2 * fetchmail.c -- main driver module for fetchmail
4 * For license terms, see the file COPYING in this directory.
9 #if defined(STDC_HEADERS)
12 #if defined(HAVE_UNISTD_H)
18 #if defined(HAVE_SYSLOG)
26 #include <sys/types.h>
28 #include <sys/time.h> /* needed for Sun 4.1.2 */
30 #include <sys/resource.h>
31 #endif /* HAVE_SETRLIMIT */
32 #include <sys/utsname.h>
35 #include "fetchmail.h"
43 #define ENETUNREACH 128 /* Interactive doesn't know this */
44 #endif /* ENETUNREACH */
46 /* prototypes for internal functions */
47 static int load_params(int, char **, int);
48 static void dump_params (struct runctl *runp, struct query *, flag implicit);
49 static int query_host(struct query *);
51 /* controls the detail level of status/progress messages written to stderr */
52 int outlevel; /* see the O_.* constants above */
54 /* miscellaneous global controls */
55 struct runctl run; /* global controls for this run */
56 flag nodetach; /* if TRUE, don't detach daemon process */
57 flag quitmode; /* if --quit was set */
58 flag check_only; /* if --probe was set */
59 flag versioninfo; /* emit only version info */
60 char *user; /* the name of the invoking user */
61 char *home; /* invoking user's home directory */
62 char *fmhome; /* fetchmail's home directory */
63 char *program_name; /* the name to prefix error messages with */
64 flag configdump; /* dump control blocks for configurator */
65 char *fetchmailhost; /* either `localhost' or the host's FQDN */
70 #endif /* NET_SECURITY */
72 static int querystatus; /* status of query */
73 static int successes; /* count number of successful polls */
74 static int activecount; /* count number of active entries */
75 static struct runctl cmd_run; /* global options set from command line */
76 static time_t parsetime; /* time of last parse */
78 static void terminate_run(int);
79 static void terminate_poll(int);
81 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
82 /* drop SGID kmem privileage until we need it */
83 static void dropprivs(void)
93 if (gr && !strcmp(gr->gr_name, "kmem"))
95 extern void interface_set_gids(gid_t egid, gid_t rgid);
96 interface_set_gids(egid, rgid);
102 #if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
105 static char *timestamp (void)
111 setlocale (LC_TIME, "");
112 strftime (buf, sizeof (buf), "%c", localtime(&now));
113 setlocale (LC_TIME, "C");
117 #define timestamp rfc822timestamp
120 int main(int argc, char **argv)
123 int parsestatus, implicitmode = FALSE;
125 netrc_entry *netrc_list;
126 char *netrc_file, *tmpbuf;
130 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
134 envquery(argc, argv);
136 setlocale (LC_ALL, "");
137 bindtextdomain(PACKAGE, LOCALEDIR);
142 * Note: because we can't initialize reporting before we know whether
143 * syslog is supposed to be on, this message will go to stdout and
144 * be lost when running in background.
146 if (outlevel >= O_VERBOSE)
150 report(stdout, GT_("fetchmail: invoked with"));
151 for (i = 0; i < argc; i++)
152 report(stdout, " %s", argv[i]);
153 report(stdout, "\n");
156 #define IDFILE_NAME ".fetchids"
157 run.idfile = (char *) xmalloc(strlen(fmhome)+sizeof(IDFILE_NAME)+2);
158 strcpy(run.idfile, fmhome);
159 strcat(run.idfile, "/");
160 strcat(run.idfile, IDFILE_NAME);
165 * We used to arrange for the lock to be removed on exit close
166 * to where the lock was asserted. Now we need to do it here, because
167 * we might have re-executed in background with an existing lock
168 * as the result of a changed rcfile (see the code near the execvp(3)
169 * call near the beginning of the polling loop for details). We want
170 * to be sure the lock gets nuked on any error exit, basically.
174 if ((parsestatus = parsecmdline(argc,argv, &cmd_run, &cmd_opts)) < 0)
179 printf(GT_("This is fetchmail release %s"), VERSION);
182 #endif /* POP2_ENABLE */
185 #endif /* POP3_ENABLE */
188 #endif /* IMAP_ENABLE */
194 #endif /* RPA_ENABLE */
197 #endif /* NTLM_ENABLE */
200 #endif /* SDPS_ENABLE */
203 #endif /* ETRN_ENABLE */
206 #endif /* ODMR_ENABLE */
212 #endif /* OPIE_ENABLE */
215 #endif /* INET6_ENABLE */
218 #endif /* NET_SECURITY */
221 #endif /* HAVE_SOCKS */
224 #endif /* ENABLE_NLS */
228 /* this is an attempt to help remote debugging */
232 /* avoid parsing the config file if all we're doing is killing a daemon */
233 if (!(quitmode && argc == 2))
234 implicitmode = load_params(argc, argv, optind);
236 #if defined(HAVE_SYSLOG)
237 /* logging should be set up early in case we were restarted from exec */
240 #if defined(LOG_MAIL)
241 openlog(program_name, LOG_PID, LOG_MAIL);
243 /* Assume BSD4.2 openlog with two arguments */
244 openlog(program_name, LOG_PID);
250 report_init((run.poll_interval == 0 || nodetach) && !run.logfile);
252 /* construct the lockfile */
255 #ifdef HAVE_SETRLIMIT
257 * Before getting passwords, disable core dumps unless -v -d0 mode is on.
