xref: /titanic_41/usr/src/cmd/sendmail/src/deliver.c (revision 29949e866e40b95795203f3ee46f44a197c946e4)
1 /*
2  * Copyright (c) 1998-2005 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #pragma ident	"%Z%%M%	%I%	%E% SMI"
15 
16 #include <sendmail.h>
17 #include <sm/time.h>
18 
19 SM_RCSID("@(#)$Id: deliver.c,v 8.990 2005/08/24 17:58:33 ca Exp $")
20 
21 #if HASSETUSERCONTEXT
22 # include <login_cap.h>
23 #endif /* HASSETUSERCONTEXT */
24 
25 #if NETINET || NETINET6
26 # include <arpa/inet.h>
27 #endif /* NETINET || NETINET6 */
28 
29 #if STARTTLS || SASL
30 # include "sfsasl.h"
31 #endif /* STARTTLS || SASL */
32 
33 static int	deliver __P((ENVELOPE *, ADDRESS *));
34 static void	dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
35 static void	mailfiletimeout __P((int));
36 static void	endwaittimeout __P((int));
37 static int	parse_hostsignature __P((char *, char **, MAILER *));
38 static void	sendenvelope __P((ENVELOPE *, int));
39 extern MCI	*mci_new __P((SM_RPOOL_T *));
40 static int	coloncmp __P((const char *, const char *));
41 
42 #if STARTTLS
43 static int	starttls __P((MAILER *, MCI *, ENVELOPE *));
44 static int	endtlsclt __P((MCI *));
45 #endif /* STARTTLS */
46 # if STARTTLS || SASL
47 static bool	iscltflgset __P((ENVELOPE *, int));
48 # endif /* STARTTLS || SASL */
49 
50 /*
51 **  SENDALL -- actually send all the messages.
52 **
53 **	Parameters:
54 **		e -- the envelope to send.
55 **		mode -- the delivery mode to use.  If SM_DEFAULT, use
56 **			the current e->e_sendmode.
57 **
58 **	Returns:
59 **		none.
60 **
61 **	Side Effects:
62 **		Scans the send lists and sends everything it finds.
63 **		Delivers any appropriate error messages.
64 **		If we are running in a non-interactive mode, takes the
65 **			appropriate action.
66 */
67 
68 void
69 sendall(e, mode)
70 	ENVELOPE *e;
71 	int mode;
72 {
73 	register ADDRESS *q;
74 	char *owner;
75 	int otherowners;
76 	int save_errno;
77 	register ENVELOPE *ee;
78 	ENVELOPE *splitenv = NULL;
79 	int oldverbose = Verbose;
80 	bool somedeliveries = false, expensive = false;
81 	pid_t pid;
82 
83 	/*
84 	**  If this message is to be discarded, don't bother sending
85 	**  the message at all.
86 	*/
87 
88 	if (bitset(EF_DISCARD, e->e_flags))
89 	{
90 		if (tTd(13, 1))
91 			sm_dprintf("sendall: discarding id %s\n", e->e_id);
92 		e->e_flags |= EF_CLRQUEUE;
93 		if (LogLevel > 9)
94 			logundelrcpts(e, "discarded", 9, true);
95 		else if (LogLevel > 4)
96 			sm_syslog(LOG_INFO, e->e_id, "discarded");
97 		markstats(e, NULL, STATS_REJECT);
98 		return;
99 	}
100 
101 	/*
102 	**  If we have had global, fatal errors, don't bother sending
103 	**  the message at all if we are in SMTP mode.  Local errors
104 	**  (e.g., a single address failing) will still cause the other
105 	**  addresses to be sent.
106 	*/
107 
108 	if (bitset(EF_FATALERRS, e->e_flags) &&
109 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
110 	{
111 		e->e_flags |= EF_CLRQUEUE;
112 		return;
113 	}
114 
115 	/* determine actual delivery mode */
116 	if (mode == SM_DEFAULT)
117 	{
118 		mode = e->e_sendmode;
119 		if (mode != SM_VERIFY && mode != SM_DEFER &&
120 		    shouldqueue(e->e_msgpriority, e->e_ctime))
121 			mode = SM_QUEUE;
122 	}
123 
124 	if (tTd(13, 1))
125 	{
126 		sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
127 			mode, e->e_id);
128 		printaddr(sm_debug_file(), &e->e_from, false);
129 		sm_dprintf("\te_flags = ");
130 		printenvflags(e);
131 		sm_dprintf("sendqueue:\n");
132 		printaddr(sm_debug_file(), e->e_sendqueue, true);
133 	}
134 
135 	/*
136 	**  Do any preprocessing necessary for the mode we are running.
137 	**	Check to make sure the hop count is reasonable.
138 	**	Delete sends to the sender in mailing lists.
139 	*/
140 
141 	CurEnv = e;
142 	if (tTd(62, 1))
143 		checkfds(NULL);
144 
145 	if (e->e_hopcount > MaxHopCount)
146 	{
147 		char *recip;
148 
149 		if (e->e_sendqueue != NULL &&
150 		    e->e_sendqueue->q_paddr != NULL)
151 			recip = e->e_sendqueue->q_paddr;
152 		else
153 			recip = "(nobody)";
154 
155 		errno = 0;
156 		queueup(e, WILL_BE_QUEUED(mode), false);
157 		e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
158 		ExitStat = EX_UNAVAILABLE;
159 		syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
160 		       e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
161 		       RealHostName == NULL ? "localhost" : RealHostName,
162 		       recip);
163 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
164 		{
165 			if (QS_IS_DEAD(q->q_state))
166 				continue;
167 			q->q_state = QS_BADADDR;
168 			q->q_status = "5.4.6";
169 			q->q_rstatus = "554 5.4.6 Too many hops";
170 		}
171 		return;
172 	}
173 
174 	/*
175 	**  Do sender deletion.
176 	**
177 	**	If the sender should be queued up, skip this.
178 	**	This can happen if the name server is hosed when you
179 	**	are trying to send mail.  The result is that the sender
180 	**	is instantiated in the queue as a recipient.
181 	*/
182 
183 	if (!bitset(EF_METOO, e->e_flags) &&
184 	    !QS_IS_QUEUEUP(e->e_from.q_state))
185 	{
186 		if (tTd(13, 5))
187 		{
188 			sm_dprintf("sendall: QS_SENDER ");
189 			printaddr(sm_debug_file(), &e->e_from, false);
190 		}
191 		e->e_from.q_state = QS_SENDER;
192 		(void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
193 	}
194 
195 	/*
196 	**  Handle alias owners.
197 	**
198 	**	We scan up the q_alias chain looking for owners.
199 	**	We discard owners that are the same as the return path.
200 	*/
201 
202 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
203 	{
204 		register struct address *a;
205 
206 		for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
207 			continue;
208 		if (a != NULL)
209 			q->q_owner = a->q_owner;
210 
211 		if (q->q_owner != NULL &&
212 		    !QS_IS_DEAD(q->q_state) &&
213 		    strcmp(q->q_owner, e->e_from.q_paddr) == 0)
214 			q->q_owner = NULL;
215 	}
216 
217 	if (tTd(13, 25))
218 	{
219 		sm_dprintf("\nAfter first owner pass, sendq =\n");
220 		printaddr(sm_debug_file(), e->e_sendqueue, true);
221 	}
222 
223 	owner = "";
224 	otherowners = 1;
225 	while (owner != NULL && otherowners > 0)
226 	{
227 		if (tTd(13, 28))
228 			sm_dprintf("owner = \"%s\", otherowners = %d\n",
229 				   owner, otherowners);
230 		owner = NULL;
231 		otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
232 
233 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
234 		{
235 			if (tTd(13, 30))
236 			{
237 				sm_dprintf("Checking ");
238 				printaddr(sm_debug_file(), q, false);
239 			}
240 			if (QS_IS_DEAD(q->q_state))
241 			{
242 				if (tTd(13, 30))
243 					sm_dprintf("    ... QS_IS_DEAD\n");
244 				continue;
245 			}
246 			if (tTd(13, 29) && !tTd(13, 30))
247 			{
248 				sm_dprintf("Checking ");
249 				printaddr(sm_debug_file(), q, false);
250 			}
251 
252 			if (q->q_owner != NULL)
253 			{
254 				if (owner == NULL)
255 				{
256 					if (tTd(13, 40))
257 						sm_dprintf("    ... First owner = \"%s\"\n",
258 							   q->q_owner);
259 					owner = q->q_owner;
260 				}
261 				else if (owner != q->q_owner)
262 				{
263 					if (strcmp(owner, q->q_owner) == 0)
264 					{
265 						if (tTd(13, 40))
266 							sm_dprintf("    ... Same owner = \"%s\"\n",
267 								   owner);
268 
269 						/* make future comparisons cheap */
270 						q->q_owner = owner;
271 					}
272 					else
273 					{
274 						if (tTd(13, 40))
275 							sm_dprintf("    ... Another owner \"%s\"\n",
276 								   q->q_owner);
277 						otherowners++;
278 					}
279 					owner = q->q_owner;
280 				}
281 				else if (tTd(13, 40))
282 					sm_dprintf("    ... Same owner = \"%s\"\n",
283 						   owner);
284 			}
285 			else
286 			{
287 				if (tTd(13, 40))
288 					sm_dprintf("    ... Null owner\n");
289 				otherowners++;
290 			}
291 
292 			if (QS_IS_BADADDR(q->q_state))
293 			{
294 				if (tTd(13, 30))
295 					sm_dprintf("    ... QS_IS_BADADDR\n");
296 				continue;
297 			}
298 
299 			if (QS_IS_QUEUEUP(q->q_state))
300 			{
301 				MAILER *m = q->q_mailer;
302 
303 				/*
304 				**  If we have temporary address failures
305 				**  (e.g., dns failure) and a fallback MX is
306 				**  set, send directly to the fallback MX host.
307 				*/
308 
309 				if (FallbackMX != NULL &&
310 				    !wordinclass(FallbackMX, 'w') &&
311 				    mode != SM_VERIFY &&
312 				    !bitnset(M_NOMX, m->m_flags) &&
313 				    strcmp(m->m_mailer, "[IPC]") == 0 &&
314 				    m->m_argv[0] != NULL &&
315 				    strcmp(m->m_argv[0], "TCP") == 0)
316 				{
317 					int len;
318 					char *p;
319 
320 					if (tTd(13, 30))
321 						sm_dprintf("    ... FallbackMX\n");
322 
323 					len = strlen(FallbackMX) + 1;
324 					p = sm_rpool_malloc_x(e->e_rpool, len);
325 					(void) sm_strlcpy(p, FallbackMX, len);
326 					q->q_state = QS_OK;
327 					q->q_host = p;
328 				}
329 				else
330 				{
331 					if (tTd(13, 30))
332 						sm_dprintf("    ... QS_IS_QUEUEUP\n");
333 					continue;
334 				}
335 			}
336 
337 			/*
338 			**  If this mailer is expensive, and if we don't
339 			**  want to make connections now, just mark these
340 			**  addresses and return.  This is useful if we
341 			**  want to batch connections to reduce load.  This
342 			**  will cause the messages to be queued up, and a
343 			**  daemon will come along to send the messages later.
344 			*/
345 
346 			if (NoConnect && !Verbose &&
347 			    bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
348 			{
349 				if (tTd(13, 30))
350 					sm_dprintf("    ... expensive\n");
351 				q->q_state = QS_QUEUEUP;
352 				expensive = true;
353 			}
354 			else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
355 				 QueueLimitId == NULL &&
356 				 QueueLimitSender == NULL &&
357 				 QueueLimitRecipient == NULL)
358 			{
359 				if (tTd(13, 30))
360 					sm_dprintf("    ... hold\n");
361 				q->q_state = QS_QUEUEUP;
362 				expensive = true;
363 			}
364 			else if (QueueMode != QM_QUARANTINE &&
365 				 e->e_quarmsg != NULL)
366 			{
367 				if (tTd(13, 30))
368 					sm_dprintf("    ... quarantine: %s\n",
369 						   e->e_quarmsg);
370 				q->q_state = QS_QUEUEUP;
371 				expensive = true;
372 			}
373 			else
374 			{
375 				if (tTd(13, 30))
376 					sm_dprintf("    ... deliverable\n");
377 				somedeliveries = true;
378 			}
379 		}
380 
381 		if (owner != NULL && otherowners > 0)
382 		{
383 			/*
384 			**  Split this envelope into two.
385 			*/
386 
387 			ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
388 							    sizeof *ee);
389 			STRUCTCOPY(*e, *ee);
390 			ee->e_message = NULL;
391 			ee->e_id = NULL;
392 			assign_queueid(ee);
393 
394 			if (tTd(13, 1))
395 				sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
396 					   e->e_id, ee->e_id, owner,
397 					   otherowners);
398 
399 			ee->e_header = copyheader(e->e_header, ee->e_rpool);
400 			ee->e_sendqueue = copyqueue(e->e_sendqueue,
401 						    ee->e_rpool);
402 			ee->e_errorqueue = copyqueue(e->e_errorqueue,
403 						     ee->e_rpool);
404 			ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
405 			ee->e_flags |= EF_NORECEIPT;
406 			setsender(owner, ee, NULL, '\0', true);
407 			if (tTd(13, 5))
408 			{
409 				sm_dprintf("sendall(split): QS_SENDER ");
410 				printaddr(sm_debug_file(), &ee->e_from, false);
411 			}
412 			ee->e_from.q_state = QS_SENDER;
413 			ee->e_dfp = NULL;
414 			ee->e_lockfp = NULL;
415 			ee->e_xfp = NULL;
416 			ee->e_qgrp = e->e_qgrp;
417 			ee->e_qdir = e->e_qdir;
418 			ee->e_errormode = EM_MAIL;
419 			ee->e_sibling = splitenv;
420 			ee->e_statmsg = NULL;
421 			if (e->e_quarmsg != NULL)
422 				ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
423 								  e->e_quarmsg);
424 			splitenv = ee;
425 
426 			for (q = e->e_sendqueue; q != NULL; q = q->q_next)
427 			{
428 				if (q->q_owner == owner)
429 				{
430 					q->q_state = QS_CLONED;
431 					if (tTd(13, 6))
432 						sm_dprintf("\t... stripping %s from original envelope\n",
433 							   q->q_paddr);
434 				}
435 			}
436 			for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
437 			{
438 				if (q->q_owner != owner)
439 				{
440 					q->q_state = QS_CLONED;
441 					if (tTd(13, 6))
442 						sm_dprintf("\t... dropping %s from cloned envelope\n",
443 							   q->q_paddr);
444 				}
445 				else
446 				{
447 					/* clear DSN parameters */
448 					q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
449 					q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
450 					if (tTd(13, 6))
451 						sm_dprintf("\t... moving %s to cloned envelope\n",
452 							   q->q_paddr);
453 				}
454 			}
455 
456 			if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
457 				dup_queue_file(e, ee, DATAFL_LETTER);
458 
459 			/*
460 			**  Give the split envelope access to the parent
461 			**  transcript file for errors obtained while
462 			**  processing the recipients (done before the
463 			**  envelope splitting).
464 			*/
465 
466 			if (e->e_xfp != NULL)
467 				ee->e_xfp = sm_io_dup(e->e_xfp);
468 
469 			/* failed to dup e->e_xfp, start a new transcript */
470 			if (ee->e_xfp == NULL)
471 				openxscript(ee);
472 
473 			if (mode != SM_VERIFY && LogLevel > 4)
474 				sm_syslog(LOG_INFO, e->e_id,
475 					  "%s: clone: owner=%s",
476 					  ee->e_id, owner);
477 		}
478 	}
479 
480 	if (owner != NULL)
481 	{
482 		setsender(owner, e, NULL, '\0', true);
483 		if (tTd(13, 5))
484 		{
485 			sm_dprintf("sendall(owner): QS_SENDER ");
486 			printaddr(sm_debug_file(), &e->e_from, false);
487 		}
488 		e->e_from.q_state = QS_SENDER;
489 		e->e_errormode = EM_MAIL;
490 		e->e_flags |= EF_NORECEIPT;
491 		e->e_flags &= ~EF_FATALERRS;
492 	}
493 
494 	/* if nothing to be delivered, just queue up everything */
495 	if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
496 	    mode != SM_VERIFY)
497 	{
498 		time_t now;
499 
500 		if (tTd(13, 29))
501 			sm_dprintf("No deliveries: auto-queuing\n");
502 		mode = SM_QUEUE;
503 		now = curtime();
504 
505 		/* treat this as a delivery in terms of counting tries */
506 		e->e_dtime = now;
507 		if (!expensive)
508 			e->e_ntries++;
509 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
510 		{
511 			ee->e_dtime = now;
512 			if (!expensive)
513 				ee->e_ntries++;
514 		}
515 	}
516 
517 	if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
518 	     (mode != SM_VERIFY &&
519 	      (SuperSafe == SAFE_REALLY ||
520 	       SuperSafe == SAFE_REALLY_POSTMILTER))) &&
521 	    (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
522 	{
523 		bool msync;
524 
525 		/*
526 		**  Be sure everything is instantiated in the queue.
527 		**  Split envelopes first in case the machine crashes.
528 		**  If the original were done first, we may lose
529 		**  recipients.
530 		*/
531 
532 #if !HASFLOCK
533 		msync = false;
534 #else /* !HASFLOCK */
535 		msync = mode == SM_FORK;
536 #endif /* !HASFLOCK */
537 
538 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
539 			queueup(ee, WILL_BE_QUEUED(mode), msync);
540 		queueup(e, WILL_BE_QUEUED(mode), msync);
541 	}
542 
543 	if (tTd(62, 10))
544 		checkfds("after envelope splitting");
545 
546 	/*
547 	**  If we belong in background, fork now.
548 	*/
549 
550 	if (tTd(13, 20))
551 	{
552 		sm_dprintf("sendall: final mode = %c\n", mode);
553 		if (tTd(13, 21))
554 		{
555 			sm_dprintf("\n================ Final Send Queue(s) =====================\n");
556 			sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
557 				   e->e_id, e->e_from.q_paddr);
558 			printaddr(sm_debug_file(), e->e_sendqueue, true);
559 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
560 			{
561 				sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
562 					   ee->e_id, ee->e_from.q_paddr);
563 				printaddr(sm_debug_file(), ee->e_sendqueue, true);
564 			}
565 			sm_dprintf("==========================================================\n\n");
566 		}
567 	}
568 	switch (mode)
569 	{
570 	  case SM_VERIFY:
571 		Verbose = 2;
572 		break;
573 
574 	  case SM_QUEUE:
575 	  case SM_DEFER:
576 #if HASFLOCK
577   queueonly:
578 #endif /* HASFLOCK */
579 		if (e->e_nrcpts > 0)
580 			e->e_flags |= EF_INQUEUE;
581 		dropenvelope(e, splitenv != NULL, true);
582 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
583 		{
584 			if (ee->e_nrcpts > 0)
585 				ee->e_flags |= EF_INQUEUE;
586 			dropenvelope(ee, false, true);
587 		}
588 		return;
589 
590 	  case SM_FORK:
591 		if (e->e_xfp != NULL)
592 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
593 
594 #if !HASFLOCK
595 		/*
596 		**  Since fcntl locking has the interesting semantic that
597 		**  the lock is owned by a process, not by an open file
598 		**  descriptor, we have to flush this to the queue, and
599 		**  then restart from scratch in the child.
600 		*/
601 
602 		{
603 			/* save id for future use */
604 			char *qid = e->e_id;
605 
606 			/* now drop the envelope in the parent */
607 			e->e_flags |= EF_INQUEUE;
608 			dropenvelope(e, splitenv != NULL, false);
609 
610 			/* arrange to reacquire lock after fork */
611 			e->e_id = qid;
612 		}
613 
614 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
615 		{
616 			/* save id for future use */
617 			char *qid = ee->e_id;
618 
619 			/* drop envelope in parent */
620 			ee->e_flags |= EF_INQUEUE;
621 			dropenvelope(ee, false, false);
622 
623 			/* and save qid for reacquisition */
624 			ee->e_id = qid;
625 		}
626 
627 #endif /* !HASFLOCK */
628 
629 		/*
630 		**  Since the delivery may happen in a child and the parent
631 		**  does not wait, the parent may close the maps thereby
632 		**  removing any shared memory used by the map.  Therefore,
633 		**  close the maps now so the child will dynamically open
634 		**  them if necessary.
635 		*/
636 
637 		closemaps(false);
638 
639 		pid = fork();
640 		if (pid < 0)
641 		{
642 			syserr("deliver: fork 1");
643 #if HASFLOCK
644 			goto queueonly;
645 #else /* HASFLOCK */
646 			e->e_id = NULL;
647 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
648 				ee->e_id = NULL;
649 			return;
650 #endif /* HASFLOCK */
651 		}
652 		else if (pid > 0)
653 		{
654 #if HASFLOCK
655 			/* be sure we leave the temp files to our child */
656 			/* close any random open files in the envelope */
657 			closexscript(e);
658 			if (e->e_dfp != NULL)
659 				(void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
660 			e->e_dfp = NULL;
661 			e->e_flags &= ~EF_HAS_DF;
662 
663 			/* can't call unlockqueue to avoid unlink of xfp */
664 			if (e->e_lockfp != NULL)
665 				(void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
666 			else
667 				syserr("%s: sendall: null lockfp", e->e_id);
668 			e->e_lockfp = NULL;
669 #endif /* HASFLOCK */
670 
671 			/* make sure the parent doesn't own the envelope */
672 			e->e_id = NULL;
673 
674 #if USE_DOUBLE_FORK
675 			/* catch intermediate zombie */
676 			(void) waitfor(pid);
677 #endif /* USE_DOUBLE_FORK */
678 			return;
679 		}
680 
681 		/* Reset global flags */
682 		RestartRequest = NULL;
683 		RestartWorkGroup = false;
684 		ShutdownRequest = NULL;
685 		PendingSignal = 0;
686 
687 		/*
688 		**  Initialize exception stack and default exception
689 		**  handler for child process.
690 		*/
691 
692 		sm_exc_newthread(fatal_error);
693 
694 		/*
695 		**  Since we have accepted responsbility for the message,
696 		**  change the SIGTERM handler.  intsig() (the old handler)
697 		**  would remove the envelope if this was a command line
698 		**  message submission.
699 		*/
700 
701 		(void) sm_signal(SIGTERM, SIG_DFL);
702 
703 #if USE_DOUBLE_FORK
704 		/* double fork to avoid zombies */
705 		pid = fork();
706 		if (pid > 0)
707 			exit(EX_OK);
708 		save_errno = errno;
709 #endif /* USE_DOUBLE_FORK */
710 
711 		CurrentPid = getpid();
712 
713 		/* be sure we are immune from the terminal */
714 		disconnect(2, e);
715 		clearstats();
716 
717 		/* prevent parent from waiting if there was an error */
718 		if (pid < 0)
719 		{
720 			errno = save_errno;
721 			syserr("deliver: fork 2");
722 #if HASFLOCK
723 			e->e_flags |= EF_INQUEUE;
724 #else /* HASFLOCK */
725 			e->e_id = NULL;
726 #endif /* HASFLOCK */
727 			finis(true, true, ExitStat);
728 		}
729 
730 		/* be sure to give error messages in child */
731 		QuickAbort = false;
732 
733 		/*
734 		**  Close any cached connections.
735 		**
736 		**	We don't send the QUIT protocol because the parent
737 		**	still knows about the connection.
738 		**
739 		**	This should only happen when delivering an error
740 		**	message.
741 		*/
742 
743 		mci_flush(false, NULL);
744 
745 #if HASFLOCK
746 		break;
747 #else /* HASFLOCK */
748 
749 		/*
750 		**  Now reacquire and run the various queue files.
751 		*/
752 
753 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
754 		{
755 			ENVELOPE *sibling = ee->e_sibling;
756 
757 			(void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
758 				      false, false, ee);
759 			ee->e_sibling = sibling;
760 		}
761 		(void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
762 			      false, false, e);
763 		finis(true, true, ExitStat);
764 #endif /* HASFLOCK */
765 	}
766 
767 	sendenvelope(e, mode);
768 	dropenvelope(e, true, true);
769 	for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
770 	{
771 		CurEnv = ee;
772 		if (mode != SM_VERIFY)
773 			openxscript(ee);
774 		sendenvelope(ee, mode);
775 		dropenvelope(ee, true, true);
776 	}
777 	CurEnv = e;
778 
779 	Verbose = oldverbose;
780 	if (mode == SM_FORK)
781 		finis(true, true, ExitStat);
782 }
783 
784 static void
785 sendenvelope(e, mode)
786 	register ENVELOPE *e;
787 	int mode;
788 {
789 	register ADDRESS *q;
790 	bool didany;
791 
792 	if (tTd(13, 10))
793 		sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
794 			   e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
795 			   e->e_flags);
796 	if (LogLevel > 80)
797 		sm_syslog(LOG_DEBUG, e->e_id,
798 			  "sendenvelope, flags=0x%lx",
799 			  e->e_flags);
800 
801 	/*
802 	**  If we have had global, fatal errors, don't bother sending
803 	**  the message at all if we are in SMTP mode.  Local errors
804 	**  (e.g., a single address failing) will still cause the other
805 	**  addresses to be sent.
806 	*/
807 
808 	if (bitset(EF_FATALERRS, e->e_flags) &&
809 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
810 	{
811 		e->e_flags |= EF_CLRQUEUE;
812 		return;
813 	}
814 
815 	/*
816 	**  Don't attempt deliveries if we want to bounce now
817 	**  or if deliver-by time is exceeded.
818 	*/
819 
820 	if (!bitset(EF_RESPONSE, e->e_flags) &&
821 	    (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
822 	     (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
823 	      curtime() > e->e_ctime + e->e_deliver_by)))
824 		return;
825 
826 	/*
827 	**  Run through the list and send everything.
828 	**
829 	**	Set EF_GLOBALERRS so that error messages during delivery
830 	**	result in returned mail.
