| 1 | /* $Id: client.c,v 1.691 2011/06/28 00:13:48 sbajic Exp $ */ |
|---|
| 2 | |
|---|
| 3 | /* |
|---|
| 4 | DSPAM |
|---|
| 5 | COPYRIGHT (C) 2002-2012 DSPAM PROJECT |
|---|
| 6 | |
|---|
| 7 | This program is free software: you can redistribute it and/or modify |
|---|
| 8 | it under the terms of the GNU Affero General Public License as |
|---|
| 9 | published by the Free Software Foundation, either version 3 of the |
|---|
| 10 | License, or (at your option) any later version. |
|---|
| 11 | |
|---|
| 12 | This program is distributed in the hope that it will be useful, |
|---|
| 13 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
|---|
| 14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|---|
| 15 | GNU Affero General Public License for more details. |
|---|
| 16 | |
|---|
| 17 | You should have received a copy of the GNU Affero General Public License |
|---|
| 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
|---|
| 19 | |
|---|
| 20 | */ |
|---|
| 21 | |
|---|
| 22 | /* |
|---|
| 23 | * client.c - client-based functions (for operating in client/daemon mode)c |
|---|
| 24 | * |
|---|
| 25 | * DESCRIPTION |
|---|
| 26 | * Client-based functions are called when --client is specified on the |
|---|
| 27 | * commandline or by dspamc (where --client is inferred). The client |
|---|
| 28 | * functions connect to a DSPAM server for processing (rather than the |
|---|
| 29 | * usual behavior which is to process the message itself). Client |
|---|
| 30 | * functions are also used when delivering via LMTP or SMTP. |
|---|
| 31 | */ |
|---|
| 32 | |
|---|
| 33 | #ifdef HAVE_CONFIG_H |
|---|
| 34 | #include <auto-config.h> |
|---|
| 35 | #endif |
|---|
| 36 | |
|---|
| 37 | #ifdef DAEMON |
|---|
| 38 | |
|---|
| 39 | #include <string.h> |
|---|
| 40 | #include <stdlib.h> |
|---|
| 41 | #include <ctype.h> |
|---|
| 42 | #include <errno.h> |
|---|
| 43 | #include <error.h> |
|---|
| 44 | #include <sys/types.h> |
|---|
| 45 | #include <sys/stat.h> |
|---|
| 46 | #include <sys/un.h> |
|---|
| 47 | #include <sys/socket.h> |
|---|
| 48 | #include <netdb.h> |
|---|
| 49 | #include <netinet/in.h> |
|---|
| 50 | #include <netinet/tcp.h> |
|---|
| 51 | #include <arpa/inet.h> |
|---|
| 52 | #ifndef _WIN32 |
|---|
| 53 | #include <unistd.h> |
|---|
| 54 | #include <pwd.h> |
|---|
| 55 | #endif |
|---|
| 56 | #include <stdio.h> |
|---|
| 57 | #include <stdlib.h> |
|---|
| 58 | #include <sysexits.h> |
|---|
| 59 | |
|---|
| 60 | #include "client.h" |
|---|
| 61 | #include "dspam.h" |
|---|
| 62 | #include "config.h" |
|---|
| 63 | #include "util.h" |
|---|
| 64 | #include "language.h" |
|---|
| 65 | #include "buffer.h" |
|---|
| 66 | |
|---|
| 67 | /* |
|---|
| 68 | * client_process(AGENT_CTX *, buffer *) |
|---|
| 69 | * |
|---|
| 70 | * DESCRIPTION |
|---|
| 71 | * connect to a dspam daemon socket and attempt to process a message |
|---|
| 72 | * this function is called by the dspam agent when --client is specified |
|---|
| 73 | * |
|---|
| 74 | * INPUT ARGUMENTS |
|---|
| 75 | * ATX agent context |
|---|
| 76 | * message message to be processed |
|---|
| 77 | * |
|---|
| 78 | * RETURN VALUES |
|---|
| 79 | * returns 0 on success |
|---|
| 80 | */ |
|---|
| 81 | |
|---|
| 82 | int client_process(AGENT_CTX *ATX, buffer *message) { |
|---|
| 83 | char buf[1024], err[256]; |
|---|
| 84 | struct nt_node *node_nt; |
|---|
| 85 | struct nt_c c_nt; |
|---|
| 86 | int exitcode = 0, msglen; |
|---|
| 87 | THREAD_CTX TTX; |
|---|
| 88 | int i; |
|---|
| 89 | |
|---|
| 90 | TTX.sockfd = client_connect(ATX, 0); |
|---|
| 91 | if (TTX.sockfd <0) { |
|---|
| 92 | LOG(LOG_WARNING, ERR_CLIENT_CONNECT); |
|---|
| 93 | STATUS(ERR_CLIENT_CONNECT); |
|---|
| 94 | return TTX.sockfd; |
|---|
| 95 | } |
|---|
| 96 | |
|---|
| 97 | TTX.packet_buffer = buffer_create(NULL); |
|---|
| 98 | if (TTX.packet_buffer == NULL) |
|---|
| 99 | goto BAIL; |
|---|
| 100 | |
|---|
| 101 | /* LHLO / MAIL FROM - Authenticate on the server */ |
|---|
| 102 | |
|---|
| 103 | if (client_authenticate(&TTX, ATX->client_args)<0) { |
|---|
| 104 | LOG(LOG_WARNING, ERR_CLIENT_AUTH_FAILED); |
|---|
| 105 | STATUS(ERR_CLIENT_AUTH_FAILED); |
|---|
| 106 | goto QUIT; |
|---|
| 107 | } |
|---|
| 108 | |
|---|
| 109 | /* RCPT TO - Send recipient information */ |
|---|
| 110 | |
|---|
| 111 | strcpy(buf, "RCPT TO: "); |
|---|
| 112 | node_nt = c_nt_first(ATX->users, &c_nt); |
|---|
| 113 | while(node_nt != NULL) { |
|---|
