1 /*
2 * Copyright (c) 1998-2006, 2008, 2009, 2011 Proofpoint, Inc. and its suppliers.
3 * All rights reserved.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.
5 * Copyright (c) 1988, 1993
6 * The Regents of the University of California. All rights reserved.
7 *
8 * By using this file, you agree to the terms and conditions set
9 * forth in the LICENSE file which can be found at the top level of
10 * the sendmail distribution.
11 *
12 */
13
14 #define _DEFINE
15 #include <sendmail.h>
16 #include <sm/sendmail.h>
17 #include <sm/xtrap.h>
18 #include <sm/signal.h>
19 #include <tls.h>
20
21 #ifndef lint
22 SM_UNUSED(static char copyright[]) =
23 "@(#) Copyright (c) 1998-2013 Proofpoint, Inc. and its suppliers.\n\
24 All rights reserved.\n\
25 Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.\n\
26 Copyright (c) 1988, 1993\n\
27 The Regents of the University of California. All rights reserved.\n";
28 #endif /* ! lint */
29
30 SM_RCSID("@(#)$Id: main.c,v 8.988 2013-11-23 02:52:37 gshapiro Exp $")
31
32
33 #if NETINET || NETINET6
34 # include <arpa/inet.h>
35 # if DANE
36 # include "sm_resolve.h"
37 # endif
38 #endif
39
40 /* for getcfname() */
41 #include <sendmail/pathnames.h>
42 #include <ratectrl.h>
43
44 static SM_DEBUG_T
45 DebugNoPRestart = SM_DEBUG_INITIALIZER("no_persistent_restart",
46 "@(#)$Debug: no_persistent_restart - don't restart, log only $");
47
48 static void dump_class __P((STAB *, int));
49 static void obsolete __P((char **));
50 static void testmodeline __P((char *, ENVELOPE *));
51 static char *getextenv __P((const char *));
52 static void sm_printoptions __P((char **));
53 static SIGFUNC_DECL intindebug __P((int));
54 static SIGFUNC_DECL sighup __P((int));
55 static SIGFUNC_DECL sigpipe __P((int));
56 static SIGFUNC_DECL sigterm __P((int));
57 #ifdef SIGUSR1
58 static SIGFUNC_DECL sigusr1 __P((int));
59 #endif
60
61 /*
62 ** SENDMAIL -- Post mail to a set of destinations.
63 **
64 ** This is the basic mail router. All user mail programs should
65 ** call this routine to actually deliver mail. Sendmail in
66 ** turn calls a bunch of mail servers that do the real work of
67 ** delivering the mail.
68 **
69 ** Sendmail is driven by settings read in from /etc/mail/sendmail.cf
70 ** (read by readcf.c).
71 **
72 ** Usage:
73 ** /usr/lib/sendmail [flags] addr ...
74 **
75 ** See the associated documentation for details.
76 **
77 ** Authors:
78 ** Eric Allman, UCB/INGRES (until 10/81).
79 ** Britton-Lee, Inc., purveyors of fine
80 ** database computers (11/81 - 10/88).
81 ** International Computer Science Institute
82 ** (11/88 - 9/89).
83 ** UCB/Mammoth Project (10/89 - 7/95).
84 ** InReference, Inc. (8/95 - 1/97).
85 ** Sendmail, Inc. (1/98 - 9/13).
86 ** The support of my employers is gratefully acknowledged.
87 ** Few of them (Britton-Lee in particular) have had
88 ** anything to gain from my involvement in this project.
89 **
90 ** Gregory Neil Shapiro,
91 ** Worcester Polytechnic Institute (until 3/98).
92 ** Sendmail, Inc. (3/98 - 10/13).
93 ** Proofpoint, Inc. (10/13 - present).
94 **
95 ** Claus Assmann,
96 ** Sendmail, Inc. (12/98 - 10/13).
97 ** Proofpoint, Inc. (10/13 - present).
98 */
99
100 char *FullName; /* sender's full name */
101 ENVELOPE BlankEnvelope; /* a "blank" envelope */
102 static ENVELOPE MainEnvelope; /* the envelope around the basic letter */
103 ADDRESS NullAddress = /* a null address */
104 { "", "", NULL, "" };
105 char *CommandLineArgs; /* command line args for pid file */
106 bool Warn_Q_option = false; /* warn about Q option use */
107 static int MissingFds = 0; /* bit map of fds missing on startup */
108 char *Mbdb = "pw"; /* mailbox database defaults to /etc/passwd */
109
110 #ifdef NGROUPS_MAX
111 GIDSET_T InitialGidSet[NGROUPS_MAX];
112 #endif
113
114 #define MAXCONFIGLEVEL 10 /* highest config version level known */
115
116 #if SASL
117 static sasl_callback_t srvcallbacks[] =
118 {
119 { SASL_CB_VERIFYFILE, (sasl_callback_ft)&safesaslfile, NULL },
120 { SASL_CB_PROXY_POLICY, (sasl_callback_ft)&proxy_policy, NULL },
121 { SASL_CB_LIST_END, NULL, NULL }
122 };
123 #endif /* SASL */
124
125 unsigned int SubmitMode;
126 int SyslogPrefixLen; /* estimated length of syslog prefix */
127 #define PIDLEN 6 /* pid length for computing SyslogPrefixLen */
128 #ifndef SL_FUDGE
129 # define SL_FUDGE 10 /* fudge offset for SyslogPrefixLen */
130 #endif
131 #define SLDLL 8 /* est. length of default syslog label */
132
133
134 /* Some options are dangerous to allow users to use in non-submit mode */
135 #define CHECK_AGAINST_OPMODE(cmd) \
136 { \
137 if (extraprivs && \
138 OpMode != MD_DELIVER && OpMode != MD_SMTP && \
139 OpMode != MD_ARPAFTP && OpMode != MD_CHECKCONFIG && \
140 OpMode != MD_VERIFY && OpMode != MD_TEST) \
141 { \
142 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, \
143 "WARNING: Ignoring submission mode -%c option (not in submission mode)\n", \
144 (cmd)); \
145 break; \
146 } \
147 if (extraprivs && queuerun) \
148 { \
149 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, \
150 "WARNING: Ignoring submission mode -%c option with -q\n", \
151 (cmd)); \
152 break; \
153 } \
154 }
155
156 int
main(argc,argv,envp)157 main(argc, argv, envp)
158 int argc;
159 char **argv;
160 char **envp;
161 {
162 register char *p;
163 char **av;
164 extern char Version[];
165 char *ep, *from;
166 STAB *st;
167 register int i;
168 int j;
169 int dp;
170 int fill_errno;
171 int qgrp = NOQGRP; /* queue group to process */
172 bool safecf = true;
173 BITMAP256 *p_flags = NULL; /* daemon flags */
174 bool warn_C_flag = false;
175 bool auth = true; /* whether to set e_auth_param */
176 char warn_f_flag = '\0';
177 bool run_in_foreground = false; /* -bD mode */
178 bool queuerun = false, debug = false;
179 struct passwd *pw;
180 struct hostent *hp;
181 char *nullserver = NULL;
182 char *authinfo = NULL;
183 char *sysloglabel = NULL; /* label for syslog */
184 char *conffile = NULL; /* name of .cf file */
185 char *queuegroup = NULL; /* queue group to process */
186 char *quarantining = NULL; /* quarantine queue items? */
187 bool extraprivs;
188 bool forged, negate;
189 bool queuepersistent = false; /* queue runner process runs forever */
190 bool foregroundqueue = false; /* queue run in foreground */
191 bool save_val; /* to save some bool var. */
192 int cftype; /* which cf file to use? */
193 SM_FILE_T *smdebug;
194 static time_t starttime = 0; /* when was process started */
195 struct stat traf_st; /* for TrafficLog FIFO check */
196 char buf[MAXLINE];
197 char jbuf[MAXHOSTNAMELEN]; /* holds MyHostName */
198 static char rnamebuf[MAXNAME]; /* holds RealUserName */
199 char *emptyenviron[1];
200 #if STARTTLS
201 bool tls_ok;
202 #endif
203 QUEUE_CHAR *new;
204 ENVELOPE *e;
205 extern int DtableSize;
206 extern int optind;
207 extern int opterr;
208 extern char *optarg;
209 extern char **environ;
210 #if SASL
211 extern void sm_sasl_init __P((void));
212 #endif
213
214 #if USE_ENVIRON
215 envp = environ;
216 #endif
217
218 /* turn off profiling */
219 SM_PROF(0);
220
221 /* install default exception handler */
222 sm_exc_newthread(fatal_error);
223
224 /* set the default in/out channel so errors reported to screen */
225 InChannel = smioin;
226 OutChannel = smioout;
227
228 /*
229 ** Check to see if we reentered.
230 ** This would normally happen if e_putheader or e_putbody
231 ** were NULL when invoked.
232 */
233
234 if (starttime != 0)
235 {
236 syserr("main: reentered!");
237 abort();
238 }
239 starttime = curtime();
240
241 /* avoid null pointer dereferences */
242 TermEscape.te_rv_on = TermEscape.te_under_on = TermEscape.te_normal = "";
243
244 RealUid = getuid();
245 RealGid = getgid();
246
247 /* Check if sendmail is running with extra privs */
248 extraprivs = (RealUid != 0 &&
249 (geteuid() != getuid() || getegid() != getgid()));
250
251 CurrentPid = getpid();
252
253 /* get whatever .cf file is right for the opmode */
254 cftype = SM_GET_RIGHT_CF;
255
256 /* in 4.4BSD, the table can be huge; impose a reasonable limit */
257 DtableSize = getdtsize();
258 if (DtableSize > 256)
259 DtableSize = 256;
260
261 /*
262 ** Be sure we have enough file descriptors.
263 ** But also be sure that 0, 1, & 2 are open.
264 */
265
266 /* reset errno and fill_errno; the latter is used way down below */
267 errno = fill_errno = 0;
268 fill_fd(STDIN_FILENO, NULL);
269 if (errno != 0)
270 fill_errno = errno;
271 fill_fd(STDOUT_FILENO, NULL);
272 if (errno != 0)
273 fill_errno = errno;
274 fill_fd(STDERR_FILENO, NULL);
275 if (errno != 0)
276 fill_errno = errno;
277
278 sm_closefrom(STDERR_FILENO + 1, DtableSize);
279 errno = 0;
280 smdebug = NULL;
281
282 #if LOG
283 # ifndef SM_LOG_STR
284 # define SM_LOG_STR "sendmail"
285 # endif
286 # ifdef LOG_MAIL
287 openlog(SM_LOG_STR, LOG_PID, LOG_MAIL);
288 # else
289 openlog(SM_LOG_STR, LOG_PID);
290 # endif
291 #endif /* LOG */
292
293 /*
294 ** Seed the random number generator.
295 ** Used for queue file names, picking a queue directory, and
296 ** MX randomization.
297 */
298
299 seed_random();
300
301 /* do machine-dependent initializations */
302 init_md(argc, argv);
303
304
305 SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) + SL_FUDGE + SLDLL;
306
307 /* reset status from syserr() calls for missing file descriptors */
308 Errors = 0;
309 ExitStat = EX_OK;
310
311 SubmitMode = SUBMIT_UNKNOWN;
312 #if _FFR_LOCAL_DAEMON
313 LocalDaemon = false;
314 # if NETINET6
315 V6LoopbackAddrFound = false;
316 # endif
317 #endif
318 #if XDEBUG
319 checkfd012("after openlog");
320 #endif
321
322 tTsetup(tTdvect, sizeof(tTdvect), "0-99.1,*_trace_*.1");
323
324 #ifdef NGROUPS_MAX
325 /* save initial group set for future checks */
326 i = getgroups(NGROUPS_MAX, InitialGidSet);
327 if (i <= 0)
328 {
329 InitialGidSet[0] = (GID_T) -1;
330 i = 0;
331 }
332 while (i < NGROUPS_MAX)
333 InitialGidSet[i++] = InitialGidSet[0];
334 #endif /* NGROUPS_MAX */
335
336 /* drop group id privileges (RunAsUser not yet set) */
337 dp = drop_privileges(false);
338 setstat(dp);
339
340 #ifdef SIGUSR1
341 /* Only allow root (or non-set-*-ID binaries) to use SIGUSR1 */
342 if (!extraprivs)
343 {
344 /* arrange to dump state on user-1 signal */
345 (void) sm_signal(SIGUSR1, sigusr1);
346 }
347 else
348 {
349 /* ignore user-1 signal */
350 (void) sm_signal(SIGUSR1, SIG_IGN);
351 }
352 #endif /* SIGUSR1 */
353
354 /* initialize for setproctitle */
355 initsetproctitle(argc, argv, envp);
356
357 /* Handle any non-getoptable constructions. */
358 obsolete(argv);
359
360 /*
361 ** Do a quick prescan of the argument list.
362 */
363
364
365 /* find initial opMode */
366 OpMode = MD_DELIVER;
367 av = argv;
368 p = strrchr(*av, '/');
369 if (p++ == NULL)
370 p = *av;
371 if (strcmp(p, "newaliases") == 0)
372 OpMode = MD_INITALIAS;
373 else if (strcmp(p, "mailq") == 0)
374 OpMode = MD_PRINT;
375 else if (strcmp(p, "smtpd") == 0)
376 OpMode = MD_DAEMON;
377 else if (strcmp(p, "hoststat") == 0)
378 OpMode = MD_HOSTSTAT;
379 else if (strcmp(p, "purgestat") == 0)
380 OpMode = MD_PURGESTAT;
381
382 #if defined(__osf__) || defined(_AIX3)
383 # define OPTIONS "A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:x"
384 #endif /* defined(__osf__) || defined(_AIX3) */
385 #if defined(sony_news)
386 # define OPTIONS "A:B:b:C:cD:d:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
387 #endif /* defined(sony_news) */
388 #ifndef OPTIONS
389 # define OPTIONS "A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
390 #endif
391
392 /* Set to 0 to allow -b; need to check optarg before using it! */
393 opterr = 0;
394 while ((j = getopt(argc, argv, OPTIONS)) != -1)
395 {
396 switch (j)
397 {
398 case 'b': /* operations mode */
399 j = (optarg == NULL) ? ' ' : *optarg;
400 switch (j)
401 {
402 case MD_DAEMON:
403 case MD_FGDAEMON:
404 case MD_SMTP:
405 case MD_INITALIAS:
406 case MD_DELIVER:
407 case MD_VERIFY:
408 case MD_TEST:
409 case MD_PRINT:
410 case MD_PRINTNQE:
411 case MD_HOSTSTAT:
412 case MD_PURGESTAT:
413 case MD_ARPAFTP:
414 case MD_CHECKCONFIG:
415 OpMode = j;
416 break;
417
418 #if _FFR_LOCAL_DAEMON
419 case MD_LOCAL:
420 OpMode = MD_DAEMON;
421 LocalDaemon = true;
422 break;
423 #endif /* _FFR_LOCAL_DAEMON */
424
425 case MD_FREEZE:
426 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
427 "Frozen configurations unsupported\n");
428 return EX_USAGE;
429
430 default:
431 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
432 "Invalid operation mode %c\n",
433 j);
434 return EX_USAGE;
435 }
436 break;
437
438 case 'D':
439 if (debug)
440 {
441 errno = 0;
442 syserr("-D file must be before -d");
443 ExitStat = EX_USAGE;
444 break;
445 }
446 dp = drop_privileges(true);
447 setstat(dp);
448 smdebug = sm_io_open(SmFtStdio, SM_TIME_DEFAULT,
449 optarg, SM_IO_APPEND, NULL);
450 if (smdebug == NULL)
451 {
452 syserr("cannot open %s", optarg);
453 ExitStat = EX_CANTCREAT;
454 break;
455 }
456 sm_debug_setfile(smdebug);
457 break;
458
459 case 'd':
460 debug = true;
461 tTflag(optarg);
462 (void) sm_io_setvbuf(sm_debug_file(), SM_TIME_DEFAULT,
463 (char *) NULL, SM_IO_NBF,
464 SM_IO_BUFSIZ);
465 break;
466
467 case 'G': /* relay (gateway) submission */
468 SubmitMode = SUBMIT_MTA;
469 break;
470
471 case 'L':
472 if (optarg == NULL)
473 {
474 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
475 "option requires an argument -- '%c'",
476 (char) j);
477 return EX_USAGE;
478 }
479 j = SM_MIN(strlen(optarg), 32) + 1;
480 sysloglabel = xalloc(j);
481 (void) sm_strlcpy(sysloglabel, optarg, j);
482 SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) +
483 SL_FUDGE + j;
484 break;
485
486 case 'Q':
487 case 'q':
488 /* just check if it is there */
489 queuerun = true;
490 break;
491 }
492 }
493 opterr = 1;
494
495 /* Don't leak queue information via debug flags */
496 if (extraprivs && queuerun && debug)
497 {
498 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
499 "WARNING: Can not use -d with -q. Disabling debugging.\n");
500 sm_debug_close();
501 sm_debug_setfile(NULL);
502 (void) memset(tTdvect, '\0', sizeof(tTdvect));
503 }
504
505 #if LOG
506 if (sysloglabel != NULL)
507 {
508 /* Sanitize the string */
509 for (p = sysloglabel; *p != '\0'; p++)
510 {
511 if (!isascii(*p) || !isprint(*p) || *p == '%')
512 *p = '*';
513 }
514 closelog();
515 # ifdef LOG_MAIL
516 openlog(sysloglabel, LOG_PID, LOG_MAIL);
517 # else
518 openlog(sysloglabel, LOG_PID);
519 # endif
520 }
521 #endif /* LOG */
522
523 /* set up the blank envelope */
524 BlankEnvelope.e_puthdr = putheader;
525 BlankEnvelope.e_putbody = putbody;
526 BlankEnvelope.e_xfp = NULL;
527 STRUCTCOPY(NullAddress, BlankEnvelope.e_from);
528 CurEnv = &BlankEnvelope;
529 STRUCTCOPY(NullAddress, MainEnvelope.e_from);
530
531 /*
532 ** Set default values for variables.
533 ** These cannot be in initialized data space.