831 	*/
832 
833 	e->e_nsent = 0;
834 	e->e_flags |= EF_GLOBALERRS;
835 
836 	macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
837 	macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
838 	didany = false;
839 
840 	if (!bitset(EF_SPLIT, e->e_flags))
841 	{
842 		ENVELOPE *oldsib;
843 		ENVELOPE *ee;
844 
845 		/*
846 		**  Save old sibling and set it to NULL to avoid
847 		**  queueing up the same envelopes again.
848 		**  This requires that envelopes in that list have
849 		**  been take care of before (or at some other place).
850 		*/
851 
852 		oldsib = e->e_sibling;
853 		e->e_sibling = NULL;
854 		if (!split_by_recipient(e) &&
855 		    bitset(EF_FATALERRS, e->e_flags))
856 		{
857 			if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
858 				e->e_flags |= EF_CLRQUEUE;
859 			return;
860 		}
861 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
862 			queueup(ee, false, true);
863 
864 		/* clean up */
865 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
866 		{
867 			/* now unlock the job */
868 			closexscript(ee);
869 			unlockqueue(ee);
870 
871 			/* this envelope is marked unused */
872 			if (ee->e_dfp != NULL)
873 			{
874 				(void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
875 				ee->e_dfp = NULL;
876 			}
877 			ee->e_id = NULL;
878 			ee->e_flags &= ~EF_HAS_DF;
879 		}
880 		e->e_sibling = oldsib;
881 	}
882 
883 	/* now run through the queue */
884 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
885 	{
886 #if XDEBUG
887 		char wbuf[MAXNAME + 20];
888 
889 		(void) sm_snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
890 				   MAXNAME, q->q_paddr);
891 		checkfd012(wbuf);
892 #endif /* XDEBUG */
893 		if (mode == SM_VERIFY)
894 		{
895 			e->e_to = q->q_paddr;
896 			if (QS_IS_SENDABLE(q->q_state))
897 			{
898 				if (q->q_host != NULL && q->q_host[0] != '\0')
899 					message("deliverable: mailer %s, host %s, user %s",
900 						q->q_mailer->m_name,
901 						q->q_host,
902 						q->q_user);
903 				else
904 					message("deliverable: mailer %s, user %s",
905 						q->q_mailer->m_name,
906 						q->q_user);
907 			}
908 		}
909 		else if (QS_IS_OK(q->q_state))
910 		{
911 			/*
912 			**  Checkpoint the send list every few addresses
913 			*/
914 
915 			if (CheckpointInterval > 0 &&
916 			    e->e_nsent >= CheckpointInterval)
917 			{
918 				queueup(e, false, false);
919 				e->e_nsent = 0;
920 			}
921 			(void) deliver(e, q);
922 			didany = true;
923 		}
924 	}
925 	if (didany)
926 	{
927 		e->e_dtime = curtime();
928 		e->e_ntries++;
929 	}
930 
931 #if XDEBUG
932 	checkfd012("end of sendenvelope");
933 #endif /* XDEBUG */
934 }
935 
936 #if REQUIRES_DIR_FSYNC
937 /*
938 **  SYNC_DIR -- fsync a directory based on a filename
939 **
940 **	Parameters:
941 **		filename -- path of file
942 **		panic -- panic?
943 **
944 **	Returns:
945 **		none
946 */
947 
948 void
949 sync_dir(filename, panic)
950 	char *filename;
951 	bool panic;
952 {
953 	int dirfd;
954 	char *dirp;
955 	char dir[MAXPATHLEN];
956 
957 	if (!RequiresDirfsync)
958 		return;
959 
960 	/* filesystems which require the directory be synced */
961 	dirp = strrchr(filename, '/');
962 	if (dirp != NULL)
963 	{
964 		if (sm_strlcpy(dir, filename, sizeof dir) >= sizeof dir)
965 			return;
966 		dir[dirp - filename] = '\0';
967 		dirp = dir;
968 	}
969 	else
970 		dirp = ".";
971 	dirfd = open(dirp, O_RDONLY, 0700);
972 	if (tTd(40,32))
973 		sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
974 			  dirp, dirfd);
975 	if (dirfd >= 0)
976 	{
977 		if (fsync(dirfd) < 0)
978 		{
979 			if (panic)
980 				syserr("!sync_dir: cannot fsync directory %s",
981 				       dirp);
982 			else if (LogLevel > 1)
983 				sm_syslog(LOG_ERR, NOQID,
984 					  "sync_dir: cannot fsync directory %s: %s",
985 					  dirp, sm_errstring(errno));
986 		}
987 		(void) close(dirfd);
988 	}
989 }
990 #endif /* REQUIRES_DIR_FSYNC */
991 /*
992 **  DUP_QUEUE_FILE -- duplicate a queue file into a split queue
993 **
994 **	Parameters:
995 **		e -- the existing envelope
996 **		ee -- the new envelope
997 **		type -- the queue file type (e.g., DATAFL_LETTER)
998 **
999 **	Returns:
1000 **		none
1001 */
1002 
1003 static void
1004 dup_queue_file(e, ee, type)
1005 	ENVELOPE *e, *ee;
1006 	int type;
1007 {
1008 	char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1009 
1010 	ee->e_dfp = NULL;
1011 	ee->e_xfp = NULL;
1012 
1013 	/*
1014 	**  Make sure both are in the same directory.
1015 	*/
1016 
1017 	(void) sm_strlcpy(f1buf, queuename(e, type), sizeof f1buf);
1018 	(void) sm_strlcpy(f2buf, queuename(ee, type), sizeof f2buf);
1019 
1020 	/* Force the df to disk if it's not there yet */
1021 	if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1022 	    sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1023 	    errno != EINVAL)
1024 	{
1025 		syserr("!dup_queue_file: can't commit %s", f1buf);
1026 		/* NOTREACHED */
1027 	}
1028 
1029 	if (link(f1buf, f2buf) < 0)
1030 	{
1031 		int save_errno = errno;
1032 
1033 		syserr("sendall: link(%s, %s)", f1buf, f2buf);
1034 		if (save_errno == EEXIST)
1035 		{
1036 			if (unlink(f2buf) < 0)
1037 			{
1038 				syserr("!sendall: unlink(%s): permanent",
1039 				       f2buf);
1040 				/* NOTREACHED */
1041 			}
1042 			if (link(f1buf, f2buf) < 0)
1043 			{
1044 				syserr("!sendall: link(%s, %s): permanent",
1045 				       f1buf, f2buf);
1046 				/* NOTREACHED */
1047 			}
1048 		}
1049 	}
1050 	SYNC_DIR(f2buf, true);
1051 }
1052 /*
1053 **  DOFORK -- do a fork, retrying a couple of times on failure.
1054 **
1055 **	This MUST be a macro, since after a vfork we are running
1056 **	two processes on the same stack!!!
1057 **
1058 **	Parameters:
1059 **		none.
1060 **
1061 **	Returns:
1062 **		From a macro???  You've got to be kidding!
1063 **
1064 **	Side Effects:
1065 **		Modifies the ==> LOCAL <== variable 'pid', leaving:
1066 **			pid of child in parent, zero in child.
1067 **			-1 on unrecoverable error.
1068 **
1069 **	Notes:
1070 **		I'm awfully sorry this looks so awful.  That's
1071 **		vfork for you.....
1072 */
1073 
1074 #define NFORKTRIES	5
1075 
1076 #ifndef FORK
1077 # define FORK	fork
1078 #endif /* ! FORK */
1079 
1080 #define DOFORK(fORKfN) \
1081 {\
1082 	register int i;\
1083 \
1084 	for (i = NFORKTRIES; --i >= 0; )\
1085 	{\
1086 		pid = fORKfN();\
1087 		if (pid >= 0)\
1088 			break;\
1089 		if (i > 0)\
1090 			(void) sleep((unsigned) NFORKTRIES - i);\
1091 	}\
1092 }
1093 /*
1094 **  DOFORK -- simple fork interface to DOFORK.
1095 **
1096 **	Parameters:
1097 **		none.
1098 **
1099 **	Returns:
1100 **		pid of child in parent.
1101 **		zero in child.
1102 **		-1 on error.
1103 **
1104 **	Side Effects:
1105 **		returns twice, once in parent and once in child.
1106 */
1107 
1108 pid_t
1109 dofork()
1110 {
1111 	register pid_t pid = -1;
1112 
1113 	DOFORK(fork);
1114 	return pid;
1115 }
1116 
1117 /*
1118 **  COLONCMP -- compare host-signatures up to first ':' or EOS
1119 **
1120 **	This takes two strings which happen to be host-signatures and
1121 **	compares them. If the lowest preference portions of the MX-RR's
1122 **	match (up to ':' or EOS, whichever is first), then we have
1123 **	match. This is used for coattail-piggybacking messages during
1124 **	message delivery.
1125 **	If the signatures are the same up to the first ':' the remainder of
1126 **	the signatures are then compared with a normal strcmp(). This saves
1127 **	re-examining the first part of the signatures.
1128 **
1129 **	Parameters:
1130 **		a - first host-signature
1131 **		b - second host-signature
1132 **
1133 **	Returns:
1134 **		HS_MATCH_NO -- no "match".
1135 **		HS_MATCH_FIRST -- "match" for the first MX preference
1136 **			(up to the first colon (':')).
1137 **		HS_MATCH_FULL -- match for the entire MX record.
1138 **
1139 **	Side Effects:
1140 **		none.
1141 */
1142 
1143 #define HS_MATCH_NO	0
1144 #define HS_MATCH_FIRST	1
1145 #define HS_MATCH_FULL	2
1146 
1147 static int
1148 coloncmp(a, b)
1149 	register const char *a;
1150 	register const char *b;
1151 {
1152 	int ret = HS_MATCH_NO;
1153 	int braclev = 0;
1154 
1155 	while (*a == *b++)
1156 	{
1157 		/* Need to account for IPv6 bracketed addresses */
1158 		if (*a == '[')
1159 			braclev++;
1160 		else if (*a == ']' && braclev > 0)
1161 			braclev--;
1162 		else if (*a == ':' && braclev <= 0)
1163 		{
1164 			ret = HS_MATCH_FIRST;
1165 			a++;
1166 			break;
1167 		}
1168 		else if (*a == '\0')
1169 			return HS_MATCH_FULL; /* a full match */
1170 		a++;
1171 	}
1172 	if (ret == HS_MATCH_NO &&
1173 	    braclev <= 0 &&
1174 	    ((*a == '\0' && *(b - 1) == ':') ||
1175 	     (*a == ':' && *(b - 1) == '\0')))
1176 		return HS_MATCH_FIRST;
1177 	if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1178 		return HS_MATCH_FULL;
1179 
1180 	return ret;
1181 }
1182 
1183 /*
1184 **  SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1185 **
1186 **	Parameters:
1187 **		e -- envelope
1188 **		tried_fallbacksmarthost -- has been tried already? (in/out)
1189 **		hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1190 **		hbsz -- size of hostbuf
1191 **		status -- current delivery status
1192 **
1193 **	Returns:
1194 **		true iff FallbackSmartHost should be tried.
1195 */
1196 
1197 static bool
1198 should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1199 	ENVELOPE *e;
1200 	bool *tried_fallbacksmarthost;
1201 	char *hostbuf;
1202 	size_t hbsz;
1203 	int status;
1204 {
1205 	/*
1206 	**  If the host was not found or a temporary failure occurred
1207 	**  and a FallbackSmartHost is defined (and we have not yet
1208 	**  tried it), then make one last try with it as the host.
1209 	*/
1210 
1211 	if ((status == EX_NOHOST || status == EX_TEMPFAIL) &&
1212 	    FallbackSmartHost != NULL && !*tried_fallbacksmarthost)
1213 	{
1214 		*tried_fallbacksmarthost = true;
1215 		expand(FallbackSmartHost, hostbuf, hbsz, e);
1216 		if (!wordinclass(hostbuf, 'w'))
1217 		{
1218 			if (tTd(11, 1))
1219 				sm_dprintf("one last try with FallbackSmartHost %s\n",
1220 					   hostbuf);
1221 			return true;
1222 		}
1223 	}
1224 	return false;
1225 }
1226 /*
1227 **  DELIVER -- Deliver a message to a list of addresses.
1228 **
1229 **	This routine delivers to everyone on the same host as the
1230 **	user on the head of the list.  It is clever about mailers
1231 **	that don't handle multiple users.  It is NOT guaranteed
1232 **	that it will deliver to all these addresses however -- so
1233 **	deliver should be called once for each address on the
1234 **	list.
1235 **	Deliver tries to be as opportunistic as possible about piggybacking
1236 **	messages. Some definitions to make understanding easier follow below.
1237 **	Piggybacking occurs when an existing connection to a mail host can
1238 **	be used to send the same message to more than one recipient at the
1239 **	same time. So "no piggybacking" means one message for one recipient
1240 **	per connection. "Intentional piggybacking" happens when the
1241 **	recipients' host address (not the mail host address) is used to
1242 **	attempt piggybacking. Recipients with the same host address
1243 **	have the same mail host. "Coincidental piggybacking" relies on
1244 **	piggybacking based on all the mail host addresses in the MX-RR. This
1245 **	is "coincidental" in the fact it could not be predicted until the
1246 **	MX Resource Records for the hosts were obtained and examined. For
1247 **	example (preference order and equivalence is important, not values):
1248 **		domain1 IN MX 10 mxhost-A
1249 **			IN MX 20 mxhost-B
1250 **		domain2 IN MX  4 mxhost-A
1251 **			IN MX  8 mxhost-B
1252 **	Domain1 and domain2 can piggyback the same message to mxhost-A or
1253 **	mxhost-B (if mxhost-A cannot be reached).
1254 **	"Coattail piggybacking" relaxes the strictness of "coincidental
1255 **	piggybacking" in the hope that most significant (lowest value)
1256 **	MX preference host(s) can create more piggybacking. For example
1257 **	(again, preference order and equivalence is important, not values):
1258 **		domain3 IN MX 100 mxhost-C
1259 **			IN MX 100 mxhost-D
1260 **			IN MX 200 mxhost-E
1261 **		domain4 IN MX  50 mxhost-C
1262 **			IN MX  50 mxhost-D
1263 **			IN MX  80 mxhost-F
1264 **	A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1265 **	is available. Same with mxhost-D because in both RR's the preference
1266 **	value is the same as mxhost-C, respectively.
1267 **	So deliver attempts coattail piggybacking when possible. If the
1268 **	first MX preference level hosts cannot be used then the piggybacking
1269 **	reverts to coincidental piggybacking. Using the above example you
1270 **	cannot deliver to mxhost-F for domain3 regardless of preference value.
1271 **	("Coattail" from "riding on the coattails of your predecessor" meaning
1272 **	gaining benefit from a predecessor effort with no or little addition
1273 **	effort. The predecessor here being the preceding MX RR).
1274 **
1275 **	Parameters:
1276 **		e -- the envelope to deliver.
1277 **		firstto -- head of the address list to deliver to.
1278 **
1279 **	Returns:
1280 **		zero -- successfully delivered.
1281 **		else -- some failure, see ExitStat for more info.
1282 **
1283 **	Side Effects:
1284 **		The standard input is passed off to someone.
1285 */
1286 
1287 static int
1288 deliver(e, firstto)
1289 	register ENVELOPE *e;
1290 	ADDRESS *firstto;
1291 {
1292 	char *host;			/* host being sent to */
1293 	char *user;			/* user being sent to */
1294 	char **pvp;
1295 	register char **mvp;
1296 	register char *p;
1297 	register MAILER *m;		/* mailer for this recipient */
1298 	ADDRESS *volatile ctladdr;
1299 #if HASSETUSERCONTEXT
1300 	ADDRESS *volatile contextaddr = NULL;
1301 #endif /* HASSETUSERCONTEXT */
1302 	register MCI *volatile mci;
1303 	register ADDRESS *SM_NONVOLATILE to = firstto;
1304 	volatile bool clever = false;	/* running user smtp to this mailer */
1305 	ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1306 	int rcode;			/* response code */
1307 	SM_NONVOLATILE int lmtp_rcode = EX_OK;
1308 	SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1309 	SM_NONVOLATILE int hostnum = 0;	/* current MX host index */
1310 	char *firstsig;			/* signature of firstto */
1311 	volatile pid_t pid = -1;
1312 	char *volatile curhost;
1313 	SM_NONVOLATILE unsigned short port = 0;
1314 	SM_NONVOLATILE time_t enough = 0;
1315 #if NETUNIX
1316 	char *SM_NONVOLATILE mux_path = NULL;	/* path to UNIX domain socket */
1317 #endif /* NETUNIX */
1318 	time_t xstart;
1319 	bool suidwarn;
1320 	bool anyok;			/* at least one address was OK */
1321 	SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1322 	bool ovr;
1323 	bool quarantine;
1324 	int strsize;
1325 	int rcptcount;
1326 	int ret;
1327 	static int tobufsize = 0;
1328 	static char *tobuf = NULL;
1329 	char *rpath;	/* translated return path */
1330 	int mpvect[2];
1331 	int rpvect[2];
1332 	char *mxhosts[MAXMXHOSTS + 1];
1333 	char *pv[MAXPV + 1];
1334 	char buf[MAXNAME + 1];
1335 	char cbuf[MAXPATHLEN];
1336 
1337 	errno = 0;
1338 	if (!QS_IS_OK(to->q_state))
1339 		return 0;
1340 
1341 	suidwarn = geteuid() == 0;
1342 
1343 	m = to->q_mailer;
1344 	host = to->q_host;
1345 	CurEnv = e;			/* just in case */
1346 	e->e_statmsg = NULL;
1347 	SmtpError[0] = '\0';
1348 	xstart = curtime();
1349 
1350 	if (tTd(10, 1))
1351 		sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1352 			e->e_id, m->m_name, host, to->q_user);
1353 	if (tTd(10, 100))
1354 		printopenfds(false);
1355 
1356 	/*
1357 	**  Clear {client_*} macros if this is a bounce message to
1358 	**  prevent rejection by check_compat ruleset.
1359 	*/
1360 
1361 	if (bitset(EF_RESPONSE, e->e_flags))
1362 	{
1363 		macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1364 		macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1365 		macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1366 		macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1367 		macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1368 	}
1369 
1370 	SM_TRY
1371 	{
1372 	ADDRESS *skip_back = NULL;
1373 
1374 	/*
1375 	**  Do initial argv setup.
1376 	**	Insert the mailer name.  Notice that $x expansion is
1377 	**	NOT done on the mailer name.  Then, if the mailer has
1378 	**	a picky -f flag, we insert it as appropriate.  This
1379 	**	code does not check for 'pv' overflow; this places a
1380 	**	manifest lower limit of 4 for MAXPV.
1381 	**		The from address rewrite is expected to make
1382 	**		the address relative to the other end.
1383 	*/
1384 
1385 	/* rewrite from address, using rewriting rules */
1386 	rcode = EX_OK;
1387 	if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1388 		p = e->e_sender;
1389 	else
1390 		p = e->e_from.q_paddr;
1391 	rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1392 	if (strlen(rpath) > MAXSHORTSTR)
1393 	{
1394 		rpath = shortenstring(rpath, MAXSHORTSTR);
1395 
1396 		/* avoid bogus errno */
1397 		errno = 0;
1398 		syserr("remotename: huge return path %s", rpath);
1399 	}
1400 	rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1401 	macdefine(&e->e_macro, A_PERM, 'g', rpath);
1402 	macdefine(&e->e_macro, A_PERM, 'h', host);
1403 	Errors = 0;
1404 	pvp = pv;
1405 	*pvp++ = m->m_argv[0];
1406 
1407 	/* ignore long term host status information if mailer flag W is set */
1408 	if (bitnset(M_NOHOSTSTAT, m->m_flags))
1409 		IgnoreHostStatus = true;
1410 
1411 	/* insert -f or -r flag as appropriate */
1412 	if (FromFlag &&
1413 	    (bitnset(M_FOPT, m->m_flags) ||
1414 	     bitnset(M_ROPT, m->m_flags)))
1415 	{
1416 		if (bitnset(M_FOPT, m->m_flags))
1417 			*pvp++ = "-f";
1418 		else
1419 			*pvp++ = "-r";
1420 		*pvp++ = rpath;
1421 	}
1422 
1423 	/*
1424 	**  Append the other fixed parts of the argv.  These run
1425 	**  up to the first entry containing "$u".  There can only
1426 	**  be one of these, and there are only a few more slots
1427 	**  in the pv after it.
1428 	*/
1429 
1430 	for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1431 	{
1432 		/* can't use strchr here because of sign extension problems */
1433 		while (*p != '\0')
1434 		{
1435 			if ((*p++ & 0377) == MACROEXPAND)
1436 			{
1437 				if (*p == 'u')
1438 					break;
1439 			}
1440 		}
1441 
1442 		if (*p != '\0')
1443 			break;
1444 
1445 		/* this entry is safe -- go ahead and process it */
1446 		expand(*mvp, buf, sizeof buf, e);
1447 		*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1448 		if (pvp >= &pv[MAXPV - 3])
1449 		{
1450 			syserr("554 5.3.5 Too many parameters to %s before $u",
1451 			       pv[0]);
1452 			rcode = -1;
1453 			goto cleanup;
1454 		}
1455 	}
1456 
1457 	/*
1458 	**  If we have no substitution for the user name in the argument
1459 	**  list, we know that we must supply the names otherwise -- and
1460 	**  SMTP is the answer!!
1461 	*/
1462 
1463 	if (*mvp == NULL)
1464 	{
1465 		/* running LMTP or SMTP */
1466 		clever = true;
1467 		*pvp = NULL;
1468 	}
1469 	else if (bitnset(M_LMTP, m->m_flags))
1470 	{
1471 		/* not running LMTP */
1472 		sm_syslog(LOG_ERR, NULL,
1473 			  "Warning: mailer %s: LMTP flag (F=z) turned off",
1474 			  m->m_name);
1475 		clrbitn(M_LMTP, m->m_flags);
1476 	}
1477 
1478 	/*
1479 	**  At this point *mvp points to the argument with $u.  We
1480 	**  run through our address list and append all the addresses
1481 	**  we can.  If we run out of space, do not fret!  We can
1482 	**  always send another copy later.
1483 	*/
1484 
1485 	e->e_to = NULL;
1486 	strsize = 2;
1487 	rcptcount = 0;
1488 	ctladdr = NULL;
1489 	if (firstto->q_signature == NULL)
1490 		firstto->q_signature = hostsignature(firstto->q_mailer,
1491 						     firstto->q_host);
1492 	firstsig = firstto->q_signature;
1493 
1494 	for (; to != NULL; to = to->q_next)
1495 	{
1496 		/* avoid sending multiple recipients to dumb mailers */
1497 		if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1498 			break;
1499 
1500 		/* if already sent or not for this host, don't send */
1501 		if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1502 			continue;
1503 
1504 		/*
1505 		**  Must be same mailer to keep grouping rcpts.
1506 		**  If mailers don't match: continue; sendqueue is not
1507 		**  sorted by mailers, so don't break;
1508 		*/
1509 
1510 		if (to->q_mailer != firstto->q_mailer)
1511 			continue;
1512 
1513 		if (to->q_signature == NULL) /* for safety */
1514 			to->q_signature = hostsignature(to->q_mailer,
1515 							to->q_host);
1516 
1517 		/*
1518 		**  This is for coincidental and tailcoat piggybacking messages
1519 		**  to the same mail host. While the signatures are identical
1520 		**  (that's the MX-RR's are identical) we can do coincidental
1521 		**  piggybacking. We try hard for coattail piggybacking
1522 		**  with the same mail host when the next recipient has the
1523 		**  same host at lowest preference. It may be that this
1524 		**  won't work out, so 'skip_back' is maintained if a backup
1525 		**  to coincidental piggybacking or full signature must happen.
1526 		*/
1527 
1528 		ret = firstto == to ? HS_MATCH_FULL :
1529 				      coloncmp(to->q_signature, firstsig);
1530 		if (ret == HS_MATCH_FULL)
1531 			skip_back = to;
1532 		else if (ret == HS_MATCH_NO)
1533 			break;
1534 
1535 		if (!clever)
1536 		{
1537 			/* avoid overflowing tobuf */
1538 			strsize += strlen(to->q_paddr) + 1;
1539 			if (strsize > TOBUFSIZE)
1540 				break;
1541 		}
1542 
1543 		if (++rcptcount > to->q_mailer->m_maxrcpt)
1544 			break;
1545 
1546 		if (tTd(10, 1))
1547 		{
1548 			sm_dprintf("\nsend to ");
1549 			printaddr(sm_debug_file(), to, false);
1550 		}
1551 
1552 		/* compute effective uid/gid when sending */
1553 		if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1554 # if HASSETUSERCONTEXT
1555 			contextaddr = ctladdr = getctladdr(to);
1556 # else /* HASSETUSERCONTEXT */
1557 			ctladdr = getctladdr(to);
1558 # endif /* HASSETUSERCONTEXT */
1559 
1560 		if (tTd(10, 2))
1561 		{
1562 			sm_dprintf("ctladdr=");
1563 			printaddr(sm_debug_file(), ctladdr, false);
1564 		}
1565 
1566 		user = to->q_user;
1567 		e->e_to = to->q_paddr;
1568 
1569 		/*
1570 		**  Check to see that these people are allowed to
1571 		**  talk to each other.
1572 		**  Check also for overflow of e_msgsize.
1573 		*/
1574 
1575 		if (m->m_maxsize != 0 &&
1576 		    (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1577 		{
1578 			e->e_flags |= EF_NO_BODY_RETN;
1579 			if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1580 				to->q_status = "5.2.3";
1581 			else
1582 				to->q_status = "5.3.4";
1583 
1584 			/* set to->q_rstatus = NULL; or to the following? */
1585 			usrerrenh(to->q_status,
1586 				  "552 Message is too large; %ld bytes max",
1587 				  m->m_maxsize);
1588 			markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1589 			giveresponse(EX_UNAVAILABLE, to->q_status, m,
1590 				     NULL, ctladdr, xstart, e, to);
1591 			continue;
1592 		}
1593 		SM_SET_H_ERRNO(0);
1594 		ovr = true;
1595 
1596 		/* do config file checking of compatibility */
1597 		quarantine = (e->e_quarmsg != NULL);
1598 		rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1599 				e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1600 				e->e_id);
1601 		if (rcode == EX_OK)
1602 		{
1603 			/* do in-code checking if not discarding */
1604 			if (!bitset(EF_DISCARD, e->e_flags))
1605 			{
1606 				rcode = checkcompat(to, e);
1607 				ovr = false;
1608 			}
1609 		}
1610 		if (rcode != EX_OK)
1611 		{
1612 			markfailure(e, to, NULL, rcode, ovr);
1613 			giveresponse(rcode, to->q_status, m,
1614 				     NULL, ctladdr, xstart, e, to);
1615 			continue;
1616 		}
1617 		if (!quarantine && e->e_quarmsg != NULL)
1618 		{
1619 			/*
1620 			**  check_compat or checkcompat() has tried
1621 			**  to quarantine but that isn't supported.
