Import Upstream version 4.84.2
[hcoop/debian/exim4.git] / src / smtp_out.c
CommitLineData
420a0d19
CE
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
5/* Copyright (c) University of Cambridge 1995 - 2009 */
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* A number of functions for driving outgoing SMTP calls. */
9
10
11#include "exim.h"
12
13
14
15/*************************************************
16* Find an outgoing interface *
17*************************************************/
18
19/* This function is called from the smtp transport and also from the callout
20code in verify.c. Its job is to expand a string to get a list of interfaces,
21and choose a suitable one (IPv4 or IPv6) for the outgoing address.
22
23Arguments:
24 istring string interface setting, may be NULL, meaning "any", in
25 which case the function does nothing
26 host_af AF_INET or AF_INET6 for the outgoing IP address
27 addr the mail address being handled (for setting errors)
28 changed if not NULL, set TRUE if expansion actually changed istring
29 interface point this to the interface
30 msg to add to any error message
31
32Returns: TRUE on success, FALSE on failure, with error message
33 set in addr and transport_return set to PANIC
34*/
35
36BOOL
37smtp_get_interface(uschar *istring, int host_af, address_item *addr,
38 BOOL *changed, uschar **interface, uschar *msg)
39{
40uschar *expint;
41uschar *iface;
42int sep = 0;
43
44if (istring == NULL) return TRUE;
45
46expint = expand_string(istring);
47if (expint == NULL)
48 {
49 if (expand_string_forcedfail) return TRUE;
50 addr->transport_return = PANIC;
51 addr->message = string_sprintf("failed to expand \"interface\" "
52 "option for %s: %s", msg, expand_string_message);
53 return FALSE;
54 }
55
56if (changed != NULL) *changed = expint != istring;
57
58while (isspace(*expint)) expint++;
59if (*expint == 0) return TRUE;
60
61while ((iface = string_nextinlist(&expint, &sep, big_buffer,
62 big_buffer_size)) != NULL)
63 {
64 if (string_is_ip_address(iface, NULL) == 0)
65 {
66 addr->transport_return = PANIC;
67 addr->message = string_sprintf("\"%s\" is not a valid IP "
68 "address for the \"interface\" option for %s",
69 iface, msg);
70 return FALSE;
71 }
72
73 if (((Ustrchr(iface, ':') == NULL)? AF_INET:AF_INET6) == host_af)
74 break;
75 }
76
77if (iface != NULL) *interface = string_copy(iface);
78return TRUE;
79}
80
81
82
83/*************************************************
84* Find an outgoing port *
85*************************************************/
86
87/* This function is called from the smtp transport and also from the callout
88code in verify.c. Its job is to find a port number. Note that getservbyname()
89produces the number in network byte order.
90
91Arguments:
92 rstring raw (unexpanded) string representation of the port
93 addr the mail address being handled (for setting errors)
94 port stick the port in here
95 msg for adding to error message
96
97Returns: TRUE on success, FALSE on failure, with error message set
98 in addr, and transport_return set to PANIC
99*/
100
101BOOL
102smtp_get_port(uschar *rstring, address_item *addr, int *port, uschar *msg)
103{
104uschar *pstring = expand_string(rstring);
105
106if (pstring == NULL)
107 {
108 addr->transport_return = PANIC;
109 addr->message = string_sprintf("failed to expand \"%s\" (\"port\" option) "
110 "for %s: %s", rstring, msg, expand_string_message);
111 return FALSE;
112 }
113
114if (isdigit(*pstring))
115 {
116 uschar *end;
117 *port = Ustrtol(pstring, &end, 0);
118 if (end != pstring + Ustrlen(pstring))
119 {
120 addr->transport_return = PANIC;
121 addr->message = string_sprintf("invalid port number for %s: %s", msg,
122 pstring);
123 return FALSE;
124 }
125 }
126
127else
128 {
129 struct servent *smtp_service = getservbyname(CS pstring, "tcp");
130 if (smtp_service == NULL)
131 {
132 addr->transport_return = PANIC;
133 addr->message = string_sprintf("TCP port \"%s\" is not defined for %s",
134 pstring, msg);
135 return FALSE;
136 }
137 *port = ntohs(smtp_service->s_port);
138 }
139
140return TRUE;
141}
142
143
144
145
146/*************************************************
147* Connect to remote host *
148*************************************************/
149
150/* Create a socket, and connect it to a remote host. IPv6 addresses are
151detected by checking for a colon in the address. AF_INET6 is defined even on
152non-IPv6 systems, to enable the code to be less messy. However, on such systems
153host->address will always be an IPv4 address.
