2 * fetchmail.c -- main driver module for fetchmail
4 * For license terms, see the file COPYING in this directory.
9 #if defined(STDC_HEADERS)
12 #if defined(HAVE_UNISTD_H)
18 #if defined(HAVE_SYSLOG)
26 #include <sys/types.h>
29 #include <sys/resource.h>
30 #endif /* HAVE_SETRLIMIT */
33 #include <socks.h> /* SOCKSinit() */
34 #endif /* HAVE_SOCKS */
36 #ifdef HAVE_LANGINFO_H
40 #include "fetchmail.h"
48 #define ENETUNREACH 128 /* Interactive doesn't know this */
49 #endif /* ENETUNREACH */
51 /* prototypes for internal functions */
52 static int load_params(int, char **, int);
53 static void dump_params (struct runctl *runp, struct query *, flag implicit);
54 static int query_host(struct query *);
56 /* controls the detail level of status/progress messages written to stderr */
57 int outlevel; /* see the O_.* constants above */
59 /* miscellaneous global controls */
60 struct runctl run; /* global controls for this run */
61 flag nodetach; /* if TRUE, don't detach daemon process */
62 flag quitmode; /* if --quit was set */
63 int quitind; /* optind after position of last --quit option */
64 flag check_only; /* if --probe was set */
65 flag versioninfo; /* emit only version info */
66 char *user; /* the name of the invoking user */
67 char *home; /* invoking user's home directory */
68 char *fmhome; /* fetchmail's home directory */
69 char *program_name; /* the name to prefix error messages with */
70 flag configdump; /* dump control blocks for configurator */
71 char *fetchmailhost; /* either `localhost' or the host's FQDN */
73 static int quitonly; /* if we should quit after killing the running daemon */
75 static int querystatus; /* status of query */
76 static int successes; /* count number of successful polls */
77 static int activecount; /* count number of active entries */
78 static struct runctl cmd_run; /* global options set from command line */
79 static time_t parsetime; /* time of last parse */
81 static RETSIGTYPE terminate_run(int);
82 static RETSIGTYPE terminate_poll(int);
84 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
85 /* drop SGID kmem privileage until we need it */
86 static void dropprivs(void)
96 if (gr && !strcmp(gr->gr_name, "kmem"))
98 extern void interface_set_gids(gid_t egid, gid_t rgid);
99 interface_set_gids(egid, rgid);
105 #if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
107 /** returns timestamp in current locale,
108 * and resets LC_TIME locale to POSIX. */
109 static char *timestamp (void)
112 static char buf[60]; /* RATS: ignore */
115 setlocale (LC_TIME, "");
116 strftime (buf, sizeof (buf), "%c", localtime(&now));
117 setlocale (LC_TIME, "C");
121 #define timestamp rfc822timestamp
124 static RETSIGTYPE donothing(int sig)
126 set_signal_handler(sig, donothing);
130 const char *iana_charset;
132 int main(int argc, char **argv)
135 int implicitmode = FALSE;
137 netrc_entry *netrc_list;
138 char *netrc_file, *tmpbuf;
142 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
146 envquery(argc, argv);
148 setlocale (LC_ALL, "");
149 bindtextdomain(PACKAGE, LOCALEDIR);
151 iana_charset = norm_charmap(nl_langinfo(CODESET)); /* normalize local
155 iana_charset = "US-ASCII";
159 report(stderr, GT_("WARNING: Running as root is discouraged.\n"));
163 * Note: because we can't initialize reporting before we know whether
164 * syslog is supposed to be on, this message will go to stdout and
165 * be lost when running in background.
167 if (outlevel >= O_VERBOSE)
171 report(stdout, GT_("fetchmail: invoked with"));
172 for (i = 0; i < argc; i++)
173 report(stdout, " %s", argv[i]);
174 report(stdout, "\n");
177 #define IDFILE_NAME ".fetchids"
178 run.idfile = prependdir (IDFILE_NAME, fmhome);
183 * We used to arrange for the lock to be removed on exit close
184 * to where the lock was asserted. Now we need to do it here, because
185 * we might have re-executed in background with an existing lock
186 * as the result of a changed rcfile (see the code near the execvp(3)
187 * call near the beginning of the polling loop for details). We want
188 * to be sure the lock gets nuked on any error exit, basically.
193 /* save the current directory */
194 if (getcwd (currentwd, sizeof (currentwd)) == NULL) {
195 report(stderr, GT_("could not get current working directory\n"));
203 i = parsecmdline(argc, argv, &cmd_run, &cmd_opts);
207 if (quitmode && quitind == argc)
213 const char *features =
216 #endif /* POP2_ENABLE */
219 #endif /* POP3_ENABLE */
222 #endif /* IMAP_ENABLE */
228 #endif /* RPA_ENABLE */
231 #endif /* NTLM_ENABLE */
234 #endif /* SDPS_ENABLE */
237 #endif /* ETRN_ENABLE */
240 #endif /* ODMR_ENABLE */
246 #endif /* OPIE_ENABLE */
247 #ifdef HAVE_PKG_hesiod
252 #endif /* HAVE_SOCKS */
255 #endif /* ENABLE_NLS */
257 printf(GT_("This is fetchmail release %s"), VERSION);
258 fputs(features, stdout);
259 fputs("Fallback MDA: ", stdout);
261 fputs(FALLBACK_MDA, stdout);
263 fputs("(none)", stdout);
268 /* this is an attempt to help remote debugging */
272 /* avoid parsing the config file if all we're doing is killing a daemon */
274 implicitmode = load_params(argc, argv, optind);
276 #if defined(HAVE_SYSLOG)
277 /* logging should be set up early in case we were restarted from exec */
280 #if defined(LOG_MAIL)
281 openlog(program_name, LOG_PID, LOG_MAIL);
283 /* Assume BSD4.2 openlog with two arguments */
284 openlog(program_name, LOG_PID);
290 report_init((run.poll_interval == 0 || nodetach) && !run.logfile);
292 /* construct the lockfile */
295 #ifdef HAVE_SETRLIMIT
297 * Before getting passwords, disable core dumps unless -v -d0 mode is on.