1622 			**  Revert the attempt.
1623 			*/
1624 
1625 			e->e_quarmsg = NULL;
1626 			macdefine(&e->e_macro, A_PERM,
1627 				  macid("{quarantine}"), "");
1628 		}
1629 		if (bitset(EF_DISCARD, e->e_flags))
1630 		{
1631 			if (tTd(10, 5))
1632 			{
1633 				sm_dprintf("deliver: discarding recipient ");
1634 				printaddr(sm_debug_file(), to, false);
1635 			}
1636 
1637 			/* pretend the message was sent */
1638 			/* XXX should we log something here? */
1639 			to->q_state = QS_DISCARDED;
1640 
1641 			/*
1642 			**  Remove discard bit to prevent discard of
1643 			**  future recipients.  This is safe because the
1644 			**  true "global discard" has been handled before
1645 			**  we get here.
1646 			*/
1647 
1648 			e->e_flags &= ~EF_DISCARD;
1649 			continue;
1650 		}
1651 
1652 		/*
1653 		**  Strip quote bits from names if the mailer is dumb
1654 		**	about them.
1655 		*/
1656 
1657 		if (bitnset(M_STRIPQ, m->m_flags))
1658 		{
1659 			stripquotes(user);
1660 			stripquotes(host);
1661 		}
1662 
1663 		/*
1664 		**  Strip all leading backslashes if requested and the
1665 		**  next character is alphanumerical (the latter can
1666 		**  probably relaxed a bit, see RFC2821).
1667 		*/
1668 
1669 		if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1670 			stripbackslash(user);
1671 
1672 		/* hack attack -- delivermail compatibility */
1673 		if (m == ProgMailer && *user == '|')
1674 			user++;
1675 
1676 		/*
1677 		**  If an error message has already been given, don't
1678 		**	bother to send to this address.
1679 		**
1680 		**	>>>>>>>>>> This clause assumes that the local mailer
1681 		**	>> NOTE >> cannot do any further aliasing; that
1682 		**	>>>>>>>>>> function is subsumed by sendmail.
1683 		*/
1684 
1685 		if (!QS_IS_OK(to->q_state))
1686 			continue;
1687 
1688 		/*
1689 		**  See if this user name is "special".
1690 		**	If the user name has a slash in it, assume that this
1691 		**	is a file -- send it off without further ado.  Note
1692 		**	that this type of addresses is not processed along
1693 		**	with the others, so we fudge on the To person.
1694 		*/
1695 
1696 		if (strcmp(m->m_mailer, "[FILE]") == 0)
1697 		{
1698 			macdefine(&e->e_macro, A_PERM, 'u', user);
1699 			p = to->q_home;
1700 			if (p == NULL && ctladdr != NULL)
1701 				p = ctladdr->q_home;
1702 			macdefine(&e->e_macro, A_PERM, 'z', p);
1703 			expand(m->m_argv[1], buf, sizeof buf, e);
1704 			if (strlen(buf) > 0)
1705 				rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1706 			else
1707 			{
1708 				syserr("empty filename specification for mailer %s",
1709 				       m->m_name);
1710 				rcode = EX_CONFIG;
1711 			}
1712 			giveresponse(rcode, to->q_status, m, NULL,
1713 				     ctladdr, xstart, e, to);
1714 			markfailure(e, to, NULL, rcode, true);
1715 			e->e_nsent++;
1716 			if (rcode == EX_OK)
1717 			{
1718 				to->q_state = QS_SENT;
1719 				if (bitnset(M_LOCALMAILER, m->m_flags) &&
1720 				    bitset(QPINGONSUCCESS, to->q_flags))
1721 				{
1722 					to->q_flags |= QDELIVERED;
1723 					to->q_status = "2.1.5";
1724 					(void) sm_io_fprintf(e->e_xfp,
1725 							     SM_TIME_DEFAULT,
1726 							     "%s... Successfully delivered\n",
1727 							     to->q_paddr);
1728 				}
1729 			}
1730 			to->q_statdate = curtime();
1731 			markstats(e, to, STATS_NORMAL);
1732 			continue;
1733 		}
1734 
1735 		/*
1736 		**  Address is verified -- add this user to mailer
1737 		**  argv, and add it to the print list of recipients.
1738 		*/
1739 
1740 		/* link together the chain of recipients */
1741 		to->q_tchain = tochain;
1742 		tochain = to;
1743 		e->e_to = "[CHAIN]";
1744 
1745 		macdefine(&e->e_macro, A_PERM, 'u', user);  /* to user */
1746 		p = to->q_home;
1747 		if (p == NULL && ctladdr != NULL)
1748 			p = ctladdr->q_home;
1749 		macdefine(&e->e_macro, A_PERM, 'z', p);  /* user's home */
1750 
1751 		/* set the ${dsn_notify} macro if applicable */
1752 		if (bitset(QHASNOTIFY, to->q_flags))
1753 		{
1754 			char notify[MAXLINE];
1755 
1756 			notify[0] = '\0';
1757 			if (bitset(QPINGONSUCCESS, to->q_flags))
1758 				(void) sm_strlcat(notify, "SUCCESS,",
1759 						  sizeof notify);
1760 			if (bitset(QPINGONFAILURE, to->q_flags))
1761 				(void) sm_strlcat(notify, "FAILURE,",
1762 						  sizeof notify);
1763 			if (bitset(QPINGONDELAY, to->q_flags))
1764 				(void) sm_strlcat(notify, "DELAY,",
1765 						  sizeof notify);
1766 
1767 			/* Set to NEVER or drop trailing comma */
1768 			if (notify[0] == '\0')
1769 				(void) sm_strlcat(notify, "NEVER",
1770 						  sizeof notify);
1771 			else
1772 				notify[strlen(notify) - 1] = '\0';
1773 
1774 			macdefine(&e->e_macro, A_TEMP,
1775 				macid("{dsn_notify}"), notify);
1776 		}
1777 		else
1778 			macdefine(&e->e_macro, A_PERM,
1779 				macid("{dsn_notify}"), NULL);
1780 
1781 		/*
1782 		**  Expand out this user into argument list.
1783 		*/
1784 
1785 		if (!clever)
1786 		{
1787 			expand(*mvp, buf, sizeof buf, e);
1788 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1789 			if (pvp >= &pv[MAXPV - 2])
1790 			{
1791 				/* allow some space for trailing parms */
1792 				break;
1793 			}
1794 		}
1795 	}
1796 
1797 	/* see if any addresses still exist */
1798 	if (tochain == NULL)
1799 	{
1800 		rcode = 0;
1801 		goto cleanup;
1802 	}
1803 
1804 	/* print out messages as full list */
1805 	strsize = 1;
1806 	for (to = tochain; to != NULL; to = to->q_tchain)
1807 		strsize += strlen(to->q_paddr) + 1;
1808 	if (strsize < TOBUFSIZE)
1809 		strsize = TOBUFSIZE;
1810 	if (strsize > tobufsize)
1811 	{
1812 		SM_FREE_CLR(tobuf);
1813 		tobuf = sm_pmalloc_x(strsize);
1814 		tobufsize = strsize;
1815 	}
1816 	p = tobuf;
1817 	*p = '\0';
1818 	for (to = tochain; to != NULL; to = to->q_tchain)
1819 	{
1820 		(void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1821 				   ",", to->q_paddr);
1822 		p += strlen(p);
1823 	}
1824 	e->e_to = tobuf + 1;
1825 
1826 	/*
1827 	**  Fill out any parameters after the $u parameter.
1828 	*/
1829 
1830 	if (!clever)
1831 	{
1832 		while (*++mvp != NULL)
1833 		{
1834 			expand(*mvp, buf, sizeof buf, e);
1835 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1836 			if (pvp >= &pv[MAXPV])
1837 				syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1838 				       pv[0]);
1839 		}
1840 	}
1841 	*pvp++ = NULL;
1842 
1843 	/*
1844 	**  Call the mailer.
1845 	**	The argument vector gets built, pipes
1846 	**	are created as necessary, and we fork & exec as
1847 	**	appropriate.
1848 	**	If we are running SMTP, we just need to clean up.
1849 	*/
1850 
1851 	/* XXX this seems a bit wierd */
1852 	if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1853 	    bitset(QGOODUID, e->e_from.q_flags))
1854 		ctladdr = &e->e_from;
1855 
1856 #if NAMED_BIND
1857 	if (ConfigLevel < 2)
1858 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
1859 #endif /* NAMED_BIND */
1860 
1861 	if (tTd(11, 1))
1862 	{
1863 		sm_dprintf("openmailer:");
1864 		printav(sm_debug_file(), pv);
1865 	}
1866 	errno = 0;
1867 	SM_SET_H_ERRNO(0);
1868 	CurHostName = NULL;
1869 
1870 	/*
1871 	**  Deal with the special case of mail handled through an IPC
1872 	**  connection.
1873 	**	In this case we don't actually fork.  We must be
1874 	**	running SMTP for this to work.  We will return a
1875 	**	zero pid to indicate that we are running IPC.
1876 	**  We also handle a debug version that just talks to stdin/out.
1877 	*/
1878 
1879 	curhost = NULL;
1880 	SmtpPhase = NULL;
1881 	mci = NULL;
1882 
1883 #if XDEBUG
1884 	{
1885 		char wbuf[MAXLINE];
1886 
1887 		/* make absolutely certain 0, 1, and 2 are in use */
1888 		(void) sm_snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1889 				   shortenstring(e->e_to, MAXSHORTSTR),
1890 				   m->m_name);
1891 		checkfd012(wbuf);
1892 	}
1893 #endif /* XDEBUG */
1894 
1895 	/* check for 8-bit available */
1896 	if (bitset(EF_HAS8BIT, e->e_flags) &&
1897 	    bitnset(M_7BITS, m->m_flags) &&
1898 	    (bitset(EF_DONT_MIME, e->e_flags) ||
1899 	     !(bitset(MM_MIME8BIT, MimeMode) ||
1900 	       (bitset(EF_IS_MIME, e->e_flags) &&
1901 		bitset(MM_CVTMIME, MimeMode)))))
1902 	{
1903 		e->e_status = "5.6.3";
1904 		usrerrenh(e->e_status,
1905 			  "554 Cannot send 8-bit data to 7-bit destination");
1906 		rcode = EX_DATAERR;
1907 		goto give_up;
1908 	}
1909 
1910 	if (tTd(62, 8))
1911 		checkfds("before delivery");
1912 
1913 	/* check for Local Person Communication -- not for mortals!!! */
1914 	if (strcmp(m->m_mailer, "[LPC]") == 0)
1915 	{
1916 		if (clever)
1917 		{
1918 			/* flush any expired connections */
1919 			(void) mci_scan(NULL);
1920 
1921 			/* try to get a cached connection or just a slot */
1922 			mci = mci_get(m->m_name, m);
1923 			if (mci->mci_host == NULL)
1924 				mci->mci_host = m->m_name;
1925 			CurHostName = mci->mci_host;
1926 			if (mci->mci_state != MCIS_CLOSED)
1927 			{
1928 				message("Using cached SMTP/LPC connection for %s...",
1929 					m->m_name);
1930 				mci->mci_deliveries++;
1931 				goto do_transfer;
1932 			}
1933 		}
1934 		else
1935 		{
1936 			mci = mci_new(e->e_rpool);
1937 		}
1938 		mci->mci_in = smioin;
1939 		mci->mci_out = smioout;
1940 		mci->mci_mailer = m;
1941 		mci->mci_host = m->m_name;
1942 		if (clever)
1943 		{
1944 			mci->mci_state = MCIS_OPENING;
1945 			mci_cache(mci);
1946 		}
1947 		else
1948 			mci->mci_state = MCIS_OPEN;
1949 	}
1950 	else if (strcmp(m->m_mailer, "[IPC]") == 0)
1951 	{
1952 		register int i;
1953 
1954 		if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1955 		{
1956 			syserr("null destination for %s mailer", m->m_mailer);
1957 			rcode = EX_CONFIG;
1958 			goto give_up;
1959 		}
1960 
1961 # if NETUNIX
1962 		if (strcmp(pv[0], "FILE") == 0)
1963 		{
1964 			curhost = CurHostName = "localhost";
1965 			mux_path = pv[1];
1966 		}
1967 		else
1968 # endif /* NETUNIX */
1969 		{
1970 			CurHostName = pv[1];
1971 			curhost = hostsignature(m, pv[1]);
1972 		}
1973 
1974 		if (curhost == NULL || curhost[0] == '\0')
1975 		{
1976 			syserr("null host signature for %s", pv[1]);
1977 			rcode = EX_CONFIG;
1978 			goto give_up;
1979 		}
1980 
1981 		if (!clever)
1982 		{
1983 			syserr("554 5.3.5 non-clever IPC");
1984 			rcode = EX_CONFIG;
1985 			goto give_up;
1986 		}
1987 		if (pv[2] != NULL
1988 # if NETUNIX
1989 		    && mux_path == NULL
1990 # endif /* NETUNIX */
1991 		    )
1992 		{
1993 			port = htons((unsigned short) atoi(pv[2]));
1994 			if (port == 0)
1995 			{
1996 # ifdef NO_GETSERVBYNAME
1997 				syserr("Invalid port number: %s", pv[2]);
1998 # else /* NO_GETSERVBYNAME */
1999 				struct servent *sp = getservbyname(pv[2], "tcp");
2000 
2001 				if (sp == NULL)
2002 					syserr("Service %s unknown", pv[2]);
2003 				else
2004 					port = sp->s_port;
2005 # endif /* NO_GETSERVBYNAME */
2006 			}
2007 		}
2008 
2009 		nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2010 		if (TimeOuts.to_aconnect > 0)
2011 			enough = curtime() + TimeOuts.to_aconnect;
2012 tryhost:
2013 		while (hostnum < nummxhosts)
2014 		{
2015 			char sep = ':';
2016 			char *endp;
2017 			static char hostbuf[MAXNAME + 1];
2018 			bool tried_fallbacksmarthost = false;
2019 
2020 # if NETINET6
2021 			if (*mxhosts[hostnum] == '[')
2022 			{
2023 				endp = strchr(mxhosts[hostnum] + 1, ']');
2024 				if (endp != NULL)
2025 					endp = strpbrk(endp + 1, ":,");
2026 			}
2027 			else
2028 				endp = strpbrk(mxhosts[hostnum], ":,");
2029 # else /* NETINET6 */
2030 			endp = strpbrk(mxhosts[hostnum], ":,");
2031 # endif /* NETINET6 */
2032 			if (endp != NULL)
2033 			{
2034 				sep = *endp;
2035 				*endp = '\0';
2036 			}
2037 
2038 			if (hostnum == 1 && skip_back != NULL)
2039 			{
2040 				/*
2041 				**  Coattail piggybacking is no longer an
2042 				**  option with the mail host next to be tried
2043 				**  no longer the lowest MX preference
2044 				**  (hostnum == 1 meaning we're on the second
2045 				**  preference). We do not try to coattail
2046 				**  piggyback more than the first MX preference.
2047 				**  Revert 'tochain' to last location for
2048 				**  coincidental piggybacking. This works this
2049 				**  easily because the q_tchain kept getting
2050 				**  added to the top of the linked list.
2051 				*/
2052 
2053 				tochain = skip_back;
2054 			}
2055 
2056 			if (*mxhosts[hostnum] == '\0')
2057 			{
2058 				syserr("deliver: null host name in signature");
2059 				hostnum++;
2060 				if (endp != NULL)
2061 					*endp = sep;
2062 				continue;
2063 			}
2064 			(void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2065 					  sizeof hostbuf);
2066 			hostnum++;
2067 			if (endp != NULL)
2068 				*endp = sep;
2069 
2070   one_last_try:
2071 			/* see if we already know that this host is fried */
2072 			CurHostName = hostbuf;
2073 			mci = mci_get(hostbuf, m);
2074 			if (mci->mci_state != MCIS_CLOSED)
2075 			{
2076 				char *type;
2077 
2078 				if (tTd(11, 1))
2079 				{
2080 					sm_dprintf("openmailer: ");
2081 					mci_dump(sm_debug_file(), mci, false);
2082 				}
2083 				CurHostName = mci->mci_host;
2084 				if (bitnset(M_LMTP, m->m_flags))
2085 					type = "L";
2086 				else if (bitset(MCIF_ESMTP, mci->mci_flags))
2087 					type = "ES";
2088 				else
2089 					type = "S";
2090 				message("Using cached %sMTP connection to %s via %s...",
2091 					type, hostbuf, m->m_name);
2092 				mci->mci_deliveries++;
2093 				break;
2094 			}
2095 			mci->mci_mailer = m;
2096 			if (mci->mci_exitstat != EX_OK)
2097 			{
2098 				if (mci->mci_exitstat == EX_TEMPFAIL)
2099 					goodmxfound = true;
2100 
2101 				/* Try FallbackSmartHost? */
2102 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2103 						    hostbuf, sizeof hostbuf,
2104 						    mci->mci_exitstat))
2105 					goto one_last_try;
2106 
2107 				continue;
2108 			}
2109 
2110 			if (mci_lock_host(mci) != EX_OK)
2111 			{
2112 				mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2113 				goodmxfound = true;
2114 				continue;
2115 			}
2116 
2117 			/* try the connection */
2118 			sm_setproctitle(true, e, "%s %s: %s",
2119 					qid_printname(e),
2120 					hostbuf, "user open");
2121 # if NETUNIX
2122 			if (mux_path != NULL)
2123 			{
2124 				message("Connecting to %s via %s...",
2125 					mux_path, m->m_name);
2126 				i = makeconnection_ds((char *) mux_path, mci);
2127 			}
2128 			else
2129 # endif /* NETUNIX */
2130 			{
2131 				if (port == 0)
2132 					message("Connecting to %s via %s...",
2133 						hostbuf, m->m_name);
2134 				else
2135 					message("Connecting to %s port %d via %s...",
2136 						hostbuf, ntohs(port),
2137 						m->m_name);
2138 				i = makeconnection(hostbuf, port, mci, e,
2139 						   enough);
2140 			}
2141 			mci->mci_errno = errno;
2142 			mci->mci_lastuse = curtime();
2143 			mci->mci_deliveries = 0;
2144 			mci->mci_exitstat = i;
2145 # if NAMED_BIND
2146 			mci->mci_herrno = h_errno;
2147 # endif /* NAMED_BIND */
2148 
2149 			/*
2150 			**  Have we tried long enough to get a connection?
2151 			**	If yes, skip to the fallback MX hosts
2152 			**	(if existent).
2153 			*/
2154 
2155 			if (enough > 0 && mci->mci_lastuse >= enough)
2156 			{
2157 				int h;
2158 # if NAMED_BIND
2159 				extern int NumFallbackMXHosts;
2160 # else /* NAMED_BIND */
2161 				const int NumFallbackMXHosts = 0;
2162 # endif /* NAMED_BIND */
2163 
2164 				if (hostnum < nummxhosts && LogLevel > 9)
2165 					sm_syslog(LOG_INFO, e->e_id,
2166 						  "Timeout.to_aconnect occurred before exhausting all addresses");
2167 
2168 				/* turn off timeout if fallback available */
2169 				if (NumFallbackMXHosts > 0)
2170 					enough = 0;
2171 
2172 				/* skip to a fallback MX host */
2173 				h = nummxhosts - NumFallbackMXHosts;
2174 				if (hostnum < h)
2175 					hostnum = h;
2176 			}
2177 			if (i == EX_OK)
2178 			{
2179 				goodmxfound = true;
2180 				markstats(e, firstto, STATS_CONNECT);
2181 				mci->mci_state = MCIS_OPENING;
2182 				mci_cache(mci);
2183 				if (TrafficLogFile != NULL)
2184 					(void) sm_io_fprintf(TrafficLogFile,
2185 							     SM_TIME_DEFAULT,
2186 							     "%05d === CONNECT %s\n",
2187 							     (int) CurrentPid,
2188 							     hostbuf);
2189 				break;
2190 			}
2191 			else
2192 			{
2193 				/* Try FallbackSmartHost? */
2194 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2195 						    hostbuf, sizeof hostbuf, i))
2196 					goto one_last_try;
2197 
2198 				if (tTd(11, 1))
2199 					sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2200 						   i, errno);
2201 				if (i == EX_TEMPFAIL)
2202 					goodmxfound = true;
2203 				mci_unlock_host(mci);
2204 			}
2205 
2206 			/* enter status of this host */
2207 			setstat(i);
2208 
2209 			/* should print some message here for -v mode */
2210 		}
2211 		if (mci == NULL)
2212 		{
2213 			syserr("deliver: no host name");
2214 			rcode = EX_SOFTWARE;
2215 			goto give_up;
2216 		}
2217 		mci->mci_pid = 0;
2218 	}
2219 	else
2220 	{
2221 		/* flush any expired connections */
2222 		(void) mci_scan(NULL);
2223 		mci = NULL;
2224 
2225 		if (bitnset(M_LMTP, m->m_flags))
2226 		{
2227 			/* try to get a cached connection */
2228 			mci = mci_get(m->m_name, m);
2229 			if (mci->mci_host == NULL)
2230 				mci->mci_host = m->m_name;
2231 			CurHostName = mci->mci_host;
2232 			if (mci->mci_state != MCIS_CLOSED)
2233 			{
2234 				message("Using cached LMTP connection for %s...",
2235 					m->m_name);
2236 				mci->mci_deliveries++;
2237 				goto do_transfer;
2238 			}
2239 		}
2240 
2241 		/* announce the connection to verbose listeners */
2242 		if (host == NULL || host[0] == '\0')
2243 			message("Connecting to %s...", m->m_name);
2244 		else
2245 			message("Connecting to %s via %s...", host, m->m_name);
2246 		if (TrafficLogFile != NULL)
2247 		{
2248 			char **av;
2249 
2250 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2251 					     "%05d === EXEC", (int) CurrentPid);
2252 			for (av = pv; *av != NULL; av++)
2253 				(void) sm_io_fprintf(TrafficLogFile,
2254 						     SM_TIME_DEFAULT, " %s",
2255 						     *av);
2256 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2257 					     "\n");
2258 		}
2259 
2260 #if XDEBUG
2261 		checkfd012("before creating mail pipe");
2262 #endif /* XDEBUG */
2263 
2264 		/* create a pipe to shove the mail through */
2265 		if (pipe(mpvect) < 0)
2266 		{
2267 			syserr("%s... openmailer(%s): pipe (to mailer)",
2268 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2269 			if (tTd(11, 1))
2270 				sm_dprintf("openmailer: NULL\n");
2271 			rcode = EX_OSERR;
2272 			goto give_up;
2273 		}
2274 
2275 #if XDEBUG
2276 		/* make sure we didn't get one of the standard I/O files */
2277 		if (mpvect[0] < 3 || mpvect[1] < 3)
2278 		{
2279 			syserr("%s... openmailer(%s): bogus mpvect %d %d",
2280 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2281 			       mpvect[0], mpvect[1]);
2282 			printopenfds(true);
2283 			if (tTd(11, 1))
2284 				sm_dprintf("openmailer: NULL\n");
2285 			rcode = EX_OSERR;
2286 			goto give_up;
2287 		}
2288 
2289 		/* make sure system call isn't dead meat */
2290 		checkfdopen(mpvect[0], "mpvect[0]");
2291 		checkfdopen(mpvect[1], "mpvect[1]");
2292 		if (mpvect[0] == mpvect[1] ||
2293 		    (e->e_lockfp != NULL &&
2294 		     (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2295 						 NULL) ||
2296 		      mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2297 						 NULL))))
2298 		{
2299 			if (e->e_lockfp == NULL)
2300 				syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2301 				       shortenstring(e->e_to, MAXSHORTSTR),
2302 				       m->m_name, mpvect[0], mpvect[1]);
2303 			else
2304 				syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2305 				       shortenstring(e->e_to, MAXSHORTSTR),
2306 				       m->m_name, mpvect[0], mpvect[1],
2307 				       sm_io_getinfo(e->e_lockfp,
2308 						     SM_IO_WHAT_FD, NULL));
2309 		}
2310 #endif /* XDEBUG */
2311 
2312 		/* create a return pipe */
2313 		if (pipe(rpvect) < 0)
2314 		{
2315 			syserr("%s... openmailer(%s): pipe (from mailer)",
2316 			       shortenstring(e->e_to, MAXSHORTSTR),
2317 			       m->m_name);
2318 			(void) close(mpvect[0]);
2319 			(void) close(mpvect[1]);
2320 			if (tTd(11, 1))
2321 				sm_dprintf("openmailer: NULL\n");
2322 			rcode = EX_OSERR;
2323 			goto give_up;
2324 		}
2325 #if XDEBUG
2326 		checkfdopen(rpvect[0], "rpvect[0]");
2327 		checkfdopen(rpvect[1], "rpvect[1]");
2328 #endif /* XDEBUG */
2329 
2330 		/*
2331 		**  Actually fork the mailer process.
2332 		**	DOFORK is clever about retrying.
2333 		**
2334 		**	Dispose of SIGCHLD signal catchers that may be laying
2335 		**	around so that endmailer will get it.
