1 /* $Cambridge: exim/src/src/acl.c,v 1.3 2004/10/19 11:04:26 ph10 Exp $ */
3 /*************************************************
4 * Exim - an Internet mail transport agent *
5 *************************************************/
7 /* Copyright (c) University of Cambridge 1995 - 2004 */
8 /* See the file NOTICE for conditions of use and distribution. */
10 /* Code for handling Access Control Lists (ACLs) */
15 /* Default callout timeout */
17 #define CALLOUT_TIMEOUT_DEFAULT 30
19 /* ACL verb codes - keep in step with the table of verbs that follows */
21 enum { ACL_ACCEPT, ACL_DEFER, ACL_DENY, ACL_DISCARD, ACL_DROP, ACL_REQUIRE,
26 static uschar *verbs[] =
27 { US"accept", US"defer", US"deny", US"discard", US"drop", US"require",
30 /* For each verb, the condition for which "message" is used */
32 static int msgcond[] = { FAIL, OK, OK, FAIL, OK, FAIL, OK };
34 /* ACL condition and modifier codes - keep in step with the table that
37 enum { ACLC_ACL, ACLC_AUTHENTICATED, ACLC_CONDITION, ACLC_CONTROL, ACLC_DELAY,
38 ACLC_DNSLISTS, ACLC_DOMAINS, ACLC_ENCRYPTED, ACLC_ENDPASS, ACLC_HOSTS,
39 ACLC_LOCAL_PARTS, ACLC_LOG_MESSAGE, ACLC_LOGWRITE, ACLC_MESSAGE,
40 ACLC_RECIPIENTS, ACLC_SENDER_DOMAINS, ACLC_SENDERS, ACLC_SET, ACLC_VERIFY };
42 /* ACL conditions/modifiers: "delay", "control", "endpass", "message",
43 "log_message", "logwrite", and "set" are modifiers that look like conditions
44 but always return TRUE. They are used for their side effects. */
46 static uschar *conditions[] = { US"acl", US"authenticated", US"condition",
47 US"control", US"delay", US"dnslists", US"domains", US"encrypted",
48 US"endpass", US"hosts", US"local_parts", US"log_message", US"logwrite",
49 US"message", US"recipients", US"sender_domains", US"senders", US"set",
52 /* ACL control names */
54 static uschar *controls[] = { US"error", US"caseful_local_part",
55 US"caselower_local_part", US"enforce_sync", US"no_enforce_sync", US"freeze",
56 US"queue_only", US"submission", US"no_multiline"};
58 /* Flags to indicate for which conditions /modifiers a string expansion is done
59 at the outer level. In the other cases, expansion already occurs in the
60 checking functions. */
62 static uschar cond_expand_at_top[] = {
64 FALSE, /* authenticated */
70 FALSE, /* encrypted */
73 FALSE, /* local_parts */
74 TRUE, /* log_message */
77 FALSE, /* recipients */
78 FALSE, /* sender_domains */
84 /* Flags to identify the modifiers */
86 static uschar cond_modifiers[] = {
88 FALSE, /* authenticated */
89 FALSE, /* condition */
94 FALSE, /* encrypted */
97 FALSE, /* local_parts */
98 TRUE, /* log_message */
101 FALSE, /* recipients */
102 FALSE, /* sender_domains */
108 /* Bit map vector of which conditions are not allowed at certain times. For
109 each condition, there's a bitmap of dis-allowed times. */
111 static unsigned int cond_forbids[] = {
113 (1<<ACL_WHERE_NOTSMTP)|(1<<ACL_WHERE_CONNECT)| /* authenticated */
117 /* Certain types of control are always allowed, so we let it through
118 always and check in the control processing itself */
122 (1<<ACL_WHERE_NOTSMTP), /* dnslists */
124 (1<<ACL_WHERE_NOTSMTP)|(1<<ACL_WHERE_AUTH)| /* domains */
125 (1<<ACL_WHERE_CONNECT)|(1<<ACL_WHERE_HELO)|
126 (1<<ACL_WHERE_DATA)|(1<<ACL_WHERE_PREDATA)|
127 (1<<ACL_WHERE_ETRN)|(1<<ACL_WHERE_EXPN)|
128 (1<<ACL_WHERE_MAILAUTH)|(1<<ACL_WHERE_QUIT)|
129 (1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_STARTTLS)|
132 (1<<ACL_WHERE_NOTSMTP)|(1<<ACL_WHERE_CONNECT)| /* encrypted */
135 (1<<ACL_WHERE_NOTSMTP), /* hosts */
137 (1<<ACL_WHERE_NOTSMTP)|(1<<ACL_WHERE_AUTH)| /* local_parts */
138 (1<<ACL_WHERE_CONNECT)|(1<<ACL_WHERE_HELO)|
139 (1<<ACL_WHERE_DATA)|(1<<ACL_WHERE_PREDATA)|
140 (1<<ACL_WHERE_ETRN)|(1<<ACL_WHERE_EXPN)|
141 (1<<ACL_WHERE_MAILAUTH)|(1<<ACL_WHERE_QUIT)|
142 (1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_STARTTLS)|
149 (1<<ACL_WHERE_NOTSMTP)|(1<<ACL_WHERE_AUTH)| /* recipients */
150 (1<<ACL_WHERE_CONNECT)|(1<<ACL_WHERE_HELO)|
151 (1<<ACL_WHERE_DATA)|(1<<ACL_WHERE_PREDATA)|
152 (1<<ACL_WHERE_ETRN)|(1<<ACL_WHERE_EXPN)|
153 (1<<ACL_WHERE_MAILAUTH)|(1<<ACL_WHERE_QUIT)|
154 (1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_STARTTLS)|
157 (1<<ACL_WHERE_AUTH)|(1<<ACL_WHERE_CONNECT)| /* sender_domains */
159 (1<<ACL_WHERE_MAILAUTH)|(1<<ACL_WHERE_QUIT)|
160 (1<<ACL_WHERE_ETRN)|(1<<ACL_WHERE_EXPN)|
161 (1<<ACL_WHERE_STARTTLS)|(1<<ACL_WHERE_VRFY),
163 (1<<ACL_WHERE_AUTH)|(1<<ACL_WHERE_CONNECT)| /* senders */
165 (1<<ACL_WHERE_MAILAUTH)|(1<<ACL_WHERE_QUIT)|
166 (1<<ACL_WHERE_ETRN)|(1<<ACL_WHERE_EXPN)|
167 (1<<ACL_WHERE_STARTTLS)|(1<<ACL_WHERE_VRFY),
171 /* Certain types of verify are always allowed, so we let it through
172 always and check in the verify function itself */
178 /* Return values from decode_control() */
180 enum { CONTROL_ERROR, CONTROL_CASEFUL_LOCAL_PART, CONTROL_CASELOWER_LOCAL_PART,
181 CONTROL_ENFORCE_SYNC, CONTROL_NO_ENFORCE_SYNC, CONTROL_FREEZE,
182 CONTROL_QUEUE_ONLY, CONTROL_SUBMISSION, CONTROL_NO_MULTILINE };
184 /* Bit map vector of which controls are not allowed at certain times. For
185 each control, there's a bitmap of dis-allowed times. For some, it is easier to
186 specify the negation of a small number of allowed times. */
188 static unsigned int control_forbids[] = {
190 ~(1<<ACL_WHERE_RCPT), /* caseful_local_part */
191 ~(1<<ACL_WHERE_RCPT), /* caselower_local_part */
192 (1<<ACL_WHERE_NOTSMTP), /* enforce_sync */
193 (1<<ACL_WHERE_NOTSMTP), /* no_enforce_sync */
195 ~((1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_RCPT)| /* freeze */
196 (1<<ACL_WHERE_PREDATA)|(1<<ACL_WHERE_DATA)|
197 (1<<ACL_WHERE_NOTSMTP)),
199 ~((1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_RCPT)| /* queue_only */
200 (1<<ACL_WHERE_PREDATA)|(1<<ACL_WHERE_DATA)|
201 (1<<ACL_WHERE_NOTSMTP)),
203 ~((1<<ACL_WHERE_MAIL)|(1<<ACL_WHERE_RCPT)| /* submission */
204 (1<<ACL_WHERE_PREDATA)),
206 (1<<ACL_WHERE_NOTSMTP) /* no_multiline */
209 /* Structure listing various control arguments, with their characteristics. */
211 typedef struct control_def {
213 int value; /* CONTROL_xxx value */
214 BOOL has_option; /* Has /option(s) following */
217 static control_def controls_list[] = {
218 { US"caseful_local_part", CONTROL_CASEFUL_LOCAL_PART, FALSE},