298 * Core dumps could otherwise contain passwords to be scavenged by a
301 if (outlevel < O_VERBOSE || run.poll_interval > 0)
303 struct rlimit corelimit;
304 corelimit.rlim_cur = 0;
305 corelimit.rlim_max = 0;
306 setrlimit(RLIMIT_CORE, &corelimit);
308 #endif /* HAVE_SETRLIMIT */
310 #define NETRC_FILE ".netrc"
311 /* parse the ~/.netrc file (if present) for future password lookups. */
312 netrc_file = prependdir (NETRC_FILE, home);
313 netrc_list = parse_netrc(netrc_file);
317 /* pick up passwords where we can */
318 for (ctl = querylist; ctl; ctl = ctl->next)
320 if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
322 if (NO_PASSWORD(ctl))
323 /* Server won't care what the password is, but there
324 must be some non-null string here. */
325 ctl->password = ctl->remotename;
330 /* look up the pollname and account in the .netrc file. */
331 p = search_netrc(netrc_list,
332 ctl->server.pollname, ctl->remotename);
333 /* if we find a matching entry with a password, use it */
334 if (p && p->password)
335 ctl->password = xstrdup(p->password);
337 /* otherwise try with "via" name if there is one */
338 else if (ctl->server.via)
340 p = search_netrc(netrc_list,
341 ctl->server.via, ctl->remotename);
342 if (p && p->password)
343 ctl->password = xstrdup(p->password);
349 /* perhaps we just want to check options? */
352 int havercfile = access(rcfile, 0);
354 printf(GT_("Taking options from command line%s%s\n"),
355 havercfile ? "" : GT_(" and "),
356 havercfile ? "" : rcfile);
358 if (querylist == NULL)
360 GT_("No mailservers set up -- perhaps %s is missing?\n"),
363 dump_params(&run, querylist, implicitmode);
367 /* dump options as a Python dictionary, for configurator use */
370 dump_config(&run, querylist);
374 /* check for another fetchmail running concurrently */
377 pid = bkgd ? -pid : pid;
379 /* if no mail servers listed and nothing in background, we're done */
380 if (!quitonly && pid == 0 && querylist == NULL) {
381 (void)fputs(GT_("fetchmail: no mailservers have been specified.\n"),stderr);
385 /* perhaps user asked us to kill the other fetchmail */
388 if (pid == 0 || pid == getpid())
389 /* this test enables re-execing on a changed rcfile
390 * for pid == getpid() */
393 fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
397 else if (kill(pid, SIGTERM) < 0)
399 fprintf(stderr,GT_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
400 bkgd ? GT_("background") : GT_("foreground"), pid);
405 if (outlevel > O_SILENT)
406 fprintf(stderr,GT_("fetchmail: %s fetchmail at %d killed.\n"),
407 bkgd ? GT_("background") : GT_("foreground"), pid);
416 /* another fetchmail is running -- wake it up or die */
422 GT_("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
425 else if (!implicitmode)
428 GT_("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
435 GT_("fetchmail: another foreground fetchmail is running at %d.\n"),
439 else if (getpid() == pid)
440 /* this test enables re-execing on a changed rcfile */
445 GT_("fetchmail: can't accept options while a background fetchmail is running.\n"));
448 else if (kill(pid, SIGUSR1) == 0)
451 GT_("fetchmail: background fetchmail at %d awakened.\n"),
458 * Should never happen -- possible only if a background fetchmail
459 * croaks after the first kill probe above but before the
460 * SIGUSR1/SIGHUP transmission.
463 GT_("fetchmail: elder sibling at %d died mysteriously.\n"),
465 return(PS_UNDEFINED);
469 /* pick up interactively any passwords we need but don't have */
470 for (ctl = querylist; ctl; ctl = ctl->next)
472 if (ctl->active && !(implicitmode && ctl->server.skip)
473 && !NO_PASSWORD(ctl) && !ctl->password)
478 GT_("fetchmail: can't find a password for %s@%s.\n"),
479 ctl->remotename, ctl->server.pollname);
482 const char* password_prompt = GT_("Enter password for %s@%s: ");
483 size_t pplen = strlen(password_prompt) + strlen(ctl->remotename) + strlen(ctl->server.pollname) + 1;
485 tmpbuf = xmalloc(pplen);
486 snprintf(tmpbuf, pplen, password_prompt,
487 ctl->remotename, ctl->server.pollname);
488 ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
495 * Time to initiate the SOCKS library (this is not mandatory: it just
496 * registers the correct application name for logging purpose. If you
497 * have some problem, comment out these lines).
500 SOCKSinit("fetchmail");
501 #endif /* HAVE_SOCKS */
503 /* avoid zombies from plugins */
507 * Maybe time to go to demon mode...
509 if (run.poll_interval)
512 daemonize(run.logfile, terminate_run);
513 report(stdout, GT_("starting fetchmail %s daemon \n"), VERSION);
516 * We'll set up a handler for these when we're sleeping,
517 * but ignore them otherwise so as not to interrupt a poll.
519 set_signal_handler(SIGUSR1, SIG_IGN);
520 if (run.poll_interval && getuid() == ROOT_UID)
521 set_signal_handler(SIGHUP, SIG_IGN);
525 if (run.logfile && !nodetach && access(run.logfile, F_OK) == 0)
527 if (!freopen(run.logfile, "a", stdout))
528 report(stderr, GT_("could not open %s to append logs to \n"), run.logfile);
529 if (!freopen(run.logfile, "a", stderr))
530 report(stdout, GT_("could not open %s to append logs to \n"), run.logfile);
536 /* beyond here we don't want more than one fetchmail running per user */
538 set_signal_handler(SIGABRT, terminate_run);
539 set_signal_handler(SIGINT, terminate_run);
540 set_signal_handler(SIGTERM, terminate_run);
541 set_signal_handler(SIGALRM, terminate_run);
542 set_signal_handler(SIGPIPE, terminate_run);
543 set_signal_handler(SIGQUIT, terminate_run);
545 /* here's the exclusion lock */
549 * Query all hosts. If there's only one, the error return will
550 * reflect the status of that transaction.
554 * Check to see if the rcfile has been touched. If so,
555 * re-exec so the file will be reread. Doing it this way
556 * avoids all the complications of trying to deallocate the
557 * in-core control structures -- and the potential memory
562 if (stat(rcfile, &rcstat) == -1)
566 GT_("couldn't time-check %s (error %d)\n"),
569 else if (rcstat.st_mtime > parsetime)
571 report(stdout, GT_("restarting fetchmail (%s changed)\n"), rcfile);
574 /* restore the startup directory */
575 if (!currentwd[0] || chdir (currentwd) == -1)
576 report(stderr, GT_("attempt to re-exec may fail as directory has not been restored\n"));
580 * Matthias Andree: Isn't this prone to introduction of
581 * "false" programs by interfering with PATH? Those
582 * path-searching execs might not be the best ideas for
585 * Rob Funk: But is there any way for someone to modify
586 * the PATH variable of a running fetchmail? I don't know
589 * Dave's change makes fetchmail restart itself in exactly
590 * the way it was started from the shell (or shell script)
591 * in the first place. If you're concerned about PATH
592 * contamination, call fetchmail initially with a full
593 * path, and use Dave's patch.
595 * Not using a -p variant of exec means that the restart
596 * will break if both (a) the user depended on PATH to
597 * call fetchmail in the first place, and (b) the system
598 * doesn't save the whole path in argv[0] if the whole
599 * path wasn't used in the initial call. (If I recall
600 * correctly, Linux saves it but many other Unices don't.)