| 114 | const char *ptr = (const char *) node_nt->ptr; |
|---|
| 115 | snprintf(buf, sizeof(buf), "RCPT TO: <%s>", ptr); |
|---|
| 116 | if (send_socket(&TTX, buf)<=0) { |
|---|
| 117 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 118 | goto BAIL; |
|---|
| 119 | } |
|---|
| 120 | |
|---|
| 121 | if (client_getcode(&TTX, err, sizeof(err))!=LMTP_OK) { |
|---|
| 122 | STATUS("%s", err); |
|---|
| 123 | goto QUIT; |
|---|
| 124 | } |
|---|
| 125 | |
|---|
| 126 | node_nt = c_nt_next(ATX->users, &c_nt); |
|---|
| 127 | } |
|---|
| 128 | |
|---|
| 129 | /* DATA - Send message */ |
|---|
| 130 | |
|---|
| 131 | if (send_socket(&TTX, "DATA")<=0) |
|---|
| 132 | goto BAIL; |
|---|
| 133 | |
|---|
| 134 | if (client_getcode(&TTX, err, sizeof(err))!=LMTP_DATA) { |
|---|
| 135 | STATUS("%s", err); |
|---|
| 136 | goto QUIT; |
|---|
| 137 | } |
|---|
| 138 | |
|---|
| 139 | i = 0; |
|---|
| 140 | msglen = strlen(message->data); |
|---|
| 141 | while(i<msglen) { |
|---|
| 142 | int r; |
|---|
| 143 | int t; |
|---|
| 144 | int buflen; |
|---|
| 145 | |
|---|
| 146 | /* |
|---|
| 147 | * fill buf with partial msg, replacing \n with \r\n |
|---|
| 148 | * and do dot stuffing, if needed. |
|---|
| 149 | */ |
|---|
| 150 | buflen = 0; |
|---|
| 151 | while ((size_t)buflen < (sizeof(buf) - 4) && i < msglen) { |
|---|
| 152 | if (i > 0) { |
|---|
| 153 | if (message->data[i] == '\n') { |
|---|
| 154 | /* only replace \n and not \r\n */ |
|---|
| 155 | if (message->data[i - 1] != '\r') { |
|---|
| 156 | buf[buflen] = '\r'; |
|---|
| 157 | buflen++; |
|---|
| 158 | } |
|---|
| 159 | /* take care of dot stuffing \n */ |
|---|
| 160 | if (message->data[i + 1] && message->data[i + 1] == '.') { |
|---|
| 161 | buf[buflen] = '\n'; |
|---|
| 162 | buflen++; |
|---|
| 163 | buf[buflen] = '.'; |
|---|
| 164 | buflen++; |
|---|
| 165 | buf[buflen] = '.'; |
|---|
| 166 | buflen++; |
|---|
| 167 | i += 2; |
|---|
| 168 | continue; |
|---|
| 169 | } |
|---|
| 170 | } |
|---|
| 171 | } |
|---|
| 172 | |
|---|
| 173 | buf[buflen] = message->data[i]; |
|---|
| 174 | buflen++; |
|---|
| 175 | i++; |
|---|
| 176 | } |
|---|
| 177 | |
|---|
| 178 | /* send buf */ |
|---|
| 179 | t = 0; |
|---|
| 180 | while (t < buflen) { |
|---|
| 181 | r = send(TTX.sockfd, buf+t, buflen - t, 0); |
|---|
| 182 | if (r <= 0) { |
|---|
| 183 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 184 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 185 | goto BAIL; |
|---|
| 186 | } |
|---|
| 187 | t += r; |
|---|
| 188 | } |
|---|
| 189 | } |
|---|
| 190 | |
|---|
| 191 | if (message->data[msglen-1]!= '\n') { |
|---|
| 192 | if (send_socket(&TTX, "")<=0) { |
|---|
| 193 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 194 | goto BAIL; |
|---|
| 195 | } |
|---|
| 196 | } |
|---|
| 197 | |
|---|
| 198 | if (send_socket(&TTX, ".")<=0) { |
|---|
| 199 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 200 | goto BAIL; |
|---|
| 201 | } |
|---|
| 202 | |
|---|
| 203 | /* Server response */ |
|---|
| 204 | |
|---|
| 205 | if (ATX->flags & DAF_STDOUT || ATX->flags & DAF_SUMMARY || |
|---|
| 206 | ATX->operating_mode == DSM_CLASSIFY) |
|---|
| 207 | { |
|---|
| 208 | char *line = NULL; |
|---|
| 209 | int head = !(ATX->flags & DAF_STDOUT); |
|---|
| 210 | |
|---|
| 211 | if (ATX->flags & DAF_SUMMARY) |
|---|
| 212 | head = 1; |
|---|
| 213 | |
|---|
| 214 | line = client_getline(&TTX, 300); |
|---|
| 215 | |
|---|
| 216 | while(line != NULL && strcmp(line, ".")) { |
|---|
| 217 | chomp(line); |
|---|
| 218 | if (!head) { |
|---|
| 219 | head = 1; |
|---|
| 220 | if (!strncmp(line, "250 ", 4)) { |
|---|
| 221 | free(line); |
|---|
| 222 | goto QUIT; |
|---|
| 223 | } |
|---|
| 224 | |
|---|
| 225 | if (!strcmp(line, "X-Daemon-Classification: SPAM") && |
|---|
| 226 | _ds_match_attribute(agent_config, "Broken", "returnCodes")) |
|---|
| 227 | { |
|---|
| 228 | exitcode = 99; |
|---|
| 229 | } |
|---|
| 230 | } else { |
|---|
| 231 | /* remove dot stuffing, if needed */ |
|---|
| 232 | if((line[0] && line[0]=='.') && (line[1] && line[1]=='.')) { |
|---|
| 233 | size_t i, len = strlen(line); |
|---|
| 234 | for(i=0;i<len;i++){ |
|---|
| 235 | line[i]=line[i+1]; |
|---|
| 236 | } |
|---|
| 237 | line[len-1]=0; |
|---|
| 238 | } |
|---|
| 239 | printf("%s\n", line); |
|---|
| 240 | } |
|---|
| 241 | free(line); |
|---|
| 242 | line = client_getline(&TTX, 300); |
|---|
| 243 | if (line) chomp(line); |
|---|
| 244 | } |
|---|