2336 		*/
2337 
2338 		if (e->e_xfp != NULL)	/* for debugging */
2339 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2340 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2341 		(void) sm_signal(SIGCHLD, SIG_DFL);
2342 
2343 
2344 		DOFORK(FORK);
2345 		/* pid is set by DOFORK */
2346 
2347 		if (pid < 0)
2348 		{
2349 			/* failure */
2350 			syserr("%s... openmailer(%s): cannot fork",
2351 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2352 			(void) close(mpvect[0]);
2353 			(void) close(mpvect[1]);
2354 			(void) close(rpvect[0]);
2355 			(void) close(rpvect[1]);
2356 			if (tTd(11, 1))
2357 				sm_dprintf("openmailer: NULL\n");
2358 			rcode = EX_OSERR;
2359 			goto give_up;
2360 		}
2361 		else if (pid == 0)
2362 		{
2363 			int save_errno;
2364 			int sff;
2365 			int new_euid = NO_UID;
2366 			int new_ruid = NO_UID;
2367 			int new_gid = NO_GID;
2368 			char *user = NULL;
2369 			struct stat stb;
2370 			extern int DtableSize;
2371 
2372 			CurrentPid = getpid();
2373 
2374 			/* clear the events to turn off SIGALRMs */
2375 			sm_clear_events();
2376 
2377 			/* Reset global flags */
2378 			RestartRequest = NULL;
2379 			RestartWorkGroup = false;
2380 			ShutdownRequest = NULL;
2381 			PendingSignal = 0;
2382 
2383 			if (e->e_lockfp != NULL)
2384 				(void) close(sm_io_getinfo(e->e_lockfp,
2385 							   SM_IO_WHAT_FD,
2386 							   NULL));
2387 
2388 			/* child -- set up input & exec mailer */
2389 			(void) sm_signal(SIGALRM, sm_signal_noop);
2390 			(void) sm_signal(SIGCHLD, SIG_DFL);
2391 			(void) sm_signal(SIGHUP, SIG_IGN);
2392 			(void) sm_signal(SIGINT, SIG_IGN);
2393 			(void) sm_signal(SIGTERM, SIG_DFL);
2394 # ifdef SIGUSR1
2395 			(void) sm_signal(SIGUSR1, sm_signal_noop);
2396 # endif /* SIGUSR1 */
2397 
2398 			if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2399 				stb.st_mode = 0;
2400 
2401 # if HASSETUSERCONTEXT
2402 			/*
2403 			**  Set user resources.
2404 			*/
2405 
2406 			if (contextaddr != NULL)
2407 			{
2408 				int sucflags;
2409 				struct passwd *pwd;
2410 
2411 				if (contextaddr->q_ruser != NULL)
2412 					pwd = sm_getpwnam(contextaddr->q_ruser);
2413 				else
2414 					pwd = sm_getpwnam(contextaddr->q_user);
2415 				sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2416 #ifdef LOGIN_SETMAC
2417 				sucflags |= LOGIN_SETMAC;
2418 #endif /* LOGIN_SETMAC */
2419 				if (pwd != NULL &&
2420 				    setusercontext(NULL, pwd, pwd->pw_uid,
2421 						   sucflags) == -1 &&
2422 				    suidwarn)
2423 				{
2424 					syserr("openmailer: setusercontext() failed");
2425 					exit(EX_TEMPFAIL);
2426 				}
2427 			}
2428 # endif /* HASSETUSERCONTEXT */
2429 
2430 #if HASNICE
2431 			/* tweak niceness */
2432 			if (m->m_nice != 0)
2433 				(void) nice(m->m_nice);
2434 #endif /* HASNICE */
2435 
2436 			/* reset group id */
2437 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2438 			{
2439 				if (m->m_gid == NO_GID)
2440 					new_gid = RunAsGid;
2441 				else
2442 					new_gid = m->m_gid;
2443 			}
2444 			else if (bitset(S_ISGID, stb.st_mode))
2445 				new_gid = stb.st_gid;
2446 			else if (ctladdr != NULL && ctladdr->q_gid != 0)
2447 			{
2448 				if (!DontInitGroups)
2449 				{
2450 					user = ctladdr->q_ruser;
2451 					if (user == NULL)
2452 						user = ctladdr->q_user;
2453 
2454 					if (initgroups(user,
2455 						       ctladdr->q_gid) == -1
2456 					    && suidwarn)
2457 					{
2458 						syserr("openmailer: initgroups(%s, %d) failed",
2459 							user, ctladdr->q_gid);
2460 						exit(EX_TEMPFAIL);
2461 					}
2462 				}
2463 				else
2464 				{
2465 					GIDSET_T gidset[1];
2466 
2467 					gidset[0] = ctladdr->q_gid;
2468 					if (setgroups(1, gidset) == -1
2469 					    && suidwarn)
2470 					{
2471 						syserr("openmailer: setgroups() failed");
2472 						exit(EX_TEMPFAIL);
2473 					}
2474 				}
2475 				new_gid = ctladdr->q_gid;
2476 			}
2477 			else
2478 			{
2479 				if (!DontInitGroups)
2480 				{
2481 					user = DefUser;
2482 					if (initgroups(DefUser, DefGid) == -1 &&
2483 					    suidwarn)
2484 					{
2485 						syserr("openmailer: initgroups(%s, %d) failed",
2486 						       DefUser, DefGid);
2487 						exit(EX_TEMPFAIL);
2488 					}
2489 				}
2490 				else
2491 				{
2492 					GIDSET_T gidset[1];
2493 
2494 					gidset[0] = DefGid;
2495 					if (setgroups(1, gidset) == -1
2496 					    && suidwarn)
2497 					{
2498 						syserr("openmailer: setgroups() failed");
2499 						exit(EX_TEMPFAIL);
2500 					}
2501 				}
2502 				if (m->m_gid == NO_GID)
2503 					new_gid = DefGid;
2504 				else
2505 					new_gid = m->m_gid;
2506 			}
2507 			if (new_gid != NO_GID)
2508 			{
2509 				if (RunAsUid != 0 &&
2510 				    bitnset(M_SPECIFIC_UID, m->m_flags) &&
2511 				    new_gid != getgid() &&
2512 				    new_gid != getegid())
2513 				{
2514 					/* Only root can change the gid */
2515 					syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2516 					       (int) RunAsUid, (int) new_gid,
2517 					       (int) getgid(), (int) getegid());
2518 					exit(EX_TEMPFAIL);
2519 				}
2520 
2521 				if (setgid(new_gid) < 0 && suidwarn)
2522 				{
2523 					syserr("openmailer: setgid(%ld) failed",
2524 					       (long) new_gid);
2525 					exit(EX_TEMPFAIL);
2526 				}
2527 			}
2528 
2529 			/* change root to some "safe" directory */
2530 			if (m->m_rootdir != NULL)
2531 			{
2532 				expand(m->m_rootdir, cbuf, sizeof cbuf, e);
2533 				if (tTd(11, 20))
2534 					sm_dprintf("openmailer: chroot %s\n",
2535 						   cbuf);
2536 				if (chroot(cbuf) < 0)
2537 				{
2538 					syserr("openmailer: Cannot chroot(%s)",
2539 					       cbuf);
2540 					exit(EX_TEMPFAIL);
2541 				}
2542 				if (chdir("/") < 0)
2543 				{
2544 					syserr("openmailer: cannot chdir(/)");
2545 					exit(EX_TEMPFAIL);
2546 				}
2547 			}
2548 
2549 			/* reset user id */
2550 			endpwent();
2551 			sm_mbdb_terminate();
2552 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2553 			{
2554 				if (m->m_uid == NO_UID)
2555 					new_euid = RunAsUid;
2556 				else
2557 					new_euid = m->m_uid;
2558 
2559 				/*
2560 				**  Undo the effects of the uid change in main
2561 				**  for signal handling.  The real uid may
2562 				**  be used by mailer in adding a "From "
2563 				**  line.
2564 				*/
2565 
2566 				if (RealUid != 0 && RealUid != getuid())
2567 				{
2568 # if MAILER_SETUID_METHOD == USE_SETEUID
2569 #  if HASSETREUID
2570 					if (setreuid(RealUid, geteuid()) < 0)
2571 					{
2572 						syserr("openmailer: setreuid(%d, %d) failed",
2573 						       (int) RealUid, (int) geteuid());
2574 						exit(EX_OSERR);
2575 					}
2576 #  endif /* HASSETREUID */
2577 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2578 # if MAILER_SETUID_METHOD == USE_SETREUID
2579 					new_ruid = RealUid;
2580 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2581 				}
2582 			}
2583 			else if (bitset(S_ISUID, stb.st_mode))
2584 				new_ruid = stb.st_uid;
2585 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
2586 				new_ruid = ctladdr->q_uid;
2587 			else if (m->m_uid != NO_UID)
2588 				new_ruid = m->m_uid;
2589 			else
2590 				new_ruid = DefUid;
2591 
2592 # if _FFR_USE_SETLOGIN
2593 			/* run disconnected from terminal and set login name */
2594 			if (setsid() >= 0 &&
2595 			    ctladdr != NULL && ctladdr->q_uid != 0 &&
2596 			    new_euid == ctladdr->q_uid)
2597 			{
2598 				struct passwd *pwd;
2599 
2600 				pwd = sm_getpwuid(ctladdr->q_uid);
2601 				if (pwd != NULL && suidwarn)
2602 					(void) setlogin(pwd->pw_name);
2603 				endpwent();
2604 			}
2605 # endif /* _FFR_USE_SETLOGIN */
2606 
2607 			if (new_euid != NO_UID)
2608 			{
2609 				if (RunAsUid != 0 && new_euid != RunAsUid)
2610 				{
2611 					/* Only root can change the uid */
2612 					syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2613 					       (int) new_euid, (int) RunAsUid);
2614 					exit(EX_TEMPFAIL);
2615 				}
2616 
2617 				vendor_set_uid(new_euid);
2618 # if MAILER_SETUID_METHOD == USE_SETEUID
2619 				if (seteuid(new_euid) < 0 && suidwarn)
2620 				{
2621 					syserr("openmailer: seteuid(%ld) failed",
2622 					       (long) new_euid);
2623 					exit(EX_TEMPFAIL);
2624 				}
2625 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2626 # if MAILER_SETUID_METHOD == USE_SETREUID
2627 				if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2628 				{
2629 					syserr("openmailer: setreuid(%ld, %ld) failed",
2630 					       (long) new_ruid, (long) new_euid);
2631 					exit(EX_TEMPFAIL);
2632 				}
2633 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2634 # if MAILER_SETUID_METHOD == USE_SETUID
2635 				if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2636 				{
2637 					syserr("openmailer: setuid(%ld) failed",
2638 					       (long) new_euid);
2639 					exit(EX_TEMPFAIL);
2640 				}
2641 # endif /* MAILER_SETUID_METHOD == USE_SETUID */
2642 			}
2643 			else if (new_ruid != NO_UID)
2644 			{
2645 				vendor_set_uid(new_ruid);
2646 				if (setuid(new_ruid) < 0 && suidwarn)
2647 				{
2648 					syserr("openmailer: setuid(%ld) failed",
2649 					       (long) new_ruid);
2650 					exit(EX_TEMPFAIL);
2651 				}
2652 			}
2653 
2654 			if (tTd(11, 2))
2655 				sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2656 					   (int) getuid(), (int) geteuid(),
2657 					   (int) getgid(), (int) getegid());
2658 
2659 			/* move into some "safe" directory */
2660 			if (m->m_execdir != NULL)
2661 			{
2662 				char *q;
2663 
2664 				for (p = m->m_execdir; p != NULL; p = q)
2665 				{
2666 					q = strchr(p, ':');
2667 					if (q != NULL)
2668 						*q = '\0';
2669 					expand(p, cbuf, sizeof cbuf, e);
2670 					if (q != NULL)
2671 						*q++ = ':';
2672 					if (tTd(11, 20))
2673 						sm_dprintf("openmailer: trydir %s\n",
2674 							   cbuf);
2675 					if (cbuf[0] != '\0' &&
2676 					    chdir(cbuf) >= 0)
2677 						break;
2678 				}
2679 			}
2680 
2681 			/* Check safety of program to be run */
2682 			sff = SFF_ROOTOK|SFF_EXECOK;
2683 			if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2684 				     DontBlameSendmail))
2685 				sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2686 			if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2687 				    DontBlameSendmail))
2688 				sff |= SFF_NOPATHCHECK;
2689 			else
2690 				sff |= SFF_SAFEDIRPATH;
2691 			ret = safefile(m->m_mailer, getuid(), getgid(),
2692 				       user, sff, 0, NULL);
2693 			if (ret != 0)
2694 				sm_syslog(LOG_INFO, e->e_id,
2695 					  "Warning: program %s unsafe: %s",
2696 					  m->m_mailer, sm_errstring(ret));
2697 
2698 			/* arrange to filter std & diag output of command */
2699 			(void) close(rpvect[0]);
2700 			if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2701 			{
2702 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2703 				       shortenstring(e->e_to, MAXSHORTSTR),
2704 				       m->m_name, rpvect[1]);
2705 				_exit(EX_OSERR);
2706 			}
2707 			(void) close(rpvect[1]);
2708 
2709 			if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2710 			{
2711 				syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2712 				       shortenstring(e->e_to, MAXSHORTSTR),
2713 				       m->m_name);
2714 				_exit(EX_OSERR);
2715 			}
2716 
2717 			/* arrange to get standard input */
2718 			(void) close(mpvect[1]);
2719 			if (dup2(mpvect[0], STDIN_FILENO) < 0)
2720 			{
2721 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2722 				       shortenstring(e->e_to, MAXSHORTSTR),
2723 				       m->m_name, mpvect[0]);
2724 				_exit(EX_OSERR);
2725 			}
2726 			(void) close(mpvect[0]);
2727 
2728 			/* arrange for all the files to be closed */
2729 			sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2730 
2731 # if !_FFR_USE_SETLOGIN
2732 			/* run disconnected from terminal */
2733 			(void) setsid();
2734 # endif /* !_FFR_USE_SETLOGIN */
2735 
2736 			/* try to execute the mailer */
2737 			(void) execve(m->m_mailer, (ARGV_T) pv,
2738 				      (ARGV_T) UserEnviron);
2739 			save_errno = errno;
2740 			syserr("Cannot exec %s", m->m_mailer);
2741 			if (bitnset(M_LOCALMAILER, m->m_flags) ||
2742 			    transienterror(save_errno))
2743 				_exit(EX_OSERR);
2744 			_exit(EX_UNAVAILABLE);
2745 		}
2746 
2747 		/*
2748 		**  Set up return value.
2749 		*/
2750 
2751 		if (mci == NULL)
2752 		{
2753 			if (clever)
2754 			{
2755 				/*
2756 				**  Allocate from general heap, not
2757 				**  envelope rpool, because this mci
2758 				**  is going to be cached.
2759 				*/
2760 
2761 				mci = mci_new(NULL);
2762 			}
2763 			else
2764 			{
2765 				/*
2766 				**  Prevent a storage leak by allocating
2767 				**  this from the envelope rpool.
2768 				*/
2769 
2770 				mci = mci_new(e->e_rpool);
2771 			}
2772 		}
2773 		mci->mci_mailer = m;
2774 		if (clever)
2775 		{
2776 			mci->mci_state = MCIS_OPENING;
2777 			mci_cache(mci);
2778 		}
2779 		else
2780 		{
2781 			mci->mci_state = MCIS_OPEN;
2782 		}
2783 		mci->mci_pid = pid;
2784 		(void) close(mpvect[0]);
2785 		mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2786 					  (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2787 					  NULL);
2788 		if (mci->mci_out == NULL)
2789 		{
2790 			syserr("deliver: cannot create mailer output channel, fd=%d",
2791 			       mpvect[1]);
2792 			(void) close(mpvect[1]);
2793 			(void) close(rpvect[0]);
2794 			(void) close(rpvect[1]);
2795 			rcode = EX_OSERR;
2796 			goto give_up;
2797 		}
2798 
2799 		(void) close(rpvect[1]);
2800 		mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2801 					 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2802 					 NULL);
2803 		if (mci->mci_in == NULL)
2804 		{
2805 			syserr("deliver: cannot create mailer input channel, fd=%d",
2806 			       mpvect[1]);
2807 			(void) close(rpvect[0]);
2808 			(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2809 			mci->mci_out = NULL;
2810 			rcode = EX_OSERR;
2811 			goto give_up;
2812 		}
2813 	}
2814 
2815 	/*
2816 	**  If we are in SMTP opening state, send initial protocol.
2817 	*/
2818 
2819 	if (bitnset(M_7BITS, m->m_flags) &&
2820 	    (!clever || mci->mci_state == MCIS_OPENING))
2821 		mci->mci_flags |= MCIF_7BIT;
2822 	if (clever && mci->mci_state != MCIS_CLOSED)
2823 	{
2824 # if STARTTLS || SASL
2825 		int dotpos;
2826 		char *srvname;
2827 		extern SOCKADDR CurHostAddr;
2828 # endif /* STARTTLS || SASL */
2829 
2830 # if SASL
2831 #  define DONE_AUTH(f)		bitset(MCIF_AUTHACT, f)
2832 # endif /* SASL */
2833 # if STARTTLS
2834 #  define DONE_STARTTLS(f)	bitset(MCIF_TLSACT, f)
2835 # endif /* STARTTLS */
2836 # define ONLY_HELO(f)		bitset(MCIF_ONLY_EHLO, f)
2837 # define SET_HELO(f)		f |= MCIF_ONLY_EHLO
2838 # define CLR_HELO(f)		f &= ~MCIF_ONLY_EHLO
2839 
2840 # if STARTTLS || SASL
2841 		/* don't use CurHostName, it is changed in many places */
2842 		if (mci->mci_host != NULL)
2843 		{
2844 			srvname = mci->mci_host;
2845 			dotpos = strlen(srvname) - 1;
2846 			if (dotpos >= 0)
2847 			{
2848 				if (srvname[dotpos] == '.')
2849 					srvname[dotpos] = '\0';
2850 				else
2851 					dotpos = -1;
2852 			}
2853 		}
2854 		else if (mci->mci_mailer != NULL)
2855 		{
2856 			srvname = mci->mci_mailer->m_name;
2857 			dotpos = -1;
2858 		}
2859 		else
2860 		{
2861 			srvname = "local";
2862 			dotpos = -1;
2863 		}
2864 
2865 		/* don't set {server_name} to NULL or "": see getauth() */
2866 		macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2867 			  srvname);
2868 
2869 		/* CurHostAddr is set by makeconnection() and mci_get() */
2870 		if (CurHostAddr.sa.sa_family != 0)
2871 		{
2872 			macdefine(&mci->mci_macro, A_TEMP,
2873 				  macid("{server_addr}"),
2874 				  anynet_ntoa(&CurHostAddr));
2875 		}
2876 		else if (mci->mci_mailer != NULL)
2877 		{
2878 			/* mailer name is unique, use it as address */
2879 			macdefine(&mci->mci_macro, A_PERM,
2880 				  macid("{server_addr}"),
2881 				  mci->mci_mailer->m_name);
2882 		}
2883 		else
2884 		{
2885 			/* don't set it to NULL or "": see getauth() */
2886 			macdefine(&mci->mci_macro, A_PERM,
2887 				  macid("{server_addr}"), "0");
2888 		}
2889 
2890 		/* undo change of srvname (mci->mci_host) */
2891 		if (dotpos >= 0)
2892 			srvname[dotpos] = '.';
2893 
2894 reconnect:	/* after switching to an encrypted connection */
2895 # endif /* STARTTLS || SASL */
2896 
2897 		/* set the current connection information */
2898 		e->e_mci = mci;
2899 # if SASL
2900 		mci->mci_saslcap = NULL;
2901 # endif /* SASL */
2902 		smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2903 		CLR_HELO(mci->mci_flags);
2904 
2905 		if (IS_DLVR_RETURN(e))
2906 		{
2907 			/*
2908 			**  Check whether other side can deliver e-mail
2909 			**  fast enough
2910 			*/
2911 
2912 			if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2913 			{
2914 				e->e_status = "5.4.7";
2915 				usrerrenh(e->e_status,
2916 					  "554 Server does not support Deliver By");
2917 				rcode = EX_UNAVAILABLE;
2918 				goto give_up;
2919 			}
2920 			if (e->e_deliver_by > 0 &&
2921 			    e->e_deliver_by - (curtime() - e->e_ctime) <
2922 			    mci->mci_min_by)
2923 			{
2924 				e->e_status = "5.4.7";
2925 				usrerrenh(e->e_status,
2926 					  "554 Message can't be delivered in time; %ld < %ld",
2927 					  e->e_deliver_by - (curtime() - e->e_ctime),
2928 					  mci->mci_min_by);
2929 				rcode = EX_UNAVAILABLE;
2930 				goto give_up;
2931 			}
2932 		}
2933 
2934 # if STARTTLS
2935 		/* first TLS then AUTH to provide a security layer */
2936 		if (mci->mci_state != MCIS_CLOSED &&
2937 		    !DONE_STARTTLS(mci->mci_flags))
2938 		{
2939 			int olderrors;
2940 			bool usetls;
2941 			bool saveQuickAbort = QuickAbort;
2942 			bool saveSuprErrs = SuprErrs;
2943 			char *host = NULL;
2944 
2945 			rcode = EX_OK;
2946 			usetls = bitset(MCIF_TLS, mci->mci_flags);
2947 			if (usetls)
2948 				usetls = !iscltflgset(e, D_NOTLS);
2949 
2950 			if (usetls)
2951 			{
2952 				host = macvalue(macid("{server_name}"), e);
2953 				olderrors = Errors;
2954 				QuickAbort = false;
2955 				SuprErrs = true;
2956 				if (rscheck("try_tls", host, NULL, e,
2957 					    RSF_RMCOMM, 7, host, NOQID) != EX_OK
2958 				    || Errors > olderrors)
2959 					usetls = false;
2960 				SuprErrs = saveSuprErrs;
2961 				QuickAbort = saveQuickAbort;
2962 			}
2963 
2964 			if (usetls)
2965 			{
2966 				if ((rcode = starttls(m, mci, e)) == EX_OK)
2967 				{
2968 					/* start again without STARTTLS */
2969 					mci->mci_flags |= MCIF_TLSACT;
2970 				}
2971 				else
2972 				{
2973 					char *s;
2974 
2975 					/*
2976 					**  TLS negotation failed, what to do?
2977 					**  fall back to unencrypted connection
2978 					**  or abort? How to decide?
2979 					**  set a macro and call a ruleset.
2980 					*/
2981 
2982 					mci->mci_flags &= ~MCIF_TLS;
2983 					switch (rcode)
2984 					{
2985 					  case EX_TEMPFAIL:
2986 						s = "TEMP";
2987 						break;
2988 					  case EX_USAGE:
2989 						s = "USAGE";
2990 						break;
2991 					  case EX_PROTOCOL:
2992 						s = "PROTOCOL";
2993 						break;
2994 					  case EX_SOFTWARE:
2995 						s = "SOFTWARE";
2996 						break;
2997 
2998 					  /* everything else is a failure */
2999 					  default:
3000 						s = "FAILURE";
3001 						rcode = EX_TEMPFAIL;
3002 					}
3003 					macdefine(&e->e_macro, A_PERM,
3004 						  macid("{verify}"), s);
3005 				}
3006 			}
3007 			else
3008 				macdefine(&e->e_macro, A_PERM,
3009 					  macid("{verify}"), "NONE");
3010 			olderrors = Errors;
3011 			QuickAbort = false;
3012 			SuprErrs = true;
3013 
3014 			/*
3015 			**  rcode == EX_SOFTWARE is special:
3016 			**  the TLS negotation failed
3017 			**  we have to drop the connection no matter what
3018 			**  However, we call tls_server to give it the chance
3019 			**  to log the problem and return an appropriate
3020 			**  error code.
3021 			*/
3022 
3023 			if (rscheck("tls_server",
3024 				    macvalue(macid("{verify}"), e),
3025 				    NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3026 				    host, NOQID) != EX_OK ||
3027 			    Errors > olderrors ||
3028 			    rcode == EX_SOFTWARE)
3029 			{
3030 				char enhsc[ENHSCLEN];
3031 				extern char MsgBuf[];
3032 
3033 				if (ISSMTPCODE(MsgBuf) &&
3034 				    extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3035 				{
3036 					p = sm_rpool_strdup_x(e->e_rpool,
3037 							      MsgBuf);
3038 				}
3039 				else
3040 				{
3041 					p = "403 4.7.0 server not authenticated.";
3042 					(void) sm_strlcpy(enhsc, "4.7.0",
3043 							  sizeof enhsc);
3044 				}
3045 				SuprErrs = saveSuprErrs;
3046 				QuickAbort = saveQuickAbort;
3047 
3048 				if (rcode == EX_SOFTWARE)
3049 				{
3050 					/* drop the connection */
3051 					mci->mci_state = MCIS_QUITING;
3052 					if (mci->mci_in != NULL)
3053 					{
3054 						(void) sm_io_close(mci->mci_in,
3055 								   SM_TIME_DEFAULT);
3056 						mci->mci_in = NULL;
3057 					}
3058 					mci->mci_flags &= ~MCIF_TLSACT;
3059 					(void) endmailer(mci, e, pv);
3060 				}
3061 				else
3062 				{
3063 					/* abort transfer */
3064 					smtpquit(m, mci, e);
3065 				}
3066 
3067 				/* avoid bogus error msg */
3068 				mci->mci_errno = 0;
3069 
3070 				/* temp or permanent failure? */
3071 				rcode = (*p == '4') ? EX_TEMPFAIL
3072 						    : EX_UNAVAILABLE;
3073 				mci_setstat(mci, rcode, enhsc, p);
3074 
3075 				/*
3076 				**  hack to get the error message into
3077 				**  the envelope (done in giveresponse())
3078 				*/
3079 
3080 				(void) sm_strlcpy(SmtpError, p,
3081 						  sizeof SmtpError);
3082 			}
3083 			QuickAbort = saveQuickAbort;
3084 			SuprErrs = saveSuprErrs;
3085 			if (DONE_STARTTLS(mci->mci_flags) &&
3086 			    mci->mci_state != MCIS_CLOSED)
3087 			{
3088 				SET_HELO(mci->mci_flags);
3089 				mci->mci_flags &= ~MCIF_EXTENS;
3090 				goto reconnect;
3091 			}
3092 		}
3093 # endif /* STARTTLS */
3094 # if SASL
3095 		/* if other server supports authentication let's authenticate */
3096 		if (mci->mci_state != MCIS_CLOSED &&
3097 		    mci->mci_saslcap != NULL &&
3098 		    !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3099 		{
3100 			/* Should we require some minimum authentication? */
3101 			if ((ret = smtpauth(m, mci, e)) == EX_OK)
3102 			{
3103 				int result;
3104 				sasl_ssf_t *ssf = NULL;
3105 
3106 				/* Get security strength (features) */
3107 				result = sasl_getprop(mci->mci_conn, SASL_SSF,
3108 # if SASL >= 20000
3109 						      (const void **) &ssf);
3110 # else /* SASL >= 20000 */
3111 						      (void **) &ssf);
3112 # endif /* SASL >= 20000 */
3113 
3114 				/* XXX authid? */
3115 				if (LogLevel > 9)
3116 					sm_syslog(LOG_INFO, NOQID,
3117 						  "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3118 						  mci->mci_host,
3119 						  macvalue(macid("{auth_type}"), e),
3120 						  result == SASL_OK ? *ssf : 0);
3121 
3122 				/*
3123 				**  Only switch to encrypted connection
3124 				**  if a security layer has been negotiated
3125 				*/
3126 
3127 				if (result == SASL_OK && *ssf > 0)
3128 				{
3129 					/*
3130 					**  Convert I/O layer to use SASL.
