2015-12-02 21:49:51 +01:00
|
|
|
/*
|
|
|
|
* smtp.c, SJ
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <strings.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <piler.h>
|
2016-04-05 21:10:09 +02:00
|
|
|
#include <smtp.h>
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_ehlo_lhlo(struct session_data *sdata, struct __data *data, int *protocol_state, char *resp, int resplen, struct __config *cfg){
|
2015-12-02 21:49:51 +01:00
|
|
|
char tmpbuf[MAXBUFSIZE];
|
2016-08-17 21:47:19 +02:00
|
|
|
char extensions[SMALLBUFSIZE];
|
|
|
|
|
|
|
|
memset(extensions, 0, sizeof(extensions));
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
if(*protocol_state == SMTP_STATE_INIT) *protocol_state = SMTP_STATE_HELO;
|
|
|
|
|
2016-08-17 21:47:19 +02:00
|
|
|
if(sdata->tls == 0) snprintf(extensions, sizeof(extensions)-1, "%s", data->starttls);
|
|
|
|
if(cfg->enable_chunking == 1) strncat(extensions, SMTP_EXTENSION_CHUNKING, sizeof(extensions)-strlen(extensions)-2);
|
|
|
|
|
|
|
|
snprintf(tmpbuf, sizeof(tmpbuf)-1, SMTP_RESP_250_EXTENSIONS, cfg->hostid, extensions);
|
2015-12-02 21:49:51 +01:00
|
|
|
|
2016-01-02 08:16:38 +01:00
|
|
|
strncat(resp, tmpbuf, resplen-strlen(resp));
|
2015-12-02 21:49:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_starttls(struct session_data *sdata, struct __data *data, int *protocol_state, int *starttls, int new_sd, char *resp, int resplen, struct __config *cfg){
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: starttls request from client", sdata->ttmpfile);
|
|
|
|
|
|
|
|
if(data->ctx){
|
|
|
|
data->ssl = SSL_new(data->ctx);
|
|
|
|
if(data->ssl){
|
|
|
|
|
|
|
|
SSL_set_options(data->ssl, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3);
|
|
|
|
|
|
|
|
if(SSL_set_fd(data->ssl, new_sd) == 1){
|
|
|
|
strncat(resp, SMTP_RESP_220_READY_TO_START_TLS, resplen);
|
|
|
|
*starttls = 1;
|
|
|
|
*protocol_state = SMTP_STATE_INIT;
|
|
|
|
return;
|
|
|
|
} syslog(LOG_PRIORITY, "%s: SSL_set_fd() failed", sdata->ttmpfile);
|
|
|
|
} syslog(LOG_PRIORITY, "%s: SSL_new() failed", sdata->ttmpfile);
|
|
|
|
} syslog(LOG_PRIORITY, "%s: SSL ctx is null!", sdata->ttmpfile);
|
|
|
|
|
|
|
|
strncat(resp, SMTP_RESP_454_ERR_TLS_TEMP_ERROR, resplen);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void process_command_mail_from(struct session_data *sdata, int *protocol_state, char *buf, char *resp, int resplen, struct __config *cfg){
|
|
|
|
|
|
|
|
if(*protocol_state != SMTP_STATE_HELO && *protocol_state != SMTP_STATE_PERIOD){
|
|
|
|
strncat(resp, SMTP_RESP_503_ERR, resplen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(*protocol_state == SMTP_STATE_PERIOD){
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: initiated new transaction", sdata->ttmpfile);
|
|
|
|
|
|
|
|
unlink(sdata->ttmpfile);
|
|
|
|
unlink(sdata->tmpframe);
|
|
|
|
|
|
|
|
init_session_data(sdata, cfg);
|
|
|
|
}
|
|
|
|
|
|
|
|
*protocol_state = SMTP_STATE_MAIL_FROM;
|
|
|
|
|
|
|
|
snprintf(sdata->mailfrom, SMALLBUFSIZE-1, "%s\r\n", buf);
|
|
|
|
|
|
|
|
memset(sdata->fromemail, 0, SMALLBUFSIZE);
|
|
|
|
extractEmail(sdata->mailfrom, sdata->fromemail);
|
|
|
|
|
|
|
|
strncat(resp, SMTP_RESP_250_OK, strlen(SMTP_RESP_250_OK));
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_rcpt_to(struct session_data *sdata, int *protocol_state, char *buf, char *resp, int resplen){