| 245 | free(line); |
|---|
| 246 | } else { |
|---|
| 247 | for(i=0;i<ATX->users->items;i++) { |
|---|
| 248 | char *input = client_getline(&TTX, 300); |
|---|
| 249 | char *x; |
|---|
| 250 | int code = 500; |
|---|
| 251 | |
|---|
| 252 | if (!input) { |
|---|
| 253 | goto BAIL; |
|---|
| 254 | } |
|---|
| 255 | x = strtok(input, " "); |
|---|
| 256 | if (x) { |
|---|
| 257 | code = atoi(x); |
|---|
| 258 | if (code != LMTP_OK) { |
|---|
| 259 | if (exitcode > 0) |
|---|
| 260 | exitcode = 0; |
|---|
| 261 | exitcode--; |
|---|
| 262 | } else { |
|---|
| 263 | if (_ds_match_attribute(agent_config, "Broken", "returnCodes")) { |
|---|
| 264 | x = strtok(NULL, ":"); |
|---|
| 265 | if (x) |
|---|
| 266 | x = strtok(NULL, ":"); |
|---|
| 267 | if (x && strstr(x, "SPAM") && exitcode == 0) |
|---|
| 268 | exitcode = 99; |
|---|
| 269 | } |
|---|
| 270 | } |
|---|
| 271 | } |
|---|
| 272 | } |
|---|
| 273 | } |
|---|
| 274 | |
|---|
| 275 | send_socket(&TTX, "QUIT"); |
|---|
| 276 | client_getcode(&TTX, err, sizeof(err)); |
|---|
| 277 | close(TTX.sockfd); |
|---|
| 278 | buffer_destroy(TTX.packet_buffer); |
|---|
| 279 | return exitcode; |
|---|
| 280 | |
|---|
| 281 | QUIT: |
|---|
| 282 | send_socket(&TTX, "QUIT"); |
|---|
| 283 | client_getcode(&TTX, err, sizeof(err)); |
|---|
| 284 | |
|---|
| 285 | BAIL: |
|---|
| 286 | exitcode = EFAILURE; |
|---|
| 287 | buffer_destroy(TTX.packet_buffer); |
|---|
| 288 | close(TTX.sockfd); |
|---|
| 289 | return exitcode; |
|---|
| 290 | } |
|---|
| 291 | |
|---|
| 292 | /* |
|---|
| 293 | * client_connect(AGENT_CTX ATX, int flags) |
|---|
| 294 | * |
|---|
| 295 | * DESCRIPTION |
|---|
| 296 | * establish a connection to a server |
|---|
| 297 | * |
|---|
| 298 | * INPUT ARGUMENTS |
|---|
| 299 | * ATX agent context |
|---|
| 300 | * flags connection flags |
|---|
| 301 | * |
|---|
| 302 | * FLAGS |
|---|
| 303 | * CCF_PROCESS Use ClientHost as destination |
|---|
| 304 | * CCF_DELIVERY Use DeliveryHost as destination |
|---|
| 305 | * |
|---|
| 306 | * RETURN VALUES |
|---|
| 307 | * returns 0 on success |
|---|
| 308 | */ |
|---|
| 309 | |
|---|
| 310 | int client_connect(AGENT_CTX *ATX, int flags) { |
|---|
| 311 | struct sockaddr_in addr; |
|---|
| 312 | struct sockaddr_un saun; |
|---|
| 313 | int sockfd; |
|---|
| 314 | int yes = 1; |
|---|
| 315 | int port = 24; |
|---|
| 316 | int domain = 0; |
|---|
| 317 | int addr_len; |
|---|
| 318 | char *host; |
|---|
| 319 | |
|---|
| 320 | if (flags & CCF_DELIVERY) { |
|---|
| 321 | host = _ds_read_attribute(agent_config, "DeliveryHost"); |
|---|
| 322 | |
|---|
| 323 | if (_ds_read_attribute(agent_config, "DeliveryPort")) |
|---|
| 324 | port = atoi(_ds_read_attribute(agent_config, "DeliveryPort")); |
|---|
| 325 | |
|---|
| 326 | if (ATX->recipient && ATX->recipient[0]) { |
|---|
| 327 | char *domain = strchr(ATX->recipient, '@'); |
|---|
| 328 | if (domain) { |
|---|
| 329 | char key[128]; |
|---|
| 330 | char lcdomain[strlen(ATX->recipient)]; |
|---|
| 331 | lc(lcdomain, domain+1); |
|---|
| 332 | snprintf(key, sizeof(key), "DeliveryHost.%s", lcdomain); |
|---|
| 333 | if (_ds_read_attribute(agent_config, key)) |
|---|
| 334 | host = _ds_read_attribute(agent_config, key); |
|---|
| 335 | snprintf(key, sizeof(key), "DeliveryPort.%s", lcdomain); |
|---|
| 336 | if (_ds_read_attribute(agent_config, key)) |
|---|
| 337 | port = atoi(_ds_read_attribute(agent_config, key)); |
|---|
| 338 | } |
|---|
| 339 | } |
|---|
| 340 | |
|---|
| 341 | if (host && host[0] == '/') |
|---|
| 342 | domain = 1; |
|---|
| 343 | |
|---|
| 344 | } else { |
|---|
| 345 | host = _ds_read_attribute(agent_config, "ClientHost"); |
|---|
| 346 | |
|---|
| 347 | if (_ds_read_attribute(agent_config, "ClientPort")) |
|---|
| 348 | port = atoi(_ds_read_attribute(agent_config, "ClientPort")); |
|---|
| 349 | |
|---|
| 350 | if (host && host[0] == '/') |
|---|
| 351 | domain = 1; |
|---|
| 352 | } |
|---|
| 353 | |
|---|
| 354 | if (host == NULL) { |
|---|
| 355 | LOG(LOG_CRIT, ERR_CLIENT_INVALID_CONFIG); |
|---|
| 356 | STATUS(ERR_CLIENT_INVALID_CONFIG); |
|---|
| 357 | return EINVAL; |
|---|
| 358 | } |
|---|
| 359 | |
|---|
| 360 | /* Connect (domain socket) */ |
|---|
| 361 | |
|---|
| 362 | if (domain) { |
|---|
| 363 | sockfd = socket(AF_UNIX, SOCK_STREAM, 0); |
|---|
| 364 | saun.sun_family = AF_UNIX; |
|---|
| 365 | strcpy(saun.sun_path, host); |
|---|
| 366 | addr_len = sizeof(saun.sun_family) + strlen(saun.sun_path) + 1; |