219 { US"caselower_local_part", CONTROL_CASELOWER_LOCAL_PART, FALSE},
220 { US"enforce_sync", CONTROL_ENFORCE_SYNC, FALSE},
221 { US"freeze", CONTROL_FREEZE, FALSE},
222 { US"no_enforce_sync", CONTROL_NO_ENFORCE_SYNC, FALSE},
223 { US"no_multiline_responses", CONTROL_NO_MULTILINE, FALSE},
224 { US"queue_only", CONTROL_QUEUE_ONLY, FALSE},
225 { US"submission", CONTROL_SUBMISSION, TRUE}
228 /* Enable recursion between acl_check_internal() and acl_check_condition() */
230 static int acl_check_internal(int, address_item *, uschar *, int, uschar **,
234 /*************************************************
235 * Pick out name from list *
236 *************************************************/
238 /* Use a binary chop method
245 Returns: offset in list, or -1 if not found
249 acl_checkname(uschar *name, uschar **list, int end)
255 int mid = (start + end)/2;
256 int c = Ustrcmp(name, list[mid]);
257 if (c == 0) return mid;
258 if (c < 0) end = mid; else start = mid + 1;
265 /*************************************************
266 * Read and parse one ACL *
267 *************************************************/
269 /* This function is called both from readconf in order to parse the ACLs in the
270 configuration file, and also when an ACL is encountered dynamically (e.g. as
271 the result of an expansion). It is given a function to call in order to
272 retrieve the lines of the ACL. This function handles skipping comments and
273 blank lines (where relevant).
276 func function to get next line of ACL
277 error where to put an error message
279 Returns: pointer to ACL, or NULL
280 NULL can be legal (empty ACL); in this case error will be NULL
284 acl_read(uschar *(*func)(void), uschar **error)
286 acl_block *yield = NULL;
287 acl_block **lastp = &yield;
288 acl_block *this = NULL;
289 acl_condition_block *cond;
290 acl_condition_block **condp = NULL;
295 while ((s = (*func)()) != NULL)
298 BOOL negated = FALSE;
299 uschar *saveline = s;
302 /* Conditions (but not verbs) are allowed to be negated by an initial
305 while (isspace(*s)) s++;
312 /* Read the name of a verb or a condition, or the start of a new ACL */
314 s = readconf_readname(name, sizeof(name), s);
317 if (negated || name[0] == 0)
319 *error = string_sprintf("malformed ACL name in \"%s\"", saveline);
325 /* If a verb is unrecognized, it may be another condition or modifier that
326 continues the previous verb. */
328 v = acl_checkname(name, verbs, sizeof(verbs)/sizeof(char *));
333 *error = string_sprintf("unknown ACL verb in \"%s\"", saveline);
344 *error = string_sprintf("malformed ACL line \"%s\"", saveline);
347 this = store_get(sizeof(acl_block));
349 lastp = &(this->next);
352 this->condition = NULL;
353 condp = &(this->condition);
354 if (*s == 0) continue; /* No condition on this line */
360 s = readconf_readname(name, sizeof(name), s); /* Condition name */
363 /* Handle a condition or modifier. */
365 c = acl_checkname(name, conditions, sizeof(conditions)/sizeof(char *));
368 *error = string_sprintf("unknown ACL condition/modifier in \"%s\"",
373 /* The modifiers may not be negated */
375 if (negated && cond_modifiers[c])
377 *error = string_sprintf("ACL error: negation is not allowed with "
378 "\"%s\"", conditions[c]);
382 /* ENDPASS may occur only with ACCEPT or DISCARD. */
384 if (c == ACLC_ENDPASS &&
385 this->verb != ACL_ACCEPT &&
386 this->verb != ACL_DISCARD)
388 *error = string_sprintf("ACL error: \"%s\" is not allowed with \"%s\"",
389 conditions[c], verbs[this->verb]);
393 cond = store_get(sizeof(acl_condition_block));
396 cond->u.negated = negated;
399 condp = &(cond->next);
401 /* The "set" modifier is different in that its argument is "name=value"
402 rather than just a value, and we can check the validity of the name, which
403 gives us a variable number to insert into the data block. */
407 if (Ustrncmp(s, "acl_", 4) != 0 || (s[4] != 'c' && s[4] != 'm') ||
408 !isdigit(s[5]) || (!isspace(s[6]) && s[6] != '='))
410 *error = string_sprintf("unrecognized name after \"set\" in ACL "
411 "modifier \"set %s\"", s);
415 cond->u.varnumber = s[5] - '0';
416 if (s[4] == 'm') cond->u.varnumber += ACL_C_MAX;
418 while (isspace(*s)) s++;
421 /* For "set", we are now positioned for the data. For the others, only
422 "endpass" has no data */
424 if (c != ACLC_ENDPASS)
428 *error = string_sprintf("\"=\" missing after ACL \"%s\" %s", name,
429 cond_modifiers[c]? US"modifier" : US"condition");
432 while (isspace(*s)) s++;
433 cond->arg = string_copy(s);
442 /*************************************************
444 *************************************************/
446 /* This function is called when a WARN verb's conditions are true. It adds to
447 the message's headers, and/or writes information to the log. In each case, this
448 only happens once (per message for headers, per connection for log).
451 where ACL_WHERE_xxxx indicating which ACL this is
452 user_message message for adding to headers
453 log_message message for logging, if different
459 acl_warn(int where, uschar *user_message, uschar *log_message)
463 if (log_message != NULL && log_message != user_message)
468 text = string_sprintf("%s Warning: %s", host_and_ident(TRUE),
469 string_printing(log_message));
471 /* If a sender verification has failed, and the log message is "sender verify
472 failed", add the failure message. */
474 if (sender_verified_failed != NULL &&
475 sender_verified_failed->message != NULL &&
476 strcmpic(log_message, US"sender verify failed") == 0)
477 text = string_sprintf("%s: %s", text, sender_verified_failed->message);
479 /* Search previously logged warnings. They are kept in malloc store so they
480 can be freed at the start of a new message. */
482 for (logged = acl_warn_logged; logged != NULL; logged = logged->next)
483 if (Ustrcmp(logged->text, text) == 0) break;
487 int length = Ustrlen(text) + 1;
488 log_write(0, LOG_MAIN, "%s", text);
489 logged = store_malloc(sizeof(string_item) + length);
490 logged->text = (uschar *)logged + sizeof(string_item);
491 memcpy(logged->text, text, length);
492 logged->next = acl_warn_logged;
493 acl_warn_logged = logged;
497 /* If there's no user message, we are done. */
499 if (user_message == NULL) return;
501 /* If this isn't a message ACL, we can't do anything with a user message.
