Details | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
1 | magnus | 1 | /* Spamassassin in local_scan by Marc MERLIN <marc_soft@merlins.org> */ |
2 | /* $Id: sa-exim.c,v 1.71 2005/03/08 20:39:51 marcmerlin Exp $ */ |
||
3 | /* |
||
4 | |||
5 | The inline comments and minidocs were moved to the distribution tarball |
||
6 | |||
7 | You can get the up to date version of this file and full tarball here: |
||
8 | http://sa-exim.sourceforge.net/ |
||
9 | http://marc.merlins.org/linux/exim/sa.html |
||
10 | The discussion list is here: |
||
11 | http://lists.merlins.org/lists/listinfo/sa-exim |
||
12 | */ |
||
13 | |||
14 | |||
15 | |||
16 | #include <stdio.h> |
||
17 | #include <unistd.h> |
||
18 | #include <fcntl.h> |
||
19 | #include <errno.h> |
||
20 | #include <string.h> |
||
21 | #include <stdlib.h> |
||
22 | #include <time.h> |
||
23 | #include <ctype.h> |
||
24 | #include <signal.h> |
||
25 | #include <setjmp.h> |
||
26 | #include <sys/wait.h> |
||
27 | #include <sys/types.h> |
||
28 | #include <sys/stat.h> |
||
29 | #include "sa-exim.h" |
||
30 | |||
31 | /* Exim includes */ |
||
32 | #include "local_scan.h" |
||
33 | extern FILE *smtp_out; /* Exim's incoming SMTP output file */ |
||
34 | extern int body_linecount; /* Line count in body */ |
||
35 | extern uschar *primary_hostname; |
||
36 | |||
37 | #ifdef DLOPEN_LOCAL_SCAN |
||
38 | |||
39 | /* Karsten Engelke <me@kaeng.org> says this is missing on openbsd */ |
||
40 | #ifndef RTLD_NOW |
||
41 | #define RTLD_NOW 0x002 |
||
42 | #endif |
||
43 | |||
44 | /* Return the verion of the local_scan ABI, if being compiled as a .so */ |
||
45 | int local_scan_version_major(void) |
||
46 | { |
||
47 | return LOCAL_SCAN_ABI_VERSION_MAJOR; |
||
48 | } |
||
49 | |||
50 | int local_scan_version_minor(void) |
||
51 | { |
||
52 | return LOCAL_SCAN_ABI_VERSION_MINOR; |
||
53 | } |
||
54 | |||
55 | /* Left over for compatilibility with old patched exims that didn't have |
||
56 | a version number with minor an major. Keep in mind that it will not work |
||
57 | with older exim4s (I think 4.11 is required) */ |
||
58 | #ifdef DLOPEN_LOCAL_SCAN_OLD_API |
||
59 | int local_scan_version(void) |
||
60 | { |
||
61 | return 1; |
||
62 | } |
||
63 | #endif |
||
64 | #endif |
||
65 | |||
66 | #ifndef SAFEMESGIDCHARS |
||
67 | #define SAFEMESGIDCHARS "!#%( )*+,-.0123456789:<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_abcdefghijklmnopqrstuvwxyz{|}~"; |
||
68 | #endif |
||
69 | |||
70 | |||
71 | /******************************/ |
||
72 | /* Compile time config values */ |
||
73 | /******************************/ |
||
74 | #ifndef SPAMC_LOCATION |
||
75 | #define SPAMC_LOCATION "/usr/bin/spamc" |
||
76 | #endif |
||
77 | |||
78 | #ifndef SPAMASSASSIN_CONF |
||
79 | #define SPAMASSASSIN_CONF "/etc/exim4/sa-exim.conf" |
||
80 | #endif |
||
81 | static const char conffile[]=SPAMASSASSIN_CONF; |
||
82 | |||
83 | |||
84 | /********************/ |
||
85 | /* Code starts here */ |
||
86 | /********************/ |
||
87 | static const char nospamstatus[]="<error finding status>"; |
||
88 | |||
89 | static char *buffera[4096]; |
||
90 | static char *buffer=(char *)buffera; |
||
91 | static int SAEximDebug=0; |
||
92 | static int SAPrependArchiveWithFrom=1; |
||
93 | static jmp_buf jmp_env; |
||
94 | |||
95 | static char *where="Error handler called without error string"; |
||
96 | static int line=-1; |
||
97 | static char *panicerror; |
||
98 | |||
99 | #define MIN(a,b) (a<b?a:b) |
||
100 | |||
101 | #define CHECKERR(mret, mwhere, mline) \ |
||
102 | if (mret < 0) \ |
||
103 | { \ |
||
104 | where=mwhere; \ |
||
105 | line=mline; \ |
||
106 | goto errexit; \ |
||
107 | } |
||
108 | |||
109 | #define PANIC(merror) \ |
||
110 | panicerror=merror; \ |
||
111 | goto panicexit; |
||
112 | |||
113 | |||
114 | static void alarm_handler(int sig) |
||
115 | { |
||
116 | sig = sig; /* Keep picky compilers happy */ |
||
117 | longjmp(jmp_env, 1); |
||
118 | } |
||
119 | |||
120 | |||
121 | /* Comparing header lines isn't fun, especially since the comparison has to |
||
122 | be caseless, so we offload this to this function |
||
123 | You can scan on partial headers, just give the root to scan for |
||
124 | Return 1 if the header was found, 0 otherwise */ |
||
125 | static int compare_header(char *buffertocompare, char *referenceheader) |
||
126 | { |
||
127 | int idx; |
||
128 | int same=1; |
||
129 | |||
130 | for (idx=0; idx<strlen(referenceheader); idx++) |
||
131 | { |
||
132 | if ( tolower(referenceheader[idx]) != tolower(buffertocompare[idx]) ) |
||
133 | { |
||
134 | same=0; |
||
135 | break; |
||
136 | } |
||
137 | } |
||
138 | |||
139 | if (SAEximDebug > 7) |
||
140 | { |
||
141 | if (same) |
||
142 | { |
||
143 | log_write(0, LOG_MAIN, "SA: Debug8: Found %s in %s", referenceheader, buffertocompare); |
||
144 | } |
||
145 | else if (SAEximDebug > 8) |
||
146 | { |
||
147 | log_write(0, LOG_MAIN, "SA: Debug9: Did not find %s in %s", referenceheader, buffertocompare); |
||
148 | } |
||
149 | } |
||
150 | |||
151 | return same; |
||
152 | } |
||
153 | |||
154 | |||
155 | /* returns a header from a buffer line */ |
||
156 | static char *get_header(char *buffer) |
||
157 | { |
||
158 | char *start; |
||
159 | char *end; |
||
160 | char *header; |
||
161 | |||
162 | start=buffer; |
||
163 | end=strstr(buffer, ":"); |
||
164 | |||
165 | header=string_copyn(start, end-start); |
||
166 | |||
167 | if (SAEximDebug>5) |
||
168 | { |
||
169 | log_write(0, LOG_MAIN, "SA: Debug6: Extracted header %s in buffer %s", header, buffer); |
||
170 | } |
||
171 | |||
172 | return header; |
||
173 | } |
||
174 | |||
175 | |||
176 | /* Rejected mails can be archived in a spool directory */ |
||
177 | /* filename will contain a double / before the filename, I prefer two to none */ |
||
178 | static int savemail(int readfd, off_t fdstart, char *dir, char *dirvarname, |
||
179 | char *filename, int SAmaxarchivebody, char *condition) |
||
180 | { |
||
181 | header_line *hl; |
||
182 | int writefd=0; |
||
183 | int ret; |
||
184 | ssize_t stret; |
||
185 | off_t otret; |
||
186 | char *expand; |
||
187 | char *fake_env_from; |
||
188 | int towrite; |
||
189 | int chunk; |
||
190 | struct stat bufst; |
||
191 | |||
192 | if (dir == NULL) |
||
193 | { |
||
194 | if (SAEximDebug>4) |
||
195 | { |
||
196 | log_write(0, LOG_MAIN, "SA: Debug5: Not saving message because %s in undefined", dirvarname); |
||
197 | } |
||
198 | return 0; |
||
199 | } |
||
200 | |||
201 | if (condition[0] != '1' || condition[1] != 0) |
||
202 | { |
||
203 | expand=expand_string(condition); |
||
204 | if (expand == NULL) |
||
205 | { |
||
206 | /* Can't use PANIC within this function :( */ |
||
207 | CHECKERR(-1, string_sprintf("savemail condition expansion failure on %s", condition), __LINE__ - 1); |
||
208 | } |
||
209 | |||
210 | if (SAEximDebug > 2) |
||
211 | { |
||
212 | log_write(0, LOG_MAIN, "SA: Debug3: savemail condition expand returned: '%s'", expand); |
||
213 | } |
||
214 | |||
215 | if (expand[0] == 0 || (expand[0] == '0' && expand[1] == 0)) |
||
216 | { |
||
217 | if (SAEximDebug > 1) |
||
218 | { |
||
219 | log_write(0, LOG_MAIN, "SA: Debug2: savemail condition expanded to false, not saving message to disk"); |
||
220 | } |
||
221 | return 0; |
||
222 | } |
||
223 | } |
||
224 | |||
225 | if (SAEximDebug) |
||
226 | { |
||