|---|
| 367 | |
|---|
| 368 | LOGDEBUG(INFO_CLIENT_CONNECTING, host, 0); |
|---|
| 369 | if(connect(sockfd, (struct sockaddr *)&saun, addr_len)<0) { |
|---|
| 370 | LOG(LOG_ERR, ERR_CLIENT_CONNECT_SOCKET, host, strerror(errno)); |
|---|
| 371 | STATUS("%s", strerror(errno)); |
|---|
| 372 | close(sockfd); |
|---|
| 373 | return EFAILURE; |
|---|
| 374 | } |
|---|
| 375 | |
|---|
| 376 | /* Connect (TCP socket) */ |
|---|
| 377 | |
|---|
| 378 | } else { |
|---|
| 379 | sockfd = socket(AF_INET, SOCK_STREAM, 0); |
|---|
| 380 | memset(&addr, 0, sizeof(struct sockaddr_in)); |
|---|
| 381 | addr.sin_family = AF_INET; |
|---|
| 382 | addr.sin_addr.s_addr = inet_addr(host); |
|---|
| 383 | addr.sin_port = htons(port); |
|---|
| 384 | addr_len = sizeof(struct sockaddr_in); |
|---|
| 385 | LOGDEBUG(INFO_CLIENT_CONNECTING, host, port); |
|---|
| 386 | if(connect(sockfd, (struct sockaddr *)&addr, addr_len)<0) { |
|---|
| 387 | LOG(LOG_ERR, ERR_CLIENT_CONNECT_HOST, host, port, strerror(errno)); |
|---|
| 388 | STATUS("%s", strerror(errno)); |
|---|
| 389 | close(sockfd); |
|---|
| 390 | return EFAILURE; |
|---|
| 391 | } |
|---|
| 392 | } |
|---|
| 393 | |
|---|
| 394 | LOGDEBUG(INFO_CLIENT_CONNECTED); |
|---|
| 395 | setsockopt(sockfd,SOL_SOCKET,TCP_NODELAY,&yes,sizeof(int)); |
|---|
| 396 | |
|---|
| 397 | return sockfd; |
|---|
| 398 | } |
|---|
| 399 | |
|---|
| 400 | /* |
|---|
| 401 | * client_authenticate(AGENT_CTX *ATX, const char *mode) |
|---|
| 402 | * |
|---|
| 403 | * DESCRIPTION |
|---|
| 404 | * greet and authenticate on a server |
|---|
| 405 | * |
|---|
| 406 | * INPUT ARGUMENTS |
|---|
| 407 | * ATX agent context |
|---|
| 408 | * mode processing mode |
|---|
| 409 | * |
|---|
| 410 | * NOTES |
|---|
| 411 | * the process mode is passed using the DSPAMPROCESSMODE service tag |
|---|
| 412 | * |
|---|
| 413 | * RETURN VALUES |
|---|
| 414 | * returns 0 on success |
|---|
| 415 | */ |
|---|
| 416 | |
|---|
| 417 | int client_authenticate(THREAD_CTX *TTX, const char *mode) { |
|---|
| 418 | char *ident = _ds_read_attribute(agent_config, "ClientIdent"); |
|---|
| 419 | char buf[1024], err[128]; |
|---|
| 420 | char *ptr; |
|---|
| 421 | char pmode[1024]; |
|---|
| 422 | |
|---|
| 423 | pmode[0] = 0; |
|---|
| 424 | if (mode) { |
|---|
| 425 | int pos = 0, cpos = 0; |
|---|
| 426 | for(;mode[cpos]&&(size_t)pos<(sizeof(pmode)-1);cpos++) { |
|---|
| 427 | if (mode[cpos] == '"') { |
|---|
| 428 | pmode[pos] = '\\'; |
|---|
| 429 | pos++; |
|---|
| 430 | } |
|---|
| 431 | pmode[pos] = mode[cpos]; |
|---|
| 432 | pos++; |
|---|
| 433 | } |
|---|
| 434 | pmode[pos] = 0; |
|---|
| 435 | } |
|---|
| 436 | |
|---|
| 437 | if (!ident || !strchr(ident, '@')) { |
|---|
| 438 | LOG(LOG_ERR, ERR_CLIENT_IDENT); |
|---|
| 439 | return EINVAL; |
|---|
| 440 | } |
|---|
| 441 | |
|---|
| 442 | ptr = client_expect(TTX, LMTP_GREETING, err, sizeof(err)); |
|---|
| 443 | if (ptr == NULL) { |
|---|
| 444 | LOG(LOG_ERR, ERR_CLIENT_WHILE_AUTH, err); |
|---|
| 445 | return EFAILURE; |
|---|
| 446 | } |
|---|
| 447 | free(ptr); |
|---|
| 448 | |
|---|
| 449 | snprintf(buf, sizeof(buf), "LHLO %s", strchr(ident, '@')+1); |
|---|
| 450 | if (send_socket(TTX, buf)<=0) |
|---|
| 451 | return EFAILURE; |
|---|
| 452 | |
|---|
| 453 | if (client_getcode(TTX, err, sizeof(err))!=LMTP_OK) { |
|---|
| 454 | return EFAILURE; |
|---|
| 455 | } |
|---|
| 456 | |
|---|
| 457 | if (mode) { |
|---|
| 458 | snprintf(buf, sizeof(buf), "MAIL FROM: <%s> DSPAMPROCESSMODE=\"%s\"", ident, pmode); |
|---|
| 459 | } else { |
|---|
| 460 | snprintf(buf, sizeof(buf), "MAIL FROM: <%s>", ident); |
|---|
| 461 | } |
|---|
| 462 | if (send_socket(TTX, buf)<=0) { |
|---|
| 463 | return EFAILURE; |
|---|
| 464 | } |
|---|
| 465 | |
|---|
| 466 | if (client_getcode(TTX, err, sizeof(err))!=LMTP_OK) { |
|---|
| 467 | LOG(LOG_ERR, ERR_CLIENT_AUTHENTICATE); |
|---|
| 468 | return EFAILURE; |
|---|
| 469 | } |
|---|
| 470 | |
|---|
| 471 | return 0; |
|---|
| 472 | } |
|---|
| 473 | |
|---|
| 474 | /* |
|---|
| 475 | * client_expect(THREAD_CTX *TTX, int code, char *err, size_t len) |
|---|
| 476 | * |
|---|
| 477 | * DESCRIPTION |
|---|
| 478 | * wait for the appropriate return code, then return |
|---|
| 479 | * |
|---|
| 480 | * INPUT ARGUMENTS |
|---|
| 481 | * ATX agent context |
|---|
| 482 | * code return code to wait for |
|---|
| 483 | * err error buffer |
|---|
| 484 | * len buffer len |
|---|
| 485 | * |
|---|
