2 * Copyright (c) 1998-2010 Sendmail, Inc. and its suppliers.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.
5 * Copyright (c) 1988, 1993
6 * The Regents of the University of California. All rights reserved.
8 * By using this file, you agree to the terms and conditions set
9 * forth in the LICENSE file which can be found at the top level of
10 * the sendmail distribution.
17 SM_RCSID("@(#)$Id: deliver.c,v 8.1024 2011/01/12 23:52:59 ca Exp $")
20 # include <login_cap.h>
21 #endif /* HASSETUSERCONTEXT */
23 #if NETINET || NETINET6
24 # include <arpa/inet.h>
25 #endif /* NETINET || NETINET6 */
29 #endif /* STARTTLS || SASL */
31 static int deliver __P((ENVELOPE *, ADDRESS *));
32 static void dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
33 static void mailfiletimeout __P((int));
34 static void endwaittimeout __P((int));
35 static int parse_hostsignature __P((char *, char **, MAILER *));
36 static void sendenvelope __P((ENVELOPE *, int));
37 static int coloncmp __P((const char *, const char *));
40 static int starttls __P((MAILER *, MCI *, ENVELOPE *));
41 static int endtlsclt __P((MCI *));
44 static bool iscltflgset __P((ENVELOPE *, int));
45 # endif /* STARTTLS || SASL */
48 ** SENDALL -- actually send all the messages.
51 ** e -- the envelope to send.
52 ** mode -- the delivery mode to use. If SM_DEFAULT, use
53 ** the current e->e_sendmode.
59 ** Scans the send lists and sends everything it finds.
60 ** Delivers any appropriate error messages.
61 ** If we are running in a non-interactive mode, takes the
62 ** appropriate action.
74 register ENVELOPE *ee;
75 ENVELOPE *splitenv = NULL;
76 int oldverbose = Verbose;
77 bool somedeliveries = false, expensive = false;
81 ** If this message is to be discarded, don't bother sending
82 ** the message at all.
85 if (bitset(EF_DISCARD, e->e_flags))
88 sm_dprintf("sendall: discarding id %s\n", e->e_id);
89 e->e_flags |= EF_CLRQUEUE;
91 logundelrcpts(e, "discarded", 9, true);
92 else if (LogLevel > 4)
93 sm_syslog(LOG_INFO, e->e_id, "discarded");
94 markstats(e, NULL, STATS_REJECT);
99 ** If we have had global, fatal errors, don't bother sending
100 ** the message at all if we are in SMTP mode. Local errors
101 ** (e.g., a single address failing) will still cause the other
102 ** addresses to be sent.
105 if (bitset(EF_FATALERRS, e->e_flags) &&
106 (OpMode == MD_SMTP || OpMode == MD_DAEMON))
108 e->e_flags |= EF_CLRQUEUE;
112 /* determine actual delivery mode */
113 if (mode == SM_DEFAULT)
115 mode = e->e_sendmode;
116 if (mode != SM_VERIFY && mode != SM_DEFER &&
117 shouldqueue(e->e_msgpriority, e->e_ctime))
123 sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
125 printaddr(sm_debug_file(), &e->e_from, false);
126 sm_dprintf("\te_flags = ");
128 sm_dprintf("sendqueue:\n");
129 printaddr(sm_debug_file(), e->e_sendqueue, true);
133 ** Do any preprocessing necessary for the mode we are running.
134 ** Check to make sure the hop count is reasonable.
135 ** Delete sends to the sender in mailing lists.
142 if (e->e_hopcount > MaxHopCount)
146 if (e->e_sendqueue != NULL &&
147 e->e_sendqueue->q_paddr != NULL)
148 recip = e->e_sendqueue->q_paddr;
153 queueup(e, WILL_BE_QUEUED(mode), false);
154 e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
155 ExitStat = EX_UNAVAILABLE;
156 syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
157 e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
158 RealHostName == NULL ? "localhost" : RealHostName,
160 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
162 if (QS_IS_DEAD(q->q_state))
164 q->q_state = QS_BADADDR;
165 q->q_status = "5.4.6";
166 q->q_rstatus = "554 5.4.6 Too many hops";
172 ** Do sender deletion.
174 ** If the sender should be queued up, skip this.
175 ** This can happen if the name server is hosed when you
176 ** are trying to send mail. The result is that the sender
177 ** is instantiated in the queue as a recipient.
180 if (!bitset(EF_METOO, e->e_flags) &&
181 !QS_IS_QUEUEUP(e->e_from.q_state))
185 sm_dprintf("sendall: QS_SENDER ");
186 printaddr(sm_debug_file(), &e->e_from, false);
188 e->e_from.q_state = QS_SENDER;
189 (void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
193 ** Handle alias owners.
195 ** We scan up the q_alias chain looking for owners.
196 ** We discard owners that are the same as the return path.
199 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
201 register struct address *a;
203 for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
206 q->q_owner = a->q_owner;
208 if (q->q_owner != NULL &&
209 !QS_IS_DEAD(q->q_state) &&
210 strcmp(q->q_owner, e->e_from.q_paddr) == 0)
216 sm_dprintf("\nAfter first owner pass, sendq =\n");
217 printaddr(sm_debug_file(), e->e_sendqueue, true);
222 while (owner != NULL && otherowners > 0)
225 sm_dprintf("owner = \"%s\", otherowners = %d\n",
228 otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
230 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
234 sm_dprintf("Checking ");
235 printaddr(sm_debug_file(), q, false);
237 if (QS_IS_DEAD(q->q_state))
240 sm_dprintf(" ... QS_IS_DEAD\n");
243 if (tTd(13, 29) && !tTd(13, 30))
245 sm_dprintf("Checking ");
246 printaddr(sm_debug_file(), q, false);
249 if (q->q_owner != NULL)
254 sm_dprintf(" ... First owner = \"%s\"\n",
258 else if (owner != q->q_owner)
260 if (strcmp(owner, q->q_owner) == 0)
263 sm_dprintf(" ... Same owner = \"%s\"\n",
266 /* make future comparisons cheap */
272 sm_dprintf(" ... Another owner \"%s\"\n",
278 else if (tTd(13, 40))
279 sm_dprintf(" ... Same owner = \"%s\"\n",
285 sm_dprintf(" ... Null owner\n");
289 if (QS_IS_BADADDR(q->q_state))
292 sm_dprintf(" ... QS_IS_BADADDR\n");
296 if (QS_IS_QUEUEUP(q->q_state))
298 MAILER *m = q->q_mailer;
301 ** If we have temporary address failures
302 ** (e.g., dns failure) and a fallback MX is
303 ** set, send directly to the fallback MX host.
306 if (FallbackMX != NULL &&
307 !wordinclass(FallbackMX, 'w') &&
309 !bitnset(M_NOMX, m->m_flags) &&
310 strcmp(m->m_mailer, "[IPC]") == 0 &&
311 m->m_argv[0] != NULL &&
312 strcmp(m->m_argv[0], "TCP") == 0)
318 sm_dprintf(" ... FallbackMX\n");
320 len = strlen(FallbackMX) + 1;
321 p = sm_rpool_malloc_x(e->e_rpool, len);
322 (void) sm_strlcpy(p, FallbackMX, len);
329 sm_dprintf(" ... QS_IS_QUEUEUP\n");
335 ** If this mailer is expensive, and if we don't
336 ** want to make connections now, just mark these
337 ** addresses and return. This is useful if we
338 ** want to batch connections to reduce load. This
339 ** will cause the messages to be queued up, and a
340 ** daemon will come along to send the messages later.
343 if (NoConnect && !Verbose &&
344 bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
347 sm_dprintf(" ... expensive\n");
348 q->q_state = QS_QUEUEUP;
351 else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
352 QueueLimitId == NULL &&
353 QueueLimitSender == NULL &&
354 QueueLimitRecipient == NULL)
357 sm_dprintf(" ... hold\n");
358 q->q_state = QS_QUEUEUP;
361 else if (QueueMode != QM_QUARANTINE &&
362 e->e_quarmsg != NULL)
365 sm_dprintf(" ... quarantine: %s\n",
367 q->q_state = QS_QUEUEUP;
373 sm_dprintf(" ... deliverable\n");
374 somedeliveries = true;
378 if (owner != NULL && otherowners > 0)
381 ** Split this envelope into two.
384 ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
387 ee->e_message = NULL;
392 sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
393 e->e_id, ee->e_id, owner,
396 ee->e_header = copyheader(e->e_header, ee->e_rpool);
397 ee->e_sendqueue = copyqueue(e->e_sendqueue,
399 ee->e_errorqueue = copyqueue(e->e_errorqueue,
401 ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
402 ee->e_flags |= EF_NORECEIPT;
403 setsender(owner, ee, NULL, '\0', true);
406 sm_dprintf("sendall(split): QS_SENDER ");
407 printaddr(sm_debug_file(), &ee->e_from, false);
409 ee->e_from.q_state = QS_SENDER;
413 ee->e_qgrp = e->e_qgrp;
414 ee->e_qdir = e->e_qdir;
415 ee->e_errormode = EM_MAIL;
416 ee->e_sibling = splitenv;
417 ee->e_statmsg = NULL;
418 if (e->e_quarmsg != NULL)
419 ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
423 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
425 if (q->q_owner == owner)
427 q->q_state = QS_CLONED;
429 sm_dprintf("\t... stripping %s from original envelope\n",
433 for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
435 if (q->q_owner != owner)
437 q->q_state = QS_CLONED;
439 sm_dprintf("\t... dropping %s from cloned envelope\n",
444 /* clear DSN parameters */
445 q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
446 q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
448 sm_dprintf("\t... moving %s to cloned envelope\n",
453 if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
454 dup_queue_file(e, ee, DATAFL_LETTER);
457 ** Give the split envelope access to the parent
458 ** transcript file for errors obtained while
459 ** processing the recipients (done before the
460 ** envelope splitting).
463 if (e->e_xfp != NULL)
464 ee->e_xfp = sm_io_dup(e->e_xfp);
466 /* failed to dup e->e_xfp, start a new transcript */
467 if (ee->e_xfp == NULL)
470 if (mode != SM_VERIFY && LogLevel > 4)
471 sm_syslog(LOG_INFO, e->e_id,
472 "%s: clone: owner=%s",
479 setsender(owner, e, NULL, '\0', true);
482 sm_dprintf("sendall(owner): QS_SENDER ");
483 printaddr(sm_debug_file(), &e->e_from, false);
485 e->e_from.q_state = QS_SENDER;
486 e->e_errormode = EM_MAIL;
487 e->e_flags |= EF_NORECEIPT;
488 e->e_flags &= ~EF_FATALERRS;
491 /* if nothing to be delivered, just queue up everything */
492 if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
498 sm_dprintf("No deliveries: auto-queueing\n");
502 /* treat this as a delivery in terms of counting tries */
506 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
514 if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
515 (mode != SM_VERIFY &&
516 (SuperSafe == SAFE_REALLY ||
517 SuperSafe == SAFE_REALLY_POSTMILTER))) &&
518 (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
523 ** Be sure everything is instantiated in the queue.
524 ** Split envelopes first in case the machine crashes.
525 ** If the original were done first, we may lose
531 #else /* !HASFLOCK */
532 msync = mode == SM_FORK;
533 #endif /* !HASFLOCK */
535 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
536 queueup(ee, WILL_BE_QUEUED(mode), msync);
537 queueup(e, WILL_BE_QUEUED(mode), msync);
541 checkfds("after envelope splitting");
544 ** If we belong in background, fork now.
549 sm_dprintf("sendall: final mode = %c\n", mode);
552 sm_dprintf("\n================ Final Send Queue(s) =====================\n");
553 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n",
554 e->e_id, e->e_from.q_paddr);
555 printaddr(sm_debug_file(), e->e_sendqueue, true);
556 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
558 sm_dprintf("\n *** Envelope %s, e_from=%s ***\n",
559 ee->e_id, ee->e_from.q_paddr);
560 printaddr(sm_debug_file(), ee->e_sendqueue, true);
562 sm_dprintf("==========================================================\n\n");
575 #endif /* HASFLOCK */
577 e->e_flags |= EF_INQUEUE;
578 (void) dropenvelope(e, splitenv != NULL, true);
579 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
581 if (ee->e_nrcpts > 0)
582 ee->e_flags |= EF_INQUEUE;
583 (void) dropenvelope(ee, false, true);
588 if (e->e_xfp != NULL)
589 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
593 ** Since fcntl locking has the interesting semantic that
594 ** the lock is owned by a process, not by an open file
595 ** descriptor, we have to flush this to the queue, and
596 ** then restart from scratch in the child.
600 /* save id for future use */
603 /* now drop the envelope in the parent */
604 e->e_flags |= EF_INQUEUE;
605 (void) dropenvelope(e, splitenv != NULL, false);
607 /* arrange to reacquire lock after fork */
611 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
613 /* save id for future use */
614 char *qid = ee->e_id;
616 /* drop envelope in parent */
617 ee->e_flags |= EF_INQUEUE;
618 (void) dropenvelope(ee, false, false);
620 /* and save qid for reacquisition */
624 #endif /* !HASFLOCK */
627 ** Since the delivery may happen in a child and the parent
628 ** does not wait, the parent may close the maps thereby
629 ** removing any shared memory used by the map. Therefore,
630 ** close the maps now so the child will dynamically open
631 ** them if necessary.
639 syserr("deliver: fork 1");
644 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
647 #endif /* HASFLOCK */
652 /* be sure we leave the temp files to our child */
653 /* close any random open files in the envelope */
655 if (e->e_dfp != NULL)
656 (void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
658 e->e_flags &= ~EF_HAS_DF;
660 /* can't call unlockqueue to avoid unlink of xfp */
661 if (e->e_lockfp != NULL)
662 (void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
664 syserr("%s: sendall: null lockfp", e->e_id);
666 #endif /* HASFLOCK */
668 /* make sure the parent doesn't own the envelope */
672 /* catch intermediate zombie */
674 #endif /* USE_DOUBLE_FORK */
678 /* Reset global flags */
679 RestartRequest = NULL;
680 RestartWorkGroup = false;
681 ShutdownRequest = NULL;
685 ** Initialize exception stack and default exception
686 ** handler for child process.
689 sm_exc_newthread(fatal_error);
692 ** Since we have accepted responsbility for the message,
693 ** change the SIGTERM handler. intsig() (the old handler)
694 ** would remove the envelope if this was a command line
695 ** message submission.
698 (void) sm_signal(SIGTERM, SIG_DFL);
701 /* double fork to avoid zombies */
706 #endif /* USE_DOUBLE_FORK */
708 CurrentPid = getpid();
710 /* be sure we are immune from the terminal */
714 /* prevent parent from waiting if there was an error */
718 syserr("deliver: fork 2");
720 e->e_flags |= EF_INQUEUE;
723 #endif /* HASFLOCK */
724 finis(true, true, ExitStat);
727 /* be sure to give error messages in child */
731 ** Close any cached connections.
733 ** We don't send the QUIT protocol because the parent
734 ** still knows about the connection.
736 ** This should only happen when delivering an error
740 mci_flush(false, NULL);
747 ** Now reacquire and run the various queue files.
750 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
752 ENVELOPE *sibling = ee->e_sibling;
754 (void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
756 ee->e_sibling = sibling;
758 (void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
760 finis(true, true, ExitStat);
761 #endif /* HASFLOCK */
764 sendenvelope(e, mode);
765 (void) dropenvelope(e, true, true);
766 for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
769 if (mode != SM_VERIFY)
771 sendenvelope(ee, mode);
772 (void) dropenvelope(ee, true, true);
776 Verbose = oldverbose;
778 finis(true, true, ExitStat);
782 sendenvelope(e, mode)
783 register ENVELOPE *e;
790 sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
791 e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
794 sm_syslog(LOG_DEBUG, e->e_id,
795 "sendenvelope, flags=0x%lx",
799 ** If we have had global, fatal errors, don't bother sending
800 ** the message at all if we are in SMTP mode. Local errors
801 ** (e.g., a single address failing) will still cause the other
802 ** addresses to be sent.
805 if (bitset(EF_FATALERRS, e->e_flags) &&
806 (OpMode == MD_SMTP || OpMode == MD_DAEMON))
808 e->e_flags |= EF_CLRQUEUE;
813 ** Don't attempt deliveries if we want to bounce now
814 ** or if deliver-by time is exceeded.
817 if (!bitset(EF_RESPONSE, e->e_flags) &&
818 (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
819 (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
820 curtime() > e->e_ctime + e->e_deliver_by)))
824 ** Run through the list and send everything.