227 | log_write(0, LOG_MAIN, "SA: Debug: Writing message to %s/new/%s", dir, filename); |
||
228 | |||
229 | } |
||
230 | |||
231 | if (stat(string_sprintf("%s/new/", dir), &bufst) == -1) |
||
232 | { |
||
233 | log_write(0, LOG_MAIN, "SA: Notice: creating maildir tree in %s", dir); |
||
234 | if (stat(dir, &bufst) == -1) |
||
235 | { |
||
236 | ret=mkdir (dir, 0770); |
||
237 | CHECKERR(ret,string_sprintf("mkdir %s", dir),__LINE__); |
||
238 | } |
||
239 | ret=mkdir (string_sprintf("%s/new", dir), 0770); |
||
240 | CHECKERR(ret,string_sprintf("mkdir %s/new/", dir),__LINE__); |
||
241 | ret=mkdir (string_sprintf("%s/cur", dir), 0770); |
||
242 | CHECKERR(ret,string_sprintf("mkdir %s/cur/", dir),__LINE__); |
||
243 | ret=mkdir (string_sprintf("%s/tmp", dir), 0770); |
||
244 | CHECKERR(ret,string_sprintf("mkdir %s/tmp/", dir),__LINE__); |
||
245 | } |
||
246 | |||
247 | /* Let's not worry about you receiving two spams at the same second |
||
248 | * with the same message ID. If you do, the second one will overwrite |
||
249 | * the first one */ |
||
250 | writefd=creat(string_sprintf("%s/new/%s", dir, filename), S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH); |
||
251 | CHECKERR(writefd, string_sprintf("creat %s/new/%s", dir, filename),__LINE__); |
||
252 | |||
253 | /* make the file look like a valid mbox -- idea from dman */ |
||
254 | /* Although now that we use maildir format, this isn't really necessary */ |
||
255 | /* Richard Lithvall made this an option */ |
||
256 | if(SAPrependArchiveWithFrom == 1) |
||
257 | { |
||
258 | fake_env_from=string_sprintf("From %s Thu Jan 1 00:00:01 1970\n",sender_address); |
||
259 | stret=write(writefd, fake_env_from, strlen(fake_env_from)); |
||
260 | CHECKERR(stret,string_sprintf("'From ' line write in %s", filename),__LINE__); |
||
261 | } |
||
262 | |||
263 | /* First we need to get the header lines from exim, and then we can read |
||
264 | the body from writefd */ |
||
265 | hl=header_list; |
||
266 | while (hl != NULL) |
||
267 | { |
||
268 | /* type '*' means the header is internal, don't print it */ |
||
269 | if (hl->type == '*') |
||
270 | { |
||
271 | hl=hl->next; |
||
272 | continue; |
||
273 | } |
||
274 | stret=write(writefd,hl->text,strlen(hl->text)); |
||
275 | CHECKERR(stret,string_sprintf("header line write in %s", filename),__LINE__); |
||
276 | hl=hl->next; |
||
277 | } |
||
278 | stret=write(writefd,"\n",1); |
||
279 | CHECKERR(stret,string_sprintf("header separation write in %s", filename),__LINE__); |
||
280 | |||
281 | /* Now copy the body to the save file */ |
||
282 | /* we already read from readfd, so we need to reset it */ |
||
283 | otret=lseek(readfd, fdstart, SEEK_SET); |
||
284 | CHECKERR(otret, "lseek reset on spooled message", __LINE__); |
||
285 | |||
286 | if (SAEximDebug > 8) |
||
287 | { |
||
288 | log_write(0, LOG_MAIN, "SA: Debug9: Archive body write starts: writing up to %d bytes in %d byte blocks", SAmaxarchivebody, sizeof(buffera)); |
||
289 | } |
||
290 | |||
291 | towrite=SAmaxarchivebody; |
||
292 | chunk=0; |
||
293 | while (towrite>0 && (stret=read(readfd, buffer, MIN(sizeof(buffera), towrite))) > 0) |
||
294 | { |
||
295 | chunk++; |
||
296 | if (SAEximDebug > 8) |
||
297 | { |
||
298 | log_write(0, LOG_MAIN, "SA: Debug9: Processing archive body chunk %d (read %.0f, and %.0f can still be written)", chunk, (double)stret, (double)towrite); |
||
299 | } |
||
300 | towrite-=stret; |
||
301 | stret=write(writefd, buffer, stret); |
||
302 | CHECKERR(stret,string_sprintf("body write in %s", filename),__LINE__); |
||
303 | } |
||
304 | CHECKERR(stret, "read body for archival", __LINE__ - 8); |
||
305 | ret=close(writefd); |
||
306 | CHECKERR(ret, "Closing spooled message",__LINE__); |
||
307 | return 0; |
||
308 | |||
309 | /* catch the global errexit, clean up, and return the error up */ |
||
310 | errexit: |
||
311 | close(writefd); |
||
312 | return -1; |
||
313 | } |
||
314 | |||
315 | /* |
||
316 | * let's add the X-SA-Exim-Connect-IP, X-SA-Exim-Rcpt-To, and |
||
317 | * X-SA-Exim-Mail-From headers. |
||
318 | * Those are all required by the greylisting with SA implementation |
||
319 | * And From/Rcpt-To can also be used for personalized SA rules |
||
320 | */ |
||
321 | void AddSAEheaders(char *rcptlist, int SAmaxrcptlistlength) |
||
322 | { |
||
323 | if (sender_host_address) |
||
324 | { |
||
325 | header_add(' ', "X-SA-Exim-Connect-IP: %s\n", sender_host_address); |
||
326 | } |
||
327 | else |
||
328 | { |
||
329 | header_add(' ', "X-SA-Exim-Connect-IP: <locally generated>\n"); |
||
330 | } |
||
331 | |||
332 | /* Create a mega envelope-to header with all the recipients */ |
||
333 | /* Note, if you consider this a privacy violation, you can remove the header |
||
334 | * in exim's system filter. |
||
335 | * This is very useful to see who a message was really sent to, and can |
||
336 | * be used by Spamassassin to do additional scoring */ |
||
337 | if (strlen(rcptlist) <= SAmaxrcptlistlength) |
||
338 | { |
||
339 | header_add(' ', "X-SA-Exim-Rcpt-To: %s\n", rcptlist); |
||
340 | } |
||
341 | /* Therefore SAmaxrcptlistlength set to 0 disables the header completely */ |
||
342 | else if (SAmaxrcptlistlength) |
||
343 | { |
||
344 | header_add(' ', "X-SA-Exim-Rcpt-To: too long (recipient list exceeded maximum allowed size of %d bytes)\n", SAmaxrcptlistlength); |
||
345 | } |
||
346 | |||
347 | header_add(' ', "X-SA-Exim-Mail-From: %s\n", sender_address); |
||
348 | } |
||
349 | |||
350 | void RemoveHeaders(char *headername) |
||
351 | { |
||
352 | header_line *hl; |
||
353 | |||
354 | /* Remove headers that SA can set */ |
||
355 | hl=header_list; |
||
356 | while (hl != NULL) |
||
357 | { |
||
358 | |||
359 | /* type '*' means the header is internal or deleted */ |
||
360 | if (hl->type == '*') |
||
361 | { |
||
362 | hl=hl->next; |
||
363 | continue; |
||
364 | } |
||
365 | |||
366 | /* Strip all SA and SA-Exim headers on incoming mail */ |
||
367 | if ( compare_header((char *)hl->text, headername) ) |
||
368 | { |
||
369 | if (SAEximDebug > 2) |
||
370 | { |
||
371 | log_write(0, LOG_MAIN, "SA: Debug3: removing header %s on incoming mail '%s'", headername, (char *)hl->text); |
||
372 | } |
||
373 | hl->type = '*'; |
||
374 | } |
||
375 | hl=hl->next; |
||
376 | } |
||
377 | } |
||
378 | |||
379 | |||
380 | /* |
||
381 | * Headers can be multi-line (in theory all of them can I think). Parsing them |
||
382 | * is a little more work than a simple line scan, so we're off-loading this to |
||
383 | * a function |
||
384 | */ |
||
385 | int parsemlheader(char *buffer, FILE *readfh, char *headername, char **header) |
||
386 | { |
||
387 | header_line *hl; |
||
388 | char *dummy; |
||
389 | char *foundheadername; |
||
390 | |||
391 | if (SAEximDebug > 4) |
||
392 | { |
||
393 | log_write(0, LOG_MAIN, "SA: Debug5: looking for header %s", headername); |
||
394 | } |
||
395 | |||
396 | if (header == NULL) |
||
397 | { |
||
398 | header=&dummy; |
||
399 | } |
||
400 | |||
401 | if (compare_header(buffer, string_sprintf("%s", headername))) |
||
402 | { |
||
403 | *header=string_copy(buffer); |
||
404 | |||
405 | /* Read the next line(s) in case this is a multi-line header */ |
||
406 | while ((fgets((char *)buffer,sizeof(buffera),readfh)) != NULL) |
||
407 | { |
||
408 | /* Remove trailing newline */ |
||
409 | if (buffer[strlen(buffer)-1] == '\n') |
||
410 | { |