504 if (where > ACL_WHERE_NOTSMTP)
506 log_write(0, LOG_MAIN|LOG_PANIC, "ACL \"warn\" with \"message\" setting "
507 "found in a non-message (%s) ACL: cannot specify header lines here: "
508 "message ignored", acl_wherenames[where]);
512 /* Treat the user message as a sequence of one or more header lines. */
514 hlen = Ustrlen(user_message);
517 uschar *text, *p, *q;
519 /* Add a final newline if not present */
521 text = ((user_message)[hlen-1] == '\n')? user_message :
522 string_sprintf("%s\n", user_message);
524 /* Loop for multiple header lines, taking care about continuations */
526 for (p = q = text; *p != 0; )
529 int newtype = htype_add_bot;
530 header_line **hptr = &acl_warn_headers;
532 /* Find next header line within the string */
536 q = Ustrchr(q, '\n');
537 if (*(++q) != ' ' && *q != '\t') break;
540 /* If the line starts with a colon, interpret the instruction for where to
541 add it. This temporarily sets up a new type. */
545 if (strncmpic(p, US":after_received:", 16) == 0)
547 newtype = htype_add_rec;
550 else if (strncmpic(p, US":at_start:", 10) == 0)
552 newtype = htype_add_top;
555 else if (strncmpic(p, US":at_end:", 8) == 0)
557 newtype = htype_add_bot;
560 while (*p == ' ' || *p == '\t') p++;
563 /* See if this line starts with a header name, and if not, add X-ACL-Warn:
564 to the front of it. */
566 for (s = p; s < q - 1; s++)
568 if (*s == ':' || !isgraph(*s)) break;
571 s = string_sprintf("%s%.*s", (*s == ':')? "" : "X-ACL-Warn: ", q - p, p);
574 /* See if this line has already been added */
576 while (*hptr != NULL)
578 if (Ustrncmp((*hptr)->text, s, hlen) == 0) break;
579 hptr = &((*hptr)->next);
582 /* Add if not previously present */
586 header_line *h = store_get(sizeof(header_line));
595 /* Advance for next header line within the string */
604 /*************************************************
605 * Verify and check reverse DNS *
606 *************************************************/
608 /* Called from acl_verify() below. We look up the host name(s) of the client IP
609 address if this has not yet been done. The host_name_lookup() function checks
610 that one of these names resolves to an address list that contains the client IP
611 address, so we don't actually have to do the check here.
614 user_msgptr pointer for user message
615 log_msgptr pointer for log message
617 Returns: OK verification condition succeeded
618 FAIL verification failed
619 DEFER there was a problem verifying
623 acl_verify_reverse(uschar **user_msgptr, uschar **log_msgptr)
627 user_msgptr = user_msgptr; /* stop compiler warning */
629 /* Previous success */
631 if (sender_host_name != NULL) return OK;
633 /* Previous failure */
635 if (host_lookup_failed)
637 *log_msgptr = string_sprintf("host lookup failed%s", host_lookup_msg);
641 /* Need to do a lookup */
644 debug_printf("looking up host name to force name/address consistency check\n");
646 if ((rc = host_name_lookup()) != OK)
648 *log_msgptr = (rc == DEFER)?
649 US"host lookup deferred for reverse lookup check"
651 string_sprintf("host lookup failed for reverse lookup check%s",
653 return rc; /* DEFER or FAIL */
656 host_build_sender_fullhost();
662 /*************************************************
663 * Handle verification (address & other) *
664 *************************************************/
666 /* This function implements the "verify" condition. It is called when
667 encountered in any ACL, because some tests are almost always permitted. Some
668 just don't make sense, and always fail (for example, an attempt to test a host
669 lookup for a non-TCP/IP message). Others are restricted to certain ACLs.
672 where where called from
673 addr the recipient address that the ACL is handling, or NULL
674 arg the argument of "verify"
675 user_msgptr pointer for user message
676 log_msgptr pointer for log message
677 basic_errno where to put verify errno
679 Returns: OK verification condition succeeded
680 FAIL verification failed
681 DEFER there was a problem verifying
686 acl_verify(int where, address_item *addr, uschar *arg,
687 uschar **user_msgptr, uschar **log_msgptr, int *basic_errno)
691 int callout_overall = -1;
692 int verify_options = 0;
694 BOOL verify_header_sender = FALSE;
695 BOOL defer_ok = FALSE;
696 BOOL callout_defer_ok = FALSE;
697 BOOL no_details = FALSE;
698 address_item *sender_vaddr = NULL;
699 uschar *verify_sender_address = NULL;
700 uschar *pm_mailfrom = NULL;
701 uschar *se_mailfrom = NULL;
703 uschar *ss = string_nextinlist(&list, &sep, big_buffer, big_buffer_size);
705 if (ss == NULL) goto BAD_VERIFY;
707 /* Handle name/address consistency verification in a separate function. */
709 if (strcmpic(ss, US"reverse_host_lookup") == 0)
711 if (sender_host_address == NULL) return OK;
712 return acl_verify_reverse(user_msgptr, log_msgptr);
715 /* TLS certificate verification is done at STARTTLS time; here we just
716 test whether it was successful or not. (This is for optional verification; for
717 mandatory verification, the connection doesn't last this long.) */
719 if (strcmpic(ss, US"certificate") == 0)
721 if (tls_certificate_verified) return OK;
722 *user_msgptr = US"no verified certificate";
726 /* We can test the result of optional HELO verification */
728 if (strcmpic(ss, US"helo") == 0) return helo_verified? OK : FAIL;
730 /* Handle header verification options - permitted only after DATA or a non-SMTP
733 if (strncmpic(ss, US"header_", 7) == 0)
735 if (where != ACL_WHERE_DATA && where != ACL_WHERE_NOTSMTP)
737 *log_msgptr = string_sprintf("cannot check header contents in ACL for %s "
738 "(only possible in ACL for DATA)", acl_wherenames[where]);
742 /* Check that all relevant header lines have the correct syntax. If there is
743 a syntax error, we return details of the error to the sender if configured to
744 send out full details. (But a "message" setting on the ACL can override, as
747 if (strcmpic(ss+7, US"syntax") == 0)
749 int rc = verify_check_headers(log_msgptr);
750 if (rc != OK && smtp_return_error_details && *log_msgptr != NULL)
751 *user_msgptr = string_sprintf("Rejected after DATA: %s", *log_msgptr);
755 /* Check that there is at least one verifiable sender address in the relevant
756 header lines. This can be followed by callout and defer options, just like
757 sender and recipient. */
759 else if (strcmpic(ss+7, US"sender") == 0) verify_header_sender = TRUE;
761 /* Unknown verify argument starting with "header_" */
763 else goto BAD_VERIFY;
766 /* Otherwise, first item in verify argument must be "sender" or "recipient".
