Commit | Line | Data |
---|---|---|
f67beddd MS |
1 | /* |
2 | * Copyright (c) 2008 The DragonFly Project. All rights reserved. | |
3 | * | |
4 | * This code is derived from software contributed to The DragonFly Project | |
5 | * by Matthias Schmidt <matthias@dragonflybsd.org>, University of Marburg, | |
6 | * Germany. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * | |
12 | * 1. Redistributions of source code must retain the above copyright | |
13 | * notice, this list of conditions and the following disclaimer. | |
14 | * 2. Redistributions in binary form must reproduce the above copyright | |
15 | * notice, this list of conditions and the following disclaimer in | |
16 | * the documentation and/or other materials provided with the | |
17 | * distribution. | |
18 | * 3. Neither the name of The DragonFly Project nor the names of its | |
19 | * contributors may be used to endorse or promote products derived | |
20 | * from this software without specific, prior written permission. | |
21 | * | |
22 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | |
23 | * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | |
24 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS | |
25 | * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | |
26 | * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, | |
27 | * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, | |
28 | * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
29 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED | |
30 | * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | |
31 | * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | |
32 | * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
33 | * SUCH DAMAGE. | |
34 | * | |
bc7baf1d | 35 | * $DragonFly: src/libexec/dma/net.c,v 1.9 2008/09/30 17:47:21 swildner Exp $ |
f67beddd MS |
36 | */ |
37 | ||
38 | #include <sys/param.h> | |
39 | #include <sys/queue.h> | |
40 | #include <sys/stat.h> | |
41 | #include <sys/types.h> | |
42 | #include <sys/socket.h> | |
43 | #include <netinet/in.h> | |
44 | #include <arpa/inet.h> | |
45 | ||
46 | #ifdef HAVE_CRYPTO | |
47 | #include <openssl/ssl.h> | |
48 | #endif /* HAVE_CRYPTO */ | |
49 | ||
bc7baf1d | 50 | #include <err.h> |
a5a8a1a4 | 51 | #include <errno.h> |
f67beddd MS |
52 | #include <netdb.h> |
53 | #include <setjmp.h> | |
54 | #include <signal.h> | |
55 | #include <syslog.h> | |
56 | #include <unistd.h> | |
57 | ||
58 | #include "dma.h" | |
59 | ||
60 | extern struct config *config; | |
61 | extern struct authusers authusers; | |
62 | static jmp_buf timeout_alarm; | |
a5a8a1a4 | 63 | char neterr[BUF_SIZE]; |
f67beddd MS |
64 | |
65 | static void | |
dba19026 | 66 | sig_alarm(int signo __unused) |
f67beddd MS |
67 | { |
68 | longjmp(timeout_alarm, 1); | |
69 | } | |
70 | ||
71 | ssize_t | |
72 | send_remote_command(int fd, const char* fmt, ...) | |
73 | { | |
74 | va_list va; | |
75 | char cmd[4096]; | |
2922fd2b SS |
76 | size_t len, pos; |
77 | int s; | |
78 | ssize_t n; | |
f67beddd MS |
