#include "config.h"
#include <stdio.h>
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <fcntl.h>
#include <string.h>
#include <signal.h>
#if defined(HAVE_SYSLOG)
#include <syslog.h>
#endif
#include <pwd.h>
#ifdef __FreeBSD__
#include <grp.h>
#endif
#include <errno.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/time.h>
#ifdef HAVE_SETRLIMIT
#include <sys/resource.h>
#endif
#include <sys/utsname.h>
#include "fetchmail.h"
#include "socket.h"
#include "tunable.h"
#include "smtp.h"
#include "netrc.h"
#include "i18n.h"
#ifndef ENETUNREACH
#define ENETUNREACH 128
#endif
static int load_params(int, char **, int);
static void dump_params (struct runctl *runp, struct query *, flag implicit);
static int query_host(struct query *);
int outlevel;
struct runctl run;
flag nodetach;
flag quitmode;
flag check_only;
flag versioninfo;
char *user;
char *home;
char *fmhome;
char *program_name;
flag configdump;
char *fetchmailhost;
#if NET_SECURITY
void *request = NULL;
int requestlen = 0;
#endif
static int querystatus;
static int successes;
static int activecount;
static struct runctl cmd_run;
static time_t parsetime;
static void terminate_run(int);
static void terminate_poll(int);
#if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
static void dropprivs(void)
{
struct group *gr;
gid_t egid;
gid_t rgid;
egid = getegid();
rgid = getgid();
gr = getgrgid(egid);
if (gr && !strcmp(gr->gr_name, "kmem"))
{
extern void interface_set_gids(gid_t egid, gid_t rgid);
interface_set_gids(egid, rgid);
setegid(rgid);
}
}
#endif
#if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
#include <time.h>
#include <locale.h>
static char *timestamp (void)
{
time_t now;
static char buf[60];
time (&now);
setlocale (LC_TIME, "");
strftime (buf, sizeof (buf), "%c", localtime(&now));
setlocale (LC_TIME, "C");
return (buf);
}
#else
#define timestamp rfc822timestamp
#endif
static RETSIGTYPE donothing(int sig)
{
extern volatile int lastsig;
signal(sig, donothing); lastsig = sig;
}
int main(int argc, char **argv)
{
int bkgd = FALSE;
int parsestatus, implicitmode = FALSE;
struct query *ctl;
netrc_entry *netrc_list;
char *netrc_file, *tmpbuf;
pid_t pid;
int lastsig = 0;
#if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
dropprivs();
#endif
envquery(argc, argv);
#ifdef ENABLE_NLS
setlocale (LC_ALL, "");
bindtextdomain(PACKAGE, LOCALEDIR);
textdomain(PACKAGE);
#endif
if (outlevel >= O_VERBOSE)
{
int i;
report(stdout, GT_("fetchmail: invoked with"));
for (i = 0; i < argc; i++)
report(stdout, " %s", argv[i]);
report(stdout, "\n");
}
#define IDFILE_NAME ".fetchids"
run.idfile = prependdir (IDFILE_NAME, fmhome);
outlevel = O_NORMAL;
lock_dispose();
#ifdef HAVE_GETCWD
if (getcwd (currentwd, sizeof (currentwd)) == NULL) {
report(stderr, GT_("could not get current working directory\n"));
currentwd[0] = 0;
}
#endif
if ((parsestatus = parsecmdline(argc,argv, &cmd_run, &cmd_opts)) < 0)
exit(PS_SYNTAX);
if (versioninfo)
{
printf(GT_("This is fetchmail release %s"), VERSION);
#ifdef POP2_ENABLE
printf("+POP2");
#endif
#ifndef POP3_ENABLE
printf("-POP3");
#endif
#ifndef IMAP_ENABLE
printf("-IMAP");
#endif
#ifdef GSSAPI
printf("+IMAP-GSS");
#endif
#ifdef RPA_ENABLE
printf("+RPA");
#endif
#ifdef NTLM_ENABLE
printf("+NTLM");
#endif
#ifdef SDPS_ENABLE
printf("+SDPS");
#endif
#ifndef ETRN_ENABLE
printf("-ETRN");
#endif
#ifndef ODMR_ENABLE
printf("-ODMR");
#endif
#ifdef SSL_ENABLE
printf("+SSL");
#endif
#if OPIE_ENABLE
printf("+OPIE");
#endif
#if INET6_ENABLE
printf("+INET6");
#endif
#if NET_SECURITY
printf("+NETSEC");
#endif
#ifdef HAVE_SOCKS
printf("+SOCKS");
#endif
#if ENABLE_NLS
printf("+NLS");
#endif
putchar('\n');
fputs("Fallback MDA: ", stdout);
#ifdef FALLBACK_MDA
fputs(FALLBACK_MDA, stdout);
#else
fputs("(none)", stdout);
#endif
putchar('\n');
fflush(stdout);
system("uname -a");
}
if (!(quitmode && argc == 2))
implicitmode = load_params(argc, argv, optind);
#if defined(HAVE_SYSLOG)
if (run.use_syslog)
{
#if defined(LOG_MAIL)
openlog(program_name, LOG_PID, LOG_MAIL);
#else
openlog(program_name, LOG_PID);
#endif
report_init(-1);
}
else
#endif
report_init((run.poll_interval == 0 || nodetach) && !run.logfile);
lock_setup();
#ifdef HAVE_SETRLIMIT
if (outlevel < O_VERBOSE || run.poll_interval > 0)
{
struct rlimit corelimit;
corelimit.rlim_cur = 0;
corelimit.rlim_max = 0;
setrlimit(RLIMIT_CORE, &corelimit);
}
#endif
#define NETRC_FILE ".netrc"
netrc_file = prependdir (NETRC_FILE, home);
