Copyright year updates (things touched in 2015)
[exim.git] / src / src / smtp_out.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
7eb6c37c 5/* Copyright (c) University of Cambridge 1995 - 2015 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* A number of functions for driving outgoing SMTP calls. */
9
10
11#include "exim.h"
7eb6c37c 12#include "transports/smtp.h"
059ec3d9
PH
13
14
15
16/*************************************************
17* Find an outgoing interface *
18*************************************************/
19
20/* This function is called from the smtp transport and also from the callout
21code in verify.c. Its job is to expand a string to get a list of interfaces,
22and choose a suitable one (IPv4 or IPv6) for the outgoing address.
23
24Arguments:
25 istring string interface setting, may be NULL, meaning "any", in
26 which case the function does nothing
27 host_af AF_INET or AF_INET6 for the outgoing IP address
28 addr the mail address being handled (for setting errors)
29 changed if not NULL, set TRUE if expansion actually changed istring
30 interface point this to the interface
31 msg to add to any error message
32
33Returns: TRUE on success, FALSE on failure, with error message
34 set in addr and transport_return set to PANIC
35*/
36
37BOOL
38smtp_get_interface(uschar *istring, int host_af, address_item *addr,
39 BOOL *changed, uschar **interface, uschar *msg)
40{
55414b25 41const uschar * expint;
059ec3d9
PH
42uschar *iface;
43int sep = 0;
44
45if (istring == NULL) return TRUE;
46
47expint = expand_string(istring);
48if (expint == NULL)
49 {
50 if (expand_string_forcedfail) return TRUE;
51 addr->transport_return = PANIC;
52 addr->message = string_sprintf("failed to expand \"interface\" "
53 "option for %s: %s", msg, expand_string_message);
54 return FALSE;
55 }
56
57if (changed != NULL) *changed = expint != istring;
58
59while (isspace(*expint)) expint++;
60if (*expint == 0) return TRUE;
61
62while ((iface = string_nextinlist(&expint, &sep, big_buffer,
63 big_buffer_size)) != NULL)
64 {
65 if (string_is_ip_address(iface, NULL) == 0)
66 {
67 addr->transport_return = PANIC;
68 addr->message = string_sprintf("\"%s\" is not a valid IP "
69 "address for the \"interface\" option for %s",
70 iface, msg);
71 return FALSE;
72 }
73
74 if (((Ustrchr(iface, ':') == NULL)? AF_INET:AF_INET6) == host_af)
75 break;
76 }
77
78if (iface != NULL) *interface = string_copy(iface);
79return TRUE;
80}
81
82
83
84/*************************************************
85* Find an outgoing port *
86*************************************************/
87
88/* This function is called from the smtp transport and also from the callout
89code in verify.c. Its job is to find a port number. Note that getservbyname()
90produces the number in network byte order.
91
92Arguments:
93 rstring raw (unexpanded) string representation of the port
94 addr the mail address being handled (for setting errors)
95 port stick the port in here
96 msg for adding to error message
97
98Returns: TRUE on success, FALSE on failure, with error message set
99 in addr, and transport_return set to PANIC
100*/
101
102BOOL
103smtp_get_port(uschar *rstring, address_item *addr, int *port, uschar *msg)
104{
105uschar *pstring = expand_string(rstring);
106
107if (pstring == NULL)
108 {
109 addr->transport_return = PANIC;
110 addr->message = string_sprintf("failed to expand \"%s\" (\"port\" option) "
111 "for %s: %s", rstring, msg, expand_string_message);
112 return FALSE;
113 }
114
115if (isdigit(*pstring))
116 {
117 uschar *end;
118 *port = Ustrtol(pstring, &end, 0);
119 if (end != pstring + Ustrlen(pstring))
120 {
121 addr->transport_return = PANIC;
122 addr->message = string_sprintf("invalid port number for %s: %s", msg,
123 pstring);
124 return FALSE;
125 }
126 }
127
128else
129 {
130 struct servent *smtp_service = getservbyname(CS pstring, "tcp");
131 if (smtp_service == NULL)
132 {
133 addr->transport_return = PANIC;
134 addr->message = string_sprintf("TCP port \"%s\" is not defined for %s",
135 pstring, msg);
136 return FALSE;
137 }