826 ** Set EF_GLOBALERRS so that error messages during delivery
827 ** result in returned mail.
831 e->e_flags |= EF_GLOBALERRS;
833 macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
834 macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
837 if (!bitset(EF_SPLIT, e->e_flags))
843 ** Save old sibling and set it to NULL to avoid
844 ** queueing up the same envelopes again.
845 ** This requires that envelopes in that list have
846 ** been take care of before (or at some other place).
849 oldsib = e->e_sibling;
851 if (!split_by_recipient(e) &&
852 bitset(EF_FATALERRS, e->e_flags))
854 if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
855 e->e_flags |= EF_CLRQUEUE;
858 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
859 queueup(ee, false, true);
862 for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
864 /* now unlock the job */
868 /* this envelope is marked unused */
869 if (ee->e_dfp != NULL)
871 (void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
875 ee->e_flags &= ~EF_HAS_DF;
877 e->e_sibling = oldsib;
880 /* now run through the queue */
881 for (q = e->e_sendqueue; q != NULL; q = q->q_next)
884 char wbuf[MAXNAME + 20];
886 (void) sm_snprintf(wbuf, sizeof(wbuf), "sendall(%.*s)",
887 MAXNAME, q->q_paddr);
890 if (mode == SM_VERIFY)
892 e->e_to = q->q_paddr;
893 if (QS_IS_SENDABLE(q->q_state))
895 if (q->q_host != NULL && q->q_host[0] != '\0')
896 message("deliverable: mailer %s, host %s, user %s",
901 message("deliverable: mailer %s, user %s",
906 else if (QS_IS_OK(q->q_state))
909 ** Checkpoint the send list every few addresses
912 if (CheckpointInterval > 0 &&
913 e->e_nsent >= CheckpointInterval)
915 queueup(e, false, false);
918 (void) deliver(e, q);
924 e->e_dtime = curtime();
929 checkfd012("end of sendenvelope");
933 #if REQUIRES_DIR_FSYNC
935 ** SYNC_DIR -- fsync a directory based on a filename
938 ** filename -- path of file
946 sync_dir(filename, panic)
952 char dir[MAXPATHLEN];
954 if (!RequiresDirfsync)
957 /* filesystems which require the directory be synced */
958 dirp = strrchr(filename, '/');
961 if (sm_strlcpy(dir, filename, sizeof(dir)) >= sizeof(dir))
963 dir[dirp - filename] = '\0';
968 dirfd = open(dirp, O_RDONLY, 0700);
970 sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
974 if (fsync(dirfd) < 0)
977 syserr("!sync_dir: cannot fsync directory %s",
979 else if (LogLevel > 1)
980 sm_syslog(LOG_ERR, NOQID,
981 "sync_dir: cannot fsync directory %s: %s",
982 dirp, sm_errstring(errno));
987 #endif /* REQUIRES_DIR_FSYNC */
989 ** DUP_QUEUE_FILE -- duplicate a queue file into a split queue
992 ** e -- the existing envelope
993 ** ee -- the new envelope
994 ** type -- the queue file type (e.g., DATAFL_LETTER)
1001 dup_queue_file(e, ee, type)
1005 char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1011 ** Make sure both are in the same directory.
1014 (void) sm_strlcpy(f1buf, queuename(e, type), sizeof(f1buf));
1015 (void) sm_strlcpy(f2buf, queuename(ee, type), sizeof(f2buf));
1017 /* Force the df to disk if it's not there yet */
1018 if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1019 sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1022 syserr("!dup_queue_file: can't commit %s", f1buf);
1026 if (link(f1buf, f2buf) < 0)
1028 int save_errno = errno;
1030 syserr("sendall: link(%s, %s)", f1buf, f2buf);
1031 if (save_errno == EEXIST)
1033 if (unlink(f2buf) < 0)
1035 syserr("!sendall: unlink(%s): permanent",
1039 if (link(f1buf, f2buf) < 0)
1041 syserr("!sendall: link(%s, %s): permanent",
1047 SYNC_DIR(f2buf, true);
1050 ** DOFORK -- do a fork, retrying a couple of times on failure.
1052 ** This MUST be a macro, since after a vfork we are running
1053 ** two processes on the same stack!!!
1059 ** From a macro??? You've got to be kidding!
1062 ** Modifies the ==> LOCAL <== variable 'pid', leaving:
1063 ** pid of child in parent, zero in child.
1064 ** -1 on unrecoverable error.
1067 ** I'm awfully sorry this looks so awful. That's
1068 ** vfork for you.....
1071 #define NFORKTRIES 5
1077 #define DOFORK(fORKfN) \
1081 for (i = NFORKTRIES; --i >= 0; )\
1087 (void) sleep((unsigned) NFORKTRIES - i);\
1091 ** DOFORK -- simple fork interface to DOFORK.
1097 ** pid of child in parent.
1102 ** returns twice, once in parent and once in child.
1108 register pid_t pid = -1;
1115 ** COLONCMP -- compare host-signatures up to first ':' or EOS
1117 ** This takes two strings which happen to be host-signatures and
1118 ** compares them. If the lowest preference portions of the MX-RR's
1119 ** match (up to ':' or EOS, whichever is first), then we have
1120 ** match. This is used for coattail-piggybacking messages during
1121 ** message delivery.
1122 ** If the signatures are the same up to the first ':' the remainder of
1123 ** the signatures are then compared with a normal strcmp(). This saves
1124 ** re-examining the first part of the signatures.
1127 ** a - first host-signature
1128 ** b - second host-signature
1131 ** HS_MATCH_NO -- no "match".
1132 ** HS_MATCH_FIRST -- "match" for the first MX preference
1133 ** (up to the first colon (':')).
1134 ** HS_MATCH_FULL -- match for the entire MX record.
1140 #define HS_MATCH_NO 0
1141 #define HS_MATCH_FIRST 1
1142 #define HS_MATCH_FULL 2
1146 register const char *a;
1147 register const char *b;
1149 int ret = HS_MATCH_NO;
1154 /* Need to account for IPv6 bracketed addresses */
1157 else if (*a == ']' && braclev > 0)
1159 else if (*a == ':' && braclev <= 0)
1161 ret = HS_MATCH_FIRST;
1165 else if (*a == '\0')
1166 return HS_MATCH_FULL; /* a full match */
1169 if (ret == HS_MATCH_NO &&
1171 ((*a == '\0' && *(b - 1) == ':') ||
1172 (*a == ':' && *(b - 1) == '\0')))
1173 return HS_MATCH_FIRST;
1174 if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1175 return HS_MATCH_FULL;
1181 ** SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1185 ** tried_fallbacksmarthost -- has been tried already? (in/out)
1186 ** hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1187 ** hbsz -- size of hostbuf
1188 ** status -- current delivery status
1191 ** true iff FallbackSmartHost should be tried.
1194 static bool should_try_fbsh __P((ENVELOPE *, bool *, char *, size_t, int));
1197 should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1199 bool *tried_fallbacksmarthost;
1205 ** If the host was not found or a temporary failure occurred
1206 ** and a FallbackSmartHost is defined (and we have not yet
1207 ** tried it), then make one last try with it as the host.
1210 if ((status == EX_NOHOST || status == EX_TEMPFAIL) &&
1211 FallbackSmartHost != NULL && !*tried_fallbacksmarthost)
1213 *tried_fallbacksmarthost = true;
1214 expand(FallbackSmartHost, hostbuf, hbsz, e);
1215 if (!wordinclass(hostbuf, 'w'))
1218 sm_dprintf("one last try with FallbackSmartHost %s\n",
1226 ** DELIVER -- Deliver a message to a list of addresses.
1228 ** This routine delivers to everyone on the same host as the
1229 ** user on the head of the list. It is clever about mailers
1230 ** that don't handle multiple users. It is NOT guaranteed
1231 ** that it will deliver to all these addresses however -- so
1232 ** deliver should be called once for each address on the
1234 ** Deliver tries to be as opportunistic as possible about piggybacking
1235 ** messages. Some definitions to make understanding easier follow below.
1236 ** Piggybacking occurs when an existing connection to a mail host can
1237 ** be used to send the same message to more than one recipient at the
1238 ** same time. So "no piggybacking" means one message for one recipient
1239 ** per connection. "Intentional piggybacking" happens when the
1240 ** recipients' host address (not the mail host address) is used to
1241 ** attempt piggybacking. Recipients with the same host address
1242 ** have the same mail host. "Coincidental piggybacking" relies on
1243 ** piggybacking based on all the mail host addresses in the MX-RR. This
1244 ** is "coincidental" in the fact it could not be predicted until the
1245 ** MX Resource Records for the hosts were obtained and examined. For
1246 ** example (preference order and equivalence is important, not values):
1247 ** domain1 IN MX 10 mxhost-A
1248 ** IN MX 20 mxhost-B
1249 ** domain2 IN MX 4 mxhost-A
1251 ** Domain1 and domain2 can piggyback the same message to mxhost-A or
1252 ** mxhost-B (if mxhost-A cannot be reached).
1253 ** "Coattail piggybacking" relaxes the strictness of "coincidental
1254 ** piggybacking" in the hope that most significant (lowest value)
1255 ** MX preference host(s) can create more piggybacking. For example
1256 ** (again, preference order and equivalence is important, not values):
1257 ** domain3 IN MX 100 mxhost-C
1258 ** IN MX 100 mxhost-D
1259 ** IN MX 200 mxhost-E
1260 ** domain4 IN MX 50 mxhost-C
1261 ** IN MX 50 mxhost-D
1262 ** IN MX 80 mxhost-F
1263 ** A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1264 ** is available. Same with mxhost-D because in both RR's the preference
1265 ** value is the same as mxhost-C, respectively.
1266 ** So deliver attempts coattail piggybacking when possible. If the
1267 ** first MX preference level hosts cannot be used then the piggybacking
1268 ** reverts to coincidental piggybacking. Using the above example you
1269 ** cannot deliver to mxhost-F for domain3 regardless of preference value.
1270 ** ("Coattail" from "riding on the coattails of your predecessor" meaning
1271 ** gaining benefit from a predecessor effort with no or little addition
1272 ** effort. The predecessor here being the preceding MX RR).
1275 ** e -- the envelope to deliver.
1276 ** firstto -- head of the address list to deliver to.
1279 ** zero -- successfully delivered.
1280 ** else -- some failure, see ExitStat for more info.
1283 ** The standard input is passed off to someone.
1288 register ENVELOPE *e;
1291 char *host; /* host being sent to */
1292 char *user; /* user being sent to */
1294 register char **mvp;
1296 register MAILER *m; /* mailer for this recipient */
1297 ADDRESS *volatile ctladdr;
1298 #if HASSETUSERCONTEXT
1299 ADDRESS *volatile contextaddr = NULL;
1300 #endif /* HASSETUSERCONTEXT */
1301 register MCI *volatile mci;
1302 register ADDRESS *SM_NONVOLATILE to = firstto;
1303 volatile bool clever = false; /* running user smtp to this mailer */
1304 ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1305 int rcode; /* response code */
1306 SM_NONVOLATILE int lmtp_rcode = EX_OK;
1307 SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1308 SM_NONVOLATILE int hostnum = 0; /* current MX host index */
1309 char *firstsig; /* signature of firstto */
1310 volatile pid_t pid = -1;
1311 char *volatile curhost;
1312 SM_NONVOLATILE unsigned short port = 0;
1313 SM_NONVOLATILE time_t enough = 0;
1315 char *SM_NONVOLATILE mux_path = NULL; /* path to UNIX domain socket */
1316 #endif /* NETUNIX */
1319 bool anyok; /* at least one address was OK */
1320 SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1326 static int tobufsize = 0;
1327 static char *tobuf = NULL;
1328 char *rpath; /* translated return path */
1331 char *mxhosts[MAXMXHOSTS + 1];
1332 char *pv[MAXPV + 1];
1333 char buf[MAXNAME + 1];
1334 char cbuf[MAXPATHLEN];
1337 SM_REQUIRE(firstto != NULL); /* same as to */
1338 if (!QS_IS_OK(to->q_state))
1341 suidwarn = geteuid() == 0;
1343 SM_REQUIRE(e != NULL);
1346 CurEnv = e; /* just in case */
1347 e->e_statmsg = NULL;
1348 SmtpError[0] = '\0';
1352 sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1353 e->e_id, m->m_name, host, to->q_user);
1355 printopenfds(false);
1358 ** Clear {client_*} macros if this is a bounce message to
1359 ** prevent rejection by check_compat ruleset.
1362 if (bitset(EF_RESPONSE, e->e_flags))
1364 macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1365 macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1366 macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1367 macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1368 macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1373 ADDRESS *skip_back = NULL;
1376 ** Do initial argv setup.
1377 ** Insert the mailer name. Notice that $x expansion is
1378 ** NOT done on the mailer name. Then, if the mailer has
1379 ** a picky -f flag, we insert it as appropriate. This
1380 ** code does not check for 'pv' overflow; this places a
1381 ** manifest lower limit of 4 for MAXPV.
1382 ** The from address rewrite is expected to make
1383 ** the address relative to the other end.
1386 /* rewrite from address, using rewriting rules */
1388 SM_ASSERT(e->e_from.q_mailer != NULL);
1389 if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1392 p = e->e_from.q_paddr;
1393 rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1394 if (strlen(rpath) > MAXNAME)
1396 rpath = shortenstring(rpath, MAXSHORTSTR);
1398 /* avoid bogus errno */
1400 syserr("remotename: huge return path %s", rpath);
1402 rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1403 macdefine(&e->e_macro, A_PERM, 'g', rpath);
1404 macdefine(&e->e_macro, A_PERM, 'h', host);
1407 *pvp++ = m->m_argv[0];
1409 /* ignore long term host status information if mailer flag W is set */
1410 if (bitnset(M_NOHOSTSTAT, m->m_flags))
1411 IgnoreHostStatus = true;
1413 /* insert -f or -r flag as appropriate */
1415 (bitnset(M_FOPT, m->m_flags) ||
1416 bitnset(M_ROPT, m->m_flags)))
1418 if (bitnset(M_FOPT, m->m_flags))
1426 ** Append the other fixed parts of the argv. These run
1427 ** up to the first entry containing "$u". There can only
1428 ** be one of these, and there are only a few more slots
1429 ** in the pv after it.
1432 for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1434 /* can't use strchr here because of sign extension problems */
1437 if ((*p++ & 0377) == MACROEXPAND)
1447 /* this entry is safe -- go ahead and process it */
1448 expand(*mvp, buf, sizeof(buf), e);
1449 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1450 if (pvp >= &pv[MAXPV - 3])
1452 syserr("554 5.3.5 Too many parameters to %s before $u",
1460 ** If we have no substitution for the user name in the argument
1461 ** list, we know that we must supply the names otherwise -- and
1462 ** SMTP is the answer!!
1467 /* running LMTP or SMTP */
1471 else if (bitnset(M_LMTP, m->m_flags))
1473 /* not running LMTP */
1474 sm_syslog(LOG_ERR, NULL,
1475 "Warning: mailer %s: LMTP flag (F=z) turned off",
1477 clrbitn(M_LMTP, m->m_flags);
1481 ** At this point *mvp points to the argument with $u. We
1482 ** run through our address list and append all the addresses
1483 ** we can. If we run out of space, do not fret! We can
1484 ** always send another copy later.
1491 if (firstto->q_signature == NULL)
1492 firstto->q_signature = hostsignature(firstto->q_mailer,
1494 firstsig = firstto->q_signature;
1496 for (; to != NULL; to = to->q_next)
1498 /* avoid sending multiple recipients to dumb mailers */
1499 if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1502 /* if already sent or not for this host, don't send */
1503 if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1507 ** Must be same mailer to keep grouping rcpts.
1508 ** If mailers don't match: continue; sendqueue is not
1509 ** sorted by mailers, so don't break;
1512 if (to->q_mailer != firstto->q_mailer)
1515 if (to->q_signature == NULL) /* for safety */
1516 to->q_signature = hostsignature(to->q_mailer,
1520 ** This is for coincidental and tailcoat piggybacking messages
1521 ** to the same mail host. While the signatures are identical
1522 ** (that's the MX-RR's are identical) we can do coincidental
1523 ** piggybacking. We try hard for coattail piggybacking
1524 ** with the same mail host when the next recipient has the
1525 ** same host at lowest preference. It may be that this
1526 ** won't work out, so 'skip_back' is maintained if a backup
1527 ** to coincidental piggybacking or full signature must happen.
