1 /* 2 * Copyright (c) 1998-2006 Sendmail, Inc. and its suppliers. 3 * All rights reserved. 4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 5 * Copyright (c) 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * By using this file, you agree to the terms and conditions set 9 * forth in the LICENSE file which can be found at the top level of 10 * the sendmail distribution. 11 * 12 */ 13 14 #define _DEFINE 15 #include <sendmail.h> 16 #include <sm/xtrap.h> 17 #include <sm/signal.h> 18 19 #ifndef lint 20 SM_UNUSED(static char copyright[]) = 21 "@(#) Copyright (c) 1998-2003 Sendmail, Inc. and its suppliers.\n\ 22 All rights reserved.\n\ 23 Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.\n\ 24 Copyright (c) 1988, 1993\n\ 25 The Regents of the University of California. All rights reserved.\n"; 26 #endif /* ! lint */ 27 28 SM_RCSID("@(#)$Id: main.c,v 8.944.2.2 2006/08/03 22:05:03 ca Exp $") 29 30 31 #if NETINET || NETINET6 32 # include <arpa/inet.h> 33 #endif /* NETINET || NETINET6 */ 34 35 /* for getcfname() */ 36 #include <sendmail/pathnames.h> 37 38 static SM_DEBUG_T 39 DebugNoPRestart = SM_DEBUG_INITIALIZER("no_persistent_restart", 40 "@(#)$Debug: no_persistent_restart - don't restart, log only $"); 41 42 static void dump_class __P((STAB *, int)); 43 static void obsolete __P((char **)); 44 static void testmodeline __P((char *, ENVELOPE *)); 45 static char *getextenv __P((const char *)); 46 static void sm_printoptions __P((char **)); 47 static SIGFUNC_DECL intindebug __P((int)); 48 static SIGFUNC_DECL sighup __P((int)); 49 static SIGFUNC_DECL sigpipe __P((int)); 50 static SIGFUNC_DECL sigterm __P((int)); 51 #ifdef SIGUSR1 52 static SIGFUNC_DECL sigusr1 __P((int)); 53 #endif /* SIGUSR1 */ 54 55 /* 56 ** SENDMAIL -- Post mail to a set of destinations. 57 ** 58 ** This is the basic mail router. All user mail programs should 59 ** call this routine to actually deliver mail. Sendmail in 60 ** turn calls a bunch of mail servers that do the real work of 61 ** delivering the mail. 62 ** 63 ** Sendmail is driven by settings read in from /etc/mail/sendmail.cf 64 ** (read by readcf.c). 65 ** 66 ** Usage: 67 ** /usr/lib/sendmail [flags] addr ... 68 ** 69 ** See the associated documentation for details. 70 ** 71 ** Authors: 72 ** Eric Allman, UCB/INGRES (until 10/81). 73 ** Britton-Lee, Inc., purveyors of fine 74 ** database computers (11/81 - 10/88). 75 ** International Computer Science Institute 76 ** (11/88 - 9/89). 77 ** UCB/Mammoth Project (10/89 - 7/95). 78 ** InReference, Inc. (8/95 - 1/97). 79 ** Sendmail, Inc. (1/98 - present). 80 ** The support of my employers is gratefully acknowledged. 81 ** Few of them (Britton-Lee in particular) have had 82 ** anything to gain from my involvement in this project. 83 ** 84 ** Gregory Neil Shapiro, 85 ** Worcester Polytechnic Institute (until 3/98). 86 ** Sendmail, Inc. (3/98 - present). 87 ** 88 ** Claus Assmann, 89 ** Sendmail, Inc. (12/98 - present). 90 */ 91 92 char *FullName; /* sender's full name */ 93 ENVELOPE BlankEnvelope; /* a "blank" envelope */ 94 static ENVELOPE MainEnvelope; /* the envelope around the basic letter */ 95 ADDRESS NullAddress = /* a null address */ 96 { "", "", NULL, "" }; 97 char *CommandLineArgs; /* command line args for pid file */ 98 bool Warn_Q_option = false; /* warn about Q option use */ 99 static int MissingFds = 0; /* bit map of fds missing on startup */ 100 char *Mbdb = "pw"; /* mailbox database defaults to /etc/passwd */ 101 102 #ifdef NGROUPS_MAX 103 GIDSET_T InitialGidSet[NGROUPS_MAX]; 104 #endif /* NGROUPS_MAX */ 105 106 #define MAXCONFIGLEVEL 10 /* highest config version level known */ 107 108 #if SASL 109 static sasl_callback_t srvcallbacks[] = 110 { 111 { SASL_CB_VERIFYFILE, &safesaslfile, NULL }, 112 { SASL_CB_PROXY_POLICY, &proxy_policy, NULL }, 113 { SASL_CB_LIST_END, NULL, NULL } 114 }; 115 #endif /* SASL */ 116 117 unsigned int SubmitMode; 118 int SyslogPrefixLen; /* estimated length of syslog prefix */ 119 #define PIDLEN 6 /* pid length for computing SyslogPrefixLen */ 120 #ifndef SL_FUDGE 121 # define SL_FUDGE 10 /* fudge offset for SyslogPrefixLen */ 122 #endif /* ! SL_FUDGE */ 123 #define SLDLL 8 /* est. length of default syslog label */ 124 125 126 /* Some options are dangerous to allow users to use in non-submit mode */ 127 #define CHECK_AGAINST_OPMODE(cmd) \ 128 { \ 129 if (extraprivs && \ 130 OpMode != MD_DELIVER && OpMode != MD_SMTP && \ 131 OpMode != MD_ARPAFTP && \ 132 OpMode != MD_VERIFY && OpMode != MD_TEST) \ 133 { \ 134 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, \ 135 "WARNING: Ignoring submission mode -%c option (not in submission mode)\n", \ 136 (cmd)); \ 137 break; \ 138 } \ 139 if (extraprivs && queuerun) \ 140 { \ 141 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, \ 142 "WARNING: Ignoring submission mode -%c option with -q\n", \ 143 (cmd)); \ 144 break; \ 145 } \ 146 } 147 148 int 149 main(argc, argv, envp) 150 int argc; 151 char **argv; 152 char **envp; 153 { 154 register char *p; 155 char **av; 156 extern char Version[]; 157 char *ep, *from; 158 STAB *st; 159 register int i; 160 int j; 161 int dp; 162 int fill_errno; 163 int qgrp = NOQGRP; /* queue group to process */ 164 bool safecf = true; 165 BITMAP256 *p_flags = NULL; /* daemon flags */ 166 bool warn_C_flag = false; 167 bool auth = true; /* whether to set e_auth_param */ 168 char warn_f_flag = '\0'; 169 bool run_in_foreground = false; /* -bD mode */ 170 bool queuerun = false, debug = false; 171 struct passwd *pw; 172 struct hostent *hp; 173 char *nullserver = NULL; 174 char *authinfo = NULL; 175 char *sysloglabel = NULL; /* label for syslog */ 176 char *conffile = NULL; /* name of .cf file */ 177 char *queuegroup = NULL; /* queue group to process */ 178 char *quarantining = NULL; /* quarantine queue items? */ 179 bool extraprivs; 180 bool forged, negate; 181 bool queuepersistent = false; /* queue runner process runs forever */ 182 bool foregroundqueue = false; /* queue run in foreground */ 183 bool save_val; /* to save some bool var. */ 184 int cftype; /* which cf file to use? */ 185 SM_FILE_T *smdebug; 186 static time_t starttime = 0; /* when was process started */ 187 struct stat traf_st; /* for TrafficLog FIFO check */ 188 char buf[MAXLINE]; 189 char jbuf[MAXHOSTNAMELEN]; /* holds MyHostName */ 190 static char rnamebuf[MAXNAME]; /* holds RealUserName */ 191 char *emptyenviron[1]; 192 #if STARTTLS 193 bool tls_ok; 194 #endif /* STARTTLS */ 195 QUEUE_CHAR *new; 196 ENVELOPE *e; 197 extern int DtableSize; 198 extern int optind; 199 extern int opterr; 200 extern char *optarg; 201 extern char **environ; 202 #if SASL 203 extern void sm_sasl_init __P((void)); 204 #endif /* SASL */ 205 206 #if USE_ENVIRON 207 envp = environ; 208 #endif /* USE_ENVIRON */ 209 210 /* turn off profiling */ 211 SM_PROF(0); 212 213 /* install default exception handler */ 214 sm_exc_newthread(fatal_error); 215 216 /* set the default in/out channel so errors reported to screen */ 217 InChannel = smioin; 218 OutChannel = smioout; 219 220 /* 221 ** Check to see if we reentered. 222 ** This would normally happen if e_putheader or e_putbody 223 ** were NULL when invoked. 224 */ 225 226 if (starttime != 0) 227 { 228 syserr("main: reentered!"); 229 abort(); 230 } 231 starttime = curtime(); 232 233 /* avoid null pointer dereferences */ 234 TermEscape.te_rv_on = TermEscape.te_rv_off = ""; 235 236 RealUid = getuid(); 237 RealGid = getgid(); 238 239 /* Check if sendmail is running with extra privs */ 240 extraprivs = (RealUid != 0 && 241 (geteuid() != getuid() || getegid() != getgid())); 242 243 CurrentPid = getpid(); 244 245 /* get whatever .cf file is right for the opmode */ 246 cftype = SM_GET_RIGHT_CF; 247 248 /* in 4.4BSD, the table can be huge; impose a reasonable limit */ 249 DtableSize = getdtsize(); 250 if (DtableSize > 256) 251 DtableSize = 256; 252 253 /* 254 ** Be sure we have enough file descriptors. 255 ** But also be sure that 0, 1, & 2 are open. 256 */ 257 258 /* reset errno and fill_errno; the latter is used way down below */ 259 errno = fill_errno = 0; 260 fill_fd(STDIN_FILENO, NULL); 261 if (errno != 0) 262 fill_errno = errno; 263 fill_fd(STDOUT_FILENO, NULL); 264 if (errno != 0) 265 fill_errno = errno; 266 fill_fd(STDERR_FILENO, NULL); 267 if (errno != 0) 268 fill_errno = errno; 269 270 sm_closefrom(STDERR_FILENO + 1, DtableSize); 271 errno = 0; 272 smdebug = NULL; 273 274 #if LOG 275 # ifndef SM_LOG_STR 276 # define SM_LOG_STR "sendmail" 277 # endif /* ! SM_LOG_STR */ 278 # ifdef LOG_MAIL 279 openlog(SM_LOG_STR, LOG_PID, LOG_MAIL); 280 # else /* LOG_MAIL */ 281 openlog(SM_LOG_STR, LOG_PID); 282 # endif /* LOG_MAIL */ 283 #endif /* LOG */ 284 285 /* 286 ** Seed the random number generator. 287 ** Used for queue file names, picking a queue directory, and 288 ** MX randomization. 289 */ 290 291 seed_random(); 292 293 /* do machine-dependent initializations */ 294 init_md(argc, argv); 295 296 297 SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) + SL_FUDGE + SLDLL; 298 299 /* reset status from syserr() calls for missing file descriptors */ 300 Errors = 0; 301 ExitStat = EX_OK; 302 303 SubmitMode = SUBMIT_UNKNOWN; 304 #if XDEBUG 305 checkfd012("after openlog"); 306 #endif /* XDEBUG */ 307 308 tTsetup(tTdvect, sizeof tTdvect, "0-99.1,*_trace_*.1"); 309 310 #ifdef NGROUPS_MAX 311 /* save initial group set for future checks */ 312 i = getgroups(NGROUPS_MAX, InitialGidSet); 313 if (i <= 0) 314 { 315 InitialGidSet[0] = (GID_T) -1; 316 i = 0; 317 } 318 while (i < NGROUPS_MAX) 319 InitialGidSet[i++] = InitialGidSet[0]; 320 #endif /* NGROUPS_MAX */ 321 322 /* drop group id privileges (RunAsUser not yet set) */ 323 dp = drop_privileges(false); 324 setstat(dp); 325 326 #ifdef SIGUSR1 327 /* Only allow root (or non-set-*-ID binaries) to use SIGUSR1 */ 328 if (!extraprivs) 329 { 330 /* arrange to dump state on user-1 signal */ 331 (void) sm_signal(SIGUSR1, sigusr1); 332 } 333 else 334 { 335 /* ignore user-1 signal */ 336 (void) sm_signal(SIGUSR1, SIG_IGN); 337 } 338 #endif /* SIGUSR1 */ 339 340 /* initialize for setproctitle */ 341 initsetproctitle(argc, argv, envp); 342 343 /* Handle any non-getoptable constructions. */ 344 obsolete(argv); 345 346 /* 347 ** Do a quick prescan of the argument list. 348 */ 349 350 351 /* find initial opMode */ 352 OpMode = MD_DELIVER; 353 av = argv; 354 p = strrchr(*av, '/'); 355 if (p++ == NULL) 356 p = *av; 357 if (strcmp(p, "newaliases") == 0) 358 OpMode = MD_INITALIAS; 359 else if (strcmp(p, "mailq") == 0) 360 OpMode = MD_PRINT; 361 else if (strcmp(p, "smtpd") == 0) 362 OpMode = MD_DAEMON; 363 else if (strcmp(p, "hoststat") == 0) 364 OpMode = MD_HOSTSTAT; 365 else if (strcmp(p, "purgestat") == 0) 366 OpMode = MD_PURGESTAT; 367 368 #if defined(__osf__) || defined(_AIX3) 369 # define OPTIONS "A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:x" 370 #endif /* defined(__osf__) || defined(_AIX3) */ 371 #if defined(sony_news) 372 # define OPTIONS "A:B:b:C:cD:d:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:" 373 #endif /* defined(sony_news) */ 374 #ifndef OPTIONS 375 # define OPTIONS "A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:" 376 #endif /* ! OPTIONS */ 377 378 /* Set to 0 to allow -b; need to check optarg before using it! */ 379 opterr = 0; 380 while ((j = getopt(argc, argv, OPTIONS)) != -1) 381 { 382 switch (j) 383 { 384 case 'b': /* operations mode */ 385 j = (optarg == NULL) ? ' ' : *optarg; 386 switch (j) 387 { 388 case MD_DAEMON: 389 case MD_FGDAEMON: 390 case MD_SMTP: 391 case MD_INITALIAS: 392 case MD_DELIVER: 393 case MD_VERIFY: 394 case MD_TEST: 395 case MD_PRINT: 396 case MD_PRINTNQE: 397 case MD_HOSTSTAT: 398 case MD_PURGESTAT: 399 case MD_ARPAFTP: 400 OpMode = j; 401 break; 402 403 case MD_FREEZE: 404 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 405 "Frozen configurations unsupported\n"); 406 return EX_USAGE; 407 408 default: 409 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 410 "Invalid operation mode %c\n", 411 j); 412 return EX_USAGE; 413 } 414 break; 415 416 case 'D': 417 if (debug) 418 { 419 errno = 0; 420 syserr("-D file must be before -d"); 421 ExitStat = EX_USAGE; 422 break; 423 } 424 dp = drop_privileges(true); 425 setstat(dp); 426 smdebug = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, 427 optarg, SM_IO_APPEND, NULL); 428 if (smdebug == NULL) 429 { 430 syserr("cannot open %s", optarg); 431 ExitStat = EX_CANTCREAT; 432 break; 433 } 434 sm_debug_setfile(smdebug); 435 break; 436 437 case 'd': 438 debug = true; 439 tTflag(optarg); 440 (void) sm_io_setvbuf(sm_debug_file(), SM_TIME_DEFAULT, 441 (char *) NULL, SM_IO_NBF, 442 SM_IO_BUFSIZ); 443 break; 444 445 case 'G': /* relay (gateway) submission */ 446 SubmitMode = SUBMIT_MTA; 447 break; 448 449 case 'L': 450 if (optarg == NULL) 451 { 452 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 453 "option requires an argument -- '%c'", 454 (char) j); 455 return EX_USAGE; 456 } 457 j = SM_MIN(strlen(optarg), 32) + 1; 458 sysloglabel = xalloc(j); 459 (void) sm_strlcpy(sysloglabel, optarg, j); 460 SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) + 461 SL_FUDGE + j; 462 break; 463 464 case 'Q': 465 case 'q': 466 /* just check if it is there */ 467 queuerun = true; 468 break; 469 } 470 } 471 opterr = 1; 472 473 /* Don't leak queue information via debug flags */ 474 if (extraprivs && queuerun && debug) 475 { 476 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 477 "WARNING: Can not use -d with -q. Disabling debugging.\n"); 478 sm_debug_close(); 479 sm_debug_setfile(NULL); 480 (void) memset(tTdvect, '\0', sizeof tTdvect); 481 } 482 483 #if LOG 484 if (sysloglabel != NULL) 485 { 486 /* Sanitize the string */ 487 for (p = sysloglabel; *p != '\0'; p++) 488 { 489 if (!isascii(*p) || !isprint(*p) || *p == '%') 490 *p = '*'; 491 } 492 closelog(); 493 # ifdef LOG_MAIL 494 openlog(sysloglabel, LOG_PID, LOG_MAIL); 495 # else /* LOG_MAIL */ 496 openlog(sysloglabel, LOG_PID); 497 # endif /* LOG_MAIL */ 498 } 499 #endif /* LOG */ 500 501 /* set up the blank envelope */ 502 BlankEnvelope.e_puthdr = putheader; 503 BlankEnvelope.e_putbody = putbody; 504 BlankEnvelope.e_xfp = NULL; 505 STRUCTCOPY(NullAddress, BlankEnvelope.e_from); 506 CurEnv = &BlankEnvelope; 507 STRUCTCOPY(NullAddress, MainEnvelope.e_from); 508 509 /* 510 ** Set default values for variables. 511 ** These cannot be in initialized data space. 