rev |
line source |
meillo@0
|
1 /* MasqMail
|
meillo@0
|
2 Copyright (C) 1999-2001 Oliver Kurth
|
meillo@76
|
3 Copyright (C) 2010 markus schnalke <meillo@marmaro.de>
|
meillo@0
|
4
|
meillo@0
|
5 This program is free software; you can redistribute it and/or modify
|
meillo@0
|
6 it under the terms of the GNU General Public License as published by
|
meillo@0
|
7 the Free Software Foundation; either version 2 of the License, or
|
meillo@0
|
8 (at your option) any later version.
|
meillo@0
|
9
|
meillo@0
|
10 This program is distributed in the hope that it will be useful,
|
meillo@0
|
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
|
meillo@0
|
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
meillo@0
|
13 GNU General Public License for more details.
|
meillo@0
|
14
|
meillo@0
|
15 You should have received a copy of the GNU General Public License
|
meillo@0
|
16 along with this program; if not, write to the Free Software
|
meillo@0
|
17 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
meillo@0
|
18 */
|
meillo@0
|
19
|
meillo@0
|
20 #include <stdio.h>
|
meillo@0
|
21 #include <errno.h>
|
meillo@0
|
22 #include <stdlib.h>
|
meillo@0
|
23 #include <string.h>
|
meillo@0
|
24 #include <unistd.h>
|
meillo@0
|
25 #include <sys/types.h>
|
meillo@0
|
26 #include <sys/socket.h>
|
meillo@0
|
27 #include <sys/time.h>
|
meillo@0
|
28 #include <netinet/in.h>
|
meillo@0
|
29 #include <netdb.h>
|
meillo@0
|
30 #include <syslog.h>
|
meillo@0
|
31 #include <signal.h>
|
meillo@0
|
32
|
meillo@0
|
33 #include <glib.h>
|
meillo@0
|
34
|
meillo@0
|
35 #include "masqmail.h"
|
meillo@0
|
36
|
meillo@192
|
37 /* mutually exclusive modes. Note that there is no 'queue daemon' mode.
|
meillo@192
|
38 It, as well as the distinction beween the two (non exclusive) daemon
|
meillo@192
|
39 (queue and listen) modes, is handled by flags.*/
|
meillo@10
|
40 typedef enum _mta_mode {
|
meillo@10
|
41 MODE_ACCEPT = 0, /* accept message on stdin */
|
meillo@10
|
42 MODE_DAEMON, /* run as daemon */
|
meillo@10
|
43 MODE_RUNQUEUE, /* single queue run, online or offline */
|
meillo@10
|
44 MODE_SMTP, /* accept SMTP on stdin */
|
meillo@10
|
45 MODE_LIST, /* list queue */
|
meillo@10
|
46 MODE_MCMD, /* do queue manipulation */
|
meillo@10
|
47 MODE_VERSION, /* show version */
|
meillo@10
|
48 MODE_BI, /* fake ;-) */
|
meillo@10
|
49 MODE_NONE /* to prevent default MODE_ACCEPT */
|
meillo@10
|
50 } mta_mode;
|
meillo@0
|
51
|
meillo@0
|
52 char *pidfile = NULL;
|
meillo@0
|
53 volatile int sigterm_in_progress = 0;
|
meillo@0
|
54
|
meillo@10
|
55 static void
|
meillo@10
|
56 sigterm_handler(int sig)
|
meillo@0
|
57 {
|
meillo@10
|
58 if (sigterm_in_progress)
|
meillo@10
|
59 raise(sig);
|
meillo@10
|
60 sigterm_in_progress = 1;
|
meillo@0
|
61
|
meillo@10
|
62 if (pidfile) {
|
meillo@10
|
63 uid_t uid;
|
meillo@10
|
64 uid = seteuid(0);
|
meillo@10
|
65 if (unlink(pidfile) != 0)
|
meillo@10
|
66 logwrite(LOG_WARNING, "could not delete pid file %s: %s\n", pidfile, strerror(errno));
|
meillo@10
|
67 seteuid(uid); /* we exit anyway after this, just to be sure */
|
meillo@10
|
68 }
|
meillo@0
|
69
|
meillo@10
|
70 signal(sig, SIG_DFL);
|
meillo@10
|
71 raise(sig);
|
meillo@0
|
72 }
|
meillo@0
|
73
|
meillo@10
|
74 #ifdef ENABLE_IDENT /* so far used for that only */
|
meillo@10
|
75 static gboolean
|
meillo@10
|
76 is_in_netlist(gchar * host, GList * netlist)
