[c5c522c] | 1 | /* $Id: agent_shared.c,v 1.86 2011/07/11 22:05:48 sbajic Exp $ */ |
---|
| 2 | |
---|
| 3 | /* |
---|
| 4 | DSPAM |
---|
| 5 | COPYRIGHT (C) 2002-2012 DSPAM PROJECT |
---|
| 6 | |
---|
| 7 | This program is free software: you can redistribute it and/or modify |
---|
| 8 | it under the terms of the GNU Affero General Public License as |
---|
| 9 | published by the Free Software Foundation, either version 3 of the |
---|
| 10 | License, or (at your option) any later version. |
---|
| 11 | |
---|
| 12 | This program is distributed in the hope that it will be useful, |
---|
| 13 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
| 15 | GNU Affero General Public License for more details. |
---|
| 16 | |
---|
| 17 | You should have received a copy of the GNU Affero General Public License |
---|
| 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
---|
| 19 | |
---|
| 20 | */ |
---|
| 21 | |
---|
| 22 | /* |
---|
| 23 | * agent_shared.c - shared agent-based components |
---|
| 24 | * |
---|
| 25 | * DESCRIPTION |
---|
| 26 | * agent-based components shared between the full dspam agent (dspam) |
---|
| 27 | * and the lightweight client agent (dspamc) |
---|
| 28 | */ |
---|
| 29 | |
---|
| 30 | #ifdef HAVE_CONFIG_H |
---|
| 31 | #include <auto-config.h> |
---|
| 32 | #endif |
---|
| 33 | |
---|
| 34 | #include <stdio.h> |
---|
| 35 | #include <stdlib.h> |
---|
| 36 | #include <string.h> |
---|
| 37 | #include <ctype.h> |
---|
| 38 | #include <errno.h> |
---|
| 39 | #ifdef HAVE_UNISTD_H |
---|
| 40 | #include <unistd.h> |
---|
| 41 | #include <pwd.h> |
---|
| 42 | #endif |
---|
| 43 | #include <sys/types.h> |
---|
| 44 | #include <signal.h> |
---|
| 45 | #include <sys/stat.h> |
---|
| 46 | #ifdef _WIN32 |
---|
| 47 | #include <io.h> |
---|
| 48 | #include <process.h> |
---|
| 49 | #define WIDEXITED(x) 1 |
---|
| 50 | #define WEXITSTATUS(x) (x) |
---|
| 51 | #include <windows.h> |
---|
| 52 | #else |
---|
| 53 | #include <sys/wait.h> |
---|
| 54 | #include <sys/param.h> |
---|
| 55 | #endif |
---|
| 56 | #include "util.h" |
---|
| 57 | #include "read_config.h" |
---|
| 58 | #ifdef DAEMON |
---|
| 59 | #include "daemon.h" |
---|
| 60 | #include "dspam.h" |
---|
| 61 | #endif |
---|
| 62 | |
---|
| 63 | #ifdef TIME_WITH_SYS_TIME |
---|
| 64 | # include <sys/time.h> |
---|
| 65 | # include <time.h> |
---|
| 66 | #else |
---|
| 67 | # ifdef HAVE_SYS_TIME_H |
---|
| 68 | # include <sys/time.h> |
---|
| 69 | # else |
---|
| 70 | # include <time.h> |
---|
| 71 | # endif |
---|
| 72 | #endif |
---|
| 73 | |
---|
| 74 | #include "agent_shared.h" |
---|
| 75 | #include "language.h" |
---|
| 76 | #include "buffer.h" |
---|
| 77 | |
---|
| 78 | char * __pw_name = NULL; |
---|
| 79 | uid_t __pw_uid; |
---|
| 80 | |
---|
| 81 | /* |
---|
| 82 | * initialize_atx(AGENT_CTX *) |
---|
| 83 | * |
---|
| 84 | * DESCRIPTION |
---|
| 85 | * initializes an existing agent context |
---|
| 86 | * |
---|
| 87 | * INPUT ARGUMENTS |
---|
| 88 | * ATX agent context to initialize |
---|
| 89 | * |
---|
| 90 | * RETURN VALUES |
---|
| 91 | * returns 0 on success |
---|
| 92 | */ |
---|
| 93 | |
---|
| 94 | int initialize_atx(AGENT_CTX *ATX) { |
---|
| 95 | memset(ATX, 0, sizeof(AGENT_CTX)); |
---|
| 96 | ATX->training_buffer = 0; |
---|
| 97 | ATX->train_pristine = 0; |
---|
| 98 | ATX->classification = DSR_NONE; |
---|
| 99 | ATX->source = DSS_NONE; |
---|
| 100 | ATX->operating_mode = DSM_PROCESS; |
---|
| 101 | ATX->fork = 1; |
---|
| 102 | ATX->users = nt_create (NT_CHAR); |
---|
| 103 | |
---|
| 104 | if (ATX->users == NULL) { |
---|
| 105 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 106 | return EUNKNOWN; |
---|
| 107 | } |
---|
| 108 | |
---|
| 109 | #ifdef TRUSTED_USER_SECURITY |
---|
| 110 | if (!__pw_name) { |
---|
| 111 | LOG(LOG_ERR, ERR_AGENT_RUNTIME_USER); |
---|
| 112 | exit(EXIT_FAILURE); |
---|
| 113 | } |
---|
| 114 | |
---|
| 115 | LOGDEBUG("checking trusted user list for %s(%d)", __pw_name, __pw_uid); |
---|
| 116 | |
---|
| 117 | if (__pw_uid == 0) |
---|
| 118 | ATX->trusted = 1; |
---|
| 119 | else |
---|