154
155The port field in the host item is used if it is set (usually router from SRV
156records or elsewhere). In other cases, the default passed as an argument is
157used, and the host item is updated with its value.
158
159Arguments:
160 host host item containing name and address (and sometimes port)
161 host_af AF_INET or AF_INET6
162 port default remote port to connect to, in host byte order, for those
163 hosts whose port setting is PORT_NONE
164 interface outgoing interface address or NULL
165 timeout timeout value or 0
166 keepalive TRUE to use keepalive
167 dscp DSCP value to assign to socket
168
169Returns: connected socket number, or -1 with errno set
170*/
171
172int
173smtp_connect(host_item *host, int host_af, int port, uschar *interface,
174 int timeout, BOOL keepalive, const uschar *dscp)
175{
176int on = 1;
177int save_errno = 0;
178int dscp_value;
179int dscp_level;
180int dscp_option;
181int sock;
182
183if (host->port != PORT_NONE)
184 {
185 HDEBUG(D_transport|D_acl|D_v)
186 debug_printf("Transport port=%d replaced by host-specific port=%d\n", port,
187 host->port);
188 port = host->port;
189 }
190else host->port = port; /* Set the port actually used */
191
192HDEBUG(D_transport|D_acl|D_v)
193 {
194 if (interface == NULL)
195 debug_printf("Connecting to %s [%s]:%d ... ",host->name,host->address,port);
196 else
197 debug_printf("Connecting to %s [%s]:%d from %s ... ", host->name,
198 host->address, port, interface);
199 }
200
201/* Create the socket */
202
203if ((sock = ip_socket(SOCK_STREAM, host_af)) < 0) return -1;
204
205/* Set TCP_NODELAY; Exim does its own buffering. */
206
207setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (uschar *)(&on), sizeof(on));
208
209/* Set DSCP value, if we can. For now, if we fail to set the value, we don't
210bomb out, just log it and continue in default traffic class. */
211
212if (dscp && dscp_lookup(dscp, host_af, &dscp_level, &dscp_option, &dscp_value))
213 {
214 HDEBUG(D_transport|D_acl|D_v)
215 debug_printf("DSCP \"%s\"=%x ", dscp, dscp_value);
216 if (setsockopt(sock, dscp_level, dscp_option, &dscp_value, sizeof(dscp_value)) < 0)
217 HDEBUG(D_transport|D_acl|D_v)
218 debug_printf("failed to set DSCP: %s ", strerror(errno));
219 /* If the kernel supports IPv4 and IPv6 on an IPv6 socket, we need to set the
220 option for both; ignore failures here */
221 if (host_af == AF_INET6 &&
222 dscp_lookup(dscp, AF_INET, &dscp_level, &dscp_option, &dscp_value))
223 {
224 (void) setsockopt(sock, dscp_level, dscp_option, &dscp_value, sizeof(dscp_value));
225 }
226 }
227
228/* Bind to a specific interface if requested. Caller must ensure the interface
229is the same type (IPv4 or IPv6) as the outgoing address. */
230
231if (interface != NULL && ip_bind(sock, host_af, interface, 0) < 0)
232 {
233 save_errno = errno;
234 HDEBUG(D_transport|D_acl|D_v)
235 debug_printf("unable to bind outgoing SMTP call to %s: %s", interface,
236 strerror(errno));
237 }
238
239/* Connect to the remote host, and add keepalive to the socket before returning
240it, if requested. */
241
242else if (ip_connect(sock, host_af, host->address, port, timeout) < 0)
243 save_errno = errno;
244
245/* Either bind() or connect() failed */
246
247if (save_errno != 0)
248 {
249 HDEBUG(D_transport|D_acl|D_v)
250 {
251 debug_printf("failed: %s", CUstrerror(save_errno));
252 if (save_errno == ETIMEDOUT)
253 debug_printf(" (timeout=%s)", readconf_printtime(timeout));
254 debug_printf("\n");
255 }
256 (void)close(sock);
257 errno = save_errno;
258 return -1;
259 }
260
261/* Both bind() and connect() succeeded */
262
263else
264 {
265 union sockaddr_46 interface_sock;
266 EXIM_SOCKLEN_T size = sizeof(interface_sock);
267 HDEBUG(D_transport|D_acl|D_v) debug_printf("connected\n");
268 if (getsockname(sock, (struct sockaddr *)(&interface_sock), &size) == 0)
269 sending_ip_address = host_ntoa(-1, &interface_sock, NULL, &sending_port);
270 else
271 {
272 log_write(0, LOG_MAIN | ((errno == ECONNRESET)? 0 : LOG_PANIC),
273 "getsockname() failed: %s", strerror(errno));
274 close(sock);
275 return -1;
276 }
277 if (keepalive) ip_keepalive(sock, host->address, TRUE);
278 return sock;
279 }
280}
281
282
283/*************************************************
284* Flush outgoing command buffer *
285*************************************************/
286
287/* This function is called only from smtp_write_command() below. It flushes
288the buffer of outgoing commands. There is more than one in the buffer only when
289pipelining.
