290
|
1
|
|
2 /*
|
|
3 * Copyright (C) Igor Sysoev
|
644
|
4 * Copyright (C) Nginx, Inc.
|
290
|
5 */
|
|
6
|
|
7
|
|
8 #include <ngx_config.h>
|
|
9 #include <ngx_core.h>
|
|
10 #include <ngx_event.h>
|
|
11 #include <ngx_mail.h>
|
|
12
|
|
13
|
|
14 static void ngx_mail_init_session(ngx_connection_t *c);
|
|
15
|
|
16 #if (NGX_MAIL_SSL)
|
|
17 static void ngx_mail_ssl_init_connection(ngx_ssl_t *ssl, ngx_connection_t *c);
|
|
18 static void ngx_mail_ssl_handshake_handler(ngx_connection_t *c);
|
|
19 #endif
|
|
20
|
|
21
|
|
22 void
|
|
23 ngx_mail_init_connection(ngx_connection_t *c)
|
|
24 {
|
492
|
25 ngx_uint_t i;
|
|
26 ngx_mail_port_t *port;
|
|
27 struct sockaddr *sa;
|
|
28 struct sockaddr_in *sin;
|
|
29 ngx_mail_log_ctx_t *ctx;
|
|
30 ngx_mail_in_addr_t *addr;
|
|
31 ngx_mail_session_t *s;
|
|
32 ngx_mail_addr_conf_t *addr_conf;
|
|
33 #if (NGX_HAVE_INET6)
|
|
34 struct sockaddr_in6 *sin6;
|
|
35 ngx_mail_in6_addr_t *addr6;
|
|
36 #endif
|
|
37
|
290
|
38
|
|
39 /* find the server configuration for the address:port */
|
|
40
|
|
41 /* AF_INET only */
|
|
42
|
492
|
43 port = c->listening->servers;
|
290
|
44
|
492
|
45 if (port->naddrs > 1) {
|
290
|
46
|
|
47 /*
|
|
48 * There are several addresses on this port and one of them
|
|
49 * is the "*:port" wildcard so getsockname() is needed to determine
|
|
50 * the server address.
|
|
51 *
|
|
52 * AcceptEx() already gave this address.
|
|
53 */
|
|
54
|
492
|
55 if (ngx_connection_local_sockaddr(c, NULL, 0) != NGX_OK) {
|
|
56 ngx_mail_close_connection(c);
|
|
57 return;
|
|
58 }
|
|
59
|
|
60 sa = c->local_sockaddr;
|
|
61
|
|
62 switch (sa->sa_family) {
|
290
|
63
|
492
|
64 #if (NGX_HAVE_INET6)
|
|
65 case AF_INET6:
|
|
66 sin6 = (struct sockaddr_in6 *) sa;
|
|
67
|
|
68 addr6 = port->addrs;
|
|
69
|
|
70 /* the last address is "*" */
|
|
71
|
|
72 for (i = 0; i < port->naddrs - 1; i++) {
|
|
73 if (ngx_memcmp(&addr6[i].addr6, &sin6->sin6_addr, 16) == 0) {
|
|
74 break;
|
|
75 }
|
290
|
76 }
|
|
77
|
492
|
78 addr_conf = &addr6[i].conf;
|
|
79
|
|
80 break;
|
|
81 #endif
|
|
82
|
|
83 default: /* AF_INET */
|
|
84 sin = (struct sockaddr_in *) sa;
|
|
85
|
|
86 addr = port->addrs;
|
|
87
|
|
88 /* the last address is "*" */
|
|
89
|
|
90 for (i = 0; i < port->naddrs - 1; i++) {
|
|
91 if (addr[i].addr == sin->sin_addr.s_addr) {
|
|
92 break;
|
|
93 }
|
|
94 }
|
|
95
|
|
96 addr_conf = &addr[i].conf;
|
|
97
|
|
98 break;
|
290
|
99 }
|
|
100
|
492
|
101 } else {
|
|
102 switch (c->local_sockaddr->sa_family) {
|
290
|
103
|
492
|
104 #if (NGX_HAVE_INET6)
|
|
105 case AF_INET6:
|
|
106 addr6 = port->addrs;
|
|
107 addr_conf = &addr6[0].conf;
|
|
108 break;
|
|
109 #endif
|
|
110
|
|
111 default: /* AF_INET */
|
|
112 addr = port->addrs;
|
|
113 addr_conf = &addr[0].conf;
|
|
114 break;
|
290
|
115 }
|
|
116 }
|
|
117
|
|
118 s = ngx_pcalloc(c->pool, sizeof(ngx_mail_session_t));
|
|