3131 					**  If the call fails, the connection
3132 					**  is aborted.
3133 					*/
3134 
3135 					if (sfdcsasl(&mci->mci_in,
3136 						     &mci->mci_out,
3137 						     mci->mci_conn) == 0)
3138 					{
3139 						mci->mci_flags &= ~MCIF_EXTENS;
3140 						mci->mci_flags |= MCIF_AUTHACT|
3141 								  MCIF_ONLY_EHLO;
3142 						goto reconnect;
3143 					}
3144 					syserr("AUTH TLS switch failed in client");
3145 				}
3146 				/* else? XXX */
3147 				mci->mci_flags |= MCIF_AUTHACT;
3148 
3149 			}
3150 			else if (ret == EX_TEMPFAIL)
3151 			{
3152 				if (LogLevel > 8)
3153 					sm_syslog(LOG_ERR, NOQID,
3154 						  "AUTH=client, relay=%.100s, temporary failure, connection abort",
3155 						  mci->mci_host);
3156 				smtpquit(m, mci, e);
3157 
3158 				/* avoid bogus error msg */
3159 				mci->mci_errno = 0;
3160 				rcode = EX_TEMPFAIL;
3161 				mci_setstat(mci, rcode, "4.3.0", p);
3162 
3163 				/*
3164 				**  hack to get the error message into
3165 				**  the envelope (done in giveresponse())
3166 				*/
3167 
3168 				(void) sm_strlcpy(SmtpError,
3169 						  "Temporary AUTH failure",
3170 						  sizeof SmtpError);
3171 			}
3172 		}
3173 # endif /* SASL */
3174 	}
3175 
3176 
3177 do_transfer:
3178 	/* clear out per-message flags from connection structure */
3179 	mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3180 
3181 	if (bitset(EF_HAS8BIT, e->e_flags) &&
3182 	    !bitset(EF_DONT_MIME, e->e_flags) &&
3183 	    bitnset(M_7BITS, m->m_flags))
3184 		mci->mci_flags |= MCIF_CVT8TO7;
3185 
3186 #if MIME7TO8
3187 	if (bitnset(M_MAKE8BIT, m->m_flags) &&
3188 	    !bitset(MCIF_7BIT, mci->mci_flags) &&
3189 	    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3190 	     (sm_strcasecmp(p, "quoted-printable") == 0 ||
3191 	      sm_strcasecmp(p, "base64") == 0) &&
3192 	    (p = hvalue("Content-Type", e->e_header)) != NULL)
3193 	{
3194 		/* may want to convert 7 -> 8 */
3195 		/* XXX should really parse it here -- and use a class XXX */
3196 		if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3197 		    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3198 			mci->mci_flags |= MCIF_CVT7TO8;
3199 	}
3200 #endif /* MIME7TO8 */
3201 
3202 	if (tTd(11, 1))
3203 	{
3204 		sm_dprintf("openmailer: ");
3205 		mci_dump(sm_debug_file(), mci, false);
3206 	}
3207 
3208 #if _FFR_CLIENT_SIZE
3209 	/*
3210 	**  See if we know the maximum size and
3211 	**  abort if the message is too big.
3212 	**
3213 	**  NOTE: _FFR_CLIENT_SIZE is untested.
3214 	*/
3215 
3216 	if (bitset(MCIF_SIZE, mci->mci_flags) &&
3217 	    mci->mci_maxsize > 0 &&
3218 	    e->e_msgsize > mci->mci_maxsize)
3219 	{
3220 		e->e_flags |= EF_NO_BODY_RETN;
3221 		if (bitnset(M_LOCALMAILER, m->m_flags))
3222 			e->e_status = "5.2.3";
3223 		else
3224 			e->e_status = "5.3.4";
3225 
3226 		usrerrenh(e->e_status,
3227 			  "552 Message is too large; %ld bytes max",
3228 			  mci->mci_maxsize);
3229 		rcode = EX_DATAERR;
3230 
3231 		/* Need an e_message for error */
3232 		(void) sm_snprintf(SmtpError, sizeof SmtpError,
3233 				   "Message is too large; %ld bytes max",
3234 				   mci->mci_maxsize);
3235 		goto give_up;
3236 	}
3237 #endif /* _FFR_CLIENT_SIZE */
3238 
3239 	if (mci->mci_state != MCIS_OPEN)
3240 	{
3241 		/* couldn't open the mailer */
3242 		rcode = mci->mci_exitstat;
3243 		errno = mci->mci_errno;
3244 		SM_SET_H_ERRNO(mci->mci_herrno);
3245 		if (rcode == EX_OK)
3246 		{
3247 			/* shouldn't happen */
3248 			syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3249 			       (unsigned long) mci, rcode, errno,
3250 			       mci->mci_state, firstsig);
3251 			mci_dump_all(smioout, true);
3252 			rcode = EX_SOFTWARE;
3253 		}
3254 		else if (nummxhosts > hostnum)
3255 		{
3256 			/* try next MX site */
3257 			goto tryhost;
3258 		}
3259 	}
3260 	else if (!clever)
3261 	{
3262 		/*
3263 		**  Format and send message.
3264 		*/
3265 
3266 		putfromline(mci, e);
3267 		(*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3268 		(*e->e_putbody)(mci, e, NULL);
3269 
3270 		/* get the exit status */
3271 		rcode = endmailer(mci, e, pv);
3272 		if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3273 		{
3274 			/*
3275 			**  Need an e_message for mailq display.
3276 			**  We set SmtpError as
3277 			*/
3278 
3279 			(void) sm_snprintf(SmtpError, sizeof SmtpError,
3280 					   "%s mailer (%s) exited with EX_TEMPFAIL",
3281 					   m->m_name, m->m_mailer);
3282 		}
3283 	}
3284 	else
3285 	{
3286 		/*
3287 		**  Send the MAIL FROM: protocol
3288 		*/
3289 
3290 		/* XXX this isn't pipelined... */
3291 		rcode = smtpmailfrom(m, mci, e);
3292 		if (rcode == EX_OK)
3293 		{
3294 			register int i;
3295 # if PIPELINING
3296 			ADDRESS *volatile pchain;
3297 # endif /* PIPELINING */
3298 
3299 			/* send the recipient list */
3300 			tobuf[0] = '\0';
3301 			mci->mci_retryrcpt = false;
3302 			mci->mci_tolist = tobuf;
3303 # if PIPELINING
3304 			pchain = NULL;
3305 			mci->mci_nextaddr = NULL;
3306 # endif /* PIPELINING */
3307 
3308 			for (to = tochain; to != NULL; to = to->q_tchain)
3309 			{
3310 				if (!QS_IS_UNMARKED(to->q_state))
3311 					continue;
3312 
3313 				/* mark recipient state as "ok so far" */
3314 				to->q_state = QS_OK;
3315 				e->e_to = to->q_paddr;
3316 # if STARTTLS
3317 				i = rscheck("tls_rcpt", to->q_user, NULL, e,
3318 					    RSF_RMCOMM|RSF_COUNT, 3,
3319 					    mci->mci_host, e->e_id);
3320 				if (i != EX_OK)
3321 				{
3322 					markfailure(e, to, mci, i, false);
3323 					giveresponse(i, to->q_status,  m, mci,
3324 						     ctladdr, xstart, e, to);
3325 					if (i == EX_TEMPFAIL)
3326 					{
3327 						mci->mci_retryrcpt = true;
3328 						to->q_state = QS_RETRY;
3329 					}
3330 					continue;
3331 				}
3332 # endif /* STARTTLS */
3333 
3334 				i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3335 # if PIPELINING
3336 				if (i == EX_OK &&
3337 				    bitset(MCIF_PIPELINED, mci->mci_flags))
3338 				{
3339 					/*
3340 					**  Add new element to list of
3341 					**  recipients for pipelining.
3342 					*/
3343 
3344 					to->q_pchain = NULL;
3345 					if (mci->mci_nextaddr == NULL)
3346 						mci->mci_nextaddr = to;
3347 					if (pchain == NULL)
3348 						pchain = to;
3349 					else
3350 					{
3351 						pchain->q_pchain = to;
3352 						pchain = pchain->q_pchain;
3353 					}
3354 				}
3355 # endif /* PIPELINING */
3356 				if (i != EX_OK)
3357 				{
3358 					markfailure(e, to, mci, i, false);
3359 					giveresponse(i, to->q_status, m, mci,
3360 						     ctladdr, xstart, e, to);
3361 					if (i == EX_TEMPFAIL)
3362 						to->q_state = QS_RETRY;
3363 				}
3364 			}
3365 
3366 			/* No recipients in list and no missing responses? */
3367 			if (tobuf[0] == '\0'
3368 # if PIPELINING
3369 			    && mci->mci_nextaddr == NULL
3370 # endif /* PIPELINING */
3371 			   )
3372 			{
3373 				rcode = EX_OK;
3374 				e->e_to = NULL;
3375 				if (bitset(MCIF_CACHED, mci->mci_flags))
3376 					smtprset(m, mci, e);
3377 			}
3378 			else
3379 			{
3380 				e->e_to = tobuf + 1;
3381 				rcode = smtpdata(m, mci, e, ctladdr, xstart);
3382 			}
3383 		}
3384 		if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3385 		{
3386 			/* try next MX site */
3387 			goto tryhost;
3388 		}
3389 	}
3390 #if NAMED_BIND
3391 	if (ConfigLevel < 2)
3392 		_res.options |= RES_DEFNAMES | RES_DNSRCH;	/* XXX */
3393 #endif /* NAMED_BIND */
3394 
3395 	if (tTd(62, 1))
3396 		checkfds("after delivery");
3397 
3398 	/*
3399 	**  Do final status disposal.
3400 	**	We check for something in tobuf for the SMTP case.
3401 	**	If we got a temporary failure, arrange to queue the
3402 	**		addressees.
3403 	*/
3404 
3405   give_up:
3406 	if (bitnset(M_LMTP, m->m_flags))
3407 	{
3408 		lmtp_rcode = rcode;
3409 		tobuf[0] = '\0';
3410 		anyok = false;
3411 		strsize = 0;
3412 	}
3413 	else
3414 		anyok = rcode == EX_OK;
3415 
3416 	for (to = tochain; to != NULL; to = to->q_tchain)
3417 	{
3418 		/* see if address already marked */
3419 		if (!QS_IS_OK(to->q_state))
3420 			continue;
3421 
3422 		/* if running LMTP, get the status for each address */
3423 		if (bitnset(M_LMTP, m->m_flags))
3424 		{
3425 			if (lmtp_rcode == EX_OK)
3426 				rcode = smtpgetstat(m, mci, e);
3427 			if (rcode == EX_OK)
3428 			{
3429 				strsize += sm_strlcat2(tobuf + strsize, ",",
3430 						to->q_paddr,
3431 						tobufsize - strsize);
3432 				SM_ASSERT(strsize < tobufsize);
3433 				anyok = true;
3434 			}
3435 			else
3436 			{
3437 				e->e_to = to->q_paddr;
3438 				markfailure(e, to, mci, rcode, true);
3439 				giveresponse(rcode, to->q_status, m, mci,
3440 					     ctladdr, xstart, e, to);
3441 				e->e_to = tobuf + 1;
3442 				continue;
3443 			}
3444 		}
3445 		else
3446 		{
3447 			/* mark bad addresses */
3448 			if (rcode != EX_OK)
3449 			{
3450 				if (goodmxfound && rcode == EX_NOHOST)
3451 					rcode = EX_TEMPFAIL;
3452 				markfailure(e, to, mci, rcode, true);
3453 				continue;
3454 			}
3455 		}
3456 
3457 		/* successful delivery */
3458 		to->q_state = QS_SENT;
3459 		to->q_statdate = curtime();
3460 		e->e_nsent++;
3461 
3462 		/*
3463 		**  Checkpoint the send list every few addresses
3464 		*/
3465 
3466 		if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3467 		{
3468 			queueup(e, false, false);
3469 			e->e_nsent = 0;
3470 		}
3471 
3472 		if (bitnset(M_LOCALMAILER, m->m_flags) &&
3473 		    bitset(QPINGONSUCCESS, to->q_flags))
3474 		{
3475 			to->q_flags |= QDELIVERED;
3476 			to->q_status = "2.1.5";
3477 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3478 					     "%s... Successfully delivered\n",
3479 					     to->q_paddr);
3480 		}
3481 		else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3482 			 bitset(QPRIMARY, to->q_flags) &&
3483 			 !bitset(MCIF_DSN, mci->mci_flags))
3484 		{
3485 			to->q_flags |= QRELAYED;
3486 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3487 					     "%s... relayed; expect no further notifications\n",
3488 					     to->q_paddr);
3489 		}
3490 		else if (IS_DLVR_NOTIFY(e) &&
3491 			 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3492 			 bitset(QPRIMARY, to->q_flags) &&
3493 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3494 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3495 			  bitset(QPINGONFAILURE, to->q_flags) ||
3496 			  bitset(QPINGONDELAY, to->q_flags)))
3497 		{
3498 			/* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3499 			to->q_flags |= QBYNRELAY;
3500 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3501 					     "%s... Deliver-by notify: relayed\n",
3502 					     to->q_paddr);
3503 		}
3504 		else if (IS_DLVR_TRACE(e) &&
3505 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3506 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3507 			  bitset(QPINGONFAILURE, to->q_flags) ||
3508 			  bitset(QPINGONDELAY, to->q_flags)) &&
3509 			 bitset(QPRIMARY, to->q_flags))
3510 		{
3511 			/* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3512 			to->q_flags |= QBYTRACE;
3513 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3514 					     "%s... Deliver-By trace: relayed\n",
3515 					     to->q_paddr);
3516 		}
3517 	}
3518 
3519 	if (bitnset(M_LMTP, m->m_flags))
3520 	{
3521 		/*
3522 		**  Global information applies to the last recipient only;
3523 		**  clear it out to avoid bogus errors.
3524 		*/
3525 
3526 		rcode = EX_OK;
3527 		e->e_statmsg = NULL;
3528 
3529 		/* reset the mci state for the next transaction */
3530 		if (mci != NULL &&
3531 		    (mci->mci_state == MCIS_MAIL ||
3532 		     mci->mci_state == MCIS_RCPT ||
3533 		     mci->mci_state == MCIS_DATA))
3534 		{
3535 			mci->mci_state = MCIS_OPEN;
3536 			SmtpPhase = mci->mci_phase = "idle";
3537 			sm_setproctitle(true, e, "%s: %s", CurHostName,
3538 					mci->mci_phase);
3539 		}
3540 	}
3541 
3542 	if (tobuf[0] != '\0')
3543 	{
3544 		giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3545 #if 0
3546 		/*
3547 		**  This code is disabled for now because I am not
3548 		**  sure that copying status from the first recipient
3549 		**  to all non-status'ed recipients is a good idea.
3550 		*/
3551 
3552 		if (tochain->q_message != NULL &&
3553 		    !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3554 		{
3555 			for (to = tochain->q_tchain; to != NULL;
3556 			     to = to->q_tchain)
3557 			{
3558 				/* see if address already marked */
3559 				if (QS_IS_QUEUEUP(to->q_state) &&
3560 				    to->q_message == NULL)
3561 					to->q_message = sm_rpool_strdup_x(e->e_rpool,
3562 							tochain->q_message);
3563 			}
3564 		}
3565 #endif /* 0 */
3566 	}
3567 	if (anyok)
3568 		markstats(e, tochain, STATS_NORMAL);
3569 	mci_store_persistent(mci);
3570 
3571 	/* Some recipients were tempfailed, try them on the next host */
3572 	if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3573 	{
3574 		/* try next MX site */
3575 		goto tryhost;
3576 	}
3577 
3578 	/* now close the connection */
3579 	if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3580 	    !bitset(MCIF_CACHED, mci->mci_flags))
3581 		smtpquit(m, mci, e);
3582 
3583 cleanup: ;
3584 	}
3585 	SM_FINALLY
3586 	{
3587 		/*
3588 		**  Restore state and return.
3589 		*/
3590 #if XDEBUG
3591 		char wbuf[MAXLINE];
3592 
3593 		/* make absolutely certain 0, 1, and 2 are in use */
3594 		(void) sm_snprintf(wbuf, sizeof wbuf,
3595 				   "%s... end of deliver(%s)",
3596 				   e->e_to == NULL ? "NO-TO-LIST"
3597 						   : shortenstring(e->e_to,
3598 								   MAXSHORTSTR),
3599 				  m->m_name);
3600 		checkfd012(wbuf);
3601 #endif /* XDEBUG */
3602 
3603 		errno = 0;
3604 
3605 		/*
3606 		**  It was originally necessary to set macro 'g' to NULL
3607 		**  because it previously pointed to an auto buffer.
3608 		**  We don't do this any more, so this may be unnecessary.
3609 		*/
3610 
3611 		macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3612 		e->e_to = NULL;
3613 	}
3614 	SM_END_TRY
3615 	return rcode;
3616 }
3617 
3618 /*
3619 **  MARKFAILURE -- mark a failure on a specific address.
3620 **
3621 **	Parameters:
3622 **		e -- the envelope we are sending.
3623 **		q -- the address to mark.
3624 **		mci -- mailer connection information.
3625 **		rcode -- the code signifying the particular failure.
3626 **		ovr -- override an existing code?
3627 **
3628 **	Returns:
3629 **		none.
3630 **
3631 **	Side Effects:
3632 **		marks the address (and possibly the envelope) with the
3633 **			failure so that an error will be returned or
3634 **			the message will be queued, as appropriate.
3635 */
3636 
3637 void
3638 markfailure(e, q, mci, rcode, ovr)
3639 	register ENVELOPE *e;
3640 	register ADDRESS *q;
3641 	register MCI *mci;
3642 	int rcode;
3643 	bool ovr;
3644 {
3645 	int save_errno = errno;
3646 	char *status = NULL;
3647 	char *rstatus = NULL;
3648 
3649 	switch (rcode)
3650 	{
3651 	  case EX_OK:
3652 		break;
3653 
3654 	  case EX_TEMPFAIL:
3655 	  case EX_IOERR:
3656 	  case EX_OSERR:
3657 		q->q_state = QS_QUEUEUP;
3658 		break;
3659 
3660 	  default:
3661 		q->q_state = QS_BADADDR;
3662 		break;
3663 	}
3664 
3665 	/* find most specific error code possible */
3666 	if (mci != NULL && mci->mci_status != NULL)
3667 	{
3668 		status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3669 		if (mci->mci_rstatus != NULL)
3670 			rstatus = sm_rpool_strdup_x(e->e_rpool,
3671 						    mci->mci_rstatus);
3672 		else
3673 			rstatus = NULL;
3674 	}
3675 	else if (e->e_status != NULL)
3676 	{
3677 		status = e->e_status;
3678 		rstatus = NULL;
3679 	}
3680 	else
3681 	{
3682 		switch (rcode)
3683 		{
3684 		  case EX_USAGE:
3685 			status = "5.5.4";
3686 			break;
3687 
3688 		  case EX_DATAERR:
3689 			status = "5.5.2";
3690 			break;
3691 
3692 		  case EX_NOUSER:
3693 			status = "5.1.1";
3694 			break;
3695 
3696 		  case EX_NOHOST:
3697 			status = "5.1.2";
3698 			break;
3699 
3700 		  case EX_NOINPUT:
3701 		  case EX_CANTCREAT:
3702 		  case EX_NOPERM:
3703 			status = "5.3.0";
3704 			break;
3705 
3706 		  case EX_UNAVAILABLE:
3707 		  case EX_SOFTWARE:
3708 		  case EX_OSFILE:
3709 		  case EX_PROTOCOL:
3710 		  case EX_CONFIG:
3711 			status = "5.5.0";
3712 			break;
3713 
3714 		  case EX_OSERR:
3715 		  case EX_IOERR:
3716 			status = "4.5.0";
3717 			break;
3718 
3719 		  case EX_TEMPFAIL:
3720 			status = "4.2.0";
3721 			break;
3722 		}
3723 	}
3724 
3725 	/* new status? */
3726 	if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3727 	    *q->q_status == '\0' || *q->q_status < *status))
3728 	{
3729 		q->q_status = status;
3730 		q->q_rstatus = rstatus;
3731 	}
3732 	if (rcode != EX_OK && q->q_rstatus == NULL &&
3733 	    q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3734 	    sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3735 	{
3736 		char buf[16];
3737 
3738 		(void) sm_snprintf(buf, sizeof buf, "%d", rcode);
3739 		q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3740 	}
3741 
3742 	q->q_statdate = curtime();
3743 	if (CurHostName != NULL && CurHostName[0] != '\0' &&
3744 	    mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3745 		q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3746 
3747 	/* restore errno */
3748 	errno = save_errno;
3749 }
3750 /*
3751 **  ENDMAILER -- Wait for mailer to terminate.
3752 **
3753 **	We should never get fatal errors (e.g., segmentation
3754 **	violation), so we report those specially.  For other
3755 **	errors, we choose a status message (into statmsg),
3756 **	and if it represents an error, we print it.
3757 **
3758 **	Parameters:
3759 **		mci -- the mailer connection info.
3760 **		e -- the current envelope.
3761 **		pv -- the parameter vector that invoked the mailer
3762 **			(for error messages).
3763 **
3764 **	Returns:
3765 **		exit code of mailer.
3766 **
3767 **	Side Effects:
3768 **		none.
3769 */
3770 
3771 static jmp_buf	EndWaitTimeout;
3772 
3773 static void
3774 endwaittimeout(ignore)
3775 	int ignore;
3776 {
3777 	/*
3778 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3779 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3780 	**	DOING.
3781 	*/
3782 
3783 	errno = ETIMEDOUT;
3784 	longjmp(EndWaitTimeout, 1);
3785 }
3786 
3787 int
3788 endmailer(mci, e, pv)
3789 	register MCI *mci;
3790 	register ENVELOPE *e;
3791 	char **pv;
3792 {
3793 	int st;
3794 	int save_errno = errno;
3795 	char buf[MAXLINE];
3796 	SM_EVENT *ev = NULL;
3797 
3798 
3799 	mci_unlock_host(mci);
3800 
3801 	/* close output to mailer */
3802 	if (mci->mci_out != NULL)
3803 	{
3804 		(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3805 		mci->mci_out = NULL;
3806 	}
3807 
3808 	/* copy any remaining input to transcript */
3809 	if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3810 	    e->e_xfp != NULL)
3811 	{
3812 		while (sfgets(buf, sizeof buf, mci->mci_in,
3813 			      TimeOuts.to_quit, "Draining Input") != NULL)
3814 			(void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3815 	}
3816 
3817 #if SASL
3818 	/* close SASL connection */
3819 	if (bitset(MCIF_AUTHACT, mci->mci_flags))
3820 	{
3821 		sasl_dispose(&mci->mci_conn);
3822 		mci->mci_flags &= ~MCIF_AUTHACT;
3823 	}
3824 #endif /* SASL */
3825 
3826 #if STARTTLS
3827 	/* shutdown TLS */
3828 	(void) endtlsclt(mci);
3829 #endif /* STARTTLS */
3830 
3831 	/* now close the input */
3832 	if (mci->mci_in != NULL)
3833 	{
3834 		(void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3835 		mci->mci_in = NULL;
3836 	}
3837 	mci->mci_state = MCIS_CLOSED;
3838 
3839 	errno = save_errno;
3840 
3841 	/* in the IPC case there is nothing to wait for */
3842 	if (mci->mci_pid == 0)
3843 		return EX_OK;
3844 
3845 	/* put a timeout around the wait */
3846 	if (mci->mci_mailer->m_wait > 0)
3847 	{
3848 		if (setjmp(EndWaitTimeout) == 0)
3849 			ev = sm_setevent(mci->mci_mailer->m_wait,
3850 					 endwaittimeout, 0);
3851 		else
3852 		{
3853 			syserr("endmailer %s: wait timeout (%ld)",
3854 			       mci->mci_mailer->m_name,
3855 			       (long) mci->mci_mailer->m_wait);
3856 			return EX_TEMPFAIL;
3857 		}
3858 	}
3859 
3860 	/* wait for the mailer process, collect status */
3861 	st = waitfor(mci->mci_pid);
3862 	save_errno = errno;
3863 	if (ev != NULL)
3864 		sm_clrevent(ev);
3865 	errno = save_errno;
3866 
3867 	if (st == -1)
3868 	{
3869 		syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3870 		return EX_SOFTWARE;
3871 	}
3872 
3873 	if (WIFEXITED(st))
3874 	{
3875 		/* normal death -- return status */
3876 		return (WEXITSTATUS(st));
3877 	}
3878 
3879 	/* it died a horrid death */
3880 	syserr("451 4.3.0 mailer %s died with signal %d%s",
3881 		mci->mci_mailer->m_name, WTERMSIG(st),
3882 		WCOREDUMP(st) ? " (core dumped)" :
3883 		(WIFSTOPPED(st) ? " (stopped)" : ""));
3884 
3885 	/* log the arguments */
3886 	if (pv != NULL && e->e_xfp != NULL)
3887 	{
3888 		register char **av;
3889 
3890 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3891 		for (av = pv; *av != NULL; av++)
3892 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3893 					     *av);
3894 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3895 	}
3896 
3897 	ExitStat = EX_TEMPFAIL;
3898 	return EX_TEMPFAIL;
3899 }
3900 /*
3901 **  GIVERESPONSE -- Interpret an error response from a mailer
3902 **
3903 **	Parameters:
3904 **		status -- the status code from the mailer (high byte
3905 **			only; core dumps must have been taken care of
3906 **			already).