| 120 | ATX->trusted = _ds_match_attribute(agent_config, "Trust", __pw_name); |
---|
| 121 | |
---|
| 122 | if (!ATX->trusted) |
---|
| 123 | nt_add (ATX->users, __pw_name); |
---|
| 124 | #endif |
---|
| 125 | |
---|
| 126 | return 0; |
---|
| 127 | } |
---|
| 128 | |
---|
| 129 | /* |
---|
| 130 | * process_arguments(AGENT_CTX *, int argc, char *argv[]) |
---|
| 131 | * |
---|
| 132 | * DESCRIPTION |
---|
| 133 | * master commandline argument process loop |
---|
| 134 | * |
---|
| 135 | * INPUT ARGUMENTS |
---|
| 136 | * ATX agent context |
---|
| 137 | * argc number of arguments provided |
---|
| 138 | * argv array of arguments |
---|
| 139 | * |
---|
| 140 | * RETURN VALUES |
---|
| 141 | * returns 0 on success, EINVAL when invalid options specified |
---|
| 142 | */ |
---|
| 143 | |
---|
| 144 | int process_arguments(AGENT_CTX *ATX, int argc, char **argv) { |
---|
| 145 | int flag_u = 0, flag_r = 0; |
---|
| 146 | int client = (_ds_read_attribute(agent_config, "ClientHost") != NULL); |
---|
| 147 | char *ptrptr; |
---|
| 148 | int i; |
---|
| 149 | |
---|
| 150 | #ifdef DEBUG |
---|
| 151 | ATX->debug_args[0] = 0; |
---|
| 152 | #endif |
---|
| 153 | ATX->client_args[0] = 0; |
---|
| 154 | |
---|
| 155 | for (i=0; i<argc; i++) |
---|
| 156 | { |
---|
| 157 | |
---|
| 158 | #ifdef DEBUG |
---|
| 159 | strlcat (ATX->debug_args, argv[i], sizeof (ATX->debug_args)); |
---|
| 160 | strlcat (ATX->debug_args, " ", sizeof (ATX->debug_args)); |
---|
| 161 | #endif |
---|
| 162 | |
---|
| 163 | /* Terminate user/rcpt lists */ |
---|
| 164 | |
---|
| 165 | if ((flag_u || flag_r) && |
---|
| 166 | (argv[i][0] == '-' || argv[i][0] == 0 || !strcmp(argv[i], "--"))) |
---|
| 167 | { |
---|
| 168 | flag_u = flag_r = 0; |
---|
| 169 | if (!strcmp(argv[i], "--")) |
---|
| 170 | continue; |
---|
| 171 | } |
---|
| 172 | |
---|
| 173 | if (!strcmp (argv[i], "--user")) { |
---|
| 174 | flag_u = 1; |
---|
| 175 | continue; |
---|
| 176 | } |
---|
| 177 | |
---|
| 178 | if (!strcmp (argv[i], "--rcpt-to")) |
---|
| 179 | { |
---|
| 180 | if (!ATX->recipients) { |
---|
| 181 | ATX->recipients = nt_create(NT_CHAR); |
---|
| 182 | if (ATX->recipients == NULL) { |
---|
| 183 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 184 | return EUNKNOWN; |
---|
| 185 | } |
---|
| 186 | } |
---|
| 187 | flag_r = 1; |
---|
| 188 | continue; |
---|
| 189 | } |
---|
| 190 | |
---|
| 191 | /* Build arg list to pass to server (when in client/server mode) */ |
---|
| 192 | |
---|
| 193 | if (client && !flag_u && !flag_r && i>0) |
---|
| 194 | { |
---|
| 195 | if (argv[i][0] == 0) |
---|
| 196 | strlcat(ATX->client_args, "\"", sizeof(ATX->client_args)); |
---|
| 197 | strlcat (ATX->client_args, argv[i], sizeof(ATX->client_args)); |
---|
| 198 | if (argv[i][0] == 0) |
---|
| 199 | strlcat(ATX->client_args, "\"", sizeof(ATX->client_args)); |
---|
| 200 | strlcat (ATX->client_args, " ", sizeof(ATX->client_args)); |
---|
| 201 | } |
---|
| 202 | |
---|
| 203 | if (!strcmp (argv[i], "--debug")) |
---|
| 204 | { |
---|
| 205 | #ifdef DEBUG |
---|
| 206 | if (DO_DEBUG == 0) |
---|
| 207 | DO_DEBUG = 1; |
---|
| 208 | #endif |
---|
| 209 | continue; |
---|
| 210 | } |
---|
| 211 | |
---|
| 212 | #if defined(DAEMON) && !defined(_DSPAMC_H) |
---|
| 213 | |
---|
| 214 | if (!strcmp (argv[i], "--client")) { |
---|
| 215 | ATX->client_mode = 1; |
---|
| 216 | continue; |
---|
| 217 | } |
---|
| 218 | |
---|
| 219 | #ifdef TRUSTED_USER_SECURITY |
---|
| 220 | if (!strcmp (argv[i], "--daemon") && ATX->trusted) |
---|
| 221 | #else |
---|
| 222 | if (!strcmp (argv[i], "--daemon")) |
---|
| 223 | #endif |
---|
| 224 | { |
---|
| 225 | ATX->operating_mode = DSM_DAEMON; |
---|
| 226 | continue; |
---|
| 227 | } |
---|
| 228 | #endif |
---|
| 229 | |
---|
| 230 | if (!strcmp (argv[i], "--nofork")) { |
---|
| 231 | ATX->fork = 0; |
---|
| 232 | continue; |
---|
| 233 | } |
---|
| 234 | |
---|
| 235 | if (!strncmp (argv[i], "--mode=", 7)) |
---|
| 236 | { |
---|
| 237 | char *mode = strchr(argv[i], '=')+1; |
---|
| 238 | if (process_mode(ATX, mode)) |
---|
| 239 | return EINVAL; |
---|
| 240 | ATX->flags |= DAF_FIXED_TR_MODE; |
---|
| 241 | continue; |
