2 * fetchmail.c -- main driver module for fetchmail
4 * For license terms, see the file COPYING in this directory.
9 #if defined(STDC_HEADERS)
12 #if defined(HAVE_UNISTD_H)
18 #if defined(HAVE_SYSLOG)
26 #include <sys/types.h>
29 #include <sys/resource.h>
30 #endif /* HAVE_SETRLIMIT */
33 #include <socks.h> /* SOCKSinit() */
34 #endif /* HAVE_SOCKS */
36 #ifdef HAVE_LANGINFO_H
40 #include "fetchmail.h"
49 #define ENETUNREACH 128 /* Interactive doesn't know this */
50 #endif /* ENETUNREACH */
52 /* prototypes for internal functions */
53 static int load_params(int, char **, int);
54 static void dump_params (struct runctl *runp, struct query *, flag implicit);
55 static int query_host(struct query *);
57 /* controls the detail level of status/progress messages written to stderr */
58 int outlevel; /* see the O_.* constants above */
60 /* miscellaneous global controls */
61 struct runctl run; /* global controls for this run */
62 flag nodetach; /* if TRUE, don't detach daemon process */
63 flag quitmode; /* if --quit was set */
64 int quitind; /* optind after position of last --quit option */
65 flag check_only; /* if --probe was set */
66 flag versioninfo; /* emit only version info */
67 char *user; /* the name of the invoking user */
68 char *home; /* invoking user's home directory */
69 char *fmhome; /* fetchmail's home directory */
70 char *program_name; /* the name to prefix error messages with */
71 flag configdump; /* dump control blocks for configurator */
72 char *fetchmailhost; /* either `localhost' or the host's FQDN */
74 static int quitonly; /* if we should quit after killing the running daemon */
76 static int querystatus; /* status of query */
77 static int successes; /* count number of successful polls */
78 static int activecount; /* count number of active entries */
79 static struct runctl cmd_run; /* global options set from command line */
80 static time_t parsetime; /* time of last parse */
82 static RETSIGTYPE terminate_run(int);
83 static RETSIGTYPE terminate_poll(int);
85 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
86 /* drop SGID kmem privileage until we need it */
87 static void dropprivs(void)
97 if (gr && !strcmp(gr->gr_name, "kmem"))
99 extern void interface_set_gids(gid_t egid, gid_t rgid);
100 interface_set_gids(egid, rgid);
106 #if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
108 /** returns timestamp in current locale,
109 * and resets LC_TIME locale to POSIX. */
110 static char *timestamp (void)
113 static char buf[60]; /* RATS: ignore */
116 setlocale (LC_TIME, "");
117 strftime (buf, sizeof (buf), "%c", localtime(&now));
118 setlocale (LC_TIME, "C");
122 #define timestamp rfc822timestamp
125 static RETSIGTYPE donothing(int sig)
127 set_signal_handler(sig, donothing);
131 static void printcopyright(FILE *fp) {
132 fprintf(fp, GT_("Copyright (C) 2002, 2003 Eric S. Raymond\n"
133 "Copyright (C) 2004 Matthias Andree, Eric S. Raymond, Rob F. Funk, Graham Wilson\n"
134 "Copyright (C) 2005-2006 Matthias Andree, Sunil Shetye\n"
136 fprintf(fp, GT_("Fetchmail comes with ABSOLUTELY NO WARRANTY. This is free software, and you\n"
137 "are welcome to redistribute it under certain conditions. For details,\n"
138 "please see the file COPYING in the source or documentation directory.\n"));
141 const char *iana_charset;
143 int main(int argc, char **argv)
146 int implicitmode = FALSE;
148 netrc_entry *netrc_list;
149 char *netrc_file, *tmpbuf;
153 #if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
157 envquery(argc, argv);
159 setlocale (LC_ALL, "");
160 bindtextdomain(PACKAGE, LOCALEDIR);
162 iana_charset = norm_charmap(nl_langinfo(CODESET)); /* normalize local
166 iana_charset = "US-ASCII";
170 report(stderr, GT_("WARNING: Running as root is discouraged.\n"));
174 * Note: because we can't initialize reporting before we know whether
175 * syslog is supposed to be on, this message will go to stdout and
176 * be lost when running in background.
178 if (outlevel >= O_VERBOSE)
182 report(stdout, GT_("fetchmail: invoked with"));
183 for (i = 0; i < argc; i++)
184 report(stdout, " %s", argv[i]);
185 report(stdout, "\n");
188 #define IDFILE_NAME ".fetchids"
189 run.idfile = prependdir (IDFILE_NAME, fmhome);
194 * We used to arrange for the lock to be removed on exit close
195 * to where the lock was asserted. Now we need to do it here, because
196 * we might have re-executed in background with an existing lock
197 * as the result of a changed rcfile (see the code near the execvp(3)
198 * call near the beginning of the polling loop for details). We want
199 * to be sure the lock gets nuked on any error exit, basically.
204 /* save the current directory */
205 if (getcwd (currentwd, sizeof (currentwd)) == NULL) {
206 report(stderr, GT_("could not get current working directory\n"));
214 i = parsecmdline(argc, argv, &cmd_run, &cmd_opts);
218 if (quitmode && quitind == argc)
224 const char *features =
227 #endif /* POP2_ENABLE */
230 #endif /* POP3_ENABLE */
233 #endif /* IMAP_ENABLE */
239 #endif /* RPA_ENABLE */
242 #endif /* NTLM_ENABLE */
245 #endif /* SDPS_ENABLE */
248 #endif /* ETRN_ENABLE */
251 #endif /* ODMR_ENABLE */
257 #endif /* OPIE_ENABLE */
258 #ifdef HAVE_PKG_hesiod
263 #endif /* HAVE_SOCKS */
266 #endif /* ENABLE_NLS */
268 printf(GT_("This is fetchmail release %s"), VERSION);
269 fputs(features, stdout);
271 printcopyright(stdout);
273 fputs("Fallback MDA: ", stdout);
275 fputs(FALLBACK_MDA, stdout);
277 fputs("(none)", stdout);
282 /* this is an attempt to help remote debugging */
286 /* avoid parsing the config file if all we're doing is killing a daemon */
288 implicitmode = load_params(argc, argv, optind);
290 #if defined(HAVE_SYSLOG)
291 /* logging should be set up early in case we were restarted from exec */
294 #if defined(LOG_MAIL)
295 openlog(program_name, LOG_PID, LOG_MAIL);
297 /* Assume BSD4.2 openlog with two arguments */
298 openlog(program_name, LOG_PID);
304 report_init((run.poll_interval == 0 || nodetach) && !run.logfile);
307 /* initialize UID handling */
311 if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
314 initialize_saved_lists(querylist, run.idfile);
316 #endif /* POP3_ENABLE */
318 /* construct the lockfile */
321 #ifdef HAVE_SETRLIMIT
323 * Before getting passwords, disable core dumps unless -v -d0 mode is on.