119 if (s == NULL) {
|
|
120 ngx_mail_close_connection(c);
|
|
121 return;
|
|
122 }
|
|
123
|
492
|
124 s->main_conf = addr_conf->ctx->main_conf;
|
|
125 s->srv_conf = addr_conf->ctx->srv_conf;
|
290
|
126
|
492
|
127 s->addr_text = &addr_conf->addr_text;
|
290
|
128
|
|
129 c->data = s;
|
|
130 s->connection = c;
|
|
131
|
|
132 ngx_log_error(NGX_LOG_INFO, c->log, 0, "*%ui client %V connected to %V",
|
|
133 c->number, &c->addr_text, s->addr_text);
|
|
134
|
|
135 ctx = ngx_palloc(c->pool, sizeof(ngx_mail_log_ctx_t));
|
|
136 if (ctx == NULL) {
|
|
137 ngx_mail_close_connection(c);
|
|
138 return;
|
|
139 }
|
|
140
|
|
141 ctx->client = &c->addr_text;
|
|
142 ctx->session = s;
|
|
143
|
|
144 c->log->connection = c->number;
|
|
145 c->log->handler = ngx_mail_log_error;
|
|
146 c->log->data = ctx;
|
|
147 c->log->action = "sending client greeting line";
|
|
148
|
|
149 c->log_error = NGX_ERROR_INFO;
|
|
150
|
|
151 #if (NGX_MAIL_SSL)
|
356
|
152 {
|
|
153 ngx_mail_ssl_conf_t *sslcf;
|
290
|
154
|
|
155 sslcf = ngx_mail_get_module_srv_conf(s, ngx_mail_ssl_module);
|
|
156
|
|
157 if (sslcf->enable) {
|
404
|
158 c->log->action = "SSL handshaking";
|
|
159
|
290
|
160 ngx_mail_ssl_init_connection(&sslcf->ssl, c);
|
|
161 return;
|
|
162 }
|
404
|
163
|
492
|
164 if (addr_conf->ssl) {
|
404
|
165
|
|
166 c->log->action = "SSL handshaking";
|
|
167
|
|
168 if (sslcf->ssl.ctx == NULL) {
|
|
169 ngx_log_error(NGX_LOG_ERR, c->log, 0,
|
|
170 "no \"ssl_certificate\" is defined "
|
|
171 "in server listening on SSL port");
|
|
172 ngx_mail_close_connection(c);
|
|
173 return;
|
|
174 }
|
|
175
|
|
176 ngx_mail_ssl_init_connection(&sslcf->ssl, c);
|
|
177 return;
|
|
178 }
|
|
179
|
356
|
180 }
|
290
|
181 #endif
|
|
182
|
|
183 ngx_mail_init_session(c);
|
|
184 }
|
|
185
|
|
186
|
|
187 #if (NGX_MAIL_SSL)
|
|
188
|
336
|
189 void
|
290
|
190 ngx_mail_starttls_handler(ngx_event_t *rev)
|
|
191 {
|
|
192 ngx_connection_t *c;
|
|
193 ngx_mail_session_t *s;
|
|
194 ngx_mail_ssl_conf_t *sslcf;
|
|
195
|
|
196 c = rev->data;
|
|
197 s = c->data;
|
|
198 s->starttls = 1;
|
|
199
|
|
200 c->log->action = "in starttls state";
|
|
201
|
|
202 sslcf = ngx_mail_get_module_srv_conf(s, ngx_mail_ssl_module);
|
|
203
|
|
204 ngx_mail_ssl_init_connection(&sslcf->ssl, c);
|
|
205 }
|
|
206
|
|
207
|
|
208 static void
|
|
209 ngx_mail_ssl_init_connection(ngx_ssl_t *ssl, ngx_connection_t *c)
|
|
210 {
|
|
211 ngx_mail_session_t *s;
|
|
212 ngx_mail_core_srv_conf_t *cscf;
|
|
213
|
|
214 if (ngx_ssl_create_connection(ssl, c, 0) == NGX_ERROR) {
|
|
215 ngx_mail_close_connection(c);
|
|
216 return;
|
|
217 }
|
|
218
|
|
219 if (ngx_ssl_handshake(c) == NGX_AGAIN) {
|
|
220
|
|
221 s = c->data;
|
|
222
|
|
223 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
|
224
|
|
225 ngx_add_timer(c->read, cscf->timeout);
|
|
226
|
|
227 c->ssl->handler = ngx_mail_ssl_handshake_handler;