---|
| 242 | } |
---|
| 243 | |
---|
| 244 | /* Build RCPT TO list */ |
---|
| 245 | |
---|
| 246 | if (flag_r) |
---|
| 247 | { |
---|
| 248 | if (argv[i] != NULL && strlen (argv[i]) < MAX_USERNAME_LENGTH) |
---|
| 249 | { |
---|
| 250 | char user[MAX_USERNAME_LENGTH]; |
---|
| 251 | |
---|
| 252 | if (_ds_match_attribute(agent_config, "Broken", "case")) |
---|
| 253 | lc(user, argv[i]); |
---|
| 254 | else |
---|
| 255 | strcpy(user, argv[i]); |
---|
| 256 | |
---|
| 257 | #ifdef TRUSTED_USER_SECURITY |
---|
| 258 | if (!ATX->trusted && strcmp(user, __pw_name)) { |
---|
| 259 | LOG(LOG_ERR, ERR_TRUSTED_USER, __pw_uid, __pw_name); |
---|
| 260 | return EINVAL; |
---|
| 261 | } |
---|
| 262 | |
---|
| 263 | if (ATX->trusted) { |
---|
| 264 | #endif |
---|
| 265 | if (_ds_validate_address(user) == 1) { |
---|
| 266 | nt_add (ATX->recipients, user); |
---|
| 267 | } else { |
---|
| 268 | LOG(LOG_ERR, "Invalid email address: %s", user); |
---|
| 269 | return EINVAL; |
---|
| 270 | } |
---|
| 271 | #ifdef TRUSTED_USER_SECURITY |
---|
| 272 | } |
---|
| 273 | #endif |
---|
| 274 | } |
---|
| 275 | continue; |
---|
| 276 | } |
---|
| 277 | |
---|
| 278 | /* Build process user list */ |
---|
| 279 | |
---|
| 280 | if (flag_u) |
---|
| 281 | { |
---|
| 282 | if (argv[i] != NULL && strlen (argv[i]) < MAX_USERNAME_LENGTH) |
---|
| 283 | { |
---|
| 284 | if (strstr(argv[i], "../") != NULL || strstr(argv[i], "..\\") != NULL) { |
---|
| 285 | LOG(LOG_ERR, "Illegal username ('../' or '..\\' not allowed in username)"); |
---|
| 286 | return EINVAL; |
---|
| 287 | } else { |
---|
| 288 | char user[MAX_USERNAME_LENGTH]; |
---|
| 289 | |
---|
| 290 | if (_ds_match_attribute(agent_config, "Broken", "case")) |
---|
| 291 | lc(user, argv[i]); |
---|
| 292 | else |
---|
| 293 | strcpy(user, argv[i]); |
---|
| 294 | |
---|
| 295 | #ifdef TRUSTED_USER_SECURITY |
---|
| 296 | if (!ATX->trusted && strcmp(user, __pw_name)) { |
---|
| 297 | LOG(LOG_ERR, ERR_TRUSTED_USER, __pw_uid, __pw_name); |
---|
| 298 | return EINVAL; |
---|
| 299 | } |
---|
| 300 | |
---|
| 301 | if (ATX->trusted) |
---|
| 302 | #endif |
---|
| 303 | nt_add (ATX->users, user); |
---|
| 304 | } |
---|
| 305 | } |
---|
| 306 | continue; |
---|
| 307 | } |
---|
| 308 | |
---|
| 309 | if (!strncmp (argv[i], "--mail-from=", 12)) |
---|
| 310 | { |
---|
| 311 | strlcpy(ATX->mailfrom, strchr(argv[i], '=')+1, sizeof(ATX->mailfrom)); |
---|
| 312 | LOGDEBUG("MAIL FROM: %s", ATX->mailfrom); |
---|
| 313 | continue; |
---|
| 314 | } |
---|
| 315 | |
---|
| 316 | if (!strncmp (argv[i], "--profile=", 10)) |
---|
| 317 | { |
---|
| 318 | #ifdef TRUSTED_USER_SECURITY |
---|
| 319 | if (!ATX->trusted) { |
---|
| 320 | LOG(LOG_ERR, ERR_TRUSTED_PRIV, "--profile", |
---|
| 321 | __pw_uid, __pw_name); |
---|
| 322 | return EINVAL; |
---|
| 323 | } |
---|
| 324 | #endif |
---|
| 325 | if (!_ds_match_attribute(agent_config, "Profile", argv[i]+10)) { |
---|
| 326 | LOG(LOG_ERR,ERR_AGENT_NO_SUCH_PROFILE, argv[i]+10); |
---|
| 327 | return EINVAL; |
---|
| 328 | } else { |
---|
| 329 | _ds_overwrite_attribute(agent_config, "DefaultProfile", argv[i]+10); |
---|
| 330 | } |
---|
| 331 | continue; |
---|
| 332 | } |
---|
| 333 | |
---|
| 334 | if (!strncmp (argv[i], "--signature=", 12)) |
---|
| 335 | { |
---|
| 336 | strlcpy(ATX->signature, strchr(argv[i], '=')+1, sizeof(ATX->signature)); |
---|
| 337 | continue; |
---|
| 338 | } |
---|
| 339 | |
---|
| 340 | if (!strncmp (argv[i], "--class=", 8)) |
---|
| 341 | { |
---|
| 342 | char *ptr = strchr(argv[i], '=')+1; |
---|
| 343 | char *spam = _ds_read_attribute(agent_config, "ClassAliasSpam"); |
---|
| 344 | char *nonspam = _ds_read_attribute(agent_config, "ClassAliasNonspam"); |
---|
| 345 | if (!strcmp(ptr, "spam") || (spam && !strcmp(ptr, spam))) |
---|
| 346 | { |
---|
| 347 | ATX->classification = DSR_ISSPAM; |
---|
| 348 | } else if (!strcmp(ptr, "innocent") || !strcmp(ptr, "nonspam") || |
---|
| 349 | (nonspam && !strcmp(ptr, nonspam))) |
---|
| 350 | { |
---|
| 351 | ATX->classification = DSR_ISINNOCENT; |
---|
| 352 | } |
---|
| 353 | else |
---|
| 354 | { |
---|