|
meillo@0
|
77 {
|
meillo@10
|
78 guint hostip = inet_addr(host);
|
meillo@10
|
79 struct in_addr addr;
|
meillo@0
|
80
|
meillo@10
|
81 addr.s_addr = hostip;
|
meillo@10
|
82 if (addr.s_addr != INADDR_NONE) {
|
meillo@10
|
83 GList *node;
|
meillo@10
|
84 foreach(netlist, node) {
|
meillo@10
|
85 struct in_addr *net = (struct in_addr *) (node->data);
|
meillo@10
|
86 if ((addr.s_addr & net->s_addr) == net->s_addr)
|
meillo@10
|
87 return TRUE;
|
meillo@10
|
88 }
|
meillo@10
|
89 }
|
meillo@10
|
90 return FALSE;
|
meillo@0
|
91 }
|
meillo@0
|
92 #endif
|
meillo@0
|
93
|
meillo@10
|
94 gchar*
|
meillo@10
|
95 get_optarg(char *argv[], gint argc, gint * argp, gint * pos)
|
meillo@0
|
96 {
|
meillo@10
|
97 if (argv[*argp][*pos])
|
meillo@10
|
98 return &(argv[*argp][*pos]);
|
meillo@10
|
99 else {
|
meillo@10
|
100 if (*argp + 1 < argc) {
|
meillo@10
|
101 if (argv[(*argp) + 1][0] != '-') {
|
meillo@10
|
102 (*argp)++;
|
meillo@10
|
103 *pos = 0;
|
meillo@10
|
104 return &(argv[*argp][*pos]);
|
meillo@10
|
105 }
|
meillo@10
|
106 }
|
meillo@10
|
107 }
|
meillo@10
|
108 return NULL;
|
meillo@0
|
109 }
|
meillo@0
|
110
|
meillo@10
|
111 gchar*
|
meillo@10
|
112 get_progname(gchar * arg0)
|
meillo@0
|
113 {
|
meillo@10
|
114 gchar *p = arg0 + strlen(arg0) - 1;
|
meillo@10
|
115 while (p > arg0) {
|
meillo@10
|
116 if (*p == '/')
|
meillo@10
|
117 return p + 1;
|
meillo@10
|
118 p--;
|
meillo@10
|
119 }
|
meillo@10
|
120 return p;
|
meillo@0
|
121 }
|
meillo@0
|
122
|
meillo@10
|
123 gboolean
|
meillo@10
|
124 write_pidfile(gchar * name)
|
meillo@0
|
125 {
|
meillo@10
|
126 FILE *fptr;
|
meillo@0
|
127
|
meillo@10
|
128 if ((fptr = fopen(name, "wt"))) {
|
meillo@10
|
129 fprintf(fptr, "%d\n", getpid());
|
meillo@10
|
130 fclose(fptr);
|
meillo@10
|
131 pidfile = strdup(name);
|
meillo@10
|
132 return TRUE;
|
meillo@10
|
133 }
|
meillo@10
|
134 logwrite(LOG_WARNING, "could not write pid file: %s\n", strerror(errno));
|
meillo@10
|
135 return FALSE;
|
meillo@10
|
136 }
|
meillo@0
|
137
|
meillo@10
|
138 static void
|
meillo@10
|
139 mode_daemon(gboolean do_listen, gint queue_interval, char *argv[])
|
meillo@10
|
140 {
|
meillo@10
|
141 guint pid;
|
meillo@0
|
142
|
meillo@10
|
143 /* daemon */
|
meillo@10
|
144 if (!conf.run_as_user) {
|
meillo@10
|
145 if ((conf.orig_uid != 0) && (conf.orig_uid != conf.mail_uid)) {
|
meillo@10
|
146 fprintf(stderr, "must be root or %s for daemon.\n", DEF_MAIL_USER);
|
meillo@10
|
147 exit(EXIT_FAILURE);
|
meillo@10
|
148 }
|
meillo@10
|
149 }
|
meillo@0
|
150
|
meillo@74
|
151 /* reparent to init only if init is not already the parent */
|
meillo@74
|
152 if (getppid() != 1) {
|
meillo@74
|
153 if ((pid = fork()) > 0) {
|
meillo@74
|
154 exit(EXIT_SUCCESS);
|
meillo@74
|
155 } else if (pid < 0) {
|
meillo@208
|
156 logwrite(LOG_ALERT, "could not fork!\n");
|
meillo@74
|
157 exit(EXIT_FAILURE);
|
meillo@74
|
158 }
|
meillo@10
|
159 }
|
meillo@0
|
160
|
meillo@10
|
161 signal(SIGTERM, sigterm_handler);
|
meillo@10
|
162 write_pidfile(PIDFILEDIR "/masqmail.pid");
|
meillo@0
|
163
|
meillo@10
|
164 conf.do_verbose = FALSE;
|
meillo@10
|
165
|
meillo@72
|
166 /* closing and reopening the log ensures that it is open afterwards
|
meillo@72
|
167 because it is possible that the log is assigned to fd 1 and gets
|
meillo@72
|
168 thus closes by fclose(stdout). Similar for the debugfile.
