src/libexec/mail.local/mail.local.c

380 lines
9.0 KiB
C

/* $OpenBSD: mail.local.c,v 1.43 2024/05/09 08:35:03 florian Exp $ */
/*-
* Copyright (c) 1996-1998 Theo de Raadt <deraadt@theos.com>
* Copyright (c) 1996-1998 David Mazieres <dm@lcs.mit.edu>
* Copyright (c) 1990 The Regents of the University of California.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <sysexits.h>
#include <syslog.h>
#include <fcntl.h>
#include <netdb.h>
#include <pwd.h>
#include <time.h>
#include <unistd.h>
#include <limits.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <signal.h>
#include "pathnames.h"
#include "mail.local.h"
int
main(int argc, char *argv[])
{
struct passwd *pw;
int ch, fd, eval, lockfile=1;
uid_t uid;
char *from;
openlog("mail.local", LOG_PERROR, LOG_MAIL);
from = NULL;
while ((ch = getopt(argc, argv, "lLdf:r:")) != -1)
switch (ch) {
case 'd': /* backward compatible */
break;
case 'f':
case 'r': /* backward compatible */
if (from)
merr(EX_USAGE, "multiple -f options");
from = optarg;
break;
case 'l':
lockfile=1;
break;
case 'L':
lockfile=0;
break;
default:
usage();
}
argc -= optind;
argv += optind;
if (!*argv)
usage();
/*
* If from not specified, use the name from getlogin() if the
* uid matches, otherwise, use the name from the password file
* corresponding to the uid.
*/
uid = getuid();
if (!from && (!(from = getlogin()) ||
!(pw = getpwnam(from)) || pw->pw_uid != uid))
from = (pw = getpwuid(uid)) ? pw->pw_name : "???";
fd = storemail(from);
for (eval = 0; *argv; ++argv) {
if ((ch = deliver(fd, *argv, lockfile)) != 0)
eval = ch;
}
exit(eval);
}
int
storemail(char *from)
{
FILE *fp = NULL;
time_t tval;
int fd, eline = 1;
char *tbuf, *line = NULL, *cnow;
size_t linesize = 0;
ssize_t linelen;
if ((tbuf = strdup(_PATH_LOCTMP)) == NULL)
merr(EX_OSERR, "unable to allocate memory");
if ((fd = mkstemp(tbuf)) == -1 || !(fp = fdopen(fd, "w+")))
merr(EX_OSERR, "unable to open temporary file");
(void)unlink(tbuf);
free(tbuf);
(void)time(&tval);
cnow = ctime(&tval);
(void)fprintf(fp, "From %s %s", from, cnow ? cnow : "?\n");
while ((linelen = getline(&line, &linesize, stdin)) != -1) {
if (line[linelen - 1] == '\n')
line[linelen - 1] = '\0';
if (line[0] == '\0')
eline = 1;
else {
if (eline && !strncmp(line, "From ", 5))
(void)putc('>', fp);
eline = 0;
}
(void)fprintf(fp, "%s\n", line);
if (ferror(fp))
break;
}
free(line);
/* Output a newline; note, empty messages are allowed. */
(void)putc('\n', fp);
(void)fflush(fp);
if (ferror(fp))
merr(EX_OSERR, "temporary file write error");
return(fd);
}
int
deliver(int fd, char *name, int lockfile)
{
struct stat sb, fsb;
struct passwd *pw;
int mbfd=-1, lfd=-1, rval=EX_OSERR;
char biffmsg[100], buf[8*1024], path[PATH_MAX];
off_t curoff;
size_t off;
ssize_t nr, nw;
/*
* Disallow delivery to unknown names -- special mailboxes can be
* handled in the sendmail aliases file.
*/
if (!(pw = getpwnam(name))) {
mwarn("unknown name: %s", name);
return(EX_NOUSER);
}
(void)snprintf(path, sizeof path, "%s/%s", _PATH_MAILDIR, name);
if (lockfile) {
lfd = lockspool(name, pw);
if (lfd == -1)
return(EX_OSERR);
}
/* after this point, always exit via bad to remove lockfile */
retry:
if (lstat(path, &sb)) {
if (errno != ENOENT) {
mwarn("%s: %s", path, strerror(errno));
goto bad;
}
if ((mbfd = open(path, O_APPEND|O_CREAT|O_EXCL|O_WRONLY|O_EXLOCK,
S_IRUSR|S_IWUSR)) == -1) {
if (errno == EEXIST) {
/* file appeared since lstat */
goto retry;
} else {
mwarn("%s: %s", path, strerror(errno));
rval = EX_CANTCREAT;
goto bad;
}
}
/*
* Set the owner and group. Historically, binmail repeated
* this at each mail delivery. We no longer do this, assuming
* that if the ownership or permissions were changed there
* was a reason for doing so.
