]> CyberLeo.Net >> Repos - FreeBSD/releng/10.0.git/blob - contrib/sendmail/src/srvrsmtp.c
- Copy stable/10 (r259064) to releng/10.0 as part of the
[FreeBSD/releng/10.0.git] / contrib / sendmail / src / srvrsmtp.c
1 /*
2  * Copyright (c) 1998-2010, 2012, 2013 Sendmail, Inc. and its suppliers.
3  *      All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *      The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13
14 #include <sendmail.h>
15 #if MILTER
16 # include <libmilter/mfapi.h>
17 # include <libmilter/mfdef.h>
18 #endif /* MILTER */
19
20 SM_RCSID("@(#)$Id: srvrsmtp.c,v 8.1015 2013/03/12 15:24:54 ca Exp $")
21
22 #include <sm/time.h>
23 #include <sm/fdset.h>
24
25 #if SASL || STARTTLS
26 # include "sfsasl.h"
27 #endif /* SASL || STARTTLS */
28 #if SASL
29 # define ENC64LEN(l)    (((l) + 2) * 4 / 3 + 1)
30 static int saslmechs __P((sasl_conn_t *, char **));
31 #endif /* SASL */
32 #if STARTTLS
33 #  include <openssl/err.h>
34 # include <sysexits.h>
35
36 static SSL_CTX  *srv_ctx = NULL;        /* TLS server context */
37 static SSL      *srv_ssl = NULL;        /* per connection context */
38
39 static bool     tls_ok_srv = false;
40
41 # define TLS_VERIFY_CLIENT() tls_set_verify(srv_ctx, srv_ssl, \
42                                 bitset(SRV_VRFY_CLT, features))
43 #endif /* STARTTLS */
44
45 #if _FFR_DM_ONE
46 static bool     NotFirstDelivery = false;
47 #endif /* _FFR_DM_ONE */
48
49 /* server features */
50 #define SRV_NONE        0x0000  /* none... */
51 #define SRV_OFFER_TLS   0x0001  /* offer STARTTLS */
52 #define SRV_VRFY_CLT    0x0002  /* request a cert */
53 #define SRV_OFFER_AUTH  0x0004  /* offer AUTH */
54 #define SRV_OFFER_ETRN  0x0008  /* offer ETRN */
55 #define SRV_OFFER_VRFY  0x0010  /* offer VRFY (not yet used) */
56 #define SRV_OFFER_EXPN  0x0020  /* offer EXPN */
57 #define SRV_OFFER_VERB  0x0040  /* offer VERB */
58 #define SRV_OFFER_DSN   0x0080  /* offer DSN */
59 #if PIPELINING
60 # define SRV_OFFER_PIPE 0x0100  /* offer PIPELINING */
61 # if _FFR_NO_PIPE
62 #  define SRV_NO_PIPE   0x0200  /* disable PIPELINING, sleep if used */
63 # endif /* _FFR_NO_PIPE */
64 #endif /* PIPELINING */
65 #define SRV_REQ_AUTH    0x0400  /* require AUTH */
66 #define SRV_REQ_SEC     0x0800  /* require security - equiv to AuthOptions=p */
67 #define SRV_TMP_FAIL    0x1000  /* ruleset caused a temporary failure */
68
69 static unsigned int     srvfeatures __P((ENVELOPE *, char *, unsigned int));
70
71 #define STOP_ATTACK     ((time_t) -1)
72 static time_t   checksmtpattack __P((volatile unsigned int *, unsigned int,
73                                      bool, char *, ENVELOPE *));
74 static void     printvrfyaddr __P((ADDRESS *, bool, bool));
75 static char     *skipword __P((char *volatile, char *));
76 static void     setup_smtpd_io __P((void));
77
78 #if SASL
79 # if SASL >= 20000
80 static int reset_saslconn __P((sasl_conn_t **_conn, char *_hostname,
81                                 char *_remoteip, char *_localip,
82                                 char *_auth_id, sasl_ssf_t *_ext_ssf));
83
84 # define RESET_SASLCONN \
85         do                                                      \
86         {                                                       \
87                 result = reset_saslconn(&conn, AuthRealm, remoteip, \
88                                         localip, auth_id, &ext_ssf); \
89                 if (result != SASL_OK)                          \
90                         sasl_ok = false;                        \
91         } while (0)
92
93 # else /* SASL >= 20000 */
94 static int reset_saslconn __P((sasl_conn_t **_conn, char *_hostname,
95                                 struct sockaddr_in *_saddr_r,
96                                 struct sockaddr_in *_saddr_l,
97                                 sasl_external_properties_t *_ext_ssf));
98 # define RESET_SASLCONN \
99         do                                                      \
100         {                                                       \
101                 result = reset_saslconn(&conn, AuthRealm, &saddr_r, \
102                                         &saddr_l, &ext_ssf);    \
103                 if (result != SASL_OK)                          \
104                         sasl_ok = false;                        \
105         } while (0)
106
107 # endif /* SASL >= 20000 */
108 #endif /* SASL */
109
110 extern ENVELOPE BlankEnvelope;
111
112 #define NBADRCPTS                                               \
113         do                                                      \
114         {                                                       \
115                 char buf[16];                                   \
116                 (void) sm_snprintf(buf, sizeof(buf), "%d",      \
117                         BadRcptThrottle > 0 && n_badrcpts > BadRcptThrottle \
118                                 ? n_badrcpts - 1 : n_badrcpts); \
119                 macdefine(&e->e_macro, A_TEMP, macid("{nbadrcpts}"), buf); \
120         } while (0)
121
122 #define SKIP_SPACE(s)   while (isascii(*s) && isspace(*s))      \
123                                 (s)++
124
125 /*
126 **  PARSE_ESMTP_ARGS -- parse EMSTP arguments (for MAIL, RCPT)
127 **
128 **      Parameters:
129 **              e -- the envelope
130 **              addr_st -- address (RCPT only)
131 **              p -- read buffer
132 **              delimptr -- current position in read buffer
133 **              which -- MAIL/RCPT
134 **              args -- arguments (output)
135 **              esmtp_args -- function to process a single ESMTP argument
136 **
137 **      Returns:
138 **              none
139 */
140
141 void
142 parse_esmtp_args(e, addr_st, p, delimptr, which, args, esmtp_args)
143         ENVELOPE *e;
144         ADDRESS *addr_st;
145         char *p;
146         char *delimptr;
147         char *which;
148         char *args[];
149         esmtp_args_F esmtp_args;
150 {
151         int argno;
152
153         argno = 0;
154         if (args != NULL)
155                 args[argno++] = p;
156         p = delimptr;
157         while (p != NULL && *p != '\0')
158         {
159                 char *kp;
160                 char *vp = NULL;
161                 char *equal = NULL;
162
163                 /* locate the beginning of the keyword */
164                 SKIP_SPACE(p);
165                 if (*p == '\0')
166                         break;
167                 kp = p;
168
169                 /* skip to the value portion */
170                 while ((isascii(*p) && isalnum(*p)) || *p == '-')
171                         p++;
172                 if (*p == '=')
173                 {
174                         equal = p;
175                         *p++ = '\0';
176                         vp = p;
177
178                         /* skip to the end of the value */
179                         while (*p != '\0' && *p != ' ' &&
180                                !(isascii(*p) && iscntrl(*p)) &&
181                                *p != '=')
182                                 p++;
183                 }
184
185                 if (*p != '\0')
186                         *p++ = '\0';
187
188                 if (tTd(19, 1))
189                         sm_dprintf("%s: got arg %s=\"%s\"\n", which, kp,
190                                 vp == NULL ? "<null>" : vp);
191
192                 esmtp_args(addr_st, kp, vp, e);
193                 if (equal != NULL)
194                         *equal = '=';
195                 if (args != NULL)
196                         args[argno] = kp;
197                 argno++;
198                 if (argno >= MAXSMTPARGS - 1)
199                         usrerr("501 5.5.4 Too many parameters");
200                 if (Errors > 0)
201                         break;
202         }
203         if (args != NULL)
204                 args[argno] = NULL;
205 }
206
207 /*
208 **  SMTP -- run the SMTP protocol.
209 **
210 **      Parameters:
211 **              nullserver -- if non-NULL, rejection message for
212 **                      (almost) all SMTP commands.
213 **              d_flags -- daemon flags
214 **              e -- the envelope.
215 **
216 **      Returns:
217 **              never.
218 **
219 **      Side Effects:
220 **              Reads commands from the input channel and processes them.
221 */
222
223 /*
224 **  Notice: The smtp server doesn't have a session context like the client
225 **      side has (mci). Therefore some data (session oriented) is allocated
226 **      or assigned to the "wrong" structure (esp. STARTTLS, AUTH).
227 **      This should be fixed in a successor version.
228 */
229
230 struct cmd
231 {
232         char    *cmd_name;      /* command name */
233         int     cmd_code;       /* internal code, see below */
234 };
235
236 /* values for cmd_code */
237 #define CMDERROR        0       /* bad command */
238 #define CMDMAIL 1       /* mail -- designate sender */
239 #define CMDRCPT 2       /* rcpt -- designate recipient */
240 #define CMDDATA 3       /* data -- send message text */
241 #define CMDRSET 4       /* rset -- reset state */
242 #define CMDVRFY 5       /* vrfy -- verify address */
243 #define CMDEXPN 6       /* expn -- expand address */
244 #define CMDNOOP 7       /* noop -- do nothing */
245 #define CMDQUIT 8       /* quit -- close connection and die */
246 #define CMDHELO 9       /* helo -- be polite */
247 #define CMDHELP 10      /* help -- give usage info */
248 #define CMDEHLO 11      /* ehlo -- extended helo (RFC 1425) */
249 #define CMDETRN 12      /* etrn -- flush queue */
250 #if SASL
251 # define CMDAUTH        13      /* auth -- SASL authenticate */
252 #endif /* SASL */
253 #if STARTTLS
254 # define CMDSTLS        14      /* STARTTLS -- start TLS session */
255 #endif /* STARTTLS */
256 /* non-standard commands */
257 #define CMDVERB 17      /* verb -- go into verbose mode */
258 /* unimplemented commands from RFC 821 */
259 #define CMDUNIMPL       19      /* unimplemented rfc821 commands */
260 /* use this to catch and log "door handle" attempts on your system */
261 #define CMDLOGBOGUS     23      /* bogus command that should be logged */
262 /* debugging-only commands, only enabled if SMTPDEBUG is defined */
263 #define CMDDBGQSHOW     24      /* showq -- show send queue */
264 #define CMDDBGDEBUG     25      /* debug -- set debug mode */
265
266 /*
267 **  Note: If you change this list, remember to update 'helpfile'
268 */
269
270 static struct cmd       CmdTab[] =
271 {
272         { "mail",       CMDMAIL         },
273         { "rcpt",       CMDRCPT         },
274         { "data",       CMDDATA         },
275         { "rset",       CMDRSET         },
276         { "vrfy",       CMDVRFY         },
277         { "expn",       CMDEXPN         },
278         { "help",       CMDHELP         },
279         { "noop",       CMDNOOP         },
280         { "quit",       CMDQUIT         },
281         { "helo",       CMDHELO         },
282         { "ehlo",       CMDEHLO         },
283         { "etrn",       CMDETRN         },
284         { "verb",       CMDVERB         },
285         { "send",       CMDUNIMPL       },
286         { "saml",       CMDUNIMPL       },
287         { "soml",       CMDUNIMPL       },
288         { "turn",       CMDUNIMPL       },
289 #if SASL
290         { "auth",       CMDAUTH,        },
291 #endif /* SASL */
292 #if STARTTLS
293         { "starttls",   CMDSTLS,        },
294 #endif /* STARTTLS */
295     /* remaining commands are here only to trap and log attempts to use them */
296         { "showq",      CMDDBGQSHOW     },
297         { "debug",      CMDDBGDEBUG     },
298         { "wiz",        CMDLOGBOGUS     },
299
300         { NULL,         CMDERROR        }
301 };
302
303 static char     *CurSmtpClient;         /* who's at the other end of channel */
304
305 #ifndef MAXBADCOMMANDS
306 # define MAXBADCOMMANDS 25      /* maximum number of bad commands */
307 #endif /* ! MAXBADCOMMANDS */
308 #ifndef MAXHELOCOMMANDS
309 # define MAXHELOCOMMANDS 3      /* max HELO/EHLO commands before slowdown */
310 #endif /* ! MAXHELOCOMMANDS */
311 #ifndef MAXVRFYCOMMANDS
312 # define MAXVRFYCOMMANDS 6      /* max VRFY/EXPN commands before slowdown */
313 #endif /* ! MAXVRFYCOMMANDS */
314 #ifndef MAXETRNCOMMANDS
315 # define MAXETRNCOMMANDS 8      /* max ETRN commands before slowdown */
316 #endif /* ! MAXETRNCOMMANDS */
317 #ifndef MAXTIMEOUT
318 # define MAXTIMEOUT (4 * 60)    /* max timeout for bad commands */
319 #endif /* ! MAXTIMEOUT */
320
321 /*
322 **  Maximum shift value to compute timeout for bad commands.
323 **  This introduces an upper limit of 2^MAXSHIFT for the timeout.
324 */
325
326 #ifndef MAXSHIFT
327 # define MAXSHIFT 8
328 #endif /* ! MAXSHIFT */
329 #if MAXSHIFT > 31
330  ERROR _MAXSHIFT > 31 is invalid
331 #endif /* MAXSHIFT */
332
333
334 #if MAXBADCOMMANDS > 0
335 # define STOP_IF_ATTACK(r)      do              \
336         {                                       \
337                 if ((r) == STOP_ATTACK)         \
338                         goto stopattack;        \
339         } while (0)
340
341 #else /* MAXBADCOMMANDS > 0 */
342 # define STOP_IF_ATTACK(r)      r
343 #endif /* MAXBADCOMMANDS > 0 */
344
345
346 #if SM_HEAP_CHECK
347 static SM_DEBUG_T DebugLeakSmtp = SM_DEBUG_INITIALIZER("leak_smtp",
348         "@(#)$Debug: leak_smtp - trace memory leaks during SMTP processing $");
349 #endif /* SM_HEAP_CHECK */
350
351 typedef struct
352 {
353         bool            sm_gotmail;     /* mail command received */
354         unsigned int    sm_nrcpts;      /* number of successful RCPT commands */
355         bool            sm_discard;
356 #if MILTER
357         bool            sm_milterize;
358         bool            sm_milterlist;  /* any filters in the list? */
359         milters_T       sm_milters;
360
361         /* e_nrcpts from envelope before recipient() call */
362         unsigned int    sm_e_nrcpts_orig;
363 #endif /* MILTER */
364         char            *sm_quarmsg;    /* carry quarantining across messages */
365 } SMTP_T;
366
367 static bool     smtp_data __P((SMTP_T *, ENVELOPE *));
368
369 #define MSG_TEMPFAIL "451 4.3.2 Please try again later"
370
371 #if MILTER
372 # define MILTER_ABORT(e)        milter_abort((e))
373
374 # define MILTER_REPLY(str)                                              \
375         {                                                               \
376                 int savelogusrerrs = LogUsrErrs;                        \
377                                                                         \
378                 milter_cmd_fail = true;                                 \
379                 switch (state)                                          \
380                 {                                                       \
381                   case SMFIR_SHUTDOWN:                                  \
382                         if (MilterLogLevel > 3)                         \
383                         {                                               \
384                                 sm_syslog(LOG_INFO, e->e_id,            \
385                                           "Milter: %s=%s, reject=421, errormode=4",     \
386                                           str, addr);                   \
387                                 LogUsrErrs = false;                     \
388                         }                                               \
389                         {                                               \
390                                 bool tsave = QuickAbort;                \
391                                                                         \
392                                 QuickAbort = false;                     \
393                                 usrerr("421 4.3.0 closing connection"); \
394                                 QuickAbort = tsave;                     \
395                                 e->e_sendqueue = NULL;                  \
396                                 goto doquit;                            \
397                         }                                               \
398                         break;                                          \
399                   case SMFIR_REPLYCODE:                                 \
400                         if (MilterLogLevel > 3)                         \
401                         {                                               \
402                                 sm_syslog(LOG_INFO, e->e_id,            \
403                                           "Milter: %s=%s, reject=%s",   \
404                                           str, addr, response);         \
405                                 LogUsrErrs = false;                     \
406                         }                                               \
407                         if (strncmp(response, "421 ", 4) == 0           \
408                             || strncmp(response, "421-", 4) == 0)       \
409                         {                                               \
410                                 bool tsave = QuickAbort;                \
411                                                                         \
412                                 QuickAbort = false;                     \
413                                 usrerr(response);                       \
414                                 QuickAbort = tsave;                     \
415                                 e->e_sendqueue = NULL;                  \
416                                 goto doquit;                            \
417                         }                                               \
418                         else                                            \
419                                 usrerr(response);                       \
420                         break;                                          \
421                                                                         \
422                   case SMFIR_REJECT:                                    \
423                         if (MilterLogLevel > 3)                         \
424                         {                                               \
425                                 sm_syslog(LOG_INFO, e->e_id,            \
426                                           "Milter: %s=%s, reject=550 5.7.1 Command rejected", \
427                                           str, addr);                   \
428                                 LogUsrErrs = false;                     \
429                         }                                               \
430                         usrerr("550 5.7.1 Command rejected");           \
431                         break;                                          \
432                                                                         \
433                   case SMFIR_DISCARD:                                   \
434                         if (MilterLogLevel > 3)                         \
435                                 sm_syslog(LOG_INFO, e->e_id,            \
436                                           "Milter: %s=%s, discard",     \
437                                           str, addr);                   \
438                         e->e_flags |= EF_DISCARD;                       \
439                         milter_cmd_fail = false;                        \
440                         break;                                          \
441                                                                         \
442                   case SMFIR_TEMPFAIL:                                  \
443                         if (MilterLogLevel > 3)                         \
444                         {                                               \
445                                 sm_syslog(LOG_INFO, e->e_id,            \
446                                           "Milter: %s=%s, reject=%s",   \
447                                           str, addr, MSG_TEMPFAIL);     \
448                                 LogUsrErrs = false;                     \
449                         }                                               \
450                         usrerr(MSG_TEMPFAIL);                           \
451                         break;                                          \
452                   default:                                              \
453                         milter_cmd_fail = false;                        \
454                         break;                                          \
455                 }                                                       \
456                 LogUsrErrs = savelogusrerrs;                            \
457                 if (response != NULL)                                   \
458                         sm_free(response); /* XXX */                    \
459         }
460
461 #else /* MILTER */
462 # define MILTER_ABORT(e)
463 #endif /* MILTER */
464
465 /* clear all SMTP state (for HELO/EHLO/RSET) */
466 #define CLEAR_STATE(cmd)                                        \
467 do                                                              \
468 {                                                               \
469         /* abort milter filters */                              \
470         MILTER_ABORT(e);                                        \
471                                                                 \
472         if (smtp.sm_nrcpts > 0)                                 \
473         {                                                       \
474                 logundelrcpts(e, cmd, 10, false);               \
475                 smtp.sm_nrcpts = 0;                             \
476                 macdefine(&e->e_macro, A_PERM,                  \
477                           macid("{nrcpts}"), "0");              \
478         }                                                       \
479                                                                 \
480         e->e_sendqueue = NULL;                                  \
481         e->e_flags |= EF_CLRQUEUE;                              \
482                                                                 \
483         if (tTd(92, 2))                                         \
484                 sm_dprintf("CLEAR_STATE: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",\
485                         e->e_id, bitset(EF_LOGSENDER, e->e_flags), LogLevel);\
486         if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))   \
487                 logsender(e, NULL);                             \
488         e->e_flags &= ~EF_LOGSENDER;                            \
489                                                                 \
490         /* clean up a bit */                                    \
491         smtp.sm_gotmail = false;                                \
492         SuprErrs = true;                                        \
493         (void) dropenvelope(e, true, false);                    \
494         sm_rpool_free(e->e_rpool);                              \
495         e = newenvelope(e, CurEnv, sm_rpool_new_x(NULL));       \
496         CurEnv = e;                                             \
497         e->e_features = features;                               \
498                                                                 \
499         /* put back discard bit */                              \
500         if (smtp.sm_discard)                                    \
501                 e->e_flags |= EF_DISCARD;                       \
502                                                                 \
503         /* restore connection quarantining */                   \
504         if (smtp.sm_quarmsg == NULL)                            \
505         {                                                       \
506                 e->e_quarmsg = NULL;                            \
507                 macdefine(&e->e_macro, A_PERM,                  \
508                         macid("{quarantine}"), "");             \
509         }                                                       \
510         else                                                    \
511         {                                                       \
512                 e->e_quarmsg = sm_rpool_strdup_x(e->e_rpool,    \
513                                                 smtp.sm_quarmsg);       \
514                 macdefine(&e->e_macro, A_PERM, macid("{quarantine}"),   \
515                           e->e_quarmsg);                        \
516         }                                                       \
517 } while (0)
518
519 /* sleep to flatten out connection load */
520 #define MIN_DELAY_LOG   15      /* wait before logging this again */
521
522 /* is it worth setting the process title for 1s? */
523 #define DELAY_CONN(cmd)                                         \
524         if (DelayLA > 0 && (CurrentLA = getla()) >= DelayLA)    \
525         {                                                       \
526                 time_t dnow;                                    \
527                                                                 \
528                 sm_setproctitle(true, e,                        \
529                                 "%s: %s: delaying %s: load average: %d", \
530                                 qid_printname(e), CurSmtpClient,        \
531                                 cmd, DelayLA);  \
532                 if (LogLevel > 8 && (dnow = curtime()) > log_delay)     \
533                 {                                               \
534                         sm_syslog(LOG_INFO, e->e_id,            \
535                                   "delaying=%s, load average=%d >= %d", \
536                                   cmd, CurrentLA, DelayLA);             \
537                         log_delay = dnow + MIN_DELAY_LOG;       \
538                 }                                               \
539                 (void) sleep(1);                                \
540                 sm_setproctitle(true, e, "%s %s: %.80s",        \
541                                 qid_printname(e), CurSmtpClient, inp);  \
542         }
543
544 static bool SevenBitInput_Saved;        /* saved version of SevenBitInput */
545
546 void
547 smtp(nullserver, d_flags, e)
548         char *volatile nullserver;
549         BITMAP256 d_flags;
550         register ENVELOPE *volatile e;
551 {
552         register char *volatile p;
553         register struct cmd *volatile c = NULL;
554         char *cmd;
555         auto ADDRESS *vrfyqueue;
556         ADDRESS *a;
557         volatile bool gothello;         /* helo command received */
558         bool vrfy;                      /* set if this is a vrfy command */
559         char *volatile protocol;        /* sending protocol */
560         char *volatile sendinghost;     /* sending hostname */
561         char *volatile peerhostname;    /* name of SMTP peer or "localhost" */
562         auto char *delimptr;
563         char *id;
564         volatile unsigned int n_badcmds = 0;    /* count of bad commands */
565         volatile unsigned int n_badrcpts = 0;   /* number of rejected RCPT */
566         volatile unsigned int n_verifies = 0;   /* count of VRFY/EXPN */
567         volatile unsigned int n_etrn = 0;       /* count of ETRN */
568         volatile unsigned int n_noop = 0;       /* count of NOOP/VERB/etc */
569         volatile unsigned int n_helo = 0;       /* count of HELO/EHLO */
570         bool ok;
571         volatile bool first;
572         volatile bool tempfail = false;
573         volatile time_t wt;             /* timeout after too many commands */
