3 # Copyright (c) University of Cambridge, 1995 - 2007
4 # See the file NOTICE for conditions of use and distribution.
6 # Except when they appear in comments, the following placeholders in this
7 # source are replaced when it is turned into a runnable script:
9 # CONFIGURE_FILE_USE_NODE
16 # A shell+perl wrapper script to run an automated -bh test to check out
17 # ACLs for incoming addresses.
19 # Save the shell arguments because we are going to need the shell variables
20 # while sorting out the configuration file.
24 # See if this installation is using the esoteric "USE_NODE" feature of Exim,
25 # in which it uses the host's name as a suffix for the configuration file name.
27 if [ "CONFIGURE_FILE_USE_NODE" = "yes" ]; then
28 hostsuffix=.`uname -n`
31 # Now find the configuration file name. This has got complicated because
32 # CONFIGURE_FILE may now be a list of files. The one that is used is the first
33 # one that exists. Mimic the code in readconf.c by testing first for the
34 # suffixed file in each case.
36 set `awk -F: '{ for (i = 1; i <= NF; i++) print $i }' <<End
40 while [ "$config" = "" -a $# -gt 0 ] ; do
41 if [ -f "$1$hostsuffix" ] ; then
42 config="$1$hostsuffix"
43 elif [ -f "$1" ] ; then
49 # Search for an exim_path setting in the configure file; otherwise use the bin
50 # directory. BEWARE: a tab character is needed in the command below. It has had
51 # a nasty tendency to get lost in the past. Use a variable to hold a space and
52 # a tab to keep the tab in one place.
54 exim_path=`perl -ne 'chop;if (/^\s*exim_path\s*=\s*(.*)/){print "$1\n";last;}' $config`
55 if test "$exim_path" = ""; then exim_path=BIN_DIRECTORY/exim; fi
58 #########################################################################
61 # Now run the perl script, passing in the Exim path and the arguments given
62 # to the overall script.
64 PERL_COMMAND - $exim_path $args <<'End'
69 if (scalar(@ARGV) < 3)
71 print "Usage: exim_checkaccess <IP address> <email address> [exim options]\n";
75 $exim_path = $ARGV[0]; # Set up by the calling shell script
76 $host = $ARGV[1]; # Mandatory original first argument
77 $recipient = $ARGV[2]; # Mandatory original second argument
79 $c4 = qr/2 (?:[0-4]\d | 5[0-5]) | 1\d\d | \d{1,2}/x; # IPv4 component
80 $a4 = qr/^$c4\.$c4\.$c4\.$c4$/; # IPv4 address
82 $c6 = qr/[0-9a-f]{1,4}/i; # IPv6 component
84 # Split the various formats of IPv6 addresses into several cases. I don't
85 # think I can graft regex that matches all of them without using alternatives.
87 # 1. Starts with :: followed by up to 7 components
89 $a6_0 = qr/^::(?:$c6:){0,6}$c6$/x;
91 # 2. 8 non-empty components
93 $a6_1 = qr/^(?:$c6:){7}$c6$/x;
95 # 3. This is the cunning one. Up to 7 components, one (and only one) of which
96 # can be empty. We use 0 to cause a failure when we've already matched
97 # an empty component and may be hitting other. This has to fail, because we
98 # know we've just failed to match a component. We also do a final check to
99 # ensure that there has been an empty component.
101 $a6_2 = qr/^(?: (?: $c6 | (?(1)0 | () ) ) : ){1,7}$c6 $ (?(1)|.)/x;
103 if ($host !~ /$a4 | $a6_0 | $a6_1 | $a6_2/x)
105 print "** Invalid IP address \"$host\"\n";
106 print "Usage: exim_checkaccess <IP address> <email address> [exim options]\n";
110 # Build any remaining original arguments into a string for passing over
114 for ($i = 3; $i < scalar(@ARGV); $i++) { $opt .= "$ARGV[$i] "; }
116 # If the string contains "-f xxxx", extract that as the sender. Otherwise
120 if ($opt =~ /(?:^|\s)-f\s+(\S+|"[^"]*")/)
126 # Run a -bh test in Exim, passing the test data
128 $pid = open2(*IN, *OUT, "$exim_path -bh $host $opt 2>/dev/null");
129 print OUT "HELO [$host]\r\n";
130 print OUT "MAIL FROM:<$sender>\r\n";
131 print OUT "RCPT TO:<$recipient>\r\n";
132 print OUT "QUIT\r\n";
135 # Read the output, ignoring anything but the SMTP response to the RCPT
153 # We have the response we want. Interpret it.
155 if ($reply =~ /^2\d\d/)
162 $reply =~ s/\n(.)/\n $1/g;
168 # Reap the child process