Logo Search packages:      
Sourcecode: fetchmail version File versions

fetchmail.c

/*
 * fetchmail.c -- main driver module for fetchmail
 *
 * For license terms, see the file COPYING in this directory.
 */
#include "config.h"

#include <stdio.h>
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <fcntl.h>
#include <string.h>
#include <signal.h>
#if defined(HAVE_SYSLOG)
#include <syslog.h>
#endif
#include <pwd.h>
#ifdef __FreeBSD__
#include <grp.h>
#endif
#include <errno.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/time.h>   /* needed for Sun 4.1.2 */
#ifdef HAVE_SETRLIMIT
#include <sys/resource.h>
#endif /* HAVE_SETRLIMIT */
#include <sys/utsname.h>

#include "fetchmail.h"
#include "socket.h"
#include "tunable.h"
#include "smtp.h"
#include "netrc.h"
#include "i18n.h"

#ifndef ENETUNREACH
#define ENETUNREACH   128       /* Interactive doesn't know this */
#endif /* ENETUNREACH */

/* prototypes for internal functions */
static int load_params(int, char **, int);
static void dump_params (struct runctl *runp, struct query *, flag implicit);
static int query_host(struct query *);

/* controls the detail level of status/progress messages written to stderr */
int outlevel;         /* see the O_.* constants above */

/* miscellaneous global controls */
struct runctl run;          /* global controls for this run */
flag nodetach;              /* if TRUE, don't detach daemon process */
flag quitmode;              /* if --quit was set */
flag check_only;      /* if --probe was set */
flag versioninfo;     /* emit only version info */
char *user;           /* the name of the invoking user */
char *home;           /* invoking user's home directory */
char *fmhome;               /* fetchmail's home directory */
char *program_name;         /* the name to prefix error messages with */
flag configdump;      /* dump control blocks for configurator */
char *fetchmailhost;        /* either `localhost' or the host's FQDN */

#if NET_SECURITY
void *request = NULL;
int requestlen = 0;
#endif /* NET_SECURITY */

static int querystatus;       /* status of query */
static int successes;         /* count number of successful polls */
static int activecount;       /* count number of active entries */
static struct runctl cmd_run; /* global options set from command line */
static time_t parsetime;      /* time of last parse */

static RETSIGTYPE terminate_run(int);
static RETSIGTYPE terminate_poll(int);

#if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
/* drop SGID kmem privileage until we need it */
static void dropprivs(void)
{
    struct group *gr;
    gid_t        egid;
    gid_t        rgid;
    
    egid = getegid();
    rgid = getgid();
    gr = getgrgid(egid);
    
    if (gr && !strcmp(gr->gr_name, "kmem"))
    {
      extern void interface_set_gids(gid_t egid, gid_t rgid);
      interface_set_gids(egid, rgid);
      setegid(rgid);
    }
}
#endif

#if defined(HAVE_SETLOCALE) && defined(ENABLE_NLS) && defined(HAVE_STRFTIME)
#include <time.h>
#include <locale.h>
static char *timestamp (void)
{
    time_t      now;
    static char buf[60];

    time (&now);
    setlocale (LC_TIME, "");
    strftime (buf, sizeof (buf), "%c", localtime(&now));
    setlocale (LC_TIME, "C");
    return (buf);
}
#else
#define timestamp rfc822timestamp
#endif

static RETSIGTYPE donothing(int sig) 
{
    extern volatile int lastsig;    /* declared in idle.c */
    set_signal_handler(sig, donothing);
    lastsig = sig;
}

int main(int argc, char **argv)
{
    int bkgd = FALSE;
    int parsestatus, implicitmode = FALSE;
    struct query *ctl;
    netrc_entry *netrc_list;
    char *netrc_file, *tmpbuf;
    pid_t pid;
    int lastsig = 0;

#if defined(__FreeBSD__) && defined(__FreeBSD_USE_KVM)
    dropprivs();
#endif

    envquery(argc, argv);
#ifdef ENABLE_NLS
    setlocale (LC_ALL, "");
    bindtextdomain(PACKAGE, LOCALEDIR);
    textdomain(PACKAGE);
#endif

    /*
     * Note: because we can't initialize reporting before we  know whether
     * syslog is supposed to be on, this message will go to stdout and
     * be lost when running in background.
     */
    if (outlevel >= O_VERBOSE)
    {
      int i;

      report(stdout, GT_("fetchmail: invoked with"));
      for (i = 0; i < argc; i++)
          report(stdout, " %s", argv[i]);
      report(stdout, "\n");
    }

#define IDFILE_NAME     ".fetchids"
    run.idfile = prependdir (IDFILE_NAME, fmhome);
  
    outlevel = O_NORMAL;

    /*
     * We used to arrange for the lock to be removed on exit close
     * to where the lock was asserted.  Now we need to do it here, because
     * we might have re-executed in background with an existing lock
     * as the result of a changed rcfile (see the code near the execvp(3)
     * call near the beginning of the polling loop for details).  We want
     * to be sure the lock gets nuked on any error exit, basically.
     */
    lock_dispose();

#ifdef HAVE_GETCWD
    /* save the current directory */
    if (getcwd (currentwd, sizeof (currentwd)) == NULL) {
      report(stderr, GT_("could not get current working directory\n"));
      currentwd[0] = 0;
    }
#endif

    if ((parsestatus = parsecmdline(argc,argv, &cmd_run, &cmd_opts)) < 0)
      exit(PS_SYNTAX);

    if (versioninfo)
    {
      printf(GT_("This is fetchmail release %s"), VERSION);
#ifdef POP2_ENABLE
      printf("+POP2");
#endif /* POP2_ENABLE */
#ifndef POP3_ENABLE
      printf("-POP3");
#endif /* POP3_ENABLE */
#ifndef IMAP_ENABLE
      printf("-IMAP");
#endif /* IMAP_ENABLE */
#ifdef GSSAPI
      printf("+IMAP-GSS");
#endif /* GSSAPI */
#ifdef RPA_ENABLE
      printf("+RPA");
#endif /* RPA_ENABLE */
#ifdef NTLM_ENABLE
      printf("+NTLM");
#endif /* NTLM_ENABLE */
#ifdef SDPS_ENABLE
      printf("+SDPS");
#endif /* SDPS_ENABLE */
#ifndef ETRN_ENABLE
      printf("-ETRN");
#endif /* ETRN_ENABLE */
#ifndef ODMR_ENABLE
      printf("-ODMR");
#endif /* ODMR_ENABLE */
#ifdef SSL_ENABLE
      printf("+SSL");
#endif
#if OPIE_ENABLE
      printf("+OPIE");
#endif /* OPIE_ENABLE */
#if INET6_ENABLE
      printf("+INET6");
#endif /* INET6_ENABLE */
#if NET_SECURITY
      printf("+NETSEC");
#endif /* NET_SECURITY */
#ifdef HAVE_SOCKS
      printf("+SOCKS");
#endif /* HAVE_SOCKS */
#if ENABLE_NLS
      printf("+NLS");
#endif /* ENABLE_NLS */
      putchar('\n');
      fputs("Fallback MDA: ", stdout);
#ifdef FALLBACK_MDA
      fputs(FALLBACK_MDA, stdout);
#else
      fputs("(none)", stdout);
#endif
      putchar('\n');
      fflush(stdout);

      /* this is an attempt to help remote debugging */
      system("uname -a");
    }

    /* avoid parsing the config file if all we're doing is killing a daemon */ 
    if (!(quitmode && argc == 2))
      implicitmode = load_params(argc, argv, optind);

#if defined(HAVE_SYSLOG)
    /* logging should be set up early in case we were restarted from exec */
    if (run.use_syslog)
    {
#if defined(LOG_MAIL)
      openlog(program_name, LOG_PID, LOG_MAIL);
#else
      /* Assume BSD4.2 openlog with two arguments */
      openlog(program_name, LOG_PID);
#endif
      report_init(-1);
    }
    else
#endif
      report_init((run.poll_interval == 0 || nodetach) && !run.logfile);

    /* construct the lockfile */
    lock_setup();