|
meillo@72
|
169 */
|
meillo@72
|
170 logclose();
|
meillo@10
|
171 fclose(stdin);
|
meillo@10
|
172 fclose(stdout);
|
meillo@10
|
173 fclose(stderr);
|
meillo@72
|
174 logopen();
|
meillo@10
|
175
|
meillo@208
|
176 logwrite(LOG_NOTICE, "%s %s daemon starting\n", PACKAGE, VERSION);
|
meillo@10
|
177 listen_port(do_listen ? conf.listen_addresses : NULL, queue_interval, argv);
|
meillo@0
|
178 }
|
meillo@0
|
179
|
meillo@10
|
180 static void
|
meillo@10
|
181 mode_smtp()
|
meillo@0
|
182 {
|
meillo@10
|
183 /* accept smtp message on stdin */
|
meillo@10
|
184 /* write responses to stderr. */
|
meillo@0
|
185
|
meillo@10
|
186 struct sockaddr_in saddr;
|
meillo@10
|
187 gchar *peername = NULL;
|
meillo@10
|
188 int dummy = sizeof(saddr);
|
meillo@0
|
189
|
meillo@10
|
190 conf.do_verbose = FALSE;
|
meillo@0
|
191
|
meillo@10
|
192 if (!conf.run_as_user) {
|
meillo@10
|
193 seteuid(conf.orig_uid);
|
meillo@10
|
194 setegid(conf.orig_gid);
|
meillo@10
|
195 }
|
meillo@0
|
196
|
meillo@10
|
197 DEBUG(5) debugf("accepting smtp message on stdin\n");
|
meillo@0
|
198
|
meillo@10
|
199 if (getpeername(0, (struct sockaddr *) (&saddr), &dummy) == 0) {
|
meillo@10
|
200 peername = g_strdup(inet_ntoa(saddr.sin_addr));
|
meillo@10
|
201 } else if (errno != ENOTSOCK)
|
meillo@10
|
202 exit(EXIT_FAILURE);
|
meillo@0
|
203
|
meillo@10
|
204 smtp_in(stdin, stderr, peername, NULL);
|
meillo@0
|
205 }
|
meillo@0
|
206
|
meillo@10
|
207 static void
|
meillo@10
|
208 mode_accept(address * return_path, gchar * full_sender_name, guint accept_flags, char **addresses, int addr_cnt)
|
meillo@0
|
209 {
|
meillo@10
|
210 /* accept message on stdin */
|
meillo@10
|
211 accept_error err;
|
meillo@10
|
212 message *msg = create_message();
|
meillo@10
|
213 gint i;
|
meillo@0
|
214
|
meillo@83
|
215 if (return_path && !is_privileged_user(conf.orig_uid)) {
|
meillo@96
|
216 fprintf(stderr, "must be root, %s or in group %s for setting return path.\n", DEF_MAIL_USER, DEF_MAIL_GROUP);
|
meillo@83
|
217 exit(EXIT_FAILURE);
|
meillo@10
|
218 }
|
meillo@0
|
219
|
meillo@10
|
220 if (!conf.run_as_user) {
|
meillo@10
|
221 seteuid(conf.orig_uid);
|
meillo@10
|
222 setegid(conf.orig_gid);
|
meillo@10
|
223 }
|
meillo@0
|
224
|
meillo@10
|
225 DEBUG(5) debugf("accepting message on stdin\n");
|
meillo@0
|
226
|
meillo@10
|
227 msg->received_prot = PROT_LOCAL;
|
meillo@10
|
228 for (i = 0; i < addr_cnt; i++) {
|
meillo@10
|
229 if (addresses[i][0] != '|')
|
meillo@10
|
230 msg->rcpt_list = g_list_append(msg->rcpt_list, create_address_qualified(addresses[i], TRUE, conf.host_name));
|
meillo@10
|
231 else {
|
meillo@10
|
232 logwrite(LOG_ALERT, "no pipe allowed as recipient address: %s\n", addresses[i]);
|
meillo@10
|
233 exit(EXIT_FAILURE);
|
meillo@10
|
234 }
|
meillo@10
|
235 }
|
meillo@0
|
236
|
meillo@10
|
237 /* -f option */
|
meillo@10
|
238 msg->return_path = return_path;
|
meillo@0
|
239
|
meillo@10
|
240 /* -F option */
|
meillo@10
|
241 msg->full_sender_name = full_sender_name;
|
meillo@0
|
242
|
meillo@10
|
243 if ((err = accept_message(stdin, msg, accept_flags)) == AERR_OK) {
|
meillo@10
|
244 if (spool_write(msg, TRUE)) {
|
meillo@10
|
245 pid_t pid;
|
meillo@10
|
246 logwrite(LOG_NOTICE, "%s <= %s with %s\n", msg->uid, addr_string(msg->return_path), prot_names[PROT_LOCAL]);
|
meillo@0
|
247
|
meillo@10
|
248 if (!conf.do_queue) {
|
meillo@10
|
249 if ((pid = fork()) == 0) {
|
meillo@10
|
250 conf.do_verbose = FALSE;
|
meillo@10
|
251 fclose(stdin);
|
meillo@10
|
252 fclose(stdout);
|
meillo@10
|
253 fclose(stderr);
|
meillo@10
|
254 if (deliver(msg)) {
|
meillo@10
|
255 exit(EXIT_SUCCESS);
|
meillo@10
|
256 } else