602 execvp(argv[0], argv);
603 report(stderr, GT_("attempt to re-exec fetchmail failed\n"));
606 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
608 * This was an efficiency hack that backfired. The theory
609 * was that using TCP/IP for DNS queries would get us better
610 * reliability and shave off some per-UDP-packet costs.
611 * Unfortunately it interacted badly with diald, which effectively
612 * filters out DNS queries over TCP/IP for reasons having to do
613 * with some obscure Linux kernel problem involving bootstrapping of
614 * dynamically-addressed links. I don't understand this mess
615 * and don't want to, so it's "See ya!" to this hack.
617 sethostent(TRUE); /* use TCP/IP for mailserver queries */
618 #endif /* HAVE_RES_SEARCH */
622 for (ctl = querylist; ctl; ctl = ctl->next)
626 if (!(implicitmode && ctl->server.skip))
631 GT_("poll of %s skipped (failed authentication or too many timeouts)\n"),
632 ctl->server.pollname);
636 /* check skip interval first so that it counts all polls */
637 if (run.poll_interval && ctl->server.interval)
639 if (ctl->server.poll_count++ % ctl->server.interval)
641 if (outlevel >= O_VERBOSE)
643 GT_("interval not reached, not querying %s\n"),
644 ctl->server.pollname);
651 * Don't do monitoring if we were woken by a signal.
652 * Note that interface_approve() does its own error logging.
654 if (!interface_approve(&ctl->server, !lastsig))
656 #endif /* CAN_MONITOR */
658 dofastuidl = 0; /* this is reset in the driver if required */
660 querystatus = query_host(ctl);
662 if (NUM_NONZERO(ctl->fastuidl))
663 ctl->fastuidlcount = (ctl->fastuidlcount + 1) % ctl->fastuidl;
665 /* leave the UIDL state alone if there have been any errors */
667 ((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
670 uid_discard_new_list(ctl);
672 #endif /* POP3_ENABLE */
674 if (querystatus == PS_SUCCESS)
676 else if (!check_only &&
677 ((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
681 report(stdout,GT_("Query status=0 (SUCCESS)\n"));break;
683 report(stdout,GT_("Query status=1 (NOMAIL)\n")); break;
685 report(stdout,GT_("Query status=2 (SOCKET)\n")); break;
687 report(stdout,GT_("Query status=3 (AUTHFAIL)\n"));break;
689 report(stdout,GT_("Query status=4 (PROTOCOL)\n"));break;
691 report(stdout,GT_("Query status=5 (SYNTAX)\n")); break;
693 report(stdout,GT_("Query status=6 (IOERR)\n")); break;
695 report(stdout,GT_("Query status=7 (ERROR)\n")); break;
697 report(stdout,GT_("Query status=8 (EXCLUDE)\n")); break;
699 report(stdout,GT_("Query status=9 (LOCKBUSY)\n"));break;
701 report(stdout,GT_("Query status=10 (SMTP)\n")); break;
703 report(stdout,GT_("Query status=11 (DNS)\n")); break;
705 report(stdout,GT_("Query status=12 (BSMTP)\n")); break;
707 report(stdout,GT_("Query status=13 (MAXFETCH)\n"));break;
709 report(stdout,GT_("Query status=%d\n"),querystatus);
714 if (ctl->server.monitor)
717 * Allow some time for the link to quiesce. One
718 * second is usually sufficient, three is safe.
719 * Note: this delay is important - don't remove!
722 interface_note_activity(&ctl->server);
724 #endif /* CAN_MONITOR */
728 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
729 endhostent(); /* release TCP/IP connection to nameserver */
730 #endif /* HAVE_RES_SEARCH */
732 /* close connections cleanly */
736 * OK, we've polled. Now sleep.
738 if (run.poll_interval)
741 * Because passwords can expire, it may happen that *all*
742 * hosts are now out of the loop due to authfail
743 * conditions. If this happens daemon-mode fetchmail
744 * should softly and silently vanish away, rather than
745 * spinning uselessly.
749 for (ctl = querylist; ctl; ctl = ctl->next)
750 if (ctl->active && !(implicitmode && ctl->server.skip))
755 report(stderr, GT_("All connections are wedged. Exiting.\n"));
756 /* FIXME: someday, send notification mail */
760 if (outlevel > O_SILENT)
762 GT_("sleeping at %s\n"), timestamp());
765 * With this simple hack, we make it possible for a foreground
766 * fetchmail to wake up one in daemon mode. What we want is the
767 * side effect of interrupting any sleep that may be going on,
768 * forcing fetchmail to re-poll its hosts. The second line is
769 * for people who think all system daemons wake up on SIGHUP.
771 set_signal_handler(SIGUSR1, donothing);
772 if (getuid() != ROOT_UID)
773 set_signal_handler(SIGHUP, donothing);
776 * OK, now pause until it's time for the next poll cycle.
777 * A nonzero return indicates we received a wakeup signal;
778 * unwedge all servers in case the problem has been
781 if ((lastsig = interruptible_idle(run.poll_interval)))
783 if (outlevel > O_SILENT)
784 #ifdef SYS_SIGLIST_DECLARED
786 GT_("awakened by %s\n"), sys_siglist[lastsig]);
789 GT_("awakened by signal %d\n"), lastsig);
791 for (ctl = querylist; ctl; ctl = ctl->next)
795 if (outlevel > O_SILENT)
796 report(stdout, GT_("awakened at %s\n"), timestamp());
801 if (outlevel >= O_VERBOSE)
802 report(stdout, GT_("normal termination, status %d\n"),
803 successes ? PS_SUCCESS : querystatus);
809 else if (querystatus)
812 /* in case we interrupted before a successful fetch */
816 static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
819 * If force is off, modify dstl fields only when they're empty (treat srcl
820 * as defaults). If force is on, modify each dstl field whenever scrcl
821 * is nonempty (treat srcl as an override).