512 */ 513 514 setdefaults(&BlankEnvelope); 515 initmacros(&BlankEnvelope); 516 517 /* reset macro */ 518 set_op_mode(OpMode); 519 if (OpMode == MD_DAEMON) 520 DaemonPid = CurrentPid; /* needed for finis() to work */ 521 522 pw = sm_getpwuid(RealUid); 523 if (pw != NULL) 524 (void) sm_strlcpy(rnamebuf, pw->pw_name, sizeof rnamebuf); 525 else 526 (void) sm_snprintf(rnamebuf, sizeof rnamebuf, "Unknown UID %d", 527 (int) RealUid); 528 529 RealUserName = rnamebuf; 530 531 if (tTd(0, 101)) 532 { 533 sm_dprintf("Version %s\n", Version); 534 finis(false, true, EX_OK); 535 /* NOTREACHED */ 536 } 537 538 /* 539 ** if running non-set-user-ID binary as non-root, pretend 540 ** we are the RunAsUid 541 */ 542 543 if (RealUid != 0 && geteuid() == RealUid) 544 { 545 if (tTd(47, 1)) 546 sm_dprintf("Non-set-user-ID binary: RunAsUid = RealUid = %d\n", 547 (int) RealUid); 548 RunAsUid = RealUid; 549 } 550 else if (geteuid() != 0) 551 RunAsUid = geteuid(); 552 553 EffGid = getegid(); 554 if (RealUid != 0 && EffGid == RealGid) 555 RunAsGid = RealGid; 556 557 if (tTd(47, 5)) 558 { 559 sm_dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n", 560 (int) geteuid(), (int) getuid(), 561 (int) getegid(), (int) getgid()); 562 sm_dprintf("main: RunAsUser = %d:%d\n", 563 (int) RunAsUid, (int) RunAsGid); 564 } 565 566 /* save command line arguments */ 567 j = 0; 568 for (av = argv; *av != NULL; ) 569 j += strlen(*av++) + 1; 570 SaveArgv = (char **) xalloc(sizeof (char *) * (argc + 1)); 571 CommandLineArgs = xalloc(j); 572 p = CommandLineArgs; 573 for (av = argv, i = 0; *av != NULL; ) 574 { 575 int h; 576 577 SaveArgv[i++] = newstr(*av); 578 if (av != argv) 579 *p++ = ' '; 580 (void) sm_strlcpy(p, *av++, j); 581 h = strlen(p); 582 p += h; 583 j -= h + 1; 584 } 585 SaveArgv[i] = NULL; 586 587 if (tTd(0, 1)) 588 { 589 extern char *CompileOptions[]; 590 591 sm_dprintf("Version %s\n Compiled with:", Version); 592 sm_printoptions(CompileOptions); 593 } 594 if (tTd(0, 10)) 595 { 596 extern char *OsCompileOptions[]; 597 598 sm_dprintf(" OS Defines:"); 599 sm_printoptions(OsCompileOptions); 600 #ifdef _PATH_UNIX 601 sm_dprintf("Kernel symbols:\t%s\n", _PATH_UNIX); 602 #endif /* _PATH_UNIX */ 603 604 sm_dprintf(" Conf file:\t%s (default for MSP)\n", 605 getcfname(OpMode, SubmitMode, SM_GET_SUBMIT_CF, 606 conffile)); 607 sm_dprintf(" Conf file:\t%s (default for MTA)\n", 608 getcfname(OpMode, SubmitMode, SM_GET_SENDMAIL_CF, 609 conffile)); 610 sm_dprintf(" Pid file:\t%s (default)\n", PidFile); 611 } 612 613 if (tTd(0, 12)) 614 { 615 extern char *SmCompileOptions[]; 616 617 sm_dprintf(" libsm Defines:"); 618 sm_printoptions(SmCompileOptions); 619 } 620 621 if (tTd(0, 13)) 622 { 623 extern char *FFRCompileOptions[]; 624 625 sm_dprintf(" FFR Defines:"); 626 sm_printoptions(FFRCompileOptions); 627 } 628 629 /* clear sendmail's environment */ 630 ExternalEnviron = environ; 631 emptyenviron[0] = NULL; 632 environ = emptyenviron; 633 634 /* 635 ** restore any original TZ setting until TimeZoneSpec has been 636 ** determined - or early log messages may get bogus time stamps 637 */ 638 639 if ((p = getextenv("TZ")) != NULL) 640 { 641 char *tz; 642 int tzlen; 643 644 /* XXX check for reasonable length? */ 645 tzlen = strlen(p) + 4; 646 tz = xalloc(tzlen); 647 (void) sm_strlcpyn(tz, tzlen, 2, "TZ=", p); 648 649 /* XXX check return code? */ 650 (void) putenv(tz); 651 } 652 653 /* prime the child environment */ 654 sm_setuserenv("AGENT", "sendmail"); 655 656 (void) sm_signal(SIGPIPE, SIG_IGN); 657 OldUmask = umask(022); 658 FullName = getextenv("NAME"); 659 if (FullName != NULL) 660 FullName = newstr(FullName); 661 662 /* 663 ** Initialize name server if it is going to be used. 664 */ 665 666 #if NAMED_BIND 667 if (!bitset(RES_INIT, _res.options)) 668 (void) res_init(); 669 if (tTd(8, 8)) 670 _res.options |= RES_DEBUG; 671 else 672 _res.options &= ~RES_DEBUG; 673 # ifdef RES_NOALIASES 674 _res.options |= RES_NOALIASES; 675 # endif /* RES_NOALIASES */ 676 TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry; 677 TimeOuts.res_retry[RES_TO_FIRST] = _res.retry; 678 TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry; 679 TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans; 680 TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans; 681 TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans; 682 #endif /* NAMED_BIND */ 683 684 errno = 0; 685 from = NULL; 686 687 /* initialize some macros, etc. */ 688 init_vendor_macros(&BlankEnvelope); 689 690 /* version */ 691 macdefine(&BlankEnvelope.e_macro, A_PERM, 'v', Version); 692 693 /* hostname */ 694 hp = myhostname(jbuf, sizeof jbuf); 695 if (jbuf[0] != '\0') 696 { 697 struct utsname utsname; 698 699 if (tTd(0, 4)) 700 sm_dprintf("Canonical name: %s\n", jbuf); 701 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'w', jbuf); 702 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'j', jbuf); 703 setclass('w', jbuf); 704 705 p = strchr(jbuf, '.'); 706 if (p != NULL && p[1] != '\0') 707 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'm', &p[1]); 708 709 if (uname(&utsname) >= 0) 710 p = utsname.nodename; 711 else 712 { 713 if (tTd(0, 22)) 714 sm_dprintf("uname failed (%s)\n", 715 sm_errstring(errno)); 716 makelower(jbuf); 717 p = jbuf; 718 } 719 if (tTd(0, 4)) 720 sm_dprintf(" UUCP nodename: %s\n", p); 721 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'k', p); 722 setclass('k', p); 723 setclass('w', p); 724 } 725 if (hp != NULL) 726 { 727 for (av = hp->h_aliases; av != NULL && *av != NULL; av++) 728 { 729 if (tTd(0, 4)) 730 sm_dprintf("\ta.k.a.: %s\n", *av); 731 setclass('w', *av); 732 } 733 #if NETINET || NETINET6 734 for (i = 0; i >= 0 && hp->h_addr_list[i] != NULL; i++) 735 { 736 # if NETINET6 737 char *addr; 738 char buf6[INET6_ADDRSTRLEN]; 739 struct in6_addr ia6; 740 # endif /* NETINET6 */ 741 # if NETINET 742 struct in_addr ia; 743 # endif /* NETINET */ 744 char ipbuf[103]; 745 746 ipbuf[0] = '\0'; 747 switch (hp->h_addrtype) 748 { 749 # if NETINET 750 case AF_INET: 751 if (hp->h_length != INADDRSZ) 752 break; 753 754 memmove(&ia, hp->h_addr_list[i], INADDRSZ); 755 (void) sm_snprintf(ipbuf, sizeof ipbuf, 756 "[%.100s]", inet_ntoa(ia)); 757 break; 758 # endif /* NETINET */ 759 760 # if NETINET6 761 case AF_INET6: 762 if (hp->h_length != IN6ADDRSZ) 763 break; 764 765 memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ); 766 addr = anynet_ntop(&ia6, buf6, sizeof buf6); 767 if (addr != NULL) 768 (void) sm_snprintf(ipbuf, sizeof ipbuf, 769 "[%.100s]", addr); 770 break; 771 # endif /* NETINET6 */ 772 } 773 if (ipbuf[0] == '\0') 774 break; 775 776 if (tTd(0, 4)) 777 sm_dprintf("\ta.k.a.: %s\n", ipbuf); 778 setclass('w', ipbuf); 779 } 780 #endif /* NETINET || NETINET6 */ 781 #if NETINET6 782 freehostent(hp); 783 hp = NULL; 784 #endif /* NETINET6 */ 785 } 786 787 /* current time */ 788 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'b', arpadate((char *) NULL)); 789 790 /* current load average */ 791 sm_getla(); 792 793 QueueLimitRecipient = (QUEUE_CHAR *) NULL; 794 QueueLimitSender = (QUEUE_CHAR *) NULL; 795 QueueLimitId = (QUEUE_CHAR *) NULL; 796 QueueLimitQuarantine = (QUEUE_CHAR *) NULL; 797 798 /* 799 ** Crack argv. 800 */ 801 802 optind = 1; 803 while ((j = getopt(argc, argv, OPTIONS)) != -1) 804 { 805 switch (j) 806 { 807 case 'b': /* operations mode */ 808 /* already done */ 809 break; 810 811 case 'A': /* use Alternate sendmail/submit.cf */ 812 cftype = optarg[0] == 'c' ? SM_GET_SUBMIT_CF 813 : SM_GET_SENDMAIL_CF; 814 break; 815 816 case 'B': /* body type */ 817 CHECK_AGAINST_OPMODE(j); 818 BlankEnvelope.e_bodytype = newstr(optarg); 819 break; 820 821 case 'C': /* select configuration file (already done) */ 822 if (RealUid != 0) 823 warn_C_flag = true; 824 conffile = newstr(optarg); 825 dp = drop_privileges(true); 826 setstat(dp); 827 safecf = false; 828 break; 829 830 case 'D': 831 case 'd': /* debugging */ 832 /* already done */ 833 break; 834 835 case 'f': /* from address */ 836 case 'r': /* obsolete -f flag */ 837 CHECK_AGAINST_OPMODE(j); 838 if (from != NULL) 839 { 840 usrerr("More than one \"from\" person"); 841 ExitStat = EX_USAGE; 842 break; 843 } 844 if (optarg[0] == '\0') 845 from = newstr("<>"); 846 else 847 from = newstr(denlstring(optarg, true, true)); 848 if (strcmp(RealUserName, from) != 0) 849 warn_f_flag = j; 850 break; 851 852 case 'F': /* set full name */ 853 CHECK_AGAINST_OPMODE(j); 854 FullName = newstr(optarg); 855 break; 856 857 case 'G': /* relay (gateway) submission */ 858 /* already set */ 859 CHECK_AGAINST_OPMODE(j); 860 break; 861 862 case 'h': /* hop count */ 863 CHECK_AGAINST_OPMODE(j); 864 BlankEnvelope.e_hopcount = (short) strtol(optarg, &ep, 865 10); 866 (void) sm_snprintf(buf, sizeof buf, "%d", 867 BlankEnvelope.e_hopcount); 868 macdefine(&BlankEnvelope.e_macro, A_TEMP, 'c', buf); 869 870 if (*ep) 871 { 872 usrerr("Bad hop count (%s)", optarg); 873 ExitStat = EX_USAGE; 874 } 875 break; 876 877 case 'L': /* program label */ 878 /* already set */ 879 break; 880 881 case 'n': /* don't alias */ 882 CHECK_AGAINST_OPMODE(j); 883 NoAlias = true; 884 break; 885 886 case 'N': /* delivery status notifications */ 887 CHECK_AGAINST_OPMODE(j); 888 DefaultNotify |= QHASNOTIFY; 889 macdefine(&BlankEnvelope.e_macro, A_TEMP, 890 macid("{dsn_notify}"), optarg); 891 if (sm_strcasecmp(optarg, "never") == 0) 892 break; 893 for (p = optarg; p != NULL; optarg = p) 894 { 895 p = strchr(p, ','); 896 if (p != NULL) 897 *p++ = '\0'; 898 if (sm_strcasecmp(optarg, "success") == 0) 899 DefaultNotify |= QPINGONSUCCESS; 900 else if (sm_strcasecmp(optarg, "failure") == 0) 901 DefaultNotify |= QPINGONFAILURE; 902 else if (sm_strcasecmp(optarg, "delay") == 0) 903 DefaultNotify |= QPINGONDELAY; 904 else 905 { 906 usrerr("Invalid -N argument"); 907 ExitStat = EX_USAGE; 908 } 909 } 910 break; 911 912 case 'o': /* set option */ 913 setoption(*optarg, optarg + 1, false, true, 914 &BlankEnvelope); 915 break; 916 917 case 'O': /* set option (long form) */ 918 setoption(' ', optarg, false, true, &BlankEnvelope); 919 break; 920 921 case 'p': /* set protocol */ 922 CHECK_AGAINST_OPMODE(j); 923 p = strchr(optarg, ':'); 924 if (p != NULL) 925 { 926 *p++ = '\0'; 927 if (*p != '\0') 928 { 929 i = strlen(p) + 1; 930 ep = sm_malloc_x(i); 931 cleanstrcpy(ep, p, i); 932 macdefine(&BlankEnvelope.e_macro, 933 A_HEAP, 's', ep); 934 } 935 } 936 if (*optarg != '\0') 937 { 938 i = strlen(optarg) + 1; 939 ep = sm_malloc_x(i); 940 cleanstrcpy(ep, optarg, i); 941 macdefine(&BlankEnvelope.e_macro, A_HEAP, 942 'r', ep); 943 } 944 break; 945 946 case 'Q': /* change quarantining on queued items */ 947 /* sanity check */ 948 if (OpMode != MD_DELIVER && 949 OpMode != MD_QUEUERUN) 950 { 951 usrerr("Can not use -Q with -b%c", OpMode); 952 ExitStat = EX_USAGE; 953 break; 954 } 955 956 if (OpMode == MD_DELIVER) 957 set_op_mode(MD_QUEUERUN); 958 959 FullName = NULL; 960 961 quarantining = newstr(optarg); 962 break; 963 964 case 'q': /* run queue files at intervals */ 965 /* sanity check */ 966 if (OpMode != MD_DELIVER && 967 OpMode != MD_DAEMON && 968 OpMode != MD_FGDAEMON && 969 OpMode != MD_PRINT && 970 OpMode != MD_PRINTNQE && 971 OpMode != MD_QUEUERUN) 972 { 973 usrerr("Can not use -q with -b%c", OpMode); 974 ExitStat = EX_USAGE; 975 break; 976 } 977 978 /* don't override -bd, -bD or -bp */ 979 if (OpMode == MD_DELIVER) 980 set_op_mode(MD_QUEUERUN); 981 982 FullName = NULL; 983 negate = optarg[0] == '!'; 984 if (negate) 985 { 986 /* negate meaning of pattern match */ 987 optarg++; /* skip '!' for next switch */ 988 } 989 990 switch (optarg[0]) 991 { 992 case 'G': /* Limit by queue group name */ 993 if (negate) 994 { 995 usrerr("Can not use -q!G"); 996 ExitStat = EX_USAGE; 997 break; 998 } 999 if (queuegroup != NULL) 1000 { 1001 usrerr("Can not use multiple -qG options"); 1002 ExitStat = EX_USAGE; 1003 break; 1004 } 1005 queuegroup = newstr(&optarg[1]); 1006 break; 1007 1008 case 'I': /* Limit by ID */ 1009 new = (QUEUE_CHAR *) xalloc(sizeof *new); 1010 new->queue_match = newstr(&optarg[1]); 1011 new->queue_negate = negate; 1012 new->queue_next = QueueLimitId; 1013 QueueLimitId = new; 1014 break; 1015 1016 case 'R': /* Limit by recipient */ 1017 new = (QUEUE_CHAR *) xalloc(sizeof *new); 1018 new->queue_match = newstr(&optarg[1]); 1019 new->queue_negate = negate; 1020 new->queue_next = QueueLimitRecipient; 1021 QueueLimitRecipient = new; 1022 break; 1023 1024 case 'S': /* Limit by sender */ 1025 new = (QUEUE_CHAR *) xalloc(sizeof *new); 1026 new->queue_match = newstr(&optarg[1]); 1027 new->queue_negate = negate; 1028 new->queue_next = QueueLimitSender; 1029 QueueLimitSender = new; 1030 break; 1031 1032 case 'f': /* foreground queue run */ 1033 foregroundqueue = true; 1034 break; 1035 1036 case 'Q': /* Limit by quarantine message */ 1037 if (optarg[1] != '\0') 1038 { 1039 new = (QUEUE_CHAR *) xalloc(sizeof *new); 1040 new->queue_match = newstr(&optarg[1]); 1041 new->queue_negate = negate; 1042 new->queue_next = QueueLimitQuarantine; 1043 QueueLimitQuarantine = new; 1044 } 1045 QueueMode = QM_QUARANTINE; 1046 break; 1047 1048 case 'L': /* act on lost items */ 1049 QueueMode = QM_LOST; 1050 break; 1051 1052 case 'p': /* Persistent queue */ 1053 queuepersistent = true; 1054 if (QueueIntvl == 0) 1055 QueueIntvl = 1; 1056 if (optarg[1] == '\0') 1057 break; 1058 ++optarg; 1059 /* FALLTHROUGH */ 1060 1061 default: 1062 i = Errors; 1063 QueueIntvl = convtime(optarg, 'm'); 1064 if (QueueIntvl < 0) 1065 { 1066 usrerr("Invalid -q value"); 1067 ExitStat = EX_USAGE; 1068 } 1069 1070 /* check for bad conversion */ 1071 if (i < Errors) 1072 ExitStat = EX_USAGE; 1073 break; 1074 } 1075 break; 1076 1077 case 'R': /* DSN RET: what to return */ 1078 CHECK_AGAINST_OPMODE(j); 1079 if (bitset(EF_RET_PARAM, BlankEnvelope.e_flags)) 1080 { 1081 usrerr("Duplicate -R flag"); 1082 ExitStat = EX_USAGE; 1083 break; 1084 } 1085 BlankEnvelope.e_flags |= EF_RET_PARAM; 1086 if (sm_strcasecmp(optarg, "hdrs") == 0) 1087 BlankEnvelope.e_flags |= EF_NO_BODY_RETN; 1088 else if (sm_strcasecmp(optarg, "full") != 0) 1089 { 1090 usrerr("Invalid -R value"); 1091 ExitStat = EX_USAGE; 1092 } 1093 macdefine(&BlankEnvelope.e_macro, A_TEMP, 1094 macid("{dsn_ret}"), optarg); 1095 break; 1096 1097 case 't': /* read recipients from message */ 1098 CHECK_AGAINST_OPMODE(j); 1099 GrabTo = true; 1100 break; 1101 1102 case 'V': /* DSN ENVID: set "original" envelope id */ 1103 CHECK_AGAINST_OPMODE(j); 