aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail.man
Commit message (Expand)AuthorAgeFilesLines
* Get ready for 6.4.22.rc2.Matthias Andree2021-08-271-1/+1
* Add CVE ID; revise TLS docs & fetchmail-SA-2021-02Matthias Andree2021-08-271-16/+22
* Bump version to 6.4.22.rc1Matthias Andree2021-08-261-1/+1
* manpage: Fix indentation under --sslprotoMatthias Andree2021-08-261-3/+3
* Bump version to 6.4.21.Matthias Andree2021-08-091-1/+1
* Get ready for 6.4.20.Matthias Andree2021-07-281-1/+1
* Get ready for 6.4.19.Matthias Andree2021-04-241-1/+1
* Improve SSL/TLS documentation, and rearrange manualMatthias Andree2021-03-291-73/+76
* fetchmail.man: add missing word (minor change).Matthias Andree2021-03-131-2/+2
* fetchmail.man: tell user to add --ssl for TLS-wrapped portsMatthias Andree2021-02-141-1/+6
* Bump version to 6.4.17 for next release.Matthias Andree2021-02-111-1/+1
* manual: minor cleanupsMatthias Andree2021-01-301-4/+4
* manual: add PREFACE, add ENVIRONMENT intro, fix missing word in HOME env doc.Matthias Andree2021-01-301-1/+24
* --version: print default cert paths, and document SSL_CERT_* in manpageMatthias Andree2021-01-301-0/+19
* fetchmail.man: correct and extend duplicate-suppression behaviorMatthias Andree2021-01-301-4/+24
* Bump version to 6.4.15.Matthias Andree2021-01-031-1/+1
* manpage: disouraged -> discouragedMatthias Andree2020-12-151-2/+2
* Bump versions to 6.4.14.Matthias Andree2020-11-261-1/+1
* Update fetchmail.man for 6.4.13 release.Matthias Andree2020-10-251-6/+10
* refer to pidfile in lock file section, bump version.Matthias Andree2020-10-141-2/+2
* Prepare 6.4.12.Matthias Andree2020-09-041-1/+1
* regression fix: check for TLS v1.2/1.3 support with libssl.soMatthias Andree2020-08-281-1/+1
* Prepare 6.4.10.Matthias Andree2020-08-271-1/+1
* Bump version to 6.4.9Matthias Andree2020-08-271-1/+1
* Mention MD5 is the hash used for sslfingerprint also in the options table.Matthias Andree2020-07-091-2/+2
* Prepare fetchmail 6.4.8 release.Matthias Andree2020-06-141-1/+1
* Prepare fetchmail 6.4.7 release.Matthias Andree2020-06-141-1/+1
* Prepare 6.4.6 (translation updateMatthias Andree2020-05-291-1/+1
* Release 6.4.5-rc1.Matthias Andree2020-05-041-1/+1
* Bump version to 6.4.4, and mention Japanese translation update.Matthias Andree2020-04-261-1/+1
* fetchmail.man: --sslproto: document tls1.3 and tls1.3+ values.Matthias Andree2020-03-301-0/+4
* Bump version to 6.4.3[-rc1].Matthias Andree2020-03-301-1/+1
* Bump version to 6.4.2[rc1].Matthias Andree2020-01-201-1/+1
* Minor manpage updates, URL updates.Matthias Andree2020-01-031-18/+10
* fetchmail.man: Document pidfile usage in run control file.Gregor Zattler2020-01-031-0/+3
* fetchmail.man: Remove note that --sslcertck may become the defaultChris Mayo2019-12-061-3/+0
* Fix a few man page issues.Matthias Andree2019-10-101-23/+24
* Fix typos.Matthias Andree2019-09-281-2/+2
* 6.4.1, regression fix for default file locations.Matthias Andree2019-09-281-15/+29
* fetchmail.man: fix typo spotted by lintianNicolas Boulenguez2019-08-251-1/+1
* Documentation updates.Matthias Andree2019-08-181-1/+2
* Document FETCHMAIL_POP3_FORCE_RETR and drop it from TODO.txt.Matthias Andree2019-05-121-0/+6
* Reinstate --sslcertfile documentation.Matthias Andree2017-02-201-0/+1
* Document use of address literals for SMTP.Matthias Andree2016-07-271-5/+15
* Minor option/usage message/man page fixes.Vitezslav Crhonek2016-04-271-2/+11
* Clarify --antispam only applies to MAIL FROM:.Matthias Andree2016-03-221-1/+5
* Enable --sslcertck by default.Matthias Andree2015-11-151-17/+35
* Fix missing backslash in \fB.Matthias Andree2015-11-151-1/+1
* Update documentation.Matthias Andree2015-04-111-7/+19
* TLS overhaul, bumping version to 6.4Matthias Andree2015-01-261-54/+77
id='n588' href='#n588'>588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404
/*
 * fetchmail.c -- main driver module for fetchmail
 *
 * For license terms, see the file COPYING in this directory.
 */
#include "config.h"

#include <stdio.h>
#include <ctype.h>
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#if defined(HAVE_ALLOCA_H)
#include <alloca.h>
#else
#ifdef _AIX
 #pragma alloca
#endif
#endif
#include <string.h>
#include <signal.h>
#if defined(HAVE_SYSLOG)
#include <syslog.h>
#endif
#include <pwd.h>
#include <errno.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/stat.h>
#ifdef HAVE_SYS_WAIT_H
#include <sys/wait.h>
#endif

#ifdef HAVE_GETHOSTBYNAME
#include <netdb.h>
#endif /* HAVE_GETHOSTBYNAME */

#include "fetchmail.h"
#include "tunable.h"
#include "smtp.h"
#include "getopt.h"
#include "netrc.h"

#ifndef ENETUNREACH
#define ENETUNREACH   128       /* Interactive doesn't know this */
#endif /* ENETUNREACH */

/* prototypes for internal functions */
static int load_params(int, char **, int);
static void dump_params (struct runctl *runp, struct query *, flag implicit);
static int query_host(struct query *);

/* controls the detail level of status/progress messages written to stderr */
int outlevel;    	/* see the O_.* constants above */

/* miscellaneous global controls */
struct runctl run;	/* global controls for this run */
flag nodetach;		/* if TRUE, don't detach daemon process */
flag quitmode;		/* if --quit was set */
flag check_only;	/* if --probe was set */
flag versioninfo;	/* emit only version info */
char *user;		/* the name of the invoking user */
char *home;		/* invoking user's home directory */
char *fetchmailhost;	/* the name of the host running fetchmail */
char *program_name;	/* the name to prefix error messages with */
flag configdump;	/* dump control blocks for configurator */

