diff options
Diffstat (limited to 'usr/src/cmd/sendmail/util/mail.local.c')
| -rw-r--r-- | usr/src/cmd/sendmail/util/mail.local.c | 1225 |
1 files changed, 1225 insertions, 0 deletions
diff --git a/usr/src/cmd/sendmail/util/mail.local.c b/usr/src/cmd/sendmail/util/mail.local.c new file mode 100644 index 0000000000..0d04d3c58c --- /dev/null +++ b/usr/src/cmd/sendmail/util/mail.local.c @@ -0,0 +1,1225 @@ +/* + * Copyright (c) 1998 Sendmail, Inc. All rights reserved. + * Copyright (c) 1990, 1993, 1994 + * The Regents of the University of California. All rights reserved. + * + * By using this file, you agree to the terms and conditions set + * forth in the LICENSE file which can be found at the top level + * of the sendmail distribution. + */ + +/* + * Copyright 1994-2007 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#ifndef lint +static char copyright[] = +"@(#) Copyright (c) 1990, 1993, 1994\n\ + The Regents of the University of California. All rights reserved.\n"; +#endif /* not lint */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +#ifndef lint +static char sccsid[] = "@(#)mail.local.c 8.83 (Berkeley) 12/17/98"; +static char sccsi2[] = "%W% (Sun) %G%"; +#endif /* not lint */ + +#include <sys/param.h> +#include <sys/stat.h> +#include <sys/socket.h> +#include <sys/file.h> + +#include <netinet/in.h> + +#include <errno.h> +#include <fcntl.h> +#include <netdb.h> +#include <pwd.h> +#include <stdio.h> +#include <stdlib.h> +#include <signal.h> +#include <ctype.h> +#include <string.h> +#include <sysexits.h> +#include <time.h> +#include <unistd.h> +#include <maillock.h> +#include <grp.h> + +#ifdef __STDC__ +#include <stdarg.h> +#else +#include <varargs.h> +#endif + +#include <syslog.h> + +#include <sysexits.h> +#include <ctype.h> + +#include <sm/conf.h> +#include <sendmail/pathnames.h> + +/* +** If you don't have flock, you could try using lockf instead. +*/ + +#ifdef LDA_USE_LOCKF +# define flock(a, b) lockf(a, b, 0) +# ifdef LOCK_EX +# undef LOCK_EX +# endif /* LOCK_EX */ +# define LOCK_EX F_LOCK +#endif /* LDA_USE_LOCKF */ + +#ifndef LOCK_EX +# include <sys/file.h> +#endif /* ! LOCK_EX */ + +#ifndef MAILER_DAEMON +# define MAILER_DAEMON "MAILER-DAEMON" +#endif + +typedef int bool; + +#define FALSE 0 +#define TRUE 1 + +bool EightBitMime = TRUE; /* advertise 8BITMIME in LMTP */ +static int eval = EX_OK; /* sysexits.h error value. */ +static int lmtpmode = 0; +bool bouncequota = FALSE; /* permanent error when over quota */ + +#define _PATH_MAILDIR "/var/mail" +#define _PATH_LOCTMP "/tmp/local.XXXXXX" +#define _PATH_LOCHTMP "/tmp/lochd.XXXXXX" +#define FALSE 0 +#define TRUE 1 +#define MAXLINE 2048 + +static void deliver(int, int, char *, bool); +static void e_to_sys(int); +static void err(const char *fmt, ...); +static void notifybiff(char *); +static void store(char *, int); +static void usage(void); +static void vwarn(); +static void warn(const char *fmt, ...); +static void mailerr(const char *, const char *, ...); +static void sigterm_handler(); + +static char unix_from_line[MAXLINE]; +static int ulen; +static int content_length; +static int bfd, hfd; /* temp file */ +static uid_t src_uid, targ_uid, saved_uid; +static int sigterm_caught; + +int +main(argc, argv) + int argc; + char *argv[]; +{ + struct passwd *pw; + int ch; + uid_t uid; + char *from; + struct group *grpptr; + void dolmtp(); + + openlog("mail.local", 0, LOG_MAIL); + + from = NULL; + pw = NULL; + sigterm_caught = FALSE; + + (void) sigset(SIGTERM, sigterm_handler); + + while ((ch = getopt(argc, argv, "7bdf:r:l")) != EOF) + switch (ch) { + case '7': /* Do not advertise 8BITMIME */ + EightBitMime = FALSE; + break; + + case 'b': /* bounce mail when over quota. */ + bouncequota = TRUE; + break; + + case 'd': /* Backward compatible. */ + break; + case 'f': + case 'r': /* Backward compatible. */ + if (from != NULL) { + warn("multiple -f options"); + usage(); + } + from = optarg; + break; + case 'l': + lmtpmode++; + break; + case '?': + default: + usage(); + } + argc -= optind; + argv += optind; + + notifybiff(NULL); /* initialize biff structures */ + + /* + * We expect sendmail will invoke us with saved id 0 + * We then do setgid and setuid defore delivery + * setgid to mail group + */ + if ((grpptr = getgrnam("mail")) != NULL) + (void) setgid(grpptr->gr_gid); + saved_uid = geteuid(); + + if (lmtpmode) { + if (saved_uid != 0) { + warn("only super-user can use -l option"); + exit(EX_CANTCREAT); + } + dolmtp(bouncequota); + } + + if (!*argv) + usage(); + + /* + * If from not specified, use the name from getlogin() if the + * uid matches, otherwise, use the name from the password file + * corresponding to the uid. + */ + uid = getuid(); + if (!from && (!(from = getlogin()) || + !(pw = getpwnam(from)) || pw->pw_uid != uid)) + from = (pw = getpwuid(uid)) ? pw->pw_name : "???"; + src_uid = pw ? pw->pw_uid : uid; + + /* + * There is no way to distinguish the error status of one delivery + * from the rest of the deliveries. So, if we failed hard on one + * or more deliveries, but had no failures on any of the others, we + * return a hard failure. If we failed temporarily on one or more + * deliveries, we return a temporary failure regardless of the other + * failures. This results in the delivery being reattempted later + * at the expense of repeated failures and multiple deliveries. + */ + + for (store(from, 0); *argv; ++argv) + deliver(hfd, bfd, *argv, bouncequota); + return (eval); +} + +void +sigterm_handler() +{ + sigterm_caught = TRUE; + (void) sigignore(SIGTERM); +} + +char * +parseaddr(s) + char *s; +{ + char *p; + int len; + + if (*s++ != '<') + return NULL; + + p = s; + + /* at-domain-list */ + while (*p == '@') { + p++; + if (*p == '[') { + p++; + while (isascii(*p) && + (isalnum(*p) || *p == '.' || + *p == '-' || *p == ':')) + p++; + if (*p++ != ']') + return NULL; + } else { + while ((isascii(*p) && isalnum(*p)) || + strchr(".-_", *p)) + p++; + } + if (*p == ',' && p[1] == '@') + p++; + else if (*p == ':' && p[1] != '@') + p++; + else + return NULL; + } + + s = p; + + /* local-part */ + if (*p == '\"') { + p++; + while (*p && *p != '\"') { + if (*p == '\\') { + if (!*++p) + return NULL; + } + p++; + } + if (!*p++) + return NULL; + } else { + while (*p && *p != '@' && *p != '>') { + if (*p == '\\') { + if (!*++p) + return NULL; + } else { + if (*p <= ' ' || (*p & 128) || + strchr("<>()[]\\,;:\"", *p)) + return NULL; + } + p++; + } + } + + /* @domain */ + if (*p == '@') { + p++; + if (*p == '[') { + p++; + while (isascii(*p) && + (isalnum(*p) || *p == '.' || + *p == '-' || *p == ':')) + p++; + if (*p++ != ']') + return NULL; + } else { + while ((isascii(*p) && isalnum(*p)) || + strchr(".