79 | |
80 | va_start(va, fmt); | |
2922fd2b SS |
81 | s = vsnprintf(cmd, sizeof(cmd) - 2, fmt, va); |
82 | va_end(va); | |
83 | if (s == sizeof(cmd) - 2 || s < 0) | |
84 | errx(1, "Internal error: oversized command string"); | |
85 | /* We *know* there are at least two more bytes available */ | |
86 | strcat(cmd, "\r\n"); | |
87 | len = strlen(cmd); | |
f67beddd MS |
88 | |
89 | if (((config->features & SECURETRANS) != 0) && | |
6ef9fe01 | 90 | ((config->features & NOSSL) == 0)) { |
2922fd2b SS |
91 | while ((s = SSL_write(config->ssl, (const char*)cmd, len)) <= 0) { |
92 | s = SSL_get_error(config->ssl, s); | |
93 | if (s != SSL_ERROR_WANT_READ && | |
94 | s != SSL_ERROR_WANT_WRITE) | |
95 | return (-1); | |
96 | } | |
f67beddd MS |
97 | } |
98 | else { | |
2922fd2b SS |
99 | pos = 0; |
100 | while (pos < len) { | |
101 | n = write(fd, cmd + pos, len - pos); | |
102 | if (n < 0) | |
103 | return (-1); | |
104 | pos += n; | |
105 | } | |
f67beddd | 106 | } |
f67beddd | 107 | |
2922fd2b | 108 | return (len); |
f67beddd MS |
109 | } |
110 | ||
6ef9fe01 | 111 | int |
7b68d8ae | 112 | read_remote(int fd, int extbufsize, char *extbuf) |
f67beddd | 113 | { |
6ef9fe01 MS |
114 | ssize_t rlen = 0; |
115 | size_t pos, len; | |
116 | char buff[BUF_SIZE]; | |
7b68d8ae | 117 | int done = 0, status = 0, extbufpos = 0; |
f67beddd MS |
118 | |
119 | if (signal(SIGALRM, sig_alarm) == SIG_ERR) { | |
a5a8a1a4 SS |
120 | snprintf(neterr, sizeof(neterr), "SIGALRM error: %s", |
121 | strerror(errno)); | |
122 | return (1); | |
f67beddd MS |
123 | } |
124 | if (setjmp(timeout_alarm) != 0) { | |
a5a8a1a4 | 125 | snprintf(neterr, sizeof(neterr), "Timeout reached"); |
f67beddd MS |
126 | return (1); |
127 | } | |
128 | alarm(CON_TIMEOUT); | |
129 | ||
130 | /* | |
6ef9fe01 MS |
131 | * Remote reading code from femail.c written by Henning Brauer of |
132 | * OpenBSD and released under a BSD style license. | |
f67beddd | 133 | */ |
6ef9fe01 | 134 | for (len = pos = 0; !done; ) { |
7b68d8ae | 135 | rlen = 0; |
6ef9fe01 MS |
136 | if (pos == 0 || |
137 | (pos > 0 && memchr(buff + pos, '\n', len - pos) == NULL)) { | |
138 | memmove(buff, buff + pos, len - pos); | |
139 | len -= pos; | |
140 | pos = 0; | |
141 | if (((config->features & SECURETRANS) != 0) && | |
142 | (config->features & NOSSL) == 0) { | |
143 | if ((rlen = SSL_read(config->ssl, buff + len, | |
144 | sizeof(buff) - len)) == -1) | |
145 | err(1, "read"); | |
146 | } else { | |
147 | if ((rlen = read(fd, buff + len, | |
148 | sizeof(buff) - len)) == -1) | |
149 | err(1, "read"); | |
150 | } | |
151 | len += rlen; | |
152 | } | |
7b68d8ae MS |
153 | /* |
154 | * If there is an external buffer with a size bigger than zero | |
155 | * and as long as there is space in the external buffer and | |
156 | * there are new characters read from the mailserver | |
157 | * copy them to the external buffer | |
158 | */ | |
159 | if (extbufpos <= (extbufsize - 1) && rlen && extbufsize > 0 | |
160 | && extbuf != NULL) { | |