3907 **		dsn -- the DSN associated with the address, if any.
3908 **		m -- the mailer info for this mailer.
3909 **		mci -- the mailer connection info -- can be NULL if the
3910 **			response is given before the connection is made.
3911 **		ctladdr -- the controlling address for the recipient
3912 **			address(es).
3913 **		xstart -- the transaction start time, for computing
3914 **			transaction delays.
3915 **		e -- the current envelope.
3916 **		to -- the current recipient (NULL if none).
3917 **
3918 **	Returns:
3919 **		none.
3920 **
3921 **	Side Effects:
3922 **		Errors may be incremented.
3923 **		ExitStat may be set.
3924 */
3925 
3926 void
3927 giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3928 	int status;
3929 	char *dsn;
3930 	register MAILER *m;
3931 	register MCI *mci;
3932 	ADDRESS *ctladdr;
3933 	time_t xstart;
3934 	ENVELOPE *e;
3935 	ADDRESS *to;
3936 {
3937 	register const char *statmsg;
3938 	int errnum = errno;
3939 	int off = 4;
3940 	bool usestat = false;
3941 	char dsnbuf[ENHSCLEN];
3942 	char buf[MAXLINE];
3943 	char *exmsg;
3944 
3945 	if (e == NULL)
3946 		syserr("giveresponse: null envelope");
3947 
3948 	/*
3949 	**  Compute status message from code.
3950 	*/
3951 
3952 	exmsg = sm_sysexmsg(status);
3953 	if (status == 0)
3954 	{
3955 		statmsg = "250 2.0.0 Sent";
3956 		if (e->e_statmsg != NULL)
3957 		{
3958 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)",
3959 					   statmsg,
3960 					   shortenstring(e->e_statmsg, 403));
3961 			statmsg = buf;
3962 		}
3963 	}
3964 	else if (exmsg == NULL)
3965 	{
3966 		(void) sm_snprintf(buf, sizeof buf,
3967 				   "554 5.3.0 unknown mailer error %d",
3968 				   status);
3969 		status = EX_UNAVAILABLE;
3970 		statmsg = buf;
3971 		usestat = true;
3972 	}
3973 	else if (status == EX_TEMPFAIL)
3974 	{
3975 		char *bp = buf;
3976 
3977 		(void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
3978 		bp += strlen(bp);
3979 #if NAMED_BIND
3980 		if (h_errno == TRY_AGAIN)
3981 			statmsg = sm_errstring(h_errno + E_DNSBASE);
3982 		else
3983 #endif /* NAMED_BIND */
3984 		{
3985 			if (errnum != 0)
3986 				statmsg = sm_errstring(errnum);
3987 			else
3988 				statmsg = SmtpError;
3989 		}
3990 		if (statmsg != NULL && statmsg[0] != '\0')
3991 		{
3992 			switch (errnum)
3993 			{
3994 #ifdef ENETDOWN
3995 			  case ENETDOWN:	/* Network is down */
3996 #endif /* ENETDOWN */
3997 #ifdef ENETUNREACH
3998 			  case ENETUNREACH:	/* Network is unreachable */
3999 #endif /* ENETUNREACH */
4000 #ifdef ENETRESET
4001 			  case ENETRESET:	/* Network dropped connection on reset */
4002 #endif /* ENETRESET */
4003 #ifdef ECONNABORTED
4004 			  case ECONNABORTED:	/* Software caused connection abort */
4005 #endif /* ECONNABORTED */
4006 #ifdef EHOSTDOWN
4007 			  case EHOSTDOWN:	/* Host is down */
4008 #endif /* EHOSTDOWN */
4009 #ifdef EHOSTUNREACH
4010 			  case EHOSTUNREACH:	/* No route to host */
4011 #endif /* EHOSTUNREACH */
4012 				if (mci != NULL && mci->mci_host != NULL)
4013 				{
4014 					(void) sm_strlcpyn(bp,
4015 							   SPACELEFT(buf, bp),
4016 							   2, ": ",
4017 							   mci->mci_host);
4018 					bp += strlen(bp);
4019 				}
4020 				break;
4021 			}
4022 			(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4023 					   statmsg);
4024 			usestat = true;
4025 		}
4026 		statmsg = buf;
4027 	}
4028 #if NAMED_BIND
4029 	else if (status == EX_NOHOST && h_errno != 0)
4030 	{
4031 		statmsg = sm_errstring(h_errno + E_DNSBASE);
4032 		(void) sm_snprintf(buf, sizeof buf, "%s (%s)", exmsg + 1,
4033 				   statmsg);
4034 		statmsg = buf;
4035 		usestat = true;
4036 	}
4037 #endif /* NAMED_BIND */
4038 	else
4039 	{
4040 		statmsg = exmsg;
4041 		if (*statmsg++ == ':' && errnum != 0)
4042 		{
4043 			(void) sm_snprintf(buf, sizeof buf, "%s: %s", statmsg,
4044 					   sm_errstring(errnum));
4045 			statmsg = buf;
4046 			usestat = true;
4047 		}
4048 		else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4049 		{
4050 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)", statmsg,
4051 					   shortenstring(e->e_statmsg, 403));
4052 			statmsg = buf;
4053 			usestat = true;
4054 		}
4055 	}
4056 
4057 	/*
4058 	**  Print the message as appropriate
4059 	*/
4060 
4061 	if (status == EX_OK || status == EX_TEMPFAIL)
4062 	{
4063 		extern char MsgBuf[];
4064 
4065 		if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4066 		{
4067 			if (dsn == NULL)
4068 			{
4069 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4070 						   "%.*s", off, statmsg + 4);
4071 				dsn = dsnbuf;
4072 			}
4073 			off += 5;
4074 		}
4075 		else
4076 		{
4077 			off = 4;
4078 		}
4079 		message("%s", statmsg + off);
4080 		if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4081 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4082 					     &MsgBuf[4]);
4083 	}
4084 	else
4085 	{
4086 		char mbuf[ENHSCLEN + 4];
4087 
4088 		Errors++;
4089 		if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4090 		    off < sizeof mbuf - 4)
4091 		{
4092 			if (dsn == NULL)
4093 			{
4094 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4095 						   "%.*s", off, statmsg + 4);
4096 				dsn = dsnbuf;
4097 			}
4098 			off += 5;
4099 
4100 			/* copy only part of statmsg to mbuf */
4101 			(void) sm_strlcpy(mbuf, statmsg, off);
4102 			(void) sm_strlcat(mbuf, " %s", sizeof mbuf);
4103 		}
4104 		else
4105 		{
4106 			dsnbuf[0] = '\0';
4107 			(void) sm_snprintf(mbuf, sizeof mbuf, "%.3s %%s",
4108 					   statmsg);
4109 			off = 4;
4110 		}
4111 		usrerr(mbuf, &statmsg[off]);
4112 	}
4113 
4114 	/*
4115 	**  Final cleanup.
4116 	**	Log a record of the transaction.  Compute the new
4117 	**	ExitStat -- if we already had an error, stick with
4118 	**	that.
4119 	*/
4120 
4121 	if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4122 	    LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4123 		logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4124 
4125 	if (tTd(11, 2))
4126 		sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4127 			   status,
4128 			   dsn == NULL ? "<NULL>" : dsn,
4129 			   e->e_message == NULL ? "<NULL>" : e->e_message,
4130 			   errnum);
4131 
4132 	if (status != EX_TEMPFAIL)
4133 		setstat(status);
4134 	if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4135 		e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4136 	if (status != EX_OK && to != NULL && to->q_message == NULL)
4137 	{
4138 		if (!usestat && e->e_message != NULL)
4139 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4140 							  e->e_message);
4141 		else
4142 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4143 							  statmsg + off);
4144 	}
4145 	errno = 0;
4146 	SM_SET_H_ERRNO(0);
4147 }
4148 /*
4149 **  LOGDELIVERY -- log the delivery in the system log
4150 **
4151 **	Care is taken to avoid logging lines that are too long, because
4152 **	some versions of syslog have an unfortunate proclivity for core
4153 **	dumping.  This is a hack, to be sure, that is at best empirical.
4154 **
4155 **	Parameters:
4156 **		m -- the mailer info.  Can be NULL for initial queue.
4157 **		mci -- the mailer connection info -- can be NULL if the
4158 **			log is occurring when no connection is active.
4159 **		dsn -- the DSN attached to the status.
4160 **		status -- the message to print for the status.
4161 **		ctladdr -- the controlling address for the to list.
4162 **		xstart -- the transaction start time, used for
4163 **			computing transaction delay.
4164 **		e -- the current envelope.
4165 **
4166 **	Returns:
4167 **		none
4168 **
4169 **	Side Effects:
4170 **		none
4171 */
4172 
4173 void
4174 logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4175 	MAILER *m;
4176 	register MCI *mci;
4177 	char *dsn;
4178 	const char *status;
4179 	ADDRESS *ctladdr;
4180 	time_t xstart;
4181 	register ENVELOPE *e;
4182 {
4183 	register char *bp;
4184 	register char *p;
4185 	int l;
4186 	time_t now = curtime();
4187 	char buf[1024];
4188 
4189 #if (SYSLOG_BUFSIZE) >= 256
4190 	/* ctladdr: max 106 bytes */
4191 	bp = buf;
4192 	if (ctladdr != NULL)
4193 	{
4194 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4195 				   shortenstring(ctladdr->q_paddr, 83));
4196 		bp += strlen(bp);
4197 		if (bitset(QGOODUID, ctladdr->q_flags))
4198 		{
4199 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4200 					   (int) ctladdr->q_uid,
4201 					   (int) ctladdr->q_gid);
4202 			bp += strlen(bp);
4203 		}
4204 	}
4205 
4206 	/* delay & xdelay: max 41 bytes */
4207 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4208 			   pintvl(now - e->e_ctime, true));
4209 	bp += strlen(bp);
4210 
4211 	if (xstart != (time_t) 0)
4212 	{
4213 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4214 				   pintvl(now - xstart, true));
4215 		bp += strlen(bp);
4216 	}
4217 
4218 	/* mailer: assume about 19 bytes (max 10 byte mailer name) */
4219 	if (m != NULL)
4220 	{
4221 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4222 				   m->m_name);
4223 		bp += strlen(bp);
4224 	}
4225 
4226 	/* pri: changes with each delivery attempt */
4227 	(void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4228 		e->e_msgpriority);
4229 	bp += strlen(bp);
4230 
4231 	/* relay: max 66 bytes for IPv4 addresses */
4232 	if (mci != NULL && mci->mci_host != NULL)
4233 	{
4234 		extern SOCKADDR CurHostAddr;
4235 
4236 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4237 				   shortenstring(mci->mci_host, 40));
4238 		bp += strlen(bp);
4239 
4240 		if (CurHostAddr.sa.sa_family != 0)
4241 		{
4242 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4243 					   anynet_ntoa(&CurHostAddr));
4244 		}
4245 	}
4246 	else if (strcmp(status, "quarantined") == 0)
4247 	{
4248 		if (e->e_quarmsg != NULL)
4249 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4250 					   ", quarantine=%s",
4251 					   shortenstring(e->e_quarmsg, 40));
4252 	}
4253 	else if (strcmp(status, "queued") != 0)
4254 	{
4255 		p = macvalue('h', e);
4256 		if (p != NULL && p[0] != '\0')
4257 		{
4258 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4259 					   ", relay=%s", shortenstring(p, 40));
4260 		}
4261 	}
4262 	bp += strlen(bp);
4263 
4264 	/* dsn */
4265 	if (dsn != NULL && *dsn != '\0')
4266 	{
4267 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4268 				   shortenstring(dsn, ENHSCLEN));
4269 		bp += strlen(bp);
4270 	}
4271 
4272 #if _FFR_LOG_NTRIES
4273 	/* ntries */
4274 	if (e->e_ntries >= 0)
4275 	{
4276 		(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4277 				   ", ntries=%d", e->e_ntries + 1);
4278 		bp += strlen(bp);
4279 	}
4280 #endif /* _FFR_LOG_NTRIES */
4281 
4282 # define STATLEN		(((SYSLOG_BUFSIZE) - 100) / 4)
4283 # if (STATLEN) < 63
4284 #  undef STATLEN
4285 #  define STATLEN	63
4286 # endif /* (STATLEN) < 63 */
4287 # if (STATLEN) > 203
4288 #  undef STATLEN
4289 #  define STATLEN	203
4290 # endif /* (STATLEN) > 203 */
4291 
4292 	/* stat: max 210 bytes */
4293 	if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
4294 	{
4295 		/* desperation move -- truncate data */
4296 		bp = buf + sizeof buf - ((STATLEN) + 17);
4297 		(void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4298 		bp += 3;
4299 	}
4300 
4301 	(void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4302 	bp += strlen(bp);
4303 
4304 	(void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4305 			  SPACELEFT(buf, bp));
4306 
4307 	/* id, to: max 13 + TOBUFSIZE bytes */
4308 	l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4309 	if (l < 0)
4310 		l = 0;
4311 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4312 	while (strlen(p) >= l)
4313 	{
4314 		register char *q;
4315 
4316 		for (q = p + l; q > p; q--)
4317 		{
4318 			if (*q == ',')
4319 				break;
4320 		}
4321 		if (p == q)
4322 			break;
4323 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4324 			  (int) (++q - p), p, buf);
4325 		p = q;
4326 	}
4327 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4328 
4329 #else /* (SYSLOG_BUFSIZE) >= 256 */
4330 
4331 	l = SYSLOG_BUFSIZE - 85;
4332 	if (l < 0)
4333 		l = 0;
4334 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4335 	while (strlen(p) >= l)
4336 	{
4337 		register char *q;
4338 
4339 		for (q = p + l; q > p; q--)
4340 		{
4341 			if (*q == ',')
4342 				break;
4343 		}
4344 		if (p == q)
4345 			break;
4346 
4347 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4348 			  (int) (++q - p), p);
4349 		p = q;
4350 	}
4351 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4352 
4353 	if (ctladdr != NULL)
4354 	{
4355 		bp = buf;
4356 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4357 				   shortenstring(ctladdr->q_paddr, 83));
4358 		bp += strlen(bp);
4359 		if (bitset(QGOODUID, ctladdr->q_flags))
4360 		{
4361 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4362 					   ctladdr->q_uid, ctladdr->q_gid);
4363 			bp += strlen(bp);
4364 		}
4365 		sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4366 	}
4367 	bp = buf;
4368 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4369 			   pintvl(now - e->e_ctime, true));
4370 	bp += strlen(bp);
4371 	if (xstart != (time_t) 0)
4372 	{
4373 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4374 				   pintvl(now - xstart, true));
4375 		bp += strlen(bp);
4376 	}
4377 
4378 	if (m != NULL)
4379 	{
4380 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4381 				   m->m_name);
4382 		bp += strlen(bp);
4383 	}
4384 	sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4385 
4386 	buf[0] = '\0';
4387 	bp = buf;
4388 	if (mci != NULL && mci->mci_host != NULL)
4389 	{
4390 		extern SOCKADDR CurHostAddr;
4391 
4392 		(void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4393 				   mci->mci_host);
4394 		bp += strlen(bp);
4395 
4396 		if (CurHostAddr.sa.sa_family != 0)
4397 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4398 					   " [%.100s]",
4399 					   anynet_ntoa(&CurHostAddr));
4400 	}
4401 	else if (strcmp(status, "quarantined") == 0)
4402 	{
4403 		if (e->e_quarmsg != NULL)
4404 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4405 					   ", quarantine=%.100s",
4406 					   e->e_quarmsg);
4407 	}
4408 	else if (strcmp(status, "queued") != 0)
4409 	{
4410 		p = macvalue('h', e);
4411 		if (p != NULL && p[0] != '\0')
4412 			(void) sm_snprintf(buf, sizeof buf, "relay=%.100s", p);
4413 	}
4414 	if (buf[0] != '\0')
4415 		sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4416 
4417 	sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4418 #endif /* (SYSLOG_BUFSIZE) >= 256 */
4419 }
4420 /*
4421 **  PUTFROMLINE -- output a UNIX-style from line (or whatever)
4422 **
4423 **	This can be made an arbitrary message separator by changing $l
4424 **
4425 **	One of the ugliest hacks seen by human eyes is contained herein:
4426 **	UUCP wants those stupid "remote from <host>" lines.  Why oh why
4427 **	does a well-meaning programmer such as myself have to deal with
4428 **	this kind of antique garbage????
4429 **
4430 **	Parameters:
4431 **		mci -- the connection information.
4432 **		e -- the envelope.
4433 **
4434 **	Returns:
4435 **		none
4436 **
4437 **	Side Effects:
4438 **		outputs some text to fp.
4439 */
4440 
4441 void
4442 putfromline(mci, e)
4443 	register MCI *mci;
4444 	ENVELOPE *e;
4445 {
4446 	char *template = UnixFromLine;
4447 	char buf[MAXLINE];
4448 	char xbuf[MAXLINE];
4449 
4450 	if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4451 		return;
4452 
4453 	mci->mci_flags |= MCIF_INHEADER;
4454 
4455 	if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4456 	{
4457 		char *bang;
4458 
4459 		expand("\201g", buf, sizeof buf, e);
4460 		bang = strchr(buf, '!');
4461 		if (bang == NULL)
4462 		{
4463 			char *at;
4464 			char hname[MAXNAME];
4465 
4466 			/*
4467 			**  If we can construct a UUCP path, do so
4468 			*/
4469 
4470 			at = strrchr(buf, '@');
4471 			if (at == NULL)
4472 			{
4473 				expand("\201k", hname, sizeof hname, e);
4474 				at = hname;
4475 			}
4476 			else
4477 				*at++ = '\0';
4478 			(void) sm_snprintf(xbuf, sizeof xbuf,
4479 					   "From %.800s  \201d remote from %.100s\n",
4480 					   buf, at);
4481 		}
4482 		else
4483 		{
4484 			*bang++ = '\0';
4485 			(void) sm_snprintf(xbuf, sizeof xbuf,
4486 					   "From %.800s  \201d remote from %.100s\n",
4487 					   bang, buf);
4488 			template = xbuf;
4489 		}
4490 	}
4491 	expand(template, buf, sizeof buf, e);
4492 	putxline(buf, strlen(buf), mci, PXLF_HEADER);
4493 }
4494 /*
4495 **  PUTBODY -- put the body of a message.
4496 **
4497 **	Parameters:
4498 **		mci -- the connection information.
4499 **		e -- the envelope to put out.
4500 **		separator -- if non-NULL, a message separator that must
4501 **			not be permitted in the resulting message.
4502 **
4503 **	Returns:
4504 **		none.
4505 **
4506 **	Side Effects:
4507 **		The message is written onto fp.
4508 */
4509 
4510 /* values for output state variable */
4511 #define OSTATE_HEAD	0	/* at beginning of line */
4512 #define OSTATE_CR	1	/* read a carriage return */
4513 #define OSTATE_INLINE	2	/* putting rest of line */
4514 
4515 void
4516 putbody(mci, e, separator)
4517 	register MCI *mci;
4518 	register ENVELOPE *e;
4519 	char *separator;
4520 {
4521 	bool dead = false;
4522 	char buf[MAXLINE];
4523 #if MIME8TO7
4524 	char *boundaries[MAXMIMENESTING + 1];
4525 #endif /* MIME8TO7 */
4526 
4527 	/*
4528 	**  Output the body of the message
4529 	*/
4530 
4531 	if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4532 	{
4533 		char *df = queuename(e, DATAFL_LETTER);
4534 
4535 		e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4536 				      SM_IO_RDONLY_B, NULL);
4537 		if (e->e_dfp == NULL)
4538 		{
4539 			char *msg = "!putbody: Cannot open %s for %s from %s";
4540 
4541 			if (errno == ENOENT)
4542 				msg++;
4543 			syserr(msg, df, e->e_to, e->e_from.q_paddr);
4544 		}
4545 
4546 	}
4547 	if (e->e_dfp == NULL)
4548 	{
4549 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4550 		{
4551 			putline("", mci);
4552 			mci->mci_flags &= ~MCIF_INHEADER;
4553 		}
4554 		putline("<<< No Message Collected >>>", mci);
4555 		goto endofmessage;
4556 	}
4557 
4558 	if (e->e_dfino == (ino_t) 0)
4559 	{
4560 		struct stat stbuf;
4561 
4562 		if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4563 		    < 0)
4564 			e->e_dfino = -1;
4565 		else
4566 		{
4567 			e->e_dfdev = stbuf.st_dev;
4568 			e->e_dfino = stbuf.st_ino;
4569 		}
4570 	}
4571 
4572 	/* paranoia: the data file should always be in a rewound state */
4573 	(void) bfrewind(e->e_dfp);
4574 
4575 #if MIME8TO7
4576 	if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4577 	{
4578 		/*
4579 		**  Do 8 to 7 bit MIME conversion.
4580 		*/
4581 
4582 		/* make sure it looks like a MIME message */
4583 		if (hvalue("MIME-Version", e->e_header) == NULL)
4584 			putline("MIME-Version: 1.0", mci);
4585 
4586 		if (hvalue("Content-Type", e->e_header) == NULL)
4587 		{
4588 			(void) sm_snprintf(buf, sizeof buf,
4589 					   "Content-Type: text/plain; charset=%s",
4590 					   defcharset(e));
4591 			putline(buf, mci);
4592 		}
4593 
4594 		/* now do the hard work */
4595 		boundaries[0] = NULL;
4596 		mci->mci_flags |= MCIF_INHEADER;
4597 		(void) mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER);
4598 	}
4599 # if MIME7TO8
4600 	else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4601 	{
4602 		(void) mime7to8(mci, e->e_header, e);
4603 	}
4604 # endif /* MIME7TO8 */
4605 	else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4606 	{
4607 		bool oldsuprerrs = SuprErrs;
4608 
4609 		/* Use mime8to7 to check multipart for MIME header overflows */
4610 		boundaries[0] = NULL;
4611 		mci->mci_flags |= MCIF_INHEADER;
4612 
4613 		/*
4614 		**  If EF_DONT_MIME is set, we have a broken MIME message
4615 		**  and don't want to generate a new bounce message whose
4616 		**  body propagates the broken MIME.  We can't just not call
4617 		**  mime8to7() as is done above since we need the security
4618 		**  checks.  The best we can do is suppress the errors.