534 */
535
536 setdefaults(&BlankEnvelope);
537 initmacros(&BlankEnvelope);
538
539 /* reset macro */
540 set_op_mode(OpMode);
541 if (OpMode == MD_DAEMON)
542 DaemonPid = CurrentPid; /* needed for finis() to work */
543
544 pw = sm_getpwuid(RealUid);
545 if (pw != NULL)
546 (void) sm_strlcpy(rnamebuf, pw->pw_name, sizeof(rnamebuf));
547 else
548 (void) sm_snprintf(rnamebuf, sizeof(rnamebuf), "Unknown UID %d",
549 (int) RealUid);
550
551 RealUserName = rnamebuf;
552
553 if (tTd(0, 101))
554 {
555 sm_dprintf("Version %s\n", Version);
556 finis(false, true, EX_OK);
557 /* NOTREACHED */
558 }
559
560 /*
561 ** if running non-set-user-ID binary as non-root, pretend
562 ** we are the RunAsUid
563 */
564
565 if (RealUid != 0 && geteuid() == RealUid)
566 {
567 if (tTd(47, 1))
568 sm_dprintf("Non-set-user-ID binary: RunAsUid = RealUid = %d\n",
569 (int) RealUid);
570 RunAsUid = RealUid;
571 }
572 else if (geteuid() != 0)
573 RunAsUid = geteuid();
574
575 EffGid = getegid();
576 if (RealUid != 0 && EffGid == RealGid)
577 RunAsGid = RealGid;
578
579 if (tTd(47, 5))
580 {
581 sm_dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n",
582 (int) geteuid(), (int) getuid(),
583 (int) getegid(), (int) getgid());
584 sm_dprintf("main: RunAsUser = %d:%d\n",
585 (int) RunAsUid, (int) RunAsGid);
586 }
587
588 /* save command line arguments */
589 j = 0;
590 for (av = argv; *av != NULL; )
591 j += strlen(*av++) + 1;
592 SaveArgv = (char **) xalloc(sizeof(char *) * (argc + 1));
593 CommandLineArgs = xalloc(j);
594 p = CommandLineArgs;
595 for (av = argv, i = 0; *av != NULL; )
596 {
597 int h;
598
599 SaveArgv[i++] = newstr(*av);
600 if (av != argv)
601 *p++ = ' ';
602 (void) sm_strlcpy(p, *av++, j);
603 h = strlen(p);
604 p += h;
605 j -= h + 1;
606 }
607 SaveArgv[i] = NULL;
608
609 if (tTd(0, 1))
610 {
611 extern char *CompileOptions[];
612
613 sm_dprintf("Version %s\n Compiled with:", Version);
614 sm_printoptions(CompileOptions);
615 }
616 if (tTd(0, 10))
617 {
618 extern char *OsCompileOptions[];
619
620 sm_dprintf(" OS Defines:");
621 sm_printoptions(OsCompileOptions);
622 #ifdef _PATH_UNIX
623 sm_dprintf("Kernel symbols:\t%s\n", _PATH_UNIX);
624 #endif
625
626 sm_dprintf(" Conf file:\t%s (default for MSP)\n",
627 getcfname(OpMode, SubmitMode, SM_GET_SUBMIT_CF,
628 conffile));
629 sm_dprintf(" Conf file:\t%s (default for MTA)\n",
630 getcfname(OpMode, SubmitMode, SM_GET_SENDMAIL_CF,
631 conffile));
632 sm_dprintf(" Pid file:\t%s (default)\n", PidFile);
633 }
634
635 if (tTd(0, 12))
636 {
637 extern char *SmCompileOptions[];
638
639 sm_dprintf(" libsm Defines:");
640 sm_printoptions(SmCompileOptions);
641 }
642
643 if (tTd(0, 13))
644 {
645 extern char *FFRCompileOptions[];
646
647 sm_dprintf(" FFR Defines:");
648 sm_printoptions(FFRCompileOptions);
649 }
650
651 #if STARTTLS
652 if (tTd(0, 14))
653 {
654 /* exit(EX_CONFIG) if different? */
655 sm_dprintf(" OpenSSL: compiled 0x%08x\n",
656 (uint) OPENSSL_VERSION_NUMBER);
657 sm_dprintf(" OpenSSL: linked 0x%08x\n",
658 (uint) TLS_version_num());
659 }
660 #endif /* STARTTLS */
661
662 /* clear sendmail's environment */
663 ExternalEnviron = environ;
664 emptyenviron[0] = NULL;
665 environ = emptyenviron;
666
667 /*
668 ** restore any original TZ setting until TimeZoneSpec has been
669 ** determined - or early log messages may get bogus time stamps
670 */
671
672 if ((p = getextenv("TZ")) != NULL)
673 {
674 char *tz;
675 int tzlen;
676
677 /* XXX check for reasonable length? */
678 tzlen = strlen(p) + 4;
679 tz = xalloc(tzlen);
680 (void) sm_strlcpyn(tz, tzlen, 2, "TZ=", p);
681
682 /* XXX check return code? */
683 (void) putenv(tz);
684 }
685
686 /* prime the child environment */
687 sm_setuserenv("AGENT", "sendmail");
688
689 (void) sm_signal(SIGPIPE, SIG_IGN);
690 OldUmask = umask(022);
691 FullName = getextenv("NAME");
692 if (FullName != NULL)
693 FullName = newstr(FullName);
694
695 /*
696 ** Initialize name server if it is going to be used.
697 */
698
699 #if NAMED_BIND
700 if (!bitset(RES_INIT, _res.options))
701 (void) res_init();
702 if (tTd(8, 8))
703 _res.options |= RES_DEBUG;
704 else
705 _res.options &= ~RES_DEBUG;
706 # ifdef RES_NOALIASES
707 _res.options |= RES_NOALIASES;
708 # endif
709 TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry;
710 TimeOuts.res_retry[RES_TO_FIRST] = _res.retry;
711 TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry;
712 TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans;
713 TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans;
714 TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans;
715 #endif /* NAMED_BIND */
716
717 errno = 0;
718 from = NULL;
719
720 /* initialize some macros, etc. */
721 init_vendor_macros(&BlankEnvelope);
722
723 /* version */
724 macdefine(&BlankEnvelope.e_macro, A_PERM, 'v', Version);
725
726 /* hostname */
727 hp = myhostname(jbuf, sizeof(jbuf));
728 if (jbuf[0] != '\0')
729 {
730 struct utsname utsname;
731
732 if (tTd(0, 4))
733 sm_dprintf("Canonical name: %s\n", jbuf);
734 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'w', jbuf);
735 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'j', jbuf);
736 setclass('w', jbuf);
737
738 p = strchr(jbuf, '.');
739 if (p != NULL && p[1] != '\0')
740 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'm', &p[1]);
741
742 if (uname(&utsname) >= 0)
743 p = utsname.nodename;
744 else
745 {
746 if (tTd(0, 22))
747 sm_dprintf("uname failed (%s)\n",
748 sm_errstring(errno));
749 makelower(jbuf);
750 p = jbuf;
751 }
752 if (tTd(0, 4))
753 sm_dprintf(" UUCP nodename: %s\n", p);
754 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'k', p);
755 setclass('k', p);
756 setclass('w', p);
757 }
758 if (hp != NULL)
759 {
760 for (av = hp->h_aliases; av != NULL && *av != NULL; av++)
761 {
762 if (tTd(0, 4))
763 sm_dprintf("\ta.k.a.: %s\n", *av);
764 setclass('w', *av);
765 }
766 #if NETINET || NETINET6
767 for (i = 0; i >= 0 && hp->h_addr_list[i] != NULL; i++)
768 {
769 # if NETINET6
770 char *addr;
771 char buf6[INET6_ADDRSTRLEN];
772 struct in6_addr ia6;
773 # endif /* NETINET6 */
774 # if NETINET
775 struct in_addr ia;
776 # endif
777 char ipbuf[103];
778
779 ipbuf[0] = '\0';
780 switch (hp->h_addrtype)
781 {
782 # if NETINET
783 case AF_INET:
784 if (hp->h_length != INADDRSZ)
785 break;
786
787 memmove(&ia, hp->h_addr_list[i], INADDRSZ);
788 (void) sm_snprintf(ipbuf, sizeof(ipbuf),
789 "[%.100s]", inet_ntoa(ia));
790 break;
791 # endif /* NETINET */
792
793 # if NETINET6
794 case AF_INET6:
795 if (hp->h_length != IN6ADDRSZ)
796 break;
797
798 memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ);
799 addr = anynet_ntop(&ia6, buf6, sizeof(buf6));
800 if (addr != NULL)
801 (void) sm_snprintf(ipbuf, sizeof(ipbuf),
802 "[%.100s]", addr);
803 break;
804 # endif /* NETINET6 */
805 }
806 if (ipbuf[0] == '\0')
807 break;
808
809 if (tTd(0, 4))
810 sm_dprintf("\ta.k.a.: %s\n", ipbuf);
811 setclass('w', ipbuf);
812 }
813 #endif /* NETINET || NETINET6 */
814 #if NETINET6
815 freehostent(hp);
816 hp = NULL;
817 #endif
818 }
819
820 /* current time */
821 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'b', arpadate((char *) NULL));
822
823 /* current load average */
824 sm_getla();
825
826 QueueLimitRecipient = (QUEUE_CHAR *) NULL;
827 QueueLimitSender = (QUEUE_CHAR *) NULL;
828 QueueLimitId = (QUEUE_CHAR *) NULL;
829 QueueLimitQuarantine = (QUEUE_CHAR *) NULL;
830
831 /*
832 ** Crack argv.
833 */
834
835 optind = 1;
836 while ((j = getopt(argc, argv, OPTIONS)) != -1)
837 {
838 switch (j)
839 {
840 case 'b': /* operations mode */
841 /* already done */
842 break;
843
844 case 'A': /* use Alternate sendmail/submit.cf */
845 cftype = optarg[0] == 'c' ? SM_GET_SUBMIT_CF
846 : SM_GET_SENDMAIL_CF;
847 break;
848
849 case 'B': /* body type */
850 CHECK_AGAINST_OPMODE(j);
851 BlankEnvelope.e_bodytype = newstr(optarg);
852 break;
853
854 case 'C': /* select configuration file (already done) */
855 if (RealUid != 0)
856 warn_C_flag = true;
857 conffile = newstr(optarg);
858 dp = drop_privileges(true);
859 setstat(dp);
860 safecf = false;
861 break;
862
863 case 'D':
864 case 'd': /* debugging */
865 /* already done */
866 break;
867
868 case 'f': /* from address */
869 case 'r': /* obsolete -f flag */
870 CHECK_AGAINST_OPMODE(j);
871 if (from != NULL)
872 {
873 usrerr("More than one \"from\" person");
874 ExitStat = EX_USAGE;
875 break;
876 }
877 if (optarg[0] == '\0')
878 from = newstr("<>");
879 else
880 from = newstr(denlstring(optarg, true, true));
881 if (strcmp(RealUserName, from) != 0)
882 warn_f_flag = j;
883 break;
884
885 case 'F': /* set full name */
886 CHECK_AGAINST_OPMODE(j);
887 FullName = newstr(optarg);
888 break;
889
890 case 'G': /* relay (gateway) submission */
891 /* already set */
892 CHECK_AGAINST_OPMODE(j);
893 break;
894
895 case 'h': /* hop count */
896 CHECK_AGAINST_OPMODE(j);
897 BlankEnvelope.e_hopcount = (short) strtol(optarg, &ep,
898 10);
899 (void) sm_snprintf(buf, sizeof(buf), "%d",
900 BlankEnvelope.e_hopcount);
901 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'c', buf);
902
903 if (*ep)
904 {
905 usrerr("Bad hop count (%s)", optarg);
906 ExitStat = EX_USAGE;
907 }
908 break;
909
910 case 'L': /* program label */
911 /* already set */
912 break;
913
914 case 'n': /* don't alias */
915 CHECK_AGAINST_OPMODE(j);
916 NoAlias = true;
917 break;
918
919 case 'N': /* delivery status notifications */
920 CHECK_AGAINST_OPMODE(j);
921 DefaultNotify |= QHASNOTIFY;
922 macdefine(&BlankEnvelope.e_macro, A_TEMP,
923 macid("{dsn_notify}"), optarg);
924 if (sm_strcasecmp(optarg, "never") == 0)
925 break;
926 for (p = optarg; p != NULL; optarg = p)
927 {
928 p = strchr(p, ',');
929 if (p != NULL)
930 *p++ = '\0';
931 if (sm_strcasecmp(optarg, "success") == 0)
932 DefaultNotify |= QPINGONSUCCESS;
933 else if (sm_strcasecmp(optarg, "failure") == 0)
934 DefaultNotify |= QPINGONFAILURE;
935 else if (sm_strcasecmp(optarg, "delay") == 0)
936 DefaultNotify |= QPINGONDELAY;
937 else
938 {
939 usrerr("Invalid -N argument");
940 ExitStat = EX_USAGE;
941 }
942 }
943 break;
944
945 case 'o': /* set option */
946 setoption(*optarg, optarg + 1, false, true,
947 &BlankEnvelope);
948 break;
949
950 case 'O': /* set option (long form) */
951 setoption(' ', optarg, false, true, &BlankEnvelope);
952 break;
953
954 case 'p': /* set protocol */
955 CHECK_AGAINST_OPMODE(j);
956 p = strchr(optarg, ':');
957 if (p != NULL)
958 {
959 *p++ = '\0';
960 if (*p != '\0')
961 {
962 i = strlen(p) + 1;
963 ep = sm_malloc_x(i);
964 cleanstrcpy(ep, p, i);
965 macdefine(&BlankEnvelope.e_macro,
966 A_HEAP, 's', ep);
967 }
968 }
969 if (*optarg != '\0')
970 {
971 i = strlen(optarg) + 1;
972 ep = sm_malloc_x(i);
973 cleanstrcpy(ep, optarg, i);
974 macdefine(&BlankEnvelope.e_macro, A_HEAP,
975 'r', ep);
976 }
977 break;
978
979 case 'Q': /* change quarantining on queued items */
980 /* sanity check */
981 if (OpMode != MD_DELIVER &&
982 OpMode != MD_QUEUERUN)
983 {
984 usrerr("Can not use -Q with -b%c", OpMode);
985 ExitStat = EX_USAGE;
986 break;
987 }
988
989 if (OpMode == MD_DELIVER)
990 set_op_mode(MD_QUEUERUN);
991
992 FullName = NULL;
993
994 quarantining = newstr(optarg);
995 break;
996
997 case 'q': /* run queue files at intervals */
998 /* sanity check */
999 if (OpMode != MD_DELIVER &&
1000 OpMode != MD_DAEMON &&
1001 OpMode != MD_FGDAEMON &&
1002 OpMode != MD_PRINT &&
1003 OpMode != MD_PRINTNQE &&
1004 OpMode != MD_QUEUERUN)
1005 {
1006 usrerr("Can not use -q with -b%c", OpMode);
1007 ExitStat = EX_USAGE;
1008 break;
1009 }
1010
1011 /* don't override -bd, -bD or -bp */
1012 if (OpMode == MD_DELIVER)
1013 set_op_mode(MD_QUEUERUN);
1014
1015 FullName = NULL;
1016 negate = optarg[0] == '!';
1017 if (negate)
1018 {
1019 /* negate meaning of pattern match */
1020 optarg++; /* skip '!' for next switch */
1021 }
1022
1023 switch (optarg[0])
1024 {
1025 case 'G': /* Limit by queue group name */
1026 if (negate)
1027 {
1028 usrerr("Can not use -q!G");
1029 ExitStat = EX_USAGE;
1030 break;
1031 }
1032 if (queuegroup != NULL)
1033 {
1034 usrerr("Can not use multiple -qG options");
1035 ExitStat = EX_USAGE;
1036 break;
1037 }
1038 queuegroup = newstr(&optarg[1]);
1039 break;
1040
1041 case 'I': /* Limit by ID */
1042 new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1043 new->queue_match = newstr(&optarg[1]);
1044 new->queue_negate = negate;
1045 new->queue_next = QueueLimitId;
1046 QueueLimitId = new;
1047 break;
1048
1049 case 'R': /* Limit by recipient */
1050 new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1051 new->queue_match = newstr(&optarg[1]);
1052 new->queue_negate = negate;
1053 new->queue_next = QueueLimitRecipient;
1054 QueueLimitRecipient = new;
1055 break;
1056
1057 case 'S': /* Limit by sender */
1058 new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1059 new->queue_match = newstr(&optarg[1]);
1060 new->queue_negate = negate;
1061 new->queue_next = QueueLimitSender;
1062 QueueLimitSender = new;
1063 break;
1064
1065 case 'f': /* foreground queue run */
1066 foregroundqueue = true;
1067 break;
1068
1069 case 'Q': /* Limit by quarantine message */
1070 if (optarg[1] != '\0')
1071 {
1072 new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1073 new->queue_match = newstr(&optarg[1]);
1074 new->queue_negate = negate;
1075 new->queue_next = QueueLimitQuarantine;
1076 QueueLimitQuarantine = new;
1077 }
1078 QueueMode = QM_QUARANTINE;
1079 break;
1080
1081 case 'L': /* act on lost items */
1082 QueueMode = QM_LOST;
1083 break;
1084
1085 case 'p': /* Persistent queue */
1086 queuepersistent = true;
1087 if (QueueIntvl == 0)
1088 QueueIntvl = 1;
1089 if (optarg[1] == '\0')
1090 break;
1091 ++optarg;
1092 /* FALLTHROUGH */
1093
1094 default:
1095 i = Errors;
1096 QueueIntvl = convtime(optarg, 'm');
1097 if (QueueIntvl < 0)
1098 {
1099 usrerr("Invalid -q value");
1100 ExitStat = EX_USAGE;
1101 }
1102
1103 /* check for bad conversion */
1104 if (i < Errors)
1105 ExitStat = EX_USAGE;
1106 break;
1107 }
1108 break;
1109
1110 case 'R': /* DSN RET: what to return */
1111 CHECK_AGAINST_OPMODE(j);
1112 if (bitset(EF_RET_PARAM, BlankEnvelope.e_flags))
1113 {
1114 usrerr("Duplicate -R flag");
1115 ExitStat = EX_USAGE;
1116 break;
1117 }
1118 BlankEnvelope.e_flags |= EF_RET_PARAM;
1119 if (sm_strcasecmp(optarg, "hdrs") == 0)
1120 BlankEnvelope.e_flags |= EF_NO_BODY_RETN;
1121 else if (sm_strcasecmp(optarg, "full") != 0)
1122 {
1123 usrerr("Invalid -R value");
1124 ExitStat = EX_USAGE;
1125 }
1126 macdefine(&BlankEnvelope.e_macro, A_TEMP,
1127 macid("{dsn_ret}"), optarg);
1128 break;
1129
1130 case 't': /* read recipients from message */
1131 CHECK_AGAINST_OPMODE(j);
1132 GrabTo = true;
1133 break;
1134
1135 case 'V': /* DSN ENVID: set "original" envelope id */
1136 CHECK_AGAINST_OPMODE(j);
1137 if (!xtextok(optarg))
1138 {
1139 usrerr("Invalid syntax in -V flag");
1140 ExitStat = EX_USAGE;
1141 }
1142 else
1143 {
1144 BlankEnvelope.e_envid = newstr(optarg);
1145 macdefine(&BlankEnvelope.e_macro, A_TEMP,
1146 macid("{dsn_envid}"), optarg);
1147 }
1148 break;
1149
1150 case 'X': /* traffic log file */
1151 dp = drop_privileges(true);
1152 setstat(dp);
1153 if (stat(optarg, &traf_st) == 0 &&
1154 S_ISFIFO(traf_st.st_mode))
1155 TrafficLogFile = sm_io_open(SmFtStdio,
1156 SM_TIME_DEFAULT,
1157 optarg,
1158 SM_IO_WRONLY, NULL);
1159 else
1160 TrafficLogFile = sm_io_open(SmFtStdio,
1161 SM_TIME_DEFAULT,
1162 optarg,
1163 SM_IO_APPEND, NULL);
1164 if (TrafficLogFile == NULL)
1165 {
1166 syserr("cannot open %s", optarg);
1167 ExitStat = EX_CANTCREAT;
1168 break;
1169 }
1170 (void) sm_io_setvbuf(TrafficLogFile, SM_TIME_DEFAULT,
1171 NULL, SM_IO_LBF, 0);
1172 break;
1173
1174 /* compatibility flags */
1175 case 'c': /* connect to non-local mailers */
1176 case 'i': /* don't let dot stop me */
1177 case 'm': /* send to me too */
1178 case 'T': /* set timeout interval */
1179 case 'v': /* give blow-by-blow description */
1180 setoption(j, "T", false, true, &BlankEnvelope);
1181 break;
1182
1183 case 'e': /* error message disposition */
1184 case 'M': /* define macro */
1185 setoption(j, optarg, false, true, &BlankEnvelope);
1186 break;
1187
1188 case 's': /* save From lines in headers */
1189 setoption('f', "T", false, true, &BlankEnvelope);
1190 break;
1191
1192 #ifdef DBM
1193 case 'I': /* initialize alias DBM file */
1194 set_op_mode(MD_INITALIAS);
1195 break;
1196 #endif /* DBM */
1197
1198 #if defined(__osf__) || defined(_AIX3)
1199 case 'x': /* random flag that OSF/1 & AIX mailx passes */
1200 break;
1201 #endif
1202 #if defined(sony_news)
1203 case 'E':
1204 case 'J': /* ignore flags for Japanese code conversion
1205 implemented on Sony NEWS */
1206 break;
1207 #endif /* defined(sony_news) */
1208
1209 default:
1210 finis(true, true, EX_USAGE);
1211 /* NOTREACHED */
1212 break;
1213 }
1214 }
1215
1216 /* if we've had errors so far, exit now */
1217 if ((ExitStat != EX_OK && OpMode != MD_TEST && OpMode != MD_CHECKCONFIG) ||
1218 ExitStat == EX_OSERR)
1219 {
1220 finis(false, true, ExitStat);
1221 /* NOTREACHED */
1222 }
1223
1224 if (bitset(SUBMIT_MTA, SubmitMode))
1225 {
1226 /* If set daemon_flags on command line, don't reset it */
1227 if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1228 macdefine(&BlankEnvelope.e_macro, A_PERM,
1229 macid("{daemon_flags}"), "CC f");
1230 }
1231 else if (OpMode == MD_DELIVER || OpMode == MD_SMTP)
1232 {
1233 SubmitMode = SUBMIT_MSA;
1234
1235 /* If set daemon_flags on command line, don't reset it */
1236 if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1237 macdefine(&BlankEnvelope.e_macro, A_PERM,
1238 macid("{daemon_flags}"), "c u");
1239 }
1240
1241 /*
1242 ** Do basic initialization.
