blob: b542099fd821f99e8d8cd56741b3550a1491ac77 [file] [log] [blame]
Denis Vlasenko239d06b2008-11-06 23:42:42 +00001/* vi: set sw=4 ts=4: */
2/*
3 * bare bones sendmail
4 *
5 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
6 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +02007 * Licensed under GPLv2, see file LICENSE in this source tree.
Denis Vlasenko239d06b2008-11-06 23:42:42 +00008 */
Denys Vlasenkoc19f7582016-11-23 09:58:03 +01009//config:config SENDMAIL
10//config: bool "sendmail"
11//config: default y
12//config: help
13//config: Barebones sendmail.
14
15//applet:IF_SENDMAIL(APPLET(sendmail, BB_DIR_USR_SBIN, BB_SUID_DROP))
Denys Vlasenko5707b522010-12-20 05:12:39 +010016
Denys Vlasenkod616ab62011-05-22 03:46:33 +020017//kbuild:lib-$(CONFIG_SENDMAIL) += sendmail.o mail.o
18
Denys Vlasenko5707b522010-12-20 05:12:39 +010019//usage:#define sendmail_trivial_usage
Denys Vlasenko9de75092016-07-14 19:14:54 +020020//usage: "[-tv] [-f SENDER] [-amLOGIN 4<user_pass.txt | -auUSER -apPASS]"
Denys Vlasenko2a4d7f42016-07-14 20:06:44 +020021//usage: "\n [-w SECS] [-H 'PROG ARGS' | -S HOST] [RECIPIENT_EMAIL]..."
Denys Vlasenko5707b522010-12-20 05:12:39 +010022//usage:#define sendmail_full_usage "\n\n"
23//usage: "Read email from stdin and send it\n"
24//usage: "\nStandard options:"
25//usage: "\n -t Read additional recipients from message body"
Denys Vlasenko07f417b2014-02-05 15:01:39 +010026//usage: "\n -f SENDER For use in MAIL FROM:<sender>. Can be empty string"
27//usage: "\n Default: -auUSER, or username of current UID"
Denys Vlasenko5707b522010-12-20 05:12:39 +010028//usage: "\n -o OPTIONS Various options. -oi implied, others are ignored"
Denys Vlasenko9de75092016-07-14 19:14:54 +020029//usage: "\n -i -oi synonym, implied and ignored"
Denys Vlasenko5707b522010-12-20 05:12:39 +010030//usage: "\n"
31//usage: "\nBusybox specific options:"
32//usage: "\n -v Verbose"
33//usage: "\n -w SECS Network timeout"
Denys Vlasenko9de75092016-07-14 19:14:54 +020034//usage: "\n -H 'PROG ARGS' Run connection helper. Examples:"
35//usage: "\n openssl s_client -quiet -tls1 -starttls smtp -connect smtp.gmail.com:25"
36//usage: "\n openssl s_client -quiet -tls1 -connect smtp.gmail.com:465"
Denys Vlasenkob9f56e82016-09-07 13:16:33 +020037//usage: "\n $SMTP_ANTISPAM_DELAY: seconds to wait after helper connect"
Denys Vlasenko9de75092016-07-14 19:14:54 +020038//usage: "\n -S HOST[:PORT] Server (default $SMTPHOST or 127.0.0.1)"
39//usage: "\n -amLOGIN Log in using AUTH LOGIN (-amCRAM-MD5 not supported)"
40//usage: "\n -auUSER Username for AUTH"
41//usage: "\n -apPASS Password for AUTH"
Denys Vlasenko5707b522010-12-20 05:12:39 +010042//usage: "\n"
Denys Vlasenko9de75092016-07-14 19:14:54 +020043//usage: "\nIf no -a options are given, authentication is not done."
44//usage: "\nIf -amLOGIN is given but no -au/-ap, user/password is read from fd #4."
45//usage: "\nOther options are silently ignored; -oi is implied."
Denys Vlasenko5707b522010-12-20 05:12:39 +010046//usage: IF_MAKEMIME(
Denys Vlasenko9de75092016-07-14 19:14:54 +020047//usage: "\nUse makemime to create emails with attachments."