|
meillo@10
|
257 exit(EXIT_FAILURE);
|
meillo@10
|
258 } else if (pid < 0) {
|
meillo@208
|
259 logwrite(LOG_ALERT, "could not fork for delivery, id = %s\n", msg->uid);
|
meillo@10
|
260 }
|
meillo@10
|
261 }
|
meillo@10
|
262 } else {
|
meillo@10
|
263 fprintf(stderr, "Could not write spool file\n");
|
meillo@10
|
264 exit(EXIT_FAILURE);
|
meillo@10
|
265 }
|
meillo@10
|
266 } else {
|
meillo@10
|
267 switch (err) {
|
meillo@10
|
268 case AERR_EOF:
|
meillo@10
|
269 fprintf(stderr, "unexpected EOF.\n");
|
meillo@10
|
270 exit(EXIT_FAILURE);
|
meillo@10
|
271 case AERR_NORCPT:
|
meillo@10
|
272 fprintf(stderr, "no recipients.\n");
|
meillo@10
|
273 exit(EXIT_FAILURE);
|
meillo@117
|
274 case AERR_SIZE:
|
meillo@117
|
275 fprintf(stderr, "max message size exceeded.\n");
|
meillo@117
|
276 exit(EXIT_FAILURE);
|
meillo@10
|
277 default:
|
meillo@10
|
278 /* should never happen: */
|
meillo@10
|
279 fprintf(stderr, "Unknown error (%d)\r\n", err);
|
meillo@10
|
280 exit(EXIT_FAILURE);
|
meillo@10
|
281 }
|
meillo@10
|
282 exit(EXIT_FAILURE);
|
meillo@0
|
283 }
|
meillo@0
|
284 }
|
meillo@0
|
285
|
meillo@0
|
286 int
|
meillo@0
|
287 main(int argc, char *argv[])
|
meillo@0
|
288 {
|
meillo@10
|
289 /* cmd line flags */
|
meillo@10
|
290 gchar *conf_file = CONF_FILE;
|
meillo@10
|
291 gint arg = 1;
|
meillo@0
|
292
|
meillo@10
|
293 gboolean do_listen = FALSE;
|
meillo@10
|
294 gboolean do_runq = FALSE;
|
meillo@10
|
295 gboolean do_runq_online = FALSE;
|
meillo@0
|
296
|
meillo@10
|
297 gboolean do_queue = FALSE;
|
meillo@0
|
298
|
meillo@10
|
299 gboolean do_verbose = FALSE;
|
meillo@10
|
300 gint debug_level = -1;
|
meillo@0
|
301
|
meillo@10
|
302 mta_mode mta_mode = MODE_ACCEPT;
|
meillo@0
|
303
|
meillo@10
|
304 gint queue_interval = 0;
|
meillo@10
|
305 gboolean opt_t = FALSE;
|
meillo@10
|
306 gboolean opt_i = FALSE;
|
meillo@10
|
307 gboolean exit_failure = FALSE;
|
meillo@0
|
308
|
meillo@10
|
309 gchar *M_cmd = NULL;
|
meillo@0
|
310
|
meillo@10
|
311 gint exit_code = EXIT_SUCCESS;
|
meillo@10
|
312 gchar *route_name = NULL;
|
meillo@10
|
313 gchar *progname;
|
meillo@10
|
314 gchar *f_address = NULL;
|
meillo@10
|
315 gchar *full_sender_name = NULL;
|
meillo@10
|
316 address *return_path = NULL; /* may be changed by -f option */
|
meillo@0
|
317
|
meillo@10
|
318 progname = get_progname(argv[0]);
|
meillo@0
|
319
|
meillo@10
|
320 if (strcmp(progname, "mailq") == 0) {
|
meillo@10
|
321 mta_mode = MODE_LIST;
|
meillo@10
|
322 } else if (strcmp(progname, "mailrm") == 0) {
|
meillo@10
|
323 mta_mode = MODE_MCMD;
|
meillo@10
|
324 M_cmd = "rm";
|
meillo@10
|
325 } else if (strcmp(progname, "runq") == 0) {
|
meillo@10
|
326 mta_mode = MODE_RUNQUEUE;
|
meillo@10
|
327 do_runq = TRUE;
|
meillo@10
|
328 } else if (strcmp(progname, "rmail") == 0) {
|
meillo@89
|
329 /* the `rmail' alias should probably be removed now
|
meillo@89
|
330 that we have the rmail script. But let's keep it
|
meillo@89
|
331 for some while for compatibility. 2010-06-19 */
|
meillo@10
|
332 mta_mode = MODE_ACCEPT;
|
meillo@10
|
333 opt_i = TRUE;
|
meillo@10
|
334 } else if (strcmp(progname, "smtpd") == 0 || strcmp(progname, "in.smtpd") == 0) {
|
meillo@10
|
335 mta_mode = MODE_SMTP;
|
meillo@10
|
336 }
|
meillo@0
|
337
|
meillo@10
|
338 /* parse cmd line */
|
meillo@10
|
339 while (arg < argc) {
|
meillo@10
|
340 gint pos = 0;
|
meillo@10
|
341 if ((argv[arg][pos] == '-') && (argv[arg][pos + 1] != '-')) {
|
meillo@10
|
342 pos++;
|
meillo@10
|
343 switch (argv[arg][pos++]) {
|
meillo@10
|
344 case 'b':
|
meillo@10
|
345 switch (argv[arg][pos++]) {
|
meillo@10
|
346 case 'd':
|
meillo@10
|
347 do_listen = TRUE;