#ifdef HAVE_SETRLIMIT
    /*
     * Before getting passwords, disable core dumps unless -v -d0 mode is on.
     * Core dumps could otherwise contain passwords to be scavenged by a
     * cracker.
     */
    if (outlevel < O_VERBOSE || run.poll_interval > 0)
    {
      struct rlimit corelimit;
      corelimit.rlim_cur = 0;
      corelimit.rlim_max = 0;
      setrlimit(RLIMIT_CORE, &corelimit);
    }
#endif /* HAVE_SETRLIMIT */

#define     NETRC_FILE  ".netrc"
    /* parse the ~/.netrc file (if present) for future password lookups. */
    netrc_file = prependdir (NETRC_FILE, home);
    netrc_list = parse_netrc(netrc_file);
#undef NETRC_FILE

    /* pick up passwords where we can */ 
    for (ctl = querylist; ctl; ctl = ctl->next)
    {
      if (ctl->active && !(implicitmode && ctl->server.skip)&&!ctl->password)
      {
          if (NO_PASSWORD(ctl))
            /* Server won't care what the password is, but there
               must be some non-null string here.  */
            ctl->password = ctl->remotename;
          else
          {
            netrc_entry *p;

            /* look up the pollname and account in the .netrc file. */
            p = search_netrc(netrc_list,
                         ctl->server.pollname, ctl->remotename);
            /* if we find a matching entry with a password, use it */
            if (p && p->password)
                ctl->password = xstrdup(p->password);

            /* otherwise try with "via" name if there is one */
            else if (ctl->server.via)
            {
                p = search_netrc(netrc_list, 
                             ctl->server.via, ctl->remotename);
                if (p && p->password)
                    ctl->password = xstrdup(p->password);
            }
          }
      }
    }

    /* perhaps we just want to check options? */
    if (versioninfo)
    {
      int havercfile = access(rcfile, 0);

      printf(GT_("Taking options from command line%s%s\n"),
                        havercfile ? "" :  GT_(" and "),
                        havercfile ? "" : rcfile);

      if (querylist == NULL)
          fprintf(stderr,
                GT_("No mailservers set up -- perhaps %s is missing?\n"),
                rcfile);
      else
          dump_params(&run, querylist, implicitmode);
      exit(0);
    }

    /* dump options as a Python dictionary, for configurator use */
    if (configdump)
    {
      dump_config(&run, querylist);
      exit(0);
    }

    /* check for another fetchmail running concurrently */
    pid = lock_state();
    bkgd = (pid < 0);
    pid = bkgd ? -pid : pid;

    /* if no mail servers listed and nothing in background, we're done */
    if (!(quitmode && argc == 2) && pid == 0 && querylist == NULL) {
      (void)fputs(GT_("fetchmail: no mailservers have been specified.\n"),stderr);
      exit(PS_SYNTAX);
    }

    /* perhaps user asked us to kill the other fetchmail */
    if (quitmode)
    {
      if (pid == 0) 
      {
          fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
          if (argc == 2)
            exit(PS_EXCLUDE);
      }
      else if (getpid() == pid)
      {
          /* this test enables re-execing on a changed rcfile */
          if (argc == 2)
          {
            fprintf(stderr,GT_("fetchmail: no other fetchmail is running\n"));
            exit(PS_EXCLUDE);
          }
      }
      else if (kill(pid, SIGTERM) < 0)
      {
          fprintf(stderr,GT_("fetchmail: error killing %s fetchmail at %d; bailing out.\n"),
                bkgd ? GT_("background") : GT_("foreground"), pid);
          exit(PS_EXCLUDE);
      }
      else
      {
          fprintf(stderr,GT_("fetchmail: %s fetchmail at %d killed.\n"),
                bkgd ? GT_("background") : GT_("foreground"), pid);
          lock_release();
          if (argc == 2)
            exit(0);
          else
            pid = 0; 
      }
    }

    /* another fetchmail is running -- wake it up or die */
    if (pid != 0)
    {
      if (check_only)
      {
          fprintf(stderr,
             GT_("fetchmail: can't check mail while another fetchmail to same host is running.\n"));
          return(PS_EXCLUDE);
        }
      else if (!implicitmode)
      {
          fprintf(stderr,
             GT_("fetchmail: can't poll specified hosts with another fetchmail running at %d.\n"),
             pid);
            return(PS_EXCLUDE);
      }
      else if (!bkgd)
      {
          fprintf(stderr,
             GT_("fetchmail: another foreground fetchmail is running at %d.\n"),
             pid);
            return(PS_EXCLUDE);
      }
      else if (getpid() == pid)
          /* this test enables re-execing on a changed rcfile */
          lock_assert();
      else if (argc > 1)
      {
          fprintf(stderr,
                GT_("fetchmail: can't accept options while a background fetchmail is running.\n"));
          return(PS_EXCLUDE);
      }
      else if (kill(pid, SIGUSR1) == 0)
      {
          fprintf(stderr,
                GT_("fetchmail: background fetchmail at %d awakened.\n"),
                pid);
          return(0);
      }
      else
      {
          /*
           * Should never happen -- possible only if a background fetchmail
           * croaks after the first kill probe above but before the
           * SIGUSR1/SIGHUP transmission.
           */
          fprintf(stderr,
                GT_("fetchmail: elder sibling at %d died mysteriously.\n"),
                pid);
          return(PS_UNDEFINED);
      }
    }

    /* pick up interactively any passwords we need but don't have */ 
    for (ctl = querylist; ctl; ctl = ctl->next)
    {
      if (ctl->active && !(implicitmode && ctl->server.skip)
            && !NO_PASSWORD(ctl) && !ctl->password)
      {
          if (!isatty(0))
          {
            fprintf(stderr,
                  GT_("fetchmail: can't find a password for %s@%s.\n"),
                  ctl->remotename, ctl->server.pollname);
            return(PS_AUTHFAIL);
          }
          else
          {
            char* password_prompt = GT_("Enter password for %s@%s: ");

            xalloca(tmpbuf, char *, strlen(password_prompt) +
                  strlen(ctl->remotename) +
                  strlen(ctl->server.pollname) + 1);
            (void) sprintf(tmpbuf, password_prompt,
                         ctl->remotename, ctl->server.pollname);
            ctl->password = xstrdup((char *)fm_getpassword(tmpbuf));
          }
      }
    }

    /*
     * Time to initiate the SOCKS library (this is not mandatory: it just
     * registers the correct application name for logging purpose. If you
     * have some problem, comment out these lines).
     */
#ifdef HAVE_SOCKS
    SOCKSinit("fetchmail");
#endif /* HAVE_SOCKS */

    /* avoid zombies from plugins */
    deal_with_sigchld();

    /*
     * Maybe time to go to demon mode...
     */
    if (run.poll_interval)
    {
      if (!nodetach)
          daemonize(run.logfile, terminate_run);
      report(stdout, GT_("starting fetchmail %s daemon \n"), VERSION);

      /*
       * We'll set up a handler for these when we're sleeping,
       * but ignore them otherwise so as not to interrupt a poll.
       */
      set_signal_handler(SIGUSR1, SIG_IGN);
      if (run.poll_interval && getuid() == ROOT_UID)
          set_signal_handler(SIGHUP, SIG_IGN);
    }
    else
    {
      if (run.logfile && !nodetach && access(run.logfile, F_OK) == 0)
      {
          if (!freopen(run.logfile, "a", stdout))
                report(stderr, GT_("could not open %s to append logs to \n"), run.logfile);
          if (!freopen(run.logfile, "a", stderr))
                report(stdout, GT_("could not open %s to append logs to \n"), run.logfile);
      }
    }

#ifdef linux
    interface_init();
#endif /* linux */

    /* beyond here we don't want more than one fetchmail running per user */
    umask(0077);
    set_signal_handler(SIGABRT, terminate_run);
    set_signal_handler(SIGINT, terminate_run);
    set_signal_handler(SIGTERM, terminate_run);
    set_signal_handler(SIGALRM, terminate_run);
    set_signal_handler(SIGPIPE, terminate_run);
    set_signal_handler(SIGQUIT, terminate_run);

    /* here's the exclusion lock */
    lock_or_die();

    /*
     * Query all hosts. If there's only one, the error return will
     * reflect the status of that transaction.
     */
    do {
      /* 
       * Check to see if the rcfile has been touched.  If so,
       * re-exec so the file will be reread.  Doing it this way
       * avoids all the complications of trying to deallocate the
       * in-core control structures -- and the potential memory
       * leaks...
       */
      struct stat rcstat;

      if (stat(rcfile, &rcstat) == -1)
      {
          if (errno != ENOENT)
            report(stderr, 
                   GT_("couldn't time-check %s (error %d)\n"),
                   rcfile, errno);
      }
      else if (rcstat.st_mtime > parsetime)
      {
          report(stdout, GT_("restarting fetchmail (%s changed)\n"), rcfile);