Denys Vlasenko5707b522010-12-20 05:12:39 +010048//usage: )
49
Denys Vlasenko07f417b2014-02-05 15:01:39 +010050/* Currently we don't sanitize or escape user-supplied SENDER and RECIPIENT_EMAILs.
51 * We may need to do so. For one, '.' in usernames seems to require escaping!
52 *
53 * From http://cr.yp.to/smtp/address.html:
54 *
55 * SMTP offers three ways to encode a character inside an address:
56 *
57 * "safe": the character, if it is not <>()[].,;:@, backslash,
58 * double-quote, space, or an ASCII control character;
59 * "quoted": the character, if it is not \012, \015, backslash,
60 * or double-quote; or
61 * "slashed": backslash followed by the character.
62 *
63 * An encoded box part is either (1) a sequence of one or more slashed
64 * or safe characters or (2) a double quote, a sequence of zero or more
65 * slashed or quoted characters, and a double quote. It represents
66 * the concatenation of the characters encoded inside it.
67 *
68 * For example, the encoded box parts
69 * angels
70 * \a\n\g\e\l\s
71 * "\a\n\g\e\l\s"
72 * "angels"
73 * "ang\els"
74 * all represent the 6-byte string "angels", and the encoded box parts
75 * a\,comma
76 * \a\,\c\o\m\m\a
77 * "a,comma"
78 * all represent the 7-byte string "a,comma".
79 *
80 * An encoded address contains
81 * the byte <;
82 * optionally, a route followed by a colon;
83 * an encoded box part, the byte @, and a domain; and
84 * the byte >.
85 *
86 * It represents an Internet mail address, given by concatenating
87 * the string represented by the encoded box part, the byte @,
88 * and the domain. For example, the encoded addresses
89 * <God@heaven.af.mil>
90 * <\God@heaven.af.mil>
91 * <"God"@heaven.af.mil>
92 * <@gateway.af.mil,@uucp.local:"\G\o\d"@heaven.af.mil>
93 * all represent the Internet mail address "God@heaven.af.mil".
94 */
95
Denis Vlasenko239d06b2008-11-06 23:42:42 +000096#include "libbb.h"
97#include "mail.h"
98
Vladimir Dronnikov944d2752009-10-15 23:50:48 +020099// limit maximum allowed number of headers to prevent overflows.
100// set to 0 to not limit
101#define MAX_HEADERS 256
102
Denys Vlasenko5707b522010-12-20 05:12:39 +0100103static void send_r_n(const char *s)
104{
105 if (verbose)
106 bb_error_msg("send:'%s'", s);
107 printf("%s\r\n", s);
108}
109
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000110static int smtp_checkp(const char *fmt, const char *param, int code)
111{
112 char *answer;
Denys Vlasenko5707b522010-12-20 05:12:39 +0100113 char *msg = send_mail_command(fmt, param);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000114 // read stdin
Denys Vlasenko5707b522010-12-20 05:12:39 +0100115 // if the string has a form NNN- -- read next string. E.g. EHLO response
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000116 // parse first bytes to a number
117 // if code = -1 then just return this number
118 // if code != -1 then checks whether the number equals the code
119 // if not equal -> die saying msg
Denys Vlasenko5707b522010-12-20 05:12:39 +0100120 while ((answer = xmalloc_fgetline(stdin)) != NULL) {
Denys Vlasenko51d714c2010-12-20 12:19:46 +0100121 if (verbose)
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200122 bb_error_msg("recv:'%.*s'", (int)(strchrnul(answer, '\r') - answer), answer);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000123 if (strlen(answer) <= 3 || '-' != answer[3])
124 break;
Denys Vlasenko5707b522010-12-20 05:12:39 +0100125 free(answer);
126 }
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000127 if (answer) {
128 int n = atoi(answer);
129 if (timeout)
130 alarm(0);
131 free(answer);
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200132 if (-1 == code || n == code) {
133 free(msg);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000134 return n;
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200135 }
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000136 }
137 bb_error_msg_and_die("%s failed", msg);
138}
139
140static int smtp_check(const char *fmt, int code)
141{
142 return smtp_checkp(fmt, NULL, code);
143}
144
145// strip argument of bad chars
146static char *sane_address(char *str)
147{
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100148 char *s;
Aaro Koskinen14285d12013-02-25 00:45:06 +0200149
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100150 trim(str);
151 s = str;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000152 while (*s) {
Denys Vlasenkoc39ee042017-02-12 21:57:22 +0100153 if (!isalnum(*s) && !strchr("+_-.@", *s)) {
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100154 bb_error_msg("bad address '%s'", str);
155 /* returning "": */