138 *port = ntohs(smtp_service->s_port);
139 }
140
141return TRUE;
142}
143
144
145
146
059ec3d9 147int
7eb6c37c
JH
148smtp_sock_connect(host_item * host, int host_af, int port, uschar * interface,
149 transport_instance * tb, int timeout)
059ec3d9 150{
7eb6c37c
JH
151smtp_transport_options_block * ob =
152 (smtp_transport_options_block *)tb->options_block;
153const uschar * dscp = ob->dscp;
9e4f5962
PP
154int dscp_value;
155int dscp_level;
156int dscp_option;
059ec3d9 157int sock;
7eb6c37c
JH
158int on = 1;
159int save_errno = 0;
059ec3d9 160
774ef2d7 161#ifdef EXPERIMENTAL_EVENT
7eb6c37c
JH
162deliver_host_address = host->address;
163deliver_host_port = port;
164if (event_raise(tb->event_action, US"tcp:connect", NULL)) return -1;
a7538db1
JH
165#endif
166
059ec3d9
PH
167if ((sock = ip_socket(SOCK_STREAM, host_af)) < 0) return -1;
168
169/* Set TCP_NODELAY; Exim does its own buffering. */
170
171setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (uschar *)(&on), sizeof(on));
172
9e4f5962
PP
173/* Set DSCP value, if we can. For now, if we fail to set the value, we don't
174bomb out, just log it and continue in default traffic class. */
175
176if (dscp && dscp_lookup(dscp, host_af, &dscp_level, &dscp_option, &dscp_value))
177 {
178 HDEBUG(D_transport|D_acl|D_v)
36a3ae5f 179 debug_printf("DSCP \"%s\"=%x ", dscp, dscp_value);
9e4f5962
PP
180 if (setsockopt(sock, dscp_level, dscp_option, &dscp_value, sizeof(dscp_value)) < 0)
181 HDEBUG(D_transport|D_acl|D_v)
182 debug_printf("failed to set DSCP: %s ", strerror(errno));
183 /* If the kernel supports IPv4 and IPv6 on an IPv6 socket, we need to set the
184 option for both; ignore failures here */
185 if (host_af == AF_INET6 &&
186 dscp_lookup(dscp, AF_INET, &dscp_level, &dscp_option, &dscp_value))
9e4f5962 187 (void) setsockopt(sock, dscp_level, dscp_option, &dscp_value, sizeof(dscp_value));
9e4f5962
PP
188 }
189
059ec3d9
PH
190/* Bind to a specific interface if requested. Caller must ensure the interface
191is the same type (IPv4 or IPv6) as the outgoing address. */
192
7eb6c37c 193if (interface && ip_bind(sock, host_af, interface, 0) < 0)
059ec3d9
PH
194 {
195 save_errno = errno;
196 HDEBUG(D_transport|D_acl|D_v)
197 debug_printf("unable to bind outgoing SMTP call to %s: %s", interface,
198 strerror(errno));
199 }
200
201/* Connect to the remote host, and add keepalive to the socket before returning
202it, if requested. */
203
204else if (ip_connect(sock, host_af, host->address, port, timeout) < 0)
205 save_errno = errno;
206
207/* Either bind() or connect() failed */
208
209if (save_errno != 0)
210 {
8e669ac1 211 HDEBUG(D_transport|D_acl|D_v)
4deaf07d
PH
212 {
213 debug_printf("failed: %s", CUstrerror(save_errno));
8e669ac1 214 if (save_errno == ETIMEDOUT)
4deaf07d 215 debug_printf(" (timeout=%s)", readconf_printtime(timeout));
8e669ac1
PH
216 debug_printf("\n");
217 }
f1e894f3 218 (void)close(sock);
059ec3d9
PH
219 errno = save_errno;
220 return -1;
221 }
222
223/* Both bind() and connect() succeeded */
224
225else
226 {
41c7c167
PH
227 union sockaddr_46 interface_sock;
228 EXIM_SOCKLEN_T size = sizeof(interface_sock);
059ec3d9 229 HDEBUG(D_transport|D_acl|D_v) debug_printf("connected\n");
41c7c167
PH
230 if (getsockname(sock, (struct sockaddr *)(&interface_sock), &size) == 0)
231 sending_ip_address = host_ntoa(-1, &interface_sock, NULL, &sending_port);
232 else
233 {
234 log_write(0, LOG_MAIN | ((errno == ECONNRESET)? 0 : LOG_PANIC),
235 "getsockname() failed: %s", strerror(errno));
236 close(sock);
237 return -1;
238 }
7eb6c37c 239 if (ob->keepalive) ip_keepalive(sock, host->address, TRUE);
059ec3d9
PH
240 return sock;
241 }
242}
243
7eb6c37c
JH
244/*************************************************
245* Connect to remote host *
246*************************************************/
247
248/* Create a socket, and connect it to a remote host. IPv6 addresses are
249detected by checking for a colon in the address. AF_INET6 is defined even on
250non-IPv6 systems, to enable the code to be less messy. However, on such systems
251host->address will always be an IPv4 address.
