1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
|
/*
* sink.c -- forwarding/delivery support for fetchmail
*
* The interface of this module (open_sink(), stuff_line(), close_sink(),
* release_sink()) seals off the delivery logic from the protocol machine,
* so the latter won't have to care whether it's shipping to an SMTP
* listener daemon or an MDA pipe.
*
* Copyright 1998 by Eric S. Raymond
* For license terms, see the file COPYING in this directory.
*/
#include "config.h"
#include <stdio.h>
#include <errno.h>
#include <string.h>
#include <signal.h>
#ifdef HAVE_MEMORY_H
#include <memory.h>
#endif /* HAVE_MEMORY_H */
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#if defined(HAVE_ALLOCA_H)
#include <alloca.h>
#else
#ifdef _AIX
#pragma alloca
#endif
#endif
#include "fetchmail.h"
#include "socket.h"
#include "smtp.h"
/* BSD portability hack...I know, this is an ugly place to put it */
#if !defined(SIGCHLD) && defined(SIGCLD)
#define SIGCHLD SIGCLD
#endif
#if INET6
#define SMTP_PORT "smtp" /* standard SMTP service port */
#else /* INET6 */
#define SMTP_PORT 25 /* standard SMTP service port */
#endif /* INET6 */
static int smtp_open(struct query *ctl)
/* try to open a socket to the appropriate SMTP server for this query */
{
/* maybe it's time to close the socket in order to force delivery */
if (NUM_NONZERO(ctl->batchlimit) && (ctl->smtp_socket != -1) && batchcount++ == ctl->batchlimit)
{
close(ctl->smtp_socket);
ctl->smtp_socket = -1;
batchcount = 0;
}
/* if no socket to any SMTP host is already set up, try to open one */
if (ctl->smtp_socket == -1)
{
/*
* RFC 1123 requires that the domain name in HELO address is a
* "valid principal domain name" for the client host. If we're
* running in invisible mode, violate this with malice
* aforethought in order to make the Received headers and
* logging look right.
*
* In fact this code relies on the RFC1123 requirement that the
* SMTP listener must accept messages even if verification of the
* HELO name fails (RFC1123 section 5.2.5, paragraph 2).
*
* How we compute the true mailhost name to pass to the
* listener doesn't affect behavior on RFC1123- violating
* listeners that check for name match; we're going to lose
* on those anyway because we can never give them a name
* that matches the local machine fetchmail is running on.
* What it will affect is the listener's logging.
*/
struct idlist *idp;
char *id_me = run.invisible ? ctl->server.truename : fetchmailhost;
int oldphase = phase;
errno = 0;
/*
* Run down the SMTP hunt list looking for a server that's up.
* Use both explicit hunt entries (value TRUE) and implicit
* (default) ones (value FALSE).
*/
oldphase = phase;
phase = LISTENER_WAIT;
set_timeout(ctl->server.timeout);
for (idp = ctl->smtphunt; idp; idp = idp->next)
{
char *cp, *parsed_host = alloca(strlen(idp->id) + 1);
#ifdef INET6
char *portnum = SMTP_PORT;
#else
int portnum = SMTP_PORT;
#endif /* INET6 */
ctl->smtphost = idp->id; /* remember last host tried. */
strcpy(parsed_host, idp->id);
if ((cp = strrchr(parsed_host, '/')))
{
*cp++ = 0;
#ifdef INET6
portnum = cp;
#else
portnum = atoi(cp);
#endif /* INET6 */
}
if ((ctl->smtp_socket = SockOpen(parsed_host,portnum,NULL)) == -1)
continue;
/* first, probe for ESMTP */
if (SMTP_ok(ctl->smtp_socket) == SM_OK &&
SMTP_ehlo(ctl->smtp_socket, id_me,
&ctl->server.esmtp_options) == SM_OK)
break; /* success */
/*
* RFC 1869 warns that some listeners hang up on a failed EHLO,
* so it's safest not to assume the socket will still be good.
*/
SockClose(ctl->smtp_socket);
ctl->smtp_socket = -1;
/* if opening for ESMTP failed, try SMTP */
if ((ctl->smtp_socket = SockOpen(parsed_host,portnum,NULL)) == -1)
continue;
if (SMTP_ok(ctl->smtp_socket) == SM_OK &&
SMTP_helo(ctl->smtp_socket, id_me) == SM_OK)
break; /* success */
SockClose(ctl->smtp_socket);
ctl->smtp_socket = -1;
}
set_timeout(0);
phase = oldphase;
}
/*
* RFC 1123 requires that the domain name part of the
* RCPT TO address be "canonicalized", that is a FQDN
* or MX but not a CNAME. Some listeners (like exim)
* enforce this. Now that we have the actual hostname,
* compute what we should canonicalize with.