| 486 | * RETURN VALUES |
|---|
| 487 | * allocated pointer to acknowledgement line, NULL on error |
|---|
| 488 | * err buffer is populated on error |
|---|
| 489 | */ |
|---|
| 490 | |
|---|
| 491 | char * client_expect(THREAD_CTX *TTX, int code, char *err, size_t len) { |
|---|
| 492 | char *inp, *dup, *ptr, *ptrptr; |
|---|
| 493 | int recv_code; |
|---|
| 494 | |
|---|
| 495 | inp = client_getline(TTX, 300); |
|---|
| 496 | while(inp != NULL) { |
|---|
| 497 | recv_code = 0; |
|---|
| 498 | dup = strdup(inp); |
|---|
| 499 | if (!dup) { |
|---|
| 500 | free(inp); |
|---|
| 501 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
|---|
| 502 | strlcpy(err, ERR_MEM_ALLOC, len); |
|---|
| 503 | return NULL; |
|---|
| 504 | } |
|---|
| 505 | if (strncmp(dup, "250-", 4)) { |
|---|
| 506 | ptr = strtok_r(dup, " ", &ptrptr); |
|---|
| 507 | if (ptr) |
|---|
| 508 | recv_code = atoi(ptr); |
|---|
| 509 | free(dup); |
|---|
| 510 | if (recv_code == code) { |
|---|
| 511 | err[0] = 0; |
|---|
| 512 | return inp; |
|---|
| 513 | } |
|---|
| 514 | LOG(LOG_WARNING, ERR_CLIENT_RESPONSE_CODE, code, inp); |
|---|
| 515 | } |
|---|
| 516 | |
|---|
| 517 | strlcpy(err, inp, len); |
|---|
| 518 | free(inp); |
|---|
| 519 | inp = client_getline(TTX, 300); |
|---|
| 520 | } |
|---|
| 521 | |
|---|
| 522 | return NULL; |
|---|
| 523 | } |
|---|
| 524 | |
|---|
| 525 | /* |
|---|
| 526 | * client_parsecode(const char *err) |
|---|
| 527 | * |
|---|
| 528 | * DESCRIPTION |
|---|
| 529 | * parse response code from plain text |
|---|
| 530 | * |
|---|
| 531 | * INPUT ARGUMENTS |
|---|
| 532 | * err error message to parse |
|---|
| 533 | * |
|---|
| 534 | * RETURN VALUES |
|---|
| 535 | * integer value of response code |
|---|
| 536 | */ |
|---|
| 537 | |
|---|
| 538 | int client_parsecode(char *error) { |
|---|
| 539 | char code[4]; |
|---|
| 540 | code[3] = 0; |
|---|
| 541 | strncpy(code, error, 3); |
|---|
| 542 | return atoi(code); |
|---|
| 543 | } |
|---|
| 544 | |
|---|
| 545 | /* |
|---|
| 546 | * client_getcode(THREAD_CTX *TTX, char *err, size_t len) |
|---|
| 547 | * |
|---|
| 548 | * DESCRIPTION |
|---|
| 549 | * retrieve a line of input and return response code |
|---|
| 550 | * |
|---|
| 551 | * INPUT ARGUMENTS |
|---|
| 552 | * TTX thread context containing sockfd |
|---|
| 553 | * err error buffer |
|---|
| 554 | * len buffer len |
|---|
| 555 | * |
|---|
| 556 | * RETURN VALUES |
|---|
| 557 | * integer value of response code |
|---|
| 558 | */ |
|---|
| 559 | |
|---|
| 560 | int client_getcode(THREAD_CTX *TTX, char *err, size_t len) { |
|---|
| 561 | char *inp, *ptr, *ptrptr = NULL; |
|---|
| 562 | int i; |
|---|
| 563 | |
|---|
| 564 | inp = client_getline(TTX, 300); |
|---|
| 565 | if (!inp) |
|---|
| 566 | return EFAILURE; |
|---|
| 567 | |
|---|
| 568 | while(inp && !strncmp(inp, "250-", 4)) { |
|---|
| 569 | free(inp); |
|---|
| 570 | inp = client_getline(TTX, 300); |
|---|
| 571 | } |
|---|
| 572 | |
|---|
| 573 | strlcpy(err, inp, len); |
|---|
| 574 | ptr = strtok_r(inp, " ", &ptrptr); |
|---|
| 575 | if (ptr == NULL) |
|---|
| 576 | return EFAILURE; |
|---|
| 577 | i = atoi(ptr); |
|---|
| 578 | free(inp); |
|---|
| 579 | return i; |
|---|
| 580 | } |
|---|
| 581 | |
|---|
| 582 | /* |
|---|
| 583 | * client_getline(THREAD_CTX *TTX, int timeout) |
|---|
| 584 | * |
|---|
| 585 | * DESCRIPTION |
|---|
| 586 | * read a complete line from a socket |
|---|
| 587 | * |
|---|
| 588 | * INPUT ARGUMENTS |
|---|
| 589 | * TTX thread context containing sockfd |
|---|
| 590 | * timeout timeout (in seconds) to wait for input |
|---|
| 591 | * |
|---|
| 592 | * RETURN VALUES |
|---|
| 593 | * allocated pointer to input |
|---|
| 594 | */ |
|---|
| 595 | |
|---|
| 596 | char *client_getline(THREAD_CTX *TTX, int timeout) { |
|---|
| 597 | struct timeval tv; |
|---|
| 598 | long recv_len; |
|---|
| 599 | char buf[1024]; |
|---|
| 600 | char *pop; |
|---|
| 601 | fd_set fds; |
|---|
| 602 | int i; |
|---|
| 603 | |
|---|
| 604 | pop = pop_buffer(TTX); |
|---|
| 605 | while(!pop) { |
|---|
| 606 | tv.tv_sec = timeout; |
|---|
| 607 | tv.tv_usec = 0; |
|---|
| 608 | FD_ZERO(&fds); |
|---|
| 609 | FD_SET(TTX->sockfd, &fds); |
|---|
| 610 | i = select(TTX->sockfd+1, &fds, NULL, NULL, &tv); |
|---|
| 611 | if (i<=0) |
|---|
| 612 | return NULL; |
|---|
| 613 | |
|---|
| 614 | recv_len = recv(TTX->sockfd, buf, sizeof(buf)-1, 0); |
|---|
| 615 | buf[recv_len] = 0; |
|---|