767 In the case of a sender, this can optionally be followed by an address to use
768 in place of the actual sender (rare special-case requirement). */
770 else if (strncmpic(ss, US"sender", 6) == 0)
773 if (where > ACL_WHERE_NOTSMTP)
775 *log_msgptr = string_sprintf("cannot verify sender in ACL for %s "
776 "(only possible for MAIL, RCPT, PREDATA, or DATA)",
777 acl_wherenames[where]);
781 verify_sender_address = sender_address;
784 while (isspace(*s)) s++;
785 if (*s++ != '=') goto BAD_VERIFY;
786 while (isspace(*s)) s++;
787 verify_sender_address = string_copy(s);
792 if (strcmpic(ss, US"recipient") != 0) goto BAD_VERIFY;
795 *log_msgptr = string_sprintf("cannot verify recipient in ACL for %s "
796 "(only possible for RCPT)", acl_wherenames[where]);
801 /* Remaining items are optional */
803 while ((ss = string_nextinlist(&list, &sep, big_buffer, big_buffer_size))
806 if (strcmpic(ss, US"defer_ok") == 0) defer_ok = TRUE;
807 else if (strcmpic(ss, US"no_details") == 0) no_details = TRUE;
809 /* These two old options are left for backwards compatibility */
811 else if (strcmpic(ss, US"callout_defer_ok") == 0)
813 callout_defer_ok = TRUE;
814 if (callout == -1) callout = CALLOUT_TIMEOUT_DEFAULT;
817 else if (strcmpic(ss, US"check_postmaster") == 0)
820 if (callout == -1) callout = CALLOUT_TIMEOUT_DEFAULT;
823 /* The callout option has a number of sub-options, comma separated */
825 else if (strncmpic(ss, US"callout", 7) == 0)
827 callout = CALLOUT_TIMEOUT_DEFAULT;
831 while (isspace(*ss)) ss++;
837 while (isspace(*ss)) ss++;
838 while ((opt = string_nextinlist(&ss, &optsep, buffer, sizeof(buffer)))
841 if (strcmpic(opt, US"defer_ok") == 0) callout_defer_ok = TRUE;
842 else if (strcmpic(opt, US"no_cache") == 0)
843 verify_options |= vopt_callout_no_cache;
844 else if (strcmpic(opt, US"random") == 0)
845 verify_options |= vopt_callout_random;
846 else if (strcmpic(opt, US"use_sender") == 0)
847 verify_options |= vopt_callout_recipsender;
848 else if (strcmpic(opt, US"use_postmaster") == 0)
849 verify_options |= vopt_callout_recippmaster;
850 else if (strcmpic(opt, US"postmaster") == 0) pm_mailfrom = US"";
852 else if (strncmpic(opt, US"mailfrom", 8) == 0)
854 if (!verify_header_sender)
856 *log_msgptr = string_sprintf("\"mailfrom\" is allowed as a "
857 "callout option only for verify=header_sender (detected in ACL "
858 "condition \"%s\")", arg);
862 while (isspace(*opt)) opt++;
865 *log_msgptr = string_sprintf("'=' expected after "
866 "\"mailfrom\" in ACL condition \"%s\"", arg);
869 while (isspace(*opt)) opt++;
870 se_mailfrom = string_copy(opt);
873 else if (strncmpic(opt, US"postmaster_mailfrom", 19) == 0)
876 while (isspace(*opt)) opt++;
879 *log_msgptr = string_sprintf("'=' expected after "
880 "\"postmaster_mailfrom\" in ACL condition \"%s\"", arg);
883 while (isspace(*opt)) opt++;
884 pm_mailfrom = string_copy(opt);
887 else if (strncmpic(opt, US"maxwait", 7) == 0)
890 while (isspace(*opt)) opt++;
893 *log_msgptr = string_sprintf("'=' expected after \"maxwait\" in "
894 "ACL condition \"%s\"", arg);
897 while (isspace(*opt)) opt++;
898 callout_overall = readconf_readtime(opt, 0, FALSE);
899 if (callout_overall < 0)
901 *log_msgptr = string_sprintf("bad time value in ACL condition "
902 "\"verify %s\"", arg);
906 else /* Plain time is callout connect/command timeout */
908 callout = readconf_readtime(opt, 0, FALSE);
911 *log_msgptr = string_sprintf("bad time value in ACL condition "
912 "\"verify %s\"", arg);
920 *log_msgptr = string_sprintf("'=' expected after \"callout\" in "
921 "ACL condition \"%s\"", arg);
927 /* Option not recognized */
931 *log_msgptr = string_sprintf("unknown option \"%s\" in ACL "
932 "condition \"verify %s\"", ss, arg);
937 if ((verify_options & (vopt_callout_recipsender|vopt_callout_recippmaster)) ==
938 (vopt_callout_recipsender|vopt_callout_recippmaster))
940 *log_msgptr = US"only one of use_sender and use_postmaster can be set "
941 "for a recipient callout";
945 /* Handle sender-in-header verification. Default the user message to the log
946 message if giving out verification details. */
948 if (verify_header_sender)
950 rc = verify_check_header_address(user_msgptr, log_msgptr, callout,
951 callout_overall, se_mailfrom, pm_mailfrom, verify_options);
952 if (smtp_return_error_details)
954 if (*user_msgptr == NULL && *log_msgptr != NULL)
955 *user_msgptr = string_sprintf("Rejected after DATA: %s", *log_msgptr);
956 if (rc == DEFER) acl_temp_details = TRUE;
960 /* Handle a sender address. The default is to verify *the* sender address, but
961 optionally a different address can be given, for special requirements. If the
962 address is empty, we are dealing with a bounce message that has no sender, so
963 we cannot do any checking. If the real sender address gets rewritten during
964 verification (e.g. DNS widening), set the flag to stop it being rewritten again
965 during message reception.
967 A list of verified "sender" addresses is kept to try to avoid doing to much
968 work repetitively when there are multiple recipients in a message and they all
969 require sender verification. However, when callouts are involved, it gets too
970 complicated because different recipients may require different callout options.
971 Therefore, we always do a full sender verify when any kind of callout is
972 specified. Caching elsewhere, for instance in the DNS resolver and in the
973 callout handling, should ensure that this is not terribly inefficient. */
975 else if (verify_sender_address != NULL)
977 if ((verify_options & (vopt_callout_recipsender|vopt_callout_recippmaster))
980 *log_msgptr = US"use_sender or use_postmaster cannot be used for a "
981 "sender verify callout";
985 sender_vaddr = verify_checked_sender(verify_sender_address);
986 if (sender_vaddr != NULL && /* Previously checked */
987 callout <= 0) /* No callout needed this time */
989 /* If the "routed" flag is set, it means that routing worked before, so
990 this check can give OK (the saved return code value, if set, belongs to a
991 callout that was done previously). If the "routed" flag is not set, routing
992 must have failed, so we use the saved return code. */
994 if (testflag(sender_vaddr, af_verify_routed)) rc = OK; else
996 rc = sender_vaddr->special_action;
997 *basic_errno = sender_vaddr->basic_errno;
999 HDEBUG(D_acl) debug_printf("using cached sender verify result\n");
1002 /* Do a new verification, and cache the result. The cache is used to avoid
1003 verifying the sender multiple times for multiple RCPTs when callouts are not
1004 specified (see comments above).