1104 if (!xtextok(optarg)) 1105 { 1106 usrerr("Invalid syntax in -V flag"); 1107 ExitStat = EX_USAGE; 1108 } 1109 else 1110 { 1111 BlankEnvelope.e_envid = newstr(optarg); 1112 macdefine(&BlankEnvelope.e_macro, A_TEMP, 1113 macid("{dsn_envid}"), optarg); 1114 } 1115 break; 1116 1117 case 'X': /* traffic log file */ 1118 dp = drop_privileges(true); 1119 setstat(dp); 1120 if (stat(optarg, &traf_st) == 0 && 1121 S_ISFIFO(traf_st.st_mode)) 1122 TrafficLogFile = sm_io_open(SmFtStdio, 1123 SM_TIME_DEFAULT, 1124 optarg, 1125 SM_IO_WRONLY, NULL); 1126 else 1127 TrafficLogFile = sm_io_open(SmFtStdio, 1128 SM_TIME_DEFAULT, 1129 optarg, 1130 SM_IO_APPEND, NULL); 1131 if (TrafficLogFile == NULL) 1132 { 1133 syserr("cannot open %s", optarg); 1134 ExitStat = EX_CANTCREAT; 1135 break; 1136 } 1137 (void) sm_io_setvbuf(TrafficLogFile, SM_TIME_DEFAULT, 1138 NULL, SM_IO_LBF, 0); 1139 break; 1140 1141 /* compatibility flags */ 1142 case 'c': /* connect to non-local mailers */ 1143 case 'i': /* don't let dot stop me */ 1144 case 'm': /* send to me too */ 1145 case 'T': /* set timeout interval */ 1146 case 'v': /* give blow-by-blow description */ 1147 setoption(j, "T", false, true, &BlankEnvelope); 1148 break; 1149 1150 case 'e': /* error message disposition */ 1151 case 'M': /* define macro */ 1152 setoption(j, optarg, false, true, &BlankEnvelope); 1153 break; 1154 1155 case 's': /* save From lines in headers */ 1156 setoption('f', "T", false, true, &BlankEnvelope); 1157 break; 1158 1159 #ifdef DBM 1160 case 'I': /* initialize alias DBM file */ 1161 set_op_mode(MD_INITALIAS); 1162 break; 1163 #endif /* DBM */ 1164 1165 #if defined(__osf__) || defined(_AIX3) 1166 case 'x': /* random flag that OSF/1 & AIX mailx passes */ 1167 break; 1168 #endif /* defined(__osf__) || defined(_AIX3) */ 1169 #if defined(sony_news) 1170 case 'E': 1171 case 'J': /* ignore flags for Japanese code conversion 1172 implemented on Sony NEWS */ 1173 break; 1174 #endif /* defined(sony_news) */ 1175 1176 default: 1177 finis(true, true, EX_USAGE); 1178 /* NOTREACHED */ 1179 break; 1180 } 1181 } 1182 1183 /* if we've had errors so far, exit now */ 1184 if ((ExitStat != EX_OK && OpMode != MD_TEST) || 1185 ExitStat == EX_OSERR) 1186 { 1187 finis(false, true, ExitStat); 1188 /* NOTREACHED */ 1189 } 1190 1191 if (bitset(SUBMIT_MTA, SubmitMode)) 1192 { 1193 /* If set daemon_flags on command line, don't reset it */ 1194 if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL) 1195 macdefine(&BlankEnvelope.e_macro, A_PERM, 1196 macid("{daemon_flags}"), "CC f"); 1197 } 1198 else if (OpMode == MD_DELIVER || OpMode == MD_SMTP) 1199 { 1200 SubmitMode = SUBMIT_MSA; 1201 1202 /* If set daemon_flags on command line, don't reset it */ 1203 if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL) 1204 macdefine(&BlankEnvelope.e_macro, A_PERM, 1205 macid("{daemon_flags}"), "c u"); 1206 } 1207 1208 /* 1209 ** Do basic initialization. 1210 ** Read system control file. 1211 ** Extract special fields for local use. 1212 */ 1213 1214 #if XDEBUG 1215 checkfd012("before readcf"); 1216 #endif /* XDEBUG */ 1217 vendor_pre_defaults(&BlankEnvelope); 1218 1219 readcf(getcfname(OpMode, SubmitMode, cftype, conffile), 1220 safecf, &BlankEnvelope); 1221 #if !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_) 1222 ConfigFileRead = true; 1223 #endif /* !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_) */ 1224 vendor_post_defaults(&BlankEnvelope); 1225 1226 /* now we can complain about missing fds */ 1227 if (MissingFds != 0 && LogLevel > 8) 1228 { 1229 char mbuf[MAXLINE]; 1230 1231 mbuf[0] = '\0'; 1232 if (bitset(1 << STDIN_FILENO, MissingFds)) 1233 (void) sm_strlcat(mbuf, ", stdin", sizeof mbuf); 1234 if (bitset(1 << STDOUT_FILENO, MissingFds)) 1235 (void) sm_strlcat(mbuf, ", stdout", sizeof mbuf); 1236 if (bitset(1 << STDERR_FILENO, MissingFds)) 1237 (void) sm_strlcat(mbuf, ", stderr", sizeof mbuf); 1238 1239 /* Notice: fill_errno is from high above: fill_fd() */ 1240 sm_syslog(LOG_WARNING, NOQID, 1241 "File descriptors missing on startup: %s; %s", 1242 &mbuf[2], sm_errstring(fill_errno)); 1243 } 1244 1245 /* Remove the ability for a normal user to send signals */ 1246 if (RealUid != 0 && RealUid != geteuid()) 1247 { 1248 uid_t new_uid = geteuid(); 1249 1250 #if HASSETREUID 1251 /* 1252 ** Since we can differentiate between uid and euid, 1253 ** make the uid a different user so the real user 1254 ** can't send signals. However, it doesn't need to be 1255 ** root (euid has root). 1256 */ 1257 1258 if (new_uid == 0) 1259 new_uid = DefUid; 1260 if (tTd(47, 5)) 1261 sm_dprintf("Changing real uid to %d\n", (int) new_uid); 1262 if (setreuid(new_uid, geteuid()) < 0) 1263 { 1264 syserr("main: setreuid(%d, %d) failed", 1265 (int) new_uid, (int) geteuid()); 1266 finis(false, true, EX_OSERR); 1267 /* NOTREACHED */ 1268 } 1269 if (tTd(47, 10)) 1270 sm_dprintf("Now running as e/ruid %d:%d\n", 1271 (int) geteuid(), (int) getuid()); 1272 #else /* HASSETREUID */ 1273 /* 1274 ** Have to change both effective and real so need to 1275 ** change them both to effective to keep privs. 1276 */ 1277 1278 if (tTd(47, 5)) 1279 sm_dprintf("Changing uid to %d\n", (int) new_uid); 1280 if (setuid(new_uid) < 0) 1281 { 1282 syserr("main: setuid(%d) failed", (int) new_uid); 1283 finis(false, true, EX_OSERR); 1284 /* NOTREACHED */ 1285 } 1286 if (tTd(47, 10)) 1287 sm_dprintf("Now running as e/ruid %d:%d\n", 1288 (int) geteuid(), (int) getuid()); 1289 #endif /* HASSETREUID */ 1290 } 1291 1292 #if NAMED_BIND 1293 if (FallbackMX != NULL) 1294 (void) getfallbackmxrr(FallbackMX); 1295 #endif /* NAMED_BIND */ 1296 1297 if (SuperSafe == SAFE_INTERACTIVE && CurEnv->e_sendmode != SM_DELIVER) 1298 { 1299 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 1300 "WARNING: SuperSafe=interactive should only be used with\n DeliveryMode=interactive\n"); 1301 } 1302 1303 if (UseMSP && (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON)) 1304 { 1305 usrerr("Mail submission program cannot be used as daemon"); 1306 finis(false, true, EX_USAGE); 1307 } 1308 1309 if (OpMode == MD_DELIVER || OpMode == MD_SMTP || 1310 OpMode == MD_QUEUERUN || OpMode == MD_ARPAFTP || 1311 OpMode == MD_DAEMON || OpMode == MD_FGDAEMON) 1312 makeworkgroups(); 1313 1314 /* set up the basic signal handlers */ 1315 if (sm_signal(SIGINT, SIG_IGN) != SIG_IGN) 1316 (void) sm_signal(SIGINT, intsig); 1317 (void) sm_signal(SIGTERM, intsig); 1318 1319 /* Enforce use of local time (null string overrides this) */ 1320 if (TimeZoneSpec == NULL) 1321 unsetenv("TZ"); 1322 else if (TimeZoneSpec[0] != '\0') 1323 sm_setuserenv("TZ", TimeZoneSpec); 1324 else 1325 sm_setuserenv("TZ", NULL); 1326 tzset(); 1327 1328 /* initialize mailbox database */ 1329 i = sm_mbdb_initialize(Mbdb); 1330 if (i != EX_OK) 1331 { 1332 usrerr("Can't initialize mailbox database \"%s\": %s", 1333 Mbdb, sm_strexit(i)); 1334 ExitStat = i; 1335 } 1336 1337 /* avoid denial-of-service attacks */ 1338 resetlimits(); 1339 1340 if (OpMode == MD_TEST) 1341 { 1342 /* can't be done after readcf if RunAs* is used */ 1343 dp = drop_privileges(true); 1344 if (dp != EX_OK) 1345 { 1346 finis(false, true, dp); 1347 /* NOTREACHED */ 1348 } 1349 } 1350 else if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON) 1351 { 1352 /* drop privileges -- daemon mode done after socket/bind */ 1353 dp = drop_privileges(false); 1354 setstat(dp); 1355 if (dp == EX_OK && UseMSP && (geteuid() == 0 || getuid() == 0)) 1356 { 1357 usrerr("Mail submission program must have RunAsUser set to non root user"); 1358 finis(false, true, EX_CONFIG); 1359 /* NOTREACHED */ 1360 } 1361 } 1362 1363 #if NAMED_BIND 1364 _res.retry = TimeOuts.res_retry[RES_TO_DEFAULT]; 1365 _res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT]; 1366 #endif /* NAMED_BIND */ 1367 1368 /* 1369 ** Find our real host name for future logging. 1370 */ 1371 1372 authinfo = getauthinfo(STDIN_FILENO, &forged); 1373 macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo); 1374 1375 /* suppress error printing if errors mailed back or whatever */ 1376 if (BlankEnvelope.e_errormode != EM_PRINT) 1377 HoldErrs = true; 1378 1379 /* set up the $=m class now, after .cf has a chance to redefine $m */ 1380 expand("\201m", jbuf, sizeof jbuf, &BlankEnvelope); 1381 if (jbuf[0] != '\0') 1382 setclass('m', jbuf); 1383 1384 /* probe interfaces and locate any additional names */ 1385 if (DontProbeInterfaces != DPI_PROBENONE) 1386 load_if_names(); 1387 1388 if (tTd(0, 10)) 1389 { 1390 char pidpath[MAXPATHLEN]; 1391 1392 /* Now we know which .cf file we use */ 1393 sm_dprintf(" Conf file:\t%s (selected)\n", 1394 getcfname(OpMode, SubmitMode, cftype, conffile)); 1395 expand(PidFile, pidpath, sizeof pidpath, &BlankEnvelope); 1396 sm_dprintf(" Pid file:\t%s (selected)\n", pidpath); 1397 } 1398 1399 if (tTd(0, 1)) 1400 { 1401 sm_dprintf("\n============ SYSTEM IDENTITY (after readcf) ============"); 1402 sm_dprintf("\n (short domain name) $w = "); 1403 xputs(sm_debug_file(), macvalue('w', &BlankEnvelope)); 1404 sm_dprintf("\n (canonical domain name) $j = "); 1405 xputs(sm_debug_file(), macvalue('j', &BlankEnvelope)); 1406 sm_dprintf("\n (subdomain name) $m = "); 1407 xputs(sm_debug_file(), macvalue('m', &BlankEnvelope)); 1408 sm_dprintf("\n (node name) $k = "); 1409 xputs(sm_debug_file(), macvalue('k', &BlankEnvelope)); 1410 sm_dprintf("\n========================================================\n\n"); 1411 } 1412 1413 /* 1414 ** Do more command line checking -- these are things that 1415 ** have to modify the results of reading the config file. 1416 */ 1417 1418 /* process authorization warnings from command line */ 1419 if (warn_C_flag) 1420 auth_warning(&BlankEnvelope, "Processed by %s with -C %s", 1421 RealUserName, conffile); 1422 if (Warn_Q_option && !wordinclass(RealUserName, 't')) 1423 auth_warning(&BlankEnvelope, "Processed from queue %s", 1424 QueueDir); 1425 if (sysloglabel != NULL && !wordinclass(RealUserName, 't') && 1426 RealUid != 0 && RealUid != TrustedUid && LogLevel > 1) 1427 sm_syslog(LOG_WARNING, NOQID, "user %d changed syslog label", 1428 (int) RealUid); 1429 1430 /* check body type for legality */ 1431 i = check_bodytype(BlankEnvelope.e_bodytype); 1432 if (i == BODYTYPE_ILLEGAL) 1433 { 1434 usrerr("Illegal body type %s", BlankEnvelope.e_bodytype); 1435 BlankEnvelope.e_bodytype = NULL; 1436 } 1437 else if (i != BODYTYPE_NONE) 1438 SevenBitInput = (i == BODYTYPE_7BIT); 1439 1440 /* tweak default DSN notifications */ 1441 if (DefaultNotify == 0) 1442 DefaultNotify = QPINGONFAILURE|QPINGONDELAY; 1443 1444 /* check for sane configuration level */ 1445 if (ConfigLevel > MAXCONFIGLEVEL) 1446 { 1447 syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)", 1448 ConfigLevel, Version, MAXCONFIGLEVEL); 1449 } 1450 1451 /* need MCI cache to have persistence */ 1452 if (HostStatDir != NULL && MaxMciCache == 0) 1453 { 1454 HostStatDir = NULL; 1455 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 1456 "Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n"); 1457 } 1458 1459 /* need HostStatusDir in order to have SingleThreadDelivery */ 1460 if (SingleThreadDelivery && HostStatDir == NULL) 1461 { 1462 SingleThreadDelivery = false; 1463 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 1464 "Warning: HostStatusDirectory required for SingleThreadDelivery\n"); 1465 } 1466 1467 #if _FFR_MEMSTAT 1468 j = sm_memstat_open(); 1469 if (j < 0 && (RefuseLowMem > 0 || QueueLowMem > 0) && LogLevel > 4) 1470 { 1471 sm_syslog(LOG_WARNING, NOQID, 1472 "cannot get memory statistics, settings ignored, error=%d" 1473 , j); 1474 } 1475 #endif /* _FFR_MEMSTAT */ 1476 1477 /* check for permissions */ 1478 if (RealUid != 0 && 1479 RealUid != TrustedUid) 1480 { 1481 char *action = NULL; 1482 1483 switch (OpMode) 1484 { 1485 case MD_QUEUERUN: 1486 if (quarantining != NULL) 1487 action = "quarantine jobs"; 1488 else 1489 { 1490 /* Normal users can do a single queue run */ 1491 if (QueueIntvl == 0) 1492 break; 1493 } 1494 1495 /* but not persistent queue runners */ 1496 if (action == NULL) 1497 action = "start a queue runner daemon"; 1498 /* FALLTHROUGH */ 1499 1500 case MD_PURGESTAT: 1501 if (action == NULL) 1502 action = "purge host status"; 1503 /* FALLTHROUGH */ 1504 1505 case MD_DAEMON: 1506 case MD_FGDAEMON: 1507 if (action == NULL) 1508 action = "run daemon"; 1509 1510 if (tTd(65, 1)) 1511 sm_dprintf("Deny user %d attempt to %s\n", 1512 (int) RealUid, action); 1513 1514 if (LogLevel > 1) 1515 sm_syslog(LOG_ALERT, NOQID, 1516 "user %d attempted to %s", 1517 (int) RealUid, action); 1518 HoldErrs = false; 1519 usrerr("Permission denied (real uid not trusted)"); 1520 finis(false, true, EX_USAGE); 1521 /* NOTREACHED */ 1522 break; 1523 1524 case MD_VERIFY: 1525 if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags)) 1526 { 1527 /* 1528 ** If -bv and RestrictExpand, 1529 ** drop privs to prevent normal 1530 ** users from reading private 1531 ** aliases/forwards/:include:s 1532 */ 1533 1534 if (tTd(65, 1)) 1535 sm_dprintf("Drop privs for user %d attempt to expand (RestrictExpand)\n", 1536 (int) RealUid); 1537 1538 dp = drop_privileges(true); 1539 1540 /* Fake address safety */ 1541 if (tTd(65, 1)) 1542 sm_dprintf("Faking DontBlameSendmail=NonRootSafeAddr\n"); 1543 setbitn(DBS_NONROOTSAFEADDR, DontBlameSendmail); 1544 1545 if (dp != EX_OK) 1546 { 1547 if (tTd(65, 1)) 1548 sm_dprintf("Failed to drop privs for user %d attempt to expand, exiting\n", 1549 (int) RealUid); 1550 CurEnv->e_id = NULL; 1551 finis(true, true, dp); 1552 /* NOTREACHED */ 1553 } 1554 } 1555 break; 1556 1557 case MD_TEST: 1558 case MD_PRINT: 1559 case MD_PRINTNQE: 1560 case MD_FREEZE: 1561 case MD_HOSTSTAT: 1562 /* Nothing special to check */ 1563 break; 1564 1565 case MD_INITALIAS: 1566 if (!wordinclass(RealUserName, 't')) 1567 { 1568 if (tTd(65, 1)) 1569 sm_dprintf("Deny user %d attempt to rebuild the alias map\n", 1570 (int) RealUid); 1571 if (LogLevel > 1) 1572 sm_syslog(LOG_ALERT, NOQID, 1573 "user %d attempted to rebuild the alias map", 1574 (int) RealUid); 1575 HoldErrs = false; 1576 usrerr("Permission denied (real uid not trusted)"); 1577 finis(false, true, EX_USAGE); 1578 /* NOTREACHED */ 1579 } 1580 if (UseMSP) 1581 { 1582 HoldErrs = false; 1583 usrerr("User %d cannot rebuild aliases in mail submission program", 1584 (int) RealUid); 1585 finis(false, true, EX_USAGE); 1586 /* NOTREACHED */ 1587 } 1588 /* FALLTHROUGH */ 1589 1590 