1530 ret = firstto == to ? HS_MATCH_FULL :
1531 coloncmp(to->q_signature, firstsig);
1532 if (ret == HS_MATCH_FULL)
1534 else if (ret == HS_MATCH_NO)
1539 /* avoid overflowing tobuf */
1540 strsize += strlen(to->q_paddr) + 1;
1541 if (strsize > TOBUFSIZE)
1545 if (++rcptcount > to->q_mailer->m_maxrcpt)
1550 sm_dprintf("\nsend to ");
1551 printaddr(sm_debug_file(), to, false);
1554 /* compute effective uid/gid when sending */
1555 if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1556 # if HASSETUSERCONTEXT
1557 contextaddr = ctladdr = getctladdr(to);
1558 # else /* HASSETUSERCONTEXT */
1559 ctladdr = getctladdr(to);
1560 # endif /* HASSETUSERCONTEXT */
1564 sm_dprintf("ctladdr=");
1565 printaddr(sm_debug_file(), ctladdr, false);
1569 e->e_to = to->q_paddr;
1572 ** Check to see that these people are allowed to
1573 ** talk to each other.
1574 ** Check also for overflow of e_msgsize.
1577 if (m->m_maxsize != 0 &&
1578 (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1580 e->e_flags |= EF_NO_BODY_RETN;
1581 if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1582 to->q_status = "5.2.3";
1584 to->q_status = "5.3.4";
1586 /* set to->q_rstatus = NULL; or to the following? */
1587 usrerrenh(to->q_status,
1588 "552 Message is too large; %ld bytes max",
1590 markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1591 giveresponse(EX_UNAVAILABLE, to->q_status, m,
1592 NULL, ctladdr, xstart, e, to);
1598 /* do config file checking of compatibility */
1599 quarantine = (e->e_quarmsg != NULL);
1600 rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1601 e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1605 /* do in-code checking if not discarding */
1606 if (!bitset(EF_DISCARD, e->e_flags))
1608 rcode = checkcompat(to, e);
1614 markfailure(e, to, NULL, rcode, ovr);
1615 giveresponse(rcode, to->q_status, m,
1616 NULL, ctladdr, xstart, e, to);
1619 if (!quarantine && e->e_quarmsg != NULL)
1622 ** check_compat or checkcompat() has tried
1623 ** to quarantine but that isn't supported.
1624 ** Revert the attempt.
1627 e->e_quarmsg = NULL;
1628 macdefine(&e->e_macro, A_PERM,
1629 macid("{quarantine}"), "");
1631 if (bitset(EF_DISCARD, e->e_flags))
1635 sm_dprintf("deliver: discarding recipient ");
1636 printaddr(sm_debug_file(), to, false);
1639 /* pretend the message was sent */
1640 /* XXX should we log something here? */
1641 to->q_state = QS_DISCARDED;
1644 ** Remove discard bit to prevent discard of
1645 ** future recipients. This is safe because the
1646 ** true "global discard" has been handled before
1650 e->e_flags &= ~EF_DISCARD;
1655 ** Strip quote bits from names if the mailer is dumb
1659 if (bitnset(M_STRIPQ, m->m_flags))
1666 ** Strip all leading backslashes if requested and the
1667 ** next character is alphanumerical (the latter can
1668 ** probably relaxed a bit, see RFC2821).
1671 if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1672 stripbackslash(user);
1674 /* hack attack -- delivermail compatibility */
1675 if (m == ProgMailer && *user == '|')
1679 ** If an error message has already been given, don't
1680 ** bother to send to this address.
1682 ** >>>>>>>>>> This clause assumes that the local mailer
1683 ** >> NOTE >> cannot do any further aliasing; that
1684 ** >>>>>>>>>> function is subsumed by sendmail.
1687 if (!QS_IS_OK(to->q_state))
1691 ** See if this user name is "special".
1692 ** If the user name has a slash in it, assume that this
1693 ** is a file -- send it off without further ado. Note
1694 ** that this type of addresses is not processed along
1695 ** with the others, so we fudge on the To person.
1698 if (strcmp(m->m_mailer, "[FILE]") == 0)
1700 macdefine(&e->e_macro, A_PERM, 'u', user);
1702 if (p == NULL && ctladdr != NULL)
1703 p = ctladdr->q_home;
1704 macdefine(&e->e_macro, A_PERM, 'z', p);
1705 expand(m->m_argv[1], buf, sizeof(buf), e);
1706 if (strlen(buf) > 0)
1707 rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1710 syserr("empty filename specification for mailer %s",
1714 giveresponse(rcode, to->q_status, m, NULL,
1715 ctladdr, xstart, e, to);
1716 markfailure(e, to, NULL, rcode, true);
1720 to->q_state = QS_SENT;
1721 if (bitnset(M_LOCALMAILER, m->m_flags) &&
1722 bitset(QPINGONSUCCESS, to->q_flags))
1724 to->q_flags |= QDELIVERED;
1725 to->q_status = "2.1.5";
1726 (void) sm_io_fprintf(e->e_xfp,
1728 "%s... Successfully delivered\n",
1732 to->q_statdate = curtime();
1733 markstats(e, to, STATS_NORMAL);
1738 ** Address is verified -- add this user to mailer
1739 ** argv, and add it to the print list of recipients.
1742 /* link together the chain of recipients */
1743 to->q_tchain = tochain;
1745 e->e_to = "[CHAIN]";
1747 macdefine(&e->e_macro, A_PERM, 'u', user); /* to user */
1749 if (p == NULL && ctladdr != NULL)
1750 p = ctladdr->q_home;
1751 macdefine(&e->e_macro, A_PERM, 'z', p); /* user's home */
1753 /* set the ${dsn_notify} macro if applicable */
1754 if (bitset(QHASNOTIFY, to->q_flags))
1756 char notify[MAXLINE];
1759 if (bitset(QPINGONSUCCESS, to->q_flags))
1760 (void) sm_strlcat(notify, "SUCCESS,",
1762 if (bitset(QPINGONFAILURE, to->q_flags))
1763 (void) sm_strlcat(notify, "FAILURE,",
1765 if (bitset(QPINGONDELAY, to->q_flags))
1766 (void) sm_strlcat(notify, "DELAY,",
1769 /* Set to NEVER or drop trailing comma */
1770 if (notify[0] == '\0')
1771 (void) sm_strlcat(notify, "NEVER",
1774 notify[strlen(notify) - 1] = '\0';
1776 macdefine(&e->e_macro, A_TEMP,
1777 macid("{dsn_notify}"), notify);
1780 macdefine(&e->e_macro, A_PERM,
1781 macid("{dsn_notify}"), NULL);
1784 ** Expand out this user into argument list.
1789 expand(*mvp, buf, sizeof(buf), e);
1790 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1791 if (pvp >= &pv[MAXPV - 2])
1793 /* allow some space for trailing parms */
1799 /* see if any addresses still exist */
1800 if (tochain == NULL)
1806 /* print out messages as full list */
1808 for (to = tochain; to != NULL; to = to->q_tchain)
1809 strsize += strlen(to->q_paddr) + 1;
1810 if (strsize < TOBUFSIZE)
1811 strsize = TOBUFSIZE;
1812 if (strsize > tobufsize)
1815 tobuf = sm_pmalloc_x(strsize);
1816 tobufsize = strsize;
1820 for (to = tochain; to != NULL; to = to->q_tchain)
1822 (void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1826 e->e_to = tobuf + 1;
1829 ** Fill out any parameters after the $u parameter.
1834 while (*++mvp != NULL)
1836 expand(*mvp, buf, sizeof(buf), e);
1837 *pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1838 if (pvp >= &pv[MAXPV])
1839 syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1847 ** The argument vector gets built, pipes
1848 ** are created as necessary, and we fork & exec as
1850 ** If we are running SMTP, we just need to clean up.
1853 /* XXX this seems a bit weird */
1854 if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1855 bitset(QGOODUID, e->e_from.q_flags))
1856 ctladdr = &e->e_from;
1859 if (ConfigLevel < 2)
1860 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */
1861 #endif /* NAMED_BIND */
1865 sm_dprintf("openmailer:");
1866 printav(sm_debug_file(), pv);
1873 ** Deal with the special case of mail handled through an IPC
1875 ** In this case we don't actually fork. We must be
1876 ** running SMTP for this to work. We will return a
1877 ** zero pid to indicate that we are running IPC.
1878 ** We also handle a debug version that just talks to stdin/out.
1889 /* make absolutely certain 0, 1, and 2 are in use */
1890 (void) sm_snprintf(wbuf, sizeof(wbuf), "%s... openmailer(%s)",
1891 shortenstring(e->e_to, MAXSHORTSTR),
1897 /* check for 8-bit available */
1898 if (bitset(EF_HAS8BIT, e->e_flags) &&
1899 bitnset(M_7BITS, m->m_flags) &&
1900 (bitset(EF_DONT_MIME, e->e_flags) ||
1901 !(bitset(MM_MIME8BIT, MimeMode) ||
1902 (bitset(EF_IS_MIME, e->e_flags) &&
1903 bitset(MM_CVTMIME, MimeMode)))))
1905 e->e_status = "5.6.3";
1906 usrerrenh(e->e_status,
1907 "554 Cannot send 8-bit data to 7-bit destination");
1913 checkfds("before delivery");
1915 /* check for Local Person Communication -- not for mortals!!! */
1916 if (strcmp(m->m_mailer, "[LPC]") == 0)
1920 /* flush any expired connections */
1921 (void) mci_scan(NULL);
1923 /* try to get a cached connection or just a slot */
1924 mci = mci_get(m->m_name, m);
1925 if (mci->mci_host == NULL)
1926 mci->mci_host = m->m_name;
1927 CurHostName = mci->mci_host;
1928 if (mci->mci_state != MCIS_CLOSED)
1930 message("Using cached SMTP/LPC connection for %s...",
1932 mci->mci_deliveries++;
1938 mci = mci_new(e->e_rpool);
1940 mci->mci_in = smioin;
1941 mci->mci_out = smioout;
1942 mci->mci_mailer = m;
1943 mci->mci_host = m->m_name;
1946 mci->mci_state = MCIS_OPENING;
1950 mci->mci_state = MCIS_OPEN;
1952 else if (strcmp(m->m_mailer, "[IPC]") == 0)
1956 if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1958 syserr("null destination for %s mailer", m->m_mailer);
1964 if (strcmp(pv[0], "FILE") == 0)
1966 curhost = CurHostName = "localhost";
1970 # endif /* NETUNIX */
1972 CurHostName = pv[1];
1973 curhost = hostsignature(m, pv[1]);
1976 if (curhost == NULL || curhost[0] == '\0')
1978 syserr("null host signature for %s", pv[1]);
1985 syserr("554 5.3.5 non-clever IPC");
1992 # endif /* NETUNIX */
1995 port = htons((unsigned short) atoi(pv[2]));
1998 # ifdef NO_GETSERVBYNAME
1999 syserr("Invalid port number: %s", pv[2]);
2000 # else /* NO_GETSERVBYNAME */
2001 struct servent *sp = getservbyname(pv[2], "tcp");
2004 syserr("Service %s unknown", pv[2]);
2007 # endif /* NO_GETSERVBYNAME */
2011 nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2012 if (TimeOuts.to_aconnect > 0)
2013 enough = curtime() + TimeOuts.to_aconnect;
2015 while (hostnum < nummxhosts)
2019 static char hostbuf[MAXNAME + 1];
2020 bool tried_fallbacksmarthost = false;
2023 if (*mxhosts[hostnum] == '[')
2025 endp = strchr(mxhosts[hostnum] + 1, ']');
2027 endp = strpbrk(endp + 1, ":,");
2030 endp = strpbrk(mxhosts[hostnum], ":,");
2031 # else /* NETINET6 */
2032 endp = strpbrk(mxhosts[hostnum], ":,");
2033 # endif /* NETINET6 */
2040 if (hostnum == 1 && skip_back != NULL)
2043 ** Coattail piggybacking is no longer an
2044 ** option with the mail host next to be tried
2045 ** no longer the lowest MX preference
2046 ** (hostnum == 1 meaning we're on the second
2047 ** preference). We do not try to coattail
2048 ** piggyback more than the first MX preference.
2049 ** Revert 'tochain' to last location for
2050 ** coincidental piggybacking. This works this
2051 ** easily because the q_tchain kept getting
2052 ** added to the top of the linked list.
2055 tochain = skip_back;
2058 if (*mxhosts[hostnum] == '\0')
2060 syserr("deliver: null host name in signature");
2066 (void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2073 /* see if we already know that this host is fried */
2074 CurHostName = hostbuf;
2075 mci = mci_get(hostbuf, m);
2076 if (mci->mci_state != MCIS_CLOSED)
2082 sm_dprintf("openmailer: ");
2083 mci_dump(sm_debug_file(), mci, false);
2085 CurHostName = mci->mci_host;
2086 if (bitnset(M_LMTP, m->m_flags))
2088 else if (bitset(MCIF_ESMTP, mci->mci_flags))
2092 message("Using cached %sMTP connection to %s via %s...",
2093 type, hostbuf, m->m_name);
2094 mci->mci_deliveries++;
2097 mci->mci_mailer = m;
2098 if (mci->mci_exitstat != EX_OK)
2100 if (mci->mci_exitstat == EX_TEMPFAIL)
2103 /* Try FallbackSmartHost? */
2104 if (should_try_fbsh(e, &tried_fallbacksmarthost,
2105 hostbuf, sizeof(hostbuf),
2112 if (mci_lock_host(mci) != EX_OK)
2114 mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2119 /* try the connection */
2120 sm_setproctitle(true, e, "%s %s: %s",
2122 hostbuf, "user open");
2124 if (mux_path != NULL)
2126 message("Connecting to %s via %s...",
2127 mux_path, m->m_name);
2128 i = makeconnection_ds((char *) mux_path, mci);
2131 # endif /* NETUNIX */
2134 message("Connecting to %s via %s...",
2135 hostbuf, m->m_name);
2137 message("Connecting to %s port %d via %s...",
2138 hostbuf, ntohs(port),
2140 i = makeconnection(hostbuf, port, mci, e,
2143 mci->mci_errno = errno;
2144 mci->mci_lastuse = curtime();
2145 mci->mci_deliveries = 0;
2146 mci->mci_exitstat = i;
2147 mci_clr_extensions(mci);
2149 mci->mci_herrno = h_errno;
2150 # endif /* NAMED_BIND */
2153 ** Have we tried long enough to get a connection?
2154 ** If yes, skip to the fallback MX hosts
2158 if (enough > 0 && mci->mci_lastuse >= enough)
2162 extern int NumFallbackMXHosts;
2163 # else /* NAMED_BIND */
2164 const int NumFallbackMXHosts = 0;
2165 # endif /* NAMED_BIND */
2167 if (hostnum < nummxhosts && LogLevel > 9)
2168 sm_syslog(LOG_INFO, e->e_id,
2169 "Timeout.to_aconnect occurred before exhausting all addresses");
2171 /* turn off timeout if fallback available */
2172 if (NumFallbackMXHosts > 0)
2175 /* skip to a fallback MX host */
2176 h = nummxhosts - NumFallbackMXHosts;
2183 markstats(e, firstto, STATS_CONNECT);
2184 mci->mci_state = MCIS_OPENING;
2186 if (TrafficLogFile != NULL)
2187 (void) sm_io_fprintf(TrafficLogFile,
2189 "%05d === CONNECT %s\n",
2196 /* Try FallbackSmartHost? */
2197 if (should_try_fbsh(e, &tried_fallbacksmarthost,
2198 hostbuf, sizeof(hostbuf), i))
2202 sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2204 if (i == EX_TEMPFAIL)
2206 mci_unlock_host(mci);
2209 /* enter status of this host */
2212 /* should print some message here for -v mode */
2216 syserr("deliver: no host name");
2217 rcode = EX_SOFTWARE;
2224 /* flush any expired connections */
2225 (void) mci_scan(NULL);
2228 if (bitnset(M_LMTP, m->m_flags))
2230 /* try to get a cached connection */
2231 mci = mci_get(m->m_name, m);
2232 if (mci->mci_host == NULL)
2233 mci->mci_host = m->m_name;
2234 CurHostName = mci->mci_host;
2235 if (mci->mci_state != MCIS_CLOSED)
2237 message("Using cached LMTP connection for %s...",
2239 mci->mci_deliveries++;
2244 /* announce the connection to verbose listeners */
2245 if (host == NULL || host[0] == '\0')
2246 message("Connecting to %s...", m->m_name);
2248 message("Connecting to %s via %s...", host, m->m_name);
2249 if (TrafficLogFile != NULL)
2253 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2254 "%05d === EXEC", (int) CurrentPid);
2255 for (av = pv; *av != NULL; av++)
2256 (void) sm_io_fprintf(TrafficLogFile,
2257 SM_TIME_DEFAULT, " %s",
2259 (void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2264 checkfd012("before creating mail pipe");
2267 /* create a pipe to shove the mail through */
2268 if (pipe(mpvect) < 0)
2270 syserr("%s... openmailer(%s): pipe (to mailer)",
2271 shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2273 sm_dprintf("openmailer: NULL\n");
2279 /* make sure we didn't get one of the standard I/O files */
2280 if (mpvect[0] < 3 || mpvect[1] < 3)
2282 syserr("%s... openmailer(%s): bogus mpvect %d %d",
2283 shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2284 mpvect[0], mpvect[1]);
2287 sm_dprintf("openmailer: NULL\n");
2292 /* make sure system call isn't dead meat */
2293 checkfdopen(mpvect[0], "mpvect[0]");
2294 checkfdopen(mpvect[1], "mpvect[1]");
2295 if (mpvect[0] == mpvect[1] ||
2296 (e->e_lockfp != NULL &&
2297 (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2299 mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2302 if (e->e_lockfp == NULL)
2303 syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2304 shortenstring(e->e_to, MAXSHORTSTR),
2305 m->m_name, mpvect[0], mpvect[1]);
2307 syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2308 shortenstring(e->e_to, MAXSHORTSTR),
2309 m->m_name, mpvect[0], mpvect[1],
2310 sm_io_getinfo(e->e_lockfp,
2311 SM_IO_WHAT_FD, NULL));
2315 /* create a return pipe */
2316 if (pipe(rpvect) < 0)
2318 syserr("%s... openmailer(%s): pipe (from mailer)",
2319 shortenstring(e->e_to, MAXSHORTSTR),
2321 (void) close(mpvect[0]);
2322 (void) close(mpvect[1]);
2324 sm_dprintf("openmailer: NULL\n");
2329 checkfdopen(rpvect[0], "rpvect[0]");
2330 checkfdopen(rpvect[1], "rpvect[1]");
2334 ** Actually fork the mailer process.