290
291Argument:
292 outblock the SMTP output block
293
294Returns: TRUE if OK, FALSE on error, with errno set
295*/
296
297static BOOL
298flush_buffer(smtp_outblock *outblock)
299{
300int rc;
301
302#ifdef SUPPORT_TLS
303if (tls_out.active == outblock->sock)
304 rc = tls_write(FALSE, outblock->buffer, outblock->ptr - outblock->buffer);
305else
306#endif
307
308rc = send(outblock->sock, outblock->buffer, outblock->ptr - outblock->buffer, 0);
309if (rc <= 0)
310 {
311 HDEBUG(D_transport|D_acl) debug_printf("send failed: %s\n", strerror(errno));
312 return FALSE;
313 }
314
315outblock->ptr = outblock->buffer;
316outblock->cmd_count = 0;
317return TRUE;
318}
319
320
321
322/*************************************************
323* Write SMTP command *
324*************************************************/
325
326/* The formatted command is left in big_buffer so that it can be reflected in
327any error message.
328
329Arguments:
330 outblock contains buffer for pipelining, and socket
331 noflush if TRUE, save the command in the output buffer, for pipelining
332 format a format, starting with one of
333 of HELO, MAIL FROM, RCPT TO, DATA, ".", or QUIT.
334 ... data for the format
335
336Returns: 0 if command added to pipelining buffer, with nothing transmitted
337 +n if n commands transmitted (may still have buffered the new one)
338 -1 on error, with errno set
339*/
340
341int
342smtp_write_command(smtp_outblock *outblock, BOOL noflush, const char *format, ...)
343{
344int count;
345int rc = 0;
346va_list ap;
347
348va_start(ap, format);
349if (!string_vformat(big_buffer, big_buffer_size, CS format, ap))
350 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "overlong write_command in outgoing "
351 "SMTP");
352va_end(ap);
353count = Ustrlen(big_buffer);
354
355if (count > outblock->buffersize)
356 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "overlong write_command in outgoing "
357 "SMTP");
358
359if (count > outblock->buffersize - (outblock->ptr - outblock->buffer))
360 {
361 rc = outblock->cmd_count; /* flush resets */
362 if (!flush_buffer(outblock)) return -1;
363 }
364
365Ustrncpy(CS outblock->ptr, big_buffer, count);
366outblock->ptr += count;
367outblock->cmd_count++;
368count -= 2;
369big_buffer[count] = 0; /* remove \r\n for error message */
370
371/* We want to hide the actual data sent in AUTH transactions from reflections
372and logs. While authenticating, a flag is set in the outblock to enable this.
373The AUTH command itself gets any data flattened. Other lines are flattened
374completely. */
375
376if (outblock->authenticating)
377 {
378 uschar *p = big_buffer;
379 if (Ustrncmp(big_buffer, "AUTH ", 5) == 0)
380 {
381 p += 5;
382 while (isspace(*p)) p++;
383 while (!isspace(*p)) p++;
384 while (isspace(*p)) p++;
385 }
386 while (*p != 0) *p++ = '*';
387 }
388
389HDEBUG(D_transport|D_acl|D_v) debug_printf(" SMTP>> %s\n", big_buffer);
390
391if (!noflush)
392 {
393 rc += outblock->cmd_count; /* flush resets */
394 if (!flush_buffer(outblock)) return -1;
395 }
396
397return rc;
398}
399
400
401
402/*************************************************
403* Read one line of SMTP response *
404*************************************************/
405
406/* This function reads one line of SMTP response from the server host. This may
407not be a complete response - it could be just part of a multiline response. We
408have to use a buffer for incoming packets, because when pipelining or using
409LMTP, there may well be more than one response in a single packet. This
410function is called only from the one that follows.
411
412Arguments:
413 inblock the SMTP input block (contains holding buffer, socket, etc.)
414 buffer where to put the line
415 size space available for the line
416 timeout the timeout to use when reading a packet
417
418Returns: length of a line that has been put in the buffer
419 -1 otherwise, with errno set
420*/
421
422static int
423read_response_line(smtp_inblock *inblock, uschar *buffer, int size, int timeout)
424{
425uschar *p = buffer;
426uschar *ptr = inblock->ptr;
427uschar *ptrend = inblock->ptrend;
428int sock = inblock->sock;
429
430/* Loop for reading multiple packets or reading another packet after emptying
431a previously-read one. */
432
433for (;;)
434 {
435 int rc;
436
437 /* If there is data in the input buffer left over from last time, copy
438 characters from it until the end of a line, at which point we can return,
439 having removed any whitespace (which will include CR) at the end of the line.