default: 1591 if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags) && 1592 Verbose != 0) 1593 { 1594 /* 1595 ** If -v and RestrictExpand, reset 1596 ** Verbose to prevent normal users 1597 ** from seeing the expansion of 1598 ** aliases/forwards/:include:s 1599 */ 1600 1601 if (tTd(65, 1)) 1602 sm_dprintf("Dropping verbosity for user %d (RestrictExpand)\n", 1603 (int) RealUid); 1604 Verbose = 0; 1605 } 1606 break; 1607 } 1608 } 1609 1610 if (MeToo) 1611 BlankEnvelope.e_flags |= EF_METOO; 1612 1613 switch (OpMode) 1614 { 1615 case MD_TEST: 1616 /* don't have persistent host status in test mode */ 1617 HostStatDir = NULL; 1618 if (Verbose == 0) 1619 Verbose = 2; 1620 BlankEnvelope.e_errormode = EM_PRINT; 1621 HoldErrs = false; 1622 break; 1623 1624 case MD_VERIFY: 1625 BlankEnvelope.e_errormode = EM_PRINT; 1626 HoldErrs = false; 1627 /* arrange to exit cleanly on hangup signal */ 1628 if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL) 1629 (void) sm_signal(SIGHUP, intsig); 1630 if (geteuid() != 0) 1631 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 1632 "Notice: -bv may give misleading output for non-privileged user\n"); 1633 break; 1634 1635 case MD_FGDAEMON: 1636 run_in_foreground = true; 1637 set_op_mode(MD_DAEMON); 1638 /* FALLTHROUGH */ 1639 1640 case MD_DAEMON: 1641 vendor_daemon_setup(&BlankEnvelope); 1642 1643 /* remove things that don't make sense in daemon mode */ 1644 FullName = NULL; 1645 GrabTo = false; 1646 1647 /* arrange to restart on hangup signal */ 1648 if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/') 1649 sm_syslog(LOG_WARNING, NOQID, 1650 "daemon invoked without full pathname; kill -1 won't work"); 1651 break; 1652 1653 case MD_INITALIAS: 1654 Verbose = 2; 1655 BlankEnvelope.e_errormode = EM_PRINT; 1656 HoldErrs = false; 1657 /* FALLTHROUGH */ 1658 1659 default: 1660 /* arrange to exit cleanly on hangup signal */ 1661 if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL) 1662 (void) sm_signal(SIGHUP, intsig); 1663 break; 1664 } 1665 1666 /* special considerations for FullName */ 1667 if (FullName != NULL) 1668 { 1669 char *full = NULL; 1670 1671 /* full names can't have newlines */ 1672 if (strchr(FullName, '\n') != NULL) 1673 { 1674 full = newstr(denlstring(FullName, true, true)); 1675 FullName = full; 1676 } 1677 1678 /* check for characters that may have to be quoted */ 1679 if (!rfc822_string(FullName)) 1680 { 1681 /* 1682 ** Quote a full name with special characters 1683 ** as a comment so crackaddr() doesn't destroy 1684 ** the name portion of the address. 1685 */ 1686 1687 FullName = addquotes(FullName, NULL); 1688 if (full != NULL) 1689 sm_free(full); /* XXX */ 1690 } 1691 } 1692 1693 /* do heuristic mode adjustment */ 1694 if (Verbose) 1695 { 1696 /* turn off noconnect option */ 1697 setoption('c', "F", true, false, &BlankEnvelope); 1698 1699 /* turn on interactive delivery */ 1700 setoption('d', "", true, false, &BlankEnvelope); 1701 } 1702 1703 #ifdef VENDOR_CODE 1704 /* check for vendor mismatch */ 1705 if (VendorCode != VENDOR_CODE) 1706 { 1707 message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s", 1708 getvendor(VENDOR_CODE), getvendor(VendorCode)); 1709 } 1710 #endif /* VENDOR_CODE */ 1711 1712 /* check for out of date configuration level */ 1713 if (ConfigLevel < MAXCONFIGLEVEL) 1714 { 1715 message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d", 1716 Version, MAXCONFIGLEVEL, ConfigLevel); 1717 } 1718 1719 if (ConfigLevel < 3) 1720 UseErrorsTo = true; 1721 1722 /* set options that were previous macros */ 1723 if (SmtpGreeting == NULL) 1724 { 1725 if (ConfigLevel < 7 && 1726 (p = macvalue('e', &BlankEnvelope)) != NULL) 1727 SmtpGreeting = newstr(p); 1728 else 1729 SmtpGreeting = "\201j Sendmail \201v ready at \201b"; 1730 } 1731 if (UnixFromLine == NULL) 1732 { 1733 if (ConfigLevel < 7 && 1734 (p = macvalue('l', &BlankEnvelope)) != NULL) 1735 UnixFromLine = newstr(p); 1736 else 1737 UnixFromLine = "From \201g \201d"; 1738 } 1739 SmtpError[0] = '\0'; 1740 1741 /* our name for SMTP codes */ 1742 expand("\201j", jbuf, sizeof jbuf, &BlankEnvelope); 1743 if (jbuf[0] == '\0') 1744 PSTRSET(MyHostName, "localhost"); 1745 else 1746 PSTRSET(MyHostName, jbuf); 1747 if (strchr(MyHostName, '.') == NULL) 1748 message("WARNING: local host name (%s) is not qualified; see cf/README: WHO AM I?", 1749 MyHostName); 1750 1751 /* make certain that this name is part of the $=w class */ 1752 setclass('w', MyHostName); 1753 1754 /* fill in the structure of the *default* queue */ 1755 st = stab("mqueue", ST_QUEUE, ST_FIND); 1756 if (st == NULL) 1757 syserr("No default queue (mqueue) defined"); 1758 else 1759 set_def_queueval(st->s_quegrp, true); 1760 1761 /* the indices of built-in mailers */ 1762 st = stab("local", ST_MAILER, ST_FIND); 1763 if (st != NULL) 1764 LocalMailer = st->s_mailer; 1765 else if (OpMode != MD_TEST || !warn_C_flag) 1766 syserr("No local mailer defined"); 1767 1768 st = stab("prog", ST_MAILER, ST_FIND); 1769 if (st == NULL) 1770 syserr("No prog mailer defined"); 1771 else 1772 { 1773 ProgMailer = st->s_mailer; 1774 clrbitn(M_MUSER, ProgMailer->m_flags); 1775 } 1776 1777 st = stab("*file*", ST_MAILER, ST_FIND); 1778 if (st == NULL) 1779 syserr("No *file* mailer defined"); 1780 else 1781 { 1782 FileMailer = st->s_mailer; 1783 clrbitn(M_MUSER, FileMailer->m_flags); 1784 } 1785 1786 st = stab("*include*", ST_MAILER, ST_FIND); 1787 if (st == NULL) 1788 syserr("No *include* mailer defined"); 1789 else 1790 InclMailer = st->s_mailer; 1791 1792 if (ConfigLevel < 6) 1793 { 1794 /* heuristic tweaking of local mailer for back compat */ 1795 if (LocalMailer != NULL) 1796 { 1797 setbitn(M_ALIASABLE, LocalMailer->m_flags); 1798 setbitn(M_HASPWENT, LocalMailer->m_flags); 1799 setbitn(M_TRYRULESET5, LocalMailer->m_flags); 1800 setbitn(M_CHECKINCLUDE, LocalMailer->m_flags); 1801 setbitn(M_CHECKPROG, LocalMailer->m_flags); 1802 setbitn(M_CHECKFILE, LocalMailer->m_flags); 1803 setbitn(M_CHECKUDB, LocalMailer->m_flags); 1804 } 1805 if (ProgMailer != NULL) 1806 setbitn(M_RUNASRCPT, ProgMailer->m_flags); 1807 if (FileMailer != NULL) 1808 setbitn(M_RUNASRCPT, FileMailer->m_flags); 1809 } 1810 if (ConfigLevel < 7) 1811 { 1812 if (LocalMailer != NULL) 1813 setbitn(M_VRFY250, LocalMailer->m_flags); 1814 if (ProgMailer != NULL) 1815 setbitn(M_VRFY250, ProgMailer->m_flags); 1816 if (FileMailer != NULL) 1817 setbitn(M_VRFY250, FileMailer->m_flags); 1818 } 1819 1820 /* MIME Content-Types that cannot be transfer encoded */ 1821 setclass('n', "multipart/signed"); 1822 1823 /* MIME message/xxx subtypes that can be treated as messages */ 1824 setclass('s', "rfc822"); 1825 1826 /* MIME Content-Transfer-Encodings that can be encoded */ 1827 setclass('e', "7bit"); 1828 setclass('e', "8bit"); 1829 setclass('e', "binary"); 1830 1831 #ifdef USE_B_CLASS 1832 /* MIME Content-Types that should be treated as binary */ 1833 setclass('b', "image"); 1834 setclass('b', "audio"); 1835 setclass('b', "video"); 1836 setclass('b', "application/octet-stream"); 1837 #endif /* USE_B_CLASS */ 1838 1839 /* MIME headers which have fields to check for overflow */ 1840 setclass(macid("{checkMIMEFieldHeaders}"), "content-disposition"); 1841 setclass(macid("{checkMIMEFieldHeaders}"), "content-type"); 1842 1843 /* MIME headers to check for length overflow */ 1844 setclass(macid("{checkMIMETextHeaders}"), "content-description"); 1845 1846 /* MIME headers to check for overflow and rebalance */ 1847 setclass(macid("{checkMIMEHeaders}"), "content-disposition"); 1848 setclass(macid("{checkMIMEHeaders}"), "content-id"); 1849 setclass(macid("{checkMIMEHeaders}"), "content-transfer-encoding"); 1850 setclass(macid("{checkMIMEHeaders}"), "content-type"); 1851 setclass(macid("{checkMIMEHeaders}"), "mime-version"); 1852 1853 /* Macros to save in the queue file -- don't remove any */ 1854 setclass(macid("{persistentMacros}"), "r"); 1855 setclass(macid("{persistentMacros}"), "s"); 1856 setclass(macid("{persistentMacros}"), "_"); 1857 setclass(macid("{persistentMacros}"), "{if_addr}"); 1858 setclass(macid("{persistentMacros}"), "{daemon_flags}"); 1859 1860 /* operate in queue directory */ 1861 if (QueueDir == NULL || *QueueDir == '\0') 1862 { 1863 if (OpMode != MD_TEST) 1864 { 1865 syserr("QueueDirectory (Q) option must be set"); 1866 ExitStat = EX_CONFIG; 1867 } 1868 } 1869 else 1870 { 1871 if (OpMode != MD_TEST) 1872 setup_queues(OpMode == MD_DAEMON); 1873 } 1874 1875 /* check host status directory for validity */ 1876 if (HostStatDir != NULL && !path_is_dir(HostStatDir, false)) 1877 { 1878 /* cannot use this value */ 1879 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 1880 "Warning: Cannot use HostStatusDirectory = %s: %s\n", 1881 HostStatDir, sm_errstring(errno)); 1882 HostStatDir = NULL; 1883 } 1884 1885 if (OpMode == MD_QUEUERUN && 1886 RealUid != 0 && bitset(PRIV_RESTRICTQRUN, PrivacyFlags)) 1887 { 1888 struct stat stbuf; 1889 1890 /* check to see if we own the queue directory */ 1891 if (stat(".", &stbuf) < 0) 1892 syserr("main: cannot stat %s", QueueDir); 1893 if (stbuf.st_uid != RealUid) 1894 { 1895 /* nope, really a botch */ 1896 HoldErrs = false; 1897 usrerr("You do not have permission to process the queue"); 1898 finis(false, true, EX_NOPERM); 1899 /* NOTREACHED */ 1900 } 1901 } 1902 1903 #if MILTER 1904 /* sanity checks on milter filters */ 1905 if (OpMode == MD_DAEMON || OpMode == MD_SMTP) 1906 { 1907 milter_config(InputFilterList, InputFilters, MAXFILTERS); 1908 setup_daemon_milters(); 1909 } 1910 #endif /* MILTER */ 1911 1912 /* Convert queuegroup string to qgrp number */ 1913 if (queuegroup != NULL) 1914 { 1915 qgrp = name2qid(queuegroup); 1916 if (qgrp == NOQGRP) 1917 { 1918 HoldErrs = false; 1919 usrerr("Queue group %s unknown", queuegroup); 1920 finis(false, true, ExitStat); 1921 /* NOTREACHED */ 1922 } 1923 } 1924 1925 /* if we've had errors so far, exit now */ 1926 if (ExitStat != EX_OK && OpMode != MD_TEST) 1927 { 1928 finis(false, true, ExitStat); 1929 /* NOTREACHED */ 1930 } 1931 1932 #if SASL 1933 /* sendmail specific SASL initialization */ 1934 sm_sasl_init(); 1935 #endif /* SASL */ 1936 1937 #if XDEBUG 1938 checkfd012("before main() initmaps"); 1939 #endif /* XDEBUG */ 1940 1941 /* 1942 ** Do operation-mode-dependent initialization. 1943 */ 1944 1945 switch (OpMode) 1946 { 1947 case MD_PRINT: 1948 /* print the queue */ 1949 HoldErrs = false; 1950 dropenvelope(&BlankEnvelope, true, false); 1951 (void) sm_signal(SIGPIPE, sigpipe); 1952 if (qgrp != NOQGRP) 1953 { 1954 int j; 1955 1956 /* Selecting a particular queue group to run */ 1957 for (j = 0; j < Queue[qgrp]->qg_numqueues; j++) 1958 { 1959 if (StopRequest) 1960 stop_sendmail(); 1961 (void) print_single_queue(qgrp, j); 1962 } 1963 finis(false, true, EX_OK); 1964 /* NOTREACHED */ 1965 } 1966 printqueue(); 1967 finis(false, true, EX_OK); 1968 /* NOTREACHED */ 1969 break; 1970 1971 case MD_PRINTNQE: 1972 /* print number of entries in queue */ 1973 dropenvelope(&BlankEnvelope, true, false); 1974 (void) sm_signal(SIGPIPE, sigpipe); 1975 printnqe(smioout, NULL); 1976 finis(false, true, EX_OK); 1977 /* NOTREACHED */ 1978 break; 1979 1980 case MD_QUEUERUN: 1981 /* only handle quarantining here */ 1982 if (quarantining == NULL) 1983 break; 1984 1985 if (QueueMode != QM_QUARANTINE && 1986 QueueMode != QM_NORMAL) 1987 { 1988 HoldErrs = false; 1989 usrerr("Can not use -Q with -q%c", QueueMode); 1990 ExitStat = EX_USAGE; 1991 finis(false, true, ExitStat); 1992 /* NOTREACHED */ 1993 } 1994 quarantine_queue(quarantining, qgrp); 1995 finis(false, true, EX_OK); 1996 break; 1997 1998 case MD_HOSTSTAT: 1999 (void) sm_signal(SIGPIPE, sigpipe); 2000 (void) mci_traverse_persistent(mci_print_persistent, NULL); 2001 finis(false, true, EX_OK); 2002 /* NOTREACHED */ 2003 break; 2004 2005 case MD_PURGESTAT: 2006 (void) mci_traverse_persistent(mci_purge_persistent, NULL); 2007 finis(false, true, EX_OK); 2008 /* NOTREACHED */ 2009 break; 2010 2011 case MD_INITALIAS: 2012 /* initialize maps */ 2013 initmaps(); 2014 finis(false, true, ExitStat); 2015 /* NOTREACHED */ 2016 break; 2017 2018 case MD_SMTP: 2019 case MD_DAEMON: 2020 /* reset DSN parameters */ 2021 DefaultNotify = QPINGONFAILURE|QPINGONDELAY; 2022 macdefine(&BlankEnvelope.e_macro, A_PERM, 2023 macid("{dsn_notify}"), NULL); 2024 BlankEnvelope.e_envid = NULL; 2025 macdefine(&BlankEnvelope.e_macro, A_PERM, 2026 macid("{dsn_envid}"), NULL); 2027 BlankEnvelope.e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN); 2028 macdefine(&BlankEnvelope.e_macro, A_PERM, 2029 macid("{dsn_ret}"), NULL); 2030 2031 /* don't open maps for daemon -- done below in child */ 2032 break; 2033 } 2034 2035 if (tTd(0, 15)) 2036 { 2037 /* print configuration table (or at least part of it) */ 2038 if (tTd(0, 90)) 2039 printrules(); 2040 for (i = 0; i < MAXMAILERS; i++) 2041 { 2042 if (Mailer[i] != NULL) 2043 printmailer(sm_debug_file(), Mailer[i]); 2044 } 2045 } 2046 2047 /* 2048 ** Switch to the main envelope. 2049 */ 2050 2051 CurEnv = newenvelope(&MainEnvelope, &BlankEnvelope, 2052 sm_rpool_new_x(NULL)); 2053 MainEnvelope.e_flags = BlankEnvelope.e_flags; 2054 2055 /* 2056 ** If test mode, read addresses from stdin and process. 2057 */ 2058 2059 if (OpMode == MD_TEST) 2060 { 2061 if (isatty(sm_io_getinfo(smioin, SM_IO_WHAT_FD, NULL))) 2062 Verbose = 2; 2063 2064 if (Verbose) 2065 { 2066 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 2067 "ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n"); 2068 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 2069 "Enter <ruleset> <address>\n"); 2070 } 2071 macdefine(&(MainEnvelope.e_macro), A_PERM, 2072 macid("{addr_type}"), "e r"); 2073 for (;;) 2074 { 2075 SM_TRY 2076 { 2077 (void) sm_signal(SIGINT, intindebug); 2078 (void) sm_releasesignal(SIGINT); 2079 if (Verbose == 2) 2080 (void) sm_io_fprintf(smioout, 2081 SM_TIME_DEFAULT, 2082 "> "); 2083 (void) sm_io_flush(smioout, SM_TIME_DEFAULT); 2084 if (sm_io_fgets(smioin, SM_TIME_DEFAULT, buf, 2085 sizeof buf) == NULL) 2086 testmodeline("/quit", &MainEnvelope); 2087 p = strchr(buf, '\n'); 2088 if (p != NULL) 2089 *p = '\0'; 2090 if (Verbose < 2) 2091 (void) sm_io_fprintf(smioout, 2092 SM_TIME_DEFAULT, 2093 "> %s\n", buf); 2094 testmodeline(buf, &MainEnvelope); 2095 } 2096 SM_EXCEPT(exc, "[!F]*") 2097 { 2098 /* 2099 ** 8.10 just prints \n on interrupt. 2100 ** I'm printing the exception here in case 2101 ** sendmail is extended to raise additional 2102 ** exceptions in this context. 