252
253The port field in the host item is used if it is set (usually router from SRV
254records or elsewhere). In other cases, the default passed as an argument is
255used, and the host item is updated with its value.
256
257Arguments:
258 host host item containing name and address (and sometimes port)
259 host_af AF_INET or AF_INET6
260 port default remote port to connect to, in host byte order, for those
261 hosts whose port setting is PORT_NONE
262 interface outgoing interface address or NULL
263 timeout timeout value or 0
264 tb transport
265
266Returns: connected socket number, or -1 with errno set
267*/
268
269int
270smtp_connect(host_item *host, int host_af, int port, uschar *interface,
271 int timeout, transport_instance * tb)
272{
0539a19d 273#ifdef EXPERIMENTAL_SOCKS
7eb6c37c
JH
274smtp_transport_options_block * ob =
275 (smtp_transport_options_block *)tb->options_block;
0539a19d 276#endif
7eb6c37c
JH
277
278if (host->port != PORT_NONE)
279 {
280 HDEBUG(D_transport|D_acl|D_v)
281 debug_printf("Transport port=%d replaced by host-specific port=%d\n", port,
282 host->port);
283 port = host->port;
284 }
285else host->port = port; /* Set the port actually used */
286
287HDEBUG(D_transport|D_acl|D_v)
288 {
289 uschar * s = US" ";
290 if (interface) s = string_sprintf(" from %s ", interface);
291#ifdef EXPERIMENTAL_SOCKS
292 if (ob->socks_proxy) s = string_sprintf("%svia proxy ", s);
293#endif
294 debug_printf("Connecting to %s [%s]:%d%s... ",
295 host->name, host->address, port, s);
296 }
297
298/* Create and connect the socket */
299
300#ifdef EXPERIMENTAL_SOCKS
301if (ob->socks_proxy)
302 return socks_sock_connect(host, host_af, port, interface, tb, timeout);
303#endif
304
305return smtp_sock_connect(host, host_af, port, interface, tb, timeout);
306}
307
059ec3d9
PH
308
309/*************************************************
310* Flush outgoing command buffer *
311*************************************************/
312
313/* This function is called only from smtp_write_command() below. It flushes
314the buffer of outgoing commands. There is more than one in the buffer only when
315pipelining.
316
317Argument:
318 outblock the SMTP output block
319
320Returns: TRUE if OK, FALSE on error, with errno set
321*/
322
323static BOOL
324flush_buffer(smtp_outblock *outblock)
325{
326int rc;
327
328#ifdef SUPPORT_TLS
817d9f57
JH
329if (tls_out.active == outblock->sock)
330 rc = tls_write(FALSE, outblock->buffer, outblock->ptr - outblock->buffer);
059ec3d9
PH
331else
332#endif
333
334rc = send(outblock->sock, outblock->buffer, outblock->ptr - outblock->buffer, 0);
335if (rc <= 0)
336 {
337 HDEBUG(D_transport|D_acl) debug_printf("send failed: %s\n", strerror(errno));
338 return FALSE;
339 }
340
341outblock->ptr = outblock->buffer;
342outblock->cmd_count = 0;
343return TRUE;
344}
345
346
347
348/*************************************************
349* Write SMTP command *
350*************************************************/
351
352/* The formatted command is left in big_buffer so that it can be reflected in
353any error message.