258 * Core dumps could otherwise contain passwords to be scavenged by a
261 if (outlevel < O_VERBOSE || run.poll_interval > 0)
263 struct rlimit corelimit;
264 corelimit.rlim_cur = 0;
265 corelimit.rlim_max = 0;
266 setrlimit(RLIMIT_CORE, &corelimit);
268 #endif /* HAVE_SETRLIMIT */
270 #define NETRC_FILE ".netrc"
271 /* parse the ~/.netrc file (if present) for future password lookups. */
272 xalloca(netrc_file, char *, strlen(home) + sizeof(NETRC_FILE) + 2);
273 strcpy (netrc_file, home);
274 strcat (netrc_file, "/");
275 strcat (netrc_file, NETRC_FILE);
276 netrc_list = parse_netrc(netrc_file);
279 /* pick up passwords where we can */
280 for (ctl = querylist; ctl; ctl = ctl->next)
282 if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
284 if (NO_PASSWORD(ctl))
285 /* Server won't care what the password is, but there
286 must be some non-null string here. */
287 ctl->password = ctl->remotename;
292 /* look up the pollname and account in the .netrc file. */
293 p = search_netrc(netrc_list,
294 ctl->server.pollname, ctl->remotename);
295 /* if we find a matching entry with a password, use it */
296 if (p && p->password)
297 ctl->password = xstrdup(p->password);
299 /* otherwise try with "via" name if there is one */
300 else if (ctl->server.via)
302 p = search_netrc(netrc_list,
303 ctl->server.via, ctl->remotename);
304 if (p && p->password)
305 ctl->password = xstrdup(p->password);
311 /* perhaps we just want to check options? */
314 int havercfile = access(rcfile, 0);
316 printf(GT_("Taking options from command line%s%s\n"),
317 havercfile ? "" : GT_(" and "),
318 havercfile ? "" : rcfile);
320 if (querylist == NULL)
322 GT_("No mailservers set up -- perhaps %s is missing?\n"),
325 dump_params(&run, querylist, implicitmode);
329 /* dump options as a Python dictionary, for configurator use */
332 dump_config(&run, querylist);
336 /* check for another fetchmail running concurrently */
339 pid = bkgd ? -pid : pid;
341 /* if no mail servers listed and nothing in background, we're done */
342 if (!(quitmode && argc == 2) && pid == 0 && querylist == NULL) {
343 (void)fputs(GT_("fetchmail: no mailservers have been specified.\n"),stderr);
347 /* perhaps user asked us to kill the other fetchmail */
352 fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
356 else if (kill(pid, SIGTERM) < 0)
358 fprintf(stderr,GT_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
359 bkgd ? GT_("background") : GT_("foreground"), pid);
364 fprintf(stderr,GT_("fetchmail: %s fetchmail at %d killed.\n"),
365 bkgd ? GT_("background") : GT_("foreground"), pid);
374 /* another fetchmail is running -- wake it up or die */
380 GT_("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
383 else if (!implicitmode)
386 GT_("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
393 GT_("fetchmail: another foreground fetchmail is running at %d.\n"),
399 /* this test enables re-execing on a changed rcfile */
405 GT_("fetchmail: can't accept options while a background fetchmail is running.\n"));
409 else if (kill(pid, SIGUSR1) == 0)
412 GT_("fetchmail: background fetchmail at %d awakened.\n"),
419 * Should never happen -- possible only if a background fetchmail
420 * croaks after the first kill probe above but before the
421 * SIGUSR1/SIGHUP transmission.
424 GT_("fetchmail: elder sibling at %d died mysteriously.\n"),
426 return(PS_UNDEFINED);
430 /* pick up interactively any passwords we need but don't have */
431 for (ctl = querylist; ctl; ctl = ctl->next)
433 if (ctl->active && !(implicitmode && ctl->server.skip)
434 && !NO_PASSWORD(ctl) && !ctl->password)
439 GT_("fetchmail: can't find a password for %s@%s.\n"),
440 ctl->remotename, ctl->server.pollname);
445 char* password_prompt = GT_("Enter password for %s@%s: ");
447 xalloca(tmpbuf, char *, strlen(password_prompt) +
448 strlen(ctl->remotename) +
449 strlen(ctl->server.pollname) + 1);
450 (void) sprintf(tmpbuf, password_prompt,
451 ctl->remotename, ctl->server.pollname);
452 ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
458 * Time to initiate the SOCKS library (this is not mandatory: it just
459 * registers the correct application name for logging purpose. If you
460 * have some problem, comment out these lines).
463 SOCKSinit("fetchmail");
464 #endif /* HAVE_SOCKS */
466 /* avoid zombies from plugins */
470 * Maybe time to go to demon mode...
472 if (run.poll_interval)
475 daemonize(run.logfile, terminate_run);
476 report(stdout, GT_("starting fetchmail %s daemon \n"), VERSION);
479 * We'll set up a handler for these when we're sleeping,
480 * but ignore them otherwise so as not to interrupt a poll.
482 signal(SIGUSR1, SIG_IGN);
483 if (run.poll_interval && !getuid())
484 signal(SIGHUP, SIG_IGN);
488 if (run.logfile && access(run.logfile, F_OK) == 0)
490 freopen(run.logfile, "a", stdout);
491 freopen(run.logfile, "a", stderr);
499 /* beyond here we don't want more than one fetchmail running per user */
501 signal(SIGABRT, terminate_run);
502 signal(SIGINT, terminate_run);
503 signal(SIGTERM, terminate_run);
504 signal(SIGALRM, terminate_run);
505 signal(SIGPIPE, terminate_run);
506 signal(SIGQUIT, terminate_run);
508 /* here's the exclusion lock */
512 * Query all hosts. If there's only one, the error return will
513 * reflect the status of that transaction.
517 * Check to see if the rcfile has been touched. If so,
518 * re-exec so the file will be reread. Doing it this way
519 * avoids all the complications of trying to deallocate the
520 * in-core control structures -- and the potential memory
525 if (stat(rcfile, &rcstat) == -1)
529 GT_("couldn't time-check %s (error %d)\n"),
532 else if (rcstat.st_mtime > parsetime)
534 report(stdout, GT_("restarting fetchmail (%s changed)\n"), rcfile);
536 * Matthias Andree: Isn't this prone to introduction of
537 * "false" programs by interfering with PATH? Those
538 * path-searching execs might not be the best ideas for
541 * Rob Funk: But is there any way for someone to modify
542 * the PATH variable of a running fetchmail? I don't know
545 * Dave's change makes fetchmail restart itself in exactly
546 * the way it was started from the shell (or shell script)
547 * in the first place. If you're concerned about PATH
548 * contamination, call fetchmail initially with a full
549 * path, and use Dave's patch.
551 * Not using a -p variant of exec means that the restart
552 * will break if both (a) the user depended on PATH to
553 * call fetchmail in the first place, and (b) the system
554 * doesn't save the whole path in argv[0] if the whole
555 * path wasn't used in the initial call. (If I recall
556 * correctly, Linux saves it but many other Unices don't.)
558 execvp(argv[0], argv);
559 report(stderr, GT_("attempt to re-exec fetchmail failed\n"));
562 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
564 * This was an efficiency hack that backfired. The theory
565 * was that using TCP/IP for DNS queries would get us better
566 * reliability and shave off some per-UDP-packet costs.
