/* $OpenBSD: lka.c,v 1.107 2010/04/27 09:49:23 gilles Exp $ */ /* * Copyright (c) 2008 Pierre-Yves Ritschard * Copyright (c) 2008 Gilles Chehade * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "smtpd.h" void lka_imsg(struct smtpd *, struct imsgev *, struct imsg *); __dead void lka_shutdown(void); void lka_sig_handler(int, short, void *); void lka_setup_events(struct smtpd *); void lka_disable_events(struct smtpd *); void lka_expand_pickup(struct smtpd *, struct lkasession *); int lka_expand_resume(struct smtpd *, struct lkasession *); int lka_resolve_node(struct smtpd *, char *tag, struct path *, struct expandnode *); int lka_verify_mail(struct smtpd *, struct path *); struct rule *ruleset_match(struct smtpd *, char *, struct path *, struct sockaddr_storage *); int lka_resolve_path(struct smtpd *, struct lkasession *, struct path *); struct lkasession *lka_session_init(struct smtpd *, struct submit_status *); void lka_request_forwardfile(struct smtpd *, struct lkasession *, char *); void lka_clear_expandtree(struct expandtree *); void lka_clear_deliverylist(struct deliverylist *); int lka_encode_credentials(char *, size_t, struct map_secret *); size_t lka_expand(char *, size_t, struct path *); void lka_rcpt_action(struct smtpd *, char *, struct path *); void lka_session_destroy(struct smtpd *, struct lkasession *); void lka_expansion_done(struct smtpd *, struct lkasession *); void lka_session_fail(struct smtpd *, struct lkasession *, struct submit_status *); void lka_imsg(struct smtpd *env, struct imsgev *iev, struct imsg *imsg) { struct lkasession skey; struct submit_status *ss; struct forward_req *fwreq; struct lkasession *s; struct secret *secret; struct mapel *mapel; struct cond *cond; struct rule *rule; struct path *path; struct map *map; void *tmp; if (imsg->hdr.type == IMSG_DNS_A || imsg->hdr.type == IMSG_DNS_MX || imsg->hdr.type == IMSG_DNS_PTR) { dns_async(env, iev, imsg->hdr.type, imsg->data); return; } if (iev->proc == PROC_MFA) { switch (imsg->hdr.type) { case IMSG_LKA_MAIL: ss = imsg->data; ss->code = 530; if (ss->u.path.user[0] == '\0' && ss->u.path.domain[0] == '\0') ss->code = 250; else if (lka_verify_mail(env, &ss->u.path)) ss->code = 250; imsg_compose_event(iev, IMSG_LKA_MAIL, 0, 0, -1, ss, sizeof *ss); return; case IMSG_LKA_RULEMATCH: ss = imsg->data; ss->code = 530; rule = ruleset_match(env, ss->msg.tag, &ss->u.path, &ss->ss); if (rule) { ss->code = 250; ss->u.path.rule = *rule; } imsg_compose_event(iev, IMSG_LKA_RULEMATCH, 0, 0, -1, ss, sizeof *ss); return; case IMSG_LKA_RCPT: ss = imsg->data; ss->code = 250; path = &ss->u.path; s = lka_session_init(env, ss); if (! lka_resolve_path(env, s, path)) lka_session_fail(env, s, ss); else lka_expand_pickup(env, s); return; } } if (iev->proc == PROC_MTA) { switch (imsg->hdr.type) { case IMSG_LKA_SECRET: { struct map_secret *map_secret; secret = imsg->data; map = map_findbyname(env, "secrets"); if (map == NULL) fatalx("lka: secrets map not found"); map_secret = map_lookup(env, map->m_id, secret->host, K_SECRET); log_debug("lka: %s secret lookup (%d)", secret->host, map_secret != NULL); secret->secret[0] = '\0'; if (map_secret == NULL) log_warnx("%s secret not found", secret->host); else if (lka_encode_credentials(secret->secret, sizeof secret->secret, map_secret) == 0) log_warnx("%s secret parse fail", secret->host); imsg_compose_event(iev, IMSG_LKA_SECRET, 0, 0, -1, secret, sizeof *secret); free(map_secret); return; } } } if (iev->proc == PROC_PARENT) { switch (imsg->hdr.type) { case IMSG_CONF_START: env->sc_rules_reload = calloc(1, sizeof *env->sc_rules); if (env->sc_rules_reload == NULL) fatal(NULL); env->sc_maps_reload = calloc(1, sizeof *env->sc_maps); if (env->sc_maps_reload == NULL) fatal(NULL); TAILQ_INIT(env->sc_rules_reload); TAILQ_INIT(env->sc_maps_reload); return; case IMSG_CONF_RULE: rule = calloc(1, sizeof *rule); if (rule == NULL) fatal(NULL); *rule = *(struct rule *)imsg->data; TAILQ_INIT(&rule->r_conditions); TAILQ_INSERT_TAIL(env->sc_rules_reload, rule, r_entry); return; case IMSG_CONF_CONDITION: rule = TAILQ_LAST(env->sc_rules_reload, rulelist); cond = calloc(1, sizeof *cond); if (cond == NULL) fatal(NULL); *cond = *(struct cond *)imsg->data; TAILQ_INSERT_TAIL(&rule->r_conditions, cond, c_entry); return; case IMSG_CONF_MAP: map = calloc(1, sizeof *map); if (map == NULL) fatal(NULL); *map = *(struct map *)imsg->data; TAILQ_INIT(&map->m_contents); TAILQ_INSERT_TAIL(env->sc_maps_reload, map, m_entry); return; case IMSG_CONF_RULE_SOURCE: rule = TAILQ_LAST(env->sc_rules_reload, rulelist); tmp = env->sc_maps; env->sc_maps = env->sc_maps_reload; rule->r_sources = map_findbyname(env, imsg->data); if (rule->r_sources == NULL) fatalx("lka: maps inconsistency"); env->sc_maps = tmp; return; case IMSG_CONF_MAP_CONTENT: map = TAILQ_LAST(env->sc_maps_reload, maplist); mapel = calloc(1, sizeof *mapel); if (mapel == NULL) fatal(NULL); *mapel = *(struct mapel *)imsg->data; TAILQ_INSERT_TAIL(&map->m_contents, mapel, me_entry); return; case IMSG_CONF_END: if (env->sc_rules) purge_config(env, PURGE_RULES); if (env->sc_maps) purge_config(env, PURGE_MAPS); env->sc_rules = env->sc_rules_reload; env->sc_maps = env->sc_maps_reload; return; case IMSG_PARENT_FORWARD_OPEN: fwreq = imsg->data; skey.id = fwreq->id; s = SPLAY_FIND(lkatree, &env->lka_sessions, &skey); if (s == NULL) fatalx("lka: session missing"); s->pending--; strlcpy(s->path.pw_name, fwreq->pw_name, sizeof s->path.pw_name); s->path.flags |= F_PATH_FORWARDED; if (imsg->fd != -1) { /* opened .forward okay */ if (! forwards_get(imsg->fd, &s->expandtree)) { s->ss.code = 530; s->flags |= F_ERROR; } close(imsg->fd); s->path.flags |= F_PATH_FORWARDED; lka_expand_pickup(env, s); } else { if (fwreq->status) { /* .forward not present */ path = path_dup(&s->path); strlcpy(path->pw_name, fwreq->pw_name, sizeof path->pw_name); TAILQ_INSERT_TAIL(&s->deliverylist, path, entry); lka_expand_pickup(env, s); } else { /* opening .forward failed */ s->ss.code = 530; s->flags |= F_ERROR; lka_expand_pickup(env, s); } } return; case IMSG_CTL_VERBOSE: log_verbose(*(int *)imsg->data); return; } } fatalx("lka_imsg: unexpected imsg"); } void lka_sig_handler(int sig, short event, void *p) { int status; pid_t pid; switch (sig) { case SIGINT: case SIGTERM: lka_shutdown(); break; case SIGCHLD: do { pid = waitpid(-1, &status, WNOHANG); } while (pid > 0 || (pid == -1 && errno == EINTR)); break; default: fatalx("lka_sig_handler: unexpected signal"); } } void lka_shutdown(void) { log_info("lookup agent exiting"); _exit(0); } void lka_setup_events(struct smtpd *env) { } void lka_disable_events(struct smtpd *env) { } pid_t lka(struct smtpd *env) { pid_t pid; struct passwd *pw; struct event ev_sigint; struct event ev_sigterm; struct event ev_sigchld; struct peer peers[] = { { PROC_PARENT, imsg_dispatch }, { PROC_MFA, imsg_dispatch }, { PROC_QUEUE, imsg_dispatch }, { PROC_SMTP, imsg_dispatch }, { PROC_MTA, imsg_dispatch } }; switch (pid = fork()) { case -1: fatal("lka: cannot fork"); case 0: break; default: return (pid); } purge_config(env, PURGE_EVERYTHING); pw = env->sc_pw; smtpd_process = PROC_LKA; setproctitle("%s", env->sc_title[smtpd_process]); if (setgroups(1, &pw->pw_gid) || setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) fatal("lka: cannot drop privileges"); imsg_callback = lka_imsg; event_init(); SPLAY_INIT(&env->lka_sessions); signal_set(&ev_sigint, SIGINT, lka_sig_handler, env); signal_set(&ev_sigterm, SIGTERM, lka_sig_handler, env); signal_set(&ev_sigchld, SIGCHLD, lka_sig_handler, env); signal_add(&ev_sigint, NULL); signal_add(&ev_sigterm, NULL); signal_add(&ev_sigchld, NULL); signal(SIGPIPE, SIG_IGN); signal(SIGHUP, SIG_IGN); /* * lka opens all kinds of files and sockets, so bump the limit to max. * XXX: need to analyse the exact hard limit. */ fdlimit(1.0); config_pipes(env, peers, nitems(peers)); config_peers(env, peers, nitems(peers)); lka_setup_events(env); event_dispatch(); lka_shutdown(); return (0); } int lka_verify_mail(struct smtpd *env, struct path *path) { return 1; } size_t lka_expand(char *buf, size_t len, struct path *path) { char *p, *pbuf; struct rule r; size_t ret; struct passwd *pw; bzero(r.r_value.path, MAXPATHLEN); pbuf = r.r_value.path; ret = 0; for (p = path->rule.r_value.path; *p != '\0'; ++p) { if (p == path->rule.r_value.path && *p == '~') { if (*(p + 1) == '/' || *(p + 1) == '\0') { pw = getpwnam(path->pw_name); if (pw == NULL) continue; ret += strlcat(pbuf, pw->pw_dir, len); if (ret >= len) return ret; pbuf += strlen(pw->pw_dir); continue; } if (*(p + 1) != '/') { char username[MAXLOGNAME]; char *delim; ret = strlcpy(username, p + 1, sizeof(username)); delim = strchr(username, '/'); if (delim == NULL && ret >= sizeof(username)) { continue; } if (delim != NULL) { *delim = '\0'; } pw = getpwnam(username); if (pw == NULL) continue; ret += strlcat(pbuf, pw->pw_dir, len); if (ret >= len) return ret; pbuf += strlen(pw->pw_dir); p += strlen(username); continue; } } if (strncmp(p, "%a", 2) == 0) { ret += strlcat(pbuf, path->user, len); if (ret >= len) return ret; pbuf += strlen(path->user); ++p; continue; } if (strncmp(p, "%u", 2) == 0) { ret += strlcat(pbuf, path->pw_name, len); if (ret >= len) return ret; pbuf += strlen(path->pw_name); ++p; continue; } if (strncmp(p, "%d", 2) == 0) { ret += strlcat(pbuf, path->domain, len); if (ret >= len) return ret; pbuf += strlen(path->domain); ++p; continue; } if (*p == '%' && isdigit((int)*(p+1)) && *(p+2) == 'a') { size_t idx; idx = *(p+1) - '0'; if (idx < strlen(path->user)) *pbuf++ = path->user[idx]; p+=2; ++ret; continue; } if (*p == '%' && isdigit((int)*(p+1)) && *(p+2) == 'u') { size_t idx; idx = *(p+1) - '0'; if (idx < strlen(path->pw_name)) *pbuf++ = path->pw_name[idx]; p+=2; ++ret; continue; } if (*p == '%' && isdigit((int)*(p+1)) && *(p+2) == 'd') { size_t idx; idx = *(p+1) - '0'; if (idx < strlen(path->domain)) *pbuf++ = path->domain[idx]; p+=2; ++ret; continue; } *pbuf++ = *p; ++ret; } memcpy(path->rule.r_value.path, r.r_value.path, ret); return ret; } int lka_resolve_node(struct smtpd *env, char *tag, struct path *path, struct expandnode *expnode) { struct path psave = *path; bzero(path, sizeof(struct path)); switch (expnode->type) { case EXPAND_USERNAME: log_debug("lka_resolve_node: node is local username: %s", expnode->u.username); if (strlcpy(path->pw_name, expnode->u.username, sizeof(path->pw_name)) >= sizeof(path->pw_name)) return 0; if (strlcpy(path->user, expnode->u.username, sizeof(path->user)) >= sizeof(path->user)) return 0; if (psave.domain[0] == '\0') { if (strlcpy(path->domain, env->sc_hostname, sizeof(path->domain)) >= sizeof(path->domain)) return 0; } else { strlcpy(path->domain, psave.domain, sizeof(psave.domain)); } log_debug("lka_resolve_node: resolved to address: %s@%s", path->user, path->domain); lka_rcpt_action(env, tag, path); break; case EXPAND_FILENAME: log_debug("lka_resolve_node: node is filename: %s", expnode->u.filename); path->rule.r_action = A_FILENAME; strlcpy(path->u.filename, expnode->u.filename, sizeof(path->u.filename)); break; case EXPAND_FILTER: log_debug("lka_resolve_node: node is filter: %s", expnode->u.filter); path->rule.r_action = A_EXT; strlcpy(path->rule.r_value.command, expnode->u.filter + 2, sizeof(path->rule.r_value.command)); path->rule.r_value.command[strlen(path->rule.r_value.command) - 1] = '\0'; break; case EXPAND_ADDRESS: log_debug("lka_resolve_node: node is address: %s@%s", expnode->u.mailaddr.user, expnode->u.mailaddr.domain); if (strlcpy(path->user, expnode->u.mailaddr.user, sizeof(path->user)) >= sizeof(path->user)) return 0; if (strlcpy(path->domain, expnode->u.mailaddr.domain, sizeof(path->domain)) >= sizeof(path->domain)) return 0; lka_rcpt_action(env, tag, path); break; case EXPAND_INVALID: case EXPAND_INCLUDE: fatalx("lka_resolve_node: unexpected type"); break; } return 1; } void lka_expand_pickup(struct smtpd *env, struct lkasession *lkasession) { int ret; /* we want to do five iterations of lka_expand_resume() but * we need to be interruptible in case lka_expand_resume() * has sent an imsg and expects an answer. */ ret = 0; while (! (lkasession->flags & F_ERROR) && ! lkasession->pending && lkasession->iterations < 5) { ++lkasession->iterations; ret = lka_expand_resume(env, lkasession); if (ret == -1) { lkasession->ss.code = 530; lkasession->flags |= F_ERROR; } if (lkasession->pending || ret <= 0) break; } if (lkasession->pending) return; lka_expansion_done(env, lkasession); } int lka_expand_resume(struct smtpd *env, struct lkasession *lkasession) { u_int8_t done = 1; struct expandnode *expnode = NULL; struct path *lkasessionpath = NULL; struct path path, *pathp = NULL; lkasessionpath = &lkasession->path; RB_FOREACH(expnode, expandtree, &lkasession->expandtree) { /* this node has already been expanded, skip*/ if (expnode->flags & F_EXPAND_DONE) continue; done = 0; /* convert node to path, then inherit flags from lkasession */ if (! lka_resolve_node(env, lkasession->message.tag, &path, expnode)) return -1; path.flags = lkasessionpath->flags; /* resolve path, eventually populating expandtree. * we need to dup because path may be added to the deliverylist. */ pathp = path_dup(&path); if (! lka_resolve_path(env, lkasession, pathp)) return -1; /* decrement refcount on this node and flag it as processed */ expandtree_decrement_node(&lkasession->expandtree, expnode); expnode->flags |= F_EXPAND_DONE; } /* still not done after 5 iterations ? loop detected ... reject */ if (!done && lkasession->iterations == 5) { return -1; } /* we're done expanding, no need for another iteration */ if (RB_ROOT(&lkasession->expandtree) == NULL || done) return 0; return 1; } void lka_expansion_done(struct smtpd *env, struct lkasession *lkasession) { struct message message; struct path *path; /* delivery list is empty OR expansion led to an error, reject */ if (TAILQ_FIRST(&lkasession->deliverylist) == NULL || lkasession->flags & F_ERROR) { imsg_compose_event(env->sc_ievs[PROC_MFA], IMSG_LKA_RCPT, 0, 0, -1, &lkasession->ss, sizeof(struct submit_status)); goto done; } /* process the delivery list and submit envelopes to queue */ message = lkasession->message; while ((path = TAILQ_FIRST(&lkasession->deliverylist)) != NULL) { lka_expand(path->rule.r_value.path, sizeof(path->rule.r_value.path), path); message.recipient = *path; queue_submit_envelope(env, &message); TAILQ_REMOVE(&lkasession->deliverylist, path, entry); free(path); } queue_commit_envelopes(env, &message); done: lka_clear_expandtree(&lkasession->expandtree); lka_clear_deliverylist(&lkasession->deliverylist); lka_session_destroy(env, lkasession); } int lka_resolve_path(struct smtpd *env, struct lkasession *lkasession, struct path *path) { if (IS_RELAY(*path) || path->cond == NULL) { path = path_dup(path); path->flags |= F_PATH_RELAY; TAILQ_INSERT_TAIL(&lkasession->deliverylist, path, entry); return 1; } switch (path->cond->c_type) { case C_ALL: case C_NET: case C_DOM: { char username[MAX_LOCALPART_SIZE]; char *sep; struct passwd *pw; lowercase(username, path->user, sizeof(username)); sep = strchr(username, '+'); if (sep != NULL) *sep = '\0'; if (aliases_exist(env, path->rule.r_amap, username)) { path->flags |= F_PATH_ALIAS; if (! aliases_get(env, path->rule.r_amap, &lkasession->expandtree, path->user)) return 0; return 1; } if (strlen(username) >= MAXLOGNAME) return 0; path->flags |= F_PATH_ACCOUNT; pw = getpwnam(username); if (pw == NULL) return 0; (void)strlcpy(path->pw_name, pw->pw_name, sizeof(path->pw_name)); if (path->flags & F_PATH_FORWARDED) TAILQ_INSERT_TAIL(&lkasession->deliverylist, path, entry); else lka_request_forwardfile(env, lkasession, path->pw_name); return 1; } case C_VDOM: { if (aliases_virtual_exist(env, path->cond->c_map, path)) { path->flags |= F_PATH_VIRTUAL; if (! aliases_virtual_get(env, path->cond->c_map, &lkasession->expandtree, path)) return 0; return 1; } break; } default: fatalx("lka_resolve_path: unexpected type"); } return 0; } void lka_rcpt_action(struct smtpd *env, char *tag, struct path *path) { struct rule *r; if (path->domain[0] == '\0') (void)strlcpy(path->domain, env->sc_hostname, sizeof (path->domain)); r = ruleset_match(env, tag, path, NULL); if (r == NULL) { path->rule.r_action = A_RELAY; return; } path->rule = *r; } int lkasession_cmp(struct lkasession *s1, struct lkasession *s2) { /* * do not return u_int64_t's */ if (s1->id < s2->id) return (-1); if (s1->id > s2->id) return (1); return (0); } void lka_clear_expandtree(struct expandtree *expandtree) { struct expandnode *expnode; while ((expnode = RB_ROOT(expandtree)) != NULL) { expandtree_remove_node(expandtree, expnode); free(expnode); } } void lka_clear_deliverylist(struct deliverylist *deliverylist) { struct path *path; while ((path = TAILQ_FIRST(deliverylist)) != NULL) { TAILQ_REMOVE(deliverylist, path, entry); free(path); } } int lka_encode_credentials(char *dst, size_t size, struct map_secret *map_secret) { char *buf; int buflen; if ((buflen = asprintf(&buf, "%c%s%c%s", '\0', map_secret->username, '\0', map_secret->password)) == -1) fatal(NULL); if (__b64_ntop((unsigned char *)buf, buflen, dst, size) == -1) { free(buf); return 0; } free(buf); return 1; } struct lkasession * lka_session_init(struct smtpd *env, struct submit_status *ss) { struct lkasession *lkasession; lkasession = calloc(1, sizeof(struct lkasession)); if (lkasession == NULL) fatal("lka_session_init: calloc"); lkasession->id = generate_uid(); lkasession->path = ss->u.path; lkasession->message = ss->msg; lkasession->ss = *ss; RB_INIT(&lkasession->expandtree); TAILQ_INIT(&lkasession->deliverylist); SPLAY_INSERT(lkatree, &env->lka_sessions, lkasession); return lkasession; } void lka_session_fail(struct smtpd *env, struct lkasession *lkasession, struct submit_status *ss) { ss->code = 530; imsg_compose_event(env->sc_ievs[PROC_MFA], IMSG_LKA_RCPT, 0, 0, -1, ss, sizeof(*ss)); lka_session_destroy(env, lkasession); } void lka_session_destroy(struct smtpd *env, struct lkasession *lkasession) { SPLAY_REMOVE(lkatree, &env->lka_sessions, lkasession); free(lkasession); } void lka_request_forwardfile(struct smtpd *env, struct lkasession *lkasession, char *username) { struct forward_req fwreq; fwreq.id = lkasession->id; (void)strlcpy(fwreq.pw_name, username, sizeof(fwreq.pw_name)); imsg_compose_event(env->sc_ievs[PROC_PARENT], IMSG_PARENT_FORWARD_OPEN, 0, 0, -1, &fwreq, sizeof(fwreq)); ++lkasession->pending; } SPLAY_GENERATE(lkatree, lkasession, nodes, lkasession_cmp);