|
meillo@10
|
348 mta_mode = MODE_DAEMON;
|
meillo@10
|
349 break;
|
meillo@10
|
350 case 'i':
|
meillo@10
|
351 /* ignored */
|
meillo@10
|
352 mta_mode = MODE_BI;
|
meillo@10
|
353 break;
|
meillo@10
|
354 case 's':
|
meillo@10
|
355 mta_mode = MODE_SMTP;
|
meillo@10
|
356 break;
|
meillo@10
|
357 case 'p':
|
meillo@10
|
358 mta_mode = MODE_LIST;
|
meillo@10
|
359 break;
|
meillo@10
|
360 case 'V':
|
meillo@10
|
361 mta_mode = MODE_VERSION;
|
meillo@10
|
362 break;
|
meillo@10
|
363 default:
|
meillo@10
|
364 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
|
meillo@10
|
365 exit(EXIT_FAILURE);
|
meillo@10
|
366 }
|
meillo@10
|
367 break;
|
meillo@10
|
368 case 'B':
|
meillo@10
|
369 /* we ignore this and throw the argument away */
|
meillo@10
|
370 get_optarg(argv, argc, &arg, &pos);
|
meillo@10
|
371 break;
|
meillo@10
|
372 case 'C':
|
meillo@10
|
373 if (!(conf_file = get_optarg(argv, argc, &arg, &pos))) {
|
meillo@10
|
374 fprintf(stderr, "-C requires a filename as argument.\n");
|
meillo@10
|
375 exit(EXIT_FAILURE);
|
meillo@10
|
376 }
|
meillo@10
|
377 break;
|
meillo@10
|
378 case 'F':
|
meillo@10
|
379 {
|
meillo@10
|
380 full_sender_name = get_optarg(argv, argc, &arg, &pos);
|
meillo@10
|
381 if (!full_sender_name) {
|
meillo@10
|
382 fprintf(stderr, "-F requires a name as an argument\n");
|
meillo@10
|
383 exit(EXIT_FAILURE);
|
meillo@10
|
384 }
|
meillo@10
|
385 }
|
meillo@10
|
386 break;
|
meillo@10
|
387 case 'd':
|
meillo@10
|
388 if (getuid() == 0) {
|
meillo@10
|
389 char *lvl = get_optarg(argv, argc, &arg, &pos);
|
meillo@10
|
390 if (lvl)
|
meillo@10
|
391 debug_level = atoi(lvl);
|
meillo@10
|
392 else {
|
meillo@10
|
393 fprintf(stderr, "-d requires a number as an argument.\n");
|
meillo@10
|
394 exit(EXIT_FAILURE);
|
meillo@10
|
395 }
|
meillo@10
|
396 } else {
|
meillo@10
|
397 fprintf(stderr, "only root may set the debug level.\n");
|
meillo@10
|
398 exit(EXIT_FAILURE);
|
meillo@10
|
399 }
|
meillo@10
|
400 break;
|
meillo@10
|
401 case 'f':
|
meillo@10
|
402 /* set return path */
|
meillo@10
|
403 {
|
meillo@10
|
404 gchar *address;
|
meillo@10
|
405 address = get_optarg(argv, argc, &arg, &pos);
|
meillo@10
|
406 if (address) {
|
meillo@10
|
407 f_address = g_strdup(address);
|
meillo@10
|
408 } else {
|
meillo@10
|
409 fprintf(stderr, "-f requires an address as an argument\n");
|
meillo@10
|
410 exit(EXIT_FAILURE);
|
meillo@10
|
411 }
|
meillo@10
|
412 }
|
meillo@10
|
413 break;
|
meillo@10
|
414 case 'i':
|
meillo@10
|
415 if (argv[arg][pos] == 0) {
|
meillo@10
|
416 opt_i = TRUE;
|
meillo@10
|
417 exit_failure = FALSE; /* may override -oem */
|
meillo@10
|
418 } else {
|
meillo@10
|
419 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
|
meillo@10
|
420 exit(EXIT_FAILURE);
|
meillo@10
|
421 }
|
meillo@10
|
422 break;
|
meillo@10
|
423 case 'M':
|
meillo@10
|
424 {
|
meillo@10
|
425 mta_mode = MODE_MCMD;
|
meillo@10
|
426 M_cmd = g_strdup(&(argv[arg][pos]));
|
meillo@10
|
427 }
|
meillo@10
|
428 break;
|
meillo@247
|
429 case 'm':
|
meillo@247
|
430 /* ignore -m (me too) switch (see man page) */
|
meillo@247
|
431 break;
|
meillo@10
|
432 case 'o':
|
meillo@248
|
433 char* oarg = argv[arg][pos+1];
|
meillo@248
|
434 if (strcmp(oarg, "oem") == 0) {
|
meillo@248
|
435 if (!opt_i) {
|
meillo@248
|
436 /* FIXME: this check needs to be done after
|
meillo@248
|
437 option processing as -oi may come later */
|
meillo@248
|
438 exit_failure = TRUE;
|
meillo@248
|
439 }
|
meillo@248
|
440 } else if (strcmp(oarg, "odb") == 0) {
|
meillo@248
|
441 /* ignore ``deliver in background'' switch */
|
meillo@248
|
442 } else if (strcmp(oarg, "odq") == 0) {
|