354
355Arguments:
356 outblock contains buffer for pipelining, and socket
357 noflush if TRUE, save the command in the output buffer, for pipelining
358 format a format, starting with one of
359 of HELO, MAIL FROM, RCPT TO, DATA, ".", or QUIT.
360 ... data for the format
361
362Returns: 0 if command added to pipelining buffer, with nothing transmitted
363 +n if n commands transmitted (may still have buffered the new one)
364 -1 on error, with errno set
365*/
366
367int
1ba28e2b 368smtp_write_command(smtp_outblock *outblock, BOOL noflush, const char *format, ...)
059ec3d9
PH
369{
370int count;
371int rc = 0;
372va_list ap;
373
374va_start(ap, format);
375if (!string_vformat(big_buffer, big_buffer_size, CS format, ap))
376 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "overlong write_command in outgoing "
377 "SMTP");
378va_end(ap);
379count = Ustrlen(big_buffer);
380
98470202
JH
381if (count > outblock->buffersize)
382 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "overlong write_command in outgoing "
383 "SMTP");
384
059ec3d9
PH
385if (count > outblock->buffersize - (outblock->ptr - outblock->buffer))
386 {
387 rc = outblock->cmd_count; /* flush resets */
388 if (!flush_buffer(outblock)) return -1;
389 }
390
391Ustrncpy(CS outblock->ptr, big_buffer, count);
392outblock->ptr += count;
393outblock->cmd_count++;
394count -= 2;
395big_buffer[count] = 0; /* remove \r\n for error message */
396
397/* We want to hide the actual data sent in AUTH transactions from reflections
398and logs. While authenticating, a flag is set in the outblock to enable this.
399The AUTH command itself gets any data flattened. Other lines are flattened
400completely. */
401
402if (outblock->authenticating)
403 {
404 uschar *p = big_buffer;
405 if (Ustrncmp(big_buffer, "AUTH ", 5) == 0)
406 {
407 p += 5;
408 while (isspace(*p)) p++;
409 while (!isspace(*p)) p++;
410 while (isspace(*p)) p++;
411 }
412 while (*p != 0) *p++ = '*';
413 }
414
415HDEBUG(D_transport|D_acl|D_v) debug_printf(" SMTP>> %s\n", big_buffer);
416
417if (!noflush)
418 {
419 rc += outblock->cmd_count; /* flush resets */
420 if (!flush_buffer(outblock)) return -1;
421 }
422
423return rc;
424}
425
426
427
428/*************************************************
429* Read one line of SMTP response *
430*************************************************/
431
432/* This function reads one line of SMTP response from the server host. This may
433not be a complete response - it could be just part of a multiline response. We
434have to use a buffer for incoming packets, because when pipelining or using
435LMTP, there may well be more than one response in a single packet. This
436function is called only from the one that follows.
437
438Arguments:
439 inblock the SMTP input block (contains holding buffer, socket, etc.)
440 buffer where to put the line
441 size space available for the line
442 timeout the timeout to use when reading a packet
443
444Returns: length of a line that has been put in the buffer
445 -1 otherwise, with errno set
446*/
447
448static int
449read_response_line(smtp_inblock *inblock, uschar *buffer, int size, int timeout)
450{
451uschar *p = buffer;
452uschar *ptr = inblock->ptr;
453uschar *ptrend = inblock->ptrend;
454int sock = inblock->sock;
455
456/* Loop for reading multiple packets or reading another packet after emptying
457a previously-read one. */
458
459for (;;)
460 {
461 int rc;
462
463 /* If there is data in the input buffer left over from last time, copy
464 characters from it until the end of a line, at which point we can return,
465 having removed any whitespace (which will include CR) at the end of the line.