| 355 | LOG(LOG_ERR, ERR_AGENT_NO_SUCH_CLASS, ptr); |
---|
| 356 | return EINVAL; |
---|
| 357 | } |
---|
| 358 | continue; |
---|
| 359 | } |
---|
| 360 | |
---|
| 361 | if (!strncmp (argv[i], "--source=", 9)) |
---|
| 362 | { |
---|
| 363 | char *ptr = strchr(argv[i], '=')+1; |
---|
| 364 | |
---|
| 365 | if (!strcmp(ptr, "corpus")) |
---|
| 366 | ATX->source = DSS_CORPUS; |
---|
| 367 | else if (!strcmp(ptr, "inoculation")) |
---|
| 368 | ATX->source = DSS_INOCULATION; |
---|
| 369 | else if (!strcmp(ptr, "error")) |
---|
| 370 | ATX->source = DSS_ERROR; |
---|
| 371 | else |
---|
| 372 | { |
---|
| 373 | LOG(LOG_ERR, ERR_AGENT_NO_SUCH_SOURCE, ptr); |
---|
| 374 | return EINVAL; |
---|
| 375 | } |
---|
| 376 | continue; |
---|
| 377 | } |
---|
| 378 | |
---|
| 379 | if (!strcmp (argv[i], "--classify")) |
---|
| 380 | { |
---|
| 381 | ATX->operating_mode = DSM_CLASSIFY; |
---|
| 382 | ATX->training_mode = DST_NOTRAIN; |
---|
| 383 | continue; |
---|
| 384 | } |
---|
| 385 | |
---|
| 386 | if (!strcmp (argv[i], "--process")) |
---|
| 387 | { |
---|
| 388 | ATX->operating_mode = DSM_PROCESS; |
---|
| 389 | continue; |
---|
| 390 | } |
---|
| 391 | |
---|
| 392 | if (!strncmp (argv[i], "--deliver=", 10)) |
---|
| 393 | { |
---|
| 394 | char *dup = strdup(strchr(argv[i], '=')+1); |
---|
| 395 | char *ptr; |
---|
| 396 | if (dup == NULL) { |
---|
| 397 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 398 | return EUNKNOWN; |
---|
| 399 | } |
---|
| 400 | |
---|
| 401 | ptr = strtok_r(dup, ",", &ptrptr); |
---|
| 402 | while(ptr != NULL) { |
---|
| 403 | if (!strcmp(ptr, "stdout")) { |
---|
| 404 | ATX->flags |= DAF_DELIVER_SPAM; |
---|
| 405 | ATX->flags |= DAF_DELIVER_INNOCENT; |
---|
| 406 | ATX->flags |= DAF_STDOUT; |
---|
| 407 | } |
---|
| 408 | else if (!strcmp(ptr, "spam")) |
---|
| 409 | ATX->flags |= DAF_DELIVER_SPAM; |
---|
| 410 | else if (!strcmp(ptr, "innocent") || !strcmp(ptr, "nonspam")) |
---|
| 411 | ATX->flags |= DAF_DELIVER_INNOCENT; |
---|
| 412 | else if (!strcmp(ptr, "summary")) |
---|
| 413 | ATX->flags |= DAF_SUMMARY; |
---|
| 414 | else |
---|
| 415 | { |
---|
| 416 | LOG(LOG_ERR, ERR_AGENT_NO_SUCH_DELIVER, ptr); |
---|
| 417 | free(dup); |
---|
| 418 | return EINVAL; |
---|
| 419 | } |
---|
| 420 | |
---|
| 421 | ptr = strtok_r(NULL, ",", &ptrptr); |
---|
| 422 | } |
---|
| 423 | free(dup); |
---|
| 424 | continue; |
---|
| 425 | } |
---|
| 426 | |
---|
| 427 | if (!strncmp (argv[i], "--feature=", 10)) |
---|
| 428 | { |
---|
| 429 | ATX->feature = 1; |
---|
| 430 | process_features(ATX, strchr(argv[i], '=')+1); |
---|
| 431 | continue; |
---|
| 432 | } |
---|
| 433 | |
---|
| 434 | if (!strcmp (argv[i], "--stdout")) |
---|
| 435 | { |
---|
| 436 | ATX->flags |= DAF_STDOUT; |
---|
| 437 | continue; |
---|
| 438 | } |
---|
| 439 | |
---|
| 440 | if (!strcmp (argv[i], "--help")) |
---|
| 441 | { |
---|
| 442 | fprintf (stderr, "%s\n", SYNTAX); |
---|
| 443 | exit(EXIT_SUCCESS); |
---|
| 444 | } |
---|
| 445 | |
---|
| 446 | if (!strcmp (argv[i], "--version")) |
---|
| 447 | { |
---|
| 448 | printf ("\nDSPAM Anti-Spam Suite %s (agent/library)\n\n", VERSION); |
---|
| 449 | printf ("Copyright (C) 2002-2012 DSPAM Project\n"); |
---|
| 450 | printf ("http://dspam.sourceforge.net.\n\n"); |
---|
| 451 | printf ("DSPAM may be copied only under the terms of the GNU Affero General Public\n"); |
---|
| 452 | printf ("License, a copy of which can be found with the DSPAM distribution kit.\n\n"); |
---|
| 453 | #ifdef TRUSTED_USER_SECURITY |
---|
| 454 | if (ATX->trusted) { |
---|
| 455 | #endif |
---|
| 456 | printf("Configuration parameters: %s\n\n", CONFIGURE_ARGS); |
---|
| 457 | #ifdef TRUSTED_USER_SECURITY |
---|
| 458 | } |
---|
| 459 | #endif |
---|
| 460 | exit (EXIT_SUCCESS); |
---|
| 461 | } |
---|
| 462 | |
---|
| 463 | /* Append all unknown arguments as mailer args */ |
---|
| 464 | |
---|
| 465 | if (i>0 |
---|
| 466 | #ifdef TRUSTED_USER_SECURITY |
---|
| 467 | && ATX->trusted |
---|
| 468 | #endif |
---|
| 469 | ) |
---|
| 470 | { |
---|
| 471 | if (argv[i][0] == 0) |
---|
| 472 | strlcat (ATX->mailer_args, "\"\"", sizeof (ATX->mailer_args)); |