2335 ** DOFORK is clever about retrying.
2337 ** Dispose of SIGCHLD signal catchers that may be laying
2338 ** around so that endmailer will get it.
2341 if (e->e_xfp != NULL) /* for debugging */
2342 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2343 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2344 (void) sm_signal(SIGCHLD, SIG_DFL);
2348 /* pid is set by DOFORK */
2353 syserr("%s... openmailer(%s): cannot fork",
2354 shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2355 (void) close(mpvect[0]);
2356 (void) close(mpvect[1]);
2357 (void) close(rpvect[0]);
2358 (void) close(rpvect[1]);
2360 sm_dprintf("openmailer: NULL\n");
2368 int new_euid = NO_UID;
2369 int new_ruid = NO_UID;
2370 int new_gid = NO_GID;
2373 extern int DtableSize;
2375 CurrentPid = getpid();
2377 /* clear the events to turn off SIGALRMs */
2380 /* Reset global flags */
2381 RestartRequest = NULL;
2382 RestartWorkGroup = false;
2383 ShutdownRequest = NULL;
2386 if (e->e_lockfp != NULL)
2387 (void) close(sm_io_getinfo(e->e_lockfp,
2391 /* child -- set up input & exec mailer */
2392 (void) sm_signal(SIGALRM, sm_signal_noop);
2393 (void) sm_signal(SIGCHLD, SIG_DFL);
2394 (void) sm_signal(SIGHUP, SIG_IGN);
2395 (void) sm_signal(SIGINT, SIG_IGN);
2396 (void) sm_signal(SIGTERM, SIG_DFL);
2398 (void) sm_signal(SIGUSR1, sm_signal_noop);
2399 # endif /* SIGUSR1 */
2401 if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2404 # if HASSETUSERCONTEXT
2406 ** Set user resources.
2409 if (contextaddr != NULL)
2414 if (contextaddr->q_ruser != NULL)
2415 pwd = sm_getpwnam(contextaddr->q_ruser);
2417 pwd = sm_getpwnam(contextaddr->q_user);
2418 sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2419 #ifdef LOGIN_SETCPUMASK
2420 sucflags |= LOGIN_SETCPUMASK;
2421 #endif /* LOGIN_SETCPUMASK */
2422 #ifdef LOGIN_SETLOGINCLASS
2423 sucflags |= LOGIN_SETLOGINCLASS;
2424 #endif /* LOGIN_SETLOGINCLASS */
2426 sucflags |= LOGIN_SETMAC;
2427 #endif /* LOGIN_SETMAC */
2429 setusercontext(NULL, pwd, pwd->pw_uid,
2433 syserr("openmailer: setusercontext() failed");
2437 # endif /* HASSETUSERCONTEXT */
2440 /* tweak niceness */
2442 (void) nice(m->m_nice);
2443 #endif /* HASNICE */
2445 /* reset group id */
2446 if (bitnset(M_SPECIFIC_UID, m->m_flags))
2448 if (m->m_gid == NO_GID)
2453 else if (bitset(S_ISGID, stb.st_mode))
2454 new_gid = stb.st_gid;
2455 else if (ctladdr != NULL && ctladdr->q_gid != 0)
2457 if (!DontInitGroups)
2459 user = ctladdr->q_ruser;
2461 user = ctladdr->q_user;
2463 if (initgroups(user,
2464 ctladdr->q_gid) == -1
2467 syserr("openmailer: initgroups(%s, %d) failed",
2468 user, ctladdr->q_gid);
2476 gidset[0] = ctladdr->q_gid;
2477 if (setgroups(1, gidset) == -1
2480 syserr("openmailer: setgroups() failed");
2484 new_gid = ctladdr->q_gid;
2488 if (!DontInitGroups)
2491 if (initgroups(DefUser, DefGid) == -1 &&
2494 syserr("openmailer: initgroups(%s, %d) failed",
2504 if (setgroups(1, gidset) == -1
2507 syserr("openmailer: setgroups() failed");
2511 if (m->m_gid == NO_GID)
2516 if (new_gid != NO_GID)
2518 if (RunAsUid != 0 &&
2519 bitnset(M_SPECIFIC_UID, m->m_flags) &&
2520 new_gid != getgid() &&
2521 new_gid != getegid())
2523 /* Only root can change the gid */
2524 syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2525 (int) RunAsUid, (int) new_gid,
2526 (int) getgid(), (int) getegid());
2530 if (setgid(new_gid) < 0 && suidwarn)
2532 syserr("openmailer: setgid(%ld) failed",
2538 /* change root to some "safe" directory */
2539 if (m->m_rootdir != NULL)
2541 expand(m->m_rootdir, cbuf, sizeof(cbuf), e);
2543 sm_dprintf("openmailer: chroot %s\n",
2545 if (chroot(cbuf) < 0)
2547 syserr("openmailer: Cannot chroot(%s)",
2553 syserr("openmailer: cannot chdir(/)");
2560 sm_mbdb_terminate();
2561 if (bitnset(M_SPECIFIC_UID, m->m_flags))
2563 if (m->m_uid == NO_UID)
2564 new_euid = RunAsUid;
2566 new_euid = m->m_uid;
2569 ** Undo the effects of the uid change in main
2570 ** for signal handling. The real uid may
2571 ** be used by mailer in adding a "From "
2575 if (RealUid != 0 && RealUid != getuid())
2577 # if MAILER_SETUID_METHOD == USE_SETEUID
2579 if (setreuid(RealUid, geteuid()) < 0)
2581 syserr("openmailer: setreuid(%d, %d) failed",
2582 (int) RealUid, (int) geteuid());
2585 # endif /* HASSETREUID */
2586 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2587 # if MAILER_SETUID_METHOD == USE_SETREUID
2589 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2592 else if (bitset(S_ISUID, stb.st_mode))
2593 new_ruid = stb.st_uid;
2594 else if (ctladdr != NULL && ctladdr->q_uid != 0)
2595 new_ruid = ctladdr->q_uid;
2596 else if (m->m_uid != NO_UID)
2597 new_ruid = m->m_uid;
2601 # if _FFR_USE_SETLOGIN
2602 /* run disconnected from terminal and set login name */
2603 if (setsid() >= 0 &&
2604 ctladdr != NULL && ctladdr->q_uid != 0 &&
2605 new_euid == ctladdr->q_uid)
2609 pwd = sm_getpwuid(ctladdr->q_uid);
2610 if (pwd != NULL && suidwarn)
2611 (void) setlogin(pwd->pw_name);
2614 # endif /* _FFR_USE_SETLOGIN */
2616 if (new_euid != NO_UID)
2618 if (RunAsUid != 0 && new_euid != RunAsUid)
2620 /* Only root can change the uid */
2621 syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2622 (int) new_euid, (int) RunAsUid);
2626 vendor_set_uid(new_euid);
2627 # if MAILER_SETUID_METHOD == USE_SETEUID
2628 if (seteuid(new_euid) < 0 && suidwarn)
2630 syserr("openmailer: seteuid(%ld) failed",
2634 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2635 # if MAILER_SETUID_METHOD == USE_SETREUID
2636 if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2638 syserr("openmailer: setreuid(%ld, %ld) failed",
2639 (long) new_ruid, (long) new_euid);
2642 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2643 # if MAILER_SETUID_METHOD == USE_SETUID
2644 if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2646 syserr("openmailer: setuid(%ld) failed",
2650 # endif /* MAILER_SETUID_METHOD == USE_SETUID */
2652 else if (new_ruid != NO_UID)
2654 vendor_set_uid(new_ruid);
2655 if (setuid(new_ruid) < 0 && suidwarn)
2657 syserr("openmailer: setuid(%ld) failed",
2664 sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2665 (int) getuid(), (int) geteuid(),
2666 (int) getgid(), (int) getegid());
2668 /* move into some "safe" directory */
2669 if (m->m_execdir != NULL)
2673 for (p = m->m_execdir; p != NULL; p = q)
2678 expand(p, cbuf, sizeof(cbuf), e);
2682 sm_dprintf("openmailer: trydir %s\n",
2684 if (cbuf[0] != '\0' &&
2690 /* Check safety of program to be run */
2691 sff = SFF_ROOTOK|SFF_EXECOK;
2692 if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2694 sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2695 if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2697 sff |= SFF_NOPATHCHECK;
2699 sff |= SFF_SAFEDIRPATH;
2700 ret = safefile(m->m_mailer, getuid(), getgid(),
2701 user, sff, 0, NULL);
2703 sm_syslog(LOG_INFO, e->e_id,
2704 "Warning: program %s unsafe: %s",
2705 m->m_mailer, sm_errstring(ret));
2707 /* arrange to filter std & diag output of command */
2708 (void) close(rpvect[0]);
2709 if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2711 syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2712 shortenstring(e->e_to, MAXSHORTSTR),
2713 m->m_name, rpvect[1]);
2716 (void) close(rpvect[1]);
2718 if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2720 syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2721 shortenstring(e->e_to, MAXSHORTSTR),
2726 /* arrange to get standard input */
2727 (void) close(mpvect[1]);
2728 if (dup2(mpvect[0], STDIN_FILENO) < 0)
2730 syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2731 shortenstring(e->e_to, MAXSHORTSTR),
2732 m->m_name, mpvect[0]);
2735 (void) close(mpvect[0]);
2737 /* arrange for all the files to be closed */
2738 sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2740 # if !_FFR_USE_SETLOGIN
2741 /* run disconnected from terminal */
2743 # endif /* !_FFR_USE_SETLOGIN */
2745 /* try to execute the mailer */
2746 (void) execve(m->m_mailer, (ARGV_T) pv,
2747 (ARGV_T) UserEnviron);
2749 syserr("Cannot exec %s", m->m_mailer);
2750 if (bitnset(M_LOCALMAILER, m->m_flags) ||
2751 transienterror(save_errno))
2753 _exit(EX_UNAVAILABLE);
2757 ** Set up return value.
2765 ** Allocate from general heap, not
2766 ** envelope rpool, because this mci
2767 ** is going to be cached.
2770 mci = mci_new(NULL);
2775 ** Prevent a storage leak by allocating
2776 ** this from the envelope rpool.
2779 mci = mci_new(e->e_rpool);
2782 mci->mci_mailer = m;
2785 mci->mci_state = MCIS_OPENING;
2790 mci->mci_state = MCIS_OPEN;
2793 (void) close(mpvect[0]);
2794 mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2795 (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2797 if (mci->mci_out == NULL)
2799 syserr("deliver: cannot create mailer output channel, fd=%d",
2801 (void) close(mpvect[1]);
2802 (void) close(rpvect[0]);
2803 (void) close(rpvect[1]);
2808 (void) close(rpvect[1]);
2809 mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2810 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2812 if (mci->mci_in == NULL)
2814 syserr("deliver: cannot create mailer input channel, fd=%d",
2816 (void) close(rpvect[0]);
2817 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2818 mci->mci_out = NULL;
2825 ** If we are in SMTP opening state, send initial protocol.
2828 if (bitnset(M_7BITS, m->m_flags) &&
2829 (!clever || mci->mci_state == MCIS_OPENING))
2830 mci->mci_flags |= MCIF_7BIT;
2831 if (clever && mci->mci_state != MCIS_CLOSED)
2833 # if STARTTLS || SASL
2836 extern SOCKADDR CurHostAddr;
2837 # endif /* STARTTLS || SASL */
2840 # define DONE_AUTH(f) bitset(MCIF_AUTHACT, f)
2843 # define DONE_STARTTLS(f) bitset(MCIF_TLSACT, f)
2844 # endif /* STARTTLS */
2845 # define ONLY_HELO(f) bitset(MCIF_ONLY_EHLO, f)
2846 # define SET_HELO(f) f |= MCIF_ONLY_EHLO
2847 # define CLR_HELO(f) f &= ~MCIF_ONLY_EHLO
2849 # if STARTTLS || SASL
2850 /* don't use CurHostName, it is changed in many places */
2851 if (mci->mci_host != NULL)
2853 srvname = mci->mci_host;
2854 dotpos = strlen(srvname) - 1;
2857 if (srvname[dotpos] == '.')
2858 srvname[dotpos] = '\0';
2863 else if (mci->mci_mailer != NULL)
2865 srvname = mci->mci_mailer->m_name;
2874 /* don't set {server_name} to NULL or "": see getauth() */
2875 macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2878 /* CurHostAddr is set by makeconnection() and mci_get() */
2879 if (CurHostAddr.sa.sa_family != 0)
2881 macdefine(&mci->mci_macro, A_TEMP,
2882 macid("{server_addr}"),
2883 anynet_ntoa(&CurHostAddr));
2885 else if (mci->mci_mailer != NULL)
2887 /* mailer name is unique, use it as address */
2888 macdefine(&mci->mci_macro, A_PERM,
2889 macid("{server_addr}"),
2890 mci->mci_mailer->m_name);
2894 /* don't set it to NULL or "": see getauth() */
2895 macdefine(&mci->mci_macro, A_PERM,
2896 macid("{server_addr}"), "0");
2899 /* undo change of srvname (mci->mci_host) */
2901 srvname[dotpos] = '.';
2903 reconnect: /* after switching to an encrypted connection */
2904 # endif /* STARTTLS || SASL */
2906 /* set the current connection information */
2909 mci->mci_saslcap = NULL;
2911 smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2912 CLR_HELO(mci->mci_flags);
2914 if (IS_DLVR_RETURN(e))
2917 ** Check whether other side can deliver e-mail
2921 if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2923 e->e_status = "5.4.7";
2924 usrerrenh(e->e_status,
2925 "554 Server does not support Deliver By");
2926 rcode = EX_UNAVAILABLE;
2929 if (e->e_deliver_by > 0 &&
2930 e->e_deliver_by - (curtime() - e->e_ctime) <
2933 e->e_status = "5.4.7";
2934 usrerrenh(e->e_status,
2935 "554 Message can't be delivered in time; %ld < %ld",
2936 e->e_deliver_by - (curtime() - e->e_ctime),
2938 rcode = EX_UNAVAILABLE;
2944 /* first TLS then AUTH to provide a security layer */
2945 if (mci->mci_state != MCIS_CLOSED &&
2946 !DONE_STARTTLS(mci->mci_flags))
2950 bool saveQuickAbort = QuickAbort;
2951 bool saveSuprErrs = SuprErrs;
2955 usetls = bitset(MCIF_TLS, mci->mci_flags);
2957 usetls = !iscltflgset(e, D_NOTLS);
2959 host = macvalue(macid("{server_name}"), e);
2965 if (rscheck("try_tls", host, NULL, e,
2966 RSF_RMCOMM, 7, host, NOQID, NULL)
2968 || Errors > olderrors)
2972 SuprErrs = saveSuprErrs;
2973 QuickAbort = saveQuickAbort;
2978 if ((rcode = starttls(m, mci, e)) == EX_OK)
2980 /* start again without STARTTLS */
2981 mci->mci_flags |= MCIF_TLSACT;
2988 ** TLS negotiation failed, what to do?