*/
ctl->destaddr = ctl->smtpaddress ? ctl->smtpaddress : ( ctl->smtphost ? ctl->smtphost : "localhost");
if (outlevel >= O_VERBOSE && ctl->smtp_socket != -1)
error(0, 0, "forwarding to %s", ctl->smtphost);
return(ctl->smtp_socket);
}
/* these are shared by open_sink and stuffline */
static FILE *sinkfp;
static RETSIGTYPE (*sigchld)();
int stuffline(struct query *ctl, char *buf)
/* ship a line to the given control block's output sink (SMTP server or MDA) */
{
int n, oldphase;
char *last;
/* The line may contain NUL characters. Find the last char to use
* -- the real line termination is the sequence "\n\0".
*/
last = buf;
while ((last += strlen(last)) && (last[-1] != '\n'))
last++;
/* fix message lines that have only \n termination (for qmail) */
if (ctl->forcecr)
{
if (last - 1 == buf || last[-2] != '\r')
{
last[-1] = '\r';
*last++ = '\n';
*last = '\0';
}
}
oldphase = phase;
phase = FORWARDING_WAIT;
/*
* SMTP byte-stuffing. We only do this if the protocol does *not*
* use .<CR><LF> as EOM. If it does, the server will already have
* decorated any . lines it sends back up.
*/
if (*buf == '.')
if (ctl->server.base_protocol->delimited) /* server has already byte-stuffed */
{
if (ctl->mda)
++buf;
else
/* writing to SMTP, leave the byte-stuffing in place */;
}
else /* if (!protocol->delimited) -- not byte-stuffed already */
{
if (!ctl->mda)
SockWrite(ctl->smtp_socket, buf, 1); /* byte-stuff it */
else
/* leave it alone */;
}
/* we may need to strip carriage returns */
if (ctl->stripcr)
{
char *sp, *tp;
for (sp = tp = buf; sp < last; sp++)
if (*sp != '\r')
*tp++ = *sp;
*tp = '\0';
last = tp;
}
n = 0;
if (ctl->mda)
n = fwrite(buf, 1, last - buf, sinkfp);
else if (ctl->smtp_socket != -1)
n = SockWrite(ctl->smtp_socket, buf, last - buf);
phase = oldphase;
return(n);
}
static void sanitize(char *s)
/* replace unsafe shellchars by an _ */
{
static char *ok_chars = " 1234567890!@%-_=+:,./abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
char *cp;
for (cp = s; *(cp += strspn(cp, ok_chars)); /* NO INCREMENT */)
*cp = '_';
}
int open_sink(struct query *ctl,
char *return_path,
struct idlist *xmit_names,
long reallen,
int *good_addresses, int *bad_addresses)
/* set up sinkfp to be an input sink we can ship a message to */
{
struct idlist *idp;
*bad_addresses = *good_addresses = 0;
if (ctl->mda) /* we have a declared MDA */
{
int length = 0, fromlen = 0, nameslen = 0;
char *names = NULL, *before, *after, *from = NULL;
ctl->destaddr = "localhost";
for (idp = xmit_names; idp; idp = idp->next)
if (idp->val.status.mark == XMIT_ACCEPT)
(*good_addresses)++;
length = strlen(ctl->mda);
before = xstrdup(ctl->mda);
/* get user addresses for %T (or %s for backward compatibility) */
if (strstr(before, "%s") || strstr(before, "%T"))
{
/*
* We go through this in order to be able to handle very
* long lists of users and (re)implement %s.