466 The rules for SMTP say that lines end in CRLF, but there are have been cases
467 of hosts using just LF, and other MTAs are reported to handle this, so we
468 just look for LF. If we run out of characters before the end of a line,
469 carry on to read the next incoming packet. */
470
471 while (ptr < ptrend)
472 {
473 int c = *ptr++;
474 if (c == '\n')
475 {
476 while (p > buffer && isspace(p[-1])) p--;
477 *p = 0;
478 inblock->ptr = ptr;
479 return p - buffer;
480 }
481 *p++ = c;
482 if (--size < 4)
483 {
484 *p = 0; /* Leave malformed line for error message */
485 errno = ERRNO_SMTPFORMAT;
486 return -1;
487 }
488 }
489
490 /* Need to read a new input packet. */
491
492 rc = ip_recv(sock, inblock->buffer, inblock->buffersize, timeout);
493 if (rc <= 0) break;
494
495 /* Another block of data has been successfully read. Set up the pointers
496 and let the loop continue. */
497
498 ptrend = inblock->ptrend = inblock->buffer + rc;
499 ptr = inblock->buffer;
500 DEBUG(D_transport|D_acl) debug_printf("read response data: size=%d\n", rc);
501 }
502
503/* Get here if there has been some kind of recv() error; errno is set, but we
504ensure that the result buffer is empty before returning. */
505
506*buffer = 0;
507return -1;
508}
509
510
511
512
513
514/*************************************************
515* Read SMTP response *
516*************************************************/
517
518/* This function reads an SMTP response with a timeout, and returns the
519response in the given buffer, as a string. A multiline response will contain
520newline characters between the lines. The function also analyzes the first
521digit of the reply code and returns FALSE if it is not acceptable. FALSE is
522also returned after a reading error. In this case buffer[0] will be zero, and
523the error code will be in errno.
524
525Arguments:
526 inblock the SMTP input block (contains holding buffer, socket, etc.)
527 buffer where to put the response
528 size the size of the buffer
529 okdigit the expected first digit of the response
530 timeout the timeout to use
531
532Returns: TRUE if a valid, non-error response was received; else FALSE
533*/
534
535BOOL
536smtp_read_response(smtp_inblock *inblock, uschar *buffer, int size, int okdigit,
537 int timeout)
538{
539uschar *ptr = buffer;
540int count;
541
542errno = 0; /* Ensure errno starts out zero */
543
544/* This is a loop to read and concatentate the lines that make up a multi-line
545response. */
546
547for (;;)
548 {
549 if ((count = read_response_line(inblock, ptr, size, timeout)) < 0)
550 return FALSE;
551
552 HDEBUG(D_transport|D_acl|D_v)
553 debug_printf(" %s %s\n", (ptr == buffer)? "SMTP<<" : " ", ptr);
554
555 /* Check the format of the response: it must start with three digits; if
556 these are followed by a space or end of line, the response is complete. If
557 they are followed by '-' this is a multi-line response and we must look for
558 another line until the final line is reached. The only use made of multi-line
559 responses is to pass them back as error messages. We therefore just
560 concatenate them all within the buffer, which should be large enough to
561 accept any reasonable number of lines. */
562
563 if (count < 3 ||
564 !isdigit(ptr[0]) ||
565 !isdigit(ptr[1]) ||
566 !isdigit(ptr[2]) ||
567 (ptr[3] != '-' && ptr[3] != ' ' && ptr[3] != 0))
568 {
569 errno = ERRNO_SMTPFORMAT; /* format error */
570 return FALSE;
571 }
572
573 /* If the line we have just read is a terminal line, line, we are done.
574 Otherwise more data has to be read. */
575
576 if (ptr[3] != '-') break;
577
578 /* Move the reading pointer upwards in the buffer and insert \n between the
579 components of a multiline response. Space is left for this by read_response_
580 line(). */
581
582 ptr += count;
583 *ptr++ = '\n';
584 size -= count + 1;
585 }
586
587/* Return a value that depends on the SMTP return code. On some systems a
588non-zero value of errno has been seen at this point, so ensure it is zero,
589because the caller of this function looks at errno when FALSE is returned, to
590distinguish between an unexpected return code and other errors such as
591timeouts, lost connections, etc. */
592
593errno = 0;
594return buffer[0] == okdigit;
595}
596
597/* End of smtp_out.c */
7eb6c37c
JH
598/* vi: aw ai sw=2
599*/