324 * Core dumps could otherwise contain passwords to be scavenged by a
327 if (outlevel < O_VERBOSE || run.poll_interval > 0)
329 struct rlimit corelimit;
330 corelimit.rlim_cur = 0;
331 corelimit.rlim_max = 0;
332 setrlimit(RLIMIT_CORE, &corelimit);
334 #endif /* HAVE_SETRLIMIT */
336 #define NETRC_FILE ".netrc"
337 /* parse the ~/.netrc file (if present) for future password lookups. */
338 netrc_file = prependdir (NETRC_FILE, home);
339 netrc_list = parse_netrc(netrc_file);
343 /* pick up passwords where we can */
344 for (ctl = querylist; ctl; ctl = ctl->next)
346 if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
348 if (NO_PASSWORD(ctl))
349 /* Server won't care what the password is, but there
350 must be some non-null string here. */
351 ctl->password = ctl->remotename;
356 /* look up the pollname and account in the .netrc file. */
357 p = search_netrc(netrc_list,
358 ctl->server.pollname, ctl->remotename);
359 /* if we find a matching entry with a password, use it */
360 if (p && p->password)
361 ctl->password = xstrdup(p->password);
363 /* otherwise try with "via" name if there is one */
364 else if (ctl->server.via)
366 p = search_netrc(netrc_list,
367 ctl->server.via, ctl->remotename);
368 if (p && p->password)
369 ctl->password = xstrdup(p->password);
375 free_netrc(netrc_list);
378 /* perhaps we just want to check options? */
381 int havercfile = access(rcfile, 0);
383 printf(GT_("Taking options from command line%s%s\n"),
384 havercfile ? "" : GT_(" and "),
385 havercfile ? "" : rcfile);
387 if (querylist == NULL)
389 GT_("No mailservers set up -- perhaps %s is missing?\n"),
392 dump_params(&run, querylist, implicitmode);
396 /* dump options as a Python dictionary, for configurator use */
399 dump_config(&run, querylist);
403 /* check for another fetchmail running concurrently */
404 pid = fm_lock_state();
406 pid = bkgd ? -pid : pid;
408 /* if no mail servers listed and nothing in background, we're done */
409 if (!quitonly && pid == 0 && querylist == NULL) {
410 (void)fputs(GT_("fetchmail: no mailservers have been specified.\n"),stderr);
414 /* perhaps user asked us to kill the other fetchmail */
417 if (pid == 0 || pid == getpid())
418 /* this test enables re-execing on a changed rcfile
419 * for pid == getpid() */
422 fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
426 else if (kill(pid, SIGTERM) < 0)
428 fprintf(stderr,GT_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
429 bkgd ? GT_("background") : GT_("foreground"), pid);
436 if (outlevel > O_SILENT)
437 fprintf(stderr,GT_("fetchmail: %s fetchmail at %d killed.\n"),
438 bkgd ? GT_("background") : GT_("foreground"), pid);
439 /* We used to nuke the other process's lock here, with
440 * fm_lock_release(), which is broken. The other process
441 * needs to clear its lock by itself. */
445 /* wait for other process to exit */
446 maxwait = 10; /* seconds */
447 while (kill(pid, 0) == 0 && --maxwait >= 0) {
454 /* another fetchmail is running -- wake it up or die */
460 GT_("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
463 else if (!implicitmode)
466 GT_("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
473 GT_("fetchmail: another foreground fetchmail is running at %d.\n"),
477 else if (getpid() == pid)
478 /* this test enables re-execing on a changed rcfile */
483 GT_("fetchmail: can't accept options while a background fetchmail is running.\n"));
486 else if (kill(pid, SIGUSR1) == 0)
489 GT_("fetchmail: background fetchmail at %d awakened.\n"),
496 * Should never happen -- possible only if a background fetchmail
497 * croaks after the first kill probe above but before the
498 * SIGUSR1/SIGHUP transmission.
501 GT_("fetchmail: elder sibling at %d died mysteriously.\n"),
503 return(PS_UNDEFINED);
507 /* pick up interactively any passwords we need but don't have */
508 for (ctl = querylist; ctl; ctl = ctl->next)
510 if (ctl->active && !(implicitmode && ctl->server.skip)
511 && !NO_PASSWORD(ctl) && !ctl->password)
516 GT_("fetchmail: can't find a password for %s@%s.\n"),
517 ctl->remotename, ctl->server.pollname);
520 const char* password_prompt = GT_("Enter password for %s@%s: ");
521 size_t pplen = strlen(password_prompt) + strlen(ctl->remotename) + strlen(ctl->server.pollname) + 1;
523 tmpbuf = xmalloc(pplen);
524 snprintf(tmpbuf, pplen, password_prompt,
525 ctl->remotename, ctl->server.pollname);
526 ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
533 * Time to initiate the SOCKS library (this is not mandatory: it just
534 * registers the correct application name for logging purpose. If you
535 * have some problem, comment out these lines).
538 SOCKSinit("fetchmail");
539 #endif /* HAVE_SOCKS */
541 /* avoid zombies from plugins */
545 * Maybe time to go to demon mode...
547 if (run.poll_interval)
550 daemonize(run.logfile);
551 report(stdout, GT_("starting fetchmail %s daemon \n"), VERSION);
554 * We'll set up a handler for these when we're sleeping,
555 * but ignore them otherwise so as not to interrupt a poll.
557 set_signal_handler(SIGUSR1, SIG_IGN);
558 if (run.poll_interval && getuid() == ROOT_UID)
559 set_signal_handler(SIGHUP, SIG_IGN);
563 if (run.logfile && !nodetach && access(run.logfile, F_OK) == 0)
565 if (!freopen(run.logfile, "a", stdout))
566 report(stderr, GT_("could not open %s to append logs to \n"), run.logfile);
567 if (!freopen(run.logfile, "a", stderr))
568 report(stdout, GT_("could not open %s to append logs to \n"), run.logfile);
574 /* beyond here we don't want more than one fetchmail running per user */
576 set_signal_handler(SIGABRT, terminate_run);
577 set_signal_handler(SIGINT, terminate_run);
578 set_signal_handler(SIGTERM, terminate_run);
579 set_signal_handler(SIGALRM, terminate_run);
580 set_signal_handler(SIGPIPE, terminate_run);
581 set_signal_handler(SIGQUIT, terminate_run);
583 /* here's the exclusion lock */
587 * Query all hosts. If there's only one, the error return will
588 * reflect the status of that transaction.