#if NET_SECURITY
void *request = NULL;
int requestlen = 0;
#endif /* NET_SECURITY */

static char *lockfile;		/* name of lockfile */
static int querystatus;		/* status of query */
static int successes;		/* count number of successful polls */
static int lastsig;		/* last signal received */
static struct runctl cmd_run;	/* global options set from command line */

static void termhook();		/* forward declaration of exit hook */

/*
 * The function of this variable is to reduce the size of the window during
 * which two SIGALRMS in rapid succession can hose the code.  This is a
 * bit of a kluge; the real right thing would use sigprocmask(), sigsuspend()
 * and close the window entirely.  But since the interval isn't normally
 * going to be less than one second this is not a big issue.
 */
#if defined(STDC_HEADERS)
static sig_atomic_t	alarm_latch = FALSE;
#else
/* assume int can be written in one atomic operation on non ANSI-C systems */
static int		alarm_latch = FALSE;
#endif

RETSIGTYPE donothing(sig) int sig; {signal(sig, donothing); lastsig = sig;}
RETSIGTYPE gotsigalrm(sig) int sig; {signal(sig, donothing); lastsig = sig; alarm_latch = TRUE;}

#ifdef HAVE_ON_EXIT
static void unlockit(int n, void *p)
#else
static void unlockit(void)
#endif
/* must-do actions for exit (but we can't count on being able to do malloc) */
{
    unlink(lockfile);
}

#ifdef __EMX__
/* Various EMX-specific definitions */
int itimerflag;
void itimerthread(void* dummy) {
  if (outlevel == O_VERBOSE)
    fprintf(stderr, "fetchmail: thread sleeping for %d sec.\n", poll_interval);
  while(1) {
    _sleep2(poll_interval*1000);
    kill((getpid()), SIGALRM);
  }
}
#endif

int main (int argc, char **argv)
{
    int st, bkgd = FALSE;
    int parsestatus, implicitmode = FALSE;
    FILE	*lockfp;
    struct query *ctl;
    netrc_entry *netrc_list;
    char *netrc_file, *tmpbuf;
    pid_t pid;

    envquery(argc, argv);

#define IDFILE_NAME	".fetchids"
    run.idfile = (char *) xmalloc(strlen(home)+strlen(IDFILE_NAME)+2);
    strcpy(run.idfile, home);
    strcat(run.idfile, "/");
    strcat(run.idfile, IDFILE_NAME);
  
    outlevel = O_NORMAL;

    if ((parsestatus = parsecmdline(argc,argv, &cmd_run, &cmd_opts)) < 0)
	exit(PS_SYNTAX);

    /* this hint to stdio should help messages come out in the right order */
    setvbuf(stdout, NULL, _IOLBF, MSGBUFSIZE);

    if (versioninfo)
    {
	printf("This is fetchmail release %s", RELEASE_ID);
#ifdef POP2_ENABLE
	printf("+POP2");
#endif /* POP2_ENABLE */
#ifndef POP3_ENABLE
	printf("-POP3");
#endif /* POP3_ENABLE */
#ifndef IMAP_ENABLE
	printf("-IMAP");
#endif /* IMAP_ENABLE */
#ifdef RPA_ENABLE
	printf("+RPA");
#endif /* RPA_ENABLE */
#ifndef ETRN_ENABLE
	printf("-ETRN");
#endif /* ETRN_ENABLE */
#if OPIE
	printf("+OPIE");
#endif /* OPIE */
#if INET6
	printf("+INET6");
#endif /* INET6 */
#if NET_SECURITY
	printf("+NETSEC");
#endif /* NET_SECURITY */
	putchar('\n');

	/* this is an attempt to help remote debugging */
	system("uname -a");
    }

    /* avoid parsing the config file if all we're doing is killing a daemon */ 
    if (!(quitmode && argc == 2))
	implicitmode = load_params(argc, argv, optind);

    /* set up to do lock protocol */
#define	FETCHMAIL_PIDFILE	"fetchmail.pid"
    tmpbuf = xmalloc(strlen(home) + strlen(FETCHMAIL_PIDFILE) + 3);
    if (!getuid())
	sprintf(tmpbuf, "%s/%s", PID_DIR, FETCHMAIL_PIDFILE);
    else {
	strcpy(tmpbuf, home);
	strcat(tmpbuf, "/.");
	strcat(tmpbuf, FETCHMAIL_PIDFILE);
    }
#undef FETCHMAIL_PIDFILE

    /* perhaps we just want to check options? */
    if (versioninfo)
    {
	printf("Taking options from command line");
	if (access(rcfile, 0))
	    printf("\n");
	else
	    printf(" and %s\n", rcfile);
	if (outlevel == O_VERBOSE)
	    printf("Lockfile at %s\n", tmpbuf);

	if (querylist == NULL)
	    (void) fprintf(stderr,
		"No mailservers set up -- perhaps %s is missing?\n", rcfile);
	else
	    dump_params(&run, querylist, implicitmode);
	exit(0);
    }

    /* dump options as a Python dictionary, for configurator use */
    if (configdump)
    {
	dump_config(&run, querylist);
	exit(0);
    }

    /* check for another fetchmail running concurrently */
    pid = -1;
    if ((lockfile = (char *) malloc(strlen(tmpbuf) + 1)) == NULL)
    {
	fprintf(stderr,"fetchmail: cannot allocate memory for lock name.\n");
	exit(PS_EXCLUDE);
    }
    else
	(void) strcpy(lockfile, tmpbuf);
    if ((lockfp = fopen(lockfile, "r")) != NULL )
    {
	bkgd = (fscanf(lockfp,"%d %d", &pid, &st) == 2);

	if (kill(pid, 0) == -1) {
	    fprintf(stderr,"fetchmail: removing stale lockfile\n");
	    pid = -1;
	    bkgd = FALSE;
	    unlink(lockfile);
	}
	fclose(lockfp);
    }

    /* if no mail servers listed and nothing in background, we're done */
    if (!(quitmode && argc == 2) && pid == -1 && querylist == NULL) {
	(void)fputs("fetchmail: no mailservers have been specified.\n",stderr);
	exit(PS_SYNTAX);
    }

    /* perhaps user asked us to kill the other fetchmail */
    if (quitmode)
    {
	if (pid == -1) 
	{
	    fprintf(stderr,"fetchmail: no other fetchmail is running\n");
	    if (argc == 2)
		exit(PS_EXCLUDE);
	}
	else if (kill(pid, SIGTERM) < 0)
	{
	    fprintf(stderr,"fetchmail: error killing %s fetchmail at %d; bailing out.\n",
		    bkgd ? "background" : "foreground", pid);
	    exit(PS_EXCLUDE);
	}
	else
	{
	    fprintf(stderr,"fetchmail: %s fetchmail at %d killed.\n",
		    bkgd ? "background" : "foreground", pid);
	    unlink(lockfile);
	    if (argc == 2)
		exit(0);
	    else
		pid = -1; 
	}
    }