| 616 | if (recv_len == 0) |
|---|
| 617 | return NULL; |
|---|
| 618 | buffer_cat(TTX->packet_buffer, buf); |
|---|
| 619 | pop = pop_buffer(TTX); |
|---|
| 620 | } |
|---|
| 621 | |
|---|
| 622 | #ifdef VERBOSE |
|---|
| 623 | LOGDEBUG("RECV: %s", pop); |
|---|
| 624 | #endif |
|---|
| 625 | |
|---|
| 626 | return pop; |
|---|
| 627 | } |
|---|
| 628 | |
|---|
| 629 | /* |
|---|
| 630 | * pop_buffer (THREAD_CTX *TTX) |
|---|
| 631 | * |
|---|
| 632 | * DESCRIPTION |
|---|
| 633 | * pop a line off the packet buffer |
|---|
| 634 | * |
|---|
| 635 | * INPUT ARGUMENTS |
|---|
| 636 | * TTX thread context containing the packet buffer |
|---|
| 637 | * |
|---|
| 638 | * RETURN VALUES |
|---|
| 639 | * allocated pointer to line, NULL if complete line isn't available |
|---|
| 640 | */ |
|---|
| 641 | |
|---|
| 642 | char *pop_buffer(THREAD_CTX *TTX) { |
|---|
| 643 | char *buf, *eol; |
|---|
| 644 | long len; |
|---|
| 645 | |
|---|
| 646 | if (!TTX || !TTX->packet_buffer || !TTX->packet_buffer->data) |
|---|
| 647 | return NULL; |
|---|
| 648 | |
|---|
| 649 | eol = strchr(TTX->packet_buffer->data, 10); |
|---|
| 650 | if (!eol) |
|---|
| 651 | return NULL; |
|---|
| 652 | len = (eol - TTX->packet_buffer->data) + 1; |
|---|
| 653 | buf = calloc(1, len+1); |
|---|
| 654 | if (!buf) { |
|---|
| 655 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
|---|
| 656 | return NULL; |
|---|
| 657 | } |
|---|
| 658 | memcpy(buf, TTX->packet_buffer->data, len); |
|---|
| 659 | memmove(TTX->packet_buffer->data, eol+1, strlen(eol+1)+1); |
|---|
| 660 | TTX->packet_buffer->used -= len; |
|---|
| 661 | return buf; |
|---|
| 662 | } |
|---|
| 663 | |
|---|
| 664 | /* |
|---|
| 665 | * send_socket(THREAD_CTX *TTX, const char *text) |
|---|
| 666 | * |
|---|
| 667 | * DESCRIPTION |
|---|
| 668 | * send a line of text to a socket |
|---|
| 669 | * |
|---|
| 670 | * INPUT ARGUMENTS |
|---|
| 671 | * TTX thread context containing sockfd |
|---|
| 672 | * text text to send |
|---|
| 673 | * |
|---|
| 674 | * RETURN VALUES |
|---|
| 675 | * number of bytes sent |
|---|
| 676 | */ |
|---|
| 677 | |
|---|
| 678 | int send_socket(THREAD_CTX *TTX, const char *text) { |
|---|
| 679 | int i = 0, r, msglen; |
|---|
| 680 | |
|---|
| 681 | #ifdef VERBOSE |
|---|
| 682 | LOGDEBUG("SEND: %s", text); |
|---|
| 683 | #endif |
|---|
| 684 | |
|---|
| 685 | msglen = strlen(text); |
|---|
| 686 | while(i<msglen) { |
|---|
| 687 | r = send(TTX->sockfd, text+i, msglen-i, 0); |
|---|
| 688 | if (r <= 0) { |
|---|
| 689 | return r; |
|---|
| 690 | } |
|---|
| 691 | i += r; |
|---|
| 692 | } |
|---|
| 693 | |
|---|
| 694 | r = send(TTX->sockfd, "\r\n", 2, 0); |
|---|
| 695 | if (r > 0) { |
|---|
| 696 | i += r; |
|---|
| 697 | } |
|---|
| 698 | return i; |
|---|
| 699 | } |
|---|
| 700 | |
|---|
| 701 | /* |
|---|
| 702 | * deliver_socket(AGENT_CTX *ATX, const char *msg, int proto) |
|---|
| 703 | * |
|---|
| 704 | * DESCRIPTION |
|---|
| 705 | * delivers message via LMTP or SMTP (instead of TrustedDeliveryAgent) |
|---|
| 706 | * |
|---|
| 707 | * If LMTP/SMTP delivery was specified in dspam.conf, this function will be |
|---|
| 708 | * called by deliver_message(). This function connects to and delivers the |
|---|
| 709 | * message using standard LMTP or SMTP. Depending on how DSPAM was originally |
|---|
| 710 | * called, either the address supplied with the incoming RCPT TO or the |
|---|
| 711 | * address supplied on the commandline with --rcpt-to will be used. If |
|---|
| 712 | * neither are present, the username will be used. |
|---|
| 713 | * |
|---|
| 714 | * INPUT ARGUMENTS |
|---|
| 715 | * ATX agent context |
|---|
| 716 | * msg message to send |
|---|
| 717 | * proto protocol to use |
|---|
| 718 | * |
|---|
| 719 | * PROTOCOLS |
|---|
| 720 | * DDP_LMTP LMTP |
|---|
| 721 | * DDP_SMTP SMTP |
|---|
| 722 | * |
|---|
| 723 | * RETURN VALUES |
|---|
| 724 | * returns 0 on success |
|---|
| 725 | */ |
|---|
| 726 | |
|---|
| 727 | int deliver_socket(AGENT_CTX *ATX, const char *msg, int proto) { |
|---|
| 728 | THREAD_CTX TTX; |
|---|
| 729 | char buf[1024], err[256]; |
|---|
| 730 | char *ident = _ds_read_attribute(agent_config, "DeliveryIdent"); |
|---|
| 731 | int exitcode = EFAILURE; |
|---|
| 732 | int msglen, code; |
|---|
| 733 | int buflen; |
|---|
| 734 | char *inp; |
|---|
| 735 | int i; |
|---|
| 736 | int size_extension = 0; |
|---|
| 737 | |
|---|
| 738 | err[0] = 0; |
|---|
| 739 | |
|---|