#ifdef HAVE_GETCWD
          /* restore the startup directory */
          if (!currentwd[0] || chdir (currentwd) == -1)
            report(stderr, GT_("attempt to re-exec may fail as directory has not been restored\n"));
#endif

          /*
           * Matthias Andree: Isn't this prone to introduction of
           * "false" programs by interfering with PATH? Those
           * path-searching execs might not be the best ideas for
           * this reason.
           *
           * Rob Funk: But is there any way for someone to modify
           * the PATH variable of a running fetchmail?  I don't know
           * of a way.
           *
           * Dave's change makes fetchmail restart itself in exactly
           * the way it was started from the shell (or shell script)
           * in the first place.  If you're concerned about PATH
           * contamination, call fetchmail initially with a full
           * path, and use Dave's patch.
           *
           * Not using a -p variant of exec means that the restart
           * will break if both (a) the user depended on PATH to
           * call fetchmail in the first place, and (b) the system
           * doesn't save the whole path in argv[0] if the whole
           * path wasn't used in the initial call.  (If I recall
           * correctly, Linux saves it but many other Unices don't.)
           */
          execvp(argv[0], argv);
          report(stderr, GT_("attempt to re-exec fetchmail failed\n"));
      }

#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
      /*
       * This was an efficiency hack that backfired.  The theory
       * was that using TCP/IP for DNS queries would get us better
       * reliability and shave off some per-UDP-packet costs.
       * Unfortunately it interacted badly with diald, which effectively 
       * filters out DNS queries over TCP/IP for reasons having to do
       * with some obscure Linux kernel problem involving bootstrapping of
       * dynamically-addressed links.  I don't understand this mess
       * and don't want to, so it's "See ya!" to this hack.
       */
      sethostent(TRUE); /* use TCP/IP for mailserver queries */
#endif /* HAVE_RES_SEARCH */

      activecount = 0;
      batchcount = 0;
      for (ctl = querylist; ctl; ctl = ctl->next)
          if (ctl->active)
          {
            activecount++;
            if (!(implicitmode && ctl->server.skip))
            {
                if (ctl->wedged)
                {
                  report(stderr, 
                         GT_("poll of %s skipped (failed authentication or too many timeouts)\n"),
                         ctl->server.pollname);
                  continue;
                }

                /* check skip interval first so that it counts all polls */
                if (run.poll_interval && ctl->server.interval) 
                {
                  if (ctl->server.poll_count++ % ctl->server.interval) 
                  {
                      if (outlevel >= O_VERBOSE)
                        report(stdout,
                               GT_("interval not reached, not querying %s\n"),
                               ctl->server.pollname);
                      continue;
                  }
                }

#if (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__)
                /*
                 * Don't do monitoring if we were woken by a signal.
                 * Note that interface_approve() does its own error logging.
                 */
                if (!interface_approve(&ctl->server, !lastsig))
                  continue;
#endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */

                dofastuidl = 0; /* this is reset in the driver if required */

                querystatus = query_host(ctl);

                if (NUM_NONZERO(ctl->fastuidl))
                  ctl->fastuidlcount = (ctl->fastuidlcount + 1) % ctl->fastuidl;
#ifdef POP3_ENABLE
                /* leave the UIDL state alone if there have been any errors */
                if (!check_only &&
                        ((querystatus==PS_SUCCESS) || (querystatus==PS_NOMAIL) || (querystatus==PS_MAXFETCH)))
                  uid_swap_lists(ctl);
                else
                  uid_discard_new_list(ctl);
                uid_reset_num(ctl);
#endif  /* POP3_ENABLE */

                if (querystatus == PS_SUCCESS)
                  successes++;
                else if (!check_only && 
                       ((querystatus!=PS_NOMAIL) || (outlevel==O_DEBUG)))
                  switch(querystatus)
                  {
                  case PS_SUCCESS:
                      report(stdout,GT_("Query status=0 (SUCCESS)\n"));break;
                  case PS_NOMAIL: 
                      report(stdout,GT_("Query status=1 (NOMAIL)\n")); break;
                  case PS_SOCKET:
                      report(stdout,GT_("Query status=2 (SOCKET)\n")); break;
                  case PS_AUTHFAIL:
                      report(stdout,GT_("Query status=3 (AUTHFAIL)\n"));break;
                  case PS_PROTOCOL:
                      report(stdout,GT_("Query status=4 (PROTOCOL)\n"));break;
                  case PS_SYNTAX:
                      report(stdout,GT_("Query status=5 (SYNTAX)\n")); break;
                  case PS_IOERR:
                      report(stdout,GT_("Query status=6 (IOERR)\n"));  break;
                  case PS_ERROR:
                      report(stdout,GT_("Query status=7 (ERROR)\n"));  break;
                  case PS_EXCLUDE:
                      report(stdout,GT_("Query status=8 (EXCLUDE)\n")); break;
                  case PS_LOCKBUSY:
                      report(stdout,GT_("Query status=9 (LOCKBUSY)\n"));break;
                  case PS_SMTP:
                      report(stdout,GT_("Query status=10 (SMTP)\n")); break;
                  case PS_DNS:
                      report(stdout,GT_("Query status=11 (DNS)\n")); break;
                  case PS_BSMTP:
                      report(stdout,GT_("Query status=12 (BSMTP)\n")); break;
                  case PS_MAXFETCH:
                      report(stdout,GT_("Query status=13 (MAXFETCH)\n"));break;
                  default:
                      report(stdout,GT_("Query status=%d\n"),querystatus);
                      break;
                  }

#if (defined(linux) && !INET6_ENABLE) || defined (__FreeBSD__)
                if (ctl->server.monitor)
                {
                  /*
                   * Allow some time for the link to quiesce.  One
                   * second is usually sufficient, three is safe.
                   * Note:  this delay is important - don't remove!
                   */
                  sleep(3);
                  interface_note_activity(&ctl->server);
                }
#endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
            }
          }

#if defined(HAVE_RES_SEARCH) && defined(USE_TCPIP_FOR_DNS)
      endhostent();           /* release TCP/IP connection to nameserver */
#endif /* HAVE_RES_SEARCH */

      /* close connections cleanly */
      terminate_poll(0);

      /*
       * OK, we've polled.  Now sleep.
       */
      if (run.poll_interval)
      {
          /* 
           * Because passwords can expire, it may happen that *all*
           * hosts are now out of the loop due to authfail
           * conditions.  If this happens daemon-mode fetchmail
           * should softly and silently vanish away, rather than
           * spinning uselessly.
           */
          int unwedged = 0;

          for (ctl = querylist; ctl; ctl = ctl->next)
            if (ctl->active && !(implicitmode && ctl->server.skip))
                if (!ctl->wedged)
                  unwedged++;
          if (!unwedged)
          {
            report(stderr, GT_("All connections are wedged.  Exiting.\n"));
            /* FIXME: someday, send notification mail */
            exit(PS_AUTHFAIL);
          }

          if (outlevel > O_SILENT)
            report(stdout, 
                   GT_("sleeping at %s\n"), timestamp());

          /*
           * With this simple hack, we make it possible for a foreground 
           * fetchmail to wake up one in daemon mode.  What we want is the
           * side effect of interrupting any sleep that may be going on,
           * forcing fetchmail to re-poll its hosts.  The second line is
           * for people who think all system daemons wake up on SIGHUP.
           */
          set_signal_handler(SIGUSR1, donothing);
          if (getuid() != ROOT_UID)
            set_signal_handler(SIGHUP, donothing);

