2 * fetchmail.c -- main driver module for fetchmail
4 * For license terms, see the file COPYING in this directory.
9 #if defined(STDC_HEADERS)
12 #if defined(HAVE_UNISTD_H)
18 #if defined(HAVE_SYSLOG)
26 #include <sys/types.h>
28 #include <sys/time.h> /* needed for Sun 4.1.2 */
30 #include <sys/resource.h>
31 #endif /* HAVE_SETRLIMIT */
32 #include <sys/utsname.h>
34 #ifdef HAVE_NET_SOCKET_H
35 #include <net/socket.h>
37 #ifdef HAVE_GETHOSTBYNAME
39 #endif /* HAVE_GETHOSTBYNAME */
46 #include "fetchmail.h"
54 #define ENETUNREACH 128 /* Interactive doesn't know this */
55 #endif /* ENETUNREACH */
57 /* prototypes for internal functions */
58 static int load_params(int, char **, int);
59 static void dump_params (struct runctl *runp, struct query *, flag implicit);
60 static int query_host(struct query *);
62 /* controls the detail level of status/progress messages written to stderr */
63 int outlevel; /* see the O_.* constants above */
65 /* miscellaneous global controls */
66 struct runctl run; /* global controls for this run */
67 flag nodetach; /* if TRUE, don't detach daemon process */
68 flag quitmode; /* if --quit was set */
69 flag check_only; /* if --probe was set */
70 flag versioninfo; /* emit only version info */
71 char *user; /* the name of the invoking user */
72 char *home; /* invoking user's home directory */
73 char *fmhome; /* fetchmail's home directory */
74 char *program_name; /* the name to prefix error messages with */
75 flag configdump; /* dump control blocks for configurator */
76 char *fetchmailhost; /* either `localhost' or the host's FQDN */
81 #endif /* NET_SECURITY */
83 static int querystatus; /* status of query */
84 static int successes; /* count number of successful polls */
85 static int activecount; /* count number of active entries */
86 static struct runctl cmd_run; /* global options set from command line */
87 static time_t parsetime; /* time of last parse */
89 static void terminate_run(int);
90 static void terminate_poll(int);
92 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
93 /* drop SGID kmem privileage until we need it */
94 static void dropprivs(void)
104 if (gr && !strcmp(gr->gr_name, "kmem"))
106 extern void interface_set_gids(gid_t egid, gid_t rgid);
107 interface_set_gids(egid, rgid);
113 #if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
116 static char *timestamp (void)
122 setlocale (LC_TIME, "");
123 strftime (buf, sizeof (buf), "%c", localtime(&now));
124 setlocale (LC_TIME, "C");
128 #define timestamp rfc822timestamp
131 int main(int argc, char **argv)
134 int parsestatus, implicitmode = FALSE;
136 netrc_entry *netrc_list;
137 char *netrc_file, *tmpbuf;
141 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
145 envquery(argc, argv);
147 setlocale (LC_ALL, "");
148 bindtextdomain(PACKAGE, LOCALEDIR);
153 * Note: because we can't initialize reporting before we know whether
154 * syslog is supposed to be on, this message will go to stdout and
155 * be lost when running in background.
157 if (outlevel >= O_VERBOSE)
161 report(stdout, _("fetchmail: invoked with"));
162 for (i = 0; i < argc; i++)
163 report(stdout, " %s", argv[i]);
164 report(stdout, "\n");
167 #define IDFILE_NAME ".fetchids"
168 run.idfile = (char *) xmalloc(strlen(fmhome)+sizeof(IDFILE_NAME)+2);
169 strcpy(run.idfile, fmhome);
170 strcat(run.idfile, "/");
171 strcat(run.idfile, IDFILE_NAME);
176 * We used to arrange for the lock to be removed on exit close
177 * to where the lock was asserted. Now we need to do it here, because
178 * we might have re-executed in background with an existing lock
179 * as the result of a changed rcfile (see the code near the execvp(3)
180 * call near the beginning of the polling loop for details). We want
181 * to be sure the lock gets nuked on any error exit, basically.
185 if ((parsestatus = parsecmdline(argc,argv, &cmd_run, &cmd_opts)) < 0)
190 printf(_("This is fetchmail release %s"), VERSION);
193 #endif /* POP2_ENABLE */
196 #endif /* POP3_ENABLE */
199 #endif /* IMAP_ENABLE */
205 #endif /* RPA_ENABLE */
208 #endif /* NTLM_ENABLE */
211 #endif /* SDPS_ENABLE */
214 #endif /* ETRN_ENABLE */
217 #endif /* ODMR_ENABLE */
223 #endif /* OPIE_ENABLE */
226 #endif /* INET6_ENABLE */
229 #endif /* NET_SECURITY */
232 #endif /* HAVE_SOCKS */
235 #endif /* ENABLE_NLS */
239 /* this is an attempt to help remote debugging */
243 /* avoid parsing the config file if all we're doing is killing a daemon */
244 if (!(quitmode && argc == 2))
245 implicitmode = load_params(argc, argv, optind);
247 #if defined(HAVE_SYSLOG)
248 /* logging should be set up early in case we were restarted from exec */
251 #if defined(LOG_MAIL)
252 openlog(program_name, LOG_PID, LOG_MAIL);
254 /* Assume BSD4.2 openlog with two arguments */
255 openlog(program_name, LOG_PID);
261 report_init((run.poll_interval == 0 || nodetach) && !run.logfile);
263 /* construct the lockfile */
266 #ifdef HAVE_SETRLIMIT
268 * Before getting passwords, disable core dumps unless -v -d0 mode is on.