    /* another fetchmail is running -- wake it up or die */
    if (pid != -1)
    {
	if (check_only)
	{
	    fprintf(stderr,
		 "fetchmail: can't check mail while another fetchmail to same host is running.\n");
	    return(PS_EXCLUDE);
        }
	else if (!implicitmode)
	{
	    fprintf(stderr,
		 "fetchmail: can't poll specified hosts with another fetchmail running at %d.\n",
		 pid);
		return(PS_EXCLUDE);
	}
	else if (!bkgd)
	{
	    fprintf(stderr,
		 "fetchmail: another foreground fetchmail is running at %d.\n",
		 pid);
		return(PS_EXCLUDE);
	}
	else if (argc > 1)
	{
	    fprintf(stderr,
		    "fetchmail: can't accept options while a background fetchmail is running.\n");
	    return(PS_EXCLUDE);
	}
	else if (kill(pid, SIGUSR1) == 0)
	{
	    fprintf(stderr,
		    "fetchmail: background fetchmail at %d awakened.\n",
		    pid);
	    return(0);
	}
	else
	{
	    /*
	     * Should never happen -- possible only if a background fetchmail
	     * croaks after the first kill probe above but before the
	     * SIGUSR1/SIGHUP transmission.
	     */
	    fprintf(stderr,
		    "fetchmail: elder sibling at %d died mysteriously.\n",
		    pid);
	    return(PS_UNDEFINED);
	}
    }

    /* parse the ~/.netrc file (if present) for future password lookups. */
    netrc_file = (char *) xmalloc (strlen (home) + 8);
    strcpy (netrc_file, home);
    strcat (netrc_file, "/.netrc");
    netrc_list = parse_netrc(netrc_file);

    /* pick up interactively any passwords we need but don't have */ 
    for (ctl = querylist; ctl; ctl = ctl->next)
	if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
	{
	    if (ctl->server.preauthenticate == A_KERBEROS_V4 ||
		ctl->server.preauthenticate == A_KERBEROS_V5 ||
#ifdef GSSAPI
		ctl->server.protocol == P_IMAP_GSS ||
#endif /* GSSAPI */
		ctl->server.protocol == P_IMAP_K4)
		/* Server won't care what the password is, but there
		   must be some non-null string here.  */
		ctl->password = ctl->remotename;
	    else
	    {
		/* look up the host and account in the .netrc file. */
		netrc_entry *p = search_netrc(netrc_list,ctl->server.pollname);
		while (p && strcmp(p->account, ctl->remotename))
		    p = search_netrc(p->next, ctl->remotename);

		/* if we find a matching entry with a password, use it */
		if (p && p->password)
		    ctl->password = xstrdup(p->password);
	    }

	    if (ctl->server.protocol != P_ETRN && ctl->server.protocol != P_IMAP_K4
#ifdef GSSAPI
                && ctl->server.protocol != P_IMAP_GSS
#endif /* GSSAPI */
                && !ctl->password)
	    {
		free(tmpbuf);
#define	PASSWORD_PROMPT	"Enter password for %s@%s: "
		tmpbuf = xmalloc(strlen(PASSWORD_PROMPT) +
					strlen(ctl->remotename) +
					strlen(ctl->server.pollname) + 1);
		(void) sprintf(tmpbuf, PASSWORD_PROMPT,
			       ctl->remotename, ctl->server.pollname);
		ctl->password = xstrdup((char *)getpassword(tmpbuf));
#undef	PASSWORD_PROMPT
	    }
	}

    /* we don't need tmpbuf anymore */
    free(tmpbuf);
    tmpbuf = NULL;	/* firewall code */

    /*
     * Maybe time to go to demon mode...
     */
#if defined(HAVE_SYSLOG)
    if (run.use_syslog)
    {
    	openlog(program_name, LOG_PID, LOG_MAIL);
	error_init(-1);
    }
    else
#endif
	error_init(run.poll_interval == 0 && !run.logfile);

    if (run.poll_interval)
    {
	if (!nodetach)
	    daemonize(run.logfile, termhook);
	error( 0, 0, "starting fetchmail %s daemon ", RELEASE_ID);

	/*
	 * We'll set up a handler for these when we're sleeping,
	 * but ignore them otherwise so as not to interrupt a poll.
	 */
	signal(SIGUSR1, SIG_IGN);
	if (run.poll_interval && !getuid())
	    signal(SIGHUP, SIG_IGN);
    }

    /* beyond here we don't want more than one fetchmail running per user */
    umask(0077);
    signal(SIGABRT, termhook);
    signal(SIGINT, termhook);
    signal(SIGTERM, termhook);
    signal(SIGALRM, termhook);
    signal(SIGPIPE, termhook);
    signal(SIGQUIT, termhook);

    /* here's the exclusion lock */
    if ((lockfp = fopen(lockfile,"w")) != NULL) {
	fprintf(lockfp,"%d",getpid());
	if (run.poll_interval)
	    fprintf(lockfp," %d", run.poll_interval);
	fclose(lockfp);

#ifdef HAVE_ATEXIT
	atexit(unlockit);
#endif
#ifdef HAVE_ON_EXIT
	on_exit(unlockit, (char *)NULL);
#endif
    }

    /*
     * Query all hosts. If there's only one, the error return will
     * reflect the status of that transaction.
     */
    do {
#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
	/*
	 * This was an efficiency hack that backfired.  The theory
	 * was that using TCP/IP for DNS queries would get us better
	 * reliability and shave off some per-UDP-packet costs.
	 * Unfortunately it interacted badly with diald, which effectively 
	 * filters out DNS queries over TCP/IP for reasons having to do
	 * with some obscure kernel problem involving bootstrapping of
	 * dynamically-addressed links.  I don't understand this mess
	 * and don't want to, so it's "See ya!" to this hack.
	 */
	sethostent(TRUE);	/* use TCP/IP for mailserver queries */
#endif /* HAVE_RES_SEARCH */

	batchcount = 0;
	for (ctl = querylist; ctl; ctl = ctl->next)
	{
	    if (ctl->active && !(implicitmode && ctl->server.skip))
	    {
		/* check skip interval first so that it counts all polls */
		if (run.poll_interval && ctl->server.interval) 
		{
		    if (ctl->server.poll_count++ % ctl->server.interval) 
		    {
			if (outlevel == O_VERBOSE)
			    fprintf(stderr,
				    "fetchmail: interval not reached, not querying %s\n",
				    ctl->server.pollname);
			continue;
		    }
		}

#if defined(linux) && !INET6
		/* interface_approve() does its own error logging */
		if (!interface_approve(&ctl->server))
		    continue;
#endif /* defined(linux) && !INET6 */