567 * Unfortunately it interacted badly with diald, which effectively
568 * filters out DNS queries over TCP/IP for reasons having to do
569 * with some obscure Linux kernel problem involving bootstrapping of
570 * dynamically-addressed links. I don't understand this mess
571 * and don't want to, so it's "See ya!" to this hack.
573 sethostent(TRUE); /* use TCP/IP for mailserver queries */
574 #endif /* HAVE_RES_SEARCH */
578 for (ctl = querylist; ctl; ctl = ctl->next)
582 if (!(implicitmode && ctl->server.skip))
587 GT_("poll of %s skipped (failed authentication or too many timeouts)\n"),
588 ctl->server.pollname);
592 /* check skip interval first so that it counts all polls */
593 if (run.poll_interval && ctl->server.interval)
595 if (ctl->server.poll_count++ % ctl->server.interval)
597 if (outlevel >= O_VERBOSE)
599 GT_("interval not reached, not querying %s\n"),
600 ctl->server.pollname);
605 #if (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__)
607 * Don't do monitoring if we were woken by a signal.
608 * Note that interface_approve() does its own error logging.
610 if (!interface_approve(&ctl->server, !lastsig))
612 #endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
614 querystatus = query_host(ctl);
617 /* leave the UIDL state alone if there have been any errors */
619 ((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
621 #endif /* POP3_ENABLE */
623 if (querystatus == PS_SUCCESS)
625 else if (!check_only &&
626 ((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
630 report(stdout,GT_("Query status=0 (SUCCESS)\n"));break;
632 report(stdout,GT_("Query status=1 (NOMAIL)\n")); break;
634 report(stdout,GT_("Query status=2 (SOCKET)\n")); break;
636 report(stdout,GT_("Query status=3 (AUTHFAIL)\n"));break;
638 report(stdout,GT_("Query status=4 (PROTOCOL)\n"));break;
640 report(stdout,GT_("Query status=5 (SYNTAX)\n")); break;
642 report(stdout,GT_("Query status=6 (IOERR)\n")); break;
644 report(stdout,GT_("Query status=7 (ERROR)\n")); break;
646 report(stdout,GT_("Query status=8 (EXCLUDE)\n")); break;
648 report(stdout,GT_("Query status=9 (LOCKBUSY)\n"));break;
650 report(stdout,GT_("Query status=10 (SMTP)\n")); break;
652 report(stdout,GT_("Query status=11 (DNS)\n")); break;
654 report(stdout,GT_("Query status=12 (BSMTP)\n")); break;
656 report(stdout,GT_("Query status=13 (MAXFETCH)\n"));break;
658 report(stdout,GT_("Query status=%d\n"),querystatus);
662 #if (defined(linux) && !INET6_ENABLE) || defined (__FreeBSD__)
663 if (ctl->server.monitor)
666 * Allow some time for the link to quiesce. One
667 * second is usually sufficient, three is safe.
668 * Note: this delay is important - don't remove!
671 interface_note_activity(&ctl->server);
673 #endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
677 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
678 endhostent(); /* release TCP/IP connection to nameserver */
679 #endif /* HAVE_RES_SEARCH */
681 /* close connections cleanly */
685 * OK, we've polled. Now sleep.
687 if (run.poll_interval)
690 * Because passwords can expire, it may happen that *all*
691 * hosts are now out of the loop due to authfail
692 * conditions. If this happens daemon-mode fetchmail
693 * should softly and silently vanish away, rather than
694 * spinning uselessly.
698 for (ctl = querylist; ctl; ctl = ctl->next)
699 if (ctl->active && !(implicitmode && ctl->server.skip))
704 report(stderr, GT_("All connections are wedged. Exiting.\n"));
705 /* FIXME: someday, send notification mail */
709 if (outlevel >= O_VERBOSE)
711 GT_("fetchmail: sleeping at %s\n"), timestamp());
714 * OK, now pause until it's time for the next poll cycle.
715 * A nonzero return indicates we received a wakeup signal;
716 * unwedge all servers in case the problem has been
719 if ((lastsig = interruptible_idle(run.poll_interval)))
721 #ifdef SYS_SIGLIST_DECLARED
723 GT_("awakened by %s\n"), sys_siglist[lastsig]);
726 GT_("awakened by signal %d\n"), lastsig);
728 for (ctl = querylist; ctl; ctl = ctl->next)
732 if (outlevel >= O_VERBOSE)
733 report(stdout, GT_("awakened at %s\n"), timestamp());
738 if (outlevel >= O_VERBOSE)
739 report(stdout, GT_("normal termination, status %d\n"),
740 successes ? PS_SUCCESS : querystatus);
746 else if (querystatus)
749 /* in case we interrupted before a successful fetch */
753 static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
756 * If force is off, modify dstl fields only when they're empty (treat srcl
757 * as defaults). If force is on, modify each dstl field whenever scrcl
758 * is nonempty (treat srcl as an override).