592 * Check to see if the rcfile has been touched. If so,
593 * re-exec so the file will be reread. Doing it this way
594 * avoids all the complications of trying to deallocate the
595 * in-core control structures -- and the potential memory
600 if (stat(rcfile, &rcstat) == -1)
604 GT_("couldn't time-check %s (error %d)\n"),
607 else if (rcstat.st_mtime > parsetime)
609 report(stdout, GT_("restarting fetchmail (%s changed)\n"), rcfile);
612 /* restore the startup directory */
613 if (!currentwd[0] || chdir (currentwd) == -1)
614 report(stderr, GT_("attempt to re-exec may fail as directory has not been restored\n"));
618 * Matthias Andree: Isn't this prone to introduction of
619 * "false" programs by interfering with PATH? Those
620 * path-searching execs might not be the best ideas for
623 * Rob Funk: But is there any way for someone to modify
624 * the PATH variable of a running fetchmail? I don't know
627 * Dave's change makes fetchmail restart itself in exactly
628 * the way it was started from the shell (or shell script)
629 * in the first place. If you're concerned about PATH
630 * contamination, call fetchmail initially with a full
631 * path, and use Dave's patch.
633 * Not using a -p variant of exec means that the restart
634 * will break if both (a) the user depended on PATH to
635 * call fetchmail in the first place, and (b) the system
636 * doesn't save the whole path in argv[0] if the whole
637 * path wasn't used in the initial call. (If I recall
638 * correctly, Linux saves it but many other Unices don't.)
640 execvp(argv[0], argv);
641 report(stderr, GT_("attempt to re-exec fetchmail failed\n"));
644 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
646 * This was an efficiency hack that backfired. The theory
647 * was that using TCP/IP for DNS queries would get us better
648 * reliability and shave off some per-UDP-packet costs.
649 * Unfortunately it interacted badly with diald, which effectively
650 * filters out DNS queries over TCP/IP for reasons having to do
651 * with some obscure Linux kernel problem involving bootstrapping of
652 * dynamically-addressed links. I don't understand this mess
653 * and don't want to, so it's "See ya!" to this hack.
655 sethostent(TRUE); /* use TCP/IP for mailserver queries */
656 #endif /* HAVE_RES_SEARCH */
660 for (ctl = querylist; ctl; ctl = ctl->next)
664 if (!(implicitmode && ctl->server.skip))
669 GT_("poll of %s skipped (failed authentication or too many timeouts)\n"),
670 ctl->server.pollname);
674 /* check skip interval first so that it counts all polls */
675 if (run.poll_interval && ctl->server.interval)
677 if (ctl->server.poll_count++ % ctl->server.interval)
679 if (outlevel >= O_VERBOSE)
681 GT_("interval not reached, not querying %s\n"),
682 ctl->server.pollname);
689 * Don't do monitoring if we were woken by a signal.
690 * Note that interface_approve() does its own error logging.
692 if (!interface_approve(&ctl->server, !lastsig))
694 #endif /* CAN_MONITOR */
696 dofastuidl = 0; /* this is reset in the driver if required */
698 querystatus = query_host(ctl);
700 if (NUM_NONZERO(ctl->fastuidl))
701 ctl->fastuidlcount = (ctl->fastuidlcount + 1) % ctl->fastuidl;
703 /* leave the UIDL state alone if there have been any errors */
705 ((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
708 uid_discard_new_list(ctl);
710 #endif /* POP3_ENABLE */
712 if (querystatus == PS_SUCCESS)
714 else if (!check_only &&
715 ((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
719 report(stdout,GT_("Query status=0 (SUCCESS)\n"));break;
721 report(stdout,GT_("Query status=1 (NOMAIL)\n")); break;
723 report(stdout,GT_("Query status=2 (SOCKET)\n")); break;
725 report(stdout,GT_("Query status=3 (AUTHFAIL)\n"));break;
727 report(stdout,GT_("Query status=4 (PROTOCOL)\n"));break;
729 report(stdout,GT_("Query status=5 (SYNTAX)\n")); break;
731 report(stdout,GT_("Query status=6 (IOERR)\n")); break;
733 report(stdout,GT_("Query status=7 (ERROR)\n")); break;
735 report(stdout,GT_("Query status=8 (EXCLUDE)\n")); break;
737 report(stdout,GT_("Query status=9 (LOCKBUSY)\n"));break;
739 report(stdout,GT_("Query status=10 (SMTP)\n")); break;
741 report(stdout,GT_("Query status=11 (DNS)\n")); break;
743 report(stdout,GT_("Query status=12 (BSMTP)\n")); break;
745 report(stdout,GT_("Query status=13 (MAXFETCH)\n"));break;
747 report(stdout,GT_("Query status=%d\n"),querystatus);
752 if (ctl->server.monitor)
755 * Allow some time for the link to quiesce. One
756 * second is usually sufficient, three is safe.
757 * Note: this delay is important - don't remove!
760 interface_note_activity(&ctl->server);
762 #endif /* CAN_MONITOR */
766 #if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
767 endhostent(); /* release TCP/IP connection to nameserver */
768 #endif /* HAVE_RES_SEARCH */
770 /* close connections cleanly */
774 * OK, we've polled. Now sleep.
776 if (run.poll_interval)
779 * Because passwords can expire, it may happen that *all*
780 * hosts are now out of the loop due to authfail
781 * conditions. If this happens daemon-mode fetchmail
782 * should softly and silently vanish away, rather than
783 * spinning uselessly.
787 for (ctl = querylist; ctl; ctl = ctl->next)
788 if (ctl->active && !(implicitmode && ctl->server.skip))
793 report(stderr, GT_("All connections are wedged. Exiting.\n"));
794 /* FIXME: someday, send notification mail */
798 if (outlevel > O_SILENT)
800 GT_("sleeping at %s\n"), timestamp());
803 * With this simple hack, we make it possible for a foreground
804 * fetchmail to wake up one in daemon mode. What we want is the
805 * side effect of interrupting any sleep that may be going on,
806 * forcing fetchmail to re-poll its hosts. The second line is
807 * for people who think all system daemons wake up on SIGHUP.
809 set_signal_handler(SIGUSR1, donothing);
810 if (getuid() != ROOT_UID)
811 set_signal_handler(SIGHUP, donothing);
814 * OK, now pause until it's time for the next poll cycle.
815 * A nonzero return indicates we received a wakeup signal;
816 * unwedge all servers in case the problem has been
819 if ((lastsig = interruptible_idle(run.poll_interval)))
821 if (outlevel > O_SILENT)
822 #ifdef SYS_SIGLIST_DECLARED
824 GT_("awakened by %s\n"), sys_siglist[lastsig]);
827 GT_("awakened by signal %d\n"), lastsig);
829 for (ctl = querylist; ctl; ctl = ctl->next)
833 if (outlevel > O_SILENT)
834 report(stdout, GT_("awakened at %s\n"), timestamp());
839 if (outlevel >= O_VERBOSE)
840 report(stdout, GT_("normal termination, status %d\n"),
841 successes ? PS_SUCCESS : querystatus);
847 else if (querystatus)
850 /* in case we interrupted before a successful fetch */
854 static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
857 * If force is off, modify dstl fields only when they're empty (treat srcl
858 * as defaults). If force is on, modify each dstl field whenever scrcl
859 * is nonempty (treat srcl as an override).