440 The rules for SMTP say that lines end in CRLF, but there are have been cases
441 of hosts using just LF, and other MTAs are reported to handle this, so we
442 just look for LF. If we run out of characters before the end of a line,
443 carry on to read the next incoming packet. */
444
445 while (ptr < ptrend)
446 {
447 int c = *ptr++;
448 if (c == '\n')
449 {
450 while (p > buffer && isspace(p[-1])) p--;
451 *p = 0;
452 inblock->ptr = ptr;
453 return p - buffer;
454 }
455 *p++ = c;
456 if (--size < 4)
457 {
458 *p = 0; /* Leave malformed line for error message */
459 errno = ERRNO_SMTPFORMAT;
460 return -1;
461 }
462 }
463
464 /* Need to read a new input packet. */
465
466 rc = ip_recv(sock, inblock->buffer, inblock->buffersize, timeout);
467 if (rc <= 0) break;
468
469 /* Another block of data has been successfully read. Set up the pointers
470 and let the loop continue. */
471
472 ptrend = inblock->ptrend = inblock->buffer + rc;
473 ptr = inblock->buffer;
474 DEBUG(D_transport|D_acl) debug_printf("read response data: size=%d\n", rc);
475 }
476
477/* Get here if there has been some kind of recv() error; errno is set, but we
478ensure that the result buffer is empty before returning. */
479
480*buffer = 0;
481return -1;
482}
483
484
485
486
487
488/*************************************************
489* Read SMTP response *
490*************************************************/
491
492/* This function reads an SMTP response with a timeout, and returns the
493response in the given buffer, as a string. A multiline response will contain
494newline characters between the lines. The function also analyzes the first
495digit of the reply code and returns FALSE if it is not acceptable. FALSE is
496also returned after a reading error. In this case buffer[0] will be zero, and
497the error code will be in errno.
498
499Arguments:
500 inblock the SMTP input block (contains holding buffer, socket, etc.)
501 buffer where to put the response
502 size the size of the buffer
503 okdigit the expected first digit of the response
504 timeout the timeout to use
505
506Returns: TRUE if a valid, non-error response was received; else FALSE
507*/
508
509BOOL
510smtp_read_response(smtp_inblock *inblock, uschar *buffer, int size, int okdigit,
511 int timeout)
512{
513uschar *ptr = buffer;
514int count;
515
516errno = 0; /* Ensure errno starts out zero */
517
518/* This is a loop to read and concatentate the lines that make up a multi-line
519response. */
520
521for (;;)
522 {
523 if ((count = read_response_line(inblock, ptr, size, timeout)) < 0)
524 return FALSE;
525
526 HDEBUG(D_transport|D_acl|D_v)
527 debug_printf(" %s %s\n", (ptr == buffer)? "SMTP<<" : " ", ptr);
528
529 /* Check the format of the response: it must start with three digits; if
530 these are followed by a space or end of line, the response is complete. If
531 they are followed by '-' this is a multi-line response and we must look for
532 another line until the final line is reached. The only use made of multi-line
533 responses is to pass them back as error messages. We therefore just
534 concatenate them all within the buffer, which should be large enough to
535 accept any reasonable number of lines. */
536
537 if (count < 3 ||
538 !isdigit(ptr[0]) ||
539 !isdigit(ptr[1]) ||
540 !isdigit(ptr[2]) ||
541 (ptr[3] != '-' && ptr[3] != ' ' && ptr[3] != 0))
542 {
543 errno = ERRNO_SMTPFORMAT; /* format error */
544 return FALSE;
545 }
546
547 /* If the line we have just read is a terminal line, line, we are done.
548 Otherwise more data has to be read. */
549
550 if (ptr[3] != '-') break;
551
552 /* Move the reading pointer upwards in the buffer and insert \n between the
553 components of a multiline response. Space is left for this by read_response_
554 line(). */
555
556 ptr += count;
557 *ptr++ = '\n';
558 size -= count + 1;
559 }
560
561/* Return a value that depends on the SMTP return code. On some systems a
562non-zero value of errno has been seen at this point, so ensure it is zero,
563because the caller of this function looks at errno when FALSE is returned, to
564distinguish between an unexpected return code and other errors such as
565timeouts, lost connections, etc. */
566
567errno = 0;
568return buffer[0] == okdigit;
569}
570
571/* End of smtp_out.c */