269 * Core dumps could otherwise contain passwords to be scavenged by a
272 if (outlevel < O_VERBOSE || run.poll_interval > 0)
274 struct rlimit corelimit;
275 corelimit.rlim_cur = 0;
276 corelimit.rlim_max = 0;
277 setrlimit(RLIMIT_CORE, &corelimit);
279 #endif /* HAVE_SETRLIMIT */
281 #define NETRC_FILE ".netrc"
282 /* parse the ~/.netrc file (if present) for future password lookups. */
283 xalloca(netrc_file, char *, strlen(home) + sizeof(NETRC_FILE) + 2);
284 strcpy (netrc_file, home);
285 strcat (netrc_file, "/");
286 strcat (netrc_file, NETRC_FILE);
287 netrc_list = parse_netrc(netrc_file);
290 /* pick up passwords where we can */
291 for (ctl = querylist; ctl; ctl = ctl->next)
293 if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
295 if (NO_PASSWORD(ctl))
296 /* Server won't care what the password is, but there
297 must be some non-null string here. */
298 ctl->password = ctl->remotename;
303 /* look up the pollname and account in the .netrc file. */
304 p = search_netrc(netrc_list,
305 ctl->server.pollname, ctl->remotename);
306 /* if we find a matching entry with a password, use it */
307 if (p && p->password)
308 ctl->password = xstrdup(p->password);
310 /* otherwise try with "via" name if there is one */
311 else if (ctl->server.via)
313 p = search_netrc(netrc_list,
314 ctl->server.via, ctl->remotename);
315 if (p && p->password)
316 ctl->password = xstrdup(p->password);
322 /* perhaps we just want to check options? */
325 int havercfile = access(rcfile, 0);
327 printf(_("Taking options from command line%s%s\n"),
328 havercfile ? "" : _(" and "),
329 havercfile ? "" : rcfile);
331 if (querylist == NULL)
333 _("No mailservers set up -- perhaps %s is missing?\n"),
336 dump_params(&run, querylist, implicitmode);
340 /* dump options as a Python dictionary, for configurator use */
343 dump_config(&run, querylist);
347 /* check for another fetchmail running concurrently */
350 pid = bkgd ? -pid : pid;
352 /* if no mail servers listed and nothing in background, we're done */
353 if (!(quitmode && argc == 2) && pid == 0 && querylist == NULL) {
354 (void)fputs(_("fetchmail: no mailservers have been specified.\n"),stderr);
358 /* perhaps user asked us to kill the other fetchmail */
363 fprintf(stderr,_("fetchmail: no other fetchmail is running\n"));
367 else if (kill(pid, SIGTERM) < 0)
369 fprintf(stderr,_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
370 bkgd ? _("background") : _("foreground"), pid);
375 fprintf(stderr,_("fetchmail: %s fetchmail at %d killed.\n"),
376 bkgd ? _("background") : _("foreground"), pid);
385 /* another fetchmail is running -- wake it up or die */
391 _("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
394 else if (!implicitmode)
397 _("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
404 _("fetchmail: another foreground fetchmail is running at %d.\n"),
410 /* this test enables re-execing on a changed rcfile */
416 _("fetchmail: can't accept options while a background fetchmail is running.\n"));
420 else if (kill(pid, SIGUSR1) == 0)
423 _("fetchmail: background fetchmail at %d awakened.\n"),
430 * Should never happen -- possible only if a background fetchmail
431 * croaks after the first kill probe above but before the
432 * SIGUSR1/SIGHUP transmission.
435 _("fetchmail: elder sibling at %d died mysteriously.\n"),
437 return(PS_UNDEFINED);
441 /* pick up interactively any passwords we need but don't have */
442 for (ctl = querylist; ctl; ctl = ctl->next)
444 if (ctl->active && !(implicitmode && ctl->server.skip)
445 && !NO_PASSWORD(ctl) && !ctl->password)
450 _("fetchmail: can't find a password for %s@%s.\n"),
451 ctl->remotename, ctl->server.pollname);
456 char* password_prompt = _("Enter password for %s@%s: ");
458 xalloca(tmpbuf, char *, strlen(password_prompt) +
459 strlen(ctl->remotename) +
460 strlen(ctl->server.pollname) + 1);
461 (void) sprintf(tmpbuf, password_prompt,
462 ctl->remotename, ctl->server.pollname);
463 ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
469 * Time to initiate the SOCKS library (this is not mandatory: it just
470 * registers the correct application name for logging purpose. If you
471 * have some problem, comment out these lines).
474 SOCKSinit("fetchmail");
475 #endif /* HAVE_SOCKS */
478 * Maybe time to go to demon mode...
480 if (run.poll_interval)
485 daemonize(run.logfile, terminate_run);
486 report(stdout, _("starting fetchmail %s daemon \n"), VERSION);
489 * We'll set up a handler for these when we're sleeping,
490 * but ignore them otherwise so as not to interrupt a poll.
492 signal(SIGUSR1, SIG_IGN);
493 if (run.poll_interval && !getuid())
494 signal(SIGHUP, SIG_IGN);
498 deal_with_sigchld(); /* or else we may accumulate too many zombies */
499 if (run.logfile && access(run.logfile, F_OK) == 0)
501 freopen(run.logfile, "a", stdout);
502 freopen(run.logfile, "a", stderr);
510 /* beyond here we don't want more than one fetchmail running per user */
512 signal(SIGABRT, terminate_run);
513 signal(SIGINT, terminate_run);
514 signal(SIGTERM, terminate_run);
515 signal(SIGALRM, terminate_run);
516 signal(SIGPIPE, terminate_run);
517 signal(SIGQUIT, terminate_run);
519 /* here's the exclusion lock */
523 * Query all hosts. If there's only one, the error return will
524 * reflect the status of that transaction.
528 * Check to see if the rcfile has been touched. If so,
529 * re-exec so the file will be reread. Doing it this way
530 * avoids all the complications of trying to deallocate the
531 * in-core control structures -- and the potential memory
536 if (stat(rcfile, &rcstat) == -1)
540 _("couldn't time-check %s (error %d)\n"),
543 else if (rcstat.st_mtime > parsetime)
545 report(stdout, _("restarting fetchmail (%s changed)\n"), rcfile);
547 * Matthias Andree: Isn't this prone to introduction of
548 * "false" programs by interfering with PATH? Those
549 * path-searching execs might not be the best ideas for
552 * Rob Funk: But is there any way for someone to modify
553 * the PATH variable of a running fetchmail? I don't know
556 * Dave's change makes fetchmail restart itself in exactly
557 * the way it was started from the shell (or shell script)
558 * in the first place. If you're concerned about PATH
559 * contamination, call fetchmail initially with a full
560 * path, and use Dave's patch.
562 * Not using a -p variant of exec means that the restart
563 * will break if both (a) the user depended on PATH to
564 * call fetchmail in the first place, and (b) the system
565 * doesn't save the whole path in argv[0] if the whole
566 * path wasn't used in the initial call. (If I recall
567 * correctly, Linux saves it but many other Unices don't.)
569 execvp(argv[0], argv);
570 report(stderr, _("attempt to re-exec fetchmail failed\n"));
573 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
575 * This was an efficiency hack that backfired. The theory
576 * was that using TCP/IP for DNS queries would get us better
577 * reliability and shave off some per-UDP-packet costs.
578 * Unfortunately it interacted badly with diald, which effectively
579 * filters out DNS queries over TCP/IP for reasons having to do
580 * with some obscure Linux kernel problem involving bootstrapping of
581 * dynamically-addressed links. I don't understand this mess
582 * and don't want to, so it's "See ya!" to this hack.