1243 ** Read system control file.
1244 ** Extract special fields for local use.
1245 */
1246
1247 #if XDEBUG
1248 checkfd012("before readcf");
1249 #endif
1250 vendor_pre_defaults(&BlankEnvelope);
1251
1252 readcf(getcfname(OpMode, SubmitMode, cftype, conffile),
1253 safecf, &BlankEnvelope);
1254 #if !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_)
1255 ConfigFileRead = true;
1256 #endif
1257 vendor_post_defaults(&BlankEnvelope);
1258
1259 /* now we can complain about missing fds */
1260 if (MissingFds != 0 && LogLevel > 8)
1261 {
1262 char mbuf[MAXLINE];
1263
1264 mbuf[0] = '\0';
1265 if (bitset(1 << STDIN_FILENO, MissingFds))
1266 (void) sm_strlcat(mbuf, ", stdin", sizeof(mbuf));
1267 if (bitset(1 << STDOUT_FILENO, MissingFds))
1268 (void) sm_strlcat(mbuf, ", stdout", sizeof(mbuf));
1269 if (bitset(1 << STDERR_FILENO, MissingFds))
1270 (void) sm_strlcat(mbuf, ", stderr", sizeof(mbuf));
1271
1272 /* Notice: fill_errno is from high above: fill_fd() */
1273 sm_syslog(LOG_WARNING, NOQID,
1274 "File descriptors missing on startup: %s; %s",
1275 &mbuf[2], sm_errstring(fill_errno));
1276 }
1277
1278 /* Remove the ability for a normal user to send signals */
1279 if (RealUid != 0 && RealUid != geteuid())
1280 {
1281 uid_t new_uid = geteuid();
1282
1283 #if HASSETREUID
1284 /*
1285 ** Since we can differentiate between uid and euid,
1286 ** make the uid a different user so the real user
1287 ** can't send signals. However, it doesn't need to be
1288 ** root (euid has root).
1289 */
1290
1291 if (new_uid == 0)
1292 new_uid = DefUid;
1293 if (tTd(47, 5))
1294 sm_dprintf("Changing real uid to %d\n", (int) new_uid);
1295 if (setreuid(new_uid, geteuid()) < 0)
1296 {
1297 syserr("main: setreuid(%d, %d) failed",
1298 (int) new_uid, (int) geteuid());
1299 finis(false, true, EX_OSERR);
1300 /* NOTREACHED */
1301 }
1302 if (tTd(47, 10))
1303 sm_dprintf("Now running as e/ruid %d:%d\n",
1304 (int) geteuid(), (int) getuid());
1305 #else /* HASSETREUID */
1306 /*
1307 ** Have to change both effective and real so need to
1308 ** change them both to effective to keep privs.
1309 */
1310
1311 if (tTd(47, 5))
1312 sm_dprintf("Changing uid to %d\n", (int) new_uid);
1313 if (setuid(new_uid) < 0)
1314 {
1315 syserr("main: setuid(%d) failed", (int) new_uid);
1316 finis(false, true, EX_OSERR);
1317 /* NOTREACHED */
1318 }
1319 if (tTd(47, 10))
1320 sm_dprintf("Now running as e/ruid %d:%d\n",
1321 (int) geteuid(), (int) getuid());
1322 #endif /* HASSETREUID */
1323 }
1324
1325 #if NAMED_BIND
1326 if (FallbackMX != NULL)
1327 (void) getfallbackmxrr(FallbackMX);
1328 #endif
1329
1330 if (SuperSafe == SAFE_INTERACTIVE && !SM_IS_INTERACTIVE(CurEnv->e_sendmode))
1331 {
1332 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1333 "WARNING: SuperSafe=interactive should only be used with\n DeliveryMode=interactive\n");
1334 }
1335
1336 if (UseMSP && (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON))
1337 {
1338 usrerr("Mail submission program cannot be used as daemon");
1339 finis(false, true, EX_USAGE);
1340 }
1341
1342 if (OpMode == MD_DELIVER || OpMode == MD_SMTP ||
1343 OpMode == MD_QUEUERUN || OpMode == MD_ARPAFTP ||
1344 OpMode == MD_DAEMON || OpMode == MD_FGDAEMON)
1345 makeworkgroups();
1346
1347 /* set up the basic signal handlers */
1348 if (sm_signal(SIGINT, SIG_IGN) != SIG_IGN)
1349 (void) sm_signal(SIGINT, intsig);
1350 (void) sm_signal(SIGTERM, intsig);
1351
1352 /* Enforce use of local time (null string overrides this) */
1353 if (TimeZoneSpec == NULL)
1354 unsetenv("TZ");
1355 else if (TimeZoneSpec[0] != '\0')
1356 sm_setuserenv("TZ", TimeZoneSpec);
1357 else
1358 sm_setuserenv("TZ", NULL);
1359 tzset();
1360
1361 /* initialize mailbox database */
1362 i = sm_mbdb_initialize(Mbdb);
1363 if (i != EX_OK)
1364 {
1365 usrerr("Can't initialize mailbox database \"%s\": %s",
1366 Mbdb, sm_strexit(i));
1367 ExitStat = i;
1368 }
1369
1370 /* avoid denial-of-service attacks */
1371 resetlimits();
1372
1373 if (OpMode == MD_TEST)
1374 {
1375 /* can't be done after readcf if RunAs* is used */
1376 dp = drop_privileges(true);
1377 if (dp != EX_OK)
1378 {
1379 finis(false, true, dp);
1380 /* NOTREACHED */
1381 }
1382 }
1383 else if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON)
1384 {
1385 /* drop privileges -- daemon mode done after socket/bind */
1386 dp = drop_privileges(false);
1387 setstat(dp);
1388 if (dp == EX_OK && UseMSP && (geteuid() == 0 || getuid() == 0))
1389 {
1390 usrerr("Mail submission program must have RunAsUser set to non root user");
1391 finis(false, true, EX_CONFIG);
1392 /* NOTREACHED */
1393 }
1394 }
1395
1396 #if NAMED_BIND
1397 _res.retry = TimeOuts.res_retry[RES_TO_DEFAULT];
1398 _res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT];
1399 #endif
1400
1401 /*
1402 ** Find our real host name for future logging.
1403 */
1404
1405 authinfo = getauthinfo(STDIN_FILENO, &forged);
1406 macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
1407
1408 /* suppress error printing if errors mailed back or whatever */
1409 if (BlankEnvelope.e_errormode != EM_PRINT)
1410 HoldErrs = true;
1411
1412 /* set up the $=m class now, after .cf has a chance to redefine $m */
1413 expand("\201m", jbuf, sizeof(jbuf), &BlankEnvelope);
1414 if (jbuf[0] != '\0')
1415 setclass('m', jbuf);
1416
1417 /* probe interfaces and locate any additional names */
1418 if (DontProbeInterfaces != DPI_PROBENONE)
1419 load_if_names();
1420
1421 if (tTd(0, 10))
1422 {
1423 char pidpath[MAXPATHLEN];
1424
1425 /* Now we know which .cf file we use */
1426 sm_dprintf(" Conf file:\t%s (selected)\n",
1427 getcfname(OpMode, SubmitMode, cftype, conffile));
1428 expand(PidFile, pidpath, sizeof(pidpath), &BlankEnvelope);
1429 sm_dprintf(" Pid file:\t%s (selected)\n", pidpath);
1430 }
1431
1432 if (tTd(0, 1))
1433 {
1434 sm_dprintf("\n============ SYSTEM IDENTITY (after readcf) ============");
1435 sm_dprintf("\n (short domain name) $w = ");
1436 xputs(sm_debug_file(), macvalue('w', &BlankEnvelope));
1437 sm_dprintf("\n (canonical domain name) $j = ");
1438 xputs(sm_debug_file(), macvalue('j', &BlankEnvelope));
1439 sm_dprintf("\n (subdomain name) $m = ");
1440 xputs(sm_debug_file(), macvalue('m', &BlankEnvelope));
1441 sm_dprintf("\n (node name) $k = ");
1442 xputs(sm_debug_file(), macvalue('k', &BlankEnvelope));
1443 sm_dprintf("\n========================================================\n\n");
1444 }
1445
1446 /*
1447 ** Do more command line checking -- these are things that
1448 ** have to modify the results of reading the config file.
1449 */
1450
1451 /* process authorization warnings from command line */
1452 if (warn_C_flag)
1453 auth_warning(&BlankEnvelope, "Processed by %s with -C %s",
1454 RealUserName, conffile);
1455 if (Warn_Q_option && !wordinclass(RealUserName, 't'))
1456 auth_warning(&BlankEnvelope, "Processed from queue %s",
1457 QueueDir);
1458 if (sysloglabel != NULL && !wordinclass(RealUserName, 't') &&
1459 RealUid != 0 && RealUid != TrustedUid && LogLevel > 1)
1460 sm_syslog(LOG_WARNING, NOQID, "user %d changed syslog label",
1461 (int) RealUid);
1462
1463 /* check body type for legality */
1464 i = check_bodytype(BlankEnvelope.e_bodytype);
1465 if (i == BODYTYPE_ILLEGAL)
1466 {
1467 usrerr("Illegal body type %s", BlankEnvelope.e_bodytype);
1468 BlankEnvelope.e_bodytype = NULL;
1469 }
1470 else if (i != BODYTYPE_NONE)
1471 SevenBitInput = (i == BODYTYPE_7BIT);
1472
1473 /* tweak default DSN notifications */
1474 if (DefaultNotify == 0)
1475 DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
1476
1477 /* check for sane configuration level */
1478 if (ConfigLevel > MAXCONFIGLEVEL)
1479 {
1480 syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)",
1481 ConfigLevel, Version, MAXCONFIGLEVEL);
1482 }
1483
1484 /* need MCI cache to have persistence */
1485 if (HostStatDir != NULL && MaxMciCache == 0)
1486 {
1487 HostStatDir = NULL;
1488 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1489 "Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n");
1490 }
1491
1492 /* need HostStatusDir in order to have SingleThreadDelivery */
1493 if (SingleThreadDelivery && HostStatDir == NULL)
1494 {
1495 SingleThreadDelivery = false;
1496 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1497 "Warning: HostStatusDirectory required for SingleThreadDelivery\n");
1498 }
1499
1500 #if _FFR_MEMSTAT
1501 j = sm_memstat_open();
1502 if (j < 0 && (RefuseLowMem > 0 || QueueLowMem > 0) && LogLevel > 4)
1503 {
1504 sm_syslog(LOG_WARNING, NOQID,
1505 "cannot get memory statistics, settings ignored, error=%d"
1506 , j);
1507 }
1508 #endif /* _FFR_MEMSTAT */
1509
1510 /* check for permissions */
1511 if (RealUid != 0 &&
1512 RealUid != TrustedUid)
1513 {
1514 char *action = NULL;
1515
1516 switch (OpMode)
1517 {
1518 case MD_QUEUERUN:
1519 if (quarantining != NULL)
1520 action = "quarantine jobs";
1521 else
1522 {
1523 /* Normal users can do a single queue run */
1524 if (QueueIntvl == 0)
1525 break;
1526 }
1527
1528 /* but not persistent queue runners */
1529 if (action == NULL)
1530 action = "start a queue runner daemon";
1531 /* FALLTHROUGH */
1532
1533 case MD_PURGESTAT:
1534 if (action == NULL)
1535 action = "purge host status";
1536 /* FALLTHROUGH */
1537
1538 case MD_DAEMON:
1539 case MD_FGDAEMON:
1540 if (action == NULL)
1541 action = "run daemon";
1542
1543 if (tTd(65, 1))
1544 sm_dprintf("Deny user %d attempt to %s\n",
1545 (int) RealUid, action);
1546
1547 if (LogLevel > 1)
1548 sm_syslog(LOG_ALERT, NOQID,
1549 "user %d attempted to %s",
1550 (int) RealUid, action);
1551 HoldErrs = false;
1552 usrerr("Permission denied (real uid not trusted)");
1553 finis(false, true, EX_USAGE);
1554 /* NOTREACHED */
1555 break;
1556
1557 case MD_VERIFY:
1558 if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags))
1559 {
1560 /*
1561 ** If -bv and RestrictExpand,
1562 ** drop privs to prevent normal
1563 ** users from reading private
1564 ** aliases/forwards/:include:s
1565 */
1566
1567 if (tTd(65, 1))
1568 sm_dprintf("Drop privs for user %d attempt to expand (RestrictExpand)\n",
1569 (int) RealUid);
1570
1571 dp = drop_privileges(true);
1572
1573 /* Fake address safety */
1574 if (tTd(65, 1))
1575 sm_dprintf("Faking DontBlameSendmail=NonRootSafeAddr\n");
1576 setbitn(DBS_NONROOTSAFEADDR, DontBlameSendmail);
1577
1578 if (dp != EX_OK)
1579 {
1580 if (tTd(65, 1))
1581 sm_dprintf("Failed to drop privs for user %d attempt to expand, exiting\n",
1582 (int) RealUid);
1583 CurEnv->e_id = NULL;
1584 finis(true, true, dp);
1585 /* NOTREACHED */
1586 }
1587 }
1588 break;
1589
1590 case MD_TEST:
1591 case MD_CHECKCONFIG:
1592 case MD_PRINT:
1593 case MD_PRINTNQE:
1594 case MD_FREEZE:
1595 case MD_HOSTSTAT:
1596 /* Nothing special to check */
1597 break;
1598
1599 case MD_INITALIAS:
1600 if (!wordinclass(RealUserName, 't'))
1601 {
1602 if (tTd(65, 1))
1603 sm_dprintf("Deny user %d attempt to rebuild the alias map\n",
1604 (int) RealUid);
1605 if (LogLevel > 1)
1606 sm_syslog(LOG_ALERT, NOQID,
1607 "user %d attempted to rebuild the alias map",
1608 (int) RealUid);
1609 HoldErrs = false;
1610 usrerr("Permission denied (real uid not trusted)");
1611 finis(false, true, EX_USAGE);
1612 /* NOTREACHED */
1613 }
1614 if (UseMSP)
1615 {
1616 HoldErrs = false;
1617 usrerr("User %d cannot rebuild aliases in mail submission program",
1618 (int) RealUid);
1619 finis(false, true, EX_USAGE);
1620 /* NOTREACHED */
1621 }
1622 /* FALLTHROUGH */
1623
1624 default:
1625 if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags) &&
1626 Verbose != 0)
1627 {
1628 /*
1629 ** If -v and RestrictExpand, reset
1630 ** Verbose to prevent normal users
1631 ** from seeing the expansion of
1632 ** aliases/forwards/:include:s
1633 */
1634
1635 if (tTd(65, 1))
1636 sm_dprintf("Dropping verbosity for user %d (RestrictExpand)\n",
1637 (int) RealUid);
1638 Verbose = 0;
1639 }
1640 break;
1641 }
1642 }
1643
1644 if (MeToo)
1645 BlankEnvelope.e_flags |= EF_METOO;
1646
1647 switch (OpMode)
1648 {
1649 case MD_TEST:
1650 /* don't have persistent host status in test mode */
1651 HostStatDir = NULL;
1652 /* FALLTHROUGH */
1653
1654 case MD_CHECKCONFIG:
1655 if (Verbose == 0)
1656 Verbose = 2;
1657 BlankEnvelope.e_errormode = EM_PRINT;
1658 HoldErrs = false;
1659 break;
1660
1661 case MD_VERIFY:
1662 BlankEnvelope.e_errormode = EM_PRINT;
1663 HoldErrs = false;
1664 /* arrange to exit cleanly on hangup signal */
1665 if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1666 (void) sm_signal(SIGHUP, intsig);
1667 if (geteuid() != 0)
1668 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1669 "Notice: -bv may give misleading output for non-privileged user\n");
1670 break;
1671
1672 case MD_FGDAEMON:
1673 run_in_foreground = true;
1674 set_op_mode(MD_DAEMON);
1675 /* FALLTHROUGH */
1676
1677 case MD_DAEMON:
1678 vendor_daemon_setup(&BlankEnvelope);
1679
1680 /* remove things that don't make sense in daemon mode */
1681 FullName = NULL;
1682 GrabTo = false;
1683
1684 /* arrange to restart on hangup signal */
1685 if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/')
1686 sm_syslog(LOG_WARNING, NOQID,
1687 "daemon invoked without full pathname; kill -1 won't work");
1688 break;
1689
1690 case MD_INITALIAS:
1691 Verbose = 2;
1692 BlankEnvelope.e_errormode = EM_PRINT;
1693 HoldErrs = false;
1694 /* FALLTHROUGH */
1695
1696 default:
1697 /* arrange to exit cleanly on hangup signal */
1698 if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1699 (void) sm_signal(SIGHUP, intsig);
1700 break;
1701 }
1702
1703 /* special considerations for FullName */
1704 if (FullName != NULL)
1705 {
1706 char *full = NULL;
1707
1708 /* full names can't have newlines */
1709 if (strchr(FullName, '\n') != NULL)
1710 {
1711 full = newstr(denlstring(FullName, true, true));
1712 FullName = full;
1713 }
1714
1715 /* check for characters that may have to be quoted */
1716 if (!rfc822_string(FullName))
1717 {
1718 /*
1719 ** Quote a full name with special characters
1720 ** as a comment so crackaddr() doesn't destroy
1721 ** the name portion of the address.