760 if (force ? !!*srcl : !*dstl)
762 struct idlist *cpl = copy_str_list(*srcl);
764 append_str_list(dstl, &cpl);
768 static void optmerge(struct query *h2, struct query *h1, int force)
769 /* merge two options records */
771 list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
772 list_merge(&h2->localnames, &h1->localnames, force);
773 list_merge(&h2->mailboxes, &h1->mailboxes, force);
774 list_merge(&h2->smtphunt, &h1->smtphunt, force);
775 list_merge(&h2->domainlist, &h1->domainlist, force);
776 list_merge(&h2->antispam, &h1->antispam, force);
778 #define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
779 FLAG_MERGE(server.via);
780 FLAG_MERGE(server.protocol);
782 FLAG_MERGE(server.service);
783 FLAG_MERGE(server.netsec);
784 #else /* INET6_ENABLE */
785 FLAG_MERGE(server.port);
786 #endif /* INET6_ENABLE */
787 FLAG_MERGE(server.interval);
788 FLAG_MERGE(server.authenticate);
789 FLAG_MERGE(server.timeout);
790 FLAG_MERGE(server.envelope);
791 FLAG_MERGE(server.envskip);
792 FLAG_MERGE(server.qvirtual);
793 FLAG_MERGE(server.skip);
794 FLAG_MERGE(server.dns);
795 FLAG_MERGE(server.checkalias);
796 FLAG_MERGE(server.uidl);
797 FLAG_MERGE(server.principal);
799 #if defined(linux) || defined(__FreeBSD__)
800 FLAG_MERGE(server.interface);
801 FLAG_MERGE(server.monitor);
802 FLAG_MERGE(server.interface_pair);
803 #endif /* linux || defined(__FreeBSD__) */
805 FLAG_MERGE(server.plugin);
806 FLAG_MERGE(server.plugout);
808 FLAG_MERGE(wildcard);
809 FLAG_MERGE(remotename);
810 FLAG_MERGE(password);
813 FLAG_MERGE(listener);
814 FLAG_MERGE(smtpaddress);
815 FLAG_MERGE(smtpname);
816 FLAG_MERGE(preconnect);
817 FLAG_MERGE(postconnect);
821 FLAG_MERGE(fetchall);
825 FLAG_MERGE(pass8bits);
826 FLAG_MERGE(dropstatus);
827 FLAG_MERGE(dropdelivered);
828 FLAG_MERGE(mimedecode);
831 FLAG_MERGE(warnings);
832 FLAG_MERGE(fetchlimit);
833 FLAG_MERGE(batchlimit);
838 FLAG_MERGE(sslproto);
839 FLAG_MERGE(sslcertck);
840 FLAG_MERGE(sslcertpath);
841 FLAG_MERGE(sslfingerprint);
845 FLAG_MERGE(tracepolls);
846 FLAG_MERGE(properties);
850 static int load_params(int argc, char **argv, int optind)
852 int implicitmode, st;
854 struct query def_opts, *ctl;
857 run.bouncemail = TRUE;
858 run.spambounce = FALSE; /* don't bounce back to innocent bystanders */
860 memset(&def_opts, '\0', sizeof(struct query));
861 def_opts.smtp_socket = -1;
862 def_opts.smtpaddress = (char *)0;
863 def_opts.smtpname = (char *)0;
864 #define ANTISPAM(n) save_str(&def_opts.antispam, STRING_DUMMY, 0)->val.status.num = (n)
865 ANTISPAM(571); /* sendmail */
866 ANTISPAM(550); /* old exim */
867 ANTISPAM(501); /* new exim */
868 ANTISPAM(554); /* Postfix */
871 def_opts.server.protocol = P_AUTO;
872 def_opts.server.timeout = CLIENT_TIMEOUT;
873 def_opts.warnings = WARNING_INTERVAL;
874 def_opts.remotename = user;
875 def_opts.listener = SMTP_MODE;
877 /* note the parse time, so we can pick up on modifications */
878 parsetime = 0; /* foil compiler warnings */
879 if (stat(rcfile, &rcstat) != -1)
880 parsetime = rcstat.st_mtime;
881 else if (errno != ENOENT)
882 report(stderr, GT_("couldn't time-check the run-control file\n"));
884 /* this builds the host list */
885 if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
887 * FIXME: someday, send notification mail here if backgrounded.
888 * Right now, that can happen if the user changes the rcfile
889 * while the fetchmail is running in background. Do similarly
890 * for the other exit() calls in this function.
894 if ((implicitmode = (optind >= argc)))
896 for (ctl = querylist; ctl; ctl = ctl->next)
897 ctl->active = !ctl->server.skip;
900 for (; optind < argc; optind++)
902 flag predeclared = FALSE;
905 * If hostname corresponds to a host known from the rc file,
906 * simply declare it active. Otherwise synthesize a host
907 * record from command line and defaults
909 for (ctl = querylist; ctl; ctl = ctl->next)
910 if (!strcmp(ctl->server.pollname, argv[optind])
911 || str_in_list(&ctl->server.akalist, argv[optind], TRUE))
913 /* Is this correct? */
914 if (predeclared && outlevel == O_VERBOSE)
915 fprintf(stderr,GT_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
923 * Allocate and link record without copying in
924 * command-line args; we'll do that with the optmerge
927 ctl = hostalloc((struct query *)NULL);
929 ctl->server.pollname = xstrdup(argv[optind]);
931 ctl->server.lead_server = (struct hostdata *)NULL;
936 * If there's a defaults record, merge it and lose it.
938 if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
940 for (ctl = querylist->next; ctl; ctl = ctl->next)
941 optmerge(ctl, querylist, FALSE);
942 querylist = querylist->next;
945 /* don't allow a defaults record after the first */
946 for (ctl = querylist; ctl; ctl = ctl->next)
947 if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0)
950 /* use localhost if we never fetch the FQDN of this host */
951 fetchmailhost = "localhost";
953 /* here's where we override globals */
955 run.logfile = cmd_run.logfile;
957 run.idfile = cmd_run.idfile;
958 /* do this before the keep/fetchall test below, otherwise -d0 may fail */
959 if (cmd_run.poll_interval >= 0)
960 run.poll_interval = cmd_run.poll_interval;
961 if (cmd_run.invisible)
962 run.invisible = cmd_run.invisible;
963 if (cmd_run.showdots)
964 run.showdots = cmd_run.showdots;
965 if (cmd_run.use_syslog)
966 run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
967 if (cmd_run.postmaster)
968 run.postmaster = cmd_run.postmaster;
969 if (cmd_run.bouncemail)
970 run.bouncemail = cmd_run.bouncemail;
972 /* check and daemon options are not compatible */
973 if (check_only && run.poll_interval)
974 run.poll_interval = 0;
977 * DNS support is required for some protocols. We used to
978 * do this unconditionally, but it made fetchmail excessively
979 * vulnerable to misconfigured DNS setups.
981 * If we're using ETRN or ODMR, the smtp hunt list is the
982 * list of systems we're polling on behalf of; these have
983 * to be fully-qualified domain names. The default for
984 * this list should be the FQDN of localhost.
986 * If we're using Kerberos for authentication, we need
987 * the FQDN in order to generate capability keys.