161 | /* do not write over the bounds of the buffer */ | |
162 | if(extbufpos + rlen > (extbufsize - 1)) { | |
163 | rlen = extbufsize - extbufpos; | |
164 | } | |
165 | memcpy(extbuf + extbufpos, buff + len - rlen, rlen); | |
166 | extbufpos += rlen; | |
167 | } | |
6ef9fe01 MS |
168 | for (; pos < len && buff[pos] >= '0' && buff[pos] <= '9'; pos++) |
169 | ; /* Do nothing */ | |
f67beddd | 170 | |
6ef9fe01 MS |
171 | if (pos == len) |
172 | return (0); | |
f67beddd | 173 | |
6ef9fe01 MS |
174 | if (buff[pos] == ' ') |
175 | done = 1; | |
176 | else if (buff[pos] != '-') | |
177 | syslog(LOG_ERR, "invalid syntax in reply from server"); | |
f67beddd | 178 | |
6ef9fe01 MS |
179 | /* skip up to \n */ |
180 | for (; pos < len && buff[pos - 1] != '\n'; pos++) | |
181 | ; /* Do nothing */ | |
f67beddd | 182 | |
f67beddd | 183 | } |
6ef9fe01 MS |
184 | alarm(0); |
185 | ||
a5a8a1a4 SS |
186 | buff[len] = '\0'; |
187 | while (len > 0 && (buff[len - 1] == '\r' || buff[len - 1] == '\n')) | |
188 | buff[--len] = '\0'; | |
189 | snprintf(neterr, sizeof(neterr), "%s", buff); | |
6ef9fe01 MS |
190 | status = atoi(buff); |
191 | return (status/100); | |
f67beddd MS |
192 | } |
193 | ||
194 | /* | |
195 | * Handle SMTP authentication | |
f67beddd MS |
196 | */ |
197 | static int | |
198 | smtp_login(struct qitem *it, int fd, char *login, char* password) | |
199 | { | |
f67beddd | 200 | char *temp; |
6ef9fe01 | 201 | int len, res = 0; |
f67beddd | 202 | |
7b68d8ae MS |
203 | #ifdef HAVE_CRYPTO |
204 | res = smtp_auth_md5(it, fd, login, password); | |
205 | if (res == 0) { | |
206 | return (0); | |
207 | } else if (res == -2) { | |
208 | /* | |
209 | * If the return code is -2, then then the login attempt failed, | |
210 | * do not try other login mechanisms | |
211 | */ | |
212 | return (-1); | |
f67beddd | 213 | } |
7b68d8ae | 214 | #endif /* HAVE_CRYPTO */ |
f67beddd | 215 | |
7b68d8ae MS |
216 | if ((config->features & INSECURE) != 0) { |
217 | /* Send AUTH command according to RFC 2554 */ | |
218 | send_remote_command(fd, "AUTH LOGIN"); | |
219 | if (read_remote(fd, 0, NULL) != 3) { | |
220 | syslog(LOG_ERR, "%s: remote delivery deferred:" | |
a5a8a1a4 SS |
221 | " AUTH login not available: %s", |
222 | it->queueid, neterr); | |
7b68d8ae MS |
223 | return (1); |
224 | } | |
f67beddd | 225 | |
7b68d8ae MS |
226 | len = base64_encode(login, strlen(login), &temp); |
227 | if (len <= 0) | |
228 | return (-1); | |
f67beddd | 229 | |
7b68d8ae MS |
230 | send_remote_command(fd, "%s", temp); |
231 | if (read_remote(fd, 0, NULL) != 3) { | |
232 | syslog(LOG_ERR, "%s: remote delivery deferred:" | |
a5a8a1a4 SS |
233 | " AUTH login failed: %s", it->queueid, |
234 | neterr); | |
7b68d8ae MS |
235 | return (-1); |
236 | } | |
f67beddd | 237 | |
7b68d8ae MS |
238 | len = base64_encode(password, strlen(password), &temp); |
239 | if (len <= 0) | |
240 | return (-1); | |
241 | ||
242 | send_remote_command(fd, "%s", temp); | |
243 | res = read_remote(fd, 0, NULL); | |
244 | if (res == 5) { | |
