6 typedef struct Cmd Cmd;
14 static void hello(void);
15 static int apopcmd(char*);
16 static int capacmd(char*);
17 static int delecmd(char*);
18 static int listcmd(char*);
19 static int noopcmd(char*);
20 static int passcmd(char*);
21 static int quitcmd(char*);
22 static int rsetcmd(char*);
23 static int retrcmd(char*);
24 static int statcmd(char*);
25 static int stlscmd(char*);
26 static int topcmd(char*);
27 static int synccmd(char*);
28 static int uidlcmd(char*);
29 static int usercmd(char*);
30 static char *nextarg(char*);
31 static int getcrnl(char*, int);
32 static int readmbox(char*);
33 static void sendcrnl(char*, ...);
34 static int senderr(char*, ...);
35 static int sendok(char*, ...);
36 #pragma varargck argpos sendcrnl 1
37 #pragma varargck argpos senderr 1
38 #pragma varargck argpos sendok 1
62 static int passwordinclear;
65 typedef struct Msg Msg;
74 static int totalbytes;
80 static uchar *tlscert;
82 static char *peeraddr;
83 static char tmpaddr[64];
88 fprint(2, "usage: upas/pop3 [-a authmboxfile] [-d debugfile] [-p]\n");
93 main(int argc, char **argv)
96 char *arg, cmdbuf[1024];
100 Binit(&in, 0, OREAD);
101 Binit(&out, 1, OWRITE);
106 if(readmbox(EARGF(usage())) < 0)
111 if((fd = create(EARGF(usage()), OWRITE, 0666)) >= 0 && fd != 2){
117 strecpy(tmpaddr, tmpaddr+sizeof tmpaddr, EARGF(usage()));
118 if(arg = strchr(tmpaddr, '!'))
123 tlscert = readcert(EARGF(usage()), &ntlscert);
125 senderr("cannot read TLS certificate: %r");
136 peeraddr = remoteaddr(0,0);
140 while(Bflush(&out), getcrnl(cmdbuf, sizeof cmdbuf) > 0){
141 arg = nextarg(cmdbuf);
142 for(c=cmdtab; c->name; c++)
143 if(cistrcmp(c->name, cmdbuf) == 0)
146 senderr("unknown command %s", cmdbuf);
149 if(c->needauth && !loggedin){
150 senderr("%s requires authentication", cmdbuf);
158 /* sort directories in increasing message number order */
160 dircmp(void *a, void *b)
162 return atoi(((Dir*)a)->name) - atoi(((Dir*)b)->name);
168 int fd, i, n, nd, lines, pid;
169 char buf[100], err[ERRMAX];
176 unmount(nil, "/mail/fs");
177 switch(pid = fork()){
179 return senderr("can't fork to start upas/fs");
184 open("/dev/null", OREAD);
185 open("/dev/null", OWRITE);
186 execl("/bin/upas/fs", "upas/fs", "-np", "-f", box, nil);
187 snprint(err, sizeof err, "upas/fs: %r");
195 if((w = wait()) == nil || w->pid != pid || w->msg[0] != '\0'){
197 return senderr("%s", w->msg);
199 return senderr("can't initialize upas/fs");
203 if(chdir("/mail/fs/mbox") < 0)
204 return senderr("can't initialize upas/fs: %r");
206 if((fd = open(".", OREAD)) < 0)
207 return senderr("cannot open /mail/fs/mbox: %r");
208 nd = dirreadall(fd, &d);
211 return senderr("cannot read from /mail/fs/mbox: %r");
213 msg = mallocz(sizeof(Msg)*nd, 1);
215 return senderr("out of memory");
219 qsort(d, nd, sizeof(d[0]), dircmp);
223 m->upasnum = atoi(d[i].name);
224 sprint(buf, "%d/digest", m->upasnum);
225 if((fd = open(buf, OREAD)) < 0)
227 n = readn(fd, m->digest, sizeof m->digest - 1);
234 * We need the number of message lines so that we
235 * can adjust the byte count to include \r's.
236 * Upas/fs gives us the number of lines in the raw body
237 * in the lines file, but we have to count rawheader ourselves.
238 * There is one blank line between raw header and raw body.
240 sprint(buf, "%d/rawheader", m->upasnum);
241 if((b = Bopen(buf, OREAD)) == nil)
245 p = Brdline(b, '\n');
247 if((n = Blinelen(b)) == 0)
255 sprint(buf, "%d/lines", m->upasnum);
256 if((fd = open(buf, OREAD)) < 0)
258 n = readn(fd, buf, sizeof buf - 1);
265 sprint(buf, "%d/raw", m->upasnum);
266 if((draw = dirstat(buf)) == nil)
268 m->bytes = lines+draw->length;
272 totalbytes += m->bytes;
278 * get a line that ends in crnl or cr, turn terminating crnl into a nl
283 getcrnl(char *buf, int n)
331 sendcrnl(char *fmt, ...)
337 vseprint(buf, buf+sizeof(buf), fmt, arg);
340 fprint(2, "-> %s\n", buf);
341 Bprint(&out, "%s\r\n", buf);
345 senderr(char *fmt, ...)
351 vseprint(buf, buf+sizeof(buf), fmt, arg);
354 fprint(2, "-> -ERR %s\n", buf);
355 Bprint(&out, "-ERR %s\r\n", buf);
360 sendok(char *fmt, ...)
