Testsuite: case for malware= avast
[exim.git] / src / src / malware.c
CommitLineData
8523533c
TK
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
5a66c31b 5/* Copyright (c) Tom Kistner <tom@duncanthrax.net> 2003-2014 */
8523533c
TK
6/* License: GPL */
7
8/* Code for calling virus (malware) scanners. Called from acl.c. */
9
10#include "exim.h"
11#ifdef WITH_CONTENT_SCAN
12
b1f8e4f8 13typedef enum {M_FPROTD, M_DRWEB, M_AVES, M_FSEC, M_KAVD, M_CMDL,
b6fbf22d 14 M_SOPHIE, M_CLAMD, M_SOCK, M_MKSD, M_AVAST} scanner_t;
b1f8e4f8
JH
15typedef enum {MC_NONE, MC_TCP, MC_UNIX, MC_STRM} contype_t;
16static struct scan
17{
18 scanner_t scancode;
19 const uschar * name;
20 const uschar * options_default;
21 contype_t conn;
22} m_scans[] =
23{
24 { M_FPROTD, US"f-protd", US"localhost 10200-10204", MC_TCP },
25 { M_DRWEB, US"drweb", US"/usr/local/drweb/run/drwebd.sock", MC_STRM },
26 { M_AVES, US"aveserver", US"/var/run/aveserver", MC_UNIX },
27 { M_FSEC, US"fsecure", US"/var/run/.fsav", MC_UNIX },
28 { M_KAVD, US"kavdaemon", US"/var/run/AvpCtl", MC_UNIX },
29 { M_CMDL, US"cmdline", NULL, MC_NONE },
30 { M_SOPHIE, US"sophie", US"/var/run/sophie", MC_UNIX },
31 { M_CLAMD, US"clamd", US"/tmp/clamd", MC_NONE },
32 { M_SOCK, US"sock", US"/tmp/malware.sock", MC_STRM },
33 { M_MKSD, US"mksd", NULL, MC_NONE },
b6fbf22d 34 { M_AVAST, US"avast", US"/var/run/avast/scan.sock", MC_STRM },
b1f8e4f8
JH
35 { -1, NULL, NULL, MC_NONE } /* end-marker */
36};
37
599dcb77
TL
38/* The maximum number of clamd servers that are supported in the configuration */
39#define MAX_CLAMD_SERVERS 32
40#define MAX_CLAMD_SERVERS_S "32"
41/* Maximum length of the hostname that can be specified in the clamd address list */
42#define MAX_CLAMD_ADDRESS_LENGTH 64
43#define MAX_CLAMD_ADDRESS_LENGTH_S "64"
44
45typedef struct clamd_address_container {
c3680ef0 46 uschar tcp_addr[MAX_CLAMD_ADDRESS_LENGTH+1];
599dcb77
TL
47 unsigned int tcp_port;
48} clamd_address_container;
49
8523533c 50/* declaration of private routines */
b1f8e4f8 51static int mksd_scan_packed(struct scan * scanent, int sock, uschar *scan_filename);
8544e77a 52static int malware_internal(uschar **listptr, uschar *eml_filename, BOOL faking);
8523533c 53
b1f8e4f8
JH
54#ifndef nelements
55# define nelements(arr) (sizeof(arr) / sizeof(arr[0]))
8523533c
TK
56#endif
57
a9ccd69a
PH
58
59#define MALWARE_TIMEOUT 120
60
61
8523533c
TK
62#define DRWEBD_SCAN_CMD (1) /* scan file, buffer or diskfile */
63#define DRWEBD_RETURN_VIRUSES (1<<0) /* ask daemon return to us viruses names from report */
64#define DRWEBD_IS_MAIL (1<<19) /* say to daemon that format is "archive MAIL" */
65
2376f2f5
TK
66#define DERR_READ_ERR (1<<0) /* read error */
67#define DERR_NOMEMORY (1<<2) /* no memory */
68#define DERR_TIMEOUT (1<<9) /* scan timeout has run out */
69#define DERR_BAD_CALL (1<<15) /* wrong command */
70
b1f8e4f8 71/* Routine to check whether a system is big- or little-endian.
8523533c
TK
72 Ripped from http://www.faqs.org/faqs/graphics/fileformats-faq/part4/section-7.html
73 Needed for proper kavdaemon implementation. Sigh. */
74#define BIG_MY_ENDIAN 0
75#define LITTLE_MY_ENDIAN 1
b1f8e4f8
JH
76static int test_byte_order(void);
77static inline int
78test_byte_order()
79{
80 short int word = 0x0001;
81 char *byte = (char *) &word;
82 return(byte[0] ? LITTLE_MY_ENDIAN : BIG_MY_ENDIAN);
8523533c
TK
83}
84
b1f8e4f8 85BOOL malware_ok = FALSE;
8523533c 86
8544e77a
PP
87/* Gross hacks for the -bmalware option; perhaps we should just create
88the scan directory normally for that case, but look into rigging up the
89needed header variables if not already set on the command-line? */
90extern int spool_mbox_ok;
91extern uschar spooled_message_id[17];
92
93/*************************************************
94* Scan an email for malware *
95*************************************************/
96
97/* This is the normal interface for scanning an email, which doesn't need a
98filename; it's a wrapper around the malware_file function.
99
100Arguments:
101 listptr the list of options to the "malware = ..." ACL condition
102
103Returns: Exim message processing code (OK, FAIL, DEFER, ...)
104 where true means malware was found (condition applies)
105*/
b1f8e4f8
JH
106int
107malware(uschar **listptr)
108{
109 uschar * scan_filename;
9e949f00 110 int ret;
8544e77a 111
b1f8e4f8
JH
112 scan_filename = string_sprintf("%s/scan/%s/%s.eml",
113 spool_directory, message_id, message_id);
9e949f00
PP
114 ret = malware_internal(listptr, scan_filename, FALSE);
115 if (ret == DEFER) av_failed = TRUE;
116
117 return ret;
8544e77a
PP
118}
119
120
121/*************************************************
122* Scan a file for malware *
123*************************************************/
124
125/* This is a test wrapper for scanning an email, which is not used in
126normal processing. Scan any file, using the Exim scanning interface.
127This function tampers with various global variables so is unsafe to use
128in any other context.
129
130Arguments:
131 eml_filename a file holding the message to be scanned
132
133Returns: Exim message processing code (OK, FAIL, DEFER, ...)
134 where true means malware was found (condition applies)
135*/
dbc4b90d 136int
b1f8e4f8
JH
137malware_in_file(uschar *eml_filename)
138{
8544e77a
PP
139 uschar *scan_options[2];
140 uschar message_id_buf[64];
141 int ret;
142
73a46702 143 scan_options[0] = US"*";
8544e77a
PP
144 scan_options[1] = NULL;
145
146 /* spool_mbox() assumes various parameters exist, when creating
147 the relevant directory and the email within */
148 (void) string_format(message_id_buf, sizeof(message_id_buf),
17c76198 149 "dummy-%d", vaguely_random_number(INT_MAX));
8544e77a 150 message_id = message_id_buf;
73a46702
PP
151 sender_address = US"malware-sender@example.net";
152 return_path = US"";
8544e77a 153 recipients_list = NULL;
73a46702 154 receive_add_recipient(US"malware-victim@example.net", -1);
8544e77a
PP
155 enable_dollar_recipients = TRUE;
156
157 ret = malware_internal(scan_options, eml_filename, TRUE);
158
73a46702 159 Ustrncpy(spooled_message_id, message_id, sizeof(spooled_message_id));
8544e77a
PP
160 spool_mbox_ok = 1;
161 /* don't set no_mbox_unspool; at present, there's no way for it to become
162 set, but if that changes, then it should apply to these tests too */
163 unspool_mbox();
164
08488c86
PP
165 /* silence static analysis tools */
166 message_id = NULL;
167
8544e77a
PP
168 return ret;
169}
170
171
b1f8e4f8
JH
172static inline int
173malware_errlog_defer(const uschar * str)
174{
175 log_write(0, LOG_MAIN|LOG_PANIC, "malware acl condition: %s", str);
176 return DEFER;
177}
178
179static int
180m_errlog_defer(struct scan * scanent, const uschar * str)
181{
182 return malware_errlog_defer(string_sprintf("%s: %s", scanent->name, str));
183}
184static int
185m_errlog_defer_3(struct scan * scanent, const uschar * str,
186 int fd_to_close)
187{
188 (void) close(fd_to_close);
189 return m_errlog_defer(scanent, str);
190}
191
192/*************************************************/
193
194/* Only used by the Clamav code, which is working from a list of servers and
195uses the returned in_addr to get a second connection to the same system.