584 sethostent(TRUE); /* use TCP/IP for mailserver queries */
585 #endif /* HAVE_RES_SEARCH */
589 for (ctl = querylist; ctl; ctl = ctl->next)
593 if (!(implicitmode && ctl->server.skip))
598 _("poll of %s skipped (failed authentication or too many timeouts)\n"),
599 ctl->server.pollname);
603 /* check skip interval first so that it counts all polls */
604 if (run.poll_interval && ctl->server.interval)
606 if (ctl->server.poll_count++ % ctl->server.interval)
608 if (outlevel >= O_VERBOSE)
610 _("interval not reached, not querying %s\n"),
611 ctl->server.pollname);
616 #if (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__)
618 * Don't do monitoring if we were woken by a signal.
619 * Note that interface_approve() does its own error logging.
621 if (!interface_approve(&ctl->server, !lastsig))
623 #endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
625 querystatus = query_host(ctl);
628 /* leave the UIDL state alone if there have been any errors */
630 ((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
632 #endif /* POP3_ENABLE */
634 if (querystatus == PS_SUCCESS)
636 else if (!check_only &&
637 ((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
641 report(stdout,_("Query status=0 (SUCCESS)\n"));break;
643 report(stdout,_("Query status=1 (NOMAIL)\n")); break;
645 report(stdout,_("Query status=2 (SOCKET)\n")); break;
647 report(stdout,_("Query status=3 (AUTHFAIL)\n"));break;
649 report(stdout,_("Query status=4 (PROTOCOL)\n"));break;
651 report(stdout,_("Query status=5 (SYNTAX)\n")); break;
653 report(stdout,_("Query status=6 (IOERR)\n")); break;
655 report(stdout,_("Query status=7 (ERROR)\n")); break;
657 report(stdout,_("Query status=8 (EXCLUDE)\n")); break;
659 report(stdout,_("Query status=9 (LOCKBUSY)\n"));break;
661 report(stdout,_("Query status=10 (SMTP)\n")); break;
663 report(stdout,_("Query status=11 (DNS)\n")); break;
665 report(stdout,_("Query status=12 (BSMTP)\n")); break;
667 report(stdout,_("Query status=13 (MAXFETCH)\n"));break;
669 report(stdout,_("Query status=%d\n"),querystatus);
673 #if (defined(linux) && !INET6_ENABLE) || defined (__FreeBSD__)
674 if (ctl->server.monitor)
677 * Allow some time for the link to quiesce. One
678 * second is usually sufficient, three is safe.
679 * Note: this delay is important - don't remove!
682 interface_note_activity(&ctl->server);
684 #endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
688 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
689 endhostent(); /* release TCP/IP connection to nameserver */
690 #endif /* HAVE_RES_SEARCH */
692 /* close connections cleanly */
696 * OK, we've polled. Now sleep.
698 if (run.poll_interval)
701 * Because passwords can expire, it may happen that *all*
702 * hosts are now out of the loop due to authfail
703 * conditions. If this happens daemon-mode fetchmail
704 * should softly and silently vanish away, rather than
705 * spinning uselessly.
709 for (ctl = querylist; ctl; ctl = ctl->next)
710 if (ctl->active && !(implicitmode && ctl->server.skip))
715 report(stderr, _("All connections are wedged. Exiting.\n"));
716 /* FIXME: someday, send notification mail */
720 if (outlevel >= O_VERBOSE)
722 _("fetchmail: sleeping at %s\n"), timestamp());
725 * OK, now pause until it's time for the next poll cycle.
726 * A nonzero return indicates we received a wakeup signal;
727 * unwedge all servers in case the problem has been
730 if ((lastsig = interruptible_idle(run.poll_interval)))
732 #ifdef SYS_SIGLIST_DECLARED
734 _("awakened by %s\n"), sys_siglist[lastsig]);
737 _("awakened by signal %d\n"), lastsig);
739 for (ctl = querylist; ctl; ctl = ctl->next)
743 if (outlevel >= O_VERBOSE)
744 report(stdout, _("awakened at %s\n"), timestamp());
749 if (outlevel >= O_VERBOSE)
750 report(stdout, _("normal termination, status %d\n"),
751 successes ? PS_SUCCESS : querystatus);
757 else if (querystatus)
760 /* in case we interrupted before a successful fetch */
764 static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
767 * If force is off, modify dstl fields only when they're empty (treat srcl
768 * as defaults). If force is on, modify each dstl field whenever scrcl
769 * is nonempty (treat srcl as an override).
771 if (force ? !!*srcl : !*dstl)
773 struct idlist *cpl = copy_str_list(*srcl);
775 append_str_list(dstl, &cpl);
779 static void optmerge(struct query *h2, struct query *h1, int force)
780 /* merge two options records */
782 list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
783 list_merge(&h2->localnames, &h1->localnames, force);
784 list_merge(&h2->mailboxes, &h1->mailboxes, force);
785 list_merge(&h2->smtphunt, &h1->smtphunt, force);
786 list_merge(&h2->domainlist, &h1->domainlist, force);
787 list_merge(&h2->antispam, &h1->antispam, force);
789 #define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
790 FLAG_MERGE(server.via);
791 FLAG_MERGE(server.protocol);
793 FLAG_MERGE(server.service);
794 FLAG_MERGE(server.netsec);
795 #else /* INET6_ENABLE */
796 FLAG_MERGE(server.port);
797 #endif /* INET6_ENABLE */
798 FLAG_MERGE(server.interval);
799 FLAG_MERGE(server.authenticate);
800 FLAG_MERGE(server.timeout);
801 FLAG_MERGE(server.envelope);
802 FLAG_MERGE(server.envskip);
803 FLAG_MERGE(server.qvirtual);
804 FLAG_MERGE(server.skip);
805 FLAG_MERGE(server.dns);
806 FLAG_MERGE(server.checkalias);
807 FLAG_MERGE(server.uidl);
808 FLAG_MERGE(server.principal);
810 #if defined(linux) || defined(__FreeBSD__)
811 FLAG_MERGE(server.interface);
812 FLAG_MERGE(server.monitor);
813 FLAG_MERGE(server.interface_pair);
814 #endif /* linux || defined(__FreeBSD__) */
816 FLAG_MERGE(server.plugin);
817 FLAG_MERGE(server.plugout);
819 FLAG_MERGE(wildcard);
820 FLAG_MERGE(remotename);
821 FLAG_MERGE(password);
824 FLAG_MERGE(listener);
825 FLAG_MERGE(smtpaddress);
826 FLAG_MERGE(smtpname);
827 FLAG_MERGE(preconnect);
828 FLAG_MERGE(postconnect);
832 FLAG_MERGE(fetchall);
836 FLAG_MERGE(pass8bits);
837 FLAG_MERGE(dropstatus);
838 FLAG_MERGE(dropdelivered);
839 FLAG_MERGE(mimedecode);
842 FLAG_MERGE(warnings);
843 FLAG_MERGE(fetchlimit);
844 FLAG_MERGE(batchlimit);
849 FLAG_MERGE(sslproto);
850 FLAG_MERGE(sslcertck);
851 FLAG_MERGE(sslcertpath);
852 FLAG_MERGE(sslfingerprint);
856 FLAG_MERGE(tracepolls);
857 FLAG_MERGE(properties);
861 static int load_params(int argc, char **argv, int optind)
863 int implicitmode, st;
865 struct query def_opts, *ctl;
868 run.bouncemail = TRUE;
869 run.spambounce = FALSE; /* don't bounce back to innocent bystanders */
871 memset(&def_opts, '\0', sizeof(struct query));
872 def_opts.smtp_socket = -1;
873 def_opts.smtpaddress = (char *)0;
874 def_opts.smtpname = (char *)0;
875 #define ANTISPAM(n) save_str(&def_opts.antispam, STRING_DUMMY, 0)->val.status.num = (n)
876 ANTISPAM(571); /* sendmail */
877 ANTISPAM(550); /* old exim */
878 ANTISPAM(501); /* new exim */
879 ANTISPAM(554); /* Postfix */
882 def_opts.server.protocol = P_AUTO;
883 def_opts.server.timeout = CLIENT_TIMEOUT;
884 def_opts.warnings = WARNING_INTERVAL;
885 def_opts.remotename = user;
886 def_opts.listener = SMTP_MODE;
888 /* note the parse time, so we can pick up on modifications */
889 parsetime = 0; /* foil compiler warnings */
890 if (stat(rcfile, &rcstat) != -1)
891 parsetime = rcstat.st_mtime;
892 else if (errno != ENOENT)
893 report(stderr, _("couldn't time-check the run-control file\n"));
895 /* this builds the host list */
896 if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
898 * FIXME: someday, send notification mail here if backgrounded.