574         volatile time_t previous;       /* time after checksmtpattack() */
575         volatile bool lognullconnection = true;
576         register char *q;
577         SMTP_T smtp;
578         char *addr;
579         char *greetcode = "220";
580         char *hostname;                 /* my hostname ($j) */
581         QUEUE_CHAR *new;
582         char *args[MAXSMTPARGS];
583         char inp[MAXINPLINE];
584 #if MAXINPLINE < MAXLINE
585  ERROR _MAXINPLINE must NOT be less than _MAXLINE: MAXINPLINE < MAXLINE
586 #endif /* MAXINPLINE < MAXLINE */
587         char cmdbuf[MAXLINE];
588 #if SASL
589         sasl_conn_t *conn;
590         volatile bool sasl_ok;
591         volatile unsigned int n_auth = 0;       /* count of AUTH commands */
592         bool ismore;
593         int result;
594         volatile int authenticating;
595         char *user;
596         char *in, *out2;
597 # if SASL >= 20000
598         char *auth_id = NULL;
599         const char *out;
600         sasl_ssf_t ext_ssf;
601         char localip[60], remoteip[60];
602 # else /* SASL >= 20000 */
603         char *out;
604         const char *errstr;
605         sasl_external_properties_t ext_ssf;
606         struct sockaddr_in saddr_l;
607         struct sockaddr_in saddr_r;
608 # endif /* SASL >= 20000 */
609         sasl_security_properties_t ssp;
610         sasl_ssf_t *ssf;
611         unsigned int inlen, out2len;
612         unsigned int outlen;
613         char *volatile auth_type;
614         char *mechlist;
615         volatile unsigned int n_mechs;
616         unsigned int len;
617 #else /* SASL */
618 #endif /* SASL */
619         int r;
620 #if STARTTLS
621         int rfd, wfd;
622         volatile bool tls_active = false;
623         volatile bool smtps = bitnset(D_SMTPS, d_flags);
624         bool saveQuickAbort;
625         bool saveSuprErrs;
626         time_t tlsstart;
627 #endif /* STARTTLS */
628         volatile unsigned int features;
629 #if PIPELINING
630 # if _FFR_NO_PIPE
631         int np_log = 0;
632 # endif /* _FFR_NO_PIPE */
633 #endif /* PIPELINING */
634         volatile time_t log_delay = (time_t) 0;
635 #if MILTER
636         volatile bool milter_cmd_done, milter_cmd_safe;
637         volatile bool milter_rcpt_added, milter_cmd_fail;
638         ADDRESS addr_st;
639 # define p_addr_st      &addr_st
640 #else /* MILTER */
641 # define p_addr_st      NULL
642 #endif /* MILTER */
643         size_t inplen;
644 #if _FFR_BADRCPT_SHUTDOWN
645         int n_badrcpts_adj;
646 #endif /* _FFR_BADRCPT_SHUTDOWN */
647
648         SevenBitInput_Saved = SevenBitInput;
649         smtp.sm_nrcpts = 0;
650 #if MILTER
651         smtp.sm_milterize = (nullserver == NULL);
652         smtp.sm_milterlist = false;
653         addr = NULL;
654 #endif /* MILTER */
655
656         /* setup I/O fd correctly for the SMTP server */
657         setup_smtpd_io();
658
659 #if SM_HEAP_CHECK
660         if (sm_debug_active(&DebugLeakSmtp, 1))
661         {
662                 sm_heap_newgroup();
663                 sm_dprintf("smtp() heap group #%d\n", sm_heap_group());
664         }
665 #endif /* SM_HEAP_CHECK */
666
667         /* XXX the rpool should be set when e is initialized in main() */
668         e->e_rpool = sm_rpool_new_x(NULL);
669         e->e_macro.mac_rpool = e->e_rpool;
670
671         settime(e);
672         sm_getla();
673         peerhostname = RealHostName;
674         if (peerhostname == NULL)
675                 peerhostname = "localhost";
676         CurHostName = peerhostname;
677         CurSmtpClient = macvalue('_', e);
678         if (CurSmtpClient == NULL)
679                 CurSmtpClient = CurHostName;
680
681         /* check_relay may have set discard bit, save for later */
682         smtp.sm_discard = bitset(EF_DISCARD, e->e_flags);
683
684 #if PIPELINING
685         /* auto-flush output when reading input */
686         (void) sm_io_autoflush(InChannel, OutChannel);
687 #endif /* PIPELINING */
688
689         sm_setproctitle(true, e, "server %s startup", CurSmtpClient);
690
691         /* Set default features for server. */
692         features = ((bitset(PRIV_NOETRN, PrivacyFlags) ||
693                      bitnset(D_NOETRN, d_flags)) ? SRV_NONE : SRV_OFFER_ETRN)
694                 | (bitnset(D_AUTHREQ, d_flags) ? SRV_REQ_AUTH : SRV_NONE)
695                 | (bitset(PRIV_NOEXPN, PrivacyFlags) ? SRV_NONE
696                         : (SRV_OFFER_EXPN
697                           | (bitset(PRIV_NOVERB, PrivacyFlags)
698                              ? SRV_NONE : SRV_OFFER_VERB)))
699                 | ((bitset(PRIV_NORECEIPTS, PrivacyFlags) || !SendMIMEErrors)
700                          ? SRV_NONE : SRV_OFFER_DSN)
701 #if SASL
702                 | (bitnset(D_NOAUTH, d_flags) ? SRV_NONE : SRV_OFFER_AUTH)
703                 | (bitset(SASL_SEC_NOPLAINTEXT, SASLOpts) ? SRV_REQ_SEC
704                                                           : SRV_NONE)
705 #endif /* SASL */
706 #if PIPELINING
707                 | SRV_OFFER_PIPE
708 #endif /* PIPELINING */
709 #if STARTTLS
710                 | (bitnset(D_NOTLS, d_flags) ? SRV_NONE : SRV_OFFER_TLS)
711                 | (bitset(TLS_I_NO_VRFY, TLS_Srv_Opts) ? SRV_NONE
712                                                        : SRV_VRFY_CLT)
713 #endif /* STARTTLS */
714                 ;
715         if (nullserver == NULL)
716         {
717                 features = srvfeatures(e, CurSmtpClient, features);
718                 if (bitset(SRV_TMP_FAIL, features))
719                 {
720                         if (LogLevel > 4)
721                                 sm_syslog(LOG_ERR, NOQID,
722                                           "ERROR: srv_features=tempfail, relay=%.100s, access temporarily disabled",
723                                           CurSmtpClient);
724                         nullserver = "450 4.3.0 Please try again later.";
725                 }
726                 else
727                 {
728 #if PIPELINING
729 # if _FFR_NO_PIPE
730                         if (bitset(SRV_NO_PIPE, features))
731                         {
732                                 /* for consistency */
733                                 features &= ~SRV_OFFER_PIPE;
734                         }
735 # endif /* _FFR_NO_PIPE */
736 #endif /* PIPELINING */
737 #if SASL
738                         if (bitset(SRV_REQ_SEC, features))
739                                 SASLOpts |= SASL_SEC_NOPLAINTEXT;
740                         else
741                                 SASLOpts &= ~SASL_SEC_NOPLAINTEXT;
742 #endif /* SASL */
743                 }
744         }
745         else if (strncmp(nullserver, "421 ", 4) == 0)
746         {
747                 message(nullserver);
748                 goto doquit;
749         }
750
751         e->e_features = features;
752         hostname = macvalue('j', e);
753 #if SASL
754         if (AuthRealm == NULL)
755                 AuthRealm = hostname;
756         sasl_ok = bitset(SRV_OFFER_AUTH, features);
757         n_mechs = 0;
758         authenticating = SASL_NOT_AUTH;
759
760         /* SASL server new connection */
761         if (sasl_ok)
762         {
763 # if SASL >= 20000
764                 result = sasl_server_new("smtp", AuthRealm, NULL, NULL, NULL,
765                                          NULL, 0, &conn);
766 # elif SASL > 10505
767                 /* use empty realm: only works in SASL > 1.5.5 */
768                 result = sasl_server_new("smtp", AuthRealm, "", NULL, 0, &conn);
769 # else /* SASL >= 20000 */
770                 /* use no realm -> realm is set to hostname by SASL lib */
771                 result = sasl_server_new("smtp", AuthRealm, NULL, NULL, 0,
772                                          &conn);
773 # endif /* SASL >= 20000 */
774                 sasl_ok = result == SASL_OK;
775                 if (!sasl_ok)
776                 {
777                         if (LogLevel > 9)
778                                 sm_syslog(LOG_WARNING, NOQID,
779                                           "AUTH error: sasl_server_new failed=%d",
780                                           result);
781                 }
782         }
783         if (sasl_ok)
784         {
785                 /*
786                 **  SASL set properties for sasl
787                 **  set local/remote IP
788                 **  XXX Cyrus SASL v1 only supports IPv4
789                 **
790                 **  XXX where exactly are these used/required?
791                 **  Kerberos_v4
792                 */
793
794 # if SASL >= 20000
795                 localip[0] = remoteip[0] = '\0';
796 #  if NETINET || NETINET6
797                 in = macvalue(macid("{daemon_family}"), e);
798                 if (in != NULL && (
799 #   if NETINET6
800                     strcmp(in, "inet6") == 0 ||
801 #   endif /* NETINET6 */
802                     strcmp(in, "inet") == 0))
803                 {
804                         SOCKADDR_LEN_T addrsize;
805                         SOCKADDR saddr_l;
806                         SOCKADDR saddr_r;
807
808                         addrsize = sizeof(saddr_r);
809                         if (getpeername(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
810                                                       NULL),
811                                         (struct sockaddr *) &saddr_r,
812                                         &addrsize) == 0)
813                         {
814                                 if (iptostring(&saddr_r, addrsize,
815                                                remoteip, sizeof(remoteip)))
816                                 {
817                                         sasl_setprop(conn, SASL_IPREMOTEPORT,
818                                                      remoteip);
819                                 }
820                                 addrsize = sizeof(saddr_l);
821                                 if (getsockname(sm_io_getinfo(InChannel,
822                                                               SM_IO_WHAT_FD,
823                                                               NULL),
824                                                 (struct sockaddr *) &saddr_l,
825                                                 &addrsize) == 0)
826                                 {
827                                         if (iptostring(&saddr_l, addrsize,
828                                                        localip,
829                                                        sizeof(localip)))
830                                         {
831                                                 sasl_setprop(conn,
832                                                              SASL_IPLOCALPORT,
833                                                              localip);
834                                         }
835                                 }
836                         }
837                 }
838 #  endif /* NETINET || NETINET6 */
839 # else /* SASL >= 20000 */
840 #  if NETINET
841                 in = macvalue(macid("{daemon_family}"), e);
842                 if (in != NULL && strcmp(in, "inet") == 0)
843                 {
844                         SOCKADDR_LEN_T addrsize;
845
846                         addrsize = sizeof(struct sockaddr_in);
847                         if (getpeername(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
848                                                       NULL),
849                                         (struct sockaddr *)&saddr_r,
850                                         &addrsize) == 0)
851                         {
852                                 sasl_setprop(conn, SASL_IP_REMOTE, &saddr_r);
853                                 addrsize = sizeof(struct sockaddr_in);
854                                 if (getsockname(sm_io_getinfo(InChannel,
855                                                               SM_IO_WHAT_FD,
856                                                               NULL),
857                                                 (struct sockaddr *)&saddr_l,
858                                                 &addrsize) == 0)
859                                         sasl_setprop(conn, SASL_IP_LOCAL,
860                                                      &saddr_l);
861                         }
862                 }
863 #  endif /* NETINET */
864 # endif /* SASL >= 20000 */
865
866                 auth_type = NULL;
867                 mechlist = NULL;
868                 user = NULL;
869 # if 0
870                 macdefine(&BlankEnvelope.e_macro, A_PERM,
871                         macid("{auth_author}"), NULL);
872 # endif /* 0 */
873
874                 /* set properties */
875                 (void) memset(&ssp, '\0', sizeof(ssp));
876
877                 /* XXX should these be options settable via .cf ? */
878                 /* ssp.min_ssf = 0; is default due to memset() */
879                 ssp.max_ssf = MaxSLBits;
880                 ssp.maxbufsize = MAXOUTLEN;
881                 ssp.security_flags = SASLOpts & SASL_SEC_MASK;
882                 sasl_ok = sasl_setprop(conn, SASL_SEC_PROPS, &ssp) == SASL_OK;
883
884                 if (sasl_ok)
885                 {
886                         /*
887                         **  external security strength factor;
888                         **      currently we have none so zero
889                         */
890
891 # if SASL >= 20000
892                         ext_ssf = 0;
893                         auth_id = NULL;
894                         sasl_ok = ((sasl_setprop(conn, SASL_SSF_EXTERNAL,
895                                                  &ext_ssf) == SASL_OK) &&
896                                    (sasl_setprop(conn, SASL_AUTH_EXTERNAL,
897                                                  auth_id) == SASL_OK));
898 # else /* SASL >= 20000 */
899                         ext_ssf.ssf = 0;
900                         ext_ssf.auth_id = NULL;
901                         sasl_ok = sasl_setprop(conn, SASL_SSF_EXTERNAL,
902                                                &ext_ssf) == SASL_OK;
903 # endif /* SASL >= 20000 */
904                 }
905                 if (sasl_ok)
906                         n_mechs = saslmechs(conn, &mechlist);
907         }
908 #endif /* SASL */
909
910 #if STARTTLS
911
912
913         set_tls_rd_tmo(TimeOuts.to_nextcommand);
914 #endif /* STARTTLS */
915
916 #if MILTER
917         if (smtp.sm_milterize)
918         {
919                 char state;
920
921                 /* initialize mail filter connection */
922                 smtp.sm_milterlist = milter_init(e, &state, &smtp.sm_milters);
923                 switch (state)
924                 {
925                   case SMFIR_REJECT:
926                         if (MilterLogLevel > 3)
927                                 sm_syslog(LOG_INFO, e->e_id,
928                                           "Milter: initialization failed, rejecting commands");
929                         greetcode = "554";
930                         nullserver = "Command rejected";
931                         smtp.sm_milterize = false;
932                         break;
933
934                   case SMFIR_TEMPFAIL:
935                         if (MilterLogLevel > 3)
936                                 sm_syslog(LOG_INFO, e->e_id,
937                                           "Milter: initialization failed, temp failing commands");
938                         tempfail = true;
939                         smtp.sm_milterize = false;
940                         break;
941
942                   case SMFIR_SHUTDOWN:
943                         if (MilterLogLevel > 3)
944                                 sm_syslog(LOG_INFO, e->e_id,
945                                           "Milter: initialization failed, closing connection");
946                         tempfail = true;
947                         smtp.sm_milterize = false;
948                         message("421 4.7.0 %s closing connection",
949                                         MyHostName);
950
951                         /* arrange to ignore send list */
952                         e->e_sendqueue = NULL;
953                         lognullconnection = false;
954                         goto doquit;
955                 }
956         }
957
958         if (smtp.sm_milterlist && smtp.sm_milterize &&
959             !bitset(EF_DISCARD, e->e_flags))
960         {
961                 char state;
962                 char *response;
963
964                 q = macvalue(macid("{client_name}"), e);
965                 SM_ASSERT(q != NULL || OpMode == MD_SMTP);
966                 if (q == NULL)
967                         q = "localhost";
968                 response = milter_connect(q, RealHostAddr, e, &state);
969                 switch (state)
970                 {
971                   case SMFIR_REPLYCODE: /* REPLYCODE shouldn't happen */
972                   case SMFIR_REJECT:
973                         if (MilterLogLevel > 3)
974                                 sm_syslog(LOG_INFO, e->e_id,
975                                           "Milter: connect: host=%s, addr=%s, rejecting commands",
976                                           peerhostname,
977                                           anynet_ntoa(&RealHostAddr));
978                         greetcode = "554";
979                         nullserver = "Command rejected";
980                         smtp.sm_milterize = false;
981                         break;
982
983                   case SMFIR_TEMPFAIL:
984                         if (MilterLogLevel > 3)
985                                 sm_syslog(LOG_INFO, e->e_id,
986                                           "Milter: connect: host=%s, addr=%s, temp failing commands",
987                                           peerhostname,
988                                           anynet_ntoa(&RealHostAddr));
989                         tempfail = true;
990                         smtp.sm_milterize = false;
991                         break;
992
993                   case SMFIR_SHUTDOWN:
994                         if (MilterLogLevel > 3)
995                                 sm_syslog(LOG_INFO, e->e_id,
996                                           "Milter: connect: host=%s, addr=%s, shutdown",
997                                           peerhostname,
998                                           anynet_ntoa(&RealHostAddr));
999                         tempfail = true;
1000                         smtp.sm_milterize = false;
1001                         message("421 4.7.0 %s closing connection",
1002                                         MyHostName);
1003
1004                         /* arrange to ignore send list */
1005                         e->e_sendqueue = NULL;
1006                         goto doquit;
1007                 }
1008                 if (response != NULL)
1009                         sm_free(response); /* XXX */
1010         }
1011 #endif /* MILTER */
1012
1013         /*
1014         **  Broken proxies and SMTP slammers
1015         **  push data without waiting, catch them
1016         */
1017
1018         if (
1019 #if STARTTLS
1020             !smtps &&
1021 #endif /* STARTTLS */
1022             *greetcode == '2' && nullserver == NULL)
1023         {
1024                 time_t msecs = 0;
1025                 char **pvp;
1026                 char pvpbuf[PSBUFSIZE];
1027
1028                 /* Ask the rulesets how long to pause */
1029                 pvp = NULL;
1030                 r = rscap("greet_pause", peerhostname,
1031                           anynet_ntoa(&RealHostAddr), e,
1032                           &pvp, pvpbuf, sizeof(pvpbuf));
1033                 if (r == EX_OK && pvp != NULL && pvp[0] != NULL &&
1034                     (pvp[0][0] & 0377) == CANONNET && pvp[1] != NULL)
1035                 {
1036                         msecs = strtol(pvp[1], NULL, 10);
1037                 }
1038
1039                 if (msecs > 0)
1040                 {
1041                         int fd;
1042                         fd_set readfds;
1043                         struct timeval timeout;
1044                         struct timeval bp, ep, tp; /* {begin,end,total}pause */
1045                         int eoftest;
1046
1047                         /* pause for a moment */
1048                         timeout.tv_sec = msecs / 1000;
1049                         timeout.tv_usec = (msecs % 1000) * 1000;
1050
1051                         /* Obey RFC 2821: 4.3.5.2: 220 timeout of 5 minutes */
1052                         if (timeout.tv_sec >= 300)
1053                         {
1054                                 timeout.tv_sec = 300;
1055                                 timeout.tv_usec = 0;
1056                         }
1057
1058                         /* check if data is on the socket during the pause */
1059                         fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
1060                         FD_ZERO(&readfds);
1061                         SM_FD_SET(fd, &readfds);
1062                         gettimeofday(&bp, NULL);
1063                         if (select(fd + 1, FDSET_CAST &readfds,
1064                             NULL, NULL, &timeout) > 0 &&
1065                             FD_ISSET(fd, &readfds) &&
1066                             (eoftest = sm_io_getc(InChannel, SM_TIME_DEFAULT))
1067                             != SM_IO_EOF)
1068                         {
1069                                 sm_io_ungetc(InChannel, SM_TIME_DEFAULT,
1070                                              eoftest);
1071                                 gettimeofday(&ep, NULL);
1072                                 timersub(&ep, &bp, &tp);
1073                                 greetcode = "554";
1074                                 nullserver = "Command rejected";
1075                                 sm_syslog(LOG_INFO, e->e_id,
1076                                           "rejecting commands from %s [%s] due to pre-greeting traffic after %d seconds",
1077                                           peerhostname,
1078                                           anynet_ntoa(&RealHostAddr),
1079                                           (int) tp.tv_sec +
1080                                                 (tp.tv_usec >= 500000 ? 1 : 0)
1081                                          );
1082                         }
1083                 }
1084         }
1085
1086 #if STARTTLS
1087         /* If this an smtps connection, start TLS now */
1088         if (smtps)
1089         {
1090                 Errors = 0;
1091                 goto starttls;
1092         }
1093
1094   greeting:
1095
1096 #endif /* STARTTLS */
1097
1098         /* output the first line, inserting "ESMTP" as second word */
1099         if (*greetcode == '5')
1100                 (void) sm_snprintf(inp, sizeof(inp),
1101                                 "%s not accepting messages", hostname);
1102         else
1103                 expand(SmtpGreeting, inp, sizeof(inp), e);
1104
1105         p = strchr(inp, '\n');
1106         if (p != NULL)
1107                 *p++ = '\0';
1108         id = strchr(inp, ' ');
1109         if (id == NULL)
1110                 id = &inp[strlen(inp)];
1111         if (p == NULL)
1112                 (void) sm_snprintf(cmdbuf, sizeof(cmdbuf),
1113                          "%s %%.*s ESMTP%%s", greetcode);
1114         else
1115                 (void) sm_snprintf(cmdbuf, sizeof(cmdbuf),
1116                          "%s-%%.*s ESMTP%%s", greetcode);
1117         message(cmdbuf, (int) (id - inp), inp, id);
1118
1119         /* output remaining lines */
1120         while ((id = p) != NULL && (p = strchr(id, '\n')) != NULL)
1121         {
1122                 *p++ = '\0';
1123                 if (isascii(*id) && isspace(*id))
1124                         id++;
1125                 (void) sm_strlcpyn(cmdbuf, sizeof(cmdbuf), 2, greetcode, "-%s");
1126                 message(cmdbuf, id);
1127         }
1128         if (id != NULL)
1129         {
1130                 if (isascii(*id) && isspace(*id))
1131                         id++;
1132                 (void) sm_strlcpyn(cmdbuf, sizeof(cmdbuf), 2, greetcode, " %s");
1133                 message(cmdbuf, id);
1134         }
1135
1136         protocol = NULL;
1137         sendinghost = macvalue('s', e);
1138
1139         /* If quarantining by a connect/ehlo action, save between messages */
1140         if (e->e_quarmsg == NULL)
1141                 smtp.sm_quarmsg = NULL;
1142         else
1143                 smtp.sm_quarmsg = newstr(e->e_quarmsg);
1144
1145         /* sendinghost's storage must outlive the current envelope */
1146         if (sendinghost != NULL)
1147                 sendinghost = sm_strdup_x(sendinghost);
1148         first = true;
1149         gothello = false;
1150         smtp.sm_gotmail = false;
1151         for (;;)
1152         {
1153             SM_TRY
1154             {
1155                 QuickAbort = false;
1156                 HoldErrs = false;
1157                 SuprErrs = false;
1158                 LogUsrErrs = false;
1159                 OnlyOneError = true;
1160                 e->e_flags &= ~(EF_VRFYONLY|EF_GLOBALERRS);
1161 #if MILTER
1162                 milter_cmd_fail = false;
1163 #endif /* MILTER */
1164
1165                 /* setup for the read */
1166                 e->e_to = NULL;
1167                 Errors = 0;
1168                 FileName = NULL;
1169                 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
1170
1171                 /* read the input line */
1172                 SmtpPhase = "server cmd read";
1173                 sm_setproctitle(true, e, "server %s cmd read", CurSmtpClient);
1174
1175                 /* handle errors */
1176                 if (sm_io_error(OutChannel) ||
1177                     (p = sfgets(inp, sizeof(inp), InChannel,
1178                                 TimeOuts.to_nextcommand, SmtpPhase)) == NULL)
1179                 {
1180                         char *d;
1181
1182                         d = macvalue(macid("{daemon_name}"), e);
1183                         if (d == NULL)
1184                                 d = "stdin";
1185                         /* end of file, just die */
1186                         disconnect(1, e);
1187
1188 #if MILTER
1189                         /* close out milter filters */
1190                         milter_quit(e);
1191 #endif /* MILTER */
1192
1193                         message("421 4.4.1 %s Lost input channel from %s",
1194                                 MyHostName, CurSmtpClient);
1195                         if (LogLevel > (smtp.sm_gotmail ? 1 : 19))
1196                                 sm_syslog(LOG_NOTICE, e->e_id,
1197                                           "lost input channel from %s to %s after %s",
1198                                           CurSmtpClient, d,
1199                                           (c == NULL || c->cmd_name == NULL) ? "startup" : c->cmd_name);
1200                         /*
1201                         **  If have not accepted mail (DATA), do not bounce
1202                         **  bad addresses back to sender.
1203                         */
1204
1205                         if (bitset(EF_CLRQUEUE, e->e_flags))
1206                                 e->e_sendqueue = NULL;
1207                         goto doquit;
1208                 }
1209
1210                 /* also used by "proxy" check below */
1211                 inplen = strlen(inp);
1212 #if SASL
1213                 /*
1214                 **  SMTP AUTH requires accepting any length,
1215                 **  at least for challenge/response. However, not imposing
1216                 **  a limit is a bad idea (denial of service).