245 | syslog(LOG_ERR, "%s: remote delivery failed:" | |
a5a8a1a4 SS |
246 | " Authentication failed: %s", |
247 | it->queueid, neterr); | |
7b68d8ae MS |
248 | return (-1); |
249 | } else if (res != 2) { | |
250 | syslog(LOG_ERR, "%s: remote delivery failed:" | |
a5a8a1a4 SS |
251 | " AUTH password failed: %s", |
252 | it->queueid, neterr); | |
7b68d8ae MS |
253 | return (-1); |
254 | } | |
255 | } else { | |
256 | syslog(LOG_ERR, "%s: non-encrypted SMTP login is disabled in config, so skipping it. ", | |
257 | it->queueid); | |
258 | return (1); | |
f67beddd MS |
259 | } |
260 | ||
261 | return (0); | |
262 | } | |
263 | ||
264 | static int | |
265 | open_connection(struct qitem *it, const char *host) | |
266 | { | |
f67beddd MS |
267 | struct addrinfo hints, *res, *res0; |
268 | char servname[128]; | |
269 | const char *errmsg = NULL; | |
f67beddd MS |
270 | int fd, error = 0, port; |
271 | ||
dba19026 | 272 | if (config->port != 0) |
f67beddd MS |
273 | port = config->port; |
274 | else | |
275 | port = SMTP_PORT; | |
276 | ||
7b68d8ae | 277 | /* FIXME get MX record of host */ |
f67beddd MS |
278 | /* Shamelessly taken from getaddrinfo(3) */ |
279 | memset(&hints, 0, sizeof(hints)); | |
280 | hints.ai_family = PF_UNSPEC; | |
281 | hints.ai_socktype = SOCK_STREAM; | |
282 | hints.ai_protocol = IPPROTO_TCP; | |
283 | ||
284 | snprintf(servname, sizeof(servname), "%d", port); | |
285 | error = getaddrinfo(host, servname, &hints, &res0); | |
286 | if (error) { | |
287 | syslog(LOG_ERR, "%s: remote delivery deferred: " | |
288 | "%s: %m", it->queueid, gai_strerror(error)); | |
289 | return (-1); | |
290 | } | |
291 | fd = -1; | |
292 | for (res = res0; res; res = res->ai_next) { | |
293 | fd=socket(res->ai_family, res->ai_socktype, res->ai_protocol); | |
294 | if (fd < 0) { | |
295 | errmsg = "socket failed"; | |
296 | continue; | |
297 | } | |
298 | if (connect(fd, res->ai_addr, res->ai_addrlen) < 0) { | |
299 | errmsg = "connect failed"; | |
300 | close(fd); | |
301 | fd = -1; | |
302 | continue; | |
303 | } | |
304 | break; | |
305 | } | |
306 | if (fd < 0) { | |
307 | syslog(LOG_ERR, "%s: remote delivery deferred: %s (%s:%s)", | |
308 | it->queueid, errmsg, host, servname); | |
309 | freeaddrinfo(res0); | |
310 | return (-1); | |
311 | } | |
312 | freeaddrinfo(res0); | |
f67beddd MS |
313 | return (fd); |
314 | } | |
315 | ||
316 | int | |
39f7c85a | 317 | deliver_remote(struct qitem *it, char **errmsg) |
f67beddd MS |
318 | { |
319 | struct authuser *a; | |
6ef9fe01 MS |
320 | char *host, line[1000]; |
321 | int fd, error = 0, do_auth = 0, res = 0; | |
f67beddd MS |
322 | size_t linelen; |
323 | ||
324 | host = strrchr(it->addr, '@'); | |
325 | /* Should not happen */ | |
39f7c85a SS |
326 | if (host == NULL) { |
327 | asprintf(errmsg, "Internal error: badly formed address %s", | |
328 | it->addr); | |
f67beddd | 329 | return(-1); |
39f7c85a | 330 | } else { |
f67beddd MS |
331 | /* Step over the @ */ |
332 | host++; | |
39f7c85a | 333 | } |
f67beddd MS |
334 | |