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
if(*protocol_state == SMTP_STATE_MAIL_FROM || *protocol_state == SMTP_STATE_RCPT_TO){
|
|
|
|
|
|
|
|
if(strlen(buf) > SMALLBUFSIZE/2){
|
|
|
|
strncat(resp, SMTP_RESP_550_ERR_TOO_LONG_RCPT_TO, resplen);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(sdata->num_of_rcpt_to < MAX_RCPT_TO-1){
|
|
|
|
extractEmail(buf, sdata->rcptto[sdata->num_of_rcpt_to]);
|
|
|
|
}
|
|
|
|
|
|
|
|
*protocol_state = SMTP_STATE_RCPT_TO;
|
|
|
|
|
|
|
|
if(sdata->num_of_rcpt_to < MAX_RCPT_TO-1) sdata->num_of_rcpt_to++;
|
|
|
|
|
|
|
|
strncat(resp, SMTP_RESP_250_OK, resplen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
strncat(resp, SMTP_RESP_503_ERR, resplen);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_data(struct session_data *sdata, int *protocol_state, char *resp, int resplen){
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
if(*protocol_state != SMTP_STATE_RCPT_TO){
|
|
|
|
strncat(resp, SMTP_RESP_503_ERR, resplen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
sdata->fd = open(sdata->filename, O_CREAT|O_RDWR, S_IRUSR|S_IWUSR|S_IRGRP);
|
|
|
|
if(sdata->fd == -1){
|
|
|
|
syslog(LOG_PRIORITY, "%s: %s", ERR_OPEN_TMP_FILE, sdata->ttmpfile);
|
|
|
|
strncat(resp, SMTP_RESP_451_ERR, resplen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
*protocol_state = SMTP_STATE_DATA;
|
|
|
|
strncat(resp, SMTP_RESP_354_DATA_OK, resplen-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-19 22:33:47 +02:00
|
|
|
void process_command_bdat(struct session_ctx *sctx, struct session_data *sdata, struct __data *data, int *protocol_state, char *buf, char *resp, int resplen){
|
|
|
|
int n, expected_bdat_len;
|
|
|
|
char puf[MAXBUFSIZE];
|
|
|
|
|
|
|
|
if(*protocol_state == SMTP_STATE_RCPT_TO){
|
|
|
|
strncat(resp, SMTP_RESP_503_ERR, resplen);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sctx->bdat_rounds = 0;
|
|
|
|
sctx->bdat_last_round = 0;
|
|
|
|
|
|
|
|
while(sctx->bdat_last_round != 1){
|
|
|
|
sctx->bdat_rounds++;
|
|
|
|
expected_bdat_len = 0;
|
|
|
|
|
|
|
|
if(sctx->bdat_rounds == 1){
|
|
|
|
expected_bdat_len = extract_bdat_command(sctx, sdata, buf);
|
|
|
|
|
|
|
|
sdata->fd = open(sdata->filename, O_CREAT|O_RDWR, S_IRUSR|S_IWUSR|S_IRGRP);
|
|
|
|
if(sdata->fd == -1){
|
|
|
|
syslog(LOG_PRIORITY, "%s: %s", ERR_OPEN_TMP_FILE, sdata->ttmpfile);
|
|
|
|
strncat(resp, SMTP_RESP_451_ERR, resplen);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
*protocol_state = SMTP_STATE_BDAT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if(sctx->bdat_last_round != 1){
|
|
|
|
if((n = recvtimeoutssl(sctx->new_sd, &puf[0], sizeof(puf), TIMEOUT, sdata->tls, data->ssl)) > 0){
|
|
|
|
expected_bdat_len = extract_bdat_command(sctx, sdata, puf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(expected_bdat_len > 0) sdata->tot_len += read_bdat_data(sctx, sdata, data, expected_bdat_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(sdata->fd);
|
|
|
|
fsync(sdata->fd);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int extract_bdat_command(struct session_ctx *sctx, struct session_data *sdata, char *buf){
|
|
|
|
int expected_bdat_len=0;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
// determine if this is the last BDAT command
|
|
|
|
|
|
|
|
p = strstr(buf, " LAST");
|
|
|
|
if(p){
|
|
|
|
sctx->bdat_last_round = 1;
|
|
|
|