196*/
197static inline int
198m_tcpsocket(const uschar * hostname, unsigned int port,
199 host_item * host, uschar ** errstr)
200{
201 return ip_connectedsocket(SOCK_STREAM, hostname, port, port, 5, host, errstr);
202}
203
204static int
205m_tcpsocket_fromdef(const uschar * hostport, uschar ** errstr)
206{
207 int scan;
208 uschar hostname[256];
209 unsigned int portlow, porthigh;
210
211 /* extract host and port part */
212 scan = sscanf(CS hostport, "%255s %u-%u", hostname, &portlow, &porthigh);
213 if ( scan != 3 ) {
214 if ( scan != 2 ) {
215 *errstr = string_sprintf("invalid socket '%s'", hostport);
216 return -1;
217 }
218 porthigh = portlow;
219 }
220
221 return ip_connectedsocket(SOCK_STREAM, hostname, portlow, porthigh,
222 5, NULL, errstr);
223}
224
225static int
226m_unixsocket(const uschar * path, uschar ** errstr)
227{
228 int sock;
229 struct sockaddr_un server;
230
231 if ((sock = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) {
232 *errstr = US"can't open UNIX socket.";
233 return -1;
234 }
235
236 server.sun_family = AF_UNIX;
237 Ustrncpy(server.sun_path, path, sizeof(server.sun_path)-1);
238 server.sun_path[sizeof(server.sun_path)-1] = '\0';
239 if (connect(sock, (struct sockaddr *) &server, sizeof(server)) < 0) {
240 int err = errno;
241 (void)close(sock);
242 *errstr = string_sprintf("unable to connect to UNIX socket (%s): %s",
243 path, strerror(err));
244 return -1;
245 }
246 return sock;
247}
248
249static inline int
250m_streamsocket(const uschar * spec, uschar ** errstr)
251{
252 return *spec == '/'
253 ? m_unixsocket(spec, errstr) : m_tcpsocket_fromdef(spec, errstr);
254}
255
256static int
257m_sock_send(int sock, uschar * buf, int cnt, uschar ** errstr)
258{
259 if (send(sock, buf, cnt, 0) < 0) {
260 int err = errno;
261 (void)close(sock);
262 *errstr = string_sprintf("unable to send to socket (%s): %s",
263 buf, strerror(err));
264 return -1;
265 }
266 return sock;
267}
268
269static const pcre *
270m_pcre_compile(const uschar * re, uschar ** errstr)
271{
272 const uschar * rerror;
273 int roffset;
274 const pcre * cre;
275
276 cre = pcre_compile(CS re, PCRE_COPT, (const char **)&rerror, &roffset, NULL);
277 if (!cre)
278 *errstr= string_sprintf("regular expression error in '%s': %s at offset %d",
279 re, rerror, roffset);
280 return cre;
281}
282
283uschar *
284m_pcre_exec(const pcre * cre, uschar * text)
285{
286 int ovector[10*3];
287 int i = pcre_exec(cre, NULL, CS text, Ustrlen(text), 0, 0,
288 ovector, nelements(ovector));
289 uschar * substr = NULL;
290 if (i >= 2) /* Got it */
291 pcre_get_substring(CS text, ovector, i, 1, (const char **) &substr);
292 return substr;
293}
294
295static const pcre *
296m_pcre_nextinlist(uschar ** list, int * sep, char * listerr, uschar ** errstr)
297{
298 const uschar * list_ele;
299 const pcre * cre = NULL;
300
301 if (!(list_ele = string_nextinlist(list, sep, NULL, 0)))
302 *errstr = US listerr;
303 else
304 cre = m_pcre_compile(CUS list_ele, errstr);
305 return cre;
306}
307
8544e77a
PP
308/*************************************************
309* Scan content for malware *
310*************************************************/
311
312/* This is an internal interface for scanning an email; the normal interface
313is via malware(), or there's malware_in_file() used for testing/debugging.
314
315Arguments:
316 listptr the list of options to the "malware = ..." ACL condition
317 eml_filename the file holding the email to be scanned
318 faking whether or not we're faking this up for the -bmalware test
319
320Returns: Exim message processing code (OK, FAIL, DEFER, ...)
321 where true means malware was found (condition applies)
322*/
b1f8e4f8
JH
323static int
324malware_internal(uschar **listptr, uschar *eml_filename, BOOL faking)
325{
8523533c
TK
326 int sep = 0;
327 uschar *list = *listptr;
328 uschar *av_scanner_work = av_scanner;
329 uschar *scanner_name;
8523533c 330 uschar *malware_regex;
8523533c 331 uschar malware_regex_default[] = ".+";
f7b63901 332 unsigned long mbox_size;
8523533c 333 FILE *mbox_file;
8523533c 334 const pcre *re;
b1f8e4f8
JH
335 uschar * errstr;
336 struct scan * scanent;
337 const uschar * scanner_options;
338 int sock = -1;
8e669ac1 339
8523533c 340 /* make sure the eml mbox file is spooled up */
b1f8e4f8
JH
341 if (!(mbox_file = spool_mbox(&mbox_size, faking ? eml_filename : NULL)))
342 return malware_errlog_defer(US"error while creating mbox spool file");
343
8523533c
TK
344 /* none of our current scanners need the mbox
345 file as a stream, so we can close it right away */
f1e894f3 346 (void)fclose(mbox_file);
8e669ac1 347
8523533c 348 /* extract the malware regex to match against from the option list */
b1f8e4f8
JH
349 if (!(malware_regex = string_nextinlist(&list, &sep, NULL, 0)))
350 return FAIL; /* empty means "don't match anything" */
8e669ac1 351
b1f8e4f8 352 /* parse 1st option */
8e669ac1 353 if ( (strcmpic(malware_regex,US"false") == 0) ||
b1f8e4f8
JH
354 (Ustrcmp(malware_regex,"0") == 0) )
355 return FAIL; /* explicitly no matching */
356
357 /* special cases (match anything except empty) */
358 if ( (strcmpic(malware_regex,US"true") == 0) ||
359 (Ustrcmp(malware_regex,"*") == 0) ||
360 (Ustrcmp(malware_regex,"1") == 0) )
361 malware_regex = malware_regex_default;
8523533c 362
ee873c8c
TK
363 /* Reset sep that is set by previous string_nextinlist() call */
364 sep = 0;
365
8523533c 366 /* compile the regex, see if it works */
b1f8e4f8
JH
367 if (!(re = m_pcre_compile(malware_regex, &errstr)))
368 return malware_errlog_defer(errstr);
8523533c
TK
369
370 /* if av_scanner starts with a dollar, expand it first */
371 if (*av_scanner == '$') {
b1f8e4f8
JH
372 if (!(av_scanner_work = expand_string(av_scanner)))
373 return malware_errlog_defer(
374 string_sprintf("av_scanner starts with $, but expansion failed: %s",
375 expand_string_message));
376
377 debug_printf("Expanded av_scanner global: %s\n", av_scanner_work);
378 /* disable result caching in this case */
379 malware_name = NULL;
380 malware_ok = FALSE;
8523533c
TK
381 }
382
b1f8e4f8
JH
383 /* Do not scan twice (unless av_scanner is dynamic). */
384 if (!malware_ok) {
8523533c
TK
385
386 /* find the scanner type from the av_scanner option */
b1f8e4f8
JH
387 if (!(scanner_name = string_nextinlist(&av_scanner_work, &sep, NULL, 0)))
388 return malware_errlog_defer(US"av_scanner configuration variable is empty");
389
390 for (scanent = m_scans; ; scanent++) {
391 if (!scanent->name)
392 return malware_errlog_defer(string_sprintf("unknown scanner type '%s'",
393 scanner_name));
394 if (strcmpic(scanner_name, US scanent->name) != 0)
395 continue;
396 if (!(scanner_options = string_nextinlist(&av_scanner_work, &sep, NULL, 0)))
397 scanner_options = scanent->options_default;
398 if (scanent->conn == MC_NONE)
399 break;
400 switch(scanent->conn)
384152a6 401 {
b1f8e4f8
JH
402 case MC_TCP: sock = m_tcpsocket_fromdef(scanner_options, &errstr); break;
403 case MC_UNIX: sock = m_unixsocket(scanner_options, &errstr); break;
404 case MC_STRM: sock = m_streamsocket(scanner_options, &errstr); break;
e3dd1d67 405 default: /* compiler quietening */ break;
384152a6 406 }
b1f8e4f8
JH
407 if (sock < 0)
408 return m_errlog_defer(scanent, errstr);
409 break;
384152a6 410 }
187bc588 411 DEBUG(D_lookup) debug_printf("Malware scan: %s\n", scanner_name);
8e669ac1 412
b1f8e4f8
JH
413 switch (scanent->scancode) {