#ifdef HAVE_GETHOSTBYNAME
		/*
		 * This functions partly as a probe to make sure our
		 * nameserver is still up.  The multidrop case
		 * (especially) needs it.
		 */
		if (ctl->server.preauthenticate==A_KERBEROS_V4 ||
		    ctl->server.preauthenticate==A_KERBEROS_V5 ||
		    MULTIDROP(ctl))
		{
		    struct hostent	*namerec;

		    /* compute the canonical name of the host */
		    errno = 0;
		    namerec = gethostbyname(ctl->server.queryname);
		    if (namerec == (struct hostent *)NULL)
		    {
			error(0, errno,
				"skipping %s poll, ",
				ctl->server.pollname);
			if (errno)
			{
			    if (errno == ENETUNREACH)
				break;	/* go to sleep */
			}
#ifdef HAVE_HERROR		/* NEXTSTEP doesn't */
			else
			    herror("DNS error");
#endif /* HAVE_HERROR */
			continue;
		    }
		    else
		    {
			free(ctl->server.truename);
			ctl->server.truename=xstrdup((char *)namerec->h_name);
		    }
		}
#endif /* HAVE_GETHOSTBYNAME */

		querystatus = query_host(ctl);

		if (querystatus == PS_SUCCESS)
		{
		    successes++;
#ifdef POP3_ENABLE
		    if (!check_only)
			update_str_lists(ctl);

		   /* Save UID list to prevent re-fetch in case fetchmail 
		      recover from crash */
		    if (!check_only && outlevel == O_VERBOSE)
		    {
			write_saved_lists(querylist, run.idfile);
			error(0, 0, "fetchmail: saved UID List");
		    }
#endif  /* POP3_ENABLE */
		}
		else if (!check_only && 
			 ((querystatus!=PS_NOMAIL) || (outlevel==O_VERBOSE)))
		    error(0, 0, "Query status=%d", querystatus);

#if defined(linux) && !INET6
		if (ctl->server.monitor)
		    {
			/* Allow some time for the link to quiesce.  One
			 * second is usually sufficient, three is safe.
			 * Note:  this delay is important - don't remove!
			 */
			sleep(3);
			interface_note_activity(&ctl->server);
		    }
#endif /* defined(linux) && !INET6 */
	    }
	}

#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
	endhostent();		/* release TCP/IP connection to nameserver */
#endif /* HAVE_RES_SEARCH */

	/*
	 * Close all SMTP delivery sockets.  For optimum performance
	 * we'd like to hold them open til end of run, but (1) this
	 * loses if our poll interval is longer than the MTA's inactivity
	 * timeout, and (2) some MTAs (like smail) don't deliver after
	 * each message, but rather queue up mail and wait to actually
	 * deliver it until the input socket is closed. 
	 */
	for (ctl = querylist; ctl; ctl = ctl->next)
	    if (ctl->smtp_socket != -1)
	    {
		SMTP_quit(ctl->smtp_socket);
		close(ctl->smtp_socket);
		ctl->smtp_socket = -1;
	    }

	/*
	 * OK, we've polled.  Now sleep.
	 */
	if (run.poll_interval)
	{
	    if (outlevel == O_VERBOSE)
	    {
		time_t	now;

		time(&now);
		fprintf(stderr, "fetchmail: sleeping at %s", ctime(&now));
	    }

	    /*
	     * With this simple hack, we make it possible for a foreground 
	     * fetchmail to wake up one in daemon mode.  What we want is the
	     * side effect of interrupting any sleep that may be going on,
	     * forcing fetchmail to re-poll its hosts.  The second line is
	     * for people who think all system daemons wake up on SIGHUP.
	     */
	    signal(SIGUSR1, donothing);
	    if (!getuid())
		signal(SIGHUP, donothing);

	    /*
	     * We can't use sleep(3) here because we need an alarm(3)
	     * equivalent in order to implement server nonresponse timeout.
	     * We'll just assume setitimer(2) is available since fetchmail
	     * has to have a BSDoid socket layer to work at all.
	     */
	    {
#ifndef __EMX__
#ifdef SLEEP_WITH_ALARM		/* not normally on */
		/* 
		 * This code stopped working under glibc-2, apparently due
		 * to the change in signal(2) semantics.  (The siginterrupt
		 * line, added later, should fix this problem.) John Stracke
		 * <francis@netscape.com> wrote:
		 *
		 * The problem seems to be that, after hitting the interval
		 * timer while talking to the server, the process no longer
		 * responds to SIGALRM.  I put in printf()s to see when it
		 * reached the pause() for the poll interval, and I checked
		 * the return from setitimer(), and everything seemed to be
		 * working fine, except that the pause() just ignored SIGALRM.
		 * I thought maybe the itimer wasn't being fired, so I hit
		 * it with a SIGALRM from the command line, and it ignored
		 * that, too.  SIGUSR1 woke it up just fine, and it proceeded
		 * to repoll--but, when the dummy server didn't respond, it
		 * never timed out, and SIGALRM wouldn't make it.
		 *
		 * (continued below...)
		 */
		struct itimerval ntimeout;

		ntimeout.it_interval.tv_sec = ntimeout.it_interval.tv_usec = 0;
		ntimeout.it_value.tv_sec  = poll_interval;
		ntimeout.it_value.tv_usec = 0;

		siginterrupt(SIGALRM, 1);
		alarm_latch = FALSE;
		signal(SIGALRM, gotsigalrm);	/* first trap signals */
		setitimer(ITIMER_REAL,&ntimeout,NULL);	/* then start timer */
		/* there is a very small window between the next two lines */
		if (!alarm_latch)
		    pause();
		signal(SIGALRM, SIG_IGN);
#else
		/* 
		 * So the workaround I used is to make it sleep by using
		 * select() instead of setitimer()/pause().  select() is
		 * perfectly happy being called with a timeout and
		 * no file descriptors; it just sleeps until it hits the
		 * timeout.  The only concern I had was that it might
		 * implement its timeout with SIGALRM--there are some
		 * Unices where this is done, because select() is a library
		 * function--but apparently not.
		 */
                struct timeval timeout;

                timeout.tv_sec = run.poll_interval;
                timeout.tv_usec = 0;
		lastsig = 0;
                select(0,0,0,0, &timeout);
#endif
#else /* EMX */
		alarm_latch = FALSE;
		signal(SIGALRM, gotsigalrm);
		_beginthread(itimerthread, NULL, 32768, NULL);
		/* see similar code above */
		if (!alarm_latch)
		    pause();
		signal(SIGALRM, SIG_IGN);
#endif /* ! EMX */
		if (lastsig == SIGUSR1
			|| ((run.poll_interval && !getuid()) && lastsig == SIGHUP))
		{
#ifdef SYS_SIGLIST_DECLARED
		    error(0, 0, "awakened by %s", sys_siglist[lastsig]);
#else
		    error(0, 0, "awakened by signal %d", lastsig);
#endif
		}
	    }