2103 */ 2104 2105 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 2106 "\n"); 2107 sm_exc_print(exc, smioout); 2108 } 2109 SM_END_TRY 2110 } 2111 } 2112 2113 #if STARTTLS 2114 tls_ok = true; 2115 if (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER) 2116 { 2117 /* check whether STARTTLS is turned off for the client */ 2118 if (chkclientmodifiers(D_NOTLS)) 2119 tls_ok = false; 2120 } 2121 else if (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON || 2122 OpMode == MD_SMTP) 2123 { 2124 /* check whether STARTTLS is turned off for the server */ 2125 if (chkdaemonmodifiers(D_NOTLS)) 2126 tls_ok = false; 2127 } 2128 else /* other modes don't need STARTTLS */ 2129 tls_ok = false; 2130 2131 if (tls_ok) 2132 { 2133 /* basic TLS initialization */ 2134 tls_ok = init_tls_library(); 2135 } 2136 2137 if (!tls_ok && (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER)) 2138 { 2139 /* disable TLS for client */ 2140 setclttls(false); 2141 } 2142 #endif /* STARTTLS */ 2143 2144 /* 2145 ** If collecting stuff from the queue, go start doing that. 2146 */ 2147 2148 if (OpMode == MD_QUEUERUN && QueueIntvl == 0) 2149 { 2150 pid_t pid = -1; 2151 2152 #if STARTTLS 2153 /* init TLS for client, ignore result for now */ 2154 (void) initclttls(tls_ok); 2155 #endif /* STARTTLS */ 2156 2157 /* 2158 ** The parent process of the caller of runqueue() needs 2159 ** to stay around for a possible SIGTERM. The SIGTERM will 2160 ** tell this process that all of the queue runners children 2161 ** need to be sent SIGTERM as well. At the same time, we 2162 ** want to return control to the command line. So we do an 2163 ** extra fork(). 2164 */ 2165 2166 if (Verbose || foregroundqueue || (pid = fork()) <= 0) 2167 { 2168 /* 2169 ** If the fork() failed we should still try to do 2170 ** the queue run. If it succeeded then the child 2171 ** is going to start the run and wait for all 2172 ** of the children to finish. 2173 */ 2174 2175 if (pid == 0) 2176 { 2177 /* Reset global flags */ 2178 RestartRequest = NULL; 2179 ShutdownRequest = NULL; 2180 PendingSignal = 0; 2181 2182 /* disconnect from terminal */ 2183 disconnect(2, CurEnv); 2184 } 2185 2186 CurrentPid = getpid(); 2187 if (qgrp != NOQGRP) 2188 { 2189 int rwgflags = RWG_NONE; 2190 2191 /* 2192 ** To run a specific queue group mark it to 2193 ** be run, select the work group it's in and 2194 ** increment the work counter. 2195 */ 2196 2197 for (i = 0; i < NumQueue && Queue[i] != NULL; 2198 i++) 2199 Queue[i]->qg_nextrun = (time_t) -1; 2200 Queue[qgrp]->qg_nextrun = 0; 2201 if (Verbose) 2202 rwgflags |= RWG_VERBOSE; 2203 if (queuepersistent) 2204 rwgflags |= RWG_PERSISTENT; 2205 rwgflags |= RWG_FORCE; 2206 (void) run_work_group(Queue[qgrp]->qg_wgrp, 2207 rwgflags); 2208 } 2209 else 2210 (void) runqueue(false, Verbose, 2211 queuepersistent, true); 2212 2213 /* set the title to make it easier to find */ 2214 sm_setproctitle(true, CurEnv, "Queue control"); 2215 (void) sm_signal(SIGCHLD, SIG_DFL); 2216 while (CurChildren > 0) 2217 { 2218 int status; 2219 pid_t ret; 2220 2221 errno = 0; 2222 while ((ret = sm_wait(&status)) <= 0) 2223 { 2224 if (errno == ECHILD) 2225 { 2226 /* 2227 ** Oops... something got messed 2228 ** up really bad. Waiting for 2229 ** non-existent children 2230 ** shouldn't happen. Let's get 2231 ** out of here. 2232 */ 2233 2234 CurChildren = 0; 2235 break; 2236 } 2237 continue; 2238 } 2239 2240 /* something is really really wrong */ 2241 if (errno == ECHILD) 2242 { 2243 sm_syslog(LOG_ERR, NOQID, 2244 "queue control process: lost all children: wait returned ECHILD"); 2245 break; 2246 } 2247 2248 /* Only drop when a child gives status */ 2249 if (WIFSTOPPED(status)) 2250 continue; 2251 2252 proc_list_drop(ret, status, NULL); 2253 } 2254 } 2255 finis(true, true, ExitStat); 2256 /* NOTREACHED */ 2257 } 2258 2259 # if SASL 2260 if (OpMode == MD_SMTP || OpMode == MD_DAEMON) 2261 { 2262 /* check whether AUTH is turned off for the server */ 2263 if (!chkdaemonmodifiers(D_NOAUTH) && 2264 (i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK) 2265 syserr("!sasl_server_init failed! [%s]", 2266 sasl_errstring(i, NULL, NULL)); 2267 } 2268 # endif /* SASL */ 2269 2270 if (OpMode == MD_SMTP) 2271 { 2272 proc_list_add(CurrentPid, "Sendmail SMTP Agent", 2273 PROC_DAEMON, 0, -1, NULL); 2274 2275 /* clean up background delivery children */ 2276 (void) sm_signal(SIGCHLD, reapchild); 2277 } 2278 2279 /* 2280 ** If a daemon, wait for a request. 2281 ** getrequests will always return in a child. 2282 ** If we should also be processing the queue, start 2283 ** doing it in background. 2284 ** We check for any errors that might have happened 2285 ** during startup. 2286 */ 2287 2288 if (OpMode == MD_DAEMON || QueueIntvl > 0) 2289 { 2290 char dtype[200]; 2291 2292 /* avoid cleanup in finis(), DaemonPid will be set below */ 2293 DaemonPid = 0; 2294 if (!run_in_foreground && !tTd(99, 100)) 2295 { 2296 /* put us in background */ 2297 i = fork(); 2298 if (i < 0) 2299 syserr("daemon: cannot fork"); 2300 if (i != 0) 2301 { 2302 finis(false, true, EX_OK); 2303 /* NOTREACHED */ 2304 } 2305 2306 /* 2307 ** Initialize exception stack and default exception 2308 ** handler for child process. 2309 */ 2310 2311 /* Reset global flags */ 2312 RestartRequest = NULL; 2313 RestartWorkGroup = false; 2314 ShutdownRequest = NULL; 2315 PendingSignal = 0; 2316 CurrentPid = getpid(); 2317 2318 sm_exc_newthread(fatal_error); 2319 2320 /* disconnect from our controlling tty */ 2321 disconnect(2, &MainEnvelope); 2322 } 2323 2324 dtype[0] = '\0'; 2325 if (OpMode == MD_DAEMON) 2326 { 2327 (void) sm_strlcat(dtype, "+SMTP", sizeof dtype); 2328 DaemonPid = CurrentPid; 2329 } 2330 if (QueueIntvl > 0) 2331 { 2332 (void) sm_strlcat2(dtype, 2333 queuepersistent 2334 ? "+persistent-queueing@" 2335 : "+queueing@", 2336 pintvl(QueueIntvl, true), 2337 sizeof dtype); 2338 } 2339 if (tTd(0, 1)) 2340 (void) sm_strlcat(dtype, "+debugging", sizeof dtype); 2341 2342 sm_syslog(LOG_INFO, NOQID, 2343 "starting daemon (%s): %s", Version, dtype + 1); 2344 #if XLA 2345 xla_create_file(); 2346 #endif /* XLA */ 2347 2348 /* save daemon type in a macro for possible PidFile use */ 2349 macdefine(&BlankEnvelope.e_macro, A_TEMP, 2350 macid("{daemon_info}"), dtype + 1); 2351 2352 /* save queue interval in a macro for possible PidFile use */ 2353 macdefine(&MainEnvelope.e_macro, A_TEMP, 2354 macid("{queue_interval}"), pintvl(QueueIntvl, true)); 2355 2356 /* workaround: can't seem to release the signal in the parent */ 2357 (void) sm_signal(SIGHUP, sighup); 2358 (void) sm_releasesignal(SIGHUP); 2359 (void) sm_signal(SIGTERM, sigterm); 2360 2361 if (QueueIntvl > 0) 2362 { 2363 (void) runqueue(true, false, queuepersistent, true); 2364 2365 /* 2366 ** If queuepersistent but not in daemon mode then 2367 ** we're going to do the queue runner monitoring here. 2368 ** If in daemon mode then the monitoring will happen 2369 ** elsewhere. 2370 */ 2371 2372 if (OpMode != MD_DAEMON && queuepersistent) 2373 { 2374 /* 2375 ** Write the pid to file 2376 ** XXX Overwrites sendmail.pid 2377 */ 2378 2379 log_sendmail_pid(&MainEnvelope); 2380 2381 /* set the title to make it easier to find */ 2382 sm_setproctitle(true, CurEnv, "Queue control"); 2383 (void) sm_signal(SIGCHLD, SIG_DFL); 2384 while (CurChildren > 0) 2385 { 2386 int status; 2387 pid_t ret; 2388 int group; 2389 2390 CHECK_RESTART; 2391 errno = 0; 2392 while ((ret = sm_wait(&status)) <= 0) 2393 { 2394 /* 2395 ** Waiting for non-existent 2396 ** children shouldn't happen. 2397 ** Let's get out of here if 2398 ** it occurs. 2399 */ 2400 2401 if (errno == ECHILD) 2402 { 2403 CurChildren = 0; 2404 break; 2405 } 2406 continue; 2407 } 2408 2409 /* something is really really wrong */ 2410 if (errno == ECHILD) 2411 { 2412 sm_syslog(LOG_ERR, NOQID, 2413 "persistent queue runner control process: lost all children: wait returned ECHILD"); 2414 break; 2415 } 2416 2417 if (WIFSTOPPED(status)) 2418 continue; 2419 2420 /* Probe only on a child status */ 2421 proc_list_drop(ret, status, &group); 2422 2423 if (WIFSIGNALED(status)) 2424 { 2425 if (WCOREDUMP(status)) 2426 { 2427 sm_syslog(LOG_ERR, NOQID, 2428 "persistent queue runner=%d core dumped, signal=%d", 2429 group, WTERMSIG(status)); 2430 2431 /* don't restart this */ 2432 mark_work_group_restart( 2433 group, -1); 2434 continue; 2435 } 2436 2437 sm_syslog(LOG_ERR, NOQID, 2438 "persistent queue runner=%d died, signal=%d", 2439 group, WTERMSIG(status)); 2440 } 2441 2442 /* 2443 ** When debugging active, don't 2444 ** restart the persistent queues. 2445 ** But do log this as info. 2446 */ 2447 2448 if (sm_debug_active(&DebugNoPRestart, 2449 1)) 2450 { 2451 sm_syslog(LOG_DEBUG, NOQID, 2452 "persistent queue runner=%d, exited", 2453 group); 2454 mark_work_group_restart(group, 2455 -1); 2456 } 2457 } 2458 finis(true, true, ExitStat); 2459 /* NOTREACHED */ 2460 } 2461 2462 if (OpMode != MD_DAEMON) 2463 { 2464 char qtype[200]; 2465 2466 /* 2467 ** Write the pid to file 2468 ** XXX Overwrites sendmail.pid 2469 */ 2470 2471 log_sendmail_pid(&MainEnvelope); 2472 2473 /* set the title to make it easier to find */ 2474 qtype[0] = '\0'; 2475 (void) sm_strlcpyn(qtype, sizeof qtype, 4, 2476 "Queue runner@", 2477 pintvl(QueueIntvl, true), 2478 " for ", 2479 QueueDir); 2480 sm_setproctitle(true, CurEnv, qtype); 2481 for (;;) 2482 { 2483 (void) pause(); 2484 2485 CHECK_RESTART; 2486 2487 if (doqueuerun()) 2488 (void) runqueue(true, false, 2489 false, false); 2490 } 2491 } 2492 } 2493 dropenvelope(&MainEnvelope, true, false); 2494 2495 #if STARTTLS 2496 /* init TLS for server, ignore result for now */ 2497 (void) initsrvtls(tls_ok); 2498 #endif /* STARTTLS */ 2499 2500 nextreq: 2501 p_flags = getrequests(&MainEnvelope); 2502 2503 /* drop privileges */ 2504 (void) drop_privileges(false); 2505 2506 /* 2507 ** Get authentication data 2508 ** Set _ macro in BlankEnvelope before calling newenvelope(). 2509 */ 2510 2511 authinfo = getauthinfo(sm_io_getinfo(InChannel, SM_IO_WHAT_FD, 2512 NULL), &forged); 2513 macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo); 2514 2515 /* at this point we are in a child: reset state */ 2516 sm_rpool_free(MainEnvelope.e_rpool); 2517 (void) newenvelope(&MainEnvelope, &MainEnvelope, 2518 sm_rpool_new_x(NULL)); 2519 } 2520 2521 if (LogLevel > 9) 2522 { 2523 /* log connection information */ 2524 sm_syslog(LOG_INFO, NULL, "connect from %s", authinfo); 2525 } 2526 2527 /* 2528 ** If running SMTP protocol, start collecting and executing 2529 ** commands. This will never return. 2530 */ 2531 2532 if (OpMode == MD_SMTP || OpMode == MD_DAEMON) 2533 { 2534 char pbuf[20]; 2535 2536 /* 2537 ** Save some macros for check_* rulesets. 2538 */ 2539 2540 if (forged) 2541 { 2542 char ipbuf[103]; 2543 2544 (void) sm_snprintf(ipbuf, sizeof ipbuf, "[%.100s]", 2545 anynet_ntoa(&RealHostAddr)); 2546 macdefine(&BlankEnvelope.e_macro, A_TEMP, 2547 macid("{client_name}"), ipbuf); 2548 } 2549 else 2550 macdefine(&BlankEnvelope.e_macro, A_PERM, 2551 macid("{client_name}"), RealHostName); 2552 macdefine(&BlankEnvelope.e_macro, A_PERM, 2553 macid("{client_ptr}"), RealHostName); 2554 macdefine(&BlankEnvelope.e_macro, A_TEMP, 2555 macid("{client_addr}"), anynet_ntoa(&RealHostAddr)); 2556 sm_getla(); 2557 2558 switch (RealHostAddr.sa.sa_family) 2559 { 2560 #if NETINET 2561 case AF_INET: 2562 (void) sm_snprintf(pbuf, sizeof pbuf, "%d", 2563 RealHostAddr.sin.sin_port); 2564 break; 2565 #endif /* NETINET */ 2566 #if NETINET6 2567 case AF_INET6: 2568 (void) sm_snprintf(pbuf, sizeof pbuf, "%d", 2569 RealHostAddr.sin6.sin6_port); 2570 break; 2571 #endif /* NETINET6 */ 2572 default: 2573 (void) sm_snprintf(pbuf, sizeof pbuf, "0"); 2574 break; 2575 } 2576 macdefine(&BlankEnvelope.e_macro, A_TEMP, 2577 macid("{client_port}"), pbuf); 2578 2579 if (OpMode == MD_DAEMON) 2580 { 2581 /* validate the connection */ 2582 HoldErrs = true; 2583 nullserver = validate_connection(&RealHostAddr, 2584 macvalue(macid("{client_name}"), 2585 &MainEnvelope), 2586 &MainEnvelope); 2587 HoldErrs = false; 2588 } 2589 else if (p_flags == NULL) 2590 { 2591 p_flags = (BITMAP256 *) xalloc(sizeof *p_flags); 2592 clrbitmap(p_flags); 2593 } 2594 #if STARTTLS 2595 if (OpMode == MD_SMTP) 2596 (void) initsrvtls(tls_ok); 2597 #endif /* STARTTLS */ 2598 2599 /* turn off profiling */ 2600 SM_PROF(1); 2601 smtp(nullserver, *p_flags, &MainEnvelope); 2602 2603 if (tTd(93, 100)) 2604 { 2605 /* turn off profiling */ 2606 SM_PROF(0); 2607 if (OpMode == MD_DAEMON) 2608 goto nextreq; 2609 } 2610 } 2611 2612 sm_rpool_free(MainEnvelope.e_rpool); 2613 clearenvelope(&MainEnvelope, false, sm_rpool_new_x(NULL)); 2614 if (OpMode == MD_VERIFY) 2615 { 2616 set_delivery_mode(SM_VERIFY, &MainEnvelope); 2617 PostMasterCopy = NULL; 2618 } 2619 else 2620 { 2621 /* interactive -- all errors are global */ 2622 MainEnvelope.e_flags |= EF_GLOBALERRS|EF_LOGSENDER; 2623 } 2624 2625 /* 2626 ** Do basic system initialization and set the sender 2627 */ 2628 2629 initsys(&MainEnvelope); 2630 macdefine(&MainEnvelope.e_macro, A_PERM, macid("{ntries}"), "0"); 2631 macdefine(&MainEnvelope.e_macro, A_PERM, macid("{nrcpts}"), "0"); 2632 setsender(from, &MainEnvelope, NULL, '\0', false); 2633 if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') && 2634 (!bitnset(M_LOCALMAILER, MainEnvelope.e_from.q_mailer->m_flags) || 2635 strcmp(MainEnvelope.e_from.q_user, RealUserName) != 0)) 2636 { 2637 auth_warning(&MainEnvelope, "%s set sender to %s using -%c", 2638 RealUserName, from, warn_f_flag); 2639 #if SASL 2640 auth = false; 2641 #endif /* SASL */ 2642 } 2643 if (auth) 2644 { 2645 char *fv; 2646 2647 /* set the initial sender for AUTH= to $f@$j */ 2648 fv = macvalue('f', &MainEnvelope); 2649 if (fv == NULL || *fv == '\0') 2650 MainEnvelope.e_auth_param = NULL; 2651 else 2652 { 2653 if (strchr(fv, '@') == NULL) 2654 { 2655 i = strlen(fv) + strlen(macvalue('j', 2656 &MainEnvelope)) + 2; 2657 p = sm_malloc_x(i); 2658 (void) sm_strlcpyn(p, i, 3, fv, "@", 2659 macvalue('j', 2660 &MainEnvelope)); 2661 } 2662 else 2663 p = sm_strdup_x(fv); 2664 MainEnvelope.e_auth_param = sm_rpool_strdup_x(MainEnvelope.e_rpool, 2665 xtextify(p, "=")); 2666 sm_free(p); /* XXX */ 2667 } 2668 } 2669 if (macvalue('s', &MainEnvelope) == NULL) 2670 macdefine(&MainEnvelope.e_macro, A_PERM, 's', RealHostName); 2671 2672 av = argv + optind; 2673 if (*av == NULL && !GrabTo) 2674 { 2675 MainEnvelope.e_to = NULL; 2676 MainEnvelope.e_flags |= EF_GLOBALERRS; 2677 HoldErrs = false; 2678 SuperSafe = SAFE_NO; 2679 usrerr("Recipient names must be specified"); 2680 2681 /* collect body for UUCP return */ 2682 if (OpMode != MD_VERIFY) 2683 collect(InChannel, false, NULL, &MainEnvelope, true); 2684 finis(true, true, EX_USAGE); 2685 /* NOTREACHED */ 2686 } 2687 2688 /* 2689 ** Scan argv and deliver the message to everyone. 