823 if (force ? !!*srcl : !*dstl)
825 struct idlist *cpl = copy_str_list(*srcl);
827 append_str_list(dstl, &cpl);
831 static void optmerge(struct query *h2, struct query *h1, int force)
832 /* merge two options records */
834 list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
835 list_merge(&h2->localnames, &h1->localnames, force);
836 list_merge(&h2->mailboxes, &h1->mailboxes, force);
837 list_merge(&h2->smtphunt, &h1->smtphunt, force);
838 list_merge(&h2->domainlist, &h1->domainlist, force);
839 list_merge(&h2->antispam, &h1->antispam, force);
841 #define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
842 FLAG_MERGE(server.via);
843 FLAG_MERGE(server.protocol);
844 FLAG_MERGE(server.service);
845 FLAG_MERGE(server.interval);
846 FLAG_MERGE(server.authenticate);
847 FLAG_MERGE(server.timeout);
848 FLAG_MERGE(server.envelope);
849 FLAG_MERGE(server.envskip);
850 FLAG_MERGE(server.qvirtual);
851 FLAG_MERGE(server.skip);
852 FLAG_MERGE(server.dns);
853 FLAG_MERGE(server.checkalias);
854 FLAG_MERGE(server.uidl);
855 FLAG_MERGE(server.principal);
858 FLAG_MERGE(server.interface);
859 FLAG_MERGE(server.interface_pair);
860 FLAG_MERGE(server.monitor);
863 FLAG_MERGE(server.plugin);
864 FLAG_MERGE(server.plugout);
865 FLAG_MERGE(server.tracepolls);
867 FLAG_MERGE(wildcard);
868 FLAG_MERGE(remotename);
869 FLAG_MERGE(password);
872 FLAG_MERGE(listener);
873 FLAG_MERGE(smtpaddress);
874 FLAG_MERGE(smtpname);
875 FLAG_MERGE(preconnect);
876 FLAG_MERGE(postconnect);
880 FLAG_MERGE(limitflush);
881 FLAG_MERGE(fetchall);
885 FLAG_MERGE(pass8bits);
886 FLAG_MERGE(dropstatus);
887 FLAG_MERGE(dropdelivered);
888 FLAG_MERGE(mimedecode);
891 FLAG_MERGE(warnings);
892 FLAG_MERGE(fetchlimit);
893 FLAG_MERGE(fetchsizelimit);
894 FLAG_MERGE(fastuidl);
895 FLAG_MERGE(batchlimit);
900 FLAG_MERGE(sslproto);
901 FLAG_MERGE(sslcertck);
902 FLAG_MERGE(sslcertpath);
903 FLAG_MERGE(sslfingerprint);
907 FLAG_MERGE(properties);
911 /** Load configuration files.
912 * \return - true if no servers found on the command line
913 * - false if servers found on the command line */
914 static int load_params(int argc, char **argv, int optind)
916 int implicitmode, st;
918 struct query def_opts, *ctl;
922 run.bouncemail = TRUE;
923 run.spambounce = FALSE; /* don't bounce back to innocent bystanders */
925 memset(&def_opts, '\0', sizeof(struct query));
926 def_opts.smtp_socket = -1;
927 def_opts.smtpaddress = (char *)0;
928 def_opts.smtpname = (char *)0;
929 def_opts.server.protocol = P_AUTO;
930 def_opts.server.timeout = CLIENT_TIMEOUT;
931 def_opts.server.esmtp_name = user;
932 def_opts.warnings = WARNING_INTERVAL;
933 def_opts.remotename = user;
934 def_opts.listener = SMTP_MODE;
935 def_opts.fetchsizelimit = 100;
936 def_opts.fastuidl = 10;
938 /* get the location of rcfile */
940 p = strrchr (rcfile, '/');
941 if (p && (p - rcfile) < sizeof (rcfiledir)) {
942 *p = 0; /* replace '/' by '0' */
943 strlcpy (rcfiledir, rcfile, sizeof(rcfiledir));
944 *p = '/'; /* restore '/' */
945 if (!rcfiledir[0]) /* "/.fetchmailrc" case */
946 strcpy (rcfiledir, "/");
949 /* note the parse time, so we can pick up on modifications */
950 parsetime = 0; /* foil compiler warnings */
951 if (stat(rcfile, &rcstat) != -1)
952 parsetime = rcstat.st_mtime;
953 else if (errno != ENOENT)
954 report(stderr, GT_("couldn't time-check the run-control file\n"));
956 /* this builds the host list */
957 if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
959 * FIXME: someday, send notification mail here if backgrounded.
960 * Right now, that can happen if the user changes the rcfile
961 * while the fetchmail is running in background. Do similarly
962 * for the other exit() calls in this function.
966 if ((implicitmode = (optind >= argc)))
968 for (ctl = querylist; ctl; ctl = ctl->next)
969 ctl->active = !ctl->server.skip;
972 for (; optind < argc; optind++)
974 flag predeclared = FALSE;
977 * If hostname corresponds to a host known from the rc file,
978 * simply declare it active. Otherwise synthesize a host
979 * record from command line and defaults
981 for (ctl = querylist; ctl; ctl = ctl->next)
982 if (!strcmp(ctl->server.pollname, argv[optind])
983 || str_in_list(&ctl->server.akalist, argv[optind], TRUE))
985 /* Is this correct? */
986 if (predeclared && outlevel == O_VERBOSE)
987 fprintf(stderr,GT_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
995 * Allocate and link record without copying in
996 * command-line args; we'll do that with the optmerge
999 ctl = hostalloc((struct query *)NULL);
1001 ctl->server.pollname = xstrdup(argv[optind]);
1003 ctl->server.lead_server = (struct hostdata *)NULL;
1008 * If there's a defaults record, merge it and lose it.
1010 if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
1012 for (ctl = querylist->next; ctl; ctl = ctl->next)
1013 optmerge(ctl, querylist, FALSE);
1014 querylist = querylist->next;
1017 /* don't allow a defaults record after the first */
1018 for (ctl = querylist; ctl; ctl = ctl->next) {
1019 if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0) {
1020 fprintf(stderr, GT_("fetchmail: Error: multiple \"defaults\" records in config file.\n"));
1025 /* use localhost if we never fetch the FQDN of this host */
1026 fetchmailhost = "localhost";
1028 /* here's where we override globals */
1029 if (cmd_run.logfile)
1030 run.logfile = cmd_run.logfile;
1032 run.idfile = cmd_run.idfile;
1033 /* do this before the keep/fetchall test below, otherwise -d0 may fail */
1034 if (cmd_run.poll_interval >= 0)
1035 run.poll_interval = cmd_run.poll_interval;
1036 if (cmd_run.invisible)
1037 run.invisible = cmd_run.invisible;
1038 if (cmd_run.showdots)
1039 run.showdots = cmd_run.showdots;
1040 if (cmd_run.use_syslog)
1041 run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
1042 if (cmd_run.postmaster)
1043 run.postmaster = cmd_run.postmaster;
1044 if (cmd_run.bouncemail)
1045 run.bouncemail = cmd_run.bouncemail;
1047 /* check and daemon options are not compatible */
1048 if (check_only && run.poll_interval)
1049 run.poll_interval = 0;
1052 * DNS support is required for some protocols. We used to
1053 * do this unconditionally, but it made fetchmail excessively
1054 * vulnerable to misconfigured DNS setups.
1056 * If we're using ETRN or ODMR, the smtp hunt list is the
1057 * list of systems we're polling on behalf of; these have
1058 * to be fully-qualified domain names. The default for
1059 * this list should be the FQDN of localhost.