1217                 */
1218
1219                 if (authenticating != SASL_PROC_AUTH
1220                     && sm_strncasecmp(inp, "AUTH ", 5) != 0
1221                     && inplen > MAXLINE)
1222                 {
1223                         message("421 4.7.0 %s Command too long, possible attack %s",
1224                                 MyHostName, CurSmtpClient);
1225                         sm_syslog(LOG_INFO, e->e_id,
1226                                   "%s: SMTP violation, input too long: %lu",
1227                                   CurSmtpClient, (unsigned long) inplen);
1228                         goto doquit;
1229                 }
1230 #endif /* SASL */
1231
1232                 if (first)
1233                 {
1234                         size_t cmdlen;
1235                         int idx;
1236                         char *http_cmd;
1237                         static char *http_cmds[] = { "GET", "POST",
1238                                                      "CONNECT", "USER", NULL };
1239
1240                         for (idx = 0; (http_cmd = http_cmds[idx]) != NULL;
1241                              idx++)
1242                         {
1243                                 cmdlen = strlen(http_cmd);
1244                                 if (cmdlen < inplen &&
1245                                     sm_strncasecmp(inp, http_cmd, cmdlen) == 0 &&
1246                                     isascii(inp[cmdlen]) && isspace(inp[cmdlen]))
1247                                 {
1248                                         /* Open proxy, drop it */
1249                                         message("421 4.7.0 %s Rejecting open proxy %s",
1250                                                 MyHostName, CurSmtpClient);
1251                                         sm_syslog(LOG_INFO, e->e_id,
1252                                                   "%s: probable open proxy: command=%.40s",
1253                                                   CurSmtpClient, inp);
1254                                         goto doquit;
1255                                 }
1256                         }
1257                         first = false;
1258                 }
1259
1260                 /* clean up end of line */
1261                 fixcrlf(inp, true);
1262
1263 #if PIPELINING
1264 # if _FFR_NO_PIPE
1265                 /*
1266                 **  if there is more input and pipelining is disabled:
1267                 **      delay ... (and maybe discard the input?)
1268                 **  XXX this doesn't really work, at least in tests using
1269                 **  telnet SM_IO_IS_READABLE only returns 1 if there were
1270                 **  more than 2 input lines available.
1271                 */
1272
1273                 if (bitset(SRV_NO_PIPE, features) &&
1274                     sm_io_getinfo(InChannel, SM_IO_IS_READABLE, NULL) > 0)
1275                 {
1276                         if (++np_log < 3)
1277                                 sm_syslog(LOG_INFO, NOQID,
1278                                           "unauthorized PIPELINING, sleeping, relay=%.100s",
1279                                            CurSmtpClient);
1280                         sleep(1);
1281                 }
1282
1283 # endif /* _FFR_NO_PIPE */
1284 #endif /* PIPELINING */
1285
1286 #if SASL
1287                 if (authenticating == SASL_PROC_AUTH)
1288                 {
1289 # if 0
1290                         if (*inp == '\0')
1291                         {
1292                                 authenticating = SASL_NOT_AUTH;
1293                                 message("501 5.5.2 missing input");
1294                                 RESET_SASLCONN;
1295                                 continue;
1296                         }
1297 # endif /* 0 */
1298                         if (*inp == '*' && *(inp + 1) == '\0')
1299                         {
1300                                 authenticating = SASL_NOT_AUTH;
1301
1302                                 /* RFC 2554 4. */
1303                                 message("501 5.0.0 AUTH aborted");
1304                                 RESET_SASLCONN;
1305                                 continue;
1306                         }
1307
1308                         /* could this be shorter? XXX */
1309 # if SASL >= 20000
1310                         in = xalloc(strlen(inp) + 1);
1311                         result = sasl_decode64(inp, strlen(inp), in,
1312                                                strlen(inp), &inlen);
1313 # else /* SASL >= 20000 */
1314                         out = xalloc(strlen(inp));
1315                         result = sasl_decode64(inp, strlen(inp), out, &outlen);
1316 # endif /* SASL >= 20000 */
1317                         if (result != SASL_OK)
1318                         {
1319                                 authenticating = SASL_NOT_AUTH;
1320
1321                                 /* RFC 2554 4. */
1322                                 message("501 5.5.4 cannot decode AUTH parameter %s",
1323                                         inp);
1324 # if SASL >= 20000
1325                                 sm_free(in);
1326 # endif /* SASL >= 20000 */
1327                                 RESET_SASLCONN;
1328                                 continue;
1329                         }
1330
1331 # if SASL >= 20000
1332                         result = sasl_server_step(conn, in, inlen,
1333                                                   &out, &outlen);
1334                         sm_free(in);
1335 # else /* SASL >= 20000 */
1336                         result = sasl_server_step(conn, out, outlen,
1337                                                   &out, &outlen, &errstr);
1338 # endif /* SASL >= 20000 */
1339
1340                         /* get an OK if we're done */
1341                         if (result == SASL_OK)
1342                         {
1343   authenticated:
1344                                 message("235 2.0.0 OK Authenticated");
1345                                 authenticating = SASL_IS_AUTH;
1346                                 macdefine(&BlankEnvelope.e_macro, A_TEMP,
1347                                         macid("{auth_type}"), auth_type);
1348
1349 # if SASL >= 20000
1350                                 user = macvalue(macid("{auth_authen}"), e);
1351
1352                                 /* get security strength (features) */
1353                                 result = sasl_getprop(conn, SASL_SSF,
1354                                                       (const void **) &ssf);
1355 # else /* SASL >= 20000 */
1356                                 result = sasl_getprop(conn, SASL_USERNAME,
1357                                                       (void **)&user);
1358                                 if (result != SASL_OK)
1359                                 {
1360                                         user = "";
1361                                         macdefine(&BlankEnvelope.e_macro,
1362                                                   A_PERM,
1363                                                   macid("{auth_authen}"), NULL);
1364                                 }
1365                                 else
1366                                 {
1367                                         macdefine(&BlankEnvelope.e_macro,
1368                                                   A_TEMP,
1369                                                   macid("{auth_authen}"),
1370                                                   xtextify(user, "<>\")"));
1371                                 }
1372
1373 # if 0
1374                                 /* get realm? */
1375                                 sasl_getprop(conn, SASL_REALM, (void **) &data);
1376 # endif /* 0 */
1377
1378                                 /* get security strength (features) */
1379                                 result = sasl_getprop(conn, SASL_SSF,
1380                                                       (void **) &ssf);
1381 # endif /* SASL >= 20000 */
1382                                 if (result != SASL_OK)
1383                                 {
1384                                         macdefine(&BlankEnvelope.e_macro,
1385                                                   A_PERM,
1386                                                   macid("{auth_ssf}"), "0");
1387                                         ssf = NULL;
1388                                 }
1389                                 else
1390                                 {
1391                                         char pbuf[8];
1392
1393                                         (void) sm_snprintf(pbuf, sizeof(pbuf),
1394                                                            "%u", *ssf);
1395                                         macdefine(&BlankEnvelope.e_macro,
1396                                                   A_TEMP,
1397                                                   macid("{auth_ssf}"), pbuf);
1398                                         if (tTd(95, 8))
1399                                                 sm_dprintf("AUTH auth_ssf: %u\n",
1400                                                            *ssf);
1401                                 }
1402
1403                                 /*
1404                                 **  Only switch to encrypted connection
1405                                 **  if a security layer has been negotiated
1406                                 */
1407
1408                                 if (ssf != NULL && *ssf > 0)
1409                                 {
1410                                         int tmo;
1411
1412                                         /*
1413                                         **  Convert I/O layer to use SASL.
1414                                         **  If the call fails, the connection
1415                                         **  is aborted.
1416                                         */
1417
1418                                         tmo = TimeOuts.to_datablock * 1000;
1419                                         if (sfdcsasl(&InChannel, &OutChannel,
1420                                                      conn, tmo) == 0)
1421                                         {
1422                                                 /* restart dialogue */
1423                                                 n_helo = 0;
1424 # if PIPELINING
1425                                                 (void) sm_io_autoflush(InChannel,
1426                                                                        OutChannel);
1427 # endif /* PIPELINING */
1428                                         }
1429                                         else
1430                                                 syserr("503 5.3.3 SASL TLS failed");
1431                                 }
1432
1433                                 /* NULL pointer ok since it's our function */
1434                                 if (LogLevel > 8)
1435                                         sm_syslog(LOG_INFO, NOQID,
1436                                                   "AUTH=server, relay=%s, authid=%.128s, mech=%.16s, bits=%d",
1437                                                   CurSmtpClient,
1438                                                   shortenstring(user, 128),
1439                                                   auth_type, *ssf);
1440                         }
1441                         else if (result == SASL_CONTINUE)
1442                         {
1443                                 len = ENC64LEN(outlen);
1444                                 out2 = xalloc(len);
1445                                 result = sasl_encode64(out, outlen, out2, len,
1446                                                        &out2len);
1447                                 if (result != SASL_OK)
1448                                 {
1449                                         /* correct code? XXX */
1450                                         /* 454 Temp. authentication failure */
1451                                         message("454 4.5.4 Internal error: unable to encode64");
1452                                         if (LogLevel > 5)
1453                                                 sm_syslog(LOG_WARNING, e->e_id,
1454                                                           "AUTH encode64 error [%d for \"%s\"], relay=%.100s",
1455                                                           result, out,
1456                                                           CurSmtpClient);
1457                                         /* start over? */
1458                                         authenticating = SASL_NOT_AUTH;
1459                                 }
1460                                 else
1461                                 {
1462                                         message("334 %s", out2);
1463                                         if (tTd(95, 2))
1464                                                 sm_dprintf("AUTH continue: msg='%s' len=%u\n",
1465                                                            out2, out2len);
1466                                 }
1467 # if SASL >= 20000
1468                                 sm_free(out2);
1469 # endif /* SASL >= 20000 */
1470                         }
1471                         else
1472                         {
1473                                 /* not SASL_OK or SASL_CONT */
1474                                 message("535 5.7.0 authentication failed");
1475                                 if (LogLevel > 9)
1476                                         sm_syslog(LOG_WARNING, e->e_id,
1477                                                   "AUTH failure (%s): %s (%d) %s, relay=%.100s",
1478                                                   auth_type,
1479                                                   sasl_errstring(result, NULL,
1480                                                                  NULL),
1481                                                   result,
1482 # if SASL >= 20000
1483                                                   sasl_errdetail(conn),
1484 # else /* SASL >= 20000 */
1485                                                   errstr == NULL ? "" : errstr,
1486 # endif /* SASL >= 20000 */
1487                                                   CurSmtpClient);
1488                                 RESET_SASLCONN;
1489                                 authenticating = SASL_NOT_AUTH;
1490                         }
1491                 }
1492                 else
1493                 {
1494                         /* don't want to do any of this if authenticating */
1495 #endif /* SASL */
1496
1497                 /* echo command to transcript */
1498                 if (e->e_xfp != NULL)
1499                         (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
1500                                              "<<< %s\n", inp);
1501
1502                 if (LogLevel > 14)
1503                         sm_syslog(LOG_INFO, e->e_id, "<-- %s", inp);
1504
1505                 /* break off command */
1506                 for (p = inp; isascii(*p) && isspace(*p); p++)
1507                         continue;
1508                 cmd = cmdbuf;
1509                 while (*p != '\0' &&
1510                        !(isascii(*p) && isspace(*p)) &&
1511                        cmd < &cmdbuf[sizeof(cmdbuf) - 2])
1512                         *cmd++ = *p++;
1513                 *cmd = '\0';
1514
1515                 /* throw away leading whitespace */
1516                 SKIP_SPACE(p);
1517
1518                 /* decode command */
1519                 for (c = CmdTab; c->cmd_name != NULL; c++)
1520                 {
1521                         if (sm_strcasecmp(c->cmd_name, cmdbuf) == 0)
1522                                 break;
1523                 }
1524
1525                 /* reset errors */
1526                 errno = 0;
1527
1528                 /* check whether a "non-null" command has been used */
1529                 switch (c->cmd_code)
1530                 {
1531 #if SASL
1532                   case CMDAUTH:
1533                         /* avoid information leak; take first two words? */
1534                         q = "AUTH";
1535                         break;
1536 #endif /* SASL */
1537
1538                   case CMDMAIL:
1539                   case CMDEXPN:
1540                   case CMDVRFY:
1541                   case CMDETRN:
1542                         lognullconnection = false;
1543                         /* FALLTHROUGH */
1544                   default:
1545                         q = inp;
1546                         break;
1547                 }
1548
1549                 if (e->e_id == NULL)
1550                         sm_setproctitle(true, e, "%s: %.80s",
1551                                         CurSmtpClient, q);
1552                 else
1553                         sm_setproctitle(true, e, "%s %s: %.80s",
1554                                         qid_printname(e),
1555                                         CurSmtpClient, q);
1556
1557                 /*
1558                 **  Process command.
1559                 **
1560                 **      If we are running as a null server, return 550
1561                 **      to almost everything.
1562                 */
1563
1564                 if (nullserver != NULL || bitnset(D_ETRNONLY, d_flags))
1565                 {
1566                         switch (c->cmd_code)
1567                         {
1568                           case CMDQUIT:
1569                           case CMDHELO:
1570                           case CMDEHLO:
1571                           case CMDNOOP:
1572                           case CMDRSET:
1573                           case CMDERROR:
1574                                 /* process normally */
1575                                 break;
1576
1577                           case CMDETRN:
1578                                 if (bitnset(D_ETRNONLY, d_flags) &&
1579                                     nullserver == NULL)
1580                                         break;
1581                                 DELAY_CONN("ETRN");
1582                                 /* FALLTHROUGH */
1583
1584                           default:
1585 #if MAXBADCOMMANDS > 0
1586                                 /* theoretically this could overflow */
1587                                 if (nullserver != NULL &&
1588                                     ++n_badcmds > MAXBADCOMMANDS)
1589                                 {
1590                                         message("421 4.7.0 %s Too many bad commands; closing connection",
1591                                                 MyHostName);
1592
1593                                         /* arrange to ignore send list */
1594                                         e->e_sendqueue = NULL;
1595                                         goto doquit;
1596                                 }
1597 #endif /* MAXBADCOMMANDS > 0 */
1598                                 if (nullserver != NULL)
1599                                 {
1600                                         if (ISSMTPREPLY(nullserver))
1601                                                 usrerr(nullserver);
1602                                         else
1603                                                 usrerr("550 5.0.0 %s",
1604                                                        nullserver);
1605                                 }
1606                                 else
1607                                         usrerr("452 4.4.5 Insufficient disk space; try again later");
1608                                 continue;
1609                         }
1610                 }
1611
1612                 switch (c->cmd_code)
1613                 {
1614 #if SASL
1615                   case CMDAUTH: /* sasl */
1616                         DELAY_CONN("AUTH");
1617                         if (!sasl_ok || n_mechs <= 0)
1618                         {
1619                                 message("503 5.3.3 AUTH not available");
1620                                 break;
1621                         }
1622                         if (authenticating == SASL_IS_AUTH)
1623                         {
1624                                 message("503 5.5.0 Already Authenticated");
1625                                 break;
1626                         }
1627                         if (smtp.sm_gotmail)
1628                         {
1629                                 message("503 5.5.0 AUTH not permitted during a mail transaction");
1630                                 break;
1631                         }
1632                         if (tempfail)
1633                         {
1634                                 if (LogLevel > 9)
1635                                         sm_syslog(LOG_INFO, e->e_id,
1636                                                   "SMTP AUTH command (%.100s) from %s tempfailed (due to previous checks)",
1637                                                   p, CurSmtpClient);
1638                                 usrerr("454 4.3.0 Please try again later");
1639                                 break;
1640                         }
1641
1642                         ismore = false;
1643
1644                         /* crude way to avoid crack attempts */
1645                         STOP_IF_ATTACK(checksmtpattack(&n_auth, n_mechs + 1,
1646                                                         true, "AUTH", e));
1647
1648                         /* make sure mechanism (p) is a valid string */
1649                         for (q = p; *q != '\0' && isascii(*q); q++)
1650                         {
1651                                 if (isspace(*q))
1652                                 {
1653                                         *q = '\0';
1654                                         while (*++q != '\0' &&
1655                                                isascii(*q) && isspace(*q))
1656                                                 continue;
1657                                         *(q - 1) = '\0';
1658                                         ismore = (*q != '\0');
1659                                         break;
1660                                 }
1661                         }
1662
1663                         if (*p == '\0')
1664                         {
1665                                 message("501 5.5.2 AUTH mechanism must be specified");
1666                                 break;
1667                         }
1668
1669                         /* check whether mechanism is available */
1670                         if (iteminlist(p, mechlist, " ") == NULL)
1671                         {
1672                                 message("504 5.3.3 AUTH mechanism %.32s not available",
1673                                         p);
1674                                 break;
1675                         }
1676
1677                         /*
1678                         **  RFC 2554 4.
1679                         **  Unlike a zero-length client answer to a
1680                         **  334 reply, a zero- length initial response
1681                         **  is sent as a single equals sign ("=").
1682                         */
1683
1684                         if (ismore && *q == '=' && *(q + 1) == '\0')
1685                         {
1686                                 /* will be free()d, don't use in=""; */
1687                                 in = xalloc(1);
1688                                 *in = '\0';
1689                                 inlen = 0;
1690                         }
1691                         else if (ismore)
1692                         {
1693                                 /* could this be shorter? XXX */
1694 # if SASL >= 20000
1695                                 in = xalloc(strlen(q) + 1);
1696                                 result = sasl_decode64(q, strlen(q), in,
1697                                                        strlen(q), &inlen);
1698 # else /* SASL >= 20000 */
1699                                 in = sm_rpool_malloc(e->e_rpool, strlen(q));
1700                                 result = sasl_decode64(q, strlen(q), in,
1701                                                        &inlen);
1702 # endif /* SASL >= 20000 */
1703                                 if (result != SASL_OK)
1704                                 {
1705                                         message("501 5.5.4 cannot BASE64 decode '%s'",
1706                                                 q);
1707                                         if (LogLevel > 5)
1708                                                 sm_syslog(LOG_WARNING, e->e_id,
1709                                                           "AUTH decode64 error [%d for \"%s\"], relay=%.100s",
1710                                                           result, q,
1711                                                           CurSmtpClient);
1712                                         /* start over? */
1713                                         authenticating = SASL_NOT_AUTH;
1714 # if SASL >= 20000
1715                                         sm_free(in);
1716 # endif /* SASL >= 20000 */
1717                                         in = NULL;
1718                                         inlen = 0;
1719                                         break;
1720                                 }
1721                         }
1722                         else
1723                         {
1724                                 in = NULL;
1725                                 inlen = 0;
1726                         }
1727
1728                         /* see if that auth type exists */
1729 # if SASL >= 20000
1730                         result = sasl_server_start(conn, p, in, inlen,
1731                                                    &out, &outlen);
1732                         if (in != NULL)
1733                                 sm_free(in);
1734 # else /* SASL >= 20000 */
1735                         result = sasl_server_start(conn, p, in, inlen,
1736                                                    &out, &outlen, &errstr);
1737 # endif /* SASL >= 20000 */
1738
1739                         if (result != SASL_OK && result != SASL_CONTINUE)
1740                         {
1741                                 message("535 5.7.0 authentication failed");
1742                                 if (LogLevel > 9)
1743                                         sm_syslog(LOG_ERR, e->e_id,
1744                                                   "AUTH failure (%s): %s (%d) %s, relay=%.100s",
1745                                                   p,
1746                                                   sasl_errstring(result, NULL,
1747                                                                  NULL),
1748                                                   result,
1749 # if SASL >= 20000
1750                                                   sasl_errdetail(conn),
1751 # else /* SASL >= 20000 */
1752                                                   errstr,
1753 # endif /* SASL >= 20000 */
1754                                                   CurSmtpClient);
1755                                 RESET_SASLCONN;
1756                                 break;
1757                         }
1758                         auth_type = newstr(p);
1759
1760                         if (result == SASL_OK)
1761                         {
1762                                 /* ugly, but same code */
1763                                 goto authenticated;
1764                                 /* authenticated by the initial response */
1765                         }
1766
1767                         /* len is at least 2 */
1768                         len = ENC64LEN(outlen);
1769                         out2 = xalloc(len);
1770                         result = sasl_encode64(out, outlen, out2, len,
1771                                                &out2len);
1772
1773                         if (result != SASL_OK)
1774                         {
1775                                 message("454 4.5.4 Temporary authentication failure");
1776                                 if (LogLevel > 5)
1777                                         sm_syslog(LOG_WARNING, e->e_id,
1778                                                   "AUTH encode64 error [%d for \"%s\"]",
1779                                                   result, out);
1780
1781                                 /* start over? */
1782                                 authenticating = SASL_NOT_AUTH;
1783                                 RESET_SASLCONN;
1784                         }
1785                         else
1786                         {
1787                                 message("334 %s", out2);
1788                                 authenticating = SASL_PROC_AUTH;
1789                         }
1790 # if SASL >= 20000
1791                         sm_free(out2);
1792 # endif /* SASL >= 20000 */
1793                         break;
1794 #endif /* SASL */
1795
1796 #if STARTTLS
1797                   case CMDSTLS: /* starttls */
1798                         DELAY_CONN("STARTTLS");
1799                         if (*p != '\0')
1800                         {
1801                                 message("501 5.5.2 Syntax error (no parameters allowed)");
1802                                 break;
1803                         }
1804                         if (!bitset(SRV_OFFER_TLS, features))
1805                         {
1806                                 message("503 5.5.0 TLS not available");
1807                                 break;
1808                         }
1809                         if (!tls_ok_srv)
1810                         {
1811                                 message("454 4.3.3 TLS not available after start");
1812                                 break;
1813                         }
1814                         if (smtp.sm_gotmail)
1815                         {
1816                                 message("503 5.5.0 TLS not permitted during a mail transaction");
1817                                 break;
1818                         }
1819                         if (tempfail)
1820                         {
1821                                 if (LogLevel > 9)
1822                                         sm_syslog(LOG_INFO, e->e_id,
1823                                                   "SMTP STARTTLS command (%.100s) from %s tempfailed (due to previous checks)",
1824                                                   p, CurSmtpClient);
1825                                 usrerr("454 4.7.0 Please try again later");
1826                                 break;
1827                         }
1828   starttls:
1829 # if USE_OPENSSL_ENGINE
1830                         if (!SSLEngineInitialized)
1831                         {
1832                                 if (!SSL_set_engine(NULL))
1833                                 {
1834                                         sm_syslog(LOG_ERR, NOQID,
1835                                                   "STARTTLS=server, SSL_set_engine=failed");
1836                                         tls_ok_srv = false;
1837                                         message("454 4.3.3 TLS not available right now");
1838                                         break;
1839                                 }
1840                                 else
1841                                         SSLEngineInitialized = true;
1842                         }
1843 # endif /* USE_OPENSSL_ENGINE */
1844 # if TLS_NO_RSA
1845                         /*
1846                         **  XXX do we need a temp key ?