156 str[0] = '\0';
157 return str;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000158 }
159 s++;
160 }
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000161 return str;
162}
163
Aaro Koskinen06ad9642013-02-25 00:45:08 +0200164// check for an address inside angle brackets, if not found fall back to normal
165static char *angle_address(char *str)
166{
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100167 char *s, *e;
Aaro Koskinen06ad9642013-02-25 00:45:08 +0200168
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100169 trim(str);
170 e = last_char_is(str, '>');
171 if (e) {
172 s = strrchr(str, '<');
173 if (s) {
174 *e = '\0';
175 str = s + 1;
176 }
177 }
178 return sane_address(str);
Aaro Koskinen06ad9642013-02-25 00:45:08 +0200179}
180
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000181static void rcptto(const char *s)
182{
Aaro Koskinen14285d12013-02-25 00:45:06 +0200183 if (!*s)
184 return;
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200185 // N.B. we don't die if recipient is rejected, for the other recipients may be accepted
186 if (250 != smtp_checkp("RCPT TO:<%s>", s, -1))
187 bb_error_msg("Bad recipient: <%s>", s);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000188}
189
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200190// send to a list of comma separated addresses
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100191static void rcptto_list(const char *list)
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200192{
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100193 char *str = xstrdup(list);
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200194 char *s = str;
195 char prev = 0;
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100196 int in_quote = 0;
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200197
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100198 while (*s) {
199 char ch = *s++;
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200200
201 if (ch == '"' && prev != '\\') {
202 in_quote = !in_quote;
203 } else if (!in_quote && ch == ',') {
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100204 s[-1] = '\0';
205 rcptto(angle_address(str));
206 str = s;
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200207 }
208 prev = ch;
209 }
210 if (prev != ',')
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100211 rcptto(angle_address(str));
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200212 free(str);
213}
214
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000215int sendmail_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
216int sendmail_main(int argc UNUSED_PARAM, char **argv)
217{
Denys Vlasenkob9f56e82016-09-07 13:16:33 +0200218 char *opt_connect;
Denys Vlasenko07f417b2014-02-05 15:01:39 +0100219 char *opt_from = NULL;
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000220 char *s;
221 llist_t *list = NULL;
Ron Yorston576b1d32012-04-28 17:04:19 +0200222 char *host = sane_address(safe_gethostname());
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200223 unsigned nheaders = 0;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000224 int code;
Aaro Koskinen236f2222013-02-25 00:45:10 +0200225 enum {
226 HDR_OTHER = 0,
227 HDR_TOCC,
228 HDR_BCC,
229 } last_hdr = 0;
230 int check_hdr;
Aaro Koskinen4a732222013-02-25 00:45:11 +0200231 int has_to = 0;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000232
233 enum {
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000234 //--- standard options
235 OPT_t = 1 << 0, // read message for recipients, append them to those on cmdline
236 OPT_f = 1 << 1, // sender address
237 OPT_o = 1 << 2, // various options. -oi IMPLIED! others are IGNORED!
Vladimir Dronnikovb618dba2009-10-04 01:34:54 +0200238 OPT_i = 1 << 3, // IMPLIED!
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000239 //--- BB specific options
Vladimir Dronnikovb618dba2009-10-04 01:34:54 +0200240 OPT_w = 1 << 4, // network timeout
241 OPT_H = 1 << 5, // use external connection helper
242 OPT_S = 1 << 6, // specify connection string
243 OPT_a = 1 << 7, // authentication tokens
Denys Vlasenko5707b522010-12-20 05:12:39 +0100244 OPT_v = 1 << 8, // verbosity
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000245 };
246
247 // init global variables
248 INIT_G();
249
Denys Vlasenkob9f56e82016-09-07 13:16:33 +0200250 // default HOST[:PORT] is $SMTPHOST, or localhost
251 opt_connect = getenv("SMTPHOST");
252 if (!opt_connect)
253 opt_connect = (char *)"127.0.0.1";
254
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000255 // save initial stdin since body is piped!
