identity length.
4683 **		auth_identity -- authentication identity.
4684 **		alen -- authentication identity length.
4685 **		def_realm -- default user realm.
4686 **		urlen -- user realm length.
4687 **		propctx -- unused.
4688 **
4689 **	Returns:
4690 **		ok?
4691 **
4692 **	Side Effects:
4693 **		sets {auth_authen} macro.
4694 */
4695 
4696 int
4697 proxy_policy(conn, context, requested_user, rlen, auth_identity, alen,
4698 	     def_realm, urlen, propctx)
4699 	sasl_conn_t *conn;
4700 	void *context;
4701 	const char *requested_user;
4702 	unsigned rlen;
4703 	const char *auth_identity;
4704 	unsigned alen;
4705 	const char *def_realm;
4706 	unsigned urlen;
4707 	struct propctx *propctx;
4708 {
4709 	if (auth_identity == NULL)
4710 		return SASL_FAIL;
4711 
4712 	macdefine(&BlankEnvelope.e_macro, A_TEMP,
4713 		  macid("{auth_authen}"),
4714 		  xtextify((char *) auth_identity, "=<>\")"));
4715 
4716 	return SASL_OK;
4717 }
4718 # else /* SASL >= 20000 */
4719 
4720 /*
4721 **  PROXY_POLICY -- define proxy policy for AUTH
4722 **
4723 **	Parameters:
4724 **		context -- unused.
4725 **		auth_identity -- authentication identity.
4726 **		requested_user -- authorization identity.
4727 **		user -- allowed user (output).
4728 **		errstr -- possible error string (output).
4729 **
4730 **	Returns:
4731 **		ok?
4732 */
4733 
4734 int
4735 proxy_policy(context, auth_identity, requested_user, user, errstr)
4736 	void *context;
4737 	const char *auth_identity;
4738 	const char *requested_user;
4739 	const char **user;
4740 	const char **errstr;
4741 {
4742 	if (user == NULL || auth_identity == NULL)
4743 		return SASL_FAIL;
4744 	*user = newstr(auth_identity);
4745 	return SASL_OK;
4746 }
4747 # endif /* SASL >= 20000 */
4748 #endif /* SASL */
4749 
4750 #if STARTTLS
4751 /*
4752 **  INITSRVTLS -- initialize server side TLS
4753 **
4754 **	Parameters:
4755 **		tls_ok -- should tls initialization be done?
4756 **
4757 **	Returns:
4758 **		succeeded?
4759 **
4760 **	Side Effects:
4761 **		sets tls_ok_srv which is a static variable in this module.
4762 **		Do NOT remove assignments to it!
4763 */
4764 
4765 bool
4766 initsrvtls(tls_ok)
4767 	bool tls_ok;
4768 {
4769 	if (!tls_ok)
4770 		return false;
4771 
4772 	/* do NOT remove assignment */
4773 	tls_ok_srv = inittls(&srv_ctx, TLS_Srv_Opts, Srv_SSL_Options, true,
4774 			     SrvCertFile, SrvKeyFile,
4775 			     CACertPath, CACertFile, DHParams);
4776 	return tls_ok_srv;
4777 }
4778 #endif /* STARTTLS */
4779 /*
4780 **  SRVFEATURES -- get features for SMTP server
4781 **
4782 **	Parameters:
4783 **		e -- envelope (should be session context).
4784 **		clientname -- name of client.
4785 **		features -- default features for this invocation.
4786 **
4787 **	Returns:
4788 **		server features.
4789 */
4790 
4791 /* table with options: it uses just one character, how about strings? */
4792 static struct
4793 {
4794 	char		srvf_opt;
4795 	unsigned int	srvf_flag;
4796 } srv_feat_table[] =
4797 {
4798 	{ 'A',	SRV_OFFER_AUTH	},
4799 	{ 'B',	SRV_OFFER_VERB	},
4800 	{ 'C',	SRV_REQ_SEC	},
4801 	{ 'D',	SRV_OFFER_DSN	},
4802 	{ 'E',	SRV_OFFER_ETRN	},
4803 	{ 'L',	SRV_REQ_AUTH	},
4804 #if PIPELINING
4805 # if _FFR_NO_PIPE
4806 	{ 'N',	SRV_NO_PIPE	},
4807 # endif /* _FFR_NO_PIPE */
4808 	{ 'P',	SRV_OFFER_PIPE	},
4809 #endif /* PIPELINING */
4810 	{ 'R',	SRV_VRFY_CLT	},	/* same as V; not documented */
4811 	{ 'S',	SRV_OFFER_TLS	},
4812 /*	{ 'T',	SRV_TMP_FAIL	},	*/
4813 	{ 'V',	SRV_VRFY_CLT	},
4814 	{ 'X',	SRV_OFFER_EXPN	},
4815 /*	{ 'Y',	SRV_OFFER_VRFY	},	*/
4816 	{ '\0',	SRV_NONE	}
4817 };
4818 
4819 static unsigned int
4820 srvfeatures(e, clientname, features)
4821 	ENVELOPE *e;
4822 	char *clientname;
4823 	unsigned int features;
4824 {
4825 	int r, i, j;
4826 	char **pvp, c, opt;
4827 	char pvpbuf[PSBUFSIZE];
4828 
4829 	pvp = NULL;
4830 	r = rscap("srv_features", clientname, "", e, &pvp, pvpbuf,
4831 		  sizeof(pvpbuf));
4832 	if (r != EX_OK)
4833 		return features;
4834 	if (pvp == NULL || pvp[0] == NULL || (pvp[0][0] & 0377) != CANONNET)
4835 		return features;
4836 	if (pvp[1] != NULL && sm_strncasecmp(pvp[1], "temp", 4) == 0)
4837 		return SRV_TMP_FAIL;
4838 
4839 	/*
4840 	**  General rule (see sendmail.h, d_flags):
4841 	**  lower case: required/offered, upper case: Not required/available
4842 	**
4843 	**  Since we can change some features per daemon, we have both
4844 	**  cases here: turn on/off a feature.