1847                         */
1848 # else /* TLS_NO_RSA */
1849 # endif /* TLS_NO_RSA */
1850
1851 # if TLS_VRFY_PER_CTX
1852                         /*
1853                         **  Note: this sets the verification globally
1854                         **  (per SSL_CTX)
1855                         **  it's ok since it applies only to one transaction
1856                         */
1857
1858                         TLS_VERIFY_CLIENT();
1859 # endif /* TLS_VRFY_PER_CTX */
1860
1861                         if (srv_ssl != NULL)
1862                                 SSL_clear(srv_ssl);
1863                         else if ((srv_ssl = SSL_new(srv_ctx)) == NULL)
1864                         {
1865                                 message("454 4.3.3 TLS not available: error generating SSL handle");
1866                                 if (LogLevel > 8)
1867                                         tlslogerr(LOG_WARNING, "server");
1868                                 goto tls_done;
1869                         }
1870
1871 # if !TLS_VRFY_PER_CTX
1872                         /*
1873                         **  this could be used if it were possible to set
1874                         **  verification per SSL (connection)
1875                         **  not just per SSL_CTX (global)
1876                         */
1877
1878                         TLS_VERIFY_CLIENT();
1879 # endif /* !TLS_VRFY_PER_CTX */
1880
1881                         rfd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
1882                         wfd = sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL);
1883
1884                         if (rfd < 0 || wfd < 0 ||
1885                             SSL_set_rfd(srv_ssl, rfd) <= 0 ||
1886                             SSL_set_wfd(srv_ssl, wfd) <= 0)
1887                         {
1888                                 message("454 4.3.3 TLS not available: error set fd");
1889                                 SSL_free(srv_ssl);
1890                                 srv_ssl = NULL;
1891                                 goto tls_done;
1892                         }
1893                         if (!smtps)
1894                                 message("220 2.0.0 Ready to start TLS");
1895 # if PIPELINING
1896                         (void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
1897 # endif /* PIPELINING */
1898
1899                         SSL_set_accept_state(srv_ssl);
1900
1901 #  define SSL_ACC(s)    SSL_accept(s)
1902
1903                         tlsstart = curtime();
1904   ssl_retry:
1905                         if ((r = SSL_ACC(srv_ssl)) <= 0)
1906                         {
1907                                 int i, ssl_err;
1908
1909                                 ssl_err = SSL_get_error(srv_ssl, r);
1910                                 i = tls_retry(srv_ssl, rfd, wfd, tlsstart,
1911                                                 TimeOuts.to_starttls, ssl_err,
1912                                                 "server");
1913                                 if (i > 0)
1914                                         goto ssl_retry;
1915
1916                                 if (LogLevel > 5)
1917                                 {
1918                                         unsigned long l;
1919                                         const char *sr;
1920
1921                                         l = ERR_peek_error();
1922                                         sr = ERR_reason_error_string(l);
1923                                         sm_syslog(LOG_WARNING, NOQID,
1924                                                   "STARTTLS=server, error: accept failed=%d, reason=%s, SSL_error=%d, errno=%d, retry=%d, relay=%.100s",
1925                                                   r, sr == NULL ? "unknown"
1926                                                                 : sr,
1927                                                   ssl_err, errno, i,
1928                                                   CurSmtpClient);
1929                                         if (LogLevel > 9)
1930                                                 tlslogerr(LOG_WARNING, "server");
1931                                 }
1932                                 tls_ok_srv = false;
1933                                 SSL_free(srv_ssl);
1934                                 srv_ssl = NULL;
1935
1936                                 /*
1937                                 **  according to the next draft of
1938                                 **  RFC 2487 the connection should be dropped
1939                                 */
1940
1941                                 /* arrange to ignore any current send list */
1942                                 e->e_sendqueue = NULL;
1943                                 goto doquit;
1944                         }
1945
1946                         /* ignore return code for now, it's in {verify} */
1947                         (void) tls_get_info(srv_ssl, true,
1948                                             CurSmtpClient,
1949                                             &BlankEnvelope.e_macro,
1950                                             bitset(SRV_VRFY_CLT, features));
1951
1952                         /*
1953                         **  call Stls_client to find out whether
1954                         **  to accept the connection from the client
1955                         */
1956
1957                         saveQuickAbort = QuickAbort;
1958                         saveSuprErrs = SuprErrs;
1959                         SuprErrs = true;
1960                         QuickAbort = false;
1961                         if (rscheck("tls_client",
1962                                      macvalue(macid("{verify}"), e),
1963                                      "STARTTLS", e,
1964                                      RSF_RMCOMM|RSF_COUNT,
1965                                      5, NULL, NOQID, NULL) != EX_OK ||
1966                             Errors > 0)
1967                         {
1968                                 extern char MsgBuf[];
1969
1970                                 if (MsgBuf[0] != '\0' && ISSMTPREPLY(MsgBuf))
1971                                         nullserver = newstr(MsgBuf);
1972                                 else
1973                                         nullserver = "503 5.7.0 Authentication required.";
1974                         }
1975                         QuickAbort = saveQuickAbort;
1976                         SuprErrs = saveSuprErrs;
1977
1978                         tls_ok_srv = false;     /* don't offer STARTTLS again */
1979                         n_helo = 0;
1980 # if SASL
1981                         if (sasl_ok)
1982                         {
1983                                 int cipher_bits;
1984                                 bool verified;
1985                                 char *s, *v, *c;
1986
1987                                 s = macvalue(macid("{cipher_bits}"), e);
1988                                 v = macvalue(macid("{verify}"), e);
1989                                 c = macvalue(macid("{cert_subject}"), e);
1990                                 verified = (v != NULL && strcmp(v, "OK") == 0);
1991                                 if (s != NULL && (cipher_bits = atoi(s)) > 0)
1992                                 {
1993 #  if SASL >= 20000
1994                                         ext_ssf = cipher_bits;
1995                                         auth_id = verified ? c : NULL;
1996                                         sasl_ok = ((sasl_setprop(conn,
1997                                                         SASL_SSF_EXTERNAL,
1998                                                         &ext_ssf) == SASL_OK) &&
1999                                                    (sasl_setprop(conn,
2000                                                         SASL_AUTH_EXTERNAL,
2001                                                         auth_id) == SASL_OK));
2002 #  else /* SASL >= 20000 */
2003                                         ext_ssf.ssf = cipher_bits;
2004                                         ext_ssf.auth_id = verified ? c : NULL;
2005                                         sasl_ok = sasl_setprop(conn,
2006                                                         SASL_SSF_EXTERNAL,
2007                                                         &ext_ssf) == SASL_OK;
2008 #  endif /* SASL >= 20000 */
2009                                         mechlist = NULL;
2010                                         if (sasl_ok)
2011                                                 n_mechs = saslmechs(conn,
2012                                                                     &mechlist);
2013                                 }
2014                         }
2015 # endif /* SASL */
2016
2017                         /* switch to secure connection */
2018                         if (sfdctls(&InChannel, &OutChannel, srv_ssl) == 0)
2019                         {
2020                                 tls_active = true;
2021 # if PIPELINING
2022                                 (void) sm_io_autoflush(InChannel, OutChannel);
2023 # endif /* PIPELINING */
2024                         }
2025                         else
2026                         {
2027                                 /*
2028                                 **  XXX this is an internal error
2029                                 **  how to deal with it?
2030                                 **  we can't generate an error message
2031                                 **  since the other side switched to an
2032                                 **  encrypted layer, but we could not...
2033                                 **  just "hang up"?
2034                                 */
2035
2036                                 nullserver = "454 4.3.3 TLS not available: can't switch to encrypted layer";
2037                                 syserr("STARTTLS: can't switch to encrypted layer");
2038                         }
2039                   tls_done:
2040                         if (smtps)
2041                         {
2042                                 if (tls_active)
2043                                         goto greeting;
2044                                 else
2045                                         goto doquit;
2046                         }
2047                         break;
2048 #endif /* STARTTLS */
2049
2050                   case CMDHELO:         /* hello -- introduce yourself */
2051                   case CMDEHLO:         /* extended hello */
2052                         DELAY_CONN("EHLO");
2053                         if (c->cmd_code == CMDEHLO)
2054                         {
2055                                 protocol = "ESMTP";
2056                                 SmtpPhase = "server EHLO";
2057                         }
2058                         else
2059                         {
2060                                 protocol = "SMTP";
2061                                 SmtpPhase = "server HELO";
2062                         }
2063
2064                         /* avoid denial-of-service */
2065                         STOP_IF_ATTACK(checksmtpattack(&n_helo, MAXHELOCOMMANDS,
2066                                                         true, "HELO/EHLO", e));
2067
2068 #if 0
2069                         /* RFC2821 4.1.4 allows duplicate HELO/EHLO */
2070                         /* check for duplicate HELO/EHLO per RFC 1651 4.2 */
2071                         if (gothello)
2072                         {
2073                                 usrerr("503 %s Duplicate HELO/EHLO",
2074                                        MyHostName);
2075                                 break;
2076                         }
2077 #endif /* 0 */
2078
2079                         /* check for valid domain name (re 1123 5.2.5) */
2080                         if (*p == '\0' && !AllowBogusHELO)
2081                         {
2082                                 usrerr("501 %s requires domain address",
2083                                         cmdbuf);
2084                                 break;
2085                         }
2086
2087                         /* check for long domain name (hides Received: info) */
2088                         if (strlen(p) > MAXNAME)
2089                         {
2090                                 usrerr("501 Invalid domain name");
2091                                 if (LogLevel > 9)
2092                                         sm_syslog(LOG_INFO, CurEnv->e_id,
2093                                                   "invalid domain name (too long) from %s",
2094                                                   CurSmtpClient);
2095                                 break;
2096                         }
2097
2098                         ok = true;
2099                         for (q = p; *q != '\0'; q++)
2100                         {
2101                                 if (!isascii(*q))
2102                                         break;
2103                                 if (isalnum(*q))
2104                                         continue;
2105                                 if (isspace(*q))
2106                                 {
2107                                         *q = '\0';
2108
2109                                         /* only complain if strict check */
2110                                         ok = AllowBogusHELO;
2111
2112                                         /* allow trailing whitespace */
2113                                         while (!ok && *++q != '\0' &&
2114                                                isspace(*q))
2115                                                 ;
2116                                         if (*q == '\0')
2117                                                 ok = true;
2118                                         break;
2119                                 }
2120                                 if (strchr("[].-_#:", *q) == NULL)
2121                                         break;
2122                         }
2123
2124                         if (*q == '\0' && ok)
2125                         {
2126                                 q = "pleased to meet you";
2127                                 sendinghost = sm_strdup_x(p);
2128                         }
2129                         else if (!AllowBogusHELO)
2130                         {
2131                                 usrerr("501 Invalid domain name");
2132                                 if (LogLevel > 9)
2133                                         sm_syslog(LOG_INFO, CurEnv->e_id,
2134                                                   "invalid domain name (%s) from %.100s",
2135                                                   p, CurSmtpClient);
2136                                 break;
2137                         }
2138                         else
2139                         {
2140                                 q = "accepting invalid domain name";
2141                         }
2142
2143                         if (gothello || smtp.sm_gotmail)
2144                                 CLEAR_STATE(cmdbuf);
2145
2146 #if MILTER
2147                         if (smtp.sm_milterlist && smtp.sm_milterize &&
2148                             !bitset(EF_DISCARD, e->e_flags))
2149                         {
2150                                 char state;
2151                                 char *response;
2152
2153                                 response = milter_helo(p, e, &state);
2154                                 switch (state)
2155                                 {
2156                                   case SMFIR_REJECT:
2157                                         if (MilterLogLevel > 3)
2158                                                 sm_syslog(LOG_INFO, e->e_id,
2159                                                           "Milter: helo=%s, reject=Command rejected",
2160                                                           p);
2161                                         nullserver = "Command rejected";
2162                                         smtp.sm_milterize = false;
2163                                         break;
2164
2165                                   case SMFIR_TEMPFAIL:
2166                                         if (MilterLogLevel > 3)
2167                                                 sm_syslog(LOG_INFO, e->e_id,
2168                                                           "Milter: helo=%s, reject=%s",
2169                                                           p, MSG_TEMPFAIL);
2170                                         tempfail = true;
2171                                         smtp.sm_milterize = false;
2172                                         break;
2173
2174                                   case SMFIR_REPLYCODE:
2175                                         if (MilterLogLevel > 3)
2176                                                 sm_syslog(LOG_INFO, e->e_id,
2177                                                           "Milter: helo=%s, reject=%s",
2178                                                           p, response);
2179                                         if (strncmp(response, "421 ", 4) != 0
2180                                             && strncmp(response, "421-", 4) != 0)
2181                                         {
2182                                                 nullserver = newstr(response);
2183                                                 smtp.sm_milterize = false;
2184                                                 break;
2185                                         }
2186                                         /* FALLTHROUGH */
2187
2188                                   case SMFIR_SHUTDOWN:
2189                                         if (MilterLogLevel > 3 &&
2190                                             response == NULL)
2191                                                 sm_syslog(LOG_INFO, e->e_id,
2192                                                           "Milter: helo=%s, reject=421 4.7.0 %s closing connection",
2193                                                           p, MyHostName);
2194                                         tempfail = true;
2195                                         smtp.sm_milterize = false;
2196                                         if (response != NULL)
2197                                                 usrerr(response);
2198                                         else
2199                                                 message("421 4.7.0 %s closing connection",
2200                                                         MyHostName);
2201                                         /* arrange to ignore send list */
2202                                         e->e_sendqueue = NULL;
2203                                         lognullconnection = false;
2204                                         goto doquit;
2205                                 }
2206                                 if (response != NULL)
2207                                         sm_free(response);
2208
2209                                 /*
2210                                 **  If quarantining by a connect/ehlo action,
2211                                 **  save between messages
2212                                 */
2213
2214                                 if (smtp.sm_quarmsg == NULL &&
2215                                     e->e_quarmsg != NULL)
2216                                         smtp.sm_quarmsg = newstr(e->e_quarmsg);
2217                         }
2218 #endif /* MILTER */
2219                         gothello = true;
2220
2221                         /* print HELO response message */
2222                         if (c->cmd_code != CMDEHLO)
2223                         {
2224                                 message("250 %s Hello %s, %s",
2225                                         MyHostName, CurSmtpClient, q);
2226                                 break;
2227                         }
2228
2229                         message("250-%s Hello %s, %s",
2230                                 MyHostName, CurSmtpClient, q);
2231
2232                         /* offer ENHSC even for nullserver */
2233                         if (nullserver != NULL)
2234                         {
2235                                 message("250 ENHANCEDSTATUSCODES");
2236                                 break;
2237                         }
2238
2239                         /*
2240                         **  print EHLO features list
2241                         **
2242                         **  Note: If you change this list,
2243                         **        remember to update 'helpfile'
2244                         */
2245
2246                         message("250-ENHANCEDSTATUSCODES");
2247 #if PIPELINING
2248                         if (bitset(SRV_OFFER_PIPE, features))
2249                                 message("250-PIPELINING");
2250 #endif /* PIPELINING */
2251                         if (bitset(SRV_OFFER_EXPN, features))
2252                         {
2253                                 message("250-EXPN");
2254                                 if (bitset(SRV_OFFER_VERB, features))
2255                                         message("250-VERB");
2256                         }
2257 #if MIME8TO7
2258                         message("250-8BITMIME");
2259 #endif /* MIME8TO7 */
2260                         if (MaxMessageSize > 0)
2261                                 message("250-SIZE %ld", MaxMessageSize);
2262                         else
2263                                 message("250-SIZE");
2264 #if DSN
2265                         if (SendMIMEErrors && bitset(SRV_OFFER_DSN, features))
2266                                 message("250-DSN");
2267 #endif /* DSN */
2268                         if (bitset(SRV_OFFER_ETRN, features))
2269                                 message("250-ETRN");
2270 #if SASL
2271                         if (sasl_ok && mechlist != NULL && *mechlist != '\0')
2272                                 message("250-AUTH %s", mechlist);
2273 #endif /* SASL */
2274 #if STARTTLS
2275                         if (tls_ok_srv && bitset(SRV_OFFER_TLS, features))
2276                                 message("250-STARTTLS");
2277 #endif /* STARTTLS */
2278                         if (DeliverByMin > 0)
2279                                 message("250-DELIVERBY %ld",
2280                                         (long) DeliverByMin);
2281                         else if (DeliverByMin == 0)
2282                                 message("250-DELIVERBY");
2283
2284                         /* < 0: no deliver-by */
2285
2286                         message("250 HELP");
2287                         break;
2288
2289                   case CMDMAIL:         /* mail -- designate sender */
2290                         SmtpPhase = "server MAIL";
2291                         DELAY_CONN("MAIL");
2292
2293                         /* check for validity of this command */
2294                         if (!gothello && bitset(PRIV_NEEDMAILHELO, PrivacyFlags))
2295                         {
2296                                 usrerr("503 5.0.0 Polite people say HELO first");
2297                                 break;
2298                         }
2299                         if (smtp.sm_gotmail)
2300                         {
2301                                 usrerr("503 5.5.0 Sender already specified");
2302                                 break;
2303                         }
2304 #if SASL
2305                         if (bitset(SRV_REQ_AUTH, features) &&
2306                             authenticating != SASL_IS_AUTH)
2307                         {
2308                                 usrerr("530 5.7.0 Authentication required");
2309                                 break;
2310                         }
2311 #endif /* SASL */
2312
2313                         p = skipword(p, "from");
2314                         if (p == NULL)
2315                                 break;
2316                         if (tempfail)
2317                         {
2318                                 if (LogLevel > 9)
2319                                         sm_syslog(LOG_INFO, e->e_id,
2320                                                   "SMTP MAIL command (%.100s) from %s tempfailed (due to previous checks)",
2321                                                   p, CurSmtpClient);
2322                                 usrerr(MSG_TEMPFAIL);
2323                                 break;
2324                         }
2325
2326                         /* make sure we know who the sending host is */
2327                         if (sendinghost == NULL)
2328                                 sendinghost = peerhostname;
2329
2330
2331 #if SM_HEAP_CHECK
2332                         if (sm_debug_active(&DebugLeakSmtp, 1))
2333                         {
2334                                 sm_heap_newgroup();
2335                                 sm_dprintf("smtp() heap group #%d\n",
2336                                         sm_heap_group());
2337                         }
2338 #endif /* SM_HEAP_CHECK */
2339
2340                         if (Errors > 0)
2341                                 goto undo_no_pm;
2342                         if (!gothello)
2343                         {
2344                                 auth_warning(e, "%s didn't use HELO protocol",
2345                                              CurSmtpClient);
2346                         }
2347 #ifdef PICKY_HELO_CHECK
2348                         if (sm_strcasecmp(sendinghost, peerhostname) != 0 &&
2349                             (sm_strcasecmp(peerhostname, "localhost") != 0 ||
2350                              sm_strcasecmp(sendinghost, MyHostName) != 0))
2351                         {
2352                                 auth_warning(e, "Host %s claimed to be %s",
2353                                              CurSmtpClient, sendinghost);
2354                         }
2355 #endif /* PICKY_HELO_CHECK */
2356
2357                         if (protocol == NULL)
2358                                 protocol = "SMTP";
2359                         macdefine(&e->e_macro, A_PERM, 'r', protocol);
2360                         macdefine(&e->e_macro, A_PERM, 's', sendinghost);
2361
2362                         if (Errors > 0)
2363                                 goto undo_no_pm;
2364                         smtp.sm_nrcpts = 0;
2365                         n_badrcpts = 0;
2366                         macdefine(&e->e_macro, A_PERM, macid("{ntries}"), "0");
2367                         macdefine(&e->e_macro, A_PERM, macid("{nrcpts}"), "0");
2368                         macdefine(&e->e_macro, A_PERM, macid("{nbadrcpts}"),
2369                                 "0");
2370                         e->e_flags |= EF_CLRQUEUE;
2371                         sm_setproctitle(true, e, "%s %s: %.80s",
2372                                         qid_printname(e),
2373                                         CurSmtpClient, inp);
2374
2375                         /* do the processing */
2376                     SM_TRY
2377                     {
2378                         extern char *FullName;
2379
2380                         QuickAbort = true;
2381                         SM_FREE_CLR(FullName);
2382
2383                         /* must parse sender first */
2384                         delimptr = NULL;
2385                         setsender(p, e, &delimptr, ' ', false);
2386                         if (delimptr != NULL && *delimptr != '\0')
2387                                 *delimptr++ = '\0';
2388                         if (Errors > 0)
2389                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2390
2391                         /* Successfully set e_from, allow logging */
2392                         e->e_flags |= EF_LOGSENDER;
2393
2394                         /* put resulting triple from parseaddr() into macros */
2395                         if (e->e_from.q_mailer != NULL)
2396                                  macdefine(&e->e_macro, A_PERM,
2397                                         macid("{mail_mailer}"),
2398                                         e->e_from.q_mailer->m_name);
2399                         else
2400                                  macdefine(&e->e_macro, A_PERM,
2401                                         macid("{mail_mailer}"), NULL);
2402                         if (e->e_from.q_host != NULL)
2403                                 macdefine(&e->e_macro, A_PERM,
2404                                         macid("{mail_host}"),
2405                                         e->e_from.q_host);
2406                         else
2407                                 macdefine(&e->e_macro, A_PERM,
2408                                         macid("{mail_host}"), "localhost");
2409                         if (e->e_from.q_user != NULL)
2410                                 macdefine(&e->e_macro, A_PERM,
2411                                         macid("{mail_addr}"),
2412                                         e->e_from.q_user);
2413                         else
2414                                 macdefine(&e->e_macro, A_PERM,
2415                                         macid("{mail_addr}"), NULL);
2416                         if (Errors > 0)
2417                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2418
2419                         /* check for possible spoofing */
2420                         if (RealUid != 0 && OpMode == MD_SMTP &&
2421                             !wordinclass(RealUserName, 't') &&
2422                             (!bitnset(M_LOCALMAILER,
2423                                       e->e_from.q_mailer->m_flags) ||
2424                              strcmp(e->e_from.q_user, RealUserName) != 0))
2425                         {
2426                                 auth_warning(e, "%s owned process doing -bs",
2427                                         RealUserName);
2428                         }
2429
2430                         /* reset to default value */
2431                         SevenBitInput = SevenBitInput_Saved;
2432
2433                         /* now parse ESMTP arguments */
2434                         e->e_msgsize = 0;
2435                         addr = p;
2436                         parse_esmtp_args(e, NULL, p, delimptr, "MAIL", args,
2437                                         mail_esmtp_args);
2438                         if (Errors > 0)
2439                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2440
2441 #if SASL
2442 # if _FFR_AUTH_PASSING
2443                         /* set the default AUTH= if the sender didn't */
2444                         if (e->e_auth_param == NULL)
2445                         {
2446                                 /* XXX only do this for an MSA? */
2447                                 e->e_auth_param = macvalue(macid("{auth_authen}"),
2448                                                            e);
2449                                 if (e->e_auth_param == NULL)
2450                                         e->e_auth_param = "<>";
2451
2452                                 /*
2453                                 **  XXX should we invoke Strust_auth now?
2454                                 **  authorizing as the client that just
2455                                 **  authenticated, so we'll trust implicitly
2456                                 */
2457                         }
2458 # endif /* _FFR_AUTH_PASSING */
2459 #endif /* SASL */
2460
2461                         /* do config file checking of the sender */
2462                         macdefine(&e->e_macro, A_PERM,
2463                                 macid("{addr_type}"), "e s");
2464 #if _FFR_MAIL_MACRO
2465                         /* make the "real" sender address available */
2466                         macdefine(&e->e_macro, A_TEMP, macid("{mail_from}"),
2467                                   e->e_from.q_paddr);
2468 #endif /* _FFR_MAIL_MACRO */
2469                         if (rscheck("check_mail", addr,
2470                                     NULL, e, RSF_RMCOMM|RSF_COUNT, 3,
2471                                     NULL, e->e_id, NULL) != EX_OK ||
2472                             Errors > 0)
2473                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2474                         macdefine(&e->e_macro, A_PERM,
2475                                   macid("{addr_type}"), NULL);
2476
2477                         if (MaxMessageSize > 0 &&
2478                             (e->e_msgsize > MaxMessageSize ||
2479                              e->e_msgsize < 0))
2480                         {
2481                                 usrerr("552 5.2.3 Message size exceeds fixed maximum message size (%ld)",
2482                                         MaxMessageSize);
2483                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2484                         }
2485
2486                         /*
2487                         **  XXX always check whether there is at least one fs
2488                         **  with enough space?
2489                         **  However, this may not help much: the queue group
2490                         **  selection may later on select a FS that hasn't
2491                         **  enough space.
2492                         */
2493
2494                         if ((NumFileSys == 1 || NumQueue == 1) &&
2495                             !enoughdiskspace(e->e_msgsize, e)
2496 #if _FFR_ANY_FREE_FS
2497                             && !filesys_free(e->e_msgsize)
2498 #endif /* _FFR_ANY_FREE_FS */
2499                            )
2500                         {
2501                                 /*
2502                                 **  We perform this test again when the
2503                                 **  queue directory is selected, in collect.