1722 */
1723
1724 FullName = addquotes(FullName, NULL);
1725 if (full != NULL)
1726 sm_free(full); /* XXX */
1727 }
1728 }
1729
1730 /* do heuristic mode adjustment */
1731 if (Verbose)
1732 {
1733 /* turn off noconnect option */
1734 setoption('c', "F", true, false, &BlankEnvelope);
1735
1736 /* turn on interactive delivery */
1737 setoption('d', "", true, false, &BlankEnvelope);
1738 }
1739
1740 #ifdef VENDOR_CODE
1741 /* check for vendor mismatch */
1742 if (VendorCode != VENDOR_CODE)
1743 {
1744 message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s",
1745 getvendor(VENDOR_CODE), getvendor(VendorCode));
1746 }
1747 #endif /* VENDOR_CODE */
1748
1749 /* check for out of date configuration level */
1750 if (ConfigLevel < MAXCONFIGLEVEL)
1751 {
1752 message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d",
1753 Version, MAXCONFIGLEVEL, ConfigLevel);
1754 }
1755
1756 if (ConfigLevel < 3)
1757 UseErrorsTo = true;
1758
1759 /* set options that were previous macros */
1760 if (SmtpGreeting == NULL)
1761 {
1762 if (ConfigLevel < 7 &&
1763 (p = macvalue('e', &BlankEnvelope)) != NULL)
1764 SmtpGreeting = newstr(p);
1765 else
1766 SmtpGreeting = "\201j Sendmail \201v ready at \201b";
1767 }
1768 if (UnixFromLine == NULL)
1769 {
1770 if (ConfigLevel < 7 &&
1771 (p = macvalue('l', &BlankEnvelope)) != NULL)
1772 UnixFromLine = newstr(p);
1773 else
1774 UnixFromLine = "From \201g \201d";
1775 }
1776 SmtpError[0] = '\0';
1777
1778 /* our name for SMTP codes */
1779 expand("\201j", jbuf, sizeof(jbuf), &BlankEnvelope);
1780 if (jbuf[0] == '\0')
1781 PSTRSET(MyHostName, "localhost");
1782 else
1783 PSTRSET(MyHostName, jbuf);
1784 if (strchr(MyHostName, '.') == NULL)
1785 message("WARNING: local host name (%s) is not qualified; see cf/README: WHO AM I?",
1786 MyHostName);
1787
1788 /* make certain that this name is part of the $=w class */
1789 setclass('w', MyHostName);
1790
1791 /* fill in the structure of the *default* queue */
1792 st = stab("mqueue", ST_QUEUE, ST_FIND);
1793 if (st == NULL)
1794 syserr("No default queue (mqueue) defined");
1795 else
1796 set_def_queueval(st->s_quegrp, true);
1797
1798 /* the indices of built-in mailers */
1799 st = stab("local", ST_MAILER, ST_FIND);
1800 if (st != NULL)
1801 LocalMailer = st->s_mailer;
1802 else if (OpMode != MD_TEST || !warn_C_flag)
1803 syserr("No local mailer defined");
1804
1805 st = stab("prog", ST_MAILER, ST_FIND);
1806 if (st == NULL)
1807 syserr("No prog mailer defined");
1808 else
1809 {
1810 ProgMailer = st->s_mailer;
1811 clrbitn(M_MUSER, ProgMailer->m_flags);
1812 }
1813
1814 st = stab("*file*", ST_MAILER, ST_FIND);
1815 if (st == NULL)
1816 syserr("No *file* mailer defined");
1817 else
1818 {
1819 FileMailer = st->s_mailer;
1820 clrbitn(M_MUSER, FileMailer->m_flags);
1821 }
1822
1823 st = stab("*include*", ST_MAILER, ST_FIND);
1824 if (st == NULL)
1825 syserr("No *include* mailer defined");
1826 else
1827 InclMailer = st->s_mailer;
1828
1829 if (ConfigLevel < 6)
1830 {
1831 /* heuristic tweaking of local mailer for back compat */
1832 if (LocalMailer != NULL)
1833 {
1834 setbitn(M_ALIASABLE, LocalMailer->m_flags);
1835 setbitn(M_HASPWENT, LocalMailer->m_flags);
1836 setbitn(M_TRYRULESET5, LocalMailer->m_flags);
1837 setbitn(M_CHECKINCLUDE, LocalMailer->m_flags);
1838 setbitn(M_CHECKPROG, LocalMailer->m_flags);
1839 setbitn(M_CHECKFILE, LocalMailer->m_flags);
1840 setbitn(M_CHECKUDB, LocalMailer->m_flags);
1841 }
1842 if (ProgMailer != NULL)
1843 setbitn(M_RUNASRCPT, ProgMailer->m_flags);
1844 if (FileMailer != NULL)
1845 setbitn(M_RUNASRCPT, FileMailer->m_flags);
1846 }
1847 if (ConfigLevel < 7)
1848 {
1849 if (LocalMailer != NULL)
1850 setbitn(M_VRFY250, LocalMailer->m_flags);
1851 if (ProgMailer != NULL)
1852 setbitn(M_VRFY250, ProgMailer->m_flags);
1853 if (FileMailer != NULL)
1854 setbitn(M_VRFY250, FileMailer->m_flags);
1855 }
1856
1857 /* MIME Content-Types that cannot be transfer encoded */
1858 setclass('n', "multipart/signed");
1859
1860 /* MIME message/xxx subtypes that can be treated as messages */
1861 setclass('s', "rfc822");
1862 #if _FFR_EAI
1863 setclass('s', "global");
1864 #endif
1865
1866 /* MIME Content-Transfer-Encodings that can be encoded */
1867 setclass('e', "7bit");
1868 setclass('e', "8bit");
1869 setclass('e', "binary");
1870
1871 #ifdef USE_B_CLASS
1872 /* MIME Content-Types that should be treated as binary */
1873 setclass('b', "image");
1874 setclass('b', "audio");
1875 setclass('b', "video");
1876 setclass('b', "application/octet-stream");
1877 #endif /* USE_B_CLASS */
1878
1879 /* MIME headers which have fields to check for overflow */
1880 setclass(macid("{checkMIMEFieldHeaders}"), "content-disposition");
1881 setclass(macid("{checkMIMEFieldHeaders}"), "content-type");
1882
1883 /* MIME headers to check for length overflow */
1884 setclass(macid("{checkMIMETextHeaders}"), "content-description");
1885
1886 /* MIME headers to check for overflow and rebalance */
1887 setclass(macid("{checkMIMEHeaders}"), "content-disposition");
1888 setclass(macid("{checkMIMEHeaders}"), "content-id");
1889 setclass(macid("{checkMIMEHeaders}"), "content-transfer-encoding");
1890 setclass(macid("{checkMIMEHeaders}"), "content-type");
1891 setclass(macid("{checkMIMEHeaders}"), "mime-version");
1892
1893 /* Macros to save in the queue file -- don't remove any */
1894 setclass(macid("{persistentMacros}"), "r");
1895 setclass(macid("{persistentMacros}"), "s");
1896 setclass(macid("{persistentMacros}"), "_");
1897 setclass(macid("{persistentMacros}"), "{if_addr}");
1898 setclass(macid("{persistentMacros}"), "{daemon_flags}");
1899
1900 /* operate in queue directory */
1901 if (QueueDir == NULL || *QueueDir == '\0')
1902 {
1903 if (OpMode != MD_TEST)
1904 {
1905 syserr("QueueDirectory (Q) option must be set");
1906 ExitStat = EX_CONFIG;
1907 }
1908 }
1909 else
1910 {
1911 if (OpMode != MD_TEST)
1912 setup_queues(OpMode == MD_DAEMON);
1913 }
1914
1915 /* check host status directory for validity */
1916 if (HostStatDir != NULL && !path_is_dir(HostStatDir, false))
1917 {
1918 /* cannot use this value */
1919 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1920 "Warning: Cannot use HostStatusDirectory = %s: %s\n",
1921 HostStatDir, sm_errstring(errno));
1922 HostStatDir = NULL;
1923 }
1924
1925 if (OpMode == MD_QUEUERUN &&
1926 RealUid != 0 && bitset(PRIV_RESTRICTQRUN, PrivacyFlags))
1927 {
1928 struct stat stbuf;
1929
1930 /* check to see if we own the queue directory */
1931 if (stat(".", &stbuf) < 0)
1932 syserr("main: cannot stat %s", QueueDir);
1933 if (stbuf.st_uid != RealUid)
1934 {
1935 /* nope, really a botch */
1936 HoldErrs = false;
1937 usrerr("You do not have permission to process the queue");
1938 finis(false, true, EX_NOPERM);
1939 /* NOTREACHED */
1940 }
1941 }
1942
1943 #if MILTER
1944 /* sanity checks on milter filters */
1945 if (OpMode == MD_DAEMON || OpMode == MD_SMTP)
1946 {
1947 milter_config(InputFilterList, InputFilters, MAXFILTERS);
1948 setup_daemon_milters();
1949 }
1950 #endif /* MILTER */
1951
1952 /* Convert queuegroup string to qgrp number */
1953 if (queuegroup != NULL)
1954 {
1955 qgrp = name2qid(queuegroup);
1956 if (qgrp == NOQGRP)
1957 {
1958 HoldErrs = false;
1959 usrerr("Queue group %s unknown", queuegroup);
1960 finis(false, true, ExitStat);
1961 /* NOTREACHED */
1962 }
1963 }
1964
1965 /* if checking config or have had errors so far, exit now */
1966 if (OpMode == MD_CHECKCONFIG || (ExitStat != EX_OK && OpMode != MD_TEST))
1967 {
1968 finis(false, true, ExitStat);
1969 /* NOTREACHED */
1970 }
1971
1972 #if SASL
1973 /* sendmail specific SASL initialization */
1974 sm_sasl_init();
1975 #endif
1976
1977 #if XDEBUG
1978 checkfd012("before main() initmaps");
1979 #endif
1980
1981 /*
1982 ** Do operation-mode-dependent initialization.
1983 */
1984
1985 switch (OpMode)
1986 {
1987 case MD_PRINT:
1988 /* print the queue */
1989 HoldErrs = false;
1990 (void) dropenvelope(&BlankEnvelope, true, false);
1991 (void) sm_signal(SIGPIPE, sigpipe);
1992 if (qgrp != NOQGRP)
1993 {
1994 /* Selecting a particular queue group to run */
1995 for (j = 0; j < Queue[qgrp]->qg_numqueues; j++)
1996 {
1997 if (StopRequest)
1998 stop_sendmail();
1999 (void) print_single_queue(qgrp, j);
2000 }
2001 finis(false, true, EX_OK);
2002 /* NOTREACHED */
2003 }
2004 printqueue();
2005 finis(false, true, EX_OK);
2006 /* NOTREACHED */
2007 break;
2008
2009 case MD_PRINTNQE:
2010 /* print number of entries in queue */
2011 (void) dropenvelope(&BlankEnvelope, true, false);
2012 (void) sm_signal(SIGPIPE, sigpipe);
2013 printnqe(smioout, NULL);
2014 finis(false, true, EX_OK);
2015 /* NOTREACHED */
2016 break;
2017
2018 case MD_QUEUERUN:
2019 /* only handle quarantining here */
2020 if (quarantining == NULL)
2021 break;
2022
2023 if (QueueMode != QM_QUARANTINE &&
2024 QueueMode != QM_NORMAL)
2025 {
2026 HoldErrs = false;
2027 usrerr("Can not use -Q with -q%c", QueueMode);
2028 ExitStat = EX_USAGE;
2029 finis(false, true, ExitStat);
2030 /* NOTREACHED */
2031 }
2032 quarantine_queue(quarantining, qgrp);
2033 finis(false, true, EX_OK);
2034 break;
2035
2036 case MD_HOSTSTAT:
2037 (void) sm_signal(SIGPIPE, sigpipe);
2038 (void) mci_traverse_persistent(mci_print_persistent, NULL);
2039 finis(false, true, EX_OK);
2040 /* NOTREACHED */
2041 break;
2042
2043 case MD_PURGESTAT:
2044 (void) mci_traverse_persistent(mci_purge_persistent, NULL);
2045 finis(false, true, EX_OK);
2046 /* NOTREACHED */
2047 break;
2048
2049 case MD_INITALIAS:
2050 /* initialize maps */
2051 initmaps();
2052 finis(false, true, ExitStat);
2053 /* NOTREACHED */
2054 break;
2055
2056 case MD_SMTP:
2057 case MD_DAEMON:
2058 /* reset DSN parameters */
2059 DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
2060 macdefine(&BlankEnvelope.e_macro, A_PERM,
2061 macid("{dsn_notify}"), NULL);
2062 BlankEnvelope.e_envid = NULL;
2063 macdefine(&BlankEnvelope.e_macro, A_PERM,
2064 macid("{dsn_envid}"), NULL);
2065 BlankEnvelope.e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
2066 macdefine(&BlankEnvelope.e_macro, A_PERM,
2067 macid("{dsn_ret}"), NULL);
2068
2069 /* don't open maps for daemon -- done below in child */
2070 break;
2071 }
2072
2073 if (tTd(0, 15))
2074 {
2075 /* print configuration table (or at least part of it) */
2076 if (tTd(0, 90))
2077 printrules();
2078 for (i = 0; i < MAXMAILERS; i++)
2079 {
2080 if (Mailer[i] != NULL)
2081 printmailer(sm_debug_file(), Mailer[i]);
2082 }
2083 }
2084
2085 /*
2086 ** Switch to the main envelope.
2087 */
2088
2089 CurEnv = newenvelope(&MainEnvelope, &BlankEnvelope,
2090 sm_rpool_new_x(NULL));
2091 MainEnvelope.e_flags = BlankEnvelope.e_flags;
2092
2093 /*
2094 ** If test mode, read addresses from stdin and process.
2095 */
2096
2097 if (OpMode == MD_TEST)
2098 {
2099 if (isatty(sm_io_getinfo(smioin, SM_IO_WHAT_FD, NULL)))
2100 Verbose = 2;
2101
2102 if (Verbose)
2103 {
2104 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2105 "ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n");
2106 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2107 "Enter <ruleset> <address>\n");
2108 }
2109 macdefine(&(MainEnvelope.e_macro), A_PERM,
2110 macid("{addr_type}"), "e r");
2111 for (;;)
2112 {
2113 SM_TRY
2114 {
2115 (void) sm_signal(SIGINT, intindebug);
2116 (void) sm_releasesignal(SIGINT);
2117 if (Verbose == 2)
2118 (void) sm_io_fprintf(smioout,
2119 SM_TIME_DEFAULT,
2120 "> ");
2121 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2122 if (sm_io_fgets(smioin, SM_TIME_DEFAULT, buf,
2123 sizeof(buf)) < 0)
2124 testmodeline("/quit", &MainEnvelope);
2125 p = strchr(buf, '\n');
2126 if (p != NULL)
2127 *p = '\0';
2128 if (Verbose < 2)
2129 (void) sm_io_fprintf(smioout,
2130 SM_TIME_DEFAULT,
2131 "> %s\n", buf);
2132 testmodeline(buf, &MainEnvelope);
2133 }
2134 SM_EXCEPT(exc, "[!F]*")
2135 {
2136 /*
2137 ** 8.10 just prints \n on interrupt.
2138 ** I'm printing the exception here in case
2139 ** sendmail is extended to raise additional
2140 ** exceptions in this context.
2141 */
2142
2143 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2144 "\n");
2145 sm_exc_print(exc, smioout);
2146 }
2147 SM_END_TRY
2148 }
2149 }
2150
2151 #if STARTTLS
2152 tls_ok = true;
2153 if (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER ||
2154 OpMode == MD_ARPAFTP)
2155 {
2156 /* check whether STARTTLS is turned off for the client */
2157 if (chkclientmodifiers(D_NOTLS))
2158 tls_ok = false;
2159 }
2160 else if (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON ||
2161 OpMode == MD_SMTP)
2162 {
2163 /* check whether STARTTLS is turned off */
2164 if (chkdaemonmodifiers(D_NOTLS) && chkclientmodifiers(D_NOTLS))
2165 tls_ok = false;
2166 }
2167 else /* other modes don't need STARTTLS */
2168 tls_ok = false;
2169
2170 if (tls_ok)
2171 {
2172 /* basic TLS initialization */
2173 j = init_tls_library(FipsMode);
2174 if (j < 0)
2175 {
2176 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2177 "ERROR: TLS failed to initialize\n");
2178 exit(EX_USAGE);
2179 }
2180 if (j > 0)
2181 tls_ok = false;
2182 }
2183
2184 if (!tls_ok && (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER))
2185 {
2186 /* disable TLS for client */
2187 setclttls(false);
2188 }
2189 #endif /* STARTTLS */
2190
2191 /*
2192 ** If collecting stuff from the queue, go start doing that.
2193 */
2194
2195 if (OpMode == MD_QUEUERUN && QueueIntvl == 0)
2196 {
2197 pid_t pid = -1;
2198
2199 #if STARTTLS
2200 /* init TLS for client, ignore result for now */
2201 (void) initclttls(tls_ok);
2202 #endif
2203
2204 /*
2205 ** The parent process of the caller of runqueue() needs
2206 ** to stay around for a possible SIGTERM. The SIGTERM will
2207 ** tell this process that all of the queue runners children
2208 ** need to be sent SIGTERM as well. At the same time, we
2209 ** want to return control to the command line. So we do an
2210 ** extra fork().
2211 */
2212
2213 if (Verbose || foregroundqueue || (pid = fork()) <= 0)
2214 {
2215 /*
2216 ** If the fork() failed we should still try to do
2217 ** the queue run. If it succeeded then the child
2218 ** is going to start the run and wait for all
2219 ** of the children to finish.
2220 */
2221
2222 if (pid == 0)
2223 {
2224 /* Reset global flags */
2225 RestartRequest = NULL;
2226 ShutdownRequest = NULL;
2227 PendingSignal = 0;
2228
2229 /* disconnect from terminal */
2230 disconnect(2, CurEnv);
2231 }
2232
2233 CurrentPid = getpid();
2234 if (qgrp != NOQGRP)
2235 {
2236 int rwgflags = RWG_NONE;
2237
2238 /*
2239 ** To run a specific queue group mark it to
2240 ** be run, select the work group it's in and
2241 ** increment the work counter.
2242 */
2243
2244 for (i = 0; i < NumQueue && Queue[i] != NULL;
2245 i++)
2246 Queue[i]->qg_nextrun = (time_t) -1;
2247 Queue[qgrp]->qg_nextrun = 0;
2248 if (Verbose)
2249 rwgflags |= RWG_VERBOSE;
2250 if (queuepersistent)
2251 rwgflags |= RWG_PERSISTENT;
2252 rwgflags |= RWG_FORCE;
2253 (void) run_work_group(Queue[qgrp]->qg_wgrp,
2254 rwgflags);
2255 }
2256 else
2257 (void) runqueue(false, Verbose,
2258 queuepersistent, true);
2259
2260 /* set the title to make it easier to find */
2261 sm_setproctitle(true, CurEnv, "Queue control");
2262 (void) sm_signal(SIGCHLD, SIG_DFL);
2263 while (CurChildren > 0)
2264 {
2265 int status;
2266 pid_t ret;
2267
2268 errno = 0;
2269 while ((ret = sm_wait(&status)) <= 0)
2270 {
2271 if (errno == ECHILD)
2272 {
2273 /*
2274 ** Oops... something got messed
2275 ** up really bad. Waiting for
2276 ** non-existent children
2277 ** shouldn't happen. Let's get
2278 ** out of here.