861 if (force ? !!*srcl : !*dstl)
863 struct idlist *cpl = copy_str_list(*srcl);
865 append_str_list(dstl, &cpl);
869 static void optmerge(struct query *h2, struct query *h1, int force)
870 /* merge two options records */
872 list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
873 list_merge(&h2->localnames, &h1->localnames, force);
874 list_merge(&h2->mailboxes, &h1->mailboxes, force);
875 list_merge(&h2->smtphunt, &h1->smtphunt, force);
876 list_merge(&h2->domainlist, &h1->domainlist, force);
877 list_merge(&h2->antispam, &h1->antispam, force);
879 #define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
880 FLAG_MERGE(server.via);
881 FLAG_MERGE(server.protocol);
882 FLAG_MERGE(server.service);
883 FLAG_MERGE(server.interval);
884 FLAG_MERGE(server.authenticate);
885 FLAG_MERGE(server.timeout);
886 FLAG_MERGE(server.envelope);
887 FLAG_MERGE(server.envskip);
888 FLAG_MERGE(server.qvirtual);
889 FLAG_MERGE(server.skip);
890 FLAG_MERGE(server.dns);
891 FLAG_MERGE(server.checkalias);
892 FLAG_MERGE(server.uidl);
893 FLAG_MERGE(server.principal);
896 FLAG_MERGE(server.interface);
897 FLAG_MERGE(server.interface_pair);
898 FLAG_MERGE(server.monitor);
901 FLAG_MERGE(server.plugin);
902 FLAG_MERGE(server.plugout);
903 FLAG_MERGE(server.tracepolls);
905 FLAG_MERGE(wildcard);
906 FLAG_MERGE(remotename);
907 FLAG_MERGE(password);
910 FLAG_MERGE(listener);
911 FLAG_MERGE(smtpaddress);
912 FLAG_MERGE(smtpname);
913 FLAG_MERGE(preconnect);
914 FLAG_MERGE(postconnect);
918 FLAG_MERGE(limitflush);
919 FLAG_MERGE(fetchall);
923 FLAG_MERGE(pass8bits);
924 FLAG_MERGE(dropstatus);
925 FLAG_MERGE(dropdelivered);
926 FLAG_MERGE(mimedecode);
929 FLAG_MERGE(warnings);
930 FLAG_MERGE(fetchlimit);
931 FLAG_MERGE(fetchsizelimit);
932 FLAG_MERGE(fastuidl);
933 FLAG_MERGE(batchlimit);
938 FLAG_MERGE(sslproto);
939 FLAG_MERGE(sslcertck);
940 FLAG_MERGE(sslcertpath);
941 FLAG_MERGE(sslfingerprint);
945 FLAG_MERGE(properties);
949 /** Load configuration files.
950 * \return - true if no servers found on the command line
951 * - false if servers found on the command line */
952 static int load_params(int argc, char **argv, int optind)
954 int implicitmode, st;
956 struct query def_opts, *ctl;
960 run.bouncemail = TRUE;
961 run.spambounce = FALSE; /* don't bounce back to innocent bystanders */
963 memset(&def_opts, '\0', sizeof(struct query));
964 def_opts.smtp_socket = -1;
965 def_opts.smtpaddress = (char *)0;
966 def_opts.smtpname = (char *)0;
967 def_opts.server.protocol = P_AUTO;
968 def_opts.server.timeout = CLIENT_TIMEOUT;
969 def_opts.server.esmtp_name = user;
970 def_opts.warnings = WARNING_INTERVAL;
971 def_opts.remotename = user;
972 def_opts.listener = SMTP_MODE;
973 def_opts.fetchsizelimit = 100;
974 def_opts.fastuidl = 4;
976 /* get the location of rcfile */
978 p = strrchr (rcfile, '/');
979 if (p && (size_t)(p - rcfile) < sizeof (rcfiledir)) {
980 *p = 0; /* replace '/' by '0' */
981 strlcpy (rcfiledir, rcfile, sizeof(rcfiledir));
982 *p = '/'; /* restore '/' */
983 if (!rcfiledir[0]) /* "/.fetchmailrc" case */
984 strcpy (rcfiledir, "/");
987 /* note the parse time, so we can pick up on modifications */
988 parsetime = 0; /* foil compiler warnings */
989 if (stat(rcfile, &rcstat) != -1)
990 parsetime = rcstat.st_mtime;
991 else if (errno != ENOENT)
992 report(stderr, GT_("couldn't time-check the run-control file\n"));
994 /* this builds the host list */
995 if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
997 * FIXME: someday, send notification mail here if backgrounded.
998 * Right now, that can happen if the user changes the rcfile
999 * while the fetchmail is running in background. Do similarly
1000 * for the other exit() calls in this function.
1004 if ((implicitmode = (optind >= argc)))
1006 for (ctl = querylist; ctl; ctl = ctl->next)
1007 ctl->active = !ctl->server.skip;
1010 for (; optind < argc; optind++)
1012 flag predeclared = FALSE;
1015 * If hostname corresponds to a host known from the rc file,
1016 * simply declare it active. Otherwise synthesize a host
1017 * record from command line and defaults
1019 for (ctl = querylist; ctl; ctl = ctl->next)
1020 if (!strcmp(ctl->server.pollname, argv[optind])
1021 || str_in_list(&ctl->server.akalist, argv[optind], TRUE))
1023 /* Is this correct? */
1024 if (predeclared && outlevel >= O_VERBOSE)
1025 fprintf(stderr,GT_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
1033 * Allocate and link record without copying in
1034 * command-line args; we'll do that with the optmerge
1037 ctl = hostalloc((struct query *)NULL);
1039 ctl->server.pollname = xstrdup(argv[optind]);
1041 ctl->server.lead_server = (struct hostdata *)NULL;
1046 * If there's a defaults record, merge it and lose it.