2504                                 */
2505
2506                                 usrerr("452 4.4.5 Insufficient disk space; try again later");
2507                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2508                         }
2509                         if (Errors > 0)
2510                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2511
2512                         LogUsrErrs = true;
2513 #if MILTER
2514                         if (smtp.sm_milterlist && smtp.sm_milterize &&
2515                             !bitset(EF_DISCARD, e->e_flags))
2516                         {
2517                                 char state;
2518                                 char *response;
2519
2520                                 response = milter_envfrom(args, e, &state);
2521                                 MILTER_REPLY("from");
2522                         }
2523 #endif /* MILTER */
2524                         if (Errors > 0)
2525                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2526
2527                         message("250 2.1.0 Sender ok");
2528                         smtp.sm_gotmail = true;
2529                     }
2530                     SM_EXCEPT(exc, "[!F]*")
2531                     {
2532                         /*
2533                         **  An error occurred while processing a MAIL command.
2534                         **  Jump to the common error handling code.
2535                         */
2536
2537                         sm_exc_free(exc);
2538                         goto undo_no_pm;
2539                     }
2540                     SM_END_TRY
2541                         break;
2542
2543                   undo_no_pm:
2544                         e->e_flags &= ~EF_PM_NOTIFY;
2545                   undo:
2546                         break;
2547
2548                   case CMDRCPT:         /* rcpt -- designate recipient */
2549                         DELAY_CONN("RCPT");
2550                         macdefine(&e->e_macro, A_PERM,
2551                                 macid("{rcpt_mailer}"), NULL);
2552                         macdefine(&e->e_macro, A_PERM,
2553                                 macid("{rcpt_host}"), NULL);
2554                         macdefine(&e->e_macro, A_PERM,
2555                                 macid("{rcpt_addr}"), NULL);
2556 #if MILTER
2557                         (void) memset(&addr_st, '\0', sizeof(addr_st));
2558                         a = NULL;
2559                         milter_rcpt_added = false;
2560                         smtp.sm_e_nrcpts_orig = e->e_nrcpts;
2561 #endif
2562 #if _FFR_BADRCPT_SHUTDOWN
2563                         /*
2564                         **  hack to deal with hack, see below:
2565                         **  n_badrcpts is increased if limit is reached.
2566                         */
2567
2568                         n_badrcpts_adj = (BadRcptThrottle > 0 &&
2569                                           n_badrcpts > BadRcptThrottle &&
2570                                           LogLevel > 5)
2571                                           ? n_badrcpts - 1 : n_badrcpts;
2572                         if (BadRcptShutdown > 0 &&
2573                             n_badrcpts_adj >= BadRcptShutdown &&
2574                             (BadRcptShutdownGood == 0 ||
2575                              smtp.sm_nrcpts == 0 ||
2576                              (n_badrcpts_adj * 100 /
2577                               (smtp.sm_nrcpts + n_badrcpts) >=
2578                               BadRcptShutdownGood)))
2579                         {
2580                                 if (LogLevel > 5)
2581                                         sm_syslog(LOG_INFO, e->e_id,
2582                                                   "%s: Possible SMTP RCPT flood, shutting down connection.",
2583                                                   CurSmtpClient);
2584                                 message("421 4.7.0 %s Too many bad recipients; closing connection",
2585                                 MyHostName);
2586
2587                                 /* arrange to ignore any current send list */
2588                                 e->e_sendqueue = NULL;
2589                                 goto doquit;
2590                         }
2591 #endif /* _FFR_BADRCPT_SHUTDOWN */
2592                         if (BadRcptThrottle > 0 &&
2593                             n_badrcpts >= BadRcptThrottle)
2594                         {
2595                                 if (LogLevel > 5 &&
2596                                     n_badrcpts == BadRcptThrottle)
2597                                 {
2598                                         sm_syslog(LOG_INFO, e->e_id,
2599                                                   "%s: Possible SMTP RCPT flood, throttling.",
2600                                                   CurSmtpClient);
2601
2602                                         /* To avoid duplicated message */
2603                                         n_badrcpts++;
2604                                 }
2605                                 NBADRCPTS;
2606
2607                                 /*
2608                                 **  Don't use exponential backoff for now.
2609                                 **  Some systems will open more connections
2610                                 **  and actually overload the receiver even
2611                                 **  more.
2612                                 */
2613
2614                                 (void) sleep(BadRcptThrottleDelay);
2615                         }
2616                         if (!smtp.sm_gotmail)
2617                         {
2618                                 usrerr("503 5.0.0 Need MAIL before RCPT");
2619                                 break;
2620                         }
2621                         SmtpPhase = "server RCPT";
2622                     SM_TRY
2623                     {
2624                         QuickAbort = true;
2625                         LogUsrErrs = true;
2626
2627                         /* limit flooding of our machine */
2628                         if (MaxRcptPerMsg > 0 &&
2629                             smtp.sm_nrcpts >= MaxRcptPerMsg)
2630                         {
2631                                 /* sleep(1); / * slow down? */
2632                                 usrerr("452 4.5.3 Too many recipients");
2633                                 goto rcpt_done;
2634                         }
2635
2636                         if (!SM_IS_INTERACTIVE(e->e_sendmode)
2637 #if _FFR_DM_ONE
2638                             && (NotFirstDelivery || SM_DM_ONE != e->e_sendmode)
2639 #endif /* _FFR_DM_ONE */
2640                            )
2641                                 e->e_flags |= EF_VRFYONLY;
2642
2643 #if MILTER
2644                         /*
2645                         **  Do not expand recipients at RCPT time (in the call
2646                         **  to recipient()) if a milter can delete or reject
2647                         **  a RCPT.  If they are expanded, it is impossible
2648                         **  for removefromlist() to figure out the expanded
2649                         **  members of the original recipient and mark them
2650                         **  as QS_DONTSEND.
2651                         */
2652
2653                         if (!(smtp.sm_milterlist && smtp.sm_milterize &&
2654                               !bitset(EF_DISCARD, e->e_flags)) &&
2655                             (smtp.sm_milters.mis_flags &
2656                              (MIS_FL_DEL_RCPT|MIS_FL_REJ_RCPT)) != 0)
2657                                 e->e_flags |= EF_VRFYONLY;
2658                         milter_cmd_done = false;
2659                         milter_cmd_safe = false;
2660 #endif /* MILTER */
2661
2662                         p = skipword(p, "to");
2663                         if (p == NULL)
2664                                 goto rcpt_done;
2665                         macdefine(&e->e_macro, A_PERM,
2666                                 macid("{addr_type}"), "e r");
2667                         a = parseaddr(p, NULLADDR, RF_COPYALL, ' ', &delimptr,
2668                                       e, true);
2669                         macdefine(&e->e_macro, A_PERM,
2670                                 macid("{addr_type}"), NULL);
2671                         if (Errors > 0)
2672                                 goto rcpt_done;
2673                         if (a == NULL)
2674                         {
2675                                 usrerr("501 5.0.0 Missing recipient");
2676                                 goto rcpt_done;
2677                         }
2678
2679                         if (delimptr != NULL && *delimptr != '\0')
2680                                 *delimptr++ = '\0';
2681
2682                         /* put resulting triple from parseaddr() into macros */
2683                         if (a->q_mailer != NULL)
2684                                 macdefine(&e->e_macro, A_PERM,
2685                                         macid("{rcpt_mailer}"),
2686                                         a->q_mailer->m_name);
2687                         else
2688                                 macdefine(&e->e_macro, A_PERM,
2689                                         macid("{rcpt_mailer}"), NULL);
2690                         if (a->q_host != NULL)
2691                                 macdefine(&e->e_macro, A_PERM,
2692                                         macid("{rcpt_host}"), a->q_host);
2693                         else
2694                                 macdefine(&e->e_macro, A_PERM,
2695                                         macid("{rcpt_host}"), "localhost");
2696                         if (a->q_user != NULL)
2697                                 macdefine(&e->e_macro, A_PERM,
2698                                         macid("{rcpt_addr}"), a->q_user);
2699                         else
2700                                 macdefine(&e->e_macro, A_PERM,
2701                                         macid("{rcpt_addr}"), NULL);
2702                         if (Errors > 0)
2703                                 goto rcpt_done;
2704
2705                         /* now parse ESMTP arguments */
2706                         addr = p;
2707                         parse_esmtp_args(e, a, p, delimptr, "RCPT", args,
2708                                         rcpt_esmtp_args);
2709                         if (Errors > 0)
2710                                 goto rcpt_done;
2711
2712 #if MILTER
2713                         /*
2714                         **  rscheck() can trigger an "exception"
2715                         **  in which case the execution continues at
2716                         **  SM_EXCEPT(exc, "[!F]*")
2717                         **  This means milter_cmd_safe is not set
2718                         **  and hence milter is not invoked.
2719                         **  Would it be "safe" to change that, i.e., use
2720                         **  milter_cmd_safe = true;
2721                         **  here so a milter is informed (if requested)
2722                         **  about RCPTs that are rejected by check_rcpt?
2723                         */
2724 # if _FFR_MILTER_CHECK_REJECTIONS_TOO
2725                         milter_cmd_safe = true;
2726 # endif
2727 #endif
2728
2729                         /* do config file checking of the recipient */
2730                         macdefine(&e->e_macro, A_PERM,
2731                                 macid("{addr_type}"), "e r");
2732                         if (rscheck("check_rcpt", addr,
2733                                     NULL, e, RSF_RMCOMM|RSF_COUNT, 3,
2734                                     NULL, e->e_id, p_addr_st) != EX_OK ||
2735                             Errors > 0)
2736                                 goto rcpt_done;
2737                         macdefine(&e->e_macro, A_PERM,
2738                                 macid("{addr_type}"), NULL);
2739
2740                         /* If discarding, don't bother to verify user */
2741                         if (bitset(EF_DISCARD, e->e_flags))
2742                                 a->q_state = QS_VERIFIED;
2743 #if MILTER
2744                         milter_cmd_safe = true;
2745 #endif
2746
2747                         /* save in recipient list after ESMTP mods */
2748                         a = recipient(a, &e->e_sendqueue, 0, e);
2749                         /* may trigger exception... */
2750
2751 #if MILTER
2752                         milter_rcpt_added = true;
2753 #endif
2754
2755                         if(!(Errors > 0) && QS_IS_BADADDR(a->q_state))
2756                         {
2757                                 /* punt -- should keep message in ADDRESS.... */
2758                                 usrerr("550 5.1.1 Addressee unknown");
2759                         }
2760
2761 #if MILTER
2762                 rcpt_done:
2763                         if (smtp.sm_milterlist && smtp.sm_milterize &&
2764                             !bitset(EF_DISCARD, e->e_flags))
2765                         {
2766                                 char state;
2767                                 char *response;
2768
2769                                 /* how to get the error codes? */
2770                                 if (Errors > 0)
2771                                 {
2772                                         macdefine(&e->e_macro, A_PERM,
2773                                                 macid("{rcpt_mailer}"),
2774                                                 "error");
2775                                         if (a != NULL &&
2776                                             a->q_status != NULL &&
2777                                             a->q_rstatus != NULL)
2778                                         {
2779                                                 macdefine(&e->e_macro, A_PERM,
2780                                                         macid("{rcpt_host}"),
2781                                                         a->q_status);
2782                                                 macdefine(&e->e_macro, A_PERM,
2783                                                         macid("{rcpt_addr}"),
2784                                                         a->q_rstatus);
2785                                         }
2786                                         else
2787                                         {
2788                                                 if (addr_st.q_host != NULL)
2789                                                         macdefine(&e->e_macro,
2790                                                                 A_PERM,
2791                                                                 macid("{rcpt_host}"),
2792                                                                 addr_st.q_host);
2793                                                 if (addr_st.q_user != NULL)
2794                                                         macdefine(&e->e_macro,
2795                                                                 A_PERM,
2796                                                                 macid("{rcpt_addr}"),
2797                                                                 addr_st.q_user);
2798                                         }
2799                                 }
2800
2801                                 response = milter_envrcpt(args, e, &state,
2802                                                         Errors > 0);
2803                                 milter_cmd_done = true;
2804                                 MILTER_REPLY("to");
2805                         }
2806 #endif /* MILTER */
2807
2808                         /* no errors during parsing, but might be a duplicate */
2809                         e->e_to = a->q_paddr;
2810                         if (!(Errors > 0) && !QS_IS_BADADDR(a->q_state))
2811                         {
2812                                 if (smtp.sm_nrcpts == 0)
2813                                         initsys(e);
2814                                 message("250 2.1.5 Recipient ok%s",
2815                                         QS_IS_QUEUEUP(a->q_state) ?
2816                                                 " (will queue)" : "");
2817                                 smtp.sm_nrcpts++;
2818                         }
2819
2820                         /* Is this needed? */
2821 #if !MILTER
2822                 rcpt_done:
2823 #endif /* !MILTER */
2824                         macdefine(&e->e_macro, A_PERM,
2825                                 macid("{rcpt_mailer}"), NULL);
2826                         macdefine(&e->e_macro, A_PERM,
2827                                 macid("{rcpt_host}"), NULL);
2828                         macdefine(&e->e_macro, A_PERM,
2829                                 macid("{rcpt_addr}"), NULL);
2830                         macdefine(&e->e_macro, A_PERM,
2831                                 macid("{dsn_notify}"), NULL);
2832
2833                         if (Errors > 0)
2834                         {
2835                                 ++n_badrcpts;
2836                                 NBADRCPTS;
2837                         }
2838                     }
2839                     SM_EXCEPT(exc, "[!F]*")
2840                     {
2841                         /* An exception occurred while processing RCPT */
2842                         e->e_flags &= ~(EF_FATALERRS|EF_PM_NOTIFY);
2843                         ++n_badrcpts;
2844                         NBADRCPTS;
2845 #if MILTER
2846                         if (smtp.sm_milterlist && smtp.sm_milterize &&
2847                             !bitset(EF_DISCARD, e->e_flags) &&
2848                             !milter_cmd_done && milter_cmd_safe)
2849                         {
2850                                 char state;
2851                                 char *response;
2852
2853                                 macdefine(&e->e_macro, A_PERM,
2854                                         macid("{rcpt_mailer}"), "error");
2855
2856                                 /* how to get the error codes? */
2857                                 if (addr_st.q_host != NULL)
2858                                         macdefine(&e->e_macro, A_PERM,
2859                                                 macid("{rcpt_host}"),
2860                                                 addr_st.q_host);
2861                                 else if (a != NULL && a->q_status != NULL)
2862                                         macdefine(&e->e_macro, A_PERM,
2863                                                 macid("{rcpt_host}"),
2864                                                 a->q_status);
2865
2866                                 if (addr_st.q_user != NULL)
2867                                         macdefine(&e->e_macro, A_PERM,
2868                                                 macid("{rcpt_addr}"),
2869                                                 addr_st.q_user);
2870                                 else if (a != NULL && a->q_rstatus != NULL)
2871                                         macdefine(&e->e_macro, A_PERM,
2872                                                 macid("{rcpt_addr}"),
2873                                                 a->q_rstatus);
2874
2875                                 response = milter_envrcpt(args, e, &state,
2876                                                         true);
2877                                 milter_cmd_done = true;
2878                                 MILTER_REPLY("to");
2879                                 macdefine(&e->e_macro, A_PERM,
2880                                         macid("{rcpt_mailer}"), NULL);
2881                                 macdefine(&e->e_macro, A_PERM,
2882                                         macid("{rcpt_host}"), NULL);
2883                                 macdefine(&e->e_macro, A_PERM,
2884                                         macid("{rcpt_addr}"), NULL);
2885                         }
2886                         if (smtp.sm_milterlist && smtp.sm_milterize &&
2887                             milter_rcpt_added && milter_cmd_done &&
2888                             milter_cmd_fail)
2889                         {
2890                                 (void) removefromlist(addr, &e->e_sendqueue, e);
2891                                 milter_cmd_fail = false;
2892                                 if (smtp.sm_e_nrcpts_orig < e->e_nrcpts)
2893                                         e->e_nrcpts = smtp.sm_e_nrcpts_orig;
2894                         }
2895 #endif /* MILTER */
2896                     }
2897                     SM_END_TRY
2898                         break;
2899
2900                   case CMDDATA:         /* data -- text of mail */
2901                         DELAY_CONN("DATA");
2902                         if (!smtp_data(&smtp, e))
2903                                 goto doquit;
2904                         break;
2905
2906                   case CMDRSET:         /* rset -- reset state */
2907                         if (tTd(94, 100))
2908                                 message("451 4.0.0 Test failure");
2909                         else
2910                                 message("250 2.0.0 Reset state");
2911                         CLEAR_STATE(cmdbuf);
2912                         break;
2913
2914                   case CMDVRFY:         /* vrfy -- verify address */
2915                   case CMDEXPN:         /* expn -- expand address */
2916                         vrfy = c->cmd_code == CMDVRFY;
2917                         DELAY_CONN(vrfy ? "VRFY" : "EXPN");
2918                         if (tempfail)
2919                         {
2920                                 if (LogLevel > 9)
2921                                         sm_syslog(LOG_INFO, e->e_id,
2922                                                   "SMTP %s command (%.100s) from %s tempfailed (due to previous checks)",
2923                                                   vrfy ? "VRFY" : "EXPN",
2924                                                   p, CurSmtpClient);
2925
2926                                 /* RFC 821 doesn't allow 4xy reply code */
2927                                 usrerr("550 5.7.1 Please try again later");
2928                                 break;
2929                         }
2930                         wt = checksmtpattack(&n_verifies, MAXVRFYCOMMANDS,
2931                                              false, vrfy ? "VRFY" : "EXPN", e);
2932                         STOP_IF_ATTACK(wt);
2933                         previous = curtime();
2934                         if ((vrfy && bitset(PRIV_NOVRFY, PrivacyFlags)) ||
2935                             (!vrfy && !bitset(SRV_OFFER_EXPN, features)))
2936                         {
2937                                 if (vrfy)
2938                                         message("252 2.5.2 Cannot VRFY user; try RCPT to attempt delivery (or try finger)");
2939                                 else
2940                                         message("502 5.7.0 Sorry, we do not allow this operation");
2941                                 if (LogLevel > 5)
2942                                         sm_syslog(LOG_INFO, e->e_id,
2943                                                   "%s: %s [rejected]",
2944                                                   CurSmtpClient,
2945                                                   shortenstring(inp, MAXSHORTSTR));
2946                                 break;
2947                         }
2948                         else if (!gothello &&
2949                                  bitset(vrfy ? PRIV_NEEDVRFYHELO : PRIV_NEEDEXPNHELO,
2950                                                 PrivacyFlags))
2951                         {
2952                                 usrerr("503 5.0.0 I demand that you introduce yourself first");
2953                                 break;
2954                         }
2955                         if (Errors > 0)
2956                                 break;
2957                         if (LogLevel > 5)
2958                                 sm_syslog(LOG_INFO, e->e_id, "%s: %s",
2959                                           CurSmtpClient,
2960                                           shortenstring(inp, MAXSHORTSTR));
2961                     SM_TRY
2962                     {
2963                         QuickAbort = true;
2964                         vrfyqueue = NULL;
2965                         if (vrfy)
2966                                 e->e_flags |= EF_VRFYONLY;
2967                         while (*p != '\0' && isascii(*p) && isspace(*p))
2968                                 p++;
2969                         if (*p == '\0')
2970                         {
2971                                 usrerr("501 5.5.2 Argument required");
2972                         }
2973                         else
2974                         {
2975                                 /* do config file checking of the address */
2976                                 if (rscheck(vrfy ? "check_vrfy" : "check_expn",
2977                                             p, NULL, e, RSF_RMCOMM,
2978                                             3, NULL, NOQID, NULL) != EX_OK ||
2979                                     Errors > 0)
2980                                         sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2981                                 (void) sendtolist(p, NULLADDR, &vrfyqueue, 0, e);
2982                         }
2983                         if (wt > 0)
2984                         {
2985                                 time_t t;
2986
2987                                 t = wt - (curtime() - previous);
2988                                 if (t > 0)
2989                                         (void) sleep(t);
2990                         }
2991                         if (Errors > 0)
2992                                 sm_exc_raisenew_x(&EtypeQuickAbort, 1);
2993                         if (vrfyqueue == NULL)
2994                         {
2995                                 usrerr("554 5.5.2 Nothing to %s", vrfy ? "VRFY" : "EXPN");
2996                         }
2997                         while (vrfyqueue != NULL)
2998                         {
2999                                 if (!QS_IS_UNDELIVERED(vrfyqueue->q_state))
3000                                 {
3001                                         vrfyqueue = vrfyqueue->q_next;
3002                                         continue;
3003                                 }
3004
3005                                 /* see if there is more in the vrfy list */
3006                                 a = vrfyqueue;
3007                                 while ((a = a->q_next) != NULL &&
3008                                        (!QS_IS_UNDELIVERED(a->q_state)))
3009                                         continue;
3010                                 printvrfyaddr(vrfyqueue, a == NULL, vrfy);
3011                                 vrfyqueue = a;
3012                         }
3013                     }
3014                     SM_EXCEPT(exc, "[!F]*")
3015                     {
3016                         /*
3017                         **  An exception occurred while processing VRFY/EXPN
3018                         */
3019
3020                         sm_exc_free(exc);
3021                         goto undo;
3022                     }
3023                     SM_END_TRY
3024                         break;
3025
3026                   case CMDETRN:         /* etrn -- force queue flush */
3027                         DELAY_CONN("ETRN");
3028
3029                         /* Don't leak queue information via debug flags */
3030                         if (!bitset(SRV_OFFER_ETRN, features) || UseMSP ||
3031                             (RealUid != 0 && RealUid != TrustedUid &&
3032                              OpMode == MD_SMTP))
3033                         {
3034                                 /* different message for MSA ? */
3035                                 message("502 5.7.0 Sorry, we do not allow this operation");
3036                                 if (LogLevel > 5)
3037                                         sm_syslog(LOG_INFO, e->e_id,
3038                                                   "%s: %s [rejected]",
3039                                                   CurSmtpClient,
3040                                                   shortenstring(inp, MAXSHORTSTR));
3041                                 break;
3042                         }
3043                         if (tempfail)
3044                         {
3045                                 if (LogLevel > 9)
3046                                         sm_syslog(LOG_INFO, e->e_id,
3047                                                   "SMTP ETRN command (%.100s) from %s tempfailed (due to previous checks)",
3048                                                   p, CurSmtpClient);
3049                                 usrerr(MSG_TEMPFAIL);
3050                                 break;
3051                         }
3052
3053                         if (strlen(p) <= 0)
3054                         {
3055                                 usrerr("500 5.5.2 Parameter required");
3056                                 break;
3057                         }
3058
3059                         /* crude way to avoid denial-of-service attacks */
3060                         STOP_IF_ATTACK(checksmtpattack(&n_etrn, MAXETRNCOMMANDS,
3061                                                         true, "ETRN", e));
3062
3063                         /*
3064                         **  Do config file checking of the parameter.
3065                         **  Even though we have srv_features now, we still
3066                         **  need this ruleset because the former is called
3067                         **  when the connection has been established, while
3068                         **  this ruleset is called when the command is
3069                         **  actually issued and therefore has all information
3070                         **  available to make a decision.