4845 	*/
4846 
4847 	for (i = 1; pvp[i] != NULL; i++)
4848 	{
4849 		c = pvp[i][0];
4850 		j = 0;
4851 		for (;;)
4852 		{
4853 			if ((opt = srv_feat_table[j].srvf_opt) == '\0')
4854 			{
4855 				if (LogLevel > 9)
4856 					sm_syslog(LOG_WARNING, e->e_id,
4857 						  "srvfeatures: unknown feature %s",
4858 						  pvp[i]);
4859 				break;
4860 			}
4861 			if (c == opt)
4862 			{
4863 				features &= ~(srv_feat_table[j].srvf_flag);
4864 				break;
4865 			}
4866 			if (c == tolower(opt))
4867 			{
4868 				features |= srv_feat_table[j].srvf_flag;
4869 				break;
4870 			}
4871 			++j;
4872 		}
4873 	}
4874 	return features;
4875 }
4876 
4877 /*
4878 **  HELP -- implement the HELP command.
4879 **
4880 **	Parameters:
4881 **		topic -- the topic we want help for.
4882 **		e -- envelope.
4883 **
4884 **	Returns:
4885 **		none.
4886 **
4887 **	Side Effects:
4888 **		outputs the help file to message output.
4889 */
4890 #define HELPVSTR	"#vers	"
4891 #define HELPVERSION	2
4892 
4893 void
4894 help(topic, e)
4895 	char *topic;
4896 	ENVELOPE *e;
4897 {
4898 	register SM_FILE_T *hf;
4899 	register char *p;
4900 	int len;
4901 	bool noinfo;
4902 	bool first = true;
4903 	long sff = SFF_OPENASROOT|SFF_REGONLY;
4904 	char buf[MAXLINE];
4905 	char inp[MAXLINE];
4906 	static int foundvers = -1;
4907 	extern char Version[];
4908 
4909 	if (DontLockReadFiles)
4910 		sff |= SFF_NOLOCK;
4911 	if (!bitnset(DBS_HELPFILEINUNSAFEDIRPATH, DontBlameSendmail))
4912 		sff |= SFF_SAFEDIRPATH;
4913 
4914 	if (HelpFile == NULL ||
4915 	    (hf = safefopen(HelpFile, O_RDONLY, 0444, sff)) == NULL)
4916 	{
4917 		/* no help */
4918 		errno = 0;
4919 		message("502 5.3.0 Sendmail %s -- HELP not implemented",
4920 			Version);
4921 		return;
4922 	}
4923 
4924 	if (topic == NULL || *topic == '\0')
4925 	{
4926 		topic = "smtp";
4927 		noinfo = false;
4928 	}
4929 	else
4930 	{
4931 		makelower(topic);
4932 		noinfo = true;
4933 	}
4934 
4935 	len = strlen(topic);
4936 
4937 	while (sm_io_fgets(hf, SM_TIME_DEFAULT, buf, sizeof(buf)) >= 0)
4938 	{
4939 		if (buf[0] == '#')
4940 		{
4941 			if (foundvers < 0 &&
4942 			    strncmp(buf, HELPVSTR, strlen(HELPVSTR)) == 0)
4943 			{
4944 				int h;
4945 
4946 				if (sm_io_sscanf(buf + strlen(HELPVSTR), "%d",
4947 						 &h) == 1)
4948 					foundvers = h;
4949 			}
4950 			continue;
4951 		}
4952 		if (strncmp(buf, topic, len) == 0)
4953 		{
4954 			if (first)
4955 			{
4956 				first = false;
4957 
4958 				/* print version if no/old vers# in file */
4959 				if (foundvers < 2 && !noinfo)
4960 					message("214-2.0.0 This is Sendmail version %s", Version);
4961 			}
4962 			p = strpbrk(buf, " \t");
4963 			if (p == NULL)
4964 				p = buf + strlen(buf) - 1;
4965 			else
4966 				p++;
4967 			fixcrlf(p, true);
4968 			if (foundvers >= 2)
4969 			{
4970 				char *lbp;
4971 				int lbs = sizeof(buf) - (p - buf);
4972 
4973 				lbp = translate_dollars(p, p, &lbs);
4974 				expand(lbp, inp, sizeof(inp), e);
4975 				if (p != lbp)
4976 					sm_free(lbp);
4977 				p = inp;
4978 			}