414 case M_FPROTD: /* "f-protd" scanner type -------------------------------- */
415 {
416 uschar *fp_scan_option;
417 unsigned int detected=0, par_count=0;
418 uschar * scanrequest;
419 uschar buf[32768], *strhelper, *strhelper2;
420 uschar * malware_name_internal = NULL;
421
422 DEBUG(D_acl) debug_printf("Malware scan: issuing %s GET\n", scanner_name);
423 scanrequest = string_sprintf("GET %s", eml_filename);
424
425 while ((fp_scan_option = string_nextinlist(&av_scanner_work, &sep,
426 NULL, 0))) {
427 scanrequest = string_sprintf("%s%s%s", scanrequest,
428 par_count ? "%20" : "?", fp_scan_option);
429 par_count++;
430 }
431 scanrequest = string_sprintf("%s HTTP/1.0\r\n\r\n", scanrequest);
432
433 /* send scan request */
434 if (m_sock_send(sock, scanrequest, Ustrlen(scanrequest)+1, &errstr) < 0)
435 return m_errlog_defer(scanent, errstr);
436
437 /* We get a lot of empty lines, so we need this hack to check for any data at all */
438 while( recv(sock, buf, 1, MSG_PEEK) > 0 ) {
439 if ( recv_line(sock, buf, sizeof(buf)) > 0) {
440 if ( Ustrstr(buf, US"<detected type=\"") != NULL )
441 detected = 1;
442 else if ( detected && (strhelper = Ustrstr(buf, US"<name>")) ) {
443 if ((strhelper2 = Ustrstr(buf, US"</name>")) != NULL) {
444 *strhelper2 = '\0';
445 malware_name_internal = string_copy(strhelper+6);
446 }
447 } else if ( Ustrstr(buf, US"<summary code=\"") )
448 malware_name = Ustrstr(buf, US"<summary code=\"11\">")
449 ? malware_name_internal : NULL;
450 }
451 }
452 break;
453 } /* f-protd */
7e274b4b 454
b1f8e4f8
JH
455 case M_DRWEB: /* "drweb" scanner type ----------------------------------- */
456 /* v0.1 - added support for tcp sockets */
457 /* v0.0 - initial release -- support for unix sockets */
458 {
459 int result;
cb54b2a0
PP
460 off_t fsize;
461 unsigned int fsize_uint;
b1f8e4f8
JH
462 uschar * tmpbuf, *drweb_fbuf;
463 int drweb_rc, drweb_cmd, drweb_flags = 0x0000, drweb_fd,
464 drweb_vnum, drweb_slen, drweb_fin = 0x0000;
465 unsigned long bread;
466 const pcre *drweb_re;
467
468 /* prepare variables */
469 drweb_cmd = htonl(DRWEBD_SCAN_CMD);
470 drweb_flags = htonl(DRWEBD_RETURN_VIRUSES | DRWEBD_IS_MAIL);
471
472 if (*scanner_options != '/') {
473
474 /* calc file size */
475 if ((drweb_fd = open(CS eml_filename, O_RDONLY)) == -1)
476 return m_errlog_defer_3(scanent,
477 string_sprintf("can't open spool file %s: %s",
478 eml_filename, strerror(errno)),
479 sock);
480
481 if ((fsize = lseek(drweb_fd, 0, SEEK_END)) == -1) {
482 int err = errno;
483 (void)close(drweb_fd);
484 return m_errlog_defer_3(scanent,
485 string_sprintf("can't seek spool file %s: %s",
486 eml_filename, strerror(err)),
487 sock);
488 }
cb54b2a0
PP
489 fsize_uint = (unsigned int) fsize;
490 if ((off_t)fsize_uint != fsize) {
491 (void)close(drweb_fd);
492 return m_errlog_defer_3(scanent,
493 string_sprintf("seeking spool file %s, size overflow",
494 eml_filename),
495 sock);
496 }
b1f8e4f8
JH
497 drweb_slen = htonl(fsize);
498 lseek(drweb_fd, 0, SEEK_SET);
499
500 DEBUG(D_acl) debug_printf("Malware scan: issuing %s remote scan [%s]\n",
501 scanner_name, scanner_options);
502
503 /* send scan request */
504 if ((send(sock, &drweb_cmd, sizeof(drweb_cmd), 0) < 0) ||
505 (send(sock, &drweb_flags, sizeof(drweb_flags), 0) < 0) ||
506 (send(sock, &drweb_fin, sizeof(drweb_fin), 0) < 0) ||
507 (send(sock, &drweb_slen, sizeof(drweb_slen), 0) < 0)) {
508 (void)close(drweb_fd);
509 return m_errlog_defer_3(scanent,
510 string_sprintf("unable to send commands to socket (%s)", scanner_options),
511 sock);
512 }
513
cb54b2a0 514 if (!(drweb_fbuf = (uschar *) malloc (fsize_uint))) {
b1f8e4f8
JH
515 (void)close(drweb_fd);
516 return m_errlog_defer_3(scanent,
517 string_sprintf("unable to allocate memory %u for file (%s)",
cb54b2a0 518 fsize_uint, eml_filename),
b1f8e4f8
JH
519 sock);
520 }
521
522 if ((result = read (drweb_fd, drweb_fbuf, fsize)) == -1) {
523 int err = errno;
524 (void)close(drweb_fd);
525 free(drweb_fbuf);
526 return m_errlog_defer_3(scanent,
527 string_sprintf("can't read spool file %s: %s",
528 eml_filename, strerror(err)),
529 sock);
530 }
531 (void)close(drweb_fd);
532
533 /* send file body to socket */
534 if (send(sock, drweb_fbuf, fsize, 0) < 0) {
535 free(drweb_fbuf);
536 return m_errlog_defer_3(scanent,
537 string_sprintf("unable to send file body to socket (%s)", scanner_options),
538 sock);
539 }
540 (void)close(drweb_fd);
541
542 } else {
543
544 drweb_slen = htonl(Ustrlen(eml_filename));
545
546 DEBUG(D_acl) debug_printf("Malware scan: issuing %s local scan [%s]\n",
547 scanner_name, scanner_options);
548
549 /* send scan request */
550 if ((send(sock, &drweb_cmd, sizeof(drweb_cmd), 0) < 0) ||
551 (send(sock, &drweb_flags, sizeof(drweb_flags), 0) < 0) ||
552 (send(sock, &drweb_slen, sizeof(drweb_slen), 0) < 0) ||
553 (send(sock, eml_filename, Ustrlen(eml_filename), 0) < 0) ||
554 (send(sock, &drweb_fin, sizeof(drweb_fin), 0) < 0))
555 return m_errlog_defer_3(scanent,
556 string_sprintf("unable to send commands to socket (%s)", scanner_options),
557 sock);
558 }
8e669ac1 559
b1f8e4f8
JH
560 /* wait for result */
561 if ((bread = recv(sock, &drweb_rc, sizeof(drweb_rc), 0) != sizeof(drweb_rc)))
562 return m_errlog_defer_3(scanent,
563 US"unable to read return code", sock);
564 drweb_rc = ntohl(drweb_rc);
565
566 if ((bread = recv(sock, &drweb_vnum, sizeof(drweb_vnum), 0) != sizeof(drweb_vnum)))
567 return m_errlog_defer_3(scanent,
568 US"unable to read the number of viruses", sock);
569 drweb_vnum = ntohl(drweb_vnum);
570
571 /* "virus(es) found" if virus number is > 0 */
572 if (drweb_vnum) {
573 int i;
574
575 /* setup default virus name */
576 malware_name = US"unknown";
577
578 /* set up match regex */
579 drweb_re = m_pcre_compile(US"infected\\swith\\s*(.+?)$", &errstr);
580
581 /* read and concatenate virus names into one string */
582 for (i=0;i<drweb_vnum;i++)
583 {
584 int size = 0, off = 0, ovector[10*3];
585 /* read the size of report */
586 if ((bread = recv(sock, &drweb_slen, sizeof(drweb_slen), 0) != sizeof(drweb_slen)))
587 return m_errlog_defer_3(scanent,
588 US"cannot read report size", sock);
589 drweb_slen = ntohl(drweb_slen);
590 tmpbuf = store_get(drweb_slen);
591
592 /* read report body */
593 if ((bread = recv(sock, tmpbuf, drweb_slen, 0)) != drweb_slen)
594 return m_errlog_defer_3(scanent,
595 US"cannot read report string", sock);
596 tmpbuf[drweb_slen] = '\0';
597
598 /* try matcher on the line, grab substring */
599 result = pcre_exec(drweb_re, NULL, CS tmpbuf, Ustrlen(tmpbuf), 0, 0,
600 ovector, nelements(ovector));
601 if (result >= 2) {
602 const char * pre_malware_nb;
603
604 pcre_get_substring(CS tmpbuf, ovector, result, 1, &pre_malware_nb);
605
606 if (i==0) /* the first name we just copy to malware_name */
607 malware_name = string_append(NULL, &size, &off,
608 1, pre_malware_nb);
609
610 else /* concatenate each new virus name to previous */
611 malware_name = string_append(malware_name, &size, &off,
612 2, "/", pre_malware_nb);
613
614 pcre_free_substring(pre_malware_nb);
615 }
616 }
617 }
618 else {
619 const char *drweb_s = NULL;
620
621 if (drweb_rc & DERR_READ_ERR) drweb_s = "read error";
622 if (drweb_rc & DERR_NOMEMORY) drweb_s = "no memory";
623 if (drweb_rc & DERR_TIMEOUT) drweb_s = "timeout";
624 if (drweb_rc & DERR_BAD_CALL) drweb_s = "wrong command";
625 /* retcodes DERR_SYMLINK, DERR_NO_REGFILE, DERR_SKIPPED.