3071                         */
3072
3073                         if (rscheck("check_etrn", p, NULL, e,
3074                                     RSF_RMCOMM, 3, NULL, NOQID, NULL)
3075                                                                 != EX_OK ||
3076                             Errors > 0)
3077                                 break;
3078
3079                         if (LogLevel > 5)
3080                                 sm_syslog(LOG_INFO, e->e_id,
3081                                           "%s: ETRN %s", CurSmtpClient,
3082                                           shortenstring(p, MAXSHORTSTR));
3083
3084                         id = p;
3085                         if (*id == '#')
3086                         {
3087                                 int i, qgrp;
3088
3089                                 id++;
3090                                 qgrp = name2qid(id);
3091                                 if (!ISVALIDQGRP(qgrp))
3092                                 {
3093                                         usrerr("459 4.5.4 Queue %s unknown",
3094                                                id);
3095                                         break;
3096                                 }
3097                                 for (i = 0; i < NumQueue && Queue[i] != NULL;
3098                                      i++)
3099                                         Queue[i]->qg_nextrun = (time_t) -1;
3100                                 Queue[qgrp]->qg_nextrun = 0;
3101                                 ok = run_work_group(Queue[qgrp]->qg_wgrp,
3102                                                     RWG_FORK|RWG_FORCE);
3103                                 if (ok && Errors == 0)
3104                                         message("250 2.0.0 Queuing for queue group %s started", id);
3105                                 break;
3106                         }
3107
3108                         if (*id == '@')
3109                                 id++;
3110                         else
3111                                 *--id = '@';
3112
3113                         new = (QUEUE_CHAR *) sm_malloc(sizeof(QUEUE_CHAR));
3114                         if (new == NULL)
3115                         {
3116                                 syserr("500 5.5.0 ETRN out of memory");
3117                                 break;
3118                         }
3119                         new->queue_match = id;
3120                         new->queue_negate = false;
3121                         new->queue_next = NULL;
3122                         QueueLimitRecipient = new;
3123                         ok = runqueue(true, false, false, true);
3124                         sm_free(QueueLimitRecipient); /* XXX */
3125                         QueueLimitRecipient = NULL;
3126                         if (ok && Errors == 0)
3127                                 message("250 2.0.0 Queuing for node %s started", p);
3128                         break;
3129
3130                   case CMDHELP:         /* help -- give user info */
3131                         DELAY_CONN("HELP");
3132                         help(p, e);
3133                         break;
3134
3135                   case CMDNOOP:         /* noop -- do nothing */
3136                         DELAY_CONN("NOOP");
3137                         STOP_IF_ATTACK(checksmtpattack(&n_noop, MaxNOOPCommands,
3138                                                         true, "NOOP", e));
3139                         message("250 2.0.0 OK");
3140                         break;
3141
3142                   case CMDQUIT:         /* quit -- leave mail */
3143                         message("221 2.0.0 %s closing connection", MyHostName);
3144 #if PIPELINING
3145                         (void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
3146 #endif /* PIPELINING */
3147
3148                         if (smtp.sm_nrcpts > 0)
3149                                 logundelrcpts(e, "aborted by sender", 9, false);
3150
3151                         /* arrange to ignore any current send list */
3152                         e->e_sendqueue = NULL;
3153
3154 #if STARTTLS
3155                         /* shutdown TLS connection */
3156                         if (tls_active)
3157                         {
3158                                 (void) endtls(srv_ssl, "server");
3159                                 tls_active = false;
3160                         }
3161 #endif /* STARTTLS */
3162 #if SASL
3163                         if (authenticating == SASL_IS_AUTH)
3164                         {
3165                                 sasl_dispose(&conn);
3166                                 authenticating = SASL_NOT_AUTH;
3167                                 /* XXX sasl_done(); this is a child */
3168                         }
3169 #endif /* SASL */
3170
3171 doquit:
3172                         /* avoid future 050 messages */
3173                         disconnect(1, e);
3174
3175 #if MILTER
3176                         /* close out milter filters */
3177                         milter_quit(e);
3178 #endif /* MILTER */
3179
3180                         if (tTd(92, 2))
3181                                 sm_dprintf("QUIT: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",
3182                                         e->e_id,
3183                                         bitset(EF_LOGSENDER, e->e_flags),
3184                                         LogLevel);
3185                         if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))
3186                                 logsender(e, NULL);
3187                         e->e_flags &= ~EF_LOGSENDER;
3188
3189                         if (lognullconnection && LogLevel > 5 &&
3190                             nullserver == NULL)
3191                         {
3192                                 char *d;
3193
3194                                 d = macvalue(macid("{daemon_name}"), e);
3195                                 if (d == NULL)
3196                                         d = "stdin";
3197
3198                                 /*
3199                                 **  even though this id is "bogus", it makes
3200                                 **  it simpler to "grep" related events, e.g.,
3201                                 **  timeouts for the same connection.
3202                                 */
3203
3204                                 sm_syslog(LOG_INFO, e->e_id,
3205                                           "%s did not issue MAIL/EXPN/VRFY/ETRN during connection to %s",
3206                                           CurSmtpClient, d);
3207                         }
3208                         if (tTd(93, 100))
3209                         {
3210                                 /* return to handle next connection */
3211                                 return;
3212                         }
3213                         finis(true, true, ExitStat);
3214                         /* NOTREACHED */
3215
3216                         /* just to avoid bogus warning from some compilers */
3217                         exit(EX_OSERR);
3218
3219                   case CMDVERB:         /* set verbose mode */
3220                         DELAY_CONN("VERB");
3221                         if (!bitset(SRV_OFFER_EXPN, features) ||
3222                             !bitset(SRV_OFFER_VERB, features))
3223                         {
3224                                 /* this would give out the same info */
3225                                 message("502 5.7.0 Verbose unavailable");
3226                                 break;
3227                         }
3228                         STOP_IF_ATTACK(checksmtpattack(&n_noop, MaxNOOPCommands,
3229                                                         true, "VERB", e));
3230                         Verbose = 1;
3231                         set_delivery_mode(SM_DELIVER, e);
3232                         message("250 2.0.0 Verbose mode");
3233                         break;
3234
3235 #if SMTPDEBUG
3236                   case CMDDBGQSHOW:     /* show queues */
3237                         (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
3238                                              "Send Queue=");
3239                         printaddr(smioout, e->e_sendqueue, true);
3240                         break;
3241
3242                   case CMDDBGDEBUG:     /* set debug mode */
3243                         tTsetup(tTdvect, sizeof(tTdvect), "0-99.1");
3244                         tTflag(p);
3245                         message("200 2.0.0 Debug set");
3246                         break;
3247
3248 #else /* SMTPDEBUG */
3249                   case CMDDBGQSHOW:     /* show queues */
3250                   case CMDDBGDEBUG:     /* set debug mode */
3251 #endif /* SMTPDEBUG */
3252                   case CMDLOGBOGUS:     /* bogus command */
3253                         DELAY_CONN("Bogus");
3254                         if (LogLevel > 0)
3255                                 sm_syslog(LOG_CRIT, e->e_id,
3256                                           "\"%s\" command from %s (%.100s)",
3257                                           c->cmd_name, CurSmtpClient,
3258                                           anynet_ntoa(&RealHostAddr));
3259                         /* FALLTHROUGH */
3260
3261                   case CMDERROR:        /* unknown command */
3262 #if MAXBADCOMMANDS > 0
3263                         if (++n_badcmds > MAXBADCOMMANDS)
3264                         {
3265   stopattack:
3266                                 message("421 4.7.0 %s Too many bad commands; closing connection",
3267                                         MyHostName);
3268
3269                                 /* arrange to ignore any current send list */
3270                                 e->e_sendqueue = NULL;
3271                                 goto doquit;
3272                         }
3273 #endif /* MAXBADCOMMANDS > 0 */
3274
3275 #if MILTER && SMFI_VERSION > 2
3276                         if (smtp.sm_milterlist && smtp.sm_milterize &&
3277                             !bitset(EF_DISCARD, e->e_flags))
3278                         {
3279                                 char state;
3280                                 char *response;
3281
3282                                 if (MilterLogLevel > 9)
3283                                         sm_syslog(LOG_INFO, e->e_id,
3284                                                 "Sending \"%s\" to Milter", inp);
3285                                 response = milter_unknown(inp, e, &state);
3286                                 MILTER_REPLY("unknown");
3287                                 if (state == SMFIR_REPLYCODE ||
3288                                     state == SMFIR_REJECT ||
3289                                     state == SMFIR_TEMPFAIL ||
3290                                     state == SMFIR_SHUTDOWN)
3291                                 {
3292                                         /* MILTER_REPLY already gave an error */
3293                                         break;
3294                                 }
3295                         }
3296 #endif /* MILTER && SMFI_VERSION > 2 */
3297
3298                         usrerr("500 5.5.1 Command unrecognized: \"%s\"",
3299                                shortenstring(inp, MAXSHORTSTR));
3300                         break;
3301
3302                   case CMDUNIMPL:
3303                         DELAY_CONN("Unimpl");
3304                         usrerr("502 5.5.1 Command not implemented: \"%s\"",
3305                                shortenstring(inp, MAXSHORTSTR));
3306                         break;
3307
3308                   default:
3309                         DELAY_CONN("default");
3310                         errno = 0;
3311                         syserr("500 5.5.0 smtp: unknown code %d", c->cmd_code);
3312                         break;
3313                 }
3314 #if SASL
3315                 }
3316 #endif /* SASL */
3317             }
3318             SM_EXCEPT(exc, "[!F]*")
3319             {
3320                 /*
3321                 **  The only possible exception is "E:mta.quickabort".
3322                 **  There is nothing to do except fall through and loop.
3323                 */
3324             }
3325             SM_END_TRY
3326         }
3327 }
3328 /*
3329 **  SMTP_DATA -- implement the SMTP DATA command.
3330 **
3331 **      Parameters:
3332 **              smtp -- status of SMTP connection.
3333 **              e -- envelope.
3334 **
3335 **      Returns:
3336 **              true iff SMTP session can continue.
3337 **
3338 **      Side Effects:
3339 **              possibly sends message.
3340 */
3341
3342 static bool
3343 smtp_data(smtp, e)
3344         SMTP_T *smtp;
3345         ENVELOPE *e;
3346 {
3347 #if MILTER
3348         bool milteraccept;
3349 #endif /* MILTER */
3350         bool aborting;
3351         bool doublequeue;
3352         bool rv = true;
3353         ADDRESS *a;
3354         ENVELOPE *ee;
3355         char *id;
3356         char *oldid;
3357         unsigned int features;
3358         char buf[32];
3359
3360         SmtpPhase = "server DATA";
3361         if (!smtp->sm_gotmail)
3362         {
3363                 usrerr("503 5.0.0 Need MAIL command");
3364                 return true;
3365         }
3366         else if (smtp->sm_nrcpts <= 0)
3367         {
3368                 usrerr("503 5.0.0 Need RCPT (recipient)");
3369                 return true;
3370         }
3371         (void) sm_snprintf(buf, sizeof(buf), "%u", smtp->sm_nrcpts);
3372         if (rscheck("check_data", buf, NULL, e,
3373                     RSF_RMCOMM|RSF_UNSTRUCTURED|RSF_COUNT, 3, NULL,
3374                     e->e_id, NULL) != EX_OK)
3375                 return true;
3376
3377 #if MILTER && SMFI_VERSION > 3
3378         if (smtp->sm_milterlist && smtp->sm_milterize &&
3379             !bitset(EF_DISCARD, e->e_flags))
3380         {
3381                 char state;
3382                 char *response;
3383                 int savelogusrerrs = LogUsrErrs;
3384
3385                 response = milter_data_cmd(e, &state);
3386                 switch (state)
3387                 {
3388                   case SMFIR_REPLYCODE:
3389                         if (MilterLogLevel > 3)
3390                         {
3391                                 sm_syslog(LOG_INFO, e->e_id,
3392                                           "Milter: cmd=data, reject=%s",
3393                                           response);
3394                                 LogUsrErrs = false;
3395                         }
3396 #if _FFR_MILTER_ENHSC
3397                         if (ISSMTPCODE(response))
3398                                 (void) extenhsc(response + 4, ' ', e->e_enhsc);
3399 #endif /* _FFR_MILTER_ENHSC */
3400
3401                         usrerr(response);
3402                         if (strncmp(response, "421 ", 4) == 0
3403                             || strncmp(response, "421-", 4) == 0)
3404                         {
3405                                 e->e_sendqueue = NULL;
3406                                 return false;
3407                         }
3408                         return true;
3409
3410                   case SMFIR_REJECT:
3411                         if (MilterLogLevel > 3)
3412                         {
3413                                 sm_syslog(LOG_INFO, e->e_id,
3414                                           "Milter: cmd=data, reject=550 5.7.1 Command rejected");
3415                                 LogUsrErrs = false;
3416                         }
3417 #if _FFR_MILTER_ENHSC
3418                         (void) sm_strlcpy(e->e_enhsc, "5.7.1",
3419                                          sizeof(e->e_enhsc));
3420 #endif /* _FFR_MILTER_ENHSC */
3421                         usrerr("550 5.7.1 Command rejected");
3422                         return true;
3423
3424                   case SMFIR_DISCARD:
3425                         if (MilterLogLevel > 3)
3426                                 sm_syslog(LOG_INFO, e->e_id,
3427                                           "Milter: cmd=data, discard");
3428                         e->e_flags |= EF_DISCARD;
3429                         break;
3430
3431                   case SMFIR_TEMPFAIL:
3432                         if (MilterLogLevel > 3)
3433                         {
3434                                 sm_syslog(LOG_INFO, e->e_id,
3435                                           "Milter: cmd=data, reject=%s",
3436                                           MSG_TEMPFAIL);
3437                                 LogUsrErrs = false;
3438                         }
3439 #if _FFR_MILTER_ENHSC
3440                         (void) extenhsc(MSG_TEMPFAIL + 4, ' ', e->e_enhsc);
3441 #endif /* _FFR_MILTER_ENHSC */
3442                         usrerr(MSG_TEMPFAIL);
3443                         return true;
3444
3445                   case SMFIR_SHUTDOWN:
3446                         if (MilterLogLevel > 3)
3447                         {
3448                                 sm_syslog(LOG_INFO, e->e_id,
3449                                           "Milter: cmd=data, reject=421 4.7.0 %s closing connection",
3450                                           MyHostName);
3451                                 LogUsrErrs = false;
3452                         }
3453                         usrerr("421 4.7.0 %s closing connection", MyHostName);
3454                         e->e_sendqueue = NULL;
3455                         return false;
3456                 }
3457                 LogUsrErrs = savelogusrerrs;
3458                 if (response != NULL)
3459                         sm_free(response); /* XXX */
3460         }
3461 #endif /* MILTER && SMFI_VERSION > 3 */
3462
3463         /* put back discard bit */
3464         if (smtp->sm_discard)
3465                 e->e_flags |= EF_DISCARD;
3466
3467         /* check to see if we need to re-expand aliases */
3468         /* also reset QS_BADADDR on already-diagnosted addrs */
3469         doublequeue = false;
3470         for (a = e->e_sendqueue; a != NULL; a = a->q_next)
3471         {
3472                 if (QS_IS_VERIFIED(a->q_state) &&
3473                     !bitset(EF_DISCARD, e->e_flags))
3474                 {
3475                         /* need to re-expand aliases */
3476                         doublequeue = true;
3477                 }
3478                 if (QS_IS_BADADDR(a->q_state))
3479                 {
3480                         /* make this "go away" */
3481                         a->q_state = QS_DONTSEND;
3482                 }
3483         }
3484
3485         /* collect the text of the message */
3486         SmtpPhase = "collect";
3487         buffer_errors();
3488
3489         collect(InChannel, true, NULL, e, true);
3490
3491         /* redefine message size */
3492         (void) sm_snprintf(buf, sizeof(buf), "%ld", PRT_NONNEGL(e->e_msgsize));
3493         macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), buf);
3494
3495         /* rscheck() will set Errors or EF_DISCARD if it trips */
3496         (void) rscheck("check_eom", buf, NULL, e, RSF_UNSTRUCTURED|RSF_COUNT,
3497                        3, NULL, e->e_id, NULL);
3498
3499 #if MILTER
3500         milteraccept = true;
3501         if (smtp->sm_milterlist && smtp->sm_milterize &&
3502             Errors <= 0 &&
3503             !bitset(EF_DISCARD, e->e_flags))
3504         {
3505                 char state;
3506                 char *response;
3507
3508                 response = milter_data(e, &state);
3509                 switch (state)
3510                 {
3511                   case SMFIR_REPLYCODE:
3512                         if (MilterLogLevel > 3)
3513                                 sm_syslog(LOG_INFO, e->e_id,
3514                                           "Milter: data, reject=%s",
3515                                           response);
3516                         milteraccept = false;
3517 #if _FFR_MILTER_ENHSC
3518                         if (ISSMTPCODE(response))
3519                                 (void) extenhsc(response + 4, ' ', e->e_enhsc);
3520 #endif /* _FFR_MILTER_ENHSC */
3521                         usrerr(response);
3522                         if (strncmp(response, "421 ", 4) == 0
3523                             || strncmp(response, "421-", 4) == 0)
3524                                 rv = false;
3525                         break;
3526
3527                   case SMFIR_REJECT:
3528                         milteraccept = false;
3529                         if (MilterLogLevel > 3)
3530                                 sm_syslog(LOG_INFO, e->e_id,
3531                                           "Milter: data, reject=554 5.7.1 Command rejected");
3532                         usrerr("554 5.7.1 Command rejected");
3533                         break;
3534
3535                   case SMFIR_DISCARD:
3536                         if (MilterLogLevel > 3)
3537                                 sm_syslog(LOG_INFO, e->e_id,
3538                                           "Milter: data, discard");
3539                         milteraccept = false;
3540                         e->e_flags |= EF_DISCARD;
3541                         break;
3542
3543                   case SMFIR_TEMPFAIL:
3544                         if (MilterLogLevel > 3)
3545                                 sm_syslog(LOG_INFO, e->e_id,
3546                                           "Milter: data, reject=%s",
3547                                           MSG_TEMPFAIL);
3548                         milteraccept = false;
3549 #if _FFR_MILTER_ENHSC
3550                         (void) extenhsc(MSG_TEMPFAIL + 4, ' ', e->e_enhsc);
3551 #endif /* _FFR_MILTER_ENHSC */
3552                         usrerr(MSG_TEMPFAIL);
3553                         break;
3554
3555                   case SMFIR_SHUTDOWN:
3556                         if (MilterLogLevel > 3)
3557                                 sm_syslog(LOG_INFO, e->e_id,
3558                                           "Milter: data, reject=421 4.7.0 %s closing connection",
3559                                           MyHostName);
3560                         milteraccept = false;
3561                         usrerr("421 4.7.0 %s closing connection", MyHostName);
3562                         rv = false;
3563                         break;
3564                 }
3565                 if (response != NULL)
3566                         sm_free(response);
3567         }
3568
3569         /* Milter may have changed message size */
3570         (void) sm_snprintf(buf, sizeof(buf), "%ld", PRT_NONNEGL(e->e_msgsize));
3571         macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), buf);
3572
3573         /* abort message filters that didn't get the body & log msg is OK */
3574         if (smtp->sm_milterlist && smtp->sm_milterize)
3575         {
3576                 milter_abort(e);
3577                 if (milteraccept && MilterLogLevel > 9)
3578                         sm_syslog(LOG_INFO, e->e_id, "Milter accept: message");
3579         }
3580
3581         /*
3582         **  If SuperSafe is SAFE_REALLY_POSTMILTER, and we don't have milter or
3583         **  milter accepted message, sync it now
3584         **
3585         **  XXX This is almost a copy of the code in collect(): put it into
3586         **      a function that is called from both places?
3587         */
3588
3589         if (milteraccept && SuperSafe == SAFE_REALLY_POSTMILTER)
3590         {
3591                 int afd;
3592                 SM_FILE_T *volatile df;
3593                 char *dfname;
3594
3595                 df = e->e_dfp;
3596                 dfname = queuename(e, DATAFL_LETTER);
3597                 if (sm_io_setinfo(df, SM_BF_COMMIT, NULL) < 0
3598                     && errno != EINVAL)
3599                 {
3600                         int save_errno;
3601
3602                         save_errno = errno;
3603                         if (save_errno == EEXIST)
3604                         {
3605                                 struct stat st;
3606                                 int dfd;
3607
3608                                 if (stat(dfname, &st) < 0)
3609                                         st.st_size = -1;
3610                                 errno = EEXIST;
3611                                 syserr("@collect: bfcommit(%s): already on disk, size=%ld",
3612                                        dfname, (long) st.st_size);
3613                                 dfd = sm_io_getinfo(df, SM_IO_WHAT_FD, NULL);
3614                                 if (dfd >= 0)
3615                                         dumpfd(dfd, true, true);
3616                         }
3617                         errno = save_errno;
3618                         dferror(df, "bfcommit", e);
3619                         flush_errors(true);
3620                         finis(save_errno != EEXIST, true, ExitStat);
3621                 }
3622                 else if ((afd = sm_io_getinfo(df, SM_IO_WHAT_FD, NULL)) < 0)
3623                 {
3624                         dferror(df, "sm_io_getinfo", e);
3625                         flush_errors(true);
3626                         finis(true, true, ExitStat);
3627                         /* NOTREACHED */
3628                 }
3629                 else if (fsync(afd) < 0)
3630                 {
3631                         dferror(df, "fsync", e);
3632                         flush_errors(true);
3633                         finis(true, true, ExitStat);
3634                         /* NOTREACHED */
3635                 }
3636                 else if (sm_io_close(df, SM_TIME_DEFAULT) < 0)
3637                 {
3638                         dferror(df, "sm_io_close", e);
3639                         flush_errors(true);
3640                         finis(true, true, ExitStat);
3641                         /* NOTREACHED */
3642                 }
3643
3644                 /* Now reopen the df file */
3645                 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, dfname,
3646                                         SM_IO_RDONLY, NULL);
3647                 if (e->e_dfp == NULL)
3648                 {
3649                         /* we haven't acked receipt yet, so just chuck this */
3650                         syserr("@Cannot reopen %s", dfname);
3651                         finis(true, true, ExitStat);
3652                         /* NOTREACHED */
3653                 }
3654         }
3655 #endif /* MILTER */
3656
3657         /* Check if quarantining stats should be updated */
3658         if (e->e_quarmsg != NULL)
3659                 markstats(e, NULL, STATS_QUARANTINE);
3660
3661         /*
3662         **  If a header/body check (header checks or milter)
3663         **  set EF_DISCARD, don't queueup the message --
3664         **  that would lose the EF_DISCARD bit and deliver
3665         **  the message.
3666         */
3667
3668         if (bitset(EF_DISCARD, e->e_flags))
3669                 doublequeue = false;
3670
3671         aborting = Errors > 0;
3672         if (!(aborting || bitset(EF_DISCARD, e->e_flags)) &&
3673             (QueueMode == QM_QUARANTINE || e->e_quarmsg == NULL) &&
3674             !split_by_recipient(e))
3675                 aborting = bitset(EF_FATALERRS, e->e_flags);
3676
3677         if (aborting)
3678         {
3679                 ADDRESS *q;
3680
3681                 /* Log who the mail would have gone to */
3682                 logundelrcpts(e, e->e_message, 8, false);
3683
3684                 /*
3685                 **  If something above refused the message, we still haven't
3686                 **  accepted responsibility for it.  Don't send DSNs.
3687                 */
3688
3689                 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
3690                         q->q_flags &= ~Q_PINGFLAGS;
3691
3692                 flush_errors(true);
3693                 buffer_errors();
3694                 goto abortmessage;
3695         }
3696
3697         /* from now on, we have to operate silently */
3698         buffer_errors();
3699
3700 #if 0
3701         /*
3702         **  Clear message, it may contain an error from the SMTP dialogue.
3703         **  This error must not show up in the queue.
3704         **      Some error message should show up, e.g., alias database
3705         **      not available, but others shouldn't, e.g., from check_rcpt.
3706         */
3707
3708         e->e_message = NULL;
3709 #endif /* 0 */
3710
3711         /*
3712         **  Arrange to send to everyone.
3713         **      If sending to multiple people, mail back
3714         **              errors rather than reporting directly.
3715         **      In any case, don't mail back errors for
3716         **              anything that has happened up to
3717         **              now (the other end will do this).
3718         **      Truncate our transcript -- the mail has gotten
3719         **              to us successfully, and if we have
3720         **              to mail this back, it will be easier
3721         **              on the reader.
3722         **      Then send to everyone.
3723         **      Finally give a reply code.  If an error has
3724         **              already been given, don't mail a
3725         **              message back.
3726         **      We goose error returns by clearing error bit.