meillo@248
|
443 do_queue = TRUE;
|
meillo@248
|
444 } else if (strcmp(oarg, "oi") == 0) {
|
meillo@10
|
445 exit_failure = FALSE; /* may override -oem */
|
meillo@248
|
446 } else if (strcmp(oarg, "om") == 0) {
|
meillo@248
|
447 /* ignore ``me too'' switch */
|
meillo@248
|
448 } else {
|
meillo@248
|
449 fprintf(stderr, "ignoring unrecognized option %s\n",
|
meillo@248
|
450 argv[arg]);
|
meillo@10
|
451 }
|
meillo@10
|
452 break;
|
meillo@10
|
453
|
meillo@10
|
454 case 'q':
|
meillo@10
|
455 {
|
meillo@10
|
456 gchar *optarg;
|
meillo@10
|
457
|
meillo@10
|
458 do_runq = TRUE;
|
meillo@10
|
459 mta_mode = MODE_RUNQUEUE;
|
meillo@10
|
460 if (argv[arg][pos] == 'o') {
|
meillo@10
|
461 pos++;
|
meillo@10
|
462 do_runq = FALSE;
|
meillo@10
|
463 do_runq_online = TRUE;
|
meillo@10
|
464 /* can be NULL, then we use online detection method */
|
meillo@10
|
465 route_name = get_optarg(argv, argc, &arg, &pos);
|
meillo@10
|
466 } else
|
meillo@10
|
467 if ((optarg = get_optarg(argv, argc, &arg, &pos))) {
|
meillo@10
|
468 mta_mode = MODE_DAEMON;
|
meillo@10
|
469 queue_interval = time_interval(optarg, &pos);
|
meillo@10
|
470 }
|
meillo@10
|
471 }
|
meillo@10
|
472 break;
|
meillo@10
|
473 case 't':
|
meillo@248
|
474 if (argv[arg][pos] == '\0') {
|
meillo@10
|
475 opt_t = TRUE;
|
meillo@10
|
476 } else {
|
meillo@10
|
477 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
|
meillo@10
|
478 exit(EXIT_FAILURE);
|
meillo@10
|
479 }
|
meillo@10
|
480 break;
|
meillo@10
|
481 case 'v':
|
meillo@10
|
482 do_verbose = TRUE;
|
meillo@10
|
483 break;
|
meillo@10
|
484 default:
|
meillo@10
|
485 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
|
meillo@10
|
486 exit(EXIT_FAILURE);
|
meillo@10
|
487 }
|
meillo@10
|
488 } else {
|
meillo@10
|
489 if (argv[arg][pos + 1] == '-') {
|
meillo@10
|
490 if (argv[arg][pos + 2] != '\0') {
|
meillo@10
|
491 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
|
meillo@10
|
492 exit(EXIT_FAILURE);
|
meillo@10
|
493 }
|
meillo@10
|
494 arg++;
|
meillo@10
|
495 }
|
meillo@10
|
496 break;
|
meillo@10
|
497 }
|
meillo@10
|
498 arg++;
|
meillo@0
|
499 }
|
meillo@0
|
500
|
meillo@10
|
501 if (mta_mode == MODE_VERSION) {
|
meillo@12
|
502 gchar *with_resolver = "";
|
meillo@12
|
503 gchar *with_auth = "";
|
meillo@12
|
504 gchar *with_ident = "";
|
meillo@0
|
505
|
meillo@0
|
506 #ifdef ENABLE_RESOLVER
|
meillo@10
|
507 with_resolver = " +resolver";
|
meillo@0
|
508 #endif
|
meillo@0
|
509 #ifdef ENABLE_AUTH
|
meillo@10
|
510 with_auth = " +auth";
|
meillo@0
|
511 #endif
|
meillo@0
|
512 #ifdef ENABLE_IDENT
|
meillo@10
|
513 with_ident = " +ident";
|
meillo@0
|
514 #endif
|
meillo@0
|
515
|
meillo@205
|
516 printf("%s %s%s%s%s\n", PACKAGE, VERSION, with_resolver, with_auth, with_ident);
|
meillo@0
|
517
|
meillo@10
|
518 exit(EXIT_SUCCESS);
|
meillo@10
|
519 }
|
meillo@0
|
520
|
meillo@10
|
521 /* initialize random generator */
|
meillo@10
|
522 srand(time(NULL));
|
meillo@10
|
523 /* ignore SIGPIPE signal */
|
meillo@10
|
524 signal(SIGPIPE, SIG_IGN);
|
meillo@0
|
525
|
meillo@73
|
526 /* close all possibly open file descriptors, except std{in,out,err} */
|
meillo@10
|
527 {
|
meillo@10
|
528 int i, max_fd = sysconf(_SC_OPEN_MAX);
|
meillo@0
|
529
|
meillo@10
|
530 if (max_fd <= 0)
|
meillo@10
|
531 max_fd = 64;
|
meillo@10
|
532 for (i = 3; i < max_fd; i++)
|
meillo@10
|
533 close(i);
|
meillo@10
|
534 }
|
meillo@0
|
535
|
meillo@10
|
536 init_conf();
|
meillo@0
|
537
|
meillo@10
|
538 /* if we are not privileged, and the config file was changed we
|
meillo@10
|
539 implicetely set the the run_as_user flag and give up all
|
meillo@10
|
540 privileges.