626 * DERR_TOO_BIG, DERR_TOO_COMPRESSED, DERR_SPAM,
627 * DERR_CRC_ERROR, DERR_READSOCKET, DERR_WRITE_ERR
628 * and others are ignored */
629 if (drweb_s)
630 return m_errlog_defer_3(scanent,
631 string_sprintf("drweb daemon retcode 0x%x (%s)", drweb_rc, drweb_s),
632 sock);
633
634 /* no virus found */
635 malware_name = NULL;
636 }
637 break;
638 } /* drweb */
8e669ac1 639
b1f8e4f8
JH
640 case M_AVES: /* "aveserver" scanner type -------------------------------- */
641 {
642 uschar buf[32768];
643 int result;
8544e77a 644
b1f8e4f8
JH
645 /* read aveserver's greeting and see if it is ready (2xx greeting) */
646 recv_line(sock, buf, sizeof(buf));
8e669ac1 647
b1f8e4f8
JH
648 if (buf[0] != '2') /* aveserver is having problems */
649 return m_errlog_defer_3(scanent,
650 string_sprintf("unavailable (Responded: %s).",
651 ((buf[0] != 0) ? buf : (uschar *)"nothing") ),
652 sock);
8e669ac1 653
b1f8e4f8
JH
654 /* prepare our command */
655 (void)string_format(buf, sizeof(buf), "SCAN bPQRSTUW %s\r\n",
656 eml_filename);
8e669ac1 657
b1f8e4f8 658 DEBUG(D_acl) debug_printf("Malware scan: issuing %s SCAN\n", scanner_name);
8e669ac1 659
b1f8e4f8
JH
660 /* and send it */
661 if (m_sock_send(sock, buf, Ustrlen(buf), &errstr) < 0)
662 return m_errlog_defer(scanent, errstr);
8e669ac1 663
b1f8e4f8
JH
664 malware_name = NULL;
665 result = 0;
666 /* read response lines, find malware name and final response */
667 while (recv_line(sock, buf, sizeof(buf)) > 0) {
668 debug_printf("aveserver: %s\n", buf);
669 if (buf[0] == '2')
670 break;
671 if (buf[0] == '5') { /* aveserver is having problems */
672 result = m_errlog_defer(scanent,
673 string_sprintf("unable to scan file %s (Responded: %s).",
674 eml_filename, buf));
675 break;
676 } else if (Ustrncmp(buf,"322",3) == 0) {
677 uschar *p = Ustrchr(&buf[4],' ');
678 *p = '\0';
679 malware_name = string_copy(&buf[4]);
680 }
681 }
8e669ac1 682
b1f8e4f8
JH
683 /* and send it */
684 if (m_sock_send(sock, US"quit\r\n", 6, &errstr) < 0)
685 return m_errlog_defer(scanent, errstr);
8544e77a 686
b1f8e4f8
JH
687 /* read aveserver's greeting and see if it is ready (2xx greeting) */
688 recv_line(sock, buf, sizeof(buf));
8544e77a 689
b1f8e4f8
JH
690 if (buf[0] != '2') /* aveserver is having problems */
691 return m_errlog_defer_3(scanent,
692 string_sprintf("unable to quit dialogue (Responded: %s).",
693 ((buf[0] != 0) ? buf : (uschar *)"nothing") ),
694 sock);
8e669ac1 695
b1f8e4f8
JH
696 if (result == DEFER) {
697 (void)close(sock);
698 return DEFER;
699 }
700 break;
701 } /* aveserver */
8e669ac1 702
b1f8e4f8
JH
703 case M_FSEC: /* "fsecure" scanner type ---------------------------------- */
704 {
705 int i, j, bread = 0;
706 uschar * file_name;
707 uschar av_buffer[1024];
708 const pcre * fs_inf;
709 static uschar *cmdopt[] = { US"CONFIGURE\tARCHIVE\t1\n",
710 US"CONFIGURE\tTIMEOUT\t0\n",
711 US"CONFIGURE\tMAXARCH\t5\n",
712 US"CONFIGURE\tMIME\t1\n" };
fd02dc0e 713 time_t tmo;
8e669ac1 714
b1f8e4f8 715 malware_name = NULL;
8523533c 716
b1f8e4f8
JH
717 DEBUG(D_acl) debug_printf("Malware scan: issuing %s scan [%s]\n",
718 scanner_name, scanner_options);
fd02dc0e 719 tmo = time(NULL) + MALWARE_TIMEOUT;
b1f8e4f8
JH
720 /* pass options */
721 memset(av_buffer, 0, sizeof(av_buffer));
722 for (i=0; i != nelements(cmdopt); i++) {
723
724 if (m_sock_send(sock, cmdopt[i], Ustrlen(cmdopt[i]), &errstr) < 0)
725 return m_errlog_defer(scanent, errstr);
726
727 bread = ip_recv(sock, av_buffer, sizeof(av_buffer), MALWARE_TIMEOUT);
728 if (bread >0) av_buffer[bread]='\0';
729 if (bread < 0)
730 return m_errlog_defer_3(scanent,
731 string_sprintf("unable to read answer %d (%s)", i, strerror(errno)),
732 sock);
733 for (j=0;j<bread;j++)
734 if((av_buffer[j]=='\r')||(av_buffer[j]=='\n'))
735 av_buffer[j] ='@';
736 }
8e669ac1 737
b1f8e4f8
JH
738 /* pass the mailfile to fsecure */
739 file_name = string_sprintf("SCAN\t%s\n", eml_filename);
740
741 if (m_sock_send(sock, file_name, Ustrlen(file_name), &errstr) < 0)
742 return m_errlog_defer(scanent, errstr);
743
744 /* set up match */
745 /* todo also SUSPICION\t */
746 fs_inf = m_pcre_compile(US"\\S{0,5}INFECTED\\t[^\\t]*\\t([^\\t]+)\\t\\S*$", &errstr);
747
fd02dc0e
JH
748 /* read report, linewise. Apply a timeout as the Fsecure daemon
749 sometimes wants an answer to "PING" but they won't tell us what */
750 {
751 uschar * p = av_buffer;
752 uschar * q;
753
754 for (;;)
755 {
756 int t = tmo - time(NULL);
757
758 errno = ETIME;
759 i = av_buffer+sizeof(av_buffer)-p;
760 if ( t <= 0
761 || (bread= ip_recv(sock, p, i-1, t)) < 0
762 )
b1f8e4f8
JH
763 return m_errlog_defer_3(scanent,
764 string_sprintf("unable to read result (%s)", strerror(errno)),
765 sock);
b1f8e4f8 766
fd02dc0e
JH
767 for (p[bread] = '\0'; q = strchr(p, '\n'); p = q+1)
768 {
769 *q = '\0';
770
771 /* Really search for virus again? */
772 if (!malware_name)
773 /* try matcher on the line, grab substring */
774 malware_name = m_pcre_exec(fs_inf, p);
775
776 if (Ustrstr(p, "OK\tScan ok."))
777 goto fsec_found;
778 }
779
780 /* copy down the trailing partial line then read another chunk */
781 i = av_buffer+sizeof(av_buffer)-p;
782 memmove(av_buffer, p, i);
783 p = av_buffer+i;
784 }
b1f8e4f8 785 }
fd02dc0e
JH
786
787 fsec_found:
b1f8e4f8
JH
788 break;
789 } /* fsecure */
599dcb77 790
b1f8e4f8
JH
791 case M_KAVD: /* "kavdaemon" scanner type -------------------------------- */
792 {
793 time_t t;
794 uschar tmpbuf[1024];
795 uschar * scanrequest;
796 int kav_rc;
797 unsigned long kav_reportlen, bread;
798 const pcre *kav_re;
799 uschar *p;
800
801 /* get current date and time, build scan request */
802 time(&t);
803 /* pdp note: before the eml_filename parameter, this scanned the
804 directory; not finding documentation, so we'll strip off the directory.
805 The side-effect is that the test framework scanning may end up in
806 scanning more than was requested, but for the normal interface, this is
807 fine. */
808
809 strftime(CS tmpbuf, sizeof(tmpbuf), "%d %b %H:%M:%S", localtime(&t));
810 scanrequest = string_sprintf("<0>%s:%s", CS tmpbuf, eml_filename);
811 p = Ustrrchr(scanrequest, '/');
812 if (p)
813 *p = '\0';
814
815 DEBUG(D_acl) debug_printf("Malware scan: issuing %s scan [%s]\n",
816 scanner_name, scanner_options);
817
818 /* send scan request */
819 if (m_sock_send(sock, scanrequest, Ustrlen(scanrequest)+1, &errstr) < 0)
820 return m_errlog_defer(scanent, errstr);
821
822 /* wait for result */
823 if ((bread = recv(sock, tmpbuf, 2, 0) != 2))
824 return m_errlog_defer_3(scanent,
825 US"unable to read 2 bytes from socket.", sock);
826
827 /* get errorcode from one nibble */
828 kav_rc = tmpbuf[ test_byte_order()==LITTLE_MY_ENDIAN ? 0 : 1 ] & 0x0F;
829 switch(kav_rc)
830 {
831 case 5: case 6: /* improper kavdaemon configuration */
832 return m_errlog_defer_3(scanent,
833 US"please reconfigure kavdaemon to NOT disinfect or remove infected files.",
834 sock);
835 case 1:
836 return m_errlog_defer_3(scanent,
837 US"reported 'scanning not completed' (code 1).", sock);
838 case 7:
839 return m_errlog_defer_3(scanent,
840 US"reported 'kavdaemon damaged' (code 7).", sock);
841 }
599dcb77 842
b1f8e4f8
JH
843 /* code 8 is not handled, since it is ambigous. It appears mostly on
844 bounces where part of a file has been cut off */
845
846 /* "virus found" return codes (2-4) */
847 if ((kav_rc > 1) && (kav_rc < 5)) {
848 int report_flag = 0;
849
850 /* setup default virus name */
851 malware_name = US"unknown";
852
853 report_flag = tmpbuf[ test_byte_order() == LITTLE_MY_ENDIAN ? 1 : 0 ];
854
855 /* read the report, if available */
856 if( report_flag == 1 ) {
857 /* read report size */
858 if ((bread = recv(sock, &kav_reportlen, 4, 0)) != 4)
859 return m_errlog_defer_3(scanent,
860 US"cannot read report size", sock);
861
862 /* it's possible that avp returns av_buffer[1] == 1 but the
863 reportsize is 0 (!?) */
864 if (kav_reportlen > 0) {
865 /* set up match regex, depends on retcode */
866 kav_re = m_pcre_compile( kav_rc == 3
867 ? US"suspicion:\\s*(.+?)\\s*$"
868 : US"infected:\\s*(.+?)\\s*$",
869 &errstr );
870
871 /* read report, linewise */
872 while (kav_reportlen > 0) {
873 bread = 0;
874 while ( recv(sock, &tmpbuf[bread], 1, 0) == 1 ) {
875 kav_reportlen--;
876 if ( (tmpbuf[bread] == '\n') || (bread > 1021) ) break;
877 bread++;
878 }
879 bread++;
880 tmpbuf[bread] = '\0';
881
882 /* try matcher on the line, grab substring */
883 if ((malware_name = m_pcre_exec(kav_re, tmpbuf)))
884 break;
885 }
886 }
887 }
888 }
889 else /* no virus found */
890 malware_name = NULL;
599dcb77 891
b1f8e4f8 892 break;
599dcb77 893 }
8544e77a 894
b1f8e4f8
JH
895 case M_CMDL: /* "cmdline" scanner type ---------------------------------- */
896 {
897 const uschar *cmdline_scanner = scanner_options;
898 const pcre *cmdline_trigger_re;
899 const pcre *cmdline_regex_re;
900 uschar * file_name;
901 uschar * commandline;
902 void (*eximsigchld)(int);
903 void (*eximsigpipe)(int);
904 FILE *scanner_out = NULL;
905 FILE *scanner_record = NULL;
906 uschar linebuffer[32767];
907 int trigger = 0;
908 uschar *p;
909
910 if (!cmdline_scanner)
911 return m_errlog_defer(scanent, errstr);
912
913 /* find scanner output trigger */
914 cmdline_trigger_re = m_pcre_nextinlist(&av_scanner_work, &sep,
915 "missing trigger specification", &errstr);
916 if (!cmdline_trigger_re)
917 return m_errlog_defer(scanent, errstr);
918
919 /* find scanner name regex */
920 cmdline_regex_re = m_pcre_nextinlist(&av_scanner_work, &sep,
921 "missing virus name regex specification", &errstr);
922 if (!cmdline_regex_re)
923 return m_errlog_defer(scanent, errstr);
924
925 /* prepare scanner call; despite the naming, file_name holds a directory
926 name which is documented as the value given to %s. */
927