netrc_list = parse_netrc(netrc_file);
#undef NETRC_FILE
for (ctl = querylist; ctl; ctl = ctl->next)
{
if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
{
if (NO_PASSWORD(ctl))
ctl->password = ctl->remotename;
else
{
netrc_entry *p;
p = search_netrc(netrc_list,
ctl->server.pollname, ctl->remotename);
if (p && p->password)
ctl->password = xstrdup(p->password);
else if (ctl->server.via)
{
p = search_netrc(netrc_list,
ctl->server.via, ctl->remotename);
if (p && p->password)
ctl->password = xstrdup(p->password);
}
}
}
}
if (versioninfo)
{
int havercfile = access(rcfile, 0);
printf(GT_("Taking options from command line%s%s\n"),
havercfile ? "" : GT_(" and "),
havercfile ? "" : rcfile);
if (querylist == NULL)
fprintf(stderr,
GT_("No mailservers set up -- perhaps %s is missing?\n"),
rcfile);
else
dump_params(&run, querylist, implicitmode);
exit(0);
}
if (configdump)
{
dump_config(&run, querylist);
exit(0);
}
pid = lock_state();
bkgd = (pid < 0);
pid = bkgd ? -pid : pid;
if (!(quitmode && argc == 2) && pid == 0 && querylist == NULL) {
(void)fputs(GT_("fetchmail: no mailservers have been specified.\n"),stderr);
exit(PS_SYNTAX);
}
if (quitmode)
{
if (pid == 0)
{
fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
if (argc == 2)
exit(PS_EXCLUDE);
}
else if (kill(pid, SIGTERM) < 0)
{
fprintf(stderr,GT_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
bkgd ? GT_("background") : GT_("foreground"), pid);
exit(PS_EXCLUDE);
}
else
{
fprintf(stderr,GT_("fetchmail: %s fetchmail at %d killed.\n"),
bkgd ? GT_("background") : GT_("foreground"), pid);
lock_do_release();
if (argc == 2)
exit(0);
else
pid = 0;
}
}
if (pid != 0)
{
if (check_only)
{
fprintf(stderr,
GT_("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
return(PS_EXCLUDE);
}
else if (!implicitmode)
{
fprintf(stderr,
GT_("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
pid);
return(PS_EXCLUDE);
}
else if (!bkgd)
{
fprintf(stderr,
GT_("fetchmail: another foreground fetchmail is running at %d.\n"),
pid);
return(PS_EXCLUDE);
}
else if (getpid() == pid)
lock_assert();
else if (argc > 1)
{
fprintf(stderr,
GT_("fetchmail: can't accept options while a background fetchmail is running.\n"));
return(PS_EXCLUDE);
}
else if (kill(pid, SIGUSR1) == 0)
{
fprintf(stderr,
GT_("fetchmail: background fetchmail at %d awakened.\n"),
pid);
return(0);
}
else
{
fprintf(stderr,
GT_("fetchmail: elder sibling at %d died mysteriously.\n"),
pid);
return(PS_UNDEFINED);
}
}
for (ctl = querylist; ctl; ctl = ctl->next)
{
if (ctl->active && !(implicitmode && ctl->server.skip)
&& !NO_PASSWORD(ctl) && !ctl->password)
{
if (!isatty(0))
{
fprintf(stderr,
GT_("fetchmail: can't find a password for %s@%s.\n"),
ctl->remotename, ctl->server.pollname);
return(PS_AUTHFAIL);
}
else
{
char* password_prompt = GT_("Enter password for %s@%s: ");
xalloca(tmpbuf, char *, strlen(password_prompt) +
strlen(ctl->remotename) +
strlen(ctl->server.pollname) + 1);
(void) sprintf(tmpbuf, password_prompt,
ctl->remotename, ctl->server.pollname);
ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
}
}
}
#ifdef HAVE_SOCKS
SOCKSinit("fetchmail");
#endif
deal_with_sigchld();
if (run.poll_interval)
{
if (!nodetach)
daemonize(run.logfile, terminate_run);
report(stdout, GT_("starting fetchmail %s daemon \n"), VERSION);
signal(SIGUSR1, SIG_IGN);
if (run.poll_interval && getuid() == ROOT_UID)
signal(SIGHUP, SIG_IGN);
}
else
{
if (run.logfile && access(run.logfile, F_OK) == 0)
{
if (!freopen(run.logfile, "a", stdout))
report(stderr, GT_("could not open %s to append logs to \n"), run.logfile);
if (!freopen(run.logfile, "a", stderr))
report(stdout, GT_("could not open %s to append logs to \n"), run.logfile);
}
}
#ifdef linux
interface_init();
#endif
umask(0077);
signal(SIGABRT, terminate_run);
signal(SIGINT, terminate_run);
signal(SIGTERM, terminate_run);
signal(SIGALRM, terminate_run);
signal(SIGPIPE, terminate_run);
signal(SIGQUIT, terminate_run);
lock_or_die();
do {
struct stat rcstat;
if (stat(rcfile, &rcstat) == -1)
{
if (errno != ENOENT)
report(stderr,
GT_("couldn't time-check %s (error %d)\n"),
rcfile, errno);
}
else if (rcstat.st_mtime > parsetime)
{
report(stdout, GT_("restarting fetchmail (%s changed)\n"), rcfile);
#ifdef HAVE_GETCWD
if (!currentwd[0] || chdir (currentwd) == -1)
report(stderr, GT_("attempt to re-exec may fail as directory has not been restored\n"));
#endif
execvp(argv[0], argv);