| 740 | TTX.sockfd = client_connect(ATX, CCF_DELIVERY); |
|---|
| 741 | if (TTX.sockfd <0) { |
|---|
| 742 | STATUS(ERR_CLIENT_CONNECT); |
|---|
| 743 | LOG(LOG_ERR, ERR_CLIENT_CONNECT); |
|---|
| 744 | return TTX.sockfd; |
|---|
| 745 | } |
|---|
| 746 | |
|---|
| 747 | TTX.packet_buffer = buffer_create(NULL); |
|---|
| 748 | if (TTX.packet_buffer == NULL) { |
|---|
| 749 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
|---|
| 750 | STATUS(ERR_MEM_ALLOC); |
|---|
| 751 | goto BAIL; |
|---|
| 752 | } |
|---|
| 753 | |
|---|
| 754 | inp = client_expect(&TTX, LMTP_GREETING, err, sizeof(err)); |
|---|
| 755 | if (inp == NULL) { |
|---|
| 756 | LOG(LOG_ERR, ERR_CLIENT_ON_GREETING, err); |
|---|
| 757 | STATUS("%s", err); |
|---|
| 758 | goto BAIL; |
|---|
| 759 | } |
|---|
| 760 | free(inp); |
|---|
| 761 | |
|---|
| 762 | /* LHLO / HELO */ |
|---|
| 763 | |
|---|
| 764 | snprintf(buf, sizeof(buf), "%s %s", (proto == DDP_LMTP) ? "LHLO" : "HELO", |
|---|
| 765 | (ident) ? ident : "localhost"); |
|---|
| 766 | if (send_socket(&TTX, buf)<=0) { |
|---|
| 767 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 768 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 769 | goto BAIL; |
|---|
| 770 | } |
|---|
| 771 | |
|---|
| 772 | /* Check for SIZE extension */ |
|---|
| 773 | |
|---|
| 774 | if (proto == DDP_LMTP) { |
|---|
| 775 | char *dup, *ptr, *ptrptr; |
|---|
| 776 | inp = client_getline(&TTX, 300); |
|---|
| 777 | while(inp != NULL) { |
|---|
| 778 | code = 0; |
|---|
| 779 | dup = strdup(inp); |
|---|
| 780 | if (!dup) { |
|---|
| 781 | free(inp); |
|---|
| 782 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
|---|
| 783 | LOG(LOG_ERR, ERR_CLIENT_INVALID_RESPONSE, "LHLO", ERR_MEM_ALLOC); |
|---|
| 784 | STATUS("LHLO: %s", ERR_MEM_ALLOC); |
|---|
| 785 | goto QUIT; |
|---|
| 786 | } |
|---|
| 787 | if (!strcmp(dup, "250-SIZE") || (!strncmp(dup, "250-SIZE", 8) && strlen(dup)>=8 && isspace(dup[8]))) { |
|---|
| 788 | free(inp); |
|---|
| 789 | free(dup); |
|---|
| 790 | size_extension = 1; |
|---|
| 791 | inp = client_expect(&TTX, LMTP_OK, err, sizeof(err)); |
|---|
| 792 | break; |
|---|
| 793 | } else if (strncmp(dup, "250-", 4)) { |
|---|
| 794 | ptr = strtok_r(dup, " ", &ptrptr); |
|---|
| 795 | if (ptr) |
|---|
| 796 | code = atoi(ptr); |
|---|
| 797 | if (code == LMTP_OK) { |
|---|
| 798 | ptr = strtok_r(NULL, " ", &ptrptr); |
|---|
| 799 | if (ptr && !strcmp(ptr, "SIZE")) |
|---|
| 800 | size_extension = 1; |
|---|
| 801 | } |
|---|
| 802 | free(dup); |
|---|
| 803 | if (code == LMTP_OK) { |
|---|
| 804 | err[0] = 0; |
|---|
| 805 | break; |
|---|
| 806 | } |
|---|
| 807 | LOG(LOG_WARNING, ERR_CLIENT_RESPONSE_CODE, code, inp); |
|---|
| 808 | } |
|---|
| 809 | strlcpy(err, inp, sizeof(err)); |
|---|
| 810 | free(inp); |
|---|
| 811 | inp = client_getline(&TTX, 300); |
|---|
| 812 | } |
|---|
| 813 | } else { |
|---|
| 814 | inp = client_expect(&TTX, LMTP_OK, err, sizeof(err)); |
|---|
| 815 | } |
|---|
| 816 | if (inp == NULL) { |
|---|
| 817 | LOG(LOG_ERR, ERR_CLIENT_INVALID_RESPONSE, |
|---|
| 818 | (proto == DDP_LMTP) ? "LHLO" : "HELO", err); |
|---|
| 819 | STATUS("%s: %s", (proto == DDP_LMTP) ? "LHLO" : "HELO", err); |
|---|
| 820 | goto QUIT; |
|---|
| 821 | } |
|---|
| 822 | free(inp); |
|---|
| 823 | |
|---|
| 824 | /* MAIL FROM */ |
|---|
| 825 | |
|---|
| 826 | if (proto == DDP_LMTP && size_extension == 1) { |
|---|
| 827 | snprintf(buf, sizeof(buf), "MAIL FROM:<%s> SIZE=%ld", |
|---|
| 828 | ATX->mailfrom, (long) strlen(msg)); |
|---|
| 829 | } else { |
|---|
| 830 | snprintf(buf, sizeof(buf), "MAIL FROM:<%s>", ATX->mailfrom); |
|---|
| 831 | } |
|---|
| 832 | |
|---|
| 833 | if (send_socket(&TTX, buf)<=0) { |
|---|
| 834 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 835 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 836 | goto BAIL; |
|---|
| 837 | } |
|---|
| 838 | |
|---|
| 839 | code = client_getcode(&TTX, err, sizeof(err)); |
|---|
| 840 | |
|---|
| 841 | if (code!=LMTP_OK) { |
|---|
| 842 | LOG(LOG_ERR, ERR_CLIENT_RESPONSE, code, "MAIL FROM", err); |
|---|
| 843 | if (code >= 500) |
|---|
| 844 | exitcode = EINVAL; |
|---|
| 845 | chomp(err); |
|---|
| 846 | STATUS((code >= 500) ? "Fatal: %s" : "Deferred: %s", err); |
|---|
| 847 | goto QUIT; |
|---|
| 848 | } |
|---|
| 849 | |
|---|
| 850 | /* RCPT TO */ |
|---|
| 851 | |
|---|
| 852 | snprintf(buf, sizeof(buf), "RCPT TO:<%s>", (ATX->recipient) ? ATX->recipient : ""); |
|---|