366 vseprint(buf, buf+sizeof(buf), fmt, arg);
370 fprint(2, "-> +OK %s\n", buf);
371 Bprint(&out, "+OK %s\r\n", buf);
374 fprint(2, "-> +OK\n");
375 Bprint(&out, "+OK\r\n");
385 if(passwordinclear || didtls)
387 sendcrnl("PIPELINING");
400 return senderr("DELE requires a message number");
403 if(n < 0 || n >= nmsg || msg[n].deleted)
404 return senderr("no such message");
408 totalbytes -= msg[n].bytes;
409 sendok("message %d deleted", n+1);
419 sendok("+%d message%s (%d octets)", totalmsgs, totalmsgs==1 ? "":"s", totalbytes);
420 for(i=0; i<nmsg; i++){
423 sendcrnl("%d %d", i+1, msg[i].bytes);
428 if(n < 0 || n >= nmsg || msg[n].deleted)
429 return senderr("no such message");
430 sendok("%d %d", n+1, msg[n].bytes);
456 fmtprint(&f, "delete mbox");
457 for(i=0; i<nmsg; i++)
459 fmtprint(&f, " %d", msg[i].upasnum);
461 if(strcmp(s, "delete mbox") != 0){ /* must have something to delete */
462 if((fd = open("../ctl", OWRITE)) < 0){
463 senderr("open ctl to delete messages: %r");
466 if(write(fd, s, strlen(s)) < 0){
467 senderr("error deleting messages: %r");
497 return senderr("RETR requires a message number");
499 if(n < 0 || n >= nmsg || msg[n].deleted)
500 return senderr("no such message");
501 snprint(buf, sizeof buf, "%d/raw", msg[n].upasnum);
502 if((b = Bopen(buf, OREAD)) == nil)
503 return senderr("message disappeared");
505 while((p = Brdstr(b, '\n', 1)) != nil){
507 Bwrite(&out, ".", 1);
508 Bwrite(&out, p, strlen(p));
509 Bwrite(&out, "\r\n", 2);
522 for(i=0; i<nmsg; i++){
526 totalbytes += msg[i].bytes;
535 return sendok("%d %d", totalmsgs, totalbytes);
539 trace(char *fmt, ...)
545 n = vfprint(2, fmt, arg);
557 return senderr("tls already started");
559 return senderr("don't have any tls credentials");
563 memset(&conn, 0, sizeof conn);
565 conn.certlen = ntlscert;
568 fd = tlsServer(0, &conn);
570 sysfatal("tlsServer: %r");
574 Binit(&in, 0, OREAD);
575 Binit(&out, 1, OWRITE);
583 int done, i, lines, n;
588 return senderr("TOP requires a message number");
590 if(n < 0 || n >= nmsg || msg[n].deleted)
591 return senderr("no such message");
594 return senderr("TOP requires a line count");
597 return senderr("bad args to TOP");
598 snprint(buf, sizeof buf, "%d/raw", msg[n].upasnum);
599 if((b = Bopen(buf, OREAD)) == nil)
600 return senderr("message disappeared");
602 while(p = Brdstr(b, '\n', 1)){
605 Bwrite(&out, p, strlen(p));
606 Bwrite(&out, "\r\n", 2);
612 for(i=0; i<lines; i++){
613 p = Brdstr(b, '\n', 1);
617 Bwrite(&out, ".", 1);
618 Bwrite(&out, p, strlen(p));
619 Bwrite(&out, "\r\n", 2);
634 for(n=0; n<nmsg; n++){
637 sendcrnl("%d %s", n+1, msg[n].digest);
642 if(n < 0 || n >= nmsg || msg[n].deleted)
643 return senderr("no such message");
644 sendok("%d %s", n+1, msg[n].digest);
652 while(*p && *p != ' ' && *p != '\t')
654 while(*p == ' ' || *p == '\t')
670 fmtinstall('H', encodefmt);
671 if((chs = auth_challenge("proto=apop role=server")) == nil){
672 senderr("auth server not responding, try later");
676 sendok("POP3 server ready %s", chs->chal);
684 strcpy(box, "/mail/box/");
685 strecpy(box+strlen(box), box+sizeof box-7, arg);
688 if(strcmp(cbox, box) != 0)
689 return senderr("bad mailbox name");
690 strcat(box, "/mbox");
692 strecpy(user, user+sizeof user, arg);
693 if(p = strchr(user, '/'))
702 return senderr("already authenticated");
704 return senderr("USER requires argument");
716 /* hide the peer IP address under a rock in the ratifier FS */
717 if(peeraddr == 0 || *peeraddr == 0)
720 sprint(buf, "/mail/ratify/trusted/%s#32", peeraddr);
723 * if the address is already there and the user owns it,
724 * remove it and recreate it to give him a new time quanta.
726 if(access(buf, 0) >= 0 && remove(buf) < 0)
729 fd = create(buf, OREAD, 0666);
732 // syslog(0, "pop3", "ratified %s", peeraddr);
737 dologin(char *response)
743 chs->resp = response;
744 chs->nresp = strlen(response);
745 if((ai = auth_response(chs)) == nil){
747 senderr("authentication failed: %r; server exiting");
750 return senderr("authentication failed");
753 if(auth_chuid(ai, nil) < 0){
754 senderr("chuid failed: %r; server exiting");
762 if(newns(user, 0) < 0){
763 senderr("newns failed: %r; server exiting");
768 if(readmbox(box) < 0)
770 return sendok("mailbox is %s", box);
777 uchar digest[MD5dlen];
778 char response[2*MD5dlen+1];
780 if(passwordinclear==0 && didtls==0)
781 return senderr("password in the clear disallowed");
783 /* use password to encode challenge */
784 if((chs = auth_challenge("proto=apop role=server")) == nil)
785 return senderr("couldn't get apop challenge");
787 // hash challenge with secret and convert to ascii
788 s = md5((uchar*)chs->chal, chs->nchal, 0, 0);
789 md5((uchar*)arg, strlen(arg), digest, s);
790 snprint(response, sizeof response, "%.*H", MD5dlen, digest);
791 return dologin(response);
802 return dologin(resp);