3727         */
3728
3729         SmtpPhase = "delivery";
3730         (void) sm_io_setinfo(e->e_xfp, SM_BF_TRUNCATE, NULL);
3731         id = e->e_id;
3732
3733 #if NAMED_BIND
3734         _res.retry = TimeOuts.res_retry[RES_TO_FIRST];
3735         _res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
3736 #endif /* NAMED_BIND */
3737
3738
3739         for (ee = e; ee != NULL; ee = ee->e_sibling)
3740         {
3741                 /* make sure we actually do delivery */
3742                 ee->e_flags &= ~EF_CLRQUEUE;
3743
3744                 /* from now on, operate silently */
3745                 ee->e_errormode = EM_MAIL;
3746
3747                 if (doublequeue)
3748                 {
3749                         /* make sure it is in the queue */
3750                         queueup(ee, false, true);
3751                 }
3752                 else
3753                 {
3754                         int mode;
3755
3756                         /* send to all recipients */
3757                         mode = SM_DEFAULT;
3758 #if _FFR_DM_ONE
3759                         if (SM_DM_ONE == e->e_sendmode)
3760                         {
3761                                 if (NotFirstDelivery)
3762                                 {
3763                                         mode = SM_QUEUE;
3764                                         e->e_sendmode = SM_QUEUE;
3765                                 }
3766                                 else
3767                                 {
3768                                         mode = SM_FORK;
3769                                         NotFirstDelivery = true;
3770                                 }
3771                         }
3772 #endif /* _FFR_DM_ONE */
3773                         sendall(ee, mode);
3774                 }
3775                 ee->e_to = NULL;
3776         }
3777
3778         /* put back id for SMTP logging in putoutmsg() */
3779         oldid = CurEnv->e_id;
3780         CurEnv->e_id = id;
3781
3782                 /* issue success message */
3783 #if _FFR_MSG_ACCEPT
3784                 if (MessageAccept != NULL && *MessageAccept != '\0')
3785                 {
3786                         char msg[MAXLINE];
3787
3788                         expand(MessageAccept, msg, sizeof(msg), e);
3789                         message("250 2.0.0 %s", msg);
3790                 }
3791                 else
3792 #endif /* _FFR_MSG_ACCEPT */
3793                 message("250 2.0.0 %s Message accepted for delivery", id);
3794         CurEnv->e_id = oldid;
3795
3796         /* if we just queued, poke it */
3797         if (doublequeue)
3798         {
3799                 bool anything_to_send = false;
3800
3801                 sm_getla();
3802                 for (ee = e; ee != NULL; ee = ee->e_sibling)
3803                 {
3804                         if (WILL_BE_QUEUED(ee->e_sendmode))
3805                                 continue;
3806                         if (shouldqueue(ee->e_msgpriority, ee->e_ctime))
3807                         {
3808                                 ee->e_sendmode = SM_QUEUE;
3809                                 continue;
3810                         }
3811                         else if (QueueMode != QM_QUARANTINE &&
3812                                  ee->e_quarmsg != NULL)
3813                         {
3814                                 ee->e_sendmode = SM_QUEUE;
3815                                 continue;
3816                         }
3817                         anything_to_send = true;
3818
3819                         /* close all the queue files */
3820                         closexscript(ee);
3821                         if (ee->e_dfp != NULL)
3822                         {
3823                                 (void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
3824                                 ee->e_dfp = NULL;
3825                         }
3826                         unlockqueue(ee);
3827                 }
3828                 if (anything_to_send)
3829                 {
3830 #if PIPELINING
3831                         /*
3832                         **  XXX if we don't do this, we get 250 twice
3833                         **      because it is also flushed in the child.
3834                         */
3835
3836                         (void) sm_io_flush(OutChannel, SM_TIME_DEFAULT);
3837 #endif /* PIPELINING */
3838                         (void) doworklist(e, true, true);
3839                 }
3840         }
3841
3842   abortmessage:
3843         if (tTd(92, 2))
3844                 sm_dprintf("abortmessage: e_id=%s, EF_LOGSENDER=%d, LogLevel=%d\n",
3845                         e->e_id, bitset(EF_LOGSENDER, e->e_flags), LogLevel);
3846         if (LogLevel > 4 && bitset(EF_LOGSENDER, e->e_flags))
3847                 logsender(e, NULL);
3848         e->e_flags &= ~EF_LOGSENDER;
3849
3850         /* clean up a bit */
3851         smtp->sm_gotmail = false;
3852
3853         /*
3854         **  Call dropenvelope if and only if the envelope is *not*
3855         **  being processed by the child process forked by doworklist().
3856         */
3857
3858         if (aborting || bitset(EF_DISCARD, e->e_flags))
3859                 (void) dropenvelope(e, true, false);
3860         else
3861         {
3862                 for (ee = e; ee != NULL; ee = ee->e_sibling)
3863                 {
3864                         if (!doublequeue &&
3865                             QueueMode != QM_QUARANTINE &&
3866                             ee->e_quarmsg != NULL)
3867                         {
3868                                 (void) dropenvelope(ee, true, false);
3869                                 continue;
3870                         }
3871                         if (WILL_BE_QUEUED(ee->e_sendmode))
3872                                 (void) dropenvelope(ee, true, false);
3873                 }
3874         }
3875
3876         CurEnv = e;
3877         features = e->e_features;
3878         sm_rpool_free(e->e_rpool);
3879         newenvelope(e, e, sm_rpool_new_x(NULL));
3880         e->e_flags = BlankEnvelope.e_flags;
3881         e->e_features = features;
3882
3883         /* restore connection quarantining */
3884         if (smtp->sm_quarmsg == NULL)
3885         {
3886                 e->e_quarmsg = NULL;
3887                 macdefine(&e->e_macro, A_PERM, macid("{quarantine}"), "");
3888         }
3889         else
3890         {
3891                 e->e_quarmsg = sm_rpool_strdup_x(e->e_rpool, smtp->sm_quarmsg);
3892                 macdefine(&e->e_macro, A_PERM,
3893                           macid("{quarantine}"), e->e_quarmsg);
3894         }
3895         return rv;
3896 }
3897 /*
3898 **  LOGUNDELRCPTS -- log undelivered (or all) recipients.
3899 **
3900 **      Parameters:
3901 **              e -- envelope.
3902 **              msg -- message for Stat=
3903 **              level -- log level.
3904 **              all -- log all recipients.
3905 **
3906 **      Returns:
3907 **              none.
3908 **
3909 **      Side Effects:
3910 **              logs undelivered (or all) recipients
3911 */
3912
3913 void
3914 logundelrcpts(e, msg, level, all)
3915         ENVELOPE *e;
3916         char *msg;
3917         int level;
3918         bool all;
3919 {
3920         ADDRESS *a;
3921
3922         if (LogLevel <= level || msg == NULL || *msg == '\0')
3923                 return;
3924
3925         /* Clear $h so relay= doesn't get mislogged by logdelivery() */
3926         macdefine(&e->e_macro, A_PERM, 'h', NULL);
3927
3928         /* Log who the mail would have gone to */
3929         for (a = e->e_sendqueue; a != NULL; a = a->q_next)
3930         {
3931                 if (!QS_IS_UNDELIVERED(a->q_state) && !all)
3932                         continue;
3933                 e->e_to = a->q_paddr;
3934                 logdelivery(NULL, NULL,
3935 #if _FFR_MILTER_ENHSC
3936                             (a->q_status == NULL && e->e_enhsc[0] != '\0')
3937                             ? e->e_enhsc :
3938 #endif /* _FFR_MILTER_ENHSC */
3939                             a->q_status,
3940                             msg, NULL, (time_t) 0, e);
3941         }
3942         e->e_to = NULL;
3943 }
3944 /*
3945 **  CHECKSMTPATTACK -- check for denial-of-service attack by repetition
3946 **
3947 **      Parameters:
3948 **              pcounter -- pointer to a counter for this command.
3949 **              maxcount -- maximum value for this counter before we
3950 **                      slow down.
3951 **              waitnow -- sleep now (in this routine)?
3952 **              cname -- command name for logging.
3953 **              e -- the current envelope.
3954 **
3955 **      Returns:
3956 **              time to wait,
3957 **              STOP_ATTACK if twice as many commands as allowed and
3958 **                      MaxChildren > 0.
3959 **
3960 **      Side Effects:
3961 **              Slows down if we seem to be under attack.
3962 */
3963
3964 static time_t
3965 checksmtpattack(pcounter, maxcount, waitnow, cname, e)
3966         volatile unsigned int *pcounter;
3967         unsigned int maxcount;
3968         bool waitnow;
3969         char *cname;
3970         ENVELOPE *e;
3971 {
3972         if (maxcount <= 0)      /* no limit */
3973                 return (time_t) 0;
3974
3975         if (++(*pcounter) >= maxcount)
3976         {
3977                 unsigned int shift;
3978                 time_t s;
3979
3980                 if (*pcounter == maxcount && LogLevel > 5)
3981                 {
3982                         sm_syslog(LOG_INFO, e->e_id,
3983                                   "%s: possible SMTP attack: command=%.40s, count=%u",
3984                                   CurSmtpClient, cname, *pcounter);
3985                 }
3986                 shift = *pcounter - maxcount;
3987                 s = 1 << shift;
3988                 if (shift > MAXSHIFT || s >= MAXTIMEOUT || s <= 0)
3989                         s = MAXTIMEOUT;
3990
3991 #define IS_ATTACK(s)    ((MaxChildren > 0 && *pcounter >= maxcount * 2) \
3992                                 ? STOP_ATTACK : (time_t) s)
3993
3994                 /* sleep at least 1 second before returning */
3995                 (void) sleep(*pcounter / maxcount);
3996                 s -= *pcounter / maxcount;
3997                 if (s >= MAXTIMEOUT || s < 0)
3998                         s = MAXTIMEOUT;
3999                 if (waitnow && s > 0)
4000                 {
4001                         (void) sleep(s);
4002                         return IS_ATTACK(0);
4003                 }
4004                 return IS_ATTACK(s);
4005         }
4006         return (time_t) 0;
4007 }
4008 /*
4009 **  SETUP_SMTPD_IO -- setup I/O fd correctly for the SMTP server
4010 **
4011 **      Parameters:
4012 **              none.
4013 **
4014 **      Returns:
4015 **              nothing.
4016 **
4017 **      Side Effects:
4018 **              may change I/O fd.
4019 */
4020
4021 static void
4022 setup_smtpd_io()
4023 {
4024         int inchfd, outchfd, outfd;
4025
4026         inchfd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL);
4027         outchfd  = sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL);
4028         outfd = sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL);
4029         if (outchfd != outfd)
4030         {
4031                 /* arrange for debugging output to go to remote host */
4032                 (void) dup2(outchfd, outfd);
4033         }
4034
4035         /*
4036         **  if InChannel and OutChannel are stdin/stdout
4037         **  and connected to ttys
4038         **  and fcntl(STDIN, F_SETFL, O_NONBLOCKING) also changes STDOUT,
4039         **  then "chain" them together.
4040         */
4041
4042         if (inchfd == STDIN_FILENO && outchfd == STDOUT_FILENO &&
4043             isatty(inchfd) && isatty(outchfd))
4044         {
4045                 int inmode, outmode;
4046
4047                 inmode = fcntl(inchfd, F_GETFL, 0);
4048                 if (inmode == -1)
4049                 {
4050                         if (LogLevel > 11)
4051                                 sm_syslog(LOG_INFO, NOQID,
4052                                         "fcntl(inchfd, F_GETFL) failed: %s",
4053                                         sm_errstring(errno));
4054                         return;
4055                 }
4056                 outmode = fcntl(outchfd, F_GETFL, 0);
4057                 if (outmode == -1)
4058                 {
4059                         if (LogLevel > 11)
4060                                 sm_syslog(LOG_INFO, NOQID,
4061                                         "fcntl(outchfd, F_GETFL) failed: %s",
4062                                         sm_errstring(errno));
4063                         return;
4064                 }
4065                 if (bitset(O_NONBLOCK, inmode) ||
4066                     bitset(O_NONBLOCK, outmode) ||
4067                     fcntl(inchfd, F_SETFL, inmode | O_NONBLOCK) == -1)
4068                         return;
4069                 outmode = fcntl(outchfd, F_GETFL, 0);
4070                 if (outmode != -1 && bitset(O_NONBLOCK, outmode))
4071                 {
4072                         /* changing InChannel also changes OutChannel */
4073                         sm_io_automode(OutChannel, InChannel);
4074                         if (tTd(97, 4) && LogLevel > 9)
4075                                 sm_syslog(LOG_INFO, NOQID,
4076                                           "set automode for I (%d)/O (%d) in SMTP server",
4077                                           inchfd, outchfd);
4078                 }
4079
4080                 /* undo change of inchfd */
4081                 (void) fcntl(inchfd, F_SETFL, inmode);
4082         }
4083 }
4084 /*
4085 **  SKIPWORD -- skip a fixed word.
4086 **
4087 **      Parameters:
4088 **              p -- place to start looking.
4089 **              w -- word to skip.
4090 **
4091 **      Returns:
4092 **              p following w.
4093 **              NULL on error.
4094 **
4095 **      Side Effects:
4096 **              clobbers the p data area.
4097 */
4098
4099 static char *
4100 skipword(p, w)
4101         register char *volatile p;
4102         char *w;
4103 {
4104         register char *q;
4105         char *firstp = p;
4106
4107         /* find beginning of word */
4108         SKIP_SPACE(p);
4109         q = p;
4110
4111         /* find end of word */
4112         while (*p != '\0' && *p != ':' && !(isascii(*p) && isspace(*p)))
4113                 p++;
4114         while (isascii(*p) && isspace(*p))
4115                 *p++ = '\0';
4116         if (*p != ':')
4117         {
4118           syntax:
4119                 usrerr("501 5.5.2 Syntax error in parameters scanning \"%s\"",
4120                         shortenstring(firstp, MAXSHORTSTR));
4121                 return NULL;
4122         }
4123         *p++ = '\0';
4124         SKIP_SPACE(p);
4125
4126         if (*p == '\0')
4127                 goto syntax;
4128
4129         /* see if the input word matches desired word */
4130         if (sm_strcasecmp(q, w))
4131                 goto syntax;
4132
4133         return p;
4134 }
4135
4136 /*
4137 **  RESET_MAIL_ESMTP_ARGS -- process ESMTP arguments from MAIL line
4138 **
4139 **      Parameters:
4140 **              e -- the envelope.
4141 **
4142 **      Returns:
4143 **              none.
4144 */
4145
4146 void
4147 reset_mail_esmtp_args(e)
4148         ENVELOPE *e;
4149 {
4150         /* "size": no reset */
4151
4152         /* "body" */
4153         SevenBitInput = SevenBitInput_Saved;
4154         e->e_bodytype = NULL;
4155
4156         /* "envid" */
4157         e->e_envid = NULL;
4158         macdefine(&e->e_macro, A_PERM, macid("{dsn_envid}"), NULL);
4159
4160         /* "ret" */
4161         e->e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
4162         macdefine(&e->e_macro, A_TEMP, macid("{dsn_ret}"), NULL);
4163
4164 #if SASL
4165         /* "auth" */
4166         macdefine(&e->e_macro, A_TEMP, macid("{auth_author}"), NULL);
4167         e->e_auth_param = "";
4168 # if _FFR_AUTH_PASSING
4169         macdefine(&BlankEnvelope.e_macro, A_PERM,
4170                                   macid("{auth_author}"), NULL);
4171 # endif /* _FFR_AUTH_PASSING */
4172 #endif /* SASL */
4173
4174         /* "by" */
4175         e->e_deliver_by = 0;
4176         e->e_dlvr_flag = 0;
4177 }
4178
4179 /*
4180 **  MAIL_ESMTP_ARGS -- process ESMTP arguments from MAIL line
4181 **
4182 **      Parameters:
4183 **              a -- address (unused, for compatibility with rcpt_esmtp_args)
4184 **              kp -- the parameter key.
4185 **              vp -- the value of that parameter.
4186 **              e -- the envelope.
4187 **
4188 **      Returns:
4189 **              none.
4190 */
4191
4192 void
4193 mail_esmtp_args(a, kp, vp, e)
4194         ADDRESS *a;
4195         char *kp;
4196         char *vp;
4197         ENVELOPE *e;
4198 {
4199         if (sm_strcasecmp(kp, "size") == 0)
4200         {
4201                 if (vp == NULL)
4202                 {
4203                         usrerr("501 5.5.2 SIZE requires a value");
4204                         /* NOTREACHED */
4205                 }
4206                 macdefine(&e->e_macro, A_TEMP, macid("{msg_size}"), vp);
4207                 errno = 0;
4208                 e->e_msgsize = strtol(vp, (char **) NULL, 10);
4209                 if (e->e_msgsize == LONG_MAX && errno == ERANGE)
4210                 {
4211                         usrerr("552 5.2.3 Message size exceeds maximum value");
4212                         /* NOTREACHED */
4213                 }
4214                 if (e->e_msgsize < 0)
4215                 {
4216                         usrerr("552 5.2.3 Message size invalid");
4217                         /* NOTREACHED */
4218                 }
4219         }
4220         else if (sm_strcasecmp(kp, "body") == 0)
4221         {
4222                 if (vp == NULL)
4223                 {
4224                         usrerr("501 5.5.2 BODY requires a value");
4225                         /* NOTREACHED */
4226                 }
4227                 else if (sm_strcasecmp(vp, "8bitmime") == 0)
4228                 {
4229                         SevenBitInput = false;
4230                 }
4231                 else if (sm_strcasecmp(vp, "7bit") == 0)
4232                 {
4233                         SevenBitInput = true;
4234                 }
4235                 else
4236                 {
4237                         usrerr("501 5.5.4 Unknown BODY type %s", vp);
4238                         /* NOTREACHED */
4239                 }
4240                 e->e_bodytype = sm_rpool_strdup_x(e->e_rpool, vp);
4241         }
4242         else if (sm_strcasecmp(kp, "envid") == 0)
4243         {
4244                 if (!bitset(SRV_OFFER_DSN, e->e_features))
4245                 {
4246                         usrerr("504 5.7.0 Sorry, ENVID not supported, we do not allow DSN");
4247                         /* NOTREACHED */
4248                 }
4249                 if (vp == NULL)
4250                 {
4251                         usrerr("501 5.5.2 ENVID requires a value");
4252                         /* NOTREACHED */
4253                 }
4254                 if (!xtextok(vp))
4255                 {
4256                         usrerr("501 5.5.4 Syntax error in ENVID parameter value");
4257                         /* NOTREACHED */
4258                 }
4259                 if (e->e_envid != NULL)
4260                 {
4261                         usrerr("501 5.5.0 Duplicate ENVID parameter");
4262                         /* NOTREACHED */
4263                 }
4264                 e->e_envid = sm_rpool_strdup_x(e->e_rpool, vp);
4265                 macdefine(&e->e_macro, A_PERM,
4266                         macid("{dsn_envid}"), e->e_envid);
4267         }
4268         else if (sm_strcasecmp(kp, "ret") == 0)
4269         {
4270                 if (!bitset(SRV_OFFER_DSN, e->e_features))
4271                 {
4272                         usrerr("504 5.7.0 Sorry, RET not supported, we do not allow DSN");
4273                         /* NOTREACHED */
4274                 }
4275                 if (vp == NULL)
4276                 {
4277                         usrerr("501 5.5.2 RET requires a value");
4278                         /* NOTREACHED */
4279                 }
4280                 if (bitset(EF_RET_PARAM, e->e_flags))
4281                 {
4282                         usrerr("501 5.5.0 Duplicate RET parameter");
4283                         /* NOTREACHED */
4284                 }
4285                 e->e_flags |= EF_RET_PARAM;
4286                 if (sm_strcasecmp(vp, "hdrs") == 0)
4287                         e->e_flags |= EF_NO_BODY_RETN;
4288                 else if (sm_strcasecmp(vp, "full") != 0)
4289                 {
4290                         usrerr("501 5.5.2 Bad argument \"%s\" to RET", vp);
4291                         /* NOTREACHED */
4292                 }
4293                 macdefine(&e->e_macro, A_TEMP, macid("{dsn_ret}"), vp);
4294         }
4295 #if SASL
4296         else if (sm_strcasecmp(kp, "auth") == 0)
4297         {
4298                 int len;
4299                 char *q;
4300                 char *auth_param;       /* the value of the AUTH=x */
4301                 bool saveQuickAbort = QuickAbort;
4302                 bool saveSuprErrs = SuprErrs;
4303                 bool saveExitStat = ExitStat;
4304
4305                 if (vp == NULL)
4306                 {
4307                         usrerr("501 5.5.2 AUTH= requires a value");
4308                         /* NOTREACHED */
4309                 }
4310                 if (e->e_auth_param != NULL)
4311                 {
4312                         usrerr("501 5.5.0 Duplicate AUTH parameter");
4313                         /* NOTREACHED */
4314                 }
4315                 if ((q = strchr(vp, ' ')) != NULL)
4316                         len = q - vp + 1;
4317                 else
4318                         len = strlen(vp) + 1;
4319                 auth_param = xalloc(len);
4320                 (void) sm_strlcpy(auth_param, vp, len);
4321                 if (!xtextok(auth_param))
4322                 {
4323                         usrerr("501 5.5.4 Syntax error in AUTH parameter value");
4324                         /* just a warning? */
4325                         /* NOTREACHED */
4326                 }
4327
4328                 /* XXX define this always or only if trusted? */
4329                 macdefine(&e->e_macro, A_TEMP, macid("{auth_author}"),
4330                           auth_param);
4331
4332                 /*
4333                 **  call Strust_auth to find out whether
4334                 **  auth_param is acceptable (trusted)
4335                 **  we shouldn't trust it if not authenticated
4336                 **  (required by RFC, leave it to ruleset?)
4337                 */
4338
4339                 SuprErrs = true;
4340                 QuickAbort = false;
4341                 if (strcmp(auth_param, "<>") != 0 &&
4342                      (rscheck("trust_auth", auth_param, NULL, e, RSF_RMCOMM,
4343                               9, NULL, NOQID, NULL) != EX_OK || Errors > 0))
4344                 {
4345                         if (tTd(95, 8))
4346                         {
4347                                 q = e->e_auth_param;
4348                                 sm_dprintf("auth=\"%.100s\" not trusted user=\"%.100s\"\n",
4349                                         auth_param, (q == NULL) ? "" : q);
4350                         }
4351
4352                         /* not trusted */
4353                         e->e_auth_param = "<>";
4354 # if _FFR_AUTH_PASSING
4355                         macdefine(&BlankEnvelope.e_macro, A_PERM,
4356                                   macid("{auth_author}"), NULL);
4357 # endif /* _FFR_AUTH_PASSING */
4358                 }
4359                 else
4360                 {
4361                         if (tTd(95, 8))
4362                                 sm_dprintf("auth=\"%.100s\" trusted\n", auth_param);
4363                         e->e_auth_param = sm_rpool_strdup_x(e->e_rpool,
4364                                                             auth_param);
4365                 }
4366                 sm_free(auth_param); /* XXX */
4367
4368                 /* reset values */
4369                 Errors = 0;
4370                 QuickAbort = saveQuickAbort;
4371                 SuprErrs = saveSuprErrs;
4372                 ExitStat = saveExitStat;
4373         }
4374 #endif /* SASL */
4375 #define PRTCHAR(c)      ((isascii(c) && isprint(c)) ? (c) : '?')
4376
4377         /*
4378         **  "by" is only accepted if DeliverByMin >= 0.
4379         **  We maybe could add this to the list of server_features.