|
meillo@0
|
541
|
meillo@10
|
542 So it is possible for a user to run his own daemon without
|
meillo@10
|
543 breaking security.
|
meillo@10
|
544 */
|
meillo@10
|
545 if (strcmp(conf_file, CONF_FILE) != 0) {
|
meillo@10
|
546 if (conf.orig_uid != 0) {
|
meillo@10
|
547 conf.run_as_user = TRUE;
|
meillo@10
|
548 seteuid(conf.orig_uid);
|
meillo@10
|
549 setegid(conf.orig_gid);
|
meillo@10
|
550 setuid(conf.orig_uid);
|
meillo@10
|
551 setgid(conf.orig_gid);
|
meillo@10
|
552 }
|
meillo@10
|
553 }
|
meillo@0
|
554
|
meillo@155
|
555 conf.log_dir = LOG_DIR;
|
meillo@155
|
556 logopen();
|
meillo@155
|
557 if (!read_conf(conf_file)) {
|
meillo@155
|
558 logwrite(LOG_ALERT, "SHUTTING DOWN due to problems reading config\n");
|
meillo@155
|
559 exit(5);
|
meillo@155
|
560 }
|
meillo@155
|
561 logclose();
|
meillo@0
|
562
|
meillo@10
|
563 if (do_queue)
|
meillo@10
|
564 conf.do_queue = TRUE;
|
meillo@10
|
565 if (do_verbose)
|
meillo@10
|
566 conf.do_verbose = TRUE;
|
meillo@10
|
567 if (debug_level >= 0) /* if >= 0, it was given by argument */
|
meillo@10
|
568 conf.debug_level = debug_level;
|
meillo@0
|
569
|
meillo@46
|
570 /* It appears that changing to / ensures that we are never in
|
meillo@46
|
571 a directory which we cannot access. This situation could be
|
meillo@46
|
572 possible after changing identity.
|
meillo@46
|
573 Maybe we should only change to / if we not run as user, to
|
meillo@46
|
574 allow relative paths for log files in test setups for
|
meillo@46
|
575 instance.
|
meillo@46
|
576 */
|
meillo@10
|
577 chdir("/");
|
meillo@0
|
578
|
meillo@10
|
579 if (!conf.run_as_user) {
|
meillo@10
|
580 if (setgid(0) != 0) {
|
meillo@10
|
581 fprintf(stderr, "could not set gid to 0. Is the setuid bit set? : %s\n", strerror(errno));
|
meillo@10
|
582 exit(EXIT_FAILURE);
|
meillo@10
|
583 }
|
meillo@10
|
584 if (setuid(0) != 0) {
|
meillo@10
|
585 fprintf(stderr, "could not gain root privileges. Is the setuid bit set? : %s\n", strerror(errno));
|
meillo@10
|
586 exit(EXIT_FAILURE);
|
meillo@10
|
587 }
|
meillo@10
|
588 }
|
meillo@0
|
589
|
meillo@10
|
590 if (!logopen()) {
|
meillo@10
|
591 fprintf(stderr, "could not open log file\n");
|
meillo@10
|
592 exit(EXIT_FAILURE);
|
meillo@10
|
593 }
|
meillo@0
|
594
|
meillo@10
|
595 DEBUG(1) debugf("masqmail %s starting\n", VERSION);
|
meillo@0
|
596
|
meillo@10
|
597 DEBUG(5) {
|
meillo@10
|
598 gchar **str = argv;
|
meillo@10
|
599 debugf("args: \n");
|
meillo@10
|
600 while (*str) {
|
meillo@10
|
601 debugf("%s \n", *str);
|
meillo@10
|
602 str++;
|
meillo@10
|
603 }
|
meillo@10
|
604 }
|
meillo@10
|
605 DEBUG(5) debugf("queue_interval = %d\n", queue_interval);
|
meillo@0
|
606
|
meillo@10
|
607 if (f_address) {
|
meillo@10
|
608 return_path = create_address_qualified(f_address, TRUE, conf.host_name);
|
meillo@10
|
609 g_free(f_address);
|
meillo@10
|
610 if (!return_path) {
|
meillo@10
|
611 fprintf(stderr, "invalid RFC821 address: %s\n", f_address);
|
meillo@10
|
612 exit(EXIT_FAILURE);
|
meillo@10
|
613 }
|
meillo@10
|
614 }
|
meillo@10
|
615
|
meillo@10
|
616 switch (mta_mode) {
|
meillo@10
|
617 case MODE_DAEMON:
|
meillo@10
|
618 mode_daemon(do_listen, queue_interval, argv);
|
meillo@10
|
619 break;
|
meillo@10
|
620 case MODE_RUNQUEUE:
|
meillo@10
|
621 {
|
meillo@10
|
622 /* queue runs */
|
meillo@10
|
623 set_identity(conf.orig_uid, "queue run");
|
meillo@0
|
624
|
meillo@10
|
625 if (do_runq)
|
meillo@10
|
626 exit_code = queue_run() ? EXIT_SUCCESS : EXIT_FAILURE;
|
meillo@10
|
627
|
meillo@10
|