2690 */ 2691 2692 save_val = LogUsrErrs; 2693 LogUsrErrs = true; 2694 sendtoargv(av, &MainEnvelope); 2695 LogUsrErrs = save_val; 2696 2697 /* if we have had errors sofar, arrange a meaningful exit stat */ 2698 if (Errors > 0 && ExitStat == EX_OK) 2699 ExitStat = EX_USAGE; 2700 2701 #if _FFR_FIX_DASHT 2702 /* 2703 ** If using -t, force not sending to argv recipients, even 2704 ** if they are mentioned in the headers. 2705 */ 2706 2707 if (GrabTo) 2708 { 2709 ADDRESS *q; 2710 2711 for (q = MainEnvelope.e_sendqueue; q != NULL; q = q->q_next) 2712 q->q_state = QS_REMOVED; 2713 } 2714 #endif /* _FFR_FIX_DASHT */ 2715 2716 /* 2717 ** Read the input mail. 2718 */ 2719 2720 MainEnvelope.e_to = NULL; 2721 if (OpMode != MD_VERIFY || GrabTo) 2722 { 2723 int savederrors; 2724 unsigned long savedflags; 2725 2726 /* 2727 ** workaround for compiler warning on Irix: 2728 ** do not initialize variable in the definition, but 2729 ** later on: 2730 ** warning(1548): transfer of control bypasses 2731 ** initialization of: 2732 ** variable "savederrors" (declared at line 2570) 2733 ** variable "savedflags" (declared at line 2571) 2734 ** goto giveup; 2735 */ 2736 2737 savederrors = Errors; 2738 savedflags = MainEnvelope.e_flags & EF_FATALERRS; 2739 MainEnvelope.e_flags |= EF_GLOBALERRS; 2740 MainEnvelope.e_flags &= ~EF_FATALERRS; 2741 Errors = 0; 2742 buffer_errors(); 2743 collect(InChannel, false, NULL, &MainEnvelope, true); 2744 2745 /* header checks failed */ 2746 if (Errors > 0) 2747 { 2748 giveup: 2749 if (!GrabTo) 2750 { 2751 /* Log who the mail would have gone to */ 2752 logundelrcpts(&MainEnvelope, 2753 MainEnvelope.e_message, 2754 8, false); 2755 } 2756 flush_errors(true); 2757 finis(true, true, ExitStat); 2758 /* NOTREACHED */ 2759 return -1; 2760 } 2761 2762 /* bail out if message too large */ 2763 if (bitset(EF_CLRQUEUE, MainEnvelope.e_flags)) 2764 { 2765 finis(true, true, ExitStat != EX_OK ? ExitStat 2766 : EX_DATAERR); 2767 /* NOTREACHED */ 2768 return -1; 2769 } 2770 2771 /* set message size */ 2772 (void) sm_snprintf(buf, sizeof buf, "%ld", 2773 MainEnvelope.e_msgsize); 2774 macdefine(&MainEnvelope.e_macro, A_TEMP, 2775 macid("{msg_size}"), buf); 2776 2777 Errors = savederrors; 2778 MainEnvelope.e_flags |= savedflags; 2779 } 2780 errno = 0; 2781 2782 if (tTd(1, 1)) 2783 sm_dprintf("From person = \"%s\"\n", 2784 MainEnvelope.e_from.q_paddr); 2785 2786 /* Check if quarantining stats should be updated */ 2787 if (MainEnvelope.e_quarmsg != NULL) 2788 markstats(&MainEnvelope, NULL, STATS_QUARANTINE); 2789 2790 /* 2791 ** Actually send everything. 2792 ** If verifying, just ack. 2793 */ 2794 2795 if (Errors == 0) 2796 { 2797 if (!split_by_recipient(&MainEnvelope) && 2798 bitset(EF_FATALERRS, MainEnvelope.e_flags)) 2799 goto giveup; 2800 } 2801 2802 /* make sure we deliver at least the first envelope */ 2803 i = FastSplit > 0 ? 0 : -1; 2804 for (e = &MainEnvelope; e != NULL; e = e->e_sibling, i++) 2805 { 2806 ENVELOPE *next; 2807 2808 e->e_from.q_state = QS_SENDER; 2809 if (tTd(1, 5)) 2810 { 2811 sm_dprintf("main[%d]: QS_SENDER ", i); 2812 printaddr(sm_debug_file(), &e->e_from, false); 2813 } 2814 e->e_to = NULL; 2815 sm_getla(); 2816 GrabTo = false; 2817 #if NAMED_BIND 2818 _res.retry = TimeOuts.res_retry[RES_TO_FIRST]; 2819 _res.retrans = TimeOuts.res_retrans[RES_TO_FIRST]; 2820 #endif /* NAMED_BIND */ 2821 next = e->e_sibling; 2822 e->e_sibling = NULL; 2823 2824 /* after FastSplit envelopes: queue up */ 2825 sendall(e, i >= FastSplit ? SM_QUEUE : SM_DEFAULT); 2826 e->e_sibling = next; 2827 } 2828 2829 /* 2830 ** All done. 2831 ** Don't send return error message if in VERIFY mode. 2832 */ 2833 2834 finis(true, true, ExitStat); 2835 /* NOTREACHED */ 2836 return ExitStat; 2837 } 2838 /* 2839 ** STOP_SENDMAIL -- Stop the running program 2840 ** 2841 ** Parameters: 2842 ** none. 2843 ** 2844 ** Returns: 2845 ** none. 2846 ** 2847 ** Side Effects: 2848 ** exits. 2849 */ 2850 2851 void 2852 stop_sendmail() 2853 { 2854 /* reset uid for process accounting */ 2855 endpwent(); 2856 (void) setuid(RealUid); 2857 exit(EX_OK); 2858 } 2859 /* 2860 ** FINIS -- Clean up and exit. 2861 ** 2862 ** Parameters: 2863 ** drop -- whether or not to drop CurEnv envelope 2864 ** cleanup -- call exit() or _exit()? 2865 ** exitstat -- exit status to use for exit() call 2866 ** 2867 ** Returns: 2868 ** never 2869 ** 2870 ** Side Effects: 2871 ** exits sendmail 2872 */ 2873 2874 void 2875 finis(drop, cleanup, exitstat) 2876 bool drop; 2877 bool cleanup; 2878 volatile int exitstat; 2879 { 2880 char pidpath[MAXPATHLEN]; 2881 pid_t pid; 2882 2883 /* Still want to process new timeouts added below */ 2884 sm_clear_events(); 2885 (void) sm_releasesignal(SIGALRM); 2886 2887 if (tTd(2, 1)) 2888 { 2889 sm_dprintf("\n====finis: stat %d e_id=%s e_flags=", 2890 exitstat, 2891 CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id); 2892 printenvflags(CurEnv); 2893 } 2894 if (tTd(2, 9)) 2895 printopenfds(false); 2896 2897 SM_TRY 2898 /* 2899 ** Clean up. This might raise E:mta.quickabort 2900 */ 2901 2902 /* clean up temp files */ 2903 CurEnv->e_to = NULL; 2904 if (drop) 2905 { 2906 if (CurEnv->e_id != NULL) 2907 { 2908 dropenvelope(CurEnv, true, false); 2909 sm_rpool_free(CurEnv->e_rpool); 2910 CurEnv->e_rpool = NULL; 2911 2912 /* this may have pointed to the rpool */ 2913 CurEnv->e_to = NULL; 2914 } 2915 else 2916 poststats(StatFile); 2917 } 2918 2919 /* flush any cached connections */ 2920 mci_flush(true, NULL); 2921 2922 /* close maps belonging to this pid */ 2923 closemaps(false); 2924 2925 #if USERDB 2926 /* close UserDatabase */ 2927 _udbx_close(); 2928 #endif /* USERDB */ 2929 2930 #if SASL 2931 stop_sasl_client(); 2932 #endif /* SASL */ 2933 2934 #if XLA 2935 /* clean up extended load average stuff */ 2936 xla_all_end(); 2937 #endif /* XLA */ 2938 2939 SM_FINALLY 2940 /* 2941 ** And exit. 2942 */ 2943 2944 if (LogLevel > 78) 2945 sm_syslog(LOG_DEBUG, CurEnv->e_id, "finis, pid=%d", 2946 (int) CurrentPid); 2947 if (exitstat == EX_TEMPFAIL || 2948 CurEnv->e_errormode == EM_BERKNET) 2949 exitstat = EX_OK; 2950 2951 /* XXX clean up queues and related data structures */ 2952 cleanup_queues(); 2953 pid = getpid(); 2954 #if SM_CONF_SHM 2955 cleanup_shm(DaemonPid == pid); 2956 #endif /* SM_CONF_SHM */ 2957 2958 /* close locked pid file */ 2959 close_sendmail_pid(); 2960 2961 if (DaemonPid == pid || PidFilePid == pid) 2962 { 2963 /* blow away the pid file */ 2964 expand(PidFile, pidpath, sizeof pidpath, CurEnv); 2965 (void) unlink(pidpath); 2966 } 2967 2968 /* reset uid for process accounting */ 2969 endpwent(); 2970 sm_mbdb_terminate(); 2971 #if _FFR_MEMSTAT 2972 (void) sm_memstat_close(); 2973 #endif /* _FFR_MEMSTAT */ 2974 (void) setuid(RealUid); 2975 #if SM_HEAP_CHECK 2976 /* dump the heap, if we are checking for memory leaks */ 2977 if (sm_debug_active(&SmHeapCheck, 2)) 2978 sm_heap_report(smioout, 2979 sm_debug_level(&SmHeapCheck) - 1); 2980 #endif /* SM_HEAP_CHECK */ 2981 if (sm_debug_active(&SmXtrapReport, 1)) 2982 sm_dprintf("xtrap count = %d\n", SmXtrapCount); 2983 if (cleanup) 2984 exit(exitstat); 2985 else 2986 _exit(exitstat); 2987 SM_END_TRY 2988 } 2989 /* 2990 ** INTINDEBUG -- signal handler for SIGINT in -bt mode 2991 ** 2992 ** Parameters: 2993 ** sig -- incoming signal. 2994 ** 2995 ** Returns: 2996 ** none. 2997 ** 2998 ** Side Effects: 2999 ** longjmps back to test mode loop. 3000 ** 3001 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3002 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3003 ** DOING. 3004 */ 3005 3006 /* Type of an exception generated on SIGINT during address test mode. */ 3007 static const SM_EXC_TYPE_T EtypeInterrupt = 3008 { 3009 SmExcTypeMagic, 3010 "S:mta.interrupt", 3011 "", 3012 sm_etype_printf, 3013 "interrupt", 3014 }; 3015 3016 /* ARGSUSED */ 3017 static SIGFUNC_DECL 3018 intindebug(sig) 3019 int sig; 3020 { 3021 int save_errno = errno; 3022 3023 FIX_SYSV_SIGNAL(sig, intindebug); 3024 errno = save_errno; 3025 CHECK_CRITICAL(sig); 3026 errno = save_errno; 3027 sm_exc_raisenew_x(&EtypeInterrupt); 3028 errno = save_errno; 3029 return SIGFUNC_RETURN; 3030 } 3031 /* 3032 ** SIGTERM -- SIGTERM handler for the daemon 3033 ** 3034 ** Parameters: 3035 ** sig -- signal number. 3036 ** 3037 ** Returns: 3038 ** none. 3039 ** 3040 ** Side Effects: 3041 ** Sets ShutdownRequest which will hopefully trigger 3042 ** the daemon to exit. 3043 ** 3044 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3045 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3046 ** DOING. 3047 */ 3048 3049 /* ARGSUSED */ 3050 static SIGFUNC_DECL 3051 sigterm(sig) 3052 int sig; 3053 { 3054 int save_errno = errno; 3055 3056 FIX_SYSV_SIGNAL(sig, sigterm); 3057 ShutdownRequest = "signal"; 3058 errno = save_errno; 3059 return SIGFUNC_RETURN; 3060 } 3061 /* 3062 ** SIGHUP -- handle a SIGHUP signal 3063 ** 3064 ** Parameters: 3065 ** sig -- incoming signal. 3066 ** 3067 ** Returns: 3068 ** none. 3069 ** 3070 ** Side Effects: 3071 ** Sets RestartRequest which should cause the daemon 3072 ** to restart. 3073 ** 3074 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3075 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3076 ** DOING. 3077 */ 3078 3079 /* ARGSUSED */ 3080 static SIGFUNC_DECL 3081 sighup(sig) 3082 int sig; 3083 { 3084 int save_errno = errno; 3085 3086 FIX_SYSV_SIGNAL(sig, sighup); 3087 RestartRequest = "signal"; 3088 errno = save_errno; 3089 return SIGFUNC_RETURN; 3090 } 3091 /* 3092 ** SIGPIPE -- signal handler for SIGPIPE 3093 ** 3094 ** Parameters: 3095 ** sig -- incoming signal. 3096 ** 3097 ** Returns: 3098 ** none. 3099 ** 3100 ** Side Effects: 3101 ** Sets StopRequest which should cause the mailq/hoststatus 3102 ** display to stop. 3103 ** 3104 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3105 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3106 ** DOING. 3107 */ 3108 3109 /* ARGSUSED */ 3110 static SIGFUNC_DECL 3111 sigpipe(sig) 3112 int sig; 3113 { 3114 int save_errno = errno; 3115 3116 FIX_SYSV_SIGNAL(sig, sigpipe); 3117 StopRequest = true; 3118 errno = save_errno; 3119 return SIGFUNC_RETURN; 3120 } 3121 /* 3122 ** INTSIG -- clean up on interrupt 3123 ** 3124 ** This just arranges to exit. It pessimizes in that it 3125 ** may resend a message. 3126 ** 3127 ** Parameters: 3128 ** none. 3129 ** 3130 ** Returns: 3131 ** none. 3132 ** 3133 ** Side Effects: 3134 ** Unlocks the current job. 3135 ** 3136 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3137 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3138 ** DOING. 3139 ** 3140 ** XXX: More work is needed for this signal handler. 3141 */ 3142 3143 /* ARGSUSED */ 3144 SIGFUNC_DECL 3145 intsig(sig) 3146 int sig; 3147 { 3148 bool drop = false; 3149 int save_errno = errno; 3150 3151 FIX_SYSV_SIGNAL(sig, intsig); 3152 errno = save_errno; 3153 CHECK_CRITICAL(sig); 3154 sm_allsignals(true); 3155 3156 if (sig != 0 && LogLevel > 79) 3157 sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt"); 3158 FileName = NULL; 3159 3160 /* Clean-up on aborted stdin message submission */ 3161 if (CurEnv->e_id != NULL && 3162 (OpMode == MD_SMTP || 3163 OpMode == MD_DELIVER || 3164 OpMode == MD_ARPAFTP)) 3165 { 3166 register ADDRESS *q; 3167 3168 /* don't return an error indication */ 3169 CurEnv->e_to = NULL; 3170 CurEnv->e_flags &= ~EF_FATALERRS; 3171 CurEnv->e_flags |= EF_CLRQUEUE; 3172 3173 /* 3174 ** Spin through the addresses and 3175 ** mark them dead to prevent bounces 3176 */ 3177 3178 for (q = CurEnv->e_sendqueue; q != NULL; q = q->q_next) 3179 q->q_state = QS_DONTSEND; 3180 3181 drop = true; 3182 } 3183 else if (OpMode != MD_TEST) 3184 { 3185 unlockqueue(CurEnv); 3186 } 3187 3188 finis(drop, false, EX_OK); 3189 /* NOTREACHED */ 3190 } 3191 /* 3192 ** DISCONNECT -- remove our connection with any foreground process 3193 ** 3194 ** Parameters: 3195 ** droplev -- how "deeply" we should drop the line. 3196 ** 0 -- ignore signals, mail back errors, make sure 3197 ** output goes to stdout. 3198 ** 1 -- also, make stdout go to /dev/null. 3199 ** 2 -- also, disconnect from controlling terminal 3200 ** (only for daemon mode). 3201 ** e -- the current envelope. 3202 ** 3203 ** Returns: 3204 ** none 3205 ** 3206 ** Side Effects: 3207 ** Trys to insure that we are immune to vagaries of 3208 ** the controlling tty. 3209 */ 3210 3211 void 3212 disconnect(droplev, e) 3213 int droplev; 3214 register ENVELOPE *e; 3215 { 3216 int fd; 3217 3218 if (tTd(52, 1)) 3219 sm_dprintf("disconnect: In %d Out %d, e=%p\n", 3220 sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), 3221 sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL), e); 3222 if (tTd(52, 100)) 3223 { 3224 sm_dprintf("don't\n"); 3225 return; 3226 } 3227 if (LogLevel > 93) 3228 sm_syslog(LOG_DEBUG, e->e_id, 3229 "disconnect level %d", 3230 droplev); 3231 3232 /* be sure we don't get nasty signals */ 3233 (void) sm_signal(SIGINT, SIG_IGN); 3234 (void) sm_signal(SIGQUIT, SIG_IGN); 3235 3236 /* we can't communicate with our caller, so.... */ 3237 HoldErrs = true; 3238 CurEnv->e_errormode = EM_MAIL; 3239 Verbose = 0; 3240 DisConnected = true; 3241 3242 /* all input from /dev/null */ 3243 if (InChannel != smioin) 3244 { 3245 (void) sm_io_close(InChannel, SM_TIME_DEFAULT); 3246 InChannel = smioin; 3247 } 3248 if (sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL, 3249 SM_IO_RDONLY, NULL, smioin) == NULL) 3250 sm_syslog(LOG_ERR, e->e_id, 3251 "disconnect: sm_io_reopen(\"%s\") failed: %s", 3252 SM_PATH_DEVNULL, sm_errstring(errno)); 3253 3254 /* 3255 ** output to the transcript 3256 ** We also compare the fd numbers here since OutChannel 3257 ** might be a layer on top of smioout due to encryption 3258 ** (see sfsasl.c). 3259 */ 3260 3261 if (OutChannel != smioout && 3262 sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL) != 3263 sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL)) 3264 { 3265 (void) sm_io_close(OutChannel, SM_TIME_DEFAULT); 3266 OutChannel = smioout; 3267 3268 #if 0 3269 /* 3270 ** Has smioout been closed? Reopen it. 3271 ** This shouldn't happen anymore, the code is here 3272 ** just as a reminder. 