/* * Copyright (c) 1980 Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef lint char copyright[] = "@(#) Copyright (c) 1980 Regents of the University of California.\n\ All rights reserved.\n"; #endif /* not lint */ #ifndef lint /*static char sccsid[] = "from: @(#)comsat.c 5.24 (Berkeley) 2/25/91";*/ static char rcsid[] = "$Id: comsat.c,v 1.4 1994/02/01 00:32:22 cgd Exp $"; #endif /* not lint */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include int debug = 0; #define dsyslog if (debug) syslog #define MAXIDLE 120 char hostname[MAXHOSTNAMELEN]; struct utmp *utmp = NULL; time_t lastmsgtime, time(); int nutmp, uf; /* ARGSUSED */ main(argc, argv) int argc; char **argv; { extern int errno; register int cc; char msgbuf[100]; struct sockaddr_in from; int fromlen; void onalrm(), reapchildren(); /* verify proper invocation */ fromlen = sizeof(from); if (getsockname(0, (struct sockaddr *)&from, &fromlen) < 0) { (void)fprintf(stderr, "comsat: getsockname: %s.\n", strerror(errno)); exit(1); } openlog("comsat", LOG_PID, LOG_DAEMON); if (chdir(_PATH_MAILDIR)) { syslog(LOG_ERR, "chdir: %s: %m", _PATH_MAILDIR); exit(1); } if ((uf = open(_PATH_UTMP, O_RDONLY, 0)) < 0) { syslog(LOG_ERR, "main: %s: %m", _PATH_UTMP); (void) recv(0, msgbuf, sizeof(msgbuf) - 1, 0); exit(1); } (void)time(&lastmsgtime); (void)gethostname(hostname, sizeof(hostname)); onalrm(); (void)signal(SIGALRM, onalrm); (void)signal(SIGTTOU, SIG_IGN); (void)signal(SIGCHLD, reapchildren); for (;;) { cc = recv(0, msgbuf, sizeof(msgbuf) - 1, 0); if (cc <= 0) { if (errno != EINTR) sleep(1); errno = 0; continue; } if (!nutmp) /* no one has logged in yet */ continue; sigblock(sigmask(SIGALRM)); msgbuf[cc] = '\0'; (void)time(&lastmsgtime); mailfor(msgbuf); sigsetmask(0L); } } void reapchildren() { while (wait3((int *)NULL, WNOHANG, (struct rusage *)NULL) > 0); } void onalrm() { static u_int utmpsize; /* last malloced size for utmp */ static u_int utmpmtime; /* last modification time for utmp */ struct stat statbf; off_t lseek(); char *malloc(), *realloc(); if (time((time_t *)NULL) - lastmsgtime >= MAXIDLE) exit(0); (void)alarm((u_int)15); (void)fstat(uf, &statbf); if (statbf.st_mtime > utmpmtime) { utmpmtime = statbf.st_mtime; if (statbf.st_size > utmpsize) { utmpsize = statbf.st_size + 10 * sizeof(struct utmp); if (utmp) utmp = (struct utmp *)realloc((char *)utmp, utmpsize); else utmp = (struct utmp *)malloc(utmpsize); if (!utmp) { syslog(LOG_ERR, "malloc failed"); exit(1); } } (void)lseek(uf, 0L, L_SET); nutmp = read(uf, utmp, (int)statbf.st_size)/sizeof(struct utmp); } } mailfor(name) char *name; { register struct utmp *utp = &utmp[nutmp]; register char *cp; off_t offset; if (!(cp = index(name, '@'))) return; *cp = '\0'; offset = atoi(cp + 1); while (--utp >= utmp) if (!strncmp(utp->ut_name, name, sizeof(utmp[0].ut_name))) notify(utp, offset); } static char *cr; notify(utp, offset) register struct utmp *utp; off_t offset; { FILE *tp; struct stat stb; struct sgttyb gttybuf; char tty[20], name[sizeof(utmp[0].ut_name) + 1]; (void)snprintf(tty, sizeof(tty), "%s%.*s", _PATH_DEV, (int)sizeof(utp->ut_line), utp->ut_line); if (index(tty + sizeof(_PATH_DEV) - 1, '/')) { /* A slash is an attempt to break security... */ syslog(LOG_AUTH | LOG_NOTICE, "'/' in \"%s\"", tty); return; } if (stat(tty, &stb) || !(stb.st_mode & S_IEXEC)) { dsyslog(LOG_DEBUG, "%s: wrong mode on %s", utp->ut_name, tty); return; } dsyslog(LOG_DEBUG, "notify %s on %s\n", utp->ut_name, tty); if (fork()) return; (void)signal(SIGALRM, SIG_DFL); (void)alarm((u_int)30); if ((tp = fopen(tty, "w")) == NULL) { dsyslog(LOG_ERR, "fopen of tty %s failed", tty); _exit(-1); } (void)ioctl(fileno(tp), TIOCGETP, >tybuf); cr = (gttybuf.sg_flags&CRMOD) && !(gttybuf.sg_flags&RAW) ? "\n" : "\n\r"; (void)strncpy(name, utp->ut_name, sizeof(utp->ut_name)); name[sizeof(name) - 1] = '\0'; (void)fprintf(tp, "%s\007New mail for %s@%.*s\007 has arrived:%s----%s", cr, name, sizeof(hostname), hostname, cr, cr); jkfprintf(tp, name, offset); (void)fclose(tp); _exit(0); } jkfprintf(tp, name, offset) register FILE *tp; char name[]; off_t offset; { register char *cp, ch; register FILE *fi; register int linecnt, charcnt, inheader; register struct passwd *p; char line[BUFSIZ]; /* Set effective uid to user in case mail drop is on nfs */ if ((p = getpwnam(name)) == NULL) { /* * If user is not in passwd file, assume that it's * an attempt to break security... */ syslog(LOG_AUTH | LOG_NOTICE, "%s not in passwd file", name); return; } else (void) setuid(p->pw_uid); if ((fi = fopen(name, "r")) == NULL) return; (void)fseek(fi, offset, L_SET); /* * Print the first 7 lines or 560 characters of the new mail * (whichever comes first). Skip header crap other than * From, Subject, To, and Date. */ linecnt = 7; charcnt = 560; inheader = 1; while (fgets(line, sizeof(line), fi) != NULL) { if (inheader) { if (line[0] == '\n') { inheader = 0; continue; } if (line[0] == ' ' || line[0] == '\t' || strncmp(line, "From:", 5) && strncmp(line, "Subject:", 8)) continue; } if (linecnt <= 0 || charcnt <= 0) { (void)fprintf(tp, "...more...%s", cr); fclose(fi); return; } /* strip weird stuff so can't trojan horse stupid terminals */ for (cp = line; (ch = *cp) && ch != '\n'; ++cp, --charcnt) { ch = toascii(ch); if (!isprint(ch) && !isspace(ch)) ch |= 0x40; (void)fputc(ch, tp); } (void)fputs(cr, tp); --linecnt; } (void)fprintf(tp, "----%s\n", cr); fclose(fi); }