899 * Right now, that can happen if the user changes the rcfile
900 * while the fetchmail is running in background. Do similarly
901 * for the other exit() calls in this function.
905 if ((implicitmode = (optind >= argc)))
907 for (ctl = querylist; ctl; ctl = ctl->next)
911 for (; optind < argc; optind++)
913 flag predeclared = FALSE;
916 * If hostname corresponds to a host known from the rc file,
917 * simply declare it active. Otherwise synthesize a host
918 * record from command line and defaults
920 for (ctl = querylist; ctl; ctl = ctl->next)
921 if (!strcmp(ctl->server.pollname, argv[optind])
922 || str_in_list(&ctl->server.akalist, argv[optind], TRUE))
924 /* Is this correct? */
925 if (predeclared && outlevel == O_VERBOSE)
926 fprintf(stderr,_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
934 * Allocate and link record without copying in
935 * command-line args; we'll do that with the optmerge
938 ctl = hostalloc((struct query *)NULL);
940 ctl->server.pollname = xstrdup(argv[optind]);
942 ctl->server.lead_server = (struct hostdata *)NULL;
947 * If there's a defaults record, merge it and lose it.
949 if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
951 for (ctl = querylist->next; ctl; ctl = ctl->next)
952 optmerge(ctl, querylist, FALSE);
953 querylist = querylist->next;
956 /* don't allow a defaults record after the first */
957 for (ctl = querylist; ctl; ctl = ctl->next)
958 if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0)
961 /* use localhost if we never fetch the FQDN of this host */
962 fetchmailhost = "localhost";
964 /* here's where we override globals */
966 run.logfile = cmd_run.logfile;
968 run.idfile = cmd_run.idfile;
969 /* do this before the keep/fetchall test below, otherwise -d0 may fail */
970 if (cmd_run.poll_interval >= 0)
971 run.poll_interval = cmd_run.poll_interval;
972 if (cmd_run.invisible)
973 run.invisible = cmd_run.invisible;
974 if (cmd_run.showdots)
975 run.showdots = cmd_run.showdots;
976 if (cmd_run.use_syslog)
977 run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
978 if (cmd_run.postmaster)
979 run.postmaster = cmd_run.postmaster;
980 if (cmd_run.bouncemail)
981 run.bouncemail = cmd_run.bouncemail;
983 /* check and daemon options are not compatible */
984 if (check_only && run.poll_interval)
985 run.poll_interval = 0;
988 * DNS support is required for some protocols. We used to
989 * do this unconditionally, but it made fetchmail excessively
990 * vulnerable to misconfigured DNS setups.
992 * If we're using ETRN or ODMR, the smtp hunt list is the
993 * list of systems we're polling on behalf of; these have
994 * to be fully-qualified domain names. The default for
995 * this list should be the FQDN of localhost.
997 * If we're using Kerberos for authentication, we need
998 * the FQDN in order to generate capability keys.
1000 if (strcmp(fetchmailhost, "localhost") == 0)
1001 for (ctl = querylist; ctl; ctl = ctl->next)
1003 (ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
1004 || ctl->server.authenticate == A_KERBEROS_V4
1005 || ctl->server.authenticate == A_KERBEROS_V5))
1007 fetchmailhost = host_fqdn();
1011 /* merge in wired defaults, do sanity checks and prepare internal fields */
1012 for (ctl = querylist; ctl; ctl = ctl->next)
1014 ctl->wedged = FALSE;
1016 if (configdump || ctl->active )
1018 /* merge in defaults */
1019 optmerge(ctl, &def_opts, FALSE);
1021 /* force command-line options */
1022 optmerge(ctl, &cmd_opts, TRUE);
1024 /* this code enables flags to be turned off */
1025 #define DEFAULT(flag, dflt) if (flag == FLAG_TRUE)\
1027 else if (flag == FLAG_FALSE)\
1031 DEFAULT(ctl->keep, FALSE);
1032 DEFAULT(ctl->fetchall, FALSE);
1033 DEFAULT(ctl->flush, FALSE);
1034 DEFAULT(ctl->rewrite, TRUE);
1035 DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL));
1036 DEFAULT(ctl->forcecr, FALSE);
1037 DEFAULT(ctl->pass8bits, FALSE);
1038 DEFAULT(ctl->dropstatus, FALSE);
1039 DEFAULT(ctl->dropdelivered, FALSE);
1040 DEFAULT(ctl->mimedecode, FALSE);
1041 DEFAULT(ctl->idle, FALSE);
1042 DEFAULT(ctl->server.dns, TRUE);
1043 DEFAULT(ctl->server.uidl, FALSE);
1045 DEFAULT(ctl->use_ssl, FALSE);
1046 DEFAULT(ctl->sslcertck, FALSE);
1048 DEFAULT(ctl->server.checkalias, FALSE);
1052 * Make sure we have a nonempty host list to forward to.
1055 save_str(&ctl->smtphunt, fetchmailhost, FALSE);
1058 * Make sure we have a nonempty list of domains to fetch from.