	    /* now lock out interrupts again */
	    signal(SIGUSR1, SIG_IGN);
	    if (!getuid())
		signal(SIGHUP, SIG_IGN);

	    if (outlevel == O_VERBOSE)
	    {
		time_t	now;

		time(&now);
		fprintf(stderr, "fetchmail: awakened at %s", ctime(&now));
	    }
	}
    } while
	(run.poll_interval);

    if (outlevel == O_VERBOSE)
	fprintf(stderr,"fetchmail: normal termination, status %d\n",
		successes ? PS_SUCCESS : querystatus);

    termhook(0);
    exit(successes ? PS_SUCCESS : querystatus);
}

static void optmerge(struct query *h2, struct query *h1, int force)
/* merge two options records */
{
    /*
     * If force is off, modify h2 fields only when they're empty (treat h1
     * as defaults).  If force is on, modify each h2 field whenever h1
     * is nonempty (treat h1 as an override).  
     */

    if (!force)
    {
	append_str_list(&h2->server.localdomains, &h1->server.localdomains);
	append_str_list(&h2->localnames, &h1->localnames);
	append_str_list(&h2->mailboxes, &h1->mailboxes);
	append_str_list(&h2->smtphunt, &h1->smtphunt);
    }

#define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
    FLAG_MERGE(server.via);
    FLAG_MERGE(server.protocol);
#if INET6
    FLAG_MERGE(server.service);
    FLAG_MERGE(server.netsec);
#else /* INET6 */
    FLAG_MERGE(server.port);
#endif /* INET6 */
    FLAG_MERGE(server.interval);
    FLAG_MERGE(server.preauthenticate);
    FLAG_MERGE(server.timeout);
    FLAG_MERGE(server.envelope);
    FLAG_MERGE(server.envskip);
    FLAG_MERGE(server.qvirtual);
    FLAG_MERGE(server.skip);
    FLAG_MERGE(server.dns);
    FLAG_MERGE(server.uidl);

#ifdef linux
    FLAG_MERGE(server.interface);
    FLAG_MERGE(server.monitor);
    FLAG_MERGE(server.interface_pair);
#endif /* linux */

    FLAG_MERGE(remotename);
    FLAG_MERGE(password);
    FLAG_MERGE(mda);
    FLAG_MERGE(smtpaddress);
    FLAG_MERGE(antispam);
    FLAG_MERGE(preconnect);

    FLAG_MERGE(keep);
    FLAG_MERGE(flush);
    FLAG_MERGE(fetchall);
    FLAG_MERGE(rewrite);
    FLAG_MERGE(forcecr);
    FLAG_MERGE(stripcr);
    FLAG_MERGE(pass8bits);
    FLAG_MERGE(dropstatus);
    FLAG_MERGE(mimedecode);
    FLAG_MERGE(limit);
    FLAG_MERGE(fetchlimit);
    FLAG_MERGE(batchlimit);
    FLAG_MERGE(expunge);
#undef FLAG_MERGE
}

static int load_params(int argc, char **argv, int optind)
{
    int	implicitmode, st;
    struct passwd *pw;
    struct query def_opts, *ctl;

    memset(&def_opts, '\0', sizeof(struct query));
    def_opts.smtp_socket = -1;
    def_opts.smtpaddress = (char *)0;
    def_opts.antispam = 571;

    def_opts.server.protocol = P_AUTO;
    def_opts.server.timeout = CLIENT_TIMEOUT;
    def_opts.remotename = user;
    def_opts.expunge = 1;

    /* this builds the host list */
    if (prc_parse_file(rcfile, !versioninfo) != 0)
	exit(PS_SYNTAX);

    if ((implicitmode = (optind >= argc)))
    {
	for (ctl = querylist; ctl; ctl = ctl->next)
	    ctl->active = TRUE;
    }
    else
	for (; optind < argc; optind++) 
	{
	    flag	predeclared =  FALSE;

	    /*
	     * If hostname corresponds to a host known from the rc file,
	     * simply declare it active.  Otherwise synthesize a host
	     * record from command line and defaults
	     */
	    for (ctl = querylist; ctl; ctl = ctl->next)
		if (!strcmp(ctl->server.pollname, argv[optind])
			|| str_in_list(&ctl->server.akalist, argv[optind], TRUE))
		{
		    ctl->active = TRUE;
		    predeclared = TRUE;
		}

	    if (!predeclared)
	    {
		/*
		 * Allocate and link record without copying in
		 * command-line args; we'll do that with the optmerge
		 * call later on.
		 */
		ctl = hostalloc((struct query *)NULL);
		ctl->server.via =
		    ctl->server.pollname = xstrdup(argv[optind]);
	    }
	}

    /*
     * If there's a defaults record, merge it and lose it.
     */ 
    if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
    {
	for (ctl = querylist->next; ctl; ctl = ctl->next)
	    optmerge(ctl, querylist, FALSE);
	querylist = querylist->next;
    }

    /* don't allow a defaults record after the first */
    for (ctl = querylist; ctl; ctl = ctl->next)
	if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0)
	    exit(PS_SYNTAX);

    /* merge in wired defaults, do sanity checks and prepare internal fields */
    for (ctl = querylist; ctl; ctl = ctl->next)
    {
	if (configdump || (ctl->active && !(implicitmode && ctl->server.skip)))
	{
	    /* merge in defaults */
	    optmerge(ctl, &def_opts, FALSE);

	    /* force command-line options */
	    optmerge(ctl, &cmd_opts, TRUE);

	    /* make sure we have a nonempty host list to forward to */
	    if (!ctl->smtphunt)
	    {
		save_str(&ctl->smtphunt, fetchmailhost, FALSE);
		/* for non ETRN try to deliver mails to localhost if
		 * fetchmailhost fails
		 */
		if (ctl->server.protocol != P_ETRN) {
		    save_str(&ctl->smtphunt, "localhost", FALSE);
		}
	    }

	    /* keep lusers from shooting themselves in the foot :-) */
	    if (run.poll_interval && ctl->limit)
	    {
		fprintf(stderr,"fetchmail: you'd never see large messages!\n");
		exit(PS_SYNTAX);
	    }

	    /* if `user' doesn't name a real local user, try to run as root */
	    if ((pw = getpwnam(user)) == (struct passwd *)NULL)
		ctl->uid = 0;
            else
		ctl->uid = pw->pw_uid;	/* for local delivery via MDA */
	    if (!ctl->localnames)	/* for local delivery via SMTP */
		save_str_pair(&ctl->localnames, user, NULL);