---|
| 473 | else |
---|
| 474 | strlcat (ATX->mailer_args, argv[i], sizeof (ATX->mailer_args)); |
---|
| 475 | strlcat (ATX->mailer_args, " ", sizeof (ATX->mailer_args)); |
---|
| 476 | } |
---|
| 477 | } |
---|
| 478 | |
---|
| 479 | return 0; |
---|
| 480 | } |
---|
| 481 | |
---|
| 482 | |
---|
| 483 | /* |
---|
| 484 | * process_features(AGENT_CTX *, const char *) |
---|
| 485 | * |
---|
| 486 | * DESCRIPTION |
---|
| 487 | * convert --feature= stdin into agent context values |
---|
| 488 | * |
---|
| 489 | * INPUT ARGUMENTS |
---|
| 490 | * ATX agent context |
---|
| 491 | * in remainder of --feature= stdin |
---|
| 492 | * |
---|
| 493 | * RETURN VALUES |
---|
| 494 | * returns 0 on success, EINVAL when invalid options specified |
---|
| 495 | * |
---|
| 496 | */ |
---|
| 497 | |
---|
| 498 | int process_features(AGENT_CTX *ATX, const char *in) { |
---|
| 499 | char *ptr, *dup, *ptrptr; |
---|
| 500 | int ret = 0; |
---|
| 501 | |
---|
| 502 | if (!in || in[0]==0) |
---|
| 503 | return 0; |
---|
| 504 | |
---|
| 505 | dup = strdup(in); |
---|
| 506 | if (dup == NULL) { |
---|
| 507 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 508 | return EUNKNOWN; |
---|
| 509 | } |
---|
| 510 | |
---|
| 511 | ptr = strtok_r(dup, ",", &ptrptr); |
---|
| 512 | while(ptr != NULL) { |
---|
| 513 | if (!strncmp(ptr, "no",2)) |
---|
| 514 | ATX->flags |= DAF_NOISE; |
---|
| 515 | else if (!strncmp(ptr, "wh", 2)) |
---|
| 516 | ATX->flags |= DAF_WHITELIST; |
---|
| 517 | else if (!strncmp(ptr, "tb=", 3)) { |
---|
| 518 | ATX->training_buffer = atoi(strchr(ptr, '=')+1); |
---|
| 519 | |
---|
| 520 | if (ATX->training_buffer < 0 || ATX->training_buffer > 10) { |
---|
| 521 | LOG(LOG_ERR, ERR_AGENT_TB_INVALID); |
---|
| 522 | ret = EINVAL; |
---|
| 523 | } |
---|
| 524 | } |
---|
| 525 | else { |
---|
| 526 | LOG(LOG_ERR, ERR_AGENT_NO_SUCH_FEATURE, ptr); |
---|
| 527 | ret = EINVAL; |
---|
| 528 | } |
---|
| 529 | |
---|
| 530 | ptr = strtok_r(NULL, ",", &ptrptr); |
---|
| 531 | } |
---|
| 532 | free(dup); |
---|
| 533 | return ret; |
---|
| 534 | } |
---|
| 535 | |
---|
| 536 | /* |
---|
| 537 | * process_mode(AGENT_CTX *, const char *) |
---|
| 538 | * |
---|
| 539 | * DESCRIPTION |
---|
| 540 | * convert --mode= stdin into training mode |
---|
| 541 | * |
---|
| 542 | * INPUT ARGUMENTS |
---|
| 543 | * ATX agent context |
---|
| 544 | * mode remainder of --mode= stdin |
---|
| 545 | * |
---|
| 546 | * RETURN VALUES |
---|
| 547 | * returns 0 on success, EINVAL when invalid mode specified |
---|
| 548 | */ |
---|
| 549 | |
---|
| 550 | int process_mode(AGENT_CTX *ATX, const char *mode) { |
---|
| 551 | |
---|
| 552 | if (!mode) |
---|
| 553 | return EINVAL; |
---|
| 554 | |
---|
| 555 | if (!strcmp(mode, "toe")) |
---|
| 556 | ATX->training_mode = DST_TOE; |
---|
| 557 | else if (!strcmp(mode, "teft")) |
---|
| 558 | ATX->training_mode = DST_TEFT; |
---|
| 559 | else if (!strcmp(mode, "tum")) |
---|
| 560 | ATX->training_mode = DST_TUM; |
---|
| 561 | else if (!strcmp(mode, "notrain")) |
---|
| 562 | ATX->training_mode = DST_NOTRAIN; |
---|
| 563 | else if (!strcmp(mode, "unlearn")) { |
---|
| 564 | ATX->training_mode = DST_TEFT; |
---|
| 565 | ATX->flags |= DAF_UNLEARN; |
---|
| 566 | } else { |
---|
| 567 | LOG(LOG_ERR, ERR_AGENT_TR_MODE_INVALID, mode); |
---|
| 568 | return EINVAL; |
---|
| 569 | } |
---|
| 570 | |
---|
| 571 | return 0; |
---|
| 572 | } |
---|
| 573 | |
---|
| 574 | /* |
---|
| 575 | * apply_defaults(AGENT_CTX *) |
---|
| 576 | * |
---|
| 577 | * DESCRIPTION |
---|
| 578 | * apply default values from dspam.conf in absence of other options |
---|
| 579 | * |
---|
| 580 | * INPUT ARGUMENTS |
---|
| 581 | * ATX agent context |
---|
| 582 | * |
---|
| 583 | * RETURN VALUES |
---|
| 584 | * returns 0 on success |
---|
| 585 | */ |
---|
| 586 | |
---|
| 587 | int apply_defaults(AGENT_CTX *ATX) { |
---|
| 588 | |
---|
| 589 | /* Training mode */ |
---|
| 590 | |
---|
| 591 | if (!(ATX->flags & DAF_FIXED_TR_MODE)) { |
---|
| 592 | char *v = _ds_read_attribute(agent_config, "TrainingMode"); |
---|
| 593 | if (process_mode(ATX, v)) { |
---|