|
|
228
|
|
229 return;
|
|
230 }
|
|
231
|
|
232 ngx_mail_ssl_handshake_handler(c);
|
|
233 }
|
|
234
|
|
235
|
|
236 static void
|
|
237 ngx_mail_ssl_handshake_handler(ngx_connection_t *c)
|
|
238 {
|
336
|
239 ngx_mail_session_t *s;
|
|
240 ngx_mail_core_srv_conf_t *cscf;
|
290
|
241
|
|
242 if (c->ssl->handshaked) {
|
|
243
|
|
244 s = c->data;
|
|
245
|
|
246 if (s->starttls) {
|
336
|
247 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
|
248
|
|
249 c->read->handler = cscf->protocol->init_protocol;
|
290
|
250 c->write->handler = ngx_mail_send;
|
|
251
|
336
|
252 cscf->protocol->init_protocol(c->read);
|
290
|
253
|
|
254 return;
|
|
255 }
|
|
256
|
394
|
257 c->read->ready = 0;
|
|
258
|
290
|
259 ngx_mail_init_session(c);
|
|
260 return;
|
|
261 }
|
|
262
|
|
263 ngx_mail_close_connection(c);
|
|
264 }
|
|
265
|
|
266 #endif
|
|
267
|
|
268
|
|
269 static void
|
|
270 ngx_mail_init_session(ngx_connection_t *c)
|
|
271 {
|
|
272 ngx_mail_session_t *s;
|
|
273 ngx_mail_core_srv_conf_t *cscf;
|
|
274
|
|
275 s = c->data;
|
|
276
|
|
277 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
|
278
|
336
|
279 s->protocol = cscf->protocol->type;
|
290
|
280
|
|
281 s->ctx = ngx_pcalloc(c->pool, sizeof(void *) * ngx_mail_max_module);
|
|
282 if (s->ctx == NULL) {
|
|
283 ngx_mail_session_internal_server_error(s);
|
|
284 return;
|
|
285 }
|
|
286
|
336
|
287 c->write->handler = ngx_mail_send;
|
|
288
|
|
289 cscf->protocol->init_session(s, c);
|
|
290 }
|
|
291
|
|
292
|
|
293 ngx_int_t
|
|
294 ngx_mail_salt(ngx_mail_session_t *s, ngx_connection_t *c,
|
|
295 ngx_mail_core_srv_conf_t *cscf)
|
|
296 {
|
382
|
297 s->salt.data = ngx_pnalloc(c->pool,
|
|
298 sizeof(" <18446744073709551616.@>" CRLF) - 1
|
|
299 + NGX_TIME_T_LEN
|
|
300 + cscf->server_name.len);
|
336
|
301 if (s->salt.data == NULL) {
|
|
302 return NGX_ERROR;
|
|
303 }
|
|
304
|
|
305 s->salt.len = ngx_sprintf(s->salt.data, "<%ul.%T@%V>" CRLF,
|
|
306 ngx_random(), ngx_time(), &cscf->server_name)
|
|
307 - s->salt.data;
|
|
308
|
|
309 return NGX_OK;
|
|
310 }
|
|
311
|
|
312
|
|
313 #if (NGX_MAIL_SSL)
|
|
314
|
|
315 ngx_int_t
|
|
316 ngx_mail_starttls_only(ngx_mail_session_t *s, ngx_connection_t *c)
|
|
317 {
|
|
318 ngx_mail_ssl_conf_t *sslcf;
|
|
319
|
|
320 if (c->ssl) {
|
|
321 return 0;
|
|
322 }
|
|
323
|
|
324 sslcf = ngx_mail_get_module_srv_conf(s, ngx_mail_ssl_module);
|
|
325
|
|
326 if (sslcf->starttls == NGX_MAIL_STARTTLS_ONLY) {
|
|
327 return 1;
|
|
328 }
|
|
329
|
|
330 return 0;
|
|
331 }
|
290
|
332
|
336
|
333 #endif
|
|
334
|
|
335
|
|
336 ngx_int_t
|
|
337 ngx_mail_auth_plain(ngx_mail_session_t *s, ngx_connection_t *c, ngx_uint_t n)
|
|
338 {
|
|
339 u_char *p, *last;
|
|
340 ngx_str_t *arg, plain;
|
|
341
|
|
342 arg = s->args.elts;
|
|
343
|
|
344 #if (NGX_DEBUG_MAIL_PASSWD)
|
|
345 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