928 file_name = string_copy(eml_filename);
929 p = Ustrrchr(file_name, '/');
930 if (p)
931 *p = '\0';
932 commandline = string_sprintf(CS cmdline_scanner, file_name);
933
934 /* redirect STDERR too */
935 commandline = string_sprintf("%s 2>&1", commandline);
936
937 DEBUG(D_acl) debug_printf("Malware scan: issuing %s scan [%s]\n", scanner_name, commandline);
938
939 /* store exims signal handlers */
940 eximsigchld = signal(SIGCHLD,SIG_DFL);
941 eximsigpipe = signal(SIGPIPE,SIG_DFL);
942
943 if (!(scanner_out = popen(CS commandline,"r"))) {
944 int err = errno;
945 signal(SIGCHLD,eximsigchld); signal(SIGPIPE,eximsigpipe);
946 return m_errlog_defer(scanent,
947 string_sprintf("call (%s) failed: %s.", commandline, strerror(err)));
948 }
94a18f28 949
b1f8e4f8
JH
950 file_name = string_sprintf("%s/scan/%s/%s_scanner_output",
951 spool_directory, message_id, message_id);
952 scanner_record = modefopen(file_name, "wb", SPOOL_MODE);
953
954 if (scanner_record == NULL) {
955 int err = errno;
956 (void) pclose(scanner_out);
957 signal(SIGCHLD,eximsigchld); signal(SIGPIPE,eximsigpipe);
958 return m_errlog_defer(scanent,
959 string_sprintf("opening scanner output file (%s) failed: %s.",
960 file_name, strerror(err)));
961 }
8e669ac1 962
b1f8e4f8
JH
963 /* look for trigger while recording output */
964 while(fgets(CS linebuffer, sizeof(linebuffer), scanner_out)) {
965 if ( Ustrlen(linebuffer) > fwrite(linebuffer, 1, Ustrlen(linebuffer), scanner_record) ) {
966 /* short write */
967 (void) pclose(scanner_out);
968 signal(SIGCHLD,eximsigchld); signal(SIGPIPE,eximsigpipe);
969 return m_errlog_defer(scanent,
970 string_sprintf("short write on scanner output file (%s).", file_name));
971 }
972 /* try trigger match */
973 if (!trigger && regex_match_and_setup(cmdline_trigger_re, linebuffer, 0, -1))
974 trigger = 1;
975 }
8e669ac1 976
b1f8e4f8
JH
977 (void)fclose(scanner_record);
978 sep = pclose(scanner_out);
979 signal(SIGCHLD,eximsigchld); signal(SIGPIPE,eximsigpipe);
980 if (sep != 0)
b1f8e4f8 981 return m_errlog_defer(scanent,
2381c830 982 sep == -1
e3dd1d67
JH
983 ? string_sprintf("running scanner failed: %s", strerror(sep))
984 : string_sprintf("scanner returned error code: %d", sep));
b1f8e4f8
JH
985
986 if (trigger) {
987 uschar * s;
988 /* setup default virus name */
989 malware_name = US"unknown";
990
991 /* re-open the scanner output file, look for name match */
992 scanner_record = fopen(CS file_name, "rb");
993 while(fgets(CS linebuffer, sizeof(linebuffer), scanner_record)) {
994 /* try match */
995 if ((s = m_pcre_exec(cmdline_regex_re, linebuffer)))
996 malware_name = s;
997 }
998 (void)fclose(scanner_record);
999 }
1000 else /* no virus found */
1001 malware_name = NULL;
1002 break;
1003 } /* cmdline */
599dcb77 1004
b1f8e4f8
JH
1005 case M_SOPHIE: /* "sophie" scanner type --------------------------------- */
1006 {
1007 int bread = 0;
1008 uschar *p;
1009 uschar * file_name;
1010 uschar av_buffer[1024];
1011
1012 /* pass the scan directory to sophie */
1013 file_name = string_copy(eml_filename);
1014 if ((p = Ustrrchr(file_name, '/')))
1015 *p = '\0';
1016
1017 DEBUG(D_acl) debug_printf("Malware scan: issuing %s scan [%s]\n",
1018 scanner_name, scanner_options);
1019
1020 if ( write(sock, file_name, Ustrlen(file_name)) < 0
1021 || write(sock, "\n", 1) != 1
1022 )
1023 return m_errlog_defer_3(scanent,
1024 string_sprintf("unable to write to UNIX socket (%s)", scanner_options),
1025 sock);
1026
1027 /* wait for result */
1028 memset(av_buffer, 0, sizeof(av_buffer));
1029 if ((!(bread = ip_recv(sock, av_buffer, sizeof(av_buffer), MALWARE_TIMEOUT)) > 0))
1030 return m_errlog_defer_3(scanent,
1031 string_sprintf("unable to read from UNIX socket (%s)", scanner_options),
1032 sock);
1033
1034 /* infected ? */
1035 if (av_buffer[0] == '1') {
1036 uschar * s = Ustrchr(av_buffer, '\n');
1037 if (s)
1038 *s = '\0';
1039 malware_name = string_copy(&av_buffer[2]);
1040 }
1041 else if (!strncmp(CS av_buffer, "-1", 2))
1042 return m_errlog_defer_3(scanent, US"scanner reported error", sock);
1043 else /* all ok, no virus */
1044 malware_name = NULL;
599dcb77 1045
b1f8e4f8 1046 break;
8544e77a 1047 }
8e669ac1 1048
b1f8e4f8
JH
1049 case M_CLAMD: /* "clamd" scanner type ----------------------------------- */
1050 {
1051 /* This code was originally contributed by David Saez */
1052 /* There are three scanning methods available to us:
1053 * (1) Use the SCAN command, pointing to a file in the filesystem
1054 * (2) Use the STREAM command, send the data on a separate port
1055 * (3) Use the zINSTREAM command, send the data inline
1056 * The zINSTREAM command was introduced with ClamAV 0.95, which marked
1057 * STREAM deprecated; see: http://wiki.clamav.net/bin/view/Main/UpgradeNotes095
1058 * In Exim, we use SCAN if using a Unix-domain socket or explicitly told that
1059 * the TCP-connected daemon is actually local; otherwise we use zINSTREAM unless
1060 * WITH_OLD_CLAMAV_STREAM is defined.
1061 * See Exim bug 926 for details. */
1062
1063 uschar *p, *vname, *result_tag, *response_end;
1064 int bread=0;
b1f8e4f8
JH
1065 uschar * file_name;
1066 uschar av_buffer[1024];
1067 uschar *hostname = US"";
1068 host_item connhost;
1069 uschar *clamav_fbuf;
1070 int clam_fd, result;
cb54b2a0
PP
1071 off_t fsize;
1072 unsigned int fsize_uint;
b1f8e4f8
JH
1073 BOOL use_scan_command = FALSE;
1074 clamd_address_container * clamd_address_vector[MAX_CLAMD_SERVERS];
1075 int current_server;
1076 int num_servers = 0;
1077 #ifdef WITH_OLD_CLAMAV_STREAM
af4a1bca 1078 unsigned int port;
b1f8e4f8
JH
1079 uschar av_buffer2[1024];
1080 int sockData;
1081 #else
1082 uint32_t send_size, send_final_zeroblock;
1083 #endif
1084
1085 if (*scanner_options == '/')
1086 /* Local file; so we def want to use_scan_command and don't want to try
1087 * passing IP/port combinations */
1088 use_scan_command = TRUE;
1089 else {
1090 const uschar *address = scanner_options;
1091 uschar address_buffer[MAX_CLAMD_ADDRESS_LENGTH + 20];
1092
1093 /* Go through the rest of the list of host/port and construct an array
1094 * of servers to try. The first one is the bit we just passed from
1095 * scanner_options so process that first and then scan the remainder of
1096 * the address buffer */
1097 do {
1098 clamd_address_container *this_clamd;
1099
1100 /* The 'local' option means use the SCAN command over the network
1101 * socket (ie common file storage in use) */
1102 if (strcmpic(address,US"local") == 0) {
1103 use_scan_command = TRUE;
1104 continue;
1105 }
1106
1107 /* XXX: If unsuccessful we should free this memory */
1108 this_clamd =
1109 (clamd_address_container *)store_get(sizeof(clamd_address_container));
1110
1111 /* extract host and port part */
1112 if( sscanf(CS address, "%" MAX_CLAMD_ADDRESS_LENGTH_S "s %u",
1113 this_clamd->tcp_addr, &(this_clamd->tcp_port)) != 2 ) {
1114 (void) m_errlog_defer(scanent,
1115 string_sprintf("invalid address '%s'", address));
1116 continue;
1117 }
1118
1119 clamd_address_vector[num_servers] = this_clamd;
1120 num_servers++;
1121 if (num_servers >= MAX_CLAMD_SERVERS) {
1122 (void) m_errlog_defer(scanent,
1123 US"More than " MAX_CLAMD_SERVERS_S " clamd servers "
1124 "specified; only using the first " MAX_CLAMD_SERVERS_S );
1125 break;
1126 }
1127 } while ((address = string_nextinlist(&av_scanner_work, &sep,
1128 address_buffer,
1129 sizeof(address_buffer))) != NULL);
1130
1131 /* check if we have at least one server */
1132 if (!num_servers)
1133 return m_errlog_defer(scanent,
1134 US"no useable server addresses in malware configuration option.");
1135 }
8e669ac1 1136
b1f8e4f8
JH
1137 /* See the discussion of response formats below to see why we really don't
1138 like colons in filenames when passing filenames to ClamAV. */
1139 if (use_scan_command && Ustrchr(eml_filename, ':'))
1140 return m_errlog_defer(scanent,
1141 string_sprintf("local/SCAN mode incompatible with" \
1142 " : in path to email filename [%s]", eml_filename));
1143
1144 /* We have some network servers specified */
1145 if (num_servers) {
1146
1147 /* Confirmed in ClamAV source (0.95.3) that the TCPAddr option of clamd
1148 * only supports AF_INET, but we should probably be looking to the
1149 * future and rewriting this to be protocol-independent anyway. */
1150
1151 while ( num_servers > 0 ) {
1152 /* Randomly pick a server to start with */
1153 current_server = random_number( num_servers );
1154
1155 debug_printf("trying server name %s, port %u\n",
1156 clamd_address_vector[current_server]->tcp_addr,
1157 clamd_address_vector[current_server]->tcp_port);
1158
1159 /* Lookup the host. This is to ensure that we connect to the same IP
1160 * on both connections (as one host could resolve to multiple ips) */
1161 sock= m_tcpsocket(clamd_address_vector[current_server]->tcp_addr,
1162 clamd_address_vector[current_server]->tcp_port,
1163 &connhost, &errstr);
1164 if (sock >= 0) {
1165 /* Connection successfully established with a server */
1166 hostname = clamd_address_vector[current_server]->tcp_addr;
1167 break;
1168 }
1169
1170 (void) m_errlog_defer(scanent, errstr);
1171
1172 /* Remove the server from the list. XXX We should free the memory */
1173 num_servers--;
1174 int i;
1175 for( i = current_server; i < num_servers; i++ )
1176 clamd_address_vector[i] = clamd_address_vector[i+1];
1177 }
1178
1179 if ( num_servers == 0 )
1180 return m_errlog_defer(scanent, US"all servers failed");
1181
1182 } else {
1183 if ((sock = m_unixsocket(scanner_options, &errstr)) < 0)
1184 return m_errlog_defer(scanent, errstr);
1185 }
8e669ac1 1186
b1f8e4f8
JH
1187 /* have socket in variable "sock"; command to use is semi-independent of
1188 * the socket protocol. We use SCAN if is local (either Unix/local
1189 * domain socket, or explicitly told local) else we stream the data.