1006 The cache is also used on failure to give details in response to the first
1007 RCPT that gets bounced for this reason. However, this can be suppressed by
1008 the no_details option, which sets the flag that says "this detail has already
1009 been sent". The cache normally contains just one address, but there may be
1010 more in esoteric circumstances. */
1015 sender_vaddr = deliver_make_addr(verify_sender_address, TRUE);
1016 if (no_details) setflag(sender_vaddr, af_sverify_told);
1017 if (verify_sender_address[0] != 0)
1019 /* If this is the real sender address, save the unrewritten version
1020 for use later in receive. Otherwise, set a flag so that rewriting the
1021 sender in verify_address() does not update sender_address. */
1023 if (verify_sender_address == sender_address)
1024 sender_address_unrewritten = sender_address;
1026 verify_options |= vopt_fake_sender;
1028 /* The recipient, qualify, and expn options are never set in
1031 rc = verify_address(sender_vaddr, NULL, verify_options, callout,
1032 callout_overall, se_mailfrom, pm_mailfrom, &routed);
1034 HDEBUG(D_acl) debug_printf("----------- end verify ------------\n");
1038 if (Ustrcmp(sender_vaddr->address, verify_sender_address) != 0)
1040 DEBUG(D_acl) debug_printf("sender %s verified ok as %s\n",
1041 verify_sender_address, sender_vaddr->address);
1045 DEBUG(D_acl) debug_printf("sender %s verified ok\n",
1046 verify_sender_address);
1049 else *basic_errno = sender_vaddr->basic_errno;
1051 else rc = OK; /* Null sender */
1053 /* Cache the result code */
1055 if (routed) setflag(sender_vaddr, af_verify_routed);
1056 if (callout > 0) setflag(sender_vaddr, af_verify_callout);
1057 sender_vaddr->special_action = rc;
1058 sender_vaddr->next = sender_verified_list;
1059 sender_verified_list = sender_vaddr;
1063 /* A recipient address just gets a straightforward verify; again we must handle
1064 the DEFER overrides. */
1070 /* We must use a copy of the address for verification, because it might
1074 rc = verify_address(&addr2, NULL, verify_options|vopt_is_recipient, callout,
1075 callout_overall, se_mailfrom, pm_mailfrom, NULL);
1076 HDEBUG(D_acl) debug_printf("----------- end verify ------------\n");
1077 *log_msgptr = addr2.message;
1078 *user_msgptr = addr2.user_message;
1079 *basic_errno = addr2.basic_errno;
1081 /* Make $address_data visible */
1082 deliver_address_data = addr2.p.address_data;
1085 /* We have a result from the relevant test. Handle defer overrides first. */
1087 if (rc == DEFER && (defer_ok ||
1088 (callout_defer_ok && *basic_errno == ERRNO_CALLOUTDEFER)))
1090 HDEBUG(D_acl) debug_printf("verify defer overridden by %s\n",
1091 defer_ok? "defer_ok" : "callout_defer_ok");
1095 /* If we've failed a sender, set up a recipient message, and point
1096 sender_verified_failed to the address item that actually failed. */
1098 if (rc != OK && verify_sender_address != NULL)
1102 *log_msgptr = *user_msgptr = US"Sender verify failed";
1104 else if (*basic_errno != ERRNO_CALLOUTDEFER)
1106 *log_msgptr = *user_msgptr = US"Could not complete sender verify";
1110 *log_msgptr = US"Could not complete sender verify callout";
1111 *user_msgptr = smtp_return_error_details? sender_vaddr->user_message :
1115 sender_verified_failed = sender_vaddr;
1118 /* Verifying an address messes up the values of $domain and $local_part,
1119 so reset them before returning if this is a RCPT ACL. */
1123 deliver_domain = addr->domain;
1124 deliver_localpart = addr->local_part;
1128 /* Syntax errors in the verify argument come here. */
1131 *log_msgptr = string_sprintf("expected \"sender[=address]\", \"recipient\", "
1132 "\"header_syntax\" or \"header_sender\" at start of ACL condition "
1133 "\"verify %s\"", arg);
1140 /*************************************************
1141 * Check argument for control= modifier *
1142 *************************************************/
1144 /* Called from acl_check_condition() below
1147 arg the argument string for control=
1148 pptr set to point to the terminating character
1149 where which ACL we are in
1150 log_msgptr for error messages
1152 Returns: CONTROL_xxx value
1156 decode_control(uschar *arg, uschar **pptr, int where, uschar **log_msgptr)
1161 for (d = controls_list;
1162 d < controls_list + sizeof(controls_list)/sizeof(control_def);
1165 len = Ustrlen(d->name);
1166 if (Ustrncmp(d->name, arg, len) == 0) break;
1169 if (d >= controls_list + sizeof(controls_list)/sizeof(control_def) ||
1170 (arg[len] != 0 && (!d->has_option || arg[len] != '/')))
1172 *log_msgptr = string_sprintf("syntax error in \"control=%s\"", arg);
1173 return CONTROL_ERROR;
1182 /*************************************************
1183 * Handle conditions/modifiers on an ACL item *
1184 *************************************************/
1186 /* Called from acl_check() below.
1190 cb ACL condition block - if NULL, result is OK
1191 where where called from
1192 addr the address being checked for RCPT, or NULL
1193 level the nesting level
1194 epp pointer to pass back TRUE if "endpass" encountered
1195 (applies only to "accept" and "discard")
1196 user_msgptr user message pointer
1197 log_msgptr log message pointer
1198 basic_errno pointer to where to put verify error
1200 Returns: OK - all conditions are met
1201 DISCARD - an "acl" condition returned DISCARD - only allowed
1202 for "accept" or "discard" verbs
1203 FAIL - at least one condition fails
1204 FAIL_DROP - an "acl" condition returned FAIL_DROP
1205 DEFER - can't tell at the moment (typically, lookup defer,
1206 but can be temporary callout problem)
1207 ERROR - ERROR from nested ACL or expansion failure or other
1212 acl_check_condition(int verb, acl_condition_block *cb, int where,
1213 address_item *addr, int level, BOOL *epp, uschar **user_msgptr,
1214 uschar **log_msgptr, int *basic_errno)
1216 uschar *user_message = NULL;
1217 uschar *log_message = NULL;
1221 for (; cb != NULL; cb = cb->next)
1226 /* The message and log_message items set up messages to be used in
1227 case of rejection. They are expanded later. */
1229 if (cb->type == ACLC_MESSAGE)
1231 user_message = cb->arg;
1235 if (cb->type == ACLC_LOG_MESSAGE)
1237 log_message = cb->arg;
1241 /* The endpass "condition" just sets a flag to show it occurred. This is
1242 checked at compile time to be on an "accept" or "discard" item. */
1244 if (cb->type == ACLC_ENDPASS)
1250 /* For other conditions and modifiers, the argument is expanded now for some
1251 of them, but not for all, because expansion happens down in some lower level
1252 checking functions in some cases. */
1254 if (cond_expand_at_top[cb->type])
1256 arg = expand_string(cb->arg);
1259 if (expand_string_forcedfail) continue;
1260 *log_msgptr = string_sprintf("failed to expand ACL string \"%s\": %s",
1261 cb->arg, expand_string_message);
1262 return search_find_defer? DEFER : ERROR;
1267 /* Show condition, and expanded condition if it's different */
1272 debug_printf("check %s%s %n",
1273 (!cond_modifiers[cb->type] && cb->u.negated)? "!":"",
1274 conditions[cb->type], &lhswidth);
1276 if (cb->type == ACLC_SET)
1278 int n = cb->u.varnumber;
1279 int t = (n < ACL_C_MAX)? 'c' : 'm';
1280 if (n >= ACL_C_MAX) n -= ACL_C_MAX;
1281 debug_printf("acl_%c%d ", t, n);
1285 debug_printf("= %s\n", cb->arg);
1288 debug_printf("%.*s= %s\n", lhswidth,
1292 /* Check that this condition makes sense at this time */
1294 if ((cond_forbids[cb->type] & (1 << where)) != 0)
1296 *log_msgptr = string_sprintf("cannot %s %s condition in %s ACL",