2279 */
2280
2281 CurChildren = 0;
2282 break;
2283 }
2284 continue;
2285 }
2286
2287 /* something is really really wrong */
2288 if (errno == ECHILD)
2289 {
2290 sm_syslog(LOG_ERR, NOQID,
2291 "queue control process: lost all children: wait returned ECHILD");
2292 break;
2293 }
2294
2295 /* Only drop when a child gives status */
2296 if (WIFSTOPPED(status))
2297 continue;
2298
2299 proc_list_drop(ret, status, NULL);
2300 }
2301 }
2302 finis(true, true, ExitStat);
2303 /* NOTREACHED */
2304 }
2305
2306 #if SASL
2307 if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2308 {
2309 /* check whether AUTH is turned off for the server */
2310 if (!chkdaemonmodifiers(D_NOAUTH) &&
2311 (i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK)
2312 syserr("!sasl_server_init failed! [%s]",
2313 sasl_errstring(i, NULL, NULL));
2314 }
2315 #endif /* SASL */
2316
2317 if (OpMode == MD_SMTP)
2318 {
2319 proc_list_add(CurrentPid, "Sendmail SMTP Agent",
2320 PROC_DAEMON, 0, -1, NULL);
2321
2322 /* clean up background delivery children */
2323 (void) sm_signal(SIGCHLD, reapchild);
2324 }
2325
2326 /*
2327 ** If a daemon, wait for a request.
2328 ** getrequests will always return in a child.
2329 ** If we should also be processing the queue, start
2330 ** doing it in background.
2331 ** We check for any errors that might have happened
2332 ** during startup.
2333 */
2334
2335 if (OpMode == MD_DAEMON || QueueIntvl > 0)
2336 {
2337 char dtype[200];
2338
2339 /* avoid cleanup in finis(), DaemonPid will be set below */
2340 DaemonPid = 0;
2341 if (!run_in_foreground && !tTd(99, 100))
2342 {
2343 /* put us in background */
2344 i = fork();
2345 if (i < 0)
2346 syserr("daemon: cannot fork");
2347 if (i != 0)
2348 {
2349 finis(false, true, EX_OK);
2350 /* NOTREACHED */
2351 }
2352
2353 /*
2354 ** Initialize exception stack and default exception
2355 ** handler for child process.
2356 */
2357
2358 /* Reset global flags */
2359 RestartRequest = NULL;
2360 RestartWorkGroup = false;
2361 ShutdownRequest = NULL;
2362 PendingSignal = 0;
2363 CurrentPid = getpid();
2364
2365 sm_exc_newthread(fatal_error);
2366
2367 /* disconnect from our controlling tty */
2368 disconnect(2, &MainEnvelope);
2369 }
2370
2371 dtype[0] = '\0';
2372 if (OpMode == MD_DAEMON)
2373 {
2374 (void) sm_strlcat(dtype, "+SMTP", sizeof(dtype));
2375 DaemonPid = CurrentPid;
2376 }
2377 if (QueueIntvl > 0)
2378 {
2379 (void) sm_strlcat2(dtype,
2380 queuepersistent
2381 ? "+persistent-queueing@"
2382 : "+queueing@",
2383 pintvl(QueueIntvl, true),
2384 sizeof(dtype));
2385 }
2386 if (tTd(0, 1))
2387 (void) sm_strlcat(dtype, "+debugging", sizeof(dtype));
2388
2389 sm_syslog(LOG_INFO, NOQID,
2390 "starting daemon (%s): %s", Version, dtype + 1);
2391 #if XLA
2392 xla_create_file();
2393 #endif
2394
2395 /* save daemon type in a macro for possible PidFile use */
2396 macdefine(&BlankEnvelope.e_macro, A_TEMP,
2397 macid("{daemon_info}"), dtype + 1);
2398
2399 /* save queue interval in a macro for possible PidFile use */
2400 macdefine(&MainEnvelope.e_macro, A_TEMP,
2401 macid("{queue_interval}"), pintvl(QueueIntvl, true));
2402
2403 /* workaround: can't seem to release the signal in the parent */
2404 (void) sm_signal(SIGHUP, sighup);
2405 (void) sm_releasesignal(SIGHUP);
2406 (void) sm_signal(SIGTERM, sigterm);
2407
2408 if (QueueIntvl > 0)
2409 {
2410 #if _FFR_RUNPQG
2411 if (qgrp != NOQGRP)
2412 {
2413 int rwgflags = RWG_NONE;
2414
2415 /*
2416 ** To run a specific queue group mark it to
2417 ** be run, select the work group it's in and
2418 ** increment the work counter.
2419 */
2420
2421 for (i = 0; i < NumQueue && Queue[i] != NULL;
2422 i++)
2423 Queue[i]->qg_nextrun = (time_t) -1;
2424 Queue[qgrp]->qg_nextrun = 0;
2425 if (Verbose)
2426 rwgflags |= RWG_VERBOSE;
2427 if (queuepersistent)
2428 rwgflags |= RWG_PERSISTENT;
2429 rwgflags |= RWG_FORCE;
2430 (void) run_work_group(Queue[qgrp]->qg_wgrp,
2431 rwgflags);
2432 }
2433 else
2434 #endif /* _FFR_RUNPQG */
2435 (void) runqueue(true, false, queuepersistent,
2436 true);
2437
2438 /*
2439 ** If queuepersistent but not in daemon mode then
2440 ** we're going to do the queue runner monitoring here.
2441 ** If in daemon mode then the monitoring will happen
2442 ** elsewhere.
2443 */
2444
2445 if (OpMode != MD_DAEMON && queuepersistent)
2446 {
2447 /*
2448 ** Write the pid to file
2449 ** XXX Overwrites sendmail.pid
2450 */
2451
2452 log_sendmail_pid(&MainEnvelope);
2453
2454 /* set the title to make it easier to find */
2455 sm_setproctitle(true, CurEnv, "Queue control");
2456 (void) sm_signal(SIGCHLD, SIG_DFL);
2457 while (CurChildren > 0)
2458 {
2459 int status;
2460 pid_t ret;
2461 int group;
2462
2463 CHECK_RESTART;
2464 errno = 0;
2465 while ((ret = sm_wait(&status)) <= 0)
2466 {
2467 /*
2468 ** Waiting for non-existent
2469 ** children shouldn't happen.
2470 ** Let's get out of here if
2471 ** it occurs.
2472 */
2473
2474 if (errno == ECHILD)
2475 {
2476 CurChildren = 0;
2477 break;
2478 }
2479 continue;
2480 }
2481
2482 /* something is really really wrong */
2483 if (errno == ECHILD)
2484 {
2485 sm_syslog(LOG_ERR, NOQID,
2486 "persistent queue runner control process: lost all children: wait returned ECHILD");
2487 break;
2488 }
2489
2490 if (WIFSTOPPED(status))
2491 continue;
2492
2493 /* Probe only on a child status */
2494 proc_list_drop(ret, status, &group);
2495
2496 if (WIFSIGNALED(status))
2497 {
2498 if (WCOREDUMP(status))
2499 {
2500 sm_syslog(LOG_ERR, NOQID,
2501 "persistent queue runner=%d core dumped, signal=%d",
2502 group, WTERMSIG(status));
2503
2504 /* don't restart this */
2505 mark_work_group_restart(
2506 group, -1);
2507 continue;
2508 }
2509
2510 sm_syslog(LOG_ERR, NOQID,
2511 "persistent queue runner=%d died, pid=%ld, signal=%d",
2512 group, (long) ret,
2513 WTERMSIG(status));
2514 }
2515
2516 /*
2517 ** When debugging active, don't
2518 ** restart the persistent queues.
2519 ** But do log this as info.
2520 */
2521
2522 if (sm_debug_active(&DebugNoPRestart,
2523 1))
2524 {
2525 sm_syslog(LOG_DEBUG, NOQID,
2526 "persistent queue runner=%d, exited",
2527 group);
2528 mark_work_group_restart(group,
2529 -1);
2530 }
2531 CHECK_RESTART;
2532 }
2533 finis(true, true, ExitStat);
2534 /* NOTREACHED */
2535 }
2536
2537 if (OpMode != MD_DAEMON)
2538 {
2539 char qtype[200];
2540
2541 /*
2542 ** Write the pid to file
2543 ** XXX Overwrites sendmail.pid
2544 */
2545
2546 log_sendmail_pid(&MainEnvelope);
2547
2548 /* set the title to make it easier to find */
2549 qtype[0] = '\0';
2550 (void) sm_strlcpyn(qtype, sizeof(qtype), 4,
2551 "Queue runner@",
2552 pintvl(QueueIntvl, true),
2553 " for ",
2554 QueueDir);
2555 sm_setproctitle(true, CurEnv, qtype);
2556 for (;;)
2557 {
2558 (void) pause();
2559
2560 CHECK_RESTART;
2561
2562 if (doqueuerun())
2563 (void) runqueue(true, false,
2564 false, false);
2565 }
2566 }
2567 }
2568 (void) dropenvelope(&MainEnvelope, true, false);
2569
2570 #if STARTTLS
2571 /* init TLS for server, ignore result for now */
2572 (void) initsrvtls(tls_ok);
2573 #endif
2574
2575 nextreq:
2576 p_flags = getrequests(&MainEnvelope);
2577
2578 /* drop privileges */
2579 (void) drop_privileges(false);
2580
2581 /*
2582 ** Get authentication data
2583 ** Set _ macro in BlankEnvelope before calling newenvelope().
2584 */
2585
2586 #if _FFR_XCNCT
2587 if (bitnset(D_XCNCT, *p_flags) || bitnset(D_XCNCT_M, *p_flags))
2588 {
2589 /* copied from getauthinfo() */
2590 if (RealHostName == NULL)
2591 {
2592 RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr));
2593 if (strlen(RealHostName) > MAXNAME)
2594 RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */
2595 }
2596 snprintf(buf, sizeof(buf), "%s [%s]",
2597 RealHostName, anynet_ntoa(&RealHostAddr));
2598
2599 forged = bitnset(D_XCNCT_M, *p_flags);
2600 if (forged)
2601 {
2602 (void) sm_strlcat(buf, " (may be forged)",
2603 sizeof(buf));
2604 macdefine(&BlankEnvelope.e_macro, A_PERM,
2605 macid("{client_resolve}"), "FORGED");
2606 }
2607
2608 /* HACK! variable used only two times right below */
2609 authinfo = buf;
2610 if (tTd(75, 9))
2611 sm_syslog(LOG_INFO, NOQID,
2612 "main: where=not_calling_getauthinfo, RealHostAddr=%s",
2613 anynet_ntoa(&RealHostAddr));
2614 }
2615 else
2616 /* WARNING: "non-braced" else */
2617 #endif /* _FFR_XCNCT */
2618 authinfo = getauthinfo(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
2619 NULL), &forged);
2620 macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
2621 if (tTd(75, 9))
2622 sm_syslog(LOG_INFO, NOQID,
2623 "main: where=after_getauthinfo, RealHostAddr=%s",
2624 anynet_ntoa(&RealHostAddr));
2625
2626 /* at this point we are in a child: reset state */
2627 sm_rpool_free(MainEnvelope.e_rpool);
2628 (void) newenvelope(&MainEnvelope, &MainEnvelope,
2629 sm_rpool_new_x(NULL));
2630 }
2631
2632 if (LogLevel > 9)
2633 {
2634 p = authinfo;
2635 if (NULL == p)
2636 {
2637 if (NULL != RealHostName)
2638 p = RealHostName;
2639 else
2640 p = anynet_ntoa(&RealHostAddr);
2641 if (NULL == p)
2642 p = "unknown";
2643 }
2644
2645 /* log connection information */
2646 sm_syslog(LOG_INFO, NULL, "connect from %s", p);
2647 }
2648
2649 /*
2650 ** If running SMTP protocol, start collecting and executing
2651 ** commands. This will never return.
2652 */
2653
2654 if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2655 {
2656 char pbuf[20];
2657
2658 /*
2659 ** Save some macros for check_* rulesets.
2660 */
2661
2662 if (forged)
2663 {
2664 char ipbuf[103];
2665
2666 (void) sm_snprintf(ipbuf, sizeof(ipbuf), "[%.100s]",
2667 anynet_ntoa(&RealHostAddr));
2668 macdefine(&BlankEnvelope.e_macro, A_TEMP,
2669 macid("{client_name}"), ipbuf);
2670 }
2671 else
2672 macdefine(&BlankEnvelope.e_macro, A_PERM,
2673 macid("{client_name}"), RealHostName);
2674 macdefine(&BlankEnvelope.e_macro, A_PERM,
2675 macid("{client_ptr}"), RealHostName);
2676 macdefine(&BlankEnvelope.e_macro, A_TEMP,
2677 macid("{client_addr}"), anynet_ntoa(&RealHostAddr));
2678 sm_getla();
2679
2680 switch (RealHostAddr.sa.sa_family)
2681 {
2682 #if NETINET
2683 case AF_INET:
2684 (void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2685 ntohs(RealHostAddr.sin.sin_port));
2686 break;
2687 #endif /* NETINET */
2688 #if NETINET6
2689 case AF_INET6:
2690 (void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2691 ntohs(RealHostAddr.sin6.sin6_port));
2692 break;
2693 #endif /* NETINET6 */
2694 default:
2695 (void) sm_snprintf(pbuf, sizeof(pbuf), "0");
2696 break;
2697 }
2698 macdefine(&BlankEnvelope.e_macro, A_TEMP,
2699 macid("{client_port}"), pbuf);
2700
2701 if (OpMode == MD_DAEMON)
2702 {
2703 ENVELOPE *saved_env;
2704
2705 /* validate the connection */
2706 HoldErrs = true;
2707 saved_env = CurEnv;
2708 CurEnv = &BlankEnvelope;
2709 nullserver = validate_connection(&RealHostAddr,
2710 macvalue(macid("{client_name}"),
2711 &BlankEnvelope),
2712 &BlankEnvelope);
2713 if (bitset(EF_DISCARD, BlankEnvelope.e_flags))
2714 MainEnvelope.e_flags |= EF_DISCARD;
2715 CurEnv = saved_env;
2716 HoldErrs = false;
2717 }
2718 else if (p_flags == NULL)
2719 {
2720 p_flags = (BITMAP256 *) xalloc(sizeof(*p_flags));
2721 clrbitmap(p_flags);
2722 }
2723 #if STARTTLS
2724 if (OpMode == MD_SMTP)
2725 (void) initsrvtls(tls_ok);
2726 #endif
2727
2728 /* turn off profiling */
2729 SM_PROF(1);
2730 smtp(nullserver, *p_flags, &MainEnvelope);
2731
2732 if (tTd(93, 100))
2733 {
2734 /* turn off profiling */
2735 SM_PROF(0);
2736 if (OpMode == MD_DAEMON)
2737 goto nextreq;
2738 }
2739 }
2740
2741 sm_rpool_free(MainEnvelope.e_rpool);
2742 clearenvelope(&MainEnvelope, false, sm_rpool_new_x(NULL));
2743 if (OpMode == MD_VERIFY)
2744 {
2745 set_delivery_mode(SM_VERIFY, &MainEnvelope);
2746 PostMasterCopy = NULL;
2747 }
2748 else
2749 {
2750 /* interactive -- all errors are global */
2751 MainEnvelope.e_flags |= EF_GLOBALERRS|EF_LOGSENDER;
2752 }
2753
2754 /*
2755 ** Do basic system initialization and set the sender
2756 */
2757
2758 initsys(&MainEnvelope);
2759 macdefine(&MainEnvelope.e_macro, A_PERM, macid("{ntries}"), "0");
2760 macdefine(&MainEnvelope.e_macro, A_PERM, macid("{nrcpts}"), "0");
2761 setsender(from, &MainEnvelope, NULL, '\0', false);
2762 if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') &&
2763 (!bitnset(M_LOCALMAILER, MainEnvelope.e_from.q_mailer->m_flags) ||
2764 strcmp(MainEnvelope.e_from.q_user, RealUserName) != 0))
2765 {
2766 auth_warning(&MainEnvelope, "%s set sender to %s using -%c",
2767 RealUserName, from, warn_f_flag);
2768 #if SASL
2769 auth = false;
2770 #endif
2771 }
2772 if (auth)
2773 {
2774 char *fv;
2775
2776 /* set the initial sender for AUTH= to $f@$j */
2777 fv = macvalue('f', &MainEnvelope);
2778 if (fv == NULL || *fv == '\0')
2779 MainEnvelope.e_auth_param = NULL;
2780 else
2781 {
2782 if (strchr(fv, '@') == NULL)
2783 {
2784 i = strlen(fv) + strlen(macvalue('j',
2785 &MainEnvelope)) + 2;
2786 p = sm_malloc_x(i);
2787 (void) sm_strlcpyn(p, i, 3, fv, "@",
2788 macvalue('j',
2789 &MainEnvelope));
2790 }
2791 else
2792 p = sm_strdup_x(fv);
2793 MainEnvelope.e_auth_param = sm_rpool_strdup_x(MainEnvelope.e_rpool,
2794 xtextify(p, "="));
2795 sm_free(p); /* XXX */
2796 }
2797 }
2798 if (macvalue('s', &MainEnvelope) == NULL)
2799 macdefine(&MainEnvelope.e_macro, A_PERM, 's', RealHostName);
2800
2801 av = argv + optind;
2802 if (*av == NULL && !GrabTo)
2803 {
2804 MainEnvelope.e_to = NULL;
2805 MainEnvelope.e_flags |= EF_GLOBALERRS;
2806 HoldErrs = false;
2807 SuperSafe = SAFE_NO;
2808 usrerr("Recipient names must be specified");
2809
2810 /* collect body for UUCP return */
2811 if (OpMode != MD_VERIFY)
2812 collect(InChannel, false, NULL, &MainEnvelope, true);
2813 finis(true, true, EX_USAGE);
2814 /* NOTREACHED */
2815 }
2816
2817 /*
2818 ** Scan argv and deliver the message to everyone.
2819 */
2820
2821 save_val = LogUsrErrs;
2822 LogUsrErrs = true;
2823 sendtoargv(av, &MainEnvelope);
2824 LogUsrErrs = save_val;
2825
2826 /* if we have had errors sofar, arrange a meaningful exit stat */
2827 if (Errors > 0 && ExitStat == EX_OK)
2828 ExitStat = EX_USAGE;
2829
2830 #if _FFR_FIX_DASHT
2831 /*
2832 ** If using -t, force not sending to argv recipients, even
2833 ** if they are mentioned in the headers.
2834 */
2835
2836 if (GrabTo)
2837 {
2838 ADDRESS *q;
2839
2840 for (q = MainEnvelope.e_sendqueue; q != NULL; q = q->q_next)
2841 q->q_state = QS_REMOVED;
2842 }
2843 #endif /* _FFR_FIX_DASHT */
2844
2845 /*
2846 ** Read the input mail.