||
411 | buffer[strlen(buffer)-1]=0; |
||
412 | } |
||
413 | if (SAEximDebug > 5) |
||
414 | { |
||
415 | log_write(0, LOG_MAIN, "SA: Debug6: while parsing header %s, read %s", headername, buffer); |
||
416 | } |
||
417 | /* concatenated lines only start with space or tab. right? */ |
||
418 | if (buffer[0] != ' ' && buffer[0] != '\t') |
||
419 | { |
||
420 | break; |
||
421 | } |
||
422 | |||
423 | /* Guard against humongous header lines */ |
||
424 | if (strlen(*header) < 8000) |
||
425 | { |
||
426 | /* Slight waste of memory here, oh well... */ |
||
427 | *header=string_sprintf("%s\n%s", *header, buffer); |
||
428 | } |
||
429 | else |
||
430 | { |
||
431 | log_write(0, LOG_MAIN, "SA: Warning: while parsing header %s, ignoring the following trailing line due to header size overflow: %s", headername, buffer); |
||
432 | |||
433 | } |
||
434 | } |
||
435 | if (SAEximDebug > 5) |
||
436 | { |
||
437 | log_write(0, LOG_MAIN, "SA: Debug6: header pieced up %s as: '%s'", headername, *header); |
||
438 | } |
||
439 | |||
440 | /* Headers need a newline at the end before being handed out to exim */ |
||
441 | /* Slight waste of memory here, oh well... */ |
||
442 | *header=string_sprintf("%s\n", *header); |
||
443 | |||
444 | foundheadername=get_header(*header); |
||
445 | |||
446 | /* Mark the former header as deleted if it's already present */ |
||
447 | /* Note that for X-Spam, it won't since we already deleted it earlier */ |
||
448 | hl=header_list; |
||
449 | while (hl != NULL) |
||
450 | { |
||
451 | /* type '*' means the header is internal or deleted */ |
||
452 | if (hl->type == '*') |
||
453 | { |
||
454 | hl=hl->next; |
||
455 | continue; |
||
456 | } |
||
457 | |||
458 | if ( compare_header((char *)hl->text, foundheadername) ) |
||
459 | { |
||
460 | if (SAEximDebug > 5) |
||
461 | { |
||
462 | log_write(0, LOG_MAIN, "SA: Debug6: removing old copy of header '%s' and replacing with new one: '%s'", (char *)hl->text, *header); |
||
463 | } |
||
464 | hl->type = '*'; |
||
465 | break; |
||
466 | } |
||
467 | hl=hl->next; |
||
468 | } |
||
469 | |||
470 | header_add(' ', "%s", *header); |
||
471 | return 1; |
||
472 | } |
||
473 | return 0; |
||
474 | } |
||
475 | |||
476 | |||
477 | char *cleanmsgid(char *msgid, char *SAsafemesgidchars) |
||
478 | { |
||
479 | char *safemesgid; |
||
480 | char *ptr; |
||
481 | |||
482 | /* In case the message-Id is too long, let's truncate it */ |
||
483 | safemesgid=string_copyn(msgid, 220); |
||
484 | ptr=safemesgid; |
||
485 | |||
486 | /* Clean Message-ID to make sure people can't write on our FS */ |
||
487 | while (*ptr) |
||
488 | { |
||
489 | /* This might be more aggressive than you want, but since you |
||
490 | * potentially have shell programs dealing with the resulting filenames |
||
491 | * let's make it a bit safer */ |
||
492 | if (strchr(SAsafemesgidchars, *ptr) == NULL) |
||
493 | { |
||
494 | *ptr='_'; |
||
495 | } |
||
496 | ptr++; |
||
497 | } |
||
498 | |||
499 | if (SAEximDebug > 1) |
||
500 | { |
||
501 | log_write(0, LOG_MAIN, "SA: Debug2: Message-Id taken from Exim and cleaned from: %s to: %s", msgid, safemesgid); |
||
502 | } |
||
503 | |||
504 | return safemesgid; |
||
505 | } |
||
506 | |||
507 | |||
508 | /* Exim calls us here, feeds us a fd on the message body, and expects a return |
||
509 | message in *return_text */ |
||
510 | int local_scan(volatile int fd, uschar **return_text) |
||
511 | { |
||
512 | #warning you should not worry about the "might be clobbered by longjmp", see source |
||
513 | int ret; |
||
514 | ssize_t stret; |
||
515 | int pid; |
||
516 | int writefd[2]; |
||
517 | int readfd[2]; |
||
518 | int i; |
||
519 | /* These are the only values that we want working after the longjmp |
||
520 | * The automatic ones can be clobbered, but we don't really care */ |
||
521 | volatile FILE *readfh; |
||
522 | volatile char *mesgfn=NULL; |
||
523 | volatile off_t fdsize; |
||
524 | volatile off_t scansize; |
||
525 | volatile off_t fdstart; |
||
526 | volatile char *rcptlist; |
||
527 | volatile void *old_sigchld; |
||
528 | char *safemesgid=NULL; |
||
529 | int isspam=0; |
||
530 | int gotsa=0; |
||
531 | int chunk; |
||
532 | off_t towrite; |
||
533 | char *mailinfo; |
||
534 | float spamvalue=0.0; |
||
535 | char *spamstatus=NULL; |
||
536 | time_t beforescan; |
||
537 | time_t afterscan; |
||
538 | time_t afterwait; |
||
539 | time_t scantime=0; |
||
540 | time_t fulltime=0; |
||
541 | struct stat stbuf; |
||
542 | |||
543 | uschar *expand; |
||
544 | header_line *hl; |
||
545 | |||
546 | static int readconffile=0; |
||
547 | static int wrotedebugenabled=0; |
||
548 | |||
549 | /* Options we read from /etc/exim4/sa-exim.conf */ |
||
550 | static char *SAspamcpath=SPAMC_LOCATION; |
||
551 | static char *SAsafemesgidchars=SAFEMESGIDCHARS |
||
552 | static char *SAspamcSockPath=NULL; |
||
553 | static char *SAspamcPort="783"; |
||
554 | static char *SAspamcHost="127.0.0.1"; |
||
555 | static char *SAEximRunCond="0"; |
||
556 | static char *SAEximRejCond="1"; |
||
557 | static int SAmaxbody=250*1024; |
||
558 | static char *SATruncBodyCond="0"; |
||
559 | static int SARewriteBody=0; |
||
560 | static int SAmaxarchivebody=20*1048576; |
||
561 | static int SAerrmaxarchivebody=1024*1048576; |
||
562 | static int SAmaxrcptlistlength=0; |
||
563 | static int SAaddSAEheaderBeforeSA=1; |
||
564 | static int SAtimeout=240; |
||
565 | static char *SAtimeoutsave=NULL; |
||
566 | static char *SAtimeoutSavCond="1"; |
||
567 | static char *SAerrorsave=NULL; |
||
568 | static char *SAerrorSavCond="1"; |
||
569 | static int SAtemprejectonerror=0; |
||
570 | static char *SAteergrube="1048576"; |
||
571 | static float SAteergrubethreshold; |
||
572 | /* This is obsolete, since SAteergrube (now a condition) can do the same */ |
||
573 | static char *SAteergrubecond="1"; |
||
574 | static int SAteergrubetime=900; |
||
575 | static char *SAteergrubeSavCond="1"; |
||
576 | static char *SAteergrubesave=NULL; |
||
577 | static int SAteergrubeoverwrite=1; |
||
578 | static char *SAdevnull="1048576"; |
||
579 | static float SAdevnullthreshold; |
||
580 | static char *SAdevnullSavCond="1"; |
||
581 | static char *SAdevnullsave=NULL; |
||
582 | static char *SApermreject="1048576"; |
||
583 | static float SApermrejectthreshold; |
||
584 | static char *SApermrejectSavCond="1"; |
||
585 | static char *SApermrejectsave=NULL; |
||
586 | static char *SAtempreject="1048576"; |
||
587 | static float SAtemprejectthreshold; |
||
588 | static char *SAtemprejectSavCond="1"; |
||
589 | static char *SAtemprejectsave=NULL; |
||
590 | static int SAtemprejectoverwrite=1; |
||
591 | static char *SAgreylistiswhitestr="GREYLIST_ISWHITE"; |
||
592 | static float SAgreylistraisetempreject=3.0; |
||
593 | static char *SAspamacceptsave=NULL; |
||
594 | static char *SAspamacceptSavCond="0"; |
||
595 | static char *SAnotspamsave=NULL; |
||
596 | static char *SAnotspamSavCond="0"; |
||
597 | /* Those variables can take a %s to show the spam info */ |
||
598 | static char *SAmsgteergrubewait="wait for more output"; |
||
599 | static char *SAmsgteergruberej="Please try again later"; |
||
600 | static char *SAmsgpermrej="Rejected"; |
||
601 | static char *SAmsgtemprej="Please try again later"; |
||
602 | /* Do not put a %s in there, or you'll segfault */ |
||