1190 * How we stream the data depends upon how we were built. */
1191
1192 if (!use_scan_command) {
1193
1194 #ifdef WITH_OLD_CLAMAV_STREAM
1195 /* "STREAM\n" command, get back a "PORT <N>\n" response, send data to
1196 * that port on a second connection; then in the scan-method-neutral
1197 * part, read the response back on the original connection. */
1198
1199 DEBUG(D_acl) debug_printf("Malware scan: issuing %s old-style remote scan (PORT)\n",
1200 scanner_name);
1201
1202 /* Pass the string to ClamAV (7 = "STREAM\n") */
1203 if (m_sock_send(sock, US"STREAM\n", 7, &errstr) < 0)
1204 return m_errlog_defer(scanent, errstr);
1205
1206 memset(av_buffer2, 0, sizeof(av_buffer2));
1207 bread = ip_recv(sock, av_buffer2, sizeof(av_buffer2), MALWARE_TIMEOUT);
1208
1209 if (bread < 0)
1210 return m_errlog_defer_3(scanent,
1211 string_sprintf("unable to read PORT from socket (%s)",
1212 strerror(errno)),
1213 sock);
1214
1215 if (bread == sizeof(av_buffer2))
1216 return m_errlog_defer_3(scanent, "buffer too small", sock);
1217
1218 if (!(*av_buffer2))
1219 return m_errlog_defer_3(scanent, "ClamAV returned null", sock);
1220
1221 av_buffer2[bread] = '\0';
1222 if( sscanf(CS av_buffer2, "PORT %u\n", &port) != 1 )
1223 return m_errlog_defer_3(scanent,
1224 string_sprintf("Expected port information from clamd, got '%s'",
1225 av_buffer2),
1226 sock);
1227
1228 sockData = m_tcpsocket(connhost.address, port, NULL, &errstr);
1229 if (sockData < 0)
1230 return m_errlog_defer_3(scanent, errstr, sock);
1231
1232 #define CLOSE_SOCKDATA (void)close(sockData)
1233 #else /* WITH_OLD_CLAMAV_STREAM not defined */
1234 /* New protocol: "zINSTREAM\n" followed by a sequence of <length><data>
1235 chunks, <n> a 4-byte number (network order), terminated by a zero-length
1236 chunk. */
1237
1238 DEBUG(D_acl) debug_printf("Malware scan: issuing %s new-style remote scan (zINSTREAM)\n",
1239 scanner_name);
1240
1241 /* Pass the string to ClamAV (10 = "zINSTREAM\0") */
1242 if (send(sock, "zINSTREAM", 10, 0) < 0)
1243 return m_errlog_defer_3(scanent,
1244 string_sprintf("unable to send zINSTREAM to socket (%s)",
1245 strerror(errno)),
1246 sock);
1247
1248 #define CLOSE_SOCKDATA /**/
1249 #endif
1250
1251 /* calc file size */
1252 if ((clam_fd = open(CS eml_filename, O_RDONLY)) < 0) {
1253 int err = errno;
1254 CLOSE_SOCKDATA;
1255 return m_errlog_defer_3(scanent,
1256 string_sprintf("can't open spool file %s: %s",
1257 eml_filename, strerror(err)),
1258 sock);
1259 }
1260 if ((fsize = lseek(clam_fd, 0, SEEK_END)) < 0) {
1261 int err = errno;
1262 CLOSE_SOCKDATA; (void)close(clam_fd);
1263 return m_errlog_defer_3(scanent,
1264 string_sprintf("can't seek spool file %s: %s",
1265 eml_filename, strerror(err)),
1266 sock);
1267 }
cb54b2a0
PP
1268 fsize_uint = (unsigned int) fsize;
1269 if ((off_t)fsize_uint != fsize) {
1270 CLOSE_SOCKDATA; (void)close(clam_fd);
1271 return m_errlog_defer_3(scanent,
1272 string_sprintf("seeking spool file %s, size overflow",
1273 eml_filename),
1274 sock);
1275 }
b1f8e4f8
JH
1276 lseek(clam_fd, 0, SEEK_SET);
1277
cb54b2a0 1278 if (!(clamav_fbuf = (uschar *) malloc (fsize_uint))) {
b1f8e4f8
JH
1279 CLOSE_SOCKDATA; (void)close(clam_fd);
1280 return m_errlog_defer_3(scanent,
1281 string_sprintf("unable to allocate memory %u for file (%s)",
cb54b2a0 1282 fsize_uint, eml_filename),
b1f8e4f8
JH
1283 sock);
1284 }
1285
cb54b2a0 1286 if ((result = read(clam_fd, clamav_fbuf, fsize_uint)) < 0) {
b1f8e4f8
JH
1287 int err = errno;
1288 free(clamav_fbuf); CLOSE_SOCKDATA; (void)close(clam_fd);
1289 return m_errlog_defer_3(scanent,
1290 string_sprintf("can't read spool file %s: %s",
1291 eml_filename, strerror(err)),
1292 sock);
1293 }
1294 (void)close(clam_fd);
1295
1296 /* send file body to socket */
1297 #ifdef WITH_OLD_CLAMAV_STREAM
cb54b2a0 1298 if (send(sockData, clamav_fbuf, fsize_uint, 0) < 0) {
b1f8e4f8
JH
1299 free(clamav_fbuf); CLOSE_SOCKDATA;
1300 return m_errlog_defer_3(scanent,
1301 string_sprintf("unable to send file body to socket (%s:%u)",
1302 hostname, port),
1303 sock);
1304 }
1305 #else
cb54b2a0 1306 send_size = htonl(fsize_uint);
b1f8e4f8
JH
1307 send_final_zeroblock = 0;
1308 if ((send(sock, &send_size, sizeof(send_size), 0) < 0) ||
cb54b2a0 1309 (send(sock, clamav_fbuf, fsize_uint, 0) < 0) ||
b1f8e4f8
JH
1310 (send(sock, &send_final_zeroblock, sizeof(send_final_zeroblock), 0) < 0))
1311 {
1312 free(clamav_fbuf);
1313 return m_errlog_defer_3(scanent,
e3dd1d67 1314 string_sprintf("unable to send file body to socket (%s)", hostname),
b1f8e4f8
JH
1315 sock);
1316 }
1317 #endif
1318
1319 free(clamav_fbuf);
1320
1321 CLOSE_SOCKDATA;
1322 #undef CLOSE_SOCKDATA
1323
1324 } else { /* use scan command */
1325 /* Send a SCAN command pointing to a filename; then in the then in the
1326 * scan-method-neutral part, read the response back */
1327
1328 /* ================================================================= */
1329
1330 /* Prior to the reworking post-Exim-4.72, this scanned a directory,
1331 which dates to when ClamAV needed us to break apart the email into the
1332 MIME parts (eg, with the now deprecated demime condition coming first).
1333 Some time back, ClamAV gained the ability to deconstruct the emails, so
1334 doing this would actually have resulted in the mail attachments being
1335 scanned twice, in the broken out files and from the original .eml.
1336 Since ClamAV now handles emails (and has for quite some time) we can
1337 just use the email file itself. */
1338 /* Pass the string to ClamAV (7 = "SCAN \n" + \0) */
1339 file_name = string_sprintf("SCAN %s\n", eml_filename);
1340
1341 DEBUG(D_acl) debug_printf("Malware scan: issuing %s local-path scan [%s]\n",
1342 scanner_name, scanner_options);
1343
1344 if (send(sock, file_name, Ustrlen(file_name), 0) < 0)
1345 return m_errlog_defer_3(scanent,
1346 string_sprintf("unable to write to socket (%s)", strerror(errno)),
1347 sock);
1348
1349 /* Do not shut down the socket for writing; a user report noted that
1350 * clamd 0.70 does not react well to this. */
1351 }
1352 /* Commands have been sent, no matter which scan method or connection
1353 * type we're using; now just read the result, independent of method. */
1354
1355 /* Read the result */
1356 memset(av_buffer, 0, sizeof(av_buffer));
1357 bread = ip_recv(sock, av_buffer, sizeof(av_buffer), MALWARE_TIMEOUT);
1358 (void)close(sock);
1359 sock = -1;
1360
1361 if (!(bread > 0))
1362 return m_errlog_defer(scanent,
1363 string_sprintf("unable to read from socket (%s)", strerror(errno)));
1364
1365 if (bread == sizeof(av_buffer))
1366 return m_errlog_defer(scanent, US"buffer too small");
1367 /* We're now assured of a NULL at the end of av_buffer */
1368
1369 /* Check the result. ClamAV returns one of two result formats.