989 if (strcmp(fetchmailhost, "localhost") == 0)
990 for (ctl = querylist; ctl; ctl = ctl->next)
992 (ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
993 || ctl->server.authenticate == A_KERBEROS_V4
994 || ctl->server.authenticate == A_KERBEROS_V5))
996 fetchmailhost = host_fqdn();
1000 /* merge in wired defaults, do sanity checks and prepare internal fields */
1001 for (ctl = querylist; ctl; ctl = ctl->next)
1003 ctl->wedged = FALSE;
1005 if (configdump || ctl->active )
1007 /* merge in defaults */
1008 optmerge(ctl, &def_opts, FALSE);
1010 /* force command-line options */
1011 optmerge(ctl, &cmd_opts, TRUE);
1013 /* this code enables flags to be turned off */
1014 #define DEFAULT(flag, dflt) if (flag == FLAG_TRUE)\
1016 else if (flag == FLAG_FALSE)\
1020 DEFAULT(ctl->keep, FALSE);
1021 DEFAULT(ctl->fetchall, FALSE);
1022 DEFAULT(ctl->flush, FALSE);
1023 DEFAULT(ctl->rewrite, TRUE);
1024 DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL));
1025 DEFAULT(ctl->forcecr, FALSE);
1026 DEFAULT(ctl->pass8bits, FALSE);
1027 DEFAULT(ctl->dropstatus, FALSE);
1028 DEFAULT(ctl->dropdelivered, FALSE);
1029 DEFAULT(ctl->mimedecode, FALSE);
1030 DEFAULT(ctl->idle, FALSE);
1031 DEFAULT(ctl->server.dns, TRUE);
1032 DEFAULT(ctl->server.uidl, FALSE);
1034 DEFAULT(ctl->use_ssl, FALSE);
1035 DEFAULT(ctl->sslcertck, FALSE);
1037 DEFAULT(ctl->server.checkalias, FALSE);
1041 report(stderr, GT_("SSL support is not compiled in.\n"));
1044 #endif /* SSL_ENABLE */
1048 * Make sure we have a nonempty host list to forward to.
1051 save_str(&ctl->smtphunt, fetchmailhost, FALSE);
1054 * Make sure we have a nonempty list of domains to fetch from.
1056 if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
1057 save_str(&ctl->domainlist, fetchmailhost, FALSE);
1059 /* if `user' doesn't name a real local user, try to run as root */
1060 if ((pw = getpwnam(user)) == (struct passwd *)NULL)
1063 ctl->uid = pw->pw_uid; /* for local delivery via MDA */
1064 if (!ctl->localnames) /* for local delivery via SMTP */
1065 save_str_pair(&ctl->localnames, user, NULL);
1067 #if !defined(HAVE_GETHOSTBYNAME) || !defined(HAVE_RES_SEARCH)
1068 /* can't handle multidrop mailboxes unless we can do DNS lookups */
1069 if (ctl->localnames && ctl->localnames->next && ctl->server.dns)
1071 ctl->server.dns = FALSE;
1072 report(stderr, GT_("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
1074 #endif /* !HAVE_GETHOSTBYNAME || !HAVE_RES_SEARCH */
1076 if (ctl->server.via)
1077 ctl->server.queryname = xstrdup(ctl->server.via);
1079 ctl->server.queryname = xstrdup(ctl->server.pollname);
1082 * We no longer do DNS lookups at startup.
1083 * This is a kluge. It enables users to edit their
1084 * configurations when DNS isn't available.
1086 ctl->server.truename = xstrdup(ctl->server.queryname);
1088 /* if no folders were specified, set up the null one as default */
1089 if (!ctl->mailboxes)
1090 save_str(&ctl->mailboxes, (char *)NULL, 0);
1092 /* maybe user overrode timeout on command line? */
1093 if (ctl->server.timeout == -1)
1094 ctl->server.timeout = CLIENT_TIMEOUT;
1098 if (ctl->server.port < 0)
1100 (void) fprintf(stderr,
1101 GT_("%s configuration invalid, port number cannot be negative\n"),
1102 ctl->server.pollname);
1105 if (ctl->server.protocol == P_RPOP && ctl->server.port >= 1024)
1107 (void) fprintf(stderr,
1108 GT_("%s configuration invalid, RPOP requires a privileged port\n"),
1109 ctl->server.pollname);
1112 if (ctl->listener == LMTP_MODE)
1116 for (idp = ctl->smtphunt; idp; idp = idp->next)
1120 if (!(cp = strrchr(idp->id, '/')) ||
1121 (atoi(++cp) == SMTP_PORT))
1123 (void) fprintf(stderr,
1124 GT_("%s configuration invalid, LMTP can't use default SMTP port\n"),
1125 ctl->server.pollname);
1130 #endif /* !INET6_ENABLE */
1133 * "I beg to you, have mercy on the week minds like myself."
1134 * wrote Pehr Anderson. Your petition is granted.
1136 if (ctl->fetchall && ctl->keep && run.poll_interval && !nodetach)
1138 (void) fprintf(stderr,
1139 GT_("Both fetchall and keep on in daemon mode is a mistake!\n"));
1146 /* initialize UID handling */
1147 if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
1150 initialize_saved_lists(querylist, run.idfile);
1151 #endif /* POP3_ENABLE */
1154 * If the user didn't set a last-resort user to get misaddressed
1155 * multidrop mail, set an appropriate default here.
1157 if (!run.postmaster)
1159 if (getuid()) /* ordinary user */
1160 run.postmaster = user;
1162 run.postmaster = "postmaster";
1165 return(implicitmode);
1168 static void terminate_poll(int sig)
1169 /* to be executed at the end of a poll cycle */
1172 * Close all SMTP delivery sockets. For optimum performance
1173 * we'd like to hold them open til end of run, but (1) this
1174 * loses if our poll interval is longer than the MTA's inactivity
1175 * timeout, and (2) some MTAs (like smail) don't deliver after
1176 * each message, but rather queue up mail and wait to actually
1177 * deliver it until the input socket is closed.
1179 * Sending SMTP QUIT on signal is theoretically nice, but led to a
1180 * subtle bug. If fetchmail was terminated by signal while it was
1181 * shipping message text, it would hang forever waiting for a
1182 * command acknowledge. In theory we could enable the QUIT
1183 * only outside of the message send. In practice, we don't
1184 * care. All mailservers hang up on a dropped TCP/IP connection
1189 report(stdout, GT_("terminated with signal %d\n"), sig);
1194 /* terminate all SMTP connections cleanly */
1195 for (ctl = querylist; ctl; ctl = ctl->next)
1196 if (ctl->smtp_socket != -1)
1198 /* don't send QUIT for ODMR case because we're acting
1199 as a proxy between the SMTP server and client. */
1200 if (ctl->server.protocol != P_ODMR)
1201 SMTP_quit(ctl->smtp_socket);
1202 SockClose(ctl->smtp_socket);
1203 ctl->smtp_socket = -1;
1209 * Update UID information at end of each poll, rather than at end
1210 * of run, because that way we don't lose all UIDL information since
1211 * the beginning of time if fetchmail crashes.