report(stderr, GT_("attempt to re-exec fetchmail failed\n"));
}
#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
sethostent(TRUE);
#endif
activecount = 0;
batchcount = 0;
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl->active)
{
activecount++;
if (!(implicitmode && ctl->server.skip))
{
if (ctl->wedged)
{
report(stderr,
GT_("poll of %s skipped (failed authentication or too many timeouts)\n"),
ctl->server.pollname);
continue;
}
if (run.poll_interval && ctl->server.interval)
{
if (ctl->server.poll_count++ % ctl->server.interval)
{
if (outlevel >= O_VERBOSE)
report(stdout,
GT_("interval not reached, not querying %s\n"),
ctl->server.pollname);
continue;
}
}
#if (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__)
if (!interface_approve(&ctl->server, !lastsig))
continue;
#endif
querystatus = query_host(ctl);
#ifdef POP3_ENABLE
if (!check_only &&
((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
uid_swap_lists(ctl);
#endif
if (querystatus == PS_SUCCESS)
successes++;
else if (!check_only &&
((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
switch(querystatus)
{
case PS_SUCCESS:
report(stdout,GT_("Query status=0 (SUCCESS)\n"));break;
case PS_NOMAIL:
report(stdout,GT_("Query status=1 (NOMAIL)\n")); break;
case PS_SOCKET:
report(stdout,GT_("Query status=2 (SOCKET)\n")); break;
case PS_AUTHFAIL:
report(stdout,GT_("Query status=3 (AUTHFAIL)\n"));break;
case PS_PROTOCOL:
report(stdout,GT_("Query status=4 (PROTOCOL)\n"));break;
case PS_SYNTAX:
report(stdout,GT_("Query status=5 (SYNTAX)\n")); break;
case PS_IOERR:
report(stdout,GT_("Query status=6 (IOERR)\n")); break;
case PS_ERROR:
report(stdout,GT_("Query status=7 (ERROR)\n")); break;
case PS_EXCLUDE:
report(stdout,GT_("Query status=8 (EXCLUDE)\n")); break;
case PS_LOCKBUSY:
report(stdout,GT_("Query status=9 (LOCKBUSY)\n"));break;
case PS_SMTP:
report(stdout,GT_("Query status=10 (SMTP)\n")); break;
case PS_DNS:
report(stdout,GT_("Query status=11 (DNS)\n")); break;
case PS_BSMTP:
report(stdout,GT_("Query status=12 (BSMTP)\n")); break;
case PS_MAXFETCH:
report(stdout,GT_("Query status=13 (MAXFETCH)\n"));break;
default:
report(stdout,GT_("Query status=%d\n"),querystatus);
break;
}
#if (defined(linux) && !INET6_ENABLE) || defined (__FreeBSD__)
if (ctl->server.monitor)
{
sleep(3);
interface_note_activity(&ctl->server);
}
#endif
}
}
#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
endhostent();
#endif
terminate_poll(0);
if (run.poll_interval)
{
int unwedged = 0;
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl->active && !(implicitmode && ctl->server.skip))
if (!ctl->wedged)
unwedged++;
if (!unwedged)
{
report(stderr, GT_("All connections are wedged. Exiting.\n"));
exit(PS_AUTHFAIL);
}
if (outlevel > O_SILENT)
report(stdout,
GT_("sleeping at %s\n"), timestamp());
signal(SIGUSR1, donothing);
if (getuid() != ROOT_UID)
signal(SIGHUP, donothing);
if ((lastsig = interruptible_idle(run.poll_interval)))
{
if (outlevel > O_SILENT)
#ifdef SYS_SIGLIST_DECLARED
report(stdout,
GT_("awakened by %s\n"), sys_siglist[lastsig]);
#else
report(stdout,
GT_("awakened by signal %d\n"), lastsig);
#endif
for (ctl = querylist; ctl; ctl = ctl->next)
ctl->wedged = FALSE;
}
if (outlevel > O_SILENT)
report(stdout, GT_("awakened at %s\n"), timestamp());
}
} while
(run.poll_interval);
if (outlevel >= O_VERBOSE)
report(stdout, GT_("normal termination, status %d\n"),
successes ? PS_SUCCESS : querystatus);
terminate_run(0);
if (successes)
exit(PS_SUCCESS);
else if (querystatus)
exit(querystatus);
else
exit(PS_NOMAIL);
}
static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
{
if (force ? !!*srcl : !*dstl)
{
struct idlist *cpl = copy_str_list(*srcl);
append_str_list(dstl, &cpl);
}
}
static void optmerge(struct query *h2, struct query *h1, int force)
{
list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
list_merge(&h2->localnames, &h1->localnames, force);
list_merge(&h2->mailboxes, &h1->mailboxes, force);
list_merge(&h2->smtphunt, &h1->smtphunt, force);
list_merge(&h2->domainlist, &h1->domainlist, force);
list_merge(&h2->antispam, &h1->antispam, force);
#define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
FLAG_MERGE(server.via);
FLAG_MERGE(server.protocol);
#if INET6_ENABLE
FLAG_MERGE(server.service);
FLAG_MERGE(server.netsec);
#else
FLAG_MERGE(server.port);
#endif
FLAG_MERGE(server.interval);
FLAG_MERGE(server.authenticate);
FLAG_MERGE(server.timeout);
FLAG_MERGE(server.envelope);