1370 In the basic mode, the response is of the form:
1371 infected: -> "<filename>: <virusname> FOUND"
1372 not-infected: -> "<filename>: OK"
1373 error: -> "<filename>: <errcode> ERROR
1374 If the ExtendedDetectionInfo option has been turned on, then we get:
1375 "<filename>: <virusname>(<virushash>:<virussize>) FOUND"
1376 for the infected case. Compare:
1377 /tmp/eicar.com: Eicar-Test-Signature FOUND
1378 /tmp/eicar.com: Eicar-Test-Signature(44d88612fea8a8f36de82e1278abb02f:68) FOUND
1379
1380 In the streaming case, clamd uses the filename "stream" which you should
1381 be able to verify with { ktrace clamdscan --stream /tmp/eicar.com }. (The
1382 client app will replace "stream" with the original filename before returning
1383 results to stdout, but the trace shows the data).
1384
1385 We will assume that the pathname passed to clamd from Exim does not contain
1386 a colon. We will have whined loudly above if the eml_filename does (and we're
1387 passing a filename to clamd). */
1388
1389 if (!(*av_buffer))
1390 return m_errlog_defer(scanent, US"ClamAV returned null");
1391
1392 /* strip newline at the end (won't be present for zINSTREAM)
1393 (also any trailing whitespace, which shouldn't exist, but we depend upon
1394 this below, so double-check) */
1395 p = av_buffer + Ustrlen(av_buffer) - 1;
1396 if (*p == '\n') *p = '\0';
1397
1398 DEBUG(D_acl) debug_printf("Malware response: %s\n", av_buffer);
1399
1400 while (isspace(*--p) && (p > av_buffer))
1401 *p = '\0';
1402 if (*p) ++p;
1403 response_end = p;
1404
1405 /* colon in returned output? */
1406 if((p = Ustrchr(av_buffer,':')) == NULL)
1407 return m_errlog_defer(scanent,
1408 string_sprintf("ClamAV returned malformed result (missing colon): %s",
1409 av_buffer));
1410
1411 /* strip filename */
1412 while (*p && isspace(*++p)) /**/;
1413 vname = p;
1414
1415 /* It would be bad to encounter a virus with "FOUND" in part of the name,
1416 but we should at least be resistant to it. */
1417 p = Ustrrchr(vname, ' ');
1418 result_tag = p ? p+1 : vname;
1419
1420 if (Ustrcmp(result_tag, "FOUND") == 0) {
1421 /* p should still be the whitespace before the result_tag */
1422 while (isspace(*p)) --p;
1423 *++p = '\0';
1424 /* Strip off the extended information too, which will be in parens
1425 after the virus name, with no intervening whitespace. */
1426 if (*--p == ')') {
1427 /* "(hash:size)", so previous '(' will do; if not found, we have
1428 a curious virus name, but not an error. */
1429 p = Ustrrchr(vname, '(');
1430 if (p)
1431 *p = '\0';
1432 }
1433 malware_name = string_copy(vname);
1434 DEBUG(D_acl) debug_printf("Malware found, name \"%s\"\n", malware_name);
1435
1436 } else if (Ustrcmp(result_tag, "ERROR") == 0)
1437 return m_errlog_defer(scanent,
1438 string_sprintf("ClamAV returned: %s", av_buffer));
1439
1440 else if (Ustrcmp(result_tag, "OK") == 0) {
1441 /* Everything should be OK */
1442 malware_name = NULL;
1443 DEBUG(D_acl) debug_printf("Malware not found\n");
1444
1445 } else
1446 return m_errlog_defer(scanent,
1447 string_sprintf("unparseable response from ClamAV: {%s}", av_buffer));
1448
1449 break;
1450 } /* clamd */
1451
1452 case M_SOCK: /* "sock" scanner type ------------------------------------- */
1453 /* This code was derived by Martin Poole from the clamd code contributed
1454 by David Saez and the cmdline code
1455 */
1456 {
1457 int bread;
1458 uschar * commandline;
1459 uschar av_buffer[1024];
1460 uschar * linebuffer;
1461 uschar * sockline_scanner;
1462 uschar sockline_scanner_default[] = "%s\n";
1463 const pcre *sockline_trig_re;
1464 const pcre *sockline_name_re;
1465
1466 /* find scanner command line */
1467 if ((sockline_scanner = string_nextinlist(&av_scanner_work, &sep,
1468 NULL, 0)))
1469 { /* check for no expansions apart from one %s */
db270929 1470 uschar * s = Ustrchr(sockline_scanner, '%');
b1f8e4f8 1471 if (s++)
db270929 1472 if ((*s != 's' && *s != '%') || Ustrchr(s+1, '%'))
b1f8e4f8
JH
1473 return m_errlog_defer_3(scanent,
1474 US"unsafe sock scanner call spec", sock);
1475 }
1476 else
1477 sockline_scanner = sockline_scanner_default;
1478
1479 /* find scanner output trigger */
1480 sockline_trig_re = m_pcre_nextinlist(&av_scanner_work, &sep,
1481 "missing trigger specification", &errstr);
1482 if (!sockline_trig_re)
1483 return m_errlog_defer_3(scanent, errstr, sock);
1484
1485 /* find virus name regex */
1486 sockline_name_re = m_pcre_nextinlist(&av_scanner_work, &sep,
1487 "missing virus name regex specification", &errstr);
1488 if (!sockline_name_re)
1489 return m_errlog_defer_3(scanent, errstr, sock);
1490
1491 /* prepare scanner call - security depends on expansions check above */
1492 commandline = string_sprintf("%s/scan/%s/%s.eml", spool_directory, message_id, message_id);
1493 commandline = string_sprintf( CS sockline_scanner, CS commandline);
1494
1495
1496 /* Pass the command string to the socket */
1497 if (m_sock_send(sock, commandline, Ustrlen(commandline), &errstr) < 0)
1498 return m_errlog_defer(scanent, errstr);
1499
1500 /* Read the result */
1501 memset(av_buffer, 0, sizeof(av_buffer));
1502 bread = read(sock, av_buffer, sizeof(av_buffer));
1503
1504 if (!(bread > 0))
1505 return m_errlog_defer_3(scanent,
1506 string_sprintf("unable to read from socket (%s)", strerror(errno)),
1507 sock);
1508
1509 if (bread == sizeof(av_buffer))
1510 return m_errlog_defer_3(scanent, US"buffer too small", sock);
1511 linebuffer = string_copy(av_buffer);
1512
1513 /* try trigger match */
1514 if (regex_match_and_setup(sockline_trig_re, linebuffer, 0, -1)) {
1515 if (!(malware_name = m_pcre_exec(sockline_name_re, av_buffer)))
1516 malware_name = US "unknown";
1517 }
1518 else /* no virus found */
1519 malware_name = NULL;
1520 break;
8523533c 1521 }
8e669ac1 1522
b1f8e4f8
JH
1523 case M_MKSD: /* "mksd" scanner type ------------------------------------- */
1524 {
1525 char *mksd_options_end;
1526 int mksd_maxproc = 1; /* default, if no option supplied */
1527 int sock;
1528 int retval;
1529
1530 if (scanner_options) {
1531 mksd_maxproc = (int)strtol(CS scanner_options, &mksd_options_end, 10);
1532 if ( *scanner_options == '\0'
1533 || *mksd_options_end != '\0'
1534 || mksd_maxproc < 1
1535 || mksd_maxproc > 32
1536 )
1537 return m_errlog_defer(scanent,
1538 string_sprintf("invalid option '%s'", scanner_options));
1539 }
8e669ac1 1540
b1f8e4f8
JH
1541 if((sock = m_unixsocket(US "/var/run/mksd/socket", &errstr)) < 0)
1542 return m_errlog_defer(scanent, errstr);
8e669ac1 1543
94a18f28 1544 malware_name = NULL;
94a18f28 1545
b1f8e4f8 1546 DEBUG(D_acl) debug_printf("Malware scan: issuing %s scan\n", scanner_name);
94a18f28 1547
b1f8e4f8
JH
1548 if ((retval = mksd_scan_packed(scanent, sock, eml_filename)) != OK) {
1549 close (sock);
1550 return retval;
1551 }
1552 break;
8523533c 1553 }
b6fbf22d
JH
1554 case M_AVAST: /* "avast" scanner type ----------------------------------- */
1555 {
1556 int ovector[1*3];
1557 uschar buf[1024];
1558 uschar * scanrequest;
1559 const pcre * avast_clean_re, * avast_virus_re;
1560 enum {AVA_HELO, AVA_OPT, AVA_RSP, AVA_DONE} avast_stage;
1561
1562 /* According to Martin Tuma @avast the protocol uses "escaped
1563 whitespace", that is, every embedded whitespace is backslash
1564 escaped, as well as backslash is protected by backslash.
1565 The returned lines contain the name of the scanned file, a tab
1566 and the [ ] marker.