1048 if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
1050 for (ctl = querylist->next; ctl; ctl = ctl->next)
1051 optmerge(ctl, querylist, FALSE);
1052 querylist = querylist->next;
1055 /* don't allow a defaults record after the first */
1056 for (ctl = querylist; ctl; ctl = ctl->next) {
1057 if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0) {
1058 fprintf(stderr, GT_("fetchmail: Error: multiple \"defaults\" records in config file.\n"));
1063 /* use localhost if we never fetch the FQDN of this host */
1064 fetchmailhost = "localhost";
1066 /* here's where we override globals */
1067 if (cmd_run.logfile)
1068 run.logfile = cmd_run.logfile;
1070 run.idfile = cmd_run.idfile;
1071 if (cmd_run.pidfile)
1072 run.pidfile = cmd_run.pidfile;
1073 /* do this before the keep/fetchall test below, otherwise -d0 may fail */
1074 if (cmd_run.poll_interval >= 0)
1075 run.poll_interval = cmd_run.poll_interval;
1076 if (cmd_run.invisible)
1077 run.invisible = cmd_run.invisible;
1078 if (cmd_run.showdots)
1079 run.showdots = cmd_run.showdots;
1080 if (cmd_run.use_syslog)
1081 run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
1082 if (cmd_run.postmaster)
1083 run.postmaster = cmd_run.postmaster;
1084 if (cmd_run.bouncemail)
1085 run.bouncemail = cmd_run.bouncemail;
1087 /* check and daemon options are not compatible */
1088 if (check_only && run.poll_interval)
1089 run.poll_interval = 0;
1092 * DNS support is required for some protocols. We used to
1093 * do this unconditionally, but it made fetchmail excessively
1094 * vulnerable to misconfigured DNS setups.
1096 * If we're using ETRN or ODMR, the smtp hunt list is the
1097 * list of systems we're polling on behalf of; these have
1098 * to be fully-qualified domain names. The default for
1099 * this list should be the FQDN of localhost.
1101 * If we're using Kerberos for authentication, we need
1102 * the FQDN in order to generate capability keys.
1104 for (ctl = querylist; ctl; ctl = ctl->next)
1106 (ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
1107 || ctl->server.authenticate == A_KERBEROS_V4
1108 || ctl->server.authenticate == A_KERBEROS_V5))
1110 fetchmailhost = host_fqdn(1);
1114 if (!ctl) /* list exhausted */
1115 fetchmailhost = host_fqdn(0);
1117 /* this code enables flags to be turned off */
1118 #define DEFAULT(flag, dflt) if (flag == FLAG_TRUE)\
1120 else if (flag == FLAG_FALSE)\
1124 /* one global gets treated specially */
1125 DEFAULT(run.showdots, run.poll_interval==0 || nodetach);
1127 /* merge in wired defaults, do sanity checks and prepare internal fields */
1128 for (ctl = querylist; ctl; ctl = ctl->next)
1130 ctl->wedged = FALSE;
1132 /* merge in defaults */
1133 optmerge(ctl, &def_opts, FALSE);
1135 /* force command-line options */
1136 optmerge(ctl, &cmd_opts, TRUE);
1139 * queryname has to be set up for inactive servers too.
1140 * Otherwise the UIDL code core-dumps on startup.
1142 if (ctl->server.via)
1143 ctl->server.queryname = xstrdup(ctl->server.via);
1145 ctl->server.queryname = xstrdup(ctl->server.pollname);
1148 * We no longer do DNS lookups at startup.
1149 * This is a kluge. It enables users to edit their
1150 * configurations when DNS isn't available.
1152 ctl->server.truename = xstrdup(ctl->server.queryname);
1154 if (configdump || ctl->active )
1156 DEFAULT(ctl->keep, FALSE);
1157 DEFAULT(ctl->fetchall, FALSE);
1158 DEFAULT(ctl->flush, FALSE);
1159 DEFAULT(ctl->limitflush, FALSE);
1160 DEFAULT(ctl->rewrite, TRUE);
1161 DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL));
1162 DEFAULT(ctl->forcecr, FALSE);
1163 DEFAULT(ctl->pass8bits, FALSE);
1164 DEFAULT(ctl->dropstatus, FALSE);
1165 DEFAULT(ctl->dropdelivered, FALSE);
1166 DEFAULT(ctl->mimedecode, FALSE);
1167 DEFAULT(ctl->idle, FALSE);
1168 DEFAULT(ctl->server.dns, TRUE);
1169 DEFAULT(ctl->server.uidl, FALSE);
1170 DEFAULT(ctl->use_ssl, FALSE);
1171 DEFAULT(ctl->sslcertck, FALSE);
1172 DEFAULT(ctl->server.checkalias, FALSE);
1175 * XXX FIXME: do we need this check or can we rely on the .y
1176 * parser handling this?
1180 report(stderr, GT_("SSL support is not compiled in.\n"));
1183 #endif /* SSL_ENABLE */
1187 * Make sure we have a nonempty host list to forward to.
1190 save_str(&ctl->smtphunt, "localhost", FALSE);
1193 * Make sure we have a nonempty list of domains to fetch from.
1195 if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
1196 save_str(&ctl->domainlist, fetchmailhost, FALSE);
1198 /* if `user' doesn't name a real local user, try to run as root */
1199 if ((pw = getpwnam(user)) == (struct passwd *)NULL)
1202 ctl->uid = pw->pw_uid; /* for local delivery via MDA */
1203 if (!ctl->localnames) /* for local delivery via SMTP */
1204 save_str_pair(&ctl->localnames, user, NULL);
1206 #ifndef HAVE_RES_SEARCH
1207 /* can't handle multidrop mailboxes unless we can do DNS lookups */
1208 if (MULTIDROP(ctl) && ctl->server.dns)
1210 ctl->server.dns = FALSE;
1211 report(stderr, GT_("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
1213 #endif /* !HAVE_RES_SEARCH */
1216 * can't handle multidrop mailboxes without "envelope"
1217 * option, this causes truckloads full of support complaints
1218 * "all mail forwarded to postmaster"
1220 if (MULTIDROP(ctl) && !ctl->server.envelope)
1222 report(stderr, GT_("warning: multidrop for %s requires envelope option!\n"), ctl->server.pollname);
1223 report(stderr, GT_("warning: Do not ask for support if all mail goes to postmaster!\n"));
1226 /* if no folders were specified, set up the null one as default */
1227 if (!ctl->mailboxes)
1228 save_str(&ctl->mailboxes, (char *)NULL, 0);
1230 /* maybe user overrode timeout on command line? */
1231 if (ctl->server.timeout == -1)
1232 ctl->server.timeout = CLIENT_TIMEOUT;
1235 if (ctl->server.service) {
1236 int port = servport(ctl->server.service);
1239 (void) fprintf(stderr,
1240 GT_("fetchmail: %s configuration invalid, specify positive port number for service or port\n"),
1241 ctl->server.pollname);
1244 if (ctl->server.protocol == P_RPOP && port >= 1024)
1246 (void) fprintf(stderr,
1247 GT_("fetchmail: %s configuration invalid, RPOP requires a privileged port\n"),
1248 ctl->server.pollname);
1252 if (ctl->listener == LMTP_MODE)
1256 for (idp = ctl->smtphunt; idp; idp = idp->next)
1260 if (!(cp = strrchr(idp->id, '/'))
1261 || (0 == strcmp(cp + 1, SMTP_PORT))
1262 || servport(cp + 1) == SMTP_PORT_NUM)
1264 (void) fprintf(stderr,
1265 GT_("%s configuration invalid, LMTP can't use default SMTP port\n"),
1266 ctl->server.pollname);
1273 * "I beg to you, have mercy on the we[a]k minds like myself."