4619 		*/
4620 
4621 		if (bitset(EF_DONT_MIME, e->e_flags))
4622 			SuprErrs = true;
4623 
4624 		(void) mime8to7(mci, e->e_header, e, boundaries,
4625 				M87F_OUTER|M87F_NO8TO7);
4626 
4627 		/* restore SuprErrs */
4628 		SuprErrs = oldsuprerrs;
4629 	}
4630 	else
4631 #endif /* MIME8TO7 */
4632 	{
4633 		int ostate;
4634 		register char *bp;
4635 		register char *pbp;
4636 		register int c;
4637 		register char *xp;
4638 		int padc;
4639 		char *buflim;
4640 		int pos = 0;
4641 		char peekbuf[12];
4642 
4643 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4644 		{
4645 			putline("", mci);
4646 			mci->mci_flags &= ~MCIF_INHEADER;
4647 		}
4648 
4649 		/* determine end of buffer; allow for short mailer lines */
4650 		buflim = &buf[sizeof buf - 1];
4651 		if (mci->mci_mailer->m_linelimit > 0 &&
4652 		    mci->mci_mailer->m_linelimit < sizeof buf - 1)
4653 			buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4654 
4655 		/* copy temp file to output with mapping */
4656 		ostate = OSTATE_HEAD;
4657 		bp = buf;
4658 		pbp = peekbuf;
4659 		while (!sm_io_error(mci->mci_out) && !dead)
4660 		{
4661 			if (pbp > peekbuf)
4662 				c = *--pbp;
4663 			else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4664 				 == SM_IO_EOF)
4665 				break;
4666 			if (bitset(MCIF_7BIT, mci->mci_flags))
4667 				c &= 0x7f;
4668 			switch (ostate)
4669 			{
4670 			  case OSTATE_HEAD:
4671 				if (c == '\0' &&
4672 				    bitnset(M_NONULLS,
4673 					    mci->mci_mailer->m_flags))
4674 					break;
4675 				if (c != '\r' && c != '\n' && bp < buflim)
4676 				{
4677 					*bp++ = c;
4678 					break;
4679 				}
4680 
4681 				/* check beginning of line for special cases */
4682 				*bp = '\0';
4683 				pos = 0;
4684 				padc = SM_IO_EOF;
4685 				if (buf[0] == 'F' &&
4686 				    bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4687 				    && strncmp(buf, "From ", 5) == 0)
4688 				{
4689 					padc = '>';
4690 				}
4691 				if (buf[0] == '-' && buf[1] == '-' &&
4692 				    separator != NULL)
4693 				{
4694 					/* possible separator */
4695 					int sl = strlen(separator);
4696 
4697 					if (strncmp(&buf[2], separator, sl)
4698 					    == 0)
4699 						padc = ' ';
4700 				}
4701 				if (buf[0] == '.' &&
4702 				    bitnset(M_XDOT, mci->mci_mailer->m_flags))
4703 				{
4704 					padc = '.';
4705 				}
4706 
4707 				/* now copy out saved line */
4708 				if (TrafficLogFile != NULL)
4709 				{
4710 					(void) sm_io_fprintf(TrafficLogFile,
4711 							     SM_TIME_DEFAULT,
4712 							     "%05d >>> ",
4713 							     (int) CurrentPid);
4714 					if (padc != SM_IO_EOF)
4715 						(void) sm_io_putc(TrafficLogFile,
4716 								  SM_TIME_DEFAULT,
4717 								  padc);
4718 					for (xp = buf; xp < bp; xp++)
4719 						(void) sm_io_putc(TrafficLogFile,
4720 								  SM_TIME_DEFAULT,
4721 								  (unsigned char) *xp);
4722 					if (c == '\n')
4723 						(void) sm_io_fputs(TrafficLogFile,
4724 								   SM_TIME_DEFAULT,
4725 								   mci->mci_mailer->m_eol);
4726 				}
4727 				if (padc != SM_IO_EOF)
4728 				{
4729 					if (sm_io_putc(mci->mci_out,
4730 						       SM_TIME_DEFAULT, padc)
4731 					    == SM_IO_EOF)
4732 					{
4733 						dead = true;
4734 						continue;
4735 					}
4736 					else
4737 					{
4738 						/* record progress for DATA timeout */
4739 						DataProgress = true;
4740 					}
4741 					pos++;
4742 				}
4743 				for (xp = buf; xp < bp; xp++)
4744 				{
4745 					if (sm_io_putc(mci->mci_out,
4746 						       SM_TIME_DEFAULT,
4747 						       (unsigned char) *xp)
4748 					    == SM_IO_EOF)
4749 					{
4750 						dead = true;
4751 						break;
4752 					}
4753 					else
4754 					{
4755 						/* record progress for DATA timeout */
4756 						DataProgress = true;
4757 					}
4758 				}
4759 				if (dead)
4760 					continue;
4761 				if (c == '\n')
4762 				{
4763 					if (sm_io_fputs(mci->mci_out,
4764 							SM_TIME_DEFAULT,
4765 							mci->mci_mailer->m_eol)
4766 							== SM_IO_EOF)
4767 						break;
4768 					else
4769 					{
4770 						/* record progress for DATA timeout */
4771 						DataProgress = true;
4772 					}
4773 					pos = 0;
4774 				}
4775 				else
4776 				{
4777 					pos += bp - buf;
4778 					if (c != '\r')
4779 					{
4780 						SM_ASSERT(pbp < peekbuf +
4781 								sizeof(peekbuf));
4782 						*pbp++ = c;
4783 					}
4784 				}
4785 
4786 				bp = buf;
4787 
4788 				/* determine next state */
4789 				if (c == '\n')
4790 					ostate = OSTATE_HEAD;
4791 				else if (c == '\r')
4792 					ostate = OSTATE_CR;
4793 				else
4794 					ostate = OSTATE_INLINE;
4795 				continue;
4796 
4797 			  case OSTATE_CR:
4798 				if (c == '\n')
4799 				{
4800 					/* got CRLF */
4801 					if (sm_io_fputs(mci->mci_out,
4802 							SM_TIME_DEFAULT,
4803 							mci->mci_mailer->m_eol)
4804 							== SM_IO_EOF)
4805 						continue;
4806 					else
4807 					{
4808 						/* record progress for DATA timeout */
4809 						DataProgress = true;
4810 					}
4811 
4812 					if (TrafficLogFile != NULL)
4813 					{
4814 						(void) sm_io_fputs(TrafficLogFile,
4815 								   SM_TIME_DEFAULT,
4816 								   mci->mci_mailer->m_eol);
4817 					}
4818 					ostate = OSTATE_HEAD;
4819 					continue;
4820 				}
4821 
4822 				/* had a naked carriage return */
4823 				SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4824 				*pbp++ = c;
4825 				c = '\r';
4826 				ostate = OSTATE_INLINE;
4827 				goto putch;
4828 
4829 			  case OSTATE_INLINE:
4830 				if (c == '\r')
4831 				{
4832 					ostate = OSTATE_CR;
4833 					continue;
4834 				}
4835 				if (c == '\0' &&
4836 				    bitnset(M_NONULLS,
4837 					    mci->mci_mailer->m_flags))
4838 					break;
4839 putch:
4840 				if (mci->mci_mailer->m_linelimit > 0 &&
4841 				    pos >= mci->mci_mailer->m_linelimit - 1 &&
4842 				    c != '\n')
4843 				{
4844 					int d;
4845 
4846 					/* check next character for EOL */
4847 					if (pbp > peekbuf)
4848 						d = *(pbp - 1);
4849 					else if ((d = sm_io_getc(e->e_dfp,
4850 								 SM_TIME_DEFAULT))
4851 						 != SM_IO_EOF)
4852 					{
4853 						SM_ASSERT(pbp < peekbuf +
4854 								sizeof(peekbuf));
4855 						*pbp++ = d;
4856 					}
4857 
4858 					if (d == '\n' || d == SM_IO_EOF)
4859 					{
4860 						if (TrafficLogFile != NULL)
4861 							(void) sm_io_putc(TrafficLogFile,
4862 									  SM_TIME_DEFAULT,
4863 									  (unsigned char) c);
4864 						if (sm_io_putc(mci->mci_out,
4865 							       SM_TIME_DEFAULT,
4866 							       (unsigned char) c)
4867 							       == SM_IO_EOF)
4868 						{
4869 							dead = true;
4870 							continue;
4871 						}
4872 						else
4873 						{
4874 							/* record progress for DATA timeout */
4875 							DataProgress = true;
4876 						}
4877 						pos++;
4878 						continue;
4879 					}
4880 
4881 					if (sm_io_putc(mci->mci_out,
4882 						       SM_TIME_DEFAULT, '!')
4883 					    == SM_IO_EOF ||
4884 					    sm_io_fputs(mci->mci_out,
4885 							SM_TIME_DEFAULT,
4886 							mci->mci_mailer->m_eol)
4887 					    == SM_IO_EOF)
4888 					{
4889 						dead = true;
4890 						continue;
4891 					}
4892 					else
4893 					{
4894 						/* record progress for DATA timeout */
4895 						DataProgress = true;
4896 					}
4897 
4898 					if (TrafficLogFile != NULL)
4899 					{
4900 						(void) sm_io_fprintf(TrafficLogFile,
4901 								     SM_TIME_DEFAULT,
4902 								     "!%s",
4903 								     mci->mci_mailer->m_eol);
4904 					}
4905 					ostate = OSTATE_HEAD;
4906 					SM_ASSERT(pbp < peekbuf +
4907 							sizeof(peekbuf));
4908 					*pbp++ = c;
4909 					continue;
4910 				}
4911 				if (c == '\n')
4912 				{
4913 					if (TrafficLogFile != NULL)
4914 						(void) sm_io_fputs(TrafficLogFile,
4915 								   SM_TIME_DEFAULT,
4916 								   mci->mci_mailer->m_eol);
4917 					if (sm_io_fputs(mci->mci_out,
4918 							SM_TIME_DEFAULT,
4919 							mci->mci_mailer->m_eol)
4920 							== SM_IO_EOF)
4921 						continue;
4922 					else
4923 					{
4924 						/* record progress for DATA timeout */
4925 						DataProgress = true;
4926 					}
4927 					pos = 0;
4928 					ostate = OSTATE_HEAD;
4929 				}
4930 				else
4931 				{
4932 					if (TrafficLogFile != NULL)
4933 						(void) sm_io_putc(TrafficLogFile,
4934 								  SM_TIME_DEFAULT,
4935 								  (unsigned char) c);
4936 					if (sm_io_putc(mci->mci_out,
4937 						       SM_TIME_DEFAULT,
4938 						       (unsigned char) c)
4939 					    == SM_IO_EOF)
4940 					{
4941 						dead = true;
4942 						continue;
4943 					}
4944 					else
4945 					{
4946 						/* record progress for DATA timeout */
4947 						DataProgress = true;
4948 					}
4949 					pos++;
4950 					ostate = OSTATE_INLINE;
4951 				}
4952 				break;
4953 			}
4954 		}
4955 
4956 		/* make sure we are at the beginning of a line */
4957 		if (bp > buf)
4958 		{
4959 			if (TrafficLogFile != NULL)
4960 			{
4961 				for (xp = buf; xp < bp; xp++)
4962 					(void) sm_io_putc(TrafficLogFile,
4963 							  SM_TIME_DEFAULT,
4964 							  (unsigned char) *xp);
4965 			}
4966 			for (xp = buf; xp < bp; xp++)
4967 			{
4968 				if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4969 					       (unsigned char) *xp)
4970 				    == SM_IO_EOF)
4971 				{
4972 					dead = true;
4973 					break;
4974 				}
4975 				else
4976 				{
4977 					/* record progress for DATA timeout */
4978 					DataProgress = true;
4979 				}
4980 			}
4981 			pos += bp - buf;
4982 		}
4983 		if (!dead && pos > 0)
4984 		{
4985 			if (TrafficLogFile != NULL)
4986 				(void) sm_io_fputs(TrafficLogFile,
4987 						   SM_TIME_DEFAULT,
4988 						   mci->mci_mailer->m_eol);
4989 			(void) sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
4990 					   mci->mci_mailer->m_eol);
4991 
4992 			/* record progress for DATA timeout */
4993 			DataProgress = true;
4994 		}
4995 	}
4996 
4997 	if (sm_io_error(e->e_dfp))
4998 	{
4999 		syserr("putbody: %s/%cf%s: read error",
5000 		       qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
5001 		       DATAFL_LETTER, e->e_id);
5002 		ExitStat = EX_IOERR;
5003 	}
5004 
5005 endofmessage:
5006 	/*
5007 	**  Since mailfile() uses e_dfp in a child process,
5008 	**  the file offset in the stdio library for the
5009 	**  parent process will not agree with the in-kernel
5010 	**  file offset since the file descriptor is shared
5011 	**  between the processes.  Therefore, it is vital
5012 	**  that the file always be rewound.  This forces the
5013 	**  kernel offset (lseek) and stdio library (ftell)
5014 	**  offset to match.
5015 	*/
5016 
5017 	if (e->e_dfp != NULL)
5018 		(void) bfrewind(e->e_dfp);
5019 
5020 	/* some mailers want extra blank line at end of message */
5021 	if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5022 	    buf[0] != '\0' && buf[0] != '\n')
5023 		putline("", mci);
5024 
5025 	(void) sm_io_flush(mci->mci_out, SM_TIME_DEFAULT);
5026 	if (sm_io_error(mci->mci_out) && errno != EPIPE)
5027 	{
5028 		syserr("putbody: write error");
5029 		ExitStat = EX_IOERR;
5030 	}
5031 
5032 	errno = 0;
5033 }
5034 /*
5035 **  MAILFILE -- Send a message to a file.
5036 **
5037 **	If the file has the set-user-ID/set-group-ID bits set, but NO
5038 **	execute bits, sendmail will try to become the owner of that file
5039 **	rather than the real user.  Obviously, this only works if
5040 **	sendmail runs as root.
5041 **
5042 **	This could be done as a subordinate mailer, except that it
5043 **	is used implicitly to save messages in ~/dead.letter.  We
5044 **	view this as being sufficiently important as to include it
5045 **	here.  For example, if the system is dying, we shouldn't have
5046 **	to create another process plus some pipes to save the message.
5047 **
5048 **	Parameters:
5049 **		filename -- the name of the file to send to.
5050 **		mailer -- mailer definition for recipient -- if NULL,
5051 **			use FileMailer.
5052 **		ctladdr -- the controlling address header -- includes
5053 **			the userid/groupid to be when sending.
5054 **		sfflags -- flags for opening.
5055 **		e -- the current envelope.
5056 **
5057 **	Returns:
5058 **		The exit code associated with the operation.
5059 **
5060 **	Side Effects:
5061 **		none.
5062 */
5063 
5064 # define RETURN(st)			exit(st);
5065 
5066 static jmp_buf	CtxMailfileTimeout;
5067 
5068 int
5069 mailfile(filename, mailer, ctladdr, sfflags, e)
5070 	char *volatile filename;
5071 	MAILER *volatile mailer;
5072 	ADDRESS *ctladdr;
5073 	volatile long sfflags;
5074 	register ENVELOPE *e;
5075 {
5076 	register SM_FILE_T *f;
5077 	register pid_t pid = -1;
5078 	volatile int mode;
5079 	int len;
5080 	off_t curoff;
5081 	bool suidwarn = geteuid() == 0;
5082 	char *p;
5083 	char *volatile realfile;
5084 	SM_EVENT *ev;
5085 	char buf[MAXPATHLEN];
5086 	char targetfile[MAXPATHLEN];
5087 
5088 	if (tTd(11, 1))
5089 	{
5090 		sm_dprintf("mailfile %s\n  ctladdr=", filename);
5091 		printaddr(sm_debug_file(), ctladdr, false);
5092 	}
5093 
5094 	if (mailer == NULL)
5095 		mailer = FileMailer;
5096 
5097 	if (e->e_xfp != NULL)
5098 		(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5099 
5100 	/*
5101 	**  Special case /dev/null.  This allows us to restrict file
5102 	**  delivery to regular files only.
5103 	*/
5104 
5105 	if (sm_path_isdevnull(filename))
5106 		return EX_OK;
5107 
5108 	/* check for 8-bit available */
5109 	if (bitset(EF_HAS8BIT, e->e_flags) &&
5110 	    bitnset(M_7BITS, mailer->m_flags) &&
5111 	    (bitset(EF_DONT_MIME, e->e_flags) ||
5112 	     !(bitset(MM_MIME8BIT, MimeMode) ||
5113 	       (bitset(EF_IS_MIME, e->e_flags) &&
5114 		bitset(MM_CVTMIME, MimeMode)))))
5115 	{
5116 		e->e_status = "5.6.3";
5117 		usrerrenh(e->e_status,
5118 			  "554 Cannot send 8-bit data to 7-bit destination");
5119 		errno = 0;
5120 		return EX_DATAERR;
5121 	}
5122 
5123 	/* Find the actual file */
5124 	if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5125 	{
5126 		len = strlen(SafeFileEnv);
5127 
5128 		if (strncmp(SafeFileEnv, filename, len) == 0)
5129 			filename += len;
5130 
5131 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5132 		{
5133 			syserr("mailfile: filename too long (%s/%s)",
5134 			       SafeFileEnv, filename);
5135 			return EX_CANTCREAT;
5136 		}
5137 		(void) sm_strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
5138 		realfile = targetfile + len;
5139 		if (*filename == '/')
5140 			filename++;
5141 		if (*filename != '\0')
5142 		{
5143 			/* paranoia: trailing / should be removed in readcf */
5144 			if (targetfile[len - 1] != '/')
5145 				(void) sm_strlcat(targetfile,
5146 						  "/", sizeof targetfile);
5147 			(void) sm_strlcat(targetfile, filename,
5148 					  sizeof targetfile);
5149 		}
5150 	}
5151 	else if (mailer->m_rootdir != NULL)
5152 	{
5153 		expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
5154 		len = strlen(targetfile);
5155 
5156 		if (strncmp(targetfile, filename, len) == 0)
5157 			filename += len;
5158 
5159 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5160 		{
5161 			syserr("mailfile: filename too long (%s/%s)",
5162 			       targetfile, filename);
5163 			return EX_CANTCREAT;
5164 		}
5165 		realfile = targetfile + len;
5166 		if (targetfile[len - 1] != '/')
5167 			(void) sm_strlcat(targetfile, "/", sizeof targetfile);
5168 		if (*filename == '/')
5169 			(void) sm_strlcat(targetfile, filename + 1,
5170 					  sizeof targetfile);
5171 		else
5172 			(void) sm_strlcat(targetfile, filename,
5173 					  sizeof targetfile);
5174 	}
5175 	else
5176 	{
5177 		if (sm_strlcpy(targetfile, filename, sizeof targetfile) >=
5178 		    sizeof targetfile)
5179 		{
5180 			syserr("mailfile: filename too long (%s)", filename);
5181 			return EX_CANTCREAT;
5182 		}
5183 		realfile = targetfile;
5184 	}
5185 
5186 	/*
5187 	**  Fork so we can change permissions here.
5188 	**	Note that we MUST use fork, not vfork, because of
5189 	**	the complications of calling subroutines, etc.
5190 	*/
5191 
5192 
5193 	/*
5194 	**  Dispose of SIGCHLD signal catchers that may be laying
5195 	**  around so that the waitfor() below will get it.
5196 	*/
5197 
5198 	(void) sm_signal(SIGCHLD, SIG_DFL);
5199 
5200 	DOFORK(fork);
5201 
5202 	if (pid < 0)
5203 		return EX_OSERR;
5204 	else if (pid == 0)
5205 	{
5206 		/* child -- actually write to file */
5207 		struct stat stb;
5208 		MCI mcibuf;
5209 		int err;
5210 		volatile int oflags = O_WRONLY|O_APPEND;
5211 
5212 		/* Reset global flags */
5213 		RestartRequest = NULL;
5214 		RestartWorkGroup = false;
5215 		ShutdownRequest = NULL;
5216 		PendingSignal = 0;
5217 		CurrentPid = getpid();
5218 
5219 		if (e->e_lockfp != NULL)
5220 			(void) close(sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
5221 				     NULL));
5222 
5223 		(void) sm_signal(SIGINT, SIG_DFL);
5224 		(void) sm_signal(SIGHUP, SIG_DFL);
5225 		(void) sm_signal(SIGTERM, SIG_DFL);
5226 		(void) umask(OldUmask);
5227 		e->e_to = filename;
5228 		ExitStat = EX_OK;
5229 
5230 		if (setjmp(CtxMailfileTimeout) != 0)
5231 		{
5232 			RETURN(EX_TEMPFAIL);
5233 		}
5234 
5235 		if (TimeOuts.to_fileopen > 0)
5236 			ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5237 					 0);
5238 		else
5239 			ev = NULL;
5240 
5241 		/* check file mode to see if set-user-ID */
5242 		if (stat(targetfile, &stb) < 0)
5243 			mode = FileMode;
5244 		else
5245 			mode = stb.st_mode;
5246 
5247 		/* limit the errors to those actually caused in the child */
5248 		errno = 0;
5249 		ExitStat = EX_OK;
5250 
5251 		/* Allow alias expansions to use the S_IS{U,G}ID bits */
5252 		if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5253 		    bitset(SFF_RUNASREALUID, sfflags))
5254 		{
5255 			/* ignore set-user-ID and set-group-ID bits */
5256 			mode &= ~(S_ISGID|S_ISUID);
5257 			if (tTd(11, 20))
5258 				sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5259 		}
5260 
5261 		/* we have to open the data file BEFORE setuid() */
5262 		if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5263 		{
5264 			char *df = queuename(e, DATAFL_LETTER);
5265 
5266 			e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5267 					      SM_IO_RDONLY_B, NULL);
5268 			if (e->e_dfp == NULL)
5269 			{
5270 				syserr("mailfile: Cannot open %s for %s from %s",
5271 					df, e->e_to, e->e_from.q_paddr);
5272 			}
5273 		}
5274 
5275 		/* select a new user to run as */
5276 		if (!bitset(SFF_RUNASREALUID, sfflags))
5277 		{
5278 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5279 			{
5280 				RealUserName = NULL;
5281 				if (mailer->m_uid == NO_UID)
5282 					RealUid = RunAsUid;
5283 				else
5284 					RealUid = mailer->m_uid;
5285 				if (RunAsUid != 0 && RealUid != RunAsUid)
5286 				{
5287 					/* Only root can change the uid */
5288 					syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5289 						(int) RunAsUid, (int) RealUid);
5290 					RETURN(EX_TEMPFAIL);
5291 				}
5292 			}
5293 			else if (bitset(S_ISUID, mode))
5294 			{
5295 				RealUserName = NULL;
5296 				RealUid = stb.st_uid;
5297 			}
5298 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5299 			{
5300 				if (ctladdr->q_ruser != NULL)
5301 					RealUserName = ctladdr->q_ruser;
5302 				else
5303 					RealUserName = ctladdr->q_user;
5304 				RealUid = ctladdr->q_uid;
5305 			}
5306 			else if (mailer != NULL && mailer->m_uid != NO_UID)
5307 			{
5308 				RealUserName = DefUser;
5309 				RealUid = mailer->m_uid;
5310 			}
5311 			else
5312 			{
5313 				RealUserName = DefUser;
5314 				RealUid = DefUid;
5315 			}
5316 
5317 			/* select a new group to run as */
5318 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5319 			{
5320 				if (mailer->m_gid == NO_GID)
5321 					RealGid = RunAsGid;
5322 				else
5323 					RealGid = mailer->m_gid;
5324 				if (RunAsUid != 0 &&
5325 				    (RealGid != getgid() ||
5326 				     RealGid != getegid()))
5327 				{
5328 					/* Only root can change the gid */
5329 					syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5330 					       (int) RealGid, (int) RunAsUid,
5331 					       (int) getgid(), (int) getegid());
5332 					RETURN(EX_TEMPFAIL);
5333 				}
5334 			}
5335 			else if (bitset(S_ISGID, mode))
5336 				RealGid = stb.st_gid;
5337 			else if (ctladdr != NULL &&
5338 				 ctladdr->q_uid == DefUid &&
5339 				 ctladdr->q_gid == 0)
5340 			{
5341 				/*
5342 				**  Special case:  This means it is an
5343 				**  alias and we should act as DefaultUser.
5344 				**  See alias()'s comments.
5345 				*/
5346 
5347 				RealGid = DefGid;
5348 				RealUserName = DefUser;
5349 			}
5350 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5351 				RealGid = ctladdr->q_gid;
5352 			else if (mailer != NULL && mailer->m_gid != NO_GID)
5353 				RealGid = mailer->m_gid;
5354 			else
5355 				RealGid = DefGid;
5356 		}
5357 
5358 		/* last ditch */
5359 		if (!bitset(SFF_ROOTOK, sfflags))
5360 		{
5361 			if (RealUid == 0)
5362 				RealUid = DefUid;
5363 			if (RealGid == 0)
5364 				RealGid = DefGid;
5365 		}
5366 
5367 		/* set group id list (needs /etc/group access) */
5368 		if (RealUserName != NULL && !DontInitGroups)
5369 		{
5370 			if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5371 			{
5372 				syserr("mailfile: initgroups(%s, %d) failed",
5373 					RealUserName, RealGid);
5374 				RETURN(EX_TEMPFAIL);
5375 			}
5376 		}
5377 		else
5378 		{
5379 			GIDSET_T gidset[1];
5380 
5381 			gidset[0] = RealGid;
5382 			if (setgroups(1, gidset) == -1 && suidwarn)
5383 			{
5384 				syserr("mailfile: setgroups() failed");
5385 				RETURN(EX_TEMPFAIL);
5386 			}
5387 		}
5388 
5389 		/*
5390 		**  If you have a safe environment, go into it.
5391 		*/
5392 
5393 		if (realfile != targetfile)
5394 		{
5395 			char save;
5396 
5397 			save = *realfile;
5398 			*realfile = '\0';
5399 			if (tTd(11, 20))
5400 				sm_dprintf("mailfile: chroot %s\n", targetfile);
5401 			if (chroot(targetfile) < 0)
5402 			{
5403 				syserr("mailfile: Cannot chroot(%s)",
5404 				       targetfile);
5405 				RETURN(EX_CANTCREAT);
5406 			}
5407 			*realfile = save;
5408 		}
5409 
5410 		if (tTd(11, 40))
5411 			sm_dprintf("mailfile: deliver to %s\n", realfile);
5412 
5413 		if (chdir("/") < 0)
5414 		{
5415 			syserr("mailfile: cannot chdir(/)");
5416 			RETURN(EX_CANTCREAT);
5417 		}
5418 
5419 		/* now reset the group and user ids */
5420 		endpwent();
5421 		sm_mbdb_terminate();
5422 		if (setgid(RealGid) < 0 && suidwarn)
5423 		{
5424 			syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5425 			RETURN(EX_TEMPFAIL);
5426 		}
5427 		vendor_set_uid(RealUid);
5428 		if (setuid(RealUid) < 0 && suidwarn)
5429 		{
5430 			syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5431 			RETURN(EX_TEMPFAIL);
5432 		}
5433 
5434 		if (tTd(11, 2))
5435 			sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5436 				(int) getuid(), (int) geteuid(),
5437 				(int) getgid(), (int) getegid());
5438 
5439 
5440 		/* move into some "safe" directory */
5441 		if (mailer->m_execdir != NULL)
5442 		{
5443 			char *q;
5444 
5445 			for (p = mailer->m_execdir; p != NULL; p = q)
5446 			{
5447 				q = strchr(p, ':');
5448 				if (q != NULL)
5449 					*q = '\0';
5450 				expand(p, buf, sizeof buf, e);
5451 				if (q != NULL)
5452 					*q++ = ':';
5453 				if (tTd(11, 20))
5454 					sm_dprintf("mailfile: trydir %s\n",
5455 						   buf);
5456 				if (buf[0] != '\0' && chdir(buf) >= 0)
5457 					break;
5458 			}
5459 		}
5460 
5461 		/*
5462 		**  Recheck the file after we have assumed the ID of the
5463 		**  delivery user to make sure we can deliver to it as
5464 		**  that user.  This is necessary if sendmail is running
5465 		**  as root and the file is on an NFS mount which treats
5466 		**  root as nobody.