	    /* this code enables flags to be turned off */
#define DEFAULT(flag, dflt)	if (flag == FLAG_TRUE)\
	    				flag = TRUE;\
				else if (flag == FLAG_FALSE)\
					flag = FALSE;\
				else\
					flag = (dflt)
	    DEFAULT(ctl->keep, FALSE);
	    DEFAULT(ctl->fetchall, FALSE);
	    DEFAULT(ctl->flush, FALSE);
	    DEFAULT(ctl->rewrite, TRUE);
	    DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL)); 
	    DEFAULT(ctl->forcecr, FALSE);
	    DEFAULT(ctl->pass8bits, FALSE);
	    DEFAULT(ctl->dropstatus, FALSE);
	    DEFAULT(ctl->mimedecode, FALSE);
	    DEFAULT(ctl->server.dns, TRUE);
	    DEFAULT(ctl->server.uidl, FALSE);
#undef DEFAULT

#if !defined(HAVE_GETHOSTBYNAME) || !defined(HAVE_RES_SEARCH)
	    /* can't handle multidrop mailboxes unless we can do DNS lookups */
	    if (ctl->localnames && ctl->localnames->next && ctl->server.dns)
	    {
		ctl->server.dns = FALSE;
		fprintf(stderr, "fetchmail: warning: no DNS available to check multidrop fetches from %s\n", ctl->server.pollname);
	    }
#endif /* !HAVE_GETHOSTBYNAME || !HAVE_RES_SEARCH */

	    /*
	     *
	     * Compute the true name of the mailserver host.  
	     * There are two clashing cases here:
	     *
	     * (1) The poll name is a label, possibly on one of several
	     *     poll configurations for the same host.  In this case 
	     *     the `via' option will be present and give the true name.
	     *
	     * (2) The poll name is the true one, the via name is 
	     *     localhost.   This is going to be typical for ssh-using
	     *     configurations.
	     *
	     * We're going to assume the via name is true unless it's
	     * localhost.
	     *
	     * Each poll cycle, if we've got DNS, we'll try to canonicalize
	     * the name.  This will function as a probe to ensure the
	     * host's nameserver is up.
	     */
	    if (ctl->server.via && strcmp(ctl->server.via, "localhost"))
		ctl->server.queryname = xstrdup(ctl->server.via);
	    else
		ctl->server.queryname = xstrdup(ctl->server.pollname);
	    ctl->server.truename = xstrdup(ctl->server.queryname);

	    /* if no folders were specified, set up the null one as default */
	    if (!ctl->mailboxes)
		save_str(&ctl->mailboxes, (char *)NULL, 0);

	    /* maybe user overrode timeout on command line? */
	    if (ctl->server.timeout == -1)	
		ctl->server.timeout = CLIENT_TIMEOUT;

#if !INET6
	    /* sanity checks */
	    if (ctl->server.port < 0)
	    {
		(void) fprintf(stderr,
			       "%s configuration invalid, port number cannot be negative",
			       ctl->server.pollname);
		exit(PS_SYNTAX);
	    }
	    if (ctl->server.protocol == P_RPOP && ctl->server.port >= 1024)
	    {
		(void) fprintf(stderr,
			       "%s configuration invalid, RPOP requires a privileged port",
			       ctl->server.pollname);
		exit(PS_SYNTAX);
	    }
#endif /* !INET6 */
	}
    }

    /* here's where we override globals */
    if (cmd_run.logfile)
	run.logfile = cmd_run.logfile;
    if (cmd_run.idfile)
	run.idfile = cmd_run.idfile;
    if (cmd_run.poll_interval >= 0)
	run.poll_interval = cmd_run.poll_interval;
    if (cmd_run.invisible)
	run.invisible = cmd_run.invisible;
    if (cmd_run.use_syslog)
	run.use_syslog = cmd_run.use_syslog;

    /* check and daemon options are not compatible */
    if (check_only && run.poll_interval)
	run.poll_interval = 0;

#ifdef POP3_ENABLE
    /* initialize UID handling */
    if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
	exit(st);
    else
	initialize_saved_lists(querylist, run.idfile);
#endif /* POP3_ENABLE */

    return(implicitmode);
}

void termhook(int sig)
/* to be executed on normal or signal-induced termination */
{
    struct query	*ctl;

    /*
     * Sending SMTP QUIT on signal is theoretically nice, but led to a 
     * subtle bug.  If fetchmail was terminated by signal while it was 
     * shipping message text, it would hang forever waiting for a
     * command acknowledge.  In theory we could enable the QUIT
     * only outside of the message send.  In practice, we don't
     * care.  All mailservers hang up on a dropped TCP/IP connection
     * anyway.
     */

    if (sig != 0)
        error(0, 0, "terminated with signal %d", sig);
    else
	/* terminate all SMTP connections cleanly */
	for (ctl = querylist; ctl; ctl = ctl->next)
	    if (ctl->smtp_socket != -1)
		SMTP_quit(ctl->smtp_socket);

#ifdef POP3_ENABLE
    if (!check_only)
	write_saved_lists(querylist, run.idfile);
#endif /* POP3_ENABLE */

    /* 
     * Craig Metz, the RFC1938 one-time-password guy, points out:
     * "Remember that most kernels don't zero pages before handing them to the
     * next process and many kernels share pages between user and kernel space.
     * You'd be very surprised what you can find from a short program to do a
     * malloc() and then dump the contents of the pages you got. By zeroing
     * the secrets at end of run (earlier if you can), you make sure the next
     * guy can't get the password/pass phrase."
     *
     * Right you are, Craig!
     */
    for (ctl = querylist; ctl; ctl = ctl->next)
	if (ctl->password)
	  memset(ctl->password, '\0', strlen(ctl->password));