346 "mail auth plain: \"%V\"", &arg[n]);
|
|
347 #endif
|
|
348
|
382
|
349 plain.data = ngx_pnalloc(c->pool, ngx_base64_decoded_length(arg[n].len));
|
582
|
350 if (plain.data == NULL) {
|
336
|
351 return NGX_ERROR;
|
|
352 }
|
|
353
|
|
354 if (ngx_decode_base64(&plain, &arg[n]) != NGX_OK) {
|
|
355 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
356 "client sent invalid base64 encoding in AUTH PLAIN command");
|
|
357 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
358 }
|
|
359
|
|
360 p = plain.data;
|
|
361 last = p + plain.len;
|
|
362
|
|
363 while (p < last && *p++) { /* void */ }
|
|
364
|
|
365 if (p == last) {
|
|
366 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
367 "client sent invalid login in AUTH PLAIN command");
|
|
368 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
369 }
|
|
370
|
|
371 s->login.data = p;
|
|
372
|
|
373 while (p < last && *p) { p++; }
|
|
374
|
|
375 if (p == last) {
|
|
376 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
377 "client sent invalid password in AUTH PLAIN command");
|
|
378 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
290
|
379 }
|
|
380
|
336
|
381 s->login.len = p++ - s->login.data;
|
|
382
|
|
383 s->passwd.len = last - p;
|
|
384 s->passwd.data = p;
|
|
385
|
|
386 #if (NGX_DEBUG_MAIL_PASSWD)
|
|
387 ngx_log_debug2(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
388 "mail auth plain: \"%V\" \"%V\"", &s->login, &s->passwd);
|
|
389 #endif
|
|
390
|
|
391 return NGX_DONE;
|
|
392 }
|
|
393
|
290
|
394
|
336
|
395 ngx_int_t
|
444
|
396 ngx_mail_auth_login_username(ngx_mail_session_t *s, ngx_connection_t *c,
|
|
397 ngx_uint_t n)
|
336
|
398 {
|
|
399 ngx_str_t *arg;
|
|
400
|
|
401 arg = s->args.elts;
|
|
402
|
|
403 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
444
|
404 "mail auth login username: \"%V\"", &arg[n]);
|
336
|
405
|
444
|
406 s->login.data = ngx_pnalloc(c->pool, ngx_base64_decoded_length(arg[n].len));
|
582
|
407 if (s->login.data == NULL) {
|
336
|
408 return NGX_ERROR;
|
|
409 }
|
322
|
410
|
444
|
411 if (ngx_decode_base64(&s->login, &arg[n]) != NGX_OK) {
|
336
|
412 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
413 "client sent invalid base64 encoding in AUTH LOGIN command");
|
|
414 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
415 }
|
|
416
|
|
417 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
418 "mail auth login username: \"%V\"", &s->login);
|
|
419
|
|
420 return NGX_OK;
|
|
421 }
|
|
422
|
|
423
|
|
424 ngx_int_t
|
|
425 ngx_mail_auth_login_password(ngx_mail_session_t *s, ngx_connection_t *c)
|
|
426 {
|
|
427 ngx_str_t *arg;
|
|
428
|
|
429 arg = s->args.elts;
|
|
430
|
|
431 #if (NGX_DEBUG_MAIL_PASSWD)
|
|
432 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
433 "mail auth login password: \"%V\"", &arg[0]);
|
|
434 #endif
|
|
435
|
382
|
436 s->passwd.data = ngx_pnalloc(c->pool,
|
|