1214 write_saved_lists(querylist, run.idfile);
1215 #endif /* POP3_ENABLE */
1218 static void terminate_run(int sig)
1219 /* to be executed on normal or signal-induced termination */
1223 terminate_poll(sig);
1226 * Craig Metz, the RFC1938 one-time-password guy, points out:
1227 * "Remember that most kernels don't zero pages before handing them to the
1228 * next process and many kernels share pages between user and kernel space.
1229 * You'd be very surprised what you can find from a short program to do a
1230 * malloc() and then dump the contents of the pages you got. By zeroing
1231 * the secrets at end of run (earlier if you can), you make sure the next
1232 * guy can't get the password/pass phrase."
1234 * Right you are, Craig!
1236 for (ctl = querylist; ctl; ctl = ctl->next)
1238 memset(ctl->password, '\0', strlen(ctl->password));
1240 #if !defined(HAVE_ATEXIT) && !defined(HAVE_ON_EXIT)
1244 if (activecount == 0)
1247 exit(successes ? PS_SUCCESS : querystatus);
1251 * Sequence of protocols to try when autoprobing, most capable to least.
1253 static const int autoprobe[] =
1257 #endif /* IMAP_ENABLE */
1260 #endif /* POP3_ENABLE */
1263 #endif /* POP2_ENABLE */
1266 static int query_host(struct query *ctl)
1267 /* perform fetch transaction with single host */
1272 * If we're syslogging the progress messages are automatically timestamped.
1273 * Force timestamping if we're going to a logfile.
1275 if (outlevel >= O_VERBOSE || (run.logfile && outlevel > O_SILENT))
1277 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll started\n"),
1279 ctl->server.pollname,
1280 showproto(ctl->server.protocol),
1284 switch (ctl->server.protocol) {
1286 for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
1288 ctl->server.protocol = autoprobe[i];
1289 st = query_host(ctl);
1290 if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH)
1293 ctl->server.protocol = P_AUTO;
1298 report(stderr, GT_("POP2 support is not configured.\n"));
1300 #endif /* POP2_ENABLE */
1308 report(stderr, GT_("POP3 support is not configured.\n"));
1310 #endif /* POP3_ENABLE */
1316 report(stderr, GT_("IMAP support is not configured.\n"));
1318 #endif /* IMAP_ENABLE */
1322 report(stderr, GT_("ETRN support is not configured.\n"));
1325 #ifdef HAVE_GETHOSTBYNAME
1328 report(stderr, GT_("Cannot support ETRN without gethostbyname(2).\n"));
1330 #endif /* HAVE_GETHOSTBYNAME */
1332 #endif /* ETRN_ENABLE */
1335 report(stderr, GT_("ODMR support is not configured.\n"));
1338 #ifdef HAVE_GETHOSTBYNAME
1341 report(stderr, GT_("Cannot support ODMR without gethostbyname(2).\n"));
1343 #endif /* HAVE_GETHOSTBYNAME */
1344 #endif /* ODMR_ENABLE */
1347 report(stderr, GT_("unsupported protocol selected.\n"));
1352 * If we're syslogging the progress messages are automatically timestamped.
1353 * Force timestamping if we're going to a logfile.
1355 if (outlevel >= O_VERBOSE || (run.logfile && outlevel > O_SILENT))
1357 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll completed\n"),
1359 ctl->server.pollname,
1360 showproto(ctl->server.protocol),
1367 static void dump_params (struct runctl *runp,
1368 struct query *querylist, flag implicit)
1369 /* display query parameters in English */
1373 if (runp->poll_interval)
1374 printf(GT_("Poll interval is %d seconds\n"), runp->poll_interval);
1376 printf(GT_("Logfile is %s\n"), runp->logfile);
1377 if (strcmp(runp->idfile, IDFILE_NAME))
1378 printf(GT_("Idfile is %s\n"), runp->idfile);
1379 #if defined(HAVE_SYSLOG)
1380 if (runp->use_syslog)
1381 printf(GT_("Progress messages will be logged via syslog\n"));
1383 if (runp->invisible)
1384 printf(GT_("Fetchmail will masquerade and will not generate Received\n"));
1386 printf(GT_("Fetchmail will show progress dots even in logfiles.\n"));
1387 if (runp->postmaster)
1388 printf(GT_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
1391 if (!runp->bouncemail)
1392 printf(GT_("Fetchmail will direct error mail to the postmaster.\n"));
1393 else if (outlevel >= O_VERBOSE)
1394 printf(GT_("Fetchmail will direct error mail to the sender.\n"));
1396 for (ctl = querylist; ctl; ctl = ctl->next)
1398 if (!ctl->active || (implicit && ctl->server.skip))
1401 printf(GT_("Options for retrieving from %s@%s:\n"),
1402 ctl->remotename, visbuf(ctl->server.pollname));
1404 if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
1405 printf(GT_(" Mail will be retrieved via %s\n"), ctl->server.via);
1407 if (ctl->server.interval)
1408 printf(GT_(" Poll of this server will occur every %d intervals.\n"),
1409 ctl->server.interval);
1410 if (ctl->server.truename)
1411 printf(GT_(" True name of server is %s.\n"), ctl->server.truename);
1412 if (ctl->server.skip || outlevel >= O_VERBOSE)
1413 printf(GT_(" This host %s be queried when no host is specified.\n"),
1414 ctl->server.skip ? GT_("will not") : GT_("will"));
1415 if (!NO_PASSWORD(ctl))
1418 printf(GT_(" Password will be prompted for.\n"));
1419 else if (outlevel >= O_VERBOSE)
1421 if (ctl->server.protocol == P_APOP)
1422 printf(GT_(" APOP secret = \"%s\".\n"),
1423 visbuf(ctl->password));
1424 else if (ctl->server.protocol == P_RPOP)
1425 printf(GT_(" RPOP id = \"%s\".\n"),
1426 visbuf(ctl->password));
1428 printf(GT_(" Password = \"%s\".\n"),
1429 visbuf(ctl->password));