628 if (do_runq_online) {
|
meillo@10
|
629 if (route_name != NULL) {
|
meillo@10
|
630 conf.online_detect = g_strdup("argument");
|
meillo@10
|
631 set_online_name(route_name);
|
meillo@10
|
632 }
|
meillo@10
|
633 exit_code =
|
meillo@10
|
634 queue_run_online() ? EXIT_SUCCESS : EXIT_FAILURE;
|
meillo@10
|
635 }
|
meillo@10
|
636 }
|
meillo@10
|
637 break;
|
meillo@10
|
638
|
meillo@10
|
639 case MODE_SMTP:
|
meillo@10
|
640 mode_smtp();
|
meillo@10
|
641 break;
|
meillo@10
|
642
|
meillo@10
|
643 case MODE_LIST:
|
meillo@10
|
644 queue_list();
|
meillo@10
|
645 break;
|
meillo@10
|
646
|
meillo@10
|
647 case MODE_BI:
|
meillo@10
|
648 exit(EXIT_SUCCESS);
|
meillo@10
|
649 break; /* well... */
|
meillo@10
|
650
|
meillo@10
|
651 case MODE_MCMD:
|
meillo@10
|
652 if (strcmp(M_cmd, "rm") == 0) {
|
meillo@10
|
653 gboolean ok = FALSE;
|
meillo@10
|
654
|
meillo@10
|
655 set_euidgid(conf.mail_uid, conf.mail_gid, NULL, NULL);
|
meillo@10
|
656
|
meillo@10
|
657 if (is_privileged_user(conf.orig_uid)) {
|
meillo@10
|
658 for (; arg < argc; arg++) {
|
meillo@10
|
659 if (queue_delete(argv[arg]))
|
meillo@10
|
660 ok = TRUE;
|
meillo@10
|
661 }
|
meillo@10
|
662 } else {
|
meillo@10
|
663 struct passwd *pw = getpwuid(conf.orig_uid);
|
meillo@10
|
664 if (pw) {
|
meillo@10
|
665 for (; arg < argc; arg++) {
|
meillo@10
|
666 message *msg = msg_spool_read(argv[arg], FALSE);
|
meillo@10
|
667 #ifdef ENABLE_IDENT
|
meillo@10
|
668 if (((msg->received_host == NULL) && (msg->received_prot == PROT_LOCAL))
|
meillo@248
|
669 || is_in_netlist(msg->received_host, conf.ident_trusted_nets))
|
meillo@10
|
670 #else
|
meillo@248
|
671 if ((msg->received_host == NULL) && (msg->received_prot == PROT_LOCAL))
|
meillo@10
|
672 #endif
|
meillo@248
|
673 {
|
meillo@10
|
674 if (msg->ident) {
|
meillo@10
|
675 if (strcmp(pw->pw_name, msg->ident) == 0) {
|
meillo@10
|
676 if (queue_delete(argv[arg]))
|
meillo@10
|
677 ok = TRUE;
|
meillo@10
|
678 } else {
|
meillo@10
|
679 fprintf(stderr, "you do not own message id %s\n", argv[arg]);
|
meillo@10
|
680 }
|
meillo@10
|
681 } else
|
meillo@10
|
682 fprintf(stderr, "message %s does not have an ident.\n", argv[arg]);
|
meillo@10
|
683 } else {
|
meillo@10
|
684 fprintf(stderr, "message %s was not received locally or from a trusted network.\n", argv[arg]);
|
meillo@10
|
685 }
|
meillo@10
|
686 }
|
meillo@10
|
687 } else {
|
meillo@10
|
688 fprintf(stderr, "could not find a passwd entry for uid %d: %s\n", conf.orig_uid, strerror(errno));
|
meillo@10
|
689 }
|
meillo@10
|
690 }
|
meillo@10
|
691 exit(ok ? EXIT_SUCCESS : EXIT_FAILURE);
|
meillo@10
|
692 } else {
|
meillo@10
|
693 fprintf(stderr, "unknown command %s\n", M_cmd);
|
meillo@10
|
694 exit(EXIT_FAILURE);
|
meillo@10
|
695 }
|
meillo@10
|
696 break;
|
meillo@10
|
697
|
meillo@10
|
698 case MODE_ACCEPT:
|
meillo@10
|
699 {
|
meillo@107
|
700 guint accept_flags = (opt_t ? ACC_DEL_RCPTS | ACC_RCPT_FROM_HEAD : 0)
|
meillo@110
|
701 | (opt_i ? ACC_DOT_IGNORE : ACC_NODOT_RELAX);
|
meillo@10
|
702 mode_accept(return_path, full_sender_name, accept_flags, &(argv[arg]), argc - arg);
|
meillo@10
|
703 exit(exit_failure ? EXIT_FAILURE : EXIT_SUCCESS);
|
meillo@10
|
704 }
|
meillo@10
|
705 break;
|
meillo@10
|
706 case MODE_NONE:
|
meillo@10
|
707 break;
|
meillo@10
|
708 default:
|
meillo@10
|
709 fprintf(stderr, "unknown mode: %d\n", mta_mode);
|
meillo@10
|
710 break;
|
meillo@0
|
711 }
|
meillo@0
|
712
|
meillo@10
|
713 logclose();
|
meillo@0
|
714
|
meillo@10
|
715 exit(exit_code);
|
meillo@0
|
716 }
|