1060 if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
1061 save_str(&ctl->domainlist, fetchmailhost, FALSE);
1063 /* if `user' doesn't name a real local user, try to run as root */
1064 if ((pw = getpwnam(user)) == (struct passwd *)NULL)
1067 ctl->uid = pw->pw_uid; /* for local delivery via MDA */
1068 if (!ctl->localnames) /* for local delivery via SMTP */
1069 save_str_pair(&ctl->localnames, user, NULL);
1071 #if !defined(HAVE_GETHOSTBYNAME) || !defined(HAVE_RES_SEARCH)
1072 /* can't handle multidrop mailboxes unless we can do DNS lookups */
1073 if (ctl->localnames && ctl->localnames->next && ctl->server.dns)
1075 ctl->server.dns = FALSE;
1076 report(stderr, _("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
1078 #endif /* !HAVE_GETHOSTBYNAME || !HAVE_RES_SEARCH */
1080 if (ctl->server.via)
1081 ctl->server.queryname = xstrdup(ctl->server.via);
1083 ctl->server.queryname = xstrdup(ctl->server.pollname);
1086 /* If either the pollname or vianame are "hesiod" we want to
1087 lookup the user's hesiod pobox host */
1089 if (!strcasecmp(ctl->server.queryname, "hesiod")) {
1090 struct hes_postoffice *hes_p;
1091 hes_p = hes_getmailhost(ctl->remotename);
1092 if (hes_p != NULL && strcmp(hes_p->po_type, "POP") == 0) {
1093 free(ctl->server.queryname);
1094 ctl->server.queryname = xstrdup(hes_p->po_host);
1095 if (ctl->server.via)
1096 free(ctl->server.via);
1097 ctl->server.via = xstrdup(hes_p->po_host);
1100 _("couldn't find HESIOD pobox for %s\n"),
1107 * We may have to canonicalize the server truename for later use.
1108 * Do this just once for each lead server, if necessary, in order
1109 * to minimize DNS round trips.
1111 if (ctl->server.lead_server)
1113 char *leadname = ctl->server.lead_server->truename;
1115 /* prevent core dump from ill-formed or duplicate entry */
1118 report(stderr, _("Lead server has no name.\n"));
1122 ctl->server.truename = xstrdup(leadname);
1124 #ifdef HAVE_GETHOSTBYNAME
1125 else if (ctl->active && ctl->server.dns && !configdump)
1127 if (ctl->server.authenticate==A_KERBEROS_V4 ||
1128 ctl->server.authenticate==A_KERBEROS_V5 ||
1129 (ctl->server.dns && MULTIDROP(ctl)))
1131 struct hostent *namerec;
1133 /* compute the canonical name of the host */
1135 namerec = gethostbyname(ctl->server.queryname);
1136 if (namerec == (struct hostent *)NULL)
1139 _("couldn't find canonical DNS name of %s\n"),
1140 ctl->server.pollname);
1141 ctl->server.truename = xstrdup(ctl->server.queryname);
1142 ctl->server.trueaddr = NULL;
1145 ctl->server.truename=xstrdup((char *)namerec->h_name);
1147 #endif /* HAVE_GETHOSTBYNAME */
1148 else if (ctl->active)
1150 #ifdef HAVE_GETHOSTBYNAME
1151 struct hostent *namerec;
1154 * Get the host's IP, so we can report it like this:
1156 * Received: from hostname [10.0.0.1]
1158 * For ultra-efficiency, we should find the IP later, when
1159 * we are actually resolving the hostname for a connection.
1160 * Problem is this would have to be done inside SockOpen
1161 * and there's no way to do that that wouldn't both (a)
1162 * be horribly complicated, and (b) blow a couple of
1163 * layers of modularity all to hell.
1166 namerec = gethostbyname(ctl->server.queryname);
1167 if (namerec == (struct hostent *)NULL)
1170 _("couldn't find canonical DNS name of %s\n"),
1171 ctl->server.pollname);
1172 ctl->server.truename = xstrdup(ctl->server.queryname);
1173 ctl->active = FALSE;
1174 /* use this initially to flag DNS errors */
1178 ctl->server.truename=xstrdup((char *)namerec->h_name);
1179 ctl->server.trueaddr=xmalloc(namerec->h_length);
1180 memcpy(ctl->server.trueaddr,
1181 namerec->h_addr_list[0],
1183 ctl->wedged = FALSE;
1186 ctl->server.truename = xstrdup(ctl->server.queryname);
1187 #endif /* HAVE_GETHOSTBYNAME */
1192 * This is a kluge. It enables users to edit their
1193 * configurations when DNS isn't available.
1195 ctl->server.truename = xstrdup(ctl->server.queryname);
1197 /* if no folders were specified, set up the null one as default */
1198 if (!ctl->mailboxes)
1199 save_str(&ctl->mailboxes, (char *)NULL, 0);
1201 /* maybe user overrode timeout on command line? */
1202 if (ctl->server.timeout == -1)
1203 ctl->server.timeout = CLIENT_TIMEOUT;
1207 if (ctl->server.port < 0)
1209 (void) fprintf(stderr,
1210 _("%s configuration invalid, port number cannot be negative\n"),
1211 ctl->server.pollname);
1214 if (ctl->server.protocol == P_RPOP && ctl->server.port >= 1024)
1216 (void) fprintf(stderr,
1217 _("%s configuration invalid, RPOP requires a privileged port\n"),
1218 ctl->server.pollname);
1221 if (ctl->listener == LMTP_MODE)
1225 for (idp = ctl->smtphunt; idp; idp = idp->next)
1229 if (!(cp = strrchr(idp->id, '/')) ||
1230 (atoi(++cp) == SMTP_PORT))
1232 (void) fprintf(stderr,
1233 _("%s configuration invalid, LMTP can't use default SMTP port\n"),
1234 ctl->server.pollname);
1239 #endif /* !INET6_ENABLE */
1242 * "I beg to you, have mercy on the week minds like myself."
1243 * wrote Pehr Anderson. Your petition is granted.
1245 if (ctl->fetchall && ctl->keep && run.poll_interval && !nodetach)
1247 (void) fprintf(stderr,
1248 _("Both fetchall and keep on in daemon mode is a mistake!\n"));
1255 /* initialize UID handling */
1256 if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
1259 initialize_saved_lists(querylist, run.idfile);
1260 #endif /* POP3_ENABLE */
1263 * If the user didn't set a last-resort user to get misaddressed
1264 * multidrop mail, set an appropriate default here.
1266 if (!run.postmaster)
1268 if (getuid()) /* ordinary user */
1269 run.postmaster = user;
1271 run.postmaster = "postmaster";
1275 * If all connections are wedged due to DNS errors, quit. This is
1276 * important for the common case that you just have one connection.