256 xdup2(STDIN_FILENO, 3);
Denys Vlasenkoa7ccdee2009-11-15 23:28:11 +0100257 G.fp0 = xfdopen_for_read(3);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000258
259 // parse options
Denys Vlasenko07f417b2014-02-05 15:01:39 +0100260 // -v is a counter, -H and -S are mutually exclusive, -a is a list
Denys Vlasenko237bedd2016-07-06 21:58:02 +0200261 opt_complementary = "vv:H--S:S--H";
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000262 // N.B. since -H and -S are mutually exclusive they do not interfere in opt_connect
263 // -a is for ssmtp (http://downloads.openwrt.org/people/nico/man/man8/ssmtp.8.html) compatibility,
264 // it is still under development.
Denys Vlasenko237bedd2016-07-06 21:58:02 +0200265 opts = getopt32(argv, "tf:o:iw:+H:S:a:*:v", &opt_from, NULL,
Denys Vlasenko5707b522010-12-20 05:12:39 +0100266 &timeout, &opt_connect, &opt_connect, &list, &verbose);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000267 //argc -= optind;
268 argv += optind;
269
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000270 // process -a[upm]<token> options
271 if ((opts & OPT_a) && !list)
272 bb_show_usage();
273 while (list) {
274 char *a = (char *) llist_pop(&list);
275 if ('u' == a[0])
276 G.user = xstrdup(a+1);
277 if ('p' == a[0])
278 G.pass = xstrdup(a+1);
279 // N.B. we support only AUTH LOGIN so far
280 //if ('m' == a[0])
281 // G.method = xstrdup(a+1);
282 }
283 // N.B. list == NULL here
Denys Vlasenko76b680c2016-03-30 16:04:37 +0200284 //bb_error_msg("OPT[%x] AU[%s], AP[%s], AM[%s], ARGV[%s]", opts, au, ap, am, *argv);
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000285
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000286 // connect to server
287
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000288 // connection helper ordered? ->
289 if (opts & OPT_H) {
Denys Vlasenkob9f56e82016-09-07 13:16:33 +0200290 const char *delay;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000291 const char *args[] = { "sh", "-c", opt_connect, NULL };
292 // plug it in
293 launch_helper(args);
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200294 // Now:
295 // our stdout will go to helper's stdin,
296 // helper's stdout will be available on our stdin.
297
298 // Wait for initial server message.
299 // If helper (such as openssl) invokes STARTTLS, the initial 220
300 // is swallowed by helper (and not repeated after TLS is initiated).
301 // We will send NOOP cmd to server and check the response.
302 // We should get 220+250 on plain connection, 250 on STARTTLSed session.
303 //
304 // The problem here is some servers delay initial 220 message,
305 // and consider client to be a spammer if it starts sending cmds
306 // before 220 reached it. The code below is unsafe in this regard:
307 // in non-STARTTLSed case, we potentially send NOOP before 220
308 // is sent by server.
Denys Vlasenkob9f56e82016-09-07 13:16:33 +0200309 //
310 // If $SMTP_ANTISPAM_DELAY is set, we pause before sending NOOP.
311 //
312 delay = getenv("SMTP_ANTISPAM_DELAY");
313 if (delay)
314 sleep(atoi(delay));
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200315 code = smtp_check("NOOP", -1);
316 if (code == 220)
317 // we got 220 - this is not STARTTLSed connection,
318 // eat 250 response to our NOOP
319 smtp_check(NULL, 250);
320 else
321 if (code != 250)
322 bb_error_msg_and_die("SMTP init failed");
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000323 } else {
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200324 // vanilla connection
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000325 int fd;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000326 fd = create_and_connect_stream_or_die(opt_connect, 25);
327 // and make ourselves a simple IO filter
328 xmove_fd(fd, STDIN_FILENO);
329 xdup2(STDIN_FILENO, STDOUT_FILENO);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000330
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200331 // Wait for initial server 220 message
332 smtp_check(NULL, 220);
333 }
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000334
335 // we should start with modern EHLO
Ron Yorston576b1d32012-04-28 17:04:19 +0200336 if (250 != smtp_checkp("EHLO %s", host, -1))
337 smtp_checkp("HELO %s", host, 250);
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000338
339 // perform authentication
340 if (opts & OPT_a) {
341 smtp_check("AUTH LOGIN", 334);
342 // we must read credentials unless they are given via -a[up] options
343 if (!G.user || !G.pass)
344 get_cred_or_die(4);
345 encode_base64(NULL, G.user, NULL);
346 smtp_check("", 334);
347 encode_base64(NULL, G.pass, NULL);
348 smtp_check("", 235);
349 }
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000350
351 // set sender
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200352 // N.B. we have here a very loosely defined algorythm
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000353 // since sendmail historically offers no means to specify secrets on cmdline.