1061 * If we're using Kerberos for authentication, we need
1062 * the FQDN in order to generate capability keys.
1064 for (ctl = querylist; ctl; ctl = ctl->next)
1066 (ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
1067 || ctl->server.authenticate == A_KERBEROS_V4
1068 || ctl->server.authenticate == A_KERBEROS_V5))
1070 fetchmailhost = host_fqdn();
1074 /* this code enables flags to be turned off */
1075 #define DEFAULT(flag, dflt) if (flag == FLAG_TRUE)\
1077 else if (flag == FLAG_FALSE)\
1081 /* one global gets treated specially */
1082 DEFAULT(run.showdots, run.poll_interval==0 || nodetach);
1084 /* merge in wired defaults, do sanity checks and prepare internal fields */
1085 for (ctl = querylist; ctl; ctl = ctl->next)
1087 ctl->wedged = FALSE;
1089 /* merge in defaults */
1090 optmerge(ctl, &def_opts, FALSE);
1092 /* force command-line options */
1093 optmerge(ctl, &cmd_opts, TRUE);
1096 * queryname has to be set up for inactive servers too.
1097 * Otherwise the UIDL code core-dumps on startup.
1099 if (ctl->server.via)
1100 ctl->server.queryname = xstrdup(ctl->server.via);
1102 ctl->server.queryname = xstrdup(ctl->server.pollname);
1105 * We no longer do DNS lookups at startup.
1106 * This is a kluge. It enables users to edit their
1107 * configurations when DNS isn't available.
1109 ctl->server.truename = xstrdup(ctl->server.queryname);
1111 if (configdump || ctl->active )
1113 DEFAULT(ctl->keep, FALSE);
1114 DEFAULT(ctl->fetchall, FALSE);
1115 DEFAULT(ctl->flush, FALSE);
1116 DEFAULT(ctl->limitflush, FALSE);
1117 DEFAULT(ctl->rewrite, TRUE);
1118 DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL));
1119 DEFAULT(ctl->forcecr, FALSE);
1120 DEFAULT(ctl->pass8bits, FALSE);
1121 DEFAULT(ctl->dropstatus, FALSE);
1122 DEFAULT(ctl->dropdelivered, FALSE);
1123 DEFAULT(ctl->mimedecode, FALSE);
1124 DEFAULT(ctl->idle, FALSE);
1125 DEFAULT(ctl->server.dns, TRUE);
1126 DEFAULT(ctl->server.uidl, FALSE);
1127 DEFAULT(ctl->use_ssl, FALSE);
1128 DEFAULT(ctl->sslcertck, FALSE);
1129 DEFAULT(ctl->server.checkalias, FALSE);
1132 * XXX FIXME: do we need this check or can we rely on the .y
1133 * parser handling this?
1137 report(stderr, GT_("SSL support is not compiled in.\n"));
1140 #endif /* SSL_ENABLE */
1144 * Make sure we have a nonempty host list to forward to.
1147 save_str(&ctl->smtphunt, fetchmailhost, FALSE);
1150 * Make sure we have a nonempty list of domains to fetch from.
1152 if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
1153 save_str(&ctl->domainlist, fetchmailhost, FALSE);
1155 /* if `user' doesn't name a real local user, try to run as root */
1156 if ((pw = getpwnam(user)) == (struct passwd *)NULL)
1159 ctl->uid = pw->pw_uid; /* for local delivery via MDA */
1160 if (!ctl->localnames) /* for local delivery via SMTP */
1161 save_str_pair(&ctl->localnames, user, NULL);
1163 #ifndef HAVE_RES_SEARCH
1164 /* can't handle multidrop mailboxes unless we can do DNS lookups */
1165 if (MULTIDROP(ctl) && ctl->server.dns)
1167 ctl->server.dns = FALSE;
1168 report(stderr, GT_("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
1170 #endif /* !HAVE_RES_SEARCH */
1173 * can't handle multidrop mailboxes without "envelope"
1174 * option, this causes truckloads full of support complaints
1175 * "all mail forwarded to postmaster"
1177 if (MULTIDROP(ctl) && !ctl->server.envelope)
1179 report(stderr, GT_("warning: multidrop for %s requires envelope option!\n"), ctl->server.pollname);
1180 report(stderr, GT_("warning: Do not ask for support if all mail goes to postmaster!\n"));
1183 /* if no folders were specified, set up the null one as default */
1184 if (!ctl->mailboxes)
1185 save_str(&ctl->mailboxes, (char *)NULL, 0);
1187 /* maybe user overrode timeout on command line? */
1188 if (ctl->server.timeout == -1)
1189 ctl->server.timeout = CLIENT_TIMEOUT;
1192 if (ctl->server.service) {
1193 int port = servport(ctl->server.service);
1196 (void) fprintf(stderr,
1197 GT_("fetchmail: %s configuration invalid, specify positive port number for service or port\n"),
1198 ctl->server.pollname);
1201 if (ctl->server.protocol == P_RPOP && port >= 1024)
1203 (void) fprintf(stderr,
1204 GT_("fetchmail: %s configuration invalid, RPOP requires a privileged port\n"),
1205 ctl->server.pollname);
1209 if (ctl->listener == LMTP_MODE)
1213 for (idp = ctl->smtphunt; idp; idp = idp->next)
1217 if (!(cp = strrchr(idp->id, '/')) ||
1218 ++cp, (0 == strcmp(cp, SMTP_PORT))
1219 || servport(cp) == SMTP_PORT_NUM)
1221 (void) fprintf(stderr,
1222 GT_("%s configuration invalid, LMTP can't use default SMTP port\n"),
1223 ctl->server.pollname);
1230 * "I beg to you, have mercy on the we[a]k minds like myself."
1231 * wrote Pehr Anderson. Your petition is granted.
1233 if (ctl->fetchall && ctl->keep && run.poll_interval && !nodetach)
1235 (void) fprintf(stderr,
1236 GT_("Both fetchall and keep on in daemon mode is a mistake!\n"));
1243 /* initialize UID handling */
1244 if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
1247 initialize_saved_lists(querylist, run.idfile);
1248 #endif /* POP3_ENABLE */
1251 * If the user didn't set a last-resort user to get misaddressed
1252 * multidrop mail, set an appropriate default here.
1254 if (!run.postmaster)
1256 if (getuid() != ROOT_UID) /* ordinary user */
1257 run.postmaster = user;
1259 run.postmaster = "postmaster";
1262 return(implicitmode);
1265 static RETSIGTYPE terminate_poll(int sig)
1266 /* to be executed at the end of a poll cycle */
1269 * Close all SMTP delivery sockets. For optimum performance
1270 * we'd like to hold them open til end of run, but (1) this
1271 * loses if our poll interval is longer than the MTA's inactivity
1272 * timeout, and (2) some MTAs (like smail) don't deliver after
1273 * each message, but rather queue up mail and wait to actually
1274 * deliver it until the input socket is closed.