2989 ** fall back to unencrypted connection
2990 ** or abort? How to decide?
2991 ** set a macro and call a ruleset.
2994 mci->mci_flags &= ~MCIF_TLS;
3009 case EX_UNAVAILABLE:
3013 /* everything else is a failure */
3016 rcode = EX_TEMPFAIL;
3018 macdefine(&e->e_macro, A_PERM,
3019 macid("{verify}"), s);
3023 macdefine(&e->e_macro, A_PERM,
3024 macid("{verify}"), "NONE");
3030 ** rcode == EX_SOFTWARE is special:
3031 ** the TLS negotiation failed
3032 ** we have to drop the connection no matter what
3033 ** However, we call tls_server to give it the chance
3034 ** to log the problem and return an appropriate
3038 if (rscheck("tls_server",
3039 macvalue(macid("{verify}"), e),
3040 NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3041 host, NOQID, NULL) != EX_OK ||
3042 Errors > olderrors ||
3043 rcode == EX_SOFTWARE)
3045 char enhsc[ENHSCLEN];
3046 extern char MsgBuf[];
3048 if (ISSMTPCODE(MsgBuf) &&
3049 extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3051 p = sm_rpool_strdup_x(e->e_rpool,
3056 p = "403 4.7.0 server not authenticated.";
3057 (void) sm_strlcpy(enhsc, "4.7.0",
3060 SuprErrs = saveSuprErrs;
3061 QuickAbort = saveQuickAbort;
3063 if (rcode == EX_SOFTWARE)
3065 /* drop the connection */
3066 mci->mci_state = MCIS_QUITING;
3067 if (mci->mci_in != NULL)
3069 (void) sm_io_close(mci->mci_in,
3073 mci->mci_flags &= ~MCIF_TLSACT;
3074 (void) endmailer(mci, e, pv);
3078 /* abort transfer */
3079 smtpquit(m, mci, e);
3082 /* avoid bogus error msg */
3085 /* temp or permanent failure? */
3086 rcode = (*p == '4') ? EX_TEMPFAIL
3088 mci_setstat(mci, rcode, enhsc, p);
3091 ** hack to get the error message into
3092 ** the envelope (done in giveresponse())
3095 (void) sm_strlcpy(SmtpError, p,
3098 else if (mci->mci_state == MCIS_CLOSED)
3100 /* connection close caused by 421 */
3102 rcode = EX_TEMPFAIL;
3103 mci_setstat(mci, rcode, NULL, "421");
3108 QuickAbort = saveQuickAbort;
3109 SuprErrs = saveSuprErrs;
3110 if (DONE_STARTTLS(mci->mci_flags) &&
3111 mci->mci_state != MCIS_CLOSED)
3113 SET_HELO(mci->mci_flags);
3114 mci_clr_extensions(mci);
3118 # endif /* STARTTLS */
3120 /* if other server supports authentication let's authenticate */
3121 if (mci->mci_state != MCIS_CLOSED &&
3122 mci->mci_saslcap != NULL &&
3123 !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3125 /* Should we require some minimum authentication? */
3126 if ((ret = smtpauth(m, mci, e)) == EX_OK)
3129 sasl_ssf_t *ssf = NULL;
3131 /* Get security strength (features) */
3132 result = sasl_getprop(mci->mci_conn, SASL_SSF,
3134 (const void **) &ssf);
3135 # else /* SASL >= 20000 */
3137 # endif /* SASL >= 20000 */
3141 sm_syslog(LOG_INFO, NOQID,
3142 "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3144 macvalue(macid("{auth_type}"), e),
3145 result == SASL_OK ? *ssf : 0);
3148 ** Only switch to encrypted connection
3149 ** if a security layer has been negotiated
3152 if (result == SASL_OK && *ssf > 0)
3157 ** Convert I/O layer to use SASL.
3158 ** If the call fails, the connection
3162 tmo = DATA_PROGRESS_TIMEOUT * 1000;
3163 if (sfdcsasl(&mci->mci_in,
3165 mci->mci_conn, tmo) == 0)
3167 mci_clr_extensions(mci);
3168 mci->mci_flags |= MCIF_AUTHACT|
3172 syserr("AUTH TLS switch failed in client");
3175 mci->mci_flags |= MCIF_AUTHACT;
3178 else if (ret == EX_TEMPFAIL)
3181 sm_syslog(LOG_ERR, NOQID,
3182 "AUTH=client, relay=%.100s, temporary failure, connection abort",
3184 smtpquit(m, mci, e);
3186 /* avoid bogus error msg */
3188 rcode = EX_TEMPFAIL;
3189 mci_setstat(mci, rcode, "4.3.0", p);
3192 ** hack to get the error message into
3193 ** the envelope (done in giveresponse())
3196 (void) sm_strlcpy(SmtpError,
3197 "Temporary AUTH failure",
3206 /* clear out per-message flags from connection structure */
3207 mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3209 if (bitset(EF_HAS8BIT, e->e_flags) &&
3210 !bitset(EF_DONT_MIME, e->e_flags) &&
3211 bitnset(M_7BITS, m->m_flags))
3212 mci->mci_flags |= MCIF_CVT8TO7;
3215 if (bitnset(M_MAKE8BIT, m->m_flags) &&
3216 !bitset(MCIF_7BIT, mci->mci_flags) &&
3217 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3218 (sm_strcasecmp(p, "quoted-printable") == 0 ||
3219 sm_strcasecmp(p, "base64") == 0) &&
3220 (p = hvalue("Content-Type", e->e_header)) != NULL)
3222 /* may want to convert 7 -> 8 */
3223 /* XXX should really parse it here -- and use a class XXX */
3224 if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3225 (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3226 mci->mci_flags |= MCIF_CVT7TO8;
3228 #endif /* MIME7TO8 */
3232 sm_dprintf("openmailer: ");
3233 mci_dump(sm_debug_file(), mci, false);
3236 #if _FFR_CLIENT_SIZE
3238 ** See if we know the maximum size and
3239 ** abort if the message is too big.
3241 ** NOTE: _FFR_CLIENT_SIZE is untested.
3244 if (bitset(MCIF_SIZE, mci->mci_flags) &&
3245 mci->mci_maxsize > 0 &&
3246 e->e_msgsize > mci->mci_maxsize)
3248 e->e_flags |= EF_NO_BODY_RETN;
3249 if (bitnset(M_LOCALMAILER, m->m_flags))
3250 e->e_status = "5.2.3";
3252 e->e_status = "5.3.4";
3254 usrerrenh(e->e_status,
3255 "552 Message is too large; %ld bytes max",
3259 /* Need an e_message for error */
3260 (void) sm_snprintf(SmtpError, sizeof(SmtpError),
3261 "Message is too large; %ld bytes max",
3265 #endif /* _FFR_CLIENT_SIZE */
3267 if (mci->mci_state != MCIS_OPEN)
3269 /* couldn't open the mailer */
3270 rcode = mci->mci_exitstat;
3271 errno = mci->mci_errno;
3272 SM_SET_H_ERRNO(mci->mci_herrno);
3275 /* shouldn't happen */
3276 syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3277 (unsigned long) mci, rcode, errno,
3278 mci->mci_state, firstsig);
3279 mci_dump_all(smioout, true);
3280 rcode = EX_SOFTWARE;
3282 else if (nummxhosts > hostnum)
3284 /* try next MX site */
3293 ** Format and send message.
3298 ok = putfromline(mci, e);
3300 ok = (*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3302 ok = (*e->e_putbody)(mci, e, NULL);
3303 if (ok && bitset(MCIF_INLONGLINE, mci->mci_flags))
3304 ok = putline("", mci);
3307 ** Ignore an I/O error that was caused by EPIPE.
3308 ** Some broken mailers don't read the entire body
3309 ** but just exit() thus causing an I/O error.
3312 if (!ok && (sm_io_error(mci->mci_out) && errno == EPIPE))
3315 /* (always) get the exit status */
3316 rcode = endmailer(mci, e, pv);
3318 rcode = EX_TEMPFAIL;
3319 if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3322 ** Need an e_message for mailq display.
3323 ** We set SmtpError as
3326 (void) sm_snprintf(SmtpError, sizeof(SmtpError),
3327 "%s mailer (%s) exited with EX_TEMPFAIL",
3328 m->m_name, m->m_mailer);
3334 ** Send the MAIL FROM: protocol
3337 /* XXX this isn't pipelined... */
3338 rcode = smtpmailfrom(m, mci, e);
3343 ADDRESS *volatile pchain;
3344 # endif /* PIPELINING */
3346 /* send the recipient list */
3348 mci->mci_retryrcpt = false;
3349 mci->mci_tolist = tobuf;
3352 mci->mci_nextaddr = NULL;
3353 # endif /* PIPELINING */
3355 for (to = tochain; to != NULL; to = to->q_tchain)
3357 if (!QS_IS_UNMARKED(to->q_state))
3360 /* mark recipient state as "ok so far" */
3361 to->q_state = QS_OK;
3362 e->e_to = to->q_paddr;
3364 i = rscheck("tls_rcpt", to->q_user, NULL, e,
3365 RSF_RMCOMM|RSF_COUNT, 3,
3366 mci->mci_host, e->e_id, NULL);
3369 markfailure(e, to, mci, i, false);
3370 giveresponse(i, to->q_status, m, mci,
3371 ctladdr, xstart, e, to);
3372 if (i == EX_TEMPFAIL)
3374 mci->mci_retryrcpt = true;
3375 to->q_state = QS_RETRY;
3379 # endif /* STARTTLS */
3381 i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3384 bitset(MCIF_PIPELINED, mci->mci_flags))
3387 ** Add new element to list of
3388 ** recipients for pipelining.
3391 to->q_pchain = NULL;
3392 if (mci->mci_nextaddr == NULL)
3393 mci->mci_nextaddr = to;
3398 pchain->q_pchain = to;
3399 pchain = pchain->q_pchain;
3402 # endif /* PIPELINING */
3405 markfailure(e, to, mci, i, false);
3406 giveresponse(i, to->q_status, m, mci,
3407 ctladdr, xstart, e, to);
3408 if (i == EX_TEMPFAIL)
3409 to->q_state = QS_RETRY;
3413 /* No recipients in list and no missing responses? */
3414 if (tobuf[0] == '\0'
3416 && bitset(MCIF_PIPELINED, mci->mci_flags)
3417 && mci->mci_nextaddr == NULL
3418 # endif /* PIPELINING */
3423 if (bitset(MCIF_CACHED, mci->mci_flags))
3424 smtprset(m, mci, e);
3428 e->e_to = tobuf + 1;
3429 rcode = smtpdata(m, mci, e, ctladdr, xstart);
3432 if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3434 /* try next MX site */
3439 if (ConfigLevel < 2)
3440 _res.options |= RES_DEFNAMES | RES_DNSRCH; /* XXX */
3441 #endif /* NAMED_BIND */
3444 checkfds("after delivery");
3447 ** Do final status disposal.
3448 ** We check for something in tobuf for the SMTP case.
3449 ** If we got a temporary failure, arrange to queue the
3454 if (bitnset(M_LMTP, m->m_flags))
3462 anyok = rcode == EX_OK;
3464 for (to = tochain; to != NULL; to = to->q_tchain)
3466 /* see if address already marked */
3467 if (!QS_IS_OK(to->q_state))
3470 /* if running LMTP, get the status for each address */
3471 if (bitnset(M_LMTP, m->m_flags))
3473 if (lmtp_rcode == EX_OK)
3474 rcode = smtpgetstat(m, mci, e);
3477 strsize += sm_strlcat2(tobuf + strsize, ",",
3479 tobufsize - strsize);
3480 SM_ASSERT(strsize < tobufsize);
3485 e->e_to = to->q_paddr;
3486 markfailure(e, to, mci, rcode, true);
3487 giveresponse(rcode, to->q_status, m, mci,
3488 ctladdr, xstart, e, to);
3489 e->e_to = tobuf + 1;
3495 /* mark bad addresses */
3498 if (goodmxfound && rcode == EX_NOHOST)
3499 rcode = EX_TEMPFAIL;
3500 markfailure(e, to, mci, rcode, true);
3505 /* successful delivery */
3506 to->q_state = QS_SENT;
3507 to->q_statdate = curtime();
3511 ** Checkpoint the send list every few addresses
3514 if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3516 queueup(e, false, false);
3520 if (bitnset(M_LOCALMAILER, m->m_flags) &&
3521 bitset(QPINGONSUCCESS, to->q_flags))
3523 to->q_flags |= QDELIVERED;
3524 to->q_status = "2.1.5";
3525 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3526 "%s... Successfully delivered\n",
3529 else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3530 bitset(QPRIMARY, to->q_flags) &&
3531 !bitset(MCIF_DSN, mci->mci_flags))
3533 to->q_flags |= QRELAYED;
3534 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3535 "%s... relayed; expect no further notifications\n",
3538 else if (IS_DLVR_NOTIFY(e) &&
3539 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3540 bitset(QPRIMARY, to->q_flags) &&
3541 (!bitset(QHASNOTIFY, to->q_flags) ||
3542 bitset(QPINGONSUCCESS, to->q_flags) ||
3543 bitset(QPINGONFAILURE, to->q_flags) ||
3544 bitset(QPINGONDELAY, to->q_flags)))
3546 /* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3547 to->q_flags |= QBYNRELAY;
3548 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3549 "%s... Deliver-by notify: relayed\n",
3552 else if (IS_DLVR_TRACE(e) &&
3553 (!bitset(QHASNOTIFY, to->q_flags) ||
3554 bitset(QPINGONSUCCESS, to->q_flags) ||
3555 bitset(QPINGONFAILURE, to->q_flags) ||
3556 bitset(QPINGONDELAY, to->q_flags)) &&
3557 bitset(QPRIMARY, to->q_flags))
3559 /* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3560 to->q_flags |= QBYTRACE;
3561 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3562 "%s... Deliver-By trace: relayed\n",
3567 if (bitnset(M_LMTP, m->m_flags))
3570 ** Global information applies to the last recipient only;
3571 ** clear it out to avoid bogus errors.
3575 e->e_statmsg = NULL;
3577 /* reset the mci state for the next transaction */
3579 (mci->mci_state == MCIS_MAIL ||
3580 mci->mci_state == MCIS_RCPT ||
3581 mci->mci_state == MCIS_DATA))
3583 mci->mci_state = MCIS_OPEN;
3584 SmtpPhase = mci->mci_phase = "idle";
3585 sm_setproctitle(true, e, "%s: %s", CurHostName,
3590 if (tobuf[0] != '\0')
3592 giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3595 ** This code is disabled for now because I am not
3596 ** sure that copying status from the first recipient
3597 ** to all non-status'ed recipients is a good idea.
3600 if (tochain->q_message != NULL &&
3601 !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3603 for (to = tochain->q_tchain; to != NULL;
3606 /* see if address already marked */
3607 if (QS_IS_QUEUEUP(to->q_state) &&
3608 to->q_message == NULL)
3609 to->q_message = sm_rpool_strdup_x(e->e_rpool,
3610 tochain->q_message);
3616 markstats(e, tochain, STATS_NORMAL);
3617 mci_store_persistent(mci);
3619 /* Some recipients were tempfailed, try them on the next host */
3620 if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3622 /* try next MX site */
3626 /* now close the connection */
3627 if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3628 !bitset(MCIF_CACHED, mci->mci_flags))
3629 smtpquit(m, mci, e);
3636 ** Restore state and return.
3641 /* make absolutely certain 0, 1, and 2 are in use */
3642 (void) sm_snprintf(wbuf, sizeof(wbuf),
3643 "%s... end of deliver(%s)",
3644 e->e_to == NULL ? "NO-TO-LIST"
3645 : shortenstring(e->e_to,
3654 ** It was originally necessary to set macro 'g' to NULL
3655 ** because it previously pointed to an auto buffer.
3656 ** We don't do this any more, so this may be unnecessary.
3659 macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3667 ** MARKFAILURE -- mark a failure on a specific address.
3670 ** e -- the envelope we are sending.
3671 ** q -- the address to mark.
3672 ** mci -- mailer connection information.
3673 ** rcode -- the code signifying the particular failure.
3674 ** ovr -- override an existing code?