603 | static char *SAmsgerror="Temporary local error while processing message, please contact postmaster"; |
||
604 | |||
605 | /* New values we read from spamassassin */ |
||
606 | char *xspamstatus=NULL; |
||
607 | char *xspamflag=NULL; |
||
608 | |||
609 | |||
610 | /* Any error can write the faulty message to mesgfn, so we need to |
||
611 | give it a value right now. We'll set the real value later */ |
||
612 | /* message_id here comes from Exim, it's an internal disk Mesg-Id format |
||
613 | which doesn't correlate to the actual message's Mesg-Id. We shouldn't |
||
614 | need to clean it, and besides, SAsafemesgidchars hasn't been read from |
||
615 | the config file yet, but eh, safety is always a good thing, right? */ |
||
616 | safemesgid=cleanmsgid(message_id, SAsafemesgidchars); |
||
617 | mesgfn=string_sprintf("%d_%s", time(NULL), safemesgid); |
||
618 | |||
619 | /* We won't scan local messages. I think exim bypasses local_scan for a |
||
620 | * bounce generated after a locally submitted message, but better be safe */ |
||
621 | /* This is commented out now, because you can control it with SAEximRunCond |
||
622 | if (!sender_host_address) |
||
623 | { |
||
624 | return LOCAL_SCAN_ACCEPT; |
||
625 | } |
||
626 | */ |
||
627 | |||
628 | /* If you discard a mail with exim ACLs, we get 0 recipients, so let's just |
||
629 | * accept the mail, which won't matter either way since it'll get dropped |
||
630 | * (thanks to John Horne for reporting this corner case) */ |
||
631 | if (recipients_count == 0) |
||
632 | { |
||
633 | return LOCAL_SCAN_ACCEPT; |
||
634 | } |
||
635 | |||
636 | /* |
||
637 | * We keep track of whether we've alrady read the config file, but since |
||
638 | * exim spawns itself, it will get read by exim children even though you |
||
639 | * didn't restart exim. That said, after you change the config file, you |
||
640 | * should restart exim to make sure all the instances pick up the new |
||
641 | * config file |
||
642 | */ |
||
643 | if (!readconffile) |
||
644 | { |
||
645 | ret=open(conffile, 0); |
||
646 | CHECKERR(ret,string_sprintf("conf file open for %s", conffile),__LINE__); |
||
647 | readfh=fdopen(ret, "r"); |
||
648 | CHECKERR(readfh,"fdopen",__LINE__); |
||
649 | |||
650 | while ((fgets((char *)buffer, sizeof(buffera), (FILE *)readfh)) != NULL) |
||
651 | { |
||
652 | if (*buffer == '#' || *buffer == '\n' ) |
||
653 | { |
||
654 | continue; |
||
655 | } |
||
656 | |||
657 | if (*buffer != 'S' || *(buffer+1) != 'A') |
||
658 | { |
||
659 | log_write(0, LOG_MAIN, "SA: Warning: error while reading configuration file %s. Line does not begin with a SA directive: '%s', ignoring", conffile, buffer); |
||
660 | continue; |
||
661 | } |
||
662 | |||
663 | #define M_CHECKFORVAR(VAR, TYPE) \ |
||
664 | if (strstr(buffer, #VAR ": ") == buffer) \ |
||
665 | { \ |
||
666 | if (sscanf(buffer, #VAR ": " TYPE, &VAR)) \ |
||
667 | { \ |
||
668 | if (SAEximDebug > 3) \ |
||
669 | { \ |
||
670 | if (SAEximDebug && ! wrotedebugenabled) \ |
||
671 | { \ |
||
672 | log_write(0, LOG_MAIN, "SA: Debug4: Debug enabled, reading config from file %s", conffile); \ |
||
673 | wrotedebugenabled=1; \ |
||
674 | } \ |
||
675 | else \ |
||
676 | { \ |
||
677 | log_write(0, LOG_MAIN, "SA: Debug4: config read " #VAR " = " TYPE, VAR); \ |
||
678 | }\ |
||
679 | }\ |
||
680 | } \ |
||
681 | else \ |
||
682 | { \ |
||
683 | log_write(0, LOG_MAIN, "SA: Warning: error while reading configuration file %s. Can't parse value in: '%s', ignoring", conffile, buffer); \ |
||
684 | } \ |
||
685 | continue; \ |
||
686 | } |
||
687 | |||
688 | #define M_CHECKFORSTR(VAR) \ |
||
689 | if (strstr(buffer, #VAR ": ") == buffer) \ |
||
690 | { \ |
||
691 | VAR = strdup(buffer+strlen( #VAR )+2); \ |
||
692 | if (VAR == NULL) \ |
||
693 | { \ |
||
694 | log_write(0, LOG_MAIN, "SA: PANIC: malloc failed, quitting..."); \ |
||
695 | exit(-1); \ |
||
696 | } \ |
||
697 | \ |
||
698 | if (VAR[strlen(VAR)-1] == '\n') \ |
||
699 | { \ |
||
700 | VAR[strlen(VAR)-1]=0; \ |
||
701 | } \ |
||
702 | if (SAEximDebug > 3) \ |
||
703 | { \ |
||
704 | log_write(0, LOG_MAIN, "SA: Debug4: config read " #VAR " = %s", VAR); \ |
||
705 | } \ |
||
706 | continue; \ |
||
707 | } |
||
708 | |||
709 | M_CHECKFORVAR(SAEximDebug, "%d"); |
||
710 | M_CHECKFORSTR(SAspamcpath); |
||
711 | M_CHECKFORSTR(SAsafemesgidchars); |
||
712 | M_CHECKFORSTR(SAspamcSockPath); |
||
713 | M_CHECKFORSTR(SAspamcPort); |
||
714 | M_CHECKFORSTR(SAspamcHost); |
||
715 | M_CHECKFORSTR(SAEximRunCond); |
||
716 | M_CHECKFORSTR(SAEximRejCond); |
||
717 | M_CHECKFORVAR(SAmaxbody, "%d"); |
||
718 | M_CHECKFORSTR(SATruncBodyCond); |
||
719 | M_CHECKFORVAR(SARewriteBody, "%d"); |
||
720 | M_CHECKFORVAR(SAPrependArchiveWithFrom, "%d"); |
||
721 | M_CHECKFORVAR(SAmaxarchivebody, "%d"); |
||
722 | M_CHECKFORVAR(SAerrmaxarchivebody, "%d"); |
||
723 | M_CHECKFORVAR(SAmaxrcptlistlength, "%d"); |
||
724 | M_CHECKFORVAR(SAaddSAEheaderBeforeSA, "%d"); |
||
725 | M_CHECKFORVAR(SAtimeout, "%d"); |
||
726 | M_CHECKFORSTR(SAtimeoutsave); |
||
727 | M_CHECKFORSTR(SAtimeoutSavCond); |
||
728 | M_CHECKFORSTR(SAerrorsave); |
||
729 | M_CHECKFORSTR(SAerrorSavCond); |
||
730 | M_CHECKFORVAR(SAtemprejectonerror, "%d"); |
||
731 | M_CHECKFORSTR(SAteergrube); |
||
732 | M_CHECKFORSTR(SAteergrubecond); |
||
733 | M_CHECKFORVAR(SAteergrubetime, "%d"); |
||
734 | M_CHECKFORSTR(SAteergrubeSavCond); |
||
735 | M_CHECKFORSTR(SAteergrubesave); |
||
736 | M_CHECKFORVAR(SAteergrubeoverwrite, "%d"); |
||
737 | M_CHECKFORSTR(SAdevnull); |
||
738 | M_CHECKFORSTR(SAdevnullSavCond); |
||
739 | M_CHECKFORSTR(SAdevnullsave); |
||
740 | M_CHECKFORSTR(SApermreject); |
||
741 | M_CHECKFORSTR(SApermrejectsave); |
||
742 | M_CHECKFORSTR(SApermrejectSavCond); |
||
743 | M_CHECKFORSTR(SAtempreject); |
||
744 | M_CHECKFORSTR(SAtemprejectSavCond); |
||
745 | M_CHECKFORSTR(SAtemprejectsave); |
||
746 | M_CHECKFORVAR(SAtemprejectoverwrite, "%d"); |
||
747 | M_CHECKFORSTR(SAgreylistiswhitestr); |
||
748 | M_CHECKFORVAR(SAgreylistraisetempreject, "%f"); |
||
749 | M_CHECKFORSTR(SAspamacceptsave); |
||
750 | M_CHECKFORSTR(SAspamacceptSavCond); |
||
751 | M_CHECKFORSTR(SAnotspamsave); |
||
752 | M_CHECKFORSTR(SAnotspamSavCond); |
||
753 | M_CHECKFORSTR(SAmsgteergrubewait); |
||
754 | M_CHECKFORSTR(SAmsgteergruberej); |
||
755 | M_CHECKFORSTR(SAmsgpermrej); |
||
756 | M_CHECKFORSTR(SAmsgtemprej); |
||
757 | M_CHECKFORSTR(SAmsgerror); |
||
758 | |||
759 | |||
760 | } |
||
761 | |||
762 | readconffile=1; |
||
763 | } |
||
764 | |||
765 | #define M_CONDTOFLOAT(VAR) \ |
||
766 | if ((expand=expand_string( VAR )) == NULL) \ |
||
767 | { \ |
||
768 | PANIC(string_sprintf(#VAR " config expansion failure on %s", #VAR ));\ |
||
769 | } \ |
||
770 | sscanf(expand, "%f", &VAR ## threshold); \ |
||
771 | if (SAEximDebug > 2) \ |
||
772 | { \ |
||
773 | log_write(0, LOG_MAIN, "SA: Debug3: expanded " #VAR " = %.2f", VAR ## threshold); \ |
||
774 | }\ |
||
775 | |||
776 | M_CONDTOFLOAT(SAteergrube); |
||
777 | M_CONDTOFLOAT(SAdevnull); |
||
778 | M_CONDTOFLOAT(SApermreject); |
||
779 | M_CONDTOFLOAT(SAtempreject); |
||
780 | |||
781 | /* Initialize the list of recipients here */ |
||
782 | rcptlist=string_copy(recipients_list[0].address); |
||
783 | for (i=1; i < recipients_count && strlen((char *)rcptlist) < 7998 - strlen(recipients_list[i].address); i++) |
||
784 | { |
||
785 | rcptlist=string_sprintf("%s, %s", rcptlist, recipients_list[i].address); |