5467 		*/
5468 
5469 #if HASLSTAT
5470 		if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5471 			err = stat(realfile, &stb);
5472 		else
5473 			err = lstat(realfile, &stb);
5474 #else /* HASLSTAT */
5475 		err = stat(realfile, &stb);
5476 #endif /* HASLSTAT */
5477 
5478 		if (err < 0)
5479 		{
5480 			stb.st_mode = ST_MODE_NOFILE;
5481 			mode = FileMode;
5482 			oflags |= O_CREAT|O_EXCL;
5483 		}
5484 		else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5485 			 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5486 				   DontBlameSendmail) &&
5487 			  stb.st_nlink != 1) ||
5488 			 (realfile != targetfile && !S_ISREG(mode)))
5489 			exit(EX_CANTCREAT);
5490 		else
5491 			mode = stb.st_mode;
5492 
5493 		if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5494 			sfflags |= SFF_NOSLINK;
5495 		if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5496 			sfflags |= SFF_NOHLINK;
5497 		sfflags &= ~SFF_OPENASROOT;
5498 		f = safefopen(realfile, oflags, mode, sfflags);
5499 		if (f == NULL)
5500 		{
5501 			if (transienterror(errno))
5502 			{
5503 				usrerr("454 4.3.0 cannot open %s: %s",
5504 				       shortenstring(realfile, MAXSHORTSTR),
5505 				       sm_errstring(errno));
5506 				RETURN(EX_TEMPFAIL);
5507 			}
5508 			else
5509 			{
5510 				usrerr("554 5.3.0 cannot open %s: %s",
5511 				       shortenstring(realfile, MAXSHORTSTR),
5512 				       sm_errstring(errno));
5513 				RETURN(EX_CANTCREAT);
5514 			}
5515 		}
5516 		if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5517 		    &stb))
5518 		{
5519 			syserr("554 5.3.0 file changed after open");
5520 			RETURN(EX_CANTCREAT);
5521 		}
5522 		if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5523 		{
5524 			syserr("554 5.3.0 cannot fstat %s",
5525 				sm_errstring(errno));
5526 			RETURN(EX_CANTCREAT);
5527 		}
5528 
5529 		curoff = stb.st_size;
5530 
5531 		if (ev != NULL)
5532 			sm_clrevent(ev);
5533 
5534 		memset(&mcibuf, '\0', sizeof mcibuf);
5535 		mcibuf.mci_mailer = mailer;
5536 		mcibuf.mci_out = f;
5537 		if (bitnset(M_7BITS, mailer->m_flags))
5538 			mcibuf.mci_flags |= MCIF_7BIT;
5539 
5540 		/* clear out per-message flags from connection structure */
5541 		mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5542 
5543 		if (bitset(EF_HAS8BIT, e->e_flags) &&
5544 		    !bitset(EF_DONT_MIME, e->e_flags) &&
5545 		    bitnset(M_7BITS, mailer->m_flags))
5546 			mcibuf.mci_flags |= MCIF_CVT8TO7;
5547 
5548 #if MIME7TO8
5549 		if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5550 		    !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5551 		    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5552 		    (sm_strcasecmp(p, "quoted-printable") == 0 ||
5553 		     sm_strcasecmp(p, "base64") == 0) &&
5554 		    (p = hvalue("Content-Type", e->e_header)) != NULL)
5555 		{
5556 			/* may want to convert 7 -> 8 */
5557 			/* XXX should really parse it here -- and use a class XXX */
5558 			if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5559 			    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5560 				mcibuf.mci_flags |= MCIF_CVT7TO8;
5561 		}
5562 #endif /* MIME7TO8 */
5563 
5564 		putfromline(&mcibuf, e);
5565 		(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER);
5566 		(*e->e_putbody)(&mcibuf, e, NULL);
5567 		putline("\n", &mcibuf);
5568 		if (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5569 		    (SuperSafe != SAFE_NO &&
5570 		     fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5571 		    sm_io_error(f))
5572 		{
5573 			setstat(EX_IOERR);
5574 #if !NOFTRUNCATE
5575 			(void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5576 					 curoff);
5577 #endif /* !NOFTRUNCATE */
5578 		}
5579 
5580 		/* reset ISUID & ISGID bits for paranoid systems */
5581 #if HASFCHMOD
5582 		(void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5583 			      (MODE_T) mode);
5584 #else /* HASFCHMOD */
5585 		(void) chmod(filename, (MODE_T) mode);
5586 #endif /* HASFCHMOD */
5587 		if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5588 			setstat(EX_IOERR);
5589 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5590 		(void) setuid(RealUid);
5591 		exit(ExitStat);
5592 		/* NOTREACHED */
5593 	}
5594 	else
5595 	{
5596 		/* parent -- wait for exit status */
5597 		int st;
5598 
5599 		st = waitfor(pid);
5600 		if (st == -1)
5601 		{
5602 			syserr("mailfile: %s: wait", mailer->m_name);
5603 			return EX_SOFTWARE;
5604 		}
5605 		if (WIFEXITED(st))
5606 		{
5607 			errno = 0;
5608 			return (WEXITSTATUS(st));
5609 		}
5610 		else
5611 		{
5612 			syserr("mailfile: %s: child died on signal %d",
5613 			       mailer->m_name, st);
5614 			return EX_UNAVAILABLE;
5615 		}
5616 		/* NOTREACHED */
5617 	}
5618 	return EX_UNAVAILABLE;	/* avoid compiler warning on IRIX */
5619 }
5620 
5621 static void
5622 mailfiletimeout(ignore)
5623 	int ignore;
5624 {
5625 	/*
5626 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
5627 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5628 	**	DOING.
5629 	*/
5630 
5631 	errno = ETIMEDOUT;
5632 	longjmp(CtxMailfileTimeout, 1);
5633 }
5634 /*
5635 **  HOSTSIGNATURE -- return the "signature" for a host.
5636 **
5637 **	The signature describes how we are going to send this -- it
5638 **	can be just the hostname (for non-Internet hosts) or can be
5639 **	an ordered list of MX hosts.
5640 **
5641 **	Parameters:
5642 **		m -- the mailer describing this host.
5643 **		host -- the host name.
5644 **
5645 **	Returns:
5646 **		The signature for this host.
5647 **
5648 **	Side Effects:
5649 **		Can tweak the symbol table.
5650 */
5651 
5652 #define MAXHOSTSIGNATURE	8192	/* max len of hostsignature */
5653 
5654 char *
5655 hostsignature(m, host)
5656 	register MAILER *m;
5657 	char *host;
5658 {
5659 	register char *p;
5660 	register STAB *s;
5661 	time_t now;
5662 #if NAMED_BIND
5663 	char sep = ':';
5664 	char prevsep = ':';
5665 	int i;
5666 	int len;
5667 	int nmx;
5668 	int hl;
5669 	char *hp;
5670 	char *endp;
5671 	int oldoptions = _res.options;
5672 	char *mxhosts[MAXMXHOSTS + 1];
5673 	unsigned short mxprefs[MAXMXHOSTS + 1];
5674 #endif /* NAMED_BIND */
5675 
5676 	if (tTd(17, 3))
5677 		sm_dprintf("hostsignature(%s)\n", host);
5678 
5679 	/*
5680 	**  If local delivery (and not remote), just return a constant.
5681 	*/
5682 
5683 	if (bitnset(M_LOCALMAILER, m->m_flags) &&
5684 	    strcmp(m->m_mailer, "[IPC]") != 0 &&
5685 	    !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5686 		return "localhost";
5687 
5688 	/* an empty host does not have MX records */
5689 	if (*host == '\0')
5690 		return "_empty_";
5691 
5692 	/*
5693 	**  Check to see if this uses IPC -- if not, it can't have MX records.
5694 	*/
5695 
5696 	if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5697 	    CurEnv->e_sendmode == SM_DEFER)
5698 	{
5699 		/* just an ordinary mailer or deferred mode */
5700 		return host;
5701 	}
5702 #if NETUNIX
5703 	else if (m->m_argv[0] != NULL &&
5704 		 strcmp(m->m_argv[0], "FILE") == 0)
5705 	{
5706 		/* rendezvous in the file system, no MX records */
5707 		return host;
5708 	}
5709 #endif /* NETUNIX */
5710 
5711 	/*
5712 	**  Look it up in the symbol table.
5713 	*/
5714 
5715 	now = curtime();
5716 	s = stab(host, ST_HOSTSIG, ST_ENTER);
5717 	if (s->s_hostsig.hs_sig != NULL)
5718 	{
5719 		if (s->s_hostsig.hs_exp >= now)
5720 		{
5721 			if (tTd(17, 3))
5722 				sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5723 					   s->s_hostsig.hs_sig);
5724 			return s->s_hostsig.hs_sig;
5725 		}
5726 
5727 		/* signature is expired: clear it */
5728 		sm_free(s->s_hostsig.hs_sig);
5729 		s->s_hostsig.hs_sig = NULL;
5730 	}
5731 
5732 	/* set default TTL */
5733 	s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5734 
5735 	/*
5736 	**  Not already there or expired -- create a signature.
5737 	*/
5738 
5739 #if NAMED_BIND
5740 	if (ConfigLevel < 2)
5741 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
5742 
5743 	for (hp = host; hp != NULL; hp = endp)
5744 	{
5745 #if NETINET6
5746 		if (*hp == '[')
5747 		{
5748 			endp = strchr(hp + 1, ']');
5749 			if (endp != NULL)
5750 				endp = strpbrk(endp + 1, ":,");
5751 		}
5752 		else
5753 			endp = strpbrk(hp, ":,");
5754 #else /* NETINET6 */
5755 		endp = strpbrk(hp, ":,");
5756 #endif /* NETINET6 */
5757 		if (endp != NULL)
5758 		{
5759 			sep = *endp;
5760 			*endp = '\0';
5761 		}
5762 
5763 		if (bitnset(M_NOMX, m->m_flags))
5764 		{
5765 			/* skip MX lookups */
5766 			nmx = 1;
5767 			mxhosts[0] = hp;
5768 		}
5769 		else
5770 		{
5771 			auto int rcode;
5772 			int ttl;
5773 
5774 			nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5775 				      &ttl);
5776 			if (nmx <= 0)
5777 			{
5778 				int save_errno;
5779 				register MCI *mci;
5780 
5781 				/* update the connection info for this host */
5782 				save_errno = errno;
5783 				mci = mci_get(hp, m);
5784 				mci->mci_errno = save_errno;
5785 				mci->mci_herrno = h_errno;
5786 				mci->mci_lastuse = now;
5787 				if (rcode == EX_NOHOST)
5788 					mci_setstat(mci, rcode, "5.1.2",
5789 						    "550 Host unknown");
5790 				else
5791 					mci_setstat(mci, rcode, NULL, NULL);
5792 
5793 				/* use the original host name as signature */
5794 				nmx = 1;
5795 				mxhosts[0] = hp;
5796 			}
5797 			if (tTd(17, 3))
5798 				sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5799 					   nmx, mxhosts[0]);
5800 
5801 			/*
5802 			**  Set new TTL: we use only one!
5803 			**	We could try to use the minimum instead.
5804 			*/
5805 
5806 			s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5807 		}
5808 
5809 		len = 0;
5810 		for (i = 0; i < nmx; i++)
5811 			len += strlen(mxhosts[i]) + 1;
5812 		if (s->s_hostsig.hs_sig != NULL)
5813 			len += strlen(s->s_hostsig.hs_sig) + 1;
5814 		if (len < 0 || len >= MAXHOSTSIGNATURE)
5815 		{
5816 			sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5817 				  host, MAXHOSTSIGNATURE, len);
5818 			len = MAXHOSTSIGNATURE;
5819 		}
5820 		p = sm_pmalloc_x(len);
5821 		if (s->s_hostsig.hs_sig != NULL)
5822 		{
5823 			(void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5824 			sm_free(s->s_hostsig.hs_sig); /* XXX */
5825 			s->s_hostsig.hs_sig = p;
5826 			hl = strlen(p);
5827 			p += hl;
5828 			*p++ = prevsep;
5829 			len -= hl + 1;
5830 		}
5831 		else
5832 			s->s_hostsig.hs_sig = p;
5833 		for (i = 0; i < nmx; i++)
5834 		{
5835 			hl = strlen(mxhosts[i]);
5836 			if (len - 1 < hl || len <= 1)
5837 			{
5838 				/* force to drop out of outer loop */
5839 				len = -1;
5840 				break;
5841 			}
5842 			if (i != 0)
5843 			{
5844 				if (mxprefs[i] == mxprefs[i - 1])
5845 					*p++ = ',';
5846 				else
5847 					*p++ = ':';
5848 				len--;
5849 			}
5850 			(void) sm_strlcpy(p, mxhosts[i], len);
5851 			p += hl;
5852 			len -= hl;
5853 		}
5854 
5855 		/*
5856 		**  break out of loop if len exceeded MAXHOSTSIGNATURE
5857 		**  because we won't have more space for further hosts
5858 		**  anyway (separated by : in the .cf file).
5859 		*/
5860 
5861 		if (len < 0)
5862 			break;
5863 		if (endp != NULL)
5864 			*endp++ = sep;
5865 		prevsep = sep;
5866 	}
5867 	makelower(s->s_hostsig.hs_sig);
5868 	if (ConfigLevel < 2)
5869 		_res.options = oldoptions;
5870 #else /* NAMED_BIND */
5871 	/* not using BIND -- the signature is just the host name */
5872 	/*
5873 	**  'host' points to storage that will be freed after we are
5874 	**  done processing the current envelope, so we copy it.
5875 	*/
5876 	s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5877 #endif /* NAMED_BIND */
5878 	if (tTd(17, 1))
5879 		sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5880 	return s->s_hostsig.hs_sig;
5881 }
5882 /*
5883 **  PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5884 **
5885 **	The signature describes how we are going to send this -- it
5886 **	can be just the hostname (for non-Internet hosts) or can be
5887 **	an ordered list of MX hosts which must be randomized for equal
5888 **	MX preference values.
5889 **
5890 **	Parameters:
5891 **		sig -- the host signature.
5892 **		mxhosts -- array to populate.
5893 **		mailer -- mailer.
5894 **
5895 **	Returns:
5896 **		The number of hosts inserted into mxhosts array.
5897 **
5898 **	Side Effects:
5899 **		Randomizes equal MX preference hosts in mxhosts.
5900 */
5901 
5902 static int
5903 parse_hostsignature(sig, mxhosts, mailer)
5904 	char *sig;
5905 	char **mxhosts;
5906 	MAILER *mailer;
5907 {
5908 	unsigned short curpref = 0;
5909 	int nmx = 0, i, j;	/* NOTE: i, j, and nmx must have same type */
5910 	char *hp, *endp;
5911 	unsigned short prefer[MAXMXHOSTS];
5912 	long rndm[MAXMXHOSTS];
5913 
5914 	for (hp = sig; hp != NULL; hp = endp)
5915 	{
5916 		char sep = ':';
5917 
5918 #if NETINET6
5919 		if (*hp == '[')
5920 		{
5921 			endp = strchr(hp + 1, ']');
5922 			if (endp != NULL)
5923 				endp = strpbrk(endp + 1, ":,");
5924 		}
5925 		else
5926 			endp = strpbrk(hp, ":,");
5927 #else /* NETINET6 */
5928 		endp = strpbrk(hp, ":,");
5929 #endif /* NETINET6 */
5930 		if (endp != NULL)
5931 		{
5932 			sep = *endp;
5933 			*endp = '\0';
5934 		}
5935 
5936 		mxhosts[nmx] = hp;
5937 		prefer[nmx] = curpref;
5938 		if (mci_match(hp, mailer))
5939 			rndm[nmx] = 0;
5940 		else
5941 			rndm[nmx] = get_random();
5942 
5943 		if (endp != NULL)
5944 		{
5945 			/*
5946 			**  Since we don't have the original MX prefs,
5947 			**  make our own.  If the separator is a ':', that
5948 			**  means the preference for the next host will be
5949 			**  higher than this one, so simply increment curpref.
5950 			*/
5951 
5952 			if (sep == ':')
5953 				curpref++;
5954 
5955 			*endp++ = sep;
5956 		}
5957 		if (++nmx >= MAXMXHOSTS)
5958 			break;
5959 	}
5960 
5961 	/* sort the records using the random factor for equal preferences */
5962 	for (i = 0; i < nmx; i++)
5963 	{
5964 		for (j = i + 1; j < nmx; j++)
5965 		{
5966 			/*
5967 			**  List is already sorted by MX preference, only
5968 			**  need to look for equal preference MX records
5969 			*/
5970 
5971 			if (prefer[i] < prefer[j])
5972 				break;
5973 
5974 			if (prefer[i] > prefer[j] ||
5975 			    (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5976 			{
5977 				register unsigned short tempp;
5978 				register long tempr;
5979 				register char *temp1;
5980 
5981 				tempp = prefer[i];
5982 				prefer[i] = prefer[j];
5983 				prefer[j] = tempp;
5984 				temp1 = mxhosts[i];
5985 				mxhosts[i] = mxhosts[j];
5986 				mxhosts[j] = temp1;
5987 				tempr = rndm[i];
5988 				rndm[i] = rndm[j];
5989 				rndm[j] = tempr;
5990 			}
5991 		}
5992 	}
5993 	return nmx;
5994 }
5995 
5996 # if STARTTLS
5997 static SSL_CTX	*clt_ctx = NULL;
5998 static bool	tls_ok_clt = true;
5999 
6000 /*
6001 **  SETCLTTLS -- client side TLS: allow/disallow.
6002 **
6003 **	Parameters:
6004 **		tls_ok -- should tls be done?
6005 **
6006 **	Returns:
6007 **		none.
6008 **
6009 **	Side Effects:
6010 **		sets tls_ok_clt (static variable in this module)
6011 */
6012 
6013 void
6014 setclttls(tls_ok)
6015 	bool tls_ok;
6016 {
6017 	tls_ok_clt = tls_ok;
6018 	return;
6019 }
6020 /*
6021 **  INITCLTTLS -- initialize client side TLS
6022 **
6023 **	Parameters:
6024 **		tls_ok -- should tls initialization be done?
6025 **
6026 **	Returns:
6027 **		succeeded?
6028 **
6029 **	Side Effects:
6030 **		sets tls_ok_clt (static variable in this module)
6031 */
6032 
6033 bool
6034 initclttls(tls_ok)
6035 	bool tls_ok;
6036 {
6037 	if (!tls_ok_clt)
6038 		return false;
6039 	tls_ok_clt = tls_ok;
6040 	if (!tls_ok_clt)
6041 		return false;
6042 	if (clt_ctx != NULL)
6043 		return true;	/* already done */
6044 	tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, false, CltCertFile,
6045 			     CltKeyFile, CACertPath, CACertFile, DHParams);
6046 	return tls_ok_clt;
6047 }
6048 
6049 /*
6050 **  STARTTLS -- try to start secure connection (client side)
6051 **
6052 **	Parameters:
6053 **		m -- the mailer.
6054 **		mci -- the mailer connection info.
6055 **		e -- the envelope.
6056 **
6057 **	Returns:
6058 **		success?
6059 **		(maybe this should be some other code than EX_
6060 **		that denotes which stage failed.)
6061 */
6062 
6063 static int
6064 starttls(m, mci, e)
6065 	MAILER *m;
6066 	MCI *mci;
6067 	ENVELOPE *e;
6068 {
6069 	int smtpresult;
6070 	int result = 0;
6071 	int rfd, wfd;
6072 	SSL *clt_ssl = NULL;
6073 	time_t tlsstart;
6074 
6075 	if (clt_ctx == NULL && !initclttls(true))
6076 		return EX_TEMPFAIL;
6077 	smtpmessage("STARTTLS", m, mci);
6078 
6079 	/* get the reply */
6080 	smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6081 			XS_STARTTLS);
6082 
6083 	/* check return code from server */
6084 	if (smtpresult == 454 || smtpresult == 421)
6085 		return EX_TEMPFAIL;
6086 	if (smtpresult == 501)
6087 		return EX_USAGE;
6088 	if (smtpresult == -1)
6089 		return smtpresult;
6090 	if (smtpresult != 220)
6091 		return EX_PROTOCOL;
6092 
6093 	if (LogLevel > 13)
6094 		sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6095 
6096 	/* start connection */
6097 	if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6098 	{
6099 		if (LogLevel > 5)
6100 		{
6101 			sm_syslog(LOG_ERR, NOQID,
6102 				  "STARTTLS=client, error: SSL_new failed");
6103 			if (LogLevel > 9)
6104 				tlslogerr("client");
6105 		}
6106 		return EX_SOFTWARE;
6107 	}
6108 
6109 	rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6110 	wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6111 
6112 	/* SSL_clear(clt_ssl); ? */
6113 	if (rfd < 0 || wfd < 0 ||
6114 	    (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6115 	    (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6116 	{
6117 		if (LogLevel > 5)
6118 		{
6119 			sm_syslog(LOG_ERR, NOQID,
6120 				  "STARTTLS=client, error: SSL_set_xfd failed=%d",
6121 				  result);
6122 			if (LogLevel > 9)
6123 				tlslogerr("client");
6124 		}
6125 		return EX_SOFTWARE;
6126 	}
6127 	SSL_set_connect_state(clt_ssl);
6128 	tlsstart = curtime();
6129 
6130 ssl_retry:
6131 	if ((result = SSL_connect(clt_ssl)) <= 0)
6132 	{
6133 		int i;
6134 		bool timedout;
6135 		time_t left;
6136 		time_t now = curtime();
6137 		struct timeval tv;
6138 
6139 		/* what to do in this case? */
6140 		i = SSL_get_error(clt_ssl, result);
6141 
6142 		/*
6143 		**  For SSL_ERROR_WANT_{READ,WRITE}:
6144 		**  There is not a complete SSL record available yet
6145 		**  or there is only a partial SSL record removed from
6146 		**  the network (socket) buffer into the SSL buffer.
6147 		**  The SSL_connect will only succeed when a full
6148 		**  SSL record is available (assuming a "real" error
6149 		**  doesn't happen). To handle when a "real" error
6150 		**  does happen the select is set for exceptions too.
6151 		**  The connection may be re-negotiated during this time
6152 		**  so both read and write "want errors" need to be handled.
6153 		**  A select() exception loops back so that a proper SSL
6154 		**  error message can be gotten.
6155 		*/
6156 
6157 		left = TimeOuts.to_starttls - (now - tlsstart);
6158 		timedout = left <= 0;
6159 		if (!timedout)
6160 		{
6161 			tv.tv_sec = left;
6162 			tv.tv_usec = 0;
6163 		}
6164 
6165 		if (!timedout && FD_SETSIZE > 0 &&
6166 		    (rfd >= FD_SETSIZE ||
6167 		     (i == SSL_ERROR_WANT_WRITE && wfd >= FD_SETSIZE)))
6168 		{
6169 			if (LogLevel > 5)
6170 			{
6171 				sm_syslog(LOG_ERR, e->e_id,
6172 					  "STARTTLS=client, error: fd %d/%d too large",
6173 					  rfd, wfd);
6174 			if (LogLevel > 8)
6175 				tlslogerr("client");
6176 			}
6177 			errno = EINVAL;
6178 			goto tlsfail;
6179 		}
6180 		if (!timedout && i == SSL_ERROR_WANT_READ)
6181 		{
6182 			fd_set ssl_maskr, ssl_maskx;
6183 
6184 			FD_ZERO(&ssl_maskr);
6185 			FD_SET(rfd, &ssl_maskr);
6186 			FD_ZERO(&ssl_maskx);
6187 			FD_SET(rfd, &ssl_maskx);
6188 			if (select(rfd + 1, &ssl_maskr, NULL, &ssl_maskx, &tv)
6189 			    > 0)
6190 				goto ssl_retry;
6191 		}
6192 		if (!timedout && i == SSL_ERROR_WANT_WRITE)
6193 		{
6194 			fd_set ssl_maskw, ssl_maskx;
6195 
6196 			FD_ZERO(&ssl_maskw);
6197 			FD_SET(wfd, &ssl_maskw);
6198 			FD_ZERO(&ssl_maskx);
6199 			FD_SET(rfd, &ssl_maskx);
6200 			if (select(wfd + 1, NULL, &ssl_maskw, &ssl_maskx, &tv)
6201 			    > 0)
6202 				goto ssl_retry;
6203 		}
6204 		if (LogLevel > 5)
6205 		{
6206 			sm_syslog(LOG_ERR, e->e_id,
6207 				  "STARTTLS=client, error: connect failed=%d, SSL_error=%d, timedout=%d, errno=%d",
6208 				  result, i, (int) timedout, errno);
6209 			if (LogLevel > 8)
6210 				tlslogerr("client");
6211 		}
6212 tlsfail:
6213 		SSL_free(clt_ssl);
6214 		clt_ssl = NULL;
6215 		return EX_SOFTWARE;
6216 	}
6217 	mci->mci_ssl = clt_ssl;
6218 	result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6219 			      &mci->mci_macro, true);
6220 
6221 	/* switch to use TLS... */
6222 	if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6223 		return EX_OK;
6224 
6225 	/* failure */
6226 	SSL_free(clt_ssl);
6227 	clt_ssl = NULL;
6228 	return EX_SOFTWARE;
6229 }
6230 /*
6231 **  ENDTLSCLT -- shutdown secure connection (client side)
6232 **
6233 **	Parameters:
6234 **		mci -- the mailer connection info.
6235 **
6236 **	Returns:
6237 **		success?
6238 */
6239 
6240 static int
6241 endtlsclt(mci)
6242 	MCI *mci;
6243 {
6244 	int r;
6245 
6246 	if (!bitset(MCIF_TLSACT, mci->mci_flags))
6247 		return EX_OK;
6248 	r = endtls(mci->mci_ssl, "client");
6249 	mci->mci_flags &= ~MCIF_TLSACT;
6250 	return r;
6251 }
6252 # endif /* STARTTLS */
6253 # if STARTTLS || SASL
6254 /*
6255 **  ISCLTFLGSET -- check whether client flag is set.
6256 **
6257 **	Parameters:
6258 **		e -- envelope.
6259 **		flag -- flag to check in {client_flags}
6260 **
6261 **	Returns:
6262 **		true iff flag is set.
6263 */
6264 
6265 static bool
6266 iscltflgset(e, flag)
6267 	ENVELOPE *e;
6268 	int flag;
6269 {
6270 	char *p;
6271 
6272 	p = macvalue(macid("{client_flags}"), e);
6273 	if (p == NULL)
6274 		return false;
6275 	for (; *p != '\0'; p++)
6276 	{
6277 		/* look for just this one flag */
6278 		if (*p == (char) flag)
6279 			return true;
6280 	}
6281 	return false;
6282 }
6283 # endif /* STARTTLS || SASL */
6284