-_", *p)) + p++; + } + } + + if (*p++ != '>') + return NULL; + if (*p && *p != ' ') + return NULL; + len = p - s - 1; + + if (*s == '\0' || len <= 0) + { + s = MAILER_DAEMON; + len = strlen(s); + } + + p = malloc(len + 1); + if (p == NULL) { + printf("421 4.3.0 memory exhausted\r\n"); + exit(EX_TEMPFAIL); + } + + strncpy(p, s, len); + p[len] = '\0'; + return p; +} + +char * +process_recipient(addr) + char *addr; +{ + if (getpwnam(addr) == NULL) { + return "550 5.1.1 user unknown"; + } + + return NULL; +} + +#define RCPT_GROW 30 + +void +dolmtp(bouncequota) + bool bouncequota; +{ + char *return_path = NULL; + char **rcpt_addr = NULL; + int rcpt_num = 0; + int rcpt_alloc = 0; + bool gotlhlo = FALSE; + char myhostname[MAXHOSTNAMELEN]; + char buf[4096]; + char *err; + char *p; + int i; + + gethostname(myhostname, sizeof myhostname - 1); + + printf("220 %s LMTP ready\r\n", myhostname); + for (;;) { + if (sigterm_caught) { + for (; rcpt_num > 0; rcpt_num--) + printf("451 4.3.0 shutting down\r\n"); + exit(EX_OK); + } + fflush(stdout); + if (fgets(buf, sizeof(buf)-1, stdin) == NULL) { + exit(EX_OK); + } + p = buf + strlen(buf) - 1; + if (p >= buf && *p == '\n') + *p-- = '\0'; + if (p >= buf && *p == '\r') + *p-- = '\0'; + + switch (buf[0]) { + + case 'd': + case 'D': + if (strcasecmp(buf, "data") == 0) { + if (rcpt_num == 0) { + printf("503 5.5.1 No recipients\r\n"); + continue; + } + store(return_path, rcpt_num); + if (bfd == -1 || hfd == -1) + continue; + + for (i = 0; i < rcpt_num; i++) { + p = strchr(rcpt_addr[i], '+'); + if (p != NULL) + *p++ = '\0'; + deliver(hfd, bfd, rcpt_addr[i], + bouncequota); + } + close(bfd); + close(hfd); + goto rset; + } + goto syntaxerr; + /* NOTREACHED */ + break; + + case 'l': + case 'L': + if (strncasecmp(buf, "lhlo ", 5) == 0) + { + /* check for duplicate per RFC 1651 4.2 */ + if (gotlhlo) + { + printf("503 %s Duplicate LHLO\r\n", + myhostname); + continue; + } + gotlhlo = TRUE; + printf("250-%s\r\n", myhostname); + if (EightBitMime) + printf("250-8BITMIME\r\n"); + printf("250-ENHANCEDSTATUSCODES\r\n"); + printf("250 PIPELINING\r\n"); + continue; + } + goto syntaxerr; + /* NOTREACHED */ + break; + + case 'm': + case 'M': + if (strncasecmp(buf, "mail ", 5) == 0) { + if (return_path != NULL) { + printf("503 5.5.1 Nested MAIL command\r\n"); + continue; + } + if (strncasecmp(buf+5, "from:", 5) != 0 || + ((return_path = parseaddr(buf+10)) == NULL)) { + printf("501 5.5.4 Syntax error in parameters\r\n"); + continue; + } + printf("250 2.5.0 ok\r\n"); + continue; + } + goto syntaxerr; + + case 'n': + case 'N': + if (strcasecmp(buf, "noop") == 0) { + printf("250 2.0.0 ok\r\n"); + continue; + } + goto syntaxerr; + + case 'q': + case 'Q': + if (strcasecmp(buf, "quit") == 0) { + printf("221 2.0.0 bye\r\n"); + exit(EX_OK); + } + goto syntaxerr; + + case 'r': + case 'R': + if (strncasecmp(buf, "rcpt ", 5) == 0) { + if (return_path == NULL) { + printf("503 5.5.1 Need MAIL command\r\n"); + continue; + } + if (rcpt_num >= rcpt_alloc) { + rcpt_alloc += RCPT_GROW; + rcpt_addr = (char **) + realloc((char *)rcpt_addr, + rcpt_alloc * sizeof(char **)); + if (rcpt_addr == NULL) { + printf("421 4.3.0 memory exhausted\r\n"); + exit(EX_TEMPFAIL); + } + } + if (strncasecmp(buf+5, "to:", 3) != 0 || + ((rcpt_addr[rcpt_num] = parseaddr(buf+8)) == NULL)) { + printf("501 5.5.4 Syntax error in parameters\r\n"); + continue; + } + if ((err = process_recipient(rcpt_addr[rcpt_num])) != NULL) { + printf("%s\r\n", err); + continue; + } + rcpt_num++; + printf("250 2.1.5 ok\r\n"); + continue; + } + else if (strcasecmp(buf, "rset") == 0) { + printf("250 2.0.0 ok\r\n"); + + rset: + while (rcpt_num > 0) { + free(rcpt_addr[--rcpt_num]); + } + if (return_path != NULL) + free(return_path); + return_path = NULL; + continue; + } + goto syntaxerr; + + case 'v': + case 'V': + if (strncasecmp(buf, "vrfy ", 5) == 0) { + printf("252 2.3.3 try RCPT to attempt delivery\r\n"); + continue; + } + goto syntaxerr; + + default: + syntaxerr: + printf("500 5.5.2 Syntax error\r\n"); + continue; + } + } +} + +static void +store(from, lmtprcpts) + char *from; + int lmtprcpts; +{ + FILE *fp = NULL; + time_t tval; + bool fullline = TRUE; /* current line is terminated */ + bool prevfl; /* previous line was terminated */ + char line[MAXLINE]; + FILE *bfp, *hfp; + char *btn, *htn; + int in_header_section; + int newfd; + + bfd = -1; + hfd = -1; + btn = strdup(_PATH_LOCTMP); + if ((bfd = mkstemp(btn)) == -1 || (bfp = fdopen(bfd, "w+")) == NULL) { + if (bfd != -1) + (void) close(bfd); + if (lmtprcpts) { + printf("451 4.3.0 unable to open temporary file\r\n"); + return; + } else { + mailerr("451 4.3.0", "unable to open temporary file"); + exit(eval); + } + } + (void) unlink(btn); + free(btn); + + if (lmtpmode) { + printf("354 go ahead\r\n"); + fflush(stdout); + } + + htn = strdup(_PATH_LOCHTMP); + if ((hfd = mkstemp(htn)) == -1 || (hfp = fdopen(hfd, "w+")) == NULL) { + if (hfd != -1) + (void) close(hfd); + e_to_sys(errno); + err("unable to open temporary file"); + } + (void) unlink(htn); + free(htn); + + in_header_section = TRUE; + content_length = 0; + fp = hfp; + + line[0] = '\0'; + while (fgets(line, sizeof(line), stdin) != (char *)NULL) + { + size_t line_len = 0; + int peek; + + prevfl = fullline; /* preserve state of previous line */ + while (line[line_len] != '\n' && line_len < sizeof(line) - 2) + line_len++; + line_len++; + + /* Check for dot-stuffing */ + if (prevfl && lmtprcpts && line[0] == '.') + { + if (line[1] == '\n' || + (line[1] == '\r' && line[2] == '\n')) + goto lmtpdot; + memcpy(line, line + 1, line_len); + line_len--; + } + + /* Check to see if we have the full line from fgets() */ + fullline = FALSE; + if (line_len > 0) + { + if (line[line_len - 1] == '\n') + { + if (line_len >= 2 && + line[line_len - 2] == '\r') + { + line[line_len - 2] = '\n'; + line[line_len - 1] = '\0'; + line_len--; + } + fullline = TRUE; + } + else if (line[line_len - 1] == '\r') + { + /* Did we just miss the CRLF? */ + peek = fgetc(stdin); + if (peek == '\n') + { + line[line_len - 1] = '\n'; + fullline = TRUE; + } + else + (void) ungetc(peek, stdin); + } + } + else + fullline = TRUE; + + if (prevfl && line[0] == '\n' && in_header_section) { + in_header_section = FALSE; + if (fflush(fp) == EOF || ferror(fp)) { + if (lmtprcpts) { + while (lmtprcpts--) + printf("451 4.3.0 temporary file write error\r\n"); + fclose(fp); + return; + } else { + mailerr("451 4.3.0", + "temporary file write error"); + fclose(fp); + exit(eval); + } + } + fp = bfp; + continue; + } + + if (in_header_section) { + if (strncasecmp("Content-Length:", line, 15) == 0) { + continue; /* skip this header */ + } + } else + content_length += strlen(line); + (void) fwrite(line, sizeof(char), line_len, fp); + if (ferror(fp)) { + if (lmtprcpts) { + while (lmtprcpts--) + printf("451 4.3.0 temporary file write error\r\n"); + fclose(fp); + return; + } else { + mailerr("451 4.3.0", + "temporary file write error"); + fclose(fp); + exit(eval); + } + } + } + if (sigterm_caught) { + if (lmtprcpts) + while (lmtprcpts--) + printf("451 4.3.0 shutting down\r\n"); + else + mailerr("451 4.3.0", "shutting down"); + fclose(fp); + exit(eval); + } + + if (lmtprcpts) { + /* Got a premature EOF -- toss message and exit */ + exit(EX_OK); + } + + /* If message not newline terminated, need an extra. */ + if (!strchr(line, '\n')) { + (void) putc('\n', fp); + content_length++; + } + + lmtpdot: + + /* Output a newline; note, empty messages are allowed. */ + (void) putc('\n', fp); + + if (fflush(fp) == EOF || ferror(fp)) { + if (lmtprcpts) { + while (lmtprcpts--) { + printf("451 4.3.0 temporary file write error\r\n"); + } + fclose(fp); + return; + } else { + mailerr("451 4.3.0", "temporary file write error"); + fclose(fp); + exit(eval); + } + } + + if ((newfd = dup(bfd)) >= 0) { + fclose(bfp); + bfd = newfd; + } + if ((newfd = dup(hfd)) >= 0) { + fclose(hfp); + hfd = newfd; + } + (void) time(&tval); + (void) snprintf(unix_from_line, sizeof (unix_from_line), "From %s %s", + from, ctime(&tval)); + ulen = strlen(unix_from_line); +} + +static void +handle_error(err_num, bouncequota, path) + int err_num; + bool bouncequota; + char *path; +{ +#ifdef EDQUOT + if (err_num == EDQUOT && bouncequota) { + mailerr("552 5.2.2", "%s: %s", path, sm_errstring(err_num)); + } else +#endif /* EDQUOT */ + mailerr("450 4.2.0", "%s: %s", path, sm_errstring(err_num)); +} + +static void +deliver(hfd, bfd, name, bouncequota) + int hfd; + int bfd; + char *name; + bool bouncequota; +{ + struct stat fsb, sb; + int mbfd = -1, nr, nw = 0, off; + char biffmsg[100], buf[8*1024], path[MAXPATHLEN]; + off_t curoff, cursize; + int len; + struct passwd *pw = NULL; + + /* + * Disallow delivery to unknown names -- special mailboxes + * can be handled in the sendmail aliases file. + */ + if ((pw = getpwnam(name)) == NULL) { + eval = EX_TEMPFAIL; + mailerr("451 4.3.0", "cannot lookup name: %s", name); + return; + } + endpwent(); + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + return; + } + + /* mailbox may be NFS mounted, seteuid to user */ + targ_uid = pw->pw_uid; + (void) seteuid(targ_uid); + + if ((saved_uid != 0) && (src_uid != targ_uid)) { + /* + * If saved_uid == 0 (root), anything is OK; this is + * as it should be. But to prevent a random user from + * calling "mail.local foo" in an attempt to hijack + * foo's mail-box, make sure src_uid == targ_uid o/w. + */ + warn("%s: wrong owner (is %d, should be %d)", + name, src_uid, targ_uid); + eval = EX_CANTCREAT; + return; + } + + path[0] = '\0'; + (void) snprintf(path, sizeof (path), "%s/%s", _PATH_MAILDIR, name); + + /* + * If the mailbox is linked or a symlink, fail. There's an obvious + * race here, that the file was replaced with a symbolic link after + * the lstat returned, but before the open. We attempt to detect + * this by comparing the original stat information and information + * returned by an fstat of the file descriptor returned by the open. + * + * NB: this is a symptom of a larger problem, that the mail spooling + * directory is writeable by the wrong users. If that directory is + * writeable, system security is compromised for other reasons, and + * it cannot be fixed here. + * + * If we created the mailbox, set the owner/group. If that fails, + * just return. Another process may have already opened it, so we + * can't unlink it. Historically, binmail set the owner/group at + * each mail delivery. We no longer do this, assuming that if the + * ownership or permissions were changed there was a reason. + * + * XXX + * open(2) should support flock'ing the file. + */ +tryagain: + /* should check lock status, but... maillock return no value */ + maillock(name, 10); + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err0; + } + + if (lstat(path, &sb)) { + mbfd = open(path, O_APPEND|O_CREAT|O_EXCL|O_WRONLY, + S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP); + if (mbfd != -1) + (void) fchmod(mbfd, 0660); + + + if (mbfd == -1) { + if (errno == EEXIST) { + mailunlock(); + goto tryagain; + } + } + } else if (sb.st_nlink != 1) { + mailerr("550 5.2.0", "%s: too many links", path); + goto err0; + } else if (!S_ISREG(sb.st_mode)) { + mailerr("550 5.2.0", "%s: irregular file", path); + goto err0; + } else { + mbfd = open(path, O_APPEND|O_WRONLY, 0); + if (mbfd != -1 && + (fstat(mbfd, &fsb) || fsb.st_nlink != 1 || + S_ISLNK(fsb.st_mode) || sb.st_dev != fsb.st_dev || + sb.st_ino != fsb.st_ino)) { + eval = EX_TEMPFAIL; + mailerr("550 5.2.0", + "%s: fstat: file changed after open", path); + goto err1; + } + } + + if (mbfd == -1) { + mailerr("450 4.2.0", "%s: %s", path, strerror(errno)); + goto err0; + } + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err0; + } + + /* Get the starting offset of the new message for biff. */ + curoff = lseek(mbfd, (off_t)0, SEEK_END); + (void) snprintf(biffmsg, sizeof (biffmsg), "%s@%ld\n", name, curoff); + + /* Copy the message into the file. */ + if (lseek(hfd, (off_t)0, SEEK_SET) == (off_t)-1) { + mailerr("450 4.2.0", "temporary file: %s", strerror(errno)); + goto err1; + } + /* Copy the message into the file. */ + if (lseek(bfd, (off_t)0, SEEK_SET) == (off_t)-1) { + mailerr("450 4.2.0", "temporary file: %s", strerror(errno)); + goto err1; + } + if ((write(mbfd, unix_from_line, ulen)) != ulen) { + handle_error(errno, bouncequota, path); + goto err2; + } + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err2; + } + + while ((nr = read(hfd, buf, sizeof (buf))) > 0) + for (off = 0; off < nr; nr -= nw, off += nw) + if ((nw = write(mbfd, buf + off, nr)) < 0) + { + handle_error(errno, bouncequota, path); + goto err2; + } + if (nr < 0) { + handle_error(errno, bouncequota, path); + goto err2; + } + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err2; + } + + (void) snprintf(buf, sizeof (buf), "Content-Length: %d\n\n", + content_length); + len = strlen(buf); + if (write(mbfd, buf, len) != len) { + handle_error(errno, bouncequota, path); + goto err2; + } + + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err2; + } + + while ((nr = read(bfd, buf, sizeof (buf))) > 0) { + for (off = 0; off < nr; nr -= nw, off += nw) + if ((nw = write(mbfd, buf + off, nr)) < 0) { + handle_error(errno, bouncequota, path); + goto err2; + } + if (sigterm_caught) { + mailerr("451 4.3.0", "shutting down"); + goto err2; + } + } + if (nr < 0) { + handle_error(errno, bouncequota, path); + goto err2; + } + + /* Flush to disk, don't wait for update. */ + if (fsync(mbfd)) { + handle_error(errno, bouncequota, path); +err2: if (mbfd >= 0) + (void)ftruncate(mbfd, curoff); +err1: (void)close(mbfd); +err0: mailunlock(); + (void)seteuid(saved_uid); + return; + } + + /* + ** Save the current size so if the close() fails below + ** we can make sure no other process has changed the mailbox + ** between the failed close and the re-open()/re-lock(). + ** If something else has changed the size, we shouldn't + ** try to truncate it as we may do more harm then good + ** (e.g., truncate a later message delivery). + */ + + if (fstat(mbfd, &sb) < 0) + cursize = 0; + else + cursize = sb.st_size; + + /* Close and check -- NFS doesn't write until the close. */ + if (close(mbfd)) + { + handle_error(errno, bouncequota, path); + mbfd = open(path, O_WRONLY, 0); + if (mbfd < 0 || + cursize == 0 + || flock(mbfd, LOCK_EX) < 0 || + fstat(mbfd, &sb) < 0 || + sb.st_size != cursize || + sb.st_nlink != 1 || + !S_ISREG(sb.st_mode) || + sb.st_dev != fsb.st_dev || + sb.st_ino != fsb.st_ino || + sb.st_uid != fsb.st_uid) + { + /* Don't use a bogus file */ + if (mbfd >= 0) + { + (void) close(mbfd); + mbfd = -1; + } + } + + /* Attempt to truncate back to pre-write size */ + goto err2; + } else + notifybiff(biffmsg); + + mailunlock(); + + (void)seteuid(saved_uid); + + if (lmtpmode) { + printf("250 2.1.5 %s OK\r\n", name); + } +} + +static void +notifybiff(msg) + char *msg; +{ + static struct sockaddr_in addr; + static int f = -1; + struct hostent *hp; + struct servent *sp; + int len; + + if (msg == NULL) { + /* Be silent if biff service not available. */ + if ((sp = getservbyname("biff", "udp")) == NULL) + return; + if ((hp = gethostbyname("localhost")) == NULL) { + warn("localhost: %s", strerror(errno)); + return; + } + addr.sin_family = hp->h_addrtype; + (void) memmove(&addr.sin_addr, hp->h_addr, hp->h_length); + addr.sin_port = sp->s_port; + return; + } + + if (addr.sin_family == 0) + return; /* did not initialize */ + + if (f < 0 && (f = socket(AF_INET, SOCK_DGRAM, 0)) == -1) { + warn("socket: %s", strerror(errno)); + return; + } + len = strlen(msg) + 1; + if (sendto(f, msg, len, 0, (struct sockaddr *)&addr, sizeof (addr)) + != len) + warn("sendto biff: %s", strerror(errno)); +} + +static void +usage() +{ + eval = EX_USAGE; + err("usage: mail.local [-l] [-f from] user ..."); +} + +static void +/*VARARGS2*/ +#ifdef __STDC__ +mailerr(const char *hdr, const char *fmt, ...) +#else +mailerr(hdr, fmt, va_alist) + const char *hdr; + const char *fmt; + va_dcl +#endif +{ + va_list ap; + +#ifdef __STDC__ + va_start(ap, fmt); +#else + va_start(ap); +#endif + if (lmtpmode) + { + if (hdr != NULL) + printf("%s ", hdr); + vprintf(fmt, ap); + printf("\r\n"); + } + else + { + e_to_sys(errno); + vwarn(fmt, ap); + } +} + +static void +/*VARARGS1*/ +#ifdef __STDC__ +err(const char *fmt, ...) +#else +err(fmt, va_alist) + const char *fmt; + va_dcl +#endif +{ + va_list ap; + +#ifdef __STDC__ + va_start(ap, fmt); +#else + va_start(ap); +#endif + vwarn(fmt, ap); + va_end(ap); + + exit(eval); +} + +static void +/*VARARGS1*/ +#ifdef __STDC__ +warn(const char *fmt, ...) +#else +warn(fmt, va_alist) + const char *fmt; + va_dcl +#endif +{ + va_list ap; + +#ifdef __STDC__ + va_start(ap, fmt); +#else + va_start(ap); +#endif + vwarn(fmt, ap); + va_end(ap); +} + +static void +vwarn(fmt, ap) + const char *fmt; + va_list ap; +{ + /* + * Log the message to stderr. + * + * Don't use LOG_PERROR as an openlog() flag to do this, + * it's not portable enough. + */ + if (eval != EX_USAGE) + (void) fprintf(stderr, "mail.local: "); + (void) vfprintf(stderr, fmt, ap); + (void) fprintf(stderr, "\n"); + + /* Log the message to syslog. */ + vsyslog(LOG_ERR, fmt, ap); +} + +/* + * e_to_sys -- + * Guess which errno's are temporary. Gag me. + */ +static void +e_to_sys(num) + int num; +{ + /* Temporary failures override hard errors. */ + if (eval == EX_TEMPFAIL) + return; + + switch (num) /* Hopefully temporary errors. */ + { +#ifdef EDQUOT + case EDQUOT: /* Disc quota exceeded */ + if (bouncequota) + { + eval = EX_UNAVAILABLE; + break; + } +#endif /* EDQUOT */ +#ifdef EAGAIN + /* FALLTHROUGH */ + case EAGAIN: /* Resource temporarily unavailable */ +#endif +#ifdef EBUSY + case EBUSY: /* Device busy */ +#endif +#ifdef EPROCLIM + case EPROCLIM: /* Too many processes */ +#endif +#ifdef EUSERS + case EUSERS: /* Too many users */ +#endif +#ifdef ECONNABORTED + case ECONNABORTED: /* Software caused connection abort */ +#endif +#ifdef ECONNREFUSED + case ECONNREFUSED: /* Connection refused */ +#endif +#ifdef ECONNRESET + case ECONNRESET: /* Connection reset by peer */ +#endif +#ifdef EDEADLK + case EDEADLK: /* Resource deadlock avoided */ +#endif +#ifdef EFBIG + case EFBIG: /* File too large */ +#endif +#ifdef EHOSTDOWN + case EHOSTDOWN: /* Host is down */ +#endif +#ifdef EHOSTUNREACH + case EHOSTUNREACH: /* No route to host */ +#endif +#ifdef EMFILE + case EMFILE: /* Too many open files */ +#endif +#ifdef ENETDOWN + case ENETDOWN: /* Network is down */ +#endif +#ifdef ENETRESET + case ENETRESET: /* Network dropped connection on reset */ +#endif +#ifdef ENETUNREACH + case ENETUNREACH: /* Network is unreachable */ +#endif +#ifdef ENFILE + case ENFILE: /* Too many open files in system */ +#endif +#ifdef ENOBUFS + case ENOBUFS: /* No buffer space available */ +#endif +#ifdef ENOMEM + case ENOMEM: /* Cannot allocate memory */ +#endif +#ifdef ENOSPC + case ENOSPC: /* No space left on device */ +#endif +#ifdef EROFS + case EROFS: /* Read-only file system */ +#endif +#ifdef ESTALE + case ESTALE: /* Stale NFS file handle */ +#endif +#ifdef ETIMEDOUT + case ETIMEDOUT: /* Connection timed out */ +#endif +#if defined(EWOULDBLOCK) && (EWOULDBLOCK != EAGAIN) + case EWOULDBLOCK: /* Operation would block. */ +#endif + eval = EX_TEMPFAIL; + break; + default: + eval = EX_UNAVAILABLE; + break; + } +} |