1281 for (ctl = querylist; ctl; ctl = ctl->next)
1286 (void) fprintf(stderr,
1287 _("all mailserver name lookups failed, exiting\n"));
1292 return(implicitmode);
1295 static void terminate_poll(int sig)
1296 /* to be executed at the end of a poll cycle */
1299 * Close all SMTP delivery sockets. For optimum performance
1300 * we'd like to hold them open til end of run, but (1) this
1301 * loses if our poll interval is longer than the MTA's inactivity
1302 * timeout, and (2) some MTAs (like smail) don't deliver after
1303 * each message, but rather queue up mail and wait to actually
1304 * deliver it until the input socket is closed.
1306 * Sending SMTP QUIT on signal is theoretically nice, but led to a
1307 * subtle bug. If fetchmail was terminated by signal while it was
1308 * shipping message text, it would hang forever waiting for a
1309 * command acknowledge. In theory we could enable the QUIT
1310 * only outside of the message send. In practice, we don't
1311 * care. All mailservers hang up on a dropped TCP/IP connection
1316 report(stdout, _("terminated with signal %d\n"), sig);
1321 /* terminate all SMTP connections cleanly */
1322 for (ctl = querylist; ctl; ctl = ctl->next)
1323 if (ctl->smtp_socket != -1)
1325 /* don't send QUIT for ODMR case because we're acting
1326 as a proxy between the SMTP server and client. */
1327 if (ctl->server.protocol != P_ODMR)
1328 SMTP_quit(ctl->smtp_socket);
1329 SockClose(ctl->smtp_socket);
1330 ctl->smtp_socket = -1;
1336 * Update UID information at end of each poll, rather than at end
1337 * of run, because that way we don't lose all UIDL information since
1338 * the beginning of time if fetchmail crashes.
1341 write_saved_lists(querylist, run.idfile);
1342 #endif /* POP3_ENABLE */
1345 static void terminate_run(int sig)
1346 /* to be executed on normal or signal-induced termination */
1350 terminate_poll(sig);
1353 * Craig Metz, the RFC1938 one-time-password guy, points out:
1354 * "Remember that most kernels don't zero pages before handing them to the
1355 * next process and many kernels share pages between user and kernel space.
1356 * You'd be very surprised what you can find from a short program to do a
1357 * malloc() and then dump the contents of the pages you got. By zeroing
1358 * the secrets at end of run (earlier if you can), you make sure the next
1359 * guy can't get the password/pass phrase."
1361 * Right you are, Craig!
1363 for (ctl = querylist; ctl; ctl = ctl->next)
1365 memset(ctl->password, '\0', strlen(ctl->password));
1367 #if !defined(HAVE_ATEXIT) && !defined(HAVE_ON_EXIT)
1371 if (activecount == 0)
1374 exit(successes ? PS_SUCCESS : querystatus);
1378 * Sequence of protocols to try when autoprobing, most capable to least.
1380 static const int autoprobe[] =
1384 #endif /* IMAP_ENABLE */
1387 #endif /* POP3_ENABLE */
1390 #endif /* POP2_ENABLE */
1393 static int query_host(struct query *ctl)
1394 /* perform fetch transaction with single host */
1399 * If we're syslogging the progress messages are automatically timestamped.
1400 * Force timestamping if we're going to a logfile.
1402 if (outlevel >= O_VERBOSE || (run.logfile && outlevel > O_SILENT))
1404 report(stdout, _("%s querying %s (protocol %s) at %s\n"),
1406 ctl->server.pollname,
1407 showproto(ctl->server.protocol),
1410 switch (ctl->server.protocol) {
1412 for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
1414 ctl->server.protocol = autoprobe[i];
1415 st = query_host(ctl);
1416 if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH)
1419 ctl->server.protocol = P_AUTO;
1423 return(doPOP2(ctl));
1425 report(stderr, _("POP2 support is not configured.\n"));
1426 return(PS_PROTOCOL);
1427 #endif /* POP2_ENABLE */
1433 return(doPOP3(ctl));
1435 report(stderr, _("POP3 support is not configured.\n"));
1436 return(PS_PROTOCOL);
1437 #endif /* POP3_ENABLE */
1441 return(doIMAP(ctl));
1443 report(stderr, _("IMAP support is not configured.\n"));
1444 return(PS_PROTOCOL);
1445 #endif /* IMAP_ENABLE */
1448 report(stderr, _("ETRN support is not configured.\n"));
1449 return(PS_PROTOCOL);
1451 #ifdef HAVE_GETHOSTBYNAME
1452 return(doETRN(ctl));
1454 report(stderr, _("Cannot support ETRN without gethostbyname(2).\n"));
1455 return(PS_PROTOCOL);
1456 #endif /* HAVE_GETHOSTBYNAME */
1457 #endif /* ETRN_ENABLE */
1460 report(stderr, _("ODMR support is not configured.\n"));
1461 return(PS_PROTOCOL);
1463 #ifdef HAVE_GETHOSTBYNAME
1464 return(doODMR(ctl));
1466 report(stderr, _("Cannot support ODMR without gethostbyname(2).\n"));
1467 return(PS_PROTOCOL);
1468 #endif /* HAVE_GETHOSTBYNAME */
1469 #endif /* ODMR_ENABLE */
1471 report(stderr, _("unsupported protocol selected.\n"));
1472 return(PS_PROTOCOL);
1476 static void dump_params (struct runctl *runp,
1477 struct query *querylist, flag implicit)
1478 /* display query parameters in English */
1482 if (runp->poll_interval)
1483 printf(_("Poll interval is %d seconds\n"), runp->poll_interval);
1485 printf(_("Logfile is %s\n"), runp->logfile);
1486 if (strcmp(runp->idfile, IDFILE_NAME))
1487 printf(_("Idfile is %s\n"), runp->idfile);
1488 #if defined(HAVE_SYSLOG)
1489 if (runp->use_syslog)
1490 printf(_("Progress messages will be logged via syslog\n"));
1492 if (runp->invisible)
1493 printf(_("Fetchmail will masquerade and will not generate Received\n"));
1495 printf(_("Fetchmail will show progress dots even in logfiles.\n"));
1496 if (runp->postmaster)
1497 printf(_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
1500 if (!runp->bouncemail)
1501 printf(_("Fetchmail will direct error mail to the postmaster.\n"));
1502 else if (outlevel >= O_VERBOSE)
1503 printf(_("Fetchmail will direct error mail to the sender.\n"));
1505 for (ctl = querylist; ctl; ctl = ctl->next)