| 594 | LOG(LOG_ERR, ERR_AGENT_NO_TR_MODE); |
---|
| 595 | return EINVAL; |
---|
| 596 | } |
---|
| 597 | } |
---|
| 598 | |
---|
| 599 | /* Default delivery agent */ |
---|
| 600 | |
---|
| 601 | if ( ! (ATX->flags & DAF_STDOUT) |
---|
| 602 | && ATX->operating_mode != DSM_CLASSIFY |
---|
| 603 | && (ATX->flags & DAF_DELIVER_INNOCENT || ATX->flags & DAF_DELIVER_SPAM)) |
---|
| 604 | { |
---|
| 605 | char key[32]; |
---|
| 606 | #ifdef TRUSTED_USER_SECURITY |
---|
| 607 | if (!ATX->trusted) |
---|
| 608 | strcpy(key, "UntrustedDeliveryAgent"); |
---|
| 609 | else |
---|
| 610 | #endif |
---|
| 611 | strcpy(key, "TrustedDeliveryAgent"); |
---|
| 612 | |
---|
| 613 | char *value = _ds_read_attribute(agent_config, key); |
---|
| 614 | |
---|
| 615 | if (value) { |
---|
| 616 | char *trimmed_value = ALLTRIM(strdup(value)); |
---|
| 617 | if (trimmed_value && *trimmed_value == '\0') { |
---|
| 618 | LOG(LOG_ERR, ERR_AGENT_NO_AGENT, key); |
---|
| 619 | free(trimmed_value); |
---|
| 620 | return EINVAL; |
---|
| 621 | } |
---|
| 622 | if (trimmed_value) free(trimmed_value); |
---|
| 623 | char fmt[sizeof(ATX->mailer_args)]; |
---|
| 624 | snprintf(fmt, sizeof(fmt), "%s ", value); |
---|
| 625 | #ifdef TRUSTED_USER_SECURITY |
---|
| 626 | if (ATX->trusted) |
---|
| 627 | #endif |
---|
| 628 | strlcat(fmt, ATX->mailer_args, sizeof(fmt)); |
---|
| 629 | strcpy(ATX->mailer_args, fmt); |
---|
| 630 | } else if (!_ds_read_attribute(agent_config, "DeliveryHost")) { |
---|
| 631 | LOG(LOG_ERR, ERR_AGENT_NO_AGENT, key); |
---|
| 632 | return EINVAL; |
---|
| 633 | } |
---|
| 634 | } |
---|
| 635 | |
---|
| 636 | /* Default quarantine agent */ |
---|
| 637 | |
---|
| 638 | if (_ds_read_attribute(agent_config, "QuarantineAgent")) { |
---|
| 639 | snprintf(ATX->spam_args, sizeof(ATX->spam_args), "%s ", |
---|
| 640 | _ds_read_attribute(agent_config, "QuarantineAgent")); |
---|
| 641 | } else { |
---|
| 642 | LOGDEBUG("No QuarantineAgent option found. Using standard quarantine."); |
---|
| 643 | } |
---|
| 644 | |
---|
| 645 | /* Features */ |
---|
| 646 | |
---|
| 647 | if (!ATX->feature && _ds_find_attribute(agent_config, "Feature")) { |
---|
| 648 | attribute_t attrib = _ds_find_attribute(agent_config, "Feature"); |
---|
| 649 | |
---|
| 650 | while(attrib != NULL) { |
---|
| 651 | process_features(ATX, attrib->value); |
---|
| 652 | attrib = attrib->next; |
---|
| 653 | } |
---|
| 654 | } |
---|
| 655 | |
---|
| 656 | return 0; |
---|
| 657 | } |
---|
| 658 | |
---|
| 659 | /* |
---|
| 660 | * check_configuration(AGENT_CTX *) |
---|
| 661 | * |
---|
| 662 | * DESCRIPTION |
---|
| 663 | * sanity-check agent configuration |
---|
| 664 | * |
---|
| 665 | * INPUT ARGUMENTS |
---|
| 666 | * ATX agent context |
---|
| 667 | * |
---|
| 668 | * RETURN VALUES |
---|
| 669 | * returns 0 on success, EINVAL on invalid configuration |
---|
| 670 | */ |
---|
| 671 | |
---|
| 672 | int check_configuration(AGENT_CTX *ATX) { |
---|
| 673 | |
---|
| 674 | if (ATX->classification != DSR_NONE && ATX->operating_mode == DSM_CLASSIFY) |
---|
| 675 | { |
---|
| 676 | LOG(LOG_ERR, ERR_AGENT_CLASSIFY_CLASS); |
---|
| 677 | return EINVAL; |
---|
| 678 | } |
---|
| 679 | |
---|
| 680 | if (ATX->classification != DSR_NONE && ATX->source == DSS_NONE && |
---|
| 681 | !(ATX->flags & DAF_UNLEARN)) |
---|
| 682 | { |
---|
| 683 | LOG(LOG_ERR, ERR_AGENT_NO_SOURCE); |
---|
| 684 | return EINVAL; |
---|
| 685 | } |
---|
| 686 | |
---|
| 687 | if (ATX->source != DSS_NONE && ATX->classification == DSR_NONE) |
---|
| 688 | { |
---|
| 689 | LOG(LOG_ERR, ERR_AGENT_NO_CLASS); |
---|
| 690 | return EINVAL; |
---|
| 691 | } |
---|
| 692 | |
---|
| 693 | if (ATX->operating_mode == DSM_NONE) |
---|
| 694 | { |
---|
| 695 | LOG(LOG_ERR, ERR_AGENT_NO_OP_MODE); |
---|
| 696 | return EINVAL; |
---|
| 697 | } |
---|
| 698 | |
---|
| 699 | if (!_ds_match_attribute(agent_config, "ParseToHeaders", "on")) { |
---|
| 700 | |
---|
| 701 | if (ATX->users->items == 0) |
---|
| 702 | { |
---|
| 703 | LOG(LOG_ERR, ERR_AGENT_USER_UNDEFINED); |
---|
| 704 | return EINVAL; |
---|
| 705 | } |
---|
| 706 | } |
---|
| 707 | |
---|