354 // 1) server can require no authentication ->
355 // we must just provide a (possibly fake) reply address.
356 // 2) server can require AUTH ->
357 // we must provide valid username and password along with a (possibly fake) reply address.
358 // For the sake of security username and password are to be read either from console or from a secured file.
359 // Since reading from console may defeat usability, the solution is either to read from a predefined
360 // file descriptor (e.g. 4), or again from a secured file.
361
Denys Vlasenko07f417b2014-02-05 15:01:39 +0100362 // got no sender address? use auth name, then UID username as a last resort
363 if (!opt_from) {
Kaarle Ritvanen4e03d412014-02-09 09:49:36 +0100364 opt_from = xasprintf("%s@%s",
365 G.user ? G.user : xuid2uname(getuid()),
366 xgethostbyname(host)->h_name);
Denys Vlasenko07f417b2014-02-05 15:01:39 +0100367 }
Kaarle Ritvanen4e03d412014-02-09 09:49:36 +0100368 free(host);
Denys Vlasenko07f417b2014-02-05 15:01:39 +0100369
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000370 smtp_checkp("MAIL FROM:<%s>", opt_from, 250);
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000371
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000372 // process message
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000373
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000374 // read recipients from message and add them to those given on cmdline.
375 // this means we scan stdin for To:, Cc:, Bcc: lines until an empty line
376 // and then use the rest of stdin as message body
377 code = 0; // set "analyze headers" mode
378 while ((s = xmalloc_fgetline(G.fp0)) != NULL) {
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200379 dump:
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000380 // put message lines doubling leading dots
381 if (code) {
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000382 // escape leading dots
383 // N.B. this feature is implied even if no -i (-oi) switch given
384 // N.B. we need to escape the leading dot regardless of
385 // whether it is single or not character on the line
386 if ('.' == s[0] /*&& '\0' == s[1] */)
Denys Vlasenkod60752f2015-10-07 22:42:45 +0200387 bb_putchar('.');
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000388 // dump read line
Denys Vlasenko5707b522010-12-20 05:12:39 +0100389 send_r_n(s);
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000390 free(s);
391 continue;
392 }
393
394 // analyze headers
395 // To: or Cc: headers add recipients
Denys Vlasenkoa42f5302013-03-18 18:47:16 +0100396 check_hdr = (0 == strncasecmp("To:", s, 3));
Aaro Koskinen4a732222013-02-25 00:45:11 +0200397 has_to |= check_hdr;
Denys Vlasenko41fea012011-11-18 22:25:35 +0100398 if (opts & OPT_t) {
Aaro Koskinen4a732222013-02-25 00:45:11 +0200399 if (check_hdr || 0 == strncasecmp("Bcc:" + 1, s, 3)) {
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200400 rcptto_list(s+3);
Aaro Koskinen236f2222013-02-25 00:45:10 +0200401 last_hdr = HDR_TOCC;
Denys Vlasenko41fea012011-11-18 22:25:35 +0100402 goto addheader;
403 }
404 // Bcc: header adds blind copy (hidden) recipient
405 if (0 == strncasecmp("Bcc:", s, 4)) {
Aaro Koskinena8ba0a02013-02-25 00:45:09 +0200406 rcptto_list(s+4);
Denys Vlasenko41fea012011-11-18 22:25:35 +0100407 free(s);
Aaro Koskinen236f2222013-02-25 00:45:10 +0200408 last_hdr = HDR_BCC;
Denys Vlasenko41fea012011-11-18 22:25:35 +0100409 continue; // N.B. Bcc: vanishes from headers!