1297 cond_modifiers[cb->type]? "use" : "test",
1298 conditions[cb->type], acl_wherenames[where]);
1302 /* Run the appropriate test for each condition, or take the appropriate
1303 action for the remaining modifiers. */
1307 /* A nested ACL that returns "discard" makes sense only for an "accept" or
1311 rc = acl_check_internal(where, addr, arg, level+1, user_msgptr, log_msgptr);
1312 if (rc == DISCARD && verb != ACL_ACCEPT && verb != ACL_DISCARD)
1314 *log_msgptr = string_sprintf("nested ACL returned \"discard\" for "
1315 "\"%s\" command (only allowed with \"accept\" or \"discard\")",
1321 case ACLC_AUTHENTICATED:
1322 rc = (sender_host_authenticated == NULL)? FAIL :
1323 match_isinlist(sender_host_authenticated, &arg, 0, NULL, NULL, MCL_STRING,
1327 case ACLC_CONDITION:
1328 if (Ustrspn(arg, "0123456789") == Ustrlen(arg)) /* Digits, or empty */
1329 rc = (Uatoi(arg) == 0)? FAIL : OK;
1331 rc = (strcmpic(arg, US"no") == 0 ||
1332 strcmpic(arg, US"false") == 0)? FAIL :
1333 (strcmpic(arg, US"yes") == 0 ||
1334 strcmpic(arg, US"true") == 0)? OK : DEFER;
1336 *log_msgptr = string_sprintf("invalid \"condition\" value \"%s\"", arg);
1340 control_type = decode_control(arg, &p, where, log_msgptr);
1342 /* Check this control makes sense at this time */
1344 if ((control_forbids[control_type] & (1 << where)) != 0)
1346 *log_msgptr = string_sprintf("cannot use \"control=%s\" in %s ACL",
1347 controls[control_type], acl_wherenames[where]);
1351 switch(control_type)
1356 case CONTROL_CASEFUL_LOCAL_PART:
1357 deliver_localpart = addr->cc_local_part;
1360 case CONTROL_CASELOWER_LOCAL_PART:
1361 deliver_localpart = addr->lc_local_part;
1364 case CONTROL_ENFORCE_SYNC:
1365 smtp_enforce_sync = TRUE;
1368 case CONTROL_NO_ENFORCE_SYNC:
1369 smtp_enforce_sync = FALSE;
1372 case CONTROL_NO_MULTILINE:
1373 no_multiline_responses = TRUE;
1376 case CONTROL_FREEZE:
1377 deliver_freeze = TRUE;
1378 deliver_frozen_at = time(NULL);
1381 case CONTROL_QUEUE_ONLY:
1382 queue_only_policy = TRUE;
1385 case CONTROL_SUBMISSION:
1386 submission_mode = TRUE;
1389 if (Ustrncmp(p, "/sender_retain", 14) == 0)
1392 active_local_sender_retain = TRUE;
1393 active_local_from_check = FALSE;
1395 else if (Ustrncmp(p, "/domain=", 8) == 0)
1398 while (*pp != 0 && *pp != '/') pp++;
1399 submission_domain = string_copyn(p+8, pp-p);
1406 *log_msgptr = string_sprintf("syntax error in \"control=%s\"", arg);
1415 int delay = readconf_readtime(arg, 0, FALSE);
1418 *log_msgptr = string_sprintf("syntax error in argument for \"delay\" "
1419 "modifier: \"%s\" is not a time value", arg);
1424 HDEBUG(D_acl) debug_printf("delay modifier requests %d-second delay\n",
1429 debug_printf("delay skipped in -bh checking mode\n");
1437 rc = verify_check_dnsbl(&arg);
1441 rc = match_isinlist(addr->domain, &arg, 0, &domainlist_anchor,
1442 addr->domain_cache, MCL_DOMAIN, TRUE, &deliver_domain_data);
1445 /* The value in tls_cipher is the full cipher name, for example,
1446 TLSv1:DES-CBC3-SHA:168, whereas the values to test for are just the
1447 cipher names such as DES-CBC3-SHA. But program defensively. We don't know
1448 what may in practice come out of the SSL library - which at the time of
1449 writing is poorly documented. */
1451 case ACLC_ENCRYPTED:
1452 if (tls_cipher == NULL) rc = FAIL; else
1454 uschar *endcipher = NULL;
1455 uschar *cipher = Ustrchr(tls_cipher, ':');
1456 if (cipher == NULL) cipher = tls_cipher; else
1458 endcipher = Ustrchr(++cipher, ':');
1459 if (endcipher != NULL) *endcipher = 0;
1461 rc = match_isinlist(cipher, &arg, 0, NULL, NULL, MCL_STRING, TRUE, NULL);
1462 if (endcipher != NULL) *endcipher = ':';
1466 /* Use verify_check_this_host() instead of verify_check_host() so that
1467 we can pass over &host_data to catch any looked up data. Once it has been
1468 set, it retains its value so that it's still there if another ACL verb
1469 comes through here and uses the cache. However, we must put it into
1470 permanent store in case it is also expected to be used in a subsequent
1471 message in the same SMTP connection. */
1474 rc = verify_check_this_host(&arg, sender_host_cache, NULL,
1475 (sender_host_address == NULL)? US"" : sender_host_address, &host_data);
1476 if (host_data != NULL) host_data = string_copy_malloc(host_data);
1479 case ACLC_LOCAL_PARTS:
1480 rc = match_isinlist(addr->cc_local_part, &arg, 0,
1481 &localpartlist_anchor, addr->localpart_cache, MCL_LOCALPART, TRUE,
1482 &deliver_localpart_data);
1494 if (Ustrncmp(s, "main", 4) == 0)
1495 { logbits |= LOG_MAIN; s += 4; }
1496 else if (Ustrncmp(s, "panic", 5) == 0)
1497 { logbits |= LOG_PANIC; s += 5; }
1498 else if (Ustrncmp(s, "reject", 6) == 0)
1499 { logbits |= LOG_REJECT; s += 6; }
1502 logbits = LOG_MAIN|LOG_PANIC;
1503 s = string_sprintf(":unknown log name in \"%s\" in "
1504 "\"logwrite\" in %s ACL", arg, acl_wherenames[where]);
1510 while (isspace(*s)) s++;
1511 if (logbits == 0) logbits = LOG_MAIN;
1512 log_write(0, logbits, "%s", string_printing(s));
1516 case ACLC_RECIPIENTS:
1517 rc = match_address_list(addr->address, TRUE, TRUE, &arg, NULL, -1, 0,
1521 case ACLC_SENDER_DOMAINS:
1524 sdomain = Ustrrchr(sender_address, '@');
1525 sdomain = (sdomain == NULL)? US"" : sdomain + 1;
1526 rc = match_isinlist(sdomain, &arg, 0, &domainlist_anchor,
1527 sender_domain_cache, MCL_DOMAIN, TRUE, NULL);
1532 rc = match_address_list(sender_address, TRUE, TRUE, &arg,
1533 sender_address_cache, -1, 0, &sender_data);
1536 /* Connection variables must persist forever */
1540 int old_pool = store_pool;
1541 if (cb->u.varnumber < ACL_C_MAX) store_pool = POOL_PERM;
1542 acl_var[cb->u.varnumber] = string_copy(arg);
1543 store_pool = old_pool;
1547 /* If the verb is WARN, discard any user message from verification, because
1548 such messages are SMTP responses, not header additions. The latter come
1549 only from explicit "message" modifiers. */
1552 rc = acl_verify(where, addr, arg, user_msgptr, log_msgptr, basic_errno);
1553 if (verb == ACL_WARN) *user_msgptr = NULL;
1557 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "internal ACL error: unknown "
1558 "condition %d", cb->type);
1562 /* If a condition was negated, invert OK/FAIL. */
1564 if (!cond_modifiers[cb->type] && cb->u.negated)
1566 if (rc == OK) rc = FAIL;
1567 else if (rc == FAIL || rc == FAIL_DROP) rc = OK;
1570 if (rc != OK) break; /* Conditions loop */
1574 /* If the result is the one for which "message" and/or "log_message" are used,
1575 handle the values of these options. Most verbs have but a single return for
1576 which the messages are relevant, but for "discard", it's useful to have the log
1577 message both when it succeeds and when it fails. Also, for an "accept" that
1578 appears in a QUIT ACL, we want to handle the user message. Since only "accept"
1579 and "warn" are permitted in that ACL, we don't need to test the verb.
1581 These modifiers act in different ways:
1583 "message" is a user message that will be included in an SMTP response. Unless
1584 it is empty, it overrides any previously set user message.
1586 "log_message" is a non-user message, and it adds to any existing non-user
1587 message that is already set.
1589 If there isn't a log message set, we make it the same as the user message. */
1591 if (((rc == FAIL_DROP)? FAIL : rc) == msgcond[verb] ||
1592 (verb == ACL_DISCARD && rc == OK) ||
1593 (where == ACL_WHERE_QUIT))
1597 /* If the verb is "warn", messages generated by conditions (verification or
1598 nested ACLs) are discarded. Only messages specified at this level are used.