| 708 | return 0; |
---|
| 709 | } |
---|
| 710 | |
---|
| 711 | /* |
---|
| 712 | * read_stdin(AGENT_CTX *) |
---|
| 713 | * |
---|
| 714 | * DESCRIPTION |
---|
| 715 | * read message from stdin and perform any inline configuration |
---|
| 716 | * (such as servicing 'ParseToHeaders' functions) |
---|
| 717 | * |
---|
| 718 | * INPUT ARGUMENTS |
---|
| 719 | * ATX agent context |
---|
| 720 | * |
---|
| 721 | * RETURN VALUES |
---|
| 722 | * buffer structure containing the message |
---|
| 723 | */ |
---|
| 724 | |
---|
| 725 | buffer * read_stdin(AGENT_CTX *ATX) { |
---|
| 726 | int body = 0, line = 1; |
---|
| 727 | char buf[1024]; |
---|
| 728 | buffer *msg; |
---|
| 729 | |
---|
| 730 | msg = buffer_create(NULL); |
---|
| 731 | if (msg == NULL) { |
---|
| 732 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 733 | return NULL; |
---|
| 734 | } |
---|
| 735 | |
---|
| 736 | if (_ds_match_attribute(agent_config, "DataSource", "document")) { |
---|
| 737 | buffer_cat(msg, ": \n\n"); |
---|
| 738 | body = 1; |
---|
| 739 | } |
---|
| 740 | |
---|
| 741 | /* Only read the message if no signature was provided on commandline */ |
---|
| 742 | |
---|
| 743 | if (ATX->signature[0] == 0) { |
---|
| 744 | while ((fgets (buf, sizeof (buf), stdin)) != NULL) |
---|
| 745 | { |
---|
| 746 | /* Strip CR/LFs for admittedly broken mail servers */ |
---|
| 747 | |
---|
| 748 | if (_ds_match_attribute(agent_config, "Broken", "lineStripping")) { |
---|
| 749 | size_t len = strlen(buf); |
---|
| 750 | while (len>1 && buf[len-2]==13) { |
---|
| 751 | buf[len-2] = buf[len-1]; |
---|
| 752 | buf[len-1] = 0; |
---|
| 753 | len--; |
---|
| 754 | } |
---|
| 755 | } |
---|
| 756 | |
---|
| 757 | /* |
---|
| 758 | * Don't include first line of message if it's a quarantine header added |
---|
| 759 | * by dspam at time of quarantine |
---|
| 760 | */ |
---|
| 761 | |
---|
| 762 | if (line==1 && !strncmp(buf, "From QUARANTINE", 15)) |
---|
| 763 | continue; |
---|
| 764 | |
---|
| 765 | /* |
---|
| 766 | * Parse the "To" headers and adjust the operating mode and user when |
---|
| 767 | * an email is sent to spam-* or notspam-* address. Behavior must be |
---|
| 768 | * configured in dspam.conf |
---|
| 769 | */ |
---|
| 770 | |
---|
| 771 | if (_ds_match_attribute(agent_config, "ParseToHeaders", "on")) { |
---|
| 772 | if (buf[0] == 0) |
---|
| 773 | body = 1; |
---|
| 774 | |
---|
| 775 | if (!body && !strncasecmp(buf, "To: ", 4)) |
---|
| 776 | process_parseto(ATX, buf); |
---|
| 777 | } |
---|
| 778 | |
---|
| 779 | if (buffer_cat (msg, buf)) |
---|
| 780 | { |
---|
| 781 | LOG (LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 782 | goto bail; |
---|
| 783 | } |
---|
| 784 | |
---|
| 785 | /* |
---|
| 786 | * Use the original user id if we are reversing a false positive |
---|
| 787 | * (this is only necessary when using shared,managed groups |
---|
| 788 | */ |
---|
| 789 | |
---|
| 790 | if (!strncasecmp (buf, "X-DSPAM-User: ", 14) && |
---|
| 791 | ATX->operating_mode == DSM_PROCESS && |
---|
| 792 | ATX->classification == DSR_ISINNOCENT && |
---|
| 793 | ATX->source == DSS_ERROR) |
---|
| 794 | { |
---|
| 795 | char user[MAX_USERNAME_LENGTH]; |
---|
| 796 | strlcpy (user, buf + 14, sizeof (user)); |
---|
| 797 | chomp (user); |
---|
| 798 | nt_destroy (ATX->users); |
---|
| 799 | ATX->users = nt_create (NT_CHAR); |
---|
| 800 | if (ATX->users == NULL) { |
---|
| 801 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 802 | goto bail; |
---|
| 803 | } |
---|
| 804 | LOGDEBUG("found username %s in X-DSPAM-User header", user); |
---|
| 805 | nt_add (ATX->users, user); |
---|
| 806 | } |
---|
| 807 | |
---|
| 808 | line++; |
---|
| 809 | } |
---|
| 810 | } |
---|
| 811 | |
---|
| 812 | if (!msg->used) |
---|
| 813 | { |
---|
| 814 | if (ATX->signature[0] != 0) { |
---|
| 815 | buffer_cat(msg, "\n\n"); |
---|
| 816 | } |
---|
| 817 | else { |
---|
| 818 | LOG (LOG_INFO, "empty message (no data received)"); |
---|
| 819 | goto bail; |
---|
| 820 | } |
---|
| 821 | } |
---|
| 822 | |
---|
| 823 | return msg; |
---|
| 824 | |
---|
| 825 | bail: |
---|