FLAG_MERGE(server.envskip);
FLAG_MERGE(server.qvirtual);
FLAG_MERGE(server.skip);
FLAG_MERGE(server.dns);
FLAG_MERGE(server.checkalias);
FLAG_MERGE(server.uidl);
FLAG_MERGE(server.principal);
#if defined(linux) || defined(__FreeBSD__)
FLAG_MERGE(server.interface);
FLAG_MERGE(server.monitor);
FLAG_MERGE(server.interface_pair);
#endif
FLAG_MERGE(server.plugin);
FLAG_MERGE(server.plugout);
FLAG_MERGE(wildcard);
FLAG_MERGE(remotename);
FLAG_MERGE(password);
FLAG_MERGE(mda);
FLAG_MERGE(bsmtp);
FLAG_MERGE(listener);
FLAG_MERGE(smtpaddress);
FLAG_MERGE(smtpname);
FLAG_MERGE(preconnect);
FLAG_MERGE(postconnect);
FLAG_MERGE(keep);
FLAG_MERGE(flush);
FLAG_MERGE(fetchall);
FLAG_MERGE(rewrite);
FLAG_MERGE(forcecr);
FLAG_MERGE(stripcr);
FLAG_MERGE(pass8bits);
FLAG_MERGE(dropstatus);
FLAG_MERGE(dropdelivered);
FLAG_MERGE(mimedecode);
FLAG_MERGE(idle);
FLAG_MERGE(limit);
FLAG_MERGE(warnings);
FLAG_MERGE(fetchlimit);
FLAG_MERGE(batchlimit);
#ifdef SSL_ENABLE
FLAG_MERGE(use_ssl);
FLAG_MERGE(sslkey);
FLAG_MERGE(sslcert);
FLAG_MERGE(sslproto);
FLAG_MERGE(sslcertck);
FLAG_MERGE(sslcertpath);
FLAG_MERGE(sslfingerprint);
#endif
FLAG_MERGE(expunge);
FLAG_MERGE(tracepolls);
FLAG_MERGE(properties);
#undef FLAG_MERGE
}
static int load_params(int argc, char **argv, int optind)
{
int implicitmode, st;
struct passwd *pw;
struct query def_opts, *ctl;
struct stat rcstat;
char *p;
run.bouncemail = TRUE;
run.spambounce = FALSE;
memset(&def_opts, '\0', sizeof(struct query));
def_opts.smtp_socket = -1;
def_opts.smtpaddress = (char *)0;
def_opts.smtpname = (char *)0;
def_opts.server.protocol = P_AUTO;
def_opts.server.timeout = CLIENT_TIMEOUT;
def_opts.server.esmtp_name = user;
def_opts.warnings = WARNING_INTERVAL;
def_opts.remotename = user;
def_opts.listener = SMTP_MODE;
rcfiledir[0] = 0;
p = strrchr (rcfile, '/');
if (p && (p - rcfile) < sizeof (rcfiledir)) {
*p = 0;
strcpy (rcfiledir, rcfile);
*p = '/';
if (!rcfiledir[0])
strcpy (rcfiledir, "/");
}
parsetime = 0;
if (stat(rcfile, &rcstat) != -1)
parsetime = rcstat.st_mtime;
else if (errno != ENOENT)
report(stderr, GT_("couldn't time-check the run-control file\n"));
if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
exit(st);
if ((implicitmode = (optind >= argc)))
{
for (ctl = querylist; ctl; ctl = ctl->next)
ctl->active = !ctl->server.skip;
}
else
for (; optind < argc; optind++)
{
flag predeclared = FALSE;
for (ctl = querylist; ctl; ctl = ctl->next)
if (!strcmp(ctl->server.pollname, argv[optind])
|| str_in_list(&ctl->server.akalist, argv[optind], TRUE))
{
if (predeclared && outlevel == O_VERBOSE)
fprintf(stderr,GT_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
ctl->active = TRUE;
predeclared = TRUE;
}
if (!predeclared)
{
ctl = hostalloc((struct query *)NULL);
ctl->server.via =
ctl->server.pollname = xstrdup(argv[optind]);
ctl->active = TRUE;
ctl->server.lead_server = (struct hostdata *)NULL;
}
}
if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
{
for (ctl = querylist->next; ctl; ctl = ctl->next)
optmerge(ctl, querylist, FALSE);
querylist = querylist->next;
}
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0)
exit(PS_SYNTAX);
fetchmailhost = "localhost";
if (cmd_run.logfile)
run.logfile = cmd_run.logfile;
if (cmd_run.idfile)
run.idfile = cmd_run.idfile;
if (cmd_run.poll_interval >= 0)
run.poll_interval = cmd_run.poll_interval;
if (cmd_run.invisible)
run.invisible = cmd_run.invisible;
if (cmd_run.showdots)
run.showdots = cmd_run.showdots;
if (cmd_run.use_syslog)
run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
if (cmd_run.postmaster)
run.postmaster = cmd_run.postmaster;
if (cmd_run.bouncemail)
run.bouncemail = cmd_run.bouncemail;
if (check_only && run.poll_interval)
run.poll_interval = 0;
if (strcmp(fetchmailhost, "localhost") == 0)
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl->active &&
(ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
|| ctl->server.authenticate == A_KERBEROS_V4
|| ctl->server.authenticate == A_KERBEROS_V5))
{
fetchmailhost = host_fqdn();
break;
}
for (ctl = querylist; ctl; ctl = ctl->next)
{
ctl->wedged = FALSE;
optmerge(ctl, &def_opts, FALSE);
optmerge(ctl, &cmd_opts, TRUE);
if (ctl->server.via)
ctl->server.queryname = xstrdup(ctl->server.via);
else
ctl->server.queryname = xstrdup(ctl->server.pollname);
ctl->server.truename = xstrdup(ctl->server.queryname);
if (configdump || ctl->active )
{
#define DEFAULT(flag, dflt) if (flag == FLAG_TRUE)\