          /*
           * OK, now pause until it's time for the next poll cycle.
           * A nonzero return indicates we received a wakeup signal;
           * unwedge all servers in case the problem has been
           * manually repaired.
           */
          if ((lastsig = interruptible_idle(run.poll_interval)))
          {
            if (outlevel > O_SILENT)
#ifdef SYS_SIGLIST_DECLARED
                report(stdout, 
                   GT_("awakened by %s\n"), sys_siglist[lastsig]);
#else
                report(stdout, 
                   GT_("awakened by signal %d\n"), lastsig);
#endif
            for (ctl = querylist; ctl; ctl = ctl->next)
                ctl->wedged = FALSE;
          }

          if (outlevel > O_SILENT)
            report(stdout, GT_("awakened at %s\n"), timestamp());
      }
    } while
      (run.poll_interval);

    if (outlevel >= O_VERBOSE)
      report(stdout, GT_("normal termination, status %d\n"),
            successes ? PS_SUCCESS : querystatus);

    terminate_run(0);

    if (successes)
      exit(PS_SUCCESS);
    else if (querystatus)
      exit(querystatus);
    else
      /* in case we interrupted before a successful fetch */
      exit(PS_NOMAIL);
}

static void list_merge(struct idlist **dstl, struct idlist **srcl, int force)
{
    /*
     * If force is off, modify dstl fields only when they're empty (treat srcl
     * as defaults).  If force is on, modify each dstl field whenever scrcl
     * is nonempty (treat srcl as an override).  
     */
    if (force ? !!*srcl : !*dstl)
    {
      struct idlist *cpl = copy_str_list(*srcl);

      append_str_list(dstl, &cpl);
    }
}

static void optmerge(struct query *h2, struct query *h1, int force)
/* merge two options records */
{
    list_merge(&h2->server.localdomains, &h1->server.localdomains, force);
    list_merge(&h2->localnames, &h1->localnames, force);
    list_merge(&h2->mailboxes, &h1->mailboxes, force);
    list_merge(&h2->smtphunt, &h1->smtphunt, force);
    list_merge(&h2->domainlist, &h1->domainlist, force);
    list_merge(&h2->antispam, &h1->antispam, force);

#define FLAG_MERGE(fld) if (force ? !!h1->fld : !h2->fld) h2->fld = h1->fld
    FLAG_MERGE(server.via);
    FLAG_MERGE(server.protocol);
#if INET6_ENABLE
    FLAG_MERGE(server.service);
    FLAG_MERGE(server.netsec);
#else /* INET6_ENABLE */
    FLAG_MERGE(server.port);
#endif /* INET6_ENABLE */
    FLAG_MERGE(server.interval);
    FLAG_MERGE(server.authenticate);
    FLAG_MERGE(server.timeout);
    FLAG_MERGE(server.envelope);
    FLAG_MERGE(server.envskip);
    FLAG_MERGE(server.qvirtual);
    FLAG_MERGE(server.skip);
    FLAG_MERGE(server.dns);
    FLAG_MERGE(server.checkalias);
    FLAG_MERGE(server.uidl);
    FLAG_MERGE(server.principal);

#if defined(linux) || defined(__FreeBSD__)
    FLAG_MERGE(server.interface);
    FLAG_MERGE(server.monitor);
    FLAG_MERGE(server.interface_pair);
#endif /* linux || defined(__FreeBSD__) */

    FLAG_MERGE(server.plugin);
    FLAG_MERGE(server.plugout);

    FLAG_MERGE(wildcard);
    FLAG_MERGE(remotename);
    FLAG_MERGE(password);
    FLAG_MERGE(mda);
    FLAG_MERGE(bsmtp);
    FLAG_MERGE(listener);
    FLAG_MERGE(smtpaddress);
    FLAG_MERGE(smtpname);
    FLAG_MERGE(preconnect);
    FLAG_MERGE(postconnect);

    FLAG_MERGE(keep);
    FLAG_MERGE(flush);
    FLAG_MERGE(fetchall);
    FLAG_MERGE(rewrite);
    FLAG_MERGE(forcecr);
    FLAG_MERGE(stripcr);
    FLAG_MERGE(pass8bits);
    FLAG_MERGE(dropstatus);
    FLAG_MERGE(dropdelivered);
    FLAG_MERGE(mimedecode);
    FLAG_MERGE(idle);
    FLAG_MERGE(limit);
    FLAG_MERGE(warnings);
    FLAG_MERGE(fetchlimit);
    FLAG_MERGE(fetchsizelimit);
    FLAG_MERGE(fastuidl);
    FLAG_MERGE(batchlimit);
#ifdef      SSL_ENABLE
    FLAG_MERGE(use_ssl);
    FLAG_MERGE(sslkey);
    FLAG_MERGE(sslcert);
    FLAG_MERGE(sslproto);
    FLAG_MERGE(sslcertck);
    FLAG_MERGE(sslcertpath);
    FLAG_MERGE(sslfingerprint);
#endif
    FLAG_MERGE(expunge);

    FLAG_MERGE(tracepolls);
    FLAG_MERGE(properties);
#undef FLAG_MERGE
}

static int load_params(int argc, char **argv, int optind)
{
    int     implicitmode, st;
    struct passwd *pw;
    struct query def_opts, *ctl;
    struct stat rcstat;
    char *p;

    run.bouncemail = TRUE;
    run.spambounce = FALSE;   /* don't bounce back to innocent bystanders */

    memset(&def_opts, '\0', sizeof(struct query));
    def_opts.smtp_socket = -1;
    def_opts.smtpaddress = (char *)0;
    def_opts.smtpname = (char *)0;
    def_opts.server.protocol = P_AUTO;
    def_opts.server.timeout = CLIENT_TIMEOUT;
    def_opts.server.esmtp_name = user;
    def_opts.warnings = WARNING_INTERVAL;
    def_opts.remotename = user;
    def_opts.listener = SMTP_MODE;
    def_opts.fetchsizelimit = 100;
    def_opts.fastuidl = 10;

    /* get the location of rcfile */
    rcfiledir[0] = 0;
    p = strrchr (rcfile, '/');
    if (p && (p - rcfile) < sizeof (rcfiledir)) {
      *p = 0;                 /* replace '/' by '0' */
      strcpy (rcfiledir, rcfile);
      *p = '/';         /* restore '/' */
      if (!rcfiledir[0])      /* "/.fetchmailrc" case */
          strcpy (rcfiledir, "/");
    }

    /* note the parse time, so we can pick up on modifications */
    parsetime = 0;      /* foil compiler warnings */
    if (stat(rcfile, &rcstat) != -1)
      parsetime = rcstat.st_mtime;
    else if (errno != ENOENT)
      report(stderr, GT_("couldn't time-check the run-control file\n"));

    /* this builds the host list */
    if ((st = prc_parse_file(rcfile, !versioninfo)) != 0)
      /*
       * FIXME: someday, send notification mail here if backgrounded.
       * Right now, that can happen if the user changes the rcfile
       * while the fetchmail is running in background.  Do similarly
       * for the other exit() calls in this function.
       */
      exit(st);

    if ((implicitmode = (optind >= argc)))
    {
      for (ctl = querylist; ctl; ctl = ctl->next)
          ctl->active = !ctl->server.skip;
    }
    else
      for (; optind < argc; optind++) 
      {
          flag    predeclared =  FALSE;

          /*
           * If hostname corresponds to a host known from the rc file,
           * simply declare it active.  Otherwise synthesize a host
           * record from command line and defaults
           */
          for (ctl = querylist; ctl; ctl = ctl->next)
            if (!strcmp(ctl->server.pollname, argv[optind])
                  || str_in_list(&ctl->server.akalist, argv[optind], TRUE))
            {
                /* Is this correct? */
                if (predeclared && outlevel == O_VERBOSE)
                  fprintf(stderr,GT_("Warning: multiple mentions of host %s in config file\n"),argv[optind]);
                ctl->active = TRUE;
                predeclared = TRUE;
            }

          if (!predeclared)
          {
            /*
             * Allocate and link record without copying in
             * command-line args; we'll do that with the optmerge
             * call later on.
             */
            ctl = hostalloc((struct query *)NULL);
            ctl->server.via =
                ctl->server.pollname = xstrdup(argv[optind]);
            ctl->active = TRUE;
            ctl->server.lead_server = (struct hostdata *)NULL;
          }
      }

    /*
     * If there's a defaults record, merge it and lose it.
     */ 
    if (querylist && strcmp(querylist->server.pollname, "defaults") == 0)
    {
      for (ctl = querylist->next; ctl; ctl = ctl->next)
          optmerge(ctl, querylist, FALSE);
      querylist = querylist->next;
    }

    /* don't allow a defaults record after the first */
    for (ctl = querylist; ctl; ctl = ctl->next)
      if (ctl != querylist && strcmp(ctl->server.pollname, "defaults") == 0)
          exit(PS_SYNTAX);