1274 * wrote Pehr Anderson. Your petition is granted.
1276 if (ctl->fetchall && ctl->keep && (run.poll_interval || ctl->idle) && !nodetach && !configdump)
1278 (void) fprintf(stderr,
1279 GT_("Both fetchall and keep on in daemon or idle mode is a mistake!\n"));
1285 * If the user didn't set a last-resort user to get misaddressed
1286 * multidrop mail, set an appropriate default here.
1288 if (!run.postmaster)
1290 if (getuid() != ROOT_UID) /* ordinary user */
1291 run.postmaster = user;
1293 run.postmaster = "postmaster";
1296 return(implicitmode);
1299 static RETSIGTYPE terminate_poll(int sig)
1300 /* to be executed at the end of a poll cycle */
1304 report(stdout, GT_("terminated with signal %d\n"), sig);
1308 * Update UID information at end of each poll, rather than at end
1309 * of run, because that way we don't lose all UIDL information since
1310 * the beginning of time if fetchmail crashes.
1313 write_saved_lists(querylist, run.idfile);
1314 #endif /* POP3_ENABLE */
1317 static RETSIGTYPE terminate_run(int sig)
1318 /* to be executed on normal or signal-induced termination */
1322 terminate_poll(sig);
1325 * Craig Metz, the RFC1938 one-time-password guy, points out:
1326 * "Remember that most kernels don't zero pages before handing them to the
1327 * next process and many kernels share pages between user and kernel space.
1328 * You'd be very surprised what you can find from a short program to do a
1329 * malloc() and then dump the contents of the pages you got. By zeroing
1330 * the secrets at end of run (earlier if you can), you make sure the next
1331 * guy can't get the password/pass phrase."
1333 * Right you are, Craig!
1335 for (ctl = querylist; ctl; ctl = ctl->next)
1337 memset(ctl->password, '\0', strlen(ctl->password));
1339 #if !defined(HAVE_ATEXIT)
1343 if (activecount == 0)
1346 exit(successes ? PS_SUCCESS : querystatus);
1350 * Sequence of protocols to try when autoprobing, most capable to least.
1352 static const int autoprobe[] =
1356 #endif /* IMAP_ENABLE */
1359 #endif /* POP3_ENABLE */
1362 #endif /* POP2_ENABLE */
1365 static int query_host(struct query *ctl)
1366 /* perform fetch transaction with single host */
1372 * If we're syslogging the progress messages are automatically timestamped.
1373 * Force timestamping if we're going to a logfile.
1375 if (outlevel >= O_VERBOSE)
1377 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll started\n"),
1379 ctl->server.pollname,
1380 showproto(ctl->server.protocol),
1384 switch (ctl->server.protocol) {
1386 for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
1388 ctl->server.protocol = autoprobe[i];
1390 st = query_host(ctl);
1393 if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH || st == PS_DNS)
1396 ctl->server.protocol = P_AUTO;
1402 report(stderr, GT_("POP2 support is not configured.\n"));
1404 #endif /* POP2_ENABLE */
1412 } while (st == PS_REPOLL);
1414 report(stderr, GT_("POP3 support is not configured.\n"));
1416 #endif /* POP3_ENABLE */
1422 } while (st == PS_REPOLL);
1424 report(stderr, GT_("IMAP support is not configured.\n"));
1426 #endif /* IMAP_ENABLE */
1430 report(stderr, GT_("ETRN support is not configured.\n"));
1435 #endif /* ETRN_ENABLE */
1438 report(stderr, GT_("ODMR support is not configured.\n"));
1442 #endif /* ODMR_ENABLE */
1445 report(stderr, GT_("unsupported protocol selected.\n"));
1450 * If we're syslogging the progress messages are automatically timestamped.
1451 * Force timestamping if we're going to a logfile.
1453 if (outlevel >= O_VERBOSE)
1455 report(stdout, GT_("%s querying %s (protocol %s) at %s: poll completed\n"),
1457 ctl->server.pollname,
1458 showproto(ctl->server.protocol),
1465 static void dump_params (struct runctl *runp,
1466 struct query *querylist, flag implicit)
1467 /* display query parameters in English */
1471 if (runp->poll_interval)
1472 printf(GT_("Poll interval is %d seconds\n"), runp->poll_interval);
1474 printf(GT_("Logfile is %s\n"), runp->logfile);
1475 if (strcmp(runp->idfile, IDFILE_NAME))
1476 printf(GT_("Idfile is %s\n"), runp->idfile);
1477 #if defined(HAVE_SYSLOG)
1478 if (runp->use_syslog)
1479 printf(GT_("Progress messages will be logged via syslog\n"));
1481 if (runp->invisible)
1482 printf(GT_("Fetchmail will masquerade and will not generate Received\n"));
1484 printf(GT_("Fetchmail will show progress dots even in logfiles.\n"));
1485 if (runp->postmaster)
1486 printf(GT_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
1489 if (!runp->bouncemail)
1490 printf(GT_("Fetchmail will direct error mail to the postmaster.\n"));
1491 else if (outlevel >= O_VERBOSE)
1492 printf(GT_("Fetchmail will direct error mail to the sender.\n"));
1494 for (ctl = querylist; ctl; ctl = ctl->next)
1496 if (!ctl->active || (implicit && ctl->server.skip))
1499 printf(GT_("Options for retrieving from %s@%s:\n"),
1500 ctl->remotename, visbuf(ctl->server.pollname));
1502 if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
1503 printf(GT_(" Mail will be retrieved via %s\n"), ctl->server.via);
1505 if (ctl->server.interval)
1506 printf(ngettext(" Poll of this server will occur every %d interval.\n",
1507 " Poll of this server will occur every %d intervals.\n",
1508 ctl->server.interval), ctl->server.interval);
1509 if (ctl->server.truename)
1510 printf(GT_(" True name of server is %s.\n"), ctl->server.truename);
1511 if (ctl->server.skip || outlevel >= O_VERBOSE)
1512 printf(ctl->server.skip
1513 ? GT_(" This host will not be queried when no host is specified.\n")
1514 : GT_(" This host will be queried when no host is specified.\n"));
1515 if (!NO_PASSWORD(ctl))
1518 printf(GT_(" Password will be prompted for.\n"));
1519 else if (outlevel >= O_VERBOSE)
1521 if (ctl->server.protocol == P_APOP)
1522 printf(GT_(" APOP secret = \"%s\".\n"),