flag = TRUE;\
else if (flag == FLAG_FALSE)\
flag = FALSE;\
else\
flag = (dflt)
DEFAULT(ctl->keep, FALSE);
DEFAULT(ctl->fetchall, FALSE);
DEFAULT(ctl->flush, FALSE);
DEFAULT(ctl->rewrite, TRUE);
DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL));
DEFAULT(ctl->forcecr, FALSE);
DEFAULT(ctl->pass8bits, FALSE);
DEFAULT(ctl->dropstatus, FALSE);
DEFAULT(ctl->dropdelivered, FALSE);
DEFAULT(ctl->mimedecode, FALSE);
DEFAULT(ctl->idle, FALSE);
DEFAULT(ctl->server.dns, TRUE);
DEFAULT(ctl->server.uidl, FALSE);
#ifdef SSL_ENABLE
DEFAULT(ctl->use_ssl, FALSE);
DEFAULT(ctl->sslcertck, FALSE);
#endif
DEFAULT(ctl->server.checkalias, FALSE);
#ifndef SSL_ENABLE
if (ctl->use_ssl)
{
report(stderr, GT_("SSL support is not compiled in.\n"));
exit(PS_SYNTAX);
}
#endif
#undef DEFAULT
if (!ctl->smtphunt)
save_str(&ctl->smtphunt, fetchmailhost, FALSE);
if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
save_str(&ctl->domainlist, fetchmailhost, FALSE);
if ((pw = getpwnam(user)) == (struct passwd *)NULL)
ctl->uid = 0;
else
ctl->uid = pw->pw_uid;
if (!ctl->localnames)
save_str_pair(&ctl->localnames, user, NULL);
#if !defined(HAVE_GETHOSTBYNAME) || !defined(HAVE_RES_SEARCH)
if (ctl->localnames && ctl->localnames->next && ctl->server.dns)
{
ctl->server.dns = FALSE;
report(stderr, GT_("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
}
#endif
if (!ctl->mailboxes)
save_str(&ctl->mailboxes, (char *)NULL, 0);
if (ctl->server.timeout == -1)
ctl->server.timeout = CLIENT_TIMEOUT;
#if !INET6_ENABLE
if (ctl->server.port < 0)
{
(void) fprintf(stderr,
GT_("%s configuration invalid, port number cannot be negative\n"),
ctl->server.pollname);
exit(PS_SYNTAX);
}
if (ctl->server.protocol == P_RPOP && ctl->server.port >= 1024)
{
(void) fprintf(stderr,
GT_("%s configuration invalid, RPOP requires a privileged port\n"),
ctl->server.pollname);
exit(PS_SYNTAX);
}
if (ctl->listener == LMTP_MODE)
{
struct idlist *idp;
for (idp = ctl->smtphunt; idp; idp = idp->next)
{
char *cp;
if (!(cp = strrchr(idp->id, '/')) ||
(atoi(++cp) == SMTP_PORT))
{
(void) fprintf(stderr,
GT_("%s configuration invalid, LMTP can't use default SMTP port\n"),
ctl->server.pollname);
exit(PS_SYNTAX);
}
}
}
#endif
if (ctl->fetchall && ctl->keep && run.poll_interval && !nodetach)
{
(void) fprintf(stderr,
GT_("Both fetchall and keep on in daemon mode is a mistake!\n"));
exit(PS_SYNTAX);
}
}
}
#ifdef POP3_ENABLE
if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
exit(st);
else
initialize_saved_lists(querylist, run.idfile);
#endif
if (!run.postmaster)
{
if (getuid() != ROOT_UID)
run.postmaster = user;
else
run.postmaster = "postmaster";
}
return(implicitmode);
}
static void terminate_poll(int sig)
{
if (sig != 0)
report(stdout, GT_("terminated with signal %d\n"), sig);
else
{
struct query *ctl;
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl->smtp_socket != -1)
{
smtp_close(ctl, ctl->server.protocol != P_ODMR);
}
}
#ifdef POP3_ENABLE
if (!check_only)
write_saved_lists(querylist, run.idfile);
#endif
}
static void terminate_run(int sig)
{
struct query *ctl;
terminate_poll(sig);
for (ctl = querylist; ctl; ctl = ctl->next)
if (ctl->password)
memset(ctl->password, '\0', strlen(ctl->password));
#if !defined(HAVE_ATEXIT) && !defined(HAVE_ON_EXIT)
lock_do_release();
#endif
if (activecount == 0)
exit(PS_NOMAIL);
else
exit(successes ? PS_SUCCESS : querystatus);
}
static const int autoprobe[] =
{
#ifdef IMAP_ENABLE
P_IMAP,
#endif
#ifdef POP3_ENABLE
P_POP3,
#endif
#ifdef POP2_ENABLE
P_POP2
#endif
};
static int query_host(struct query *ctl)
{
int i, st = 0;
if (outlevel >= O_VERBOSE)
{
report(stdout, GT_("%s querying %s (protocol %s) at %s: poll started\n"),
VERSION,
ctl->server.pollname,
showproto(ctl->server.protocol),
timestamp());
}
switch (ctl->server.protocol) {
case P_AUTO:
for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
{
ctl->server.protocol = autoprobe[i];
do {
st = query_host(ctl);
} while
(st == PS_REPOLL);
if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH || st == PS_DNS)
break;
}
ctl->server.protocol = P_AUTO;
break;
case P_POP2:
#ifdef POP2_ENABLE
st = doPOP2(ctl);
#else
report(stderr, GT_("POP2 support is not configured.\n"));
st = PS_PROTOCOL;
#endif
break;
case P_POP3:
case P_APOP:
case P_RPOP:
#ifdef POP3_ENABLE
do {
st = doPOP3(ctl);
} while (st == PS_REPOLL);
#else
report(stderr, GT_("POP3 support is not configured.\n"));
st = PS_PROTOCOL;
#endif
break;
case P_IMAP:
#ifdef IMAP_ENABLE
st = doIMAP(ctl);
#else
report(stderr, GT_("IMAP support is not configured.\n"));
st = PS_PROTOCOL;
#endif
break;
case P_ETRN:
#ifndef ETRN_ENABLE
report(stderr, GT_("ETRN support is not configured.\n"));
st = PS_PROTOCOL;
#else
#ifdef HAVE_GETHOSTBYNAME
st = doETRN(ctl);
#else
report(stderr, GT_("Cannot support ETRN without gethostbyname(2).\n"));
st = PS_PROTOCOL;
#endif
break;
#endif
case P_ODMR:
#ifndef ODMR_ENABLE
report(stderr, GT_("ODMR support is not configured.\n"));
st = PS_PROTOCOL;
#else
#ifdef HAVE_GETHOSTBYNAME
st = doODMR(ctl);
#else
report(stderr, GT_("Cannot support ODMR without gethostbyname(2).\n"));
st = PS_PROTOCOL;
#endif
#endif
break;
default:
report(stderr, GT_("unsupported protocol selected.\n"));
st = PS_PROTOCOL;
}
if (outlevel >= O_VERBOSE)
{
report(stdout, GT_("%s querying %s (protocol %s) at %s: poll completed\n"),
VERSION,
ctl->server.pollname,
showproto(ctl->server.protocol),
timestamp());
}
return(st);
}
static void dump_params (struct runctl *runp,
struct query *querylist, flag implicit)
{
struct query *ctl;
if (runp->poll_interval)
printf(GT_("Poll interval is %d seconds\n"), runp->poll_interval);
if (runp->logfile)
printf(GT_("Logfile is %s\n"), runp->logfile);
if (strcmp(runp->idfile, IDFILE_NAME))
printf(GT_("Idfile is %s\n"), runp->idfile);
#if defined(HAVE_SYSLOG)
if (runp->use_syslog)
printf(GT_("Progress messages will be logged via syslog\n"));
#endif
if (runp->invisible)
printf(GT_("Fetchmail will masquerade and will not generate Received\n"));
if (runp->showdots)
printf(GT_("Fetchmail will show progress dots even in logfiles.\n"));
if (runp->postmaster)
printf(GT_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
runp->postmaster);
if (!runp->bouncemail)
printf(GT_("Fetchmail will direct error mail to the postmaster.\n"));
else if (outlevel >= O_VERBOSE)
printf(GT_("Fetchmail will direct error mail to the sender.\n"));
for (ctl = querylist; ctl; ctl = ctl->next)
{
if (!ctl->active || (implicit && ctl->server.skip))
continue;
printf(GT_("Options for retrieving from %s@%s:\n"),
ctl->remotename, visbuf(ctl->server.pollname));
if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
printf(GT_(" Mail will be retrieved via %s\n"), ctl->server.via);
if (ctl->server.interval)
printf(GT_(" Poll of this server will occur every %d intervals.\n"),
ctl->server.interval);
if (ctl->server.truename)
printf(GT_(" True name of server is %s.\n"), ctl->server.truename);
if (ctl->server.skip || outlevel >= O_VERBOSE)
printf(GT_(" This host %s be queried when no host is specified.\n"),
ctl->server.skip ? GT_("will not") : GT_("will"));
if (!NO_PASSWORD(ctl))
{
if (!ctl->password)
printf(GT_(" Password will be prompted for.\n"));
else if (outlevel >= O_VERBOSE)
{
if (ctl->server.protocol == P_APOP)
printf(GT_(" APOP secret = \"%s\".\n"),
visbuf(ctl->password));
else if (ctl->server.protocol == P_RPOP)
printf(GT_(" RPOP id = \"%s\".\n"),
visbuf(ctl->password));
else
printf(GT_(" Password = \"%s\".\n"),
visbuf(ctl->password));
}
}
if (ctl->server.protocol == P_POP3
#if INET6_ENABLE
&& ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
#else
&& ctl->server.port == KPOP_PORT
#endif
&& (ctl->server.authenticate == A_KERBEROS_V4 ||
ctl->server.authenticate == A_KERBEROS_V5))
printf(GT_(" Protocol is KPOP with Kerberos %s authentication"),
ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
else
printf(GT_(" Protocol is %s"), showproto(ctl->server.protocol));
#if INET6_ENABLE
if (ctl->server.service)
printf(GT_(" (using service %s)"), ctl->server.service);
if (ctl->server.netsec)
printf(GT_(" (using network security options %s)"), ctl->server.netsec);
#else
if (ctl->server.port)
printf(GT_(" (using port %d)"), ctl->server.port);
#endif
else if (outlevel >= O_VERBOSE)
printf(GT_(" (using default port)"));
if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
printf(GT_(" (forcing UIDL use)"));
putchar('.');
putchar('\n');
switch (ctl->server.authenticate)
{
case A_ANY:
printf(GT_(" All available authentication methods will be tried.\n"));
break;
case A_PASSWORD:
printf(GT_(" Password authentication will be forced.\n"));
break;
case A_NTLM:
printf(GT_(" NTLM authentication will be forced.\n"));
break;
case A_OTP:
printf(GT_(" OTP authentication will be forced.\n"));
break;
case A_CRAM_MD5:
printf(GT_(" CRAM-Md5 authentication will be forced.\n"));
break;
case A_GSSAPI:
printf(GT_(" GSSAPI authentication will be forced.\n"));
break;
case A_KERBEROS_V4:
printf(GT_(" Kerberos V4 authentication will be forced.\n"));
break;
case A_KERBEROS_V5:
printf(GT_(" Kerberos V5 authentication will be forced.\n"));
break;
case A_SSH:
printf(GT_(" End-to-end encryption assumed.\n"));
break;
}
if (ctl->server.principal != (char *) NULL)
printf(GT_(" Mail service principal is: %s\n"), ctl->server.principal);
#ifdef SSL_ENABLE
if (ctl->use_ssl)
printf(GT_(" SSL encrypted sessions enabled.\n"));
if (ctl->sslcertck) {
printf(GT_(" SSL server certificate checking enabled.\n"));
if (ctl->sslcertpath != NULL)
printf(GT_(" SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
}
if (ctl->sslfingerprint != NULL)
printf(GT_(" SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
#endif
if (ctl->server.timeout > 0)
printf(GT_(" Server nonresponse timeout is %d seconds"), ctl->server.timeout);
if (ctl->server.timeout == CLIENT_TIMEOUT)
printf(GT_(" (default).\n"));
else
printf(".\n");
if (MAILBOX_PROTOCOL(ctl))
{
if (!ctl->mailboxes->id)
printf(GT_(" Default mailbox selected.\n"));
else
{
struct idlist *idp;
printf(GT_(" Selected mailboxes are:"));
for (idp = ctl->mailboxes; idp; idp = idp->next)
printf(" %s", idp->id);
printf("\n");
}
printf(GT_(" %s messages will be retrieved (--all %s).\n"),
ctl->fetchall ? GT_("All") : GT_("Only new"),
ctl->fetchall ? "on" : "off");
printf(GT_(" Fetched messages %s be kept on the server (--keep %s).\n"),
ctl->keep ? GT_("will") : GT_("will not"),
ctl->keep ? "on" : "off");
printf(GT_(" Old messages %s be flushed before message retrieval (--flush %s).\n"),
ctl->flush ? GT_("will") : GT_("will not"),
ctl->flush ? "on" : "off");
printf(GT_(" Rewrite of server-local addresses is %s (--norewrite %s).\n"),
ctl->rewrite ? GT_("enabled") : GT_("disabled"),
ctl->rewrite ? "off" : "on");
printf(GT_(" Carriage-return stripping is %s (stripcr %s).\n"),
ctl->stripcr ? GT_("enabled") : GT_("disabled"),
ctl->stripcr ? "on" : "off");
printf(GT_(" Carriage-return forcing is %s (forcecr %s).\n"),
ctl->forcecr ? GT_("enabled") : GT_("disabled"),
ctl->forcecr ? "on" : "off");
printf(GT_(" Interpretation of Content-Transfer-Encoding is %s (pass8bits %s).\n"),
ctl->pass8bits ? GT_("disabled") : GT_("enabled"),
ctl->pass8bits ? "on" : "off");
printf(GT_(" MIME decoding is %s (mimedecode %s).\n"),
ctl->mimedecode ? GT_("enabled") : GT_("disabled"),
ctl->mimedecode ? "on" : "off");
printf(GT_(" Idle after poll is %s (idle %s).\n"),
ctl->idle ? GT_("enabled") : GT_("disabled"),
ctl->idle ? "on" : "off");
printf(GT_(" Nonempty Status lines will be %s (dropstatus %s)\n"),
ctl->dropstatus ? GT_("discarded") : GT_("kept"),
ctl->dropstatus ? "on" : "off");
printf(GT_(" Delivered-To lines will be %s (dropdelivered %s)\n"),
ctl->dropdelivered ? GT_("discarded") : GT_("kept"),
ctl->dropdelivered ? "on" : "off");
if (NUM_NONZERO(ctl->limit))
{
if (NUM_NONZERO(ctl->limit))
printf(GT_(" Message size limit is %d octets (--limit %d).\n"),
ctl->limit, ctl->limit);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No message size limit (--limit 0).\n"));
if (run.poll_interval > 0)
printf(GT_(" Message size warning interval is %d seconds (--warnings %d).\n"),
ctl->warnings, ctl->warnings);
else if (outlevel >= O_VERBOSE)
printf(GT_(" Size warnings on every poll (--warnings 0).\n"));
}
if (NUM_NONZERO(ctl->fetchlimit))
printf(GT_(" Received-message limit is %d (--fetchlimit %d).\n"),
ctl->fetchlimit, ctl->fetchlimit);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No received-message limit (--fetchlimit 0).\n"));
if (NUM_NONZERO(ctl->batchlimit))
printf(GT_(" SMTP message batch limit is %d.\n"), ctl->batchlimit);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No SMTP message batch limit (--batchlimit 0).\n"));
if (MAILBOX_PROTOCOL(ctl))
{
if (NUM_NONZERO(ctl->expunge))
printf(GT_(" Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No forced expunges (--expunge 0).\n"));
}
}
else
{
struct idlist *idp;
printf(GT_(" Domains for which mail will be fetched are:"));
for (idp = ctl->domainlist; idp; idp = idp->next)
{
printf(" %s", idp->id);
if (!idp->val.status.mark)
printf(GT_(" (default)"));
}
printf("\n");
}
if (ctl->bsmtp)
printf(GT_(" Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
printf(GT_(" Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
else
{
struct idlist *idp;
if (ctl->smtphunt)
{