437 ngx_base64_decoded_length(arg[0].len));
|
582
|
438 if (s->passwd.data == NULL) {
|
336
|
439 return NGX_ERROR;
|
|
440 }
|
|
441
|
|
442 if (ngx_decode_base64(&s->passwd, &arg[0]) != NGX_OK) {
|
|
443 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
444 "client sent invalid base64 encoding in AUTH LOGIN command");
|
|
445 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
446 }
|
290
|
447
|
336
|
448 #if (NGX_DEBUG_MAIL_PASSWD)
|
|
449 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
450 "mail auth login password: \"%V\"", &s->passwd);
|
|
451 #endif
|
|
452
|
|
453 return NGX_DONE;
|
|
454 }
|
|
455
|
|
456
|
|
457 ngx_int_t
|
|
458 ngx_mail_auth_cram_md5_salt(ngx_mail_session_t *s, ngx_connection_t *c,
|
|
459 char *prefix, size_t len)
|
|
460 {
|
|
461 u_char *p;
|
|
462 ngx_str_t salt;
|
|
463 ngx_uint_t n;
|
|
464
|
382
|
465 p = ngx_pnalloc(c->pool, len + ngx_base64_encoded_length(s->salt.len) + 2);
|
336
|
466 if (p == NULL) {
|
|
467 return NGX_ERROR;
|
|
468 }
|
|
469
|
|
470 salt.data = ngx_cpymem(p, prefix, len);
|
|
471 s->salt.len -= 2;
|
|
472
|
|
473 ngx_encode_base64(&salt, &s->salt);
|
|
474
|
|
475 s->salt.len += 2;
|
|
476 n = len + salt.len;
|
|
477 p[n++] = CR; p[n++] = LF;
|
|
478
|
|
479 s->out.len = n;
|
|
480 s->out.data = p;
|
290
|
481
|
336
|
482 return NGX_OK;
|
|
483 }
|
|
484
|
|
485
|
|
486 ngx_int_t
|
|
487 ngx_mail_auth_cram_md5(ngx_mail_session_t *s, ngx_connection_t *c)
|
|
488 {
|
|
489 u_char *p, *last;
|
|
490 ngx_str_t *arg;
|
|
491
|
|
492 arg = s->args.elts;
|
|
493
|
|
494 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
495 "mail auth cram-md5: \"%V\"", &arg[0]);
|
290
|
496
|
382
|
497 s->login.data = ngx_pnalloc(c->pool, ngx_base64_decoded_length(arg[0].len));
|
582
|
498 if (s->login.data == NULL) {
|
336
|
499 return NGX_ERROR;
|
|
500 }
|
290
|
501
|
336
|
502 if (ngx_decode_base64(&s->login, &arg[0]) != NGX_OK) {
|
|
503 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
504 "client sent invalid base64 encoding in AUTH CRAM-MD5 command");
|
|
505 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
506 }
|
|
507
|
|
508 p = s->login.data;
|
|
509 last = p + s->login.len;
|
|
510
|
|
511 while (p < last) {
|
|
512 if (*p++ == ' ') {
|
|
513 s->login.len = p - s->login.data - 1;
|
|
514 s->passwd.len = last - p;
|
|
515 s->passwd.data = p;
|
|
516 break;
|
290
|
517 }
|
|
518 }
|
|
519
|
336
|
520 if (s->passwd.len != 32) {
|
|
521 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
|
522 "client sent invalid CRAM-MD5 hash in AUTH CRAM-MD5 command");
|
|
523 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
290
|
524 }
|
|
525
|
336
|
526 ngx_log_debug2(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
527 "mail auth cram-md5: \"%V\" \"%V\"", &s->login, &s->passwd);
|
|
528
|
|
529 s->auth_method = NGX_MAIL_AUTH_CRAM_MD5;
|
|
530
|
|
531 return NGX_DONE;
|