*/
nameslen = 0;
for (idp = xmit_names; idp; idp = idp->next)
if (idp->val.status.mark == XMIT_ACCEPT)
nameslen += (strlen(idp->id) + 1); /* string + ' ' */
if (*good_addresses = 0)
nameslen = strlen(run.postmaster);
names = (char *)xmalloc(nameslen + 1); /* account for '\0' */
if (*good_addresses == 0)
strcpy(names, run.postmaster);
else
{
names[0] = '\0';
for (idp = xmit_names; idp; idp = idp->next)
if (idp->val.status.mark == XMIT_ACCEPT)
{
strcat(names, idp->id);
strcat(names, " ");
}
names[--nameslen] = '\0'; /* chop trailing space */
}
/* sanitize names in order to contain only harmless shell chars */
sanitize(names);
}
/* get From address for %F */
if (strstr(before, "%F"))
{
from = xstrdup(return_path);
/* sanitize from in order to contain *only* harmless shell chars */
sanitize(from);
fromlen = strlen(from);
}
/* do we have to build an mda string? */
if (names || from)
{
char *sp, *dp;
/* find length of resulting mda string */
sp = before;
while (sp = strstr(sp, "%s")) {
length += nameslen - 2; /* subtract %s */
sp += 2;
}
sp = before;
while (sp = strstr(sp, "%T")) {
length += nameslen - 2; /* subtract %T */
sp += 2;
}
sp = before;
while (sp = strstr(sp, "%F")) {
length += fromlen - 2; /* subtract %F */
sp += 2;
}
after = xmalloc(length + 1);
/* copy mda source string to after, while expanding %[sTF] */
for (dp = after, sp = before; *dp = *sp; dp++, sp++) {
if (sp[0] != '%') continue;
/* need to expand? BTW, no here overflow, because in
** the worst case (end of string) sp[1] == '\0' */
if (sp[1] == 's' || sp[1] == 'T') {
strcpy(dp, names);
dp += nameslen;
sp++; /* position sp over [sT] */
dp--; /* adjust dp */
} else if (sp[1] == 'F') {
strcpy(dp, from);
dp += fromlen;
sp++; /* position sp over F */
dp--; /* adjust dp */
}
}
if (names) {
free(names);
names = NULL;
}
if (from) {
free(from);
from = NULL;
}
free(before);
before = after;
}
if (outlevel == O_VERBOSE)
error(0, 0, "about to deliver with: %s", before);
#ifdef HAVE_SETEUID
/*
* Arrange to run with user's permissions if we're root.
* This will initialize the ownership of any files the
* MDA creates properly. (The seteuid call is available
* under all BSDs and Linux)
*/
seteuid(ctl->uid);
#endif /* HAVE_SETEUID */
sinkfp = popen(before, "w");
free(before);
before = NULL;
#ifdef HAVE_SETEUID
/* this will fail quietly if we didn't start as root */
seteuid(0);
#endif /* HAVE_SETEUID */
if (!sinkfp)
{
error(0, 0, "MDA open failed");
return(PS_IOERR);
}
sigchld = signal(SIGCHLD, SIG_DFL);
}
else
{
char *ap, options[MSGBUFSIZE], addr[128];
/* build a connection to the SMTP listener */
if ((smtp_open(ctl) == -1))
{
error(0, errno, "SMTP connect to %s failed",
ctl->smtphost ? ctl->smtphost : "localhost");
return(PS_SMTP);
}
/*
* Compute ESMTP options.
*/
options[0] = '\0';
if (ctl->server.esmtp_options & ESMTP_8BITMIME) {
if (ctl->pass8bits || (ctl->mimemsg & MSG_IS_8BIT))
strcpy(options, " BODY=8BITMIME");
else if (ctl->mimemsg & MSG_IS_7BIT)
strcpy(options, " BODY=7BIT");
}
if ((ctl->server.esmtp_options & ESMTP_SIZE) && reallen > 0)
sprintf(options + strlen(options), " SIZE=%ld", reallen);
/*
* Try to get the SMTP listener to take the Return-Path
* address as MAIL FROM . If it won't, fall back on the
* calling-user ID. This won't affect replies, which use the
* header From address anyway.
*
* RFC 1123 requires that the domain name part of the
* MAIL FROM address be "canonicalized", that is a
* FQDN or MX but not a CNAME. We'll assume the From
* header is already in this form here (it certainly
* is if rewrite is on). RFC 1123 is silent on whether
* a nonexistent hostname part is considered canonical.
*
* This is a potential problem if the MTAs further upstream
* didn't pass canonicalized From/Return-Path lines, *and* the
* local SMTP listener insists on them.
*
* None of these error conditions generates bouncemail. Comments
* below explain for each case why this is so.
*/
ap = (return_path[0]) ? return_path : user;
if (SMTP_from(ctl->smtp_socket, ap, options) != SM_OK)
{
int smtperr = atoi(smtp_response);
if (str_find(&ctl->antispam, smtperr))
{
/*
* SMTP listener explicitly refuses to deliver mail
* coming from this address, probably due to an
* anti-spam domain exclusion. Respect this. Don't
* try to ship the message, and don't prevent it from
* being deleted. Typical values:
*
* 501 = exim's old antispam response
* 550 = exim's new antispam response (temporary)
* 553 = sendmail 8.8.7's generic REJECT
* 571 = sendmail's "unsolicited email refused"
*
* We don't send bouncemail on antispam failures because
* we don't want the scumbags to know the address is even
* valid.