printf(GT_(" Messages will be %cMTP-forwarded to:"),
ctl->listener);
for (idp = ctl->smtphunt; idp; idp = idp->next)
{
printf(" %s", idp->id);
if (!idp->val.status.mark)
printf(GT_(" (default)"));
}
printf("\n");
}
if (ctl->smtpaddress)
printf(GT_(" Host part of MAIL FROM line will be %s\n"),
ctl->smtpaddress);
if (ctl->smtpname)
printf(GT_(" Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
ctl->smtpname);
}
if (MAILBOX_PROTOCOL(ctl))
{
if (ctl->antispam != (struct idlist *)NULL)
{
struct idlist *idp;
printf(GT_(" Recognized listener spam block responses are:"));
for (idp = ctl->antispam; idp; idp = idp->next)
printf(" %d", idp->val.status.num);
printf("\n");
}
else if (outlevel >= O_VERBOSE)
printf(GT_(" Spam-blocking disabled\n"));
}
if (ctl->preconnect)
printf(GT_(" Server connection will be brought up with \"%s\".\n"),
visbuf(ctl->preconnect));
else if (outlevel >= O_VERBOSE)
printf(GT_(" No pre-connection command.\n"));
if (ctl->postconnect)
printf(GT_(" Server connection will be taken down with \"%s\".\n"),
visbuf(ctl->postconnect));
else if (outlevel >= O_VERBOSE)
printf(GT_(" No post-connection command.\n"));
if (MAILBOX_PROTOCOL(ctl)) {
if (!ctl->localnames)
printf(GT_(" No localnames declared for this host.\n"));
else
{
struct idlist *idp;
int count = 0;
for (idp = ctl->localnames; idp; idp = idp->next)
++count;
if (count > 1 || ctl->wildcard)
printf(GT_(" Multi-drop mode: "));
else
printf(GT_(" Single-drop mode: "));
printf(GT_("%d local name(s) recognized.\n"), count);
if (outlevel >= O_VERBOSE)
{
for (idp = ctl->localnames; idp; idp = idp->next)
if (idp->val.id2)
printf("\t%s -> %s\n", idp->id, idp->val.id2);
else
printf("\t%s\n", idp->id);
if (ctl->wildcard)
fputs("\t*\n", stdout);
}
if (count > 1 || ctl->wildcard)
{
printf(GT_(" DNS lookup for multidrop addresses is %s.\n"),
ctl->server.dns ? GT_("enabled") : GT_("disabled"));
if (ctl->server.dns)
{
printf(GT_(" Server aliases will be compared with multidrop addresses by "));
if (ctl->server.checkalias)
printf(GT_("IP address.\n"));
else
printf(GT_("name.\n"));
}
if (ctl->server.envelope == STRING_DISABLED)
printf(GT_(" Envelope-address routing is disabled\n"));
else
{
printf(GT_(" Envelope header is assumed to be: %s\n"),
ctl->server.envelope ? ctl->server.envelope:GT_("Received"));
if (ctl->server.envskip > 1 || outlevel >= O_VERBOSE)
printf(GT_(" Number of envelope header to be parsed: %d\n"),
ctl->server.envskip);
if (ctl->server.qvirtual)
printf(GT_(" Prefix %s will be removed from user id\n"),
ctl->server.qvirtual);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No prefix stripping\n"));
}
if (ctl->server.akalist)
{
struct idlist *idp;
printf(GT_(" Predeclared mailserver aliases:"));
for (idp = ctl->server.akalist; idp; idp = idp->next)
printf(" %s", idp->id);
putchar('\n');
}
if (ctl->server.localdomains)
{
struct idlist *idp;
printf(GT_(" Local domains:"));
for (idp = ctl->server.localdomains; idp; idp = idp->next)
printf(" %s", idp->id);
putchar('\n');
}
}
}
}
#if defined(linux) || defined(__FreeBSD__)
if (ctl->server.interface)
printf(GT_(" Connection must be through interface %s.\n"), ctl->server.interface);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No interface requirement specified.\n"));
if (ctl->server.monitor)
printf(GT_(" Polling loop will monitor %s.\n"), ctl->server.monitor);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No monitor interface specified.\n"));
#endif
if (ctl->server.plugin)
printf(GT_(" Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No plugin command specified.\n"));
if (ctl->server.plugout)
printf(GT_(" Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
else if (outlevel >= O_VERBOSE)
printf(GT_(" No plugout command specified.\n"));
if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
{
if (!ctl->oldsaved)
printf(GT_(" No UIDs saved from this host.\n"));
else
{
struct idlist *idp;
int count = 0;
for (idp = ctl->oldsaved; idp; idp = idp->next)
++count;
printf(GT_(" %d UIDs saved.\n"), count);
if (outlevel >= O_VERBOSE)
for (idp = ctl->oldsaved; idp; idp = idp->next)
printf("\t%s\n", idp->id);
}
}
if (ctl->tracepolls)
printf(GT_(" Poll trace information will be added to the Received header.\n"));
else if (outlevel >= O_VERBOSE)
printf(GT_(" No poll trace information will be added to the Received header.\n.\n"));
if (ctl->properties)
printf(GT_(" Pass-through properties \"%s\".\n"),
visbuf(ctl->properties));
}
}