4380         */
4381
4382         else if (sm_strcasecmp(kp, "by") == 0 && DeliverByMin >= 0)
4383         {
4384                 char *s;
4385
4386                 if (vp == NULL)
4387                 {
4388                         usrerr("501 5.5.2 BY= requires a value");
4389                         /* NOTREACHED */
4390                 }
4391                 errno = 0;
4392                 e->e_deliver_by = strtol(vp, &s, 10);
4393                 if (e->e_deliver_by == LONG_MIN ||
4394                     e->e_deliver_by == LONG_MAX ||
4395                     e->e_deliver_by > 999999999l ||
4396                     e->e_deliver_by < -999999999l)
4397                 {
4398                         usrerr("501 5.5.2 BY=%s out of range", vp);
4399                         /* NOTREACHED */
4400                 }
4401                 if (s == NULL || *s != ';')
4402                 {
4403                         usrerr("501 5.5.2 BY= missing ';'");
4404                         /* NOTREACHED */
4405                 }
4406                 e->e_dlvr_flag = 0;
4407                 ++s;    /* XXX: spaces allowed? */
4408                 SKIP_SPACE(s);
4409                 switch (tolower(*s))
4410                 {
4411                   case 'n':
4412                         e->e_dlvr_flag = DLVR_NOTIFY;
4413                         break;
4414                   case 'r':
4415                         e->e_dlvr_flag = DLVR_RETURN;
4416                         if (e->e_deliver_by <= 0)
4417                         {
4418                                 usrerr("501 5.5.4 mode R requires BY time > 0");
4419                                 /* NOTREACHED */
4420                         }
4421                         if (DeliverByMin > 0 && e->e_deliver_by > 0 &&
4422                             e->e_deliver_by < DeliverByMin)
4423                         {
4424                                 usrerr("555 5.5.2 time %ld less than %ld",
4425                                         e->e_deliver_by, (long) DeliverByMin);
4426                                 /* NOTREACHED */
4427                         }
4428                         break;
4429                   default:
4430                         usrerr("501 5.5.2 illegal by-mode '%c'", PRTCHAR(*s));
4431                         /* NOTREACHED */
4432                 }
4433                 ++s;    /* XXX: spaces allowed? */
4434                 SKIP_SPACE(s);
4435                 switch (tolower(*s))
4436                 {
4437                   case 't':
4438                         e->e_dlvr_flag |= DLVR_TRACE;
4439                         break;
4440                   case '\0':
4441                         break;
4442                   default:
4443                         usrerr("501 5.5.2 illegal by-trace '%c'", PRTCHAR(*s));
4444                         /* NOTREACHED */
4445                 }
4446
4447                 /* XXX: check whether more characters follow? */
4448         }
4449         else
4450         {
4451                 usrerr("555 5.5.4 %s parameter unrecognized", kp);
4452                 /* NOTREACHED */
4453         }
4454 }
4455
4456 /*
4457 **  RCPT_ESMTP_ARGS -- process ESMTP arguments from RCPT line
4458 **
4459 **      Parameters:
4460 **              a -- the address corresponding to the To: parameter.
4461 **              kp -- the parameter key.
4462 **              vp -- the value of that parameter.
4463 **              e -- the envelope.
4464 **
4465 **      Returns:
4466 **              none.
4467 */
4468
4469 void
4470 rcpt_esmtp_args(a, kp, vp, e)
4471         ADDRESS *a;
4472         char *kp;
4473         char *vp;
4474         ENVELOPE *e;
4475 {
4476         if (sm_strcasecmp(kp, "notify") == 0)
4477         {
4478                 char *p;
4479
4480                 if (!bitset(SRV_OFFER_DSN, e->e_features))
4481                 {
4482                         usrerr("504 5.7.0 Sorry, NOTIFY not supported, we do not allow DSN");
4483                         /* NOTREACHED */
4484                 }
4485                 if (vp == NULL)
4486                 {
4487                         usrerr("501 5.5.2 NOTIFY requires a value");
4488                         /* NOTREACHED */
4489                 }
4490                 a->q_flags &= ~(QPINGONSUCCESS|QPINGONFAILURE|QPINGONDELAY);
4491                 a->q_flags |= QHASNOTIFY;
4492                 macdefine(&e->e_macro, A_TEMP, macid("{dsn_notify}"), vp);
4493
4494                 if (sm_strcasecmp(vp, "never") == 0)
4495                         return;
4496                 for (p = vp; p != NULL; vp = p)
4497                 {
4498                         char *s;
4499
4500                         s = p = strchr(p, ',');
4501                         if (p != NULL)
4502                                 *p++ = '\0';
4503                         if (sm_strcasecmp(vp, "success") == 0)
4504                                 a->q_flags |= QPINGONSUCCESS;
4505                         else if (sm_strcasecmp(vp, "failure") == 0)
4506                                 a->q_flags |= QPINGONFAILURE;
4507                         else if (sm_strcasecmp(vp, "delay") == 0)
4508                                 a->q_flags |= QPINGONDELAY;
4509                         else
4510                         {
4511                                 usrerr("501 5.5.4 Bad argument \"%s\"  to NOTIFY",
4512                                         vp);
4513                                 /* NOTREACHED */
4514                         }
4515                         if (s != NULL)
4516                                 *s = ',';
4517                 }
4518         }
4519         else if (sm_strcasecmp(kp, "orcpt") == 0)
4520         {
4521                 char *p;
4522
4523                 if (!bitset(SRV_OFFER_DSN, e->e_features))
4524                 {
4525                         usrerr("504 5.7.0 Sorry, ORCPT not supported, we do not allow DSN");
4526                         /* NOTREACHED */
4527                 }
4528                 if (vp == NULL)
4529                 {
4530                         usrerr("501 5.5.2 ORCPT requires a value");
4531                         /* NOTREACHED */
4532                 }
4533                 if (a->q_orcpt != NULL)
4534                 {
4535                         usrerr("501 5.5.0 Duplicate ORCPT parameter");
4536                         /* NOTREACHED */
4537                 }
4538                 p = strchr(vp, ';');
4539                 if (p == NULL)
4540                 {
4541                         usrerr("501 5.5.4 Syntax error in ORCPT parameter value");
4542                         /* NOTREACHED */
4543                 }
4544                 *p = '\0';
4545                 if (!isatom(vp) || !xtextok(p + 1))
4546                 {
4547                         *p = ';';
4548                         usrerr("501 5.5.4 Syntax error in ORCPT parameter value");
4549                         /* NOTREACHED */
4550                 }
4551                 *p = ';';
4552                 a->q_orcpt = sm_rpool_strdup_x(e->e_rpool, vp);
4553         }
4554         else
4555         {
4556                 usrerr("555 5.5.4 %s parameter unrecognized", kp);
4557                 /* NOTREACHED */
4558         }
4559 }
4560 /*
4561 **  PRINTVRFYADDR -- print an entry in the verify queue
4562 **
4563 **      Parameters:
4564 **              a -- the address to print.
4565 **              last -- set if this is the last one.
4566 **              vrfy -- set if this is a VRFY command.
4567 **
4568 **      Returns:
4569 **              none.
4570 **
4571 **      Side Effects:
4572 **              Prints the appropriate 250 codes.
4573 */
4574 #define OFFF    (3 + 1 + 5 + 1) /* offset in fmt: SMTP reply + enh. code */
4575
4576 static void
4577 printvrfyaddr(a, last, vrfy)
4578         register ADDRESS *a;
4579         bool last;
4580         bool vrfy;
4581 {
4582         char fmtbuf[30];
4583
4584         if (vrfy && a->q_mailer != NULL &&
4585             !bitnset(M_VRFY250, a->q_mailer->m_flags))
4586                 (void) sm_strlcpy(fmtbuf, "252", sizeof(fmtbuf));
4587         else
4588                 (void) sm_strlcpy(fmtbuf, "250", sizeof(fmtbuf));
4589         fmtbuf[3] = last ? ' ' : '-';
4590         (void) sm_strlcpy(&fmtbuf[4], "2.1.5 ", sizeof(fmtbuf) - 4);
4591         if (a->q_fullname == NULL)
4592         {
4593                 if ((a->q_mailer == NULL ||
4594                      a->q_mailer->m_addrtype == NULL ||
4595                      sm_strcasecmp(a->q_mailer->m_addrtype, "rfc822") == 0) &&
4596                     strchr(a->q_user, '@') == NULL)
4597                         (void) sm_strlcpy(&fmtbuf[OFFF], "<%s@%s>",
4598                                        sizeof(fmtbuf) - OFFF);
4599                 else
4600                         (void) sm_strlcpy(&fmtbuf[OFFF], "<%s>",
4601                                        sizeof(fmtbuf) - OFFF);
4602                 message(fmtbuf, a->q_user, MyHostName);
4603         }
4604         else
4605         {
4606                 if ((a->q_mailer == NULL ||
4607                      a->q_mailer->m_addrtype == NULL ||
4608                      sm_strcasecmp(a->q_mailer->m_addrtype, "rfc822") == 0) &&
4609                     strchr(a->q_user, '@') == NULL)
4610                         (void) sm_strlcpy(&fmtbuf[OFFF], "%s <%s@%s>",
4611                                        sizeof(fmtbuf) - OFFF);
4612                 else
4613                         (void) sm_strlcpy(&fmtbuf[OFFF], "%s <%s>",
4614                                        sizeof(fmtbuf) - OFFF);
4615                 message(fmtbuf, a->q_fullname, a->q_user, MyHostName);
4616         }
4617 }
4618
4619 #if SASL
4620 /*
4621 **  SASLMECHS -- get list of possible AUTH mechanisms
4622 **
4623 **      Parameters:
4624 **              conn -- SASL connection info.
4625 **              mechlist -- output parameter for list of mechanisms.
4626 **
4627 **      Returns:
4628 **              number of mechs.
4629 */
4630
4631 static int
4632 saslmechs(conn, mechlist)
4633         sasl_conn_t *conn;
4634         char **mechlist;
4635 {
4636         int len, num, result;
4637
4638         /* "user" is currently unused */
4639 # if SASL >= 20000
4640         result = sasl_listmech(conn, NULL,
4641                                "", " ", "", (const char **) mechlist,
4642                                (unsigned int *)&len, &num);
4643 # else /* SASL >= 20000 */
4644         result = sasl_listmech(conn, "user", /* XXX */
4645                                "", " ", "", mechlist,
4646                                (unsigned int *)&len, (unsigned int *)&num);
4647 # endif /* SASL >= 20000 */
4648         if (result != SASL_OK)
4649         {
4650                 if (LogLevel > 9)
4651                         sm_syslog(LOG_WARNING, NOQID,
4652                                   "AUTH error: listmech=%d, num=%d",
4653                                   result, num);
4654                 num = 0;
4655         }
4656         if (num > 0)
4657         {
4658                 if (LogLevel > 11)
4659                         sm_syslog(LOG_INFO, NOQID,
4660                                   "AUTH: available mech=%s, allowed mech=%s",
4661                                   *mechlist, AuthMechanisms);
4662                 *mechlist = intersect(AuthMechanisms, *mechlist, NULL);
4663         }
4664         else
4665         {
4666                 *mechlist = NULL;       /* be paranoid... */
4667                 if (result == SASL_OK && LogLevel > 9)
4668                         sm_syslog(LOG_WARNING, NOQID,
4669                                   "AUTH warning: no mechanisms");
4670         }
4671         return num;
4672 }
4673
4674 # if SASL >= 20000
4675 /*
4676 **  PROXY_POLICY -- define proxy policy for AUTH
4677 **
4678 **      Parameters:
4679 **              conn -- unused.
4680 **              context -- unused.
4681 **              requested_user -- authorization identity.
4682 **              rlen -- authorization identity length.
4683 **              auth_identity -- authentication identity.
4684 **              alen -- authentication identity length.
4685 **              def_realm -- default user realm.
4686 **              urlen -- user realm length.
4687 **              propctx -- unused.
4688 **
4689 **      Returns:
4690 **              ok?
4691 **
4692 **      Side Effects:
4693 **              sets {auth_authen} macro.
4694 */
4695
4696 int
4697 proxy_policy(conn, context, requested_user, rlen, auth_identity, alen,
4698              def_realm, urlen, propctx)
4699         sasl_conn_t *conn;
4700         void *context;
4701         const char *requested_user;
4702         unsigned rlen;
4703         const char *auth_identity;
4704         unsigned alen;
4705         const char *def_realm;
4706         unsigned urlen;
4707         struct propctx *propctx;
4708 {
4709         if (auth_identity == NULL)
4710                 return SASL_FAIL;
4711
4712         macdefine(&BlankEnvelope.e_macro, A_TEMP,
4713                   macid("{auth_authen}"),
4714                   xtextify((char *) auth_identity, "=<>\")"));
4715
4716         return SASL_OK;
4717 }
4718 # else /* SASL >= 20000 */
4719
4720 /*
4721 **  PROXY_POLICY -- define proxy policy for AUTH
4722 **
4723 **      Parameters:
4724 **              context -- unused.
4725 **              auth_identity -- authentication identity.
4726 **              requested_user -- authorization identity.
4727 **              user -- allowed user (output).
4728 **              errstr -- possible error string (output).
4729 **
4730 **      Returns:
4731 **              ok?
4732 */
4733
4734 int
4735 proxy_policy(context, auth_identity, requested_user, user, errstr)
4736         void *context;
4737         const char *auth_identity;
4738         const char *requested_user;
4739         const char **user;
4740         const char **errstr;
4741 {
4742         if (user == NULL || auth_identity == NULL)
4743                 return SASL_FAIL;
4744         *user = newstr(auth_identity);
4745         return SASL_OK;
4746 }
4747 # endif /* SASL >= 20000 */
4748 #endif /* SASL */
4749
4750 #if STARTTLS
4751 /*
4752 **  INITSRVTLS -- initialize server side TLS
4753 **
4754 **      Parameters:
4755 **              tls_ok -- should tls initialization be done?
4756 **
4757 **      Returns:
4758 **              succeeded?
4759 **
4760 **      Side Effects:
4761 **              sets tls_ok_srv which is a static variable in this module.
4762 **              Do NOT remove assignments to it!
4763 */
4764
4765 bool
4766 initsrvtls(tls_ok)
4767         bool tls_ok;
4768 {
4769         if (!tls_ok)
4770                 return false;
4771
4772         /* do NOT remove assignment */
4773         tls_ok_srv = inittls(&srv_ctx, TLS_Srv_Opts, Srv_SSL_Options, true,
4774                              SrvCertFile, SrvKeyFile,
4775                              CACertPath, CACertFile, DHParams);
4776         return tls_ok_srv;
4777 }
4778 #endif /* STARTTLS */
4779 /*
4780 **  SRVFEATURES -- get features for SMTP server
4781 **
4782 **      Parameters:
4783 **              e -- envelope (should be session context).
4784 **              clientname -- name of client.
4785 **              features -- default features for this invocation.
4786 **
4787 **      Returns:
4788 **              server features.
4789 */
4790
4791 /* table with options: it uses just one character, how about strings? */
4792 static struct
4793 {
4794         char            srvf_opt;
4795         unsigned int    srvf_flag;
4796 } srv_feat_table[] =
4797 {
4798         { 'A',  SRV_OFFER_AUTH  },
4799         { 'B',  SRV_OFFER_VERB  },
4800         { 'C',  SRV_REQ_SEC     },
4801         { 'D',  SRV_OFFER_DSN   },
4802         { 'E',  SRV_OFFER_ETRN  },
4803         { 'L',  SRV_REQ_AUTH    },
4804 #if PIPELINING
4805 # if _FFR_NO_PIPE
4806         { 'N',  SRV_NO_PIPE     },
4807 # endif /* _FFR_NO_PIPE */
4808         { 'P',  SRV_OFFER_PIPE  },
4809 #endif /* PIPELINING */
4810         { 'R',  SRV_VRFY_CLT    },      /* same as V; not documented */
4811         { 'S',  SRV_OFFER_TLS   },
4812 /*      { 'T',  SRV_TMP_FAIL    },      */
4813         { 'V',  SRV_VRFY_CLT    },
4814         { 'X',  SRV_OFFER_EXPN  },
4815 /*      { 'Y',  SRV_OFFER_VRFY  },      */
4816         { '\0', SRV_NONE        }
4817 };
4818
4819 static unsigned int
4820 srvfeatures(e, clientname, features)
4821         ENVELOPE *e;
4822         char *clientname;
4823         unsigned int features;
4824 {
4825         int r, i, j;
4826         char **pvp, c, opt;
4827         char pvpbuf[PSBUFSIZE];
4828
4829         pvp = NULL;
4830         r = rscap("srv_features", clientname, "", e, &pvp, pvpbuf,
4831                   sizeof(pvpbuf));
4832         if (r != EX_OK)
4833                 return features;
4834         if (pvp == NULL || pvp[0] == NULL || (pvp[0][0] & 0377) != CANONNET)
4835                 return features;
4836         if (pvp[1] != NULL && sm_strncasecmp(pvp[1], "temp", 4) == 0)
4837                 return SRV_TMP_FAIL;
4838
4839         /*
4840         **  General rule (see sendmail.h, d_flags):
4841         **  lower case: required/offered, upper case: Not required/available
4842         **
4843         **  Since we can change some features per daemon, we have both
4844         **  cases here: turn on/off a feature.
4845         */
4846
4847         for (i = 1; pvp[i] != NULL; i++)
4848         {
4849                 c = pvp[i][0];
4850                 j = 0;
4851                 for (;;)
4852                 {
4853                         if ((opt = srv_feat_table[j].srvf_opt) == '\0')
4854                         {
4855                                 if (LogLevel > 9)
4856                                         sm_syslog(LOG_WARNING, e->e_id,
4857                                                   "srvfeatures: unknown feature %s",
4858                                                   pvp[i]);
4859                                 break;
4860                         }
4861                         if (c == opt)
4862                         {
4863                                 features &= ~(srv_feat_table[j].srvf_flag);
4864                                 break;
4865                         }
4866                         if (c == tolower(opt))
4867                         {
4868                                 features |= srv_feat_table[j].srvf_flag;
4869                                 break;
4870                         }
4871                         ++j;
4872                 }
4873         }
4874         return features;
4875 }
4876
4877 /*
4878 **  HELP -- implement the HELP command.
4879 **
4880 **      Parameters:
4881 **              topic -- the topic we want help for.
4882 **              e -- envelope.
4883 **
4884 **      Returns:
4885 **              none.
4886 **
4887 **      Side Effects:
4888 **              outputs the help file to message output.
4889 */
4890 #define HELPVSTR        "#vers  "
4891 #define HELPVERSION     2
4892
4893 void
4894 help(topic, e)
4895         char *topic;
4896         ENVELOPE *e;
4897 {
4898         register SM_FILE_T *hf;
4899         register char *p;
4900         int len;
4901         bool noinfo;
4902         bool first = true;
4903         long sff = SFF_OPENASROOT|SFF_REGONLY;
4904         char buf[MAXLINE];
4905         char inp[MAXLINE];
4906         static int foundvers = -1;
4907         extern char Version[];
4908
4909         if (DontLockReadFiles)
4910                 sff |= SFF_NOLOCK;
4911         if (!bitnset(DBS_HELPFILEINUNSAFEDIRPATH, DontBlameSendmail))
4912                 sff |= SFF_SAFEDIRPATH;
4913
4914         if (HelpFile == NULL ||
4915             (hf = safefopen(HelpFile, O_RDONLY, 0444, sff)) == NULL)
4916         {
4917                 /* no help */
4918                 errno = 0;
4919                 message("502 5.3.0 Sendmail %s -- HELP not implemented",
4920                         Version);
4921                 return;
4922         }
4923
4924         if (topic == NULL || *topic == '\0')
4925         {
4926                 topic = "smtp";
4927                 noinfo = false;
4928         }
4929         else
4930         {
4931                 makelower(topic);
4932                 noinfo = true;
4933         }
4934
4935         len = strlen(topic);
4936
4937         while (sm_io_fgets(hf, SM_TIME_DEFAULT, buf, sizeof(buf)) >= 0)
4938         {
4939                 if (buf[0] == '#')
4940                 {
4941                         if (foundvers < 0 &&
4942                             strncmp(buf, HELPVSTR, strlen(HELPVSTR)) == 0)
4943                         {
4944                                 int h;
4945
4946                                 if (sm_io_sscanf(buf + strlen(HELPVSTR), "%d",
4947                                                  &h) == 1)
4948                                         foundvers = h;
4949                         }
4950                         continue;
4951                 }
4952                 if (strncmp(buf, topic, len) == 0)
4953                 {
4954                         if (first)
4955                         {
4956                                 first = false;
4957
4958                                 /* print version if no/old vers# in file */
4959                                 if (foundvers < 2 && !noinfo)
4960                                         message("214-2.0.0 This is Sendmail version %s", Version);
4961                         }
4962                         p = strpbrk(buf, " \t");
4963                         if (p == NULL)
4964                                 p = buf + strlen(buf) - 1;
4965                         else
4966                                 p++;
4967                         fixcrlf(p, true);
4968                         if (foundvers >= 2)
4969                         {
4970                                 char *lbp;
4971                                 int lbs = sizeof(buf) - (p - buf);
4972
4973                                 lbp = translate_dollars(p, p, &lbs);
4974                                 expand(lbp, inp, sizeof(inp), e);
4975                                 if (p != lbp)
4976                                         sm_free(lbp);
4977                                 p = inp;
4978                         }
4979                         message("214-2.0.0 %s", p);
4980                         noinfo = false;
4981                 }
4982         }
4983
4984         if (noinfo)
4985                 message("504 5.3.0 HELP topic \"%.10s\" unknown", topic);
4986         else
4987                 message("214 2.0.0 End of HELP info");
4988
4989         if (foundvers != 0 && foundvers < HELPVERSION)
4990         {
4991                 if (LogLevel > 1)
4992                         sm_syslog(LOG_WARNING, e->e_id,
4993                                   "%s too old (require version %d)",
4994                                   HelpFile, HELPVERSION);
4995
4996                 /* avoid log next time */
4997                 foundvers = 0;
4998         }
4999
5000         (void) sm_io_close(hf, SM_TIME_DEFAULT);
5001 }
5002
5003 #if SASL
5004 /*
5005 **  RESET_SASLCONN -- reset SASL connection data
5006 **
5007 **      Parameters:
5008 **              conn -- SASL connection context
5009 **              hostname -- host name
5010 **              various connection data
5011 **
5012 **      Returns:
5013 **              SASL result
5014 */
5015
5016 static int
5017 reset_saslconn(sasl_conn_t **conn, char *hostname,
5018 # if SASL >= 20000
5019                char *remoteip, char *localip,
5020                char *auth_id, sasl_ssf_t * ext_ssf)
5021 # else /* SASL >= 20000 */
5022                struct sockaddr_in *saddr_r, struct sockaddr_in *saddr_l,
5023                sasl_external_properties_t * ext_ssf)
5024 # endif /* SASL >= 20000 */
5025 {
5026         int result;
5027
5028         sasl_dispose(conn);
5029 # if SASL >= 20000
5030         result = sasl_server_new("smtp", hostname, NULL, NULL, NULL,
5031                                  NULL, 0, conn);
5032 # elif SASL > 10505
5033         /* use empty realm: only works in SASL > 1.5.5 */
5034         result = sasl_server_new("smtp", hostname, "", NULL, 0, conn);
5035 # else /* SASL >= 20000 */
5036         /* use no realm -> realm is set to hostname by SASL lib */
5037         result = sasl_server_new("smtp", hostname, NULL, NULL, 0,
5038                                  conn);
5039 # endif /* SASL >= 20000 */
5040         if (result != SASL_OK)
5041                 return result;
5042
5043 # if SASL >= 20000
5044 #  if NETINET || NETINET6
5045         if (remoteip != NULL && *remoteip != '\0')
5046                 result = sasl_setprop(*conn, SASL_IPREMOTEPORT, remoteip);
5047         if (result != SASL_OK)
5048                 return result;
5049
5050         if (localip != NULL && *localip != '\0')
5051                 result = sasl_setprop(*conn, SASL_IPLOCALPORT, localip);
5052         if (result != SASL_OK)
5053                 return result;
5054 #  endif /* NETINET || NETINET6 */
5055
5056         result = sasl_setprop(*conn, SASL_SSF_EXTERNAL, ext_ssf);
5057         if (result != SASL_OK)
5058                 return result;
5059
5060         result = sasl_setprop(*conn, SASL_AUTH_EXTERNAL, auth_id);
5061         if (result != SASL_OK)
5062                 return result;
5063 # else /* SASL >= 20000 */
5064 #  if NETINET
5065         if (saddr_r != NULL)
5066                 result = sasl_setprop(*conn, SASL_IP_REMOTE, saddr_r);
5067         if (result != SASL_OK)
5068                 return result;
5069
5070         if (saddr_l != NULL)
5071                 result = sasl_setprop(*conn, SASL_IP_LOCAL, saddr_l);
5072         if (result != SASL_OK)
5073                 return result;
5074 #  endif /* NETINET */
5075
5076         result = sasl_setprop(*conn, SASL_SSF_EXTERNAL, ext_ssf);
5077         if (result != SASL_OK)
5078                 return result;
5079 # endif /* SASL >= 20000 */
5080         return SASL_OK;
5081 }
5082 #endif /* SASL */