*/
SMTP_rset(ctl->smtp_socket); /* required by RFC1870 */
return(PS_REFUSED);
}
/*
* Suppress error message only if the response specifically
* meant `excluded for policy reasons'. We *should* see
* an error when the return code is less specific.
*/
if (smtperr >= 400)
error(0, -1, "SMTP error: %s", smtp_response);
switch (smtperr)
{
case 452: /* insufficient system storage */
/*
* Temporary out-of-queue-space condition on the
* ESMTP server. Don't try to ship the message,
* and suppress deletion so it can be retried on
* a future retrieval cycle.
*
* Bouncemail *might* be appropriate here as a delay
* notification. But it's not really necessary because
* this is not an actual failure, we're very likely to be
* able to recover on the next cycle.
*/
SMTP_rset(ctl->smtp_socket); /* required by RFC1870 */
return(PS_TRANSIENT);
case 552: /* message exceeds fixed maximum message size */
case 553: /* invalid sending domain */
/*
* Permanent no-go condition on the
* ESMTP server. Don't try to ship the message,
* and allow it to be deleted.
*
* Bouncemail would be appropriate for 552, but in these
* latter days 553 usually means a spammer is trying to
* cover his tracks. We'd rather deny the scumbags any
* feedback that the address is valid.
*/
SMTP_rset(ctl->smtp_socket); /* required by RFC1870 */
return(PS_REFUSED);
default: /* retry with postmaster's address */
if (SMTP_from(ctl->smtp_socket,run.postmaster,options)!=SM_OK)
{
error(0, -1, "SMTP error: %s", smtp_response);
return(PS_SMTP); /* should never happen */
}
}
}
/*
* Now list the recipient addressees
*/
for (idp = xmit_names; idp; idp = idp->next)
if (idp->val.status.mark == XMIT_ACCEPT)
{
if (strchr(idp->id, '@'))
strcpy(addr, idp->id);
else
#ifdef HAVE_SNPRINTF
snprintf(addr, sizeof(addr)-1, "%s@%s", idp->id, ctl->destaddr);
#else
sprintf(addr, "%s@%s", idp->id, ctl->destaddr);
#endif /* HAVE_SNPRINTF */
if (SMTP_rcpt(ctl->smtp_socket, addr) == SM_OK)
(*good_addresses)++;
else
{
(*bad_addresses)++;
idp->val.status.mark = XMIT_ANTISPAM;
error(0, 0,
"SMTP listener doesn't like recipient address `%s'",
addr);
}
}
if (!(*good_addresses))
{
#ifdef HAVE_SNPRINTF
snprintf(addr, sizeof(addr)-1, "%s@%s", run.postmaster, ctl->destaddr);
#else
sprintf(addr, "%s@%s", run.postmaster, ctl->destaddr);
#endif /* HAVE_SNPRINTF */
if (SMTP_rcpt(ctl->smtp_socket, addr) != SM_OK)
{
error(0, 0, "can't even send to %s!", run.postmaster);
return(PS_SMTP);
}
}
/* tell it we're ready to send data */
SMTP_data(ctl->smtp_socket);
}
return(PS_SUCCESS);
}
void release_sink(struct query *ctl)
/* release the per-message output sink, whether it's a pipe or SMTP socket */
{
if (ctl->mda)
{
if (sinkfp)
{
pclose(sinkfp);
sinkfp = (FILE *)NULL;
}
signal(SIGCHLD, sigchld);
}
}
int close_sink(struct query *ctl, flag forward)
/* perform end-of-message actions on the current output sink */
{
if (ctl->mda)
{
int rc;
/* close the delivery pipe, we'll reopen before next message */
if (sinkfp)
{
rc = pclose(sinkfp);
sinkfp = (FILE *)NULL;
}
else
rc = 0;
signal(SIGCHLD, sigchld);
if (rc)
{
error(0, -1, "MDA exited abnormally or returned nonzero status");
return(FALSE);
}
}
else if (forward)
{
/* write message terminator */
if (SMTP_eom(ctl->smtp_socket) != SM_OK)
{
error(0, -1, "SMTP listener refused delivery");
return(FALSE);
}
}
return(TRUE);
}
/* sink.c ends here */
|