||
786 | } |
||
787 | |||
788 | if (sender_host_address != NULL) |
||
789 | { |
||
790 | mailinfo=string_sprintf("From <%s> (host=%s [%s]) for", |
||
791 | sender_address, sender_host_name, sender_host_address); |
||
792 | } |
||
793 | else |
||
794 | { |
||
795 | mailinfo=string_sprintf("From <%s> (local) for", sender_address); |
||
796 | } |
||
797 | mailinfo=string_sprintf("%s %s", mailinfo, rcptlist); |
||
798 | |||
799 | |||
800 | /* Remove SA-Exim headers that could have been set before we add ours*/ |
||
801 | RemoveHeaders("X-SA-Exim-"); |
||
802 | |||
803 | if(SAaddSAEheaderBeforeSA) |
||
804 | { |
||
805 | AddSAEheaders((char *)rcptlist, SAmaxrcptlistlength); |
||
806 | } |
||
807 | |||
808 | /* This is used later if we need to rewind and save the body elsewhere */ |
||
809 | fdstart=lseek(fd, 0, SEEK_CUR); |
||
810 | CHECKERR(fdstart,"lseek SEEK_CUR",__LINE__); |
||
811 | |||
812 | ret=fstat(fd, &stbuf); |
||
813 | CHECKERR(ret,"fstat fd",__LINE__); |
||
814 | /* this is the body size plus a few bytes (exim msg ID) */ |
||
815 | /* it should be 18 bytes, but I'll assume it could be more or less */ |
||
816 | fdsize=stbuf.st_size; |
||
817 | |||
818 | if (SAEximDebug > 3) |
||
819 | { |
||
820 | log_write(0, LOG_MAIN, "SA: Debug4: Message body is about %.0f bytes and the initial offset is %.0f", (double)(fdsize-18), (double)fdstart); |
||
821 | } |
||
822 | |||
823 | if (fdsize > SAmaxbody) |
||
824 | { |
||
825 | if (SATruncBodyCond[0] != '1' || SATruncBodyCond[1] != 0) |
||
826 | { |
||
827 | expand=expand_string(SATruncBodyCond); |
||
828 | if (expand == NULL) |
||
829 | { |
||
830 | PANIC(string_sprintf("SATruncBodyCond expansion failure on %s", SATruncBodyCond)); |
||
831 | } |
||
832 | |||
833 | if (SAEximDebug) |
||
834 | { |
||
835 | log_write(0, LOG_MAIN, "SA: Debug: SATruncBodyCond expand returned: '%s'", expand); |
||
836 | } |
||
837 | |||
838 | if (expand[0] == 0 || (expand[0] == '0' && expand[1] == 0)) |
||
839 | { |
||
840 | log_write(0, LOG_MAIN, "SA: Action: check skipped due to message size (%.0f bytes) and SATruncBodyCond expanded to false (Message-Id: %s). %s", (double)(fdsize-18), safemesgid, mailinfo); |
||
841 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); Message bigger than SAmaxbody (%d)\n", primary_hostname, SAmaxbody); |
||
842 | return LOCAL_SCAN_ACCEPT; |
||
843 | } |
||
844 | } |
||
845 | |||
846 | if (SAEximDebug > 1) |
||
847 | { |
||
848 | log_write(0, LOG_MAIN, "SA: Debug2: Message body is about %.0f bytes and SATruncBodyCond expanded to true, will feed a truncated body to SA", (double)(fdsize-18)); |
||
849 | } |
||
850 | |||
851 | /* Let's feed exactly spamc will accept */ |
||
852 | scansize=SAmaxbody; |
||
853 | header_add(' ', "X-SA-Exim-Scan-Truncated: Fed %.0f bytes of the body to SA instead of %.0f\n", (double)scansize, (double)fdsize); |
||
854 | } |
||
855 | else |
||
856 | { |
||
857 | scansize=fdsize; |
||
858 | } |
||
859 | |||
860 | expand=expand_string(SAEximRunCond); |
||
861 | if (expand == NULL) |
||
862 | { |
||
863 | PANIC(string_sprintf("SAEximRunCond expansion failure on %s", SAEximRunCond)); |
||
864 | } |
||
865 | |||
866 | if (SAEximDebug) |
||
867 | { |
||
868 | log_write(0, LOG_MAIN, "SA: Debug: SAEximRunCond expand returned: '%s'", expand); |
||
869 | } |
||
870 | |||
871 | |||
872 | /* Bail from SA if the expansion string says so */ |
||
873 | if (expand[0] == 0 || (expand[0] == '0' && expand[1] == 0)) |
||
874 | { |
||
875 | log_write(0, LOG_MAIN, "SA: Action: Not running SA because SAEximRunCond expanded to false (Message-Id: %s). %s", safemesgid, mailinfo); |
||
876 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); SAEximRunCond expanded to false\n", primary_hostname); |
||
877 | return LOCAL_SCAN_ACCEPT; |
||
878 | } |
||
879 | |||
880 | if (SAEximDebug) |
||
881 | { |
||
882 | log_write(0, LOG_MAIN, "SA: Debug: check succeeded, running spamc"); |
||
883 | } |
||
884 | |||
885 | /* Ok, so now that we know we're running SA, we remove the X-Spam headers */ |
||
886 | /* that might have been there */ |
||
887 | RemoveHeaders("X-Spam-"); |
||
888 | |||
889 | |||
890 | beforescan=time(NULL); |
||
891 | /* Fork off spamc, and get ready to talk to it */ |
||
892 | ret=pipe(writefd); |
||
893 | CHECKERR(ret,"write pipe",__LINE__); |
||
894 | ret=pipe(readfd); |
||
895 | CHECKERR(ret,"read pipe",__LINE__); |
||
896 | |||
897 | /* Ensure that SIGCHLD isn't being ignored. */ |
||
898 | old_sigchld = signal(SIGCHLD, SIG_DFL); |
||
899 | |||
900 | if ((pid=fork()) < 0) |
||
901 | { |
||
902 | CHECKERR(pid, "fork", __LINE__ - 1); |
||
903 | } |
||
904 | |||
905 | if (pid == 0) |
||
906 | { |
||
907 | close(readfd[0]); |
||
908 | close(writefd[1]); |
||
909 | |||
910 | ret=dup2(writefd[0],0); |
||
911 | CHECKERR(ret,"dup2 stdin",__LINE__); |
||
912 | ret=dup2(readfd[1],1); |
||
913 | CHECKERR(ret,"dup2 stdout",__LINE__); |
||
914 | ret=dup2(readfd[1],2); |
||
915 | CHECKERR(ret,"dup2 stderr",__LINE__); |
||
916 | |||
917 | /* |
||
918 | * I could implement the spamc protocol and talk to spamd directly |
||
919 | * instead of forking spamc, but considering the overhead spent |
||
920 | * in spamd, forking off spamc seemed acceptable rather than |
||
921 | * re-implementing and tracking the spamc/spamd protocol or linking |
||
922 | * with a possibly changing library |
||
923 | */ |
||
924 | /* Ok, we cheat, spamc cares about how big the whole message is and |
||
925 | * we only know about the body size, so I'll give an extra 16K |
||
926 | * to account for any headers that can accompany the message */ |
||
927 | if(SAspamcSockPath) |
||
928 | { |
||
929 | ret=execl(SAspamcpath, "spamc", "-s", string_sprintf("%d", SAmaxbody+16384), "-U", SAspamcSockPath, NULL); |
||
930 | CHECKERR(ret,string_sprintf("exec %s", SAspamcpath),__LINE__); |
||
931 | } |
||
932 | else |
||
933 | { |
||
934 | ret=execl(SAspamcpath, "spamc", "-s", string_sprintf("%d", SAmaxbody+16384), "-d", SAspamcHost, "-p", SAspamcPort, NULL); |
||
935 | CHECKERR(ret,string_sprintf("exec %s", SAspamcpath),__LINE__); |
||
936 | } |
||
937 | |||
938 | } |
||
939 | |||
940 | if (SAEximDebug > 8) |
||
941 | { |
||
942 | log_write(0, LOG_MAIN, "SA: Debug9: forked spamc"); |
||
943 | } |
||
944 | |||
945 | ret=close(readfd[1]); |
||
946 | CHECKERR(ret,"close r",__LINE__); |
||
947 | ret=close(writefd[0]); |
||
948 | CHECKERR(ret,"close w",__LINE__); |
||
949 | readfh=fdopen(readfd[0], "r"); |
||
950 | |||
951 | if (SAEximDebug > 8) |
||
952 | { |
||
953 | log_write(0, LOG_MAIN, "SA: Debug9: closed filehandles"); |
||
954 | } |
||
955 | |||
956 | /* Ok, we're ready for spewing the mail at spamc */ |
||
957 | /* First we need to get the header lines from exim, and then we can read |
||
958 | the body from fd */ |
||
959 | hl=header_list; |
||
960 | while (hl != NULL) |
||
961 | { |
||
962 | /* type '*' means the header is internal, don't print it */ |
||
963 | if (hl->type == '*') |
||
964 | { |
||
965 | hl=hl->next; |
||
966 | continue; |
||
967 | } |
||
968 | |||
969 | stret=write(writefd[1],hl->text,strlen(hl->text)); |
||
970 | CHECKERR(stret,"header line write",__LINE__); |
||
971 | |||
972 | hl=hl->next; |
||
973 | } |
||
974 | stret=write(writefd[1],"\n",1); |
||
975 | CHECKERR(stret,"header separation write",__LINE__); |
||
976 | |||
977 | if (SAEximDebug > 6) |
||