1507 if (!ctl->active || (implicit && ctl->server.skip))
1510 printf(_("Options for retrieving from %s@%s:\n"),
1511 ctl->remotename, visbuf(ctl->server.pollname));
1513 if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
1514 printf(_(" Mail will be retrieved via %s\n"), ctl->server.via);
1516 if (ctl->server.interval)
1517 printf(_(" Poll of this server will occur every %d intervals.\n"),
1518 ctl->server.interval);
1519 if (ctl->server.truename)
1520 printf(_(" True name of server is %s.\n"), ctl->server.truename);
1521 if (ctl->server.skip || outlevel >= O_VERBOSE)
1522 printf(_(" This host %s be queried when no host is specified.\n"),
1523 ctl->server.skip ? _("will not") : _("will"));
1524 if (!NO_PASSWORD(ctl))
1527 printf(_(" Password will be prompted for.\n"));
1528 else if (outlevel >= O_VERBOSE)
1530 if (ctl->server.protocol == P_APOP)
1531 printf(_(" APOP secret = \"%s\".\n"),
1532 visbuf(ctl->password));
1533 else if (ctl->server.protocol == P_RPOP)
1534 printf(_(" RPOP id = \"%s\".\n"),
1535 visbuf(ctl->password));
1537 printf(_(" Password = \"%s\".\n"),
1538 visbuf(ctl->password));
1542 if (ctl->server.protocol == P_POP3
1544 && ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
1545 #else /* INET6_ENABLE */
1546 && ctl->server.port == KPOP_PORT
1547 #endif /* INET6_ENABLE */
1548 && (ctl->server.authenticate == A_KERBEROS_V4 ||
1549 ctl->server.authenticate == A_KERBEROS_V5))
1550 printf(_(" Protocol is KPOP with Kerberos %s authentication"),
1551 ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
1553 printf(_(" Protocol is %s"), showproto(ctl->server.protocol));
1555 if (ctl->server.service)
1556 printf(_(" (using service %s)"), ctl->server.service);
1557 if (ctl->server.netsec)
1558 printf(_(" (using network security options %s)"), ctl->server.netsec);
1559 #else /* INET6_ENABLE */
1560 if (ctl->server.port)
1561 printf(_(" (using port %d)"), ctl->server.port);
1562 #endif /* INET6_ENABLE */
1563 else if (outlevel >= O_VERBOSE)
1564 printf(_(" (using default port)"));
1565 if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
1566 printf(_(" (forcing UIDL use)"));
1569 switch (ctl->server.authenticate)
1572 printf(_(" All available authentication methods will be tried.\n"));
1575 printf(_(" Password authentication will be forced.\n"));
1578 printf(_(" NTLM authentication will be forced.\n"));
1581 printf(_(" OTP authentication will be forced.\n"));
1584 printf(_(" CRAM-Md5 authentication will be forced.\n"));
1587 printf(_(" GSSAPI authentication will be forced.\n"));
1590 printf(_(" Kerberos V4 authentication will be forced.\n"));
1593 printf(_(" Kerberos V5 authentication will be forced.\n"));
1596 printf(_(" End-to-end encryption assumed.\n"));
1599 if (ctl->server.principal != (char *) NULL)
1600 printf(_(" Mail service principal is: %s\n"), ctl->server.principal);
1603 printf(_(" SSL encrypted sessions enabled.\n"));
1604 if (ctl->sslcertck) {
1605 printf(_(" SSL server certificate checking enabled.\n"));
1606 if (ctl->sslcertpath != NULL)
1607 printf(_(" SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
1609 if (ctl->sslfingerprint != NULL)
1610 printf(_(" SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
1612 if (ctl->server.timeout > 0)
1613 printf(_(" Server nonresponse timeout is %d seconds"), ctl->server.timeout);
1614 if (ctl->server.timeout == CLIENT_TIMEOUT)
1615 printf(_(" (default).\n"));
1619 if (MAILBOX_PROTOCOL(ctl))
1621 if (!ctl->mailboxes->id)
1622 printf(_(" Default mailbox selected.\n"));
1627 printf(_(" Selected mailboxes are:"));
1628 for (idp = ctl->mailboxes; idp; idp = idp->next)
1629 printf(" %s", idp->id);
1632 printf(_(" %s messages will be retrieved (--all %s).\n"),
1633 ctl->fetchall ? _("All") : _("Only new"),
1634 ctl->fetchall ? "on" : "off");
1635 printf(_(" Fetched messages %s be kept on the server (--keep %s).\n"),
1636 ctl->keep ? _("will") : _("will not"),
1637 ctl->keep ? "on" : "off");
1638 printf(_(" Old messages %s be flushed before message retrieval (--flush %s).\n"),
1639 ctl->flush ? _("will") : _("will not"),
1640 ctl->flush ? "on" : "off");
1641 printf(_(" Rewrite of server-local addresses is %s (--norewrite %s).\n"),
1642 ctl->rewrite ? _("enabled") : _("disabled"),
1643 ctl->rewrite ? "off" : "on");
1644 printf(_(" Carriage-return stripping is %s (stripcr %s).\n"),
1645 ctl->stripcr ? _("enabled") : _("disabled"),
1646 ctl->stripcr ? "on" : "off");
1647 printf(_(" Carriage-return forcing is %s (forcecr %s).\n"),
1648 ctl->forcecr ? _("enabled") : _("disabled"),
1649 ctl->forcecr ? "on" : "off");
1650 printf(_(" Interpretation of Content-Transfer-Encoding is %s (pass8bits %s).\n"),
1651 ctl->pass8bits ? _("disabled") : _("enabled"),
1652 ctl->pass8bits ? "on" : "off");
1653 printf(_(" MIME decoding is %s (mimedecode %s).\n"),
1654 ctl->mimedecode ? _("enabled") : _("disabled"),
1655 ctl->mimedecode ? "on" : "off");
1656 printf(_(" Idle after poll is %s (idle %s).\n"),
1657 ctl->idle ? _("enabled") : _("disabled"),
1658 ctl->idle ? "on" : "off");
1659 printf(_(" Nonempty Status lines will be %s (dropstatus %s)\n"),
1660 ctl->dropstatus ? _("discarded") : _("kept"),
1661 ctl->dropstatus ? "on" : "off");
1662 printf(_(" Delivered-To lines will be %s (dropdelivered %s)\n"),
1663 ctl->dropdelivered ? _("discarded") : _("kept"),
1664 ctl->dropdelivered ? "on" : "off");
1665 if (NUM_NONZERO(ctl->limit))
1667 if (NUM_NONZERO(ctl->limit))
1668 printf(_(" Message size limit is %d octets (--limit %d).\n"),
1669 ctl->limit, ctl->limit);
1670 else if (outlevel >= O_VERBOSE)
1671 printf(_(" No message size limit (--limit 0).\n"));
1672 if (run.poll_interval > 0)
1673 printf(_(" Message size warning interval is %d seconds (--warnings %d).\n"),