335 | /* Smarthost support? */ | |
336 | if (config->smarthost != NULL && strlen(config->smarthost) > 0) { | |
4a23bd3d MS |
337 | syslog(LOG_INFO, "%s: using smarthost (%s:%i)", |
338 | it->queueid, config->smarthost, config->port); | |
f67beddd MS |
339 | host = config->smarthost; |
340 | } | |
341 | ||
342 | fd = open_connection(it, host); | |
343 | if (fd < 0) | |
4a23bd3d | 344 | return (1); |
f67beddd | 345 | |
6ef9fe01 MS |
346 | /* Check first reply from remote host */ |
347 | config->features |= NOSSL; | |
7b68d8ae | 348 | res = read_remote(fd, 0, NULL); |
6ef9fe01 MS |
349 | if (res != 2) { |
350 | syslog(LOG_INFO, "%s: Invalid initial response: %i", | |
351 | it->queueid, res); | |
352 | return(1); | |
353 | } | |
354 | config->features &= ~NOSSL; | |
355 | ||
f67beddd MS |
356 | #ifdef HAVE_CRYPTO |
357 | if ((config->features & SECURETRANS) != 0) { | |
358 | error = smtp_init_crypto(it, fd, config->features); | |
359 | if (error >= 0) | |
0ca0cd25 | 360 | syslog(LOG_INFO, "%s: SSL initialization successful", |
f67beddd MS |
361 | it->queueid); |
362 | else | |
363 | goto out; | |
364 | } | |
365 | ||
366 | /* | |
367 | * If the user doesn't want STARTTLS, but SSL encryption, we | |
368 | * have to enable SSL first, then send EHLO | |
369 | */ | |
370 | if (((config->features & STARTTLS) == 0) && | |
371 | ((config->features & SECURETRANS) != 0)) { | |
372 | send_remote_command(fd, "EHLO %s", hostname()); | |
7b68d8ae | 373 | if (read_remote(fd, 0, NULL) != 2) { |
f67beddd | 374 | syslog(LOG_ERR, "%s: remote delivery deferred: " |
a5a8a1a4 | 375 | " EHLO failed: %s", it->queueid, neterr); |
39f7c85a SS |
376 | asprintf(errmsg, "%s did not like our EHLO:\n%s", |
377 | host, neterr); | |
f67beddd MS |
378 | return (-1); |
379 | } | |
380 | } | |
381 | #endif /* HAVE_CRYPTO */ | |
382 | if (((config->features & SECURETRANS) == 0)) { | |
383 | send_remote_command(fd, "EHLO %s", hostname()); | |
7b68d8ae | 384 | if (read_remote(fd, 0, NULL) != 2) { |
f67beddd | 385 | syslog(LOG_ERR, "%s: remote delivery deferred: " |
a5a8a1a4 | 386 | " EHLO failed: %s", it->queueid, neterr); |
39f7c85a SS |
387 | asprintf(errmsg, "%s did not like our EHLO:\n%s", |
388 | host, neterr); | |
f67beddd MS |
389 | return (-1); |
390 | } | |
391 | } | |
392 | ||
393 | /* | |
394 | * Use SMTP authentication if the user defined an entry for the remote | |
395 | * or smarthost | |
396 | */ | |
397 | SLIST_FOREACH(a, &authusers, next) { | |
398 | if (strcmp(a->host, host) == 0) { | |
399 | do_auth = 1; | |
400 | break; | |
401 | } | |
402 | } | |
403 | ||
404 | if (do_auth == 1) { | |
b558d098 MS |
405 | /* |
406 | * Check if the user wants plain text login without using | |
407 | * encryption. | |
408 | */ | |
7b68d8ae | 409 | syslog(LOG_INFO, "%s: Use SMTP authentication", |
f67beddd | 410 | it->queueid); |
7b68d8ae MS |
411 | error = smtp_login(it, fd, a->login, a->password); |
412 | if (error < 0) { | |
413 | syslog(LOG_ERR, "%s: remote delivery failed:" | |
b558d098 | 414 | " SMTP login failed: %m", it->queueid); |