1433 if (ctl->server.protocol == P_POP3
1435 && ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
1436 #else /* INET6_ENABLE */
1437 && ctl->server.port == KPOP_PORT
1438 #endif /* INET6_ENABLE */
1439 && (ctl->server.authenticate == A_KERBEROS_V4 ||
1440 ctl->server.authenticate == A_KERBEROS_V5))
1441 printf(GT_(" Protocol is KPOP with Kerberos %s authentication"),
1442 ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
1444 printf(GT_(" Protocol is %s"), showproto(ctl->server.protocol));
1446 if (ctl->server.service)
1447 printf(GT_(" (using service %s)"), ctl->server.service);
1448 if (ctl->server.netsec)
1449 printf(GT_(" (using network security options %s)"), ctl->server.netsec);
1450 #else /* INET6_ENABLE */
1451 if (ctl->server.port)
1452 printf(GT_(" (using port %d)"), ctl->server.port);
1453 #endif /* INET6_ENABLE */
1454 else if (outlevel >= O_VERBOSE)
1455 printf(GT_(" (using default port)"));
1456 if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
1457 printf(GT_(" (forcing UIDL use)"));
1460 switch (ctl->server.authenticate)
1463 printf(GT_(" All available authentication methods will be tried.\n"));
1466 printf(GT_(" Password authentication will be forced.\n"));
1469 printf(GT_(" NTLM authentication will be forced.\n"));
1472 printf(GT_(" OTP authentication will be forced.\n"));
1475 printf(GT_(" CRAM-Md5 authentication will be forced.\n"));
1478 printf(GT_(" GSSAPI authentication will be forced.\n"));
1481 printf(GT_(" Kerberos V4 authentication will be forced.\n"));
1484 printf(GT_(" Kerberos V5 authentication will be forced.\n"));
1487 printf(GT_(" End-to-end encryption assumed.\n"));
1490 if (ctl->server.principal != (char *) NULL)
1491 printf(GT_(" Mail service principal is: %s\n"), ctl->server.principal);
1494 printf(GT_(" SSL encrypted sessions enabled.\n"));
1495 if (ctl->sslcertck) {
1496 printf(GT_(" SSL server certificate checking enabled.\n"));
1497 if (ctl->sslcertpath != NULL)
1498 printf(GT_(" SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
1500 if (ctl->sslfingerprint != NULL)
1501 printf(GT_(" SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
1503 if (ctl->server.timeout > 0)
1504 printf(GT_(" Server nonresponse timeout is %d seconds"), ctl->server.timeout);
1505 if (ctl->server.timeout == CLIENT_TIMEOUT)
1506 printf(GT_(" (default).\n"));
1510 if (MAILBOX_PROTOCOL(ctl))
1512 if (!ctl->mailboxes->id)
1513 printf(GT_(" Default mailbox selected.\n"));
1518 printf(GT_(" Selected mailboxes are:"));
1519 for (idp = ctl->mailboxes; idp; idp = idp->next)
1520 printf(" %s", idp->id);
1523 printf(GT_(" %s messages will be retrieved (--all %s).\n"),
1524 ctl->fetchall ? GT_("All") : GT_("Only new"),
1525 ctl->fetchall ? "on" : "off");
1526 printf(GT_(" Fetched messages %s be kept on the server (--keep %s).\n"),
1527 ctl->keep ? GT_("will") : GT_("will not"),
1528 ctl->keep ? "on" : "off");
1529 printf(GT_(" Old messages %s be flushed before message retrieval (--flush %s).\n"),
1530 ctl->flush ? GT_("will") : GT_("will not"),
1531 ctl->flush ? "on" : "off");
1532 printf(GT_(" Rewrite of server-local addresses is %s (--norewrite %s).\n"),
1533 ctl->rewrite ? GT_("enabled") : GT_("disabled"),
1534 ctl->rewrite ? "off" : "on");
1535 printf(GT_(" Carriage-return stripping is %s (stripcr %s).\n"),
1536 ctl->stripcr ? GT_("enabled") : GT_("disabled"),
1537 ctl->stripcr ? "on" : "off");
1538 printf(GT_(" Carriage-return forcing is %s (forcecr %s).\n"),
1539 ctl->forcecr ? GT_("enabled") : GT_("disabled"),
1540 ctl->forcecr ? "on" : "off");
1541 printf(GT_(" Interpretation of Content-Transfer-Encoding is %s (pass8bits %s).\n"),
1542 ctl->pass8bits ? GT_("disabled") : GT_("enabled"),
1543 ctl->pass8bits ? "on" : "off");
1544 printf(GT_(" MIME decoding is %s (mimedecode %s).\n"),
1545 ctl->mimedecode ? GT_("enabled") : GT_("disabled"),
1546 ctl->mimedecode ? "on" : "off");
1547 printf(GT_(" Idle after poll is %s (idle %s).\n"),
1548 ctl->idle ? GT_("enabled") : GT_("disabled"),
1549 ctl->idle ? "on" : "off");
1550 printf(GT_(" Nonempty Status lines will be %s (dropstatus %s)\n"),
1551 ctl->dropstatus ? GT_("discarded") : GT_("kept"),
1552 ctl->dropstatus ? "on" : "off");
1553 printf(GT_(" Delivered-To lines will be %s (dropdelivered %s)\n"),
1554 ctl->dropdelivered ? GT_("discarded") : GT_("kept"),
1555 ctl->dropdelivered ? "on" : "off");
1556 if (NUM_NONZERO(ctl->limit))
1558 if (NUM_NONZERO(ctl->limit))
1559 printf(GT_(" Message size limit is %d octets (--limit %d).\n"),
1560 ctl->limit, ctl->limit);
1561 else if (outlevel >= O_VERBOSE)
1562 printf(GT_(" No message size limit (--limit 0).\n"));
1563 if (run.poll_interval > 0)
1564 printf(GT_(" Message size warning interval is %d seconds (--warnings %d).\n"),
1565 ctl->warnings, ctl->warnings);
1566 else if (outlevel >= O_VERBOSE)
1567 printf(GT_(" Size warnings on every poll (--warnings 0).\n"));
1569 if (NUM_NONZERO(ctl->fetchlimit))
1570 printf(GT_(" Received-message limit is %d (--fetchlimit %d).\n"),
1571 ctl->fetchlimit, ctl->fetchlimit);
1572 else if (outlevel >= O_VERBOSE)
1573 printf(GT_(" No received-message limit (--fetchlimit 0).\n"));
1574 if (NUM_NONZERO(ctl->batchlimit))
1575 printf(GT_(" SMTP message batch limit is %d.\n"), ctl->batchlimit);
1576 else if (outlevel >= O_VERBOSE)