    /* use localhost if we never fetch the FQDN of this host */
    fetchmailhost = "localhost";

    /* here's where we override globals */
    if (cmd_run.logfile)
      run.logfile = cmd_run.logfile;
    if (cmd_run.idfile)
      run.idfile = cmd_run.idfile;
    /* do this before the keep/fetchall test below, otherwise -d0 may fail */
    if (cmd_run.poll_interval >= 0)
      run.poll_interval = cmd_run.poll_interval;
    if (cmd_run.invisible)
      run.invisible = cmd_run.invisible;
    if (cmd_run.showdots)
      run.showdots = cmd_run.showdots;
    if (cmd_run.use_syslog)
      run.use_syslog = (cmd_run.use_syslog == FLAG_TRUE);
    if (cmd_run.postmaster)
      run.postmaster = cmd_run.postmaster;
    if (cmd_run.bouncemail)
      run.bouncemail = cmd_run.bouncemail;

    /* check and daemon options are not compatible */
    if (check_only && run.poll_interval)
      run.poll_interval = 0;

    /*
     * DNS support is required for some protocols.  We used to
     * do this unconditionally, but it made fetchmail excessively
     * vulnerable to misconfigured DNS setups.
     *
     * If we're using ETRN or ODMR, the smtp hunt list is the
     * list of systems we're polling on behalf of; these have
     * to be fully-qualified domain names.  The default for
     * this list should be the FQDN of localhost.
     *
     * If we're using Kerberos for authentication, we need 
     * the FQDN in order to generate capability keys.
     */
    if (strcmp(fetchmailhost, "localhost") == 0)
      for (ctl = querylist; ctl; ctl = ctl->next)
          if (ctl->active && 
            (ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR
             || ctl->server.authenticate == A_KERBEROS_V4
             || ctl->server.authenticate == A_KERBEROS_V5))
          {
            fetchmailhost = host_fqdn();
            break;
          }

    /* merge in wired defaults, do sanity checks and prepare internal fields */
    for (ctl = querylist; ctl; ctl = ctl->next)
    {
      ctl->wedged = FALSE;

      /* merge in defaults */
      optmerge(ctl, &def_opts, FALSE);

      /* force command-line options */
      optmerge(ctl, &cmd_opts, TRUE);

      /*
       * queryname has to be set up for inactive servers too.  
       * Otherwise the UIDL code core-dumps on startup.
       */
      if (ctl->server.via) 
          ctl->server.queryname = xstrdup(ctl->server.via);
      else
          ctl->server.queryname = xstrdup(ctl->server.pollname);

      /*
       * We no longer do DNS lookups at startup.
       * This is a kluge.  It enables users to edit their
       * configurations when DNS isn't available.
       */
      ctl->server.truename = xstrdup(ctl->server.queryname);

      if (configdump || ctl->active )
      {
          /* this code enables flags to be turned off */
#define DEFAULT(flag, dflt)   if (flag == FLAG_TRUE)\
                              flag = TRUE;\
                        else if (flag == FLAG_FALSE)\
                              flag = FALSE;\
                        else\
                              flag = (dflt)
          DEFAULT(ctl->keep, FALSE);
          DEFAULT(ctl->fetchall, FALSE);
          DEFAULT(ctl->flush, FALSE);
          DEFAULT(ctl->rewrite, TRUE);
          DEFAULT(ctl->stripcr, (ctl->mda != (char *)NULL)); 
          DEFAULT(ctl->forcecr, FALSE);
          DEFAULT(ctl->pass8bits, FALSE);
          DEFAULT(ctl->dropstatus, FALSE);
          DEFAULT(ctl->dropdelivered, FALSE);
          DEFAULT(ctl->mimedecode, FALSE);
          DEFAULT(ctl->idle, FALSE);
          DEFAULT(ctl->server.dns, TRUE);
          DEFAULT(ctl->server.uidl, FALSE);
#ifdef      SSL_ENABLE
          DEFAULT(ctl->use_ssl, FALSE);
          DEFAULT(ctl->sslcertck, FALSE);
#endif
          DEFAULT(ctl->server.checkalias, FALSE);
#ifndef SSL_ENABLE
          if (ctl->use_ssl) 
          {
            report(stderr, GT_("SSL support is not compiled in.\n"));
            exit(PS_SYNTAX);
          }
#endif /* SSL_ENABLE */
          /* one global gets treated specially */
          DEFAULT(run.showdots, run.poll_interval==0 || nodetach);
#undef DEFAULT

          /*
           * Make sure we have a nonempty host list to forward to.
           */
          if (!ctl->smtphunt)
            save_str(&ctl->smtphunt, fetchmailhost, FALSE);

          /*
           * Make sure we have a nonempty list of domains to fetch from.
           */
          if ((ctl->server.protocol==P_ETRN || ctl->server.protocol==P_ODMR) && !ctl->domainlist)
            save_str(&ctl->domainlist, fetchmailhost, FALSE);

          /* if `user' doesn't name a real local user, try to run as root */
          if ((pw = getpwnam(user)) == (struct passwd *)NULL)
            ctl->uid = 0;
            else
            ctl->uid = pw->pw_uid;  /* for local delivery via MDA */
          if (!ctl->localnames)     /* for local delivery via SMTP */
            save_str_pair(&ctl->localnames, user, NULL);

#if !defined(HAVE_GETHOSTBYNAME) || !defined(HAVE_RES_SEARCH)
          /* can't handle multidrop mailboxes unless we can do DNS lookups */
          if (ctl->localnames && ctl->localnames->next && ctl->server.dns)
          {
            ctl->server.dns = FALSE;
            report(stderr, GT_("fetchmail: warning: no DNS available to check multidrop fetches from %s\n"), ctl->server.pollname);
          }
#endif /* !HAVE_GETHOSTBYNAME || !HAVE_RES_SEARCH */

          /* if no folders were specified, set up the null one as default */
          if (!ctl->mailboxes)
            save_str(&ctl->mailboxes, (char *)NULL, 0);

          /* maybe user overrode timeout on command line? */
          if (ctl->server.timeout == -1)  
            ctl->server.timeout = CLIENT_TIMEOUT;

#if !INET6_ENABLE
          /* sanity checks */
          if (ctl->server.port < 0)
          {
            (void) fprintf(stderr,
                         GT_("%s configuration invalid, port number cannot be negative\n"),
                         ctl->server.pollname);
            exit(PS_SYNTAX);
          }
          if (ctl->server.protocol == P_RPOP && ctl->server.port >= 1024)
          {
            (void) fprintf(stderr,
                         GT_("%s configuration invalid, RPOP requires a privileged port\n"),
                         ctl->server.pollname);
            exit(PS_SYNTAX);
          }
          if (ctl->listener == LMTP_MODE)
          {
            struct idlist     *idp;

            for (idp = ctl->smtphunt; idp; idp = idp->next)
            {
                char    *cp;

                if (!(cp = strrchr(idp->id, '/')) ||
                        (atoi(++cp) == SMTP_PORT))
                {
                  (void) fprintf(stderr,
                               GT_("%s configuration invalid, LMTP can't use default SMTP port\n"),
                               ctl->server.pollname);
                  exit(PS_SYNTAX);
                }
            }
          }
#endif /* !INET6_ENABLE */

          /*
           * "I beg to you, have mercy on the week minds like myself."
           * wrote Pehr Anderson.  Your petition is granted.
           */
          if (ctl->fetchall && ctl->keep && run.poll_interval && !nodetach)
          {
            (void) fprintf(stderr,
                         GT_("Both fetchall and keep on in daemon mode is a mistake!\n"));
            exit(PS_SYNTAX);
          }
      }
    }

#ifdef POP3_ENABLE
    /* initialize UID handling */
    if (!versioninfo && (st = prc_filecheck(run.idfile, !versioninfo)) != 0)
      exit(st);
    else
      initialize_saved_lists(querylist, run.idfile);
#endif /* POP3_ENABLE */