syslog(LOG_INFO, "%s: BDAT LAST", sdata->ttmpfile);
|
|
|
|
*p = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
// determine the size to be read
|
|
|
|
|
|
|
|
p = strchr(buf, ' ');
|
|
|
|
if(p){
|
|
|
|
expected_bdat_len = atoi(p);
|
|
|
|
syslog(LOG_INFO, "%s: BDAT len=%d", sdata->ttmpfile, expected_bdat_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!p || expected_bdat_len <= 0){
|
|
|
|
syslog(LOG_INFO, "%s: malformed BDAT command", sdata->ttmpfile);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return expected_bdat_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int read_bdat_data(struct session_ctx *sctx, struct session_data *sdata, struct __data *data, int expected_bdat_len){
|
|
|
|
int n, read_bdat_len=0, written_bdat_len=0;
|
|
|
|
char puf[MAXBUFSIZE];
|
|
|
|
|
|
|
|
while(read_bdat_len < expected_bdat_len){
|
|
|
|
if((n = recvtimeoutssl(sctx->new_sd, &puf[0], sizeof(puf), TIMEOUT, sdata->tls, data->ssl)) > 0){
|
|
|
|
read_bdat_len += n;
|
|
|
|
written_bdat_len += write(sdata->fd, puf, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return written_bdat_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_quit(struct session_data *sdata, int *protocol_state, char *resp, int resplen, struct __config *cfg){
|
2015-12-02 21:49:51 +01:00
|
|
|
char tmpbuf[MAXBUFSIZE];
|
|
|
|
|
|
|
|
*protocol_state = SMTP_STATE_FINISHED;
|
|
|
|
|
|
|
|
snprintf(tmpbuf, sizeof(tmpbuf)-1, SMTP_RESP_221_GOODBYE, cfg->hostid);
|
|
|
|
strncat(resp, tmpbuf, resplen);
|
|
|
|
|
|
|
|
unlink(sdata->ttmpfile);
|
|
|
|
unlink(sdata->tmpframe);
|
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: removed", sdata->ttmpfile);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void process_command_reset(struct session_data *sdata, int *protocol_state, char *resp, int resplen, struct __config *cfg){
|
2015-12-02 21:49:51 +01:00
|
|
|
|
|
|
|
strncat(resp, SMTP_RESP_250_OK, resplen);
|
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: removed", sdata->ttmpfile);
|
|
|
|
|
|
|
|
unlink(sdata->ttmpfile);
|
|
|
|
unlink(sdata->tmpframe);
|
|
|
|
|
|
|
|
init_session_data(sdata, cfg);
|
|
|
|
|
|
|
|
*protocol_state = SMTP_STATE_HELO;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
void send_buffered_response(struct session_data *sdata, struct __data *data, int starttls, int new_sd, char *resp, struct __config *cfg){
|
2015-12-02 21:49:51 +01:00
|
|
|
int rc;
|
|
|
|
char ssl_error[SMALLBUFSIZE];
|
|
|
|
|
|
|
|
write1(new_sd, resp, strlen(resp), sdata->tls, data->ssl);
|
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: sent: %s", sdata->ttmpfile, resp);
|
|
|
|
memset(resp, 0, MAXBUFSIZE);
|
|
|
|
|
|
|
|
if(starttls == 1 && sdata->tls == 0){
|
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: waiting for ssl handshake", sdata->ttmpfile);
|
|
|
|
|
|
|
|
rc = SSL_accept(data->ssl);
|
|
|
|
|
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_PRIORITY, "%s: SSL_accept() finished", sdata->ttmpfile);
|
|
|
|
|
|
|
|
if(rc == 1){
|
|
|
|
sdata->tls = 1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
ERR_error_string_n(ERR_get_error(), ssl_error, SMALLBUFSIZE);
|
|
|
|
syslog(LOG_PRIORITY, "%s: SSL_accept() failed, rc=%d, errorcode: %d, error text: %s\n", sdata->ttmpfile, rc, SSL_get_error(data->ssl, rc), ssl_error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|