#if !defined(HAVE_ATEXIT) && !defined(HAVE_ON_EXIT)
    unlockit();
#endif

    exit(successes ? PS_SUCCESS : querystatus);
}

/*
 * Sequence of protocols to try when autoprobing, most capable to least.
 */
static const int autoprobe[] = 
{
#ifdef IMAP_ENABLE
    P_IMAP,
#endif /* IMAP_ENABLE */
#ifdef POP3_ENABLE
    P_POP3,
#endif /* POP3_ENABLE */
#ifdef POP2_ENABLE
    P_POP2
#endif /* POP2_ENABLE */
};

static int query_host(struct query *ctl)
/* perform fetch transaction with single host */
{
    int i, st;

    if (outlevel == O_VERBOSE)
    {
	time_t now;

	time(&now);
	fprintf(stderr, "fetchmail: %s querying %s (protocol %s) at %s",
	    RELEASE_ID,
	    ctl->server.pollname, showproto(ctl->server.protocol), ctime(&now));
    }
    switch (ctl->server.protocol) {
    case P_AUTO:
	for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
	{
	    ctl->server.protocol = autoprobe[i];
	    if ((st = query_host(ctl)) == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP)
		break;
	}
	ctl->server.protocol = P_AUTO;
	return(st);
	break;
    case P_POP2:
#ifdef POP2_ENABLE
	return(doPOP2(ctl));
#else
	fprintf(stderr, "POP2 support is not configured.\n");
	return(PS_PROTOCOL);
#endif /* POP2_ENABLE */
	break;
    case P_POP3:
    case P_APOP:
    case P_RPOP:
#ifdef POP3_ENABLE
	return(doPOP3(ctl));
#else
	fprintf(stderr, "POP3 support is not configured.\n");
	return(PS_PROTOCOL);
#endif /* POP3_ENABLE */
	break;
    case P_IMAP:
    case P_IMAP_K4:
#ifdef GSSAPI
    case P_IMAP_GSS:
#endif /* GSSAPI */
#ifdef IMAP_ENABLE
	return(doIMAP(ctl));
#else
	fprintf(stderr, "IMAP support is not configured.\n");
	return(PS_PROTOCOL);
#endif /* IMAP_ENABLE */
	break;
    case P_ETRN:
#ifndef ETRN_ENABLE
	fprintf(stderr, "ETRN support is not configured.\n");
	return(PS_PROTOCOL);
#else
#ifdef HAVE_GETHOSTBYNAME
	return(doETRN(ctl));
#else
	fprintf(stderr, "Cannot support ETRN without gethostbyname(2).\n");
	return(PS_PROTOCOL);
#endif /* HAVE_GETHOSTBYNAME */
#endif /* ETRN_ENABLE */
    default:
	error(0, 0, "unsupported protocol selected.");
	return(PS_PROTOCOL);
    }
}

void dump_params (struct runctl *runp, struct query *querylist, flag implicit)
/* display query parameters in English */
{
    struct query *ctl;

    if (runp->poll_interval)
	printf("Poll interval is %d seconds\n", runp->poll_interval);
    if (runp->logfile)
	printf("Logfile is %s\n", runp->logfile);
    if (strcmp(runp->idfile, IDFILE_NAME))
	printf("Idfile is %s\n", runp->idfile);
#if defined(HAVE_SYSLOG)
    if (runp->use_syslog)
	printf("Progress messages will be logged via syslog\n");
#endif
    if (runp->invisible)
	printf("Fetchmail will masquerade and will not generate Received\n");

    for (ctl = querylist; ctl; ctl = ctl->next)
    {
	if (!ctl->active || (implicit && ctl->server.skip))
	    continue;

	printf("Options for retrieving from %s@%s:\n",
	       ctl->remotename, visbuf(ctl->server.pollname));

	if (ctl->server.via && (ctl->server.protocol != P_ETRN))
	    printf("  Mail will be retrieved via %s\n", ctl->server.via);

	if (ctl->server.interval)
	    printf("  Poll of this server will occur every %d intervals.\n",
		   ctl->server.interval);
	if (ctl->server.truename)
	    printf("  True name of server is %s.\n", ctl->server.truename);
	if (ctl->server.skip || outlevel == O_VERBOSE)
	    printf("  This host will%s be queried when no host is specified.\n",
		   ctl->server.skip ? " not" : "");
	/* don't poll for password when there is one or when using the ETRN
	** protocol */
	if (!ctl->password && (ctl->server.protocol != P_ETRN))
	    printf("  Password will be prompted for.\n");
	else if (outlevel == O_VERBOSE)
	    if (ctl->server.protocol == P_APOP)
		printf("  APOP secret = '%s'.\n", visbuf(ctl->password));
	    else if (ctl->server.protocol == P_RPOP)
		printf("  RPOP id = '%s'.\n", visbuf(ctl->password));
	    else
		printf("  Password = '%s'.\n", visbuf(ctl->password));
	if (ctl->server.protocol == P_POP3 
#if INET6
	    && !strcmp(ctl->server.service, KPOP_PORT)
#else /* INET6 */
	    && ctl->server.port == KPOP_PORT
#endif /* INET6 */
	    && (ctl->server.preauthenticate == A_KERBEROS_V4 ||
		ctl->server.preauthenticate == A_KERBEROS_V5))
	    printf("  Protocol is KPOP");
	else
	    printf("  Protocol is %s", showproto(ctl->server.protocol));
#if INET6
	if (ctl->server.service)
	    printf(" (using service %s)", ctl->server.service);
	if (ctl->server.netsec)
	    printf(" (using network security options %s)", ctl->server.netsec);
#else /* INET6 */
	if (ctl->server.port)
	    printf(" (using port %d)", ctl->server.port);
#endif /* INET6 */
	else if (outlevel == O_VERBOSE)
	    printf(" (using default port)");
	if (ctl->server.uidl && (ctl->server.protocol != P_ETRN))
	    printf(" (forcing UIDL use)");
	putchar('.');
	putchar('\n');
	if (ctl->server.preauthenticate == A_KERBEROS_V4)
	    printf("  Kerberos V4 preauthentication enabled.\n");
	if (ctl->server.preauthenticate == A_KERBEROS_V5)
	    printf("  Kerberos V5 preauthentication enabled.\n");
	if (ctl->server.timeout > 0)
	    printf("  Server nonresponse timeout is %d seconds", ctl->server.timeout);
	if (ctl->server.timeout ==  CLIENT_TIMEOUT)
	    printf(" (default).\n");
	else
	    printf(".\n");

	if (ctl->server.protocol != P_ETRN) {
		if (!ctl->mailboxes->id)
		    printf("  Default mailbox selected.\n");
		else
		{
		    struct idlist *idp;