3273 */ 3274 3275 if (smioout->sm_magic == NULL && 3276 sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL, 3277 SM_IO_WRONLY, NULL, smioout) == NULL) 3278 sm_syslog(LOG_ERR, e->e_id, 3279 "disconnect: sm_io_reopen(\"%s\") failed: %s", 3280 SM_PATH_DEVNULL, sm_errstring(errno)); 3281 #endif /* 0 */ 3282 } 3283 if (droplev > 0) 3284 { 3285 fd = open(SM_PATH_DEVNULL, O_WRONLY, 0666); 3286 if (fd == -1) 3287 { 3288 sm_syslog(LOG_ERR, e->e_id, 3289 "disconnect: open(\"%s\") failed: %s", 3290 SM_PATH_DEVNULL, sm_errstring(errno)); 3291 } 3292 (void) sm_io_flush(smioout, SM_TIME_DEFAULT); 3293 if (fd >= 0) 3294 { 3295 (void) dup2(fd, STDOUT_FILENO); 3296 (void) dup2(fd, STDERR_FILENO); 3297 (void) close(fd); 3298 } 3299 } 3300 3301 /* drop our controlling TTY completely if possible */ 3302 if (droplev > 1) 3303 { 3304 (void) setsid(); 3305 errno = 0; 3306 } 3307 3308 #if XDEBUG 3309 checkfd012("disconnect"); 3310 #endif /* XDEBUG */ 3311 3312 if (LogLevel > 71) 3313 sm_syslog(LOG_DEBUG, e->e_id, "in background, pid=%d", 3314 (int) CurrentPid); 3315 3316 errno = 0; 3317 } 3318 3319 static void 3320 obsolete(argv) 3321 char *argv[]; 3322 { 3323 register char *ap; 3324 register char *op; 3325 3326 while ((ap = *++argv) != NULL) 3327 { 3328 /* Return if "--" or not an option of any form. */ 3329 if (ap[0] != '-' || ap[1] == '-') 3330 return; 3331 3332 /* Don't allow users to use "-Q." or "-Q ." */ 3333 if ((ap[1] == 'Q' && ap[2] == '.') || 3334 (ap[1] == 'Q' && argv[1] != NULL && 3335 argv[1][0] == '.' && argv[1][1] == '\0')) 3336 { 3337 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 3338 "Can not use -Q.\n"); 3339 exit(EX_USAGE); 3340 } 3341 3342 /* skip over options that do have a value */ 3343 op = strchr(OPTIONS, ap[1]); 3344 if (op != NULL && *++op == ':' && ap[2] == '\0' && 3345 ap[1] != 'd' && 3346 #if defined(sony_news) 3347 ap[1] != 'E' && ap[1] != 'J' && 3348 #endif /* defined(sony_news) */ 3349 argv[1] != NULL && argv[1][0] != '-') 3350 { 3351 argv++; 3352 continue; 3353 } 3354 3355 /* If -C doesn't have an argument, use sendmail.cf. */ 3356 #define __DEFPATH "sendmail.cf" 3357 if (ap[1] == 'C' && ap[2] == '\0') 3358 { 3359 *argv = xalloc(sizeof(__DEFPATH) + 2); 3360 (void) sm_strlcpyn(argv[0], sizeof(__DEFPATH) + 2, 2, 3361 "-C", __DEFPATH); 3362 } 3363 3364 /* If -q doesn't have an argument, run it once. */ 3365 if (ap[1] == 'q' && ap[2] == '\0') 3366 *argv = "-q0"; 3367 3368 /* If -Q doesn't have an argument, disable quarantining */ 3369 if (ap[1] == 'Q' && ap[2] == '\0') 3370 *argv = "-Q."; 3371 3372 /* if -d doesn't have an argument, use 0-99.1 */ 3373 if (ap[1] == 'd' && ap[2] == '\0') 3374 *argv = "-d0-99.1"; 3375 3376 #if defined(sony_news) 3377 /* if -E doesn't have an argument, use -EC */ 3378 if (ap[1] == 'E' && ap[2] == '\0') 3379 *argv = "-EC"; 3380 3381 /* if -J doesn't have an argument, use -JJ */ 3382 if (ap[1] == 'J' && ap[2] == '\0') 3383 *argv = "-JJ"; 3384 #endif /* defined(sony_news) */ 3385 } 3386 } 3387 /* 3388 ** AUTH_WARNING -- specify authorization warning 3389 ** 3390 ** Parameters: 3391 ** e -- the current envelope. 3392 ** msg -- the text of the message. 3393 ** args -- arguments to the message. 3394 ** 3395 ** Returns: 3396 ** none. 3397 */ 3398 3399 void 3400 #ifdef __STDC__ 3401 auth_warning(register ENVELOPE *e, const char *msg, ...) 3402 #else /* __STDC__ */ 3403 auth_warning(e, msg, va_alist) 3404 register ENVELOPE *e; 3405 const char *msg; 3406 va_dcl 3407 #endif /* __STDC__ */ 3408 { 3409 char buf[MAXLINE]; 3410 SM_VA_LOCAL_DECL 3411 3412 if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags)) 3413 { 3414 register char *p; 3415 static char hostbuf[48]; 3416 3417 if (hostbuf[0] == '\0') 3418 { 3419 struct hostent *hp; 3420 3421 hp = myhostname(hostbuf, sizeof hostbuf); 3422 #if NETINET6 3423 if (hp != NULL) 3424 { 3425 freehostent(hp); 3426 hp = NULL; 3427 } 3428 #endif /* NETINET6 */ 3429 } 3430 3431 (void) sm_strlcpyn(buf, sizeof buf, 2, hostbuf, ": "); 3432 p = &buf[strlen(buf)]; 3433 SM_VA_START(ap, msg); 3434 (void) sm_vsnprintf(p, SPACELEFT(buf, p), msg, ap); 3435 SM_VA_END(ap); 3436 addheader("X-Authentication-Warning", buf, 0, e); 3437 if (LogLevel > 3) 3438 sm_syslog(LOG_INFO, e->e_id, 3439 "Authentication-Warning: %.400s", 3440 buf); 3441 } 3442 } 3443 /* 3444 ** GETEXTENV -- get from external environment 3445 ** 3446 ** Parameters: 3447 ** envar -- the name of the variable to retrieve 3448 ** 3449 ** Returns: 3450 ** The value, if any. 3451 */ 3452 3453 static char * 3454 getextenv(envar) 3455 const char *envar; 3456 { 3457 char **envp; 3458 int l; 3459 3460 l = strlen(envar); 3461 for (envp = ExternalEnviron; envp != NULL && *envp != NULL; envp++) 3462 { 3463 if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=') 3464 return &(*envp)[l + 1]; 3465 } 3466 return NULL; 3467 } 3468 /* 3469 ** SM_SETUSERENV -- set an environment variable in the propagated environment 3470 ** 3471 ** Parameters: 3472 ** envar -- the name of the environment variable. 3473 ** value -- the value to which it should be set. If 3474 ** null, this is extracted from the incoming 3475 ** environment. If that is not set, the call 3476 ** to sm_setuserenv is ignored. 3477 ** 3478 ** Returns: 3479 ** none. 3480 */ 3481 3482 void 3483 sm_setuserenv(envar, value) 3484 const char *envar; 3485 const char *value; 3486 { 3487 int i, l; 3488 char **evp = UserEnviron; 3489 char *p; 3490 3491 if (value == NULL) 3492 { 3493 value = getextenv(envar); 3494 if (value == NULL) 3495 return; 3496 } 3497 3498 /* XXX enforce reasonable size? */ 3499 i = strlen(envar) + 1; 3500 l = strlen(value) + i + 1; 3501 p = (char *) xalloc(l); 3502 (void) sm_strlcpyn(p, l, 3, envar, "=", value); 3503 3504 while (*evp != NULL && strncmp(*evp, p, i) != 0) 3505 evp++; 3506 if (*evp != NULL) 3507 { 3508 *evp++ = p; 3509 } 3510 else if (evp < &UserEnviron[MAXUSERENVIRON]) 3511 { 3512 *evp++ = p; 3513 *evp = NULL; 3514 } 3515 3516 /* make sure it is in our environment as well */ 3517 if (putenv(p) < 0) 3518 syserr("sm_setuserenv: putenv(%s) failed", p); 3519 } 3520 /* 3521 ** DUMPSTATE -- dump state 3522 ** 3523 ** For debugging. 3524 */ 3525 3526 void 3527 dumpstate(when) 3528 char *when; 3529 { 3530 register char *j = macvalue('j', CurEnv); 3531 int rs; 3532 extern int NextMacroId; 3533 3534 sm_syslog(LOG_DEBUG, CurEnv->e_id, 3535 "--- dumping state on %s: $j = %s ---", 3536 when, 3537 j == NULL ? "<NULL>" : j); 3538 if (j != NULL) 3539 { 3540 if (!wordinclass(j, 'w')) 3541 sm_syslog(LOG_DEBUG, CurEnv->e_id, 3542 "*** $j not in $=w ***"); 3543 } 3544 sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren); 3545 sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)", 3546 NextMacroId, MAXMACROID); 3547 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---"); 3548 printopenfds(true); 3549 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---"); 3550 mci_dump_all(smioout, true); 3551 rs = strtorwset("debug_dumpstate", NULL, ST_FIND); 3552 if (rs > 0) 3553 { 3554 int status; 3555 register char **pvp; 3556 char *pv[MAXATOM + 1]; 3557 3558 pv[0] = NULL; 3559 status = REWRITE(pv, rs, CurEnv); 3560 sm_syslog(LOG_DEBUG, CurEnv->e_id, 3561 "--- ruleset debug_dumpstate returns stat %d, pv: ---", 3562 status); 3563 for (pvp = pv; *pvp != NULL; pvp++) 3564 sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp); 3565 } 3566 sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---"); 3567 } 3568 3569 #ifdef SIGUSR1 3570 /* 3571 ** SIGUSR1 -- Signal a request to dump state. 3572 ** 3573 ** Parameters: 3574 ** sig -- calling signal. 3575 ** 3576 ** Returns: 3577 ** none. 3578 ** 3579 ** NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER. DO NOT ADD 3580 ** ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE 3581 ** DOING. 3582 ** 3583 ** XXX: More work is needed for this signal handler. 3584 */ 3585 3586 /* ARGSUSED */ 3587 static SIGFUNC_DECL 3588 sigusr1(sig) 3589 int sig; 3590 { 3591 int save_errno = errno; 3592 # if SM_HEAP_CHECK 3593 extern void dumpstab __P((void)); 3594 # endif /* SM_HEAP_CHECK */ 3595 3596 FIX_SYSV_SIGNAL(sig, sigusr1); 3597 errno = save_errno; 3598 CHECK_CRITICAL(sig); 3599 dumpstate("user signal"); 3600 # if SM_HEAP_CHECK 3601 dumpstab(); 3602 # endif /* SM_HEAP_CHECK */ 3603 errno = save_errno; 3604 return SIGFUNC_RETURN; 3605 } 3606 #endif /* SIGUSR1 */ 3607 3608 /* 3609 ** DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option 3610 ** 3611 ** Parameters: 3612 ** to_real_uid -- if set, drop to the real uid instead 3613 ** of the RunAsUser. 3614 ** 3615 ** Returns: 3616 ** EX_OSERR if the setuid failed. 3617 ** EX_OK otherwise. 3618 */ 3619 3620 int 3621 drop_privileges(to_real_uid) 3622 bool to_real_uid; 3623 { 3624 int rval = EX_OK; 3625 GIDSET_T emptygidset[1]; 3626 3627 if (tTd(47, 1)) 3628 sm_dprintf("drop_privileges(%d): Real[UG]id=%d:%d, get[ug]id=%d:%d, gete[ug]id=%d:%d, RunAs[UG]id=%d:%d\n", 3629 (int) to_real_uid, 3630 (int) RealUid, (int) RealGid, 3631 (int) getuid(), (int) getgid(), 3632 (int) geteuid(), (int) getegid(), 3633 (int) RunAsUid, (int) RunAsGid); 3634 3635 if (to_real_uid) 3636 { 3637 RunAsUserName = RealUserName; 3638 RunAsUid = RealUid; 3639 RunAsGid = RealGid; 3640 EffGid = RunAsGid; 3641 } 3642 3643 /* make sure no one can grab open descriptors for secret files */ 3644 endpwent(); 3645 sm_mbdb_terminate(); 3646 3647 /* reset group permissions; these can be set later */ 3648 emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid(); 3649 3650 /* 3651 ** Notice: on some OS (Linux...) the setgroups() call causes 3652 ** a logfile entry if sendmail is not run by root. 3653 ** However, it is unclear (no POSIX standard) whether 3654 ** setgroups() can only succeed if executed by root. 3655 ** So for now we keep it as it is; if you want to change it, use 3656 ** if (geteuid() == 0 && setgroups(1, emptygidset) == -1) 3657 */ 3658 3659 if (setgroups(1, emptygidset) == -1 && geteuid() == 0) 3660 { 3661 syserr("drop_privileges: setgroups(1, %d) failed", 3662 (int) emptygidset[0]); 3663 rval = EX_OSERR; 3664 } 3665 3666 /* reset primary group id */ 3667 if (to_real_uid) 3668 { 3669 /* 3670 ** Drop gid to real gid. 3671 ** On some OS we must reset the effective[/real[/saved]] gid, 3672 ** and then use setgid() to finally drop all group privileges. 3673 ** Later on we check whether we can get back the 3674 ** effective gid. 3675 */ 3676 3677 #if HASSETEGID 3678 if (setegid(RunAsGid) < 0) 3679 { 3680 syserr("drop_privileges: setegid(%d) failed", 3681 (int) RunAsGid); 3682 rval = EX_OSERR; 3683 } 3684 #else /* HASSETEGID */ 3685 # if HASSETREGID 3686 if (setregid(RunAsGid, RunAsGid) < 0) 3687 { 3688 syserr("drop_privileges: setregid(%d, %d) failed", 3689 (int) RunAsGid, (int) RunAsGid); 3690 rval = EX_OSERR; 3691 } 3692 # else /* HASSETREGID */ 3693 # if HASSETRESGID 3694 if (setresgid(RunAsGid, RunAsGid, RunAsGid) < 0) 3695 { 3696 syserr("drop_privileges: setresgid(%d, %d, %d) failed", 3697 (int) RunAsGid, (int) RunAsGid, (int) RunAsGid); 3698 rval = EX_OSERR; 3699 } 3700 # endif /* HASSETRESGID */ 3701 # endif /* HASSETREGID */ 3702 #endif /* HASSETEGID */ 3703 } 3704 if (rval == EX_OK && (to_real_uid || RunAsGid != 0)) 3705 { 3706 if (setgid(RunAsGid) < 0 && (!UseMSP || getegid() != RunAsGid)) 3707 { 3708 syserr("drop_privileges: setgid(%d) failed", 3709 (int) RunAsGid); 3710 rval = EX_OSERR; 3711 } 3712 errno = 0; 3713 if (rval == EX_OK && getegid() != RunAsGid) 3714 { 3715 syserr("drop_privileges: Unable to set effective gid=%d to RunAsGid=%d", 3716 (int) getegid(), (int) RunAsGid); 3717 rval = EX_OSERR; 3718 } 3719 } 3720 3721 /* fiddle with uid */ 3722 if (to_real_uid || RunAsUid != 0) 3723 { 3724 uid_t euid; 3725 3726 /* 3727 ** Try to setuid(RunAsUid). 3728 ** euid must be RunAsUid, 3729 ** ruid must be RunAsUid unless (e|r)uid wasn't 0 3730 ** and we didn't have to drop privileges to the real uid. 3731 */ 3732 3733 if (setuid(RunAsUid) < 0 || 3734 geteuid() != RunAsUid || 3735 (getuid() != RunAsUid && 3736 (to_real_uid || geteuid() == 0 || getuid() == 0))) 3737 { 3738 #if HASSETREUID 3739 /* 3740 ** if ruid != RunAsUid, euid == RunAsUid, then 3741 ** try resetting just the real uid, then using 3742 ** setuid() to drop the saved-uid as well. 3743 */ 3744 3745 if (geteuid() == RunAsUid) 3746 { 3747 if (setreuid(RunAsUid, -1) < 0) 3748 { 3749 syserr("drop_privileges: setreuid(%d, -1) failed", 3750 (int) RunAsUid); 3751 rval = EX_OSERR; 3752 } 3753 if (setuid(RunAsUid) < 0) 3754 { 3755 syserr("drop_privileges: second setuid(%d) attempt failed", 3756 (int) RunAsUid); 3757 rval = EX_OSERR; 3758 } 3759 } 3760 else 3761 #endif /* HASSETREUID */ 3762 { 3763 syserr("drop_privileges: setuid(%d) failed", 3764 (int) RunAsUid); 3765 rval = EX_OSERR; 3766 } 3767 } 3768 euid = geteuid(); 3769 if (RunAsUid != 0 && setuid(0) == 0) 3770 { 3771 /* 3772 ** Believe it or not, the Linux capability model 3773 ** allows a non-root process to override setuid() 3774 ** on a process running as root and prevent that 3775 ** process from dropping privileges. 3776 */ 3777 3778 syserr("drop_privileges: setuid(0) succeeded (when it should not)"); 3779 rval = EX_OSERR; 3780 } 3781 else if (RunAsUid != euid && setuid(euid) == 0) 3782 { 3783 /* 3784 ** Some operating systems will keep the saved-uid 3785 ** if a non-root effective-uid calls setuid(real-uid) 3786 ** making it possible to set it back again later. 3787 */ 3788 3789 syserr("drop_privileges: Unable to drop non-root set-user-ID privileges"); 3790 rval = EX_OSERR; 3791 } 3792 } 3793 3794 if ((to_real_uid || RunAsGid != 0) && 3795 rval == EX_OK && RunAsGid != EffGid && 3796 getuid() != 0 && geteuid() != 0) 3797 { 3798 errno = 0; 3799 if (setgid(EffGid) == 0) 3800 { 3801 syserr("drop_privileges: setgid(%d) succeeded (when it should not)", 3802 (int) EffGid); 3803 rval = EX_OSERR; 3804 } 3805 } 3806 3807 if (tTd(47, 5)) 3808 { 3809 sm_dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n", 3810 (int) geteuid(), (int) getuid(), 3811 (int) getegid(), (int) getgid()); 3812 sm_dprintf("drop_privileges: RunAsUser = %d:%d\n", 3813 (int) RunAsUid, (int) RunAsGid); 3814 if (tTd(47, 10)) 3815 sm_dprintf("drop_privileges: rval = %d\n", rval); 3816 } 3817 return rval; 3818 } 3819 /* 3820 ** FILL_FD -- make sure a file descriptor has been properly allocated 3821 ** 3822 ** Used to make sure that stdin/out/err are allocated on startup 3823 ** 3824 ** Parameters: 3825 ** fd -- the file descriptor to be filled. 