2847 */
2848
2849 MainEnvelope.e_to = NULL;
2850 if (OpMode != MD_VERIFY || GrabTo)
2851 {
2852 int savederrors;
2853 unsigned long savedflags;
2854
2855 /*
2856 ** workaround for compiler warning on Irix:
2857 ** do not initialize variable in the definition, but
2858 ** later on:
2859 ** warning(1548): transfer of control bypasses
2860 ** initialization of:
2861 ** variable "savederrors" (declared at line 2570)
2862 ** variable "savedflags" (declared at line 2571)
2863 ** goto giveup;
2864 */
2865
2866 savederrors = Errors;
2867 savedflags = MainEnvelope.e_flags & EF_FATALERRS;
2868 MainEnvelope.e_flags |= EF_GLOBALERRS;
2869 MainEnvelope.e_flags &= ~EF_FATALERRS;
2870 Errors = 0;
2871 buffer_errors();
2872 collect(InChannel, false, NULL, &MainEnvelope, true);
2873
2874 /* header checks failed */
2875 if (Errors > 0)
2876 {
2877 giveup:
2878 if (!GrabTo)
2879 {
2880 /* Log who the mail would have gone to */
2881 logundelrcpts(&MainEnvelope,
2882 MainEnvelope.e_message,
2883 8, false);
2884 }
2885 flush_errors(true);
2886 finis(true, true, ExitStat);
2887 /* NOTREACHED */
2888 return -1;
2889 }
2890
2891 /* bail out if message too large */
2892 if (bitset(EF_CLRQUEUE, MainEnvelope.e_flags))
2893 {
2894 finis(true, true, ExitStat != EX_OK ? ExitStat
2895 : EX_DATAERR);
2896 /* NOTREACHED */
2897 return -1;
2898 }
2899
2900 /* set message size */
2901 (void) sm_snprintf(buf, sizeof(buf), "%ld",
2902 PRT_NONNEGL(MainEnvelope.e_msgsize));
2903 macdefine(&MainEnvelope.e_macro, A_TEMP,
2904 macid("{msg_size}"), buf);
2905
2906 Errors = savederrors;
2907 MainEnvelope.e_flags |= savedflags;
2908 }
2909 errno = 0;
2910
2911 if (tTd(1, 1))
2912 sm_dprintf("From person = \"%s\"\n",
2913 MainEnvelope.e_from.q_paddr);
2914
2915 /* Check if quarantining stats should be updated */
2916 if (MainEnvelope.e_quarmsg != NULL)
2917 markstats(&MainEnvelope, NULL, STATS_QUARANTINE);
2918
2919 /*
2920 ** Actually send everything.
2921 ** If verifying, just ack.
2922 */
2923
2924 if (Errors == 0)
2925 {
2926 if (!split_by_recipient(&MainEnvelope) &&
2927 bitset(EF_FATALERRS, MainEnvelope.e_flags))
2928 goto giveup;
2929 }
2930
2931 /* make sure we deliver at least the first envelope */
2932 i = FastSplit > 0 ? 0 : -1;
2933 for (e = &MainEnvelope; e != NULL; e = e->e_sibling, i++)
2934 {
2935 ENVELOPE *next;
2936
2937 e->e_from.q_state = QS_SENDER;
2938 if (tTd(1, 5))
2939 {
2940 sm_dprintf("main[%d]: QS_SENDER ", i);
2941 printaddr(sm_debug_file(), &e->e_from, false);
2942 }
2943 e->e_to = NULL;
2944 sm_getla();
2945 GrabTo = false;
2946 #if NAMED_BIND
2947 _res.retry = TimeOuts.res_retry[RES_TO_FIRST];
2948 _res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
2949 #endif
2950 next = e->e_sibling;
2951 e->e_sibling = NULL;
2952
2953 /* after FastSplit envelopes: queue up */
2954 sendall(e, i >= FastSplit ? SM_QUEUE : SM_DEFAULT);
2955 e->e_sibling = next;
2956 }
2957
2958 /*
2959 ** All done.
2960 ** Don't send return error message if in VERIFY mode.
2961 */
2962
2963 finis(true, true, ExitStat);
2964 /* NOTREACHED */
2965 return ExitStat;
2966 }
2967 /*
2968 ** STOP_SENDMAIL -- Stop the running program
2969 **
2970 ** Parameters:
2971 ** none.
2972 **
2973 ** Returns:
2974 ** none.
2975 **
2976 ** Side Effects:
2977 ** exits.
2978 */
2979
2980 void
stop_sendmail()2981 stop_sendmail()
2982 {
2983 /* reset uid for process accounting */
2984 endpwent();
2985 (void) setuid(RealUid);
2986 exit(EX_OK);
2987 }
2988 /*
2989 ** FINIS -- Clean up and exit.
2990 **
2991 ** Parameters:
2992 ** drop -- whether or not to drop CurEnv envelope
2993 ** cleanup -- call exit() or _exit()?
2994 ** exitstat -- exit status to use for exit() call
2995 **
2996 ** Returns:
2997 ** never
2998 **
2999 ** Side Effects:
3000 ** exits sendmail
3001 */
3002
3003 void
finis(drop,cleanup,exitstat)3004 finis(drop, cleanup, exitstat)
3005 bool drop;
3006 bool cleanup;
3007 volatile int exitstat;
3008 {
3009 char pidpath[MAXPATHLEN];
3010 pid_t pid;
3011
3012 /* Still want to process new timeouts added below */
3013 sm_clear_events();
3014 (void) sm_releasesignal(SIGALRM);
3015
3016 #if RATECTL_DEBUG || _FFR_OCC
3017 /* do this only in "main" process */
3018 if (DaemonPid == getpid())
3019 {
3020 SM_FILE_T *fp;
3021
3022 fp = sm_debug_file();
3023 if (fp != NULL)
3024 dump_ch(fp);
3025 }
3026 #endif
3027 if (tTd(2, 1))
3028 {
3029 sm_dprintf("\n====finis: stat %d e_id=%s e_flags=",
3030 exitstat,
3031 CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id);
3032 printenvflags(CurEnv);
3033 }
3034 if (tTd(2, 9))
3035 printopenfds(false);
3036
3037 SM_TRY
3038 /*
3039 ** Clean up. This might raise E:mta.quickabort
3040 */
3041
3042 /* clean up temp files */
3043 CurEnv->e_to = NULL;
3044 if (drop)
3045 {
3046 if (CurEnv->e_id != NULL)
3047 {
3048 int r;
3049
3050 r = dropenvelope(CurEnv, true, false);
3051 if (exitstat == EX_OK)
3052 exitstat = r;
3053 sm_rpool_free(CurEnv->e_rpool);
3054 CurEnv->e_rpool = NULL;
3055
3056 /* these may have pointed to the rpool */
3057 CurEnv->e_to = NULL;
3058 CurEnv->e_message = NULL;
3059 CurEnv->e_statmsg = NULL;
3060 CurEnv->e_quarmsg = NULL;
3061 CurEnv->e_bodytype = NULL;
3062 CurEnv->e_id = NULL;
3063 CurEnv->e_envid = NULL;
3064 CurEnv->e_auth_param = NULL;
3065 }
3066 else
3067 poststats(StatFile);
3068 }
3069
3070 /* flush any cached connections */
3071 mci_flush(true, NULL);
3072
3073 /* close maps belonging to this pid */
3074 closemaps(false);
3075
3076 #if USERDB
3077 /* close UserDatabase */
3078 _udbx_close();
3079 #endif
3080
3081 #if SASL
3082 stop_sasl_client();
3083 #endif
3084
3085 #if XLA
3086 /* clean up extended load average stuff */
3087 xla_all_end();
3088 #endif
3089
3090 SM_FINALLY
3091 /*
3092 ** And exit.
3093 */
3094
3095 if (LogLevel > 78)
3096 sm_syslog(LOG_DEBUG, CurEnv->e_id, "finis, pid=%d",
3097 (int) CurrentPid);
3098 if (exitstat == EX_TEMPFAIL ||
3099 CurEnv->e_errormode == EM_BERKNET)
3100 exitstat = EX_OK;
3101
3102 /* XXX clean up queues and related data structures */
3103 cleanup_queues();
3104 pid = getpid();
3105 #if SM_CONF_SHM
3106 cleanup_shm(DaemonPid == pid);
3107 #endif
3108
3109 /* close locked pid file */
3110 close_sendmail_pid();
3111
3112 if (DaemonPid == pid || PidFilePid == pid)
3113 {
3114 /* blow away the pid file */
3115 expand(PidFile, pidpath, sizeof(pidpath), CurEnv);
3116 (void) unlink(pidpath);
3117 }
3118
3119 /* reset uid for process accounting */
3120 endpwent();
3121 sm_mbdb_terminate();
3122 #if _FFR_MEMSTAT
3123 (void) sm_memstat_close();
3124 #endif
3125 (void) setuid(RealUid);
3126 #if SM_HEAP_CHECK
3127 /* dump the heap, if we are checking for memory leaks */
3128 if (sm_debug_active(&SmHeapCheck, 2))
3129 sm_heap_report(smioout,
3130 sm_debug_level(&SmHeapCheck) - 1);
3131 #endif
3132 if (sm_debug_active(&SmXtrapReport, 1))
3133 sm_dprintf("xtrap count = %d\n", SmXtrapCount);
3134 if (cleanup)
3135 exit(exitstat);
3136 else
3137 _exit(exitstat);
3138 SM_END_TRY
3139 }
3140 /*
3141 ** INTINDEBUG -- signal handler for SIGINT in -bt mode
3142 **
3143 ** Parameters:
3144 ** sig -- incoming signal.
3145 **
3146 ** Returns:
3147 ** none.
3148 **
3149 ** Side Effects:
3150 ** longjmps back to test mode loop.
3151 **
3152 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3153 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3154 ** DOING.
3155 */
3156
3157 /* Type of an exception generated on SIGINT during address test mode. */
3158 static const SM_EXC_TYPE_T EtypeInterrupt =
3159 {
3160 SmExcTypeMagic,
3161 "S:mta.interrupt",
3162 "",
3163 sm_etype_printf,
3164 "interrupt",
3165 };
3166
3167 /* ARGSUSED */
3168 static SIGFUNC_DECL
intindebug(sig)3169 intindebug(sig)
3170 int sig;
3171 {
3172 int save_errno = errno;
3173
3174 FIX_SYSV_SIGNAL(sig, intindebug);
3175 errno = save_errno;
3176 CHECK_CRITICAL(sig);
3177 errno = save_errno;
3178 sm_exc_raisenew_x(&EtypeInterrupt);
3179 errno = save_errno;
3180 return SIGFUNC_RETURN;
3181 }
3182 /*
3183 ** SIGTERM -- SIGTERM handler for the daemon
3184 **
3185 ** Parameters:
3186 ** sig -- signal number.
3187 **
3188 ** Returns:
3189 ** none.
3190 **
3191 ** Side Effects:
3192 ** Sets ShutdownRequest which will hopefully trigger
3193 ** the daemon to exit.
3194 **
3195 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3196 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3197 ** DOING.
3198 */
3199
3200 /* ARGSUSED */
3201 static SIGFUNC_DECL
sigterm(sig)3202 sigterm(sig)
3203 int sig;
3204 {
3205 int save_errno = errno;
3206
3207 FIX_SYSV_SIGNAL(sig, sigterm);
3208 ShutdownRequest = "signal";
3209 errno = save_errno;
3210 return SIGFUNC_RETURN;
3211 }
3212 /*
3213 ** SIGHUP -- handle a SIGHUP signal
3214 **
3215 ** Parameters:
3216 ** sig -- incoming signal.
3217 **
3218 ** Returns:
3219 ** none.
3220 **
3221 ** Side Effects:
3222 ** Sets RestartRequest which should cause the daemon
3223 ** to restart.
3224 **
3225 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3226 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3227 ** DOING.
3228 */
3229
3230 /* ARGSUSED */
3231 static SIGFUNC_DECL
sighup(sig)3232 sighup(sig)
3233 int sig;
3234 {
3235 int save_errno = errno;
3236
3237 FIX_SYSV_SIGNAL(sig, sighup);
3238 RestartRequest = "signal";
3239 errno = save_errno;
3240 return SIGFUNC_RETURN;
3241 }
3242 /*
3243 ** SIGPIPE -- signal handler for SIGPIPE
3244 **
3245 ** Parameters:
3246 ** sig -- incoming signal.
3247 **
3248 ** Returns:
3249 ** none.
3250 **
3251 ** Side Effects:
3252 ** Sets StopRequest which should cause the mailq/hoststatus
3253 ** display to stop.
3254 **
3255 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3256 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3257 ** DOING.
3258 */
3259
3260 /* ARGSUSED */
3261 static SIGFUNC_DECL
sigpipe(sig)3262 sigpipe(sig)
3263 int sig;
3264 {
3265 int save_errno = errno;
3266
3267 FIX_SYSV_SIGNAL(sig, sigpipe);
3268 StopRequest = true;
3269 errno = save_errno;
3270 return SIGFUNC_RETURN;
3271 }
3272 /*
3273 ** INTSIG -- clean up on interrupt
3274 **
3275 ** This just arranges to exit. It pessimizes in that it
3276 ** may resend a message.
3277 **
3278 ** Parameters:
3279 ** sig -- incoming signal.
3280 **
3281 ** Returns:
3282 ** none.
3283 **
3284 ** Side Effects:
3285 ** Unlocks the current job.
3286 **
3287 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3288 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3289 ** DOING.
3290 */
3291
3292 /* ARGSUSED */
3293 SIGFUNC_DECL
intsig(sig)3294 intsig(sig)
3295 int sig;
3296 {
3297 bool drop = false;
3298 int save_errno = errno;
3299
3300 FIX_SYSV_SIGNAL(sig, intsig);
3301 errno = save_errno;
3302 CHECK_CRITICAL(sig);
3303 sm_allsignals(true);
3304 IntSig = true;
3305
3306 FileName = NULL;
3307
3308 /* Clean-up on aborted stdin message submission */
3309 if (OpMode == MD_SMTP ||
3310 OpMode == MD_DELIVER ||
3311 OpMode == MD_ARPAFTP)
3312 {
3313 if (CurEnv->e_id != NULL)
3314 {
3315 char *fn;
3316
3317 fn = queuename(CurEnv, DATAFL_LETTER);
3318 if (fn != NULL)
3319 (void) unlink(fn);
3320 fn = queuename(CurEnv, ANYQFL_LETTER);
3321 if (fn != NULL)
3322 (void) unlink(fn);
3323 }
3324 _exit(EX_OK);
3325 /* NOTREACHED */
3326 }
3327
3328 if (sig != 0 && LogLevel > 79)
3329 sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt");
3330 if (OpMode != MD_TEST)
3331 unlockqueue(CurEnv);
3332
3333 finis(drop, false, EX_OK);
3334 /* NOTREACHED */
3335 }
3336 /*
3337 ** DISCONNECT -- remove our connection with any foreground process
3338 **
3339 ** Parameters:
3340 ** droplev -- how "deeply" we should drop the line.
3341 ** 0 -- ignore signals, mail back errors, make sure
3342 ** output goes to stdout.
3343 ** 1 -- also, make stdout go to /dev/null.
3344 ** 2 -- also, disconnect from controlling terminal
3345 ** (only for daemon mode).
3346 ** e -- the current envelope.
3347 **
3348 ** Returns:
3349 ** none
3350 **
3351 ** Side Effects:
3352 ** Trys to insure that we are immune to vagaries of
3353 ** the controlling tty.
3354 */
3355
3356 void
disconnect(droplev,e)3357 disconnect(droplev, e)
3358 int droplev;
3359 register ENVELOPE *e;
3360 {
3361 int fd;
3362
3363 if (tTd(52, 1))
3364 sm_dprintf("disconnect: In %d Out %d, e=%p\n",
3365 sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL),
3366 sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL),
3367 (void *)e);
3368 if (tTd(52, 100))
3369 {
3370 sm_dprintf("don't\n");
3371 return;
3372 }
3373 if (LogLevel > 93)
3374 sm_syslog(LOG_DEBUG, e->e_id,
3375 "disconnect level %d",
3376 droplev);
3377
3378 /* be sure we don't get nasty signals */
3379 (void) sm_signal(SIGINT, SIG_IGN);
3380 (void) sm_signal(SIGQUIT, SIG_IGN);
3381
3382 /* we can't communicate with our caller, so.... */
3383 HoldErrs = true;
3384 CurEnv->e_errormode = EM_MAIL;
3385 Verbose = 0;
3386 DisConnected = true;
3387
3388 /* all input from /dev/null */
3389 if (InChannel != smioin)
3390 {
3391 (void) sm_io_close(InChannel, SM_TIME_DEFAULT);
3392 InChannel = smioin;
3393 }
3394 if (sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3395 SM_IO_RDONLY, NULL, smioin) == NULL)
3396 sm_syslog(LOG_ERR, e->e_id,
3397 "disconnect: sm_io_reopen(\"%s\") failed: %s",
3398 SM_PATH_DEVNULL, sm_errstring(errno));
3399
3400 /*
3401 ** output to the transcript
3402 ** We also compare the fd numbers here since OutChannel
3403 ** might be a layer on top of smioout due to encryption
3404 ** (see sfsasl.c).
3405 */
3406
3407 if (OutChannel != smioout &&
3408 sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL) !=
3409 sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL))
3410 {
3411 (void) sm_io_close(OutChannel, SM_TIME_DEFAULT);
3412 OutChannel = smioout;
3413
3414 #if 0
3415 /*
3416 ** Has smioout been closed? Reopen it.
3417 ** This shouldn't happen anymore, the code is here
3418 ** just as a reminder.