1523 visbuf(ctl->password));
1524 else if (ctl->server.protocol == P_RPOP)
1525 printf(GT_(" RPOP id = \"%s\".\n"),
1526 visbuf(ctl->password));
1528 printf(GT_(" Password = \"%s\".\n"),
1529 visbuf(ctl->password));
1533 if (ctl->server.protocol == P_POP3
1534 && ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
1535 && (ctl->server.authenticate == A_KERBEROS_V4 ||
1536 ctl->server.authenticate == A_KERBEROS_V5))
1537 printf(GT_(" Protocol is KPOP with Kerberos %s authentication"),
1538 ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
1540 printf(GT_(" Protocol is %s"), showproto(ctl->server.protocol));
1541 if (ctl->server.service)
1542 printf(GT_(" (using service %s)"), ctl->server.service);
1543 else if (outlevel >= O_VERBOSE)
1544 printf(GT_(" (using default port)"));
1545 if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
1546 printf(GT_(" (forcing UIDL use)"));
1549 switch (ctl->server.authenticate)
1552 printf(GT_(" All available authentication methods will be tried.\n"));
1555 printf(GT_(" Password authentication will be forced.\n"));
1558 printf(GT_(" MSN authentication will be forced.\n"));
1561 printf(GT_(" NTLM authentication will be forced.\n"));
1564 printf(GT_(" OTP authentication will be forced.\n"));
1567 printf(GT_(" CRAM-Md5 authentication will be forced.\n"));
1570 printf(GT_(" GSSAPI authentication will be forced.\n"));
1573 printf(GT_(" Kerberos V4 authentication will be forced.\n"));
1576 printf(GT_(" Kerberos V5 authentication will be forced.\n"));
1579 printf(GT_(" End-to-end encryption assumed.\n"));
1582 if (ctl->server.principal != (char *) NULL)
1583 printf(GT_(" Mail service principal is: %s\n"), ctl->server.principal);
1586 printf(GT_(" SSL encrypted sessions enabled.\n"));
1588 printf(GT_(" SSL protocol: %s.\n"), ctl->sslproto);
1589 if (ctl->sslcertck) {
1590 printf(GT_(" SSL server certificate checking enabled.\n"));
1591 if (ctl->sslcertpath != NULL)
1592 printf(GT_(" SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
1594 if (ctl->sslfingerprint != NULL)
1595 printf(GT_(" SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
1597 if (ctl->server.timeout > 0)
1598 printf(GT_(" Server nonresponse timeout is %d seconds"), ctl->server.timeout);
1599 if (ctl->server.timeout == CLIENT_TIMEOUT)
1600 printf(GT_(" (default).\n"));
1604 if (MAILBOX_PROTOCOL(ctl))
1606 if (!ctl->mailboxes->id)
1607 printf(GT_(" Default mailbox selected.\n"));
1612 printf(GT_(" Selected mailboxes are:"));
1613 for (idp = ctl->mailboxes; idp; idp = idp->next)
1614 printf(" %s", idp->id);
1617 printf(ctl->fetchall
1618 ? GT_(" All messages will be retrieved (--all on).\n")
1619 : GT_(" Only new messages will be retrieved (--all off).\n"));
1621 ? GT_(" Fetched messages will be kept on the server (--keep on).\n")
1622 : GT_(" Fetched messages will not be kept on the server (--keep off).\n"));
1624 ? GT_(" Old messages will be flushed before message retrieval (--flush on).\n")
1625 : GT_(" Old messages will not be flushed before message retrieval (--flush off).\n"));
1626 printf(ctl->limitflush
1627 ? GT_(" Oversized messages will be flushed before message retrieval (--limitflush on).\n")
1628 : GT_(" Oversized messages will not be flushed before message retrieval (--limitflush off).\n"));
1630 ? GT_(" Rewrite of server-local addresses is enabled (--norewrite off).\n")
1631 : GT_(" Rewrite of server-local addresses is disabled (--norewrite on).\n"));
1633 ? GT_(" Carriage-return stripping is enabled (stripcr on).\n")
1634 : GT_(" Carriage-return stripping is disabled (stripcr off).\n"));
1636 ? GT_(" Carriage-return forcing is enabled (forcecr on).\n")
1637 : GT_(" Carriage-return forcing is disabled (forcecr off).\n"));
1638 printf(ctl->pass8bits
1639 ? GT_(" Interpretation of Content-Transfer-Encoding is disabled (pass8bits on).\n")
1640 : GT_(" Interpretation of Content-Transfer-Encoding is enabled (pass8bits off).\n"));
1641 printf(ctl->mimedecode
1642 ? GT_(" MIME decoding is enabled (mimedecode on).\n")
1643 : GT_(" MIME decoding is disabled (mimedecode off).\n"));
1645 ? GT_(" Idle after poll is enabled (idle on).\n")
1646 : GT_(" Idle after poll is disabled (idle off).\n"));
1647 printf(ctl->dropstatus
1648 ? GT_(" Nonempty Status lines will be discarded (dropstatus on)\n")
1649 : GT_(" Nonempty Status lines will be kept (dropstatus off)\n"));
1650 printf(ctl->dropdelivered
1651 ? GT_(" Delivered-To lines will be discarded (dropdelivered on)\n")
1652 : GT_(" Delivered-To lines will be kept (dropdelivered off)\n"));
1653 if (NUM_NONZERO(ctl->limit))
1655 if (NUM_NONZERO(ctl->limit))
1656 printf(GT_(" Message size limit is %d octets (--limit %d).\n"),
1657 ctl->limit, ctl->limit);
1658 else if (outlevel >= O_VERBOSE)
1659 printf(GT_(" No message size limit (--limit 0).\n"));
1660 if (run.poll_interval > 0)
1661 printf(GT_(" Message size warning interval is %d seconds (--warnings %d).\n"),
1662 ctl->warnings, ctl->warnings);
1663 else if (outlevel >= O_VERBOSE)
1664 printf(GT_(" Size warnings on every poll (--warnings 0).\n"));
1666 if (NUM_NONZERO(ctl->fetchlimit))
1667 printf(GT_(" Received-message limit is %d (--fetchlimit %d).\n"),
1668 ctl->fetchlimit, ctl->fetchlimit);
1669 else if (outlevel >= O_VERBOSE)
1670 printf(GT_(" No received-message limit (--fetchlimit 0).\n"));
1671 if (NUM_NONZERO(ctl->fetchsizelimit))
1672 printf(GT_(" Fetch message size limit is %d (--fetchsizelimit %d).\n"),
1673 ctl->fetchsizelimit, ctl->fetchsizelimit);
1674 else if (outlevel >= O_VERBOSE)
1675 printf(GT_(" No fetch message size limit (--fetchsizelimit 0).\n"));
1676 if (NUM_NONZERO(ctl->fastuidl) && MAILBOX_PROTOCOL(ctl))
1678 if (ctl->fastuidl == 1)
1679 printf(GT_(" Do binary search of UIDs during each poll (--fastuidl 1).\n"));