3680 ** marks the address (and possibly the envelope) with the
3681 ** failure so that an error will be returned or
3682 ** the message will be queued, as appropriate.
3686 markfailure(e, q, mci, rcode, ovr)
3687 register ENVELOPE *e;
3688 register ADDRESS *q;
3693 int save_errno = errno;
3694 char *status = NULL;
3695 char *rstatus = NULL;
3705 q->q_state = QS_QUEUEUP;
3709 q->q_state = QS_BADADDR;
3713 /* find most specific error code possible */
3714 if (mci != NULL && mci->mci_status != NULL)
3716 status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3717 if (mci->mci_rstatus != NULL)
3718 rstatus = sm_rpool_strdup_x(e->e_rpool,
3723 else if (e->e_status != NULL)
3725 status = e->e_status;
3754 case EX_UNAVAILABLE:
3774 if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3775 *q->q_status == '\0' || *q->q_status < *status))
3777 q->q_status = status;
3778 q->q_rstatus = rstatus;
3780 if (rcode != EX_OK && q->q_rstatus == NULL &&
3781 q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3782 sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3786 (void) sm_snprintf(buf, sizeof(buf), "%d", rcode);
3787 q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3790 q->q_statdate = curtime();
3791 if (CurHostName != NULL && CurHostName[0] != '\0' &&
3792 mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3793 q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3799 ** ENDMAILER -- Wait for mailer to terminate.
3801 ** We should never get fatal errors (e.g., segmentation
3802 ** violation), so we report those specially. For other
3803 ** errors, we choose a status message (into statmsg),
3804 ** and if it represents an error, we print it.
3807 ** mci -- the mailer connection info.
3808 ** e -- the current envelope.
3809 ** pv -- the parameter vector that invoked the mailer
3810 ** (for error messages).
3813 ** exit code of mailer.
3819 static jmp_buf EndWaitTimeout;
3822 endwaittimeout(ignore)
3826 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3827 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3832 longjmp(EndWaitTimeout, 1);
3836 endmailer(mci, e, pv)
3838 register ENVELOPE *e;
3842 int save_errno = errno;
3844 SM_EVENT *ev = NULL;
3847 mci_unlock_host(mci);
3849 /* close output to mailer */
3850 if (mci->mci_out != NULL)
3852 (void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3853 mci->mci_out = NULL;
3856 /* copy any remaining input to transcript */
3857 if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3860 while (sfgets(buf, sizeof(buf), mci->mci_in,
3861 TimeOuts.to_quit, "Draining Input") != NULL)
3862 (void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3866 /* close SASL connection */
3867 if (bitset(MCIF_AUTHACT, mci->mci_flags))
3869 sasl_dispose(&mci->mci_conn);
3870 mci->mci_flags &= ~MCIF_AUTHACT;
3876 (void) endtlsclt(mci);
3877 #endif /* STARTTLS */
3879 /* now close the input */
3880 if (mci->mci_in != NULL)
3882 (void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3885 mci->mci_state = MCIS_CLOSED;
3889 /* in the IPC case there is nothing to wait for */
3890 if (mci->mci_pid == 0)
3893 /* put a timeout around the wait */
3894 if (mci->mci_mailer->m_wait > 0)
3896 if (setjmp(EndWaitTimeout) == 0)
3897 ev = sm_setevent(mci->mci_mailer->m_wait,
3901 syserr("endmailer %s: wait timeout (%ld)",
3902 mci->mci_mailer->m_name,
3903 (long) mci->mci_mailer->m_wait);
3908 /* wait for the mailer process, collect status */
3909 st = waitfor(mci->mci_pid);
3917 syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3923 /* normal death -- return status */
3924 return (WEXITSTATUS(st));
3927 /* it died a horrid death */
3928 syserr("451 4.3.0 mailer %s died with signal %d%s",
3929 mci->mci_mailer->m_name, WTERMSIG(st),
3930 WCOREDUMP(st) ? " (core dumped)" :
3931 (WIFSTOPPED(st) ? " (stopped)" : ""));
3933 /* log the arguments */
3934 if (pv != NULL && e->e_xfp != NULL)
3938 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3939 for (av = pv; *av != NULL; av++)
3940 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3942 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3945 ExitStat = EX_TEMPFAIL;
3949 ** GIVERESPONSE -- Interpret an error response from a mailer
3952 ** status -- the status code from the mailer (high byte
3953 ** only; core dumps must have been taken care of
3955 ** dsn -- the DSN associated with the address, if any.
3956 ** m -- the mailer info for this mailer.
3957 ** mci -- the mailer connection info -- can be NULL if the
3958 ** response is given before the connection is made.
3959 ** ctladdr -- the controlling address for the recipient
3961 ** xstart -- the transaction start time, for computing
3962 ** transaction delays.
3963 ** e -- the current envelope.
3964 ** to -- the current recipient (NULL if none).
3970 ** Errors may be incremented.
3971 ** ExitStat may be set.
3975 giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3985 register const char *statmsg;
3988 bool usestat = false;
3989 char dsnbuf[ENHSCLEN];
3995 syserr("giveresponse: null envelope");
4001 ** Compute status message from code.
4004 exmsg = sm_sysexmsg(status);
4007 statmsg = "250 2.0.0 Sent";
4008 if (e->e_statmsg != NULL)
4010 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)",
4012 shortenstring(e->e_statmsg, 403));
4016 else if (exmsg == NULL)
4018 (void) sm_snprintf(buf, sizeof(buf),
4019 "554 5.3.0 unknown mailer error %d",
4021 status = EX_UNAVAILABLE;
4025 else if (status == EX_TEMPFAIL)
4029 (void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
4032 if (h_errno == TRY_AGAIN)
4033 statmsg = sm_errstring(h_errno + E_DNSBASE);
4035 #endif /* NAMED_BIND */
4038 statmsg = sm_errstring(errnum);
4040 statmsg = SmtpError;
4042 if (statmsg != NULL && statmsg[0] != '\0')
4047 case ENETDOWN: /* Network is down */
4048 #endif /* ENETDOWN */
4050 case ENETUNREACH: /* Network is unreachable */
4051 #endif /* ENETUNREACH */
4053 case ENETRESET: /* Network dropped connection on reset */
4054 #endif /* ENETRESET */
4056 case ECONNABORTED: /* Software caused connection abort */
4057 #endif /* ECONNABORTED */
4059 case EHOSTDOWN: /* Host is down */
4060 #endif /* EHOSTDOWN */
4062 case EHOSTUNREACH: /* No route to host */
4063 #endif /* EHOSTUNREACH */
4064 if (mci != NULL && mci->mci_host != NULL)
4066 (void) sm_strlcpyn(bp,
4074 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4081 else if (status == EX_NOHOST && h_errno != 0)
4083 statmsg = sm_errstring(h_errno + E_DNSBASE);
4084 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)", exmsg + 1,
4089 #endif /* NAMED_BIND */
4093 if (*statmsg++ == ':' && errnum != 0)
4095 (void) sm_snprintf(buf, sizeof(buf), "%s: %s", statmsg,
4096 sm_errstring(errnum));
4100 else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4102 (void) sm_snprintf(buf, sizeof(buf), "%s (%s)", statmsg,
4103 shortenstring(e->e_statmsg, 403));
4110 ** Print the message as appropriate
4113 if (status == EX_OK || status == EX_TEMPFAIL)
4115 extern char MsgBuf[];
4117 if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4121 (void) sm_snprintf(dsnbuf, sizeof(dsnbuf),
4122 "%.*s", off, statmsg + 4);
4131 message("%s", statmsg + off);
4132 if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4133 (void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4138 char mbuf[ENHSCLEN + 4];
4141 if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4142 off < sizeof(mbuf) - 4)
4146 (void) sm_snprintf(dsnbuf, sizeof(dsnbuf),
4147 "%.*s", off, statmsg + 4);
4152 /* copy only part of statmsg to mbuf */
4153 (void) sm_strlcpy(mbuf, statmsg, off);
4154 (void) sm_strlcat(mbuf, " %s", sizeof(mbuf));
4159 (void) sm_snprintf(mbuf, sizeof(mbuf), "%.3s %%s",
4163 usrerr(mbuf, &statmsg[off]);
4168 ** Log a record of the transaction. Compute the new
4169 ** ExitStat -- if we already had an error, stick with
4173 if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4174 LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4175 logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4178 sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4180 dsn == NULL ? "<NULL>" : dsn,
4181 e->e_message == NULL ? "<NULL>" : e->e_message,
4184 if (status != EX_TEMPFAIL)
4186 if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4187 e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4188 if (status != EX_OK && to != NULL && to->q_message == NULL)
4190 if (!usestat && e->e_message != NULL)
4191 to->q_message = sm_rpool_strdup_x(e->e_rpool,
4194 to->q_message = sm_rpool_strdup_x(e->e_rpool,
4201 ** LOGDELIVERY -- log the delivery in the system log
4203 ** Care is taken to avoid logging lines that are too long, because
4204 ** some versions of syslog have an unfortunate proclivity for core
4205 ** dumping. This is a hack, to be sure, that is at best empirical.
4208 ** m -- the mailer info. Can be NULL for initial queue.
4209 ** mci -- the mailer connection info -- can be NULL if the
4210 ** log is occurring when no connection is active.
4211 ** dsn -- the DSN attached to the status.
4212 ** status -- the message to print for the status.
4213 ** ctladdr -- the controlling address for the to list.
4214 ** xstart -- the transaction start time, used for
4215 ** computing transaction delay.
4216 ** e -- the current envelope.
4226 logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4233 register ENVELOPE *e;
4238 time_t now = curtime();
4241 #if (SYSLOG_BUFSIZE) >= 256
4242 /* ctladdr: max 106 bytes */
4244 if (ctladdr != NULL)
4246 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4247 shortenstring(ctladdr->q_paddr, 83));
4249 if (bitset(QGOODUID, ctladdr->q_flags))
4251 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4252 (int) ctladdr->q_uid,
4253 (int) ctladdr->q_gid);
4258 /* delay & xdelay: max 41 bytes */
4259 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4260 pintvl(now - e->e_ctime, true));
4263 if (xstart != (time_t) 0)
4265 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4266 pintvl(now - xstart, true));
4270 /* mailer: assume about 19 bytes (max 10 byte mailer name) */
4273 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4278 /* pri: changes with each delivery attempt */
4279 (void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4283 /* relay: max 66 bytes for IPv4 addresses */
4284 if (mci != NULL && mci->mci_host != NULL)
4286 extern SOCKADDR CurHostAddr;
4288 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4289 shortenstring(mci->mci_host, 40));
4292 if (CurHostAddr.sa.sa_family != 0)
4294 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4295 anynet_ntoa(&CurHostAddr));
4298 else if (strcmp(status, "quarantined") == 0)
4300 if (e->e_quarmsg != NULL)
4301 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4303 shortenstring(e->e_quarmsg, 40));
4305 else if (strcmp(status, "queued") != 0)
4307 p = macvalue('h', e);
4308 if (p != NULL && p[0] != '\0')
4310 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4311 ", relay=%s", shortenstring(p, 40));
4317 if (dsn != NULL && *dsn != '\0')
4319 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4320 shortenstring(dsn, ENHSCLEN));
4326 if (e->e_ntries >= 0)
4328 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4329 ", ntries=%d", e->e_ntries + 1);
4332 #endif /* _FFR_LOG_NTRIES */
4334 # define STATLEN (((SYSLOG_BUFSIZE) - 100) / 4)
4338 # endif /* (STATLEN) < 63 */
4339 # if (STATLEN) > 203
4341 # define STATLEN 203
4342 # endif /* (STATLEN) > 203 */
4344 /* stat: max 210 bytes */
4345 if ((bp - buf) > (sizeof(buf) - ((STATLEN) + 20)))
4347 /* desperation move -- truncate data */
4348 bp = buf + sizeof(buf) - ((STATLEN) + 17);
4349 (void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4353 (void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4356 (void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4357 SPACELEFT(buf, bp));
4359 /* id, to: max 13 + TOBUFSIZE bytes */
4360 l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4363 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4364 while (strlen(p) >= l)
4368 for (q = p + l; q > p; q--)
4375 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4376 (int) (++q - p), p, buf);
4379 sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4381 #else /* (SYSLOG_BUFSIZE) >= 256 */
4383 l = SYSLOG_BUFSIZE - 85;
4386 p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4387 while (strlen(p) >= l)
4391 for (q = p + l; q > p; q--)
4399 sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4400 (int) (++q - p), p);
4403 sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4405 if (ctladdr != NULL)
4408 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4409 shortenstring(ctladdr->q_paddr, 83));
4411 if (bitset(QGOODUID, ctladdr->q_flags))
4413 (void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4414 ctladdr->q_uid, ctladdr->q_gid);
4417 sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4420 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4421 pintvl(now - e->e_ctime, true));
4423 if (xstart != (time_t) 0)
4425 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4426 pintvl(now - xstart, true));
4432 (void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4436 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4440 if (mci != NULL && mci->mci_host != NULL)
4442 extern SOCKADDR CurHostAddr;
4444 (void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4448 if (CurHostAddr.sa.sa_family != 0)
4449 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4451 anynet_ntoa(&CurHostAddr));
4453 else if (strcmp(status, "quarantined") == 0)
4455 if (e->e_quarmsg != NULL)
4456 (void) sm_snprintf(bp, SPACELEFT(buf, bp),
4457 ", quarantine=%.100s",
4460 else if (strcmp(status, "queued") != 0)
4462 p = macvalue('h', e);
4463 if (p != NULL && p[0] != '\0')
4464 (void) sm_snprintf(buf, sizeof(buf), "relay=%.100s", p);
4467 sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4469 sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4470 #endif /* (SYSLOG_BUFSIZE) >= 256 */
4473 ** PUTFROMLINE -- output a UNIX-style from line (or whatever)
4475 ** This can be made an arbitrary message separator by changing $l
4477 ** One of the ugliest hacks seen by human eyes is contained herein:
4478 ** UUCP wants those stupid "remote from <host>" lines. Why oh why
4479 ** does a well-meaning programmer such as myself have to deal with
4480 ** this kind of antique garbage????
4483 ** mci -- the connection information.
4484 ** e -- the envelope.
4487 ** true iff line was written successfully
4490 ** outputs some text to fp.
4498 char *template = UnixFromLine;
4502 if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4505 mci->mci_flags |= MCIF_INHEADER;
4507 if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4511 expand("\201g", buf, sizeof(buf), e);
4512 bang = strchr(buf, '!');
4516 char hname[MAXNAME];
4519 ** If we can construct a UUCP path, do so
4522 at = strrchr(buf, '@');
4525 expand("\201k", hname, sizeof(hname), e);
4530 (void) sm_snprintf(xbuf, sizeof(xbuf),
4531 "From %.800s \201d remote from %.100s\n",
4537 (void) sm_snprintf(xbuf, sizeof(xbuf),
4538 "From %.800s \201d remote from %.100s\n",
4543 expand(template, buf, sizeof(buf), e);
4544 return putxline(buf, strlen(buf), mci, PXLF_HEADER);
4548 ** PUTBODY -- put the body of a message.
4551 ** mci -- the connection information.
4552 ** e -- the envelope to put out.
4553 ** separator -- if non-NULL, a message separator that must
4554 ** not be permitted in the resulting message.
4557 ** true iff message was written successfully
4560 ** The message is written onto fp.
4563 /* values for output state variable */
4564 #define OSTATE_HEAD 0 /* at beginning of line */
4565 #define OSTATE_CR 1 /* read a carriage return */
4566 #define OSTATE_INLINE 2 /* putting rest of line */
4569 putbody(mci, e, separator)
4571 register ENVELOPE *e;
4579 char *boundaries[MAXMIMENESTING + 1];
4580 #endif /* MIME8TO7 */
4583 ** Output the body of the message
4586 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4588 char *df = queuename(e, DATAFL_LETTER);
4590 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4591 SM_IO_RDONLY_B, NULL);
4592 if (e->e_dfp == NULL)
4594 char *msg = "!putbody: Cannot open %s for %s from %s";
4596 if (errno == ENOENT)
4598 syserr(msg, df, e->e_to, e->e_from.q_paddr);
4602 if (e->e_dfp == NULL)
4604 if (bitset(MCIF_INHEADER, mci->mci_flags))
4606 if (!putline("", mci))
4608 mci->mci_flags &= ~MCIF_INHEADER;
4610 if (!putline("<<< No Message Collected >>>", mci))
4615 if (e->e_dfino == (ino_t) 0)
4619 if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4624 e->e_dfdev = stbuf.st_dev;
4625 e->e_dfino = stbuf.st_ino;
4629 /* paranoia: the data file should always be in a rewound state */
4630 (void) bfrewind(e->e_dfp);
4632 /* simulate an I/O timeout when used as source */
4637 if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4640 ** Do 8 to 7 bit MIME conversion.