290
|
532 }
|
|
533
|
|
534
|
|
535 void
|
|
536 ngx_mail_send(ngx_event_t *wev)
|
|
537 {
|
|
538 ngx_int_t n;
|
|
539 ngx_connection_t *c;
|
|
540 ngx_mail_session_t *s;
|
|
541 ngx_mail_core_srv_conf_t *cscf;
|
|
542
|
|
543 c = wev->data;
|
|
544 s = c->data;
|
|
545
|
|
546 if (wev->timedout) {
|
|
547 ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT, "client timed out");
|
|
548 c->timedout = 1;
|
|
549 ngx_mail_close_connection(c);
|
|
550 return;
|
|
551 }
|
|
552
|
|
553 if (s->out.len == 0) {
|
430
|
554 if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
|
290
|
555 ngx_mail_close_connection(c);
|
|
556 }
|
|
557
|
|
558 return;
|
|
559 }
|
|
560
|
|
561 n = c->send(c, s->out.data, s->out.len);
|
|
562
|
|
563 if (n > 0) {
|
|
564 s->out.len -= n;
|
|
565
|
|
566 if (wev->timer_set) {
|
|
567 ngx_del_timer(wev);
|
|
568 }
|
|
569
|
|
570 if (s->quit) {
|
|
571 ngx_mail_close_connection(c);
|
|
572 return;
|
|
573 }
|
|
574
|
|
575 if (s->blocked) {
|
|
576 c->read->handler(c->read);
|
|
577 }
|
|
578
|
|
579 return;
|
|
580 }
|
|
581
|
|
582 if (n == NGX_ERROR) {
|
|
583 ngx_mail_close_connection(c);
|
|
584 return;
|
|
585 }
|
|
586
|
|
587 /* n == NGX_AGAIN */
|
|
588
|
|
589 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
|
590
|
|
591 ngx_add_timer(c->write, cscf->timeout);
|
|
592
|
430
|
593 if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
|
290
|
594 ngx_mail_close_connection(c);
|
|
595 return;
|
|
596 }
|
|
597 }
|
|
598
|
|
599
|
336
|
600 ngx_int_t
|
|
601 ngx_mail_read_command(ngx_mail_session_t *s, ngx_connection_t *c)
|
290
|
602 {
|
336
|
603 ssize_t n;
|
|
604 ngx_int_t rc;
|
|
605 ngx_str_t l;
|
290
|
606 ngx_mail_core_srv_conf_t *cscf;
|
|
607
|
336
|
608 n = c->recv(c, s->buffer->last, s->buffer->end - s->buffer->last);
|
290
|
609
|
|
610 if (n == NGX_ERROR || n == 0) {
|
336
|
611 ngx_mail_close_connection(c);
|
290
|
612 return NGX_ERROR;
|
|
613 }
|
|
614
|
|
615 if (n > 0) {
|
|
616 s->buffer->last += n;
|
|
617 }
|
|
618
|
|
619 if (n == NGX_AGAIN) {
|
430
|
620 if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
|
290
|
621 ngx_mail_session_internal_server_error(s);
|
|
622 return NGX_ERROR;
|
|
623 }
|
|
624
|
|
625 return NGX_AGAIN;
|
|
626 }
|
|
627
|
336
|
628 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
290
|
629
|
336
|
630 rc = cscf->protocol->parse_command(s);
|
290
|
631
|
|
632 if (rc == NGX_AGAIN) {
|
|
633
|
|
634 if (s->buffer->last < s->buffer->end) {
|
|
635 return rc;
|
|
636 }
|
|
637
|
|
638 l.len = s->buffer->last - s->buffer->start;
|
|
639 l.data = s->buffer->start;
|
|
640
|
336
|
641 ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
290
|
642 "client sent too long command \"%V\"", &l);
|
|
643
|
|
644 s->quit = 1;
|
|
645
|
|
646 return NGX_MAIL_PARSE_INVALID_COMMAND;
|
|
647 }
|
|
648
|
|
649 if (rc == NGX_IMAP_NEXT || rc == NGX_MAIL_PARSE_INVALID_COMMAND) {