3826 ** where -- a string used for logging. If NULL, this is 3827 ** being called on startup, and logging should 3828 ** not be done. 3829 ** 3830 ** Returns: 3831 ** none 3832 ** 3833 ** Side Effects: 3834 ** possibly changes MissingFds 3835 */ 3836 3837 void 3838 fill_fd(fd, where) 3839 int fd; 3840 char *where; 3841 { 3842 int i; 3843 struct stat stbuf; 3844 3845 if (fstat(fd, &stbuf) >= 0 || errno != EBADF) 3846 return; 3847 3848 if (where != NULL) 3849 syserr("fill_fd: %s: fd %d not open", where, fd); 3850 else 3851 MissingFds |= 1 << fd; 3852 i = open(SM_PATH_DEVNULL, fd == 0 ? O_RDONLY : O_WRONLY, 0666); 3853 if (i < 0) 3854 { 3855 syserr("!fill_fd: %s: cannot open %s", 3856 where == NULL ? "startup" : where, SM_PATH_DEVNULL); 3857 } 3858 if (fd != i) 3859 { 3860 (void) dup2(i, fd); 3861 (void) close(i); 3862 } 3863 } 3864 /* 3865 ** SM_PRINTOPTIONS -- print options 3866 ** 3867 ** Parameters: 3868 ** options -- array of options. 3869 ** 3870 ** Returns: 3871 ** none. 3872 */ 3873 3874 static void 3875 sm_printoptions(options) 3876 char **options; 3877 { 3878 int ll; 3879 char **av; 3880 3881 av = options; 3882 ll = 7; 3883 while (*av != NULL) 3884 { 3885 if (ll + strlen(*av) > 63) 3886 { 3887 sm_dprintf("\n"); 3888 ll = 0; 3889 } 3890 if (ll == 0) 3891 sm_dprintf("\t\t"); 3892 else 3893 sm_dprintf(" "); 3894 sm_dprintf("%s", *av); 3895 ll += strlen(*av++) + 1; 3896 } 3897 sm_dprintf("\n"); 3898 } 3899 /* 3900 ** TESTMODELINE -- process a test mode input line 3901 ** 3902 ** Parameters: 3903 ** line -- the input line. 3904 ** e -- the current environment. 3905 ** Syntax: 3906 ** # a comment 3907 ** .X process X as a configuration line 3908 ** =X dump a configuration item (such as mailers) 3909 ** $X dump a macro or class 3910 ** /X try an activity 3911 ** X normal process through rule set X 3912 */ 3913 3914 static void 3915 testmodeline(line, e) 3916 char *line; 3917 ENVELOPE *e; 3918 { 3919 register char *p; 3920 char *q; 3921 auto char *delimptr; 3922 int mid; 3923 int i, rs; 3924 STAB *map; 3925 char **s; 3926 struct rewrite *rw; 3927 ADDRESS a; 3928 static int tryflags = RF_COPYNONE; 3929 char exbuf[MAXLINE]; 3930 extern unsigned char TokTypeNoC[]; 3931 3932 /* skip leading spaces */ 3933 while (*line == ' ') 3934 line++; 3935 3936 switch (line[0]) 3937 { 3938 case '#': 3939 case '\0': 3940 return; 3941 3942 case '?': 3943 help("-bt", e); 3944 return; 3945 3946 case '.': /* config-style settings */ 3947 switch (line[1]) 3948 { 3949 case 'D': 3950 mid = macid_parse(&line[2], &delimptr); 3951 if (mid == 0) 3952 return; 3953 translate_dollars(delimptr); 3954 macdefine(&e->e_macro, A_TEMP, mid, delimptr); 3955 break; 3956 3957 case 'C': 3958 if (line[2] == '\0') /* not to call syserr() */ 3959 return; 3960 3961 mid = macid_parse(&line[2], &delimptr); 3962 if (mid == 0) 3963 return; 3964 translate_dollars(delimptr); 3965 expand(delimptr, exbuf, sizeof exbuf, e); 3966 p = exbuf; 3967 while (*p != '\0') 3968 { 3969 register char *wd; 3970 char delim; 3971 3972 while (*p != '\0' && isascii(*p) && isspace(*p)) 3973 p++; 3974 wd = p; 3975 while (*p != '\0' && !(isascii(*p) && isspace(*p))) 3976 p++; 3977 delim = *p; 3978 *p = '\0'; 3979 if (wd[0] != '\0') 3980 setclass(mid, wd); 3981 *p = delim; 3982 } 3983 break; 3984 3985 case '\0': 3986 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 3987 "Usage: .[DC]macro value(s)\n"); 3988 break; 3989 3990 default: 3991 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 3992 "Unknown \".\" command %s\n", line); 3993 break; 3994 } 3995 return; 3996 3997 case '=': /* config-style settings */ 3998 switch (line[1]) 3999 { 4000 case 'S': /* dump rule set */ 4001 rs = strtorwset(&line[2], NULL, ST_FIND); 4002 if (rs < 0) 4003 { 4004 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4005 "Undefined ruleset %s\n", &line[2]); 4006 return; 4007 } 4008 rw = RewriteRules[rs]; 4009 if (rw == NULL) 4010 return; 4011 do 4012 { 4013 (void) sm_io_putc(smioout, SM_TIME_DEFAULT, 4014 'R'); 4015 s = rw->r_lhs; 4016 while (*s != NULL) 4017 { 4018 xputs(smioout, *s++); 4019 (void) sm_io_putc(smioout, 4020 SM_TIME_DEFAULT, ' '); 4021 } 4022 (void) sm_io_putc(smioout, SM_TIME_DEFAULT, 4023 '\t'); 4024 (void) sm_io_putc(smioout, SM_TIME_DEFAULT, 4025 '\t'); 4026 s = rw->r_rhs; 4027 while (*s != NULL) 4028 { 4029 xputs(smioout, *s++); 4030 (void) sm_io_putc(smioout, 4031 SM_TIME_DEFAULT, ' '); 4032 } 4033 (void) sm_io_putc(smioout, SM_TIME_DEFAULT, 4034 '\n'); 4035 } while ((rw = rw->r_next) != NULL); 4036 break; 4037 4038 case 'M': 4039 for (i = 0; i < MAXMAILERS; i++) 4040 { 4041 if (Mailer[i] != NULL) 4042 printmailer(smioout, Mailer[i]); 4043 } 4044 break; 4045 4046 case '\0': 4047 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4048 "Usage: =Sruleset or =M\n"); 4049 break; 4050 4051 default: 4052 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4053 "Unknown \"=\" command %s\n", line); 4054 break; 4055 } 4056 return; 4057 4058 case '-': /* set command-line-like opts */ 4059 switch (line[1]) 4060 { 4061 case 'd': 4062 tTflag(&line[2]); 4063 break; 4064 4065 case '\0': 4066 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4067 "Usage: -d{debug arguments}\n"); 4068 break; 4069 4070 default: 4071 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4072 "Unknown \"-\" command %s\n", line); 4073 break; 4074 } 4075 return; 4076 4077 case '$': 4078 if (line[1] == '=') 4079 { 4080 mid = macid(&line[2]); 4081 if (mid != 0) 4082 stabapply(dump_class, mid); 4083 return; 4084 } 4085 mid = macid(&line[1]); 4086 if (mid == 0) 4087 return; 4088 p = macvalue(mid, e); 4089 if (p == NULL) 4090 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4091 "Undefined\n"); 4092 else 4093 { 4094 xputs(smioout, p); 4095 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4096 "\n"); 4097 } 4098 return; 4099 4100 case '/': /* miscellaneous commands */ 4101 p = &line[strlen(line)]; 4102 while (--p >= line && isascii(*p) && isspace(*p)) 4103 *p = '\0'; 4104 p = strpbrk(line, " \t"); 4105 if (p != NULL) 4106 { 4107 while (isascii(*p) && isspace(*p)) 4108 *p++ = '\0'; 4109 } 4110 else 4111 p = ""; 4112 if (line[1] == '\0') 4113 { 4114 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4115 "Usage: /[canon|map|mx|parse|try|tryflags]\n"); 4116 return; 4117 } 4118 if (sm_strcasecmp(&line[1], "quit") == 0) 4119 { 4120 CurEnv->e_id = NULL; 4121 finis(true, true, ExitStat); 4122 /* NOTREACHED */ 4123 } 4124 if (sm_strcasecmp(&line[1], "mx") == 0) 4125 { 4126 #if NAMED_BIND 4127 /* look up MX records */ 4128 int nmx; 4129 auto int rcode; 4130 char *mxhosts[MAXMXHOSTS + 1]; 4131 4132 if (*p == '\0') 4133 { 4134 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4135 "Usage: /mx address\n"); 4136 return; 4137 } 4138 nmx = getmxrr(p, mxhosts, NULL, false, &rcode, true, 4139 NULL); 4140 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4141 "getmxrr(%s) returns %d value(s):\n", 4142 p, nmx); 4143 for (i = 0; i < nmx; i++) 4144 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4145 "\t%s\n", mxhosts[i]); 4146 #else /* NAMED_BIND */ 4147 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4148 "No MX code compiled in\n"); 4149 #endif /* NAMED_BIND */ 4150 } 4151 else if (sm_strcasecmp(&line[1], "canon") == 0) 4152 { 4153 char host[MAXHOSTNAMELEN]; 4154 4155 if (*p == '\0') 4156 { 4157 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4158 "Usage: /canon address\n"); 4159 return; 4160 } 4161 else if (sm_strlcpy(host, p, sizeof host) >= sizeof host) 4162 { 4163 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4164 "Name too long\n"); 4165 return; 4166 } 4167 (void) getcanonname(host, sizeof host, !HasWildcardMX, 4168 NULL); 4169 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4170 "getcanonname(%s) returns %s\n", 4171 p, host); 4172 } 4173 else if (sm_strcasecmp(&line[1], "map") == 0) 4174 { 4175 auto int rcode = EX_OK; 4176 char *av[2]; 4177 4178 if (*p == '\0') 4179 { 4180 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4181 "Usage: /map mapname key\n"); 4182 return; 4183 } 4184 for (q = p; *q != '\0' && !(isascii(*q) && isspace(*q)); q++) 4185 continue; 4186 if (*q == '\0') 4187 { 4188 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4189 "No key specified\n"); 4190 return; 4191 } 4192 *q++ = '\0'; 4193 map = stab(p, ST_MAP, ST_FIND); 4194 if (map == NULL) 4195 { 4196 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4197 "Map named \"%s\" not found\n", p); 4198 return; 4199 } 4200 if (!bitset(MF_OPEN, map->s_map.map_mflags) && 4201 !openmap(&(map->s_map))) 4202 { 4203 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4204 "Map named \"%s\" not open\n", p); 4205 return; 4206 } 4207 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4208 "map_lookup: %s (%s) ", p, q); 4209 av[0] = q; 4210 av[1] = NULL; 4211 p = (*map->s_map.map_class->map_lookup) 4212 (&map->s_map, q, av, &rcode); 4213 if (p == NULL) 4214 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4215 "no match (%d)\n", 4216 rcode); 4217 else 4218 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4219 "returns %s (%d)\n", p, 4220 rcode); 4221 } 4222 else if (sm_strcasecmp(&line[1], "try") == 0) 4223 { 4224 MAILER *m; 4225 STAB *st; 4226 auto int rcode = EX_OK; 4227 4228 q = strpbrk(p, " \t"); 4229 if (q != NULL) 4230 { 4231 while (isascii(*q) && isspace(*q)) 4232 *q++ = '\0'; 4233 } 4234 if (q == NULL || *q == '\0') 4235 { 4236 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4237 "Usage: /try mailer address\n"); 4238 return; 4239 } 4240 st = stab(p, ST_MAILER, ST_FIND); 4241 if (st == NULL) 4242 { 4243 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4244 "Unknown mailer %s\n", p); 4245 return; 4246 } 4247 m = st->s_mailer; 4248 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4249 "Trying %s %s address %s for mailer %s\n", 4250 bitset(RF_HEADERADDR, tryflags) ? "header" 4251 : "envelope", 4252 bitset(RF_SENDERADDR, tryflags) ? "sender" 4253 : "recipient", q, p); 4254 p = remotename(q, m, tryflags, &rcode, CurEnv); 4255 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4256 "Rcode = %d, addr = %s\n", 4257 rcode, p == NULL ? "<NULL>" : p); 4258 e->e_to = NULL; 4259 } 4260 else if (sm_strcasecmp(&line[1], "tryflags") == 0) 4261 { 4262 if (*p == '\0') 4263 { 4264 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4265 "Usage: /tryflags [Hh|Ee][Ss|Rr]\n"); 4266 return; 4267 } 4268 for (; *p != '\0'; p++) 4269 { 4270 switch (*p) 4271 { 4272 case 'H': 4273 case 'h': 4274 tryflags |= RF_HEADERADDR; 4275 break; 4276 4277 case 'E': 4278 case 'e': 4279 tryflags &= ~RF_HEADERADDR; 4280 break; 4281 4282 case 'S': 4283 case 's': 4284 tryflags |= RF_SENDERADDR; 4285 break; 4286 4287 case 'R': 4288 case 'r': 4289 tryflags &= ~RF_SENDERADDR; 4290 break; 4291 } 4292 } 4293 exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e'; 4294 exbuf[1] = ' '; 4295 exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r'; 4296 exbuf[3] = '\0'; 4297 macdefine(&e->e_macro, A_TEMP, 4298 macid("{addr_type}"), exbuf); 4299 } 4300 else if (sm_strcasecmp(&line[1], "parse") == 0) 4301 { 4302 if (*p == '\0') 4303 { 4304 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4305 "Usage: /parse address\n"); 4306 return; 4307 } 4308 q = crackaddr(p, e); 4309 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4310 "Cracked address = "); 4311 xputs(smioout, q); 4312 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4313 "\nParsing %s %s address\n", 4314 bitset(RF_HEADERADDR, tryflags) ? 4315 "header" : "envelope", 4316 bitset(RF_SENDERADDR, tryflags) ? 4317 "sender" : "recipient"); 4318 if (parseaddr(p, &a, tryflags, '\0', NULL, e, true) 4319 == NULL) 4320 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4321 "Cannot parse\n"); 4322 else if (a.q_host != NULL && a.q_host[0] != '\0') 4323 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4324 "mailer %s, host %s, user %s\n", 4325 a.q_mailer->m_name, 4326 a.q_host, 4327 a.q_user); 4328 else 4329 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4330 "mailer %s, user %s\n", 4331 a.q_mailer->m_name, 4332 a.q_user); 4333 e->e_to = NULL; 4334 } 4335 else 4336 { 4337 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4338 "Unknown \"/\" command %s\n", 4339 line); 4340 } 4341 return; 4342 } 4343 4344 for (p = line; isascii(*p) && isspace(*p); p++) 4345 continue; 4346 q = p; 4347 while (*p != '\0' && !(isascii(*p) && isspace(*p))) 4348 p++; 4349 if (*p == '\0') 4350 { 4351 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4352 "No address!\n"); 4353 return; 4354 } 4355 *p = '\0'; 4356 if (invalidaddr(p + 1, NULL, true)) 4357 return; 4358 do 4359 { 4360 register char **pvp; 4361 char pvpbuf[PSBUFSIZE]; 4362 4363 pvp = prescan(++p, ',', pvpbuf, sizeof pvpbuf, &delimptr, 4364 ConfigLevel >= 9 ? TokTypeNoC : NULL, false); 4365 if (pvp == NULL) 4366 continue; 4367 p = q; 4368 while (*p != '\0') 4369 { 4370 int status; 4371 4372 rs = strtorwset(p, NULL, ST_FIND); 4373 if (rs < 0) 4374 { 4375 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4376 "Undefined ruleset %s\n", 4377 p); 4378 break; 4379 } 4380 status = REWRITE(pvp, rs, e); 4381 if (status != EX_OK) 4382 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4383 "== Ruleset %s (%d) status %d\n", 4384 p, rs, status); 4385 while (*p != '\0' && *p++ != ',') 4386 continue; 4387 } 4388 } while (*(p = delimptr) != '\0'); 4389 } 4390 4391 static void 4392 dump_class(s, id) 4393 register STAB *s; 4394 int id; 4395 { 4396 if (s->s_symtype != ST_CLASS) 4397 return; 4398 if (bitnset(bitidx(id), s->s_class)) 4399 (void) sm_io_fprintf(smioout, SM_TIME_DEFAULT, 4400 "%s\n", s->s_name); 4401 } 4402 4403 /* 4404 ** An exception type used to create QuickAbort exceptions. 4405 ** This is my first cut at converting QuickAbort from longjmp to exceptions. 4406 ** These exceptions have a single integer argument, which is the argument 4407 ** to longjmp in the original code (either 1 or 2). I don't know the 4408 ** significance of 1 vs 2: the calls to setjmp don't care. 4409 */ 4410 4411 const SM_EXC_TYPE_T EtypeQuickAbort = 4412 { 4413 SmExcTypeMagic, 4414 "E:mta.quickabort", 4415 "i", 4416 sm_etype_printf, 4417 "quick abort %0", 4418 }; 4419