4979 			message("214-2.0.0 %s", p);
4980 			noinfo = false;
4981 		}
4982 	}
4983 
4984 	if (noinfo)
4985 		message("504 5.3.0 HELP topic \"%.10s\" unknown", topic);
4986 	else
4987 		message("214 2.0.0 End of HELP info");
4988 
4989 	if (foundvers != 0 && foundvers < HELPVERSION)
4990 	{
4991 		if (LogLevel > 1)
4992 			sm_syslog(LOG_WARNING, e->e_id,
4993 				  "%s too old (require version %d)",
4994 				  HelpFile, HELPVERSION);
4995 
4996 		/* avoid log next time */
4997 		foundvers = 0;
4998 	}
4999 
5000 	(void) sm_io_close(hf, SM_TIME_DEFAULT);
5001 }
5002 
5003 #if SASL
5004 /*
5005 **  RESET_SASLCONN -- reset SASL connection data
5006 **
5007 **	Parameters:
5008 **		conn -- SASL connection context
5009 **		hostname -- host name
5010 **		various connection data
5011 **
5012 **	Returns:
5013 **		SASL result
5014 */
5015 
5016 static int
5017 reset_saslconn(sasl_conn_t **conn, char *hostname,
5018 # if SASL >= 20000
5019 	       char *remoteip, char *localip,
5020 	       char *auth_id, sasl_ssf_t * ext_ssf)
5021 # else /* SASL >= 20000 */
5022 	       struct sockaddr_in *saddr_r, struct sockaddr_in *saddr_l,
5023 	       sasl_external_properties_t * ext_ssf)
5024 # endif /* SASL >= 20000 */
5025 {
5026 	int result;
5027 
5028 	sasl_dispose(conn);
5029 # if SASL >= 20000
5030 	result = sasl_server_new("smtp", hostname, NULL, NULL, NULL,
5031 				 NULL, 0, conn);
5032 # elif SASL > 10505
5033 	/* use empty realm: only works in SASL > 1.5.5 */
5034 	result = sasl_server_new("smtp", hostname, "", NULL, 0, conn);
5035 # else /* SASL >= 20000 */
5036 	/* use no realm -> realm is set to hostname by SASL lib */
5037 	result = sasl_server_new("smtp", hostname, NULL, NULL, 0,
5038 				 conn);
5039 # endif /* SASL >= 20000 */
5040 	if (result != SASL_OK)
5041 		return result;
5042 
5043 # if SASL >= 20000
5044 #  if NETINET || NETINET6
5045 	if (remoteip != NULL && *remoteip != '\0')
5046 		result = sasl_setprop(*conn, SASL_IPREMOTEPORT, remoteip);
5047 	if (result != SASL_OK)
5048 		return result;
5049 
5050 	if (localip != NULL && *localip != '\0')
5051 		result = sasl_setprop(*conn, SASL_IPLOCALPORT, localip);
5052 	if (result != SASL_OK)
5053 		return result;
5054 #  endif /* NETINET || NETINET6 */
5055 
5056 	result = sasl_setprop(*conn, SASL_SSF_EXTERNAL, ext_ssf);
5057 	if (result != SASL_OK)
5058 		return result;
5059 
5060 	result = sasl_setprop(*conn, SASL_AUTH_EXTERNAL, auth_id);
5061 	if (result != SASL_OK)
5062 		return result;
5063 # else /* SASL >= 20000 */
5064 #  if NETINET
5065 	if (saddr_r != NULL)
5066 		result = sasl_setprop(*conn, SASL_IP_REMOTE, saddr_r);
5067 	if (result != SASL_OK)
5068 		return result;
5069 
5070 	if (saddr_l != NULL)
5071 		result = sasl_setprop(*conn, SASL_IP_LOCAL, saddr_l);
5072 	if (result != SASL_OK)
5073 		return result;
5074 #  endif /* NETINET */
5075 
5076 	result = sasl_setprop(*conn, SASL_SSF_EXTERNAL, ext_ssf);
5077 	if (result != SASL_OK)
5078 		return result;
5079 # endif /* SASL >= 20000 */
5080 	return SASL_OK;
5081 }
5082 #endif /* SASL */
5083