39f7c85a | 415 | asprintf(errmsg, "SMTP login to %s failed", host); |
4a23bd3d | 416 | return (-1); |
b558d098 | 417 | } |
7b68d8ae MS |
418 | /* SMTP login is not available, so try without */ |
419 | else if (error > 0) | |
420 | syslog(LOG_ERR, "%s: SMTP login not available." | |
421 | " Try without", it->queueid); | |
f67beddd MS |
422 | } |
423 | ||
7dfd2fd8 SS |
424 | #define READ_REMOTE_CHECK(c, exp) \ |
425 | res = read_remote(fd, 0, NULL); \ | |
426 | if (res == 5) { \ | |
427 | syslog(LOG_ERR, "%s: remote delivery failed: " \ | |
428 | c " failed: %s", it->queueid, neterr); \ | |
39f7c85a SS |
429 | asprintf(errmsg, "%s did not like our " c ":\n%s", \ |
430 | host, neterr); \ | |
7dfd2fd8 SS |
431 | return (-1); \ |
432 | } else if (res != exp) { \ | |
433 | syslog(LOG_ERR, "%s: remote delivery deferred: " \ | |
434 | c " failed: %s", it->queueid, neterr); \ | |
435 | return (1); \ | |
f67beddd MS |
436 | } |
437 | ||
7dfd2fd8 SS |
438 | send_remote_command(fd, "MAIL FROM:<%s>", it->sender); |
439 | READ_REMOTE_CHECK("MAIL FROM", 2); | |
440 | ||
4a23bd3d | 441 | send_remote_command(fd, "RCPT TO:<%s>", it->addr); |
7dfd2fd8 | 442 | READ_REMOTE_CHECK("RCPT TO", 2); |
f67beddd MS |
443 | |
444 | send_remote_command(fd, "DATA"); | |
7dfd2fd8 | 445 | READ_REMOTE_CHECK("DATA", 3); |
f67beddd MS |
446 | |
447 | if (fseek(it->queuef, it->hdrlen, SEEK_SET) != 0) { | |
a5a8a1a4 SS |
448 | syslog(LOG_ERR, "%s: remote delivery deferred: cannot seek: %s", |
449 | it->queueid, neterr); | |
f67beddd MS |
450 | return (1); |
451 | } | |
452 | ||
453 | while (!feof(it->queuef)) { | |
454 | if (fgets(line, sizeof(line), it->queuef) == NULL) | |
455 | break; | |
456 | linelen = strlen(line); | |
457 | if (linelen == 0 || line[linelen - 1] != '\n') { | |
458 | syslog(LOG_CRIT, "%s: remote delivery failed:" | |
459 | "corrupted queue file", it->queueid); | |
39f7c85a | 460 | *errmsg = strdup("corrupted queue file"); |
f67beddd MS |
461 | error = -1; |
462 | goto out; | |
463 | } | |
464 | ||
465 | /* Remove trailing \n's and escape leading dots */ | |
466 | trim_line(line); | |
467 | ||
468 | /* | |
469 | * If the first character is a dot, we escape it so the line | |
470 | * length increases | |
471 | */ | |
472 | if (line[0] == '.') | |
473 | linelen++; | |
474 | ||
475 | if (send_remote_command(fd, "%s", line) != (ssize_t)linelen+1) { | |
476 | syslog(LOG_ERR, "%s: remote delivery deferred: " | |
477 | "write error", it->queueid); | |
478 | error = 1; | |
479 | goto out; | |
480 | } | |
481 | } | |
482 | ||
483 | send_remote_command(fd, "."); | |
7dfd2fd8 | 484 | READ_REMOTE_CHECK("final DATA", 2); |
f67beddd MS |
485 | |
486 | send_remote_command(fd, "QUIT"); | |
6cfc247d SS |
487 | if (read_remote(fd, 0, NULL) != 2) |
488 | syslog(LOG_WARNING, "%s: remote delivery succeeded but " | |
a5a8a1a4 | 489 | "QUIT failed: %s", it->queueid, neterr); |
f67beddd MS |
490 | out: |
491 | ||
492 | close(fd); | |
493 | return (error); | |
494 | } | |
495 |