3419 */
3420
3421 if (smioout->sm_magic == NULL &&
3422 sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3423 SM_IO_WRONLY, NULL, smioout) == NULL)
3424 sm_syslog(LOG_ERR, e->e_id,
3425 "disconnect: sm_io_reopen(\"%s\") failed: %s",
3426 SM_PATH_DEVNULL, sm_errstring(errno));
3427 #endif /* 0 */
3428 }
3429 if (droplev > 0)
3430 {
3431 fd = open(SM_PATH_DEVNULL, O_WRONLY, 0666);
3432 if (fd == -1)
3433 {
3434 sm_syslog(LOG_ERR, e->e_id,
3435 "disconnect: open(\"%s\") failed: %s",
3436 SM_PATH_DEVNULL, sm_errstring(errno));
3437 }
3438 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
3439 if (fd >= 0)
3440 {
3441 (void) dup2(fd, STDOUT_FILENO);
3442 (void) dup2(fd, STDERR_FILENO);
3443 (void) close(fd);
3444 }
3445 }
3446
3447 /* drop our controlling TTY completely if possible */
3448 if (droplev > 1)
3449 {
3450 (void) setsid();
3451 errno = 0;
3452 }
3453
3454 #if XDEBUG
3455 checkfd012("disconnect");
3456 #endif
3457
3458 if (LogLevel > 71)
3459 sm_syslog(LOG_DEBUG, e->e_id, "in background, pid=%d",
3460 (int) CurrentPid);
3461
3462 errno = 0;
3463 }
3464
3465 static void
obsolete(argv)3466 obsolete(argv)
3467 char *argv[];
3468 {
3469 register char *ap;
3470 register char *op;
3471
3472 while ((ap = *++argv) != NULL)
3473 {
3474 /* Return if "--" or not an option of any form. */
3475 if (ap[0] != '-' || ap[1] == '-')
3476 return;
3477
3478 /* Don't allow users to use "-Q." or "-Q ." */
3479 if ((ap[1] == 'Q' && ap[2] == '.') ||
3480 (ap[1] == 'Q' && argv[1] != NULL &&
3481 argv[1][0] == '.' && argv[1][1] == '\0'))
3482 {
3483 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
3484 "Can not use -Q.\n");
3485 exit(EX_USAGE);
3486 }
3487
3488 /* skip over options that do have a value */
3489 op = strchr(OPTIONS, ap[1]);
3490 if (op != NULL && *++op == ':' && ap[2] == '\0' &&
3491 ap[1] != 'd' &&
3492 #if defined(sony_news)
3493 ap[1] != 'E' && ap[1] != 'J' &&
3494 #endif
3495 argv[1] != NULL && argv[1][0] != '-')
3496 {
3497 argv++;
3498 continue;
3499 }
3500
3501 /* If -C doesn't have an argument, use sendmail.cf. */
3502 #define __DEFPATH "sendmail.cf"
3503 if (ap[1] == 'C' && ap[2] == '\0')
3504 {
3505 *argv = xalloc(sizeof(__DEFPATH) + 2);
3506 (void) sm_strlcpyn(argv[0], sizeof(__DEFPATH) + 2, 2,
3507 "-C", __DEFPATH);
3508 }
3509
3510 /* If -q doesn't have an argument, run it once. */
3511 if (ap[1] == 'q' && ap[2] == '\0')
3512 *argv = "-q0";
3513
3514 /* If -Q doesn't have an argument, disable quarantining */
3515 if (ap[1] == 'Q' && ap[2] == '\0')
3516 *argv = "-Q.";
3517
3518 /* if -d doesn't have an argument, use 0-99.1 */
3519 if (ap[1] == 'd' && ap[2] == '\0')
3520 *argv = "-d0-99.1";
3521
3522 #if defined(sony_news)
3523 /* if -E doesn't have an argument, use -EC */
3524 if (ap[1] == 'E' && ap[2] == '\0')
3525 *argv = "-EC";
3526
3527 /* if -J doesn't have an argument, use -JJ */
3528 if (ap[1] == 'J' && ap[2] == '\0')
3529 *argv = "-JJ";
3530 #endif /* defined(sony_news) */
3531 }
3532 }
3533 /*
3534 ** AUTH_WARNING -- specify authorization warning
3535 **
3536 ** Parameters:
3537 ** e -- the current envelope.
3538 ** msg -- the text of the message.
3539 ** args -- arguments to the message.
3540 **
3541 ** Returns:
3542 ** none.
3543 */
3544
3545 void
3546 #ifdef __STDC__
auth_warning(register ENVELOPE * e,const char * msg,...)3547 auth_warning(register ENVELOPE *e, const char *msg, ...)
3548 #else /* __STDC__ */
3549 auth_warning(e, msg, va_alist)
3550 register ENVELOPE *e;
3551 const char *msg;
3552 va_dcl
3553 #endif /* __STDC__ */
3554 {
3555 char buf[MAXLINE];
3556 SM_VA_LOCAL_DECL
3557
3558 if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags))
3559 {
3560 register char *p;
3561 static char hostbuf[48];
3562
3563 if (hostbuf[0] == '\0')
3564 {
3565 struct hostent *hp;
3566
3567 hp = myhostname(hostbuf, sizeof(hostbuf));
3568 #if NETINET6
3569 if (hp != NULL)
3570 {
3571 freehostent(hp);
3572 hp = NULL;
3573 }
3574 #endif /* NETINET6 */
3575 }
3576
3577 (void) sm_strlcpyn(buf, sizeof(buf), 2, hostbuf, ": ");
3578 p = &buf[strlen(buf)];
3579 SM_VA_START(ap, msg);
3580 (void) sm_vsnprintf(p, SPACELEFT(buf, p), msg, ap);
3581 SM_VA_END(ap);
3582 addheader("X-Authentication-Warning", buf, 0, e, true);
3583 if (LogLevel > 3)
3584 sm_syslog(LOG_INFO, e->e_id,
3585 "Authentication-Warning: %.400s",
3586 buf);
3587 }
3588 }
3589 /*
3590 ** GETEXTENV -- get from external environment
3591 **
3592 ** Parameters:
3593 ** envar -- the name of the variable to retrieve
3594 **
3595 ** Returns:
3596 ** The value, if any.
3597 */
3598
3599 static char *
getextenv(envar)3600 getextenv(envar)
3601 const char *envar;
3602 {
3603 char **envp;
3604 int l;
3605
3606 l = strlen(envar);
3607 for (envp = ExternalEnviron; envp != NULL && *envp != NULL; envp++)
3608 {
3609 if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=')
3610 return &(*envp)[l + 1];
3611 }
3612 return NULL;
3613 }
3614 /*
3615 ** SM_SETUSERENV -- set an environment variable in the propagated environment
3616 **
3617 ** Parameters:
3618 ** envar -- the name of the environment variable.
3619 ** value -- the value to which it should be set. If
3620 ** null, this is extracted from the incoming
3621 ** environment. If that is not set, the call
3622 ** to sm_setuserenv is ignored.
3623 **
3624 ** Returns:
3625 ** none.
3626 */
3627
3628 void
sm_setuserenv(envar,value)3629 sm_setuserenv(envar, value)
3630 const char *envar;
3631 const char *value;
3632 {
3633 int i, l;
3634 char **evp = UserEnviron;
3635 char *p;
3636
3637 if (value == NULL)
3638 {
3639 value = getextenv(envar);
3640 if (value == NULL)
3641 return;
3642 }
3643
3644 /* XXX enforce reasonable size? */
3645 i = strlen(envar) + 1;
3646 l = strlen(value) + i + 1;
3647 p = (char *) xalloc(l);
3648 (void) sm_strlcpyn(p, l, 3, envar, "=", value);
3649
3650 while (*evp != NULL && strncmp(*evp, p, i) != 0)
3651 evp++;
3652 if (*evp != NULL)
3653 {
3654 *evp++ = p;
3655 }
3656 else if (evp < &UserEnviron[MAXUSERENVIRON])
3657 {
3658 *evp++ = p;
3659 *evp = NULL;
3660 }
3661
3662 /* make sure it is in our environment as well */
3663 if (putenv(p) < 0)
3664 syserr("sm_setuserenv: putenv(%s) failed", p);
3665 }
3666 /*
3667 ** DUMPSTATE -- dump state
3668 **
3669 ** For debugging.
3670 */
3671
3672 void
dumpstate(when)3673 dumpstate(when)
3674 char *when;
3675 {
3676 register char *j = macvalue('j', CurEnv);
3677 int rs;
3678 extern int NextMacroId;
3679
3680 sm_syslog(LOG_DEBUG, CurEnv->e_id,
3681 "--- dumping state on %s: $j = %s ---",
3682 when,
3683 j == NULL ? "<NULL>" : j);
3684 if (j != NULL)
3685 {
3686 if (!wordinclass(j, 'w'))
3687 sm_syslog(LOG_DEBUG, CurEnv->e_id,
3688 "*** $j not in $=w ***");
3689 }
3690 sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren);
3691 sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)",
3692 NextMacroId, MAXMACROID);
3693 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---");
3694 printopenfds(true);
3695 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---");
3696 mci_dump_all(smioout, true);
3697 rs = strtorwset("debug_dumpstate", NULL, ST_FIND);
3698 if (rs > 0)
3699 {
3700 int status;
3701 register char **pvp;
3702 char *pv[MAXATOM + 1];
3703
3704 pv[0] = NULL;
3705 status = REWRITE(pv, rs, CurEnv);
3706 sm_syslog(LOG_DEBUG, CurEnv->e_id,
3707 "--- ruleset debug_dumpstate returns stat %d, pv: ---",
3708 status);
3709 for (pvp = pv; *pvp != NULL; pvp++)
3710 sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp);
3711 }
3712 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---");
3713 }
3714
3715 #ifdef SIGUSR1
3716 /*
3717 ** SIGUSR1 -- Signal a request to dump state.
3718 **
3719 ** Parameters:
3720 ** sig -- calling signal.
3721 **
3722 ** Returns:
3723 ** none.
3724 **
3725 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD
3726 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3727 ** DOING.
3728 **
3729 ** XXX: More work is needed for this signal handler.
3730 */
3731
3732 /* ARGSUSED */
3733 static SIGFUNC_DECL
sigusr1(sig)3734 sigusr1(sig)
3735 int sig;
3736 {
3737 int save_errno = errno;
3738
3739 FIX_SYSV_SIGNAL(sig, sigusr1);
3740 errno = save_errno;
3741 CHECK_CRITICAL(sig);
3742 dumpstate("user signal");
3743 # if SM_HEAP_CHECK
3744 dumpstab();
3745 # endif
3746 errno = save_errno;
3747 return SIGFUNC_RETURN;
3748 }
3749 #endif /* SIGUSR1 */
3750
3751 /*
3752 ** DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option
3753 **
3754 ** Parameters:
3755 ** to_real_uid -- if set, drop to the real uid instead
3756 ** of the RunAsUser.
3757 **
3758 ** Returns:
3759 ** EX_OSERR if the setuid failed.
3760 ** EX_OK otherwise.
3761 */
3762
3763 int
drop_privileges(to_real_uid)3764 drop_privileges(to_real_uid)
3765 bool to_real_uid;
3766 {
3767 int rval = EX_OK;
3768 GIDSET_T emptygidset[1];
3769
3770 if (tTd(47, 1))
3771 sm_dprintf("drop_privileges(%d): Real[UG]id=%ld:%ld, get[ug]id=%ld:%ld, gete[ug]id=%ld:%ld, RunAs[UG]id=%ld:%ld\n",
3772 (int) to_real_uid,
3773 (long) RealUid, (long) RealGid,
3774 (long) getuid(), (long) getgid(),
3775 (long) geteuid(), (long) getegid(),
3776 (long) RunAsUid, (long) RunAsGid);
3777
3778 if (to_real_uid)
3779 {
3780 RunAsUserName = RealUserName;
3781 RunAsUid = RealUid;
3782 RunAsGid = RealGid;
3783 EffGid = RunAsGid;
3784 }
3785
3786 /* make sure no one can grab open descriptors for secret files */
3787 endpwent();
3788 sm_mbdb_terminate();
3789
3790 /* reset group permissions; these can be set later */
3791 emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid();
3792
3793 /*
3794 ** Notice: on some OS (Linux...) the setgroups() call causes
3795 ** a logfile entry if sendmail is not run by root.
3796 ** However, it is unclear (no POSIX standard) whether
3797 ** setgroups() can only succeed if executed by root.
3798 ** So for now we keep it as it is; if you want to change it, use
3799 ** if (geteuid() == 0 && setgroups(1, emptygidset) == -1)
3800 */
3801
3802 if (setgroups(1, emptygidset) == -1 && geteuid() == 0)
3803 {
3804 syserr("drop_privileges: setgroups(1, %d) failed",
3805 (int) emptygidset[0]);
3806 rval = EX_OSERR;
3807 }
3808
3809 /* reset primary group id */
3810 if (to_real_uid)
3811 {
3812 /*
3813 ** Drop gid to real gid.
3814 ** On some OS we must reset the effective[/real[/saved]] gid,
3815 ** and then use setgid() to finally drop all group privileges.
3816 ** Later on we check whether we can get back the
3817 ** effective gid.
3818 */
3819
3820 #if HASSETEGID
3821 if (setegid(RunAsGid) < 0)
3822 {
3823 syserr("drop_privileges: setegid(%d) failed",
3824 (int) RunAsGid);
3825 rval = EX_OSERR;
3826 }
3827 #else /* HASSETEGID */
3828 # if HASSETREGID
3829 if (setregid(RunAsGid, RunAsGid) < 0)
3830 {
3831 syserr("drop_privileges: setregid(%d, %d) failed",
3832 (int) RunAsGid, (int) RunAsGid);
3833 rval = EX_OSERR;
3834 }
3835 # else /* HASSETREGID */
3836 # if HASSETRESGID
3837 if (setresgid(RunAsGid, RunAsGid, RunAsGid) < 0)
3838 {
3839 syserr("drop_privileges: setresgid(%d, %d, %d) failed",
3840 (int) RunAsGid, (int) RunAsGid, (int) RunAsGid);
3841 rval = EX_OSERR;
3842 }
3843 # endif /* HASSETRESGID */
3844 # endif /* HASSETREGID */
3845 #endif /* HASSETEGID */
3846 }
3847 if (rval == EX_OK && (to_real_uid || RunAsGid != 0))
3848 {
3849 if (setgid(RunAsGid) < 0 && (!UseMSP || getegid() != RunAsGid))
3850 {
3851 syserr("drop_privileges: setgid(%ld) failed",
3852 (long) RunAsGid);
3853 rval = EX_OSERR;
3854 }
3855 errno = 0;
3856 if (rval == EX_OK && getegid() != RunAsGid)
3857 {
3858 syserr("drop_privileges: Unable to set effective gid=%ld to RunAsGid=%ld",
3859 (long) getegid(), (long) RunAsGid);
3860 rval = EX_OSERR;
3861 }
3862 }
3863
3864 /* fiddle with uid */
3865 if (to_real_uid || RunAsUid != 0)
3866 {
3867 uid_t euid;
3868
3869 /*
3870 ** Try to setuid(RunAsUid).
3871 ** euid must be RunAsUid,
3872 ** ruid must be RunAsUid unless (e|r)uid wasn't 0
3873 ** and we didn't have to drop privileges to the real uid.
3874 */
3875
3876 if (setuid(RunAsUid) < 0 ||
3877 geteuid() != RunAsUid ||
3878 (getuid() != RunAsUid &&
3879 (to_real_uid || geteuid() == 0 || getuid() == 0)))
3880 {
3881 #if HASSETREUID
3882 /*
3883 ** if ruid != RunAsUid, euid == RunAsUid, then
3884 ** try resetting just the real uid, then using
3885 ** setuid() to drop the saved-uid as well.
3886 */
3887
3888 if (geteuid() == RunAsUid)
3889 {
3890 if (setreuid(RunAsUid, -1) < 0)
3891 {
3892 syserr("drop_privileges: setreuid(%d, -1) failed",
3893 (int) RunAsUid);
3894 rval = EX_OSERR;
3895 }
3896 if (setuid(RunAsUid) < 0)
3897 {
3898 syserr("drop_privileges: second setuid(%d) attempt failed",
3899 (int) RunAsUid);
3900 rval = EX_OSERR;
3901 }
3902 }
3903 else
3904 #endif /* HASSETREUID */
3905 {
3906 syserr("drop_privileges: setuid(%d) failed",
3907 (int) RunAsUid);
3908 rval = EX_OSERR;
3909 }
3910 }
3911 euid = geteuid();
3912 if (RunAsUid != 0 && setuid(0) == 0)
3913 {
3914 /*
3915 ** Believe it or not, the Linux capability model
3916 ** allows a non-root process to override setuid()
3917 ** on a process running as root and prevent that
3918 ** process from dropping privileges.
3919 */
3920
3921 syserr("drop_privileges: setuid(0) succeeded (when it should not)");
3922 rval = EX_OSERR;
3923 }
3924 else if (RunAsUid != euid && setuid(euid) == 0)
3925 {
3926 /*
3927 ** Some operating systems will keep the saved-uid
3928 ** if a non-root effective-uid calls setuid(real-uid)
3929 ** making it possible to set it back again later.
3930 */
3931
3932 syserr("drop_privileges: Unable to drop non-root set-user-ID privileges");
3933 rval = EX_OSERR;
3934 }
3935 }
3936
3937 if ((to_real_uid || RunAsGid != 0) &&
3938 rval == EX_OK && RunAsGid != EffGid &&
3939 getuid() != 0 && geteuid() != 0)
3940 {
3941 errno = 0;
3942 if (setgid(EffGid) == 0)
3943 {
3944 syserr("drop_privileges: setgid(%d) succeeded (when it should not)",
3945 (int) EffGid);
3946 rval = EX_OSERR;
3947 }
3948 }
3949
3950 if (tTd(47, 5))
3951 {
3952 sm_dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n",
3953 (int) geteuid(), (int) getuid(),
3954 (int) getegid(), (int) getgid());
3955 sm_dprintf("drop_privileges: RunAsUser = %d:%d\n",
3956 (int) RunAsUid, (int) RunAsGid);
3957 if (tTd(47, 10))
3958 sm_dprintf("drop_privileges: rval = %d\n", rval);
3959 }
3960 return rval;
3961 }
3962 /*
3963 ** FILL_FD -- make sure a file descriptor has been properly allocated
3964 **
3965 ** Used to make sure that stdin/out/err are allocated on startup
3966 **
3967 ** Parameters:
3968 ** fd -- the file descriptor to be filled.
3969 ** where -- a string used for logging. If NULL, this is
3970 ** being called on startup, and logging should
3971 ** not be done.
3972 **
3973 ** Returns:
3974 ** none
3975 **
3976 ** Side Effects:
3977 ** possibly changes MissingFds
3978 */
3979
3980 void
fill_fd(fd,where)3981 fill_fd(fd, where)
3982 int fd;
3983 char *where;
3984 {
3985 int i;
3986 struct stat stbuf;
3987
3988 if (fstat(fd, &stbuf) >= 0 || errno != EBADF)
3989 return;
3990
3991 if (where != NULL)
3992 syserr("fill_fd: %s: fd %d not open", where, fd);
3993 else
3994 MissingFds |= 1 << fd;
3995 i = open(SM_PATH_DEVNULL, fd == 0 ? O_RDONLY : O_WRONLY, 0666);
3996 if (i < 0)
3997 {
3998 syserr("!fill_fd: %s: cannot open %s",
3999 where == NULL ? "startup" : where, SM_PATH_DEVNULL);
4000 }
4001 if (fd != i)
4002 {
4003 (void) dup2(i, fd);
4004 (void) close(i);
4005 }
4006 }
4007 /*
4008 ** SM_PRINTOPTIONS -- print options
4009 **
4010 ** Parameters:
4011 ** options -- array of options.
4012 **
4013 ** Returns:
4014 ** none.
4015 */
4016
4017 static void
sm_printoptions(options)4018 sm_printoptions(options)
4019 char **options;
4020 {
4021 int ll;
4022 char **av;
4023
4024 av = options;
4025 ll = 7;
4026 while (*av != NULL)
4027 {
4028 if (ll + strlen(*av) > 63)
4029 {
4030 sm_dprintf("\n");
4031 ll = 0;
4032 }
4033 if (ll == 0)
4034 sm_dprintf("\t\t");
4035 else
4036 sm_dprintf(" ");
4037 sm_dprintf("%s", *av);
4038 ll += strlen(*av++) + 1;
4039 }
4040 sm_dprintf("\n");
4041 }
4042
4043 /*
4044 ** TO8BIT -- convert \octal sequences in a test mode input line
4045 **
4046 ** Parameters:
4047 ** str -- the input line.
4048 **
4049 ** Returns:
4050 ** none.
4051 **
4052 ** Side Effects:
4053 ** replaces \0octal in str with octal value.