1276 * Sending SMTP QUIT on signal is theoretically nice, but led to a
1277 * subtle bug. If fetchmail was terminated by signal while it was
1278 * shipping message text, it would hang forever waiting for a
1279 * command acknowledge. In theory we could enable the QUIT
1280 * only outside of the message send. In practice, we don't
1281 * care. All mailservers hang up on a dropped TCP/IP connection
1286 report(stdout, GT_("terminated with signal %d\n"), sig);
1291 /* terminate all SMTP connections cleanly */
1292 for (ctl = querylist; ctl; ctl = ctl->next)
1293 if (ctl->smtp_socket != -1)
1295 /* don't send QUIT for ODMR case because we're acting
1296 as a proxy between the SMTP server and client. */
1297 smtp_close(ctl, ctl->server.protocol != P_ODMR);
1303 * Update UID information at end of each poll, rather than at end
1304 * of run, because that way we don't lose all UIDL information since
1305 * the beginning of time if fetchmail crashes.
1308 write_saved_lists(querylist, run.idfile);
1309 #endif /* POP3_ENABLE */
1312 static RETSIGTYPE terminate_run(int sig)
1313 /* to be executed on normal or signal-induced termination */
1317 terminate_poll(sig);
1320 * Craig Metz, the RFC1938 one-time-password guy, points out:
1321 * "Remember that most kernels don't zero pages before handing them to the
1322 * next process and many kernels share pages between user and kernel space.
1323 * You'd be very surprised what you can find from a short program to do a
1324 * malloc() and then dump the contents of the pages you got. By zeroing
1325 * the secrets at end of run (earlier if you can), you make sure the next
1326 * guy can't get the password/pass phrase."
1328 * Right you are, Craig!
1330 for (ctl = querylist; ctl; ctl = ctl->next)
1332 memset(ctl->password, '\0', strlen(ctl->password));
1334 #if !defined(HAVE_ATEXIT)
1338 if (activecount == 0)
1341 exit(successes ? PS_SUCCESS : querystatus);
1345 * Sequence of protocols to try when autoprobing, most capable to least.
1347 static const int autoprobe[] =
1351 #endif /* IMAP_ENABLE */
1354 #endif /* POP3_ENABLE */
1357 #endif /* POP2_ENABLE */
1360 static int query_host(struct query *ctl)
1361 /* perform fetch transaction with single host */
1366 * If we're syslogging the progress messages are automatically timestamped.
1367 * Force timestamping if we're going to a logfile.
1369 if (outlevel >= O_VERBOSE)
1371 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll started\n"),
1373 ctl->server.pollname,
1374 showproto(ctl->server.protocol),
1378 switch (ctl->server.protocol) {
1380 for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
1382 ctl->server.protocol = autoprobe[i];
1384 st = query_host(ctl);
1387 if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH || st == PS_DNS)
1390 ctl->server.protocol = P_AUTO;
1396 report(stderr, GT_("POP2 support is not configured.\n"));
1398 #endif /* POP2_ENABLE */
1406 } while (st == PS_REPOLL);
1408 report(stderr, GT_("POP3 support is not configured.\n"));
1410 #endif /* POP3_ENABLE */
1416 } while (st == PS_REPOLL);
1418 report(stderr, GT_("IMAP support is not configured.\n"));
1420 #endif /* IMAP_ENABLE */
1424 report(stderr, GT_("ETRN support is not configured.\n"));
1429 #endif /* ETRN_ENABLE */
1432 report(stderr, GT_("ODMR support is not configured.\n"));
1436 #endif /* ODMR_ENABLE */
1439 report(stderr, GT_("unsupported protocol selected.\n"));
1444 * If we're syslogging the progress messages are automatically timestamped.
1445 * Force timestamping if we're going to a logfile.
1447 if (outlevel >= O_VERBOSE)
1449 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll completed\n"),
1451 ctl->server.pollname,
1452 showproto(ctl->server.protocol),
1459 static void dump_params (struct runctl *runp,
1460 struct query *querylist, flag implicit)
1461 /* display query parameters in English */
1465 if (runp->poll_interval)
1466 printf(GT_("Poll interval is %d seconds\n"), runp->poll_interval);
1468 printf(GT_("Logfile is %s\n"), runp->logfile);
1469 if (strcmp(runp->idfile, IDFILE_NAME))
1470 printf(GT_("Idfile is %s\n"), runp->idfile);
1471 #if defined(HAVE_SYSLOG)
1472 if (runp->use_syslog)
1473 printf(GT_("Progress messages will be logged via syslog\n"));
1475 if (runp->invisible)
1476 printf(GT_("Fetchmail will masquerade and will not generate Received\n"));
1478 printf(GT_("Fetchmail will show progress dots even in logfiles.\n"));
1479 if (runp->postmaster)
1480 printf(GT_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
1483 if (!runp->bouncemail)
1484 printf(GT_("Fetchmail will direct error mail to the postmaster.\n"));
1485 else if (outlevel >= O_VERBOSE)
1486 printf(GT_("Fetchmail will direct error mail to the sender.\n"));
1488 for (ctl = querylist; ctl; ctl = ctl->next)
1490 if (!ctl->active || (implicit && ctl->server.skip))
1493 printf(GT_("Options for retrieving from %s@%s:\n"),
1494 ctl->remotename, visbuf(ctl->server.pollname));
1496 if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
1497 printf(GT_(" Mail will be retrieved via %s\n"), ctl->server.via);
1499 if (ctl->server.interval)
1500 printf(ngettext(" Poll of this server will occur every %d interval.\n",
1501 " Poll of this server will occur every %d intervals.\n",
1502 ctl->server.interval), ctl->server.interval);
1503 if (ctl->server.truename)
1504 printf(GT_(" True name of server is %s.\n"), ctl->server.truename);
1505 if (ctl->server.skip || outlevel >= O_VERBOSE)
1506 printf(ctl->server.skip
1507 ? GT_(" This host will not be queried when no host is specified.\n")
1508 : GT_(" This host will be queried when no host is specified.\n"));
1509 if (!NO_PASSWORD(ctl))
1512 printf(GT_(" Password will be prompted for.\n"));
1513 else if (outlevel >= O_VERBOSE)
1515 if (ctl->server.protocol == P_APOP)
1516 printf(GT_(" APOP secret = \"%s\".\n"),