| 826 | LOGDEBUG("read_stdin() failure"); |
---|
| 827 | buffer_destroy(msg); |
---|
| 828 | return NULL; |
---|
| 829 | } |
---|
| 830 | |
---|
| 831 | /* |
---|
| 832 | * process_parseto(AGENT_CTX *, const char *) |
---|
| 833 | * |
---|
| 834 | * DESCRIPTION |
---|
| 835 | * processes the To: line of a message to provide parseto services |
---|
| 836 | * |
---|
| 837 | * INPUT ARGUMENTS |
---|
| 838 | * ATX agent context |
---|
| 839 | * buf To: line |
---|
| 840 | * |
---|
| 841 | * RETURN VALUES |
---|
| 842 | * returns 0 on success |
---|
| 843 | */ |
---|
| 844 | |
---|
| 845 | int process_parseto(AGENT_CTX *ATX, const char *buf) { |
---|
| 846 | char *y = NULL; |
---|
| 847 | char *x; |
---|
| 848 | char *h = NULL; |
---|
| 849 | char *buffer; |
---|
| 850 | char *ptrptr; |
---|
| 851 | |
---|
| 852 | if (!buf || strncmp(buf+2,":",1) != 0) |
---|
| 853 | return EINVAL; |
---|
| 854 | |
---|
| 855 | buffer = strdup (buf+3); |
---|
| 856 | h = strtok_r (buffer, "\n", &ptrptr); |
---|
| 857 | while (h != NULL) { |
---|
| 858 | /* check for spam alias */ |
---|
| 859 | x = strstr(h, "<spam-"); |
---|
| 860 | if (!x) x = strstr(h, " spam-"); |
---|
| 861 | if (!x) x = strstr(h, "\tspam-"); |
---|
| 862 | if (!x) x = strstr(h, ",spam-"); |
---|
| 863 | if (!x) x = strstr(h, ":spam-"); |
---|
| 864 | if (x != NULL) { |
---|
| 865 | y = strdup(x+6); |
---|
| 866 | if (_ds_match_attribute(agent_config, "ChangeModeOnParse", "on")) { |
---|
| 867 | ATX->classification = DSR_ISSPAM; |
---|
| 868 | ATX->source = DSS_ERROR; |
---|
| 869 | } |
---|
| 870 | } else { |
---|
| 871 | /* check for nonspam alias */ |
---|
| 872 | x = strstr(h, "<notspam-"); |
---|
| 873 | if (!x) x = strstr(h, " notspam-"); |
---|
| 874 | if (!x) x = strstr(h, "\tnotspam-"); |
---|
| 875 | if (!x) x = strstr(h, ",notspam-"); |
---|
| 876 | if (!x) x = strstr(h, ":notspam-"); |
---|
| 877 | if (x && strlen(x) >= 9) { |
---|
| 878 | y = strdup(x+9); |
---|
| 879 | if (_ds_match_attribute(agent_config, "ChangeModeOnParse", "on")) { |
---|
| 880 | ATX->classification = DSR_ISINNOCENT; |
---|
| 881 | ATX->source = DSS_ERROR; |
---|
| 882 | } |
---|
| 883 | } |
---|
| 884 | } |
---|
| 885 | /* do not continue if we found a spam/nonspam alias */ |
---|
| 886 | if (y) break; |
---|
| 887 | |
---|
| 888 | /* get next line from 'To' header */ |
---|
| 889 | h = strtok_r (NULL, "\n", &ptrptr); |
---|
| 890 | if (h && h[0] != 32 && h[0] != 9) { |
---|
| 891 | /* we are not any more in the 'To' header */ |
---|
| 892 | break; |
---|
| 893 | } |
---|
| 894 | } |
---|
| 895 | |
---|
| 896 | free (buffer); |
---|
| 897 | |
---|
| 898 | if (y && (_ds_match_attribute(agent_config, |
---|
| 899 | "ChangeUserOnParse", "on") || |
---|
| 900 | _ds_match_attribute(agent_config, |
---|
| 901 | "ChangeUserOnParse", "full") || |
---|
| 902 | _ds_match_attribute(agent_config, |
---|
| 903 | "ChangeUserOnParse", "user"))) |
---|
| 904 | { |
---|
| 905 | char *z; |
---|
| 906 | |
---|
| 907 | if (_ds_match_attribute(agent_config, |
---|
| 908 | "ChangeUserOnParse", "full")) |
---|
| 909 | { |
---|
| 910 | z = strtok_r(y, ">, \t\r\n", &ptrptr); |
---|
| 911 | } else { |
---|
| 912 | if (strstr(x, "@")) |
---|
| 913 | z = strtok_r(y, "@", &ptrptr); |
---|
| 914 | else |
---|
| 915 | z = NULL; |
---|
| 916 | } |
---|
| 917 | |
---|
| 918 | if (z) { |
---|
| 919 | nt_destroy(ATX->users); |
---|
| 920 | ATX->users = nt_create(NT_CHAR); |
---|
| 921 | if (!ATX->users) { |
---|
| 922 | LOG(LOG_CRIT, ERR_MEM_ALLOC); |
---|
| 923 | return EUNKNOWN; |
---|
| 924 | } |
---|
| 925 | nt_add (ATX->users, z); |
---|
| 926 | } |
---|
| 927 | } |
---|
| 928 | |
---|
| 929 | if (y) free(y); |
---|
| 930 | return 0; |
---|
| 931 | } |
---|
| 932 | |
---|
| 933 | int |
---|
| 934 | init_pwent_cache(void) |
---|
| 935 | { |
---|
| 936 | struct passwd *pwent; |
---|
| 937 | pwent = getpwuid(getuid()); |
---|
| 938 | if (pwent == NULL) { |
---|
| 939 | return 0; |
---|
| 940 | } |
---|
| 941 | else { |
---|
| 942 | __pw_name = strdup(pwent->pw_name); |
---|
| 943 | __pw_uid = pwent->pw_uid; |
---|
| 944 | } |
---|
| 945 | return 1; |
---|
| 946 | } |
---|