978 | { |
||
979 | log_write(0, LOG_MAIN, "SA: Debug7: sent headers to spamc pipe. Sending body..."); |
||
980 | } |
||
981 | |||
982 | towrite=scansize; |
||
983 | chunk=0; |
||
984 | while (towrite>0 && (stret=read(fd, buffer, MIN(sizeof(buffera), towrite))) > 0) |
||
985 | { |
||
986 | chunk++; |
||
987 | if (SAEximDebug > 8) |
||
988 | { |
||
989 | log_write(0, LOG_MAIN, "SA: Debug9: spamc body going to write chunk %d (read %.0f, %.0f left to write)", chunk, (double)stret, (double)towrite); |
||
990 | } |
||
991 | towrite-=stret; |
||
992 | stret=write(writefd[1], buffer, stret); |
||
993 | CHECKERR(stret,"body write in",__LINE__); |
||
994 | if (SAEximDebug > 8) |
||
995 | { |
||
996 | log_write(0, LOG_MAIN, "SA: Debug9: Spamc body wrote chunk %d (wrote %.0f, %.0f left to write)", chunk, (double)stret, (double)towrite); |
||
997 | } |
||
998 | } |
||
999 | CHECKERR(stret, "read body", __LINE__ - 14); |
||
1000 | close(writefd[1]); |
||
1001 | |||
1002 | if (SAEximDebug > 5) |
||
1003 | { |
||
1004 | log_write(0, LOG_MAIN, "SA: Debug6: fed spam to spamc, reading result"); |
||
1005 | } |
||
1006 | |||
1007 | if (SAtimeout) |
||
1008 | { |
||
1009 | if (SAEximDebug > 2) |
||
1010 | { |
||
1011 | log_write(0, LOG_MAIN, "SA: Debug3: Setting timeout of %d secs before reading from spamc", SAtimeout); |
||
1012 | } |
||
1013 | /* SA can take very long to run for various reasons, let's not wait |
||
1014 | * forever, that's just bad at SMTP time */ |
||
1015 | if (setjmp(jmp_env) == 0) |
||
1016 | { |
||
1017 | signal(SIGALRM, alarm_handler); |
||
1018 | alarm (SAtimeout); |
||
1019 | } |
||
1020 | else |
||
1021 | { |
||
1022 | /* Make sure that all your variables here are volatile or static */ |
||
1023 | signal(SIGCHLD, old_sigchld); |
||
1024 | fclose((FILE *)readfh); |
||
1025 | |||
1026 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); SA Timed out after %d secs\n", primary_hostname, SAtimeout); |
||
1027 | |||
1028 | /* We sent it to LOG_REJECT too so that we get a header dump */ |
||
1029 | log_write(0, LOG_MAIN | LOG_REJECT, "SA: Action: spamd took more than %d secs to run, accepting message (scanned in %d/%d secs | Message-Id: %s). %s", SAtimeout, scantime, fulltime, safemesgid, mailinfo); |
||
1030 | |||
1031 | ret=savemail(fd, fdstart, SAtimeoutsave, "SAtimeoutsave", (char *)mesgfn, SAerrmaxarchivebody, SAtimeoutSavCond); |
||
1032 | CHECKERR(ret,where,line); |
||
1033 | |||
1034 | /* Make sure we kill spamc in case SIGPIPE from fclose didn't */ |
||
1035 | kill(pid, SIGTERM); |
||
1036 | return LOCAL_SCAN_ACCEPT; |
||
1037 | |||
1038 | } |
||
1039 | } |
||
1040 | |||
1041 | /* Let's see what SA has to tell us about this mail and store the headers */ |
||
1042 | while ((fgets((char *)buffer,sizeof(buffera),(FILE *) readfh)) != NULL) |
||
1043 | { |
||
1044 | /* Remove trailing newline */ |
||
1045 | if (buffer[strlen(buffer)-1] == '\n') |
||
1046 | { |
||
1047 | buffer[strlen(buffer)-1]=0; |
||
1048 | } |
||
1049 | restart: |
||
1050 | if (SAEximDebug > 5) |
||
1051 | { |
||
1052 | log_write(0, LOG_MAIN, "SA: Debug6: spamc read: %s", buffer); |
||
1053 | } |
||
1054 | |||
1055 | /* Let's handle special multi-line headers first, what a pain... */ |
||
1056 | /* We feed the one line we read and the filehandle because we'll need |
||
1057 | to check whether more lines need to be concatenated */ |
||
1058 | /* This is ugly, there is an order dependency so we return to the |
||
1059 | beginning of the loop without reading a new line since we already |
||
1060 | did that */ |
||
1061 | if (parsemlheader(buffer, (FILE *)readfh, "Subject", NULL)) goto restart; |
||
1062 | if ((SARewriteBody == 1) && parsemlheader(buffer, (FILE *)readfh, "Content-Type", NULL)) goto restart; |
||
1063 | if ((SARewriteBody == 1) && parsemlheader(buffer, (FILE *)readfh, "Content-Transfer-Encoding", NULL)) goto restart; |
||
1064 | |||
1065 | if (parsemlheader(buffer, (FILE *)readfh, "X-Spam-Flag", &xspamflag)) |
||
1066 | { |
||
1067 | if (xspamflag[13] == 'Y') |
||
1068 | { |
||
1069 | isspam=1; |
||
1070 | } |
||
1071 | if (SAEximDebug > 2) |
||
1072 | { |
||
1073 | log_write(0, LOG_MAIN, "SA: Debug3: isspam read from X-Spam-Flag: %d", isspam); |
||
1074 | } |
||
1075 | goto restart; |
||
1076 | } |
||
1077 | |||
1078 | if (parsemlheader(buffer, (FILE *)readfh, "X-Spam-Status", &xspamstatus)) |
||
1079 | { |
||
1080 | char *start; |
||
1081 | char *end; |
||
1082 | |||
1083 | gotsa=1; |
||
1084 | |||
1085 | /* if we find the preconfigured greylist string (and it is defined |
||
1086 | * in sa-exim.conf), we can raise the threshold for tempreject just |
||
1087 | * for this mail, since it's been whitelisted */ |
||
1088 | if (SAgreylistiswhitestr && strstr(xspamstatus, SAgreylistiswhitestr)) |
||
1089 | { |
||
1090 | SAtemprejectthreshold+=SAgreylistraisetempreject; |
||
1091 | if (SAEximDebug > 2) |
||
1092 | { |
||
1093 | log_write(0, LOG_MAIN, "SA: Debug3: read %s string, SAtempreject is now changed to %f", SAgreylistiswhitestr, SAtemprejectthreshold); |
||
1094 | } |
||
1095 | } |
||
1096 | else |
||
1097 | { |
||
1098 | if (SAEximDebug > 2) |
||
1099 | { |
||
1100 | log_write(0, LOG_MAIN, "SA: Debug3: did not find read GREYLIST_ISWHITE string in X-Spam-Status"); |
||
1101 | } |
||
1102 | } |
||
1103 | |||
1104 | start=strstr(xspamstatus, "hits="); |
||
1105 | /* Support SA 3.0 format */ |
||
1106 | if (start == NULL) |
||
1107 | { |
||
1108 | start=strstr(xspamstatus, "score="); |
||
1109 | } |
||
1110 | |||
1111 | end=strstr(xspamstatus, " tests="); |
||
1112 | if (end == NULL) |
||
1113 | { |
||
1114 | if (SAEximDebug > 5) |
||
1115 | { |
||
1116 | log_write(0, LOG_MAIN, "SA: Debug6: Could not find old spamstatus format, trying new one..."); |
||
1117 | } |
||
1118 | end=strstr(xspamstatus, "\n tests="); |
||
1119 | } |
||
1120 | if (start!=NULL && end!=NULL) |
||
1121 | { |
||
1122 | spamstatus=string_copyn(start, end-start); |
||
1123 | if (SAEximDebug > 2) |
||
1124 | { |
||
1125 | log_write(0, LOG_MAIN, "SA: Debug3: Read from X-Spam-Status: %s", spamstatus); |
||
1126 | } |
||
1127 | } |
||
1128 | else |
||
1129 | { |
||
1130 | PANIC(string_sprintf("SA: could not parse X-Spam-Status: to extract hits and required. Bad!. Got: '%s'", xspamstatus)); |
||
1131 | } |
||
1132 | |||
1133 | start=strstr(spamstatus, "="); |
||
1134 | end=strstr(spamstatus, " "); |
||
1135 | if (start!=NULL && end!=NULL) |
||
1136 | { |
||
1137 | start++; |
||
1138 | sscanf(start, "%f", &spamvalue); |
||
1139 | } |
||
1140 | else |
||
1141 | { |
||
1142 | PANIC(string_sprintf("SA: spam value extract failed in '%s'. Bad!", xspamstatus)); |
||
1143 | } |
||
1144 | |||
1145 | goto restart; |
||
1146 | } |
||
1147 | |||
1148 | if (parsemlheader(buffer, (FILE *)readfh, "X-Spam-", NULL)) goto restart; |
||
1149 | |||
1150 | /* Ok, now we can do normal processing */ |
||
1151 | |||
1152 | /* If no more headers here, we're done */ |
||
1153 | if (buffer[0] == 0) |
||
1154 | { |
||
1155 | if (SAEximDebug > 5) |
||
1156 | { |
||
1157 | log_write(0, LOG_MAIN, "SA: Debug6: spamc read got newline, end of headers", buffer); |
||
1158 | } |
||
1159 | goto exit; |
||
1160 | } |
||
1161 | |||
1162 | if (compare_header(buffer, "Message-Id: ")) |
||
1163 | { |
||
1164 | char *start; |
||
1165 | char *end; |
||
1166 | char *mesgid=NULL; |
||
1167 | |||
1168 | start=strchr(buffer, '<'); |