1517 visbuf(ctl->password));
1518 else if (ctl->server.protocol == P_RPOP)
1519 printf(GT_(" RPOP id = \"%s\".\n"),
1520 visbuf(ctl->password));
1522 printf(GT_(" Password = \"%s\".\n"),
1523 visbuf(ctl->password));
1527 if (ctl->server.protocol == P_POP3
1528 && ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
1529 && (ctl->server.authenticate == A_KERBEROS_V4 ||
1530 ctl->server.authenticate == A_KERBEROS_V5))
1531 printf(GT_(" Protocol is KPOP with Kerberos %s authentication"),
1532 ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
1534 printf(GT_(" Protocol is %s"), showproto(ctl->server.protocol));
1535 if (ctl->server.service)
1536 printf(GT_(" (using service %s)"), ctl->server.service);
1537 else if (outlevel >= O_VERBOSE)
1538 printf(GT_(" (using default port)"));
1539 if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
1540 printf(GT_(" (forcing UIDL use)"));
1543 switch (ctl->server.authenticate)
1546 printf(GT_(" All available authentication methods will be tried.\n"));
1549 printf(GT_(" Password authentication will be forced.\n"));
1552 printf(GT_(" MSN authentication will be forced.\n"));
1555 printf(GT_(" NTLM authentication will be forced.\n"));
1558 printf(GT_(" OTP authentication will be forced.\n"));
1561 printf(GT_(" CRAM-Md5 authentication will be forced.\n"));
1564 printf(GT_(" GSSAPI authentication will be forced.\n"));
1567 printf(GT_(" Kerberos V4 authentication will be forced.\n"));
1570 printf(GT_(" Kerberos V5 authentication will be forced.\n"));
1573 printf(GT_(" End-to-end encryption assumed.\n"));
1576 if (ctl->server.principal != (char *) NULL)
1577 printf(GT_(" Mail service principal is: %s\n"), ctl->server.principal);
1580 printf(GT_(" SSL encrypted sessions enabled.\n"));
1582 printf(GT_(" SSL protocol: %s.\n"), ctl->sslproto);
1583 if (ctl->sslcertck) {
1584 printf(GT_(" SSL server certificate checking enabled.\n"));
1585 if (ctl->sslcertpath != NULL)
1586 printf(GT_(" SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
1588 if (ctl->sslfingerprint != NULL)
1589 printf(GT_(" SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
1591 if (ctl->server.timeout > 0)
1592 printf(GT_(" Server nonresponse timeout is %d seconds"), ctl->server.timeout);
1593 if (ctl->server.timeout == CLIENT_TIMEOUT)
1594 printf(GT_(" (default).\n"));
1598 if (MAILBOX_PROTOCOL(ctl))
1600 if (!ctl->mailboxes->id)
1601 printf(GT_(" Default mailbox selected.\n"));
1606 printf(GT_(" Selected mailboxes are:"));
1607 for (idp = ctl->mailboxes; idp; idp = idp->next)
1608 printf(" %s", (char *)idp->id);
1611 printf(ctl->fetchall
1612 ? GT_(" All messages will be retrieved (--all on).\n")
1613 : GT_(" Only new messages will be retrieved (--all off).\n"));
1615 ? GT_(" Fetched messages will be kept on the server (--keep on).\n")
1616 : GT_(" Fetched messages will not be kept on the server (--keep off).\n"));
1618 ? GT_(" Old messages will be flushed before message retrieval (--flush on).\n")
1619 : GT_(" Old messages will not be flushed before message retrieval (--flush off).\n"));
1620 printf(ctl->limitflush
1621 ? GT_(" Oversized messages will be flushed before message retrieval (--limitflush on).\n")
1622 : GT_(" Oversized messages will not be flushed before message retrieval (--limitflush off).\n"));
1624 ? GT_(" Rewrite of server-local addresses is enabled (--norewrite off).\n")
1625 : GT_(" Rewrite of server-local addresses is disabled (--norewrite on).\n"));
1627 ? GT_(" Carriage-return stripping is enabled (stripcr on).\n")
1628 : GT_(" Carriage-return stripping is disabled (stripcr off).\n"));
1630 ? GT_(" Carriage-return forcing is enabled (forcecr on).\n")
1631 : GT_(" Carriage-return forcing is disabled (forcecr off).\n"));
1632 printf(ctl->pass8bits
1633 ? GT_(" Interpretation of Content-Transfer-Encoding is disabled (pass8bits on).\n")
1634 : GT_(" Interpretation of Content-Transfer-Encoding is enabled (pass8bits off).\n"));
1635 printf(ctl->mimedecode
1636 ? GT_(" MIME decoding is enabled (mimedecode on).\n")
1637 : GT_(" MIME decoding is disabled (mimedecode off).\n"));
1639 ? GT_(" Idle after poll is enabled (idle on).\n")
1640 : GT_(" Idle after poll is disabled (idle off).\n"));
1641 printf(ctl->dropstatus
1642 ? GT_(" Nonempty Status lines will be discarded (dropstatus on)\n")
1643 : GT_(" Nonempty Status lines will be kept (dropstatus off)\n"));
1644 printf(ctl->dropdelivered
1645 ? GT_(" Delivered-To lines will be discarded (dropdelivered on)\n")
1646 : GT_(" Delivered-To lines will be kept (dropdelivered off)\n"));
1647 if (NUM_NONZERO(ctl->limit))
1649 if (NUM_NONZERO(ctl->limit))
1650 printf(GT_(" Message size limit is %d octets (--limit %d).\n"),
1651 ctl->limit, ctl->limit);
1652 else if (outlevel >= O_VERBOSE)
1653 printf(GT_(" No message size limit (--limit 0).\n"));
1654 if (run.poll_interval > 0)
1655 printf(GT_(" Message size warning interval is %d seconds (--warnings %d).\n"),
1656 ctl->warnings, ctl->warnings);
1657 else if (outlevel >= O_VERBOSE)
1658 printf(GT_(" Size warnings on every poll (--warnings 0).\n"));
1660 if (NUM_NONZERO(ctl->fetchlimit))
1661 printf(GT_(" Received-message limit is %d (--fetchlimit %d).\n"),
1662 ctl->fetchlimit, ctl->fetchlimit);
1663 else if (outlevel >= O_VERBOSE)
1664 printf(GT_(" No received-message limit (--fetchlimit 0).\n"));
1665 if (NUM_NONZERO(ctl->fetchsizelimit))
1666 printf(GT_(" Fetch message size limit is %d (--fetchsizelimit %d).\n"),
1667 ctl->fetchsizelimit, ctl->fetchsizelimit);
1668 else if (outlevel >= O_VERBOSE)
1669 printf(GT_(" No fetch message size limit (--fetchsizelimit 0).\n"));
1670 if (NUM_NONZERO(ctl->fastuidl) && MAILBOX_PROTOCOL(ctl))
1672 if (ctl->fastuidl == 1)
1673 printf(GT_(" Do binary search of UIDs during each poll (--fastuidl 1).\n"));