    /*
     * If the user didn't set a last-resort user to get misaddressed
     * multidrop mail, set an appropriate default here.
     */
    if (!run.postmaster)
    {
      if (getuid() != ROOT_UID)           /* ordinary user */
          run.postmaster = user;
      else                          /* root */
          run.postmaster = "postmaster";
    }

    return(implicitmode);
}

static RETSIGTYPE terminate_poll(int sig)
/* to be executed at the end of a poll cycle */
{
    /*
     * Close all SMTP delivery sockets.  For optimum performance
     * we'd like to hold them open til end of run, but (1) this
     * loses if our poll interval is longer than the MTA's inactivity
     * timeout, and (2) some MTAs (like smail) don't deliver after
     * each message, but rather queue up mail and wait to actually
     * deliver it until the input socket is closed. 
     *
     * Sending SMTP QUIT on signal is theoretically nice, but led to a 
     * subtle bug.  If fetchmail was terminated by signal while it was 
     * shipping message text, it would hang forever waiting for a
     * command acknowledge.  In theory we could enable the QUIT
     * only outside of the message send.  In practice, we don't
     * care.  All mailservers hang up on a dropped TCP/IP connection
     * anyway.
     */

    if (sig != 0)
        report(stdout, GT_("terminated with signal %d\n"), sig);
    else
    {
      struct query *ctl;

      /* terminate all SMTP connections cleanly */
      for (ctl = querylist; ctl; ctl = ctl->next)
          if (ctl->smtp_socket != -1)
          {
            /* don't send QUIT for ODMR case because we're acting
               as a proxy between the SMTP server and client. */
            smtp_close(ctl, ctl->server.protocol != P_ODMR);
          }
    }

#ifdef POP3_ENABLE
    /*
     * Update UID information at end of each poll, rather than at end
     * of run, because that way we don't lose all UIDL information since
     * the beginning of time if fetchmail crashes.
     */
    if (!check_only)
      write_saved_lists(querylist, run.idfile);
#endif /* POP3_ENABLE */
}

static RETSIGTYPE terminate_run(int sig)
/* to be executed on normal or signal-induced termination */
{
    struct query  *ctl;

    terminate_poll(sig);

    /* 
     * Craig Metz, the RFC1938 one-time-password guy, points out:
     * "Remember that most kernels don't zero pages before handing them to the
     * next process and many kernels share pages between user and kernel space.
     * You'd be very surprised what you can find from a short program to do a
     * malloc() and then dump the contents of the pages you got. By zeroing
     * the secrets at end of run (earlier if you can), you make sure the next
     * guy can't get the password/pass phrase."
     *
     * Right you are, Craig!
     */
    for (ctl = querylist; ctl; ctl = ctl->next)
      if (ctl->password)
        memset(ctl->password, '\0', strlen(ctl->password));

#if !defined(HAVE_ATEXIT) && !defined(HAVE_ON_EXIT)
    lock_release();
#endif

    if (activecount == 0)
      exit(PS_NOMAIL);
    else
      exit(successes ? PS_SUCCESS : querystatus);
}

/*
 * Sequence of protocols to try when autoprobing, most capable to least.
 */
static const int autoprobe[] = 
{
#ifdef IMAP_ENABLE
    P_IMAP,
#endif /* IMAP_ENABLE */
#ifdef POP3_ENABLE
    P_POP3,
#endif /* POP3_ENABLE */
#ifdef POP2_ENABLE
    P_POP2
#endif /* POP2_ENABLE */
};

static int query_host(struct query *ctl)
/* perform fetch transaction with single host */
{
    int i, st = 0;

    /*
     * If we're syslogging the progress messages are automatically timestamped.
     * Force timestamping if we're going to a logfile.
     */
    if (outlevel >= O_VERBOSE)
    {
      report(stdout, GT_("%s querying %s (protocol %s) at %s: poll started\n"),
             VERSION,
             ctl->server.pollname,
             showproto(ctl->server.protocol),
             timestamp());
    }

    switch (ctl->server.protocol) {
    case P_AUTO:
      for (i = 0; i < sizeof(autoprobe)/sizeof(autoprobe[0]); i++)
      {
          ctl->server.protocol = autoprobe[i];
          do {
            st = query_host(ctl);
          } while 
            (st == PS_REPOLL);
          if (st == PS_SUCCESS || st == PS_NOMAIL || st == PS_AUTHFAIL || st == PS_LOCKBUSY || st == PS_SMTP || st == PS_MAXFETCH || st == PS_DNS)
            break;
      }
      ctl->server.protocol = P_AUTO;
      break;
    case P_POP2:
#ifdef POP2_ENABLE
      st = doPOP2(ctl);
#else
      report(stderr, GT_("POP2 support is not configured.\n"));
      st = PS_PROTOCOL;
#endif /* POP2_ENABLE */
      break;
    case P_POP3:
    case P_APOP:
    case P_RPOP:
#ifdef POP3_ENABLE
      do {
          st = doPOP3(ctl);
      } while (st == PS_REPOLL);
#else
      report(stderr, GT_("POP3 support is not configured.\n"));
      st = PS_PROTOCOL;
#endif /* POP3_ENABLE */
      break;
    case P_IMAP:
#ifdef IMAP_ENABLE
      do {
          st = doIMAP(ctl);
      } while (st == PS_REPOLL);
#else
      report(stderr, GT_("IMAP support is not configured.\n"));
      st = PS_PROTOCOL;
#endif /* IMAP_ENABLE */
      break;
    case P_ETRN:
#ifndef ETRN_ENABLE
      report(stderr, GT_("ETRN support is not configured.\n"));
      st = PS_PROTOCOL;
#else
#ifdef HAVE_GETHOSTBYNAME
      st = doETRN(ctl);
#else
      report(stderr, GT_("Cannot support ETRN without gethostbyname(2).\n"));
      st = PS_PROTOCOL;
#endif /* HAVE_GETHOSTBYNAME */
      break;
#endif /* ETRN_ENABLE */
    case P_ODMR:
#ifndef ODMR_ENABLE
      report(stderr, GT_("ODMR support is not configured.\n"));
      st = PS_PROTOCOL;
#else
#ifdef HAVE_GETHOSTBYNAME
      st = doODMR(ctl);
#else
      report(stderr, GT_("Cannot support ODMR without gethostbyname(2).\n"));
      st = PS_PROTOCOL;
#endif /* HAVE_GETHOSTBYNAME */
#endif /* ODMR_ENABLE */
      break;
    default:
      report(stderr, GT_("unsupported protocol selected.\n"));
      st = PS_PROTOCOL;
    }

    /*
     * If we're syslogging the progress messages are automatically timestamped.
     * Force timestamping if we're going to a logfile.
     */
    if (outlevel >= O_VERBOSE)
    {
      report(stdout, GT_("%s querying %s (protocol %s) at %s: poll completed\n"),
             VERSION,
             ctl->server.pollname,
             showproto(ctl->server.protocol),
             timestamp());
    }

    return(st);
}

static void dump_params (struct runctl *runp,
                   struct query *querylist, flag implicit)
/* display query parameters in English */
{
    struct query *ctl;

    if (runp->poll_interval)
      printf(GT_("Poll interval is %d seconds\n"), runp->poll_interval);
    if (runp->logfile)
      printf(GT_("Logfile is %s\n"), runp->logfile);
    if (strcmp(runp->idfile, IDFILE_NAME))
      printf(GT_("Idfile is %s\n"), runp->idfile);
#if defined(HAVE_SYSLOG)
    if (runp->use_syslog)
      printf(GT_("Progress messages will be logged via syslog\n"));
#endif
    if (runp->invisible)
      printf(GT_("Fetchmail will masquerade and will not generate Received\n"));
    if (runp->showdots)
      printf(GT_("Fetchmail will show progress dots even in logfiles.\n"));
    if (runp->postmaster)
      printf(GT_("Fetchmail will forward misaddressed multidrop messages to %s.\n"),
             runp->postmaster);

    if (!runp->bouncemail)
      printf(GT_("Fetchmail will direct error mail to the postmaster.\n"));
    else if (outlevel >= O_VERBOSE)
      printf(GT_("Fetchmail will direct error mail to the sender.\n"));

    for (ctl = querylist; ctl; ctl = ctl->next)
    {
      if (!ctl->active || (implicit && ctl->server.skip))
          continue;

      printf(GT_("Options for retrieving from %s@%s:\n"),
             ctl->remotename, visbuf(ctl->server.pollname));

      if (ctl->server.via && MAILBOX_PROTOCOL(ctl))
          printf(GT_("  Mail will be retrieved via %s\n"), ctl->server.via);