4643 /* make sure it looks like a MIME message */
4644 if (hvalue("MIME-Version", e->e_header) == NULL &&
4645 !putline("MIME-Version: 1.0", mci))
4648 if (hvalue("Content-Type", e->e_header) == NULL)
4650 (void) sm_snprintf(buf, sizeof(buf),
4651 "Content-Type: text/plain; charset=%s",
4653 if (!putline(buf, mci))
4657 /* now do the hard work */
4658 boundaries[0] = NULL;
4659 mci->mci_flags |= MCIF_INHEADER;
4660 if (mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER, 0) ==
4665 else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4667 if (!mime7to8(mci, e->e_header, e))
4670 # endif /* MIME7TO8 */
4671 else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4673 bool oldsuprerrs = SuprErrs;
4675 /* Use mime8to7 to check multipart for MIME header overflows */
4676 boundaries[0] = NULL;
4677 mci->mci_flags |= MCIF_INHEADER;
4680 ** If EF_DONT_MIME is set, we have a broken MIME message
4681 ** and don't want to generate a new bounce message whose
4682 ** body propagates the broken MIME. We can't just not call
4683 ** mime8to7() as is done above since we need the security
4684 ** checks. The best we can do is suppress the errors.
4687 if (bitset(EF_DONT_MIME, e->e_flags))
4690 if (mime8to7(mci, e->e_header, e, boundaries,
4691 M87F_OUTER|M87F_NO8TO7, 0) == SM_IO_EOF)
4694 /* restore SuprErrs */
4695 SuprErrs = oldsuprerrs;
4698 #endif /* MIME8TO7 */
4710 if (bitset(MCIF_INHEADER, mci->mci_flags))
4712 if (!putline("", mci))
4714 mci->mci_flags &= ~MCIF_INHEADER;
4717 /* determine end of buffer; allow for short mailer lines */
4718 buflim = &buf[sizeof(buf) - 1];
4719 if (mci->mci_mailer->m_linelimit > 0 &&
4720 mci->mci_mailer->m_linelimit < sizeof(buf) - 1)
4721 buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4723 /* copy temp file to output with mapping */
4724 ostate = OSTATE_HEAD;
4727 while (!sm_io_error(mci->mci_out) && !dead)
4731 else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4734 if (bitset(MCIF_7BIT, mci->mci_flags))
4741 mci->mci_mailer->m_flags))
4743 if (c != '\r' && c != '\n' && bp < buflim)
4749 /* check beginning of line for special cases */
4753 if (buf[0] == 'F' &&
4754 bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4755 && strncmp(buf, "From ", 5) == 0)
4759 if (buf[0] == '-' && buf[1] == '-' &&
4762 /* possible separator */
4763 int sl = strlen(separator);
4765 if (strncmp(&buf[2], separator, sl)
4769 if (buf[0] == '.' &&
4770 bitnset(M_XDOT, mci->mci_mailer->m_flags))
4775 /* now copy out saved line */
4776 if (TrafficLogFile != NULL)
4778 (void) sm_io_fprintf(TrafficLogFile,
4782 if (padc != SM_IO_EOF)
4783 (void) sm_io_putc(TrafficLogFile,
4786 for (xp = buf; xp < bp; xp++)
4787 (void) sm_io_putc(TrafficLogFile,
4789 (unsigned char) *xp);
4791 (void) sm_io_fputs(TrafficLogFile,
4793 mci->mci_mailer->m_eol);
4795 if (padc != SM_IO_EOF)
4797 if (sm_io_putc(mci->mci_out,
4798 SM_TIME_DEFAULT, padc)
4806 for (xp = buf; xp < bp; xp++)
4808 if (sm_io_putc(mci->mci_out,
4810 (unsigned char) *xp)
4821 if (sm_io_fputs(mci->mci_out,
4823 mci->mci_mailer->m_eol)
4833 SM_ASSERT(pbp < peekbuf +
4841 /* determine next state */
4843 ostate = OSTATE_HEAD;
4847 ostate = OSTATE_INLINE;
4854 if (sm_io_fputs(mci->mci_out,
4856 mci->mci_mailer->m_eol)
4860 if (TrafficLogFile != NULL)
4862 (void) sm_io_fputs(TrafficLogFile,
4864 mci->mci_mailer->m_eol);
4867 ostate = OSTATE_HEAD;
4871 /* had a naked carriage return */
4872 SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4875 ostate = OSTATE_INLINE;
4886 mci->mci_mailer->m_flags))
4889 if (mci->mci_mailer->m_linelimit > 0 &&
4890 pos >= mci->mci_mailer->m_linelimit - 1 &&
4895 /* check next character for EOL */
4898 else if ((d = sm_io_getc(e->e_dfp,
4902 SM_ASSERT(pbp < peekbuf +
4907 if (d == '\n' || d == SM_IO_EOF)
4909 if (TrafficLogFile != NULL)
4910 (void) sm_io_putc(TrafficLogFile,
4913 if (sm_io_putc(mci->mci_out,
4925 if (sm_io_putc(mci->mci_out,
4926 SM_TIME_DEFAULT, '!')
4928 sm_io_fputs(mci->mci_out,
4930 mci->mci_mailer->m_eol)
4937 if (TrafficLogFile != NULL)
4939 (void) sm_io_fprintf(TrafficLogFile,
4942 mci->mci_mailer->m_eol);
4944 ostate = OSTATE_HEAD;
4945 SM_ASSERT(pbp < peekbuf +
4952 if (TrafficLogFile != NULL)
4953 (void) sm_io_fputs(TrafficLogFile,
4955 mci->mci_mailer->m_eol);
4956 if (sm_io_fputs(mci->mci_out,
4958 mci->mci_mailer->m_eol)
4962 ostate = OSTATE_HEAD;
4966 if (TrafficLogFile != NULL)
4967 (void) sm_io_putc(TrafficLogFile,
4970 if (sm_io_putc(mci->mci_out,
4979 ostate = OSTATE_INLINE;
4985 /* make sure we are at the beginning of a line */
4988 if (TrafficLogFile != NULL)
4990 for (xp = buf; xp < bp; xp++)
4991 (void) sm_io_putc(TrafficLogFile,
4993 (unsigned char) *xp);
4995 for (xp = buf; xp < bp; xp++)
4997 if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4998 (unsigned char) *xp)
5007 if (!dead && pos > 0)
5009 if (TrafficLogFile != NULL)
5010 (void) sm_io_fputs(TrafficLogFile,
5012 mci->mci_mailer->m_eol);
5013 if (sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
5014 mci->mci_mailer->m_eol) == SM_IO_EOF)
5019 if (sm_io_error(e->e_dfp))
5021 syserr("putbody: %s/%cf%s: read error",
5022 qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
5023 DATAFL_LETTER, e->e_id);
5024 ExitStat = EX_IOERR;
5030 ** Since mailfile() uses e_dfp in a child process,
5031 ** the file offset in the stdio library for the
5032 ** parent process will not agree with the in-kernel
5033 ** file offset since the file descriptor is shared
5034 ** between the processes. Therefore, it is vital
5035 ** that the file always be rewound. This forces the
5036 ** kernel offset (lseek) and stdio library (ftell)
5041 if (e->e_dfp != NULL)
5042 (void) bfrewind(e->e_dfp);
5044 /* some mailers want extra blank line at end of message */
5045 if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5046 buf[0] != '\0' && buf[0] != '\n')
5048 if (!putline("", mci))
5053 (sm_io_flush(mci->mci_out, SM_TIME_DEFAULT) == SM_IO_EOF ||
5054 (sm_io_error(mci->mci_out) && errno != EPIPE)))
5057 syserr("putbody: write error");
5058 ExitStat = EX_IOERR;
5063 return !dead && !ioerr;
5070 ** MAILFILE -- Send a message to a file.
5072 ** If the file has the set-user-ID/set-group-ID bits set, but NO
5073 ** execute bits, sendmail will try to become the owner of that file
5074 ** rather than the real user. Obviously, this only works if
5075 ** sendmail runs as root.
5077 ** This could be done as a subordinate mailer, except that it
5078 ** is used implicitly to save messages in ~/dead.letter. We
5079 ** view this as being sufficiently important as to include it
5080 ** here. For example, if the system is dying, we shouldn't have
5081 ** to create another process plus some pipes to save the message.
5084 ** filename -- the name of the file to send to.
5085 ** mailer -- mailer definition for recipient -- if NULL,
5087 ** ctladdr -- the controlling address header -- includes
5088 ** the userid/groupid to be when sending.
5089 ** sfflags -- flags for opening.
5090 ** e -- the current envelope.
5093 ** The exit code associated with the operation.
5099 # define RETURN(st) exit(st);
5101 static jmp_buf CtxMailfileTimeout;
5104 mailfile(filename, mailer, ctladdr, sfflags, e)
5105 char *volatile filename;
5106 MAILER *volatile mailer;
5108 volatile long sfflags;
5109 register ENVELOPE *e;
5111 register SM_FILE_T *f;
5112 register pid_t pid = -1;
5116 bool suidwarn = geteuid() == 0;
5118 char *volatile realfile;
5120 char buf[MAXPATHLEN];
5121 char targetfile[MAXPATHLEN];
5125 sm_dprintf("mailfile %s\n ctladdr=", filename);
5126 printaddr(sm_debug_file(), ctladdr, false);
5130 mailer = FileMailer;
5132 if (e->e_xfp != NULL)
5133 (void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5136 ** Special case /dev/null. This allows us to restrict file
5137 ** delivery to regular files only.
5140 if (sm_path_isdevnull(filename))
5143 /* check for 8-bit available */
5144 if (bitset(EF_HAS8BIT, e->e_flags) &&
5145 bitnset(M_7BITS, mailer->m_flags) &&
5146 (bitset(EF_DONT_MIME, e->e_flags) ||
5147 !(bitset(MM_MIME8BIT, MimeMode) ||
5148 (bitset(EF_IS_MIME, e->e_flags) &&
5149 bitset(MM_CVTMIME, MimeMode)))))
5151 e->e_status = "5.6.3";
5152 usrerrenh(e->e_status,
5153 "554 Cannot send 8-bit data to 7-bit destination");
5158 /* Find the actual file */
5159 if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5161 len = strlen(SafeFileEnv);
5163 if (strncmp(SafeFileEnv, filename, len) == 0)
5166 if (len + strlen(filename) + 1 >= sizeof(targetfile))
5168 syserr("mailfile: filename too long (%s/%s)",
5169 SafeFileEnv, filename);
5170 return EX_CANTCREAT;
5172 (void) sm_strlcpy(targetfile, SafeFileEnv, sizeof(targetfile));
5173 realfile = targetfile + len;
5174 if (*filename == '/')
5176 if (*filename != '\0')
5178 /* paranoia: trailing / should be removed in readcf */
5179 if (targetfile[len - 1] != '/')
5180 (void) sm_strlcat(targetfile,
5181 "/", sizeof(targetfile));
5182 (void) sm_strlcat(targetfile, filename,
5183 sizeof(targetfile));
5186 else if (mailer->m_rootdir != NULL)
5188 expand(mailer->m_rootdir, targetfile, sizeof(targetfile), e);
5189 len = strlen(targetfile);
5191 if (strncmp(targetfile, filename, len) == 0)
5194 if (len + strlen(filename) + 1 >= sizeof(targetfile))
5196 syserr("mailfile: filename too long (%s/%s)",
5197 targetfile, filename);
5198 return EX_CANTCREAT;
5200 realfile = targetfile + len;
5201 if (targetfile[len - 1] != '/')
5202 (void) sm_strlcat(targetfile, "/", sizeof(targetfile));
5203 if (*filename == '/')
5204 (void) sm_strlcat(targetfile, filename + 1,
5205 sizeof(targetfile));
5207 (void) sm_strlcat(targetfile, filename,
5208 sizeof(targetfile));
5212 if (sm_strlcpy(targetfile, filename, sizeof(targetfile)) >=
5215 syserr("mailfile: filename too long (%s)", filename);
5216 return EX_CANTCREAT;
5218 realfile = targetfile;
5222 ** Fork so we can change permissions here.
5223 ** Note that we MUST use fork, not vfork, because of
5224 ** the complications of calling subroutines, etc.
5229 ** Dispose of SIGCHLD signal catchers that may be laying
5230 ** around so that the waitfor() below will get it.
5233 (void) sm_signal(SIGCHLD, SIG_DFL);
5241 /* child -- actually write to file */
5245 volatile int oflags = O_WRONLY|O_APPEND;
5247 /* Reset global flags */
5248 RestartRequest = NULL;
5249 RestartWorkGroup = false;
5250 ShutdownRequest = NULL;
5252 CurrentPid = getpid();
5254 if (e->e_lockfp != NULL)
5258 fd = sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD, NULL);
5259 /* SM_ASSERT(fd >= 0); */
5264 (void) sm_signal(SIGINT, SIG_DFL);
5265 (void) sm_signal(SIGHUP, SIG_DFL);
5266 (void) sm_signal(SIGTERM, SIG_DFL);
5267 (void) umask(OldUmask);
5271 if (setjmp(CtxMailfileTimeout) != 0)
5273 RETURN(EX_TEMPFAIL);
5276 if (TimeOuts.to_fileopen > 0)
5277 ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5282 /* check file mode to see if set-user-ID */
5283 if (stat(targetfile, &stb) < 0)
5288 /* limit the errors to those actually caused in the child */
5292 /* Allow alias expansions to use the S_IS{U,G}ID bits */
5293 if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5294 bitset(SFF_RUNASREALUID, sfflags))
5296 /* ignore set-user-ID and set-group-ID bits */
5297 mode &= ~(S_ISGID|S_ISUID);
5299 sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5302 /* we have to open the data file BEFORE setuid() */
5303 if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5305 char *df = queuename(e, DATAFL_LETTER);
5307 e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5308 SM_IO_RDONLY_B, NULL);
5309 if (e->e_dfp == NULL)
5311 syserr("mailfile: Cannot open %s for %s from %s",
5312 df, e->e_to, e->e_from.q_paddr);
5316 /* select a new user to run as */
5317 if (!bitset(SFF_RUNASREALUID, sfflags))
5319 if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5321 RealUserName = NULL;
5322 if (mailer->m_uid == NO_UID)
5325 RealUid = mailer->m_uid;
5326 if (RunAsUid != 0 && RealUid != RunAsUid)
5328 /* Only root can change the uid */
5329 syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5330 (int) RunAsUid, (int) RealUid);
5331 RETURN(EX_TEMPFAIL);
5334 else if (bitset(S_ISUID, mode))
5336 RealUserName = NULL;
5337 RealUid = stb.st_uid;
5339 else if (ctladdr != NULL && ctladdr->q_uid != 0)
5341 if (ctladdr->q_ruser != NULL)
5342 RealUserName = ctladdr->q_ruser;
5344 RealUserName = ctladdr->q_user;
5345 RealUid = ctladdr->q_uid;
5347 else if (mailer != NULL && mailer->m_uid != NO_UID)
5349 RealUserName = DefUser;
5350 RealUid = mailer->m_uid;
5354 RealUserName = DefUser;
5358 /* select a new group to run as */
5359 if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5361 if (mailer->m_gid == NO_GID)
5364 RealGid = mailer->m_gid;
5365 if (RunAsUid != 0 &&
5366 (RealGid != getgid() ||
5367 RealGid != getegid()))
5369 /* Only root can change the gid */
5370 syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5371 (int) RealGid, (int) RunAsUid,
5372 (int) getgid(), (int) getegid());
5373 RETURN(EX_TEMPFAIL);
5376 else if (bitset(S_ISGID, mode))
5377 RealGid = stb.st_gid;
5378 else if (ctladdr != NULL &&
5379 ctladdr->q_uid == DefUid &&
5380 ctladdr->q_gid == 0)
5383 ** Special case: This means it is an
5384 ** alias and we should act as DefaultUser.
5385 ** See alias()'s comments.