1674 ctl->warnings, ctl->warnings);
1675 else if (outlevel >= O_VERBOSE)
1676 printf(_(" Size warnings on every poll (--warnings 0).\n"));
1678 if (NUM_NONZERO(ctl->fetchlimit))
1679 printf(_(" Received-message limit is %d (--fetchlimit %d).\n"),
1680 ctl->fetchlimit, ctl->fetchlimit);
1681 else if (outlevel >= O_VERBOSE)
1682 printf(_(" No received-message limit (--fetchlimit 0).\n"));
1683 if (NUM_NONZERO(ctl->batchlimit))
1684 printf(_(" SMTP message batch limit is %d.\n"), ctl->batchlimit);
1685 else if (outlevel >= O_VERBOSE)
1686 printf(_(" No SMTP message batch limit (--batchlimit 0).\n"));
1687 if (MAILBOX_PROTOCOL(ctl))
1689 if (NUM_NONZERO(ctl->expunge))
1690 printf(_(" Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
1691 else if (outlevel >= O_VERBOSE)
1692 printf(_(" No forced expunges (--expunge 0).\n"));
1695 else /* ODMR or ETRN */
1699 printf(_(" Domains for which mail will be fetched are:"));
1700 for (idp = ctl->domainlist; idp; idp = idp->next)
1702 printf(" %s", idp->id);
1703 if (!idp->val.status.mark)
1704 printf(_(" (default)"));
1709 printf(_(" Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
1710 else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
1711 printf(_(" Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
1718 printf(_(" Messages will be %cMTP-forwarded to:"),
1720 for (idp = ctl->smtphunt; idp; idp = idp->next)
1722 printf(" %s", idp->id);
1723 if (!idp->val.status.mark)
1724 printf(_(" (default)"));
1728 if (ctl->smtpaddress)
1729 printf(_(" Host part of MAIL FROM line will be %s\n"),
1732 printf(_(" Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
1735 if (MAILBOX_PROTOCOL(ctl))
1737 if (ctl->antispam != (struct idlist *)NULL)
1741 printf(_(" Recognized listener spam block responses are:"));
1742 for (idp = ctl->antispam; idp; idp = idp->next)
1743 printf(" %d", idp->val.status.num);
1746 else if (outlevel >= O_VERBOSE)
1747 printf(_(" Spam-blocking disabled\n"));
1749 if (ctl->preconnect)
1750 printf(_(" Server connection will be brought up with \"%s\".\n"),
1751 visbuf(ctl->preconnect));
1752 else if (outlevel >= O_VERBOSE)
1753 printf(_(" No pre-connection command.\n"));
1754 if (ctl->postconnect)
1755 printf(_(" Server connection will be taken down with \"%s\".\n"),
1756 visbuf(ctl->postconnect));
1757 else if (outlevel >= O_VERBOSE)
1758 printf(_(" No post-connection command.\n"));
1759 if (MAILBOX_PROTOCOL(ctl)) {
1760 if (!ctl->localnames)
1761 printf(_(" No localnames declared for this host.\n"));
1767 for (idp = ctl->localnames; idp; idp = idp->next)
1770 if (count > 1 || ctl->wildcard)
1771 printf(_(" Multi-drop mode: "));
1773 printf(_(" Single-drop mode: "));
1775 printf(_("%d local name(s) recognized.\n"), count);
1776 if (outlevel >= O_VERBOSE)
1778 for (idp = ctl->localnames; idp; idp = idp->next)
1780 printf("\t%s -> %s\n", idp->id, idp->val.id2);
1782 printf("\t%s\n", idp->id);
1784 fputs("\t*\n", stdout);
1787 if (count > 1 || ctl->wildcard)
1789 printf(_(" DNS lookup for multidrop addresses is %s.\n"),
1790 ctl->server.dns ? _("enabled") : _("disabled"));
1791 if (ctl->server.dns)
1793 printf(_(" Server aliases will be compared with multidrop addresses by "));
1794 if (ctl->server.checkalias)
1795 printf(_("IP address.\n"));
1797 printf(_("name.\n"));
1799 if (ctl->server.envelope == STRING_DISABLED)
1800 printf(_(" Envelope-address routing is disabled\n"));
1803 printf(_(" Envelope header is assumed to be: %s\n"),
1804 ctl->server.envelope ? ctl->server.envelope:_("Received"));
1805 if (ctl->server.envskip > 1 || outlevel >= O_VERBOSE)
1806 printf(_(" Number of envelope header to be parsed: %d\n"),
1807 ctl->server.envskip);
1808 if (ctl->server.qvirtual)
1809 printf(_(" Prefix %s will be removed from user id\n"),
1810 ctl->server.qvirtual);
1811 else if (outlevel >= O_VERBOSE)
1812 printf(_(" No prefix stripping\n"));
1815 if (ctl->server.akalist)
1819 printf(_(" Predeclared mailserver aliases:"));
1820 for (idp = ctl->server.akalist; idp; idp = idp->next)
1821 printf(" %s", idp->id);
1824 if (ctl->server.localdomains)
1828 printf(_(" Local domains:"));
1829 for (idp = ctl->server.localdomains; idp; idp = idp->next)
1830 printf(" %s", idp->id);
1836 #if defined(linux) || defined(__FreeBSD__)
1837 if (ctl->server.interface)
1838 printf(_(" Connection must be through interface %s.\n"), ctl->server.interface);
1839 else if (outlevel >= O_VERBOSE)
1840 printf(_(" No interface requirement specified.\n"));
1841 if (ctl->server.monitor)
1842 printf(_(" Polling loop will monitor %s.\n"), ctl->server.monitor);
1843 else if (outlevel >= O_VERBOSE)
1844 printf(_(" No monitor interface specified.\n"));
1847 if (ctl->server.plugin)
1848 printf(_(" Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
1849 else if (outlevel >= O_VERBOSE)
1850 printf(_(" No plugin command specified.\n"));
1851 if (ctl->server.plugout)
1852 printf(_(" Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
1853 else if (outlevel >= O_VERBOSE)
1854 printf(_(" No plugout command specified.\n"));
1856 if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
1859 printf(_(" No UIDs saved from this host.\n"));
1865 for (idp = ctl->oldsaved; idp; idp = idp->next)
1868 printf(_(" %d UIDs saved.\n"), count);
1869 if (outlevel >= O_VERBOSE)
1870 for (idp = ctl->oldsaved; idp; idp = idp->next)
1871 printf("\t%s\n", idp->id);
1875 if (ctl->tracepolls)
1876 printf(_(" Poll trace information will be added to the Received header.\n"));
1877 else if (outlevel >= O_VERBOSE)
1878 printf(_(" No poll trace information will be added to the Received header.\n.\n"));
1880 if (ctl->properties)
1881 printf(_(" Pass-through properties \"%s\".\n"),
1882 visbuf(ctl->properties));
1886 /* fetchmail.c ends here */