*/
if (fchown(mbfd, pw->pw_uid, pw->pw_gid) == -1) {
mwarn("chown %u:%u: %s", pw->pw_uid, pw->pw_gid, name);
goto bad;
}
} else {
if (sb.st_nlink != 1 || !S_ISREG(sb.st_mode)) {
mwarn("%s: linked or special file", path);
goto bad;
}
if ((mbfd = open(path, O_APPEND|O_WRONLY|O_EXLOCK,
S_IRUSR|S_IWUSR)) == -1) {
mwarn("%s: %s", path, strerror(errno));
goto bad;
}
if (fstat(mbfd, &fsb) == -1) {
/* relating error to path may be bad style */
mwarn("%s: %s", path, strerror(errno));
goto bad;
}
if (sb.st_dev != fsb.st_dev || sb.st_ino != fsb.st_ino) {
mwarn("%s: changed after open", path);
goto bad;
}
/* paranoia? */
if (fsb.st_nlink != 1 || !S_ISREG(fsb.st_mode)) {
mwarn("%s: linked or special file", path);
rval = EX_CANTCREAT;
goto bad;
}
}
curoff = lseek(mbfd, 0, SEEK_END);
(void)snprintf(biffmsg, sizeof biffmsg, "%s@%lld\n", name,
(long long)curoff);
if (lseek(fd, 0, SEEK_SET) == (off_t)-1) {
mwarn("temporary file: %s", strerror(errno));
goto bad;
}
while ((nr = read(fd, buf, sizeof(buf))) > 0)
for (off = 0; off < nr; off += nw)
if ((nw = write(mbfd, buf + off, nr - off)) == -1) {
mwarn("%s: %s", path, strerror(errno));
(void)ftruncate(mbfd, curoff);
goto bad;
}
if (nr == 0) {
rval = 0;
} else {
(void)ftruncate(mbfd, curoff);
mwarn("temporary file: %s", strerror(errno));
}
bad:
if (lfd != -1)
unlockspool();
if (mbfd != -1) {
(void)fsync(mbfd); /* Don't wait for update. */
(void)close(mbfd); /* Implicit unlock. */
}
if (!rval)
notifybiff(biffmsg);
return(rval);
}
void
notifybiff(char *msg)
{
static struct addrinfo *res0;
struct addrinfo hints, *res;
static int f = -1;
size_t len;
int error;
if (res0 == NULL) {
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_UNSPEC;
hints.ai_socktype = SOCK_DGRAM;
error = getaddrinfo("localhost", "biff", &hints, &res0);
if (error) {
/* Be silent if biff service not available. */
if (error != EAI_SERVICE) {
mwarn("localhost: %s", gai_strerror(error));
}
return;
}
}
if (f == -1) {
for (res = res0; res != NULL; res = res->ai_next) {
f = socket(res->ai_family, res->ai_socktype,
res->ai_protocol);
if (f != -1)
break;
}
}
if (f == -1) {
mwarn("socket: %s", strerror(errno));
return;
}
len = strlen(msg) + 1; /* XXX */
if (sendto(f, msg, len, 0, res->ai_addr, res->ai_addrlen) != len)
mwarn("sendto biff: %s", strerror(errno));
}
static int lockfd = -1;
static pid_t lockpid = -1;
int
lockspool(const char *name, struct passwd *pw)
{
int pfd[2];
char ch;
if (geteuid() == 0)
return getlock(name, pw);
/* If not privileged, open pipe to lockspool(1) instead */
if (pipe2(pfd, O_CLOEXEC) == -1) {
merr(EX_OSERR, "pipe: %s", strerror(errno));
return -1;
}
signal(SIGPIPE, SIG_IGN);
switch ((lockpid = fork())) {
case -1:
merr(EX_OSERR, "fork: %s", strerror(errno));
return -1;
case 0:
/* child */
close(pfd[0]);
dup2(pfd[1], STDOUT_FILENO);
execl(_PATH_LOCKSPOOL, "lockspool", (char *)NULL);
merr(EX_OSERR, "execl: lockspool: %s", strerror(errno));
/* NOTREACHED */
break;
default:
/* parent */
close(pfd[1]);
lockfd = pfd[0];
break;
}
if (read(lockfd, &ch, 1) != 1 || ch != '1') {
unlockspool();
merr(EX_OSERR, "lockspool: unable to get lock");
}
return lockfd;
}
void
unlockspool(void)
{
if (lockpid != -1) {
waitpid(lockpid, NULL, 0);
lockpid = -1;
} else {
rellock();
}
close(lockfd);
lockfd = -1;
}
void
usage(void)
{
merr(EX_USAGE, "usage: mail.local [-Ll] [-f from] user ...");
}