1577 printf(GT_(" No SMTP message batch limit (--batchlimit 0).\n"));
1578 if (MAILBOX_PROTOCOL(ctl))
1580 if (NUM_NONZERO(ctl->expunge))
1581 printf(GT_(" Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
1582 else if (outlevel >= O_VERBOSE)
1583 printf(GT_(" No forced expunges (--expunge 0).\n"));
1586 else /* ODMR or ETRN */
1590 printf(GT_(" Domains for which mail will be fetched are:"));
1591 for (idp = ctl->domainlist; idp; idp = idp->next)
1593 printf(" %s", idp->id);
1594 if (!idp->val.status.mark)
1595 printf(GT_(" (default)"));
1600 printf(GT_(" Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
1601 else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
1602 printf(GT_(" Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
1609 printf(GT_(" Messages will be %cMTP-forwarded to:"),
1611 for (idp = ctl->smtphunt; idp; idp = idp->next)
1613 printf(" %s", idp->id);
1614 if (!idp->val.status.mark)
1615 printf(GT_(" (default)"));
1619 if (ctl->smtpaddress)
1620 printf(GT_(" Host part of MAIL FROM line will be %s\n"),
1623 printf(GT_(" Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
1626 if (MAILBOX_PROTOCOL(ctl))
1628 if (ctl->antispam != (struct idlist *)NULL)
1632 printf(GT_(" Recognized listener spam block responses are:"));
1633 for (idp = ctl->antispam; idp; idp = idp->next)
1634 printf(" %d", idp->val.status.num);
1637 else if (outlevel >= O_VERBOSE)
1638 printf(GT_(" Spam-blocking disabled\n"));
1640 if (ctl->preconnect)
1641 printf(GT_(" Server connection will be brought up with \"%s\".\n"),
1642 visbuf(ctl->preconnect));
1643 else if (outlevel >= O_VERBOSE)
1644 printf(GT_(" No pre-connection command.\n"));
1645 if (ctl->postconnect)
1646 printf(GT_(" Server connection will be taken down with \"%s\".\n"),
1647 visbuf(ctl->postconnect));
1648 else if (outlevel >= O_VERBOSE)
1649 printf(GT_(" No post-connection command.\n"));
1650 if (MAILBOX_PROTOCOL(ctl)) {
1651 if (!ctl->localnames)
1652 printf(GT_(" No localnames declared for this host.\n"));
1658 for (idp = ctl->localnames; idp; idp = idp->next)
1661 if (count > 1 || ctl->wildcard)
1662 printf(GT_(" Multi-drop mode: "));
1664 printf(GT_(" Single-drop mode: "));
1666 printf(GT_("%d local name(s) recognized.\n"), count);
1667 if (outlevel >= O_VERBOSE)
1669 for (idp = ctl->localnames; idp; idp = idp->next)
1671 printf("\t%s -> %s\n", idp->id, idp->val.id2);
1673 printf("\t%s\n", idp->id);
1675 fputs("\t*\n", stdout);
1678 if (count > 1 || ctl->wildcard)
1680 printf(GT_(" DNS lookup for multidrop addresses is %s.\n"),
1681 ctl->server.dns ? GT_("enabled") : GT_("disabled"));
1682 if (ctl->server.dns)
1684 printf(GT_(" Server aliases will be compared with multidrop addresses by "));
1685 if (ctl->server.checkalias)
1686 printf(GT_("IP address.\n"));
1688 printf(GT_("name.\n"));
1690 if (ctl->server.envelope == STRING_DISABLED)
1691 printf(GT_(" Envelope-address routing is disabled\n"));
1694 printf(GT_(" Envelope header is assumed to be: %s\n"),
1695 ctl->server.envelope ? ctl->server.envelope:GT_("Received"));
1696 if (ctl->server.envskip > 1 || outlevel >= O_VERBOSE)
1697 printf(GT_(" Number of envelope header to be parsed: %d\n"),
1698 ctl->server.envskip);
1699 if (ctl->server.qvirtual)
1700 printf(GT_(" Prefix %s will be removed from user id\n"),
1701 ctl->server.qvirtual);
1702 else if (outlevel >= O_VERBOSE)
1703 printf(GT_(" No prefix stripping\n"));
1706 if (ctl->server.akalist)
1710 printf(GT_(" Predeclared mailserver aliases:"));
1711 for (idp = ctl->server.akalist; idp; idp = idp->next)
1712 printf(" %s", idp->id);
1715 if (ctl->server.localdomains)
1719 printf(GT_(" Local domains:"));
1720 for (idp = ctl->server.localdomains; idp; idp = idp->next)
1721 printf(" %s", idp->id);
1727 #if defined(linux) || defined(__FreeBSD__)
1728 if (ctl->server.interface)
1729 printf(GT_(" Connection must be through interface %s.\n"), ctl->server.interface);
1730 else if (outlevel >= O_VERBOSE)
1731 printf(GT_(" No interface requirement specified.\n"));
1732 if (ctl->server.monitor)
1733 printf(GT_(" Polling loop will monitor %s.\n"), ctl->server.monitor);
1734 else if (outlevel >= O_VERBOSE)
1735 printf(GT_(" No monitor interface specified.\n"));
1738 if (ctl->server.plugin)
1739 printf(GT_(" Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
1740 else if (outlevel >= O_VERBOSE)
1741 printf(GT_(" No plugin command specified.\n"));
1742 if (ctl->server.plugout)
1743 printf(GT_(" Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
1744 else if (outlevel >= O_VERBOSE)
1745 printf(GT_(" No plugout command specified.\n"));
1747 if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
1750 printf(GT_(" No UIDs saved from this host.\n"));
1756 for (idp = ctl->oldsaved; idp; idp = idp->next)
1759 printf(GT_(" %d UIDs saved.\n"), count);
1760 if (outlevel >= O_VERBOSE)
1761 for (idp = ctl->oldsaved; idp; idp = idp->next)
1762 printf("\t%s\n", idp->id);
1766 if (ctl->tracepolls)
1767 printf(GT_(" Poll trace information will be added to the Received header.\n"));
1768 else if (outlevel >= O_VERBOSE)
1769 printf(GT_(" No poll trace information will be added to the Received header.\n.\n"));
1771 if (ctl->properties)
1772 printf(GT_(" Pass-through properties \"%s\".\n"),
1773 visbuf(ctl->properties));
1777 /* fetchmail.c ends here */