1681 printf(GT_(" Do binary search of UIDs during %d out of %d polls (--fastuidl %d).\n"), ctl->fastuidl - 1, ctl->fastuidl, ctl->fastuidl);
1683 else if (outlevel >= O_VERBOSE)
1684 printf(GT_(" Do linear search of UIDs during each poll (--fastuidl 0).\n"));
1685 if (NUM_NONZERO(ctl->batchlimit))
1686 printf(GT_(" SMTP message batch limit is %d.\n"), ctl->batchlimit);
1687 else if (outlevel >= O_VERBOSE)
1688 printf(GT_(" No SMTP message batch limit (--batchlimit 0).\n"));
1689 if (MAILBOX_PROTOCOL(ctl))
1691 if (NUM_NONZERO(ctl->expunge))
1692 printf(GT_(" Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
1693 else if (outlevel >= O_VERBOSE)
1694 printf(GT_(" No forced expunges (--expunge 0).\n"));
1697 else /* ODMR or ETRN */
1701 printf(GT_(" Domains for which mail will be fetched are:"));
1702 for (idp = ctl->domainlist; idp; idp = idp->next)
1704 printf(" %s", idp->id);
1705 if (!idp->val.status.mark)
1706 printf(GT_(" (default)"));
1711 printf(GT_(" Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
1712 else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
1713 printf(GT_(" Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
1720 printf(GT_(" Messages will be %cMTP-forwarded to:"),
1722 for (idp = ctl->smtphunt; idp; idp = idp->next)
1724 printf(" %s", idp->id);
1725 if (!idp->val.status.mark)
1726 printf(GT_(" (default)"));
1730 if (ctl->smtpaddress)
1731 printf(GT_(" Host part of MAIL FROM line will be %s\n"),
1734 printf(GT_(" Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
1737 if (MAILBOX_PROTOCOL(ctl))
1739 if (ctl->antispam != (struct idlist *)NULL)
1743 printf(GT_(" Recognized listener spam block responses are:"));
1744 for (idp = ctl->antispam; idp; idp = idp->next)
1745 printf(" %d", idp->val.status.num);
1748 else if (outlevel >= O_VERBOSE)
1749 printf(GT_(" Spam-blocking disabled\n"));
1751 if (ctl->preconnect)
1752 printf(GT_(" Server connection will be brought up with \"%s\".\n"),
1753 visbuf(ctl->preconnect));
1754 else if (outlevel >= O_VERBOSE)
1755 printf(GT_(" No pre-connection command.\n"));
1756 if (ctl->postconnect)
1757 printf(GT_(" Server connection will be taken down with \"%s\".\n"),
1758 visbuf(ctl->postconnect));
1759 else if (outlevel >= O_VERBOSE)
1760 printf(GT_(" No post-connection command.\n"));
1761 if (MAILBOX_PROTOCOL(ctl)) {
1762 if (!ctl->localnames)
1763 printf(GT_(" No localnames declared for this host.\n"));
1769 for (idp = ctl->localnames; idp; idp = idp->next)
1772 if (count > 1 || ctl->wildcard)
1773 printf(GT_(" Multi-drop mode: "));
1775 printf(GT_(" Single-drop mode: "));
1777 printf(ngettext("%d local name recognized.\n", "%d local names recognized.\n", count), count);
1778 if (outlevel >= O_VERBOSE)
1780 for (idp = ctl->localnames; idp; idp = idp->next)
1782 printf("\t%s -> %s\n", idp->id, idp->val.id2);
1784 printf("\t%s\n", idp->id);
1786 fputs("\t*\n", stdout);
1789 if (count > 1 || ctl->wildcard)
1791 printf(ctl->server.dns
1792 ? GT_(" DNS lookup for multidrop addresses is enabled.\n")
1793 : GT_(" DNS lookup for multidrop addresses is disabled.\n"));
1794 if (ctl->server.dns)
1796 if (ctl->server.checkalias)
1797 printf(GT_(" Server aliases will be compared with multidrop addresses by IP address.\n"));
1799 printf(GT_(" Server aliases will be compared with multidrop addresses by name.\n"));
1801 if (ctl->server.envelope == STRING_DISABLED)
1802 printf(GT_(" Envelope-address routing is disabled\n"));
1805 printf(GT_(" Envelope header is assumed to be: %s\n"),
1806 ctl->server.envelope ? ctl->server.envelope : "Received");
1807 if (ctl->server.envskip || outlevel >= O_VERBOSE)
1808 printf(GT_(" Number of envelope headers to be skipped over: %d\n"),
1809 ctl->server.envskip);
1810 if (ctl->server.qvirtual)
1811 printf(GT_(" Prefix %s will be removed from user id\n"),
1812 ctl->server.qvirtual);
1813 else if (outlevel >= O_VERBOSE)
1814 printf(GT_(" No prefix stripping\n"));
1817 if (ctl->server.akalist)
1821 printf(GT_(" Predeclared mailserver aliases:"));
1822 for (idp = ctl->server.akalist; idp; idp = idp->next)
1823 printf(" %s", idp->id);
1826 if (ctl->server.localdomains)
1830 printf(GT_(" Local domains:"));
1831 for (idp = ctl->server.localdomains; idp; idp = idp->next)
1832 printf(" %s", idp->id);
1839 if (ctl->server.interface)
1840 printf(GT_(" Connection must be through interface %s.\n"), ctl->server.interface);
1841 else if (outlevel >= O_VERBOSE)
1842 printf(GT_(" No interface requirement specified.\n"));
1843 if (ctl->server.monitor)
1844 printf(GT_(" Polling loop will monitor %s.\n"), ctl->server.monitor);
1845 else if (outlevel >= O_VERBOSE)
1846 printf(GT_(" No monitor interface specified.\n"));
1849 if (ctl->server.plugin)
1850 printf(GT_(" Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
1851 else if (outlevel >= O_VERBOSE)
1852 printf(GT_(" No plugin command specified.\n"));
1853 if (ctl->server.plugout)
1854 printf(GT_(" Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
1855 else if (outlevel >= O_VERBOSE)
1856 printf(GT_(" No plugout command specified.\n"));
1858 if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
1861 printf(GT_(" No UIDs saved from this host.\n"));
1867 for (idp = ctl->oldsaved; idp; idp = idp->next)
1870 printf(GT_(" %d UIDs saved.\n"), count);
1871 if (outlevel >= O_VERBOSE)
1872 for (idp = ctl->oldsaved; idp; idp = idp->next)
1873 printf("\t%s\n", idp->id);
1877 if (ctl->server.tracepolls)
1878 printf(GT_(" Poll trace information will be added to the Received header.\n"));
1879 else if (outlevel >= O_VERBOSE)
1880 printf(GT_(" No poll trace information will be added to the Received header.\n.\n"));
1882 if (ctl->properties)
1883 printf(GT_(" Pass-through properties \"%s\".\n"),
1884 visbuf(ctl->properties));
1888 /* fetchmail.c ends here */