|
|
650 return rc;
|
|
651 }
|
|
652
|
|
653 if (rc == NGX_ERROR) {
|
336
|
654 ngx_mail_close_connection(c);
|
290
|
655 return NGX_ERROR;
|
|
656 }
|
|
657
|
|
658 return NGX_OK;
|
|
659 }
|
|
660
|
|
661
|
|
662 void
|
336
|
663 ngx_mail_auth(ngx_mail_session_t *s, ngx_connection_t *c)
|
|
664 {
|
|
665 s->args.nelts = 0;
|
|
666 s->buffer->pos = s->buffer->start;
|
|
667 s->buffer->last = s->buffer->start;
|
|
668 s->state = 0;
|
|
669
|
|
670 if (c->read->timer_set) {
|
|
671 ngx_del_timer(c->read);
|
|
672 }
|
|
673
|
|
674 s->login_attempt++;
|
|
675
|
|
676 ngx_mail_auth_http_init(s);
|
|
677 }
|
|
678
|
|
679
|
|
680 void
|
290
|
681 ngx_mail_session_internal_server_error(ngx_mail_session_t *s)
|
|
682 {
|
336
|
683 ngx_mail_core_srv_conf_t *cscf;
|
|
684
|
|
685 cscf = ngx_mail_get_module_srv_conf(s, ngx_mail_core_module);
|
|
686
|
|
687 s->out = cscf->protocol->internal_server_error;
|
290
|
688 s->quit = 1;
|
|
689
|
|
690 ngx_mail_send(s->connection->write);
|
|
691 }
|
|
692
|
|
693
|
|
694 void
|
|
695 ngx_mail_close_connection(ngx_connection_t *c)
|
|
696 {
|
|
697 ngx_pool_t *pool;
|
|
698
|
|
699 ngx_log_debug1(NGX_LOG_DEBUG_MAIL, c->log, 0,
|
|
700 "close mail connection: %d", c->fd);
|
|
701
|
|
702 #if (NGX_MAIL_SSL)
|
|
703
|
|
704 if (c->ssl) {
|
|
705 if (ngx_ssl_shutdown(c) == NGX_AGAIN) {
|
|
706 c->ssl->handler = ngx_mail_close_connection;
|
|
707 return;
|
|
708 }
|
|
709 }
|
|
710
|
|
711 #endif
|
|
712
|
336
|
713 #if (NGX_STAT_STUB)
|
502
|
714 (void) ngx_atomic_fetch_add(ngx_stat_active, -1);
|
336
|
715 #endif
|
|
716
|
290
|
717 c->destroyed = 1;
|
|
718
|
|
719 pool = c->pool;
|
|
720
|
|
721 ngx_close_connection(c);
|
|
722
|
|
723 ngx_destroy_pool(pool);
|
|
724 }
|
|
725
|
|
726
|
336
|
727 u_char *
|
290
|
728 ngx_mail_log_error(ngx_log_t *log, u_char *buf, size_t len)
|
|
729 {
|
|
730 u_char *p;
|
|
731 ngx_mail_session_t *s;
|
|
732 ngx_mail_log_ctx_t *ctx;
|
|
733
|
|
734 if (log->action) {
|
|
735 p = ngx_snprintf(buf, len, " while %s", log->action);
|
|
736 len -= p - buf;
|
|
737 buf = p;
|
|
738 }
|
|
739
|
|
740 ctx = log->data;
|
|
741
|
|
742 p = ngx_snprintf(buf, len, ", client: %V", ctx->client);
|
|
743 len -= p - buf;
|
|
744 buf = p;
|
|
745
|
|
746 s = ctx->session;
|
|
747
|
|
748 if (s == NULL) {
|
|
749 return p;
|
|
750 }
|
|
751
|
336
|
752 p = ngx_snprintf(buf, len, "%s, server: %V",
|
|
753 s->starttls ? " using starttls" : "",
|
|
754 s->addr_text);
|
290
|
755 len -= p - buf;
|
|
756 buf = p;
|
|
757
|
|
758 if (s->login.len == 0) {
|
|
759 return p;
|
|
760 }
|
|
761
|
|
762 p = ngx_snprintf(buf, len, ", login: \"%V\"", &s->login);
|
|
763 len -= p - buf;
|
|
764 buf = p;
|
|
765
|
|
766 if (s->proxy == NULL) {
|
|
767 return p;
|
|
768 }
|
|
769
|
|
770 p = ngx_snprintf(buf, len, ", upstream: %V", s->proxy->upstream.name);
|
|
771
|
|
772 return p;
|
|
773 }
|