		    printf("  Selected mailboxes are:");
		    for (idp = ctl->mailboxes; idp; idp = idp->next)
			printf(" %s", idp->id);
		    printf("\n");
		}
		printf("  %s messages will be retrieved (--all %s).\n",
		       ctl->fetchall ? "All" : "Only new",
		       ctl->fetchall ? "on" : "off");
		printf("  Fetched messages will%s be kept on the server (--keep %s).\n",
		       ctl->keep ? "" : " not",
		       ctl->keep ? "on" : "off");
		printf("  Old messages will%s be flushed before message retrieval (--flush %s).\n",
		       ctl->flush ? "" : " not",
		       ctl->flush ? "on" : "off");
		printf("  Rewrite of server-local addresses is %sabled (--norewrite %s).\n",
		       ctl->rewrite ? "en" : "dis",
		       ctl->rewrite ? "off" : "on");
		printf("  Carriage-return stripping is %sabled (stripcr %s).\n",
		       ctl->stripcr ? "en" : "dis",
		       ctl->stripcr ? "on" : "off");
		printf("  Carriage-return forcing is %sabled (forcecr %s).\n",
		       ctl->forcecr ? "en" : "dis",
		       ctl->forcecr ? "on" : "off");
		printf("  Interpretation of Content-Transfer-Encoding is %sabled (pass8bits %s).\n",
		       ctl->pass8bits ? "dis" : "en",
		       ctl->pass8bits ? "on" : "off");
		printf("  MIME decoding is %sabled (mimedecode %s).\n",
		       ctl->mimedecode ? "en" : "dis",
		       ctl->mimedecode ? "on" : "off");
		printf("  Nonempty Status lines will be %s (dropstatus %s)\n",
		       ctl->dropstatus ? "discarded" : "kept",
		       ctl->dropstatus ? "on" : "off");
		if (NUM_NONZERO(ctl->limit))
		    printf("  Message size limit is %d bytes (--limit %d).\n", 
			   ctl->limit, ctl->limit);
		else if (outlevel == O_VERBOSE)
		    printf("  No message size limit (--limit 0).\n");
		if (NUM_NONZERO(ctl->fetchlimit))
		    printf("  Received-message limit is %d (--fetchlimit %d).\n",
			   ctl->fetchlimit, ctl->fetchlimit);
		else if (outlevel == O_VERBOSE)
		    printf("  No received-message limit (--fetchlimit 0).\n");
		if (NUM_NONZERO(ctl->batchlimit))
		    printf("  SMTP message batch limit is %d.\n", ctl->batchlimit);
		else if (outlevel == O_VERBOSE)
		    printf("  No SMTP message batch limit (--batchlimit 0).\n");
		if (ctl->server.protocol == P_IMAP)
		    if (NUM_NONZERO(ctl->expunge))
			printf("  Deletion interval between expunges is %d (--expunge %d).\n", ctl->expunge, ctl->expunge);
		    else if (outlevel == O_VERBOSE)
			printf("  No expunges (--expunge 0).\n");
	}
	if (ctl->mda && (ctl->server.protocol != P_ETRN))
	    printf("  Messages will be delivered with '%s.'\n", visbuf(ctl->mda));
	else
	{
	    struct idlist *idp;

	    printf("  Messages will be SMTP-forwarded to:");
	    for (idp = ctl->smtphunt; idp; idp = idp->next)
	    {
                printf(" %s", idp->id);
		if (!idp->val.status.mark)
		    printf(" (default)");
	    }
	    printf("\n");
	    if (ctl->smtpaddress)
		printf("  Host part of MAIL FROM line will be %s\n",
		       ctl->smtpaddress);
	}
	if (ctl->server.protocol != P_ETRN) {
		if (ctl->antispam != -1)
		    printf("  Listener SMTP reponse %d will be treated as a spam block\n",
			   ctl->antispam);
		else if (outlevel == O_VERBOSE)
		    printf("  Spam-blocking disabled\n");
	}
	if (ctl->preconnect)
	    printf("  Server connection will be brought up with '%s.'\n",
		   visbuf(ctl->preconnect));
	else if (outlevel == O_VERBOSE)
	    printf("  No pre-connection command.\n");
	if (ctl->postconnect)
	    printf("  Server connection will be taken down with '%s.'\n",
		   visbuf(ctl->postconnect));
	else if (outlevel == O_VERBOSE)
	    printf("  No post-connection command.\n");
	if (ctl->server.protocol != P_ETRN) {
		if (!ctl->localnames)
		    printf("  No localnames declared for this host.\n");
		else
		{
		    struct idlist *idp;
		    int count = 0;

		    for (idp = ctl->localnames; idp; idp = idp->next)
			++count;

		    if (count > 1 || ctl->wildcard)
			printf("  Multi-drop mode: ");
		    else
			printf("  Single-drop mode: ");

		    printf("%d local name(s) recognized.\n", count);
		    if (outlevel == O_VERBOSE)
		    {
			for (idp = ctl->localnames; idp; idp = idp->next)
			    if (idp->val.id2)
				printf("\t%s -> %s\n", idp->id, idp->val.id2);
			    else
				printf("\t%s\n", idp->id);
			if (ctl->wildcard)
			    fputs("*\n", stdout);
		    }

		    if (count > 1 || ctl->wildcard)
		    {
			printf("  DNS lookup for multidrop addresses is %sabled.\n",
			       ctl->server.dns ? "en" : "dis");

			if (ctl->server.envelope == STRING_DISABLED)
			    printf("  Envelope-address routing is disabled\n");
			else
			{
			    printf("  Envelope header is assumed to be: %s\n",
				   ctl->server.envelope ? ctl->server.envelope:"Received");
			    if (ctl->server.envskip > 1 || outlevel >= O_VERBOSE)
				printf("  Number of envelope header to be parsed: %d\n",
				       ctl->server.envskip);
			    if (ctl->server.qvirtual)
				printf("  Prefix %s will be removed from user id\n",
				       ctl->server.qvirtual);
			    else if (outlevel >= O_VERBOSE) 
				printf("  No prefix stripping\n");
			}

			if (ctl->server.akalist)
			{
			    struct idlist *idp;

			    printf("  Predeclared mailserver aliases:");
			    for (idp = ctl->server.akalist; idp; idp = idp->next)
				printf(" %s", idp->id);
			    putchar('\n');
			}
			if (ctl->server.localdomains)
			{
			    struct idlist *idp;

			    printf("  Local domains:");
			    for (idp = ctl->server.localdomains; idp; idp = idp->next)
				printf(" %s", idp->id);
			    putchar('\n');
			}
		    }
		}
	}
#ifdef	linux
	if (ctl->server.interface)
	    printf("  Connection must be through interface %s.\n", ctl->server.interface);
	else if (outlevel == O_VERBOSE)
	    printf("  No interface requirement specified.\n");
	if (ctl->server.monitor)
	    printf("  Polling loop will monitor %s.\n", ctl->server.monitor);
	else if (outlevel == O_VERBOSE)
	    printf("  No monitor interface specified.\n");
#endif

	if (ctl->server.protocol > P_POP2 && (ctl->server.protocol != P_ETRN))
	    if (!ctl->oldsaved)
		printf("  No UIDs saved from this host.\n");
	    else
	    {
		struct idlist *idp;
		int count = 0;

		for (idp = ctl->oldsaved; idp; idp = idp->next)
		    ++count;

		printf("  %d UIDs saved.\n", count);
		if (outlevel == O_VERBOSE)
		    for (idp = ctl->oldsaved; idp; idp = idp->next)
			fprintf(stderr, "\t%s\n", idp->id);
	    }
    }
}

/* fetchmail.c ends here */