5389 RealUserName = DefUser;
5391 else if (ctladdr != NULL && ctladdr->q_uid != 0)
5392 RealGid = ctladdr->q_gid;
5393 else if (mailer != NULL && mailer->m_gid != NO_GID)
5394 RealGid = mailer->m_gid;
5400 if (!bitset(SFF_ROOTOK, sfflags))
5408 /* set group id list (needs /etc/group access) */
5409 if (RealUserName != NULL && !DontInitGroups)
5411 if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5413 syserr("mailfile: initgroups(%s, %d) failed",
5414 RealUserName, RealGid);
5415 RETURN(EX_TEMPFAIL);
5422 gidset[0] = RealGid;
5423 if (setgroups(1, gidset) == -1 && suidwarn)
5425 syserr("mailfile: setgroups() failed");
5426 RETURN(EX_TEMPFAIL);
5431 ** If you have a safe environment, go into it.
5434 if (realfile != targetfile)
5441 sm_dprintf("mailfile: chroot %s\n", targetfile);
5442 if (chroot(targetfile) < 0)
5444 syserr("mailfile: Cannot chroot(%s)",
5446 RETURN(EX_CANTCREAT);
5452 sm_dprintf("mailfile: deliver to %s\n", realfile);
5456 syserr("mailfile: cannot chdir(/)");
5457 RETURN(EX_CANTCREAT);
5460 /* now reset the group and user ids */
5462 sm_mbdb_terminate();
5463 if (setgid(RealGid) < 0 && suidwarn)
5465 syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5466 RETURN(EX_TEMPFAIL);
5468 vendor_set_uid(RealUid);
5469 if (setuid(RealUid) < 0 && suidwarn)
5471 syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5472 RETURN(EX_TEMPFAIL);
5476 sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5477 (int) getuid(), (int) geteuid(),
5478 (int) getgid(), (int) getegid());
5481 /* move into some "safe" directory */
5482 if (mailer->m_execdir != NULL)
5486 for (p = mailer->m_execdir; p != NULL; p = q)
5491 expand(p, buf, sizeof(buf), e);
5495 sm_dprintf("mailfile: trydir %s\n",
5497 if (buf[0] != '\0' && chdir(buf) >= 0)
5503 ** Recheck the file after we have assumed the ID of the
5504 ** delivery user to make sure we can deliver to it as
5505 ** that user. This is necessary if sendmail is running
5506 ** as root and the file is on an NFS mount which treats
5511 if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5512 err = stat(realfile, &stb);
5514 err = lstat(realfile, &stb);
5515 #else /* HASLSTAT */
5516 err = stat(realfile, &stb);
5517 #endif /* HASLSTAT */
5521 stb.st_mode = ST_MODE_NOFILE;
5523 oflags |= O_CREAT|O_EXCL;
5525 else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5526 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5527 DontBlameSendmail) &&
5528 stb.st_nlink != 1) ||
5529 (realfile != targetfile && !S_ISREG(mode)))
5534 if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5535 sfflags |= SFF_NOSLINK;
5536 if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5537 sfflags |= SFF_NOHLINK;
5538 sfflags &= ~SFF_OPENASROOT;
5539 f = safefopen(realfile, oflags, mode, sfflags);
5542 if (transienterror(errno))
5544 usrerr("454 4.3.0 cannot open %s: %s",
5545 shortenstring(realfile, MAXSHORTSTR),
5546 sm_errstring(errno));
5547 RETURN(EX_TEMPFAIL);
5551 usrerr("554 5.3.0 cannot open %s: %s",
5552 shortenstring(realfile, MAXSHORTSTR),
5553 sm_errstring(errno));
5554 RETURN(EX_CANTCREAT);
5557 if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5560 syserr("554 5.3.0 file changed after open");
5561 RETURN(EX_CANTCREAT);
5563 if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5565 syserr("554 5.3.0 cannot fstat %s",
5566 sm_errstring(errno));
5567 RETURN(EX_CANTCREAT);
5570 curoff = stb.st_size;
5575 memset(&mcibuf, '\0', sizeof(mcibuf));
5576 mcibuf.mci_mailer = mailer;
5578 if (bitnset(M_7BITS, mailer->m_flags))
5579 mcibuf.mci_flags |= MCIF_7BIT;
5581 /* clear out per-message flags from connection structure */
5582 mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5584 if (bitset(EF_HAS8BIT, e->e_flags) &&
5585 !bitset(EF_DONT_MIME, e->e_flags) &&
5586 bitnset(M_7BITS, mailer->m_flags))
5587 mcibuf.mci_flags |= MCIF_CVT8TO7;
5590 if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5591 !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5592 (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5593 (sm_strcasecmp(p, "quoted-printable") == 0 ||
5594 sm_strcasecmp(p, "base64") == 0) &&
5595 (p = hvalue("Content-Type", e->e_header)) != NULL)
5597 /* may want to convert 7 -> 8 */
5598 /* XXX should really parse it here -- and use a class XXX */
5599 if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5600 (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5601 mcibuf.mci_flags |= MCIF_CVT7TO8;
5603 #endif /* MIME7TO8 */
5605 if (!putfromline(&mcibuf, e) ||
5606 !(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER) ||
5607 !(*e->e_putbody)(&mcibuf, e, NULL) ||
5608 !putline("\n", &mcibuf) ||
5609 (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5610 (SuperSafe != SAFE_NO &&
5611 fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5616 (void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5618 #endif /* !NOFTRUNCATE */
5621 /* reset ISUID & ISGID bits for paranoid systems */
5623 (void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5625 #else /* HASFCHMOD */
5626 (void) chmod(filename, (MODE_T) mode);
5627 #endif /* HASFCHMOD */
5628 if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5630 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5631 (void) setuid(RealUid);
5637 /* parent -- wait for exit status */
5643 syserr("mailfile: %s: wait", mailer->m_name);
5649 return (WEXITSTATUS(st));
5653 syserr("mailfile: %s: child died on signal %d",
5654 mailer->m_name, st);
5655 return EX_UNAVAILABLE;
5659 return EX_UNAVAILABLE; /* avoid compiler warning on IRIX */
5663 mailfiletimeout(ignore)
5667 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
5668 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5673 longjmp(CtxMailfileTimeout, 1);
5676 ** HOSTSIGNATURE -- return the "signature" for a host.
5678 ** The signature describes how we are going to send this -- it
5679 ** can be just the hostname (for non-Internet hosts) or can be
5680 ** an ordered list of MX hosts.
5683 ** m -- the mailer describing this host.
5684 ** host -- the host name.
5687 ** The signature for this host.
5690 ** Can tweak the symbol table.
5693 #define MAXHOSTSIGNATURE 8192 /* max len of hostsignature */
5696 hostsignature(m, host)
5712 int oldoptions = _res.options;
5713 char *mxhosts[MAXMXHOSTS + 1];
5714 unsigned short mxprefs[MAXMXHOSTS + 1];
5715 #endif /* NAMED_BIND */
5718 sm_dprintf("hostsignature(%s)\n", host);
5721 ** If local delivery (and not remote), just return a constant.
5724 if (bitnset(M_LOCALMAILER, m->m_flags) &&
5725 strcmp(m->m_mailer, "[IPC]") != 0 &&
5726 !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5729 /* an empty host does not have MX records */
5734 ** Check to see if this uses IPC -- if not, it can't have MX records.
5737 if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5738 CurEnv->e_sendmode == SM_DEFER)
5740 /* just an ordinary mailer or deferred mode */
5744 else if (m->m_argv[0] != NULL &&
5745 strcmp(m->m_argv[0], "FILE") == 0)
5747 /* rendezvous in the file system, no MX records */
5750 #endif /* NETUNIX */
5753 ** Look it up in the symbol table.
5757 s = stab(host, ST_HOSTSIG, ST_ENTER);
5758 if (s->s_hostsig.hs_sig != NULL)
5760 if (s->s_hostsig.hs_exp >= now)
5763 sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5764 s->s_hostsig.hs_sig);
5765 return s->s_hostsig.hs_sig;
5768 /* signature is expired: clear it */
5769 sm_free(s->s_hostsig.hs_sig);
5770 s->s_hostsig.hs_sig = NULL;
5773 /* set default TTL */
5774 s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5777 ** Not already there or expired -- create a signature.
5781 if (ConfigLevel < 2)
5782 _res.options &= ~(RES_DEFNAMES | RES_DNSRCH); /* XXX */
5784 for (hp = host; hp != NULL; hp = endp)
5789 endp = strchr(hp + 1, ']');
5791 endp = strpbrk(endp + 1, ":,");
5794 endp = strpbrk(hp, ":,");
5795 #else /* NETINET6 */
5796 endp = strpbrk(hp, ":,");
5797 #endif /* NETINET6 */
5804 if (bitnset(M_NOMX, m->m_flags))
5806 /* skip MX lookups */
5815 nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5822 /* update the connection info for this host */
5824 mci = mci_get(hp, m);
5825 mci->mci_errno = save_errno;
5826 mci->mci_herrno = h_errno;
5827 mci->mci_lastuse = now;
5828 if (rcode == EX_NOHOST)
5829 mci_setstat(mci, rcode, "5.1.2",
5830 "550 Host unknown");
5832 mci_setstat(mci, rcode, NULL, NULL);
5834 /* use the original host name as signature */
5839 sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5843 ** Set new TTL: we use only one!
5844 ** We could try to use the minimum instead.
5847 s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5851 for (i = 0; i < nmx; i++)
5852 len += strlen(mxhosts[i]) + 1;
5853 if (s->s_hostsig.hs_sig != NULL)
5854 len += strlen(s->s_hostsig.hs_sig) + 1;
5855 if (len < 0 || len >= MAXHOSTSIGNATURE)
5857 sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5858 host, MAXHOSTSIGNATURE, len);
5859 len = MAXHOSTSIGNATURE;
5861 p = sm_pmalloc_x(len);
5862 if (s->s_hostsig.hs_sig != NULL)
5864 (void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5865 sm_free(s->s_hostsig.hs_sig); /* XXX */
5866 s->s_hostsig.hs_sig = p;
5873 s->s_hostsig.hs_sig = p;
5874 for (i = 0; i < nmx; i++)
5876 hl = strlen(mxhosts[i]);
5877 if (len - 1 < hl || len <= 1)
5879 /* force to drop out of outer loop */
5885 if (mxprefs[i] == mxprefs[i - 1])
5891 (void) sm_strlcpy(p, mxhosts[i], len);
5897 ** break out of loop if len exceeded MAXHOSTSIGNATURE
5898 ** because we won't have more space for further hosts
5899 ** anyway (separated by : in the .cf file).
5908 makelower(s->s_hostsig.hs_sig);
5909 if (ConfigLevel < 2)
5910 _res.options = oldoptions;
5911 #else /* NAMED_BIND */
5912 /* not using BIND -- the signature is just the host name */
5914 ** 'host' points to storage that will be freed after we are
5915 ** done processing the current envelope, so we copy it.
5917 s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5918 #endif /* NAMED_BIND */
5920 sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5921 return s->s_hostsig.hs_sig;
5924 ** PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5926 ** The signature describes how we are going to send this -- it
5927 ** can be just the hostname (for non-Internet hosts) or can be
5928 ** an ordered list of MX hosts which must be randomized for equal
5929 ** MX preference values.
5932 ** sig -- the host signature.
5933 ** mxhosts -- array to populate.
5934 ** mailer -- mailer.
5937 ** The number of hosts inserted into mxhosts array.
5940 ** Randomizes equal MX preference hosts in mxhosts.
5944 parse_hostsignature(sig, mxhosts, mailer)
5949 unsigned short curpref = 0;
5950 int nmx = 0, i, j; /* NOTE: i, j, and nmx must have same type */
5952 unsigned short prefer[MAXMXHOSTS];
5953 long rndm[MAXMXHOSTS];
5955 for (hp = sig; hp != NULL; hp = endp)
5962 endp = strchr(hp + 1, ']');
5964 endp = strpbrk(endp + 1, ":,");
5967 endp = strpbrk(hp, ":,");
5968 #else /* NETINET6 */
5969 endp = strpbrk(hp, ":,");
5970 #endif /* NETINET6 */
5978 prefer[nmx] = curpref;
5979 if (mci_match(hp, mailer))
5982 rndm[nmx] = get_random();
5987 ** Since we don't have the original MX prefs,
5988 ** make our own. If the separator is a ':', that
5989 ** means the preference for the next host will be
5990 ** higher than this one, so simply increment curpref.
5998 if (++nmx >= MAXMXHOSTS)
6002 /* sort the records using the random factor for equal preferences */
6003 for (i = 0; i < nmx; i++)
6005 for (j = i + 1; j < nmx; j++)
6008 ** List is already sorted by MX preference, only
6009 ** need to look for equal preference MX records
6012 if (prefer[i] < prefer[j])
6015 if (prefer[i] > prefer[j] ||
6016 (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
6018 register unsigned short tempp;
6019 register long tempr;
6020 register char *temp1;
6023 prefer[i] = prefer[j];
6026 mxhosts[i] = mxhosts[j];
6038 static SSL_CTX *clt_ctx = NULL;
6039 static bool tls_ok_clt = true;
6042 ** SETCLTTLS -- client side TLS: allow/disallow.
6045 ** tls_ok -- should tls be done?
6051 ** sets tls_ok_clt (static variable in this module)
6058 tls_ok_clt = tls_ok;
6062 ** INITCLTTLS -- initialize client side TLS
6065 ** tls_ok -- should tls initialization be done?
6071 ** sets tls_ok_clt (static variable in this module)
6080 tls_ok_clt = tls_ok;
6083 if (clt_ctx != NULL)
6084 return true; /* already done */
6085 tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, Clt_SSL_Options, false,
6086 CltCertFile, CltKeyFile,
6087 CACertPath, CACertFile, DHParams);
6092 ** STARTTLS -- try to start secure connection (client side)
6096 ** mci -- the mailer connection info.
6097 ** e -- the envelope.
6101 ** (maybe this should be some other code than EX_
6102 ** that denotes which stage failed.)
6114 SSL *clt_ssl = NULL;
6117 if (clt_ctx == NULL && !initclttls(true))
6120 # if USE_OPENSSL_ENGINE
6121 if (!SSLEngineInitialized && !SSL_set_engine(NULL))
6123 sm_syslog(LOG_ERR, NOQID,
6124 "STARTTLS=client, SSL_set_engine=failed");
6127 SSLEngineInitialized = true;
6128 # endif /* USE_OPENSSL_ENGINE */
6130 smtpmessage("STARTTLS", m, mci);
6133 smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6136 /* check return code from server */
6137 if (REPLYTYPE(smtpresult) == 4)
6139 if (smtpresult == 501)
6141 if (smtpresult == -1)
6144 /* not an expected reply but we have to deal with it */
6145 if (REPLYTYPE(smtpresult) == 5)
6146 return EX_UNAVAILABLE;
6147 if (smtpresult != 220)
6151 sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6153 /* start connection */
6154 if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6158 sm_syslog(LOG_ERR, NOQID,
6159 "STARTTLS=client, error: SSL_new failed");
6161 tlslogerr("client");
6166 rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6167 wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6169 /* SSL_clear(clt_ssl); ? */
6170 if (rfd < 0 || wfd < 0 ||
6171 (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6172 (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6176 sm_syslog(LOG_ERR, NOQID,
6177 "STARTTLS=client, error: SSL_set_xfd failed=%d",
6180 tlslogerr("client");
6184 SSL_set_connect_state(clt_ssl);
6185 tlsstart = curtime();
6188 if ((result = SSL_connect(clt_ssl)) <= 0)
6192 ssl_err = SSL_get_error(clt_ssl, result);
6193 i = tls_retry(clt_ssl, rfd, wfd, tlsstart,
6194 TimeOuts.to_starttls, ssl_err, "client");
6200 sm_syslog(LOG_WARNING, NOQID,
6201 "STARTTLS=client, error: connect failed=%d, SSL_error=%d, errno=%d, retry=%d",
6202 result, ssl_err, errno, i);
6204 tlslogerr("client");
6211 mci->mci_ssl = clt_ssl;
6212 result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6213 &mci->mci_macro, true);
6215 /* switch to use TLS... */
6216 if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6225 ** ENDTLSCLT -- shutdown secure connection (client side)
6228 ** mci -- the mailer connection info.
6240 if (!bitset(MCIF_TLSACT, mci->mci_flags))
6242 r = endtls(mci->mci_ssl, "client");
6243 mci->mci_flags &= ~MCIF_TLSACT;
6246 # endif /* STARTTLS */
6247 # if STARTTLS || SASL
6249 ** ISCLTFLGSET -- check whether client flag is set.
6253 ** flag -- flag to check in {client_flags}
6256 ** true iff flag is set.
6260 iscltflgset(e, flag)
6266 p = macvalue(macid("{client_flags}"), e);
6269 for (; *p != '\0'; p++)
6271 /* look for just this one flag */
6272 if (*p == (char) flag)
6277 # endif /* STARTTLS || SASL */