      if (ctl->server.interval)
          printf(GT_("  Poll of this server will occur every %d intervals.\n"),
               ctl->server.interval);
      if (ctl->server.truename)
          printf(GT_("  True name of server is %s.\n"), ctl->server.truename);
      if (ctl->server.skip || outlevel >= O_VERBOSE)
          printf(GT_("  This host %s be queried when no host is specified.\n"),
               ctl->server.skip ? GT_("will not") : GT_("will"));
      if (!NO_PASSWORD(ctl))
      {
          if (!ctl->password)
            printf(GT_("  Password will be prompted for.\n"));
          else if (outlevel >= O_VERBOSE)
          {
            if (ctl->server.protocol == P_APOP)
                printf(GT_("  APOP secret = \"%s\".\n"),
                     visbuf(ctl->password));
            else if (ctl->server.protocol == P_RPOP)
                printf(GT_("  RPOP id = \"%s\".\n"),
                     visbuf(ctl->password));
            else
                printf(GT_("  Password = \"%s\".\n"),
                                          visbuf(ctl->password));
          }
      }

      if (ctl->server.protocol == P_POP3 
#if INET6_ENABLE
          && ctl->server.service && !strcmp(ctl->server.service, KPOP_PORT)
#else /* INET6_ENABLE */
          && ctl->server.port == KPOP_PORT
#endif /* INET6_ENABLE */
          && (ctl->server.authenticate == A_KERBEROS_V4 ||
            ctl->server.authenticate == A_KERBEROS_V5))
          printf(GT_("  Protocol is KPOP with Kerberos %s authentication"),
               ctl->server.authenticate == A_KERBEROS_V5 ? "V" : "IV");
      else
          printf(GT_("  Protocol is %s"), showproto(ctl->server.protocol));
#if INET6_ENABLE
      if (ctl->server.service)
          printf(GT_(" (using service %s)"), ctl->server.service);
      if (ctl->server.netsec)
          printf(GT_(" (using network security options %s)"), ctl->server.netsec);
#else /* INET6_ENABLE */
      if (ctl->server.port)
          printf(GT_(" (using port %d)"), ctl->server.port);
#endif /* INET6_ENABLE */
      else if (outlevel >= O_VERBOSE)
          printf(GT_(" (using default port)"));
      if (ctl->server.uidl && MAILBOX_PROTOCOL(ctl))
          printf(GT_(" (forcing UIDL use)"));
      putchar('.');
      putchar('\n');
      switch (ctl->server.authenticate)
      {
      case A_ANY:
          printf(GT_("  All available authentication methods will be tried.\n"));
          break;
      case A_PASSWORD:
          printf(GT_("  Password authentication will be forced.\n"));
          break;
      case A_NTLM:
          printf(GT_("  NTLM authentication will be forced.\n"));
          break;
      case A_OTP:
          printf(GT_("  OTP authentication will be forced.\n"));
          break;
      case A_CRAM_MD5:
          printf(GT_("  CRAM-Md5 authentication will be forced.\n"));
          break;
      case A_GSSAPI:
          printf(GT_("  GSSAPI authentication will be forced.\n"));
          break;
      case A_KERBEROS_V4:
          printf(GT_("  Kerberos V4 authentication will be forced.\n"));
          break;
      case A_KERBEROS_V5:
          printf(GT_("  Kerberos V5 authentication will be forced.\n"));
          break;
      case A_SSH:
          printf(GT_("  End-to-end encryption assumed.\n"));
          break;
      }
      if (ctl->server.principal != (char *) NULL)
          printf(GT_("  Mail service principal is: %s\n"), ctl->server.principal);
#ifdef      SSL_ENABLE
      if (ctl->use_ssl)
          printf(GT_("  SSL encrypted sessions enabled.\n"));
      if (ctl->sslproto)
          printf(GT_("  SSL protocol: %s.\n"), ctl->sslproto);
      if (ctl->sslcertck) {
          printf(GT_("  SSL server certificate checking enabled.\n"));
          if (ctl->sslcertpath != NULL)
            printf(GT_("  SSL trusted certificate directory: %s\n"), ctl->sslcertpath);
      }
      if (ctl->sslfingerprint != NULL)
            printf(GT_("  SSL key fingerprint (checked against the server key): %s\n"), ctl->sslfingerprint);
#endif
      if (ctl->server.timeout > 0)
          printf(GT_("  Server nonresponse timeout is %d seconds"), ctl->server.timeout);
      if (ctl->server.timeout ==  CLIENT_TIMEOUT)
          printf(GT_(" (default).\n"));
      else
          printf(".\n");

      if (MAILBOX_PROTOCOL(ctl)) 
      {
          if (!ctl->mailboxes->id)
            printf(GT_("  Default mailbox selected.\n"));
          else
          {
            struct idlist *idp;

            printf(GT_("  Selected mailboxes are:"));
            for (idp = ctl->mailboxes; idp; idp = idp->next)
                printf(" %s", idp->id);
            printf("\n");
          }
          printf(GT_("  %s messages will be retrieved (--all %s).\n"),
               ctl->fetchall ? GT_("All") : GT_("Only new"),
               ctl->fetchall ? "on" : "off");
          printf(GT_("  Fetched messages %s be kept on the server (--keep %s).\n"),
               ctl->keep ? GT_("will") : GT_("will not"),
               ctl->keep ? "on" : "off");
          printf(GT_("  Old messages %s be flushed before message retrieval (--flush %s).\n"),
               ctl->flush ? GT_("will") : GT_("will not"),
               ctl->flush ? "on" : "off");
          printf(GT_("  Rewrite of server-local addresses is %s (--norewrite %s).\n"),
               ctl->rewrite ? GT_("enabled") : GT_("disabled"),
               ctl->rewrite ? "off" : "on");
          printf(GT_("  Carriage-return stripping is %s (stripcr %s).\n"),
               ctl->stripcr ? GT_("enabled") : GT_("disabled"),
               ctl->stripcr ? "on" : "off");
          printf(GT_("  Carriage-return forcing is %s (forcecr %s).\n"),
               ctl->forcecr ? GT_("enabled") : GT_("disabled"),
               ctl->forcecr ? "on" : "off");
          printf(GT_("  Interpretation of Content-Transfer-Encoding is %s (pass8bits %s).\n"),
               ctl->pass8bits ? GT_("disabled") : GT_("enabled"),
               ctl->pass8bits ? "on" : "off");
          printf(GT_("  MIME decoding is %s (mimedecode %s).\n"),
               ctl->mimedecode ? GT_("enabled") : GT_("disabled"),
               ctl->mimedecode ? "on" : "off");
          printf(GT_("  Idle after poll is %s (idle %s).\n"),
               ctl->idle ? GT_("enabled") : GT_("disabled"),
               ctl->idle ? "on" : "off");
          printf(GT_("  Nonempty Status lines will be %s (dropstatus %s)\n"),
               ctl->dropstatus ? GT_("discarded") : GT_("kept"),
               ctl->dropstatus ? "on" : "off");
          printf(GT_("  Delivered-To lines will be %s (dropdelivered %s)\n"),
               ctl->dropdelivered ? GT_("discarded") : GT_("kept"),
               ctl->dropdelivered ? "on" : "off");
          if (NUM_NONZERO(ctl->limit))
          {
            if (NUM_NONZERO(ctl->limit))
                printf(GT_("  Message size limit is %d octets (--limit %d).\n"), 
                     ctl->limit, ctl->limit);
            else if (outlevel >= O_VERBOSE)
                printf(GT_("  No message size limit (--limit 0).\n"));
            if (run.poll_interval > 0)
                printf(GT_("  Message size warning interval is %d seconds (--warnings %d).\n"), 
                     ctl->warnings, ctl->warnings);
            else if (outlevel >= O_VERBOSE)
                printf(GT_("  Size warnings on every poll (--warnings 0).\n"));
          }
          if (NUM_NONZERO(ctl->fetchlimit))
            printf(GT_("  Received-message limit is %d (--fetchlimit %d).\n"),
                   ctl->fetchlimit, ctl->fetchlimit);
          else if (outlevel >= O_VERBOSE)
            printf(GT_("  No received-message limit (--fetchlimit 0).\n"));
          if (NUM_NONZERO(ctl->fetchsizelimit))
            printf(GT_("  Fetch message size limit is %d (--fetchsizelimit %d).\n"),
                   ctl->fetchsizelimit, ctl->fetchsizelimit);
          else if (outlevel >= O_VERBOSE)
            printf(GT_("  No fetch message size limit (--fetchsizelimit 0).\n"));
          if (NUM_NONZERO(ctl->fastuidl) && MAILBOX_PROTOCOL(ctl))
          {
            if (ctl->fastuidl == 1)
                printf(GT_("  Do binary search of UIDs during each poll (--fastuidl 1).\n"));
            else
                printf(GT_("  Do binary search of UIDs during %d out of %d polls (--fastuidl %d).\n"), ctl->fastuidl - 1, ctl->fastuidl, ctl->fastuidl);
          }
          else if (outlevel >= O_VERBOSE)
            printf(GT_("   Do linear search of UIDs during each poll (--fastuidl 0).\n"));
          if (NUM_NONZERO(ctl->batchlimit))
            printf(GT_("  SMTP message batch limit is %d.\n"), ctl->batchlimit);
          else if (outlevel >= O_VERBOSE)
            printf(GT_("  No SMTP message batch limit (--batchlimit 0).\n"));
          if (MAILBOX_PROTOCOL(ctl))
          {
            if (NUM_NONZERO(ctl->expunge))
                printf(GT_("  Deletion interval between expunges forced to %d (--expunge %d).\n"), ctl->expunge, ctl->expunge);
            else if (outlevel >= O_VERBOSE)
                printf(GT_("  No forced expunges (--expunge 0).\n"));
          }
      }
      else  /* ODMR or ETRN */
      {
          struct idlist *idp;