| 853 | if (send_socket(&TTX, buf)<=0) { |
|---|
| 854 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 855 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 856 | goto BAIL; |
|---|
| 857 | } |
|---|
| 858 | |
|---|
| 859 | code = client_getcode(&TTX, err, sizeof(err)); |
|---|
| 860 | |
|---|
| 861 | if (code!=LMTP_OK) { |
|---|
| 862 | LOG(LOG_ERR, ERR_CLIENT_RESPONSE, code, "RCPT TO", err); |
|---|
| 863 | if (code >= 500) |
|---|
| 864 | exitcode = EINVAL; |
|---|
| 865 | chomp(err); |
|---|
| 866 | STATUS((code >= 500) ? "Fatal: %s" : "Deferred: %s", err); |
|---|
| 867 | goto QUIT; |
|---|
| 868 | } |
|---|
| 869 | |
|---|
| 870 | /* DATA */ |
|---|
| 871 | |
|---|
| 872 | if (send_socket(&TTX, "DATA")<=0) { |
|---|
| 873 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 874 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 875 | goto BAIL; |
|---|
| 876 | } |
|---|
| 877 | |
|---|
| 878 | code = client_getcode(&TTX, err, sizeof(err)); |
|---|
| 879 | if (code!=LMTP_DATA) { |
|---|
| 880 | LOG(LOG_ERR, ERR_CLIENT_RESPONSE, code, "DATA", err); |
|---|
| 881 | if (code >= 500) |
|---|
| 882 | exitcode = EINVAL; |
|---|
| 883 | chomp(err); |
|---|
| 884 | STATUS((code >= 500) ? "Fatal: %s" : "Deferred: %s", err); |
|---|
| 885 | goto QUIT; |
|---|
| 886 | } |
|---|
| 887 | |
|---|
| 888 | i = 0; |
|---|
| 889 | msglen = strlen(msg); |
|---|
| 890 | while(i<msglen) { |
|---|
| 891 | int r; |
|---|
| 892 | int t; |
|---|
| 893 | |
|---|
| 894 | /* fill buf with partial msg, replacing \n with \r\n */ |
|---|
| 895 | buflen = 0; |
|---|
| 896 | while ((size_t)buflen < (sizeof(buf) - 2) && i < msglen) { |
|---|
| 897 | /* only replace \n and not \r\n */ |
|---|
| 898 | if (i > 0 && msg[i] == '\n' && msg[i - 1] != '\r') { |
|---|
| 899 | buf[buflen] = '\r'; |
|---|
| 900 | buflen++; |
|---|
| 901 | } |
|---|
| 902 | |
|---|
| 903 | /* escape dot if first character on line */ |
|---|
| 904 | if (msg[i] == '.' && (i == 0 || msg[i - 1] == '\n')) { |
|---|
| 905 | buf[buflen] = '.'; |
|---|
| 906 | buflen++; |
|---|
| 907 | } |
|---|
| 908 | |
|---|
| 909 | buf[buflen] = msg[i]; |
|---|
| 910 | buflen++; |
|---|
| 911 | i++; |
|---|
| 912 | } |
|---|
| 913 | |
|---|
| 914 | /* send buf */ |
|---|
| 915 | t = 0; |
|---|
| 916 | while (t < buflen) { |
|---|
| 917 | r = send(TTX.sockfd, buf+t, buflen - t, 0); |
|---|
| 918 | if (r <= 0) { |
|---|
| 919 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 920 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 921 | goto BAIL; |
|---|
| 922 | } |
|---|
| 923 | t += r; |
|---|
| 924 | } |
|---|
| 925 | } |
|---|
| 926 | |
|---|
| 927 | if (msg[strlen(msg)-1]!= '\n') { |
|---|
| 928 | if (send_socket(&TTX, "")<=0) { |
|---|
| 929 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 930 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 931 | goto BAIL; |
|---|
| 932 | } |
|---|
| 933 | } |
|---|
| 934 | |
|---|
| 935 | if (send_socket(&TTX, "\r\n.")<=0) { |
|---|
| 936 | LOG(LOG_ERR, ERR_CLIENT_SEND_FAILED); |
|---|
| 937 | STATUS(ERR_CLIENT_SEND_FAILED); |
|---|
| 938 | goto BAIL; |
|---|
| 939 | } |
|---|
| 940 | |
|---|
| 941 | /* server response */ |
|---|
| 942 | |
|---|
| 943 | code = client_getcode(&TTX, err, sizeof(err)); |
|---|
| 944 | if (code < 200 || code >= 300) { |
|---|
| 945 | LOG(LOG_ERR, ERR_CLIENT_RESPONSE, code, "message data", err); |
|---|
| 946 | if (code >= 400 && code < 500) |
|---|
| 947 | exitcode = EX_TEMPFAIL; |
|---|
| 948 | else if (code >= 500) |
|---|
| 949 | exitcode = EINVAL; |
|---|
| 950 | chomp(err); |
|---|
| 951 | STATUS((code >= 500) ? "Fatal: %s" : "Deferred: %s", err); |
|---|
| 952 | goto QUIT; |
|---|
| 953 | } |
|---|
| 954 | |
|---|
| 955 | send_socket(&TTX, "QUIT"); |
|---|
| 956 | client_getcode(&TTX, err, sizeof(err)); |
|---|
| 957 | close(TTX.sockfd); |
|---|
| 958 | buffer_destroy(TTX.packet_buffer); |
|---|
| 959 | return 0; |
|---|
| 960 | |
|---|
| 961 | QUIT: |
|---|
| 962 | send_socket(&TTX, "QUIT"); |
|---|
| 963 | client_getcode(&TTX, err, sizeof(err)); |
|---|
| 964 | buffer_destroy(TTX.packet_buffer); |
|---|
| 965 | close(TTX.sockfd); |
|---|
| 966 | return exitcode; |
|---|
| 967 | |
|---|
| 968 | BAIL: |
|---|
| 969 | LOG(LOG_ERR, ERR_CLIENT_DELIVERY_FAILED); |
|---|
| 970 | buffer_destroy(TTX.packet_buffer); |
|---|
| 971 | close(TTX.sockfd); |
|---|
| 972 | return exitcode; |
|---|
| 973 | } |
|---|
| 974 | |
|---|
| 975 | #endif /* DAEMON */ |
|---|