1567 [+] - not infected
1568 [L] - infected
1569 [E] - some error occured
1570 Such marker follows the first non-escaped TAB. */
1571 if ( !(avast_clean_re =
1572 m_pcre_compile(US"(?!\\\\)\\t\\[\\+\\]", &errstr))
1573 || !(avast_virus_re =
1574 m_pcre_compile(US"(?!\\\\)\\t\\[L\\]\\d\\.\\d\\t\\d\\s(.*)",
1575 &errstr))
1576 )
1577 return malware_errlog_defer(errstr);
1578
1579 /* wait for result */
1580 for (avast_stage = AVA_HELO; recv_line(sock, buf, sizeof(buf)) > 0; )
1581 {
1582 int slen = Ustrlen(buf);
1583 if (slen >= 1)
1584 {
1585 DEBUG(D_acl) debug_printf("got from avast: %s\n", buf);
1586 switch (avast_stage)
1587 {
1588 case AVA_HELO:
1589 if (Ustrncmp(buf, "220", 3) != 0)
1590 goto endloop; /* require a 220 */
1591 goto sendreq;
1592
1593 case AVA_OPT:
1594 if (Ustrncmp(buf, "210", 3) == 0)
1595 break; /* ignore 210 responses */
1596 if (Ustrncmp(buf, "200", 3) != 0)
1597 goto endloop; /* require a 200 */
1598
1599 sendreq:
1600 {
1601 int len;
1602 /* Check for another option to send. Newline-terminate it. */
1603 if ((scanrequest = string_nextinlist(&av_scanner_work, &sep,
1604 NULL, 0)))
1605 {
1606 scanrequest = string_sprintf("%s\n", scanrequest);
1607 avast_stage = AVA_OPT; /* just sent option */
1608 }
1609 else
1610 {
1611 scanrequest = string_sprintf("SCAN %s/scan/%s\n",
1612 spool_directory, message_id);
1613 avast_stage = AVA_RSP; /* just sent command */
1614 }
1615
1616 /* send config-cmd or scan-request to socket */
1617 len = Ustrlen(scanrequest);
1618 if (send(sock, scanrequest, len, 0) < 0)
1619 {
1620 scanrequest[len-1] = '\0';
1621 return m_errlog_defer_3(scanent, string_sprintf(
1622 "unable to send request '%s' to socket (%s): %s",
1623 scanrequest, scanner_options, strerror(errno)), sock);
1624 }
1625 break;
1626 }
1627
1628 case AVA_RSP:
1629 if (Ustrncmp(buf, "210", 3) == 0)
1630 break; /* ignore the "210 SCAN DATA" message */
1631
1632 if (pcre_exec(avast_clean_re, NULL, CS buf, slen,
1633 0, 0, ovector, nelements(ovector)) > 0)
1634 break;
1635
1636 if ((malware_name = m_pcre_exec(avast_virus_re, buf)))
1637 { /* remove backslash in front of [whitespace|backslash] */
1638 uschar * p, * p0;
1639 for (p = malware_name; *p; ++p)
1640 if (*p == '\\' && (isspace(p[1]) || p[1] == '\\'))
1641 for (p0 = p; *p0; ++p0) *p0 = p0[1];
1642
1643 avast_stage = AVA_DONE;
1644 goto endloop;
1645 }
1646
1647 if (Ustrncmp(buf, "200 SCAN OK", 11) == 0)
1648 { /* we're done finally */
1649 if (send(sock, "QUIT\n", 5, 0) < 0) /* courtesy */
1650 return m_errlog_defer_3(scanent, string_sprintf(
1651 "unable to send quit request to socket (%s): %s",
1652 scanner_options, strerror(errno)),
1653 sock);
1654 malware_name = NULL;
1655 avast_stage = AVA_DONE;
1656 goto endloop;
1657 }
1658
1659 /* here for any unexpected response from the scanner */
1660 goto endloop;
1661 }
1662 }
1663 }
1664 endloop:
1665
1666 switch(avast_stage)
1667 {
1668 case AVA_HELO:
1669 case AVA_OPT:
1670 case AVA_RSP: return m_errlog_defer_3(scanent, string_sprintf(
1671 "invalid response from scanner: %s\n", buf), sock);
1672 default: break;
1673 }
1674 }
1675 } /* scanner type switch */
8523533c 1676
b1f8e4f8
JH
1677 if (sock >= 0)
1678 (void) close (sock);
1679 malware_ok = TRUE; /* set "been here, done that" marker */
1680 }
8523533c
TK
1681
1682 /* match virus name against pattern (caseless ------->----------v) */
b6fbf22d
JH
1683 if (malware_name && regex_match_and_setup(re, malware_name, 0, -1))
1684 {
8544e77a 1685 DEBUG(D_acl) debug_printf("Matched regex to malware [%s] [%s]\n", malware_regex, malware_name);
8523533c 1686 return OK;
b6fbf22d 1687 }
b1f8e4f8 1688 else
8523533c 1689 return FAIL;
8523533c
TK
1690}
1691
1692
1693/* simple wrapper for reading lines from sockets */
b1f8e4f8
JH
1694int
1695recv_line(int sock, uschar *buffer, int size)
1696{
8523533c
TK
1697 uschar *p = buffer;
1698
1699 memset(buffer,0,size);
1700 /* read until \n */
1701 while(recv(sock,p,1,0) > -1) {
1702 if ((p-buffer) > (size-2)) break;
1703 if (*p == '\n') break;
1704 if (*p != '\r') p++;
b1f8e4f8 1705 }
8523533c
TK
1706 *p = '\0';
1707
1708 return (p-buffer);
1709}
1710
1711
1712/* ============= private routines for the "mksd" scanner type ============== */
1713
1714#include <sys/uio.h>
1715
b1f8e4f8
JH
1716static inline int
1717mksd_writev (int sock, struct iovec *iov, int iovcnt)
8523533c
TK
1718{
1719 int i;
8e669ac1 1720
8523533c
TK
1721 for (;;) {
1722 do
1723 i = writev (sock, iov, iovcnt);
1724 while ((i < 0) && (errno == EINTR));
1725 if (i <= 0) {
b1f8e4f8 1726 (void) malware_errlog_defer(US"unable to write to mksd UNIX socket (/var/run/mksd/socket)");
8523533c
TK
1727 return -1;
1728 }
8e669ac1 1729
8523533c
TK
1730 for (;;)
1731 if (i >= iov->iov_len) {
1732 if (--iovcnt == 0)
1733 return 0;
1734 i -= iov->iov_len;
1735 iov++;
1736 } else {
1737 iov->iov_len -= i;
1738 iov->iov_base = CS iov->iov_base + i;
1739 break;
1740 }
1741 }
1742}
1743
b1f8e4f8
JH
1744static inline int
1745mksd_read_lines (int sock, uschar *av_buffer, int av_buffer_size)
8523533c
TK
1746{
1747 int offset = 0;
1748 int i;
8e669ac1 1749
8523533c
TK
1750 do {
1751 if ((i = recv (sock, av_buffer+offset, av_buffer_size-offset, 0)) <= 0) {
b1f8e4f8 1752 (void) malware_errlog_defer(US"unable to read from mksd UNIX socket (/var/run/mksd/socket)");
8523533c
TK
1753 return -1;
1754 }
8e669ac1 1755
8523533c
TK
1756 offset += i;
1757 /* offset == av_buffer_size -> buffer full */
1758 if (offset == av_buffer_size) {
b1f8e4f8 1759 (void) malware_errlog_defer(US"malformed reply received from mksd");
8523533c
TK
1760 return -1;
1761 }
1762 } while (av_buffer[offset-1] != '\n');
8e669ac1 1763
8523533c
TK
1764 av_buffer[offset] = '\0';
1765 return offset;
1766}
1767
b1f8e4f8
JH
1768static inline int
1769mksd_parse_line(struct scan * scanent, char *line)
8523533c
TK
1770{
1771 char *p;
8e669ac1 1772
8523533c 1773 switch (*line) {
b1f8e4f8 1774 case 'O': /* OK */
8523533c 1775 return OK;
b1f8e4f8 1776
8523533c 1777 case 'E':
b1f8e4f8 1778 case 'A': /* ERR */
8523533c 1779 if ((p = strchr (line, '\n')) != NULL)
b1f8e4f8
JH
1780 *p = '\0';
1781 return m_errlog_defer(scanent,
1782 string_sprintf("scanner failed: %s", line));
1783
1784 default: /* VIR */
8523533c 1785 if ((p = strchr (line, '\n')) != NULL) {
b1f8e4f8
JH
1786 *p = '\0';
1787 if (((p-line) > 5) && (line[3] == ' '))
8523533c 1788 if (((p = strchr (line+4, ' ')) != NULL) && ((p-line) > 4)) {
b1f8e4f8
JH
1789 *p = '\0';
1790 malware_name = string_copy(US line+4);
8523533c
TK
1791 return OK;
1792 }
1793 }
b1f8e4f8
JH
1794 return m_errlog_defer(scanent,
1795 string_sprintf("malformed reply received: %s", line));
8523533c
TK
1796 }
1797}
1798
b1f8e4f8
JH
1799static int
1800mksd_scan_packed(struct scan * scanent, int sock, uschar *scan_filename)
8523533c 1801{
8544e77a 1802 struct iovec iov[3];
1ba28e2b 1803 const char *cmd = "MSQ\n";
8523533c 1804 uschar av_buffer[1024];
8e669ac1 1805
1ba28e2b 1806 iov[0].iov_base = (void *) cmd;
8523533c 1807 iov[0].iov_len = 3;
8544e77a
PP
1808 iov[1].iov_base = CS scan_filename;
1809 iov[1].iov_len = Ustrlen(scan_filename);
f1a29782 1810 iov[2].iov_base = (void *) (cmd + 3);
8544e77a
PP
1811 iov[2].iov_len = 1;
1812
1813 if (mksd_writev (sock, iov, 3) < 0)
8523533c 1814 return DEFER;
8e669ac1 1815
8523533c
TK
1816 if (mksd_read_lines (sock, av_buffer, sizeof (av_buffer)) < 0)
1817 return DEFER;
8e669ac1 1818
b1f8e4f8 1819 return mksd_parse_line (scanent, CS av_buffer);
8523533c
TK
1820}
1821
b1f8e4f8
JH
1822#endif /*WITH_CONTENT_SCAN*/
1823/*
1824 * vi: aw ai sw=2
1825 */