          printf(GT_("  Domains for which mail will be fetched are:"));
          for (idp = ctl->domainlist; idp; idp = idp->next)
          {
            printf(" %s", idp->id);
            if (!idp->val.status.mark)
                printf(GT_(" (default)"));
          }
          printf("\n");
      }
      if (ctl->bsmtp)
          printf(GT_("  Messages will be appended to %s as BSMTP\n"), visbuf(ctl->bsmtp));
      else if (ctl->mda && MAILBOX_PROTOCOL(ctl))
          printf(GT_("  Messages will be delivered with \"%s\".\n"), visbuf(ctl->mda));
      else
      {
          struct idlist *idp;

          if (ctl->smtphunt)
          {
            printf(GT_("  Messages will be %cMTP-forwarded to:"), 
                   ctl->listener);
            for (idp = ctl->smtphunt; idp; idp = idp->next)
            {
                printf(" %s", idp->id);
                if (!idp->val.status.mark)
                  printf(GT_(" (default)"));
            }
            printf("\n");
          }
          if (ctl->smtpaddress)
            printf(GT_("  Host part of MAIL FROM line will be %s\n"),
                   ctl->smtpaddress);
          if (ctl->smtpname)
            printf(GT_("  Address to be put in RCPT TO lines shipped to SMTP will be %s\n"),
                   ctl->smtpname);
      }
      if (MAILBOX_PROTOCOL(ctl))
      {
            if (ctl->antispam != (struct idlist *)NULL)
            {
                struct idlist *idp;

                printf(GT_("  Recognized listener spam block responses are:"));
                for (idp = ctl->antispam; idp; idp = idp->next)
                  printf(" %d", idp->val.status.num);
                printf("\n");
            }
            else if (outlevel >= O_VERBOSE)
                printf(GT_("  Spam-blocking disabled\n"));
      }
      if (ctl->preconnect)
          printf(GT_("  Server connection will be brought up with \"%s\".\n"),
               visbuf(ctl->preconnect));
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No pre-connection command.\n"));
      if (ctl->postconnect)
          printf(GT_("  Server connection will be taken down with \"%s\".\n"),
               visbuf(ctl->postconnect));
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No post-connection command.\n"));
      if (MAILBOX_PROTOCOL(ctl)) {
            if (!ctl->localnames)
                printf(GT_("  No localnames declared for this host.\n"));
            else
            {
                struct idlist *idp;
                int count = 0;

                for (idp = ctl->localnames; idp; idp = idp->next)
                  ++count;

                if (count > 1 || ctl->wildcard)
                  printf(GT_("  Multi-drop mode: "));
                else
                  printf(GT_("  Single-drop mode: "));

                printf(GT_("%d local name(s) recognized.\n"), count);
                if (outlevel >= O_VERBOSE)
                {
                  for (idp = ctl->localnames; idp; idp = idp->next)
                      if (idp->val.id2)
                        printf("\t%s -> %s\n", idp->id, idp->val.id2);
                      else
                        printf("\t%s\n", idp->id);
                  if (ctl->wildcard)
                      fputs("\t*\n", stdout);
                }

                if (count > 1 || ctl->wildcard)
                {
                  printf(GT_("  DNS lookup for multidrop addresses is %s.\n"),
                         ctl->server.dns ? GT_("enabled") : GT_("disabled"));
                  if (ctl->server.dns)
                  {
                      printf(GT_("  Server aliases will be compared with multidrop addresses by "));
                            if (ctl->server.checkalias)
                        printf(GT_("IP address.\n"));
                      else
                        printf(GT_("name.\n"));
                  }
                  if (ctl->server.envelope == STRING_DISABLED)
                      printf(GT_("  Envelope-address routing is disabled\n"));
                  else
                  {
                      printf(GT_("  Envelope header is assumed to be: %s\n"),
                           ctl->server.envelope ? ctl->server.envelope:GT_("Received"));
                      if (ctl->server.envskip > 1 || outlevel >= O_VERBOSE)
                        printf(GT_("  Number of envelope header to be parsed: %d\n"),
                               ctl->server.envskip);
                      if (ctl->server.qvirtual)
                        printf(GT_("  Prefix %s will be removed from user id\n"),
                               ctl->server.qvirtual);
                      else if (outlevel >= O_VERBOSE) 
                        printf(GT_("  No prefix stripping\n"));
                  }

                  if (ctl->server.akalist)
                  {
                      struct idlist *idp;

                      printf(GT_("  Predeclared mailserver aliases:"));
                      for (idp = ctl->server.akalist; idp; idp = idp->next)
                        printf(" %s", idp->id);
                      putchar('\n');
                  }
                  if (ctl->server.localdomains)
                  {
                      struct idlist *idp;

                      printf(GT_("  Local domains:"));
                      for (idp = ctl->server.localdomains; idp; idp = idp->next)
                        printf(" %s", idp->id);
                      putchar('\n');
                  }
                }
            }
      }
#if defined(linux) || defined(__FreeBSD__)
      if (ctl->server.interface)
          printf(GT_("  Connection must be through interface %s.\n"), ctl->server.interface);
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No interface requirement specified.\n"));
      if (ctl->server.monitor)
          printf(GT_("  Polling loop will monitor %s.\n"), ctl->server.monitor);
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No monitor interface specified.\n"));
#endif

      if (ctl->server.plugin)
          printf(GT_("  Server connections will be made via plugin %s (--plugin %s).\n"), ctl->server.plugin, ctl->server.plugin);
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No plugin command specified.\n"));
      if (ctl->server.plugout)
          printf(GT_("  Listener connections will be made via plugout %s (--plugout %s).\n"), ctl->server.plugout, ctl->server.plugout);
      else if (outlevel >= O_VERBOSE)
          printf(GT_("  No plugout command specified.\n"));

      if (ctl->server.protocol > P_POP2 && MAILBOX_PROTOCOL(ctl))
      {
          if (!ctl->oldsaved)
            printf(GT_("  No UIDs saved from this host.\n"));
          else
          {
            struct idlist *idp;
            int count = 0;

            for (idp = ctl->oldsaved; idp; idp = idp->next)
                ++count;

            printf(GT_("  %d UIDs saved.\n"), count);
            if (outlevel >= O_VERBOSE)
                for (idp = ctl->oldsaved; idp; idp = idp->next)
                  printf("\t%s\n", idp->id);
          }
      }

        if (ctl->tracepolls)
            printf(GT_("  Poll trace information will be added to the Received header.\n"));
        else if (outlevel >= O_VERBOSE)
            printf(GT_("  No poll trace information will be added to the Received header.\n.\n"));

      if (ctl->properties)
          printf(GT_("  Pass-through properties \"%s\".\n"),
               visbuf(ctl->properties));
    }
}

/* fetchmail.c ends here */

Generated by  Doxygen 1.6.0   Back to index