410 }
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200411 }
Aaro Koskinene82bfef2013-02-25 00:45:12 +0200412 check_hdr = (list && isspace(s[0]));
Aaro Koskinen236f2222013-02-25 00:45:10 +0200413 if (strchr(s, ':') || check_hdr) {
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200414 // other headers go verbatim
415 // N.B. RFC2822 2.2.3 "Long Header Fields" allows for headers to occupy several lines.
416 // Continuation is denoted by prefixing additional lines with whitespace(s).
417 // Thanks (stefan.seyfried at googlemail.com) for pointing this out.
Aaro Koskinen236f2222013-02-25 00:45:10 +0200418 if (check_hdr && last_hdr != HDR_OTHER) {
419 rcptto_list(s+1);
420 if (last_hdr == HDR_BCC)
421 continue;
422 // N.B. Bcc: vanishes from headers!
423 } else {
424 last_hdr = HDR_OTHER;
425 }
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200426 addheader:
Vladimir Dronnikov8dbe9bb2009-10-17 03:35:10 +0200427 // N.B. we allow MAX_HEADERS generic headers at most to prevent attacks
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200428 if (MAX_HEADERS && ++nheaders >= MAX_HEADERS)
429 goto bail;
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000430 llist_add_to_end(&list, s);
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000431 } else {
Denys Vlasenko34c469a2011-09-18 03:01:49 +0200432 // a line without ":" (an empty line too, by definition) doesn't look like a valid header
433 // so stop "analyze headers" mode
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200434 reenter:
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000435 // put recipients specified on cmdline
Aaro Koskinene82bfef2013-02-25 00:45:12 +0200436 check_hdr = 1;
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000437 while (*argv) {
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200438 char *t = sane_address(*argv);
439 rcptto(t);
440 //if (MAX_HEADERS && ++nheaders >= MAX_HEADERS)
441 // goto bail;
Aaro Koskinene82bfef2013-02-25 00:45:12 +0200442 if (!has_to) {
443 const char *hdr;
444
445 if (check_hdr && argv[1])
446 hdr = "To: %s,";
447 else if (check_hdr)
448 hdr = "To: %s";
449 else if (argv[1])
450 hdr = "To: %s," + 3;
451 else
452 hdr = "To: %s" + 3;
Aaro Koskinen4a732222013-02-25 00:45:11 +0200453 llist_add_to_end(&list,
Aaro Koskinene82bfef2013-02-25 00:45:12 +0200454 xasprintf(hdr, t));
455 check_hdr = 0;
456 }
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000457 argv++;
458 }
459 // enter "put message" mode
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200460 // N.B. DATA fails iff no recipients were accepted (or even provided)
461 // in this case just bail out gracefully
462 if (354 != smtp_check("DATA", -1))
463 goto bail;
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000464 // dump the headers
465 while (list) {
Denys Vlasenko5707b522010-12-20 05:12:39 +0100466 send_r_n((char *) llist_pop(&list));
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000467 }
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000468 // stop analyzing headers
469 code++;
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200470 // N.B. !s means: we read nothing, and nothing to be read in the future.
471 // just dump empty line and break the loop
472 if (!s) {
Denys Vlasenko5707b522010-12-20 05:12:39 +0100473 send_r_n("");
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200474 break;
475 }
476 // go dump message body
477 // N.B. "s" already contains the first non-header line, so pretend we read it from input
478 goto dump;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000479 }
480 }
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200481 // odd case: we didn't stop "analyze headers" mode -> message body is empty. Reenter the loop
482 // N.B. after reenter code will be > 0
483 if (!code)
484 goto reenter;
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000485
Denis Vlasenko88b8f0a2009-03-31 23:41:53 +0000486 // finalize the message
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000487 smtp_check(".", 250);
Vladimir Dronnikov944d2752009-10-15 23:50:48 +0200488 bail:
Denis Vlasenko239d06b2008-11-06 23:42:42 +0000489 // ... and say goodbye
490 smtp_check("QUIT", 221);
491 // cleanup
492 if (ENABLE_FEATURE_CLEAN_UP)
493 fclose(G.fp0);
494
495 return EXIT_SUCCESS;
496}