1599 However, the value of an existing message is available in $acl_verify_message
1600 during expansions. */
1602 uschar *old_user_msgptr = *user_msgptr;
1603 uschar *old_log_msgptr = (*log_msgptr != NULL)? *log_msgptr : old_user_msgptr;
1605 if (verb == ACL_WARN) *log_msgptr = *user_msgptr = NULL;
1607 if (user_message != NULL)
1609 acl_verify_message = old_user_msgptr;
1610 expmessage = expand_string(user_message);
1611 if (expmessage == NULL)
1613 if (!expand_string_forcedfail)
1614 log_write(0, LOG_MAIN|LOG_PANIC, "failed to expand ACL message \"%s\": %s",
1615 user_message, expand_string_message);
1617 else if (expmessage[0] != 0) *user_msgptr = expmessage;
1620 if (log_message != NULL)
1622 acl_verify_message = old_log_msgptr;
1623 expmessage = expand_string(log_message);
1624 if (expmessage == NULL)
1626 if (!expand_string_forcedfail)
1627 log_write(0, LOG_MAIN|LOG_PANIC, "failed to expand ACL message \"%s\": %s",
1628 log_message, expand_string_message);
1630 else if (expmessage[0] != 0)
1632 *log_msgptr = (*log_msgptr == NULL)? expmessage :
1633 string_sprintf("%s: %s", expmessage, *log_msgptr);
1637 /* If no log message, default it to the user message */
1639 if (*log_msgptr == NULL) *log_msgptr = *user_msgptr;
1642 acl_verify_message = NULL;
1650 /*************************************************
1651 * Get line from a literal ACL *
1652 *************************************************/
1654 /* This function is passed to acl_read() in order to extract individual lines
1655 of a literal ACL, which we access via static pointers. We can destroy the
1656 contents because this is called only once (the compiled ACL is remembered).
1658 This code is intended to treat the data in the same way as lines in the main
1659 Exim configuration file. That is:
1661 . Leading spaces are ignored.
1663 . A \ at the end of a line is a continuation - trailing spaces after the \
1664 are permitted (this is because I don't believe in making invisible things
1665 significant). Leading spaces on the continued part of a line are ignored.
1667 . Physical lines starting (significantly) with # are totally ignored, and
1668 may appear within a sequence of backslash-continued lines.
1670 . Blank lines are ignored, but will end a sequence of continuations.
1673 Returns: a pointer to the next line
1677 static uschar *acl_text; /* Current pointer in the text */
1678 static uschar *acl_text_end; /* Points one past the terminating '0' */
1686 /* This loop handles leading blank lines and comments. */
1690 while (isspace(*acl_text)) acl_text++; /* Leading spaces/empty lines */
1691 if (*acl_text == 0) return NULL; /* No more data */
1692 yield = acl_text; /* Potential data line */
1694 while (*acl_text != 0 && *acl_text != '\n') acl_text++;
1696 /* If we hit the end before a newline, we have the whole logical line. If
1697 it's a comment, there's no more data to be given. Otherwise, yield it. */
1699 if (*acl_text == 0) return (*yield == '#')? NULL : yield;
1701 /* After reaching a newline, end this loop if the physical line does not
1702 start with '#'. If it does, it's a comment, and the loop continues. */
1704 if (*yield != '#') break;
1707 /* This loop handles continuations. We know we have some real data, ending in
1708 newline. See if there is a continuation marker at the end (ignoring trailing
1709 white space). We know that *yield is not white space, so no need to test for
1710 cont > yield in the backwards scanning loop. */
1715 for (cont = acl_text - 1; isspace(*cont); cont--);
1717 /* If no continuation follows, we are done. Mark the end of the line and
1726 /* We have encountered a continuation. Skip over whitespace at the start of
1727 the next line, and indeed the whole of the next line or lines if they are
1732 while (*(++acl_text) == ' ' || *acl_text == '\t');
1733 if (*acl_text != '#') break;
1734 while (*(++acl_text) != 0 && *acl_text != '\n');
1737 /* We have the start of a continuation line. Move all the rest of the data
1738 to join onto the previous line, and then find its end. If the end is not a
1739 newline, we are done. Otherwise loop to look for another continuation. */
1741 memmove(cont, acl_text, acl_text_end - acl_text);
1742 acl_text_end -= acl_text - cont;
1744 while (*acl_text != 0 && *acl_text != '\n') acl_text++;
1745 if (*acl_text == 0) return yield;
1748 /* Control does not reach here */
1755 /*************************************************
1756 * Check access using an ACL *
1757 *************************************************/
1759 /* This function is called from address_check. It may recurse via
1760 acl_check_condition() - hence the use of a level to stop looping. The ACL is
1761 passed as a string which is expanded. A forced failure implies no access check
1762 is required. If the result is a single word, it is taken as the name of an ACL
1763 which is sought in the global ACL tree. Otherwise, it is taken as literal ACL
1764 text, complete with newlines, and parsed as such. In both cases, the ACL check
1765 is then run. This function uses an auxiliary function for acl_read() to call
1766 for reading individual lines of a literal ACL. This is acl_getline(), which
1767 appears immediately above.
1770 where where called from
1771 addr address item when called from RCPT; otherwise NULL
1772 s the input string; NULL is the same as an empty ACL => DENY
1773 level the nesting level
1774 user_msgptr where to put a user error (for SMTP response)
1775 log_msgptr where to put a logging message (not for SMTP response)
1777 Returns: OK access is granted
1778 DISCARD access is apparently granted...
1779 FAIL access is denied
1780 FAIL_DROP access is denied; drop the connection
1781 DEFER can't tell at the moment
1786 acl_check_internal(int where, address_item *addr, uschar *s, int level,
1787 uschar **user_msgptr, uschar **log_msgptr)
1790 acl_block *acl = NULL;
1791 uschar *acl_name = US"inline ACL";
1794 /* Catch configuration loops */
1798 *log_msgptr = US"ACL nested too deep: possible loop";
1804 HDEBUG(D_acl) debug_printf("ACL is NULL: implicit DENY\n");
1808 /* At top level, we expand the incoming string. At lower levels, it has already
1809 been expanded as part of condition processing. */
1813 ss = expand_string(s);
1816 if (expand_string_forcedfail) return OK;
1817 *log_msgptr = string_sprintf("failed to expand ACL string \"%s\": %s", s,
1818 expand_string_message);
1824 while (isspace(*ss))ss++;
1826 /* If we can't find a named ACL, the default is to parse it as an inline one.
1827 (Unless it begins with a slash; non-existent files give rise to an error.) */
1831 /* Handle the case of a string that does not contain any spaces. Look for a
1832 named ACL among those read from the configuration, or a previously read file.