||
1169 | end=strchr(buffer, '>'); |
||
1170 | |||
1171 | if (start == NULL || end == NULL) |
||
1172 | { |
||
1173 | /* we keep the default mesgfn (unix date in seconds) */ |
||
1174 | if (SAEximDebug) |
||
1175 | { |
||
1176 | log_write(0, LOG_MAIN, "SA: Debug: Could not get Message-Id from %s", buffer); |
||
1177 | } |
||
1178 | } |
||
1179 | else if ((mesgid=string_copyn(start+1,end-start-1)) && mesgid[0]) |
||
1180 | { |
||
1181 | /* We replace the exim Message-ID with the one read from |
||
1182 | the message * as we use this to detect dupes when we |
||
1183 | send 45x and get the same * message multiple times */ |
||
1184 | safemesgid=cleanmsgid(mesgid, SAsafemesgidchars); |
||
1185 | mesgfn=string_sprintf("%d_%s", time(NULL), safemesgid); |
||
1186 | |||
1187 | if (SAEximDebug > 5) |
||
1188 | { |
||
1189 | log_write(0, LOG_MAIN, "SA: Debug6: Message-Id received and cleaned as: %s", safemesgid); |
||
1190 | } |
||
1191 | } |
||
1192 | continue; |
||
1193 | } |
||
1194 | } |
||
1195 | |||
1196 | exit: |
||
1197 | |||
1198 | |||
1199 | if (isspam && SARewriteBody == 1) |
||
1200 | { |
||
1201 | int line; |
||
1202 | |||
1203 | if (SAEximDebug) |
||
1204 | { |
||
1205 | log_write(0, LOG_MAIN, "SA: Debug: SARewriteBody == 1, rewriting message body"); |
||
1206 | } |
||
1207 | |||
1208 | /* already read from fd? Better reset it... */ |
||
1209 | ret=lseek(fd, fdstart, SEEK_SET); |
||
1210 | CHECKERR(ret, "lseek reset on spooled message", __LINE__); |
||
1211 | |||
1212 | line=1; |
||
1213 | while ((fgets((char *)buffer,sizeof(buffera),(FILE *) readfh)) != NULL) |
||
1214 | { |
||
1215 | if (SAEximDebug > 8) |
||
1216 | { |
||
1217 | log_write(0, LOG_MAIN, "SA: Debug9: Read body from SA; line %d (read %d)", line, strlen(buffer)); |
||
1218 | } |
||
1219 | |||
1220 | stret=write(fd, buffer, strlen(buffer)); |
||
1221 | CHECKERR(stret,string_sprintf("SA body write to msg"),__LINE__); |
||
1222 | if (SAEximDebug > 8) |
||
1223 | { |
||
1224 | log_write(0, LOG_MAIN, "SA: Debug9: Wrote to msg; line %d (wrote %d)", line, ret); |
||
1225 | } |
||
1226 | if (buffer[strlen(buffer)-1] == '\n') |
||
1227 | { |
||
1228 | line++; |
||
1229 | } |
||
1230 | } |
||
1231 | |||
1232 | if (SAEximDebug > 1) |
||
1233 | { |
||
1234 | log_write(0, LOG_MAIN, "SA: Debug2: body_linecount before SA: %d", body_linecount); |
||
1235 | } |
||
1236 | |||
1237 | /* update global variable $body_linecount to reflect the new body size*/ |
||
1238 | body_linecount = (line - 1); |
||
1239 | |||
1240 | if (SAEximDebug > 1) |
||
1241 | { |
||
1242 | log_write(0, LOG_MAIN, "SA: Debug2: body_linecount after SA: %d", body_linecount); |
||
1243 | } |
||
1244 | } |
||
1245 | |||
1246 | fclose((FILE *)readfh); |
||
1247 | |||
1248 | afterscan=time(NULL); |
||
1249 | scantime=afterscan-beforescan; |
||
1250 | |||
1251 | wait(&ret); |
||
1252 | signal(SIGCHLD, old_sigchld); |
||
1253 | |||
1254 | if (ret) |
||
1255 | { |
||
1256 | sprintf(buffer, "%d", ret); |
||
1257 | PANIC(string_sprintf("wait on spamc child yielded, %s", buffer)); |
||
1258 | } |
||
1259 | |||
1260 | afterwait=time(NULL); |
||
1261 | fulltime=afterwait-beforescan; |
||
1262 | |||
1263 | if(!SAaddSAEheaderBeforeSA) |
||
1264 | { |
||
1265 | AddSAEheaders((char *)rcptlist, SAmaxrcptlistlength); |
||
1266 | } |
||
1267 | |||
1268 | header_add(' ', "X-SA-Exim-Version: %s\n",version); |
||
1269 | |||
1270 | if (gotsa == 0) |
||
1271 | { |
||
1272 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); Unknown failure\n", primary_hostname); |
||
1273 | log_write(0, LOG_MAIN, "SA: Action: SA didn't successfully run against message, accepting (time: %d/%d secs | Message-Id: %s). %s", scantime, fulltime, safemesgid, mailinfo); |
||
1274 | return LOCAL_SCAN_ACCEPT; |
||
1275 | } |
||
1276 | |||
1277 | header_add(' ', "X-SA-Exim-Scanned: Yes (on %s)\n", primary_hostname); |
||
1278 | |||
1279 | if (spamstatus == NULL) |
||
1280 | { |
||
1281 | spamstatus = (char *) nospamstatus; |
||
1282 | } |
||
1283 | if (isspam) |
||
1284 | { |
||
1285 | int dorej=1; |
||
1286 | int doteergrube=0; |
||
1287 | |||
1288 | if (SAEximRejCond[0] != '1' || SAEximRejCond[1] != 0) |
||
1289 | { |
||
1290 | expand=expand_string(SAEximRejCond); |
||
1291 | if (expand == NULL) |
||
1292 | { |
||
1293 | PANIC(string_sprintf("SAEximRejCond expansion failure on %s", SAEximRejCond)); |
||
1294 | } |
||
1295 | |||
1296 | if (SAEximDebug) |
||
1297 | { |
||
1298 | log_write(0, LOG_MAIN, "SA: Debug: SAEximRejCond expand returned: '%s'", expand); |
||
1299 | } |
||
1300 | |||
1301 | if (expand[0] == 0 || (expand[0] == '0' && expand[1] == 0)) |
||
1302 | { |
||
1303 | log_write(0, LOG_MAIN, "SA: Notice: SAEximRejCond expanded to false, not applying reject rules"); |
||
1304 | dorej=0; |
||
1305 | } |
||
1306 | } |
||
1307 | |||
1308 | if (dorej && spamvalue >= SAteergrubethreshold) |
||
1309 | { |
||
1310 | doteergrube=1; |
||
1311 | if (SAteergrubecond[0] != '1' || SAteergrubecond[1] != 0) |
||
1312 | { |
||
1313 | expand=expand_string(SAteergrubecond); |
||
1314 | if (expand == NULL) |
||
1315 | { |
||
1316 | PANIC(string_sprintf("SAteergrubecond expansion failure on %s", SAteergrubecond)); |
||
1317 | } |
||
1318 | |||
1319 | if (SAEximDebug) |
||
1320 | { |
||
1321 | log_write(0, LOG_MAIN, "SA: Debug: SAteergrubecond expand returned: '%s'", expand); |
||
1322 | } |
||
1323 | |||
1324 | if (expand[0] == 0 || (expand[0] == '0' && expand[1] == 0)) |
||
1325 | { |
||
1326 | log_write(0, LOG_MAIN, "SA: Notice: SAteergrubecond expanded to false, not teergrubing known peer"); |
||
1327 | doteergrube=0; |
||
1328 | } |
||
1329 | } |
||
1330 | } |
||
1331 | |||
1332 | if (dorej && doteergrube) |
||
1333 | { |
||
1334 | /* By default, we'll only save temp bounces by message ID so |
||
1335 | * that when the same message is submitted several times, we |
||
1336 | * overwrite the same file on disk and not create a brand new |
||
1337 | * one every single time */ |
||
1338 | if (SAteergrubeoverwrite) |
||
1339 | { |
||
1340 | ret=savemail(fd, fdstart, SAteergrubesave, "SAteergrubesave", safemesgid, SAmaxarchivebody, SAteergrubeSavCond); |
||
1341 | CHECKERR(ret,where,line); |
||
1342 | } |
||
1343 | else |
||
1344 | { |
||
1345 | ret=savemail(fd, fdstart, SAteergrubesave, "SAteergrubesave", (char *)mesgfn, SAmaxarchivebody, SAteergrubeSavCond); |
||
1346 | CHECKERR(ret,where,line); |
||
1347 | } |
||
1348 | |||
1349 | spamstatus=string_sprintf("%s trigger=%.1f", spamstatus, SAteergrubethreshold); |
||
1350 | /* Exim might want to stop us if we run for too long, but that's |
||
1351 | * exactly what we're trying to do, so let's override that */ |
||
1352 | alarm(0); |
||
1353 | |||
1354 | for (i=0;i<SAteergrubetime/10;i++) |
||
1355 | { |
||
1356 | char *str; |
||
1357 | |||
1358 | /* Unfortunately, we can't use exim's smtp_printf because it |
||
1359 | * doesn't return an error code if the write gets an EPIPE. |
||
1360 | * So, we write ourselves, but this won't work if you have a |
||
1361 | * TLS connection opened (that said, if you are teergrubing |
||
1362 | * a TLS connection, it's probably a relay host, not a |
||
1363 | * spammer, and in this case you should not teergrube a |
||
1364 | * friendly relay, so basically we should be ok). |
||
1365 | * If you do teergrube an SSL connection with the current |
||
1366 | * code, you will break it, but that's acceptable */ |