1675 printf(GT_(" Do binary search of UIDs during %d out of %d polls (--fastuidl %d).\n"), ctl->fastuidl - 1, ctl->fastuidl, ctl->fastuidl);
1677 else if (outlevel >= O_VERBOSE)
1678 printf(GT_(" Do linear search of UIDs during each poll (--fastuidl 0).\n"));
1679 if (NUM_NONZERO(ctl->batchlimit))
1680 printf(GT_(" SMTP message batch limit is %d.\n"), ctl->batchlimit);
1681 else if (outlevel >= O_VERBOSE)
1682 printf(GT_(" No SMTP message batch limit (--batchlimit 0).\n"));
1683 if (MAILBOX_PROTOCOL(ctl))
1685 if (NUM_NONZERO(ctl->expunge))
1686 printf(GT_(" Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
1687 else if (outlevel >= O_VERBOSE)
1688 printf(GT_(" No forced expunges (--expunge 0).\n"));
1691 else /* ODMR or ETRN */
1695 printf(GT_(" Domains for which mail will be fetched are:"));
1696 for (idp = ctl->domainlist; idp; idp = idp->next)
1698 printf(" %s", (char *)idp->id);
1699 if (!idp->val.status.mark)
1700 printf(GT_(" (default)"));
1705 printf(GT_(" Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
1706 else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
1707 printf(GT_(" Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
1714 printf(GT_(" Messages will be %cMTP-forwarded to:"),
1716 for (idp = ctl->smtphunt; idp; idp = idp->next)
1718 printf(" %s", (char *)idp->id);
1719 if (!idp->val.status.mark)
1720 printf(GT_(" (default)"));
1724 if (ctl->smtpaddress)
1725 printf(GT_(" Host part of MAIL FROM line will be %s\n"),
1728 printf(GT_(" Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
1731 if (MAILBOX_PROTOCOL(ctl))
1733 if (ctl->antispam != (struct idlist *)NULL)
1737 printf(GT_(" Recognized listener spam block responses are:"));
1738 for (idp = ctl->antispam; idp; idp = idp->next)
1739 printf(" %d", idp->val.status.num);
1742 else if (outlevel >= O_VERBOSE)
1743 printf(GT_(" Spam-blocking disabled\n"));
1745 if (ctl->preconnect)
1746 printf(GT_(" Server connection will be brought up with \"%s\".\n"),
1747 visbuf(ctl->preconnect));
1748 else if (outlevel >= O_VERBOSE)
1749 printf(GT_(" No pre-connection command.\n"));
1750 if (ctl->postconnect)
1751 printf(GT_(" Server connection will be taken down with \"%s\".\n"),
1752 visbuf(ctl->postconnect));
1753 else if (outlevel >= O_VERBOSE)
1754 printf(GT_(" No post-connection command.\n"));
1755 if (MAILBOX_PROTOCOL(ctl)) {
1756 if (!ctl->localnames)
1757 printf(GT_(" No localnames declared for this host.\n"));
1763 for (idp = ctl->localnames; idp; idp = idp->next)
1766 if (count > 1 || ctl->wildcard)
1767 printf(GT_(" Multi-drop mode: "));
1769 printf(GT_(" Single-drop mode: "));
1771 printf(ngettext("%d local name recognized.\n", "%d local names recognized.\n", count), count);
1772 if (outlevel >= O_VERBOSE)
1774 for (idp = ctl->localnames; idp; idp = idp->next)
1776 printf("\t%s -> %s\n", (char *)idp->id, (char *)idp->val.id2);
1778 printf("\t%s\n", (char *)idp->id);
1780 fputs("\t*\n", stdout);
1783 if (count > 1 || ctl->wildcard)
1785 printf(ctl->server.dns
1786 ? GT_(" DNS lookup for multidrop addresses is enabled.\n")
1787 : GT_(" DNS lookup for multidrop addresses is disabled.\n"));
1788 if (ctl->server.dns)
1790 if (ctl->server.checkalias)
1791 printf(GT_(" Server aliases will be compared with multidrop addresses by IP address.\n"));
1793 printf(GT_(" Server aliases will be compared with multidrop addresses by name.\n"));
1795 if (ctl->server.envelope == STRING_DISABLED)
1796 printf(GT_(" Envelope-address routing is disabled\n"));
1799 printf(GT_(" Envelope header is assumed to be: %s\n"),
1800 ctl->server.envelope ? ctl->server.envelope : "Received");
1801 if (ctl->server.envskip || outlevel >= O_VERBOSE)
1802 printf(GT_(" Number of envelope headers to be skipped over: %d\n"),
1803 ctl->server.envskip);
1804 if (ctl->server.qvirtual)
1805 printf(GT_(" Prefix %s will be removed from user id\n"),
1806 ctl->server.qvirtual);
1807 else if (outlevel >= O_VERBOSE)
1808 printf(GT_(" No prefix stripping\n"));
1811 if (ctl->server.akalist)
1815 printf(GT_(" Predeclared mailserver aliases:"));
1816 for (idp = ctl->server.akalist; idp; idp = idp->next)
1817 printf(" %s", (char *)idp->id);
1820 if (ctl->server.localdomains)
1824 printf(GT_(" Local domains:"));
1825 for (idp = ctl->server.localdomains; idp; idp = idp->next)
1826 printf(" %s", (char *)idp->id);
1833 if (ctl->server.interface)
1834 printf(GT_(" Connection must be through interface %s.\n"), ctl->server.interface);
1835 else if (outlevel >= O_VERBOSE)
1836 printf(GT_(" No interface requirement specified.\n"));
1837 if (ctl->server.monitor)
1838 printf(GT_(" Polling loop will monitor %s.\n"), ctl->server.monitor);
1839 else if (outlevel >= O_VERBOSE)
1840 printf(GT_(" No monitor interface specified.\n"));
1843 if (ctl->server.plugin)
1844 printf(GT_(" Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
1845 else if (outlevel >= O_VERBOSE)
1846 printf(GT_(" No plugin command specified.\n"));
1847 if (ctl->server.plugout)
1848 printf(GT_(" Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
1849 else if (outlevel >= O_VERBOSE)
1850 printf(GT_(" No plugout command specified.\n"));
1852 if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
1855 printf(GT_(" No UIDs saved from this host.\n"));
1861 for (idp = ctl->oldsaved; idp; idp = idp->next)
1864 printf(GT_(" %d UIDs saved.\n"), count);
1865 if (outlevel >= O_VERBOSE)
1866 for (idp = ctl->oldsaved; idp; idp = idp->next)
1867 printf("\t%s\n", (char *)idp->id);
1871 if (ctl->server.tracepolls)
1872 printf(GT_(" Poll trace information will be added to the Received header.\n"));
1873 else if (outlevel >= O_VERBOSE)
1874 printf(GT_(" No poll trace information will be added to the Received header.\n.\n"));
1876 if (ctl->properties)
1877 printf(GT_(" Pass-through properties \"%s\".\n"),
1878 visbuf(ctl->properties));
1882 /* fetchmail.c ends here */