1833 It is possible that the pointer to the ACL is NULL if the configuration
1834 contains a name with no data. If not found, and the text begins with '/',
1835 read an ACL from a file, and save it so it can be re-used. */
1837 if (Ustrchr(ss, ' ') == NULL)
1839 tree_node *t = tree_search(acl_anchor, ss);
1842 acl = (acl_block *)(t->data.ptr);
1845 HDEBUG(D_acl) debug_printf("ACL \"%s\" is empty: implicit DENY\n", ss);
1848 acl_name = string_sprintf("ACL \"%s\"", ss);
1849 HDEBUG(D_acl) debug_printf("using ACL \"%s\"\n", ss);
1852 else if (*ss == '/')
1854 struct stat statbuf;
1855 fd = Uopen(ss, O_RDONLY, 0);
1858 *log_msgptr = string_sprintf("failed to open ACL file \"%s\": %s", ss,
1863 if (fstat(fd, &statbuf) != 0)
1865 *log_msgptr = string_sprintf("failed to fstat ACL file \"%s\": %s", ss,
1870 acl_text = store_get(statbuf.st_size + 1);
1871 acl_text_end = acl_text + statbuf.st_size + 1;
1873 if (read(fd, acl_text, statbuf.st_size) != statbuf.st_size)
1875 *log_msgptr = string_sprintf("failed to read ACL file \"%s\": %s",
1876 ss, strerror(errno));
1879 acl_text[statbuf.st_size] = 0;
1882 acl_name = string_sprintf("ACL \"%s\"", ss);
1883 HDEBUG(D_acl) debug_printf("read ACL from file %s\n", ss);
1887 /* Parse an ACL that is still in text form. If it came from a file, remember it
1888 in the ACL tree, having read it into the POOL_PERM store pool so that it
1889 persists between multiple messages. */
1893 int old_pool = store_pool;
1894 if (fd >= 0) store_pool = POOL_PERM;
1895 acl = acl_read(acl_getline, log_msgptr);
1896 store_pool = old_pool;
1897 if (acl == NULL && *log_msgptr != NULL) return ERROR;
1900 tree_node *t = store_get_perm(sizeof(tree_node) + Ustrlen(ss));
1901 Ustrcpy(t->name, ss);
1903 (void)tree_insertnode(&acl_anchor, t);
1907 /* Now we have an ACL to use. It's possible it may be NULL. */
1912 int basic_errno = 0;
1913 BOOL endpass_seen = FALSE;
1915 *log_msgptr = *user_msgptr = NULL;
1916 acl_temp_details = FALSE;
1918 if (where == ACL_WHERE_QUIT &&
1919 acl->verb != ACL_ACCEPT &&
1920 acl->verb != ACL_WARN)
1922 *log_msgptr = string_sprintf("\"%s\" is not allowed in a QUIT ACL",
1927 HDEBUG(D_acl) debug_printf("processing \"%s\"\n", verbs[acl->verb]);
1929 /* Clear out any search error message from a previous check before testing
1932 search_error_message = NULL;
1933 cond = acl_check_condition(acl->verb, acl->condition, where, addr, level,
1934 &endpass_seen, user_msgptr, log_msgptr, &basic_errno);
1936 /* Handle special returns: DEFER causes a return except on a WARN verb;
1937 ERROR always causes a return. */
1942 HDEBUG(D_acl) debug_printf("%s: condition test deferred\n", verbs[acl->verb]);
1943 if (basic_errno != ERRNO_CALLOUTDEFER)
1945 if (search_error_message != NULL && *search_error_message != 0)
1946 *log_msgptr = search_error_message;
1947 if (smtp_return_error_details) acl_temp_details = TRUE;
1951 acl_temp_details = TRUE;
1953 if (acl->verb != ACL_WARN) return DEFER;
1956 default: /* Paranoia */
1958 HDEBUG(D_acl) debug_printf("%s: condition test error\n", verbs[acl->verb]);
1962 HDEBUG(D_acl) debug_printf("%s: condition test succeeded\n",
1967 HDEBUG(D_acl) debug_printf("%s: condition test failed\n", verbs[acl->verb]);
1970 /* DISCARD and DROP can happen only from a nested ACL condition, and
1971 DISCARD can happen only for an "accept" or "discard" verb. */
1974 HDEBUG(D_acl) debug_printf("%s: condition test yielded \"discard\"\n",
1979 HDEBUG(D_acl) debug_printf("%s: condition test yielded \"drop\"\n",
1984 /* At this point, cond for most verbs is either OK or FAIL or (as a result of
1985 a nested ACL condition) FAIL_DROP. However, for WARN, cond may be DEFER, and
1986 for ACCEPT and DISCARD, it may be DISCARD after a nested ACL call. */
1991 if (cond == OK || cond == DISCARD) return cond;
1994 HDEBUG(D_acl) debug_printf("accept: endpass encountered - denying access\n");
2002 acl_temp_details = TRUE;
2008 if (cond == OK) return FAIL;
2012 if (cond == OK || cond == DISCARD) return DISCARD;
2015 HDEBUG(D_acl) debug_printf("discard: endpass encountered - denying access\n");
2021 if (cond == OK) return FAIL_DROP;
2025 if (cond != OK) return cond;
2030 acl_warn(where, *user_msgptr, *log_msgptr);
2031 else if (cond == DEFER)
2032 acl_warn(where, NULL, string_sprintf("ACL \"warn\" statement skipped: "
2033 "condition test deferred: %s",
2034 (*log_msgptr == NULL)? US"" : *log_msgptr));
2035 *log_msgptr = *user_msgptr = NULL; /* In case implicit DENY follows */
2039 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "internal ACL error: unknown verb %d",
2044 /* Pass to the next ACL item */
2049 /* We have reached the end of the ACL. This is an implicit DENY. */
2051 HDEBUG(D_acl) debug_printf("end of %s: implicit DENY\n", acl_name);
2056 /*************************************************
2057 * Check access using an ACL *
2058 *************************************************/
2060 /* This is the external interface for ACL checks. It sets up an address and the
2061 expansions for $domain and $local_part when called after RCPT, then calls
2062 acl_check_internal() to do the actual work.
2065 where ACL_WHERE_xxxx indicating where called from
2066 data_string RCPT address, or SMTP command argument, or NULL
2067 s the input string; NULL is the same as an empty ACL => DENY
2068 user_msgptr where to put a user error (for SMTP response)
2069 log_msgptr where to put a logging message (not for SMTP response)
2071 Returns: OK access is granted by an ACCEPT verb
2072 DISCARD access is granted by a DISCARD verb
2073 FAIL access is denied
2074 FAIL_DROP access is denied; drop the connection
2075 DEFER can't tell at the moment
2080 acl_check(int where, uschar *data_string, uschar *s, uschar **user_msgptr,
2081 uschar **log_msgptr)
2087 *user_msgptr = *log_msgptr = NULL;
2088 sender_verified_failed = NULL;
2090 if (where == ACL_WHERE_RCPT)
2092 adb = address_defaults;
2094 addr->address = data_string;
2095 if (deliver_split_address(addr) == DEFER)
2097 *log_msgptr = US"defer in percent_hack_domains check";
2100 deliver_domain = addr->domain;
2101 deliver_localpart = addr->local_part;
2106 smtp_command_argument = data_string;
2109 rc = acl_check_internal(where, addr, s, 0, user_msgptr, log_msgptr);
2111 smtp_command_argument = deliver_domain =
2112 deliver_localpart = deliver_address_data = NULL;
2114 /* A DISCARD response is permitted only for message ACLs, excluding the PREDATA
2115 ACL, which is really in the middle of an SMTP command. */
2119 if (where > ACL_WHERE_NOTSMTP || where == ACL_WHERE_PREDATA)
2121 log_write(0, LOG_MAIN|LOG_PANIC, "\"discard\" verb not allowed in %s "
2122 "ACL", acl_wherenames[where]);
2128 /* A DROP response is not permitted from MAILAUTH */
2130 if (rc == FAIL_DROP && where == ACL_WHERE_MAILAUTH)
2132 log_write(0, LOG_MAIN|LOG_PANIC, "\"drop\" verb not allowed in %s "
2133 "ACL", acl_wherenames[where]);
2137 /* Before giving an error response, take a look at the length of any user
2138 message, and split it up into multiple lines if possible. */
2140 if (rc != OK && *user_msgptr != NULL && Ustrlen(*user_msgptr) > 75)
2142 uschar *s = *user_msgptr = string_copy(*user_msgptr);
2148 while (i < 75 && *ss != 0 && *ss != '\n') ss++, i++;
2149 if (*ss == 0) break;
2156 while (--t > s + 35)
2160 if (t[-1] == ':') { tt = t; break; }
2161 if (tt == NULL) tt = t;
2165 if (tt == NULL) /* Can't split behind - try ahead */
2170 if (*t == ' ' || *t == '\n')
2176 if (tt == NULL) break; /* Can't find anywhere to split */