||
1367 | str=string_sprintf(string_sprintf("451- %s\r\n",SAmsgteergrubewait), spamstatus); |
||
1368 | fprintf(smtp_out, str); |
||
1369 | ret=fflush(smtp_out); |
||
1370 | if (ret != 0) |
||
1371 | { |
||
1372 | log_write(0, LOG_MAIN | LOG_REJECT, "SA: Action: teergrubed sender for %d secs until it closed the connection: %s (scanned in %d/%d secs | Message-Id: %s). %s", i*10, spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1373 | /* The other side closed the connection, nothing to print */ |
||
1374 | *return_text=""; |
||
1375 | return LOCAL_SCAN_TEMPREJECT_NOLOGHDR; |
||
1376 | } |
||
1377 | sleep(10); |
||
1378 | } |
||
1379 | |||
1380 | log_write(0, LOG_MAIN | LOG_REJECT, "SA: Action: teergrubed sender until full configured duration of %d secs: %s (scanned in %d/%d secs | Message-Id: %s). %s", SAteergrubetime, spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1381 | *return_text=string_sprintf(SAmsgteergruberej, spamstatus); |
||
1382 | return LOCAL_SCAN_TEMPREJECT_NOLOGHDR; |
||
1383 | } |
||
1384 | else if (dorej && spamvalue >= SAdevnullthreshold) |
||
1385 | { |
||
1386 | ret=savemail(fd, fdstart, SAdevnullsave, "SAdevnullsave", (char *)mesgfn, SAmaxarchivebody, SAdevnullSavCond); |
||
1387 | CHECKERR(ret,where,line); |
||
1388 | |||
1389 | recipients_count=0; |
||
1390 | spamstatus=string_sprintf("%s trigger=%.1f", spamstatus, SAdevnullthreshold); |
||
1391 | log_write(0, LOG_REJECT | LOG_MAIN, "SA: Action: silently tossed message: %s (scanned in %d/%d secs | Message-Id: %s). %s", spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1392 | return LOCAL_SCAN_ACCEPT; |
||
1393 | } |
||
1394 | else if (dorej && spamvalue >= SApermrejectthreshold) |
||
1395 | { |
||
1396 | ret=savemail(fd, fdstart, SApermrejectsave, "SApermrejectsave", (char *)mesgfn, SAmaxarchivebody, SApermrejectSavCond); |
||
1397 | CHECKERR(ret,where,line); |
||
1398 | |||
1399 | spamstatus=string_sprintf("%s trigger=%.1f", spamstatus, SApermrejectthreshold); |
||
1400 | log_write(0, LOG_MAIN | LOG_REJECT, "SA: Action: permanently rejected message: %s (scanned in %d/%d secs | Message-Id: %s). %s", spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1401 | *return_text=string_sprintf(SAmsgpermrej, spamstatus); |
||
1402 | return LOCAL_SCAN_REJECT_NOLOGHDR; |
||
1403 | } |
||
1404 | else if (dorej && spamvalue >= SAtemprejectthreshold) |
||
1405 | { |
||
1406 | /* Yeah, gotos are harmful, but that'd be a function with a lot |
||
1407 | * of options to send, so, here's a small shortcut */ |
||
1408 | goto dotempreject; |
||
1409 | } |
||
1410 | else |
||
1411 | { |
||
1412 | ret=savemail(fd, fdstart, SAspamacceptsave, "SAspamacceptsave", (char *)mesgfn, SAmaxarchivebody, SAspamacceptSavCond); |
||
1413 | CHECKERR(ret,where,line); |
||
1414 | log_write(0, LOG_MAIN, "SA: Action: flagged as Spam but accepted: %s (scanned in %d/%d secs | Message-Id: %s). %s", spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1415 | return LOCAL_SCAN_ACCEPT; |
||
1416 | } |
||
1417 | } |
||
1418 | else |
||
1419 | { |
||
1420 | /* This is an exception to the rule, for grey listing, we allow for |
||
1421 | * sending back a tempreject on SA scores that aren't considered as |
||
1422 | * spam (greylisting is now done directly in spamassassin though */ |
||
1423 | if (spamvalue >= SAtemprejectthreshold) |
||
1424 | { |
||
1425 | dotempreject: |
||
1426 | |||
1427 | /* By default, we'll only save temp bounces by message ID so |
||
1428 | * that when the same message is submitted several times, we |
||
1429 | * overwrite the same file on disk and not create a brand new |
||
1430 | * one every single time */ |
||
1431 | if (SAtemprejectoverwrite) |
||
1432 | { |
||
1433 | ret=savemail(fd, fdstart, SAtemprejectsave, "SAtemprejectsave", safemesgid, SAmaxarchivebody, SAtemprejectSavCond); |
||
1434 | CHECKERR(ret,where,line); |
||
1435 | } |
||
1436 | else |
||
1437 | { |
||
1438 | ret=savemail(fd, fdstart, SAtemprejectsave, "SAtemprejectsave", (char *)mesgfn, SAmaxarchivebody, SAtemprejectSavCond); |
||
1439 | CHECKERR(ret,where,line); |
||
1440 | } |
||
1441 | |||
1442 | spamstatus=string_sprintf("%s trigger=%.1f", spamstatus, SAtemprejectthreshold); |
||
1443 | log_write(0, LOG_MAIN | LOG_REJECT, "SA: Action: temporarily rejected message: %s (scanned in %d/%d secs | Message-Id: %s). %s", spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1444 | *return_text=string_sprintf(SAmsgtemprej, spamstatus); |
||
1445 | return LOCAL_SCAN_TEMPREJECT_NOLOGHDR; |
||
1446 | } |
||
1447 | else |
||
1448 | { |
||
1449 | ret=savemail(fd, fdstart, SAnotspamsave, "SAnotspamsave", (char *)mesgfn, SAmaxarchivebody, SAnotspamSavCond); |
||
1450 | CHECKERR(ret,where,line); |
||
1451 | log_write(0, LOG_MAIN, "SA: Action: scanned but message isn't spam: %s (scanned in %d/%d secs | Message-Id: %s). %s", spamstatus, scantime, fulltime, safemesgid, mailinfo); |
||
1452 | return LOCAL_SCAN_ACCEPT; |
||
1453 | } |
||
1454 | } |
||
1455 | |||
1456 | |||
1457 | |||
1458 | errexit: |
||
1459 | if (SAtemprejectonerror) |
||
1460 | { |
||
1461 | log_write(0, LOG_MAIN | LOG_PANIC, "SA: PANIC: Unexpected error on %s, file "__FILE__", line %d: %s", where, line-1, strerror(errno)); |
||
1462 | } |
||
1463 | else |
||
1464 | { |
||
1465 | log_write(0, LOG_MAIN, "SA: PANIC: Unexpected error on %s (but message was accepted), file "__FILE__", line %d: %s", where, line-1, strerror(errno)); |
||
1466 | } |
||
1467 | |||
1468 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); Exit with error (see exim mainlog)\n", primary_hostname); |
||
1469 | |||
1470 | ret=savemail(fd, fdstart, SAerrorsave, "SAerrorsave", (char *)mesgfn, SAerrmaxarchivebody, SAerrorSavCond); |
||
1471 | if (ret < 0) |
||
1472 | { |
||
1473 | log_write(0, LOG_MAIN | LOG_PANIC, "SA: PANIC: Error in error handler while trying to save mail to %s, file "__FILE__", line %d: %s", string_sprintf("%s/%s", SAerrorsave, mesgfn), __LINE__ - 3, strerror(errno)); |
||
1474 | } |
||
1475 | |||
1476 | if (SAtemprejectonerror) |
||
1477 | { |
||
1478 | *return_text=SAmsgerror; |
||
1479 | return LOCAL_SCAN_TEMPREJECT_NOLOGHDR; |
||
1480 | } |
||
1481 | else |
||
1482 | { |
||
1483 | return LOCAL_SCAN_ACCEPT; |
||
1484 | } |
||
1485 | |||
1486 | |||
1487 | panicexit: |
||
1488 | if (SAtemprejectonerror) |
||
1489 | { |
||
1490 | log_write(0, LOG_MAIN | LOG_PANIC, "SA: PANIC: %s", panicerror); |
||
1491 | } |
||
1492 | else |
||
1493 | { |
||
1494 | log_write(0, LOG_MAIN | LOG_PANIC, "SA: PANIC: %s (but message was accepted)", panicerror); |
||
1495 | } |
||
1496 | |||
1497 | header_add(' ', "X-SA-Exim-Scanned: No (on %s); Panic (see exim mainlog)\n", primary_hostname); |
||
1498 | |||
1499 | ret=savemail(fd, fdstart, SAerrorsave, "SAerrorsave", (char *)mesgfn, SAerrmaxarchivebody, SAerrorSavCond); |
||
1500 | if (ret < 0) |
||
1501 | { |
||
1502 | log_write(0, LOG_MAIN | LOG_PANIC , "SA: PANIC: Error in error handler while trying to save mail to %s, file "__FILE__", line %d: %s", string_sprintf("%s/%s", SAerrorsave, mesgfn), __LINE__ - 3, strerror(errno)); |
||
1503 | } |
||
1504 | |||
1505 | if (SAtemprejectonerror) |
||
1506 | { |
||
1507 | *return_text=SAmsgerror; |
||
1508 | return LOCAL_SCAN_TEMPREJECT_NOLOGHDR; |
||
1509 | } |
||
1510 | else |
||
1511 | { |
||
1512 | return LOCAL_SCAN_ACCEPT; |
||
1513 | } |
||
1514 | } |