4054 */
4055
4056 static bool to8bit __P((char *));
4057
4058 static bool
to8bit(str)4059 to8bit(str)
4060 char *str;
4061 {
4062 int c, len;
4063 char *out, *in;
4064 bool changed;
4065
4066 if (str == NULL)
4067 return false;
4068 in = out = str;
4069 changed = false;
4070 len = 0;
4071 while ((c = (*str++ & 0377)) != '\0')
4072 {
4073 int oct, nxtc;
4074
4075 ++len;
4076 if (c == '\\' &&
4077 (nxtc = (*str & 0377)) == '0')
4078 {
4079 oct = 0;
4080 while ((nxtc = (*str & 0377)) != '\0' &&
4081 isascii(nxtc) && isdigit(nxtc))
4082 {
4083 oct <<= 3;
4084 oct += nxtc - '0';
4085 ++str;
4086 ++len;
4087 }
4088 changed = true;
4089 c = oct;
4090 }
4091 *out++ = c;
4092 }
4093 *out++ = c;
4094 if (changed)
4095 {
4096 char *q;
4097
4098 q = quote_internal_chars(in, in, &len);
4099 if (q != in)
4100 sm_strlcpy(in, q, len);
4101 }
4102 return changed;
4103 }
4104
4105 /*
4106 ** TESTMODELINE -- process a test mode input line
4107 **
4108 ** Parameters:
4109 ** line -- the input line.
4110 ** e -- the current environment.
4111 ** Syntax:
4112 ** # a comment
4113 ** .X process X as a configuration line
4114 ** =X dump a configuration item (such as mailers)
4115 ** $X dump a macro or class
4116 ** /X try an activity
4117 ** X normal process through rule set X
4118 */
4119
4120 static void
testmodeline(line,e)4121 testmodeline(line, e)
4122 char *line;
4123 ENVELOPE *e;
4124 {
4125 register char *p;
4126 char *q;
4127 auto char *delimptr;
4128 int mid;
4129 int i, rs;
4130 STAB *map;
4131 char **s;
4132 struct rewrite *rw;
4133 ADDRESS a;
4134 char *lbp;
4135 auto int lbs;
4136 static int tryflags = RF_COPYNONE;
4137 char exbuf[MAXLINE];
4138 char lbuf[MAXLINE];
4139 extern unsigned char TokTypeNoC[];
4140 bool eightbit;
4141
4142 /* skip leading spaces */
4143 while (*line == ' ')
4144 line++;
4145
4146 lbp = NULL;
4147 eightbit = false;
4148 switch (line[0])
4149 {
4150 case '#':
4151 case '\0':
4152 return;
4153
4154 case '?':
4155 help("-bt", e);
4156 return;
4157
4158 case '.': /* config-style settings */
4159 switch (line[1])
4160 {
4161 case 'D':
4162 mid = macid_parse(&line[2], &delimptr);
4163 if (mid == 0)
4164 return;
4165 lbs = sizeof(lbuf);
4166 lbp = translate_dollars(delimptr, lbuf, &lbs);
4167 macdefine(&e->e_macro, A_TEMP, mid, lbp);
4168 if (lbp != lbuf)
4169 SM_FREE(lbp);
4170 break;
4171
4172 case 'C':
4173 if (line[2] == '\0') /* not to call syserr() */
4174 return;
4175
4176 mid = macid_parse(&line[2], &delimptr);
4177 if (mid == 0)
4178 return;
4179 lbs = sizeof(lbuf);
4180 lbp = translate_dollars(delimptr, lbuf, &lbs);
4181 expand(lbp, exbuf, sizeof(exbuf), e);
4182 if (lbp != lbuf)
4183 SM_FREE(lbp);
4184 p = exbuf;
4185 while (*p != '\0')
4186 {
4187 register char *wd;
4188 char delim;
4189
4190 while (*p != '\0' && SM_ISSPACE(*p))
4191 p++;
4192 wd = p;
4193 while (*p != '\0' && !(SM_ISSPACE(*p)))
4194 p++;
4195 delim = *p;
4196 *p = '\0';
4197 if (wd[0] != '\0')
4198 setclass(mid, wd);
4199 *p = delim;
4200 }
4201 break;
4202
4203 case '\0':
4204 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4205 "Usage: .[DC]macro value(s)\n");
4206 break;
4207
4208 default:
4209 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4210 "Unknown \".\" command %s\n", line);
4211 break;
4212 }
4213 return;
4214
4215 case '=': /* config-style settings */
4216 switch (line[1])
4217 {
4218 case 'S': /* dump rule set */
4219 rs = strtorwset(&line[2], NULL, ST_FIND);
4220 if (rs < 0)
4221 {
4222 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4223 "Undefined ruleset %s\n", &line[2]);
4224 return;
4225 }
4226 rw = RewriteRules[rs];
4227 if (rw == NULL)
4228 return;
4229 do
4230 {
4231 (void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4232 'R');
4233 s = rw->r_lhs;
4234 while (*s != NULL)
4235 {
4236 xputs(smioout, *s++);
4237 (void) sm_io_putc(smioout,
4238 SM_TIME_DEFAULT, ' ');
4239 }
4240 (void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4241 '\t');
4242 (void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4243 '\t');
4244 s = rw->r_rhs;
4245 while (*s != NULL)
4246 {
4247 xputs(smioout, *s++);
4248 (void) sm_io_putc(smioout,
4249 SM_TIME_DEFAULT, ' ');
4250 }
4251 (void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4252 '\n');
4253 } while ((rw = rw->r_next) != NULL);
4254 break;
4255
4256 case 'M':
4257 for (i = 0; i < MAXMAILERS; i++)
4258 {
4259 if (Mailer[i] != NULL)
4260 printmailer(smioout, Mailer[i]);
4261 }
4262 break;
4263
4264 case '\0':
4265 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4266 "Usage: =Sruleset or =M\n");
4267 break;
4268
4269 default:
4270 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4271 "Unknown \"=\" command %s\n", line);
4272 break;
4273 }
4274 return;
4275
4276 case '-': /* set command-line-like opts */
4277 switch (line[1])
4278 {
4279 case 'd':
4280 tTflag(&line[2]);
4281 break;
4282
4283 case '\0':
4284 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4285 "Usage: -d{debug arguments}\n");
4286 break;
4287
4288 default:
4289 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4290 "Unknown \"-\" command %s\n", line);
4291 break;
4292 }
4293 return;
4294
4295 case '$':
4296 if (line[1] == '=')
4297 {
4298 mid = macid(&line[2]);
4299 if (mid != 0)
4300 stabapply(dump_class, mid);
4301 return;
4302 }
4303 mid = macid(&line[1]);
4304 if (mid == 0)
4305 return;
4306 p = macvalue(mid, e);
4307 if (p == NULL)
4308 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4309 "Undefined\n");
4310 else
4311 {
4312 xputs(smioout, p);
4313 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4314 "\n");
4315 }
4316 return;
4317
4318 case '/': /* miscellaneous commands */
4319 p = &line[strlen(line)];
4320 while (--p >= line && SM_ISSPACE(*p))
4321 *p = '\0';
4322 p = strpbrk(line, " \t");
4323 if (p != NULL)
4324 {
4325 while (SM_ISSPACE(*p))
4326 *p++ = '\0';
4327 }
4328 else
4329 p = "";
4330 if (line[1] == '\0')
4331 {
4332 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4333 "Usage: /[canon|map|mx|parse|try|tryflags]\n");
4334 return;
4335 }
4336 if (sm_strcasecmp(&line[1], "quit") == 0)
4337 {
4338 CurEnv->e_id = NULL;
4339 finis(true, true, ExitStat);
4340 /* NOTREACHED */
4341 }
4342 if (sm_strcasecmp(&line[1], "mx") == 0)
4343 {
4344 #if NAMED_BIND
4345 /* look up MX records */
4346 int nmx;
4347 auto int rcode;
4348 char *mxhosts[MAXMXHOSTS + 1];
4349
4350 if (*p == '\0')
4351 {
4352 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4353 "Usage: /mx address\n");
4354 return;
4355 }
4356 nmx = getmxrr(p, mxhosts, NULL, TRYFALLBACK, &rcode,
4357 NULL, -1);
4358 if (nmx == NULLMX)
4359 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4360 "getmxrr(%s) returns null MX (See RFC7505)\n",
4361 p);
4362 else
4363 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4364 "getmxrr(%s) returns %d value(s):\n",
4365 p, nmx);
4366 for (i = 0; i < nmx; i++)
4367 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4368 "\t%s\n", mxhosts[i]);
4369 #else /* NAMED_BIND */
4370 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4371 "No MX code compiled in\n");
4372 #endif /* NAMED_BIND */
4373 }
4374 else if (sm_strcasecmp(&line[1], "canon") == 0)
4375 {
4376 char host[MAXHOSTNAMELEN];
4377
4378 if (*p == '\0')
4379 {
4380 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4381 "Usage: /canon address\n");
4382 return;
4383 }
4384 else if (sm_strlcpy(host, p, sizeof(host)) >= sizeof(host))
4385 {
4386 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4387 "Name too long\n");
4388 return;
4389 }
4390 (void) getcanonname(host, sizeof(host), !HasWildcardMX,
4391 NULL);
4392 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4393 "getcanonname(%s) returns %s\n",
4394 p, host);
4395 }
4396 else if (sm_strcasecmp(&line[1], "map") == 0)
4397 {
4398 auto int rcode = EX_OK;
4399 char *av[2];
4400
4401 if (*p == '\0')
4402 {
4403 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4404 "Usage: /map mapname key\n");
4405 return;
4406 }
4407 for (q = p; *q != '\0' && !(SM_ISSPACE(*q)); q++)
4408 continue;
4409 if (*q == '\0')
4410 {
4411 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4412 "No key specified\n");
4413 return;
4414 }
4415 *q++ = '\0';
4416 map = stab(p, ST_MAP, ST_FIND);
4417 if (map == NULL)
4418 {
4419 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4420 "Map named \"%s\" not found\n", p);
4421 return;
4422 }
4423 if (!bitset(MF_OPEN, map->s_map.map_mflags) &&
4424 !openmap(&(map->s_map)))
4425 {
4426 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4427 "Map named \"%s\" not open\n", p);
4428 return;
4429 }
4430 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4431 "map_lookup: %s (%s) ", p, q);
4432 av[0] = q;
4433 av[1] = NULL;
4434 p = (*map->s_map.map_class->map_lookup)
4435 (&map->s_map, q, av, &rcode);
4436 if (p == NULL)
4437 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4438 "no match (%d)\n",
4439 rcode);
4440 else
4441 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4442 "returns %s (%d)\n", p,
4443 rcode);
4444 }
4445 else if (sm_strcasecmp(&line[1], "try") == 0)
4446 {
4447 MAILER *m;
4448 STAB *st;
4449 auto int rcode = EX_OK;
4450
4451 q = strpbrk(p, " \t");
4452 if (q != NULL)
4453 {
4454 while (SM_ISSPACE(*q))
4455 *q++ = '\0';
4456 }
4457 if (q == NULL || *q == '\0')
4458 {
4459 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4460 "Usage: /try mailer address\n");
4461 return;
4462 }
4463 st = stab(p, ST_MAILER, ST_FIND);
4464 if (st == NULL)
4465 {
4466 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4467 "Unknown mailer %s\n", p);
4468 return;
4469 }
4470 m = st->s_mailer;
4471 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4472 "Trying %s %s address %s for mailer %s\n",
4473 bitset(RF_HEADERADDR, tryflags) ? "header"
4474 : "envelope",
4475 bitset(RF_SENDERADDR, tryflags) ? "sender"
4476 : "recipient", q, p);
4477 p = remotename(q, m, tryflags, &rcode, CurEnv);
4478 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4479 "Rcode = %d, addr = %s\n",
4480 rcode, p == NULL ? "<NULL>" : p);
4481 e->e_to = NULL;
4482 }
4483 else if (sm_strcasecmp(&line[1], "tryflags") == 0)
4484 {
4485 if (*p == '\0')
4486 {
4487 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4488 "Usage: /tryflags [Hh|Ee][Ss|Rr]\n");
4489 return;
4490 }
4491 for (; *p != '\0'; p++)
4492 {
4493 switch (*p)
4494 {
4495 case 'H':
4496 case 'h':
4497 tryflags |= RF_HEADERADDR;
4498 break;
4499
4500 case 'E':
4501 case 'e':
4502 tryflags &= ~RF_HEADERADDR;
4503 break;
4504
4505 case 'S':
4506 case 's':
4507 tryflags |= RF_SENDERADDR;
4508 break;
4509
4510 case 'R':
4511 case 'r':
4512 tryflags &= ~RF_SENDERADDR;
4513 break;
4514 }
4515 }
4516 exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e';
4517 exbuf[1] = ' ';
4518 exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r';
4519 exbuf[3] = '\0';
4520 macdefine(&e->e_macro, A_TEMP,
4521 macid("{addr_type}"), exbuf);
4522 }
4523 else if (sm_strcasecmp(&line[1], "parse") == 0)
4524 {
4525 if (*p == '\0')
4526 {
4527 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4528 "Usage: /parse address\n");
4529 return;
4530 }
4531 q = crackaddr(p, e);
4532 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4533 "Cracked address = ");
4534 xputs(smioout, q);
4535 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4536 "\nParsing %s %s address\n",
4537 bitset(RF_HEADERADDR, tryflags) ?
4538 "header" : "envelope",
4539 bitset(RF_SENDERADDR, tryflags) ?
4540 "sender" : "recipient");
4541 if (parseaddr(p, &a, tryflags, '\0', NULL, e, true)
4542 == NULL)
4543 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4544 "Cannot parse\n");
4545 else if (a.q_host != NULL && a.q_host[0] != '\0')
4546 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4547 "mailer %s, host %s, user %s\n",
4548 a.q_mailer->m_name,
4549 a.q_host,
4550 a.q_user);
4551 else
4552 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4553 "mailer %s, user %s\n",
4554 a.q_mailer->m_name,
4555 a.q_user);
4556 e->e_to = NULL;
4557 }
4558 else if (sm_strcasecmp(&line[1], "header") == 0)
4559 {
4560 unsigned long ul;
4561
4562 ul = chompheader(p, CHHDR_CHECK|CHHDR_USER, NULL, e);
4563 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4564 "ul = %lu\n", ul);
4565 }
4566 #if NETINET || NETINET6
4567 else if (sm_strcasecmp(&line[1], "gethostbyname") == 0)
4568 {
4569 int family = AF_INET;
4570
4571 q = strpbrk(p, " \t");
4572 if (q != NULL)
4573 {
4574 while (SM_ISSPACE(*q))
4575 *q++ = '\0';
4576 # if NETINET6
4577 if (*q != '\0' && (strcmp(q, "inet6") == 0 ||
4578 strcmp(q, "AAAA") == 0))
4579 family = AF_INET6;
4580 # endif /* NETINET6 */
4581 }
4582 (void) sm_gethostbyname(p, family);
4583 }
4584 #endif /* NETINET || NETINET6 */
4585 #if DANE
4586 else if (sm_strcasecmp(&line[1], "dnslookup") == 0)
4587 {
4588 DNS_REPLY_T *r;
4589 int rr_type, family;
4590 unsigned int flags;
4591
4592 rr_type = T_A;
4593 family = AF_INET;
4594 flags = RR_AS_TEXT;
4595 q = strpbrk(p, " \t");
4596 if (q != NULL)
4597 {
4598 char *pflags;
4599
4600 while (SM_ISSPACE(*q))
4601 *q++ = '\0';
4602 pflags = strpbrk(q, " \t");
4603 if (pflags != NULL)
4604 {
4605 while (SM_ISSPACE(*pflags))
4606 *pflags++ = '\0';
4607 }
4608 rr_type = dns_string_to_type(q);
4609 if (rr_type == T_A)
4610 family = AF_INET;
4611 # if NETINET6
4612 if (rr_type == T_AAAA)
4613 family = AF_INET6;
4614 # endif
4615 while (pflags != NULL && *pflags != '\0' &&
4616 !SM_ISSPACE(*pflags))
4617 {
4618 if (*pflags == 'c')
4619 flags |= RR_NO_CNAME;
4620 else if (*pflags == 'o')
4621 flags |= RR_ONLY_CNAME;
4622 else if (*pflags == 'T')
4623 flags &= ~RR_AS_TEXT;
4624 ++pflags;
4625 }
4626 }
4627 r = dns_lookup_int(p, C_IN, rr_type,
4628 0, 0, 0, flags, NULL, NULL);
4629 if (r != NULL && family >= 0)
4630 {
4631 (void) dns2he(r, family);
4632 dns_free_data(r);
4633 r = NULL;
4634 }
4635 }
4636 #endif /* DANE */
4637 else
4638 {
4639 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4640 "Unknown \"/\" command %s\n",
4641 line);
4642 }
4643 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4644 return;
4645 }
4646
4647 for (p = line; SM_ISSPACE(*p); p++)
4648 continue;
4649 q = p;
4650 while (*p != '\0' && !(SM_ISSPACE(*p)))
4651 p++;
4652 if (*p == '\0')
4653 {
4654 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4655 "No address!\n");
4656 return;
4657 }
4658 *p = '\0';
4659 if (tTd(23, 101))
4660 eightbit = to8bit(p + 1);
4661 if (invalidaddr(p + 1, NULL, true))
4662 return;
4663 do
4664 {
4665 register char **pvp;
4666 char pvpbuf[PSBUFSIZE];
4667
4668 pvp = prescan(++p, ',', pvpbuf, sizeof(pvpbuf), &delimptr,
4669 ConfigLevel >= 9 ? TokTypeNoC : ExtTokenTab, false);
4670 if (pvp == NULL)
4671 continue;
4672 p = q;
4673 while (*p != '\0')
4674 {
4675 int status;
4676
4677 rs = strtorwset(p, NULL, ST_FIND);
4678 if (rs < 0)
4679 {
4680 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4681 "Undefined ruleset %s\n",
4682 p);
4683 break;
4684 }
4685 status = REWRITE(pvp, rs, e);
4686 if (status != EX_OK)
4687 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4688 "== Ruleset %s (%d) status %d\n",
4689 p, rs, status);
4690 else if (eightbit)
4691 {
4692 cataddr(pvp, NULL, exbuf, sizeof(exbuf), '\0',
4693 true);
4694 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4695 "cataddr: %s\n",
4696 str2prt(exbuf));
4697 }
4698 while (*p != '\0' && *p++ != ',')
4699 continue;
4700 }
4701 } while (*(p = delimptr) != '\0');
4702 (void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4703 }
4704
4705 static void
dump_class(s,id)4706 dump_class(s, id)
4707 register STAB *s;
4708 int id;
4709 {
4710 if (s->s_symtype != ST_CLASS)
4711 return;
4712 if (bitnset(bitidx(id), s->s_class))
4713 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4714 "%s\n", s->s_name);
4715 }
4716
4717 /*
4718 ** An exception type used to create QuickAbort exceptions.
4719 ** This is my first cut at converting QuickAbort from longjmp to exceptions.
4720 ** These exceptions have a single integer argument, which is the argument
4721 ** to longjmp in the original code (either 1 or 2). I don't know the
4722 ** significance of 1 vs 2: the calls to setjmp don't care.
4723 */
4724
4725 const SM_EXC_TYPE_T EtypeQuickAbort =
4726 {
4727 SmExcTypeMagic,
4728 "E:mta.quickabort",
4729 "i",
4730 sm_etype_printf,
4731 "quick abort %0",
4732 };
4733